1; config options 2server: 3 target-fetch-policy: "0 0 0 0 0" 4 log-time-ascii: yes 5 fake-sha1: yes 6 trust-anchor-signaling: no 7stub-zone: 8 name: "." 9 stub-addr: 193.0.14.129 # K.ROOT-SERVERS.NET. 10; initial content (say from dig example.com DNSKEY > example.com.key) 11AUTOTRUST_FILE example.com 12example.com. 10800 IN DNSKEY 257 3 5 AwEAAc3Z5DQDJpH4oPdNtC4BUQHk50XMD+dHr4r8psHmivIa83hxR5CRgCtd9sENCW9Ae8OIO19xw9t/RPaEAqQa+OE= ;{id = 55582 (ksk), size = 512b} 13example.com. 10800 IN DNSKEY 256 3 5 AQPQ41chR9DEHt/aIzIFAqanbDlRflJoRs5yz1jFsoRIT7dWf0r+PeDuewdxkszNH6wnU4QL8pfKFRh5PIYVBLK3 ;{id = 30899 (zsk), size = 512b} 14AUTOTRUST_END 15CONFIG_END 16 17SCENARIO_BEGIN Test autotrust with algorithm rollover 18; from RSASHA1(5) to DSASHA1(3) 19; Note, when both algorithms are present, the zone must be double-signed. 20; with a ZSK for RSASHA1(5) and a ZSK for DSASHA1(3). 21 22; K-ROOT 23RANGE_BEGIN 0 100 24 ADDRESS 193.0.14.129 25ENTRY_BEGIN 26MATCH opcode qname qtype 27ADJUST copy_id copy_query 28REPLY QR AA 29SECTION QUESTION 30. IN NS 31SECTION ANSWER 32. IN NS k.root-servers.net. 33SECTION ADDITIONAL 34k.root-servers.net IN A 193.0.14.129 35ENTRY_END 36 37ENTRY_BEGIN 38MATCH opcode subdomain 39ADJUST copy_id copy_query 40REPLY QR 41SECTION QUESTION 42com. IN NS 43SECTION AUTHORITY 44com. IN NS a.gtld-servers.net. 45SECTION ADDITIONAL 46a.gtld-servers.net. IN A 192.5.6.30 47ENTRY_END 48RANGE_END 49 50; a.gtld-servers.net. 51RANGE_BEGIN 0 100 52 ADDRESS 192.5.6.30 53ENTRY_BEGIN 54MATCH opcode subdomain 55ADJUST copy_id copy_query 56REPLY QR 57SECTION QUESTION 58example.com. IN NS 59SECTION AUTHORITY 60example.com. IN NS ns.example.com. 61SECTION ADDITIONAL 62ns.example.com. IN A 1.2.3.4 63ENTRY_END 64RANGE_END 65 66; ns.example.com. KSK 55582 67RANGE_BEGIN 0 10 68 ADDRESS 1.2.3.4 69ENTRY_BEGIN 70MATCH opcode qname qtype 71ADJUST copy_id 72REPLY QR AA 73SECTION QUESTION 74www.example.com. IN A 75SECTION ANSWER 76www.example.com. 3600 IN A 10.20.30.40 77www.example.com. 3600 IN RRSIG A 5 3 3600 20090924111500 20090821111500 30899 example.com. pYGxVLsWUvOp1wSf0iwPap+JnECfC5GAm1lRqy3YEqecNGld7U7x/5Imo3CerbdZrVptUQs2oH0lcjwYJXMnsw== ;{id = 30899} 78SECTION AUTHORITY 79example.com. 3600 IN NS ns.example.com. 80example.com. 