public inbox for development@lists.ipfire.org
 help / color / mirror / Atom feed
From: Matthias Fischer <matthias.fischer@ipfire.org>
To: development@lists.ipfire.org
Subject: [PATCH] dnsmasq 2.75: next patch... (No.50)
Date: Sun, 17 Jan 2016 15:30:44 +0100	[thread overview]
Message-ID: <1453041044-26371-1-git-send-email-matthias.fischer@ipfire.org> (raw)

[-- Attachment #1: Type: text/plain, Size: 7594 bytes --]

Again one latecoming patch (DNSSEC).

Download:
http://people.ipfire.org/~mfischer/dnsmasq_275_2016_01_16
MD5: a266e4673ed7d218b0477c6b02e3ef4d

This is the compiled binary, nothing more is needed.

Copy to '/usr/sbin'
Stop 'dnsmasq' (/etc/init.d/dnsmasq stop)
Rename (don't forget backing up the *old* version!)
Start 'dnsmasq' (/etc/init.d/dnsmasq start).

Signed-off-by: Matthias Fischer <matthias.fischer(a)ipfire.org>
---
 lfs/dnsmasq                                        |   3 +-
 ...NSSEC_validation_with_private_DNS_servers.patch | 139 +++++++++++++++++++++
 2 files changed, 141 insertions(+), 1 deletion(-)
 create mode 100644 src/patches/dnsmasq/050-Complete_work_to_allow_DNSSEC_validation_with_private_DNS_servers.patch

diff --git a/lfs/dnsmasq b/lfs/dnsmasq
index bdfb1f8..4e5951f 100644
--- a/lfs/dnsmasq
+++ b/lfs/dnsmasq
@@ -1,7 +1,7 @@
 ###############################################################################
 #                                                                             #
 # IPFire.org - A linux based firewall                                         #
-# Copyright (C) 2015  Michael Tremer & Christian Schmidt                      #
+# Copyright (C) 2016  Michael Tremer & Christian Schmidt                      #
 #                                                                             #
 # This program is free software: you can redistribute it and/or modify        #
 # it under the terms of the GNU General Public License as published by        #
@@ -122,6 +122,7 @@ $(TARGET) : $(patsubst %,$(DIR_DL)/%,$(objects))
 	cd $(DIR_APP) && patch -Np1 -i $(DIR_SRC)/src/patches/dnsmasq/047-Fix_bad_cache-size_calculation_when_hosts-file_read_fails.patch
 	cd $(DIR_APP) && patch -Np1 -i $(DIR_SRC)/src/patches/dnsmasq/048-Disable_DNSSEC_for_server_domain_servers_unless_trust-anchor_provided.patch
 	cd $(DIR_APP) && patch -Np1 -i $(DIR_SRC)/src/patches/dnsmasq/049-arp_c_tidy_up.patch
+	cd $(DIR_APP) && patch -Np1 -i $(DIR_SRC)/src/patches/dnsmasq/050-Complete_work_to_allow_DNSSEC_validation_with_private_DNS_servers.patch
 	cd $(DIR_APP) && patch -Np1 -i $(DIR_SRC)/src/patches/dnsmasq-Add-support-to-read-ISC-DHCP-lease-file.patch
 
