2 ; The island of trust is at example.com
4 trust-anchor: "example.com. 3600 IN DS 2854 3 1 46e4ffc6e9a4793b488954bd3f0cc6af0dfb201b"
5 val-override-date: "20070916134226"
7 access-control: 127.0.0.1 allow_snoop
8 target-fetch-policy: "0 0 0 0 0"
9 qname-minimisation: "no"
11 trust-anchor-signaling: no
16 stub-addr: 193.0.14.129 # K.ROOT-SERVERS.NET.
19 SCENARIO_BEGIN Test validator with cache referral with unsigned glue
25 MATCH opcode qtype qname
31 . IN NS K.ROOT-SERVERS.NET.
33 K.ROOT-SERVERS.NET. IN A 193.0.14.129
37 MATCH opcode qtype qname
43 com. IN NS a.gtld-servers.net.
45 a.gtld-servers.net. IN A 192.5.6.30
53 MATCH opcode qtype qname
59 com. IN NS a.gtld-servers.net.
61 a.gtld-servers.net. IN A 192.5.6.30
65 MATCH opcode qtype qname
71 example.com. IN NS ns.example.com.
73 ns.example.com. IN A 1.2.3.4
81 MATCH opcode qtype qname
87 example.com. IN NS ns.example.com.
88 example.com. IN NS ns2.sub.example.com.
89 example.com. 3600 IN RRSIG NS DSA 2 3600 20070926134150 20070829134150 2854 example.com. MC0CFQCiyp/3hxwKS5QZPnjk36t16s4QTwIUI0m+MBVOAPacANrXXFKieyZd39o= ;{id = 2854}
91 ns.example.com. IN A 1.2.3.4
92 ns.example.com. 3600 IN RRSIG A 3 3 3600 20070926134150 20070829134150 2854 example.com. MC0CFQCQMyTjn7WWwpwAR1LlVeLpRgZGuQIUCcJDEkwAuzytTDRlYK7nIMwH1CM= ;{id = 2854}
93 ns2.sub.example.com. IN A 100.200.30.40
96 ; referral, for all types
102 ns2.sub.example.com. IN A
104 sub.example.com. IN NS ns2.sub.example.com.
105 sub.example.com. IN NSEC tlib.example.com. NS RRSIG NSEC
106 sub.example.com. 3600 IN RRSIG NSEC 3 3 3600 20070926134150 20070829134150 2854 example.com. ABdrfr+eKT1syk2qFlV01wLOqQdvNMpEtPmGAM6CrtyQAje/ddXSi9A= ;{id = 2854}
107 ns2.sub.example.com. IN A 100.200.30.40
110 ; response to DNSKEY priming query
112 MATCH opcode qtype qname
116 example.com. IN DNSKEY
118 example.com. 3600 IN DNSKEY 256 3 3 ALXLUsWqUrY3JYER3T4TBJII s70j+sDS/UT2QRp61SE7S3E EXopNXoFE73JLRmvpi/UrOO/Vz4Se 6wXv/CYCKjGw06U4WRgR YXcpEhJROyNapmdIKSx hOzfLVE1gqA0PweZR8d tY3aNQSRn3sPpwJr6Mi /PqQKAMMrZ9ckJpf1+b QMOOvxgzz2U1GS18b3y ZKcgTMEaJzd/GZYzi/B N2DzQ0MsrSwYXfsNLFO Bbs8PJMW4LYIxeeOe6rUgkWOF 7CC9Dh/dduQ1QrsJhmZAEFfd6ByYV+ ;{id = 2854 (zsk), size = 1688b}
119 example.com. 3600 IN RRSIG DNSKEY 3 2 3600 20070926134802 20070829134802 2854 example.com. MCwCFG1yhRNtTEa3Eno2zhVVuy2EJX3wAhQeLyUp6+UXcpC5qGNu9tkrTEgPUg== ;{id = 2854}
121 example.com. IN NS ns.example.com.
122 example.com. IN NS ns2.sub.example.com.
