]> git.ipfire.org Git - thirdparty/FORT-validator.git/log
thirdparty/FORT-validator.git
5 years agoFix bug due to bad error handling on multithreading.
pcarana [Tue, 3 Dec 2019 00:14:26 +0000 (18:14 -0600)] 
Fix bug due to bad error handling on multithreading.

+Don't consider validation results if at least one TAL has an error fetching it's root certificate. The bug was: on TAL 'hard error' (whenever the root certificate couldn't be fetched), the error was minimized and the rest of the TAL validation results were considered to update DB; this can lead to a considerable number of withdrawal PDUs for the routers.

5 years agoIndicate facility utilized at syslog v1.1.2
pcarana [Fri, 8 Nov 2019 22:00:54 +0000 (16:00 -0600)] 
Indicate facility utilized at syslog

5 years agoUpgrade version, code ready for testing
pcarana [Thu, 7 Nov 2019 17:27:48 +0000 (11:27 -0600)] 
Upgrade version, code ready for testing

5 years agoRemove <sys/cdefs.h> header, avoid cpp warnings during compilation
pcarana [Thu, 31 Oct 2019 19:55:20 +0000 (13:55 -0600)] 
Remove <sys/cdefs.h> header, avoid cpp warnings during compilation

5 years agoAdd missing getters at configuration impersonator
pcarana [Thu, 7 Nov 2019 16:58:13 +0000 (10:58 -0600)] 
Add missing getters at configuration impersonator

5 years agoUpdate function 'log_debug_enabled' and add 'log_info_enabled' function
pcarana [Thu, 7 Nov 2019 16:52:41 +0000 (10:52 -0600)] 
Update function 'log_debug_enabled' and add 'log_info_enabled' function

5 years agoAdd docs for log level and output, remove DEBUG flag at Makefile
pcarana [Wed, 16 Oct 2019 18:29:22 +0000 (13:29 -0500)] 
Add docs for log level and output, remove DEBUG flag at Makefile

5 years agoUse log priorities from syslog, allow debug without recompiling
pcarana [Mon, 14 Oct 2019 21:19:42 +0000 (16:19 -0500)] 
Use log priorities from syslog, allow debug without recompiling

5 years agoAdd log output and level configuration properties (still unfunctional)
pcarana [Mon, 14 Oct 2019 15:13:16 +0000 (10:13 -0500)] 
Add log output and level configuration properties (still unfunctional)

5 years agoAdd license for native asn1c code, and a notice to list all licences
pcarana [Thu, 7 Nov 2019 16:31:38 +0000 (10:31 -0600)] 
Add license for native asn1c code, and a notice to list all licences

5 years agoUse 'RSA_get0_key', some ssl libs didn't had the function 'RSA_get0_e' v1.1.1
pcarana [Wed, 30 Oct 2019 00:08:48 +0000 (18:08 -0600)] 
Use 'RSA_get0_key', some ssl libs didn't had the function 'RSA_get0_e'

5 years agoPrepare to release v1.1.1
pcarana [Fri, 25 Oct 2019 23:36:45 +0000 (18:36 -0500)] 
Prepare to release v1.1.1

5 years agoUse <sys/types.h> blksize_t instead of <bits/types.h> __blksize_t
pcarana [Fri, 25 Oct 2019 22:45:32 +0000 (17:45 -0500)] 
Use <sys/types.h> blksize_t instead of <bits/types.h> __blksize_t

5 years agoValidate subjectPublicKey modulus and exponent (RFC 7935 section 3)
pcarana [Thu, 24 Oct 2019 18:32:29 +0000 (13:32 -0500)] 
Validate subjectPublicKey modulus and exponent (RFC 7935 section 3)

5 years agoHandle empty DB scenario and avoid error on Reset Query PDU received
pcarana [Tue, 15 Oct 2019 22:21:09 +0000 (17:21 -0500)] 
Handle empty DB scenario and avoid error on Reset Query PDU received

