2022-04-17 15:50:16 +02:00
#!/usr/bin/env bash
# SPDX-License-Identifier: LGPL-2.1-or-later
# vi: ts=4 sw=4 tw=0 et:
2022-07-08 13:36:03 +02:00
# TODO:
# - IPv6-only stack
# - mDNS
# - LLMNR
# - DoT/DoH
2022-04-17 15:50:16 +02:00
set -eux
set -o pipefail
2022-10-18 20:12:30 +09:00
# shellcheck source=test/units/assert.sh
. " $( dirname " $0 " ) " /assert.sh
2022-04-17 15:50:16 +02:00
: >/failed
RUN_OUT = " $( mktemp) "
2022-09-11 14:17:56 +02:00
2022-04-17 15:50:16 +02:00
run( ) {
" $@ " | & tee " $RUN_OUT "
}
2023-12-14 16:59:21 +01:00
run_delv( ) {
# Since [0] delv no longer loads /etc/(bind/)bind.keys by default, so we
# have to do that explicitly for each invocation
run delv -a /etc/bind.keys " $@ "
}
2022-07-08 13:36:03 +02:00
disable_ipv6( ) {
sysctl -w net.ipv6.conf.all.disable_ipv6= 1
}
enable_ipv6( ) {
sysctl -w net.ipv6.conf.all.disable_ipv6= 0
networkctl reconfigure dns0
2023-07-03 21:38:42 +02:00
/usr/lib/systemd/systemd-networkd-wait-online --ipv4 --ipv6 --interface= dns0:routable --timeout= 30
2022-07-08 13:36:03 +02:00
}
2022-12-15 15:28:56 +09:00
monitor_check_rr( ) (
set +x
set +o pipefail
2022-12-16 01:11:39 +09:00
local since = " ${ 1 : ? } "
local match = " ${ 2 : ? } "
2022-09-11 14:17:56 +02:00
2022-09-30 10:04:37 +02:00
# Wait until the first mention of the specified log message is
# displayed. We turn off pipefail for this, since we don't care about the
# lhs of this pipe expression, we only care about the rhs' result to be
# clean
2024-04-15 15:53:36 +02:00
# v255-only: match against a syslog tag as well to work around systemd/systemd#30886
timeout -v 30s journalctl --since " $since " -f --full _SYSTEMD_UNIT = "resmontest.service" + SYSLOG_IDENTIFIER = "resmontest" | grep -m1 " $match "
2022-12-15 15:28:56 +09:00
)
2022-09-11 14:17:56 +02:00
2022-10-18 20:12:30 +09:00
# Test for resolvectl, resolvconf
systemctl unmask systemd-resolved.service
2023-04-07 17:00:10 +02:00
systemctl enable --now systemd-resolved.service
2022-10-18 20:12:30 +09:00
systemctl service-log-level systemd-resolved.service debug
ip link add hoge type dummy
ip link add hoge.foo type dummy
resolvectl dns hoge 10.0.0.1 10.0.0.2
resolvectl dns hoge.foo 10.0.0.3 10.0.0.4
assert_in '10.0.0.1 10.0.0.2' " $( resolvectl dns hoge) "
assert_in '10.0.0.3 10.0.0.4' " $( resolvectl dns hoge.foo) "
resolvectl dns hoge 10.0.1.1 10.0.1.2
resolvectl dns hoge.foo 10.0.1.3 10.0.1.4
assert_in '10.0.1.1 10.0.1.2' " $( resolvectl dns hoge) "
assert_in '10.0.1.3 10.0.1.4' " $( resolvectl dns hoge.foo) "
if ! RESOLVCONF = $( command -v resolvconf 2>/dev/null) ; then
TMPDIR = $( mktemp -d -p /tmp resolvconf-tests.XXXXXX)
RESOLVCONF = " $TMPDIR " /resolvconf
ln -s " $( command -v resolvectl 2>/dev/null) " " $RESOLVCONF "
fi
echo nameserver 10.0.2.1 10.0.2.2 | " $RESOLVCONF " -a hoge
echo nameserver 10.0.2.3 10.0.2.4 | " $RESOLVCONF " -a hoge.foo
assert_in '10.0.2.1 10.0.2.2' " $( resolvectl dns hoge) "
assert_in '10.0.2.3 10.0.2.4' " $( resolvectl dns hoge.foo) "
echo nameserver 10.0.3.1 10.0.3.2 | " $RESOLVCONF " -a hoge.inet.ipsec.192.168.35
echo nameserver 10.0.3.3 10.0.3.4 | " $RESOLVCONF " -a hoge.foo.dhcp
assert_in '10.0.3.1 10.0.3.2' " $( resolvectl dns hoge) "
assert_in '10.0.3.3 10.0.3.4' " $( resolvectl dns hoge.foo) "
2022-11-10 15:52:57 +09:00
