2
0
mirror of https://gitlab.isc.org/isc-projects/bind9 synced 2025-09-02 15:45:25 +00:00

Merge branch '3232-rpz-rpz-nsip-rules-seem-not-to-understand-stub-and-static-stub-zones-and-don-t-handle' into 'main'

Resolve "RPZ rpz-nsip rules seem not to understand stub and static-stub zones and don't handle DNS_R_GLUE result well ..."

Closes #3232

See merge request isc-projects/bind9!6037
This commit is contained in:
Mark Andrews
2022-05-04 13:51:07 +00:00
11 changed files with 269 additions and 78 deletions

View File

@@ -1,3 +1,7 @@
5885. [bug] RPZ NSIP and NSDNAME rule processing didn't handle stub
and static-stub zones at or above the query name. This
has now been addressed. [GL #3232]
5884. [cleanup] Reduce struct padding in ADB address entries, and use a 5884. [cleanup] Reduce struct padding in ADB address entries, and use a
binary hash function to find addresses. [GL !6219] binary hash function to find addresses. [GL !6219]

View File

@@ -0,0 +1,13 @@
; Copyright (C) Internet Systems Consortium, Inc. ("ISC")
;
; SPDX-License-Identifier: MPL-2.0
;
; This Source Code Form is subject to the terms of the Mozilla Public
; License, v. 2.0. If a copy of the MPL was not distributed with this
; file, you can obtain one at https://mozilla.org/MPL/2.0/.
;
; See the COPYRIGHT file distributed with this work for additional
; information regarding copyright ownership.
. 120 NS ns.
ns. 120 A 10.53.0.1

View File

@@ -0,0 +1,42 @@
/*
* Copyright (C) Internet Systems Consortium, Inc. ("ISC")
*
* SPDX-License-Identifier: MPL-2.0
*
* This Source Code Form is subject to the terms of the Mozilla Public
* License, v. 2.0. If a copy of the MPL was not distributed with this
* file, you can obtain one at https://mozilla.org/MPL/2.0/.
*
* See the COPYRIGHT file distributed with this work for additional
* information regarding copyright ownership.
*/
options {
query-source address 10.53.0.10;
notify-source 10.53.0.10;
transfer-source 10.53.0.10;
port @PORT@;
pid-file "named.pid";
session-keyfile "session.key";
listen-on { 10.53.0.10; };
listen-on-v6 { none; };
notify no;
minimal-responses no;
recursion yes;
dnssec-validation yes;
};
key rndc_key {
secret "1234abcd8765";
algorithm hmac-sha256;
};
controls {
inet 10.53.0.10 port @CONTROLPORT@ allow { any; } keys { rndc_key; };
};
include "../trusted.conf";
zone "." { type hint; file "hints"; };
# grafted on zones using stub and static-stub
zone "stub-nomatch." {type primary; file "stub.db"; };
zone "static-stub-nomatch." {type primary; file "stub.db"; };

View File

@@ -0,0 +1,21 @@
; Copyright (C) Internet Systems Consortium, Inc. ("ISC")
;
; SPDX-License-Identifier: MPL-2.0
;
; This Source Code Form is subject to the terms of the Mozilla Public
; License, v. 2.0. If a copy of the MPL was not distributed with this
; file, you can obtain one at https://mozilla.org/MPL/2.0/.
;
; See the COPYRIGHT file distributed with this work for additional
; information regarding copyright ownership.
; RPZ rewrite responses from this zone
$TTL 120
@ SOA ns hostmaster.ns ( 1 3600 1200 604800 60 )
NS ns
ns A 10.53.0.10
a3-1 A 10.53.99.99
a4-1 A 10.53.99.99

View File

@@ -49,3 +49,7 @@ zone "tld2s." {type primary; file "tld2s.db";};
zone "bl.tld2." {type primary; file "bl.tld2.db"; zone "bl.tld2." {type primary; file "bl.tld2.db";
notify yes; notify-delay 0;}; notify yes; notify-delay 0;};
# grafted on zones using stub and static-stub
zone "stub." {type primary; file "stub.db"; };
zone "static-stub." {type primary; file "stub.db"; };

