2 ; The island of trust is at example.com (the DLV repository)
4 dlv-anchor: "example.com. 3600 IN DS 2854 3 1 46e4ffc6e9a4793b488954bd3f0cc6af0dfb201b"
5 val-override-date: "20070916134226"
6 target-fetch-policy: "0 0 0 0 0"
10 stub-addr: 193.0.14.129 # K.ROOT-SERVERS.NET.
13 SCENARIO_BEGIN Test validator with DLV anchor but DLV domain is down
14 ; so DLV has been decommissioned.
20 MATCH opcode qtype qname
26 . IN NS K.ROOT-SERVERS.NET.
28 K.ROOT-SERVERS.NET. IN A 193.0.14.129
32 MATCH opcode subdomain
33 ADJUST copy_id copy_query
38 com. IN NS a.gtld-servers.net.
40 a.gtld-servers.net. IN A 192.5.6.30
44 MATCH opcode subdomain
45 ADJUST copy_id copy_query
50 net. IN NS a.gtld-servers.net.
52 a.gtld-servers.net. IN A 192.5.6.30
60 MATCH opcode qtype qname
66 com. IN NS a.gtld-servers.net.
68 a.gtld-servers.net. IN A 192.5.6.30
72 MATCH opcode qtype qname
78 net. IN NS a.gtld-servers.net.
80 a.gtld-servers.net. IN A 192.5.6.30
84 MATCH opcode subdomain
85 ADJUST copy_id copy_query
90 example.com. IN NS ns.example.com.
92 ns.example.com. IN A 1.2.3.4
96 MATCH opcode subdomain
97 ADJUST copy_id copy_query
102 example.net. IN NS ns.example.net.
104 ns.example.net. IN A 1.2.3.5
114 ADJUST copy_id copy_query
125 ; example.net. 3600 IN DS 30899 5 1 14188c885f20623ad1d3bec42798f3f951793e4c ; xehac-mofum-malyd-bomaf-pegit-fuzes-ganin-misiz-nigel-nozog-soxix
128 MATCH opcode qtype qname
132 example.net. IN DNSKEY
134 example.net. 3600 IN DNSKEY 256 3 5 AQPQ41chR9DEHt/aIzIFAqanbDlRflJoRs5yz1jFsoRIT7dWf0r+PeDuewdxkszNH6wnU4QL8pfKFRh5PIYVBLK3 ;{id = 30899 (zsk), size = 512b}
135 example.net. 3600 IN RRSIG DNSKEY RSASHA1 2 3600 20070926134150 20070829134150 30899 example.net. hiFzlQ8VoYgCuvIsfVuxC3mfJDqsTh0yc6abs5xMx5uEcIjb0dndFQx7INOM+imlzveEN73Hqp4OLFpFhsWLlw== ;{id = 30899}
137 example.net. IN NS ns.example.net.
138 example.net. 3600 IN RRSIG NS RSASHA1 2 3600 20070926134150 20070829134150 30899 example.net. E8JX0l4B+cSR5bkHQwOJy1pBmlLMTYCJ8EwfNMU/eCv0YhKwo26rHhn52FGisgv+Nwp7/NbhHqQ+kJgoZC94XA== ;{id = 30899}
140 ns.example.net. IN A 1.2.3.5
141 ns.example.net. 3600 IN RRSIG A RSASHA1 3 3600 20070926134150 20070829134150 30899 example.net. x+tQMC9FhzT7Fcy1pM5NrOC7E8nLd7THPI3C6ie4EwL8PrxllqlR3q/DKB0d/m0qCOPcgN6HFOYURV1s4uAcsw== ;{id = 30899}
146 MATCH opcode qtype qname
152 example.net. IN NS ns.example.net.
153 example.net. 3600 IN RRSIG NS RSASHA1 2 3600 20070926134150 20070829134150 30899 example.net. E8JX0l4B+cSR5bkHQwOJy1pBmlLMTYCJ8EwfNMU/eCv0YhKwo26rHhn52FGisgv+Nwp7/NbhHqQ+kJgoZC94XA== ;{id = 30899}
155 ns.example.net. IN A 1.2.3.5
156 ns.example.net. 3600 IN RRSIG A RSASHA1 3 3600 20070926134150 20070829134150 30899 example.net. x+tQMC9FhzT7Fcy1pM5NrOC7E8nLd7THPI3C6ie4EwL8PrxllqlR3q/DKB0d/m0qCOPcgN6HFOYURV1s4uAcsw== ;{id = 30899}
159 ; www.example.net query
161 MATCH opcode qtype qname
165 www.example.net. IN A
167 www.example.net. 3600 IN A 10.20.30.40
168 www.example.net. 3600 IN RRSIG A 5 3 3600 20070926135752 20070829135752 30899 example.net. ACvv4RQVC7TbI57ewqFImRaVoymktJ5Cxn/FaCodIENt82LVM92nivbP2WtwWCsQHWp7FkrMxTlQTJwyAeXFyg== ;{id = 30899}
170 example.net. IN NS ns.example.net.
171 example.net. 3600 IN RRSIG NS RSASHA1 2 3600 20070926134150 20070829134150 30899 example.net. E8JX0l4B+cSR5bkHQwOJy1pBmlLMTYCJ8EwfNMU/eCv0YhKwo26rHhn52FGisgv+Nwp7/NbhHqQ+kJgoZC94XA== ;{id = 30899}
173 ns.example.net. IN A 1.2.3.5
174 ns.example.net. 3600 IN RRSIG A RSASHA1 3 3600 20070926134150 20070829134150 30899 example.net. x+tQMC9FhzT7Fcy1pM5NrOC7E8nLd7THPI3C6ie4EwL8PrxllqlR3q/DKB0d/m0qCOPcgN6HFOYURV1s4uAcsw== ;{id = 30899}
184 www.example.net. IN A
187 ; recursion happens here.
191 REPLY QR RD RA DO SERVFAIL
193 www.example.net. IN A