auth_srv.cc 17 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518
  1. // Copyright (C) 2009 Internet Systems Consortium, Inc. ("ISC")
  2. //
  3. // Permission to use, copy, modify, and/or distribute this software for any
  4. // purpose with or without fee is hereby granted, provided that the above
  5. // copyright notice and this permission notice appear in all copies.
  6. //
  7. // THE SOFTWARE IS PROVIDED "AS IS" AND ISC DISCLAIMS ALL WARRANTIES WITH
  8. // REGARD TO THIS SOFTWARE INCLUDING ALL IMPLIED WARRANTIES OF MERCHANTABILITY
  9. // AND FITNESS. IN NO EVENT SHALL ISC BE LIABLE FOR ANY SPECIAL, DIRECT,
  10. // INDIRECT, OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES WHATSOEVER RESULTING FROM
  11. // LOSS OF USE, DATA OR PROFITS, WHETHER IN AN ACTION OF CONTRACT, NEGLIGENCE
  12. // OR OTHER TORTIOUS ACTION, ARISING OUT OF OR IN CONNECTION WITH THE USE OR
  13. // PERFORMANCE OF THIS SOFTWARE.
  14. // $Id$
  15. #include <config.h> // for UNUSED_PARAM
  16. #include <netinet/in.h>
  17. #include <algorithm>
  18. #include <cassert>
  19. #include <iostream>
  20. #include <vector>
  21. #include <exceptions/exceptions.h>
  22. #include <dns/buffer.h>
  23. #include <dns/exceptions.h>
  24. #include <dns/messagerenderer.h>
  25. #include <dns/name.h>
  26. #include <dns/question.h>
  27. #include <dns/rrset.h>
  28. #include <dns/rrttl.h>
  29. #include <dns/message.h>
  30. #include <config/ccsession.h>
  31. #include <cc/data.h>
  32. #include <exceptions/exceptions.h>
  33. #include <datasrc/query.h>
  34. #include <datasrc/data_source.h>
  35. #include <datasrc/static_datasrc.h>
  36. #include <datasrc/sqlite3_datasrc.h>
  37. #include <cc/data.h>
  38. #include <xfr/xfrout_client.h>
  39. #include <auth/common.h>
  40. #include <auth/auth_srv.h>
  41. #include <auth/asio_link.h>
  42. #include <boost/lexical_cast.hpp>
  43. using namespace std;
  44. using namespace isc;
  45. using namespace isc::cc;
  46. using namespace isc::datasrc;
  47. using namespace isc::dns;
  48. using namespace isc::dns::rdata;
  49. using namespace isc::data;
  50. using namespace isc::config;
  51. using namespace isc::xfr;
  52. using namespace asio_link;
  53. class AuthSrvImpl {
  54. private:
  55. // prohibit copy
  56. AuthSrvImpl(const AuthSrvImpl& source);
  57. AuthSrvImpl& operator=(const AuthSrvImpl& source);
  58. public:
  59. AuthSrvImpl(AbstractSession& session_with_xfrin,
  60. AbstractXfroutClient& xfrout_client);
  61. ~AuthSrvImpl();
  62. isc::data::ElementPtr setDbFile(const isc::data::ElementPtr config);
  63. bool processNormalQuery(const IOMessage& io_message, Message& message,
  64. MessageRenderer& response_renderer);
  65. bool processAxfrQuery(const IOMessage& io_message, Message& message,
  66. MessageRenderer& response_renderer);
  67. bool processNotify(const IOMessage& io_message, Message& message,
  68. MessageRenderer& response_renderer);
  69. std::string db_file_;
  70. ModuleCCSession* cs_;
  71. MetaDataSrc data_sources_;
  72. /// We keep a pointer to the currently running sqlite datasource
  73. /// so that we can specifically remove that one should the database
  74. /// file change
  75. ConstDataSrcPtr cur_datasrc_;
  76. bool verbose_mode_;
  77. bool is_notify_session_established_;
  78. AbstractSession& session_with_xfrin_;
  79. bool is_axfr_connection_established_;
  80. AbstractXfroutClient& xfrout_client_;
  81. /// Currently non-configurable, but will be.
