No edit summary |
No edit summary |
||
Line 19: | Line 19: | ||
# Web should work flawlessly. | # Web should work flawlessly. | ||
}} | }} | ||
Note: Don't forget to remove the rules if you're testing on a real system. | |||
[[Category:NetworkManager_Test_Cases]] | [[Category:NetworkManager_Test_Cases]] |
Latest revision as of 09:27, 23 September 2014
Description
This test case cover DNS-over-SSL when standard DNS port 53 is blocked.
Setup
Block DNS queries except to localhost to simulate restricted network environment.
iptables -A OUTPUT -o lo -j ACCEPT
iptables -A OUTPUT -p tcp --dport 53 -j REJECT --reject-with icmp-admin-prohibited
iptables -A OUTPUT -p udp --dport 53 -j REJECT --reject-with icmp-admin-prohibited
Right-click on dnssec-trigger applet and select "reprobe"
How to test
- Run:
dig @127.0.0.1 fedoraproject.org SOA +dnssec
- Browse web, open your favorite webpages.
Expected Results
- You should get output containing "ANSWER SECTION" without any error.
- Web should work flawlessly.
Note: Don't forget to remove the rules if you're testing on a real system.