123 example.com. 3600 IN RRSIG NS DSA 2 3600 20070926134150 20070829134150 2854 example.com. MC0CFQCiyp/3hxwKS5QZPnjk36t16s4QTwIUI0m+MBVOAPacANrXXFKieyZd39o= ;{id = 2854}
125 ns.example.com. IN A 1.2.3.4
126 ns.example.com. 3600 IN RRSIG A 3 3 3600 20070926134150 20070829134150 2854 example.com. MC0CFQCQMyTjn7WWwpwAR1LlVeLpRgZGuQIUCcJDEkwAuzytTDRlYK7nIMwH1CM= ;{id = 2854}
127 ns2.sub.example.com. IN A 100.200.30.40
131 MATCH opcode qtype qname
135 www.example.com. IN A
137 www.example.com. IN A 10.20.30.40
138 www.example.com. 3600 IN RRSIG A 3 3 3600 20070926134150 20070829134150 2854 example.com. MC0CFC99iE9K5y2WNgI0gFvBWaTi9wm6AhUAoUqOpDtG5Zct+Qr9F3mSdnbc6V4= ;{id = 2854}
140 example.com. IN NS ns.example.com.
141 example.com. IN NS ns2.sub.example.com.
142 example.com. 3600 IN RRSIG NS DSA 2 3600 20070926134150 20070829134150 2854 example.com. MC0CFQCiyp/3hxwKS5QZPnjk36t16s4QTwIUI0m+MBVOAPacANrXXFKieyZd39o= ;{id = 2854}
144 ns.example.com. IN A 1.2.3.4
145 ns.example.com. 3600 IN RRSIG A 3 3 3600 20070926134150 20070829134150 2854 example.com. MC0CFQCQMyTjn7WWwpwAR1LlVeLpRgZGuQIUCcJDEkwAuzytTDRlYK7nIMwH1CM= ;{id = 2854}
146 ; This is from an unsigned subzone
147 ns2.sub.example.com. IN A 100.200.30.40
150 MATCH opcode qtype qname
154 sub.example.com. IN DS
157 sub.example.com. IN NSEC www.example.com. NS RRSIG NSEC
158 sub.example.com. 3600 IN RRSIG NSEC 3 3 3600 20070926134150 20070829134150 2854 example.com. MCwCFEG4WWIYBDknWlr2d8S42UZHRuByAhRgnDELUAccGZTCVzG+xl/locivpA== ;{id = 2854}
162 ; ns2.sub.example.com.
164 ADDRESS 100.200.30.40
166 MATCH opcode qtype qname
172 example.com. IN NS ns.example.com.
173 example.com. IN NS ns2.sub.example.com.
174 example.com. 3600 IN RRSIG NS DSA 2 3600 20070926134150 20070829134150 2854 example.com. MC0CFQCiyp/3hxwKS5QZPnjk36t16s4QTwIUI0m+MBVOAPacANrXXFKieyZd39o= ;{id = 2854}
176 ns.example.com. IN A 1.2.3.4
177 ns.example.com. 3600 IN RRSIG A 3 3 3600 20070926134150 20070829134150 2854 example.com. MC0CFQCQMyTjn7WWwpwAR1LlVeLpRgZGuQIUCcJDEkwAuzytTDRlYK7nIMwH1CM= ;{id = 2854}
180 ; response to DNSKEY priming query
182 MATCH opcode qtype qname
186 example.com. IN DNSKEY
188 example.com. 3600 IN DNSKEY 256 3 3 ALXLUsWqUrY3JYER3T4TBJII s70j+sDS/UT2QRp61SE7S3E EXopNXoFE73JLRmvpi/UrOO/Vz4Se 6wXv/CYCKjGw06U4WRgR YXcpEhJROyNapmdIKSx hOzfLVE1gqA0PweZR8d tY3aNQSRn3sPpwJr6Mi /PqQKAMMrZ9ckJpf1+b QMOOvxgzz2U1GS18b3y ZKcgTMEaJzd/GZYzi/B N2DzQ0MsrSwYXfsNLFO Bbs8PJMW4LYIxeeOe6rUgkWOF 7CC9Dh/dduQ1QrsJhmZAEFfd6ByYV+ ;{id = 2854 (zsk), size = 1688b}
189 example.com. 3600 IN RRSIG DNSKEY 3 2 3600 20070926134802 20070829134802 2854 example.com. MCwCFG1yhRNtTEa3Eno2zhVVuy2EJX3wAhQeLyUp6+UXcpC5qGNu9tkrTEgPUg== ;{id = 2854}
191 example.com. IN NS ns.example.com.
