nsec3_auth.feature 29 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452
  1. Feature: NSEC3 Authoritative service
  2. This feature tests NSEC3 as defined in RFC5155, using the example
  3. zone from appendix A and testing the example responses from appendix B.
  4. Additional tests can be added as well.
  5. # Response section data is taken directly from RFC5155
  6. # It has been modified slightly; it has been 'flattened' (i.e. converted
  7. # to 1-line RRs with TTL and class data), and whitespace has been added
  8. # in the places where dig adds them too.
  9. # Any other changes from the specific example data are added as inline
  10. # comments.
  11. Scenario: B.1. Name Error
  12. Given I have bind10 running with configuration nsec3/nsec3_auth.config
  13. And wait for bind10 stderr message BIND10_STARTED_CC
  14. And wait for bind10 stderr message CMDCTL_STARTED
  15. And wait for bind10 stderr message AUTH_SERVER_STARTED
  16. bind10 module Auth should be running
  17. And bind10 module Resolver should not be running
  18. And bind10 module Xfrout should not be running
  19. And bind10 module Zonemgr should not be running
  20. And bind10 module Xfrin should not be running
  21. And bind10 module Stats should not be running
  22. A dnssec query for a.c.x.w.example. should have rcode NXDOMAIN
  23. The last query response should have flags qr aa rd
  24. The last query response should have edns_flags do
  25. The last query response should have ancount 0
  26. The last query response should have nscount 8
  27. The last query response should have adcount 1
  28. The authority section of the last query response should be
  29. """
  30. example. 3600 IN SOA ns1.example. bugs.x.w.example. 1 3600 300 3600000 3600
  31. example. 3600 IN RRSIG SOA 7 1 3600 20150420235959 20051021000000 40430 example. Hu25UIyNPmvPIVBrldN+9Mlp9Zql39qaUd8iq4ZLlYWfUUbbAS41pG+6 8z81q1xhkYAcEyHdVI2LmKusbZsT0Q==
  32. 0p9mhaveqvm6t7vbl5lop2u3t2rp3tom.example. 3600 IN NSEC3 1 1 12 aabbccdd 2t7b4g4vsa5smi47k61mv5bv1a22bojr NS SOA MX RRSIG DNSKEY NSEC3PARAM
  33. 0p9mhaveqvm6t7vbl5lop2u3t2rp3tom.example. 3600 IN RRSIG NSEC3 7 2 3600 20150420235959 20051021000000 40430 example. OSgWSm26B+cS+dDL8b5QrWr/dEWhtCsKlwKLIBHYH6blRxK9rC0bMJPw Q4mLIuw85H2EY762BOCXJZMnpuwhpA==
  34. b4um86eghhds6nea196smvmlo4ors995.example. 3600 IN NSEC3 1 1 12 aabbccdd gjeqe526plbf1g8mklp59enfd789njgi MX RRSIG
  35. b4um86eghhds6nea196smvmlo4ors995.example. 3600 IN RRSIG NSEC3 7 2 3600 20150420235959 20051021000000 40430 example. ZkPG3M32lmoHM6pa3D6gZFGB/rhL//Bs3Omh5u4m/CUiwtblEVOaAKKZ d7S959OeiX43aLX3pOv0TSTyiTxIZg==
  36. 35mthgpgcu1qg68fab165klnsnk3dpvl.example. 3600 IN NSEC3 1 1 12 aabbccdd b4um86eghhds6nea196smvmlo4ors995 NS DS RRSIG
  37. 35mthgpgcu1qg68fab165klnsnk3dpvl.example. 3600 IN RRSIG NSEC3 7 2 3600 20150420235959 20051021000000 40430 example. g6jPUUpduAJKRljUsN8gB4UagAX0NxY9shwQAynzo8EUWH+z6hEIBlUT PGj15eZll6VhQqgZXtAIR3chwgW+SA==
  38. """
  39. Scenario: B.2. No Data Error
  40. Given I have bind10 running with configuration nsec3/nsec3_auth.config
  41. And wait for bind10 stderr message BIND10_STARTED_CC
  42. And wait for bind10 stderr message CMDCTL_STARTED
  43. And wait for bind10 stderr message AUTH_SERVER_STARTED
  44. bind10 module Auth should be running
  45. And bind10 module Resolver should not be running
  46. And bind10 module Xfrout should not be running
  47. And bind10 module Zonemgr should not be running
  48. And bind10 module Xfrin should not be running
  49. And bind10 module Stats should not be running
  50. A dnssec query for ns1.example. type MX should have rcode NOERROR
