example.zone 8.3 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144
  1. ;;
  2. ;; This is a complete (but crafted and somewhat broken) zone file used
  3. ;; in query tests.
  4. ;;
  5. example.com. 3600 IN SOA . . 0 0 0 0 0
  6. example.com. 3600 IN RRSIG SOA 5 3 3600 20000101000000 20000201000000 12345 example.com. FAKEFAKEFAKE
  7. example.com. 3600 IN NS glue.delegation.example.com.
  8. example.com. 3600 IN NS noglue.example.com.
  9. example.com. 3600 IN NS example.net.
  10. example.com. 3600 IN RRSIG NS 5 3 3600 20000101000000 20000201000000 12345 example.com. FAKEFAKEFAKE
  11. ;; This is used only for pathological case
  12. ;;example.com. 3600 IN DS 57855 5 1 B6DCD485719ADCA18E5F3D48A2331627FDD3 636B
  13. glue.delegation.example.com. 3600 IN A 192.0.2.153
  14. glue.delegation.example.com. 3600 IN RRSIG A 5 3 3600 20000101000000 20000201000000 12345 example.com. FAKEFAKEFAKE
  15. glue.delegation.example.com. 3600 IN AAAA 2001:db8::53
  16. glue.delegation.example.com. 3600 IN RRSIG AAAA 5 3 3600 20000101000000 20000201000000 12345 example.com. FAKEFAKEFAKE
  17. noglue.example.com. 3600 IN A 192.0.2.53
  18. noglue.example.com. 3600 IN RRSIG A 5 3 3600 20000101000000 20000201000000 12345 example.com. FAKEFAKEFAKE
  19. delegation.example.com. 3600 IN NS glue.delegation.example.com.
  20. delegation.example.com. 3600 IN NS noglue.example.com.
  21. delegation.example.com. 3600 IN NS cname.example.com.
  22. delegation.example.com. 3600 IN NS example.org.
  23. ;; Borrowed from the RFC4035
  24. delegation.example.com. 3600 IN DS 57855 5 1 B6DCD485719ADCA18E5F3D48A2331627FDD3 636B
  25. delegation.example.com. 3600 IN RRSIG DS 5 3 3600 20000101000000 20000201000000 12345 example.com. FAKEFAKEFAKE
  26. mx.example.com. 3600 IN MX 10 www.example.com.
  27. mx.example.com. 3600 IN MX 20 mailer.example.org.
  28. mx.example.com. 3600 IN MX 30 mx.delegation.example.com.
  29. www.example.com. 3600 IN A 192.0.2.80
  30. www.example.com. 3600 IN RRSIG A 5 3 3600 20000101000000 20000201000000 12345 example.com. FAKEFAKEFAKE
  31. cname.example.com. 3600 IN CNAME www.example.com.
  32. cnamenxdom.example.com. 3600 IN CNAME nxdomain.example.com.
  33. ;; CNAME Leading out of zone
  34. cnameout.example.com. 3600 IN CNAME www.example.org.
  35. ;; The DNAME to do tests against
  36. dname.example.com. 3600 IN DNAME somethinglong.dnametarget.example.com.
  37. ;; Some data at the dname node (allowed by RFC 2672)
  38. dname.example.com. 3600 IN A 192.0.2.5
  39. ;; The rest of data won't be referenced from the test cases.
  40. cnamemailer.example.com. 3600 IN CNAME www.example.com.
  41. cnamemx.example.com. 3600 IN MX 10 cnamemailer.example.com.
  42. mx.delegation.example.com. 3600 IN A 192.0.2.100
  43. ;; Wildcards
  44. *.wild.example.com. 3600 IN A 192.0.2.7
  45. *.wild.example.com. 3600 IN RRSIG A 5 3 3600 20000101000000 20000201000000 12345 example.com. FAKEFAKEFAKE
  46. *.wild.example.com. 3600 IN NSEC www.example.com. A NSEC RRSIG
  47. *.wild.example.com. 3600 IN RRSIG NSEC 5 3 3600 20000101000000 20000201000000 12345 example.com. FAKEFAKEFAKE
  48. *.cnamewild.example.com. 3600 IN CNAME www.example.org.
