mirror of
https://gitlab.isc.org/isc-projects/bind9
synced 2025-08-29 13:38:26 +00:00
Merge branch '2950-confidential-cache-acceptance-rules' into 'main'
[CVE-2021-25220] prevent cache poisoning from forwarder responses See merge request isc-projects/bind9!5986
This commit is contained in:
commit
9c27a3b0e2
5
CHANGES
5
CHANGES
@ -41,7 +41,10 @@
|
|||||||
|
|
||||||
5818. [placeholder]
|
5818. [placeholder]
|
||||||
|
|
||||||
5817. [placeholder]
|
5817. [security] The rules for acceptance of records into the cache
|
||||||
|
have been tightened to prevent the possibility of
|
||||||
|
poisoning if forwarders send records outside
|
||||||
|
the configured bailiwick. (CVE-2021-25220) [GL #2950]
|
||||||
|
|
||||||
5816. [bug] Make BIND compile with LibreSSL 3.5.0, as it was using
|
5816. [bug] Make BIND compile with LibreSSL 3.5.0, as it was using
|
||||||
not very accurate pre-processor checks for using shims.
|
not very accurate pre-processor checks for using shims.
|
||||||
|
@ -15,7 +15,14 @@ Notes for BIND 9.17.23
|
|||||||
Security Fixes
|
Security Fixes
|
||||||
~~~~~~~~~~~~~~
|
~~~~~~~~~~~~~~
|
||||||
|
|
||||||
- None.
|
- The rules for acceptance of records into the cache have been tightened
|
||||||
|
to prevent the possibility of poisoning if forwarders send records
|
||||||
|
outside the configured bailiwick. (CVE-2021-25220)
|
||||||
|
|
||||||
|
ISC would like to thank Xiang Li, Baojun Liu, and Chaoyi Lu from
|
||||||
|
Network and Information Security Lab, Tsinghua University, and
|
||||||
|
Changgen Zou from Qi An Xin Group Corp. for bringing this
|
||||||
|
vulnerability to our attention. :gl:`#2950`
|
||||||
|
|
||||||
Known Issues
|
Known Issues
|
||||||
~~~~~~~~~~~~
|
~~~~~~~~~~~~
|
||||||
|
@ -63,6 +63,7 @@
|
|||||||
#include <dns/stats.h>
|
#include <dns/stats.h>
|
||||||
#include <dns/tsig.h>
|
#include <dns/tsig.h>
|
||||||
#include <dns/validator.h>
|
#include <dns/validator.h>
|
||||||
|
#include <dns/zone.h>
|
||||||
|
|
||||||
/* Detailed logging of fctx attach/detach */
|
/* Detailed logging of fctx attach/detach */
|
||||||
#ifndef FCTX_TRACE
|
#ifndef FCTX_TRACE
|
||||||
@ -370,6 +371,8 @@ struct fetchctx {
|
|||||||
dns_rdataset_t qminrrset;
|
dns_rdataset_t qminrrset;
|
||||||
dns_fixedname_t qmindcfname;
|
dns_fixedname_t qmindcfname;
|
||||||
dns_name_t *qmindcname;
|
dns_name_t *qmindcname;
|
||||||
|
dns_fixedname_t fwdfname;
|
||||||
|
dns_name_t *fwdname;
|
||||||
|
|
||||||
/*%
|
/*%
|
||||||
* The number of events we're waiting for.
|
* The number of events we're waiting for.