  51. The last query response should have flags qr aa rd
  52. The last query response should have edns_flags do
  53. The last query response should have ancount 0
  54. The last query response should have nscount 4
  55. The last query response should have adcount 1
  56. The authority section of the last query response should be
  57. """
  58. example. 3600 IN SOA ns1.example. bugs.x.w.example. 1 3600 300 3600000 3600
  59. example. 3600 IN RRSIG SOA 7 1 3600 20150420235959 20051021000000 40430 example. Hu25UIyNPmvPIVBrldN+9Mlp9Zql39qaUd8iq4ZLlYWfUUbbAS41pG+6 8z81q1xhkYAcEyHdVI2LmKusbZsT0Q==
  60. 2t7b4g4vsa5smi47k61mv5bv1a22bojr.example. 3600 IN NSEC3 1 1 12 aabbccdd 2vptu5timamqttgl4luu9kg21e0aor3s A RRSIG
  61. 2t7b4g4vsa5smi47k61mv5bv1a22bojr.example. 3600 IN RRSIG NSEC3 7 2 3600 20150420235959 20051021000000 40430 example. OmBvJ1Vgg1hCKMXHFiNeIYHK9XVW0iLDLwJN4TFoNxZuP03gAXEI634Y wOc4YBNITrj413iqNI6mRk/r1dOSUw==
  62. """
  63. Scenario: B2.1. No Data Error, Empty Non-Terminal
  64. Given I have bind10 running with configuration nsec3/nsec3_auth.config
  65. And wait for bind10 stderr message BIND10_STARTED_CC
  66. And wait for bind10 stderr message CMDCTL_STARTED
  67. And wait for bind10 stderr message AUTH_SERVER_STARTED
  68. bind10 module Auth should be running
  69. And bind10 module Resolver should not be running
  70. And bind10 module Xfrout should not be running
  71. And bind10 module Zonemgr should not be running
  72. And bind10 module Xfrin should not be running
  73. And bind10 module Stats should not be running
  74. A dnssec query for y.w.example. should have rcode NOERROR
  75. The last query response should have flags qr aa rd
  76. The last query response should have edns_flags do
  77. The last query response should have ancount 0
  78. The last query response should have nscount 4
  79. The last query response should have adcount 1
  80. The authority section of the last query response should be
  81. """
  82. example. 3600 IN SOA ns1.example. bugs.x.w.example. 1 3600 300 3600000 3600
  83. example. 3600 IN RRSIG SOA 7 1 3600 20150420235959 20051021000000 40430 example. Hu25UIyNPmvPIVBrldN+9Mlp9Zql39qaUd8iq4ZLlYWfUUbbAS41pG+6 8z81q1xhkYAcEyHdVI2LmKusbZsT0Q==
  84. ji6neoaepv8b5o6k4ev33abha8ht9fgc.example. 3600 IN NSEC3 1 1 12 aabbccdd k8udemvp1j2f7eg6jebps17vp3n8i58h
  85. ji6neoaepv8b5o6k4ev33abha8ht9fgc.example. 3600 IN RRSIG NSEC3 7 2 3600 20150420235959 20051021000000 40430 example. gPkFp1s2QDQ6wQzcg1uSebZ61W33rUBDcTj72F3kQ490fEdp7k1BUIfb cZtPbX3YCpE+sIt0MpzVSKfTwx4uYA==
  86. """
  87. Scenario: B.3. Referral to an Opt-Out Unsigned Zone
  88. Given I have bind10 running with configuration nsec3/nsec3_auth.config
  89. And wait for bind10 stderr message BIND10_STARTED_CC
  90. And wait for bind10 stderr message CMDCTL_STARTED
  91. And wait for bind10 stderr message AUTH_SERVER_STARTED
  92. bind10 module Auth should be running
  93. And bind10 module Resolver should not be running
  94. And bind10 module Xfrout should not be running
  95. And bind10 module Zonemgr should not be running
  96. And bind10 module Xfrin should not be running
  97. And bind10 module Stats should not be running
  98. A dnssec query for mc.c.example. type MX should have rcode NOERROR
  99. The last query response should have flags qr rd
  100. The last query response should have edns_flags do
  101. The last query response should have ancount 0
  102. The last query response should have nscount 6
  103. The last query response should have adcount 3
  104. The authority section of the last query response should be
  105. """
  106. c.example. 3600 IN NS ns1.c.example.
  107. c.example. 3600 IN NS ns2.c.example.
