1b7579f77SDag-Erling Smørgrav /* 25469a995SCy Schubert * smallapp/unbound-checkconf.c - config file checker for unbound.conf file. 3b7579f77SDag-Erling Smørgrav * 4b7579f77SDag-Erling Smørgrav * Copyright (c) 2007, NLnet Labs. All rights reserved. 5b7579f77SDag-Erling Smørgrav * 6b7579f77SDag-Erling Smørgrav * This software is open source. 7b7579f77SDag-Erling Smørgrav * 8b7579f77SDag-Erling Smørgrav * Redistribution and use in source and binary forms, with or without 9b7579f77SDag-Erling Smørgrav * modification, are permitted provided that the following conditions 10b7579f77SDag-Erling Smørgrav * are met: 11b7579f77SDag-Erling Smørgrav * 12b7579f77SDag-Erling Smørgrav * Redistributions of source code must retain the above copyright notice, 13b7579f77SDag-Erling Smørgrav * this list of conditions and the following disclaimer. 14b7579f77SDag-Erling Smørgrav * 15b7579f77SDag-Erling Smørgrav * Redistributions in binary form must reproduce the above copyright notice, 16b7579f77SDag-Erling Smørgrav * this list of conditions and the following disclaimer in the documentation 17b7579f77SDag-Erling Smørgrav * and/or other materials provided with the distribution. 18b7579f77SDag-Erling Smørgrav * 19b7579f77SDag-Erling Smørgrav * Neither the name of the NLNET LABS nor the names of its contributors may 20b7579f77SDag-Erling Smørgrav * be used to endorse or promote products derived from this software without 21b7579f77SDag-Erling Smørgrav * specific prior written permission. 22b7579f77SDag-Erling Smørgrav * 23b7579f77SDag-Erling Smørgrav * THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS 2417d15b25SDag-Erling Smørgrav * "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT 2517d15b25SDag-Erling Smørgrav * LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR 2617d15b25SDag-Erling Smørgrav * A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT 2717d15b25SDag-Erling Smørgrav * HOLDER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, 2817d15b25SDag-Erling Smørgrav * SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED 2917d15b25SDag-Erling Smørgrav * TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR 3017d15b25SDag-Erling Smørgrav * PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF 3117d15b25SDag-Erling Smørgrav * LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING 3217d15b25SDag-Erling Smørgrav * NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS 3317d15b25SDag-Erling Smørgrav * SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. 34b7579f77SDag-Erling Smørgrav */ 35b7579f77SDag-Erling Smørgrav 36b7579f77SDag-Erling Smørgrav /** 37b7579f77SDag-Erling Smørgrav * \file 38b7579f77SDag-Erling Smørgrav * 39b7579f77SDag-Erling Smørgrav * The config checker checks for syntax and other errors in the unbound.conf 40b7579f77SDag-Erling Smørgrav * file, and can be used to check for errors before the server is started 41b7579f77SDag-Erling Smørgrav * or sigHUPped. 42b7579f77SDag-Erling Smørgrav * Exit status 1 means an error. 43b7579f77SDag-Erling Smørgrav */ 44b7579f77SDag-Erling Smørgrav 45b7579f77SDag-Erling Smørgrav #include "config.h" 464c75e3aaSDag-Erling Smørgrav #include <ctype.h> 47b7579f77SDag-Erling Smørgrav #include "util/log.h" 48b7579f77SDag-Erling Smørgrav #include "util/config_file.h" 49b7579f77SDag-Erling Smørgrav #include "util/module.h" 50b7579f77SDag-Erling Smørgrav #include "util/net_help.h" 51b7579f77SDag-Erling Smørgrav #include "util/regional.h" 52b7579f77SDag-Erling Smørgrav #include "iterator/iterator.h" 53b7579f77SDag-Erling Smørgrav #include "iterator/iter_fwd.h" 54b7579f77SDag-Erling Smørgrav #include "iterator/iter_hints.h" 55b7579f77SDag-Erling Smørgrav #include "validator/validator.h" 56b7579f77SDag-Erling Smørgrav #include "services/localzone.h" 5724e36522SCy Schubert #include "services/listen_dnsport.h" 5865b390aaSDag-Erling Smørgrav #include "services/view.h" 5957bddd21SDag-Erling Smørgrav #include "services/authzone.h" 6065b390aaSDag-Erling Smørgrav #include "respip/respip.h" 6109a3aaf3SDag-Erling Smørgrav #include "sldns/sbuffer.h" 6225039b37SCy Schubert #include "sldns/str2wire.h" 63b7579f77SDag-Erling Smørgrav #ifdef HAVE_GETOPT_H 64b7579f77SDag-Erling Smørgrav #include <getopt.h> 65b7579f77SDag-Erling Smørgrav #endif 66b7579f77SDag-Erling Smørgrav #ifdef HAVE_PWD_H 67b7579f77SDag-Erling Smørgrav #include <pwd.h> 68b7579f77SDag-Erling Smørgrav #endif 69b7579f77SDag-Erling Smørgrav #ifdef HAVE_SYS_STAT_H 70b7579f77SDag-Erling Smørgrav #include <sys/stat.h> 71b7579f77SDag-Erling Smørgrav #endif 72b7579f77SDag-Erling Smørgrav #ifdef HAVE_GLOB_H 73b7579f77SDag-Erling Smørgrav #include <glob.h> 74b7579f77SDag-Erling Smørgrav #endif 75b7579f77SDag-Erling Smørgrav #ifdef WITH_PYTHONMODULE 76b7579f77SDag-Erling Smørgrav #include "pythonmod/pythonmod.h" 77b7579f77SDag-Erling Smørgrav #endif 78971980c3SDag-Erling Smørgrav #ifdef CLIENT_SUBNET 79971980c3SDag-Erling Smørgrav #include "edns-subnet/subnet-whitelist.h" 80971980c3SDag-Erling Smørgrav #endif 81b7579f77SDag-Erling Smørgrav 82b7579f77SDag-Erling Smørgrav /** Give checkconf usage, and exit (1). */ 83b7579f77SDag-Erling Smørgrav static void 84b5663de9SDag-Erling Smørgrav usage(void) 85b7579f77SDag-Erling Smørgrav { 86b70d78d6SDag-Erling Smørgrav printf("Usage: local-unbound-checkconf [file]\n"); 87b7579f77SDag-Erling Smørgrav printf(" Checks unbound configuration file for errors.\n"); 88b7579f77SDag-Erling Smørgrav printf("file if omitted %s is used.\n", CONFIGFILE); 89b7579f77SDag-Erling Smørgrav printf("-o option print value of option to stdout.\n"); 906480faa8SDag-Erling Smørgrav printf("-f output full pathname with chroot applied, eg. with -o pidfile.\n"); 91335c7cdaSCy Schubert printf("-q quiet (suppress output on success).\n"); 92b7579f77SDag-Erling Smørgrav printf("-h show this usage help.\n"); 93b7579f77SDag-Erling Smørgrav printf("Version %s\n", PACKAGE_VERSION); 94b7579f77SDag-Erling Smørgrav printf("BSD licensed, see LICENSE in source package for details.\n"); 95b7579f77SDag-Erling Smørgrav printf("Report bugs to %s\n", PACKAGE_BUGREPORT); 96b7579f77SDag-Erling Smørgrav exit(1); 97b7579f77SDag-Erling Smørgrav } 98b7579f77SDag-Erling Smørgrav 99b7579f77SDag-Erling Smørgrav /** 100b7579f77SDag-Erling Smørgrav * Print given option to stdout 101b7579f77SDag-Erling Smørgrav * @param cfg: config 102b7579f77SDag-Erling Smørgrav * @param opt: option name without trailing :. 103b7579f77SDag-Erling Smørgrav * This is different from config_set_option. 1046480faa8SDag-Erling Smørgrav * @param final: if final pathname with chroot applied has to be printed. 105b7579f77SDag-Erling Smørgrav */ 106b7579f77SDag-Erling Smørgrav static void 1076480faa8SDag-Erling Smørgrav print_option(struct config_file* cfg, const char* opt, int final) 108b7579f77SDag-Erling Smørgrav { 1096480faa8SDag-Erling Smørgrav if(strcmp(opt, "pidfile") == 0 && final) { 110bc892140SDag-Erling Smørgrav char *p = fname_after_chroot(cfg->pidfile, cfg, 1); 111bc892140SDag-Erling Smørgrav if(!p) fatal_exit("out of memory"); 112bc892140SDag-Erling Smørgrav printf("%s\n", p); 113bc892140SDag-Erling Smørgrav free(p); 1146480faa8SDag-Erling Smørgrav return; 1156480faa8SDag-Erling Smørgrav } 11657bddd21SDag-Erling Smørgrav if(strcmp(opt, "auto-trust-anchor-file") == 0 && final) { 11757bddd21SDag-Erling Smørgrav struct config_strlist* s = cfg->auto_trust_anchor_file_list; 11857bddd21SDag-Erling Smørgrav for(; s; s=s->next) { 11957bddd21SDag-Erling Smørgrav char *p = fname_after_chroot(s->str, cfg, 1); 12057bddd21SDag-Erling Smørgrav if(!p) fatal_exit("out of memory"); 12157bddd21SDag-Erling Smørgrav printf("%s\n", p); 12257bddd21SDag-Erling Smørgrav free(p); 12357bddd21SDag-Erling Smørgrav } 12457bddd21SDag-Erling Smørgrav return; 12557bddd21SDag-Erling Smørgrav } 126b7579f77SDag-Erling Smørgrav if(!config_get_option(cfg, opt, config_print_func, stdout)) 127b7579f77SDag-Erling Smørgrav fatal_exit("cannot print option '%s'", opt); 128b7579f77SDag-Erling Smørgrav } 129b7579f77SDag-Erling Smørgrav 130b7579f77SDag-Erling Smørgrav /** check if module works with config */ 131b7579f77SDag-Erling Smørgrav static void 132b7579f77SDag-Erling Smørgrav check_mod(struct config_file* cfg, struct module_func_block* fb) 133b7579f77SDag-Erling Smørgrav { 134b7579f77SDag-Erling Smørgrav struct module_env env; 135b7579f77SDag-Erling Smørgrav memset(&env, 0, sizeof(env)); 136b7579f77SDag-Erling Smørgrav env.cfg = cfg; 137b7579f77SDag-Erling Smørgrav env.scratch = regional_create(); 13817d15b25SDag-Erling Smørgrav env.scratch_buffer = sldns_buffer_new(BUFSIZ); 139b7579f77SDag-Erling Smørgrav if(!env.scratch || !env.scratch_buffer) 140b7579f77SDag-Erling Smørgrav fatal_exit("out of memory"); 141bc892140SDag-Erling Smørgrav if(!edns_known_options_init(&env)) 142bc892140SDag-Erling Smørgrav fatal_exit("out of memory"); 14356850988SCy Schubert if(fb->startup && !