|
||||||
@ -3552,6 +3555,7 @@ fctx_getaddresses(fetchctx_t *fctx, bool badcache) {
|
|||||||
if (result == ISC_R_SUCCESS) {
|
if (result == ISC_R_SUCCESS) {
|
||||||
fwd = ISC_LIST_HEAD(forwarders->fwdrs);
|
fwd = ISC_LIST_HEAD(forwarders->fwdrs);
|
||||||
fctx->fwdpolicy = forwarders->fwdpolicy;
|
fctx->fwdpolicy = forwarders->fwdpolicy;
|
||||||
|
dns_name_copy(domain, fctx->fwdname);
|
||||||
if (fctx->fwdpolicy == dns_fwdpolicy_only &&
|
if (fctx->fwdpolicy == dns_fwdpolicy_only &&
|
||||||
isstrictsubdomain(domain, fctx->domain))
|
isstrictsubdomain(domain, fctx->domain))
|
||||||
{
|
{
|
||||||
@ -4728,6 +4732,7 @@ fctx_create(dns_resolver_t *res, isc_task_t *task, const dns_name_t *name,
|
|||||||
fctx->domain = dns_fixedname_initname(&fctx->dfname);
|
fctx->domain = dns_fixedname_initname(&fctx->dfname);
|
||||||
fctx->qminname = dns_fixedname_initname(&fctx->qminfname);
|
fctx->qminname = dns_fixedname_initname(&fctx->qminfname);
|
||||||
fctx->qmindcname = dns_fixedname_initname(&fctx->qmindcfname);
|
fctx->qmindcname = dns_fixedname_initname(&fctx->qmindcfname);
|
||||||
|
fctx->fwdname = dns_fixedname_initname(&fctx->fwdfname);
|
||||||
|
|
||||||
dns_name_copy(name, fctx->name);
|
dns_name_copy(name, fctx->name);
|
||||||
dns_name_copy(name, fctx->qminname);
|
dns_name_copy(name, fctx->qminname);
|
||||||
@ -4772,6 +4777,7 @@ fctx_create(dns_resolver_t *res, isc_task_t *task, const dns_name_t *name,
|
|||||||
fname, &forwarders);
|
fname, &forwarders);
|
||||||
if (result == ISC_R_SUCCESS) {
|
if (result == ISC_R_SUCCESS) {
|
||||||
fctx->fwdpolicy = forwarders->fwdpolicy;
|
fctx->fwdpolicy = forwarders->fwdpolicy;
|
||||||
|
dns_name_copy(fname, fctx->fwdname);
|
||||||
}
|
}
|
||||||
|
|
||||||
if (fctx->fwdpolicy != dns_fwdpolicy_only) {
|
if (fctx->fwdpolicy != dns_fwdpolicy_only) {
|
||||||
@ -6757,6 +6763,107 @@ mark_related(dns_name_t *name, dns_rdataset_t *rdataset, bool external,
|
|||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
|
/*
|
||||||
|
* Returns true if 'name' is external to the namespace for which
|
||||||
|
* the server being queried can answer, either because it's not a
|
||||||
|
* subdomain or because it's below a forward declaration or a
|
||||||
|
* locally served zone.
|
||||||
|
*/
|
||||||
|
static inline bool
|
||||||
|
name_external(const dns_name_t *name, dns_rdatatype_t type, fetchctx_t *fctx) {
|
||||||
|
isc_result_t result;
|
||||||
|
dns_forwarders_t *forwarders = NULL;
|
||||||
|
dns_fixedname_t fixed, zfixed;
|
||||||
|
dns_name_t *fname = dns_fixedname_initname(&fixed);
|
||||||
|
dns_name_t *zfname = dns_fixedname_initname(&zfixed);
|
||||||
|
dns_name_t *apex = NULL;
|
||||||
|
dns_name_t suffix;
|
||||||
|
dns_zone_t *zone = NULL;
|
||||||
|
unsigned int labels;
|
||||||
|
dns_namereln_t rel;
|
||||||
|
|
||||||
|
apex = ISFORWARDER(fctx->addrinfo) ? fctx->fwdname : fctx->domain;
|
||||||
|
|
||||||
|
/*
|
||||||
|
* The name is outside the queried namespace.