  49. *.cnamewild.example.com. 3600 IN RRSIG CNAME 5 3 3600 20000101000000 20000201000000 12345 example.com. FAKEFAKEFAKE
  50. *.cnamewild.example.com. 3600 IN NSEC delegation.example.com. CNAME NSEC RRSIG
  51. *.cnamewild.example.com. 3600 IN RRSIG NSEC 5 3 3600 20000101000000 20000201000000 12345 example.com. FAKEFAKEFAKE
  52. ;; Wildcard_nxrrset
  53. *.uwild.example.com. 3600 IN A 192.0.2.9
  54. *.uwild.example.com. 3600 IN NSEC www.uwild.example.com. A NSEC RRSIG
  55. www.uwild.example.com. 3600 IN A 192.0.2.11
  56. www.uwild.example.com. 3600 IN NSEC *.wild.example.com. A NSEC RRSIG
  57. ;; Wildcard empty
  58. b.*.t.example.com. 3600 IN A 192.0.2.13
  59. b.*.t.example.com. 3600 IN NSEC *.uwild.example.com. A NSEC RRSIG
  60. b.*.t.example.com. 3600 IN RRSIG NSEC 5 3 3600 20000101000000 20000201000000 12345 example.com. FAKEFAKEFAKE
  61. t.example.com. 3600 IN A 192.0.2.15
  62. t.example.com. 3600 IN NSEC b.*.t.example.com. A NSEC RRSIG
  63. t.example.com. 3600 IN RRSIG NSEC 5 3 3600 20000101000000 20000201000000 12345 example.com. FAKEFAKEFAKE
  64. ;; Used in NXDOMAIN proof test. We are going to test some unusual case where
  65. ;; the best possible wildcard is below the "next domain" of the NSEC RR that
  66. ;; proves the NXDOMAIN, i.e.,
  67. ;; mx.example.com. (exist)
  68. ;; (.no.example.com. (qname, NXDOMAIN)
  69. ;; ).no.example.com. (exist)
  70. ;; *.no.example.com. (best possible wildcard, not exist)
  71. \).no.example.com. 3600 IN AAAA 2001:db8::53
  72. ;; NSEC records.
  73. example.com. 3600 IN NSEC cname.example.com. NS SOA NSEC RRSIG
  74. example.com. 3600 IN RRSIG NSEC 5 3 3600 20000101000000 20000201000000 12345 example.com. FAKEFAKEFAKE
  75. mx.example.com. 3600 IN NSEC \).no.example.com. MX NSEC RRSIG
  76. mx.example.com. 3600 IN RRSIG NSEC 5 3 3600 20000101000000 20000201000000 12345 example.com. FAKEFAKEFAKE
  77. \).no.example.com. 3600 IN NSEC nz.no.example.com. AAAA NSEC RRSIG
  78. \).no.example.com. 3600 IN RRSIG NSEC 5 3 3600 20000101000000 20000201000000 12345 example.com. FAKEFAKEFAKE
  79. ;; We'll also test the case where a single NSEC proves both NXDOMAIN and the
  80. ;; non existence of wildcard. The following records will be used for that
  81. ;; test.
  82. ;; ).no.example.com. (exist, whose NSEC proves everything)
  83. ;; *.no.example.com. (best possible wildcard, not exist)
  84. ;; nx.no.example.com. (NXDOMAIN)
  85. ;; nz.no.example.com. (exist)
  86. nz.no.example.com. 3600 IN AAAA 2001:db8::5300
  87. nz.no.example.com. 3600 IN NSEC noglue.example.com. AAAA NSEC RRSIG
  88. noglue.example.com. 3600 IN NSEC nonsec.example.com. A
  89. noglue.example.com. 3600 IN RRSIG NSEC 5 3 3600 20000101000000 20000201000000 12345 example.com. FAKEFAKEFAKE
  90. ;; NSEC for the normal NXRRSET case
  91. www.example.com. 3600 IN NSEC example.com. A NSEC RRSIG
  92. www.example.com. 3600 IN RRSIG NSEC 5 3 3600 20000101000000 20000201000000 12345 example.com. FAKEFAKEFAKE
  93. ;; Authoritative data without NSEC
  94. nonsec.example.com. 3600 IN A 192.0.2.0
  95. ;; NSEC3 RRs. You may also need to add mapping to MockZoneFinder::hash_map_.
