2 ; The island of trust is at example.com
4 trust-anchor: "example.com. 3600 IN DS 2854 3 1 46e4ffc6e9a4793b488954bd3f0cc6af0dfb201b"
5 val-override-date: "20070916134226"
6 target-fetch-policy: "0 0 0 0 0"
10 stub-addr: 193.0.14.129 # K.ROOT-SERVERS.NET.
13 SCENARIO_BEGIN Test validator with DS, unsec, cname sequence.
19 MATCH opcode qtype qname
25 . IN NS K.ROOT-SERVERS.NET.
27 K.ROOT-SERVERS.NET. IN A 193.0.14.129
31 MATCH opcode qtype qname
35 a.b.sub.example.com. IN A
37 com. IN NS a.gtld-servers.net.
39 a.gtld-servers.net. IN A 192.5.6.30
47 MATCH opcode qtype qname
53 com. IN NS a.gtld-servers.net.
55 a.gtld-servers.net. IN A 192.5.6.30
59 MATCH opcode qtype qname
63 a.b.sub.example.com. IN A
65 example.com. IN NS ns.example.com.
67 ns.example.com. IN A 1.2.3.4
75 MATCH opcode qtype qname
81 example.com. IN NS ns.example.com.
82 example.com. 3600 IN RRSIG NS 3 2 3600 20070926134150 20070829134150 2854 example.com. MC0CFQCN+qHdJxoI/2tNKwsb08pra/G7aAIUAWA5sDdJTbrXA1/3OaesGBAO3sI= ;{id = 2854}
84 ns.example.com. IN A 1.2.3.4
85 ns.example.com. 3600 IN RRSIG A 3 3 3600 20070926135752 20070829135752 2854 example.com. MC0CFQCMSWxVehgOQLoYclB9PIAbNP229AIUeH0vNNGJhjnZiqgIOKvs1EhzqAo= ;{id = 2854}
88 ; response to DNSKEY priming query
90 MATCH opcode qtype qname
94 example.com. IN DNSKEY
96 example.com. 3600 IN DNSKEY 256 3 3 ALXLUsWqUrY3JYER3T4TBJII s70j+sDS/UT2QRp61SE7S3E EXopNXoFE73JLRmvpi/UrOO/Vz4Se 6wXv/CYCKjGw06U4WRgR YXcpEhJROyNapmdIKSx hOzfLVE1gqA0PweZR8d tY3aNQSRn3sPpwJr6Mi /PqQKAMMrZ9ckJpf1+b QMOOvxgzz2U1GS18b3y ZKcgTMEaJzd/GZYzi/B N2DzQ0MsrSwYXfsNLFO Bbs8PJMW4LYIxeeOe6rUgkWOF 7CC9Dh/dduQ1QrsJhmZAEFfd6ByYV+ ;{id = 2854 (zsk), size = 1688b}
97 example.com. 3600 IN RRSIG DNSKEY DSA 2 3600 20070926134150 20070829134150 2854 example.com. MCwCFBQRtlR4BEv9ohi+PGFjp+AHsJuHAhRCvz0shggvnvI88DFnBDCczHUcVA== ;{id = 2854}
99 example.com. IN NS ns.example.com.
100 example.com. 3600 IN RRSIG NS 3 2 3600 20070926134150 20070829134150 2854 example.com. MC0CFQCN+qHdJxoI/2tNKwsb08pra/G7aAIUAWA5sDdJTbrXA1/3OaesGBAO3sI= ;{id = 2854}
102 ns.example.com. IN A 1.2.3.4
103 ns.example.com. 3600 IN RRSIG A 3 3 3600 20070926135752 20070829135752 2854 example.com. MC0CFQCMSWxVehgOQLoYclB9PIAbNP229AIUeH0vNNGJhjnZiqgIOKvs1EhzqAo= ;{id = 2854}
106 ; response for delegation to c.example.com.
108 MATCH opcode qtype qname
112 c.c.example.com. IN A
115 c.example.com. IN NS ns.c.example.com.
116 c.example.com. IN NSEC d.example.com. NS RRSIG NSEC
117 c.example.com. 3600 IN RRSIG NSEC 3 3 3600 20070926135752 20070829135752 2854 example.com. MC0CFDQ1xBqQ8Yxy7d7MbfAOg9g+dInHAhUAgP2w61bvME+hLWFiNg42Ny02/vo= ;{id = 2854}
119 ns.c.example.com. IN A 1.2.3.8
123 MATCH opcode qtype qname
130 c.example.com. IN NSEC d.example.com. NS RRSIG NSEC
131 c.example.com. 3600 IN RRSIG NSEC 3 3 3600 20070926135752 20070829135752 2854 example.com. MC0CFDQ1xBqQ8Yxy7d7MbfAOg9g+dInHAhUAgP2w61bvME+hLWFiNg42Ny02/vo= ;{id = 2854}
135 ; response for delegation to sub.example.com.
137 MATCH opcode qtype qname
141 a.b.sub.example.com. IN A
144 sub.example.com. IN NS ns.sub.example.com.
145 sub.example.com. 3600 IN DS 30899 RSASHA1 1 f7ed618f24d5e5202927e1d27bc2e84a141cb4b3
146 sub.example.com. 3600 IN RRSIG DS 3 3 3600 20070926134150 20070829134150 2854 example.com. MCwCFCW3ix0GD4BSvNLWIbROCJt5DAW9AhRt/kg9kBKJ20UBUdumrBUHqnskdA== ;{id = 2854}
148 ns.sub.example.com. IN A 1.2.3.6
151 ; response for delegation to sub.example.com.
153 MATCH opcode qtype qname
157 sub.example.com. IN DNSKEY
160 sub.example.com. IN NS ns.sub.example.com.
161 sub.example.com. 3600 IN DS 30899 RSASHA1 1 f7ed618f24d5e5202927e1d27bc2e84a141cb4b3
162 sub.example.com. 3600 IN RRSIG DS 3 3 3600 20070926134150 20070829134150 2854 example.com. MCwCFCW3ix0GD4BSvNLWIbROCJt5DAW9AhRt/kg9kBKJ20UBUdumrBUHqnskdA== ;{id = 2854}
164 ns.sub.example.com. IN A 1.2.3.6
168 ; ns.sub.example.com.
172 MATCH opcode qtype qname
176 sub.example.com. IN NS
178 sub.example.com. IN NS ns.sub.example.com.
179 sub.example.com. 3600 IN RRSIG NS 5 3 3600 20070926134150 20070829134150 30899 sub.example.com. wcpHeBILHfo8C9uxMhcW03gcURZeUffiKdSTb50ZjzTHgMNhRyMfpcvSpXEd9548A9UTmWKeLZChfr5Z/glONw== ;{id = 30899}
181 ns.sub.example.com. IN A 1.2.3.6
182 ns.sub.example.com. 3600 IN RRSIG A 5 4 3600 20070926134150 20070829134150 30899 sub.example.com. UF7shD/gt1FOp2UHgLTNbPzVykklSXFMEtJ1xD+Hholwf/PIzd7zoaIttIYibNa4fUXCqMg22H9P7MRhfmFe6g== ;{id = 30899}
185 ; response to DNSKEY priming query
186 ; sub.example.com. 3600 IN DS 30899 RSASHA1 1 f7ed618f24d5e5202927e1d27bc2e84a141cb4b3
188 MATCH opcode qtype qname
192 sub.example.com. IN DNSKEY
194 sub.example.com. 3600 IN DNSKEY 256 3 5 AQPQ41chR9DEHt/aIzIFAqanbDlRflJoRs5yz1jFsoRIT7dWf0r+PeDuewdxkszNH6wnU4QL8pfKFRh5PIYVBLK3 ;{id = 30899 (zsk), size = 512b}
195 sub.example.com. 3600 IN RRSIG DNSKEY 5 3 3600 20070926134150 20070829134150 30899 sub.example.com. uNGp99iznjD7oOX02XnQbDnbg75UwBHRvZSKYUorTKvPUnCWMHKdRsQ+mf+Fx3GZ+Fz9BVjoCmQqpnfgXLEYqw== ;{id = 30899}
197 sub.example.com. IN NS ns.sub.example.com.
