mirror of
https://gitlab.isc.org/isc-projects/bind9
synced 2025-09-04 00:25:29 +00:00
Merge branch '2759-fix-no-ds-proofs-for-wildcard-cname-delegations' into 'main'
Fix "no DS" proofs for wildcard+CNAME delegations Closes #2759 See merge request isc-projects/bind9!5155
This commit is contained in:
6
CHANGES
6
CHANGES
@@ -1,3 +1,9 @@
|
|||||||
|
5655. [bug] Signed, insecure delegation responses prepared by named
|
||||||
|
either lacked the necessary NSEC records or contained
|
||||||
|
duplicate NSEC records when both wildcard expansion and
|
||||||
|
CNAME chaining were required to prepare the response.
|
||||||
|
This has been fixed. [GL #2759]
|
||||||
|
|
||||||
5654. [func] Windows support has been removed. [GL #2690]
|
5654. [func] Windows support has been removed. [GL #2690]
|
||||||
|
|
||||||
5653. [bug] Fixed a bug that caused the NSEC3 salt to be changed
|
5653. [bug] Fixed a bug that caused the NSEC3 salt to be changed
|
||||||
|
@@ -12,5 +12,5 @@
|
|||||||
rm -f dig.out.* named*.pid
|
rm -f dig.out.* named*.pid
|
||||||
rm -f ns*/named.conf
|
rm -f ns*/named.conf
|
||||||
rm -f */named.memstats */named.recursing */named.lock */named.run */ans.run
|
rm -f */named.memstats */named.recursing */named.lock */named.run */ans.run
|
||||||
rm -f ns2/K* ns2/dsset-* ns2/example.db.signed
|
rm -f ns2/K* ns2/dsset-* ns2/*.db.signed
|
||||||
rm -f ns*/managed-keys.bind*
|
rm -f ns*/managed-keys.bind*
|
||||||
|
@@ -40,6 +40,21 @@ zone "signed-sub2.example" {
|
|||||||
file "sub.db";
|
file "sub.db";
|
||||||
};
|
};
|
||||||
|
|
||||||
|
zone "wildcard-nsec.example" {
|
||||||
|
type primary;
|
||||||
|
file "wildcard-nsec.example.db.signed";
|
||||||
|
};
|
||||||
|
|
||||||
|
zone "wildcard-nsec3.example" {
|
||||||
|
type primary;
|
||||||
|
file "wildcard-nsec3.example.db.signed";
|
||||||
|
};
|
||||||
|
|
||||||
|
zone "wildcard-nsec3-optout.example" {
|
||||||
|
type primary;
|
||||||
|
file "wildcard-nsec3-optout.example.db.signed";
|
||||||
|
};
|
||||||
|
|
||||||
zone "domain0.nil" { type primary; file "generic.db"; };
|
zone "domain0.nil" { type primary; file "generic.db"; };
|
||||||
zone "domain1.nil" { type primary; file "generic.db"; };
|
zone "domain1.nil" { type primary; file "generic.db"; };
|
||||||
zone "domain2.nil" { type primary; file "generic.db"; };
|
zone "domain2.nil" { type primary; file "generic.db"; };
|
||||||
|
@@ -13,7 +13,32 @@
|
|||||||
|
|
||||||
zone=example.
|
zone=example.
|
||||||
zonefile=example.db
|
zonefile=example.db
|
||||||
|
signedfile=example.db.signed
|
||||||
|
|
||||||
ksk=`$KEYGEN -q -a RSASHA256 -b 2048 -fk $zone`
|
ksk=`$KEYGEN -q -a RSASHA256 -b 2048 -fk $zone`
|
||||||
zsk=`$KEYGEN -q -a RSASHA256 -b 1024 $zone`
|
zsk=`$KEYGEN -q -a RSASHA256 -b 1024 $zone`
|
||||||
$SIGNER -S -o $zone example.db > /dev/null
|
$SIGNER -S -o $zone -f $signedfile $zonefile > /dev/null
|
||||||
|
|
||||||
|
zone=wildcard-nsec.example.
|
||||||
|
zonefile=wildcard.db
|
||||||
|
signedfile=wildcard-nsec.example.db.signed
|
||||||
|
|
||||||
|
ksk=`$KEYGEN -q -a RSASHA256 -b 2048 -fk $zone`
|
||||||
|
zsk=`$KEYGEN -q -a RSASHA256 -b 1024 $zone`
|
||||||
|
$SIGNER -S -o $zone -f $signedfile $zonefile > /dev/null
|
||||||
|
|
||||||
|
zone=wildcard-nsec3.example.