  108. 35mthgpgcu1qg68fab165klnsnk3dpvl.example. 3600 IN NSEC3 1 1 12 aabbccdd b4um86eghhds6nea196smvmlo4ors995 NS DS RRSIG
  109. 35mthgpgcu1qg68fab165klnsnk3dpvl.example. 3600 IN RRSIG NSEC3 7 2 3600 20150420235959 20051021000000 40430 example. g6jPUUpduAJKRljUsN8gB4UagAX0NxY9shwQAynzo8EUWH+z6hEIBlUT PGj15eZll6VhQqgZXtAIR3chwgW+SA==
  110. 0p9mhaveqvm6t7vbl5lop2u3t2rp3tom.example. 3600 IN NSEC3 1 1 12 aabbccdd 2t7b4g4vsa5smi47k61mv5bv1a22bojr NS SOA MX RRSIG DNSKEY NSEC3PARAM
  111. 0p9mhaveqvm6t7vbl5lop2u3t2rp3tom.example. 3600 IN RRSIG NSEC3 7 2 3600 20150420235959 20051021000000 40430 example. OSgWSm26B+cS+dDL8b5QrWr/dEWhtCsKlwKLIBHYH6blRxK9rC0bMJPw Q4mLIuw85H2EY762BOCXJZMnpuwhpA==
  112. """
  113. The additional section of the last query response should be
  114. """
  115. ns1.c.example. 3600 IN A 192.0.2.7
  116. ns2.c.example. 3600 IN A 192.0.2.8
  117. """
  118. Scenario: B.4. Wildcard Expansion
  119. Given I have bind10 running with configuration nsec3/nsec3_auth.config
  120. And wait for bind10 stderr message BIND10_STARTED_CC
  121. And wait for bind10 stderr message CMDCTL_STARTED
  122. And wait for bind10 stderr message AUTH_SERVER_STARTED
  123. bind10 module Auth should be running
  124. And bind10 module Resolver should not be running
  125. And bind10 module Xfrout should not be running
  126. And bind10 module Zonemgr should not be running
  127. And bind10 module Xfrin should not be running
  128. And bind10 module Stats should not be running
  129. A dnssec query for a.z.w.example. type MX should have rcode NOERROR
  130. The last query response should have flags qr aa rd
  131. The last query response should have edns_flags do
  132. The last query response should have ancount 2
  133. The last query response should have nscount 5
  134. The last query response should have adcount 9
  135. The answer section of the last query response should be
  136. """
  137. a.z.w.example. 3600 IN MX 1 ai.example.
  138. a.z.w.example. 3600 IN RRSIG MX 7 2 3600 20150420235959 20051021000000 40430 example. CikebjQwGQPwijVcxgcZcSJKtfynugtlBiKb9FcBTrmOoyQ4InoWVudh CWsh/URX3lc4WRUMivEBP6+4KS3ldA==
  139. """
  140. The authority section of the last query response should be
  141. """
  142. example. 3600 IN NS ns1.example.
  143. example. 3600 IN NS ns2.example.
  144. example. 3600 IN RRSIG NS 7 1 3600 20150420235959 20051021000000 40430 example. PVOgtMK1HHeSTau+HwDWC8Ts+6C8qtqd4pQJqOtdEVgg+MA+ai4fWDEh u3qHJyLcQ9tbD2vvCnMXjtz6SyObxA==
  145. q04jkcevqvmu85r014c7dkba38o0ji5r.example. 3600 IN NSEC3 1 1 12 aabbccdd r53bq7cc2uvmubfu5ocmm6pers9tk9en A RRSIG
  146. q04jkcevqvmu85r014c7dkba38o0ji5r.example. 3600 IN RRSIG NSEC3 7 2 3600 20150420235959 20051021000000 40430 example. hV5I89b+4FHJDATp09g4bbN0R1F845CaXpL3ZxlMKimoPAyqletMlEWw LfFia7sdpSzn+ZlNNlkxWcLsIlMmUg==
  147. """
  148. # This is slightly different from the example in RFC5155; there are
  149. # more RRs in the additional section.
  150. The additional section of the last query response should be
  151. """
  152. ai.example. 3600 IN A 192.0.2.9
  153. ai.example. 3600 IN AAAA 2001:db8::f00:baa9
  154. ns1.example. 3600 IN A 192.0.2.1
  155. ns2.example. 3600 IN A 192.0.2.2
  156. ai.example. 3600 IN RRSIG A 7 2 3600 20150420235959 20051021000000 40430 example. hVe+wKYMlObTRPhX0NL67GxeZfdxqr/QeR6FtfdAj5+FgYxyzPEjIzvK Wy00hWIl6wD3Vws+rznEn8sQ64UdqA==
  157. ai.example. 3600 IN RRSIG AAAA 7 2 3600 20150420235959 20051021000000 40430 example. LcdxKaCB5bGZwPDg+3JJ4O02zoMBrjxqlf6WuaHQZZfTUpb9Nf2nxFGe 2XRPfR5tpJT6GdRGcHueLuXkMjBArQ==
  158. ns1.example. 3600 IN RRSIG A 7 2 3600 20150420235959 20051021000000 40430 example. bu6kx73n6XEunoVGuRfAgY7EF/AJqHy7hj0jkiqJjB0dOrx3wuz9SaBe GfqWIdn/uta3SavN4FRvZR9SCFHF5Q==
