When reducing the number of NSEC3 iterations to 150, commit
aa26cde2ae added tests for dnssec-policy
to check that a too high iteration count is a configuration failure.
The test is not sufficient because 151 was always too high for
ECDSAP256SHA256. The test should check for a different algorithm.
There was an existing test case that checks for NSEC3 iterations.
Update the test with the new maximum values.
Update the code in 'kaspconf.c' to allow at most 150 iterations.
59 lines
1.2 KiB
Plaintext
59 lines
1.2 KiB
Plaintext
/*
|
|
* Copyright (C) Internet Systems Consortium, Inc. ("ISC")
|
|
*
|
|
* This Source Code Form is subject to the terms of the Mozilla Public
|
|
* License, v. 2.0. If a copy of the MPL was not distributed with this
|
|
* file, You can obtain one at http://mozilla.org/MPL/2.0/.
|
|
*
|
|
* See the COPYRIGHT file distributed with this work for additional
|
|
* information regarding copyright ownership.
|
|
*/
|
|
|
|
dnssec-policy "rsasha1" {
|
|
keys {
|
|
csk lifetime P10Y algorithm nsec3rsasha1 1024;
|
|
};
|
|
nsec3param iterations 150;
|
|
};
|
|
|
|
dnssec-policy "rsasha1-bad" {
|
|
keys {
|
|
csk lifetime P10Y algorithm nsec3rsasha1 1024;
|
|
};
|
|
nsec3param iterations 151;
|
|
};
|
|
|
|
dnssec-policy "rsasha256" {
|
|
keys {
|
|
csk lifetime P10Y algorithm rsasha256 2048;
|
|
};
|
|
nsec3param iterations 150;
|
|
};
|
|
|
|
dnssec-policy "rsasha256-bad" {
|
|
keys {
|
|
csk lifetime P10Y algorithm rsasha256 2048;
|
|
};
|
|
nsec3param iterations 151;
|
|
};
|
|
|
|
dnssec-policy "rsasha512" {
|
|
keys {
|
|
csk lifetime P10Y algorithm rsasha512 4096;
|
|
};
|
|
nsec3param iterations 150;
|
|
};
|
|
|
|
dnssec-policy "rsasha512-bad" {
|
|
keys {
|
|
csk lifetime P10Y algorithm rsasha512 4096;
|
|
};
|
|
nsec3param iterations 151;
|
|
};
|
|
|
|
zone "example.net" {
|
|
type master;
|
|
file "example.db";
|
|
dnssec-policy "default";
|
|
};
|