795 lines
25 KiB
Bash
795 lines
25 KiB
Bash
#!/bin/sh
|
|
|
|
# Copyright (C) Internet Systems Consortium, Inc. ("ISC")
|
|
#
|
|
# SPDX-License-Identifier: MPL-2.0
|
|
#
|
|
# This Source Code Form is subject to the terms of the Mozilla Public
|
|
# License, v. 2.0. If a copy of the MPL was not distributed with this
|
|
# file, you can obtain one at https://mozilla.org/MPL/2.0/.
|
|
#
|
|
# See the COPYRIGHT file distributed with this work for additional
|
|
# information regarding copyright ownership.
|
|
|
|
set -e
|
|
|
|
. ../conf.sh
|
|
|
|
status=0
|
|
n=0
|
|
|
|
mkdir -p keys
|
|
|
|
n=$((n + 1))
|
|
echo_i "checking that named-checkconf handles a known good config ($n)"
|
|
ret=0
|
|
$CHECKCONF good.conf >checkconf.out$n 2>&1 || ret=1
|
|
if [ $ret -ne 0 ]; then echo_i "failed"; fi
|
|
status=$((status + ret))
|
|
|
|
n=$((n + 1))
|
|
echo_i "checking that named-checkconf prints a known good config ($n)"
|
|
ret=0
|
|
awk 'BEGIN { ok = 0; } /cut here/ { ok = 1; getline } ok == 1 { print }' good.conf >good.conf.raw
|
|
[ -s good.conf.raw ] || ret=1
|
|
$CHECKCONF -p good.conf.raw >checkconf.out$n || ret=1
|
|
grep -v '^good.conf.raw:' <checkconf.out$n >good.conf.out 2>&1 || ret=1
|
|
cmp good.conf.raw good.conf.out || ret=1
|
|
if [ $ret -ne 0 ]; then echo_i "failed"; fi
|
|
status=$((status + ret))
|
|
|
|
n=$((n + 1))
|
|
echo_i "checking that named-checkconf -x removes secrets ($n)"
|
|
ret=0
|
|
# ensure there is a secret and that it is not the check string.
|
|
grep 'secret "' good.conf.raw >/dev/null || ret=1
|
|
grep 'secret "????????????????"' good.conf.raw >/dev/null 2>&1 && ret=1
|
|
$CHECKCONF -p -x good.conf.raw >checkconf.out$n || ret=1
|
|
grep -v '^good.conf.raw:' <checkconf.out$n >good.conf.out 2>&1 || ret=1
|
|
grep 'secret "????????????????"' good.conf.out >/dev/null 2>&1 || ret=1
|
|
if [ $ret -ne 0 ]; then echo_i "failed"; fi
|
|
status=$((status + ret))
|
|
|
|
for bad in bad-*.conf; do
|
|
n=$((n + 1))
|
|
echo_i "checking that named-checkconf detects error in $bad ($n)"
|
|
ret=0
|
|
{
|
|
$CHECKCONF $bad >checkconf.out$n 2>&1
|
|
rc=$?
|
|
} || true
|
|
if [ $rc -ne 1 ]; then ret=1; fi
|
|
grep "^$bad:[0-9]*: " <checkconf.out$n >/dev/null || ret=1
|
|
case $bad in
|
|
bad-update-policy[123].conf)
|
|
pat="identity and name fields are not the same"
|
|
grep "$pat" <checkconf.out$n >/dev/null || ret=1
|
|
;;
|
|
bad-update-policy[4589].conf | bad-update-policy1[01].conf)
|
|
pat="name field not set to placeholder value"
|
|
grep "$pat" <checkconf.out$n >/dev/null || ret=1
|
|
;;
|
|
bad-update-policy[67].conf | bad-update-policy1[2345789].conf | bad-update-policy20.conf)
|
|
pat="missing name field type '.*' found"
|
|
grep "$pat" <checkconf.out$n >/dev/null || ret=1
|
|
;;
|
|
esac
|
|
if [ $ret -ne 0 ]; then echo_i "failed"; fi
|
|
status=$((status + ret))
|
|
done
|
|
|
|
for good in good-*.conf; do
|
|
n=$((n + 1))
|
|
echo_i "checking that named-checkconf detects no error in $good ($n)"
|
|
ret=0
|
|
if ! $FEATURETEST --with-libnghttp2; then
|
|
case $good in
|
|
good-doh-*.conf) continue ;;
|
|
good-dot-*.conf) continue ;;
|
|
good-proxy-*doh*.conf) continue ;;
|
|
bad-proxy-*doh*.conf) continue ;;
|
|
esac
|
|
elif ! $FEATURETEST --have-openssl-cipher-suites; then
|
|
case $good in
|
|
good-tls-cipher-suites-*.conf) continue ;;
|
|
esac
|
|
fi
|
|
{
|
|
$CHECKCONF $good >checkconf.out$n 2>&1
|
|
rc=$?
|
|
} || true
|
|
if [ $rc -ne 0 ]; then
|
|
echo_i "failed"
|
|
ret=1
|
|
fi
|
|
status=$((status + ret))
|
|
done
|
|
|
|
for lmdb in lmdb-*.conf; do
|
|
n=$((n + 1))
|
|
ret=0
|
|
|
|
if $FEATURETEST --with-lmdb; then
|
|
echo_i "checking that named-checkconf detects no error in $lmdb ($n)"
|
|
{
|
|
$CHECKCONF $lmdb >checkconf.out$n 2>&1
|
|
rc=$?
