2009-11-30 21:00:48 +00:00
|
|
|
#!/bin/sh
|
|
|
|
#
|
2010-01-18 23:48:40 +00:00
|
|
|
# Copyright (C) 2009, 2010 Internet Systems Consortium, Inc. ("ISC")
|
2009-11-30 21:00:48 +00:00
|
|
|
#
|
|
|
|
# Permission to use, copy, modify, and/or distribute this software for any
|
|
|
|
# purpose with or without fee is hereby granted, provided that the above
|
|
|
|
# copyright notice and this permission notice appear in all copies.
|
|
|
|
#
|
|
|
|
# THE SOFTWARE IS PROVIDED "AS IS" AND ISC DISCLAIMS ALL WARRANTIES WITH
|
|
|
|
# REGARD TO THIS SOFTWARE INCLUDING ALL IMPLIED WARRANTIES OF MERCHANTABILITY
|
|
|
|
# AND FITNESS. IN NO EVENT SHALL ISC BE LIABLE FOR ANY SPECIAL, DIRECT,
|
|
|
|
# INDIRECT, OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES WHATSOEVER RESULTING FROM
|
|
|
|
# LOSS OF USE, DATA OR PROFITS, WHETHER IN AN ACTION OF CONTRACT, NEGLIGENCE
|
|
|
|
# OR OTHER TORTIOUS ACTION, ARISING OUT OF OR IN CONNECTION WITH THE USE OR
|
|
|
|
# PERFORMANCE OF THIS SOFTWARE.
|
|
|
|
|
2010-01-18 23:48:40 +00:00
|
|
|
# $Id: tests.sh,v 1.7 2010/01/18 23:48:39 tbox Exp $
|
2009-11-30 21:00:48 +00:00
|
|
|
|
|
|
|
SYSTEMTESTTOP=..
|
|
|
|
. $SYSTEMTESTTOP/conf.sh
|
|
|
|
|
|
|
|
status=0
|
|
|
|
n=0
|
|
|
|
|
|
|
|
|
|
|
|
DIGOPTS="+tcp +noadd +nosea +nostat +nocmd +dnssec -p 5300"
|
|
|
|
|
2010-01-18 19:19:31 +00:00
|
|
|
echo "I:waiting 30 seconds for autosign changes to take effect"
|
|
|
|
sleep 30
|
|
|
|
|
|
|
|
echo "I:checking that zone transfer worked ($n)"
|
|
|
|
ret=0
|
|
|
|
$DIG $DIGOPTS a.example. @10.53.0.2 a > dig.out.ns2.test$n || ret=1
|
|
|
|
$DIG $DIGOPTS a.example. @10.53.0.3 a > dig.out.ns3.test$n || ret=1
|
|
|
|
$PERL ../digcomp.pl dig.out.ns2.test$n dig.out.ns3.test$n || ret=1
|
|
|
|
n=`expr $n + 1`
|
|
|
|
if [ $ret != 0 ]; then echo "I:failed"; fi
|
|
|
|
status=`expr $status + $ret`
|
|
|
|
|
|
|
|
echo "I:checking NSEC->NSEC3 conversion prerequisites ($n)"
|
|
|
|
ret=0
|
|
|
|
# this command should result in an empty file:
|
|
|
|
$DIG $DIGOPTS +noall +answer nsec3.example. nsec3param @10.53.0.3 > dig.out.ns3.test$n || ret=1
|
|
|
|
grep "NSEC3PARAM" dig.out.ns3.test$n > /dev/null && ret=1
|
|
|
|
n=`expr $n + 1`
|
|
|
|
if [ $ret != 0 ]; then echo "I:failed"; fi
|
|
|
|
status=`expr $status + $ret`
|
|
|
|
|
|
|
|
echo "I:checking NSEC3->NSEC conversion prerequisites ($n)"
|
|
|
|
ret=0
|
|
|
|
$DIG $DIGOPTS +noall +answer nsec3-to-nsec.example. nsec3param @10.53.0.3 > dig.out.ns3.test$n || ret=1
|
|
|
|
grep "NSEC3PARAM" dig.out.ns3.test$n > /dev/null || ret=1
|
|
|
|
n=`expr $n + 1`
|
|
|
|
if [ $ret != 0 ]; then echo "I:failed"; fi
|
|
|
|
status=`expr $status + $ret`
|
|
|
|
|
2009-11-30 21:00:48 +00:00
|
|
|
echo "I:converting zones from nsec to nsec3"
|
2010-01-18 19:19:31 +00:00
|
|
|
$NSUPDATE > /dev/null 2>&1 <<END || status=1
|
2009-11-30 21:00:48 +00:00
|
|
|
server 10.53.0.3 5300
|
|
|
|
zone nsec3.nsec3.example.
|
|
|
|
update add nsec3.nsec3.example. 3600 NSEC3PARAM 1 0 10 BEEF
|
|
|
|
send
|
|
|
|
zone optout.nsec3.example.
|
|
|
|
update add optout.nsec3.example. 3600 NSEC3PARAM 1 1 10 BEEF
|
|
|
|
send
|
|
|
|
zone nsec3.example.
|
|
|
|
update add nsec3.example. 3600 NSEC3PARAM 1 0 10 BEEF
|
|
|
|
send
|
|
|
|
zone nsec3.optout.example.
|
|
|
|
update add nsec3.optout.example. 3600 NSEC3PARAM 1 0 10 BEEF
|
|
|
|
send
|
|
|
|
zone optout.optout.example.
|
|
|
|
update add optout.optout.example. 3600 NSEC3PARAM 1 1 10 BEEF
|
|
|
|
send
|
|
|
|
zone optout.example.
|
|
|
|
update add optout.example. 3600 NSEC3PARAM 1 1 10 BEEF
|
|
|
|
send
|
|
|
|
END
|
|
|
|
|
2010-01-18 19:19:31 +00:00
|
|
|
# try to convert nsec.example; this should fail due to non-NSEC key
|
|
|
|
$NSUPDATE > nsupdate.out 2>&1 <<END
|
|
|
|
server 10.53.0.3 5300
|
|
|
|
zone nsec.example.
|
|
|
|
update add nsec.example. 3600 NSEC3PARAM 1 0 10 BEEF
|
|
|
|
send
|
|
|
|
END
|
|
|
|
|
|
|
|
echo "I:waiting for changes to take effect"
|
|
|
|
sleep 3
|
|
|
|
|
|
|
|
echo "I:converting zone from nsec3 to nsec"
|
|
|
|
$NSUPDATE > /dev/null 2>&1 << END || status=1
|
|
|
|
server 10.53.0.3 5300
|
|
|
|
zone nsec3-to-nsec.example.