5 years agoValidate 'output.bgpsec' value
pcarana [Fri, 11 Oct 2019 23:19:17 +0000 (18:19 -0500)] 
Validate 'output.bgpsec' value

5 years agoAdd count functions for ROAs and Router Keys
pcarana [Fri, 25 Oct 2019 22:35:49 +0000 (17:35 -0500)] 
Add count functions for ROAs and Router Keys

5 years agoFix images path
pcarana [Mon, 14 Oct 2019 21:35:03 +0000 (16:35 -0500)] 
Fix images path

5 years agoFix docs layout (menu wasn't visible from home) v1.1.0
pcarana [Mon, 14 Oct 2019 17:33:58 +0000 (12:33 -0500)] 
Fix docs layout (menu wasn't visible from home)

5 years agoMerge branch rtrv1
pcarana [Tue, 8 Oct 2019 17:18:12 +0000 (12:18 -0500)] 
Merge branch rtrv1

5 years agoRelease version 1.1.0
pcarana [Mon, 7 Oct 2019 22:38:03 +0000 (17:38 -0500)] 
Release version 1.1.0

5 years agoSimplify README, use a similar conf file example at man and docs
pcarana [Wed, 2 Oct 2019 15:07:35 +0000 (10:07 -0500)] 
Simplify README, use a similar conf file example at man and docs

5 years agoPrint two debug messages properly
Alberto Leiva Popper [Mon, 30 Sep 2019 20:38:09 +0000 (15:38 -0500)] 
Print two debug messages properly

These were always being sent to standard output.
They are now handed by syslog properly when appropriate like
everything else.

5 years agoAdd debug messages to RTR interactions
Alberto Leiva Popper [Fri, 27 Sep 2019 22:38:45 +0000 (17:38 -0500)] 
Add debug messages to RTR interactions

Requested by tester.

5 years agoLog: Remove clutter, add doc, patch -DDEBUG
Alberto Leiva Popper [Fri, 13 Sep 2019 19:19:56 +0000 (14:19 -0500)] 
Log: Remove clutter, add doc, patch -DDEBUG

Was printing too many lines for an obsolete reason.

5 years agoRemove uppercase for the syslog identifier
Alberto Leiva Popper [Fri, 13 Sep 2019 17:42:54 +0000 (12:42 -0500)] 
Remove uppercase for the syslog identifier

Lowercase seems to be standard.

5 years agoAdd syslog
Alberto Leiva Popper [Fri, 13 Sep 2019 16:44:55 +0000 (11:44 -0500)] 
Add syslog

5 years agoUpdate docs structure and content, merge with master.
pcarana [Mon, 9 Sep 2019 19:02:00 +0000 (14:02 -0500)] 
Update docs structure and content, merge with master.

-Bring the last updates from master (from commit 298c8f9ab0147159e70e47fb7f0766a5bc1b8b31).
-Fix background of some images (use white instead of none).
-Remove the 'doc' dir and move all its content to root folder, so that the whole documentation can be consulted from the root directory.
-Update the documentation index.
-Update docs layout references to match the new directory structure.

5 years agoAdd RFCs compliance: 6810, 8210, 8416, 8608, and 8630.
pcarana [Fri, 6 Sep 2019 17:32:30 +0000 (12:32 -0500)] 
Add RFCs compliance: 6810, 8210, 8416, 8608, and 8630.

5 years agoFix bug, complete some unit tests, downgrade NID info logging.
pcarana [Fri, 6 Sep 2019 05:04:26 +0000 (00:04 -0500)] 
Fix bug, complete some unit tests, downgrade NID info logging.

-Bug fixed: Router Key PDUs overriding each others weren't removed due to a bad 'memcmp' use.
-Complete unit tests where Router Keys data can be tested.
-Downgrade NID registering log from info to debug on initialization.