  82. static const uint16_t DEFAULT_LOCAL_UDPSIZE = 4096;
  83. };
  84. AuthSrvImpl::AuthSrvImpl(AbstractSession& session_with_xfrin,
  85. AbstractXfroutClient& xfrout_client) :
  86. cs_(NULL), verbose_mode_(false),
  87. is_notify_session_established_(false),
  88. session_with_xfrin_(session_with_xfrin),
  89. is_axfr_connection_established_(false),
  90. xfrout_client_(xfrout_client)
  91. {
  92. // cur_datasrc_ is automatically initialized by the default constructor,
  93. // effectively being an empty (sqlite) data source. once ccsession is up
  94. // the datasource will be set by the configuration setting
  95. // add static data source
  96. data_sources_.addDataSrc(ConstDataSrcPtr(new StaticDataSrc));
  97. }
  98. AuthSrvImpl::~AuthSrvImpl() {
  99. if (is_notify_session_established_) {
  100. session_with_xfrin_.disconnect();
  101. is_notify_session_established_ = false;
  102. }
  103. if (is_axfr_connection_established_) {
  104. xfrout_client_.disconnect();
  105. is_axfr_connection_established_ = false;
  106. }
  107. }
  108. AuthSrv::AuthSrv(AbstractSession& session_with_xfrin,
  109. AbstractXfroutClient& xfrout_client) :
  110. impl_(new AuthSrvImpl(session_with_xfrin, xfrout_client))
  111. {}
  112. AuthSrv::~AuthSrv() {
  113. delete impl_;
  114. }
  115. namespace {
  116. class QuestionInserter {
  117. public:
  118. QuestionInserter(Message* message) : message_(message) {}
  119. void operator()(const QuestionPtr question) {
  120. message_->addQuestion(question);
  121. }
  122. Message* message_;
  123. };
  124. void
  125. makeErrorMessage(Message& message, MessageRenderer& renderer,
  126. const Rcode& rcode, const bool verbose_mode)
  127. {
  128. // extract the parameters that should be kept.
  129. // XXX: with the current implementation, it's not easy to set EDNS0
  130. // depending on whether the query had it. So we'll simply omit it.
  131. const qid_t qid = message.getQid();
  132. const bool rd = message.getHeaderFlag(MessageFlag::RD());
  133. const bool cd = message.getHeaderFlag(MessageFlag::CD());
  134. const Opcode& opcode = message.getOpcode();
  135. vector<QuestionPtr> questions;
  136. // If this is an error to a query or notify, we should also copy the
  137. // question section.
  138. if (opcode == Opcode::QUERY() || opcode == Opcode::NOTIFY()) {
  139. questions.assign(message.beginQuestion(), message.endQuestion());
  140. }
  141. message.clear(Message::RENDER);
  142. message.setQid(qid);
  143. message.setOpcode(opcode);
  144. message.setHeaderFlag(MessageFlag::QR());
  145. message.setUDPSize(AuthSrvImpl::DEFAULT_LOCAL_UDPSIZE);
  146. if (rd) {
  147. message.setHeaderFlag(MessageFlag::RD());
  148. }
  149. if (cd) {
  150. message.setHeaderFlag(MessageFlag::CD());
  151. }
  152. for_each(questions.begin(), questions.end(), QuestionInserter(&message));
  153. message.setRcode(rcode);
  154. message.toWire(renderer);
  155. if (verbose_mode) {
  156. cerr << "[b10-auth] sending an error response (" <<
  157. boost::lexical_cast<string>(renderer.getLength())
  158. << " bytes):\n" << message.toText() << endl;
  159. }
  160. }
  161. }
  162. void
  163. AuthSrv::setVerbose(const bool on) {
  164. impl_->verbose_mode_ = on;
  165. }
  166. bool
  167. AuthSrv::getVerbose() const {
  168. return (impl_->verbose_mode_);
  169. }
  170. void
  171. AuthSrv::setConfigSession(ModuleCCSession* cs) {
  172. impl_->cs_ = cs;
  173. }
  174. ModuleCCSession*
  175. AuthSrv::configSession() const {
  176. return (impl_->cs_);
  177. }
  178. bool
  179. AuthSrv::processMessage(const IOMessage& io_message, Message& message,
  180. MessageRenderer& response_renderer)
  181. {
  182. InputBuffer request_buffer(io_message.getData(), io_message.getDataSize());
  183. // First, check the header part. If we fail even for the base header,
  184. // just drop the message.
