All Downloads are FREE. Search and download functionalities are using the official Maven repository.

org.xbill.DNS.TSIG Maven / Gradle / Ivy

There is a newer version: 3.6.2_1
Show newest version
// SPDX-License-Identifier: BSD-2-Clause
// Copyright (c) 1999-2004 Brian Wellington ([email protected])

package org.xbill.DNS;

import java.security.GeneralSecurityException;
import java.time.Clock;
import java.time.Duration;
import java.time.Instant;
import java.util.Arrays;
import java.util.Collections;
import java.util.HashMap;
import java.util.Map;
import java.util.Objects;
import javax.crypto.Mac;
import javax.crypto.SecretKey;
import javax.crypto.spec.SecretKeySpec;
import lombok.extern.slf4j.Slf4j;
import org.xbill.DNS.utils.base64;
import org.xbill.DNS.utils.hexdump;

/**
 * Transaction signature handling. This class generates and verifies TSIG records on messages, which
 * provide transaction security.
 *
 * @see TSIGRecord
 * @author Brian Wellington
 */
@Slf4j
public class TSIG {
  // https://www.iana.org/assignments/tsig-algorithm-names/tsig-algorithm-names.xml

  /** The domain name representing the gss-tsig algorithm. */
  public static final Name GSS_TSIG = Name.fromConstantString("gss-tsig.");

  /** The domain name representing the HMAC-MD5 algorithm. */
  public static final Name HMAC_MD5 = Name.fromConstantString("HMAC-MD5.SIG-ALG.REG.INT.");

  /**
   * The domain name representing the HMAC-MD5 algorithm.
   *
   * @deprecated use {@link #HMAC_MD5}
   */
  @Deprecated public static final Name HMAC = HMAC_MD5;

  /** The domain name representing the HMAC-SHA1 algorithm. */
  public static final Name HMAC_SHA1 = Name.fromConstantString("hmac-sha1.");

  /** The domain name representing the HMAC-SHA224 algorithm. */
  public static final Name HMAC_SHA224 = Name.fromConstantString("hmac-sha224.");

  /** The domain name representing the HMAC-SHA256 algorithm. */
  public static final Name HMAC_SHA256 = Name.fromConstantString("hmac-sha256.");

  /** The domain name representing the HMAC-SHA384 algorithm. */
  public static final Name HMAC_SHA384 = Name.fromConstantString("hmac-sha384.");

  /** The domain name representing the HMAC-SHA512 algorithm. */
  public static final Name HMAC_SHA512 = Name.fromConstantString("hmac-sha512.");

  private static final Map algMap;

  static {
    Map out = new HashMap<>();
    out.put(HMAC_MD5, "HmacMD5");
    out.put(HMAC_SHA1, "HmacSHA1");
    out.put(HMAC_SHA224, "HmacSHA224");
    out.put(HMAC_SHA256, "HmacSHA256");
    out.put(HMAC_SHA384, "HmacSHA384");
    out.put(HMAC_SHA512, "HmacSHA512");
    algMap = Collections.unmodifiableMap(out);
  }

  public static Name algorithmToName(String alg) {
    for (Map.Entry entry : algMap.entrySet()) {
      if (alg.equalsIgnoreCase(entry.getValue())) {
        return entry.getKey();
      }
    }
    throw new IllegalArgumentException("Unknown algorithm: " + alg);
  }

  public static String nameToAlgorithm(Name name) {
    String alg = algMap.get(name);
    if (alg != null) {
      return alg;
    }
    throw new IllegalArgumentException("Unknown algorithm: " + name);
  }

  /** The default fudge value for outgoing packets. Can be overridden by the tsigfudge option. */
  public static final Duration FUDGE = Duration.ofSeconds(300);

  private final Name alg;
  private final Clock clock;
  private final Name name;
  private final SecretKey macKey;
  private final String macAlgorithm;
  private final Mac sharedHmac;

