nsec3_auth.feature 23 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304
  1. Feature: NSEC3 Authoritative service
  2. This feature tests NSEC3 as defined in RFC5155, using the example
  3. zone from appendix A and testing the example responses from appendix B.
  4. Additional tests can be added as well.
  5. # Response section data is taken directly from RFC5155
  6. # It has been modified slightly; it has been 'flattened' (i.e. converted
  7. # to 1-line RRs with TTL and class data), and whitespace has been added
  8. # in the places where dig adds them too.
  9. # Any other changes from the specific example data are added as inline
  10. # comments.
  11. Scenario: B.1. Name Error
  12. Given I have bind10 running with configuration nsec3/nsec3_auth.config
  13. A dnssec query for a.c.x.w.example. should have rcode NXDOMAIN
  14. The last query response should have flags qr aa rd
  15. The last query response should have edns_flags do
  16. The last query response should have ancount 0
  17. The last query response should have nscount 8
  18. The last query response should have adcount 1
  19. The authority section of the last query response should be
  20. """
  21. example. 3600 IN SOA ns1.example. bugs.x.w.example. 1 3600 300 3600000 3600
  22. example. 3600 IN RRSIG SOA 7 1 3600 20150420235959 20051021000000 40430 example. Hu25UIyNPmvPIVBrldN+9Mlp9Zql39qaUd8iq4ZLlYWfUUbbAS41pG+6 8z81q1xhkYAcEyHdVI2LmKusbZsT0Q==
  23. 0p9mhaveqvm6t7vbl5lop2u3t2rp3tom.example. 3600 IN NSEC3 1 1 12 aabbccdd 2t7b4g4vsa5smi47k61mv5bv1a22bojr NS SOA MX RRSIG DNSKEY NSEC3PARAM
  24. 0p9mhaveqvm6t7vbl5lop2u3t2rp3tom.example. 3600 IN RRSIG NSEC3 7 2 3600 20150420235959 20051021000000 40430 example. OSgWSm26B+cS+dDL8b5QrWr/dEWhtCsKlwKLIBHYH6blRxK9rC0bMJPw Q4mLIuw85H2EY762BOCXJZMnpuwhpA==
  25. b4um86eghhds6nea196smvmlo4ors995.example. 3600 IN NSEC3 1 1 12 aabbccdd gjeqe526plbf1g8mklp59enfd789njgi MX RRSIG
  26. b4um86eghhds6nea196smvmlo4ors995.example. 3600 IN RRSIG NSEC3 7 2 3600 20150420235959 20051021000000 40430 example. ZkPG3M32lmoHM6pa3D6gZFGB/rhL//Bs3Omh5u4m/CUiwtblEVOaAKKZ d7S959OeiX43aLX3pOv0TSTyiTxIZg==
  27. 35mthgpgcu1qg68fab165klnsnk3dpvl.example. 3600 IN NSEC3 1 1 12 aabbccdd b4um86eghhds6nea196smvmlo4ors995 NS DS RRSIG
  28. 35mthgpgcu1qg68fab165klnsnk3dpvl.example. 3600 IN RRSIG NSEC3 7 2 3600 20150420235959 20051021000000 40430 example. g6jPUUpduAJKRljUsN8gB4UagAX0NxY9shwQAynzo8EUWH+z6hEIBlUT PGj15eZll6VhQqgZXtAIR3chwgW+SA==
  29. """
  30. Scenario: B.2. No Data Error
  31. Given I have bind10 running with configuration nsec3/nsec3_auth.config
  32. A dnssec query for ns1.example. type MX should have rcode NOERROR
  33. The last query response should have flags qr aa rd
  34. The last query response should have edns_flags do
  35. The last query response should have ancount 0
  36. The last query response should have nscount 4
  37. The last query response should have adcount 1
  38. The authority section of the last query response should be
  39. """
  40. example. 3600 IN SOA ns1.example. bugs.x.w.example. 1 3600 300 3600000 3600
  41. example. 3600 IN RRSIG SOA 7 1 3600 20150420235959 20051021000000 40430 example. Hu25UIyNPmvPIVBrldN+9Mlp9Zql39qaUd8iq4ZLlYWfUUbbAS41pG+6 8z81q1xhkYAcEyHdVI2LmKusbZsT0Q==
  42. 2t7b4g4vsa5smi47k61mv5bv1a22bojr.example. 3600 IN NSEC3 1 1 12 aabbccdd 2vptu5timamqttgl4luu9kg21e0aor3s A RRSIG