  185. try {
  186. message.parseHeader(request_buffer);
  187. // Ignore all responses.
  188. if (message.getHeaderFlag(MessageFlag::QR())) {
  189. if (impl_->verbose_mode_) {
  190. cerr << "[b10-auth] received unexpected response, ignoring"
  191. << endl;
  192. }
  193. return (false);
  194. }
  195. } catch (const Exception& ex) {
  196. return (false);
  197. }
  198. // Parse the message. On failure, return an appropriate error.
  199. try {
  200. message.fromWire(request_buffer);
  201. } catch (const DNSProtocolError& error) {
  202. if (impl_->verbose_mode_) {
  203. cerr << "[b10-auth] returning " << error.getRcode().toText()
  204. << ": " << error.what() << endl;
  205. }
  206. makeErrorMessage(message, response_renderer, error.getRcode(),
  207. impl_->verbose_mode_);
  208. return (true);
  209. } catch (const Exception& ex) {
  210. if (impl_->verbose_mode_) {
  211. cerr << "[b10-auth] returning SERVFAIL: " << ex.what() << endl;
  212. }
  213. makeErrorMessage(message, response_renderer, Rcode::SERVFAIL(),
  214. impl_->verbose_mode_);
  215. return (true);
  216. } // other exceptions will be handled at a higher layer.
  217. if (impl_->verbose_mode_) {
  218. cerr << "[b10-auth] received a message:\n" << message.toText() << endl;
  219. }
  220. // Perform further protocol-level validation.
  221. if (message.getOpcode() == Opcode::NOTIFY()) {
  222. return (impl_->processNotify(io_message, message, response_renderer));
  223. } else if (message.getOpcode() != Opcode::QUERY()) {
  224. if (impl_->verbose_mode_) {
  225. cerr << "[b10-auth] unsupported opcode" << endl;
  226. }
  227. makeErrorMessage(message, response_renderer, Rcode::NOTIMP(),
  228. impl_->verbose_mode_);
  229. return (true);
  230. }
  231. if (message.getRRCount(Section::QUESTION()) != 1) {
  232. makeErrorMessage(message, response_renderer, Rcode::FORMERR(),
  233. impl_->verbose_mode_);
  234. return (true);
  235. }
  236. ConstQuestionPtr question = *message.beginQuestion();
  237. const RRType &qtype = question->getType();
  238. if (qtype == RRType::AXFR()) {
  239. return (impl_->processAxfrQuery(io_message, message,
  240. response_renderer));
  241. } else if (qtype == RRType::IXFR()) {
  242. makeErrorMessage(message, response_renderer, Rcode::NOTIMP(),
  243. impl_->verbose_mode_);
  244. return (true);
  245. } else {
  246. return (impl_->processNormalQuery(io_message, message,
  247. response_renderer));
  248. }
  249. }
  250. bool
  251. AuthSrvImpl::processNormalQuery(const IOMessage& io_message, Message& message,
  252. MessageRenderer& response_renderer)
  253. {
  254. const bool dnssec_ok = message.isDNSSECSupported();
  255. const uint16_t remote_bufsize = message.getUDPSize();
  256. message.makeResponse();
  257. message.setHeaderFlag(MessageFlag::AA());
  258. message.setRcode(Rcode::NOERROR());
  259. message.setDNSSECSupported(dnssec_ok);
  260. message.setUDPSize(AuthSrvImpl::DEFAULT_LOCAL_UDPSIZE);
  261. try {
  262. Query query(message, dnssec_ok);
  263. data_sources_.doQuery(query);
  264. } catch (const Exception& ex) {
  265. if (verbose_mode_) {
  266. cerr << "[b10-auth] Internal error, returning SERVFAIL: " <<
