3 # Copyright (C) 2004, 2007, 2009-2014 Internet Systems Consortium, Inc. ("ISC")
4 # Copyright (C) 2000, 2001 Internet Software Consortium.
6 # Permission to use, copy, modify, and/or distribute this software for any
7 # purpose with or without fee is hereby granted, provided that the above
8 # copyright notice and this permission notice appear in all copies.
10 # THE SOFTWARE IS PROVIDED "AS IS" AND ISC DISCLAIMS ALL WARRANTIES WITH
11 # REGARD TO THIS SOFTWARE INCLUDING ALL IMPLIED WARRANTIES OF MERCHANTABILITY
12 # AND FITNESS. IN NO EVENT SHALL ISC BE LIABLE FOR ANY SPECIAL, DIRECT,
13 # INDIRECT, OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES WHATSOEVER RESULTING FROM
14 # LOSS OF USE, DATA OR PROFITS, WHETHER IN AN ACTION OF CONTRACT, NEGLIGENCE
15 # OR OTHER TORTIOUS ACTION, ARISING OUT OF OR IN CONNECTION WITH THE USE OR
16 # PERFORMANCE OF THIS SOFTWARE.
18 # Id: tests.sh,v 1.22 2012/02/09 23:47:18 tbox Exp
21 .
$SYSTEMTESTTOP/conf.sh
26 echo "I:checking non-cachable NXDOMAIN response handling"
28 $DIG +tcp nxdomain.example.net @
10.53.0.1 a
-p 5300 > dig.out || ret
=1
29 grep "status: NXDOMAIN" dig.out
> /dev
/null || ret
=1
30 if [ $ret != 0 ]; then echo "I:failed"; fi
31 status
=`expr $status + $ret`
33 if [ -x ${RESOLVE} ] ; then
34 echo "I:checking non-cachable NXDOMAIN response handling using dns_client"
36 ${RESOLVE} -p 5300 -t a
-s 10.53.0.1 nxdomain.example.net
2> resolve.out || ret
=1
37 grep "resolution failed: ncache nxdomain" resolve.out
> /dev
/null || ret
=1
38 if [ $ret != 0 ]; then echo "I:failed"; fi
39 status
=`expr $status + $ret`
42 if [ -x ${RESOLVE} ] ; then
43 echo "I:checking that local bound address can be set (Can't query from a denied address)"
45 ${RESOLVE} -b 10.53.0.8 -p 5300 -t a
-s 10.53.0.1 www.example.org
2> resolve.out || ret
=1
46 grep "resolution failed: failure" resolve.out
> /dev
/null || ret
=1
47 if [ $ret != 0 ]; then echo "I:failed"; fi
48 status
=`expr $status + $ret`
50 echo "I:checking that local bound address can be set (Can query from an allowed address)"
52 ${RESOLVE} -b 10.53.0.1 -p 5300 -t a
-s 10.53.0.1 www.example.org
> resolve.out || ret
=1
53 grep "www.example.org..*.192.0.2.1" resolve.out
> /dev
/null || ret
=1
54 if [ $ret != 0 ]; then echo "I:failed"; fi
55 status
=`expr $status + $ret`
58 echo "I:checking non-cachable NODATA response handling"
60 $DIG +tcp nodata.example.net @
10.53.0.1 a
-p 5300 > dig.out || ret
=1
61 grep "status: NOERROR" dig.out
> /dev
/null || ret
=1
62 if [ $ret != 0 ]; then echo "I:failed"; fi
63 status
=`expr $status + $ret`
65 if [ -x ${RESOLVE} ] ; then
66 echo "I:checking non-cachable NODATA response handling using dns_client"
68 ${RESOLVE} -p 5300 -t a
-s 10.53.0.1 nodata.example.net
2> resolve.out || ret
=1
69 grep "resolution failed: ncache nxrrset" resolve.out
> /dev
/null || ret
=1
70 if [ $ret != 0 ]; then echo "I:failed"; fi
71 status
=`expr $status + $ret`
74 echo "I:checking handling of bogus referrals"
75 # If the server has the "INSIST(!external)" bug, this query will kill it.
