aboutsummaryrefslogtreecommitdiff
path: root/plugin/sign/keys.go
diff options
context:
space:
mode:
Diffstat (limited to 'plugin/sign/keys.go')
-rw-r--r--plugin/sign/keys.go119
1 files changed, 119 insertions, 0 deletions
diff --git a/plugin/sign/keys.go b/plugin/sign/keys.go
new file mode 100644
index 000000000..346175be0
--- /dev/null
+++ b/plugin/sign/keys.go
@@ -0,0 +1,119 @@
+package sign
+
+import (
+ "crypto"
+ "crypto/ecdsa"
+ "crypto/rsa"
+ "fmt"
+ "io/ioutil"
+ "os"
+ "path/filepath"
+ "strconv"
+ "strings"
+
+ "github.com/coredns/coredns/core/dnsserver"
+
+ "github.com/caddyserver/caddy"
+ "github.com/miekg/dns"
+ "golang.org/x/crypto/ed25519"
+)
+
+// Pair holds DNSSEC key information, both the public and private components are stored here.
+type Pair struct {
+ Public *dns.DNSKEY
+ KeyTag uint16
+ Private crypto.Signer
+}
+
+// keyParse reads the public and private key from disk.
+func keyParse(c *caddy.Controller) ([]Pair, error) {
+ if !c.NextArg() {
+ return nil, c.ArgErr()
+ }
+ pairs := []Pair{}
+ config := dnsserver.GetConfig(c)
+
+ switch c.Val() {
+ case "file":
+ ks := c.RemainingArgs()
+ if len(ks) == 0 {
+ return nil, c.ArgErr()
+ }
+ for _, k := range ks {
+ base := k
+ // Kmiek.nl.+013+26205.key, handle .private or without extension: Kmiek.nl.+013+26205
+ if strings.HasSuffix(k, ".key") {
+ base = k[:len(k)-4]
+ }
+ if strings.HasSuffix(k, ".private") {
+ base = k[:len(k)-8]
+ }
+ if !filepath.IsAbs(base) && config.Root != "" {
+ base = filepath.Join(config.Root, base)
+ }
+
+ pair, err := readKeyPair(base+".key", base+".private")
+ if err != nil {
+ return nil, err
+ }
+ pairs = append(pairs, pair)
+ }
+ case "directory":
+ return nil, fmt.Errorf("directory: not implemented")
+ }
+
+ return pairs, nil
+}
+
+func readKeyPair(public, private string) (Pair, error) {
+ rk, err := os.Open(public)
+ if err != nil {
+ return Pair{}, err
+ }
+ b, err := ioutil.ReadAll(rk)
+ if err != nil {
+ return Pair{}, err
+ }
+ dnskey, err := dns.NewRR(string(b))
+ if err != nil {
+ return Pair{}, err
+ }
+ if _, ok := dnskey.(*dns.DNSKEY); !ok {
+ return Pair{}, fmt.Errorf("RR in %q is not a DNSKEY: %d", public, dnskey.Header().Rrtype)
+ }
+ ksk := dnskey.(*dns.DNSKEY).Flags&(1<<8) == (1<<8) && dnskey.(*dns.DNSKEY).Flags&1 == 1
+ if !ksk {
+ return Pair{}, fmt.Errorf("DNSKEY in %q is not a CSK/KSK", public)
+ }
+
+ rp, err := os.Open(private)
+ if err != nil {
+ return Pair{}, err
+ }
+ privkey, err := dnskey.(*dns.DNSKEY).ReadPrivateKey(rp, private)
+ if err != nil {
+ return Pair{}, err
+ }
+ switch signer := privkey.(type) {
+ case *ecdsa.PrivateKey:
+ return Pair{Public: dnskey.(*dns.DNSKEY), KeyTag: dnskey.(*dns.DNSKEY).KeyTag(), Private: signer}, nil
+ case *ed25519.PrivateKey:
+ return Pair{Public: dnskey.(*dns.DNSKEY), KeyTag: dnskey.(*dns.DNSKEY).KeyTag(), Private: signer}, nil
+ case *rsa.PrivateKey:
+ return Pair{Public: dnskey.(*dns.DNSKEY), KeyTag: dnskey.(*dns.DNSKEY).KeyTag(), Private: signer}, nil
+ default:
+ return Pair{}, fmt.Errorf("unsupported algorithm %s", signer)
+ }
+}
+
+// keyTag returns the key tags of the keys in ps as a formatted string.
+func keyTag(ps []Pair) string {
+ if len(ps) == 0 {
+ return ""
+ }
+ s := ""
+ for _, p := range ps {
+ s += strconv.Itoa(int(p.KeyTag)) + ","
+ }
+ return s[:len(s)-1]
+}