2 ; The island of trust is at example.com
4 trust-anchor: "example.com. 3600 IN DS 2854 3 1 46e4ffc6e9a4793b488954bd3f0cc6af0dfb201b"
5 val-override-date: "20070916134226"
6 target-fetch-policy: "0 0 0 0 0"
7 qname-minimisation: "no"
9 trust-anchor-signaling: no
13 stub-addr: 193.0.14.129 # K.ROOT-SERVERS.NET.
16 SCENARIO_BEGIN Test validator with blacklist prime gives bad key entry
17 ; the data response needs a blacklist action as well, since it also
18 ; comes from an 'expired signatures' name server.
24 MATCH opcode qtype qname
30 . IN NS K.ROOT-SERVERS.NET.
32 K.ROOT-SERVERS.NET. IN A 193.0.14.129
36 MATCH opcode qtype qname
42 com. IN NS a.gtld-servers.net.
44 a.gtld-servers.net. IN A 192.5.6.30
52 MATCH opcode qtype qname
58 com. IN NS a.gtld-servers.net.
60 a.gtld-servers.net. IN A 192.5.6.30
64 MATCH opcode qtype qname
70 ns.blabla.com. IN A 1.2.3.5
74 MATCH opcode qtype qname
78 ns.blabla.com. IN AAAA
80 com. IN SOA com. com. 2009100100 28800 7200 604800 3600
84 MATCH opcode subdomain
85 ADJUST copy_id copy_query
90 example.com. IN NS ns.example.com.
91 ;example.com. IN NS ns.blabla.com.
93 ns.example.com. IN A 1.2.3.4
94 ; no ns.blabla.com, try that later
102 MATCH opcode qtype qname
108 example.com. IN NS ns.example.com.
109 example.com. IN NS ns.blabla.com.
110 example.com. 3600 IN RRSIG NS 3 2 3600 20030926134150 20030829134150 2854 example.com. AKJ3xUBdSrCiOFkYajsy93d+h06rewpbmBHItTkL8R/26rw57b1gCIg= ;{id = 2854}
112 ns.example.com. IN A 1.2.3.4
113 ns.example.com. 3600 IN RRSIG A 3 3 3600 20030926134150 20030829134150 2854 example.com. AHNj99mBmP4np19V01nSq990ZIFlIiLWoeHijm/HcOG/o8+DuIp4fL8= ;{id = 2854}
117 MATCH opcode qtype qname
123 ns.example.com. IN A 1.2.3.4
124 ns.example.com. 3600 IN RRSIG A 3 3 3600 20030926134150 20030829134150 2854 example.com. AHNj99mBmP4np19V01nSq990ZIFlIiLWoeHijm/HcOG/o8+DuIp4fL8= ;{id = 2854}
129 MATCH opcode qtype qname
133 ns.example.com. IN AAAA
136 ns.example.com. IN NSEC oof.example.com. NSEC RRSIG A
137 ns.example.com. 3600 IN RRSIG NSEC 3 3 3600 20030926134150 20030829134150 2854 example.com. ACFVLLBtuSX/1z3461tbOwDz9zTHe5S9DbVtwnSO1f2x06fYbMpzSDE= ;{id = 2854}
140 ; response to DNSKEY priming query
142 MATCH opcode qtype qname
146 example.com. IN DNSKEY
148 example.com. 3600 IN DNSKEY 256 3 3 ALXLUsWqUrY3JYER3T4TBJII s70j+sDS/UT2QRp61SE7S3E EXopNXoFE73JLRmvpi/UrOO/Vz4Se 6wXv/CYCKjGw06U4WRgR YXcpEhJROyNapmdIKSx hOzfLVE1gqA0PweZR8d tY3aNQSRn3sPpwJr6Mi /PqQKAMMrZ9ckJpf1+b QMOOvxgzz2U1GS18b3y ZKcgTMEaJzd/GZYzi/B N2DzQ0MsrSwYXfsNLFO Bbs8PJMW4LYIxeeOe6rUgkWOF 7CC9Dh/dduQ1QrsJhmZAEFfd6ByYV+ ;{id = 2854 (zsk), size = 1688b}
149 example.com. 3600 IN RRSIG DNSKEY 3 2 3600 20030926134150 20030829134150 2854 example.com. AG21xE8CFQzTq6XtHErg28b9EAmqPsoYCUcFPEAoAjFybM6AY4/bMOo= ;{id = 2854}
151 ;example.com. IN NS ns.example.com.