5 years agoCreate one thread per TAL file
pcarana [Tue, 3 Sep 2019 17:42:35 +0000 (12:42 -0500)] 
Create one thread per TAL file

+Each TAL will validate its own repositories without waiting for the others to terminate.
+Remove a TODO on configure.ac
+Update unit tests.
+Fix warning at base64 sanitizer, replace the function 'strchr' with a local one since the read buffer isn't necessarily a string.

5 years agoAdd usage/run examples
pcarana [Wed, 28 Aug 2019 21:46:57 +0000 (16:46 -0500)] 
Add usage/run examples

5 years agoMerge from v1.0.0
pcarana [Tue, 27 Aug 2019 20:41:44 +0000 (15:41 -0500)] 
Merge from v1.0.0

5 years agoMerge branch fixes-0.0.2 v1.0.0
pcarana [Mon, 26 Aug 2019 20:33:27 +0000 (15:33 -0500)] 
Merge branch fixes-0.0.2

5 years agoRelease version 1.0.0
pcarana [Mon, 26 Aug 2019 20:26:44 +0000 (15:26 -0500)] 
Release version 1.0.0

5 years agoLog always incidences value
pcarana [Wed, 21 Aug 2019 20:31:09 +0000 (15:31 -0500)] 
Log always incidences value

5 years agoFix SLURM issues, and compile warning.
pcarana [Wed, 21 Aug 2019 17:24:49 +0000 (12:24 -0500)] 
Fix SLURM issues, and compile warning.

-SLURM filters weren't correctly applied when the filter had a prefix and an asn, only the asn was taken into account.
-Another error at filters, if a prefix X covered ROA prefix Y, the ROA prefix wasn't filtered; so apply the filter as specified in RFC 8416.
-Remove compile warning '_BSD_SOURCE and _SVID_SOURCE are deprecated', and set '_DEFAULT_SOURCE' at generated code by asn1c 'GeneralizedTime.c'.

5 years agoLog properly the errors at unsigned integer configurations
pcarana [Mon, 19 Aug 2019 21:58:10 +0000 (16:58 -0500)] 
Log properly the errors at unsigned integer configurations

5 years agoDisplay server info on success, show prop name when int value has errors
pcarana [Mon, 19 Aug 2019 16:07:50 +0000 (11:07 -0500)] 
Display server info on success, show prop name when int value has errors

5 years agoFix #14, remove SIGINT handler and adequate rsync return status.
pcarana [Wed, 14 Aug 2019 22:10:25 +0000 (17:10 -0500)] 
Fix #14, remove SIGINT handler and adequate rsync return status.

-The SIGINT handler wasn't terminating the process as it should be, so let the signal be handled as default (like SIGTERM).
-Update the rsync (do_rsync) function to read the returned pid status and know how did the process was terminated; in case of interruption,  use the returned value to terminate the validation cycle as well.

6 years agoAdd missing step for CentOS, use version variable at --version example
pcarana [Mon, 12 Aug 2019 23:56:21 +0000 (18:56 -0500)] 
Add missing step for CentOS, use version variable at --version example

6 years agoUpdate Slackware supported version, and dates reference
pcarana [Mon, 12 Aug 2019 20:50:21 +0000 (15:50 -0500)] 
Update Slackware supported version, and dates reference

6 years agoAdd installation steps for Fedora, openSUSE, FreeBSD and Slackware
pcarana [Mon, 12 Aug 2019 19:46:20 +0000 (14:46 -0500)] 
Add installation steps for Fedora, openSUSE, FreeBSD and Slackware

6 years agoFix bug, AI_CANONNAME can only be set when an address is specified
pcarana [Thu, 8 Aug 2019 22:50:22 +0000 (17:50 -0500)] 
Fix bug, AI_CANONNAME can only be set when an address is specified

6 years agoFix #13, reload stack to retry manifest validation
pcarana [Thu, 8 Aug 2019 21:06:15 +0000 (16:06 -0500)] 
Fix #13, reload stack to retry manifest validation

6 years agoRead TAL SPKI as lines of 65 chars (allow LibreSSL compat).
pcarana [Thu, 8 Aug 2019 18:09:09 +0000 (13:09 -0500)] 
Read TAL SPKI as lines of 65 chars (allow LibreSSL compat).