View File

@@ -0,0 +1,20 @@
; Copyright (C) Internet Systems Consortium, Inc. ("ISC")
;
; SPDX-License-Identifier: MPL-2.0
;
; This Source Code Form is subject to the terms of the Mozilla Public
; License, v. 2.0. If a copy of the MPL was not distributed with this
; file, you can obtain one at https://mozilla.org/MPL/2.0/.
;
; See the COPYRIGHT file distributed with this work for additional
; information regarding copyright ownership.
; RPZ rewrite responses from this zone
$TTL 120
@ SOA tld2. hostmaster.ns.tld2. ( 1 3600 1200 604800 60 )
NS ns.sub1.tld2.
a3-1 A 10.53.99.99
a4-1 A 10.53.99.99

View File

@@ -128,3 +128,23 @@ zone "fast-expire." {
primaries { 10.53.0.5; }; primaries { 10.53.0.5; };
notify no; notify no;
}; };
zone "stub." {
type stub;
primaries { 10.53.0.2; };
};
zone "static-stub." {
type static-stub;
server-addresses { 10.53.0.2; };
};
zone "stub-nomatch." {
type stub;
primaries { 10.53.0.10; };
};
zone "static-stub-nomatch." {
type static-stub;
server-addresses { 10.53.0.10; };
};

View File

@@ -53,6 +53,7 @@ copy_setports ns6/named.conf.in ns6/named.conf
copy_setports ns7/named.conf.in ns7/named.conf copy_setports ns7/named.conf.in ns7/named.conf
copy_setports ns8/named.conf.in ns8/named.conf copy_setports ns8/named.conf.in ns8/named.conf
copy_setports ns9/named.conf.in ns9/named.conf copy_setports ns9/named.conf.in ns9/named.conf
copy_setports ns10/named.conf.in ns10/named.conf
copy_setports dnsrpzd.conf.in dnsrpzd.conf copy_setports dnsrpzd.conf.in dnsrpzd.conf

