xref: /netbsd-src/external/bsd/unbound/dist/testdata/autotrust_init_failsig.rpl (revision 15a984a0d95c8f96abe9717ee6241762c55dc106)
1; config options
2server:
3	target-fetch-policy: "0 0 0 0 0"
4	qname-minimisation: "no"
5	log-time-ascii: yes
6	fake-sha1: yes
7	trust-anchor-signaling: no
8	ede: yes
9
10stub-zone:
11	name: "."
12	stub-addr: 193.0.14.129         # K.ROOT-SERVERS.NET.
13; initial content (say from dig example.com DNSKEY > example.com.key)
14AUTOTRUST_FILE example.com
15example.com.	10800	IN	DNSKEY	257 3 5 AwEAAc3Z5DQDJpH4oPdNtC4BUQHk50XMD+dHr4r8psHmivIa83hxR5CRgCtd9sENCW9Ae8OIO19xw9t/RPaEAqQa+OE= ;{id = 55582 (ksk), size = 512b}
16example.com.	10800	IN	DNSKEY	256 3 5 AQPQ41chR9DEHt/aIzIFAqanbDlRflJoRs5yz1jFsoRIT7dWf0r+PeDuewdxkszNH6wnU4QL8pfKFRh5PIYVBLK3 ;{id = 30899 (zsk), size = 512b}
17AUTOTRUST_END
18CONFIG_END
19
20SCENARIO_BEGIN Test autotrust with failed signature initial trust anchor
21
22; K-ROOT
23RANGE_BEGIN 0 100
24	ADDRESS 193.0.14.129
25ENTRY_BEGIN
26MATCH opcode qname qtype
27ADJUST copy_id copy_query
28REPLY QR AA
29SECTION QUESTION
30. IN NS
31SECTION ANSWER
32. IN NS k.root-servers.net.
33SECTION ADDITIONAL
34k.root-servers.net IN A 193.0.14.129
35ENTRY_END
36
37ENTRY_BEGIN
38MATCH opcode subdomain
39ADJUST copy_id copy_query
40REPLY QR
41SECTION QUESTION
42com. IN NS
43SECTION AUTHORITY
44com. IN NS a.gtld-servers.net.
45SECTION ADDITIONAL
46a.gtld-servers.net. IN A 192.5.6.30
47ENTRY_END
48RANGE_END
49
50; a.gtld-servers.net.
51RANGE_BEGIN 0 100
52	ADDRESS 192.5.6.30
53ENTRY_BEGIN
54MATCH opcode subdomain
55ADJUST copy_id copy_query
56REPLY QR
57SECTION QUESTION
58example.com. IN NS
59SECTION AUTHORITY
60example.com. IN NS ns.example.com.
61SECTION ADDITIONAL
62ns.example.com. IN A 1.2.3.4
63ENTRY_END
64RANGE_END
65
66; ns.example.com.
67RANGE_BEGIN 0 100
68	ADDRESS 1.2.3.4
69ENTRY_BEGIN
70MATCH opcode qname qtype
71ADJUST copy_id
72REPLY QR AA
73SECTION QUESTION
74ns.example.com. IN AAAA
75SECTION ANSWER
76ns.example.com. IN NSEC nugget.example.com. A NSEC RRSIG
77ns.example.com.	3600	IN	RRSIG	NSEC 5 3 3600 20090924111500 20090821111500 30899 example.com. WRUQ5d5aBO5AXbvnfCd0AWfKGvQIuAjT2qydGkUIaLZaiP4nj+JdquEy1nGvBwYQ9gWyP7b6C6UGrUnVcNBpcw== ;{id = 30899}
78SECTION AUTHORITY
79example.com.	3600	IN	NS	ns.example.com.
80example.com.	3600	IN	RRSIG	NS 5 2 3600 20090924111500 20090821111500 30899 example.com. J5wxRq0jgwQL6yy530kvo9cHqNAUHV8IF4dvaYZL0bNraO2Oe6dVXqlJl4+cxNHI2TMsstwFPr2Zz8tv6Az2mQ== ;{id = 30899}
81SECTION ADDITIONAL
82ENTRY_END
83
84ENTRY_BEGIN
85MATCH opcode qname qtype
86ADJUST copy_id
87REPLY QR AA
88SECTION QUESTION
89www.example.com. IN A
90SECTION ANSWER
91www.example.com.	3600	IN	A	10.20.30.40
92www.example.com.	3600	IN	RRSIG	A 5 3 3600 20090924111500 20090821111500 30899 example.com. pYGxVLsWUvOp1wSf0iwPap+JnECfC5GAm1lRqy3YEqecNGld7U7x/5Imo3CerbdZrVptUQs2oH0lcjwYJXMnsw== ;{id = 30899}
93SECTION AUTHORITY
94example.com.	3600	IN	NS	ns.example.com.