|
||||||
|
zonefile=wildcard.db
|
||||||
|
signedfile=wildcard-nsec3.example.db.signed
|
||||||
|
|
||||||
|
ksk=`$KEYGEN -q -a RSASHA256 -b 2048 -fk $zone`
|
||||||
|
zsk=`$KEYGEN -q -a RSASHA256 -b 1024 $zone`
|
||||||
|
$SIGNER -S -3 - -H 0 -o $zone -f $signedfile $zonefile > /dev/null
|
||||||
|
|
||||||
|
zone=wildcard-nsec3-optout.example.
|
||||||
|
zonefile=wildcard.db
|
||||||
|
signedfile=wildcard-nsec3-optout.example.db.signed
|
||||||
|
|
||||||
|
ksk=`$KEYGEN -q -a RSASHA256 -b 2048 -fk $zone`
|
||||||
|
zsk=`$KEYGEN -q -a RSASHA256 -b 1024 $zone`
|
||||||
|
$SIGNER -S -3 - -H 0 -A -o $zone -f $signedfile $zonefile > /dev/null
|
||||||
|
26
bin/tests/system/chain/ns2/wildcard.db
Normal file
26
bin/tests/system/chain/ns2/wildcard.db
Normal file
@@ -0,0 +1,26 @@
|
|||||||
|
; Copyright (C) Internet Systems Consortium, Inc. ("ISC")
|
||||||
|
;
|
||||||
|
; This Source Code Form is subject to the terms of the Mozilla Public
|
||||||
|
; License, v. 2.0. If a copy of the MPL was not distributed with this
|
||||||
|
; file, You can obtain one at http://mozilla.org/MPL/2.0/.
|
||||||
|
;
|
||||||
|
; See the COPYRIGHT file distributed with this work for additional
|
||||||
|
; information regarding copyright ownership.
|
||||||
|
|
||||||
|
$TTL 300 ; 5 minutes
|
||||||
|
@ IN SOA mname1. . (
|
||||||
|
2021051901 ; serial
|
||||||
|
20 ; refresh (20 seconds)
|
||||||
|
20 ; retry (20 seconds)
|
||||||
|
1814400 ; expire (3 weeks)
|
||||||
|
3600 ; minimum (1 hour)
|
||||||
|
)
|
||||||
|
NS localhost.
|
||||||
|
|
||||||
|
delegation NS localhost.
|
||||||
|
|
||||||
|
; CNAME pointing into a child zone
|
||||||
|
cname CNAME delegation
|
||||||
|
|
||||||
|
; wildcard CNAME pointing at a CNAME pointing into a child zone
|
||||||
|
* CNAME cname
|
@@ -81,6 +81,266 @@ grep '^toolong-dname\.example\..*DNAME.*long' dig.out.ns4.uncachedtoolong > /dev
|
|||||||
if [ $ret != 0 ]; then echo_i "failed"; fi
|
if [ $ret != 0 ]; then echo_i "failed"; fi
|
||||||
status=`expr $status + $ret`
|
status=`expr $status + $ret`
|
||||||
|
|
||||||
|
find_records() {
|
||||||
|
owner_name="$1"
|
||||||
|
rr_type="$2"
|
||||||
|
file="$3"
|
||||||
|
awk '$1 == "'"$owner_name"'" && $4 == "'"$rr_type"'" { print }' < "$file"
|
||||||
|
}
|
||||||
|
|
||||||
|
count_records() {
|
||||||
|
owner_name="$1"
|
||||||
|
rr_type="$2"
|
||||||
|
file="$3"
|
||||||
|
find_records "$owner_name" "$rr_type" "$file" | wc -l
|
||||||
|
}
|
||||||
|
|
||||||
|
exactly_one_record_exists_for() {
|
||||||
|
owner_name="$1"
|
||||||
|
rr_type="$2"
|
||||||
|
file="$3"
|
||||||
|
test "$(count_records "$owner_name" "$rr_type" "$file")" -eq 1
|
||||||
|
}
|
||||||
|
|
||||||
|
no_records_exist_for() {
|
||||||
|
owner_name="$1"
|
||||||
|
rr_type="$2"
|
||||||
|
file="$3"
|
||||||
|
test "$(count_records "$owner_name" "$rr_type" "$file")" -eq 0
|
||||||
|
}
|
||||||
|
|
||||||
|
ensure_no_ds_in_bitmap() {
|
||||||
|
owner_name="$1"
|
||||||
|
rr_type="$2"
|
||||||
|
file="$3"
|
||||||
|
case "$rr_type" in
|
||||||
|
NSEC) start_index=6 ;;
|
||||||
|
NSEC3) start_index=10 ;;
|
||||||
|
*) exit 1 ;;
|
||||||
|
esac
|
||||||
|
find_records "$owner_name" "$rr_type" "$file" | awk '{ for (i='"$start_index"'; i<=NF; i++) if ($i == "DS") exit 1 }'
|
||||||
|
}
|
||||||
|
|
||||||
|
n=`expr $n + 1`
|
||||||
|
echo_i "checking delegation prepared using CNAME chaining, NSEC ($n)"