|
|
} || true
|
|
if [ $rc -ne 0 ]; then
|
|
echo_i "failed"
|
|
ret=1
|
|
fi
|
|
else
|
|
echo_i "checking that named-checkconf detects error in $lmdb ($n)"
|
|
{
|
|
$CHECKCONF $lmdb >checkconf.out$n 2>&1
|
|
rc=$?
|
|
} || true
|
|
if [ $rc -eq 0 ]; then
|
|
echo_i "failed"
|
|
ret=1
|
|
fi
|
|
fi
|
|
status=$((status + ret))
|
|
done
|
|
|
|
n=$((n + 1))
|
|
echo_i "checking that ancient options report a fatal error ($n)"
|
|
ret=0
|
|
$CHECKCONF ancient.conf >ancient.out 2>&1 && ret=1
|
|
grep "no longer exists" ancient.out >/dev/null || ret=1
|
|
if [ $ret -ne 0 ]; then echo_i "failed"; fi
|
|
status=$((status + ret))
|
|
|
|
n=$((n + 1))
|
|
echo_i "checking that named-checkconf -z catches missing hint file ($n)"
|
|
ret=0
|
|
$CHECKCONF -z hint-nofile.conf >hint-nofile.out 2>&1 && ret=1
|
|
grep "could not configure root hints from 'nonexistent.db': file not found" hint-nofile.out >/dev/null || ret=1
|
|
if [ $ret -ne 0 ]; then echo_i "failed"; fi
|
|
status=$((status + ret))
|
|
|
|
n=$((n + 1))
|
|
echo_i "checking that named-checkconf catches range errors ($n)"
|
|
ret=0
|
|
$CHECKCONF range.conf >checkconf.out$n 2>&1 && ret=1
|
|
if [ $ret -ne 0 ]; then echo_i "failed"; fi
|
|
status=$((status + ret))
|
|
|
|
n=$((n + 1))
|
|
echo_i "checking that named-checkconf warns of notify inconsistencies ($n)"
|
|
ret=0
|
|
$CHECKCONF notify.conf >checkconf.out$n 2>&1
|
|
warnings=$(grep "'notify' is disabled" <checkconf.out$n | wc -l)
|
|
[ $warnings -eq 3 ] || ret=1
|
|
if [ $ret -ne 0 ]; then echo_i "failed"; fi
|
|
status=$((status + ret))
|
|
|
|
if grep "^#define DNS_RDATASET_FIXED" "$TOP_BUILDDIR/config.h" >/dev/null 2>&1; then
|
|
test_fixed=true
|
|
else
|
|
test_fixed=false
|
|
fi
|
|
|
|
n=$((n + 1))
|
|
echo_i "checking named-checkconf deprecate warnings ($n)"
|
|
ret=0
|
|
$CHECKCONF deprecated.conf >checkconf.out$n.1 2>&1
|
|
grep "option 'managed-keys' is deprecated" <checkconf.out$n.1 >/dev/null || ret=1
|
|
grep "option 'trusted-keys' is deprecated" <checkconf.out$n.1 >/dev/null || ret=1
|
|
grep "option 'max-zone-ttl' is deprecated" <checkconf.out$n.1 >/dev/null || ret=1
|
|
grep "option 'use-v4-udp-ports' is deprecated" <checkconf.out$n.1 >/dev/null || ret=1
|
|
grep "option 'use-v6-udp-ports' is deprecated" <checkconf.out$n.1 >/dev/null || ret=1
|
|
grep "option 'avoid-v4-udp-ports' is deprecated" <checkconf.out$n.1 >/dev/null || ret=1
|
|
grep "option 'avoid-v6-udp-ports' is deprecated" <checkconf.out$n.1 >/dev/null || ret=1
|
|
grep "option 'dialup' is deprecated" <checkconf.out$n.1 >/dev/null || ret=1
|
|
grep "option 'heartbeat-interval' is deprecated" <checkconf.out$n.1 >/dev/null || ret=1
|
|
grep "option 'dnssec-must-be-secure' is deprecated" <checkconf.out$n.1 >/dev/null || ret=1
|
|
grep "option 'sortlist' is deprecated" <checkconf.out$n.1 >/dev/null || ret=1
|
|
grep "token 'port' is deprecated" <checkconf.out$n.1 >/dev/null || ret=1
|
|
if $test_fixed; then
|
|
grep "rrset-order: order 'fixed' is deprecated" <checkconf.out$n.1 >/dev/null || ret=1
|
|
else
|
|
grep "rrset-order: order 'fixed' was disabled at compilation time" <checkconf.out$n.1 >/dev/null || ret=1
|
|
fi
|
|
if [ $ret -ne 0 ]; then echo_i "failed"; fi
|
|
status=$((status + ret))
|
|
# set -i to ignore deprecate warnings
|
|
$CHECKCONF -i deprecated.conf 2>&1 | grep_v "rrset-order: order 'fixed' was disabled at compilation time" >checkconf.out$n.2
|
|
grep '^.+$' <checkconf.out$n.2 >/dev/null && ret=1
|
|
if [ $ret -ne 0 ]; then echo_i "failed"; fi
|
|
status=$((status + ret))
|
|
|
|
n=$((n + 1))
|
|
echo_i "checking named-checkconf servestale warnings ($n)"
|
|
ret=0
|
|
$CHECKCONF servestale.stale-refresh-time.0.conf >checkconf.out$n.1 2>&1
|
|
grep "'stale-refresh-time' should either be 0 or otherwise 30 seconds or higher" <checkconf.out$n.1 >/dev/null && ret=1
|
|
if [ $ret -ne 0 ]; then echo_i "failed"; fi
|
|
status=$((status + ret))
|
|
ret=0
|
|
$CHECKCONF servestale.stale-refresh-time.29.conf >checkconf.out$n.1 2>&1
|
|
grep "'stale-refresh-time' should either be 0 or otherwise 30 seconds or higher" <checkconf.out$n.1 >/dev/null || ret=1
|
|
if [ $ret -ne 0 ]; then echo_i "failed"; fi
|
|
status=$((status + ret))
|
|
|
|
n=$((n + 1))
|
|
echo_i "range checking fields that do not allow zero ($n)"
|
|
ret=0
|
|
for field in max-retry-time min-retry-time max-refresh-time min-refresh-time; do
|
|
cat >badzero.conf <<EOF
|
|
options {
|
|
$field 0;
|
|
};
|
|
EOF
|
|
{
|
|
$CHECKCONF badzero.conf >checkconf.out$n.1 2>&1
|
|
rc=$?
