tsig.go 9.3 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386
  1. package dns
  2. import (
  3. "crypto/hmac"
  4. "crypto/md5"
  5. "crypto/sha1"
  6. "crypto/sha256"
  7. "crypto/sha512"
  8. "encoding/binary"
  9. "encoding/hex"
  10. "hash"
  11. "strconv"
  12. "strings"
  13. "time"
  14. )
  15. // HMAC hashing codes. These are transmitted as domain names.
  16. const (
  17. HmacMD5 = "hmac-md5.sig-alg.reg.int."
  18. HmacSHA1 = "hmac-sha1."
  19. HmacSHA256 = "hmac-sha256."
  20. HmacSHA512 = "hmac-sha512."
  21. )
  22. // TSIG is the RR the holds the transaction signature of a message.
  23. // See RFC 2845 and RFC 4635.
  24. type TSIG struct {
  25. Hdr RR_Header
  26. Algorithm string `dns:"domain-name"`
  27. TimeSigned uint64 `dns:"uint48"`
  28. Fudge uint16
  29. MACSize uint16
  30. MAC string `dns:"size-hex:MACSize"`
  31. OrigId uint16
  32. Error uint16
  33. OtherLen uint16
  34. OtherData string `dns:"size-hex:OtherLen"`
  35. }
  36. // TSIG has no official presentation format, but this will suffice.
  37. func (rr *TSIG) String() string {
  38. s := "\n;; TSIG PSEUDOSECTION:\n"
  39. s += rr.Hdr.String() +
  40. " " + rr.Algorithm +
  41. " " + tsigTimeToString(rr.TimeSigned) +
  42. " " + strconv.Itoa(int(rr.Fudge)) +
  43. " " + strconv.Itoa(int(rr.MACSize)) +
  44. " " + strings.ToUpper(rr.MAC) +
  45. " " + strconv.Itoa(int(rr.OrigId)) +
  46. " " + strconv.Itoa(int(rr.Error)) + // BIND prints NOERROR
  47. " " + strconv.Itoa(int(rr.OtherLen)) +
  48. " " + rr.OtherData
  49. return s
  50. }
  51. // The following values must be put in wireformat, so that the MAC can be calculated.
  52. // RFC 2845, section 3.4.2. TSIG Variables.
  53. type tsigWireFmt struct {
  54. // From RR_Header
  55. Name string `dns:"domain-name"`
  56. Class uint16
  57. Ttl uint32
  58. // Rdata of the TSIG
  59. Algorithm string `dns:"domain-name"`
  60. TimeSigned uint64 `dns:"uint48"`
  61. Fudge uint16
  62. // MACSize, MAC and OrigId excluded
  63. Error uint16
  64. OtherLen uint16
  65. OtherData string `dns:"size-hex:OtherLen"`
  66. }
  67. // If we have the MAC use this type to convert it to wiredata. Section 3.4.3. Request MAC
  68. type macWireFmt struct {
  69. MACSize uint16
  70. MAC string `dns:"size-hex:MACSize"`
  71. }
  72. // 3.3. Time values used in TSIG calculations
  73. type timerWireFmt struct {
  74. TimeSigned uint64 `dns:"uint48"`
  75. Fudge uint16
  76. }
  77. // TsigGenerate fills out the TSIG record attached to the message.
  78. // The message should contain
  79. // a "stub" TSIG RR with the algorithm, key name (owner name of the RR),
  80. // time fudge (defaults to 300 seconds) and the current time
  81. // The TSIG MAC is saved in that Tsig RR.
  82. // When TsigGenerate is called for the first time requestMAC is set to the empty string and
  83. // timersOnly is false.
  84. // If something goes wrong an error is returned, otherwise it is nil.
  85. func TsigGenerate(m *Msg, secret, requestMAC string, timersOnly bool) ([]byte, string, error) {
  86. if m.IsTsig() == nil {
  87. panic("dns: TSIG not last RR in additional")
  88. }
  89. // If we barf here, the caller is to blame
  90. rawsecret, err := fromBase64([]byte(secret))
  91. if err != nil {
  92. return nil, "", err
  93. }
  94. rr := m.Extra[len(m.Extra)-1].(*TSIG)
  95. m.Extra = m.Extra[0 : len(m.Extra)-1] // kill the TSIG from the msg
  96. mbuf, err := m.Pack()
  97. if err != nil {
  98. return nil, "", err
  99. }
  100. buf := tsigBuffer(mbuf, rr, requestMAC, timersOnly)
  101. t := new(TSIG)
  102. var h hash.Hash
  103. switch strings.ToLower(rr.Algorithm) {
  104. case HmacMD5:
  105. h = hmac.New(md5.New, []byte(rawsecret))
  106. case HmacSHA1:
  107. h = hmac.New(sha1.New, []byte(rawsecret))
  108. case HmacSHA256:
  109. h = hmac.New(sha256.New, []byte(rawsecret))
  110. case HmacSHA512:
  111. h = hmac.New(sha512.New, []byte(rawsecret))
  112. default:
  113. return nil, "", ErrKeyAlg
  114. }
  115. h.Write(buf)
  116. t.MAC = hex.EncodeToString(h.Sum(nil))
  117. t.MACSize = uint16(len(t.MAC) / 2) // Size is half!
  118. t.Hdr = RR_Header{Name: rr.Hdr.Name, Rrtype: TypeTSIG, Class: ClassANY, Ttl: 0}
  119. t.Fudge = rr.Fudge
  120. t.TimeSigned = rr.TimeSigned
  121. t.Algorithm = rr.Algorithm
  122. t.OrigId = m.Id
  123. tbuf := make([]byte, t.len())
  124. if off, err := PackRR(t, tbuf, 0, nil, false); err == nil {
  125. tbuf = tbuf[:off] // reset to actual size used
  126. } else {
  127. return nil, "", err
  128. }
  129. mbuf = append(mbuf, tbuf...)
  130. // Update the ArCount directly in the buffer.
  131. binary.BigEndian.PutUint16(mbuf[10:], uint16(len(m.Extra)+1))
  132. return mbuf, t.MAC, nil
  133. }
  134. // TsigVerify verifies the TSIG on a message.
  135. // If the signature does not validate err contains the
  136. // error, otherwise it is nil.
  137. func TsigVerify(msg []byte, secret, requestMAC string, timersOnly bool) error {
  138. rawsecret, err := fromBase64([]byte(secret))
  139. if err != nil {
  140. return err
  141. }
  142. // Strip the TSIG from the incoming msg
  143. stripped, tsig, err := stripTsig(msg)
  144. if err != nil {
  145. return err
  146. }
  147. msgMAC, err := hex.DecodeString(tsig.MAC)
  148. if err != nil {
  149. return err
  150. }
  151. buf := tsigBuffer(stripped, tsig, requestMAC, timersOnly)
  152. // Fudge factor works both ways. A message can arrive before it was signed because
  153. // of clock skew.
  154. now := uint64(time.Now().Unix())
  155. ti := now - tsig.TimeSigned
  156. if now < tsig.TimeSigned {
  157. ti = tsig.TimeSigned - now
  158. }
  159. if uint64(tsig.Fudge) < ti {
  160. return ErrTime
  161. }
  162. var h hash.Hash
  163. switch strings.ToLower(tsig.Algorithm) {
  164. case HmacMD5:
  165. h = hmac.New(md5.New, rawsecret)
  166. case HmacSHA1:
  167. h = hmac.New(sha1.New, rawsecret)
  168. case HmacSHA256:
  169. h = hmac.New(sha256.New, rawsecret)
  170. case HmacSHA512:
  171. h = hmac.New(sha512.New, rawsecret)
  172. default:
  173. return ErrKeyAlg
  174. }
  175. h.Write(buf)
  176. if !hmac.Equal(h.Sum(nil), msgMAC) {
  177. return ErrSig
  178. }
  179. return nil
  180. }
  181. // Create a wiredata buffer for the MAC calculation.
  182. func tsigBuffer(msgbuf []byte, rr *TSIG, requestMAC string, timersOnly bool) []byte {
  183. var buf []byte
  184. if rr.TimeSigned == 0 {
  185. rr.TimeSigned = uint64(time.Now().Unix())
  186. }
  187. if rr.Fudge == 0 {
  188. rr.Fudge = 300 // Standard (RFC) default.
  189. }
  190. // Replace message ID in header with original ID from TSIG
  191. binary.BigEndian.PutUint16(msgbuf[0:2], rr.OrigId)
  192. if requestMAC != "" {
  193. m := new(macWireFmt)
  194. m.MACSize = uint16(len(requestMAC) / 2)
  195. m.MAC = requestMAC
  196. buf = make([]byte, len(requestMAC)) // long enough
  197. n, _ := packMacWire(m, buf)
  198. buf = buf[:n]
  199. }
  200. tsigvar := make([]byte, DefaultMsgSize)
  201. if timersOnly {
  202. tsig := new(timerWireFmt)
  203. tsig.TimeSigned = rr.TimeSigned
  204. tsig.Fudge = rr.Fudge
  205. n, _ := packTimerWire(tsig, tsigvar)
  206. tsigvar = tsigvar[:n]
  207. } else {
  208. tsig := new(tsigWireFmt)
  209. tsig.Name = strings.ToLower(rr.Hdr.Name)
  210. tsig.Class = ClassANY
  211. tsig.Ttl = rr.Hdr.Ttl
  212. tsig.Algorithm = strings.ToLower(rr.Algorithm)
  213. tsig.TimeSigned = rr.TimeSigned
  214. tsig.Fudge = rr.Fudge
  215. tsig.Error = rr.Error
  216. tsig.OtherLen = rr.OtherLen
  217. tsig.OtherData = rr.OtherData
  218. n, _ := packTsigWire(tsig, tsigvar)
  219. tsigvar = tsigvar[:n]
  220. }
  221. if requestMAC != "" {
  222. x := append(buf, msgbuf...)
  223. buf = append(x, tsigvar...)
  224. } else {
  225. buf = append(msgbuf, tsigvar...)
  226. }
  227. return buf
  228. }
  229. // Strip the TSIG from the raw message.
  230. func stripTsig(msg []byte) ([]byte, *TSIG, error) {
  231. // Copied from msg.go's Unpack() Header, but modified.
  232. var (
  233. dh Header
  234. err error
  235. )
  236. off, tsigoff := 0, 0
  237. if dh, off, err = unpackMsgHdr(msg, off); err != nil {
  238. return nil, nil, err
  239. }
  240. if dh.Arcount == 0 {
  241. return nil, nil, ErrNoSig
  242. }
  243. // Rcode, see msg.go Unpack()
  244. if int(dh.Bits&0xF) == RcodeNotAuth {
  245. return nil, nil, ErrAuth
  246. }
  247. for i := 0; i < int(dh.Qdcount); i++ {
  248. _, off, err = unpackQuestion(msg, off)
  249. if err != nil {
  250. return nil, nil, err
  251. }
  252. }
  253. _, off, err = unpackRRslice(int(dh.Ancount), msg, off)
  254. if err != nil {
  255. return nil, nil, err
  256. }
  257. _, off, err = unpackRRslice(int(dh.Nscount), msg, off)
  258. if err != nil {
  259. return nil, nil, err
  260. }
  261. rr := new(TSIG)
  262. var extra RR
  263. for i := 0; i < int(dh.Arcount); i++ {
  264. tsigoff = off
  265. extra, off, err = UnpackRR(msg, off)
  266. if err != nil {
  267. return nil, nil, err
  268. }
  269. if extra.Header().Rrtype == TypeTSIG {
  270. rr = extra.(*TSIG)
  271. // Adjust Arcount.
  272. arcount := binary.BigEndian.Uint16(msg[10:])
  273. binary.BigEndian.PutUint16(msg[10:], arcount-1)
  274. break
  275. }
  276. }
  277. if rr == nil {
  278. return nil, nil, ErrNoSig
  279. }
  280. return msg[:tsigoff], rr, nil
  281. }
  282. // Translate the TSIG time signed into a date. There is no
  283. // need for RFC1982 calculations as this date is 48 bits.
  284. func tsigTimeToString(t uint64) string {
  285. ti := time.Unix(int64(t), 0).UTC()
  286. return ti.Format("20060102150405")
  287. }
  288. func packTsigWire(tw *tsigWireFmt, msg []byte) (int, error) {
  289. // copied from zmsg.go TSIG packing
  290. // RR_Header
  291. off, err := PackDomainName(tw.Name, msg, 0, nil, false)
  292. if err != nil {
  293. return off, err
  294. }
  295. off, err = packUint16(tw.Class, msg, off)
  296. if err != nil {
  297. return off, err
  298. }
  299. off, err = packUint32(tw.Ttl, msg, off)
  300. if err != nil {
  301. return off, err
  302. }
  303. off, err = PackDomainName(tw.Algorithm, msg, off, nil, false)
  304. if err != nil {
  305. return off, err
  306. }
  307. off, err = packUint48(tw.TimeSigned, msg, off)
  308. if err != nil {
  309. return off, err
  310. }
  311. off, err = packUint16(tw.Fudge, msg, off)
  312. if err != nil {
  313. return off, err
  314. }
  315. off, err = packUint16(tw.Error, msg, off)
  316. if err != nil {
  317. return off, err
  318. }
  319. off, err = packUint16(tw.OtherLen, msg, off)
  320. if err != nil {
  321. return off, err
  322. }
  323. off, err = packStringHex(tw.OtherData, msg, off)
  324. if err != nil {
  325. return off, err
  326. }
  327. return off, nil
  328. }
  329. func packMacWire(mw *macWireFmt, msg []byte) (int, error) {
  330. off, err := packUint16(mw.MACSize, msg, 0)
  331. if err != nil {
  332. return off, err
  333. }
  334. off, err = packStringHex(mw.MAC, msg, off)
  335. if err != nil {
  336. return off, err
  337. }
  338. return off, nil
  339. }
  340. func packTimerWire(tw *timerWireFmt, msg []byte) (int, error) {
  341. off, err := packUint48(tw.TimeSigned, msg, 0)
  342. if err != nil {
  343. return off, err
  344. }
  345. off, err = packUint16(tw.Fudge, msg, off)
  346. if err != nil {
  347. return off, err
  348. }
  349. return off, nil
  350. }