76 $DIG +tcp www.example.com. a @
10.53.0.1 -p 5300 >/dev
/null || status
=1
78 if [ -x ${RESOLVE} ] ; then
79 echo "I:checking handling of bogus referrals using dns_client"
81 ${RESOLVE} -p 5300 -t a
-s 10.53.0.1 www.example.com
2> resolve.out || ret
=1
82 grep "resolution failed: failure" resolve.out
> /dev
/null || ret
=1
83 if [ $ret != 0 ]; then echo "I:failed"; fi
84 status
=`expr $status + $ret`
87 echo "I:check handling of cname + other data / 1"
88 $DIG +tcp cname1.example.com. a @
10.53.0.1 -p 5300 >/dev
/null || status
=1
90 echo "I:check handling of cname + other data / 2"
91 $DIG +tcp cname2.example.com. a @
10.53.0.1 -p 5300 >/dev
/null || status
=1
93 echo "I:check that server is still running"
94 $DIG +tcp www.example.com. a @
10.53.0.1 -p 5300 >/dev
/null || status
=1
96 echo "I:checking answer IPv4 address filtering (deny)"
98 $DIG +tcp www.example.net @
10.53.0.1 a
-p 5300 > dig.out || ret
=1
99 grep "status: SERVFAIL" dig.out
> /dev
/null || ret
=1
100 if [ $ret != 0 ]; then echo "I:failed"; fi
101 status
=`expr $status + $ret`
103 echo "I:checking answer IPv6 address filtering (deny)"
105 $DIG +tcp www.example.net @
10.53.0.1 aaaa
-p 5300 > dig.out || ret
=1
106 grep "status: SERVFAIL" dig.out
> /dev
/null || ret
=1
107 if [ $ret != 0 ]; then echo "I:failed"; fi
108 status
=`expr $status + $ret`
110 echo "I:checking answer IPv4 address filtering (accept)"
112 $DIG +tcp www.example.org @
10.53.0.1 a
-p 5300 > dig.out || ret
=1
113 grep "status: NOERROR" dig.out
> /dev
/null || ret
=1
114 if [ $ret != 0 ]; then echo "I:failed"; fi
115 status
=`expr $status + $ret`
118 if [ -x ${RESOLVE} ] ; then
119 echo "I:checking answer IPv4 address filtering using dns_client (accept)"
121 ${RESOLVE} -p 5300 -t a
-s 10.53.0.1 www.example.org
> resolve.out || ret
=1
122 grep "www.example.org..*.192.0.2.1" resolve.out
> /dev
/null || ret
=1
123 if [ $ret != 0 ]; then echo "I:failed"; fi
124 status
=`expr $status + $ret`
127 echo "I:checking answer IPv6 address filtering (accept)"
129 $DIG +tcp www.example.org @
10.53.0.1 aaaa
-p 5300 > dig.out || ret
=1
130 grep "status: NOERROR" dig.out
> /dev
/null || ret
=1
131 if [ $ret != 0 ]; then echo "I:failed"; fi
132 status
=`expr $status + $ret`
134 if [ -x ${RESOLVE} ] ; then
135 echo "I:checking answer IPv6 address filtering using dns_client (accept)"
137 ${RESOLVE} -p 5300 -t aaaa
-s 10.53.0.1 www.example.org
> resolve.out || ret
=1
138 grep "www.example.org..*.2001:db8:beef::1" resolve.out
> /dev
/null || ret
=1
139 if [ $ret != 0 ]; then echo "I:failed"; fi
140 status
=`expr $status + $ret`
143 echo "I:checking CNAME target filtering (deny)"
145 $DIG +tcp badcname.example.net @
10.53.0.1 a
-p 5300 > dig.out || ret
=1
146 grep "status: SERVFAIL" dig.out
> /dev
/null || ret
=1
147 if [ $ret != 0 ]; then echo "I:failed"; fi
148 status
=`expr $status + $ret`
150 echo "I:checking CNAME target filtering (accept)"
152 $DIG +tcp goodcname.example.net @
10.53.0.1 a
-p 5300 > dig.out || ret
=1
153 grep "status: NOERROR" dig.out
> /dev
/null || ret
=1
154 if [ $ret != 0 ]; then echo "I:failed"; fi
155 status