  43. 2t7b4g4vsa5smi47k61mv5bv1a22bojr.example. 3600 IN RRSIG NSEC3 7 2 3600 20150420235959 20051021000000 40430 example. OmBvJ1Vgg1hCKMXHFiNeIYHK9XVW0iLDLwJN4TFoNxZuP03gAXEI634Y wOc4YBNITrj413iqNI6mRk/r1dOSUw==
  44. """
  45. Scenario: B2.1. No Data Error, Empty Non-Terminal
  46. Given I have bind10 running with configuration nsec3/nsec3_auth.config
  47. A dnssec query for y.w.example. should have rcode NOERROR
  48. The last query response should have flags qr aa rd
  49. The last query response should have edns_flags do
  50. The last query response should have ancount 0
  51. The last query response should have nscount 4
  52. The last query response should have adcount 1
  53. The authority section of the last query response should be
  54. """
  55. example. 3600 IN SOA ns1.example. bugs.x.w.example. 1 3600 300 3600000 3600
  56. example. 3600 IN RRSIG SOA 7 1 3600 20150420235959 20051021000000 40430 example. Hu25UIyNPmvPIVBrldN+9Mlp9Zql39qaUd8iq4ZLlYWfUUbbAS41pG+6 8z81q1xhkYAcEyHdVI2LmKusbZsT0Q==
  57. ji6neoaepv8b5o6k4ev33abha8ht9fgc.example. 3600 IN NSEC3 1 1 12 aabbccdd k8udemvp1j2f7eg6jebps17vp3n8i58h
  58. ji6neoaepv8b5o6k4ev33abha8ht9fgc.example. 3600 IN RRSIG NSEC3 7 2 3600 20150420235959 20051021000000 40430 example. gPkFp1s2QDQ6wQzcg1uSebZ61W33rUBDcTj72F3kQ490fEdp7k1BUIfb cZtPbX3YCpE+sIt0MpzVSKfTwx4uYA==
  59. """
  60. Scenario: B.3. Referral to an Opt-Out Unsigned Zone
  61. Given I have bind10 running with configuration nsec3/nsec3_auth.config
  62. A dnssec query for mc.c.example. type MX should have rcode NOERROR
  63. The last query response should have flags qr rd
  64. The last query response should have edns_flags do
  65. The last query response should have ancount 0
  66. The last query response should have nscount 6
  67. The last query response should have adcount 3
  68. The authority section of the last query response should be
  69. """
  70. c.example. 3600 IN NS ns1.c.example.
  71. c.example. 3600 IN NS ns2.c.example.
  72. 35mthgpgcu1qg68fab165klnsnk3dpvl.example. 3600 IN NSEC3 1 1 12 aabbccdd b4um86eghhds6nea196smvmlo4ors995 NS DS RRSIG
  73. 35mthgpgcu1qg68fab165klnsnk3dpvl.example. 3600 IN RRSIG NSEC3 7 2 3600 20150420235959 20051021000000 40430 example. g6jPUUpduAJKRljUsN8gB4UagAX0NxY9shwQAynzo8EUWH+z6hEIBlUT PGj15eZll6VhQqgZXtAIR3chwgW+SA==
  74. 0p9mhaveqvm6t7vbl5lop2u3t2rp3tom.example. 3600 IN NSEC3 1 1 12 aabbccdd 2t7b4g4vsa5smi47k61mv5bv1a22bojr NS SOA MX RRSIG DNSKEY NSEC3PARAM
  75. 0p9mhaveqvm6t7vbl5lop2u3t2rp3tom.example. 3600 IN RRSIG NSEC3 7 2 3600 20150420235959 20051021000000 40430 example. OSgWSm26B+cS+dDL8b5QrWr/dEWhtCsKlwKLIBHYH6blRxK9rC0bMJPw Q4mLIuw85H2EY762BOCXJZMnpuwhpA==
  76. """
  77. The additional section of the last query response should be
  78. """
  79. ns1.c.example. 3600 IN A 192.0.2.7
  80. ns2.c.example. 3600 IN A 192.0.2.8
  81. """
  82. Scenario: B.4. Wildcard Expansion
  83. Given I have bind10 running with configuration nsec3/nsec3_auth.config
  84. A dnssec query for a.z.w.example. type MX should have rcode NOERROR
  85. The last query response should have flags qr aa rd
  86. The last query response should have edns_flags do
  87. # BUG: NO RRSIG IN WILDCARD RESPONSE!!! (see ticket #1701)
  88. #The last query response should have ancount 2
  89. The last query response should have nscount 5
  90. The last query response should have adcount 9
  91. # BUG: NO RRSIG IN WILDCARD RESPONSE!!! (see ticket #1701)
  92. #The answer section of the last query response should be
  93. #"""
  94. #a.z.w.example. 3600 IN MX 1 ai.example.
