# The command to reload the nameserver domains list.
$reload_command="sudo ndc reconfig 2>&1";
+
+# When we consider a signature to have expired and so to be rejected.
+# Intended to help prevent reply attacks. Value is in seconds and the
+# signature can be +/- this many seconds from current time before being
+# rejected.
+$expiry = 7200;
# http://www.earth.li/projectpurple/progs/autodns.html
# Released under the GPL.
#
-# $Id: autodns.pl,v 1.13 2005/05/31 17:17:46 noodles Exp $
+# $Id: autodns.pl,v 1.14 2005/06/15 10:14:28 noodles Exp $
#
use strict;
+use Date::Parse;
use Fcntl qw(:flock);
use File::Temp qw(tempfile);
use IPC::Open3;
my ($domain, @MAIL, @GPGERROR, @COMMANDS, %zones, $VERSION);
use vars qw($me $ccreply $conffile $domainlistroot @cfgfiles $usersfile
- $lockfile $reload_command);
+ $lockfile $reload_command $expiry);
$VERSION="0.0.8";
# Check who it's from and if the signature was a good one.
$gpggood=1;
+my $sigtime = 0;
foreach (@GPGERROR) {
chomp;
- if (/Signature made.* (.*)$/) {
- $gpguser=$1;
+ if (/Signature made (.*) using.*ID (.*)$/) {
+ $sigtime = str2time($1);
+ $gpguser=$2;
} elsif (/error/) {
$gpggood = 0;
print REPLY "Some errors ocurred\n";
exit;
}
+# Check if the signature is outside our acceptable range.
+if (!defined($sigtime)) {
+ print REPLY "Couldn't parse signature time.\n";
+ close REPLY;
+ exit;
+} elsif ($sigtime > (time + $expiry)) {
+ print REPLY "Signature too far into the future.\n";
+ close REPLY;
+ exit;
+} elsif ($sigtime < (time - $expiry)) {
+ print REPLY "Signature too far into the past.\n";
+ close REPLY;
+ exit;
+}
+
# Now let's check if we know this person.
($user, $priv, $server) = getuserinfo($gpguser);