From 8b582baffc0b4c3be982a7d3279002af3b037752 Mon Sep 17 00:00:00 2001 From: Jorge Aparicio Date: Thu, 25 Apr 2024 17:14:05 +0200 Subject: [PATCH] resolver: test DO bit handling this corresponds to section 3.2.1 of RFC4035 --- .../src/resolver/dnssec/rfc4035/section_3.rs | 1 + .../dnssec/rfc4035/section_3/section_3_2.rs | 126 ++++++++++++++++++ 2 files changed, 127 insertions(+) create mode 100644 packages/conformance-tests/src/resolver/dnssec/rfc4035/section_3/section_3_2.rs diff --git a/packages/conformance-tests/src/resolver/dnssec/rfc4035/section_3.rs b/packages/conformance-tests/src/resolver/dnssec/rfc4035/section_3.rs index 137bed61..44662807 100644 --- a/packages/conformance-tests/src/resolver/dnssec/rfc4035/section_3.rs +++ b/packages/conformance-tests/src/resolver/dnssec/rfc4035/section_3.rs @@ -1 +1,2 @@ mod section_3_1; +mod section_3_2; diff --git a/packages/conformance-tests/src/resolver/dnssec/rfc4035/section_3/section_3_2.rs b/packages/conformance-tests/src/resolver/dnssec/rfc4035/section_3/section_3_2.rs new file mode 100644 index 00000000..f7c0f0df --- /dev/null +++ b/packages/conformance-tests/src/resolver/dnssec/rfc4035/section_3/section_3_2.rs @@ -0,0 +1,126 @@ +use dns_test::{ + client::{Client, DigSettings}, + name_server::NameServer, + record::{Record, RecordType}, + tshark::{Capture, Direction}, + zone_file::Root, + Network, Resolver, Result, FQDN, +}; + +#[test] +#[ignore] +fn do_bit_not_set_in_request() -> Result<()> { + let network = &Network::new()?; + let ns = NameServer::new(&dns_test::PEER, FQDN::ROOT, network)? + .sign()? + .start()?; + let resolver = Resolver::new(network, Root::new(ns.fqdn().clone(), ns.ipv4_addr())) + .start(&dns_test::SUBJECT)?; + + let mut tshark = resolver.eavesdrop()?; + + let client = Client::new(network)?; + let settings = *DigSettings::default().recurse(); + let ans = client.dig(settings, resolver.ipv4_addr(), RecordType::SOA, &FQDN::ROOT)?; + + // "the name server side MUST strip any authenticating DNSSEC RRs from the response" + let [answer] = ans.answer.try_into().unwrap(); + + assert!(matches!(answer, Record::SOA(_))); + + tshark.wait_for_capture()?; + + let captures = tshark.terminate()?; + + let ns_addr = ns.ipv4_addr(); + for Capture { message, direction } in captures { + if let Direction::Outgoing { destination } = direction { + if destination == client.ipv4_addr() { + continue; + } + + // sanity check + assert_eq!(ns_addr, destination); + + // "The resolver side of a security-aware recursive name server MUST set the DO bit + // when sending requests" + if destination == ns_addr { + assert_eq!(Some(true), message.is_do_bit_set()); + } + } + } + + Ok(()) +} + +#[test] +fn if_do_bit_not_set_in_request_then_requested_dnssec_record_is_not_stripped() -> Result<()> { + let network = &Network::new()?; + let ns = NameServer::new(&dns_test::PEER, FQDN::ROOT, network)? + .sign()? + .start()?; + let resolver = Resolver::new(network, Root::new(ns.fqdn().clone(), ns.ipv4_addr())) + .start(&dns_test::SUBJECT)?; + + let client = Client::new(network)?; + let settings = *DigSettings::default().recurse(); + let ans = client.dig( + settings, + resolver.ipv4_addr(), + RecordType::DNSKEY, + &FQDN::ROOT, + )?; + + // "MUST NOT strip any DNSSEC RR types that the initiating query explicitly requested" + for record in &ans.answer { + assert!(matches!(record, Record::DNSKEY(_))) + } + + Ok(()) +} + +#[test] +#[ignore] +fn do_bit_set_in_request() -> Result<()> { + let network = &Network::new()?; + let ns = NameServer::new(&dns_test::PEER, FQDN::ROOT, network)? + .sign()? + .start()?; + let resolver = Resolver::new(network, Root::new(ns.fqdn().clone(), ns.ipv4_addr())) + .start(&dns_test::SUBJECT)?; + + let mut tshark = resolver.eavesdrop()?; + + let client = Client::new(network)?; + let settings = *DigSettings::default().dnssec().recurse(); + let ans = client.dig(settings, resolver.ipv4_addr(), RecordType::SOA, &FQDN::ROOT)?; + + let [answer, rrsig] = ans.answer.try_into().unwrap(); + + assert!(matches!(answer, Record::SOA(_))); + assert!(matches!(rrsig, Record::RRSIG(_))); + + tshark.wait_for_capture()?; + + let captures = tshark.terminate()?; + + let ns_addr = ns.ipv4_addr(); + for Capture { message, direction } in captures { + if let Direction::Outgoing { destination } = direction { + if destination == client.ipv4_addr() { + continue; + } + + // sanity check + assert_eq!(ns_addr, destination); + + // "The resolver side of a security-aware recursive name server MUST set the DO bit + // when sending requests" + if destination == ns_addr { + assert_eq!(Some(true), message.is_do_bit_set()); + } + } + } + + Ok(()) +}