2 ; The island of trust is at example.com (the DLV repository)
4 dlv-anchor: "example.com. 3600 IN DS 2854 3 1 46e4ffc6e9a4793b488954bd3f0cc6af0dfb201b"
5 val-override-date: "20070916134226"
6 harden-referral-path: no
7 target-fetch-policy: "0 0 0 0 0"
8 qname-minimisation: "no"
10 trust-anchor-signaling: no
15 stub-addr: 193.0.14.129 # K.ROOT-SERVERS.NET.
18 SCENARIO_BEGIN Test validator with insecure zone with no DLV
24 MATCH opcode qtype qname
30 . IN NS K.ROOT-SERVERS.NET.
32 K.ROOT-SERVERS.NET. IN A 193.0.14.129
36 MATCH opcode subdomain
37 ADJUST copy_id copy_query
42 com. IN NS a.gtld-servers.net.
44 a.gtld-servers.net. IN A 192.5.6.30
48 MATCH opcode subdomain
49 ADJUST copy_id copy_query
54 net. IN NS a.gtld-servers.net.
56 a.gtld-servers.net. IN A 192.5.6.30
64 MATCH opcode qtype qname
70 com. IN NS a.gtld-servers.net.
72 a.gtld-servers.net. IN A 192.5.6.30
76 MATCH opcode qtype qname
82 net. IN NS a.gtld-servers.net.
84 a.gtld-servers.net. IN A 192.5.6.30
88 MATCH opcode subdomain
89 ADJUST copy_id copy_query
94 example.com. IN NS ns.example.com.
96 ns.example.com. IN A 1.2.3.4
100 MATCH opcode subdomain
101 ADJUST copy_id copy_query
106 example.net. IN NS ns.example.net.
108 ns.example.net. IN A 1.2.3.5
116 MATCH opcode qtype qname
122 example.com. IN NS ns.example.com.
123 example.com. 3600 IN RRSIG NS 3 2 3600 20070926134150 20070829134150 2854 example.com. MC0CFQCN+qHdJxoI/2tNKwsb08pra/G7aAIUAWA5sDdJTbrXA1/3OaesGBAO3sI= ;{id = 2854}
125 ns.example.com. IN A 1.2.3.4
126 ns.example.com. 3600 IN RRSIG A 3 3 3600 20070926135752 20070829135752 2854 example.com. MC0CFQCMSWxVehgOQLoYclB9PIAbNP229AIUeH0vNNGJhjnZiqgIOKvs1EhzqAo= ;{id = 2854}
129 ; response to DNSKEY priming query
131 MATCH opcode qtype qname
135 example.com. IN DNSKEY
137 example.com. 3600 IN DNSKEY 256 3 3 ALXLUsWqUrY3JYER3T4TBJII s70j+sDS/UT2QRp61SE7S3E EXopNXoFE73JLRmvpi/UrOO/Vz4Se 6wXv/CYCKjGw06U4WRgR YXcpEhJROyNapmdIKSx hOzfLVE1gqA0PweZR8d tY3aNQSRn3sPpwJr6Mi /PqQKAMMrZ9ckJpf1+b QMOOvxgzz2U1GS18b3y ZKcgTMEaJzd/GZYzi/B N2DzQ0MsrSwYXfsNLFO Bbs8PJMW4LYIxeeOe6rUgkWOF 7CC9Dh/dduQ1QrsJhmZAEFfd6ByYV+ ;{id = 2854 (zsk), size = 1688b}
138 example.com. 3600 IN RRSIG DNSKEY 3 2 3600 20070926134802 20070829134802 2854 example.com. MCwCFG1yhRNtTEa3Eno2zhVVuy2EJX3wAhQeLyUp6+UXcpC5qGNu9tkrTEgPUg== ;{id = 2854}
140 example.com. IN NS ns.example.com.
141 example.com. 3600 IN RRSIG NS 3 2 3600 20070926134150 20070829134150 2854 example.com. MC0CFQCN+qHdJxoI/2tNKwsb08pra/G7aAIUAWA5sDdJTbrXA1/3OaesGBAO3sI= ;{id = 2854}
143 ns.example.com. IN A 1.2.3.4
144 ns.example.com. 3600 IN RRSIG A 3 3 3600 20070926135752 20070829135752 2854 example.com. MC0CFQCMSWxVehgOQLoYclB9PIAbNP229AIUeH0vNNGJhjnZiqgIOKvs1EhzqAo= ;{id = 2854}
148 ; could be picked out of the negative cache due to NS queries in between.
