xref: /netbsd-src/external/bsd/unbound/dist/testdata/val_nx_overreach.rpl (revision 3f351f34c6d827cf017cdcff3543f6ec0c88b420)
1; config options
2; The island of trust is at example.com
3server:
4	trust-anchor: "example.com.    3600    IN      DS      2854 3 1 46e4ffc6e9a4793b488954bd3f0cc6af0dfb201b"
5	val-override-date: "20070916134226"
6	target-fetch-policy: "0 0 0 0 0"
7	qname-minimisation: "no"
8	fake-sha1: yes
9	trust-anchor-signaling: no
10	ede: yes
11
12stub-zone:
13	name: "."
14	stub-addr: 193.0.14.129 	# K.ROOT-SERVERS.NET.
15CONFIG_END
16
17SCENARIO_BEGIN Test validator with overreaching NSEC record
18
19; K.ROOT-SERVERS.NET.
20RANGE_BEGIN 0 100
21	ADDRESS 193.0.14.129
22ENTRY_BEGIN
23MATCH opcode qtype qname
24ADJUST copy_id
25REPLY QR NOERROR
26SECTION QUESTION
27. IN NS
28SECTION ANSWER
29. IN NS	K.ROOT-SERVERS.NET.
30SECTION ADDITIONAL
31K.ROOT-SERVERS.NET.	IN	A	193.0.14.129
32ENTRY_END
33
34ENTRY_BEGIN
35MATCH opcode qtype qname
36ADJUST copy_id
37REPLY QR NOERROR
38SECTION QUESTION
39www.example.com. IN A
40SECTION AUTHORITY
41com.	IN NS	a.gtld-servers.net.
42SECTION ADDITIONAL
43a.gtld-servers.net.	IN 	A	192.5.6.30
44ENTRY_END
45RANGE_END
46
47; a.gtld-servers.net.
48RANGE_BEGIN 0 100
49	ADDRESS 192.5.6.30
50ENTRY_BEGIN
51MATCH opcode qtype qname
52ADJUST copy_id
53REPLY QR NOERROR
54SECTION QUESTION
55com. IN NS
56SECTION ANSWER
57com.    IN NS   a.gtld-servers.net.
58SECTION ADDITIONAL
59a.gtld-servers.net.     IN      A       192.5.6.30
60ENTRY_END
61
62ENTRY_BEGIN
63MATCH opcode subdomain
64ADJUST copy_id copy_query
65REPLY QR NOERROR
66SECTION QUESTION
67example.com. IN A
68SECTION AUTHORITY
69example.com.	IN NS	ns.example.com.
70SECTION ADDITIONAL
71ns.example.com.		IN 	A	1.2.3.4
72ENTRY_END
73RANGE_END
74
75; ns.example.com.
76RANGE_BEGIN 0 100
77	ADDRESS 1.2.3.4
78ENTRY_BEGIN
79MATCH opcode qtype qname
80ADJUST copy_id
81REPLY QR AA REFUSED
82SECTION QUESTION
83ns.example.com. IN A
84ENTRY_END
85
86ENTRY_BEGIN
87MATCH opcode qtype qname
88ADJUST copy_id
89REPLY QR AA REFUSED
90SECTION QUESTION
91ns.example.com. IN AAAA
92ENTRY_END
93
94ENTRY_BEGIN
95MATCH opcode qtype qname
96ADJUST copy_id
97REPLY QR NOERROR
98SECTION QUESTION
99example.com. IN NS
100SECTION ANSWER
101example.com.    IN NS   ns.example.com.