95example.com.	3600	IN	RRSIG	NS 5 2 3600 20090924111500 20090821111500 30899 example.com. J5wxRq0jgwQL6yy530kvo9cHqNAUHV8IF4dvaYZL0bNraO2Oe6dVXqlJl4+cxNHI2TMsstwFPr2Zz8tv6Az2mQ== ;{id = 30899}
96SECTION ADDITIONAL
97ns.example.com.	3600	IN	A	1.2.3.4
98ns.example.com.	3600	IN	RRSIG	A 5 3 3600 20090924111500 20090821111500 30899 example.com. JsXbS18oyc0zkVaOWGSFdIQuOsZKflT0GraT9afDPoWLCgH4ApF7jNgfJV7Pqy1sTBRajME5IUAhpANwGBuW4A== ;{id = 30899}
99ENTRY_END
100
101ENTRY_BEGIN
102MATCH opcode qname qtype
103ADJUST copy_id
104REPLY QR AA
105SECTION QUESTION
106example.com. IN DNSKEY
107SECTION ANSWER
108; KSK 1
109example.com.	10800	IN	DNSKEY	257 3 5 AwEAAc3Z5DQDJpH4oPdNtC4BUQHk50XMD+dHr4r8psHmivIa83hxR5CRgCtd9sENCW9Ae8OIO19xw9t/RPaEAqQa+OE= ;{id = 55582 (ksk), size = 512b}
110; ZSK 1
111example.com.	10800	IN	DNSKEY	256 3 5 AQPQ41chR9DEHt/aIzIFAqanbDlRflJoRs5yz1jFsoRIT7dWf0r+PeDuewdxkszNH6wnU4QL8pfKFRh5PIYVBLK3 ;{id = 30899 (ksk), size = 512b}
112; signatures
113; changed the date in signatures from 20090924111500 20090821111500
114; to make them fail.
115example.com.	10800	IN	RRSIG	DNSKEY 5 2 10800 20090101010000 20090101010000 30899 example.com. b/HK231jIQLX8IhlZfup3r0yhpXaasbPE6LzxoEVVvWaTZWcLmeV8jDIcn0qO7Yvs7bIJN20lwVAV0GcHH3hWQ== ;{id = 30899}
116example.com.	10800	IN	RRSIG	DNSKEY 5 2 10800 20090101010000 20090101010000 55582 example.com. PCHme1QLoULxqjhg5tMlpR0qJlBfstEUVq18TtNoKQe9le1YhJ9caheXcTWoK+boLhXxg9u6Yyvq8FboQh0OjA== ;{id = 55582}
117
118ENTRY_END
119RANGE_END
120
121; set date/time to Aug 24 07:46:40  (2009).
122STEP 5 TIME_PASSES ELAPSE 1251100000
123STEP 6 ASSIGN t0 = ${time}
124STEP 7 ASSIGN probe = ${range 3200 ${timeout} 3600}
125
126; the auto probing should have been done now.
127STEP 8 CHECK_AUTOTRUST example.com
128FILE_BEGIN
129example.com.	10800	IN	DNSKEY	257 3 5 AwEAAc3Z5DQDJpH4oPdNtC4BUQHk50XMD+dHr4r8psHmivIa83hxR5CRgCtd9sENCW9Ae8OIO19xw9t/RPaEAqQa+OE= ;{id = 55582 (ksk), size = 512b}
130example.com.	10800	IN	DNSKEY	256 3 5 AQPQ41chR9DEHt/aIzIFAqanbDlRflJoRs5yz1jFsoRIT7dWf0r+PeDuewdxkszNH6wnU4QL8pfKFRh5PIYVBLK3 ;{id = 30899 (zsk), size = 512b}
131FILE_END
132
133
134STEP 10 QUERY
135ENTRY_BEGIN
136REPLY RD DO
137SECTION QUESTION
138www.example.com. IN A
139ENTRY_END
140
141STEP 20 CHECK_ANSWER
142ENTRY_BEGIN
143MATCH all ede=6
144REPLY QR RD RA DO SERVFAIL
145SECTION QUESTION
146www.example.com. IN A
147SECTION ANSWER
148ENTRY_END
149
150; The autotrust anchor was probed due to the query.
151
152STEP 30 CHECK_AUTOTRUST example.com
153FILE_BEGIN
154example.com.	10800	IN	DNSKEY	257 3 5 AwEAAc3Z5DQDJpH4oPdNtC4BUQHk50XMD+dHr4r8psHmivIa83hxR5CRgCtd9sENCW9Ae8OIO19xw9t/RPaEAqQa+OE= ;{id = 55582 (ksk), size = 512b}
155example.com.	10800	IN	DNSKEY	256 3 5 AQPQ41chR9DEHt/aIzIFAqanbDlRflJoRs5yz1jFsoRIT7dWf0r+PeDuewdxkszNH6wnU4QL8pfKFRh5PIYVBLK3 ;{id = 30899 (zsk), size = 512b}
156FILE_END
157
158; wait and see if autotrust probes (the unchanged) domain again.
159STEP 40 TIME_PASSES EVAL ${$probe}
160
161STEP 50 TRAFFIC
162
163STEP 65 ASSIGN probe2 = ${range 3200 ${timeout} 3600}
164
165STEP 70 CHECK_AUTOTRUST example.com
166FILE_BEGIN
167example.com.	10800	IN	DNSKEY	257 3 5 AwEAAc3Z5DQDJpH4oPdNtC4BUQHk50XMD+dHr4r8psHmivIa83hxR5CRgCtd9sENCW9Ae8OIO19xw9t/RPaEAqQa+OE= ;{id = 55582 (ksk), size = 512b}
168example.com.	10800	IN	DNSKEY	256 3 5 AQPQ41chR9DEHt/aIzIFAqanbDlRflJoRs5yz1jFsoRIT7dWf0r+PeDuewdxkszNH6wnU4QL8pfKFRh5PIYVBLK3 ;{id = 30899 (zsk), size = 512b}
169FILE_END
170
171SCENARIO_END
172