]>
Commit | Line | Data |
---|---|---|
89c4ed63 A |
1 | ; Signature test file |
2 | ||
3 | ; first entry is a DNSKEY answer, with the DNSKEY rrset used for verification. | |
4 | ; later entries are verified with it. | |
5 | ||
6 | ; Test multiple signature algos: RSASHA1 + RSASHA256 signatures. | |
7 | ||
8 | ; RSA key from ldns tool | |
9 | ENTRY_BEGIN | |
10 | SECTION QUESTION | |
11 | sub.example.com. IN DNSKEY | |
12 | SECTION ANSWER | |
13 | example.com. 3600 IN DNSKEY 256 3 8 AwEAAbd9WqjzE2Pynz21OG5doSf9hFzMr5dhzz2waZ3vTa+0o5r7AjTAqmA1yH/B3+aAMihUm5ucZSfVqo7+kOaRE8yFj9aivOmA1n1+JLevJq/oyvQyjxQN2Qb89LyaNUT5oKZIiL+uyyhNW3KDR3SSbQ/GBwQNDHVcZi+JDR3RC0r7 ;{id = 1443 (zsk), size = 1024b} | |
14 | example.com. 3600 IN DNSKEY 256 3 5 AQPQ41chR9DEHt/aIzIFAqanbDlRflJoRs5yz1jFsoRIT7dWf0r+PeDuewdxkszNH6wnU4QL8pfKFRh5PIYVBLK3 ;{id = 30899 (zsk), size = 512b} | |
15 | ENTRY_END | |
16 | ||
17 | ; both signatures valid | |
18 | ENTRY_BEGIN | |
19 | SECTION QUESTION | |
20 | www.example.com. IN A | |
21 | SECTION ANSWER | |
22 | www.example.com. 3600 IN A 192.0.2.66 | |
23 | www.example.com. 3600 IN RRSIG A 8 3 3600 20070926134150 20070829134150 1443 example.com. sX+BZ6Qdq0Td/THR1HgOnWh9URNP03KMEgjpnRGbS74NqlmlqLU3HcimOT/lUD7xsZTeOIWw5kAcQePxU3UrjS5gsIttIXAfrHFmOtTsyb0O4w0/RpR0QYxRl1hk4zQRPzHeEkgxNTe+y9V9gYe7iv9OddXsfwEnmqQiXk+tdsU= ;{id = 1443} | |
24 | www.example.com. 3600 IN RRSIG A 5 3 3600 20070926134150 20070829134150 30899 example.com. Ip2xOAgSq3HdeGEMyQ0jafKNOOJO7Ca+huBgBPSj7B3txTlP9hBzlV0rb0XULymEiQLSpIPm4EY7xzom7z6aKA== ;{id = 30899} | |
25 | ENTRY_END | |
26 | ||
27 | ; the SHA1 invalid | |
28 | ENTRY_BEGIN | |
29 | SECTION QUESTION | |
30 | bogus.example.com. IN A | |
31 | SECTION ANSWER | |
32 | bogus.example.com. 3600 IN A 192.0.2.66 | |
33 | bogus.example.com. 3600 IN RRSIG A 8 3 3600 20070926134150 20070829134150 1443 example.com. qaYKAK9+t5HggYjHduA5d3A3i41HoU0ct0yqNzsYQqElFkH0d1aTjRDExD0PGeVbMTocMBru+ID9cLot3kwgn8aZL6UI3AwV6MR+0lianuA8DyhuqpD8OwkZ+LJxNsfq3t5ospXlBhyaI95S7lC3N6dsHDj4qtOwyE42fnQkedE= ;{id = 1443} | |
34 | bogus.example.com. 3600 IN RRSIG A 5 3 3600 20070926134150 20070829134150 30899 example.com. Ip2xOAgSq3HdeGEMyQ0jafKNOOJO7Ca+huBgBPSj7B3txTlP9hBzlV0rb0XULymEiQLSpIPm4EY7xzom7z6aKA== ;{id = 30899} | |
35 | ENTRY_END | |
36 | ||
37 | ; the SHA256 invalid | |
38 | ENTRY_BEGIN | |
39 | SECTION QUESTION | |
40 | bogus.example.com. IN A | |
41 | SECTION ANSWER | |
42 | bogus.example.com. 3600 IN A 192.0.2.66 | |
43 | bogus.example.com. 3600 IN RRSIG A 8 3 3600 20070926134150 20070829134150 1443 example.com. sX+BZ6Qdq0Td/THR1HgOnWh9URNP03KMEgjpnRGbS74NqlmlqLU3HcimOT/lUD7xsZTeOIWw5kAcQePxU3UrjS5gsIttIXAfrHFmOtTsyb0O4w0/RpR0QYxRl1hk4zQRPzHeEkgxNTe+y9V9gYe7iv9OddXsfwEnmqQiXk+tdsU= ;{id = 1443} | |
44 | bogus.example.com. 3600 IN RRSIG A 5 3 3600 20070926134150 20070829134150 30899 example.com. EetlYQbmdt8deu6LIOYTxwHsMnivWBaxClTlLTPooUjgE+upQfCbG25mdY/wx+lM8fthKry+z65YACR8opA0Sw== ;{id = 30899} | |
45 | ENTRY_END | |
46 | ||
47 | ; SHA1 and SHA256 not valid | |
48 | ENTRY_BEGIN | |
49 | SECTION QUESTION | |
50 | bogus.example.com. IN A | |
51 | SECTION ANSWER | |
52 | bogus.example.com. 3600 IN A 192.0.2.66 | |
53 | bogus.example.com. 3600 IN RRSIG A 8 3 3600 20070926134150 20070829134150 1443 example.com. sX+BZ6Qdq0Td/THR1HgOnWh9URNP03KMEgjpnRGbS74NqlmlqLU3HcimOT/lUD7xsZTeOIWw5kAcQePxU3UrjS5gsIttIXAfrHFmOtTsyb0O4w0/RpR0QYxRl1hk4zQRPzHeEkgxNTe+y9V9gYe7iv9OddXsfwEnmqQiXk+tdsU= ;{id = 1443} | |
54 | bogus.example.com. 3600 IN RRSIG A 5 3 3600 20070926134150 20070829134150 30899 example.com. Ip2xOAgSq3HdeGEMyQ0jafKNOOJO7Ca+huBgBPSj7B3txTlP9hBzlV0rb0XULymEiQLSpIPm4EY7xzom7z6aKA== ;{id = 30899} | |
55 | ENTRY_END | |
56 |