xref: /freebsd/contrib/ldns/tsig.c (revision 6be3386466ab79a84b48429ae66244f21526d3df)
1 /*
2  * tsig.c
3  *
4  * contains the functions needed for TSIG [RFC2845]
5  *
6  * (c) 2005-2006 NLnet Labs
7  * See the file LICENSE for the license
8  */
9 
10 #include <ldns/config.h>
11 
12 #include <ldns/ldns.h>
13 
14 #include <strings.h>
15 
16 #ifdef HAVE_SSL
17 #include <openssl/hmac.h>
18 #include <openssl/md5.h>
19 #endif /* HAVE_SSL */
20 
21 const char *
22 ldns_tsig_algorithm(const ldns_tsig_credentials *tc)
23 {
24 	return tc->algorithm;
25 }
26 
27 const char *
28 ldns_tsig_keyname(const ldns_tsig_credentials *tc)
29 {
30 	return tc->keyname;
31 }
32 
33 const char *
34 ldns_tsig_keydata(const ldns_tsig_credentials *tc)
35 {
36 	return tc->keydata;
37 }
38 
39 char *
40 ldns_tsig_keyname_clone(const ldns_tsig_credentials *tc)
41 {
42 	return strdup(tc->keyname);
43 }
44 
45 char *
46 ldns_tsig_keydata_clone(const ldns_tsig_credentials *tc)
47 {
48 	return strdup(tc->keydata);
49 }
50 
51 /*
52  *  Makes an exact copy of the wire, but with the tsig rr removed
53  */
54 static uint8_t *
55 ldns_tsig_prepare_pkt_wire(const uint8_t *wire, size_t wire_len, size_t *result_len)
56 {
57 	uint8_t *wire2 = NULL;
58 	uint16_t qd_count;
59 	uint16_t an_count;
60 	uint16_t ns_count;
61 	uint16_t ar_count;
62 	ldns_rr *rr;
63 
64 	size_t pos;
65 	uint16_t i;
66 
67 	ldns_status status;
68 
69 	if(wire_len < LDNS_HEADER_SIZE) {
70 		return NULL;
71 	}
72 	/* fake parse the wire */
73 	qd_count = LDNS_QDCOUNT(wire);
74 	an_count = LDNS_ANCOUNT(wire);
75 	ns_count = LDNS_NSCOUNT(wire);
76 	ar_count = LDNS_ARCOUNT(wire);
77 
78 	if (ar_count > 0) {
79 		ar_count--;
80 	} else {
81 		return NULL;
82 	}
83 
84 	pos = LDNS_HEADER_SIZE;
85 
86 	for (i = 0; i < qd_count; i++) {
87 		status = ldns_wire2rr(&rr, wire, wire_len, &pos, LDNS_SECTION_QUESTION);
88 		if (status != LDNS_STATUS_OK) {
89 			return NULL;
90 		}
91 		ldns_rr_free(rr);
92 	}
93 
94 	for (i = 0; i < an_count; i++) {
95 		status = ldns_wire2rr(&rr, wire, wire_len, &pos, LDNS_SECTION_ANSWER);
96 		if (status != LDNS_STATUS_OK) {
97 			return NULL;
98 		}
99 		ldns_rr_free(rr);
100 	}
101 
102 	for (i = 0; i < ns_count; i++) {
103 		status = ldns_wire2rr(&rr, wire, wire_len, &pos, LDNS_SECTION_AUTHORITY);
104 		if (status != LDNS_STATUS_OK) {
105 			return NULL;
106 		}
107 		ldns_rr_free(rr);
108 	}
109 
110 	for (i = 0; i < ar_count; i++) {
111 		status = ldns_wire2rr(&rr, wire, wire_len, &pos,
112 				LDNS_SECTION_ADDITIONAL);
113 		if (status != LDNS_STATUS_OK) {
114 			return NULL;
115 		}
116 		ldns_rr_free(rr);
117 	}
118 
119 	*result_len = pos;
120 	wire2 = LDNS_XMALLOC(uint8_t, *result_len);
121 	if(!wire2) {
122 		return NULL;
123 	}
124 	memcpy(wire2, wire, *result_len);
125 
126 	ldns_write_uint16(wire2 + LDNS_ARCOUNT_OFF, ar_count);
