happyDomain/services/tlsa.go
Pierre-Olivier Mercier c0a3ea2d4c
All checks were successful
continuous-integration/drone/push Build is passing
This is happyDomain now
2022-01-18 10:16:32 +01:00

192 lines
5.1 KiB
Go

// Copyright or © or Copr. happyDNS (2020)
//
// contact@happydomain.org
//
// This software is a computer program whose purpose is to provide a modern
// interface to interact with DNS systems.
//
// This software is governed by the CeCILL license under French law and abiding
// by the rules of distribution of free software. You can use, modify and/or
// redistribute the software under the terms of the CeCILL license as
// circulated by CEA, CNRS and INRIA at the following URL
// "http://www.cecill.info".
//
// As a counterpart to the access to the source code and rights to copy, modify
// and redistribute granted by the license, users are provided only with a
// limited warranty and the software's author, the holder of the economic
// rights, and the successive licensors have only limited liability.
//
// In this respect, the user's attention is drawn to the risks associated with
// loading, using, modifying and/or developing or reproducing the software by
// the user in light of its specific status of free software, that may mean
// that it is complicated to manipulate, and that also therefore means that it
// is reserved for developers and experienced professionals having in-depth
// computer knowledge. Users are therefore encouraged to load and test the
// software's suitability as regards their requirements in conditions enabling
// the security of their systems and/or data to be ensured and, more generally,
// to use and operate it in the same conditions as regards security.
//
// The fact that you are presently reading this means that you have had
// knowledge of the CeCILL license and that you accept its terms.
package svcs
import (
"bytes"
"encoding/hex"
"fmt"
"regexp"
"strconv"
"github.com/miekg/dns"
"git.happydns.org/happydomain/model"
"git.happydns.org/happydomain/utils"
)
type TLSA struct {
Proto string `json:"proto" happydomain:"label=Protocol,description=Protocol used to establish the connection.,choices=tcp;udp"`
Port uint16 `json:"port" happydomain:"label=Service Port,description=Port number where people will establish the connection."`
CertUsage uint8 `json:"certusage"`
Selector uint8 `json:"selector"`
MatchingType uint8 `json:"matchingtype"`
Certificate happydns.HexaString `json:"certificate"`
}
type TLSAs struct {
TLSA []*TLSA `json:"tlsa,omitempty"`
}
func (ss *TLSAs) GetNbResources() int {
return len(ss.TLSA)
}
func (ss *TLSAs) GenComment(origin string) string {
mapProto := map[string][]uint16{}
protoloop:
for _, tlsa := range ss.TLSA {
for _, port := range mapProto[tlsa.Proto] {
if port == tlsa.Port {
continue protoloop
}
}
mapProto[tlsa.Proto] = append(mapProto[tlsa.Proto], tlsa.Port)
}
var buffer bytes.Buffer
first := true
for proto, ports := range mapProto {
if !first {
buffer.WriteString(" - ")
} else {
first = !first
}
buffer.WriteString(proto)
buffer.WriteString(" (")
firstport := true
for _, port := range ports {
if !firstport {
buffer.WriteString(", ")
} else {
firstport = !firstport
}
buffer.WriteString(strconv.Itoa(int(port)))
}
buffer.WriteString(")")
}
return buffer.String()
}
func (ss *TLSAs) GenRRs(domain string, ttl uint32, origin string) (rrs []dns.RR) {
for _, s := range ss.TLSA {
if len(s.Certificate) > 0 {
rrs = append(rrs, &dns.TLSA{
Hdr: dns.RR_Header{
Name: utils.DomainJoin(fmt.Sprintf("_%d._%s", s.Port, s.Proto), domain),
Rrtype: dns.TypeTLSA,
Class: dns.ClassINET,
Ttl: ttl,
},
Usage: s.CertUsage,
Selector: s.Selector,
MatchingType: s.MatchingType,
Certificate: hex.EncodeToString(s.Certificate),
})
}
}
return
}
var (
TLSA_DOMAIN = regexp.MustCompile(`^_([0-9]+)\._(tcp|udp)\.(.*)$`)
)
func tlsa_analyze(a *Analyzer) (err error) {
pool := map[string]*TLSAs{}
for _, record := range a.SearchRR(AnalyzerRecordFilter{Type: dns.TypeTLSA}) {
subdomains := TLSA_DOMAIN.FindStringSubmatch(record.Header().Name)
if tlsa, ok := record.(*dns.TLSA); len(subdomains) == 4 && ok {
var port uint64
port, err = strconv.ParseUint(subdomains[1], 10, 16)
var cert []byte
cert, err = hex.DecodeString(tlsa.Certificate)
if err != nil {
return
}
if _, ok := pool[subdomains[3]]; !ok {
pool[subdomains[3]] = &TLSAs{}
}
pool[subdomains[3]].TLSA = append(
pool[subdomains[3]].TLSA,
&TLSA{
Port: uint16(port),
Proto: subdomains[2],
CertUsage: tlsa.Usage,
Selector: tlsa.Selector,
MatchingType: tlsa.MatchingType,
Certificate: cert,
},
)
err = a.UseRR(
record,
subdomains[3],
pool[subdomains[3]],
)
if err != nil {
return
}
}
}
return nil
}
func init() {
RegisterService(
func() happydns.Service {
return &TLSAs{}
},
tlsa_analyze,
ServiceInfos{
Name: "TLSA records",
Description: "Publish TLS certificates exposed by your services.",
Categories: []string{
"tls",
},
Restrictions: ServiceRestrictions{
NearAlone: true,
Single: true,
NeedTypes: []uint16{
dns.TypeTLSA,
},
},
},
100,
)
}