102example.com.    3600    IN      RRSIG   NS 3 2 3600 20070926134150 20070829134150 2854 example.com. MC0CFQCN+qHdJxoI/2tNKwsb08pra/G7aAIUAWA5sDdJTbrXA1/3OaesGBAO3sI= ;{id = 2854}
103SECTION ADDITIONAL
104ns.example.com.         IN      A       1.2.3.4
105ns.example.com. 3600    IN      RRSIG   A 3 3 3600 20070926135752 20070829135752 2854 example.com. MC0CFQCMSWxVehgOQLoYclB9PIAbNP229AIUeH0vNNGJhjnZiqgIOKvs1EhzqAo= ;{id = 2854}
106ENTRY_END
107
108; response to DNSKEY priming query
109ENTRY_BEGIN
110MATCH opcode qtype qname
111ADJUST copy_id
112REPLY QR NOERROR
113SECTION QUESTION
114example.com. IN DNSKEY
115SECTION ANSWER
116example.com.    3600    IN      DNSKEY  256 3 3 ALXLUsWqUrY3JYER3T4TBJII s70j+sDS/UT2QRp61SE7S3E EXopNXoFE73JLRmvpi/UrOO/Vz4Se 6wXv/CYCKjGw06U4WRgR YXcpEhJROyNapmdIKSx hOzfLVE1gqA0PweZR8d tY3aNQSRn3sPpwJr6Mi /PqQKAMMrZ9ckJpf1+b QMOOvxgzz2U1GS18b3y ZKcgTMEaJzd/GZYzi/B N2DzQ0MsrSwYXfsNLFO Bbs8PJMW4LYIxeeOe6rUgkWOF 7CC9Dh/dduQ1QrsJhmZAEFfd6ByYV+ ;{id = 2854 (zsk), size = 1688b}
117example.com.    3600    IN      RRSIG   DNSKEY 3 2 3600 20070926134802 20070829134802 2854 example.com. MCwCFG1yhRNtTEa3Eno2zhVVuy2EJX3wAhQeLyUp6+UXcpC5qGNu9tkrTEgPUg== ;{id = 2854}
118SECTION AUTHORITY
119example.com.	IN NS	ns.example.com.
120example.com.    3600    IN      RRSIG   NS 3 2 3600 20070926134150 20070829134150 2854 example.com. MC0CFQCN+qHdJxoI/2tNKwsb08pra/G7aAIUAWA5sDdJTbrXA1/3OaesGBAO3sI= ;{id = 2854}
121SECTION ADDITIONAL
122ns.example.com.		IN 	A	1.2.3.4
123ns.example.com. 3600    IN      RRSIG   A 3 3 3600 20070926135752 20070829135752 2854 example.com. MC0CFQCMSWxVehgOQLoYclB9PIAbNP229AIUeH0vNNGJhjnZiqgIOKvs1EhzqAo= ;{id = 2854}
124ENTRY_END
125
126; response to query of interest
127ENTRY_BEGIN
128MATCH opcode qtype qname
129ADJUST copy_id
130REPLY QR NXDOMAIN
131SECTION QUESTION
132www.example.com. IN A
133SECTION ANSWER
134SECTION AUTHORITY
135example.com.	IN SOA	ns.example.com. hostmaster.example.com. 2007090400 28800 7200 604800 18000
136example.com.    3600    IN      RRSIG   SOA 3 2 3600 20070926134150 20070829134150 2854 example.com. MC0CFCNGZ+/OfElYQMCZ77O9Lw9rhk7PAhUAmDcvTAst6Bq83qPq3r6c/Dm1nFc= ;{id = 2854}
137; wildcard denial
138example.com.    IN      NSEC    abc.example.com. SOA NS DNSKEY NSEC RRSIG
139example.com.    3600    IN      RRSIG   NSEC 3 2 3600 20070926134150 20070829134150 2854 example.com. MCwCFHV2IBWyTmDJvZ+sT+WsGrJX0op/AhQkAijjnjPAtx/tNub2FAGqcexJSg== ;{id = 2854}
140; qname denial
141; The overreaching NSEC record; it tries to deny other .com zones!
142wab.example.com.        IN      NSEC    wzz.foo.com. A NSEC RRSIG
143wab.example.com.	3600	IN	RRSIG	NSEC 3 3 3600 20070926134150 20070829134150 2854 example.com. AEimIB2N5u7AQOb5IBMnckASZ4MlhBxziJy+zVUjLov/s7q85j8eWQc= ;{id = 2854}
144SECTION ADDITIONAL
145ENTRY_END
146RANGE_END
147
148STEP 1 QUERY
149ENTRY_BEGIN
150REPLY RD DO
151SECTION QUESTION
152www.example.com. IN A
153ENTRY_END
154
155; recursion happens here.
156STEP 10 CHECK_ANSWER
157ENTRY_BEGIN
158MATCH all ede=6
159REPLY QR RD RA DO SERVFAIL
160SECTION QUESTION
161www.example.com. IN A
162SECTION ANSWER
163ENTRY_END
164
165SCENARIO_END
166