mirror of
https://github.com/coredns/coredns.git
synced 2025-11-13 07:22:16 -05:00
plugin/sign: a plugin that signs zone (#2993)
* plugin/sign: a plugin that signs zones Sign is a plugin that signs zone data (on disk). The README.md details what exactly happens to should be accurate related to the code. Signs are signed with a CSK, resigning and first time signing is all handled by *sign* plugin. Logging with a test zone looks something like this: ~~~ txt [INFO] plugin/sign: Signing "miek.nl." because open plugin/sign/testdata/db.miek.nl.signed: no such file or directory [INFO] plugin/sign: Signed "miek.nl." with key tags "59725" in 11.670985ms, saved in "plugin/sign/testdata/db.miek.nl.signed". Next: 2019-07-20T15:49:06.560Z [INFO] plugin/file: Successfully reloaded zone "miek.nl." in "plugin/sign/testdata/db.miek.nl.signed" with serial 1563636548 [INFO] plugin/sign: Signing "miek.nl." because resign was: 10m0s ago [INFO] plugin/sign: Signed "miek.nl." with key tags "59725" in 2.055895ms, saved in "plugin/sign/testdata/db.miek.nl.signed". Next: 2019-07-20T16:09:06.560Z [INFO] plugin/file: Successfully reloaded zone "miek.nl." in "plugin/sign/testdata/db.miek.nl.signed" with serial 1563637748 ~~~ Signed-off-by: Miek Gieben <miek@miek.nl> * Adjust readme and remove timestamps Signed-off-by: Miek Gieben <miek@miek.nl> * Comment on the newline Signed-off-by: Miek Gieben <miek@miek.nl> * Update plugin/sign/README.md Co-Authored-By: Michael Grosser <development@stp-ip.net>
This commit is contained in:
119
plugin/sign/keys.go
Normal file
119
plugin/sign/keys.go
Normal file
@@ -0,0 +1,119 @@
|
||||
package sign
|
||||
|
||||
import (
|
||||
"crypto"
|
||||
"crypto/ecdsa"
|
||||
"crypto/rsa"
|
||||
"fmt"
|
||||
"io/ioutil"
|
||||
"os"
|
||||
"path/filepath"
|
||||
"strconv"
|
||||
"strings"
|
||||
|
||||
"github.com/coredns/coredns/core/dnsserver"
|
||||
|
||||
"github.com/caddyserver/caddy"
|
||||
"github.com/miekg/dns"
|
||||
"golang.org/x/crypto/ed25519"
|
||||
)
|
||||
|
||||
// Pair holds DNSSEC key information, both the public and private components are stored here.
|
||||
type Pair struct {
|
||||
Public *dns.DNSKEY
|
||||
KeyTag uint16
|
||||
Private crypto.Signer
|
||||
}
|
||||
|
||||
// keyParse reads the public and private key from disk.
|
||||
func keyParse(c *caddy.Controller) ([]Pair, error) {
|
||||
if !c.NextArg() {
|
||||
return nil, c.ArgErr()
|
||||
}
|
||||
pairs := []Pair{}
|
||||
config := dnsserver.GetConfig(c)
|
||||
|
||||
switch c.Val() {
|
||||
case "file":
|
||||
ks := c.RemainingArgs()
|
||||
if len(ks) == 0 {
|
||||
return nil, c.ArgErr()
|
||||
}
|
||||
for _, k := range ks {
|
||||
base := k
|
||||
// Kmiek.nl.+013+26205.key, handle .private or without extension: Kmiek.nl.+013+26205
|
||||
if strings.HasSuffix(k, ".key") {
|
||||
base = k[:len(k)-4]
|
||||
}
|
||||
if strings.HasSuffix(k, ".private") {
|
||||
base = k[:len(k)-8]
|
||||
}
|
||||
if !filepath.IsAbs(base) && config.Root != "" {
|
||||
base = filepath.Join(config.Root, base)
|
||||
}
|
||||
|
||||
pair, err := readKeyPair(base+".key", base+".private")
|
||||
if err != nil {
|
||||
return nil, err
|
||||
}
|
||||
pairs = append(pairs, pair)
|
||||
}
|
||||
case "directory":
|
||||
return nil, fmt.Errorf("directory: not implemented")
|
||||
}
|
||||
|
||||
return pairs, nil
|
||||
}
|
||||
|
||||
func readKeyPair(public, private string) (Pair, error) {
|
||||
rk, err := os.Open(public)
|
||||
if err != nil {
|
||||
return Pair{}, err
|
||||
}
|
||||
b, err := ioutil.ReadAll(rk)
|
||||
if err != nil {
|
||||
return Pair{}, err
|
||||
}
|
||||
dnskey, err := dns.NewRR(string(b))
|
||||
if err != nil {
|
||||
return Pair{}, err
|
||||
}
|
||||
if _, ok := dnskey.(*dns.DNSKEY); !ok {
|
||||
return Pair{}, fmt.Errorf("RR in %q is not a DNSKEY: %d", public, dnskey.Header().Rrtype)
|
||||
}
|
||||
ksk := dnskey.(*dns.DNSKEY).Flags&(1<<8) == (1<<8) && dnskey.(*dns.DNSKEY).Flags&1 == 1
|
||||
if !ksk {
|
||||
return Pair{}, fmt.Errorf("DNSKEY in %q is not a CSK/KSK", public)
|
||||
}
|
||||
|
||||
rp, err := os.Open(private)
|
||||
if err != nil {
|
||||
return Pair{}, err
|
||||
}
|
||||
privkey, err := dnskey.(*dns.DNSKEY).ReadPrivateKey(rp, private)
|
||||
if err != nil {
|
||||
return Pair{}, err
|
||||
}
|
||||
switch signer := privkey.(type) {
|
||||
case *ecdsa.PrivateKey:
|
||||
return Pair{Public: dnskey.(*dns.DNSKEY), KeyTag: dnskey.(*dns.DNSKEY).KeyTag(), Private: signer}, nil
|
||||
case *ed25519.PrivateKey:
|
||||
return Pair{Public: dnskey.(*dns.DNSKEY), KeyTag: dnskey.(*dns.DNSKEY).KeyTag(), Private: signer}, nil
|
||||
case *rsa.PrivateKey:
|
||||
return Pair{Public: dnskey.(*dns.DNSKEY), KeyTag: dnskey.(*dns.DNSKEY).KeyTag(), Private: signer}, nil
|
||||
default:
|
||||
return Pair{}, fmt.Errorf("unsupported algorithm %s", signer)
|
||||
}
|
||||
}
|
||||
|
||||
// keyTag returns the key tags of the keys in ps as a formatted string.
|
||||
func keyTag(ps []Pair) string {
|
||||
if len(ps) == 0 {
|
||||
return ""
|
||||
}
|
||||
s := ""
|
||||
for _, p := range ps {
|
||||
s += strconv.Itoa(int(p.KeyTag)) + ","
|
||||
}
|
||||
return s[:len(s)-1]
|
||||
}
|
||||
Reference in New Issue
Block a user