|
|
|
|
update delete nsec3-to-nsec.example. NSEC3PARAM
|
|
|
|
send
|
|
|
|
END
|
|
|
|
|
|
|
|
echo "I:waiting for change to take effect"
|
|
|
|
sleep 3
|
2009-11-30 21:00:48 +00:00
|
|
|
|
|
|
|
# Send rndc freeze command to ns1, ns2 and ns3, to force the dynamically
|
|
|
|
# signed zones to be dumped to their zone files
|
|
|
|
echo "I:dumping zone files"
|
|
|
|
$RNDC -c ../common/rndc.conf -s 10.53.0.1 -p 9953 freeze 2>&1 | sed 's/^/I:ns1 /'
|
2010-01-18 19:19:31 +00:00
|
|
|
$RNDC -c ../common/rndc.conf -s 10.53.0.1 -p 9953 thaw 2>&1 | sed 's/^/I:ns1 /'
|
2009-11-30 21:00:48 +00:00
|
|
|
$RNDC -c ../common/rndc.conf -s 10.53.0.2 -p 9953 freeze 2>&1 | sed 's/^/I:ns2 /'
|
2010-01-18 19:19:31 +00:00
|
|
|
$RNDC -c ../common/rndc.conf -s 10.53.0.2 -p 9953 thaw 2>&1 | sed 's/^/I:ns2 /'
|
2009-11-30 21:00:48 +00:00
|
|
|
$RNDC -c ../common/rndc.conf -s 10.53.0.3 -p 9953 freeze 2>&1 | sed 's/^/I:ns3 /'
|
2010-01-18 19:19:31 +00:00
|
|
|
$RNDC -c ../common/rndc.conf -s 10.53.0.3 -p 9953 thaw 2>&1 | sed 's/^/I:ns3 /'
|
2009-11-30 21:00:48 +00:00
|
|
|
|
2010-01-18 19:19:31 +00:00
|
|
|
echo "I:checking expired signatures were updated ($n)"
|
|
|
|
ret=0
|
|
|
|
$DIG $DIGOPTS +noauth a.oldsigs.example. @10.53.0.3 a > dig.out.ns3.test$n || ret=1
|
|
|
|
$DIG $DIGOPTS +noauth a.oldsigs.example. @10.53.0.4 a > dig.out.ns4.test$n || ret=1
|
|
|
|
$PERL ../digcomp.pl dig.out.ns3.test$n dig.out.ns4.test$n || ret=1
|
|
|
|
grep "flags:.*ad.*QUERY" dig.out.ns4.test$n > /dev/null || ret=1
|
|
|
|
n=`expr $n + 1`
|
|
|
|
if [ $ret != 0 ]; then echo "I:failed"; fi
|
|
|
|
status=`expr $status + $ret`
|
2009-11-30 21:00:48 +00:00
|
|
|
|
2010-01-18 19:19:31 +00:00
|
|
|
echo "I:checking NSEC->NSEC3 conversion succeeded ($n)"
|
2009-11-30 21:00:48 +00:00
|
|
|
ret=0
|
2010-01-18 19:19:31 +00:00
|
|
|
$DIG $DIGOPTS nsec3.example. nsec3param @10.53.0.3 > dig.out.ns3.ok.test$n || ret=1
|
|
|
|
grep "status: NOERROR" dig.out.ns3.ok.test$n > /dev/null || ret=1
|
|
|
|
$DIG $DIGOPTS +noauth q.nsec3.example. @10.53.0.3 a > dig.out.ns3.test$n || ret=1
|
|
|
|
$DIG $DIGOPTS +noauth q.nsec3.example. @10.53.0.4 a > dig.out.ns4.test$n || ret=1
|
|
|
|
$PERL ../digcomp.pl dig.out.ns3.test$n dig.out.ns4.test$n || ret=1
|
|
|
|
grep "flags:.*ad.*QUERY" dig.out.ns4.test$n > /dev/null || ret=1
|
|
|
|
grep "status: NXDOMAIN" dig.out.ns4.test$n > /dev/null || ret=1
|
|
|
|
n=`expr $n + 1`
|
|
|
|
if [ $ret != 0 ]; then echo "I:failed"; fi
|
|
|
|
status=`expr $status + $ret`
|
|
|
|
|
|
|
|
echo "I:checking NSEC->NSEC3 conversion failed with NSEC-only key ($n)"
|
|
|
|
ret=0
|
|
|
|
grep "failed: REFUSED" nsupdate.out > /dev/null || ret=1
|
|
|
|
n=`expr $n + 1`
|
|
|
|
if [ $ret != 0 ]; then echo "I:failed"; fi
|
|
|
|
status=`expr $status + $ret`
|
|
|
|
|
|
|
|
echo "I:checking NSEC3->NSEC conversion succeeded ($n)"
|
|
|
|
ret=0
|
|
|
|
# this command should result in an empty file:
|
|
|
|
$DIG $DIGOPTS +noall +answer nsec3-to-nsec.example. nsec3param @10.53.0.3 > dig.out.ns3.nx.test$n || ret=1
|
|
|
|
grep "NSEC3PARAM" dig.out.ns3.nx.test$n > /dev/null && ret=1
|
|
|
|
$DIG $DIGOPTS +noauth q.nsec3-to-nsec.example. @10.53.0.3 a > dig.out.ns3.test$n || ret=1
|
|
|
|
$DIG $DIGOPTS +noauth q.nsec3-to-nsec.example. @10.53.0.4 a > dig.out.ns4.test$n || ret=1
|
|
|
|
$PERL ../digcomp.pl dig.out.ns3.test$n dig.out.ns4.test$n || ret=1
|
|
|
|
grep "flags:.*ad.*QUERY" dig.out.ns4.test$n > /dev/null || ret=1
|
|
|
|
grep "status: NXDOMAIN" dig.out.ns4.test$n > /dev/null || ret=1
|
2009-11-30 21:00:48 +00:00
|
|
|
n=`expr $n + 1`
|
|
|
|
if [ $ret != 0 ]; then echo "I:failed"; fi
|
|
|
|
status=`expr $status + $ret`
|
|
|
|
|
|
|
|
echo "I:checking positive validation NSEC ($n)"
|
|
|
|
ret=0
|
|
|
|
$DIG $DIGOPTS +noauth a.example. @10.53.0.2 a > dig.out.ns2.test$n || ret=1
|
|
|
|
$DIG $DIGOPTS +noauth a.example. @10.53.0.4 a > dig.out.ns4.test$n || ret=1
|
|
|
|
$PERL ../digcomp.pl dig.out.ns2.test$n dig.out.ns4.test$n || ret=1
|
|
|
|
grep "flags:.*ad.*QUERY" dig.out.ns4.test$n > /dev/null || ret=1
|
|
|
|
n=`expr $n + 1`
|
|
|
|
if [ $ret != 0 ]; then echo "I:failed"; fi
|
|
|
|
status=`expr $status + $ret`
|
|
|
|
|
|
|
|
echo "I:checking positive validation NSEC3 ($n)"
|
|
|
|
ret=0
|
|
|
|
$DIG $DIGOPTS +noauth a.nsec3.example. \
|
|
|
|
@10.53.0.3 a > dig.out.ns3.test$n || ret=1
|
|
