2 * Copyright (C) 2004-2009 Internet Systems Consortium, Inc. ("ISC")
3 * Copyright (C) 2001-2003 Internet Software Consortium.
5 * Permission to use, copy, modify, and/or distribute this software for any
6 * purpose with or without fee is hereby granted, provided that the above
7 * copyright notice and this permission notice appear in all copies.
9 * THE SOFTWARE IS PROVIDED "AS IS" AND ISC DISCLAIMS ALL WARRANTIES WITH
10 * REGARD TO THIS SOFTWARE INCLUDING ALL IMPLIED WARRANTIES OF MERCHANTABILITY
11 * AND FITNESS. IN NO EVENT SHALL ISC BE LIABLE FOR ANY SPECIAL, DIRECT,
12 * INDIRECT, OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES WHATSOEVER RESULTING FROM
13 * LOSS OF USE, DATA OR PROFITS, WHETHER IN AN ACTION OF CONTRACT, NEGLIGENCE
14 * OR OTHER TORTIOUS ACTION, ARISING OUT OF OR IN CONNECTION WITH THE USE OR
15 * PERFORMANCE OF THIS SOFTWARE.
18 /* $Id: config.c,v 1.93.14.2 2009/03/17 23:47:28 tbox Exp $ */
26 #include <isc/buffer.h>
29 #include <isc/parseint.h>
30 #include <isc/region.h>
31 #include <isc/result.h>
32 #include <isc/sockaddr.h>
33 #include <isc/string.h>
36 #include <isccfg/namedconf.h>
38 #include <dns/fixedname.h>
40 #include <dns/rdataclass.h>
41 #include <dns/rdatatype.h>
45 #include <named/config.h>
46 #include <named/globals.h>
48 /*% default configuration */
49 static char defaultconf[] = "\
51 # blackhole {none;};\n"
53 " coresize default;\n\
58 " deallocate-on-exit true;\n\
60 dump-file \"named_dump.db\";\n\
62 has-old-clients false;\n\
63 heartbeat-interval 60;\n\
64 host-statistics no;\n\
65 interface-interval 60;\n\
67 listen-on-v6 {none;};\n\
68 match-mapped-addresses no;\n\
69 memstatistics-file \"named.memstats\";\n\
70 multiple-cnames no;\n\
71 # named-xfer <obsolete>;\n\
72 # pid-file \"" NS_LOCALSTATEDIR "/run/named/named.pid\"; /* or /lwresd.pid */\n\
74 recursing-file \"named.recursing\";\n\
78 random-device \"" PATH_RANDOMDEV "\";\n\
82 recursive-clients 1000;\n\
83 rrset-order {type NS order random; order cyclic; };\n\
85 serial-query-rate 20;\n\
87 statistics-file \"named.stats\";\n\
88 statistics-interval 60;\n\
90 tcp-listen-queue 3;\n\
91 # tkey-dhkey <none>\n\
92 # tkey-gssapi-credential <none>\n\
93 # tkey-domain <none>\n\
94 transfers-per-ns 2;\n\
97 treat-cr-as-space true;\n\
100 edns-udp-size 4096;\n\
101 max-udp-size 4096;\n\
102 request-nsid false;\n\
103 reserved-sockets 512;\n\
106 allow-notify {none;};\n\
107 allow-update-forwarding {none;};\n\
108 allow-query-cache { localnets; localhost; };\n\
109 allow-query-cache-on { any; };\n\
110 allow-recursion { localnets; localhost; };\n\
111 allow-recursion-on { any; };\n\
112 # allow-v6-synthesis <obsolete>;\n\
115 auth-nxdomain false;\n\
116 minimal-responses false;\n\
118 provide-ixfr true;\n\
119 request-ixfr true;\n\
122 additional-from-auth true;\n\
123 additional-from-cache true;\n\
124 query-source address *;\n\
125 query-source-v6 address *;\n\
127 notify-source-v6 *;\n\
128 cleaning-interval 0; /* now meaningless */\n\
131 max-ncache-ttl 10800; /* 3 hours */\n\
132 max-cache-ttl 604800; /* 1 week */\n\
133 transfer-format many-answers;\n\
135 check-names master fail;\n\
136 check-names slave warn;\n\
137 check-names response ignore;\n\
140 acache-cleaning-interval 60;\n\
141 max-acache-size 16M;\n\
142 dnssec-enable yes;\n\
143 dnssec-validation yes; \n\
144 dnssec-accept-expired no;\n\
145 clients-per-query 10;\n\
146 max-clients-per-query 100;\n\
147 zero-no-soa-ttl-cache no;\n\
148 nsec3-test-zone no;\n\
152 allow-query {any;};\n\
153 allow-query-on {any;};\n\
154 allow-transfer {any;};\n\
156 # also-notify <none>\n\
161 # forwarders <none>\n\
162 maintain-ixfr-base no;\n\
163 # max-ixfr-log-size <obsolete>\n\
164 transfer-source *;\n\
165 transfer-source-v6 *;\n\
166 alt-transfer-source *;\n\
167 alt-transfer-source-v6 *;\n\
168 max-transfer-time-in 120;\n\
169 max-transfer-time-out 120;\n\
170 max-transfer-idle-in 60;\n\
171 max-transfer-idle-out 60;\n\
172 max-retry-time 1209600; /* 2 weeks */\n\
173 min-retry-time 500;\n\
174 max-refresh-time 2419200; /* 4 weeks */\n\
175 min-refresh-time 300;\n\
177 sig-validity-interval 30; /* days */\n\
178 sig-signing-nodes 100;\n\
179 sig-signing-signatures 10;\n\
180 sig-signing-type 65534;\n\
181 zone-statistics false;\n\
182 max-journal-size unlimited;\n\
183 ixfr-from-differences false;\n\
184 check-wildcard yes;\n\
185 check-sibling yes;\n\
186 check-integrity yes;\n\
187 check-mx-cname warn;\n\
188 check-srv-cname warn;\n\
189 zero-no-soa-ttl yes;\n\
190 update-check-ksk yes;\n\
191 try-tcp-refresh yes; /* BIND 8 compat */\n\
196 # Zones in the \"_bind\" view are NOT counted in the count of zones.\n\
198 view \"_bind\" chaos {\n\
202 zone \"version.bind\" chaos {\n\
204 database \"_builtin version\";\n\
207 zone \"hostname.bind\" chaos {\n\
209 database \"_builtin hostname\";\n\
212 zone \"authors.bind\" chaos {\n\
214 database \"_builtin authors\";\n\
216 zone \"id.server\" chaos {\n\
218 database \"_builtin id\";\n\
224 ns_config_parsedefaults(cfg_parser_t *parser, cfg_obj_t **conf) {
227 isc_buffer_init(&b, defaultconf, sizeof(defaultconf) - 1);
228 isc_buffer_add(&b, sizeof(defaultconf) - 1);
229 return (cfg_parse_buffer(parser, &b, &cfg_type_namedconf, conf));
233 ns_config_get(const cfg_obj_t **maps, const char *name, const cfg_obj_t **obj) {
238 return (ISC_R_NOTFOUND);
239 if (cfg_map_get(maps[i], name, obj) == ISC_R_SUCCESS)
240 return (ISC_R_SUCCESS);
245 ns_checknames_get(const cfg_obj_t **maps, const char *which,
246 const cfg_obj_t **obj)
248 const cfg_listelt_t *element;
249 const cfg_obj_t *checknames;
250 const cfg_obj_t *type;
251 const cfg_obj_t *value;
256 return (ISC_R_NOTFOUND);
258 if (cfg_map_get(maps[i], "check-names", &checknames) == ISC_R_SUCCESS) {
260 * Zone map entry is not a list.
262 if (checknames != NULL && !cfg_obj_islist(checknames)) {
264 return (ISC_R_SUCCESS);
266 for (element = cfg_list_first(checknames);
268 element = cfg_list_next(element)) {
269 value = cfg_listelt_value(element);
270 type = cfg_tuple_get(value, "type");
271 if (strcasecmp(cfg_obj_asstring(type), which) == 0) {
272 *obj = cfg_tuple_get(value, "mode");
273 return (ISC_R_SUCCESS);
282 ns_config_listcount(const cfg_obj_t *list) {
283 const cfg_listelt_t *e;
286 for (e = cfg_list_first(list); e != NULL; e = cfg_list_next(e))
293 ns_config_getclass(const cfg_obj_t *classobj, dns_rdataclass_t defclass,
294 dns_rdataclass_t *classp) {
298 if (!cfg_obj_isstring(classobj)) {
300 return (ISC_R_SUCCESS);
302 DE_CONST(cfg_obj_asstring(classobj), r.base);
303 r.length = strlen(r.base);
304 result = dns_rdataclass_fromtext(classp, &r);
305 if (result != ISC_R_SUCCESS)
306 cfg_obj_log(classobj, ns_g_lctx, ISC_LOG_ERROR,
307 "unknown class '%s'", r.base);
312 ns_config_gettype(const cfg_obj_t *typeobj, dns_rdatatype_t deftype,
313 dns_rdatatype_t *typep) {
317 if (!cfg_obj_isstring(typeobj)) {
319 return (ISC_R_SUCCESS);
321 DE_CONST(cfg_obj_asstring(typeobj), r.base);
322 r.length = strlen(r.base);
323 result = dns_rdatatype_fromtext(typep, &r);
324 if (result != ISC_R_SUCCESS)
325 cfg_obj_log(typeobj, ns_g_lctx, ISC_LOG_ERROR,
326 "unknown type '%s'", r.base);
331 ns_config_getzonetype(const cfg_obj_t *zonetypeobj) {
332 dns_zonetype_t ztype = dns_zone_none;
335 str = cfg_obj_asstring(zonetypeobj);
336 if (strcasecmp(str, "master") == 0)
337 ztype = dns_zone_master;
338 else if (strcasecmp(str, "slave") == 0)
339 ztype = dns_zone_slave;
340 else if (strcasecmp(str, "stub") == 0)
341 ztype = dns_zone_stub;
348 ns_config_getiplist(const cfg_obj_t *config, const cfg_obj_t *list,
349 in_port_t defport, isc_mem_t *mctx,
350 isc_sockaddr_t **addrsp, isc_uint32_t *countp)
353 const cfg_obj_t *addrlist;
354 const cfg_obj_t *portobj;
355 const cfg_listelt_t *element;
356 isc_sockaddr_t *addrs;
360 INSIST(addrsp != NULL && *addrsp == NULL);
361 INSIST(countp != NULL);
363 addrlist = cfg_tuple_get(list, "addresses");
364 count = ns_config_listcount(addrlist);
366 portobj = cfg_tuple_get(list, "port");
367 if (cfg_obj_isuint32(portobj)) {
368 isc_uint32_t val = cfg_obj_asuint32(portobj);
369 if (val > ISC_UINT16_MAX) {
370 cfg_obj_log(portobj, ns_g_lctx, ISC_LOG_ERROR,
371 "port '%u' out of range", val);
372 return (ISC_R_RANGE);
374 port = (in_port_t) val;
375 } else if (defport != 0)
378 result = ns_config_getport(config, &port);
379 if (result != ISC_R_SUCCESS)
383 addrs = isc_mem_get(mctx, count * sizeof(isc_sockaddr_t));
385 return (ISC_R_NOMEMORY);
387 for (element = cfg_list_first(addrlist);
389 element = cfg_list_next(element), i++)
392 addrs[i] = *cfg_obj_assockaddr(cfg_listelt_value(element));
393 if (isc_sockaddr_getport(&addrs[i]) == 0)
394 isc_sockaddr_setport(&addrs[i], port);
401 return (ISC_R_SUCCESS);
405 ns_config_putiplist(isc_mem_t *mctx, isc_sockaddr_t **addrsp,
408 INSIST(addrsp != NULL && *addrsp != NULL);
410 isc_mem_put(mctx, *addrsp, count * sizeof(isc_sockaddr_t));
415 get_masters_def(const cfg_obj_t *cctx, const char *name,
416 const cfg_obj_t **ret)
419 const cfg_obj_t *masters = NULL;
420 const cfg_listelt_t *elt;
422 result = cfg_map_get(cctx, "masters", &masters);
423 if (result != ISC_R_SUCCESS)
425 for (elt = cfg_list_first(masters);
427 elt = cfg_list_next(elt)) {
428 const cfg_obj_t *list;
429 const char *listname;
431 list = cfg_listelt_value(elt);
432 listname = cfg_obj_asstring(cfg_tuple_get(list, "name"));
434 if (strcasecmp(listname, name) == 0) {
436 return (ISC_R_SUCCESS);
439 return (ISC_R_NOTFOUND);
443 ns_config_getipandkeylist(const cfg_obj_t *config, const cfg_obj_t *list,
444 isc_mem_t *mctx, isc_sockaddr_t **addrsp,
445 dns_name_t ***keysp, isc_uint32_t *countp)
447 isc_uint32_t addrcount = 0, keycount = 0, i = 0;
448 isc_uint32_t listcount = 0, l = 0, j;
449 isc_uint32_t stackcount = 0, pushed = 0;
451 const cfg_listelt_t *element;
452 const cfg_obj_t *addrlist;
453 const cfg_obj_t *portobj;
455 dns_fixedname_t fname;
456 isc_sockaddr_t *addrs = NULL;
457 dns_name_t **keys = NULL;
458 struct { const char *name; } *lists = NULL;
460 const cfg_listelt_t *element;
464 REQUIRE(addrsp != NULL && *addrsp == NULL);
465 REQUIRE(keysp != NULL && *keysp == NULL);
466 REQUIRE(countp != NULL);
469 addrlist = cfg_tuple_get(list, "addresses");
470 portobj = cfg_tuple_get(list, "port");
471 if (cfg_obj_isuint32(portobj)) {
472 isc_uint32_t val = cfg_obj_asuint32(portobj);
473 if (val > ISC_UINT16_MAX) {
474 cfg_obj_log(portobj, ns_g_lctx, ISC_LOG_ERROR,
475 "port '%u' out of range", val);
476 result = ISC_R_RANGE;
479 port = (in_port_t) val;
481 result = ns_config_getport(config, &port);
482 if (result != ISC_R_SUCCESS)
486 result = ISC_R_NOMEMORY;
488 element = cfg_list_first(addrlist);
492 element = cfg_list_next(element))
494 const cfg_obj_t *addr;
495 const cfg_obj_t *key;
499 addr = cfg_tuple_get(cfg_listelt_value(element),
501 key = cfg_tuple_get(cfg_listelt_value(element), "key");
503 if (!cfg_obj_issockaddr(addr)) {
504 const char *listname = cfg_obj_asstring(addr);
505 isc_result_t tresult;
508 if (listcount == l) {
510 isc_uint32_t newlen = listcount + 16;
511 size_t newsize, oldsize;
513 newsize = newlen * sizeof(*lists);
514 oldsize = listcount * sizeof(*lists);
515 new = isc_mem_get(mctx, newsize);
518 if (listcount != 0) {
519 memcpy(new, lists, oldsize);
520 isc_mem_put(mctx, lists, oldsize);
526 for (j = 0; j < l; j++)
527 if (strcasecmp(lists[j].name, listname) == 0)
531 tresult = get_masters_def(config, listname, &list);
532 if (tresult == ISC_R_NOTFOUND) {
533 cfg_obj_log(addr, ns_g_lctx, ISC_LOG_ERROR,
534 "masters \"%s\" not found", listname);
539 if (tresult != ISC_R_SUCCESS)
541 lists[l++].name = listname;
543 if (stackcount == pushed) {
545 isc_uint32_t newlen = stackcount + 16;
546 size_t newsize, oldsize;
548 newsize = newlen * sizeof(*stack);
549 oldsize = stackcount * sizeof(*stack);
550 new = isc_mem_get(mctx, newsize);
553 if (stackcount != 0) {
554 memcpy(new, stack, oldsize);
555 isc_mem_put(mctx, stack, oldsize);
561 * We want to resume processing this list on the
564 stack[pushed].element = cfg_list_next(element);
565 stack[pushed].port = port;
570 if (i == addrcount) {
572 isc_uint32_t newlen = addrcount + 16;
573 size_t newsize, oldsize;
575 newsize = newlen * sizeof(isc_sockaddr_t);
576 oldsize = addrcount * sizeof(isc_sockaddr_t);
577 new = isc_mem_get(mctx, newsize);
580 if (addrcount != 0) {
581 memcpy(new, addrs, oldsize);
582 isc_mem_put(mctx, addrs, oldsize);
587 newsize = newlen * sizeof(dns_name_t *);
588 oldsize = keycount * sizeof(dns_name_t *);
589 new = isc_mem_get(mctx, newsize);
593 memcpy(new, keys, oldsize);
594 isc_mem_put(mctx, keys, oldsize);
600 addrs[i] = *cfg_obj_assockaddr(addr);
601 if (isc_sockaddr_getport(&addrs[i]) == 0)
602 isc_sockaddr_setport(&addrs[i], port);
604 if (!cfg_obj_isstring(key)) {
608 keys[i] = isc_mem_get(mctx, sizeof(dns_name_t));
611 dns_name_init(keys[i], NULL);
613 keystr = cfg_obj_asstring(key);
614 isc_buffer_init(&b, keystr, strlen(keystr));
615 isc_buffer_add(&b, strlen(keystr));
616 dns_fixedname_init(&fname);
617 result = dns_name_fromtext(dns_fixedname_name(&fname), &b,
618 dns_rootname, ISC_FALSE, NULL);
619 if (result != ISC_R_SUCCESS)
621 result = dns_name_dup(dns_fixedname_name(&fname), mctx,
623 if (result != ISC_R_SUCCESS)
629 element = stack[pushed].element;
630 port = stack[pushed].port;
635 size_t newsize, oldsize;
637 newsize = i * sizeof(isc_sockaddr_t);
638 oldsize = addrcount * sizeof(isc_sockaddr_t);
640 new = isc_mem_get(mctx, newsize);
643 memcpy(new, addrs, newsize);
646 isc_mem_put(mctx, addrs, oldsize);
650 newsize = i * sizeof(dns_name_t *);
651 oldsize = keycount * sizeof(dns_name_t *);
653 new = isc_mem_get(mctx, newsize);
656 memcpy(new, keys, newsize);
659 isc_mem_put(mctx, keys, oldsize);
665 isc_mem_put(mctx, lists, listcount * sizeof(*lists));
667 isc_mem_put(mctx, stack, stackcount * sizeof(*stack));
669 INSIST(keycount == addrcount);
675 return (ISC_R_SUCCESS);
679 isc_mem_put(mctx, addrs, addrcount * sizeof(isc_sockaddr_t));
681 for (j = 0; j <= i; j++) {
684 if (dns_name_dynamic(keys[j]))
685 dns_name_free(keys[j], mctx);
686 isc_mem_put(mctx, keys[j], sizeof(dns_name_t));
688 isc_mem_put(mctx, keys, keycount * sizeof(dns_name_t *));
691 isc_mem_put(mctx, lists, listcount * sizeof(*lists));
693 isc_mem_put(mctx, stack, stackcount * sizeof(*stack));
698 ns_config_putipandkeylist(isc_mem_t *mctx, isc_sockaddr_t **addrsp,
699 dns_name_t ***keysp, isc_uint32_t count)
702 dns_name_t **keys = *keysp;
704 INSIST(addrsp != NULL && *addrsp != NULL);
706 isc_mem_put(mctx, *addrsp, count * sizeof(isc_sockaddr_t));
707 for (i = 0; i < count; i++) {
710 if (dns_name_dynamic(keys[i]))
711 dns_name_free(keys[i], mctx);
712 isc_mem_put(mctx, keys[i], sizeof(dns_name_t));
714 isc_mem_put(mctx, *keysp, count * sizeof(dns_name_t *));
720 ns_config_getport(const cfg_obj_t *config, in_port_t *portp) {
721 const cfg_obj_t *maps[3];
722 const cfg_obj_t *options = NULL;
723 const cfg_obj_t *portobj = NULL;
727 (void)cfg_map_get(config, "options", &options);
731 maps[i++] = ns_g_defaults;
734 result = ns_config_get(maps, "port", &portobj);
735 INSIST(result == ISC_R_SUCCESS);
736 if (cfg_obj_asuint32(portobj) >= ISC_UINT16_MAX) {
737 cfg_obj_log(portobj, ns_g_lctx, ISC_LOG_ERROR,
738 "port '%u' out of range",
739 cfg_obj_asuint32(portobj));
740 return (ISC_R_RANGE);
742 *portp = (in_port_t)cfg_obj_asuint32(portobj);
743 return (ISC_R_SUCCESS);
746 struct keyalgorithms {
748 enum { hmacnone, hmacmd5, hmacsha1, hmacsha224,
749 hmacsha256, hmacsha384, hmacsha512 } hmac;
752 { "hmac-md5", hmacmd5, 128 },
753 { "hmac-md5.sig-alg.reg.int", hmacmd5, 0 },
754 { "hmac-md5.sig-alg.reg.int.", hmacmd5, 0 },
755 { "hmac-sha1", hmacsha1, 160 },
756 { "hmac-sha224", hmacsha224, 224 },
757 { "hmac-sha256", hmacsha256, 256 },
758 { "hmac-sha384", hmacsha384, 384 },
759 { "hmac-sha512", hmacsha512, 512 },
760 { NULL, hmacnone, 0 }
764 ns_config_getkeyalgorithm(const char *str, dns_name_t **name,
765 isc_uint16_t *digestbits)
772 for (i = 0; algorithms[i].str != NULL; i++) {
773 len = strlen(algorithms[i].str);
774 if (strncasecmp(algorithms[i].str, str, len) == 0 &&
776 (algorithms[i].size != 0 && str[len] == '-')))
779 if (algorithms[i].str == NULL)
780 return (ISC_R_NOTFOUND);
781 if (str[len] == '-') {
782 result = isc_parse_uint16(&bits, str + len + 1, 10);
783 if (result != ISC_R_SUCCESS)
785 if (bits > algorithms[i].size)
786 return (ISC_R_RANGE);
787 } else if (algorithms[i].size == 0)
790 bits = algorithms[i].size;
793 switch (algorithms[i].hmac) {
794 case hmacmd5: *name = dns_tsig_hmacmd5_name; break;
795 case hmacsha1: *name = dns_tsig_hmacsha1_name; break;
796 case hmacsha224: *name = dns_tsig_hmacsha224_name; break;
797 case hmacsha256: *name = dns_tsig_hmacsha256_name; break;
798 case hmacsha384: *name = dns_tsig_hmacsha384_name; break;
799 case hmacsha512: *name = dns_tsig_hmacsha512_name; break;
804 if (digestbits != NULL)
806 return (ISC_R_SUCCESS);