LibreSSL didn't liked a specific TAL that had base64 lines > 80 chars, so parse all TALs SPKI as base64 with lines of 65 chars (including line feed).

6 years agoAdd OpenSSL >= 1.1 prerequisite, and docs to install on CentOS
pcarana [Thu, 8 Aug 2019 13:10:05 +0000 (08:10 -0500)] 
Add OpenSSL >= 1.1 prerequisite, and docs to install on CentOS

6 years agoAssign ID to incidence, validate RTR port, fix slurm bug.
pcarana [Tue, 6 Aug 2019 16:28:24 +0000 (11:28 -0500)] 
Assign ID to incidence, validate RTR port, fix slurm bug.

-Use an ID for the registered incidence.
-When loading multiple SLURM files, the validation from RFC 8416 section 4.2 wasn't considered. A context is used to perform such validation, since every prefix or asn (for bgpsec) must be validated according to its own context/file.
-Remove dead code (structs) from SLURM.
-Validate RTR port range since this isn't validated by getaddrinfo.

6 years agoFix minor issues and add some enhancements.
pcarana [Fri, 2 Aug 2019 16:51:11 +0000 (11:51 -0500)] 
Fix minor issues and add some enhancements.

-Display a warning when a directory doesn't have files with the desired extension (used at TAL and SLURM configuration).
-Set the minimum allowed value of 'maximum-certificate-depth' to 5 to allow a normal operation.
-Validate ROA output file path at initialization instead of doing it when the whole validation process has terminated.
-Add a note to indicate 64-bit OS support.
-Print the real address where the RTR server will be bounded to.
-If there's an error loading the SLURM data, show the element that has the error.
-Fix X509_VERIFY_PARAM memory leak.
-Update doc reference to UINT_MAX definition.
-Fix bug: when a TAL couldn't be loaded its references where trying to be released, but such references didn't existed.

6 years agoPatch dist build
Alberto Leiva Popper [Wed, 24 Jul 2019 21:20:41 +0000 (16:20 -0500)] 
Patch dist build

Some files needed by the unit tests were not exporting.

6 years agoAdd RTRv1 and BGPsec support to docs
pcarana [Wed, 24 Jul 2019 20:54:47 +0000 (15:54 -0500)] 
Add RTRv1 and BGPsec support to docs

6 years agoReimplement the fix to bug #11
Alberto Leiva Popper [Wed, 24 Jul 2019 19:31:51 +0000 (14:31 -0500)] 
Reimplement the fix to bug #11

I was uncomfortable with the previous solution for two reasons:

- It wasn't deferring certificate revocation validation to libcrypto.
  I am not sure if our implementation of it was sufficient, but
  regardless, this operation should not be performed by Fort itself.
- It induced redundant CRL loading, which was a little unnecessarily
  slow.

The root of the problem was that Fort was (originally) trying to
validate manifests' certificates using their grandparents' CRL (rather
than the parents'), which was incorrect and now fixed.

6 years agoRevert "Fix 11: validate certificates against its corresponding CRL."
Alberto Leiva Popper [Wed, 24 Jul 2019 16:51:58 +0000 (11:51 -0500)] 
Revert "Fix 11: validate certificates against its corresponding CRL."

This reverts commit fb30fcc5c0898fc32cbaab85c70b26a08b4a97a8.

6 years agoRevert "Don't retry MFT download when EE is revoked (related to #11)"
Alberto Leiva Popper [Wed, 24 Jul 2019 16:51:50 +0000 (11:51 -0500)] 
Revert "Don't retry MFT download when EE is revoked (related to #11)"

This reverts commit 4e606bb81038154fc9cd6966590c57a7a6b01a3b.

6 years agoFix some BGPsec issues and complete output printing.
pcarana [Tue, 23 Jul 2019 22:28:10 +0000 (17:28 -0500)] 
Fix some BGPsec issues and complete output printing.