|
|
$DIG $DIGOPTS +noauth a.nsec3.example. \
|
|
|
|
@10.53.0.4 a > dig.out.ns4.test$n || ret=1
|
|
|
|
$PERL ../digcomp.pl dig.out.ns3.test$n dig.out.ns4.test$n || ret=1
|
|
|
|
grep "flags:.*ad.*QUERY" dig.out.ns4.test$n > /dev/null || ret=1
|
|
|
|
n=`expr $n + 1`
|
|
|
|
if [ $ret != 0 ]; then echo "I:failed"; fi
|
|
|
|
status=`expr $status + $ret`
|
|
|
|
|
|
|
|
echo "I:checking positive validation OPTOUT ($n)"
|
|
|
|
ret=0
|
|
|
|
$DIG $DIGOPTS +noauth a.optout.example. \
|
|
|
|
@10.53.0.3 a > dig.out.ns3.test$n || ret=1
|
|
|
|
$DIG $DIGOPTS +noauth a.optout.example. \
|
|
|
|
@10.53.0.4 a > dig.out.ns4.test$n || ret=1
|
|
|
|
$PERL ../digcomp.pl dig.out.ns3.test$n dig.out.ns4.test$n || ret=1
|
|
|
|
grep "flags:.*ad.*QUERY" dig.out.ns4.test$n > /dev/null || ret=1
|
|
|
|
n=`expr $n + 1`
|
|
|
|
if [ $ret != 0 ]; then echo "I:failed"; fi
|
|
|
|
status=`expr $status + $ret`
|
|
|
|
|
|
|
|
echo "I:checking negative validation NXDOMAIN NSEC ($n)"
|
|
|
|
ret=0
|
|
|
|
$DIG $DIGOPTS +noauth q.example. @10.53.0.2 a > dig.out.ns2.test$n || ret=1
|
|
|
|
$DIG $DIGOPTS +noauth q.example. @10.53.0.4 a > dig.out.ns4.test$n || ret=1
|
|
|
|
$PERL ../digcomp.pl dig.out.ns2.test$n dig.out.ns4.test$n || ret=1
|
|
|
|
grep "flags:.*ad.*QUERY" dig.out.ns4.test$n > /dev/null || ret=1
|
|
|
|
grep "status: NXDOMAIN" dig.out.ns4.test$n > /dev/null || ret=1
|
|
|
|
n=`expr $n + 1`
|
|
|
|
if [ $ret != 0 ]; then echo "I:failed"; fi
|
|
|
|
status=`expr $status + $ret`
|
|
|
|
|
|
|
|
echo "I:checking negative validation NXDOMAIN NSEC3 ($n)"
|
|
|
|
ret=0
|
|
|
|
$DIG $DIGOPTS +noauth q.nsec3.example. \
|
|
|
|
@10.53.0.3 a > dig.out.ns3.test$n || ret=1
|
|
|
|
$DIG $DIGOPTS +noauth q.nsec3.example. \
|
|
|
|
@10.53.0.4 a > dig.out.ns4.test$n || ret=1
|
|
|
|
$PERL ../digcomp.pl dig.out.ns3.test$n dig.out.ns4.test$n || ret=1
|
|
|
|
grep "flags:.*ad.*QUERY" dig.out.ns4.test$n > /dev/null || ret=1
|
|
|
|
grep "status: NXDOMAIN" dig.out.ns4.test$n > /dev/null || ret=1
|
|
|
|
n=`expr $n + 1`
|
|
|
|
if [ $ret != 0 ]; then echo "I:failed"; fi
|
|
|
|
status=`expr $status + $ret`
|
|
|
|
|
|
|
|
echo "I:checking negative validation NXDOMAIN OPTOUT ($n)"
|
|
|
|
ret=0
|
|
|
|
$DIG $DIGOPTS +noauth q.optout.example. \
|
|
|
|
@10.53.0.3 a > dig.out.ns3.test$n || ret=1
|
|
|
|
$DIG $DIGOPTS +noauth q.optout.example. \
|
|
|
|
@10.53.0.4 a > dig.out.ns4.test$n || ret=1
|
|
|
|
$PERL ../digcomp.pl dig.out.ns3.test$n dig.out.ns4.test$n || ret=1
|
|
|
|
grep "status: NXDOMAIN" dig.out.ns4.test$n > /dev/null || ret=1
|
|
|
|
# Note - this is looking for failure, hence the &&
|
|
|
|
grep "flags:.*ad.*QUERY" dig.out.ns4.test$n > /dev/null && ret=1
|
|
|
|
n=`expr $n + 1`
|
|
|
|
if [ $ret != 0 ]; then echo "I:failed"; fi
|
|
|
|
status=`expr $status + $ret`
|
|
|
|
|
|
|
|
echo "I:checking negative validation NODATA NSEC ($n)"
|
|
|
|
ret=0
|
|
|
|
$DIG $DIGOPTS +noauth a.example. @10.53.0.2 txt > dig.out.ns2.test$n || ret=1
|
|
|
|
$DIG $DIGOPTS +noauth a.example. @10.53.0.4 txt > dig.out.ns4.test$n || ret=1
|
|
|
|
$PERL ../digcomp.pl dig.out.ns2.test$n dig.out.ns4.test$n || ret=1
|
|
|
|
grep "flags:.*ad.*QUERY" dig.out.ns4.test$n > /dev/null || ret=1
|
|
|
|
grep "status: NOERROR" dig.out.ns4.test$n > /dev/null || ret=1
|
|
|
|
grep "ANSWER: 0" dig.out.ns4.test$n > /dev/null || ret=1
|
|
|
|
n=`expr $n + 1`
|
|
|
|
if [ $ret != 0 ]; then echo "I:failed"; fi
|
|
|
|
status=`expr $status + $ret`
|
|
|
|
|
|
|
|
echo "I:checking negative validation NODATA NSEC3 ($n)"
|
|
|
|
ret=0
|
|
|
|
$DIG $DIGOPTS +noauth a.nsec3.example. \
|
|
|
|
@10.53.0.3 txt > dig.out.ns3.test$n || ret=1
|
|
|
|
$DIG $DIGOPTS +noauth a.nsec3.example. \
|
|
|
|
@10.53.0.4 txt > dig.out.ns4.test$n || ret=1
|
|
|
|
$PERL ../digcomp.pl dig.out.ns3.test$n dig.out.ns4.test$n || ret=1
|
|
|
|
grep "flags:.*ad.*QUERY" dig.out.ns4.test$n > /dev/null || ret=1
|
|
|
|
grep "status: NOERROR" dig.out.ns4.test$n > /dev/null || ret=1
|
|
|
|
grep "ANSWER: 0" dig.out.ns4.test$n > /dev/null || ret=1
|
|
|
|
n=`expr $n + 1`
|
|
|
|
if [ $ret != 0 ]; then echo "I:failed"; fi
|
|
|
|
status=`expr $status + $ret`
|
|
|
|
|
|
|
|
echo "I:checking negative validation NODATA OPTOUT ($n)"
|
|
|
|
ret=0
|
|
|
|
$DIG $DIGOPTS +noauth a.optout.example. \
|
|
|
|
@10.53.0.3 txt > dig.out.ns3.test$n || ret=1
|
|
|
|