  96. ;; 0p9mhaveqvm6t7vbl5lop2u3t2rp3tom.example.com. 3600 IN NSEC3 1 1 12 aabbccdd 2t7b4g4vsa5smi47k61mv5bv1a22bojr NS SOA NSEC3PARAM RRSIG
  97. ;; 0p9mhaveqvm6t7vbl5lop2u3t2rp3tom.example.com. 3600 IN RRSIG NSEC3 5 3 3600 20000101000000 20000201000000 12345 example.com. FAKEFAKEFAKE
  98. ;; q04jkcevqvmu85r014c7dkba38o0ji5r.example.com. 3600 IN NSEC3 1 1 12 aabbccdd r53bq7cc2uvmubfu5ocmm6pers9tk9en A RRSIG
  99. ;; q04jkcevqvmu85r014c7dkba38o0ji5r.example.com. 3600 IN RRSIG NSEC3 5 3 3600 20000101000000 20000201000000 12345 example.com. FAKEFAKEFAKE
  100. ;; NSEC3 for wild.example.com (used in wildcard tests, will be added on
  101. ;; demand not to confuse other tests)
  102. ;; ji6neoaepv8b5o6k4ev33abha8ht9fgc.example.com. 3600 IN NSEC3 1 1 12 aabbccdd r53bq7cc2uvmubfu5ocmm6pers9tk9en
  103. ;; NSEC3 for cnamewild.example.com (used in wildcard tests, will be added on
  104. ;; demand not to confuse other tests)
  105. ;; k8udemvp1j2f7eg6jebps17vp3n8i58h.example.com. 3600 IN NSEC3 1 1 12 aabbccdd r53bq7cc2uvmubfu5ocmm6pers9tk9en
  106. ;; NSEC3 for *.uwild.example.com (will be added on demand not to confuse
  107. ;; other tests)
  108. ;; b4um86eghhds6nea196smvmlo4ors995.example.com. 3600 IN NSEC3 1 1 12 aabbccdd r53bq7cc2uvmubfu5ocmm6pers9tk9en A RRSIG
  109. ;; NSEC3 for uwild.example.com. (will be added on demand)
  110. ;; t644ebqk9bibcna874givr6joj62mlhv.example.com. 3600 IN NSEC3 1 1 12 aabbccdd r53bq7cc2uvmubfu5ocmm6pers9tk9en A RRSIG
  111. ;; (Secure) delegation data; Delegation with DS record
  112. signed-delegation.example.com. 3600 IN NS ns.example.net.
  113. signed-delegation.example.com. 3600 IN DS 12345 8 2 764501411DE58E8618945054A3F620B36202E115D015A7773F4B78E0F952CECA
  114. signed-delegation.example.com. 3600 IN RRSIG DS 5 3 3600 20000101000000 20000201000000 12345 example.com. FAKEFAKEFAKE
  115. ;; (Secure) delegation data; Delegation without DS record (and both NSEC
  116. ;; and NSEC3 denying its existence)
  117. unsigned-delegation.example.com. 3600 IN NS ns.example.net.
  118. unsigned-delegation.example.com. 3600 IN NSEC unsigned-delegation-optout.example.com. NS RRSIG NSEC
  119. unsigned-delegation.example.com. 3600 IN RRSIG NSEC 5 3 3600 20000101000000 20000201000000 12345 example.com. FAKEFAKEFAKE
  120. ;; This one will be added on demand
  121. ; q81r598950igr1eqvc60aedlq66425b5.example.com. 3600 IN NSEC3 1 1 12 aabbccdd 0p9mhaveqvm6t7vbl5lop2u3t2rp3tom NS RRSIG
  122. ;; Delegation without DS record, and no direct matching NSEC3 record
  123. unsigned-delegation-optout.example.com. 3600 IN NS ns.example.net.
  124. unsigned-delegation-optout.example.com. 3600 IN NSEC *.uwild.example.com. NS RRSIG NSEC
  125. ;; (Secure) delegation data; Delegation where the DS lookup will raise an
  126. ;; exception.
  127. bad-delegation.example.com. 3600 IN NS ns.example.net.
  128. ;; Delegation from an unsigned parent. There's no DS, and there's no NSEC
  129. ;; or NSEC3 that proves it.
  130. nosec-delegation.example.com. 3600 IN NS ns.nosec.example.net.