-The SLURM BGPsec arrays were loading only 1 element, and the AS wasn't set when filtering router keys (programmer errors Â¬Â¬).
-Validate SLURM routerPublicKey as a SubjectPublicKeyInfo struct, including the expected algorithms for BGPsec certificates.
-Print router key info as base64url encoded strings, and update headers.

6 years agoRename *bgpsec to *router_key, change SK data types, fix ERROR_PDU bug
pcarana [Tue, 23 Jul 2019 15:51:10 +0000 (10:51 -0500)] 
Rename *bgpsec to *router_key, change SK data types, fix ERROR_PDU bug

-Use 'router_key' naming instead of bgpsec once the certificates had been validated and are stored at base or deltas.
-Use char arrays instead of pointers at SK (subject key) info, the DB hash table was detecting every validation run as an update for BGPsec certificates (pointers to sk_info's were always distinct).
-Remove structure 'sk_info' and its related functions, now its data is set at 'router_key' struct.
-Allow to receive larger error pdu messages. The maximum allowed length for PDUs received is 512 bytes, but the error messages couldn't be larger than 40 bytes (aprox).
-Add Router Key PDU constant length.
-Avoid needless comparisons at SLURM filters.

6 years agoFix some issues related to BGPsec.
pcarana [Mon, 22 Jul 2019 23:07:49 +0000 (18:07 -0500)] 
Fix some issues related to BGPsec.

-Add functions to apply SLURM BGPsec filters and assertions.
-Remove length variables of SKI and SPKI on SLURM BGPsec structs.
-Send Router Key PDUs of base data (only PDUs from deltas were sent).
-Update outdated unit tests (bad calls, missing calls, impersonate functions).
-Complete filtering functions for BGPsec data.

6 years agoUse SPKI length constant (in BGPsec certs is always 91 bytes long)
pcarana [Mon, 22 Jul 2019 19:49:28 +0000 (14:49 -0500)] 
Use SPKI length constant (in BGPsec certs is always 91 bytes long)

6 years agoSupport RTRv1, validate version on PDU exchanges
pcarana [Sat, 20 Jul 2019 00:45:34 +0000 (19:45 -0500)] 
Support RTRv1, validate version on PDU exchanges

6 years agoStore BGPsec certs info, print at configured output
pcarana [Fri, 19 Jul 2019 17:04:26 +0000 (12:04 -0500)] 
Store BGPsec certs info, print at configured output

-Use struct 'router_key' to represent BGPsec certificates.
-Use reference count of Subject Key data (ID and public key) with 'sk_info' struct.
-Add router certificates info to local DB, as part of the refactor 'roa_table' was renamed to 'db_table'.
-Add configuration parameter 'output.bgpsec', the information is printed in hexadecimal representation (there's a TODO here: maybe encode and print as base64).
-Consider BGPsec keys in deltas.
-Use a constant for SKI length, since always is the same (20 bytes/octets).

6 years agoDon't retry MFT download when EE is revoked (related to #11)
pcarana [Wed, 17 Jul 2019 23:13:28 +0000 (18:13 -0500)] 
Don't retry MFT download when EE is revoked (related to #11)

6 years agoFix #12: this isn't a critical error (isn't dev's fault)
pcarana [Wed, 17 Jul 2019 18:16:29 +0000 (13:16 -0500)] 
Fix #12: this isn't a critical error (isn't dev's fault)

6 years agoFix 11: validate certificates against its corresponding CRL.
pcarana [Wed, 17 Jul 2019 17:04:17 +0000 (12:04 -0500)] 
Fix 11: validate certificates against its corresponding CRL.

The OpenSSL function 'X509_STORE_CTX_set0_crls' wasn't taking into consideration the CRL stack; the simple way to check revocation was doing it manually.
Pay special attention to manifests, the CRL stack that's received when its EE is validated, is grandparent's CRL; so, in this case, validate manifests on its own CRLDP.

