nsec3_auth.feature 32 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466
  1. Feature: NSEC3 Authoritative service
  2. This feature tests NSEC3 as defined in RFC5155, using the example
  3. zone from appendix A and testing the example responses from appendix B.
  4. Additional tests can be added as well.
  5. # Response section data is taken directly from RFC5155
  6. # It has been modified slightly; it has been 'flattened' (i.e. converted
  7. # to 1-line RRs with TTL and class data), and whitespace has been added
  8. # in the places where dig adds them too.
  9. # Any other changes from the specific example data are added as inline
  10. # comments.
  11. Scenario: B.1. Name Error
  12. Given I have bind10 running with configuration nsec3/nsec3_auth.config
  13. And wait for bind10 stderr message BIND10_STARTED_CC
  14. And wait for bind10 stderr message CMDCTL_STARTED
  15. And wait for bind10 stderr message AUTH_SERVER_STARTED
  16. bind10 module Auth should be running
  17. And bind10 module Resolver should not be running
  18. And bind10 module Xfrout should not be running
  19. And bind10 module Zonemgr should not be running
  20. And bind10 module Xfrin should not be running
  21. And bind10 module Stats should not be running
  22. And bind10 module StatsHttpd should not be running
  23. A dnssec query for a.c.x.w.example. should have rcode NXDOMAIN
  24. The last query response should have flags qr aa rd
  25. The last query response should have edns_flags do
  26. The last query response should have ancount 0
  27. The last query response should have nscount 8
  28. The last query response should have adcount 1
  29. The authority section of the last query response should be
  30. """
  31. example. 3600 IN SOA ns1.example. bugs.x.w.example. 1 3600 300 3600000 3600
  32. example. 3600 IN RRSIG SOA 7 1 3600 20150420235959 20051021000000 40430 example. Hu25UIyNPmvPIVBrldN+9Mlp9Zql39qaUd8iq4ZLlYWfUUbbAS41pG+6 8z81q1xhkYAcEyHdVI2LmKusbZsT0Q==
  33. 0p9mhaveqvm6t7vbl5lop2u3t2rp3tom.example. 3600 IN NSEC3 1 1 12 aabbccdd 2t7b4g4vsa5smi47k61mv5bv1a22bojr NS SOA MX RRSIG DNSKEY NSEC3PARAM
  34. 0p9mhaveqvm6t7vbl5lop2u3t2rp3tom.example. 3600 IN RRSIG NSEC3 7 2 3600 20150420235959 20051021000000 40430 example. OSgWSm26B+cS+dDL8b5QrWr/dEWhtCsKlwKLIBHYH6blRxK9rC0bMJPw Q4mLIuw85H2EY762BOCXJZMnpuwhpA==
  35. b4um86eghhds6nea196smvmlo4ors995.example. 3600 IN NSEC3 1 1 12 aabbccdd gjeqe526plbf1g8mklp59enfd789njgi MX RRSIG
  36. b4um86eghhds6nea196smvmlo4ors995.example. 3600 IN RRSIG NSEC3 7 2 3600 20150420235959 20051021000000 40430 example. ZkPG3M32lmoHM6pa3D6gZFGB/rhL//Bs3Omh5u4m/CUiwtblEVOaAKKZ d7S959OeiX43aLX3pOv0TSTyiTxIZg==
  37. 35mthgpgcu1qg68fab165klnsnk3dpvl.example. 3600 IN NSEC3 1 1 12 aabbccdd b4um86eghhds6nea196smvmlo4ors995 NS DS RRSIG
  38. 35mthgpgcu1qg68fab165klnsnk3dpvl.example. 3600 IN RRSIG NSEC3 7 2 3600 20150420235959 20051021000000 40430 example. g6jPUUpduAJKRljUsN8gB4UagAX0NxY9shwQAynzo8EUWH+z6hEIBlUT PGj15eZll6VhQqgZXtAIR3chwgW+SA==
  39. """
  40. Scenario: B.2. No Data Error
  41. Given I have bind10 running with configuration nsec3/nsec3_auth.config
  42. And wait for bind10 stderr message BIND10_STARTED_CC
  43. And wait for bind10 stderr message CMDCTL_STARTED
  44. And wait for bind10 stderr message AUTH_SERVER_STARTED
  45. bind10 module Auth should be running
  46. And bind10 module Resolver should not be running
  47. And bind10 module Xfrout should not be running
  48. And bind10 module Zonemgr should not be running
  49. And bind10 module Xfrin should not be running
  50. And bind10 module Stats should not be running
  51. And bind10 module StatsHttpd should not be running
  52. A dnssec query for ns1.example. type MX should have rcode NOERROR
