xref: /freebsd/contrib/unbound/iterator/iter_delegpt.c (revision 8f76bb7dad48538c6832c2fb466a433d2a3f8cd5)
1 /*
2  * iterator/iter_delegpt.c - delegation point with NS and address information.
3  *
4  * Copyright (c) 2007, NLnet Labs. All rights reserved.
5  *
6  * This software is open source.
7  *
8  * Redistribution and use in source and binary forms, with or without
9  * modification, are permitted provided that the following conditions
10  * are met:
11  *
12  * Redistributions of source code must retain the above copyright notice,
13  * this list of conditions and the following disclaimer.
14  *
15  * Redistributions in binary form must reproduce the above copyright notice,
16  * this list of conditions and the following disclaimer in the documentation
17  * and/or other materials provided with the distribution.
18  *
19  * Neither the name of the NLNET LABS nor the names of its contributors may
20  * be used to endorse or promote products derived from this software without
21  * specific prior written permission.
22  *
23  * THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS
24  * "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT
25  * LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR
26  * A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT
27  * HOLDER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL,
28  * SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED
29  * TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR
30  * PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF
31  * LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING
32  * NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS
33  * SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
34  */
35 
36 /**
37  * \file
38  *
39  * This file implements the Delegation Point. It contains a list of name servers
40  * and their addresses if known.
41  */
42 #include "config.h"
43 #include "iterator/iter_delegpt.h"
44 #include "services/cache/dns.h"
45 #include "util/regional.h"
46 #include "util/data/dname.h"
47 #include "util/data/packed_rrset.h"
48 #include "util/data/msgreply.h"
49 #include "util/net_help.h"
50 #include "sldns/rrdef.h"
51 #include "sldns/sbuffer.h"
52 
53 struct delegpt*
delegpt_create(struct regional * region)54 delegpt_create(struct regional* region)
55 {
56 	struct delegpt* dp=(struct delegpt*)regional_alloc(
57 		region, sizeof(*dp));
58 	if(!dp)
59 		return NULL;
60 	memset(dp, 0, sizeof(*dp));
61 	return dp;
62 }
63 
delegpt_copy(struct delegpt * dp,struct regional * region)64 struct delegpt* delegpt_copy(struct delegpt* dp, struct regional* region)
65 {
66 	struct delegpt* copy = delegpt_create(region);
67 	struct delegpt_ns* ns;
68 	struct delegpt_addr* a;
69 	if(!copy)
70 		return NULL;
71 	if(!delegpt_set_name(copy, region, dp->name))
72 		return NULL;
73 	copy->bogus = dp->bogus;
74 	copy->has_parent_side_NS = dp->has_parent_side_NS;
75 	copy->ssl_upstream = dp->ssl_upstream;
76 	copy->tcp_upstream = dp->tcp_upstream;
77 	for(ns = dp->nslist; ns; ns = ns->next) {
78 		if(!delegpt_add_ns(copy, region, ns->name, ns->lame,
79 			ns->tls_auth_name, ns->port))
80 			return NULL;
81 		copy->nslist->cache_lookup_count = ns->cache_lookup_count;
82 		copy->nslist->resolved = ns->resolved;