127 
128 	return wire2;
129 }
130 
131 #ifdef HAVE_SSL
132 static const EVP_MD *
133 ldns_digest_function(char *name)
134 {
135 	/* these are the mandatory algorithms from RFC4635 */
136 	/* The optional algorithms are not yet implemented */
137 	if (strcasecmp(name, "hmac-sha512.") == 0) {
138 #ifdef HAVE_EVP_SHA512
139 		return EVP_sha512();
140 #else
141 		return NULL;
142 #endif
143 	} else if (strcasecmp(name, "hmac-shac384.") == 0) {
144 #ifdef HAVE_EVP_SHA384
145 		return EVP_sha384();
146 #else
147 		return NULL;
148 #endif
149 	} else if (strcasecmp(name, "hmac-sha256.") == 0) {
150 #ifdef HAVE_EVP_SHA256
151 		return EVP_sha256();
152 #else
153 		return NULL;
154 #endif
155 	} else if (strcasecmp(name, "hmac-sha1.") == 0) {
156 		return EVP_sha1();
157 	} else if (strcasecmp(name, "hmac-md5.sig-alg.reg.int.") == 0) {
158 		return EVP_md5();
159 	} else {
160 		return NULL;
161 	}
162 }
163 #endif
164 
165 #ifdef HAVE_SSL
166 static ldns_status
167 ldns_tsig_mac_new(ldns_rdf **tsig_mac, const uint8_t *pkt_wire, size_t pkt_wire_size,
168 		const char *key_data, const ldns_rdf *key_name_rdf, const ldns_rdf *fudge_rdf,
169 		const ldns_rdf *algorithm_rdf, const ldns_rdf *time_signed_rdf, const ldns_rdf *error_rdf,
170 		const ldns_rdf *other_data_rdf, const ldns_rdf *orig_mac_rdf, int tsig_timers_only)
171 {
172 	ldns_status status;
173 	char *wireformat;
174 	int wiresize;
175 	unsigned char *mac_bytes = NULL;
176 	unsigned char *key_bytes = NULL;
177 	int key_size;
178 	const EVP_MD *digester;
179 	char *algorithm_name = NULL;
180 	unsigned int md_len = EVP_MAX_MD_SIZE;
181 	ldns_rdf *result = NULL;
182 	ldns_buffer *data_buffer = NULL;
183 	ldns_rdf *canonical_key_name_rdf = NULL;
184 	ldns_rdf *canonical_algorithm_rdf = NULL;
185 
186 	if (key_name_rdf == NULL || algorithm_rdf == NULL) {
187 		return LDNS_STATUS_NULL;
188 	}
189 	canonical_key_name_rdf  = ldns_rdf_clone(key_name_rdf);
190 	if (canonical_key_name_rdf == NULL) {
191 		return LDNS_STATUS_MEM_ERR;
192 	}
193 	canonical_algorithm_rdf = ldns_rdf_clone(algorithm_rdf);
194 	if (canonical_algorithm_rdf == NULL) {
195 		ldns_rdf_deep_free(canonical_key_name_rdf);
196 		return LDNS_STATUS_MEM_ERR;
197 	}
198 	/*
199 	 * prepare the digestable information
200 	 */
201 	data_buffer = ldns_buffer_new(LDNS_MAX_PACKETLEN);
202 	if (!data_buffer) {
203 		status = LDNS_STATUS_MEM_ERR;
204 		goto clean;
205 	}
206 	/* if orig_mac is not NULL, add it too */
207 	if (orig_mac_rdf) {
208 		(void) ldns_rdf2buffer_wire(data_buffer, orig_mac_rdf);
209  	}
210 	ldns_buffer_write(data_buffer, pkt_wire, pkt_wire_size);
211 	if (!tsig_timers_only) {
212 		ldns_dname2canonical(canonical_key_name_rdf);
213 		(void)ldns_rdf2buffer_wire(data_buffer,
214 				canonical_key_name_rdf);
215 		ldns_buffer_write_u16(data_buffer, LDNS_RR_CLASS_ANY);
