2011-08-30 05:16:15 +00:00
|
|
|
#!/bin/sh -e
|
|
|
|
#
|
2018-02-23 09:53:12 +01:00
|
|
|
# Copyright (C) Internet Systems Consortium, Inc. ("ISC")
|
2012-06-29 11:39:47 +10:00
|
|
|
#
|
2016-06-27 14:56:38 +10:00
|
|
|
# This Source Code Form is subject to the terms of the Mozilla Public
|
|
|
|
# License, v. 2.0. If a copy of the MPL was not distributed with this
|
|
|
|
# file, You can obtain one at http://mozilla.org/MPL/2.0/.
|
2018-02-23 09:53:12 +01:00
|
|
|
#
|
|
|
|
# See the COPYRIGHT file distributed with this work for additional
|
|
|
|
# information regarding copyright ownership.
|
2011-08-30 05:16:15 +00:00
|
|
|
|
|
|
|
SYSTEMTESTTOP=../..
|
|
|
|
. $SYSTEMTESTTOP/conf.sh
|
|
|
|
|
|
|
|
zone=bits
|
|
|
|
rm -f K${zone}.+*+*.key
|
|
|
|
rm -f K${zone}.+*+*.private
|
2018-04-24 16:01:23 +02:00
|
|
|
keyname=`$KEYGEN -q -a RSASHA1 -b 1024 -n zone $zone`
|
|
|
|
keyname=`$KEYGEN -q -a RSASHA1 -b 1024 -n zone -f KSK $zone`
|
2011-10-25 01:54:22 +00:00
|
|
|
$DSFROMKEY -T 1200 $keyname >> ../ns1/root.db
|
2011-08-30 05:16:15 +00:00
|
|
|
|
|
|
|
zone=noixfr
|
|
|
|
rm -f K${zone}.+*+*.key
|
|
|
|
rm -f K${zone}.+*+*.private
|
2018-04-24 16:01:23 +02:00
|
|
|
keyname=`$KEYGEN -q -a RSASHA1 -b 1024 -n zone $zone`
|
|
|
|
keyname=`$KEYGEN -q -a RSASHA1 -b 1024 -n zone -f KSK $zone`
|
2011-10-25 01:54:22 +00:00
|
|
|
$DSFROMKEY -T 1200 $keyname >> ../ns1/root.db
|
2011-10-26 20:56:45 +00:00
|
|
|
|
|
|
|
zone=master
|
|
|
|
rm -f K${zone}.+*+*.key
|
|
|
|
rm -f K${zone}.+*+*.private
|
2018-04-24 16:01:23 +02:00
|
|
|
keyname=`$KEYGEN -q -a RSASHA1 -b 1024 -n zone $zone`
|
|
|
|
keyname=`$KEYGEN -q -a RSASHA1 -b 1024 -n zone -f KSK $zone`
|
2011-10-26 20:56:45 +00:00
|
|
|
$DSFROMKEY -T 1200 $keyname >> ../ns1/root.db
|
|
|
|
|
|
|
|
zone=dynamic
|
|
|
|
rm -f K${zone}.+*+*.key
|
|
|
|
rm -f K${zone}.+*+*.private
|
2018-04-24 16:01:23 +02:00
|
|
|
keyname=`$KEYGEN -q -a RSASHA1 -b 1024 -n zone $zone`
|
|
|
|
keyname=`$KEYGEN -q -a RSASHA1 -b 1024 -n zone -f KSK $zone`
|
2011-10-26 20:56:45 +00:00
|
|
|
$DSFROMKEY -T 1200 $keyname >> ../ns1/root.db
|
2011-12-22 07:32:41 +00:00
|
|
|
|
|
|
|
zone=updated
|
|
|
|
rm -f K${zone}.+*+*.key
|
|
|
|
rm -f K${zone}.+*+*.private
|
2018-04-24 16:01:23 +02:00
|
|
|
