]> git.saurik.com Git - apple/network_cmds.git/blame - unbound/testdata/autotrust_revtp.rpl
network_cmds-596.100.2.tar.gz
[apple/network_cmds.git] / unbound / testdata / autotrust_revtp.rpl
CommitLineData
89c4ed63
A
1; config options
2server:
3 target-fetch-policy: "0 0 0 0 0"
4 log-time-ascii: yes
5stub-zone:
6 name: "."
7 stub-addr: 193.0.14.129 # K.ROOT-SERVERS.NET.
8AUTOTRUST_FILE example.com
9; autotrust trust anchor file
10;;id: example.com. 1
11;;last_queried: 1258962400 ;;Mon Nov 23 08:46:40 2009
12;;last_success: 1258962400 ;;Mon Nov 23 08:46:40 2009
13;;next_probe_time: 1258967360 ;;Mon Nov 23 10:09:20 2009
14;;query_failed: 0
15;;query_interval: 5400
16;;retry_time: 3600
17example.com. 10800 IN DNSKEY 257 3 5 AwEAAas/cAhCFXvBUgTSNZCvQp0pLx1dY+7rXR0hH4/3EUgWmsmbYUpI1qD0xhwKD/oYGEwAm291fyWJ9c0oVxXDEK8= ;{id = 16486 (ksk), size = 512b} ;;state=2 [ VALID ] ;;count=0 ;;lastchange=1258962400 ;;Mon Nov 23 08:46:40 2009
18example.com. 10800 IN DNSKEY 257 3 5 AwEAAc3Z5DQDJpH4oPdNtC4BUQHk50XMD+dHr4r8psHmivIa83hxR5CRgCtd9sENCW9Ae8OIO19xw9t/RPaEAqQa+OE= ;{id = 55582 (ksk), size = 512b} ;;state=2 [ VALID ] ;;count=0 ;;lastchange=1258962400 ;;Mon Nov 23 08:46:40 2009
19AUTOTRUST_END
20CONFIG_END
21
22SCENARIO_BEGIN Test autotrust with trust point revocation
23
24; K-ROOT
25RANGE_BEGIN 0 100
26 ADDRESS 193.0.14.129
27ENTRY_BEGIN
28MATCH opcode qname qtype
29ADJUST copy_id copy_query
30REPLY QR AA
31SECTION QUESTION
32. IN NS
33SECTION ANSWER
34. IN NS k.root-servers.net.
35SECTION ADDITIONAL
36k.root-servers.net IN A 193.0.14.129
37ENTRY_END
38
39ENTRY_BEGIN
40MATCH opcode subdomain
41ADJUST copy_id copy_query
42REPLY QR
43SECTION QUESTION
44com. IN NS
45SECTION AUTHORITY
46com. IN NS a.gtld-servers.net.
47SECTION ADDITIONAL
48a.gtld-servers.net. IN A 192.5.6.30
49ENTRY_END
50RANGE_END
51
52; a.gtld-servers.net.
53RANGE_BEGIN 0 100
54 ADDRESS 192.5.6.30
55ENTRY_BEGIN
56MATCH opcode subdomain
57ADJUST copy_id copy_query
58REPLY QR
59SECTION QUESTION
60example.com. IN NS
61SECTION AUTHORITY
62example.com. IN NS ns.example.com.
63SECTION ADDITIONAL
64ns.example.com. IN A 1.2.3.4
65ENTRY_END
66RANGE_END
67
68; ns.example.com.