$DIG $DIGOPTS +noauth a.optout.example. \
|
|
|
|
@10.53.0.4 txt > dig.out.ns4.test$n || ret=1
|
|
|
|
$PERL ../digcomp.pl dig.out.ns3.test$n dig.out.ns4.test$n || ret=1
|
|
|
|
grep "flags:.*ad.*QUERY" dig.out.ns4.test$n > /dev/null || ret=1
|
|
|
|
grep "status: NOERROR" dig.out.ns4.test$n > /dev/null || ret=1
|
|
|
|
grep "ANSWER: 0" dig.out.ns4.test$n > /dev/null || ret=1
|
|
|
|
n=`expr $n + 1`
|
|
|
|
if [ $ret != 0 ]; then echo "I:failed"; fi
|
|
|
|
status=`expr $status + $ret`
|
|
|
|
|
|
|
|
# Check the insecure.example domain
|
|
|
|
|
|
|
|
echo "I:checking 1-server insecurity proof NSEC ($n)"
|
|
|
|
ret=0
|
|
|
|
$DIG $DIGOPTS +noauth a.insecure.example. @10.53.0.3 a > dig.out.ns3.test$n || ret=1
|
|
|
|
$DIG $DIGOPTS +noauth a.insecure.example. @10.53.0.4 a > dig.out.ns4.test$n || ret=1
|
|
|
|
$PERL ../digcomp.pl dig.out.ns3.test$n dig.out.ns4.test$n || ret=1
|
|
|
|
grep "status: NOERROR" dig.out.ns4.test$n > /dev/null || ret=1
|
|
|
|
# Note - this is looking for failure, hence the &&
|
|
|
|
grep "flags:.*ad.*QUERY" dig.out.ns4.test$n > /dev/null && ret=1
|
|
|
|
n=`expr $n + 1`
|
|
|
|
if [ $ret != 0 ]; then echo "I:failed"; fi
|
|
|
|
status=`expr $status + $ret`
|
|
|
|
|
|
|
|
echo "I:checking 1-server negative insecurity proof NSEC ($n)"
|
|
|
|
ret=0
|
|
|
|
$DIG $DIGOPTS q.insecure.example. a @10.53.0.3 \
|
|
|
|
> dig.out.ns3.test$n || ret=1
|
|
|
|
$DIG $DIGOPTS q.insecure.example. a @10.53.0.4 \
|
|
|
|
> dig.out.ns4.test$n || ret=1
|
|
|
|
$PERL ../digcomp.pl dig.out.ns3.test$n dig.out.ns4.test$n || ret=1
|
|
|
|
grep "status: NXDOMAIN" dig.out.ns4.test$n > /dev/null || ret=1
|
|
|
|
# Note - this is looking for failure, hence the &&
|
|
|
|
grep "flags:.*ad.*QUERY" dig.out.ns4.test$n > /dev/null && ret=1
|
|
|
|
n=`expr $n + 1`
|
|
|
|
if [ $ret != 0 ]; then echo "I:failed"; fi
|
|
|
|
status=`expr $status + $ret`
|
|
|
|
|
|
|
|
# Check the secure.example domain
|
|
|
|
|
|
|
|
echo "I:checking multi-stage positive validation NSEC/NSEC ($n)"
|
|
|
|
ret=0
|
|
|
|
$DIG $DIGOPTS +noauth a.secure.example. \
|
|
|
|
@10.53.0.3 a > dig.out.ns3.test$n || ret=1
|
|
|
|
$DIG $DIGOPTS +noauth a.secure.example. \
|
|
|
|
@10.53.0.4 a > dig.out.ns4.test$n || ret=1
|
|
|
|
$PERL ../digcomp.pl dig.out.ns3.test$n dig.out.ns4.test$n || ret=1
|
|
|
|
grep "status: NOERROR" dig.out.ns4.test$n > /dev/null || ret=1
|
|
|
|
grep "flags:.*ad.*QUERY" dig.out.ns4.test$n > /dev/null || ret=1
|
|
|
|
n=`expr $n + 1`
|
|
|
|
if [ $ret != 0 ]; then echo "I:failed"; fi
|
|
|
|
status=`expr $status + $ret`
|
|
|
|
|
|
|
|
echo "I:checking multi-stage positive validation NSEC/NSEC3 ($n)"
|
|
|
|
ret=0
|
|
|
|
$DIG $DIGOPTS +noauth a.nsec3.example. \
|
|
|
|
@10.53.0.3 a > dig.out.ns3.test$n || ret=1
|
|
|
|
$DIG $DIGOPTS +noauth a.nsec3.example. \
|
|
|
|
@10.53.0.4 a > dig.out.ns4.test$n || ret=1
|
|
|
|
$PERL ../digcomp.pl dig.out.ns3.test$n dig.out.ns4.test$n || ret=1
|
|
|
|
grep "status: NOERROR" dig.out.ns4.test$n > /dev/null || ret=1
|
|
|
|
grep "flags:.*ad.*QUERY" dig.out.ns4.test$n > /dev/null || ret=1
|
|
|
|
n=`expr $n + 1`
|
|
|
|
if [ $ret != 0 ]; then echo "I:failed"; fi
|
|
|
|
status=`expr $status + $ret`
|
|
|
|
|
|
|
|
echo "I:checking multi-stage positive validation NSEC/OPTOUT ($n)"
|
|
|
|
ret=0
|
|
|
|
$DIG $DIGOPTS +noauth a.optout.example. \
|
|
|
|
@10.53.0.3 a > dig.out.ns3.test$n || ret=1
|
|
|
|
$DIG $DIGOPTS +noauth a.optout.example. \
|
|
|
|
@10.53.0.4 a > dig.out.ns4.test$n || ret=1
|
|
|
|
$PERL ../digcomp.pl dig.out.ns3.test$n dig.out.ns4.test$n || ret=1
|
|
|
|
grep "status: NOERROR" dig.out.ns4.test$n > /dev/null || ret=1
|
|
|
|
grep "flags:.*ad.*QUERY" dig.out.ns4.test$n > /dev/null || ret=1
|
|
|
|
n=`expr $n + 1`
|
|
|
|
if [ $ret != 0 ]; then echo "I:failed"; fi
|
|
|
|
status=`expr $status + $ret`
|
|
|
|
|
|
|
|
echo "I:checking multi-stage positive validation NSEC3/NSEC ($n)"
|
|
|
|
ret=0
|
|
|
|
$DIG $DIGOPTS +noauth a.secure.nsec3.example. \
|
|
|
|
@10.53.0.3 a > dig.out.ns3.test$n || ret=1
|
|
|
|
$DIG $DIGOPTS +noauth a.secure.nsec3.example. \
|
|
|
|
@10.53.0.4 a > dig.out.ns4.test$n || ret=1
|
|
|
|
$PERL ../digcomp.pl dig.out.ns3.test$n dig.out.ns4.test$n || ret=1
|
|
|
|
grep "status: NOERROR" dig.out.ns4.test$n > /dev/null || ret=1
|
|
|
|
grep "flags:.*ad.*QUERY" dig.out.ns4.test$n > /dev/null || ret=1
|
|
|