  159. ns2.example. 3600 IN RRSIG A 7 2 3600 20150420235959 20051021000000 40430 example. ktQ3TqE0CfRfki0Rb/Ip5BM0VnxelbuejCC4zpLbFKA/7eD7UNAwxMgx JPtbdST+syjYSJaj4IHfeX6n8vfoGA==
  160. """
  161. Scenario: B.5. Wildcard No Data Error
  162. Given I have bind10 running with configuration nsec3/nsec3_auth.config
  163. And wait for bind10 stderr message BIND10_STARTED_CC
  164. And wait for bind10 stderr message CMDCTL_STARTED
  165. And wait for bind10 stderr message AUTH_SERVER_STARTED
  166. bind10 module Auth should be running
  167. And bind10 module Resolver should not be running
  168. And bind10 module Xfrout should not be running
  169. And bind10 module Zonemgr should not be running
  170. And bind10 module Xfrin should not be running
  171. And bind10 module Stats should not be running
  172. A dnssec query for a.z.w.example. type AAAA should have rcode NOERROR
  173. The last query response should have flags qr aa rd
  174. The last query response should have edns_flags do
  175. The last query response should have ancount 0
  176. The last query response should have nscount 8
  177. The last query response should have adcount 1
  178. The authority section of the last query response should be
  179. """
  180. example. 3600 IN SOA ns1.example. bugs.x.w.example. 1 3600 300 3600000 3600
  181. example. 3600 IN RRSIG SOA 7 1 3600 20150420235959 20051021000000 40430 example. Hu25UIyNPmvPIVBrldN+9Mlp9Zql39qaUd8iq4ZLlYWfUUbbAS41pG+6 8z81q1xhkYAcEyHdVI2LmKusbZsT0Q==
  182. k8udemvp1j2f7eg6jebps17vp3n8i58h.example. 3600 IN NSEC3 1 1 12 aabbccdd kohar7mbb8dc2ce8a9qvl8hon4k53uhi
  183. k8udemvp1j2f7eg6jebps17vp3n8i58h.example. 3600 IN RRSIG NSEC3 7 2 3600 20150420235959 20051021000000 40430 example. FtXGbvF0+wf8iWkyo73enAuVx03klN+pILBKS6qCcftVtfH4yVzsEZqu J27NHR7ruxJWDNMtOtx7w9WfcIg62A==
  184. q04jkcevqvmu85r014c7dkba38o0ji5r.example. 3600 IN NSEC3 1 1 12 aabbccdd r53bq7cc2uvmubfu5ocmm6pers9tk9en A RRSIG
  185. q04jkcevqvmu85r014c7dkba38o0ji5r.example. 3600 IN RRSIG NSEC3 7 2 3600 20150420235959 20051021000000 40430 example. hV5I89b+4FHJDATp09g4bbN0R1F845CaXpL3ZxlMKimoPAyqletMlEWw LfFia7sdpSzn+ZlNNlkxWcLsIlMmUg==
  186. r53bq7cc2uvmubfu5ocmm6pers9tk9en.example. 3600 IN NSEC3 1 1 12 aabbccdd t644ebqk9bibcna874givr6joj62mlhv MX RRSIG
  187. r53bq7cc2uvmubfu5ocmm6pers9tk9en.example. 3600 IN RRSIG NSEC3 7 2 3600 20150420235959 20051021000000 40430 example. aupviViruXs4bDg9rCbezzBMf9h1ZlDvbW/CZFKulIGXXLj8B/fsDJar XVDA9bnUoRhEbKp+HF1FWKW7RIJdtQ==
  188. """
  189. Scenario: B.6. DS Child Zone No Data Error
  190. Given I have bind10 running with configuration nsec3/nsec3_auth.config
  191. And wait for bind10 stderr message BIND10_STARTED_CC
  192. And wait for bind10 stderr message CMDCTL_STARTED
  193. And wait for bind10 stderr message AUTH_SERVER_STARTED
  194. bind10 module Auth should be running
  195. And bind10 module Resolver should not be running
  196. And bind10 module Xfrout should not be running
  197. And bind10 module Zonemgr should not be running
  198. And bind10 module Xfrin should not be running
  199. And bind10 module Stats should not be running
  200. A dnssec query for example. type DS should have rcode NOERROR
  201. The last query response should have flags qr aa rd
  202. The last query response should have edns_flags do
  203. The last query response should have ancount 0
  204. The last query response should have nscount 4
  205. The last query response should have adcount 1
  206. The authority section of the last query response should be
  207. """
  208. example. 3600 IN SOA ns1.example. bugs.x.w.example. 1 3600 300 3600000 3600
  209. example. 3600 IN RRSIG SOA 7 1 3600 20150420235959 20051021000000 40430 example. Hu25UIyNPmvPIVBrldN+9Mlp9Zql39qaUd8iq4ZLlYWfUUbbAS41pG+6 8z81q1xhkYAcEyHdVI2LmKusbZsT0Q==