2022-11-25 12:15:56 +01:00
# Tests for _localdnsstub and _localdnsproxy
assert_in '127.0.0.53' " $( resolvectl query _localdnsstub) "
assert_in '_localdnsstub' " $( resolvectl query 127.0.0.53) "
assert_in '127.0.0.54' " $( resolvectl query _localdnsproxy) "
assert_in '_localdnsproxy' " $( resolvectl query 127.0.0.54) "
assert_in '127.0.0.53' " $( dig @127.0.0.53 _localdnsstub) "
assert_in '_localdnsstub' " $( dig @127.0.0.53 -x 127.0.0.53) "
assert_in '127.0.0.54' " $( dig @127.0.0.53 _localdnsproxy) "
assert_in '_localdnsproxy' " $( dig @127.0.0.53 -x 127.0.0.54) "
2022-11-10 15:52:57 +09:00
# Tests for mDNS and LLMNR settings
mkdir -p /run/systemd/resolved.conf.d
{
echo "[Resolve]"
echo "MulticastDNS=yes"
echo "LLMNR=yes"
} >/run/systemd/resolved.conf.d/mdns-llmnr.conf
systemctl restart systemd-resolved.service
systemctl service-log-level systemd-resolved.service debug
# make sure networkd is not running.
systemctl stop systemd-networkd.service
# defaults to yes (both the global and per-link settings are yes)
assert_in 'yes' " $( resolvectl mdns hoge) "
assert_in 'yes' " $( resolvectl llmnr hoge) "
# set per-link setting
resolvectl mdns hoge yes
resolvectl llmnr hoge yes
assert_in 'yes' " $( resolvectl mdns hoge) "
assert_in 'yes' " $( resolvectl llmnr hoge) "
resolvectl mdns hoge resolve
resolvectl llmnr hoge resolve
assert_in 'resolve' " $( resolvectl mdns hoge) "
assert_in 'resolve' " $( resolvectl llmnr hoge) "
resolvectl mdns hoge no
resolvectl llmnr hoge no
assert_in 'no' " $( resolvectl mdns hoge) "
assert_in 'no' " $( resolvectl llmnr hoge) "
# downgrade global setting to resolve
{
echo "[Resolve]"
echo "MulticastDNS=resolve"
echo "LLMNR=resolve"
} >/run/systemd/resolved.conf.d/mdns-llmnr.conf
systemctl restart systemd-resolved.service
systemctl service-log-level systemd-resolved.service debug
# set per-link setting
resolvectl mdns hoge yes
resolvectl llmnr hoge yes
assert_in 'resolve' " $( resolvectl mdns hoge) "
assert_in 'resolve' " $( resolvectl llmnr hoge) "
resolvectl mdns hoge resolve
resolvectl llmnr hoge resolve
assert_in 'resolve' " $( resolvectl mdns hoge) "
assert_in 'resolve' " $( resolvectl llmnr hoge) "
resolvectl mdns hoge no
resolvectl llmnr hoge no
assert_in 'no' " $( resolvectl mdns hoge) "
assert_in 'no' " $( resolvectl llmnr hoge) "
# downgrade global setting to no
{
echo "[Resolve]"
echo "MulticastDNS=no"
echo "LLMNR=no"
} >/run/systemd/resolved.conf.d/mdns-llmnr.conf
systemctl restart systemd-resolved.service
systemctl service-log-level systemd-resolved.service debug
# set per-link setting
resolvectl mdns hoge yes
resolvectl llmnr hoge yes
assert_in 'no' " $( resolvectl mdns hoge) "
assert_in 'no' " $( resolvectl llmnr hoge) "
resolvectl mdns hoge resolve
resolvectl llmnr hoge resolve
assert_in 'no' " $( resolvectl mdns hoge) "
assert_in 'no' " $( resolvectl llmnr hoge) "
resolvectl mdns hoge no
resolvectl llmnr hoge no
assert_in 'no' " $( resolvectl mdns hoge) "
assert_in 'no' " $( resolvectl llmnr hoge) "
# Cleanup
rm -f /run/systemd/resolved.conf.d/mdns-llmnr.conf
2022-10-18 20:12:30 +09:00
ip link del hoge
ip link del hoge.foo
2022-04-17 15:50:16 +02:00
### SETUP ###
# Configure network
hostnamectl hostname ns1.unsigned.test
2023-07-10 08:00:00 +00:00
cat >>/etc/hosts <<EOF
10.0.0.1 ns1.unsigned.test