  95. #a.z.w.example. 3600 IN RRSIG MX 7 2 3600 20150420235959 20051021000000 40430 example. CikebjQwGQPwijVcxgcZcSJKtfynugtlBiKb9FcBTrmOoyQ4InoWVudh CWsh/URX3lc4WRUMivEBP6+4KS3ldA==
  96. #"""
  97. The authority section of the last query response should be
  98. """
  99. example. 3600 IN NS ns1.example.
  100. example. 3600 IN NS ns2.example.
  101. example. 3600 IN RRSIG NS 7 1 3600 20150420235959 20051021000000 40430 example. PVOgtMK1HHeSTau+HwDWC8Ts+6C8qtqd4pQJqOtdEVgg+MA+ai4fWDEh u3qHJyLcQ9tbD2vvCnMXjtz6SyObxA==
  102. q04jkcevqvmu85r014c7dkba38o0ji5r.example. 3600 IN NSEC3 1 1 12 aabbccdd r53bq7cc2uvmubfu5ocmm6pers9tk9en A RRSIG
  103. q04jkcevqvmu85r014c7dkba38o0ji5r.example. 3600 IN RRSIG NSEC3 7 2 3600 20150420235959 20051021000000 40430 example. hV5I89b+4FHJDATp09g4bbN0R1F845CaXpL3ZxlMKimoPAyqletMlEWw LfFia7sdpSzn+ZlNNlkxWcLsIlMmUg==
  104. """
  105. # This is slightly different from the example in RFC5155; there are
  106. # more RRs in the additional section.
  107. The additional section of the last query response should be
  108. """
  109. ai.example. 3600 IN A 192.0.2.9
  110. ai.example. 3600 IN AAAA 2001:db8::f00:baa9
  111. ns1.example. 3600 IN A 192.0.2.1
  112. ns2.example. 3600 IN A 192.0.2.2
  113. ai.example. 3600 IN RRSIG A 7 2 3600 20150420235959 20051021000000 40430 example. hVe+wKYMlObTRPhX0NL67GxeZfdxqr/QeR6FtfdAj5+FgYxyzPEjIzvK Wy00hWIl6wD3Vws+rznEn8sQ64UdqA==
  114. ai.example. 3600 IN RRSIG AAAA 7 2 3600 20150420235959 20051021000000 40430 example. LcdxKaCB5bGZwPDg+3JJ4O02zoMBrjxqlf6WuaHQZZfTUpb9Nf2nxFGe 2XRPfR5tpJT6GdRGcHueLuXkMjBArQ==
  115. ns1.example. 3600 IN RRSIG A 7 2 3600 20150420235959 20051021000000 40430 example. bu6kx73n6XEunoVGuRfAgY7EF/AJqHy7hj0jkiqJjB0dOrx3wuz9SaBe GfqWIdn/uta3SavN4FRvZR9SCFHF5Q==
  116. ns2.example. 3600 IN RRSIG A 7 2 3600 20150420235959 20051021000000 40430 example. ktQ3TqE0CfRfki0Rb/Ip5BM0VnxelbuejCC4zpLbFKA/7eD7UNAwxMgx JPtbdST+syjYSJaj4IHfeX6n8vfoGA==
  117. """
  118. Scenario: B.5. Wildcard No Data Error
  119. Given I have bind10 running with configuration nsec3/nsec3_auth.config
  120. A dnssec query for a.z.w.example. type AAAA should have rcode NOERROR
  121. The last query response should have flags qr aa rd
  122. The last query response should have edns_flags do
  123. The last query response should have ancount 0
  124. The last query response should have nscount 8
  125. The last query response should have adcount 1
  126. The authority section of the last query response should be
  127. """
  128. example. 3600 IN SOA ns1.example. bugs.x.w.example. 1 3600 300 3600000 3600
  129. example. 3600 IN RRSIG SOA 7 1 3600 20150420235959 20051021000000 40430 example. Hu25UIyNPmvPIVBrldN+9Mlp9Zql39qaUd8iq4ZLlYWfUUbbAS41pG+6 8z81q1xhkYAcEyHdVI2LmKusbZsT0Q==