|
||||||
|
ret=0
|
||||||
|
# QNAME exists, so the AUTHORITY section should only contain an NS RRset and a
|
||||||
|
# single NSEC record proving nonexistence of a DS RRset at the zone cut.
|
||||||
|
$DIG $DIGOPTS @10.53.0.2 cname.wildcard-nsec.example A +norec +dnssec > dig.out.2.$n 2>&1
|
||||||
|
# Ensure that the AUTHORITY section contains an NS RRset.
|
||||||
|
exactly_one_record_exists_for "delegation.wildcard-nsec.example." NS dig.out.2.$n || ret=1
|
||||||
|
# Check NSEC records in the AUTHORITY section.
|
||||||
|
no_records_exist_for "wildcard-nsec.example." NSEC dig.out.2.$n || ret=1
|
||||||
|
no_records_exist_for "*.wildcard-nsec.example." NSEC dig.out.2.$n || ret=1
|
||||||
|
no_records_exist_for "cname.wildcard-nsec.example." NSEC dig.out.2.$n || ret=1
|
||||||
|
exactly_one_record_exists_for "delegation.wildcard-nsec.example." NSEC dig.out.2.$n || ret=1
|
||||||
|
# Ensure the NSEC record for the zone cut does not have the DS bit set in the
|
||||||
|
# type bit map.
|
||||||
|
ensure_no_ds_in_bitmap "delegation.wildcard-nsec.example." NSEC dig.out.2.$n || ret=1
|
||||||
|
if [ $ret != 0 ]; then echo_i "failed"; fi
|
||||||
|
status=`expr $status + $ret`
|
||||||
|
|
||||||
|
n=`expr $n + 1`
|
||||||
|
echo_i "checking delegation prepared using wildcard expansion + CNAME chaining, NSEC, QNAME #1 ($n)"
|
||||||
|
ret=0
|
||||||
|
# QNAME does not exist, so the AUTHORITY section should contain an NS RRset and
|
||||||
|
# NSEC records proving nonexistence of both QNAME and a DS RRset at the zone
|
||||||
|
# cut. In this test case, these two NSEC records are different.
|
||||||
|
$DIG $DIGOPTS @10.53.0.2 a-nonexistent-name.wildcard-nsec.example A +norec +dnssec > dig.out.2.$n 2>&1
|
||||||
|
# Ensure that the AUTHORITY section contains an NS RRset.
|
||||||
|
exactly_one_record_exists_for "delegation.wildcard-nsec.example." NS dig.out.2.$n || ret=1
|
||||||
|
# Check NSEC records in the AUTHORITY section.
|
||||||
|
no_records_exist_for "wildcard-nsec.example." NSEC dig.out.2.$n || ret=1
|
||||||
|
exactly_one_record_exists_for "*.wildcard-nsec.example." NSEC dig.out.2.$n || ret=1
|
||||||
|
no_records_exist_for "cname.wildcard-nsec.example." NSEC dig.out.2.$n || ret=1
|
||||||
|
exactly_one_record_exists_for "delegation.wildcard-nsec.example." NSEC dig.out.2.$n || ret=1
|
||||||
|
# Ensure the NSEC record for the zone cut does not have the DS bit set in the
|
||||||
|
# type bit map.
|
||||||
|
ensure_no_ds_in_bitmap "delegation.wildcard-nsec.example." NSEC dig.out.2.$n || ret=1
|
||||||
|
if [ $ret != 0 ]; then echo_i "failed"; fi
|
||||||
|
status=`expr $status + $ret`
|
||||||
|
|
||||||
|
n=`expr $n + 1`
|
||||||
|
echo_i "checking delegation prepared using wildcard expansion + CNAME chaining, NSEC, QNAME #2 ($n)"