216 		ldns_buffer_write_u32(data_buffer, 0);
217 		ldns_dname2canonical(canonical_algorithm_rdf);
218 		(void)ldns_rdf2buffer_wire(data_buffer,
219 				canonical_algorithm_rdf);
220 	}
221 	(void)ldns_rdf2buffer_wire(data_buffer, time_signed_rdf);
222 	(void)ldns_rdf2buffer_wire(data_buffer, fudge_rdf);
223 	if (!tsig_timers_only) {
224 		(void)ldns_rdf2buffer_wire(data_buffer, error_rdf);
225 		(void)ldns_rdf2buffer_wire(data_buffer, other_data_rdf);
226 	}
227 
228 	wireformat = (char *) data_buffer->_data;
229 	wiresize = (int) ldns_buffer_position(data_buffer);
230 
231 	algorithm_name = ldns_rdf2str(algorithm_rdf);
232 	if(!algorithm_name) {
233 		status = LDNS_STATUS_MEM_ERR;
234 		goto clean;
235 	}
236 
237 	/* prepare the key */
238 	key_bytes = LDNS_XMALLOC(unsigned char,
239 			ldns_b64_pton_calculate_size(strlen(key_data)));
240 	if(!key_bytes) {
241 		status = LDNS_STATUS_MEM_ERR;
242 		goto clean;
243 	}
244 	key_size = ldns_b64_pton(key_data, key_bytes,
245 	ldns_b64_pton_calculate_size(strlen(key_data)));
246 	if (key_size < 0) {
247 		status = LDNS_STATUS_INVALID_B64;
248 		goto clean;
249 	}
250 	/* hmac it */
251 	/* 2 spare bytes for the length */
252 	mac_bytes = LDNS_XMALLOC(unsigned char, md_len+2);
253 	if(!mac_bytes) {
254 		status = LDNS_STATUS_MEM_ERR;
255 		goto clean;
256 	}
257 	memset(mac_bytes, 0, md_len+2);
258 
259 	digester = ldns_digest_function(algorithm_name);
260 
261 	if (digester) {
262 		(void) HMAC(digester, key_bytes, key_size, (void *)wireformat,
263 		            (size_t) wiresize, mac_bytes + 2, &md_len);
264 
265 		ldns_write_uint16(mac_bytes, md_len);
266 		result = ldns_rdf_new_frm_data(LDNS_RDF_TYPE_INT16_DATA, md_len + 2,
267 				mac_bytes);
268 	} else {
269 		status = LDNS_STATUS_CRYPTO_UNKNOWN_ALGO;
270 		goto clean;
271 	}
272 	*tsig_mac = result;
273 	status = LDNS_STATUS_OK;
274   clean:
275 	LDNS_FREE(mac_bytes);
276 	LDNS_FREE(key_bytes);
277 	LDNS_FREE(algorithm_name);
278 	ldns_buffer_free(data_buffer);
279 	ldns_rdf_deep_free(canonical_algorithm_rdf);
280 	ldns_rdf_deep_free(canonical_key_name_rdf);
281 	return status;
282 }
283 #endif /*  HAVE_SSL */
284 
285 
286 #ifdef HAVE_SSL
287 bool
288 ldns_pkt_tsig_verify(ldns_pkt *pkt, const uint8_t *wire, size_t wirelen, const char *key_name,
289 	const char *key_data, const ldns_rdf *orig_mac_rdf)
290 {
291 	return ldns_pkt_tsig_verify_next(pkt, wire, wirelen, key_name, key_data, orig_mac_rdf, 0);
292 }
293 
294 bool
295 ldns_pkt_tsig_verify_next(ldns_pkt *pkt, const uint8_t *wire, size_t wirelen, const char* key_name,
296 	const char *key_data, const ldns_rdf *orig_mac_rdf, int tsig_timers_only)
297 {
298 	ldns_rdf *fudge_rdf;
299 	ldns_rdf *algorithm_rdf;
300 	ldns_rdf *time_signed_rdf;
301 	ldns_rdf *orig_id_rdf;
302 	ldns_rdf *error_rdf;
303 	ldns_rdf *other_data_rdf;