  130. k8udemvp1j2f7eg6jebps17vp3n8i58h.example. 3600 IN NSEC3 1 1 12 aabbccdd kohar7mbb8dc2ce8a9qvl8hon4k53uhi
  131. k8udemvp1j2f7eg6jebps17vp3n8i58h.example. 3600 IN RRSIG NSEC3 7 2 3600 20150420235959 20051021000000 40430 example. FtXGbvF0+wf8iWkyo73enAuVx03klN+pILBKS6qCcftVtfH4yVzsEZqu J27NHR7ruxJWDNMtOtx7w9WfcIg62A==
  132. q04jkcevqvmu85r014c7dkba38o0ji5r.example. 3600 IN NSEC3 1 1 12 aabbccdd r53bq7cc2uvmubfu5ocmm6pers9tk9en A RRSIG
  133. q04jkcevqvmu85r014c7dkba38o0ji5r.example. 3600 IN RRSIG NSEC3 7 2 3600 20150420235959 20051021000000 40430 example. hV5I89b+4FHJDATp09g4bbN0R1F845CaXpL3ZxlMKimoPAyqletMlEWw LfFia7sdpSzn+ZlNNlkxWcLsIlMmUg==
  134. r53bq7cc2uvmubfu5ocmm6pers9tk9en.example. 3600 IN NSEC3 1 1 12 aabbccdd t644ebqk9bibcna874givr6joj62mlhv MX RRSIG
  135. r53bq7cc2uvmubfu5ocmm6pers9tk9en.example. 3600 IN RRSIG NSEC3 7 2 3600 20150420235959 20051021000000 40430 example. aupviViruXs4bDg9rCbezzBMf9h1ZlDvbW/CZFKulIGXXLj8B/fsDJar XVDA9bnUoRhEbKp+HF1FWKW7RIJdtQ==
  136. """
  137. Scenario: B.6. DS Child Zone No Data Error
  138. Given I have bind10 running with configuration nsec3/nsec3_auth.config
  139. A dnssec query for example. type DS should have rcode NOERROR
  140. The last query response should have flags qr aa rd
  141. The last query response should have edns_flags do
  142. The last query response should have ancount 0
  143. The last query response should have nscount 4
  144. The last query response should have adcount 1
  145. The authority section of the last query response should be
  146. """
  147. example. 3600 IN SOA ns1.example. bugs.x.w.example. 1 3600 300 3600000 3600
  148. example. 3600 IN RRSIG SOA 7 1 3600 20150420235959 20051021000000 40430 example. Hu25UIyNPmvPIVBrldN+9Mlp9Zql39qaUd8iq4ZLlYWfUUbbAS41pG+6 8z81q1xhkYAcEyHdVI2LmKusbZsT0Q==
  149. 0p9mhaveqvm6t7vbl5lop2u3t2rp3tom.example. 3600 IN NSEC3 1 1 12 aabbccdd 2t7b4g4vsa5smi47k61mv5bv1a22bojr NS SOA MX RRSIG DNSKEY NSEC3PARAM
  150. 0p9mhaveqvm6t7vbl5lop2u3t2rp3tom.example. 3600 IN RRSIG NSEC3 7 2 3600 20150420235959 20051021000000 40430 example. OSgWSm26B+cS+dDL8b5QrWr/dEWhtCsKlwKLIBHYH6blRxK9rC0bMJPw Q4mLIuw85H2EY762BOCXJZMnpuwhpA==
  151. """
  152. #
  153. # Below are additional tests, not explicitely stated in RFC5155
  154. #
  155. # THIS TEST CURRENTLY FAILS: An NSEC3 record is added twice
  156. # See ticket #1688
  157. #Scenario: 7.2.2 other; Name Error where one NSEC3 covers multiple parts of proof (closest encloser)
  158. # Given I have bind10 running with configuration nsec3/nsec3_auth.config
  159. # A dnssec query for b.x.w.example. should have rcode NXDOMAIN
