xref: /freebsd/contrib/unbound/smallapp/unbound-checkconf.c (revision be771a7b7f4580a30d99e41a5bb1b93a385a119d)
1b7579f77SDag-Erling Smørgrav /*
25469a995SCy Schubert  * smallapp/unbound-checkconf.c - config file checker for unbound.conf file.
3b7579f77SDag-Erling Smørgrav  *
4b7579f77SDag-Erling Smørgrav  * Copyright (c) 2007, NLnet Labs. All rights reserved.
5b7579f77SDag-Erling Smørgrav  *
6b7579f77SDag-Erling Smørgrav  * This software is open source.
7b7579f77SDag-Erling Smørgrav  *
8b7579f77SDag-Erling Smørgrav  * Redistribution and use in source and binary forms, with or without
9b7579f77SDag-Erling Smørgrav  * modification, are permitted provided that the following conditions
10b7579f77SDag-Erling Smørgrav  * are met:
11b7579f77SDag-Erling Smørgrav  *
12b7579f77SDag-Erling Smørgrav  * Redistributions of source code must retain the above copyright notice,
13b7579f77SDag-Erling Smørgrav  * this list of conditions and the following disclaimer.
14b7579f77SDag-Erling Smørgrav  *
15b7579f77SDag-Erling Smørgrav  * Redistributions in binary form must reproduce the above copyright notice,
16b7579f77SDag-Erling Smørgrav  * this list of conditions and the following disclaimer in the documentation
17b7579f77SDag-Erling Smørgrav  * and/or other materials provided with the distribution.
18b7579f77SDag-Erling Smørgrav  *
19b7579f77SDag-Erling Smørgrav  * Neither the name of the NLNET LABS nor the names of its contributors may
20b7579f77SDag-Erling Smørgrav  * be used to endorse or promote products derived from this software without
21b7579f77SDag-Erling Smørgrav  * specific prior written permission.
22b7579f77SDag-Erling Smørgrav  *
23b7579f77SDag-Erling Smørgrav  * THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS
2417d15b25SDag-Erling Smørgrav  * "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT
2517d15b25SDag-Erling Smørgrav  * LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR
2617d15b25SDag-Erling Smørgrav  * A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT
2717d15b25SDag-Erling Smørgrav  * HOLDER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL,
2817d15b25SDag-Erling Smørgrav  * SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED
2917d15b25SDag-Erling Smørgrav  * TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR
3017d15b25SDag-Erling Smørgrav  * PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF
3117d15b25SDag-Erling Smørgrav  * LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING
3217d15b25SDag-Erling Smørgrav  * NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS
3317d15b25SDag-Erling Smørgrav  * SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
34b7579f77SDag-Erling Smørgrav  */
35b7579f77SDag-Erling Smørgrav 
36b7579f77SDag-Erling Smørgrav /**
37b7579f77SDag-Erling Smørgrav  * \file
38b7579f77SDag-Erling Smørgrav  *
39b7579f77SDag-Erling Smørgrav  * The config checker checks for syntax and other errors in the unbound.conf
40b7579f77SDag-Erling Smørgrav  * file, and can be used to check for errors before the server is started
41b7579f77SDag-Erling Smørgrav  * or sigHUPped.
42b7579f77SDag-Erling Smørgrav  * Exit status 1 means an error.
43b7579f77SDag-Erling Smørgrav  */
44b7579f77SDag-Erling Smørgrav 
45b7579f77SDag-Erling Smørgrav #include "config.h"
464c75e3aaSDag-Erling Smørgrav #include <ctype.h>
47b7579f77SDag-Erling Smørgrav #include "util/log.h"
48b7579f77SDag-Erling Smørgrav #include "util/config_file.h"
49b7579f77SDag-Erling Smørgrav #include "util/module.h"
50b7579f77SDag-Erling Smørgrav #include "util/net_help.h"
51b7579f77SDag-Erling Smørgrav #include "util/regional.h"
52b7579f77SDag-Erling Smørgrav #include "iterator/iterator.h"
53b7579f77SDag-Erling Smørgrav #include "iterator/iter_fwd.h"
54b7579f77SDag-Erling Smørgrav #include "iterator/iter_hints.h"
55b7579f77SDag-Erling Smørgrav #include "validator/validator.h"
56b7579f77SDag-Erling Smørgrav #include "services/localzone.h"
5724e36522SCy Schubert #include "services/listen_dnsport.h"
5865b390aaSDag-Erling Smørgrav #include "services/view.h"
5957bddd21SDag-Erling Smørgrav #include "services/authzone.h"
6065b390aaSDag-Erling Smørgrav #include "respip/respip.h"
6109a3aaf3SDag-Erling Smørgrav #include "sldns/sbuffer.h"
6225039b37SCy Schubert #include "sldns/str2wire.h"
63b7579f77SDag-Erling Smørgrav #ifdef HAVE_GETOPT_H
64b7579f77SDag-Erling Smørgrav #include <getopt.h>
65b7579f77SDag-Erling Smørgrav #endif
66b7579f77SDag-Erling Smørgrav #ifdef HAVE_PWD_H
67b7579f77SDag-Erling Smørgrav #include <pwd.h>
68b7579f77SDag-Erling Smørgrav #endif
69b7579f77SDag-Erling Smørgrav #ifdef HAVE_SYS_STAT_H
70b7579f77SDag-Erling Smørgrav #include <sys/stat.h>
71b7579f77SDag-Erling Smørgrav #endif
72b7579f77SDag-Erling Smørgrav #ifdef HAVE_GLOB_H
73b7579f77SDag-Erling Smørgrav #include <glob.h>
74b7579f77SDag-Erling Smørgrav #endif
75b7579f77SDag-Erling Smørgrav #ifdef WITH_PYTHONMODULE
76b7579f77SDag-Erling Smørgrav #include "pythonmod/pythonmod.h"
77b7579f77SDag-Erling Smørgrav #endif
78971980c3SDag-Erling Smørgrav #ifdef CLIENT_SUBNET
79971980c3SDag-Erling Smørgrav #include "edns-subnet/subnet-whitelist.h"
80971980c3SDag-Erling Smørgrav #endif
81b7579f77SDag-Erling Smørgrav 
82b7579f77SDag-Erling Smørgrav /** Give checkconf usage, and exit (1). */
83b7579f77SDag-Erling Smørgrav static void
84b5663de9SDag-Erling Smørgrav usage(void)
85b7579f77SDag-Erling Smørgrav {
86b70d78d6SDag-Erling Smørgrav 	printf("Usage:	local-unbound-checkconf [file]\n");
87b7579f77SDag-Erling Smørgrav 	printf("	Checks unbound configuration file for errors.\n");
88b7579f77SDag-Erling Smørgrav 	printf("file	if omitted %s is used.\n", CONFIGFILE);
89b7579f77SDag-Erling Smørgrav 	printf("-o option	print value of option to stdout.\n");
906480faa8SDag-Erling Smørgrav 	printf("-f 		output full pathname with chroot applied, eg. with -o pidfile.\n");
91335c7cdaSCy Schubert 	printf("-q 		quiet (suppress output on success).\n");
92b7579f77SDag-Erling Smørgrav 	printf("-h		show this usage help.\n");
93b7579f77SDag-Erling Smørgrav 	printf("Version %s\n", PACKAGE_VERSION);
94b7579f77SDag-Erling Smørgrav 	printf("BSD licensed, see LICENSE in source package for details.\n");
95b7579f77SDag-Erling Smørgrav 	printf("Report bugs to %s\n", PACKAGE_BUGREPORT);
96b7579f77SDag-Erling Smørgrav 	exit(1);
97b7579f77SDag-Erling Smørgrav }
98b7579f77SDag-Erling Smørgrav 
99b7579f77SDag-Erling Smørgrav /**
100b7579f77SDag-Erling Smørgrav  * Print given option to stdout
101b7579f77SDag-Erling Smørgrav  * @param cfg: config
102b7579f77SDag-Erling Smørgrav  * @param opt: option name without trailing :.
103b7579f77SDag-Erling Smørgrav  *	This is different from config_set_option.
1046480faa8SDag-Erling Smørgrav  * @param final: if final pathname with chroot applied has to be printed.
