2000-05-17 22:38:50 +00:00
|
|
|
#!/bin/sh
|
2000-05-19 22:45:47 +00:00
|
|
|
#
|
2010-01-18 23:48:40 +00:00
|
|
|
# Copyright (C) 2004-2010 Internet Systems Consortium, Inc. ("ISC")
|
2002-02-20 03:35:59 +00:00
|
|
|
# Copyright (C) 2000-2002 Internet Software Consortium.
|
2000-08-01 01:33:37 +00:00
|
|
|
#
|
2007-06-18 23:47:57 +00:00
|
|
|
# Permission to use, copy, modify, and/or distribute this software for any
|
2000-05-19 22:45:47 +00:00
|
|
|
# purpose with or without fee is hereby granted, provided that the above
|
|
|
|
# copyright notice and this permission notice appear in all copies.
|
2000-08-01 01:33:37 +00:00
|
|
|
#
|
2004-03-05 05:14:21 +00:00
|
|
|
# THE SOFTWARE IS PROVIDED "AS IS" AND ISC DISCLAIMS ALL WARRANTIES WITH
|
|
|
|
# REGARD TO THIS SOFTWARE INCLUDING ALL IMPLIED WARRANTIES OF MERCHANTABILITY
|
|
|
|
# AND FITNESS. IN NO EVENT SHALL ISC BE LIABLE FOR ANY SPECIAL, DIRECT,
|
|
|
|
# INDIRECT, OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES WHATSOEVER RESULTING FROM
|
|
|
|
# LOSS OF USE, DATA OR PROFITS, WHETHER IN AN ACTION OF CONTRACT, NEGLIGENCE
|
|
|
|
# OR OTHER TORTIOUS ACTION, ARISING OUT OF OR IN CONNECTION WITH THE USE OR
|
|
|
|
# PERFORMANCE OF THIS SOFTWARE.
|
|
|
|
|
2010-09-07 00:58:36 +00:00
|
|
|
# $Id: tests.sh,v 1.70 2010/09/07 00:58:35 marka Exp $
|
2000-05-17 22:38:50 +00:00
|
|
|
|
2000-06-05 19:36:44 +00:00
|
|
|
SYSTEMTESTTOP=..
|
|
|
|
. $SYSTEMTESTTOP/conf.sh
|
|
|
|
|
2000-06-05 19:07:46 +00:00
|
|
|
status=0
|
2000-07-08 00:39:17 +00:00
|
|
|
n=0
|
2000-05-17 22:38:50 +00:00
|
|
|
|
2000-05-18 22:49:29 +00:00
|
|
|
rm -f dig.out.*
|
2000-05-17 22:38:50 +00:00
|
|
|
|
2002-06-17 04:01:37 +00:00
|
|
|
DIGOPTS="+tcp +noadd +nosea +nostat +nocmd +dnssec -p 5300"
|
2000-06-06 23:41:55 +00:00
|
|
|
|
2000-05-17 22:38:50 +00:00
|
|
|
# Check the example. domain
|
2000-07-27 23:22:35 +00:00
|
|
|
|
|
|
|
echo "I:checking that zone transfer worked ($n)"
|
2000-07-10 21:40:16 +00:00
|
|
|
ret=0
|
|
|
|
$DIG $DIGOPTS a.example. @10.53.0.2 a > dig.out.ns2.test$n || ret=1
|
|
|
|
$DIG $DIGOPTS a.example. @10.53.0.3 a > dig.out.ns3.test$n || ret=1
|
|
|
|
$PERL ../digcomp.pl dig.out.ns2.test$n dig.out.ns3.test$n || ret=1
|
2000-07-08 00:39:17 +00:00
|
|
|
n=`expr $n + 1`
|
2000-07-10 21:40:16 +00:00
|
|
|
if [ $ret != 0 ]; then echo "I:failed"; fi
|
|
|
|
status=`expr $status + $ret`
|
|
|
|
|
2010-01-18 19:19:31 +00:00
|
|
|
# test AD bit:
|
|
|
|
# - dig +adflag asks for authentication (ad in response)
|
|
|
|
echo "I:checking AD bit asking for validation ($n)"
|
|
|
|
ret=0
|
|
|
|
$DIG $DIGOPTS +noauth +noadd +nodnssec +adflag a.example. @10.53.0.2 a > dig.out.ns2.test$n || ret=1
|
|
|
|
$DIG $DIGOPTS +noauth +noadd +nodnssec +adflag a.example. @10.53.0.4 a > dig.out.ns4.test$n || ret=1
|
|
|
|
$PERL ../digcomp.pl dig.out.ns2.test$n dig.out.ns4.test$n || ret=1
|
|
|
|
grep "flags:.*ad.*QUERY" dig.out.ns4.test$n > /dev/null || ret=1
|
|
|
|
n=`expr $n + 1`
|
|
|
|
if [ $ret != 0 ]; then echo "I:failed"; fi
|
|
|
|
status=`expr $status + $ret`
|
|
|
|
|
|
|
|
echo "I:checking for AD in authoritative answer ($n)"
|
|
|
|
ret=0
|
|
|
|
$DIG $DIGOPTS a.example. @10.53.0.2 a > dig.out.ns2.test$n || ret=1
|
|
|
|
grep "flags:.*ad.*QUERY" dig.out.ns2.test$n > /dev/null && ret=1
|
|
|
|
n=`expr $n + 1`
|
|
|
|
if [ $ret != 0 ]; then echo "I:failed"; fi
|
|
|
|
status=`expr $status + $ret`
|
|
|
|
|
2008-09-24 02:46:23 +00:00
|
|
|
echo "I:checking positive validation NSEC ($n)"
|
2000-07-10 21:40:16 +00:00
|
|
|
ret=0
|
|
|
|
$DIG $DIGOPTS +noauth a.example. @10.53.0.2 a > dig.out.ns2.test$n || ret=1
|
|
|
|
$DIG $DIGOPTS +noauth a.example. @10.53.0.4 a > dig.out.ns4.test$n || ret=1
|
|
|
|
$PERL ../digcomp.pl dig.out.ns2.test$n dig.out.ns4.test$n || ret=1
|
2000-07-27 23:22:35 +00:00
|
|
|
grep "flags:.*ad.*QUERY" dig.out.ns4.test$n > /dev/null || ret=1
|
|
|
|
n=`expr $n + 1`
|
|
|
|
if [ $ret != 0 ]; then echo "I:failed"; fi
|
|
|
|
status=`expr $status + $ret`
|
|
|
|
|
2008-09-24 02:46:23 +00:00
|
|
|
echo "I:checking positive validation NSEC3 ($n)"
|
|
|
|
ret=0
|
|
|
|
$DIG $DIGOPTS +noauth a.nsec3.example. \
|
|
|
|
@10.53.0.3 a > dig.out.ns3.test$n || ret=1
|
|
|
|
$DIG $DIGOPTS +noauth a.nsec3.example. \
|
|
|
|
@10.53.0.4 a > dig.out.ns4.test$n || ret=1
|
|
|
|
$PERL ../digcomp.pl dig.out.ns3.test$n dig.out.ns4.test$n || ret=1
|
|
|
|
grep "flags:.*ad.*QUERY" dig.out.ns4.test$n > /dev/null || ret=1
|
|
|
|
n=`expr $n + 1`
|
|
|
|
if [ $ret != 0 ]; then echo "I:failed"; fi
|
|
|
|
status=`expr $status + $ret`
|
|
|
|
|
|
|
|
echo "I:checking positive validation OPTOUT ($n)"
|
|
|
|
ret=0
|
|
|
|
$DIG $DIGOPTS +noauth a.optout.example. \
|
|
|
|
@10.53.0.3 a > dig.out.ns3.test$n || ret=1
|
|
|
|
$DIG $DIGOPTS +noauth a.optout.example. \
|
|
|
|
@10.53.0.4 a > dig.out.ns4.test$n || ret=1
|
|
|
|
$PERL ../digcomp.pl dig.out.ns3.test$n dig.out.ns4.test$n || ret=1
|
|
|
|
grep "flags:.*ad.*QUERY" dig.out.ns4.test$n > /dev/null || ret=1
|
|
|
|
n=`expr $n + 1`
|
|
|
|
if [ $ret != 0 ]; then echo "I:failed"; fi
|
|
|
|
status=`expr $status + $ret`
|
|
|
|
|
|
|
|
echo "I:checking positive wildcard validation NSEC ($n)"
|
2004-01-14 02:06:51 +00:00
|
|
|
ret=0
|
|
|
|
$DIG $DIGOPTS a.wild.example. @10.53.0.2 a > dig.out.ns2.test$n || ret=1
|
|
|
|
$DIG $DIGOPTS a.wild.example. @10.53.0.4 a > dig.out.ns4.test$n || ret=1
|
|
|
|
$PERL ../digcomp.pl dig.out.ns2.test$n dig.out.ns4.test$n || ret=1
|
|
|
|
grep "flags:.*ad.*QUERY" dig.out.ns4.test$n > /dev/null || ret=1
|
2008-09-24 02:46:23 +00:00
|
|
|
grep "status: NOERROR" dig.out.ns4.test$n > /dev/null || ret=1
|
|
|
|
n=`expr $n + 1`
|
|
|
|
if [ $ret != 0 ]; then echo "I:failed"; fi
|
|
|
|
status=`expr $status + $ret`
|
|
|
|
|
|
|
|
echo "I:checking positive wildcard validation NSEC3 ($n)"
|
|
|
|
ret=0
|
|
|
|
$DIG $DIGOPTS a.wild.nsec3.example. @10.53.0.3 a > dig.out.ns3.test$n || ret=1
|
|
|
|
$DIG $DIGOPTS a.wild.nsec3.example. @10.53.0.4 a > dig.out.ns4.test$n || ret=1
|
|
|
|
$PERL ../digcomp.pl dig.out.ns3.test$n dig.out.ns4.test$n || ret=1
|
|
|
|
grep "flags:.*ad.*QUERY" dig.out.ns4.test$n > /dev/null || ret=1
|
|
|
|
grep "status: NOERROR" dig.out.ns4.test$n > /dev/null || ret=1
|
|
|
|
n=`expr $n + 1`
|
|
|
|
if [ $ret != 0 ]; then echo "I:failed"; fi
|
|
|
|
status=`expr $status + $ret`
|
|
|
|
|
|
|
|
echo "I:checking positive wildcard validation OPTOUT ($n)"
|
|
|
|
ret=0
|
|
|
|
$DIG $DIGOPTS a.wild.optout.example. \
|
|
|
|
@10.53.0.3 a > dig.out.ns3.test$n || ret=1
|
|
|
|
$DIG $DIGOPTS a.wild.optout.example. \
|
|
|
|
@10.53.0.4 a > dig.out.ns4.test$n || ret=1
|
|
|
|
$PERL ../digcomp.pl dig.out.ns3.test$n dig.out.ns4.test$n || ret=1