  160. # The last query response should have flags qr aa rd
  161. # The last query response should have edns_flags do
  162. # The last query response should have ancount 0
  163. # The last query response should have nscount 6
  164. # The last query response should have adcount 1
  165. # The authority section of the last query response should be
  166. # """
  167. # example. 3600 IN SOA ns1.example. bugs.x.w.example. 1 3600 300 3600000 3600
  168. # example. 3600 IN RRSIG SOA 7 1 3600 20150420235959 20051021000000 40430 example. Hu25UIyNPmvPIVBrldN+9Mlp9Zql39qaUd8iq4ZLlYWfUUbbAS41pG+6 8z81q1xhkYAcEyHdVI2LmKusbZsT0Q==
  169. # b4um86eghhds6nea196smvmlo4ors995.example. 3600 IN NSEC3 1 1 12 aabbccdd gjeqe526plbf1g8mklp59enfd789njgi MX RRSIG
  170. # b4um86eghhds6nea196smvmlo4ors995.example. 3600 IN RRSIG NSEC3 7 2 3600 20150420235959 20051021000000 40430 example. ZkPG3M32lmoHM6pa3D6gZFGB/rhL//Bs3Omh5u4m/CUiwtblEVOaAKKZ d7S959OeiX43aLX3pOv0TSTyiTxIZg==
  171. # 35mthgpgcu1qg68fab165klnsnk3dpvl.example. 3600 IN NSEC3 1 1 12 aabbccdd b4um86eghhds6nea196smvmlo4ors995 NS DS RRSIG
  172. # 35mthgpgcu1qg68fab165klnsnk3dpvl.example. 3600 IN RRSIG NSEC3 7 2 3600 20150420235959 20051021000000 40430 example. g6jPUUpduAJKRljUsN8gB4UagAX0NxY9shwQAynzo8EUWH+z6hEIBlUT PGj15eZll6VhQqgZXtAIR3chwgW+SA==
  173. # """
  174. # THIS TEST CURRENTLY FAILS: An NSEC3 record is added twice
  175. # See ticket #1688
  176. #Scenario: 7.2.2 other; Name Error where one NSEC3 covers multiple parts of proof (wildcard)
  177. # Given I have bind10 running with configuration nsec3/nsec3_auth.config
  178. # A dnssec query for a.w.example. should have rcode NXDOMAIN
  179. # The last query response should have flags qr aa rd
  180. # The last query response should have edns_flags do
  181. # The last query response should have ancount 0
  182. # The last query response should have nscount 6
  183. # The last query response should have adcount 1
  184. # The authority section of the last query response should be
  185. # """
  186. # example. 3600 IN SOA ns1.example. bugs.x.w.example. 1 3600 300 3600000 3600
  187. # example. 3600 IN RRSIG SOA 7 1 3600 20150420235959 20051021000000 40430 example. Hu25UIyNPmvPIVBrldN+9Mlp9Zql39qaUd8iq4ZLlYWfUUbbAS41pG+6 8z81q1xhkYAcEyHdVI2LmKusbZsT0Q==
  188. # k8udemvp1j2f7eg6jebps17vp3n8i58h.example. 3600 IN NSEC3 1 1 12 AABBCCDD KOHAR7MBB8DC2CE8A9QVL8HON4K53UHI
  189. # k8udemvp1j2f7eg6jebps17vp3n8i58h.example. 3600 IN RRSIG NSEC3 7 2 3600 20150420235959 20051021000000 40430 example. FtXGbvF0+wf8iWkyo73enAuVx03klN+pILBKS6qCcftVtfH4yVzsEZqu J27NHR7ruxJWDNMtOtx7w9WfcIg62A==
  190. # r53bq7cc2uvmubfu5ocmm6pers9tk9en.example. 3600 IN NSEC3 1 1 12 AABBCCDD T644EBQK9BIBCNA874GIVR6JOJ62MLHV MX RRSIG