105b7579f77SDag-Erling Smørgrav  */
106b7579f77SDag-Erling Smørgrav static void
1076480faa8SDag-Erling Smørgrav print_option(struct config_file* cfg, const char* opt, int final)
108b7579f77SDag-Erling Smørgrav {
1096480faa8SDag-Erling Smørgrav 	if(strcmp(opt, "pidfile") == 0 && final) {
110bc892140SDag-Erling Smørgrav 		char *p = fname_after_chroot(cfg->pidfile, cfg, 1);
111bc892140SDag-Erling Smørgrav 		if(!p) fatal_exit("out of memory");
112bc892140SDag-Erling Smørgrav 		printf("%s\n", p);
113bc892140SDag-Erling Smørgrav 		free(p);
1146480faa8SDag-Erling Smørgrav 		return;
1156480faa8SDag-Erling Smørgrav 	}
11657bddd21SDag-Erling Smørgrav 	if(strcmp(opt, "auto-trust-anchor-file") == 0 && final) {
11757bddd21SDag-Erling Smørgrav 		struct config_strlist* s = cfg->auto_trust_anchor_file_list;
11857bddd21SDag-Erling Smørgrav 		for(; s; s=s->next) {
11957bddd21SDag-Erling Smørgrav 			char *p = fname_after_chroot(s->str, cfg, 1);
12057bddd21SDag-Erling Smørgrav 			if(!p) fatal_exit("out of memory");
12157bddd21SDag-Erling Smørgrav 			printf("%s\n", p);
12257bddd21SDag-Erling Smørgrav 			free(p);
12357bddd21SDag-Erling Smørgrav 		}
12457bddd21SDag-Erling Smørgrav 		return;
12557bddd21SDag-Erling Smørgrav 	}
126b7579f77SDag-Erling Smørgrav 	if(!config_get_option(cfg, opt, config_print_func, stdout))
127b7579f77SDag-Erling Smørgrav 		fatal_exit("cannot print option '%s'", opt);
128b7579f77SDag-Erling Smørgrav }
129b7579f77SDag-Erling Smørgrav 
130b7579f77SDag-Erling Smørgrav /** check if module works with config */
131b7579f77SDag-Erling Smørgrav static void
132b7579f77SDag-Erling Smørgrav check_mod(struct config_file* cfg, struct module_func_block* fb)
133b7579f77SDag-Erling Smørgrav {
134b7579f77SDag-Erling Smørgrav 	struct module_env env;
135b7579f77SDag-Erling Smørgrav 	memset(&env, 0, sizeof(env));
136b7579f77SDag-Erling Smørgrav 	env.cfg = cfg;
137b7579f77SDag-Erling Smørgrav 	env.scratch = regional_create();
13817d15b25SDag-Erling Smørgrav 	env.scratch_buffer = sldns_buffer_new(BUFSIZ);
139b7579f77SDag-Erling Smørgrav 	if(!env.scratch || !env.scratch_buffer)
140b7579f77SDag-Erling Smørgrav 		fatal_exit("out of memory");
141bc892140SDag-Erling Smørgrav 	if(!edns_known_options_init(&env))
142bc892140SDag-Erling Smørgrav 		fatal_exit("out of memory");
14356850988SCy Schubert 	if(fb->startup && !(*fb->startup)(&env, 0))
14456850988SCy Schubert 		fatal_exit("bad config during startup for %s module", fb->name);
14556850988SCy Schubert 	if(!(*fb->init)(&env, 0))
14656850988SCy Schubert 		fatal_exit("bad config during init for %s module", fb->name);
147b7579f77SDag-Erling Smørgrav 	(*fb->deinit)(&env, 0);
14856850988SCy Schubert 	if(fb->destartup)
14956850988SCy Schubert 		(*fb->destartup)(&env, 0);
15017d15b25SDag-Erling Smørgrav 	sldns_buffer_free(env.scratch_buffer);
151b7579f77SDag-Erling Smørgrav 	regional_destroy(env.scratch);
152bc892140SDag-Erling Smørgrav 	edns_known_options_delete(&env);
153b7579f77SDag-Erling Smørgrav }
154b7579f77SDag-Erling Smørgrav 
1550eefd307SCy Schubert /** true if addr is a localhost address, 127.0.0.1 or ::1 (with maybe "@port"
1560eefd307SCy Schubert  * after it) */
1570eefd307SCy Schubert static int
1580eefd307SCy Schubert str_addr_is_localhost(const char* a)
1590eefd307SCy Schubert {
1600eefd307SCy Schubert 	if(strncmp(a, "127.", 4) == 0) return 1;
1610eefd307SCy Schubert 	if(strncmp(a, "::1", 3) == 0) return 1;
1620eefd307SCy Schubert 	return 0;
1630eefd307SCy Schubert }
1640eefd307SCy Schubert 
1650eefd307SCy Schubert /** check do-not-query-localhost */
1660eefd307SCy Schubert static void
1670eefd307SCy Schubert donotquerylocalhostcheck(struct config_file* cfg)
1680eefd307SCy Schubert {
1690eefd307SCy Schubert 	if(cfg->donotquery_localhost) {
1700eefd307SCy Schubert 		struct config_stub* p;
1710eefd307SCy Schubert 		struct config_strlist* s;
1720eefd307SCy Schubert 		for(p=cfg->forwards; p; p=p->next) {
1730eefd307SCy Schubert 			for(s=p->addrs; s; s=s->next) {
1740eefd307SCy Schubert 				if(str_addr_is_localhost(s->str)) {
1750eefd307SCy Schubert 					fprintf(stderr, "unbound-checkconf: warning: forward-addr: '%s' is specified for forward-zone: '%s', but do-not-query-localhost: yes means that the address will not be used for lookups.\n",
1760eefd307SCy Schubert 						s->str, p->name);
1770eefd307SCy Schubert 				}
1780eefd307SCy Schubert 			}
1790eefd307SCy Schubert 		}
1800eefd307SCy Schubert 		for(p=cfg->stubs; p; p=p->next) {
1810eefd307SCy Schubert 			for(s=p->addrs; s; s=s->next) {
1820eefd307SCy Schubert 				if(str_addr_is_localhost(s->str)) {
1830eefd307SCy Schubert 					fprintf(stderr, "unbound-checkconf: warning: stub-addr: '%s' is specified for stub-zone: '%s', but do-not-query-localhost: yes means that the address will not be used for lookups.\n",
1840eefd307SCy Schubert 						s->str, p->name);
1850eefd307SCy Schubert 				}
1860eefd307SCy Schubert 			}
1870eefd307SCy Schubert 		}
1880eefd307SCy Schubert 	}
1890eefd307SCy Schubert }
1900eefd307SCy Schubert 
191b7579f77SDag-Erling Smørgrav /** check localzones */
192b7579f77SDag-Erling Smørgrav static void
193b7579f77SDag-Erling Smørgrav localzonechecks(struct config_file* cfg)
194b7579f77SDag-Erling Smørgrav {
195b7579f77SDag-Erling Smørgrav 	struct local_zones* zs;
196b7579f77SDag-Erling Smørgrav 	if(!(zs = local_zones_create()))
197b7579f77SDag-Erling Smørgrav 		fatal_exit("out of memory");
198b7579f77SDag-Erling Smørgrav 	if(!local_zones_apply_cfg(zs, cfg))
199b7579f77SDag-Erling Smørgrav 		fatal_exit("failed local-zone, local-data configuration");
200b7579f77SDag-Erling Smørgrav 	local_zones_delete(zs);
201b7579f77SDag-Erling Smørgrav }
202b7579f77SDag-Erling Smørgrav 
20325039b37SCy Schubert /** checks for acl and views */
20425039b37SCy Schubert static void
20525039b37SCy Schubert acl_view_tag_checks(struct config_file* cfg, struct views* views)
20625039b37SCy Schubert {
20725039b37SCy Schubert 	int d;
20825039b37SCy Schubert 	struct sockaddr_storage a;
20925039b37SCy Schubert 	socklen_t alen;
21025039b37SCy Schubert 	struct config_str2list* acl;
21125039b37SCy Schubert 	struct config_str3list* s3;
21225039b37SCy Schubert 	struct config_strbytelist* sb;
21325039b37SCy Schubert 
21425039b37SCy Schubert 	/* acl_view */
21525039b37SCy Schubert 	for(acl=cfg->acl_view; acl; acl = acl->next) {
21625039b37SCy Schubert 		struct view* v;
21725039b37SCy Schubert 		if(!netblockstrtoaddr(acl->str, UNBOUND_DNS_PORT, &a, &alen,
21825039b37SCy Schubert 			&d)) {
21925039b37SCy Schubert 			fatal_exit("cannot parse access-control-view "
22025039b37SCy Schubert 				"address %s %s", acl->str, acl->str2);
22125039b37SCy Schubert 		}
22225039b37SCy Schubert 		v = views_find_view(views, acl->str2, 0);
22325039b37SCy Schubert 		if(!v) {
22425039b37SCy Schubert 			fatal_exit("cannot find view for "
22525039b37SCy Schubert 				"access-control-view: %s %s",
22625039b37SCy Schubert 				acl->str, acl->str2);
22725039b37SCy Schubert 		}
22825039b37SCy Schubert 		lock_rw_unlock(&v->lock);
22925039b37SCy Schubert 	}
23025039b37SCy Schubert 
23125039b37SCy Schubert 	/* acl_tags */
23225039b37SCy Schubert 	for(sb=cfg->acl_tags; sb; sb = sb->next) {
23325039b37SCy Schubert 		if(!netblockstrtoaddr(sb->str, UNBOUND_DNS_PORT, &a, &alen,
23425039b37SCy Schubert 			&d)) {
23525039b37SCy Schubert 			fatal_exit("cannot parse access-control-tags "
23625039b37SCy Schubert 				"address %s", sb->str);
23725039b37SCy Schubert 		}
23825039b37SCy Schubert 	}
23925039b37SCy Schubert 
24025039b37SCy Schubert 	/* acl_tag_actions */
24125039b37SCy Schubert 	for(s3=cfg->acl_tag_actions; s3; s3 = s3->next) {
24225039b37SCy Schubert 		enum localzone_type t;
24325039b37SCy Schubert 		if(!netblockstrtoaddr(s3->str, UNBOUND_DNS_PORT, &a, &alen,
24425039b37SCy Schubert 			&d)) {
24525039b37SCy Schubert 			fatal_exit("cannot parse access-control-tag-actions "
24625039b37SCy Schubert 				"address %s %s %s",
24725039b37SCy Schubert 				s3->str, s3->str2, s3->str3);
24825039b37SCy Schubert 		}
24925039b37SCy Schubert 		if(find_tag_id(cfg, s3->str2) == -1) {
25025039b37SCy Schubert 			fatal_exit("cannot parse tag %s (define-tag it), "
25125039b37SCy Schubert 				"for access-control-tag-actions: %s %s %s",
25225039b37SCy Schubert 				s3->str2, s3->str, s3->str2, s3->str3);
25325039b37SCy Schubert 		}
25425039b37SCy Schubert 		if(!local_zone_str2type(s3->str3, &t)) {
25525039b37SCy Schubert 			fatal_exit("cannot parse access control action type %s"
25625039b37SCy Schubert 				" for access-control-tag-actions: %s %s %s",
25725039b37SCy Schubert 				s3->str3, s3->str, s3->str2, s3->str3);
25825039b37SCy Schubert 		}
