bind9/bin/tests/system/doth/ns1/named.conf.in
Ondřej Surý 5d4e57b914
Add test for not-loading and not-transfering huge RRSets
Add two new masterformat tests - the 'huge' zone fits within the ns1
limit and loads on the primary ns1 server, but must not transfer to the
ns2 secondary, and the 'uber' zone should not even load on the primary
ns1 server.
2024-06-10 16:55:09 +02:00

206 lines
5.5 KiB
Text

/*
* Copyright (C) Internet Systems Consortium, Inc. ("ISC")
*
* SPDX-License-Identifier: MPL-2.0
*
* This Source Code Form is subject to the terms of the Mozilla Public
* License, v. 2.0. If a copy of the MPL was not distributed with this
* file, you can obtain one at https://mozilla.org/MPL/2.0/.
*
* See the COPYRIGHT file distributed with this work for additional
* information regarding copyright ownership.
*/
include "../../_common/rndc.key";
controls {
inet 10.53.0.1 port @CONTROLPORT@ allow { any; } keys { rndc_key; };
};
http local {
endpoints { "/dns-query"; "/alter"; };
listener-clients 100;
};
tls tls-forward-secrecy {
protocols { TLSv1.2; };
ciphers "HIGH:!kRSA:!aNULL:!eNULL:!RC4:!3DES:!MD5:!EXP:!PSK:!SRP:!DSS:!SHA1:!SHA256:!SHA384";
prefer-server-ciphers yes;
key-file "../CA/certs/srv01.crt01.example.com.key";
cert-file "../CA/certs/srv01.crt01.example.com.pem";
dhparam-file "../dhparam3072.pem";
};
tls tls-pfs-aes256 {
protocols { TLSv1.2; };
ciphers "AES256:!kRSA:!aNULL:!eNULL:!RC4:!3DES:!MD5:!EXP:!PSK:!SRP:!DSS:!SHA1:!SHA256:!SHA384";
prefer-server-ciphers yes;
key-file "../CA/certs/srv01.crt01.example.com.key";
cert-file "../CA/certs/srv01.crt01.example.com.pem";
dhparam-file "../dhparam3072.pem";
};
tls tls-no-subject-alt-name {
protocols { TLSv1.2; };
ciphers "HIGH:!kRSA:!aNULL:!eNULL:!RC4:!3DES:!MD5:!EXP:!PSK:!SRP:!DSS:!SHA1:!SHA256:!SHA384";
prefer-server-ciphers yes;
key-file "../CA/certs/srv01.crt02-no-san.example.com.key";
cert-file "../CA/certs/srv01.crt02-no-san.example.com.pem";
dhparam-file "../dhparam3072.pem";
};
tls tls-expired {
protocols { TLSv1.2; };
ciphers "HIGH:!kRSA:!aNULL:!eNULL:!RC4:!3DES:!MD5:!EXP:!PSK:!SRP:!DSS:!SHA1:!SHA256:!SHA384";
prefer-server-ciphers yes;
key-file "../CA/certs/srv01.crt03-expired.example.com.key";
cert-file "../CA/certs/srv01.crt03-expired.example.com.pem";
dhparam-file "../dhparam3072.pem";
};
tls tls-forward-secrecy-mutual-tls {
protocols { TLSv1.2; };
ciphers "HIGH:!kRSA:!aNULL:!eNULL:!RC4:!3DES:!MD5:!EXP:!PSK:!SRP:!DSS:!SHA1:!SHA256:!SHA384";
prefer-server-ciphers yes;
key-file "../CA/certs/srv01.crt01.example.com.key";
cert-file "../CA/certs/srv01.crt01.example.com.pem";
dhparam-file "../dhparam3072.pem";
ca-file "../CA/CA.pem";
};
options {
port @PORT@;
tls-port @TLSPORT@;
https-port @HTTPSPORT@;
http-port @HTTPPORT@;
pid-file "named.pid";
listen-on { 10.53.0.1; };
listen-on tls tls-forward-secrecy { 10.53.0.1; }; // DoT
listen-on-v6 tls tls-forward-secrecy { fd92:7065:b8e:ffff::1;};
listen-on tls ephemeral http local { 10.53.0.1; }; // DoH
listen-on-v6 tls ephemeral http local { fd92:7065:b8e:ffff::1; };
listen-on tls none http local { 10.53.0.1; }; // unencrypted DoH
listen-on-v6 tls none http local { fd92:7065:b8e:ffff::1; };
listen-on-v6 { none; };
listen-on port @EXTRAPORT1@ tls tls-pfs-aes256 { 10.53.0.1; }; // DoT
listen-on-v6 port @EXTRAPORT1@ tls tls-pfs-aes256 { fd92:7065:b8e:ffff::1;};
listen-on port @EXTRAPORT2@ tls tls-no-subject-alt-name { 10.53.0.1; }; // DoT
listen-on port @EXTRAPORT3@ tls tls-no-subject-alt-name http local { 10.53.0.1; }; // DoH
listen-on port @EXTRAPORT4@ tls tls-expired { 10.53.0.1; }; // DoT
listen-on port @EXTRAPORT5@ tls tls-forward-secrecy-mutual-tls { 10.53.0.1; }; // DoT
listen-on port @EXTRAPORT6@ tls tls-forward-secrecy-mutual-tls http local { 10.53.0.1; }; // DoH
listen-on port @EXTRAPORT7@ tls tls-forward-secrecy { 10.53.0.1; }; // DoT
recursion no;
notify explicit;
also-notify { 10.53.0.2 port @PORT@; };
statistics-file "named.stats";
dnssec-validation yes;
tcp-initial-timeout 1200;
transfers-in 100;
transfers-out 100;
max-records-per-type 0;
};
trust-anchors { };
zone "." {
type primary;
file "root.db";
allow-transfer port @TLSPORT@ transport tls { any; };
};
zone "test.example.com" {
type primary;
file "example.db";
allow-transfer transport tls { any; };
};
zone "example" {
type primary;
file "example.db";
allow-transfer port @TLSPORT@ transport tls { any; };
};
zone "example2" {
type primary;
file "example.db";
allow-transfer port @EXTRAPORT1@ transport tls { any; };
};
zone "example3" {
type primary;
file "example.db";
allow-transfer port @EXTRAPORT3@ transport tls { any; };
};
zone "example4" {
type primary;
file "example.db";
allow-transfer transport tls { any; };
};
zone "example5" {
type primary;
file "example.db";
allow-transfer transport tls { any; };
};
zone "example6" {
type primary;
file "example.db";
allow-transfer transport tls { any; };
};
zone "example7" {
type primary;
file "example.db";
allow-transfer transport tls { any; };
};
zone "example8" {
type primary;
file "example.db";
allow-transfer transport tls { any; };
};
zone "example9" {
type primary;
file "example.db";
allow-transfer port @EXTRAPORT5@ transport tls { any; };
};
zone "example10" {
type primary;
file "example.db";
allow-transfer port @EXTRAPORT5@ transport tls { any; };
};
zone "example11" {
type primary;
file "example.db";
allow-transfer port @EXTRAPORT5@ transport tls { any; };
};
zone "example12" {
type primary;
file "example.db";
allow-transfer port @EXTRAPORT7@ transport tls { any; };
};
zone "example13" {
type primary;
file "example.db";
allow-transfer port @EXTRAPORT7@ transport tls { any; };
};
zone "example14" {
type primary;
file "example.db";
allow-transfer port @EXTRAPORT7@ transport tls { any; };
};
zone "example15" {
type primary;
file "example.db";
allow-transfer port @EXTRAPORT7@ transport tls { any; };
};