  191. # r53bq7cc2uvmubfu5ocmm6pers9tk9en.example. 3600 IN RRSIG NSEC3 7 2 3600 20150420235959 20051021000000 40430 example. aupviViruXs4bDg9rCbezzBMf9h1ZlDvbW/CZFKulIGXXLj8B/fsDJar XVDA9bnUoRhEbKp+HF1FWKW7RIJdtQ==
  192. # """
  193. Scenario: Wildcard other: Wildcard name itself
  194. Given I have bind10 running with configuration nsec3/nsec3_auth.config
  195. A dnssec query for *.w.example. type MX should have rcode NOERROR
  196. The last query response should have flags qr aa rd
  197. The last query response should have edns_flags do
  198. The last query response should have ancount 2
  199. The last query response should have nscount 3
  200. The last query response should have adcount 9
  201. The answer section of the last query response should be
  202. """
  203. *.w.example. 3600 IN MX 1 ai.example.
  204. *.w.example. 3600 IN RRSIG MX 7 2 3600 20150420235959 20051021000000 40430 example. CikebjQwGQPwijVcxgcZcSJKtfynugtlBiKb9FcBTrmOoyQ4InoWVudh CWsh/URX3lc4WRUMivEBP6+4KS3ldA==
  205. """
  206. The authority section of the last query response should be
  207. """
  208. example. 3600 IN NS ns1.example.
  209. example. 3600 IN NS ns2.example.
  210. example. 3600 IN RRSIG NS 7 1 3600 20150420235959 20051021000000 40430 example. PVOgtMK1HHeSTau+HwDWC8Ts+6C8qtqd4pQJqOtdEVgg+MA+ai4fWDEh u3qHJyLcQ9tbD2vvCnMXjtz6SyObxA==
  211. """
  212. The additional section of the last query response should be
  213. """
  214. ai.example. 3600 IN A 192.0.2.9
  215. ai.example. 3600 IN AAAA 2001:db8::f00:baa9
  216. ns1.example. 3600 IN A 192.0.2.1
  217. ns2.example. 3600 IN A 192.0.2.2
  218. ai.example. 3600 IN RRSIG A 7 2 3600 20150420235959 20051021000000 40430 example. hVe+wKYMlObTRPhX0NL67GxeZfdxqr/QeR6FtfdAj5+FgYxyzPEjIzvK Wy00hWIl6wD3Vws+rznEn8sQ64UdqA==
  219. ai.example. 3600 IN RRSIG AAAA 7 2 3600 20150420235959 20051021000000 40430 example. LcdxKaCB5bGZwPDg+3JJ4O02zoMBrjxqlf6WuaHQZZfTUpb9Nf2nxFGe 2XRPfR5tpJT6GdRGcHueLuXkMjBArQ==
  220. ns1.example. 3600 IN RRSIG A 7 2 3600 20150420235959 20051021000000 40430 example. bu6kx73n6XEunoVGuRfAgY7EF/AJqHy7hj0jkiqJjB0dOrx3wuz9SaBe GfqWIdn/uta3SavN4FRvZR9SCFHF5Q==
  221. ns2.example. 3600 IN RRSIG A 7 2 3600 20150420235959 20051021000000 40430 example. ktQ3TqE0CfRfki0Rb/Ip5BM0VnxelbuejCC4zpLbFKA/7eD7UNAwxMgx JPtbdST+syjYSJaj4IHfeX6n8vfoGA==
  222. """
  223. Scenario: Wildcard other: Wildcard name itself nodata
  224. Given I have bind10 running with configuration nsec3/nsec3_auth.config
  225. A dnssec query for *.w.example. type A should have rcode NOERROR
  226. The last query response should have flags qr aa rd
  227. The last query response should have edns_flags do