|
|
} || true
|
|
[ $rc -eq 1 ] || {
|
|
echo_i "options $field failed"
|
|
ret=1
|
|
}
|
|
cat >badzero.conf <<EOF
|
|
view dummy {
|
|
$field 0;
|
|
};
|
|
EOF
|
|
{
|
|
$CHECKCONF badzero.conf >checkconf.out$n.2 2>&1
|
|
rc=$?
|
|
} || true
|
|
[ $rc -eq 1 ] || {
|
|
echo_i "view $field failed"
|
|
ret=1
|
|
}
|
|
cat >badzero.conf <<EOF
|
|
options {
|
|
$field 0;
|
|
};
|
|
view dummy {
|
|
};
|
|
EOF
|
|
{
|
|
$CHECKCONF badzero.conf >checkconf.out$n.3 2>&1
|
|
rc=$?
|
|
} || true
|
|
[ $rc -eq 1 ] || {
|
|
echo_i "options + view $field failed"
|
|
ret=1
|
|
}
|
|
cat >badzero.conf <<EOF
|
|
zone dummy {
|
|
type secondary;
|
|
primaries { 0.0.0.0; };
|
|
$field 0;
|
|
};
|
|
EOF
|
|
{
|
|
$CHECKCONF badzero.conf >checkconf.out$n.4 2>&1
|
|
rc=$?
|
|
} || true
|
|
[ $rc -eq 1 ] || {
|
|
echo_i "zone $field failed"
|
|
ret=1
|
|
}
|
|
done
|
|
if [ $ret -ne 0 ]; then echo_i "failed"; fi
|
|
status=$((status + ret))
|
|
|
|
n=$((n + 1))
|
|
echo_i "checking options allowed in inline-signing secondaries ($n)"
|
|
ret=0
|
|
$CHECKCONF bad-dnssec.conf >checkconf.out$n.2 2>&1 && ret=1
|
|
l=$(grep "dnssec-loadkeys-interval.*requires inline" <checkconf.out$n.2 | wc -l)
|
|
[ $l -eq 1 ] || ret=1
|
|
if [ $ret -ne 0 ]; then echo_i "failed"; fi
|
|
status=$((status + ret))
|
|
|
|
n=$((n + 1))
|
|
echo_i "check file + inline-signing for secondary zones ($n)"
|
|
$CHECKCONF inline-no.conf >checkconf.out$n.1 2>&1 && ret=1
|
|
l=$(grep "missing 'file' entry" <checkconf.out$n.1 | wc -l)
|
|
[ $l -eq 0 ] || ret=1
|
|
$CHECKCONF inline-good.conf >checkconf.out$n.2 2>&1 || ret=1
|
|
l=$(grep "missing 'file' entry" <checkconf.out$n.2 | wc -l)
|
|
[ $l -eq 0 ] || ret=1
|
|
$CHECKCONF inline-bad.conf >checkconf.out$n.3 2>&1 && ret=1
|
|
l=$(grep "missing 'file' entry" <checkconf.out$n.3 | wc -l)
|
|
[ $l -eq 1 ] || ret=1
|
|
if [ $ret -ne 0 ]; then echo_i "failed"; fi
|
|
status=$((status + ret))
|
|
|
|
n=$((n + 1))
|
|
echo_i "checking named-checkconf DLZ warnings ($n)"
|
|
ret=0
|
|
$CHECKCONF dlz-bad.conf >checkconf.out$n 2>&1 && ret=1
|
|
grep "'dlz' and 'database'" <checkconf.out$n >/dev/null || ret=1
|
|
if [ $ret -ne 0 ]; then echo_i "failed"; fi
|
|
status=$((status + ret))
|
|
|
|
n=$((n + 1))
|
|
echo_i "checking for missing key directory warning ($n)"
|
|
ret=0
|
|
rm -rf test.keydir
|
|
rm -rf test.keystoredir
|
|
$CHECKCONF warn-keydir.conf >checkconf.out$n.1 2>&1
|
|
l=$(grep "'test.keydir' does not exist" <checkconf.out$n.1 | wc -l)
|
|
[ $l -eq 1 ] || ret=1
|
|
l=$(grep "'test.keystoredir' does not exist" <checkconf.out$n.1 | wc -l)
|
|
[ $l -eq 1 ] || ret=1
|
|
touch test.keydir
|
|
touch test.keystoredir
|
|
$CHECKCONF warn-keydir.conf >checkconf.out$n.2 2>&1
|
|
l=$(grep "'test.keydir' is not a directory" <checkconf.out$n.2 | wc -l)
|
|
[ $l -eq 1 ] || ret=1
|
|
l=$(grep "'test.keystoredir' is not a directory" <checkconf.out$n.2 | wc -l)
|
|
[ $l -eq 1 ] || ret=1
|
|
rm -f test.keydir
|
|
rm -f test.keystoredir
|
|
mkdir test.keydir
|
|
mkdir test.keystoredir
|
|
$CHECKCONF warn-keydir.conf >checkconf.out$n.3 2>&1
|
|
l=$(grep "key-directory" <checkconf.out$n.3 | wc -l)
|
|
[ $l -eq 0 ] || ret=1
|
|
l=$(grep "key-store directory" <checkconf.out$n.3 | wc -l)
|
|
[ $l -eq 0 ] || ret=1
|
|
rm -rf test.keydir
|
|
rm -rf test.keystoredir
|
|
