2 ; The island of trust is at example.com
4 trust-anchor: "example.com. 3600 IN DS 2854 3 1 46e4ffc6e9a4793b488954bd3f0cc6af0dfb201b"
5 val-override-date: "20070916134226"
7 access-control: 127.0.0.1 allow_snoop
8 target-fetch-policy: "0 0 0 0 0"
12 stub-addr: 193.0.14.129 # K.ROOT-SERVERS.NET.
15 SCENARIO_BEGIN Test validator with cache referral with unsigned glue
21 MATCH opcode qtype qname
27 . IN NS K.ROOT-SERVERS.NET.
29 K.ROOT-SERVERS.NET. IN A 193.0.14.129
33 MATCH opcode qtype qname
39 com. IN NS a.gtld-servers.net.
41 a.gtld-servers.net. IN A 192.5.6.30
49 MATCH opcode qtype qname
55 com. IN NS a.gtld-servers.net.
57 a.gtld-servers.net. IN A 192.5.6.30
61 MATCH opcode qtype qname
67 example.com. IN NS ns.example.com.
69 ns.example.com. IN A 1.2.3.4
77 MATCH opcode qtype qname
83 example.com. IN NS ns.example.com.
84 example.com. IN NS ns2.sub.example.com.
85 example.com. 3600 IN RRSIG NS DSA 2 3600 20070926134150 20070829134150 2854 example.com. MC0CFQCiyp/3hxwKS5QZPnjk36t16s4QTwIUI0m+MBVOAPacANrXXFKieyZd39o= ;{id = 2854}
87 ns.example.com. IN A 1.2.3.4
88 ns.example.com. 3600 IN RRSIG A 3 3 3600 20070926134150 20070829134150 2854 example.com. MC0CFQCQMyTjn7WWwpwAR1LlVeLpRgZGuQIUCcJDEkwAuzytTDRlYK7nIMwH1CM= ;{id = 2854}
89 ns2.sub.example.com. IN A 100.200.30.40
92 ; referral, for all types
98 ns2.sub.example.com. IN A
100 sub.example.com. IN NS ns2.sub.example.com.
101 sub.example.com. IN NSEC tlib.example.com. NS RRSIG NSEC
102 sub.example.com. 3600 IN RRSIG NSEC 3 3 3600 20070926134150 20070829134150 2854 example.com. ABdrfr+eKT1syk2qFlV01wLOqQdvNMpEtPmGAM6CrtyQAje/ddXSi9A= ;{id = 2854}
103 ns2.sub.example.com. IN A 100.200.30.40
106 ; response to DNSKEY priming query
108 MATCH opcode qtype qname
112 example.com. IN DNSKEY
114 example.com. 3600 IN DNSKEY 256 3 3 ALXLUsWqUrY3JYER3T4TBJII s70j+sDS/UT2QRp61SE7S3E EXopNXoFE73JLRmvpi/UrOO/Vz4Se 6wXv/CYCKjGw06U4WRgR YXcpEhJROyNapmdIKSx hOzfLVE1gqA0PweZR8d tY3aNQSRn3sPpwJr6Mi /PqQKAMMrZ9ckJpf1+b QMOOvxgzz2U1GS18b3y ZKcgTMEaJzd/GZYzi/B N2DzQ0MsrSwYXfsNLFO Bbs8PJMW4LYIxeeOe6rUgkWOF 7CC9Dh/dduQ1QrsJhmZAEFfd6ByYV+ ;{id = 2854 (zsk), size = 1688b}
115 example.com. 3600 IN RRSIG DNSKEY 3 2 3600 20070926134802 20070829134802 2854 example.com. MCwCFG1yhRNtTEa3Eno2zhVVuy2EJX3wAhQeLyUp6+UXcpC5qGNu9tkrTEgPUg== ;{id = 2854}
117 example.com. IN NS ns.example.com.
118 example.com. IN NS ns2.sub.example.com.
