57 lines
3.1 KiB
Plaintext
57 lines
3.1 KiB
Plaintext
|
; Signature test file
|
||
|
|
||
|
; first entry is a DNSKEY answer, with the DNSKEY rrset used for verification.
|
||
|
; later entries are verified with it.
|
||
|
|
||
|
; Test multiple signature algos: RSASHA1 + RSASHA256 signatures.
|
||
|
|
||
|
; RSA key from ldns tool
|
||
|
ENTRY_BEGIN
|
||
|
SECTION QUESTION
|
||
|
sub.example.com. IN DNSKEY
|
||
|
SECTION ANSWER
|
||
|
example.com. 3600 IN DNSKEY 256 3 8 AwEAAbd9WqjzE2Pynz21OG5doSf9hFzMr5dhzz2waZ3vTa+0o5r7AjTAqmA1yH/B3+aAMihUm5ucZSfVqo7+kOaRE8yFj9aivOmA1n1+JLevJq/oyvQyjxQN2Qb89LyaNUT5oKZIiL+uyyhNW3KDR3SSbQ/GBwQNDHVcZi+JDR3RC0r7 ;{id = 1443 (zsk), size = 1024b}
|
||
|
example.com. 3600 IN DNSKEY 256 3 5 AQPQ41chR9DEHt/aIzIFAqanbDlRflJoRs5yz1jFsoRIT7dWf0r+PeDuewdxkszNH6wnU4QL8pfKFRh5PIYVBLK3 ;{id = 30899 (zsk), size = 512b}
|
||
|
ENTRY_END
|
||
|
|
||
|
; both signatures valid
|
||
|
ENTRY_BEGIN
|
||
|
SECTION QUESTION
|
||
|
www.example.com. IN A
|
||
|
SECTION ANSWER
|
||
|
www.example.com. 3600 IN A 192.0.2.66
|
||
|
www.example.com. 3600 IN RRSIG A 8 3 3600 20070926134150 20070829134150 1443 example.com. sX+BZ6Qdq0Td/THR1HgOnWh9URNP03KMEgjpnRGbS74NqlmlqLU3HcimOT/lUD7xsZTeOIWw5kAcQePxU3UrjS5gsIttIXAfrHFmOtTsyb0O4w0/RpR0QYxRl1hk4zQRPzHeEkgxNTe+y9V9gYe7iv9OddXsfwEnmqQiXk+tdsU= ;{id = 1443}
|
||
|
www.example.com. 3600 IN RRSIG A 5 3 3600 20070926134150 20070829134150 30899 example.com. Ip2xOAgSq3HdeGEMyQ0jafKNOOJO7Ca+huBgBPSj7B3txTlP9hBzlV0rb0XULymEiQLSpIPm4EY7xzom7z6aKA== ;{id = 30899}
|
||
|
ENTRY_END
|
||
|
|
||
|
; the SHA1 invalid
|
||
|
ENTRY_BEGIN
|
||
|
SECTION QUESTION
|
||
|
bogus.example.com. IN A
|
||
|
SECTION ANSWER
|
||
|
bogus.example.com. 3600 IN A 192.0.2.66
|
||
|
bogus.example.com. 3600 IN RRSIG A 8 3 3600 20070926134150 20070829134150 1443 example.com. qaYKAK9+t5HggYjHduA5d3A3i41HoU0ct0yqNzsYQqElFkH0d1aTjRDExD0PGeVbMTocMBru+ID9cLot3kwgn8aZL6UI3AwV6MR+0lianuA8DyhuqpD8OwkZ+LJxNsfq3t5ospXlBhyaI95S7lC3N6dsHDj4qtOwyE42fnQkedE= ;{id = 1443}
|
||
|
bogus.example.com. 3600 IN RRSIG A 5 3 3600 20070926134150 20070829134150 30899 example.com. Ip2xOAgSq3HdeGEMyQ0jafKNOOJO7Ca+huBgBPSj7B3txTlP9hBzlV0rb0XULymEiQLSpIPm4EY7xzom7z6aKA== ;{id = 30899}
|
||
|
ENTRY_END
|
||
|
|
||
|
; the SHA256 invalid
|
||
|
ENTRY_BEGIN
|
||
|
SECTION QUESTION
|
||
|
bogus.example.com. IN A
|
||
|
SECTION ANSWER
|
||
|
bogus.example.com. 3600 IN A 192.0.2.66
|
||
|
bogus.example.com. 3600 IN RRSIG A 8 3 3600 20070926134150 20070829134150 1443 example.com. sX+BZ6Qdq0Td/THR1HgOnWh9URNP03KMEgjpnRGbS74NqlmlqLU3HcimOT/lUD7xsZTeOIWw5kAcQePxU3UrjS5gsIttIXAfrHFmOtTsyb0O4w0/RpR0QYxRl1hk4zQRPzHeEkgxNTe+y9V9gYe7iv9OddXsfwEnmqQiXk+tdsU= ;{id = 1443}
|
||
|
bogus.example.com. 3600 IN RRSIG A 5 3 3600 20070926134150 20070829134150 30899 example.com. EetlYQbmdt8deu6LIOYTxwHsMnivWBaxClTlLTPooUjgE+upQfCbG25mdY/wx+lM8fthKry+z65YACR8opA0Sw== ;{id = 30899}
|
||
|
ENTRY_END
|
||
|
|
||
|
; SHA1 and SHA256 not valid
|
||
|
ENTRY_BEGIN
|
||
|
SECTION QUESTION
|
||
|
bogus.example.com. IN A
|
||
|
SECTION ANSWER
|
||
|
bogus.example.com. 3600 IN A 192.0.2.66
|
||
|
bogus.example.com. 3600 IN RRSIG A 8 3 3600 20070926134150 20070829134150 1443 example.com. sX+BZ6Qdq0Td/THR1HgOnWh9URNP03KMEgjpnRGbS74NqlmlqLU3HcimOT/lUD7xsZTeOIWw5kAcQePxU3UrjS5gsIttIXAfrHFmOtTsyb0O4w0/RpR0QYxRl1hk4zQRPzHeEkgxNTe+y9V9gYe7iv9OddXsfwEnmqQiXk+tdsU= ;{id = 1443}
|
||
|
bogus.example.com. 3600 IN RRSIG A 5 3 3600 20070926134150 20070829134150 30899 example.com. Ip2xOAgSq3HdeGEMyQ0jafKNOOJO7Ca+huBgBPSj7B3txTlP9hBzlV0rb0XULymEiQLSpIPm4EY7xzom7z6aKA== ;{id = 30899}
|
||
|
ENTRY_END
|
||
|
|