xref: /netbsd-src/external/bsd/unbound/dist/testdata/val_nx_overreach.rpl (revision c34236556bea94afcaca1782d7d228301edc3ea0)
1; config options
2; The island of trust is at example.com
3server:
4	trust-anchor: "example.com.    3600    IN      DS      2854 3 1 46e4ffc6e9a4793b488954bd3f0cc6af0dfb201b"
5	val-override-date: "20070916134226"
6	target-fetch-policy: "0 0 0 0 0"
7
8stub-zone:
9	name: "."
10	stub-addr: 193.0.14.129 	# K.ROOT-SERVERS.NET.
11CONFIG_END
12
13SCENARIO_BEGIN Test validator with overreaching NSEC record
14
15; K.ROOT-SERVERS.NET.
16RANGE_BEGIN 0 100
17	ADDRESS 193.0.14.129
18ENTRY_BEGIN
19MATCH opcode qtype qname
20ADJUST copy_id
21REPLY QR NOERROR
22SECTION QUESTION
23. IN NS
24SECTION ANSWER
25. IN NS	K.ROOT-SERVERS.NET.
26SECTION ADDITIONAL
27K.ROOT-SERVERS.NET.	IN	A	193.0.14.129
28ENTRY_END
29
30ENTRY_BEGIN
31MATCH opcode qtype qname
32ADJUST copy_id
33REPLY QR NOERROR
34SECTION QUESTION
35www.example.com. IN A
36SECTION AUTHORITY
37com.	IN NS	a.gtld-servers.net.
38SECTION ADDITIONAL
39a.gtld-servers.net.	IN 	A	192.5.6.30
40ENTRY_END
41RANGE_END
42
43; a.gtld-servers.net.
44RANGE_BEGIN 0 100
45	ADDRESS 192.5.6.30
46ENTRY_BEGIN
47MATCH opcode qtype qname
48ADJUST copy_id
49REPLY QR NOERROR
50SECTION QUESTION
51com. IN NS
52SECTION ANSWER
53com.    IN NS   a.gtld-servers.net.
54SECTION ADDITIONAL
55a.gtld-servers.net.     IN      A       192.5.6.30
56ENTRY_END
57
58ENTRY_BEGIN
59MATCH opcode subdomain
60ADJUST copy_id copy_query
61REPLY QR NOERROR
62SECTION QUESTION
63example.com. IN A
64SECTION AUTHORITY
65example.com.	IN NS	ns.example.com.
66SECTION ADDITIONAL
67ns.example.com.		IN 	A	1.2.3.4
68ENTRY_END
69RANGE_END
70
71; ns.example.com.
72RANGE_BEGIN 0 100
73	ADDRESS 1.2.3.4
74ENTRY_BEGIN
75MATCH opcode qtype qname
76ADJUST copy_id
77REPLY QR AA REFUSED
78SECTION QUESTION
79ns.example.com. IN A
80ENTRY_END
81
82ENTRY_BEGIN
83MATCH opcode qtype qname
84ADJUST copy_id
85REPLY QR AA REFUSED
86SECTION QUESTION
87ns.example.com. IN AAAA
88ENTRY_END
89
90ENTRY_BEGIN
91MATCH opcode qtype qname
92ADJUST copy_id
93REPLY QR NOERROR
94SECTION QUESTION
95example.com. IN NS
96SECTION ANSWER
97example.com.    IN NS   ns.example.com.