|
|
|
|
grep "flags:.*ad.*QUERY" dig.out.ns4.test$n > /dev/null || ret=1
|
|
|
|
grep "status: NOERROR" dig.out.ns4.test$n > /dev/null || ret=1
|
2004-01-14 02:06:51 +00:00
|
|
|
n=`expr $n + 1`
|
|
|
|
if [ $ret != 0 ]; then echo "I:failed"; fi
|
|
|
|
status=`expr $status + $ret`
|
|
|
|
|
2008-09-24 02:46:23 +00:00
|
|
|
echo "I:checking negative validation NXDOMAIN NSEC ($n)"
|
2000-07-27 23:22:35 +00:00
|
|
|
ret=0
|
|
|
|
$DIG $DIGOPTS +noauth q.example. @10.53.0.2 a > dig.out.ns2.test$n || ret=1
|
|
|
|
$DIG $DIGOPTS +noauth q.example. @10.53.0.4 a > dig.out.ns4.test$n || ret=1
|
|
|
|
$PERL ../digcomp.pl dig.out.ns2.test$n dig.out.ns4.test$n || ret=1
|
|
|
|
grep "flags:.*ad.*QUERY" dig.out.ns4.test$n > /dev/null || ret=1
|
2008-09-24 02:46:23 +00:00
|
|
|
grep "status: NXDOMAIN" dig.out.ns4.test$n > /dev/null || ret=1
|
|
|
|
n=`expr $n + 1`
|
|
|
|
if [ $ret != 0 ]; then echo "I:failed"; fi
|
|
|
|
status=`expr $status + $ret`
|
|
|
|
|
|
|
|
echo "I:checking negative validation NXDOMAIN NSEC3 ($n)"
|
|
|
|
ret=0
|
|
|
|
$DIG $DIGOPTS +noauth q.nsec3.example. \
|
|
|
|
@10.53.0.3 a > dig.out.ns3.test$n || ret=1
|
|
|
|
$DIG $DIGOPTS +noauth q.nsec3.example. \
|
|
|
|
@10.53.0.4 a > dig.out.ns4.test$n || ret=1
|
|
|
|
$PERL ../digcomp.pl dig.out.ns3.test$n dig.out.ns4.test$n || ret=1
|
|
|
|
grep "flags:.*ad.*QUERY" dig.out.ns4.test$n > /dev/null || ret=1
|
|
|
|
grep "status: NXDOMAIN" dig.out.ns4.test$n > /dev/null || ret=1
|
|
|
|
n=`expr $n + 1`
|
|
|
|
if [ $ret != 0 ]; then echo "I:failed"; fi
|
|
|
|
status=`expr $status + $ret`
|
|
|
|
|
|
|
|
echo "I:checking negative validation NXDOMAIN OPTOUT ($n)"
|
|
|
|
ret=0
|
|
|
|
$DIG $DIGOPTS +noauth q.optout.example. \
|
|
|
|
@10.53.0.3 a > dig.out.ns3.test$n || ret=1
|
|
|
|
$DIG $DIGOPTS +noauth q.optout.example. \
|
|
|
|
@10.53.0.4 a > dig.out.ns4.test$n || ret=1
|
|
|
|
$PERL ../digcomp.pl dig.out.ns3.test$n dig.out.ns4.test$n || ret=1
|
|
|
|
grep "status: NXDOMAIN" dig.out.ns4.test$n > /dev/null || ret=1
|
|
|
|
# Note - this is looking for failure, hence the &&
|
|
|
|
grep "flags:.*ad.*QUERY" dig.out.ns4.test$n > /dev/null && ret=1
|
|
|
|
n=`expr $n + 1`
|
|
|
|
if [ $ret != 0 ]; then echo "I:failed"; fi
|
|
|
|
status=`expr $status + $ret`
|
|
|
|
|
|
|
|
echo "I:checking negative validation NODATA NSEC ($n)"
|
|
|
|
ret=0
|
|
|
|
$DIG $DIGOPTS +noauth a.example. @10.53.0.2 txt > dig.out.ns2.test$n || ret=1
|
|
|
|
$DIG $DIGOPTS +noauth a.example. @10.53.0.4 txt > dig.out.ns4.test$n || ret=1
|
|
|
|
$PERL ../digcomp.pl dig.out.ns2.test$n dig.out.ns4.test$n || ret=1
|
|
|
|
grep "flags:.*ad.*QUERY" dig.out.ns4.test$n > /dev/null || ret=1
|
|
|
|
grep "status: NOERROR" dig.out.ns4.test$n > /dev/null || ret=1
|
|
|
|
grep "ANSWER: 0" dig.out.ns4.test$n > /dev/null || ret=1
|
|
|
|
n=`expr $n + 1`
|
|
|
|
if [ $ret != 0 ]; then echo "I:failed"; fi
|
|
|
|
status=`expr $status + $ret`
|
|
|
|
|
|
|
|
echo "I:checking negative validation NODATA NSEC3 ($n)"
|
|
|
|
ret=0
|
|
|
|
$DIG $DIGOPTS +noauth a.nsec3.example. \
|
|
|
|
@10.53.0.3 txt > dig.out.ns3.test$n || ret=1
|
|
|
|
$DIG $DIGOPTS +noauth a.nsec3.example. \
|
|
|
|
@10.53.0.4 txt > dig.out.ns4.test$n || ret=1
|
|
|
|
$PERL ../digcomp.pl dig.out.ns3.test$n dig.out.ns4.test$n || ret=1
|
|
|
|
grep "flags:.*ad.*QUERY" dig.out.ns4.test$n > /dev/null || ret=1
|
|
|
|
grep "status: NOERROR" dig.out.ns4.test$n > /dev/null || ret=1
|
|
|
|
grep "ANSWER: 0" dig.out.ns4.test$n > /dev/null || ret=1
|
|
|
|
n=`expr $n + 1`
|
|
|
|
if [ $ret != 0 ]; then echo "I:failed"; fi
|
|
|
|
status=`expr $status + $ret`
|
|
|
|
|
|
|
|
echo "I:checking negative validation NODATA OPTOUT ($n)"
|
|
|
|
ret=0
|
|
|
|
$DIG $DIGOPTS +noauth a.optout.example. \
|
|
|
|
@10.53.0.3 txt > dig.out.ns3.test$n || ret=1
|
|
|
|
$DIG $DIGOPTS +noauth a.optout.example. \
|
|
|
|
@10.53.0.4 txt > dig.out.ns4.test$n || ret=1
|
|
|
|
$PERL ../digcomp.pl dig.out.ns3.test$n dig.out.ns4.test$n || ret=1
|
|
|
|
grep "flags:.*ad.*QUERY" dig.out.ns4.test$n > /dev/null || ret=1
|
|
|
|
grep "status: NOERROR" dig.out.ns4.test$n > /dev/null || ret=1
|
|
|
|
grep "ANSWER: 0" dig.out.ns4.test$n > /dev/null || ret=1
|
2000-07-08 00:39:17 +00:00
|
|
|
n=`expr $n + 1`
|
2000-07-10 21:40:16 +00:00
|
|
|
if [ $ret != 0 ]; then echo "I:failed"; fi
|
|
|
|
status=`expr $status + $ret`
|
2000-05-18 22:49:29 +00:00
|
|
|
|
2008-09-24 02:46:23 +00:00
|
|
|
echo "I:checking negative wildcard validation NSEC ($n)"
|
2004-01-14 02:06:51 +00:00
|
|
|
ret=0
|
|
|
|
$DIG $DIGOPTS b.wild.example. @10.53.0.2 txt > dig.out.ns2.test$n || ret=1
|
|
|
|
$DIG $DIGOPTS b.wild.example. @10.53.0.4 txt > dig.out.ns4.test$n || ret=1
|
|
|
|
$PERL ../digcomp.pl dig.out.ns2.test$n dig.out.ns4.test$n || ret=1
|
|
|
|
grep "flags:.*ad.*QUERY" dig.out.ns4.test$n > /dev/null || ret=1
|
2008-09-24 02:46:23 +00:00
|
|
|
grep "status: NOERROR" dig.out.ns4.test$n > /dev/null || ret=1
|
|
|
|
n=`expr $n + 1`
|
|
|
|
if [ $ret != 0 ]; then echo "I:failed"; fi
|
|
|
|
status=`expr $status + $ret`
|
|
|
|
|
|
|
|
echo "I:checking negative wildcard validation NSEC3 ($n)"
|
|
|
|
ret=0
|
|
|
|
$DIG $DIGOPTS b.wild.nsec3.example. @10.53.0.3 txt > dig.out.ns3.test$n || ret=1
|
|
|
|
$DIG $DIGOPTS b.wild.nsec3.example. @10.53.0.4 txt > dig.out.ns4.test$n || ret=1
|
|
|
|
$PERL ../digcomp.pl dig.out.ns3.test$n dig.out.ns4.test$n || ret=1
|
|
|
|
grep "flags:.*ad.*QUERY" dig.out.ns4.test$n > /dev/null || ret=1
|
|
|
|
n=`expr $n + 1`
|
|
|
|
if [ $ret != 0 ]; then echo "I:failed"; fi
|
|
|
|
status=`expr $status + $ret`
|
|
|
|
|
|
|
|
echo "I:checking negative wildcard validation OPTOUT ($n)"
|
|
|
|
ret=0
|
|
|
|
$DIG $DIGOPTS b.wild.optout.example. \
|
|
|
|
@10.53.0.3 txt > dig.out.ns3.test$n || ret=1
|
|
|
|
$DIG $DIGOPTS b.wild.optout.example. \
|
|
|
|
@10.53.0.4 txt > dig.out.ns4.test$n || ret=1
|
|
|
|
$PERL ../digcomp.pl dig.out.ns3.test$n dig.out.ns4.test$n || ret=1
|
|
|
|
grep "status: NOERROR" dig.out.ns4.test$n > /dev/null || ret=1
|
|
|
|
# Note - this is looking for failure, hence the &&
|
|
|
|
grep "flags:.*ad.*QUERY" dig.out.ns4.test$n > /dev/null && ret=1
|
2004-01-14 02:06:51 +00:00
|
|
|
n=`expr $n + 1`
|
|
|
|
if [ $ret != 0 ]; then echo "I:failed"; fi
|
|
|
|
status=`expr $status + $ret`
|
|
|
|
|
2000-05-18 22:49:29 +00:00
|
|
|
# Check the insecure.example domain
|
|
|
|
|
2008-09-24 02:46:23 +00:00
|
|
|
echo "I:checking 1-server insecurity proof NSEC ($n)"
|
2000-07-10 21:40:16 +00:00
|
|
|
ret=0
|
2002-07-19 06:20:24 +00:00
|
|
|
$DIG $DIGOPTS +noauth a.insecure.example. @10.53.0.3 a > dig.out.ns3.test$n || ret=1
|
|
|
|
