/contrib/bind9/bin/nsupdate/nsupdate.c
https://bitbucket.org/freebsd/freebsd-head/ · C · 2973 lines · 2505 code · 387 blank · 81 comment · 696 complexity · 35b41d505eb59fa22cae3444d19c68b1 MD5 · raw file
Large files are truncated click here to view the full file
- /*
- * Copyright (C) 2004-2011 Internet Systems Consortium, Inc. ("ISC")
- * Copyright (C) 2000-2003 Internet Software Consortium.
- *
- * Permission to use, copy, modify, and/or distribute this software for any
- * purpose with or without fee is hereby granted, provided that the above
- * copyright notice and this permission notice appear in all copies.
- *
- * THE SOFTWARE IS PROVIDED "AS IS" AND ISC DISCLAIMS ALL WARRANTIES WITH
- * REGARD TO THIS SOFTWARE INCLUDING ALL IMPLIED WARRANTIES OF MERCHANTABILITY
- * AND FITNESS. IN NO EVENT SHALL ISC BE LIABLE FOR ANY SPECIAL, DIRECT,
- * INDIRECT, OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES WHATSOEVER RESULTING FROM
- * LOSS OF USE, DATA OR PROFITS, WHETHER IN AN ACTION OF CONTRACT, NEGLIGENCE
- * OR OTHER TORTIOUS ACTION, ARISING OUT OF OR IN CONNECTION WITH THE USE OR
- * PERFORMANCE OF THIS SOFTWARE.
- */
- /* $Id: nsupdate.c,v 1.193.12.4 2011/11/03 04:30:09 each Exp $ */
- /*! \file */
- #include <config.h>
- #include <ctype.h>
- #include <errno.h>
- #include <limits.h>
- #include <stdlib.h>
- #include <unistd.h>
- #include <isc/app.h>
- #include <isc/base64.h>
- #include <isc/buffer.h>
- #include <isc/commandline.h>
- #include <isc/entropy.h>
- #include <isc/event.h>
- #include <isc/file.h>
- #include <isc/hash.h>
- #include <isc/lex.h>
- #include <isc/log.h>
- #include <isc/mem.h>
- #include <isc/parseint.h>
- #include <isc/print.h>
- #include <isc/random.h>
- #include <isc/region.h>
- #include <isc/sockaddr.h>
- #include <isc/socket.h>
- #include <isc/stdio.h>
- #include <isc/string.h>
- #include <isc/task.h>
- #include <isc/timer.h>
- #include <isc/types.h>
- #include <isc/util.h>
- #include <isccfg/namedconf.h>
- #include <dns/callbacks.h>
- #include <dns/dispatch.h>
- #include <dns/dnssec.h>
- #include <dns/events.h>
- #include <dns/fixedname.h>
- #include <dns/log.h>
- #include <dns/masterdump.h>
- #include <dns/message.h>
- #include <dns/name.h>
- #include <dns/rcode.h>
- #include <dns/rdata.h>
- #include <dns/rdataclass.h>
- #include <dns/rdatalist.h>
- #include <dns/rdataset.h>
- #include <dns/rdatastruct.h>
- #include <dns/rdatatype.h>
- #include <dns/request.h>
- #include <dns/result.h>
- #include <dns/tkey.h>
- #include <dns/tsig.h>
- #include <dst/dst.h>
- #include <lwres/lwres.h>
- #include <lwres/net.h>
- #ifdef GSSAPI
- #include <dst/gssapi.h>
- #include ISC_PLATFORM_KRB5HEADER
- #endif
- #include <bind9/getaddresses.h>
- #ifdef HAVE_ADDRINFO
- #ifdef HAVE_GETADDRINFO
- #ifdef HAVE_GAISTRERROR
- #define USE_GETADDRINFO
- #endif
- #endif
- #endif
- #ifndef USE_GETADDRINFO
- #ifndef ISC_PLATFORM_NONSTDHERRNO
- extern int h_errno;
- #endif
- #endif
- #define MAXCMD (4 * 1024)
- #define MAXWIRE (64 * 1024)
- #define PACKETSIZE ((64 * 1024) - 1)
- #define INITTEXT (2 * 1024)
- #define MAXTEXT (128 * 1024)
- #define FIND_TIMEOUT 5
- #define TTL_MAX 2147483647U /* Maximum signed 32 bit integer. */
- #define DNSDEFAULTPORT 53
- static isc_uint16_t dnsport = DNSDEFAULTPORT;
- #ifndef RESOLV_CONF
- #define RESOLV_CONF "/etc/resolv.conf"
- #endif
- static isc_boolean_t debugging = ISC_FALSE, ddebugging = ISC_FALSE;
- static isc_boolean_t memdebugging = ISC_FALSE;
- static isc_boolean_t have_ipv4 = ISC_FALSE;
- static isc_boolean_t have_ipv6 = ISC_FALSE;
- static isc_boolean_t is_dst_up = ISC_FALSE;
- static isc_boolean_t usevc = ISC_FALSE;
- static isc_boolean_t usegsstsig = ISC_FALSE;
- static isc_boolean_t use_win2k_gsstsig = ISC_FALSE;
- static isc_boolean_t tried_other_gsstsig = ISC_FALSE;
- static isc_boolean_t local_only = ISC_FALSE;
- static isc_taskmgr_t *taskmgr = NULL;
- static isc_task_t *global_task = NULL;
- static isc_event_t *global_event = NULL;
- static isc_log_t *lctx = NULL;
- static isc_mem_t *mctx = NULL;
- static dns_dispatchmgr_t *dispatchmgr = NULL;
- static dns_requestmgr_t *requestmgr = NULL;
- static isc_socketmgr_t *socketmgr = NULL;
- static isc_timermgr_t *timermgr = NULL;
- static dns_dispatch_t *dispatchv4 = NULL;
- static dns_dispatch_t *dispatchv6 = NULL;
- static dns_message_t *updatemsg = NULL;
- static dns_fixedname_t fuserzone;
- static dns_name_t *userzone = NULL;
- static dns_name_t *zonename = NULL;
- static dns_name_t tmpzonename;
- static dns_name_t restart_master;
- static dns_tsig_keyring_t *gssring = NULL;
- static dns_tsigkey_t *tsigkey = NULL;
- static dst_key_t *sig0key = NULL;
- static lwres_context_t *lwctx = NULL;
- static lwres_conf_t *lwconf;
- static isc_sockaddr_t *servers;
- static int ns_inuse = 0;
- static int ns_total = 0;
- static isc_sockaddr_t *userserver = NULL;
- static isc_sockaddr_t *localaddr = NULL;
- static isc_sockaddr_t *serveraddr = NULL;
- static isc_sockaddr_t tempaddr;
- static const char *keyfile = NULL;
- static char *keystr = NULL;
- static isc_entropy_t *entropy = NULL;
- static isc_boolean_t shuttingdown = ISC_FALSE;
- static FILE *input;
- static isc_boolean_t interactive = ISC_TRUE;
- static isc_boolean_t seenerror = ISC_FALSE;
- static const dns_master_style_t *style;
- static int requests = 0;
- static unsigned int logdebuglevel = 0;
- static unsigned int timeout = 300;
- static unsigned int udp_timeout = 3;
- static unsigned int udp_retries = 3;
- static dns_rdataclass_t defaultclass = dns_rdataclass_in;
- static dns_rdataclass_t zoneclass = dns_rdataclass_none;
- static dns_message_t *answer = NULL;
- static isc_uint32_t default_ttl = 0;
- static isc_boolean_t default_ttl_set = ISC_FALSE;
- typedef struct nsu_requestinfo {
- dns_message_t *msg;
- isc_sockaddr_t *addr;
- } nsu_requestinfo_t;
- static void
- sendrequest(isc_sockaddr_t *srcaddr, isc_sockaddr_t *destaddr,
- dns_message_t *msg, dns_request_t **request);
- ISC_PLATFORM_NORETURN_PRE static void
- fatal(const char *format, ...)