  53. The last query response should have flags qr aa rd
  54. The last query response should have edns_flags do
  55. The last query response should have ancount 0
  56. The last query response should have nscount 4
  57. The last query response should have adcount 1
  58. The authority section of the last query response should be
  59. """
  60. example. 3600 IN SOA ns1.example. bugs.x.w.example. 1 3600 300 3600000 3600
  61. example. 3600 IN RRSIG SOA 7 1 3600 20150420235959 20051021000000 40430 example. Hu25UIyNPmvPIVBrldN+9Mlp9Zql39qaUd8iq4ZLlYWfUUbbAS41pG+6 8z81q1xhkYAcEyHdVI2LmKusbZsT0Q==
  62. 2t7b4g4vsa5smi47k61mv5bv1a22bojr.example. 3600 IN NSEC3 1 1 12 aabbccdd 2vptu5timamqttgl4luu9kg21e0aor3s A RRSIG
  63. 2t7b4g4vsa5smi47k61mv5bv1a22bojr.example. 3600 IN RRSIG NSEC3 7 2 3600 20150420235959 20051021000000 40430 example. OmBvJ1Vgg1hCKMXHFiNeIYHK9XVW0iLDLwJN4TFoNxZuP03gAXEI634Y wOc4YBNITrj413iqNI6mRk/r1dOSUw==
  64. """
  65. Scenario: B2.1. No Data Error, Empty Non-Terminal
  66. Given I have bind10 running with configuration nsec3/nsec3_auth.config
  67. And wait for bind10 stderr message BIND10_STARTED_CC
  68. And wait for bind10 stderr message CMDCTL_STARTED
  69. And wait for bind10 stderr message AUTH_SERVER_STARTED
  70. bind10 module Auth should be running
  71. And bind10 module Resolver should not be running
  72. And bind10 module Xfrout should not be running
  73. And bind10 module Zonemgr should not be running
  74. And bind10 module Xfrin should not be running
  75. And bind10 module Stats should not be running
  76. And bind10 module StatsHttpd should not be running
  77. A dnssec query for y.w.example. should have rcode NOERROR
  78. The last query response should have flags qr aa rd
  79. The last query response should have edns_flags do
  80. The last query response should have ancount 0
  81. The last query response should have nscount 4
  82. The last query response should have adcount 1
  83. The authority section of the last query response should be
  84. """
  85. example. 3600 IN SOA ns1.example. bugs.x.w.example. 1 3600 300 3600000 3600
  86. example. 3600 IN RRSIG SOA 7 1 3600 20150420235959 20051021000000 40430 example. Hu25UIyNPmvPIVBrldN+9Mlp9Zql39qaUd8iq4ZLlYWfUUbbAS41pG+6 8z81q1xhkYAcEyHdVI2LmKusbZsT0Q==
  87. ji6neoaepv8b5o6k4ev33abha8ht9fgc.example. 3600 IN NSEC3 1 1 12 aabbccdd k8udemvp1j2f7eg6jebps17vp3n8i58h
  88. ji6neoaepv8b5o6k4ev33abha8ht9fgc.example. 3600 IN RRSIG NSEC3 7 2 3600 20150420235959 20051021000000 40430 example. gPkFp1s2QDQ6wQzcg1uSebZ61W33rUBDcTj72F3kQ490fEdp7k1BUIfb cZtPbX3YCpE+sIt0MpzVSKfTwx4uYA==
  89. """
  90. Scenario: B.3. Referral to an Opt-Out Unsigned Zone
  91. Given I have bind10 running with configuration nsec3/nsec3_auth.config
  92. And wait for bind10 stderr message BIND10_STARTED_CC
  93. And wait for bind10 stderr message CMDCTL_STARTED
  94. And wait for bind10 stderr message AUTH_SERVER_STARTED
  95. bind10 module Auth should be running
  96. And bind10 module Resolver should not be running
  97. And bind10 module Xfrout should not be running
  98. And bind10 module Zonemgr should not be running
  99. And bind10 module Xfrin should not be running
  100. And bind10 module Stats should not be running
  101. And bind10 module StatsHttpd should not be running
  102. A dnssec query for mc.c.example. type MX should have rcode NOERROR
  103. The last query response should have flags qr rd
  104. The last query response should have edns_flags do
  105. The last query response should have ancount 0
  106. The last query response should have nscount 6
  107. The last query response should have adcount 3
  108. The authority section of the last query response should be
  109. """
  110. c.example. 3600 IN NS ns1.c.example.
  111. c.example. 3600 IN NS ns2.c.example.