304 	ldns_rdf *pkt_mac_rdf;
305 	ldns_rdf *my_mac_rdf;
306 	ldns_rdf *key_name_rdf = ldns_rdf_new_frm_str(LDNS_RDF_TYPE_DNAME, key_name);
307 	uint16_t pkt_id, orig_pkt_id;
308 	ldns_status status;
309 
310 	uint8_t *prepared_wire = NULL;
311 	size_t prepared_wire_size = 0;
312 
313 	ldns_rr *orig_tsig = ldns_pkt_tsig(pkt);
314 
315 	if (!orig_tsig || ldns_rr_rd_count(orig_tsig) <= 6) {
316 		ldns_rdf_deep_free(key_name_rdf);
317 		return false;
318 	}
319 	algorithm_rdf = ldns_rr_rdf(orig_tsig, 0);
320 	time_signed_rdf = ldns_rr_rdf(orig_tsig, 1);
321 	fudge_rdf = ldns_rr_rdf(orig_tsig, 2);
322 	pkt_mac_rdf = ldns_rr_rdf(orig_tsig, 3);
323 	orig_id_rdf = ldns_rr_rdf(orig_tsig, 4);
324 	error_rdf = ldns_rr_rdf(orig_tsig, 5);
325 	other_data_rdf = ldns_rr_rdf(orig_tsig, 6);
326 
327 	/* remove temporarily */
328 	ldns_pkt_set_tsig(pkt, NULL);
329 	/* temporarily change the id to the original id */
330 	pkt_id = ldns_pkt_id(pkt);
331 	orig_pkt_id = ldns_rdf2native_int16(orig_id_rdf);
332 	ldns_pkt_set_id(pkt, orig_pkt_id);
333 
334 	prepared_wire = ldns_tsig_prepare_pkt_wire(wire, wirelen, &prepared_wire_size);
335 
336 	status = ldns_tsig_mac_new(&my_mac_rdf, prepared_wire, prepared_wire_size,
337 			key_data, key_name_rdf, fudge_rdf, algorithm_rdf,
338 			time_signed_rdf, error_rdf, other_data_rdf, orig_mac_rdf, tsig_timers_only);
339 
340 	LDNS_FREE(prepared_wire);
341 
342 	if (status != LDNS_STATUS_OK) {
343 		ldns_rdf_deep_free(key_name_rdf);
344 		return false;
345 	}
346 	/* Put back the values */
347 	ldns_pkt_set_tsig(pkt, orig_tsig);
348 	ldns_pkt_set_id(pkt, pkt_id);
349 
350 	ldns_rdf_deep_free(key_name_rdf);
351 
352 	if (ldns_rdf_compare(pkt_mac_rdf, my_mac_rdf) == 0) {
353 		ldns_rdf_deep_free(my_mac_rdf);
354 		return true;
355 	} else {
356 		ldns_rdf_deep_free(my_mac_rdf);
357 		return false;
358 	}
359 }
360 #endif /* HAVE_SSL */
361 
362 #ifdef HAVE_SSL
363 ldns_status
364 ldns_pkt_tsig_sign(ldns_pkt *pkt, const char *key_name, const char *key_data,
365 	uint16_t fudge, const char *algorithm_name, const ldns_rdf *query_mac)
366 {
367 	return ldns_pkt_tsig_sign_next(pkt, key_name, key_data, fudge, algorithm_name, query_mac, 0);
368 }
369 
370 ldns_status
371 ldns_pkt_tsig_sign_next(ldns_pkt *pkt, const char *key_name, const char *key_data,
372 	uint16_t fudge, const char *algorithm_name, const ldns_rdf *query_mac, int tsig_timers_only)
373 {
374 	ldns_rr *tsig_rr;
375 	ldns_rdf *key_name_rdf = ldns_rdf_new_frm_str(LDNS_RDF_TYPE_DNAME, key_name);
376 	ldns_rdf *fudge_rdf = NULL;
377 	ldns_rdf *orig_id_rdf = NULL;
378 	ldns_rdf *algorithm_rdf;
379 	ldns_rdf *error_rdf = NULL;
380 	ldns_rdf *mac_rdf = NULL;
381 	ldns_rdf *other_data_rdf = NULL;
382 
383 	ldns_status status = LDNS_STATUS_OK;
384 
385 	uint8_t *pkt_wire = NULL;
386 	size_t pkt_wire_len;
387 