152 ;example.com. IN NS ns.blabla.com.
153 ;example.com. 3600 IN RRSIG NS 3 2 3600 20030926134150 20030829134150 2854 example.com. ACiWu7zjBHqgEX3iUoOF7rfpOmIAHj1npKQ+XDIaNlmdkfJxoCwFl04= ;{id = 2854}
155 ;ns.example.com. IN A 1.2.3.4
156 ;ns.example.com. 3600 IN RRSIG A 3 3 3600 20030926134150 20030829134150 2854 example.com. ACmAsKTf7hqDaYK8CQ7FL1cGYPW+blTCnzZGkExFtEUAGrHeze87o+A= ;{id = 2854}
159 ; response to query of interest
161 MATCH opcode qtype qname
165 www.example.com. IN A
167 www.example.com. IN A 10.20.30.40
168 www.example.com. 3600 IN RRSIG A 3 3 3600 20030926134150 20030829134150 2854 example.com. AGj9kE8oW3OhOLhkmJ3HBaNIOpvGf3S8zSd5gWmhpxAMc5hh6cxZfpQ= ;{id = 2854}
170 ;example.com. IN NS ns.example.com.
171 ;example.com. IN NS ns.blabla.com.
172 ;example.com. 3600 IN RRSIG NS 3 2 3600 20030926134150 20030829134150 2854 example.com. ACHETweBNPgbmRoNRdKvxuw4X9qNUUTEpSuwV+HhuiBE83gbB98asAc= ;{id = 2854}
174 ;ns.example.com. IN A 1.2.3.4
175 ;ns.example.com. 3600 IN RRSIG A 3 3 3600 20030926134150 20030829134150 2854 example.com. AGvu9A/nGsbatxJCmnObioIhKg2Tm0Apr0eo+DO1kIDrAHco/bt/EdY= ;{id = 2854}
183 MATCH opcode qtype qname
189 example.com. IN NS ns.example.com.
190 example.com. IN NS ns.blabla.com.
191 example.com. 3600 IN RRSIG NS 3 2 3600 20070926134150 20070829134150 2854 example.com. AAJHNhPYVG6+550zQga9ZgV8McQZHLboOWjfbdiq2ZC+gUcQeQDDlFs= ;{id = 2854}
193 ns.example.com. IN A 1.2.3.4
194 ns.example.com. 3600 IN RRSIG A 3 3 3600 20070926135752 20070829135752 2854 example.com. MC0CFQCMSWxVehgOQLoYclB9PIAbNP229AIUeH0vNNGJhjnZiqgIOKvs1EhzqAo= ;{id = 2854}
198 MATCH opcode qtype qname
204 ns.example.com. IN A 1.2.3.4
205 ns.example.com. 3600 IN RRSIG A 3 3 3600 20070926135752 20070829135752 2854 example.com. MC0CFQCMSWxVehgOQLoYclB9PIAbNP229AIUeH0vNNGJhjnZiqgIOKvs1EhzqAo= ;{id = 2854}
210 MATCH opcode qtype qname
214 ns.example.com. IN AAAA
217 ns.example.com. IN NSEC oof.example.com. NSEC RRSIG A
218 ns.example.com. 3600 IN RRSIG NSEC 3 3 3600 20070926134150 20070829134150 2854 example.com. ABhDNtJramb2a4R1SK5gb/CTYJybQts6mZ++z3kLiwsrUSZInA4ikeQ= ;{id = 2854}
221 ; response to DNSKEY priming query
223 MATCH opcode qtype qname
227 example.com. IN DNSKEY