  112. 35mthgpgcu1qg68fab165klnsnk3dpvl.example. 3600 IN NSEC3 1 1 12 aabbccdd b4um86eghhds6nea196smvmlo4ors995 NS DS RRSIG
  113. 35mthgpgcu1qg68fab165klnsnk3dpvl.example. 3600 IN RRSIG NSEC3 7 2 3600 20150420235959 20051021000000 40430 example. g6jPUUpduAJKRljUsN8gB4UagAX0NxY9shwQAynzo8EUWH+z6hEIBlUT PGj15eZll6VhQqgZXtAIR3chwgW+SA==
  114. 0p9mhaveqvm6t7vbl5lop2u3t2rp3tom.example. 3600 IN NSEC3 1 1 12 aabbccdd 2t7b4g4vsa5smi47k61mv5bv1a22bojr NS SOA MX RRSIG DNSKEY NSEC3PARAM
  115. 0p9mhaveqvm6t7vbl5lop2u3t2rp3tom.example. 3600 IN RRSIG NSEC3 7 2 3600 20150420235959 20051021000000 40430 example. OSgWSm26B+cS+dDL8b5QrWr/dEWhtCsKlwKLIBHYH6blRxK9rC0bMJPw Q4mLIuw85H2EY762BOCXJZMnpuwhpA==
  116. """
  117. The additional section of the last query response should be
  118. """
  119. ns1.c.example. 3600 IN A 192.0.2.7
  120. ns2.c.example. 3600 IN A 192.0.2.8
  121. """
  122. Scenario: B.4. Wildcard Expansion
  123. Given I have bind10 running with configuration nsec3/nsec3_auth.config
  124. And wait for bind10 stderr message BIND10_STARTED_CC
  125. And wait for bind10 stderr message CMDCTL_STARTED
  126. And wait for bind10 stderr message AUTH_SERVER_STARTED
  127. bind10 module Auth should be running
  128. And bind10 module Resolver should not be running
  129. And bind10 module Xfrout should not be running
  130. And bind10 module Zonemgr should not be running
  131. And bind10 module Xfrin should not be running
  132. And bind10 module Stats should not be running
  133. And bind10 module StatsHttpd should not be running
  134. A dnssec query for a.z.w.example. type MX should have rcode NOERROR
  135. The last query response should have flags qr aa rd
  136. The last query response should have edns_flags do
  137. The last query response should have ancount 2
  138. The last query response should have nscount 5
  139. The last query response should have adcount 9
  140. The answer section of the last query response should be
  141. """
  142. a.z.w.example. 3600 IN MX 1 ai.example.
  143. a.z.w.example. 3600 IN RRSIG MX 7 2 3600 20150420235959 20051021000000 40430 example. CikebjQwGQPwijVcxgcZcSJKtfynugtlBiKb9FcBTrmOoyQ4InoWVudh CWsh/URX3lc4WRUMivEBP6+4KS3ldA==
  144. """
  145. The authority section of the last query response should be
  146. """
  147. example. 3600 IN NS ns1.example.
  148. example. 3600 IN NS ns2.example.
  149. example. 3600 IN RRSIG NS 7 1 3600 20150420235959 20051021000000 40430 example. PVOgtMK1HHeSTau+HwDWC8Ts+6C8qtqd4pQJqOtdEVgg+MA+ai4fWDEh u3qHJyLcQ9tbD2vvCnMXjtz6SyObxA==
  150. q04jkcevqvmu85r014c7dkba38o0ji5r.example. 3600 IN NSEC3 1 1 12 aabbccdd r53bq7cc2uvmubfu5ocmm6pers9tk9en A RRSIG
  151. q04jkcevqvmu85r014c7dkba38o0ji5r.example. 3600 IN RRSIG NSEC3 7 2 3600 20150420235959 20051021000000 40430 example. hV5I89b+4FHJDATp09g4bbN0R1F845CaXpL3ZxlMKimoPAyqletMlEWw LfFia7sdpSzn+ZlNNlkxWcLsIlMmUg==
  152. """
  153. # This is slightly different from the example in RFC5155; there are
  154. # more RRs in the additional section.
  155. The additional section of the last query response should be
  156. """
  157. ai.example. 3600 IN A 192.0.2.9
  158. ai.example. 3600 IN AAAA 2001:db8::f00:baa9
  159. ns1.example. 3600 IN A 192.0.2.1
  160. ns2.example. 3600 IN A 192.0.2.2
  161. ai.example. 3600 IN RRSIG A 7 2 3600 20150420235959 20051021000000 40430 example. hVe+wKYMlObTRPhX0NL67GxeZfdxqr/QeR6FtfdAj5+FgYxyzPEjIzvK Wy00hWIl6wD3Vws+rznEn8sQ64UdqA==
  162. ai.example. 3600 IN RRSIG AAAA 7 2 3600 20150420235959 20051021000000 40430 example. LcdxKaCB5bGZwPDg+3JJ4O02zoMBrjxqlf6WuaHQZZfTUpb9Nf2nxFGe 2XRPfR5tpJT6GdRGcHueLuXkMjBArQ==
  163. ns1.example. 3600 IN RRSIG A 7 2 3600 20150420235959 20051021000000 40430 example. bu6kx73n6XEunoVGuRfAgY7EF/AJqHy7hj0jkiqJjB0dOrx3wuz9SaBe GfqWIdn/uta3SavN4FRvZR9SCFHF5Q==
