mirror of
				https://github.com/coredns/coredns.git
				synced 2025-10-31 10:13:14 -04:00 
			
		
		
		
	This adds an online dnssec middleware. The middleware will sign responses on the fly. Negative responses are signed with NSEC black lies.
		
			
				
	
	
		
			54 lines
		
	
	
		
			1.1 KiB
		
	
	
	
		
			Go
		
	
	
	
	
	
			
		
		
	
	
			54 lines
		
	
	
		
			1.1 KiB
		
	
	
	
		
			Go
		
	
	
	
	
	
| package dnssec
 | |
| 
 | |
| import "github.com/miekg/dns"
 | |
| 
 | |
| // newRRSIG return a new RRSIG, with all fields filled out, except the signed data.
 | |
| func (k *DNSKEY) NewRRSIG(signerName string, ttl, incep, expir uint32) *dns.RRSIG {
 | |
| 	sig := new(dns.RRSIG)
 | |
| 
 | |
| 	sig.Hdr.Rrtype = dns.TypeRRSIG
 | |
| 	sig.Algorithm = k.K.Algorithm
 | |
| 	sig.KeyTag = k.keytag
 | |
| 	sig.SignerName = signerName
 | |
| 	sig.Hdr.Ttl = ttl
 | |
| 	sig.OrigTtl = origTtl
 | |
| 
 | |
| 	sig.Inception = incep
 | |
| 	sig.Expiration = expir
 | |
| 
 | |
| 	return sig
 | |
| }
 | |
| 
 | |
| type rrset struct {
 | |
| 	qname string
 | |
| 	qtype uint16
 | |
| }
 | |
| 
 | |
| // rrSets returns rrs as a map of RRsets. It skips RRSIG and OPT records as those don't need to be signed.
 | |
| func rrSets(rrs []dns.RR) map[rrset][]dns.RR {
 | |
| 	m := make(map[rrset][]dns.RR)
 | |
| 
 | |
| 	for _, r := range rrs {
 | |
| 		if r.Header().Rrtype == dns.TypeRRSIG || r.Header().Rrtype == dns.TypeOPT {
 | |
| 			continue
 | |
| 		}
 | |
| 
 | |
| 		if s, ok := m[rrset{r.Header().Name, r.Header().Rrtype}]; ok {
 | |
| 			s = append(s, r)
 | |
| 			m[rrset{r.Header().Name, r.Header().Rrtype}] = s
 | |
| 			continue
 | |
| 		}
 | |
| 
 | |
| 		s := make([]dns.RR, 1, 3)
 | |
| 		s[0] = r
 | |
| 		m[rrset{r.Header().Name, r.Header().Rrtype}] = s
 | |
| 	}
 | |
| 
 | |
| 	if len(m) > 0 {
 | |
| 		return m
 | |
| 	}
 | |
| 	return nil
 | |
| }
 | |
| 
 | |
| const origTtl = 3600
 |