if [ $ret -ne 0 ]; then echo_i "failed"; fi
|
|
status=$((status + ret))
|
|
|
|
n=$((n + 1))
|
|
echo_i "checking that named-checkconf -z catches conflicting ttl with max-ttl ($n)"
|
|
ret=0
|
|
$CHECKCONF -z max-ttl.conf >check.out 2>&1 && ret=1
|
|
grep 'TTL 900 exceeds configured max-zone-ttl 600' check.out >/dev/null 2>&1 || ret=1
|
|
grep 'TTL 900 exceeds configured max-zone-ttl 600' check.out >/dev/null 2>&1 || ret=1
|
|
grep 'TTL 900 exceeds configured max-zone-ttl 600' check.out >/dev/null 2>&1 || ret=1
|
|
if [ $ret -ne 0 ]; then
|
|
echo_i "failed"
|
|
ret=1
|
|
fi
|
|
status=$((status + ret))
|
|
|
|
n=$((n + 1))
|
|
echo_i "checking that named-checkconf -z catches invalid max-ttl ($n)"
|
|
ret=0
|
|
$CHECKCONF -z max-ttl-bad.conf >checkconf.out$n 2>&1 && ret=1
|
|
if [ $ret -ne 0 ]; then
|
|
echo_i "failed"
|
|
ret=1
|
|
fi
|
|
status=$((status + ret))
|
|
|
|
n=$((n + 1))
|
|
echo_i "checking that named-checkconf -z skips zone check with alternate databases ($n)"
|
|
ret=0
|
|
$CHECKCONF -z altdb.conf >checkconf.out$n 2>&1 || ret=1
|
|
if [ $ret -ne 0 ]; then
|
|
echo_i "failed"
|
|
ret=1
|
|
fi
|
|
status=$((status + ret))
|
|
|
|
n=$((n + 1))
|
|
echo_i "checking that named-checkconf -z skips zone check with DLZ ($n)"
|
|
ret=0
|
|
$CHECKCONF -z altdlz.conf >checkconf.out$n 2>&1 || ret=1
|
|
if [ $ret -ne 0 ]; then
|
|
echo_i "failed"
|
|
ret=1
|
|
fi
|
|
status=$((status + ret))
|
|
|
|
n=$((n + 1))
|
|
echo_i "checking that named-checkconf -z fails on view with ANY class ($n)"
|
|
ret=0
|
|
$CHECKCONF -z view-class-any1.conf >checkconf.out$n 2>&1 && ret=1
|
|
if [ $ret -ne 0 ]; then
|
|
echo_i "failed"
|
|
ret=1
|
|
fi
|
|
status=$((status + ret))
|
|
|
|
n=$((n + 1))
|
|
echo_i "checking that named-checkconf -z fails on view with CLASS255 class ($n)"
|
|
ret=0
|
|
$CHECKCONF -z view-class-any2.conf >checkconf.out$n 2>&1 && ret=1
|
|
if [ $ret -ne 0 ]; then
|
|
echo_i "failed"
|
|
ret=1
|
|
fi
|
|
status=$((status + ret))
|
|
|
|
n=$((n + 1))
|
|
echo_i "checking that named-checkconf -z passes on view with IN class ($n)"
|
|
ret=0
|
|
$CHECKCONF -z view-class-in1.conf >checkconf.out$n 2>&1 || ret=1
|
|
if [ $ret -ne 0 ]; then
|
|
echo_i "failed"
|
|
ret=1
|
|
fi
|
|
status=$((status + ret))
|
|
|
|
n=$((n + 1))
|
|
echo_i "checking that named-checkconf -z passes on view with CLASS1 class ($n)"
|
|
ret=0
|
|
$CHECKCONF -z view-class-in2.conf >checkconf.out$n 2>&1 || ret=1
|
|
if [ $ret -ne 0 ]; then
|
|
echo_i "failed"
|
|
ret=1
|
|
fi
|
|
status=$((status + ret))
|
|
|
|
n=$((n + 1))
|
|
echo_i "check that check-names fails as configured ($n)"
|
|
ret=0
|
|
$CHECKCONF -z check-names-fail.conf >checkconf.out$n 2>&1 && ret=1
|
|
grep "near '_underscore': bad name (check-names)" <checkconf.out$n >/dev/null || ret=1
|
|
grep "zone check-names/IN: loaded serial" <checkconf.out$n >/dev/null && ret=1
|
|
if [ $ret -ne 0 ]; then
|
|
echo_i "failed"
|
|
ret=1
|
|
fi
|
|
status=$((status + ret))
|
|
|
|
n=$((n + 1))
|
|
echo_i "check that check-mx fails as configured ($n)"
|
|
ret=0
|
|
$CHECKCONF -z check-mx-fail.conf >checkconf.out$n 2>&1 && ret=1
|
|
grep "near '10.0.0.1': MX is an address" <checkconf.out$n >/dev/null || ret=1
|
|
grep "zone check-mx/IN: loaded serial" <checkconf.out$n >/dev/null && ret=1
|
|
if [ $ret -ne 0 ]; then
|
|
echo_i "failed"
