feat: add full Zonemaster stack with Docker and Spanish UI
- Clone all 5 Zonemaster component repos (LDNS, Engine, CLI, Backend, GUI) - Dockerfile.backend: 8-stage multi-stage build LDNS→Engine→CLI→Backend - Dockerfile.gui: Astro static build served via nginx - docker-compose.yml: backend (internal) + frontend (port 5353) - nginx.conf: root redirects to /es/, /api/ proxied to backend - zonemaster-gui/config.ts: defaultLanguage set to 'es' (Spanish) Co-Authored-By: Claude Sonnet 4.6 <noreply@anthropic.com>
This commit is contained in:
@@ -0,0 +1,59 @@
|
||||
# DNSSEC Test Plan
|
||||
|
||||
These are the DNSSEC tests for a domain.
|
||||
|
||||
This document uses the terminology defined in the [Master Test Plan].
|
||||
|
||||
|
||||
## Default DNS query flags for all DNSSEC tests
|
||||
|
||||
* Transport: UDP
|
||||
* Bufsize: EDNS0 buffer size (512)
|
||||
* Flags -- query flags
|
||||
* do -- DNSSEC ok (1)
|
||||
* cd -- Checking Disabled (1)
|
||||
* rd -- Recursion Desired (0)
|
||||
* ad -- Authenticated Data (0)
|
||||
|
||||
See section 3.2 of [RFC 4035]
|
||||
for a description of the flags used by a recursive name server.
|
||||
|
||||
## Key, hash and signature algorithms
|
||||
|
||||
There are many algorithms defined for doing DNSSEC, not all of them are
|
||||
mandatory to implement. This test case should strive not only to implement
|
||||
all mandatory algorithms, but also most of those that are in use on the
|
||||
internet today as well.
|
||||
|
||||
If any algorithm in a DNSSEC record type is not recognized by the test
|
||||
system, the test system should emit a notice about this.
|
||||
|
||||
|
||||
[Master Test Plan]: ../MasterTestPlan.md
|
||||
[RFC 4035]: https://datatracker.ietf.org/doc/html/rfc4035#section-3.2
|
||||
[Test Case README]: ../README.md
|
||||
|
||||
<!-- Content until EOF generated by script updateTestPlanReadme.pl from Zonemaster/Zonemaster utils directory -->
|
||||
|
||||
## Test cases list
|
||||
|
||||
|Test Case |Test Case Description|
|
||||
|:---------|:--------------------|
|
||||
|[DNSSEC01](dnssec01.md)|Legal values for the DS hash digest algorithm|
|
||||
|[DNSSEC02](dnssec02.md)|DS must match a valid DNSKEY in the child zone|
|
||||
|[DNSSEC03](dnssec03.md)|Verify NSEC3 parameters|
|
||||
|[DNSSEC04](dnssec04.md)|Check for too short or too long RRSIG lifetimes|
|
||||
|[DNSSEC05](dnssec05.md)|Check for invalid DNSKEY algorithms|
|
||||
|[DNSSEC06](dnssec06.md)|Verify DNSSEC additional processing|
|
||||
|[DNSSEC07](dnssec07.md)|DNSSEC signed zone and DS in parent for signed zone|
|
||||
|[DNSSEC08](dnssec08.md)|Valid RRSIG for DNSKEY|
|
||||
|[DNSSEC09](dnssec09.md)|RRSIG(SOA) must be valid and created by a valid DNSKEY|
|
||||
|[DNSSEC10](dnssec10.md)|Zone contains NSEC or NSEC3 records|
|
||||
|[DNSSEC11](dnssec11.md)|DS in delegation requires signed zone|
|
||||
|[DNSSEC12](dnssec12.md)|Test for DNSSEC Algorithm Completeness|
|
||||
|[DNSSEC13](dnssec13.md)|All DNSKEY algorithms used to sign the zone|
|
||||
|[DNSSEC14](dnssec14.md)|Check for valid RSA DNSKEY key size|
|
||||
|[DNSSEC15](dnssec15.md)|Existence of CDS and CDNSKEY|
|
||||
|[DNSSEC16](dnssec16.md)|Validate CDS|
|
||||
|[DNSSEC17](dnssec17.md)|Validate CDNSKEY|
|
||||
|[DNSSEC18](dnssec18.md)|Validate trust from DS to CDS and CDNSKEY|
|
||||
Reference in New Issue
Block a user