-
Notifications
You must be signed in to change notification settings - Fork 1
/
receive-dnskeys
executable file
·42 lines (34 loc) · 1.12 KB
/
receive-dnskeys
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
#!/usr/bin/env bash
# $Id: receive-dnskeys 69353 2014-09-02 16:06:19Z cgielen $
# $URL: https://svn.uvt.nl/its-unix/systems/metagross/usr/local/sbin/receive-dnskeys $
# Copyright 2013-2014 Casper Gielen
# Written for Tilburg University
# License: GPLv2 or later
#
# Dit script ontvangt nieuwe DNSKEYs van OpenDNSSEC.
# Deze keys moeten in de (juiste) parent-zone worden gepubliceerd.
# Tijdens de testperiode moeten deze keys aan unbound worden gevoerd.
#
# Dit script doet niks met de ontvangen keys maar geeft alleen het domein door
# aan ods-uploadkey. Dat script bepaalt zelf welke keys moeten worden geupload.
ZONES=""
LOG=/var/log/dnssec/receive-keys.log
date >> $LOG
while read line;
do
echo "$line" >> $LOG
echo "$line" | grep -vq DNSKEY && continue
ZONE=$(echo $line | cut -d ' ' -f 1) # first word
ZONE=${ZONE%.} # strip leading dot
# TLD=${ZONE##.*} # tld
ZONES="$ZONE\n$ZONES"
done
for ZONE in $( echo -e $ZONES | sort -u);
do
if grep -q "^${ZONE}$" /usr/local/etc/domeinen/dnssec.conf;
then
/usr/local/sbin/ods-uploadkeys $ZONE >> $LOG
else
echo "Not uploading non-dnssec-domain $ZONE" >> $LOG
fi
done