2 ; config options go here.
5 forward-zone: name: "." forward-addr: 216.0.0.1
8 SCENARIO_BEGIN Untrusted rrset not used for update
16 ; the query is sent to the forwarder - no cache yet.
17 STEP 2 CHECK_OUT_QUERY
19 MATCH qname qtype opcode
25 MATCH opcode qtype qname
27 ; authoritative answer
28 REPLY QR AA RD RA NOERROR
32 www.example.com. IN A 10.20.30.40
34 example.com. IN NS ns.example.com.
36 ns.example.com. IN A 10.20.30.50
45 www.example.com. IN A 10.20.30.40
47 example.com. IN NS ns.example.com.
49 ns.example.com. IN A 10.20.30.50
52 ; another query passes along
59 STEP 7 CHECK_OUT_QUERY
61 MATCH qname qtype opcode
66 ; This answer has updated information on ns2.example.com.
67 ; But it is nerfed into the additional. Must be ignored per rfc2181.
69 MATCH opcode qtype qname
71 ; authoritative answer
72 REPLY QR AA RD RA NOERROR
76 bla.example.com. IN A 10.20.30.140
79 example.com. IN NS ns.eeeek.com.
80 example.com. IN NS ns2.eeeek.com.
81 ns.eeeek.com. IN A 55.44.33.22
82 ns2.eeeek.com. IN A 55.44.33.24
91 bla.example.com. IN A 10.20.30.140
97 ; original www.example.com query
102 www.example.com. IN A
104 ; immediate answer without an OUT_QUERY happening (checked on exit)
105 ; also, the answer does not have AA set
106 ; NS rrset has not been updated from the additional seen before.
112 www.example.com. IN A
114 www.example.com. IN A 10.20.30.40
116 example.com. IN NS ns.example.com.
118 ns.example.com. IN A 10.20.30.50