=`expr $status + $ret`
157 if [ -x ${RESOLVE} ] ; then
158 echo "I:checking CNAME target filtering using dns_client (accept)"
160 ${RESOLVE} -p 5300 -t a
-s 10.53.0.1 goodcname.example.net
> resolve.out || ret
=1
161 grep "goodcname.example.net..*.goodcname.example.org." resolve.out
> /dev
/null || ret
=1
162 grep "goodcname.example.org..*.192.0.2.1" resolve.out
> /dev
/null || ret
=1
163 if [ $ret != 0 ]; then echo "I:failed"; fi
164 status
=`expr $status + $ret`
167 echo "I:checking CNAME target filtering (accept due to subdomain)"
169 $DIG +tcp cname.sub.example.org @
10.53.0.1 a
-p 5300 > dig.out || ret
=1
170 grep "status: NOERROR" dig.out
> /dev
/null || ret
=1
171 if [ $ret != 0 ]; then echo "I:failed"; fi
172 status
=`expr $status + $ret`
174 if [ -x ${RESOLVE} ] ; then
175 echo "I:checking CNAME target filtering using dns_client (accept due to subdomain)"
177 ${RESOLVE} -p 5300 -t a
-s 10.53.0.1 cname.sub.example.org
> resolve.out || ret
=1
178 grep "cname.sub.example.org..*.ok.sub.example.org." resolve.out
> /dev
/null || ret
=1
179 grep "ok.sub.example.org..*.192.0.2.1" resolve.out
> /dev
/null || ret
=1
180 if [ $ret != 0 ]; then echo "I:failed"; fi
181 status
=`expr $status + $ret`
184 echo "I:checking DNAME target filtering (deny)"
186 $DIG +tcp foo.baddname.example.net @
10.53.0.1 a
-p 5300 > dig.out || ret
=1
187 grep "status: SERVFAIL" dig.out
> /dev
/null || ret
=1
188 if [ $ret != 0 ]; then echo "I:failed"; fi
189 status
=`expr $status + $ret`
191 echo "I:checking DNAME target filtering (accept)"
193 $DIG +tcp foo.gooddname.example.net @
10.53.0.1 a
-p 5300 > dig.out || ret
=1
194 grep "status: NOERROR" dig.out
> /dev
/null || ret
=1
195 if [ $ret != 0 ]; then echo "I:failed"; fi
196 status
=`expr $status + $ret`
198 if [ -x ${RESOLVE} ] ; then
199 echo "I:checking DNAME target filtering using dns_client (accept)"
201 ${RESOLVE} -p 5300 -t a
-s 10.53.0.1 foo.gooddname.example.net
> resolve.out || ret
=1
202 grep "foo.gooddname.example.net..*.gooddname.example.org" resolve.out
> /dev
/null || ret
=1
203 grep "foo.gooddname.example.org..*.192.0.2.1" resolve.out
> /dev
/null || ret
=1
204 if [ $ret != 0 ]; then echo "I:failed"; fi
205 status
=`expr $status + $ret`
208 echo "I:checking DNAME target filtering (accept due to subdomain)"
210 $DIG +tcp www.dname.sub.example.org @
10.53.0.1 a
-p 5300 > dig.out || ret
=1
211 grep "status: NOERROR" dig.out
> /dev
/null || ret
=1
212 if [ $ret != 0 ]; then echo "I:failed"; fi
213 status
=`expr $status + $ret`
215 if [ -x ${RESOLVE} ] ; then
216 echo "I:checking DNAME target filtering using dns_client (accept due to subdomain)"
218 ${RESOLVE} -p 5300 -t a
-s 10.53.0.1 www.dname.sub.example.org
> resolve.out || ret
=1
219 grep "www.dname.sub.example.org..*.ok.sub.example.org." resolve.out
> /dev
/null || ret
=1
220 grep "www.ok.sub.example.org..*.192.0.2.1" resolve.out
> /dev
/null || ret
=1
221 if [ $ret != 0 ]; then echo "I:failed"; fi
222 status
=`expr $status + $ret`
226 echo "I: RT21594 regression test check setup ($n)"
228 # Check that "aa" is not being set by the authoritative server.
229 $DIG +tcp . @
10.53.0.4 soa
-p 5300 > dig.ns4.out.
${n} || ret
=1
230 grep 'flags: qr rd;' dig.ns4.out.
${n} > /dev
/null || ret
=1
231 if [ $ret != 0 ]; then echo "I:failed"; fi
232 status
=`expr $status + $ret`
235 echo "I: RT21594 regression test positive answers ($n)"
237 # Check that resolver accepts the non-authoritative positive answers.
238 $DIG +tcp . @
10.53.0.5 soa
-p 5300 > dig.ns5.out.
${n} || ret
=1
239 grep "status: NOERROR" dig.ns5.out.
${n} > /dev
/null || ret
=1
240 if [ $ret != 0 ]; then echo "I:failed"; fi
241 status
=`expr $status + $ret`
244 echo "I: RT21594 regression test NODATA answers ($n)"
246 # Check that resolver accepts the non-authoritative nodata answers.
247 $DIG +tcp . @
10.53.0.5 txt
-p 5300 > dig.ns5.out.
${n} || ret
=1
248 grep "status: NOERROR" dig.ns5.out.
${n} > /dev
/null || ret
=1
249 if [ $ret != 0 ]; then echo "I:failed"; fi
250 status
=`expr $status + $ret`
253 echo "I: RT21594 regression test NXDOMAIN answers ($n)"
255 # Check that resolver accepts the non-authoritative positive answers.
256 $DIG +tcp noexistant @
10.53.0.5 txt
-p 5300 > dig.ns5.out.
${n} || ret
=1
257 grep "status: NXDOMAIN" dig.ns5.out.
${n} > /dev
/null || ret
=1
258 if [ $ret != 0 ]; then echo "I:failed"; fi
259 status
=`expr $status + $ret`
262 echo "I:check that replacement of additional data by a negative cache no data entry clears the additional RRSIGs ($n)"
264 $DIG +tcp mx example.net @
10.53.0.7 -p 5300 > dig.ns7.out.
${n} || ret
=1
265 grep "status: NOERROR" dig.ns7.out.
${n} > /dev
/null || ret
=1
266 if [ $ret = 1 ]; then echo "I:mx priming failed"; fi
268 server 10.53.0.6 5300
270 update delete mail.example.net A
271 update add mail.example.net 0 AAAA ::1
274 $DIG +tcp a
mail.example.net @
10.53.0.7 -p 5300 > dig.ns7.out.
${n} || ret
=2
275 grep "status: NOERROR" dig.ns7.out.
${n} > /dev
/null || ret
=2
276 grep "ANSWER: 0" dig.ns7.out.
${n} > /dev
/null || ret
=2
277 if [ $ret = 2 ]; then echo "I:ncache priming failed"; fi
278 $DIG +tcp mx example.net @
10.53.0.7 -p 5300 > dig.ns7.out.
${n} || ret
=3
279 grep "status: NOERROR" dig.ns7.out.
${n} > /dev
/null || ret
=3
280 $DIG +tcp rrsig
mail.example.net
+norec @
10.53.0.7 -p 5300 > dig.ns7.out.
${n} || ret
=4
281 grep "status: NOERROR" dig.ns7.out.
${n} > /dev
/null || ret
=4
282 grep "ANSWER: 0" dig.ns7.out.
${n} > /dev
/null || ret
=4
283 if [ $ret != 0 ]; then echo "I:failed"; ret
=1; fi
284 status
=`expr $status + $ret`
286 if [ $ret != 0 ]; then echo "I:failed"; ret
=1; fi
287 status
=`expr $status + $ret`
290 echo "I:checking that update a nameservers address has immediate effects ($n)"
292 $DIG +tcp TXT foo.moves @
10.53.0.7 -p 5300 > dig.ns7.foo.
${n} || ret
=1
293 grep "From NS 5" dig.ns7.foo.
${n} > /dev
/null || ret
=1
295 server 10.53.0.7 5300
297 update delete ns.server A
298 update add ns.server 300 A 10.53.0.4
302 $DIG +tcp TXT bar.moves @
10.53.0.7 -p 5300 > dig.ns7.bar.
${n} || ret
=1
303 grep "From NS 4" dig.ns7.bar.
${n} > /dev
/null || ret
=1
305 if [ $ret != 0 ]; then echo "I:failed"; status
=1; fi
308 echo "I:checking that update a nameservers glue has immediate effects ($n)"
310 $DIG +tcp TXT foo.child.server @
10.53.0.7 -p 5300 > dig.ns7.foo.
${n} || ret
=1
311 grep "From NS 5" dig.ns7.foo.
${n} > /dev
/null || ret
=1
313 server 10.53.0.7 5300
315 update delete ns.child.server A
316 update add ns.child.server 300 A 10.53.0.4
320 $DIG +tcp TXT bar.child.server @
10.53.0.7 -p 5300 > dig.ns7.bar.
${n} || ret
=1
321 grep "From NS 4" dig.ns7.bar.
${n} > /dev
/null || ret
=1
323 if [ $ret != 0 ]; then echo "I:failed"; status
=1; fi
326 echo "I:checking empty RFC 1918 reverse zones ($n)"
328 # Check that "aa" is being set by the resolver for RFC 1918 zones
329 # except the one that has been deliberately disabled
330 $DIG @
10.53.0.7 -p 5300 -x 10.1.1.1 > dig.ns4.out
.1.
${n} || ret
=1
331 grep 'flags: qr aa rd ra;' dig.ns4.out
.1.
${n} > /dev
/null || ret
=1
332 $DIG @
10.53.0.7 -p 5300 -x 192.168.1.1 > dig.ns4.out
.2.
${n} || ret
=1
333 grep 'flags: qr aa rd ra;' dig.ns4.out
.2.
${n} > /dev
/null || ret
=1
334 $DIG @
10.53.0.7 -p 5300 -x 172.16.1.1 > dig.ns4.out
.3.
${n} || ret
=1
335 grep 'flags: qr aa rd ra;' dig.ns4.out
.3.
${n} > /dev
/null || ret
=1
336 $DIG @
10.53.0.7 -p 5300 -x 172.17.1.1 > dig.ns4.out
.4.
${n} || ret
=1
337 grep 'flags: qr aa rd ra;' dig.ns4.out
.4.
${n} > /dev
/null || ret
=1
338 $DIG @
10.53.0.7 -p 5300 -x 172.18.1.1 > dig.ns4.out
.5.
${n} || ret
=1
339 grep 'flags: qr aa rd ra;' dig.ns4.out
.5.
${n} > /dev
/null || ret
=1
340 $DIG @
10.53.0.7 -p 5300 -x 172.19.1.1 > dig.ns4.out
.6.
${n} || ret
=1
341 grep 'flags: qr aa rd ra;' dig.ns4.out
.6.
${n} > /dev
/null || ret
=1
342 $DIG @
10.53.0.7 -p 5300 -x 172.21.1.1 > dig.ns4.out
.7.
${n} || ret
=1
343 grep 'flags: qr aa rd ra;' dig.ns4.out
.7.
${n} > /dev
/null || ret
=1
344 $DIG @
10.53.0.7 -p 5300 -x 172.22.1.1 > dig.ns4.out
.8.
${n} || ret
=1
345 grep 'flags: qr aa rd ra;' dig.ns4.out
.8.
${n} > /dev
/null || ret
=1
346 $DIG @
10.53.0.7 -p 5300 -x 172.23.1.1 > dig.ns4.out
.9.
${n} || ret
=1
347 grep 'flags: qr aa rd ra;' dig.ns4.out
.9.
${n} > /dev
/null || ret
=1
348 $DIG @
10.53.0.7 -p 5300 -x 172.24.1.1 > dig.ns4.out
.11.
${n} || ret
=1
349 grep 'flags: qr aa rd ra;' dig.ns4.out
.11.
${n} > /dev
/null || ret
=1
350 $DIG @
10.53.0.7 -p 5300 -x 172.25.1.1 > dig.ns4.out
.12.
${n} || ret
=1
351 grep 'flags: qr aa rd ra;' dig.ns4.out
.12.
${n} > /dev
/null || ret
=1
352 $DIG @
10.53.0.7 -p 5300 -x 172.26.1.1 > dig.ns4.out
.13.
${n} || ret
=1
353 grep 'flags: qr aa rd ra;' dig.ns4.out
.13.
${n} > /dev
/null || ret
=1
354 $DIG @
10.53.0.7 -p 5300 -x 172.27.1.1 > dig.ns4.out
.14.
${n} || ret
=1
355 grep 'flags: qr aa rd ra;' dig.ns4.out
.14.
${n} > /dev
/null || ret
=1
356 $DIG @
10.53.0.7 -p 5300 -x 172.28.1.1 > dig.ns4.out
.15.
${n} || ret
=1
357 grep 'flags: qr aa rd ra;' dig.ns4.out
.15.
${n} > /dev
/null || ret
=1
358 $DIG @
10.53.0.7 -p 5300 -x 172.29.1.1 > dig.ns4.out
.16.
${n} || ret
=1
359 grep 'flags: qr aa rd ra;' dig.ns4.out
.16.
${n} > /dev
/null || ret
=1
360 $DIG @
10.53.0.7 -p 5300 -x 172.30.1.1 > dig.ns4.out
.17.
${n} || ret
=1
361 grep 'flags: qr aa rd ra;' dig.ns4.out
.17.
${n} > /dev
/null || ret
=1
362 $DIG @
10.53.0.7 -p 5300 -x 172.31.1.1 > dig.ns4.out
.18.
${n} || ret
=1
363 grep 'flags: qr aa rd ra;' dig.ns4.out
.18.
${n} > /dev
/null || ret
=1
364 # but this one should NOT be authoritative
365 $DIG @
10.53.0.7 -p 5300 -x 172.20.1.1 > dig.ns4.out
.19.
${n} || ret
=1
366 grep 'flags: qr rd ra;' dig.ns4.out
.19.
${n} > /dev
/null || ret
=1
367 if [ $ret != 0 ]; then echo "I:failed"; status
=1; fi
370 echo "I:checking that removal of a delegation is honoured ($n)"
372 $DIG -p 5300 @
10.53.0.5 www.to-be-removed.tld A
> dig.ns5.prime.
${n}
373 grep "status: NOERROR" dig.ns5.prime.
${n} > /dev
/null ||
{ ret
=1; echo "I: priming failed"; }
374 cp ns
4/tld2.db ns
4/tld.db
375 ($RNDC -c ..
/common
/rndc.conf
-s 10.53.0.4 -p 9953 reload tld
2>&1 ) |
376 sed -e '/reload queued/d' -e 's/^/I:ns4 /'
378 for i
in 0 1 2 3 4 5 6 7 8 9
381 $DIG -p 5300 @
10.53.0.5 ns
$i.to-be-removed.tld A
> /dev
/null
382 $DIG -p 5300 @
10.53.0.5 www.to-be-removed.tld A
> dig.ns5.out.
