1/* 2 * Copyright (C) Internet Systems Consortium, Inc. ("ISC") 3 * 4 * SPDX-License-Identifier: MPL-2.0 5 * 6 * This Source Code Form is subject to the terms of the Mozilla Public 7 * License, v. 2.0. If a copy of the MPL was not distributed with this 8 * file, you can obtain one at https://mozilla.org/MPL/2.0/. 9 * 10 * See the COPYRIGHT file distributed with this work for additional 11 * information regarding copyright ownership. 12 */ 13 14// NS4 15 16key rndc_key { 17 secret "1234abcd8765"; 18 algorithm hmac-sha256; 19}; 20 21controls { 22 inet 10.53.0.4 port @CONTROLPORT@ allow { any; } keys { rndc_key; }; 23}; 24 25key "sha1" { 26 algorithm "hmac-sha1"; 27 secret "FrSt77yPTFx6hTs4i2tKLB9LmE0="; 28}; 29 30key "sha224" { 31 algorithm "hmac-sha224"; 32 secret "hXfwwwiag2QGqblopofai9NuW28q/1rH4CaTnA=="; 33}; 34 35key "sha256" { 36 algorithm "hmac-sha256"; 37 secret "R16NojROxtxH/xbDl//ehDsHm5DjWTQ2YXV+hGC2iBY="; 38}; 39 40key "keyforview1" { 41 algorithm @DEFAULT_HMAC@; 42 secret "YPfMoAk6h+3iN8MDRQC004iSNHY="; 43}; 44 45key "keyforview2" { 46 algorithm @DEFAULT_HMAC@; 47 secret "4xILSZQnuO1UKubXHkYUsvBRPu8="; 48}; 49 50key "keyforview3" { 51 algorithm @DEFAULT_HMAC@; 52 secret "C1Azf+gGPMmxrUg/WQINP6eV9Y0="; 53}; 54 55dnssec-policy "test" { 56 keys { 57 csk key-directory lifetime 0 algorithm 14; 58 }; 59}; 60 61options { 62 query-source address 10.53.0.4; 63 port @PORT@; 64 pid-file "named.pid"; 65 listen-on { 10.53.0.4; }; 66 listen-on-v6 { none; }; 67 recursion no; 68 dnssec-policy "test"; 69}; 70 71view "inherit" { 72 match-clients { key "sha1"; }; 73 74 /* Inherit dnssec-policy 'test' */ 75 zone "inherit.inherit.signed" { 76 type primary; 77 file "inherit.inherit.signed.db"; 78 inline-signing yes; 79 }; 80 81 /* Override dnssec-policy */ 82 zone "override.inherit.signed" { 83 type primary; 84 file "override.inherit.signed.db"; 85 inline-signing yes; 86 dnssec-policy "default"; 87 }; 88 89 /* Unset dnssec-policy */ 90 zone "none.inherit.signed" { 91 type primary; 92 file "none.inherit.signed.db"; 93 dnssec-policy "none"; 94 }; 95}; 96 97view "override" { 98 match-clients { key "sha224"; }; 99 dnssec-policy "default"; 100 101 /* Inherit dnssec-policy 'test' */ 102 zone "inherit.override.signed" { 103 type primary; 104 file "inherit.override.signed.db"; 105 inline-signing yes; 106 }; 107 108 /* Override dnssec-policy */ 109 zone "override.override.signed" { 110 type primary; 111 file "override.override.signed.db"; 112 inline-signing yes; 113 dnssec-policy "test"; 114 }; 115 116 /* Unset dnssec-policy */ 117 zone "none.override.signed" { 118 type primary; 119 file "none.override.signed.db"; 120 dnssec-policy "none"; 121 }; 122}; 123 124view "none" { 125 match-clients { key "sha256"; }; 126 dnssec-policy "none"; 127 128 /* Inherit dnssec-policy 'none' */ 129 zone "inherit.none.signed" { 130 type primary; 131 file "inherit.none.signed.db"; 132 }; 133 134 /* Override dnssec-policy */ 135 zone "override.none.signed" { 136 type primary; 137 file "override.none.signed.db"; 138 inline-signing yes; 139 dnssec-policy "test"; 140 }; 141 142 /* Unset dnssec-policy */ 143 zone "none.none.signed" { 144 type primary; 145 file "none.none.signed.db"; 146 dnssec-policy "none"; 147 }; 148}; 149 150view "example1" { 151 match-clients { key "keyforview1"; }; 152 153 allow-update { any; }; 154 155 zone "example.net" { 156 type primary; 157 file "example1.db"; 158 }; 159}; 160 161view "example2" { 162 match-clients { key "keyforview2"; }; 163 164 zone "example.net" { 165 type primary; 166 file "example2.db"; 167 inline-signing yes; 168 }; 169}; 170 171view "example3" { 172 match-clients { key "keyforview3"; }; 173 zone "example.net" { 174 in-view example2; 175 }; 176}; 177