keyname=`$KEYGEN -q -a RSASHA1 -b 1024 -n zone $zone`
|
|
|
|
keyname=`$KEYGEN -q -a RSASHA1 -b 1024 -n zone -f KSK $zone`
|
2011-12-22 07:32:41 +00:00
|
|
|
$DSFROMKEY -T 1200 $keyname >> ../ns1/root.db
|
|
|
|
$SIGNER -S -O raw -L 2000042407 -o ${zone} ${zone}.db > /dev/null 2>&1
|
|
|
|
cp master2.db.in updated.db
|
2012-01-10 18:13:37 +00:00
|
|
|
|
|
|
|
# signatures are expired and should be regenerated on startup
|
|
|
|
zone=expired
|
|
|
|
rm -f K${zone}.+*+*.key
|
|
|
|
rm -f K${zone}.+*+*.private
|
2018-04-24 16:01:23 +02:00
|
|
|
keyname=`$KEYGEN -q -a RSASHA1 -b 1024 -n zone $zone`
|
|
|
|
keyname=`$KEYGEN -q -a RSASHA1 -b 1024 -n zone -f KSK $zone`
|
2012-01-10 18:13:37 +00:00
|
|
|
$DSFROMKEY -T 1200 $keyname >> ../ns1/root.db
|
|
|
|
$SIGNER -PS -s 20100101000000 -e 20110101000000 -O raw -L 2000042407 -o ${zone} ${zone}.db > /dev/null 2>&1
|
2012-02-23 06:53:15 +00:00
|
|
|
|
|
|
|
zone=retransfer
|
|
|
|
rm -f K${zone}.+*+*.key
|
|
|
|
rm -f K${zone}.+*+*.private
|
2018-04-24 16:01:23 +02:00
|
|
|
keyname=`$KEYGEN -q -a RSASHA1 -b 1024 -n zone $zone`
|
|
|
|
keyname=`$KEYGEN -q -a RSASHA1 -b 1024 -n zone -f KSK $zone`
|
2012-02-23 06:53:15 +00:00
|
|
|
$DSFROMKEY -T 1200 $keyname >> ../ns1/root.db
|
2013-07-09 17:39:21 -07:00
|
|
|
|
2013-08-15 13:37:07 +10:00
|
|
|
zone=nsec3
|
|
|
|
rm -f K${zone}.+*+*.key
|
|
|
|
rm -f K${zone}.+*+*.private
|
2018-04-24 16:01:23 +02:00
|
|
|
keyname=`$KEYGEN -q -a NSEC3RSASHA1 -b 1024 -n zone -f KSK $zone`
|
2013-08-15 13:37:07 +10:00
|
|
|
$DSFROMKEY -T 1200 $keyname >> ../ns1/root.db
|
|
|
|
|
2013-12-04 12:26:20 -06:00
|
|
|
zone=retransfer3
|
|
|
|
rm -f K${zone}.+*+*.key
|
|
|
|
rm -f K${zone}.+*+*.private
|
2018-04-24 16:01:23 +02:00
|
|
|
keyname=`$KEYGEN -q -a NSEC3RSASHA1 -b 1024 -n zone $zone`
|
|
|
|
keyname=`$KEYGEN -q -a NSEC3RSASHA1 -b 1024 -n zone -f KSK $zone`
|
2013-12-04 12:26:20 -06:00
|
|
|
$DSFROMKEY -T 1200 $keyname >> ../ns1/root.db
|
|
|
|
|
2017-12-06 20:26:43 +11:00
|
|
|
zone=inactiveksk
|
|
|
|
rm -f K${zone}.+*+*.key
|
|
|
|
rm -f K${zone}.+*+*.private
|
2018-04-24 16:01:23 +02:00
|
|
|
keyname=`$KEYGEN -q -a NSEC3RSASHA1 -b 1024 -n zone $zone`
|
|
|
|
keyname=`$KEYGEN -q -a NSEC3RSASHA1 -b 1024 -n zone -P now -A now+3600 -f KSK $zone`