$DIG $DIGOPTS +noauth a.insecure.example. @10.53.0.4 a > dig.out.ns4.test$n || ret=1
|
2000-07-10 21:40:16 +00:00
|
|
|
$PERL ../digcomp.pl dig.out.ns3.test$n dig.out.ns4.test$n || ret=1
|
2001-01-04 00:24:26 +00:00
|
|
|
grep "status: NOERROR" dig.out.ns4.test$n > /dev/null || ret=1
|
|
|
|
# Note - this is looking for failure, hence the &&
|
|
|
|
grep "flags:.*ad.*QUERY" dig.out.ns4.test$n > /dev/null && ret=1
|
2000-07-08 00:39:17 +00:00
|
|
|
n=`expr $n + 1`
|
2000-07-10 21:40:16 +00:00
|
|
|
if [ $ret != 0 ]; then echo "I:failed"; fi
|
|
|
|
status=`expr $status + $ret`
|
2000-05-18 22:49:29 +00:00
|
|
|
|
2008-09-24 02:46:23 +00:00
|
|
|
echo "I:checking 1-server insecurity proof NSEC3 ($n)"
|
|
|
|
ret=0
|
|
|
|
$DIG $DIGOPTS +noauth a.insecure.nsec3.example. @10.53.0.3 a > dig.out.ns3.test$n || ret=1
|
|
|
|
$DIG $DIGOPTS +noauth a.insecure.nsec3.example. @10.53.0.4 a > dig.out.ns4.test$n || ret=1
|
|
|
|
$PERL ../digcomp.pl dig.out.ns3.test$n dig.out.ns4.test$n || ret=1
|
|
|
|
grep "status: NOERROR" dig.out.ns4.test$n > /dev/null || ret=1
|
|
|
|
# Note - this is looking for failure, hence the &&
|
|
|
|
grep "flags:.*ad.*QUERY" dig.out.ns4.test$n > /dev/null && ret=1
|
|
|
|
n=`expr $n + 1`
|
|
|
|
if [ $ret != 0 ]; then echo "I:failed"; fi
|
|
|
|
status=`expr $status + $ret`
|
|
|
|
|
|
|
|
echo "I:checking 1-server insecurity proof OPTOUT ($n)"
|
|
|
|
ret=0
|
|
|
|
$DIG $DIGOPTS +noauth a.insecure.optout.example. @10.53.0.3 a > dig.out.ns3.test$n || ret=1
|
|
|
|
$DIG $DIGOPTS +noauth a.insecure.optout.example. @10.53.0.4 a > dig.out.ns4.test$n || ret=1
|
|
|
|
$PERL ../digcomp.pl dig.out.ns3.test$n dig.out.ns4.test$n || ret=1
|
|
|
|
grep "status: NOERROR" dig.out.ns4.test$n > /dev/null || ret=1
|
|
|
|
# Note - this is looking for failure, hence the &&
|
|
|
|
grep "flags:.*ad.*QUERY" dig.out.ns4.test$n > /dev/null && ret=1
|
|
|
|
n=`expr $n + 1`
|
|
|
|
if [ $ret != 0 ]; then echo "I:failed"; fi
|
|
|
|
status=`expr $status + $ret`
|
|
|
|
|
|
|
|
echo "I:checking 1-server negative insecurity proof NSEC ($n)"
|
2002-07-19 06:20:24 +00:00
|
|
|
ret=0
|
|
|
|
$DIG $DIGOPTS q.insecure.example. a @10.53.0.3 \
|
|
|
|
> dig.out.ns3.test$n || ret=1
|
|
|
|
$DIG $DIGOPTS q.insecure.example. a @10.53.0.4 \
|
|
|
|
> dig.out.ns4.test$n || ret=1
|
|
|
|
$PERL ../digcomp.pl dig.out.ns3.test$n dig.out.ns4.test$n || ret=1
|
|
|
|
grep "status: NXDOMAIN" dig.out.ns4.test$n > /dev/null || ret=1
|
|
|
|
# Note - this is looking for failure, hence the &&
|
|
|
|
grep "flags:.*ad.*QUERY" dig.out.ns4.test$n > /dev/null && ret=1
|
|
|
|
n=`expr $n + 1`
|
|
|
|
if [ $ret != 0 ]; then echo "I:failed"; fi
|
|
|
|
status=`expr $status + $ret`
|
|
|
|
|
2008-09-24 02:46:23 +00:00
|
|
|
echo "I:checking 1-server negative insecurity proof NSEC3 ($n)"
|
|
|
|
ret=0
|
|
|
|
$DIG $DIGOPTS q.insecure.nsec3.example. a @10.53.0.3 \
|
|
|
|
> dig.out.ns3.test$n || ret=1
|
|
|
|
$DIG $DIGOPTS q.insecure.nsec3.example. a @10.53.0.4 \
|
|
|
|
> dig.out.ns4.test$n || ret=1
|
|
|
|
$PERL ../digcomp.pl dig.out.ns3.test$n dig.out.ns4.test$n || ret=1
|
|
|
|
grep "status: NXDOMAIN" dig.out.ns4.test$n > /dev/null || ret=1
|
|
|
|
# Note - this is looking for failure, hence the &&
|
|
|
|
grep "flags:.*ad.*QUERY" dig.out.ns4.test$n > /dev/null && ret=1
|
|
|
|
n=`expr $n + 1`
|
|
|
|
if [ $ret != 0 ]; then echo "I:failed"; fi
|
|
|
|
status=`expr $status + $ret`
|
|
|
|
|
|
|
|
echo "I:checking 1-server negative insecurity proof OPTOUT ($n)"
|
|
|
|
ret=0
|
|
|
|
$DIG $DIGOPTS q.insecure.optout.example. a @10.53.0.3 \
|
|
|
|
> dig.out.ns3.test$n || ret=1
|
|
|
|
$DIG $DIGOPTS q.insecure.optout.example. a @10.53.0.4 \
|
|
|
|
> dig.out.ns4.test$n || ret=1
|
|
|
|
$PERL ../digcomp.pl dig.out.ns3.test$n dig.out.ns4.test$n || ret=1
|
|
|
|
grep "status: NXDOMAIN" dig.out.ns4.test$n > /dev/null || ret=1
|
|
|
|
# Note - this is looking for failure, hence the &&
|
|
|
|
grep "flags:.*ad.*QUERY" dig.out.ns4.test$n > /dev/null && ret=1
|
|
|
|
n=`expr $n + 1`
|
|
|
|
if [ $ret != 0 ]; then echo "I:failed"; fi
|
|
|
|
status=`expr $status + $ret`
|
|
|
|
|
|
|
|
echo "I:checking 1-server negative insecurity proof with SOA hack NSEC ($n)"
|
2002-07-19 06:20:24 +00:00
|
|
|
ret=0
|
|
|
|
$DIG $DIGOPTS r.insecure.example. soa @10.53.0.3 \
|
|
|
|
> dig.out.ns3.test$n || ret=1
|
|
|
|
$DIG $DIGOPTS r.insecure.example. soa @10.53.0.4 \
|
|
|
|
> dig.out.ns4.test$n || ret=1
|
|
|
|
$PERL ../digcomp.pl dig.out.ns3.test$n dig.out.ns4.test$n || ret=1
|
|
|
|
grep "status: NXDOMAIN" dig.out.ns4.test$n > /dev/null || ret=1
|
2008-09-24 02:46:23 +00:00
|
|
|
grep "0 IN SOA" dig.out.ns4.test$n > /dev/null || ret=1
|
|
|
|
# Note - this is looking for failure, hence the &&
|
|
|
|
grep "flags:.*ad.*QUERY" dig.out.ns4.test$n > /dev/null && ret=1
|
|
|
|
n=`expr $n + 1`
|
|
|
|
if [ $ret != 0 ]; then echo "I:failed"; fi
|
|
|
|
status=`expr $status + $ret`
|
|
|
|
|
|
|
|
echo "I:checking 1-server negative insecurity proof with SOA hack NSEC3 ($n)"
|
|
|
|
ret=0
|
|
|
|
$DIG $DIGOPTS r.insecure.nsec3.example. soa @10.53.0.3 \
|
|
|
|
> dig.out.ns3.test$n || ret=1
|
|
|
|
$DIG $DIGOPTS r.insecure.nsec3.example. soa @10.53.0.4 \
|
|
|
|
> dig.out.ns4.test$n || ret=1
|
|
|
|
$PERL ../digcomp.pl dig.out.ns3.test$n dig.out.ns4.test$n || ret=1
|
|
|
|
grep "status: NXDOMAIN" dig.out.ns4.test$n > /dev/null || ret=1
|
|
|
|
grep "0 IN SOA" dig.out.ns4.test$n > /dev/null || ret=1
|
|
|
|
# Note - this is looking for failure, hence the &&
|
|
|
|
grep "flags:.*ad.*QUERY" dig.out.ns4.test$n > /dev/null && ret=1
|
|
|
|
n=`expr $n + 1`
|
|
|
|
if [ $ret != 0 ]; then echo "I:failed"; fi
|
|
|
|
status=`expr $status + $ret`
|
|
|
|
|
|
|
|
echo "I:checking 1-server negative insecurity proof with SOA hack OPTOUT ($n)"
|
|
|
|
ret=0
|
|
|
|
$DIG $DIGOPTS r.insecure.optout.example. soa @10.53.0.3 \
|
|
|
|
> dig.out.ns3.test$n || ret=1
|
|
|
|
$DIG $DIGOPTS r.insecure.optout.example. soa @10.53.0.4 \
|
|
|
|
> dig.out.ns4.test$n || ret=1
|
|
|
|
$PERL ../digcomp.pl dig.out.ns3.test$n dig.out.ns4.test$n || ret=1
|
|
|
|
grep "status: NXDOMAIN" dig.out.ns4.test$n > /dev/null || ret=1
|
|
|
|
grep "0 IN SOA" dig.out.ns4.test$n > /dev/null || ret=1
|
2002-07-19 06:20:24 +00:00
|
|
|
# Note - this is looking for failure, hence the &&
|
|
|
|
grep "flags:.*ad.*QUERY" dig.out.ns4.test$n > /dev/null && ret=1
|
|
|
|
n=`expr $n + 1`
|
|
|
|
if [ $ret != 0 ]; then echo "I:failed"; fi
|
|
|
|
status=`expr $status + $ret`
|
|
|
|
|
2000-05-18 22:49:29 +00:00
|
|
|
# Check the secure.example domain
|
|
|
|
|
2008-09-24 02:46:23 +00:00
|
|
|
echo "I:checking multi-stage positive validation NSEC/NSEC ($n)"
|
|
|
|
ret=0
|
|