(*fb->startup)(&env, 0)) 14456850988SCy Schubert fatal_exit("bad config during startup for %s module", fb->name); 14556850988SCy Schubert if(!(*fb->init)(&env, 0)) 14656850988SCy Schubert fatal_exit("bad config during init for %s module", fb->name); 147b7579f77SDag-Erling Smørgrav (*fb->deinit)(&env, 0); 14856850988SCy Schubert if(fb->destartup) 14956850988SCy Schubert (*fb->destartup)(&env, 0); 15017d15b25SDag-Erling Smørgrav sldns_buffer_free(env.scratch_buffer); 151b7579f77SDag-Erling Smørgrav regional_destroy(env.scratch); 152bc892140SDag-Erling Smørgrav edns_known_options_delete(&env); 153b7579f77SDag-Erling Smørgrav } 154b7579f77SDag-Erling Smørgrav 1550eefd307SCy Schubert /** true if addr is a localhost address, 127.0.0.1 or ::1 (with maybe "@port" 1560eefd307SCy Schubert * after it) */ 1570eefd307SCy Schubert static int 1580eefd307SCy Schubert str_addr_is_localhost(const char* a) 1590eefd307SCy Schubert { 1600eefd307SCy Schubert if(strncmp(a, "127.", 4) == 0) return 1; 1610eefd307SCy Schubert if(strncmp(a, "::1", 3) == 0) return 1; 1620eefd307SCy Schubert return 0; 1630eefd307SCy Schubert } 1640eefd307SCy Schubert 1650eefd307SCy Schubert /** check do-not-query-localhost */ 1660eefd307SCy Schubert static void 1670eefd307SCy Schubert donotquerylocalhostcheck(struct config_file* cfg) 1680eefd307SCy Schubert { 1690eefd307SCy Schubert if(cfg->donotquery_localhost) { 1700eefd307SCy Schubert struct config_stub* p; 1710eefd307SCy Schubert struct config_strlist* s; 1720eefd307SCy Schubert for(p=cfg->forwards; p; p=p->next) { 1730eefd307SCy Schubert for(s=p->addrs; s; s=s->next) { 1740eefd307SCy Schubert if(str_addr_is_localhost(s->str)) { 1750eefd307SCy Schubert fprintf(stderr, "unbound-checkconf: warning: forward-addr: '%s' is specified for forward-zone: '%s', but do-not-query-localhost: yes means that the address will not be used for lookups.\n", 1760eefd307SCy Schubert s->str, p->name); 1770eefd307SCy Schubert } 1780eefd307SCy Schubert } 1790eefd307SCy Schubert } 1800eefd307SCy Schubert for(p=cfg->stubs; p; p=p->next) { 1810eefd307SCy Schubert for(s=p->addrs; s; s=s->next) { 1820eefd307SCy Schubert if(str_addr_is_localhost(s->str)) { 1830eefd307SCy Schubert fprintf(stderr, "unbound-checkconf: warning: stub-addr: '%s' is specified for stub-zone: '%s', but do-not-query-localhost: yes means that the address will not be used for lookups.\n", 1840eefd307SCy Schubert s->str, p->name); 1850eefd307SCy Schubert } 1860eefd307SCy Schubert } 1870eefd307SCy Schubert } 1880eefd307SCy Schubert } 1890eefd307SCy Schubert } 1900eefd307SCy Schubert 191b7579f77SDag-Erling Smørgrav /** check localzones */ 192b7579f77SDag-Erling Smørgrav static void 193b7579f77SDag-Erling Smørgrav localzonechecks(struct config_file* cfg) 194b7579f77SDag-Erling Smørgrav { 195b7579f77SDag-Erling Smørgrav struct local_zones* zs; 196b7579f77SDag-Erling Smørgrav if(!(zs = local_zones_create())) 197b7579f77SDag-Erling Smørgrav fatal_exit("out of memory"); 198b7579f77SDag-Erling Smørgrav if(!local_zones_apply_cfg(zs, cfg)) 199b7579f77SDag-Erling Smørgrav fatal_exit("failed local-zone, local-data configuration"); 200b7579f77SDag-Erling Smørgrav local_zones_delete(zs); 201b7579f77SDag-Erling Smørgrav } 202b7579f77SDag-Erling Smørgrav 20325039b37SCy Schubert /** checks for acl and views */ 20425039b37SCy Schubert static void 20525039b37SCy Schubert acl_view_tag_checks(struct config_file* cfg, struct views* views) 20625039b37SCy Schubert { 20725039b37SCy Schubert int d; 20825039b37SCy Schubert struct sockaddr_storage a; 20925039b37SCy Schubert socklen_t alen; 21025039b37SCy Schubert struct config_str2list* acl; 21125039b37SCy Schubert struct config_str3list* s3; 21225039b37SCy Schubert struct config_strbytelist* sb; 21325039b37SCy Schubert 21425039b37SCy Schubert /* acl_view */ 21525039b37SCy Schubert for(acl=cfg->acl_view; acl; acl = acl->next) { 21625039b37SCy Schubert struct view* v; 21725039b37SCy Schubert if(!netblockstrtoaddr(acl->str, UNBOUND_DNS_PORT, &a, &alen, 21825039b37SCy Schubert &d)) { 21925039b37SCy Schubert fatal_exit("cannot parse access-control-view " 22025039b37SCy Schubert "address %s %s", acl->str, acl->str2); 22125039b37SCy Schubert } 22225039b37SCy Schubert v = views_find_view(views, acl->str2, 0); 22325039b37SCy Schubert if(!v) { 22425039b37SCy Schubert fatal_exit("cannot find view for " 22525039b37SCy Schubert "access-control-view: %s %s", 22625039b37SCy Schubert acl->str, acl->str2); 22725039b37SCy Schubert } 22825039b37SCy Schubert lock_rw_unlock(&v->lock); 22925039b37SCy Schubert } 23025039b37SCy Schubert 23125039b37SCy Schubert /* acl_tags */ 23225039b37SCy Schubert for(sb=cfg->acl_tags; sb; sb = sb->next) { 23325039b37SCy Schubert if(!netblockstrtoaddr(sb->str, UNBOUND_DNS_PORT, &a, &alen, 23425039b37SCy Schubert &d)) { 23525039b37SCy Schubert fatal_exit("cannot parse access-control-tags " 23625039b37SCy Schubert "address %s", sb->str); 23725039b37SCy Schubert } 23825039b37SCy Schubert } 23925039b37SCy Schubert 24025039b37SCy Schubert /* acl_tag_actions */ 24125039b37SCy Schubert for(s3=cfg->acl_tag_actions; s3; s3 = s3->next) { 24225039b37SCy Schubert enum localzone_type t; 24325039b37SCy Schubert if(!netblockstrtoaddr(s3->str, UNBOUND_DNS_PORT, &a, &alen, 24425039b37SCy Schubert &d)) { 24525039b37SCy Schubert fatal_exit("cannot parse access-control-tag-actions " 24625039b37SCy Schubert "address %s %s %s", 24725039b37SCy Schubert s3->str, s3->str2, s3->str3); 24825039b37SCy Schubert } 24925039b37SCy Schubert if(find_tag_id(cfg, s3->str2) == -1) { 25025039b37SCy Schubert fatal_exit("cannot parse tag %s (define-tag it), " 25125039b37SCy Schubert "for access-control-tag-actions: %s %s %s", 25225039b37SCy Schubert s3->str2, s3->str, s3->str2, s3->str3); 25325039b37SCy Schubert } 25425039b37SCy Schubert if(!local_zone_str2type(s3->str3, &t)) { 25525039b37SCy Schubert fatal_exit("cannot parse access control action type %s" 25625039b37SCy Schubert " for access-control-tag-actions: %s %s %s", 25725039b37SCy Schubert s3->str3, s3->str, s3->str2, s3->str3); 25825039b37SCy Schubert } 25925039b37SCy Schubert } 26025039b37SCy Schubert 26125039b37SCy Schubert /* acl_tag_datas */ 26225039b37SCy Schubert for(s3=cfg->acl_tag_datas; s3; s3 = s3->next) { 26325039b37SCy Schubert char buf[65536]; 26425039b37SCy Schubert uint8_t rr[LDNS_RR_BUF_SIZE]; 26525039b37SCy Schubert size_t len = sizeof(rr); 26625039b37SCy Schubert int res; 26725039b37SCy Schubert if(!netblockstrtoaddr(s3->str, UNBOUND_DNS_PORT, &a, &alen, 26825039b37SCy Schubert &d)) { 26925039b37SCy Schubert fatal_exit("cannot parse access-control-tag-datas address %s %s '%s'", 27025039b37SCy Schubert s3->str, s3->str2, s3->str3); 27125039b37SCy Schubert } 27225039b37SCy Schubert if(find_tag_id(cfg, s3->str2) == -1) { 27325039b37SCy Schubert fatal_exit("cannot parse tag %s (define-tag it), " 27425039b37SCy Schubert "for access-control-tag-datas: %s %s '%s'", 27525039b37SCy Schubert s3->str2, s3->str, s3->str2, s3->str3); 27625039b37SCy Schubert } 27725039b37SCy Schubert /* '.' is sufficient for validation, and it makes the call to 27825039b37SCy Schubert * sldns_wirerr_get_type() simpler below. */ 27925039b37SCy Schubert snprintf(buf, sizeof(buf), "%s %s", ".", s3->str3); 28025039b37SCy Schubert res = sldns_str2wire_rr_buf(buf, rr, &len, NULL, 3600, NULL, 28125039b37SCy Schubert 0, NULL, 0); 28225039b37SCy Schubert if(res != 0) { 28325039b37SCy Schubert fatal_exit("cannot parse rr data [char %d] parse error %s, for access-control-tag-datas: %s %s '%s'", 28425039b37SCy Schubert (int)LDNS_WIREPARSE_OFFSET(res)-2, 28525039b37SCy Schubert sldns_get_errorstr_parse(res), 28625039b37SCy Schubert s3->str, s3->str2, s3->str3); 28725039b37SCy Schubert } 28825039b37SCy Schubert } 28925039b37SCy Schubert } 29025039b37SCy Schubert 29165b390aaSDag-Erling Smørgrav /** check view and response-ip configuration */ 29265b390aaSDag-Erling Smørgrav static void 29365b390aaSDag-Erling Smørgrav view_and_respipchecks(struct config_file* cfg) 29465b390aaSDag-Erling Smørgrav { 29565b390aaSDag-Erling Smørgrav struct views* views = NULL; 29665b390aaSDag-Erling Smørgrav struct respip_set* respip = NULL; 29765b390aaSDag-Erling Smørgrav int ignored = 0; 29865b390aaSDag-Erling Smørgrav if(!