|
||||||
|
ret=0
|
||||||
|
# QNAME does not exist, so the AUTHORITY section should contain an NS RRset and
|
||||||
|
# NSEC records proving nonexistence of both QNAME and a DS RRset at the zone
|
||||||
|
# cut. In this test case, the same NSEC record proves nonexistence of both the
|
||||||
|
# QNAME and the DS RRset at the zone cut.
|
||||||
|
$DIG $DIGOPTS @10.53.0.2 z-nonexistent-name.wildcard-nsec.example A +norec +dnssec > dig.out.2.$n 2>&1
|
||||||
|
# Ensure that the AUTHORITY section contains an NS RRset.
|
||||||
|
exactly_one_record_exists_for "delegation.wildcard-nsec.example." NS dig.out.2.$n || ret=1
|
||||||
|
# Check NSEC records in the AUTHORITY section.
|
||||||
|
no_records_exist_for "wildcard-nsec.example." NSEC dig.out.2.$n || ret=1
|
||||||
|
no_records_exist_for "*.wildcard-nsec.example." NSEC dig.out.2.$n || ret=1
|
||||||
|
no_records_exist_for "cname.wildcard-nsec.example." NSEC dig.out.2.$n || ret=1
|
||||||
|
exactly_one_record_exists_for "delegation.wildcard-nsec.example." NSEC dig.out.2.$n || ret=1
|
||||||
|
# Ensure the NSEC record for the zone cut does not have the DS bit set in the
|
||||||
|
# type bit map.
|
||||||
|
ensure_no_ds_in_bitmap "delegation.wildcard-nsec.example." NSEC dig.out.2.$n || ret=1
|
||||||
|
if [ $ret != 0 ]; then echo_i "failed"; fi
|
||||||
|
status=`expr $status + $ret`
|
||||||
|
|
||||||
|
# Relevant NSEC3 hashes:
|
||||||
|
#
|
||||||
|
# - existing names:
|
||||||
|
#
|
||||||
|
# $ nsec3hash - 1 0 wildcard-nsec3.example.
|
||||||
|
# 38IVP9CN0LBISO6H3V5REQCKMTHLI5AN (salt=-, hash=1, iterations=0)
|
||||||
|
# $ nsec3hash - 1 0 cname.wildcard-nsec3.example.
|
||||||
|
# 3DV6GNNVR0O8LA4DC4CHL2JTVNHT8Q1D (salt=-, hash=1, iterations=0)
|
||||||
|
# $ nsec3hash - 1 0 delegation.wildcard-nsec3.example.
|
||||||
|
# AVKOGGGVJHFSLQA68TILKFKJ94AV4MNC (salt=-, hash=1, iterations=0)
|
||||||
|
# $ nsec3hash - 1 0 *.wildcard-nsec3.example.
|
||||||
|
# Q64D8L8HLSB3L98S59PM8OSSMI7SMQA2 (salt=-, hash=1, iterations=0)
|
||||||
|
#
|
||||||
|
# - nonexistent names:
|
||||||
|
#
|
||||||
|
# $ nsec3hash - 1 0 a-nonexistent-name.wildcard-nsec3.example.
|
||||||
|
# PST9IH6M0DG3M139CO3G12NUP4ER88SH (salt=-, hash=1, iterations=0)
|
||||||
|
# $ nsec3hash - 1 0 z-nonexistent-name.wildcard-nsec3.example.
|
||||||
|
# SG2DEHEAOGCKP7FTNQAUVC3I3TIPJH0J (salt=-, hash=1, iterations=0)
|
||||||
|
|
||||||
|
n=`expr $n + 1`
|
||||||
|
echo_i "checking delegation prepared using CNAME chaining, NSEC3 ($n)"
|
||||||
|
ret=0
|
||||||
|
# QNAME exists, so the AUTHORITY section should only contain an NS RRset and a
|
||||||
|
# single NSEC3 record proving nonexistence of a DS RRset at the zone cut.
|
||||||
|
$DIG $DIGOPTS @10.53.0.2 cname.wildcard-nsec3.example A +norec +dnssec > dig.out.2.$n 2>&1
|
||||||
|
# Ensure that the AUTHORITY section contains an NS RRset.
|
||||||
|
exactly_one_record_exists_for "delegation.wildcard-nsec3.example." NS dig.out.2.$n || ret=1