3600 IN RRSIG NS 5 2 3600 20090924111500 20090821111500 30899 example.com. J5wxRq0jgwQL6yy530kvo9cHqNAUHV8IF4dvaYZL0bNraO2Oe6dVXqlJl4+cxNHI2TMsstwFPr2Zz8tv6Az2mQ== ;{id = 30899} 81SECTION ADDITIONAL 82ns.example.com. 3600 IN A 1.2.3.4 83ns.example.com. 3600 IN RRSIG A 5 3 3600 20090924111500 20090821111500 30899 example.com. JsXbS18oyc0zkVaOWGSFdIQuOsZKflT0GraT9afDPoWLCgH4ApF7jNgfJV7Pqy1sTBRajME5IUAhpANwGBuW4A== ;{id = 30899} 84ENTRY_END 85 86ENTRY_BEGIN 87MATCH opcode qname qtype 88ADJUST copy_id 89REPLY QR AA 90SECTION QUESTION 91example.com. IN DNSKEY 92SECTION ANSWER 93; KSK 1 94example.com. 10800 IN DNSKEY 257 3 5 AwEAAc3Z5DQDJpH4oPdNtC4BUQHk50XMD+dHr4r8psHmivIa83hxR5CRgCtd9sENCW9Ae8OIO19xw9t/RPaEAqQa+OE= ;{id = 55582 (ksk), size = 512b} 95; ZSK 1 96example.com. 10800 IN DNSKEY 256 3 5 AQPQ41chR9DEHt/aIzIFAqanbDlRflJoRs5yz1jFsoRIT7dWf0r+PeDuewdxkszNH6wnU4QL8pfKFRh5PIYVBLK3 ;{id = 30899 (zsk), size = 512b} 97; signatures 98example.com. 10800 IN RRSIG DNSKEY 5 2 10800 20090924111500 20090821111500 30899 example.com. b/HK231jIQLX8IhlZfup3r0yhpXaasbPE6LzxoEVVvWaTZWcLmeV8jDIcn0qO7Yvs7bIJN20lwVAV0GcHH3hWQ== ;{id = 30899} 99example.com. 10800 IN RRSIG DNSKEY 5 2 10800 20090924111500 20090821111500 55582 example.com. PCHme1QLoULxqjhg5tMlpR0qJlBfstEUVq18TtNoKQe9le1YhJ9caheXcTWoK+boLhXxg9u6Yyvq8FboQh0OjA== ;{id = 55582} 100ENTRY_END 101RANGE_END 102 103; ns.example.com. KSK 55582 and DSAkey 02855 104RANGE_BEGIN 11 40 105 ADDRESS 1.2.3.4 106ENTRY_BEGIN 107MATCH opcode qname qtype 108ADJUST copy_id 109REPLY QR AA 110SECTION QUESTION 111example.com. IN DNSKEY 112SECTION ANSWER 113; KSK 1 114example.com. 10800 IN DNSKEY 257 3 5 AwEAAc3Z5DQDJpH4oPdNtC4BUQHk50XMD+dHr4r8psHmivIa83hxR5CRgCtd9sENCW9Ae8OIO19xw9t/RPaEAqQa+OE= ;{id = 55582 (ksk), size = 512b} 115; KSK 2 116example.com. 10800 IN DNSKEY 257 3 3 ALXLUsWqUrY3JYER3T4TBJIIs70j+sDS/UT2QRp61SE7S3EEXopNXoFE73JLRmvpi/UrOO/Vz4Se6wXv/CYCKjGw06U4WRgRYXcpEhJROyNapmdIKSxhOzfLVE1gqA0PweZR8dtY3aNQSRn3sPpwJr6Mi/PqQKAMMrZ9ckJpf1+bQMOOvxgzz2U1GS18b3yZKcgTMEaJzd/GZYzi/BN2DzQ0MsrSwYXfsNLFOBbs8PJMW4LYIxeeOe6rUgkWOF7CC9Dh/dduQ1QrsJhmZAEFfd6ByYV+ ;{id = 2855 (ksk), size = 1688b} 117; and two ZSKs (omitted) for both algorithms. 