  /**
   * Verifies the data (computes the secure hash and compares it to the input)
   *
   * @param expected The expected (locally calculated) signature
   * @param signature The signature to compare against
   * @return true if the signature matches, false otherwise
   */
  private static boolean verify(byte[] expected, byte[] signature) {
    if (signature.length < expected.length) {
      byte[] truncated = new byte[signature.length];
      System.arraycopy(expected, 0, truncated, 0, truncated.length);
      expected = truncated;
    }
    return Arrays.equals(signature, expected);
  }

  private Mac initHmac() {
    if (sharedHmac != null) {
      try {
        return (Mac) sharedHmac.clone();
      } catch (CloneNotSupportedException e) {
        sharedHmac.reset();
        return sharedHmac;
      }
    }

    try {
      Mac mac = Mac.getInstance(macAlgorithm);
      mac.init(macKey);
      return mac;
    } catch (GeneralSecurityException ex) {
      throw new IllegalArgumentException("Caught security exception setting up HMAC.", ex);
    }
  }

  /**
   * Creates a new TSIG object, which can be used to sign or verify a message.
   *
   * @param name The name of the shared key.
   * @param key The shared key's data represented as a base64 encoded string.
   * @throws IllegalArgumentException The key name is an invalid name
   * @throws IllegalArgumentException The key data is improperly encoded
   * @throws NullPointerException key is null
   * @since 3.2
   */
  public TSIG(Name algorithm, Name name, String key) {
    this(algorithm, name, Objects.requireNonNull(base64.fromString(key)));
  }

  /**
   * Creates a new TSIG key, which can be used to sign or verify a message.
   *
   * @param algorithm The algorithm of the shared key.
   * @param name The name of the shared key.
   * @param keyBytes The shared key's data.
   */
  public TSIG(Name algorithm, Name name, byte[] keyBytes) {
    this(algorithm, name, new SecretKeySpec(keyBytes, nameToAlgorithm(algorithm)));
  }

  /**
   * Creates a new TSIG key, which can be used to sign or verify a message.
   *
   * @param algorithm The algorithm of the shared key.
   * @param name The name of the shared key.
   * @param key The shared key.
   */
  public TSIG(Name algorithm, Name name, SecretKey key) {
    this(algorithm, name, key, Clock.systemUTC());
  }

  /**
   * Creates a new TSIG key, which can be used to sign or verify a message.
   *
   * @param algorithm The algorithm of the shared key.
   * @param name The name of the shared key.
   * @param key The shared key.
   * @since 3.2
   */
  public TSIG(Name algorithm, Name name, SecretKey key, Clock clock) {
    this.name = name;
    this.alg = algorithm;
    this.clock = clock;
    this.macAlgorithm = nameToAlgorithm(algorithm);
    this.macKey = key;
    this.sharedHmac = null;
  }

  /**
   * Creates a new TSIG key from a pre-initialized Mac instance. This assumes that init() has
   * already been called on the mac to set up the key.
   *
   * @param mac The JCE HMAC object
   * @param name The name of the key
   * @deprecated Use one of the constructors that specifies an algorithm and key.
   */
  @Deprecated
  public TSIG(Mac mac, Name name) {
    this.name = name;
    this.sharedHmac = mac;
    this.macAlgorithm = null;
    this.macKey = null;
    this.clock = Clock.systemUTC();
    this.alg = algorithmToName(mac.getAlgorithm());
  }

  /**
   * Creates a new TSIG key with the {@link #HMAC_MD5} algorithm, which can be used to sign or
   * verify a message.
   *
   * @param name The name of the shared key.
   * @param key The shared key's data.
   * @deprecated Use {@link #TSIG(Name, Name, SecretKey)} to explicitly specify an algorithm.
   */
  @Deprecated
  public TSIG(Name name, byte[] key) {
    this(HMAC_MD5, name, key);
  }

  /**
   * Creates a new TSIG object, which can be used to sign or verify a message.
   *
   * @param name The name of the shared key.
   * @param key The shared key's data represented as a base64 encoded string.
   * @throws IllegalArgumentException The key name is an invalid name
   * @throws IllegalArgumentException The key data is improperly encoded
   */
  public TSIG(Name algorithm, String name, String key) {
    byte[] keyBytes = base64.fromString(key);
    if (keyBytes == null) {
      throw new IllegalArgumentException("Invalid TSIG key string");
    }
    try {
      this.name = Name.fromString(name, Name.root);
    } catch (TextParseException e) {
      throw new IllegalArgumentException("Invalid TSIG key name");
    }
    this.alg = algorithm;
    this.clock = Clock.systemUTC();
    this.macAlgorithm = nameToAlgorithm(algorithm);
    this.sharedHmac = null;
    this.macKey = new SecretKeySpec(keyBytes, macAlgorithm);
  }