(views = views_create())) 29965b390aaSDag-Erling Smørgrav fatal_exit("Could not create views: out of memory"); 30065b390aaSDag-Erling Smørgrav if(!(respip = respip_set_create())) 30165b390aaSDag-Erling Smørgrav fatal_exit("Could not create respip set: out of memory"); 30265b390aaSDag-Erling Smørgrav if(!views_apply_cfg(views, cfg)) 30365b390aaSDag-Erling Smørgrav fatal_exit("Could not set up views"); 30465b390aaSDag-Erling Smørgrav if(!respip_global_apply_cfg(respip, cfg)) 30565b390aaSDag-Erling Smørgrav fatal_exit("Could not setup respip set"); 30665b390aaSDag-Erling Smørgrav if(!respip_views_apply_cfg(views, cfg, &ignored)) 30765b390aaSDag-Erling Smørgrav fatal_exit("Could not setup per-view respip sets"); 30825039b37SCy Schubert acl_view_tag_checks(cfg, views); 30965b390aaSDag-Erling Smørgrav views_delete(views); 31065b390aaSDag-Erling Smørgrav respip_set_delete(respip); 31165b390aaSDag-Erling Smørgrav } 31265b390aaSDag-Erling Smørgrav 313b7579f77SDag-Erling Smørgrav /** emit warnings for IP in hosts */ 314b7579f77SDag-Erling Smørgrav static void 315b7579f77SDag-Erling Smørgrav warn_hosts(const char* typ, struct config_stub* list) 316b7579f77SDag-Erling Smørgrav { 317b7579f77SDag-Erling Smørgrav struct sockaddr_storage a; 318b7579f77SDag-Erling Smørgrav socklen_t alen; 319b7579f77SDag-Erling Smørgrav struct config_stub* s; 320b7579f77SDag-Erling Smørgrav struct config_strlist* h; 321b7579f77SDag-Erling Smørgrav for(s=list; s; s=s->next) { 322b7579f77SDag-Erling Smørgrav for(h=s->hosts; h; h=h->next) { 323865f46b2SCy Schubert if(extstrtoaddr(h->str, &a, &alen, UNBOUND_DNS_PORT)) { 324b7579f77SDag-Erling Smørgrav fprintf(stderr, "unbound-checkconf: warning:" 325b7579f77SDag-Erling Smørgrav " %s %s: \"%s\" is an IP%s address, " 326b7579f77SDag-Erling Smørgrav "and when looked up as a host name " 327b7579f77SDag-Erling Smørgrav "during use may not resolve.\n", 328b7579f77SDag-Erling Smørgrav s->name, typ, h->str, 329b7579f77SDag-Erling Smørgrav addr_is_ip6(&a, alen)?"6":"4"); 330b7579f77SDag-Erling Smørgrav } 331b7579f77SDag-Erling Smørgrav } 332b7579f77SDag-Erling Smørgrav } 333b7579f77SDag-Erling Smørgrav } 334b7579f77SDag-Erling Smørgrav 335b7579f77SDag-Erling Smørgrav /** check interface strings */ 336b7579f77SDag-Erling Smørgrav static void 337b7579f77SDag-Erling Smørgrav interfacechecks(struct config_file* cfg) 338b7579f77SDag-Erling Smørgrav { 339b5663de9SDag-Erling Smørgrav int d; 340b7579f77SDag-Erling Smørgrav struct sockaddr_storage a; 341b7579f77SDag-Erling Smørgrav socklen_t alen; 34224e36522SCy Schubert int i, j, i2, j2; 34324e36522SCy Schubert char*** resif = NULL; 34424e36522SCy Schubert int* num_resif = NULL; 34524e36522SCy Schubert 34624e36522SCy Schubert if(cfg->num_ifs != 0) { 34724e36522SCy Schubert resif = (char***)calloc(cfg->num_ifs, sizeof(char**)); 34824e36522SCy Schubert if(!resif) fatal_exit("malloc failure"); 34924e36522SCy Schubert num_resif = (int*)calloc(cfg->num_ifs, sizeof(int)); 35024e36522SCy Schubert if(!num_resif) fatal_exit("malloc failure"); 351b7579f77SDag-Erling Smørgrav } 35224e36522SCy Schubert for(i=0; i<cfg->num_ifs; i++) { 35324e36522SCy Schubert /* search for duplicates in IP or ifname arguments */ 35424e36522SCy Schubert for(i2=0; i2<i; i2++) { 35524e36522SCy Schubert if(strcmp(cfg->ifs[i], cfg->ifs[i2]) == 0) { 356b7579f77SDag-Erling Smørgrav fatal_exit("interface: %s present twice, " 357b7579f77SDag-Erling Smørgrav "cannot bind same ports twice.", 358b7579f77SDag-Erling Smørgrav cfg->ifs[i]); 359b7579f77SDag-Erling Smørgrav } 360b7579f77SDag-Erling Smørgrav } 36124e36522SCy Schubert if(!resolve_interface_names(&cfg->ifs[i], 1, NULL, &resif[i], 36224e36522SCy Schubert &num_resif[i])) { 36324e36522SCy Schubert fatal_exit("could not resolve interface names, for %s", 36424e36522SCy Schubert cfg->ifs[i]); 36524e36522SCy Schubert } 366865f46b2SCy Schubert /* check for port combinations that are not supported */ 367*be771a7bSCy Schubert if(if_is_pp2(resif[i][0], cfg->port, cfg->proxy_protocol_port)) { 368*be771a7bSCy Schubert if(if_is_dnscrypt(resif[i][0], cfg->port, 369865f46b2SCy Schubert cfg->dnscrypt_port)) { 370865f46b2SCy Schubert fatal_exit("PROXYv2 and DNSCrypt combination not " 371865f46b2SCy Schubert "supported!"); 372*be771a7bSCy Schubert } else if(if_is_https(resif[i][0], cfg->port, 373865f46b2SCy Schubert cfg->https_port)) { 374865f46b2SCy Schubert fatal_exit("PROXYv2 and DoH combination not " 375865f46b2SCy Schubert "supported!"); 376*be771a7bSCy Schubert } else if(if_is_quic(resif[i][0], cfg->port, 377*be771a7bSCy Schubert cfg->quic_port)) { 378*be771a7bSCy Schubert fatal_exit("PROXYv2 and DoQ combination not " 379*be771a7bSCy Schubert "supported!"); 380865f46b2SCy Schubert } 381865f46b2SCy Schubert } 38224e36522SCy Schubert /* search for duplicates in the returned addresses */ 38324e36522SCy Schubert for(j=0; j<num_resif[i]; j++) { 384865f46b2SCy Schubert if(!extstrtoaddr(resif[i][j], &a, &alen, cfg->port)) { 38524e36522SCy Schubert if(strcmp(cfg->ifs[i], resif[i][j]) != 0) 38624e36522SCy Schubert fatal_exit("cannot parse interface address '%s' from the interface specified as '%s'", 38724e36522SCy Schubert resif[i][j], cfg->ifs[i]); 38824e36522SCy Schubert else 38924e36522SCy Schubert fatal_exit("cannot parse interface specified as '%s'", 39024e36522SCy Schubert cfg->ifs[i]); 39124e36522SCy Schubert } 39224e36522SCy Schubert for(i2=0; i2<i; i2++) { 39324e36522SCy Schubert for(j2=0; j2<num_resif[i2]; j2++) { 39424e36522SCy Schubert if(strcmp(resif[i][j], resif[i2][j2]) 39524e36522SCy Schubert == 0) { 39624e36522SCy Schubert char info1[1024], info2[1024]; 39724e36522SCy Schubert if(strcmp(cfg->ifs[i], resif[i][j]) != 0) 39824e36522SCy Schubert snprintf(info1, sizeof(info1), "address %s from interface: %s", resif[i][j], cfg->ifs[i]); 39924e36522SCy Schubert else snprintf(info1, sizeof(info1), "interface: %s", cfg->ifs[i]); 40024e36522SCy Schubert if(strcmp(cfg->ifs[i2], resif[i2][j2]) != 0) 40124e36522SCy Schubert snprintf(info2, sizeof(info2), "address %s from interface: %s", resif[i2][j2], cfg->ifs[i2]); 40224e36522SCy Schubert else snprintf(info2, sizeof(info2), "interface: %s", cfg->ifs[i2]); 40324e36522SCy Schubert fatal_exit("%s present twice, cannot bind the same ports twice. The first entry is %s and the second is %s", resif[i][j], info2, info1); 40424e36522SCy Schubert } 40524e36522SCy Schubert } 40624e36522SCy Schubert } 40724e36522SCy Schubert } 40824e36522SCy Schubert } 40924e36522SCy Schubert 41024e36522SCy Schubert for(i=0; i<cfg->num_ifs; i++) { 41124e36522SCy Schubert config_del_strarray(resif[i], num_resif[i]); 41224e36522SCy Schubert } 41324e36522SCy Schubert free(resif); 41424e36522SCy Schubert free(num_resif); 41524e36522SCy Schubert 416b7579f77SDag-Erling Smørgrav for(i=0; i<cfg->num_out_ifs; i++) { 417b5663de9SDag-Erling Smørgrav if(!ipstrtoaddr(cfg->out_ifs[i], UNBOUND_DNS_PORT, &a, &alen) && 418b5663de9SDag-Erling Smørgrav !netblockstrtoaddr(cfg->out_ifs[i], UNBOUND_DNS_PORT, &a, &alen, &d)) { 419b7579f77SDag-Erling Smørgrav fatal_exit("cannot parse outgoing-interface " 420b7579f77SDag-Erling Smørgrav "specified as '%s'", cfg->out_ifs[i]); 421b7579f77SDag-Erling Smørgrav } 422b7579f77SDag-Erling Smørgrav for(j=0; j<cfg->num_out_ifs; j++) { 423b7579f77SDag-Erling Smørgrav if(i!