diff options
Diffstat (limited to 'contrib/bind9/lib/dns/acl.c')
-rw-r--r-- | contrib/bind9/lib/dns/acl.c | 633 |
1 files changed, 0 insertions, 633 deletions
diff --git a/contrib/bind9/lib/dns/acl.c b/contrib/bind9/lib/dns/acl.c deleted file mode 100644 index 3221d30..0000000 --- a/contrib/bind9/lib/dns/acl.c +++ /dev/null @@ -1,633 +0,0 @@ -/* - * Copyright (C) 2004-2009, 2011, 2013 Internet Systems Consortium, Inc. ("ISC") - * Copyright (C) 1999-2002 Internet Software Consortium. - * - * Permission to use, copy, modify, and/or distribute this software for any - * purpose with or without fee is hereby granted, provided that the above - * copyright notice and this permission notice appear in all copies. - * - * THE SOFTWARE IS PROVIDED "AS IS" AND ISC DISCLAIMS ALL WARRANTIES WITH - * REGARD TO THIS SOFTWARE INCLUDING ALL IMPLIED WARRANTIES OF MERCHANTABILITY - * AND FITNESS. IN NO EVENT SHALL ISC BE LIABLE FOR ANY SPECIAL, DIRECT, - * INDIRECT, OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES WHATSOEVER RESULTING FROM - * LOSS OF USE, DATA OR PROFITS, WHETHER IN AN ACTION OF CONTRACT, NEGLIGENCE - * OR OTHER TORTIOUS ACTION, ARISING OUT OF OR IN CONNECTION WITH THE USE OR - * PERFORMANCE OF THIS SOFTWARE. - */ - -/* $Id: acl.c,v 1.55 2011/06/17 23:47:49 tbox Exp $ */ - -/*! \file */ - -#include <config.h> - -#include <isc/mem.h> -#include <isc/once.h> -#include <isc/string.h> -#include <isc/util.h> - -#include <dns/acl.h> -#include <dns/iptable.h> - -/* - * Create a new ACL, including an IP table and an array with room - * for 'n' ACL elements. The elements are uninitialized and the - * length is 0. - */ -isc_result_t -dns_acl_create(isc_mem_t *mctx, int n, dns_acl_t **target) { - isc_result_t result; - dns_acl_t *acl; - - /* - * Work around silly limitation of isc_mem_get(). - */ - if (n == 0) - n = 1; - - acl = isc_mem_get(mctx, sizeof(*acl)); - if (acl == NULL) - return (ISC_R_NOMEMORY); - - acl->mctx = NULL; - isc_mem_attach(mctx, &acl->mctx); - - acl->name = NULL; - - result = isc_refcount_init(&acl->refcount, 1); - if (result != ISC_R_SUCCESS) { - isc_mem_put(mctx, acl, sizeof(*acl)); - return (result); - } - - result = dns_iptable_create(mctx, &acl->iptable); - if (result != ISC_R_SUCCESS) { - isc_mem_put(mctx, acl, sizeof(*acl)); - return (result); - } - - acl->elements = NULL; - acl->alloc = 0; - acl->length = 0; - acl->has_negatives = ISC_FALSE; - - ISC_LINK_INIT(acl, nextincache); - /* - * Must set magic early because we use dns_acl_detach() to clean up. - */ - acl->magic = DNS_ACL_MAGIC; - - acl->elements = isc_mem_get(mctx, n * sizeof(dns_aclelement_t)); - if (acl->elements == NULL) { - result = ISC_R_NOMEMORY; - goto cleanup; - } - acl->alloc = n; - memset(acl->elements, 0, n * sizeof(dns_aclelement_t)); - *target = acl; - return (ISC_R_SUCCESS); - - cleanup: - dns_acl_detach(&acl); - return (result); -} - -/* - * Create a new ACL and initialize it with the value "any" or "none", - * depending on the value of the "neg" parameter. - * "any" is a positive iptable entry with bit length 0. - * "none" is the same as "!any". - */ -static isc_result_t -dns_acl_anyornone(isc_mem_t *mctx, isc_boolean_t neg, dns_acl_t **target) { - isc_result_t result; - dns_acl_t *acl = NULL; - - result = dns_acl_create(mctx, 0, &acl); - if (result != ISC_R_SUCCESS) - return (result); - - result = dns_iptable_addprefix(acl->iptable, NULL, 