|
n=`expr $n + 1`
|
|
|
|
if [ $ret != 0 ]; then echo "I:failed"; fi
|
|
|
|
status=`expr $status + $ret`
|
|
|
|
|
|
|
|
echo "I:checking multi-stage positive validation NSEC3/NSEC3 ($n)"
|
|
|
|
ret=0
|
|
|
|
$DIG $DIGOPTS +noauth a.nsec3.nsec3.example. \
|
|
|
|
@10.53.0.3 a > dig.out.ns3.test$n || ret=1
|
|
|
|
$DIG $DIGOPTS +noauth a.nsec3.nsec3.example. \
|
|
|
|
@10.53.0.4 a > dig.out.ns4.test$n || ret=1
|
|
|
|
$PERL ../digcomp.pl dig.out.ns3.test$n dig.out.ns4.test$n || ret=1
|
|
|
|
grep "status: NOERROR" dig.out.ns4.test$n > /dev/null || ret=1
|
|
|
|
grep "flags:.*ad.*QUERY" dig.out.ns4.test$n > /dev/null || ret=1
|
|
|
|
n=`expr $n + 1`
|
|
|
|
if [ $ret != 0 ]; then echo "I:failed"; fi
|
|
|
|
status=`expr $status + $ret`
|
|
|
|
|
|
|
|
echo "I:checking multi-stage positive validation NSEC3/OPTOUT ($n)"
|
|
|
|
ret=0
|
|
|
|
$DIG $DIGOPTS +noauth a.optout.nsec3.example. \
|
|
|
|
@10.53.0.3 a > dig.out.ns3.test$n || ret=1
|
|
|
|
$DIG $DIGOPTS +noauth a.optout.nsec3.example. \
|
|
|
|
@10.53.0.4 a > dig.out.ns4.test$n || ret=1
|
|
|
|
$PERL ../digcomp.pl dig.out.ns3.test$n dig.out.ns4.test$n || ret=1
|
|
|
|
grep "status: NOERROR" dig.out.ns4.test$n > /dev/null || ret=1
|
|
|
|
grep "flags:.*ad.*QUERY" dig.out.ns4.test$n > /dev/null || ret=1
|
|
|
|
n=`expr $n + 1`
|
|
|
|
if [ $ret != 0 ]; then echo "I:failed"; fi
|
|
|
|
status=`expr $status + $ret`
|
|
|
|
|
|
|
|
echo "I:checking multi-stage positive validation OPTOUT/NSEC ($n)"
|
|
|
|
ret=0
|
|
|
|
$DIG $DIGOPTS +noauth a.secure.optout.example. \
|
|
|
|
@10.53.0.3 a > dig.out.ns3.test$n || ret=1
|
|
|
|
$DIG $DIGOPTS +noauth a.secure.optout.example. \
|
|
|
|
@10.53.0.4 a > dig.out.ns4.test$n || ret=1
|
|
|
|
$PERL ../digcomp.pl dig.out.ns3.test$n dig.out.ns4.test$n || ret=1
|
|
|
|
grep "status: NOERROR" dig.out.ns4.test$n > /dev/null || ret=1
|
|
|
|
grep "flags:.*ad.*QUERY" dig.out.ns4.test$n > /dev/null || ret=1
|
|
|
|
n=`expr $n + 1`
|
|
|
|
if [ $ret != 0 ]; then echo "I:failed"; fi
|
|
|
|
status=`expr $status + $ret`
|
|
|
|
|
|
|
|
echo "I:checking multi-stage positive validation OPTOUT/NSEC3 ($n)"
|
|
|
|
ret=0
|
|
|
|
$DIG $DIGOPTS +noauth a.nsec3.optout.example. \
|
|
|
|
@10.53.0.3 a > dig.out.ns3.test$n || ret=1
|
|
|
|
$DIG $DIGOPTS +noauth a.nsec3.optout.example. \
|
|
|
|
@10.53.0.4 a > dig.out.ns4.test$n || ret=1
|
|
|
|
$PERL ../digcomp.pl dig.out.ns3.test$n dig.out.ns4.test$n || ret=1
|
|
|
|
grep "status: NOERROR" dig.out.ns4.test$n > /dev/null || ret=1
|
|
|
|
grep "flags:.*ad.*QUERY" dig.out.ns4.test$n > /dev/null || ret=1
|
|
|
|
n=`expr $n + 1`
|
|
|
|
if [ $ret != 0 ]; then echo "I:failed"; fi
|
|
|
|
status=`expr $status + $ret`
|
|
|
|
|
|
|
|
echo "I:checking multi-stage positive validation OPTOUT/OPTOUT ($n)"
|
|
|
|
ret=0
|
|
|
|
$DIG $DIGOPTS +noauth a.optout.optout.example. \
|
|
|
|
@10.53.0.3 a > dig.out.ns3.test$n || ret=1
|
|
|
|
$DIG $DIGOPTS +noauth a.optout.optout.example. \
|
|
|
|
@10.53.0.4 a > dig.out.ns4.test$n || ret=1
|
|
|
|
$PERL ../digcomp.pl dig.out.ns3.test$n dig.out.ns4.test$n || ret=1
|
|
|
|
grep "status: NOERROR" dig.out.ns4.test$n > /dev/null || ret=1
|
|
|
|
grep "flags:.*ad.*QUERY" dig.out.ns4.test$n > /dev/null || ret=1
|
|
|
|
n=`expr $n + 1`
|
|
|
|
if [ $ret != 0 ]; then echo "I:failed"; fi
|
|
|
|
status=`expr $status + $ret`
|
|
|
|
|
|
|
|
echo "I:checking empty NODATA OPTOUT ($n)"
|
|
|
|
ret=0
|
|
|
|
$DIG $DIGOPTS +noauth empty.optout.example. \
|
|
|
|
@10.53.0.3 a > dig.out.ns3.test$n || ret=1
|
|
|
|
$DIG $DIGOPTS +noauth empty.optout.example. \
|
|
|
|
@10.53.0.4 a > dig.out.ns4.test$n || ret=1
|
|
|
|
$PERL ../digcomp.pl dig.out.ns3.test$n dig.out.ns4.test$n || ret=1
|
|
|
|
grep "status: NOERROR" dig.out.ns4.test$n > /dev/null || ret=1
|
|
|
|
#grep "flags:.*ad.*QUERY" dig.out.ns4.test$n > /dev/null || ret=1
|
|
|
|
n=`expr $n + 1`
|
|
|
|
if [ $ret != 0 ]; then echo "I:failed"; fi
|
|
|
|
status=`expr $status + $ret`
|
|
|
|
|
|
|
|
# Check the insecure.secure.example domain (insecurity proof)
|
|
|
|
|
|
|
|
echo "I:checking 2-server insecurity proof ($n)"
|
|
|
|
ret=0
|
|
|
|
$DIG $DIGOPTS +noauth a.insecure.secure.example. @10.53.0.2 a \
|
|
|
|
> dig.out.ns2.test$n || ret=1
|
|
|
|
$DIG $DIGOPTS +noauth a.insecure.secure.example. @10.53.0.4 a \
|
|
|
|
> dig.out.ns4.test$n || ret=1
|
|
|
|