=j && strcmp(cfg->out_ifs[i], cfg->out_ifs[j])==0) 424b7579f77SDag-Erling Smørgrav fatal_exit("outgoing-interface: %s present " 425b7579f77SDag-Erling Smørgrav "twice, cannot bind same ports twice.", 426b7579f77SDag-Erling Smørgrav cfg->out_ifs[i]); 427b7579f77SDag-Erling Smørgrav } 428b7579f77SDag-Erling Smørgrav } 429b7579f77SDag-Erling Smørgrav } 430b7579f77SDag-Erling Smørgrav 431a39a5a69SCy Schubert /** check interface-automatic-ports */ 432a39a5a69SCy Schubert static void 433a39a5a69SCy Schubert ifautomaticportschecks(char* ifautomaticports) 434a39a5a69SCy Schubert { 435a39a5a69SCy Schubert char* now = ifautomaticports; 436a39a5a69SCy Schubert while(now && *now) { 437a39a5a69SCy Schubert char* after; 438a39a5a69SCy Schubert int extraport; 439a39a5a69SCy Schubert while(isspace((unsigned char)*now)) 440a39a5a69SCy Schubert now++; 441a39a5a69SCy Schubert if(!*now) 442a39a5a69SCy Schubert break; 443a39a5a69SCy Schubert after = now; 444a39a5a69SCy Schubert extraport = (int)strtol(now, &after, 10); 445a39a5a69SCy Schubert if(extraport < 0 || extraport > 65535) 446a39a5a69SCy Schubert fatal_exit("interface-automatic-ports: port out of range at position %d in '%s'", (int)(now-ifautomaticports)+1, ifautomaticports); 447a39a5a69SCy Schubert if(extraport == 0 && now == after) 448a39a5a69SCy Schubert fatal_exit("interface-automatic-ports: parse error at position %d in '%s'", (int)(now-ifautomaticports)+1, ifautomaticports); 449a39a5a69SCy Schubert now = after; 450a39a5a69SCy Schubert } 451a39a5a69SCy Schubert } 452a39a5a69SCy Schubert 453b7579f77SDag-Erling Smørgrav /** check acl ips */ 454b7579f77SDag-Erling Smørgrav static void 455b7579f77SDag-Erling Smørgrav aclchecks(struct config_file* cfg) 456b7579f77SDag-Erling Smørgrav { 457b7579f77SDag-Erling Smørgrav int d; 458b7579f77SDag-Erling Smørgrav struct sockaddr_storage a; 459b7579f77SDag-Erling Smørgrav socklen_t alen; 460b7579f77SDag-Erling Smørgrav struct config_str2list* acl; 461b7579f77SDag-Erling Smørgrav for(acl=cfg->acls; acl; acl = acl->next) { 462b7579f77SDag-Erling Smørgrav if(!netblockstrtoaddr(acl->str, UNBOUND_DNS_PORT, &a, &alen, 463b7579f77SDag-Erling Smørgrav &d)) { 464b7579f77SDag-Erling Smørgrav fatal_exit("cannot parse access control address %s %s", 465b7579f77SDag-Erling Smørgrav acl->str, acl->str2); 466b7579f77SDag-Erling Smørgrav } 467b7579f77SDag-Erling Smørgrav } 468b7579f77SDag-Erling Smørgrav } 469b7579f77SDag-Erling Smørgrav 4704c75e3aaSDag-Erling Smørgrav /** check tcp connection limit ips */ 4714c75e3aaSDag-Erling Smørgrav static void 4724c75e3aaSDag-Erling Smørgrav tcpconnlimitchecks(struct config_file* cfg) 4734c75e3aaSDag-Erling Smørgrav { 4744c75e3aaSDag-Erling Smørgrav int d; 4754c75e3aaSDag-Erling Smørgrav struct sockaddr_storage a; 4764c75e3aaSDag-Erling Smørgrav socklen_t alen; 4774c75e3aaSDag-Erling Smørgrav struct config_str2list* tcl; 4784c75e3aaSDag-Erling Smørgrav for(tcl=cfg->tcp_connection_limits; tcl; tcl = tcl->next) { 4794c75e3aaSDag-Erling Smørgrav if(!netblockstrtoaddr(tcl->str, UNBOUND_DNS_PORT, &a, &alen, 4804c75e3aaSDag-Erling Smørgrav &d)) { 4814c75e3aaSDag-Erling Smørgrav fatal_exit("cannot parse tcp connection limit address %s %s", 4824c75e3aaSDag-Erling Smørgrav tcl->str, tcl->str2); 4834c75e3aaSDag-Erling Smørgrav } 4844c75e3aaSDag-Erling Smørgrav } 4854c75e3aaSDag-Erling Smørgrav } 4864c75e3aaSDag-Erling Smørgrav 487b7579f77SDag-Erling Smørgrav /** true if fname is a file */ 488b7579f77SDag-Erling Smørgrav static int 489b7579f77SDag-Erling Smørgrav is_file(const char* fname) 490b7579f77SDag-Erling Smørgrav { 491b7579f77SDag-Erling Smørgrav struct stat buf; 492b7579f77SDag-Erling Smørgrav if(stat(fname, &buf) < 0) { 493b7579f77SDag-Erling Smørgrav if(errno==EACCES) { 494b7579f77SDag-Erling Smørgrav printf("warning: no search permission for one of the directories in path: %s\n", fname); 495b7579f77SDag-Erling Smørgrav return 1; 496b7579f77SDag-Erling Smørgrav } 497b7579f77SDag-Erling Smørgrav perror(fname); 498b7579f77SDag-Erling Smørgrav return 0; 499b7579f77SDag-Erling Smørgrav } 500b7579f77SDag-Erling Smørgrav if(S_ISDIR(buf.st_mode)) { 501b7579f77SDag-Erling Smørgrav printf("%s is not a file\n", fname); 502b7579f77SDag-Erling Smørgrav return 0; 503b7579f77SDag-Erling Smørgrav } 504b7579f77SDag-Erling Smørgrav return 1; 505b7579f77SDag-Erling Smørgrav } 506b7579f77SDag-Erling Smørgrav 507b7579f77SDag-Erling Smørgrav /** true if fname is a directory */ 508b7579f77SDag-Erling Smørgrav static int 509b7579f77SDag-Erling Smørgrav is_dir(const char* fname) 510b7579f77SDag-Erling Smørgrav { 511b7579f77SDag-Erling Smørgrav struct stat buf; 512b7579f77SDag-Erling Smørgrav if(stat(fname, &buf) < 0) { 513b7579f77SDag-Erling Smørgrav if(errno==EACCES) { 514b7579f77SDag-Erling Smørgrav printf("warning: no search permission for one of the directories in path: %s\n", fname); 515b7579f77SDag-Erling Smørgrav return 1; 516b7579f77SDag-Erling Smørgrav } 517b7579f77SDag-Erling Smørgrav perror(fname); 518b7579f77SDag-Erling Smørgrav return 0; 519b7579f77SDag-Erling Smørgrav } 520b7579f77SDag-Erling Smørgrav if(!(S_ISDIR(buf.st_mode))) { 521b7579f77SDag-Erling Smørgrav printf("%s is not a directory\n", fname); 522b7579f77SDag-Erling Smørgrav return 0; 523b7579f77SDag-Erling Smørgrav } 524b7579f77SDag-Erling Smørgrav return 1; 525b7579f77SDag-Erling Smørgrav } 526b7579f77SDag-Erling Smørgrav 527b7579f77SDag-Erling Smørgrav /** get base dir of a fname */ 528b7579f77SDag-Erling Smørgrav static char* 529b7579f77SDag-Erling Smørgrav basedir(char* fname) 530b7579f77SDag-Erling Smørgrav { 531b7579f77SDag-Erling Smørgrav char* rev; 532b7579f77SDag-Erling Smørgrav if(!fname) fatal_exit("out of memory"); 533b7579f77SDag-Erling Smørgrav rev = strrchr(fname, '/'); 534b7579f77SDag-Erling Smørgrav if(!rev) return NULL; 535b7579f77SDag-Erling Smørgrav if(fname == rev) return NULL; 536b7579f77SDag-Erling Smørgrav rev[0] = 0; 537b7579f77SDag-Erling Smørgrav return fname; 538b7579f77SDag-Erling Smørgrav } 539b7579f77SDag-Erling Smørgrav 540b7579f77SDag-Erling Smørgrav /** check chroot for a file string */ 541b7579f77SDag-Erling Smørgrav static void 542b7579f77SDag-Erling Smørgrav check_chroot_string(const char* desc, char** ss, 543b7579f77SDag-Erling Smørgrav const char* chrootdir, struct config_file* cfg) 544b7579f77SDag-Erling Smørgrav { 545b7579f77SDag-Erling Smørgrav char* str = *ss; 546b7579f77SDag-Erling Smørgrav if(str && str[0]) { 547b7579f77SDag-Erling Smørgrav *ss = fname_after_chroot(str, cfg, 1); 548b7579f77SDag-Erling Smørgrav if(!*ss) fatal_exit("out of memory"); 549b7579f77SDag-Erling Smørgrav if(!is_file(*ss)) { 550b7579f77SDag-Erling Smørgrav if(chrootdir && chrootdir[0]) 551b7579f77SDag-Erling Smørgrav fatal_exit("%s: \"%s\" does not exist in " 552b7579f77SDag-Erling Smørgrav "chrootdir %s", desc, str, chrootdir); 553b7579f77SDag-Erling Smørgrav else 554b7579f77SDag-Erling Smørgrav fatal_exit("%s: \"%s\" does not exist", 555b7579f77SDag-Erling Smørgrav desc, str); 556b7579f77SDag-Erling Smørgrav } 557b7579f77SDag-Erling Smørgrav /* put in a new full path for continued checking */ 558b7579f77SDag-Erling Smørgrav free(str); 559b7579f77SDag-Erling Smørgrav } 560b7579f77SDag-Erling Smørgrav } 561b7579f77SDag-Erling Smørgrav 562b7579f77SDag-Erling Smørgrav /** check file list, every file must be inside the chroot location */ 563b7579f77SDag-Erling Smørgrav static void 564b7579f77SDag-Erling Smørgrav check_chroot_filelist(const char* desc, struct config_strlist* list, 565b7579f77SDag-Erling Smørgrav const char* chrootdir, struct config_file* cfg) 566b7579f77SDag-Erling Smørgrav { 567b7579f77SDag-Erling Smørgrav struct config_strlist* p; 568b7579f77SDag-Erling Smørgrav for(p=list; p; p=p->next) { 569b7579f77SDag-Erling Smørgrav check_chroot_string(desc, &p->str, chrootdir, cfg); 570b7579f77SDag-Erling Smørgrav } 571b7579f77SDag-Erling Smørgrav } 572b7579f77SDag-Erling Smørgrav 573b7579f77SDag-Erling Smørgrav /** check file list, with wildcard processing */ 574b7579f77SDag-Erling Smørgrav static void 575b7579f77SDag-Erling Smørgrav check_chroot_filelist_wild(const char* desc, struct config_strlist* list, 576b7579f77SDag-Erling Smørgrav const char* chrootdir, struct config_file* cfg) 577b7579f77SDag-Erling Smørgrav { 578b7579f77SDag-Erling