150 MATCH opcode qtype qname
154 www.example.net.example.com. IN DLV
157 example.com. IN SOA open.nlnetlabs.nl. hostmaster.nlnetlabs.nl. 2008081300 28800 7200 604800 3600
158 example.com. 3600 IN RRSIG SOA 3 2 3600 20070926134150 20070829134150 2854 example.com. AKPJnPBqfJKxE4P2iVYkSRJno9HmiXJZtjdqE8oBeq9Lk9FytcMdcig= ;{id = 2854}
159 example.com. IN NS ns.example.com.
160 example.com. 3600 IN RRSIG NS 3 2 3600 20070926134150 20070829134150 2854 example.com. MC0CFQCN+qHdJxoI/2tNKwsb08pra/G7aAIUAWA5sDdJTbrXA1/3OaesGBAO3sI= ;{id = 2854}
161 example.com IN NSEC zazz.example.com. SOA NS RRSIG NSEC
162 example.com. 3600 IN RRSIG NSEC 3 2 3600 20070926135752 20070829135752 2854 example.com. AAi21jQpno6gXnrPrtK0NvNgX9B8E9U5RvTd47QiCWLF7KdtKxB7Xz0= ;{id = 2854}
164 ns.example.com. IN A 1.2.3.4
165 ns.example.com. 3600 IN RRSIG A 3 3 3600 20070926135752 20070829135752 2854 example.com. MC0CFQCMSWxVehgOQLoYclB9PIAbNP229AIUeH0vNNGJhjnZiqgIOKvs1EhzqAo= ;{id = 2854}
169 MATCH opcode qtype qname
173 net.example.com. IN DLV
176 example.com. IN SOA open.nlnetlabs.nl. hostmaster.nlnetlabs.nl. 2008081300 28800 7200 604800 3600
177 example.com. 3600 IN RRSIG SOA 3 2 3600 20070926134150 20070829134150 2854 example.com. AKPJnPBqfJKxE4P2iVYkSRJno9HmiXJZtjdqE8oBeq9Lk9FytcMdcig= ;{id = 2854}
178 example.com IN NSEC zazz.example.com. SOA NS RRSIG NSEC
179 example.com. 3600 IN RRSIG NSEC 3 2 3600 20070926135752 20070829135752 2854 example.com. AAi21jQpno6gXnrPrtK0NvNgX9B8E9U5RvTd47QiCWLF7KdtKxB7Xz0= ;{id = 2854}
183 MATCH opcode qtype qname
187 com.example.com. IN DLV
190 example.com. IN SOA open.nlnetlabs.nl. hostmaster.nlnetlabs.nl. 2008081300 28800 7200 604800 3600
191 example.com. 3600 IN RRSIG SOA 3 2 3600 20070926134150 20070829134150 2854 example.com. AKPJnPBqfJKxE4P2iVYkSRJno9HmiXJZtjdqE8oBeq9Lk9FytcMdcig= ;{id = 2854}
192 example.com IN NSEC zazz.example.com. SOA NS RRSIG NSEC
193 example.com. 3600 IN RRSIG NSEC 3 2 3600 20070926135752 20070829135752 2854 example.com. AAi21jQpno6gXnrPrtK0NvNgX9B8E9U5RvTd47QiCWLF7KdtKxB7Xz0= ;{id = 2854}
203 MATCH opcode qtype qname
209 example.net. IN NS ns.example.net.
211 ns.example.net. IN A 1.2.3.5
214 ; www.example.net query
216 MATCH opcode qtype qname
220 www.example.net. IN A
222 www.example.net. 3600 IN A 10.20.30.40
224 example.net. IN NS ns.example.net.
226 ns.example.net. IN A 1.2.3.5
236 www.example.net. IN A
239 ; recursion happens here.
243 REPLY QR RD RA DO NOERROR
245 www.example.net. IN A
247 www.example.net. 3600 IN A 10.20.30.40
249 example.net. IN NS ns.example.net.
251 ns.example.net. IN A 1.2.3.5