 	cd $(DIR_APP) && sed -i src/config.h \
diff --git a/src/patches/dnsmasq/050-Complete_work_to_allow_DNSSEC_validation_with_private_DNS_servers.patch b/src/patches/dnsmasq/050-Complete_work_to_allow_DNSSEC_validation_with_private_DNS_servers.patch
new file mode 100644
index 0000000..b969eee
--- /dev/null
+++ b/src/patches/dnsmasq/050-Complete_work_to_allow_DNSSEC_validation_with_private_DNS_servers.patch
@@ -0,0 +1,139 @@
+From 92be34a4077672f592d47e2991b3530305517a28 Mon Sep 17 00:00:00 2001
+From: Simon Kelley <simon(a)thekelleys.org.uk>
+Date: Sat, 16 Jan 2016 18:39:54 +0000
+Subject: [PATCH] Complete work to allow DNSSEC validation with private DNS
+ servers.
+
+---
+ man/dnsmasq.8 |    5 ++++-
+ src/forward.c |   34 +++++++++++++++++++++++++++++++---
+ src/network.c |   33 +++++++++++++++++++--------------
+ 3 files changed, 54 insertions(+), 18 deletions(-)
+
+diff --git a/man/dnsmasq.8 b/man/dnsmasq.8
+index d51b10f..69acdae 100644
+--- a/man/dnsmasq.8
++++ b/man/dnsmasq.8
+@@ -405,7 +405,10 @@ xxx.internal.thekelleys.org.uk at 192.168.1.1 then giving  the flag
+ .B -S /internal.thekelleys.org.uk/192.168.1.1 
+ will send all queries for
+ internal machines to that nameserver, everything else will go to the
+-servers in /etc/resolv.conf. An empty domain specification,
++servers in /etc/resolv.conf. DNSSEC validation is turned off for such
++private nameservers, UNLESS a
++.B --trust-anchor
++is specified for the domain in question. An empty domain specification,
+ .B // 
+ has the special meaning of "unqualified names only" ie names without any
+ dots in them. A non-standard port may be specified as 
+diff --git a/src/forward.c b/src/forward.c
+index 11c0d45..c48fd75 100644
+--- a/src/forward.c
++++ b/src/forward.c
+@@ -151,7 +151,7 @@ static unsigned int search_servers(time_t now, struct all_addr **addrpp, unsigne
+ 	    hostname_isequal(matchstart, serv->domain) &&
+ 	    (domainlen == 0 || namelen == domainlen || *(matchstart-1) == '.' ))
+ 	  {
+-	    if (serv->flags & SERV_NO_REBIND)	
++	    if ((serv->flags & SERV_NO_REBIND) && norebind)	
+ 	      *norebind = 1;
+ 	    else
+ 	      {
+@@ -644,7 +644,7 @@ static size_t process_reply(struct dns_header *header, time_t now, struct server
+     return resize_packet(header, n, pheader, plen);
+   
+   /* Complain loudly if the upstream server is non-recursive. */
+-  if (!(header->hb4 & HB4_RA) && RCODE(header) == NOERROR && ntohs(header->ancount) == 0 &&
++  if (!(header->hb4 & HB4_RA) && RCODE(header) == NOERROR &&
+       server && !(server->flags & SERV_WARNED_RECURSIVE))
+     {
+       prettyprint_addr(&server->addr, daemon->namebuff);
+@@ -923,12 +923,40 @@ void reply_query(int fd, int family, time_t now)
+ 		    status = STAT_ABANDONED;
+ 		  else
+ 		    {
+-		      int fd;
++		      int fd, type;
+ 		      struct frec *next = new->next;
++		      char *domain;
++		      
+ 		      *new = *forward; /* copy everything, then overwrite */
+ 		      new->next = next;
+ 		      new->blocking_query = NULL;
++
++		      /* Find server to forward to. This will normally be the 
++			 same as for the original query, but may be another if
++			 servers for domains are involved. */		      
++		      if (search_servers(now, NULL, F_QUERY, daemon->keyname, &type, &domain, NULL) == 0)
++			{
++			   struct server *start = server;
++			   type &= ~SERV_DO_DNSSEC;
++			   
++			   while (1)
++			     {
++			       if (type == (start->flags & SERV_TYPE) &&
++				   (type != SERV_HAS_DOMAIN || hostname_isequal(domain, start->domain)) &&
++				   !(start->flags & (SERV_LITERAL_ADDRESS | SERV_LOOP)))
++				 {
++				   server = start;
++				   break;
++				 }
++			       
++			       if (!(start = start->next))
++				 start = daemon->servers;
++			       if (start == server)
++				 break;
++			     }
++			}
+ 		      new->sentto = server;
++
+ 		      new->rfd4 = NULL;
+ #ifdef HAVE_IPV6
+ 		      new->rfd6 = NULL;
+diff --git a/src/network.c b/src/network.c
+index 303ae50..5451c6c 100644
+--- a/src/network.c
++++ b/src/network.c
+@@ -1442,20 +1442,25 @@ void check_servers(void)
+       if (!(serv->flags & (SERV_LITERAL_ADDRESS | SERV_NO_ADDR | SERV_USE_RESOLV | SERV_NO_REBIND)))
+ 	{
+ #ifdef HAVE_DNSSEC
+-	  if (option_bool(OPT_DNSSEC_VALID) && (serv->flags & SERV_HAS_DOMAIN))
+-	    {
+-	      struct ds_config *ds;
+-	      char *domain = serv->domain;
+-
+-	      /* .example.com is valid */
+-	      while (*domain == '.')
+-		domain++;
+-	      
+-	      for (ds = daemon->ds; ds; ds = ds->next)
+-		if (ds->name[0] != 0 && hostname_isequal(domain, ds->name))
+-		  break;
+-
+-	      if (!ds)
++	  if (option_bool(OPT_DNSSEC_VALID))
++	    { 
++	      if (serv->flags & SERV_HAS_DOMAIN)
++		{
++		  struct ds_config *ds;
++		  char *domain = serv->domain;
++		  
++		  /* .example.com is valid */
++		  while (*domain == '.')
++		    domain++;
++		  
++		  for (ds = daemon->ds; ds; ds = ds->next)
++		    if (ds->name[0] != 0 && hostname_isequal(domain, ds->name))
++		      break;
++		  
++		  if (!ds)
++		    serv->flags &= ~SERV_DO_DNSSEC;
++		}
++	      else if (serv->flags & SERV_FOR_NODOTS) 
+ 		serv->flags &= ~SERV_DO_DNSSEC;
+ 	    }
+ #endif
+-- 
+1.7.10.4
+
-- 
2.7.0