Smørgrav struct config_strlist* p; 579b7579f77SDag-Erling Smørgrav for(p=list; p; p=p->next) { 580b7579f77SDag-Erling Smørgrav #ifdef HAVE_GLOB 581b7579f77SDag-Erling Smørgrav if(strchr(p->str, '*') || strchr(p->str, '[') || 582b7579f77SDag-Erling Smørgrav strchr(p->str, '?') || strchr(p->str, '{') || 583b7579f77SDag-Erling Smørgrav strchr(p->str, '~')) { 584b7579f77SDag-Erling Smørgrav char* s = p->str; 585b7579f77SDag-Erling Smørgrav /* adjust whole pattern for chroot and check later */ 586b7579f77SDag-Erling Smørgrav p->str = fname_after_chroot(p->str, cfg, 1); 587b7579f77SDag-Erling Smørgrav free(s); 588b7579f77SDag-Erling Smørgrav } else 589b7579f77SDag-Erling Smørgrav #endif /* HAVE_GLOB */ 590b7579f77SDag-Erling Smørgrav check_chroot_string(desc, &p->str, chrootdir, cfg); 591b7579f77SDag-Erling Smørgrav } 592b7579f77SDag-Erling Smørgrav } 593b7579f77SDag-Erling Smørgrav 594971980c3SDag-Erling Smørgrav #ifdef CLIENT_SUBNET 595971980c3SDag-Erling Smørgrav /** check ECS configuration */ 596971980c3SDag-Erling Smørgrav static void 597971980c3SDag-Erling Smørgrav ecs_conf_checks(struct config_file* cfg) 598971980c3SDag-Erling Smørgrav { 599971980c3SDag-Erling Smørgrav struct ecs_whitelist* whitelist = NULL; 600971980c3SDag-Erling Smørgrav if(!(whitelist = ecs_whitelist_create())) 601971980c3SDag-Erling Smørgrav fatal_exit("Could not create ednssubnet whitelist: out of memory"); 602971980c3SDag-Erling Smørgrav if(!ecs_whitelist_apply_cfg(whitelist, cfg)) 603971980c3SDag-Erling Smørgrav fatal_exit("Could not setup ednssubnet whitelist"); 604971980c3SDag-Erling Smørgrav ecs_whitelist_delete(whitelist); 605971980c3SDag-Erling Smørgrav } 606971980c3SDag-Erling Smørgrav #endif /* CLIENT_SUBNET */ 607971980c3SDag-Erling Smørgrav 6084c75e3aaSDag-Erling Smørgrav /** check that the modules exist, are compiled in */ 6094c75e3aaSDag-Erling Smørgrav static void 6104c75e3aaSDag-Erling Smørgrav check_modules_exist(const char* module_conf) 6114c75e3aaSDag-Erling Smørgrav { 6124c75e3aaSDag-Erling Smørgrav const char** names = module_list_avail(); 6134c75e3aaSDag-Erling Smørgrav const char* s = module_conf; 6144c75e3aaSDag-Erling Smørgrav while(*s) { 6154c75e3aaSDag-Erling Smørgrav int i = 0; 6164c75e3aaSDag-Erling Smørgrav int is_ok = 0; 6174c75e3aaSDag-Erling Smørgrav while(*s && isspace((unsigned char)*s)) 6184c75e3aaSDag-Erling Smørgrav s++; 6194c75e3aaSDag-Erling Smørgrav if(!*s) break; 6204c75e3aaSDag-Erling Smørgrav while(names[i]) { 6214c75e3aaSDag-Erling Smørgrav if(strncmp(names[i], s, strlen(names[i])) == 0) { 6224c75e3aaSDag-Erling Smørgrav is_ok = 1; 6234c75e3aaSDag-Erling Smørgrav break; 6244c75e3aaSDag-Erling Smørgrav } 6254c75e3aaSDag-Erling Smørgrav i++; 6264c75e3aaSDag-Erling Smørgrav } 6274c75e3aaSDag-Erling Smørgrav if(is_ok == 0) { 6284c75e3aaSDag-Erling Smørgrav char n[64]; 6294c75e3aaSDag-Erling Smørgrav size_t j; 6304c75e3aaSDag-Erling Smørgrav n[0]=0; 6314c75e3aaSDag-Erling Smørgrav n[sizeof(n)-1]=0; 6324c75e3aaSDag-Erling Smørgrav for(j=0; j<sizeof(n)-1; j++) { 6334c75e3aaSDag-Erling Smørgrav if(!s[j] || isspace((unsigned char)s[j])) { 6344c75e3aaSDag-Erling Smørgrav n[j] = 0; 6354c75e3aaSDag-Erling Smørgrav break; 6364c75e3aaSDag-Erling Smørgrav } 6374c75e3aaSDag-Erling Smørgrav n[j] = s[j]; 6384c75e3aaSDag-Erling Smørgrav } 6394c75e3aaSDag-Erling Smørgrav fatal_exit("module_conf lists module '%s' but that " 6404c75e3aaSDag-Erling Smørgrav "module is not available.", n); 6414c75e3aaSDag-Erling Smørgrav } 6424c75e3aaSDag-Erling Smørgrav s += strlen(names[i]); 6434c75e3aaSDag-Erling Smørgrav } 6444c75e3aaSDag-Erling Smørgrav } 6454c75e3aaSDag-Erling Smørgrav 646b7579f77SDag-Erling Smørgrav /** check configuration for errors */ 647b7579f77SDag-Erling Smørgrav static void 648e86b9096SDag-Erling Smørgrav morechecks(struct config_file* cfg) 649b7579f77SDag-Erling Smørgrav { 650b7579f77SDag-Erling Smørgrav warn_hosts("stub-host", cfg->stubs); 651b7579f77SDag-Erling Smørgrav warn_hosts("forward-host", cfg->forwards); 652b7579f77SDag-Erling Smørgrav interfacechecks(cfg); 653a39a5a69SCy Schubert ifautomaticportschecks(cfg->if_automatic_ports); 654b7579f77SDag-Erling Smørgrav aclchecks(cfg); 6554c75e3aaSDag-Erling Smørgrav tcpconnlimitchecks(cfg); 656b7579f77SDag-Erling Smørgrav 657b7579f77SDag-Erling Smørgrav if(cfg->verbosity < 0) 658b7579f77SDag-Erling Smørgrav fatal_exit("verbosity value < 0"); 659b7579f77SDag-Erling Smørgrav if(cfg->num_threads <= 0 || cfg->num_threads > 10000) 660b7579f77SDag-Erling Smørgrav fatal_exit("num_threads value weird"); 661b7579f77SDag-Erling Smørgrav if(!cfg->do_ip4 && !cfg->do_ip6) 662b7579f77SDag-Erling Smørgrav fatal_exit("ip4 and ip6 are both disabled, pointless"); 66325039b37SCy Schubert if(!cfg->do_ip4 && cfg->prefer_ip4) 66425039b37SCy Schubert fatal_exit("cannot prefer and disable ip4, pointless"); 665b5663de9SDag-Erling Smørgrav if(!cfg->do_ip6 && cfg->prefer_ip6) 666b5663de9SDag-Erling Smørgrav fatal_exit("cannot prefer and disable ip6, pointless"); 667b7579f77SDag-Erling Smørgrav if(!cfg->do_udp && !cfg->do_tcp) 668b7579f77SDag-Erling Smørgrav fatal_exit("udp and tcp are both disabled, pointless"); 669b7579f77SDag-Erling Smørgrav if(cfg->edns_buffer_size > cfg->msg_buffer_size) 670b7579f77SDag-Erling Smørgrav fatal_exit("edns-buffer-size larger than msg-buffer-size, " 671b7579f77SDag-Erling Smørgrav "answers will not fit in processing buffer"); 67205ab2901SDag-Erling Smørgrav #ifdef UB_ON_WINDOWS 67305ab2901SDag-Erling Smørgrav w_config_adjust_directory(cfg); 67405ab2901SDag-Erling Smørgrav #endif 675b7579f77SDag-Erling Smørgrav if(cfg->chrootdir && cfg->chrootdir[0] && 676b7579f77SDag-Erling Smørgrav cfg->chrootdir[strlen(cfg->chrootdir)-1] == '/') 677b7579f77SDag-Erling Smørgrav fatal_exit("chootdir %s has trailing slash '/' please remove.", 678b7579f77SDag-Erling Smørgrav cfg->chrootdir); 679b7579f77SDag-Erling Smørgrav if(cfg->chrootdir && cfg->chrootdir[0] && 680b7579f77SDag-Erling Smørgrav !is_dir(cfg->chrootdir)) { 681b7579f77SDag-Erling Smørgrav fatal_exit("bad chroot directory"); 682b7579f77SDag-Erling Smørgrav } 683b7579f77SDag-Erling Smørgrav if(cfg->directory && cfg->directory[0]) { 684b7579f77SDag-Erling Smørgrav char* ad = fname_after_chroot(cfg->directory, cfg, 0); 685b7579f77SDag-Erling Smørgrav if(!ad) fatal_exit("out of memory"); 686b7579f77SDag-Erling Smørgrav if(!is_dir(ad)) fatal_exit("bad chdir directory"); 687b7579f77SDag-Erling Smørgrav free(ad); 688b7579f77SDag-Erling Smørgrav } 689b7579f77SDag-Erling Smørgrav if( (cfg->chrootdir && cfg->chrootdir[0]) || 690b7579f77SDag-Erling Smørgrav (cfg->directory && cfg->directory[0])) { 691b7579f77SDag-Erling Smørgrav if(cfg->pidfile && cfg->pidfile[0]) { 692b7579f77SDag-Erling Smørgrav char* ad = (cfg->pidfile[0]=='/')?strdup(cfg->pidfile): 693b7579f77SDag-Erling Smørgrav fname_after_chroot(cfg->pidfile, cfg, 1); 694b7579f77SDag-Erling Smørgrav char* bd = basedir(ad); 695b7579f77SDag-Erling Smørgrav if(bd && !is_dir(bd)) 696b7579f77SDag-Erling Smørgrav fatal_exit("pidfile directory does not exist"); 697b7579f77SDag-Erling Smørgrav free(ad); 698b7579f77SDag-Erling Smørgrav } 699b7579f77SDag-Erling Smørgrav if(cfg->logfile && cfg->logfile[0]) { 700b7579f77SDag-Erling Smørgrav char* ad = fname_after_chroot(cfg->logfile, cfg, 1); 701b7579f77SDag-Erling Smørgrav char* bd = basedir(ad); 702b7579f77SDag-Erling Smørgrav if(bd && !is_dir(bd)) 703b7579f77SDag-Erling Smørgrav fatal_exit("logfile directory does not exist"); 704b7579f77SDag-Erling Smørgrav free(ad); 705b7579f77SDag-Erling Smørgrav } 706b7579f77SDag-Erling Smørgrav } 707b7579f77SDag-Erling Smørgrav 708b7579f77SDag-Erling Smørgrav check_chroot_filelist("file with root-hints", 709b7579f77SDag-Erling Smørgrav cfg->root_hints, cfg->chrootdir, cfg); 710b7579f77SDag-Erling Smørgrav check_chroot_filelist("trust-anchor-file", 711b7579f77SDag-Erling Smørgrav cfg->trust_anchor_file_list, cfg->chrootdir, cfg); 712b7579f77SDag-Erling Smørgrav check_chroot_filelist("auto-trust-anchor-file", 713b7579f77SDag-Erling Smørgrav cfg->auto_trust_anchor_file_list, cfg->chrootdir, cfg); 714b7579f77SDag-Erling Smørgrav check_chroot_filelist_wild("trusted-keys-file", 