|
||||||
|
# Check NSEC3 records in the AUTHORITY section.
|
||||||
|
no_records_exist_for "38IVP9CN0LBISO6H3V5REQCKMTHLI5AN.wildcard-nsec3.example." NSEC3 dig.out.2.$n || ret=1
|
||||||
|
no_records_exist_for "3DV6GNNVR0O8LA4DC4CHL2JTVNHT8Q1D.wildcard-nsec3.example." NSEC3 dig.out.2.$n || ret=1
|
||||||
|
exactly_one_record_exists_for "AVKOGGGVJHFSLQA68TILKFKJ94AV4MNC.wildcard-nsec3.example." NSEC3 dig.out.2.$n || ret=1
|
||||||
|
no_records_exist_for "Q64D8L8HLSB3L98S59PM8OSSMI7SMQA2.wildcard-nsec3.example." NSEC3 dig.out.2.$n || ret=1
|
||||||
|
# Ensure the NSEC3 record matching the zone cut does not have the DS bit set in
|
||||||
|
# the type bit map.
|
||||||
|
ensure_no_ds_in_bitmap "AVKOGGGVJHFSLQA68TILKFKJ94AV4MNC.wildcard-nsec3.example." NSEC3 dig.out.2.$n || ret=1
|
||||||
|
if [ $ret != 0 ]; then echo_i "failed"; fi
|
||||||
|
status=`expr $status + $ret`
|
||||||
|
|
||||||
|
n=`expr $n + 1`
|
||||||
|
echo_i "checking delegation prepared using wildcard expansion + CNAME chaining, NSEC3, QNAME #1 ($n)"
|
||||||
|
ret=0
|
||||||
|
# QNAME does not exist, so the AUTHORITY section should contain an NS RRset and
|
||||||
|
# NSEC3 records proving nonexistence of both QNAME and a DS RRset at the zone
|
||||||
|
# cut. In this test case, these two NSEC3 records are different.
|
||||||
|
$DIG $DIGOPTS @10.53.0.2 z-nonexistent-name.wildcard-nsec3.example A +norec +dnssec > dig.out.2.$n 2>&1
|
||||||
|
# Ensure that the AUTHORITY section contains an NS RRset.
|
||||||
|
exactly_one_record_exists_for "delegation.wildcard-nsec3.example." NS dig.out.2.$n || ret=1
|
||||||
|
# Check NSEC3 records in the AUTHORITY section.
|
||||||
|
no_records_exist_for "38IVP9CN0LBISO6H3V5REQCKMTHLI5AN.wildcard-nsec3.example." NSEC3 dig.out.2.$n || ret=1
|
||||||
|
no_records_exist_for "3DV6GNNVR0O8LA4DC4CHL2JTVNHT8Q1D.wildcard-nsec3.example." NSEC3 dig.out.2.$n || ret=1
|
||||||
|
exactly_one_record_exists_for "AVKOGGGVJHFSLQA68TILKFKJ94AV4MNC.wildcard-nsec3.example." NSEC3 dig.out.2.$n || ret=1
|
||||||
|
exactly_one_record_exists_for "Q64D8L8HLSB3L98S59PM8OSSMI7SMQA2.wildcard-nsec3.example." NSEC3 dig.out.2.$n || ret=1
|
||||||
|
# Ensure the NSEC3 record matching the zone cut does not have the DS bit set in
|
||||||
|
# the type bit map.
|
||||||
|
ensure_no_ds_in_bitmap "AVKOGGGVJHFSLQA68TILKFKJ94AV4MNC.wildcard-nsec3.example." NSEC3 dig.out.2.$n || ret=1
|
||||||
|
if [ $ret != 0 ]; then echo_i "failed"; fi
|
||||||
|
status=`expr $status + $ret`
|
||||||
|
|
||||||
|
n=`expr $n + 1`
|
||||||
|
echo_i "checking delegation prepared using wildcard expansion + CNAME chaining, NSEC3, QNAME #2 ($n)"
|
||||||
|
ret=0
|
||||||
|
# QNAME does not exist, so the AUTHORITY section should contain an NS RRset and
|
||||||
|
# NSEC3 records proving nonexistence of both QNAME and a DS RRset at the zone
|
||||||
|
# cut. In this test case, the same NSEC3 record proves nonexistence of both the
|
||||||
|
# QNAME and the DS RRset at the zone cut.
|
||||||
|
$DIG $DIGOPTS @10.53.0.2 a-nonexistent-name.wildcard-nsec3.example A +norec +dnssec > dig.out.2.$n 2>&1
|
||||||
|
# Ensure that the AUTHORITY section contains an NS RRset.
|
||||||
|
exactly_one_record_exists_for "delegation.wildcard-nsec3.example." NS dig.out.2.$n || ret=1