  164. ns2.example. 3600 IN RRSIG A 7 2 3600 20150420235959 20051021000000 40430 example. ktQ3TqE0CfRfki0Rb/Ip5BM0VnxelbuejCC4zpLbFKA/7eD7UNAwxMgx JPtbdST+syjYSJaj4IHfeX6n8vfoGA==
  165. """
  166. Scenario: B.5. Wildcard No Data Error
  167. Given I have bind10 running with configuration nsec3/nsec3_auth.config
  168. And wait for bind10 stderr message BIND10_STARTED_CC
  169. And wait for bind10 stderr message CMDCTL_STARTED
  170. And wait for bind10 stderr message AUTH_SERVER_STARTED
  171. bind10 module Auth should be running
  172. And bind10 module Resolver should not be running
  173. And bind10 module Xfrout should not be running
  174. And bind10 module Zonemgr should not be running
  175. And bind10 module Xfrin should not be running
  176. And bind10 module Stats should not be running
  177. And bind10 module StatsHttpd should not be running
  178. A dnssec query for a.z.w.example. type AAAA should have rcode NOERROR
  179. The last query response should have flags qr aa rd
  180. The last query response should have edns_flags do
  181. The last query response should have ancount 0
  182. The last query response should have nscount 8
  183. The last query response should have adcount 1
  184. The authority section of the last query response should be
  185. """
  186. example. 3600 IN SOA ns1.example. bugs.x.w.example. 1 3600 300 3600000 3600
  187. example. 3600 IN RRSIG SOA 7 1 3600 20150420235959 20051021000000 40430 example. Hu25UIyNPmvPIVBrldN+9Mlp9Zql39qaUd8iq4ZLlYWfUUbbAS41pG+6 8z81q1xhkYAcEyHdVI2LmKusbZsT0Q==
  188. k8udemvp1j2f7eg6jebps17vp3n8i58h.example. 3600 IN NSEC3 1 1 12 aabbccdd kohar7mbb8dc2ce8a9qvl8hon4k53uhi
  189. k8udemvp1j2f7eg6jebps17vp3n8i58h.example. 3600 IN RRSIG NSEC3 7 2 3600 20150420235959 20051021000000 40430 example. FtXGbvF0+wf8iWkyo73enAuVx03klN+pILBKS6qCcftVtfH4yVzsEZqu J27NHR7ruxJWDNMtOtx7w9WfcIg62A==
  190. q04jkcevqvmu85r014c7dkba38o0ji5r.example. 3600 IN NSEC3 1 1 12 aabbccdd r53bq7cc2uvmubfu5ocmm6pers9tk9en A RRSIG
  191. q04jkcevqvmu85r014c7dkba38o0ji5r.example. 3600 IN RRSIG NSEC3 7 2 3600 20150420235959 20051021000000 40430 example. hV5I89b+4FHJDATp09g4bbN0R1F845CaXpL3ZxlMKimoPAyqletMlEWw LfFia7sdpSzn+ZlNNlkxWcLsIlMmUg==
  192. r53bq7cc2uvmubfu5ocmm6pers9tk9en.example. 3600 IN NSEC3 1 1 12 aabbccdd t644ebqk9bibcna874givr6joj62mlhv MX RRSIG
  193. r53bq7cc2uvmubfu5ocmm6pers9tk9en.example. 3600 IN RRSIG NSEC3 7 2 3600 20150420235959 20051021000000 40430 example. aupviViruXs4bDg9rCbezzBMf9h1ZlDvbW/CZFKulIGXXLj8B/fsDJar XVDA9bnUoRhEbKp+HF1FWKW7RIJdtQ==
  194. """
  195. Scenario: B.6. DS Child Zone No Data Error
  196. Given I have bind10 running with configuration nsec3/nsec3_auth.config
  197. And wait for bind10 stderr message BIND10_STARTED_CC
  198. And wait for bind10 stderr message CMDCTL_STARTED
  199. And wait for bind10 stderr message AUTH_SERVER_STARTED
  200. bind10 module Auth should be running
  201. And bind10 module Resolver should not be running
  202. And bind10 module Xfrout should not be running
  203. And bind10 module Zonemgr should not be running
  204. And bind10 module Xfrin should not be running
  205. And bind10 module Stats should not be running
  206. And bind10 module StatsHttpd should not be running
  207. A dnssec query for example. type DS should have rcode NOERROR
  208. The last query response should have flags qr aa rd
  209. The last query response should have edns_flags do
  210. The last query response should have ancount 0
  211. The last query response should have nscount 4
  212. The last query response should have adcount 1
  213. The authority section of the last query response should be
  214. """
  215. example. 3600 IN SOA ns1.example. bugs.x.w.example. 1 3600 300 3600000 3600
  216. example. 3600 IN RRSIG SOA 7 1 3600 20150420235959 20051021000000 40430 example. Hu25UIyNPmvPIVBrldN+9Mlp9Zql39qaUd8iq4ZLlYWfUUbbAS41pG+6 8z81q1xhkYAcEyHdVI2LmKusbZsT0Q==