fd00:dead:beef:cafe::1 ns1.unsigned.test
127.128.0.5 localhost5 localhost5.localdomain localhost5.localdomain4 localhost.localdomain5 localhost5.localdomain5
EOF
2022-04-17 15:50:16 +02:00
mkdir -p /etc/systemd/network
cat >/etc/systemd/network/dns0.netdev <<EOF
[ NetDev]
Name = dns0
Kind = dummy
EOF
cat >/etc/systemd/network/dns0.network <<EOF
[ Match]
Name = dns0
[ Network]
Address = 10.0.0.1/24
2022-07-08 13:36:03 +02:00
Address = fd00:dead:beef:cafe::1/64
2022-04-17 15:50:16 +02:00
DNSSEC = allow-downgrade
DNS = 10.0.0.1
2022-07-08 13:36:03 +02:00
DNS = fd00:dead:beef:cafe::1
2022-04-17 15:50:16 +02:00
EOF
2022-07-08 13:36:03 +02:00
DNS_ADDRESSES = (
"10.0.0.1"
"fd00:dead:beef:cafe::1"
)
2022-11-10 15:51:30 +09:00
mkdir -p /run/systemd/resolved.conf.d
2022-04-17 15:50:16 +02:00
{
2022-11-10 15:51:30 +09:00
echo "[Resolve]"
2022-04-17 15:50:16 +02:00
echo "FallbackDNS="
echo "DNSSEC=allow-downgrade"
echo "DNSOverTLS=opportunistic"
2022-11-10 15:51:30 +09:00
} >/run/systemd/resolved.conf.d/test.conf
2022-04-17 15:50:16 +02:00
ln -svf /run/systemd/resolve/stub-resolv.conf /etc/resolv.conf
# Override the default NTA list, which turns off DNSSEC validation for (among
# others) the test. domain
mkdir -p "/etc/dnssec-trust-anchors.d/"
echo local >/etc/dnssec-trust-anchors.d/local.negative
# Sign the root zone
keymgr . generate algorithm = ECDSAP256SHA256 ksk = yes zsk = yes
# Create a trust anchor for resolved with our root zone
keymgr . ds | sed 's/ DS/ IN DS/g' >/etc/dnssec-trust-anchors.d/root.positive
# Create a bind-compatible trust anchor (for delv)
# Note: the trust-anchors directive is relatively new, so use the original
# managed-keys one until it's widespread enough
{
echo 'managed-keys {'
keymgr . dnskey | sed -r 's/^\. DNSKEY ([0-9]+ [0-9]+ [0-9]+) (.+)$/. static-key \1 "\2";/g'
echo '};'
} >/etc/bind.keys
2022-08-26 18:45:38 +02:00
# Create an /etc/bind/bind.keys symlink, which is used by delv on Ubuntu
mkdir -p /etc/bind
ln -svf /etc/bind.keys /etc/bind/bind.keys
2022-04-17 15:50:16 +02:00
# Start the services
2022-10-18 20:12:30 +09:00
systemctl unmask systemd-networkd
systemctl start systemd-networkd
systemctl restart systemd-resolved
2022-09-05 13:54:22 +02:00
# Create knot's runtime dir, since from certain version it's provided only by
# the package and not created by tmpfiles/systemd
if [ [ ! -d /run/knot ] ] ; then
mkdir -p /run/knot
chown -R knot:knot /run/knot
fi
2022-04-17 15:50:16 +02:00
systemctl start knot
# Wait a bit for the keys to propagate
sleep 4
networkctl status
resolvectl status
resolvectl log-level debug
2022-09-30 10:04:37 +02:00
# Start monitoring queries
2024-04-15 15:53:36 +02:00
systemd-run -u resmontest.service -p SyslogIdentifier = resmontest -p Type = notify resolvectl monitor
systemd-run -u resmontest-json.service -p SyslogIdentifier = resmontest-json -p Type = notify resolvectl monitor --json= short
2022-04-26 17:09:02 -05:00
2022-07-08 13:36:03 +02:00
# Check if all the zones are valid (zone-check always returns 0, so let's check
# if it produces any errors/warnings)
run knotc zone-check
[ [ ! -s " $RUN_OUT " ] ]
2022-04-17 15:50:16 +02:00
# We need to manually propagate the DS records of onlinesign.test. to the parent
# zone, since they're generated online
knotc zone-begin test.
2022-08-26 18:40:53 +02:00
if knotc zone-get test. onlinesign.test. ds | grep .; then
# Drop any old DS records, if present (e.g. on test re-run)
knotc zone-unset test. onlinesign.test. ds
fi
# Propagate the new DS records
2022-04-17 15:50:16 +02:00
while read -ra line; do
2022-09-05 17:28:04 +02:00
knotc zone-set test. " ${ line [0] } " 600 " ${ line [@] : 1 } "
2022-08-26 18:40:53 +02:00
done < <( keymgr onlinesign.test. ds)
2022-04-17 15:50:16 +02:00
knotc zone-commit test.
test: reload knotd after committing all zone changes
Otherwise, on Ubuntu, the DS RRs sometimes won't get propagated
correctly to parent zones for some reason, ending in a loop:
```
knotd[70]: info: [test.] DS check, outgoing, remote 10.0.0.1@53, KSK submission check: negative
knotd[70]: info: [signed.test.] DS check, outgoing, remote 10.0.0.1@53, KSK submission check: negative
knotd[70]: info: [test.] DS check, outgoing, remote 10.0.0.1@53, KSK submission check: negative
knotd[70]: info: [signed.test.] DS check, outgoing, remote 10.0.0.1@53, KSK submission check: negative
knotd[70]: info: [test.] DS check, outgoing, remote 10.0.0.1@53, KSK submission check: negative
knotd[70]: info: [signed.test.] DS check, outgoing, remote 10.0.0.1@53, KSK submission check: negative
knotd[70]: info: [test.] DS check, outgoing, remote 10.0.0.1@53, KSK submission check: negative
knotd[70]: info: [signed.test.] DS check, outgoing, remote 10.0.0.1@53, KSK submission check: negative
knotd[70]: info: [test.] DS check, outgoing, remote 10.0.0.1@53, KSK submission check: negative
knotd[70]: info: [signed.test.] DS check, outgoing, remote 10.0.0.1@53, KSK submission check: negative
knotd[70]: info: [test.] DS check, outgoing, remote 10.0.0.1@53, KSK submission check: negative
knotd[70]: info: [signed.test.] DS check, outgoing, remote 10.0.0.1@53, KSK submission check: negative
knotd[70]: info: [test.] DS check, outgoing, remote 10.0.0.1@53, KSK submission check: negative
knotd[70]: info: [signed.test.] DS check, outgoing, remote 10.0.0.1@53, KSK submission check: negative
knotd[70]: info: [test.] DS check, outgoing, remote 10.0.0.1@53, KSK submission check: negative
knotd[70]: info: [signed.test.] DS check, outgoing, remote 10.0.0.1@53, KSK submission check: negative
...
```
causing DNSSEC verification fails. I'm not sure why that happens (yet)...
2022-08-26 21:07:44 +02:00
knotc reload
2022-04-17 15:50:16 +02:00
### SETUP END ###
: "--- nss-resolve/nss-myhostname tests"
# Sanity check
2022-12-16 01:11:39 +09:00
TIMESTAMP = $( date '+%F %T' )
2022-07-08 13:36:03 +02:00
# Issue: https://github.com/systemd/systemd/issues/23951
# With IPv6 enabled
2024-03-05 18:19:17 +01:00
run getent -s resolve ahosts ns1.unsigned.test
grep -qE "^fd00:dead:beef:cafe::1\s+STREAM\s+ns1\.unsigned\.test" " $RUN_OUT "