83 		copy->nslist->got4 = ns->got4;
84 		copy->nslist->got6 = ns->got6;
85 		copy->nslist->done_pside4 = ns->done_pside4;
86 		copy->nslist->done_pside6 = ns->done_pside6;
87 	}
88 	for(a = dp->target_list; a; a = a->next_target) {
89 		if(!delegpt_add_addr(copy, region, &a->addr, a->addrlen,
90 			a->bogus, a->lame, a->tls_auth_name, -1, NULL))
91 			return NULL;
92 	}
93 	return copy;
94 }
95 
96 int
delegpt_set_name(struct delegpt * dp,struct regional * region,uint8_t * name)97 delegpt_set_name(struct delegpt* dp, struct regional* region, uint8_t* name)
98 {
99 	log_assert(!dp->dp_type_mlc);
100 	dp->namelabs = dname_count_size_labels(name, &dp->namelen);
101 	dp->name = regional_alloc_init(region, name, dp->namelen);
102 	return dp->name != 0;
103 }
104 
105 int
delegpt_add_ns(struct delegpt * dp,struct regional * region,uint8_t * name,uint8_t lame,char * tls_auth_name,int port)106 delegpt_add_ns(struct delegpt* dp, struct regional* region, uint8_t* name,
107 	uint8_t lame, char* tls_auth_name, int port)
108 {
109 	struct delegpt_ns* ns;
110 	size_t len;
111 	(void)dname_count_size_labels(name, &len);
112 	log_assert(!dp->dp_type_mlc);
113 	/* slow check for duplicates to avoid counting failures when
114 	 * adding the same server as a dependency twice */
115 	if(delegpt_find_ns(dp, name, len))
116 		return 1;
117 	ns = (struct delegpt_ns*)regional_alloc(region,
118 		sizeof(struct delegpt_ns));
119 	if(!ns)
120 		return 0;
121 	ns->next = dp->nslist;
122 	ns->namelen = len;
123 	dp->nslist = ns;
124 	ns->name = regional_alloc_init(region, name, ns->namelen);
125 	ns->cache_lookup_count = 0;
126 	ns->resolved = 0;
127 	ns->got4 = 0;
128 	ns->got6 = 0;
129 	ns->lame = lame;
130 	ns->done_pside4 = 0;
131 	ns->done_pside6 = 0;
132 	ns->port = port;
133 	if(tls_auth_name) {
134 		ns->tls_auth_name = regional_strdup(region, tls_auth_name);
135 		if(!ns->tls_auth_name)
136 			return 0;
137 	} else {
138 		ns->tls_auth_name = NULL;
139 	}
140 	return ns->name != 0;
141 }
142 
143 struct delegpt_ns*
delegpt_find_ns(struct delegpt * dp,uint8_t * name,size_t namelen)144 delegpt_find_ns(struct delegpt* dp, uint8_t* name, size_t namelen)
145 {
146 	struct delegpt_ns* p = dp->nslist;
147 	while(p) {
148 		if(namelen == p->namelen &&
149 			query_dname_compare(name, p->name) == 0) {
150 			return p;
151 		}
152 		p = p->next;
153 	}
154 	return NULL;
155 }
156 
157 struct delegpt_addr*
delegpt_find_addr(struct delegpt * dp,struct sockaddr_storage * addr,socklen_t addrlen)158 delegpt_find_addr(struct delegpt* dp, struct sockaddr_storage* addr,
159 	socklen_t addrlen)
160 {
161 	struct delegpt_addr* p = dp->target_list;
162 	while(p) {
163 		if(sockaddr_cmp_addr(addr, addrlen, &p->addr, p->addrlen)==0
164 			&& ((struct sockaddr_in*)addr)->sin_port ==
165 			   ((struct sockaddr_in*)&p->addr)->sin_port) {
166 			return p;
167 		}
168 		p = p->next_target;
169 	}
170 	return NULL;
171 }
172 
173 int
delegpt_add_target(struct delegpt * dp,struct regional * region,uint8_t * name,size_t namelen,struct sockaddr_storage * addr,socklen_t addrlen,uint8_t bogus,uint8_t lame,int * additions)174 delegpt_add_target(struct delegpt* dp, struct regional* region,
175 	uint8_t* name, size_t namelen, struct sockaddr_storage* addr,
