xref: /netbsd-src/external/bsd/unbound/dist/testdata/autotrust_revtp_use.rpl (revision 91f7d55fb697b5e0475da4718fa34c3a3ebeac85)
1; config options
2server:
3	target-fetch-policy: "0 0 0 0 0"
4	qname-minimisation: "no"
5	log-time-ascii: yes
6	val-override-date: '20091018111500'
7	fake-sha1: yes
8	trust-anchor-signaling: no
9stub-zone:
10	name: "."
11	stub-addr: 193.0.14.129         # K.ROOT-SERVERS.NET.
12AUTOTRUST_FILE example.com
13; autotrust trust anchor file
14;;id: example.com. 1
15;;last_queried: 1258962400 ;;Mon Nov 23 08:46:40 2009
16;;last_success: 1258962400 ;;Mon Nov 23 08:46:40 2009
17;;next_probe_time: 1258967360 ;;Mon Nov 23 10:09:20 2009
18;;query_failed: 0
19;;query_interval: 5400
20;;retry_time: 3600
21example.com.    10800   IN      DNSKEY  257 3 5 AwEAAas/cAhCFXvBUgTSNZCvQp0pLx1dY+7rXR0hH4/3EUgWmsmbYUpI1qD0xhwKD/oYGEwAm291fyWJ9c0oVxXDEK8= ;{id = 16486 (ksk), size = 512b} ;;state=2 [  VALID  ] ;;count=0 ;;lastchange=1258962400 ;;Mon Nov 23 08:46:40 2009
22example.com.	10800	IN	DNSKEY	257 3 5 AwEAAc3Z5DQDJpH4oPdNtC4BUQHk50XMD+dHr4r8psHmivIa83hxR5CRgCtd9sENCW9Ae8OIO19xw9t/RPaEAqQa+OE= ;{id = 55582 (ksk), size = 512b} ;;state=2 [  VALID  ] ;;count=0 ;;lastchange=1258962400 ;;Mon Nov 23 08:46:40 2009
23AUTOTRUST_END
24CONFIG_END
25
26SCENARIO_BEGIN Test autotrust with trust point revocation and instant use
27; so not a probe that discovers it but a user query.
28
29; K-ROOT
30RANGE_BEGIN 0 100
31	ADDRESS 193.0.14.129
32ENTRY_BEGIN
33MATCH opcode qname qtype
34ADJUST copy_id copy_query
35REPLY QR AA
36SECTION QUESTION
37. IN NS
38SECTION ANSWER
39. IN NS k.root-servers.net.
40SECTION ADDITIONAL
41k.root-servers.net IN A 193.0.14.129
42ENTRY_END
43
44ENTRY_BEGIN
45MATCH opcode subdomain
46ADJUST copy_id copy_query
47REPLY QR
48SECTION QUESTION
49com. IN NS
50SECTION AUTHORITY
51com. IN NS a.gtld-servers.net.
52SECTION ADDITIONAL
53a.gtld-servers.net. IN A 192.5.6.30
54ENTRY_END
55RANGE_END
56
57; a.gtld-servers.net.
58RANGE_BEGIN 0 100
59	ADDRESS 192.5.6.30
60ENTRY_BEGIN
61MATCH opcode subdomain
62ADJUST copy_id copy_query
63REPLY QR
64SECTION QUESTION
65example.com. IN NS
66SECTION AUTHORITY
67example.com. IN NS ns.example.com.
68SECTION ADDITIONAL
69ns.example.com. IN A 1.2.3.4
70ENTRY_END
71RANGE_END
72
73; ns.example.com.
