mirror of
https://gitlab.isc.org/isc-projects/bind9
synced 2025-08-22 01:59:26 +00:00
Implement sig0key-checks-limit and sig0message-checks-limit
Previously a hard-coded limitation of maximum two key or message verification checks were introduced when checking the message's SIG(0) signature. It was done in order to protect against possible DoS attacks. The logic behind choosing the number two was that more than one key should only be required only during key rotations, and in that case two keys are enough. But later it became apparent that there are other use cases too where even more keys are required, see issue number #5050 in GitLab. This change introduces two new configuration options for the views, sig0key-checks-limit and sig0message-checks-limit, which define how many keys are allowed to be checked to find a matching key, and how many message verifications are allowed to take place once a matching key has been found. The latter protects against expensive cryptographic operations when there are keys with colliding tags and algorithm numbers, with default being 2, and the former protects against a bit less expensive key parsing operations and defaults to 16.
This commit is contained in:
parent
742d379d88
commit
716b936045
@ -111,6 +111,8 @@ options {\n\
|
||||
session-keyname local-ddns;\n\
|
||||
startup-notify-rate 20;\n\
|
||||
sig0checks-quota 1;\n\
|
||||
sig0key-checks-limit 16;\n\
|
||||
sig0message-checks-limit 2;\n\
|
||||
statistics-file \"named.stats\";\n\
|
||||
tcp-advertised-timeout 300;\n\
|
||||
tcp-clients 150;\n\
|
||||
|
@ -4703,6 +4703,19 @@ configure_view(dns_view_t *view, dns_viewlist_t *viewlist, cfg_obj_t *config,
|
||||
dns_view_settransports(view, transports);
|
||||
dns_transport_list_detach(&transports);
|
||||
|
||||
/*
|
||||
* Configure SIG(0) check limits when matching a DNS message to a view.
|
||||
*/
|
||||
obj = NULL;
|
||||
result = named_config_get(maps, "sig0key-checks-limit", &obj);
|
||||
INSIST(result == ISC_R_SUCCESS);
|
||||
view->sig0key_checks_limit = cfg_obj_asuint32(obj);
|
||||
|
||||
obj = NULL;
|
||||
result = named_config_get(maps, "sig0message-checks-limit", &obj);
|
||||
INSIST(result == ISC_R_SUCCESS);
|
||||
view->sig0message_checks_limit = cfg_obj_asuint32(obj);
|
||||
|
||||
/*
|
||||
* Configure the view's TSIG keys.
|
||||
*/
|
||||
|
@ -44,7 +44,7 @@ fi
|
||||
cat_i <keyname.err
|
||||
|
||||
cat ns1/example1.db >ns1/example2-toomanykeys.db
|
||||
for i in 1 2 3; do
|
||||
for i in 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17; do
|
||||
keyname=$($KEYGEN -q -n HOST -a ${DEFAULT_ALGORITHM} -T KEY sig0.example2-toomanykeys 2>/dev/null)
|
||||
if test -n "$keyname"; then
|
||||
cat $keyname.key >>ns1/example2-toomanykeys.db
|
||||
|
@ -460,7 +460,7 @@ EOF
|
||||
ret=0
|
||||
good=0
|
||||
bad=0
|
||||
for i in 1 2 3; do
|
||||
for i in 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17; do
|
||||
keyname=$(cat keyname$i)
|
||||
$NSUPDATE -d -D -k $keyname.private -- - <<EOF >nsupdate.out.test$n.$i 2>&1 && good=$((good + 1)) || bad=$((bad + 1))