25925039b37SCy Schubert 	}
26025039b37SCy Schubert 
26125039b37SCy Schubert 	/* acl_tag_datas */
26225039b37SCy Schubert 	for(s3=cfg->acl_tag_datas; s3; s3 = s3->next) {
26325039b37SCy Schubert 		char buf[65536];
26425039b37SCy Schubert 		uint8_t rr[LDNS_RR_BUF_SIZE];
26525039b37SCy Schubert 		size_t len = sizeof(rr);
26625039b37SCy Schubert 		int res;
26725039b37SCy Schubert 		if(!netblockstrtoaddr(s3->str, UNBOUND_DNS_PORT, &a, &alen,
26825039b37SCy Schubert 			&d)) {
26925039b37SCy Schubert 			fatal_exit("cannot parse access-control-tag-datas address %s %s '%s'",
27025039b37SCy Schubert 				s3->str, s3->str2, s3->str3);
27125039b37SCy Schubert 		}
27225039b37SCy Schubert 		if(find_tag_id(cfg, s3->str2) == -1) {
27325039b37SCy Schubert 			fatal_exit("cannot parse tag %s (define-tag it), "
27425039b37SCy Schubert 				"for access-control-tag-datas: %s %s '%s'",
27525039b37SCy Schubert 				s3->str2, s3->str, s3->str2, s3->str3);
27625039b37SCy Schubert 		}
27725039b37SCy Schubert 		/* '.' is sufficient for validation, and it makes the call to
27825039b37SCy Schubert 		 * sldns_wirerr_get_type() simpler below. */
27925039b37SCy Schubert 		snprintf(buf, sizeof(buf), "%s %s", ".", s3->str3);
28025039b37SCy Schubert 		res = sldns_str2wire_rr_buf(buf, rr, &len, NULL, 3600, NULL,
28125039b37SCy Schubert 			0, NULL, 0);
28225039b37SCy Schubert 		if(res != 0) {
28325039b37SCy Schubert 			fatal_exit("cannot parse rr data [char %d] parse error %s, for access-control-tag-datas: %s %s '%s'",
28425039b37SCy Schubert 				(int)LDNS_WIREPARSE_OFFSET(res)-2,
28525039b37SCy Schubert 				sldns_get_errorstr_parse(res),
28625039b37SCy Schubert 				s3->str, s3->str2, s3->str3);
28725039b37SCy Schubert 		}
28825039b37SCy Schubert 	}
28925039b37SCy Schubert }
29025039b37SCy Schubert 
29165b390aaSDag-Erling Smørgrav /** check view and response-ip configuration */
29265b390aaSDag-Erling Smørgrav static void
29365b390aaSDag-Erling Smørgrav view_and_respipchecks(struct config_file* cfg)
29465b390aaSDag-Erling Smørgrav {
29565b390aaSDag-Erling Smørgrav 	struct views* views = NULL;
29665b390aaSDag-Erling Smørgrav 	struct respip_set* respip = NULL;
29765b390aaSDag-Erling Smørgrav 	int ignored = 0;
29865b390aaSDag-Erling Smørgrav 	if(!(views = views_create()))
29965b390aaSDag-Erling Smørgrav 		fatal_exit("Could not create views: out of memory");
30065b390aaSDag-Erling Smørgrav 	if(!(respip = respip_set_create()))
30165b390aaSDag-Erling Smørgrav 		fatal_exit("Could not create respip set: out of memory");
30265b390aaSDag-Erling Smørgrav 	if(!views_apply_cfg(views, cfg))
30365b390aaSDag-Erling Smørgrav 		fatal_exit("Could not set up views");
30465b390aaSDag-Erling Smørgrav 	if(!respip_global_apply_cfg(respip, cfg))
30565b390aaSDag-Erling Smørgrav 		fatal_exit("Could not setup respip set");
30665b390aaSDag-Erling Smørgrav 	if(!respip_views_apply_cfg(views, cfg, &ignored))
30765b390aaSDag-Erling Smørgrav 		fatal_exit("Could not setup per-view respip sets");
30825039b37SCy Schubert 	acl_view_tag_checks(cfg, views);
30965b390aaSDag-Erling Smørgrav 	views_delete(views);
31065b390aaSDag-Erling Smørgrav 	respip_set_delete(respip);
31165b390aaSDag-Erling Smørgrav }
31265b390aaSDag-Erling Smørgrav 
313b7579f77SDag-Erling Smørgrav /** emit warnings for IP in hosts */
314b7579f77SDag-Erling Smørgrav static void
315b7579f77SDag-Erling Smørgrav warn_hosts(const char* typ, struct config_stub* list)
316b7579f77SDag-Erling Smørgrav {
317b7579f77SDag-Erling Smørgrav 	struct sockaddr_storage a;
318b7579f77SDag-Erling Smørgrav 	socklen_t alen;
319b7579f77SDag-Erling Smørgrav 	struct config_stub* s;
320b7579f77SDag-Erling Smørgrav 	struct config_strlist* h;
321b7579f77SDag-Erling Smørgrav 	for(s=list; s; s=s->next) {
322b7579f77SDag-Erling Smørgrav 		for(h=s->hosts; h; h=h->next) {
323865f46b2SCy Schubert 			if(extstrtoaddr(h->str, &a, &alen, UNBOUND_DNS_PORT)) {
324b7579f77SDag-Erling Smørgrav 				fprintf(stderr, "unbound-checkconf: warning:"
325b7579f77SDag-Erling Smørgrav 				  " %s %s: \"%s\" is an IP%s address, "
326b7579f77SDag-Erling Smørgrav 				  "and when looked up as a host name "
327b7579f77SDag-Erling Smørgrav 				  "during use may not resolve.\n",
328b7579f77SDag-Erling Smørgrav 				  s->name, typ, h->str,
329b7579f77SDag-Erling Smørgrav 				  addr_is_ip6(&a, alen)?"6":"4");
330b7579f77SDag-Erling Smørgrav 			}
331b7579f77SDag-Erling Smørgrav 		}
332b7579f77SDag-Erling Smørgrav 	}
333b7579f77SDag-Erling Smørgrav }
334b7579f77SDag-Erling Smørgrav 
335b7579f77SDag-Erling Smørgrav /** check interface strings */
336b7579f77SDag-Erling Smørgrav static void
337b7579f77SDag-Erling Smørgrav interfacechecks(struct config_file* cfg)
338b7579f77SDag-Erling Smørgrav {
339b5663de9SDag-Erling Smørgrav 	int d;
340b7579f77SDag-Erling Smørgrav 	struct sockaddr_storage a;
341b7579f77SDag-Erling Smørgrav 	socklen_t alen;
34224e36522SCy Schubert 	int i, j, i2, j2;
34324e36522SCy Schubert 	char*** resif = NULL;
34424e36522SCy Schubert 	int* num_resif = NULL;
34524e36522SCy Schubert 
34624e36522SCy Schubert 	if(cfg->num_ifs != 0) {
34724e36522SCy Schubert 		resif = (char***)calloc(cfg->num_ifs, sizeof(char**));
34824e36522SCy Schubert 		if(!resif) fatal_exit("malloc failure");
34924e36522SCy Schubert 		num_resif = (int*)calloc(cfg->num_ifs, sizeof(int));
35024e36522SCy Schubert 		if(!num_resif) fatal_exit("malloc failure");
351b7579f77SDag-Erling Smørgrav 	}
35224e36522SCy Schubert 	for(i=0; i<cfg->num_ifs; i++) {
35324e36522SCy Schubert 		/* search for duplicates in IP or ifname arguments */
35424e36522SCy Schubert 		for(i2=0; i2<i; i2++) {
35524e36522SCy Schubert 			if(strcmp(cfg->ifs[i], cfg->ifs[i2]) == 0) {
356b7579f77SDag-Erling Smørgrav 				fatal_exit("interface: %s present twice, "
357b7579f77SDag-Erling Smørgrav 					"cannot bind same ports twice.",
358b7579f77SDag-Erling Smørgrav 					cfg->ifs[i]);
359b7579f77SDag-Erling Smørgrav 			}
360b7579f77SDag-Erling Smørgrav 		}
36124e36522SCy Schubert 		if(!resolve_interface_names(&cfg->ifs[i], 1, NULL, &resif[i],
36224e36522SCy Schubert 			&num_resif[i])) {
36324e36522SCy Schubert 			fatal_exit("could not resolve interface names, for %s",
36424e36522SCy Schubert 				cfg->ifs[i]);
36524e36522SCy Schubert 		}
366865f46b2SCy Schubert 		/* check for port combinations that are not supported */
367*be771a7bSCy Schubert 		if(if_is_pp2(resif[i][0], cfg->port, cfg->proxy_protocol_port)) {
368*be771a7bSCy Schubert 			if(if_is_dnscrypt(resif[i][0], cfg->port,
369865f46b2SCy Schubert 				cfg->dnscrypt_port)) {
370865f46b2SCy Schubert 				fatal_exit("PROXYv2 and DNSCrypt combination not "
371865f46b2SCy Schubert 					"supported!");
372*be771a7bSCy Schubert 			} else if(if_is_https(resif[i][0], cfg->port,
373865f46b2SCy Schubert 				cfg->https_port)) {
374865f46b2SCy Schubert 				fatal_exit("PROXYv2 and DoH combination not "
375865f46b2SCy Schubert 					"supported!");
376*be771a7bSCy Schubert 			} else if(if_is_quic(resif[i][0], cfg->port,
377*be771a7bSCy Schubert 				cfg->quic_port)) {
378*be771a7bSCy Schubert 				fatal_exit("PROXYv2 and DoQ combination not "
379*be771a7bSCy Schubert 					"supported!");
380865f46b2SCy Schubert 			}
381865f46b2SCy Schubert 		}
38224e36522SCy Schubert 		/* search for duplicates in the returned addresses */
38324e36522SCy Schubert 		for(j=0; j<num_resif[i]; j++) {
384865f46b2SCy Schubert 			if(!extstrtoaddr(resif[i][j], &a, &alen, cfg->port)) {
38524e36522SCy Schubert 				if(strcmp(cfg->ifs[i], resif[i][j]) != 0)
38624e36522SCy Schubert 					fatal_exit("cannot parse interface address '%s' from the interface specified as '%s'",
38724e36522SCy Schubert 						resif[i][j], cfg->ifs[i]);
38824e36522SCy Schubert 				else
38924e36522SCy Schubert 					fatal_exit("cannot parse interface specified as '%s'",
39024e36522SCy Schubert 						cfg->ifs[i]);
39124e36522SCy Schubert 			}
39224e36522SCy Schubert 			for(i2=0; i2<i; i2++) {
39324e36522SCy Schubert 				for(j2=0; j2<num_resif[i2]; j2++) {
39424e36522SCy Schubert 					if(strcmp(resif[i][j], resif[i2][j2])
39524e36522SCy Schubert 						== 0) {
39624e36522SCy Schubert 						char info1[1024], info2[1024];
39724e36522SCy Schubert 						if(strcmp(cfg->ifs[i], resif[i][j]) != 0)
39824e36522SCy Schubert 							snprintf(info1, sizeof(info1), "address %s from interface: %s", resif[i][j], cfg->ifs[i]);
39924e36522SCy Schubert 						else	snprintf(info1, sizeof(info1), "interface: %s", cfg->ifs[i]);
40024e36522SCy Schubert 						if(strcmp(cfg->ifs[i2], resif[i2][j2]) != 0)
40124e36522SCy Schubert 							snprintf(info2, sizeof(info2), "address %s from interface: %s", resif[i2][j2], cfg->ifs[i2]);