  210. 0p9mhaveqvm6t7vbl5lop2u3t2rp3tom.example. 3600 IN NSEC3 1 1 12 aabbccdd 2t7b4g4vsa5smi47k61mv5bv1a22bojr NS SOA MX RRSIG DNSKEY NSEC3PARAM
  211. 0p9mhaveqvm6t7vbl5lop2u3t2rp3tom.example. 3600 IN RRSIG NSEC3 7 2 3600 20150420235959 20051021000000 40430 example. OSgWSm26B+cS+dDL8b5QrWr/dEWhtCsKlwKLIBHYH6blRxK9rC0bMJPw Q4mLIuw85H2EY762BOCXJZMnpuwhpA==
  212. """
  213. #
  214. # Below are additional tests, not explicitely stated in RFC5155
  215. #
  216. Scenario: 7.2.2 other; Name Error where one NSEC3 covers multiple parts of proof (closest encloser)
  217. Given I have bind10 running with configuration nsec3/nsec3_auth.config
  218. And wait for bind10 stderr message BIND10_STARTED_CC
  219. And wait for bind10 stderr message CMDCTL_STARTED
  220. And wait for bind10 stderr message AUTH_SERVER_STARTED
  221. bind10 module Auth should be running
  222. And bind10 module Resolver should not be running
  223. And bind10 module Xfrout should not be running
  224. And bind10 module Zonemgr should not be running
  225. And bind10 module Xfrin should not be running
  226. And bind10 module Stats should not be running
  227. A dnssec query for b.x.w.example. should have rcode NXDOMAIN
  228. The last query response should have flags qr aa rd
  229. The last query response should have edns_flags do
  230. The last query response should have ancount 0
  231. The last query response should have nscount 6
  232. The last query response should have adcount 1
  233. The authority section of the last query response should be
  234. """
  235. example. 3600 IN SOA ns1.example. bugs.x.w.example. 1 3600 300 3600000 3600
  236. example. 3600 IN RRSIG SOA 7 1 3600 20150420235959 20051021000000 40430 example. Hu25UIyNPmvPIVBrldN+9Mlp9Zql39qaUd8iq4ZLlYWfUUbbAS41pG+6 8z81q1xhkYAcEyHdVI2LmKusbZsT0Q==
  237. b4um86eghhds6nea196smvmlo4ors995.example. 3600 IN NSEC3 1 1 12 aabbccdd gjeqe526plbf1g8mklp59enfd789njgi MX RRSIG
  238. b4um86eghhds6nea196smvmlo4ors995.example. 3600 IN RRSIG NSEC3 7 2 3600 20150420235959 20051021000000 40430 example. ZkPG3M32lmoHM6pa3D6gZFGB/rhL//Bs3Omh5u4m/CUiwtblEVOaAKKZ d7S959OeiX43aLX3pOv0TSTyiTxIZg==
  239. 35mthgpgcu1qg68fab165klnsnk3dpvl.example. 3600 IN NSEC3 1 1 12 aabbccdd b4um86eghhds6nea196smvmlo4ors995 NS DS RRSIG
  240. 35mthgpgcu1qg68fab165klnsnk3dpvl.example. 3600 IN RRSIG NSEC3 7 2 3600 20150420235959 20051021000000 40430 example. g6jPUUpduAJKRljUsN8gB4UagAX0NxY9shwQAynzo8EUWH+z6hEIBlUT PGj15eZll6VhQqgZXtAIR3chwgW+SA==
  241. """
  242. Scenario: 7.2.2 other; Name Error where one NSEC3 covers multiple parts of proof (wildcard)
  243. Given I have bind10 running with configuration nsec3/nsec3_auth.config
  244. And wait for bind10 stderr message BIND10_STARTED_CC
  245. And wait for bind10 stderr message CMDCTL_STARTED
  246. And wait for bind10 stderr message AUTH_SERVER_STARTED
  247. bind10 module Auth should be running
  248. And bind10 module Resolver should not be running
  249. And bind10 module Xfrout should not be running
  250. And bind10 module Zonemgr should not be running
  251. And bind10 module Xfrin should not be running
  252. And bind10 module Stats should not be running
  253. A dnssec query for a.w.example. should have rcode NOERROR
  254. The last query response should have flags qr aa rd
  255. The last query response should have edns_flags do
  256. The last query response should have ancount 0
  257. The last query response should have nscount 6
  258. The last query response should have adcount 1
  259. The authority section of the last query response should be
  260. """
  261. example. 3600 IN SOA ns1.example. bugs.x.w.example. 1 3600 300 3600000 3600