${n}
383 grep "status: NXDOMAIN" dig.ns5.out.
${n} > /dev
/null || foo
=1
384 [ $foo = 0 ] && break
386 server 10.53.0.6 5300
387 zone to-be-removed.tld
388 update add to-be-removed.tld 100 NS ns${i}.to-be-removed.tld
389 update delete to-be-removed.tld NS ns${old}.to-be-removed.tld
395 [ $ret = 0 ] && ret
=$foo;
396 if [ $ret != 0 ]; then echo "I:failed"; status
=1; fi
399 echo "I:check for improved error message with SOA mismatch ($n)"
401 $DIG @
10.53.0.1 -p 5300 www.sub.broken aaaa
> dig.out.
${n} || ret
=1
402 grep "not subdomain of zone" ns
1/named.run
> /dev
/null || ret
=1
403 if [ $ret != 0 ]; then echo "I:failed"; fi
404 status
=`expr $status + $ret`
406 cp ns
7/named2.conf ns
7/named.conf
407 $RNDC -c ..
/common
/rndc.conf
-s 10.53.0.7 -p 9953 reconfig
2>&1 |
sed 's/^/I:ns7 /'
410 echo "I:check resolution on the listening port ($n)"
412 $DIG +tcp
+tries
=2 +time=5 mx example.net @
10.53.0.7 -p 5300 > dig.ns7.out.
${n} || ret
=2
413 grep "status: NOERROR" dig.ns7.out.
${n} > /dev
/null || ret
=1
414 grep "ANSWER: 1" dig.ns7.out.
${n} > /dev
/null || ret
=1
415 if [ $ret != 0 ]; then echo "I:failed"; ret
=1; fi
416 status
=`expr $status + $ret`
419 echo "I:check prefetch (${n})"
421 $DIG @
10.53.0.5 -p 5300 fetch.tld txt
> dig.out
.1.
${n} || ret
=1
422 ttl1
=`awk '/"A" "short" "ttl"/ { print $2 - 2 }' dig.out.1.${n}`
423 # sleep so we are in prefetch range
426 $DIG @
10.53.0.5 -p 5300 fetch.tld txt
> dig.out
.2.
${n} || ret
=1
427 ttl2
=`awk '/"A" "short" "ttl"/ { print $2 }' dig.out.2.${n}`
429 # check that prefetch occured
430 $DIG @
10.53.0.5 -p 5300 fetch.tld txt
> dig.out
.3.
${n} || ret
=1
431 ttl
=`awk '/"A" "short" "ttl"/ { print $2 }' dig.out.3.${n}`
432 test ${ttl:-0} -gt ${ttl2:-1} || ret
=1
433 if [ $ret != 0 ]; then echo "I:failed"; fi
434 status
=`expr $status + $ret`
437 echo "I:check prefetch disabled (${n})"
439 $DIG @
10.53.0.7 -p 5300 fetch.example.net txt
> dig.out
.1.
${n} || ret
=1
440 ttl1
=`awk '/"A" "short" "ttl"/ { print $2 - 1 }' dig.out.1.${n}`
441 # sleep so we are in expire range
443 # look for zero ttl, allow for one miss at getting zero ttl
444 zerotonine
="0 1 2 3 4 5 6 7 8 9"
445 for i
in $zerotonine $zerotonine $zerotonine $zerotonine
447 $DIG @
10.53.0.7 -p 5300 fetch.example.net txt
> dig.out
.2.
${n} || ret
=1
448 ttl2
=`awk '/"A" "short" "ttl"/ { print $2 }' dig.out.2.${n}`
449 test ${ttl2:-1} -eq 0 && break
450 $PERL -e 'select(undef, undef, undef, 0.05);'
452 test ${ttl2:-1} -eq 0 || ret
=1
453 # delay so that any prefetched record will have a lower ttl than expected
455 # check that prefetch has not occured
456 $DIG @
10.53.0.7 -p 5300 fetch.example.net txt
> dig.out
.3.
