pkgsrc-Changes archive

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index][Old Index]

CVS commit: pkgsrc/security/opendnssec2



Module Name:    pkgsrc
Committed By:   he
Date:           Tue Dec  5 12:20:40 UTC 2023

Modified Files:
        pkgsrc/security/opendnssec2: Makefile distinfo
Added Files:
        pkgsrc/security/opendnssec2/patches:
            patch-enforcer_src_keystate_keystate__ds.c patch-signer_src_hsm.c
            patch-signer_src_wire_query.c

Log Message:
security/opendnssec2: Work around a concurrency error + two cosmetic fixes.

 * Adopt the suggested patch from
   https://issues.opendnssec.org/browse/SUPPORT-278
   for what looks like a concurrency error in interfacing
   to the HSM module.
 * Give correct upper-case/lower-case hint if command
   is not configured in the error message.
 * Be a bit more verbose about which zone isn't found if
   indeed it isn't found.

Bump PKGREVISION.


To generate a diff of this commit:
cvs rdiff -u -r1.27 -r1.28 pkgsrc/security/opendnssec2/Makefile
cvs rdiff -u -r1.10 -r1.11 pkgsrc/security/opendnssec2/distinfo
cvs rdiff -u -r0 -r1.1 \
    pkgsrc/security/opendnssec2/patches/patch-enforcer_src_keystate_keystate__ds.c \
    pkgsrc/security/opendnssec2/patches/patch-signer_src_hsm.c \
    pkgsrc/security/opendnssec2/patches/patch-signer_src_wire_query.c

Please note that diffs are not public domain; they are subject to the
copyright notices on the relevant files.

Modified files:

Index: pkgsrc/security/opendnssec2/Makefile
diff -u pkgsrc/security/opendnssec2/Makefile:1.27 pkgsrc/security/opendnssec2/Makefile:1.28
--- pkgsrc/security/opendnssec2/Makefile:1.27   Wed Nov  8 13:20:48 2023
+++ pkgsrc/security/opendnssec2/Makefile        Tue Dec  5 12:20:40 2023
@@ -1,9 +1,9 @@
-# $NetBSD: Makefile,v 1.27 2023/11/08 13:20:48 wiz Exp $
+# $NetBSD: Makefile,v 1.28 2023/12/05 12:20:40 he Exp $
 #
 
 DISTNAME=      opendnssec-2.1.12
 PKGNAME=       ${DISTNAME:S/opendnssec/opendnssec2/}
-PKGREVISION=   6
+PKGREVISION=   7
 CATEGORIES=    security net
 MASTER_SITES=  https://www.opendnssec.org/files/source/
 

Index: pkgsrc/security/opendnssec2/distinfo
diff -u pkgsrc/security/opendnssec2/distinfo:1.10 pkgsrc/security/opendnssec2/distinfo:1.11
--- pkgsrc/security/opendnssec2/distinfo:1.10   Wed Nov  9 11:39:43 2022
+++ pkgsrc/security/opendnssec2/distinfo        Tue Dec  5 12:20:40 2023
@@ -1,6 +1,6 @@
-$NetBSD: distinfo,v 1.10 2022/11/09 11:39:43 he Exp $
+$NetBSD: distinfo,v 1.11 2023/12/05 12:20:40 he Exp $
 
-BLAKE2s (opendnssec-2.1.12.tar.gz) = 3adb1fe7d7a0326ed367f536b78d1d3e9333343cd68937881c502fa2c4d8819a
-SHA512 (opendnssec-2.1.12.tar.gz) = 6b3a7458c8a1e73d5d35320c48f81b37cb8ed7939ea2bd05335cd1b710bcf99c0b461e44dd66e14068ee77fe43af6fb91e7466bc4e3ba135a8fb37bc03919bb7
-Size (opendnssec-2.1.12.tar.gz) = 1157828 bytes
 SHA1 (patch-conf_Makefile.in) = b0a782916a9603138c09b484cc1534b938bf8330
+SHA1 (patch-enforcer_src_keystate_keystate__ds.c) = 0f000dc6a37cb05776a1361726082f4db35e3a45
+SHA1 (patch-signer_src_hsm.c) = da5d35b22e189c7eef0b6344e7137662fe439c3e
+SHA1 (patch-signer_src_wire_query.c) = c026ae230ad6bcb73800700823ca33be00d26fcb

Added files:

Index: pkgsrc/security/opendnssec2/patches/patch-enforcer_src_keystate_keystate__ds.c
diff -u /dev/null pkgsrc/security/opendnssec2/patches/patch-enforcer_src_keystate_keystate__ds.c:1.1
--- /dev/null   Tue Dec  5 12:20:40 2023
+++ pkgsrc/security/opendnssec2/patches/patch-enforcer_src_keystate_keystate__ds.c      Tue Dec  5 12:20:40 2023
@@ -0,0 +1,25 @@
+$NetBSD: patch-enforcer_src_keystate_keystate__ds.c,v 1.1 2023/12/05 12:20:40 he Exp $
+
+Give correct upper/lower-case hint if command isn't configured
+in the error message in the log and/or console.
+
+--- enforcer/src/keystate/keystate_ds.c.orig   2020-02-10 17:25:11.000000000 +0000
++++ enforcer/src/keystate/keystate_ds.c
+@@ -217,7 +217,7 @@ submit_dnskey_by_id(int sockfd, key_data
+ {
+       const char* ds_submit_command;
+       ds_submit_command = engine->config->delegation_signer_submit_command;
+-      return exec_dnskey_by_id(sockfd, key, ds_submit_command, "submit");
++      return exec_dnskey_by_id(sockfd, key, ds_submit_command, "Submit");
+ }
+ 
+ static int
+@@ -225,7 +225,7 @@ retract_dnskey_by_id(int sockfd, key_dat
+ {
+       const char* ds_retract_command;
+       ds_retract_command = engine->config->delegation_signer_retract_command;
+-      return exec_dnskey_by_id(sockfd, key, ds_retract_command, "retract");
++      return exec_dnskey_by_id(sockfd, key, ds_retract_command, "Retract");
+ }
+ 
+ static int
Index: pkgsrc/security/opendnssec2/patches/patch-signer_src_hsm.c
diff -u /dev/null pkgsrc/security/opendnssec2/patches/patch-signer_src_hsm.c:1.1
--- /dev/null   Tue Dec  5 12:20:40 2023
+++ pkgsrc/security/opendnssec2/patches/patch-signer_src_hsm.c  Tue Dec  5 12:20:40 2023
@@ -0,0 +1,29 @@
+$NetBSD: patch-signer_src_hsm.c,v 1.1 2023/12/05 12:20:40 he Exp $
+
+Work around possible concurrency error and
+"[hsm] hsm_get_dnskey(): Got NULL key"
+Ref. https://issues.opendnssec.org/browse/SUPPORT-278
+
+--- signer/src/hsm.c.orig      2022-11-08 08:46:49.000000000 +0000
++++ signer/src/hsm.c
+@@ -34,6 +34,10 @@
+ #include "log.h"
+ #include "cryptoki_compat/pkcs11.h"
+ 
++#include <pthread.h>
++
++pthread_mutex_t _hsm_get_dnskey_mutex = PTHREAD_MUTEX_INITIALIZER;
++
+ static const char* hsm_str = "hsm";
+ 
+ /**
+@@ -109,7 +113,9 @@ llibhsm_key_start:
+ 
+     /* get dnskey */
+     if (!key_id->dnskey) {
++      pthread_mutex_lock(&_hsm_get_dnskey_mutex);
+         key_id->dnskey = hsm_get_dnskey(ctx, keylookup(ctx, key_id->locator), key_id->params);
++      pthread_mutex_unlock(&_hsm_get_dnskey_mutex);
+     }
+     if (!key_id->dnskey) {
+         error = hsm_get_error(ctx);
Index: pkgsrc/security/opendnssec2/patches/patch-signer_src_wire_query.c
diff -u /dev/null pkgsrc/security/opendnssec2/patches/patch-signer_src_wire_query.c:1.1
--- /dev/null   Tue Dec  5 12:20:40 2023
+++ pkgsrc/security/opendnssec2/patches/patch-signer_src_wire_query.c   Tue Dec  5 12:20:40 2023
@@ -0,0 +1,21 @@
+$NetBSD: patch-signer_src_wire_query.c,v 1.1 2023/12/05 12:20:40 he Exp $
+
+Be a bit more verbose about which zone isn't found...
+
+--- signer/src/wire/query.c.orig       2021-02-20 21:04:47.000000000 +0000
++++ signer/src/wire/query.c
+@@ -886,7 +886,13 @@ query_process(query_type* q, engine_type
+     }
+     pthread_mutex_unlock(&engine->zonelist->zl_lock);
+     if (!q->zone) {
+-        ods_log_debug("[%s] zone not found", query_str);
++      char *zn = ldns_rdf2str(ldns_rr_owner(rr));
++      if (zn) {
++            ods_log_debug("[%s] zone %s not found", query_str, zn);
++          free(zn);
++      } else {
++            ods_log_debug("[%s] zone (unknown?) not found", query_str);
++      }
+         ldns_pkt_free(pkt);
+         return query_servfail(q);
+     }



Home | Main Index | Thread Index | Old Index