  217. 0p9mhaveqvm6t7vbl5lop2u3t2rp3tom.example. 3600 IN NSEC3 1 1 12 aabbccdd 2t7b4g4vsa5smi47k61mv5bv1a22bojr NS SOA MX RRSIG DNSKEY NSEC3PARAM
  218. 0p9mhaveqvm6t7vbl5lop2u3t2rp3tom.example. 3600 IN RRSIG NSEC3 7 2 3600 20150420235959 20051021000000 40430 example. OSgWSm26B+cS+dDL8b5QrWr/dEWhtCsKlwKLIBHYH6blRxK9rC0bMJPw Q4mLIuw85H2EY762BOCXJZMnpuwhpA==
  219. """
  220. #
  221. # Below are additional tests, not explicitely stated in RFC5155
  222. #
  223. Scenario: 7.2.2 other; Name Error where one NSEC3 covers multiple parts of proof (closest encloser)
  224. Given I have bind10 running with configuration nsec3/nsec3_auth.config
  225. And wait for bind10 stderr message BIND10_STARTED_CC
  226. And wait for bind10 stderr message CMDCTL_STARTED
  227. And wait for bind10 stderr message AUTH_SERVER_STARTED
  228. bind10 module Auth should be running
  229. And bind10 module Resolver should not be running
  230. And bind10 module Xfrout should not be running
  231. And bind10 module Zonemgr should not be running
  232. And bind10 module Xfrin should not be running
  233. And bind10 module Stats should not be running
  234. And bind10 module StatsHttpd should not be running
  235. A dnssec query for b.x.w.example. should have rcode NXDOMAIN
  236. The last query response should have flags qr aa rd
  237. The last query response should have edns_flags do
  238. The last query response should have ancount 0
  239. The last query response should have nscount 6
  240. The last query response should have adcount 1
  241. The authority section of the last query response should be
  242. """
  243. example. 3600 IN SOA ns1.example. bugs.x.w.example. 1 3600 300 3600000 3600
  244. example. 3600 IN RRSIG SOA 7 1 3600 20150420235959 20051021000000 40430 example. Hu25UIyNPmvPIVBrldN+9Mlp9Zql39qaUd8iq4ZLlYWfUUbbAS41pG+6 8z81q1xhkYAcEyHdVI2LmKusbZsT0Q==
  245. b4um86eghhds6nea196smvmlo4ors995.example. 3600 IN NSEC3 1 1 12 aabbccdd gjeqe526plbf1g8mklp59enfd789njgi MX RRSIG
  246. b4um86eghhds6nea196smvmlo4ors995.example. 3600 IN RRSIG NSEC3 7 2 3600 20150420235959 20051021000000 40430 example. ZkPG3M32lmoHM6pa3D6gZFGB/rhL//Bs3Omh5u4m/CUiwtblEVOaAKKZ d7S959OeiX43aLX3pOv0TSTyiTxIZg==
  247. 35mthgpgcu1qg68fab165klnsnk3dpvl.example. 3600 IN NSEC3 1 1 12 aabbccdd b4um86eghhds6nea196smvmlo4ors995 NS DS RRSIG
  248. 35mthgpgcu1qg68fab165klnsnk3dpvl.example. 3600 IN RRSIG NSEC3 7 2 3600 20150420235959 20051021000000 40430 example. g6jPUUpduAJKRljUsN8gB4UagAX0NxY9shwQAynzo8EUWH+z6hEIBlUT PGj15eZll6VhQqgZXtAIR3chwgW+SA==
  249. """
  250. Scenario: 7.2.2 other; Name Error where one NSEC3 covers multiple parts of proof (wildcard)
  251. Given I have bind10 running with configuration nsec3/nsec3_auth.config
  252. And wait for bind10 stderr message BIND10_STARTED_CC
  253. And wait for bind10 stderr message CMDCTL_STARTED
  254. And wait for bind10 stderr message AUTH_SERVER_STARTED
  255. bind10 module Auth should be running
  256. And bind10 module Resolver should not be running
  257. And bind10 module Xfrout should not be running
  258. And bind10 module Zonemgr should not be running
  259. And bind10 module Xfrin should not be running
  260. And bind10 module Stats should not be running
  261. And bind10 module StatsHttpd should not be running
  262. A dnssec query for a.w.example. should have rcode NOERROR
  263. The last query response should have flags qr aa rd
  264. The last query response should have edns_flags do
  265. The last query response should have ancount 0
  266. The last query response should have nscount 6
  267. The last query response should have adcount 1
  268. The authority section of the last query response should be
  269. """
  270. example. 3600 IN SOA ns1.example. bugs.x.w.example. 1 3600 300 3600000 3600