176 	socklen_t addrlen, uint8_t bogus, uint8_t lame, int* additions)
177 {
178 	struct delegpt_ns* ns = delegpt_find_ns(dp, name, namelen);
179 	log_assert(!dp->dp_type_mlc);
180 	if(!ns) {
181 		/* ignore it */
182 		return 1;
183 	}
184 	if(!lame) {
185 		if(addr_is_ip6(addr, addrlen))
186 			ns->got6 = 1;
187 		else	ns->got4 = 1;
188 		if(ns->got4 && ns->got6)
189 			ns->resolved = 1;
190 	} else {
191 		if(addr_is_ip6(addr, addrlen))
192 			ns->done_pside6 = 1;
193 		else	ns->done_pside4 = 1;
194 	}
195 	log_assert(ns->port>0);
196 	return delegpt_add_addr(dp, region, addr, addrlen, bogus, lame,
197 		ns->tls_auth_name, ns->port, additions);
198 }
199 
200 int
delegpt_add_addr(struct delegpt * dp,struct regional * region,struct sockaddr_storage * addr,socklen_t addrlen,uint8_t bogus,uint8_t lame,char * tls_auth_name,int port,int * additions)201 delegpt_add_addr(struct delegpt* dp, struct regional* region,
202 	struct sockaddr_storage* addr, socklen_t addrlen, uint8_t bogus,
203 	uint8_t lame, char* tls_auth_name, int port, int* additions)
204 {
205 	struct delegpt_addr* a;
206 	log_assert(!dp->dp_type_mlc);
207 	if(port != -1) {
208 		log_assert(port>0);
209 		sockaddr_store_port(addr, addrlen, port);
210 	}
211 	/* check for duplicates */
212 	if((a = delegpt_find_addr(dp, addr, addrlen))) {
213 		if(bogus)
214 			a->bogus = bogus;
215 		if(!lame)
216 			a->lame = 0;
217 		return 1;
218 	}
219 	if(additions)
220 		*additions = 1;
221 
222 	a = (struct delegpt_addr*)regional_alloc(region,
223 		sizeof(struct delegpt_addr));
224 	if(!a)
225 		return 0;
226 	a->next_target = dp->target_list;
227 	dp->target_list = a;
228 	a->next_result = 0;
229 	a->next_usable = dp->usable_list;
230 	dp->usable_list = a;
231 	memcpy(&a->addr, addr, addrlen);
232 	a->addrlen = addrlen;
233 	a->attempts = 0;
234 	a->bogus = bogus;
235 	a->lame = lame;
236 	a->dnsseclame = 0;
237 	if(tls_auth_name) {
238 		a->tls_auth_name = regional_strdup(region, tls_auth_name);
239 		if(!a->tls_auth_name)
240 			return 0;
241 	} else {
242 		a->tls_auth_name = NULL;
243 	}
244 	return 1;
245 }
246 
247 void
delegpt_count_ns(struct delegpt * dp,size_t * numns,size_t * missing)248 delegpt_count_ns(struct delegpt* dp, size_t* numns, size_t* missing)
249 {
250 	struct delegpt_ns* ns;
251 	*numns = 0;
252 	*missing = 0;
253 	for(ns = dp->nslist; ns; ns = ns->next) {
254 		(*numns)++;
255 		if(!ns->resolved)
256 			(*missing)++;
257 	}
258 }
259 
260 void
delegpt_count_addr(struct delegpt * dp,size_t * numaddr,size_t * numres,size_t * numavail)261 delegpt_count_addr(struct delegpt* dp, size_t* numaddr, size_t* numres,
262 	size_t* numavail)
263 {
264 	struct delegpt_addr* a;
265 	*numaddr = 0;
266 	*numres = 0;
267 	*numavail = 0;
268 	for(a = dp->target_list; a; a = a->next_target) {
269 		(*numaddr)++;
270 	}
271 	for(a = dp->result_list; a; a = a->next_result) {
272 		(*numres)++;
273 	}
274 	for(a = dp->usable_list; a; a = a->next_usable) {
275 		(*numavail)++;
276 	}
277 }
278 
delegpt_log(enum verbosity_value v,struct delegpt * dp)279 void delegpt_log(enum verbosity_value v, struct delegpt* dp)
280 {
281 	char buf[LDNS_MAX_DOMAINLEN+1];
282 	struct delegpt_ns* ns;
283 	struct delegpt_addr* a;
