Report information
The Basics
Id:
44178
Status:
resolved
Priority:
Medium/Medium
Queue:

People
Owner:
Nobody in particular
Cc:
AdminCc:

BugTracker
Version Fixed:
9.9.10,9.9.10(sub),9.10.5,9.10.5(sub),9.11.1,9.12.0
Version Found:
(no value)
Versions Affected:
(no value)
Versions Planned:
(no value)
Priority:
(no value)
Severity:
(no value)
CVSS Score:
(no value)
CVE ID:
(no value)
Component:
(no value)
Area:
(no value)

Dates
Created:Sun, 08 Jan 2017 23:34:19 -0500
Updated:Mon, 26 Jun 2017 20:38:20 -0400
Closed:Wed, 11 Jan 2017 22:00:47 -0500



This bug tracker is no longer active.

Please go to our Gitlab to submit issues (both feature requests and bug reports) for active projects maintained by Internet Systems Consortium (ISC).

Due to security and confidentiality requirements, full access is limited to the primary maintainers.

Subject: fix test to remove false match
Date: Mon, 09 Jan 2017 15:34:09 +1100
To: bind9-bugs@isc.org
From: "Mark Andrews" <marka@isc.org>
Examining the failed test and data we get a false successful grep. % grep -w MX signer/remove.db.signed MX+KasU7+JHCQ7m7Fk42t1gL8zDpAnVtZXpY % grep "RRSIG MX" signer/remove.db.signed would be better

