- Clone all 5 Zonemaster component repos (LDNS, Engine, CLI, Backend, GUI) - Dockerfile.backend: 8-stage multi-stage build LDNS→Engine→CLI→Backend - Dockerfile.gui: Astro static build served via nginx - docker-compose.yml: backend (internal) + frontend (port 5353) - nginx.conf: root redirects to /es/, /api/ proxied to backend - zonemaster-gui/config.ts: defaultLanguage set to 'es' (Spanish) Co-Authored-By: Claude Sonnet 4.6 <noreply@anthropic.com>
60 lines
2.4 KiB
Markdown
60 lines
2.4 KiB
Markdown
# DNSSEC Test Plan
|
|
|
|
These are the DNSSEC tests for a domain.
|
|
|
|
This document uses the terminology defined in the [Master Test Plan].
|
|
|
|
|
|
## Default DNS query flags for all DNSSEC tests
|
|
|
|
* Transport: UDP
|
|
* Bufsize: EDNS0 buffer size (512)
|
|
* Flags -- query flags
|
|
* do -- DNSSEC ok (1)
|
|
* cd -- Checking Disabled (1)
|
|
* rd -- Recursion Desired (0)
|
|
* ad -- Authenticated Data (0)
|
|
|
|
See section 3.2 of [RFC 4035]
|
|
for a description of the flags used by a recursive name server.
|
|
|
|
## Key, hash and signature algorithms
|
|
|
|
There are many algorithms defined for doing DNSSEC, not all of them are
|
|
mandatory to implement. This test case should strive not only to implement
|
|
all mandatory algorithms, but also most of those that are in use on the
|
|
internet today as well.
|
|
|
|
If any algorithm in a DNSSEC record type is not recognized by the test
|
|
system, the test system should emit a notice about this.
|
|
|
|
|
|
[Master Test Plan]: ../MasterTestPlan.md
|
|
[RFC 4035]: https://datatracker.ietf.org/doc/html/rfc4035#section-3.2
|
|
[Test Case README]: ../README.md
|
|
|
|
<!-- Content until EOF generated by script updateTestPlanReadme.pl from Zonemaster/Zonemaster utils directory -->
|
|
|
|
## Test cases list
|
|
|
|
|Test Case |Test Case Description|
|
|
|:---------|:--------------------|
|
|
|[DNSSEC01](dnssec01.md)|Legal values for the DS hash digest algorithm|
|
|
|[DNSSEC02](dnssec02.md)|DS must match a valid DNSKEY in the child zone|
|
|
|[DNSSEC03](dnssec03.md)|Verify NSEC3 parameters|
|
|
|[DNSSEC04](dnssec04.md)|Check for too short or too long RRSIG lifetimes|
|
|
|[DNSSEC05](dnssec05.md)|Check for invalid DNSKEY algorithms|
|
|
|[DNSSEC06](dnssec06.md)|Verify DNSSEC additional processing|
|
|
|[DNSSEC07](dnssec07.md)|DNSSEC signed zone and DS in parent for signed zone|
|
|
|[DNSSEC08](dnssec08.md)|Valid RRSIG for DNSKEY|
|
|
|[DNSSEC09](dnssec09.md)|RRSIG(SOA) must be valid and created by a valid DNSKEY|
|
|
|[DNSSEC10](dnssec10.md)|Zone contains NSEC or NSEC3 records|
|
|
|[DNSSEC11](dnssec11.md)|DS in delegation requires signed zone|
|
|
|[DNSSEC12](dnssec12.md)|Test for DNSSEC Algorithm Completeness|
|
|
|[DNSSEC13](dnssec13.md)|All DNSKEY algorithms used to sign the zone|
|
|
|[DNSSEC14](dnssec14.md)|Check for valid RSA DNSKEY key size|
|
|
|[DNSSEC15](dnssec15.md)|Existence of CDS and CDNSKEY|
|
|
|[DNSSEC16](dnssec16.md)|Validate CDS|
|
|
|[DNSSEC17](dnssec17.md)|Validate CDNSKEY|
|
|
|[DNSSEC18](dnssec18.md)|Validate trust from DS to CDS and CDNSKEY|
|