  271. example. 3600 IN RRSIG SOA 7 1 3600 20150420235959 20051021000000 40430 example. Hu25UIyNPmvPIVBrldN+9Mlp9Zql39qaUd8iq4ZLlYWfUUbbAS41pG+6 8z81q1xhkYAcEyHdVI2LmKusbZsT0Q==
  272. k8udemvp1j2f7eg6jebps17vp3n8i58h.example. 3600 IN NSEC3 1 1 12 AABBCCDD KOHAR7MBB8DC2CE8A9QVL8HON4K53UHI
  273. k8udemvp1j2f7eg6jebps17vp3n8i58h.example. 3600 IN RRSIG NSEC3 7 2 3600 20150420235959 20051021000000 40430 example. FtXGbvF0+wf8iWkyo73enAuVx03klN+pILBKS6qCcftVtfH4yVzsEZqu J27NHR7ruxJWDNMtOtx7w9WfcIg62A==
  274. r53bq7cc2uvmubfu5ocmm6pers9tk9en.example. 3600 IN NSEC3 1 1 12 AABBCCDD T644EBQK9BIBCNA874GIVR6JOJ62MLHV MX RRSIG
  275. r53bq7cc2uvmubfu5ocmm6pers9tk9en.example. 3600 IN RRSIG NSEC3 7 2 3600 20150420235959 20051021000000 40430 example. aupviViruXs4bDg9rCbezzBMf9h1ZlDvbW/CZFKulIGXXLj8B/fsDJar XVDA9bnUoRhEbKp+HF1FWKW7RIJdtQ==
  276. """
  277. Scenario: Wildcard other: Wildcard name itself
  278. Given I have bind10 running with configuration nsec3/nsec3_auth.config
  279. And wait for bind10 stderr message BIND10_STARTED_CC
  280. And wait for bind10 stderr message CMDCTL_STARTED
  281. And wait for bind10 stderr message AUTH_SERVER_STARTED
  282. bind10 module Auth should be running
  283. And bind10 module Resolver should not be running
  284. And bind10 module Xfrout should not be running
  285. And bind10 module Zonemgr should not be running
  286. And bind10 module Xfrin should not be running
  287. And bind10 module Stats should not be running
  288. And bind10 module StatsHttpd should not be running
  289. A dnssec query for *.w.example. type MX should have rcode NOERROR
  290. The last query response should have flags qr aa rd
  291. The last query response should have edns_flags do
  292. The last query response should have ancount 2
  293. The last query response should have nscount 3
  294. The last query response should have adcount 9
  295. The answer section of the last query response should be
  296. """
  297. *.w.example. 3600 IN MX 1 ai.example.
  298. *.w.example. 3600 IN RRSIG MX 7 2 3600 20150420235959 20051021000000 40430 example. CikebjQwGQPwijVcxgcZcSJKtfynugtlBiKb9FcBTrmOoyQ4InoWVudh CWsh/URX3lc4WRUMivEBP6+4KS3ldA==
  299. """
  300. The authority section of the last query response should be
  301. """
  302. example. 3600 IN NS ns1.example.
  303. example. 3600 IN NS ns2.example.
  304. example. 3600 IN RRSIG NS 7 1 3600 20150420235959 20051021000000 40430 example. PVOgtMK1HHeSTau+HwDWC8Ts+6C8qtqd4pQJqOtdEVgg+MA+ai4fWDEh u3qHJyLcQ9tbD2vvCnMXjtz6SyObxA==
  305. """
  306. The additional section of the last query response should be
  307. """
  308. ai.example. 3600 IN A 192.0.2.9
  309. ai.example. 3600 IN AAAA 2001:db8::f00:baa9
  310. ns1.example. 3600 IN A 192.0.2.1
  311. ns2.example. 3600 IN A 192.0.2.2
  312. ai.example. 3600 IN RRSIG A 7 2 3600 20150420235959 20051021000000 40430 example. hVe+wKYMlObTRPhX0NL67GxeZfdxqr/QeR6FtfdAj5+FgYxyzPEjIzvK Wy00hWIl6wD3Vws+rznEn8sQ64UdqA==
  313. ai.example. 3600 IN RRSIG AAAA 7 2 3600 20150420235959 20051021000000 40430 example. LcdxKaCB5bGZwPDg+3JJ4O02zoMBrjxqlf6WuaHQZZfTUpb9Nf2nxFGe 2XRPfR5tpJT6GdRGcHueLuXkMjBArQ==
  314. ns1.example. 3600 IN RRSIG A 7 2 3600 20150420235959 20051021000000 40430 example. bu6kx73n6XEunoVGuRfAgY7EF/AJqHy7hj0jkiqJjB0dOrx3wuz9SaBe GfqWIdn/uta3SavN4FRvZR9SCFHF5Q==
  315. ns2.example. 3600 IN RRSIG A 7 2 3600 20150420235959 20051021000000 40430 example. ktQ3TqE0CfRfki0Rb/Ip5BM0VnxelbuejCC4zpLbFKA/7eD7UNAwxMgx JPtbdST+syjYSJaj4IHfeX6n8vfoGA==
  316. """
  317. Scenario: Wildcard other: Wildcard name itself nodata
  318. Given I have bind10 running with configuration nsec3/nsec3_auth.config
  319. And wait for bind10 stderr message BIND10_STARTED_CC
  320. And wait for bind10 stderr message CMDCTL_STARTED
  321. And wait for bind10 stderr message AUTH_SERVER_STARTED