View File

@@ -27,6 +27,8 @@ ns5=$ns.5 # another rewriting resolver
ns6=$ns.6 # a forwarding server ns6=$ns.6 # a forwarding server
ns7=$ns.7 # another rewriting resolver ns7=$ns.7 # another rewriting resolver
ns8=$ns.8 # another rewriting resolver ns8=$ns.8 # another rewriting resolver
ns9=$ns.9 # another rewriting resolver
ns10=$ns.10 # authoritative server
HAVE_CORE= HAVE_CORE=
@@ -405,6 +407,13 @@ nochange () {
ckresult "$*" ${DIGNM}_OK && clean_result ${DIGNM}_OK ckresult "$*" ${DIGNM}_OK && clean_result ${DIGNM}_OK
} }
nochange_ns10 () {
make_dignm
digcmd $* >$DIGNM
digcmd $* @$ns10 >${DIGNM}_OK
ckresult "$*" ${DIGNM}_OK && clean_result ${DIGNM}_OK
}
# check against a 'here document' # check against a 'here document'
here () { here () {
make_dignm make_dignm
@@ -620,6 +629,7 @@ EOF
# these tests assume "min-ns-dots 0" # these tests assume "min-ns-dots 0"
start_group "NSDNAME rewrites" test3 start_group "NSDNAME rewrites" test3
nextpart ns3/named.run > /dev/null
nochange a3-1.tld2 # 1 nochange a3-1.tld2 # 1
nochange a3-1.tld2 +dnssec # 2 this once caused problems nochange a3-1.tld2 +dnssec # 2 this once caused problems
nxdomain a3-1.sub1.tld2 # 3 NXDOMAIN *.sub1.tld2 by NSDNAME nxdomain a3-1.sub1.tld2 # 3 NXDOMAIN *.sub1.tld2 by NSDNAME
@@ -632,25 +642,39 @@ EOF
addr 127.0.0.1 a3-1.sub3.tld2 # 10 prefer policy for largest NSDNAME addr 127.0.0.1 a3-1.sub3.tld2 # 10 prefer policy for largest NSDNAME
addr 127.0.0.2 a3-1.subsub.sub3.tld2 # 11 addr 127.0.0.2 a3-1.subsub.sub3.tld2 # 11
nxdomain xxx.crash1.tld2 # 12 dns_db_detachnode() crash nxdomain xxx.crash1.tld2 # 12 dns_db_detachnode() crash
nxdomain a3-1.stub # 13
nxdomain a3-1.static-stub # 14
nochange_ns10 a3-1.stub-nomatch # 15
nochange_ns10 a3-1.static-stub-nomatch # 16
if [ "$mode" = dnsrps ]; then if [ "$mode" = dnsrps ]; then
addr 12.12.12.12 as-ns.tld5. # 13 qname-as-ns addr 12.12.12.12 as-ns.tld5. # 17 qname-as-ns
fi fi
nextpart ns3/named.run | grep -q "unrecognized NS rpz_rrset_find() failed: glue" &&
setret "seen: unrecognized NS rpz_rrset_find() failed: glue"
end_group end_group
if [ "$mode" = dnsrps ]; then if [ "$mode" = dnsrps ]; then
ckstats $ns3 test3 ns3 8 ckstats $ns3 test3 ns3 10
else else
ckstats $ns3 test3 ns3 7 ckstats $ns3 test3 ns3 9
fi fi
# these tests assume "min-ns-dots 0" # these tests assume "min-ns-dots 0"
start_group "NSIP rewrites" test4 start_group "NSIP rewrites" test4
nextpart ns3/named.run > /dev/null
nxdomain a3-1.tld2 # 1 NXDOMAIN for all of tld2 nxdomain a3-1.tld2 # 1 NXDOMAIN for all of tld2
nochange a3-2.tld2. # 2 exempt rewrite by name nochange a3-2.tld2. # 2 exempt rewrite by name
nochange a0-1.tld2. # 3 exempt rewrite by address block nochange a0-1.tld2. # 3 exempt rewrite by address block
nochange a3-1.tld4 # 4 different NS IP address nochange a3-1.tld4 # 4 different NS IP address
nxdomain a4-1.stub # 5
nxdomain a4-1.static-stub # 6
nochange_ns10 a4-1.stub-nomatch # 7
nochange_ns10 a4-1.static-stub-nomatch # 8
if [ "$mode" = dnsrps ]; then if [ "$mode" = dnsrps ]; then
addr 12.12.12.12 as-ns.tld5. # 5 ip-as-ns addr 12.12.12.12 as-ns.tld5. # 9 ip-as-ns
fi fi
nextpart ns3/named.run | grep -q "unrecognized NS rpz_rrset_find() failed: glue" &&
setret "seen: unrecognized NS rpz_rrset_find() failed: glue"
end_group end_group
start_group "walled garden NSIP rewrites" test4a start_group "walled garden NSIP rewrites" test4a
@@ -662,9 +686,9 @@ EOF
EOF EOF
end_group end_group
if [ "$mode" = dnsrps ]; then if [ "$mode" = dnsrps ]; then
ckstats $ns3 test4 ns3 5 ckstats $ns3 test4 ns3 7
else else
ckstats $ns3 test4 ns3 4 ckstats $ns3 test4 ns3 6
fi fi
# policies in ./test5 overridden by response-policy{} in ns3/named.conf # policies in ./test5 overridden by response-policy{} in ns3/named.conf
@@ -787,6 +811,7 @@ EOF
fi fi
# Ensure ns3 manages to transfer the fast-expire zone before shutdown. # Ensure ns3 manages to transfer the fast-expire zone before shutdown.
nextpartreset ns3/named.run
wait_for_log 20 "zone fast-expire/IN: transferred serial 1" ns3/named.run wait_for_log 20 "zone fast-expire/IN: transferred serial 1" ns3/named.run
# reconfigure the ns5 primary server without the fast-expire zone, so # reconfigure the ns5 primary server without the fast-expire zone, so

View File

@@ -267,6 +267,9 @@ dns_rpz_policy2str(dns_rpz_policy_t policy) {
case DNS_RPZ_POLICY_DNS64: case DNS_RPZ_POLICY_DNS64:
str = "DNS64"; str = "DNS64";
break; break;
case DNS_RPZ_POLICY_ERROR:
str = "ERROR";
break;
default: default:
UNREACHABLE(); UNREACHABLE();
} }