|
||||||
|
*/
|
||||||
|
rel = dns_name_fullcompare(name, apex, &(int){ 0 },
|
||||||
|
&(unsigned int){ 0U });
|
||||||
|
if (rel != dns_namereln_subdomain && rel != dns_namereln_equal) {
|
||||||
|
return (true);
|
||||||
|
}
|
||||||
|
|
||||||
|
/*
|
||||||
|
* If the record lives in the parent zone, adjust the name so we
|
||||||
|
* look for the correct zone or forward clause.
|
||||||
|
*/
|
||||||
|
labels = dns_name_countlabels(name);
|
||||||
|
if (dns_rdatatype_atparent(type) && labels > 1U) {
|
||||||
|
dns_name_init(&suffix, NULL);
|
||||||
|
dns_name_getlabelsequence(name, 1, labels - 1, &suffix);
|
||||||
|
name = &suffix;
|
||||||
|
} else if (rel == dns_namereln_equal) {
|
||||||
|
/* If 'name' is 'apex', no further checking is needed. */
|
||||||
|
return (false);
|
||||||
|
}
|
||||||
|
|
||||||
|
/*
|
||||||
|
* If there is a locally served zone between 'apex' and 'name'
|
||||||
|
* then don't cache.
|
||||||
|
*/
|
||||||
|
LOCK(&fctx->res->view->lock);
|
||||||
|
if (fctx->res->view->zonetable != NULL) {
|
||||||
|
unsigned int options = DNS_ZTFIND_NOEXACT | DNS_ZTFIND_MIRROR;
|
||||||
|
result = dns_zt_find(fctx->res->view->zonetable, name, options,
|
||||||
|
zfname, &zone);
|
||||||
|
if (zone != NULL) {
|
||||||
|
dns_zone_detach(&zone);
|
||||||
|
}
|
||||||
|
if (result == ISC_R_SUCCESS || result == DNS_R_PARTIALMATCH) {
|
||||||
|
if (dns_name_fullcompare(zfname, apex, &(int){ 0 },
|
||||||
|
&(unsigned int){ 0U }) ==
|
||||||
|
dns_namereln_subdomain)
|
||||||
|
{
|
||||||
|
UNLOCK(&fctx->res->view->lock);
|
||||||
|
return (true);
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
||||||
|
UNLOCK(&fctx->res->view->lock);
|
||||||
|
|
||||||
|
/*
|
||||||
|
* Look for a forward declaration below 'name'.
|
||||||
|
*/
|
||||||
|
result = dns_fwdtable_find(fctx->res->view->fwdtable, name, fname,
|
||||||
|
&forwarders);
|
||||||
|
|
||||||
|
if (ISFORWARDER(fctx->addrinfo)) {
|
||||||
|
/*
|
||||||
|
* See if the forwarder declaration is better.
|
||||||
|
*/
|
||||||
|
if (result == ISC_R_SUCCESS) {
|
||||||
|
return (!dns_name_equal(fname, fctx->fwdname));
|
||||||
|
}
|
||||||
|
|
||||||
|
/*
|
||||||
|
* If the lookup failed, the configuration must have
|
||||||
|
* changed: play it safe and don't cache.
|
||||||
|
*/
|
||||||
|
return (true);
|
||||||
|
} else if (result == ISC_R_SUCCESS &&
|
||||||
|
forwarders->fwdpolicy == dns_fwdpolicy_only &&
|
||||||
|
!ISC_LIST_EMPTY(forwarders->fwdrs))
|
||||||
|
{
|
||||||
|
/*
|
||||||
|
* If 'name' is covered by a 'forward only' clause then we
|
||||||
|
* can't cache this repsonse.
|
||||||
|
*/
|
||||||
|
return (true);
|
||||||
|
}
|
||||||
|
|
||||||
|
return (false);
|
||||||
|
}
|
||||||
|
|
||||||
static isc_result_t
|
static isc_result_t
|
||||||
check_section(void *arg, const dns_name_t *addname, dns_rdatatype_t type,
|
check_section(void *arg, const dns_name_t *addname, dns_rdatatype_t type,
|
||||||
dns_rdataset_t *found, dns_section_t section) {
|
dns_rdataset_t *found, dns_section_t section) {
|
||||||
@ -6783,7 +6890,7 @@ check_section(void *arg, const dns_name_t *addname, dns_rdatatype_t type,
|
|||||||
result = dns_message_findname(rctx->query->rmessage, section, addname,
|
result = dns_message_findname(rctx->query->rmessage, section, addname,
|
||||||
dns_rdatatype_any, 0, &name, NULL);
|
dns_rdatatype_any, 0, &name, NULL);
|
||||||
if (result == ISC_R_SUCCESS) {
|
if (result == ISC_R_SUCCESS) {
|
||||||
external = !dns_name_issubdomain(name, fctx->domain);
|
external = name_external(name, type, fctx);
|
||||||
if (type == dns_rdatatype_a) {
|
if (type == dns_rdatatype_a) {
|
||||||
for (rdataset = ISC_LIST_HEAD(name->list);
|
for (rdataset = ISC_LIST_HEAD(name->list);
|
||||||
rdataset != NULL;
|
rdataset != NULL;
|
||||||
@ -8450,6 +8557,13 @@ rctx_answer_scan(respctx_t *rctx) {
|
|||||||
break;
|
break;
|
||||||
|
|
||||||
case dns_namereln_subdomain:
|
case dns_namereln_subdomain:
|
||||||
|
/*
|
||||||
|
* Don't accept DNAME from parent namespace.
|
||||||
|
*/
|
||||||
|
if (name_external(name, dns_rdatatype_dname, fctx)) {
|
||||||
|
continue;
|
||||||
|
}
|
||||||
|
|
||||||
/*
|
/*
|
||||||
* In-scope DNAME records must have at least
|
* In-scope DNAME records must have at least
|
||||||
* as many labels as the domain being queried.
|
* as many labels as the domain being queried.
|
||||||
@ -8765,13 +8879,11 @@ rctx_authority_positive(respctx_t *rctx) {
|
|||||||
DNS_SECTION_AUTHORITY);
|
DNS_SECTION_AUTHORITY);
|
||||||
while (!done && result == ISC_R_SUCCESS) {
|
while (!done && result == ISC_R_SUCCESS) {
|
||||||
dns_name_t *name = NULL;
|
dns_name_t *name = NULL;
|
||||||
bool external;
|
|
||||||
|
|
||||||
dns_message_currentname(rctx->query->rmessage,
|
dns_message_currentname(rctx->query->rmessage,
|
||||||
DNS_SECTION_AUTHORITY, &name);
|
DNS_SECTION_AUTHORITY, &name);
|
||||||
external = !dns_name_issubdomain(name, fctx->domain);
|
|
||||||
|
|
||||||
if (!external) {
|
if (!name_external(name, dns_rdatatype_ns, fctx)) {
|
||||||
dns_rdataset_t *rdataset = NULL;
|
dns_rdataset_t *rdataset = NULL;
|
||||||
|
|
||||||
/*
|
/*
|
||||||
@ -9158,8 +9270,10 @@ rctx_authority_dnssec(respctx_t *rctx) {
|
|||||||
}
|
}
|
||||||
|
|
||||||
if (!dns_name_issubdomain(name, fctx->domain)) {
|
if (!dns_name_issubdomain(name, fctx->domain)) {
|
||||||
/* Invalid name found; preserve it for logging
|
/*
|
||||||
* later */
|
* Invalid name found; preserve it for logging
|
||||||
|
* later.
|
||||||
|
*/
|
||||||
rctx->found_name = name;
|
rctx->found_name = name;
|
||||||
rctx->found_type = ISC_LIST_HEAD(name->list)->type;
|
rctx->found_type = ISC_LIST_HEAD(name->list)->type;
|
||||||
continue;
|
continue;
|
||||||
|
Loading…
x
Reference in New Issue
Block a user