  /**
   * Creates a new TSIG object, which can be used to sign or verify a message.
   *
   * @param name The name of the shared key.
   * @param algorithm The algorithm of the shared key. The legal values are "hmac-md5", "hmac-sha1",
   *     "hmac-sha224", "hmac-sha256", "hmac-sha384", and "hmac-sha512".
   * @param key The shared key's data represented as a base64 encoded string.
   * @throws IllegalArgumentException The key name is an invalid name
   * @throws IllegalArgumentException The key data is improperly encoded
   */
  public TSIG(String algorithm, String name, String key) {
    this(algorithmToName(algorithm), name, key);
  }

  /**
   * Creates a new TSIG object with the {@link #HMAC_MD5} algorithm, which can be used to sign or
   * verify a message.
   *
   * @param name The name of the shared key
   * @param key The shared key's data, represented as a base64 encoded string.
   * @throws IllegalArgumentException The key name is an invalid name
   * @throws IllegalArgumentException The key data is improperly encoded
   * @deprecated Use {@link #TSIG(Name, String, String)} to explicitly specify an algorithm.
   */
  @Deprecated
  public TSIG(String name, String key) {
    this(HMAC_MD5, name, key);
  }

  /**
   * Creates a new TSIG object, which can be used to sign or verify a message.
   *
   * @param str The TSIG key, in the form name:secret, name/secret, alg:name:secret, or
   *     alg/name/secret. If no algorithm is specified, the default of {@link #HMAC_MD5} is used.
   * @throws IllegalArgumentException The string does not contain both a name and secret.
   * @throws IllegalArgumentException The key name is an invalid name
   * @throws IllegalArgumentException The key data is improperly encoded
   * @deprecated Use an explicit constructor
   */
  @Deprecated
  public static TSIG fromString(String str) {
    String[] parts = str.split("[:/]", 3);
    switch (parts.length) {
      case 2:
        return new TSIG(HMAC_MD5, parts[0], parts[1]);
      case 3:
        return new TSIG(parts[0], parts[1], parts[2]);
      default:
        throw new IllegalArgumentException("Invalid TSIG key specification");
    }
  }

  /**
   * Generates a TSIG record with a specific error for a message that has been rendered.
   *
   * @param m The message
   * @param b The rendered message
   * @param error The error
   * @param old If this message is a response, the TSIG from the request
   * @return The TSIG record to be added to the message
   */
  public TSIGRecord generate(Message m, byte[] b, int error, TSIGRecord old) {
    return generate(m, b, error, old, true);
  }

  /**
   * Generates a TSIG record with a specific error for a message that has been rendered.
   *
   * @param m The message
   * @param b The rendered message
   * @param error The error
   * @param old If this message is a response, the TSIG from the request
   * @param fullSignature {@code true} if this {@link TSIGRecord} is the to be added to the first of
   *     many messages in a TCP connection and all TSIG variables (rfc2845, 3.4.2.) should be
   *     included in the signature. {@code false} for subsequent messages with reduced TSIG
   *     variables set (rfc2845, 4.4.).
   * @return The TSIG record to be added to the message
   * @since 3.2
   */
  public TSIGRecord generate(
      Message m, byte[] b, int error, TSIGRecord old, boolean fullSignature) {
    Instant timeSigned;
    if (error == Rcode.BADTIME) {
      timeSigned = old.getTimeSigned();
    } else {
      timeSigned = clock.instant();
    }

    boolean signing = false;
    Mac hmac = null;
    if (error == Rcode.NOERROR || error == Rcode.BADTIME || error == Rcode.BADTRUNC) {
      signing = true;
      hmac = initHmac();
    }

    Duration fudge;
    int fudgeOption = Options.intValue("tsigfudge");
    if (fudgeOption < 0 || fudgeOption > 0x7FFF) {
      fudge = FUDGE;
    } else {
      fudge = Duration.ofSeconds(fudgeOption);
    }

    if (old != null && signing) {
      hmacAddSignature(hmac, old);
    }

    // Digest the message
    if (signing) {
      if (log.isTraceEnabled()) {
        log.trace(hexdump.dump("TSIG-HMAC rendered message", b));
      }
      hmac.update(b);
    }

    // rfc2845, 3.4.2 TSIG Variables
    // for section 4.4 TSIG on TCP connection: skip name, class, ttl, alg and other
    DNSOutput out = new DNSOutput();
    if (fullSignature) {
      name.toWireCanonical(out);
      out.writeU16(DClass.ANY); /* class */
      out.writeU32(0); /* ttl */
      alg.toWireCanonical(out);
    }

    writeTsigTimersVariables(timeSigned, fudge, out);
    if (fullSignature) {
      out.writeU16(error);
      out.writeU16(0); /* No other data */
    }

    byte[] signature;
    if (signing) {
      byte[] tsigVariables = out.toByteArray();
      if (log.isTraceEnabled()) {
        log.trace(hexdump.dump("TSIG-HMAC variables", tsigVariables));
      }
      signature = hmac.doFinal(tsigVariables);
    } else {
      signature = new byte[0];
    }

    byte[] other = null;
    if (error == Rcode.BADTIME) {
      out = new DNSOutput(6);
      writeTsigTime(clock.instant(), out);
      other = out.toByteArray();
    }

    return new TSIGRecord(
        name,
        DClass.ANY,
        0,
        alg,
        timeSigned,
        fudge,
        signature,
        m.getHeader().getID(),
        error,
        other);
  }

  /**
   * Generates a TSIG record for a message and adds it to the message
   *
   * @param m The message
   * @param old If this message is a response, the TSIG from the request
   */
  public void apply(Message m, TSIGRecord old) {
    apply(m, Rcode.NOERROR, old, true);
  }

  /**
   * Generates a TSIG record with a specific error for a message and adds it to the message.
   *
   * @param m The message
   * @param error The error
   * @param old If this message is a response, the TSIG from the request
   */
  public void apply(Message m, int error, TSIGRecord old) {
    apply(m, error, old, true);
  }

  /**
   * Generates a TSIG record with a specific error for a message and adds it to the message.
   *
   * @param m The message
   * @param old If this message is a response, the TSIG from the request
   * @param fullSignature {@code true} if this message is the first of many in a TCP connection and
   *     all TSIG variables (rfc2845, 3.4.2.) should be included in the signature. {@code false} for
   *     subsequent messages with reduced TSIG variables set (rfc2845, 4.4.).
   * @since 3.2
   */
  public void apply(Message m, TSIGRecord old, boolean fullSignature) {
    apply(m, Rcode.NOERROR, old, fullSignature);
  }

  /**
   * Generates a TSIG record with a specific error for a message and adds it to the message.
   *
   * @param m The message
   * @param error The error
   * @param old If this message is a response, the TSIG from the request
   * @param fullSignature {@code true} if this message is the first of many in a TCP connection and
   *     all TSIG variables (rfc2845, 3.4.2.) should be included in the signature. {@code false} for
   *     subsequent messages with reduced TSIG variables set (rfc2845, 4.4.).
   * @since 3.2
   */
  public void apply(Message m, int error, TSIGRecord old, boolean fullSignature) {
    Record r = generate(m, m.toWire(), error, old, fullSignature);
    m.addRecord(r, Section.ADDITIONAL);
    m.tsigState = Message.TSIG_SIGNED;
  }

  /**
   * Generates a TSIG record for a message and adds it to the message
   *
   * @param m The message
   * @param old If this message is a response, the TSIG from the request
   * @param fullSignature {@code true} if this message is the first of many in a TCP connection and
   *     all TSIG variables (rfc2845, 3.4.2.) should be included in the signature. {@code false} for
   *     subsequent messages with reduced TSIG variables set (rfc2845, 4.4.).
   * @deprecated use {@link #apply(Message, TSIGRecord, boolean)}
   */
  @Deprecated
  public void applyStream(Message m, TSIGRecord old, boolean fullSignature) {
    apply(m, Rcode.NOERROR, old, fullSignature);
  }

  /**
   * Verifies a TSIG record on an incoming message. Since this is only called in the context where a
   * TSIG is expected to be present, it is an error if one is not present. After calling this
   * routine, Message.isVerified() may be called on this message.
   *
   * @param m The message
   * @param b An array containing the message in unparsed form. This is necessary since TSIG signs
   *     the message in wire format, and we can't recreate the exact wire format (with the same name
   *     compression).
   * @param length unused
   * @param old If this message is a response, the TSIG from the request
   * @return The result of the verification (as an Rcode)
   * @see Rcode
   * @deprecated use {@link #verify(Message, byte[], TSIGRecord)}
   */
  @Deprecated
  public byte verify(Message m, byte[] b, int length, TSIGRecord old) {
    return (byte) verify(m, b, old);
  }

  /**
   * Verifies a TSIG record on an incoming message. Since this is only called in the context where a
   * TSIG is expected to be present, it is an error if one is not present. After calling this
   * routine, Message.isVerified() may be called on this message.
   *
   * @param m The message to verify
   * @param b An array containing the message in unparsed form. This is necessary since TSIG signs
   *     the message in wire format, and we can't recreate the exact wire format (with the same name
   *     compression).
   * @param old If this message is a response, the TSIG from the request
   * @return The result of the verification (as an Rcode)
   * @see Rcode
   */
  public int verify(Message m, byte[] b, TSIGRecord old) {
    return verify(m, b, old, true);
  }

  /**
   * Verifies a TSIG record on an incoming message. Since this is only called in the context where a
   * TSIG is expected to be present, it is an error if one is not present. After calling this
   * routine, Message.isVerified() may be called on this message.
   *
   * @param m The message to verify
   * @param b An array containing the message in unparsed form. This is necessary since TSIG signs
   *     the message in wire format, and we can't recreate the exact wire format (with the same name
   *     compression).
   * @param old If this message is a response, the TSIG from the request
   * @param fullSignature {@code true} if this message is the first of many in a TCP connection and
   *     all TSIG variables (rfc2845, 3.4.2.) should be included in the signature. {@code false} for
   *     subsequent messages with reduced TSIG variables set (rfc2845, 4.4.).
   * @return The result of the verification (as an Rcode)
   * @see Rcode
   * @since 3.2
   */
  public int verify(Message m, byte[] b, TSIGRecord old, boolean fullSignature) {
    m.tsigState = Message.TSIG_FAILED;
    TSIGRecord tsig = m.getTSIG();
    if (tsig == null) {
      return Rcode.FORMERR;
    }

    if (!tsig.getName().equals(name) || !tsig.getAlgorithm().equals(alg)) {
      log.debug(
          "BADKEY failure, expected: {}/{}, actual: {}/{}",
          name,
          alg,
          tsig.getName(),
          tsig.getAlgorithm());
      return Rcode.BADKEY;
    }

    Mac hmac = initHmac();
    if (old != null && tsig.getError() != Rcode.BADKEY && tsig.getError() != Rcode.BADSIG) {
      hmacAddSignature(hmac, old);
    }

    m.getHeader().decCount(Section.ADDITIONAL);
    byte[] header = m.getHeader().toWire();
    m.getHeader().incCount(Section.ADDITIONAL);
    if (log.isTraceEnabled()) {
      log.trace(hexdump.dump("TSIG-HMAC header", header));
    }
    hmac.update(header);

    int len = m.tsigstart - header.length;
    if (log.isTraceEnabled()) {
      log.trace(hexdump.dump("TSIG-HMAC message after header", b, header.length, len));
    }
    hmac.update(b, header.length, len);

    DNSOutput out = new DNSOutput();
    if (fullSignature) {
      tsig.getName().toWireCanonical(out);
      out.writeU16(tsig.dclass);
      out.writeU32(tsig.ttl);
      tsig.getAlgorithm().toWireCanonical(out);
    }
    writeTsigTimersVariables(tsig.getTimeSigned(), tsig.getFudge(), out);
    if (fullSignature) {
      out.writeU16(tsig.getError());
      if (tsig.getOther() != null) {
        out.writeU16(tsig.getOther().length);
        out.writeByteArray(tsig.getOther());
      } else {
        out.writeU16(0);
      }
    }

    byte[] tsigVariables = out.toByteArray();
    if (log.isTraceEnabled()) {
      log.trace(hexdump.dump("TSIG-HMAC variables", tsigVariables));
    }
    hmac.update(tsigVariables);

    byte[] signature = tsig.getSignature();
    int digestLength = hmac.getMacLength();