40224e36522SCy Schubert 						else	snprintf(info2, sizeof(info2), "interface: %s", cfg->ifs[i2]);
40324e36522SCy Schubert 						fatal_exit("%s present twice, cannot bind the same ports twice. The first entry is %s and the second is %s", resif[i][j], info2, info1);
40424e36522SCy Schubert 					}
40524e36522SCy Schubert 				}
40624e36522SCy Schubert 			}
40724e36522SCy Schubert 		}
40824e36522SCy Schubert 	}
40924e36522SCy Schubert 
41024e36522SCy Schubert 	for(i=0; i<cfg->num_ifs; i++) {
41124e36522SCy Schubert 		config_del_strarray(resif[i], num_resif[i]);
41224e36522SCy Schubert 	}
41324e36522SCy Schubert 	free(resif);
41424e36522SCy Schubert 	free(num_resif);
41524e36522SCy Schubert 
416b7579f77SDag-Erling Smørgrav 	for(i=0; i<cfg->num_out_ifs; i++) {
417b5663de9SDag-Erling Smørgrav 		if(!ipstrtoaddr(cfg->out_ifs[i], UNBOUND_DNS_PORT, &a, &alen) &&
418b5663de9SDag-Erling Smørgrav 		   !netblockstrtoaddr(cfg->out_ifs[i], UNBOUND_DNS_PORT, &a, &alen, &d)) {
419b7579f77SDag-Erling Smørgrav 			fatal_exit("cannot parse outgoing-interface "
420b7579f77SDag-Erling Smørgrav 				"specified as '%s'", cfg->out_ifs[i]);
421b7579f77SDag-Erling Smørgrav 		}
422b7579f77SDag-Erling Smørgrav 		for(j=0; j<cfg->num_out_ifs; j++) {
423b7579f77SDag-Erling Smørgrav 			if(i!=j && strcmp(cfg->out_ifs[i], cfg->out_ifs[j])==0)
424b7579f77SDag-Erling Smørgrav 				fatal_exit("outgoing-interface: %s present "
425b7579f77SDag-Erling Smørgrav 					"twice, cannot bind same ports twice.",
426b7579f77SDag-Erling Smørgrav 					cfg->out_ifs[i]);
427b7579f77SDag-Erling Smørgrav 		}
428b7579f77SDag-Erling Smørgrav 	}
429b7579f77SDag-Erling Smørgrav }
430b7579f77SDag-Erling Smørgrav 
431a39a5a69SCy Schubert /** check interface-automatic-ports */
432a39a5a69SCy Schubert static void
433a39a5a69SCy Schubert ifautomaticportschecks(char* ifautomaticports)
434a39a5a69SCy Schubert {
435a39a5a69SCy Schubert 	char* now = ifautomaticports;
436a39a5a69SCy Schubert 	while(now && *now) {
437a39a5a69SCy Schubert 		char* after;
438a39a5a69SCy Schubert 		int extraport;
439a39a5a69SCy Schubert 		while(isspace((unsigned char)*now))
440a39a5a69SCy Schubert 			now++;
441a39a5a69SCy Schubert 		if(!*now)
442a39a5a69SCy Schubert 			break;
443a39a5a69SCy Schubert 		after = now;
444a39a5a69SCy Schubert 		extraport = (int)strtol(now, &after, 10);
445a39a5a69SCy Schubert 		if(extraport < 0 || extraport > 65535)
446a39a5a69SCy Schubert 			fatal_exit("interface-automatic-ports: port out of range at position %d in '%s'", (int)(now-ifautomaticports)+1, ifautomaticports);
447a39a5a69SCy Schubert 		if(extraport == 0 && now == after)
448a39a5a69SCy Schubert 			fatal_exit("interface-automatic-ports: parse error at position %d in '%s'", (int)(now-ifautomaticports)+1, ifautomaticports);
449a39a5a69SCy Schubert 		now = after;
450a39a5a69SCy Schubert 	}
451a39a5a69SCy Schubert }
452a39a5a69SCy Schubert 
453b7579f77SDag-Erling Smørgrav /** check acl ips */
454b7579f77SDag-Erling Smørgrav static void
455b7579f77SDag-Erling Smørgrav aclchecks(struct config_file* cfg)
456b7579f77SDag-Erling Smørgrav {
457b7579f77SDag-Erling Smørgrav 	int d;
458b7579f77SDag-Erling Smørgrav 	struct sockaddr_storage a;
459b7579f77SDag-Erling Smørgrav 	socklen_t alen;
460b7579f77SDag-Erling Smørgrav 	struct config_str2list* acl;
461b7579f77SDag-Erling Smørgrav 	for(acl=cfg->acls; acl; acl = acl->next) {
462b7579f77SDag-Erling Smørgrav 		if(!netblockstrtoaddr(acl->str, UNBOUND_DNS_PORT, &a, &alen,
463b7579f77SDag-Erling Smørgrav 			&d)) {
464b7579f77SDag-Erling Smørgrav 			fatal_exit("cannot parse access control address %s %s",
465b7579f77SDag-Erling Smørgrav 				acl->str, acl->str2);
466b7579f77SDag-Erling Smørgrav 		}
467b7579f77SDag-Erling Smørgrav 	}
468b7579f77SDag-Erling Smørgrav }
469b7579f77SDag-Erling Smørgrav 
4704c75e3aaSDag-Erling Smørgrav /** check tcp connection limit ips */
4714c75e3aaSDag-Erling Smørgrav static void
4724c75e3aaSDag-Erling Smørgrav tcpconnlimitchecks(struct config_file* cfg)
4734c75e3aaSDag-Erling Smørgrav {
4744c75e3aaSDag-Erling Smørgrav 	int d;
4754c75e3aaSDag-Erling Smørgrav 	struct sockaddr_storage a;
4764c75e3aaSDag-Erling Smørgrav 	socklen_t alen;
4774c75e3aaSDag-Erling Smørgrav 	struct config_str2list* tcl;
4784c75e3aaSDag-Erling Smørgrav 	for(tcl=cfg->tcp_connection_limits; tcl; tcl = tcl->next) {
4794c75e3aaSDag-Erling Smørgrav 		if(!netblockstrtoaddr(tcl->str, UNBOUND_DNS_PORT, &a, &alen,
4804c75e3aaSDag-Erling Smørgrav 			&d)) {
4814c75e3aaSDag-Erling Smørgrav 			fatal_exit("cannot parse tcp connection limit address %s %s",
4824c75e3aaSDag-Erling Smørgrav 				tcl->str, tcl->str2);
4834c75e3aaSDag-Erling Smørgrav 		}
4844c75e3aaSDag-Erling Smørgrav 	}
4854c75e3aaSDag-Erling Smørgrav }
4864c75e3aaSDag-Erling Smørgrav 
487b7579f77SDag-Erling Smørgrav /** true if fname is a file */
488b7579f77SDag-Erling Smørgrav static int
489b7579f77SDag-Erling Smørgrav is_file(const char* fname)
490b7579f77SDag-Erling Smørgrav {
491b7579f77SDag-Erling Smørgrav 	struct stat buf;
492b7579f77SDag-Erling Smørgrav 	if(stat(fname, &buf) < 0) {
493b7579f77SDag-Erling Smørgrav 		if(errno==EACCES) {
494b7579f77SDag-Erling Smørgrav 			printf("warning: no search permission for one of the directories in path: %s\n", fname);
495b7579f77SDag-Erling Smørgrav 			return 1;
496b7579f77SDag-Erling Smørgrav 		}
497b7579f77SDag-Erling Smørgrav 		perror(fname);
498b7579f77SDag-Erling Smørgrav 		return 0;
499b7579f77SDag-Erling Smørgrav 	}
500b7579f77SDag-Erling Smørgrav 	if(S_ISDIR(buf.st_mode)) {
501b7579f77SDag-Erling Smørgrav 		printf("%s is not a file\n", fname);
502b7579f77SDag-Erling Smørgrav 		return 0;
503b7579f77SDag-Erling Smørgrav 	}
504b7579f77SDag-Erling Smørgrav 	return 1;
505b7579f77SDag-Erling Smørgrav }
506b7579f77SDag-Erling Smørgrav 
507b7579f77SDag-Erling Smørgrav /** true if fname is a directory */
508b7579f77SDag-Erling Smørgrav static int
509b7579f77SDag-Erling Smørgrav is_dir(const char* fname)
510b7579f77SDag-Erling Smørgrav {
511b7579f77SDag-Erling Smørgrav 	struct stat buf;
512b7579f77SDag-Erling Smørgrav 	if(stat(fname, &buf) < 0) {
513b7579f77SDag-Erling Smørgrav 		if(errno==EACCES) {
514b7579f77SDag-Erling Smørgrav 			printf("warning: no search permission for one of the directories in path: %s\n", fname);
515b7579f77SDag-Erling Smørgrav 			return 1;
516b7579f77SDag-Erling Smørgrav 		}
517b7579f77SDag-Erling Smørgrav 		perror(fname);
518b7579f77SDag-Erling Smørgrav 		return 0;
519b7579f77SDag-Erling Smørgrav 	}
520b7579f77SDag-Erling Smørgrav 	if(!(S_ISDIR(buf.st_mode))) {
521b7579f77SDag-Erling Smørgrav 		printf("%s is not a directory\n", fname);
522b7579f77SDag-Erling Smørgrav 		return 0;
523b7579f77SDag-Erling Smørgrav 	}
524b7579f77SDag-Erling Smørgrav 	return 1;
525b7579f77SDag-Erling Smørgrav }
526b7579f77SDag-Erling Smørgrav 
527b7579f77SDag-Erling Smørgrav /** get base dir of a fname */
528b7579f77SDag-Erling Smørgrav static char*
529b7579f77SDag-Erling Smørgrav basedir(char* fname)
530b7579f77SDag-Erling Smørgrav {
531b7579f77SDag-Erling Smørgrav 	char* rev;
532b7579f77SDag-Erling Smørgrav 	if(!fname) fatal_exit("out of memory");
533b7579f77SDag-Erling Smørgrav 	rev = strrchr(fname, '/');
534b7579f77SDag-Erling Smørgrav 	if(!rev) return NULL;
535b7579f77SDag-Erling Smørgrav 	if(fname == rev) return NULL;
536b7579f77SDag-Erling Smørgrav 	rev[0] = 0;
537b7579f77SDag-Erling Smørgrav 	return fname;
538b7579f77SDag-Erling Smørgrav }
539b7579f77SDag-Erling Smørgrav 
540b7579f77SDag-Erling Smørgrav /** check chroot for a file string */
541b7579f77SDag-Erling Smørgrav static void
542b7579f77SDag-Erling Smørgrav check_chroot_string(const char* desc, char** ss,
543b7579f77SDag-Erling Smørgrav 	const char* chrootdir, struct config_file* cfg)
544b7579f77SDag-Erling Smørgrav {
545b7579f77SDag-Erling Smørgrav 	char* str = *ss;
546b7579f77SDag-Erling Smørgrav 	if(str && str[0]) {
547b7579f77SDag-Erling Smørgrav 		*ss = fname_after_chroot(str, cfg, 1);
548b7579f77SDag-Erling Smørgrav 		if(!*ss) fatal_exit("out of memory");
549b7579f77SDag-Erling Smørgrav 		if(!is_file(*ss)) {
550b7579f77SDag-Erling Smørgrav 			if(chrootdir && chrootdir[0])
551b7579f77SDag-Erling Smørgrav 				fatal_exit("%s: \"%s\" does not exist in "
552b7579f77SDag-Erling Smørgrav 					"chrootdir %s", desc, str, chrootdir);
553b7579f77SDag-Erling Smørgrav 			else
554b7579f77SDag-Erling Smørgrav 				fatal_exit("%s: \"%s\" does not exist",
555b7579f77SDag-Erling Smørgrav 					desc, str);
556b7579f77SDag-Erling Smørgrav 		}
557b7579f77SDag-Erling Smørgrav 		/* put in a new full path for continued checking */
558b7579f77SDag-Erling Smørgrav 		free(str);
559b7579f77SDag-Erling Smørgrav 	}
560b7579f77SDag-Erling Smørgrav }
