1/* 2 * Copyright (C) Internet Systems Consortium, Inc. ("ISC") 3 * 4 * SPDX-License-Identifier: MPL-2.0 5 * 6 * This Source Code Form is subject to the terms of the Mozilla Public 7 * License, v. 2.0. If a copy of the MPL was not distributed with this 8 * file, you can obtain one at https://mozilla.org/MPL/2.0/. 9 * 10 * See the COPYRIGHT file distributed with this work for additional 11 * information regarding copyright ownership. 12 */ 13 14// NS4 15 16key rndc_key { 17 secret "1234abcd8765"; 18 algorithm hmac-sha256; 19}; 20 21controls { 22 inet 10.53.0.4 port @CONTROLPORT@ allow { any; } keys { rndc_key; }; 23}; 24 25key "sha1" { 26 algorithm "hmac-sha1"; 27 secret "FrSt77yPTFx6hTs4i2tKLB9LmE0="; 28}; 29 30key "sha224" { 31 algorithm "hmac-sha224"; 32 secret "hXfwwwiag2QGqblopofai9NuW28q/1rH4CaTnA=="; 33}; 34 35key "sha256" { 36 algorithm "hmac-sha256"; 37 secret "R16NojROxtxH/xbDl//ehDsHm5DjWTQ2YXV+hGC2iBY="; 38}; 39 40key "keyforview1" { 41 algorithm "hmac-sha1"; 42 secret "YPfMoAk6h+3iN8MDRQC004iSNHY="; 43}; 44 45key "keyforview2" { 46 algorithm "hmac-sha1"; 47 secret "4xILSZQnuO1UKubXHkYUsvBRPu8="; 48}; 49 50key "keyforview3" { 51 algorithm "hmac-sha1"; 52 secret "C1Azf+gGPMmxrUg/WQINP6eV9Y0="; 53}; 54 55dnssec-policy "test" { 56 keys { 57 csk key-directory lifetime 0 algorithm 14; 58 }; 59}; 60 61options { 62 query-source address 10.53.0.4; 63 port @PORT@; 64 pid-file "named.pid"; 65 listen-on { 10.53.0.4; }; 66 listen-on-v6 { none; }; 67 recursion no; 68 dnssec-policy "test"; 69}; 70 71view "inherit" { 72 match-clients { key "sha1"; }; 73 74 /* Inherit dnssec-policy 'test' */ 75 zone "inherit.inherit.signed" { 76 type primary; 77 file "inherit.inherit.signed.db"; 78 }; 79 80 /* Override dnssec-policy */ 81 zone "override.inherit.signed" { 82 type primary; 83 dnssec-policy "default"; 84 file "override.inherit.signed.db"; 85 }; 86 87 /* Unset dnssec-policy */ 88 zone "none.inherit.signed" { 89 type primary; 90 dnssec-policy "none"; 91 file "none.inherit.signed.db"; 92 }; 93}; 94 95view "override" { 96 match-clients { key "sha224"; }; 97 dnssec-policy "default"; 98 99 /* Inherit dnssec-policy 'test' */ 100 zone "inherit.override.signed" { 101 type primary; 102 file "inherit.override.signed.db"; 103 }; 104 105 /* Override dnssec-policy */ 106 zone "override.override.signed" { 107 type primary; 108 dnssec-policy "test"; 109 file "override.override.signed.db"; 110 }; 111 112 /* Unset dnssec-policy */ 113 zone "none.override.signed" { 114 type primary; 115 dnssec-policy "none"; 116 file "none.override.signed.db"; 117 }; 118}; 119 120view "none" { 121 match-clients { key "sha256"; }; 122 dnssec-policy "none"; 123 124 /* Inherit dnssec-policy 'none' */ 125 zone "inherit.none.signed" { 126 type primary; 127 file "inherit.none.signed.db"; 128 }; 129 130 /* Override dnssec-policy */ 131 zone "override.none.signed" { 132 type primary; 133 dnssec-policy "test"; 134 file "override.none.signed.db"; 135 }; 136 137 /* Unset dnssec-policy */ 138 zone "none.none.signed" { 139 type primary; 140 dnssec-policy "none"; 141 file "none.none.signed.db"; 142 }; 143}; 144 145view "example1" { 146 match-clients { key "keyforview1"; }; 147 148 zone "example.net" { 149 type primary; 150 file "example1.db"; 151 }; 152}; 153 154view "example2" { 155 match-clients { key "keyforview2"; }; 156 157 zone "example.net" { 158 type primary; 159 file "example2.db"; 160 }; 161}; 162 163view "example3" { 164 match-clients { key "keyforview3"; }; 165 zone "example.net" { 166 in-view example2; 167 }; 168}; 169