3 trust-anchor: "example.com. 3600 IN DS 2854 3 1 46e4ffc6e9a4793b488954bd3f0cc6af0dfb201b"
4 val-override-date: "20070916134226"
5 target-fetch-policy: "0 0 0 0 0"
7 trust-anchor-signaling: no
11 ## zonefile (or none).
12 ## zonefile: "example.com.zone"
13 ## master by IP address or hostname
14 ## can list multiple masters, each on one line.
18 ## queries from downstream clients get authoritative answers.
19 ## for-downstream: yes
21 ## queries are used to fetch authoritative answers from this zone,
22 ## instead of unbound itself sending queries there.
25 ## on failures with for-upstream, fallback to sending queries to
26 ## the authority servers
27 ## fallback-enabled: no
29 ## this line generates zonefile: \n"/tmp/xxx.example.com"\n
31 TEMPFILE_NAME example.com
32 ## this is the inline file /tmp/xxx.example.com
33 ## the tempfiles are deleted when the testrun is over.
34 TEMPFILE_CONTENTS example.com
36 example 3600 IN SOA dns.example.de. hostmaster.dns.example.de. (
37 1379078166 28800 7200 604800 7200 )
38 3600 IN NS ns.example.com.
39 example.com. 3600 IN RRSIG NS 3 2 3600 20070926134150 20070829134150 2854 example.com. MC0CFQCN+qHdJxoI/2tNKwsb08pra/G7aAIUAWA5sDdJTbrXA1/3OaesGBAO3sI= ;{id = 2854}
40 example.com. 3600 IN DNSKEY 256 3 3 ALXLUsWqUrY3JYER3T4TBJII s70j+sDS/UT2QRp61SE7S3E EXopNXoFE73JLRmvpi/UrOO/Vz4Se 6wXv/CYCKjGw06U4WRgR YXcpEhJROyNapmdIKSx hOzfLVE1gqA0PweZR8d tY3aNQSRn3sPpwJr6Mi /PqQKAMMrZ9ckJpf1+b QMOOvxgzz2U1GS18b3y ZKcgTMEaJzd/GZYzi/B N2DzQ0MsrSwYXfsNLFO Bbs8PJMW4LYIxeeOe6rUgkWOF 7CC9Dh/dduQ1QrsJhmZAEFfd6ByYV+ ;{id = 2854 (zsk), size = 1688b}
41 example.com. 3600 IN RRSIG DNSKEY 3 2 3600 20070926134802 20070829134802 2854 example.com. MCwCFG1yhRNtTEa3Eno2zhVVuy2EJX3wAhQeLyUp6+UXcpC5qGNu9tkrTEgPUg== ;{id = 2854}
43 ns.example.com. IN A 1.2.3.4
44 ns.example.com. 3600 IN RRSIG A 3 3 3600 20070926135752 20070829135752 2854 example.com. MC0CFQCMSWxVehgOQLoYclB9PIAbNP229AIUeH0vNNGJhjnZiqgIOKvs1EhzqAo= ;{id = 2854}
46 www.example.com. IN A 10.20.30.40
47 www.example.com. 3600 IN RRSIG A 3 3 3600 20070926134150 20070829134150 2854 example.com. MC0CFC99iE9K5y2WNgI0gFvBWaTi9wm6AhUAoUqOpDtG5Zct+Qr9F3mSdnbc6V4= ;{id = 2854}
53 stub-addr: 193.0.14.129 # K.ROOT-SERVERS.NET.
56 SCENARIO_BEGIN Test authority zone with zonefile and dnssec
57 ; the zone file has signatures, used upstream, unbound validates the reply.
63 MATCH opcode qtype qname
69 . IN NS K.ROOT-SERVERS.NET.
71 K.ROOT-SERVERS.NET. IN A 193.0.14.129
75 MATCH opcode subdomain
76 ADJUST copy_id copy_query
81 com. IN NS a.gtld-servers.net.
83 a.gtld-servers.net. IN A 192.5.6.30
91 MATCH opcode qtype qname
97 com. IN NS a.gtld-servers.net.
99 a.gtld-servers.net. IN A 192.5.6.30
103 MATCH opcode subdomain
104 ADJUST copy_id copy_query
109 example.com. IN NS ns.example.com.
111 ns.example.com. IN A 1.2.3.44
119 MATCH opcode qtype qname
125 example.net. IN NS ns.example.net.
127 ns.example.net. IN A 1.2.3.44
131 MATCH opcode qtype qname
137 ns.example.net. IN A 1.2.3.44
139 example.net. IN NS ns.example.net.
143 MATCH opcode qtype qname
147 ns.example.net. IN AAAA
149 example.net. IN NS ns.example.net.
151 www.example.net. IN A 1.2.3.44
155 MATCH opcode qtype qname
161 example.com. IN NS ns.example.net.
165 MATCH opcode qtype qname
169 www.example.com. IN A
171 www.example.com. IN A 10.20.30.40
179 www.example.com. IN A
182 ; recursion happens here.
186 REPLY QR RD DO RA AD NOERROR
188 www.example.com. IN A
190 www.example.com. IN A 10.20.30.40
191 www.example.com. 3600 IN RRSIG A 3 3 3600 20070926134150 20070829134150 2854 example.com. MC0CFC99iE9K5y2WNgI0gFvBWaTi9wm6AhUAoUqOpDtG5Zct+Qr9F3mSdnbc6V4= ;{id = 2854}