|
||||
local 10.53.0.1
|
||||
@ -470,9 +470,9 @@ EOF
|
||||
send
|
||||
EOF
|
||||
done
|
||||
# There are three keys in the zone but named checks the signature using
|
||||
# maximum two keys, so one of these updates should have been failed.
|
||||
[ $good = 2 ] && [ $bad = 1 ] || ret=1
|
||||
# There are 17 keys in the zone but by default named checks maximum 16 keys
|
||||
# to find a matching key, so one of these updates should have been failed.
|
||||
[ $good = 16 ] && [ $bad = 1 ] || ret=1
|
||||
if [ $ret != 0 ]; then echo_i "failed"; fi
|
||||
status=$((status + ret))
|
||||
n=$((n + 1))
|
||||
|
@ -279,6 +279,8 @@ options {
|
||||
sig-validity-interval <integer> [ <integer> ]; // obsolete
|
||||
sig0checks-quota <integer>; // experimental
|
||||
sig0checks-quota-exempt { <address_match_element>; ... }; // experimental
|
||||
sig0key-checks-limit <integer>;
|
||||
sig0message-checks-limit <integer>;
|
||||
stale-answer-client-timeout ( disabled | off | <integer> );
|
||||
stale-answer-enable <boolean>;
|
||||
stale-answer-ttl <duration>;
|
||||
@ -573,6 +575,8 @@ view <string> [ <class> ] {
|
||||
sig-signing-signatures <integer>;
|
||||
sig-signing-type <integer>;
|
||||
sig-validity-interval <integer> [ <integer> ]; // obsolete
|
||||
sig0key-checks-limit <integer>;
|
||||
sig0message-checks-limit <integer>;
|
||||
stale-answer-client-timeout ( disabled | off | <integer> );
|
||||
stale-answer-enable <boolean>;
|
||||
stale-answer-ttl <duration>;
|
||||
|
@ -179,6 +179,8 @@ struct dns_view {
|
||||
uint32_t fail_ttl;
|
||||
dns_badcache_t *failcache;
|
||||
unsigned int udpsize;
|
||||
uint32_t sig0key_checks_limit;
|
||||
uint32_t sig0message_checks_limit;
|
||||
uint32_t maxrrperset;
|
||||
uint32_t maxtypepername;
|
||||
uint16_t max_queries;
|
||||
|
@ -3279,12 +3279,7 @@ dns_message_checksig(dns_message_t *msg, dns_view_t *view) {
|
||||
dns_rdata_sig_t sig;
|
||||
dns_rdataset_t keyset;
|
||||
isc_result_t result;
|
||||
/*
|
||||
* In order to protect from a possible DoS attack, we are
|
||||
* going to check at most two KEY RRs.
|
||||
*/
|
||||
const size_t max_keys = 2;
|
||||
size_t n;
|
||||
uint32_t key_checks, message_checks;
|
||||
|
||||
result = dns_rdataset_first(msg->sig0);
|
||||
INSIST(result == ISC_R_SUCCESS);
|
||||
@ -3325,8 +3320,25 @@ dns_message_checksig(dns_message_t *msg, dns_view_t *view) {
|
||||
result = dns_rdataset_first(&keyset);
|
||||
INSIST(result == ISC_R_SUCCESS);
|
||||
|
||||
for (n = 0; result == ISC_R_SUCCESS && n < max_keys;
|
||||
n++, result = dns_rdataset_next(&keyset))
|
||||
/*
|
||||
* In order to protect from a possible DoS attack, this function
|
||||
* supports limitations on how many keyid checks and how many
|
||||
* key checks (message verifications using a matched key) are
|
||||
* going to be allowed.
|
||||
*/
|
||||
const uint32_t max_key_checks =
|
||||
view->sig0key_checks_limit > 0
|
||||
? view->sig0key_checks_limit
|
||||
: UINT32_MAX;
|
||||
const uint32_t max_message_checks =
|
||||
view->sig0message_checks_limit > 0
|
||||
? view->sig0message_checks_limit
|
||||
: UINT32_MAX;
|
||||
|
||||
for (key_checks = 0, message_checks = 0;
|
||||
result == ISC_R_SUCCESS && key_checks < max_key_checks &&
|
||||
message_checks < max_message_checks;
|
||||
key_checks++, result = dns_rdataset_next(&keyset))
|
||||
{
|
||||
dst_key_t *key = NULL;
|
||||
|
||||
@ -3353,8 +3365,21 @@ dns_message_checksig(dns_message_t *msg, dns_view_t *view) {
|
||||
if (result == ISC_R_SUCCESS) {
|
||||
break;
|
||||
}
|
||||
message_checks++;
|
||||
}
|
||||
if (result == ISC_R_NOMORE || n == max_keys) {
|
||||
if (result == ISC_R_NOMORE) {
|
||||
result = DNS_R_KEYUNAUTHORIZED;
|
||||
} else if (key_checks == max_key_checks) {
|
||||
isc_log_write(ISC_LOGCATEGORY_GENERAL,
|
||||
DNS_LOGMODULE_MESSAGE, ISC_LOG_DEBUG(3),
|
||||
"sig0key-checks-limit reached when "
|
||||
"trying to check a message signature");
|
||||
result = DNS_R_KEYUNAUTHORIZED;
|
||||
} else if (message_checks == max_message_checks) {
|
||||
isc_log_write(ISC_LOGCATEGORY_GENERAL,
|
||||
DNS_LOGMODULE_MESSAGE, ISC_LOG_DEBUG(3),
|
||||
"sig0message-checks-limit reached when "
|
||||
"trying to check a message signature");
|
||||
result = DNS_R_KEYUNAUTHORIZED;
|
||||
}
|
||||
|
||||
|
@ -2122,6 +2122,8 @@ static cfg_clausedef_t view_clauses[] = {
|
||||
{ "rrset-order", &cfg_type_rrsetorder, 0 },
|
||||
{ "send-cookie", &cfg_type_boolean, 0 },
|
||||
{ "servfail-ttl", &cfg_type_duration, 0 },
|
||||
{ "sig0key-checks-limit", &cfg_type_uint32, 0 },
|
||||
{ "sig0message-checks-limit", &cfg_type_uint32, 0 },
|
||||
{ "sortlist", &cfg_type_bracketed_aml, CFG_CLAUSEFLAG_ANCIENT },
|
||||
{ "stale-answer-enable", &cfg_type_boolean, 0 },
|
||||
{ "stale-answer-client-timeout", &cfg_type_staleanswerclienttimeout,
|
||||
|
Loading…
x
Reference in New Issue
Block a user