|
|
ret=1
|
|
fi
|
|
status=$((status + ret))
|
|
|
|
n=$((n + 1))
|
|
echo_i "check that check-dup-records fails as configured ($n)"
|
|
ret=0
|
|
$CHECKCONF -z check-dup-records-fail.conf >checkconf.out$n 2>&1 && ret=1
|
|
grep "has semantically identical records" <checkconf.out$n >/dev/null || ret=1
|
|
grep "zone check-dup-records/IN: loaded serial" <checkconf.out$n >/dev/null && ret=1
|
|
if [ $ret -ne 0 ]; then
|
|
echo_i "failed"
|
|
ret=1
|
|
fi
|
|
status=$((status + ret))
|
|
|
|
n=$((n + 1))
|
|
echo_i "check that check-mx fails as configured ($n)"
|
|
ret=0
|
|
$CHECKCONF -z check-mx-fail.conf >checkconf.out$n 2>&1 && ret=1
|
|
grep "failed: MX is an address" <checkconf.out$n >/dev/null || ret=1
|
|
grep "zone check-mx/IN: loaded serial" <checkconf.out$n >/dev/null && ret=1
|
|
if [ $ret -ne 0 ]; then
|
|
echo_i "failed"
|
|
ret=1
|
|
fi
|
|
status=$((status + ret))
|
|
|
|
n=$((n + 1))
|
|
echo_i "check that check-mx-cname fails as configured ($n)"
|
|
ret=0
|
|
$CHECKCONF -z check-mx-cname-fail.conf >checkconf.out$n 2>&1 && ret=1
|
|
grep "MX.* is a CNAME (illegal)" <checkconf.out$n >/dev/null || ret=1
|
|
grep "zone check-mx-cname/IN: loaded serial" <checkconf.out$n >/dev/null && ret=1
|
|
if [ $ret -ne 0 ]; then
|
|
echo_i "failed"
|
|
ret=1
|
|
fi
|
|
status=$((status + ret))
|
|
|
|
n=$((n + 1))
|
|
echo_i "check that check-srv-cname fails as configured ($n)"
|
|
ret=0
|
|
$CHECKCONF -z check-srv-cname-fail.conf >checkconf.out$n 2>&1 && ret=1
|
|
grep "SRV.* is a CNAME (illegal)" <checkconf.out$n >/dev/null || ret=1
|
|
grep "zone check-mx-cname/IN: loaded serial" <checkconf.out$n >/dev/null && ret=1
|
|
if [ $ret -ne 0 ]; then
|
|
echo_i "failed"
|
|
ret=1
|
|
fi
|
|
status=$((status + ret))
|
|
|
|
n=$((n + 1))
|
|
echo_i "check that named-checkconf -p properly print a port range ($n)"
|
|
ret=0
|
|
$CHECKCONF -p portrange-good.conf >checkconf.out$n 2>&1 || ret=1
|
|
grep "range 8610 8614;" <checkconf.out$n >/dev/null || ret=1
|
|
if [ $ret -ne 0 ]; then
|
|
echo_i "failed"
|
|
ret=1
|
|
fi
|
|
status=$((status + ret))
|
|
|
|
n=$((n + 1))
|
|
echo_i "check that named-checkconf -z handles in-view ($n)"
|
|
ret=0
|
|
$CHECKCONF -z in-view-good.conf >checkconf.out$n 2>&1 || ret=1
|
|
grep "zone shared.example/IN: loaded serial" <checkconf.out$n >/dev/null || ret=1
|
|
if [ $ret -ne 0 ]; then
|
|
echo_i "failed"
|
|
ret=1
|
|
fi
|
|
status=$((status + ret))
|
|
|
|
n=$((n + 1))
|
|
echo_i "check that named-checkconf -z returns error when a later view is okay ($n)"
|
|
ret=0
|
|
$CHECKCONF -z check-missing-zone.conf >checkconf.out$n 2>&1 && ret=1
|
|
if [ $ret -ne 0 ]; then
|
|
echo_i "failed"
|
|
ret=1
|
|
fi
|
|
status=$((status + ret))
|
|
|
|
n=$((n + 1))
|
|
echo_i "check that named-checkconf prints max-cache-size <percentage> correctly ($n)"
|
|
ret=0
|
|
$CHECKCONF -p max-cache-size-good.conf >checkconf.out$n 2>&1 || ret=1
|
|
grep "max-cache-size 60%;" <checkconf.out$n >/dev/null || ret=1
|
|
if [ $ret -ne 0 ]; then
|
|
echo_i "failed"
|
|
ret=1
|
|
fi
|
|
status=$((status + ret))
|
|
|
|
n=$((n + 1))
|
|
echo_i "check that named-checkconf -l prints out the zone list ($n)"
|
|
ret=0
|
|
$CHECKCONF -l good.conf \
|
|
| grep -v "is deprecated" \
|
|
| grep -v "is not implemented" \
|
|
| grep -v "is not recommended" \
|
|