  262. example. 3600 IN RRSIG SOA 7 1 3600 20150420235959 20051021000000 40430 example. Hu25UIyNPmvPIVBrldN+9Mlp9Zql39qaUd8iq4ZLlYWfUUbbAS41pG+6 8z81q1xhkYAcEyHdVI2LmKusbZsT0Q==
  263. k8udemvp1j2f7eg6jebps17vp3n8i58h.example. 3600 IN NSEC3 1 1 12 AABBCCDD KOHAR7MBB8DC2CE8A9QVL8HON4K53UHI
  264. k8udemvp1j2f7eg6jebps17vp3n8i58h.example. 3600 IN RRSIG NSEC3 7 2 3600 20150420235959 20051021000000 40430 example. FtXGbvF0+wf8iWkyo73enAuVx03klN+pILBKS6qCcftVtfH4yVzsEZqu J27NHR7ruxJWDNMtOtx7w9WfcIg62A==
  265. r53bq7cc2uvmubfu5ocmm6pers9tk9en.example. 3600 IN NSEC3 1 1 12 AABBCCDD T644EBQK9BIBCNA874GIVR6JOJ62MLHV MX RRSIG
  266. r53bq7cc2uvmubfu5ocmm6pers9tk9en.example. 3600 IN RRSIG NSEC3 7 2 3600 20150420235959 20051021000000 40430 example. aupviViruXs4bDg9rCbezzBMf9h1ZlDvbW/CZFKulIGXXLj8B/fsDJar XVDA9bnUoRhEbKp+HF1FWKW7RIJdtQ==
  267. """
  268. Scenario: Wildcard other: Wildcard name itself
  269. Given I have bind10 running with configuration nsec3/nsec3_auth.config
  270. And wait for bind10 stderr message BIND10_STARTED_CC
  271. And wait for bind10 stderr message CMDCTL_STARTED
  272. And wait for bind10 stderr message AUTH_SERVER_STARTED
  273. bind10 module Auth should be running
  274. And bind10 module Resolver should not be running
  275. And bind10 module Xfrout should not be running
  276. And bind10 module Zonemgr should not be running
  277. And bind10 module Xfrin should not be running
  278. And bind10 module Stats should not be running
  279. A dnssec query for *.w.example. type MX should have rcode NOERROR
  280. The last query response should have flags qr aa rd
  281. The last query response should have edns_flags do
  282. The last query response should have ancount 2
  283. The last query response should have nscount 3
  284. The last query response should have adcount 9
  285. The answer section of the last query response should be
  286. """
  287. *.w.example. 3600 IN MX 1 ai.example.
  288. *.w.example. 3600 IN RRSIG MX 7 2 3600 20150420235959 20051021000000 40430 example. CikebjQwGQPwijVcxgcZcSJKtfynugtlBiKb9FcBTrmOoyQ4InoWVudh CWsh/URX3lc4WRUMivEBP6+4KS3ldA==
  289. """
  290. The authority section of the last query response should be
  291. """
  292. example. 3600 IN NS ns1.example.
  293. example. 3600 IN NS ns2.example.
  294. example. 3600 IN RRSIG NS 7 1 3600 20150420235959 20051021000000 40430 example. PVOgtMK1HHeSTau+HwDWC8Ts+6C8qtqd4pQJqOtdEVgg+MA+ai4fWDEh u3qHJyLcQ9tbD2vvCnMXjtz6SyObxA==
  295. """
  296. The additional section of the last query response should be
  297. """
  298. ai.example. 3600 IN A 192.0.2.9
  299. ai.example. 3600 IN AAAA 2001:db8::f00:baa9
  300. ns1.example. 3600 IN A 192.0.2.1
  301. ns2.example. 3600 IN A 192.0.2.2
  302. ai.example. 3600 IN RRSIG A 7 2 3600 20150420235959 20051021000000 40430 example. hVe+wKYMlObTRPhX0NL67GxeZfdxqr/QeR6FtfdAj5+FgYxyzPEjIzvK Wy00hWIl6wD3Vws+rznEn8sQ64UdqA==
  303. ai.example. 3600 IN RRSIG AAAA 7 2 3600 20150420235959 20051021000000 40430 example. LcdxKaCB5bGZwPDg+3JJ4O02zoMBrjxqlf6WuaHQZZfTUpb9Nf2nxFGe 2XRPfR5tpJT6GdRGcHueLuXkMjBArQ==
  304. ns1.example. 3600 IN RRSIG A 7 2 3600 20150420235959 20051021000000 40430 example. bu6kx73n6XEunoVGuRfAgY7EF/AJqHy7hj0jkiqJjB0dOrx3wuz9SaBe GfqWIdn/uta3SavN4FRvZR9SCFHF5Q==
  305. ns2.example. 3600 IN RRSIG A 7 2 3600 20150420235959 20051021000000 40430 example. ktQ3TqE0CfRfki0Rb/Ip5BM0VnxelbuejCC4zpLbFKA/7eD7UNAwxMgx JPtbdST+syjYSJaj4IHfeX6n8vfoGA==
  306. """
  307. Scenario: Wildcard other: Wildcard name itself nodata
  308. Given I have bind10 running with configuration nsec3/nsec3_auth.config
  309. And wait for bind10 stderr message BIND10_STARTED_CC
  310. And wait for bind10 stderr message CMDCTL_STARTED
