auth_srv.cc 18 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533
  1. // Copyright (C) 2009 Internet Systems Consortium, Inc. ("ISC")
  2. //
  3. // Permission to use, copy, modify, and/or distribute this software for any
  4. // purpose with or without fee is hereby granted, provided that the above
  5. // copyright notice and this permission notice appear in all copies.
  6. //
  7. // THE SOFTWARE IS PROVIDED "AS IS" AND ISC DISCLAIMS ALL WARRANTIES WITH
  8. // REGARD TO THIS SOFTWARE INCLUDING ALL IMPLIED WARRANTIES OF MERCHANTABILITY
  9. // AND FITNESS. IN NO EVENT SHALL ISC BE LIABLE FOR ANY SPECIAL, DIRECT,
  10. // INDIRECT, OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES WHATSOEVER RESULTING FROM
  11. // LOSS OF USE, DATA OR PROFITS, WHETHER IN AN ACTION OF CONTRACT, NEGLIGENCE
  12. // OR OTHER TORTIOUS ACTION, ARISING OUT OF OR IN CONNECTION WITH THE USE OR
  13. // PERFORMANCE OF THIS SOFTWARE.
  14. // $Id$
  15. #include <netinet/in.h>
  16. #include <algorithm>
  17. #include <cassert>
  18. #include <iostream>
  19. #include <vector>
  20. #include <exceptions/exceptions.h>
  21. #include <dns/buffer.h>
  22. #include <dns/exceptions.h>
  23. #include <dns/messagerenderer.h>
  24. #include <dns/name.h>
  25. #include <dns/question.h>
  26. #include <dns/rrset.h>
  27. #include <dns/rrttl.h>
  28. #include <dns/message.h>
  29. #include <config/ccsession.h>
  30. #include <cc/data.h>
  31. #include <exceptions/exceptions.h>
  32. #include <datasrc/query.h>
  33. #include <datasrc/data_source.h>
  34. #include <datasrc/static_datasrc.h>
  35. #include <datasrc/sqlite3_datasrc.h>
  36. #include <cc/data.h>
  37. #include <xfr/xfrout_client.h>
  38. #include <auth/common.h>
  39. #include <auth/auth_srv.h>
  40. #include <auth/asio_link.h>
  41. #include <boost/lexical_cast.hpp>
  42. using namespace std;
  43. using namespace isc;
  44. using namespace isc::cc;
  45. using namespace isc::datasrc;
  46. using namespace isc::dns;
  47. using namespace isc::dns::rdata;
  48. using namespace isc::data;
  49. using namespace isc::config;
  50. using namespace isc::xfr;
  51. using namespace asio_link;
  52. class AuthSrvImpl {
  53. private:
  54. // prohibit copy
  55. AuthSrvImpl(const AuthSrvImpl& source);
  56. AuthSrvImpl& operator=(const AuthSrvImpl& source);
  57. public:
  58. AuthSrvImpl(const bool use_cache, AbstractXfroutClient& xfrout_client);
  59. ~AuthSrvImpl();
  60. isc::data::ElementPtr setDbFile(const isc::data::ElementPtr config);
  61. bool processNormalQuery(const IOMessage& io_message, Message& message,
  62. MessageRenderer& response_renderer);
  63. bool processAxfrQuery(const IOMessage& io_message, Message& message,
  64. MessageRenderer& response_renderer);
  65. bool processNotify(const IOMessage& io_message, Message& message,
  66. MessageRenderer& response_renderer);
  67. std::string db_file_;
  68. ModuleCCSession* config_session_;
  69. MetaDataSrc data_sources_;
  70. /// We keep a pointer to the currently running sqlite datasource
  71. /// so that we can specifically remove that one should the database
  72. /// file change
  73. ConstDataSrcPtr cur_datasrc_;
  74. bool verbose_mode_;
  75. AbstractSession* xfrin_session_;
  76. bool xfrout_connected_;
  77. AbstractXfroutClient& xfrout_client_;
  78. /// Currently non-configurable, but will be.