388 	struct timeval tv_time_signed;
389 	uint8_t *time_signed = NULL;
390 	ldns_rdf *time_signed_rdf = NULL;
391 
392 	algorithm_rdf = ldns_rdf_new_frm_str(LDNS_RDF_TYPE_DNAME, algorithm_name);
393 	if(!key_name_rdf || !algorithm_rdf) {
394 		status = LDNS_STATUS_MEM_ERR;
395 		goto clean;
396 	}
397 
398 	/* eww don't have create tsigtime rdf yet :( */
399 	/* bleh :p */
400 	if (gettimeofday(&tv_time_signed, NULL) == 0) {
401 		time_signed = LDNS_XMALLOC(uint8_t, 6);
402 		if(!time_signed) {
403 			status = LDNS_STATUS_MEM_ERR;
404 			goto clean;
405 		}
406 		ldns_write_uint64_as_uint48(time_signed,
407 				(uint64_t)tv_time_signed.tv_sec);
408 	} else {
409 		status = LDNS_STATUS_INTERNAL_ERR;
410 		goto clean;
411 	}
412 
413 	time_signed_rdf = ldns_rdf_new(LDNS_RDF_TYPE_TSIGTIME, 6, time_signed);
414 	if(!time_signed_rdf) {
415 		LDNS_FREE(time_signed);
416 		status = LDNS_STATUS_MEM_ERR;
417 		goto clean;
418 	}
419 
420 	fudge_rdf = ldns_native2rdf_int16(LDNS_RDF_TYPE_INT16, fudge);
421 
422 	orig_id_rdf = ldns_native2rdf_int16(LDNS_RDF_TYPE_INT16, ldns_pkt_id(pkt));
423 
424 	error_rdf = ldns_native2rdf_int16(LDNS_RDF_TYPE_INT16, 0);
425 
426 	other_data_rdf = ldns_native2rdf_int16_data(0, NULL);
427 
428 	if(!fudge_rdf || !orig_id_rdf || !error_rdf || !other_data_rdf) {
429 		status = LDNS_STATUS_MEM_ERR;
430 		goto clean;
431 	}
432 
433 	if (ldns_pkt2wire(&pkt_wire, pkt, &pkt_wire_len) != LDNS_STATUS_OK) {
434 		status = LDNS_STATUS_ERR;
435 		goto clean;
436 	}
437 
438 	status = ldns_tsig_mac_new(&mac_rdf, pkt_wire, pkt_wire_len,
439 			key_data, key_name_rdf, fudge_rdf, algorithm_rdf,
440 			time_signed_rdf, error_rdf, other_data_rdf, query_mac, tsig_timers_only);
441 
442 	if (!mac_rdf) {
443 		goto clean;
444 	}
445 
446 	LDNS_FREE(pkt_wire);
447 
448 	/* Create the TSIG RR */
449 	tsig_rr = ldns_rr_new();
450 	if(!tsig_rr) {
451 		status = LDNS_STATUS_MEM_ERR;
452 		goto clean;
453 	}
454 	ldns_rr_set_owner(tsig_rr, key_name_rdf);
455 	ldns_rr_set_class(tsig_rr, LDNS_RR_CLASS_ANY);
456 	ldns_rr_set_type(tsig_rr, LDNS_RR_TYPE_TSIG);
457 	ldns_rr_set_ttl(tsig_rr, 0);
458 
459 	ldns_rr_push_rdf(tsig_rr, algorithm_rdf);
460 	ldns_rr_push_rdf(tsig_rr, time_signed_rdf);
461 	ldns_rr_push_rdf(tsig_rr, fudge_rdf);
462 	ldns_rr_push_rdf(tsig_rr, mac_rdf);
463 	ldns_rr_push_rdf(tsig_rr, orig_id_rdf);
464 	ldns_rr_push_rdf(tsig_rr, error_rdf);
465 	ldns_rr_push_rdf(tsig_rr, other_data_rdf);
466 
467 	ldns_pkt_set_tsig(pkt, tsig_rr);
468 
469 	return status;
470 
471   clean:
472 	LDNS_FREE(pkt_wire);
473 	ldns_rdf_free(key_name_rdf);
474 	ldns_rdf_free(algorithm_rdf);
475 	ldns_rdf_free(time_signed_rdf);
476 	ldns_rdf_free(fudge_rdf);
477 	ldns_rdf_free(orig_id_rdf);
478 	ldns_rdf_free(error_rdf);
479 	ldns_rdf_free(other_data_rdf);
480 	return status;
481 }
482 #endif /* HAVE_SSL */
483