$PERL ../digcomp.pl dig.out.ns2.test$n dig.out.ns4.test$n || ret=1
|
|
|
|
grep "status: NOERROR" dig.out.ns4.test$n > /dev/null || ret=1
|
|
|
|
# Note - this is looking for failure, hence the &&
|
|
|
|
grep "flags:.*ad.*QUERY" dig.out.ns4.test$n > /dev/null && ret=1
|
|
|
|
n=`expr $n + 1`
|
|
|
|
if [ $ret != 0 ]; then echo "I:failed"; fi
|
|
|
|
status=`expr $status + $ret`
|
|
|
|
|
|
|
|
# Check a negative response in insecure.secure.example
|
|
|
|
|
|
|
|
echo "I:checking 2-server insecurity proof with a negative answer ($n)"
|
|
|
|
ret=0
|
|
|
|
$DIG $DIGOPTS q.insecure.secure.example. @10.53.0.2 a > dig.out.ns2.test$n \
|
|
|
|
|| ret=1
|
|
|
|
$DIG $DIGOPTS q.insecure.secure.example. @10.53.0.4 a > dig.out.ns4.test$n \
|
|
|
|
|| ret=1
|
|
|
|
$PERL ../digcomp.pl dig.out.ns2.test$n dig.out.ns4.test$n || ret=1
|
|
|
|
grep "status: NXDOMAIN" dig.out.ns4.test$n > /dev/null || ret=1
|
|
|
|
# Note - this is looking for failure, hence the &&
|
|
|
|
grep "flags:.*ad.*QUERY" dig.out.ns4.test$n > /dev/null && ret=1
|
|
|
|
n=`expr $n + 1`
|
|
|
|
if [ $ret != 0 ]; then echo "I:failed"; fi
|
|
|
|
status=`expr $status + $ret`
|
|
|
|
|
|
|
|
echo "I:checking security root query ($n)"
|
|
|
|
ret=0
|
|
|
|
$DIG $DIGOPTS . @10.53.0.4 key > dig.out.ns4.test$n || ret=1
|
|
|
|
grep "NOERROR" dig.out.ns4.test$n > /dev/null || ret=1
|
|
|
|
grep "flags:.*ad.*QUERY" dig.out.ns4.test$n > /dev/null || ret=1
|
|
|
|
n=`expr $n + 1`
|
|
|
|
if [ $ret != 0 ]; then echo "I:failed"; fi
|
|
|
|
status=`expr $status + $ret`
|
|
|
|
|
|
|
|
echo "I:checking positive validation RSASHA256 NSEC ($n)"
|
|
|
|
ret=0
|
|
|
|
$DIG $DIGOPTS +noauth a.rsasha256.example. @10.53.0.3 a > dig.out.ns3.test$n || ret=1
|
|
|
|
$DIG $DIGOPTS +noauth a.rsasha256.example. @10.53.0.4 a > dig.out.ns4.test$n || ret=1
|
|
|
|
$PERL ../digcomp.pl dig.out.ns3.test$n dig.out.ns4.test$n || ret=1
|
|
|
|
grep "flags:.*ad.*QUERY" dig.out.ns4.test$n > /dev/null || ret=1
|
|
|
|
n=`expr $n + 1`
|
|
|
|
if [ $ret != 0 ]; then echo "I:failed"; fi
|
|
|
|
status=`expr $status + $ret`
|
|
|
|
|
|
|
|
echo "I:checking positive validation RSASHA512 NSEC ($n)"
|
|
|
|
ret=0
|
|
|
|
$DIG $DIGOPTS +noauth a.rsasha512.example. @10.53.0.3 a > dig.out.ns3.test$n || ret=1
|
|
|
|
$DIG $DIGOPTS +noauth a.rsasha512.example. @10.53.0.4 a > dig.out.ns4.test$n || ret=1
|
|
|
|
$PERL ../digcomp.pl dig.out.ns3.test$n dig.out.ns4.test$n || ret=1
|
|
|
|
grep "flags:.*ad.*QUERY" dig.out.ns4.test$n > /dev/null || ret=1
|
|
|
|
n=`expr $n + 1`
|
|
|
|
if [ $ret != 0 ]; then echo "I:failed"; fi
|
|
|
|
status=`expr $status + $ret`
|
|
|
|
|
|
|
|
echo "I:checking that positive validation in a privately secure zone works ($n)"
|
|
|
|
ret=0
|
|
|
|
$DIG $DIGOPTS +noauth a.private.secure.example. a @10.53.0.2 \
|
|
|
|
> dig.out.ns2.test$n || ret=1
|
|
|
|
$DIG $DIGOPTS +noauth a.private.secure.example. a @10.53.0.4 \
|
|
|
|
> dig.out.ns4.test$n || ret=1
|
|
|
|
$PERL ../digcomp.pl dig.out.ns2.test$n dig.out.ns4.test$n || ret=1
|
|
|
|
grep "NOERROR" dig.out.ns4.test$n > /dev/null || ret=1
|
|
|
|
# Note - this is looking for failure, hence the &&
|
|
|
|
grep "flags:.*ad.*QUERY" dig.out.ns4.test$n > /dev/null && ret=1
|
|
|
|
n=`expr $n + 1`
|
|
|
|
if [ $ret != 0 ]; then echo "I:failed"; fi
|
|
|
|
status=`expr $status + $ret`
|
|
|
|
|
|
|
|
echo "I:checking that negative validation in a privately secure zone works ($n)"
|
|
|
|
ret=0
|
|
|
|
$DIG $DIGOPTS +noauth q.private.secure.example. a @10.53.0.2 \
|
|
|
|
> dig.out.ns2.test$n || ret=1
|
|
|
|
$DIG $DIGOPTS +noauth q.private.secure.example. a @10.53.0.4 \
|
|
|
|
> dig.out.ns4.test$n || ret=1
|
|
|
|
$PERL ../digcomp.pl dig.out.ns2.test$n dig.out.ns4.test$n || ret=1
|
|
|
|
grep "NXDOMAIN" dig.out.ns4.test$n > /dev/null || ret=1
|
|
|
|
# Note - this is looking for failure, hence the &&
|
|
|
|
grep "flags:.*ad.*QUERY" dig.out.ns4.test$n > /dev/null && ret=1
|
|
|
|
n=`expr $n + 1`
|
|
|
|
if [ $ret != 0 ]; then echo "I:failed"; fi
|
|
|
|
status=`expr $status + $ret`
|
|
|
|
|
|
|
|
echo "I:checking privately secure to nxdomain works ($n)"
|
|
|
|
ret=0
|
|
|
|
$DIG $DIGOPTS +noauth private2secure-nxdomain.private.secure.example. SOA @10.53.0.2 \
|
|
|
|
> dig.out.ns2.test$n || ret=1
|
|
|
|
$DIG $DIGOPTS +noauth private2secure-nxdomain.private.secure.example. SOA @10.53.0.4 \
|
|
|
|
> dig.out.ns4.test$n || ret=1
|
|
|
|
$PERL ../digcomp.pl dig.out.ns2.test$n dig.out.ns4.test$n || ret=1
|
|
|
|
# Note - this is looking for failure, hence the &&
|
|
|
|
grep "flags:.*ad.*QUERY" dig.out.ns4.test$n > /dev/null && ret=1
|
|
|
|
n=`expr $n + 1`
|
|
|
|
if [ $ret != 0 ]; then echo "I:failed"; fi
|
|
|
|
status=`expr $status + $ret`
|
|
|
|
|
|
|
|
# Try validating with a revoked trusted key.
|
|
|
|
# This should fail.
|
|
|
|
|
|
|
|
echo "I:checking that validation fails due to revoked trusted key ($n)"
|
|
|
|
ret=0
|
|
|
|
$DIG $DIGOPTS example. soa @10.53.0.5 > dig.out.ns5.test$n || ret=1
|
|
|
|
grep "SERVFAIL" dig.out.ns5.test$n > /dev/null || ret=1
|
|
|
|
n=`expr $n + 1`
|
|
|
|
if [ $ret != 0 ]; then echo "I:failed"; fi
|
|
|
|
status=`expr $status + $ret`
|
|
|
|
|
|
|
|
echo "I:checking that revoked key is present ($n)"
|
|
|
|
ret=0
|
2009-12-19 17:30:31 +00:00
|
|
|
id=`sed 's/^K.+007+0*//' < rev.key`
|
2009-11-30 21:00:48 +00:00
|
|
|
id=`expr $id + 128 % 65536`
|
|
|
|
$DIG $DIGOPTS +multi dnskey . @10.53.0.1 > dig.out.ns1.test$n || ret=1
|
|
|
|
grep '; key id = '"$id"'$' dig.out.ns1.test$n > /dev/null || ret=1
|
|
|
|
n=`expr $n + 1`
|
|
|
|
if [ $ret != 0 ]; then echo "I:failed"; fi
|
|
|
|
status=`expr $status + $ret`
|
|
|
|
|
|
|
|
echo "I:checking that revoked key self-signs ($n)"
|
|
|
|
ret=0
|
2009-12-19 17:30:31 +00:00
|
|
|
id=`sed 's/^K.+007+0*//' < rev.key`
|
2009-11-30 21:00:48 +00:00
|
|
|
id=`expr $id + 128 % 65536`
|
|
|
|
$DIG $DIGOPTS dnskey . @10.53.0.1 > dig.out.ns1.test$n || ret=1
|
|
|
|
grep 'RRSIG.*'" $id "'\. ' dig.out.ns1.test$n > /dev/null || ret=1
|
|
|
|
n=`expr $n + 1`
|
|
|
|
if [ $ret != 0 ]; then echo "I:failed"; fi
|
|
|
|
status=`expr $status + $ret`
|
|
|
|
|
|
|
|
echo "I:checking for unpublished key ($n)"
|
|
|
|
ret=0
|
2009-12-19 17:30:31 +00:00
|
|
|
id=`sed 's/^K.+007+0*//' < unpub.key`
|
2009-11-30 21:00:48 +00:00
|
|
|
$DIG $DIGOPTS +multi dnskey . @10.53.0.1 > dig.out.ns1.test$n || ret=1
|
|
|
|
grep '; key id = '"$id"'$' dig.out.ns1.test$n > /dev/null && ret=1
|
|
|
|
n=`expr $n + 1`
|
|
|
|
if [ $ret != 0 ]; then echo "I:failed"; fi
|
|
|
|
status=`expr $status + $ret`
|
|
|
|
|
|
|
|
echo "I:checking that standby key does not sign records ($n)"
|
|
|
|
ret=0
|
2009-12-19 17:30:31 +00:00
|
|
|
id=`sed 's/^K.+007+0*//' < standby.key`
|
2009-11-30 21:00:48 +00:00
|
|
|
$DIG $DIGOPTS dnskey . @10.53.0.1 > dig.out.ns1.test$n || ret=1
|
|
|
|
grep 'RRSIG.*'" $id "'\. ' dig.out.ns1.test$n > /dev/null && ret=1
|
|
|
|
n=`expr $n + 1`
|
|
|
|
if [ $ret != 0 ]; then echo "I:failed"; fi
|
|
|
|
status=`expr $status + $ret`
|
|
|
|
|
|
|
|
echo "I:checking that deactivated key does not sign records ($n)"
|
|
|
|
ret=0
|
2009-12-19 17:30:31 +00:00
|
|
|
id=`sed 's/^K.+007+0*//' < inact.key`
|
2009-11-30 21:00:48 +00:00
|
|
|
$DIG $DIGOPTS dnskey . @10.53.0.1 > dig.out.ns1.test$n || ret=1
|
|
|
|
grep 'RRSIG.*'" $id "'\. ' dig.out.ns1.test$n > /dev/null && ret=1
|
|
|
|
n=`expr $n + 1`
|
|
|
|
if [ $ret != 0 ]; then echo "I:failed"; fi
|
|
|
|
status=`expr $status + $ret`
|
|
|
|
|
2010-01-18 19:19:31 +00:00
|
|
|
echo "I:checking insertion of public-only key ($n)"
|
|
|
|
ret=0
|
|
|
|
id=`sed 's/^K.+007+0*//' < nopriv.key`
|
|
|
|
file="ns1/`cat nopriv.key`.key"
|
|
|
|
keydata=`grep DNSKEY $file`
|
|
|
|
$NSUPDATE > /dev/null 2>&1 <<END || status=1
|
|
|
|
server 10.53.0.1 5300
|
|
|
|
zone .
