2 Unix SMB/CIFS implementation.
4 DNS server handler for update requests
6 Copyright (C) 2010 Kai Blin <kai@samba.org>
8 This program is free software; you can redistribute it and/or modify
9 it under the terms of the GNU General Public License as published by
10 the Free Software Foundation; either version 3 of the License, or
11 (at your option) any later version.
13 This program is distributed in the hope that it will be useful,
14 but WITHOUT ANY WARRANTY; without even the implied warranty of
15 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
16 GNU General Public License for more details.
18 You should have received a copy of the GNU General Public License
19 along with this program. If not, see <http://www.gnu.org/licenses/>.
23 #include "libcli/util/ntstatus.h"
24 #include "librpc/ndr/libndr.h"
25 #include "librpc/gen_ndr/ndr_dns.h"
26 #include "librpc/gen_ndr/ndr_dnsp.h"
28 #include "dsdb/samdb/samdb.h"
29 #include "dsdb/common/util.h"
30 #include "dns_server/dns_server.h"
32 static WERROR
check_prerequsites(struct dns_server
*dns
,
34 const struct dns_name_packet
*in
,
35 const struct dns_res_rec
*prereqs
, uint16_t count
)
37 const struct dns_name_question
*zone
;
38 size_t host_part_len
= 0;
43 for (i
= 0; i
< count
; i
++) {
44 const struct dns_res_rec
*r
= &prereqs
[i
];
48 return DNS_ERR(FORMAT_ERROR
);
50 match
= dns_name_match(zone
->name
, r
->name
, &host_part_len
);
52 /* TODO: check if we need to echo all prereqs if the
54 return DNS_ERR(NOTZONE
);
56 if (r
->rr_class
== DNS_QCLASS_ANY
) {
58 return DNS_ERR(FORMAT_ERROR
);
60 if (r
->rr_type
== DNS_QTYPE_ALL
) {
61 /* TODO: Check if zone has at least one RR */
62 return DNS_ERR(NAME_ERROR
);
64 /* TODO: Check if RR exists of the specified type */
65 return DNS_ERR(NXRRSET
);
68 if (r
->rr_class
== DNS_QCLASS_NONE
) {
70 return DNS_ERR(FORMAT_ERROR
);
72 if (r
->rr_type
== DNS_QTYPE_ALL
) {
73 /* TODO: Return this error if the given name exits in this zone */
74 return DNS_ERR(YXDOMAIN
);
76 /* TODO: Return error if there's an RRset of this type in the zone */
77 return DNS_ERR(YXRRSET
);
80 if (r
->rr_class
== zone
->question_class
) {
81 /* Check if there's a RR with this */
82 return DNS_ERR(NOT_IMPLEMENTED
);
84 return DNS_ERR(FORMAT_ERROR
);
92 static WERROR
update_prescan(const struct dns_name_question
*zone
,
93 const struct dns_res_rec
*updates
, uint16_t count
)
95 const struct dns_res_rec
*r
;
100 for (i
= 0; i
< count
; i
++) {
102 match
= dns_name_match(zone
->name
, r
->name
, &host_part_len
);
104 return DNS_ERR(NOTZONE
);
106 if (zone
->question_class
== r
->rr_class
) {
107 /*TODO: also check for AXFR,MAILA,MAILB */
108 if (r
->rr_type
== DNS_QTYPE_ALL
) {
109 return DNS_ERR(FORMAT_ERROR
);
111 } else if (r
->rr_class
== DNS_QCLASS_ANY
) {
112 if (r
->ttl
!= 0 || r
->length
!= 0) {
113 return DNS_ERR(FORMAT_ERROR
);
115 } else if (r
->rr_class
== DNS_QCLASS_NONE
) {
116 if (r
->ttl
!= 0 || r
->rr_type
== DNS_QTYPE_ALL
) {
117 return DNS_ERR(FORMAT_ERROR
);
120 return DNS_ERR(FORMAT_ERROR
);
126 WERROR
dns_server_process_update(struct dns_server
*dns
,
128 struct dns_name_packet
*in
,
129 const struct dns_res_rec
*prereqs
, uint16_t prereq_count
,
130 struct dns_res_rec
**updates
, uint16_t *update_count
,
131 struct dns_res_rec
**additional
, uint16_t *arcount
)
133 struct dns_name_question
*zone
;
134 const struct dns_server_zone
*z
;
135 size_t host_part_len
= 0;
136 WERROR werror
= DNS_ERR(NOT_IMPLEMENTED
);
137 bool update_allowed
= false;
139 if (in
->qdcount
!= 1) {
140 return DNS_ERR(FORMAT_ERROR
);
143 zone
= in
->questions
;
145 if (zone
->question_type
!= DNS_QTYPE_SOA
) {
146 return DNS_ERR(FORMAT_ERROR
);
149 DEBUG(0, ("Got a dns update request.\n"));
151 for (z
= dns
->zones
; z
!= NULL
; z
= z
->next
) {
154 match
= dns_name_match(z
->name
, zone
->name
, &host_part_len
);
161 return DNS_ERR(NOTAUTH
);
164 if (host_part_len
!= 0) {
165 /* TODO: We need to delegate this one */
166 return DNS_ERR(NOT_IMPLEMENTED
);
169 werror
= check_prerequsites(dns
, mem_ctx
, in
, prereqs
, prereq_count
);
170 W_ERROR_NOT_OK_RETURN(werror
);
172 /* TODO: Check if update is allowed, we probably want "always",
173 * key-based GSSAPI, key-based bind-style TSIG and "never" as
174 * smb.conf options. */
175 if (!update_allowed
) {
176 return DNS_ERR(REFUSED
);
179 werror
= update_prescan(in
->questions
, *updates
, *update_count
);
180 W_ERROR_NOT_OK_RETURN(werror
);