|
|
$DIG $DIGOPTS +noauth a.secure.example. \
|
|
|
|
@10.53.0.3 a > dig.out.ns3.test$n || ret=1
|
|
|
|
$DIG $DIGOPTS +noauth a.secure.example. \
|
|
|
|
@10.53.0.4 a > dig.out.ns4.test$n || ret=1
|
|
|
|
$PERL ../digcomp.pl dig.out.ns3.test$n dig.out.ns4.test$n || ret=1
|
|
|
|
grep "status: NOERROR" dig.out.ns4.test$n > /dev/null || ret=1
|
|
|
|
grep "flags:.*ad.*QUERY" dig.out.ns4.test$n > /dev/null || ret=1
|
|
|
|
n=`expr $n + 1`
|
|
|
|
if [ $ret != 0 ]; then echo "I:failed"; fi
|
|
|
|
status=`expr $status + $ret`
|
|
|
|
|
|
|
|
echo "I:checking multi-stage positive validation NSEC/NSEC3 ($n)"
|
|
|
|
ret=0
|
|
|
|
$DIG $DIGOPTS +noauth a.nsec3.example. \
|
|
|
|
@10.53.0.3 a > dig.out.ns3.test$n || ret=1
|
|
|
|
$DIG $DIGOPTS +noauth a.nsec3.example. \
|
|
|
|
@10.53.0.4 a > dig.out.ns4.test$n || ret=1
|
|
|
|
$PERL ../digcomp.pl dig.out.ns3.test$n dig.out.ns4.test$n || ret=1
|
|
|
|
grep "status: NOERROR" dig.out.ns4.test$n > /dev/null || ret=1
|
|
|
|
grep "flags:.*ad.*QUERY" dig.out.ns4.test$n > /dev/null || ret=1
|
|
|
|
n=`expr $n + 1`
|
|
|
|
if [ $ret != 0 ]; then echo "I:failed"; fi
|
|
|
|
status=`expr $status + $ret`
|
|
|
|
|
|
|
|
echo "I:checking multi-stage positive validation NSEC/OPTOUT ($n)"
|
2000-07-10 21:40:16 +00:00
|
|
|
ret=0
|
2008-09-24 02:46:23 +00:00
|
|
|
$DIG $DIGOPTS +noauth a.optout.example. \
|
|
|
|
@10.53.0.3 a > dig.out.ns3.test$n || ret=1
|
|
|
|
$DIG $DIGOPTS +noauth a.optout.example. \
|
|
|
|
@10.53.0.4 a > dig.out.ns4.test$n || ret=1
|
2000-07-10 21:40:16 +00:00
|
|
|
$PERL ../digcomp.pl dig.out.ns3.test$n dig.out.ns4.test$n || ret=1
|
2008-09-24 02:46:23 +00:00
|
|
|
grep "status: NOERROR" dig.out.ns4.test$n > /dev/null || ret=1
|
|
|
|
grep "flags:.*ad.*QUERY" dig.out.ns4.test$n > /dev/null || ret=1
|
|
|
|
n=`expr $n + 1`
|
|
|
|
if [ $ret != 0 ]; then echo "I:failed"; fi
|
|
|
|
status=`expr $status + $ret`
|
|
|
|
|
|
|
|
echo "I:checking multi-stage positive validation NSEC3/NSEC ($n)"
|
|
|
|
ret=0
|
|
|
|
$DIG $DIGOPTS +noauth a.secure.nsec3.example. \
|
|
|
|
@10.53.0.3 a > dig.out.ns3.test$n || ret=1
|
|
|
|
$DIG $DIGOPTS +noauth a.secure.nsec3.example. \
|
|
|
|
@10.53.0.4 a > dig.out.ns4.test$n || ret=1
|
|
|
|
$PERL ../digcomp.pl dig.out.ns3.test$n dig.out.ns4.test$n || ret=1
|
|
|
|
grep "status: NOERROR" dig.out.ns4.test$n > /dev/null || ret=1
|
|
|
|
grep "flags:.*ad.*QUERY" dig.out.ns4.test$n > /dev/null || ret=1
|
|
|
|
n=`expr $n + 1`
|
|
|
|
if [ $ret != 0 ]; then echo "I:failed"; fi
|
|
|
|
status=`expr $status + $ret`
|
|
|
|
|
|
|
|
echo "I:checking multi-stage positive validation NSEC3/NSEC3 ($n)"
|
|
|
|
ret=0
|
|
|
|
$DIG $DIGOPTS +noauth a.nsec3.nsec3.example. \
|
|
|
|
@10.53.0.3 a > dig.out.ns3.test$n || ret=1
|
|
|
|
$DIG $DIGOPTS +noauth a.nsec3.nsec3.example. \
|
|
|
|
@10.53.0.4 a > dig.out.ns4.test$n || ret=1
|
|
|
|
$PERL ../digcomp.pl dig.out.ns3.test$n dig.out.ns4.test$n || ret=1
|
|
|
|
grep "status: NOERROR" dig.out.ns4.test$n > /dev/null || ret=1
|
|
|
|
grep "flags:.*ad.*QUERY" dig.out.ns4.test$n > /dev/null || ret=1
|
|
|
|
n=`expr $n + 1`
|
|
|
|
if [ $ret != 0 ]; then echo "I:failed"; fi
|
|
|
|
status=`expr $status + $ret`
|
|
|
|
|
|
|
|
echo "I:checking multi-stage positive validation NSEC3/OPTOUT ($n)"
|
|
|
|
ret=0
|
|
|
|
$DIG $DIGOPTS +noauth a.optout.nsec3.example. \
|
|
|
|
@10.53.0.3 a > dig.out.ns3.test$n || ret=1
|
|
|
|
$DIG $DIGOPTS +noauth a.optout.nsec3.example. \
|
|
|
|
@10.53.0.4 a > dig.out.ns4.test$n || ret=1
|
|
|
|
$PERL ../digcomp.pl dig.out.ns3.test$n dig.out.ns4.test$n || ret=1
|
|
|
|
grep "status: NOERROR" dig.out.ns4.test$n > /dev/null || ret=1
|
|
|
|
grep "flags:.*ad.*QUERY" dig.out.ns4.test$n > /dev/null || ret=1
|
|
|
|
n=`expr $n + 1`
|
|
|
|
if [ $ret != 0 ]; then echo "I:failed"; fi
|
|
|
|
status=`expr $status + $ret`
|
|
|
|
|
|
|
|
echo "I:checking multi-stage positive validation OPTOUT/NSEC ($n)"
|
|
|
|
ret=0
|
|
|
|
$DIG $DIGOPTS +noauth a.secure.optout.example. \
|
|
|
|
@10.53.0.3 a > dig.out.ns3.test$n || ret=1
|
|
|
|
$DIG $DIGOPTS +noauth a.secure.optout.example. \
|
|
|
|
@10.53.0.4 a > dig.out.ns4.test$n || ret=1
|
|
|
|
$PERL ../digcomp.pl dig.out.ns3.test$n dig.out.ns4.test$n || ret=1
|
|
|
|
grep "status: NOERROR" dig.out.ns4.test$n > /dev/null || ret=1
|
|
|
|
grep "flags:.*ad.*QUERY" dig.out.ns4.test$n > /dev/null || ret=1
|
|
|
|
n=`expr $n + 1`
|
|
|
|
if [ $ret != 0 ]; then echo "I:failed"; fi
|
|
|
|
status=`expr $status + $ret`
|
|
|
|
|
|
|
|
echo "I:checking multi-stage positive validation OPTOUT/NSEC3 ($n)"
|
|
|
|
ret=0
|
|
|
|
$DIG $DIGOPTS +noauth a.nsec3.optout.example. \
|
|
|
|
@10.53.0.3 a > dig.out.ns3.test$n || ret=1
|
|
|
|
$DIG $DIGOPTS +noauth a.nsec3.optout.example. \
|
|
|
|
@10.53.0.4 a > dig.out.ns4.test$n || ret=1
|
|
|
|
$PERL ../digcomp.pl dig.out.ns3.test$n dig.out.ns4.test$n || ret=1
|
|
|
|
grep "status: NOERROR" dig.out.ns4.test$n > /dev/null || ret=1
|
|
|
|
grep "flags:.*ad.*QUERY" dig.out.ns4.test$n > /dev/null || ret=1
|
|
|
|
n=`expr $n + 1`
|
|
|
|
if [ $ret != 0 ]; then echo "I:failed"; fi
|
|
|
|
status=`expr $status + $ret`
|
|
|
|
|
|
|
|
echo "I:checking multi-stage positive validation OPTOUT/OPTOUT ($n)"
|
|
|
|
ret=0
|
|
|
|
$DIG $DIGOPTS +noauth a.optout.optout.example. \
|
|
|
|
@10.53.0.3 a > dig.out.ns3.test$n || ret=1
|
|
|
|
$DIG $DIGOPTS +noauth a.optout.optout.example. \
|
|
|
|
@10.53.0.4 a > dig.out.ns4.test$n || ret=1
|
|
|
|
$PERL ../digcomp.pl dig.out.ns3.test$n dig.out.ns4.test$n || ret=1
|
|
|
|
grep "status: NOERROR" dig.out.ns4.test$n > /dev/null || ret=1
|
2000-07-27 23:22:35 +00:00
|
|
|
grep "flags:.*ad.*QUERY" dig.out.ns4.test$n > /dev/null || ret=1
|
2000-07-08 00:39:17 +00:00
|
|
|
n=`expr $n + 1`
|
2000-07-10 21:40:16 +00:00
|
|
|
if [ $ret != 0 ]; then echo "I:failed"; fi
|
|
|
|
status=`expr $status + $ret`
|
2000-05-18 22:49:29 +00:00
|
|
|
|
2008-09-24 02:46:23 +00:00
|
|
|
echo "I:checking empty NODATA OPTOUT ($n)"
|
|
|
|
ret=0
|
|
|
|
$DIG $DIGOPTS +noauth empty.optout.example. \
|
|
|
|
@10.53.0.3 a > dig.out.ns3.test$n || ret=1
|
|
|
|
$DIG $DIGOPTS +noauth empty.optout.example. \
|
|
|
|
@10.53.0.4 a > dig.out.ns4.test$n || ret=1
|
|
|
|
$PERL ../digcomp.pl dig.out.ns3.test$n dig.out.ns4.test$n || ret=1
|
|
|
|
grep "status: NOERROR" dig.out.ns4.test$n > /dev/null || ret=1
|
|
|
|
#grep "flags:.*ad.*QUERY" dig.out.ns4.test$n > /dev/null || ret=1
|
|
|
|
n=`expr $n + 1`
|
|
|
|
if [ $ret != 0 ]; then echo "I:failed"; fi
|
|
|
|
status=`expr $status + $ret`
|
|
|
|
|
2000-05-18 22:49:29 +00:00
|
|
|
# Check the bogus domain
|
|
|
|
|
2000-07-27 23:22:35 +00:00
|
|
|
echo "I:checking failed validation ($n)"
