2
0
mirror of https://gitlab.isc.org/isc-projects/bind9 synced 2025-09-01 06:55:30 +00:00

Add tests for key-store with engine_pkcs11

Add cases for each algorithm to test the interaction between
dnssec-policy and engine_pkcs11. Ensure that named creates keys on
startup.

Also test dnssec-keygen when using a dnssec-policy with a PKCS#11
based key-store.
This commit is contained in:
Matthijs Mekking
2022-02-28 13:51:47 +01:00
parent f096472eb4
commit 91f18c98b3
4 changed files with 108 additions and 10 deletions

View File

@@ -18,18 +18,20 @@ set -e
rm -f dig.out.* rm -f dig.out.*
rm -f dsset-* rm -f dsset-*
rm -f pin
rm -f keyfromlabel.err.* keyfromlabel.out.* rm -f keyfromlabel.err.* keyfromlabel.out.*
rm -f pkcs11-tool.err.* pkcs11-tool.out.* rm -f pkcs11-tool.err.* pkcs11-tool.out.*
rm -f signer.out.* rm -f signer.out.*
rm -f ns1/*.example.db ns1/*.example.db.signed rm -f ns1/*.example.db ns1/*.example.db.signed
rm -f ns1/*.kasp.db ns1/*.kasp.db.signed
rm -f ns1/*.kskid1 ns1/*.kskid2 ns1/*.zskid1 ns1/*.zskid2 rm -f ns1/*.kskid1 ns1/*.kskid2 ns1/*.zskid1 ns1/*.zskid2
rm -f ns1/dig.out.* rm -f ns1/dig.out.*
rm -f ns1/K* rm -f ns1/K*
rm -f ns1/keygen.out.*
rm -f ns1/named.conf ns1/named.args ns1/named.run ns1/named.memstats rm -f ns1/named.conf ns1/named.args ns1/named.run ns1/named.memstats
rm -f ns1/pin
rm -f ns1/update.cmd.* rm -f ns1/update.cmd.*
rm -f ns1/update.log.* rm -f ns1/update.log.*
rm -f ns1/verify.out.* rm -f ns1/verify.out.*
rm -f ns1/zone.*.signed.jnl ns1/zone.*.signed.jbk rm -f ns1/zone.*.jnl ns1/zone.*.jbk
OPENSSL_CONF= softhsm2-util --delete-token --token "softhsm2-enginepkcs11" >/dev/null 2>&1 || echo_i "softhsm2-enginepkcs11 token not found for cleaning" OPENSSL_CONF= softhsm2-util --delete-token --token "softhsm2-enginepkcs11" >/dev/null 2>&1 || echo_i "softhsm2-enginepkcs11 token not found for cleaning"

View File

@@ -34,3 +34,17 @@ key rndc_key {
controls { controls {
inet 10.53.0.1 port @CONTROLPORT@ allow { any; } keys { rndc_key; }; inet 10.53.0.1 port @CONTROLPORT@ allow { any; } keys { rndc_key; };
}; };
key-store "hsm" {
directory ".";
uri "pkcs11:token=softhsm2-enginepkcs11;pin-value=1234";
};
key-store "pin" {
directory ".";
uri "pkcs11:token=softhsm2-enginepkcs11;pin-source=pin";
};
key-store "disk" {
directory "keys";
};

View File

@@ -18,8 +18,8 @@ set -e
OPENSSL_CONF= softhsm2-util --init-token --free --pin 1234 --so-pin 1234 --label "softhsm2-enginepkcs11" | awk '/^The token has been initialized and is reassigned to slot/ { print $NF }' OPENSSL_CONF= softhsm2-util --init-token --free --pin 1234 --so-pin 1234 --label "softhsm2-enginepkcs11" | awk '/^The token has been initialized and is reassigned to slot/ { print $NF }'
printf '%s' "${HSMPIN:-1234}" >pin
parse_openssl_config parse_openssl_config
printf '%s' "${HSMPIN:-1234}" >ns1/pin
PWD=$(pwd) PWD=$(pwd)
copy_setports ns1/named.conf.in ns1/named.conf copy_setports ns1/named.conf.in ns1/named.conf
@@ -33,7 +33,7 @@ keygen() {
label="${id}-${zone}" label="${id}-${zone}"
p11id=$(echo "${label}" | openssl sha1 -r | awk '{print $1}') p11id=$(echo "${label}" | openssl sha1 -r | awk '{print $1}')
OPENSSL_CONF= pkcs11-tool --module $SOFTHSM2_MODULE --token-label "softhsm2-enginepkcs11" -l -k --key-type $type:$bits --label "${label}" --id "${p11id}" --pin $(cat $PWD/pin) >pkcs11-tool.out.$zone.$id 2>pkcs11-tool.err.$zone.$id || return 1 OPENSSL_CONF= pkcs11-tool --module $SOFTHSM2_MODULE --token-label "softhsm2-enginepkcs11" -l -k --key-type $type:$bits --label "${label}" --id "${p11id}" --pin $(cat $PWD/ns1/pin) >pkcs11-tool.out.$zone.$id 2>pkcs11-tool.err.$zone.$id || return 1
} }
keyfromlabel() { keyfromlabel() {
@@ -43,7 +43,7 @@ keyfromlabel() {
dir="$4" dir="$4"
shift 4 shift 4
$KEYFRLAB $ENGINE_ARG -K $dir -a $alg -l "pkcs11:token=softhsm2-enginepkcs11;object=${id}-${zone};pin-source=$PWD/pin" "$@" $zone >>keyfromlabel.out.$zone.$id 2>keyfromlabel.err.$zone.$id || return 1 $KEYFRLAB $ENGINE_ARG -K $dir -a $alg -l "pkcs11:token=softhsm2-enginepkcs11;object=${id}-${zone};pin-source=$PWD/ns1/pin" "$@" $zone >>keyfromlabel.out.$zone.$id 2>keyfromlabel.err.$zone.$id || return 1
cat keyfromlabel.out.$zone.$id cat keyfromlabel.out.$zone.$id
} }
@@ -57,9 +57,10 @@ for algtypebits in rsasha256:rsa:2048 rsasha512:rsa:2048 \
type=$(echo "$algtypebits" | cut -f 2 -d :) type=$(echo "$algtypebits" | cut -f 2 -d :)
bits=$(echo "$algtypebits" | cut -f 3 -d :) bits=$(echo "$algtypebits" | cut -f 3 -d :)
tld="example"
if $SHELL ../testcrypto.sh $alg; then if $SHELL ../testcrypto.sh $alg; then
zone="$alg.example" zone="$alg.$tld"
zonefile="zone.$alg.example.db" zonefile="zone.$alg.$tld.db"
ret=0 ret=0
echo_i "Generate keys $alg $type:$bits for zone $zone" echo_i "Generate keys $alg $type:$bits for zone $zone"
@@ -111,6 +112,9 @@ for algtypebits in rsasha256:rsa:2048 rsasha512:rsa:2048 \
cp "${ksk2}.key" "${ksk2}.ksk2" cp "${ksk2}.key" "${ksk2}.ksk2"
) )
echo_i "Add zone $alg.kasp to named.conf"
cp $infile ${dir}/zone.${alg}.kasp.db
echo_i "Add zone $zone to named.conf" echo_i "Add zone $zone to named.conf"
cat >>"${dir}/named.conf" <<EOF cat >>"${dir}/named.conf" <<EOF
zone "$zone" { zone "$zone" {
@@ -119,6 +123,20 @@ zone "$zone" {
allow-update { any; }; allow-update { any; };
}; };
dnssec-policy "$alg" {
keys {
ksk key-store "hsm" lifetime unlimited algorithm ${alg};
zsk key-store "pin" lifetime unlimited algorithm ${alg};
};
};
zone "${alg}.kasp" {
type primary;
file "zone.${alg}.kasp.db";
dnssec-policy "$alg";
allow-update { any; };
};
EOF EOF
fi fi
done done