- ISC_FORMAT_PRINTF(1, 2) ISC_PLATFORM_NORETURN_POST;
- static void
- debug(const char *format, ...) ISC_FORMAT_PRINTF(1, 2);
- static void
- ddebug(const char *format, ...) ISC_FORMAT_PRINTF(1, 2);
- #ifdef GSSAPI
- static dns_fixedname_t fkname;
- static isc_sockaddr_t *kserver = NULL;
- static char *realm = NULL;
- static char servicename[DNS_NAME_FORMATSIZE];
- static dns_name_t *keyname;
- typedef struct nsu_gssinfo {
- dns_message_t *msg;
- isc_sockaddr_t *addr;
- gss_ctx_id_t context;
- } nsu_gssinfo_t;
- static void
- start_gssrequest(dns_name_t *master);
- static void
- send_gssrequest(isc_sockaddr_t *srcaddr, isc_sockaddr_t *destaddr,
- dns_message_t *msg, dns_request_t **request,
- gss_ctx_id_t context);
- static void
- recvgss(isc_task_t *task, isc_event_t *event);
- #endif /* GSSAPI */
- static void
- error(const char *format, ...) ISC_FORMAT_PRINTF(1, 2);
- #define STATUS_MORE (isc_uint16_t)0
- #define STATUS_SEND (isc_uint16_t)1
- #define STATUS_QUIT (isc_uint16_t)2
- #define STATUS_SYNTAX (isc_uint16_t)3
- typedef struct entropysource entropysource_t;
- struct entropysource {
- isc_entropysource_t *source;
- isc_mem_t *mctx;
- ISC_LINK(entropysource_t) link;
- };
- static ISC_LIST(entropysource_t) sources;
- static void
- setup_entropy(isc_mem_t *mctx, const char *randomfile, isc_entropy_t **ectx)
- {
- isc_result_t result;
- isc_entropysource_t *source = NULL;
- entropysource_t *elt;
- int usekeyboard = ISC_ENTROPY_KEYBOARDMAYBE;
- REQUIRE(ectx != NULL);
- if (*ectx == NULL) {
- result = isc_entropy_create(mctx, ectx);
- if (result != ISC_R_SUCCESS)
- fatal("could not create entropy object");
- ISC_LIST_INIT(sources);
- }
- if (randomfile != NULL && strcmp(randomfile, "keyboard") == 0) {
- usekeyboard = ISC_ENTROPY_KEYBOARDYES;
- randomfile = NULL;
- }
- result = isc_entropy_usebestsource(*ectx, &source, randomfile,
- usekeyboard);
- if (result != ISC_R_SUCCESS)
- fatal("could not initialize entropy source: %s",
- isc_result_totext(result));
- if (source != NULL) {
- elt = isc_mem_get(mctx, sizeof(*elt));
- if (elt == NULL)
- fatal("out of memory");
- elt->source = source;
- elt->mctx = mctx;
- ISC_LINK_INIT(elt, link);
- ISC_LIST_APPEND(sources, elt, link);
- }
- }
- static void
- cleanup_entropy(isc_entropy_t **ectx) {
- entropysource_t *source;
- while (!ISC_LIST_EMPTY(sources)) {
- source = ISC_LIST_HEAD(sources);
- ISC_LIST_UNLINK(sources, source, link);
- isc_entropy_destroysource(&source->source);
- isc_mem_put(source->mctx, source, sizeof(*source));
- }
- isc_entropy_detach(ectx);
- }
- static dns_rdataclass_t
- getzoneclass(void) {
- if (zoneclass == dns_rdataclass_none)
- zoneclass = defaultclass;
- return (zoneclass);
- }
- static isc_boolean_t
- setzoneclass(dns_rdataclass_t rdclass) {
- if (zoneclass == dns_rdataclass_none ||
- rdclass == dns_rdataclass_none)
- zoneclass = rdclass;
- if (zoneclass != rdclass)
- return (ISC_FALSE);
- return (ISC_TRUE);
- }
- static void
- fatal(const char *format, ...) {
- va_list args;
- va_start(args, format);
- vfprintf(stderr, format, args);
- va_end(args);
- fprintf(stderr, "\n");
- exit(1);
- }
- static void
- error(const char *format, ...) {
- va_list args;
- va_start(args, format);
- vfprintf(stderr, format, args);
- va_end(args);
- fprintf(stderr, "\n");
- }
- static void
- debug(const char *format, ...) {
- va_list args;
- if (debugging) {
- va_start(args, format);
- vfprintf(stderr, format, args);
- va_end(args);
- fprintf(stderr, "\n");
- }
- }
- static void
- ddebug(const char *format, ...) {
- va_list args;
- if (ddebugging) {
- va_start(args, format);
- vfprintf(stderr, format, args);
- va_end(args);
- fprintf(stderr, "\n");
- }
- }
- static inline void
- check_result(isc_result_t result, const char *msg) {
- if (result != ISC_R_SUCCESS)
- fatal("%s: %s", msg, isc_result_totext(result));
- }
- static void *
- mem_alloc(void *arg, size_t size) {
- return (isc_mem_get(arg, size));
- }
- static void
- mem_free(void *arg, void *mem, size_t size) {
- isc_mem_put(arg, mem, size);
- }
- static char *
- nsu_strsep(char **stringp, const char *delim) {
- char *string = *stringp;
- char *s;
- const char *d;
- char sc, dc;
- if (string == NULL)
- return (NULL);
- for (; *string != '\0'; string++) {
- sc = *string;
- for (d = delim; (dc = *d) != '\0'; d++) {
- if (sc == dc)
- break;
- }
- if (dc == 0)
- break;
- }
- for (s = string; *s != '\0'; s++) {
- sc = *s;
- for (d = delim; (dc = *d) != '\0'; d++) {
- if (sc == dc) {
- *s++ = '\0';
- *stringp = s;
- return (string);
- }
- }
- }
- *stringp = NULL;
- return (string);
- }
- static void
- reset_system(void) {
- isc_result_t result;
- ddebug("reset_system()");
- /* If the update message is still around, destroy it */
- if (updatemsg != NULL)
- dns_message_reset(updatemsg, DNS_MESSAGE_INTENTRENDER);
- else {
- result = dns_message_create(mctx, DNS_MESSAGE_INTENTRENDER,
- &updatemsg);
- check_result(result, "dns_message_create");
- }
- updatemsg->opcode = dns_opcode_update;
- if (usegsstsig) {
- if (tsigkey != NULL)
- dns_tsigkey_detach(&tsigkey);
- if (gssring != NULL)
- dns_tsigkeyring_detach(&gssring);
- tried_other_gsstsig = ISC_FALSE;
- }
- }
- static isc_uint16_t
- parse_hmac(dns_name_t **hmac, const char *hmacstr, size_t len) {
- isc_uint16_t digestbits = 0;
- isc_result_t result;
- char buf[20];
- REQUIRE(hmac != NULL && *hmac == NULL);
- REQUIRE(hmacstr != NULL);
- if (len >= sizeof(buf))
- fatal("unknown key type '%.*s'", (int)(len), hmacstr);
- strncpy(buf, hmacstr, len);
- buf[len] = 0;
- if (strcasecmp(buf, "hmac-md5") == 0) {
- *hmac = DNS_TSIG_HMACMD5_NAME;
- } else if (strncasecmp(buf, "hmac-md5-", 9) == 0) {
- *hmac = DNS_TSIG_HMACMD5_NAME;
- result = isc_parse_uint16(&digestbits, &buf[9], 10);
- if (result != ISC_R_SUCCESS || digestbits > 128)
- fatal("digest-bits out of range [0..128]");
- digestbits = (digestbits +7) & ~0x7U;
- } else if (strcasecmp(buf, "hmac-sha1") == 0) {
- *hmac = DNS_TSIG_HMACSHA1_NAME;
- } else if (strncasecmp(buf, "hmac-sha1-", 10) == 0) {
- *hmac = DNS_TSIG_HMACSHA1_NAME;
- result = isc_parse_uint16(&digestbits, &buf[10], 10);
- if (result != ISC_R_SUCCESS || digestbits > 160)
- fatal("digest-bits out of range [0..160]");
- digestbits = (digestbits +7) & ~0x7U;
- } else if (strcasecmp(buf, "hmac-sha224") == 0) {
- *hmac = DNS_TSIG_HMACSHA224_NAME;
- } else if (strncasecmp(buf, "hmac-sha224-", 12) == 0) {
- *hmac = DNS_TSIG_HMACSHA224_NAME;
- result = isc_parse_uint16(&digestbits, &buf[12], 10);
- if (result != ISC_R_SUCCESS || digestbits > 224)
- fatal("digest-bits out of range [0..224]");
- digestbits = (digestbits +7) & ~0x7U;
- } else if (strcasecmp(buf, "hmac-sha256") == 0) {
- *hmac = DNS_TSIG_HMACSHA256_NAME;
- } else if (strncasecmp(buf, "hmac-sha256-", 12) == 0) {
- *hmac = DNS_TSIG_HMACSHA256_NAME;
- result = isc_parse_uint16(&digestbits, &buf[12], 10);
- if (result != ISC_R_SUCCESS || digestbits > 256)
- fatal("digest-bits out of range [0..256]");
- digestbits = (digestbits +7) & ~0x7U;
- } else if (strcasecmp(buf, "hmac-sha384") == 0) {
- *hmac = DNS_TSIG_HMACSHA384_NAME;
- } else if (strncasecmp(buf, "hmac-sha384-", 12) == 0) {
- *hmac = DNS_TSIG_HMACSHA384_NAME;
- result = isc_parse_uint16(&digestbits, &buf[12], 10);
- if (result != ISC_R_SUCCESS || digestbits > 384)
- fatal("digest-bits out of range [0..384]");
- digestbits = (digestbits +7) & ~0x7U;
- } else if (strcasecmp(buf, "hmac-sha512") == 0) {
- *hmac = DNS_TSIG_HMACSHA512_NAME;
- } else if (strncasecmp(buf, "hmac-sha512-", 12) == 0) {
- *hmac = DNS_TSIG_HMACSHA512_NAME;
- result = isc_parse_uint16(&digestbits, &buf[12], 10);
- if (result != ISC_R_SUCCESS || digestbits > 512)
- fatal("digest-bits out of range [0..512]");
- digestbits = (digestbits +7) & ~0x7U;
- } else
- fatal("unknown key type '%s'", buf);
- return (digestbits);
- }
- static int
- basenamelen(const char *file) {
- int len = strlen(file);
- if (len > 1 && file[len - 1] == '.')