2022-07-08 13:36:03 +02:00
monitor_check_rr " $TIMESTAMP " "ns1.unsigned.test IN AAAA fd00:dead:beef:cafe::1"
# With IPv6 disabled
# Issue: https://github.com/systemd/systemd/issues/23951
2024-03-05 18:19:17 +01:00
disable_ipv6
run getent -s resolve ahosts ns1.unsigned.test
grep -qE "^10\.0\.0\.1\s+STREAM\s+ns1\.unsigned\.test" " $RUN_OUT "
( ! grep -qE "fd00:dead:beef:cafe::1" " $RUN_OUT " )
monitor_check_rr " $TIMESTAMP " "ns1.unsigned.test IN A 10.0.0.1"
2022-07-08 13:36:03 +02:00
enable_ipv6
2022-04-17 15:50:16 +02:00
# Issue: https://github.com/systemd/systemd/issues/18812
# PR: https://github.com/systemd/systemd/pull/18896
# Follow-up issue: https://github.com/systemd/systemd/issues/23152
# Follow-up PR: https://github.com/systemd/systemd/pull/23161
# With IPv6 enabled
2024-03-05 18:19:17 +01:00
run getent -s resolve ahosts localhost
grep -qE "^::1\s+STREAM\s+localhost" " $RUN_OUT "
run getent -s myhostname ahosts localhost
grep -qE "^::1\s+STREAM\s+localhost" " $RUN_OUT "
2022-04-17 15:50:16 +02:00
# With IPv6 disabled
2022-07-08 13:36:03 +02:00
disable_ipv6
2024-03-05 18:19:17 +01:00
run getent -s resolve ahosts localhost
grep -qE "^127\.0\.0\.1\s+STREAM\s+localhost" " $RUN_OUT "
( ! grep -qE "::1" " $RUN_OUT " )
run getent -s myhostname ahosts localhost
grep -qE "^127\.0\.0\.1\s+STREAM\s+localhost" " $RUN_OUT "
2022-07-08 13:36:03 +02:00
enable_ipv6
2022-04-17 15:50:16 +02:00
2023-07-10 08:00:00 +00:00
# Issue: https://github.com/systemd/systemd/issues/25088
run getent -s resolve hosts 127.128.0.5
grep -qEx '127\.128\.0\.5\s+localhost5(\s+localhost5?\.localdomain[45]?){4}' " $RUN_OUT "
[ " $( wc -l <" $RUN_OUT " ) " -eq 1 ]
2023-07-11 08:00:00 +00:00
# Issue: https://github.com/systemd/systemd/issues/20158
run dig +noall +answer +additional localhost5.
grep -qEx 'localhost5\.\s+0\s+IN\s+A\s+127\.128\.0\.5' " $RUN_OUT "
[ " $( wc -l <" $RUN_OUT " ) " -eq 1 ]
run dig +noall +answer +additional localhost5.localdomain4.
grep -qEx 'localhost5\.localdomain4\.\s+0\s+IN\s+CNAME\s+localhost5\.' " $RUN_OUT "
grep -qEx 'localhost5\.\s+0\s+IN\s+A\s+127\.128\.0\.5' " $RUN_OUT "
[ " $( wc -l <" $RUN_OUT " ) " -eq 2 ]
2022-04-17 15:50:16 +02:00
: "--- Basic resolved tests ---"
# Issue: https://github.com/systemd/systemd/issues/22229
# PR: https://github.com/systemd/systemd/pull/22231
FILTERED_NAMES = (
"0.in-addr.arpa"
"255.255.255.255.in-addr.arpa"
"0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.ip6.arpa"
"hello.invalid"
)
for name in " ${ FILTERED_NAMES [@] } " ; do
( ! run host " $name " )
grep -qF "NXDOMAIN" " $RUN_OUT "
done
# Follow-up
# Issue: https://github.com/systemd/systemd/issues/22401
# PR: https://github.com/systemd/systemd/pull/22414
run dig +noall +authority +comments SRV .