| grep -v "no longer exists" \
|
|
| grep -v "is obsolete" >checkconf.out$n || ret=1
|
|
diff good.zonelist checkconf.out$n >diff.out$n || ret=1
|
|
if [ $ret -ne 0 ]; then
|
|
echo_i "failed"
|
|
ret=1
|
|
fi
|
|
status=$((status + ret))
|
|
|
|
n=$((n + 1))
|
|
echo_i "check that the 2010 ICANN ROOT KSK without the 2017 ICANN ROOT KSK generates a warning ($n)"
|
|
ret=0
|
|
$CHECKCONF check-root-ksk-2010.conf >checkconf.out$n 2>/dev/null || ret=1
|
|
[ -s checkconf.out$n ] || ret=1
|
|
grep "key without the updated" <checkconf.out$n >/dev/null || ret=1
|
|
if [ $ret -ne 0 ]; then
|
|
echo_i "failed"
|
|
ret=1
|
|
fi
|
|
status=$((status + ret))
|
|
|
|
n=$((n + 1))
|
|
echo_i "check that the 2010 ICANN ROOT KSK with the 2017 ICANN ROOT KSK does not generate a warning ($n)"
|
|
ret=0
|
|
$CHECKCONF check-root-ksk-both.conf >checkconf.out$n 2>/dev/null || ret=1
|
|
[ -s checkconf.out$n ] && ret=1
|
|
if [ $ret -ne 0 ]; then
|
|
echo_i "failed"
|
|
ret=1
|
|
fi
|
|
status=$((status + ret))
|
|
|
|
n=$((n + 1))
|
|
echo_i "check that the 2017 ICANN ROOT KSK alone does not generate a warning ($n)"
|
|
ret=0
|
|
$CHECKCONF check-root-ksk-2017.conf >checkconf.out$n 2>/dev/null || ret=1
|
|
[ -s checkconf.out$n ] && ret=1
|
|
if [ $ret -ne 0 ]; then
|
|
echo_i "failed"
|
|
ret=1
|
|
fi
|
|
status=$((status + ret))
|
|
|
|
n=$((n + 1))
|
|
echo_i "check that a static root key generates a warning ($n)"
|
|
ret=0
|
|
$CHECKCONF check-root-static-key.conf >checkconf.out$n 2>/dev/null || ret=1
|
|
grep "static entry for the root zone WILL FAIL" checkconf.out$n >/dev/null || ret=1
|
|
if [ $ret -ne 0 ]; then
|
|
echo_i "failed"
|
|
ret=1
|
|
fi
|
|
status=$((status + ret))
|
|
|
|
n=$((n + 1))
|
|
echo_i "check that a static root DS trust anchor generates a warning ($n)"
|
|
ret=0
|
|
$CHECKCONF check-root-static-ds.conf >checkconf.out$n 2>/dev/null || ret=1
|
|
grep "static entry for the root zone WILL FAIL" checkconf.out$n >/dev/null || ret=1
|
|
if [ $ret -ne 0 ]; then
|
|
echo_i "failed"
|
|
ret=1
|
|
fi
|
|
status=$((status + ret))
|
|
|
|
n=$((n + 1))
|
|
echo_i "check that a trusted-keys entry for root generates a warning ($n)"
|
|
ret=0
|
|
$CHECKCONF check-root-trusted-key.conf >checkconf.out$n 2>/dev/null || ret=1
|
|
grep "trusted-keys entry for the root zone WILL FAIL" checkconf.out$n >/dev/null || ret=1
|
|
if [ $ret -ne 0 ]; then
|
|
echo_i "failed"
|
|
ret=1
|
|
fi
|
|
status=$((status + ret))
|
|
|
|
n=$((n + 1))
|
|
echo_i "check that using trust-anchors and managed-keys generates an error ($n)"
|
|
ret=0
|
|
$CHECKCONF check-mixed-keys.conf >checkconf.out$n 2>/dev/null && ret=1
|
|
grep "use of managed-keys is not allowed" checkconf.out$n >/dev/null || ret=1
|
|
if [ $ret -ne 0 ]; then
|
|
echo_i "failed"
|
|
ret=1
|
|
fi
|
|
status=$((status + ret))
|
|
|
|
n=$((n + 1))
|
|
echo_i "checking named-checkconf kasp errors ($n)"
|
|
ret=0
|
|
$CHECKCONF kasp-and-other-dnssec-options.conf >checkconf.out$n 2>&1 && ret=1
|
|
grep "'inline-signing yes;' must also be configured explicitly for zones using dnssec-policy without a configured 'allow-update' or 'update-policy'" <checkconf.out$n >/dev/null || ret=1
|
|
if [ $ret -ne 0 ]; then echo_i "failed"; fi
|
|
status=$((status + ret))
|
|
|
|
n=$((n + 1))
|
|
echo_i "checking named-checkconf kasp nsec3 iterations errors ($n)"