0, ISC_TF(!neg)); - if (result != ISC_R_SUCCESS) { - dns_acl_detach(&acl); - return (result); - } - - *target = acl; - return (result); -} - -/* - * Create a new ACL that matches everything. - */ -isc_result_t -dns_acl_any(isc_mem_t *mctx, dns_acl_t **target) { - return (dns_acl_anyornone(mctx, ISC_FALSE, target)); -} - -/* - * Create a new ACL that matches nothing. - */ -isc_result_t -dns_acl_none(isc_mem_t *mctx, dns_acl_t **target) { - return (dns_acl_anyornone(mctx, ISC_TRUE, target)); -} - -/* - * If pos is ISC_TRUE, test whether acl is set to "{ any; }" - * If pos is ISC_FALSE, test whether acl is set to "{ none; }" - */ -static isc_boolean_t -dns_acl_isanyornone(dns_acl_t *acl, isc_boolean_t pos) -{ - /* Should never happen but let's be safe */ - if (acl == NULL || - acl->iptable == NULL || - acl->iptable->radix == NULL || - acl->iptable->radix->head == NULL || - acl->iptable->radix->head->prefix == NULL) - return (ISC_FALSE); - - if (acl->length != 0 || acl->node_count != 1) - return (ISC_FALSE); - - if (acl->iptable->radix->head->prefix->bitlen == 0 && - acl->iptable->radix->head->data[0] != NULL && - acl->iptable->radix->head->data[0] == - acl->iptable->radix->head->data[1] && - *(isc_boolean_t *) (acl->iptable->radix->head->data[0]) == pos) - return (ISC_TRUE); - - return (ISC_FALSE); /* All others */ -} - -/* - * Test whether acl is set to "{ any; }" - */ -isc_boolean_t -dns_acl_isany(dns_acl_t *acl) -{ - return (dns_acl_isanyornone(acl, ISC_TRUE)); -} - -/* - * Test whether acl is set to "{ none; }" - */ -isc_boolean_t -dns_acl_isnone(dns_acl_t *acl) -{ - return (dns_acl_isanyornone(acl, ISC_FALSE)); -} - -/* - * Determine whether a given address or signer matches a given ACL. - * For a match with a positive ACL element or iptable radix entry, - * return with a positive value in match; for a match with a negated ACL - * element or radix entry, return with a negative value in match. - */ -isc_result_t -dns_acl_match(const isc_netaddr_t *reqaddr, - const dns_name_t *reqsigner, - const dns_acl_t *acl, - const dns_aclenv_t *env, - int *match, - const dns_aclelement_t **matchelt) -{ - isc_uint16_t bitlen, family; - isc_prefix_t pfx; - isc_radix_node_t *node = NULL; - const isc_netaddr_t *addr; - isc_netaddr_t v4addr; - isc_result_t result; - int match_num = -1; - unsigned int i; - - REQUIRE(reqaddr != NULL); - REQUIRE(matchelt == NULL || *matchelt == NULL); - - if (env == NULL || env->match_mapped == ISC_FALSE || - reqaddr->family != AF_INET6 || - !IN6_IS_ADDR_V4MAPPED(&reqaddr->type.in6)) - addr = reqaddr; - else { - isc_netaddr_fromv4mapped(&v4addr, reqaddr); - addr = &v4addr; - } - - /* Always match with host addresses. */ - family = addr->family; - bitlen = family == AF_INET6 ? 128 : 32; - NETADDR_TO_PREFIX_T(addr, pfx, bitlen); - - /* Assume no match. */ - *match = 0; - - /* Search radix. */ - result = isc_radix_search(acl->iptable->radix, &node, &pfx); - - /* Found a match. */ - if (result == ISC_R_SUCCESS && node != NULL) { - match_num = node->node_num[ISC_IS6(family)]; - if (*(isc_boolean_t *) node->data[ISC_IS6(family)] == ISC_TRUE) - *match = match_num; - else - *match = -match_num; - } - - /* Now search non-radix elements for a match with a lower node_num. */ - for (i = 0; i < acl->length; i++) { - dns_aclelement_t *e = &acl->elements[i]; - - /* Already found a better match? */ - if (match_num != -1 && match_num < e->node_num) { - isc_refcount_destroy(&pfx.refcount); - return (ISC_R_SUCCESS); - } - - if (dns_aclelement_match(reqaddr, reqsigner, - e, env, matchelt)) { - if (match_num == -1 || e->node_num < match_num) { - if (e->negative == ISC_TRUE) - *match = -e->node_num; - else - *match = e->node_num; - } - isc_refcount_destroy(&pfx.refcount); - return (ISC_R_SUCCESS); - } - } - - isc_refcount_destroy(&pfx.refcount); - return (ISC_R_SUCCESS); -} - -/* - * Merge the contents of one ACL into another. Call dns_iptable_merge() - * for the IP tables, then concatenate the element arrays. - * - * If pos is set to false, then the nested ACL is to be negated. This - * means reverse the sense of each *positive* element or IP table node, - * but leave negatives alone, so as to prevent a double-negative causing - * an unexpected positive match in the parent ACL. - */ -isc_result_t -dns_acl_merge(dns_acl_t *dest, dns_acl_t *source, isc_boolean_t pos) -{ - isc_result_t result; - unsigned int newalloc, nelem, i; - int max_node = 0, nodes; - - /* Resize the element array if needed. */ - if (dest->length + source->length > dest->alloc) { - void *newmem; - - newalloc = dest->alloc + source->alloc; - if (newalloc < 4) - newalloc = 4; - - newmem = isc_mem_get(dest->mctx, - newalloc * sizeof(dns_aclelement_t)); - if (newmem == NULL) - return (ISC_R_NOMEMORY); - - /* Copy in the original elements */ - memcpy(newmem, dest->elements, - dest->length * sizeof(dns_aclelement_t)); - - /* Release the memory for the old elements array */ - isc_mem_put(dest->mctx, dest->elements, - dest->alloc * sizeof(dns_aclelement_t)); - dest->elements = newmem; - dest->alloc = newalloc; - } - - /* - * Now copy in the new elements, increasing their node_num - * values so as to keep the new ACL consistent. If we're - * negating, then negate positive elements, but keep negative - * elements the same for security reasons. - */ - nelem = dest->length; - dest->length += source->length; - for (i = 0; i < source->length; i++) { - if (source->elements[i].node_num > max_node) - max_node = source->elements[i].node_num; - - /* Copy type. */ - dest->elements[nelem + i].type = source->elements[i].type; - - /* Adjust node numbering. */ - dest->elements[nelem + i].node_num = - source->elements[i].node_num + dest->node_count; - - /* Duplicate nested acl. */ - if (source->elements[i].type == dns_aclelementtype_nestedacl && - source->elements[i].nestedacl != NULL) - dns_acl_attach(source->elements[i].nestedacl, - &dest->elements[nelem + i].nestedacl); - - /* Duplicate key name. */ - if (source->elements[i].type == dns_aclelementtype_keyname) { - dns_name_init(&dest->elements[nelem+i].keyname, NULL); - result = dns_name_dup(&source->elements[i].keyname, - dest->mctx, - &dest->elements[nelem+i].keyname); - if (result != ISC_R_SUCCESS) - return result; - } - - /* reverse sense of positives if this is a negative acl */ - if (!pos && source->elements[i].negative == ISC_FALSE) { - dest->elements[nelem + i].negative = ISC_TRUE; - } else { - dest->elements[nelem + i].negative = - source->elements[i].negative; - } - } - - /* - * Merge the iptables. Make sure the destination ACL's - * node_count value is set correctly afterward. - */ - nodes = max_node + dest->node_count; - result = dns_iptable_merge(dest->iptable, source->iptable, pos); - if (result != ISC_R_SUCCESS) - return (result); - if (nodes > dest->node_count) - dest->node_count = nodes; - - return (ISC_R_SUCCESS); -} - -/* - * Like dns_acl_match, but matches against the single ACL element 'e' - * rather than a complete ACL, and returns ISC_TRUE iff it matched. - * - * To determine whether the match was positive or negative, the - * caller should examine e->negative. Since the element 'e' may be - * a reference to a named ACL or a nested ACL, a matching element - * returned through 'matchelt' is not necessarily 'e' itself. - */ -isc_boolean_t -dns_aclelement_match(const isc_netaddr_t *reqaddr, - const dns_name_t *reqsigner, - const dns_aclelement_t *e, - const dns_aclenv_t *env, - const dns_aclelement_t **matchelt) -{ - dns_acl_t *inner = NULL; - int indirectmatch; - isc_result_t result; - - switch (e->type) { - case dns_aclelementtype_keyname: - if (reqsigner != NULL && - dns_name_equal(reqsigner, &e->keyname)) { - if (matchelt != NULL) - *matchelt = e; - return (ISC_TRUE); - } else { - return (ISC_FALSE); - } - - case dns_aclelementtype_nestedacl: - inner = e->nestedacl; - break; - - case dns_aclelementtype_localhost: - if (env == NULL || env->localhost == NULL) - return (ISC_FALSE); - inner = env->localhost; - break; - - case dns_aclelementtype_localnets: - if (env == NULL || env->localnets == NULL) - return (ISC_FALSE); - inner = env->localnets; - break; - - default: - /* Should be impossible. */ - INSIST(0); - } - - result = dns_acl_match(reqaddr, reqsigner, inner, env, - &indirectmatch, matchelt); - INSIST(result == ISC_R_SUCCESS); - - /* - * Treat negative matches in indirect ACLs as "no match". - * That way, a negated indirect ACL will never become a - * surprise positive match through double negation. - * XXXDCL this should be documented. - */ - - if (indirectmatch > 0) { - if (matchelt != NULL) - *matchelt = e; - return (ISC_TRUE); - } - - /* - * A negative indirect match may have set *matchelt, but we don't - * want it set when we return. - */ - - if (matchelt != NULL) - *matchelt = NULL; - - return (ISC_FALSE); -} - -void -dns_acl_attach(dns_acl_t *source, dns_acl_t **target) { - REQUIRE(DNS_ACL_VALID(source)); - - isc_refcount_increment(&source->refcount, NULL); - *target = source; -} - -static void -destroy(dns_acl_t *dacl) { - unsigned int i; - - INSIST(!ISC_LINK_LINKED(dacl, nextincache)); - - for (i = 0; i < dacl->length; i++) { - dns_aclelement_t *de = &dacl->elements[i]; - if (de->type == dns_aclelementtype_keyname) { - dns_name_free(&de->keyname, dacl->mctx); - } else if (de->type == dns_aclelementtype_nestedacl) { - dns_acl_detach(&de->nestedacl); - } - } - if (dacl->elements != NULL) - isc_mem_put(dacl->mctx, dacl->elements, - dacl->alloc * sizeof(dns_aclelement_t)); - if (dacl->name != NULL) - isc_mem_free(dacl->mctx, dacl->name); - if (dacl->iptable != NULL) - dns_iptable_detach(&dacl->iptable); - isc_refcount_destroy(&dacl->refcount); - dacl->magic = 0; - isc_mem_putanddetach(&dacl->mctx, dacl, sizeof(*dacl)); -} - -void -dns_acl_detach(dns_acl_t **aclp) { - dns_acl_t *acl = *aclp; - unsigned int refs; - - REQUIRE(DNS_ACL_VALID(acl)); - - isc_refcount_decrement(&acl->refcount, &refs); - if (refs == 0) - destroy(acl); - *aclp = NULL; -} - - -static isc_once_t insecure_prefix_once = ISC_ONCE_INIT; -static isc_mutex_t insecure_prefix_lock; -static isc_boolean_t insecure_prefix_found; - -static