|
2000-07-10 21:40:16 +00:00
|
|
|
ret=0
|
|
|
|
$DIG $DIGOPTS a.bogus.example. @10.53.0.4 a > dig.out.ns4.test$n || ret=1
|
2001-02-20 18:33:50 +00:00
|
|
|
grep "SERVFAIL" dig.out.ns4.test$n > /dev/null || ret=1
|
2000-07-08 00:39:17 +00:00
|
|
|
n=`expr $n + 1`
|
2000-07-10 21:40:16 +00:00
|
|
|
if [ $ret != 0 ]; then echo "I:failed"; fi
|
|
|
|
status=`expr $status + $ret`
|
2000-06-16 22:39:45 +00:00
|
|
|
|
2000-07-27 23:22:35 +00:00
|
|
|
# Try validating with a bad trusted key.
|
2000-06-21 23:06:20 +00:00
|
|
|
# This should fail.
|
|
|
|
|
2000-07-27 23:22:35 +00:00
|
|
|
echo "I:checking that validation fails with a misconfigured trusted key ($n)"
|
2000-07-10 21:40:16 +00:00
|
|
|
ret=0
|
2000-07-27 23:22:35 +00:00
|
|
|
$DIG $DIGOPTS example. soa @10.53.0.5 > dig.out.ns5.test$n || ret=1
|
2000-07-10 21:40:16 +00:00
|
|
|
grep "SERVFAIL" dig.out.ns5.test$n > /dev/null || ret=1
|
2000-07-08 00:39:17 +00:00
|
|
|
n=`expr $n + 1`
|
2000-07-10 21:40:16 +00:00
|
|
|
if [ $ret != 0 ]; then echo "I:failed"; fi
|
|
|
|
status=`expr $status + $ret`
|
2000-07-08 00:39:17 +00:00
|
|
|
|
2001-09-19 20:47:02 +00:00
|
|
|
echo "I:checking that negative validation fails with a misconfigured trusted key ($n)"
|
|
|
|
ret=0
|
|
|
|
$DIG $DIGOPTS example. ptr @10.53.0.5 > dig.out.ns5.test$n || ret=1
|
|
|
|
grep "SERVFAIL" dig.out.ns5.test$n > /dev/null || ret=1
|
|
|
|
n=`expr $n + 1`
|
|
|
|
if [ $ret != 0 ]; then echo "I:failed"; fi
|
|
|
|
status=`expr $status + $ret`
|
|
|
|
|
2002-06-17 04:01:37 +00:00
|
|
|
echo "I:checking that insecurity proofs fail with a misconfigured trusted key ($n)"
|
|
|
|
ret=0
|
|
|
|
$DIG $DIGOPTS a.insecure.example. a @10.53.0.5 > dig.out.ns5.test$n || ret=1
|
|
|
|
grep "SERVFAIL" dig.out.ns5.test$n > /dev/null || ret=1
|
|
|
|
n=`expr $n + 1`
|
|
|
|
if [ $ret != 0 ]; then echo "I:failed"; fi
|
|
|
|
status=`expr $status + $ret`
|
|
|
|
|
2001-09-19 21:19:52 +00:00
|
|
|
echo "I:checking that validation fails when key record is missing ($n)"
|
|
|
|
ret=0
|
|
|
|
$DIG $DIGOPTS a.b.keyless.example. a @10.53.0.4 > dig.out.ns4.test$n || ret=1
|
|
|
|
grep "SERVFAIL" dig.out.ns4.test$n > /dev/null || ret=1
|
|
|
|
n=`expr $n + 1`
|
|
|
|
if [ $ret != 0 ]; then echo "I:failed"; fi
|
|
|
|
status=`expr $status + $ret`
|
|
|
|
|
2009-12-30 08:02:23 +00:00
|
|
|
echo "I:Checking that a bad CNAME signature is caught after a +CD query ($n)"
|
|
|
|
ret=0
|
|
|
|
#prime
|
|
|
|
$DIG $DIGOPTS +cd bad-cname.example. @10.53.0.4 > dig.out.ns4.prime$n || ret=1
|
|
|
|
#check: requery with +CD. pending data should be returned even if it's bogus
|
|
|
|
expect="a.example.
|
|
|
|
10.0.0.1"
|
|
|
|
ans=`$DIG $DIGOPTS +cd +nodnssec +short bad-cname.example. @10.53.0.4` || ret=1
|
|
|
|
test "$ans" = "$expect" || ret=1
|
|
|
|
test $ret = 0 || echo I:failed, got "'""$ans""'", expected "'""$expect""'"
|
|
|
|
#check: requery without +CD. bogus cached data should be rejected.
|
|
|
|
$DIG $DIGOPTS +nodnssec bad-cname.example. @10.53.0.4 > dig.out.ns4.test$n || ret=1
|
|
|
|
grep "SERVFAIL" dig.out.ns4.test$n > /dev/null || ret=1
|
|
|
|
n=`expr $n + 1`
|
|
|
|
if [ $ret != 0 ]; then echo "I:failed"; fi
|
|
|
|
status=`expr $status + $ret`
|
|
|
|
|
|
|
|
echo "I:Checking that a bad DNAME signature is caught after a +CD query ($n)"
|
|
|
|
ret=0
|
|
|
|
#prime
|
|
|
|
$DIG $DIGOPTS +cd a.bad-dname.example. @10.53.0.4 > dig.out.ns4.prime$n || ret=1
|
|
|
|
#check: requery with +CD. pending data should be returned even if it's bogus
|
|
|
|
expect="example.
|
|
|
|
a.example.
|
|
|
|
10.0.0.1"
|
|
|
|
ans=`$DIG $DIGOPTS +cd +nodnssec +short a.bad-dname.example. @10.53.0.4` || ret=1
|
|
|
|
test "$ans" = "$expect" || ret=1
|
|
|
|
test $ret = 0 || echo I:failed, got "'""$ans""'", expected "'""$expect""'"
|
|
|
|
#check: requery without +CD. bogus cached data should be rejected.
|
|
|
|
$DIG $DIGOPTS +nodnssec a.bad-dname.example. @10.53.0.4 > dig.out.ns4.test$n || ret=1
|
|
|
|
grep "SERVFAIL" dig.out.ns4.test$n > /dev/null || ret=1
|
|
|
|
n=`expr $n + 1`
|
|
|
|
if [ $ret != 0 ]; then echo "I:failed"; fi
|
|
|
|
status=`expr $status + $ret`
|
|
|
|
|
2000-07-08 00:39:17 +00:00
|
|
|
# Check the insecure.secure.example domain (insecurity proof)
|
|
|
|
|
2000-07-27 23:22:35 +00:00
|
|
|
echo "I:checking 2-server insecurity proof ($n)"
|
2000-07-10 21:40:16 +00:00
|
|
|
ret=0
|
2002-07-19 06:20:24 +00:00
|
|
|
$DIG $DIGOPTS +noauth a.insecure.secure.example. @10.53.0.2 a \
|
2000-07-27 23:22:35 +00:00
|
|
|
> dig.out.ns2.test$n || ret=1
|
2002-07-19 06:20:24 +00:00
|
|
|
$DIG $DIGOPTS +noauth a.insecure.secure.example. @10.53.0.4 a \
|
2000-07-27 23:22:35 +00:00
|
|
|
> dig.out.ns4.test$n || ret=1
|
2000-07-10 21:40:16 +00:00
|
|
|
$PERL ../digcomp.pl dig.out.ns2.test$n dig.out.ns4.test$n || ret=1
|
2001-01-04 00:24:26 +00:00
|
|
|
grep "status: NOERROR" dig.out.ns4.test$n > /dev/null || ret=1
|
|
|
|
# Note - this is looking for failure, hence the &&
|
|
|
|
grep "flags:.*ad.*QUERY" dig.out.ns4.test$n > /dev/null && ret=1
|
2000-07-08 00:39:17 +00:00
|
|
|
n=`expr $n + 1`
|
2000-07-10 21:40:16 +00:00
|
|
|
if [ $ret != 0 ]; then echo "I:failed"; fi
|
|
|
|
status=`expr $status + $ret`
|
2000-07-08 00:39:17 +00:00
|
|
|
|
|
|
|
# Check a negative response in insecure.secure.example
|
|
|
|
|
2000-07-27 23:22:35 +00:00
|
|
|
echo "I:checking 2-server insecurity proof with a negative answer ($n)"
|
2000-07-10 21:40:16 +00:00
|
|
|
ret=0
|
2000-07-08 00:39:17 +00:00
|
|
|
$DIG $DIGOPTS q.insecure.secure.example. @10.53.0.2 a > dig.out.ns2.test$n \
|
2000-07-10 21:40:16 +00:00
|
|
|
|| ret=1
|
2000-07-08 00:39:17 +00:00
|
|
|
$DIG $DIGOPTS q.insecure.secure.example. @10.53.0.4 a > dig.out.ns4.test$n \
|
2000-07-10 21:40:16 +00:00
|
|
|
|| ret=1
|
|
|
|
$PERL ../digcomp.pl dig.out.ns2.test$n dig.out.ns4.test$n || ret=1
|
2001-01-04 00:24:26 +00:00
|
|
|
grep "status: NXDOMAIN" dig.out.ns4.test$n > /dev/null || ret=1
|
|
|
|
# Note - this is looking for failure, hence the &&
|
|
|
|
grep "flags:.*ad.*QUERY" dig.out.ns4.test$n > /dev/null && ret=1
|
2000-07-08 00:39:17 +00:00
|
|
|
n=`expr $n + 1`
|
2000-07-10 21:40:16 +00:00
|
|
|
if [ $ret != 0 ]; then echo "I:failed"; fi
|
|
|
|
status=`expr $status + $ret`
|
2000-06-21 23:06:20 +00:00
|
|
|
|
2002-07-19 06:20:24 +00:00
|
|
|
echo "I:checking 2-server insecurity proof with a negative answer and SOA hack ($n)"
|
|
|
|
ret=0
|
|
|
|
$DIG $DIGOPTS r.insecure.secure.example. @10.53.0.2 soa > dig.out.ns2.test$n \
|
|
|
|
|| ret=1
|
|
|
|
$DIG $DIGOPTS r.insecure.secure.example. @10.53.0.4 soa > dig.out.ns4.test$n \
|
|
|
|
|| ret=1
|
|
|
|
$PERL ../digcomp.pl dig.out.ns2.test$n dig.out.ns4.test$n || ret=1
|
|
|
|
grep "status: NXDOMAIN" dig.out.ns4.test$n > /dev/null || ret=1
|
|
|
|
# Note - this is looking for failure, hence the &&
|
|
|
|
grep "flags:.*ad.*QUERY" dig.out.ns4.test$n > /dev/null && ret=1
|
|
|
|
n=`expr $n + 1`
|
|
|
|
if [ $ret != 0 ]; then echo "I:failed"; fi
|
|
|
|
status=`expr $status + $ret`
|
|
|
|
|
2000-07-11 00:36:44 +00:00
|
|
|
# Check that the query for a security root is successful and has ad set
|
|
|
|
|
2000-07-27 23:22:35 +00:00
|
|
|
echo "I:checking security root query ($n)"
|
2000-07-11 00:36:44 +00:00
|
|
|
ret=0
|
|
|
|
