1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78
|
# --
# Copyright 2007 Nominet UK
#
# Licensed under the Apache License, Version 2.0 (the "License");
# you may not use this file except in compliance with the License.
# You may obtain a copy of the License at
#
# http://www.apache.org/licenses/LICENSE-2.0
#
# Unless required by applicable law or agreed to in writing, software
# distributed under the License is distributed on an "AS IS" BASIS,
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
# See the License for the specific language governing permissions and
# limitations under the License.
# ++
require_relative 'spec_helper'
class TestDlv < Minitest::Test
include Dnsruby
def test_dlv
# Enable DLV (only) for validation.
# Try to validate some records which can only be done through dlv
# OK - if we don't configure trust anchors, and there is no signed root, then this is easy!
Dnsruby::Dnssec.clear_trusted_keys
Dnsruby::Dnssec.clear_trust_anchors
Dnsruby::PacketSender.clear_caches
# Dnssec.do_validation_with_recursor(true)
# @TODO@ Should use whole RRSet of authoritative NS for these resolvers,
# not individual servers!
res = Dnsruby::Resolver.new("a.ns.se")
res.add_server("b.ns.se")
res.dnssec=true
ret = res.query("se.", Dnsruby::Types.ANY)
# assert(ret.security_level == Dnsruby::Message::SecurityLevel::INSECURE)
# With no keys configured, checking will not be performed
assert(ret.security_level == Dnsruby::Message::SecurityLevel::UNCHECKED)
res = Dnsruby::Resolver.new("ns3.nic.se")
res.add_server("ns2.nic.se")
res.dnssec = true
ret = res.query("ns2.nic.se", Dnsruby::Types.A)
assert(ret.security_level == Dnsruby::Message::SecurityLevel::UNCHECKED)
# Load DLV key
dlv_key = RR.create("dlv.isc.org. IN DNSKEY 257 3 5 BEAAAAPHMu/5onzrEE7z1egmhg/WPO0+juoZrW3euWEn4MxDCE1+lLy2 brhQv5rN32RKtMzX6Mj70jdzeND4XknW58dnJNPCxn8+jAGl2FZLK8t+ 1uq4W+nnA3qO2+DL+k6BD4mewMLbIYFwe0PG73Te9fZ2kJb56dhgMde5 ymX4BI/oQ+cAK50/xvJv00Frf8kw6ucMTwFlgPe+jnGxPPEmHAte/URk Y62ZfkLoBAADLHQ9IrS2tryAe7mbBZVcOwIeU/Rw/mRx/vwwMCTgNboM QKtUdvNXDrYJDSHZws3xiRXF1Rf+al9UmZfSav/4NWLKjHzpT59k/VSt TDN0YUuWrBNh")
Dnssec.add_dlv_key(dlv_key)
Dnsruby::PacketSender.clear_caches
# SE no longer in DLV
# res = Dnsruby::Recursor.new()
# ret = res.query("ns2.nic.se", Dnsruby::Types.A)
# assert(ret.security_level == Dnsruby::Message::SecurityLevel::SECURE)
# .cz no longer in dlv?
# ret = res.query("b.ns.nic.cz", Dnsruby::Types.A)
# assert(ret.security_level == Dnsruby::Message::SecurityLevel::SECURE)
# Test .gov
# Dnsruby::TheLog.level = Logger::DEBUG
res = Resolver.new
ret = res.query("nih.gov", "NS")
assert(ret.security_level = Dnsruby::Message::SecurityLevel::SECURE)
end
# se no longer in dlv
# def test_scrub_non_authoritative
# # Dnssec.do_validation_with_recursor(true)
# res = Dnsruby::Recursor.new()
# ret = res.query("frobbit.se")
# res.prune_rrsets_to_rfc5452(ret, "frobbit.se.")
# Dnssec.validate(ret)
# assert(ret.security_level == Dnsruby::Message::SecurityLevel::SECURE)
# end
end
|