229 example.com. 3600 IN DNSKEY 256 3 3 ALXLUsWqUrY3JYER3T4TBJII s70j+sDS/UT2QRp61SE7S3E EXopNXoFE73JLRmvpi/UrOO/Vz4Se 6wXv/CYCKjGw06U4WRgR YXcpEhJROyNapmdIKSx hOzfLVE1gqA0PweZR8d tY3aNQSRn3sPpwJr6Mi /PqQKAMMrZ9ckJpf1+b QMOOvxgzz2U1GS18b3y ZKcgTMEaJzd/GZYzi/B N2DzQ0MsrSwYXfsNLFO Bbs8PJMW4LYIxeeOe6rUgkWOF 7CC9Dh/dduQ1QrsJhmZAEFfd6ByYV+ ;{id = 2854 (zsk), size = 1688b}
230 example.com. 3600 IN RRSIG DNSKEY 3 2 3600 20070926134802 20070829134802 2854 example.com. MCwCFG1yhRNtTEa3Eno2zhVVuy2EJX3wAhQeLyUp6+UXcpC5qGNu9tkrTEgPUg== ;{id = 2854}
232 example.com. IN NS ns.example.com.
233 example.com. IN NS ns.blabla.com.
234 example.com. 3600 IN RRSIG NS 3 2 3600 20070926134150 20070829134150 2854 example.com. AAJHNhPYVG6+550zQga9ZgV8McQZHLboOWjfbdiq2ZC+gUcQeQDDlFs= ;{id = 2854}
236 ns.example.com. IN A 1.2.3.4
237 ns.example.com. 3600 IN RRSIG A 3 3 3600 20070926135752 20070829135752 2854 example.com. MC0CFQCMSWxVehgOQLoYclB9PIAbNP229AIUeH0vNNGJhjnZiqgIOKvs1EhzqAo= ;{id = 2854}
240 ; response to query of interest
242 MATCH opcode qtype qname
246 www.example.com. IN A
248 www.example.com. IN A 10.20.30.40
249 ns.example.com. 3600 IN RRSIG A 3 3 3600 20070926134150 20070829134150 2854 example.com. MC0CFQCQMyTjn7WWwpwAR1LlVeLpRgZGuQIUCcJDEkwAuzytTDRlYK7nIMwH1CM= ;{id = 2854}
251 example.com. IN NS ns.example.com.
252 example.com. IN NS ns.blabla.com.
253 example.com. 3600 IN RRSIG NS 3 2 3600 20070926134150 20070829134150 2854 example.com. AAJHNhPYVG6+550zQga9ZgV8McQZHLboOWjfbdiq2ZC+gUcQeQDDlFs= ;{id = 2854}
255 ns.example.com. IN A 1.2.3.4
256 www.example.com. 3600 IN RRSIG A 3 3 3600 20070926134150 20070829134150 2854 example.com. MC0CFC99iE9K5y2WNgI0gFvBWaTi9wm6AhUAoUqOpDtG5Zct+Qr9F3mSdnbc6V4= ;{id = 2854}
261 ; later on, making sure DNSKEY primes give testbound failure.
265 MATCH opcode qtype qname
269 ftp.example.com. IN A
271 ftp.example.com. IN A 10.20.33.33
273 ftp.example.com. 3600 IN RRSIG A 3 3 3600 20030926134150 20030829134150 2854 example.com. AHNj99mBmP4np19V01nSq990ZIFlIiLWoeHijm/HcOG/o8+DuIp4fL8= ;{id = 2854}
282 www.example.com. IN A
285 ; recursion happens here.
289 REPLY QR RD RA DO SERVFAIL
291 www.example.com. IN A
294 STEP 100 TIME_PASSES ELAPSE 10
296 ; second query should not result in going to the network.
301 ftp.example.com. IN A
304 ; recursion happens here.
305 STEP 120 CHECK_ANSWER
308 REPLY QR RD RA DO SERVFAIL
310 ftp.example.com. IN A