284 	size_t missing=0, numns=0, numaddr=0, numres=0, numavail=0;
285 	if(verbosity < v)
286 		return;
287 	dname_str(dp->name, buf);
288 	if(dp->nslist == NULL && dp->target_list == NULL) {
289 		log_info("DelegationPoint<%s>: empty", buf);
290 		return;
291 	}
292 	delegpt_count_ns(dp, &numns, &missing);
293 	delegpt_count_addr(dp, &numaddr, &numres, &numavail);
294 	log_info("DelegationPoint<%s>: %u names (%u missing), "
295 		"%u addrs (%u result, %u avail)%s",
296 		buf, (unsigned)numns, (unsigned)missing,
297 		(unsigned)numaddr, (unsigned)numres, (unsigned)numavail,
298 		(dp->has_parent_side_NS?" parentNS":" cacheNS"));
299 	if(verbosity >= VERB_ALGO) {
300 		for(ns = dp->nslist; ns; ns = ns->next) {
301 			dname_str(ns->name, buf);
302 			log_info("  %s %s%s%s%s%s%s%s", buf,
303 			(ns->resolved?"*":""),
304 			(ns->got4?" A":""), (ns->got6?" AAAA":""),
305 			(dp->bogus?" BOGUS":""), (ns->lame?" PARENTSIDE":""),
306 			(ns->done_pside4?" PSIDE_A":""),
307 			(ns->done_pside6?" PSIDE_AAAA":""));
308 		}
309 		for(a = dp->target_list; a; a = a->next_target) {
310 			char s[128];
311 			const char* str = "  ";
312 			if(a->bogus && a->lame) str = "  BOGUS ADDR_LAME ";
313 			else if(a->bogus) str = "  BOGUS ";
314 			else if(a->lame) str = "  ADDR_LAME ";
315 			if(a->tls_auth_name)
316 				snprintf(s, sizeof(s), "%s[%s]", str,
317 					a->tls_auth_name);
318 			else snprintf(s, sizeof(s), "%s", str);
319 			log_addr(VERB_ALGO, s, &a->addr, a->addrlen);
320 		}
321 	}
322 }
323 
324 int
delegpt_addr_on_result_list(struct delegpt * dp,struct delegpt_addr * find)325 delegpt_addr_on_result_list(struct delegpt* dp, struct delegpt_addr* find)
326 {
327 	struct delegpt_addr* a = dp->result_list;
328 	while(a) {
329 		if(a == find)
330 			return 1;
331 		a = a->next_result;
332 	}
333 	return 0;
334 }
335 
336 void
delegpt_usable_list_remove_addr(struct delegpt * dp,struct delegpt_addr * del)337 delegpt_usable_list_remove_addr(struct delegpt* dp, struct delegpt_addr* del)
338 {
339 	struct delegpt_addr* usa = dp->usable_list, *prev = NULL;
340 	while(usa) {
341 		if(usa == del) {
342 			/* snip off the usable list */
343 			if(prev)
344 				prev->next_usable = usa->next_usable;
345 			else	dp->usable_list = usa->next_usable;
346 			return;
347 		}
348 		prev = usa;
349 		usa = usa->next_usable;
350 	}
351 }
352 
353 void
delegpt_add_to_result_list(struct delegpt * dp,struct delegpt_addr * a)354 delegpt_add_to_result_list(struct delegpt* dp, struct delegpt_addr* a)
355 {
356 	if(delegpt_addr_on_result_list(dp, a))
357 		return;
358 	delegpt_usable_list_remove_addr(dp, a);
359 	a->next_result = dp->result_list;
360 	dp->result_list = a;
361 }
362 
363 void
delegpt_add_unused_targets(struct delegpt * dp)364 delegpt_add_unused_targets(struct delegpt* dp)
365 {
366 	struct delegpt_addr* usa = dp->usable_list;
367 	dp->usable_list = NULL;
368 	while(usa) {
369 		usa->next_result = dp->result_list;
370 		dp->result_list = usa;
371 		usa = usa->next_usable;
372 	}
373 }
374 
375 size_t
delegpt_count_targets(struct delegpt * dp)376 delegpt_count_targets(struct delegpt* dp)
377 {
378 	struct delegpt_addr* a;
379 	size_t n = 0;
380 	for(a = dp->target_list; a; a = a->next_target)
381 		n++;
382 	return n;
383 }
384 
385 size_t