118; signatures 119example.com. 10800 IN RRSIG DNSKEY 5 2 10800 20091024111500 20090921111500 55582 example.com. aCZVA+PLXxm15p46499FCPHvhR/MSpMSRTZT6PoUy2e+wdk7bszLdsEmfWym81UN2Xx1JOj5104c43c3QnvjNQ== ;{id = 55582} 120example.com. 10800 IN RRSIG DNSKEY 3 2 10800 20091024111500 20090921111500 2855 example.com. AKdhmjqEbe0STsFNq/UxOidElaWHWCy2hSPQ7oN0Tsq56w6Hsk72PpM= ;{id = 2855} 121ENTRY_END 122RANGE_END 123 124; ns.example.com. KSK 55582 and 02855 (signatures updated) 125RANGE_BEGIN 41 50 126 ADDRESS 1.2.3.4 127ENTRY_BEGIN 128MATCH opcode qname qtype 129ADJUST copy_id 130REPLY QR AA 131SECTION QUESTION 132example.com. IN DNSKEY 133SECTION ANSWER 134; KSK 1 135example.com. 10800 IN DNSKEY 257 3 5 AwEAAc3Z5DQDJpH4oPdNtC4BUQHk50XMD+dHr4r8psHmivIa83hxR5CRgCtd9sENCW9Ae8OIO19xw9t/RPaEAqQa+OE= ;{id = 55582 (ksk), size = 512b} 136; KSK 2 137example.com. 10800 IN DNSKEY 257 3 3 ALXLUsWqUrY3JYER3T4TBJIIs70j+sDS/UT2QRp61SE7S3EEXopNXoFE73JLRmvpi/UrOO/Vz4Se6wXv/CYCKjGw06U4WRgRYXcpEhJROyNapmdIKSxhOzfLVE1gqA0PweZR8dtY3aNQSRn3sPpwJr6Mi/PqQKAMMrZ9ckJpf1+bQMOOvxgzz2U1GS18b3yZKcgTMEaJzd/GZYzi/BN2DzQ0MsrSwYXfsNLFOBbs8PJMW4LYIxeeOe6rUgkWOF7CC9Dh/dduQ1QrsJhmZAEFfd6ByYV+ ;{id = 2855 (ksk), size = 1688b} 138; signatures 139example.com. 10800 IN RRSIG DNSKEY 5 2 10800 20091124111500 20091018111500 55582 example.com. vpLMiMW+2uxqE1+OpMWipQdyGJ/pOQ63tIhup50WFejPysvlZRZ27XOoB4GVRyCwK9Bv46PrsQf3IsjHZf6jvw== ;{id = 55582} 140example.com. 10800 IN RRSIG DNSKEY 3 2 10800 20091124111500 20091018111500 2855 example.com. ABJyZ97htJyBFk5wsKml3YAz81FpXkQKdJeC++fB5ysvl3i+zKJFzTo= ;{id = 2855} 141ENTRY_END 142RANGE_END 143 144; ns.example.com. KSK 55582-REVOKED and 02855 145RANGE_BEGIN 51 60 146 ADDRESS 1.2.3.4 147ENTRY_BEGIN 148MATCH opcode qname qtype 149ADJUST copy_id 150REPLY QR AA 151SECTION QUESTION 152example.com. IN DNSKEY 153SECTION ANSWER 154; KSK 1 155example.com. 10800 IN DNSKEY 385 3 5 AwEAAc3Z5DQDJpH4oPdNtC4BUQHk50XMD+dHr4r8psHmivIa83hxR5CRgCtd9sENCW9Ae8OIO19xw9t/RPaEAqQa+OE= ;{id = 55710 (ksk), size = 512b} 156; KSK 2 157example.com. 10800 IN DNSKEY 257 3 3 ALXLUsWqUrY3JYER3T4TBJIIs70j+sDS/UT2QRp61SE7S3EEXopNXoFE73JLRmvpi/UrOO/Vz4Se6wXv/CYCKjGw06U4WRgRYXcpEhJROyNapmdIKSxhOzfLVE1gqA0PweZR8dtY3aNQSRn3sPpwJr6Mi/PqQKAMMrZ9ckJpf1+bQMOOvxgzz2U1GS18b3yZKcgTMEaJzd/GZYzi/BN2DzQ0MsrSwYXfsNLFOBbs8PJMW4LYIxeeOe6rUgkWOF7CC9Dh/dduQ1QrsJhmZAEFfd6ByYV+ ;{id = 2855 (ksk), size = 1688b} 158; signatures 159example.com. 10800 IN RRSIG DNSKEY 3 2 10800 20091224111500 20091118111500 2855 example.com. AFAbqLJsTDBfwAipE84ETdFTfzKHs7pzdyzjTKHR2VXygGvHY4QsBaA= ;{id = 2855} 160example.com. 10800 IN RRSIG DNSKEY 5 2 10800 20091224111500 20091118111500 55710 example.com. DqR6BRE9G+kEb+ZorUr3yKKUsCF2TN+vrsNBaLfpHR+Vgv0RgeRCkXki+/FY9b4NEhXkg719dlLSASg4DmyV7g== ;{id = 55710} 161; wrong keytag: 55582 162ENTRY_END 163RANGE_END 164 165; ns.example.com. KSK 02855 166RANGE_BEGIN 61 70 167 ADDRESS 1.2.3.4 168ENTRY_BEGIN 169MATCH opcode qname qtype 170ADJUST copy_id 171REPLY QR AA 172SECTION QUESTION 173example.com. IN DNSKEY 174SECTION ANSWER 175; KSK 2 176example.com. 10800 IN DNSKEY 257 3 3 ALXLUsWqUrY3JYER3T4TBJIIs70j+sDS/UT2QRp61SE7S3EEXopNXoFE73JLRmvpi/UrOO/Vz4Se6wXv/CYCKjGw06U4WRgRYXcpEhJROyNapmdIKSxhOzfLVE1gqA0PweZR8dtY3aNQSRn3sPpwJr6Mi/PqQKAMMrZ9ckJpf1+bQMOOvxgzz2U1GS18b3yZKcgTMEaJzd/GZYzi/BN2DzQ0MsrSwYXfsNLFOBbs8PJMW4LYIxeeOe6rUgkWOF7CC9Dh/dduQ1QrsJhmZAEFfd6ByYV+ ;{id = 2855 (ksk), size = 1688b} 177; signatures 178example.com. 10800 IN RRSIG DNSKEY 3 2 10800 20101224111500 20101118111500 2855 example.com. AJv9ujre3iUykHlhJpLYPqsXq12lmQp+AHUPSPpE5zuUhXAPjbnbewk= ;{id = 2855} 179ENTRY_END 180RANGE_END 181 182; set date/time to Aug 24 07:46:40 (2009). 183STEP 5 TIME_PASSES ELAPSE 1251100000 184STEP 6 TRAFFIC ; the initial probe 185STEP 7 ASSIGN t0 = ${time} 186STEP 8 ASSIGN probe0 = ${range 4800 ${timeout} 5400} 187 188; the auto probing should have been done now. 189STEP 10 CHECK_AUTOTRUST example.com 190FILE_BEGIN 191; autotrust trust anchor file 192;;id: example.com. 1 193;;last_queried: ${$t0} ;;${ctime $t0} 194;;last_success: ${$t0} ;;${ctime $t0} 195;;next_probe_time: ${$t0 + $probe0} ;;${ctime $t0 + $probe0} 196;;query_failed: 0 197;;query_interval: 5400 198;;retry_time: 3600 199example.com. 10800 IN DNSKEY 257 3 5 AwEAAc3Z5DQDJpH4oPdNtC4BUQHk50XMD+dHr4r8psHmivIa83hxR5CRgCtd9sENCW9Ae8OIO19xw9t/RPaEAqQa+OE= ;{id = 55582 (ksk), size = 512b} ;;state=2 [ VALID ] ;;count=0 ;;lastchange=${$t0} ;;${ctime $t0} 200FILE_END 201 202; key prepublished. First poll. 30 days later 203STEP 11 TIME_PASSES EVAL ${30*24*3600} 204STEP 12 TRAFFIC 205STEP 13 ASSIGN t1 = ${time} 206STEP 14 ASSIGN probe1 = ${range 4800 ${timeout} 5400} 207STEP 15 CHECK_AUTOTRUST example.com 208FILE_BEGIN 209; autotrust trust anchor file 210;;id: example.com. 1 211;;last_queried: ${$t1} ;;${ctime $t1} 212;;last_success: ${$t1} ;;${ctime $t1} 213;;next_probe_time: ${$t1 + $probe1} ;;${ctime $t1 + $probe1} 214;;query_failed: 0 215;;query_interval: 5400 216;;retry_time: 3600 217example.com. 10800 IN DNSKEY 257 3 3 ALXLUsWqUrY3JYER3T4TBJIIs70j+sDS/UT2QRp61SE7S3EEXopNXoFE73JLRmvpi/UrOO/Vz4Se6wXv/CYCKjGw06U4WRgRYXcpEhJROyNapmdIKSxhOzfLVE1gqA0PweZR8dtY3aNQSRn3sPpwJr6Mi/PqQKAMMrZ9ckJpf1+bQMOOvxgzz2U1GS18b3yZKcgTMEaJzd/GZYzi/BN2DzQ0MsrSwYXfsNLFOBbs8PJMW4LYIxeeOe6rUgkWOF7CC9Dh/dduQ1QrsJhmZAEFfd6ByYV+ ;{id = 2855 (ksk), size = 512b} ;;state=1 [ ADDPEND ] ;;count=1 ;;lastchange=${$t1} ;;${ctime $t1} 218example.com. 10800 IN DNSKEY 257 3 5 AwEAAc3Z5DQDJpH4oPdNtC4BUQHk50XMD+dHr4r8psHmivIa83hxR5CRgCtd9sENCW9Ae8OIO19xw9t/RPaEAqQa+OE= ;{id = 55582 (ksk), size = 512b} ;;state=2 [ VALID ] ;;count=0 ;;lastchange=${$t0} ;;${ctime $t0} 219FILE_END 220 221; Second poll. 10 days later 222STEP 21 TIME_PASSES EVAL ${10*24*3600} 223STEP 22 TRAFFIC 224STEP 23 ASSIGN t2 = ${time} 225STEP 24 ASSIGN probe2 = ${range 4800 ${timeout} 5400} 226STEP 25 CHECK_AUTOTRUST example.com 227FILE_BEGIN 228; autotrust trust anchor file 229;;id: example.com. 1 230;;last_queried: ${$t2} ;;${ctime $t2} 231;;last_success: ${$t2} ;;${ctime $t2} 232;;next_probe_time: ${$t2 + $probe2} ;;${ctime $t2 + $probe2} 233;;query_failed: 0 234;;query_interval: 5400 235;;retry_time: 3600 236example.com. 10800 IN DNSKEY 257 3 3 ALXLUsWqUrY3JYER3T4TBJIIs70j+sDS/UT2QRp61SE7S3EEXopNXoFE73JLRmvpi/UrOO/Vz4Se6wXv/CYCKjGw06U4WRgRYXcpEhJROyNapmdIKSxhOzfLVE1gqA0PweZR8dtY3aNQSRn3sPpwJr6Mi/PqQKAMMrZ9ckJpf1+bQMOOvxgzz2U1GS18b3yZKcgTMEaJzd/GZYzi/BN2DzQ0MsrSwYXfsNLFOBbs8PJMW4LYIxeeOe6rUgkWOF7CC9Dh/dduQ1QrsJhmZAEFfd6ByYV+ ;{id = 2855 (ksk), size = 512b} ;;state=1 [ ADDPEND ] ;;count=2 ;;lastchange=${$t1} ;;${ctime $t1} 237example.com. 10800 IN DNSKEY 257 3 5 AwEAAc3Z5DQDJpH4oPdNtC4BUQHk50XMD+dHr4r8psHmivIa83hxR5CRgCtd9sENCW9Ae8OIO19xw9t/RPaEAqQa+OE= ;{id = 55582 (ksk), size = 512b} ;;state=2 [ VALID ] ;;count=0 ;;lastchange=${$t0} ;;${ctime $t0} 238FILE_END 239 240; Third poll. 10 days