- len -= 1;
- else if (len > 8 && strcmp(file + len - 8, ".private") == 0)
- len -= 8;
- else if (len > 4 && strcmp(file + len - 4, ".key") == 0)
- len -= 4;
- return (len);
- }
- static void
- setup_keystr(void) {
- unsigned char *secret = NULL;
- int secretlen;
- isc_buffer_t secretbuf;
- isc_result_t result;
- isc_buffer_t keynamesrc;
- char *secretstr;
- char *s, *n;
- dns_fixedname_t fkeyname;
- dns_name_t *keyname;
- char *name;
- dns_name_t *hmacname = NULL;
- isc_uint16_t digestbits = 0;
- dns_fixedname_init(&fkeyname);
- keyname = dns_fixedname_name(&fkeyname);
- debug("Creating key...");
- s = strchr(keystr, ':');
- if (s == NULL || s == keystr || s[1] == 0)
- fatal("key option must specify [hmac:]keyname:secret");
- secretstr = s + 1;
- n = strchr(secretstr, ':');
- if (n != NULL) {
- if (n == secretstr || n[1] == 0)
- fatal("key option must specify [hmac:]keyname:secret");
- name = secretstr;
- secretstr = n + 1;
- digestbits = parse_hmac(&hmacname, keystr, s - keystr);
- } else {
- hmacname = DNS_TSIG_HMACMD5_NAME;
- name = keystr;
- n = s;
- }
- isc_buffer_init(&keynamesrc, name, n - name);
- isc_buffer_add(&keynamesrc, n - name);
- debug("namefromtext");
- result = dns_name_fromtext(keyname, &keynamesrc, dns_rootname, 0, NULL);
- check_result(result, "dns_name_fromtext");
- secretlen = strlen(secretstr) * 3 / 4;
- secret = isc_mem_allocate(mctx, secretlen);
- if (secret == NULL)
- fatal("out of memory");
- isc_buffer_init(&secretbuf, secret, secretlen);
- result = isc_base64_decodestring(secretstr, &secretbuf);
- if (result != ISC_R_SUCCESS) {
- fprintf(stderr, "could not create key from %s: %s\n",
- keystr, isc_result_totext(result));
- goto failure;
- }
- secretlen = isc_buffer_usedlength(&secretbuf);
- debug("keycreate");
- result = dns_tsigkey_create(keyname, hmacname, secret, secretlen,
- ISC_FALSE, NULL, 0, 0, mctx, NULL,
- &tsigkey);
- if (result != ISC_R_SUCCESS)
- fprintf(stderr, "could not create key from %s: %s\n",
- keystr, dns_result_totext(result));
- else
- dst_key_setbits(tsigkey->key, digestbits);
- failure:
- if (secret != NULL)
- isc_mem_free(mctx, secret);
- }
- /*
- * Get a key from a named.conf format keyfile
- */
- static isc_result_t
- read_sessionkey(isc_mem_t *mctx, isc_log_t *lctx) {
- cfg_parser_t *pctx = NULL;
- cfg_obj_t *sessionkey = NULL;
- const cfg_obj_t *key = NULL;
- const cfg_obj_t *secretobj = NULL;
- const cfg_obj_t *algorithmobj = NULL;
- const char *keyname;
- const char *secretstr;
- const char *algorithm;
- isc_result_t result;
- int len;
- if (! isc_file_exists(keyfile))
- return (ISC_R_FILENOTFOUND);
- result = cfg_parser_create(mctx, lctx, &pctx);
- if (result != ISC_R_SUCCESS)
- goto cleanup;
- result = cfg_parse_file(pctx, keyfile, &cfg_type_sessionkey,
- &sessionkey);
- if (result != ISC_R_SUCCESS)
- goto cleanup;
- result = cfg_map_get(sessionkey, "key", &key);
- if (result != ISC_R_SUCCESS)
- goto cleanup;
- (void) cfg_map_get(key, "secret", &secretobj);
- (void) cfg_map_get(key, "algorithm", &algorithmobj);
- if (secretobj == NULL || algorithmobj == NULL)
- fatal("key must have algorithm and secret");
- keyname = cfg_obj_asstring(cfg_map_getname(key));
- secretstr = cfg_obj_asstring(secretobj);
- algorithm = cfg_obj_asstring(algorithmobj);
- len = strlen(algorithm) + strlen(keyname) + strlen(secretstr) + 3;
- keystr = isc_mem_allocate(mctx, len);
- snprintf(keystr, len, "%s:%s:%s", algorithm, keyname, secretstr);
- setup_keystr();
- cleanup:
- if (pctx != NULL) {
- if (sessionkey != NULL)
- cfg_obj_destroy(pctx, &sessionkey);
- cfg_parser_destroy(&pctx);
- }
- if (keystr != NULL)
- isc_mem_free(mctx, keystr);
- return (result);
- }
- static void
- setup_keyfile(isc_mem_t *mctx, isc_log_t *lctx) {
- dst_key_t *dstkey = NULL;
- isc_result_t result;
- dns_name_t *hmacname = NULL;
- debug("Creating key...");
- if (sig0key != NULL)
- dst_key_free(&sig0key);
- /* Try reading the key from a K* pair */
- result = dst_key_fromnamedfile(keyfile, NULL,
- DST_TYPE_PRIVATE | DST_TYPE_KEY, mctx,
- &dstkey);
- /* If that didn't work, try reading it as a session.key keyfile */
- if (result != ISC_R_SUCCESS) {
- result = read_sessionkey(mctx, lctx);
- if (result == ISC_R_SUCCESS)
- return;
- }
- if (result != ISC_R_SUCCESS) {
- fprintf(stderr, "could not read key from %.*s.{private,key}: "
- "%s\n", basenamelen(keyfile), keyfile,
- isc_result_totext(result));
- return;
- }
- switch (dst_key_alg(dstkey)) {
- case DST_ALG_HMACMD5:
- hmacname = DNS_TSIG_HMACMD5_NAME;
- break;
- case DST_ALG_HMACSHA1:
- hmacname = DNS_TSIG_HMACSHA1_NAME;
- break;
- case DST_ALG_HMACSHA224:
- hmacname = DNS_TSIG_HMACSHA224_NAME;
- break;
- case DST_ALG_HMACSHA256:
- hmacname = DNS_TSIG_HMACSHA256_NAME;
- break;
- case DST_ALG_HMACSHA384:
- hmacname = DNS_TSIG_HMACSHA384_NAME;
- break;
- case DST_ALG_HMACSHA512:
- hmacname = DNS_TSIG_HMACSHA512_NAME;
- break;
- }
- if (hmacname != NULL) {
- result = dns_tsigkey_createfromkey(dst_key_name(dstkey),
- hmacname, dstkey, ISC_FALSE,
- NULL, 0, 0, mctx, NULL,
- &tsigkey);
- dst_key_free(&dstkey);
- if (result != ISC_R_SUCCESS) {
- fprintf(stderr, "could not create key from %s: %s\n",
- keyfile, isc_result_totext(result));
- return;
- }
- } else {
- dst_key_attach(dstkey, &sig0key);
- dst_key_free(&dstkey);
- }
- }
- static void
- doshutdown(void) {
- isc_task_detach(&global_task);
- if (userserver != NULL)
- isc_mem_put(mctx, userserver, sizeof(isc_sockaddr_t));
- if (localaddr != NULL)
- isc_mem_put(mctx, localaddr, sizeof(isc_sockaddr_t));
- if (tsigkey != NULL) {
- ddebug("Freeing TSIG key");
- dns_tsigkey_detach(&tsigkey);
- }
- if (sig0key != NULL) {
- ddebug("Freeing SIG(0) key");
- dst_key_free(&sig0key);
- }
- if (updatemsg != NULL)
- dns_message_destroy(&updatemsg);
- if (is_dst_up) {
- ddebug("Destroy DST lib");
- dst_lib_destroy();