74RANGE_BEGIN 0 100
75	ADDRESS 1.2.3.4
76ENTRY_BEGIN
77MATCH opcode qname qtype
78ADJUST copy_id
79REPLY QR AA
80SECTION QUESTION
81example.com. IN DNSKEY
82SECTION ANSWER
83
84; revoked keys
85
86example.com.    10800   IN      DNSKEY  385 3 5 AwEAAc3Z5DQDJpH4oPdNtC4BUQHk50XMD+dHr4r8psHmivIa83hxR5CRgCtd9sENCW9Ae8OIO19xw9t/RPaEAqQa+OE= ;{id = 55710 (ksk), size = 512b}
87example.com.	10800	IN	DNSKEY	385 3 5 AwEAAas/cAhCFXvBUgTSNZCvQp0pLx1dY+7rXR0hH4/3EUgWmsmbYUpI1qD0xhwKD/oYGEwAm291fyWJ9c0oVxXDEK8= ;{id = 16614 (ksk), size = 512b}
88; signatures
89example.com.	10800	IN	RRSIG	DNSKEY 5 2 10800 20091124111500 20091018111500 55710 example.com. zOSlB1iwtlP2lum1RK0WoDQrMVj0JKwk2E5Mu1okzV38hAx3Xm9IGMK6WrNkVVLmx4OkhYmdPVA95jVsFpwLMw== ;{id = 55710}
90example.com.	10800	IN	RRSIG	DNSKEY 5 2 10800 20091124111500 20091018111500 16614 example.com. qP49cCYP3lvNnLBYty/JxAwHqBIGjpup5zQ7qpjPnaZpBb/TlpOhY17LBZrqD86VvBbEVz5tkxC9UrCy85ePDQ== ;{id = 16614}
91
92ENTRY_END
93
94ENTRY_BEGIN
95MATCH opcode qname qtype
96ADJUST copy_id copy_query
97REPLY QR
98SECTION QUESTION
99www.example.com. IN A
100SECTION ANSWER
101www.example.com. IN A 10.20.30.40
102ENTRY_END
103
104ENTRY_BEGIN
105MATCH opcode qname qtype
106ADJUST copy_id copy_query
107REPLY QR
108SECTION QUESTION
109ns.example.com. IN AAAA
110SECTION ANSWER
111; no AAAA
112SECTION AUTHORITY
113example.com.    IN SOA ns.example.com. root.example.com. 4 14400 3600 604800 3600
114ENTRY_END
115RANGE_END
116
117STEP 20 QUERY
118ENTRY_BEGIN
119REPLY RD DO
120SECTION QUESTION
121www.example.com. IN A
122ENTRY_END
123
124; correct unsigned response works after trust point revocation.
125STEP 30 CHECK_ANSWER
126ENTRY_BEGIN
127MATCH all
128REPLY QR RD RA DO NOERROR
129SECTION QUESTION
130www.example.com. IN A
131SECTION ANSWER
132www.example.com. IN A   10.20.30.40
133ENTRY_END
134
135STEP 37 ASSIGN t0 = ${time}
136STEP 41 CHECK_AUTOTRUST example.com
137FILE_BEGIN
138; autotrust trust anchor file
139;;REVOKED
140; The zone has all keys revoked, and is
141; considered as if it has no trust anchors.
142; the remainder of the file is the last probe.
143; to restart the trust anchor, overwrite this file.
144; with one containing valid DNSKEYs or DSes.
145;;id: example.com. 1
146;;last_queried: ${$t0} ;;${ctime $t0}
147;;last_success: ${$t0} ;;${ctime $t0}
148;;next_probe_time: ${0} ;;${ctime 0}
149;;query_failed: 0
150;;query_interval: 5400
151;;retry_time: 3600
152example.com.	10800	IN	DNSKEY	385 3 5 AwEAAc3Z5DQDJpH4oPdNtC4BUQHk50XMD+dHr4r8psHmivIa83hxR5CRgCtd9sENCW9Ae8OIO19xw9t/RPaEAqQa+OE= ;{id = 55710 (ksk), size = 512b} ;;state=4 [ REVOKED ] ;;count=0 ;;lastchange=${$t0} ;;${ctime $t0}
153example.com.	10800	IN	DNSKEY	385 3 5 AwEAAas/cAhCFXvBUgTSNZCvQp0pLx1dY+7rXR0hH4/3EUgWmsmbYUpI1qD0xhwKD/oYGEwAm291fyWJ9c0oVxXDEK8= ;{id = 16614 (ksk), size = 512b} ;;state=4 [ REVOKED ] ;;count=0 ;;lastchange=${$t0} ;;${ctime $t0}
154FILE_END
155
156SCENARIO_END
157