$DIG $DIGOPTS . @10.53.0.4 key > dig.out.ns4.test$n || ret=1
|
|
|
|
grep "NOERROR" dig.out.ns4.test$n > /dev/null || ret=1
|
|
|
|
grep "flags:.*ad.*QUERY" dig.out.ns4.test$n > /dev/null || ret=1
|
|
|
|
n=`expr $n + 1`
|
|
|
|
if [ $ret != 0 ]; then echo "I:failed"; fi
|
|
|
|
status=`expr $status + $ret`
|
|
|
|
|
2000-07-27 23:22:35 +00:00
|
|
|
# Check that the setting the cd bit works
|
|
|
|
|
|
|
|
echo "I:checking cd bit on a positive answer ($n)"
|
|
|
|
ret=0
|
|
|
|
$DIG $DIGOPTS +noauth example. soa @10.53.0.4 \
|
|
|
|
> dig.out.ns4.test$n || ret=1
|
|
|
|
$DIG $DIGOPTS +noauth +cdflag example. soa @10.53.0.5 \
|
|
|
|
> dig.out.ns5.test$n || ret=1
|
|
|
|
$PERL ../digcomp.pl dig.out.ns4.test$n dig.out.ns5.test$n || ret=1
|
|
|
|
grep "flags:.*ad.*QUERY" dig.out.ns4.test$n > /dev/null || ret=1
|
|
|
|
# Note - this is looking for failure, hence the &&
|
|
|
|
grep "flags:.*ad.*QUERY" dig.out.ns5.test$n > /dev/null && ret=1
|
|
|
|
n=`expr $n + 1`
|
|
|
|
if [ $ret != 0 ]; then echo "I:failed"; fi
|
|
|
|
status=`expr $status + $ret`
|
|
|
|
|
|
|
|
echo "I:checking cd bit on a negative answer ($n)"
|
|
|
|
ret=0
|
|
|
|
$DIG $DIGOPTS q.example. soa @10.53.0.4 > dig.out.ns4.test$n || ret=1
|
|
|
|
$DIG $DIGOPTS +cdflag q.example. soa @10.53.0.5 > dig.out.ns5.test$n || ret=1
|
|
|
|
$PERL ../digcomp.pl dig.out.ns4.test$n dig.out.ns5.test$n || ret=1
|
|
|
|
grep "flags:.*ad.*QUERY" dig.out.ns4.test$n > /dev/null || ret=1
|
|
|
|
# Note - this is looking for failure, hence the &&
|
|
|
|
grep "flags:.*ad.*QUERY" dig.out.ns5.test$n > /dev/null && ret=1
|
2009-10-27 22:25:37 +00:00
|
|
|
n=`expr $n + 1`
|
|
|
|
if [ $ret != 0 ]; then echo "I:failed"; fi
|
|
|
|
status=`expr $status + $ret`
|
|
|
|
|
|
|
|
echo "I:checking positive validation RSASHA256 NSEC ($n)"
|
|
|
|
ret=0
|
|
|
|
$DIG $DIGOPTS +noauth a.rsasha256.example. @10.53.0.3 a > dig.out.ns3.test$n || ret=1
|
|
|
|
$DIG $DIGOPTS +noauth a.rsasha256.example. @10.53.0.4 a > dig.out.ns4.test$n || ret=1
|
|
|
|
$PERL ../digcomp.pl dig.out.ns3.test$n dig.out.ns4.test$n || ret=1
|
|
|
|
grep "flags:.*ad.*QUERY" dig.out.ns4.test$n > /dev/null || ret=1
|
|
|
|
n=`expr $n + 1`
|
|
|
|
if [ $ret != 0 ]; then echo "I:failed"; fi
|
|
|
|
status=`expr $status + $ret`
|
|
|
|
|
|
|
|
echo "I:checking positive validation RSASHA512 NSEC ($n)"
|
|
|
|
ret=0
|
|
|
|
$DIG $DIGOPTS +noauth a.rsasha512.example. @10.53.0.3 a > dig.out.ns3.test$n || ret=1
|
|
|
|
$DIG $DIGOPTS +noauth a.rsasha512.example. @10.53.0.4 a > dig.out.ns4.test$n || ret=1
|
|
|
|
$PERL ../digcomp.pl dig.out.ns3.test$n dig.out.ns4.test$n || ret=1
|
|
|
|
grep "flags:.*ad.*QUERY" dig.out.ns4.test$n > /dev/null || ret=1
|
2010-01-18 19:19:31 +00:00
|
|
|
n=`expr $n + 1`
|
|
|
|
if [ $ret != 0 ]; then echo "I:failed"; fi
|
|
|
|
status=`expr $status + $ret`
|
|
|
|
|
|
|
|
echo "I:checking positive validation with KSK-only DNSKEY signature ($n)"
|
|
|
|
ret=0
|
|
|
|
$DIG $DIGOPTS +noauth a.kskonly.example. @10.53.0.3 a > dig.out.ns3.test$n || ret=1
|
|
|
|
$DIG $DIGOPTS +noauth a.kskonly.example. @10.53.0.4 a > dig.out.ns4.test$n || ret=1
|
|
|
|
$PERL ../digcomp.pl dig.out.ns3.test$n dig.out.ns4.test$n || ret=1
|
|
|
|
grep "flags:.*ad.*QUERY" dig.out.ns4.test$n > /dev/null || ret=1
|
2000-07-27 23:22:35 +00:00
|
|
|
n=`expr $n + 1`
|
|
|
|
if [ $ret != 0 ]; then echo "I:failed"; fi
|
|
|
|
status=`expr $status + $ret`
|
|
|
|
|
|
|
|
echo "I:checking cd bit on a query that should fail ($n)"
|
|
|
|
ret=0
|
|
|
|
$DIG $DIGOPTS a.bogus.example. soa @10.53.0.4 \
|
|
|
|
> dig.out.ns4.test$n || ret=1
|
|
|
|
$DIG $DIGOPTS +cdflag a.bogus.example. soa @10.53.0.5 \
|
|
|
|
> dig.out.ns5.test$n || ret=1
|
|
|
|
$PERL ../digcomp.pl dig.out.ns4.test$n dig.out.ns5.test$n || ret=1
|
|
|
|
grep "flags:.*ad.*QUERY" dig.out.ns4.test$n > /dev/null || ret=1
|
|
|
|
# Note - this is looking for failure, hence the &&
|
|
|
|
grep "flags:.*ad.*QUERY" dig.out.ns5.test$n > /dev/null && ret=1
|
|
|
|
n=`expr $n + 1`
|
|
|
|
if [ $ret != 0 ]; then echo "I:failed"; fi
|
|
|
|
status=`expr $status + $ret`
|
|
|
|
|
|
|
|
echo "I:checking cd bit on an insecurity proof ($n)"
|
|
|
|
ret=0
|
|
|
|
$DIG $DIGOPTS +noauth a.insecure.example. soa @10.53.0.4 \
|
|
|
|
> dig.out.ns4.test$n || ret=1
|
|
|
|
$DIG $DIGOPTS +noauth +cdflag a.insecure.example. soa @10.53.0.5 \
|
|
|
|
> dig.out.ns5.test$n || ret=1
|
|
|
|
$PERL ../digcomp.pl dig.out.ns4.test$n dig.out.ns5.test$n || ret=1
|
2001-01-04 00:24:26 +00:00
|
|
|
grep "status: NOERROR" dig.out.ns4.test$n > /dev/null || ret=1
|
|
|
|
# Note - these are looking for failure, hence the &&
|
|
|
|
grep "flags:.*ad.*QUERY" dig.out.ns4.test$n > /dev/null && ret=1
|
2000-07-27 23:22:35 +00:00
|
|
|
grep "flags:.*ad.*QUERY" dig.out.ns5.test$n > /dev/null && ret=1
|
|
|
|
n=`expr $n + 1`
|
|
|
|
if [ $ret != 0 ]; then echo "I:failed"; fi
|
|
|
|
status=`expr $status + $ret`
|
|
|
|
|
|
|
|
echo "I:checking cd bit on a negative insecurity proof ($n)"
|
|
|
|
ret=0
|
2002-07-19 06:20:24 +00:00
|
|
|
$DIG $DIGOPTS q.insecure.example. a @10.53.0.4 \
|
2000-07-27 23:22:35 +00:00
|
|
|
> dig.out.ns4.test$n || ret=1
|
2002-07-19 06:20:24 +00:00
|
|
|
$DIG $DIGOPTS +cdflag q.insecure.example. a @10.53.0.5 \
|
2000-07-27 23:22:35 +00:00
|
|
|
> dig.out.ns5.test$n || ret=1
|
|
|
|
$PERL ../digcomp.pl dig.out.ns4.test$n dig.out.ns5.test$n || ret=1
|
2001-01-04 00:24:26 +00:00
|
|
|
grep "status: NXDOMAIN" dig.out.ns4.test$n > /dev/null || ret=1
|
|
|
|
# Note - these are looking for failure, hence the &&
|
|
|
|
grep "flags:.*ad.*QUERY" dig.out.ns4.test$n > /dev/null && ret=1
|
2000-07-27 23:22:35 +00:00
|
|
|
grep "flags:.*ad.*QUERY" dig.out.ns5.test$n > /dev/null && ret=1
|
|
|
|
n=`expr $n + 1`
|
|
|
|
if [ $ret != 0 ]; then echo "I:failed"; fi
|
|
|
|
status=`expr $status + $ret`
|
|
|
|
|
2001-02-20 18:33:50 +00:00
|
|
|
echo "I:checking that validation of an ANY query works ($n)"
|
|
|
|
ret=0
|
|
|
|
$DIG $DIGOPTS +noauth foo.example. any @10.53.0.2 > dig.out.ns2.test$n || ret=1
|
|
|
|
$DIG $DIGOPTS +noauth foo.example. any @10.53.0.4 > dig.out.ns4.test$n || ret=1
|
|
|
|
$PERL ../digcomp.pl dig.out.ns2.test$n dig.out.ns4.test$n || ret=1
|
|
|
|
grep "NOERROR" dig.out.ns4.test$n > /dev/null || ret=1
|
|
|
|
# 2 records in the zone, 1 NXT, 3 SIGs
|
|
|
|
grep "ANSWER: 6" dig.out.ns4.test$n > /dev/null || ret=1
|
|
|
|
n=`expr $n + 1`
|
|
|
|
if [ $ret != 0 ]; then echo "I:failed"; fi
|
|
|
|
status=`expr $status + $ret`
|
|
|
|
|
2001-02-21 06:47:45 +00:00
|
|
|
echo "I:checking that validation of a query returning a CNAME works ($n)"
|
|
|
|
ret=0
|
|
|
|
$DIG $DIGOPTS +noauth cname1.example. txt @10.53.0.2 \
|
|
|
|
> dig.out.ns2.test$n || ret=1
|
|
|
|
$DIG $DIGOPTS +noauth cname1.example. txt @10.53.0.4 \
|
|
|
|
> dig.out.ns4.test$n || ret=1
|
|
|
|
$PERL ../digcomp.pl dig.out.ns2.test$n dig.out.ns4.test$n || ret=1
|
|
|
|
grep "NOERROR" dig.out.ns4.test$n > /dev/null || ret=1
|
|
|
|
# the CNAME & its sig, the TXT and its SIG
|
|
|
|
grep "ANSWER: 4" dig.out.ns4.test$n > /dev/null || ret=1
|
|
|
|
n=`expr $n + 1`
|
|
|
|
if [ $ret != 0 ]; then echo "I:failed"; fi
|
|
|
|
status=`expr $status + $ret`
|
|
|
|
|
2001-02-23 06:14:44 +00:00
|
|
|
echo "I:checking that validation of a query returning a DNAME works ($n)"