- is_dst_up = ISC_FALSE;
- }
- cleanup_entropy(&entropy);
- lwres_conf_clear(lwctx);
- lwres_context_destroy(&lwctx);
- isc_mem_put(mctx, servers, ns_total * sizeof(isc_sockaddr_t));
- ddebug("Destroying request manager");
- dns_requestmgr_detach(&requestmgr);
- ddebug("Freeing the dispatchers");
- if (have_ipv4)
- dns_dispatch_detach(&dispatchv4);
- if (have_ipv6)
- dns_dispatch_detach(&dispatchv6);
- ddebug("Shutting down dispatch manager");
- dns_dispatchmgr_destroy(&dispatchmgr);
- }
- static void
- maybeshutdown(void) {
- ddebug("Shutting down request manager");
- dns_requestmgr_shutdown(requestmgr);
- if (requests != 0)
- return;
- doshutdown();
- }
- static void
- shutdown_program(isc_task_t *task, isc_event_t *event) {
- REQUIRE(task == global_task);
- UNUSED(task);
- ddebug("shutdown_program()");
- isc_event_free(&event);
- shuttingdown = ISC_TRUE;
- maybeshutdown();
- }
- static void
- setup_system(void) {
- isc_result_t result;
- isc_sockaddr_t bind_any, bind_any6;
- lwres_result_t lwresult;
- unsigned int attrs, attrmask;
- int i;
- isc_logconfig_t *logconfig = NULL;
- ddebug("setup_system()");
- dns_result_register();
- result = isc_net_probeipv4();
- if (result == ISC_R_SUCCESS)
- have_ipv4 = ISC_TRUE;
- result = isc_net_probeipv6();
- if (result == ISC_R_SUCCESS)
- have_ipv6 = ISC_TRUE;
- if (!have_ipv4 && !have_ipv6)
- fatal("could not find either IPv4 or IPv6");
- result = isc_log_create(mctx, &lctx, &logconfig);
- check_result(result, "isc_log_create");
- isc_log_setcontext(lctx);
- dns_log_init(lctx);
- dns_log_setcontext(lctx);
- result = isc_log_usechannel(logconfig, "default_debug", NULL, NULL);
- check_result(result, "isc_log_usechannel");
- isc_log_setdebuglevel(lctx, logdebuglevel);
- lwresult = lwres_context_create(&lwctx, mctx, mem_alloc, mem_free, 1);
- if (lwresult != LWRES_R_SUCCESS)
- fatal("lwres_context_create failed");
- (void)lwres_conf_parse(lwctx, RESOLV_CONF);
- lwconf = lwres_conf_get(lwctx);
- ns_total = lwconf->nsnext;
- if (ns_total <= 0) {
- /* No name servers in resolv.conf; default to loopback. */
- struct in_addr localhost;
- ns_total = 1;
- servers = isc_mem_get(mctx, ns_total * sizeof(isc_sockaddr_t));
- if (servers == NULL)
- fatal("out of memory");
- localhost.s_addr = htonl(INADDR_LOOPBACK);
- isc_sockaddr_fromin(&servers[0], &localhost, dnsport);
- } else {
- servers = isc_mem_get(mctx, ns_total * sizeof(isc_sockaddr_t));
- if (servers == NULL)
- fatal("out of memory");
- for (i = 0; i < ns_total; i++) {
- if (lwconf->nameservers[i].family == LWRES_ADDRTYPE_V4) {
- struct in_addr in4;
- memcpy(&in4, lwconf->nameservers[i].address, 4);
- isc_sockaddr_fromin(&servers[i], &in4, dnsport);
- } else {
- struct in6_addr in6;
- memcpy(&in6, lwconf->nameservers[i].address, 16);
- isc_sockaddr_fromin6(&servers[i], &in6,
- dnsport);
- }
- }
- }
- setup_entropy(mctx, NULL, &entropy);
- result = isc_hash_create(mctx, entropy, DNS_NAME_MAXWIRE);
- check_result(result, "isc_hash_create");
- isc_hash_init();
- result = dns_dispatchmgr_create(mctx, entropy, &dispatchmgr);
- check_result(result, "dns_dispatchmgr_create");
- result = isc_socketmgr_create(mctx, &socketmgr);
- check_result(result, "dns_socketmgr_create");
- result = isc_timermgr_create(mctx, &timermgr);
- check_result(result, "dns_timermgr_create");
- result = isc_taskmgr_create(mctx, 1, 0, &taskmgr);
- check_result(result, "isc_taskmgr_create");
- result = isc_task_create(taskmgr, 0, &global_task);
- check_result(result, "isc_task_create");
- result = isc_task_onshutdown(global_task, shutdown_program, NULL);
- check_result(result, "isc_task_onshutdown");
- result = dst_lib_init(mctx, entropy, 0);
- check_result(result, "dst_lib_init");
- is_dst_up = ISC_TRUE;
- attrmask = DNS_DISPATCHATTR_UDP | DNS_DISPATCHATTR_TCP;
- attrmask |= DNS_DISPATCHATTR_IPV4 | DNS_DISPATCHATTR_IPV6;
- if (have_ipv6) {
- attrs = DNS_DISPATCHATTR_UDP;
- attrs |= DNS_DISPATCHATTR_MAKEQUERY;
- attrs |= DNS_DISPATCHATTR_IPV6;
- isc_sockaddr_any6(&bind_any6);
- result = dns_dispatch_getudp(dispatchmgr, socketmgr, taskmgr,
- &bind_any6, PACKETSIZE,
- 4, 2, 3, 5,
- attrs, attrmask, &dispatchv6);
- check_result(result, "dns_dispatch_getudp (v6)");
- }
- if (have_ipv4) {
- attrs = DNS_DISPATCHATTR_UDP;
- attrs |= DNS_DISPATCHATTR_MAKEQUERY;
- attrs |= DNS_DISPATCHATTR_IPV4;
- isc_sockaddr_any(&bind_any);
- result = dns_dispatch_getudp(dispatchmgr, socketmgr, taskmgr,
- &bind_any, PACKETSIZE,
- 4, 2, 3, 5,
- attrs, attrmask, &dispatchv4);
- check_result(result, "dns_dispatch_getudp (v4)");
- }
- result = dns_requestmgr_create(mctx, timermgr,
- socketmgr, taskmgr, dispatchmgr,
- dispatchv4, dispatchv6, &requestmgr);
- check_result(result, "dns_requestmgr_create");
- if (keystr != NULL)
- setup_keystr();
- else if (local_only) {
- result = read_sessionkey(mctx, lctx);
- if (result != ISC_R_SUCCESS)
- fatal("can't read key from %s: %s\n",
- keyfile, isc_result_totext(result));
- } else if (keyfile != NULL)
- setup_keyfile(mctx, lctx);
- }
- static void
- get_address(char *host, in_port_t port, isc_sockaddr_t *sockaddr) {
- int count;
- isc_result_t result;
- isc_app_block();
- result = bind9_getaddresses(host, port, sockaddr, 1, &count);
- isc_app_unblock();
- if (result != ISC_R_SUCCESS)
- fatal("couldn't get address for '%s': %s",
- host, isc_result_totext(result));
- INSIST(count == 1);
- }
- #define PARSE_ARGS_FMT "dDML:y:ghlovk:p:rR::t:u:"
- static void
- pre_parse_args(int argc, char **argv) {
- int ch;
- while ((ch = isc_commandline_parse(argc, argv, PARSE_ARGS_FMT)) != -1) {
- switch (ch) {
- case 'M': /* was -dm */
- debugging = ISC_TRUE;
- ddebugging = ISC_TRUE;
- memdebugging = ISC_TRUE;
- isc_mem_debugging = ISC_MEM_DEBUGTRACE |
- ISC_MEM_DEBUGRECORD;
- break;
- case '?':
- case 'h':
- if (isc_commandline_option != '?')