void -initialize_action(void) { - RUNTIME_CHECK(isc_mutex_init(&insecure_prefix_lock) == ISC_R_SUCCESS); -} - -/* - * Called via isc_radix_walk() to find IP table nodes that are - * insecure. - */ -static void -is_insecure(isc_prefix_t *prefix, void **data) { - isc_boolean_t secure; - int bitlen, family; - - bitlen = prefix->bitlen; - family = prefix->family; - - /* Negated entries are always secure. */ - secure = * (isc_boolean_t *)data[ISC_IS6(family)]; - if (!secure) { - return; - } - - /* If loopback prefix found, return */ - switch (family) { - case AF_INET: - if (bitlen == 32 && - htonl(prefix->add.sin.s_addr) == INADDR_LOOPBACK) - return; - break; - case AF_INET6: - if (bitlen == 128 && IN6_IS_ADDR_LOOPBACK(&prefix->add.sin6)) - return; - break; - default: - break; - } - - /* Non-negated, non-loopback */ - insecure_prefix_found = ISC_TRUE; /* LOCKED */ - return; -} - -/* - * Return ISC_TRUE iff the acl 'a' is considered insecure, that is, - * if it contains IP addresses other than those of the local host. - * This is intended for applications such as printing warning - * messages for suspect ACLs; it is not intended for making access - * control decisions. We make no guarantee that an ACL for which - * this function returns ISC_FALSE is safe. - */ -isc_boolean_t -dns_acl_isinsecure(const dns_acl_t *a) { - unsigned int i; - isc_boolean_t insecure; - - RUNTIME_CHECK(isc_once_do(&insecure_prefix_once, - initialize_action) == ISC_R_SUCCESS); - - /* - * Walk radix tree to find out if there are any non-negated, - * non-loopback prefixes. - */ - LOCK(&insecure_prefix_lock); - insecure_prefix_found = ISC_FALSE; - isc_radix_process(a->iptable->radix, is_insecure); - insecure = insecure_prefix_found; - UNLOCK(&insecure_prefix_lock); - if (insecure) - return(ISC_TRUE); - - /* Now check non-radix elements */ - for (i = 0; i < a->length; i++) { - dns_aclelement_t *e = &a->elements[i]; - - /* A negated match can never be insecure. */ - if (e->negative) - continue; - - switch (e->type) { - case dns_aclelementtype_keyname: - case dns_aclelementtype_localhost: - continue; - - case dns_aclelementtype_nestedacl: - if (dns_acl_isinsecure(e->nestedacl)) - return (ISC_TRUE); - continue; - - case dns_aclelementtype_localnets: - return (ISC_TRUE); - - default: - INSIST(0); - return (ISC_TRUE); - } - } - - /* No insecure elements were found. */ - return (ISC_FALSE); -} - -/* - * Initialize ACL environment, setting up localhost and localnets ACLs - */ -isc_result_t -dns_aclenv_init(isc_mem_t *mctx, dns_aclenv_t *env) { - isc_result_t result; - - env->localhost = NULL; - env->localnets = NULL; - result = dns_acl_create(mctx, 0, &env->localhost); - if (result != ISC_R_SUCCESS) - goto cleanup_nothing; - result = dns_acl_create(mctx, 0, &env->localnets); - if (result != ISC_R_SUCCESS) - goto cleanup_localhost; - env->match_mapped = ISC_FALSE; - return (ISC_R_SUCCESS); - - cleanup_localhost: - dns_acl_detach(&env->localhost); - cleanup_nothing: - return (result); -} - -void -dns_aclenv_copy(dns_aclenv_t *t, dns_aclenv_t *s) { - dns_acl_detach(&t->localhost); - dns_acl_attach(s->localhost, &t->localhost); - dns_acl_detach(&t->localnets); - dns_acl_attach(s->localnets, &t->localnets); - t->match_mapped = s->match_mapped; -} - -void -dns_aclenv_destroy(dns_aclenv_t *env) { - dns_acl_detach(&env->localhost); - dns_acl_detach(&env->localnets); -} |