summaryrefslogtreecommitdiffstats
path: root/bin/tests/system/kasp/ns6/named.conf.in
blob: c339c447db2edcf5fa782649a09c3225b8abc25f (plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
/*
 * Copyright (C) Internet Systems Consortium, Inc. ("ISC")
 *
 * SPDX-License-Identifier: MPL-2.0
 *
 * This Source Code Form is subject to the terms of the Mozilla Public
 * License, v. 2.0.  If a copy of the MPL was not distributed with this
 * file, you can obtain one at https://mozilla.org/MPL/2.0/.
 *
 * See the COPYRIGHT file distributed with this work for additional
 * information regarding copyright ownership.
 */

// NS6

include "policies/kasp.conf";
include "policies/csk1.conf";

options {
	query-source address 10.53.0.6;
	notify-source 10.53.0.6;
	transfer-source 10.53.0.6;
	port @PORT@;
	pid-file "named.pid";
	listen-on { 10.53.0.6; };
	listen-on-v6 { none; };
	allow-transfer { any; };
	recursion no;
	key-directory ".";
	dnssec-validation no;
};

key rndc_key {
	secret "1234abcd8765";
	algorithm @DEFAULT_HMAC@;
};

controls {
	inet 10.53.0.6 port @CONTROLPORT@ allow { any; } keys { rndc_key; };
};

/* This zone switch from dynamic to inline-signing. */
zone "dynamic2inline.kasp" {
	type primary;
	file "dynamic2inline.kasp.db";
	allow-update { any; };
	dnssec-policy "default";
};

/* These zones are going insecure. */
zone "step1.going-insecure.kasp" {
	type primary;
	file "step1.going-insecure.kasp.db";
	inline-signing yes;
	dnssec-policy "unsigning";
};

zone "step1.going-insecure-dynamic.kasp" {
	type primary;
	file "step1.going-insecure-dynamic.kasp.db";
	dnssec-policy "unsigning";
	allow-update { any; };
};

zone "step1.going-straight-to-none.kasp" {
	type primary;
	file "step1.going-straight-to-none.kasp.db";
	inline-signing yes;
	dnssec-policy "default";
};

/* These are alorithm rollover test zones. */
zone "step1.algorithm-roll.kasp" {
	type primary;
	file "step1.algorithm-roll.kasp.db";
	inline-signing yes;
	dnssec-policy "rsasha256";
};

zone "step1.csk-algorithm-roll.kasp" {
	type primary;
	file "step1.csk-algorithm-roll.kasp.db";
	inline-signing yes;
	dnssec-policy "csk-algoroll";
};

dnssec-policy "modified" {
	keys {
		csk lifetime unlimited algorithm rsasha256 2048;
	};
};

zone example {
	type primary;
	file "example.db";
	inline-signing yes;
	dnssec-policy modified;
};