  228. The last query response should have ancount 0
  229. The last query response should have nscount 4
  230. The last query response should have adcount 1
  231. The authority section of the last query response should be
  232. """
  233. example. 3600 IN SOA ns1.example. bugs.x.w.example. 1 3600 300 3600000 3600
  234. example. 3600 IN RRSIG SOA 7 1 3600 20150420235959 20051021000000 40430 example. Hu25UIyNPmvPIVBrldN+9Mlp9Zql39qaUd8iq4ZLlYWfUUbbAS41pG+6 8z81q1xhkYAcEyHdVI2LmKusbZsT0Q==
  235. r53bq7cc2uvmubfu5ocmm6pers9tk9en.example. 3600 IN NSEC3 1 1 12 AABBCCDD T644EBQK9BIBCNA874GIVR6JOJ62MLHV MX RRSIG
  236. r53bq7cc2uvmubfu5ocmm6pers9tk9en.example. 3600 IN RRSIG NSEC3 7 2 3600 20150420235959 20051021000000 40430 example. aupviViruXs4bDg9rCbezzBMf9h1ZlDvbW/CZFKulIGXXLj8B/fsDJar XVDA9bnUoRhEbKp+HF1FWKW7RIJdtQ==
  237. """
  238. Scenario: Direct query for NSEC3 record
  239. Given I have bind10 running with configuration nsec3/nsec3_auth.config
  240. A dnssec query for 0p9mhaveqvm6t7vbl5lop2u3t2rp3tom.example. type NSEC3 should have rcode NXDOMAIN
  241. The last query response should have flags qr aa rd
  242. The last query response should have edns_flags do
  243. The last query response should have ancount 0
  244. The last query response should have nscount 8
  245. The last query response should have adcount 1
  246. The authority section of the last query response should be
  247. """
  248. example. 3600 IN SOA ns1.example. bugs.x.w.example. 1 3600 300 3600000 3600
  249. example. 3600 IN RRSIG SOA 7 1 3600 20150420235959 20051021000000 40430 example. Hu25UIyNPmvPIVBrldN+9Mlp9Zql39qaUd8iq4ZLlYWfUUbbAS41pG+6 8z81q1xhkYAcEyHdVI2LmKusbZsT0Q==
  250. 0p9mhaveqvm6t7vbl5lop2u3t2rp3tom.example. 3600 IN NSEC3 1 1 12 AABBCCDD 2T7B4G4VSA5SMI47K61MV5BV1A22BOJR NS SOA MX RRSIG DNSKEY NSEC3PARAM
  251. 0p9mhaveqvm6t7vbl5lop2u3t2rp3tom.example. 3600 IN RRSIG NSEC3 7 2 3600 20150420235959 20051021000000 40430 example. OSgWSm26B+cS+dDL8b5QrWr/dEWhtCsKlwKLIBHYH6blRxK9rC0bMJPw Q4mLIuw85H2EY762BOCXJZMnpuwhpA==
  252. q04jkcevqvmu85r014c7dkba38o0ji5r.example. 3600 IN NSEC3 1 1 12 AABBCCDD R53BQ7CC2UVMUBFU5OCMM6PERS9TK9EN A RRSIG
  253. q04jkcevqvmu85r014c7dkba38o0ji5r.example. 3600 IN RRSIG NSEC3 7 2 3600 20150420235959 20051021000000 40430 example. hV5I89b+4FHJDATp09g4bbN0R1F845CaXpL3ZxlMKimoPAyqletMlEWw LfFia7sdpSzn+ZlNNlkxWcLsIlMmUg==
  254. gjeqe526plbf1g8mklp59enfd789njgi.example. 3600 IN NSEC3 1 1 12 AABBCCDD JI6NEOAEPV8B5O6K4EV33ABHA8HT9FGC A HINFO AAAA RRSIG
  255. gjeqe526plbf1g8mklp59enfd789njgi.example. 3600 IN RRSIG NSEC3 7 2 3600 20150420235959 20051021000000 40430 example. IVnezTJ9iqblFF97vPSmfXZ5Zozngx3KX3byLTZC4QBH2dFWhf6scrGF ZB980AfCxoD9qbbKDy+rdGIeRSVNyw==