|
|
|
|
keyname=`$KEYGEN -q -a RSASHA256 -b 1024 -n zone $zone`
|
|
|
|
keyname=`$KEYGEN -q -a RSASHA256 -b 1024 -n zone -f KSK $zone`
|
2017-12-06 20:26:43 +11:00
|
|
|
$DSFROMKEY -T 1200 $keyname >> ../ns1/root.db
|
|
|
|
|
2017-12-04 10:03:51 +11:00
|
|
|
zone=inactivezsk
|
|
|
|
rm -f K${zone}.+*+*.key
|
|
|
|
rm -f K${zone}.+*+*.private
|
2018-04-24 16:01:23 +02:00
|
|
|
keyname=`$KEYGEN -q -a NSEC3RSASHA1 -b 1024 -n zone -P now -A now+3600 $zone`
|
|
|
|
keyname=`$KEYGEN -q -a NSEC3RSASHA1 -b 1024 -n zone -f KSK $zone`
|
|
|
|
keyname=`$KEYGEN -q -a RSASHA256 -b 1024 -n zone $zone`
|
|
|
|
keyname=`$KEYGEN -q -a RSASHA256 -b 1024 -n zone -f KSK $zone`
|
2017-12-04 10:03:51 +11:00
|
|
|
$DSFROMKEY -T 1200 $keyname >> ../ns1/root.db
|
|
|
|
|
2018-08-22 10:48:07 +02:00
|
|
|
zone=delayedkeys
|
|
|
|
rm -f K${zone}.+*+*.key
|
|
|
|
rm -f K${zone}.+*+*.private
|
|
|
|
keyname=`$KEYGEN -q -a RSASHA1 -b 1024 -n zone $zone`
|
|
|
|
keyname=`$KEYGEN -q -a RSASHA1 -b 1024 -n zone -f KSK $zone`
|
|
|
|
# Keys for the "delayedkeys" zone should not be initially accessible.
|
|
|
|
mv K${zone}.+*+*.* ../
|
|
|
|
|
2018-03-17 00:12:23 +01:00
|
|
|
zone=removedkeys-primary
|
|
|
|
rm -f K${zone}.+*+*.key
|
|
|
|
rm -f K${zone}.+*+*.private
|
2018-04-24 16:01:23 +02:00
|
|
|
keyname=`$KEYGEN -q -a RSASHA1 -b 1024 -n zone $zone`
|
|
|
|
keyname=`$KEYGEN -q -a RSASHA1 -b 1024 -n zone -f KSK $zone`
|
2018-03-17 00:12:23 +01:00
|
|
|
|
|
|
|
zone=removedkeys-secondary
|
|
|
|
rm -f K${zone}.+*+*.key
|
|
|
|
rm -f K${zone}.+*+*.private
|
2018-04-24 16:01:23 +02:00
|
|
|
keyname=`$KEYGEN -q -a RSASHA1 -b 1024 -n zone $zone`
|
|
|
|
keyname=`$KEYGEN -q -a RSASHA1 -b 1024 -n zone -f KSK $zone`
|
2018-03-17 00:12:23 +01:00
|
|
|
|
2013-07-09 17:39:21 -07:00
|
|
|
for s in a c d h k l m q z
|
|
|
|
do
|
|
|
|
zone=test-$s
|
2018-04-24 16:01:23 +02:00
|
|
|
keyname=`$KEYGEN -q -a RSASHA1 -b 1024 -n zone $zone`
|
2013-07-09 17:39:21 -07:00
|
|
|
done
|
|
|
|
|
|
|
|
for s in b f i o p t v
|
|
|
|
do
|
|
|
|
zone=test-$s
|
2018-04-24 16:01:23 +02:00
|
|
|
keyname=`$KEYGEN -q -a RSASHA1 -b 1024 -n zone $zone`
|
|
|
|
keyname=`$KEYGEN -q -a RSASHA1 -b 1024 -n zone -f KSK $zone`
|
2013-07-09 17:39:21 -07:00
|
|
|
done
|
2013-09-04 13:53:02 +10:00
|
|
|
|
|
|
|
zone=externalkey
|
|
|
|
rm -f K${zone}.+*+*.key
|
|
|
|
rm -f K${zone}.+*+*.private
|
|
|
|
|
2018-06-06 14:51:08 +02:00
|
|
|
for alg in ECDSAP256SHA256 NSEC3RSASHA1
|
2013-09-04 13:53:02 +10:00
|
|
|
do
|
2018-04-24 16:01:23 +02:00
|
|
|
k1=`$KEYGEN -q -a $alg -b 1024 -n zone -f KSK $zone`
|
|
|
|
k2=`$KEYGEN -q -a $alg -b 1024 -n zone $zone`
|
|
|
|
k3=`$KEYGEN -q -a $alg -b 1024 -n zone $zone`
|
|
|
|
k4=`$KEYGEN -q -a $alg -b 1024 -n zone -f KSK $zone`
|
2014-01-18 11:51:07 -08:00
|
|
|
$DSFROMKEY -T 1200 $k4 >> ../ns1/root.db
|
2014-01-14 15:40:56 -08:00
|
|
|
|
|
|
|
# Convert k1 and k2 in to External Keys.
|
|
|
|
rm -f $k1.private
|
|
|
|
mv $k1.key a-file
|
2014-01-18 11:51:07 -08:00
|
|
|
$IMPORTKEY -P now -D now+3600 -f a-file $zone > /dev/null 2>&1 ||
|
2018-09-05 13:47:35 +02:00
|
|
|
( echo "importkey failed: $alg" )
|
2014-01-14 15:40:56 -08:00
|
|
|
rm -f $k2.private
|
|
|
|
mv $k2.key a-file
|
2014-01-18 11:51:07 -08:00
|
|
|
$IMPORTKEY -f a-file $zone > /dev/null 2>&1 ||
|
2018-09-05 13:47:35 +02:00
|
|
|
( echo "importkey failed: $alg" )
|
2013-09-04 13:53:02 +10:00
|
|
|
done
|