  79. static const uint16_t DEFAULT_LOCAL_UDPSIZE = 4096;
  80. /// Hot spot cache
  81. isc::datasrc::HotCache cache_;
  82. };
  83. AuthSrvImpl::AuthSrvImpl(const bool use_cache,
  84. AbstractXfroutClient& xfrout_client) :
  85. config_session_(NULL), verbose_mode_(false),
  86. xfrin_session_(NULL),
  87. xfrout_connected_(false),
  88. xfrout_client_(xfrout_client)
  89. {
  90. // cur_datasrc_ is automatically initialized by the default constructor,
  91. // effectively being an empty (sqlite) data source. once ccsession is up
  92. // the datasource will be set by the configuration setting
  93. // add static data source
  94. data_sources_.addDataSrc(ConstDataSrcPtr(new StaticDataSrc));
  95. // enable or disable the cache
  96. cache_.setEnabled(use_cache);
  97. }
  98. AuthSrvImpl::~AuthSrvImpl() {
  99. if (xfrout_connected_) {
  100. xfrout_client_.disconnect();
  101. xfrout_connected_ = false;
  102. }
  103. }
  104. AuthSrv::AuthSrv(const bool use_cache, AbstractXfroutClient& xfrout_client) :
  105. impl_(new AuthSrvImpl(use_cache, xfrout_client))
  106. {}
  107. AuthSrv::~AuthSrv() {
  108. delete impl_;
  109. }
  110. namespace {
  111. class QuestionInserter {
  112. public:
  113. QuestionInserter(Message* message) : message_(message) {}
  114. void operator()(const QuestionPtr question) {
  115. message_->addQuestion(question);
  116. }
  117. Message* message_;
  118. };
  119. void
  120. makeErrorMessage(Message& message, MessageRenderer& renderer,
  121. const Rcode& rcode, const bool verbose_mode)
  122. {
  123. // extract the parameters that should be kept.
  124. // XXX: with the current implementation, it's not easy to set EDNS0
  125. // depending on whether the query had it. So we'll simply omit it.
  126. const qid_t qid = message.getQid();
  127. const bool rd = message.getHeaderFlag(MessageFlag::RD());
  128. const bool cd = message.getHeaderFlag(MessageFlag::CD());
  129. const Opcode& opcode = message.getOpcode();
  130. vector<QuestionPtr> questions;
  131. // If this is an error to a query or notify, we should also copy the
  132. // question section.
  133. if (opcode == Opcode::QUERY() || opcode == Opcode::NOTIFY()) {
  134. questions.assign(message.beginQuestion(), message.endQuestion());
  135. }
  136. message.clear(Message::RENDER);
  137. message.setQid(qid);
  138. message.setOpcode(opcode);
  139. message.setHeaderFlag(MessageFlag::QR());
  140. message.setUDPSize(AuthSrvImpl::DEFAULT_LOCAL_UDPSIZE);
  141. if (rd) {
  142. message.setHeaderFlag(MessageFlag::RD());
  143. }
  144. if (cd) {
  145. message.setHeaderFlag(MessageFlag::CD());
  146. }
  147. for_each(questions.begin(), questions.end(), QuestionInserter(&message));
  148. message.setRcode(rcode);
  149. message.toWire(renderer);
  150. if (verbose_mode) {
  151. cerr << "[b10-auth] sending an error response (" <<
  152. boost::lexical_cast<string>(renderer.getLength())
  153. << " bytes):\n" << message.toText() << endl;
  154. }
  155. }
  156. }
  157. void
  158. AuthSrv::setVerbose(const bool on) {
  159. impl_->verbose_mode_ = on;
  160. }
  161. bool
  162. AuthSrv::getVerbose() const {
  163. return (impl_->verbose_mode_);
  164. }
  165. void
  166. AuthSrv::setXfrinSession(AbstractSession* xfrin_session) {
  167. impl_->xfrin_session_ = xfrin_session;
  168. }
  169. void
  170. AuthSrv::setConfigSession(ModuleCCSession* config_session) {
  171. impl_->config_session_ = config_session;
  172. }
  173. ModuleCCSession*
  174. AuthSrv::configSession() const {
  175. return (impl_->config_session_);
  176. }
  177. bool
  178. AuthSrv::processMessage(const IOMessage& io_message, Message& message,
  179. MessageRenderer& response_renderer)
  180. {
  181. InputBuffer request_buffer(io_message.getData(), io_message.getDataSize());
  182. // First, check the header part. If we fail even for the base header,
  183. // just drop the message.