561b7579f77SDag-Erling Smørgrav 
562b7579f77SDag-Erling Smørgrav /** check file list, every file must be inside the chroot location */
563b7579f77SDag-Erling Smørgrav static void
564b7579f77SDag-Erling Smørgrav check_chroot_filelist(const char* desc, struct config_strlist* list,
565b7579f77SDag-Erling Smørgrav 	const char* chrootdir, struct config_file* cfg)
566b7579f77SDag-Erling Smørgrav {
567b7579f77SDag-Erling Smørgrav 	struct config_strlist* p;
568b7579f77SDag-Erling Smørgrav 	for(p=list; p; p=p->next) {
569b7579f77SDag-Erling Smørgrav 		check_chroot_string(desc, &p->str, chrootdir, cfg);
570b7579f77SDag-Erling Smørgrav 	}
571b7579f77SDag-Erling Smørgrav }
572b7579f77SDag-Erling Smørgrav 
573b7579f77SDag-Erling Smørgrav /** check file list, with wildcard processing */
574b7579f77SDag-Erling Smørgrav static void
575b7579f77SDag-Erling Smørgrav check_chroot_filelist_wild(const char* desc, struct config_strlist* list,
576b7579f77SDag-Erling Smørgrav 	const char* chrootdir, struct config_file* cfg)
577b7579f77SDag-Erling Smørgrav {
578b7579f77SDag-Erling Smørgrav 	struct config_strlist* p;
579b7579f77SDag-Erling Smørgrav 	for(p=list; p; p=p->next) {
580b7579f77SDag-Erling Smørgrav #ifdef HAVE_GLOB
581b7579f77SDag-Erling Smørgrav 		if(strchr(p->str, '*') || strchr(p->str, '[') ||
582b7579f77SDag-Erling Smørgrav 			strchr(p->str, '?') || strchr(p->str, '{') ||
583b7579f77SDag-Erling Smørgrav 			strchr(p->str, '~')) {
584b7579f77SDag-Erling Smørgrav 			char* s = p->str;
585b7579f77SDag-Erling Smørgrav 			/* adjust whole pattern for chroot and check later */
586b7579f77SDag-Erling Smørgrav 			p->str = fname_after_chroot(p->str, cfg, 1);
587b7579f77SDag-Erling Smørgrav 			free(s);
588b7579f77SDag-Erling Smørgrav 		} else
589b7579f77SDag-Erling Smørgrav #endif /* HAVE_GLOB */
590b7579f77SDag-Erling Smørgrav 			check_chroot_string(desc, &p->str, chrootdir, cfg);
591b7579f77SDag-Erling Smørgrav 	}
592b7579f77SDag-Erling Smørgrav }
593b7579f77SDag-Erling Smørgrav 
594971980c3SDag-Erling Smørgrav #ifdef CLIENT_SUBNET
595971980c3SDag-Erling Smørgrav /** check ECS configuration */
596971980c3SDag-Erling Smørgrav static void
597971980c3SDag-Erling Smørgrav ecs_conf_checks(struct config_file* cfg)
598971980c3SDag-Erling Smørgrav {
599971980c3SDag-Erling Smørgrav 	struct ecs_whitelist* whitelist = NULL;
600971980c3SDag-Erling Smørgrav 	if(!(whitelist = ecs_whitelist_create()))
601971980c3SDag-Erling Smørgrav 		fatal_exit("Could not create ednssubnet whitelist: out of memory");
602971980c3SDag-Erling Smørgrav         if(!ecs_whitelist_apply_cfg(whitelist, cfg))
603971980c3SDag-Erling Smørgrav 		fatal_exit("Could not setup ednssubnet whitelist");
604971980c3SDag-Erling Smørgrav 	ecs_whitelist_delete(whitelist);
605971980c3SDag-Erling Smørgrav }
606971980c3SDag-Erling Smørgrav #endif /* CLIENT_SUBNET */
607971980c3SDag-Erling Smørgrav 
6084c75e3aaSDag-Erling Smørgrav /** check that the modules exist, are compiled in */
6094c75e3aaSDag-Erling Smørgrav static void
6104c75e3aaSDag-Erling Smørgrav check_modules_exist(const char* module_conf)
6114c75e3aaSDag-Erling Smørgrav {
6124c75e3aaSDag-Erling Smørgrav 	const char** names = module_list_avail();
6134c75e3aaSDag-Erling Smørgrav 	const char* s = module_conf;
6144c75e3aaSDag-Erling Smørgrav 	while(*s) {
6154c75e3aaSDag-Erling Smørgrav 		int i = 0;
6164c75e3aaSDag-Erling Smørgrav 		int is_ok = 0;
6174c75e3aaSDag-Erling Smørgrav 		while(*s && isspace((unsigned char)*s))
6184c75e3aaSDag-Erling Smørgrav 			s++;
6194c75e3aaSDag-Erling Smørgrav 		if(!*s) break;
6204c75e3aaSDag-Erling Smørgrav 		while(names[i]) {
6214c75e3aaSDag-Erling Smørgrav 			if(strncmp(names[i], s, strlen(names[i])) == 0) {
6224c75e3aaSDag-Erling Smørgrav 				is_ok = 1;
6234c75e3aaSDag-Erling Smørgrav 				break;
6244c75e3aaSDag-Erling Smørgrav 			}
6254c75e3aaSDag-Erling Smørgrav 			i++;
6264c75e3aaSDag-Erling Smørgrav 		}
6274c75e3aaSDag-Erling Smørgrav 		if(is_ok == 0) {
6284c75e3aaSDag-Erling Smørgrav 			char n[64];
6294c75e3aaSDag-Erling Smørgrav 			size_t j;
6304c75e3aaSDag-Erling Smørgrav 			n[0]=0;
6314c75e3aaSDag-Erling Smørgrav 			n[sizeof(n)-1]=0;
6324c75e3aaSDag-Erling Smørgrav 			for(j=0; j<sizeof(n)-1; j++) {
6334c75e3aaSDag-Erling Smørgrav 				if(!s[j] || isspace((unsigned char)s[j])) {
6344c75e3aaSDag-Erling Smørgrav 					n[j] = 0;
6354c75e3aaSDag-Erling Smørgrav 					break;
6364c75e3aaSDag-Erling Smørgrav 				}
6374c75e3aaSDag-Erling Smørgrav 				n[j] = s[j];
6384c75e3aaSDag-Erling Smørgrav 			}
6394c75e3aaSDag-Erling Smørgrav 			fatal_exit("module_conf lists module '%s' but that "
6404c75e3aaSDag-Erling Smørgrav 				"module is not available.", n);
6414c75e3aaSDag-Erling Smørgrav 		}
6424c75e3aaSDag-Erling Smørgrav 		s += strlen(names[i]);
6434c75e3aaSDag-Erling Smørgrav 	}
6444c75e3aaSDag-Erling Smørgrav }
6454c75e3aaSDag-Erling Smørgrav 
646b7579f77SDag-Erling Smørgrav /** check configuration for errors */
647b7579f77SDag-Erling Smørgrav static void
648e86b9096SDag-Erling Smørgrav morechecks(struct config_file* cfg)
649b7579f77SDag-Erling Smørgrav {
650b7579f77SDag-Erling Smørgrav 	warn_hosts("stub-host", cfg->stubs);
651b7579f77SDag-Erling Smørgrav 	warn_hosts("forward-host", cfg->forwards);
652b7579f77SDag-Erling Smørgrav 	interfacechecks(cfg);
653a39a5a69SCy Schubert 	ifautomaticportschecks(cfg->if_automatic_ports);
654b7579f77SDag-Erling Smørgrav 	aclchecks(cfg);
6554c75e3aaSDag-Erling Smørgrav 	tcpconnlimitchecks(cfg);
656b7579f77SDag-Erling Smørgrav 
657b7579f77SDag-Erling Smørgrav 	if(cfg->verbosity < 0)
658b7579f77SDag-Erling Smørgrav 		fatal_exit("verbosity value < 0");
659b7579f77SDag-Erling Smørgrav 	if(cfg->num_threads <= 0 || cfg->num_threads > 10000)
660b7579f77SDag-Erling Smørgrav 		fatal_exit("num_threads value weird");
661b7579f77SDag-Erling Smørgrav 	if(!cfg->do_ip4 && !cfg->do_ip6)
662b7579f77SDag-Erling Smørgrav 		fatal_exit("ip4 and ip6 are both disabled, pointless");
66325039b37SCy Schubert 	if(!cfg->do_ip4 && cfg->prefer_ip4)
66425039b37SCy Schubert 		fatal_exit("cannot prefer and disable ip4, pointless");
665b5663de9SDag-Erling Smørgrav 	if(!cfg->do_ip6 && cfg->prefer_ip6)
666b5663de9SDag-Erling Smørgrav 		fatal_exit("cannot prefer and disable ip6, pointless");
667b7579f77SDag-Erling Smørgrav 	if(!cfg->do_udp && !cfg->do_tcp)
668b7579f77SDag-Erling Smørgrav 		fatal_exit("udp and tcp are both disabled, pointless");
669b7579f77SDag-Erling Smørgrav 	if(cfg->edns_buffer_size > cfg->msg_buffer_size)
670b7579f77SDag-Erling Smørgrav 		fatal_exit("edns-buffer-size larger than msg-buffer-size, "
671b7579f77SDag-Erling Smørgrav 			"answers will not fit in processing buffer");
67205ab2901SDag-Erling Smørgrav #ifdef UB_ON_WINDOWS
67305ab2901SDag-Erling Smørgrav 	w_config_adjust_directory(cfg);
67405ab2901SDag-Erling Smørgrav #endif
675b7579f77SDag-Erling Smørgrav 	if(cfg->chrootdir && cfg->chrootdir[0] &&
676b7579f77SDag-Erling Smørgrav 		cfg->chrootdir[strlen(cfg->chrootdir)-1] == '/')
677b7579f77SDag-Erling Smørgrav 		fatal_exit("chootdir %s has trailing slash '/' please remove.",
678b7579f77SDag-Erling Smørgrav 			cfg->chrootdir);
679b7579f77SDag-Erling Smørgrav 	if(cfg->chrootdir && cfg->chrootdir[0] &&
680b7579f77SDag-Erling Smørgrav 		!is_dir(cfg->chrootdir)) {
681b7579f77SDag-Erling Smørgrav 		fatal_exit("bad chroot directory");
682b7579f77SDag-Erling Smørgrav 	}
683b7579f77SDag-Erling Smørgrav 	if(cfg->directory && cfg->directory[0]) {
684b7579f77SDag-Erling Smørgrav 		char* ad = fname_after_chroot(cfg->directory, cfg, 0);
685b7579f77SDag-Erling Smørgrav 		if(!ad) fatal_exit("out of memory");
686b7579f77SDag-Erling Smørgrav 		if(!is_dir(ad)) fatal_exit("bad chdir directory");
687b7579f77SDag-Erling Smørgrav 		free(ad);
688b7579f77SDag-Erling Smørgrav 	}
689b7579f77SDag-Erling Smørgrav 	if( (cfg->chrootdir && cfg->chrootdir[0]) ||
690b7579f77SDag-Erling Smørgrav 	    (cfg->directory && cfg->directory[0])) {
691b7579f77SDag-Erling Smørgrav 		if(cfg->pidfile && cfg->pidfile[0]) {
692b7579f77SDag-Erling Smørgrav 			char* ad = (cfg->pidfile[0]=='/')?strdup(cfg->pidfile):
693b7579f77SDag-Erling Smørgrav 				fname_after_chroot(cfg->pidfile, cfg, 1);
694b7579f77SDag-Erling Smørgrav 			char* bd = basedir(ad);
695b7579f77SDag-Erling Smørgrav 			if(bd && !is_dir(bd))
696b7579f77SDag-Erling Smørgrav 				fatal_exit("pidfile directory does not exist");
697b7579f77SDag-Erling Smørgrav 			free(ad);
698b7579f77SDag-Erling Smørgrav 		}
699b7579f77SDag-Erling Smørgrav 		if(cfg->logfile && cfg->logfile[0]) {
700b7579f77SDag-Erling Smørgrav 			char* ad = fname_after_chroot(cfg->logfile, cfg, 1);
701b7579f77SDag-Erling Smørgrav 			char* bd = basedir(ad);
702b7579f77SDag-Erling Smørgrav 			if(bd && !is_dir(bd))
703b7579f77SDag-Erling Smørgrav 				fatal_exit("logfile directory does not exist");
704b7579f77SDag-Erling Smørgrav 			free(ad);
705b7579f77SDag-Erling Smørgrav 		}
706b7579f77SDag-Erling Smørgrav 	}
707b7579f77SDag-Erling Smørgrav 
708b7579f77SDag-Erling Smørgrav 	check_chroot_filelist("file with root-hints",
709b7579f77SDag-Erling Smørgrav 		cfg->root_hints, cfg->chrootdir, cfg);
710b7579f77SDag-Erling Smørgrav 	check_chroot_filelist("trust-anchor-file",
711b7579f77SDag-Erling Smørgrav 		cfg->trust_anchor_file_list, cfg->chrootdir, cfg);
712b7579f77SDag-Erling Smørgrav 	check_chroot_filelist("auto-trust-anchor-file",
713b7579f77SDag-Erling Smørgrav 		cfg->auto_trust_anchor_file_list, cfg->chrootdir, cfg);
714b7579f77SDag-Erling Smørgrav 	check_chroot_filelist_wild("trusted-keys-file",
715b7579f77SDag-Erling Smørgrav 		cfg->trusted_keys_file_list, cfg->chrootdir, cfg);
716103ba509SCy Schubert 	if(cfg->disable_edns_do && strstr(cfg->module_conf, "validator")
717103ba509SCy Schubert 		&& (cfg->trust_anchor_file_list
718103ba509SCy Schubert 		|| cfg->trust_anchor_list
719103ba509SCy Schubert 		|| cfg->auto_trust_anchor_file_list
720103ba509SCy Schubert 		|| cfg->trusted_keys_file_list)) {
721103ba509SCy Schubert 		char* key = NULL;
722103ba509SCy Schubert 		if(cfg->auto_trust_anchor_file_list)
723103ba509SCy Schubert 			key = cfg->auto_trust_anchor_file_list->str;
724103ba509SCy Schubert 		if(!key && cfg->trust_anchor_file_list)
725103ba509SCy Schubert 			key = cfg->trust_anchor_file_list->str;
726103ba509SCy Schubert 		if(!key && cfg->trust_anchor_list)
727103ba509SCy Schubert 			key = cfg->trust_anchor_list->str;
728103ba509SCy Schubert 		if(!key && cfg->trusted_keys_file_list)
729103ba509SCy Schubert 			key = cfg->trusted_keys_file_list->str;
730103ba509SCy Schubert 		if(!key) key = "";
731103ba509SCy Schubert 		fatal_exit("disable-edns-do does not allow DNSSEC to work, but the validator module uses a trust anchor %s, turn off disable-edns-do or disable validation", key);
732103ba509SCy Schubert 	}
733c7f4d7adSDag-Erling Smørgrav #ifdef USE_IPSECMOD
734971980c3SDag-Erling Smørgrav 	if(cfg->ipsecmod_enabled && strstr(cfg->module_conf, "ipsecmod")) {
735971980c3SDag-Erling Smørgrav 		/* only check hook if enabled */
736971980c3SDag-Erling Smørgrav 		check_chroot_string("ipsecmod-hook", &cfg->ipsecmod_hook,
737971980c3SDag-Erling Smørgrav 			cfg->chrootdir, cfg);
738971980c3SDag-Erling Smørgrav 	}
739c7f4d7adSDag-Erling Smørgrav #endif
740b7579f77SDag-Erling Smørgrav 	/* remove chroot setting so that modules are not stripping pathnames */
741b7579f77SDag-Erling Smørgrav 	free(cfg->chrootdir);
742b7579f77SDag-Erling Smørgrav 	cfg->chrootdir = NULL;
743b7579f77SDag-Erling Smørgrav 
7444c75e3aaSDag-Erling Smørgrav 	/* check that the modules listed in module_conf exist */
7454c75e3aaSDag-Erling Smørgrav 	check_modules_exist(cfg->module_conf);
7464c75e3aaSDag-Erling Smørgrav 
747091e9e46SCy Schubert 	/* Respip is known to *not* work with dns64. */
748b7579f77SDag-Erling Smørgrav 	if(strcmp(cfg->module_conf, "iterator") != 0
749b7579f77SDag-Erling Smørgrav 		&& strcmp(cfg->module_conf, "validator iterator") != 0
750ff825849SDag-Erling Smørgrav 		&& strcmp(cfg->module_conf, "dns64 validator iterator") != 0
751ff825849SDag-Erling Smørgrav 		&& strcmp(cfg->module_conf, "dns64 iterator") != 0
75265b390aaSDag-Erling Smørgrav 		&& strcmp(cfg->module_conf, "respip iterator") != 0
75365b390aaSDag-Erling Smørgrav 		&& strcmp(cfg->module_conf, "respip validator iterator") != 0
7549cf5bc93SCy Schubert 		&& strcmp(cfg->module_conf, "respip dns64 validator iterator") != 0
7559cf5bc93SCy Schubert 		&& strcmp(cfg->module_conf, "respip dns64 iterator") != 0
756b7579f77SDag-Erling Smørgrav #ifdef WITH_PYTHONMODULE
757b7579f77SDag-Erling Smørgrav 		&& strcmp(cfg->module_conf, "python iterator") != 0
758091e9e46SCy Schubert 		&& strcmp(cfg->module_conf, "python respip iterator") != 0
759b7579f77SDag-Erling Smørgrav 		&& strcmp(cfg->module_conf, "python validator iterator") != 0
760091e9e46SCy Schubert 		&& strcmp(cfg->module_conf, "python respip validator iterator") != 0
761b7579f77SDag-Erling Smørgrav 		&& strcmp(cfg->module_conf, "validator python iterator") != 0
762ff825849SDag-Erling Smørgrav 		&& strcmp(cfg->module_conf, "dns64 python iterator") != 0
763ff825849SDag-Erling Smørgrav 		&& strcmp(cfg->module_conf, "dns64 python validator iterator") != 0
764ff825849SDag-Erling Smørgrav 		&& strcmp(cfg->module_conf, "dns64 validator python iterator") != 0
765ff825849SDag-Erling Smørgrav 		&& strcmp(cfg->module_conf, "python dns64 iterator") != 0
766ff825849SDag-Erling Smørgrav 		&& strcmp(cfg->module_conf, "python dns64 validator iterator") != 0
767b7579f77SDag-Erling Smørgrav #endif
76825039b37SCy Schubert #ifdef WITH_DYNLIBMODULE
76925039b37SCy Schubert 		&& strcmp(cfg->module_conf, "dynlib iterator") != 0
77025039b37SCy Schubert 		&& strcmp(cfg->module_conf, "dynlib dynlib iterator") != 0
77125039b37SCy Schubert 		&& strcmp(cfg->module_conf, "dynlib dynlib dynlib iterator") != 0
77225039b37SCy Schubert 		&& strcmp(cfg->module_conf, "python dynlib iterator") != 0
77325039b37SCy Schubert 		&& strcmp(cfg->module_conf, "python dynlib dynlib iterator") != 0
77425039b37SCy Schubert 		&& strcmp(cfg->module_conf, "python dynlib dynlib dynlib iterator") != 0
77525039b37SCy Schubert 		&& strcmp(cfg->module_conf, "dynlib respip iterator") != 0
77625039b37SCy Schubert 		&& strcmp(cfg->module_conf, "dynlib validator iterator") != 0
77725039b37SCy Schubert 		&& strcmp(cfg->module_conf, "dynlib dynlib validator iterator") != 0
77825039b37SCy Schubert 		&& strcmp(cfg->module_conf, "dynlib dynlib dynlib validator iterator") != 0
77925039b37SCy Schubert 		&& strcmp(cfg->module_conf, "python dynlib validator iterator") != 0
78025039b37SCy Schubert 		&& strcmp(cfg->module_conf, "python dynlib dynlib validator iterator") != 0
78125039b37SCy Schubert 		&& strcmp(cfg->module_conf, "python dynlib dynlib dynlib validator iterator") != 0
78225039b37SCy Schubert 		&& strcmp(cfg->module_conf, "dynlib respip validator iterator") != 0
78325039b37SCy Schubert 		&& strcmp(cfg->module_conf, "validator dynlib iterator") != 0
78425039b37SCy Schubert 		&& strcmp(cfg->module_conf, "dns64 dynlib iterator") != 0
78525039b37SCy Schubert 		&& strcmp(cfg->module_conf, "dns64 dynlib validator iterator") != 0
78625039b37SCy Schubert 		&& strcmp(cfg->module_conf, "dns64 validator dynlib iterator") != 0
78725039b37SCy Schubert 		&& strcmp(cfg->module_conf, "dynlib dns64 iterator") != 0
78825039b37SCy Schubert 		&& strcmp(cfg->module_conf, "dynlib dns64 validator iterator") != 0
78925039b37SCy Schubert 		&& strcmp(cfg->module_conf, "dynlib dns64 cachedb iterator") != 0
79025039b37SCy Schubert 		&& strcmp(cfg->module_conf, "dynlib dns64 validator cachedb iterator") != 0
79125039b37SCy Schubert 		&& strcmp(cfg->module_conf, "dns64 dynlib cachedb iterator") != 0
79225039b37SCy Schubert 		&& strcmp(cfg->module_conf, "dns64 dynlib validator cachedb iterator") != 0
79325039b37SCy Schubert 		&& strcmp(cfg->module_conf, "dynlib cachedb iterator") != 0
79425039b37SCy Schubert 		&& strcmp(cfg->module_conf, "dynlib respip cachedb iterator") != 0
79525039b37SCy Schubert 		&& strcmp(cfg->module_conf, "dynlib validator cachedb iterator") != 0
79625039b37SCy Schubert 		&& strcmp(cfg->module_conf, "dynlib respip validator cachedb iterator") != 0
79725039b37SCy Schubert 		&& strcmp(cfg->module_conf, "cachedb dynlib iterator") != 0
79825039b37SCy Schubert 		&& strcmp(cfg->module_conf, "respip cachedb dynlib iterator") != 0
79925039b37SCy Schubert 		&& strcmp(cfg->module_conf, "validator cachedb dynlib iterator") != 0
80025039b37SCy Schubert 		&& strcmp(cfg->module_conf, "respip validator cachedb dynlib iterator") != 0
80125039b37SCy Schubert 		&& strcmp(cfg->module_conf, "validator dynlib cachedb iterator") != 0
80225039b37SCy Schubert 		&& strcmp(cfg->module_conf, "respip validator dynlib cachedb iterator") != 0
80325039b37SCy Schubert 		&& strcmp(cfg->module_conf, "dynlib subnetcache iterator") != 0
80425039b37SCy Schubert 		&& strcmp(cfg->module_conf, "dynlib respip subnetcache iterator") != 0
80525039b37SCy Schubert 		&& strcmp(cfg->module_conf, "subnetcache dynlib iterator") != 0
80625039b37SCy Schubert 		&& strcmp(cfg->module_conf, "respip subnetcache dynlib iterator") != 0
80725039b37SCy Schubert 		&& strcmp(cfg->module_conf, "dynlib subnetcache validator iterator") != 0
80825039b37SCy Schubert 		&& strcmp(cfg->module_conf, "dynlib respip subnetcache validator iterator") != 0