View File

@@ -2822,7 +2822,7 @@ query_rpzfetch(ns_client_t *client, dns_name_t *qname, dns_rdatatype_t type) {
*/ */
static isc_result_t static isc_result_t
rpz_rrset_find(ns_client_t *client, dns_name_t *name, dns_rdatatype_t type, rpz_rrset_find(ns_client_t *client, dns_name_t *name, dns_rdatatype_t type,
dns_rpz_type_t rpz_type, dns_db_t **dbp, unsigned int options, dns_rpz_type_t rpz_type, dns_db_t **dbp,
dns_dbversion_t *version, dns_rdataset_t **rdatasetp, dns_dbversion_t *version, dns_rdataset_t **rdatasetp,
bool resuming) { bool resuming) {
dns_rpz_st_t *st; dns_rpz_st_t *st;
@@ -2891,9 +2891,8 @@ rpz_rrset_find(ns_client_t *client, dns_name_t *name, dns_rdatatype_t type,
found = dns_fixedname_initname(&fixed); found = dns_fixedname_initname(&fixed);
dns_clientinfomethods_init(&cm, ns_client_sourceip); dns_clientinfomethods_init(&cm, ns_client_sourceip);
dns_clientinfo_init(&ci, client, NULL, NULL); dns_clientinfo_init(&ci, client, NULL, NULL);
result = dns_db_findext(*dbp, name, version, type, DNS_DBFIND_GLUEOK, result = dns_db_findext(*dbp, name, version, type, options, client->now,
client->now, &node, found, &cm, &ci, *rdatasetp, &node, found, &cm, &ci, *rdatasetp, NULL);
NULL);
if (result == DNS_R_DELEGATION && is_zone && USECACHE(client)) { if (result == DNS_R_DELEGATION && is_zone && USECACHE(client)) {
/* /*
* Try the cache if we're authoritative for an * Try the cache if we're authoritative for an
@@ -3636,82 +3635,104 @@ rpz_rewrite_ip_rrset(ns_client_t *client, dns_name_t *name,
struct in_addr ina; struct in_addr ina;
struct in6_addr in6a; struct in6_addr in6a;
isc_result_t result; isc_result_t result;
unsigned int options = DNS_DBFIND_GLUEOK;
bool done = false;
CTRACE(ISC_LOG_DEBUG(3), "rpz_rewrite_ip_rrset"); CTRACE(ISC_LOG_DEBUG(3), "rpz_rewrite_ip_rrset");
zbits = rpz_get_zbits(client, ip_type, rpz_type); do {
if (zbits == 0) { zbits = rpz_get_zbits(client, ip_type, rpz_type);
return (ISC_R_SUCCESS); if (zbits == 0) {
} return (ISC_R_SUCCESS);
}
/* /*
* Get the A or AAAA rdataset. * Get the A or AAAA rdataset.
*/ */
result = rpz_rrset_find(client, name, ip_type, rpz_type, ip_dbp, result = rpz_rrset_find(client, name, ip_type, options,
ip_version, ip_rdatasetp, resuming); rpz_type, ip_dbp, ip_version,
switch (result) { ip_rdatasetp, resuming);
case ISC_R_SUCCESS: switch (result) {
case DNS_R_GLUE: case ISC_R_SUCCESS:
case DNS_R_ZONECUT: case DNS_R_GLUE:
break; case DNS_R_ZONECUT:
case DNS_R_EMPTYNAME: break;
case DNS_R_EMPTYWILD: case DNS_R_EMPTYNAME:
case DNS_R_NXDOMAIN: case DNS_R_EMPTYWILD:
case DNS_R_NCACHENXDOMAIN: case DNS_R_NXDOMAIN:
case DNS_R_NXRRSET: case DNS_R_NCACHENXDOMAIN:
case DNS_R_NCACHENXRRSET: case DNS_R_NXRRSET:
case ISC_R_NOTFOUND: case DNS_R_NCACHENXRRSET:
return (ISC_R_SUCCESS); case ISC_R_NOTFOUND:
case DNS_R_DELEGATION: return (ISC_R_SUCCESS);
case DNS_R_DUPLICATE: case DNS_R_DELEGATION:
case DNS_R_DROP: case DNS_R_DUPLICATE:
return (result); case DNS_R_DROP:
case DNS_R_CNAME: return (result);
case DNS_R_DNAME: case DNS_R_CNAME:
rpz_log_fail(client, DNS_RPZ_DEBUG_LEVEL1, name, rpz_type, case DNS_R_DNAME:
"NS address rewrite rrset", result); rpz_log_fail(client, DNS_RPZ_DEBUG_LEVEL1, name,
return (ISC_R_SUCCESS);
default:
if (client->query.rpz_st->m.policy != DNS_RPZ_POLICY_ERROR) {
client->query.rpz_st->m.policy = DNS_RPZ_POLICY_ERROR;
rpz_log_fail(client, DNS_RPZ_ERROR_LEVEL, name,
rpz_type, "NS address rewrite rrset", rpz_type, "NS address rewrite rrset",
result); result);
} return (ISC_R_SUCCESS);
CTRACE(ISC_LOG_ERROR, "rpz_rewrite_ip_rrset: unexpected "
"result");
return (DNS_R_SERVFAIL);
}
/*
* Check all of the IP addresses in the rdataset.
*/
for (result = dns_rdataset_first(*ip_rdatasetp);
result == ISC_R_SUCCESS; result = dns_rdataset_next(*ip_rdatasetp))
{
dns_rdata_t rdata = DNS_RDATA_INIT;
dns_rdataset_current(*ip_rdatasetp, &rdata);
switch (rdata.type) {
case dns_rdatatype_a:
INSIST(rdata.length == 4);
memmove(&ina.s_addr, rdata.data, 4);
isc_netaddr_fromin(&netaddr, &ina);
break;
case dns_rdatatype_aaaa:
INSIST(rdata.length == 16);
memmove(in6a.s6_addr, rdata.data, 16);
isc_netaddr_fromin6(&netaddr, &in6a);
break;
default: default:
continue; if (client->query.rpz_st->m.policy !=
DNS_RPZ_POLICY_ERROR) {
client->query.rpz_st->m.policy =
DNS_RPZ_POLICY_ERROR;
rpz_log_fail(client, DNS_RPZ_ERROR_LEVEL, name,
rpz_type,
"NS address rewrite rrset",
result);
}
CTRACE(ISC_LOG_ERROR,
"rpz_rewrite_ip_rrset: unexpected "
"result");
return (DNS_R_SERVFAIL);
} }
result = rpz_rewrite_ip(client, &netaddr, qtype, rpz_type, /*
zbits, p_rdatasetp); * If we are processing glue setup for the next loop
if (result != ISC_R_SUCCESS) { * otherwise we are done.
return (result); */
if (result == DNS_R_GLUE) {
options = 0;
} else {
done = true;
} }
}
/*
* Check all of the IP addresses in the rdataset.
*/
for (result = dns_rdataset_first(*ip_rdatasetp);
result == ISC_R_SUCCESS;
result = dns_rdataset_next(*ip_rdatasetp))
{
dns_rdata_t rdata = DNS_RDATA_INIT;
dns_rdataset_current(*ip_rdatasetp, &rdata);
switch (rdata.type) {
case dns_rdatatype_a:
INSIST(rdata.length == 4);
memmove(&ina.s_addr, rdata.data, 4);
isc_netaddr_fromin(&netaddr, &ina);
break;
case dns_rdatatype_aaaa:
INSIST(rdata.length == 16);
memmove(in6a.s6_addr, rdata.data, 16);
isc_netaddr_fromin6(&netaddr, &in6a);
break;
default:
continue;
}
result = rpz_rewrite_ip(client, &netaddr, qtype,
rpz_type, zbits, p_rdatasetp);
if (result != ISC_R_SUCCESS) {
return (result);
}
}
} while (!done &&
client->query.rpz_st->m.policy == DNS_RPZ_POLICY_MISS);
return (ISC_R_SUCCESS); return (ISC_R_SUCCESS);