  184. try {
  185. message.parseHeader(request_buffer);
  186. // Ignore all responses.
  187. if (message.getHeaderFlag(MessageFlag::QR())) {
  188. if (impl_->verbose_mode_) {
  189. cerr << "[b10-auth] received unexpected response, ignoring"
  190. << endl;
  191. }
  192. return (false);
  193. }
  194. } catch (const Exception& ex) {
  195. return (false);
  196. }
  197. // Parse the message. On failure, return an appropriate error.
  198. try {
  199. message.fromWire(request_buffer);
  200. } catch (const DNSProtocolError& error) {
  201. if (impl_->verbose_mode_) {
  202. cerr << "[b10-auth] returning " << error.getRcode().toText()
  203. << ": " << error.what() << endl;
  204. }
  205. makeErrorMessage(message, response_renderer, error.getRcode(),
  206. impl_->verbose_mode_);
  207. return (true);
  208. } catch (const Exception& ex) {
  209. if (impl_->verbose_mode_) {
  210. cerr << "[b10-auth] returning SERVFAIL: " << ex.what() << endl;
  211. }
  212. makeErrorMessage(message, response_renderer, Rcode::SERVFAIL(),
  213. impl_->verbose_mode_);
  214. return (true);
  215. } // other exceptions will be handled at a higher layer.
  216. if (impl_->verbose_mode_) {
  217. cerr << "[b10-auth] received a message:\n" << message.toText() << endl;
  218. }
  219. // Perform further protocol-level validation.
  220. if (message.getOpcode() == Opcode::NOTIFY()) {
  221. return (impl_->processNotify(io_message, message, response_renderer));
  222. } else if (message.getOpcode() != Opcode::QUERY()) {
  223. if (impl_->verbose_mode_) {
  224. cerr << "[b10-auth] unsupported opcode" << endl;
  225. }
  226. makeErrorMessage(message, response_renderer, Rcode::NOTIMP(),
  227. impl_->verbose_mode_);
  228. return (true);
  229. }
  230. if (message.getRRCount(Section::QUESTION()) != 1) {
  231. makeErrorMessage(message, response_renderer, Rcode::FORMERR(),
  232. impl_->verbose_mode_);
  233. return (true);
  234. }
  235. ConstQuestionPtr question = *message.beginQuestion();
  236. const RRType &qtype = question->getType();
  237. if (qtype == RRType::AXFR()) {
  238. return (impl_->processAxfrQuery(io_message, message,
  239. response_renderer));
  240. } else if (qtype == RRType::IXFR()) {
  241. makeErrorMessage(message, response_renderer, Rcode::NOTIMP(),
  242. impl_->verbose_mode_);
  243. return (true);
  244. } else {
  245. return (impl_->processNormalQuery(io_message, message,
  246. response_renderer));
  247. }
  248. }
  249. bool
  250. AuthSrvImpl::processNormalQuery(const IOMessage& io_message, Message& message,
  251. MessageRenderer& response_renderer)
  252. {
  253. const bool dnssec_ok = message.isDNSSECSupported();
  254. const uint16_t remote_bufsize = message.getUDPSize();
  255. message.makeResponse();
  256. message.setHeaderFlag(MessageFlag::AA());
  257. message.setRcode(Rcode::NOERROR());
  258. message.setDNSSECSupported(dnssec_ok);
  259. message.setUDPSize(AuthSrvImpl::DEFAULT_LOCAL_UDPSIZE);
  260. try {
  261. Query query(message, cache_, dnssec_ok);
  262. data_sources_.doQuery(query);
  263. } catch (const Exception& ex) {
  264. if (verbose_mode_) {
  265. cerr << "[b10-auth] Internal error, returning SERVFAIL: " <<
  266. ex.what() << endl;
  267. }
  268. makeErrorMessage(message, response_renderer, Rcode::SERVFAIL(),
  269. verbose_mode_);
  270. return (true);
  271. }