192 example.com. IN NS ns2.sub.example.com.
193 example.com. 3600 IN RRSIG NS DSA 2 3600 20070926134150 20070829134150 2854 example.com. MC0CFQCiyp/3hxwKS5QZPnjk36t16s4QTwIUI0m+MBVOAPacANrXXFKieyZd39o= ;{id = 2854}
195 ns.example.com. IN A 1.2.3.4
196 ns.example.com. 3600 IN RRSIG A 3 3 3600 20070926134150 20070829134150 2854 example.com. MC0CFQCQMyTjn7WWwpwAR1LlVeLpRgZGuQIUCcJDEkwAuzytTDRlYK7nIMwH1CM= ;{id = 2854}
200 MATCH opcode qtype qname
204 www.example.com. IN A
206 www.example.com. IN A 10.20.30.40
207 www.example.com. 3600 IN RRSIG A 3 3 3600 20070926134150 20070829134150 2854 example.com. MC0CFC99iE9K5y2WNgI0gFvBWaTi9wm6AhUAoUqOpDtG5Zct+Qr9F3mSdnbc6V4= ;{id = 2854}
209 example.com. IN NS ns.example.com.
210 example.com. IN NS ns2.sub.example.com.
211 example.com. 3600 IN RRSIG NS DSA 2 3600 20070926134150 20070829134150 2854 example.com. MC0CFQCiyp/3hxwKS5QZPnjk36t16s4QTwIUI0m+MBVOAPacANrXXFKieyZd39o= ;{id = 2854}
213 ns.example.com. IN A 1.2.3.4
214 ns.example.com. 3600 IN RRSIG A 3 3 3600 20070926134150 20070829134150 2854 example.com. MC0CFQCQMyTjn7WWwpwAR1LlVeLpRgZGuQIUCcJDEkwAuzytTDRlYK7nIMwH1CM= ;{id = 2854}
215 ; This is from an unsigned subzone
216 ns2.sub.example.com. IN A 100.200.30.40
219 MATCH opcode qtype qname
223 sub.example.com. IN DS
226 sub.example.com. IN NSEC www.example.com. NS RRSIG NSEC
227 sub.example.com. 3600 IN RRSIG NSEC 3 3 3600 20070926134150 20070829134150 2854 example.com. MCwCFEG4WWIYBDknWlr2d8S42UZHRuByAhRgnDELUAccGZTCVzG+xl/locivpA== ;{id = 2854}
231 MATCH opcode qname qtype
235 ns2.sub.example.com. IN A
237 ns2.sub.example.com. IN A 100.200.30.40
241 MATCH opcode qname qtype
245 ns2.sub.example.com. IN AAAA
251 ; first ask for +CD and get the data in the cache.
256 www.example.com. IN A
262 REPLY QR RD RA CD NOERROR
264 www.example.com. IN A
266 www.example.com. IN A 10.20.30.40
268 example.com. IN NS ns.example.com.
269 example.com. IN NS ns2.sub.example.com.
271 ns.example.com. IN A 1.2.3.4
272 ; already validated and thus stripped from the answer.
273 ;ns2.sub.example.com. IN A 100.200.30.40
276 ; now the data is in the cache, validate a referral from cache
277 ; note, no recursion desired
282 bla.example.com. IN A
288 REPLY QR RA AD DO NOERROR
290 bla.example.com. IN A
293 example.com. 3600 IN NS ns.example.com.
294 example.com. 3600 IN NS ns2.sub.example.com.
295 example.com. 3600 IN RRSIG NS DSA 2 3600 20070926134150 20070829134150 2854 example.com. MC0CFQCiyp/3hxwKS5QZPnjk36t16s4QTwIUI0m+MBVOAPacANrXXFKieyZd39o= ;{id = 2854}
297 ns.example.com. IN A 1.2.3.4
298 ns.example.com. 3600 IN RRSIG A 3 3 3600 20070926134150 20070829134150 2854 example.com. MC0CFQCQMyTjn7WWwpwAR1LlVeLpRgZGuQIUCcJDEkwAuzytTDRlYK7nIMwH1CM= ;{id = 2854}