69RANGE_BEGIN 0 100
70 ADDRESS 1.2.3.4
71ENTRY_BEGIN
72MATCH opcode qname qtype
73ADJUST copy_id
74REPLY QR AA
75SECTION QUESTION
76example.com. IN DNSKEY
77SECTION ANSWER
78
79; revoked keys
80
81example.com. 10800 IN DNSKEY 385 3 5 AwEAAc3Z5DQDJpH4oPdNtC4BUQHk50XMD+dHr4r8psHmivIa83hxR5CRgCtd9sENCW9Ae8OIO19xw9t/RPaEAqQa+OE= ;{id = 55710 (ksk), size = 512b}
82example.com. 10800 IN DNSKEY 385 3 5 AwEAAas/cAhCFXvBUgTSNZCvQp0pLx1dY+7rXR0hH4/3EUgWmsmbYUpI1qD0xhwKD/oYGEwAm291fyWJ9c0oVxXDEK8= ;{id = 16614 (ksk), size = 512b}
83; signatures
84example.com. 10800 IN RRSIG DNSKEY 5 2 10800 20091124111500 20091018111500 55710 example.com. zOSlB1iwtlP2lum1RK0WoDQrMVj0JKwk2E5Mu1okzV38hAx3Xm9IGMK6WrNkVVLmx4OkhYmdPVA95jVsFpwLMw== ;{id = 55710}
85example.com. 10800 IN RRSIG DNSKEY 5 2 10800 20091124111500 20091018111500 16614 example.com. qP49cCYP3lvNnLBYty/JxAwHqBIGjpup5zQ7qpjPnaZpBb/TlpOhY17LBZrqD86VvBbEVz5tkxC9UrCy85ePDQ== ;{id = 16614}
86
87ENTRY_END
88
89ENTRY_BEGIN
90MATCH opcode subdomain
91ADJUST copy_id copy_query
92REPLY QR
93SECTION QUESTION
94www.example.com. IN A
95SECTION ANSWER
96www.example.com. IN A 10.20.30.40
97ENTRY_END
98RANGE_END
99
100RANGE_END
101
102; set date/time to Mon Nov 23 09:46:40 2009
103STEP 5 TIME_PASSES EVAL ${1258962400 + 7200}
104STEP 6 TRAFFIC ; do the probe
105STEP 7 ASSIGN t0 = ${time}
106STEP 8 ASSIGN probe0 = ${range 0 ${timeout} 0}
107STEP 9 ASSIGN tp = ${1258962400}
108
109; the auto probing should have been done now.
110STEP 11 CHECK_AUTOTRUST example.com
111FILE_BEGIN
112; autotrust trust anchor file
113;;REVOKED
114; The zone has all keys revoked, and is
115; considered as if it has no trust anchors.
116; the remainder of the file is the last probe.
117; to restart the trust anchor, overwrite this file.
118; with one containing valid DNSKEYs or DSes.
119;;id: example.com. 1
120;;last_queried: ${$t0} ;;${ctime $t0}
121;;last_success: ${$t0} ;;${ctime $t0}
122;;next_probe_time: ${0} ;;${ctime 0}
123;;query_failed: 0
124;;query_interval: 5400
125;;retry_time: 3600
126example.com. 10800 IN DNSKEY 385 3 5 AwEAAc3Z5DQDJpH4oPdNtC4BUQHk50XMD+dHr4r8psHmivIa83hxR5CRgCtd9sENCW9Ae8OIO19xw9t/RPaEAqQa+OE= ;{id = 55710 (ksk), size = 512b} ;;state=4 [ REVOKED ] ;;count=0 ;;lastchange=${$t0} ;;${ctime $t0}
127example.com. 10800 IN DNSKEY 385 3 5 AwEAAas/cAhCFXvBUgTSNZCvQp0pLx1dY+7rXR0hH4/3EUgWmsmbYUpI1qD0xhwKD/oYGEwAm291fyWJ9c0oVxXDEK8= ;{id = 16614 (ksk), size = 512b} ;;state=4 [ REVOKED ] ;;count=0 ;;lastchange=${$t0} ;;${ctime $t0}
128FILE_END
129
130STEP 20 QUERY
131ENTRY_BEGIN
132REPLY RD DO
133SECTION QUESTION
134www.example.com. IN A
135ENTRY_END
136
137; correct unsigned response works after trust point revocation.
138STEP 30 CHECK_ANSWER
139ENTRY_BEGIN
140MATCH all
141REPLY QR RD RA DO NOERROR
142SECTION QUESTION
143www.example.com. IN A
144SECTION ANSWER
145www.example.com. IN A 10.20.30.40
146ENTRY_END
147
148SCENARIO_END