1; config options 2stub-zone: 3 name: "." 4 stub-addr: 193.0.14.129 # K.ROOT-SERVERS.NET. 5CONFIG_END 6 7SCENARIO_BEGIN Test iterator donotquery of 127/8. 8; The scenario presents an iteration chain that has 127.0.0.2 and 9; 127.255.255.255 as nameserver IPs, like a spam-blocklist. 10; these are 127/8 localhost and should be blocked, causing servfail. 11; if not blocked, they cause a lookup, but this file does not specify 12; 127.* responses, so testbound will fail the test. 13 14; K.ROOT-SERVERS.NET. 15RANGE_BEGIN 0 100 16 ADDRESS 193.0.14.129 17ENTRY_BEGIN 18MATCH opcode qtype qname 19ADJUST copy_id 20REPLY QR NOERROR 21SECTION QUESTION 22. IN NS 23SECTION ANSWER 24. IN NS K.ROOT-SERVERS.NET. 25SECTION ADDITIONAL 26K.ROOT-SERVERS.NET. IN A 193.0.14.129 27ENTRY_END 28 29ENTRY_BEGIN 30MATCH opcode qtype qname 31ADJUST copy_id 32REPLY QR NOERROR 33SECTION QUESTION 34a.gtld-servers.net. IN AAAA 35SECTION ANSWER 36ENTRY_END 37 38ENTRY_BEGIN 39MATCH opcode subdomain 40ADJUST copy_id copy_query 41REPLY QR NOERROR 42SECTION QUESTION 43com. IN A 44SECTION AUTHORITY 45com. IN NS a.gtld-servers.net. 46SECTION ADDITIONAL 47a.gtld-servers.net. IN A 192.5.6.30 48ENTRY_END 49RANGE_END 50 51; a.gtld-servers.net. 52RANGE_BEGIN 0 100 53 ADDRESS 192.5.6.30 54ENTRY_BEGIN 55MATCH opcode qtype qname 56ADJUST copy_id 57REPLY QR NOERROR 58SECTION QUESTION 59com. IN NS 60SECTION ANSWER 61com. IN NS a.gtld-servers.net. 62SECTION ADDITIONAL 63a.gtld-servers.net. IN A 192.5.6.30 64ENTRY_END 65 66ENTRY_BEGIN 67MATCH opcode subdomain 68ADJUST copy_id copy_query 69REPLY QR NOERROR 70SECTION QUESTION 71example.com. IN A 72SECTION AUTHORITY 73example.com. IN NS ns.example.com. 74example.com. IN NS ns2.example.com. 75SECTION ADDITIONAL 76;ns.example.com. IN A 1.2.3.4 77ns.example.com. IN A 127.255.255.255 78ns2.example.com. IN A 127.0.0.2 79ENTRY_END 80RANGE_END 81 82; ns.example.com. 83RANGE_BEGIN 0 100 84 ADDRESS 1.2.3.4 85ENTRY_BEGIN 86MATCH opcode qtype qname 87ADJUST copy_id 88REPLY QR NOERROR 89SECTION QUESTION 90example.com. IN NS 91SECTION ANSWER 92example.com. IN NS ns.example.com. 93example.com. IN NS ns2.example.com. 94SECTION ADDITIONAL 95;ns.example.com. IN A 1.2.3.4 96ns.example.com. IN A 127.255.255.255 97ns2.example.com. IN A 127.0.0.2 98ENTRY_END 99 100ENTRY_BEGIN 101MATCH opcode qtype qname 102ADJUST copy_id 103REPLY QR NOERROR 104SECTION QUESTION 105www.example.com. IN A 106SECTION ANSWER 107www.example.com. IN A 10.20.30.40 108SECTION AUTHORITY 109example.com. IN NS ns.example.com. 110SECTION ADDITIONAL 111ns.example.com. IN A 1.2.3.4 112ENTRY_END 113RANGE_END 114 115STEP 1 QUERY 116ENTRY_BEGIN 117REPLY RD 118SECTION QUESTION 119www.example.com. IN A 120ENTRY_END 121 122; recursion happens here. 123STEP 10 CHECK_ANSWER 124ENTRY_BEGIN 125MATCH all 126REPLY QR RD RA SERVFAIL 127SECTION QUESTION 128www.example.com. IN A 129SECTION ANSWER 130SECTION AUTHORITY 131SECTION ADDITIONAL 132ENTRY_END 133 134SCENARIO_END 135