98example.com.    3600    IN      RRSIG   NS 3 2 3600 20070926134150 20070829134150 2854 example.com. MC0CFQCN+qHdJxoI/2tNKwsb08pra/G7aAIUAWA5sDdJTbrXA1/3OaesGBAO3sI= ;{id = 2854}
99SECTION ADDITIONAL
100ns.example.com.         IN      A       1.2.3.4
101ns.example.com. 3600    IN      RRSIG   A 3 3 3600 20070926135752 20070829135752 2854 example.com. MC0CFQCMSWxVehgOQLoYclB9PIAbNP229AIUeH0vNNGJhjnZiqgIOKvs1EhzqAo= ;{id = 2854}
102ENTRY_END
103
104; response to DNSKEY priming query
105ENTRY_BEGIN
106MATCH opcode qtype qname
107ADJUST copy_id
108REPLY QR NOERROR
109SECTION QUESTION
110example.com. IN DNSKEY
111SECTION ANSWER
112example.com.    3600    IN      DNSKEY  256 3 3 ALXLUsWqUrY3JYER3T4TBJII s70j+sDS/UT2QRp61SE7S3E EXopNXoFE73JLRmvpi/UrOO/Vz4Se 6wXv/CYCKjGw06U4WRgR YXcpEhJROyNapmdIKSx hOzfLVE1gqA0PweZR8d tY3aNQSRn3sPpwJr6Mi /PqQKAMMrZ9ckJpf1+b QMOOvxgzz2U1GS18b3y ZKcgTMEaJzd/GZYzi/B N2DzQ0MsrSwYXfsNLFO Bbs8PJMW4LYIxeeOe6rUgkWOF 7CC9Dh/dduQ1QrsJhmZAEFfd6ByYV+ ;{id = 2854 (zsk), size = 1688b}
113example.com.    3600    IN      RRSIG   DNSKEY 3 2 3600 20070926134802 20070829134802 2854 example.com. MCwCFG1yhRNtTEa3Eno2zhVVuy2EJX3wAhQeLyUp6+UXcpC5qGNu9tkrTEgPUg== ;{id = 2854}
114SECTION AUTHORITY
115example.com.	IN NS	ns.example.com.
116example.com.    3600    IN      RRSIG   NS 3 2 3600 20070926134150 20070829134150 2854 example.com. MC0CFQCN+qHdJxoI/2tNKwsb08pra/G7aAIUAWA5sDdJTbrXA1/3OaesGBAO3sI= ;{id = 2854}
117SECTION ADDITIONAL
118ns.example.com.		IN 	A	1.2.3.4
119ns.example.com. 3600    IN      RRSIG   A 3 3 3600 20070926135752 20070829135752 2854 example.com. MC0CFQCMSWxVehgOQLoYclB9PIAbNP229AIUeH0vNNGJhjnZiqgIOKvs1EhzqAo= ;{id = 2854}
120ENTRY_END
121
122; response to query of interest
123ENTRY_BEGIN
124MATCH opcode qtype qname
125ADJUST copy_id
126REPLY QR NXDOMAIN
127SECTION QUESTION
128www.example.com. IN A
129SECTION ANSWER
130SECTION AUTHORITY
131example.com.	IN SOA	ns.example.com. hostmaster.example.com. 2007090400 28800 7200 604800 18000
132example.com.    3600    IN      RRSIG   SOA 3 2 3600 20070926134150 20070829134150 2854 example.com. MC0CFCNGZ+/OfElYQMCZ77O9Lw9rhk7PAhUAmDcvTAst6Bq83qPq3r6c/Dm1nFc= ;{id = 2854}
133; wildcard denial
134example.com.    IN      NSEC    abc.example.com. SOA NS DNSKEY NSEC RRSIG
135example.com.    3600    IN      RRSIG   NSEC 3 2 3600 20070926134150 20070829134150 2854 example.com. MCwCFHV2IBWyTmDJvZ+sT+WsGrJX0op/AhQkAijjnjPAtx/tNub2FAGqcexJSg== ;{id = 2854}
136; qname denial
137; The overreaching NSEC record; it tries to deny other .com zones!
138wab.example.com.        IN      NSEC    wzz.foo.com. A NSEC RRSIG
139wab.example.com.	3600	IN	RRSIG	NSEC 3 3 3600 20070926134150 20070829134150 2854 example.com. AEimIB2N5u7AQOb5IBMnckASZ4MlhBxziJy+zVUjLov/s7q85j8eWQc= ;{id = 2854}
140SECTION ADDITIONAL
141ENTRY_END
142RANGE_END
143
144STEP 1 QUERY
145ENTRY_BEGIN
146REPLY RD DO
147SECTION QUESTION
148www.example.com. IN A
149ENTRY_END
150
151; recursion happens here.
152STEP 10 CHECK_ANSWER
153ENTRY_BEGIN
154MATCH all
155REPLY QR RD RA DO SERVFAIL
156SECTION QUESTION
157www.example.com. IN A
158SECTION ANSWER
159SECTION AUTHORITY
160SECTION ADDITIONAL
161ENTRY_END
162
163SCENARIO_END
164