4840. [test] Add tests to cover fallback to using ZSK on inactive
KSK. [RT #46787]
This commit is contained in:
@@ -72,7 +72,8 @@ do
|
||||
$DIG $DIGOPTS $z @10.53.0.2 nsec > dig.out.ns2.test$n || ret=1
|
||||
grep "NS SOA" dig.out.ns2.test$n > /dev/null || ret=1
|
||||
done
|
||||
for z in bar. example. inaczsk2.example. inaczsk3.example
|
||||
for z in bar. example. inacksk2.example. inacksk3.example \
|
||||
inaczsk2.example. inaczsk3.example
|
||||
do
|
||||
$DIG $DIGOPTS $z @10.53.0.3 nsec > dig.out.ns3.test$n || ret=1
|
||||
grep "NS SOA" dig.out.ns3.test$n > /dev/null || ret=1
|
||||
@@ -86,6 +87,43 @@ n=`expr $n + 1`
|
||||
if [ $ret != 0 ]; then echo "I:failed"; else echo "I:done"; fi
|
||||
status=`expr $status + $ret`
|
||||
|
||||
#
|
||||
# Check that DNSKEY is initially signed with a KSK and not a ZSK.
|
||||
#
|
||||
echo "I:check that zone with active and inactive KSK and active ZSK is properly"
|
||||
echo "I: resigned after the active KSK is deleted - stage 1: Verify that DNSKEY"
|
||||
echo "I: is initially signed with a KSK and not a ZSK. ($n)"
|
||||
ret=0
|
||||
|
||||
$DIG $DIGOPTS @10.53.0.3 axfr inacksk3.example > dig.out.ns3.test$n
|
||||
|
||||
zskid=`awk '$4 == "DNSKEY" && $5 == 256 { print }' dig.out.ns3.test$n |
|
||||
$DSFROMKEY -A -2 -f - inacksk3.example | awk '{ print $4}' `
|
||||
grep "DNSKEY 7 2 " dig.out.ns3.test$n > /dev/null || ret=1
|
||||
|
||||
pattern="DNSKEY 7 2 [0-9]* [0-9]* [0-9]* ${zskid} "
|
||||
grep "${pattern}" dig.out.ns3.test$n > /dev/null && ret=1
|
||||
|
||||
count=`awk 'BEGIN { count = 0 }
|
||||
$4 == "RRSIG" && $5 == "DNSKEY" { count++ }
|
||||
END {print count}' dig.out.ns3.test$n`
|
||||
test $count -eq 1 || ret=1
|
||||
|
||||
count=`awk 'BEGIN { count = 0 }
|
||||
$4 == "DNSKEY" { count++ }
|
||||
END {print count}' dig.out.ns3.test$n`
|
||||
test $count -eq 3 || ret=1
|
||||
|
||||
awk='$4 == "RRSIG" && $5 == "DNSKEY" { printf "%05u\n", $11 }'
|
||||
id=`awk "${awk}" dig.out.ns3.test$n`
|
||||
|
||||
$SETTIME -D now+5 ns3/Kinacksk3.example.+007+${id}
|
||||
$RNDC -c ../common/rndc.conf -s 10.53.0.3 -p 9953 loadkeys inacksk3.example
|
||||
|
||||
n=`expr $n + 1`
|
||||
if [ $ret != 0 ]; then echo "I:failed"; fi
|
||||
status=`expr $status + $ret`
|
||||
|
||||
#
|
||||
# Check that zone is initially signed with a ZSK and not a KSK.
|
||||
#
|
||||
@@ -1258,10 +1296,57 @@ if [ "$lret" != 0 ]; then ret=$lret; fi
|
||||
if [ $ret != 0 ]; then echo "I:failed"; fi
|
||||
status=`expr $status + $ret`
|
||||
|
||||
echo "I:check that zone with inactive KSK and active ZSK is properly autosigned ($n)"
|
||||
ret=0
|
||||
$DIG $DIGOPTS @10.53.0.3 axfr inacksk2.example > dig.out.ns3.test$n
|
||||
|
||||
zskid=`awk '$4 == "DNSKEY" && $5 == 256 { print }' dig.out.ns3.test$n |
|
||||
$DSFROMKEY -A -2 -f - inacksk2.example | awk '{ print $4}' `
|
||||
pattern="DNSKEY 7 2 [0-9]* [0-9]* [0-9]* ${zskid} "
|
||||
grep "${pattern}" dig.out.ns3.test$n > /dev/null || ret=1
|
||||
|
||||
kskid=`awk '$4 == "DNSKEY" && $5 == 257 { print }' dig.out.ns3.test$n |
|
||||
$DSFROMKEY -2 -f - inacksk2.example | awk '{ print $4}' `
|
||||
pattern="DNSKEY 7 2 [0-9]* [0-9]* [0-9]* ${kskid} "
|
||||
grep "${pattern}" dig.out.ns3.test$n > /dev/null && ret=1
|
||||
|
||||
n=`expr $n + 1`
|
||||
if [ $ret != 0 ]; then echo "I:failed"; fi
|
||||
status=`expr $status + $ret`
|
||||
|
||||
echo "I:check that zone with inactive ZSK and active KSK is properly autosigned ($n)"
|
||||
ret=0
|
||||
$DIG $DIGOPTS @10.53.0.3 axfr inaczsk2.example > dig.out.ns3.out
|
||||
grep "SOA 7 2" dig.out.ns3.out > /dev/null || ret=1
|
||||
$DIG $DIGOPTS @10.53.0.3 axfr inaczsk2.example > dig.out.ns3.test$n
|
||||
grep "SOA 7 2" dig.out.ns3.test$n > /dev/null || ret=1
|
||||
n=`expr $n + 1`
|
||||
if [ $ret != 0 ]; then echo "I:failed"; fi
|
||||
status=`expr $status + $ret`
|
||||
|
||||
#
|
||||
# Check that DNSKEY is now signed with the ZSK.
|
||||
#
|
||||
echo "I:check that zone with active and inactive KSK and active ZSK is properly"
|
||||
echo "I: resigned after the active KSK is deleted - stage 2: Verify that DNSKEY"
|
||||
echo "I: is now signed with the ZSK. ($n)"
|
||||
ret=0
|
||||
|
||||
$DIG $DIGOPTS @10.53.0.3 axfr inacksk3.example > dig.out.ns3.test$n
|
||||
|
||||
zskid=`awk '$4 == "DNSKEY" && $5 == 256 { print }' dig.out.ns3.test$n |
|
||||
$DSFROMKEY -A -2 -f - inacksk3.example | awk '{ print $4}' `
|
||||
pattern="DNSKEY 7 2 [0-9]* [0-9]* [0-9]* ${zskid} "
|
||||
grep "${pattern}" dig.out.ns3.test$n > /dev/null || ret=1
|
||||
|
||||
count=`awk 'BEGIN { count = 0 }
|
||||
$4 == "RRSIG" && $5 == "DNSKEY" { count++ }
|
||||
END {print count}' dig.out.ns3.test$n`
|
||||
test $count -eq 1 || ret=1
|
||||
|
||||
count=`awk 'BEGIN { count = 0 }
|
||||
$4 == "DNSKEY" { count++ }
|
||||
END {print count}' dig.out.ns3.test$n`
|
||||
test $count -eq 2 || ret=1
|
||||
|
||||
n=`expr $n + 1`
|
||||
if [ $ret != 0 ]; then echo "I:failed"; fi
|
||||
status=`expr $status + $ret`
|
||||
|
||||
Reference in New Issue
Block a user