  311. And wait for bind10 stderr message AUTH_SERVER_STARTED
  312. bind10 module Auth should be running
  313. And bind10 module Resolver should not be running
  314. And bind10 module Xfrout should not be running
  315. And bind10 module Zonemgr should not be running
  316. And bind10 module Xfrin should not be running
  317. And bind10 module Stats should not be running
  318. A dnssec query for *.w.example. type A should have rcode NOERROR
  319. The last query response should have flags qr aa rd
  320. The last query response should have edns_flags do
  321. The last query response should have ancount 0
  322. The last query response should have nscount 4
  323. The last query response should have adcount 1
  324. The authority section of the last query response should be
  325. """
  326. example. 3600 IN SOA ns1.example. bugs.x.w.example. 1 3600 300 3600000 3600
  327. example. 3600 IN RRSIG SOA 7 1 3600 20150420235959 20051021000000 40430 example. Hu25UIyNPmvPIVBrldN+9Mlp9Zql39qaUd8iq4ZLlYWfUUbbAS41pG+6 8z81q1xhkYAcEyHdVI2LmKusbZsT0Q==
  328. r53bq7cc2uvmubfu5ocmm6pers9tk9en.example. 3600 IN NSEC3 1 1 12 AABBCCDD T644EBQK9BIBCNA874GIVR6JOJ62MLHV MX RRSIG
  329. r53bq7cc2uvmubfu5ocmm6pers9tk9en.example. 3600 IN RRSIG NSEC3 7 2 3600 20150420235959 20051021000000 40430 example. aupviViruXs4bDg9rCbezzBMf9h1ZlDvbW/CZFKulIGXXLj8B/fsDJar XVDA9bnUoRhEbKp+HF1FWKW7RIJdtQ==
  330. """
  331. Scenario: Direct query for NSEC3 record
  332. Given I have bind10 running with configuration nsec3/nsec3_auth.config
  333. And wait for bind10 stderr message BIND10_STARTED_CC
  334. And wait for bind10 stderr message CMDCTL_STARTED
  335. And wait for bind10 stderr message AUTH_SERVER_STARTED
  336. bind10 module Auth should be running
  337. And bind10 module Resolver should not be running
  338. And bind10 module Xfrout should not be running
  339. And bind10 module Zonemgr should not be running
  340. And bind10 module Xfrin should not be running
  341. And bind10 module Stats should not be running
  342. A dnssec query for 0p9mhaveqvm6t7vbl5lop2u3t2rp3tom.example. type NSEC3 should have rcode NXDOMAIN
  343. The last query response should have flags qr aa rd
  344. The last query response should have edns_flags do
  345. The last query response should have ancount 0
  346. The last query response should have nscount 8
  347. The last query response should have adcount 1
  348. The authority section of the last query response should be
  349. """
  350. example. 3600 IN SOA ns1.example. bugs.x.w.example. 1 3600 300 3600000 3600
  351. example. 3600 IN RRSIG SOA 7 1 3600 20150420235959 20051021000000 40430 example. Hu25UIyNPmvPIVBrldN+9Mlp9Zql39qaUd8iq4ZLlYWfUUbbAS41pG+6 8z81q1xhkYAcEyHdVI2LmKusbZsT0Q==
  352. 0p9mhaveqvm6t7vbl5lop2u3t2rp3tom.example. 3600 IN NSEC3 1 1 12 AABBCCDD 2T7B4G4VSA5SMI47K61MV5BV1A22BOJR NS SOA MX RRSIG DNSKEY NSEC3PARAM
  353. 0p9mhaveqvm6t7vbl5lop2u3t2rp3tom.example. 3600 IN RRSIG NSEC3 7 2 3600 20150420235959 20051021000000 40430 example. OSgWSm26B+cS+dDL8b5QrWr/dEWhtCsKlwKLIBHYH6blRxK9rC0bMJPw Q4mLIuw85H2EY762BOCXJZMnpuwhpA==
  354. q04jkcevqvmu85r014c7dkba38o0ji5r.example. 3600 IN NSEC3 1 1 12 AABBCCDD R53BQ7CC2UVMUBFU5OCMM6PERS9TK9EN A RRSIG
  355. q04jkcevqvmu85r014c7dkba38o0ji5r.example. 3600 IN RRSIG NSEC3 7 2 3600 20150420235959 20051021000000 40430 example. hV5I89b+4FHJDATp09g4bbN0R1F845CaXpL3ZxlMKimoPAyqletMlEWw LfFia7sdpSzn+ZlNNlkxWcLsIlMmUg==
  356. gjeqe526plbf1g8mklp59enfd789njgi.example. 3600 IN NSEC3 1 1 12 AABBCCDD JI6NEOAEPV8B5O6K4EV33ABHA8HT9FGC A HINFO AAAA RRSIG
  357. gjeqe526plbf1g8mklp59enfd789njgi.example. 3600 IN RRSIG NSEC3 7 2 3600 20150420235959 20051021000000 40430 example. IVnezTJ9iqblFF97vPSmfXZ5Zozngx3KX3byLTZC4QBH2dFWhf6scrGF ZB980AfCxoD9qbbKDy+rdGIeRSVNyw==
