2
0
mirror of https://gitlab.isc.org/isc-projects/bind9 synced 2025-09-04 00:25:29 +00:00

named-checkconf now detects redefinition of dnssec-policy 'insecure'

This commit is contained in:
Mark Andrews
2021-05-05 11:23:02 +10:00
parent 0f53872542
commit dba13d280a
4 changed files with 29 additions and 6 deletions

View File

@@ -9,7 +9,7 @@
* information regarding copyright ownership. * information regarding copyright ownership.
*/ */
// Using the keyword 'default' is not allowed. // 'default' is a built-in policy, redefinition not allowed.
dnssec-policy "default" { dnssec-policy "default" {
signatures-refresh P5D; signatures-refresh P5D;
}; };
@@ -19,4 +19,3 @@ zone "example.net" {
file "example.db"; file "example.db";
dnssec-policy "default"; dnssec-policy "default";
}; };

View File

@@ -0,0 +1,21 @@
/*
* Copyright (C) Internet Systems Consortium, Inc. ("ISC")
*
* This Source Code Form is subject to the terms of the Mozilla Public
* License, v. 2.0. If a copy of the MPL was not distributed with this
* file, You can obtain one at http://mozilla.org/MPL/2.0/.
*
* See the COPYRIGHT file distributed with this work for additional
* information regarding copyright ownership.
*/
// 'insecure' is a built-in policy, redefinition not allowed.
dnssec-policy "insecure" {
signatures-refresh P5D;
};
zone "example.net" {
type master;
file "example.db";
dnssec-policy "insecure";
};

View File

@@ -9,7 +9,7 @@
* information regarding copyright ownership. * information regarding copyright ownership.
*/ */
// Using the keyword 'none' is not allowed. // 'none' is a built-in policy, redefinition not allowed.
dnssec-policy "none" { dnssec-policy "none" {
signatures-refresh P5D; signatures-refresh P5D;
}; };
@@ -19,4 +19,3 @@ zone "example.net" {
file "example.db"; file "example.db";
dnssec-policy "none"; dnssec-policy "none";
}; };

View File

@@ -893,6 +893,9 @@ kasp_name_allowed(const cfg_listelt_t *element) {
if (strcmp("default", name) == 0) { if (strcmp("default", name) == 0) {
return (false); return (false);
} }
if (strcmp("insecure", name) == 0) {
return (false);
}
return (true); return (true);
} }
@@ -1193,8 +1196,9 @@ check_options(const cfg_obj_t *options, const cfg_obj_t *config,
if (bad_name) { if (bad_name) {
cfg_obj_log(obj, logctx, ISC_LOG_ERROR, cfg_obj_log(obj, logctx, ISC_LOG_ERROR,
"dnssec-policy name may not be 'none' or " "dnssec-policy name may not be 'insecure', "
"'default' (which is the built-in policy)"); "'none', or 'default' (which are built-in "
"policies)");
if (result == ISC_R_SUCCESS) { if (result == ISC_R_SUCCESS) {
result = ISC_R_FAILURE; result = ISC_R_FAILURE;
} }