2 ; The island of trust is at example.com
4 trust-anchor: "example.com. 3600 IN DS 2854 3 1 46e4ffc6e9a4793b488954bd3f0cc6af0dfb201b"
5 val-override-date: "20070916134226"
7 access-control: 127.0.0.1 allow_snoop
8 target-fetch-policy: "0 0 0 0 0"
9 qname-minimisation: "no"
11 trust-anchor-signaling: no
17 stub-addr: 193.0.14.129 # K.ROOT-SERVERS.NET.
20 SCENARIO_BEGIN Test validator with cache referral with unsigned glue
26 MATCH opcode qtype qname
32 . IN NS K.ROOT-SERVERS.NET.
34 K.ROOT-SERVERS.NET. IN A 193.0.14.129
38 MATCH opcode qtype qname
44 com. IN NS a.gtld-servers.net.
46 a.gtld-servers.net. IN A 192.5.6.30
54 MATCH opcode qtype qname
60 com. IN NS a.gtld-servers.net.
62 a.gtld-servers.net. IN A 192.5.6.30
66 MATCH opcode qtype qname
72 example.com. IN NS ns.example.com.
74 ns.example.com. IN A 1.2.3.4
82 MATCH opcode qtype qname
88 example.com. IN NS ns.example.com.
89 example.com. IN NS ns2.sub.example.com.
90 example.com. 3600 IN RRSIG NS DSA 2 3600 20070926134150 20070829134150 2854 example.com. MC0CFQCiyp/3hxwKS5QZPnjk36t16s4QTwIUI0m+MBVOAPacANrXXFKieyZd39o= ;{id = 2854}
92 ns.example.com. IN A 1.2.3.4
93 ns.example.com. 3600 IN RRSIG A 3 3 3600 20070926134150 20070829134150 2854 example.com. MC0CFQCQMyTjn7WWwpwAR1LlVeLpRgZGuQIUCcJDEkwAuzytTDRlYK7nIMwH1CM= ;{id = 2854}
94 ns2.sub.example.com. IN A 100.200.30.40
97 ; referral, for all types
103 ns2.sub.example.com. IN A
105 sub.example.com. IN NS ns2.sub.example.com.
106 sub.example.com. IN NSEC tlib.example.com. NS RRSIG NSEC
107 sub.example.com. 3600 IN RRSIG NSEC 3 3 3600 20070926134150 20070829134150 2854 example.com. ABdrfr+eKT1syk2qFlV01wLOqQdvNMpEtPmGAM6CrtyQAje/ddXSi9A= ;{id = 2854}
108 ns2.sub.example.com. IN A 100.200.30.40
111 ; response to DNSKEY priming query
113 MATCH opcode qtype qname
117 example.com. IN DNSKEY
119 example.com. 3600 IN DNSKEY 256 3 3 ALXLUsWqUrY3JYER3T4TBJII s70j+sDS/UT2QRp61SE7S3E EXopNXoFE73JLRmvpi/UrOO/Vz4Se 6wXv/CYCKjGw06U4WRgR YXcpEhJROyNapmdIKSx hOzfLVE1gqA0PweZR8d tY3aNQSRn3sPpwJr6Mi /PqQKAMMrZ9ckJpf1+b QMOOvxgzz2U1GS18b3y ZKcgTMEaJzd/GZYzi/B N2DzQ0MsrSwYXfsNLFO Bbs8PJMW4LYIxeeOe6rUgkWOF 7CC9Dh/dduQ1QrsJhmZAEFfd6ByYV+ ;{id = 2854 (zsk), size = 1688b}
120 example.com. 3600 IN RRSIG DNSKEY 3 2 3600 20070926134802 20070829134802 2854 example.com. MCwCFG1yhRNtTEa3Eno2zhVVuy2EJX3wAhQeLyUp6+UXcpC5qGNu9tkrTEgPUg== ;{id = 2854}
122 example.com. IN NS ns.example.com.
123 example.com. IN NS ns2.sub.example.com.