  358. """
  359. Scenario: No data, type DS, in-zone
  360. Given I have bind10 running with configuration nsec3/nsec3_auth.config
  361. And wait for bind10 stderr message BIND10_STARTED_CC
  362. And wait for bind10 stderr message CMDCTL_STARTED
  363. And wait for bind10 stderr message AUTH_SERVER_STARTED
  364. bind10 module Auth should be running
  365. And bind10 module Resolver should not be running
  366. And bind10 module Xfrout should not be running
  367. And bind10 module Zonemgr should not be running
  368. And bind10 module Xfrin should not be running
  369. And bind10 module Stats should not be running
  370. A dnssec query for ai.example. type DS should have rcode NOERROR
  371. The last query response should have flags qr aa rd
  372. The last query response should have edns_flags do
  373. The last query response should have ancount 0
  374. The last query response should have nscount 4
  375. The last query response should have adcount 1
  376. The authority section of the last query response should be
  377. """
  378. example. 3600 IN SOA ns1.example. bugs.x.w.example. 1 3600 300 3600000 3600
  379. example. 3600 IN RRSIG SOA 7 1 3600 20150420235959 20051021000000 40430 example. Hu25UIyNPmvPIVBrldN+9Mlp9Zql39qaUd8iq4ZLlYWfUUbbAS41pG+6 8z81q1xhkYAcEyHdVI2LmKusbZsT0Q==
  380. gjeqe526plbf1g8mklp59enfd789njgi.example. 3600 IN NSEC3 1 1 12 AABBCCDD JI6NEOAEPV8B5O6K4EV33ABHA8HT9FGC A HINFO AAAA RRSIG
  381. gjeqe526plbf1g8mklp59enfd789njgi.example. 3600 IN RRSIG NSEC3 7 2 3600 20150420235959 20051021000000 40430 example. IVnezTJ9iqblFF97vPSmfXZ5Zozngx3KX3byLTZC4QBH2dFWhf6scrGF ZB980AfCxoD9qbbKDy+rdGIeRSVNyw==
  382. """
  383. Scenario: No data, type DS, optout delegation
  384. Given I have bind10 running with configuration nsec3/nsec3_auth.config
  385. And wait for bind10 stderr message BIND10_STARTED_CC
  386. And wait for bind10 stderr message CMDCTL_STARTED
  387. And wait for bind10 stderr message AUTH_SERVER_STARTED
  388. bind10 module Auth should be running
  389. And bind10 module Resolver should not be running
  390. And bind10 module Xfrout should not be running
  391. And bind10 module Zonemgr should not be running
  392. And bind10 module Xfrin should not be running
  393. And bind10 module Stats should not be running
  394. A dnssec query for c.example. type DS should have rcode NOERROR
  395. The last query response should have flags qr aa rd
  396. The last query response should have edns_flags do
  397. The last query response should have ancount 0
  398. The last query response should have nscount 6
  399. The last query response should have adcount 1
  400. The authority section of the last query response should be
  401. """
  402. example. 3600 IN SOA ns1.example. bugs.x.w.example. 1 3600 300 3600000 3600
  403. example. 3600 IN RRSIG SOA 7 1 3600 20150420235959 20051021000000 40430 example. Hu25UIyNPmvPIVBrldN+9Mlp9Zql39qaUd8iq4ZLlYWfUUbbAS41pG+6 8z81q1xhkYAcEyHdVI2LmKusbZsT0Q==
  404. 0p9mhaveqvm6t7vbl5lop2u3t2rp3tom.example. 3600 IN NSEC3 1 1 12 AABBCCDD 2T7B4G4VSA5SMI47K61MV5BV1A22BOJR NS SOA MX RRSIG DNSKEY NSEC3PARAM
  405. 0p9mhaveqvm6t7vbl5lop2u3t2rp3tom.example. 3600 IN RRSIG NSEC3 7 2 3600 20150420235959 20051021000000 40430 example. OSgWSm26B+cS+dDL8b5QrWr/dEWhtCsKlwKLIBHYH6blRxK9rC0bMJPw Q4mLIuw85H2EY762BOCXJZMnpuwhpA==
  406. 35mthgpgcu1qg68fab165klnsnk3dpvl.example. 3600 IN NSEC3 1 1 12 AABBCCDD B4UM86EGHHDS6NEA196SMVMLO4ORS995 NS DS RRSIG
  407. 35mthgpgcu1qg68fab165klnsnk3dpvl.example. 3600 IN RRSIG NSEC3 7 2 3600 20150420235959 20051021000000 40430 example. g6jPUUpduAJKRljUsN8gB4UagAX0NxY9shwQAynzo8EUWH+z6hEIBlUT PGj15eZll6VhQqgZXtAIR3chwgW+SA==
  408. """