delegpt_count_missing_targets(struct delegpt * dp,int * alllame)386 delegpt_count_missing_targets(struct delegpt* dp, int* alllame)
387 {
388 	struct delegpt_ns* ns;
389 	size_t n = 0, nlame = 0;
390 	for(ns = dp->nslist; ns; ns = ns->next) {
391 		if(ns->resolved) continue;
392 		n++;
393 		if(ns->lame) nlame++;
394 	}
395 	if(alllame && n == nlame) *alllame = 1;
396 	return n;
397 }
398 
399 /** find NS rrset in given list */
400 static struct ub_packed_rrset_key*
find_NS(struct reply_info * rep,size_t from,size_t to)401 find_NS(struct reply_info* rep, size_t from, size_t to)
402 {
403 	size_t i;
404 	for(i=from; i<to; i++) {
405 		if(ntohs(rep->rrsets[i]->rk.type) == LDNS_RR_TYPE_NS)
406 			return rep->rrsets[i];
407 	}
408 	return NULL;
409 }
410 
411 struct delegpt*
delegpt_from_message(struct dns_msg * msg,struct regional * region)412 delegpt_from_message(struct dns_msg* msg, struct regional* region)
413 {
414 	struct ub_packed_rrset_key* ns_rrset = NULL;
415 	struct delegpt* dp;
416 	size_t i;
417 	/* look for NS records in the authority section... */
418 	ns_rrset = find_NS(msg->rep, msg->rep->an_numrrsets,
419 		msg->rep->an_numrrsets+msg->rep->ns_numrrsets);
420 
421 	/* In some cases (even legitimate, perfectly legal cases), the
422 	 * NS set for the "referral" might be in the answer section. */
423 	if(!ns_rrset)
424 		ns_rrset = find_NS(msg->rep, 0, msg->rep->an_numrrsets);
425 
426 	/* If there was no NS rrset in the authority section, then this
427 	 * wasn't a referral message. (It might not actually be a
428 	 * referral message anyway) */
429 	if(!ns_rrset)
430 		return NULL;
431 
432 	/* If we found any, then Yay! we have a delegation point. */
433 	dp = delegpt_create(region);
434 	if(!dp)
435 		return NULL;
436 	dp->has_parent_side_NS = 1; /* created from message */
437 	if(!delegpt_set_name(dp, region, ns_rrset->rk.dname))
438 		return NULL;
439 	if(!delegpt_rrset_add_ns(dp, region, ns_rrset, 0))
440 		return NULL;
441 
442 	/* add glue, A and AAAA in answer and additional section */
443 	for(i=0; i<msg->rep->rrset_count; i++) {
444 		struct ub_packed_rrset_key* s = msg->rep->rrsets[i];
445 		/* skip auth section. FIXME really needed?*/
446 		if(msg->rep->an_numrrsets <= i &&
447 			i < (msg->rep->an_numrrsets+msg->rep->ns_numrrsets))
448 			continue;
449 
450 		if(ntohs(s->rk.type) == LDNS_RR_TYPE_A) {
451 			if(!delegpt_add_rrset_A(dp, region, s, 0, NULL))
452 				return NULL;
453 		} else if(ntohs(s->rk.type) == LDNS_RR_TYPE_AAAA) {
454 			if(!delegpt_add_rrset_AAAA(dp, region, s, 0, NULL))
455 				return NULL;
456 		}
457 	}
458 	return dp;
459 }
460 
461 int
delegpt_rrset_add_ns(struct delegpt * dp,struct regional * region,struct ub_packed_rrset_key * ns_rrset,uint8_t lame)462 delegpt_rrset_add_ns(struct delegpt* dp, struct regional* region,
463         struct ub_packed_rrset_key* ns_rrset, uint8_t lame)
464 {
465 	struct packed_rrset_data* nsdata = (struct packed_rrset_data*)
466 		ns_rrset->entry.data;
467 	size_t i;
468 	log_assert(!dp->dp_type_mlc);
469 	if(nsdata->security == sec_status_bogus)
470 		dp->bogus = 1;
471 	for(i=0; i<nsdata->count; i++) {
472 		if(nsdata->rr_len[i] < 2+1) continue; /* len + root label */
473 		if(dname_valid(nsdata->rr_data[i]+2, nsdata->rr_len[i]-2) !=