Subject: test failed: bind9.v9_9_sub.thread x86_64-unknown-linux-gnu
Date: Sun, 8 Jan 2017 20:15:29 -0800 (PST)
To: bind-changes@isc.org
From: <tbox@isc.org> (Tinderbox User)
See https://bind-build.isc.org/#bind9_v9_9_sub Test Failed: dnssec S:dnssec:Sun Jan 8 19:58:05 PST 2017 T:dnssec:1:A A:System test dnssec I:checking that zone transfer worked (1) I:checking AD bit asking for validation (2) I:checking that AD is not set without +adflag or +dnssec (3) I:checking for AD in authoritative answer (4) I:checking positive validation NSEC (5) I:checking positive validation NSEC3 (6) I:checking positive validation OPTOUT (7) I:checking positive wildcard validation NSEC (8) I:checking positive wildcard answer NSEC3 (9) I:checking positive wildcard answer NSEC3 (10) I:checking positive wildcard validation NSEC3 (11) I:checking positive wildcard validation OPTOUT (12) I:checking negative validation NXDOMAIN NSEC (13) I:checking negative validation NXDOMAIN NSEC3 (14) I:checking negative validation NXDOMAIN OPTOUT (15) I:checking negative validation NODATA NSEC (16) I:checking negative validation NODATA NSEC3 (17) I:checking negative validation NODATA OPTOUT (18) I:checking negative wildcard validation NSEC (19) I:checking negative wildcard validation NSEC3 (20) I:checking negative wildcard validation OPTOUT (21) I:checking 1-server insecurity proof NSEC (22) I:checking 1-server insecurity proof NSEC3 (23) I:checking 1-server insecurity proof OPTOUT (24) I:checking 1-server negative insecurity proof NSEC (25) I:checking 1-server negative insecurity proof NSEC3 (26) I:checking 1-server negative insecurity proof OPTOUT (27) I:checking 1-server negative insecurity proof with SOA hack NSEC (28) I:checking 1-server negative insecurity proof with SOA hack NSEC3 (29) I:checking 1-server negative insecurity proof with SOA hack OPTOUT (30) I:checking multi-stage positive validation NSEC/NSEC (31) I:checking multi-stage positive validation NSEC/NSEC3 (32) I:checking multi-stage positive validation NSEC/OPTOUT (33) I:checking multi-stage positive validation NSEC3/NSEC (34) I:checking multi-stage positive validation NSEC3/NSEC3 (35) I:checking multi-stage positive validation NSEC3/OPTOUT (36) I:checking multi-stage positive validation OPTOUT/NSEC (37) I:checking multi-stage positive validation OPTOUT/NSEC3 (38) I:checking multi-stage positive validation OPTOUT/OPTOUT (39) I:checking empty NODATA OPTOUT (40) I:checking failed validation (41) I:checking that validation fails with a misconfigured trusted key (42) I:checking that negative validation fails with a misconfigured trusted key (43) I:checking that insecurity proofs fail with a misconfigured trusted key (44) I:checking that validation fails when key record is missing (45) I:checking that validation succeeds when a revoked key is encountered (46) I:Checking that a bad CNAME signature is caught after a +CD query (47) I:Checking that a bad DNAME signature is caught after a +CD query (48) I:checking 2-server insecurity proof (49) I:checking 2-server insecurity proof with a negative answer (50) I:checking 2-server insecurity proof with a negative answer and SOA hack (51) I:checking security root query (52) I:checking cd bit on a positive answer (53) I:checking cd bit on a negative answer (54) I:checking positive validation RSASHA256 NSEC (55) I:checking positive validation RSASHA512 NSEC (56) I:checking positive validation with KSK-only DNSKEY signature (57) I:checking cd bit on a query that should fail (58) I:checking cd bit on an insecurity proof (59) I:checking cd bit on a negative insecurity proof (60) I:checking that validation of an ANY query works (61) I:checking that validation of a query returning a CNAME works (62) I:checking that validation of a query returning a DNAME works (63) I:checking that validation of an ANY query returning a CNAME works (64) I:checking that validation of an ANY query returning a DNAME works (65) I:checking that positive validation in a privately secure zone works (66) I:checking that negative validation in a privately secure zone works (67) I:checking that lookups succeed after disabling a algorithm works (68) I:checking privately secure to nxdomain works (69) I:checking privately secure wildcard to nxdomain works (70) I:checking a non-cachable NODATA works (71) I:checking a non-cachable NXDOMAIN works (72) I:checking dnssec-lookaside-validation works (73) I:checking that we can load a rfc2535 signed zone (74) I:checking that we can transfer a rfc2535 signed zone (75) I:checking that we can sign a zone with out-of-zone records (76) I:checking that we can sign a zone (NSEC3) with out-of-zone records (77) I:checking NSEC3 signing with empty nonterminals above a delegation (78) I:checking that dnsssec-signzone updates originalttl on ttl changes (79) I:checking dnssec-signzone keeps valid signatures from removed keys (80) I:checking dnssec-signzone -R purges signatures from removed keys (81) I:checking dnssec-signzone keeps valid signatures from inactive keys (82) I:checking dnssec-signzone -Q purges signatures from inactive keys (83) I:checking dnssec-signzone retains unexpired signatures (84) I:checking dnssec-signzone purges RRSIGs from formerly-owned glue (nsec) (85) I:checking dnssec-signzone purges RRSIGs from formerly-owned glue (nsec3) (86) I:checking dnssec-signzone output format (87) I:checking dnssec-signzone output format (87) I:checking validated data are not cached longer than originalttl (87) I:checking rndc secroots (88) I:checking RRSIG query from cache (89) I:checking RRSIG query not in cache (90) I:checking NSEC3 zone with mismatched NSEC3PARAM / NSEC parameters (91) I:checking optout NSEC3 referral with only insecure delegations (92) I:checking optout NSEC3 NXDOMAIN with only insecure delegations (93) I:checking optout NSEC3 nodata with only insecure delegations (94) I:checking that a zone finishing the transition from RSASHA1 to RSASHA256 validates secure (95) I:checking positive and negative validation with negative trust anchors (96) I:ns4 Negative trust anchor added: bogus.example/_default, expires 08-Jan-2017 19:58:35.000 I:ns4 Negative trust anchor added: badds.example/_default, expires 08-Jan-2017 19:58:25.000 I:ns4 Negative trust anchor added: secure.example/_default, expires 08-Jan-2017 19:58:26.000 I:ns4 Negative trust anchor added: fakenode.secure.example/_default, expires 08-Jan-2017 19:58:26.000 server reload successful I: dumping secroots I: waiting for NTA rechecks/expirations I: testing NTA removals (97) I:ns4 Negative trust anchor added: badds.example/_default, expires 08-Jan-2017 19:58:47.000 I: remove non-existent NTA three times I: testing NTA with bogus lifetimes (98) I:check with no nta lifetime specified I:check with bad nta lifetime I:check with too long nta lifetime I: testing NTA persistence across restarts (99) I:ns4 Negative trust anchor added: bogus.example/_default, expires 08-Jan-2017 19:59:07.000 I:ns4 Negative trust anchor added: badds.example/_default, expires 08-Jan-2017 19:58:47.000 I:killing ns4 with SIGTERM I:waiting till 14s have passed since NTAs were added before restarting ns4 I:restarted server ns4 I:sleeping for an additional 4 seconds for ns4 to fully startup I: testing loading regular attribute from NTA file (100) I:killing ns4 with SIGTERM I:sleeping for an additional 4 seconds for ns4 to fully shutdown I:restarted server ns4 I:waiting till 10s have passed after ns4 was restarted I: testing loading forced attribute from NTA file (101) I:killing ns4 with SIGTERM I:sleeping for an additional 4 seconds for ns4 to fully shutdown I:restarted server ns4 I:waiting till 10s have passed after ns4 was restarted I: testing loading out of bounds lifetime from NTA file (102) I:killing ns4 with SIGTERM I:sleeping for an additional 4 seconds for ns4 to fully shutdown I:restarted server ns4 I:sleeping for an additional 4 seconds for ns4 to fully startup I:completed NTA tests I:running DNSSEC update test I:Add a name I:Delete the name I:All update tests successful. I:checking managed key maintenance has not started yet (103) I:switching to automatic root key configuration I:checking managed key maintenance timer has now started (104) I:checking positive validation NSEC (105) I:checking positive validation NSEC3 (106) I:checking positive validation OPTOUT (107) I:checking negative validation (108) I:checking that root DS queries validate (109) I:checking that DS at a RFC 1918 empty zone lookup succeeds (110) I:checking expired signatures remain with "allow-update { none; };" and no keys available (111) I:checking expired signatures do not validate (112) I:checking that the NSEC3 record for the apex is properly signed when a DNSKEY is added via UPDATE (113) I:checking that the NSEC record is properly generated when DNSKEY are added via auto-dnssec (114) I:checking that the NSEC3 record is properly generated when DNSKEY are added via auto-dnssec (115) I:checking that signing records have been marked as complete (116) I:check that 'rndc signing' without arguments is handled (117) I:check that 'rndc signing -list' without zone is handled (118) I:check that 'rndc signing -clear' without additional arguments is handled (119) I:check that 'rndc signing -clear all' without zone is handled (120) I:check that 'rndc signing -nsec3param' without additional arguments is handled (121) I:check that 'rndc signing -nsec3param none' without zone is handled (122) I:check that 'rndc signing -nsec3param 1' without additional arguments is handled (123) I:check that 'rndc signing -nsec3param 1 0' without additional arguments is handled (124) I:check that 'rndc signing -nsec3param 1 0 0' without additional arguments is handled (125) I:check that 'rndc signing -nsec3param 1 0 0 -' without zone is handled (126) I:check that 'rndc signing -nsec3param' works with salt (127) I:sleeping .... I:check that 'rndc signing -nsec3param' works without salt (128) I:sleeping .... I:check rndc signing -list output (129) I:clear signing records (130) I:checking that a insecure zone beneath a cname resolves (131) I:checking that a secure zone beneath a cname resolves (132) I:checking dnskey query with no data still gets put in cache (133) I:check that a split dnssec dnssec-signzone work (134) I:check that a smart split dnssec dnssec-signzone work (135) I:check that NOTIFY is sent at the end of NSEC3 chain generation (136) I:sleeping .... I:check dnssec-dsfromkey from stdin (137) I:testing soon-to-expire RRSIGs without a replacement private key (138) I:testing new records are signed with 'no-resign' (139) I:testing expiring records aren't resigned with 'no-resign' (140) I:testing updates fail with no private key (141) I:testing legacy upper case signer name validation (142) I:testing that we lower case signer name (143) I:testing TTL is capped at RRSIG expiry time (144) I:ns3 zone reload queued I:testing TTL is capped at RRSIG expiry time for records in the additional section (145) I:testing TTL of about to expire RRsets with dnssec-accept-expired yes; (146) I:testing TTL of expired RRsets with dnssec-accept-expired yes; (147) I:testing TTL is capped at RRSIG expiry time for records in the additional section with dnssec-accept-expired yes; (148) I:testing DNSKEY lookup via CNAME (149) I:testing KEY lookup at CNAME (present) (150) I:testing KEY lookup at CNAME (not present) (151) I:testing DNSKEY lookup via DNAME (152) I:testing KEY lookup via DNAME (153) I:check that named doesn't loop when all private keys are not available (154) I:check against against missing nearest provable proof (155) I:check KEYDATA records are printed in human readable form in key zone (156) I:check simultaneous inactivation and publishing of dnskeys removes inactive signature (157) I:check that increasing the sig-validity-interval resigning triggers re-signing I:check insecure delegation between static-stub zones (159) I:check that split rrsigs are handled (160) I:check that 'dnssec-keygen -S' works for all supported algorithms (161) I:check that CDS records are signed using KSK by dnssec-signzone (162) I:Skipping 'dig +sigchase' tests I:checking that positive unknown NSEC3 hash algorithm does validate (164) I:check that CDS records are signed using KSK by with dnssec-auto (165) I:check that a lone non matching CDS record is rejected (166) I:check that CDS records are signed using KSK when added by nsupdate (167) I:checking that positive unknown NSEC3 hash algorithm with OPTOUT does validate (168) I:check that a non matching CDS record is accepted with a matching CDS record (169) I:checking that negative unknown NSEC3 hash algorithm does not validate (170) I:check that CDNSKEY records are signed using KSK by dnssec-signzone (171) I:checking that negative unknown NSEC3 hash algorithm with OPTOUT does not validate (172) I:check that CDNSKEY records are signed using KSK by with dnssec-auto (173) I:checking that unknown DNSKEY algorithm validates as insecure (174) I:check that a lone non matching CDNSKEY record is rejected (175) I:checking that unknown DNSKEY algorithm + unknown NSEC3 has algorithm validates as insecure (176) I:check that CDNSKEY records are signed using KSK when added by nsupdate (177) I:checking initialization with a revoked managed key (178) I:check that a non matching CDNSKEY record is accepted with a matching CDNSKEY record (179) I:check that RRSIGs are correctly removed from apex when RRset is removed NSEC (180) I:failed I:check that RRSIGs are correctly removed from apex when RRset is removed NSEC3 (181) I:failed I:check that a named managed zone that was signed 'in-the-future' is re-signed when loaded (182) I:exit status: 2 R:FAIL E:dnssec:Sun Jan 8 20:00:05 PST 2017