URI: 
       tMerge pull request #2303 from bauerj/ksk-2017 - electrum - Electrum Bitcoin wallet
  HTML git clone https://git.parazyd.org/electrum
   DIR Log
   DIR Files
   DIR Refs
   DIR Submodules
       ---
   DIR commit 2323abb7698e5ffaa27d262f11564e62db1066d4
   DIR parent 107adb186f0832707cc8f7751591b4931de2e945
  HTML Author: ThomasV <thomasv@electrum.org>
       Date:   Thu, 16 Mar 2017 18:59:20 +0100
       
       Merge pull request #2303 from bauerj/ksk-2017
       
       Add KSK-2017 to dnssec trust anchors and accept either of the two
       Diffstat:
         M lib/dnssec.py                       |      24 +++++++++++++++++++-----
       
       1 file changed, 19 insertions(+), 5 deletions(-)
       ---
   DIR diff --git a/lib/dnssec.py b/lib/dnssec.py
       t@@ -185,9 +185,13 @@ dns.dnssec.validate = dns.dnssec._validate
        from util import print_error
        
        
       -# hard-coded root KSK
       -root_KSK = dns.rrset.from_text('.', 15202, 'IN', 'DNSKEY', '257 3 8 AwEAAagAIKlVZrpC6Ia7gEzahOR+9W29euxhJhVVLOyQbSEW0O8gcCjF FVQUTf6v58fLjwBd0YI0EzrAcQqBGCzh/RStIoO8g0NfnfL2MTJRkxoX bfDaUeVPQuYEhg37NZWAJQ9VnMVDxP/VHL496M/QZxkjf5/Efucp2gaD X6RS6CXpoY68LsvPVjR0ZSwzz1apAzvN9dlzEheX7ICJBBtuA6G3LQpz W5hOA2hzCTMjJPJ8LbqF6dsV6DoBQzgul0sGIcGOYl7OyQdXfZ57relS Qageu+ipAdTTJ25AsRTAoub8ONGcLmqrAmRLKBP1dfwhYB4N7knNnulq QxA+Uk1ihz0=')
       -
       +# hard-coded trust anchors (root KSKs)
       +trust_anchors = [
       +    # KSK-2017:
       +    dns.rrset.from_text('.', 1    , 'IN', 'DNSKEY', '257 3 8 AwEAAaz/tAm8yTn4Mfeh5eyI96WSVexTBAvkMgJzkKTOiW1vkIbzxeF3+/4RgWOq7HrxRixHlFlExOLAJr5emLvN7SWXgnLh4+B5xQlNVz8Og8kvArMtNROxVQuCaSnIDdD5LKyWbRd2n9WGe2R8PzgCmr3EgVLrjyBxWezF0jLHwVN8efS3rCj/EWgvIWgb9tarpVUDK/b58Da+sqqls3eNbuv7pr+eoZG+SrDK6nWeL3c6H5Apxz7LjVc1uTIdsIXxuOLYA4/ilBmSVIzuDWfdRUfhHdY6+cn8HFRm+2hM8AnXGXws9555KrUB5qihylGa8subX2Nn6UwNR1AkUTV74bU='),
       +    # KSK-2010:
       +    dns.rrset.from_text('.', 15202, 'IN', 'DNSKEY', '257 3 8 AwEAAagAIKlVZrpC6Ia7gEzahOR+9W29euxhJhVVLOyQbSEW0O8gcCjF FVQUTf6v58fLjwBd0YI0EzrAcQqBGCzh/RStIoO8g0NfnfL2MTJRkxoX bfDaUeVPQuYEhg37NZWAJQ9VnMVDxP/VHL496M/QZxkjf5/Efucp2gaD X6RS6CXpoY68LsvPVjR0ZSwzz1apAzvN9dlzEheX7ICJBBtuA6G3LQpz W5hOA2hzCTMjJPJ8LbqF6dsV6DoBQzgul0sGIcGOYl7OyQdXfZ57relS Qageu+ipAdTTJ25AsRTAoub8ONGcLmqrAmRLKBP1dfwhYB4N7knNnulq QxA+Uk1ihz0='),
       +]
        
        
        def check_query(ns, sub, _type, keys):
       t@@ -210,8 +214,18 @@ def check_query(ns, sub, _type, keys):
        
        
        def get_and_validate(ns, url, _type):
       -    # get trusted root keys
       -    root_rrset = check_query(ns, '', dns.rdatatype.DNSKEY, {dns.name.root: root_KSK})
       +    # get trusted root key
       +    root_rrset = None
       +    for dnskey_rr in trust_anchors:
       +        try:
       +            # Check if there is a valid signature for the root dnskey
       +            root_rrset = check_query(ns, '', dns.rdatatype.DNSKEY, {dns.name.root: dnskey_rr})
       +            break
       +        except dns.dnssec.ValidationFailure:
       +            # It's OK as long as one key validates
       +            continue
       +    if not root_rrset:
       +        raise dns.dnssec.ValidationFailure('None of the trust anchors found in DNS')
            keys = {dns.name.root: root_rrset}
            # top-down verification
            parts = url.split('.')