|
|
|
|
ret=0
|
|
|
|
$DIG $DIGOPTS +noauth foo.dname1.example. txt @10.53.0.2 \
|
|
|
|
> dig.out.ns2.test$n || ret=1
|
|
|
|
$DIG $DIGOPTS +noauth foo.dname1.example. txt @10.53.0.4 \
|
|
|
|
> dig.out.ns4.test$n || ret=1
|
|
|
|
$PERL ../digcomp.pl dig.out.ns2.test$n dig.out.ns4.test$n || ret=1
|
|
|
|
grep "NOERROR" dig.out.ns4.test$n > /dev/null || ret=1
|
|
|
|
# The DNAME & its sig, the TXT and its SIG, and the synthesized CNAME.
|
|
|
|
# It would be nice to test that the CNAME is being synthesized by the
|
|
|
|
# recursive server and not cached, but I don't know how.
|
|
|
|
grep "ANSWER: 5" dig.out.ns4.test$n > /dev/null || ret=1
|
|
|
|
n=`expr $n + 1`
|
|
|
|
if [ $ret != 0 ]; then echo "I:failed"; fi
|
|
|
|
status=`expr $status + $ret`
|
|
|
|
|
2001-02-21 06:47:45 +00:00
|
|
|
echo "I:checking that validation of an ANY query returning a CNAME works ($n)"
|
|
|
|
ret=0
|
|
|
|
$DIG $DIGOPTS +noauth cname2.example. any @10.53.0.2 \
|
|
|
|
> dig.out.ns2.test$n || ret=1
|
|
|
|
$DIG $DIGOPTS +noauth cname2.example. any @10.53.0.4 \
|
|
|
|
> dig.out.ns4.test$n || ret=1
|
|
|
|
$PERL ../digcomp.pl dig.out.ns2.test$n dig.out.ns4.test$n || ret=1
|
|
|
|
grep "NOERROR" dig.out.ns4.test$n > /dev/null || ret=1
|
|
|
|
# The CNAME, NXT, and their SIGs
|
|
|
|
grep "ANSWER: 4" dig.out.ns4.test$n > /dev/null || ret=1
|
|
|
|
n=`expr $n + 1`
|
|
|
|
if [ $ret != 0 ]; then echo "I:failed"; fi
|
|
|
|
status=`expr $status + $ret`
|
|
|
|
|
2001-02-23 06:22:11 +00:00
|
|
|
echo "I:checking that validation of an ANY query returning a DNAME works ($n)"
|
|
|
|
ret=0
|
|
|
|
$DIG $DIGOPTS +noauth foo.dname2.example. any @10.53.0.2 \
|
|
|
|
> dig.out.ns2.test$n || ret=1
|
|
|
|
$DIG $DIGOPTS +noauth foo.dname2.example. any @10.53.0.4 \
|
|
|
|
> dig.out.ns4.test$n || ret=1
|
|
|
|
$PERL ../digcomp.pl dig.out.ns2.test$n dig.out.ns4.test$n || ret=1
|
|
|
|
grep "NOERROR" dig.out.ns4.test$n > /dev/null || ret=1
|
|
|
|
n=`expr $n + 1`
|
|
|
|
if [ $ret != 0 ]; then echo "I:failed"; fi
|
|
|
|
status=`expr $status + $ret`
|
|
|
|
|
2002-02-13 01:32:12 +00:00
|
|
|
echo "I:checking that positive validation in a privately secure zone works ($n)"
|
|
|
|
ret=0
|
|
|
|
$DIG $DIGOPTS +noauth a.private.secure.example. a @10.53.0.2 \
|
|
|
|
> dig.out.ns2.test$n || ret=1
|
|
|
|
$DIG $DIGOPTS +noauth a.private.secure.example. a @10.53.0.4 \
|
|
|
|
> dig.out.ns4.test$n || ret=1
|
|
|
|
$PERL ../digcomp.pl dig.out.ns2.test$n dig.out.ns4.test$n || ret=1
|
|
|
|
grep "NOERROR" dig.out.ns4.test$n > /dev/null || ret=1
|
|
|
|
# Note - this is looking for failure, hence the &&
|
|
|
|
grep "flags:.*ad.*QUERY" dig.out.ns4.test$n > /dev/null && ret=1
|
|
|
|
n=`expr $n + 1`
|
|
|
|
if [ $ret != 0 ]; then echo "I:failed"; fi
|
|
|
|
status=`expr $status + $ret`
|
|
|
|
|
|
|
|
echo "I:checking that negative validation in a privately secure zone works ($n)"
|
|
|
|
ret=0
|
|
|
|
$DIG $DIGOPTS +noauth q.private.secure.example. a @10.53.0.2 \
|
|
|
|
> dig.out.ns2.test$n || ret=1
|
|
|
|
$DIG $DIGOPTS +noauth q.private.secure.example. a @10.53.0.4 \
|
|
|
|
> dig.out.ns4.test$n || ret=1
|
|
|
|
$PERL ../digcomp.pl dig.out.ns2.test$n dig.out.ns4.test$n || ret=1
|
|
|
|
grep "NXDOMAIN" dig.out.ns4.test$n > /dev/null || ret=1
|
|
|
|
# Note - this is looking for failure, hence the &&
|
|
|
|
grep "flags:.*ad.*QUERY" dig.out.ns4.test$n > /dev/null && ret=1
|
|
|
|
n=`expr $n + 1`
|
|
|
|
if [ $ret != 0 ]; then echo "I:failed"; fi
|
|
|
|
status=`expr $status + $ret`
|
|
|
|
|
2004-01-14 02:06:51 +00:00
|
|
|
echo "I:checking that lookups succeed after disabling a algorithm works ($n)"
|
|
|
|
ret=0
|
|
|
|
$DIG $DIGOPTS +noauth example. SOA @10.53.0.2 \
|
|
|
|
> dig.out.ns2.test$n || ret=1
|
|
|
|
$DIG $DIGOPTS +noauth example. SOA @10.53.0.6 \
|
|
|
|
> dig.out.ns6.test$n || ret=1
|
|
|
|
$PERL ../digcomp.pl dig.out.ns2.test$n dig.out.ns6.test$n || ret=1
|
|
|
|
# Note - this is looking for failure, hence the &&
|
|
|
|
grep "flags:.*ad.*QUERY" dig.out.ns6.test$n > /dev/null && ret=1
|
|
|
|
n=`expr $n + 1`
|
|
|
|
if [ $ret != 0 ]; then echo "I:failed"; fi
|
|
|
|
status=`expr $status + $ret`
|
|
|
|
|
|
|
|
echo "I:checking privately secure to nxdomain works ($n)"
|
|
|
|
ret=0
|
|
|
|
$DIG $DIGOPTS +noauth private2secure-nxdomain.private.secure.example. SOA @10.53.0.2 \
|
|
|
|
> dig.out.ns2.test$n || ret=1
|
|
|
|
$DIG $DIGOPTS +noauth private2secure-nxdomain.private.secure.example. SOA @10.53.0.4 \
|
|
|
|
> dig.out.ns4.test$n || ret=1
|
|
|
|
$PERL ../digcomp.pl dig.out.ns2.test$n dig.out.ns4.test$n || ret=1
|
|
|
|
# Note - this is looking for failure, hence the &&
|
|
|
|
grep "flags:.*ad.*QUERY" dig.out.ns4.test$n > /dev/null && ret=1
|
|
|
|
n=`expr $n + 1`
|
|
|
|
if [ $ret != 0 ]; then echo "I:failed"; fi
|
|
|
|
status=`expr $status + $ret`
|
|
|
|
|
2006-02-26 22:57:18 +00:00
|
|
|
echo "I:checking privately secure wildcard to nxdomain works ($n)"
|
2004-01-14 02:06:51 +00:00
|
|
|
ret=0
|
|
|
|
$DIG $DIGOPTS +noauth a.wild.private.secure.example. SOA @10.53.0.2 \
|
|
|
|
> dig.out.ns2.test$n || ret=1
|
|
|
|
$DIG $DIGOPTS +noauth a.wild.private.secure.example. SOA @10.53.0.4 \
|
|
|
|
> dig.out.ns4.test$n || ret=1
|
|
|
|
$PERL ../digcomp.pl dig.out.ns2.test$n dig.out.ns4.test$n || ret=1
|
|
|
|
# Note - this is looking for failure, hence the &&
|
|
|
|
grep "flags:.*ad.*QUERY" dig.out.ns4.test$n > /dev/null && ret=1
|
|
|
|
n=`expr $n + 1`
|
|
|
|
if [ $ret != 0 ]; then echo "I:failed"; fi
|
|
|
|
status=`expr $status + $ret`
|
|
|
|
|
2010-06-25 23:50:13 +00:00
|
|
|
echo "I:checking a non-cachable NODATA works ($n)"
|
|
|
|
ret=0
|
|
|
|
$DIG $DIGOPTS +noauth a.nosoa.secure.example. txt @10.53.0.7 \
|
2010-06-28 01:34:11 +00:00
|
|
|
> dig.out.ns7.test$n || ret=1
|
|
|
|
grep "AUTHORITY: 0" dig.out.ns7.test$n > /dev/null || ret=1
|
2010-06-25 23:50:13 +00:00
|
|
|
$DIG $DIGOPTS +noauth a.nosoa.secure.example. txt @10.53.0.4 \
|
|
|
|
> dig.out.ns4.test$n || ret=1
|
|
|
|
grep "status: NOERROR" dig.out.ns4.test$n > /dev/null || ret=1
|
|
|
|
n=`expr $n + 1`
|
|
|
|
if [ $ret != 0 ]; then echo "I:failed"; fi
|
|
|
|
status=`expr $status + $ret`
|
|
|
|
|
|
|
|
echo "I:checking a non-cachable NXDOMAIN works ($n)"