|
|
|
|
ttl 3600
|
|
|
|
update add $keydata
|
|
|
|
send
|
|
|
|
END
|
|
|
|
sleep 1
|
|
|
|
$DIG $DIGOPTS dnskey . @10.53.0.1 > dig.out.ns1.test$n || ret=1
|
|
|
|
grep 'RRSIG.*'" $id "'\. ' dig.out.ns1.test$n > /dev/null && ret=1
|
|
|
|
n=`expr $n + 1`
|
|
|
|
if [ $ret != 0 ]; then echo "I:failed"; fi
|
|
|
|
status=`expr $status + $ret`
|
|
|
|
|
2009-11-30 21:00:48 +00:00
|
|
|
echo "I:checking key deletion ($n)"
|
|
|
|
ret=0
|
2009-12-19 17:30:31 +00:00
|
|
|
id=`sed 's/^K.+007+0*//' < del.key`
|
2009-11-30 21:00:48 +00:00
|
|
|
$DIG $DIGOPTS +multi dnskey . @10.53.0.1 > dig.out.ns1.test$n || ret=1
|
|
|
|
grep '; key id = '"$id"'$' dig.out.ns1.test$n > /dev/null && ret=1
|
|
|
|
n=`expr $n + 1`
|
|
|
|
if [ $ret != 0 ]; then echo "I:failed"; fi
|
|
|
|
status=`expr $status + $ret`
|
|
|
|
|
2010-01-18 19:19:31 +00:00
|
|
|
echo "I:checking secure-to-insecure transition ($n)"
|
|
|
|
$NSUPDATE > /dev/null 2>&1 <<END || status=1
|
|
|
|
server 10.53.0.3 5300
|
|
|
|
zone secure-to-insecure.example
|
|
|
|
update delete secure-to-insecure.example dnskey
|
|
|
|
send
|
|
|
|
END
|
|
|
|
sleep 2
|
|
|
|
$DIG $DIGOPTS axfr secure-to-insecure.example @10.53.0.3 > dig.out.ns3.test$n || ret=1
|
|
|
|
egrep 'RRSIG.*'" $newid "'\. ' dig.out.ns3.test$n > /dev/null && ret=1
|
|
|
|
egrep '(DNSKEY|NSEC)' dig.out.ns3.test$n > /dev/null && ret=1
|
|
|
|
n=`expr $n + 1`
|
|
|
|
if [ $ret != 0 ]; then echo "I:failed"; fi
|
|
|
|
status=`expr $status + $ret`
|
|
|
|
|
|
|
|
echo "I:preparing to test key change corner cases"
|
|
|
|
echo "I:removing a private key file"
|
|
|
|
file="ns1/`cat vanishing.key`.private"
|
|
|
|
rm -f $file
|
|
|
|
|
|
|
|
echo "I:preparing ZSK roll"
|
|
|
|
newid=`sed 's/^K.+007+0*//' < standby.key`
|
|
|
|
file="ns1/`cat standby.key`.key"
|
|
|
|
$SETTIME -A now $file > /dev/null
|
|
|
|
oldid=`sed 's/^K.+007+0*//' < active.key`
|
|
|
|
file="ns1/`cat active.key`.key"
|
|
|
|
$SETTIME -I now -D now+10 $file > /dev/null
|
|
|
|
|
|
|
|
$RNDC -c ../common/rndc.conf -s 10.53.0.1 -p 9953 sign . 2>&1 | sed 's/^/I:ns1 /'
|
|
|
|
|
|
|
|
echo "I:revoking key to duplicated key ID"
|
|
|
|
$SETTIME -R now ns2/Kbar.+005+30676.key > /dev/null
|
|
|
|
|
|
|
|
$RNDC -c ../common/rndc.conf -s 10.53.0.2 -p 9953 sign bar. 2>&1 | sed 's/^/I:ns2 /'
|
|
|
|
|
|
|
|
echo "I:waiting for changes to take effect"
|
|
|
|
sleep 5
|
|
|
|
|
|
|
|
echo "I:checking former standby key is now active ($n)"
|
|
|
|
ret=0
|
|
|
|
$DIG $DIGOPTS dnskey . @10.53.0.1 > dig.out.ns1.test$n || ret=1
|
|
|
|
grep 'RRSIG.*'" $newid "'\. ' dig.out.ns1.test$n > /dev/null || ret=1
|
|
|
|
n=`expr $n + 1`
|
|
|
|
if [ $ret != 0 ]; then echo "I:failed"; fi
|
|
|
|
status=`expr $status + $ret`
|
|
|
|
|
|
|
|
echo "I:waiting for former active key to be removed"
|
|
|
|
sleep 10
|
|
|
|
|
|
|
|
echo "I:checking key was removed ($n)"
|
|
|
|
ret=0
|
|
|
|
$DIG $DIGOPTS +multi dnskey . @10.53.0.1 > dig.out.ns1.test$n || ret=1
|
|
|
|
grep '; key id =.*'"$oldid"'$' dig.out.ns1.test$n > /dev/null && ret=1
|
|
|
|
n=`expr $n + 1`
|
|
|
|
if [ $ret != 0 ]; then echo "I:failed"; fi
|
|
|
|
status=`expr $status + $ret`
|
|
|
|
|
|
|
|
echo "I:checking private key file removal caused no immediate harm ($n)"
|
|
|
|
ret=0
|
|
|
|
id=`sed 's/^K.+007+0*//' < vanishing.key`
|
|
|
|
$DIG $DIGOPTS dnskey . @10.53.0.1 > dig.out.ns1.test$n || ret=1
|
|
|
|
grep 'RRSIG.*'" $id "'\. ' dig.out.ns1.test$n > /dev/null || ret=1
|
|
|
|
n=`expr $n + 1`
|
|
|
|
if [ $ret != 0 ]; then echo "I:failed"; fi
|
|
|
|
status=`expr $status + $ret`
|
|
|
|
|
|
|
|
echo "I:checking revoked key with duplicate key ID (failure expected) ($n)"
|
|
|
|
lret=0
|
|
|
|
id=30676
|
|
|
|
$DIG $DIGOPTS +multi dnskey bar @10.53.0.2 > dig.out.ns2.test$n || lret=1
|
|
|
|
grep '; key id =.*'"$id"'$' dig.out.ns2.test$n || lret=1
|
|
|
|
$DIG $DIGOPTS dnskey bar @10.53.0.4 > dig.out.ns4.test$n || lret=1
|
|
|
|
grep "flags:.*ad.*QUERY" dig.out.ns4.test$n > /dev/null || lret=1
|
|
|
|
n=`expr $n + 1`
|
|
|
|
if [ $lret != 0 ]; then echo "I:failed"; fi
|
|
|
|
|
2009-11-30 21:00:48 +00:00
|
|
|
echo "I:exit status: $status"
|
|
|
|
|
|
|
|
exit $status
|