  322. bind10 module Auth should be running
  323. And bind10 module Resolver should not be running
  324. And bind10 module Xfrout should not be running
  325. And bind10 module Zonemgr should not be running
  326. And bind10 module Xfrin should not be running
  327. And bind10 module Stats should not be running
  328. And bind10 module StatsHttpd should not be running
  329. A dnssec query for *.w.example. type A should have rcode NOERROR
  330. The last query response should have flags qr aa rd
  331. The last query response should have edns_flags do
  332. The last query response should have ancount 0
  333. The last query response should have nscount 4
  334. The last query response should have adcount 1
  335. The authority section of the last query response should be
  336. """
  337. example. 3600 IN SOA ns1.example. bugs.x.w.example. 1 3600 300 3600000 3600
  338. example. 3600 IN RRSIG SOA 7 1 3600 20150420235959 20051021000000 40430 example. Hu25UIyNPmvPIVBrldN+9Mlp9Zql39qaUd8iq4ZLlYWfUUbbAS41pG+6 8z81q1xhkYAcEyHdVI2LmKusbZsT0Q==
  339. r53bq7cc2uvmubfu5ocmm6pers9tk9en.example. 3600 IN NSEC3 1 1 12 AABBCCDD T644EBQK9BIBCNA874GIVR6JOJ62MLHV MX RRSIG
  340. r53bq7cc2uvmubfu5ocmm6pers9tk9en.example. 3600 IN RRSIG NSEC3 7 2 3600 20150420235959 20051021000000 40430 example. aupviViruXs4bDg9rCbezzBMf9h1ZlDvbW/CZFKulIGXXLj8B/fsDJar XVDA9bnUoRhEbKp+HF1FWKW7RIJdtQ==
  341. """
  342. Scenario: Direct query for NSEC3 record
  343. Given I have bind10 running with configuration nsec3/nsec3_auth.config
  344. And wait for bind10 stderr message BIND10_STARTED_CC
  345. And wait for bind10 stderr message CMDCTL_STARTED
  346. And wait for bind10 stderr message AUTH_SERVER_STARTED
  347. bind10 module Auth should be running
  348. And bind10 module Resolver should not be running
  349. And bind10 module Xfrout should not be running
  350. And bind10 module Zonemgr should not be running
  351. And bind10 module Xfrin should not be running
  352. And bind10 module Stats should not be running
  353. And bind10 module StatsHttpd should not be running
  354. A dnssec query for 0p9mhaveqvm6t7vbl5lop2u3t2rp3tom.example. type NSEC3 should have rcode NXDOMAIN
  355. The last query response should have flags qr aa rd
  356. The last query response should have edns_flags do
  357. The last query response should have ancount 0
  358. The last query response should have nscount 8
  359. The last query response should have adcount 1
  360. The authority section of the last query response should be
  361. """
  362. example. 3600 IN SOA ns1.example. bugs.x.w.example. 1 3600 300 3600000 3600
  363. example. 3600 IN RRSIG SOA 7 1 3600 20150420235959 20051021000000 40430 example. Hu25UIyNPmvPIVBrldN+9Mlp9Zql39qaUd8iq4ZLlYWfUUbbAS41pG+6 8z81q1xhkYAcEyHdVI2LmKusbZsT0Q==
  364. 0p9mhaveqvm6t7vbl5lop2u3t2rp3tom.example. 3600 IN NSEC3 1 1 12 AABBCCDD 2T7B4G4VSA5SMI47K61MV5BV1A22BOJR NS SOA MX RRSIG DNSKEY NSEC3PARAM
  365. 0p9mhaveqvm6t7vbl5lop2u3t2rp3tom.example. 3600 IN RRSIG NSEC3 7 2 3600 20150420235959 20051021000000 40430 example. OSgWSm26B+cS+dDL8b5QrWr/dEWhtCsKlwKLIBHYH6blRxK9rC0bMJPw Q4mLIuw85H2EY762BOCXJZMnpuwhpA==
  366. q04jkcevqvmu85r014c7dkba38o0ji5r.example. 3600 IN NSEC3 1 1 12 AABBCCDD R53BQ7CC2UVMUBFU5OCMM6PERS9TK9EN A RRSIG
  367. q04jkcevqvmu85r014c7dkba38o0ji5r.example. 3600 IN RRSIG NSEC3 7 2 3600 20150420235959 20051021000000 40430 example. hV5I89b+4FHJDATp09g4bbN0R1F845CaXpL3ZxlMKimoPAyqletMlEWw LfFia7sdpSzn+ZlNNlkxWcLsIlMmUg==
  368. gjeqe526plbf1g8mklp59enfd789njgi.example. 3600 IN NSEC3 1 1 12 AABBCCDD JI6NEOAEPV8B5O6K4EV33ABHA8HT9FGC A HINFO AAAA RRSIG
  369. gjeqe526plbf1g8mklp59enfd789njgi.example. 3600 IN RRSIG NSEC3 7 2 3600 20150420235959 20051021000000 40430 example. IVnezTJ9iqblFF97vPSmfXZ5Zozngx3KX3byLTZC4QBH2dFWhf6scrGF ZB980AfCxoD9qbbKDy+rdGIeRSVNyw==
