From Fedora Project Wiki


This test case ensures that the bind and its related packages perform DNS functionalities and support tasks effectively.


  1. Ensure you have a Fedora system.
  2. Install the related bind packages: sudo dnf install bind bind-dnssec-utils bind-dyndb-ldap bind-libs bind-license bind-utils.
  3. Set up a basic configuration for BIND or use the default one.

How to test

  1. Open a terminal.
  2. Start the BIND service: sudo systemctl start named.
  3. Ensure the BIND service is running without errors: sudo systemctl status named.
  4. Use dig (from bind-utils) to query a domain. For example: dig
  5. Check if the response includes an IP address for
  6. Test DNSSEC functionalities using dnssec-keygen to generate a key pair: dnssec-keygen -a RSASHA256 -b 2048 -n ZONE
  7. Validate the generated keys are present in the current directory.
  8. Test LDAP dynamic database plugin (if you have an LDAP setup) using bind-dyndb-ldap.
  9. Examine the licenses and documentation: cat /usr/share/doc/bind-license/COPYRIGHT.
  10. Check shared libraries using a command or an application that depends on bind-libs.

Expected Results

  1. The BIND service should start and operate without errors.
  2. The dig command should successfully query and return a valid IP address.
  3. DNSSEC key generation should succeed, and the generated keys should be valid.
  4. If tested, the LDAP dynamic database plugin should function without errors.
  5. The license file should be correctly displayed.
  6. Shared libraries from bind-libs should work without issues in dependent applications or commands.


For deeper testing:

  1. Set up a full DNS zone and validate its operation using bind and related tools.
  2. Check zone transfers between primary and secondary DNS servers.
  3. Verify error handling, e.g., misconfigured DNS zones.
  4. Test DNSSEC signing and validation more thoroughly.
  5. Interact with LDAP backends using bind-dyndb-ldap, modifying records and observing updates in BIND.