  272. const bool udp_buffer =
  273. (io_message.getSocket().getProtocol() == IPPROTO_UDP);
  274. response_renderer.setLengthLimit(udp_buffer ? remote_bufsize : 65535);
  275. message.toWire(response_renderer);
  276. if (verbose_mode_) {
  277. cerr << "[b10-auth] sending a response (" <<
  278. boost::lexical_cast<string>(response_renderer.getLength())
  279. << " bytes):\n" << message.toText() << endl;
  280. }
  281. return (true);
  282. }
  283. bool
  284. AuthSrvImpl::processAxfrQuery(const IOMessage& io_message, Message& message,
  285. MessageRenderer& response_renderer)
  286. {
  287. if (io_message.getSocket().getProtocol() == IPPROTO_UDP) {
  288. if (verbose_mode_) {
  289. cerr << "[b10-auth] AXFR query over UDP isn't allowed" << endl;
  290. }
  291. makeErrorMessage(message, response_renderer, Rcode::FORMERR(),
  292. verbose_mode_);
  293. return (true);
  294. }
  295. try {
  296. if (!xfrout_connected_) {
  297. xfrout_client_.connect();
  298. xfrout_connected_ = true;
  299. }
  300. xfrout_client_.sendXfroutRequestInfo(
  301. io_message.getSocket().getNative(),
  302. io_message.getData(),
  303. io_message.getDataSize());
  304. } catch (const XfroutError& err) {
  305. if (xfrout_connected_) {
  306. // disconnect() may trigger an exception, but since we try it
  307. // only if we've successfully opened it, it shouldn't happen in
  308. // normal condition. Should this occur, we'll propagate it to the
  309. // upper layer.
  310. xfrout_client_.disconnect();
  311. xfrout_connected_ = false;
  312. }
  313. if (verbose_mode_) {
  314. cerr << "[b10-auth] Error in handling XFR request: " << err.what()
  315. << endl;
  316. }
  317. makeErrorMessage(message, response_renderer, Rcode::SERVFAIL(),
  318. verbose_mode_);
  319. return (true);
  320. }
  321. return (false);
  322. }
  323. bool
  324. AuthSrvImpl::processNotify(const IOMessage& io_message, Message& message,
  325. MessageRenderer& response_renderer)
  326. {
  327. // The incoming notify must contain exactly one question for SOA of the
  328. // zone name.
  329. if (message.getRRCount(Section::QUESTION()) != 1) {
  330. if (verbose_mode_) {
  331. cerr << "[b10-auth] invalid number of questions in notify: "
  332. << message.getRRCount(Section::QUESTION()) << endl;
  333. }
  334. makeErrorMessage(message, response_renderer, Rcode::FORMERR(),
  335. verbose_mode_);
  336. return (true);
  337. }
  338. ConstQuestionPtr question = *message.beginQuestion();
  339. if (question->getType() != RRType::SOA()) {
  340. if (verbose_mode_) {
  341. cerr << "[b10-auth] invalid question RR type in notify: "
  342. << question->getType() << endl;
  343. }
  344. makeErrorMessage(message, response_renderer, Rcode::FORMERR(),
  345. verbose_mode_);
  346. return (true);
  347. }
  348. // According to RFC 1996, rcode should be "no error" and AA bit should be
  349. // on, but we don't check these conditions. This behavior is compatible
  350. // with BIND 9.
  351. // TODO check with the conf-mgr whether current server is the auth of the
  352. // zone
  353. // In the code that follows, we simply ignore the notify if any internal
  354. // error happens rather than returning (e.g.) SERVFAIL. RFC 1996 is
  355. // silent about such cases, but there doesn't seem to be anything we can
  356. // improve at the primary server side by sending an error anyway.