119 example.com. 3600 IN RRSIG NS DSA 2 3600 20070926134150 20070829134150 2854 example.com. MC0CFQCiyp/3hxwKS5QZPnjk36t16s4QTwIUI0m+MBVOAPacANrXXFKieyZd39o= ;{id = 2854}
121 ns.example.com. IN A 1.2.3.4
122 ns.example.com. 3600 IN RRSIG A 3 3 3600 20070926134150 20070829134150 2854 example.com. MC0CFQCQMyTjn7WWwpwAR1LlVeLpRgZGuQIUCcJDEkwAuzytTDRlYK7nIMwH1CM= ;{id = 2854}
123 ns2.sub.example.com. IN A 100.200.30.40
127 MATCH opcode qtype qname
131 www.example.com. IN A
133 www.example.com. IN A 10.20.30.40
134 www.example.com. 3600 IN RRSIG A 3 3 3600 20070926134150 20070829134150 2854 example.com. MC0CFC99iE9K5y2WNgI0gFvBWaTi9wm6AhUAoUqOpDtG5Zct+Qr9F3mSdnbc6V4= ;{id = 2854}
136 example.com. IN NS ns.example.com.
137 example.com. IN NS ns2.sub.example.com.
138 example.com. 3600 IN RRSIG NS DSA 2 3600 20070926134150 20070829134150 2854 example.com. MC0CFQCiyp/3hxwKS5QZPnjk36t16s4QTwIUI0m+MBVOAPacANrXXFKieyZd39o= ;{id = 2854}
140 ns.example.com. IN A 1.2.3.4
141 ns.example.com. 3600 IN RRSIG A 3 3 3600 20070926134150 20070829134150 2854 example.com. MC0CFQCQMyTjn7WWwpwAR1LlVeLpRgZGuQIUCcJDEkwAuzytTDRlYK7nIMwH1CM= ;{id = 2854}
142 ; This is from an unsigned subzone
143 ns2.sub.example.com. IN A 100.200.30.40
146 MATCH opcode qtype qname
150 sub.example.com. IN DS
153 sub.example.com. IN NSEC www.example.com. NS RRSIG NSEC
154 sub.example.com. 3600 IN RRSIG NSEC 3 3 3600 20070926134150 20070829134150 2854 example.com. MCwCFEG4WWIYBDknWlr2d8S42UZHRuByAhRgnDELUAccGZTCVzG+xl/locivpA== ;{id = 2854}
158 ; ns2.sub.example.com.
160 ADDRESS 100.200.30.40
162 MATCH opcode qtype qname
168 example.com. IN NS ns.example.com.
169 example.com. IN NS ns2.sub.example.com.
170 example.com. 3600 IN RRSIG NS DSA 2 3600 20070926134150 20070829134150 2854 example.com. MC0CFQCiyp/3hxwKS5QZPnjk36t16s4QTwIUI0m+MBVOAPacANrXXFKieyZd39o= ;{id = 2854}
172 ns.example.com. IN A 1.2.3.4
173 ns.example.com. 3600 IN RRSIG A 3 3 3600 20070926134150 20070829134150 2854 example.com. MC0CFQCQMyTjn7WWwpwAR1LlVeLpRgZGuQIUCcJDEkwAuzytTDRlYK7nIMwH1CM= ;{id = 2854}
176 ; response to DNSKEY priming query
178 MATCH opcode qtype qname
182 example.com. IN DNSKEY
184 example.com. 3600 IN DNSKEY 256 3 3 ALXLUsWqUrY3JYER3T4TBJII s70j+sDS/UT2QRp61SE7S3E EXopNXoFE73JLRmvpi/UrOO/Vz4Se 6wXv/CYCKjGw06U4WRgR YXcpEhJROyNapmdIKSx hOzfLVE1gqA0PweZR8d tY3aNQSRn3sPpwJr6Mi /PqQKAMMrZ9ckJpf1+b QMOOvxgzz2U1GS18b3y ZKcgTMEaJzd/GZYzi/B N2DzQ0MsrSwYXfsNLFO Bbs8PJMW4LYIxeeOe6rUgkWOF 7CC9Dh/dduQ1QrsJhmZAEFfd6ByYV+ ;{id = 2854 (zsk), size = 1688b}
185 example.com. 3600 IN RRSIG DNSKEY 3 2 3600 20070926134802 20070829134802 2854 example.com. MCwCFG1yhRNtTEa3Eno2zhVVuy2EJX3wAhQeLyUp6+UXcpC5qGNu9tkrTEgPUg== ;{id = 2854}
187 example.com. IN NS ns.example.com.