- fprintf(stderr, "%s: invalid argument -%c\n",
- argv[0], isc_commandline_option);
- fprintf(stderr, "usage: nsupdate [-dD] [-L level] [-l]"
- "[-g | -o | -y keyname:secret | -k keyfile] "
- "[-v] [filename]\n");
- exit(1);
- default:
- break;
- }
- }
- isc_commandline_reset = ISC_TRUE;
- isc_commandline_index = 1;
- }
- static void
- parse_args(int argc, char **argv, isc_mem_t *mctx, isc_entropy_t **ectx) {
- int ch;
- isc_uint32_t i;
- isc_result_t result;
- debug("parse_args");
- while ((ch = isc_commandline_parse(argc, argv, PARSE_ARGS_FMT)) != -1) {
- switch (ch) {
- case 'd':
- debugging = ISC_TRUE;
- break;
- case 'D': /* was -dd */
- debugging = ISC_TRUE;
- ddebugging = ISC_TRUE;
- break;
- case 'M':
- break;
- case 'l':
- local_only = ISC_TRUE;
- break;
- case 'L':
- result = isc_parse_uint32(&i, isc_commandline_argument,
- 10);
- if (result != ISC_R_SUCCESS) {
- fprintf(stderr, "bad library debug value "
- "'%s'\n", isc_commandline_argument);
- exit(1);
- }
- logdebuglevel = i;
- break;
- case 'y':
- keystr = isc_commandline_argument;
- break;
- case 'v':
- usevc = ISC_TRUE;
- break;
- case 'k':
- keyfile = isc_commandline_argument;
- break;
- case 'g':
- usegsstsig = ISC_TRUE;
- use_win2k_gsstsig = ISC_FALSE;
- break;
- case 'o':
- usegsstsig = ISC_TRUE;
- use_win2k_gsstsig = ISC_TRUE;
- break;
- case 'p':
- result = isc_parse_uint16(&dnsport,
- isc_commandline_argument, 10);
- if (result != ISC_R_SUCCESS) {
- fprintf(stderr, "bad port number "
- "'%s'\n", isc_commandline_argument);
- exit(1);
- }
- break;
- case 't':
- result = isc_parse_uint32(&timeout,
- isc_commandline_argument, 10);
- if (result != ISC_R_SUCCESS) {
- fprintf(stderr, "bad timeout '%s'\n", isc_commandline_argument);
- exit(1);
- }
- if (timeout == 0)
- timeout = UINT_MAX;
- break;
- case 'u':
- result = isc_parse_uint32(&udp_timeout,
- isc_commandline_argument, 10);
- if (result != ISC_R_SUCCESS) {
- fprintf(stderr, "bad udp timeout '%s'\n", isc_commandline_argument);
- exit(1);
- }
- if (udp_timeout == 0)
- udp_timeout = UINT_MAX;
- break;
- case 'r':
- result = isc_parse_uint32(&udp_retries,
- isc_commandline_argument, 10);
- if (result != ISC_R_SUCCESS) {
- fprintf(stderr, "bad udp retries '%s'\n", isc_commandline_argument);
- exit(1);
- }
- break;
- case 'R':
- setup_entropy(mctx, isc_commandline_argument, ectx);
- break;
- default:
- fprintf(stderr, "%s: unhandled option: %c\n",
- argv[0], isc_commandline_option);
- exit(1);
- }
- }
- if (keyfile != NULL && keystr != NULL) {
- fprintf(stderr, "%s: cannot specify both -k and -y\n",
- argv[0]);
- exit(1);
- }
- if (local_only) {
- struct in_addr localhost;
- if (keyfile == NULL)
- keyfile = SESSION_KEYFILE;
- if (userserver == NULL) {
- userserver = isc_mem_get(mctx, sizeof(isc_sockaddr_t));
- if (userserver == NULL)
- fatal("out of memory");
- }
- localhost.s_addr = htonl(INADDR_LOOPBACK);
- isc_sockaddr_fromin(userserver, &localhost, dnsport);
- }
- #ifdef GSSAPI
- if (usegsstsig && (keyfile != NULL || keystr != NULL)) {
- fprintf(stderr, "%s: cannot specify -g with -k or -y\n",
- argv[0]);
- exit(1);
- }
- #else
- if (usegsstsig) {
- fprintf(stderr, "%s: cannot specify -g or -o, " \
- "program not linked with GSS API Library\n",
- argv[0]);
- exit(1);
- }
- #endif
- if (argv[isc_commandline_index] != NULL) {
- if (strcmp(argv[isc_commandline_index], "-") == 0) {
- input = stdin;
- } else {
- result = isc_stdio_open(argv[isc_commandline_index],
- "r", &input);
- if (result != ISC_R_SUCCESS) {
- fprintf(stderr, "could not open '%s': %s\n",
- argv[isc_commandline_index],
- isc_result_totext(result));
- exit(1);
- }
- }
- interactive = ISC_FALSE;
- }
- }
- static isc_uint16_t
- parse_name(char **cmdlinep, dns_message_t *msg, dns_name_t **namep) {
- isc_result_t result;
- char *word;
- isc_buffer_t *namebuf = NULL;
- isc_buffer_t source;
- word = nsu_strsep(cmdlinep, " \t\r\n");
- if (*word == 0) {
- fprintf(stderr, "could not read owner name\n");
- return (STATUS_SYNTAX);
- }
- result = dns_message_gettempname(msg, namep);
- check_result(result, "dns_message_gettempname");
- result = isc_buffer_allocate(mctx, &namebuf, DNS_NAME_MAXWIRE);
- check_result(result, "isc_buffer_allocate");
- dns_name_init(*namep, NULL);
- dns_name_setbuffer(*namep, namebuf);
- dns_message_takebuffer(msg, &namebuf);
- isc_buffer_init(&source, word, strlen(word));
- isc_buffer_add(&source, strlen(word));
- result = dns_name_fromtext(*namep, &source, dns_rootname, 0, NULL);
- check_result(result, "dns_name_fromtext");
- isc_buffer_invalidate(&source);
- return (STATUS_MORE);
- }
- static isc_uint16_t
- parse_rdata(char **cmdlinep, dns_rdataclass_t rdataclass,
- dns_rdatatype_t rdatatype, dns_message_t *msg,
- dns_rdata_t *rdata)
- {
- char *cmdline = *cmdlinep;
- isc_buffer_t source, *buf = NULL, *newbuf = NULL;
- isc_region_t r;
- isc_lex_t *lex = NULL;
- dns_rdatacallbacks_t callbacks;
- isc_result_t result;
- while (*cmdline != 0 && isspace((unsigned char)*cmdline))
- cmdline++;
- if (*cmdline != 0) {
- dns_rdatacallbacks_init(&callbacks);
- result = isc_lex_create(mctx, strlen(cmdline), &lex);
- check_result(result, "isc_lex_create");
- isc_buffer_init(&source, cmdline, strlen(cmdline));
- isc_buffer_add(&source, strlen(cmdline));
- result = isc_lex_openbuffer(lex, &source);
- check_result(result, "isc_lex_openbuffer");
- result = isc_buffer_allocate(mctx, &buf, MAXWIRE);
- check_result(result, "isc_buffer_allocate");
- result = dns_rdata_fromtext(NULL, rdataclass, rdatatype, lex,
- dns_rootname, 0, mctx, buf,
- &callbacks);
- isc_lex_destroy(&lex);
- if (result == ISC_R_SUCCESS) {
- isc_buffer_usedregion(buf, &r);
- result = isc_buffer_allocate(mctx, &newbuf, r.length);
- check_result(result, "isc_buffer_allocate");
- isc_buffer_putmem(newbuf, r.base, r.length);
- isc_buffer_usedregion(newbuf, &r);
- dns_rdata_fromregion(rdata, rdataclass, rdatatype, &r);
- isc_buffer_free(&buf);
- dns_message_takebuffer(msg, &newbuf);
- } else {
- fprintf(stderr, "invalid rdata format: %s\n",
- isc_result_totext(result));
- isc_buffer_free(&buf);
- return (STATUS_SYNTAX);
- }
- } else {
- rdata->flags = DNS_RDATA_UPDATE;
- }
- *cmdlinep = cmdline;
- return (STATUS_MORE);
- }
- static isc_uint16_t
- make_prereq(char *cmdline, isc_boolean_t ispositive, isc_boolean_t isrrset) {
- isc_result_t result;
- char *word;
- dns_name_t *name = NULL;
- isc_textregion_t region;
- dns_rdataset_t *rdataset = NULL;
- dns_rdatalist_t *rdatalist = NULL;
- dns_rdataclass_t rdataclass;
- dns_rdatatype_t rdatatype;
- dns_rdata_t *rdata = NULL;
- isc_uint16_t retval;
- ddebug("make_prereq()");
- /*
- * Read the owner name
- */
- retval = parse_name(&cmdline, updatemsg, &name);
- if (retval != STATUS_MORE)
- return (retval);
- /*
- * If this is an rrset prereq, read the class or type.
- */
- if (isrrset) {
- word = nsu_strsep(&cmdline, " \t\r\n");
- if (*word == 0) {
- fprintf(stderr, "could not read class or type\n");
- goto failure;
- }
- region.base = word;
- region.length = strlen(word);
- result = dns_rdataclass_fromtext(&rdataclass, ®ion);
- if (result == ISC_R_SUCCESS) {
- if (!setzoneclass(rdataclass)) {
- fprintf(stderr, "class mismatch: %s\n", word);
- goto failure;
- }
- /*
- * Now read the type.
- */
- word = nsu_strsep(&cmdline, " \t\r\n");
- if (*word == 0) {
- fprintf(stderr, "could not read type\n");
- goto failure;
- }
- region.base = word;
- region.length = strlen(word);
- result = dns_rdatatype_fromtext(&rdatatype, ®ion);
- if (result != ISC_R_SUCCESS) {
- fprintf(stderr, "invalid type: %s\n", word);
- goto failure;
- }
- } else {
- rdataclass = getzoneclass();
- result = dns_rdatatype_fromtext(&rdatatype, ®ion);
- if (result != ISC_R_SUCCESS) {
- fprintf(stderr, "invalid type: %s\n", word);
- goto failure;
- }
- }
- } else
- rdatatype = dns_rdatatype_any;
- result = dns_message_gettemprdata(updatemsg, &rdata);
- check_result(result, "dns_message_gettemprdata");
- dns_rdata_init(rdata);
- if (isrrset && ispositive) {
- retval = parse_rdata(&cmdline, rdataclass, rdatatype,
- updatemsg, rdata);
- if (retval != STATUS_MORE)
- goto failure;
- } else
- rdata->flags = DNS_RDATA_UPDATE;
- result = dns_message_gettemprdatalist(updatemsg, &rdatalist);
- check_result(result, "dns_message_gettemprdatalist");
- result = dns_message_gettemprdataset(updatemsg, &rdataset);
- check_result(result, "dns_message_gettemprdataset");
- dns_rdatalist_init(rdatalist);
- rdatalist->type = rdatatype;
- if (ispositive) {
- if (isrrset && rdata->data != NULL)
- rdatalist->rdclass = rdataclass;
- else
- rdatalist->rdclass = dns_rdataclass_any;
- } else
- rdatalist->rdclass = dns_rdataclass_none;
- rdatalist->covers = 0;
- rdatalist->ttl = 0;
- rdata->rdclass = rdatalist->rdclass;
- rdata->type = rdatatype;
- ISC_LIST_INIT(rdatalist->rdata);
- ISC_LIST_APPEND(rdatalist->rdata, rdata, link);
- dns_rdataset_init(rdataset);
- dns_rdatalist_tordataset(rdatalist, rdataset);
- ISC_LIST_INIT(name->list);
- ISC_LIST_APPEND(name->list, rdataset, link);
- dns_message_addname(updatemsg, name, DNS_SECTION_PREREQUISITE);
- return (STATUS_MORE);
- failure:
- if (name != NULL)
- dns_message_puttempname(updatemsg, &name);
- return (STATUS_SYNTAX);
- }
- static isc_uint16_t
- evaluate_prereq(char *cmdline) {
- char *word;
- isc_boolean_t ispositive, isrrset;
- ddebug("evaluate_prereq()");
- word = nsu_strsep(&cmdline, " \t\r\n");
- if (*word == 0) {
- fprintf(stderr, "could not read operation code\n");
- return (STATUS_SYNTAX);
- }
- if (strcasecmp(word, "nxdomain") == 0) {
- ispositive = ISC_FALSE;
- isrrset = ISC_FALSE;
- } else if (strcasecmp(word, "yxdomain") == 0) {
- ispositive = ISC_TRUE;
- isrrset = ISC_FALSE;
- } else if (strcasecmp(word, "nxrrset") == 0) {
- ispositive = ISC_FALSE;
- isrrset = ISC_TRUE;
- } else if (strcasecmp(word, "yxrrset") == 0) {
- ispositive = ISC_TRUE;
- isrrset = ISC_TRUE;
- } else {
- fprintf(stderr, "incorrect operation code: %s\n", word);
- return (STATUS_SYNTAX);
- }
- return (make_prereq(cmdline, ispositive, isrrset));
- }
- static isc_uint16_t
- evaluate_server(char *cmdline) {
- char *word, *server;
- long port;
- if (local_only) {
- fprintf(stderr, "cannot reset server in localhost-only mode\n");
- return (STATUS_SYNTAX);
- }
- word = nsu_strsep(&cmdline, " \t\r\n");
- if (*word == 0) {
- fprintf(stderr, "could not read server name\n");
- return (STATUS_SYNTAX);
- }
- server = word;
- word = nsu_strsep(&cmdline, " \t\r\n");
- if (*word == 0)
- port = dnsport;
- else {
- char *endp;
- port = strtol(word, &endp, 10);
- if (*endp != 0) {
- fprintf(stderr, "port '%s' is not numeric\n", word);
- return (STATUS_SYNTAX);
- } else if (port < 1 || port > 65535) {
- fprintf(stderr, "port '%s' is out of range "
- "(1 to 65535)\n", word);
- return (STATUS_SYNTAX);
- }
- }
- if (userserver == NULL) {
- userserver = isc_mem_get(mctx, sizeof(isc_sockaddr_t));
- if (userserver == NULL)
- fatal("out of memory");
- }
- get_address(server, (in_port_t)port, userserver);
- return (STATUS_MORE);
- }
- static isc_uint16_t
- evaluate_local(char *cmdline) {
- char *word, *local;
- long port;
- struct in_addr in4;
- struct in6_addr in6;
- word = nsu_strsep(&cmdline, " \t\r\n");
- if (*word == 0) {
- fprintf(stderr, "could not read server name\n");
- return (STATUS_SYNTAX);
- }
- local = word;
- word = nsu_strsep(&cmdline, " \t\r\n");
- if (*word == 0)
- port = 0;
- else {
- char *endp;
- port = strtol(word, &endp, 10);
- if (*endp != 0) {
- fprintf(stderr, "port '%s' is not numeric\n", word);
- return (STATUS_SYNTAX);
- } else if (port < 1 || port > 65535) {
- fprintf(stderr, "port '%s' is out of range "
- "(1 to 65535)\n", word);
- return (STATUS_SYNTAX);
- }
- }
- if (localaddr == NULL) {
- localaddr = isc_mem_get(mctx, sizeof(isc_sockaddr_t));
- if (localaddr == NULL)
- fatal("out of memory");
- }
- if (have_ipv6 && inet_pton(AF_INET6, local, &in6) == 1)
- isc_sockaddr_fromin6(localaddr, &in6, (in_port_t)port);
- else if (have_ipv4 && inet_pton(AF_INET, local, &in4) == 1)
- isc_sockaddr_fromin(localaddr, &in4, (in_port_t)port);
- else {
- fprintf(stderr, "invalid address %s", local);
- return (STATUS_SYNTAX);
- }
- return (STATUS_MORE);
- }
- static isc_uint16_t
- evaluate_key(char *cmdline) {
- char *namestr;
- char *secretstr;
- isc_buffer_t b;
- isc_result_t result;
- dns_fixedname_t fkeyname;
- dns_name_t *keyname;
- int secretlen;
- unsigned char *secret = NULL;
- isc_buffer_t secretbuf;
- dns_name_t *hmacname = NULL;
- isc_uint16_t digestbits = 0;
- char *n;
- namestr = nsu_strsep(&cmdline, " \t\r\n");
- if (*namestr == 0) {
- fprintf(stderr, "could not read key name\n");
