rm -f ns*/named.lock
rm -f ns*/_default.nzf
rm -f ns*/_default.nzd*
+rm -f ns*/managed-keys.bind* ns*/*.mkeys*
rm -f */named.conf
rm -f */named.run
rm -f ns*/named.lock
+rm -f ns*/managed-keys.bind*
notify-source 10.53.0.1;
transfer-source 10.53.0.1;
recursion no;
+ dnssec-validation no;
port @PORT@;
pid-file "named.pid";
listen-on { 10.53.0.1; };
notify-source 10.53.0.1;
transfer-source 10.53.0.1;
recursion no;
+ dnssec-validation no;
port @PORT@;
pid-file "named.pid";
listen-on { 10.53.0.1; };
notify-source 10.53.0.1;
transfer-source 10.53.0.1;
recursion no;
+ dnssec-validation no;
port @PORT@;
pid-file "named.pid";
listen-on { 10.53.0.1; };
notify-source 10.53.0.1;
transfer-source 10.53.0.1;
recursion no;
+ dnssec-validation no;
port @PORT@;
pid-file "named.pid";
listen-on { 10.53.0.1; };
listen-on { 10.53.0.3; };
listen-on-v6 { none; };
recursion yes;
+ dnssec-validation yes;
};
zone "." {
rm -f ns2/redirect.db
rm -f ns2/redirect.bk
rm -f ns3/redirect.db
+rm -f ns*/managed-keys.bind* ns*/*.mkeys*
rm -f */named.memstats
rm -f ns*/named.lock
rm -f ns*/named.run ns*/named.run.prev
+rm -f ns*/managed-keys.bind* ns*/*.mkeys*
rm -f dig.out.test*
rm -f ns2/example.com.bk
rm -f ns2/example.net.bk
+rm -f ns*/managed-keys.bind*
rm -f settime.out.*
rm -f signing.out.*
rm -f sync.key
+rm -f ns*/managed-keys.bind*
rm -f rndc.status.ns*
rm -f dig.out.ns*
rm -f ns*/named.lock
+rm -f ns*/managed-keys.bind*
rm -f */named.conf
rm -f ns2/named_dump.db.*
rm -f ns*/named.lock
+rm -f ns*/managed-keys.bind*
listen-on { 10.53.0.1; };
listen-on-v6 { none; };
recursion no;
+ dnssec-validation no;
notify yes;
check-integrity no;
minimal-responses no;
notify yes;
max-cache-size 80%;
disable-empty-zone 127.IN-ADDR.ARPA;
+ recursion yes;
+ dnssec-validation yes;
};
key rndc_key {
rm -f ns2/dynamic.bk
rm -f ns2/dynamic.bk.jnl
rm -f ns2/example.bk
+rm -f ns*/managed-keys.bind*
rm -f ns[123]/catalog[1234].example.db
rm -rf ns2/zonedir
rm -f ns*/*.nzd ns*/*.nzd-lock
+rm -f ns*/managed-keys.bind*
rm -f ns*/named.conf
rm -f */named.memstats */named.recursing */named.lock */named.run */ans.run
rm -f ns2/K* ns2/dsset-* ns2/example.db.signed
+rm -f ns*/managed-keys.bind*
listen-on { 10.53.0.1; };
listen-on-v6 { none; };
recursion no;
+ dnssec-validation yes;
notify yes;
- dnssec-enable yes;
};
zone "." { type master; file "root.db"; };
listen-on { 10.53.0.2; };
listen-on-v6 { none; };
recursion no;
+ dnssec-validation no;
notify yes;
};
listen-on { 10.53.0.5; };
listen-on-v6 { none; };
recursion no;
+ dnssec-validation no;
notify yes;
};
listen-on-v6 { fd92:7065:b8e:ffff::7; };
recursion yes;
allow-recursion { any; };
+ dnssec-validation yes;
};
key rndc_key {
rm -f */named.memstats
rm -f */named.run
rm -f ns*/named.lock
+rm -f ns*/managed-keys.bind*
listen-on { 10.53.0.1; };
listen-on-v6 { none; };
recursion no;
+ dnssec-validation no;
notify yes;
check-integrity no;
};
listen-on { 10.53.0.2; };
listen-on-v6 { none; };