715b7579f77SDag-Erling Smørgrav cfg->trusted_keys_file_list, cfg->chrootdir, cfg); 716103ba509SCy Schubert if(cfg->disable_edns_do && strstr(cfg->module_conf, "validator") 717103ba509SCy Schubert && (cfg->trust_anchor_file_list 718103ba509SCy Schubert || cfg->trust_anchor_list 719103ba509SCy Schubert || cfg->auto_trust_anchor_file_list 720103ba509SCy Schubert || cfg->trusted_keys_file_list)) { 721103ba509SCy Schubert char* key = NULL; 722103ba509SCy Schubert if(cfg->auto_trust_anchor_file_list) 723103ba509SCy Schubert key = cfg->auto_trust_anchor_file_list->str; 724103ba509SCy Schubert if(!key && cfg->trust_anchor_file_list) 725103ba509SCy Schubert key = cfg->trust_anchor_file_list->str; 726103ba509SCy Schubert if(!key && cfg->trust_anchor_list) 727103ba509SCy Schubert key = cfg->trust_anchor_list->str; 728103ba509SCy Schubert if(!key && cfg->trusted_keys_file_list) 729103ba509SCy Schubert key = cfg->trusted_keys_file_list->str; 730103ba509SCy Schubert if(!key) key = ""; 731103ba509SCy Schubert fatal_exit("disable-edns-do does not allow DNSSEC to work, but the validator module uses a trust anchor %s, turn off disable-edns-do or disable validation", key); 732103ba509SCy Schubert } 733c7f4d7adSDag-Erling Smørgrav #ifdef USE_IPSECMOD 734971980c3SDag-Erling Smørgrav if(cfg->ipsecmod_enabled && strstr(cfg->module_conf, "ipsecmod")) { 735971980c3SDag-Erling Smørgrav /* only check hook if enabled */ 736971980c3SDag-Erling Smørgrav check_chroot_string("ipsecmod-hook", &cfg->ipsecmod_hook, 737971980c3SDag-Erling Smørgrav cfg->chrootdir, cfg); 738971980c3SDag-Erling Smørgrav } 739c7f4d7adSDag-Erling Smørgrav #endif 740b7579f77SDag-Erling Smørgrav /* remove chroot setting so that modules are not stripping pathnames */ 741b7579f77SDag-Erling Smørgrav free(cfg->chrootdir); 742b7579f77SDag-Erling Smørgrav cfg->chrootdir = NULL; 743b7579f77SDag-Erling Smørgrav 7444c75e3aaSDag-Erling Smørgrav /* check that the modules listed in module_conf exist */ 7454c75e3aaSDag-Erling Smørgrav check_modules_exist(cfg->module_conf); 7464c75e3aaSDag-Erling Smørgrav 747091e9e46SCy Schubert /* Respip is known to *not* work with dns64. */ 748b7579f77SDag-Erling Smørgrav if(strcmp(cfg->module_conf, "iterator") != 0 749b7579f77SDag-Erling Smørgrav && strcmp(cfg->module_conf, "validator iterator") != 0 750ff825849SDag-Erling Smørgrav && strcmp(cfg->module_conf, "dns64 validator iterator") != 0 751ff825849SDag-Erling Smørgrav && strcmp(cfg->module_conf, "dns64 iterator") != 0 75265b390aaSDag-Erling Smørgrav && strcmp(cfg->module_conf, "respip iterator") != 0 75365b390aaSDag-Erling Smørgrav && strcmp(cfg->module_conf, "respip validator iterator") != 0 7549cf5bc93SCy Schubert && strcmp(cfg->module_conf, "respip dns64 validator iterator") != 0 7559cf5bc93SCy Schubert && strcmp(cfg->module_conf, "respip dns64 iterator") != 0 756b7579f77SDag-Erling Smørgrav #ifdef WITH_PYTHONMODULE 757b7579f77SDag-Erling Smørgrav && strcmp(cfg->module_conf, "python iterator") != 0 758091e9e46SCy Schubert && strcmp(cfg->module_conf, "python respip iterator") != 0 759b7579f77SDag-Erling Smørgrav && strcmp(cfg->module_conf, "python validator iterator") != 0 760091e9e46SCy Schubert && strcmp(cfg->module_conf, "python respip validator iterator") != 0 761b7579f77SDag-Erling Smørgrav && strcmp(cfg->module_conf, "validator python iterator") != 0 762ff825849SDag-Erling Smørgrav && strcmp(cfg->module_conf, "dns64 python iterator") != 0 763ff825849SDag-Erling Smørgrav && strcmp(cfg->module_conf, "dns64 python validator iterator") != 0 764ff825849SDag-Erling Smørgrav && strcmp(cfg->module_conf, "dns64 validator python iterator") != 0 765ff825849SDag-Erling Smørgrav && strcmp(cfg->module_conf, "python dns64 iterator") != 0 766ff825849SDag-Erling Smørgrav && strcmp(cfg->module_conf, "python dns64 validator iterator") != 0 767b7579f77SDag-Erling Smørgrav #endif 76825039b37SCy Schubert #ifdef WITH_DYNLIBMODULE 76925039b37SCy Schubert && strcmp(cfg->module_conf, "dynlib iterator") != 0 77025039b37SCy Schubert && strcmp(cfg->module_conf, "dynlib dynlib iterator") != 0 77125039b37SCy Schubert && strcmp(cfg->module_conf, "dynlib dynlib dynlib iterator") != 0 77225039b37SCy Schubert && strcmp(cfg->module_conf, "python dynlib iterator") != 0 77325039b37SCy Schubert && strcmp(cfg->module_conf, "python dynlib dynlib iterator") != 0 77425039b37SCy Schubert && strcmp(cfg->module_conf, "python dynlib dynlib dynlib iterator") != 0 77525039b37SCy Schubert && strcmp(cfg->module_conf, "dynlib respip iterator") != 0 77625039b37SCy Schubert && strcmp(cfg->module_conf, "dynlib validator iterator") != 0 77725039b37SCy Schubert && strcmp(cfg->module_conf, "dynlib dynlib validator iterator") != 0 77825039b37SCy Schubert && strcmp(cfg->module_conf, "dynlib dynlib dynlib validator iterator") != 0 77925039b37SCy Schubert && strcmp(cfg->module_conf, "python dynlib validator iterator") != 0 78025039b37SCy Schubert && strcmp(cfg->module_conf, "python dynlib dynlib validator iterator") != 0 78125039b37SCy Schubert && strcmp(cfg->module_conf, "python dynlib dynlib dynlib validator iterator") != 0 78225039b37SCy Schubert && strcmp(cfg->module_conf, "dynlib respip validator iterator") != 0 78325039b37SCy Schubert && strcmp(cfg->module_conf, "validator dynlib iterator") != 0 78425039b37SCy Schubert && strcmp(cfg->module_conf, "dns64 dynlib iterator") != 0 78525039b37SCy Schubert && strcmp(cfg->module_conf, "dns64 dynlib validator iterator") != 0 78625039b37SCy Schubert && strcmp(cfg->module_conf, "dns64 validator dynlib iterator") != 0 78725039b37SCy Schubert && strcmp(cfg->module_conf, "dynlib dns64 iterator") != 0 78825039b37SCy Schubert && strcmp(cfg->module_conf, "dynlib dns64 validator iterator") != 0 78925039b37SCy Schubert && strcmp(cfg->module_conf, "dynlib dns64 cachedb iterator") != 0 79025039b37SCy Schubert && strcmp(cfg->module_conf, "dynlib dns64 validator cachedb iterator") != 0 79125039b37SCy Schubert && strcmp(cfg->module_conf, "dns64 dynlib cachedb iterator") != 0 79225039b37SCy Schubert && strcmp(cfg->module_conf, "dns64 dynlib validator cachedb iterator") != 0 79325039b37SCy Schubert && strcmp(cfg->module_conf, "dynlib cachedb iterator") != 0 79425039b37SCy Schubert && strcmp(cfg->module_conf, "dynlib respip cachedb iterator") != 0 79525039b37SCy Schubert && strcmp(cfg->module_conf, "dynlib validator cachedb iterator") != 0 79625039b37SCy Schubert && strcmp(cfg->module_conf, "dynlib respip validator cachedb iterator") != 0 79725039b37SCy Schubert && strcmp(cfg->module_conf, "cachedb dynlib iterator") != 0 79825039b37SCy Schubert && strcmp(cfg->module_conf, "respip cachedb dynlib iterator") != 0 79925039b37SCy Schubert && strcmp(cfg->module_conf, "validator cachedb dynlib iterator") != 0 80025039b37SCy Schubert && strcmp(cfg->module_conf, "respip validator cachedb dynlib iterator") != 0 80125039b37SCy Schubert && strcmp(cfg->module_conf, "validator dynlib cachedb iterator") != 0 80225039b37SCy Schubert && strcmp(cfg->module_conf, "respip validator dynlib cachedb iterator") != 0 80325039b37SCy Schubert && strcmp(cfg->module_conf, "dynlib subnetcache iterator") != 0 80425039b37SCy Schubert && strcmp(cfg->module_conf, "dynlib respip subnetcache iterator") != 0 80525039b37SCy Schubert && strcmp(cfg->module_conf, "subnetcache dynlib iterator") != 0 80625039b37SCy Schubert && strcmp(cfg->module_conf, "respip subnetcache dynlib iterator") != 0 80725039b37SCy Schubert && strcmp(cfg->module_conf, "dynlib subnetcache validator iterator") != 0 80825039b37SCy Schubert && strcmp(cfg->module_conf, "dynlib respip subnetcache validator iterator") != 0 80925039b37SCy Schubert && strcmp(cfg->module_conf, "subnetcache dynlib validator iterator") != 0 81025039b37SCy Schubert && strcmp(cfg->module_conf, "respip subnetcache dynlib validator iterator") != 0 81125039b37SCy Schubert && strcmp(cfg->module_conf, "subnetcache validator dynlib iterator") != 0 81225039b37SCy Schubert && strcmp(cfg->module_conf, "respip subnetcache validator dynlib iterator") != 0 81325039b37SCy Schubert && strcmp(cfg->module_conf, "dynlib ipsecmod iterator") != 0 81425039b37SCy Schubert && strcmp(cfg->module_conf, "dynlib ipsecmod respip