2 ; The island of trust is at example.com
4 trust-anchor: "example.com. 3600 IN DS 2854 3 1 46e4ffc6e9a4793b488954bd3f0cc6af0dfb201b"
5 val-override-date: "20070916134226"
6 target-fetch-policy: "0 0 0 0 0"
10 stub-addr: 193.0.14.129 # K.ROOT-SERVERS.NET.
13 SCENARIO_BEGIN Test validator with NSEC3 span change and cache effects.
19 MATCH opcode qtype qname
25 . IN NS K.ROOT-SERVERS.NET.
27 K.ROOT-SERVERS.NET. IN A 193.0.14.129
31 MATCH opcode subdomain
32 ADJUST copy_id copy_query
37 com. IN NS a.gtld-servers.net.
39 a.gtld-servers.net. IN A 192.5.6.30
47 MATCH opcode qtype qname
53 com. IN NS a.gtld-servers.net.
55 a.gtld-servers.net. IN A 192.5.6.30
59 MATCH opcode subdomain
60 ADJUST copy_id copy_query
65 example.com. IN NS ns.example.com.
67 ns.example.com. IN A 1.2.3.4
75 MATCH opcode qtype qname
81 example.com. IN NS ns.example.com.
82 example.com. 3600 IN RRSIG NS 3 2 3600 20070926134150 20070829134150 2854 example.com. MC0CFQCN+qHdJxoI/2tNKwsb08pra/G7aAIUAWA5sDdJTbrXA1/3OaesGBAO3sI= ;{id = 2854}
84 ns.example.com. IN A 1.2.3.4
85 ns.example.com. 3600 IN RRSIG A 3 3 3600 20070926135752 20070829135752 2854 example.com. MC0CFQCMSWxVehgOQLoYclB9PIAbNP229AIUeH0vNNGJhjnZiqgIOKvs1EhzqAo= ;{id = 2854}
89 MATCH opcode qtype qname
93 ns.example.com. IN AAAA
95 ; blacklisted address to stop it from using it, the negative answer uses its
96 ; nsec3-hash which is alittle inconvenient
97 ; ns.example.com. -> 7l9dbddmge35f7vr9mec78dqr6l3236k.
98 ns.example.com. IN AAAA ::1
99 ns.example.com. 3600 IN RRSIG AAAA 3 3 3600 20070926135752 20070829135752 2854 example.com. AExGBc6JU/xwwoSIeK/DtX8kr7AgOecx5Z2FnRiz/YSpnWGnFDt26ec=
102 ; response to DNSKEY priming query
104 MATCH opcode qtype qname
108 example.com. IN DNSKEY
110 example.com. 3600 IN DNSKEY 256 3 3 ALXLUsWqUrY3JYER3T4TBJII s70j+sDS/UT2QRp61SE7S3E EXopNXoFE73JLRmvpi/UrOO/Vz4Se 6wXv/CYCKjGw06U4WRgR YXcpEhJROyNapmdIKSx hOzfLVE1gqA0PweZR8d tY3aNQSRn3sPpwJr6Mi /PqQKAMMrZ9ckJpf1+b QMOOvxgzz2U1GS18b3y ZKcgTMEaJzd/GZYzi/B N2DzQ0MsrSwYXfsNLFO Bbs8PJMW4LYIxeeOe6rUgkWOF 7CC9Dh/dduQ1QrsJhmZAEFfd6ByYV+ ;{id = 2854 (zsk), size = 1688b}
111 example.com. 3600 IN RRSIG DNSKEY 3 2 3600 20070926134802 20070829134802 2854 example.com. MCwCFG1yhRNtTEa3Eno2zhVVuy2EJX3wAhQeLyUp6+UXcpC5qGNu9tkrTEgPUg== ;{id = 2854}
113 example.com. IN NS ns.example.com.