474 			(size_t)sldns_read_uint16(nsdata->rr_data[i]))
475 			continue; /* bad format */
476 		/* add rdata of NS (= wirefmt dname), skip rdatalen bytes */
477 		if(!delegpt_add_ns(dp, region, nsdata->rr_data[i]+2, lame,
478 			NULL, UNBOUND_DNS_PORT))
479 			return 0;
480 	}
481 	return 1;
482 }
483 
484 int
delegpt_add_rrset_A(struct delegpt * dp,struct regional * region,struct ub_packed_rrset_key * ak,uint8_t lame,int * additions)485 delegpt_add_rrset_A(struct delegpt* dp, struct regional* region,
486 	struct ub_packed_rrset_key* ak, uint8_t lame, int* additions)
487 {
488         struct packed_rrset_data* d=(struct packed_rrset_data*)ak->entry.data;
489         size_t i;
490         struct sockaddr_in sa;
491         socklen_t len = (socklen_t)sizeof(sa);
492 	log_assert(!dp->dp_type_mlc);
493         memset(&sa, 0, len);
494         sa.sin_family = AF_INET;
495         for(i=0; i<d->count; i++) {
496                 if(d->rr_len[i] != 2 + INET_SIZE)
497                         continue;
498                 memmove(&sa.sin_addr, d->rr_data[i]+2, INET_SIZE);
499                 if(!delegpt_add_target(dp, region, ak->rk.dname,
500                         ak->rk.dname_len, (struct sockaddr_storage*)&sa,
501                         len, (d->security==sec_status_bogus), lame, additions))
502                         return 0;
503         }
504         return 1;
505 }
506 
507 int
delegpt_add_rrset_AAAA(struct delegpt * dp,struct regional * region,struct ub_packed_rrset_key * ak,uint8_t lame,int * additions)508 delegpt_add_rrset_AAAA(struct delegpt* dp, struct regional* region,
509 	struct ub_packed_rrset_key* ak, uint8_t lame, int* additions)
510 {
511         struct packed_rrset_data* d=(struct packed_rrset_data*)ak->entry.data;
512         size_t i;
513         struct sockaddr_in6 sa;
514         socklen_t len = (socklen_t)sizeof(sa);
515 	log_assert(!dp->dp_type_mlc);
516         memset(&sa, 0, len);
517         sa.sin6_family = AF_INET6;
518         for(i=0; i<d->count; i++) {
519                 if(d->rr_len[i] != 2 + INET6_SIZE) /* rdatalen + len of IP6 */
520                         continue;
521                 memmove(&sa.sin6_addr, d->rr_data[i]+2, INET6_SIZE);
522                 if(!delegpt_add_target(dp, region, ak->rk.dname,
523                         ak->rk.dname_len, (struct sockaddr_storage*)&sa,
524                         len, (d->security==sec_status_bogus), lame, additions))
525                         return 0;
526         }
527         return 1;
528 }
529 
530 int
delegpt_add_rrset(struct delegpt * dp,struct regional * region,struct ub_packed_rrset_key * rrset,uint8_t lame,int * additions)531 delegpt_add_rrset(struct delegpt* dp, struct regional* region,
532         struct ub_packed_rrset_key* rrset, uint8_t lame, int* additions)
533 {
534 	if(!rrset)
535 		return 1;
536 	if(ntohs(rrset->rk.type) == LDNS_RR_TYPE_NS)
537 		return delegpt_rrset_add_ns(dp, region, rrset, lame);
538 	else if(ntohs(rrset->rk.type) == LDNS_RR_TYPE_A)
539 		return delegpt_add_rrset_A(dp, region, rrset, lame, additions);
540 	else if(ntohs(rrset->rk.type) == LDNS_RR_TYPE_AAAA)
541 		return delegpt_add_rrset_AAAA(dp, region, rrset, lame,
542 			additions);
543 	log_warn("Unknown rrset type added to delegpt");
544 	return 1;