iterator") != 0 81525039b37SCy Schubert && strcmp(cfg->module_conf, "ipsecmod dynlib iterator") != 0 81625039b37SCy Schubert && strcmp(cfg->module_conf, "ipsecmod dynlib respip iterator") != 0 81725039b37SCy Schubert && strcmp(cfg->module_conf, "ipsecmod validator iterator") != 0 81825039b37SCy Schubert && strcmp(cfg->module_conf, "ipsecmod respip validator iterator") != 0 81925039b37SCy Schubert && strcmp(cfg->module_conf, "dynlib ipsecmod validator iterator") != 0 82025039b37SCy Schubert && strcmp(cfg->module_conf, "dynlib ipsecmod respip validator iterator") != 0 82125039b37SCy Schubert && strcmp(cfg->module_conf, "ipsecmod dynlib validator iterator") != 0 82225039b37SCy Schubert && strcmp(cfg->module_conf, "ipsecmod dynlib respip validator iterator") != 0 82325039b37SCy Schubert && strcmp(cfg->module_conf, "ipsecmod validator dynlib iterator") != 0 82425039b37SCy Schubert && strcmp(cfg->module_conf, "ipsecmod respip validator dynlib iterator") != 0 82525039b37SCy Schubert #endif 826e2d15004SDag-Erling Smørgrav #ifdef USE_CACHEDB 827e2d15004SDag-Erling Smørgrav && strcmp(cfg->module_conf, "validator cachedb iterator") != 0 828091e9e46SCy Schubert && strcmp(cfg->module_conf, "respip validator cachedb iterator") != 0 829e2d15004SDag-Erling Smørgrav && strcmp(cfg->module_conf, "cachedb iterator") != 0 830091e9e46SCy Schubert && strcmp(cfg->module_conf, "respip cachedb iterator") != 0 831e2d15004SDag-Erling Smørgrav && strcmp(cfg->module_conf, "dns64 validator cachedb iterator") != 0 832e2d15004SDag-Erling Smørgrav && strcmp(cfg->module_conf, "dns64 cachedb iterator") != 0 83365b390aaSDag-Erling Smørgrav #endif 83465b390aaSDag-Erling Smørgrav #if defined(WITH_PYTHONMODULE) && defined(USE_CACHEDB) 835e2d15004SDag-Erling Smørgrav && strcmp(cfg->module_conf, "python dns64 cachedb iterator") != 0 836e2d15004SDag-Erling Smørgrav && strcmp(cfg->module_conf, "python dns64 validator cachedb iterator") != 0 837e2d15004SDag-Erling Smørgrav && strcmp(cfg->module_conf, "dns64 python cachedb iterator") != 0 838e2d15004SDag-Erling Smørgrav && strcmp(cfg->module_conf, "dns64 python validator cachedb iterator") != 0 839e2d15004SDag-Erling Smørgrav && strcmp(cfg->module_conf, "python cachedb iterator") != 0 840091e9e46SCy Schubert && strcmp(cfg->module_conf, "python respip cachedb iterator") != 0 841e2d15004SDag-Erling Smørgrav && strcmp(cfg->module_conf, "python validator cachedb iterator") != 0 842091e9e46SCy Schubert && strcmp(cfg->module_conf, "python respip validator cachedb iterator") != 0 843e2d15004SDag-Erling Smørgrav && strcmp(cfg->module_conf, "cachedb python iterator") != 0 844091e9e46SCy Schubert && strcmp(cfg->module_conf, "respip cachedb python iterator") != 0 845e2d15004SDag-Erling Smørgrav && strcmp(cfg->module_conf, "validator cachedb python iterator") != 0 846091e9e46SCy Schubert && strcmp(cfg->module_conf, "respip validator cachedb python iterator") != 0 847e2d15004SDag-Erling Smørgrav && strcmp(cfg->module_conf, "validator python cachedb iterator") != 0 848091e9e46SCy Schubert && strcmp(cfg->module_conf, "respip validator python cachedb iterator") != 0 849e2d15004SDag-Erling Smørgrav #endif 8509cf5bc93SCy Schubert #if defined(CLIENT_SUBNET) && defined(USE_CACHEDB) 8519cf5bc93SCy Schubert && strcmp(cfg->module_conf, "respip subnetcache validator cachedb iterator") != 0 8529cf5bc93SCy Schubert && strcmp(cfg->module_conf, "subnetcache validator cachedb iterator") != 0 8539cf5bc93SCy Schubert #endif 85465b390aaSDag-Erling Smørgrav #ifdef CLIENT_SUBNET 85565b390aaSDag-Erling Smørgrav && strcmp(cfg->module_conf, "subnetcache iterator") != 0 856091e9e46SCy Schubert && strcmp(cfg->module_conf, "respip subnetcache iterator") != 0 85765b390aaSDag-Erling Smørgrav && strcmp(cfg->module_conf, "subnetcache validator iterator") != 0 858091e9e46SCy Schubert && strcmp(cfg->module_conf, "respip subnetcache validator iterator") != 0 859971980c3SDag-Erling Smørgrav && strcmp(cfg->module_conf, "dns64 subnetcache iterator") != 0 860971980c3SDag-Erling Smørgrav && strcmp(cfg->module_conf, "dns64 subnetcache validator iterator") != 0 86125039b37SCy Schubert && strcmp(cfg->module_conf, "dns64 subnetcache respip iterator") != 0 86225039b37SCy Schubert && strcmp(cfg->module_conf, "dns64 subnetcache respip validator iterator") != 0 86365b390aaSDag-Erling Smørgrav #endif 86465b390aaSDag-Erling Smørgrav #if defined(WITH_PYTHONMODULE) && defined(CLIENT_SUBNET) 86565b390aaSDag-Erling Smørgrav && strcmp(cfg->module_conf, "python subnetcache iterator") != 0 866091e9e46SCy Schubert && strcmp(cfg->module_conf, "python respip subnetcache iterator") != 0 86765b390aaSDag-Erling Smørgrav && strcmp(cfg->module_conf, "subnetcache python iterator") != 0 868091e9e46SCy Schubert && strcmp(cfg->module_conf, "respip subnetcache python iterator") != 0 86965b390aaSDag-Erling Smørgrav && strcmp(cfg->module_conf, "python subnetcache validator iterator") != 0 870091e9e46SCy Schubert && strcmp(cfg->module_conf, "python respip subnetcache validator iterator") != 0 87165b390aaSDag-Erling Smørgrav && strcmp(cfg->module_conf, "subnetcache python validator iterator") != 0 872091e9e46SCy Schubert && strcmp(cfg->module_conf, "respip subnetcache python validator iterator") != 0 87365b390aaSDag-Erling Smørgrav && strcmp(cfg->module_conf, "subnetcache validator python iterator") != 0 874091e9e46SCy Schubert && strcmp(cfg->module_conf, "respip subnetcache validator python iterator") != 0 87565b390aaSDag-Erling Smørgrav #endif 876c7f4d7adSDag-Erling Smørgrav #ifdef USE_IPSECMOD 877c7f4d7adSDag-Erling Smørgrav && strcmp(cfg->module_conf, "ipsecmod iterator") != 0 878091e9e46SCy Schubert && strcmp(cfg->module_conf, "ipsecmod respip iterator") != 0 879c7f4d7adSDag-Erling Smørgrav && strcmp(cfg->module_conf, "ipsecmod validator iterator") != 0 880091e9e46SCy Schubert && strcmp(cfg->module_conf, "ipsecmod respip validator iterator") != 0 881c7f4d7adSDag-Erling Smørgrav #endif 882c7f4d7adSDag-Erling Smørgrav #if defined(WITH_PYTHONMODULE) && defined(USE_IPSECMOD) 883c7f4d7adSDag-Erling Smørgrav && strcmp(cfg->module_conf, "python ipsecmod iterator") != 0 884091e9e46SCy Schubert && strcmp(cfg->module_conf, "python ipsecmod respip iterator") != 0 885c7f4d7adSDag-Erling Smørgrav && strcmp(cfg->module_conf, "ipsecmod python iterator") != 0 886091e9e46SCy Schubert && strcmp(cfg->module_conf, "ipsecmod python respip iterator") != 0 887c7f4d7adSDag-Erling Smørgrav && strcmp(cfg->module_conf, "ipsecmod validator iterator") != 0 888091e9e46SCy Schubert && strcmp(cfg->module_conf, "ipsecmod respip validator iterator") != 0 889c7f4d7adSDag-Erling Smørgrav && strcmp(cfg->module_conf, "python ipsecmod validator iterator") != 0 890091e9e46SCy Schubert && strcmp(cfg->module_conf, "python ipsecmod respip validator iterator") != 0 891c7f4d7adSDag-Erling Smørgrav && strcmp(cfg->module_conf, "ipsecmod python validator iterator") != 0 892091e9e46SCy Schubert && strcmp(cfg->module_conf, "ipsecmod python respip validator iterator") != 0 893c7f4d7adSDag-Erling Smørgrav && strcmp(cfg->module_conf, "ipsecmod validator python iterator") != 0 894091e9e46SCy Schubert && strcmp(cfg->module_conf, "ipsecmod respip validator python iterator") != 0 895c7f4d7adSDag-Erling Smørgrav #endif 8960eefd307SCy Schubert #ifdef USE_IPSET 8970eefd307SCy Schubert && strcmp(cfg->module_conf, "validator ipset iterator") != 0 898091e9e46SCy Schubert && strcmp(cfg->module_conf, "validator ipset respip iterator") != 0 8990eefd307SCy Schubert && strcmp(cfg->module_conf, "ipset iterator") != 0 900091e9e46SCy Schubert && strcmp(cfg->module_conf, "ipset respip iterator") != 0 9010eefd307SCy Schubert #endif 902b7579f77SDag-Erling Smørgrav ) { 903b7579f77SDag-Erling Smørgrav fatal_exit("module conf '%s' is not known to work", 904b7579f77SDag-Erling Smørgrav cfg->module_conf); 905b7579f77SDag-Erling Smørgrav } 906b7579f77SDag-Erling Smørgrav 907b7579f77SDag-Erling Smørgrav #ifdef HAVE_GETPWNAM 908b7579f77SDag-Erling Smørgrav if(cfg->username && cfg->username[0]) { 909b7579f77SDag-Erling Smørgrav if(getpwnam(cfg->username) == NULL) 910b7579f77SDag-Erling Smørgrav fatal_exit("user '%s' does not exist.", cfg->username); 911b5663de9SDag-Erling