1; config options 2server: 3 trust-anchor: "example.com. 3600 IN DS 30899 5 1 d4bf9d2e10f6d76840d42ef5913022abcd0bf512" 4 trust-anchor: "a.b.example.com. 3600 IN DNSKEY 257 3 5 AwEAAas/cAhCFXvBUgTSNZCvQp0pLx1dY+7rXR0hH4/3EUgWmsmbYUpI1qD0xhwKD/oYGEwAm291fyWJ9c0oVxXDEK8=" 5 val-override-date: "20091113091234" 6 fake-sha1: yes 7 trust-anchor-signaling: no 8 9forward-zone: 10 name: "." 11 forward-addr: 192.0.2.1 12CONFIG_END 13 14SCENARIO_BEGIN Test validator with CNAME to closer anchor optout missing sigs. 15 16RANGE_BEGIN 0 100 17 ADDRESS 192.0.2.1 18ENTRY_BEGIN 19MATCH opcode qtype qname 20ADJUST copy_id 21REPLY QR NOERROR 22SECTION QUESTION 23www.example.com. IN AAAA 24SECTION ANSWER 25www.example.com. IN CNAME www.a.b.example.com. 26www.example.com. 3600 IN RRSIG CNAME 5 3 3600 20091213091234 20091111091234 30899 example.com. mfQXJgOsRe8wiqNDZT4+ygSgRqzNowJ20o5+b681Mssp0xc007dq1ZaUYwUCdZjTn/GhF+f74t0UI1oqsFw2XA== ;{id = 30899} 27 28SECTION AUTHORITY 29;; nsec3param 1 1 1 d399eaab 30; example.com. -> l0c0e5lac37ai0lpij31sj699hkktdmb. 31; b.example.com. -> 1lq6sb4omkd2vgj0l8lro2cbie223hco. 32;; closest encloser: example.com. 33l0c0e5lac37ai0lpij31sj699hkktdmb.example.com. IN NSEC3 1 1 1 d399eaab l0c0e5lac37ai0lpij31sj699hkktdmc SOA NS DNSKEY NSEC3PARAM RRSIG 34l0c0e5lac37ai0lpij31sj699hkktdmb.example.com. 3600 IN RRSIG NSEC3 5 3 3600 20091213091234 20091111091234 30899 example.com. qjV0zsbDWLuoOQQ3tgCE2zo1z31bK9nv/Wh6xqKhmhyFI87nw2HM0lZGfRQrpWvWfBDczLRxHH9WNZkeIzv28w== ;{id = 30899} 35 36;; nextcloser is: b.example.com. ; under optout range. 37; disproof of DS using the optout range. 381lq4sb4omkd2vgj0l8lro2cbie223hco.example.com. IN NSEC3 1 1 1 d399eaab 1lq8sb4omkd2vgj0l8lro2cbie223hco NS RRSIG 391lq4sb4omkd2vgj0l8lro2cbie223hco.example.com. 3600 IN RRSIG NSEC3 5 3 3600 20091213091234 20091111091234 30899 example.com. ZOJhHYt+YkGHBxHynuXlyZ8PEGg4YyqD/roWiEtBoP2PiGoPNCNqtWd0WjRgsUT0YFp/VqjqAU/RH8D45B8S8A== ;{id = 30899} 40 41ENTRY_END 42 43ENTRY_BEGIN 44MATCH opcode qtype qname 45ADJUST copy_id 46REPLY QR NOERROR 47SECTION QUESTION 48www.a.b.example.com. IN AAAA 49SECTION ANSWER 50SECTION AUTHORITY 51; NSEC that proves there is no AAAA record 52www.a.b.example.com. IN NSEC zzz.a.b.example.com. A NSEC RRSIG MX 53; signature missing! 54;www.a.b.example.com. 3600 IN RRSIG NSEC 5 5 3600 20091213091234 20091111091234 16486 a.b.example.com. pOj+aOIolZ8VXlLpaLD1NsYVbl8FW4wmsJbiVTYAMcyDOlgxOsbhTtlB4jQ7uV9pRVAzkvdm1V5wc/1PcncTuw== ;{id = 16486} 55ENTRY_END 56 57ENTRY_BEGIN 58MATCH opcode qtype qname 59ADJUST copy_id 60REPLY QR NOERROR 61SECTION QUESTION 62example.com. IN DNSKEY 63SECTION ANSWER 64example.com. 3600 IN DNSKEY 256 3 5 AQPQ41chR9DEHt/aIzIFAqanbDlRflJoRs5yz1jFsoRIT7dWf0r+PeDuewdxkszNH6wnU4QL8pfKFRh5PIYVBLK3 ;{id = 30899 (zsk), size = 512b} 65example.com. 3600 IN RRSIG DNSKEY 5 2 3600 20091213091234 20091111091234 30899 example.com. hc+1QLqhy6lcfgH95k6eabsXrYsdH2oTLqDu6BjHYrmLi0kX4ZDiOI+syhIcGw9+hRqW1j8t+lsHvzvi7BgcXg== ;{id = 30899} 66ENTRY_END 67 68ENTRY_BEGIN 69MATCH opcode qtype qname 70ADJUST copy_id 71REPLY QR NOERROR 72SECTION QUESTION 73a.b.example.com. IN DNSKEY 74SECTION ANSWER 75a.b.example.com. 3600 IN DNSKEY 257 3 5 AwEAAas/cAhCFXvBUgTSNZCvQp0pLx1dY+7rXR0hH4/3EUgWmsmbYUpI1qD0xhwKD/oYGEwAm291fyWJ9c0oVxXDEK8= ;{id = 16486 (ksk), size = 512b} 76; signature missing! 77;a.b.example.com. 3600 IN RRSIG DNSKEY 5 4 3600 20091213091234 20091111091234 16486 a.b.example.com. kPftbF2Rut5h2Sc2k/gp27XS+4I9WQ/EYa5NJOnqfJZqpw/es7GuLyWAAZyvNhBDIUEenXtZ8k1H8F8poKdNXw== ;{id = 16486} 78ENTRY_END 79 80RANGE_END 81 82STEP 1 QUERY 83ENTRY_BEGIN 84REPLY RD DO 85SECTION QUESTION 86www.example.com. IN AAAA 87ENTRY_END 88; recursion happens here. 89STEP 10 CHECK_ANSWER 90ENTRY_BEGIN 91MATCH all 92REPLY QR RD RA DO SERVFAIL 93SECTION QUESTION 94www.example.com. IN AAAA 95SECTION ANSWER 96ENTRY_END 97 98SCENARIO_END 99