545 }
546 
delegpt_mark_neg(struct delegpt_ns * ns,uint16_t qtype)547 void delegpt_mark_neg(struct delegpt_ns* ns, uint16_t qtype)
548 {
549 	if(ns) {
550 		if(qtype == LDNS_RR_TYPE_A)
551 			ns->got4 = 2;
552 		else if(qtype == LDNS_RR_TYPE_AAAA)
553 			ns->got6 = 2;
554 		if(ns->got4 && ns->got6)
555 			ns->resolved = 1;
556 	}
557 }
558 
delegpt_add_neg_msg(struct delegpt * dp,struct msgreply_entry * msg)559 void delegpt_add_neg_msg(struct delegpt* dp, struct msgreply_entry* msg)
560 {
561 	struct reply_info* rep = (struct reply_info*)msg->entry.data;
562 	if(!rep) return;
563 
564 	/* if error or no answers */
565 	if(FLAGS_GET_RCODE(rep->flags) != 0 || rep->an_numrrsets == 0) {
566 		struct delegpt_ns* ns = delegpt_find_ns(dp, msg->key.qname,
567 			msg->key.qname_len);
568 		delegpt_mark_neg(ns, msg->key.qtype);
569 	}
570 }
571 
delegpt_no_ipv6(struct delegpt * dp)572 void delegpt_no_ipv6(struct delegpt* dp)
573 {
574 	struct delegpt_ns* ns;
575 	for(ns = dp->nslist; ns; ns = ns->next) {
576 		/* no ipv6, so only ipv4 is enough to resolve a nameserver */
577 		if(ns->got4)
578 			ns->resolved = 1;
579 	}
580 }
581 
delegpt_no_ipv4(struct delegpt * dp)582 void delegpt_no_ipv4(struct delegpt* dp)
583 {
584 	struct delegpt_ns* ns;
585 	for(ns = dp->nslist; ns; ns = ns->next) {
586 		/* no ipv4, so only ipv6 is enough to resolve a nameserver */
587 		if(ns->got6)
588 			ns->resolved = 1;
589 	}
590 }
591 
delegpt_create_mlc(uint8_t * name)592 struct delegpt* delegpt_create_mlc(uint8_t* name)
593 {
594 	struct delegpt* dp=(struct delegpt*)calloc(1, sizeof(*dp));
595 	if(!dp)
596 		return NULL;
597 	dp->dp_type_mlc = 1;
598 	if(name) {
599 		dp->namelabs = dname_count_size_labels(name, &dp->namelen);
600 		dp->name = memdup(name, dp->namelen);
601 		if(!dp->name) {
602 			free(dp);
603 			return NULL;
604 		}
605 	}
606 	return dp;
607 }
608 
delegpt_free_mlc(struct delegpt * dp)609 void delegpt_free_mlc(struct delegpt* dp)
610 {
611 	struct delegpt_ns* n, *nn;
612 	struct delegpt_addr* a, *na;
613 	if(!dp) return;
614 	log_assert(dp->dp_type_mlc);
615 	n = dp->nslist;
616 	while(n) {
617 		nn = n->next;
618 		free(n->name);
619 		free(n->tls_auth_name);
620 		free(n);
621 		n = nn;
622 	}
623 	a = dp->target_list;
624 	while(a) {
625 		na = a->next_target;
626 		free(a->tls_auth_name);
627 		free(a);
628 		a = na;
629 	}
630 	free(dp->name);
631 	free(dp);
632 }
633 
delegpt_set_name_mlc(struct delegpt * dp,uint8_t * name)634 int delegpt_set_name_mlc(struct delegpt* dp, uint8_t* name)
635 {
636 	log_assert(dp->dp_type_mlc);
637 	dp->namelabs = dname_count_size_labels(name, &dp->namelen);
638 	dp->name = memdup(name, dp->namelen);
639 	return (dp->name != NULL);
640 }
641 
delegpt_add_ns_mlc(struct delegpt * dp,uint8_t * name,uint8_t lame,char * tls_auth_name,int port)642 int delegpt_add_ns_mlc(struct delegpt* dp, uint8_t* name, uint8_t lame,
643 	char* tls_auth_name, int port)
644 {
645 	struct delegpt_ns* ns;
646 	size_t len;
647 	(void)dname_count_size_labels(name, &len);
648 	log_assert(dp->dp_type_mlc);
649 	/* slow check for duplicates to avoid counting failures when
650 	 * adding the same server as a dependency twice */
651 	if(delegpt_find_ns(dp, name, len))
652 		return 1;