|
||||||
|
# Check NSEC3 records in the AUTHORITY section.
|
||||||
|
no_records_exist_for "38IVP9CN0LBISO6H3V5REQCKMTHLI5AN.wildcard-nsec3.example." NSEC3 dig.out.2.$n || ret=1
|
||||||
|
no_records_exist_for "3DV6GNNVR0O8LA4DC4CHL2JTVNHT8Q1D.wildcard-nsec3.example." NSEC3 dig.out.2.$n || ret=1
|
||||||
|
exactly_one_record_exists_for "AVKOGGGVJHFSLQA68TILKFKJ94AV4MNC.wildcard-nsec3.example." NSEC3 dig.out.2.$n || ret=1
|
||||||
|
no_records_exist_for "Q64D8L8HLSB3L98S59PM8OSSMI7SMQA2.wildcard-nsec3.example." NSEC3 dig.out.2.$n || ret=1
|
||||||
|
# Ensure the NSEC3 record matching the zone cut does not have the DS bit set in
|
||||||
|
# the type bit map.
|
||||||
|
ensure_no_ds_in_bitmap "AVKOGGGVJHFSLQA68TILKFKJ94AV4MNC.wildcard-nsec3.example." NSEC3 dig.out.2.$n || ret=1
|
||||||
|
if [ $ret != 0 ]; then echo_i "failed"; fi
|
||||||
|
status=`expr $status + $ret`
|
||||||
|
|
||||||
|
# Relevant NSEC3 hashes:
|
||||||
|
#
|
||||||
|
# - existing names with corresponding NSEC3 records:
|
||||||
|
#
|
||||||
|
# $ nsec3hash - 1 0 *.wildcard-nsec3-optout.example.
|
||||||
|
# 2JGSPT59VJ7R9SQB5B9P6HPM5JBATOOO (salt=-, hash=1, iterations=0)
|
||||||
|
# $ nsec3hash - 1 0 cname.wildcard-nsec3-optout.example.
|
||||||
|
# OKRFKC9SS1O60E8U2980UD62MUSMKGUG (salt=-, hash=1, iterations=0)
|
||||||
|
# $ nsec3hash - 1 0 wildcard-nsec3-optout.example.
|
||||||
|
# SS5M1RUBSGMANEQ1VLRDDEC6SOAT7HNI (salt=-, hash=1, iterations=0)
|
||||||
|
#
|
||||||
|
# - existing name with no corresponding NSEC3 record due to opt-out:
|
||||||
|
#
|
||||||
|
# $ nsec3hash - 1 0 delegation.wildcard-nsec3-optout.example.
|
||||||
|
# UFP8PVECFTD57HU5PUD2HE0ES37QEOAP (salt=-, hash=1, iterations=0)
|
||||||
|
#
|
||||||
|
# - nonexistent names:
|
||||||
|
#
|
||||||
|
# $ nsec3hash - 1 0 b-nonexistent-name.wildcard-nsec3-optout.example.
|
||||||
|
# 3J38JE2OU0O7B4CE2ADMBBKJ5HT994S5 (salt=-, hash=1, iterations=0)
|
||||||
|
# $ nsec3hash - 1 0 z-nonexistent-name.wildcard-nsec3-optout.example.
|
||||||
|
# V7OTS4791T9SU0HKVL93EVNAJ9JH2CH3 (salt=-, hash=1, iterations=0)
|
||||||
|
|
||||||
|
n=`expr $n + 1`
|
||||||
|
echo_i "checking delegation prepared using CNAME chaining, NSEC3 with opt-out ($n)"
|
||||||
|
ret=0
|
||||||
|
# QNAME exists, so the AUTHORITY section should only contain an NS RRset and a
|
||||||
|
# single NSEC3 record proving nonexistence of a DS RRset at the zone cut.
|
||||||
|
$DIG $DIGOPTS @10.53.0.2 cname.wildcard-nsec3-optout.example A +norec +dnssec > dig.out.2.$n 2>&1
|
||||||
|
# Ensure that the AUTHORITY section contains an NS RRset.
|
||||||
|
exactly_one_record_exists_for "delegation.wildcard-nsec3-optout.example." NS dig.out.2.$n || ret=1
|
||||||
|
# Check NSEC3 records in the AUTHORITY section.
|
||||||
|
no_records_exist_for "2JGSPT59VJ7R9SQB5B9P6HPM5JBATOOO.wildcard-nsec3-optout.example." NSEC3 dig.out.2.$n || ret=1
|
||||||
|
no_records_exist_for "OKRFKC9SS1O60E8U2980UD62MUSMKGUG.wildcard-nsec3-optout.example." NSEC3 dig.out.2.$n || ret=1
|
||||||
|
exactly_one_record_exists_for "SS5M1RUBSGMANEQ1VLRDDEC6SOAT7HNI.wildcard-nsec3-optout.example." NSEC3 dig.out.2.$n || ret=1