  256. """
  257. Scenario: No data, type DS, in-zone
  258. Given I have bind10 running with configuration nsec3/nsec3_auth.config
  259. A dnssec query for ai.example. type DS should have rcode NOERROR
  260. The last query response should have flags qr aa rd
  261. The last query response should have edns_flags do
  262. The last query response should have ancount 0
  263. The last query response should have nscount 4
  264. The last query response should have adcount 1
  265. The authority section of the last query response should be
  266. """
  267. example. 3600 IN SOA ns1.example. bugs.x.w.example. 1 3600 300 3600000 3600
  268. example. 3600 IN RRSIG SOA 7 1 3600 20150420235959 20051021000000 40430 example. Hu25UIyNPmvPIVBrldN+9Mlp9Zql39qaUd8iq4ZLlYWfUUbbAS41pG+6 8z81q1xhkYAcEyHdVI2LmKusbZsT0Q==
  269. gjeqe526plbf1g8mklp59enfd789njgi.example. 3600 IN NSEC3 1 1 12 AABBCCDD JI6NEOAEPV8B5O6K4EV33ABHA8HT9FGC A HINFO AAAA RRSIG
  270. gjeqe526plbf1g8mklp59enfd789njgi.example. 3600 IN RRSIG NSEC3 7 2 3600 20150420235959 20051021000000 40430 example. IVnezTJ9iqblFF97vPSmfXZ5Zozngx3KX3byLTZC4QBH2dFWhf6scrGF ZB980AfCxoD9qbbKDy+rdGIeRSVNyw==
  271. """
  272. Scenario: No data, type DS, optout delegation
  273. Given I have bind10 running with configuration nsec3/nsec3_auth.config
  274. A dnssec query for c.example. type DS should have rcode NOERROR
  275. The last query response should have flags qr aa rd
  276. The last query response should have edns_flags do
  277. The last query response should have ancount 0
  278. The last query response should have nscount 6
  279. The last query response should have adcount 1
  280. The authority section of the last query response should be
  281. """
  282. example. 3600 IN SOA ns1.example. bugs.x.w.example. 1 3600 300 3600000 3600
  283. example. 3600 IN RRSIG SOA 7 1 3600 20150420235959 20051021000000 40430 example. Hu25UIyNPmvPIVBrldN+9Mlp9Zql39qaUd8iq4ZLlYWfUUbbAS41pG+6 8z81q1xhkYAcEyHdVI2LmKusbZsT0Q==
  284. 0p9mhaveqvm6t7vbl5lop2u3t2rp3tom.example. 3600 IN NSEC3 1 1 12 AABBCCDD 2T7B4G4VSA5SMI47K61MV5BV1A22BOJR NS SOA MX RRSIG DNSKEY NSEC3PARAM
  285. 0p9mhaveqvm6t7vbl5lop2u3t2rp3tom.example. 3600 IN RRSIG NSEC3 7 2 3600 20150420235959 20051021000000 40430 example. OSgWSm26B+cS+dDL8b5QrWr/dEWhtCsKlwKLIBHYH6blRxK9rC0bMJPw Q4mLIuw85H2EY762BOCXJZMnpuwhpA==
  286. 35mthgpgcu1qg68fab165klnsnk3dpvl.example. 3600 IN NSEC3 1 1 12 AABBCCDD B4UM86EGHHDS6NEA196SMVMLO4ORS995 NS DS RRSIG
  287. 35mthgpgcu1qg68fab165klnsnk3dpvl.example. 3600 IN RRSIG NSEC3 7 2 3600 20150420235959 20051021000000 40430 example. g6jPUUpduAJKRljUsN8gB4UagAX0NxY9shwQAynzo8EUWH+z6hEIBlUT PGj15eZll6VhQqgZXtAIR3chwgW+SA==
  288. """