View File

@@ -27,6 +27,26 @@ dig_with_opts() (
$DIG +tcp +noadd +nosea +nostat +nocmd +dnssec -p "$PORT" "$@" $DIG +tcp +noadd +nosea +nostat +nocmd +dnssec -p "$PORT" "$@"
) )
check_keys() {
_zone=$1
_expect=$2
_ret=0
_status=0
_count=$(ls K*.key | grep "K${_zone}" | wc -l)
test "$_count" -eq "$_expect" || ret=1
test "$_ret" -eq 0 || echo_i "failed (expected $_expect keys, got $_count)"
_status=$((_status + _ret))
_ret=0
_count=$(cat K${_zone}*.private | grep Label | wc -l)
test "$_count" -eq "$_expect" || _ret=1
test "$_ret" -eq 0 || echo_i "failed (expected Label metadata in key files)"
_status=$((_status + _ret))
return $_status
}
# Perform tests inside ns1 dir # Perform tests inside ns1 dir
cd ns1 cd ns1
@@ -48,9 +68,7 @@ for algtypebits in rsasha256:rsa:2048 rsasha512:rsa:2048 \
n=$((n + 1)) n=$((n + 1))
ret=0 ret=0
echo_i "Test key generation was successful for $zone ($n)" echo_i "Test key generation was successful for $zone ($n)"
count=$(ls K*.key | grep "K${zone}" | wc -l) check_keys $zone 4 || ret=1
test "$count" -eq 4 || ret=1
test "$ret" -eq 0 || echo_i "failed (expected 4 keys, got $count)"
status=$((status + ret)) status=$((status + ret))
n=$((n + 1)) n=$((n + 1))
@@ -157,6 +175,52 @@ EOF
test "$ret" -eq 0 || echo_i "failed (expected 4 DNSKEY records, 2 KSK signatures)" test "$ret" -eq 0 || echo_i "failed (expected 4 DNSKEY records, 2 KSK signatures)"
status=$((status + ret)) status=$((status + ret))
# Check dnssec-policy interaction.
zone="${alg}.kasp"
# Basic checks if setup was successful (dnssec-policy).
n=$((n + 1))
ret=0
echo_i "Test key generation was successful for $zone ($n)"
check_keys $zone 2 || ret=1
status=$((status + ret))
n=$((n + 1))
ret=0
echo_i "Test DNSKEY response for $zone ($n)"
_dig_policy_dnskey() {
dig_with_opts "$zone" @10.53.0.1 DNSKEY >dig.out.dnskey.$zone.$n || return 1
count=$(awk 'BEGIN { count = 0 } $4 == "DNSKEY" { count++ } END {print count}' dig.out.dnskey.$zone.$n)
test $count -eq 2
}
retry_quiet 2 _dig_policy_dnskey || ret=1
test "$ret" -eq 0 || echo_i "failed (expected 2 DNSKEY records)"
status=$((status + ret))
n=$((n + 1))
ret=0
echo_i "Test SOA response for $zone ($n)"
_dig_policy_soa() {
dig_with_opts "$zone" @10.53.0.1 SOA >dig.out.soa.$zone.$n || return 1
awk '$4 == "RRSIG" && $5 == "SOA" { print $11 }' dig.out.soa.$zone.$n >dig.out.keyids.$zone.$n || return 1
numsigs=$(cat dig.out.keyids.$zone.$n | wc -l)
test $numsigs -eq 1 || return 1
return 0
}
retry_quiet 2 _dig_policy_soa || ret=1
test "$ret" -eq 0 || echo_i "failed (expected a SOA RRSIG record)"
status=$((status + ret))
# Check dnssec-keygen with dnssec-policy and key-store.
zone="${alg}.keygen"
n=$((n + 1))
ret=0
echo_i "Test dnssec-keygen for $zone ($n)"
$KEYGEN $ENGINE_ARG -k $alg -l named.conf $zone >keygen.out.$zone.$n 2>/dev/null || ret=1
check_keys $zone 2 || ret=1
status=$((status + ret))
done done
# Go back to main test dir. # Go back to main test dir.