|
|
ret=0
|
|
if [ $RSASHA1_SUPPORTED = 0 ]; then
|
|
conf=kasp-bad-nsec3-iter-fips.conf
|
|
expect=2
|
|
else
|
|
conf=kasp-bad-nsec3-iter.conf
|
|
expect=3
|
|
fi
|
|
$CHECKCONF $conf >checkconf.out$n 2>&1 && ret=1
|
|
grep "dnssec-policy: nsec3 iterations value 1 not allowed, must be zero" <checkconf.out$n >/dev/null || ret=1
|
|
lines=$(wc -l <"checkconf.out$n")
|
|
if [ $lines -ne $expect ]; then ret=1; fi
|
|
if [ $ret -ne 0 ]; then echo_i "failed"; fi
|
|
status=$((status + ret))
|
|
|
|
n=$((n + 1))
|
|
echo_i "checking named-checkconf kasp nsec3 algorithm errors ($n)"
|
|
ret=0
|
|
$CHECKCONF kasp-bad-nsec3-alg.conf >checkconf.out$n 2>&1 && ret=1
|
|
if [ $RSASHA1_SUPPORTED = 0 ]; then
|
|
grep "dnssec-policy: algorithm rsasha1 not supported" <checkconf.out$n >/dev/null || ret=1
|
|
else
|
|
grep "dnssec-policy: cannot use nsec3 with algorithm 'RSASHA1'" <checkconf.out$n >/dev/null || ret=1
|
|
fi
|
|
if [ $ret -ne 0 ]; then echo_i "failed"; fi
|
|
status=$((status + ret))
|
|
|
|
n=$((n + 1))
|
|
echo_i "checking named-checkconf kasp key errors ($n)"
|
|
ret=0
|
|
$CHECKCONF kasp-bad-keylen.conf >checkconf.out$n 2>&1 && ret=1
|
|
grep "dnssec-policy: key with algorithm rsasha256 has invalid key length 511" <checkconf.out$n >/dev/null || ret=1
|
|
if [ $ret -ne 0 ]; then echo_i "failed"; fi
|
|
status=$((status + ret))
|
|
|
|
n=$((n + 1))
|
|
echo_i "checking named-checkconf kasp offline-ksk with csk errors ($n)"
|
|
ret=0
|
|
$CHECKCONF kasp-bad-offline-ksk.conf >checkconf.out$n 2>&1 && ret=1
|
|
grep "dnssec-policy: csk keys are not allowed when offline-ksk is enabled" <checkconf.out$n >/dev/null || ret=1
|
|
if [ $ret -ne 0 ]; then echo_i "failed"; fi
|
|
status=$((status + ret))
|
|
|
|
n=$((n + 1))
|
|
echo_i "checking named-checkconf kasp signatures refresh errors ($n)"
|
|
ret=0
|
|
$CHECKCONF kasp-bad-signatures-refresh.conf >checkconf.out$n 2>&1 && ret=1
|
|
grep "dnssec-policy: policy 'bad-sigrefresh' signatures-refresh must be at most 90% of the signatures-validity" <checkconf.out$n >/dev/null || ret=1
|
|
grep "dnssec-policy: policy 'bad-sigrefresh-dnskey' signatures-refresh must be at most 90% of the signatures-validity-dnskey" <checkconf.out$n >/dev/null || ret=1
|
|
lines=$(wc -l <"checkconf.out$n")
|
|
if [ $lines -ne 2 ]; then ret=1; fi
|
|
if [ $ret -ne 0 ]; then echo_i "failed"; fi
|
|
status=$((status + ret))
|
|
|
|
n=$((n + 1))
|
|
echo_i "checking named-checkconf kasp key lifetime errors ($n)"
|
|
ret=0
|
|
$CHECKCONF kasp-bad-lifetime.conf >checkconf.out$n 2>&1 && ret=1
|
|
lines=$(grep "dnssec-policy: key lifetime is shorter than the time it takes to do a rollover" <checkconf.out$n | wc -l) || ret=1
|
|
if [ $lines -ne 3 ]; then ret=1; fi
|
|
if [ $ret -ne 0 ]; then echo_i "failed"; fi
|
|
status=$((status + ret))
|
|
|
|
n=$((n + 1))
|
|
echo_i "checking named-checkconf kasp predefined key length ($n)"
|
|
ret=0
|
|
$CHECKCONF kasp-ignore-keylen.conf >checkconf.out$n 2>&1 || ret=1
|
|
grep "dnssec-policy: key algorithm ecdsa256 has predefined length; ignoring length value 2048" <checkconf.out$n >/dev/null || ret=1
|
|
if [ $ret -ne 0 ]; then echo_i "failed"; fi
|
|
status=$((status + ret))
|
|
|
|
n=$((n + 1))
|
|
echo_i "checking named-checkconf kasp warns about weird policies ($n)"
|
|