80925039b37SCy Schubert 		&& strcmp(cfg->module_conf, "subnetcache dynlib validator iterator") != 0
81025039b37SCy Schubert 		&& strcmp(cfg->module_conf, "respip subnetcache dynlib validator iterator") != 0
81125039b37SCy Schubert 		&& strcmp(cfg->module_conf, "subnetcache validator dynlib iterator") != 0
81225039b37SCy Schubert 		&& strcmp(cfg->module_conf, "respip subnetcache validator dynlib iterator") != 0
81325039b37SCy Schubert 		&& strcmp(cfg->module_conf, "dynlib ipsecmod iterator") != 0
81425039b37SCy Schubert 		&& strcmp(cfg->module_conf, "dynlib ipsecmod respip iterator") != 0
81525039b37SCy Schubert 		&& strcmp(cfg->module_conf, "ipsecmod dynlib iterator") != 0
81625039b37SCy Schubert 		&& strcmp(cfg->module_conf, "ipsecmod dynlib respip iterator") != 0
81725039b37SCy Schubert 		&& strcmp(cfg->module_conf, "ipsecmod validator iterator") != 0
81825039b37SCy Schubert 		&& strcmp(cfg->module_conf, "ipsecmod respip validator iterator") != 0
81925039b37SCy Schubert 		&& strcmp(cfg->module_conf, "dynlib ipsecmod validator iterator") != 0
82025039b37SCy Schubert 		&& strcmp(cfg->module_conf, "dynlib ipsecmod respip validator iterator") != 0
82125039b37SCy Schubert 		&& strcmp(cfg->module_conf, "ipsecmod dynlib validator iterator") != 0
82225039b37SCy Schubert 		&& strcmp(cfg->module_conf, "ipsecmod dynlib respip validator iterator") != 0
82325039b37SCy Schubert 		&& strcmp(cfg->module_conf, "ipsecmod validator dynlib iterator") != 0
82425039b37SCy Schubert 		&& strcmp(cfg->module_conf, "ipsecmod respip validator dynlib iterator") != 0
82525039b37SCy Schubert #endif
826e2d15004SDag-Erling Smørgrav #ifdef USE_CACHEDB
827e2d15004SDag-Erling Smørgrav 		&& strcmp(cfg->module_conf, "validator cachedb iterator") != 0
828091e9e46SCy Schubert 		&& strcmp(cfg->module_conf, "respip validator cachedb iterator") != 0
829e2d15004SDag-Erling Smørgrav 		&& strcmp(cfg->module_conf, "cachedb iterator") != 0
830091e9e46SCy Schubert 		&& strcmp(cfg->module_conf, "respip cachedb iterator") != 0
831e2d15004SDag-Erling Smørgrav 		&& strcmp(cfg->module_conf, "dns64 validator cachedb iterator") != 0
832e2d15004SDag-Erling Smørgrav 		&& strcmp(cfg->module_conf, "dns64 cachedb iterator") != 0
83365b390aaSDag-Erling Smørgrav #endif
83465b390aaSDag-Erling Smørgrav #if defined(WITH_PYTHONMODULE) && defined(USE_CACHEDB)
835e2d15004SDag-Erling Smørgrav 		&& strcmp(cfg->module_conf, "python dns64 cachedb iterator") != 0
836e2d15004SDag-Erling Smørgrav 		&& strcmp(cfg->module_conf, "python dns64 validator cachedb iterator") != 0
837e2d15004SDag-Erling Smørgrav 		&& strcmp(cfg->module_conf, "dns64 python cachedb iterator") != 0
838e2d15004SDag-Erling Smørgrav 		&& strcmp(cfg->module_conf, "dns64 python validator cachedb iterator") != 0
839e2d15004SDag-Erling Smørgrav 		&& strcmp(cfg->module_conf, "python cachedb iterator") != 0
840091e9e46SCy Schubert 		&& strcmp(cfg->module_conf, "python respip cachedb iterator") != 0
841e2d15004SDag-Erling Smørgrav 		&& strcmp(cfg->module_conf, "python validator cachedb iterator") != 0
842091e9e46SCy Schubert 		&& strcmp(cfg->module_conf, "python respip validator cachedb iterator") != 0
843e2d15004SDag-Erling Smørgrav 		&& strcmp(cfg->module_conf, "cachedb python iterator") != 0
844091e9e46SCy Schubert 		&& strcmp(cfg->module_conf, "respip cachedb python iterator") != 0
845e2d15004SDag-Erling Smørgrav 		&& strcmp(cfg->module_conf, "validator cachedb python iterator") != 0
846091e9e46SCy Schubert 		&& strcmp(cfg->module_conf, "respip validator cachedb python iterator") != 0
847e2d15004SDag-Erling Smørgrav 		&& strcmp(cfg->module_conf, "validator python cachedb iterator") != 0
848091e9e46SCy Schubert 		&& strcmp(cfg->module_conf, "respip validator python cachedb iterator") != 0
849e2d15004SDag-Erling Smørgrav #endif
8509cf5bc93SCy Schubert #if defined(CLIENT_SUBNET) && defined(USE_CACHEDB)
8519cf5bc93SCy Schubert 		&& strcmp(cfg->module_conf, "respip subnetcache validator cachedb iterator") != 0
8529cf5bc93SCy Schubert 		&& strcmp(cfg->module_conf, "subnetcache validator cachedb iterator") != 0
8539cf5bc93SCy Schubert #endif
85465b390aaSDag-Erling Smørgrav #ifdef CLIENT_SUBNET
85565b390aaSDag-Erling Smørgrav 		&& strcmp(cfg->module_conf, "subnetcache iterator") != 0
856091e9e46SCy Schubert 		&& strcmp(cfg->module_conf, "respip subnetcache iterator") != 0
85765b390aaSDag-Erling Smørgrav 		&& strcmp(cfg->module_conf, "subnetcache validator iterator") != 0
858091e9e46SCy Schubert 		&& strcmp(cfg->module_conf, "respip subnetcache validator iterator") != 0
859971980c3SDag-Erling Smørgrav 		&& strcmp(cfg->module_conf, "dns64 subnetcache iterator") != 0
860971980c3SDag-Erling Smørgrav 		&& strcmp(cfg->module_conf, "dns64 subnetcache validator iterator") != 0
86125039b37SCy Schubert 		&& strcmp(cfg->module_conf, "dns64 subnetcache respip iterator") != 0
86225039b37SCy Schubert 		&& strcmp(cfg->module_conf, "dns64 subnetcache respip validator iterator") != 0
86365b390aaSDag-Erling Smørgrav #endif
86465b390aaSDag-Erling Smørgrav #if defined(WITH_PYTHONMODULE) && defined(CLIENT_SUBNET)
86565b390aaSDag-Erling Smørgrav 		&& strcmp(cfg->module_conf, "python subnetcache iterator") != 0
866091e9e46SCy Schubert 		&& strcmp(cfg->module_conf, "python respip subnetcache iterator") != 0
86765b390aaSDag-Erling Smørgrav 		&& strcmp(cfg->module_conf, "subnetcache python iterator") != 0
868091e9e46SCy Schubert 		&& strcmp(cfg->module_conf, "respip subnetcache python iterator") != 0
86965b390aaSDag-Erling Smørgrav 		&& strcmp(cfg->module_conf, "python subnetcache validator iterator") != 0
870091e9e46SCy Schubert 		&& strcmp(cfg->module_conf, "python respip subnetcache validator iterator") != 0
87165b390aaSDag-Erling Smørgrav 		&& strcmp(cfg->module_conf, "subnetcache python validator iterator") != 0
872091e9e46SCy Schubert 		&& strcmp(cfg->module_conf, "respip subnetcache python validator iterator") != 0
87365b390aaSDag-Erling Smørgrav 		&& strcmp(cfg->module_conf, "subnetcache validator python iterator") != 0
874091e9e46SCy Schubert 		&& strcmp(cfg->module_conf, "respip subnetcache validator python iterator") != 0
87565b390aaSDag-Erling Smørgrav #endif
876c7f4d7adSDag-Erling Smørgrav #ifdef USE_IPSECMOD
877c7f4d7adSDag-Erling Smørgrav 		&& strcmp(cfg->module_conf, "ipsecmod iterator") != 0
878091e9e46SCy Schubert 		&& strcmp(cfg->module_conf, "ipsecmod respip iterator") != 0
879c7f4d7adSDag-Erling Smørgrav 		&& strcmp(cfg->module_conf, "ipsecmod validator iterator") != 0
880091e9e46SCy Schubert 		&& strcmp(cfg->module_conf, "ipsecmod respip validator iterator") != 0
881c7f4d7adSDag-Erling Smørgrav #endif
882c7f4d7adSDag-Erling Smørgrav #if defined(WITH_PYTHONMODULE) && defined(USE_IPSECMOD)
883c7f4d7adSDag-Erling Smørgrav 		&& strcmp(cfg->module_conf, "python ipsecmod iterator") != 0
884091e9e46SCy Schubert 		&& strcmp(cfg->module_conf, "python ipsecmod respip iterator") != 0
885c7f4d7adSDag-Erling Smørgrav 		&& strcmp(cfg->module_conf, "ipsecmod python iterator") != 0
886091e9e46SCy Schubert 		&& strcmp(cfg->module_conf, "ipsecmod python respip iterator") != 0
887c7f4d7adSDag-Erling Smørgrav 		&& strcmp(cfg->module_conf, "ipsecmod validator iterator") != 0
888091e9e46SCy Schubert 		&& strcmp(cfg->module_conf, "ipsecmod respip validator iterator") != 0
889c7f4d7adSDag-Erling Smørgrav 		&& strcmp(cfg->module_conf, "python ipsecmod validator iterator") != 0
890091e9e46SCy Schubert 		&& strcmp(cfg->module_conf, "python ipsecmod respip validator iterator") != 0
891c7f4d7adSDag-Erling Smørgrav 		&& strcmp(cfg->module_conf, "ipsecmod python validator iterator") != 0
892091e9e46SCy Schubert 		&& strcmp(cfg->module_conf, "ipsecmod python respip validator iterator") != 0
893c7f4d7adSDag-Erling Smørgrav 		&& strcmp(cfg->module_conf, "ipsecmod validator python iterator") != 0
894091e9e46SCy Schubert 		&& strcmp(cfg->module_conf, "ipsecmod respip validator python iterator") != 0
895c7f4d7adSDag-Erling Smørgrav #endif
8960eefd307SCy Schubert #ifdef USE_IPSET
8970eefd307SCy Schubert 		&& strcmp(cfg->module_conf, "validator ipset iterator") != 0
898091e9e46SCy Schubert 		&& strcmp(cfg->module_conf, "validator ipset respip iterator") != 0
8990eefd307SCy Schubert 		&& strcmp(cfg->module_conf, "ipset iterator") != 0
900091e9e46SCy Schubert 		&& strcmp(cfg->module_conf, "ipset respip iterator") != 0
9010eefd307SCy Schubert #endif
902b7579f77SDag-Erling Smørgrav 		) {
903b7579f77SDag-Erling Smørgrav 		fatal_exit("module conf '%s' is not known to work",
904b7579f77SDag-Erling Smørgrav 			cfg->module_conf);
905b7579f77SDag-Erling Smørgrav 	}
906b7579f77SDag-Erling Smørgrav 