198 sub.example.com. 3600 IN RRSIG NS 5 3 3600 20070926134150 20070829134150 30899 sub.example.com. wcpHeBILHfo8C9uxMhcW03gcURZeUffiKdSTb50ZjzTHgMNhRyMfpcvSpXEd9548A9UTmWKeLZChfr5Z/glONw== ;{id = 30899}
200 ns.sub.example.com. IN A 1.2.3.6
201 ns.sub.example.com. 3600 IN RRSIG A 5 4 3600 20070926134150 20070829134150 30899 sub.example.com. UF7shD/gt1FOp2UHgLTNbPzVykklSXFMEtJ1xD+Hholwf/PIzd7zoaIttIYibNa4fUXCqMg22H9P7MRhfmFe6g== ;{id = 30899}
204 ; response to query of interest
205 ; another delegation, validated unsecure.
207 MATCH opcode qtype qname
211 a.b.sub.example.com. IN A
214 b.sub.example.com. IN NS ns.b.sub.example.com.
215 b.sub.example.com. IN NSEC c.sub.example.com. NS NSEC RRSIG
216 b.sub.example.com. 3600 IN RRSIG NSEC 5 4 3600 20070926134150 20070829134150 30899 sub.example.com. KPdURTUrbQvc6OXtDZaH3+14uO2qPUPIFO86aTNZ/Ujy3d2RMSB7fkSSulDO6QDSBEUhr9WgbQr0/YoljCBirA== ;{id = 30899}
218 ns.b.sub.example.com. IN A 1.2.3.7
223 MATCH opcode qtype qname
227 b.sub.example.com. IN DS
229 b.sub.example.com. IN NSEC c.sub.example.com. NS NSEC RRSIG
230 b.sub.example.com. 3600 IN RRSIG NSEC 5 4 3600 20070926134150 20070829134150 30899 sub.example.com. KPdURTUrbQvc6OXtDZaH3+14uO2qPUPIFO86aTNZ/Ujy3d2RMSB7fkSSulDO6QDSBEUhr9WgbQr0/YoljCBirA== ;{id = 30899}
234 ; server ns.b.sub.example.com.
238 MATCH opcode qtype qname
242 b.sub.example.com. IN NS
244 b.sub.example.com. IN NS ns.b.sub.example.com.
246 ns.b.sub.example.com. IN A 1.2.3.7
250 ; query of interest, give a cname to another unsecure zone.
251 MATCH opcode qtype qname
255 a.b.sub.example.com. IN A
257 a.b.sub.example.com. IN CNAME c.c.example.com.
261 MATCH opcode qtype qname
265 a.b.sub.example.com. IN DS
267 b.sub.example.com. IN SOA B-EXAMPLE. b-example. 1 2 3 7 7
271 ; server ns.c.example.com.
275 MATCH opcode qtype qname
279 c.sub.example.com. IN NS
281 c.sub.example.com. IN NS ns.c.sub.example.com.
283 ns.c.sub.example.com. IN A 1.2.3.8
287 MATCH opcode qtype qname
293 c.example.com. IN NS ns.c.example.com.
295 ns.c.example.com. IN A 1.2.3.8
299 MATCH opcode qtype qname
303 c.c.example.com. IN A
305 c.c.example.com. IN A 11.11.11.11
309 MATCH opcode qtype qname
313 c.c.example.com. IN DS
315 c.example.com. IN SOA C-EXAMPLE. c-example. 1 2 3 4 5
323 a.b.sub.example.com. IN A
326 ; recursion happens here.
330 REPLY QR RD RA DO NOERROR
332 a.b.sub.example.com. IN A
334 a.b.sub.example.com. IN CNAME c.c.example.com.
335 c.c.example.com. 3600 IN A 11.11.11.11
340 ; test that a DS query does not get CNAME redirected, but instead
341 ; asked to the right server that has to respond to it.
346 a.b.sub.example.com. IN DS
352 REPLY QR RD RA DO NOERROR
354 a.b.sub.example.com. IN DS
356 b.sub.example.com. IN SOA B-EXAMPLE. b-example. 1 2 3 7 7