653 	ns = (struct delegpt_ns*)malloc(sizeof(struct delegpt_ns));
654 	if(!ns)
655 		return 0;
656 	ns->namelen = len;
657 	ns->name = memdup(name, ns->namelen);
658 	if(!ns->name) {
659 		free(ns);
660 		return 0;
661 	}
662 	ns->next = dp->nslist;
663 	dp->nslist = ns;
664 	ns->cache_lookup_count = 0;
665 	ns->resolved = 0;
666 	ns->got4 = 0;
667 	ns->got6 = 0;
668 	ns->lame = (uint8_t)lame;
669 	ns->done_pside4 = 0;
670 	ns->done_pside6 = 0;
671 	ns->port = port;
672 	if(tls_auth_name) {
673 		ns->tls_auth_name = strdup(tls_auth_name);
674 		if(!ns->tls_auth_name) {
675 			free(ns->name);
676 			free(ns);
677 			return 0;
678 		}
679 	} else {
680 		ns->tls_auth_name = NULL;
681 	}
682 	return 1;
683 }
684 
delegpt_add_addr_mlc(struct delegpt * dp,struct sockaddr_storage * addr,socklen_t addrlen,uint8_t bogus,uint8_t lame,char * tls_auth_name,int port)685 int delegpt_add_addr_mlc(struct delegpt* dp, struct sockaddr_storage* addr,
686 	socklen_t addrlen, uint8_t bogus, uint8_t lame, char* tls_auth_name,
687 	int port)
688 {
689 	struct delegpt_addr* a;
690 	log_assert(dp->dp_type_mlc);
691 	if(port != -1) {
692 		log_assert(port>0);
693 		sockaddr_store_port(addr, addrlen, port);
694 	}
695 	/* check for duplicates */
696 	if((a = delegpt_find_addr(dp, addr, addrlen))) {
697 		if(bogus)
698 			a->bogus = bogus;
699 		if(!lame)
700 			a->lame = 0;
701 		return 1;
702 	}
703 
704 	a = (struct delegpt_addr*)malloc(sizeof(struct delegpt_addr));
705 	if(!a)
706 		return 0;
707 	a->next_target = dp->target_list;
708 	dp->target_list = a;
709 	a->next_result = 0;
710 	a->next_usable = dp->usable_list;
711 	dp->usable_list = a;
712 	memcpy(&a->addr, addr, addrlen);
713 	a->addrlen = addrlen;
714 	a->attempts = 0;
715 	a->bogus = bogus;
716 	a->lame = lame;
717 	a->dnsseclame = 0;
718 	if(tls_auth_name) {
719 		a->tls_auth_name = strdup(tls_auth_name);
720 		if(!a->tls_auth_name) {
721 			free(a);
722 			return 0;
723 		}
724 	} else {
725 		a->tls_auth_name = NULL;
726 	}
727 	return 1;
728 }
729 
delegpt_add_target_mlc(struct delegpt * dp,uint8_t * name,size_t namelen,struct sockaddr_storage * addr,socklen_t addrlen,uint8_t bogus,uint8_t lame)730 int delegpt_add_target_mlc(struct delegpt* dp, uint8_t* name, size_t namelen,
731 	struct sockaddr_storage* addr, socklen_t addrlen, uint8_t bogus,
732 	uint8_t lame)
733 {
734 	struct delegpt_ns* ns = delegpt_find_ns(dp, name, namelen);
735 	log_assert(dp->dp_type_mlc);
736 	if(!ns) {
737 		/* ignore it */
738 		return 1;
739 	}
740 	if(!lame) {
741 		if(addr_is_ip6(addr, addrlen))
742 			ns->got6 = 1;
743 		else	ns->got4 = 1;
744 		if(ns->got4 && ns->got6)
745 			ns->resolved = 1;
746 	} else {
747 		if(addr_is_ip6(addr, addrlen))
748 			ns->done_pside6 = 1;
749 		else	ns->done_pside4 = 1;
750 	}
751 	log_assert(ns->port>0);
752 	return delegpt_add_addr_mlc(dp, addr, addrlen, bogus, lame,
753 		ns->tls_auth_name, ns->port);
754 }
755 
delegpt_get_mem(struct delegpt * dp)756 size_t delegpt_get_mem(struct delegpt* dp)
757 {
758 	struct delegpt_ns* ns;
759 	size_t s;
760 	if(!dp) return 0;
761 	s = sizeof(*dp) + dp->namelen +
762 		delegpt_count_targets(dp)*sizeof(struct delegpt_addr);
763 	for(ns=dp->nslist; ns; ns=ns->next)
764 		s += sizeof(*ns)+ns->namelen;
765 	return s;
766 }
767