aboutsummaryrefslogtreecommitdiff
path: root/src/palhm-dnssec-check.sh
blob: 122e51de9da2fbcf9154e3d50e30521fd2992db9 (plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
#!/bin/bash

# This script is a legacy. The same functionality can be implemented by setting
# up a back up task. See [conf/py-sample/sample.jsonc]

do_query () {
	# dig returns 0 upon successful reception and parse of the response message.
	# All the other exit codes other than 0 will cause the script to terminate
	# as a result of set -e. +short option makes dig return the values of RR.
	# We assume that a status code has returned when dig produces no output with
	# the option. Caution must be taken in this approach as zones with no
	# record will also return nothing with the status code zero.
	dig +short +dnssec +notcp ANY "$TARGET" > "$tmpf"
	if [ ! -s "$tmpf" ]; then
		echo "The nameserver returned no RR!
DNSSEC verification probably failed." >&2
		exit 1
	fi
}

if [ "$#" -lt 1 ]; then
	cat >&2 << EOF
The Periodic Automatic Linux Host Maintenance (PALHM) DNSSEC check
Usage: $0 <record name>

The zone must contain at least one resource record set. The nameservers
configured for the host must support DNSSEC validation.

To test your host configuration, running
  \$ $0 dnssec-failed.org
should produce error messages.
EOF
	exit 2
fi

declare TARGET="$1"
declare tmpf="$(mktemp --tmpdir "palhm-dnssec.XXXXXXXXXX")"

do_query & set +e
wait
ec="$?"
rm "$tmpf"

exit "$ec"