907b7579f77SDag-Erling Smørgrav #ifdef HAVE_GETPWNAM
908b7579f77SDag-Erling Smørgrav 	if(cfg->username && cfg->username[0]) {
909b7579f77SDag-Erling Smørgrav 		if(getpwnam(cfg->username) == NULL)
910b7579f77SDag-Erling Smørgrav 			fatal_exit("user '%s' does not exist.", cfg->username);
911b5663de9SDag-Erling Smørgrav #  ifdef HAVE_ENDPWENT
912b7579f77SDag-Erling Smørgrav 		endpwent();
913b5663de9SDag-Erling Smørgrav #  endif
914b7579f77SDag-Erling Smørgrav 	}
915b7579f77SDag-Erling Smørgrav #endif
9167da0adf7SDag-Erling Smørgrav 	if(cfg->remote_control_enable && options_remote_is_address(cfg)
9177da0adf7SDag-Erling Smørgrav 		&& cfg->control_use_cert) {
918b7579f77SDag-Erling Smørgrav 		check_chroot_string("server-key-file", &cfg->server_key_file,
919b7579f77SDag-Erling Smørgrav 			cfg->chrootdir, cfg);
920b7579f77SDag-Erling Smørgrav 		check_chroot_string("server-cert-file", &cfg->server_cert_file,
921b7579f77SDag-Erling Smørgrav 			cfg->chrootdir, cfg);
922b7579f77SDag-Erling Smørgrav 		if(!is_file(cfg->control_key_file))
923b7579f77SDag-Erling Smørgrav 			fatal_exit("control-key-file: \"%s\" does not exist",
924b7579f77SDag-Erling Smørgrav 				cfg->control_key_file);
925b7579f77SDag-Erling Smørgrav 		if(!is_file(cfg->control_cert_file))
926b7579f77SDag-Erling Smørgrav 			fatal_exit("control-cert-file: \"%s\" does not exist",
927b7579f77SDag-Erling Smørgrav 				cfg->control_cert_file);
928b7579f77SDag-Erling Smørgrav 	}
929b7579f77SDag-Erling Smørgrav 
9300eefd307SCy Schubert 	donotquerylocalhostcheck(cfg);
931b7579f77SDag-Erling Smørgrav 	localzonechecks(cfg);
93265b390aaSDag-Erling Smørgrav 	view_and_respipchecks(cfg);
933971980c3SDag-Erling Smørgrav #ifdef CLIENT_SUBNET
934971980c3SDag-Erling Smørgrav 	ecs_conf_checks(cfg);
935971980c3SDag-Erling Smørgrav #endif
936b7579f77SDag-Erling Smørgrav }
937b7579f77SDag-Erling Smørgrav 
938b7579f77SDag-Erling Smørgrav /** check forwards */
939b7579f77SDag-Erling Smørgrav static void
940b7579f77SDag-Erling Smørgrav check_fwd(struct config_file* cfg)
941b7579f77SDag-Erling Smørgrav {
942b7579f77SDag-Erling Smørgrav 	struct iter_forwards* fwd = forwards_create();
943b7579f77SDag-Erling Smørgrav 	if(!fwd || !forwards_apply_cfg(fwd, cfg)) {
944b7579f77SDag-Erling Smørgrav 		fatal_exit("Could not set forward zones");
945b7579f77SDag-Erling Smørgrav 	}
946b7579f77SDag-Erling Smørgrav 	forwards_delete(fwd);
947b7579f77SDag-Erling Smørgrav }
948b7579f77SDag-Erling Smørgrav 
949b7579f77SDag-Erling Smørgrav /** check hints */
950b7579f77SDag-Erling Smørgrav static void
951b7579f77SDag-Erling Smørgrav check_hints(struct config_file* cfg)
952b7579f77SDag-Erling Smørgrav {
953b7579f77SDag-Erling Smørgrav 	struct iter_hints* hints = hints_create();
954b7579f77SDag-Erling Smørgrav 	if(!hints || !hints_apply_cfg(hints, cfg)) {
955b7579f77SDag-Erling Smørgrav 		fatal_exit("Could not set root or stub hints");
956b7579f77SDag-Erling Smørgrav 	}
957b7579f77SDag-Erling Smørgrav 	hints_delete(hints);
958b7579f77SDag-Erling Smørgrav }
959b7579f77SDag-Erling Smørgrav 
96057bddd21SDag-Erling Smørgrav /** check auth zones */
96157bddd21SDag-Erling Smørgrav static void
96257bddd21SDag-Erling Smørgrav check_auth(struct config_file* cfg)
96357bddd21SDag-Erling Smørgrav {
964091e9e46SCy Schubert 	int is_rpz = 0;
96557bddd21SDag-Erling Smørgrav 	struct auth_zones* az = auth_zones_create();
9665469a995SCy Schubert 	if(!az || !auth_zones_apply_cfg(az, cfg, 0, &is_rpz, NULL, NULL)) {
96757bddd21SDag-Erling Smørgrav 		fatal_exit("Could not setup authority zones");
96857bddd21SDag-Erling Smørgrav 	}
96957bddd21SDag-Erling Smørgrav 	auth_zones_delete(az);
97057bddd21SDag-Erling Smørgrav }
97157bddd21SDag-Erling Smørgrav 
972b7579f77SDag-Erling Smørgrav /** check config file */
973b7579f77SDag-Erling Smørgrav static void
974335c7cdaSCy Schubert checkconf(const char* cfgfile, const char* opt, int final, int quiet)
975b7579f77SDag-Erling Smørgrav {
976bc892140SDag-Erling Smørgrav 	char oldwd[4096];
977b7579f77SDag-Erling Smørgrav 	struct config_file* cfg = config_create();
978b7579f77SDag-Erling Smørgrav 	if(!cfg)
979b7579f77SDag-Erling Smørgrav 		fatal_exit("out of memory");
980b5663de9SDag-Erling Smørgrav 	oldwd[0] = 0;
981b5663de9SDag-Erling Smørgrav 	if(!getcwd(oldwd, sizeof(oldwd))) {
982b5663de9SDag-Erling Smørgrav 		log_err("cannot getcwd: %s", strerror(errno));
983b5663de9SDag-Erling Smørgrav 		oldwd[0] = 0;
984b5663de9SDag-Erling Smørgrav 	}
985b7579f77SDag-Erling Smørgrav 	if(!config_read(cfg, cfgfile, NULL)) {
986b7579f77SDag-Erling Smørgrav 		/* config_read prints messages to stderr */
987b7579f77SDag-Erling Smørgrav 		config_delete(cfg);
988b7579f77SDag-Erling Smørgrav 		exit(1);
989b7579f77SDag-Erling Smørgrav 	}
990b5663de9SDag-Erling Smørgrav 	if(oldwd[0] && chdir(oldwd) == -1)
991b5663de9SDag-Erling Smørgrav 		log_err("cannot chdir(%s): %s", oldwd, strerror(errno));
992ff825849SDag-Erling Smørgrav 	if(opt) {
9936480faa8SDag-Erling Smørgrav 		print_option(cfg, opt, final);
994ff825849SDag-Erling Smørgrav 		config_delete(cfg);
995ff825849SDag-Erling Smørgrav 		return;
996ff825849SDag-Erling Smørgrav 	}
997e86b9096SDag-Erling Smørgrav 	morechecks(cfg);
998b7579f77SDag-Erling Smørgrav 	check_mod(cfg, iter_get_funcblock());
999b7579f77SDag-Erling Smørgrav 	check_mod(cfg, val_get_funcblock());
1000b7579f77SDag-Erling Smørgrav #ifdef WITH_PYTHONMODULE
1001b7579f77SDag-Erling Smørgrav 	if(strstr(cfg->module_conf, "python"))
1002b7579f77SDag-Erling Smørgrav 		check_mod(cfg, pythonmod_get_funcblock());
1003b7579f77SDag-Erling Smørgrav #endif
1004b7579f77SDag-Erling Smørgrav 	check_fwd(cfg);
1005b7579f77SDag-Erling Smørgrav 	check_hints(cfg);
100657bddd21SDag-Erling Smørgrav 	check_auth(cfg);
1007335c7cdaSCy Schubert 	if(!quiet) { printf("unbound-checkconf: no errors in %s\n", cfgfile); }
1008b7579f77SDag-Erling Smørgrav 	config_delete(cfg);
1009b7579f77SDag-Erling Smørgrav }
1010b7579f77SDag-Erling Smørgrav 
1011b7579f77SDag-Erling Smørgrav /** getopt global, in case header files fail to declare it. */
1012b7579f77SDag-Erling Smørgrav extern int optind;
1013b7579f77SDag-Erling Smørgrav /** getopt global, in case header files fail to declare it. */
1014b7579f77SDag-Erling Smørgrav extern char* optarg;
1015b7579f77SDag-Erling Smørgrav 
1016b7579f77SDag-Erling Smørgrav /** Main routine for checkconf */
1017b7579f77SDag-Erling Smørgrav int main(int argc, char* argv[])
1018b7579f77SDag-Erling Smørgrav {
1019b7579f77SDag-Erling Smørgrav 	int c;
10206480faa8SDag-Erling Smørgrav 	int final = 0;
1021335c7cdaSCy Schubert 	int quiet = 0;
1022b7579f77SDag-Erling Smørgrav 	const char* f;
1023b7579f77SDag-Erling Smørgrav 	const char* opt = NULL;
1024b7579f77SDag-Erling Smørgrav 	const char* cfgfile = CONFIGFILE;
102524e36522SCy Schubert 	checklock_start();
1026b7579f77SDag-Erling Smørgrav 	log_ident_set("unbound-checkconf");
1027b7579f77SDag-Erling Smørgrav 	log_init(NULL, 0, NULL);
1028b7579f77SDag-Erling Smørgrav #ifdef USE_WINSOCK
1029b7579f77SDag-Erling Smørgrav 	/* use registry config file in preference to compiletime location */
1030b7579f77SDag-Erling Smørgrav 	if(!(cfgfile=w_lookup_reg_str("Software\\Unbound", "ConfigFile")))
1031b7579f77SDag-Erling Smørgrav 		cfgfile = CONFIGFILE;
1032b7579f77SDag-Erling Smørgrav #endif /* USE_WINSOCK */
1033b7579f77SDag-Erling Smørgrav 	/* parse the options */
1034335c7cdaSCy Schubert 	while( (c=getopt(argc, argv, "fhqo:")) != -1) {
1035b7579f77SDag-Erling Smørgrav 		switch(c) {
10366480faa8SDag-Erling Smørgrav 		case 'f':
10376480faa8SDag-Erling Smørgrav 			final = 1;
10386480faa8SDag-Erling Smørgrav 			break;
1039b7579f77SDag-Erling Smørgrav 		case 'o':
1040b7579f77SDag-Erling Smørgrav 			opt = optarg;
1041b7579f77SDag-Erling Smørgrav 			break;
1042335c7cdaSCy Schubert 		case 'q':
1043335c7cdaSCy Schubert 			quiet = 1;
1044335c7cdaSCy Schubert 			break;
1045b7579f77SDag-Erling Smørgrav 		case '?':
1046b7579f77SDag-Erling Smørgrav 		case 'h':
1047b7579f77SDag-Erling Smørgrav 		default:
1048b7579f77SDag-Erling Smørgrav 			usage();
1049b7579f77SDag-Erling Smørgrav 		}
1050b7579f77SDag-Erling Smørgrav 	}
1051b7579f77SDag-Erling Smørgrav 	argc -= optind;
1052b7579f77SDag-Erling Smørgrav 	argv += optind;
1053b7579f77SDag-Erling Smørgrav 	if(argc != 0 && argc != 1)
1054b7579f77SDag-Erling Smørgrav 		usage();
1055b7579f77SDag-Erling Smørgrav 	if(argc == 1)
1056b7579f77SDag-Erling Smørgrav 		f = argv[0];
1057b7579f77SDag-Erling Smørgrav 	else	f = cfgfile;
1058335c7cdaSCy Schubert 	checkconf(f, opt, final, quiet);
1059b7579f77SDag-Erling Smørgrav 	checklock_stop();
1060b7579f77SDag-Erling Smørgrav 	return 0;
1061b7579f77SDag-Erling Smørgrav }
1062