124 example.com. 3600 IN RRSIG NS DSA 2 3600 20070926134150 20070829134150 2854 example.com. MC0CFQCiyp/3hxwKS5QZPnjk36t16s4QTwIUI0m+MBVOAPacANrXXFKieyZd39o= ;{id = 2854}
126 ns.example.com. IN A 1.2.3.4
127 ns.example.com. 3600 IN RRSIG A 3 3 3600 20070926134150 20070829134150 2854 example.com. MC0CFQCQMyTjn7WWwpwAR1LlVeLpRgZGuQIUCcJDEkwAuzytTDRlYK7nIMwH1CM= ;{id = 2854}
128 ns2.sub.example.com. IN A 100.200.30.40
132 MATCH opcode qtype qname
136 www.example.com. IN A
138 www.example.com. IN A 10.20.30.40
139 www.example.com. 3600 IN RRSIG A 3 3 3600 20070926134150 20070829134150 2854 example.com. MC0CFC99iE9K5y2WNgI0gFvBWaTi9wm6AhUAoUqOpDtG5Zct+Qr9F3mSdnbc6V4= ;{id = 2854}
141 example.com. IN NS ns.example.com.
142 example.com. IN NS ns2.sub.example.com.
143 example.com. 3600 IN RRSIG NS DSA 2 3600 20070926134150 20070829134150 2854 example.com. MC0CFQCiyp/3hxwKS5QZPnjk36t16s4QTwIUI0m+MBVOAPacANrXXFKieyZd39o= ;{id = 2854}
145 ns.example.com. IN A 1.2.3.4
146 ns.example.com. 3600 IN RRSIG A 3 3 3600 20070926134150 20070829134150 2854 example.com. MC0CFQCQMyTjn7WWwpwAR1LlVeLpRgZGuQIUCcJDEkwAuzytTDRlYK7nIMwH1CM= ;{id = 2854}
147 ; This is from an unsigned subzone
148 ns2.sub.example.com. IN A 100.200.30.40
151 MATCH opcode qtype qname
155 sub.example.com. IN DS
158 sub.example.com. IN NSEC www.example.com. NS RRSIG NSEC
159 sub.example.com. 3600 IN RRSIG NSEC 3 3 3600 20070926134150 20070829134150 2854 example.com. MCwCFEG4WWIYBDknWlr2d8S42UZHRuByAhRgnDELUAccGZTCVzG+xl/locivpA== ;{id = 2854}
163 ; ns2.sub.example.com.
165 ADDRESS 100.200.30.40
167 MATCH opcode qtype qname
173 example.com. IN NS ns.example.com.
174 example.com. IN NS ns2.sub.example.com.
175 example.com. 3600 IN RRSIG NS DSA 2 3600 20070926134150 20070829134150 2854 example.com. MC0CFQCiyp/3hxwKS5QZPnjk36t16s4QTwIUI0m+MBVOAPacANrXXFKieyZd39o= ;{id = 2854}
177 ns.example.com. IN A 1.2.3.4
178 ns.example.com. 3600 IN RRSIG A 3 3 3600 20070926134150 20070829134150 2854 example.com. MC0CFQCQMyTjn7WWwpwAR1LlVeLpRgZGuQIUCcJDEkwAuzytTDRlYK7nIMwH1CM= ;{id = 2854}
181 ; response to DNSKEY priming query
183 MATCH opcode qtype qname
187 example.com. IN DNSKEY
189 example.com. 3600 IN DNSKEY 256 3 3 ALXLUsWqUrY3JYER3T4TBJII s70j+sDS/UT2QRp61SE7S3E EXopNXoFE73JLRmvpi/UrOO/Vz4Se 6wXv/CYCKjGw06U4WRgR YXcpEhJROyNapmdIKSx hOzfLVE1gqA0PweZR8d tY3aNQSRn3sPpwJr6Mi /PqQKAMMrZ9ckJpf1+b QMOOvxgzz2U1GS18b3y ZKcgTMEaJzd/GZYzi/B N2DzQ0MsrSwYXfsNLFO Bbs8PJMW4LYIxeeOe6rUgkWOF 7CC9Dh/dduQ1QrsJhmZAEFfd6ByYV+ ;{id = 2854 (zsk), size = 1688b}
190 example.com. 3600 IN RRSIG DNSKEY 3 2 3600 20070926134802 20070829134802 2854 example.com. MCwCFG1yhRNtTEa3Eno2zhVVuy2EJX3wAhQeLyUp6+UXcpC5qGNu9tkrTEgPUg== ;{id = 2854}
192 example.com. IN NS ns.example.com.
193 example.com. IN NS ns2.sub.example.com.
194 example.com. 3600 IN RRSIG NS DSA 2 3600 20070926134150 20070829134150 2854 example.com. MC0CFQCiyp/3hxwKS5QZPnjk36t16s4QTwIUI0m+MBVOAPacANrXXFKieyZd39o= ;{id = 2854}
196 ns.example.com. IN A 1.2.3.4
197 ns.example.com. 3600 IN RRSIG A 3 3 3600 20070926134150 20070829134150 2854 example.com. MC0CFQCQMyTjn7WWwpwAR1LlVeLpRgZGuQIUCcJDEkwAuzytTDRlYK7nIMwH1CM= ;{id = 2854}
201 MATCH opcode qtype qname
205 www.example.com. IN A
207 www.example.com. IN A 10.20.30.40
208 www.example.com. 3600 IN RRSIG A 3 3 3600 20070926134150 20070829134150 2854 example.com. MC0CFC99iE9K5y2WNgI0gFvBWaTi9wm6AhUAoUqOpDtG5Zct+Qr9F3mSdnbc6V4= ;{id = 2854}
210 example.com. IN NS ns.example.com.
211 example.com. IN NS ns2.sub.example.com.
212 example.com. 3600 IN RRSIG NS DSA 2 3600 20070926134150 20070829134150 2854 example.com. MC0CFQCiyp/3hxwKS5QZPnjk36t16s4QTwIUI0m+MBVOAPacANrXXFKieyZd39o= ;{id = 2854}
214 ns.example.com. IN A 1.2.3.4
215 ns.example.com. 3600 IN RRSIG A 3 3 3600 20070926134150 20070829134150 2854 example.com. MC0CFQCQMyTjn7WWwpwAR1LlVeLpRgZGuQIUCcJDEkwAuzytTDRlYK7nIMwH1CM= ;{id = 2854}
216 ; This is from an unsigned subzone
217 ns2.sub.example.com. IN A 100.200.30.40
220 MATCH opcode qtype qname
224 sub.example.com. IN DS
227 sub.example.com. IN NSEC www.example.com. NS RRSIG NSEC
228 sub.example.com. 3600 IN RRSIG NSEC 3 3 3600 20070926134150 20070829134150 2854 example.com. MCwCFEG4WWIYBDknWlr2d8S42UZHRuByAhRgnDELUAccGZTCVzG+xl/locivpA== ;{id = 2854}
232 MATCH opcode qname qtype
236 ns2.sub.example.com. IN A
238 ns2.sub.example.com. IN A 100.200.30.40
242 MATCH opcode qname qtype
246 ns2.sub.example.com. IN AAAA
252 ; first ask for +CD and get the data in the cache.
257 www.example.com. IN A
263 REPLY QR RD RA CD NOERROR
265 www.example.com. IN A
267 www.example.com. IN A 10.20.30.40
269 example.com. IN NS ns.example.com.
270 example.com. IN NS ns2.sub.example.com.
272 ns.example.com. IN A 1.2.3.4
273 ; already validated and thus stripped from the answer.
274 ;ns2.sub.example.com. IN A 100.200.30.40
277 ; now the data is in the cache, validate a referral from cache
278 ; note, no recursion desired
283 bla.example.com. IN A
289 REPLY QR RA AD DO NOERROR
291 bla.example.com. IN A
294 example.com. 3600 IN NS ns.example.com.
295 example.com. 3600 IN NS ns2.sub.example.com.
296 example.com. 3600 IN RRSIG NS DSA 2 3600 20070926134150 20070829134150 2854 example.com. MC0CFQCiyp/3hxwKS5QZPnjk36t16s4QTwIUI0m+MBVOAPacANrXXFKieyZd39o= ;{id = 2854}
298 ns.example.com. IN A 1.2.3.4
299 ns.example.com. 3600 IN RRSIG A 3 3 3600 20070926134150 20070829134150 2854 example.com. MC0CFQCQMyTjn7WWwpwAR1LlVeLpRgZGuQIUCcJDEkwAuzytTDRlYK7nIMwH1CM= ;{id = 2854}