1/*
2 * Copyright (C) Internet Systems Consortium, Inc. ("ISC")
3 *
4 * SPDX-License-Identifier: MPL-2.0
5 *
6 * This Source Code Form is subject to the terms of the Mozilla Public
7 * License, v. 2.0.  If a copy of the MPL was not distributed with this
8 * file, you can obtain one at https://mozilla.org/MPL/2.0/.
9 *
10 * See the COPYRIGHT file distributed with this work for additional
11 * information regarding copyright ownership.
12 */
13
14// NS4
15
16key rndc_key {
17	secret "1234abcd8765";
18	algorithm hmac-sha256;
19};
20
21controls {
22	inet 10.53.0.4 port @CONTROLPORT@ allow { any; } keys { rndc_key; };
23};
24
25key "sha1" {
26	algorithm "hmac-sha1";
27	secret "FrSt77yPTFx6hTs4i2tKLB9LmE0=";
28};
29
30key "sha224" {
31	algorithm "hmac-sha224";
32	secret "hXfwwwiag2QGqblopofai9NuW28q/1rH4CaTnA==";
33};
34
35key "sha256" {
36	algorithm "hmac-sha256";
37	secret "R16NojROxtxH/xbDl//ehDsHm5DjWTQ2YXV+hGC2iBY=";
38};
39
40key "keyforview1" {
41	algorithm "hmac-sha1";
42	secret "YPfMoAk6h+3iN8MDRQC004iSNHY=";
43};
44
45key "keyforview2" {
46	algorithm "hmac-sha1";
47	secret "4xILSZQnuO1UKubXHkYUsvBRPu8=";
48};
49
50key "keyforview3" {
51	algorithm "hmac-sha1";
52	secret "C1Azf+gGPMmxrUg/WQINP6eV9Y0=";
53};
54
55dnssec-policy "test" {
56	keys {
57		csk key-directory lifetime 0 algorithm 14;
58	};
59};
60
61options {
62	query-source address 10.53.0.4;
63	port @PORT@;
64	pid-file "named.pid";
65	listen-on { 10.53.0.4; };
66	listen-on-v6 { none; };
67	recursion no;
68	dnssec-policy "test";
69};
70
71view "inherit" {
72	match-clients { key "sha1"; };
73
74	/* Inherit dnssec-policy 'test' */
75	zone "inherit.inherit.signed" {
76		type primary;
77		file "inherit.inherit.signed.db";
78	};
79
80	/* Override dnssec-policy */
81	zone "override.inherit.signed" {
82		type primary;
83		dnssec-policy "default";
84		file "override.inherit.signed.db";
85	};
86
87	/* Unset dnssec-policy */
88	zone "none.inherit.signed" {
89		type primary;
90		dnssec-policy "none";
91		file "none.inherit.signed.db";
92	};
93};
94
95view "override" {
96	match-clients { key "sha224"; };
97	dnssec-policy "default";
98
99	/* Inherit dnssec-policy 'test' */
100	zone "inherit.override.signed" {
101		type primary;
102		file "inherit.override.signed.db";
103	};
104
105	/* Override dnssec-policy */
106	zone "override.override.signed" {
107		type primary;
108		dnssec-policy "test";
109		file "override.override.signed.db";
110	};
111
112	/* Unset dnssec-policy */
113	zone "none.override.signed" {
114		type primary;
115		dnssec-policy "none";
116		file "none.override.signed.db";
117	};
118};
119
120view "none" {
121	match-clients { key "sha256"; };
122	dnssec-policy "none";
123
124	/* Inherit dnssec-policy 'none' */
125	zone "inherit.none.signed" {
126		type primary;
127		file "inherit.none.signed.db";
128	};
129
130	/* Override dnssec-policy */
131	zone "override.none.signed" {
132		type primary;
133		dnssec-policy "test";
134		file "override.none.signed.db";
135	};
136
137	/* Unset dnssec-policy */
138	zone "none.none.signed" {
139		type primary;
140		dnssec-policy "none";
141		file "none.none.signed.db";
142	};
143};
144
145view "example1" {
146	match-clients { key "keyforview1"; };
147
148	zone "example.net" {
149		type primary;
150		file "example1.db";
151	};
152};
153
154view "example2" {
155	match-clients { key "keyforview2"; };
156
157	zone "example.net" {
158		type primary;
159		file "example2.db";
160	};
161};
162
163view "example3" {
164	match-clients { key "keyforview3"; };
165	zone "example.net" {
166		in-view example2;
167	};
168};
169