Smørgrav # ifdef HAVE_ENDPWENT 912b7579f77SDag-Erling Smørgrav endpwent(); 913b5663de9SDag-Erling Smørgrav # endif 914b7579f77SDag-Erling Smørgrav } 915b7579f77SDag-Erling Smørgrav #endif 9167da0adf7SDag-Erling Smørgrav if(cfg->remote_control_enable && options_remote_is_address(cfg) 9177da0adf7SDag-Erling Smørgrav && cfg->control_use_cert) { 918b7579f77SDag-Erling Smørgrav check_chroot_string("server-key-file", &cfg->server_key_file, 919b7579f77SDag-Erling Smørgrav cfg->chrootdir, cfg); 920b7579f77SDag-Erling Smørgrav check_chroot_string("server-cert-file", &cfg->server_cert_file, 921b7579f77SDag-Erling Smørgrav cfg->chrootdir, cfg); 922b7579f77SDag-Erling Smørgrav if(!is_file(cfg->control_key_file)) 923b7579f77SDag-Erling Smørgrav fatal_exit("control-key-file: \"%s\" does not exist", 924b7579f77SDag-Erling Smørgrav cfg->control_key_file); 925b7579f77SDag-Erling Smørgrav if(!is_file(cfg->control_cert_file)) 926b7579f77SDag-Erling Smørgrav fatal_exit("control-cert-file: \"%s\" does not exist", 927b7579f77SDag-Erling Smørgrav cfg->control_cert_file); 928b7579f77SDag-Erling Smørgrav } 929b7579f77SDag-Erling Smørgrav 9300eefd307SCy Schubert donotquerylocalhostcheck(cfg); 931b7579f77SDag-Erling Smørgrav localzonechecks(cfg); 93265b390aaSDag-Erling Smørgrav view_and_respipchecks(cfg); 933971980c3SDag-Erling Smørgrav #ifdef CLIENT_SUBNET 934971980c3SDag-Erling Smørgrav ecs_conf_checks(cfg); 935971980c3SDag-Erling Smørgrav #endif 936b7579f77SDag-Erling Smørgrav } 937b7579f77SDag-Erling Smørgrav 938b7579f77SDag-Erling Smørgrav /** check forwards */ 939b7579f77SDag-Erling Smørgrav static void 940b7579f77SDag-Erling Smørgrav check_fwd(struct config_file* cfg) 941b7579f77SDag-Erling Smørgrav { 942b7579f77SDag-Erling Smørgrav struct iter_forwards* fwd = forwards_create(); 943b7579f77SDag-Erling Smørgrav if(!fwd || !forwards_apply_cfg(fwd, cfg)) { 944b7579f77SDag-Erling Smørgrav fatal_exit("Could not set forward zones"); 945b7579f77SDag-Erling Smørgrav } 946b7579f77SDag-Erling Smørgrav forwards_delete(fwd); 947b7579f77SDag-Erling Smørgrav } 948b7579f77SDag-Erling Smørgrav 949b7579f77SDag-Erling Smørgrav /** check hints */ 950b7579f77SDag-Erling Smørgrav static void 951b7579f77SDag-Erling Smørgrav check_hints(struct config_file* cfg) 952b7579f77SDag-Erling Smørgrav { 953b7579f77SDag-Erling Smørgrav struct iter_hints* hints = hints_create(); 954b7579f77SDag-Erling Smørgrav if(!hints || !hints_apply_cfg(hints, cfg)) { 955b7579f77SDag-Erling Smørgrav fatal_exit("Could not set root or stub hints"); 956b7579f77SDag-Erling Smørgrav } 957b7579f77SDag-Erling Smørgrav hints_delete(hints); 958b7579f77SDag-Erling Smørgrav } 959b7579f77SDag-Erling Smørgrav 96057bddd21SDag-Erling Smørgrav /** check auth zones */ 96157bddd21SDag-Erling Smørgrav static void 96257bddd21SDag-Erling Smørgrav check_auth(struct config_file* cfg) 96357bddd21SDag-Erling Smørgrav { 964091e9e46SCy Schubert int is_rpz = 0; 96557bddd21SDag-Erling Smørgrav struct auth_zones* az = auth_zones_create(); 9665469a995SCy Schubert if(!az || !auth_zones_apply_cfg(az, cfg, 0, &is_rpz, NULL, NULL)) { 96757bddd21SDag-Erling Smørgrav fatal_exit("Could not setup authority zones"); 96857bddd21SDag-Erling Smørgrav } 96957bddd21SDag-Erling Smørgrav auth_zones_delete(az); 97057bddd21SDag-Erling Smørgrav } 97157bddd21SDag-Erling Smørgrav 972b7579f77SDag-Erling Smørgrav /** check config file */ 973b7579f77SDag-Erling Smørgrav static void 974335c7cdaSCy Schubert checkconf(const char* cfgfile, const char* opt, int final, int quiet) 975b7579f77SDag-Erling Smørgrav { 976bc892140SDag-Erling Smørgrav char oldwd[4096]; 977b7579f77SDag-Erling Smørgrav struct config_file* cfg = config_create(); 978b7579f77SDag-Erling Smørgrav if(!cfg) 979b7579f77SDag-Erling Smørgrav fatal_exit("out of memory"); 980b5663de9SDag-Erling Smørgrav oldwd[0] = 0; 981b5663de9SDag-Erling Smørgrav if(!getcwd(oldwd, sizeof(oldwd))) { 982b5663de9SDag-Erling Smørgrav log_err("cannot getcwd: %s", strerror(errno)); 983b5663de9SDag-Erling Smørgrav oldwd[0] = 0; 984b5663de9SDag-Erling Smørgrav } 985b7579f77SDag-Erling Smørgrav if(!config_read(cfg, cfgfile, NULL)) { 986b7579f77SDag-Erling Smørgrav /* config_read prints messages to stderr */ 987b7579f77SDag-Erling Smørgrav config_delete(cfg); 988b7579f77SDag-Erling Smørgrav exit(1); 989b7579f77SDag-Erling Smørgrav } 990b5663de9SDag-Erling Smørgrav if(oldwd[0] && chdir(oldwd) == -1) 991b5663de9SDag-Erling Smørgrav log_err("cannot chdir(%s): %s", oldwd, strerror(errno)); 992ff825849SDag-Erling Smørgrav if(opt) { 9936480faa8SDag-Erling Smørgrav print_option(cfg, opt, final); 994ff825849SDag-Erling Smørgrav config_delete(cfg); 995ff825849SDag-Erling Smørgrav return; 996ff825849SDag-Erling Smørgrav } 997e86b9096SDag-Erling Smørgrav morechecks(cfg); 998b7579f77SDag-Erling Smørgrav check_mod(cfg, iter_get_funcblock()); 999b7579f77SDag-Erling Smørgrav check_mod(cfg, val_get_funcblock()); 1000b7579f77SDag-Erling Smørgrav #ifdef WITH_PYTHONMODULE 1001b7579f77SDag-Erling Smørgrav if(strstr(cfg->module_conf, "python")) 1002b7579f77SDag-Erling Smørgrav check_mod(cfg, pythonmod_get_funcblock()); 1003b7579f77SDag-Erling Smørgrav #endif 1004b7579f77SDag-Erling Smørgrav check_fwd(cfg); 1005b7579f77SDag-Erling Smørgrav check_hints(cfg); 100657bddd21SDag-Erling Smørgrav check_auth(cfg); 1007335c7cdaSCy Schubert if(!quiet) { printf("unbound-checkconf: no errors in %s\n", cfgfile); } 1008b7579f77SDag-Erling Smørgrav config_delete(cfg); 1009b7579f77SDag-Erling Smørgrav } 1010b7579f77SDag-Erling Smørgrav 1011b7579f77SDag-Erling Smørgrav /** getopt global, in case header files fail to declare it. */ 1012b7579f77SDag-Erling Smørgrav extern int optind; 1013b7579f77SDag-Erling Smørgrav /** getopt global, in case header files fail to declare it. */ 1014b7579f77SDag-Erling Smørgrav extern char* optarg; 1015b7579f77SDag-Erling Smørgrav 1016b7579f77SDag-Erling Smørgrav /** Main routine for checkconf */ 1017b7579f77SDag-Erling Smørgrav int main(int argc, char* argv[]) 1018b7579f77SDag-Erling Smørgrav { 1019b7579f77SDag-Erling Smørgrav int c; 10206480faa8SDag-Erling Smørgrav int final = 0; 1021335c7cdaSCy Schubert int quiet = 0; 1022b7579f77SDag-Erling Smørgrav const char* f; 1023b7579f77SDag-Erling Smørgrav const char* opt = NULL; 1024b7579f77SDag-Erling Smørgrav const char* cfgfile = CONFIGFILE; 102524e36522SCy Schubert checklock_start(); 1026b7579f77SDag-Erling Smørgrav log_ident_set("unbound-checkconf"); 1027b7579f77SDag-Erling Smørgrav log_init(NULL, 0, NULL); 1028b7579f77SDag-Erling Smørgrav #ifdef USE_WINSOCK 1029b7579f77SDag-Erling Smørgrav /* use registry config file in preference to compiletime location */ 1030b7579f77SDag-Erling Smørgrav if(!(cfgfile=w_lookup_reg_str("Software\\Unbound", "ConfigFile"))) 1031b7579f77SDag-Erling Smørgrav cfgfile = CONFIGFILE; 1032b7579f77SDag-Erling Smørgrav #endif /* USE_WINSOCK */ 1033b7579f77SDag-Erling Smørgrav /* parse the options */ 1034335c7cdaSCy Schubert while( (c=getopt(argc, argv, "fhqo:")) != -1) { 1035b7579f77SDag-Erling Smørgrav switch(c) { 10366480faa8SDag-Erling Smørgrav case 'f': 10376480faa8SDag-Erling Smørgrav final = 1; 10386480faa8SDag-Erling Smørgrav break; 1039b7579f77SDag-Erling Smørgrav case 'o': 1040b7579f77SDag-Erling Smørgrav opt = optarg; 1041b7579f77SDag-Erling Smørgrav break; 1042335c7cdaSCy Schubert case 'q': 1043335c7cdaSCy Schubert quiet = 1; 1044335c7cdaSCy Schubert break; 1045b7579f77SDag-Erling Smørgrav case '?': 1046b7579f77SDag-Erling Smørgrav case 'h': 1047b7579f77SDag-Erling Smørgrav default: 1048b7579f77SDag-Erling Smørgrav usage(); 1049b7579f77SDag-Erling Smørgrav } 1050b7579f77SDag-Erling Smørgrav } 1051b7579f77SDag-Erling Smørgrav argc -= optind; 1052b7579f77SDag-Erling Smørgrav argv += optind; 1053b7579f77SDag-Erling Smørgrav if(argc != 0 && argc != 1) 1054b7579f77SDag-Erling Smørgrav usage(); 1055b7579f77SDag-Erling Smørgrav if(argc == 1) 1056b7579f77SDag-Erling Smørgrav f = argv[0]; 1057b7579f77SDag-Erling Smørgrav else f = cfgfile; 1058335c7cdaSCy Schubert checkconf(f, opt, final, quiet); 1059b7579f77SDag-Erling Smørgrav checklock_stop(); 1060b7579f77SDag-Erling Smørgrav return 0; 1061b7579f77SDag-Erling Smørgrav } 1062