  267. ex.what() << endl;
  268. }
  269. makeErrorMessage(message, response_renderer, Rcode::SERVFAIL(),
  270. verbose_mode_);
  271. return (true);
  272. }
  273. const bool udp_buffer =
  274. (io_message.getSocket().getProtocol() == IPPROTO_UDP);
  275. response_renderer.setLengthLimit(udp_buffer ? remote_bufsize : 65535);
  276. message.toWire(response_renderer);
  277. if (verbose_mode_) {
  278. cerr << "[b10-auth] sending a response (" <<
  279. boost::lexical_cast<string>(response_renderer.getLength())
  280. << " bytes):\n" << message.toText() << endl;
  281. }
  282. return (true);
  283. }
  284. bool
  285. AuthSrvImpl::processAxfrQuery(const IOMessage& io_message, Message& message,
  286. MessageRenderer& response_renderer)
  287. {
  288. if (io_message.getSocket().getProtocol() == IPPROTO_UDP) {
  289. if (verbose_mode_) {
  290. cerr << "[b10-auth] AXFR query over UDP isn't allowed" << endl;
  291. }
  292. makeErrorMessage(message, response_renderer, Rcode::FORMERR(),
  293. verbose_mode_);
  294. return (true);
  295. }
  296. try {
  297. if (!is_axfr_connection_established_) {
  298. xfrout_client_.connect();
  299. is_axfr_connection_established_ = true;
  300. }
  301. xfrout_client_.sendXfroutRequestInfo(
  302. io_message.getSocket().getNative(),
  303. io_message.getData(),
  304. io_message.getDataSize());
  305. } catch (const XfroutError& err) {
  306. if (is_axfr_connection_established_) {
  307. // discoonect() may trigger an exception, but since we try it
  308. // only if we've successfully opened it, it shouldn't happen in
  309. // normal condition. Should this occur, we'll propagate it to the
  310. // upper layer.
  311. xfrout_client_.disconnect();
  312. is_axfr_connection_established_ = false;
  313. }
  314. if (verbose_mode_) {
  315. cerr << "[b10-auth] Error in handling XFR request: " << err.what()
  316. << endl;
  317. }
  318. makeErrorMessage(message, response_renderer, Rcode::SERVFAIL(),
  319. verbose_mode_);
  320. return (true);
  321. }
  322. return (false);
  323. }
  324. bool
  325. AuthSrvImpl::processNotify(const IOMessage& io_message, Message& message,
  326. MessageRenderer& response_renderer)
  327. {
  328. // The incoming notify must contain exactly one question for SOA of the
  329. // zone name.
  330. if (message.getRRCount(Section::QUESTION()) != 1) {
  331. if (verbose_mode_) {
  332. cerr << "[b10-auth] invalid number of questions in notify: "
  333. << message.getRRCount(Section::QUESTION()) << endl;
  334. }
  335. makeErrorMessage(message, response_renderer, Rcode::FORMERR(),
  336. verbose_mode_);
  337. return (true);
  338. }
  339. ConstQuestionPtr question = *message.beginQuestion();
  340. if (question->getType() != RRType::SOA()) {
  341. if (verbose_mode_) {
  342. cerr << "[b10-auth] invalid question RR type in notify: "
  343. << question->getType() << endl;
  344. }
  345. makeErrorMessage(message, response_renderer, Rcode::FORMERR(),
  346. verbose_mode_);
  347. return (true);
  348. }
  349. // According to RFC 1996, rcode should be "no error" and AA bit should be
  350. // on, but we don't check these conditions. This behavior is compatible
  351. // with BIND 9.