6 years agoRead and validate BGPsec router certificates
pcarana [Wed, 10 Jul 2019 22:48:31 +0000 (17:48 -0500)] 
Read and validate BGPsec router certificates

-Prepare structs and functions to send RTRv1 router key PDUs.
-Basic preparation to store router keys, still needs more work.
-Validate BGPsec certificates based on RFCs 8209 and 8608.
-Configure RTRv1 intervals (refresh, retry, expire), more validations and logic are pending.
-Update sorted array to allow iterations on its elements.

6 years agoUnify _layouts code. Adjust default layout design, add index menu to documentation.
Gerardo Pias [Tue, 9 Jul 2019 03:13:52 +0000 (00:13 -0300)] 
Unify _layouts code. Adjust default layout design, add index menu to documentation.
Unify css style sheets. Improve documentation style.

6 years agoRollback commit 9f07ee2 since this isn't a bug
pcarana [Thu, 4 Jul 2019 18:56:36 +0000 (13:56 -0500)] 
Rollback commit 9f07ee2 since this isn't a bug

6 years agoFix bug: ROAs ASN wasn't validated against the allowed advertising
pcarana [Wed, 3 Jul 2019 20:19:27 +0000 (15:19 -0500)] 
Fix bug: ROAs ASN wasn't validated against the allowed advertising

6 years agoAdd some small fixes.
pcarana [Tue, 2 Jul 2019 20:12:02 +0000 (15:12 -0500)] 
Add some small fixes.

-Update '--tal' and '--slurm' arguments doc.
-Update '-O' level to '2'.
-Remove unnecessary parameter '*serial' on 'vrps_foreach_base_roa'.

6 years agoDon't store downloaded URI when forcing rsync and log rsync'd URI
pcarana [Tue, 2 Jul 2019 19:44:38 +0000 (14:44 -0500)] 
Don't store downloaded URI when forcing rsync and log rsync'd URI

6 years agoAdd ROA eContent to debug, and parse asID just once
pcarana [Mon, 1 Jul 2019 21:46:23 +0000 (16:46 -0500)] 
Add ROA eContent to debug, and parse asID just once

6 years agoRetry rsync when a MFT has errors to avoid 'transient inconsistency'
pcarana [Mon, 1 Jul 2019 19:23:25 +0000 (14:23 -0500)] 
Retry rsync when a MFT has errors to avoid 'transient inconsistency'

6 years agoDetach clients threads after the connection is closed
pcarana [Fri, 28 Jun 2019 16:22:03 +0000 (11:22 -0500)] 
Detach clients threads after the connection is closed

6 years agoImprove the patch from the previous commit
Alberto Leiva Popper [Thu, 27 Jun 2019 20:27:59 +0000 (15:27 -0500)] 
Improve the patch from the previous commit

The solution was prone to revalidations, which (aside from slowing
things down a bit) yielded annoying duplicate validation error messages.

6 years agoPatch bad initialization of CRL stack
Alberto Leiva Popper [Thu, 27 Jun 2019 17:45:29 +0000 (12:45 -0500)] 
Patch bad initialization of CRL stack

6 years agoUpdate installation steps, patch OpenBSD compilation again v0.0.2
Alberto Leiva Popper [Fri, 14 Jun 2019 23:09:20 +0000 (18:09 -0500)] 
Update installation steps, patch OpenBSD compilation again

6 years agoReplace 'server.disabled' by 'mode' (server or standalone)
pcarana [Fri, 14 Jun 2019 23:07:49 +0000 (18:07 -0500)] 
Replace 'server.disabled' by 'mode' (server or standalone)

6 years agoRemove the libcmscodec dependency
Alberto Leiva Popper [Fri, 14 Jun 2019 17:47:26 +0000 (12:47 -0500)] 
Remove the libcmscodec dependency

libcmscodec's generated code is now git tracked by this repository. This
prevents lots of autotools and Debian package headaches, as well as
allowing us to prune large chunks of steps from the installation
recipes.

