* plugin/sign: a plugin that signs zones Sign is a plugin that signs zone data (on disk). The README.md details what exactly happens to should be accurate related to the code. Signs are signed with a CSK, resigning and first time signing is all handled by *sign* plugin. Logging with a test zone looks something like this: ~~~ txt [INFO] plugin/sign: Signing "miek.nl." because open plugin/sign/testdata/db.miek.nl.signed: no such file or directory [INFO] plugin/sign: Signed "miek.nl." with key tags "59725" in 11.670985ms, saved in "plugin/sign/testdata/db.miek.nl.signed". Next: 2019-07-20T15:49:06.560Z [INFO] plugin/file: Successfully reloaded zone "miek.nl." in "plugin/sign/testdata/db.miek.nl.signed" with serial 1563636548 [INFO] plugin/sign: Signing "miek.nl." because resign was: 10m0s ago [INFO] plugin/sign: Signed "miek.nl." with key tags "59725" in 2.055895ms, saved in "plugin/sign/testdata/db.miek.nl.signed". Next: 2019-07-20T16:09:06.560Z [INFO] plugin/file: Successfully reloaded zone "miek.nl." in "plugin/sign/testdata/db.miek.nl.signed" with serial 1563637748 ~~~ Signed-off-by: Miek Gieben <miek@miek.nl> * Adjust readme and remove timestamps Signed-off-by: Miek Gieben <miek@miek.nl> * Comment on the newline Signed-off-by: Miek Gieben <miek@miek.nl> * Update plugin/sign/README.md Co-Authored-By: Michael Grosser <development@stp-ip.net>
119 lines
2.8 KiB
Go
119 lines
2.8 KiB
Go
package sign
|
|
|
|
import (
|
|
"crypto"
|
|
"crypto/ecdsa"
|
|
"crypto/rsa"
|
|
"fmt"
|
|
"io/ioutil"
|
|
"os"
|
|
"path/filepath"
|
|
"strconv"
|
|
"strings"
|
|
|
|
"github.com/coredns/coredns/core/dnsserver"
|
|
|
|
"github.com/caddyserver/caddy"
|
|
"github.com/miekg/dns"
|
|
"golang.org/x/crypto/ed25519"
|
|
)
|
|
|
|
// Pair holds DNSSEC key information, both the public and private components are stored here.
|
|
type Pair struct {
|
|
Public *dns.DNSKEY
|
|
KeyTag uint16
|
|
Private crypto.Signer
|
|
}
|
|
|
|
// keyParse reads the public and private key from disk.
|
|
func keyParse(c *caddy.Controller) ([]Pair, error) {
|
|
if !c.NextArg() {
|
|
return nil, c.ArgErr()
|
|
}
|
|
pairs := []Pair{}
|
|
config := dnsserver.GetConfig(c)
|
|
|
|
switch c.Val() {
|
|
case "file":
|
|
ks := c.RemainingArgs()
|
|
if len(ks) == 0 {
|
|
return nil, c.ArgErr()
|
|
}
|
|
for _, k := range ks {
|
|
base := k
|
|
// Kmiek.nl.+013+26205.key, handle .private or without extension: Kmiek.nl.+013+26205
|
|
if strings.HasSuffix(k, ".key") {
|
|
base = k[:len(k)-4]
|
|
}
|
|
if strings.HasSuffix(k, ".private") {
|
|
base = k[:len(k)-8]
|
|
}
|
|
if !filepath.IsAbs(base) && config.Root != "" {
|
|
base = filepath.Join(config.Root, base)
|
|
}
|
|
|
|
pair, err := readKeyPair(base+".key", base+".private")
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
pairs = append(pairs, pair)
|
|
}
|
|
case "directory":
|
|
return nil, fmt.Errorf("directory: not implemented")
|
|
}
|
|
|
|
return pairs, nil
|
|
}
|
|
|
|
func readKeyPair(public, private string) (Pair, error) {
|
|
rk, err := os.Open(public)
|
|
if err != nil {
|
|
return Pair{}, err
|
|
}
|
|
b, err := ioutil.ReadAll(rk)
|
|
if err != nil {
|
|
return Pair{}, err
|
|
}
|
|
dnskey, err := dns.NewRR(string(b))
|
|
if err != nil {
|
|
return Pair{}, err
|
|
}
|
|
if _, ok := dnskey.(*dns.DNSKEY); !ok {
|
|
return Pair{}, fmt.Errorf("RR in %q is not a DNSKEY: %d", public, dnskey.Header().Rrtype)
|
|
}
|
|
ksk := dnskey.(*dns.DNSKEY).Flags&(1<<8) == (1<<8) && dnskey.(*dns.DNSKEY).Flags&1 == 1
|
|
if !ksk {
|
|
return Pair{}, fmt.Errorf("DNSKEY in %q is not a CSK/KSK", public)
|
|
}
|
|
|
|
rp, err := os.Open(private)
|
|
if err != nil {
|
|
return Pair{}, err
|
|
}
|
|
privkey, err := dnskey.(*dns.DNSKEY).ReadPrivateKey(rp, private)
|
|
if err != nil {
|
|
return Pair{}, err
|
|
}
|
|
switch signer := privkey.(type) {
|
|
case *ecdsa.PrivateKey:
|
|
return Pair{Public: dnskey.(*dns.DNSKEY), KeyTag: dnskey.(*dns.DNSKEY).KeyTag(), Private: signer}, nil
|
|
case *ed25519.PrivateKey:
|
|
return Pair{Public: dnskey.(*dns.DNSKEY), KeyTag: dnskey.(*dns.DNSKEY).KeyTag(), Private: signer}, nil
|
|
case *rsa.PrivateKey:
|
|
return Pair{Public: dnskey.(*dns.DNSKEY), KeyTag: dnskey.(*dns.DNSKEY).KeyTag(), Private: signer}, nil
|
|
default:
|
|
return Pair{}, fmt.Errorf("unsupported algorithm %s", signer)
|
|
}
|
|
}
|
|
|
|
// keyTag returns the key tags of the keys in ps as a formatted string.
|
|
func keyTag(ps []Pair) string {
|
|
if len(ps) == 0 {
|
|
return ""
|
|
}
|
|
s := ""
|
|
for _, p := range ps {
|
|
s += strconv.Itoa(int(p.KeyTag)) + ","
|
|
}
|
|
return s[:len(s)-1]
|
|
}
|