grep -qF "status: NOERROR" " $RUN_OUT "
grep -qE "IN\s+SOA\s+ns1\.unsigned\.test\." " $RUN_OUT "
: "--- ZONE: unsigned.test. ---"
2022-07-08 13:36:03 +02:00
run dig @ns1.unsigned.test +short unsigned.test A unsigned.test AAAA
2022-04-17 15:50:16 +02:00
grep -qF "10.0.0.101" " $RUN_OUT "
2022-07-08 13:36:03 +02:00
grep -qF "fd00:dead:beef:cafe::101" " $RUN_OUT "
2022-04-17 15:50:16 +02:00
run resolvectl query unsigned.test
2022-07-08 13:36:03 +02:00
grep -qF "10.0.0.10" " $RUN_OUT "
grep -qF "fd00:dead:beef:cafe::101" " $RUN_OUT "
2022-04-17 15:50:16 +02:00
grep -qF "authenticated: no" " $RUN_OUT "
2022-07-08 13:36:03 +02:00
run dig @ns1.unsigned.test +short MX unsigned.test
2022-04-17 15:50:16 +02:00
grep -qF "15 mail.unsigned.test." " $RUN_OUT "
run resolvectl query --legend= no -t MX unsigned.test
grep -qF "unsigned.test IN MX 15 mail.unsigned.test" " $RUN_OUT "
2022-08-26 20:08:40 +02:00
: "--- ZONE: signed.test (static DNSSEC) ---"
2022-04-17 15:50:16 +02:00
# Check the trust chain (with and without systemd-resolved in between
# Issue: https://github.com/systemd/systemd/issues/22002
# PR: https://github.com/systemd/systemd/pull/23289
2023-12-14 16:59:21 +01:00
run_delv @ns1.unsigned.test signed.test
2022-04-17 15:50:16 +02:00
grep -qF "; fully validated" " $RUN_OUT "
2023-12-14 16:59:21 +01:00
run_delv signed.test
2022-04-17 15:50:16 +02:00
grep -qF "; fully validated" " $RUN_OUT "
2022-07-08 13:36:03 +02:00
for addr in " ${ DNS_ADDRESSES [@] } " ; do
2023-12-14 16:59:21 +01:00
run_delv " @ $addr " -t A mail.signed.test
2022-07-08 13:36:03 +02:00
grep -qF "; fully validated" " $RUN_OUT "
2023-12-14 16:59:21 +01:00
run_delv " @ $addr " -t AAAA mail.signed.test
2022-07-08 13:36:03 +02:00
grep -qF "; fully validated" " $RUN_OUT "
done
run resolvectl query mail.signed.test
grep -qF "10.0.0.11" " $RUN_OUT "
grep -qF "fd00:dead:beef:cafe::11" " $RUN_OUT "
grep -qF "authenticated: yes" " $RUN_OUT "
2022-04-17 15:50:16 +02:00
run dig +short signed.test
grep -qF "10.0.0.10" " $RUN_OUT "
run resolvectl query signed.test
grep -qF "signed.test: 10.0.0.10" " $RUN_OUT "
grep -qF "authenticated: yes" " $RUN_OUT "
2022-07-08 13:36:03 +02:00
run dig @ns1.unsigned.test +short MX signed.test
2022-04-17 15:50:16 +02:00
grep -qF "10 mail.signed.test." " $RUN_OUT "
run resolvectl query --legend= no -t MX signed.test
grep -qF "signed.test IN MX 10 mail.signed.test" " $RUN_OUT "
# Check a non-existent domain
run dig +dnssec this.does.not.exist.signed.test
grep -qF "status: NXDOMAIN" " $RUN_OUT "
# Check a wildcard record
run resolvectl query -t TXT this.should.be.authenticated.wild.signed.test
grep -qF 'this.should.be.authenticated.wild.signed.test IN TXT "this is a wildcard"' " $RUN_OUT "
grep -qF "authenticated: yes" " $RUN_OUT "
2022-07-08 18:12:47 +02:00
# Check SRV support
run resolvectl service _mysvc._tcp signed.test
grep -qF "myservice.signed.test:1234" " $RUN_OUT "
grep -qF "10.0.0.20" " $RUN_OUT "
grep -qF "fd00:dead:beef:cafe::17" " $RUN_OUT "
grep -qF "authenticated: yes" " $RUN_OUT "
( ! run resolvectl service _invalidsvc._udp signed.test)
grep -qE "invalidservice\.signed\.test' not found" " $RUN_OUT "
run resolvectl service _untrustedsvc._udp signed.test
grep -qF "myservice.untrusted.test:1111" " $RUN_OUT "
grep -qF "10.0.0.123" " $RUN_OUT "
grep -qF "fd00:dead:beef:cafe::123" " $RUN_OUT "
grep -qF "authenticated: yes" " $RUN_OUT "
2022-07-08 20:23:13 +02:00
# Check OPENPGPKEY support
2023-12-14 16:59:21 +01:00