  352. // TODO check with the conf-mgr whether current server is the auth of the
  353. // zone
  354. if (!is_notify_session_established_) {
  355. try {
  356. session_with_xfrin_.establish(NULL);
  357. is_notify_session_established_ = true;
  358. } catch (const isc::cc::SessionError& err) {
  359. if (verbose_mode_) {
  360. cerr << "[b10-auth] Error in connection with xfrin module: "
  361. << err.what() << endl;
  362. }
  363. return (false);
  364. }
  365. }
  366. const string remote_ip_address =
  367. io_message.getRemoteEndpoint().getAddress().toText();
  368. static const string command_template_start =
  369. "{\"command\": [\"notify\", {\"zone_name\" : \"";
  370. static const string command_template_mid = "\", \"master_ip\" : \"";
  371. static const string command_template_end = "\"}]}";
  372. try {
  373. ElementPtr notify_command = Element::createFromString(
  374. command_template_start + question->getName().toText() +
  375. command_template_mid + remote_ip_address +
  376. command_template_end);
  377. const unsigned int seq =
  378. session_with_xfrin_.group_sendmsg(notify_command, "Xfrin",
  379. "*", "*");
  380. ElementPtr env, answer, parsed_answer;
  381. session_with_xfrin_.group_recvmsg(env, answer, false, seq);
  382. int rcode;
  383. parsed_answer = parseAnswer(rcode, answer);
  384. if (rcode != 0) {
  385. if (verbose_mode_) {
  386. cerr << "[b10-auth] failed to notify Xfrin: "
  387. << parsed_answer->str() << endl;
  388. }
  389. return (false);
  390. }
  391. } catch (const Exception& ex) {
  392. if (verbose_mode_) {
  393. cerr << "[b10-auth] failed to notify Xfrin: " << ex.what() << endl;
  394. }
  395. return (false);
  396. }
  397. message.makeResponse();
  398. message.setHeaderFlag(MessageFlag::AA());
  399. message.setRcode(Rcode::NOERROR());
  400. message.toWire(response_renderer);
  401. return (true);
  402. }
  403. ElementPtr
  404. AuthSrvImpl::setDbFile(const isc::data::ElementPtr config) {
  405. ElementPtr answer = isc::config::createAnswer();
  406. ElementPtr final;
  407. if (config && config->contains("database_file")) {
  408. db_file_ = config->get("database_file")->stringValue();
  409. final = config;
  410. } else if (cs_ != NULL) {
  411. bool is_default;
  412. string item("database_file");
  413. ElementPtr value = cs_->getValue(is_default, item);
  414. db_file_ = value->stringValue();
  415. final = Element::createFromString("{}");
  416. final->set(item, value);
  417. } else {
  418. return (answer);
  419. }
  420. if (verbose_mode_) {
  421. cerr << "[b10-auth] Data source database file: " << db_file_ << endl;
  422. }
  423. // create SQL data source
  424. // Note: the following step is tricky to be exception-safe and to ensure
  425. // exception guarantee: We first need to perform all operations that can
  426. // fail, while acquiring resources in the RAII manner. We then perform
  427. // delete and swap operations which should not fail.
  428. DataSrcPtr datasrc_ptr(DataSrcPtr(new Sqlite3DataSrc));
  429. datasrc_ptr->init(final);
  430. data_sources_.addDataSrc(datasrc_ptr);
  431. // The following code should be exception free.
  432. if (cur_datasrc_ != NULL) {
  433. data_sources_.removeDataSrc(cur_datasrc_);
  434. }
  435. cur_datasrc_ = datasrc_ptr;
  436. return (answer);
  437. }
  438. ElementPtr
  439. AuthSrv::updateConfig(isc::data::ElementPtr new_config) {
  440. try {
  441. // the ModuleCCSession has already checked if we have
  442. // the correct ElementPtr type as specified in our .spec file
  443. ElementPtr answer = isc::config::createAnswer();
  444. answer = impl_->setDbFile(new_config);
  445. return answer;
  446. } catch (const isc::Exception& error) {
  447. if (impl_->verbose_mode_) {
  448. cerr << "[b10-auth] error: " << error.what() << endl;
  449. }
  450. return isc::config::createAnswer(1, error.what());
  451. }
  452. }