             reply	other threads:[~2016-01-17 14:30 UTC|newest]

Thread overview: 16+ messages / expand[flat|nested]  mbox.gz  Atom feed  top
2016-01-17 14:30 Matthias Fischer [this message]
2016-01-19  7:39 ` R. W. Rodolico
2016-01-19 19:59   ` Matthias Fischer
2016-01-19 21:27     ` R. W. Rodolico
2016-01-20 20:29       ` Matthias Fischer
2016-01-20 18:23     ` Kienker, Fred
2016-01-20 18:58       ` R. W. Rodolico
2016-01-20 23:51         ` Michael Tremer
2016-01-21  3:39           ` R. W. Rodolico
2016-01-23 12:00           ` Matthias Fischer
2016-02-04 20:58             ` R. W. Rodolico
2016-02-04 23:50             ` Michael Tremer
2016-02-05 22:45               ` Matthias Fischer
2016-02-05 22:50                 ` Kienker, Fred
2016-02-06 11:37               ` Warnings about unused variables (was: Re: [PATCH] dnsmasq 2.75: next patch... (No.50)) Matthias Fischer
2016-01-20 20:36       ` [PATCH] dnsmasq 2.75: next patch... (No.50) Matthias Fischer

Reply instructions:

You may reply publicly to this message via plain-text email
using any one of the following methods:

* Save the following mbox file, import it into your mail client,
  and reply-to-all from there: mbox

  Avoid top-posting and favor interleaved quoting:
  https://en.wikipedia.org/wiki/Posting_style#Interleaved_style

* Reply using the --to, --cc, and --in-reply-to
  switches of git-send-email(1):

  git send-email \
    --in-reply-to=1453041044-26371-1-git-send-email-matthias.fischer@ipfire.org \
    --to=matthias.fischer@ipfire.org \
    --cc=development@lists.ipfire.org \
    /path/to/YOUR_REPLY

  https://kernel.org/pub/software/scm/git/docs/git-send-email.html

* If your mail client supports setting the In-Reply-To header
  via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox