mirror of
				https://github.com/coredns/coredns.git
				synced 2025-10-31 10:13:14 -04:00 
			
		
		
		
	kubernetes: never respond with NXDOMAIN for authority label (#2769)
* kubernetes: never respond with NXDOMAIN for authority label Return a nodata response when trying to resolve the authority's label for a record type that doesn't match the record type of the authority. This guards against poisoning the authority record by requesting the wrong record type for the authority label. For instance, given an authoritative resolver that uses subdomain delegation for Kubernetes services of a cluster that's configured to use IPv4, the parent may be poisoned by querying it for the authority label of the cluster subdomain with a AAAA record type, which would otherwise (i.e. without this change) return an NXDOMAIN. That is, given cluster.example.com NS 10800 ns.dns.cluster.example.com ns.dns.cluster.example.com A 10800 10.0.1.2 The parent may be poisoned for the SOA TTL by querying it for a AAAA record of ns.dns.cluster.example.com, causing the parent to fail delegate properly until the SOA TTL lapses. * kubernetes: add tests for authority queries
This commit is contained in:
		
				
					committed by
					
						 Chris O'Haver
						Chris O'Haver
					
				
			
			
				
	
			
			
			
						parent
						
							b4485b48d9
						
					
				
				
					commit
					e178291ed6
				
			| @@ -112,10 +112,18 @@ func (k *Kubernetes) Services(ctx context.Context, state request.Request, exact | |||||||
| 		return []msg.Service{svc}, nil | 		return []msg.Service{svc}, nil | ||||||
| 	} | 	} | ||||||
|  |  | ||||||
| 	if state.QType() == dns.TypeA && isDefaultNS(state.Name(), state.Zone) { | 	if isDefaultNS(state.Name(), state.Zone) { | ||||||
|  | 		ns := k.nsAddr() | ||||||
|  |  | ||||||
|  | 		isIPv4 := ns.A.To4() != nil | ||||||
|  |  | ||||||
|  | 		if !((state.QType() == dns.TypeA && isIPv4) || (state.QType() == dns.TypeAAAA && !isIPv4)) { | ||||||
|  | 			// NODATA | ||||||
|  | 			return nil, nil | ||||||
|  | 		} | ||||||
|  |  | ||||||
| 		// If this is an A request for "ns.dns", respond with a "fake" record for coredns. | 		// If this is an A request for "ns.dns", respond with a "fake" record for coredns. | ||||||
| 		// SOA records always use this hardcoded name | 		// SOA records always use this hardcoded name | ||||||
| 		ns := k.nsAddr() |  | ||||||
| 		svc := msg.Service{Host: ns.A.String(), Key: msg.Path(state.QName(), coredns), TTL: k.ttl} | 		svc := msg.Service{Host: ns.A.String(), Key: msg.Path(state.QName(), coredns), TTL: k.ttl} | ||||||
| 		return []msg.Service{svc}, nil | 		return []msg.Service{svc}, nil | ||||||
| 	} | 	} | ||||||
|   | |||||||
| @@ -2,6 +2,7 @@ package kubernetes | |||||||
|  |  | ||||||
| import ( | import ( | ||||||
| 	"context" | 	"context" | ||||||
|  | 	"net" | ||||||
| 	"testing" | 	"testing" | ||||||
|  |  | ||||||
| 	"github.com/coredns/coredns/plugin" | 	"github.com/coredns/coredns/plugin" | ||||||
| @@ -254,7 +255,6 @@ func (APIConnServiceTest) GetNamespaceByName(name string) (*api.Namespace, error | |||||||
| } | } | ||||||
|  |  | ||||||
| func TestServices(t *testing.T) { | func TestServices(t *testing.T) { | ||||||
|  |  | ||||||
| 	k := New([]string{"interwebs.test."}) | 	k := New([]string{"interwebs.test."}) | ||||||
| 	k.APIConn = &APIConnServiceTest{} | 	k.APIConn = &APIConnServiceTest{} | ||||||
|  |  | ||||||
| @@ -301,6 +301,61 @@ func TestServices(t *testing.T) { | |||||||
| 	} | 	} | ||||||
| } | } | ||||||
|  |  | ||||||
|  | func TestServicesAuthority(t *testing.T) { | ||||||
|  | 	k := New([]string{"interwebs.test."}) | ||||||
|  | 	k.APIConn = &APIConnServiceTest{} | ||||||
|  |  | ||||||
|  | 	type svcAns struct { | ||||||
|  | 		host string | ||||||
|  | 		key  string | ||||||
|  | 	} | ||||||
|  | 	type svcTest struct { | ||||||
|  | 		interfaceAddrs func() net.IP | ||||||
|  | 		qname          string | ||||||
|  | 		qtype          uint16 | ||||||
|  | 		answer         *svcAns | ||||||
|  | 	} | ||||||
|  | 	tests := []svcTest{ | ||||||
|  | 		{interfaceAddrs: func() net.IP { return net.ParseIP("127.0.0.1") }, qname: "ns.dns.interwebs.test.", qtype: dns.TypeA, answer: &svcAns{host: "127.0.0.1", key: "/" + coredns + "/test/interwebs/dns/ns"}}, | ||||||
|  | 		{interfaceAddrs: func() net.IP { return net.ParseIP("127.0.0.1") }, qname: "ns.dns.interwebs.test.", qtype: dns.TypeAAAA}, | ||||||
|  | 		{interfaceAddrs: func() net.IP { return net.ParseIP("::1") }, qname: "ns.dns.interwebs.test.", qtype: dns.TypeA}, | ||||||
|  | 		{interfaceAddrs: func() net.IP { return net.ParseIP("::1") }, qname: "ns.dns.interwebs.test.", qtype: dns.TypeAAAA, answer: &svcAns{host: "::1", key: "/" + coredns + "/test/interwebs/dns/ns"}}, | ||||||
|  | 	} | ||||||
|  |  | ||||||
|  | 	for i, test := range tests { | ||||||
|  | 		k.interfaceAddrsFunc = test.interfaceAddrs | ||||||
|  |  | ||||||
|  | 		state := request.Request{ | ||||||
|  | 			Req:  &dns.Msg{Question: []dns.Question{{Name: test.qname, Qtype: test.qtype}}}, | ||||||
|  | 			Zone: "interwebs.test.", // must match from k.Zones[0] | ||||||
|  | 		} | ||||||
|  | 		svcs, e := k.Services(context.TODO(), state, false, plugin.Options{}) | ||||||
|  | 		if e != nil { | ||||||
|  | 			t.Errorf("Test %d: got error '%v'", i, e) | ||||||
|  | 			continue | ||||||
|  | 		} | ||||||
|  | 		if test.answer != nil && len(svcs) != 1 { | ||||||
|  | 			t.Errorf("Test %d, expected 1 answer, got %v", i, len(svcs)) | ||||||
|  | 			continue | ||||||
|  | 		} | ||||||
|  | 		if test.answer == nil && len(svcs) != 0 { | ||||||
|  | 			t.Errorf("Test %d, expected no answer, got %v", i, len(svcs)) | ||||||
|  | 			continue | ||||||
|  | 		} | ||||||
|  |  | ||||||
|  | 		if test.answer == nil && len(svcs) == 0 { | ||||||
|  | 			continue | ||||||
|  | 		} | ||||||
|  |  | ||||||
|  | 		if test.answer.host != svcs[0].Host { | ||||||
|  | 			t.Errorf("Test %d, expected host '%v', got '%v'", i, test.answer.host, svcs[0].Host) | ||||||
|  | 		} | ||||||
|  | 		if test.answer.key != svcs[0].Key { | ||||||
|  | 			t.Errorf("Test %d, expected key '%v', got '%v'", i, test.answer.key, svcs[0].Key) | ||||||
|  | 		} | ||||||
|  | 	} | ||||||
|  | } | ||||||
|  |  | ||||||
| func TestServiceFQDN(t *testing.T) { | func TestServiceFQDN(t *testing.T) { | ||||||
| 	fqdn := serviceFQDN( | 	fqdn := serviceFQDN( | ||||||
| 		&object.Service{ | 		&object.Service{ | ||||||
|   | |||||||
		Reference in New Issue
	
	Block a user