mirror of
https://gitlab.isc.org/isc-projects/bind9
synced 2025-08-29 13:38:26 +00:00
add a brief description of SIT
This commit is contained in:
parent
bc4410b878
commit
d3d9c0c8f6
86
doc/misc/SIT
Normal file
86
doc/misc/SIT
Normal file
@ -0,0 +1,86 @@
|
|||||||
|
Source Identity Token
|
||||||
|
|
||||||
|
Source Identity Token (SIT) is based in Donald Eastlake 3rd's DNS Cookies[1].
|
||||||
|
|
||||||
|
The main differences are that the error code has been dropped and
|
||||||
|
that the server cookie doesn't have a fixed length and may be
|
||||||
|
missing.
|
||||||
|
|
||||||
|
The error code has been dropped because it served no useful purpose
|
||||||
|
for us. If it was to be restored it should be the first element
|
||||||
|
of the option.
|
||||||
|
|
||||||
|
We extended the server cookie to transmit server time and to include
|
||||||
|
a server generated nonce. The purpose of these is to provide a
|
||||||
|
short window of time (1 hour with a 5 minutes of clock skew for
|
||||||
|
cluster time) where a previous cookie can be used for and to not
|
||||||
|
require the server secret to be updated when it is shared by a
|
||||||
|
cluster of servers. In particular the time of generation needed
|
||||||
|
to be passed between servers via the client so that old cookie can
|
||||||
|
be rejected.
|
||||||
|
|
||||||
|
The option structure is:
|
||||||
|
|
||||||
|
client cookie (64 bits)
|
||||||
|
server cookie (128 bits) broken up into:
|
||||||
|
- nonce (32 bits)
|
||||||
|
- time (32 bits)
|
||||||
|
- hash (64 bits)
|
||||||
|
|
||||||
|
The initial requests just sends the client cookie. If the response
|
||||||
|
contains a matching client cookie the entire response is saved and
|
||||||
|
sent on the next transaction. A new server cookie is generated for
|
||||||
|
every response.
|
||||||
|
|
||||||
|
We are currently using EDNS Experimental code point 65001. This is
|
||||||
|
subject to change.
|
||||||
|
|
||||||
|
We have three supported hash method. AES, HMAC SHA 1 and HMAC SHA 256.
|
||||||
|
A cluster of servers needs to choose one of them.
|
||||||
|
|
||||||
|
AES
|
||||||
|
memset(input, 0, sizeof(input));
|
||||||
|
cp = isc_buffer_used(buf);
|
||||||
|
isc_buffer_putmem(buf, client->cookie, 8);
|
||||||
|
isc_buffer_putuint32(buf, nonce);
|
||||||
|
isc_buffer_putuint32(buf, when);
|
||||||
|
memmove(input, cp, 16);
|
||||||
|
isc_aes128_crypt(ns_g_server->secret, input, digest);
|
||||||
|
for (i = 0; i < 8; i++)
|
||||||
|
input[i] = digest[i] ^ digest[i + 8];
|
||||||
|
isc_netaddr_fromsockaddr(&netaddr, &client->peeraddr);
|
||||||
|
switch (netaddr.family) {
|
||||||
|
case AF_INET:
|
||||||
|
memmove(input + 8, (unsigned char *)&netaddr.type.in, 4);
|
||||||
|
memset(input + 12, 0, 4);
|
||||||
|
isc_aes128_crypt(ns_g_server->secret, input, digest);
|
||||||
|
break;
|
||||||
|
case AF_INET6:
|
||||||
|
memmove(input + 8, (unsigned char *)&netaddr.type.in6, 16);
|
||||||
|
isc_aes128_crypt(ns_g_server->secret, input, digest);
|
||||||
|
for (i = 0; i < 8; i++)
|
||||||
|
input[i + 8] = digest[i] ^ digest[i + 8];
|
||||||
|
isc_aes128_crypt(ns_g_server->secret, input + 8, digest);
|
||||||
|
break;
|
||||||
|
}
|
||||||
|
for (i = 0; i < 8; i++)
|
||||||
|
digest[i] ^= digest[i + 8];
|
||||||
|
isc_buffer_putmem(buf, digest, 8);
|
||||||
|
|
||||||
|
HMAC SHA1
|
||||||
|
|
||||||
|
hash = trunc(hmacsha1(client|nonce|when|address, secret), 8);
|
||||||
|
|
||||||
|
HMAC SHA256
|
||||||
|
|
||||||
|
hash = trunc(hmacsha256(client|nonce|when|address, secret), 8);
|
||||||
|
|
||||||
|
[1]
|
||||||
|
INTERNET-DRAFT Donald Eastlake
|
||||||
|
Intended Status: Proposed Standard Huawei
|
||||||
|
Expires: July 21, 2014 January 22, 2014
|
||||||
|
|
||||||
|
|
||||||
|
Domain Name System (DNS) Cookies
|
||||||
|
<draft-eastlake-dnsext-cookies-04.txt>
|
||||||
|
|
Loading…
x
Reference in New Issue
Block a user