- return (STATUS_SYNTAX);
- }
- dns_fixedname_init(&fkeyname);
- keyname = dns_fixedname_name(&fkeyname);
- n = strchr(namestr, ':');
- if (n != NULL) {
- digestbits = parse_hmac(&hmacname, namestr, n - namestr);
- namestr = n + 1;
- } else
- hmacname = DNS_TSIG_HMACMD5_NAME;
- isc_buffer_init(&b, namestr, strlen(namestr));
- isc_buffer_add(&b, strlen(namestr));
- result = dns_name_fromtext(keyname, &b, dns_rootname, 0, NULL);
- if (result != ISC_R_SUCCESS) {
- fprintf(stderr, "could not parse key name\n");
- return (STATUS_SYNTAX);
- }
- secretstr = nsu_strsep(&cmdline, "\r\n");
- if (*secretstr == 0) {
- fprintf(stderr, "could not read key secret\n");
- return (STATUS_SYNTAX);
- }
- secretlen = strlen(secretstr) * 3 / 4;
- secret = isc_mem_allocate(mctx, secretlen);
- if (secret == NULL)
- fatal("out of memory");
- isc_buffer_init(&secretbuf, secret, secretlen);
- result = isc_base64_decodestring(secretstr, &secretbuf);
- if (result != ISC_R_SUCCESS) {
- fprintf(stderr, "could not create key from %s: %s\n",
- secretstr, isc_result_totext(result));
- isc_mem_free(mctx, secret);
- return (STATUS_SYNTAX);
- }
- secretlen = isc_buffer_usedlength(&secretbuf);
- if (tsigkey != NULL)
- dns_tsigkey_detach(&tsigkey);
- result = dns_tsigkey_create(keyname, hmacname, secret, secretlen,
- ISC_FALSE, NULL, 0, 0, mctx, NULL,
- &tsigkey);
- isc_mem_free(mctx, secret);
- if (result != ISC_R_SUCCESS) {
- fprintf(stderr, "could not create key from %s %s: %s\n",
- namestr, secretstr, dns_result_totext(result));
- return (STATUS_SYNTAX);
- }
- dst_key_setbits(tsigkey->key, digestbits);
- return (STATUS_MORE);
- }
- static isc_uint16_t
- evaluate_zone(char *cmdline) {
- char *word;
- isc_buffer_t b;
- isc_result_t result;
- word = nsu_strsep(&cmdline, " \t\r\n");
- if (*word == 0) {
- fprintf(stderr, "could not read zone name\n");
- return (STATUS_SYNTAX);
- }
- dns_fixedname_init(&fuserzone);
- userzone = dns_fixedname_name(&fuserzone);
- isc_buffer_init(&b, word, strlen(word));
- isc_buffer_add(&b, strlen(word));
- result = dns_name_fromtext(userzone, &b, dns_rootname, 0, NULL);
- if (result != ISC_R_SUCCESS) {
- userzone = NULL; /* Lest it point to an invalid name */
- fprintf(stderr, "could not parse zone name\n");
- return (STATUS_SYNTAX);
- }
- return (STATUS_MORE);
- }
- static isc_uint16_t
- evaluate_realm(char *cmdline) {
- #ifdef GSSAPI
- char *word;
- char buf[1024];
- word = nsu_strsep(&cmdline, " \t\r\n");
- if (*word == 0) {
- if (realm != NULL)
- isc_mem_free(mctx, realm);
- realm = NULL;
- return (STATUS_MORE);
- }
- snprintf(buf, sizeof(buf), "@%s", word);
- realm = isc_mem_strdup(mctx, buf);
- if (realm == NULL)
- fatal("out of memory");
- return (STATUS_MORE);
- #else
- UNUSED(cmdline);
- return (STATUS_SYNTAX);
- #endif
- }
- static isc_uint16_t
- evaluate_ttl(char *cmdline) {
- char *word;
- isc_result_t result;
- isc_uint32_t ttl;
- word = nsu_strsep(&cmdline, " \t\r\n");
- if (*word == 0) {
- fprintf(stderr, "could not ttl\n");
- return (STATUS_SYNTAX);
- }
- if (!strcasecmp(word, "none")) {
- default_ttl = 0;
- default_ttl_set = ISC_FALSE;
- return (STATUS_MORE);
- }
- result = isc_parse_uint32(&ttl, word, 10);
- if (result != ISC_R_SUCCESS)
- return (STATUS_SYNTAX);
- if (ttl > TTL_MAX) {
- fprintf(stderr, "ttl '%s' is out of range (0 to %u)\n",
- word, TTL_MAX);
- return (STATUS_SYNTAX);
- }
- default_ttl = ttl;
- default_ttl_set = ISC_TRUE;
- return (STATUS_MORE);
- }
- static isc_uint16_t
- evaluate_class(char *cmdline) {
- char *word;
- isc_textregion_t r;
- isc_result_t result;
- dns_rdataclass_t rdclass;
- word = nsu_strsep(&cmdline, " \t\r\n");
- if (*word == 0) {
- fprintf(stderr, "could not read class name\n");
- return (STATUS_SYNTAX);
- }
- r.base = word;
- r.length = strlen(word);
- result = dns_rdataclass_fromtext(&rdclass, &r);
- if (result != ISC_R_SUCCESS) {
- fprintf(stderr, "could not parse class name: %s\n", word);
- return (STATUS_SYNTAX);
- }
- switch (rdclass) {
- case dns_rdataclass_none:
- case dns_rdataclass_any:
- case dns_rdataclass_reserved0:
- fprintf(stderr, "bad default class: %s\n", word);
- return (STATUS_SYNTAX);
- default:
- defaultclass = rdclass;
- }
- return (STATUS_MORE);
- }
- static isc_uint16_t
- update_addordelete(char *cmdline, isc_boolean_t isdelete) {
- isc_result_t result;
- dns_name_t *name = NULL;
- isc_uint32_t ttl;
- char *word;
- dns_rdataclass_t rdataclass;
- dns_rdatatype_t rdatatype;
- dns_rdata_t *rdata = NULL;
- dns_rdatalist_t *rdatalist = NULL;
- dns_rdataset_t *rdataset = NULL;
- isc_textregion_t region;
- isc_uint16_t retval;
- ddebug("update_addordelete()");
- /*
- * Read the owner name.
- */
- retval = parse_name(&cmdline, updatemsg, &name);
- if (retval != STATUS_MORE)
- return (retval);
- result = dns_message_gettemprdata(updatemsg, &rdata);
- check_result(result, "dns_message_gettemprdata");
- dns_rdata_init(rdata);
- /*
- * If this is an add, read the TTL and verify that it's in range.
- * If it's a delete, ignore a TTL if present (for compatibility).
- */
- word = nsu_strsep(&cmdline, " \t\r\n");
- if (*word == 0) {
- if (!isdelete) {
- fprintf(stderr, "could not read owner ttl\n");
- goto failure;
- }
- else {
- ttl = 0;
- rdataclass = dns_rdataclass_any;
- rdatatype = dns_rdatatype_any;
- rdata->flags = DNS_RDATA_UPDATE;
- goto doneparsing;
- }
- }
- result = isc_parse_uint32(&ttl, word, 10);
- if (result != ISC_R_SUCCESS) {
- if (isdelete) {
- ttl = 0;
- goto parseclass;
- } else if (default_ttl_set) {
- ttl = default_ttl;
- goto parseclass;
- } else {
- fprintf(stderr, "ttl '%s': %s\n", word,
- isc_result_totext(result));
- goto failure;
- }
- }
- if (isdelete)
- ttl = 0;
- else if (ttl > TTL_MAX) {
- fprintf(stderr, "ttl '%s' is out of range (0 to %u)\n",
- word, TTL_MAX);
- goto failure;
- }
- /*
- * Read the class or type.