run_delv -t OPENPGPKEY 5a786cdc59c161cdafd818143705026636962198c66ed4c5b3da321e._openpgpkey.signed.test
2022-07-08 20:23:13 +02:00
grep -qF "; fully validated" " $RUN_OUT "
run resolvectl openpgp mr.smith@signed.test
grep -qF "5a786cdc59c161cdafd818143705026636962198c66ed4c5b3da321e._openpgpkey.signed.test" " $RUN_OUT "
grep -qF "authenticated: yes" " $RUN_OUT "
2022-04-17 15:50:16 +02:00
# DNSSEC validation with multiple records of the same type for the same name
# Issue: https://github.com/systemd/systemd/issues/22002
# PR: https://github.com/systemd/systemd/pull/23289
2022-07-08 13:36:03 +02:00
check_domain( ) {
local domain = " ${ 1 : ? } "
local record = " ${ 2 : ? } "
local message = " ${ 3 : ? } "
local addr
for addr in " ${ DNS_ADDRESSES [@] } " ; do
2023-12-14 16:59:21 +01:00
run_delv " @ $addr " -t " $record " " $domain "
2022-07-08 13:36:03 +02:00
grep -qF " $message " " $RUN_OUT "
done
2023-12-14 16:59:21 +01:00
run_delv -t " $record " " $domain "
2022-07-08 13:36:03 +02:00
grep -qF " $message " " $RUN_OUT "
run resolvectl query " $domain "
grep -qF "authenticated: yes" " $RUN_OUT "
}
check_domain "dupe.signed.test" "A" "; fully validated"
check_domain "dupe.signed.test" "AAAA" "; negative response, fully validated"
check_domain "dupe-ipv6.signed.test" "AAAA" "; fully validated"
check_domain "dupe-ipv6.signed.test" "A" "; negative response, fully validated"
check_domain "dupe-mixed.signed.test" "A" "; fully validated"
check_domain "dupe-mixed.signed.test" "AAAA" "; fully validated"
2022-04-17 15:50:16 +02:00
# Test resolution of CNAME chains
2022-12-16 01:11:39 +09:00
TIMESTAMP = $( date '+%F %T' )
2022-04-17 15:50:16 +02:00
run resolvectl query -t A cname-chain.signed.test
grep -qF "follow14.final.signed.test IN A 10.0.0.14" " $RUN_OUT "
grep -qF "authenticated: yes" " $RUN_OUT "
2022-09-30 10:04:37 +02:00
2022-12-16 01:11:39 +09:00
monitor_check_rr " $TIMESTAMP " "follow10.so.close.signed.test IN CNAME follow11.yet.so.far.signed.test"
monitor_check_rr " $TIMESTAMP " "follow11.yet.so.far.signed.test IN CNAME follow12.getting.hot.signed.test"
monitor_check_rr " $TIMESTAMP " "follow12.getting.hot.signed.test IN CNAME follow13.almost.final.signed.test"
monitor_check_rr " $TIMESTAMP " "follow13.almost.final.signed.test IN CNAME follow14.final.signed.test"
monitor_check_rr " $TIMESTAMP " "follow14.final.signed.test IN A 10.0.0.14"
2022-09-30 10:04:37 +02:00
2022-04-17 15:50:16 +02:00
# Non-existing RR + CNAME chain
run dig +dnssec AAAA cname-chain.signed.test
grep -qF "status: NOERROR" " $RUN_OUT "
grep -qE "^follow14\.final\.signed\.test\..+IN\s+NSEC\s+" " $RUN_OUT "
: "--- ZONE: onlinesign.test (dynamic DNSSEC) ---"
# Check the trust chain (with and without systemd-resolved in between
# Issue: https://github.com/systemd/systemd/issues/22002
# PR: https://github.com/systemd/systemd/pull/23289
2023-12-14 16:59:21 +01:00
run_delv @ns1.unsigned.test sub.onlinesign.test
2022-04-17 15:50:16 +02:00
grep -qF "; fully validated" " $RUN_OUT "
2023-12-14 16:59:21 +01:00
run_delv sub.onlinesign.test
2022-04-17 15:50:16 +02:00
grep -qF "; fully validated" " $RUN_OUT "
run dig +short sub.onlinesign.test
grep -qF "10.0.0.133" " $RUN_OUT "
run resolvectl query sub.onlinesign.test
grep -qF "sub.onlinesign.test: 10.0.0.133" " $RUN_OUT "
grep -qF "authenticated: yes" " $RUN_OUT "
2022-07-08 13:36:03 +02:00
run dig @ns1.unsigned.test +short TXT onlinesign.test
2022-04-17 15:50:16 +02:00
grep -qF '"hello from onlinesign"' " $RUN_OUT "
run resolvectl query --legend= no -t TXT onlinesign.test
