From Fedora Project Wiki
Description
This test case ensures that the bind
and its related packages perform DNS functionalities and support tasks effectively.
Setup
- Ensure you have a Fedora system.
- Install the related bind packages:
sudo dnf install bind bind-dnssec-utils bind-dyndb-ldap bind-libs bind-license bind-utils
. - Set up a basic configuration for BIND or use the default one.
How to test
- Open a terminal.
- Start the BIND service:
sudo systemctl start named
. - Ensure the BIND service is running without errors:
sudo systemctl status named
. - Use
dig
(frombind-utils
) to query a domain. For example:dig www.fedoraproject.org
. - Check if the response includes an IP address for
www.fedoraproject.com
. - Test DNSSEC functionalities using
dnssec-keygen
to generate a key pair:dnssec-keygen -a RSASHA256 -b 2048 -n ZONE example.com
. - Validate the generated keys are present in the current directory.
- Test LDAP dynamic database plugin (if you have an LDAP setup) using
bind-dyndb-ldap
. - Examine the licenses and documentation:
cat /usr/share/doc/bind-license/COPYRIGHT
. - Check shared libraries using a command or an application that depends on
bind-libs
.
Expected Results
- The BIND service should start and operate without errors.
- The
dig
command should successfully query and return a valid IP address. - DNSSEC key generation should succeed, and the generated keys should be valid.
- If tested, the LDAP dynamic database plugin should function without errors.
- The license file should be correctly displayed.
- Shared libraries from
bind-libs
should work without issues in dependent applications or commands.
Optional
For deeper testing:
- Set up a full DNS zone and validate its operation using
bind
and related tools. - Check zone transfers between primary and secondary DNS servers.
- Verify error handling, e.g., misconfigured DNS zones.
- Test DNSSEC signing and validation more thoroughly.
- Interact with LDAP backends using
bind-dyndb-ldap
, modifying records and observing updates in BIND.