One of the reasons why we had the previous arrangement was because we
used to consider asn1c's output generated code, which meant we weren't
supposed to track it. However, the fact of the matter is that we'll
eventually need to tweak it manually, because we need to implement DER
parsing and better error message reporting, as well as improve the
quality of asn1c's code.

6 years agoFix warnings at man, fix bug: rsync wasn't executed on each validation
pcarana [Thu, 13 Jun 2019 20:49:05 +0000 (15:49 -0500)] 
Fix warnings at man, fix bug: rsync wasn't executed on each validation

6 years agoPatch lintian warnings, tweak documentation
Alberto Leiva Popper [Thu, 13 Jun 2019 17:42:22 +0000 (12:42 -0500)] 
Patch lintian warnings, tweak documentation

6 years agoUse flag ENABLE_STRICT_STRATEGY to allow strict sync strategy
pcarana [Wed, 12 Jun 2019 23:59:36 +0000 (18:59 -0500)] 
Use flag ENABLE_STRICT_STRATEGY to allow strict sync strategy

6 years agoFix #7, use --dirs by default and update 'strict' mode behavior.
pcarana [Wed, 12 Jun 2019 22:23:31 +0000 (17:23 -0500)] 
Fix #7, use --dirs by default and update 'strict' mode behavior.

If the mode is 'strict', download rsync URI if it hasn't been explicitly visited before.

6 years agoMerge branch 'systemd'
Alberto Leiva Popper [Tue, 11 Jun 2019 23:58:48 +0000 (18:58 -0500)] 
Merge branch 'systemd'

6 years agoAdd more installation options
Alberto Leiva Popper [Tue, 11 Jun 2019 23:07:03 +0000 (18:07 -0500)] 
Add more installation options

6 years agoUpdate manual, unit tests, and add some fixes.
pcarana [Tue, 11 Jun 2019 23:08:45 +0000 (18:08 -0500)] 
Update manual, unit tests, and add some fixes.

- Uncomment some unit tests and update them.
- Rename server.enabled flag to server.disabled, and update the flows affected by this update.
- Update version references to 0.0.1-beta.
- Update manual (man).
- Include automake as a Debian dependency.
- Validate PDU length received vs real bytes length received.
- Don't die if the PDU reader gets less bytes than what's expected.
- Remove 'crl_set' from rpp.c since the 'crl' is a pointer (the flag isn't necessary).
- Don't set SLURM comments as 'char const *', just as 'char *'.
- Print the ROAs to 'output.roa' after SLURM has been applied, or even when an error stopped validation (only the ROAs fetched to that point are printed).

6 years agoFix bug: segfault when no CRL was set
pcarana [Mon, 10 Jun 2019 21:26:55 +0000 (16:26 -0500)] 
Fix bug: segfault when no CRL was set

6 years agoPatch build bugs found while Debian-packaging
Alberto Leiva Popper [Thu, 6 Jun 2019 15:45:12 +0000 (10:45 -0500)] 
Patch build bugs found while Debian-packaging

The most important ones were

- Patch `make distclean`.
  test/'s distclean was attempting to clean stuff that src/'s
  distclean had already removed, so it was aborting.
  Fixed by moving needed .c's from test/Makefile.am to each
  test .c file.
  This prevents the unit tests from polluting src/.
- Simplify inclusion of unit tests during configure.
  Rather than purposedly include them with --with-unit-tests,
  they are now automatically included if Check is installed.
  This also removes a lot of clutter from configure.ac.

6 years agoAdd server.enabled and output.roa arguments, update server.address docs
pcarana [Wed, 5 Jun 2019 17:00:11 +0000 (12:00 -0500)] 
Add server.enabled and output.roa arguments, update server.address docs

Now to perform a standalone validation, the server must be disabled (server.enabled = false).
The ROAs in CSV format can be: printed to console (output.roa = '-'), printed to a file (output.roa = '<file>'), not printed (output.roa isn't configured).
'server.address' docs specify the scenario when no value is set to that argument.

6 years agoMerge branch 'iterative'
Alberto Leiva Popper [Tue, 4 Jun 2019 16:22:31 +0000 (11:22 -0500)] 
Merge branch 'iterative'

6 years agoMake pr_crit() non-returnable
Alberto Leiva Popper [Tue, 4 Jun 2019 16:09:47 +0000 (11:09 -0500)] 
Make pr_crit() non-returnable

Code was trying to recover from critical/programming errors, but
most of the time they were being handled the same as validation
errors. This yielded often nonsensical results.

Critical errors now terminate the program. This is obviously
undesired, but is probably safer than doing something close to
undefined.

6 years agoUpdate unit tests
Alberto Leiva Popper [Mon, 3 Jun 2019 22:44:58 +0000 (17:44 -0500)] 
Update unit tests

6 years agoRemove the reset and merge validation handler callbacks
Alberto Leiva Popper [Mon, 3 Jun 2019 21:50:31 +0000 (16:50 -0500)] 
Remove the reset and merge validation handler callbacks

The only certificate that can invalidate the tree is the root one.
This is because other certificates are considered subtrees, and
therefore isolated problems.

RFC 7730 seems to agree:

> If the connection to the preferred URI fails, or the retrieved CA
> certificate public key does not match the TAL public key, the RP
> SHOULD retrieve the CA certificate from the next URI

(Neither of those reasons can be caused by a subtree.)

By the time the first ROA is handled, the root certificate is
already validated. This means that Fort will never find itself
needing to invalidate previously handled ROAs. Hence, there's no
need to "reset" a ROA table nor "merge" it with a global one after
success.

Not having to track both a global and a temporal table also reduces
RAM usage.

6 years agoReplace recursive tree traversal with iterative one
Alberto Leiva Popper [Thu, 30 May 2019 22:16:34 +0000 (17:16 -0500)] 
Replace recursive tree traversal with iterative one

Prevents stack overflows on tall RPKI trees.

6 years agoRelocate VRPs override function, and complete unit tests.
pcarana [Sat, 1 Jun 2019 01:01:09 +0000 (20:01 -0500)] 
Relocate VRPs override function, and complete unit tests.

- The function that checks and removes VRPs that override eachother (before being sent by RTR), has been placed where VRPs functions are located.
- Fix the impersonator function that returns the minimum client serial.
- Add unit test to:
+   Check that deltas that won't be sent or used anymore, will be forgotten.
+   Check that a range of deltas that'll be sent by RTR, don't contain VRP announcements/withdrawals that override eachother.
+   Chech that a PDU with a wrong session ID is correctly handled.

6 years agoUpdate references to libcmscodec beta2
pcarana [Fri, 31 May 2019 16:34:04 +0000 (11:34 -0500)] 
Update references to libcmscodec beta2

6 years agoLog decoding errors only when requested
pcarana [Wed, 29 May 2019 20:11:05 +0000 (15:11 -0500)] 
Log decoding errors only when requested

6 years agoAdd CMS compatibility with PKCS #7 and fix debug log bug
pcarana [Wed, 29 May 2019 17:38:14 +0000 (12:38 -0500)] 
Add CMS compatibility with PKCS #7 and fix debug log bug

6 years agoAdd minor style change.
Gerardo Pias [Wed, 29 May 2019 13:33:26 +0000 (10:33 -0300)] 
Add minor style change.

6 years agoAdd minor style change to improve legibility.
Gerardo Pias [Tue, 28 May 2019 22:26:58 +0000 (19:26 -0300)] 
Add minor style change to improve legibility.

6 years agoAdd style adjustment to improve legibility.
Gerardo Pias [Tue, 28 May 2019 19:11:01 +0000 (16:11 -0300)] 
Add style adjustment to improve legibility.

6 years agoAdd styles and design following the guidelines for the FORT project.
Gerardo Pias [Mon, 27 May 2019 18:02:33 +0000 (15:02 -0300)] 
Add styles and design following the guidelines for the FORT project.