|
||||||
|
# Ensure the NSEC3 record covering the zone cut does not have the DS bit set in
|
||||||
|
# the type bit map.
|
||||||
|
ensure_no_ds_in_bitmap "SS5M1RUBSGMANEQ1VLRDDEC6SOAT7HNI.wildcard-nsec3-optout.example." NSEC3 dig.out.2.$n || ret=1
|
||||||
|
if [ $ret != 0 ]; then echo_i "failed"; fi
|
||||||
|
status=`expr $status + $ret`
|
||||||
|
|
||||||
|
n=`expr $n + 1`
|
||||||
|
echo_i "checking delegation prepared using wildcard expansion + CNAME chaining, NSEC3 with opt-out, QNAME #1 ($n)"
|
||||||
|
ret=0
|
||||||
|
# QNAME does not exist, so the AUTHORITY section should contain an NS RRset and
|
||||||
|
# NSEC3 records proving nonexistence of both QNAME and a DS RRset at the zone
|
||||||
|
# cut. In this test case, these two NSEC3 records are different.
|
||||||
|
$DIG $DIGOPTS @10.53.0.2 b-nonexistent-name.wildcard-nsec3-optout.example A +norec +dnssec > dig.out.2.$n 2>&1
|
||||||
|
# Ensure that the AUTHORITY section contains an NS RRset.
|
||||||
|
exactly_one_record_exists_for "delegation.wildcard-nsec3-optout.example." NS dig.out.2.$n || ret=1
|
||||||
|
# Check NSEC3 records in the AUTHORITY section.
|
||||||
|
exactly_one_record_exists_for "2JGSPT59VJ7R9SQB5B9P6HPM5JBATOOO.wildcard-nsec3-optout.example." NSEC3 dig.out.2.$n || ret=1
|
||||||
|
no_records_exist_for "OKRFKC9SS1O60E8U2980UD62MUSMKGUG.wildcard-nsec3-optout.example." NSEC3 dig.out.2.$n || ret=1
|
||||||
|
exactly_one_record_exists_for "SS5M1RUBSGMANEQ1VLRDDEC6SOAT7HNI.wildcard-nsec3-optout.example." NSEC3 dig.out.2.$n || ret=1
|
||||||
|
# Ensure the NSEC3 record covering the zone cut does not have the DS bit set in
|
||||||
|
# the type bit map.
|
||||||
|
ensure_no_ds_in_bitmap "SS5M1RUBSGMANEQ1VLRDDEC6SOAT7HNI.wildcard-nsec3-optout.example." NSEC3 dig.out.2.$n || ret=1
|
||||||
|
if [ $ret != 0 ]; then echo_i "failed"; fi
|
||||||
|
status=`expr $status + $ret`
|
||||||
|
|
||||||
|
n=`expr $n + 1`
|
||||||
|
echo_i "checking delegation prepared using wildcard expansion + CNAME chaining, NSEC3 with opt-out, QNAME #2 ($n)"
|
||||||
|
ret=0
|
||||||
|
# QNAME does not exist, so the AUTHORITY section should contain an NS RRset and
|
||||||
|
# NSEC3 records proving nonexistence of both QNAME and a DS RRset at the zone
|
||||||
|
# cut. In this test case, the same NSEC3 record proves nonexistence of both the
|
||||||
|
# QNAME and the DS RRset at the zone cut.
|
||||||
|
$DIG $DIGOPTS @10.53.0.2 z-nonexistent-name.wildcard-nsec3-optout.example A +norec +dnssec > dig.out.2.$n 2>&1
|
||||||
|
# Ensure that the AUTHORITY section contains an NS RRset.
|
||||||
|
exactly_one_record_exists_for "delegation.wildcard-nsec3-optout.example." NS dig.out.2.$n || ret=1
|
||||||
|
# Check NSEC3 records in the AUTHORITY section.
|
||||||
|
no_records_exist_for "2JGSPT59VJ7R9SQB5B9P6HPM5JBATOOO.wildcard-nsec3-optout.example." NSEC3 dig.out.2.$n || ret=1
|
||||||
|
no_records_exist_for "OKRFKC9SS1O60E8U2980UD62MUSMKGUG.wildcard-nsec3-optout.example." NSEC3 dig.out.2.$n || ret=1
|
||||||
|
exactly_one_record_exists_for "SS5M1RUBSGMANEQ1VLRDDEC6SOAT7HNI.wildcard-nsec3-optout.example." NSEC3 dig.out.2.$n || ret=1
|
||||||
|
# Ensure the NSEC3 record covering the zone cut does not have the DS bit set in
|
||||||
|
# the type bit map.
|
||||||
|
ensure_no_ds_in_bitmap "SS5M1RUBSGMANEQ1VLRDDEC6SOAT7HNI.wildcard-nsec3-optout.example." NSEC3 dig.out.2.$n || ret=1
|
||||||
|
if [ $ret != 0 ]; then echo_i "failed"; fi
|
||||||
|
status=`expr $status + $ret`
|
||||||
|
|
||||||
n=`expr $n + 1`
|
n=`expr $n + 1`
|
||||||
echo_i "checking CNAME to DNAME from authoritative ($n)"
|
echo_i "checking CNAME to DNAME from authoritative ($n)"
|
||||||
ret=0
|
ret=0
|
||||||
|
@@ -81,3 +81,8 @@ Bug Fixes
|
|||||||
|
|
||||||
- Fixed a bug that caused the NSEC salt to be changed for KASP zones on
|
- Fixed a bug that caused the NSEC salt to be changed for KASP zones on
|
||||||
every startup. :gl:`#2725`
|
every startup. :gl:`#2725`
|
||||||
|
|
||||||
|
- Signed, insecure delegation responses prepared by ``named`` either
|
||||||
|
lacked the necessary NSEC records or contained duplicate NSEC records
|
||||||
|
when both wildcard expansion and CNAME chaining were required to
|
||||||
|
prepare the response. This has been fixed. :gl:`#2759`
|
||||||
|
@@ -9017,26 +9017,40 @@ query_addds(query_ctx_t *qctx) {
|
|||||||
|
|
||||||
/*
|
/*
|
||||||
* We've already added the NS record, so if the name's not there,
|
* We've already added the NS record, so if the name's not there,
|
||||||
* we have other problems. Use this name rather than calling
|
* we have other problems.
|
||||||
* query_addrrset().
|
|
||||||
*/
|
*/
|
||||||
result = dns_message_firstname(client->message, DNS_SECTION_AUTHORITY);
|
result = dns_message_firstname(client->message, DNS_SECTION_AUTHORITY);
|
||||||
if (result != ISC_R_SUCCESS) {
|
if (result != ISC_R_SUCCESS) {
|
||||||
goto cleanup;
|
goto cleanup;
|
||||||
}
|
}
|
||||||
|
|
||||||
rname = NULL;
|
/*
|
||||||
dns_message_currentname(client->message, DNS_SECTION_AUTHORITY, &rname);
|
* Find the delegation in the response message - it is not necessarily
|
||||||
result = dns_message_findtype(rname, dns_rdatatype_ns, 0, NULL);
|
* the first name in the AUTHORITY section when wildcard processing is
|
||||||
|
* involved.
|
||||||
|
*/
|
||||||
|
while (result == ISC_R_SUCCESS) {
|
||||||
|
rname = NULL;
|
||||||
|
dns_message_currentname(client->message, DNS_SECTION_AUTHORITY,
|
||||||
|
&rname);
|
||||||
|
result = dns_message_findtype(rname, dns_rdatatype_ns, 0, NULL);
|
||||||
|
if (result == ISC_R_SUCCESS) {
|
||||||
|
break;
|
||||||
|
}
|
||||||
|
result = dns_message_nextname(client->message,
|
||||||
|
DNS_SECTION_AUTHORITY);
|
||||||
|
}
|
||||||
|
|
||||||
if (result != ISC_R_SUCCESS) {
|
if (result != ISC_R_SUCCESS) {
|
||||||
goto cleanup;
|
goto cleanup;
|
||||||
}
|
}
|
||||||
|
|
||||||
ISC_LIST_APPEND(rname->list, rdataset, link);
|
/*
|
||||||
ISC_LIST_APPEND(rname->list, sigrdataset, link);
|
* Add the NSEC record to the delegation.
|
||||||
rdataset = NULL;
|
*/
|
||||||
sigrdataset = NULL;
|
query_addrrset(qctx, &rname, &rdataset, &sigrdataset, NULL,
|
||||||
return;
|
DNS_SECTION_AUTHORITY);
|
||||||
|
goto cleanup;
|
||||||
|
|
||||||
addnsec3:
|
addnsec3:
|
||||||
if (!dns_db_iszone(qctx->db)) {
|
if (!dns_db_iszone(qctx->db)) {
|
||||||
|
Reference in New Issue
Block a user