BIND 10 #931: Implement signing part in b10-auth
BIND 10 Development
do-not-reply at isc.org
Fri May 20 12:27:40 UTC 2011
#931: Implement signing part in b10-auth
-------------------------------------+-------------------------------------
Reporter: | Owner: jinmei
vorner | Status: reviewing
Type: task | Milestone:
Priority: major | Sprint-20110531
Component: | Resolution:
Unclassified | Sensitive: 0
Keywords: | Sub-Project: DNS
Defect Severity: N/A | Estimated Difficulty: 0.0
Feature Depending on Ticket: tsig | Total Hours: 0
Add Hours to Ticket: 0 |
Internal?: 0 |
-------------------------------------+-------------------------------------
Changes (by vorner):
* owner: vorner => jinmei
Comment:
Hello
As we are no longer in hurry, I tried to address everything (if I missed
something, it's probably I overlooked it). The new code is in trac931_2,
as I did some history rewrites. The current changes are:
* It is the same up to a8307030f7af9fc88e3e66b6eefcc89f6b6e15c5.
* The fix for sending correct module name in addRemoteConfig got a test
(actually, it's not a new test, but extended the original). It's now
directly in the commit with the fix, but except adding the check, the
commit is the same.
* I've thrown out my fixes and included yours (I didn't throw out the
size_t → uint32_t change, but I have no idea how to test it, when it
didn't produce any bugs, only looked completely wrong).
* I added test for the double-read bug.
* Added a test for the signature and invalid request (using unknown
opcode).
* Then there's a merge from master, it brings another parameter for the
addRemoteConfig function (the original #931 was based on older version of
#925).
* The addRemoteConfig got some more attention, I split part of it into
separate function and added some spaces and comments, but I don't know if
there's a way to clarify it more.
* Implemented the part with auth server not referring directly to the
global keyring variable.
I hope it looks better now.
Regarding the changelog, the sha1-hmac is there for the exact reason that
it's a different format than dig, so they can see it. I think confusion
from the changelog would be smaller than confusion when the software
rejects their keys.
So, what about this?
{{{
Authoritative server can now sign the answers using TSIG
(configured in tsig_keys/keys, list of strings like
"name:<base64-secret>:sha1-hmac"). It doesn't use them for
ACL yet, only verifies them and signs if the request is signed.
}}}
Thanks
--
Ticket URL: <http://bind10.isc.org/ticket/931#comment:12>
BIND 10 Development <http://bind10.isc.org>
BIND 10 Development
More information about the bind10-tickets
mailing list