114 example.com. 3600 IN RRSIG NS 3 2 3600 20070926134150 20070829134150 2854 example.com. MC0CFQCN+qHdJxoI/2tNKwsb08pra/G7aAIUAWA5sDdJTbrXA1/3OaesGBAO3sI= ;{id = 2854}
116 ns.example.com. IN A 1.2.3.4
117 ns.example.com. 3600 IN RRSIG A 3 3 3600 20070926135752 20070829135752 2854 example.com. MC0CFQCMSWxVehgOQLoYclB9PIAbNP229AIUeH0vNNGJhjnZiqgIOKvs1EhzqAo= ;{id = 2854}
122 MATCH opcode qname qtype
126 sub.example.com. IN DS
128 example.com. IN SOA a. b. 1 2 3 4 5
129 example.com. 3600 IN RRSIG SOA 3 2 3600 20070926135752 20070829135752 2854 example.com. AAkQt1yoMF7s4gCYlojFzi0ubw6Uo4uWPSJTz6Dp/2iWUVDbxDKpy+E=
131 ; sub.example.com. -> 8r1f0ieoutlnjc03meng9e3bn2n0o9pd.
132 ; example.com. -> b6fuorg741ufili49mg9j4328ig53sqg.
133 ; proof that there is no DS here.
135 b6fuorg741ufili49mg9j4328ig53sqg.example.com. IN NSEC3 1 1 123 aabb00123456bbccdd b6fuorg741ufili49mg9j4328ig53sqh NS SOA DNSKEY NSEC3PARAM RRSIG
136 b6fuorg741ufili49mg9j4328ig53sqg.example.com. 3600 IN RRSIG NSEC3 3 3 3600 20070926135752 20070829135752 2854 example.com. AKHQ0gnNP5WDab1yqbd+Bt12CSSff88sqeDR40dvhiWOcYA8mmyjYNA=
138 ; span around sub.example.com., same span as foo.example.com, but it has
139 ; just changed and it is now larger to accomodate sub.example.com.
140 6obgmo062d9935unjnnj2su5otaj9334.example.com. IN NSEC3 1 1 123 aabb00123456bbccdd 9r1f0ieoutlnjc03meng9e3bn2n0o9pd NS DS RRSIG
141 6obgmo062d9935unjnnj2su5otaj9334.example.com. 3600 IN RRSIG NSEC3 3 3 3600 20070926135752 20070829135752 2854 example.com. ABzruSKUUcJRNlYDqZ4UmQH/WnzeXt9Gozp3chS4cR0sqsEeGjL54eQ=
143 ; span around sub.example.com. from previous delegation in nsec3-chain
144 ;7r1f0ieoutlnjc03meng9e3bn2n0o9pd.example.com. IN NSEC3 1 1 123 aabb00123456bbccdd 9r1f0ieoutlnjc03meng9e3bn2n0o9pd NS DS RRSIG
145 ;7r1f0ieoutlnjc03meng9e3bn2n0o9pd.example.com. 3600 IN RRSIG NSEC3 3 3 3600 20070926135752 20070829135752 2854 example.com. AF2FOKiIfOV9KrDTuP4RwnDI6lZnmhRHE+HAh8UHEq87uakYUEHfGUY=
148 ; refer to server one down
150 MATCH opcode subdomain
151 ADJUST copy_id copy_query
154 sub.example.com. IN A
156 sub.example.com. IN NS ns.sub.example.com.
157 ; sub.example.com. -> 8r1f0ieoutlnjc03meng9e3bn2n0o9pd.
158 ; example.com. -> b6fuorg741ufili49mg9j4328ig53sqg.
159 ; proof that there is no DS here.
161 b6fuorg741ufili49mg9j4328ig53sqg.example.com. IN NSEC3 1 1 123 aabb00123456bbccdd b6fuorg741ufili49mg9j4328ig53sqh NS SOA DNSKEY NSEC3PARAM RRSIG
162 b6fuorg741ufili49mg9j4328ig53sqg.example.com. 3600 IN RRSIG NSEC3 3 3 3600 20070926135752 20070829135752 2854 example.com. AKHQ0gnNP5WDab1yqbd+Bt12CSSff88sqeDR40dvhiWOcYA8mmyjYNA=
164 ; span around sub.example.com., same span as foo.example.com, but it has
165 ; just changed and it is now larger to accomodate sub.example.com.