  357. if (xfrin_session_ == NULL) {
  358. if (verbose_mode_) {
  359. cerr << "[b10-auth] "
  360. "session interface for xfrin is not available" << endl;
  361. }
  362. return (false);
  363. }
  364. const string remote_ip_address =
  365. io_message.getRemoteEndpoint().getAddress().toText();
  366. static const string command_template_start =
  367. "{\"command\": [\"notify\", {\"zone_name\" : \"";
  368. static const string command_template_master = "\", \"master\" : \"";
  369. static const string command_template_rrclass = "\", \"rrclass\" : \"";
  370. static const string command_template_end = "\"}]}";
  371. try {
  372. ElementPtr notify_command = Element::fromJSON(
  373. command_template_start + question->getName().toText() +
  374. command_template_master + remote_ip_address +
  375. command_template_rrclass + question->getClass().toText() +
  376. command_template_end);
  377. const unsigned int seq =
  378. xfrin_session_->group_sendmsg(notify_command, "Xfrin",
  379. "*", "*");
  380. ElementPtr env, answer, parsed_answer;
  381. xfrin_session_->group_recvmsg(env, answer, false, seq);
  382. int rcode;
  383. parsed_answer = parseAnswer(rcode, answer);
  384. if (rcode != 0) {
  385. if (verbose_mode_) {
  386. cerr << "[b10-auth] failed to notify Xfrin: "
  387. << parsed_answer->str() << endl;
  388. }
  389. return (false);
  390. }
  391. } catch (const Exception& ex) {
  392. if (verbose_mode_) {
  393. cerr << "[b10-auth] failed to notify Xfrin: " << ex.what() << endl;
  394. }
  395. return (false);
  396. }
  397. message.makeResponse();
  398. message.setHeaderFlag(MessageFlag::AA());
  399. message.setRcode(Rcode::NOERROR());
  400. message.toWire(response_renderer);
  401. return (true);
  402. }
  403. ElementPtr
  404. AuthSrvImpl::setDbFile(const isc::data::ElementPtr config) {
  405. ElementPtr answer = isc::config::createAnswer();
  406. ElementPtr final;
  407. if (config && config->contains("database_file")) {
  408. db_file_ = config->get("database_file")->stringValue();
  409. final = config;
  410. } else if (config_session_ != NULL) {
  411. bool is_default;
  412. string item("database_file");
  413. ElementPtr value = config_session_->getValue(is_default, item);
  414. final = Element::createMap();
  415. // If the value is the default, and we are running from
  416. // a specific directory ('from build'), we need to use
  417. // a different value than the default (which may not exist)
  418. // (btw, this should not be done here in the end, i think
  419. // the from-source script should have a check for this,
  420. // but for that we need offline access to config, so for
  421. // now this is a decent solution)
  422. if (is_default && getenv("B10_FROM_BUILD")) {
  423. value = Element::create(string(getenv("B10_FROM_BUILD")) +
  424. "/bind10_zones.sqlite3");
  425. }
  426. final->set(item, value);
  427. db_file_ = value->stringValue();
  428. } else {
  429. return (answer);
  430. }
  431. if (verbose_mode_) {
  432. cerr << "[b10-auth] Data source database file: " << db_file_ << endl;
  433. }
  434. // create SQL data source
  435. // Note: the following step is tricky to be exception-safe and to ensure
  436. // exception guarantee: We first need to perform all operations that can
  437. // fail, while acquiring resources in the RAII manner. We then perform
  438. // delete and swap operations which should not fail.
  439. DataSrcPtr datasrc_ptr(DataSrcPtr(new Sqlite3DataSrc));
  440. datasrc_ptr->init(final);
  441. data_sources_.addDataSrc(datasrc_ptr);
  442. // The following code should be exception free.
  443. if (cur_datasrc_ != NULL) {
  444. data_sources_.removeDataSrc(cur_datasrc_);
  445. }
  446. cur_datasrc_ = datasrc_ptr;
  447. return (answer);
  448. }
  449. ElementPtr
  450. AuthSrv::updateConfig(isc::data::ElementPtr new_config) {
  451. try {
  452. // the ModuleCCSession has already checked if we have
  453. // the correct ElementPtr type as specified in our .spec file
  454. ElementPtr answer = isc::config::createAnswer();
  455. answer = impl_->setDbFile(new_config);
  456. return answer;
  457. } catch (const isc::Exception& error) {
  458. if (impl_->verbose_mode_) {
  459. cerr << "[b10-auth] error: " << error.what() << endl;
  460. }
  461. return isc::config::createAnswer(1, error.what());
  462. }
  463. }