ret=0
|
|
$CHECKCONF kasp-warning.conf >checkconf.out$n 2>&1 || ret=1
|
|
grep "dnssec-policy: algorithm 8 has multiple keys with ZSK role" <checkconf.out$n >/dev/null || ret=1
|
|
grep "dnssec-policy: algorithm 8 has multiple keys with ZSK role" <checkconf.out$n >/dev/null || ret=1
|
|
grep "dnssec-policy: algorithm 13 has multiple keys with KSK role" <checkconf.out$n >/dev/null || ret=1
|
|
grep "dnssec-policy: algorithm 13 has multiple keys with ZSK role" <checkconf.out$n >/dev/null || ret=1
|
|
grep "dnssec-policy: key lifetime is shorter than 30 days" <checkconf.out$n >/dev/null || ret=1
|
|
lines=$(wc -l <"checkconf.out$n")
|
|
if [ $lines -ne 5 ]; then ret=1; fi
|
|
if [ $ret -ne 0 ]; then echo_i "failed"; fi
|
|
status=$((status + ret))
|
|
|
|
n=$((n + 1))
|
|
echo_i "check that a good 'kasp' configuration is accepted ($n)"
|
|
ret=0
|
|
$CHECKCONF good-kasp.conf >checkconf.out$n 2>/dev/null || ret=1
|
|
if [ $ret -ne 0 ]; then echo_i "failed"; fi
|
|
status=$((status + ret))
|
|
|
|
n=$((n + 1))
|
|
echo_i "checking that named-checkconf prints a known good kasp config ($n)"
|
|
ret=0
|
|
awk 'BEGIN { ok = 0; } /cut here/ { ok = 1; getline } ok == 1 { print }' good-kasp.conf >good-kasp.conf.in
|
|
[ -s good-kasp.conf.in ] || ret=1
|
|
$CHECKCONF -p good-kasp.conf.in | grep -v '^good-kasp.conf.in:' >good-kasp.conf.out 2>&1 || ret=1
|
|
cmp good-kasp.conf.in good-kasp.conf.out || ret=1
|
|
if [ $ret -ne 0 ]; then echo_i "failed"; fi
|
|
status=$((status + ret))
|
|
|
|
n=$((n + 1))
|
|
echo_i "check that max-ixfr-ratio 100% generates a warning ($n)"
|
|
ret=0
|
|
$CHECKCONF warn-maxratio1.conf >checkconf.out$n 2>/dev/null || ret=1
|
|
grep "exceeds 100%" <checkconf.out$n >/dev/null || ret=1
|
|
if [ $ret -ne 0 ]; then
|
|
echo_i "failed"
|
|
ret=1
|
|
fi
|
|
status=$((status + ret))
|
|
|
|
n=$((n + 1))
|
|
echo_i "check that *-source options with specified port generate warnings ($n)"
|
|
ret=0
|
|
$CHECKCONF warn-transfer-source.conf >checkconf.out$n 2>/dev/null || ret=1
|
|
grep "not recommended" <checkconf.out$n >/dev/null || ret=1
|
|
$CHECKCONF warn-notify-source.conf >checkconf.out$n 2>/dev/null || ret=1
|
|
grep "not recommended" <checkconf.out$n >/dev/null || ret=1
|
|
$CHECKCONF warn-parental-source.conf >checkconf.out$n 2>/dev/null || ret=1
|
|
grep "not recommended" <checkconf.out$n >/dev/null || ret=1
|
|
if [ $ret -ne 0 ]; then
|
|
echo_i "failed"
|
|
ret=1
|
|
fi
|
|
status=$((status + ret))
|
|
|
|
n=$((n + 1))
|
|
echo_i "check that 'check-wildcard no;' succeeds as configured ($n)"
|
|
ret=0
|
|
$CHECKCONF -z check-wildcard-no.conf >checkconf.out$n 2>&1 || ret=1
|
|
grep -F "warning: ownername 'foo.*.check-wildcard' contains an non-terminal wildcard" checkconf.out$n >/dev/null && ret=1
|
|
if [ $ret != 0 ]; then
|
|
echo_i "failed"
|
|
ret=1
|
|
fi
|
|
status=$((status + ret))
|
|
|
|
n=$((n + 1))
|
|
echo_i "check that 'check-wildcard yes;' warns as configured ($n)"
|
|
ret=0
|
|
$CHECKCONF -z check-wildcard.conf >checkconf.out$n 2>&1 || ret=1
|
|
grep -F "warning: ownername 'foo.*.check-wildcard' contains an non-terminal wildcard" checkconf.out$n >/dev/null || ret=1
|
|
if [ $ret != 0 ]; then
|
|
echo_i "failed"
|
|
ret=1
|
|
fi
|
|
status=$((status + ret))
|
|
|
|
echo_i "exit status: $status"
|
|
[ $status -eq 0 ] || exit 1
|