${n} || ret
=1
457 ttl
=`awk '/"A" "short" "ttl"/ { print $2 - 1 }' dig.out.3.${n}`
458 test ${ttl:-0} -eq ${ttl1:-1} || ret
=1
459 if [ $ret != 0 ]; then echo "I:failed"; fi
460 status
=`expr $status + $ret`
463 echo "I:check prefetch qtype * (${n})"
465 $DIG @
10.53.0.5 -p 5300 fetchall.tld any
> dig.out
.1.
${n} || ret
=1
466 ttl1
=`awk '/"A" "short" "ttl"/ { print $2 - 2 }' dig.out.1.${n}`
467 # sleep so we are in prefetch range
470 $DIG @
10.53.0.5 -p 5300 fetchall.tld any
> dig.out
.2.
${n} || ret
=1
471 ttl2
=`awk '/"A" "short" "ttl"/ { print $2 }' dig.out.2.${n}`
473 # check that the nameserver is still alive
474 $DIG @
10.53.0.5 -p 5300 fetchall.tld any
> dig.out
.3.
${n} || ret
=1
475 if [ $ret != 0 ]; then echo "I:failed"; fi
476 status
=`expr $status + $ret`
479 echo "I:check that E was logged on EDNS queries in the query log (${n})"
481 $DIG @
10.53.0.5 -p 5300 +edns edns.fetchall.tld any
> dig.out
.2.
${n} || ret
=1
482 grep "query: edns.fetchall.tld IN ANY +E" ns
5/named.run
> /dev
/null || ret
=1
483 $DIG @
10.53.0.5 -p 5300 +noedns noedns.fetchall.tld any
> dig.out
.2.
${n} || ret
=1
484 grep "query: noedns.fetchall.tld IN ANY" ns
5/named.run
> /dev
/null || ret
=1
485 grep "query: noedns.fetchall.tld IN ANY +E" ns
5/named.run
> /dev
/null
&& ret
=1
486 if [ $ret != 0 ]; then echo "I:failed"; fi
487 status
=`expr $status + $ret`
490 echo "I:check that '-t aaaa' in .digrc does not have unexpected side effects ($n)"
492 echo "-t aaaa" > .digrc
493 env HOME
=`pwd` $DIG @
10.53.0.4 -p 5300 .
> dig.out
.1.
${n} || ret
=1
494 env HOME
=`pwd` $DIG @
10.53.0.4 -p 5300 . A
> dig.out
.2.
${n} || ret
=1
495 env HOME
=`pwd` $DIG @
10.53.0.4 -p 5300 -x 127.0.0.1 > dig.out
.3.
${n} || ret
=1
496 grep ';\..*IN.*AAAA$' dig.out
.1.
${n} > /dev
/null || ret
=1
497 grep ';\..*IN.*A$' dig.out
.2.
${n} > /dev
/null || ret
=1
498 grep 'extra type option' dig.out
.2.
${n} > /dev
/null
&& ret
=1
499 grep ';1\.0\.0\.127\.in-addr\.arpa\..*IN.*PTR$' dig.out
.3.
${n} > /dev
/null || ret
=1
500 if [ $ret != 0 ]; then echo "I:failed"; fi
501 status
=`expr $status + $ret`
504 echo "I:check that CNAME nameserver is logged correctly (${n})"
506 $DIG soa all-cnames @
10.53.0.5 -p 5300 > dig.out.ns5.
test${n} || ret
=1
507 grep "status: SERVFAIL" dig.out.ns5.
test${n} > /dev
/null || ret
=1
508 grep "skipping nameserver 'cname.tld' because it is a CNAME, while resolving 'all-cnames/SOA'" ns
5/named.run
> /dev
/null || ret
=1
509 if [ $ret != 0 ]; then echo "I:failed"; fi
510 status
=`expr $status + $ret`
512 echo "I:exit status: $status"