} }
@@ -3985,6 +4006,7 @@ rpz_rewrite(ns_client_t *client, dns_rdatatype_t qtype, isc_result_t qresult,
dns_rpz_have_t have; dns_rpz_have_t have;
dns_rpz_popt_t popt; dns_rpz_popt_t popt;
int rpz_ver; int rpz_ver;
unsigned int options;
#ifdef USE_DNSRPS #ifdef USE_DNSRPS
librpz_emsg_t emsg; librpz_emsg_t emsg;
#endif /* ifdef USE_DNSRPS */ #endif /* ifdef USE_DNSRPS */
@@ -4235,7 +4257,9 @@ rpz_rewrite(ns_client_t *client, dns_rdatatype_t qtype, isc_result_t qresult,
dns_fixedname_init(&nsnamef); dns_fixedname_init(&nsnamef);
dns_name_clone(client->query.qname, dns_fixedname_name(&nsnamef)); dns_name_clone(client->query.qname, dns_fixedname_name(&nsnamef));
options = DNS_DBFIND_GLUEOK;
while (st->r.label > st->popt.min_ns_labels) { while (st->r.label > st->popt.min_ns_labels) {
bool was_glue = false;
/* /*
* Get NS rrset for each domain in the current qname. * Get NS rrset for each domain in the current qname.
*/ */
@@ -4250,7 +4274,7 @@ rpz_rewrite(ns_client_t *client, dns_rdatatype_t qtype, isc_result_t qresult,
!dns_rdataset_isassociated(st->r.ns_rdataset)) { !dns_rdataset_isassociated(st->r.ns_rdataset)) {
dns_db_t *db = NULL; dns_db_t *db = NULL;
result = rpz_rrset_find(client, nsname, result = rpz_rrset_find(client, nsname,
dns_rdatatype_ns, dns_rdatatype_ns, options,
DNS_RPZ_TYPE_NSDNAME, &db, NULL, DNS_RPZ_TYPE_NSDNAME, &db, NULL,
&st->r.ns_rdataset, resuming); &st->r.ns_rdataset, resuming);
if (db != NULL) { if (db != NULL) {
@@ -4260,6 +4284,9 @@ rpz_rewrite(ns_client_t *client, dns_rdatatype_t qtype, isc_result_t qresult,
goto cleanup; goto cleanup;
} }
switch (result) { switch (result) {
case DNS_R_GLUE:
was_glue = true;
FALLTHROUGH;
case ISC_R_SUCCESS: case ISC_R_SUCCESS:
result = dns_rdataset_first(st->r.ns_rdataset); result = dns_rdataset_first(st->r.ns_rdataset);
if (result != ISC_R_SUCCESS) { if (result != ISC_R_SUCCESS) {
@@ -4299,6 +4326,7 @@ rpz_rewrite(ns_client_t *client, dns_rdatatype_t qtype, isc_result_t qresult,
continue; continue;
} }
} }
/* /*
* Check all NS names. * Check all NS names.
*/ */
@@ -4349,7 +4377,17 @@ rpz_rewrite(ns_client_t *client, dns_rdatatype_t qtype, isc_result_t qresult,
result = dns_rdataset_next(st->r.ns_rdataset); result = dns_rdataset_next(st->r.ns_rdataset);
} while (result == ISC_R_SUCCESS); } while (result == ISC_R_SUCCESS);
dns_rdataset_disassociate(st->r.ns_rdataset); dns_rdataset_disassociate(st->r.ns_rdataset);
st->r.label--;
/*
* If we just checked a glue NS RRset retry without allowing
* glue responses, otherwise setup for the next name.
*/
if (was_glue) {
options = 0;
} else {
options = DNS_DBFIND_GLUEOK;
st->r.label--;
}
if (rpz_get_zbits(client, dns_rdatatype_any, if (rpz_get_zbits(client, dns_rdatatype_any,
DNS_RPZ_TYPE_NSDNAME) == 0 && DNS_RPZ_TYPE_NSDNAME) == 0 &&