recursion yes;
+ dnssec-validation yes;
check-names response warn;
notify yes;
};
listen-on { 10.53.0.3; };
listen-on-v6 { none; };
recursion yes;
+ dnssec-validation yes;
check-names response fail;
notify yes;
};
listen-on { 10.53.0.4; };
listen-on-v6 { none; };
recursion yes;
+ dnssec-validation yes;
check-names master ignore;
notify yes;
};
rm -f ns*/named.memstats
rm -f ns*/named.run
rm -f ns*/named.lock
+rm -f ns*/managed-keys.bind*
listen-on { 10.53.0.1; };
listen-on-v6 { none; };
recursion yes;
+ dnssec-validation yes;
deny-answer-addresses { 192.0.2.0/24; 2001:db8:beef::/48; }
except-from { "example.org"; };
deny-answer-aliases { "example.org"; }
listen-on { 10.53.0.2; };
listen-on-v6 { none; };
recursion no;
+ dnssec-validation no;
send-cookie yes;
nocookie-udp-size 512;
};
listen-on { 10.53.0.3; };
listen-on-v6 { none; };
recursion yes;
+ dnssec-validation yes;
deny-answer-addresses { 192.0.2.0/24; 2001:db8:beef::/48; }
except-from { "example.org"; };
deny-answer-aliases { "example.org"; }
listen-on { 10.53.0.4; };
listen-on-v6 { none; };
recursion yes;
+ dnssec-validation yes;
cookie-algorithm sha1;
cookie-secret "569d36a6cc27d6bf55502183302ba352745255a2";
require-server-cookie yes;
listen-on { 10.53.0.5; };
listen-on-v6 { none; };
recursion yes;
+ dnssec-validation yes;
cookie-algorithm sha1;
cookie-secret "569d36a6cc27d6bf55502183302ba352745255a2";
cookie-secret "6b300e27a0db46d4b046e4189790fa7db3c1ffb3";
listen-on { 10.53.0.6; };
listen-on-v6 { none; };
recursion yes;
+ dnssec-validation yes;
cookie-algorithm sha1;
cookie-secret "6b300e27a0db46d4b046e4189790fa7db3c1ffb3";
require-server-cookie yes;
rm -f ns1/named.conf ns1/named.run ns1/named.memstats
rm -f dig.out.*
rm -f ns*/named.lock
+rm -f ns*/managed-keys.bind*
rm -f ns2/inlineslave.bk*
rm -f ns*/named.lock
rm -f ns2/nzf-*
+rm -f ns*/managed-keys.bind*
listen-on-v6 { none; };
allow-query { any; };
recursion no;
+ dnssec-validation no;
};
zone "." {
listen-on-v6 { none; };
allow-query { any; };
recursion no;
+ dnssec-validation no;
allow-new-zones yes;
};
listen-on-v6 { none; };
heartbeat-interval 2;
recursion no;
+ dnssec-validation no;
};
zone "." {
listen-on-v6 { none; };
heartbeat-interval 2;
recursion no;
+ dnssec-validation no;
};
zone "." {
listen-on-v6 { none; };
heartbeat-interval 2;
recursion no;
+ dnssec-validation no;
};
zone "." {
rm -f dig.out.nm.*
rm -f dig.out.nn.*
rm -f ns*/named.lock
+rm -f ns*/managed-keys.bind*
rm -f */named.memstats
rm -f dig.out.ns*.test*
rm -f ns*/named.lock
+rm -f ns*/managed-keys.bind*
rm -f */named.memstats
rm -f */named.run
rm -f ns*/named.lock
+rm -f ns*/managed-keys.bind*
rm -f dig.out*
rm -f ns*/named.lock
rm -f ns1/session.key
+rm -f ns*/managed-keys.bind*
rm -f */named.run
rm -f dig.out.*
rm -f ns*/named.lock
+rm -f ns*/managed-keys.bind*
rm -f signer/general/dsset*
rm -f signing.out*
rm -f python.out.*
+rm -f ns*/managed-keys.bind* ns*/*.mkeys*
rm -f ns*/dnstap.out.save.?