- */
- word = nsu_strsep(&cmdline, " \t\r\n");
- parseclass:
- if (*word == 0) {
- if (isdelete) {
- rdataclass = dns_rdataclass_any;
- rdatatype = dns_rdatatype_any;
- rdata->flags = DNS_RDATA_UPDATE;
- goto doneparsing;
- } else {
- fprintf(stderr, "could not read class or type\n");
- goto failure;
- }
- }
- region.base = word;
- region.length = strlen(word);
- rdataclass = dns_rdataclass_any;
- result = dns_rdataclass_fromtext(&rdataclass, ®ion);
- if (result == ISC_R_SUCCESS && rdataclass != dns_rdataclass_any) {
- if (!setzoneclass(rdataclass)) {
- fprintf(stderr, "class mismatch: %s\n", word);
- goto failure;
- }
- /*
- * Now read the type.
- */
- word = nsu_strsep(&cmdline, " \t\r\n");
- if (*word == 0) {
- if (isdelete) {
- rdataclass = dns_rdataclass_any;
- rdatatype = dns_rdatatype_any;
- rdata->flags = DNS_RDATA_UPDATE;
- goto doneparsing;
- } else {
- fprintf(stderr, "could not read type\n");
- goto failure;
- }
- }
- region.base = word;
- region.length = strlen(word);
- result = dns_rdatatype_fromtext(&rdatatype, ®ion);
- if (result != ISC_R_SUCCESS) {
- fprintf(stderr, "'%s' is not a valid type: %s\n",
- word, isc_result_totext(result));
- goto failure;
- }
- } else {
- rdataclass = getzoneclass();
- result = dns_rdatatype_fromtext(&rdatatype, ®ion);
- if (result != ISC_R_SUCCESS) {
- fprintf(stderr, "'%s' is not a valid class or type: "
- "%s\n", word, isc_result_totext(result));
- goto failure;
- }
- }
- retval = parse_rdata(&cmdline, rdataclass, rdatatype, updatemsg,
- rdata);
- if (retval != STATUS_MORE)
- goto failure;
- if (isdelete) {
- if ((rdata->flags & DNS_RDATA_UPDATE) != 0)
- rdataclass = dns_rdataclass_any;
- else
- rdataclass = dns_rdataclass_none;
- } else {
- if ((rdata->flags & DNS_RDATA_UPDATE) != 0) {
- fprintf(stderr, "could not read rdata\n");
- goto failure;
- }
- }
- doneparsing:
- result = dns_message_gettemprdatalist(updatemsg, &rdatalist);
- check_result(result, "dns_message_gettemprdatalist");
- result = dns_message_gettemprdataset(updatemsg, &rdataset);
- check_result(result, "dns_message_gettemprdataset");
- dns_rdatalist_init(rdatalist);
- rdatalist->type = rdatatype;
- rdatalist->rdclass = rdataclass;
- rdatalist->covers = rdatatype;
- rdatalist->ttl = (dns_ttl_t)ttl;
- ISC_LIST_INIT(rdatalist->rdata);
- ISC_LIST_APPEND(rdatalist->rdata, rdata, link);
- dns_rdataset_init(rdataset);
- dns_rdatalist_tordataset(rdatalist, rdataset);
- ISC_LIST_INIT(name->list);
- ISC_LIST_APPEND(name->list, rdataset, link);
- dns_message_addname(updatemsg, name, DNS_SECTION_UPDATE);
- return (STATUS_MORE);
- failure:
- if (name != NULL)
- dns_message_puttempname(updatemsg, &name);
- dns_message_puttemprdata(updatemsg, &rdata);
- return (STATUS_SYNTAX);
- }
- static isc_uint16_t
- evaluate_update(char *cmdline) {
- char *word;
- isc_boolean_t isdelete;
- ddebug("evaluate_update()");
- word = nsu_strsep(&cmdline, " \t\r\n");
- if (*word == 0) {
- fprintf(stderr, "could not read operation code\n");
- return (STATUS_SYNTAX);
- }
- if (strcasecmp(word, "delete") == 0)
- isdelete = ISC_TRUE;
- else if (strcasecmp(word, "add") == 0)
- isdelete = ISC_FALSE;
- else {
- fprintf(stderr, "incorrect operation code: %s\n", word);
- return (STATUS_SYNTAX);
- }
- return (update_addordelete(cmdline, isdelete));
- }
- static void
- setzone(dns_name_t *zonename) {
- isc_result_t result;
- dns_name_t *name = NULL;
- dns_rdataset_t *rdataset = NULL;
- result = dns_message_firstname(updatemsg, DNS_SECTION_ZONE);
- if (result == ISC_R_SUCCESS) {
- dns_message_currentname(updatemsg, DNS_SECTION_ZONE, &name);
- dns_message_removename(updatemsg, name, DNS_SECTION_ZONE);
- for (rdataset = ISC_LIST_HEAD(name->list);
- rdataset != NULL;
- rdataset = ISC_LIST_HEAD(name->list)) {
- ISC_LIST_UNLINK(name->list, rdataset, link);
- dns_rdataset_disassociate(rdataset);
- dns_message_puttemprdataset(updatemsg, &rdataset);
- }
- dns_message_puttempname(updatemsg, &name);
- }
- if (zonename != NULL) {
- result = dns_message_gettempname(updatemsg, &name);
- check_result(result, "dns_message_gettempname");
- dns_name_init(name, NULL);
- dns_name_clone(zonename, name);
- result = dns_message_gettemprdataset(updatemsg, &rdataset);
- check_result(result, "dns_message_gettemprdataset");
- dns_rdataset_makequestion(rdataset, getzoneclass(),
- dns_rdatatype_soa);
- ISC_LIST_INIT(name->list);
- ISC_LIST_APPEND(name->list, rdataset, link);
- dns_message_addname(updatemsg, name, DNS_SECTION_ZONE);
- }
- }
- static void
- show_message(FILE *stream, dns_message_t *msg, const char *description) {
- isc_result_t result;
- isc_buffer_t *buf = NULL;
- int bufsz;
- ddebug("show_message()");
- setzone(userzone);
- bufsz = INITTEXT;
- do {
- if (bufsz > MAXTEXT) {
- fprintf(stderr, "could not allocate large enough "
- "buffer to display message\n");
- exit(1);
- }
- if (buf != NULL)
- isc_buffer_free(&buf);
- result = isc_buffer_allocate(mctx, &buf, bufsz);
- check_result(result, "isc_buffer_allocate");
- result = dns_message_totext(msg, style, 0, buf);
- bufsz *= 2;
- } while (result == ISC_R_NOSPACE);
- if (result != ISC_R_SUCCESS) {
- fprintf(stderr, "could not convert message to text format.\n");
- isc_buffer_free(&buf);
- return;
- }
- fprintf(stream, "%s\n%.*s", description,
- (int)isc_buffer_usedlength(buf), (char*)isc_buffer_base(buf));
- isc_buffer_free(&buf);
- }
- static isc_uint16_t
- get_next_command(void) {
- char cmdlinebuf[MAXCMD];
- char *cmdline;
- char *word;
- ddebug("get_next_command()");
- if (interactive) {
- fprintf(stdout, "> ");
- fflush(stdout);
- }
- isc_app_block();
- cmdline = fgets(cmdlinebuf, MAXCMD, input);
- isc_app_unblock();
- if (cmdline == NULL)
- return (STATUS_QUIT);
- word = nsu_strsep(&cmdline, " \t\r\n");
- if (feof(input))
- return (STATUS_QUIT);
- if (*word == 0)
- return (STATUS_SEND);
- if (word[0] == ';')
- return (STATUS_MORE);
- if (strcasecmp(word, "quit") == 0)
- return (STATUS_QUIT);
- if (strcasecmp(word, "prereq") == 0)
- return (evaluate_prereq(cmdline));
- if (strcasecmp(word, "update") == 0)
- return (evaluate_update(cmdline));
- if (strcasecmp(word, "server") == 0)
- return (evaluate_server(cmdline));
- if (strcasecmp(word, "local") == 0)
- return (evaluate_local(cmdline));
- if (strcasecmp(word, "zone") == 0)
- return (evaluate_zone(cmdline));
- if (strcasecmp(word, "class") == 0)
- return (evaluate_class(cmdline));
- if (strcasecmp(word, "send") == 0)
- return (STATUS_SEND);
- if (strcasecmp(word, "debug") == 0) {
- if (debugging)
- ddebugging = ISC_TRUE;
- else
- debugging = ISC_TRUE;
- return (STATUS_MORE);
- }
- if (strcasecmp(word, "ttl") == 0)
- return (evaluate_ttl(cmdline));
- if (strcasecmp(word, "show") == 0) {
- show_message(stdout, updatemsg, "Outgoing update query:");
- return (STATUS_MORE);
- }…