188 example.com. IN NS ns2.sub.example.com.
189 example.com. 3600 IN RRSIG NS DSA 2 3600 20070926134150 20070829134150 2854 example.com. MC0CFQCiyp/3hxwKS5QZPnjk36t16s4QTwIUI0m+MBVOAPacANrXXFKieyZd39o= ;{id = 2854}
191 ns.example.com. IN A 1.2.3.4
192 ns.example.com. 3600 IN RRSIG A 3 3 3600 20070926134150 20070829134150 2854 example.com. MC0CFQCQMyTjn7WWwpwAR1LlVeLpRgZGuQIUCcJDEkwAuzytTDRlYK7nIMwH1CM= ;{id = 2854}
196 MATCH opcode qtype qname
200 www.example.com. IN A
202 www.example.com. IN A 10.20.30.40
203 www.example.com. 3600 IN RRSIG A 3 3 3600 20070926134150 20070829134150 2854 example.com. MC0CFC99iE9K5y2WNgI0gFvBWaTi9wm6AhUAoUqOpDtG5Zct+Qr9F3mSdnbc6V4= ;{id = 2854}
205 example.com. IN NS ns.example.com.
206 example.com. IN NS ns2.sub.example.com.
207 example.com. 3600 IN RRSIG NS DSA 2 3600 20070926134150 20070829134150 2854 example.com. MC0CFQCiyp/3hxwKS5QZPnjk36t16s4QTwIUI0m+MBVOAPacANrXXFKieyZd39o= ;{id = 2854}
209 ns.example.com. IN A 1.2.3.4
210 ns.example.com. 3600 IN RRSIG A 3 3 3600 20070926134150 20070829134150 2854 example.com. MC0CFQCQMyTjn7WWwpwAR1LlVeLpRgZGuQIUCcJDEkwAuzytTDRlYK7nIMwH1CM= ;{id = 2854}
211 ; This is from an unsigned subzone
212 ns2.sub.example.com. IN A 100.200.30.40
215 MATCH opcode qtype qname
219 sub.example.com. IN DS
222 sub.example.com. IN NSEC www.example.com. NS RRSIG NSEC
223 sub.example.com. 3600 IN RRSIG NSEC 3 3 3600 20070926134150 20070829134150 2854 example.com. MCwCFEG4WWIYBDknWlr2d8S42UZHRuByAhRgnDELUAccGZTCVzG+xl/locivpA== ;{id = 2854}
227 MATCH opcode qname qtype
231 ns2.sub.example.com. IN A
233 ns2.sub.example.com. IN A 100.200.30.40
237 MATCH opcode qname qtype
241 ns2.sub.example.com. IN AAAA
247 ; first ask for +CD and get the data in the cache.
252 www.example.com. IN A
258 REPLY QR RD RA CD NOERROR
260 www.example.com. IN A
262 www.example.com. IN A 10.20.30.40
264 example.com. IN NS ns.example.com.
265 example.com. IN NS ns2.sub.example.com.
267 ns.example.com. IN A 1.2.3.4
268 ; already validated and thus stripped from the answer.
269 ;ns2.sub.example.com. IN A 100.200.30.40
272 ; now the data is in the cache, validate a referral from cache
273 ; note, no recursion desired
278 bla.example.com. IN A
284 REPLY QR RA AD DO NOERROR
286 bla.example.com. IN A
289 example.com. 3600 IN NS ns.example.com.
290 example.com. 3600 IN NS ns2.sub.example.com.
291 example.com. 3600 IN RRSIG NS DSA 2 3600 20070926134150 20070829134150 2854 example.com. MC0CFQCiyp/3hxwKS5QZPnjk36t16s4QTwIUI0m+MBVOAPacANrXXFKieyZd39o= ;{id = 2854}
293 ns.example.com. IN A 1.2.3.4
294 ns.example.com. 3600 IN RRSIG A 3 3 3600 20070926134150 20070829134150 2854 example.com. MC0CFQCQMyTjn7WWwpwAR1LlVeLpRgZGuQIUCcJDEkwAuzytTDRlYK7nIMwH1CM= ;{id = 2854}