|
|
|
|
ret=0
|
|
|
|
$DIG $DIGOPTS +noauth b.nosoa.secure.example. txt @10.53.0.7 \
|
2010-06-28 01:34:11 +00:00
|
|
|
> dig.out.ns7.test$n || ret=1
|
|
|
|
grep "AUTHORITY: 0" dig.out.ns7.test$n > /dev/null || ret=1
|
2010-06-25 23:50:13 +00:00
|
|
|
$DIG $DIGOPTS +noauth b.nosoa.secure.example. txt @10.53.0.4 \
|
|
|
|
> dig.out.ns4.test$n || ret=1
|
|
|
|
grep "status: NXDOMAIN" dig.out.ns4.test$n > /dev/null || ret=1
|
|
|
|
n=`expr $n + 1`
|
|
|
|
if [ $ret != 0 ]; then echo "I:failed"; fi
|
|
|
|
status=`expr $status + $ret`
|
|
|
|
|
2005-08-25 00:56:08 +00:00
|
|
|
#
|
|
|
|
# private.secure.example is served by the same server as its
|
|
|
|
# grand parent and there is not a secure delegation from secure.example
|
|
|
|
# to private.secure.example. In addition secure.example is using a
|
|
|
|
# algorithm which the validation does not support.
|
|
|
|
#
|
2004-03-10 02:19:58 +00:00
|
|
|
echo "I:checking dnssec-lookaside-validation works ($n)"
|
|
|
|
ret=0
|
|
|
|
$DIG $DIGOPTS private.secure.example. SOA @10.53.0.6 \
|
|
|
|
> dig.out.ns6.test$n || ret=1
|
|
|
|
grep "flags:.*ad.*QUERY" dig.out.ns6.test$n > /dev/null || ret=1
|
2004-05-05 01:32:58 +00:00
|
|
|
n=`expr $n + 1`
|
|
|
|
if [ $ret != 0 ]; then echo "I:failed"; fi
|
|
|
|
status=`expr $status + $ret`
|
|
|
|
|
|
|
|
echo "I:checking that we can load a rfc2535 signed zone ($n)"
|
|
|
|
ret=0
|
|
|
|
$DIG $DIGOPTS rfc2535.example. SOA @10.53.0.2 \
|
|
|
|
> dig.out.ns2.test$n || ret=1
|
|
|
|
grep "status: NOERROR" dig.out.ns2.test$n > /dev/null || ret=1
|
|
|
|
n=`expr $n + 1`
|
|
|
|
if [ $ret != 0 ]; then echo "I:failed"; fi
|
|
|
|
status=`expr $status + $ret`
|
|
|
|
|
|
|
|
echo "I:checking that we can transfer a rfc2535 signed zone ($n)"
|
|
|
|
ret=0
|
|
|
|
$DIG $DIGOPTS rfc2535.example. SOA @10.53.0.3 \
|
|
|
|
> dig.out.ns3.test$n || ret=1
|
|
|
|
grep "status: NOERROR" dig.out.ns3.test$n > /dev/null || ret=1
|
|
|
|
n=`expr $n + 1`
|
|
|
|
if [ $ret != 0 ]; then echo "I:failed"; fi
|
|
|
|
status=`expr $status + $ret`
|
2004-03-10 02:19:58 +00:00
|
|
|
|
2010-06-03 03:13:32 +00:00
|
|
|
echo "I:checking that we can sign a zone with out-of-zone records ($n)"
|
|
|
|
ret=0
|
|
|
|
(
|
|
|
|
cd signer
|
|
|
|
RANDFILE=../random.data
|
|
|
|
zone=example
|
2010-08-09 22:34:56 +00:00
|
|
|
key1=`$KEYGEN -q -r $RANDFILE -a NSEC3RSASHA1 -b 1024 -n zone $zone`
|
|
|
|
key2=`$KEYGEN -q -r $RANDFILE -f KSK -a NSEC3RSASHA1 -b 1024 -n zone $zone`
|
2010-06-03 03:13:32 +00:00
|
|
|
cat example.db.in $key1.key $key2.key > example.db
|
|
|
|
$SIGNER -o example -f example.db example.db > /dev/null 2>&1
|
|
|
|
) || ret=1
|
2010-08-09 22:34:56 +00:00
|
|
|
n=`expr $n + 1`
|
2010-06-03 03:13:32 +00:00
|
|
|
if [ $ret != 0 ]; then echo "I:failed"; fi
|
|
|
|
status=`expr $status + $ret`
|
|
|
|
|
|
|
|
echo "I:checking that we can sign a zone (NSEC3) with out-of-zone records ($n)"
|
|
|
|
ret=0
|
|
|
|
(
|
|
|
|
cd signer
|
|
|
|
RANDFILE=../random.data
|
|
|
|
zone=example
|
2010-08-09 22:34:56 +00:00
|
|
|
key1=`$KEYGEN -q -r $RANDFILE -a NSEC3RSASHA1 -b 1024 -n zone $zone`
|
|
|
|
key2=`$KEYGEN -q -r $RANDFILE -f KSK -a NSEC3RSASHA1 -b 1024 -n zone $zone`
|
2010-06-03 03:13:32 +00:00
|
|
|
cat example.db.in $key1.key $key2.key > example.db
|
2010-06-04 00:04:39 +00:00
|
|
|
$SIGNER -3 - -H 10 -o example -f example.db example.db > /dev/null 2>&1
|
2010-06-03 21:44:49 +00:00
|
|
|
grep "IQF9LQTLKKNFK0KVIFELRAK4IC4QLTMG.example. 0 IN NSEC3 1 0 10 - IQF9LQTLKKNFK0KVIFELRAK4IC4QLTMG A NS SOA RRSIG DNSKEY NSEC3PARAM" example.db > /dev/null
|
2010-06-03 03:13:32 +00:00
|
|
|
) || ret=1
|
2010-08-09 22:34:56 +00:00
|
|
|
n=`expr $n + 1`
|
2010-06-03 03:13:32 +00:00
|
|
|
if [ $ret != 0 ]; then echo "I:failed"; fi
|
|
|
|
status=`expr $status + $ret`
|
|
|
|
|
2010-06-25 03:24:05 +00:00
|
|
|
# Test that "rndc secroots" is able to dump trusted keys
|
|
|
|
echo "I:checking rndc secroots ($n)"
|
|
|
|
ret=0
|
|
|
|
$RNDC -c ../common/rndc.conf -s 10.53.0.4 -p 9953 secroots 2>&1 | sed 's/^/I:ns1 /'
|
|
|
|
keyid=`cat ns1/managed.key.id`
|
|
|
|
linecount=`grep "./RSAMD5/$keyid ; trusted" ns4/named.secroots | wc -l`
|
2010-06-25 07:28:46 +00:00
|
|
|
[ "$linecount" -eq 1 ] || ret=1
|
2010-06-25 03:24:05 +00:00
|
|
|
linecount=`cat ns4/named.secroots | wc -l`
|
2010-06-25 07:28:46 +00:00
|
|
|
[ "$linecount" -eq 5 ] || ret=1
|
2010-06-25 03:24:05 +00:00
|
|
|
n=`expr $n + 1`
|
|
|
|
if [ $ret != 0 ]; then echo "I:failed"; fi
|
|
|
|
status=`expr $status + $ret`
|
|
|
|
|
2010-07-15 01:17:45 +00:00
|
|
|
# Check direct query for RRSIG. If we first ask for normal (non RRSIG)
|
|
|
|
# record, the corresponding RRSIG should be cached and subsequent query
|
|
|
|
# for RRSIG will be returned with the cached record.
|
|
|
|
echo "I:checking RRSIG query from cache ($n)"
|
|
|
|
ret=0
|
|
|
|
$DIG $DIGOPTS normalthenrrsig.secure.example. @10.53.0.4 a > /dev/null || ret=1
|
|
|
|
ans=`$DIG $DIGOPTS +short normalthenrrsig.secure.example. @10.53.0.4 rrsig` || ret=1
|
|
|
|
expect=`$DIG $DIGOPTS +short normalthenrrsig.secure.example. @10.53.0.3 rrsig | grep '^A' ` || ret=1
|
|
|
|
test "$ans" = "$expect" || ret=1
|
|
|
|
n=`expr $n + 1`
|
|
|
|
if [ $ret != 0 ]; then echo "I:failed"; fi
|
|
|
|
status=`expr $status + $ret`
|
|
|
|
|
|
|
|
# Check direct query for RRSIG: If it's not cached with other records,
|
|
|
|
# it should result in an empty response.
|
|
|
|
echo "I:checking RRSIG query not in cache ($n)"
|
|
|
|
ret=0
|
|
|
|
ans=`$DIG $DIGOPTS +short rrsigonly.secure.example. @10.53.0.4 rrsig` || ret=1
|
|
|
|
test -z "$ans" || ret=1
|
|
|
|
n=`expr $n + 1`
|
|
|
|
if [ $ret != 0 ]; then echo "I:failed"; fi
|
|
|
|
status=`expr $status + $ret`
|
|
|
|
|
2010-08-13 06:46:25 +00:00
|
|
|
#
|
|
|
|
# RT21868 regression test.
|
|
|
|
#
|
|
|
|
echo "I:checking NSEC3 zone with mismatched NSEC3PARAM / NSEC parameters ($n)"
|
|
|
|
ret=0
|
|
|
|
$DIG $DIGOPTS non-exist.badparam. @10.53.0.2 a > dig.out.ns2.test$n || ret=1
|
|
|
|
grep "status: NXDOMAIN" dig.out.ns2.test$n > /dev/null || ret=1
|
|
|
|
n=`expr $n + 1`
|
|
|
|
if [ $ret != 0 ]; then echo "I:failed"; fi
|
|
|
|
status=`expr $status + $ret`
|
|
|
|
|
2010-09-07 00:58:36 +00:00
|
|
|
#
|
|
|
|
# RT22007 regression test.
|
|
|
|
#
|
|
|
|
echo "I:checking optout NSEC3 referral with only insecure delegations ($n)"
|
|
|
|
ret=0
|
|
|
|
$DIG $DIGOPTS +norec delegation.single-nsec3. @10.53.0.2 a > dig.out.ns2.test$n || ret=1
|
|
|
|
grep "status: NOERROR" dig.out.ns2.test$n > /dev/null || ret=1
|
|
|
|
grep "3KL3NK1HKQ4IUEEHBEF12VGFKUETNBAN.*NSEC3 1 1 1 - 3KL3NK1HKQ4IUEEHBEF12VGFKUETNBAN" dig.out.ns2.test$n > /dev/null || ret=1
|
|
|
|
n=`expr $n + 1`
|
|
|
|
if [ $ret != 0 ]; then echo "I:failed"; fi
|
|
|
|
status=`expr $status + $ret`
|
|
|
|
|
|
|
|
echo "I:checking optout NSEC3 NXDOMAIN with only insecure delegations ($n)"
|
|
|
|
ret=0
|
|
|
|
$DIG $DIGOPTS +norec nonexist.single-nsec3. @10.53.0.2 a > dig.out.ns2.test$n || ret=1
|
|
|
|
grep "status: NXDOMAIN" dig.out.ns2.test$n > /dev/null || ret=1
|
|
|
|
grep "3KL3NK1HKQ4IUEEHBEF12VGFKUETNBAN.*NSEC3 1 1 1 - 3KL3NK1HKQ4IUEEHBEF12VGFKUETNBAN" dig.out.ns2.test$n > /dev/null || ret=1
|
|
|
|
n=`expr $n + 1`
|
|
|
|
if [ $ret != 0 ]; then echo "I:failed"; fi
|
|
|
|
|
|
|
|
status=`expr $status + $ret`
|
|
|
|
echo "I:checking optout NSEC3 nodata with only insecure delegations ($n)"
|
|
|
|
ret=0
|
|
|
|
$DIG $DIGOPTS +norec single-nsec3. @10.53.0.2 a > dig.out.ns2.test$n || ret=1
|
|
|
|
grep "status: NOERROR" dig.out.ns2.test$n > /dev/null || ret=1
|
|
|
|
grep "3KL3NK1HKQ4IUEEHBEF12VGFKUETNBAN.*NSEC3 1 1 1 - 3KL3NK1HKQ4IUEEHBEF12VGFKUETNBAN" dig.out.ns2.test$n > /dev/null || ret=1
|
|
|
|
n=`expr $n + 1`
|
|
|
|
if [ $ret != 0 ]; then echo "I:failed"; fi
|
|
|
|
status=`expr $status + $ret`
|
|
|
|
|
2010-08-09 22:34:56 +00:00
|
|
|
# Run a minimal update test if possible. This is really just
|
|
|
|
# a regression test for RT #2399; more tests should be added.
|
|
|
|
|
|
|
|
if $PERL -e 'use Net::DNS;' 2>/dev/null
|
|
|
|
then
|
|
|
|
echo "I:running DNSSEC update test"
|
|
|
|
$PERL dnssec_update_test.pl -s 10.53.0.3 -p 5300 dynamic.example. || status=1
|
|
|
|
else
|
|
|
|
echo "I:The DNSSEC update test requires the Net::DNS library." >&2
|
|
|
|
fi
|
|
|
|
|
2000-07-07 18:25:20 +00:00
|
|
|
echo "I:exit status: $status"
|
2000-07-05 18:49:06 +00:00
|
|
|
exit $status
|