Skip to content

Latest commit

 

History

History
47 lines (31 loc) · 1.41 KB

File metadata and controls

47 lines (31 loc) · 1.41 KB

DNSSEC06: Verify DNSSEC additional processing

Test case identifier

DNSSEC06 Verify DNSSEC additional processing

Objective

In order for an authoritative name server to be DNSSEC compliant, it must serve DNSSEC signatures (RRSIG) as additional data in a DNS answer. This additional processing is described in section 3.1 of [RFC 4035] (https://tools.ietf.org/html/rfc4035#section-3.1).

Inputs

The domain name to be tested.

Ordered description of steps to be taken to execute the test case

  1. For each name server configured for the domain:
  2. Retrieve the DNSKEY RR set from the child zone.
  3. If the answer from the query does contain a DNSKEY and RRSIG, this test case passes.
  4. If there is no DNSKEY RR or RRSIG RR in the answer and the RCODE is NOERROR, this test case fails.

Outcome(s)

If any of the name servers configured for the domains fail to answer with DNSSEC data, this test case fails.

Special procedural requirements

None.

Intercase dependencies

This test should only run if DNSSEC07 has been successful in finding a DNSKEY for the domain.


Copyright (c) 2013, 2014, 2015, IIS (The Internet Infrastructure Foundation)
Copyright (c) 2013, 2014, 2015, AFNIC
Creative Commons Attribution 4.0 International License

You should have received a copy of the license along with this work. If not, see https://creativecommons.org/licenses/by/4.0/.