1#!/bin/sh 2# 3# Copyright (C) 2009, 2010, 2012 Internet Systems Consortium, Inc. ("ISC") 4# 5# Permission to use, copy, modify, and/or distribute this software for any 6# purpose with or without fee is hereby granted, provided that the above 7# copyright notice and this permission notice appear in all copies. 8# 9# THE SOFTWARE IS PROVIDED "AS IS" AND ISC DISCLAIMS ALL WARRANTIES WITH 10# REGARD TO THIS SOFTWARE INCLUDING ALL IMPLIED WARRANTIES OF MERCHANTABILITY 11# AND FITNESS. IN NO EVENT SHALL ISC BE LIABLE FOR ANY SPECIAL, DIRECT, 12# INDIRECT, OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES WHATSOEVER RESULTING FROM 13# LOSS OF USE, DATA OR PROFITS, WHETHER IN AN ACTION OF CONTRACT, NEGLIGENCE 14# OR OTHER TORTIOUS ACTION, ARISING OUT OF OR IN CONNECTION WITH THE USE OR 15# PERFORMANCE OF THIS SOFTWARE. 16 17# Id: sign.sh,v 1.5 2010/01/07 23:48:53 tbox Exp 18 19SYSTEMTESTTOP=../.. 20. $SYSTEMTESTTOP/conf.sh 21 22RANDFILE=../random.data 23 24zone=. 25infile=root.db.in 26zonefile=root.db 27 28(cd ../ns2 && sh -e sign.sh ) 29 30cp ../ns2/dsset-example. . 31cp ../ns2/dsset-example.com. . 32 33keyname1=`$KEYGEN -q -r $RANDFILE -a RSASHA256 -b 1024 -n zone $zone` 34keyname2=`$KEYGEN -q -r $RANDFILE -a RSASHA256 -b 2048 -f KSK -n zone $zone` 35cat $infile $keyname1.key $keyname2.key > $zonefile 36 37$SIGNER -g -r $RANDFILE -o $zone $zonefile > /dev/null 2>&1 38 39# Configure the resolving server with a trusted key. 40 41cat $keyname2.key | grep -v '^; ' | $PERL -n -e ' 42local ($dn, $class, $type, $flags, $proto, $alg, @rest) = split; 43local $key = join("", @rest); 44print <<EOF 45trusted-keys { 46 "$dn" $flags $proto $alg "$key"; 47}; 48EOF 49' > trusted.conf 50cp trusted.conf ../ns2/trusted.conf 51cp trusted.conf ../ns3/trusted.conf 52cp trusted.conf ../ns4/trusted.conf 53