rm -f ns*/named.lock
rm -f ydump.out
+rm -f ns*/managed-keys.bind*
rm -f */named.run
rm -f */named.conf
rm -f ns*/named.lock
+rm -f ns*/managed-keys.bind*
listen-on { 10.53.0.1; };
listen-on-v6 { none; };
recursion no;
+ dnssec-validation no;
notify yes;
};
listen-on { 10.53.0.2; };
listen-on-v6 { none; };
recursion no;
+ dnssec-validation no;
notify yes;
};
listen-on { 10.53.0.3; };
listen-on-v6 { none; };
notify yes;
+ recursion yes;
+ dnssec-validation yes;
};
zone "." {
listen-on dscp 46 { 10.53.0.4; };
listen-on-v6 { none; };
recursion no;
+ dnssec-validation no;
notify yes;
};
listen-on dscp 46 { 10.53.0.5; };
listen-on-v6 { none; };
recursion no;
+ dnssec-validation no;
notify yes;
};
listen-on dscp 46 { 10.53.0.6; };
listen-on-v6 { none; };
notify yes;
+ recursion yes;
+ dnssec-validation yes;
};
zone "." {
listen-on dscp 46 { 10.53.0.7; };
listen-on-v6 { none; };
recursion no;
+ dnssec-validation no;
notify yes;
};
rm -f */named.run
rm -f */named.memstats
rm -f ns*/named.lock
+rm -f ns*/managed-keys.bind*
rm -f added.ptr.out.*
rm -f deleted.a.out.*
rm -f deleted.ptr.out.*
+rm -f ns*/managed-keys.bind*
rm -f */named.run
rm -f */named.memstats
rm -f ns*/named.lock
+rm -f ns*/managed-keys.bind*
rm -f */named.run
rm -f */named.memstats
rm -f ns*/named.lock
+rm -f ns*/managed-keys.bind*
rm -f ns*/named.conf
rm -f ns*/named.run
rm -f ns*/named.memstats
+rm -f ns*/managed-keys.bind*
rm -f ns*/named.run
rm -f ns*/named.memstats
rm -f dig.out.test*
+rm -f ns*/managed-keys.bind*
rm -f ans4/norespond
rm -f ns3/named.stats ns3/named_dump.db
rm -f burst.input.*
+rm -f ns*/managed-keys.bind*
listen-on { 10.53.0.1; };
listen-on-v6 { none; };
recursion no;
+ dnssec-validation no;
notify yes;
};
listen-on { 10.53.0.2; };
listen-on-v6 { none; };
recursion no;
+ dnssec-validation no;
notify yes;
};
listen-on { 10.53.0.3; };
listen-on-v6 { none; };
recursion yes;
+ dnssec-validation yes;
notify yes;
fetches-per-server 400;
};
listen-on { 10.53.0.3; };
listen-on-v6 { none; };
recursion yes;
+ dnssec-validation yes;
notify yes;
fetches-per-zone 40;
};
listen-on { 10.53.0.3; };
listen-on-v6 { none; };
recursion yes;
+ dnssec-validation yes;
notify yes;
recursive-clients 400;
};
rm -f dig.out.*
rm -f ns*/named.lock
+rm -f ns*/managed-keys.bind*
listen-on { 10.53.0.1; };
listen-on-v6 { fd92:7065:b8e:ffff::1; };
recursion no;
+ dnssec-validation yes;
notify yes;
filter-aaaa-on-v4 yes;
filter-aaaa { 10.53.0.1; };
listen-on { 10.53.0.1; };
listen-on-v6 { fd92:7065:b8e:ffff::1; };
recursion no;
+ dnssec-validation yes;
notify yes;
filter-aaaa-on-v6 yes;
filter-aaaa { fd92:7065:b8e:ffff::1; };
listen-on { 10.53.0.2; };
listen-on-v6 { fd92:7065:b8e:ffff::2; };
recursion yes;
+ dnssec-validation yes;
notify yes;
filter-aaaa-on-v4 yes;
filter-aaaa { 10.53.0.2; };
listen-on { 10.53.0.2; };
listen-on-v6 { fd92:7065:b8e:ffff::2; };
recursion yes;
+ dnssec-validation yes;
notify yes;
filter-aaaa-on-v6 yes;
filter-aaaa { fd92:7065:b8e:ffff::2; };
listen-on { 10.53.0.3; };
listen-on-v6 { fd92:7065:b8e:ffff::3; };
recursion yes;
+ dnssec-validation yes;
notify yes;
filter-aaaa-on-v4 break-dnssec;
filter-aaaa { 10.53.0.3; };
listen-on { 10.53.0.3; };
listen-on-v6 { fd92:7065:b8e:ffff::3; };
recursion yes;
+ dnssec-validation yes;
notify yes;
filter-aaaa-on-v6 break-dnssec;
filter-aaaa { fd92:7065:b8e:ffff::3; };
listen-on { 10.53.0.4; };
listen-on-v6 { fd92:7065:b8e:ffff::4; };
recursion no;
+ dnssec-validation no;
notify yes;
filter-aaaa-on-v4 break-dnssec;
filter-aaaa { 10.53.0.4; };
listen-on { 10.53.0.4; };
listen-on-v6 { fd92:7065:b8e:ffff::4; };
recursion no;
+ dnssec-validation no;
notify yes;
filter-aaaa-on-v6 break-dnssec;
filter-aaaa { fd92:7065:b8e:ffff::4; };
rm -f ns*/named.lock
rm -f ns*/named.run
rm -f ns*/named.memstats
+rm -f ns*/managed-keys.bind*
rm -f */named.memstats
rm -f */named.run
rm -f ns*/named.lock
+rm -f ns*/managed-keys.bind*
listen-on { 10.53.0.1; };
listen-on-v6 { none; };
recursion no;
+ dnssec-validation no;
};
zone "." {
listen-on { 10.53.0.2; };
listen-on-v6 { none; };
recursion no;
+ dnssec-validation no;
};
zone "." {
listen-on-v6 { none; };
forwarders { 10.53.0.2; };
forward first;
+ dnssec-validation yes;
};
zone "." {
pid-file "named.pid";
listen-on { 10.53.0.4; };
listen-on-v6 { none; };
+ recursion yes;
+ dnssec-validation yes;
};
zone "." {
listen-on-v6 { none; };
forward only;
forwarders { 10.53.0.4; };
+ dnssec-validation yes;
};
zone "." {
rm -f ns?/named.run
rm -f ns?/named.memstats
rm -f ns*/named.lock
+rm -f ns*/managed-keys.bind* ns*/*.mkeys*
listen-on { 10.53.0.2; };
listen-on-v6 { none; };
recursion no;
+ dnssec-validation no;
geoip-directory "../data";
};
listen-on { 10.53.0.2; };
listen-on-v6 { none; };
recursion no;
+ dnssec-validation no;
geoip-directory "../data";
};
listen-on { 10.53.0.2; };
listen-on-v6 { none; };
recursion no;
+ dnssec-validation no;
geoip-directory "../data";
};
listen-on { 10.53.0.2; };
listen-on-v6 { none; };
recursion no;
+ dnssec-validation no;
geoip-directory "../data";
};
listen-on { 10.53.0.2; };
listen-on-v6 { none; };
recursion no;
+ dnssec-validation no;
geoip-directory "../data";
blackhole { blocking; };
};
listen-on { 127.0.0.1; 10.53.0.2; };
listen-on-v6 { none; };
recursion no;
+ dnssec-validation no;
geoip-directory "../data";
};
listen-on { 10.53.0.2; };
listen-on-v6 { fd92:7065:b8e:ffff::2; };
recursion no;
+ dnssec-validation no;
geoip-directory "../data2";
};
listen-on { 10.53.0.2; };
listen-on-v6 { none; };
recursion no;
+ dnssec-validation no;
geoip-directory "../data";
};
listen-on { 10.53.0.2; };
listen-on-v6 { none; };
recursion no;
+ dnssec-validation no;
geoip-directory "../data";
};
listen-on { 10.53.0.2; };
listen-on-v6 { none; };
recursion no;
+ dnssec-validation no;
geoip-directory "../data";
};
listen-on { 10.53.0.2; };
listen-on-v6 { none; };
recursion no;
+ dnssec-validation no;
geoip-directory "../data";
};
listen-on { 10.53.0.2; };
listen-on-v6 { fd92:7065:b8e:ffff::1; };
recursion no;
+ dnssec-validation no;
geoip-directory "../data";
};
listen-on { 10.53.0.2; };
listen-on-v6 { none; };
recursion no;
+ dnssec-validation no;
geoip-directory "../data";
};
listen-on { 10.53.0.2; };
listen-on-v6 { none; };
recursion no;
+ dnssec-validation no;
geoip-directory "../data";
};
listen-on { 10.53.0.2; };
listen-on-v6 { none; };
recursion no;
+ dnssec-validation no;
geoip-directory "../data";
};
rm -f */named.memstats
rm -f */named.run
rm -f ns*/named.lock
+rm -f ns*/managed-keys.bind*
rm -f */named.run
rm -f */named.memstats
rm -f ns*/named.lock
+rm -f ns*/managed-keys.bind*
rm -f */named.conf
rm -f dig.out.*
rm -f ns*/named.lock
+rm -f ns*/managed-keys.bind*
rm -f ns3/nzf-*
rm -f rndc.out.ns*
rm -rf ns3/removedkeys
+rm -f ns*/managed-keys.bind* ns*/*.mkeys*
rm -f */named.memstats
rm -f */named.conf
rm -f */named.run
+rm -f ns*/managed-keys.bind*
rm -f dig.out dig.out1 dig.out2 dig.out3
rm -f ns3/large.db
rm -f ns*/named.lock
+rm -f ns*/managed-keys.bind*
rm -f ns*/named.conf
rm -f ns*/named.stats
rm -f ns*/named.lock
+rm -f ns*/managed-keys.bind*
rm -f */K*.private
rm -f coverage.* keymgr.*
rm -f policy.out
+rm -f ns*/managed-keys.bind*
rm -f ns7/edns512-notcp.db
rm -f ns7/signer.err
rm -f ns7/trusted.conf
+rm -f ns*/managed-keys.bind*
listen-on { 10.53.0.1; };
listen-on-v6 { none; };
recursion yes;
+ dnssec-validation yes;
};
zone "." {
listen-on { 10.53.0.1; };
listen-on-v6 { none; };
recursion yes;
+ dnssec-validation yes;
};
zone "." {
listen-on { 10.53.0.2; };
listen-on-v6 { none; };
recursion no;
+ dnssec-validation no;
};
zone "dropedns" {
listen-on { 10.53.0.3; };
listen-on-v6 { none; };
recursion no;
+ dnssec-validation no;
};
zone "dropedns-notcp" {
listen-on { 10.53.0.4; };
listen-on-v6 { none; };
recursion no;
+ dnssec-validation no;
};
zone "plain" {
listen-on { 10.53.0.5; };
listen-on-v6 { none; };
recursion no;
+ dnssec-validation no;
};
zone "plain-notcp" {
listen-on { 10.53.0.6; };
listen-on-v6 { none; };
recursion no;
+ dnssec-validation no;
};
zone "edns512" {
listen-on { 10.53.0.7; };
listen-on-v6 { none; };
recursion no;
+ dnssec-validation no;
};
zone "edns512-notcp" {
rm -f */named.conf
rm -f */named.run
rm -f ns*/named.lock
+rm -f ns*/managed-keys.bind*
rm -f ns1/named_ts.*
rm -f ns1/named_unlimited
rm -f ns1/named_unlimited.*
+rm -f ns*/managed-keys.bind*
rm -f */named.run
rm -f ns*/named.lock
rm -f checkzone.out*
+rm -f ns*/managed-keys.bind*
rm -f ns1/Ksigned.* ns1/dsset-signed. ns1/signed.db.signed
rm -f rndc.out
rm -f ns*/named.lock
+rm -f ns*/managed-keys.bind*
rm -f */named.conf
rm -rf ns4/nope
rm -f ns5/named.args
+rm -f ns*/managed-keys.bind*
rm -f ns*/named.run
rm -f ns*/named.pid
rm -f ns*/named.conf
+rm -f ns*/managed-keys.bind* ns*/*.mkeys*
rm -f ns5/x21.bk-c.jnl
rm -f ns5/x21.db.jnl
rm -f tmp
+rm -f ns*/managed-keys.bind* ns*/*.mkeys*
rm -f ns*/named.memstats
rm -f ns*/named.run
rm -f ns*/named.conf
+rm -f ns*/managed-keys.bind*
rm -f update.out.*
rm -f check.out.*
rm -f update.out.*
+rm -f ns*/managed-keys.bind* ns*/*.mkeys*
rm -f rndc.out*
rm -f ns*/*.nzf
rm -f ns*/*.nzd ns*/*.nzd-lock
+rm -f ns*/managed-keys.bind*
rm -f ns*/named.stats
rm -f ns*/named.lock
rm -f ns*/named.conf
+rm -f ns*/managed-keys.bind*
rm -rf nsupdate.out.test
rm -f ns*/named.lock
rm -f ns*/named.conf
+rm -f ns*/managed-keys.bind*
rm -f */named.run
rm -f raw* output*
rm -f ns*/named.lock
+rm -f ns*/managed-keys.bind*
listen-on { 10.53.0.1; };
listen-on-v6 { none; };
recursion no;
+ dnssec-validation no;
notify yes;
};
listen-on { 10.53.0.2; };
listen-on-v6 { none; };
recursion yes;
+ dnssec-validation yes;
notify yes;
};
listen-on { 10.53.0.3; };
listen-on-v6 { none; };
recursion yes;
+ dnssec-validation yes;
notify yes;
};
listen-on-v6 { none; };
keep-response-order { 10.53.0.7/32; };
recursion yes;
+ dnssec-validation yes;
notify yes;
};
rm -f ns1/*.key ns1/named.memstats
rm -f supported
rm -f ns*/named.lock
+rm -f ns*/managed-keys.bind*
listen-on { 10.53.0.1; };
listen-on-v6 { none; };
recursion no;
+ dnssec-validation no;
notify no;
};
rm -f ns1/*.key ns1/named.memstats
rm -f supported
rm -f ns*/named.lock
+rm -f ns*/managed-keys.bind*
listen-on { 10.53.0.1; };
listen-on-v6 { none; };
recursion no;
+ dnssec-validation no;
notify no;
};
rm -f ns?/named.run
rm -f ns*/named.conf
rm -f ns*/named.lock
+rm -f ns*/managed-keys.bind*
listen-on { 10.53.0.1; };
listen-on-v6 { none; };
recursion no;
+ dnssec-validation no;
};
zone "." { type master; file "root.db"; };
listen-on-v6 { none; };
servfail-ttl 0;
max-recursion-depth 12;
+ recursion yes;
+ dnssec-validation yes;
};
key rndc_key {
listen-on-v6 { none; };
servfail-ttl 0;
max-recursion-depth 5;
+ recursion yes;
+ dnssec-validation yes;
};
key rndc_key {
servfail-ttl 0;
max-recursion-depth 100;
max-recursion-queries 50;
+ recursion yes;
+ dnssec-validation yes;
};
key rndc_key {
servfail-ttl 0;
max-recursion-depth 100;
max-recursion-queries 40;
+ recursion yes;
+ dnssec-validation yes;
};
key rndc_key {
rm -f ns3/signed.db*
rm -f ns4/*.db
rm -f rndc.out
+rm -f ns*/managed-keys.bind*
rm -f .digrc
rm -f ns*/named.lock
rm -f ns5/trusted.conf
+rm -f ns*/managed-keys.bind* ns*/*.mkeys*
listen-on { 10.53.0.1; };
listen-on-v6 { none; };
recursion yes;
+ dnssec-validation yes;
deny-answer-addresses { 192.0.2.0/24; 2001:db8:beef::/48; }
except-from { "example.org"; };
deny-answer-aliases { "example.org"; }
listen-on { 10.53.0.4; };
listen-on-v6 { none; };
recursion no;
- // minimal-responses yes;
+ dnssec-validation no;
/* test that named loads with root-delegation-only */
root-delegation-only;
};
listen-on { 10.53.0.5; };
listen-on-v6 { none; };
recursion yes;
+ dnssec-validation yes;
querylog yes;
};
listen-on { 10.53.0.6; };
listen-on-v6 { none; };
recursion no;
- // minimal-responses yes;
+ dnssec-validation no;
querylog yes;
/*
* test that named loads with root-delegation-only that
listen-on { 10.53.0.7; };
listen-on-v6 { none; };
recursion yes;
+ dnssec-validation yes;
empty-zones-enable yes;
disable-empty-zone 20.172.in-addr.arpa;
/*
listen-on { 10.53.0.7; };
listen-on-v6 { none; };
recursion yes;
+ dnssec-validation yes;
empty-zones-enable yes;
disable-empty-zone 20.172.in-addr.arpa;
/*
rm -f nsupdate.out.*.test*
rm -f python.out.*.test*
rm -f rndc.out.*.test*
+rm -f ns*/managed-keys.bind* ns*/*.mkeys*
rm -f ns2/Kexample.*
rm -f ns2/example.db
rm -f ns2/example.db.signed
+rm -f ns*/managed-keys.bind*
rm -f dnsrpzd.conf
rm -f dnsrpzd-license-cur.conf dnsrpzd.rpzf dnsrpzd.sock dnsrpzd.pid
rm -f tmp
+rm -f ns*/managed-keys.bind*
rm -f dnsrps*.conf dnsrpzd*
rm -f ns*/session.key
+rm -f ns*/managed-keys.bind* ns*/*.mkeys*
listen-on { 10.53.0.1; };
listen-on-v6 { none; };
recursion no;
+ dnssec-validation no;
querylog yes;
};
# policy zones to be tested
zone "clientip1" { type master; file "db.clientip1"; };
zone "clientip2" { type master; file "db.clientip2"; };
+
+ recursion yes;
+ dnssec-validation yes;
};
# policy zones to be tested
zone "clientip21" { type master; file "db.clientip21"; };
+
+ recursion yes;
+ dnssec-validation yes;
};
listen-on { 10.53.0.2; };
listen-on-v6 { none; };
recursion yes;
+ dnssec-validation yes;
querylog yes;
# let ns3 start dnsrpzd
type hint;
file "root.hint";
};
+
+ recursion yes;
+ dnssec-validation yes;
};
zone "log1" { type master; file "db.log1"; };
zone "log2" { type master; file "db.log2"; };
zone "log3" { type master; file "db.log3"; };
+
+ recursion yes;
+ dnssec-validation yes;
};
zone "max62" { type master; file "db.max62.local"; };
zone "max63" { type master; file "db.max63.local"; };
zone "max64" { type master; file "db.max64.local"; };
+
+ recursion yes;
+ dnssec-validation yes;
};
# policy zones to be tested
zone "wildcard1" { type master; file "db.wildcard1"; };
+
+ recursion yes;
+ dnssec-validation yes;
};
# policy zones to be tested
zone "wildcard2a" { type master; file "db.wildcard2a"; };
zone "wildcard2b" { type master; file "db.wildcard2b"; };
+
+ recursion yes;
+ dnssec-validation yes;
};
# policy zones to be tested
zone "wildcard3" { type master; file "db.wildcard3"; };
+
+ recursion yes;
+ dnssec-validation yes;
};
listen-on { 10.53.0.3; };
listen-on-v6 { none; };
recursion yes;
+ dnssec-validation yes;
response-policy { zone "policy"; }
qname-wait-recurse yes
nsip-enable yes
listen-on { 10.53.0.3; };
listen-on-v6 { none; };
recursion yes;
+ dnssec-validation yes;
response-policy { zone "policy"; } nsip-wait-recurse no
qname-wait-recurse yes
nsip-enable yes
listen-on { 10.53.0.4; };
listen-on-v6 { none; };
recursion no;
+ dnssec-validation no;
};
zone "child.example.tld" { type master; file "child.example.db"; };
rm -f ns*/named.lock
rm -f ns*/named.conf
rm -f broken.out
+rm -f ns*/managed-keys.bind*
listen-on { 10.53.0.1; };
listen-on-v6 { none; };
notify no;
+ recursion yes;
+ dnssec-validation yes;
};
zone "." {type master; file "root.db";};
listen-on { 10.53.0.2; };
listen-on-v6 { none; };
notify no;
+ recursion yes;
+ dnssec-validation yes;
rate-limit {
responses-per-second 2;
listen-on { 10.53.0.3; };
listen-on-v6 { none; };
notify no;
+ recursion yes;
+ dnssec-validation yes;
// check that all of the options are parsed without limiting anything
rate-limit {
listen-on { 10.53.0.4; };
listen-on-v6 { none; };
notify no;
+ recursion yes;
+ dnssec-validation yes;
rate-limit {
responses-per-second 2;
rm -f */named.memstats
rm -f ns*/named.lock
rm -f ns*/named.conf
+rm -f ns*/managed-keys.bind*
listen-on { 10.53.0.1; };
listen-on-v6 { none; };
recursion no;
+ dnssec-validation no;
notify no;
rrset-order {
name "fixed.example" order fixed;
listen-on { 10.53.0.2; };
listen-on-v6 { none; };
recursion no;
+ dnssec-validation no;
notify yes;
- // flush-zones-on-shutdown yes;
rrset-order {
name "fixed.example" order fixed;
name "random.example" order random;
listen-on { 10.53.0.3; };
listen-on-v6 { none; };
recursion yes;
+ dnssec-validation yes;
notify yes;
rrset-order {
name "fixed.example" order fixed;
listen-on { 10.53.0.4; };
listen-on-v6 { none; };
recursion yes;
+ dnssec-validation yes;
notify yes;
rrset-order {
class IN type A name "host.example.com" order random;
rm -f dig.out.*
rm -f ns*/named.lock
rm -f ns*/named.conf
+rm -f ns*/managed-keys.bind*
rm -f rndc.out*
[ -d ns2/nope ] && chmod 755 ns2/nope
rm -rf ns2/nope
+rm -f ns*/managed-keys.bind*
rm -f ns3/root.bk
rm -f rndc.out.test*
rm -f */named.run */named.memstats
+rm -f ns*/managed-keys.bind*
rm -f sfcache.*
rm -f ns*/named.lock
rm -f ns5/named.run.part*
+rm -f ns*/managed-keys.bind*
rm -f */named.run
rm -f */named.conf
rm -f ns*/named.lock
+rm -f ns*/managed-keys.bind*
rm -f ns1/named.memstats
rm -f ns*/named.lock
rm -f ns*/named.conf
+rm -f ns*/managed-keys.bind*
rm -rf */K*
rm -rf */dsset-*
rm -rf */trusted.conf
+rm -f ns*/managed-keys.bind*
listen-on { 10.53.0.1; };
listen-on-v6 { none; };
recursion no;
+ dnssec-validation no;
notify no;
};
listen-on { 10.53.0.2; };
listen-on-v6 { none; };
recursion yes;
+ dnssec-validation yes;
notify no;
};
listen-on { 10.53.0.3; };
listen-on-v6 { none; };
recursion no;
+ dnssec-validation no;
notify no;
};
listen-on { 10.53.0.4; };
listen-on-v6 { ::1; };
recursion no;
+ dnssec-validation no;
notify no;
};
rm -f curl.out.*
rm -f ns*/named.lock
rm -f stats*out
+rm -f ns*/managed-keys.bind*
listen-on { 10.53.0.1; };
listen-on-v6 { none; };
recursion no;
+ dnssec-validation no;
notify yes;
};
listen-on { 10.53.0.2; };
listen-on-v6 { none; };
recursion yes;
+ dnssec-validation yes;
notify yes;
};
listen-on { 10.53.0.3; };
listen-on-v6 { none; };
recursion yes;
+ dnssec-validation yes;
notify yes;
};
rm -f xml.*stats json.*stats
rm -f xml.*mem json.*mem
rm -f compressed.headers regular.headers compressed.out regular.out
+rm -f ns*/managed-keys.bind*
rm -f ns2/zone0*.jnl
rm -f */named.memstats
rm -f ns*/named.lock
+rm -f ns*/managed-keys.bind*
listen-on { 10.53.0.1; };
listen-on-v6 { none; };
recursion no;
+ dnssec-validation no;
notify yes;
};
listen-on { 10.53.0.2; };
listen-on-v6 { none; };
recursion no;
+ dnssec-validation no;
notify yes;
};
listen-on { 10.53.0.3; };
listen-on-v6 { none; };
recursion yes;
+ dnssec-validation yes;
notify yes;
};
listen-on { 10.53.0.4; };
listen-on-v6 { none; };
recursion yes;
+ dnssec-validation yes;
notify yes;
};
rm -f */named.conf
rm -f */named.run
rm -f ns*/named.lock
+rm -f ns*/managed-keys.bind*
rm -f ns1/root.db.signed
rm -f ns1/trusted.conf
rm -f ns2/named_dump.db
+rm -f ns*/managed-keys.bind*
rm -f */named.stats
rm -f dig.out*
rm -f ns*/named.lock
+rm -f ns*/managed-keys.bind*
rm -f */named.run
rm -f ns1/_default.tsigkeys
rm -f ns*/named.lock
+rm -f ns*/managed-keys.bind*
rm -f ns*/named.lock
rm -f Kexample.net.*
rm -f keygen.out?
+rm -f ns*/managed-keys.bind*
rm -f ns1/core
rm -f nsupdate.out
rm -f ns*/named.lock
+rm -f ns*/managed-keys.bind*
rm -f */*.bk.*
rm -f ns3/Kexample.*
rm -f ns*/named.lock
+rm -f ns*/managed-keys.bind* ns*/*.mkeys*
rm -f keyname
rm -f ns*/named.lock
rm -f ns1/example2.db
+rm -f ns*/managed-keys.bind*
rm -f ns2/internal/inline.db.signed.jnl
rm -f dig.out.external dig.out.internal
rm -f ns*/named.lock
+rm -f ns*/managed-keys.bind* ns*/*.mkeys*
rm -f */named.memstats
rm -f dig.out.ns*.test*
rm -f ns*/named.lock
+rm -f ns*/managed-keys.bind*
listen-on { 10.53.0.1; };
listen-on-v6 { none; };
recursion no;
+ dnssec-validation no;
notify yes;
dnssec-enable yes;
};
listen-on { 10.53.0.2; };
listen-on-v6 { none; };
recursion yes;
+ dnssec-validation no;
notify yes;
};
listen-on { 10.53.0.3; };
listen-on-v6 { none; };
recursion yes;
+ dnssec-validation yes;
notify yes;
};
listen-on { 10.53.0.4; };
listen-on-v6 { none; };
recursion yes;
+ dnssec-validation yes;
notify yes;
forward only;
forwarders { 10.53.0.2; };
listen-on { 10.53.0.5; };
listen-on-v6 { none; };
recursion yes;
+ dnssec-validation yes;
notify yes;
dnssec-lookaside . trust-anchor dlv;
};
rm -f ns2/mapped.db
rm -f ns3/mapped.bk
rm -f ns1/ixfr-too-big.db ns1/ixfr-too-big.db.jnl
+rm -f ns*/managed-keys.bind*
rm -f */named.conf
rm -f */named.run
rm -f ns*/named.lock
+rm -f ns*/managed-keys.bind*
rm -f dig.out*
rm -f query.list
rm -f ns*/named.lock
+rm -f ns*/managed-keys.bind*
listen-on { 10.53.0.1; };
listen-on-v6 { none; };
recursion no;
+ dnssec-validation no;
};
zone "." {
listen-on { 10.53.0.2; };
listen-on-v6 { none; };
recursion no;
+ dnssec-validation no;
};
zone "example" {
listen-on { 10.53.0.3; };
listen-on-v6 { none; };
recursion yes;
+ dnssec-validation yes;
};
zone "." {
listen-on { 10.53.0.4; };
listen-on-v6 { none; };
recursion no;
+ dnssec-validation yes;
};
zone "example" {
rm -f */signer.err
rm -f rndc.out.*
rm -f ns*/named.lock
+rm -f ns*/managed-keys.bind* ns*/*.mkeys*