grep -qF 'onlinesign.test IN TXT "hello from onlinesign"' " $RUN_OUT "
2022-07-08 13:36:03 +02:00
for addr in " ${ DNS_ADDRESSES [@] } " ; do
2023-12-14 16:59:21 +01:00
run_delv " @ $addr " -t A dual.onlinesign.test
2022-07-08 13:36:03 +02:00
grep -qF "10.0.0.135" " $RUN_OUT "
2023-12-14 16:59:21 +01:00
run_delv " @ $addr " -t AAAA dual.onlinesign.test
2022-07-08 13:36:03 +02:00
grep -qF "fd00:dead:beef:cafe::135" " $RUN_OUT "
2023-12-14 16:59:21 +01:00
run_delv " @ $addr " -t ANY ipv6.onlinesign.test
2022-07-08 13:36:03 +02:00
grep -qF "fd00:dead:beef:cafe::136" " $RUN_OUT "
done
run resolvectl query dual.onlinesign.test
grep -qF "10.0.0.135" " $RUN_OUT "
grep -qF "fd00:dead:beef:cafe::135" " $RUN_OUT "
grep -qF "authenticated: yes" " $RUN_OUT "
run resolvectl query ipv6.onlinesign.test
grep -qF "fd00:dead:beef:cafe::136" " $RUN_OUT "
grep -qF "authenticated: yes" " $RUN_OUT "
2022-04-17 15:50:16 +02:00
# Check a non-existent domain
# Note: mod-onlinesign utilizes Minimally Covering NSEC Records, hence the
# different response than with "standard" DNSSEC
run dig +dnssec this.does.not.exist.onlinesign.test
grep -qF "status: NOERROR" " $RUN_OUT "
grep -qF "NSEC \\000.this.does.not.exist.onlinesign.test." " $RUN_OUT "
# Check a wildcard record
run resolvectl query -t TXT this.should.be.authenticated.wild.onlinesign.test
grep -qF 'this.should.be.authenticated.wild.onlinesign.test IN TXT "this is an onlinesign wildcard"' " $RUN_OUT "
grep -qF "authenticated: yes" " $RUN_OUT "
2022-04-26 17:09:02 -05:00
# Resolve via dbus method
2022-12-16 01:11:39 +09:00
TIMESTAMP = $( date '+%F %T' )
2022-04-26 17:09:02 -05:00
run busctl call org.freedesktop.resolve1 /org/freedesktop/resolve1 org.freedesktop.resolve1.Manager ResolveHostname 'isit' 0 secondsub.onlinesign.test 0 0
grep -qF '10 0 0 134 "secondsub.onlinesign.test"' " $RUN_OUT "
2022-12-16 01:11:39 +09:00
monitor_check_rr " $TIMESTAMP " "secondsub.onlinesign.test IN A 10.0.0.134"
2022-04-17 15:50:16 +02:00
2022-07-08 13:36:03 +02:00
2022-04-17 15:50:16 +02:00
: "--- ZONE: untrusted.test (DNSSEC without propagated DS records) ---"
2022-07-08 13:36:03 +02:00
# Issue: https://github.com/systemd/systemd/issues/23955
# FIXME
resolvectl flush-caches
#run dig +short untrusted.test A untrusted.test AAAA
#grep -qF "10.0.0.121" "$RUN_OUT"
#grep -qF "fd00:dead:beef:cafe::121" "$RUN_OUT"
2022-04-17 15:50:16 +02:00
run resolvectl query untrusted.test
2022-07-08 13:36:03 +02:00
grep -qF "untrusted.test:" " $RUN_OUT "
grep -qF "10.0.0.121" " $RUN_OUT "
grep -qF "fd00:dead:beef:cafe::121" " $RUN_OUT "
2022-04-17 15:50:16 +02:00
grep -qF "authenticated: no" " $RUN_OUT "
2022-07-08 18:12:47 +02:00
run resolvectl service _mysvc._tcp untrusted.test
grep -qF "myservice.untrusted.test:1234" " $RUN_OUT "
grep -qF "10.0.0.123" " $RUN_OUT "
grep -qF "fd00:dead:beef:cafe::123" " $RUN_OUT "
2022-04-17 15:50:16 +02:00
# Issue: https://github.com/systemd/systemd/issues/19472
# 1) Query for a non-existing RR should return NOERROR + NSEC (?), not NXDOMAIN
# FIXME: re-enable once the issue is resolved
#run dig +dnssec AAAA untrusted.test
#grep -qF "status: NOERROR" "$RUN_OUT"
#grep -qE "^untrusted\.test\..+IN\s+NSEC\s+" "$RUN_OUT"
## 2) Query for a non-existing name should return NXDOMAIN, not SERVFAIL
#run dig +dnssec this.does.not.exist.untrusted.test
#grep -qF "status: NXDOMAIN" "$RUN_OUT"
2022-09-30 10:04:37 +02:00
systemctl stop resmontest.service
2022-04-17 15:50:16 +02:00
touch /testok
rm /failed