The !7530 broke mkeys test on Windows
(It would be also ok to disable this test on Windows.)
S:mkeys:2023-02-15T03:17:19-0800
T:mkeys:1:A
A:mkeys:System test mkeys
I:mkeys:PORTRANGE:10000 - 10099
I:mkeys:starting servers
I:mkeys:check for signed record (1)
I:mkeys:check positive validation with valid trust anchor (2)
I:mkeys:check positive validation using delv (3)
I:mkeys:check for failed validation due to wrong key in managed-keys (4)
I:mkeys:check new trust anchor can be added (5)
I:mkeys:ns2 refreshing managed keys for '_default'
I:mkeys:check new trust anchor can't be added with bad initial key (6)
I:mkeys:ns3 refreshing managed keys for '_default'
I:mkeys:remove untrusted standby key, check timer restarts (7)
I:mkeys:ns2 refreshing managed keys for '_default'
I:mkeys:restore untrusted standby key, revoke original key (8)
I:mkeys:ns2 refreshing managed keys for '_default'
I:mkeys:refresh managed-keys, ensure same result (9)
I:mkeys:ns2 refreshing managed keys for '_default'
I:mkeys:restore revoked key, ensure same result (10)
I:mkeys:ns2 refreshing managed keys for '_default'
I:mkeys:reinitialize trust anchors, add second key to bind.keys
I:mkeys:check that no key from bind.keys is marked as an initializing key (11)
I:mkeys:reinitialize trust anchors, revert to one key in bind.keys
I:mkeys:check that standby key is now trusted (12)
I:mkeys:revoke original key, add new standby (13)
I:mkeys:ns2 refreshing managed keys for '_default'
I:mkeys:revoke standby before it is trusted (14)
I:mkeys:ns2 refreshing managed keys for '_default'
I:mkeys:ns2 refreshing managed keys for '_default'
I:mkeys:wait 20 seconds for key add/remove holddowns to expire (15)
I:mkeys:ns2 refreshing managed keys for '_default'
I:mkeys:revoke all keys, confirm roll to insecure (16)
I:mkeys:ns2 refreshing managed keys for '_default'
I:mkeys:check for insecure response (17)
I:mkeys:ns2 refreshing managed keys for '_default'
I:mkeys:reset the root server (18)
I:mkeys:ns1 server reload successful
I:mkeys:reinitialize trust anchors
I:mkeys:check positive validation (19)
I:mkeys:revoke key with bad signature, check revocation is ignored (20)
I:mkeys:ns1 server reload successful
I:mkeys:ns2 refreshing managed keys for '_default'
I:mkeys:check validation fails with bad DNSKEY rrset (21)
I:mkeys:restore DNSKEY rrset, check validation succeeds again (22)
I:mkeys:ns1 server reload successful
I:mkeys:reset the root server with no keys, check for minimal update (23)
I:mkeys:ns2 refreshing managed keys for '_default'
I:mkeys:ns2 refreshing managed keys for '_default'
I:mkeys:reset the root server with no signatures, check for minimal update (24)
I:mkeys:ns2 refreshing managed keys for '_default'
I:mkeys:ns2 refreshing managed keys for '_default'
I:mkeys:restore root server, check validation succeeds again (25)
I:mkeys:ns1 server reload successful
I:mkeys:ns2 refreshing managed keys for '_default'
I:mkeys:check that trust-anchor-telemetry queries are logged (26)
I:mkeys:check that trust-anchor-telemetry queries are received (27)
I:mkeys:check 'rndc-managed-keys destroy' (28)
I:mkeys:ns2 destroying managed-keys database for '_default'
I:mkeys:check that trust-anchor-telemetry queries contain the correct key (29)
I:mkeys:check initialization fails if managed-keys can't be created (30)
I:mkeys:check failure to contact root servers does not prevent key refreshes after restart (31)
I:mkeys:exceeded time limit waiting for 'Returned from key fetch in keyfetch_done() for 'sub.foo':' in ns5/named.run
I:mkeys:failed
I:mkeys:check 'rndc managed-keys' and islands of trust root unreachable (32)
I:mkeys:failed
I:mkeys:check key refreshes are resumed after root servers become available (33)
I:mkeys:exceeded time limit waiting for 'Returned from key fetch in keyfetch_done() for 'sub.foo': success' in ns5/named.run
I:mkeys:exceeded time limit waiting for 'Returned from key fetch in keyfetch_done() for 'sub.foo': success' in ns5/named.run
I:mkeys:failed
I:mkeys:reinitialize trust anchors, add unsupported algorithm (34)
I:mkeys:ignoring unsupported algorithm in managed-keys (35)
I:mkeys:introduce unsupported algorithm rollover in authoritative zone (36)
I:mkeys:ignoring unsupported algorithm in rollover (37)
I:mkeys:ns1 server reload successful
I:mkeys:ns6 refreshing managed keys for '_default'
I:mkeys:check 'rndc managed-keys' and views (38)
I:mkeys:check 'rndc managed-keys' and islands of trust now that root is reachable (39)
I:mkeys:failed
I:mkeys:exit status: 4
I:mkeys:stopping servers
R:mkeys:FAIL
E:mkeys:2023-02-15T03:20:09-0800
See: