2 ; The island of trust is at example.com
4 trust-anchor: "example.com. 3600 IN DS 2854 3 1 46e4ffc6e9a4793b488954bd3f0cc6af0dfb201b"
5 val-override-date: "20070916134226"
7 access-control: 127.0.0.1 allow_snoop
8 target-fetch-policy: "0 0 0 0 0"
13 stub-addr: 193.0.14.129 # K.ROOT-SERVERS.NET.
16 SCENARIO_BEGIN Test validator with cache referral with unsigned glue
22 MATCH opcode qtype qname
28 . IN NS K.ROOT-SERVERS.NET.
30 K.ROOT-SERVERS.NET. IN A 193.0.14.129
34 MATCH opcode qtype qname
40 com. IN NS a.gtld-servers.net.
42 a.gtld-servers.net. IN A 192.5.6.30
50 MATCH opcode qtype qname
56 com. IN NS a.gtld-servers.net.
58 a.gtld-servers.net. IN A 192.5.6.30
62 MATCH opcode qtype qname
68 example.com. IN NS ns.example.com.
70 ns.example.com. IN A 1.2.3.4
78 MATCH opcode qtype qname
84 example.com. IN NS ns.example.com.
85 example.com. IN NS ns2.sub.example.com.
86 example.com. 3600 IN RRSIG NS DSA 2 3600 20070926134150 20070829134150 2854 example.com. MC0CFQCiyp/3hxwKS5QZPnjk36t16s4QTwIUI0m+MBVOAPacANrXXFKieyZd39o= ;{id = 2854}
88 ns.example.com. IN A 1.2.3.4
89 ns.example.com. 3600 IN RRSIG A 3 3 3600 20070926134150 20070829134150 2854 example.com. MC0CFQCQMyTjn7WWwpwAR1LlVeLpRgZGuQIUCcJDEkwAuzytTDRlYK7nIMwH1CM= ;{id = 2854}
90 ns2.sub.example.com. IN A 100.200.30.40
93 ; referral, for all types
99 ns2.sub.example.com. IN A
101 sub.example.com. IN NS ns2.sub.example.com.
102 sub.example.com. IN NSEC tlib.example.com. NS RRSIG NSEC
103 sub.example.com. 3600 IN RRSIG NSEC 3 3 3600 20070926134150 20070829134150 2854 example.com. ABdrfr+eKT1syk2qFlV01wLOqQdvNMpEtPmGAM6CrtyQAje/ddXSi9A= ;{id = 2854}
104 ns2.sub.example.com. IN A 100.200.30.40
107 ; response to DNSKEY priming query
109 MATCH opcode qtype qname
113 example.com. IN DNSKEY
115 example.com. 3600 IN DNSKEY 256 3 3 ALXLUsWqUrY3JYER3T4TBJII s70j+sDS/UT2QRp61SE7S3E EXopNXoFE73JLRmvpi/UrOO/Vz4Se 6wXv/CYCKjGw06U4WRgR YXcpEhJROyNapmdIKSx hOzfLVE1gqA0PweZR8d tY3aNQSRn3sPpwJr6Mi /PqQKAMMrZ9ckJpf1+b QMOOvxgzz2U1GS18b3y ZKcgTMEaJzd/GZYzi/B N2DzQ0MsrSwYXfsNLFO Bbs8PJMW4LYIxeeOe6rUgkWOF 7CC9Dh/dduQ1QrsJhmZAEFfd6ByYV+ ;{id = 2854 (zsk), size = 1688b}
116 example.com. 3600 IN RRSIG DNSKEY 3 2 3600 20070926134802 20070829134802 2854 example.com. MCwCFG1yhRNtTEa3Eno2zhVVuy2EJX3wAhQeLyUp6+UXcpC5qGNu9tkrTEgPUg== ;{id = 2854}
118 example.com. IN NS ns.example.com.
119 example.com. IN NS ns2.sub.example.com.
120 example.com. 3600 IN RRSIG NS DSA 2 3600 20070926134150 20070829134150 2854 example.com. MC0CFQCiyp/3hxwKS5QZPnjk36t16s4QTwIUI0m+MBVOAPacANrXXFKieyZd39o= ;{id = 2854}
122 ns.example.com. IN A 1.2.3.4
123 ns.example.com. 3600 IN RRSIG A 3 3 3600 20070926134150 20070829134150 2854 example.com. MC0CFQCQMyTjn7WWwpwAR1LlVeLpRgZGuQIUCcJDEkwAuzytTDRlYK7nIMwH1CM= ;{id = 2854}
124 ns2.sub.example.com. IN A 100.200.30.40
128 MATCH opcode qtype qname
132 www.example.com. IN A
134 www.example.com. IN A 10.20.30.40
135 www.example.com. 3600 IN RRSIG A 3 3 3600 20070926134150 20070829134150 2854 example.com. MC0CFC99iE9K5y2WNgI0gFvBWaTi9wm6AhUAoUqOpDtG5Zct+Qr9F3mSdnbc6V4= ;{id = 2854}
137 example.com. IN NS ns.example.com.
138 example.com. IN NS ns2.sub.example.com.
139 example.com. 3600 IN RRSIG NS DSA 2 3600 20070926134150 20070829134150 2854 example.com. MC0CFQCiyp/3hxwKS5QZPnjk36t16s4QTwIUI0m+MBVOAPacANrXXFKieyZd39o= ;{id = 2854}
141 ns.example.com. IN A 1.2.3.4
142 ns.example.com. 3600 IN RRSIG A 3 3 3600 20070926134150 20070829134150 2854 example.com. MC0CFQCQMyTjn7WWwpwAR1LlVeLpRgZGuQIUCcJDEkwAuzytTDRlYK7nIMwH1CM= ;{id = 2854}
143 ; This is from an unsigned subzone
144 ns2.sub.example.com. IN A 100.200.30.40
147 MATCH opcode qtype qname
151 sub.example.com. IN DS
154 sub.example.com. IN NSEC www.example.com. NS RRSIG NSEC
155 sub.example.com. 3600 IN RRSIG NSEC 3 3 3600 20070926134150 20070829134150 2854 example.com. MCwCFEG4WWIYBDknWlr2d8S42UZHRuByAhRgnDELUAccGZTCVzG+xl/locivpA== ;{id = 2854}
159 ; ns2.sub.example.com.
161 ADDRESS 100.200.30.40
163 MATCH opcode qtype qname
169 example.com. IN NS ns.example.com.
170 example.com. IN NS ns2.sub.example.com.
171 example.com. 3600 IN RRSIG NS DSA 2 3600 20070926134150 20070829134150 2854 example.com. MC0CFQCiyp/3hxwKS5QZPnjk36t16s4QTwIUI0m+MBVOAPacANrXXFKieyZd39o= ;{id = 2854}
173 ns.example.com. IN A 1.2.3.4
174 ns.example.com. 3600 IN RRSIG A 3 3 3600 20070926134150 20070829134150 2854 example.com. MC0CFQCQMyTjn7WWwpwAR1LlVeLpRgZGuQIUCcJDEkwAuzytTDRlYK7nIMwH1CM= ;{id = 2854}
177 ; response to DNSKEY priming query
179 MATCH opcode qtype qname
183 example.com. IN DNSKEY
185 example.com. 3600 IN DNSKEY 256 3 3 ALXLUsWqUrY3JYER3T4TBJII s70j+sDS/UT2QRp61SE7S3E EXopNXoFE73JLRmvpi/UrOO/Vz4Se 6wXv/CYCKjGw06U4WRgR YXcpEhJROyNapmdIKSx hOzfLVE1gqA0PweZR8d tY3aNQSRn3sPpwJr6Mi /PqQKAMMrZ9ckJpf1+b QMOOvxgzz2U1GS18b3y ZKcgTMEaJzd/GZYzi/B N2DzQ0MsrSwYXfsNLFO Bbs8PJMW4LYIxeeOe6rUgkWOF 7CC9Dh/dduQ1QrsJhmZAEFfd6ByYV+ ;{id = 2854 (zsk), size = 1688b}
186 example.com. 3600 IN RRSIG DNSKEY 3 2 3600 20070926134802 20070829134802 2854 example.com. MCwCFG1yhRNtTEa3Eno2zhVVuy2EJX3wAhQeLyUp6+UXcpC5qGNu9tkrTEgPUg== ;{id = 2854}
188 example.com. IN NS ns.example.com.
189 example.com. IN NS ns2.sub.example.com.
190 example.com. 3600 IN RRSIG NS DSA 2 3600 20070926134150 20070829134150 2854 example.com. MC0CFQCiyp/3hxwKS5QZPnjk36t16s4QTwIUI0m+MBVOAPacANrXXFKieyZd39o= ;{id = 2854}
192 ns.example.com. IN A 1.2.3.4
193 ns.example.com. 3600 IN RRSIG A 3 3 3600 20070926134150 20070829134150 2854 example.com. MC0CFQCQMyTjn7WWwpwAR1LlVeLpRgZGuQIUCcJDEkwAuzytTDRlYK7nIMwH1CM= ;{id = 2854}
197 MATCH opcode qtype qname
201 www.example.com. IN A
203 www.example.com. IN A 10.20.30.40
204 www.example.com. 3600 IN RRSIG A 3 3 3600 20070926134150 20070829134150 2854 example.com. MC0CFC99iE9K5y2WNgI0gFvBWaTi9wm6AhUAoUqOpDtG5Zct+Qr9F3mSdnbc6V4= ;{id = 2854}
206 example.com. IN NS ns.example.com.
207 example.com. IN NS ns2.sub.example.com.
208 example.com. 3600 IN RRSIG NS DSA 2 3600 20070926134150 20070829134150 2854 example.com. MC0CFQCiyp/3hxwKS5QZPnjk36t16s4QTwIUI0m+MBVOAPacANrXXFKieyZd39o= ;{id = 2854}
210 ns.example.com. IN A 1.2.3.4
211 ns.example.com. 3600 IN RRSIG A 3 3 3600 20070926134150 20070829134150 2854 example.com. MC0CFQCQMyTjn7WWwpwAR1LlVeLpRgZGuQIUCcJDEkwAuzytTDRlYK7nIMwH1CM= ;{id = 2854}
212 ; This is from an unsigned subzone
213 ns2.sub.example.com. IN A 100.200.30.40
216 MATCH opcode qtype qname
220 sub.example.com. IN DS
223 sub.example.com. IN NSEC www.example.com. NS RRSIG NSEC
224 sub.example.com. 3600 IN RRSIG NSEC 3 3 3600 20070926134150 20070829134150 2854 example.com. MCwCFEG4WWIYBDknWlr2d8S42UZHRuByAhRgnDELUAccGZTCVzG+xl/locivpA== ;{id = 2854}
228 MATCH opcode qname qtype
232 ns2.sub.example.com. IN A
234 ns2.sub.example.com. IN A 100.200.30.40
238 MATCH opcode qname qtype
242 ns2.sub.example.com. IN AAAA
248 ; first ask for +CD and get the data in the cache.
253 www.example.com. IN A
259 REPLY QR RD RA CD NOERROR
261 www.example.com. IN A
263 www.example.com. IN A 10.20.30.40
265 example.com. IN NS ns.example.com.
266 example.com. IN NS ns2.sub.example.com.
268 ns.example.com. IN A 1.2.3.4
269 ; already validated and thus stripped from the answer.
270 ;ns2.sub.example.com. IN A 100.200.30.40
273 ; now the data is in the cache, validate a referral from cache
274 ; note, no recursion desired
279 bla.example.com. IN A
285 REPLY QR RA AD DO NOERROR
287 bla.example.com. IN A
290 example.com. 3600 IN NS ns.example.com.
291 example.com. 3600 IN NS ns2.sub.example.com.
292 example.com. 3600 IN RRSIG NS DSA 2 3600 20070926134150 20070829134150 2854 example.com. MC0CFQCiyp/3hxwKS5QZPnjk36t16s4QTwIUI0m+MBVOAPacANrXXFKieyZd39o= ;{id = 2854}
294 ns.example.com. IN A 1.2.3.4
295 ns.example.com. 3600 IN RRSIG A 3 3 3600 20070926134150 20070829134150 2854 example.com. MC0CFQCQMyTjn7WWwpwAR1LlVeLpRgZGuQIUCcJDEkwAuzytTDRlYK7nIMwH1CM= ;{id = 2854}