    // rfc4635#section-3.1, 4.:
    // "MAC size" field is less than the larger of 10 (octets) and half
    // the length of the hash function in use
    int minDigestLength = Math.max(10, digestLength / 2);
    if (signature.length > digestLength) {
      log.debug(
          "BADSIG: signature too long, expected: {}, actual: {}", digestLength, signature.length);
      return Rcode.BADSIG;
    } else if (signature.length < minDigestLength) {
      log.debug(
          "BADSIG: signature too short, expected: {} of {}, actual: {}",
          minDigestLength,
          digestLength,
          signature.length);
      return Rcode.BADSIG;
    } else {
      byte[] expectedSignature = hmac.doFinal();
      if (!verify(expectedSignature, signature)) {
        if (log.isDebugEnabled()) {
          log.debug(
              "BADSIG: signature verification failed, expected: {}, actual: {}",
              base64.toString(expectedSignature),
              base64.toString(signature));
        }
        return Rcode.BADSIG;
      }
    }

    // validate time after the signature, as per
    // https://tools.ietf.org/html/draft-ietf-dnsop-rfc2845bis-08#section-5.4.3
    Instant now = clock.instant();
    Duration delta = Duration.between(now, tsig.getTimeSigned()).abs();
    if (delta.compareTo(tsig.getFudge()) > 0) {
      log.debug(
          "BADTIME failure, now {} +/- tsig {} > fudge {}",
          now,
          tsig.getTimeSigned(),
          tsig.getFudge());
      return Rcode.BADTIME;
    }

    m.tsigState = Message.TSIG_VERIFIED;
    return Rcode.NOERROR;
  }

  /**
   * Returns the maximum length of a TSIG record generated by this key.
   *
   * @see TSIGRecord
   */
  public int recordLength() {
    return name.length()
        + 10
        + alg.length()
        + 8 // time signed, fudge
        + 18 // 2 byte MAC length, 16 byte MAC
        + 4 // original id, error
        + 8; // 2 byte error length, 6 byte max error field.
  }

  private static void hmacAddSignature(Mac hmac, TSIGRecord tsig) {
    byte[] signatureSize = DNSOutput.toU16(tsig.getSignature().length);
    if (log.isTraceEnabled()) {
      log.trace(hexdump.dump("TSIG-HMAC signature size", signatureSize));
      log.trace(hexdump.dump("TSIG-HMAC signature", tsig.getSignature()));
    }

    hmac.update(signatureSize);
    hmac.update(tsig.getSignature());
  }

  private static void writeTsigTimersVariables(Instant instant, Duration fudge, DNSOutput out) {
    writeTsigTime(instant, out);
    out.writeU16((int) fudge.getSeconds());
  }

  private static void writeTsigTime(Instant instant, DNSOutput out) {
    long time = instant.getEpochSecond();
    int timeHigh = (int) (time >> 32);
    long timeLow = time & 0xFFFFFFFFL;
    out.writeU16(timeHigh);
    out.writeU32(timeLow);
  }

  public static class StreamVerifier {
    /** A helper class for verifying multiple message responses. */
    private final TSIG key;

    private int nresponses;
    private int lastsigned;
    private TSIGRecord lastTSIG;

    /** Creates an object to verify a multiple message response */
    public StreamVerifier(TSIG tsig, TSIGRecord queryTsig) {
      key = tsig;
      nresponses = 0;
      lastTSIG = queryTsig;
    }

    /**
     * Verifies a TSIG record on an incoming message that is part of a multiple message response.
     * TSIG records must be present on the first and last messages, and at least every 100 records
     * in between. After calling this routine, Message.isVerified() may be called on this message.
     *
     * @param m The message
     * @param b The message in unparsed form
     * @return The result of the verification (as an Rcode)
     * @see Rcode
     */
    public int verify(Message m, byte[] b) {
      TSIGRecord tsig = m.getTSIG();

      nresponses++;
      if (nresponses == 1) {
        int result = key.verify(m, b, lastTSIG);
        lastTSIG = tsig;
        return result;
      }

      if (tsig != null) {
        int result = key.verify(m, b, lastTSIG, false);
        lastsigned = nresponses;
        lastTSIG = tsig;
        return result;
      } else {
        boolean required = nresponses - lastsigned >= 100;
        if (required) {
          log.debug("FORMERR: missing required signature on {}th message", nresponses);
          m.tsigState = Message.TSIG_FAILED;
          return Rcode.FORMERR;
        } else {
          log.trace("Intermediate message {} without signature", nresponses);
          m.tsigState = Message.TSIG_INTERMEDIATE;
          return Rcode.NOERROR;
        }
      }
    }
  }
}




© 2015 - 2024 Weber Informatics LLC | Privacy Policy