  370. """
  371. Scenario: No data, type DS, in-zone
  372. Given I have bind10 running with configuration nsec3/nsec3_auth.config
  373. And wait for bind10 stderr message BIND10_STARTED_CC
  374. And wait for bind10 stderr message CMDCTL_STARTED
  375. And wait for bind10 stderr message AUTH_SERVER_STARTED
  376. bind10 module Auth should be running
  377. And bind10 module Resolver should not be running
  378. And bind10 module Xfrout should not be running
  379. And bind10 module Zonemgr should not be running
  380. And bind10 module Xfrin should not be running
  381. And bind10 module Stats should not be running
  382. And bind10 module StatsHttpd should not be running
  383. A dnssec query for ai.example. type DS should have rcode NOERROR
  384. The last query response should have flags qr aa rd
  385. The last query response should have edns_flags do
  386. The last query response should have ancount 0
  387. The last query response should have nscount 4
  388. The last query response should have adcount 1
  389. The authority section of the last query response should be
  390. """
  391. example. 3600 IN SOA ns1.example. bugs.x.w.example. 1 3600 300 3600000 3600
  392. example. 3600 IN RRSIG SOA 7 1 3600 20150420235959 20051021000000 40430 example. Hu25UIyNPmvPIVBrldN+9Mlp9Zql39qaUd8iq4ZLlYWfUUbbAS41pG+6 8z81q1xhkYAcEyHdVI2LmKusbZsT0Q==
  393. gjeqe526plbf1g8mklp59enfd789njgi.example. 3600 IN NSEC3 1 1 12 AABBCCDD JI6NEOAEPV8B5O6K4EV33ABHA8HT9FGC A HINFO AAAA RRSIG
  394. gjeqe526plbf1g8mklp59enfd789njgi.example. 3600 IN RRSIG NSEC3 7 2 3600 20150420235959 20051021000000 40430 example. IVnezTJ9iqblFF97vPSmfXZ5Zozngx3KX3byLTZC4QBH2dFWhf6scrGF ZB980AfCxoD9qbbKDy+rdGIeRSVNyw==
  395. """
  396. Scenario: No data, type DS, optout delegation
  397. Given I have bind10 running with configuration nsec3/nsec3_auth.config
  398. And wait for bind10 stderr message BIND10_STARTED_CC
  399. And wait for bind10 stderr message CMDCTL_STARTED
  400. And wait for bind10 stderr message AUTH_SERVER_STARTED
  401. bind10 module Auth should be running
  402. And bind10 module Resolver should not be running
  403. And bind10 module Xfrout should not be running
  404. And bind10 module Zonemgr should not be running
  405. And bind10 module Xfrin should not be running
  406. And bind10 module Stats should not be running
  407. And bind10 module StatsHttpd should not be running
  408. A dnssec query for c.example. type DS should have rcode NOERROR
  409. The last query response should have flags qr aa rd
  410. The last query response should have edns_flags do
  411. The last query response should have ancount 0
  412. The last query response should have nscount 6
  413. The last query response should have adcount 1
  414. The authority section of the last query response should be
  415. """
  416. example. 3600 IN SOA ns1.example. bugs.x.w.example. 1 3600 300 3600000 3600
  417. example. 3600 IN RRSIG SOA 7 1 3600 20150420235959 20051021000000 40430 example. Hu25UIyNPmvPIVBrldN+9Mlp9Zql39qaUd8iq4ZLlYWfUUbbAS41pG+6 8z81q1xhkYAcEyHdVI2LmKusbZsT0Q==
  418. 0p9mhaveqvm6t7vbl5lop2u3t2rp3tom.example. 3600 IN NSEC3 1 1 12 AABBCCDD 2T7B4G4VSA5SMI47K61MV5BV1A22BOJR NS SOA MX RRSIG DNSKEY NSEC3PARAM
  419. 0p9mhaveqvm6t7vbl5lop2u3t2rp3tom.example. 3600 IN RRSIG NSEC3 7 2 3600 20150420235959 20051021000000 40430 example. OSgWSm26B+cS+dDL8b5QrWr/dEWhtCsKlwKLIBHYH6blRxK9rC0bMJPw Q4mLIuw85H2EY762BOCXJZMnpuwhpA==
  420. 35mthgpgcu1qg68fab165klnsnk3dpvl.example. 3600 IN NSEC3 1 1 12 AABBCCDD B4UM86EGHHDS6NEA196SMVMLO4ORS995 NS DS RRSIG
  421. 35mthgpgcu1qg68fab165klnsnk3dpvl.example. 3600 IN RRSIG NSEC3 7 2 3600 20150420235959 20051021000000 40430 example. g6jPUUpduAJKRljUsN8gB4UagAX0NxY9shwQAynzo8EUWH+z6hEIBlUT PGj15eZll6VhQqgZXtAIR3chwgW+SA==
  422. """