diff --git a/bin/tests/system/kasp/ns6/policies/kasp.conf b/bin/tests/system/kasp/ns6/policies/kasp.conf index 6b58eaf825..a02d6816a7 100644 --- a/bin/tests/system/kasp/ns6/policies/kasp.conf +++ b/bin/tests/system/kasp/ns6/policies/kasp.conf @@ -50,7 +50,7 @@ dnssec-policy "ecdsa256" { }; dnssec-policy "migrate" { - dnskey-ttl 300; + dnskey-ttl 7200; keys { ksk key-directory lifetime unlimited algorithm ECDSAP256SHA256; diff --git a/bin/tests/system/kasp/ns6/setup.sh b/bin/tests/system/kasp/ns6/setup.sh index 8d01bd23b9..16c92ce0f0 100644 --- a/bin/tests/system/kasp/ns6/setup.sh +++ b/bin/tests/system/kasp/ns6/setup.sh @@ -42,8 +42,8 @@ U="UNRETENTIVE" # Set up a zone with auto-dnssec maintain to migrate to dnssec-policy. setup migrate.kasp echo "$zone" >> zones -KSK=$($KEYGEN -a ECDSAP256SHA256 -f KSK -L 300 $zone 2> keygen.out.$zone.1) -ZSK=$($KEYGEN -a ECDSAP256SHA256 -L 300 $zone 2> keygen.out.$zone.2) +KSK=$($KEYGEN -a ECDSAP256SHA256 -f KSK -L 7200 $zone 2> keygen.out.$zone.1) +ZSK=$($KEYGEN -a ECDSAP256SHA256 -L 7200 $zone 2> keygen.out.$zone.2) $SETTIME -P now -P sync now -A now "$KSK" > settime.out.$zone.1 2>&1 $SETTIME -P now -A now "$ZSK" > settime.out.$zone.2 2>&1 cat template.db.in "${KSK}.key" "${ZSK}.key" > "$infile" diff --git a/bin/tests/system/kasp/tests.sh b/bin/tests/system/kasp/tests.sh index 95c4e2392a..da770695cb 100644 --- a/bin/tests/system/kasp/tests.sh +++ b/bin/tests/system/kasp/tests.sh @@ -2893,7 +2893,7 @@ check_next_key_event 3600 # Testing good migration. # set_zone "migrate.kasp" -set_policy "none" "2" "300" +set_policy "none" "2" "7200" set_server "ns6" "10.53.0.6" init_migration_match() { @@ -3090,7 +3090,7 @@ next_key_event_threshold=$((next_key_event_threshold+i)) # Testing migration. # set_zone "migrate.kasp" -set_policy "migrate" "2" "300" +set_policy "migrate" "2" "7200" set_server "ns6" "10.53.0.6" # Key properties, timings and metadata should be the same as legacy keys above.