later 241STEP 31 TIME_PASSES EVAL ${10*24*3600} 242STEP 32 TRAFFIC 243STEP 33 ASSIGN t3 = ${time} 244STEP 34 ASSIGN probe3 = ${range 4800 ${timeout} 5400} 245STEP 35 CHECK_AUTOTRUST example.com 246FILE_BEGIN 247; autotrust trust anchor file 248;;id: example.com. 1 249;;last_queried: ${$t3} ;;${ctime $t3} 250;;last_success: ${$t3} ;;${ctime $t3} 251;;next_probe_time: ${$t3 + $probe3} ;;${ctime $t3 + $probe3} 252;;query_failed: 0 253;;query_interval: 5400 254;;retry_time: 3600 255example.com. 10800 IN DNSKEY 257 3 3 ALXLUsWqUrY3JYER3T4TBJIIs70j+sDS/UT2QRp61SE7S3EEXopNXoFE73JLRmvpi/UrOO/Vz4Se6wXv/CYCKjGw06U4WRgRYXcpEhJROyNapmdIKSxhOzfLVE1gqA0PweZR8dtY3aNQSRn3sPpwJr6Mi/PqQKAMMrZ9ckJpf1+bQMOOvxgzz2U1GS18b3yZKcgTMEaJzd/GZYzi/BN2DzQ0MsrSwYXfsNLFOBbs8PJMW4LYIxeeOe6rUgkWOF7CC9Dh/dduQ1QrsJhmZAEFfd6ByYV+ ;{id = 2855 (ksk), size = 512b} ;;state=1 [ ADDPEND ] ;;count=3 ;;lastchange=${$t1} ;;${ctime $t1} 256example.com. 10800 IN DNSKEY 257 3 5 AwEAAc3Z5DQDJpH4oPdNtC4BUQHk50XMD+dHr4r8psHmivIa83hxR5CRgCtd9sENCW9Ae8OIO19xw9t/RPaEAqQa+OE= ;{id = 55582 (ksk), size = 512b} ;;state=2 [ VALID ] ;;count=0 ;;lastchange=${$t0} ;;${ctime $t0} 257FILE_END 258 259; 11 days later, hold down has lapsed. 260STEP 41 TIME_PASSES EVAL ${11*24*3600} 261STEP 42 TRAFFIC 262STEP 43 ASSIGN t4 = ${time} 263STEP 44 ASSIGN probe4 = ${range 4800 ${timeout} 5400} 264STEP 45 CHECK_AUTOTRUST example.com 265FILE_BEGIN 266; autotrust trust anchor file 267;;id: example.com. 1 268;;last_queried: ${$t4} ;;${ctime $t4} 269;;last_success: ${$t4} ;;${ctime $t4} 270;;next_probe_time: ${$t4 + $probe4} ;;${ctime $t4 + $probe4} 271;;query_failed: 0 272;;query_interval: 5400 273;;retry_time: 3600 274example.com. 10800 IN DNSKEY 257 3 3 ALXLUsWqUrY3JYER3T4TBJIIs70j+sDS/UT2QRp61SE7S3EEXopNXoFE73JLRmvpi/UrOO/Vz4Se6wXv/CYCKjGw06U4WRgRYXcpEhJROyNapmdIKSxhOzfLVE1gqA0PweZR8dtY3aNQSRn3sPpwJr6Mi/PqQKAMMrZ9ckJpf1+bQMOOvxgzz2U1GS18b3yZKcgTMEaJzd/GZYzi/BN2DzQ0MsrSwYXfsNLFOBbs8PJMW4LYIxeeOe6rUgkWOF7CC9Dh/dduQ1QrsJhmZAEFfd6ByYV+ ;{id = 2855 (ksk), size = 512b} ;;state=2 [ VALID ] ;;count=0 ;;lastchange=${$t4} ;;${ctime $t4} 275example.com. 10800 IN DNSKEY 257 3 5 AwEAAc3Z5DQDJpH4oPdNtC4BUQHk50XMD+dHr4r8psHmivIa83hxR5CRgCtd9sENCW9Ae8OIO19xw9t/RPaEAqQa+OE= ;{id = 55582 (ksk), size = 512b} ;;state=2 [ VALID ] ;;count=0 ;;lastchange=${$t0} ;;${ctime $t0} 276FILE_END 277 278; 30 days later, the old key is revoked 279STEP 51 TIME_PASSES EVAL ${30*24*3600} 280STEP 52 TRAFFIC 281STEP 53 ASSIGN t5 = ${time} 282STEP 54 ASSIGN probe5 = ${range 4800 ${timeout} 5400} 283STEP 55 CHECK_AUTOTRUST example.com 284FILE_BEGIN 285; autotrust trust anchor file 286;;id: example.com. 1 287;;last_queried: ${$t5} ;;${ctime $t5} 288;;last_success: ${$t5} ;;${ctime $t5} 289;;next_probe_time: ${$t5 + $probe5} ;;${ctime $t5 + $probe5} 290;;query_failed: 0 291;;query_interval: 5400 292;;retry_time: 3600 293example.com. 10800 IN DNSKEY 257 3 3 ALXLUsWqUrY3JYER3T4TBJIIs70j+sDS/UT2QRp61SE7S3EEXopNXoFE73JLRmvpi/UrOO/Vz4Se6wXv/CYCKjGw06U4WRgRYXcpEhJROyNapmdIKSxhOzfLVE1gqA0PweZR8dtY3aNQSRn3sPpwJr6Mi/PqQKAMMrZ9ckJpf1+bQMOOvxgzz2U1GS18b3yZKcgTMEaJzd/GZYzi/BN2DzQ0MsrSwYXfsNLFOBbs8PJMW4LYIxeeOe6rUgkWOF7CC9Dh/dduQ1QrsJhmZAEFfd6ByYV+ ;{id = 2855 (ksk), size = 512b} ;;state=2 [ VALID ] ;;count=0 ;;lastchange=${$t4} ;;${ctime $t4} 294example.com. 10800 IN DNSKEY 385 3 5 AwEAAc3Z5DQDJpH4oPdNtC4BUQHk50XMD+dHr4r8psHmivIa83hxR5CRgCtd9sENCW9Ae8OIO19xw9t/RPaEAqQa+OE= ;{id = 55710 (ksk), size = 512b} ;;state=4 [ REVOKED ] ;;count=0 ;;lastchange=${$t5} ;;${ctime $t5} 295FILE_END 296 297; 370 days later, the old key is removed from storage 298STEP 61 TIME_PASSES EVAL ${370*24*3600} 299STEP 62 TRAFFIC 300STEP 63 ASSIGN t6 = ${time} 301STEP 64 ASSIGN probe6 = ${range 4800 ${timeout} 5400} 302STEP 65 CHECK_AUTOTRUST example.com 303FILE_BEGIN 304; autotrust trust anchor file 305;;id: example.com. 1 306;;last_queried: ${$t6} ;;${ctime $t6} 307;;last_success: ${$t6} ;;${ctime $t6} 308;;next_probe_time: ${$t6 + $probe6} ;;${ctime $t6 + $probe6} 309;;query_failed: 0 310;;query_interval: 5400 311;;retry_time: 3600 312example.com. 10800 IN DNSKEY 257 3 3 ALXLUsWqUrY3JYER3T4TBJIIs70j+sDS/UT2QRp61SE7S3EEXopNXoFE73JLRmvpi/UrOO/Vz4Se6wXv/CYCKjGw06U4WRgRYXcpEhJROyNapmdIKSxhOzfLVE1gqA0PweZR8dtY3aNQSRn3sPpwJr6Mi/PqQKAMMrZ9ckJpf1+bQMOOvxgzz2U1GS18b3yZKcgTMEaJzd/GZYzi/BN2DzQ0MsrSwYXfsNLFOBbs8PJMW4LYIxeeOe6rUgkWOF7CC9Dh/dduQ1QrsJhmZAEFfd6ByYV+ ;{id = 2855 (ksk), size = 512b} ;;state=2 [ VALID ] ;;count=0 ;;lastchange=${$t4} ;;${ctime $t4} 313FILE_END 314 315 316SCENARIO_END 317