166 6obgmo062d9935unjnnj2su5otaj9334.example.com. IN NSEC3 1 1 123 aabb00123456bbccdd 9r1f0ieoutlnjc03meng9e3bn2n0o9pd NS DS RRSIG
167 6obgmo062d9935unjnnj2su5otaj9334.example.com. 3600 IN RRSIG NSEC3 3 3 3600 20070926135752 20070829135752 2854 example.com. ABzruSKUUcJRNlYDqZ4UmQH/WnzeXt9Gozp3chS4cR0sqsEeGjL54eQ=
169 ; span around sub.example.com. from previous delegation in nsec3-chain
170 ;7r1f0ieoutlnjc03meng9e3bn2n0o9pd.example.com. IN NSEC3 1 1 123 aabb00123456bbccdd 9r1f0ieoutlnjc03meng9e3bn2n0o9pd NS DS RRSIG
171 ;7r1f0ieoutlnjc03meng9e3bn2n0o9pd.example.com. 3600 IN RRSIG NSEC3 3 3 3600 20070926135752 20070829135752 2854 example.com. AF2FOKiIfOV9KrDTuP4RwnDI6lZnmhRHE+HAh8UHEq87uakYUEHfGUY=
174 ns.sub.example.com. IN A 1.2.3.10
177 ; refer to server one down
179 MATCH opcode subdomain
180 ADJUST copy_id copy_query
183 foo.example.com. IN A
185 foo.example.com. IN NS ns.sub.example.com.
186 ; sub.example.com. -> 8r1f0ieoutlnjc03meng9e3bn2n0o9pd.
187 ; foo.example.com. -> 7obgmo062d9935unjnnj2su5otaj9334.
188 ; example.com. -> b6fuorg741ufili49mg9j4328ig53sqg.
189 ; proof that there is no DS here.
191 b6fuorg741ufili49mg9j4328ig53sqg.example.com. IN NSEC3 1 1 123 aabb00123456bbccdd b6fuorg741ufili49mg9j4328ig53sqh NS SOA DNSKEY NSEC3PARAM RRSIG
192 b6fuorg741ufili49mg9j4328ig53sqg.example.com. 3600 IN RRSIG NSEC3 3 3 3600 20070926135752 20070829135752 2854 example.com. AKHQ0gnNP5WDab1yqbd+Bt12CSSff88sqeDR40dvhiWOcYA8mmyjYNA=
194 ; span around sub.example.com. from previous delegation in nsec3-chain
195 ; note it does not cover sub.example.com.
196 6obgmo062d9935unjnnj2su5otaj9334.example.com. IN NSEC3 1 1 123 aabb00123456bbccdd 7r1f0ieoutlnjc03meng9e3bn2n0o9pd NS DS RRSIG
197 6obgmo062d9935unjnnj2su5otaj9334.example.com. 3600 IN RRSIG NSEC3 3 3 3600 20070926135752 20070829135752 2854 example.com. ABQZ49PmeXGxUmMebbKcYI/Y3mhMdlHmshohKTbGhEsNF11OjPYmr9c=
200 ns.sub.example.com. IN A 1.2.3.10
205 ; ns.sub.example.com.
209 MATCH opcode qtype qname
213 sub.example.com. IN NS
218 MATCH opcode qtype qname
222 www.sub.example.com. IN A
224 www.sub.example.com. IN A 1.2.3.123
228 MATCH opcode qtype qname
232 www.foo.example.com. IN A
234 www.foo.example.com. IN A 1.2.3.124
242 www.foo.example.com. IN A
245 ; recursion happens here.
249 REPLY QR RD RA DO NOERROR
251 www.foo.example.com. IN A
253 www.foo.example.com. IN A 1.2.3.124
262 www.sub.example.com. IN A
265 ; recursion happens here.
269 REPLY QR RD RA DO NOERROR
271 www.sub.example.com. IN A
273 www.sub.example.com. IN A 1.2.3.123