dnssecjava-1.1.3/ 0000775 0000000 0000000 00000000000 13020541473 0013634 5 ustar 00root root 0000000 0000000 dnssecjava-1.1.3/.checkstyle 0000664 0000000 0000000 00000001261 13020541473 0015773 0 ustar 00root root 0000000 0000000
dnssecjava-1.1.3/.gitignore 0000664 0000000 0000000 00000000070 13020541473 0015621 0 ustar 00root root 0000000 0000000 /target
.classpath
.project
.idea
/.settings
/bin
*.iml
dnssecjava-1.1.3/.travis.yml 0000664 0000000 0000000 00000001356 13020541473 0015752 0 ustar 00root root 0000000 0000000 language: java
after_success:
- mvn clean test jacoco:report coveralls:report
- echo "ossrh \${env.OSSRH_USER} \${env.OSSRH_PASS} " > ~/settings.xml
- if [ "${TRAVIS_BRANCH}" == "master" ]; then mvn deploy -Dmaven.test.skip=true --settings ~/settings.xml; fi
env:
global:
- secure: cLkceI83cfryz/iUvWCsHuMvwDSKCLydLSvAMDNTN3Y+JVQ8rtyZjl6/hJ+Bbg22OZdugFZpNa3GW2FHozCuKJf1hvAN9/I/Eg0smIUdPr0jDuo2gLLcYjqoY9kvfXddVW0YGfVB/x+OI5MvNetciM8maksZxiEE5EhLxwyvD2o=
- secure: UcCGPkQ1NzQDTUKo+obN0eYJiJAWaS3s+pB3L4YtGEdZkPAjwoTimJOCSANsueFqBWlJCiMyS6LR0T9YoewD1mEZq1O0lSZlTirUNSTm8vbg8FF/zOd4Yvy9cmjvczPSiaGblTy4PX0oLOPXOPOgjSMrCleaC86+7/PSxNpPNtg=
dnssecjava-1.1.3/LICENSE 0000664 0000000 0000000 00000007561 13020541473 0014652 0 ustar 00root root 0000000 0000000 dnssecjava - a DNSSEC validating stub resolver for Java
Copyright (c) 2013-2015 Ingo Bauersachs
All rights reserved. This program and the accompanying materials
are made available under the terms of the Eclipse Public License v1.0
which accompanies this distribution, and is available at
http://www.eclipse.org/legal/epl-v10.html
###############################################################################
Some files are based on work under the following copyright and permission
notice. As a combined work, only the Eclipse Public License now applies to
them as a whole. Each file that is relicensed is marked as such.
Copyright (c) 2005 VeriSign. All rights reserved.
Redistribution and use in source and binary forms, with or without
modification, are permitted provided that the following conditions are
met:
1. Redistributions of source code must retain the above copyright
notice, this list of conditions and the following disclaimer.
2. Redistributions in binary form must reproduce the above copyright
notice, this list of conditions and the following disclaimer in the
documentation and/or other materials provided with the distribution.
3. The name of the author may not be used to endorse or promote
products derived from this software without specific prior written
permission.
THIS SOFTWARE IS PROVIDED BY THE AUTHOR ``AS IS'' AND ANY EXPRESS OR
IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED
WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY DIRECT,
INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES
(INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR
SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT,
STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING
IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE
POSSIBILITY OF SUCH DAMAGE.
###############################################################################
The unit test scenarios in the folder /src/test/resources/unbound are from the
Unbound DNS server and are based on work under the following copyright and
permission notice:
Copyright (c) 2007, NLnet Labs. All rights reserved.
This software is open source.
Redistribution and use in source and binary forms, with or without
modification, are permitted provided that the following conditions
are met:
Redistributions of source code must retain the above copyright notice,
this list of conditions and the following disclaimer.
Redistributions in binary form must reproduce the above copyright notice,
this list of conditions and the following disclaimer in the documentation
and/or other materials provided with the distribution.
Neither the name of the NLNET LABS nor the names of its contributors may
be used to endorse or promote products derived from this software without
specific prior written permission.
THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS
"AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED
TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR
PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE
LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR
CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF
SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS
INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN
CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE
POSSIBILITY OF SUCH DAMAGE.
dnssecjava-1.1.3/LICENSE.EPL 0000664 0000000 0000000 00000027026 13020541473 0015267 0 ustar 00root root 0000000 0000000 Eclipse Public License - v 1.0
THE ACCOMPANYING PROGRAM IS PROVIDED UNDER THE TERMS OF THIS ECLIPSE
PUBLIC LICENSE ("AGREEMENT"). ANY USE, REPRODUCTION OR DISTRIBUTION OF
THE PROGRAM CONSTITUTES RECIPIENT'S ACCEPTANCE OF THIS AGREEMENT.
1. DEFINITIONS
"Contribution" means:
a) in the case of the initial Contributor, the initial code and
documentation distributed under this Agreement, and
b) in the case of each subsequent Contributor:
i) changes to the Program, and
ii) additions to the Program;
where such changes and/or additions to the Program originate from and
are distributed by that particular Contributor. A Contribution
'originates' from a Contributor if it was added to the Program by such
Contributor itself or anyone acting on such Contributor's behalf.
Contributions do not include additions to the Program which: (i) are
separate modules of software distributed in conjunction with the
Program under their own license agreement, and (ii) are not derivative
works of the Program.
"Contributor" means any person or entity that distributes the Program.
"Licensed Patents" mean patent claims licensable by a Contributor which
are necessarily infringed by the use or sale of its Contribution alone
or when combined with the Program.
"Program" means the Contributions distributed in accordance with this
Agreement.
"Recipient" means anyone who receives the Program under this Agreement,
including all Contributors.
2. GRANT OF RIGHTS
a) Subject to the terms of this Agreement, each Contributor hereby
grants Recipient a non-exclusive, worldwide, royalty-free copyright
license to reproduce, prepare derivative works of, publicly display,
publicly perform, distribute and sublicense the Contribution of such
Contributor, if any, and such derivative works, in source code and
object code form.
b) Subject to the terms of this Agreement, each Contributor hereby
grants Recipient a non-exclusive, worldwide, royalty-free patent
license under Licensed Patents to make, use, sell, offer to sell,
import and otherwise transfer the Contribution of such Contributor, if
any, in source code and object code form. This patent license shall
apply to the combination of the Contribution and the Program if, at the
time the Contribution is added by the Contributor, such addition of the
Contribution causes such combination to be covered by the Licensed
Patents. The patent license shall not apply to any other combinations
which include the Contribution. No hardware per se is licensed
hereunder.
c) Recipient understands that although each Contributor grants the
licenses to its Contributions set forth herein, no assurances are
provided by any Contributor that the Program does not infringe the
patent or other intellectual property rights of any other entity. Each
Contributor disclaims any liability to Recipient for claims brought by
any other entity based on infringement of intellectual property rights
or otherwise. As a condition to exercising the rights and licenses
granted hereunder, each Recipient hereby assumes sole responsibility to
secure any other intellectual property rights needed, if any. For
example, if a third party patent license is required to allow Recipient
to distribute the Program, it is Recipient's responsibility to acquire
that license before distributing the Program.
d) Each Contributor represents that to its knowledge it has sufficient
copyright rights in its Contribution, if any, to grant the copyright
license set forth in this Agreement.
3. REQUIREMENTS
A Contributor may choose to distribute the Program in object code form
under its own license agreement, provided that:
a) it complies with the terms and conditions of this Agreement; and
b) its license agreement:
i) effectively disclaims on behalf of all Contributors all warranties
and conditions, express and implied, including warranties or conditions
of title and non-infringement, and implied warranties or conditions of
merchantability and fitness for a particular purpose;
ii) effectively excludes on behalf of all Contributors all liability
for damages, including direct, indirect, special, incidental and
consequential damages, such as lost profits;
iii) states that any provisions which differ from this Agreement are
offered by that Contributor alone and not by any other party; and
iv) states that source code for the Program is available from such
Contributor, and informs licensees how to obtain it in a reasonable
manner on or through a medium customarily used for software exchange.
When the Program is made available in source code form:
a) it must be made available under this Agreement; and
b) a copy of this Agreement must be included with each copy of the
Program.
Contributors may not remove or alter any copyright notices contained
within the Program.
Each Contributor must identify itself as the originator of its
Contribution, if any, in a manner that reasonably allows subsequent
Recipients to identify the originator of the Contribution.
4. COMMERCIAL DISTRIBUTION
Commercial distributors of software may accept certain responsibilities
with respect to end users, business partners and the like. While this
license is intended to facilitate the commercial use of the Program,
the Contributor who includes the Program in a commercial product
offering should do so in a manner which does not create potential
liability for other Contributors. Therefore, if a Contributor includes
the Program in a commercial product offering, such Contributor
("Commercial Contributor") hereby agrees to defend and indemnify every
other Contributor ("Indemnified Contributor") against any losses,
damages and costs (collectively "Losses") arising from claims, lawsuits
and other legal actions brought by a third party against the
Indemnified Contributor to the extent caused by the acts or omissions
of such Commercial Contributor in connection with its distribution of
the Program in a commercial product offering. The obligations in this
section do not apply to any claims or Losses relating to any actual or
alleged intellectual property infringement. In order to qualify, an
Indemnified Contributor must: a) promptly notify the Commercial
Contributor in writing of such claim, and b) allow the Commercial
Contributor to control, and cooperate with the Commercial Contributor
in, the defense and any related settlement negotiations. The
Indemnified Contributor may participate in any such claim at its own
expense.
For example, a Contributor might include the Program in a commercial
product offering, Product X. That Contributor is then a Commercial
Contributor. If that Commercial Contributor then makes performance
claims, or offers warranties related to Product X, those performance
claims and warranties are such Commercial Contributor's responsibility
alone. Under this section, the Commercial Contributor would have to
defend claims against the other Contributors related to those
performance claims and warranties, and if a court requires any other
Contributor to pay any damages as a result, the Commercial Contributor
must pay those damages.
5. NO WARRANTY
EXCEPT AS EXPRESSLY SET FORTH IN THIS AGREEMENT, THE PROGRAM IS
PROVIDED ON AN "AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY
KIND, EITHER EXPRESS OR IMPLIED INCLUDING, WITHOUT LIMITATION, ANY
WARRANTIES OR CONDITIONS OF TITLE, NON-INFRINGEMENT, MERCHANTABILITY OR
FITNESS FOR A PARTICULAR PURPOSE. Each Recipient is solely responsible
for determining the appropriateness of using and distributing the
Program and assumes all risks associated with its exercise of rights
under this Agreement , including but not limited to the risks and costs
of program errors, compliance with applicable laws, damage to or loss
of data, programs or equipment, and unavailability or interruption of
operations.
6. DISCLAIMER OF LIABILITY
EXCEPT AS EXPRESSLY SET FORTH IN THIS AGREEMENT, NEITHER RECIPIENT NOR
ANY CONTRIBUTORS SHALL HAVE ANY LIABILITY FOR ANY DIRECT, INDIRECT,
INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING
WITHOUT LIMITATION LOST PROFITS), HOWEVER CAUSED AND ON ANY THEORY OF
LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING
NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OR
DISTRIBUTION OF THE PROGRAM OR THE EXERCISE OF ANY RIGHTS GRANTED
HEREUNDER, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGES.
7. GENERAL
If any provision of this Agreement is invalid or unenforceable under
applicable law, it shall not affect the validity or enforceability of
the remainder of the terms of this Agreement, and without further
action by the parties hereto, such provision shall be reformed to the
minimum extent necessary to make such provision valid and enforceable.
If Recipient institutes patent litigation against any entity (including
a cross-claim or counterclaim in a lawsuit) alleging that the Program
itself (excluding combinations of the Program with other software or
hardware) infringes such Recipient's patent(s), then such Recipient's
rights granted under Section 2(b) shall terminate as of the date such
litigation is filed.
All Recipient's rights under this Agreement shall terminate if it fails
to comply with any of the material terms or conditions of this
Agreement and does not cure such failure in a reasonable period of time
after becoming aware of such noncompliance. If all Recipient's rights
under this Agreement terminate, Recipient agrees to cease use and
distribution of the Program as soon as reasonably practicable. However,
Recipient's obligations under this Agreement and any licenses granted
by Recipient relating to the Program shall continue and survive.
Everyone is permitted to copy and distribute copies of this Agreement,
but in order to avoid inconsistency the Agreement is copyrighted and
may only be modified in the following manner. The Agreement Steward
reserves the right to publish new versions (including revisions) of
this Agreement from time to time. No one other than the Agreement
Steward has the right to modify this Agreement. The Eclipse Foundation
is the initial Agreement Steward. The Eclipse Foundation may assign the
responsibility to serve as the Agreement Steward to a suitable separate
entity. Each new version of the Agreement will be given a
distinguishing version number. The Program (including Contributions)
may always be distributed subject to the version of the Agreement under
which it was received. In addition, after a new version of the
Agreement is published, Contributor may elect to distribute the Program
(including its Contributions) under the new version. Except as
expressly stated in Sections 2(a) and 2(b) above, Recipient receives no
rights or licenses to the intellectual property of any Contributor
under this Agreement, whether expressly, by implication, estoppel or
otherwise. All rights in the Program not expressly granted under this
Agreement are reserved.
This Agreement is governed by the laws of the State of New York and the
intellectual property laws of the United States of America. No party to
this Agreement will bring a legal action under this Agreement more than
one year after the cause of action arose. Each party waives its rights
to a jury trial in any resulting litigation.
dnssecjava-1.1.3/README.md 0000664 0000000 0000000 00000014301 13020541473 0015112 0 ustar 00root root 0000000 0000000 dnssecjava
==========
A DNSSEC validating stub resolver for Java.
[](https://travis-ci.org/ibauersachs/dnssecjava)
[](https://coveralls.io/r/ibauersachs/dnssecjava)
[](http://search.maven.org/#search%7Cga%7C1%7Cg%3A%22org.jitsi%22%20AND%20a%3A%22dnssecjava%22)
Is this library safe to use?
---------------------------
Maybe. There's been no audit of the code so far, so there are absolutely no
guarantees. The rest depends currently on your use case: the proof that a
positive response is correct _should_ be safe to use. Most of the
NXDOMAIN/NODATA responses are safe too, but there are some corner cases that
have no tests yet.
Unit tests are currently covering over 95% of the code, including 123
from the current production Unbound. Also keep in mind that while most of the
code paths are covered by unit tests, this does not mean it is performing
according to the RFCs or that something that should be checked for is really
done.
See the [To-Do list](TODO.md) for more details.
History
-------
This project is based on the work of the Unbound Java prototype from 2005/2006.
The Unbound prototype was stripped from all unnecessary parts, heavily
modified, complemented with more than 300 unit test and found bugs were fixed.
### Released versions
* 1.1.3:
- Replace jmockit with PowerMockito due to ever changing API (and there's a Debian package for PowerMockito)
- Use fixed versions for the dependencies
- Fix a Javadoc error in ValUtils
* 1.1.2:
- Issue #7: Provide alternatve to the resource bundle mechanism (thanks to Matt David)
- Issue #8: Fix parameter in dnskey.anchor_verify_failed (thanks to Andreas Schildbach)
* 1.1.1: Issue #5: Avoid using a regex to split long validation reasons, they don't work on Android
* 1.1: Change logging to slf4j
* 1.0: Initial release
Usage
-----
The project is intended to be used as a `Resolver` for
[DNSJAVA](http://www.xbill.org/dnsjava/). Validated, secure responses contain
the DNS `AD`-flag, while responses that failed validation return the
`SERVFAIL`-RCode. Insecure responses return the actual return code
without the `AD`-flag set.
The reason why the validation failed or is insecure is provided as
a localized string in the additional section under the record ./65280/TXT
(a TXT record for the owner name of the root zone in the private query class
`ValidatingResolver.VALIDATION_REASON_QCLASS`).
### Example
```java
import java.io.*;
import org.jitsi.dnssec.validator.ValidatingResolver;
import org.xbill.DNS.*;
public class ResolveExample {
static String ROOT = ". IN DS 19036 8 2 49AAC11D7B6F6446702E54A1607371607A1A41855200FD2CE1CDDE32F24E8FB5";
public static void main(String[] args) throws Exception {
// Send two sample queries using a standard DNSJAVA resolver
SimpleResolver sr = new SimpleResolver("4.2.2.1");
System.out.println("Standard resolver:");
sendAndPrint(sr, "www.dnssec-failed.org.");
sendAndPrint(sr, "www.isc.org.");
// Send the same queries using the validating resolver with the
// trust anchor of the root zone
// http://data.iana.org/root-anchors/root-anchors.xml
ValidatingResolver vr = new ValidatingResolver(sr);
vr.loadTrustAnchors(new ByteArrayInputStream(ROOT.getBytes("ASCII")));
System.out.println("\n\nValidating resolver:");
sendAndPrint(vr, "www.dnssec-failed.org.");
sendAndPrint(vr, "www.isc.org.");
}
private static void sendAndPrint(Resolver vr, String name) throws IOException {
System.out.println("\n---" + name);
Record qr = Record.newRecord(Name.fromConstantString(name), Type.A, DClass.IN);
Message response = vr.send(Message.newQuery(qr));
System.out.println("AD-Flag: " + response.getHeader().getFlag(Flags.AD));
System.out.println("RCode: " + Rcode.string(response.getRcode()));
for (RRset set : response.getSectionRRsets(Section.ADDITIONAL)) {
if (set.getName().equals(Name.root) && set.getType() == Type.TXT
&& set.getDClass() == ValidatingResolver.VALIDATION_REASON_QCLASS) {
System.out.println("Reason: " + ((TXTRecord) set.first()).getStrings().get(0));
}
}
}
}
```
This should result in an output like
```
Standard resolver:
---www.dnssec-failed.org.
AD-Flag: false
RCode: NOERROR
---www.isc.org.
AD-Flag: false
RCode: NOERROR
Validating resolver:
---www.dnssec-failed.org.
AD-Flag: false
RCode: SERVFAIL
Reason: Could not establish a chain of trust to keys for [dnssec-failed.org.]. Reason: Did not match a DS to a DNSKEY.
---www.isc.org.
AD-Flag: true
RCode: NOERROR
```
Build
-----
Run `mvn package`
Configuration Options
---------------------
The validator supports a few configuration options. These can be set by calling
`ValidatingResolver.init(properties);`
### org.jitsi.dnssec.keycache.max_ttl
Maximum time-to-live (TTL) of entries in the key cache in seconds. The default
is 900s (15min).
### org.jitsi.dnssec.keycache.max_size
Maximum number of entries in the key cache. The default is 1000.
### org.jitsi.dnssec.nsec3.iterations.N
Maximum iteration count for the NSEC3 hashing function depending on the key
size N. The defaults are:
- 1024 bit keys: 512 iterations (i.e. org.jitsi.dnssec.nsec3.iterations.1024=512)
- 2048 bit keys: 500 iterations
- 4096 bit keys: 2500 iterations
### org.jitsi.dnssec.trust\_anchor_file
The file from which the trust anchor should be loaded. There is no default.
It must be formatted like a DNS zone master file. It can only contain DS
or DNSKEY records.
### org.jitsi.dnssec.digest_preference
Defines the preferred DS record digest algorithm if a zone has registered
multiple DS records. The list is comma-separated, highest preference first.
If this property is not specified, the DS record with the highest [digest ID]
(http://www.iana.org/assignments/ds-rr-types/ds-rr-types.xhtml) is chosen.
To stay compliant with the RFCs, the mandatory digest IDs must be listed in
this property. The GOST digest is not (yet) implemented.
dnssecjava-1.1.3/TODO.md 0000664 0000000 0000000 00000006255 13020541473 0014733 0 ustar 00root root 0000000 0000000 CNAME Handling
--------------
The CNAME handling is terribly inefficient. A recursive nameserver is required
to deliver all intermediate results in the response to the original query. The
code however still splits up the query into each part and performs a query for
each CNAME till the end of the chain is reached.
This should be changed to follow the chain in the response of the original
query, but is not so easy because the validation only has the keys for each
original query.
A possible workaround would be to synthesize the intermediate responses from
the original query. Easy for positive responses, but for NXDOMAIN - which
NSEC(3)s are to be included...?
DNAME Handling
--------------
A DNAME causes validation failures during priming because the synthesized
CNAME is not considered valid. Some unit-tests are failing due to this.
API
---
- Provide the final failure reason as a (localizable) string
Code Coverage / Bugs
--------------------
- The code still has some untested parts:
- Wildcard/ENT DS delegations!!!
- ANY responses, especially wildcard expansion
- Insecure NSEC3 NODATA responses
- Wildcard NODATA responses might pass too broad cases
- Behavior if all NSEC3s are not understandable
- NXDOMAIN when a NSEC would prove that a wildcard exists
- Exceptions thrown by the head resolver
- Bogus/Insecure handling of CNAME answer to DS query
- Async calling of the validator
- Passthrough without validation if the CD flag is set
- Various cases in dsReponseToKeForNodata
- longestCommonName
- Various NSEC NODATA cases
- Unsupported algorithm or digest ID cases
- NSEC3 iteration count configuration
- NSEC3 with unsupported hash algorithm
- Multiple NSEC3s for a zone
- NSEC3: proveClosestEncloser
- NSEC3: proveNodata
- NSEC3: proveNoDS
- Implement http://tools.ietf.org/html/rfc4509#section-3 to prevent downgrade attacks
- http://tools.ietf.org/html/rfc6840#section-4.3 (CNAME bit check)
- http://tools.ietf.org/html/rfc6840#section-4.4 (Insecure Delegation Proofs)
- http://tools.ietf.org/html/rfc6840#section-5.4 (Caution about Local Policy and Multiple RRSIGs)
- Refuse DNAME wildcards (RFC4597)
- Test validating against a non-Bind9 head solver
- Rate limit queries to be able to validate against Google's public resolvers
- JaCoCo/EclEmma doesn't work with jmockit enabled at the same time without
specifying -javaagent:jmockit-1.14.jar as a VM argument.
Unit Tests
----------
- The tests currently rely on an online connection to a recursive server and
external zones. They must be able to run offline.
- Some tests will start to fail after June 9, 2013 because the signature date
is compared against the current system time. This must be changed to take
the test authoring time. To make this possible DNSJAVA must probably be
changed.
DNSJAVA
-------
- Fix the Maven project definition to build correctly with a local lib folder
as it is not officially distributed on Maven central
- Version 2.1.5 contains a bug in the Name constructor and needs at least
SVN rev. 1686
- Remove local-repo once 2.1.6 appears on Maven central
dnssecjava-1.1.3/checkstyle.xml 0000664 0000000 0000000 00000011761 13020541473 0016522 0 ustar 00root root 0000000 0000000
dnssecjava-1.1.3/pom.xml 0000664 0000000 0000000 00000026463 13020541473 0015164 0 ustar 00root root 0000000 0000000
4.0.0
org.jitsi
dnssecjava
bundle
1.1.3
dnssecjava
https://jitsi.org/dnssec
1.6.6
UTF-8
UTF-8
checkstyle.xml
dnsjava
dnsjava
2.1.7
org.slf4j
slf4j-api
1.7.18
junit
junit
4.12
test
org.powermock
powermock-module-junit4
${powermock.version}
test
org.powermock
powermock-api-mockito
${powermock.version}
test
org.slf4j
slf4j-jdk14
1.7.18
test
joda-time
joda-time
2.9.6
test
org.apache.maven.plugins
maven-compiler-plugin
3.0
1.6
1.6
org.apache.felix
maven-bundle-plugin
2.3.7
true
maven-surefire-plugin
2.14
**/*.java
1C
true
org.apache.maven.plugins
maven-checkstyle-plugin
2.17
compile
check
${checkstyle.config.location}
warning
true
0
true
false
true
org.jacoco
jacoco-maven-plugin
0.7.5.201505241946
prepare-agent
prepare-agent
org.eluder.coveralls
coveralls-maven-plugin
3.1.0
org.apache.maven.plugins
maven-release-plugin
2.5.3
org.eclipse.m2e
lifecycle-mapping
1.0.0
org.apache.maven.plugins
maven-checkstyle-plugin
[2.11,)
check
jitsi.org
https://jitsi.org
https://github.com/ibauersachs/dnssecjava
scm:git:https://github.com/ibauersachs/dnssecjava.git
scm:git:https://github.com/ibauersachs/dnssecjava.git
dnssecjava-1.1.3
A DNSSEC validating stub resolver for Java.
Eclipse Public License v1.0
http://www.eclipse.org/legal/epl-v10.html
repo
ibauersachs
Ingo Bauersachs
ingo@jitsi.org
release-prepare
performRelease
true
org.apache.maven.plugins
maven-source-plugin
2.2.1
attach-sources
jar-no-fork
org.apache.maven.plugins
maven-javadoc-plugin
2.9.1
attach-javadocs
jar
release
performRelease
true
org.apache.maven.plugins
maven-gpg-plugin
1.5
sign-artifacts
verify
sign
org.sonatype.plugins
nexus-staging-maven-plugin
1.6.3
true
ossrh
https://oss.sonatype.org/
true
ossrh
https://oss.sonatype.org/content/repositories/snapshots
ossrh
https://oss.sonatype.org/service/local/staging/deploy/maven2/
dnssecjava-1.1.3/src/ 0000775 0000000 0000000 00000000000 13020541473 0014423 5 ustar 00root root 0000000 0000000 dnssecjava-1.1.3/src/main/ 0000775 0000000 0000000 00000000000 13020541473 0015347 5 ustar 00root root 0000000 0000000 dnssecjava-1.1.3/src/main/java/ 0000775 0000000 0000000 00000000000 13020541473 0016270 5 ustar 00root root 0000000 0000000 dnssecjava-1.1.3/src/main/java/org/ 0000775 0000000 0000000 00000000000 13020541473 0017057 5 ustar 00root root 0000000 0000000 dnssecjava-1.1.3/src/main/java/org/jitsi/ 0000775 0000000 0000000 00000000000 13020541473 0020201 5 ustar 00root root 0000000 0000000 dnssecjava-1.1.3/src/main/java/org/jitsi/dnssec/ 0000775 0000000 0000000 00000000000 13020541473 0021460 5 ustar 00root root 0000000 0000000 dnssecjava-1.1.3/src/main/java/org/jitsi/dnssec/R.java 0000664 0000000 0000000 00000004246 13020541473 0022532 0 ustar 00root root 0000000 0000000 /*
* dnssecjava - a DNSSEC validating stub resolver for Java
* Copyright (c) 2013-2015 Ingo Bauersachs
*
* All rights reserved. This program and the accompanying materials
* are made available under the terms of the Eclipse Public License v1.0
* which accompanies this distribution, and is available at
* http://www.eclipse.org/legal/epl-v10.html
*/
package org.jitsi.dnssec;
import java.text.MessageFormat;
import java.util.MissingResourceException;
import java.util.ResourceBundle;
/**
* Utility class to retrieve messages from {@link ResourceBundle}s.
*/
public final class R {
private static ResourceBundle rb;
private static boolean useNeutral;
private R() {
}
/**
* Programmatically set the ResourceBundle to be used.
*
* @param resourceBundle the bundle to be used.
*/
public static void setBundle(ResourceBundle resourceBundle) {
R.rb = resourceBundle;
}
/**
* If set to {@code true}, messages will not be obtained from resource bundles but formatted as
* {@code key:param1:...:paramN}.
*
* @param useNeutral {@code true} to use neutral messages, {@code false} otherwise
*/
public static void setUseNeutralMessages(boolean useNeutral) {
R.useNeutral = useNeutral;
}
/**
* Gets a translated message.
*
* @param key The message key to retrieve.
* @param values The values that fill placeholders in the message.
* @return The formatted message.
*/
public static String get(String key, Object... values) {
if (useNeutral) {
return getNeutral(key, values);
}
try {
if (R.rb == null) {
rb = ResourceBundle.getBundle("messages");
}
return MessageFormat.format(rb.getString(key), values);
}
catch (MissingResourceException e) {
return getNeutral(key, values);
}
}
private static String getNeutral(String key, Object[] values) {
StringBuilder sb = new StringBuilder(key);
for (Object val : values) {
sb.append(":");
sb.append(val);
}
return sb.toString();
}
}
dnssecjava-1.1.3/src/main/java/org/jitsi/dnssec/SMessage.java 0000664 0000000 0000000 00000026530 13020541473 0024040 0 ustar 00root root 0000000 0000000 /*
* dnssecjava - a DNSSEC validating stub resolver for Java
* Copyright (c) 2013-2015 Ingo Bauersachs
*
* All rights reserved. This program and the accompanying materials
* are made available under the terms of the Eclipse Public License v1.0
* which accompanies this distribution, and is available at
* http://www.eclipse.org/legal/epl-v10.html
*
* This file is based on work under the following copyright and permission
* notice:
*
* Copyright (c) 2005 VeriSign. All rights reserved.
*
* Redistribution and use in source and binary forms, with or without
* modification, are permitted provided that the following conditions are
* met:
*
* 1. Redistributions of source code must retain the above copyright
* notice, this list of conditions and the following disclaimer.
* 2. Redistributions in binary form must reproduce the above copyright
* notice, this list of conditions and the following disclaimer in the
* documentation and/or other materials provided with the distribution.
* 3. The name of the author may not be used to endorse or promote
* products derived from this software without specific prior written
* permission.
*
* THIS SOFTWARE IS PROVIDED BY THE AUTHOR ``AS IS'' AND ANY EXPRESS OR
* IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED
* WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
* ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY DIRECT,
* INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES
* (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR
* SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
* HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT,
* STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING
* IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE
* POSSIBILITY OF SUCH DAMAGE.
*/
package org.jitsi.dnssec;
import java.util.ArrayList;
import java.util.Iterator;
import java.util.LinkedList;
import java.util.List;
import org.slf4j.Logger;
import org.slf4j.LoggerFactory;
import org.xbill.DNS.Flags;
import org.xbill.DNS.Header;
import org.xbill.DNS.Message;
import org.xbill.DNS.Name;
import org.xbill.DNS.OPTRecord;
import org.xbill.DNS.RRset;
import org.xbill.DNS.Record;
import org.xbill.DNS.Section;
import org.xbill.DNS.Type;
/**
* This class represents a DNS message with validator state and some utility
* methods.
*
* @author davidb
*/
public class SMessage {
private static final Logger logger = LoggerFactory.getLogger(SMessage.class);
private static final SRRset[] EMPTY_SRRSET_ARRAY = new SRRset[0];
private static final int NUM_SECTIONS = 3;
private static final int MAX_FLAGS = 16;
private static final int EXTENDED_FLAGS_BIT_OFFSET = 4;
private Header header;
private Record question;
private OPTRecord oPTRecord;
private List[] sections;
private SecurityStatus securityStatus;
private String bogusReason;
/**
* Creates a instance of this class.
*
* @param h The header of the original message.
*/
@SuppressWarnings("unchecked")
public SMessage(Header h) {
this.sections = new List[NUM_SECTIONS];
this.header = h;
this.securityStatus = SecurityStatus.UNCHECKED;
}
/**
* Creates a new instance of this class.
*
* @param id The ID of the DNS query or response message.
* @param question The question section of the query or response.
*/
public SMessage(int id, Record question) {
this(new Header(id));
this.question = question;
}
/**
* Creates a new instance of this class.
*
* @param m The DNS message to wrap.
*/
public SMessage(Message m) {
this(m.getHeader());
this.question = m.getQuestion();
this.oPTRecord = m.getOPT();
for (int i = Section.ANSWER; i <= Section.ADDITIONAL; i++) {
RRset[] rrsets = m.getSectionRRsets(i);
for (int j = 0; j < rrsets.length; j++) {
this.addRRset(new SRRset(rrsets[j]), i);
}
}
}
/**
* Gets the header of this message.
*
* @return The header of this message.
*/
public Header getHeader() {
return this.header;
}
/**
* Gets the question section of this message.
*
* @return The question section of this message.
*/
public Record getQuestion() {
return this.question;
}
/**
* Gets signed RRsets for the queried section.
*
* @param section The section whose RRsets are demanded.
* @return Signed RRsets for the queried section.
*/
public List getSectionRRsets(int section) {
this.checkSectionValidity(section);
if (this.sections[section - 1] == null) {
this.sections[section - 1] = new LinkedList();
}
return this.sections[section - 1];
}
private void addRRset(SRRset srrset, int section) {
this.checkSectionValidity(section);
if (srrset.getType() == Type.OPT) {
this.oPTRecord = (OPTRecord)srrset.first();
return;
}
List sectionList = this.getSectionRRsets(section);
sectionList.add(srrset);
}
private void checkSectionValidity(int section) {
if (section <= Section.QUESTION || section > Section.ADDITIONAL) {
throw new IllegalArgumentException("Invalid section");
}
}
/**
* Gets signed RRsets for the queried section.
*
* @param section The section whose RRsets are demanded.
* @param qtype Filter the results for these record types.
* @return Signed RRsets for the queried section.
*/
public SRRset[] getSectionRRsets(int section, int qtype) {
List slist = this.getSectionRRsets(section);
if (slist.size() == 0) {
return EMPTY_SRRSET_ARRAY;
}
List result = new ArrayList(slist.size());
for (SRRset rrset : slist) {
if (rrset.getType() == qtype) {
result.add(rrset);
}
}
return result.toArray(EMPTY_SRRSET_ARRAY);
}
/**
* Gets the result code of the response message.
*
* @return The result code of the response message.
*/
public int getRcode() {
int rcode = this.header.getRcode();
if (this.oPTRecord != null) {
rcode += this.oPTRecord.getExtendedRcode() << EXTENDED_FLAGS_BIT_OFFSET;
}
return rcode;
}
/**
* Gets the security status of this message.
*
* @return The security status of this message.
*/
public SecurityStatus getStatus() {
return this.securityStatus;
}
/**
* Sets the security status for this message.
*
* @param status the new security status for this message.
*/
public void setStatus(SecurityStatus status) {
this.securityStatus = status;
}
/**
* Sets the security status for this message.
*
* @param status the new security status for this message.
* @param reason Why this message's status is set as indicated.
*/
public void setStatus(SecurityStatus status, String reason) {
this.securityStatus = status;
this.bogusReason = reason;
logger.debug(this.bogusReason);
}
/**
* Gets the reason why this messages' status is bogus.
*
* @return The reason why this messages' status is bogus.
*/
public String getBogusReason() {
return this.bogusReason;
}
/**
* Sets the security status of this message to bogus and sets the reason.
*
* @param reason Why this message's status is bogus.
*/
public void setBogus(String reason) {
this.setStatus(SecurityStatus.BOGUS);
this.bogusReason = reason;
logger.debug(this.bogusReason);
}
/**
* Gets this message as a standard DNSJAVA message.
*
* @return This message as a standard DNSJAVA message.
*/
public Message getMessage() {
// Generate our new message.
Message m = new Message(this.header.getID());
// Convert the header
// We do this for two reasons:
// 1) setCount() is package scope, so we can't do that, and
// 2) setting the header on a message after creating the
// message frequently gets stuff out of sync, leading to malformed wire
// format messages.
Header h = m.getHeader();
h.setOpcode(this.header.getOpcode());
h.setRcode(this.header.getRcode());
for (int i = 0; i < MAX_FLAGS; i++) {
if (Flags.isFlag(i) && this.header.getFlag(i)) {
h.setFlag(i);
}
}
// Add all the records. -- this will set the counts correctly in the
// message header.
if (this.question != null) {
m.addRecord(this.question, Section.QUESTION);
}
for (int sec = Section.ANSWER; sec <= Section.ADDITIONAL; sec++) {
List slist = this.getSectionRRsets(sec);
for (SRRset rrset : slist) {
for (Iterator> j = rrset.rrs(); j.hasNext();) {
m.addRecord((Record)j.next(), sec);
}
for (Iterator> j = rrset.sigs(); j.hasNext();) {
m.addRecord((Record)j.next(), sec);
}
}
}
if (this.oPTRecord != null) {
m.addRecord(this.oPTRecord, Section.ADDITIONAL);
}
return m;
}
/**
* Gets the number of records.
*
* @param section The section for which the records are counted.
* @return The number of records for the queried section.
*/
public int getCount(int section) {
if (section == Section.QUESTION) {
return 1;
}
List sectionList = this.getSectionRRsets(section);
if (sectionList.size() == 0) {
return 0;
}
int count = 0;
for (SRRset sr : sectionList) {
count += sr.size();
}
return count;
}
/**
* Find a specific (S)RRset in a given section.
*
* @param name the name of the RRset.
* @param type the type of the RRset.
* @param dclass the class of the RRset.
* @param section the section to look in (ANSWER to ADDITIONAL)
*
* @return The SRRset if found, null otherwise.
*/
public SRRset findRRset(Name name, int type, int dclass, int section) {
this.checkSectionValidity(section);
for (SRRset set : this.getSectionRRsets(section)) {
if (set.getName().equals(name) && set.getType() == type && set.getDClass() == dclass) {
return set;
}
}
return null;
}
/**
* Find an "answer" RRset. This will look for RRsets in the ANSWER section
* that match the <qname,qtype,qclass>, without considering CNAMEs.
*
* @param qname The starting search name.
* @param qtype The search type.
* @param qclass The search class.
*
* @return a SRRset matching the query.
*/
public SRRset findAnswerRRset(Name qname, int qtype, int qclass) {
return this.findRRset(qname, qtype, qclass, Section.ANSWER);
}
}
dnssecjava-1.1.3/src/main/java/org/jitsi/dnssec/SRRset.java 0000664 0000000 0000000 00000007617 13020541473 0023520 0 ustar 00root root 0000000 0000000 /*
* dnssecjava - a DNSSEC validating stub resolver for Java
* Copyright (c) 2013-2015 Ingo Bauersachs
*
* All rights reserved. This program and the accompanying materials
* are made available under the terms of the Eclipse Public License v1.0
* which accompanies this distribution, and is available at
* http://www.eclipse.org/legal/epl-v10.html
*
* This file is based on work under the following copyright and permission
* notice:
*
* Copyright (c) 2005 VeriSign. All rights reserved.
*
* Redistribution and use in source and binary forms, with or without
* modification, are permitted provided that the following conditions are
* met:
*
* 1. Redistributions of source code must retain the above copyright
* notice, this list of conditions and the following disclaimer.
* 2. Redistributions in binary form must reproduce the above copyright
* notice, this list of conditions and the following disclaimer in the
* documentation and/or other materials provided with the distribution.
* 3. The name of the author may not be used to endorse or promote
* products derived from this software without specific prior written
* permission.
*
* THIS SOFTWARE IS PROVIDED BY THE AUTHOR ``AS IS'' AND ANY EXPRESS OR
* IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED
* WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
* ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY DIRECT,
* INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES
* (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR
* SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
* HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT,
* STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING
* IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE
* POSSIBILITY OF SUCH DAMAGE.
*/
package org.jitsi.dnssec;
import java.util.Iterator;
import org.xbill.DNS.Name;
import org.xbill.DNS.RRSIGRecord;
import org.xbill.DNS.RRset;
import org.xbill.DNS.Record;
/**
* An extended version of {@link RRset} that adds the indication of DNSSEC
* security status.
*
* @author davidb
* @version $Revision: 286 $
*/
public class SRRset extends RRset {
private SecurityStatus securityStatus;
/** Create a new, blank SRRset. */
public SRRset() {
super();
this.securityStatus = SecurityStatus.UNCHECKED;
}
/**
* Create a new SRRset from an existing RRset. This SRRset will contain that
* same internal Record objects as the original RRset.
*
* @param r The RRset to copy.
*/
public SRRset(RRset r) {
this();
for (Iterator> i = r.rrs(); i.hasNext();) {
addRR((Record)i.next());
}
for (Iterator> i = r.sigs(); i.hasNext();) {
addRR((Record)i.next());
}
}
/**
* Return the current security status (generally:
* {@link SecurityStatus#UNCHECKED}, {@link SecurityStatus#BOGUS}, or
* {@link SecurityStatus#SECURE}).
*
* @return The security status for this set,
* {@link SecurityStatus#UNCHECKED} if it has never been set
* manually.
*/
public SecurityStatus getSecurityStatus() {
return this.securityStatus;
}
/**
* Set the current security status for this SRRset.
*
* @param status The new security status for this set.
*/
public void setSecurityStatus(SecurityStatus status) {
this.securityStatus = status;
}
/**
* @return The "signer" name for this SRRset, if signed, or null if not.
*/
public Name getSignerName() {
Iterator> sigs = sigs();
if (sigs.hasNext()) {
return ((RRSIGRecord)sigs.next()).getSigner();
}
return null;
}
}
dnssecjava-1.1.3/src/main/java/org/jitsi/dnssec/SecurityStatus.java 0000664 0000000 0000000 00000005630 13020541473 0025342 0 ustar 00root root 0000000 0000000 /*
* dnssecjava - a DNSSEC validating stub resolver for Java
* Copyright (c) 2013-2015 Ingo Bauersachs
*
* All rights reserved. This program and the accompanying materials
* are made available under the terms of the Eclipse Public License v1.0
* which accompanies this distribution, and is available at
* http://www.eclipse.org/legal/epl-v10.html
*
* This file is based on work under the following copyright and permission
* notice:
*
* Copyright (c) 2005 VeriSign. All rights reserved.
*
* Redistribution and use in source and binary forms, with or without
* modification, are permitted provided that the following conditions are
* met:
*
* 1. Redistributions of source code must retain the above copyright
* notice, this list of conditions and the following disclaimer.
* 2. Redistributions in binary form must reproduce the above copyright
* notice, this list of conditions and the following disclaimer in the
* documentation and/or other materials provided with the distribution.
* 3. The name of the author may not be used to endorse or promote
* products derived from this software without specific prior written
* permission.
*
* THIS SOFTWARE IS PROVIDED BY THE AUTHOR ``AS IS'' AND ANY EXPRESS OR
* IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED
* WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
* ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY DIRECT,
* INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES
* (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR
* SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
* HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT,
* STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING
* IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE
* POSSIBILITY OF SUCH DAMAGE.
*/
package org.jitsi.dnssec;
/**
* Codes for DNSSEC security statuses.
*
* @author davidb
*/
public enum SecurityStatus {
/**
* UNCHECKED means that object has yet to be validated.
*/
UNCHECKED,
/**
* BOGUS means that the object (RRset or message) failed to validate
* (according to local policy), but should have validated.
*/
BOGUS,
/**
* INDTERMINATE means that the object is insecure, but not authoritatively
* so. Generally this means that the RRset is not below a configured trust
* anchor.
*/
INDETERMINATE,
/**
* INSECURE means that the object is authoritatively known to be insecure.
* Generally this means that this RRset is below a trust anchor, but also
* below a verified, insecure delegation.
*/
INSECURE,
/**
* SECURE means that the object (RRset or message) validated according to
* local policy.
*/
SECURE;
}
dnssecjava-1.1.3/src/main/java/org/jitsi/dnssec/validator/ 0000775 0000000 0000000 00000000000 13020541473 0023445 5 ustar 00root root 0000000 0000000 dnssecjava-1.1.3/src/main/java/org/jitsi/dnssec/validator/ByteArrayComparator.java 0000664 0000000 0000000 00000005353 13020541473 0030250 0 ustar 00root root 0000000 0000000 /*
* dnssecjava - a DNSSEC validating stub resolver for Java
* Copyright (c) 2013-2015 Ingo Bauersachs
*
* All rights reserved. This program and the accompanying materials
* are made available under the terms of the Eclipse Public License v1.0
* which accompanies this distribution, and is available at
* http://www.eclipse.org/legal/epl-v10.html
*
* This file is based on work under the following copyright and permission
* notice:
*
* Copyright (c) 2005 VeriSign. All rights reserved.
*
* Redistribution and use in source and binary forms, with or without
* modification, are permitted provided that the following conditions are
* met:
*
* 1. Redistributions of source code must retain the above copyright
* notice, this list of conditions and the following disclaimer.
* 2. Redistributions in binary form must reproduce the above copyright
* notice, this list of conditions and the following disclaimer in the
* documentation and/or other materials provided with the distribution.
* 3. The name of the author may not be used to endorse or promote
* products derived from this software without specific prior written
* permission.
*
* THIS SOFTWARE IS PROVIDED BY THE AUTHOR ``AS IS'' AND ANY EXPRESS OR
* IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED
* WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
* ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY DIRECT,
* INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES
* (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR
* SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
* HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT,
* STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING
* IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE
* POSSIBILITY OF SUCH DAMAGE.
*/
package org.jitsi.dnssec.validator;
import java.util.Comparator;
/**
* This class implements a basic comparator for byte arrays. It is primarily
* useful for comparing RDATA portions of DNS records in doing DNSSEC canonical
* ordering.
*/
public class ByteArrayComparator implements Comparator {
private static final int MAX_BYTE = 0xFF;
/** {@inheritDoc} */
public int compare(Object o1, Object o2) {
byte[] b1 = (byte[])o1;
byte[] b2 = (byte[])o2;
if (b1.length != b2.length) {
return b1.length - b2.length;
}
for (int i = 0; i < b1.length; i++) {
if (b1[i] != b2[i]) {
return (b1[i] & MAX_BYTE) - (b2[i] & MAX_BYTE);
}
}
return 0;
}
}
dnssecjava-1.1.3/src/main/java/org/jitsi/dnssec/validator/DnsSecVerifier.java 0000664 0000000 0000000 00000020014 13020541473 0027160 0 ustar 00root root 0000000 0000000 /*
* dnssecjava - a DNSSEC validating stub resolver for Java
* Copyright (c) 2013-2015 Ingo Bauersachs
*
* All rights reserved. This program and the accompanying materials
* are made available under the terms of the Eclipse Public License v1.0
* which accompanies this distribution, and is available at
* http://www.eclipse.org/legal/epl-v10.html
*
* This file is based on work under the following copyright and permission
* notice:
*
* Copyright (c) 2005 VeriSign. All rights reserved.
*
* Redistribution and use in source and binary forms, with or without
* modification, are permitted provided that the following conditions are
* met:
*
* 1. Redistributions of source code must retain the above copyright
* notice, this list of conditions and the following disclaimer.
* 2. Redistributions in binary form must reproduce the above copyright
* notice, this list of conditions and the following disclaimer in the
* documentation and/or other materials provided with the distribution.
* 3. The name of the author may not be used to endorse or promote
* products derived from this software without specific prior written
* permission.
*
* THIS SOFTWARE IS PROVIDED BY THE AUTHOR ``AS IS'' AND ANY EXPRESS OR
* IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED
* WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
* ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY DIRECT,
* INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES
* (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR
* SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
* HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT,
* STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING
* IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE
* POSSIBILITY OF SUCH DAMAGE.
*/
package org.jitsi.dnssec.validator;
import java.util.ArrayList;
import java.util.Iterator;
import java.util.List;
import org.jitsi.dnssec.SecurityStatus;
import org.slf4j.Logger;
import org.slf4j.LoggerFactory;
import org.xbill.DNS.DNSKEYRecord;
import org.xbill.DNS.DNSSEC;
import org.xbill.DNS.DNSSEC.DNSSECException;
import org.xbill.DNS.RRSIGRecord;
import org.xbill.DNS.RRset;
/**
* A class for performing basic DNSSEC verification. The DNSJAVA package
* contains a similar class. This is a reimplementation that allows us to have
* finer control over the validation process.
*
* @author davidb
* @version $Revision: 361 $
*/
public class DnsSecVerifier {
private static final Logger logger = LoggerFactory.getLogger(DnsSecVerifier.class);
/**
* Find the matching DNSKEY(s) to an RRSIG within a DNSKEY rrset. Normally
* this will only return one DNSKEY. It can return more than one, since
* KeyID/Footprints are not guaranteed to be unique.
*
* @param dnskeyRrset The DNSKEY rrset to search.
* @param signature The RRSIG to match against.
* @return A List contains a one or more DNSKEYRecord objects, or null if a
* matching DNSKEY could not be found.
*/
private List findKey(RRset dnskeyRrset, RRSIGRecord signature) {
if (!signature.getSigner().equals(dnskeyRrset.getName())) {
logger.trace("findKey: could not find appropriate key because incorrect keyset was supplied. Wanted: "
+ signature.getSigner() + ", got: " + dnskeyRrset.getName());
return null;
}
int keyid = signature.getFootprint();
int alg = signature.getAlgorithm();
List res = new ArrayList(dnskeyRrset.size());
for (Iterator> i = dnskeyRrset.rrs(); i.hasNext();) {
DNSKEYRecord r = (DNSKEYRecord)i.next();
if (r.getAlgorithm() == alg && r.getFootprint() == keyid) {
res.add(r);
}
}
if (res.size() == 0) {
logger.trace("findKey: could not find a key matching the algorithm and footprint in supplied keyset. ");
return null;
}
return res;
}
/**
* Verify an RRset against a particular signature.
*
* @param rrset The RRset to verify.
* @param sigrec The signature record that signs the RRset.
* @param keyRrset The keys used to create the signature record.
*
* @return {@link SecurityStatus#SECURE} if the signature verified,
* {@link SecurityStatus#BOGUS} if it did not verify (for any
* reason), and {@link SecurityStatus#UNCHECKED} if verification
* could not be completed (usually because the public key was not
* available).
*/
private SecurityStatus verifySignature(RRset rrset, RRSIGRecord sigrec,
RRset keyRrset) {
List keys = this.findKey(keyRrset, sigrec);
if (keys == null) {
logger.trace("could not find appropriate key");
return SecurityStatus.BOGUS;
}
SecurityStatus status = SecurityStatus.UNCHECKED;
for (DNSKEYRecord key : keys) {
try {
if (!rrset.getName().subdomain(keyRrset.getName())) {
logger.debug("signer name is off-tree");
status = SecurityStatus.BOGUS;
continue;
}
DNSSEC.verify(rrset, sigrec, key);
return SecurityStatus.SECURE;
}
catch (DNSSECException e) {
logger.error("Failed to validate RRset", e);
status = SecurityStatus.BOGUS;
}
}
return status;
}
/**
* Verifies an RRset. This routine does not modify the RRset. This RRset is
* presumed to be verifiable, and the correct DNSKEY rrset is presumed to
* have been found.
*
* @param rrset The RRset to verify.
* @param keyRrset The keys to verify the signatures in the RRset to check.
* @return SecurityStatus.SECURE if the rrest verified positively,
* SecurityStatus.BOGUS otherwise.
*/
public SecurityStatus verify(RRset rrset, RRset keyRrset) {
Iterator> i = rrset.sigs();
if (!i.hasNext()) {
logger.info("RRset failed to verify due to lack of signatures");
return SecurityStatus.BOGUS;
}
while (i.hasNext()) {
RRSIGRecord sigrec = (RRSIGRecord)i.next();
SecurityStatus res = this.verifySignature(rrset, sigrec, keyRrset);
if (res == SecurityStatus.SECURE) {
return res;
}
}
logger.info("RRset failed to verify: all signatures were BOGUS");
return SecurityStatus.BOGUS;
}
/**
* Verify an RRset against a single DNSKEY. Use this when you must be
* certain that an RRset signed and verifies with a particular DNSKEY (as
* opposed to a particular DNSKEY rrset).
*
* @param rrset The rrset to verify.
* @param dnskey The DNSKEY to verify with.
* @return SecurityStatus.SECURE if the rrset verified, BOGUS otherwise.
*/
public SecurityStatus verify(RRset rrset, DNSKEYRecord dnskey) {
Iterator> i = rrset.sigs();
if (!i.hasNext()) {
logger.info("RRset failed to verify due to lack of signatures");
return SecurityStatus.BOGUS;
}
while (i.hasNext()) {
RRSIGRecord sigrec = (RRSIGRecord)i.next();
// Skip RRSIGs that do not match our given key's footprint.
if (sigrec.getFootprint() != dnskey.getFootprint()) {
continue;
}
try {
DNSSEC.verify(rrset, sigrec, dnskey);
return SecurityStatus.SECURE;
}
catch (DNSSECException e) {
logger.error("Failed to validate RRset", e);
}
}
logger.info("RRset failed to verify: all signatures were BOGUS");
return SecurityStatus.BOGUS;
}
}
dnssecjava-1.1.3/src/main/java/org/jitsi/dnssec/validator/FindKeyState.java 0000664 0000000 0000000 00000005562 13020541473 0026652 0 ustar 00root root 0000000 0000000 /*
* dnssecjava - a DNSSEC validating stub resolver for Java
* Copyright (c) 2013-2015 Ingo Bauersachs
*
* All rights reserved. This program and the accompanying materials
* are made available under the terms of the Eclipse Public License v1.0
* which accompanies this distribution, and is available at
* http://www.eclipse.org/legal/epl-v10.html
*
* This file is based on work under the following copyright and permission
* notice:
*
* Copyright (c) 2005 VeriSign. All rights reserved.
*
* Redistribution and use in source and binary forms, with or without
* modification, are permitted provided that the following conditions are
* met:
*
* 1. Redistributions of source code must retain the above copyright
* notice, this list of conditions and the following disclaimer.
* 2. Redistributions in binary form must reproduce the above copyright
* notice, this list of conditions and the following disclaimer in the
* documentation and/or other materials provided with the distribution.
* 3. The name of the author may not be used to endorse or promote
* products derived from this software without specific prior written
* permission.
*
* THIS SOFTWARE IS PROVIDED BY THE AUTHOR ``AS IS'' AND ANY EXPRESS OR
* IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED
* WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
* ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY DIRECT,
* INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES
* (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR
* SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
* HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT,
* STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING
* IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE
* POSSIBILITY OF SUCH DAMAGE.
*/
package org.jitsi.dnssec.validator;
import org.jitsi.dnssec.SRRset;
import org.xbill.DNS.Name;
/**
* State-object for the key-finding phase.
*/
class FindKeyState {
/**
* The (initial) DS RRset for the following DNSKEY search and validate
* phase.
*/
SRRset dsRRset;
/**
* Iteratively holds the key during the search phase.
*/
KeyEntry keyEntry;
/**
* The name of the key to search. This is taken from the RRSIG's signer name
* or the query name if no signer name is available.
*/
Name signerName;
/**
* The query class if the key to find.
*/
int qclass;
/**
* Sets the key name being searched for when a DS response is provably not a
* delegation point.
*/
Name emptyDSName;
/**
* The initial key name when the key search is started from a trust anchor.
*/
Name currentDSKeyName;
}
dnssecjava-1.1.3/src/main/java/org/jitsi/dnssec/validator/JustifiedSecStatus.java 0000664 0000000 0000000 00000001624 13020541473 0030100 0 ustar 00root root 0000000 0000000 /*
* dnssecjava - a DNSSEC validating stub resolver for Java
* Copyright (c) 2013-2015 Ingo Bauersachs
*
* All rights reserved. This program and the accompanying materials
* are made available under the terms of the Eclipse Public License v1.0
* which accompanies this distribution, and is available at
* http://www.eclipse.org/legal/epl-v10.html
*/
package org.jitsi.dnssec.validator;
import org.jitsi.dnssec.SecurityStatus;
/**
* Codes for DNSSEC security statuses along with a reason why the status was
* determined.
*/
class JustifiedSecStatus {
SecurityStatus status;
String reason;
/**
* Creates a new instance of this class.
*
* @param status The security status.
* @param reason The reason why the status was determined.
*/
JustifiedSecStatus(SecurityStatus status, String reason) {
this.status = status;
this.reason = reason;
}
}
dnssecjava-1.1.3/src/main/java/org/jitsi/dnssec/validator/KeyCache.java 0000664 0000000 0000000 00000015310 13020541473 0025764 0 ustar 00root root 0000000 0000000 /*
* dnssecjava - a DNSSEC validating stub resolver for Java
* Copyright (c) 2013-2015 Ingo Bauersachs
*
* All rights reserved. This program and the accompanying materials
* are made available under the terms of the Eclipse Public License v1.0
* which accompanies this distribution, and is available at
* http://www.eclipse.org/legal/epl-v10.html
*
* This file is based on work under the following copyright and permission
* notice:
*
* Copyright (c) 2005 VeriSign. All rights reserved.
*
* Redistribution and use in source and binary forms, with or without
* modification, are permitted provided that the following conditions are
* met:
*
* 1. Redistributions of source code must retain the above copyright
* notice, this list of conditions and the following disclaimer.
* 2. Redistributions in binary form must reproduce the above copyright
* notice, this list of conditions and the following disclaimer in the
* documentation and/or other materials provided with the distribution.
* 3. The name of the author may not be used to endorse or promote
* products derived from this software without specific prior written
* permission.
*
* THIS SOFTWARE IS PROVIDED BY THE AUTHOR ``AS IS'' AND ANY EXPRESS OR
* IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED
* WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
* ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY DIRECT,
* INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES
* (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR
* SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
* HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT,
* STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING
* IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE
* POSSIBILITY OF SUCH DAMAGE.
*/
package org.jitsi.dnssec.validator;
import java.util.Collections;
import java.util.Date;
import java.util.LinkedHashMap;
import java.util.Map;
import java.util.Properties;
import org.jitsi.dnssec.SecurityStatus;
import org.xbill.DNS.Name;
import org.xbill.DNS.Type;
/**
* Cache for DNSKEY RRsets or corresponding null/bad key entries with a limited
* size and respect for TTL values.
*
* @author davidb
* @author Ingo Bauersachs
*/
public class KeyCache {
/** Name of the property that configures the maximum cache TTL. */
public static final String MAX_TTL_CONFIG = "org.jitsi.dnssec.keycache.max_ttl";
/** Name of the property that configures the maximum cache size. */
public static final String MAX_CACHE_SIZE_CONFIG = "org.jitsi.dnssec.keycache.max_size";
private static final int MILLISECONDS_PER_SECOND = 1000;
private static final int DEFAULT_MAX_TTL = 900;
private static final int DEFAULT_MAX_CACHE_SIZE = 1000;
/** This is the main caching data structure. */
private Map cache;
/** This is the maximum TTL [s] that all key cache entries will have. */
private long maxTtl = DEFAULT_MAX_TTL;
/** This is the maximum number of entries that the key cache will hold. */
private int maxCacheSize = DEFAULT_MAX_CACHE_SIZE;
/**
* Creates a new instance of this class.
*/
public KeyCache() {
this.cache = Collections.synchronizedMap(new LinkedHashMap() {
@Override
protected boolean removeEldestEntry(java.util.Map.Entry eldest) {
return size() >= KeyCache.this.maxCacheSize;
}
});
}
/**
* Initialize the cache. This implementation recognizes the following
* configuration parameters:
*
* org.jitsi.dnssec.keycache.max_ttl
* The maximum TTL to apply to any cache entry.
* org.jitsi.dnssec.keycache.max_size
* The maximum number of entries that the cache will hold.
*
*
* @param config The configuration information.
*/
public void init(Properties config) {
if (config == null) {
return;
}
String s = config.getProperty(MAX_TTL_CONFIG);
if (s != null) {
this.maxTtl = Long.parseLong(s);
}
s = config.getProperty(MAX_CACHE_SIZE_CONFIG);
if (s != null) {
this.maxCacheSize = Integer.parseInt(s);
}
}
/**
* Find the 'closest' trusted DNSKEY rrset to the given name.
*
* @param n The name to start the search.
* @param dclass The class this DNSKEY rrset should be in.
*
* @return The 'closest' entry to 'n' in the same class as 'dclass'.
*/
public KeyEntry find(Name n, int dclass) {
while (n.labels() > 0) {
String k = this.key(n, dclass);
KeyEntry entry = this.lookupEntry(k);
if (entry != null) {
return entry;
}
n = new Name(n, 1);
}
return null;
}
/**
* Store a {@link KeyEntry} in the cache. The entry will be ignored if it's
* rrset isn't a DNSKEY rrset or if it doesn't have the SECURE security
* status.
*
* @param ke The key entry to cache.
* @return The passed {@link KeyEntry} to allow method chaining.
*/
public KeyEntry store(KeyEntry ke) {
if (ke.getRRset() != null) {
if (ke.getRRset().getType() != Type.DNSKEY) {
return ke;
}
if (ke.getRRset().getSecurityStatus() != SecurityStatus.SECURE) {
return ke;
}
}
String k = this.key(ke.getName(), ke.getDClass());
CacheEntry ce = new CacheEntry(ke, this.maxTtl);
this.cache.put(k, ce);
return ke;
}
private String key(Name n, int dclass) {
return "K" + dclass + "/" + n;
}
private KeyEntry lookupEntry(String key) {
CacheEntry centry = this.cache.get(key);
if (centry == null) {
return null;
}
if (centry.expiration.before(new Date())) {
this.cache.remove(key);
return null;
}
return centry.keyEntry;
}
/**
* Utility class to cache key entries with an expiration date.
*/
private static class CacheEntry {
private Date expiration;
private KeyEntry keyEntry;
CacheEntry(KeyEntry keyEntry, long maxTtl) {
long ttl = keyEntry.getTTL();
if (ttl > maxTtl) {
ttl = maxTtl;
}
this.expiration = new Date(System.currentTimeMillis() + (ttl * MILLISECONDS_PER_SECOND));
this.keyEntry = keyEntry;
}
}
}
dnssecjava-1.1.3/src/main/java/org/jitsi/dnssec/validator/KeyEntry.java 0000664 0000000 0000000 00000013777 13020541473 0026101 0 ustar 00root root 0000000 0000000 /*
* dnssecjava - a DNSSEC validating stub resolver for Java
* Copyright (c) 2013-2015 Ingo Bauersachs
*
* All rights reserved. This program and the accompanying materials
* are made available under the terms of the Eclipse Public License v1.0
* which accompanies this distribution, and is available at
* http://www.eclipse.org/legal/epl-v10.html
*
* This file is based on work under the following copyright and permission
* notice:
*
* Copyright (c) 2005 VeriSign. All rights reserved.
*
* Redistribution and use in source and binary forms, with or without
* modification, are permitted provided that the following conditions are
* met:
*
* 1. Redistributions of source code must retain the above copyright
* notice, this list of conditions and the following disclaimer.
* 2. Redistributions in binary form must reproduce the above copyright
* notice, this list of conditions and the following disclaimer in the
* documentation and/or other materials provided with the distribution.
* 3. The name of the author may not be used to endorse or promote
* products derived from this software without specific prior written
* permission.
*
* THIS SOFTWARE IS PROVIDED BY THE AUTHOR ``AS IS'' AND ANY EXPRESS OR
* IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED
* WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
* ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY DIRECT,
* INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES
* (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR
* SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
* HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT,
* STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING
* IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE
* POSSIBILITY OF SUCH DAMAGE.
*/
package org.jitsi.dnssec.validator;
import org.slf4j.Logger;
import org.slf4j.LoggerFactory;
import org.jitsi.dnssec.SRRset;
import org.xbill.DNS.Name;
/**
* DNSKEY cache entry for a given {@link Name}, with or without actual keys.
*/
public final class KeyEntry {
private static final Logger logger = LoggerFactory.getLogger(KeyEntry.class);
private SRRset rrset;
private Name name;
private int dclass;
private long ttl;
private boolean isBad = false;
private String badReason;
/**
* Create a new, positive key entry.
*
* @param rrset The set of records to cache.
*/
private KeyEntry(SRRset rrset) {
this.rrset = rrset;
this.name = rrset.getName();
this.dclass = rrset.getDClass();
this.ttl = rrset.getTTL();
}
private KeyEntry(Name name, int dclass, long ttl, boolean isBad) {
this.rrset = null;
this.name = name;
this.dclass = dclass;
this.ttl = ttl;
this.isBad = isBad;
}
/**
* Creates a new key entry from actual DNSKEYs.
*
* @param rrset The DNSKEYs to cache.
* @return The created key entry.
*/
public static KeyEntry newKeyEntry(SRRset rrset) {
return new KeyEntry(rrset);
}
/**
* Creates a new trusted key entry without actual DNSKEYs, i.e. it is proven
* that there are no keys.
*
* @param n The name for which the empty cache entry is created.
* @param dclass The DNS class.
* @param ttl The TTL [s].
* @return The created key entry.
*/
public static KeyEntry newNullKeyEntry(Name n, int dclass, long ttl) {
return new KeyEntry(n, dclass, ttl, false);
}
/**
* Creates a new bad key entry without actual DNSKEYs, i.e. from a response
* that did not validate.
*
* @param n The name for which the bad cache entry is created.
* @param dclass The DNS class.
* @param ttl The TTL [s].
* @return The created key entry.s
*/
public static KeyEntry newBadKeyEntry(Name n, int dclass, long ttl) {
return new KeyEntry(n, dclass, ttl, true);
}
/**
* Gets the DNSKEYs for the cached key entry. Can be null
.
*
* @return The DNSKEYs for the cached key entry. Can be null
.
*/
public SRRset getRRset() {
return this.rrset;
}
/**
* Gets the name of the cache entry.
*
* @return The name of the cache entry.
*/
public Name getName() {
return this.name;
}
/**
* Gets the DNS class.
*
* @return The DNS class.
*/
public int getDClass() {
return this.dclass;
}
/**
* Gets the TTL [s].
*
* @return The TTL [s].
*/
public long getTTL() {
return this.ttl;
}
/**
* Gets an indication if this is a null key, i.e. a proven secure response
* without keys.
*
* @return True
is it is null, false
otherwise.
*/
public boolean isNull() {
return !this.isBad && this.rrset == null;
}
/**
* Gets an indication if this is a bad key, i.e. an invalid response.
*
* @return True
is it is bad, false
otherwise.
*/
public boolean isBad() {
return this.isBad;
}
/**
* Gets an indication if this is a good key, i.e. a proven secure response
* with keys.
*
* @return True
is it is good, false
otherwise.
*/
public boolean isGood() {
return !this.isBad && this.rrset != null;
}
/**
* Gets the reason why this key entry is bad.
*
* @return The reason why this key entry is bad.
*/
public String getBadReason() {
return this.badReason;
}
/**
* Sets the reason why this key entry is bad.
*
* @param reason The reason why this key entry is bad.
*/
public void setBadReason(String reason) {
this.badReason = reason;
logger.debug(this.badReason);
}
}
dnssecjava-1.1.3/src/main/java/org/jitsi/dnssec/validator/NSEC3ValUtils.java 0000664 0000000 0000000 00000073424 13020541473 0026621 0 ustar 00root root 0000000 0000000 /*
* dnssecjava - a DNSSEC validating stub resolver for Java
* Copyright (c) 2013-2015 Ingo Bauersachs
*
* All rights reserved. This program and the accompanying materials
* are made available under the terms of the Eclipse Public License v1.0
* which accompanies this distribution, and is available at
* http://www.eclipse.org/legal/epl-v10.html
*
* This file is based on work under the following copyright and permission
* notice:
*
* Copyright (c) 2005 VeriSign. All rights reserved.
*
* Redistribution and use in source and binary forms, with or without
* modification, are permitted provided that the following conditions are
* met:
*
* 1. Redistributions of source code must retain the above copyright
* notice, this list of conditions and the following disclaimer.
* 2. Redistributions in binary form must reproduce the above copyright
* notice, this list of conditions and the following disclaimer in the
* documentation and/or other materials provided with the distribution.
* 3. The name of the author may not be used to endorse or promote
* products derived from this software without specific prior written
* permission.
*
* THIS SOFTWARE IS PROVIDED BY THE AUTHOR ``AS IS'' AND ANY EXPRESS OR
* IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED
* WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
* ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY DIRECT,
* INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES
* (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR
* SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
* HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT,
* STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING
* IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE
* POSSIBILITY OF SUCH DAMAGE.
*/
package org.jitsi.dnssec.validator;
import java.security.NoSuchAlgorithmException;
import java.security.interfaces.DSAPublicKey;
import java.security.interfaces.ECPublicKey;
import java.security.interfaces.RSAPublicKey;
import java.util.HashMap;
import java.util.Iterator;
import java.util.List;
import java.util.ListIterator;
import java.util.Map;
import java.util.Properties;
import java.util.TreeMap;
import org.slf4j.Logger;
import org.slf4j.LoggerFactory;
import org.jitsi.dnssec.SRRset;
import org.jitsi.dnssec.SecurityStatus;
import org.xbill.DNS.DNSKEYRecord;
import org.xbill.DNS.DNSSEC.Algorithm;
import org.xbill.DNS.DNSSEC.DNSSECException;
import org.xbill.DNS.NSEC3Record;
import org.xbill.DNS.NSEC3Record.Flags;
import org.xbill.DNS.Name;
import org.xbill.DNS.NameTooLongException;
import org.xbill.DNS.TextParseException;
import org.xbill.DNS.Type;
import org.xbill.DNS.utils.base32;
/**
* NSEC3 non-existence proof utilities.
*/
final class NSEC3ValUtils {
// The logger to use in static methods.
private static final Logger logger = LoggerFactory.getLogger(NSEC3ValUtils.class);
private static final Name ASTERISK_LABEL = Name.fromConstantString("*");
private static final int MAX_ITERATION_COUNT = 65536;
private TreeMap maxIterations;
/**
* Creates a new instance of this class.
*/
NSEC3ValUtils() {
// see RFC5155#10.3 for the max iteration count
// CHECKSTYLE:OFF
this.maxIterations = new TreeMap();
this.maxIterations.put(1024, 150);
this.maxIterations.put(2048, 500);
this.maxIterations.put(4096, 2500);
// CHECKSTYLE:ON
}
/**
* Loads the configuration data. Supported properties are:
*
* org.jitsi.dnssec.nsec3.iterations.M=N
*
*
* @param config The configuration data.
*/
void init(Properties config) {
boolean first = true;
for (Map.Entry, ?> s : config.entrySet()) {
String key = s.getKey().toString();
if (key.startsWith("org.jitsi.dnssec.nsec3.iterations")) {
int keySize = Integer.parseInt(key.substring(key.lastIndexOf(".") + 1));
int iters = Integer.parseInt(s.getValue().toString());
if (iters > MAX_ITERATION_COUNT) {
throw new IllegalArgumentException("Iteration count too high.");
}
if (first) {
first = false;
this.maxIterations.clear();
}
this.maxIterations.put(keySize, iters);
}
}
}
/**
* This is just a simple class to encapsulate the response to a closest
* encloser proof.
*/
private final class CEResponse {
private Name closestEncloser;
private NSEC3Record ceNsec3;
private NSEC3Record ncNsec3;
/**
*
* bogus if no closest encloser could be proven.
* secure if a closest encloser could be proven, ce is set.
* insecure if the closest-encloser candidate turns out to prove
* that an insecure delegation exists above the qname.
*
*/
private SecurityStatus status = SecurityStatus.UNCHECKED;
private CEResponse(Name ce, NSEC3Record nsec3) {
this.closestEncloser = ce;
this.ceNsec3 = nsec3;
}
}
private boolean supportsHashAlgorithm(int alg) {
return alg == NSEC3Record.SHA1_DIGEST_ID;
}
/**
* Remove all records whose algorithm is unknown.
*
* @param nsec3s List of NSEC3 records to check. The list is modified by
* this method.
*/
public void stripUnknownAlgNSEC3s(List nsec3s) {
for (ListIterator i = nsec3s.listIterator(); i.hasNext();) {
NSEC3Record nsec3 = (NSEC3Record)i.next().first();
if (!this.supportsHashAlgorithm(nsec3.getHashAlgorithm())) {
i.remove();
}
}
}
/**
* Given the name of a closest encloser, return the name *.closest_encloser.
*
* @param closestEncloser The name to start with.
* @return The wildcard name.
*/
private Name ceWildcard(Name closestEncloser) {
try {
return Name.concatenate(ASTERISK_LABEL, closestEncloser);
}
catch (NameTooLongException e) {
return null;
}
}
/**
* Given a qname and its proven closest encloser, calculate the "next
* closest" name. Basically, this is the name that is one label longer than
* the closest encloser that is still a subdomain of qname.
*
* @param qname The qname.
* @param closestEncloser The closest encloser name.
* @return The next closer name.
*/
private Name nextClosest(Name qname, Name closestEncloser) {
int strip = qname.labels() - closestEncloser.labels() - 1;
return (strip > 0) ? new Name(qname, strip) : qname;
}
/**
* Find the NSEC3Record that matches a hash of a name.
*
* @param name The name to find.
* @param zonename The name of the zone that the NSEC3s are from.
* @param nsec3s A list of NSEC3Records from a given message.
*
* @return The matching NSEC3Record if one is present, null otherwise.
*/
private NSEC3Record findMatchingNSEC3(Name name, Name zonename, List nsec3s) {
base32 b32 = new base32(base32.Alphabet.BASE32HEX, false, false);
for (SRRset set : nsec3s) {
try {
NSEC3Record nsec3 = (NSEC3Record)set.first();
byte[] hash = nsec3.hashName(name);
Name complete = new Name(b32.toString(hash), zonename);
if (complete.equals(nsec3.getName())) {
return nsec3;
}
}
catch (NoSuchAlgorithmException e) {
logger.debug("Unrecognized NSEC3 in set:" + set, e);
}
catch (TextParseException e) {
logger.debug("Unrecognized NSEC3 in set:" + set, e);
}
}
return null;
}
/**
* Given a hash and a candidate NSEC3Record, determine if that NSEC3Record
* covers the hash. Covers specifically means that the hash is in between
* the owner and next hashes and does not equal either.
*
* @param nsec3 The candidate NSEC3Record.
* @param zonename The zone name.
* @param hash The precalculated hash.
* @return True if the NSEC3Record covers the hash.
*/
private boolean nsec3Covers(NSEC3Record nsec3, Name zonename, byte[] hash) {
if (!new Name(nsec3.getName(), 1).equals(zonename)) {
return false;
}
byte[] owner = new base32(base32.Alphabet.BASE32HEX, false, false).fromString(nsec3.getName().getLabelString(0));
byte[] next = nsec3.getNext();
// This is the "normal case: owner < next and owner < hash < next
ByteArrayComparator bac = new ByteArrayComparator();
if (bac.compare(owner, hash) < 0 && bac.compare(hash, next) < 0) {
return true;
}
// this is the end of zone case:
// next <= owner && (hash > owner || hash < next)
if (bac.compare(next, owner) <= 0 && (bac.compare(hash, owner) > 0 || bac.compare(hash, next) < 0)) {
return true;
}
// Otherwise, the NSEC3 does not cover the hash.
return false;
}
/**
* Given a pre-hashed name, find a covering NSEC3 from among a list of
* NSEC3s.
*
* @param name The name to consider.
* @param zonename The name of the zone.
* @param nsec3s The list of NSEC3s present in a message.
* @return A covering NSEC3 if one is present, null otherwise.
*/
private NSEC3Record findCoveringNSEC3(Name name, Name zonename, List nsec3s) {
for (SRRset set : nsec3s) {
try {
NSEC3Record nsec3 = (NSEC3Record)set.first();
byte[] hash = nsec3.hashName(name);
if (this.nsec3Covers(nsec3, zonename, hash)) {
return nsec3;
}
}
catch (NoSuchAlgorithmException e) {
logger.debug("Unrecognized NSEC3 in set:" + set, e);
}
}
return null;
}
/**
* Given a name and a list of NSEC3s, find the candidate closest encloser.
* This will be the first ancestor of 'name' (including itself) to have a
* matching NSEC3 RR.
*
* @param name The name the start with.
* @param zonename The name of the zone that the NSEC3s came from.
* @param nsec3s The list of NSEC3s.
*
* @return A CEResponse containing the closest encloser name and the NSEC3
* RR that matched it, or null if there wasn't one.
*/
private CEResponse findClosestEncloser(Name name, Name zonename, List nsec3s) {
// This scans from longest name to shortest, so the first match we find
// is the only viable candidate.
// FIXME: modify so that the NSEC3 matching the zone apex need not be
// present.
while (name.labels() >= zonename.labels()) {
NSEC3Record nsec3 = this.findMatchingNSEC3(name, zonename, nsec3s);
if (nsec3 != null) {
return new CEResponse(name, nsec3);
}
name = new Name(name, 1);
}
return null;
}
/**
* Given a List of nsec3 RRs, find and prove the closest encloser to qname.
*
* @param qname The qname in question.
* @param zonename The name of the zone that the NSEC3 RRs come from.
* @param nsec3s The list of NSEC3s found the this response (already
* verified).
* @return A CEResponse object which contains the closest encloser name and
* the NSEC3 that matches it.
*/
private CEResponse proveClosestEncloser(Name qname, Name zonename, List nsec3s) {
CEResponse candidate = this.findClosestEncloser(qname, zonename, nsec3s);
if (candidate == null) {
logger.debug("proveClosestEncloser: could not find a candidate for the closest encloser.");
candidate = new CEResponse(Name.empty, null);
candidate.status = SecurityStatus.BOGUS;
return candidate;
}
if (candidate.closestEncloser.equals(qname)) {
logger.debug("proveClosestEncloser: proved that qname existed!");
candidate.status = SecurityStatus.BOGUS;
return candidate;
}
// If the closest encloser is actually a delegation, then the response
// should have been a referral. If it is a DNAME, then it should have
// been a DNAME response.
if (candidate.ceNsec3.hasType(Type.NS) && !candidate.ceNsec3.hasType(Type.SOA)) {
if (!candidate.ceNsec3.hasType(Type.DS)) {
candidate.status = SecurityStatus.INSECURE;
return candidate;
}
logger.debug("proveClosestEncloser: closest encloser was a delegation!");
candidate.status = SecurityStatus.BOGUS;
return candidate;
}
if (candidate.ceNsec3.hasType(Type.DNAME)) {
logger.debug("proveClosestEncloser: closest encloser was a DNAME!");
candidate.status = SecurityStatus.BOGUS;
return candidate;
}
// Otherwise, we need to show that the next closer name is covered.
Name nextClosest = this.nextClosest(qname, candidate.closestEncloser);
candidate.ncNsec3 = this.findCoveringNSEC3(nextClosest, zonename, nsec3s);
if (candidate.ncNsec3 == null) {
logger.debug("Could not find proof that the closest encloser was the closest encloser");
candidate.status = SecurityStatus.BOGUS;
return candidate;
}
candidate.status = SecurityStatus.SECURE;
return candidate;
}
private boolean validIterations(SRRset nsec, KeyCache keyCache) {
SRRset dnskeyRrset = keyCache.find(nsec.getSignerName(), nsec.getDClass()).getRRset();
// for now, we return the maximum iterations based simply on the key
// algorithms that may have been used to sign the NSEC3 RRsets.
try {
for (Iterator> i = dnskeyRrset.rrs(); i.hasNext();) {
DNSKEYRecord dnskey = (DNSKEYRecord)i.next();
int keysize;
switch (dnskey.getAlgorithm()) {
case Algorithm.RSAMD5:
return false; // obsoleted by rfc6944
case Algorithm.RSASHA1:
case Algorithm.RSASHA256:
case Algorithm.RSASHA512:
case Algorithm.RSA_NSEC3_SHA1:
keysize = ((RSAPublicKey)dnskey.getPublicKey()).getModulus().bitLength();
break;
case Algorithm.DSA:
case Algorithm.DSA_NSEC3_SHA1:
keysize = ((DSAPublicKey)dnskey.getPublicKey()).getParams().getP().bitLength();
break;
case Algorithm.ECDSAP256SHA256:
case Algorithm.ECDSAP384SHA384:
keysize = ((ECPublicKey)dnskey.getPublicKey()).getParams().getCurve().getField().getFieldSize();
break;
default:
return false;
}
Integer keyIters = this.maxIterations.floorKey(keysize);
if (keyIters == null) {
keyIters = this.maxIterations.firstKey();
}
keyIters = this.maxIterations.get(keyIters);
if (((NSEC3Record)nsec.first()).getIterations() > keyIters) {
return false;
}
}
return true;
}
catch (DNSSECException e) {
logger.error("Could not get public key from NSEC3 record", e);
return false;
}
}
/**
* Determine if all of the NSEC3s in a response are legally ignoreable
* (i.e., their presence should lead to an INSECURE result). Currently, this
* is solely based on iterations.
*
* @param nsec3s The list of NSEC3s. If there is more than one set of NSEC3
* parameters present, this test will not be performed.
* @param dnskeyRrset The set of validating DNSKEYs.
* @return true if all of the NSEC3s can be legally ignored, false if not.
*/
public boolean allNSEC3sIgnoreable(List nsec3s, KeyCache dnskeyRrset) {
Map foundNsecs = new HashMap();
ByteArrayComparator comp = new ByteArrayComparator();
for (SRRset set : nsec3s) {
@SuppressWarnings("unchecked")
Iterator it = (Iterator)set.rrs();
while (it.hasNext()) {
NSEC3Record current = it.next();
Name key = new Name(current.getName(), 1);
NSEC3Record previous = foundNsecs.get(key);
if (previous != null) {
if (current.getHashAlgorithm() != previous.getHashAlgorithm()) {
return true;
}
if (current.getIterations() != previous.getIterations()) {
return true;
}
if (current.getSalt() == null ^ previous.getSalt() == null) {
return true;
}
if (current.getSalt() != null && comp.compare(current.getSalt(), previous.getSalt()) != 0) {
return true;
}
}
else {
foundNsecs.put(key, current);
}
}
}
for (SRRset set : nsec3s) {
if (this.validIterations(set, dnskeyRrset)) {
return false;
}
}
return true;
}
/**
* Determine if the set of NSEC3 records provided with a response prove NAME
* ERROR. This means that the NSEC3s prove a) the closest encloser exists,
* b) the direct child of the closest encloser towards qname doesn't exist,
* and c) *.closest encloser does not exist.
*
* @param nsec3s The list of NSEC3s.
* @param qname The query name to check against.
* @param zonename This is the name of the zone that the NSEC3s belong to.
* This may be discovered in any number of ways. A good one is to
* use the signerName from the NSEC3 record's RRSIG.
* @return {@link SecurityStatus#SECURE} of the Name Error is proven by the
* NSEC3 RRs, {@link SecurityStatus#BOGUS} if not,
* {@link SecurityStatus#INSECURE} if all of the NSEC3s could be
* validly ignored.
*/
public SecurityStatus proveNameError(List nsec3s, Name qname, Name zonename) {
if (nsec3s == null || nsec3s.size() == 0) {
return SecurityStatus.BOGUS;
}
// First locate and prove the closest encloser to qname. We will use the
// variant that fails if the closest encloser turns out to be qname.
CEResponse ce = this.proveClosestEncloser(qname, zonename, nsec3s);
if (ce.status != SecurityStatus.SECURE) {
logger.debug("proveNameError: failed to prove a closest encloser.");
return ce.status;
}
// At this point, we know that qname does not exist. Now we need to
// prove
// that the wildcard does not exist.
Name wc = this.ceWildcard(ce.closestEncloser);
NSEC3Record nsec3 = this.findCoveringNSEC3(wc, zonename, nsec3s);
if (nsec3 == null) {
logger.debug("proveNameError: could not prove that the applicable wildcard did not exist.");
return SecurityStatus.BOGUS;
}
if ((ce.ncNsec3.getFlags() & Flags.OPT_OUT) == Flags.OPT_OUT) {
logger.debug("nsec3 nameerror proof: nc has optout");
return SecurityStatus.INSECURE;
}
return SecurityStatus.SECURE;
}
/**
* Determine if the NSEC3s provided in a response prove the NOERROR/NODATA
* status. There are a number of different variants to this:
*
* 1) Normal NODATA -- qname is matched to an NSEC3 record, type is not
* present.
*
* 2) ENT NODATA -- because there must be NSEC3 record for
* empty-non-terminals, this is the same as #1.
*
* 3) NSEC3 ownername NODATA -- qname matched an existing, lone NSEC3
* ownername, but qtype was not NSEC3. NOTE: as of nsec-05, this case no
* longer exists.
*
* 4) Wildcard NODATA -- A wildcard matched the name, but not the type.
*
* 5) Opt-In DS NODATA -- the qname is covered by an opt-in span and qtype
* == DS. (or maybe some future record with the same parent-side-only
* property)
*
* @param nsec3s The NSEC3Records to consider.
* @param qname The qname in question.
* @param qtype The qtype in question.
* @param zonename The name of the zone that the NSEC3s came from.
* @return {@link SecurityStatus#SECURE} if the NSEC3s prove the
* proposition, {@link SecurityStatus#INSECURE} if qname is under
* opt-out, {@link SecurityStatus#BOGUS} otherwise.
*/
public SecurityStatus proveNodata(List nsec3s, Name qname, int qtype, Name zonename) {
if (nsec3s == null || nsec3s.size() == 0) {
return SecurityStatus.BOGUS;
}
NSEC3Record nsec3 = this.findMatchingNSEC3(qname, zonename, nsec3s);
// Cases 1 & 2.
if (nsec3 != null) {
if (nsec3.hasType(qtype)) {
logger.debug("proveNodata: Matching NSEC3 proved that type existed!");
return SecurityStatus.BOGUS;
}
if (nsec3.hasType(Type.CNAME)) {
logger.debug("proveNodata: Matching NSEC3 proved that a CNAME existed!");
return SecurityStatus.BOGUS;
}
if (qtype == Type.DS && nsec3.hasType(Type.SOA) && !Name.root.equals(qname)) {
logger.debug("proveNodata: apex NSEC3 abused for no DS proof, bogus");
return SecurityStatus.BOGUS;
}
else if (qtype != Type.DS && nsec3.hasType(Type.NS) && !nsec3.hasType(Type.SOA)) {
if (!nsec3.hasType(Type.DS)) {
logger.debug("proveNodata: matching NSEC3 is insecure delegation");
return SecurityStatus.INSECURE;
}
logger.debug("proveNodata: matching NSEC3 is a delegation, bogus");
return SecurityStatus.BOGUS;
}
return SecurityStatus.SECURE;
}
// For cases 3 - 5, we need the proven closest encloser, and it can't
// match qname. Although, at this point, we know that it won't since we
// just checked that.
CEResponse ce = this.proveClosestEncloser(qname, zonename, nsec3s);
// At this point, not finding a match or a proven closest encloser is a
// problem.
if (ce.status == SecurityStatus.BOGUS) {
logger.debug("proveNodata: did not match qname, nor found a proven closest encloser.");
return SecurityStatus.BOGUS;
}
else if (ce.status == SecurityStatus.INSECURE && qtype != Type.DS) {
logger.debug("proveNodata: closest nsec3 is insecure delegation.");
return SecurityStatus.INSECURE;
}
// Case 3: REMOVED
// Case 4:
Name wc = this.ceWildcard(ce.closestEncloser);
nsec3 = this.findMatchingNSEC3(wc, zonename, nsec3s);
if (nsec3 != null) {
if (nsec3.hasType(qtype)) {
logger.debug("proveNodata: matching wildcard had qtype!");
return SecurityStatus.BOGUS;
}
else if (nsec3.hasType(Type.CNAME)) {
logger.debug("nsec3 nodata proof: matching wildcard had a CNAME, bogus");
return SecurityStatus.BOGUS;
}
if (qtype == Type.DS && qname.labels() != 1 && nsec3.hasType(Type.SOA)) {
logger.debug("nsec3 nodata proof: matching wildcard for no DS proof has a SOA, bogus");
return SecurityStatus.BOGUS;
}
else if (qtype != Type.DS && nsec3.hasType(Type.NS) && !nsec3.hasType(Type.SOA)) {
logger.debug("nsec3 nodata proof: matching wilcard is a delegation, bogus");
return SecurityStatus.BOGUS;
}
if (ce.ncNsec3 != null && (ce.ncNsec3.getFlags() & Flags.OPT_OUT) == Flags.OPT_OUT) {
logger.debug("nsec3 nodata proof: matching wildcard is in optout range, insecure");
return SecurityStatus.INSECURE;
}
return SecurityStatus.SECURE;
}
// Case 5.
// Due to forwarders, cnames, and other collating effects, we
// can see the ordinary unsigned data from a zone beneath an
// insecure delegation under an optout here */
if (ce.ncNsec3 == null) {
logger.debug("nsec3 nodata proof: no next closer nsec3");
return SecurityStatus.BOGUS;
}
// We need to make sure that the covering NSEC3 is opt-out.
if ((ce.ncNsec3.getFlags() & Flags.OPT_OUT) == 0) {
if (qtype != Type.DS) {
logger.debug("proveNodata: covering NSEC3 was not opt-out in an opt-out DS NOERROR/NODATA case.");
}
else {
logger.debug("proveNodata: could not find matching NSEC3, nor matching wildcard, and qtype is not DS -- no more options.");
}
return SecurityStatus.BOGUS;
}
// RFC5155 section 9.2: if nc has optout then no AD flag set
return SecurityStatus.INSECURE;
}
/**
* Prove that a positive wildcard match was appropriate (no direct match
* RRset).
*
* @param nsec3s The NSEC3 records to work with.
* @param qname The qname that was matched to the wildard
* @param zonename The name of the zone that the NSEC3s come from.
* @param wildcard The purported wildcard that matched.
* @return true if the NSEC3 records prove this case.
*/
public SecurityStatus proveWildcard(List nsec3s, Name qname, Name zonename, Name wildcard) {
if (nsec3s == null || nsec3s.size() == 0 || qname == null || wildcard == null) {
return SecurityStatus.BOGUS;
}
// We know what the (purported) closest encloser is by just looking at
// the supposed generating wildcard.
CEResponse candidate = new CEResponse(new Name(wildcard, 1), null);
// Now we still need to prove that the original data did not exist.
// Otherwise, we need to show that the next closer name is covered.
Name nextClosest = this.nextClosest(qname, candidate.closestEncloser);
candidate.ncNsec3 = this.findCoveringNSEC3(nextClosest, zonename, nsec3s);
if (candidate.ncNsec3 == null) {
logger.debug("proveWildcard: did not find a covering NSEC3 that covered the next closer name to " + qname + " from " + candidate.closestEncloser
+ " (derived from wildcard " + wildcard + ")");
return SecurityStatus.BOGUS;
}
if ((candidate.ncNsec3.getFlags() & Flags.OPT_OUT) == Flags.OPT_OUT) {
return SecurityStatus.INSECURE;
}
return SecurityStatus.SECURE;
}
/**
* Prove that a DS response either had no DS, or wasn't a delegation point.
*
* Fundamentally there are two cases here: normal NODATA and Opt-In NODATA.
*
* @param nsec3s The NSEC3 RRs to examine.
* @param qname The name of the DS in question.
* @param zonename The name of the zone that the NSEC3 RRs come from.
*
* @return SecurityStatus.SECURE if it was proven that there is no DS in a
* secure (i.e., not opt-in) way, SecurityStatus.INSECURE if there
* was no DS in an insecure (i.e., opt-in) way,
* SecurityStatus.INDETERMINATE if it was clear that this wasn't a
* delegation point, and SecurityStatus.BOGUS if the proofs don't
* work out.
*/
public SecurityStatus proveNoDS(List nsec3s, Name qname, Name zonename) {
if (nsec3s == null || nsec3s.size() == 0) {
return SecurityStatus.BOGUS;
}
// Look for a matching NSEC3 to qname -- this is the normal NODATA case.
NSEC3Record nsec3 = this.findMatchingNSEC3(qname, zonename, nsec3s);
if (nsec3 != null) {
// If the matching NSEC3 has the SOA bit set, it is from the wrong
// zone (the child instead of the parent). If it has the DS bit set,
// then we were lied to.
if (nsec3.hasType(Type.SOA) || nsec3.hasType(Type.DS)) {
return SecurityStatus.BOGUS;
}
// If the NSEC3 RR doesn't have the NS bit set, then this wasn't a
// delegation point.
if (!nsec3.hasType(Type.NS)) {
return SecurityStatus.INDETERMINATE;
}
// Otherwise, this proves no DS.
return SecurityStatus.SECURE;
}
// Otherwise, we are probably in the opt-in case.
CEResponse ce = this.proveClosestEncloser(qname, zonename, nsec3s);
if (ce.status != SecurityStatus.SECURE) {
return SecurityStatus.BOGUS;
}
// If we had the closest encloser proof, then we need to check that the
// covering NSEC3 was opt-in -- the proveClosestEncloser step already
// checked to see if the closest encloser was a delegation or DNAME.
if (ce.ncNsec3.getFlags() == 1) {
return SecurityStatus.SECURE;
}
return SecurityStatus.BOGUS;
}
}
dnssecjava-1.1.3/src/main/java/org/jitsi/dnssec/validator/ResponseClassification.java 0000664 0000000 0000000 00000005337 13020541473 0030772 0 ustar 00root root 0000000 0000000 /*
* dnssecjava - a DNSSEC validating stub resolver for Java
* Copyright (c) 2013-2015 Ingo Bauersachs
*
* All rights reserved. This program and the accompanying materials
* are made available under the terms of the Eclipse Public License v1.0
* which accompanies this distribution, and is available at
* http://www.eclipse.org/legal/epl-v10.html
*
* This file is based on work under the following copyright and permission
* notice:
*
* Copyright (c) 2005 VeriSign. All rights reserved.
*
* Redistribution and use in source and binary forms, with or without
* modification, are permitted provided that the following conditions are
* met:
*
* 1. Redistributions of source code must retain the above copyright
* notice, this list of conditions and the following disclaimer.
* 2. Redistributions in binary form must reproduce the above copyright
* notice, this list of conditions and the following disclaimer in the
* documentation and/or other materials provided with the distribution.
* 3. The name of the author may not be used to endorse or promote
* products derived from this software without specific prior written
* permission.
*
* THIS SOFTWARE IS PROVIDED BY THE AUTHOR ``AS IS'' AND ANY EXPRESS OR
* IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED
* WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
* ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY DIRECT,
* INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES
* (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR
* SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
* HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT,
* STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING
* IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE
* POSSIBILITY OF SUCH DAMAGE.
*/
package org.jitsi.dnssec.validator;
/**
* These are response subtypes. They are necessary for determining the
* validation strategy. They have no bearing on the iterative resolution
* algorithm, so they are confined here.
*/
public enum ResponseClassification {
/** Not a recognized subtype. */
UNKNOWN,
/** A postive, direct, response. */
POSITIVE,
/** A postive response, with a CNAME/DNAME chain. */
CNAME,
/** A NOERROR/NODATA response. */
NODATA,
/** A NXDOMAIN response. */
NAMEERROR,
/** A response to a qtype=ANY query. */
ANY,
/** A response with CNAMES that points to a non-existing type. */
CNAME_NODATA,
/** A response with CNAMES that points into the void. */
CNAME_NAMEERROR;
}
dnssecjava-1.1.3/src/main/java/org/jitsi/dnssec/validator/TrustAnchorStore.java 0000664 0000000 0000000 00000011251 13020541473 0027601 0 ustar 00root root 0000000 0000000 /*
* dnssecjava - a DNSSEC validating stub resolver for Java
* Copyright (c) 2013-2015 Ingo Bauersachs
*
* All rights reserved. This program and the accompanying materials
* are made available under the terms of the Eclipse Public License v1.0
* which accompanies this distribution, and is available at
* http://www.eclipse.org/legal/epl-v10.html
*
* This file is based on work under the following copyright and permission
* notice:
*
* Copyright (c) 2005 VeriSign. All rights reserved.
*
* Redistribution and use in source and binary forms, with or without
* modification, are permitted provided that the following conditions are
* met:
*
* 1. Redistributions of source code must retain the above copyright
* notice, this list of conditions and the following disclaimer.
* 2. Redistributions in binary form must reproduce the above copyright
* notice, this list of conditions and the following disclaimer in the
* documentation and/or other materials provided with the distribution.
* 3. The name of the author may not be used to endorse or promote
* products derived from this software without specific prior written
* permission.
*
* THIS SOFTWARE IS PROVIDED BY THE AUTHOR ``AS IS'' AND ANY EXPRESS OR
* IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED
* WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
* ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY DIRECT,
* INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES
* (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR
* SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
* HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT,
* STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING
* IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE
* POSSIBILITY OF SUCH DAMAGE.
*/
package org.jitsi.dnssec.validator;
import java.util.HashMap;
import java.util.Iterator;
import java.util.Map;
import org.jitsi.dnssec.SRRset;
import org.jitsi.dnssec.SecurityStatus;
import org.xbill.DNS.DNSKEYRecord;
import org.xbill.DNS.DSRecord;
import org.xbill.DNS.Name;
import org.xbill.DNS.Record;
import org.xbill.DNS.Type;
/**
* Storage for DS or DNSKEY records that are known to be trusted.
*
* @author davidb
*/
public class TrustAnchorStore {
private Map map;
/**
* Creates a new instance of this class.
*/
public TrustAnchorStore() {
this.map = new HashMap();
}
/**
* Stores the given RRset as known trusted keys. Existing keys for the same
* name and class are overwritten.
*
* @param rrset The key set to store as trusted.
*/
public void store(SRRset rrset) {
if (rrset.getType() != Type.DS && rrset.getType() != Type.DNSKEY) {
throw new IllegalArgumentException("Trust anchors can only be DS or DNSKEY records");
}
if (rrset.getType() == Type.DNSKEY) {
SRRset temp = new SRRset();
Iterator> it = rrset.rrs();
while (it.hasNext()) {
DNSKEYRecord key = (DNSKEYRecord)it.next();
DSRecord r = new DSRecord(key.getName(), key.getDClass(), key.getTTL(), DSRecord.Digest.SHA384, key);
temp.addRR(r);
}
rrset = temp;
}
String k = this.key(rrset.getName(), rrset.getDClass());
rrset.setSecurityStatus(SecurityStatus.SECURE);
SRRset previous = this.map.put(k, rrset);
if (previous != null) {
Iterator> rrs = previous.rrs();
while (rrs.hasNext()) {
rrset.addRR((Record)rrs.next());
}
}
}
/**
* Gets the closest trusted key for the given name or null
if
* no match is found.
*
* @param name The name to search for.
* @param dclass The class of the keys.
* @return The closest found key for name
or null
.
*/
public SRRset find(Name name, int dclass) {
while (name.labels() > 0) {
String k = this.key(name, dclass);
SRRset r = this.lookup(k);
if (r != null) {
return r;
}
name = new Name(name, 1);
}
return null;
}
/**
* Removes all stored trust anchors.
*/
public void clear() {
this.map.clear();
}
private SRRset lookup(String key) {
return this.map.get(key);
}
private String key(Name n, int dclass) {
return "T" + dclass + "/" + n;
}
}
dnssecjava-1.1.3/src/main/java/org/jitsi/dnssec/validator/ValUtils.java 0000664 0000000 0000000 00000077702 13020541473 0026070 0 ustar 00root root 0000000 0000000 /*
* dnssecjava - a DNSSEC validating stub resolver for Java
* Copyright (c) 2013-2015 Ingo Bauersachs
*
* All rights reserved. This program and the accompanying materials
* are made available under the terms of the Eclipse Public License v1.0
* which accompanies this distribution, and is available at
* http://www.eclipse.org/legal/epl-v10.html
*
* This file is based on work under the following copyright and permission
* notice:
*
* Copyright (c) 2005 VeriSign. All rights reserved.
*
* Redistribution and use in source and binary forms, with or without
* modification, are permitted provided that the following conditions are
* met:
*
* 1. Redistributions of source code must retain the above copyright
* notice, this list of conditions and the following disclaimer.
* 2. Redistributions in binary form must reproduce the above copyright
* notice, this list of conditions and the following disclaimer in the
* documentation and/or other materials provided with the distribution.
* 3. The name of the author may not be used to endorse or promote
* products derived from this software without specific prior written
* permission.
*
* THIS SOFTWARE IS PROVIDED BY THE AUTHOR ``AS IS'' AND ANY EXPRESS OR
* IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED
* WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
* ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY DIRECT,
* INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES
* (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR
* SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
* HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT,
* STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING
* IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE
* POSSIBILITY OF SUCH DAMAGE.
*/
package org.jitsi.dnssec.validator;
import java.util.Iterator;
import java.util.Properties;
import org.slf4j.Logger;
import org.slf4j.LoggerFactory;
import org.jitsi.dnssec.R;
import org.jitsi.dnssec.SMessage;
import org.jitsi.dnssec.SRRset;
import org.jitsi.dnssec.SecurityStatus;
import org.xbill.DNS.DClass;
import org.xbill.DNS.DNSKEYRecord;
import org.xbill.DNS.DNSSEC.Algorithm;
import org.xbill.DNS.DSRecord;
import org.xbill.DNS.DSRecord.Digest;
import org.xbill.DNS.Message;
import org.xbill.DNS.NSECRecord;
import org.xbill.DNS.Name;
import org.xbill.DNS.NameTooLongException;
import org.xbill.DNS.RRSIGRecord;
import org.xbill.DNS.RRset;
import org.xbill.DNS.Rcode;
import org.xbill.DNS.Record;
import org.xbill.DNS.Section;
import org.xbill.DNS.Type;
/**
* This is a collection of routines encompassing the logic of validating
* different message types.
*
* @author davidb
*/
public class ValUtils {
public static final String DIGEST_PREFERENCE = "org.jitsi.dnssec.digest_preference";
private static final Logger logger = LoggerFactory.getLogger(ValUtils.class);
private static final Name WILDCARD = Name.fromConstantString("*");
/** A local copy of the verifier object. */
private DnsSecVerifier verifier;
private int[] digestPreference = null;
/**
* Creates a new instance of this class.
*/
public ValUtils() {
this.verifier = new DnsSecVerifier();
}
/**
* Initialize the module. The only recognized configuration value is
* {@link #DIGEST_PREFERENCE}.
*
* @param config The configuration data for this module.
*/
public void init(Properties config) {
String dp = config.getProperty(DIGEST_PREFERENCE);
if (dp != null) {
String[] dpdata = dp.split(",");
this.digestPreference = new int[dpdata.length];
for (int i = 0; i < dpdata.length; i++) {
this.digestPreference[i] = Integer.parseInt(dpdata[i]);
if (!isDigestSupported(this.digestPreference[i])) {
throw new IllegalArgumentException("Unsupported digest ID in digest preferences");
}
}
}
}
/**
* Given a response, classify ANSWER responses into a subtype.
*
* @param m The response to classify.
*
* @return A subtype ranging from UNKNOWN to NAMEERROR.
*/
public static ResponseClassification classifyResponse(SMessage m) {
// Normal Name Error's are easy to detect -- but don't mistake a CNAME
// chain ending in NXDOMAIN.
if (m.getRcode() == Rcode.NXDOMAIN && m.getCount(Section.ANSWER) == 0) {
return ResponseClassification.NAMEERROR;
}
// Next is NODATA
if (m.getCount(Section.ANSWER) == 0) {
return ResponseClassification.NODATA;
}
// We distinguish between CNAME response and other positive/negative
// responses because CNAME answers require extra processing.
int qtype = m.getQuestion().getType();
// We distinguish between ANY and CNAME or POSITIVE because ANY
// responses are validated differently.
if (qtype == Type.ANY) {
return ResponseClassification.ANY;
}
boolean hadCname = false;
for (RRset set : m.getSectionRRsets(Section.ANSWER)) {
if (set.getType() == qtype) {
return ResponseClassification.POSITIVE;
}
if (set.getType() == Type.CNAME || set.getType() == Type.DNAME) {
hadCname = true;
if (qtype == Type.DS) {
return ResponseClassification.CNAME;
}
}
}
if (hadCname) {
if (m.getRcode() == Rcode.NXDOMAIN) {
return ResponseClassification.CNAME_NAMEERROR;
}
else {
return ResponseClassification.CNAME_NODATA;
}
}
logger.warn("Failed to classify response message:\n" + m);
return ResponseClassification.UNKNOWN;
}
/**
* Given a DS rrset and a DNSKEY rrset, match the DS to a DNSKEY and verify
* the DNSKEY rrset with that key.
*
* @param dnskeyRrset The DNSKEY rrset to match against. The security status
* of this rrset will be updated on a successful verification.
* @param dsRrset The DS rrset to match with. This rrset must already be
* trusted.
* @param badKeyTTL The TTL [s] for keys determined to be bad.
*
* @return a KeyEntry. This will either contain the now trusted dnskey
* RRset, a "null" key entry indicating that this DS rrset/DNSKEY
* pair indicate an secure end to the island of trust (i.e., unknown
* algorithms), or a "bad" KeyEntry if the dnskey RRset fails to
* verify. Note that the "null" response should generally only occur
* in a private algorithm scenario: normally this sort of thing is
* checked before fetching the matching DNSKEY rrset.
*/
public KeyEntry verifyNewDNSKEYs(SRRset dnskeyRrset, SRRset dsRrset, long badKeyTTL) {
if (!atLeastOneDigestSupported(dsRrset)) {
KeyEntry ke = KeyEntry.newNullKeyEntry(dsRrset.getName(), dsRrset.getDClass(), dsRrset.getTTL());
ke.setBadReason(R.get("failed.ds.nodigest", dsRrset.getName()));
return ke;
}
if (!atLeastOneSupportedAlgorithm(dsRrset)) {
KeyEntry ke = KeyEntry.newNullKeyEntry(dsRrset.getName(), dsRrset.getDClass(), dsRrset.getTTL());
ke.setBadReason(R.get("failed.ds.noalg", dsRrset.getName()));
return ke;
}
int favoriteDigestID = this.favoriteDSDigestID(dsRrset);
for (Iterator> i = dsRrset.rrs(); i.hasNext();) {
DSRecord ds = (DSRecord)i.next();
if (ds.getDigestID() != favoriteDigestID) {
continue;
}
DNSKEY: for (Iterator> j = dnskeyRrset.rrs(); j.hasNext();) {
DNSKEYRecord dnskey = (DNSKEYRecord)j.next();
// Skip DNSKEYs that don't match the basic criteria.
if (ds.getFootprint() != dnskey.getFootprint() || ds.getAlgorithm() != dnskey.getAlgorithm()) {
continue;
}
// Convert the candidate DNSKEY into a hash using the same DS
// hash algorithm.
DSRecord keyDigest = new DSRecord(Name.root, ds.getDClass(), 0, ds.getDigestID(), dnskey);
byte[] keyHash = keyDigest.getDigest();
byte[] dsHash = ds.getDigest();
// see if there is a length mismatch (unlikely)
if (keyHash.length != dsHash.length) {
continue;
}
for (int k = 0; k < keyHash.length; k++) {
if (keyHash[k] != dsHash[k]) {
continue DNSKEY;
}
}
// Otherwise, we have a match! Make sure that the DNSKEY
// verifies *with this key*.
SecurityStatus res = this.verifier.verify(dnskeyRrset, dnskey);
if (res == SecurityStatus.SECURE) {
logger.trace("DS matched DNSKEY.");
dnskeyRrset.setSecurityStatus(SecurityStatus.SECURE);
return KeyEntry.newKeyEntry(dnskeyRrset);
}
// If it didn't validate with the DNSKEY, try the next one!
}
}
// If any were understandable, then it is bad.
KeyEntry badKey = KeyEntry.newBadKeyEntry(dsRrset.getName(), dsRrset.getDClass(), badKeyTTL);
badKey.setBadReason(R.get("dnskey.no_ds_match"));
return badKey;
}
/**
* Gets the digest ID for the favorite (best) algorithm that is support in a
* given DS set.
*
* The order of preference can be configured with the property
* {@value #DIGEST_PREFERENCE}. If the property is not set, the highest
* supported number is returned.
*
* @param dsset The DS set to check for the favorite algorithm.
* @return The favorite digest ID or 0 if none is supported. 0 is not a
* known digest ID.
*/
int favoriteDSDigestID(SRRset dsset) {
if (this.digestPreference == null) {
int max = 0;
for (Iterator> rrs = dsset.rrs(); rrs.hasNext();) {
DSRecord r = (DSRecord)rrs.next();
if (r.getDigestID() > max && isDigestSupported(r.getDigestID()) && isAlgorithmSupported(r.getAlgorithm())) {
max = r.getDigestID();
}
}
return max;
}
else {
for (int i = 0; i < this.digestPreference.length; i++) {
for (Iterator> rrs = dsset.rrs(); rrs.hasNext();) {
DSRecord r = (DSRecord)rrs.next();
if (r.getDigestID() == this.digestPreference[i]) {
return r.getDigestID();
}
}
}
}
return 0;
}
/**
* Given an SRRset that is signed by a DNSKEY found in the key_rrset, verify
* it. This will return the status (either BOGUS or SECURE) and set that
* status in rrset.
*
* @param rrset The SRRset to verify.
* @param keyRrset The set of keys to verify against.
* @return The status (BOGUS or SECURE).
*/
public SecurityStatus verifySRRset(SRRset rrset, SRRset keyRrset) {
String rrsetName = rrset.getName() + "/" + Type.string(rrset.getType()) + "/" + DClass.string(rrset.getDClass());
if (rrset.getSecurityStatus() == SecurityStatus.SECURE) {
logger.trace("verifySRRset: rrset <" + rrsetName + "> previously found to be SECURE");
return SecurityStatus.SECURE;
}
SecurityStatus status = this.verifier.verify(rrset, keyRrset);
if (status != SecurityStatus.SECURE) {
logger.debug("verifySRRset: rrset <" + rrsetName + "> found to be BAD");
status = SecurityStatus.BOGUS;
}
else {
logger.trace("verifySRRset: rrset <" + rrsetName + "> found to be SECURE");
}
rrset.setSecurityStatus(status);
return status;
}
/**
* Determine by looking at a signed RRset whether or not the RRset name was
* the result of a wildcard expansion. If so, return the name of the
* generating wildcard.
*
* @param rrset The rrset to chedck.
* @return the wildcard name, if the rrset was synthesized from a wildcard.
* null if not.
*/
public static Name rrsetWildcard(RRset rrset) {
@SuppressWarnings("unchecked")
Iterator it = (Iterator)rrset.sigs();
RRSIGRecord rrsig = it.next();
// check rest of signatures have identical label count
while (it.hasNext()) {
if (it.next().getLabels() != rrsig.getLabels()) {
throw new RuntimeException("failed.wildcard.label_count_mismatch");
}
}
// if the RRSIG label count is shorter than the number of actual labels,
// then this rrset was synthesized from a wildcard.
// Note that the RRSIG label count doesn't count the root label.
Name wn = rrset.getName();
// skip a leading wildcard label in the dname (RFC4035 2.2)
if (rrset.getName().isWild()) {
wn = new Name(wn, 1);
}
int labelDiff = (wn.labels() - 1) - rrsig.getLabels();
if (labelDiff > 0) {
return wn.wild(labelDiff);
}
return null;
}
/**
* Finds the longest domain name in common with the given name.
*
* @param domain1 The first domain to process.
* @param domain2 The second domain to process.
* @return The longest label in common of domain1 and domain2. The least
* common name is the root.
*/
public static Name longestCommonName(Name domain1, Name domain2) {
int l = Math.min(domain1.labels(), domain2.labels());
domain1 = new Name(domain1, domain1.labels() - l);
domain2 = new Name(domain2, domain2.labels() - l);
for (int i = 0; i < l - 1; i++) {
Name ns1 = new Name(domain1, i);
if (ns1.equals(new Name(domain2, i))) {
return ns1;
}
}
return Name.root;
}
/**
* Is the first Name strictly a subdomain of the second name (i.e., below
* but not equal to).
*
* @param domain1 The first domain to process.
* @param domain2 The second domain to process.
* @return True when domain1 is a strict subdomain of domain2.
*/
public static boolean strictSubdomain(Name domain1, Name domain2) {
if (domain1.labels() <= domain2.labels()) {
return false;
}
return new Name(domain1, domain1.labels() - domain2.labels()).equals(domain2);
}
/**
* Determines the 'closest encloser' - the name that has the most common
* labels between domain
and ({@link NSECRecord#getName()} or
* {@link NSECRecord#getNext()}).
*
* @param domain The name for which the closest encloser is queried.
* @param nsec The covering {@link NSECRecord} to check.
* @return The closest encloser name of domain
as defined by
* nsec
.
*/
public static Name closestEncloser(Name domain, NSECRecord nsec) {
Name n1 = longestCommonName(domain, nsec.getName());
Name n2 = longestCommonName(domain, nsec.getNext());
return (n1.labels() > n2.labels()) ? n1 : n2;
}
/**
* Gets the closest encloser of domain
prepended with a
* wildcard label.
*
* @param domain The name for which the wildcard closest encloser is
* demanded.
* @param nsec The covering NSEC that defines the encloser.
* @return The wildcard closest encloser name of domain
as
* defined by nsec
.
* @throws NameTooLongException If adding the wildcard label to the closest
* encloser results in an invalid name.
*/
public static Name nsecWildcard(Name domain, NSECRecord nsec) throws NameTooLongException {
Name origin = closestEncloser(domain, nsec);
return Name.concatenate(WILDCARD, origin);
}
/**
* Determine if the given NSEC proves a NameError (NXDOMAIN) for a given
* qname.
*
* @param nsec The NSEC to check.
* @param qname The qname to check against.
* @param signerName The signer of the NSEC RRset.
* @return true if the NSEC proves the condition.
*/
public static boolean nsecProvesNameError(NSECRecord nsec, Name qname, Name signerName) {
Name owner = nsec.getName();
Name next = nsec.getNext();
// If NSEC owner == qname, then this NSEC proves that qname exists.
if (qname.equals(owner)) {
return false;
}
// deny overreaching NSECs
if (!next.subdomain(signerName)) {
return false;
}
// If NSEC is a parent of qname, we need to check the type map
// If the parent name has a DNAME or is a delegation point, then this
// NSEC is being misused.
if (qname.subdomain(owner)) {
if (nsec.hasType(Type.DNAME)) {
return false;
}
if (nsec.hasType(Type.NS) && !nsec.hasType(Type.SOA)) {
return false;
}
}
if (owner.equals(next)) {
// this nsec is the only nsec: zone.name NSEC zone.name
// it disproves everything else but only for subdomains of that zone
if (strictSubdomain(qname, next)) {
return true;
}
}
else if (owner.compareTo(next) > 0) {
// this is the last nsec, ....(bigger) NSEC zonename(smaller)
// the names after the last (owner) name do not exist
// there are no names before the zone name in the zone
// but the qname must be a subdomain of the zone name(next).
if (owner.compareTo(qname) < 0 && strictSubdomain(qname, next)) {
return true;
}
}
else {
// regular NSEC, (smaller) NSEC (larger)
if (owner.compareTo(qname) < 0 && qname.compareTo(next) < 0) {
return true;
}
}
return false;
}
/**
* Determine if a NSEC record proves the non-existence of a wildcard that
* could have produced qname.
*
* @param nsec The nsec to check.
* @param qname The qname to check against.
* @param signerName The signer of the NSEC RRset.
* @return true if the NSEC proves the condition.
*/
public static boolean nsecProvesNoWC(NSECRecord nsec, Name qname, Name signerName) {
int qnameLabels = qname.labels();
Name ce = closestEncloser(qname, nsec);
int ceLabels = ce.labels();
for (int i = qnameLabels - ceLabels; i > 0; i--) {
Name wcName = qname.wild(i);
if (nsecProvesNameError(nsec, wcName, signerName)) {
return true;
}
}
return false;
}
/**
* Container for responses of
* {@link ValUtils#nsecProvesNodata(NSECRecord, Name, int)}.
*/
public static class NsecProvesNodataResponse {
boolean result;
Name wc;
}
/**
* Determine if a NSEC proves the NOERROR/NODATA conditions. This will also
* handle the empty non-terminal (ENT) case and partially handle the
* wildcard case. If the ownername of 'nsec' is a wildcard, the validator
* must still be provided proof that qname did not directly exist and that
* the wildcard is, in fact, *.closest_encloser.
*
* @param nsec The NSEC to check
* @param qname The query name to check against.
* @param qtype The query type to check against.
* @return true if the NSEC proves the condition.
*/
public static NsecProvesNodataResponse nsecProvesNodata(NSECRecord nsec, Name qname, int qtype) {
NsecProvesNodataResponse result = new NsecProvesNodataResponse();
if (!nsec.getName().equals(qname)) {
// empty-non-terminal checking.
// Done before wildcard, because this is an exact match,
// and would prevent a wildcard from matching.
// If the nsec is proving that qname is an ENT, the nsec owner will
// be less than qname, and the next name will be a child domain of
// the qname.
if (strictSubdomain(nsec.getNext(), qname) && nsec.getName().compareTo(qname) < 0) {
result.result = true;
return result;
}
// Wildcard checking:
// If this is a wildcard NSEC, make sure that a) it was possible to
// have generated qname from the wildcard and b) the type map does
// not contain qtype. Note that this does NOT prove that this
// wildcard was the applicable wildcard.
if (nsec.getName().isWild()) {
// the is the purported closest encloser.
Name ce = new Name(nsec.getName(), 1);
// The qname must be a strict subdomain of the closest encloser,
// and the qtype must be absent from the type map.
if (strictSubdomain(qname, ce)) {
if (nsec.hasType(Type.CNAME)) {
// should have gotten the wildcard CNAME
result.result = false;
return result;
}
if (nsec.hasType(Type.NS) && !nsec.hasType(Type.SOA)) {
// wrong parentside (wildcard) NSEC used, and it really
// should not exist anyway:
// http://tools.ietf.org/html/rfc4592#section-4.2
result.result = false;
return result;
}
if (nsec.hasType(qtype)) {
result.result = false;
return result;
}
}
result.wc = ce;
result.result = true;
return result;
}
// Otherwise, this NSEC does not prove ENT, so it does not prove
// NODATA.
result.result = false;
return result;
}
// If the qtype exists, then we should have gotten it.
if (nsec.hasType(qtype)) {
result.result = false;
return result;
}
// if the name is a CNAME node, then we should have gotten the CNAME
if (nsec.hasType(Type.CNAME)) {
result.result = false;
return result;
}
// If an NS set exists at this name, and NOT a SOA (so this is a zone
// cut, not a zone apex), then we should have gotten a referral (or we
// just got the wrong NSEC).
// The reverse of this check is used when qtype is DS, since that
// must use the NSEC from above the zone cut.
if (qtype != Type.DS && nsec.hasType(Type.NS) && !nsec.hasType(Type.SOA)) {
result.result = false;
return result;
}
else if (qtype == Type.DS && nsec.hasType(Type.SOA) && !Name.root.equals(qname)) {
result.result = false;
return result;
}
result.result = true;
return result;
}
/**
* Check DS absence. There is a NODATA reply to a DS that needs checking.
* NSECs can prove this is not a delegation point, or successfully prove
* that there is no DS. Or this fails.
*
* @param request The request that generated this response.
* @param response The response to validate.
* @param keyRrset The key that validate the NSECs.
* @return The NODATA proof along with the reason of the result.
*/
public JustifiedSecStatus nsecProvesNodataDsReply(Message request, SMessage response, SRRset keyRrset) {
Name qname = request.getQuestion().getName();
int qclass = request.getQuestion().getDClass();
// If we have a NSEC at the same name, it must prove one of two
// things
// --
// 1) this is a delegation point and there is no DS
// 2) this is not a delegation point
SRRset nsecRrset = response.findRRset(qname, Type.NSEC, qclass, Section.AUTHORITY);
if (nsecRrset != null) {
// The NSEC must verify, first of all.
SecurityStatus status = this.verifySRRset(nsecRrset, keyRrset);
if (status != SecurityStatus.SECURE) {
return new JustifiedSecStatus(SecurityStatus.BOGUS, R.get("failed.ds.nsec"));
}
NSECRecord nsec = (NSECRecord)nsecRrset.first();
status = ValUtils.nsecProvesNoDS(nsec, qname);
switch (status) {
case INSECURE: // this wasn't a delegation point.
return new JustifiedSecStatus(status, R.get("failed.ds.nodelegation"));
case SECURE: // this proved no DS.
return new JustifiedSecStatus(status, R.get("insecure.ds.nsec"));
default: // something was wrong.
return new JustifiedSecStatus(status, R.get("failed.ds.nsec.hasdata"));
}
}
// Otherwise, there is no NSEC at qname. This could be an ENT.
// If not, this is broken.
NsecProvesNodataResponse ndp = new NsecProvesNodataResponse();
Name ce = null;
boolean hasValidNSEC = false;
NSECRecord wcNsec = null;
for (SRRset set : response.getSectionRRsets(Section.AUTHORITY, Type.NSEC)) {
SecurityStatus status = this.verifySRRset(set, keyRrset);
if (status != SecurityStatus.SECURE) {
return new JustifiedSecStatus(status, R.get("failed.ds.nsec.ent"));
}
NSECRecord nsec = (NSECRecord)set.first();
ndp = ValUtils.nsecProvesNodata(nsec, qname, Type.DS);
if (ndp.result) {
hasValidNSEC = true;
if (ndp.wc != null && nsec.getName().isWild()) {
wcNsec = nsec;
}
}
if (ValUtils.nsecProvesNameError(nsec, qname, set.getSignerName())) {
ce = closestEncloser(qname, nsec);
}
}
// The wildcard NODATA is 1 NSEC proving that qname does not exists (and
// also proving what the closest encloser is), and 1 NSEC showing the
// matching wildcard, which must be *.closest_encloser.
if (ndp.wc != null && (ce == null || !ce.equals(ndp.wc))) {
hasValidNSEC = false;
}
if (hasValidNSEC) {
if (ndp.wc != null) {
SecurityStatus status = nsecProvesNoDS(wcNsec, qname);
return new JustifiedSecStatus(status, R.get("failed.ds.nowildcardproof"));
}
return new JustifiedSecStatus(SecurityStatus.INSECURE, R.get("insecure.ds.nsec.ent"));
}
return new JustifiedSecStatus(SecurityStatus.UNCHECKED, R.get("failed.ds.nonconclusive"));
}
/**
* Checks if the authority section of a message contains at least one signed
* NSEC or NSEC3 record.
*
* @param message The message to inspect.
* @return True if at least one record is found, false otherwise.
*/
public boolean hasSignedNsecs(SMessage message) {
for (SRRset set : message.getSectionRRsets(Section.AUTHORITY)) {
if (set.getType() == Type.NSEC || set.getType() == Type.NSEC3) {
if (set.sigs().hasNext()) {
return true;
}
}
}
return false;
}
/**
* Determines whether the given {@link NSECRecord} proves that there is no
* {@link DSRecord} for qname
.
*
* @param nsec The NSEC that should prove the non-existence.
* @param qname The name for which the prove is made.
* @return {@link SecurityStatus#BOGUS} when the NSEC is from the child
* domain or indicates that there indeed is a DS record,
* {@link SecurityStatus#INSECURE} when there is not even a prove
* for a NS record, {@link SecurityStatus#SECURE} when there is no
* DS record.
*/
public static SecurityStatus nsecProvesNoDS(NSECRecord nsec, Name qname) {
// Could check to make sure the qname is a subdomain of nsec
if ((nsec.hasType(Type.SOA) && !Name.root.equals(qname)) || nsec.hasType(Type.DS)) {
// SOA present means that this is the NSEC from the child, not the
// parent (so it is the wrong one) -> cannot happen because the
// keyset is always from the parent zone and doesn't validate the
// NSEC
// DS present means that there should have been a positive response
// to the DS query, so there is something wrong.
return SecurityStatus.BOGUS;
}
if (!nsec.hasType(Type.NS)) {
// If there is no NS at this point at all, then this doesn't prove
// anything one way or the other.
return SecurityStatus.INSECURE;
}
// Otherwise, this proves no DS.
return SecurityStatus.SECURE;
}
/**
* Determines if at least one of the DS records in the RRset has a supported
* algorithm.
*
* @param dsRRset The RR set to search in.
* @return True when at least one DS record uses a supported algorithm,
* false otherwise.
*/
static boolean atLeastOneSupportedAlgorithm(RRset dsRRset) {
Iterator> it = dsRRset.rrs();
while (it.hasNext()) {
Record r = (Record)it.next();
if (r.getType() == Type.DS) {
if (isAlgorithmSupported(((DSRecord)r).getAlgorithm())) {
return true;
}
// do nothing, there could be another DS we understand
}
}
return false;
}
/**
* Determines if the algorithm is supported.
*
* @param alg The algorithm to check.
* @return True when the algorithm is supported, false otherwise.
*/
static boolean isAlgorithmSupported(int alg) {
switch (alg) {
case Algorithm.RSAMD5:
return false; // obsoleted by rfc6944
case Algorithm.DSA:
case Algorithm.DSA_NSEC3_SHA1:
case Algorithm.RSASHA1:
case Algorithm.RSA_NSEC3_SHA1:
case Algorithm.RSASHA256:
case Algorithm.RSASHA512:
case Algorithm.ECDSAP256SHA256:
case Algorithm.ECDSAP384SHA384:
return true;
default:
return false;
}
}
/**
* Determines if at least one of the DS records in the RRset has a supported
* digest algorithm.
*
* @param dsRRset The RR set to search in.
* @return True when at least one DS record uses a supported digest
* algorithm, false otherwise.
*/
static boolean atLeastOneDigestSupported(RRset dsRRset) {
Iterator> it = dsRRset.rrs();
while (it.hasNext()) {
Record r = (Record)it.next();
if (r.getType() == Type.DS) {
if (isDigestSupported(((DSRecord)r).getDigestID())) {
return true;
}
// do nothing, there could be another DS we understand
}
}
return false;
}
/**
* Determines if the digest algorithm is supported.
*
* @param digestID the algorithm to check.
* @return True when the digest algorithm is supported, false otherwise.
*/
static boolean isDigestSupported(int digestID) {
switch (digestID) {
case Digest.SHA1:
case Digest.SHA256:
case Digest.SHA384:
return true;
default:
return false;
}
}
}
dnssecjava-1.1.3/src/main/java/org/jitsi/dnssec/validator/ValidatingResolver.java 0000664 0000000 0000000 00000142572 13020541473 0030127 0 ustar 00root root 0000000 0000000 /*
* dnssecjava - a DNSSEC validating stub resolver for Java
* Copyright (c) 2013-2015 Ingo Bauersachs
*
* All rights reserved. This program and the accompanying materials
* are made available under the terms of the Eclipse Public License v1.0
* which accompanies this distribution, and is available at
* http://www.eclipse.org/legal/epl-v10.html
*
* This file is based on work under the following copyright and permission
* notice:
*
* Copyright (c) 2005 VeriSign. All rights reserved.
*
* Redistribution and use in source and binary forms, with or without
* modification, are permitted provided that the following conditions are
* met:
*
* 1. Redistributions of source code must retain the above copyright
* notice, this list of conditions and the following disclaimer.
* 2. Redistributions in binary form must reproduce the above copyright
* notice, this list of conditions and the following disclaimer in the
* documentation and/or other materials provided with the distribution.
* 3. The name of the author may not be used to endorse or promote
* products derived from this software without specific prior written
* permission.
*
* THIS SOFTWARE IS PROVIDED BY THE AUTHOR ``AS IS'' AND ANY EXPRESS OR
* IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED
* WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
* ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY DIRECT,
* INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES
* (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR
* SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
* HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT,
* STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING
* IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE
* POSSIBILITY OF SUCH DAMAGE.
*/
package org.jitsi.dnssec.validator;
import java.io.FileInputStream;
import java.io.IOException;
import java.io.InputStream;
import java.net.SocketTimeoutException;
import java.net.UnknownHostException;
import java.util.ArrayList;
import java.util.Arrays;
import java.util.Collections;
import java.util.HashMap;
import java.util.List;
import java.util.Map;
import java.util.Properties;
import org.slf4j.Logger;
import org.slf4j.LoggerFactory;
import org.jitsi.dnssec.SMessage;
import org.jitsi.dnssec.SRRset;
import org.jitsi.dnssec.SecurityStatus;
import org.jitsi.dnssec.R;
import org.jitsi.dnssec.validator.ValUtils.NsecProvesNodataResponse;
import org.xbill.DNS.CNAMERecord;
import org.xbill.DNS.DClass;
import org.xbill.DNS.DNAMERecord;
import org.xbill.DNS.ExtendedFlags;
import org.xbill.DNS.Flags;
import org.xbill.DNS.Header;
import org.xbill.DNS.Master;
import org.xbill.DNS.Message;
import org.xbill.DNS.NSECRecord;
import org.xbill.DNS.Name;
import org.xbill.DNS.NameTooLongException;
import org.xbill.DNS.Rcode;
import org.xbill.DNS.Record;
import org.xbill.DNS.Resolver;
import org.xbill.DNS.ResolverListener;
import org.xbill.DNS.Section;
import org.xbill.DNS.TSIG;
import org.xbill.DNS.TXTRecord;
import org.xbill.DNS.Type;
/**
* This resolver validates responses with DNSSEC.
*/
public class ValidatingResolver implements Resolver {
/**
* The QCLASS being used for the injection of the reason why the validator
* came to the returned result.
*/
public static final int VALIDATION_REASON_QCLASS = 65280;
private static final Logger logger = LoggerFactory.getLogger(ValidatingResolver.class);
/**
* This is the TTL to use when a trust anchor priming query failed to
* validate.
*/
private static final long DEFAULT_TA_BAD_KEY_TTL = 60;
/**
* This is a cache of validated, but expirable DNSKEY rrsets.
*/
private KeyCache keyCache;
/**
* A data structure holding all trust anchors. Trust anchors must be
* "primed" into the cache before being used to validate.
*/
private TrustAnchorStore trustAnchors;
/**
* The local validation utilities.
*/
private ValUtils valUtils;
/**
* The local NSEC3 validation utilities.
*/
private NSEC3ValUtils n3valUtils;
/**
* The resolver that performs the actual DNS lookups.
*/
private Resolver headResolver;
/**
* Creates a new instance of this class.
*
* @param headResolver The resolver to which queries for DS, DNSKEY and
* referring CNAME records are sent.
*/
public ValidatingResolver(Resolver headResolver) {
this.headResolver = headResolver;
headResolver.setEDNS(0, 0, ExtendedFlags.DO, null);
headResolver.setIgnoreTruncation(false);
this.keyCache = new KeyCache();
this.valUtils = new ValUtils();
this.n3valUtils = new NSEC3ValUtils();
this.trustAnchors = new TrustAnchorStore();
}
// ---------------- Module Initialization -------------------
/**
* Initialize the module. The only recognized configuration value is
* org.jitsi.dnssec.trust_anchor_file .
*
* @param config The configuration data for this module.
* @throws IOException When the file specified in the config does not exist
* or cannot be read.
*/
public void init(Properties config) throws IOException {
this.keyCache.init(config);
this.n3valUtils.init(config);
this.valUtils.init(config);
// Load trust anchors
String s = config.getProperty("org.jitsi.dnssec.trust_anchor_file");
if (s != null) {
logger.debug("reading trust anchor file file: " + s);
this.loadTrustAnchors(new FileInputStream(s));
}
}
/**
* Load the trust anchor file into the trust anchor store. The trust anchors
* are currently stored in a zone file format list of DNSKEY or DS records.
*
* @param data The trust anchor data.
* @throws IOException when the trust anchor data could not be read.
*/
@SuppressWarnings("unchecked")
public void loadTrustAnchors(InputStream data) throws IOException {
// First read in the whole trust anchor file.
Master master = new Master(data, Name.root, 0);
List records = new ArrayList();
Record mr;
while ((mr = master.nextRecord()) != null) {
records.add(mr);
}
// Record.compareTo() should sort them into DNSSEC canonical order.
// Don't care about canonical order per se, but do want them to be
// formable into RRsets.
Collections.sort(records);
SRRset currentRrset = new SRRset();
for (Record r : records) {
// Skip RR types that cannot be used as trust anchors.
if (r.getType() != Type.DNSKEY && r.getType() != Type.DS) {
continue;
}
// If our current set is empty, we can just add it.
if (currentRrset.size() == 0) {
currentRrset.addRR(r);
continue;
}
// If this record matches our current RRset, we can just add it.
if (currentRrset.getName().equals(r.getName()) && currentRrset.getType() == r.getType() && currentRrset.getDClass() == r.getDClass()) {
currentRrset.addRR(r);
continue;
}
// Otherwise, we add the rrset to our set of trust anchors and begin
// a new set
this.trustAnchors.store(currentRrset);
currentRrset = new SRRset();
currentRrset.addRR(r);
}
// add the last rrset (if it was not empty)
if (currentRrset.size() > 0) {
this.trustAnchors.store(currentRrset);
}
}
/**
* Gets the store with the loaded trust anchors.
*
* @return The store with the loaded trust anchors.
*/
public TrustAnchorStore getTrustAnchors() {
return this.trustAnchors;
}
/**
* Given a "postive" response -- a response that contains an answer to the
* question, and no CNAME chain, validate this response. This generally
* consists of verifying the answer RRset and the authority RRsets.
*
* Given an "ANY" response -- a response that contains an answer to a
* qtype==ANY question, with answers. This consists of simply verifying all
* present answer/auth RRsets, with no checking that all types are present.
*
* NOTE: it may be possible to get parent-side delegation point records
* here, which won't all be signed. Right now, this routine relies on the
* upstream iterative resolver to not return these responses -- instead
* treating them as referrals.
*
* NOTE: RFC 4035 is silent on this issue, so this may change upon
* clarification.
*
* @param request The request that generated this response.
* @param response The response to validate.
*/
private void validatePositiveResponse(Message request, SMessage response) {
int qtype = request.getQuestion().getType();
Map wcs = new HashMap(1);
List nsec3s = new ArrayList(0);
List nsecs = new ArrayList(0);
if (!this.validateAnswerAndGetWildcards(response, qtype, wcs)) {
return;
}
// validate the AUTHORITY section as well - this will generally be the
// NS rrset (which could be missing, no problem)
SRRset keyRrset;
int[] sections;
if (request.getQuestion().getType() == Type.ANY) {
sections = new int[] { Section.ANSWER, Section.AUTHORITY };
}
else {
sections = new int[] { Section.AUTHORITY };
}
for (int section : sections) {
for (SRRset set : response.getSectionRRsets(section)) {
KeyEntry ke = this.prepareFindKey(set);
if (!this.processKeyValidate(response, set.getSignerName(), ke)) {
return;
}
keyRrset = ke.getRRset();
SecurityStatus status = this.valUtils.verifySRRset(set, keyRrset);
// If anything in the authority section fails to be secure, we
// have a bad message.
if (status != SecurityStatus.SECURE) {
response.setBogus(R.get("failed.authority.positive", set));
return;
}
if (wcs.size() > 0) {
if (set.getType() == Type.NSEC) {
nsecs.add(set);
}
else if (set.getType() == Type.NSEC3) {
nsec3s.add(set);
}
}
}
}
// If this is a positive wildcard response, and we have NSEC records,
// try to use them to
// 1) prove that qname doesn't exist and
// 2) that the correct wildcard was used.
if (wcs.size() > 0) {
for (Map.Entry wc : wcs.entrySet()) {
boolean wcNsecOk = false;
for (SRRset set : nsecs) {
NSECRecord nsec = (NSECRecord)set.first();
if (ValUtils.nsecProvesNameError(nsec, wc.getKey(), set.getSignerName())) {
try {
Name nsecWc = ValUtils.nsecWildcard(wc.getKey(), nsec);
if (wc.getValue().equals(nsecWc)) {
wcNsecOk = true;
break;
}
}
catch (NameTooLongException e) {
// COVERAGE:OFF -> a NTLE can only be thrown when
// the qname is equal to the NSEC owner or NSEC next
// name, so that the wildcard is appended to
// CE=qname=owner=next. This would however indicate
// that the qname exists, which is proofed not the
// be the case beforehand.
throw new RuntimeException(R.get("failed.positive.wildcardgeneration"));
}
}
}
// If this was a positive wildcard response that we haven't
// already proven, and we have NSEC3 records, try to prove it
// using the NSEC3 records.
if (!wcNsecOk && nsec3s.size() > 0) {
if (this.n3valUtils.allNSEC3sIgnoreable(nsec3s, this.keyCache)) {
response.setStatus(SecurityStatus.INSECURE, R.get("failed.nsec3_ignored"));
return;
}
SecurityStatus status = this.n3valUtils.proveWildcard(nsec3s, wc.getKey(), nsec3s.get(0).getSignerName(), wc.getValue());
if (status == SecurityStatus.INSECURE) {
response.setStatus(status);
return;
}
else if (status == SecurityStatus.SECURE) {
wcNsecOk = true;
}
}
// If after all this, we still haven't proven the positive
// wildcard response, fail.
if (!wcNsecOk) {
response.setBogus(R.get("failed.positive.wildcard_too_broad"));
return;
}
}
}
response.setStatus(SecurityStatus.SECURE);
}
private boolean validateAnswerAndGetWildcards(SMessage response, int qtype, Map wcs) {
// validate the ANSWER section - this will be the answer itself
DNAMERecord dname = null;
for (SRRset set : response.getSectionRRsets(Section.ANSWER)) {
// Validate the CNAME following a (validated) DNAME is correctly
// synthesized.
if (set.getType() == Type.CNAME && dname != null) {
if (set.size() > 1) {
response.setBogus(R.get("failed.synthesize.multiple"));
return false;
}
CNAMERecord cname = (CNAMERecord)set.first();
try {
Name expected = Name.concatenate(cname.getName().relativize(dname.getName()), dname.getTarget());
if (!expected.equals(cname.getTarget())) {
response.setBogus(R.get("failed.synthesize.nomatch", cname.getTarget(), expected));
return false;
}
}
catch (NameTooLongException e) {
response.setBogus(R.get("failed.synthesize.toolong"));
return false;
}
set.setSecurityStatus(SecurityStatus.SECURE);
dname = null;
continue;
}
// Verify the answer rrset.
KeyEntry ke = this.prepareFindKey(set);
if (!this.processKeyValidate(response, set.getSignerName(), ke)) {
return false;
}
SecurityStatus status = this.valUtils.verifySRRset(set, ke.getRRset());
// If the answer rrset failed to validate, then this message is BAD
if (status != SecurityStatus.SECURE) {
response.setBogus(R.get("failed.answer.positive", set));
return false;
}
// Check to see if the rrset is the result of a wildcard expansion.
// If so, an additional check will need to be made in the authority
// section.
Name wc = null;
try {
wc = ValUtils.rrsetWildcard(set);
}
catch (RuntimeException ex) {
response.setBogus(R.get(ex.getMessage(), set.getName()));
return false;
}
if (wc != null) {
// RFC 4592, Section 4.4 does not allow wildcarded DNAMEs
if (set.getType() == Type.DNAME) {
response.setBogus(R.get("failed.dname.wildcard", set.getName()));
return false;
}
wcs.put(set.getName(), wc);
}
// Notice a DNAME that should be followed by an unsigned CNAME.
if (qtype != Type.DNAME && set.getType() == Type.DNAME) {
dname = (DNAMERecord)set.first();
}
}
return true;
}
/**
* Validate a NOERROR/NODATA signed response -- a response that has a
* NOERROR Rcode but no ANSWER section RRsets. This consists of verifying
* the authority section rrsets and making certain that the authority
* section NSEC/NSEC3s proves that the qname does exist and the qtype
* doesn't.
*
* Note that by the time this method is called, the process of finding the
* trusted DNSKEY rrset that signs this response must already have been
* completed.
*
* @param request The request that generated this response.
* @param response The response to validate.
*/
private void validateNodataResponse(Message request, SMessage response) {
Name qname = request.getQuestion().getName();
int qtype = request.getQuestion().getType();
// Since we are here, the ANSWER section is either empty (and hence
// there's only the NODATA to validate) OR it contains an incomplete
// chain. In this case, the records were already validated before and we
// can concentrate on following the qname that lead to the NODATA
// classification
for (SRRset set : response.getSectionRRsets(Section.ANSWER)) {
if (set.getSecurityStatus() != SecurityStatus.SECURE) {
response.setBogus(R.get("failed.answer.cname_nodata", set.getName()));
return;
}
if (set.getType() == Type.CNAME) {
qname = ((CNAMERecord)set.first()).getTarget();
}
}
// If true, then the NODATA has been proven.
boolean hasValidNSEC = false;
// for wildcard nodata responses. This is the proven closest encloser.
Name ce = null;
// for wildcard nodata responses. This is the wildcard NSEC.
NsecProvesNodataResponse ndp = new NsecProvesNodataResponse();
// A collection of NSEC3 RRs found in the authority section.
List nsec3s = new ArrayList(0);
// The RRSIG signer field for the NSEC3 RRs.
Name nsec3Signer = null;
// validate the AUTHORITY section
for (SRRset set : response.getSectionRRsets(Section.AUTHORITY)) {
KeyEntry ke = this.prepareFindKey(set);
if (!this.processKeyValidate(response, set.getSignerName(), ke)) {
return;
}
SecurityStatus status = this.valUtils.verifySRRset(set, ke.getRRset());
if (status != SecurityStatus.SECURE) {
response.setBogus(R.get("failed.authority.nodata", set));
return;
}
// If we encounter an NSEC record, try to use it to prove NODATA.
// This needs to handle the empty non-terminal (ENT) NODATA case.
if (set.getType() == Type.NSEC) {
NSECRecord nsec = (NSECRecord)set.first();
ndp = ValUtils.nsecProvesNodata(nsec, qname, qtype);
if (ndp.result) {
hasValidNSEC = true;
}
if (ValUtils.nsecProvesNameError(nsec, qname, set.getSignerName())) {
ce = ValUtils.closestEncloser(qname, nsec);
}
}
// Collect any NSEC3 records present.
if (set.getType() == Type.NSEC3) {
nsec3s.add(set);
nsec3Signer = set.getSignerName();
}
}
// check to see if we have a wildcard NODATA proof.
// The wildcard NODATA is 1 NSEC proving that qname does not exists (and
// also proving what the closest encloser is), and 1 NSEC showing the
// matching wildcard, which must be *.closest_encloser.
if (ndp.wc != null && (ce == null || (!ce.equals(ndp.wc) && !qname.equals(ce)))) {
hasValidNSEC = false;
}
this.n3valUtils.stripUnknownAlgNSEC3s(nsec3s);
if (!hasValidNSEC && nsec3s.size() > 0) {
if (this.n3valUtils.allNSEC3sIgnoreable(nsec3s, this.keyCache)) {
response.setStatus(SecurityStatus.BOGUS, R.get("failed.nsec3_ignored"));
return;
}
// try to prove NODATA with our NSEC3 record(s)
SecurityStatus status = this.n3valUtils.proveNodata(nsec3s, qname, qtype, nsec3Signer);
if (status == SecurityStatus.INSECURE) {
response.setStatus(SecurityStatus.INSECURE);
return;
}
hasValidNSEC = status == SecurityStatus.SECURE;
}
if (!hasValidNSEC) {
response.setBogus(R.get("failed.nodata"));
logger.trace("Failed NODATA for " + qname);
return;
}
logger.trace("sucessfully validated NODATA response.");
response.setStatus(SecurityStatus.SECURE);
}
/**
* Validate a NAMEERROR signed response -- a response that has a NXDOMAIN
* Rcode. This consists of verifying the authority section rrsets and making
* certain that the authority section NSEC proves that the qname doesn't
* exist and the covering wildcard also doesn't exist..
*
* Note that by the time this method is called, the process of finding the
* trusted DNSKEY rrset that signs this response must already have been
* completed.
*
* @param request The request to be proved to not exist.
* @param response The response to validate.
*/
private void validateNameErrorResponse(Message request, SMessage response) {
Name qname = request.getQuestion().getName();
// The ANSWER section is either empty OR it contains an xNAME chain that
// ultimately lead to the NAMEERROR response. In this case the ANSWER
// section has already been validated before and we can concentrate on
// following the xNAMEs to find the qname that caused the NXDOMAIN.
for (SRRset set : response.getSectionRRsets(Section.ANSWER)) {
if (set.getSecurityStatus() != SecurityStatus.SECURE) {
response.setBogus(R.get("failed.nxdomain.cname_nxdomain", set));
return;
}
if (set.getType() == Type.CNAME) {
qname = ((CNAMERecord)set.first()).getTarget();
}
}
// Validate the authority section -- all RRsets in the authority section
// must be signed and valid.
// In addition, the NSEC record(s) must prove the NXDOMAIN condition.
boolean hasValidNSEC = false;
boolean hasValidWCNSEC = false;
List nsec3s = new ArrayList(0);
Name nsec3Signer = null;
SRRset keyRrset;
for (SRRset set : response.getSectionRRsets(Section.AUTHORITY)) {
KeyEntry ke = this.prepareFindKey(set);
if (!this.processKeyValidate(response, set.getSignerName(), ke)) {
return;
}
keyRrset = ke.getRRset();
SecurityStatus status = this.valUtils.verifySRRset(set, keyRrset);
if (status != SecurityStatus.SECURE) {
response.setBogus(R.get("failed.nxdomain.authority", set));
return;
}
if (set.getType() == Type.NSEC) {
NSECRecord nsec = (NSECRecord)set.first();
if (ValUtils.nsecProvesNameError(nsec, qname, set.getSignerName())) {
hasValidNSEC = true;
}
if (ValUtils.nsecProvesNoWC(nsec, qname, set.getSignerName())) {
hasValidWCNSEC = true;
}
}
if (set.getType() == Type.NSEC3) {
nsec3s.add(set);
nsec3Signer = set.getSignerName();
}
}
this.n3valUtils.stripUnknownAlgNSEC3s(nsec3s);
if ((!hasValidNSEC || !hasValidWCNSEC) && nsec3s.size() > 0) {
logger.debug("Validating nxdomain: using NSEC3 records");
// Attempt to prove name error with nsec3 records.
if (this.n3valUtils.allNSEC3sIgnoreable(nsec3s, this.keyCache)) {
response.setStatus(SecurityStatus.INSECURE, R.get("failed.nsec3_ignored"));
return;
}
SecurityStatus status = this.n3valUtils.proveNameError(nsec3s, qname, nsec3Signer);
if (status != SecurityStatus.SECURE) {
if (status == SecurityStatus.INSECURE) {
response.setStatus(status, R.get("failed.nxdomain.nsec3_insecure"));
}
else {
response.setStatus(status, R.get("failed.nxdomain.nsec3_bogus"));
}
return;
}
// Note that we assume that the NSEC3ValUtils proofs encompass the
// wildcard part of the proof.
hasValidNSEC = true;
hasValidWCNSEC = true;
}
// If the message fails to prove either condition, it is bogus.
if (!hasValidNSEC) {
response.setBogus(R.get("failed.nxdomain.exists", response.getQuestion().getName()));
return;
}
if (!hasValidWCNSEC) {
response.setBogus(R.get("failed.nxdomain.haswildcard"));
return;
}
// Otherwise, we consider the message secure.
logger.trace("successfully validated NAME ERROR response.");
response.setStatus(SecurityStatus.SECURE);
}
private SMessage sendRequest(Message request) {
Record q = request.getQuestion();
logger.trace("sending request: <" + q.getName() + "/" + Type.string(q.getType()) + "/" + DClass.string(q.getDClass()) + ">");
// Send the request along by using a local copy of the request
Message localRequest = (Message)request.clone();
localRequest.getHeader().setFlag(Flags.CD);
try {
Message resp = this.headResolver.send(localRequest);
return new SMessage(resp);
}
catch (SocketTimeoutException e) {
logger.error("Query timed out, returning fail", e);
return ValidatingResolver.errorMessage(localRequest, Rcode.SERVFAIL);
}
catch (UnknownHostException e) {
logger.error("failed to send query", e);
return ValidatingResolver.errorMessage(localRequest, Rcode.SERVFAIL);
}
catch (IOException e) {
logger.error("failed to send query", e);
return ValidatingResolver.errorMessage(localRequest, Rcode.SERVFAIL);
}
}
private KeyEntry prepareFindKey(SRRset rrset) {
FindKeyState state = new FindKeyState();
state.signerName = rrset.getSignerName();
state.qclass = rrset.getDClass();
if (state.signerName == null) {
state.signerName = rrset.getName();
}
SRRset trustAnchorRRset = this.trustAnchors.find(state.signerName, rrset.getDClass());
if (trustAnchorRRset == null) {
// response isn't under a trust anchor, so we cannot validate.
return KeyEntry.newNullKeyEntry(rrset.getSignerName(), rrset.getDClass(), DEFAULT_TA_BAD_KEY_TTL);
}
state.keyEntry = this.keyCache.find(state.signerName, rrset.getDClass());
if (state.keyEntry == null || (!state.keyEntry.getName().equals(state.signerName) && state.keyEntry.isGood())) {
// start the FINDKEY phase with the trust anchor
state.dsRRset = trustAnchorRRset;
state.keyEntry = null;
state.currentDSKeyName = new Name(trustAnchorRRset.getName(), 1);
// and otherwise, don't continue processing this event.
// (it will be reactivated when the priming query returns).
this.processFindKey(state);
}
return state.keyEntry;
}
/**
* Process the FINDKEY state. Generally this just calculates the next name
* to query and either issues a DS or a DNSKEY query. It will check to see
* if the correct key has already been reached, in which case it will
* advance the event to the next state.
*
* @param state The state associated with the current key finding phase.
*/
private void processFindKey(FindKeyState state) {
// We know that state.keyEntry is not a null or bad key -- if it were,
// then previous processing should have directed this event to a
// different state.
int qclass = state.qclass;
Name targetKeyName = state.signerName;
Name currentKeyName = Name.empty;
if (state.keyEntry != null) {
currentKeyName = state.keyEntry.getName();
}
if (state.currentDSKeyName != null) {
currentKeyName = state.currentDSKeyName;
state.currentDSKeyName = null;
}
// If our current key entry matches our target, then we are done.
if (currentKeyName.equals(targetKeyName)) {
return;
}
if (state.emptyDSName != null) {
currentKeyName = state.emptyDSName;
}
// Calculate the next lookup name.
int targetLabels = targetKeyName.labels();
int currentLabels = currentKeyName.labels();
int l = targetLabels - currentLabels - 1;
// the next key name would be trying to invent a name, so we stop here
if (l < 0) {
return;
}
Name nextKeyName = new Name(targetKeyName, l);
logger.trace("findKey: targetKeyName = " + targetKeyName + ", currentKeyName = " + currentKeyName + ", nextKeyName = " + nextKeyName);
// The next step is either to query for the next DS, or to query for the
// next DNSKEY.
if (state.dsRRset == null || !state.dsRRset.getName().equals(nextKeyName)) {
Message dsRequest = Message.newQuery(Record.newRecord(nextKeyName, Type.DS, qclass));
SMessage dsResponse = this.sendRequest(dsRequest);
this.processDSResponse(dsRequest, dsResponse, state);
return;
}
// Otherwise, it is time to query for the DNSKEY
Message dnskeyRequest = Message.newQuery(Record.newRecord(state.dsRRset.getName(), Type.DNSKEY, qclass));
SMessage dnskeyResponse = this.sendRequest(dnskeyRequest);
this.processDNSKEYResponse(dnskeyRequest, dnskeyResponse, state);
}
/**
* Given a DS response, the DS request, and the current key rrset, validate
* the DS response, returning a KeyEntry.
*
* @param response The DS response.
* @param request The DS request.
* @param keyRrset The current DNSKEY rrset from the forEvent state.
*
* @return A KeyEntry, bad if the DS response fails to validate, null if the
* DS response indicated an end to secure space, good if the DS
* validated. It returns null if the DS response indicated that the
* request wasn't a delegation point.
*/
private KeyEntry dsResponseToKE(SMessage response, Message request, SRRset keyRrset) {
Name qname = request.getQuestion().getName();
int qclass = request.getQuestion().getDClass();
SecurityStatus status;
ResponseClassification subtype = ValUtils.classifyResponse(response);
KeyEntry bogusKE = KeyEntry.newBadKeyEntry(qname, qclass, DEFAULT_TA_BAD_KEY_TTL);
switch (subtype) {
case POSITIVE:
// Verify only returns BOGUS or SECURE. If the rrset is bogus,
// then we are done.
SRRset dsRrset = response.findAnswerRRset(qname, Type.DS, qclass);
status = this.valUtils.verifySRRset(dsRrset, keyRrset);
if (status != SecurityStatus.SECURE) {
bogusKE.setBadReason(R.get("failed.ds"));
return bogusKE;
}
if (!ValUtils.atLeastOneSupportedAlgorithm(dsRrset)) {
KeyEntry nullKey = KeyEntry.newNullKeyEntry(qname, qclass, dsRrset.getTTL());
nullKey.setBadReason(R.get("insecure.ds.noalgorithms", qname));
return nullKey;
}
// Otherwise, we return the positive response.
logger.trace("DS rrset was good.");
return KeyEntry.newKeyEntry(dsRrset);
case CNAME:
// Verify only returns BOGUS or SECURE. If the rrset is bogus,
// then we are done.
SRRset cnameRrset = response.findAnswerRRset(qname, Type.CNAME, qclass);
status = this.valUtils.verifySRRset(cnameRrset, keyRrset);
if (status == SecurityStatus.SECURE) {
return null;
}
bogusKE.setBadReason(R.get("failed.ds.cname"));
return bogusKE;
case NODATA:
case NAMEERROR:
return this.dsReponseToKeForNodata(response, request, keyRrset);
default:
// We've encountered an unhandled classification for this
// response.
bogusKE.setBadReason(R.get("failed.ds.notype", subtype));
return bogusKE;
}
}
/**
* Given a DS response, the DS request, and the current key rrset, validate
* the DS response for the NODATA case, returning a KeyEntry.
*
* @param response The DS response.
* @param request The DS request.
* @param keyRrset The current DNSKEY rrset from the forEvent state.
*
* @return A KeyEntry, bad if the DS response fails to validate, null if the
* DS response indicated an end to secure space, good if the DS
* validated. It returns null if the DS response indicated that the
* request wasn't a delegation point.
*/
private KeyEntry dsReponseToKeForNodata(SMessage response, Message request, SRRset keyRrset) {
Name qname = request.getQuestion().getName();
int qclass = request.getQuestion().getDClass();
KeyEntry bogusKE = KeyEntry.newBadKeyEntry(qname, qclass, DEFAULT_TA_BAD_KEY_TTL);
if (!this.valUtils.hasSignedNsecs(response)) {
bogusKE.setBadReason(R.get("failed.ds.nonsec", qname));
return bogusKE;
}
// Try to prove absence of the DS with NSEC
JustifiedSecStatus status = this.valUtils.nsecProvesNodataDsReply(request, response, keyRrset);
switch (status.status) {
case SECURE:
KeyEntry nullKey = KeyEntry.newNullKeyEntry(qname, qclass, DEFAULT_TA_BAD_KEY_TTL);
nullKey.setBadReason(R.get("insecure.ds.nsec"));
return nullKey;
case INSECURE:
return null;
case BOGUS:
bogusKE.setBadReason(status.reason);
return bogusKE;
default:
// NSEC proof did not work, try NSEC3
break;
}
// Or it could be using NSEC3.
SRRset[] nsec3Rrsets = response.getSectionRRsets(Section.AUTHORITY, Type.NSEC3);
List nsec3s = new ArrayList(0);
Name nsec3Signer = null;
long nsec3TTL = -1;
if (nsec3Rrsets.length > 0) {
// Attempt to prove no DS with NSEC3s.
for (SRRset nsec3set : nsec3Rrsets) {
SecurityStatus sstatus = this.valUtils.verifySRRset(nsec3set, keyRrset);
if (sstatus != SecurityStatus.SECURE) {
// We could just fail here as there is an invalid rrset, but
// skipping doesn't matter because we might not need it or
// the proof will fail anyway.
logger.debug("skipping bad nsec3");
continue;
}
nsec3Signer = nsec3set.getSignerName();
if (nsec3TTL < 0 || nsec3set.getTTL() < nsec3TTL) {
nsec3TTL = nsec3set.getTTL();
}
nsec3s.add(nsec3set);
}
switch (this.n3valUtils.proveNoDS(nsec3s, qname, nsec3Signer)) {
case INSECURE:
logger.debug("nsec3s proved no delegation.");
return null;
case SECURE:
KeyEntry nullKey = KeyEntry.newNullKeyEntry(qname, qclass, nsec3TTL);
nullKey.setBadReason(R.get("insecure.ds.nsec3"));
return nullKey;
default:
bogusKE.setBadReason(R.get("failed.ds.nsec3"));
return bogusKE;
}
}
// Apparently, no available NSEC/NSEC3 proved NODATA, so this is
// BOGUS.
bogusKE.setBadReason(R.get("failed.ds.unknown"));
return bogusKE;
}
/**
* This handles the responses to locally generated DS queries.
*
* @param request The request for which the response is processed.
* @param response The response to process.
* @param state The state associated with the current key finding phase.
*/
private void processDSResponse(Message request, SMessage response, FindKeyState state) {
Name qname = request.getQuestion().getName();
state.emptyDSName = null;
state.dsRRset = null;
KeyEntry dsKE = this.dsResponseToKE(response, request, state.keyEntry.getRRset());
if (dsKE == null) {
// DS response indicated that we aren't on a delegation point.
state.emptyDSName = qname;
}
else if (dsKE.isGood()) {
state.dsRRset = dsKE.getRRset();
state.currentDSKeyName = new Name(dsKE.getRRset().getName(), 1);
}
else {
// The reason for the DS to be not good (that is, either bad
// or null) should have been logged by dsResponseToKE.
state.keyEntry = dsKE;
if (dsKE.isNull()) {
this.keyCache.store(dsKE);
}
// The FINDKEY phase has ended, so move on.
return;
}
this.processFindKey(state);
}
private void processDNSKEYResponse(Message request, SMessage response, FindKeyState state) {
Name qname = request.getQuestion().getName();
int qclass = request.getQuestion().getDClass();
SRRset dnskeyRrset = response.findAnswerRRset(qname, Type.DNSKEY, qclass);
if (dnskeyRrset == null) {
// If the DNSKEY rrset was missing, this is the end of the line.
state.keyEntry = KeyEntry.newBadKeyEntry(qname, qclass, DEFAULT_TA_BAD_KEY_TTL);
state.keyEntry.setBadReason(R.get("dnskey.no_rrset", qname));
return;
}
state.keyEntry = this.valUtils.verifyNewDNSKEYs(dnskeyRrset, state.dsRRset, DEFAULT_TA_BAD_KEY_TTL);
// If the key entry isBad or isNull, then we can move on to the next
// state.
if (!state.keyEntry.isGood()) {
return;
}
// The DNSKEY validated, so cache it as a trusted key rrset.
this.keyCache.store(state.keyEntry);
// If good, we stay in the FINDKEY state.
this.processFindKey(state);
}
private boolean processKeyValidate(SMessage response, Name signerName, KeyEntry keyEntry) {
// signerName being null is the indicator that this response was
// unsigned
if (signerName == null) {
logger.debug("processKeyValidate: no signerName.");
// Unsigned responses must be underneath a "null" key entry.
if (keyEntry.isNull()) {
String reason = keyEntry.getBadReason();
if (reason == null) {
reason = R.get("validate.insecure_unsigned");
}
response.setStatus(SecurityStatus.INSECURE, reason);
return false;
}
if (keyEntry.isGood()) {
response.setStatus(SecurityStatus.BOGUS, R.get("validate.bogus.missingsig"));
return false;
}
response.setStatus(SecurityStatus.BOGUS, R.get("validate.bogus", keyEntry.getBadReason()));
return false;
}
if (keyEntry.isBad()) {
response.setStatus(SecurityStatus.BOGUS, R.get("validate.bogus.badkey", keyEntry.getName(), keyEntry.getBadReason()));
return false;
}
if (keyEntry.isNull()) {
String reason = keyEntry.getBadReason();
if (reason == null) {
reason = R.get("validate.insecure");
}
response.setStatus(SecurityStatus.INSECURE, reason);
return false;
}
return true;
}
private SMessage processValidate(Message request, SMessage response) {
ResponseClassification subtype = ValUtils.classifyResponse(response);
switch (subtype) {
case POSITIVE:
case CNAME:
case ANY:
logger.trace("Validating a positive response");
this.validatePositiveResponse(request, response);
break;
case NODATA:
logger.trace("Validating a nodata response");
this.validateNodataResponse(request, response);
break;
case CNAME_NODATA:
logger.trace("Validating a CNAME_NODATA response");
this.validatePositiveResponse(request, response);
if (response.getStatus() != SecurityStatus.INSECURE) {
response.setStatus(SecurityStatus.UNCHECKED);
this.validateNodataResponse(request, response);
}
break;
case NAMEERROR:
logger.trace("Validating a nxdomain response");
this.validateNameErrorResponse(request, response);
break;
case CNAME_NAMEERROR:
logger.trace("Validating a cname_nxdomain response");
this.validatePositiveResponse(request, response);
if (response.getStatus() != SecurityStatus.INSECURE) {
response.setStatus(SecurityStatus.UNCHECKED);
this.validateNameErrorResponse(request, response);
}
break;
default:
response.setStatus(SecurityStatus.BOGUS, R.get("validate.response.unknown", subtype));
}
return this.processFinishedState(request, response);
}
/**
* Apply any final massaging to a response before returning up the pipeline.
* Primarily this means setting the AD bit or not and possibly stripping
* DNSSEC data.
*/
private SMessage processFinishedState(Message request, SMessage response) {
// If the response message validated, set the AD bit.
SecurityStatus status = response.getStatus();
String reason = response.getBogusReason();
switch (status) {
case BOGUS:
// For now, in the absence of any other API information, we
// return SERVFAIL.
int code = response.getHeader().getRcode();
if (code == Rcode.NOERROR || code == Rcode.NXDOMAIN || code == Rcode.YXDOMAIN) {
code = Rcode.SERVFAIL;
}
response = ValidatingResolver.errorMessage(request, code);
break;
case SECURE:
response.getHeader().setFlag(Flags.AD);
break;
case UNCHECKED:
case INSECURE:
break;
default:
throw new RuntimeException("unexpected security status");
}
response.setStatus(status, reason);
return response;
}
// Resolver-interface implementation --------------------------------------
/**
* Forwards the data to the head resolver passed at construction time.
*
* @param port The IP destination port for the queries sent.
* @see org.xbill.DNS.Resolver#setPort(int)
*/
public void setPort(int port) {
this.headResolver.setPort(port);
}
/**
* Forwards the data to the head resolver passed at construction time.
*
* @param flag true
to enable TCP, false
to
* disable it.
* @see org.xbill.DNS.Resolver#setTCP(boolean)
*/
public void setTCP(boolean flag) {
this.headResolver.setTCP(flag);
}
/**
* This is a no-op, truncation is never ignored.
*
* @param flag unused
*/
public void setIgnoreTruncation(boolean flag) {
}
/**
* This is a no-op, EDNS is always set to level 0.
*
* @param level unused
*/
public void setEDNS(int level) {
}
/**
* The method is forwarded to the resolver, but always ensure that the level
* is 0 and the flags contains DO.
*
* @param level unused, always set to 0.
* @param payloadSize The maximum DNS packet size that this host is capable
* of receiving over UDP. If 0 is specified, the default (1280)
* is used.
* @param flags EDNS extended flags to be set in the OPT record,
* {@link ExtendedFlags#DO} is always appended.
* @param options EDNS options to be set in the OPT record, specified as a
* List of OPTRecord.Option elements.
* @see org.xbill.DNS.Resolver#setEDNS(int, int, int, java.util.List)
*/
public void setEDNS(int level, int payloadSize, int flags, @SuppressWarnings("rawtypes") List options) {
this.headResolver.setEDNS(0, payloadSize, flags | ExtendedFlags.DO, options);
}
/**
* Forwards the data to the head resolver passed at construction time.
*
* @param key The key.
* @see org.xbill.DNS.Resolver#setTSIGKey(org.xbill.DNS.TSIG)
*/
public void setTSIGKey(TSIG key) {
this.headResolver.setTSIGKey(key);
}
/**
* Sets the amount of time to wait for a response before giving up. This
* applies only to the head resolver, the time for an actual query to the
* validating resolver IS higher.
*
* @param secs The number of seconds to wait.
* @param msecs The number of milliseconds to wait.
*/
public void setTimeout(int secs, int msecs) {
this.headResolver.setTimeout(secs, msecs);
}
/**
* Sets the amount of time to wait for a response before giving up. This
* applies only to the head resolver, the time for an actual query to the
* validating resolver IS higher.
*
* @param secs The number of seconds to wait.
*/
public void setTimeout(int secs) {
this.headResolver.setTimeout(secs);
}
/**
* Sends a message and validates the response with DNSSEC before returning
* it.
*
* @param query The query to send.
* @return The validated response message.
* @throws IOException An error occurred while sending or receiving.
*/
public Message send(Message query) throws IOException {
SMessage response = this.sendRequest(query);
response.getHeader().unsetFlag(Flags.AD);
// If the CD bit is set, do not process the (cached) validation status.
if (query.getHeader().getFlag(Flags.CD)) {
return response.getMessage();
}
// Positive RRSIG responses cannot be validated as there are no
// signatures on signatures. Negative answers CAN be validated.
Message rrsigResponse = response.getMessage();
if (query.getQuestion().getType() == Type.RRSIG && rrsigResponse.getHeader().getRcode() == Rcode.NOERROR
&& rrsigResponse.getSectionRRsets(Section.ANSWER).length > 0) {
rrsigResponse.getHeader().unsetFlag(Flags.AD);
return rrsigResponse;
}
final SMessage validated = this.processValidate(query, response);
Message m = validated.getMessage();
String reason = validated.getBogusReason();
if (reason != null) {
final int maxTxtRecordStringLength = 255;
String[] parts = new String[reason.length() / maxTxtRecordStringLength + 1];
for (int i = 0; i < parts.length; i++) {
int length = Math.min((i + 1) * maxTxtRecordStringLength, reason.length());
parts[i] = reason.substring(i * maxTxtRecordStringLength, length);
}
m.addRecord(new TXTRecord(Name.root, VALIDATION_REASON_QCLASS, 0, Arrays.asList(parts)), Section.ADDITIONAL);
}
return m;
}
/**
* Not implemented.
*
* @param query The query to send
* @param listener The object containing the callbacks.
* @return An identifier, which is also a parameter in the callback
* @throws UnsupportedOperationException Always
*/
public Object sendAsync(Message query, ResolverListener listener) {
throw new UnsupportedOperationException("Not implemented");
}
/**
* Creates a response message with the given return code.
*
* @param request The request for which the response belongs.
* @param rcode The response code, @see Rcode
* @return The response message for request
.
*/
private static SMessage errorMessage(Message request, int rcode) {
SMessage m = new SMessage(request.getHeader().getID(), request.getQuestion());
Header h = m.getHeader();
h.setRcode(rcode);
h.setFlag(Flags.QR);
return m;
}
}
dnssecjava-1.1.3/src/main/resources/ 0000775 0000000 0000000 00000000000 13020541473 0017361 5 ustar 00root root 0000000 0000000 dnssecjava-1.1.3/src/main/resources/messages.properties 0000664 0000000 0000000 00000007747 13020541473 0023325 0 ustar 00root root 0000000 0000000 #
# dnssecjava - a DNSSEC validating stub resolver for Java
# Copyright (c) 2013-2015 Ingo Bauersachs
#
# All rights reserved. This program and the accompanying materials
# are made available under the terms of the Eclipse Public License v1.0
# which accompanies this distribution, and is available at
# http://www.eclipse.org/legal/epl-v10.html
#
failed.authority.nodata=NODATA response has failed AUTHORITY rrset: {0}
failed.answer.cname_nodata=CNAME_NODATA response has failed ANSWER rrset: {0}
failed.nodata=NODATA response failed to prove NODATA status with NSEC/NSEC3
failed.synthesize.multiple=Synthesized CNAME RRset has multiple records - that doesn't make sense.
failed.synthesize.nomatch=Synthesized CNAME target ({0}) included in answer doesn't match DNAME synthesis rules (expected {1}).
failed.synthesize.toolong=Synthesized name would be too long, thus bogus.
failed.answer.positive=Positive response has failed ANSWER rrset: {0}
failed.authority.positive=Positive response has failed AUTHORITY rrset: {0}
failed.positive.wildcardgeneration=Could not generate NSEC wildcard, resulting name would be too long.
failed.positive.wildcard_too_broad=Positive response was wildcard expansion and did not prove original data did not exist or wasn't generated by the correct wildcard.
failed.nxdomain.cname_nxdomain=CNAME_NAMEERROR response has failed ANSWER rrset: {0}
failed.nxdomain.authority=NameError response has failed AUTHORITY rrset: {0}
failed.nsec3_ignored=All NSEC3s were validated but ignored due to unknown algorithms or invalid iteration counts.
failed.nxdomain.nsec3_bogus=NSEC3 failed to proof the name error.
failed.nxdomain.nsec3_insecure=NSEC3 proofed that the target domain is under opt-out, response is insecure.
failed.nxdomain.exists=NameError response has failed to prove that {0} does not exist.
failed.nxdomain.haswildcard=NameError response has failed to prove that the covering wildcard does not exist.
dnskey.no_rrset=Missing DNSKEY RRset in response to DNSKEY query for {0}.
dnskey.no_ds_match=Did not match a DS to a DNSKEY.
dnskey.anchor_verify_failed=The DNSKEY trust anchor for {0} did not verify the DNSKEY RRset for {1}.
failed.ds=DS rrset in DS response did not verify.
failed.ds.cname=CNAME in DS response was not secure.
ds.secure=CNAME validated, proof that DS does not exist.
failed.ds.cname.nocname=Validator classified CNAME but no CNAME of {0} for DS.
failed.ds.nsec=NSEC RRset for the referral did not verify.
failed.ds.nsec.hasdata=NSEC RRset for the referral did not prove no DS.
failed.ds.nonsec=No signed NSEC/NSEC3 records for query to {0}/DS.
failed.ds.nodelegation=NSEC RRset for the referral proved not a delegation point
insecure.ds.nsec=NSEC RRset for the referral proved no DS.
failed.ds.nowildcardproof=NSEC for wildcard does not prove absence of DS.
failed.ds.nsec.ent=NSEC for empty non-terminal did not verify.
insecure.ds.nsec.ent=NSEC for empty non-terminal proved no DS.
failed.ds.nonconclusive=NSEC proof did not conclusively point to DS or no DS.
failed.ds.nsec3=NSEC3s proved bogus.
insecure.ds.nsec3=NSEC3s proved no DS.
failed.ds.unknown=Ran out of validation options, thus bogus.
failed.ds.notype=Encountered an unhandled type ({0}) of DS response, thus bogus.
failed.ds.nodigest=No supported digest ID for DS for {0}.
failed.ds.noalg=No supported algorithm ID on DS for {0}.
validate.insecure_unsigned=Unsigned response was proved to be validly INSECURE
validate.bogus=Could not establish validation of INSECURE status of unsigned response. Reason: {0}
validate.bogus.badkey=Could not establish a chain of trust to keys for [{0}]. Reason: {1}
validate.bogus.missingsig=Could not validate RRset due to missing signature.
validate.insecure=Verified that response is INSECURE
validate.response.unknown=Response subtype is {0} and thus cannot be validated.
insecure.ds.noalgorithms=No supported algorithms in DS RRset for {0}, treating as insecure.
failed.dname.wildcard=Illegal DNAME ({0} is from a wildcard expansion).
failed.wildcard.label_count_mismatch=Label count mismatch on RRSIGs for {0}
dnssecjava-1.1.3/src/test/ 0000775 0000000 0000000 00000000000 13020541473 0015402 5 ustar 00root root 0000000 0000000 dnssecjava-1.1.3/src/test/java/ 0000775 0000000 0000000 00000000000 13020541473 0016323 5 ustar 00root root 0000000 0000000 dnssecjava-1.1.3/src/test/java/org/ 0000775 0000000 0000000 00000000000 13020541473 0017112 5 ustar 00root root 0000000 0000000 dnssecjava-1.1.3/src/test/java/org/jitsi/ 0000775 0000000 0000000 00000000000 13020541473 0020234 5 ustar 00root root 0000000 0000000 dnssecjava-1.1.3/src/test/java/org/jitsi/dnssec/ 0000775 0000000 0000000 00000000000 13020541473 0021513 5 ustar 00root root 0000000 0000000 dnssecjava-1.1.3/src/test/java/org/jitsi/dnssec/AlwaysOffline.java 0000664 0000000 0000000 00000001234 13020541473 0025121 0 ustar 00root root 0000000 0000000 /*
* dnssecjava - a DNSSEC validating stub resolver for Java
* Copyright (c) 2013-2015 Ingo Bauersachs
*
* All rights reserved. This program and the accompanying materials
* are made available under the terms of the Eclipse Public License v1.0
* which accompanies this distribution, and is available at
* http://www.eclipse.org/legal/epl-v10.html
*/
package org.jitsi.dnssec;
import java.lang.annotation.ElementType;
import java.lang.annotation.Retention;
import java.lang.annotation.RetentionPolicy;
import java.lang.annotation.Target;
@Retention(value = RetentionPolicy.RUNTIME)
@Target(value = { ElementType.METHOD })
public @interface AlwaysOffline {
}
dnssecjava-1.1.3/src/test/java/org/jitsi/dnssec/MessageReader.java 0000664 0000000 0000000 00000006524 13020541473 0025074 0 ustar 00root root 0000000 0000000 /*
* dnssecjava - a DNSSEC validating stub resolver for Java
* Copyright (c) 2013-2015 Ingo Bauersachs
*
* All rights reserved. This program and the accompanying materials
* are made available under the terms of the Eclipse Public License v1.0
* which accompanies this distribution, and is available at
* http://www.eclipse.org/legal/epl-v10.html
*/
package org.jitsi.dnssec;
import java.io.BufferedReader;
import java.io.ByteArrayInputStream;
import java.io.IOException;
import java.io.Reader;
import org.xbill.DNS.DClass;
import org.xbill.DNS.Master;
import org.xbill.DNS.Message;
import org.xbill.DNS.Name;
import org.xbill.DNS.Rcode;
import org.xbill.DNS.Record;
import org.xbill.DNS.Section;
import org.xbill.DNS.Type;
public class MessageReader {
public Message readMessage(Reader in) throws IOException {
BufferedReader r;
if (in instanceof BufferedReader) {
r = (BufferedReader)in;
}
else {
r = new BufferedReader(in);
}
Message m = null;
String line = null;
int section = 103;
while ((line = r.readLine()) != null) {
String[] data;
if (line.startsWith(";; ->>HEADER<<- ")) {
section = 101;
m = new Message();
}
else if (line.startsWith(";; QUESTIONS:")) {
section = 102;
}
else if (line.startsWith(";; ANSWERS:")) {
section = Section.ANSWER;
line = r.readLine();
}
else if (line.startsWith(";; AUTHORITY RECORDS:")) {
section = Section.AUTHORITY;
line = r.readLine();
}
else if (line.startsWith(";; ADDITIONAL RECORDS:")) {
section = 100;
}
else if (line.startsWith("####")) {
return m;
}
else if (line.startsWith("#")) {
continue;
}
switch (section) {
case 100: // ignore
break;
case 101: // header
section = 100;
data = line.substring(";; ->>HEADER<<- ".length()).split(",");
m.getHeader().setRcode(Rcode.value(data[1].split(":\\s*")[1]));
m.getHeader().setID(Integer.parseInt(data[2].split(":\\s*")[1]));
break;
case 102: // question
line = r.readLine();
data = line.split(",");
Record q = Record.newRecord(
Name.fromString(data[0].replaceAll(";;\\s*", "")),
Type.value(data[1].split("\\s*=\\s*")[1]),
DClass.value(data[2].split("\\s*=\\s*")[1]));
m.addRecord(q, Section.QUESTION);
section = 100;
break;
default:
if (line != null && !"".equals(line)) {
Master ma = new Master(new ByteArrayInputStream(line.getBytes()));
Record record = ma.nextRecord();
if (record != null) {
m.addRecord(record, section);
}
}
}
}
r.close();
return m;
}
}
dnssecjava-1.1.3/src/test/java/org/jitsi/dnssec/PrepareMocks.java 0000664 0000000 0000000 00000000510 13020541473 0024745 0 ustar 00root root 0000000 0000000 package org.jitsi.dnssec;
import java.lang.annotation.ElementType;
import java.lang.annotation.Retention;
import java.lang.annotation.RetentionPolicy;
import java.lang.annotation.Target;
@Retention(value = RetentionPolicy.RUNTIME)
@Target(value = { ElementType.METHOD })
public @interface PrepareMocks {
String value();
}
dnssecjava-1.1.3/src/test/java/org/jitsi/dnssec/RTest.java 0000664 0000000 0000000 00000004457 13020541473 0023431 0 ustar 00root root 0000000 0000000 /*
* dnssecjava - a DNSSEC validating stub resolver for Java
* Copyright (c) 2013-2015 Ingo Bauersachs
*
* All rights reserved. This program and the accompanying materials
* are made available under the terms of the Eclipse Public License v1.0
* which accompanies this distribution, and is available at
* http://www.eclipse.org/legal/epl-v10.html
*/
package org.jitsi.dnssec;
import org.junit.Test;
import org.junit.runner.RunWith;
import org.mockito.invocation.InvocationOnMock;
import org.mockito.stubbing.Answer;
import org.powermock.core.classloader.annotations.PrepareForTest;
import org.powermock.modules.junit4.PowerMockRunner;
import java.util.ResourceBundle;
import static org.junit.Assert.assertEquals;
import static org.mockito.Matchers.anyString;
import static org.powermock.api.mockito.PowerMockito.mock;
import static org.powermock.api.mockito.PowerMockito.when;
@RunWith(PowerMockRunner.class)
@PrepareForTest(R.class)
public class RTest {
@Test
public void testCustomResourceBundle() {
ResourceBundle rb = mock(ResourceBundle.class);
when(rb.getString(anyString())).then(new Answer() {
@Override
public String answer(InvocationOnMock invocation) throws Throwable {
return (String)invocation.getArguments()[0];
}
});
R.setUseNeutralMessages(false);
R.setBundle(rb);
assertEquals("key", R.get("key"));
assertEquals("msg 1", R.get("msg {0}", 1));
}
@Test
public void testExplicitNullBundle() {
R.setUseNeutralMessages(true);
assertEquals("key", R.get("key"));
assertEquals("key:1", R.get("key", 1));
}
@Test
public void testNormal() {
R.setUseNeutralMessages(false);
R.setBundle(null);
assertEquals("no parameters", R.get("test.noparam"));
assertEquals("parameter: abc", R.get("test.withparam", "abc"));
}
@Test
public void testMissingResource() {
R.setUseNeutralMessages(false);
R.setBundle(null);
assertEquals("test.notthere.noparam", R.get("test.notthere.noparam"));
assertEquals("test.notthere.withparam:abc", R.get("test.notthere.withparam", "abc"));
assertEquals("test.notthere.withparam:abc:null:1", R.get("test.notthere.withparam", "abc", null, 1));
}
}
dnssecjava-1.1.3/src/test/java/org/jitsi/dnssec/TestAlgorithmSupport.java 0000664 0000000 0000000 00000007532 13020541473 0026550 0 ustar 00root root 0000000 0000000 /*
* dnssecjava - a DNSSEC validating stub resolver for Java
* Copyright (c) 2013-2015 Ingo Bauersachs
*
* All rights reserved. This program and the accompanying materials
* are made available under the terms of the Eclipse Public License v1.0
* which accompanies this distribution, and is available at
* http://www.eclipse.org/legal/epl-v10.html
*/
package org.jitsi.dnssec;
import static org.junit.Assert.assertEquals;
import static org.junit.Assert.assertFalse;
import java.io.IOException;
import java.util.Properties;
import org.jitsi.dnssec.validator.ValUtils;
import org.junit.Test;
import org.powermock.reflect.Whitebox;
import org.xbill.DNS.DClass;
import org.xbill.DNS.DNSSEC.Algorithm;
import org.xbill.DNS.DSRecord;
import org.xbill.DNS.DSRecord.Digest;
import org.xbill.DNS.Flags;
import org.xbill.DNS.Message;
import org.xbill.DNS.Name;
import org.xbill.DNS.Rcode;
public class TestAlgorithmSupport extends TestBase {
@Test
public void testMd5AlgRfc6944() throws IOException {
Message response = resolver.send(createMessage("rsamd5.ingotronic.ch./A"));
assertFalse("AD flag must not be set", response.getHeader().getFlag(Flags.AD));
assertEquals(Rcode.NOERROR, response.getRcode());
assertEquals("insecure.ds.noalgorithms:rsamd5.ingotronic.ch.", getReason(response));
}
@Test
public void testEccgostAlgIsUnknown() throws IOException {
Message response = resolver.send(createMessage("eccgost.ingotronic.ch./A"));
assertFalse("AD flag must not be set", response.getHeader().getFlag(Flags.AD));
assertEquals(Rcode.NOERROR, response.getRcode());
assertEquals("insecure.ds.noalgorithms:eccgost.ingotronic.ch.", getReason(response));
}
@Test
public void testDigestIdIsUnknown() throws IOException {
Message response = resolver.send(createMessage("unknown-alg.ingotronic.ch./A"));
assertFalse("AD flag must not be set", response.getHeader().getFlag(Flags.AD));
assertEquals(Rcode.NOERROR, response.getRcode());
assertEquals("failed.ds.nodigest:unknown-alg.ingotronic.ch.", getReason(response));
}
@AlwaysOffline
@Test(expected = IllegalArgumentException.class)
public void testUnsupportedDigestInDigestPreference() throws IOException {
Properties config = new Properties();
config.put("org.jitsi.dnssec.digest_preference", "1,2,0");
resolver.init(config);
}
@AlwaysOffline
@Test
public void testFavoriteDigestNotInRRset() throws Exception {
Properties config = new Properties();
config.put("org.jitsi.dnssec.digest_preference", "4");
ValUtils v = new ValUtils();
v.init(config);
SRRset set = new SRRset();
set.addRR(new DSRecord(Name.root, DClass.IN, 120, 1234, Algorithm.DSA, Digest.SHA1, new byte[] { 1, 2, 3 }));
set.addRR(new DSRecord(Name.root, DClass.IN, 120, 1234, Algorithm.DSA, Digest.SHA256, new byte[] { 1, 2, 3 }));
int digestId = Whitebox.invokeMethod(v, "favoriteDSDigestID", set);
assertEquals(0, digestId);
}
@AlwaysOffline
@Test
public void testOnlyUnsupportedDigestInRRset() throws Exception {
ValUtils v = new ValUtils();
SRRset set = new SRRset();
set.addRR(new DSRecord(Name.root, DClass.IN, 120, 1234, Algorithm.DSA, 3 /*GOST*/, new byte[] { 1, 2, 3 }));
int digestId = Whitebox.invokeMethod(v, "favoriteDSDigestID", set);
assertEquals(0, digestId);
}
@AlwaysOffline
@Test
public void testOnlyUnsupportedAlgorithmInRRset() throws Exception {
ValUtils v = new ValUtils();
SRRset set = new SRRset();
set.addRR(new DSRecord(Name.root, DClass.IN, 120, 1234, 0 /*Unknown alg*/, Digest.SHA1, new byte[] { 1, 2, 3 }));
int digestId = Whitebox.invokeMethod(v, "favoriteDSDigestID", set);
assertEquals(0, digestId);
}
}
dnssecjava-1.1.3/src/test/java/org/jitsi/dnssec/TestBase.java 0000664 0000000 0000000 00000024437 13020541473 0024102 0 ustar 00root root 0000000 0000000 /*
* dnssecjava - a DNSSEC validating stub resolver for Java
* Copyright (c) 2013-2015 Ingo Bauersachs
*
* All rights reserved. This program and the accompanying materials
* are made available under the terms of the Eclipse Public License v1.0
* which accompanies this distribution, and is available at
* http://www.eclipse.org/legal/epl-v10.html
*/
package org.jitsi.dnssec;
import java.io.BufferedReader;
import java.io.ByteArrayInputStream;
import java.io.File;
import java.io.FileWriter;
import java.io.IOException;
import java.io.InputStream;
import java.io.InputStreamReader;
import java.io.StringReader;
import java.util.Date;
import java.util.HashMap;
import java.util.Iterator;
import java.util.List;
import java.util.Map;
import java.util.logging.LogManager;
import org.jitsi.dnssec.validator.ValidatingResolver;
import org.joda.time.DateTime;
import org.joda.time.format.ISODateTimeFormat;
import org.junit.Assert;
import org.junit.Before;
import org.junit.BeforeClass;
import org.junit.Rule;
import org.junit.rules.TestRule;
import org.junit.rules.TestWatcher;
import org.junit.runner.Description;
import org.junit.runner.RunWith;
import org.mockito.Mockito;
import org.mockito.invocation.InvocationOnMock;
import org.mockito.stubbing.Answer;
import org.powermock.core.classloader.annotations.PrepareForTest;
import org.powermock.modules.junit4.PowerMockRunner;
import org.powermock.reflect.Whitebox;
import org.xbill.DNS.ARecord;
import org.xbill.DNS.DClass;
import org.xbill.DNS.DNSSEC;
import org.xbill.DNS.DNSSEC.DNSSECException;
import org.xbill.DNS.Master;
import org.xbill.DNS.Message;
import org.xbill.DNS.Name;
import org.xbill.DNS.RRset;
import org.xbill.DNS.Record;
import org.xbill.DNS.Section;
import org.xbill.DNS.SimpleResolver;
import org.xbill.DNS.TXTRecord;
import org.xbill.DNS.Type;
import static org.powermock.api.mockito.PowerMockito.whenNew;
@RunWith(PowerMockRunner.class)
@PrepareForTest({DNSSEC.class, TestInvalid.class})
public abstract class TestBase {
private final static boolean offline = !Boolean.getBoolean("org.jitsi.dnssecjava.online");
private final static boolean partialOffline = "partial".equals(System.getProperty("org.jitsi.dnssecjava.offline"));
private final static boolean record = Boolean.getBoolean("org.jitsi.dnssecjava.record");
private boolean unboundTest = false;
private boolean alwaysOffline = false;
private Map queryResponsePairs = new HashMap();
private MessageReader messageReader = new MessageReader();
private FileWriter w;
private BufferedReader r;
protected final static String localhost = "127.0.0.1";
protected ValidatingResolver resolver;
protected String testName;
static {
try {
LogManager.getLogManager().readConfiguration(TestBase.class.getResourceAsStream("logging.properties"));
}
catch (Exception e) {
throw new RuntimeException(e);
}
}
@Rule
public TestRule watcher = new TestWatcher() {
@Override
protected void starting(Description description) {
unboundTest = false;
testName = description.getMethodName();
try {
// do not record or process unbound unit tests offline
alwaysOffline = description.getAnnotation(AlwaysOffline.class) != null;
if (description.getClassName().contains("unbound")) {
unboundTest = true;
return;
}
String filename = "/recordings/" + description.getClassName().replace(".", "_") + "/" + testName;
File f = new File("./src/test/resources" + filename);
if ((record || !f.exists()) && !alwaysOffline) {
f.getParentFile().getParentFile().mkdir();
f.getParentFile().mkdir();
w = new FileWriter(f.getAbsoluteFile());
w.write("#Date: " + new DateTime().toString(ISODateTimeFormat.dateTimeNoMillis()));
w.write("\n");
}
else if (offline || partialOffline || alwaysOffline) {
PrepareMocks pm = description.getAnnotation(PrepareMocks.class);
if (pm != null) {
Whitebox.invokeMethod(TestBase.this, pm.value());
}
InputStream stream = getClass().getResourceAsStream(filename);
if (stream != null) {
r = new BufferedReader(new InputStreamReader(stream));
long millis = DateTime.parse(r.readLine().substring("#Date: ".length()), ISODateTimeFormat.dateTimeNoMillis()).getMillis();
whenNew(Date.class).withNoArguments().thenReturn(new Date(millis));
whenNew(Date.class).withArguments(Mockito.anyLong()).thenAnswer(new Answer(){
@Override
public Date answer(InvocationOnMock invocationOnMock) throws Throwable {
return new Date((Long)invocationOnMock.getArguments()[0]);
}
});
Message m;
while ((m = messageReader.readMessage(r)) != null) {
queryResponsePairs.put(key(m), m);
}
r.close();
}
}
}
catch (Exception e) {
System.err.println(e);
throw new RuntimeException(e);
}
}
@Override
protected void finished(Description description) {
try {
if (record && w != null) {
w.flush();
w.close();
w = null;
}
}
catch (IOException e) {
throw new RuntimeException(e);
}
}
};
@BeforeClass
public static void setupClass() {
R.setBundle(null);
R.setUseNeutralMessages(true);
}
@Before
public void setup() throws NumberFormatException, IOException, DNSSECException {
resolver = new ValidatingResolver(new SimpleResolver("62.192.5.131") {
@Override
public Message send(Message query) throws IOException {
System.out.println("---" + key(query));
Message response = queryResponsePairs.get(key(query));
if (response != null) {
return response;
}
else if ((offline && !partialOffline) || unboundTest || alwaysOffline) {
Assert.fail("Response for " + key(query) + " not found.");
}
Message networkResult = super.send(query);
if (record) {
w.write(networkResult.toString());
w.write("\n\n###############################################\n\n");
}
return networkResult;
}
});
resolver.loadTrustAnchors(getClass().getResourceAsStream("/trust_anchors"));
System.err.println("--------------");
}
protected void add(Message m) throws IOException {
this.add(key(m), m, true);
}
protected void add(String query, Message response) throws IOException {
this.add(query, response, true);
}
protected void add(String query, Message response, boolean clear) throws IOException {
queryResponsePairs.put(query, messageFromString(response.toString()));
// reset the resolver so any cached stuff is cleared
if (!clear) {
return;
}
try {
setup();
}
catch (NumberFormatException e) {
throw new IOException(e);
}
catch (DNSSECException e) {
throw new IOException(e);
}
}
protected Message get(Name target, int type) {
return queryResponsePairs.get(key(target, type));
}
protected void clear() {
queryResponsePairs.clear();
}
protected Message createMessage(String query) throws IOException {
return Message.newQuery(Record.newRecord(Name.fromString(query.split("/")[0]), Type.value(query.split("/")[1]), DClass.IN));
}
protected Message messageFromString(String message) throws IOException {
return messageReader.readMessage(new StringReader(message));
}
@SuppressWarnings("unchecked")
protected String firstA(Message response) {
RRset[] sectionRRsets = response.getSectionRRsets(Section.ANSWER);
if (sectionRRsets.length > 0) {
Iterator rrs = sectionRRsets[0].rrs();
while (rrs.hasNext()) {
Record r = rrs.next();
if (r.getType() == Type.A) {
return ((ARecord)r).getAddress().getHostAddress();
}
}
}
return null;
}
protected String getReason(Message m) {
for (RRset set : m.getSectionRRsets(Section.ADDITIONAL)) {
if (set.getName().equals(Name.root) && set.getType() == Type.TXT && set.getDClass() == ValidatingResolver.VALIDATION_REASON_QCLASS) {
StringBuilder sb = new StringBuilder();
@SuppressWarnings("unchecked")
List strings = (List)((TXTRecord)set.first()).getStrings();
for (String part : strings){
sb.append(part);
}
return sb.toString();
}
}
return null;
}
protected boolean isEmptyAnswer(Message response) {
RRset[] sectionRRsets = response.getSectionRRsets(Section.ANSWER);
return sectionRRsets.length == 0;
}
private String key(Name n, int t) {
return n + "/" + Type.string(t);
}
private String key(Record r) {
return key(r.getName(), r.getType());
}
private String key(Message m) {
return key(m.getQuestion());
}
protected Record toRecord(String data){
try {
InputStream in = new ByteArrayInputStream(data.getBytes("UTF-8"));
Master m = new Master(in, Name.root);
return m._nextRecord();
}
catch (IOException e) {
throw new RuntimeException(e);
}
}
}
dnssecjava-1.1.3/src/test/java/org/jitsi/dnssec/TestBogusReasonMessage.java 0000664 0000000 0000000 00000003412 13020541473 0026752 0 ustar 00root root 0000000 0000000 /*
* dnssecjava - a DNSSEC validating stub resolver for Java
* Copyright (c) 2013-2016 Ingo Bauersachs
*
* All rights reserved. This program and the accompanying materials
* are made available under the terms of the Eclipse Public License v1.0
* which accompanies this distribution, and is available at
* http://www.eclipse.org/legal/epl-v10.html
*/
package org.jitsi.dnssec;
import static org.junit.Assert.assertEquals;
import static org.junit.Assert.assertFalse;
import java.io.IOException;
import org.junit.Test;
import org.xbill.DNS.Flags;
import org.xbill.DNS.Message;
import org.xbill.DNS.Rcode;
public class TestBogusReasonMessage extends TestBase {
@Test
public void testLongBogusReasonIsSplitCorrectly() throws IOException {
Message response = resolver.send(createMessage("01234567890123456789012345678901234567890123456789.01234567890123456789012345678901234567890123456789.01234567890123456789012345678901234567890123456789.01234567890123456789012345678901234567890123456789.isc.org./A"));
assertFalse("AD flag must not be set", response.getHeader().getFlag(Flags.AD));
assertEquals(Rcode.SERVFAIL, response.getRcode());
assertEquals("failed.nxdomain.authority:{ isc.org. 2962 IN NSEC [01234567890123456789012345678901234567890123456789.01234567890123456789012345678901234567890123456789.01234567890123456789012345678901234567890123456789.01234567890123456789012345678901234567890123456789.isc.org. A NS SOA MX TXT AAAA NAPTR RRSIG NSEC DNSKEY SPF] sigs: [NSEC 5 2 3600 20160706234032 20160606234032 13953 isc.org. fnOJeQG2vOwrERAPIqAenLOosbIBT7UvmxOV8Az2ExOhlGxP2CEqZEc5NPVbidq4oZC2kHyG7x31D6LBJXeXgOuanv+uqPNe9UIiUhdj+Egf8FEWIOKp8nxgjQGiGSNbQenWjeWoR91sReFEU+Pn7NPlEI072MzEESOT8oVucx8=] }",
getReason(response));
}
}
dnssecjava-1.1.3/src/test/java/org/jitsi/dnssec/TestByteArrayComparator.java 0000664 0000000 0000000 00000002207 13020541473 0027151 0 ustar 00root root 0000000 0000000 /*
* dnssecjava - a DNSSEC validating stub resolver for Java
* Copyright (c) 2013-2015 Ingo Bauersachs
*
* All rights reserved. This program and the accompanying materials
* are made available under the terms of the Eclipse Public License v1.0
* which accompanies this distribution, and is available at
* http://www.eclipse.org/legal/epl-v10.html
*/
package org.jitsi.dnssec;
import static org.junit.Assert.assertEquals;
import org.jitsi.dnssec.validator.ByteArrayComparator;
import org.junit.Test;
public class TestByteArrayComparator {
private ByteArrayComparator c = new ByteArrayComparator();
private byte[] b1 = new byte[] { 0 };
private byte[] b2 = new byte[] { 0 };
private byte[] b3 = new byte[] { 1 };
private byte[] b4 = new byte[] { 1, 0 };
@Test
public void testEquals() {
assertEquals(0, c.compare(b1, b2));
}
@Test
public void testLessThan() {
assertEquals(-1, c.compare(b2, b3));
assertEquals(-1, c.compare(b1, b4));
}
@Test
public void testGreaterThan() {
assertEquals(1, c.compare(b3, b2));
assertEquals(1, c.compare(b4, b1));
}
}
dnssecjava-1.1.3/src/test/java/org/jitsi/dnssec/TestCNames.java 0000664 0000000 0000000 00000016006 13020541473 0024367 0 ustar 00root root 0000000 0000000 /*
* dnssecjava - a DNSSEC validating stub resolver for Java
* Copyright (c) 2013-2015 Ingo Bauersachs
*
* All rights reserved. This program and the accompanying materials
* are made available under the terms of the Eclipse Public License v1.0
* which accompanies this distribution, and is available at
* http://www.eclipse.org/legal/epl-v10.html
*/
package org.jitsi.dnssec;
import static org.junit.Assert.*;
import java.io.IOException;
import org.junit.Test;
import org.xbill.DNS.Flags;
import org.xbill.DNS.Message;
import org.xbill.DNS.Rcode;
public class TestCNames extends TestBase {
@Test
public void testCNameToUnsignedA() throws IOException {
Message response = resolver.send(createMessage("cunsinged.ingotronic.ch./A"));
assertFalse("AD flag must not be set", response.getHeader().getFlag(Flags.AD));
assertEquals(Rcode.NOERROR, response.getRcode());
assertEquals("insecure.ds.nsec3", getReason(response));
}
@Test
public void testCNameToUnsignedMX() throws IOException {
Message response = resolver.send(createMessage("cunsinged.ingotronic.ch./MX"));
assertFalse("AD flag must not be set", response.getHeader().getFlag(Flags.AD));
assertEquals(Rcode.NOERROR, response.getRcode());
assertEquals("insecure.ds.nsec3", getReason(response));
}
@Test
public void testCNameToSignedA() throws IOException {
Message response = resolver.send(createMessage("csigned.ingotronic.ch./A"));
assertTrue("AD flag must be set", response.getHeader().getFlag(Flags.AD));
assertEquals(Rcode.NOERROR, response.getRcode());
assertNull(getReason(response));
}
@Test
public void testCNameToSignedMX() throws IOException {
Message response = resolver.send(createMessage("csigned.ingotronic.ch./MX"));
assertTrue("AD flag must be set", response.getHeader().getFlag(Flags.AD));
assertEquals(Rcode.NOERROR, response.getRcode());
assertNull(getReason(response));
}
@Test
public void testCNameToSignedAExternal() throws IOException {
Message response = resolver.send(createMessage("csext.ingotronic.ch./A"));
assertTrue("AD flag must be set", response.getHeader().getFlag(Flags.AD));
assertEquals(Rcode.NOERROR, response.getRcode());
assertNull(getReason(response));
}
@Test
public void testCNameToInvalidSigned() throws IOException {
Message response = resolver.send(createMessage("cfailed.ingotronic.ch./A"));
assertFalse("AD flag must not be set", response.getHeader().getFlag(Flags.AD));
assertEquals(Rcode.SERVFAIL, response.getRcode());
assertEquals("validate.bogus.badkey:dnssec-failed.org.:dnskey.no_ds_match", getReason(response));
}
@Test
public void testCNameToUnsignedNsec3() throws IOException {
Message response = resolver.send(createMessage("cunsinged.nsec3.ingotronic.ch./A"));
assertFalse("AD flag must not be set", response.getHeader().getFlag(Flags.AD));
assertEquals(Rcode.NOERROR, response.getRcode());
assertEquals("insecure.ds.nsec3", getReason(response));
}
@Test
public void testCNameToSignedNsec3() throws IOException {
Message response = resolver.send(createMessage("csigned.nsec3.ingotronic.ch./A"));
assertTrue("AD flag must be set", response.getHeader().getFlag(Flags.AD));
assertEquals(Rcode.NOERROR, response.getRcode());
assertNull(getReason(response));
}
@Test
public void testCNameToInvalidSignedNsec3() throws IOException {
Message response = resolver.send(createMessage("cfailed.nsec3.ingotronic.ch./A"));
assertFalse("AD flag must not be set", response.getHeader().getFlag(Flags.AD));
assertEquals(Rcode.SERVFAIL, response.getRcode());
assertEquals("validate.bogus.badkey:dnssec-failed.org.:dnskey.no_ds_match", getReason(response));
}
@Test
public void testCNameToVoid3Chain() throws IOException {
Message response = resolver.send(createMessage("cvoid3.ingotronic.ch./A"));
assertTrue("AD flag must be set", response.getHeader().getFlag(Flags.AD));
assertEquals(Rcode.NXDOMAIN, response.getRcode());
assertNull(getReason(response));
}
@Test
public void testCNameToVoid2Chain() throws IOException {
Message response = resolver.send(createMessage("cvoid2.ingotronic.ch./A"));
assertTrue("AD flag must be set", response.getHeader().getFlag(Flags.AD));
assertEquals(Rcode.NXDOMAIN, response.getRcode());
assertNull(getReason(response));
}
@Test
public void testCNameToVoid() throws IOException {
Message response = resolver.send(createMessage("cvoid1.ingotronic.ch./A"));
assertTrue("AD flag must be set", response.getHeader().getFlag(Flags.AD));
assertEquals(Rcode.NXDOMAIN, response.getRcode());
assertNull(getReason(response));
}
@Test
public void testCNameToUnsignedVoid() throws IOException {
Message response = resolver.send(createMessage("cvoid4.ingotronic.ch./A"));
assertFalse("AD flag must not be set", response.getHeader().getFlag(Flags.AD));
assertEquals(Rcode.NXDOMAIN, response.getRcode());
assertEquals("insecure.ds.nsec", getReason(response));
}
@Test
public void testCNameToExternalUnsignedVoid() throws IOException {
Message response = resolver.send(createMessage("cvoid.dnssectest.jitsi.net./A"));
assertFalse("AD flag must not be set", response.getHeader().getFlag(Flags.AD));
assertEquals(Rcode.NXDOMAIN, response.getRcode());
assertEquals("insecure.ds.nsec3", getReason(response));
}
@Test
public void testCNameToSubSigned() throws IOException {
Message response = resolver.send(createMessage("cssub.ingotronic.ch./A"));
assertTrue("AD flag must be set", response.getHeader().getFlag(Flags.AD));
assertEquals(Rcode.NOERROR, response.getRcode());
assertNull(getReason(response));
}
@Test
public void testCNameToVoidExternalInvalidTld() throws IOException {
Message response = resolver.send(createMessage("cvoidext1.ingotronic.ch./A"));
assertTrue("AD flag must be set", response.getHeader().getFlag(Flags.AD));
assertEquals(Rcode.NXDOMAIN, response.getRcode());
assertNull(getReason(response));
}
@Test
public void testCNameToVoidExternalValidTld() throws IOException {
Message response = resolver.send(createMessage("cvoidext2.ingotronic.ch./A"));
assertTrue("AD flag must be set", response.getHeader().getFlag(Flags.AD));
assertEquals(Rcode.NXDOMAIN, response.getRcode());
assertNull(getReason(response));
}
@Test
public void testCNameToVoidNsec3() throws IOException {
Message response = resolver.send(createMessage("cvoid.nsec3.ingotronic.ch./A"));
assertTrue("AD flag must be set", response.getHeader().getFlag(Flags.AD));
assertEquals(Rcode.NXDOMAIN, response.getRcode());
assertNull(getReason(response));
}
}
dnssecjava-1.1.3/src/test/java/org/jitsi/dnssec/TestDNames.java 0000664 0000000 0000000 00000017223 13020541473 0024372 0 ustar 00root root 0000000 0000000 /*
* dnssecjava - a DNSSEC validating stub resolver for Java
* Copyright (c) 2013-2015 Ingo Bauersachs
*
* All rights reserved. This program and the accompanying materials
* are made available under the terms of the Eclipse Public License v1.0
* which accompanies this distribution, and is available at
* http://www.eclipse.org/legal/epl-v10.html
*/
package org.jitsi.dnssec;
import static org.junit.Assert.assertEquals;
import static org.junit.Assert.assertFalse;
import static org.junit.Assert.assertNull;
import static org.junit.Assert.assertTrue;
import java.io.IOException;
import java.util.Iterator;
import org.junit.Test;
import org.xbill.DNS.DClass;
import org.xbill.DNS.DNAMERecord;
import org.xbill.DNS.Flags;
import org.xbill.DNS.Lookup;
import org.xbill.DNS.Message;
import org.xbill.DNS.Name;
import org.xbill.DNS.RRset;
import org.xbill.DNS.Rcode;
import org.xbill.DNS.Record;
import org.xbill.DNS.Section;
import org.xbill.DNS.Type;
public class TestDNames extends TestBase {
@Test
public void testDNameToExistingIsValid() throws IOException {
Message response = resolver.send(createMessage("www.alias.ingotronic.ch./A"));
assertTrue("AD flag must be set", response.getHeader().getFlag(Flags.AD));
assertEquals(Rcode.NOERROR, response.getRcode());
assertNull(getReason(response));
}
@Test
public void testDNameToNoDataIsValid() throws IOException {
Message response = resolver.send(createMessage("www.alias.ingotronic.ch./MX"));
assertTrue("AD flag must be set", response.getHeader().getFlag(Flags.AD));
assertEquals(Rcode.NOERROR, response.getRcode());
assertNull(getReason(response));
}
@Test
public void testDNameToNxDomainIsValid() throws IOException {
Message response = resolver.send(createMessage("x.alias.ingotronic.ch./A"));
assertTrue("AD flag must be set", response.getHeader().getFlag(Flags.AD));
assertEquals(Rcode.NXDOMAIN, response.getRcode());
assertNull(getReason(response));
}
@Test
public void testDNameDirectQueryIsValid() throws IOException {
Message response = resolver.send(createMessage("alias.ingotronic.ch./DNAME"));
assertTrue("AD flag must not set", response.getHeader().getFlag(Flags.AD));
assertEquals(Rcode.NOERROR, response.getRcode());
assertNull(getReason(response));
for (RRset set : response.getSectionRRsets(Section.ANSWER)) {
if (set.getType() == Type.DNAME) {
DNAMERecord r = (DNAMERecord)set.first();
assertEquals(Name.fromString("ingotronic.ch."), r.getTarget());
}
}
}
@Test
public void testDNameWithFakedCnameIsInvalid() throws IOException {
Message m = resolver.send(createMessage("www.alias.ingotronic.ch./A"));
Message message = messageFromString(m.toString().replaceAll("(.*CNAME\\s+)(.*)", "$1 www.isc.org."));
add("www.alias.ingotronic.ch./A", message);
Message response = resolver.send(createMessage("www.alias.ingotronic.ch./A"));
assertFalse("AD flag must not be set", response.getHeader().getFlag(Flags.AD));
assertEquals(Rcode.SERVFAIL, response.getRcode());
assertEquals("failed.synthesize.nomatch:www.isc.org.:www.ingotronic.ch.", getReason(response));
}
@Test
public void testDNameWithNoCnameIsValid() throws IOException {
Message m = resolver.send(createMessage("www.isc.ingotronic.ch./A"));
Message message = messageFromString(m.toString().replaceAll("(.*CNAME.*)", "").replaceAll("\n\n", "\n"));
add("www.isc.ingotronic.ch./A", message);
Message response = resolver.send(createMessage("www.isc.ingotronic.ch./A"));
assertTrue("AD flag must be set", response.getHeader().getFlag(Flags.AD));
assertEquals(Rcode.NOERROR, response.getRcode());
assertNull(getReason(response));
Lookup l = new Lookup("www.isc.ingotronic.ch");
l.setResolver(resolver);
Record[] results = l.run();
assertTrue(results != null);
assertTrue(results.length >= 1);
}
@Test
public void testDNameWithMultipleCnamesIsInvalid() throws IOException {
Message m = resolver.send(createMessage("www.alias.ingotronic.ch./A"));
Message message = messageFromString(m.toString().replaceAll("(.*CNAME.*)", "$1\n$1example.com."));
add("www.alias.ingotronic.ch./A", message);
Message response = resolver.send(createMessage("www.alias.ingotronic.ch./A"));
assertFalse("AD flag must not be set", response.getHeader().getFlag(Flags.AD));
assertEquals(Rcode.SERVFAIL, response.getRcode());
assertEquals("failed.synthesize.multiple", getReason(response));
}
@Test
public void testDNameWithTooLongCnameIsInvalid() throws IOException {
Message m = resolver.send(createMessage("www.n3.ingotronic.ch./A"));
Message message = messageFromString(m
.toString()
.replaceAll(
"(.*\\.)(.*CNAME)",
"IamAVeryLongNameThatExeceedsTheMaximumOfTheAllowedDomainNameSys.temSpecificationLengthByAny.NumberThatAHumanOfTheSeventiesCouldHaveImagined.InThisSmallMindedWorldThatIs.NowAfterTheMillennium.InhabitedByOverSeven.BillionPeopleInFiveConts.n3.ingotronic.ch. $2"));
add("www.n3.ingotronic.ch./A", message);
Message response = resolver.send(createMessage("www.n3.ingotronic.ch./A"));
assertFalse("AD flag must not be set", response.getHeader().getFlag(Flags.AD));
assertEquals(Rcode.SERVFAIL, response.getRcode());
assertEquals("failed.synthesize.toolong", getReason(response));
}
@SuppressWarnings("unchecked")
@Test
public void testDNameInNsecIsUnderstood_Rfc6672_5_3_4_1() throws IOException {
Message nsecs = resolver.send(createMessage("alias.ingotronic.ch./NS"));
RRset nsecSet = null;
for (RRset set : nsecs.getSectionRRsets(Section.AUTHORITY)) {
if (set.getName().equals(Name.fromString("alias.ingotronic.ch."))) {
nsecSet = set;
break;
}
}
Message message = new Message();
message.getHeader().setRcode(Rcode.NXDOMAIN);
message.addRecord(Record.newRecord(Name.fromString("www.alias.ingotronic.ch."), Type.A, DClass.IN), Section.QUESTION);
Iterator rrs = nsecSet.rrs();
while (rrs.hasNext()) {
message.addRecord(rrs.next(), Section.AUTHORITY);
}
Iterator sigs = nsecSet.sigs();
while (sigs.hasNext()) {
message.addRecord(sigs.next(), Section.AUTHORITY);
}
add("www.alias.ingotronic.ch./A", message);
Message response = resolver.send(createMessage("www.alias.ingotronic.ch./A"));
assertFalse("AD flag must not be set", response.getHeader().getFlag(Flags.AD));
assertEquals(Rcode.SERVFAIL, response.getRcode());
assertEquals("failed.nxdomain.exists:www.alias.ingotronic.ch.", getReason(response));
}
@Test
public void testDNameToExternal() throws IOException {
Message response = resolver.send(createMessage("www.isc.ingotronic.ch./A"));
assertTrue("AD flag must be set", response.getHeader().getFlag(Flags.AD));
assertEquals(Rcode.NOERROR, response.getRcode());
assertNull(getReason(response));
}
@Test
public void testDNameChain() throws IOException {
Message response = resolver.send(createMessage("www.alias.nsec3.ingotronic.ch./A"));
assertTrue("AD flag must be set", response.getHeader().getFlag(Flags.AD));
assertEquals(Rcode.NOERROR, response.getRcode());
assertNull(getReason(response));
}
}
dnssecjava-1.1.3/src/test/java/org/jitsi/dnssec/TestInvalid.java 0000664 0000000 0000000 00000020602 13020541473 0024604 0 ustar 00root root 0000000 0000000 /*
* dnssecjava - a DNSSEC validating stub resolver for Java
* Copyright (c) 2013-2015 Ingo Bauersachs
*
* All rights reserved. This program and the accompanying materials
* are made available under the terms of the Eclipse Public License v1.0
* which accompanies this distribution, and is available at
* http://www.eclipse.org/legal/epl-v10.html
*/
package org.jitsi.dnssec;
import static org.junit.Assert.*;
import java.io.IOException;
import java.net.InetAddress;
import java.util.Date;
import org.junit.Ignore;
import org.junit.Test;
import org.xbill.DNS.ARecord;
import org.xbill.DNS.DClass;
import org.xbill.DNS.DNSSEC.Algorithm;
import org.xbill.DNS.Flags;
import org.xbill.DNS.Message;
import org.xbill.DNS.Name;
import org.xbill.DNS.RRSIGRecord;
import org.xbill.DNS.Rcode;
import org.xbill.DNS.Record;
import org.xbill.DNS.Section;
import org.xbill.DNS.Type;
public class TestInvalid extends TestBase {
@Test
@AlwaysOffline
public void testUnknownAlg() throws IOException {
Message response = resolver.send(createMessage("unknownalgorithm.dnssec.tjeb.nl./A"));
assertFalse("AD flag must not be set", response.getHeader().getFlag(Flags.AD));
assertEquals(Rcode.SERVFAIL, response.getRcode());
assertEquals("validate.bogus.badkey:unknownalgorithm.dnssec.tjeb.nl.:failed.ds", getReason(response));
}
@Test
@Ignore
@AlwaysOffline
public void testSigNotIncepted() throws IOException {
Message response = resolver.send(createMessage("signotincepted.dnssec.tjeb.nl./A"));
assertFalse("AD flag must not be set", response.getHeader().getFlag(Flags.AD));
assertEquals(Rcode.SERVFAIL, response.getRcode());
assertEquals("validate.bogus.badkey:signotincepted.dnssec.tjeb.nl.:failed.ds", getReason(response));
}
@Test
@AlwaysOffline
public void testSigExpired() throws IOException {
Message response = resolver.send(createMessage("sigexpired.dnssec.tjeb.nl./A"));
assertFalse("AD flag must not be set", response.getHeader().getFlag(Flags.AD));
assertEquals(Rcode.SERVFAIL, response.getRcode());
assertEquals("validate.bogus.badkey:sigexpired.dnssec.tjeb.nl.:failed.ds", getReason(response));
}
@Test
@AlwaysOffline
public void testBogusSig() throws IOException {
Message response = resolver.send(createMessage("bogussig.dnssec.tjeb.nl./A"));
assertFalse("AD flag must not be set", response.getHeader().getFlag(Flags.AD));
assertEquals(Rcode.SERVFAIL, response.getRcode());
assertEquals("validate.bogus.badkey:bogussig.dnssec.tjeb.nl.:failed.ds", getReason(response));
}
@Test
@AlwaysOffline
public void testSignedBelowUnsignedBelowSigned() throws IOException {
Message response = resolver.send(createMessage("ok.nods.ok.dnssec.tjeb.nl./A"));
assertFalse("AD flag must not be set", response.getHeader().getFlag(Flags.AD));
assertEquals(Rcode.NOERROR, response.getRcode());
assertFalse(isEmptyAnswer(response));
assertEquals("insecure.ds.nsec", getReason(response));
}
@Test
@AlwaysOffline
public void testUnknownAlgNsec3() throws IOException {
Message response = resolver.send(createMessage("unknownalgorithm.Nsec3.tjeb.nl./A"));
assertFalse("AD flag must not be set", response.getHeader().getFlag(Flags.AD));
assertEquals(Rcode.SERVFAIL, response.getRcode());
assertEquals("validate.bogus.badkey:unknownalgorithm.nsec3.tjeb.nl.:failed.ds", getReason(response));
}
@Test
@AlwaysOffline
public void testSigNotInceptedNsec3() throws IOException {
Message response = resolver.send(createMessage("signotincepted.Nsec3.tjeb.nl./A"));
assertFalse("AD flag must not be set", response.getHeader().getFlag(Flags.AD));
assertEquals(Rcode.SERVFAIL, response.getRcode());
}
@Test
@AlwaysOffline
public void testSigExpiredNsec3() throws IOException {
Message response = resolver.send(createMessage("sigexpired.Nsec3.tjeb.nl./A"));
assertFalse("AD flag must not be set", response.getHeader().getFlag(Flags.AD));
assertEquals(Rcode.SERVFAIL, response.getRcode());
assertEquals("validate.bogus.badkey:sigexpired.nsec3.tjeb.nl.:failed.ds", getReason(response));
}
@Test
@AlwaysOffline
public void testBogusSigNsec3() throws IOException {
Message response = resolver.send(createMessage("bogussig.Nsec3.tjeb.nl./A"));
assertFalse("AD flag must not be set", response.getHeader().getFlag(Flags.AD));
assertEquals(Rcode.SERVFAIL, response.getRcode());
assertEquals("validate.bogus.badkey:bogussig.nsec3.tjeb.nl.:failed.ds", getReason(response));
}
@Test
@AlwaysOffline
public void testSignedBelowUnsignedBelowSignedNsec3() throws IOException {
Message response = resolver.send(createMessage("ok.nods.ok.Nsec3.tjeb.nl./A"));
assertFalse("AD flag must not be set", response.getHeader().getFlag(Flags.AD));
assertEquals(Rcode.NOERROR, response.getRcode());
assertFalse(isEmptyAnswer(response));
assertEquals("insecure.ds.nsec3", getReason(response));
}
@Test
public void testUnsignedThatMustBeSigned() throws IOException {
Name query = Name.fromString("www.ingotronic.ch.");
// prepare a faked, unsigned response message that must have a signature
// to be valid
Message message = new Message();
message.addRecord(Record.newRecord(query, Type.A, DClass.IN), Section.QUESTION);
message.addRecord(new ARecord(query, Type.A, DClass.IN, InetAddress.getByName(localhost)), Section.ANSWER);
add("www.ingotronic.ch./A", message);
Message response = resolver.send(createMessage("www.ingotronic.ch./A"));
assertFalse("AD flag must not be set", response.getHeader().getFlag(Flags.AD));
assertEquals(Rcode.SERVFAIL, response.getRcode());
assertEquals("validate.bogus.missingsig", getReason(response));
}
@Test
public void testModifiedSignature() throws IOException {
Name query = Name.fromString("www.ingotronic.ch.");
// prepare a faked, unsigned response message that must have a signature
// to be valid
Message message = new Message();
message.addRecord(Record.newRecord(query, Type.A, DClass.IN), Section.QUESTION);
message.addRecord(new ARecord(query, Type.A, DClass.IN, InetAddress.getByName(localhost)), Section.ANSWER);
message.addRecord(new RRSIGRecord(query, DClass.IN, 0, Type.A, Algorithm.RSASHA256, 5, new Date(System.currentTimeMillis() + 5000), new Date(System.currentTimeMillis() - 5000), 1234, Name.fromString("ingotronic.ch."), new byte[] { 1, 2, 3 }), Section.ANSWER);
add("www.ingotronic.ch./A", message);
Message response = resolver.send(createMessage("www.ingotronic.ch./A"));
assertFalse("AD flag must not be set", response.getHeader().getFlag(Flags.AD));
assertEquals(Rcode.SERVFAIL, response.getRcode());
assertTrue(getReason(response).startsWith("failed.answer.positive:{ www.ingotronic.ch."));
}
@Test
public void testReturnServfailIfIntermediateQueryFails() throws IOException {
Message message = new Message();
message.getHeader().setRcode(Rcode.NOTAUTH);
message.addRecord(Record.newRecord(Name.fromString("ch."), Type.DS, DClass.IN), Section.QUESTION);
add("ch./DS", message);
Message response = resolver.send(createMessage("www.ingotronic.ch./A"));
assertFalse("AD flag must not be set", response.getHeader().getFlag(Flags.AD));
// rfc4035#section-5.5
assertEquals(Rcode.SERVFAIL, response.getRcode());
assertEquals("validate.bogus.badkey:ch.:failed.ds.nonsec:ch.", getReason(response));
}
@Test
public void testReturnOriginalRcodeIfPrimaryQueryFails() throws IOException {
Message message = new Message();
message.getHeader().setRcode(Rcode.REFUSED);
message.addRecord(Record.newRecord(Name.fromString("www.ingotronic.ch."), Type.A, DClass.IN), Section.QUESTION);
add("www.ingotronic.ch./A", message);
Message response = resolver.send(createMessage("www.ingotronic.ch./A"));
assertFalse("AD flag must not be set", response.getHeader().getFlag(Flags.AD));
// rfc4035#section-5.5
assertEquals(Rcode.REFUSED, response.getRcode());
assertEquals("failed.nodata", getReason(response));
}
}
dnssecjava-1.1.3/src/test/java/org/jitsi/dnssec/TestKeyCache.java 0000664 0000000 0000000 00000010712 13020541473 0024673 0 ustar 00root root 0000000 0000000 /*
* dnssecjava - a DNSSEC validating stub resolver for Java
* Copyright (c) 2013-2015 Ingo Bauersachs
*
* All rights reserved. This program and the accompanying materials
* are made available under the terms of the Eclipse Public License v1.0
* which accompanies this distribution, and is available at
* http://www.eclipse.org/legal/epl-v10.html
*/
package org.jitsi.dnssec;
import static org.junit.Assert.*;
import java.util.Properties;
import org.jitsi.dnssec.SRRset;
import org.jitsi.dnssec.SecurityStatus;
import org.jitsi.dnssec.validator.KeyCache;
import org.jitsi.dnssec.validator.KeyEntry;
import org.junit.Test;
import org.xbill.DNS.DClass;
import org.xbill.DNS.DNSKEYRecord;
import org.xbill.DNS.DSRecord;
import org.xbill.DNS.Name;
import org.xbill.DNS.RRset;
import org.xbill.DNS.TextParseException;
public class TestKeyCache {
@Test
public void testNullPropertiesDontFail(){
KeyCache kc = new KeyCache();
kc.init(null);
}
@Test
public void testMaxCacheSize() throws TextParseException {
Properties p = new Properties();
p.put(KeyCache.MAX_CACHE_SIZE_CONFIG, "1");
KeyCache kc = new KeyCache();
kc.init(p);
KeyEntry nkeA = KeyEntry.newNullKeyEntry(Name.fromString("a."), DClass.IN, 60);
KeyEntry nkeB = KeyEntry.newNullKeyEntry(Name.fromString("b."), DClass.IN, 60);
kc.store(nkeA);
kc.store(nkeB);
KeyEntry fromCache = kc.find(Name.fromString("a."), DClass.IN);
assertNull(fromCache);
}
@Test
public void testTtlExpiration() throws TextParseException, InterruptedException {
KeyCache kc = new KeyCache();
KeyEntry nkeA = KeyEntry.newNullKeyEntry(Name.fromString("a."), DClass.IN, 1);
kc.store(nkeA);
Thread.sleep(1100);
KeyEntry fromCache = kc.find(Name.fromString("a."), DClass.IN);
assertNull(fromCache);
}
@Test
public void testTtlNoLongerThanMaxTtl() throws TextParseException, InterruptedException {
Properties p = new Properties();
p.put(KeyCache.MAX_TTL_CONFIG, "1");
KeyCache kc = new KeyCache();
kc.init(p);
KeyEntry nkeA = KeyEntry.newNullKeyEntry(Name.fromString("a."), DClass.IN, 60);
kc.store(nkeA);
Thread.sleep(1100);
KeyEntry fromCache = kc.find(Name.fromString("a."), DClass.IN);
assertNull(fromCache);
}
@Test
public void testPositiveEntryExactMatch() throws TextParseException {
KeyCache kc = new KeyCache();
KeyEntry nkeA = KeyEntry.newNullKeyEntry(Name.fromString("a.a."), DClass.IN, 60);
KeyEntry nkeB = KeyEntry.newNullKeyEntry(Name.fromString("a.b."), DClass.IN, 60);
kc.store(nkeA);
kc.store(nkeB);
KeyEntry fromCache = kc.find(Name.fromString("a.a."), DClass.IN);
assertEquals(nkeA, fromCache);
}
@Test
public void testPositiveEntryEncloserMatch() throws TextParseException {
KeyCache kc = new KeyCache();
KeyEntry nkeA = KeyEntry.newNullKeyEntry(Name.fromString("a."), DClass.IN, 60);
KeyEntry nkeB = KeyEntry.newNullKeyEntry(Name.fromString("b."), DClass.IN, 60);
kc.store(nkeA);
kc.store(nkeB);
KeyEntry fromCache = kc.find(Name.fromString("a.a."), DClass.IN);
assertEquals(nkeA, fromCache);
}
@Test
public void testCacheOnlySecureDNSKEYs() throws TextParseException {
KeyCache kc = new KeyCache();
DNSKEYRecord rA = new DNSKEYRecord(Name.fromString("a."), DClass.IN, 60, 0, 0, 0, new byte[]{0});
SRRset setA = new SRRset(new RRset(rA));
setA.setSecurityStatus(SecurityStatus.SECURE);
KeyEntry nkeA = KeyEntry.newKeyEntry(setA);
kc.store(nkeA);
DSRecord rB = new DSRecord(Name.fromString("b."), DClass.IN, 60, 0, 0, 0, new byte[]{0});
SRRset setB = new SRRset(new RRset(rB));
KeyEntry nkeB = KeyEntry.newKeyEntry(setB);
kc.store(nkeB);
DNSKEYRecord rC = new DNSKEYRecord(Name.fromString("c."), DClass.IN, 60, 0, 0, 0, new byte[]{0});
SRRset setC = new SRRset(new RRset(rC));
KeyEntry nkeC = KeyEntry.newKeyEntry(setC);
kc.store(nkeC);
KeyEntry fromCacheA = kc.find(Name.fromString("a."), DClass.IN);
assertEquals(nkeA, fromCacheA);
KeyEntry fromCacheB = kc.find(Name.fromString("b."), DClass.IN);
assertNull(fromCacheB);
KeyEntry fromCacheC = kc.find(Name.fromString("c."), DClass.IN);
assertNull(fromCacheC);
}
}
dnssecjava-1.1.3/src/test/java/org/jitsi/dnssec/TestKeyCacheUsage.java 0000664 0000000 0000000 00000002761 13020541473 0025665 0 ustar 00root root 0000000 0000000 /*
* dnssecjava - a DNSSEC validating stub resolver for Java
* Copyright (c) 2013-2015 Ingo Bauersachs
*
* All rights reserved. This program and the accompanying materials
* are made available under the terms of the Eclipse Public License v1.0
* which accompanies this distribution, and is available at
* http://www.eclipse.org/legal/epl-v10.html
*/
package org.jitsi.dnssec;
import static org.junit.Assert.assertEquals;
import static org.junit.Assert.assertFalse;
import java.io.IOException;
import org.junit.Test;
import org.xbill.DNS.Flags;
import org.xbill.DNS.Message;
import org.xbill.DNS.Rcode;
public class TestKeyCacheUsage extends TestBase {
@Test
public void testUnsigned() throws IOException {
Message response = resolver.send(createMessage("www.unsigned.ingotronic.ch./A"));
assertFalse("AD flag must not be set", response.getHeader().getFlag(Flags.AD));
assertEquals(Rcode.NOERROR, response.getRcode());
assertEquals(localhost, firstA(response));
assertEquals("insecure.ds.nsec", getReason(response));
// send the query a second time to ensure the cache doesn't create a wrong behavior
response = resolver.send(createMessage("www.unsigned.ingotronic.ch./A"));
assertFalse("AD flag must not be set", response.getHeader().getFlag(Flags.AD));
assertEquals(Rcode.NOERROR, response.getRcode());
assertEquals(localhost, firstA(response));
assertEquals("insecure.ds.nsec", getReason(response));
}
}
dnssecjava-1.1.3/src/test/java/org/jitsi/dnssec/TestNSEC3NoData.java 0000664 0000000 0000000 00000013151 13020541473 0025121 0 ustar 00root root 0000000 0000000 /*
* dnssecjava - a DNSSEC validating stub resolver for Java
* Copyright (c) 2013-2015 Ingo Bauersachs
*
* All rights reserved. This program and the accompanying materials
* are made available under the terms of the Eclipse Public License v1.0
* which accompanies this distribution, and is available at
* http://www.eclipse.org/legal/epl-v10.html
*/
package org.jitsi.dnssec;
import static org.junit.Assert.assertEquals;
import static org.junit.Assert.assertFalse;
import static org.junit.Assert.assertNull;
import static org.junit.Assert.assertTrue;
import java.io.IOException;
import org.junit.Test;
import org.xbill.DNS.Flags;
import org.xbill.DNS.Message;
import org.xbill.DNS.RRset;
import org.xbill.DNS.Rcode;
public class TestNSEC3NoData extends TestBase {
@Test
@AlwaysOffline
public void testNodataButHasCname() throws IOException {
Message response = resolver.send(createMessage("www.nsec3.ingotronic.ch./MX"));
assertFalse("AD flag must not be set", response.getHeader().getFlag(Flags.AD));
assertEquals(Rcode.SERVFAIL, response.getRcode());
assertTrue(getReason(response).startsWith("failed.nodata"));
}
@Test
@AlwaysOffline
public void testNodataApexNsec3Abused() throws IOException {
// get NSEC3 hashed whose name is sub.nsec3.ingotronic.ch. from the nsec3.ingotronic.ch.
// then return NODATA for the following query, "proofed" by the NSEC3 from the parent
Message response = resolver.send(createMessage("sub.nsec3.ingotronic.ch./A"));
assertFalse("AD flag must not be set", response.getHeader().getFlag(Flags.AD));
assertEquals(Rcode.SERVFAIL, response.getRcode());
assertTrue(getReason(response).startsWith("failed.nodata"));
}
@Test
@AlwaysOffline
public void testNodataApexNsec3ProofInsecureDelegation() throws IOException {
// get NSEC3 hashed whose name is sub.nsec3.ingotronic.ch. from the nsec3.ingotronic.ch. zone
// then return NODATA for the following query, "proofed" by the NSEC3 from the parent
// which has the DS flag removed, effectively making the reply insecure
Message response = resolver.send(createMessage("sub.nsec3.ingotronic.ch./A"));
assertFalse("AD flag must not be set", response.getHeader().getFlag(Flags.AD));
assertEquals(Rcode.NOERROR, response.getRcode());
assertNull(getReason(response));
}
@Test
@AlwaysOffline
public void testNodataApexNsec3WithSOAValid() throws IOException {
// get NSEC3 hashed whose name is sub.nsec3.ingotronic.ch. from the nsec3.ingotronic.ch.
// then return NODATA for the following query, "proofed" by the NSEC3 from the parent
Message response = resolver.send(createMessage("sub.nsec3.ingotronic.ch./A"));
assertTrue("AD flag must be set", response.getHeader().getFlag(Flags.AD));
assertEquals(Rcode.NOERROR, response.getRcode());
assertNull(getReason(response));
}
@Test
@AlwaysOffline
public void testNodataApexNsec3AbusedForNoDS() throws IOException {
// get NSEC3 hashed whose name is sub.nsec3.ingotronic.ch. from the sub.nsec3.ingotronic.ch.
// then return NODATA for the following query, "proofed" by the NSEC3 from the child
Message response = resolver.send(createMessage("sub.nsec3.ingotronic.ch./DS"));
assertFalse("AD flag must not be set", response.getHeader().getFlag(Flags.AD));
assertEquals(Rcode.SERVFAIL, response.getRcode());
assertTrue(getReason(response).startsWith("failed.nodata"));
}
@Test
@AlwaysOffline
public void testNoDSProofCanExistForRoot() throws IOException {
// ./DS can exist
resolver.getTrustAnchors().clear();
resolver.getTrustAnchors().store(new SRRset(new RRset(toRecord(". 300 IN DS 16758 7 1 EC88DF5E2902FD4AB9E9C246BEEA9B822BD7BCF7"))));
Message response = resolver.send(createMessage("./DS"));
assertTrue("AD flag must be set", response.getHeader().getFlag(Flags.AD));
assertEquals(Rcode.NOERROR, response.getRcode());
assertNull(getReason(response));
}
@Test
@AlwaysOffline
public void testNodataNsec3ForDSMustNotHaveSOA() throws IOException {
// bogus./DS cannot coexist with bogus./SOA
resolver.getTrustAnchors().clear();
resolver.getTrustAnchors().store(new SRRset(new RRset(toRecord("bogus. 300 IN DS 16758 7 1 A5D56841416AB42DC39629E42D12C98B0E94232A"))));
Message response = resolver.send(createMessage("bogus./DS"));
assertTrue("AD flag must be set", response.getHeader().getFlag(Flags.AD));
assertEquals(Rcode.NOERROR, response.getRcode());
assertNull(getReason(response));
}
@Test
@AlwaysOffline
public void testNsec3ClosestEncloserIsInsecureDelegation() throws IOException {
Message response = resolver.send(createMessage("a.unsigned.nsec3.ingotronic.ch./A"));
assertFalse("AD flag must not be set", response.getHeader().getFlag(Flags.AD));
assertEquals(Rcode.NOERROR, response.getRcode());
assertNull(getReason(response));
}
@Test
@AlwaysOffline
public void testNsec3ClosestEncloserIsInsecureDelegationDS() throws IOException {
//rfc5155#section-7.2.4
//response does not contain next closer NSEC3, thus bogus
Message response = resolver.send(createMessage("a.unsigned.nsec3.ingotronic.ch./DS"));
assertFalse("AD flag must not be set", response.getHeader().getFlag(Flags.AD));
assertEquals(Rcode.SERVFAIL, response.getRcode());
assertTrue(getReason(response).startsWith("failed.nodata"));
}
}
dnssecjava-1.1.3/src/test/java/org/jitsi/dnssec/TestNoData.java 0000664 0000000 0000000 00000003651 13020541473 0024371 0 ustar 00root root 0000000 0000000 /*
* dnssecjava - a DNSSEC validating stub resolver for Java
* Copyright (c) 2013-2015 Ingo Bauersachs
*
* All rights reserved. This program and the accompanying materials
* are made available under the terms of the Eclipse Public License v1.0
* which accompanies this distribution, and is available at
* http://www.eclipse.org/legal/epl-v10.html
*/
package org.jitsi.dnssec;
import static org.junit.Assert.assertEquals;
import static org.junit.Assert.assertFalse;
import static org.junit.Assert.assertTrue;
import java.io.IOException;
import org.junit.Test;
import org.xbill.DNS.Flags;
import org.xbill.DNS.Message;
import org.xbill.DNS.Rcode;
public class TestNoData extends TestBase {
@Test
public void testFakedNoDataNsec3WithoutNsecs() throws IOException {
Message m = resolver.send(createMessage("www.nsec3.ingotronic.ch./A"));
Message message = messageFromString(m.toString().replaceAll("www\\.nsec3\\.ingotronic\\.ch\\.\\s+.*", ""));
add("www.nsec3.ingotronic.ch./A", message);
Message response = resolver.send(createMessage("www.nsec3.ingotronic.ch./A"));
assertFalse("AD flag must not be set", response.getHeader().getFlag(Flags.AD));
assertEquals(Rcode.SERVFAIL, response.getRcode());
assertTrue(getReason(response).startsWith("failed.nodata"));
}
@Test
public void testFakedNoDataNsec3WithNsecs() throws IOException {
Message m = resolver.send(createMessage("www.nsec3.ingotronic.ch./MX"));
Message message = messageFromString(m.toString().replaceAll("type = MX", "type = A"));
add("www.nsec3.ingotronic.ch./A", message);
Message response = resolver.send(createMessage("www.nsec3.ingotronic.ch./A"));
assertFalse("AD flag must not be set", response.getHeader().getFlag(Flags.AD));
assertEquals(Rcode.SERVFAIL, response.getRcode());
assertTrue(getReason(response).startsWith("failed.nodata"));
}
}
dnssecjava-1.1.3/src/test/java/org/jitsi/dnssec/TestNonExistence.java 0000664 0000000 0000000 00000017612 13020541473 0025627 0 ustar 00root root 0000000 0000000 /*
* dnssecjava - a DNSSEC validating stub resolver for Java
* Copyright (c) 2013-2015 Ingo Bauersachs
*
* All rights reserved. This program and the accompanying materials
* are made available under the terms of the Eclipse Public License v1.0
* which accompanies this distribution, and is available at
* http://www.eclipse.org/legal/epl-v10.html
*/
package org.jitsi.dnssec;
import static org.junit.Assert.*;
import java.io.IOException;
import org.junit.Test;
import org.xbill.DNS.Flags;
import org.xbill.DNS.Message;
import org.xbill.DNS.Rcode;
import org.xbill.DNS.Section;
public class TestNonExistence extends TestBase {
@Test
public void testNonExistingBelowRoot() throws IOException {
Message response = resolver.send(createMessage("gibtsnicht./A"));
assertTrue("AD flag must be set", response.getHeader().getFlag(Flags.AD));
assertEquals(Rcode.NXDOMAIN, response.getRcode());
assertNull(getReason(response));
}
@Test
public void testSingleLabelABelowSigned() throws IOException {
Message response = resolver.send(createMessage("gibtsnicht.ingotronic.ch./A"));
assertTrue("AD flag must be set", response.getHeader().getFlag(Flags.AD));
assertEquals(Rcode.NXDOMAIN, response.getRcode());
assertNull(getReason(response));
}
@Test
public void testSingleLabelABelowSignedNsec3() throws IOException {
Message response = resolver.send(createMessage("gibtsnicht.nsec3.ingotronic.ch./A"));
assertTrue("AD flag must be set", response.getHeader().getFlag(Flags.AD));
assertEquals(Rcode.NXDOMAIN, response.getRcode());
assertNull(getReason(response));
}
@Test
public void testDoubleLabelABelowSigned() throws IOException {
Message response = resolver.send(createMessage("gibtsnicht.gibtsnicht.ingotronic.ch./A"));
assertTrue("AD flag must be set", response.getHeader().getFlag(Flags.AD));
assertEquals(Rcode.NXDOMAIN, response.getRcode());
assertNull(getReason(response));
}
@Test
public void testDoubleLabelABelowSignedNsec3() throws IOException {
Message response = resolver.send(createMessage("gibtsnicht.gibtsnicht.nsec3.ingotronic.ch./A"));
assertTrue("AD flag must be set", response.getHeader().getFlag(Flags.AD));
assertEquals(Rcode.NXDOMAIN, response.getRcode());
assertNull(getReason(response));
}
@Test
public void testDoubleLabelABelowSignedNsec3MissingNsec3() throws IOException {
Message m = resolver.send(createMessage("gibtsnicht.gibtsnicht.nsec3.ingotronic.ch./A"));
Message message = messageFromString(m.toString().replaceAll("L40.+nsec3\\.ingotronic\\.ch\\.\\s+300.*", ""));
add("gibtsnicht.gibtsnicht.nsec3.ingotronic.ch./A", message);
Message response = resolver.send(createMessage("gibtsnicht.gibtsnicht.nsec3.ingotronic.ch./A"));
assertFalse("AD flag must not be set", response.getHeader().getFlag(Flags.AD));
assertEquals(Rcode.SERVFAIL, response.getRcode());
assertEquals("failed.nxdomain.nsec3_bogus", getReason(response));
}
@Test
public void testDoubleLabelABelowSignedBeforeZoneNsec3() throws IOException {
// the query name here must hash to a name BEFORE the first existing
// NSEC3 owner name
Message response = resolver.send(createMessage("alias.1gibtsnicht.nsec3.ingotronic.ch./A"));
assertTrue("AD flag must be set", response.getHeader().getFlag(Flags.AD));
assertEquals(Rcode.NXDOMAIN, response.getRcode());
assertNull(getReason(response));
}
@Test
public void testSingleLabelMXBelowSignedForExistingA() throws IOException {
Message response = resolver.send(createMessage("www.ingotronic.ch./MX"));
assertTrue("AD flag must be set", response.getHeader().getFlag(Flags.AD));
assertEquals(0, response.getSectionRRsets(Section.ANSWER).length);
assertEquals(Rcode.NOERROR, response.getRcode());
assertNull(getReason(response));
}
@Test
public void testSingleLabelMXBelowSignedForExistingANsec3() throws IOException {
Message response = resolver.send(createMessage("www.nsec3.ingotronic.ch./MX"));
assertTrue("AD flag must be set", response.getHeader().getFlag(Flags.AD));
assertEquals(0, response.getSectionRRsets(Section.ANSWER).length);
assertEquals(Rcode.NOERROR, response.getRcode());
assertNull(getReason(response));
}
@Test
public void testDoubleLabelMXBelowSignedForExistingA() throws IOException {
// a.b.ingotronic.ch./A exists
Message response = resolver.send(createMessage("a.b.ingotronic.ch./MX"));
assertTrue("AD flag must be set", response.getHeader().getFlag(Flags.AD));
assertEquals(0, response.getSectionRRsets(Section.ANSWER).length);
assertEquals(Rcode.NOERROR, response.getRcode());
assertNull(getReason(response));
}
@Test
public void testDoubleLabelMXBelowSignedForExistingANsec3() throws IOException {
// a.b.nsec3.ingotronic.ch./A exists
Message response = resolver.send(createMessage("a.b.nsec3.ingotronic.ch./MX"));
assertTrue("AD flag must be set", response.getHeader().getFlag(Flags.AD));
assertEquals(0, response.getSectionRRsets(Section.ANSWER).length);
assertEquals(Rcode.NOERROR, response.getRcode());
assertNull(getReason(response));
}
@Test
public void testDoubleLabelMXBelowSignedForExistingWildcardA() throws IOException {
// *.d.ingotronic.ch./A exists
Message response = resolver.send(createMessage("b.d.ingotronic.ch./MX"));
assertTrue("AD flag must be set", response.getHeader().getFlag(Flags.AD));
assertEquals(0, response.getSectionRRsets(Section.ANSWER).length);
assertEquals(Rcode.NOERROR, response.getRcode());
assertNull(getReason(response));
}
@Test
public void testDoubleLabelMXBelowSignedForExistingWildcardANsec3() throws IOException {
// *.d.nsec3.ingotronic.ch./A exists
Message response = resolver.send(createMessage("b.d.nsec3.ingotronic.ch./MX"));
assertTrue("AD flag must be set", response.getHeader().getFlag(Flags.AD));
assertEquals(0, response.getSectionRRsets(Section.ANSWER).length);
assertEquals(Rcode.NOERROR, response.getRcode());
assertNull(getReason(response));
}
@Test
public void testNxDomainWithInvalidNsecSignature() throws IOException {
Message m = resolver.send(createMessage("x.ingotronic.ch./A"));
Message message = messageFromString(m.toString().replaceAll("(.*\\sRRSIG\\sNSEC\\s(\\d+\\s+){6}.*\\.)(.*)", "$1 YXNkZg=="));
add("x.ingotronic.ch./A", message);
Message response = resolver.send(createMessage("x.ingotronic.ch./A"));
assertFalse("AD flag must not be set", response.getHeader().getFlag(Flags.AD));
assertEquals(Rcode.SERVFAIL, response.getRcode());
assertTrue(getReason(response).startsWith("failed.nxdomain.authority"));
}
@Test
public void testNoDataWithInvalidNsecSignature() throws IOException {
Message m = resolver.send(createMessage("www.ingotronic.ch./MX"));
Message message = messageFromString(m.toString().replaceAll("(.*\\sRRSIG\\sNSEC\\s(\\d+\\s+){6}.*\\.)(.*)", "$1 YXNkZg=="));
add("www.ingotronic.ch./MX", message);
Message response = resolver.send(createMessage("www.ingotronic.ch./MX"));
assertFalse("AD flag must not be set", response.getHeader().getFlag(Flags.AD));
assertEquals(Rcode.SERVFAIL, response.getRcode());
assertTrue(getReason(response).startsWith("failed.authority.nodata"));
}
@Test
public void testNoDataOnENT() throws IOException {
Message response = resolver.send(createMessage("b.ingotronic.ch./A"));
assertTrue("AD flag must be set", response.getHeader().getFlag(Flags.AD));
assertEquals(Rcode.NOERROR, response.getRcode());
}
}
dnssecjava-1.1.3/src/test/java/org/jitsi/dnssec/TestNormallyUnreachableCode.java 0000664 0000000 0000000 00000005055 13020541473 0027745 0 ustar 00root root 0000000 0000000 /*
* dnssecjava - a DNSSEC validating stub resolver for Java
* Copyright (c) 2013-2015 Ingo Bauersachs
*
* All rights reserved. This program and the accompanying materials
* are made available under the terms of the Eclipse Public License v1.0
* which accompanies this distribution, and is available at
* http://www.eclipse.org/legal/epl-v10.html
*/
package org.jitsi.dnssec;
import static org.junit.Assert.*;
import java.net.InetAddress;
import java.net.UnknownHostException;
import org.jitsi.dnssec.validator.DnsSecVerifier;
import org.jitsi.dnssec.validator.ResponseClassification;
import org.junit.Before;
import org.junit.Test;
import org.xbill.DNS.ARecord;
import org.xbill.DNS.DClass;
import org.xbill.DNS.Message;
import org.xbill.DNS.Name;
import org.xbill.DNS.OPTRecord;
import org.xbill.DNS.RRset;
import org.xbill.DNS.Record;
import org.xbill.DNS.Section;
import org.xbill.DNS.Type;
/**
* These test run checks that are unable to occur during actual validations.
*
* @author Ingo Bauersachs
*/
public class TestNormallyUnreachableCode {
private InetAddress localhost;
@Before
public void setUp() throws UnknownHostException {
localhost = InetAddress.getByAddress(new byte[] { 127, 0, 0, 1 });
}
@Test
public void testVerifyWithoutSignaturesIsBogus() {
DnsSecVerifier verifier = new DnsSecVerifier();
ARecord record = new ARecord(Name.root, DClass.IN, 120, localhost);
RRset set = new RRset(record);
RRset keys = new RRset();
SecurityStatus result = verifier.verify(set, keys);
assertEquals(SecurityStatus.BOGUS, result);
}
@Test
public void useAllEnumCode() {
SecurityStatus.valueOf(SecurityStatus.values()[0].toString());
ResponseClassification.valueOf(ResponseClassification.values()[0].toString());
}
@Test
public void testSmessageReturnsOptRecordOfOriginal() {
int xrcode = 0xFED;
Message m = Message.newQuery(Record.newRecord(Name.root, Type.NS, DClass.IN));
m.getHeader().setRcode(xrcode & 0xF);
m.addRecord(new OPTRecord(1, xrcode >> 4, 1), Section.ADDITIONAL);
SMessage sm = new SMessage(m);
assertEquals(m.toString(), sm.getMessage().toString());
assertEquals(xrcode, sm.getRcode());
}
@Test
public void testCopyMessageWithoutQuestion() {
Message m = new Message();
m.addRecord(new ARecord(Name.root, DClass.IN, 120, localhost), Section.ANSWER);
SMessage sm = new SMessage(m);
assertEquals(m.toString(), sm.getMessage().toString());
}
}
dnssecjava-1.1.3/src/test/java/org/jitsi/dnssec/TestPartiallyInvalid.java 0000664 0000000 0000000 00000003505 13020541473 0026471 0 ustar 00root root 0000000 0000000 /*
* dnssecjava - a DNSSEC validating stub resolver for Java
* Copyright (c) 2013-2015 Ingo Bauersachs
*
* All rights reserved. This program and the accompanying materials
* are made available under the terms of the Eclipse Public License v1.0
* which accompanies this distribution, and is available at
* http://www.eclipse.org/legal/epl-v10.html
*/
package org.jitsi.dnssec;
import static org.junit.Assert.assertEquals;
import static org.junit.Assert.assertNull;
import static org.junit.Assert.assertTrue;
import java.io.IOException;
import org.junit.Test;
import org.xbill.DNS.Flags;
import org.xbill.DNS.Message;
import org.xbill.DNS.Rcode;
public class TestPartiallyInvalid extends TestBase {
@Test
public void testValidExising() throws IOException {
Message response = resolver.send(createMessage("www.partial.ingotronic.ch./A"));
assertTrue("AD flag must be set", response.getHeader().getFlag(Flags.AD));
assertEquals(Rcode.NOERROR, response.getRcode());
assertEquals(localhost, firstA(response));
assertNull(getReason(response));
}
@Test
public void testValidExisingNoType() throws IOException {
Message response = resolver.send(createMessage("www.partial.ingotronic.ch./MX"));
assertTrue("AD flag must be set", response.getHeader().getFlag(Flags.AD));
assertEquals(Rcode.NOERROR, response.getRcode());
assertTrue(isEmptyAnswer(response));
assertNull(getReason(response));
}
@Test
public void testValidNonExising() throws IOException {
Message response = resolver.send(createMessage("www.gibtsnicht.partial.ingotronic.ch./A"));
assertTrue("AD flag must be set", response.getHeader().getFlag(Flags.AD));
assertEquals(Rcode.NXDOMAIN, response.getRcode());
assertNull(getReason(response));
}
}
dnssecjava-1.1.3/src/test/java/org/jitsi/dnssec/TestPositive.java 0000664 0000000 0000000 00000005641 13020541473 0025026 0 ustar 00root root 0000000 0000000 /*
* dnssecjava - a DNSSEC validating stub resolver for Java
* Copyright (c) 2013-2015 Ingo Bauersachs
*
* All rights reserved. This program and the accompanying materials
* are made available under the terms of the Eclipse Public License v1.0
* which accompanies this distribution, and is available at
* http://www.eclipse.org/legal/epl-v10.html
*/
package org.jitsi.dnssec;
import static org.junit.Assert.assertEquals;
import static org.junit.Assert.assertFalse;
import static org.junit.Assert.assertNull;
import static org.junit.Assert.assertTrue;
import java.io.IOException;
import org.junit.Test;
import org.xbill.DNS.Flags;
import org.xbill.DNS.Message;
import org.xbill.DNS.Rcode;
import org.xbill.DNS.Record;
import org.xbill.DNS.Section;
public class TestPositive extends TestBase {
@Test
public void testValidExising() throws IOException {
Message response = resolver.send(createMessage("www.ingotronic.ch./A"));
assertTrue("AD flag must be set", response.getHeader().getFlag(Flags.AD));
assertEquals(Rcode.NOERROR, response.getRcode());
assertEquals(localhost, firstA(response));
assertNull(getReason(response));
}
@Test
public void testValidNonExising() throws IOException {
Message response = resolver.send(createMessage("ingotronic.ch./ANY"));
assertTrue("AD flag must be set", response.getHeader().getFlag(Flags.AD));
assertEquals(Rcode.NOERROR, response.getRcode());
assertNull(getReason(response));
}
@Test
public void testValidAnswerToDifferentQueryTypeIsBogus() throws IOException {
Message m = resolver.send(createMessage("www.ingotronic.ch./A"));
Message message = createMessage("www.ingotronic.ch./MX");
for (int i = 1; i < Section.ADDITIONAL; i++) {
for (Record r: m.getSectionArray(i)) {
message.addRecord(r, i);
}
}
add("www.ingotronic.ch./A", message);
Message response = resolver.send(createMessage("www.ingotronic.ch./A"));
assertFalse("AD flag must not be set", response.getHeader().getFlag(Flags.AD));
assertEquals(Rcode.SERVFAIL, response.getRcode());
assertEquals("validate.response.unknown:UNKNOWN", getReason(response));
}
@Test
public void testCDonQueryDoesntDoAnything() throws IOException {
Message m = resolver.send(createMessage("www.ingotronic.ch./A"));
Message message = messageFromString(m.toString().replaceAll("(.*\\sRRSIG\\s+A\\s(\\d+\\s+){6}.*\\.)(.*)", "$1 YXNkZg=="));
add("www.ingotronic.ch./A", message);
Message query = createMessage("www.ingotronic.ch./A");
query.getHeader().setFlag(Flags.CD);
Message response = resolver.send(query);
assertFalse("AD flag must not be set", response.getHeader().getFlag(Flags.AD));
assertEquals(Rcode.NOERROR, response.getRcode());
assertNull(getReason(response));
}
}
dnssecjava-1.1.3/src/test/java/org/jitsi/dnssec/TestPriming.java 0000664 0000000 0000000 00000023426 13020541473 0024632 0 ustar 00root root 0000000 0000000 /*
* dnssecjava - a DNSSEC validating stub resolver for Java
* Copyright (c) 2013-2015 Ingo Bauersachs
*
* All rights reserved. This program and the accompanying materials
* are made available under the terms of the Eclipse Public License v1.0
* which accompanies this distribution, and is available at
* http://www.eclipse.org/legal/epl-v10.html
*/
package org.jitsi.dnssec;
import static org.junit.Assert.assertEquals;
import static org.junit.Assert.assertFalse;
import static org.mockito.Matchers.any;
import static org.mockito.Matchers.anyInt;
import static org.powermock.api.mockito.PowerMockito.doReturn;
import static org.powermock.api.mockito.PowerMockito.spy;
import static org.powermock.api.mockito.PowerMockito.when;
import static org.powermock.api.mockito.PowerMockito.whenNew;
import java.io.IOException;
import org.junit.Test;
import org.junit.runner.RunWith;
import org.powermock.core.classloader.annotations.PrepareForTest;
import org.powermock.modules.junit4.PowerMockRunner;
import org.powermock.reflect.Whitebox;
import org.xbill.DNS.DClass;
import org.xbill.DNS.DNSKEYRecord;
import org.xbill.DNS.DNSSEC;
import org.xbill.DNS.DNSSEC.DNSSECException;
import org.xbill.DNS.Flags;
import org.xbill.DNS.Message;
import org.xbill.DNS.Name;
import org.xbill.DNS.RRset;
import org.xbill.DNS.Rcode;
import org.xbill.DNS.Record;
import org.xbill.DNS.Section;
import org.xbill.DNS.Type;
@RunWith(PowerMockRunner.class)
@PrepareForTest(DNSKEYRecord.class)
public class TestPriming extends TestBase {
@Test
public void testDnskeyPrimeResponseWithEmptyAnswerIsBad() throws IOException {
Message message = new Message();
message.addRecord(Record.newRecord(Name.root, Type.DNSKEY, DClass.IN), Section.QUESTION);
add("./DNSKEY", message);
Message response = resolver.send(createMessage("www.ingotronic.ch./A"));
assertFalse("AD flag must not be set", response.getHeader().getFlag(Flags.AD));
assertEquals(Rcode.SERVFAIL, response.getRcode());
assertEquals("validate.bogus.badkey:.:dnskey.no_rrset:.", getReason(response));
}
@Test
public void testRootDnskeyPrimeResponseWithNxDomainIsBad() throws IOException {
Message message = new Message();
message.addRecord(Record.newRecord(Name.root, Type.DNSKEY, DClass.IN), Section.QUESTION);
message.getHeader().setRcode(Rcode.NXDOMAIN);
add("./DNSKEY", message);
Message response = resolver.send(createMessage("www.ingotronic.ch./A"));
assertFalse("AD flag must not be set", response.getHeader().getFlag(Flags.AD));
assertEquals(Rcode.SERVFAIL, response.getRcode());
assertEquals("validate.bogus.badkey:.:dnskey.no_rrset:.", getReason(response));
}
@Test
public void testDnskeyPrimeResponseWithInvalidSignatureIsBad() throws IOException, NumberFormatException, DNSSECException {
Message m = resolver.send(createMessage("./DNSKEY"));
Message message = messageFromString(m.toString().replaceAll("(.*\\sRRSIG\\sDNSKEY\\s(\\d+\\s+){6}.*\\.)(.*)", "$1 YXNkZg=="));
add("./DNSKEY", message);
Message response = resolver.send(createMessage("www.ingotronic.ch./A"));
assertFalse("AD flag must not be set", response.getHeader().getFlag(Flags.AD));
assertEquals(Rcode.SERVFAIL, response.getRcode());
assertEquals("validate.bogus.badkey:.:dnskey.no_ds_match", getReason(response));
}
@Test
@PrepareMocks("prepareTestDnskeyPrimeResponseWithMismatchedFootprintIsBad")
public void testDnskeyPrimeResponseWithMismatchedFootprintIsBad() throws Exception {
Message response = resolver.send(createMessage("www.ingotronic.ch./A"));
assertFalse("AD flag must not be set", response.getHeader().getFlag(Flags.AD));
assertEquals(Rcode.SERVFAIL, response.getRcode());
assertEquals("validate.bogus.badkey:.:dnskey.no_ds_match", getReason(response));
}
public void prepareTestDnskeyPrimeResponseWithMismatchedFootprintIsBad() throws Exception {
DNSKEYRecord emptyDnskeyRecord = spy(Whitebox.invokeConstructor(DNSKEYRecord.class));
when(emptyDnskeyRecord.getFootprint()).thenReturn(-1);
whenNew(DNSKEYRecord.class).withNoArguments().thenReturn(emptyDnskeyRecord);
}
@Test
@PrepareMocks("prepareTestDnskeyPrimeResponseWithMismatchedAlgorithmIsBad")
public void testDnskeyPrimeResponseWithMismatchedAlgorithmIsBad() throws IOException, NumberFormatException, DNSSECException {
Message response = resolver.send(createMessage("www.ingotronic.ch./A"));
assertFalse("AD flag must not be set", response.getHeader().getFlag(Flags.AD));
assertEquals(Rcode.SERVFAIL, response.getRcode());
assertEquals("validate.bogus.badkey:.:dnskey.no_ds_match", getReason(response));
}
public void prepareTestDnskeyPrimeResponseWithMismatchedAlgorithmIsBad() throws Exception {
DNSKEYRecord emptyDnskeyRecord = spy(Whitebox.invokeConstructor(DNSKEYRecord.class));
when(emptyDnskeyRecord.getAlgorithm()).thenReturn(-1);
whenNew(DNSKEYRecord.class).withNoArguments().thenReturn(emptyDnskeyRecord);
}
@Test
public void testDnskeyPrimeResponseWithWeirdHashIsBad() throws Exception {
spy(DNSSEC.class);
doReturn(new byte[]{1, 2, 3}).when(DNSSEC.class, "generateDSDigest", any(DNSKEYRecord.class), anyInt());
Message response = resolver.send(createMessage("www.ingotronic.ch./A"));
assertFalse("AD flag must not be set", response.getHeader().getFlag(Flags.AD));
assertEquals(Rcode.SERVFAIL, response.getRcode());
assertEquals("validate.bogus.badkey:.:dnskey.no_ds_match", getReason(response));
}
@Test
public void testDsPrimeResponseWithEmptyAnswerIsBad() throws IOException {
Message message = new Message();
message.addRecord(Record.newRecord(Name.fromString("ch."), Type.DS, DClass.IN), Section.QUESTION);
add("ch./DS", message);
Message response = resolver.send(createMessage("www.ingotronic.ch./A"));
assertFalse("AD flag must not be set", response.getHeader().getFlag(Flags.AD));
assertEquals(Rcode.SERVFAIL, response.getRcode());
assertEquals("validate.bogus.badkey:ch.:failed.ds.nonsec:ch.", getReason(response));
}
@Test
public void testDsPrimeResponseWithNxDomainForTld() throws IOException {
Message message = new Message();
message.addRecord(Record.newRecord(Name.fromString("ch."), Type.DS, DClass.IN), Section.QUESTION);
message.getHeader().setRcode(Rcode.NXDOMAIN);
add("ch./DS", message);
Message response = resolver.send(createMessage("www.ingotronic.ch./A"));
assertFalse("AD flag must not be set", response.getHeader().getFlag(Flags.AD));
assertEquals(Rcode.SERVFAIL, response.getRcode());
assertEquals("validate.bogus.badkey:ch.:failed.ds.nonsec:ch.", getReason(response));
}
@Test
public void testDsNoDataWhenNsecIsFromChildApex() throws IOException {
Message nsec = resolver.send(createMessage("1.sub.ingotronic.ch./NSEC"));
Record delegationNsec = null;
Record delegationNsecSig = null;
for (RRset set : nsec.getSectionRRsets(Section.AUTHORITY)) {
if (set.getName().toString().startsWith("sub.ingotronic.ch") && set.getType() == Type.NSEC) {
delegationNsec = set.first();
delegationNsecSig = (Record)set.sigs().next();
break;
}
}
Message m = createMessage("sub.ingotronic.ch./DS");
m.getHeader().setRcode(Rcode.NOERROR);
m.addRecord(delegationNsec, Section.AUTHORITY);
m.addRecord(delegationNsecSig, Section.AUTHORITY);
add("sub.ingotronic.ch./DS", m);
Message response = resolver.send(createMessage("sub.ingotronic.ch./A"));
assertFalse("AD flag must not be set", response.getHeader().getFlag(Flags.AD));
assertEquals(Rcode.SERVFAIL, response.getRcode());
assertEquals("validate.bogus.badkey:sub.ingotronic.ch.:failed.ds.nsec", getReason(response));
}
@Test
public void testDsNoDataWhenNsecOnEntIsBad() throws IOException {
Message m = resolver.send(createMessage("e.ingotronic.ch./DS"));
Message message = messageFromString(m.toString().replaceAll("(.*\\sRRSIG\\sNSEC\\s(\\d+\\s+){6}.*\\.)(.*)", "$1 YXNkZg=="));
add("e.ingotronic.ch./DS", message);
Message response = resolver.send(createMessage("a.e.ingotronic.ch./A"));
assertFalse("AD flag must not be set", response.getHeader().getFlag(Flags.AD));
assertEquals(Rcode.SERVFAIL, response.getRcode());
assertEquals("validate.bogus:failed.ds.nsec.ent", getReason(response));
}
@Test
public void testDsNoDataWhenOnInsecureDelegationWithWrongNsec() throws IOException {
Message nsec = resolver.send(createMessage("alias.ingotronic.ch./NSEC"));
Record delegationNsec = null;
Record delegationNsecSig = null;
for (RRset set : nsec.getSectionRRsets(Section.ANSWER)) {
if (set.getName().toString().startsWith("alias.ingotronic.ch") && set.getType() == Type.NSEC) {
delegationNsec = set.first();
delegationNsecSig = (Record)set.sigs().next();
break;
}
}
Message m = createMessage("unsigned.ingotronic.ch./DS");
m.getHeader().setRcode(Rcode.NOERROR);
m.addRecord(delegationNsec, Section.AUTHORITY);
m.addRecord(delegationNsecSig, Section.AUTHORITY);
add("unsigned.ingotronic.ch./DS", m);
Message response = resolver.send(createMessage("www.unsigned.ingotronic.ch./A"));
assertFalse("AD flag must not be set", response.getHeader().getFlag(Flags.AD));
assertEquals(Rcode.SERVFAIL, response.getRcode());
assertEquals("validate.bogus:failed.ds.unknown", getReason(response));
}
}
dnssecjava-1.1.3/src/test/java/org/jitsi/dnssec/TestRRsig.java 0000664 0000000 0000000 00000003222 13020541473 0024243 0 ustar 00root root 0000000 0000000 /*
* dnssecjava - a DNSSEC validating stub resolver for Java
* Copyright (c) 2013-2015 Ingo Bauersachs
*
* All rights reserved. This program and the accompanying materials
* are made available under the terms of the Eclipse Public License v1.0
* which accompanies this distribution, and is available at
* http://www.eclipse.org/legal/epl-v10.html
*/
package org.jitsi.dnssec;
import static org.junit.Assert.assertEquals;
import static org.junit.Assert.assertFalse;
import java.io.IOException;
import org.junit.Test;
import org.xbill.DNS.Flags;
import org.xbill.DNS.Message;
import org.xbill.DNS.Rcode;
public class TestRRsig extends TestBase {
@Test
public void testRRsigNodata() throws IOException {
Message message = createMessage("www.ingotronic.ch./RRSIG");
add("www.ingotronic.ch./RRSIG", message);
Message response = resolver.send(createMessage("www.ingotronic.ch./RRSIG"));
assertFalse("AD flag must not be set", response.getHeader().getFlag(Flags.AD));
assertEquals(Rcode.SERVFAIL, response.getRcode());
assertEquals("failed.nodata", getReason(response));
}
@Test
public void testRRsigServfail() throws IOException {
Message message = createMessage("www.ingotronic.ch./RRSIG");
message.getHeader().setRcode(Rcode.SERVFAIL);
add("www.ingotronic.ch./RRSIG", message);
Message response = resolver.send(createMessage("www.ingotronic.ch./RRSIG"));
assertFalse("AD flag must not be set", response.getHeader().getFlag(Flags.AD));
assertEquals(Rcode.SERVFAIL, response.getRcode());
assertEquals("failed.nodata", getReason(response));
}
}
dnssecjava-1.1.3/src/test/java/org/jitsi/dnssec/TestSMessage.java 0000664 0000000 0000000 00000012212 13020541473 0024723 0 ustar 00root root 0000000 0000000 /*
* dnssecjava - a DNSSEC validating stub resolver for Java
* Copyright (c) 2013-2015 Ingo Bauersachs
*
* All rights reserved. This program and the accompanying materials
* are made available under the terms of the Eclipse Public License v1.0
* which accompanies this distribution, and is available at
* http://www.eclipse.org/legal/epl-v10.html
*/
package org.jitsi.dnssec;
import static org.junit.Assert.*;
import java.net.InetAddress;
import java.net.UnknownHostException;
import java.util.List;
import org.jitsi.dnssec.SMessage;
import org.jitsi.dnssec.SRRset;
import org.junit.Test;
import org.xbill.DNS.AAAARecord;
import org.xbill.DNS.ARecord;
import org.xbill.DNS.DClass;
import org.xbill.DNS.Message;
import org.xbill.DNS.Name;
import org.xbill.DNS.Record;
import org.xbill.DNS.Section;
import org.xbill.DNS.TextParseException;
import org.xbill.DNS.Type;
public class TestSMessage {
@Test(expected = IllegalArgumentException.class)
public void testGetUndefinedSectionBelow() {
SMessage m = new SMessage(0, null);
m.getSectionRRsets(-1);
}
@Test(expected = IllegalArgumentException.class)
public void testGetUndefinedSectionAtLowerBorder() {
SMessage m = new SMessage(0, null);
m.getSectionRRsets(0);
}
@Test(expected = IllegalArgumentException.class)
public void testGetUndefinedSectionAtUpperBorder() {
SMessage m = new SMessage(0, null);
m.getSectionRRsets(4);
}
@Test(expected = IllegalArgumentException.class)
public void testGetUndefinedSectionAbove() {
SMessage m = new SMessage(0, null);
m.getSectionRRsets(100);
}
@Test()
public void testGetEmptySection() {
SMessage m = new SMessage(0, null);
List sets = m.getSectionRRsets(Section.ANSWER);
assertEquals(0, sets.size());
}
@Test()
public void testGetEmptySectionByType() {
SMessage m = new SMessage(0, null);
SRRset[] sets = m.getSectionRRsets(Section.ANSWER, Type.A);
assertEquals(0, sets.length);
}
@Test()
public void testGetSectionByType() throws UnknownHostException {
Message m = new Message();
Record r1 = new ARecord(Name.root, DClass.IN, 0, InetAddress.getByAddress(new byte[]{0,0,0,0}));
m.addRecord(r1, Section.ANSWER);
Record r2 = new AAAARecord(Name.root, DClass.IN, 0, InetAddress.getByAddress(new byte[]{0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,1}));
m.addRecord(r2, Section.ANSWER);
SMessage sm = new SMessage(m);
SRRset[] result = sm.getSectionRRsets(Section.ANSWER, Type.A);
assertEquals(1, result.length);
assertEquals(Type.A, result[0].getType());
}
@Test()
public void testRecordCountForQuestionIsOne() {
SMessage m = new SMessage(0, null);
int count = m.getCount(Section.QUESTION);
assertEquals(1, count);
}
@Test()
public void testRecordCountForEmptySectionIsZero() {
SMessage m = new SMessage(0, null);
int count = m.getCount(Section.ADDITIONAL);
assertEquals(0, count);
}
@Test()
public void testRecordCountForIsValid() throws UnknownHostException {
Message m = new Message();
m.addRecord(new ARecord(Name.root, DClass.IN, 0, InetAddress.getByAddress(new byte[]{0,0,0,0})), Section.ANSWER);
SMessage sm = new SMessage(m);
int count = sm.getCount(Section.ANSWER);
assertEquals(1, count);
}
@Test()
public void testAnswerSectionSearchFound() throws UnknownHostException {
Message m = new Message();
Record r = new ARecord(Name.root, DClass.IN, 0, InetAddress.getByAddress(new byte[]{0,0,0,0}));
m.addRecord(r, Section.ANSWER);
SMessage sm = new SMessage(m);
SRRset result = sm.findAnswerRRset(Name.root, Type.A, DClass.IN);
assertEquals(r, result.first());
}
@Test()
public void testAnswerSectionSearchNotFoundDifferentClass() throws UnknownHostException {
Message m = new Message();
Record r = new ARecord(Name.root, DClass.IN, 0, InetAddress.getByAddress(new byte[]{0,0,0,0}));
m.addRecord(r, Section.ANSWER);
SMessage sm = new SMessage(m);
SRRset result = sm.findAnswerRRset(Name.root, Type.A, DClass.CH);
assertNull(result);
}
@Test()
public void testAnswerSectionSearchNotFoundDifferentType() throws UnknownHostException {
Message m = new Message();
Record r = new ARecord(Name.root, DClass.IN, 0, InetAddress.getByAddress(new byte[]{0,0,0,0}));
m.addRecord(r, Section.ANSWER);
SMessage sm = new SMessage(m);
SRRset result = sm.findAnswerRRset(Name.root, Type.MX, DClass.IN);
assertNull(result);
}
@Test()
public void testAnswerSectionSearchNotFoundDifferentName() throws UnknownHostException, TextParseException {
Message m = new Message();
Record r = new ARecord(Name.fromString("asdf."), DClass.IN, 0, InetAddress.getByAddress(new byte[]{0,0,0,0}));
m.addRecord(r, Section.ANSWER);
SMessage sm = new SMessage(m);
SRRset result = sm.findAnswerRRset(Name.root, Type.MX, DClass.IN);
assertNull(result);
}
}
dnssecjava-1.1.3/src/test/java/org/jitsi/dnssec/TestTrustAnchorLoading.java 0000664 0000000 0000000 00000013727 13020541473 0027002 0 ustar 00root root 0000000 0000000 /*
* dnssecjava - a DNSSEC validating stub resolver for Java
* Copyright (c) 2013-2015 Ingo Bauersachs
*
* All rights reserved. This program and the accompanying materials
* are made available under the terms of the Eclipse Public License v1.0
* which accompanies this distribution, and is available at
* http://www.eclipse.org/legal/epl-v10.html
*/
package org.jitsi.dnssec;
import static org.junit.Assert.assertEquals;
import static org.junit.Assert.assertFalse;
import static org.junit.Assert.assertNotNull;
import static org.junit.Assert.assertNull;
import static org.junit.Assert.assertTrue;
import java.io.ByteArrayInputStream;
import java.io.ByteArrayOutputStream;
import java.io.IOException;
import java.io.OutputStreamWriter;
import java.util.Iterator;
import java.util.Properties;
import org.junit.Test;
import org.xbill.DNS.DClass;
import org.xbill.DNS.DNSKEYRecord;
import org.xbill.DNS.Flags;
import org.xbill.DNS.Message;
import org.xbill.DNS.Name;
import org.xbill.DNS.RRset;
import org.xbill.DNS.Rcode;
import org.xbill.DNS.Section;
import org.xbill.DNS.Type;
public class TestTrustAnchorLoading extends TestBase {
@Test
public void testLoadRootTrustAnchors() throws IOException {
assertNotNull(resolver.getTrustAnchors().find(Name.root, DClass.IN));
assertNull(resolver.getTrustAnchors().find(Name.root, DClass.CH));
}
@Test
public void testLoadRootTrustAnchorsFromFile() throws IOException {
resolver.getTrustAnchors().clear();
Properties config = new Properties();
config.put("org.jitsi.dnssec.trust_anchor_file", "./src/test/resources/trust_anchors");
resolver.init(config);
assertNotNull(resolver.getTrustAnchors().find(Name.root, DClass.IN));
}
@Test
public void testInitializingWithEmptyConfigDoesNotFail() throws IOException {
resolver.getTrustAnchors().clear();
Properties config = new Properties();
resolver.init(config);
assertNull(resolver.getTrustAnchors().find(Name.root, DClass.IN));
}
@Test(expected = IOException.class)
public void testInitializingWithNonExistingFileThrows() throws IOException {
resolver.getTrustAnchors().clear();
Properties config = new Properties();
config.put("org.jitsi.dnssec.trust_anchor_file", "xyz");
resolver.init(config);
}
@Test
public void testLoadRootTrustAnchorWithDNSKEY() throws IOException {
Message keys = resolver.send(createMessage("./DNSKEY"));
ByteArrayOutputStream bos = new ByteArrayOutputStream();
OutputStreamWriter osw = new OutputStreamWriter(bos);
for (RRset set : keys.getSectionRRsets(Section.ANSWER)) {
if (set.getType() == Type.DNSKEY) {
@SuppressWarnings("unchecked")
Iterator it = set.rrs();
while (it.hasNext()) {
DNSKEYRecord r = it.next();
osw.write(r.toString());
osw.write('\n');
}
}
}
osw.close();
resolver.getTrustAnchors().clear();
resolver.loadTrustAnchors(new ByteArrayInputStream(bos.toByteArray()));
assertNotNull(resolver.getTrustAnchors().find(Name.root, DClass.IN));
Message response = resolver.send(createMessage("www.ingotronic.ch./A"));
assertTrue("AD flag must be set", response.getHeader().getFlag(Flags.AD));
assertEquals(Rcode.NOERROR, response.getRcode());
assertNull(getReason(response));
}
@Test
public void testLoadRootTrustAnchorWithInvalidDNSKEY() throws IOException {
resolver.getTrustAnchors().clear();
resolver.loadTrustAnchors(getClass().getResourceAsStream("/trust_anchors_dnskey_invalid"));
assertNotNull(resolver.getTrustAnchors().find(Name.root, DClass.IN));
Message response = resolver.send(createMessage("www.ingotronic.ch./A"));
assertFalse("AD flag must not be set", response.getHeader().getFlag(Flags.AD));
assertEquals(Rcode.SERVFAIL, response.getRcode());
assertEquals("validate.bogus.badkey:.:dnskey.no_ds_match", getReason(response));
}
@Test
public void testLoadRootTrustAnchorWithInvalidDS() throws IOException {
resolver.getTrustAnchors().clear();
resolver.loadTrustAnchors(getClass().getResourceAsStream("/trust_anchors_invalid"));
assertNotNull(resolver.getTrustAnchors().find(Name.root, DClass.IN));
Message response = resolver.send(createMessage("www.ingotronic.ch./A"));
assertFalse("AD flag must not be set", response.getHeader().getFlag(Flags.AD));
assertEquals(Rcode.SERVFAIL, response.getRcode());
assertEquals("validate.bogus.badkey:.:dnskey.no_ds_match", getReason(response));
}
@Test
public void testLoadRootTrustAnchorsAlongWithGarbage() throws IOException {
resolver.getTrustAnchors().clear();
resolver.loadTrustAnchors(getClass().getResourceAsStream("/trust_anchors_test"));
assertNotNull(resolver.getTrustAnchors().find(Name.root, DClass.IN));
assertNotNull(resolver.getTrustAnchors().find(Name.root, DClass.CH));
}
@Test
public void testLoadEmptyTrustAnchors() throws IOException {
resolver.getTrustAnchors().clear();
resolver.loadTrustAnchors(getClass().getResourceAsStream("/trust_anchors_empty"));
assertNull(resolver.getTrustAnchors().find(Name.root, DClass.IN));
}
@Test
public void testInsecureWithEmptyTrustAnchor() throws IOException {
resolver.getTrustAnchors().clear();
resolver.loadTrustAnchors(getClass().getResourceAsStream("/trust_anchors_empty"));
assertNull(resolver.getTrustAnchors().find(Name.root, DClass.IN));
Message response = resolver.send(createMessage("www.ingotronic.ch./A"));
assertFalse("AD flag must not be set", response.getHeader().getFlag(Flags.AD));
assertEquals(Rcode.NOERROR, response.getRcode());
assertEquals("validate.insecure", getReason(response));
}
}
dnssecjava-1.1.3/src/test/java/org/jitsi/dnssec/TestTrustAnchorStore.java 0000664 0000000 0000000 00000005152 13020541473 0026512 0 ustar 00root root 0000000 0000000 /*
* dnssecjava - a DNSSEC validating stub resolver for Java
* Copyright (c) 2013-2015 Ingo Bauersachs
*
* All rights reserved. This program and the accompanying materials
* are made available under the terms of the Eclipse Public License v1.0
* which accompanies this distribution, and is available at
* http://www.eclipse.org/legal/epl-v10.html
*/
package org.jitsi.dnssec;
import static org.junit.Assert.*;
import org.jitsi.dnssec.SRRset;
import org.jitsi.dnssec.validator.TrustAnchorStore;
import org.junit.Test;
import org.xbill.DNS.DClass;
import org.xbill.DNS.DNSKEYRecord;
import org.xbill.DNS.DSRecord;
import org.xbill.DNS.Name;
import org.xbill.DNS.RRset;
import org.xbill.DNS.TXTRecord;
import org.xbill.DNS.TextParseException;
public class TestTrustAnchorStore {
@Test
public void testNullKeyWhenNameNotUnderAnchor() throws TextParseException {
TrustAnchorStore tas = new TrustAnchorStore();
SRRset anchor = tas.find(Name.fromString("asdf.bla."), DClass.IN);
assertNull(anchor);
}
@Test
public void testKeyWhenNameUnderAnchorDS() throws TextParseException {
SRRset set = new SRRset(new RRset(new DSRecord(Name.fromString("bla."), DClass.IN, 0, 0, 0, 0, new byte[]{0})));
TrustAnchorStore tas = new TrustAnchorStore();
tas.store(set);
SRRset anchor = tas.find(Name.fromString("asdf.bla."), DClass.IN);
assertEquals(set, anchor);
}
@Test
public void testKeyWhenNameUnderAnchorDNSKEY() throws TextParseException {
SRRset set = new SRRset(new RRset(new DNSKEYRecord(Name.fromString("bla."), DClass.IN, 0, 0, 0, 0, new byte[]{0})));
TrustAnchorStore tas = new TrustAnchorStore();
tas.store(set);
SRRset anchor = tas.find(Name.fromString("asdf.bla."), DClass.IN);
assertEquals(set.getName(), anchor.getName());
}
@Test(expected = IllegalArgumentException.class)
public void testInvalidAnchorRecord() throws TextParseException {
SRRset set = new SRRset(new RRset(new TXTRecord(Name.fromString("bla."), DClass.IN, 0, "root")));
TrustAnchorStore tas = new TrustAnchorStore();
tas.store(set);
}
@Test
public void testClear() throws TextParseException {
SRRset set = new SRRset(new RRset(new DNSKEYRecord(Name.fromString("bla."), DClass.IN, 0, 0, 0, 0, new byte[]{0})));
TrustAnchorStore tas = new TrustAnchorStore();
tas.store(set);
SRRset anchor = tas.find(Name.fromString("asdf.bla."), DClass.IN);
assertNotNull(anchor);
tas.clear();
assertNull(tas.find(Name.fromString("asdf.bla."), DClass.IN));
}
}
dnssecjava-1.1.3/src/test/java/org/jitsi/dnssec/TestUnsigned.java 0000664 0000000 0000000 00000004277 13020541473 0025004 0 ustar 00root root 0000000 0000000 /*
* dnssecjava - a DNSSEC validating stub resolver for Java
* Copyright (c) 2013-2015 Ingo Bauersachs
*
* All rights reserved. This program and the accompanying materials
* are made available under the terms of the Eclipse Public License v1.0
* which accompanies this distribution, and is available at
* http://www.eclipse.org/legal/epl-v10.html
*/
package org.jitsi.dnssec;
import static org.junit.Assert.*;
import java.io.IOException;
import org.junit.Test;
import org.xbill.DNS.Flags;
import org.xbill.DNS.Message;
import org.xbill.DNS.Rcode;
public class TestUnsigned extends TestBase {
@Test
public void testUnsignedBelowSignedZoneBind() throws IOException {
Message response = resolver.send(createMessage("www.unsigned.ingotronic.ch./A"));
assertFalse("AD flag must not be set", response.getHeader().getFlag(Flags.AD));
assertEquals(Rcode.NOERROR, response.getRcode());
assertEquals(localhost, firstA(response));
assertEquals("insecure.ds.nsec", getReason(response));
}
@Test
public void testUnsignedBelowSignedTldNsec3NoOptOut() throws IOException {
Message response = resolver.send(createMessage("20min.ch./A"));
assertFalse("AD flag must not be set", response.getHeader().getFlag(Flags.AD));
assertEquals(Rcode.NOERROR, response.getRcode());
assertEquals("insecure.ds.nsec3", getReason(response));
}
@Test
public void testUnsignedBelowSignedTldNsec3OptOut() throws IOException {
Message response = resolver.send(createMessage("yahoo.com./A"));
assertFalse("AD flag must not be set", response.getHeader().getFlag(Flags.AD));
assertEquals(Rcode.NOERROR, response.getRcode());
assertEquals("insecure.ds.nsec3", getReason(response));
}
@Test
public void testUnsignedBelowUnsignedZone() throws IOException {
Message response = resolver.send(createMessage("www.sub.unsigned.ingotronic.ch./A"));
assertFalse("AD flag must not be set", response.getHeader().getFlag(Flags.AD));
assertEquals(Rcode.NOERROR, response.getRcode());
assertEquals(localhost, firstA(response));
assertEquals("insecure.ds.nsec", getReason(response));
}
}
dnssecjava-1.1.3/src/test/java/org/jitsi/dnssec/TestWildcard.java 0000664 0000000 0000000 00000017056 13020541473 0024760 0 ustar 00root root 0000000 0000000 /*
* dnssecjava - a DNSSEC validating stub resolver for Java
* Copyright (c) 2013-2015 Ingo Bauersachs
*
* All rights reserved. This program and the accompanying materials
* are made available under the terms of the Eclipse Public License v1.0
* which accompanies this distribution, and is available at
* http://www.eclipse.org/legal/epl-v10.html
*/
package org.jitsi.dnssec;
import static org.junit.Assert.*;
import java.io.IOException;
import java.net.InetAddress;
import org.junit.Test;
import org.xbill.DNS.ARecord;
import org.xbill.DNS.DClass;
import org.xbill.DNS.Flags;
import org.xbill.DNS.Message;
import org.xbill.DNS.Name;
import org.xbill.DNS.Rcode;
import org.xbill.DNS.Record;
import org.xbill.DNS.Section;
import org.xbill.DNS.Type;
public class TestWildcard extends TestBase {
@Test
public void testNameNotExpandedFromWildcardWhenNonWildcardExists() throws IOException {
// create a faked response: the original query/response was for
// b.d.ingotronic.ch. and is changed to a.d.ingotronic.ch.
Message m = resolver.send(createMessage("b.d.ingotronic.ch./A"));
add("a.d.ingotronic.ch./A", messageFromString(m.toString().replace("b.d.ingotronic.ch.", "a.d.ingotronic.ch.")));
// a.d.ingotronic.ch./A exists, but the response is faked from *.d.ingotronic.ch. which must be detected by the NSEC proof
Message response = resolver.send(createMessage("a.d.ingotronic.ch./A"));
assertFalse(response.getHeader().getFlag(Flags.AD));
assertEquals(Rcode.SERVFAIL, response.getHeader().getRcode());
assertEquals("failed.positive.wildcard_too_broad", getReason(response));
}
@Test
public void testNameNotExpandedFromWildcardWhenNonWildcardExistsNsec3() throws IOException {
// create a faked response: the original query/response was for
// b.d.nsec3.ingotronic.ch. and is changed to a.d.nsec3.ingotronic.ch.
Message m = resolver.send(createMessage("b.d.nsec3.ingotronic.ch./A"));
add("a.d.nsec3.ingotronic.ch./A", messageFromString(m.toString().replace("b.d.nsec3.ingotronic.ch.", "a.d.nsec3.ingotronic.ch.")));
// a.d.nsec3.ingotronic.ch./A exists, but the response is faked from
// *.d.nsec3.ingotronic.ch. which must be detected by the NSEC proof
Message response = resolver.send(createMessage("a.d.nsec3.ingotronic.ch./A"));
assertFalse(response.getHeader().getFlag(Flags.AD));
assertEquals(Rcode.SERVFAIL, response.getHeader().getRcode());
assertEquals("failed.positive.wildcard_too_broad", getReason(response));
}
@AlwaysOffline
@Test
public void testLabelCountInSignaturesNotAllSame() throws IOException {
Message response = resolver.send(createMessage("b.d.nsec3.ingotronic.ch./A"));
assertFalse(response.getHeader().getFlag(Flags.AD));
assertEquals(Rcode.SERVFAIL, response.getHeader().getRcode());
assertEquals("failed.wildcard.label_count_mismatch:b.d.nsec3.ingotronic.ch.", getReason(response));
}
@Test
public void testSynthesisUsesCorrectWildcard() throws IOException {
Message m = resolver.send(createMessage("a.wc.ingotronic.ch./A"));
Message message = messageFromString(m.toString().replaceAll("a\\.wc\\.ingotronic.ch\\.", "\1.sub.wc.ingotronic.ch."));
add(Name.fromString("\1.sub.wc.ingotronic.ch.").toString() + "/A", message);
Message response = resolver.send(createMessage("\1.sub.wc.ingotronic.ch./A"));
assertFalse("AD flag must not be set", response.getHeader().getFlag(Flags.AD));
assertEquals(Rcode.SERVFAIL, response.getRcode());
assertEquals("failed.positive.wildcard_too_broad", getReason(response));
}
@Test
public void testPositiveWithInvalidNsecSignature() throws IOException {
Message m = resolver.send(createMessage("a.c.ingotronic.ch./A"));
Message message = messageFromString(m.toString().replaceAll("(.*\\sRRSIG\\sNSEC\\s(\\d+\\s+){6}.*\\.)(.*)", "$1 YXNkZg=="));
add("a.c.ingotronic.ch./A", message);
Message response = resolver.send(createMessage("a.c.ingotronic.ch./A"));
assertFalse("AD flag must not be set", response.getHeader().getFlag(Flags.AD));
assertEquals(Rcode.SERVFAIL, response.getRcode());
assertTrue(getReason(response).startsWith("failed.authority.positive"));
}
@Test
public void testNodataWilcardWithoutCe() throws IOException {
// strip the closest encloser NSEC
Message m = resolver.send(createMessage("\1.c.ingotronic.ch./MX"));
Message message = messageFromString(m.toString().replaceAll("a\\.b\\.ingotronic\\.ch.*", ""));
add(Name.fromString("\1.c.ingotronic.ch./MX").toString(), message);
Message response = resolver.send(createMessage("\1.c.ingotronic.ch./MX"));
assertFalse("AD flag must not be set", response.getHeader().getFlag(Flags.AD));
assertEquals(Rcode.SERVFAIL, response.getRcode());
assertTrue(getReason(response).equals("failed.nodata"));
}
@Test
public void testSynthesisUsesCorrectWildcardNodata() throws IOException {
Message m = resolver.send(createMessage("a.wc.ingotronic.ch./MX"));
Message message = messageFromString(m.toString().replaceAll("a\\.wc\\.ingotronic.ch\\.", "\1.sub.wc.ingotronic.ch."));
add(Name.fromString("\1.sub.wc.ingotronic.ch.").toString() + "/MX", message);
Message response = resolver.send(createMessage("\1.sub.wc.ingotronic.ch./MX"));
assertFalse("AD flag must not be set", response.getHeader().getFlag(Flags.AD));
assertEquals(Rcode.SERVFAIL, response.getRcode());
assertEquals("failed.nodata", getReason(response));
}
@Test
public void testSynthesisUsesCorrectWildcardNodataNsec3() throws IOException {
Message m = resolver.send(createMessage("a.wc.nsec3.ingotronic.ch./MX"));
Message message = messageFromString(m.toString().replaceAll("a\\.wc\\.nsec3.ingotronic.ch\\.", "\1.sub.wc.nsec3.ingotronic.ch."));
add(Name.fromString("\1.sub.wc.nsec3.ingotronic.ch.").toString() + "/MX", message);
Message response = resolver.send(createMessage("\1.sub.wc.nsec3.ingotronic.ch./MX"));
assertFalse("AD flag must not be set", response.getHeader().getFlag(Flags.AD));
assertEquals(Rcode.SERVFAIL, response.getRcode());
assertEquals("failed.nodata", getReason(response));
}
@Test
public void testDsNodataFromWildcardNsecChild() throws IOException {
Message m = Message.newQuery(Record.newRecord(Name.fromString("www.x.c.ingotronic.ch."), Type.A, DClass.IN));
m.addRecord(new ARecord(Name.fromString("www.x.c.ingotronic.ch."), DClass.IN, 300, InetAddress.getLocalHost()), Section.ANSWER);
add("www.x.c.ingotronic.ch./A", m);
Message response = resolver.send(createMessage("www.x.c.ingotronic.ch./A"));
assertFalse("AD flag must not be set", response.getHeader().getFlag(Flags.AD));
assertEquals(Rcode.SERVFAIL, response.getRcode());
}
@Test
public void testDsNodataFromWildcardNsecCovered() throws IOException {
Message m = Message.newQuery(Record.newRecord(Name.fromString("www.x.ce.ingotronic.ch."), Type.A, DClass.IN));
m.addRecord(new ARecord(Name.fromString("www.x.ce.ingotronic.ch."), DClass.IN, 300, InetAddress.getLocalHost()), Section.ANSWER);
add("www.x.ce.ingotronic.ch./A", m);
Message response = resolver.send(createMessage("www.x.ce.ingotronic.ch./A"));
assertFalse("AD flag must not be set", response.getHeader().getFlag(Flags.AD));
assertEquals(Rcode.SERVFAIL, response.getRcode());
}
}
dnssecjava-1.1.3/src/test/java/org/jitsi/dnssec/unbound/ 0000775 0000000 0000000 00000000000 13020541473 0023165 5 ustar 00root root 0000000 0000000 dnssecjava-1.1.3/src/test/java/org/jitsi/dnssec/unbound/rpl/ 0000775 0000000 0000000 00000000000 13020541473 0023762 5 ustar 00root root 0000000 0000000 dnssecjava-1.1.3/src/test/java/org/jitsi/dnssec/unbound/rpl/Check.java 0000664 0000000 0000000 00000000773 13020541473 0025651 0 ustar 00root root 0000000 0000000 /*
* dnssecjava - a DNSSEC validating stub resolver for Java
* Copyright (c) 2013-2015 Ingo Bauersachs
*
* All rights reserved. This program and the accompanying materials
* are made available under the terms of the Eclipse Public License v1.0
* which accompanies this distribution, and is available at
* http://www.eclipse.org/legal/epl-v10.html
*/
package org.jitsi.dnssec.unbound.rpl;
import org.xbill.DNS.Message;
public class Check {
public Message query;
public Message response;
}
dnssecjava-1.1.3/src/test/java/org/jitsi/dnssec/unbound/rpl/Rpl.java 0000664 0000000 0000000 00000001577 13020541473 0025374 0 ustar 00root root 0000000 0000000 /*
* dnssecjava - a DNSSEC validating stub resolver for Java
* Copyright (c) 2013-2015 Ingo Bauersachs
*
* All rights reserved. This program and the accompanying materials
* are made available under the terms of the Eclipse Public License v1.0
* which accompanies this distribution, and is available at
* http://www.eclipse.org/legal/epl-v10.html
*/
package org.jitsi.dnssec.unbound.rpl;
import java.util.ArrayList;
import java.util.List;
import java.util.Map;
import java.util.TreeMap;
import org.jitsi.dnssec.SRRset;
import org.joda.time.DateTime;
import org.xbill.DNS.Message;
public class Rpl {
public List trustAnchors = new ArrayList(1);
public DateTime date;
public String scenario;
public List replays;
public Map checks;
public TreeMap nsec3iterations;
public String digestPreference;
}
dnssecjava-1.1.3/src/test/java/org/jitsi/dnssec/unbound/rpl/RplParser.java 0000664 0000000 0000000 00000025735 13020541473 0026553 0 ustar 00root root 0000000 0000000 /*
* dnssecjava - a DNSSEC validating stub resolver for Java
* Copyright (c) 2013-2015 Ingo Bauersachs
*
* All rights reserved. This program and the accompanying materials
* are made available under the terms of the Eclipse Public License v1.0
* which accompanies this distribution, and is available at
* http://www.eclipse.org/legal/epl-v10.html
*/
package org.jitsi.dnssec.unbound.rpl;
import java.io.BufferedReader;
import java.io.ByteArrayInputStream;
import java.io.IOException;
import java.io.InputStream;
import java.io.InputStreamReader;
import java.lang.reflect.Field;
import java.lang.reflect.Method;
import java.text.ParseException;
import java.util.ArrayList;
import java.util.LinkedList;
import java.util.List;
import java.util.TreeMap;
import org.jitsi.dnssec.SRRset;
import org.jitsi.dnssec.SecurityStatus;
import org.joda.time.DateTime;
import org.joda.time.format.DateTimeFormat;
import org.xbill.DNS.DClass;
import org.xbill.DNS.DNSSEC.Algorithm;
import org.xbill.DNS.DNSSEC;
import org.xbill.DNS.Flags;
import org.xbill.DNS.Master;
import org.xbill.DNS.Message;
import org.xbill.DNS.Name;
import org.xbill.DNS.RRSIGRecord;
import org.xbill.DNS.Rcode;
import org.xbill.DNS.Record;
import org.xbill.DNS.Section;
import org.xbill.DNS.TextParseException;
import org.xbill.DNS.Type;
/**
* Parser for the RPL unit-test files of unbound.
*/
public class RplParser {
private final InputStream data;
private List algoStrings = new ArrayList();
private enum ParseState {
Zero, Server, ENTRY_BEGIN, STEP_QUERY, STEP_CHECK_ANSWER
}
public RplParser(InputStream data) {
this.data = data;
for (Field f : Algorithm.class.getFields()) {
this.algoStrings.add(f.getName());
}
}
public Rpl parse() throws ParseException, IOException {
BufferedReader r = new BufferedReader(new InputStreamReader(data));
String line;
ParseState state = ParseState.Zero;
Rpl rpl = new Rpl();
Message m = null;
int section = -1;
int step = -1;
Check check = null;
while ((line = r.readLine()) != null) {
// comment or empty
if (line.equals("") || line.startsWith(";")) {
continue;
}
switch (state) {
case Zero:
if (line.startsWith("server:")) {
state = ParseState.Server;
}
else if (line.startsWith("SCENARIO_BEGIN")) {
rpl.scenario = line.substring(line.indexOf(" "));
rpl.replays = new LinkedList();
rpl.checks = new TreeMap();
}
else if (line.startsWith("ENTRY_BEGIN")) {
state = ParseState.ENTRY_BEGIN;
m = new Message();
}
else if (line.startsWith("STEP")) {
String[] data = line.split("\\s");
step = Integer.parseInt(data[1]);
m = new Message();
r.readLine();
if (data[2].equals("QUERY")) {
state = ParseState.STEP_QUERY;
check = new Check();
}
else if (data[2].equals("CHECK_ANSWER")) {
state = ParseState.STEP_CHECK_ANSWER;
}
}
break;
case Server:
if (line.matches("\\s*trust-anchor:.*")) {
SRRset rrset = new SRRset();
rrset.setSecurityStatus(SecurityStatus.SECURE);
rrset.addRR(parseRecord(line.substring(line.indexOf("\"") + 1, line.length() - 1)));
rpl.trustAnchors.add(rrset);
}
else if (line.matches("\\s*val-override-date:.*")) {
rpl.date = DateTime.parse(line.substring(line.indexOf("\"") + 1, line.length() - 2), DateTimeFormat.forPattern("yyyyMMddHHmmss"));
}
else if (line.matches("\\s*val-nsec3-keysize-iterations:.*")) {
String[] data = line.substring(line.indexOf("\"") + 1, line.length() - 1).split("\\s");
if (data.length % 2 != 0) {
throw new ParseException("val-nsec3-keysize-iterations invalid", 0);
}
rpl.nsec3iterations = new TreeMap();
for (int i = 0; i < data.length; i += 2) {
rpl.nsec3iterations.put(Integer.parseInt(data[i]), Integer.parseInt(data[i + 1]));
}
}
else if (line.matches("\\s*val-digest-preference:.*")) {
rpl.digestPreference = line.substring(line.indexOf("\"") + 1, line.length() - 1);
}
else if (line.startsWith("CONFIG_END")) {
state = ParseState.Zero;
}
break;
case ENTRY_BEGIN:
case STEP_CHECK_ANSWER:
case STEP_QUERY:
if (line.startsWith("MATCH") || line.startsWith("ADJUST")) {
// ignore
}
else if (line.startsWith("REPLY")) {
String[] flags = line.split("\\s");
if (state != ParseState.STEP_QUERY) {
m.getHeader().setRcode(Rcode.value(flags[flags.length - 1]));
}
for (int i = 1; i < flags.length - (state == ParseState.STEP_QUERY ? 0 : 1); i++) {
if (flags[i].equals("DO")) {
// set on the resolver, not on the message
}
else {
int flag = Flags.value(flags[i]);
if (flag > -1) {
m.getHeader().setFlag(flag);
}
else {
throw new ParseException(flags[i] + ": not a Flag", i);
}
}
}
}
else if (line.startsWith("SECTION QUESTION")) {
section = Section.QUESTION;
}
else if (line.startsWith("SECTION ANSWER")) {
section = Section.ANSWER;
}
else if (line.startsWith("SECTION AUTHORITY")) {
section = Section.AUTHORITY;
}
else if (line.startsWith("SECTION ADDITIONAL")) {
section = Section.ADDITIONAL;
}
else if (line.startsWith("ENTRY_END")) {
if (state == ParseState.ENTRY_BEGIN) {
rpl.replays.add(m);
}
else if (state == ParseState.STEP_CHECK_ANSWER) {
check.response = m;
rpl.checks.put(step, check);
check = null;
}
else if (state == ParseState.STEP_QUERY) {
check.query = m;
}
m = null;
state = ParseState.Zero;
}
else {
Record rec;
if (section == Section.QUESTION) {
rec = parseQuestion(line);
}
else {
rec = parseRecord(line);
}
m.addRecord(rec, section);
}
break;
}
}
return rpl;
}
private Record parseRecord(String line) throws IOException {
try {
Master ma = new Master(new ByteArrayInputStream(line.getBytes()), null, 3600);
Record r = ma.nextRecord();
if (r.getType() == Type.RRSIG) {
RRSIGRecord rr = (RRSIGRecord)r;
// unbound directly uses the DER format for DSA signatures
// instead of the format specified in rfc2536#section-3
if (rr.getAlgorithm() == Algorithm.DSA && rr.getSignature().length > 41) {
Method DSASignaturetoDNS = DNSSEC.class.getDeclaredMethod("DSASignaturetoDNS", byte[].class, int.class);
DSASignaturetoDNS.setAccessible(true);
byte[] signature = (byte[])DSASignaturetoDNS.invoke(null, rr.getSignature(), 0);
RRSIGRecord fixed = new RRSIGRecord(rr.getName(), rr.getDClass(), rr.getTTL(), rr.getTypeCovered(), rr.getAlgorithm(), rr.getOrigTTL(),
rr.getExpire(), rr.getTimeSigned(), rr.getFootprint(), rr.getSigner(), signature);
Field f = getField(RRSIGRecord.class, "labels");
f.setAccessible(true);
f.set(fixed, rr.getLabels());
r = fixed;
}
}
return r;
}
catch (Exception ex) {
if (ex.getMessage() != null && ex.getMessage().contains("expected an integer")) {
String[] data = line.split("\\s");
StringBuilder sb = new StringBuilder();
for (int i = 0; i < data.length; i++) {
if (this.algoStrings.contains(data[i])) {
sb.append(Algorithm.value(data[i]));
}
else {
sb.append(data[i]);
}
sb.append(' ');
}
return parseRecord(sb.toString());
}
else {
throw new IOException(line, ex);
}
}
}
private static Field getField(Class> clazz, String fieldName) throws NoSuchFieldException {
try {
return clazz.getDeclaredField(fieldName);
}
catch (NoSuchFieldException e) {
Class> superClass = clazz.getSuperclass();
if (superClass == null) {
throw e;
}
else {
return getField(superClass, fieldName);
}
}
}
private Record parseQuestion(String line) throws TextParseException {
String[] temp = line.replaceAll("\\s+", " ").split(" ");
if (Type.value(temp[2]) == -1) {
System.out.println(temp[2]);
}
return Record.newRecord(Name.fromString(temp[0]), Type.value(temp[2]), DClass.value(temp[1]));
}
}
dnssecjava-1.1.3/src/test/java/org/jitsi/dnssec/unbound/rpl/UnboundTests.java 0000664 0000000 0000000 00000060437 13020541473 0027274 0 ustar 00root root 0000000 0000000 /*
* dnssecjava - a DNSSEC validating stub resolver for Java
* Copyright (c) 2013-2015 Ingo Bauersachs
*
* All rights reserved. This program and the accompanying materials
* are made available under the terms of the Eclipse Public License v1.0
* which accompanies this distribution, and is available at
* http://www.eclipse.org/legal/epl-v10.html
*/
package org.jitsi.dnssec.unbound.rpl;
import static org.junit.Assert.assertEquals;
import static org.powermock.api.mockito.PowerMockito.whenNew;
import java.io.File;
import java.io.IOException;
import java.io.InputStream;
import java.text.ParseException;
import java.util.ArrayList;
import java.util.Arrays;
import java.util.Date;
import java.util.Iterator;
import java.util.List;
import java.util.Map.Entry;
import java.util.Properties;
import org.jitsi.dnssec.SRRset;
import org.jitsi.dnssec.TestBase;
import org.junit.Test;
import org.junit.runner.RunWith;
import org.powermock.core.classloader.annotations.PrepareForTest;
import org.powermock.modules.junit4.PowerMockRunner;
import org.xbill.DNS.CNAMERecord;
import org.xbill.DNS.DNAMERecord;
import org.xbill.DNS.DNSSEC;
import org.xbill.DNS.Flags;
import org.xbill.DNS.Message;
import org.xbill.DNS.Name;
import org.xbill.DNS.RRset;
import org.xbill.DNS.Rcode;
import org.xbill.DNS.Record;
import org.xbill.DNS.Section;
import org.xbill.DNS.Type;
@RunWith(PowerMockRunner.class)
@PrepareForTest(DNSSEC.class)
public class UnboundTests extends TestBase {
public void runUnboundTest() throws ParseException, IOException {
InputStream data = getClass().getResourceAsStream("/unbound/" + testName + ".rpl");
RplParser p = new RplParser(data);
Rpl rpl = p.parse();
Properties config = new Properties();
if (rpl.nsec3iterations != null) {
for (Entry e : rpl.nsec3iterations.entrySet()) {
config.put("org.jitsi.dnssec.nsec3.iterations." + e.getKey(), e.getValue());
}
}
if (rpl.digestPreference != null) {
config.put("org.jitsi.dnssec.digest_preference", rpl.digestPreference);
}
for (Message m : rpl.replays) {
add(stripAdditional(m));
for (RRset set : m.getSectionRRsets(Section.AUTHORITY)) {
if (set.getType() == Type.DS && set.sigs().hasNext() && Name.fromString("sub.example.com.").equals(set.getName())) {
Message additional = new Message();
additional.addRecord(Record.newRecord(set.getName(), set.getType(), set.getDClass()), Section.QUESTION);
Iterator> it = set.rrs();
while (it.hasNext()) {
additional.addRecord((Record)it.next(), Section.ANSWER);
}
it = set.sigs();
while (it.hasNext()) {
additional.addRecord((Record)it.next(), Section.ANSWER);
}
add(stripAdditional(additional));
break;
}
}
}
// merge xNAME queries into one
List copy = new ArrayList(rpl.replays.size());
copy.addAll(rpl.replays);
List copiedTargets = new ArrayList(5);
for (Message m : copy) {
Name target = null;
for (RRset s : m.getSectionRRsets(Section.ANSWER)) {
if (s.getType() == Type.CNAME) {
target = ((CNAMERecord)s.first()).getTarget();
}
else if (s.getType() == Type.DNAME) {
target = ((DNAMERecord)s.first()).getTarget();
}
while (target != null) {
Message a = get(target, m.getQuestion().getType());
if (a == null) {
a = get(target, Type.CNAME);
}
if (a == null) {
a = get(target, Type.DNAME);
}
if (a != null) {
target = add(m, a);
if (copiedTargets.contains(target)) {
break;
}
copiedTargets.add(target);
rpl.replays.remove(a);
}
else {
target = null;
}
}
}
}
// promote any DS records in auth. sections to real queries
copy = new ArrayList(rpl.replays.size());
copy.addAll(rpl.replays);
for (Message m : copy) {
for (RRset s : m.getSectionRRsets(Section.AUTHORITY)) {
if (s.getType() == Type.DS) {
Message ds = new Message();
ds.addRecord(Record.newRecord(s.getName(), s.getType(), s.getDClass()), Section.QUESTION);
Iterator> rrs = s.rrs();
while (rrs.hasNext()) {
ds.addRecord((Record)rrs.next(), Section.ANSWER);
}
Iterator> sigs = s.sigs();
while (sigs.hasNext()) {
ds.addRecord((Record)sigs.next(), Section.ANSWER);
}
rpl.replays.add(ds);
}
}
}
clear();
for (Message m : rpl.replays) {
add(stripAdditional(m));
}
if (rpl.date != null) {
try {
Date d = new Date(rpl.date.getMillis());
whenNew(Date.class).withNoArguments().thenReturn(d);
}
catch (Exception e) {
throw new RuntimeException(e);
}
}
if (rpl.trustAnchors != null) {
resolver.getTrustAnchors().clear();
for (SRRset rrset : rpl.trustAnchors) {
resolver.getTrustAnchors().store(rrset);
}
}
resolver.init(config);
for (Check c : rpl.checks.values()) {
Message s = resolver.send(c.query);
assertEquals(c.response.getHeader().getFlag(Flags.AD), s.getHeader().getFlag(Flags.AD));
assertEquals(Rcode.string(c.response.getRcode()), Rcode.string(s.getRcode()));
}
}
private Message stripAdditional(Message m) {
if (m.getQuestion().getType() == Type.RRSIG) {
return m;
}
Message copy = new Message();
copy.setHeader(m.getHeader());
for (int i = 0; i < Section.ADDITIONAL; i++) {
for (RRset set : m.getSectionRRsets(i)) {
if (set.getType() == Type.NS && m.getQuestion().getType() != Type.NS) {
continue;
}
Iterator> rrs = set.rrs();
while (rrs.hasNext()) {
copy.addRecord((Record)rrs.next(), i);
}
Iterator> sigs = set.sigs();
while (sigs.hasNext()) {
copy.addRecord((Record)sigs.next(), i);
}
}
}
return copy;
}
private Name add(Message target, Message source) {
Name next = null;
target.getHeader().setRcode(source.getRcode());
for (Record r : source.getSectionArray(Section.ANSWER)) {
target.addRecord(r, Section.ANSWER);
if (r.getType() == Type.CNAME) {
next = ((CNAMERecord)r).getTarget();
}
else if (r.getType() == Type.DNAME) {
next = ((DNAMERecord)r).getTarget();
}
}
for (Record r : source.getSectionArray(Section.AUTHORITY)) {
if (r.getType() != Type.NS) {
target.addRecord(r, Section.AUTHORITY);
}
}
return next;
}
public static void main(String[] srgs) throws ParseException, IOException {
String[] ignored = new String[] { "val_faildnskey_ok.rpl", // tests an
// unbound
// specific
// config
// option
"val_nsec3_nods_negcache.rpl", // we don't do negative caching
"val_unsecds_negcache.rpl", // "
"val_negcache_dssoa.rpl", // "
"val_nsec3_b3_optout_negcache.rpl", // "
"val_dsnsec.rpl", // "
"val_refer_unsignadd.rpl", // more cache stuff
"val_referglue.rpl", // "
"val_noadwhennodo.rpl", // irrelevant - if we wouldn't want AD,
// we wouldn't be using this stuff
"val_fwdds.rpl", // irrelevant, we're not a recursive resolver
"val_referd.rpl", // NSEC records missing for validation, tests
// caching stuff
"val_stubds.rpl", // tests unbound specific config (stub zones)
"val_cnametonsec.rpl", // incomplete CNAME answer
"val_cnametooptin.rpl", // incomplete CNAME answer
"val_cnametoinsecure.rpl", // incomplete CNAME answer
"val_nsec3_optout_cache.rpl", // more cache stuff
"val_ds_gost.rpl", // we don't support GOST (RFC5933)
"val_ds_gost_downgrade.rpl", // no GOST
"val_unsecds_qtypeds.rpl", // tests the iterative resolver
"val_anchor_nx.rpl", // tests caching of NX from a parent
// resolver
"val_anchor_nx_nosig.rpl", // "
};
List ignoredList = Arrays.asList(ignored);
for (String f : new File("./src/test/resources/unbound").list()) {
if (ignoredList.contains(f)) {
continue;
}
System.out.println(" @Test");
System.out.println(" public void " + f.split("\\.")[0] + "() throws ParseException, IOException {");
System.out.println(" runUnboundTest();");
System.out.println(" }");
}
}
@Test
public void val_adbit() throws ParseException, IOException {
runUnboundTest();
}
@Test
public void val_adcopy() throws ParseException, IOException {
runUnboundTest();
}
@Test
public void val_ans_dsent() throws ParseException, IOException {
runUnboundTest();
}
@Test
public void val_ans_nx() throws ParseException, IOException {
runUnboundTest();
}
@Test
public void val_any() throws ParseException, IOException {
runUnboundTest();
}
@Test
public void val_any_cname() throws ParseException, IOException {
runUnboundTest();
}
@Test
public void val_any_dname() throws ParseException, IOException {
runUnboundTest();
}
@Test
public void val_cnameinsectopos() throws ParseException, IOException {
runUnboundTest();
}
@Test
public void val_cnamenx_dblnsec() throws ParseException, IOException {
runUnboundTest();
}
@Test
public void val_cnamenx_rcodenx() throws ParseException, IOException {
runUnboundTest();
}
@Test
public void val_cnameqtype() throws ParseException, IOException {
runUnboundTest();
}
@Test
public void val_cnametocloser() throws ParseException, IOException {
runUnboundTest();
}
@Test
public void val_cnametocloser_nosig() throws ParseException, IOException {
runUnboundTest();
}
@Test
public void val_cnametocnamewctoposwc() throws ParseException, IOException {
runUnboundTest();
}
@Test
public void val_cnametodname() throws ParseException, IOException {
runUnboundTest();
}
@Test
public void val_cnametodnametocnametopos() throws ParseException, IOException {
runUnboundTest();
}
@Test
public void val_cnametonodata() throws ParseException, IOException {
runUnboundTest();
}
@Test
public void val_cnametonodata_nonsec() throws ParseException, IOException {
runUnboundTest();
}
@Test
public void val_cnametonx() throws ParseException, IOException {
runUnboundTest();
}
@Test
public void val_cnametooptout() throws ParseException, IOException {
runUnboundTest();
}
@Test
public void val_cnametopos() throws ParseException, IOException {
runUnboundTest();
}
@Test
public void val_cnametoposnowc() throws ParseException, IOException {
runUnboundTest();
}
@Test
public void val_cnametoposwc() throws ParseException, IOException {
runUnboundTest();
}
@Test
public void val_cnamewctonodata() throws ParseException, IOException {
runUnboundTest();
}
@Test
public void val_cnamewctonx() throws ParseException, IOException {
runUnboundTest();
}
@Test
public void val_cnamewctoposwc() throws ParseException, IOException {
runUnboundTest();
}
@Test
public void val_cname_loop1() throws ParseException, IOException {
runUnboundTest();
}
@Test
public void val_cname_loop2() throws ParseException, IOException {
runUnboundTest();
}
@Test
public void val_cname_loop3() throws ParseException, IOException {
runUnboundTest();
}
@Test
public void val_dnametoolong() throws ParseException, IOException {
runUnboundTest();
}
@Test
public void val_dnametopos() throws ParseException, IOException {
runUnboundTest();
}
@Test
public void val_dnametoposwc() throws ParseException, IOException {
runUnboundTest();
}
@Test
public void val_dnamewc() throws ParseException, IOException {
runUnboundTest();
}
@Test
public void val_ds_afterprime() throws ParseException, IOException {
runUnboundTest();
}
@Test
public void val_ds_cname() throws ParseException, IOException {
runUnboundTest();
}
@Test
public void val_ds_cnamesub() throws ParseException, IOException {
runUnboundTest();
}
@Test
public void val_ds_cnamesubbogus() throws ParseException, IOException {
runUnboundTest();
}
@Test
public void val_ds_sha2() throws ParseException, IOException {
runUnboundTest();
}
@Test
public void val_ds_sha2_downgrade() throws ParseException, IOException {
runUnboundTest();
}
@Test
public void val_ds_sha2_downgrade_override() throws ParseException, IOException {
runUnboundTest();
}
@Test
public void val_entds() throws ParseException, IOException {
runUnboundTest();
}
@Test
public void val_faildnskey() throws ParseException, IOException {
runUnboundTest();
}
@Test
public void val_keyprefetch() throws ParseException, IOException {
runUnboundTest();
}
@Test
public void val_keyprefetch_verify() throws ParseException, IOException {
runUnboundTest();
}
@Test
public void val_mal_wc() throws ParseException, IOException {
runUnboundTest();
}
@Test
public void val_negcache_ds() throws ParseException, IOException {
runUnboundTest();
}
@Test
public void val_nodata() throws ParseException, IOException {
runUnboundTest();
}
@Test
public void val_nodatawc() throws ParseException, IOException {
runUnboundTest();
}
@Test
public void val_nodatawc_badce() throws ParseException, IOException {
runUnboundTest();
}
@Test
public void val_nodatawc_nodeny() throws ParseException, IOException {
runUnboundTest();
}
@Test
public void val_nodatawc_wrongdeleg() throws ParseException, IOException {
runUnboundTest();
}
@Test
public void val_nodatawc_wcns() throws ParseException, IOException {
runUnboundTest();
}
@Test
public void val_nodatawc_one() throws ParseException, IOException {
runUnboundTest();
}
@Test
public void val_nodata_ent() throws ParseException, IOException {
runUnboundTest();
}
@Test
public void val_nodata_entwc() throws ParseException, IOException {
runUnboundTest();
}
@Test
public void val_nodata_failsig() throws ParseException, IOException {
runUnboundTest();
}
@Test
public void val_nodata_hasdata() throws ParseException, IOException {
runUnboundTest();
}
@Test
public void val_nodata_zonecut() throws ParseException, IOException {
runUnboundTest();
}
@Test
public void val_nokeyprime() throws ParseException, IOException {
runUnboundTest();
}
@Test
public void val_nsec3_b1_nameerror() throws ParseException, IOException {
runUnboundTest();
}
@Test
public void val_nsec3_b1_nameerror_noce() throws ParseException, IOException {
runUnboundTest();
}
@Test
public void val_nsec3_b1_nameerror_nonc() throws ParseException, IOException {
runUnboundTest();
}
@Test
public void val_nsec3_b1_nameerror_nowc() throws ParseException, IOException {
runUnboundTest();
}
@Test
public void val_nsec3_b21_nodataent() throws ParseException, IOException {
runUnboundTest();
}
@Test
public void val_nsec3_b21_nodataent_wr() throws ParseException, IOException {
runUnboundTest();
}
@Test
public void val_nsec3_b2_nodata() throws ParseException, IOException {
runUnboundTest();
}
@Test
public void val_nsec3_b2_nodata_nons() throws ParseException, IOException {
runUnboundTest();
}
@Test
public void val_nsec3_b3_optout() throws ParseException, IOException {
runUnboundTest();
}
@Test
public void val_nsec3_b3_optout_noce() throws ParseException, IOException {
runUnboundTest();
}
@Test
public void val_nsec3_b3_optout_nonc() throws ParseException, IOException {
runUnboundTest();
}
@Test
public void val_nsec3_b4_wild() throws ParseException, IOException {
runUnboundTest();
}
@Test
public void val_nsec3_b4_wild_wr() throws ParseException, IOException {
runUnboundTest();
}
@Test
public void val_nsec3_b5_wcnodata() throws ParseException, IOException {
runUnboundTest();
}
@Test
public void val_nsec3_b5_wcnodata_noce() throws ParseException, IOException {
runUnboundTest();
}
@Test
public void val_nsec3_b5_wcnodata_nonc() throws ParseException, IOException {
runUnboundTest();
}
@Test
public void val_nsec3_b5_wcnodata_nowc() throws ParseException, IOException {
runUnboundTest();
}
@Test
public void val_nsec3_cnametocnamewctoposwc() throws ParseException, IOException {
runUnboundTest();
}
@Test
public void val_nsec3_cname_ds() throws ParseException, IOException {
runUnboundTest();
}
@Test
public void val_nsec3_cname_par() throws ParseException, IOException {
runUnboundTest();
}
@Test
public void val_nsec3_cname_sub() throws ParseException, IOException {
runUnboundTest();
}
@Test
public void val_nsec3_entnodata_optout() throws ParseException, IOException {
runUnboundTest();
}
@Test
public void val_nsec3_entnodata_optout_badopt() throws ParseException, IOException {
runUnboundTest();
}
@Test
public void val_nsec3_entnodata_optout_match() throws ParseException, IOException {
runUnboundTest();
}
@Test
public void val_nsec3_iter_high() throws ParseException, IOException {
runUnboundTest();
}
@Test
public void val_nsec3_nodatawccname() throws ParseException, IOException {
runUnboundTest();
}
@Test
public void val_nsec3_nods() throws ParseException, IOException {
runUnboundTest();
}
@Test
public void val_nsec3_nods_badopt() throws ParseException, IOException {
runUnboundTest();
}
@Test
public void val_nsec3_nods_badsig() throws ParseException, IOException {
runUnboundTest();
}
@Test
public void val_nsec3_nods_soa() throws ParseException, IOException {
runUnboundTest();
}
@Test
public void val_nsec3_optout_ad() throws ParseException, IOException {
runUnboundTest();
}
@Test
public void val_nsec3_wcany() throws ParseException, IOException {
runUnboundTest();
}
@Test
public void val_nsec3_wcany_nodeny() throws ParseException, IOException {
runUnboundTest();
}
@Test
public void val_nx() throws ParseException, IOException {
runUnboundTest();
}
@Test
public void val_nx_nodeny() throws ParseException, IOException {
runUnboundTest();
}
@Test
public void val_nx_nowc() throws ParseException, IOException {
runUnboundTest();
}
@Test
public void val_nx_nsec3_collision() throws ParseException, IOException {
runUnboundTest();
}
@Test
public void val_nx_nsec3_collision2() throws ParseException, IOException {
runUnboundTest();
}
@Test
public void val_nx_nsec3_collision3() throws ParseException, IOException {
runUnboundTest();
}
@Test
public void val_nx_nsec3_collision4() throws ParseException, IOException {
runUnboundTest();
}
@Test
public void val_nx_nsec3_hashalg() throws ParseException, IOException {
runUnboundTest();
}
@Test
public void val_nx_nsec3_nsecmix() throws ParseException, IOException {
runUnboundTest();
}
@Test
public void val_nx_nsec3_params() throws ParseException, IOException {
runUnboundTest();
}
@Test
public void val_nx_overreach() throws ParseException, IOException {
runUnboundTest();
}
@Test
public void val_positive() throws ParseException, IOException {
runUnboundTest();
}
@Test
public void val_positive_nosigs() throws ParseException, IOException {
runUnboundTest();
}
@Test
public void val_positive_wc() throws ParseException, IOException {
runUnboundTest();
}
@Test
public void val_positive_wc_nodeny() throws ParseException, IOException {
runUnboundTest();
}
@Test
public void val_pos_truncns() throws ParseException, IOException {
runUnboundTest();
}
@Test
public void val_qds_badanc() throws ParseException, IOException {
runUnboundTest();
}
@Test
public void val_qds_oneanc() throws ParseException, IOException {
runUnboundTest();
}
@Test
public void val_qds_twoanc() throws ParseException, IOException {
runUnboundTest();
}
@Test
public void val_rrsig() throws ParseException, IOException {
runUnboundTest();
}
@Test
public void val_secds() throws ParseException, IOException {
runUnboundTest();
}
@Test
public void val_secds_nosig() throws ParseException, IOException {
runUnboundTest();
}
@Test
public void val_stub_noroot() throws ParseException, IOException {
runUnboundTest();
}
@Test
public void val_ta_algo_dnskey() throws ParseException, IOException {
runUnboundTest();
}
@Test
public void val_ta_algo_missing() throws ParseException, IOException {
runUnboundTest();
}
@Test
public void val_twocname() throws ParseException, IOException {
runUnboundTest();
}
@Test
public void val_unalgo_anchor() throws ParseException, IOException {
runUnboundTest();
}
@Test
public void val_unalgo_dlv() throws ParseException, IOException {
runUnboundTest();
}
@Test
public void val_unalgo_ds() throws ParseException, IOException {
runUnboundTest();
}
@Test
public void val_unsecds() throws ParseException, IOException {
runUnboundTest();
}
@Test
public void val_unsec_cname() throws ParseException, IOException {
runUnboundTest();
}
@Test
public void val_wild_pos() throws ParseException, IOException {
runUnboundTest();
}
}
dnssecjava-1.1.3/src/test/java/org/jitsi/dnssec/validator/ 0000775 0000000 0000000 00000000000 13020541473 0023500 5 ustar 00root root 0000000 0000000 dnssecjava-1.1.3/src/test/java/org/jitsi/dnssec/validator/TestNsec3ValUtils.java 0000664 0000000 0000000 00000020700 13020541473 0027641 0 ustar 00root root 0000000 0000000 /*
* dnssecjava - a DNSSEC validating stub resolver for Java
* Copyright (c) 2013-2015 Ingo Bauersachs
*
* All rights reserved. This program and the accompanying materials
* are made available under the terms of the Eclipse Public License v1.0
* which accompanies this distribution, and is available at
* http://www.eclipse.org/legal/epl-v10.html
*/
package org.jitsi.dnssec.validator;
import static org.junit.Assert.assertEquals;
import static org.junit.Assert.assertFalse;
import static org.junit.Assert.assertTrue;
import static org.powermock.api.mockito.PowerMockito.doAnswer;
import static org.powermock.api.mockito.PowerMockito.spy;
import static org.powermock.api.mockito.PowerMockito.whenNew;
import java.io.IOException;
import java.security.Provider;
import java.security.PublicKey;
import java.security.Security;
import java.util.Properties;
import org.jitsi.dnssec.AlwaysOffline;
import org.jitsi.dnssec.PrepareMocks;
import org.jitsi.dnssec.TestBase;
import org.junit.Assume;
import org.junit.Test;
import org.junit.runner.RunWith;
import org.mockito.invocation.InvocationOnMock;
import org.mockito.stubbing.Answer;
import org.powermock.core.classloader.annotations.PrepareForTest;
import org.powermock.modules.junit4.PowerMockRunner;
import org.powermock.reflect.Whitebox;
import org.xbill.DNS.DNSKEYRecord;
import org.xbill.DNS.DNSSEC;
import org.xbill.DNS.Flags;
import org.xbill.DNS.Message;
import org.xbill.DNS.Name;
import org.xbill.DNS.RRset;
import org.xbill.DNS.Rcode;
import org.xbill.DNS.Record;
import org.xbill.DNS.Section;
@RunWith(PowerMockRunner.class)
@PrepareForTest({DNSKEYRecord.class, NSEC3ValUtils.class})
public class TestNsec3ValUtils extends TestBase {
@Test(expected = IllegalArgumentException.class)
public void testTooLargeIterationCountMustThrow() {
Properties config = new Properties();
config.put("org.jitsi.dnssec.nsec3.iterations.512", Integer.MAX_VALUE);
NSEC3ValUtils val = new NSEC3ValUtils();
val.init(config);
}
@Test
public void testInvalidIterationCountMarksInsecure() throws IOException {
Properties config = new Properties();
config.put("org.jitsi.dnssec.nsec3.iterations.1024", 0);
config.put("org.jitsi.dnssec.nsec3.iterations.2048", 0);
config.put("org.jitsi.dnssec.nsec3.iterations.4096", 0);
resolver.init(config);
Message response = resolver.send(createMessage("www.wc.nsec3.ingotronic.ch./A"));
assertFalse("AD flag must not be set", response.getHeader().getFlag(Flags.AD));
assertEquals(Rcode.NOERROR, response.getRcode());
assertEquals("failed.nsec3_ignored", getReason(response));
}
@Test
public void testNsec3WithoutClosestEncloser() throws IOException {
Message m = resolver.send(createMessage("gibtsnicht.gibtsnicht.nsec3.ingotronic.ch./A"));
Message message = messageFromString(m.toString().replaceAll("((UDUMPS9J6F8348HFHH2FAED6I9DDE0U6)|(NTV3QJT4VQDVBPB6BNOVM40NMKJ3H29P))\\.nsec3.*", ""));
add("gibtsnicht.gibtsnicht.nsec3.ingotronic.ch./A", message);
Message response = resolver.send(createMessage("gibtsnicht.gibtsnicht.nsec3.ingotronic.ch./A"));
assertFalse("AD flag must not be set", response.getHeader().getFlag(Flags.AD));
assertEquals(Rcode.SERVFAIL, response.getRcode());
assertEquals("failed.nxdomain.nsec3_bogus", getReason(response));
}
@Test
public void testNsec3NodataChangedToNxdomainIsBogus() throws IOException {
Message m = resolver.send(createMessage("a.b.nsec3.ingotronic.ch./MX"));
Message message = messageFromString(m.toString().replaceAll("status: NOERROR", "status: NXDOMAIN"));
add("a.b.nsec3.ingotronic.ch./A", message);
Message response = resolver.send(createMessage("a.b.nsec3.ingotronic.ch./A"));
assertFalse("AD flag must not be set", response.getHeader().getFlag(Flags.AD));
assertEquals(Rcode.SERVFAIL, response.getRcode());
assertEquals("failed.nxdomain.nsec3_bogus", getReason(response));
}
@Test
public void testNsec3ClosestEncloserIsDelegation() throws IOException {
// hash(n=9.nsec3.ingotronic.ch.,it=10,s=1234)=6jl2t4i2bb7eilloi8mdhbf3uqjgvu4s
Message cem = resolver.send(createMessage("9.nsec3.ingotronic.ch./A"));
Record delegationNsec = null;
Record delegationNsecSig = null;
for (RRset set : cem.getSectionRRsets(Section.AUTHORITY)) {
// hash(n=sub.nsec3.ingotronic.ch.,it=10,s=1234)=5RFQOLI81S6LKQTUG5HLI19UVJNKUL3H
if (set.getName().toString().startsWith("5RFQOLI81S6LKQTUG5HLI19UVJNKUL3H")) {
delegationNsec = set.first();
delegationNsecSig = (Record)set.sigs().next();
break;
}
}
Message m = resolver.send(createMessage("a.sub.nsec3.ingotronic.ch./A"));
String temp = m.toString().replaceAll("^sub\\.nsec3.*", "");
// hash(n=sub.nsec3.ingotronic.ch.,it=11,s=4321)=8N8QLBCUIH7R2BG7DMCJ5AEE63K4KVUA
temp = temp.replaceAll("8N8QLBCUIH7R2BG7DMCJ5AEE63K4KVUA.*", "");
Message message = messageFromString(temp);
message.addRecord(delegationNsec, Section.AUTHORITY);
message.addRecord(delegationNsecSig, Section.AUTHORITY);
add("a.sub.nsec3.ingotronic.ch./A", message);
Message response = resolver.send(createMessage("a.sub.nsec3.ingotronic.ch./A"));
assertFalse("AD flag must not be set", response.getHeader().getFlag(Flags.AD));
assertEquals(Rcode.SERVFAIL, response.getRcode());
assertEquals("failed.nxdomain.nsec3_bogus", getReason(response));
}
@Test
@AlwaysOffline
public void testNsec3ClosestEncloserIsInsecureDelegation() throws IOException {
Message response = resolver.send(createMessage("a.unsigned.nsec3.ingotronic.ch./A"));
assertFalse("AD flag must not be set", response.getHeader().getFlag(Flags.AD));
assertEquals(Rcode.NXDOMAIN, response.getRcode());
assertEquals("failed.nxdomain.nsec3_insecure", getReason(response));
}
@Test
@PrepareMocks("prepareTestPublicKeyLoadingException")
public void testPublicKeyLoadingException() throws IOException {
Message response = resolver.send(createMessage("www.wc.nsec3.ingotronic.ch./A"));
assertFalse("AD flag must not be set", response.getHeader().getFlag(Flags.AD));
assertEquals(Rcode.NOERROR, response.getRcode());
assertEquals("failed.nsec3_ignored", getReason(response));
}
private int invocationCount = 0;
public void prepareTestPublicKeyLoadingException() throws Exception {
whenNew(DNSKEYRecord.class).withNoArguments().thenAnswer(new Answer() {
@Override
public DNSKEYRecord answer(InvocationOnMock invocationOnMock) throws Throwable {
DNSKEYRecord dr = spy(Whitebox.invokeConstructor(DNSKEYRecord.class));
doAnswer(new Answer() {
@Override
public PublicKey answer(InvocationOnMock invocation) throws Throwable {
DNSKEYRecord dr = (DNSKEYRecord)invocation.getMock();
invocationCount++;
if (dr.getName().equals(Name.fromConstantString("nsec3.ingotronic.ch.")) && invocationCount == 11) {
throw Whitebox.invokeConstructor(DNSSEC.DNSSECException.class, "mock-test");
}
return (PublicKey)invocation.callRealMethod();
}
}).when(dr).getPublicKey();
return dr;
}
});
}
@Test
public void testNsecEcdsa256() throws IOException {
Provider[] providers = Security.getProviders("KeyFactory.EC");
Assume.assumeTrue(providers != null && providers.length > 0);
Message response = resolver.send(createMessage("www.wc.nsec3-ecdsa256.ingotronic.ch./A"));
assertTrue("AD flag must be set", response.getHeader().getFlag(Flags.AD));
assertEquals(Rcode.NOERROR, response.getRcode());
}
@Test
public void testNsecEcdsa384() throws IOException {
Provider[] providers = Security.getProviders("KeyFactory.EC");
Assume.assumeTrue(providers != null && providers.length > 0);
Message response = resolver.send(createMessage("www.wc.nsec3-ecdsa384.ingotronic.ch./A"));
assertTrue("AD flag must be set", response.getHeader().getFlag(Flags.AD));
assertEquals(Rcode.NOERROR, response.getRcode());
}
}
dnssecjava-1.1.3/src/test/java/org/jitsi/dnssec/validator/TestValUtils.java 0000664 0000000 0000000 00000043060 13020541473 0026751 0 ustar 00root root 0000000 0000000 /*
* dnssecjava - a DNSSEC validating stub resolver for Java
* Copyright (c) 2013-2015 Ingo Bauersachs
*
* All rights reserved. This program and the accompanying materials
* are made available under the terms of the Eclipse Public License v1.0
* which accompanies this distribution, and is available at
* http://www.eclipse.org/legal/epl-v10.html
*/
package org.jitsi.dnssec.validator;
import static org.junit.Assert.assertEquals;
import static org.junit.Assert.assertFalse;
import static org.junit.Assert.assertNull;
import static org.junit.Assert.assertTrue;
import java.io.IOException;
import org.jitsi.dnssec.SMessage;
import org.jitsi.dnssec.SecurityStatus;
import org.jitsi.dnssec.TestBase;
import org.junit.Test;
import org.xbill.DNS.DClass;
import org.xbill.DNS.Flags;
import org.xbill.DNS.Message;
import org.xbill.DNS.NSECRecord;
import org.xbill.DNS.Name;
import org.xbill.DNS.RRset;
import org.xbill.DNS.Rcode;
import org.xbill.DNS.Record;
import org.xbill.DNS.Section;
import org.xbill.DNS.Type;
public class TestValUtils extends TestBase {
@Test
public void testLongestCommonNameRootIsRoot() {
assertEquals(Name.root, ValUtils.longestCommonName(Name.fromConstantString("example.com."), Name.fromConstantString("example.net.")));
}
@Test
public void testNoDataWhenResultIsFromDelegationPoint() throws IOException {
Message nsec = resolver.send(createMessage("t.ingotronic.ch./A"));
Record delegationNsec = null;
Record delegationNsecSig = null;
for (RRset set : nsec.getSectionRRsets(Section.AUTHORITY)) {
if (set.getName().toString().startsWith("sub.ingotronic.ch")) {
delegationNsec = set.first();
delegationNsecSig = (Record)set.sigs().next();
break;
}
}
Message m = resolver.send(createMessage("sub.ingotronic.ch./MX"));
Message message = messageFromString(m.toString().replaceAll("sub\\.ingotronic\\.ch\\.\\s+\\d+.*", ""));
message.addRecord(delegationNsec, Section.AUTHORITY);
message.addRecord(delegationNsecSig, Section.AUTHORITY);
add("sub.ingotronic.ch./MX", message);
Message response = resolver.send(createMessage("sub.ingotronic.ch./MX"));
assertFalse("AD flag must not be set", response.getHeader().getFlag(Flags.AD));
assertEquals(Rcode.SERVFAIL, response.getRcode());
assertEquals("failed.nodata", getReason(response));
}
@Test
public void testNameErrorWhenResultIsFromDelegationPoint() throws IOException {
Message nsec = resolver.send(createMessage("sub1.ingotronic.ch./NSEC"));
Record delegationNsec = null;
Record delegationNsecSig = null;
for (RRset set : nsec.getSectionRRsets(Section.AUTHORITY)) {
if (set.getName().toString().startsWith("sub.ingotronic.ch")) {
delegationNsec = set.first();
delegationNsecSig = (Record)set.sigs().next();
break;
}
}
Message m = createMessage("s.sub.ingotronic.ch./A");
m.getHeader().setRcode(Rcode.NXDOMAIN);
m.addRecord(delegationNsec, Section.AUTHORITY);
m.addRecord(delegationNsecSig, Section.AUTHORITY);
add("s.sub.ingotronic.ch./A", m);
Message response = resolver.send(createMessage("s.sub.ingotronic.ch./A"));
assertFalse("AD flag must not be set", response.getHeader().getFlag(Flags.AD));
assertEquals(Rcode.SERVFAIL, response.getRcode());
assertEquals("failed.nxdomain.exists:s.sub.ingotronic.ch.", getReason(response));
}
@Test
public void testNameErrorWhenNsecIsNotFromApex() throws IOException {
Message response = resolver.send(createMessage("1.www.ingotronic.ch./A"));
assertTrue("AD flag must be set", response.getHeader().getFlag(Flags.AD));
assertEquals(Rcode.NXDOMAIN, response.getRcode());
assertNull(getReason(response));
}
@Test
public void testNameErrorWhenNsecIsLastAndQnameBefore() throws IOException {
Message nsec = resolver.send(createMessage("zz.ingotronic.ch./NSEC"));
Record delegationNsec = null;
Record delegationNsecSig = null;
for (RRset set : nsec.getSectionRRsets(Section.AUTHORITY)) {
if (set.getName().toString().startsWith("z.ingotronic.ch")) {
delegationNsec = set.first();
delegationNsecSig = (Record)set.sigs().next();
break;
}
}
Message m = createMessage("y.ingotronic.ch./A");
m.getHeader().setRcode(Rcode.NXDOMAIN);
m.addRecord(delegationNsec, Section.AUTHORITY);
m.addRecord(delegationNsecSig, Section.AUTHORITY);
add("y.ingotronic.ch./A", m);
Message response = resolver.send(createMessage("y.ingotronic.ch./A"));
assertFalse("AD flag must not be set", response.getHeader().getFlag(Flags.AD));
assertEquals(Rcode.SERVFAIL, response.getRcode());
assertEquals("failed.nxdomain.exists:y.ingotronic.ch.", getReason(response));
}
@Test
public void testNameErrorWhenNsecIsLastAndQnameDifferentDomain() throws IOException {
Message nsec = resolver.send(createMessage("zz.ingotronic.ch./NSEC"));
Record delegationNsec = null;
Record delegationNsecSig = null;
for (RRset set : nsec.getSectionRRsets(Section.AUTHORITY)) {
if (set.getName().toString().startsWith("z.ingotronic.ch")) {
delegationNsec = set.first();
delegationNsecSig = (Record)set.sigs().next();
break;
}
}
Message m = createMessage("zingotronic.ch./A");
m.getHeader().setRcode(Rcode.NXDOMAIN);
m.addRecord(delegationNsec, Section.AUTHORITY);
m.addRecord(delegationNsecSig, Section.AUTHORITY);
add("zingotronic.ch./A", m);
Message response = resolver.send(createMessage("zingotronic.ch./A"));
assertFalse("AD flag must not be set", response.getHeader().getFlag(Flags.AD));
assertEquals(Rcode.SERVFAIL, response.getRcode());
assertEquals("failed.nxdomain.exists:zingotronic.ch.", getReason(response));
}
@Test
public void testNameErrorWhenNsecIsLastAndQnameIsZoneApex() throws IOException {
Message nsec = resolver.send(createMessage("zz.ingotronic.ch./NSEC"));
Record delegationNsec = null;
Record delegationNsecSig = null;
for (RRset set : nsec.getSectionRRsets(Section.AUTHORITY)) {
if (set.getName().toString().startsWith("z.ingotronic.ch")) {
delegationNsec = set.first();
delegationNsecSig = (Record)set.sigs().next();
break;
}
}
Message m = createMessage("ingotronic.ch./A");
m.getHeader().setRcode(Rcode.NXDOMAIN);
m.addRecord(delegationNsec, Section.AUTHORITY);
m.addRecord(delegationNsecSig, Section.AUTHORITY);
add("ingotronic.ch./A", m);
Message response = resolver.send(createMessage("ingotronic.ch./A"));
assertFalse("AD flag must not be set", response.getHeader().getFlag(Flags.AD));
assertEquals(Rcode.SERVFAIL, response.getRcode());
assertEquals("failed.nxdomain.exists:ingotronic.ch.", getReason(response));
}
@Test
public void testNoDataWhenDSResultIsFromChild() throws IOException {
Message m = resolver.send(createMessage("samekey.ingotronic.ch./MX"));
// this test needs to have the key in the cache
add("samekey.ingotronic.ch./DS", m, false);
Message response = resolver.send(createMessage("samekey.ingotronic.ch./DS"));
assertFalse("AD flag must not be set", response.getHeader().getFlag(Flags.AD));
assertEquals(Rcode.SERVFAIL, response.getRcode());
assertEquals("failed.nodata", getReason(response));
}
@Test
public void testNoDataOfDSForRoot() throws IOException {
Message response = resolver.send(createMessage("./DS"));
assertTrue("AD flag must be set", response.getHeader().getFlag(Flags.AD));
assertEquals(Rcode.NOERROR, response.getRcode());
assertNull(getReason(response));
}
@Test
public void testNsecProvesNoDS() throws IOException {
SecurityStatus s = ValUtils.nsecProvesNoDS(new NSECRecord(Name.root, DClass.IN, 0, Name.root, new int[] { Type.SOA, Type.NS }), Name.root);
assertEquals("Root NSEC SOA and without DS must be secure", SecurityStatus.SECURE, s);
}
@Test
public void testNsecProvesNoDSWithDSPresentForRoot() throws IOException {
SecurityStatus s = ValUtils.nsecProvesNoDS(new NSECRecord(Name.root, DClass.IN, 0, Name.root, new int[] { Type.SOA, Type.NS, Type.DS }), Name.root);
assertEquals("Root NSEC with DS must be bogus", SecurityStatus.BOGUS, s);
}
@Test
public void testNsecProvesNoDSWithSOAForNonRoot() throws IOException {
Name ch = Name.fromString("ch.");
SecurityStatus s = ValUtils.nsecProvesNoDS(new NSECRecord(ch, DClass.IN, 0, ch, new int[] { Type.SOA, Type.NS }), ch);
assertEquals("Non-root NSEC with SOA must be bogus", SecurityStatus.BOGUS, s);
}
@Test
public void testNoDataOnEntWithWrongNsec() throws IOException {
Message nsec = resolver.send(createMessage("alias.ingotronic.ch./NSEC"));
Record delegationNsec = null;
Record delegationNsecSig = null;
for (RRset set : nsec.getSectionRRsets(Section.ANSWER)) {
if (set.getName().toString().startsWith("alias.ingotronic.ch")) {
delegationNsec = set.first();
delegationNsecSig = (Record)set.sigs().next();
break;
}
}
Message m = createMessage("ingotronic.ch./A");
m.getHeader().setRcode(Rcode.NOERROR);
m.addRecord(delegationNsec, Section.AUTHORITY);
m.addRecord(delegationNsecSig, Section.AUTHORITY);
add("ingotronic.ch./A", m);
Message response = resolver.send(createMessage("ingotronic.ch./A"));
assertFalse("AD flag must not be set", response.getHeader().getFlag(Flags.AD));
assertEquals(Rcode.SERVFAIL, response.getRcode());
assertEquals("failed.nodata", getReason(response));
}
@Test
public void testNoDataWhenNsecProvesExistence() throws IOException {
Message nsec = resolver.send(createMessage("www.ingotronic.ch./NSEC"));
Record delegationNsec = null;
Record delegationNsecSig = null;
for (RRset set : nsec.getSectionRRsets(Section.ANSWER)) {
if (set.getName().toString().startsWith("www.ingotronic.ch")) {
delegationNsec = set.first();
delegationNsecSig = (Record)set.sigs().next();
break;
}
}
Message m = createMessage("www.ingotronic.ch./AAAA");
m.getHeader().setRcode(Rcode.NOERROR);
m.addRecord(delegationNsec, Section.AUTHORITY);
m.addRecord(delegationNsecSig, Section.AUTHORITY);
add("www.ingotronic.ch./AAAA", m);
Message response = resolver.send(createMessage("www.ingotronic.ch./AAAA"));
assertFalse("AD flag must not be set", response.getHeader().getFlag(Flags.AD));
assertEquals(Rcode.SERVFAIL, response.getRcode());
assertEquals("failed.nodata", getReason(response));
}
@Test
public void testNoDataWhenNsecHasCname() throws IOException {
Message nsec = resolver.send(createMessage("csigned.ingotronic.ch./NSEC"));
Record delegationNsec = null;
Record delegationNsecSig = null;
for (RRset set : nsec.getSectionRRsets(Section.ANSWER)) {
if (set.getName().toString().startsWith("csigned.ingotronic.ch")) {
delegationNsec = set.first();
delegationNsecSig = (Record)set.sigs().next();
break;
}
}
Message m = createMessage("csigned.ingotronic.ch./A");
m.getHeader().setRcode(Rcode.NOERROR);
m.addRecord(delegationNsec, Section.AUTHORITY);
m.addRecord(delegationNsecSig, Section.AUTHORITY);
add("csigned.ingotronic.ch./A", m);
Message response = resolver.send(createMessage("csigned.ingotronic.ch./A"));
assertFalse("AD flag must not be set", response.getHeader().getFlag(Flags.AD));
assertEquals(Rcode.SERVFAIL, response.getRcode());
assertEquals("failed.nodata", getReason(response));
}
@Test
public void testNoDataWhenWcNsecProvesType() throws IOException {
Message nsec = resolver.send(createMessage("*.c.ingotronic.ch./NSEC"));
Record delegationNsec = null;
Record delegationNsecSig = null;
for (RRset set : nsec.getSectionRRsets(Section.ANSWER)) {
if (set.getName().toString().startsWith("*.c.ingotronic.ch")) {
delegationNsec = set.first();
delegationNsecSig = (Record)set.sigs().next();
break;
}
}
Message m = createMessage("a.c.ingotronic.ch./A");
m.getHeader().setRcode(Rcode.NOERROR);
m.addRecord(delegationNsec, Section.AUTHORITY);
m.addRecord(delegationNsecSig, Section.AUTHORITY);
add("a.c.ingotronic.ch./A", m);
Message response = resolver.send(createMessage("a.c.ingotronic.ch./A"));
assertFalse("AD flag must not be set", response.getHeader().getFlag(Flags.AD));
assertEquals(Rcode.SERVFAIL, response.getRcode());
assertEquals("failed.nodata", getReason(response));
}
@Test
public void testNoDataWhenWcNsecProvesCname() throws IOException {
Message nsec = resolver.send(createMessage("*.cwv.ingotronic.ch./NSEC"));
Record delegationNsec = null;
Record delegationNsecSig = null;
for (RRset set : nsec.getSectionRRsets(Section.ANSWER)) {
if (set.getName().toString().startsWith("*.cwv.ingotronic.ch")) {
delegationNsec = set.first();
delegationNsecSig = (Record)set.sigs().next();
break;
}
}
Message m = createMessage("a.cwv.ingotronic.ch./A");
m.getHeader().setRcode(Rcode.NOERROR);
m.addRecord(delegationNsec, Section.AUTHORITY);
m.addRecord(delegationNsecSig, Section.AUTHORITY);
add("a.cwv.ingotronic.ch./A", m);
Message response = resolver.send(createMessage("a.cwv.ingotronic.ch./A"));
assertFalse("AD flag must not be set", response.getHeader().getFlag(Flags.AD));
assertEquals(Rcode.SERVFAIL, response.getRcode());
assertEquals("failed.nodata", getReason(response));
}
@Test
public void testNoDataWhenWcNsecIsForDifferentName() throws IOException {
Message nsec = resolver.send(createMessage("*.c.ingotronic.ch./NSEC"));
Record delegationNsec = null;
Record delegationNsecSig = null;
for (RRset set : nsec.getSectionRRsets(Section.ANSWER)) {
if (set.getName().toString().startsWith("*.c.ingotronic.ch")) {
delegationNsec = set.first();
delegationNsecSig = (Record)set.sigs().next();
break;
}
}
Message m = createMessage("b.d.ingotronic.ch./A");
m.getHeader().setRcode(Rcode.NOERROR);
m.addRecord(delegationNsec, Section.AUTHORITY);
m.addRecord(delegationNsecSig, Section.AUTHORITY);
add("b.d.ingotronic.ch./A", m);
Message response = resolver.send(createMessage("b.d.ingotronic.ch./A"));
assertFalse("AD flag must not be set", response.getHeader().getFlag(Flags.AD));
assertEquals(Rcode.SERVFAIL, response.getRcode());
assertEquals("failed.nodata", getReason(response));
}
@Test
public void testDsNoDataWhenNsecProvesDs() throws IOException {
Message nsec = resolver.send(createMessage("sub1.ingotronic.ch./NSEC"));
Record delegationNsec = null;
Record delegationNsecSig = null;
for (RRset set : nsec.getSectionRRsets(Section.AUTHORITY)) {
if (set.getName().toString().startsWith("sub.ingotronic.ch")) {
delegationNsec = set.first();
delegationNsecSig = (Record)set.sigs().next();
break;
}
}
Message m = createMessage("sub.ingotronic.ch./DS");
m.getHeader().setRcode(Rcode.NOERROR);
m.addRecord(delegationNsec, Section.AUTHORITY);
m.addRecord(delegationNsecSig, Section.AUTHORITY);
add("sub.ingotronic.ch./DS", m);
Message response = resolver.send(createMessage("sub.ingotronic.ch./A"));
assertFalse("AD flag must not be set", response.getHeader().getFlag(Flags.AD));
assertEquals(Rcode.SERVFAIL, response.getRcode());
assertEquals("validate.bogus.badkey:sub.ingotronic.ch.:failed.ds.nsec.hasdata", getReason(response));
}
@Test
public void testHasSignedNsecsWithoutSignedSigsReturnsFalse() {
Message m = new Message();
m.addRecord(new NSECRecord(Name.root, DClass.IN, 0, Name.root, new int[] { Type.A }), Section.AUTHORITY);
SMessage sm = new SMessage(m);
boolean result = new ValUtils().hasSignedNsecs(sm);
assertFalse(result);
}
@Test
public void testAtLeastOneSupportedAlgorithmWithOnlyNonDSRecords() {
RRset set = new RRset(new NSECRecord(Name.root, DClass.IN, 0, Name.root, new int[] { Type.A }));
boolean result = ValUtils.atLeastOneSupportedAlgorithm(set);
assertFalse(result);
}
@Test
public void testAtLeastOneDigestSupportedWithOnlyNonDSRecords() {
RRset set = new RRset(new NSECRecord(Name.root, DClass.IN, 0, Name.root, new int[] { Type.A }));
boolean result = ValUtils.atLeastOneDigestSupported(set);
assertFalse(result);
}
}
dnssecjava-1.1.3/src/test/resources/ 0000775 0000000 0000000 00000000000 13020541473 0017414 5 ustar 00root root 0000000 0000000 dnssecjava-1.1.3/src/test/resources/jmockit.properties 0000664 0000000 0000000 00000000075 13020541473 0023174 0 ustar 00root root 0000000 0000000 mocks=org.jitsi.dnssec.SystemMock, org.jitsi.dnssec.DateMock
dnssecjava-1.1.3/src/test/resources/keys/ 0000775 0000000 0000000 00000000000 13020541473 0020367 5 ustar 00root root 0000000 0000000 dnssecjava-1.1.3/src/test/resources/keys/Knsec3.ingotronic.ch.+007+16758.private 0000664 0000000 0000000 00000003363 13020541473 0026727 0 ustar 00root root 0000000 0000000 Private-key-format: v1.3
Algorithm: 7 (NSEC3RSASHA1)
Modulus: oG4lN/2gbJ5MfduJSQAUuuxiuSh1fUftKey6LhewMcUIG+zldhpwduzQmDT87nUo+OY2ePAxbxJLIOQqphD725gB/YRD+mcP9UZCqdXZzDRXCT+3QTZXgVQKO7imcCjLNkVlcazV5Ztf0le775vQDOn4AKrrjzmokvMeFYOIis+gr9K91sVVEriz6c88ksfc0YFu13PqQ+rtoVZgEygZ4Bl03XCxClw1ZSjl46Zoljnecxzv6sOkDJiUx78UrBJl1fZkN3rdCxroibgVVQmr+dYuru2VD+ZaSzXm4NNDInL85Z8DQgII7g30V6X2tOEk2klYTM4JuW9nIGjLjTmRmQ==
PublicExponent: AQAB
PrivateExponent: jxbOoWrYrChghxzJDNBCrRnrT8QzTmNZt7wJrtS39RwMiIO5gaZBSwEbZ7ZTJghfW+hRC3sITE3frl1zYJzjVk/07n4K94r248gf60TutkC0pG4s78AdOh+P5QZjhMQNw8EPot0KBnmXdI+F80dgwDPqXAYWha9imHa5DW082ri9dVB3Li1Z3BVMSZCH4urQq8XZRWqXw3CPSuWhKhWq+8vkE/jm+4QRIGumd4wkwdktPghl9mdm9N8uLqLd8qpJzGI40RFeSYzSpBWaMClxzaaS5gOm2ageB2KVMDq2wdCCBKVRyQpI4dHKvuRk5a+Z8m3Boi41mrK79pujbLqvgQ==
Prime1: 0+sT4VN8sT3/N4xtgukMQU5TBTyU+l3HNSw/rFM5sainiIb4bKzJwlZ/WWAuVfyOE/EFtonu60isJe0ZQqd7jSATQ8W4fKDfeaaLHfkaQVMg247qRrXscYaIs9zOgDVqUu9kLQXoiJl5YwD1eq9in7KdD7z0EM/R0ECehqK6iqk=
Prime2: wc1DoXpBTdKeBi/E5iYeaapwCTsiOEw8LEYHxZkJckUj+dGY+5aM3xUAI2BWcwD34bA7MrWBGKjZLhyItgnuahIHfVRrbDkCbpcKMywTos0tS/UcyX7PBXYMEl7/BjPrsZTmmjThukNbWs4uclnaBSO3ExDHRtxhBWnYXw9+lXE=
Exponent1: b08fXxASA6rTveKVttgf5sF0G+EJQ0Q0mTpHq4T/XdB/RtfV7ocHZns2YsSBMgr4uYK0hH+Ira67NSSHSxpba/H4DHXzBAsftm8CzViFMOCv9oLnjQKLUcnfTdHh6TelRDCXhop+7BjoyFa9mZY7kDQqCRUvgREXXHJEkeUxZBk=
Exponent2: piubHpzV26WIq2NQH8p1b0Kdd7zFVaJAQfH1/f5/NASGmVCXLLlkpm66RJr45PjikhfqWkt4mq1EMp5ytiuDyl0VIOg+h3fGVw6Yx1G2sHPer+9GNJrPZS5XoXTkk+v23rf+liBbn7rbXNvGxXO3VYrPEcDkLSUO53Ze+PsvHXE=
Coefficient: hEg3DZhCgtU4qj6r7CfDrg+p04iKb95MPCe+G3WiBTkRKmbe1KjBmOfg2+ibrs3qxSenx6BXzRpO+kfapEfoPHYMr8j6VWKd6WOnsWRQze7mvu0F0IGSWJWQATaPLP+kM2peC5bXQTGqyR+Igp1TfcQlrwR3taB9WP/xbx91Gh4=
Created: 20130326204908
Publish: 20130326204908
Activate: 20130326204908
dnssecjava-1.1.3/src/test/resources/keys/Knsec3.ingotronic.ch.+007+62417.private 0000664 0000000 0000000 00000001767 13020541473 0026726 0 ustar 00root root 0000000 0000000 Private-key-format: v1.3
Algorithm: 7 (NSEC3RSASHA1)
Modulus: xwBbGRNUZnpQCnRUSjMCVikBGFuHpjq1g6XoWDdR4E0UW0ND19MQS3U2RudH27wqSlU3prrtq+ViJQ3V6AOoTDMNTtHVHD79RJ2GbaGo4BGaa7cMGCONf+JeNkvK/fXRw4YUln+yZyh2UMvikMACg/GH+qzooQFpPSxzUpZwarc=
PublicExponent: AQAB
PrivateExponent: VHcxM4aB13FpEdbohAn8nueOoHERNZxLuRIteWwZo5Pz5Py7Cht7GhwpKpU2ae0HIj/jfDBxevnE26dwuKb8woN1uCpUC3NhXr3yMWl+4oF080JHUcygWKclxfdJOjSUe2wHdQeSIoFq0V4lReXouyDFC5+q5OkSEmU3RW17hFE=
Prime1: 5J6mAhSOzhlsKDPFiF0o1ch7YqhkQqr3JtKL4rEPNDon0QpJ7zhj5Dy5sg3vR5PmQ8mWc47EUznb2IsJOrV82Q==
Prime2: 3tWgR6f7hf6BadHZG5Dw1QcK8VBUYR5Eq/0SwPE0bxcUO/dzZpn3AyEOl9KynSyFBOwUr2JOGTwOwXjjMFaqDw==
Exponent1: XBjxJUtkz+/72yIoBCwLRDv0QKU3Zof68n/E7HiJeG+pFJQBfsYHr60q3WixqPMSwuIVos2zlxdq0gwIlsb/2Q==
Exponent2: Uk6X4D/U8N5b0MlZJwx3WEg8q3ufXyv984ULu0actnfQ2oGBF6HBEl/QcxW5McLy8yl8TnfCHyIG1UGgsQch0w==
Coefficient: YksGgB9xHXtFsUcA+UhxA4i6NDqfMu7jGzzcbKTVhG85hHtvnxXCP4wPzFF2Z0ew0m0V4OiOR4zk2iuKUjIHMQ==
Created: 20130326204904
Publish: 20130326204904
Activate: 20130326204904
dnssecjava-1.1.3/src/test/resources/messages.properties 0000664 0000000 0000000 00000000071 13020541473 0023337 0 ustar 00root root 0000000 0000000 test.noparam=no parameters
test.withparam=parameter: {0}
dnssecjava-1.1.3/src/test/resources/org/ 0000775 0000000 0000000 00000000000 13020541473 0020203 5 ustar 00root root 0000000 0000000 dnssecjava-1.1.3/src/test/resources/org/jitsi/ 0000775 0000000 0000000 00000000000 13020541473 0021325 5 ustar 00root root 0000000 0000000 dnssecjava-1.1.3/src/test/resources/org/jitsi/dnssec/ 0000775 0000000 0000000 00000000000 13020541473 0022604 5 ustar 00root root 0000000 0000000 dnssecjava-1.1.3/src/test/resources/org/jitsi/dnssec/logging.properties 0000664 0000000 0000000 00000000211 13020541473 0026342 0 ustar 00root root 0000000 0000000 # java.util.logging configuration
handlers = java.util.logging.ConsoleHandler
java.util.logging.ConsoleHandler.level = ALL
.level = ALL
dnssecjava-1.1.3/src/test/resources/recordings/ 0000775 0000000 0000000 00000000000 13020541473 0021553 5 ustar 00root root 0000000 0000000 dnssecjava-1.1.3/src/test/resources/recordings/org_jitsi_dnssec_TestAlgorithmSupport/ 0000775 0000000 0000000 00000000000 13020541473 0031346 5 ustar 00root root 0000000 0000000 testDigestIdIsUnknown 0000664 0000000 0000000 00000024044 13020541473 0035466 0 ustar 00root root 0000000 0000000 dnssecjava-1.1.3/src/test/resources/recordings/org_jitsi_dnssec_TestAlgorithmSupport #Date: 2015-01-06T22:35:01+01:00
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 30764
;; flags: qr aa rd ra cd ; qd: 1 an: 2 au: 2 ad: 3
;; QUESTIONS:
;; unknown-alg.ingotronic.ch., type = A, class = IN
;; ANSWERS:
unknown-alg.ingotronic.ch. 300 IN A 127.0.0.1
unknown-alg.ingotronic.ch. 300 IN RRSIG A 5 3 300 20150125010525 20141226010202 45093 unknown-alg.ingotronic.ch. MfedDEmkPC40ZTJzk7UMmnTqSUBwm/36FsPEnJ+xYSkserwjRJRcvWg3YobqlS/i9ZxKqZzvuXIumImOV1CXvf5ZzfDq2ioqUmtR0Nmvzg93lAahTMjgZd5UK5HSHADwsQq5IjreVyTE5lWc+7S22NgJhAcLZuG9sw+gCBxQK0o=
;; AUTHORITY RECORDS:
unknown-alg.ingotronic.ch. 300 IN NS ns1.ingotronic.ch.
unknown-alg.ingotronic.ch. 300 IN RRSIG NS 5 3 300 20150125000404 20141225232910 45093 unknown-alg.ingotronic.ch. lAhLOlkWySteesEUHzS5wFe4QTyQI1UfvT5sHvGK/1VSLKPkGUGBGYtDVptRxJKoYSU9/nwt4HvtLfwx8X8YxqEkFTxOcHAUpWrGlSTI4fgr/TH7TTr8EWaWK450U5hfZMWMcFIoW6PAi9kl9DjhGJ9fMT/y8G0iKK6i6xTVAf0=
;; ADDITIONAL RECORDS:
ns1.ingotronic.ch. 300 IN A 62.192.5.131
ns1.ingotronic.ch. 300 IN RRSIG A 5 3 300 20150125005754 20141226001054 17430 ingotronic.ch. fNG1RZM53pXwBxruHNaSZszxVzNLoCq8VZsTjAzYH2vSLzHXYVGJFTLIeY0K9APAdyJU8WuwmABmn7XY0Kg39kRG77uoFlqUws2PdTz2QKOwJGZY7W88Ak2Y9lkDBcK8o3wJHVptrT8R7p/1U7UfjF0kqPUkakk2B0EbFWdagFg=
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 647 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 1445
;; flags: qr rd ra ad cd ; qd: 1 an: 4 au: 0 ad: 1
;; QUESTIONS:
;; ., type = DNSKEY, class = IN
;; ANSWERS:
. 87373 IN DNSKEY 256 3 8 AwEAAaPD7Y7XIi1MOEREJNTrRhyqsY3gff6JWzg+XCbqut1sbcbvqyssHw8DT1AkRaAC92pO8xuyq5QEgEPL1IHfABLwpwXI5gTj4gdwi86bpkmlWs9fRpnn4DPDCTdrnxIejJXgClHikLJF3u3CdpNCMijq4CKdQbMlRZ3avv+G7rh7
. 87373 IN DNSKEY 257 3 8 AwEAAagAIKlVZrpC6Ia7gEzahOR+9W29euxhJhVVLOyQbSEW0O8gcCjFFVQUTf6v58fLjwBd0YI0EzrAcQqBGCzh/RStIoO8g0NfnfL2MTJRkxoXbfDaUeVPQuYEhg37NZWAJQ9VnMVDxP/VHL496M/QZxkjf5/Efucp2gaDX6RS6CXpoY68LsvPVjR0ZSwzz1apAzvN9dlzEheX7ICJBBtuA6G3LQpzW5hOA2hzCTMjJPJ8LbqF6dsV6DoBQzgul0sGIcGOYl7OyQdXfZ57relSQageu+ipAdTTJ25AsRTAoub8ONGcLmqrAmRLKBP1dfwhYB4N7knNnulqQxA+Uk1ihz0=
. 87373 IN DNSKEY 256 3 8 AwEAAe3fSrbLBy3LOS7pnxEUhvPZTE2H5dIGsI/UfruI/nOEvWWa/PSX2BFedBkEqOlYdjdNF2f+6lmfk2Od/xu0v5bVqxFE+/24v3hZSlWBxvXzPTAGHrbW/IJYEPqlzVOAS4XdUgHg0N7IbLywNHMvB+Yf+Nm6ctyXXFLV4WTNnzs7
. 87373 IN RRSIG DNSKEY 8 0 172800 20150115235959 20150101000000 19036 . i8cAxD2pvQi1oAyvQxRpDfFlbqPzW+69QQEsDwE1eWOm5AtawO9U7lmsGps7sy/fVNvl1ljKBj4Djp9pb3U2FLogjiIlW0cDAkPmLlG9t+b/pjEfBNlhjANUVN06pvQVAfm+LcF26EaWT6FlISBqb6jSy4BHRa3Bdc4Sx7+pRSYSqVVvYxLkfAWsKPqGkvWhebJDndJJV9syXQXgZ+v/uJ+6XOS43xkAdeL8iBzIs/FlwMTfh3tVe3d0lb65IBBLlCzeQuetX+0Vu1YFcnD0mHc/wS2ZnAV5toAFmyVQBoY/XAZiZeaOkcROJ6Zmqezy7liwK7BqsYyAZntMhk8lbg==
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 883 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 23102
;; flags: qr rd ra ad cd ; qd: 1 an: 2 au: 0 ad: 1
;; QUESTIONS:
;; ch., type = DS, class = IN
;; ANSWERS:
ch. 973 IN DS 46375 8 2 8F96646FC68BB7E4AF4C0750A6096FBC0D4ECDA3D3FA6DA06FDDB42EE50C6CF3
ch. 973 IN RRSIG DS 8 1 86400 20150112170000 20150105160000 16665 . thY7xYWBBxiBjqbQIb9fAG4TmQgnziwM7q6P1T3/ITxmECdvOCQnnZA3uD7qmN8uM0HudsD7+y+zgD3rsH4RSTKdL4kHSI0OnCxToMTvklghEgFDezqIRm8NkWdI2H4Stwrj20nYKSpLQxPI2EE54gs18P3KyO8bAUYv8Qx73xU=
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 238 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 15112
;; flags: qr rd ra ad cd ; qd: 1 an: 4 au: 0 ad: 1
;; QUESTIONS:
;; ch., type = DNSKEY, class = IN
;; ANSWERS:
ch. 974 IN DNSKEY 256 3 8 AwEAAcSLdT0fEmcFmLpeUkAJoeVaHKiu+nbuc43fWlqaCRVf8t2HA4uWxOk0O5ci9nrFTc8nq8oa5fk5Cj7CHh4yrX9qUCfTdIWTyp8BDEdJpS+Dyb0u9wQuVj+nQMj4fLzdQf4TJs3/qxuiLr3nL1UUwlhhXeqSqGVb7p3mtB5HJ8ad
ch. 974 IN DNSKEY 256 3 8 AwEAAcsg0kY6fw1wzYMhSAKTy+Y2JzAst66P/1odp9NECJJHbU8f4nwziI3onoFSBV0ZiSZhY1aH5dhdDZ7BkrqhVXSrZPAz0CvzjIxmB1gSOf9DeZvjQvoy97HqYolxsf+B3QQv2RKBT67elF5+JisKg3/dQISelKn8LhabSoVrMlD1
ch. 974 IN DNSKEY 257 3 8 AwEAAb7GhhZ8IAy/AhwmSms5DeQK5ad09wIIplEpYoiAIYXPtJvT1ReFzyfTp/2YP+g/PWDwHPh4qKAHa9x0VgbIQcGAeNakmfkAdWEmCnca323/SAml3mwfaX62G7/uYWae5zh8QTxZKNd+K1yZ5x0IxnI31chSl5xymRbTEHYZDKwSIRFM3fTxUMt93WFaBVWELReYotJBr++rvAWdnlay5TPBTvheLBkaiqtgM4GP8HK07Y+86lsZnEsj5K3G1KTV5SPpa82rqYAwxG9VKbmSE/6/kBR5jJHjt1rRt5Oe7v18aEtw0YCEN4vxq+KuvMoNVqXUsE9LBwHJD+QNwi6wmB0=
ch. 974 IN RRSIG DNSKEY 8 1 86400 20150127100909 20141212090909 46375 ch. bT8q0FWyeMH0SulNo6UdIIgZYNATwYsee2bikq2Gh339Bufma8eaqWIPYT3XKmxYPBFOw0bVl+kLZxTwbR1CFoCDXoP+qgQhh4mf9qkNiv2CDSc+0FE3FRREn+DAhYTUEuB58FPiPakFB8s8O7T+k2qhDae7jy4/y7Jl1lnjaBY8s7bzOUPhF0KKCNZmvoKwtL23ZdVeTSV1xM3jkiNnpzBKbcoSWECSGJVp1SE0BnRXdwQP41YTXFZ0310YjaTAUCC5qbMIWdEkHjfdSQtKBImnc85mkapq9w++XQ4zhauPWBtrPV3CcoCahjUaWdjrKVkibomlJZaN8MEO23CfQw==
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 893 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 58003
;; flags: qr rd ra cd ; qd: 1 an: 3 au: 0 ad: 1
;; QUESTIONS:
;; ingotronic.ch., type = DS, class = IN
;; ANSWERS:
ingotronic.ch. 3581 IN DS 6031 5 1 733D0218B571CD617B1A7493564B9FC4F12ADE82
ingotronic.ch. 3581 IN DS 6031 5 2 4A948F2FDADA24686E473EDAC00DCF972584C75E3FAA92C2021B6221449FF87E
ingotronic.ch. 3581 IN RRSIG DS 8 2 3600 20150129033614 20150105123019 60789 ch. rVPJP2HhzW7OkroK2axFj5Lb4iVWCH8Fp/Iq1rF952NDo72b8RiKje2RaAKJAGQ+wd0YgE+PAej04GCmkhlDJA/zvPeeTxuhy3HbJzReMlQ7fjyH+wW1hli+FuIYvogXWf7nO/9VyPORt8X/f/pjrOr3Vlj9sGLN8TGYpEuVSw4=
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 288 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 8761
;; flags: qr aa rd ra cd ; qd: 1 an: 4 au: 0 ad: 1
;; QUESTIONS:
;; ingotronic.ch., type = DNSKEY, class = IN
;; ANSWERS:
ingotronic.ch. 300 IN DNSKEY 256 3 5 AwEAAZ2Xh77GFzpEDx7EHYxShqltHgkiG+BOjBGifEmnJhQSdE5/yNSLFNcdhZZ8HUPxYnaedTqJcFFg4AzUsQklF/fECegTJdZjaj2WoL0/I8K7HMfY/hVuRZUWPNglYi8agJRX6gdkFTCpUNI7stpgKqxtzUJhhw15uG/lKMplwqUr
ingotronic.ch. 300 IN DNSKEY 257 3 5 AwEAAeA1vzmjaB+eBAcvhzpKEgAEFpvQ1rg4uKDW6MsQtacKoqBpgyep2+LuWotz5p/xYxj3NGsArwN8Ad5cY0FHRr8miTT0elOv6nvlqGIfRuhj/BXAQ1x4ihpSFslHw0lJMYFwxsUZWpUyjWX/nv1xRZMMwF46gui0N4OEbyTYusCk77D+A71k+K0EAitFIbIH4GCUKmH1H7HmXhSVH9bN/n7KEGwW32lmsuuUcJoRKDkcUvbMXY/9Xoa2quERrUg/rBbDUHowRPjYDS5GzY1+f4YY8s40BufGiqyUTKKXL953MVFK8gmezXA0hbmrnZ7CBOw/7238mORAdzExaX8n7CE=
ingotronic.ch. 300 IN RRSIG DNSKEY 5 2 300 20150125003700 20141226001657 6031 ingotronic.ch. rs1QlP2SlSpA2ELbzwg3DgWLzXWL3Lpv6CUJE2Q0qH2Zp7Qdy3cD+ZEtNh9v24Qv1M6JJ3zFt8mmZoCeW2ycuMbJCqBkW9CBuwF+VznZvZY2MxwPipvhvEEGP//0M8YAZJ66yQPDv3PTdAP8FYbIrJyvY44vwyncwbslpfHT9jAsrbfr3vuMuWps86dnP462q+0s1TxBfqi8mzo3gdavjHKWVNwohLahLKT+tWeu6DSzQv0YwMjwtkLgF7QRgx3ctIIkloOrnx9nHH1N6y+hxEB89fOlyVDjHhgL5uVtsD5fEdT0FJ2Gc/2nShEMMqIwr1/J9kUq1mNySff/uEe65Q==
ingotronic.ch. 300 IN RRSIG DNSKEY 5 2 300 20150125003700 20141226001657 17430 ingotronic.ch. mEwZjhQqeWksWD0TCnNBrtce4YkWJL3edqL6PvAUu8Fn+Ih437kEs3+pqdkgRsdYQ9HW+lBm/8pWwJlNAv0bi9NykItXMwAUFtncgq+6Pnh3iAM972GXSa5VV4LcGQ5b8CBdHCHiEKDqyPv5Hr5QfYL/FQaWlcNRh4QZZlZNPFA=
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 940 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 27464
;; flags: qr aa rd ra cd ; qd: 1 an: 2 au: 0 ad: 1
;; QUESTIONS:
;; unknown-alg.ingotronic.ch., type = DS, class = IN
;; ANSWERS:
unknown-alg.ingotronic.ch. 300 IN DS 57133 5 123 88911F5CF5E92199654F89E46D36A5A394D248FE
unknown-alg.ingotronic.ch. 300 IN RRSIG DS 5 3 300 20150125004144 20141226003211 17430 ingotronic.ch. CyQezuOmPS6VRuWmsFsLYTwDwwG0SQmo1VgtvsUbaYFaRT+iQNOyibvTfM7vVtUqFSim/zhfabcIvdzUqC3mJ84L2Ac7BfAVhdIr5k+uLE+Sabe1Ch/RWp5jREyLap+gN8UsjlP98VXN9wfaSd6wLDP5K088o0z/zDmBeLpwZl8=
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 263 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 43836
;; flags: qr aa rd ra cd ; qd: 1 an: 4 au: 0 ad: 1
;; QUESTIONS:
;; unknown-alg.ingotronic.ch., type = DNSKEY, class = IN
;; ANSWERS:
unknown-alg.ingotronic.ch. 300 IN DNSKEY 256 3 5 AwEAAb9q2O44+pGOH5jdPSJEryG9ngMwwQ2093jn4EkJYcci/I6uhFsORcif6bMtxTIOUt8mUCowNcENj8oJ8l/eS8Ndaj6jTywYwG94OEEdTRy0XqbGV/x0n24U3pQe76A4jBJYgLk6hOISGcGcvKpkOSzc1ZjUsnJCWGTXVZA9oBsJ
unknown-alg.ingotronic.ch. 300 IN DNSKEY 257 3 5 AwEAAc7dNVEcGlIIucOGhtuBhYPOf/cZPFOokelc/hrubwt8uvMgs4wn76kc9esnjh5Z2DcyJCJwQuy3FLb3L00n8RaM37FSaH7azMnWqhULBS+hszS4XoJXu97B1D/KulTJaVsejBoAUnHToJ0aB90Kx+rk6EIxTjh0O/xOypKOoG1irRRf4Yh4SYMhZomaazZPRQYkRj6Va7VIPLif31qIPJl+L6q1njcJHcibS7H/cF2nvD4DD4CnRgGZXvKr5mxizz3YpJCHwo0nkqjBASdyfSSi6BKh4C8AR6yo9rIJpxYMA3ee7xRVC7p9/TOp2kO0XEJnlMP1/mMoV0TxcaCc2N8=
unknown-alg.ingotronic.ch. 300 IN RRSIG DNSKEY 5 3 300 20150125005501 20141226002719 45093 unknown-alg.ingotronic.ch. nX6941AOHtN+glWVvCZae2LD4Hhm2/oOZAak9jksXYcH+W57Y0lab+AtQRWHV9LeuqjerO/iNx6Q8Zmiyk4TBgYJj+9y4klAEijAlhDCu2yAoU1zQwwbW4oiPex7m/krJIwV3J+DKJgiYbDprswMjzW+7YR4zKlSBp3aJ90WCfo=
unknown-alg.ingotronic.ch. 300 IN RRSIG DNSKEY 5 3 300 20150125005501 20141226002719 57133 unknown-alg.ingotronic.ch. xm1WcmGCfR0V4h/6dyIAkicrySw8QktabT5ltsW4kq3ylI8ubo3ebe39hHdni2wV+wm+eFRG71XCeO/CV+neaJ8oLnNScKTDz35rAw1g+CTVLAS6MK7Y/bxLBOhvLLfJwir0KNmNleNGtSGByQ9AD8CzWhrmUIsszMQq3vpY2/zLqF5O++y9mYoLBNWw0g+DaPeu5TdmWQlL4B5z+I1nYi80LccBIxTkhq9Mu2lEhTLgIzj9GVYnzgJSTuSGnStEkSdCN/AJ1rNPWziOXIKilFF06z18bohAVbLzA44BR5khNmzT2HV4CK3KVIome9PJuSAwEM0N0jyUhgONxXRigQ==
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 976 bytes
###############################################
testEccgostAlgIsUnknown 0000664 0000000 0000000 00000020327 13020541473 0036005 0 ustar 00root root 0000000 0000000 dnssecjava-1.1.3/src/test/resources/recordings/org_jitsi_dnssec_TestAlgorithmSupport #Date: 2015-01-06T22:35:00+01:00
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 50990
;; flags: qr aa rd ra cd ; qd: 1 an: 2 au: 2 ad: 3
;; QUESTIONS:
;; eccgost.ingotronic.ch., type = A, class = IN
;; ANSWERS:
eccgost.ingotronic.ch. 300 IN A 127.0.0.1
eccgost.ingotronic.ch. 300 IN RRSIG A 12 3 300 20150125012943 20141226003214 33696 eccgost.ingotronic.ch. JUSb1od8YDPsNsSyXQCbXN4VGkjuHRxvlGAv3K4FA6mz4x4SQRlsD5GEYIpVMqeJft84sp3wB806CD11Z096tg==
;; AUTHORITY RECORDS:
eccgost.ingotronic.ch. 300 IN NS ns1.ingotronic.ch.
eccgost.ingotronic.ch. 300 IN RRSIG NS 12 3 300 20150125002026 20141226001257 33696 eccgost.ingotronic.ch. Wb6NEY7OcsBWbCLqis1YAuetf8+/WpJ/VqxndICaKU/1uLU6EznMuIUwUQ/vAXPJCagGvtGuMIU72AUiBExAPA==
;; ADDITIONAL RECORDS:
ns1.ingotronic.ch. 300 IN A 62.192.5.131
ns1.ingotronic.ch. 300 IN RRSIG A 5 3 300 20150125005754 20141226001054 17430 ingotronic.ch. fNG1RZM53pXwBxruHNaSZszxVzNLoCq8VZsTjAzYH2vSLzHXYVGJFTLIeY0K9APAdyJU8WuwmABmn7XY0Kg39kRG77uoFlqUws2PdTz2QKOwJGZY7W88Ak2Y9lkDBcK8o3wJHVptrT8R7p/1U7UfjF0kqPUkakk2B0EbFWdagFg=
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 507 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 6159
;; flags: qr rd ra ad cd ; qd: 1 an: 4 au: 0 ad: 1
;; QUESTIONS:
;; ., type = DNSKEY, class = IN
;; ANSWERS:
. 87373 IN DNSKEY 256 3 8 AwEAAe3fSrbLBy3LOS7pnxEUhvPZTE2H5dIGsI/UfruI/nOEvWWa/PSX2BFedBkEqOlYdjdNF2f+6lmfk2Od/xu0v5bVqxFE+/24v3hZSlWBxvXzPTAGHrbW/IJYEPqlzVOAS4XdUgHg0N7IbLywNHMvB+Yf+Nm6ctyXXFLV4WTNnzs7
. 87373 IN DNSKEY 256 3 8 AwEAAaPD7Y7XIi1MOEREJNTrRhyqsY3gff6JWzg+XCbqut1sbcbvqyssHw8DT1AkRaAC92pO8xuyq5QEgEPL1IHfABLwpwXI5gTj4gdwi86bpkmlWs9fRpnn4DPDCTdrnxIejJXgClHikLJF3u3CdpNCMijq4CKdQbMlRZ3avv+G7rh7
. 87373 IN DNSKEY 257 3 8 AwEAAagAIKlVZrpC6Ia7gEzahOR+9W29euxhJhVVLOyQbSEW0O8gcCjFFVQUTf6v58fLjwBd0YI0EzrAcQqBGCzh/RStIoO8g0NfnfL2MTJRkxoXbfDaUeVPQuYEhg37NZWAJQ9VnMVDxP/VHL496M/QZxkjf5/Efucp2gaDX6RS6CXpoY68LsvPVjR0ZSwzz1apAzvN9dlzEheX7ICJBBtuA6G3LQpzW5hOA2hzCTMjJPJ8LbqF6dsV6DoBQzgul0sGIcGOYl7OyQdXfZ57relSQageu+ipAdTTJ25AsRTAoub8ONGcLmqrAmRLKBP1dfwhYB4N7knNnulqQxA+Uk1ihz0=
. 87373 IN RRSIG DNSKEY 8 0 172800 20150115235959 20150101000000 19036 . i8cAxD2pvQi1oAyvQxRpDfFlbqPzW+69QQEsDwE1eWOm5AtawO9U7lmsGps7sy/fVNvl1ljKBj4Djp9pb3U2FLogjiIlW0cDAkPmLlG9t+b/pjEfBNlhjANUVN06pvQVAfm+LcF26EaWT6FlISBqb6jSy4BHRa3Bdc4Sx7+pRSYSqVVvYxLkfAWsKPqGkvWhebJDndJJV9syXQXgZ+v/uJ+6XOS43xkAdeL8iBzIs/FlwMTfh3tVe3d0lb65IBBLlCzeQuetX+0Vu1YFcnD0mHc/wS2ZnAV5toAFmyVQBoY/XAZiZeaOkcROJ6Zmqezy7liwK7BqsYyAZntMhk8lbg==
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 883 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 12005
;; flags: qr rd ra ad cd ; qd: 1 an: 2 au: 0 ad: 1
;; QUESTIONS:
;; ch., type = DS, class = IN
;; ANSWERS:
ch. 973 IN DS 46375 8 2 8F96646FC68BB7E4AF4C0750A6096FBC0D4ECDA3D3FA6DA06FDDB42EE50C6CF3
ch. 973 IN RRSIG DS 8 1 86400 20150112170000 20150105160000 16665 . thY7xYWBBxiBjqbQIb9fAG4TmQgnziwM7q6P1T3/ITxmECdvOCQnnZA3uD7qmN8uM0HudsD7+y+zgD3rsH4RSTKdL4kHSI0OnCxToMTvklghEgFDezqIRm8NkWdI2H4Stwrj20nYKSpLQxPI2EE54gs18P3KyO8bAUYv8Qx73xU=
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 238 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 55502
;; flags: qr rd ra ad cd ; qd: 1 an: 4 au: 0 ad: 1
;; QUESTIONS:
;; ch., type = DNSKEY, class = IN
;; ANSWERS:
ch. 974 IN DNSKEY 256 3 8 AwEAAcsg0kY6fw1wzYMhSAKTy+Y2JzAst66P/1odp9NECJJHbU8f4nwziI3onoFSBV0ZiSZhY1aH5dhdDZ7BkrqhVXSrZPAz0CvzjIxmB1gSOf9DeZvjQvoy97HqYolxsf+B3QQv2RKBT67elF5+JisKg3/dQISelKn8LhabSoVrMlD1
ch. 974 IN DNSKEY 257 3 8 AwEAAb7GhhZ8IAy/AhwmSms5DeQK5ad09wIIplEpYoiAIYXPtJvT1ReFzyfTp/2YP+g/PWDwHPh4qKAHa9x0VgbIQcGAeNakmfkAdWEmCnca323/SAml3mwfaX62G7/uYWae5zh8QTxZKNd+K1yZ5x0IxnI31chSl5xymRbTEHYZDKwSIRFM3fTxUMt93WFaBVWELReYotJBr++rvAWdnlay5TPBTvheLBkaiqtgM4GP8HK07Y+86lsZnEsj5K3G1KTV5SPpa82rqYAwxG9VKbmSE/6/kBR5jJHjt1rRt5Oe7v18aEtw0YCEN4vxq+KuvMoNVqXUsE9LBwHJD+QNwi6wmB0=
ch. 974 IN DNSKEY 256 3 8 AwEAAcSLdT0fEmcFmLpeUkAJoeVaHKiu+nbuc43fWlqaCRVf8t2HA4uWxOk0O5ci9nrFTc8nq8oa5fk5Cj7CHh4yrX9qUCfTdIWTyp8BDEdJpS+Dyb0u9wQuVj+nQMj4fLzdQf4TJs3/qxuiLr3nL1UUwlhhXeqSqGVb7p3mtB5HJ8ad
ch. 974 IN RRSIG DNSKEY 8 1 86400 20150127100909 20141212090909 46375 ch. bT8q0FWyeMH0SulNo6UdIIgZYNATwYsee2bikq2Gh339Bufma8eaqWIPYT3XKmxYPBFOw0bVl+kLZxTwbR1CFoCDXoP+qgQhh4mf9qkNiv2CDSc+0FE3FRREn+DAhYTUEuB58FPiPakFB8s8O7T+k2qhDae7jy4/y7Jl1lnjaBY8s7bzOUPhF0KKCNZmvoKwtL23ZdVeTSV1xM3jkiNnpzBKbcoSWECSGJVp1SE0BnRXdwQP41YTXFZ0310YjaTAUCC5qbMIWdEkHjfdSQtKBImnc85mkapq9w++XQ4zhauPWBtrPV3CcoCahjUaWdjrKVkibomlJZaN8MEO23CfQw==
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 893 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 28480
;; flags: qr rd ra cd ; qd: 1 an: 3 au: 0 ad: 1
;; QUESTIONS:
;; ingotronic.ch., type = DS, class = IN
;; ANSWERS:
ingotronic.ch. 3582 IN DS 6031 5 1 733D0218B571CD617B1A7493564B9FC4F12ADE82
ingotronic.ch. 3582 IN DS 6031 5 2 4A948F2FDADA24686E473EDAC00DCF972584C75E3FAA92C2021B6221449FF87E
ingotronic.ch. 3582 IN RRSIG DS 8 2 3600 20150129033614 20150105123019 60789 ch. rVPJP2HhzW7OkroK2axFj5Lb4iVWCH8Fp/Iq1rF952NDo72b8RiKje2RaAKJAGQ+wd0YgE+PAej04GCmkhlDJA/zvPeeTxuhy3HbJzReMlQ7fjyH+wW1hli+FuIYvogXWf7nO/9VyPORt8X/f/pjrOr3Vlj9sGLN8TGYpEuVSw4=
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 288 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 53132
;; flags: qr aa rd ra cd ; qd: 1 an: 4 au: 0 ad: 1
;; QUESTIONS:
;; ingotronic.ch., type = DNSKEY, class = IN
;; ANSWERS:
ingotronic.ch. 300 IN DNSKEY 257 3 5 AwEAAeA1vzmjaB+eBAcvhzpKEgAEFpvQ1rg4uKDW6MsQtacKoqBpgyep2+LuWotz5p/xYxj3NGsArwN8Ad5cY0FHRr8miTT0elOv6nvlqGIfRuhj/BXAQ1x4ihpSFslHw0lJMYFwxsUZWpUyjWX/nv1xRZMMwF46gui0N4OEbyTYusCk77D+A71k+K0EAitFIbIH4GCUKmH1H7HmXhSVH9bN/n7KEGwW32lmsuuUcJoRKDkcUvbMXY/9Xoa2quERrUg/rBbDUHowRPjYDS5GzY1+f4YY8s40BufGiqyUTKKXL953MVFK8gmezXA0hbmrnZ7CBOw/7238mORAdzExaX8n7CE=
ingotronic.ch. 300 IN DNSKEY 256 3 5 AwEAAZ2Xh77GFzpEDx7EHYxShqltHgkiG+BOjBGifEmnJhQSdE5/yNSLFNcdhZZ8HUPxYnaedTqJcFFg4AzUsQklF/fECegTJdZjaj2WoL0/I8K7HMfY/hVuRZUWPNglYi8agJRX6gdkFTCpUNI7stpgKqxtzUJhhw15uG/lKMplwqUr
ingotronic.ch. 300 IN RRSIG DNSKEY 5 2 300 20150125003700 20141226001657 6031 ingotronic.ch. rs1QlP2SlSpA2ELbzwg3DgWLzXWL3Lpv6CUJE2Q0qH2Zp7Qdy3cD+ZEtNh9v24Qv1M6JJ3zFt8mmZoCeW2ycuMbJCqBkW9CBuwF+VznZvZY2MxwPipvhvEEGP//0M8YAZJ66yQPDv3PTdAP8FYbIrJyvY44vwyncwbslpfHT9jAsrbfr3vuMuWps86dnP462q+0s1TxBfqi8mzo3gdavjHKWVNwohLahLKT+tWeu6DSzQv0YwMjwtkLgF7QRgx3ctIIkloOrnx9nHH1N6y+hxEB89fOlyVDjHhgL5uVtsD5fEdT0FJ2Gc/2nShEMMqIwr1/J9kUq1mNySff/uEe65Q==
ingotronic.ch. 300 IN RRSIG DNSKEY 5 2 300 20150125003700 20141226001657 17430 ingotronic.ch. mEwZjhQqeWksWD0TCnNBrtce4YkWJL3edqL6PvAUu8Fn+Ih437kEs3+pqdkgRsdYQ9HW+lBm/8pWwJlNAv0bi9NykItXMwAUFtncgq+6Pnh3iAM972GXSa5VV4LcGQ5b8CBdHCHiEKDqyPv5Hr5QfYL/FQaWlcNRh4QZZlZNPFA=
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 940 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 3317
;; flags: qr aa rd ra cd ; qd: 1 an: 3 au: 0 ad: 1
;; QUESTIONS:
;; eccgost.ingotronic.ch., type = DS, class = IN
;; ANSWERS:
eccgost.ingotronic.ch. 300 IN DS 22754 12 1 2757C751309FCDD6982EFD25AE24AFC4AE5352AF
eccgost.ingotronic.ch. 300 IN DS 22754 12 2 B5A1A00DF6234B3C33B1EFE43134EF5B7462C0F48FE4845746F2278912F6C9AD
eccgost.ingotronic.ch. 300 IN RRSIG DS 5 3 300 20150125021136 20141226011244 17430 ingotronic.ch. K2CW7aMJbah4NiqK5McbSlYbLCJRtmkV4wMk5737D2a0B/N+xXB3yrahz3M/KdPQTLBw5gbHCnT4T/PobqvM8wPqsKZELoHsrYZX8nmvB+wPbZPK9nbkuc2G47iKqqhepY8jmfB6O9ekGS4L/5WA4RCpulki7QVmMKorJTc+NjQ=
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 307 bytes
###############################################
testMd5AlgRfc6944 0000664 0000000 0000000 00000020560 13020541473 0034150 0 ustar 00root root 0000000 0000000 dnssecjava-1.1.3/src/test/resources/recordings/org_jitsi_dnssec_TestAlgorithmSupport #Date: 2015-01-06T22:35:01+01:00
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 6805
;; flags: qr aa rd ra cd ; qd: 1 an: 2 au: 2 ad: 3
;; QUESTIONS:
;; rsamd5.ingotronic.ch., type = A, class = IN
;; ANSWERS:
rsamd5.ingotronic.ch. 300 IN A 127.0.0.1
rsamd5.ingotronic.ch. 300 IN RRSIG A 1 3 300 20150125010114 20141226001233 43856 rsamd5.ingotronic.ch. Rqgpczk/xOePnjzbdQX0FNdDH/71yhj3XvkQhcONHgpOojXys2az/WzeITHxxvMgYjfA0y8IYsgP/lNeLSEY5Bh4QLTsUc+vpRhz1nZa3gbNWtgRnFj0HYOM1yEsOaZMXUcDuycd3kgq9SVxqEO3r5yF5VbmntPymno92+OfX9M=
;; AUTHORITY RECORDS:
rsamd5.ingotronic.ch. 300 IN NS ns1.ingotronic.ch.
rsamd5.ingotronic.ch. 300 IN RRSIG NS 1 3 300 20150125010114 20141226001233 43856 rsamd5.ingotronic.ch. pYkIFh3yaO4yZvqL6fE6Bpgv8g8EiwaKyTb0rGKm8ign8f3PlOG+16mYt+Zn3qzihXiiGVtwpz1h7pf1A6BIx7wScnBfePWSvlu07NIfpbEmDEZRYXxNR12emOjGzgLhUnTQmpK3j6PFn8Gs2/H/kB1kIfM6bf/2/5hIRFVvsmM=
;; ADDITIONAL RECORDS:
ns1.ingotronic.ch. 300 IN A 62.192.5.131
ns1.ingotronic.ch. 300 IN RRSIG A 5 3 300 20150125005754 20141226001054 17430 ingotronic.ch. fNG1RZM53pXwBxruHNaSZszxVzNLoCq8VZsTjAzYH2vSLzHXYVGJFTLIeY0K9APAdyJU8WuwmABmn7XY0Kg39kRG77uoFlqUws2PdTz2QKOwJGZY7W88Ak2Y9lkDBcK8o3wJHVptrT8R7p/1U7UfjF0kqPUkakk2B0EbFWdagFg=
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 632 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 33880
;; flags: qr rd ra ad cd ; qd: 1 an: 4 au: 0 ad: 1
;; QUESTIONS:
;; ., type = DNSKEY, class = IN
;; ANSWERS:
. 87372 IN DNSKEY 256 3 8 AwEAAaPD7Y7XIi1MOEREJNTrRhyqsY3gff6JWzg+XCbqut1sbcbvqyssHw8DT1AkRaAC92pO8xuyq5QEgEPL1IHfABLwpwXI5gTj4gdwi86bpkmlWs9fRpnn4DPDCTdrnxIejJXgClHikLJF3u3CdpNCMijq4CKdQbMlRZ3avv+G7rh7
. 87372 IN DNSKEY 257 3 8 AwEAAagAIKlVZrpC6Ia7gEzahOR+9W29euxhJhVVLOyQbSEW0O8gcCjFFVQUTf6v58fLjwBd0YI0EzrAcQqBGCzh/RStIoO8g0NfnfL2MTJRkxoXbfDaUeVPQuYEhg37NZWAJQ9VnMVDxP/VHL496M/QZxkjf5/Efucp2gaDX6RS6CXpoY68LsvPVjR0ZSwzz1apAzvN9dlzEheX7ICJBBtuA6G3LQpzW5hOA2hzCTMjJPJ8LbqF6dsV6DoBQzgul0sGIcGOYl7OyQdXfZ57relSQageu+ipAdTTJ25AsRTAoub8ONGcLmqrAmRLKBP1dfwhYB4N7knNnulqQxA+Uk1ihz0=
. 87372 IN DNSKEY 256 3 8 AwEAAe3fSrbLBy3LOS7pnxEUhvPZTE2H5dIGsI/UfruI/nOEvWWa/PSX2BFedBkEqOlYdjdNF2f+6lmfk2Od/xu0v5bVqxFE+/24v3hZSlWBxvXzPTAGHrbW/IJYEPqlzVOAS4XdUgHg0N7IbLywNHMvB+Yf+Nm6ctyXXFLV4WTNnzs7
. 87372 IN RRSIG DNSKEY 8 0 172800 20150115235959 20150101000000 19036 . i8cAxD2pvQi1oAyvQxRpDfFlbqPzW+69QQEsDwE1eWOm5AtawO9U7lmsGps7sy/fVNvl1ljKBj4Djp9pb3U2FLogjiIlW0cDAkPmLlG9t+b/pjEfBNlhjANUVN06pvQVAfm+LcF26EaWT6FlISBqb6jSy4BHRa3Bdc4Sx7+pRSYSqVVvYxLkfAWsKPqGkvWhebJDndJJV9syXQXgZ+v/uJ+6XOS43xkAdeL8iBzIs/FlwMTfh3tVe3d0lb65IBBLlCzeQuetX+0Vu1YFcnD0mHc/wS2ZnAV5toAFmyVQBoY/XAZiZeaOkcROJ6Zmqezy7liwK7BqsYyAZntMhk8lbg==
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 883 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 1473
;; flags: qr rd ra ad cd ; qd: 1 an: 2 au: 0 ad: 1
;; QUESTIONS:
;; ch., type = DS, class = IN
;; ANSWERS:
ch. 972 IN DS 46375 8 2 8F96646FC68BB7E4AF4C0750A6096FBC0D4ECDA3D3FA6DA06FDDB42EE50C6CF3
ch. 972 IN RRSIG DS 8 1 86400 20150112170000 20150105160000 16665 . thY7xYWBBxiBjqbQIb9fAG4TmQgnziwM7q6P1T3/ITxmECdvOCQnnZA3uD7qmN8uM0HudsD7+y+zgD3rsH4RSTKdL4kHSI0OnCxToMTvklghEgFDezqIRm8NkWdI2H4Stwrj20nYKSpLQxPI2EE54gs18P3KyO8bAUYv8Qx73xU=
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 238 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 25499
;; flags: qr rd ra ad cd ; qd: 1 an: 4 au: 0 ad: 1
;; QUESTIONS:
;; ch., type = DNSKEY, class = IN
;; ANSWERS:
ch. 973 IN DNSKEY 256 3 8 AwEAAcSLdT0fEmcFmLpeUkAJoeVaHKiu+nbuc43fWlqaCRVf8t2HA4uWxOk0O5ci9nrFTc8nq8oa5fk5Cj7CHh4yrX9qUCfTdIWTyp8BDEdJpS+Dyb0u9wQuVj+nQMj4fLzdQf4TJs3/qxuiLr3nL1UUwlhhXeqSqGVb7p3mtB5HJ8ad
ch. 973 IN DNSKEY 256 3 8 AwEAAcsg0kY6fw1wzYMhSAKTy+Y2JzAst66P/1odp9NECJJHbU8f4nwziI3onoFSBV0ZiSZhY1aH5dhdDZ7BkrqhVXSrZPAz0CvzjIxmB1gSOf9DeZvjQvoy97HqYolxsf+B3QQv2RKBT67elF5+JisKg3/dQISelKn8LhabSoVrMlD1
ch. 973 IN DNSKEY 257 3 8 AwEAAb7GhhZ8IAy/AhwmSms5DeQK5ad09wIIplEpYoiAIYXPtJvT1ReFzyfTp/2YP+g/PWDwHPh4qKAHa9x0VgbIQcGAeNakmfkAdWEmCnca323/SAml3mwfaX62G7/uYWae5zh8QTxZKNd+K1yZ5x0IxnI31chSl5xymRbTEHYZDKwSIRFM3fTxUMt93WFaBVWELReYotJBr++rvAWdnlay5TPBTvheLBkaiqtgM4GP8HK07Y+86lsZnEsj5K3G1KTV5SPpa82rqYAwxG9VKbmSE/6/kBR5jJHjt1rRt5Oe7v18aEtw0YCEN4vxq+KuvMoNVqXUsE9LBwHJD+QNwi6wmB0=
ch. 973 IN RRSIG DNSKEY 8 1 86400 20150127100909 20141212090909 46375 ch. bT8q0FWyeMH0SulNo6UdIIgZYNATwYsee2bikq2Gh339Bufma8eaqWIPYT3XKmxYPBFOw0bVl+kLZxTwbR1CFoCDXoP+qgQhh4mf9qkNiv2CDSc+0FE3FRREn+DAhYTUEuB58FPiPakFB8s8O7T+k2qhDae7jy4/y7Jl1lnjaBY8s7bzOUPhF0KKCNZmvoKwtL23ZdVeTSV1xM3jkiNnpzBKbcoSWECSGJVp1SE0BnRXdwQP41YTXFZ0310YjaTAUCC5qbMIWdEkHjfdSQtKBImnc85mkapq9w++XQ4zhauPWBtrPV3CcoCahjUaWdjrKVkibomlJZaN8MEO23CfQw==
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 893 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 38713
;; flags: qr rd ra cd ; qd: 1 an: 3 au: 0 ad: 1
;; QUESTIONS:
;; ingotronic.ch., type = DS, class = IN
;; ANSWERS:
ingotronic.ch. 3581 IN DS 6031 5 2 4A948F2FDADA24686E473EDAC00DCF972584C75E3FAA92C2021B6221449FF87E
ingotronic.ch. 3581 IN DS 6031 5 1 733D0218B571CD617B1A7493564B9FC4F12ADE82
ingotronic.ch. 3581 IN RRSIG DS 8 2 3600 20150129033614 20150105123019 60789 ch. rVPJP2HhzW7OkroK2axFj5Lb4iVWCH8Fp/Iq1rF952NDo72b8RiKje2RaAKJAGQ+wd0YgE+PAej04GCmkhlDJA/zvPeeTxuhy3HbJzReMlQ7fjyH+wW1hli+FuIYvogXWf7nO/9VyPORt8X/f/pjrOr3Vlj9sGLN8TGYpEuVSw4=
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 288 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 13332
;; flags: qr aa rd ra cd ; qd: 1 an: 4 au: 0 ad: 1
;; QUESTIONS:
;; ingotronic.ch., type = DNSKEY, class = IN
;; ANSWERS:
ingotronic.ch. 300 IN DNSKEY 256 3 5 AwEAAZ2Xh77GFzpEDx7EHYxShqltHgkiG+BOjBGifEmnJhQSdE5/yNSLFNcdhZZ8HUPxYnaedTqJcFFg4AzUsQklF/fECegTJdZjaj2WoL0/I8K7HMfY/hVuRZUWPNglYi8agJRX6gdkFTCpUNI7stpgKqxtzUJhhw15uG/lKMplwqUr
ingotronic.ch. 300 IN DNSKEY 257 3 5 AwEAAeA1vzmjaB+eBAcvhzpKEgAEFpvQ1rg4uKDW6MsQtacKoqBpgyep2+LuWotz5p/xYxj3NGsArwN8Ad5cY0FHRr8miTT0elOv6nvlqGIfRuhj/BXAQ1x4ihpSFslHw0lJMYFwxsUZWpUyjWX/nv1xRZMMwF46gui0N4OEbyTYusCk77D+A71k+K0EAitFIbIH4GCUKmH1H7HmXhSVH9bN/n7KEGwW32lmsuuUcJoRKDkcUvbMXY/9Xoa2quERrUg/rBbDUHowRPjYDS5GzY1+f4YY8s40BufGiqyUTKKXL953MVFK8gmezXA0hbmrnZ7CBOw/7238mORAdzExaX8n7CE=
ingotronic.ch. 300 IN RRSIG DNSKEY 5 2 300 20150125003700 20141226001657 6031 ingotronic.ch. rs1QlP2SlSpA2ELbzwg3DgWLzXWL3Lpv6CUJE2Q0qH2Zp7Qdy3cD+ZEtNh9v24Qv1M6JJ3zFt8mmZoCeW2ycuMbJCqBkW9CBuwF+VznZvZY2MxwPipvhvEEGP//0M8YAZJ66yQPDv3PTdAP8FYbIrJyvY44vwyncwbslpfHT9jAsrbfr3vuMuWps86dnP462q+0s1TxBfqi8mzo3gdavjHKWVNwohLahLKT+tWeu6DSzQv0YwMjwtkLgF7QRgx3ctIIkloOrnx9nHH1N6y+hxEB89fOlyVDjHhgL5uVtsD5fEdT0FJ2Gc/2nShEMMqIwr1/J9kUq1mNySff/uEe65Q==
ingotronic.ch. 300 IN RRSIG DNSKEY 5 2 300 20150125003700 20141226001657 17430 ingotronic.ch. mEwZjhQqeWksWD0TCnNBrtce4YkWJL3edqL6PvAUu8Fn+Ih437kEs3+pqdkgRsdYQ9HW+lBm/8pWwJlNAv0bi9NykItXMwAUFtncgq+6Pnh3iAM972GXSa5VV4LcGQ5b8CBdHCHiEKDqyPv5Hr5QfYL/FQaWlcNRh4QZZlZNPFA=
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 940 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 30570
;; flags: qr aa rd ra cd ; qd: 1 an: 3 au: 0 ad: 1
;; QUESTIONS:
;; rsamd5.ingotronic.ch., type = DS, class = IN
;; ANSWERS:
rsamd5.ingotronic.ch. 300 IN DS 58016 1 1 A1A8915F892FD435738A21E8440586B40C8502D0
rsamd5.ingotronic.ch. 300 IN DS 58016 1 2 622EA4C1715DDCB15A3177F6A5A04861AB32FCFB8493F90BD4964F3639DB9FDD
rsamd5.ingotronic.ch. 300 IN RRSIG DS 5 3 300 20150125011134 20141226002644 17430 ingotronic.ch. ZHiH7NTk5zR3Ir9mjNcJL2x7Tasgj3yE1uaG71EdRtwubvShh4kLkFmER5YQqeUrXBvx5Pog+uHcK+WyX+7YD2GvQycFDheLPCB6BakK1nHid/JbzjXOtXhYCPh557tuZSzF7eLyZ+MhPMkvBJVG4NAGKaN85Dtavxn8JBn8QoQ=
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 306 bytes
###############################################
dnssecjava-1.1.3/src/test/resources/recordings/org_jitsi_dnssec_TestBogusReasonMessage/ 0000775 0000000 0000000 00000000000 13020541473 0031557 5 ustar 00root root 0000000 0000000 testLongBogusReasonIsSplitCorrectly 0000664 0000000 0000000 00000020766 13020541473 0040604 0 ustar 00root root 0000000 0000000 dnssecjava-1.1.3/src/test/resources/recordings/org_jitsi_dnssec_TestBogusReasonMessage #Date: 2016-06-07T23:59:45+02:00
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 31158
;; flags: qr rd ra ad cd ; qd: 1 an: 0 au: 4 ad: 1
;; QUESTIONS:
;; 01234567890123456789012345678901234567890123456789.01234567890123456789012345678901234567890123456789.01234567890123456789012345678901234567890123456789.01234567890123456789012345678901234567890123456789.isc.org., type = A, class = IN
;; ANSWERS:
;; AUTHORITY RECORDS:
isc.org. 1163 IN SOA ns-int.isc.org. hostmaster.isc.org. 2016060700 7200 3600 24796800 3600
isc.org. 1163 IN RRSIG SOA 5 2 7200 20160706234032 20160606234032 13953 isc.org. bX2SRqyh180R4DME+cdbFM+brddgfJfjDOniLnuKQCeMfWgXWh9ckkYISKglhXW+UCx377dsN1W07tYSHgc5lONcE4dxGftKsKk5yl6JRS9cC/JhIFuO/4kN8yZ1+ZnT1LQvprd/sFJtwABpFOyp/kG1MXnWArkPd6Twz7/9o+w=
isc.org. 2962 IN NSEC 01234567890123456789012345678901234567890123456789.01234567890123456789012345678901234567890123456789.01234567890123456789012345678901234567890123456789.01234567890123456789012345678901234567890123456789.isc.org. A NS SOA MX TXT AAAA NAPTR RRSIG NSEC DNSKEY SPF
isc.org. 2962 IN RRSIG NSEC 5 2 3600 20160706234032 20160606234032 13953 isc.org. fnOJeQG2vOwrERAPIqAenLOosbIBT7UvmxOV8Az2ExOhlGxP2CEqZEc5NPVbidq4oZC2kHyG7x31D6LBJXeXgOuanv+uqPNe9UIiUhdj+Egf8FEWIOKp8nxgjQGiGSNbQenWjeWoR91sReFEU+Pn7NPlEI072MzEESOT8oVucx8=
;; ADDITIONAL RECORDS:
. 32768 CLASS512 OPT ; payload 512, xrcode 0, version 0, flags 32768
;; Message size: 681 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 34586
;; flags: qr rd ra ad cd ; qd: 1 an: 3 au: 0 ad: 1
;; QUESTIONS:
;; ., type = DNSKEY, class = IN
;; ANSWERS:
. 5080 IN DNSKEY 257 3 8 AwEAAagAIKlVZrpC6Ia7gEzahOR+9W29euxhJhVVLOyQbSEW0O8gcCjFFVQUTf6v58fLjwBd0YI0EzrAcQqBGCzh/RStIoO8g0NfnfL2MTJRkxoXbfDaUeVPQuYEhg37NZWAJQ9VnMVDxP/VHL496M/QZxkjf5/Efucp2gaDX6RS6CXpoY68LsvPVjR0ZSwzz1apAzvN9dlzEheX7ICJBBtuA6G3LQpzW5hOA2hzCTMjJPJ8LbqF6dsV6DoBQzgul0sGIcGOYl7OyQdXfZ57relSQageu+ipAdTTJ25AsRTAoub8ONGcLmqrAmRLKBP1dfwhYB4N7knNnulqQxA+Uk1ihz0=
. 5080 IN DNSKEY 256 3 8 AwEAAarQO0FTE/l6LEKFlZllJIwXuLGd3q5d8S8NH+ntOeIMN81A5wAI18g3u9w/esNkThwgXTEa2mX1iOPdTcl3yRleAExxF22lEU2E0GKY2XdYr/BxP5fojJAPRgtEGDl72NSwSnD2/a8uPNirAJZoab36Hlw41QxEl7bmCo0280mt
. 5080 IN RRSIG DNSKEY 8 0 172800 20160614235959 20160531000000 19036 . d6grk7MW27La3d35wcURuLnP5cRhM8OmrQxkuwhKg7riaG52E/1qMt9rrDz29EBWuBbiFnnsCrsteUcTQTThV0y6Uw0Iw/jdcm9LjLg1t2eTTm8JbS4sb0WWzkLecc9d+RMjuvyHa/wrJOpZSqwUloSOPnlg1/QqBBmQeNFS7lM5gcdvTGDVpP7Q4xXKgg/VxkXuBAepkTEnMxtD5ACJg28t4Eb+Sxe1AMX7N2YQ1rVuj1Z3b9mLFvLc/4u++/i2C/KZfTvmG1ev3S4ydwg1HNVqKEwj4d8iQO0TmZRzBmCdhVho8wHWez+3h3A9hUe+uo05kFY/a1ibs75AZKRCbg==
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS512 OPT ; payload 512, xrcode 0, version 0, flags 32768
;; Message size: 736 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 3573
;; flags: qr rd ra ad cd ; qd: 1 an: 3 au: 0 ad: 1
;; QUESTIONS:
;; org., type = DS, class = IN
;; ANSWERS:
org. 4955 IN DS 9795 7 1 364DFAB3DAF254CAB477B5675B10766DDAA24982
org. 4955 IN DS 9795 7 2 3922B31B6F3A4EA92B19EB7B52120F031FD8E05FF0B03BAFCF9F891BFE7FF8E5
org. 4955 IN RRSIG DS 8 1 86400 20160617050000 20160607040000 60615 . Jq5yKki+K/BbgXUQYgUK7dSNWM+VXY96ZGHZt3CZSgL+nOGY1T8jMf7QXJYJ0z+G8qv3JhiofeX00QeOfTQDzXOFCXPto66SvAfHs0uVrC41pmxyQCBJOMkn6Z7LN6f4D+MFDD+gJii5bGbNh3pxe0WKTpg/Lr93s++CgprDFGY=
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS512 OPT ; payload 512, xrcode 0, version 0, flags 32768
;; Message size: 275 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 29457
;; flags: qr rd ra ad cd ; qd: 1 an: 7 au: 0 ad: 1
;; QUESTIONS:
;; org., type = DNSKEY, class = IN
;; ANSWERS:
org. 364 IN DNSKEY 256 3 7 AwEAAZ+JwpM2QvhT/1EXUPyoiythOolQZGOkjyBZs95c0nXZkz4pcah/s8WWkRgyrr+peLc1P5yoBwWR10/avmNIPfgeRuwKROdCtt+pe0DME9aZIpRGA7CJY18pJR94Zb+sB5ms4CQsOE67wSZZYZt7FSVNmmVHju8vTCDlqWh22m//
org. 364 IN DNSKEY 256 3 7 AwEAAebZOMc2aV6wi03zOgdiQhZqTbD043sXt5xRsTPn9vxukojZcsa6cOIrfqPb3l57m7u5H3r8inU8QbsC/aAYV7EOeSGNcK/lQepKSR+rlvq+7iMXoXVa9dL1tRpHDjNLp6QW+ly/jbfe5nzhptfbiiq3o/uSICf7SxF+Ho+vp4MD
org. 364 IN DNSKEY 257 3 7 AwEAAZTjbIO5kIpxWUtyXc8avsKyHIIZ+LjC2Dv8naO+Tz6X2fqzDC1bdq7HlZwtkaqTkMVVJ+8gE9FIreGJ4c8G1GdbjQgbP1OyYIG7OHTc4hv5T2NlyWr6k6QFz98Q4zwFIGTFVvwBhmrMDYsOTtXakK6QwHovA1+83BsUACxlidpwB0hQacbD6x+I2RCDzYuTzj64Jv0/9XsX6AYV3ebcgn4hL1jIR2eJYyXlrAoWxdzxcW//5yeL5RVWuhRxejmnSVnCuxkfS4AQ485KH2tpdbWcCopLJZs6tw8q3jWcpTGzdh/v3xdYfNpQNcPImFlxAun3BtORPA2r8ti6MNoJEHU=
org. 364 IN DNSKEY 257 3 7 AwEAAcMnWBKLuvG/LwnPVykcmpvnntwxfshHlHRhlY0F3oz8AMcuF8gw9McCw+BoC2YxWaiTpNPuxjSNhUlBtcJmcdkz3/r7PIn0oDf14ept1Y9pdPh8SbIBIWx50ZPfVRlj8oQXv2Y6yKiQik7bi3MT37zMRU2kw2oy3cgrsGAzGN4s/C6SFYon5N1Q2O4hGDbeOq538kATOy0GFELjuauV9guX/431msYu4Rgb5lLuQ3Mx5FSIxXpI/RaAn2mhM4nEZ/5IeRPKZVGydcuLBS8GZlxW4qbb8MgRZ8bwMg0pqWRHmhirGmJIt3UuzvN1pSFBfX7ysI9PPhSnwXCNDXk0kk0=
org. 364 IN RRSIG DNSKEY 7 1 900 20160622150242 20160601140242 9795 org. MoLhr1SsXAwR4JWiAVjbBTlPB5v3V4AGi4N8CRNgeHLcy5YhMezA10sOGNaGMxbrNlgP/lLEAblAG2OUfH2b6B6JbZ8+mGdKjxT12fKwMa3YfQ42DlYHRnDolokGdm0geL2nN3CXIU+2BTDhbIe7Y+NVVuWV+0s9SetcWMNpHkBm8kPUoHJQS/uaw9EOJ5aM1whTcvEaH+Lbk0Fp0wBleN7ERv7NwPPA+9h5PF682ZoKk2/vzRaqThRgIx/h231rw6xkcciCsDMj3/urcq1m7BoW1wWK08lteHAAjcDwdnQmeVKSIAvWRa6qYby9rQ4Mu6ORMLr7Cc4Jwec7SolvNA==
org. 364 IN RRSIG DNSKEY 7 1 900 20160622150242 20160601140242 12510 org. Rlq5SzA2zA9H61D1s7dG+J+zIUNd+r8j8HznA1z83xanFmJ/19hCtaMLWtbOgtC5eg1r1kPFY1Ddjl1s0IRHXhTFm5c7YQjYFVNrHsEA7pOcdwv2hltbQKjTgT/PfOu59RMt2NVMWPAffem0FyDlNIKbsctOe5y8Ot0wXIRugvU=
org. 364 IN RRSIG DNSKEY 7 1 900 20160622150242 20160601140242 17883 org. UrU+wrSQCkm3pVjB4YwRMwI0axgfDfwbFjJkNUG7aE8lW/wvzHX60sq7aS8NQRNqQdiR/7PAs5NZF0kuRULiT+61GVBnEVGi71SrKZayhEuINxNjh3Tu22ogzTRLAAKfm/iHWH3awDPemIM6jqSQGRHEw88gm5Kl7qP1WboQ92pkqJjXSrQmbbsSbyvdRoey2k8/oMkCaG9UVmaxWNA/9zUIOg57gscaG2bqVlE0c7xQSKC4NhuF0ns2S6xcpkl73MS7ZuN6rDhccDJbqH5VZ+QtVUn44mDe5o5Yvon0iPIz0N0mjgPPCCuBT/rVbEYFRZ/PMlyi7GQOVnwZO18Sfg==
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS512 OPT ; payload 512, xrcode 0, version 0, flags 32768
;; Message size: 1625 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 44585
;; flags: qr rd ra cd ; qd: 1 an: 3 au: 0 ad: 1
;; QUESTIONS:
;; isc.org., type = DS, class = IN
;; ANSWERS:
isc.org. 14922 IN DS 12892 5 1 982113D08B4C6A1D9F6AEE1E2237AEF69F3F9759
isc.org. 14922 IN DS 12892 5 2 F1E184C0E1D615D20EB3C223ACED3B03C773DD952D5F0EB5C777586DE18DA6B5
isc.org. 14922 IN RRSIG DS 7 2 86400 20160622150242 20160601140242 12510 org. KafYznIS4q2FxkDTTZpw4iCsXIO/Nx2xD9oHVwKLSD3CL8Wp/Yn3fEeUfcmwsmiA81hSN1afBuQfhCH6FY78uGYOyyx5AX9Q/Qp0JY/sKUyp6z2TODSf314Nwuy21yOD1fll4VrS4OgqtND2y0Q9d8F1A+whyJd90b7IFdvmbSs=
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS512 OPT ; payload 512, xrcode 0, version 0, flags 32768
;; Message size: 283 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 45223
;; flags: qr rd ra ad cd ; qd: 1 an: 4 au: 0 ad: 1
;; QUESTIONS:
;; isc.org., type = DNSKEY, class = IN
;; ANSWERS:
isc.org. 166 IN DNSKEY 256 3 5 AwEAAbiHaDVOPBsWPvRvtfYF2AeL4NOBf+mDktCFtaxdf7h7dHBzXAW86vMMvs8CbH5Qs5gJJT4vsRYh4lUtMJLBP8TMkAkhqm+57IKvQmsLCXgBFthgy1kq01GkgiwAysf0LL1N/yR0+GEfMsmjhDxRWb1lHl1O+blG2/l52vyZ060T
isc.org. 166 IN DNSKEY 257 3 5 BEAAAAOhHQDBrhQbtphgq2wQUpEQ5t4DtUHxoMVFu2hWLDMvoOMRXjGrhhCeFvAZih7yJHf8ZGfW6hd38hXG/xylYCO6Krpbdojwx8YMXLA5/kA+u50WIL8ZR1R6KTbsYVMf/Qx5RiNbPClw+vT+U8eXEJmO20jIS1ULgqy347cBB1zMnnz/4LJpA0da9CbKj3A254T515sNIMcwsB8/2+2E63/zZrQzBkj0BrN/9Bexjpiks3jRhZatEsXn3dTy47R09Uix5WcJt+xzqZ7+ysyLKOOedS39Z7SDmsn2eA0FKtQpwA6LXeG2w+jxmw3oA8lVUgEf/rzeC/bByBNsO70aEFTd
isc.org. 166 IN RRSIG DNSKEY 5 2 7200 20160706230738 20160606230738 12892 isc.org. Ah/AXCKOGFp0EsnM605S/56wK2z7ihmIIBufPdeVzikvR/P6kmctyfUnT8gpEFAyveT8tZtLJM3OCsjvaMSh/SVZ84T4ICvDCuG8YuzWkJS6WYh1QiAZFhrC2IRhXfdbtodL0iy7kse8MsmU5fLJS2t65UGlRioCQ3ji7GCNllHeVqzW5Xj7rKBTZqj/juoHCPSmSNsTpvIBJdHCVT4mjJexlBAMyOdpXLcs9Td5OSahO+gpD6fbb0MCG7EN5B9xaqVVr4Bawdk8eu5t/sZqbdU7VZUWwIP+i93CpIQnI2eKq2VIKslrxSycyVWJz1WBqOu6Dle8dYiu11dS+W02+w==
isc.org. 166 IN RRSIG DNSKEY 5 2 7200 20160706230738 20160606230738 13953 isc.org. PbpBZU66p3fkgeLbVhRjChbNPxXVotQPs09nXOnVLiPHi0L16oqzpyAiPYDXxLZV1D+g7rUofvzU+dqD8toPXS9wXAlMk7yOuni7a0yopYyFcGGE3HUMOJAlO7RQSFNgUbebxS+h8y57jB932JjqVjGoDlfd227DqfBhlpl1o3Q=
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS512 OPT ; payload 512, xrcode 0, version 0, flags 32768
;; Message size: 923 bytes
###############################################
dnssecjava-1.1.3/src/test/resources/recordings/org_jitsi_dnssec_TestCNames/ 0000775 0000000 0000000 00000000000 13020541473 0027171 5 ustar 00root root 0000000 0000000 testCNameToExternalUnsignedVoid 0000664 0000000 0000000 00000014654 13020541473 0035257 0 ustar 00root root 0000000 0000000 dnssecjava-1.1.3/src/test/resources/recordings/org_jitsi_dnssec_TestCNames #Date: 2015-01-06T22:34:53+01:00
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 19653
;; flags: qr rd ra cd ; qd: 1 an: 1 au: 6 ad: 1
;; QUESTIONS:
;; cvoid.dnssectest.jitsi.net., type = A, class = IN
;; ANSWERS:
cvoid.dnssectest.jitsi.net. 10800 IN CNAME void.invalid.example.
;; AUTHORITY RECORDS:
. 10800 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2015010601 1800 900 604800 86400
. 10800 IN RRSIG SOA 8 0 86400 20150113170000 20150106160000 16665 . R9ZOwEb5fodQQNRl4WvguyqEzOxdNPQ18nI+0R5sB2JSqG4Qz45SwW+vfnFCF01UW43/GdEfGOScrYVP2UBM8F2WOM+tHMZN0t9BbP9uszTWhzdYNCl3UKYYJiB59b8HIhKXlERPVfW2UEgIiI2VajShJnUv67W8gQO56hgTNEE=
. 10800 IN RRSIG NSEC 8 0 86400 20150113170000 20150106160000 16665 . wlEpGn1C8YZzJjIrlJp/GSud5FuLAZZj9C54DrKEl9gELWeIFJgLwkI1tcH4EhabbsNScB7SPOmVmnLkuM4Q6yJkmI1HXeBrddxniI2YEw+m9++/i19AqfDxuVYs52peKxXdEZ/sIS5JtDz3bdB44IAp2k1ue780z0xRV796vUk=
. 10800 IN NSEC abogado. NS SOA RRSIG NSEC DNSKEY
everbank. 10800 IN RRSIG NSEC 8 1 86400 20150113170000 20150106160000 16665 . QZcGZd7ZHWpt4cbDBq4y27PePP+BswDry6qVkqNkuNRd8MSHh74SvwbhyWmqjLR0agHYPOT7+gG/6hZmJ2n6EHCXAngQYWxgO6I0acqbkbEC8Ecf3WN1VUT0PD0cntMFaJUAAA0W/hcINLYMd/K8QT5SVgnfmkkZdhjqBW0fmlA=
everbank. 10800 IN NSEC exchange. NS DS RRSIG NSEC
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 703 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 30978
;; flags: qr rd ra ad cd ; qd: 1 an: 4 au: 0 ad: 1
;; QUESTIONS:
;; ., type = DNSKEY, class = IN
;; ANSWERS:
. 87381 IN DNSKEY 256 3 8 AwEAAe3fSrbLBy3LOS7pnxEUhvPZTE2H5dIGsI/UfruI/nOEvWWa/PSX2BFedBkEqOlYdjdNF2f+6lmfk2Od/xu0v5bVqxFE+/24v3hZSlWBxvXzPTAGHrbW/IJYEPqlzVOAS4XdUgHg0N7IbLywNHMvB+Yf+Nm6ctyXXFLV4WTNnzs7
. 87381 IN DNSKEY 257 3 8 AwEAAagAIKlVZrpC6Ia7gEzahOR+9W29euxhJhVVLOyQbSEW0O8gcCjFFVQUTf6v58fLjwBd0YI0EzrAcQqBGCzh/RStIoO8g0NfnfL2MTJRkxoXbfDaUeVPQuYEhg37NZWAJQ9VnMVDxP/VHL496M/QZxkjf5/Efucp2gaDX6RS6CXpoY68LsvPVjR0ZSwzz1apAzvN9dlzEheX7ICJBBtuA6G3LQpzW5hOA2hzCTMjJPJ8LbqF6dsV6DoBQzgul0sGIcGOYl7OyQdXfZ57relSQageu+ipAdTTJ25AsRTAoub8ONGcLmqrAmRLKBP1dfwhYB4N7knNnulqQxA+Uk1ihz0=
. 87381 IN DNSKEY 256 3 8 AwEAAaPD7Y7XIi1MOEREJNTrRhyqsY3gff6JWzg+XCbqut1sbcbvqyssHw8DT1AkRaAC92pO8xuyq5QEgEPL1IHfABLwpwXI5gTj4gdwi86bpkmlWs9fRpnn4DPDCTdrnxIejJXgClHikLJF3u3CdpNCMijq4CKdQbMlRZ3avv+G7rh7
. 87381 IN RRSIG DNSKEY 8 0 172800 20150115235959 20150101000000 19036 . i8cAxD2pvQi1oAyvQxRpDfFlbqPzW+69QQEsDwE1eWOm5AtawO9U7lmsGps7sy/fVNvl1ljKBj4Djp9pb3U2FLogjiIlW0cDAkPmLlG9t+b/pjEfBNlhjANUVN06pvQVAfm+LcF26EaWT6FlISBqb6jSy4BHRa3Bdc4Sx7+pRSYSqVVvYxLkfAWsKPqGkvWhebJDndJJV9syXQXgZ+v/uJ+6XOS43xkAdeL8iBzIs/FlwMTfh3tVe3d0lb65IBBLlCzeQuetX+0Vu1YFcnD0mHc/wS2ZnAV5toAFmyVQBoY/XAZiZeaOkcROJ6Zmqezy7liwK7BqsYyAZntMhk8lbg==
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 883 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 43389
;; flags: qr rd ra cd ; qd: 1 an: 2 au: 0 ad: 1
;; QUESTIONS:
;; net., type = DS, class = IN
;; ANSWERS:
net. 1016 IN DS 35886 8 2 7862B27F5F516EBE19680444D4CE5E762981931842C465F00236401D8BD973EE
net. 1016 IN RRSIG DS 8 1 86400 20150112170000 20150105160000 16665 . lvtZMm89bm5FBumG9OVTrChfGK7FuHkqEBDxT4QsR4IRE1frrHGyUSF1P9FjIpvE20dHjRvkl0llLTPNfQB97T/0QSKXVO1+mK+jM57AHPUbYZczgJ4iD4owxv50G8viJx58PSg3pGOP32CyJbgjKUxk5zbLKRnojuHT7FwdB+A=
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 239 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 30421
;; flags: qr rd ra cd ; qd: 1 an: 3 au: 0 ad: 1
;; QUESTIONS:
;; net., type = DNSKEY, class = IN
;; ANSWERS:
net. 1016 IN DNSKEY 257 3 8 AQOYBnzqWXIEj6mlgXg4LWC0HP2n8eK8XqgHlmJ/69iuIHsa1TrHDG6TcOra/pyeGKwH0nKZhTmXSuUFGh9BCNiwVDuyyb6OBGy2Nte9Kr8NwWg4q+zhSoOf4D+gC9dEzg0yFdwT0DKEvmNPt0K4jbQDS4Yimb+uPKuF6yieWWrPYYCrv8C9KC8JMze2uT6NuWBfsl2fDUoV4l65qMww06D7n+p7RbdwWkAZ0fA63mXVXBZF6kpDtsYD7SUB9jhhfLQE/r85bvg3FaSs5Wi2BaqN06SzGWI1DHu7axthIOeHwg00zxlhTpoYCH0ldoQz+S65zWYi/fRJiyLSBb6JZOvn
net. 1016 IN DNSKEY 256 3 8 AQPOLFKjvGKxyqclqQ0cOL99u9IQcUcMvVOpEgMC1lbsK7juIO5jeXF10hH2PhYdZF4HvPtHetU1P5cozol6ExskddyUw33MHIMIll3ryQhsN3MWRmmMZpj2gZhKsQQ+NJ81MxfYT40W6rQkVQ7t7J3+PQsPoEUXfFDxtzIBO5OgeQ==
net. 1016 IN RRSIG DNSKEY 8 1 86400 20150111173857 20150104173357 35886 net. Ds4nPxTvsyrzL3G1+8lFLawSR9pyq1zbdvJdq2VL3SMjnarPdBdHD09A8WC5k21mm1yp9Yl4cgTP5Eb1PVOxhvcvrgMbHOdkDB5ZJP0sk6jwkTEY/abUDqC8nBdbbwVLGLhkfZCNEHPn2aYGNi2eBWRruzRS9cjAZlM0KbkPXNya+Xq0KkjsIaozkgaoDvmtqDmHoAZwxRVHryvIcB2iMAJjsLtfBR9uENb93D3fN8L+/EGkjuoyA6NEHWW3AeiTc5CK3cuF0RXrRVlC2ZlrNaBe9c2rurZDL8VHZGx/D2TIj7EcHU1Gb4Hxyb8xQYecG6PvmE5+cMYoOo7N0rCOhA==
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 743 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 22947
;; flags: qr rd ra cd ; qd: 1 an: 0 au: 6 ad: 1
;; QUESTIONS:
;; jitsi.net., type = DS, class = IN
;; ANSWERS:
;; AUTHORITY RECORDS:
net. 900 IN SOA a.gtld-servers.net. nstld.verisign-grs.com. 1420580071 1800 900 604800 86400
net. 900 IN RRSIG SOA 8 1 900 20150113213431 20150106202431 6647 net. Oo+RNWfHsZh3xLf6tXP6fvy2NVGDm83QCNw6K0k5IWv68Qlq9O9JKGbyH38fsBe9yce5KXSbMP3x/STDNNQBMuF6bqtSmFntJ04IydrFXruUQ7ZYCOXOA+qIYEH7Uaoz8GAJ2g/VCngUJQRsJVbMC1p11WlbVSufCbKRmxLjHh8=
A1RT98BS5QGC9NFI51S9HCI47ULJG6JH.net. 900 IN RRSIG NSEC3 8 2 86400 20150112060337 20150105045337 6647 net. S5luUHZNIAKGwCaXJrR3iMPf7zy8F01LXnIm69iMeH4iu7DjtAeYCDFk4yFch5mbuzhIbk4I3MEK2C4B6kQsQtaEO/qCbhT5JLyD0of5WDuvBumLz54RYHhv0gCSzzHt17+VM1suO58R9ciU1E/ZK7aqe55vnOFdySU9J5GtAbM=
A1RT98BS5QGC9NFI51S9HCI47ULJG6JH.net. 900 IN NSEC3 1 1 0 - A1RUUFFJKCT2Q54P78F8EJGJ8JBK7I8B NS SOA RRSIG DNSKEY NSEC3PARAM
BJLKS9K921PG1IINN15L0VRSEDGACIMT.net. 900 IN RRSIG NSEC3 8 2 86400 20150113060049 20150106045049 6647 net. vK/ekvWS+rAvJSO7MOPHSC48Dl1YEFB+9lPVij54nZgeDUva84SSATqCuzzM3feJYzATYNuqmeROq3vM2QOtbbuIltKIfryUmzo83+Im7ZLXh6lW53j0l4zsUmBvPaj4l8JJzpdrbqf7WB75664ANzv2wwXSWpV/F9PJYqVe+Hk=
BJLKS9K921PG1IINN15L0VRSEDGACIMT.net. 900 IN NSEC3 1 1 0 - BJM99D76H567GQKJV87VAIPCTVI7SD7A NS DS RRSIG
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 759 bytes
###############################################
dnssecjava-1.1.3/src/test/resources/recordings/org_jitsi_dnssec_TestCNames/testCNameToInvalidSigned 0000664 0000000 0000000 00000037253 13020541473 0033755 0 ustar 00root root 0000000 0000000 #Date: 2015-01-06T22:34:58+01:00
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 51540
;; flags: qr aa rd ra cd ; qd: 1 an: 5 au: 6 ad: 11
;; QUESTIONS:
;; cfailed.ingotronic.ch., type = A, class = IN
;; ANSWERS:
cfailed.ingotronic.ch. 300 IN CNAME www.dnssec-failed.org.
cfailed.ingotronic.ch. 300 IN RRSIG CNAME 5 3 300 20150125010136 20141226005030 17430 ingotronic.ch. mgZy6VoaP0RNTOyEsr9QFpUoWSSCbuMi5SsJHqF/GE9q7ejF2SBBslVCufhRDrHFZHL2MO7NZGIpaYr3qQTBEuciPaNetBszGJS740pWwbz7pVENXsDUKbOr0Nyeai2aWh8EKuhk2kzAFCTguZe9w+oOZPEQYKTIHjvE5gLA7bA=
www.dnssec-failed.org. 7200 IN A 69.252.193.191
www.dnssec-failed.org. 7200 IN A 68.87.109.242
www.dnssec-failed.org. 7200 IN RRSIG A 5 3 7200 20150109165051 20150102134551 41118 dnssec-failed.org. JYn9DWTh8isQjK7Xbc6b85MY4Sf4ZI4HQCatS5pN0zsEYjMVcwsv+hLxPwvAVpyDb/Ew4g9Vhuph/1/3DUmfOHRMJWe8bliRSVx+zsJGwGKf6wY+XkXmnSfNwYAzgO8nONVvhUUfFdZC+PDggQei5tlnnVh+HhFOlrfJK6baM14=
;; AUTHORITY RECORDS:
dnssec-failed.org. 1024 IN NS dns101.comcast.net.
dnssec-failed.org. 1024 IN NS dns105.comcast.net.
dnssec-failed.org. 1024 IN NS dns103.comcast.net.
dnssec-failed.org. 1024 IN NS dns104.comcast.net.
dnssec-failed.org. 1024 IN NS dns102.comcast.net.
dnssec-failed.org. 1024 IN RRSIG NS 5 2 7200 20150109165051 20150102134551 41118 dnssec-failed.org. KgBDFY0Fmua62wqbOFEEYUmqRm89/8PNWce1Gpp1BclSvzBSe4+sId64tRlKxuCKY5SJU9X3XJhWQGSokNFyZPhcxjB1HmrA0YKArrzV1gJk/07uCQQt4vhLN98abxFJ0NcY/5MsXmeRPrMrbvQSV1Mzb+WSQi6nyNfWiaH22ts=
;; ADDITIONAL RECORDS:
dns101.comcast.net. 87424 IN A 69.252.250.103
dns101.comcast.net. 87424 IN AAAA 2001:558:fe23:8:69:252:250:103
dns102.comcast.net. 87424 IN A 68.87.85.132
dns102.comcast.net. 87424 IN AAAA 2001:558:1004:7:68:87:85:132
dns103.comcast.net. 87424 IN A 68.87.76.228
dns103.comcast.net. 87424 IN AAAA 2001:558:1014:c:68:87:76:228
dns104.comcast.net. 87424 IN A 68.87.68.244
dns104.comcast.net. 87424 IN AAAA 2001:558:100a:5:68:87:68:244
dns105.comcast.net. 87424 IN A 68.87.72.244
dns105.comcast.net. 87424 IN AAAA 2001:558:100e:5:68:87:72:244
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 980 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 46886
;; flags: qr rd ra ad cd ; qd: 1 an: 4 au: 0 ad: 1
;; QUESTIONS:
;; ., type = DNSKEY, class = IN
;; ANSWERS:
. 87376 IN DNSKEY 257 3 8 AwEAAagAIKlVZrpC6Ia7gEzahOR+9W29euxhJhVVLOyQbSEW0O8gcCjFFVQUTf6v58fLjwBd0YI0EzrAcQqBGCzh/RStIoO8g0NfnfL2MTJRkxoXbfDaUeVPQuYEhg37NZWAJQ9VnMVDxP/VHL496M/QZxkjf5/Efucp2gaDX6RS6CXpoY68LsvPVjR0ZSwzz1apAzvN9dlzEheX7ICJBBtuA6G3LQpzW5hOA2hzCTMjJPJ8LbqF6dsV6DoBQzgul0sGIcGOYl7OyQdXfZ57relSQageu+ipAdTTJ25AsRTAoub8ONGcLmqrAmRLKBP1dfwhYB4N7knNnulqQxA+Uk1ihz0=
. 87376 IN DNSKEY 256 3 8 AwEAAaPD7Y7XIi1MOEREJNTrRhyqsY3gff6JWzg+XCbqut1sbcbvqyssHw8DT1AkRaAC92pO8xuyq5QEgEPL1IHfABLwpwXI5gTj4gdwi86bpkmlWs9fRpnn4DPDCTdrnxIejJXgClHikLJF3u3CdpNCMijq4CKdQbMlRZ3avv+G7rh7
. 87376 IN DNSKEY 256 3 8 AwEAAe3fSrbLBy3LOS7pnxEUhvPZTE2H5dIGsI/UfruI/nOEvWWa/PSX2BFedBkEqOlYdjdNF2f+6lmfk2Od/xu0v5bVqxFE+/24v3hZSlWBxvXzPTAGHrbW/IJYEPqlzVOAS4XdUgHg0N7IbLywNHMvB+Yf+Nm6ctyXXFLV4WTNnzs7
. 87376 IN RRSIG DNSKEY 8 0 172800 20150115235959 20150101000000 19036 . i8cAxD2pvQi1oAyvQxRpDfFlbqPzW+69QQEsDwE1eWOm5AtawO9U7lmsGps7sy/fVNvl1ljKBj4Djp9pb3U2FLogjiIlW0cDAkPmLlG9t+b/pjEfBNlhjANUVN06pvQVAfm+LcF26EaWT6FlISBqb6jSy4BHRa3Bdc4Sx7+pRSYSqVVvYxLkfAWsKPqGkvWhebJDndJJV9syXQXgZ+v/uJ+6XOS43xkAdeL8iBzIs/FlwMTfh3tVe3d0lb65IBBLlCzeQuetX+0Vu1YFcnD0mHc/wS2ZnAV5toAFmyVQBoY/XAZiZeaOkcROJ6Zmqezy7liwK7BqsYyAZntMhk8lbg==
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 883 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 13800
;; flags: qr rd ra ad cd ; qd: 1 an: 2 au: 0 ad: 1
;; QUESTIONS:
;; ch., type = DS, class = IN
;; ANSWERS:
ch. 976 IN DS 46375 8 2 8F96646FC68BB7E4AF4C0750A6096FBC0D4ECDA3D3FA6DA06FDDB42EE50C6CF3
ch. 976 IN RRSIG DS 8 1 86400 20150112170000 20150105160000 16665 . thY7xYWBBxiBjqbQIb9fAG4TmQgnziwM7q6P1T3/ITxmECdvOCQnnZA3uD7qmN8uM0HudsD7+y+zgD3rsH4RSTKdL4kHSI0OnCxToMTvklghEgFDezqIRm8NkWdI2H4Stwrj20nYKSpLQxPI2EE54gs18P3KyO8bAUYv8Qx73xU=
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 238 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 31528
;; flags: qr rd ra ad cd ; qd: 1 an: 4 au: 0 ad: 1
;; QUESTIONS:
;; ch., type = DNSKEY, class = IN
;; ANSWERS:
ch. 976 IN DNSKEY 257 3 8 AwEAAb7GhhZ8IAy/AhwmSms5DeQK5ad09wIIplEpYoiAIYXPtJvT1ReFzyfTp/2YP+g/PWDwHPh4qKAHa9x0VgbIQcGAeNakmfkAdWEmCnca323/SAml3mwfaX62G7/uYWae5zh8QTxZKNd+K1yZ5x0IxnI31chSl5xymRbTEHYZDKwSIRFM3fTxUMt93WFaBVWELReYotJBr++rvAWdnlay5TPBTvheLBkaiqtgM4GP8HK07Y+86lsZnEsj5K3G1KTV5SPpa82rqYAwxG9VKbmSE/6/kBR5jJHjt1rRt5Oe7v18aEtw0YCEN4vxq+KuvMoNVqXUsE9LBwHJD+QNwi6wmB0=
ch. 976 IN DNSKEY 256 3 8 AwEAAcsg0kY6fw1wzYMhSAKTy+Y2JzAst66P/1odp9NECJJHbU8f4nwziI3onoFSBV0ZiSZhY1aH5dhdDZ7BkrqhVXSrZPAz0CvzjIxmB1gSOf9DeZvjQvoy97HqYolxsf+B3QQv2RKBT67elF5+JisKg3/dQISelKn8LhabSoVrMlD1
ch. 976 IN DNSKEY 256 3 8 AwEAAcSLdT0fEmcFmLpeUkAJoeVaHKiu+nbuc43fWlqaCRVf8t2HA4uWxOk0O5ci9nrFTc8nq8oa5fk5Cj7CHh4yrX9qUCfTdIWTyp8BDEdJpS+Dyb0u9wQuVj+nQMj4fLzdQf4TJs3/qxuiLr3nL1UUwlhhXeqSqGVb7p3mtB5HJ8ad
ch. 976 IN RRSIG DNSKEY 8 1 86400 20150127100909 20141212090909 46375 ch. bT8q0FWyeMH0SulNo6UdIIgZYNATwYsee2bikq2Gh339Bufma8eaqWIPYT3XKmxYPBFOw0bVl+kLZxTwbR1CFoCDXoP+qgQhh4mf9qkNiv2CDSc+0FE3FRREn+DAhYTUEuB58FPiPakFB8s8O7T+k2qhDae7jy4/y7Jl1lnjaBY8s7bzOUPhF0KKCNZmvoKwtL23ZdVeTSV1xM3jkiNnpzBKbcoSWECSGJVp1SE0BnRXdwQP41YTXFZ0310YjaTAUCC5qbMIWdEkHjfdSQtKBImnc85mkapq9w++XQ4zhauPWBtrPV3CcoCahjUaWdjrKVkibomlJZaN8MEO23CfQw==
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 893 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 39803
;; flags: qr rd ra cd ; qd: 1 an: 3 au: 0 ad: 1
;; QUESTIONS:
;; ingotronic.ch., type = DS, class = IN
;; ANSWERS:
ingotronic.ch. 3584 IN DS 6031 5 1 733D0218B571CD617B1A7493564B9FC4F12ADE82
ingotronic.ch. 3584 IN DS 6031 5 2 4A948F2FDADA24686E473EDAC00DCF972584C75E3FAA92C2021B6221449FF87E
ingotronic.ch. 3584 IN RRSIG DS 8 2 3600 20150129033614 20150105123019 60789 ch. rVPJP2HhzW7OkroK2axFj5Lb4iVWCH8Fp/Iq1rF952NDo72b8RiKje2RaAKJAGQ+wd0YgE+PAej04GCmkhlDJA/zvPeeTxuhy3HbJzReMlQ7fjyH+wW1hli+FuIYvogXWf7nO/9VyPORt8X/f/pjrOr3Vlj9sGLN8TGYpEuVSw4=
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 288 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 8543
;; flags: qr aa rd ra cd ; qd: 1 an: 4 au: 0 ad: 1
;; QUESTIONS:
;; ingotronic.ch., type = DNSKEY, class = IN
;; ANSWERS:
ingotronic.ch. 300 IN DNSKEY 256 3 5 AwEAAZ2Xh77GFzpEDx7EHYxShqltHgkiG+BOjBGifEmnJhQSdE5/yNSLFNcdhZZ8HUPxYnaedTqJcFFg4AzUsQklF/fECegTJdZjaj2WoL0/I8K7HMfY/hVuRZUWPNglYi8agJRX6gdkFTCpUNI7stpgKqxtzUJhhw15uG/lKMplwqUr
ingotronic.ch. 300 IN DNSKEY 257 3 5 AwEAAeA1vzmjaB+eBAcvhzpKEgAEFpvQ1rg4uKDW6MsQtacKoqBpgyep2+LuWotz5p/xYxj3NGsArwN8Ad5cY0FHRr8miTT0elOv6nvlqGIfRuhj/BXAQ1x4ihpSFslHw0lJMYFwxsUZWpUyjWX/nv1xRZMMwF46gui0N4OEbyTYusCk77D+A71k+K0EAitFIbIH4GCUKmH1H7HmXhSVH9bN/n7KEGwW32lmsuuUcJoRKDkcUvbMXY/9Xoa2quERrUg/rBbDUHowRPjYDS5GzY1+f4YY8s40BufGiqyUTKKXL953MVFK8gmezXA0hbmrnZ7CBOw/7238mORAdzExaX8n7CE=
ingotronic.ch. 300 IN RRSIG DNSKEY 5 2 300 20150125003700 20141226001657 6031 ingotronic.ch. rs1QlP2SlSpA2ELbzwg3DgWLzXWL3Lpv6CUJE2Q0qH2Zp7Qdy3cD+ZEtNh9v24Qv1M6JJ3zFt8mmZoCeW2ycuMbJCqBkW9CBuwF+VznZvZY2MxwPipvhvEEGP//0M8YAZJ66yQPDv3PTdAP8FYbIrJyvY44vwyncwbslpfHT9jAsrbfr3vuMuWps86dnP462q+0s1TxBfqi8mzo3gdavjHKWVNwohLahLKT+tWeu6DSzQv0YwMjwtkLgF7QRgx3ctIIkloOrnx9nHH1N6y+hxEB89fOlyVDjHhgL5uVtsD5fEdT0FJ2Gc/2nShEMMqIwr1/J9kUq1mNySff/uEe65Q==
ingotronic.ch. 300 IN RRSIG DNSKEY 5 2 300 20150125003700 20141226001657 17430 ingotronic.ch. mEwZjhQqeWksWD0TCnNBrtce4YkWJL3edqL6PvAUu8Fn+Ih437kEs3+pqdkgRsdYQ9HW+lBm/8pWwJlNAv0bi9NykItXMwAUFtncgq+6Pnh3iAM972GXSa5VV4LcGQ5b8CBdHCHiEKDqyPv5Hr5QfYL/FQaWlcNRh4QZZlZNPFA=
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 940 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 22565
;; flags: qr rd ra ad cd ; qd: 1 an: 4 au: 0 ad: 1
;; QUESTIONS:
;; ., type = DNSKEY, class = IN
;; ANSWERS:
. 87375 IN DNSKEY 257 3 8 AwEAAagAIKlVZrpC6Ia7gEzahOR+9W29euxhJhVVLOyQbSEW0O8gcCjFFVQUTf6v58fLjwBd0YI0EzrAcQqBGCzh/RStIoO8g0NfnfL2MTJRkxoXbfDaUeVPQuYEhg37NZWAJQ9VnMVDxP/VHL496M/QZxkjf5/Efucp2gaDX6RS6CXpoY68LsvPVjR0ZSwzz1apAzvN9dlzEheX7ICJBBtuA6G3LQpzW5hOA2hzCTMjJPJ8LbqF6dsV6DoBQzgul0sGIcGOYl7OyQdXfZ57relSQageu+ipAdTTJ25AsRTAoub8ONGcLmqrAmRLKBP1dfwhYB4N7knNnulqQxA+Uk1ihz0=
. 87375 IN DNSKEY 256 3 8 AwEAAaPD7Y7XIi1MOEREJNTrRhyqsY3gff6JWzg+XCbqut1sbcbvqyssHw8DT1AkRaAC92pO8xuyq5QEgEPL1IHfABLwpwXI5gTj4gdwi86bpkmlWs9fRpnn4DPDCTdrnxIejJXgClHikLJF3u3CdpNCMijq4CKdQbMlRZ3avv+G7rh7
. 87375 IN DNSKEY 256 3 8 AwEAAe3fSrbLBy3LOS7pnxEUhvPZTE2H5dIGsI/UfruI/nOEvWWa/PSX2BFedBkEqOlYdjdNF2f+6lmfk2Od/xu0v5bVqxFE+/24v3hZSlWBxvXzPTAGHrbW/IJYEPqlzVOAS4XdUgHg0N7IbLywNHMvB+Yf+Nm6ctyXXFLV4WTNnzs7
. 87375 IN RRSIG DNSKEY 8 0 172800 20150115235959 20150101000000 19036 . i8cAxD2pvQi1oAyvQxRpDfFlbqPzW+69QQEsDwE1eWOm5AtawO9U7lmsGps7sy/fVNvl1ljKBj4Djp9pb3U2FLogjiIlW0cDAkPmLlG9t+b/pjEfBNlhjANUVN06pvQVAfm+LcF26EaWT6FlISBqb6jSy4BHRa3Bdc4Sx7+pRSYSqVVvYxLkfAWsKPqGkvWhebJDndJJV9syXQXgZ+v/uJ+6XOS43xkAdeL8iBzIs/FlwMTfh3tVe3d0lb65IBBLlCzeQuetX+0Vu1YFcnD0mHc/wS2ZnAV5toAFmyVQBoY/XAZiZeaOkcROJ6Zmqezy7liwK7BqsYyAZntMhk8lbg==
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 883 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 40773
;; flags: qr rd ra cd ; qd: 1 an: 3 au: 0 ad: 1
;; QUESTIONS:
;; org., type = DS, class = IN
;; ANSWERS:
org. 1024 IN DS 21366 7 1 E6C1716CFB6BDC84E84CE1AB5510DAC69173B5B2
org. 1024 IN DS 21366 7 2 96EEB2FFD9B00CD4694E78278B5EFDAB0A80446567B69F634DA078F0D90F01BA
org. 1024 IN RRSIG DS 8 1 86400 20150112170000 20150105160000 16665 . TeNrVbBDgqdrbpdIweTad3yMLn+APxxlDpr717kqNgkOc8OxLFE/pFGzfSCYfc5hlMNB/nY1XhIJbWwvd26xOjwcB1rK3yo/Cfa5Pt4P+qV45QYW2JlatQVQPHtgMOf1KvUzXy4DlKzE5yHvHNGscfMOgIDeyWyDS8XwdrEIRR0=
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 275 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 5431
;; flags: qr rd ra cd ; qd: 1 an: 7 au: 0 ad: 1
;; QUESTIONS:
;; org., type = DNSKEY, class = IN
;; ANSWERS:
org. 900 IN DNSKEY 257 3 7 AwEAAYpYfj3aaRzzkxWQqMdl7YExY81NdYSv+qayuZDodnZ9IMh0bwMcYaVUdzNAbVeJ8gd6jq1sR3VvP/SR36mmGssbV4Udl5ORDtqiZP2TDNDHxEnKKTX+jWfytZeT7d3AbSzBKC0v7uZrM6M2eoJnl6id66rEUmQC2p9DrrDg9F6tXC9CD/zC7/y+BNNpiOdnM5DXk7HhZm7ra9E7ltL13h2mx7kEgU8e6npJlCoXjraIBgUDthYs48W/sdTDLu7N59rjCG+bpil+c8oZ9f7NR3qmSTpTP1m86RqUQnVErifrH8KjDqL+3wzUdF5ACkYwt1XhPVPU+wSIlzbaAQN49PU=
org. 900 IN DNSKEY 256 3 7 AwEAAXTZXCkp3UaDofhKlicjaZR/XeMFVkRSXRZsYP9OBRFZB44675hHORNE+QAijMdWOQeQt1SUWGyeJ5SHPVirGVxt9wCCqOeMTx7WvImZAKuqUl9H5N3Wn6FRidaub7d76IjxKZbkAHhGSJSzRTuuHbyjtrJVGcJ18kZHELyIsqZ3
org. 900 IN DNSKEY 257 3 7 AwEAAZTjbIO5kIpxWUtyXc8avsKyHIIZ+LjC2Dv8naO+Tz6X2fqzDC1bdq7HlZwtkaqTkMVVJ+8gE9FIreGJ4c8G1GdbjQgbP1OyYIG7OHTc4hv5T2NlyWr6k6QFz98Q4zwFIGTFVvwBhmrMDYsOTtXakK6QwHovA1+83BsUACxlidpwB0hQacbD6x+I2RCDzYuTzj64Jv0/9XsX6AYV3ebcgn4hL1jIR2eJYyXlrAoWxdzxcW//5yeL5RVWuhRxejmnSVnCuxkfS4AQ485KH2tpdbWcCopLJZs6tw8q3jWcpTGzdh/v3xdYfNpQNcPImFlxAun3BtORPA2r8ti6MNoJEHU=
org. 900 IN DNSKEY 256 3 7 AwEAAawm+6jDEf5ymhSAeQKaJrF0FTdqp4T0F1SE/KSFEcd/MUaBW0J8NyrJZXQJ0I3KpvXJSk3b0Z3X8StBpngUWOa9/iePG5WaR8Edj0JENd6Cy1R7WawrtYAfQ1AWnvGTbvf0rFa2GcMfhyNKeY8UO5TWKECE4AF4C+LlGe12TICh
org. 900 IN RRSIG DNSKEY 7 1 900 20150126170632 20150105160632 9795 org. b4jnXExJ1MgfUZffo8HVtxJ73qdbrustN+U6GBtgZLNEpdDgdpf9d4unRp/tqzDFoW0QuEoYOBatPCtpX3Re12/FQ+lWkfOAatcJMYMcW7kU2q86muY44W4p1BK/DxVb2zQHJ4AO7h22dH+TcM8J3WlGrlHYy/6k+emWPC7NpumCF3ctR/w26rAU4sv0lKuPvQSr9mOf3PyX29tz61lSfu4lAcymB6vh7B3D6TMkpHyobOAD67Ne59V1IgeeHXakURM8g0P0HMg87GT4GXwqo9+Aj7oWAq9D8iIIqelOLiijKys5jTzgdbOxM2vVn+l175xJybUzrJI0huJ9zKNCvg==
org. 900 IN RRSIG DNSKEY 7 1 900 20150126170632 20150105160632 21366 org. Edm9U+AtUcNeh2NXrWaLbfNYSRJovpziT1YcCphKGmdluvZPQk6rQAv1Y+2JBhE9Xmb37cY07lr7XHHfYxLWyhrPkpaKCX4ogqhGRylamy5R8BptqvVFhMTRUUHnK4tHvfYXqbtKuh9H84giLWMQIE2ZzQC9UqTvAIrc4FVUVIuwrNR7k6N96yy68feZnH8wcY+/RkyxoxMhcbMxXnZl2V9XP7xUxwtkULQBL1fq7IHI4jmlNyrdLzZltEgMIgtTK5HpgKaDborfoAcGBYnXxiC5RkAwHH81LAlT/BbK9shiWAI+yDhakLsIpl5ajUcTcbRBtLBBMkY6+4nAnXlSfg==
org. 900 IN RRSIG DNSKEY 7 1 900 20150126170632 20150105160632 53348 org. dAW5DYEjkxzfeM83ZCupwRh50L29jdR+dWkZYgt5GLDsYnyJDmRvjnHiHvJXVlHygvytafDMNK1MBlBODwHTBU/O7u7jLMbKvDU26bJpjm7cBJEtdUny3Bfckfr+VnxmT6UgmWLy1Cu8vuMOQS0t0fIMUs7fF2gJcD2bpcX85iY=
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 1625 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 31541
;; flags: qr rd ra cd ; qd: 1 an: 3 au: 0 ad: 1
;; QUESTIONS:
;; dnssec-failed.org., type = DS, class = IN
;; ANSWERS:
dnssec-failed.org. 1025 IN DS 106 5 1 4F219DCE274F820EA81EA1150638DABE21EB27FC
dnssec-failed.org. 1025 IN DS 106 5 2 AE3424C9B171AF3B202203767E5703426130D76EF6847175F2EED355F86EF1CE
dnssec-failed.org. 1025 IN RRSIG DS 7 2 86400 20150126170632 20150105160632 53348 org. fl/vMVXfynaiQTcME5ZuX+yIcMFidX9ykMnK8jBHug/BQW1OvqwxknH3q1UemVhS94KnQxNG+mQmEpHUX1BcQkHt57BFlreS0ZmDJpLvCeyT/6yG5jtNLBL3Vcyc1Bwq5OegPd7A7qaCQWaeXYOTBJsVbCZRLMfsh3mq1vBasOQ=
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 293 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 59607
;; flags: qr rd ra cd ; qd: 1 an: 4 au: 0 ad: 1
;; QUESTIONS:
;; dnssec-failed.org., type = DNSKEY, class = IN
;; ANSWERS:
dnssec-failed.org. 3600 IN DNSKEY 257 3 5 AwEAAb/f/pB/FLWoYp3j+HtldGkbUMT6caAw2rej0DZkgXVFOKn4PWi3BYjCozjEqxeramt+9b1SMuOSJ8vGKWr0YKrfyfJigsVxpsMgJ7QWcxeMACjC/oM8BPjDFBby/CgQQE63nPVX2SfDWCRhEhTOnsPZpKJvq66IHF/w+3u0IpyeplQWvO+HJ9OQPOQrstM7d/IPa7yKEtqS2nhBT0GWX2/GYhT6oE7F4vc2VF9f6MjpB/pWPzkcx636YaxG9P0QRBvzdD/Wztcbz1Scgxw5sUlIkQAzWV1mJfvXF+7NqzGcc94/kMt1VUzN2kYASRyn1ALiFPfNLz4VMUvSw5fpNS0=
dnssec-failed.org. 3600 IN DNSKEY 256 3 5 AwEAAcedvQhRqSGpERVGT4afbPjTQmRm0qipv7iYmE6L2h1toIyjdb4/qScsYfY/C29k8aGe3qdW8zMFP/Py1Lo4EZaH5oX46HsmRkb1muYZ3vGXkm3Bj9/tlrUAcmMg4VV3e68sLkhS78uMZP7cUYe72Dem89g8YdzjV64DaHzSPYXR
dnssec-failed.org. 3600 IN RRSIG DNSKEY 5 2 3600 20150109165051 20150102134551 41118 dnssec-failed.org. qnYEEspPHJthzgVkUk5IcR9Qr/8obR6wmFdHRmh01zz6q543ZMts4ItbMIVsRwHptIcw1M5vkUD0AhtM5rbwSyPOOa1jeL7WraFv6wHEruFAm2uQSiy/L525TB4/zTwML98jkICzdWVDhocV+PZjrLGRq2za7tT1mAX601rav4E=
dnssec-failed.org. 3600 IN RRSIG DNSKEY 5 2 3600 20150207135051 20141010095051 29521 dnssec-failed.org. MbRITRRHKnev1/LFG00Lfcy0DsTbCsoch5KzuNFaWu91k35zB0fxhQqwOhgsOT4nR5P/MmxYxIYp2/u5D4quq4OmkeaQCN4f9YcGXVqTj9k27m0p/1ibRPEILVzIovSplOGzOSjJMl+Vv75dB2SdEF6mBadl5oE+S/+6ZSAKJX+cRUnr4ENkAGHCoCfQ6l2juMz9KWNFrf4ym4dPbZ6DNCu31AskjqRehP7HcSstW9sg1gYXZ0Jm0oPkahHqWDMFwCr/em5BSTY+WK+ligc1OFOFkEYh9/HwIDxz4sJMeCxiTJ81xi6vTz9Llyz+pehMgxeco74gSSWS1pXE6/jhvw==
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 952 bytes
###############################################
testCNameToInvalidSignedNsec3 0000664 0000000 0000000 00000044316 13020541473 0034570 0 ustar 00root root 0000000 0000000 dnssecjava-1.1.3/src/test/resources/recordings/org_jitsi_dnssec_TestCNames #Date: 2015-01-06T22:34:58+01:00
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 57536
;; flags: qr aa rd ra cd ; qd: 1 an: 5 au: 6 ad: 11
;; QUESTIONS:
;; cfailed.nsec3.ingotronic.ch., type = A, class = IN
;; ANSWERS:
cfailed.nsec3.ingotronic.ch. 300 IN CNAME www.dnssec-failed.org.
cfailed.nsec3.ingotronic.ch. 300 IN RRSIG CNAME 7 4 300 20150125010458 20141226002309 62417 nsec3.ingotronic.ch. XR45/Bj0H6L9GlqNLpgkmym00VqRQmuKINZ1aER3OR4OEiW2XMgKu6ta73sMYYIgr1lZv1Gz73WCFlfXU0pOOkS30y0nsVgOq2oshbHc7fJaPb5UXygCBR1o/zNMYUhX4Ebc63eh9qsNb62f2cJlm4EBHN83P1IR5ezFOuS/W1o=
www.dnssec-failed.org. 7199 IN A 68.87.109.242
www.dnssec-failed.org. 7199 IN A 69.252.193.191
www.dnssec-failed.org. 7199 IN RRSIG A 5 3 7200 20150109165051 20150102134551 41118 dnssec-failed.org. JYn9DWTh8isQjK7Xbc6b85MY4Sf4ZI4HQCatS5pN0zsEYjMVcwsv+hLxPwvAVpyDb/Ew4g9Vhuph/1/3DUmfOHRMJWe8bliRSVx+zsJGwGKf6wY+XkXmnSfNwYAzgO8nONVvhUUfFdZC+PDggQei5tlnnVh+HhFOlrfJK6baM14=
;; AUTHORITY RECORDS:
dnssec-failed.org. 1023 IN NS dns105.comcast.net.
dnssec-failed.org. 1023 IN NS dns102.comcast.net.
dnssec-failed.org. 1023 IN NS dns101.comcast.net.
dnssec-failed.org. 1023 IN NS dns103.comcast.net.
dnssec-failed.org. 1023 IN NS dns104.comcast.net.
dnssec-failed.org. 1023 IN RRSIG NS 5 2 7200 20150109165051 20150102134551 41118 dnssec-failed.org. KgBDFY0Fmua62wqbOFEEYUmqRm89/8PNWce1Gpp1BclSvzBSe4+sId64tRlKxuCKY5SJU9X3XJhWQGSokNFyZPhcxjB1HmrA0YKArrzV1gJk/07uCQQt4vhLN98abxFJ0NcY/5MsXmeRPrMrbvQSV1Mzb+WSQi6nyNfWiaH22ts=
;; ADDITIONAL RECORDS:
dns101.comcast.net. 87423 IN A 69.252.250.103
dns101.comcast.net. 87423 IN AAAA 2001:558:fe23:8:69:252:250:103
dns102.comcast.net. 87423 IN A 68.87.85.132
dns102.comcast.net. 87423 IN AAAA 2001:558:1004:7:68:87:85:132
dns103.comcast.net. 87423 IN A 68.87.76.228
dns103.comcast.net. 87423 IN AAAA 2001:558:1014:c:68:87:76:228
dns104.comcast.net. 87423 IN A 68.87.68.244
dns104.comcast.net. 87423 IN AAAA 2001:558:100a:5:68:87:68:244
dns105.comcast.net. 87423 IN A 68.87.72.244
dns105.comcast.net. 87423 IN AAAA 2001:558:100e:5:68:87:72:244
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 992 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 50511
;; flags: qr rd ra ad cd ; qd: 1 an: 4 au: 0 ad: 1
;; QUESTIONS:
;; ., type = DNSKEY, class = IN
;; ANSWERS:
. 87375 IN DNSKEY 257 3 8 AwEAAagAIKlVZrpC6Ia7gEzahOR+9W29euxhJhVVLOyQbSEW0O8gcCjFFVQUTf6v58fLjwBd0YI0EzrAcQqBGCzh/RStIoO8g0NfnfL2MTJRkxoXbfDaUeVPQuYEhg37NZWAJQ9VnMVDxP/VHL496M/QZxkjf5/Efucp2gaDX6RS6CXpoY68LsvPVjR0ZSwzz1apAzvN9dlzEheX7ICJBBtuA6G3LQpzW5hOA2hzCTMjJPJ8LbqF6dsV6DoBQzgul0sGIcGOYl7OyQdXfZ57relSQageu+ipAdTTJ25AsRTAoub8ONGcLmqrAmRLKBP1dfwhYB4N7knNnulqQxA+Uk1ihz0=
. 87375 IN DNSKEY 256 3 8 AwEAAe3fSrbLBy3LOS7pnxEUhvPZTE2H5dIGsI/UfruI/nOEvWWa/PSX2BFedBkEqOlYdjdNF2f+6lmfk2Od/xu0v5bVqxFE+/24v3hZSlWBxvXzPTAGHrbW/IJYEPqlzVOAS4XdUgHg0N7IbLywNHMvB+Yf+Nm6ctyXXFLV4WTNnzs7
. 87375 IN DNSKEY 256 3 8 AwEAAaPD7Y7XIi1MOEREJNTrRhyqsY3gff6JWzg+XCbqut1sbcbvqyssHw8DT1AkRaAC92pO8xuyq5QEgEPL1IHfABLwpwXI5gTj4gdwi86bpkmlWs9fRpnn4DPDCTdrnxIejJXgClHikLJF3u3CdpNCMijq4CKdQbMlRZ3avv+G7rh7
. 87375 IN RRSIG DNSKEY 8 0 172800 20150115235959 20150101000000 19036 . i8cAxD2pvQi1oAyvQxRpDfFlbqPzW+69QQEsDwE1eWOm5AtawO9U7lmsGps7sy/fVNvl1ljKBj4Djp9pb3U2FLogjiIlW0cDAkPmLlG9t+b/pjEfBNlhjANUVN06pvQVAfm+LcF26EaWT6FlISBqb6jSy4BHRa3Bdc4Sx7+pRSYSqVVvYxLkfAWsKPqGkvWhebJDndJJV9syXQXgZ+v/uJ+6XOS43xkAdeL8iBzIs/FlwMTfh3tVe3d0lb65IBBLlCzeQuetX+0Vu1YFcnD0mHc/wS2ZnAV5toAFmyVQBoY/XAZiZeaOkcROJ6Zmqezy7liwK7BqsYyAZntMhk8lbg==
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 883 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 43188
;; flags: qr rd ra ad cd ; qd: 1 an: 2 au: 0 ad: 1
;; QUESTIONS:
;; ch., type = DS, class = IN
;; ANSWERS:
ch. 975 IN DS 46375 8 2 8F96646FC68BB7E4AF4C0750A6096FBC0D4ECDA3D3FA6DA06FDDB42EE50C6CF3
ch. 975 IN RRSIG DS 8 1 86400 20150112170000 20150105160000 16665 . thY7xYWBBxiBjqbQIb9fAG4TmQgnziwM7q6P1T3/ITxmECdvOCQnnZA3uD7qmN8uM0HudsD7+y+zgD3rsH4RSTKdL4kHSI0OnCxToMTvklghEgFDezqIRm8NkWdI2H4Stwrj20nYKSpLQxPI2EE54gs18P3KyO8bAUYv8Qx73xU=
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 238 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 49410
;; flags: qr rd ra ad cd ; qd: 1 an: 4 au: 0 ad: 1
;; QUESTIONS:
;; ch., type = DNSKEY, class = IN
;; ANSWERS:
ch. 976 IN DNSKEY 256 3 8 AwEAAcsg0kY6fw1wzYMhSAKTy+Y2JzAst66P/1odp9NECJJHbU8f4nwziI3onoFSBV0ZiSZhY1aH5dhdDZ7BkrqhVXSrZPAz0CvzjIxmB1gSOf9DeZvjQvoy97HqYolxsf+B3QQv2RKBT67elF5+JisKg3/dQISelKn8LhabSoVrMlD1
ch. 976 IN DNSKEY 257 3 8 AwEAAb7GhhZ8IAy/AhwmSms5DeQK5ad09wIIplEpYoiAIYXPtJvT1ReFzyfTp/2YP+g/PWDwHPh4qKAHa9x0VgbIQcGAeNakmfkAdWEmCnca323/SAml3mwfaX62G7/uYWae5zh8QTxZKNd+K1yZ5x0IxnI31chSl5xymRbTEHYZDKwSIRFM3fTxUMt93WFaBVWELReYotJBr++rvAWdnlay5TPBTvheLBkaiqtgM4GP8HK07Y+86lsZnEsj5K3G1KTV5SPpa82rqYAwxG9VKbmSE/6/kBR5jJHjt1rRt5Oe7v18aEtw0YCEN4vxq+KuvMoNVqXUsE9LBwHJD+QNwi6wmB0=
ch. 976 IN DNSKEY 256 3 8 AwEAAcSLdT0fEmcFmLpeUkAJoeVaHKiu+nbuc43fWlqaCRVf8t2HA4uWxOk0O5ci9nrFTc8nq8oa5fk5Cj7CHh4yrX9qUCfTdIWTyp8BDEdJpS+Dyb0u9wQuVj+nQMj4fLzdQf4TJs3/qxuiLr3nL1UUwlhhXeqSqGVb7p3mtB5HJ8ad
ch. 976 IN RRSIG DNSKEY 8 1 86400 20150127100909 20141212090909 46375 ch. bT8q0FWyeMH0SulNo6UdIIgZYNATwYsee2bikq2Gh339Bufma8eaqWIPYT3XKmxYPBFOw0bVl+kLZxTwbR1CFoCDXoP+qgQhh4mf9qkNiv2CDSc+0FE3FRREn+DAhYTUEuB58FPiPakFB8s8O7T+k2qhDae7jy4/y7Jl1lnjaBY8s7bzOUPhF0KKCNZmvoKwtL23ZdVeTSV1xM3jkiNnpzBKbcoSWECSGJVp1SE0BnRXdwQP41YTXFZ0310YjaTAUCC5qbMIWdEkHjfdSQtKBImnc85mkapq9w++XQ4zhauPWBtrPV3CcoCahjUaWdjrKVkibomlJZaN8MEO23CfQw==
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 893 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 19603
;; flags: qr rd ra cd ; qd: 1 an: 3 au: 0 ad: 1
;; QUESTIONS:
;; ingotronic.ch., type = DS, class = IN
;; ANSWERS:
ingotronic.ch. 3584 IN DS 6031 5 1 733D0218B571CD617B1A7493564B9FC4F12ADE82
ingotronic.ch. 3584 IN DS 6031 5 2 4A948F2FDADA24686E473EDAC00DCF972584C75E3FAA92C2021B6221449FF87E
ingotronic.ch. 3584 IN RRSIG DS 8 2 3600 20150129033614 20150105123019 60789 ch. rVPJP2HhzW7OkroK2axFj5Lb4iVWCH8Fp/Iq1rF952NDo72b8RiKje2RaAKJAGQ+wd0YgE+PAej04GCmkhlDJA/zvPeeTxuhy3HbJzReMlQ7fjyH+wW1hli+FuIYvogXWf7nO/9VyPORt8X/f/pjrOr3Vlj9sGLN8TGYpEuVSw4=
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 288 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 29571
;; flags: qr aa rd ra cd ; qd: 1 an: 4 au: 0 ad: 1
;; QUESTIONS:
;; ingotronic.ch., type = DNSKEY, class = IN
;; ANSWERS:
ingotronic.ch. 300 IN DNSKEY 256 3 5 AwEAAZ2Xh77GFzpEDx7EHYxShqltHgkiG+BOjBGifEmnJhQSdE5/yNSLFNcdhZZ8HUPxYnaedTqJcFFg4AzUsQklF/fECegTJdZjaj2WoL0/I8K7HMfY/hVuRZUWPNglYi8agJRX6gdkFTCpUNI7stpgKqxtzUJhhw15uG/lKMplwqUr
ingotronic.ch. 300 IN DNSKEY 257 3 5 AwEAAeA1vzmjaB+eBAcvhzpKEgAEFpvQ1rg4uKDW6MsQtacKoqBpgyep2+LuWotz5p/xYxj3NGsArwN8Ad5cY0FHRr8miTT0elOv6nvlqGIfRuhj/BXAQ1x4ihpSFslHw0lJMYFwxsUZWpUyjWX/nv1xRZMMwF46gui0N4OEbyTYusCk77D+A71k+K0EAitFIbIH4GCUKmH1H7HmXhSVH9bN/n7KEGwW32lmsuuUcJoRKDkcUvbMXY/9Xoa2quERrUg/rBbDUHowRPjYDS5GzY1+f4YY8s40BufGiqyUTKKXL953MVFK8gmezXA0hbmrnZ7CBOw/7238mORAdzExaX8n7CE=
ingotronic.ch. 300 IN RRSIG DNSKEY 5 2 300 20150125003700 20141226001657 6031 ingotronic.ch. rs1QlP2SlSpA2ELbzwg3DgWLzXWL3Lpv6CUJE2Q0qH2Zp7Qdy3cD+ZEtNh9v24Qv1M6JJ3zFt8mmZoCeW2ycuMbJCqBkW9CBuwF+VznZvZY2MxwPipvhvEEGP//0M8YAZJ66yQPDv3PTdAP8FYbIrJyvY44vwyncwbslpfHT9jAsrbfr3vuMuWps86dnP462q+0s1TxBfqi8mzo3gdavjHKWVNwohLahLKT+tWeu6DSzQv0YwMjwtkLgF7QRgx3ctIIkloOrnx9nHH1N6y+hxEB89fOlyVDjHhgL5uVtsD5fEdT0FJ2Gc/2nShEMMqIwr1/J9kUq1mNySff/uEe65Q==
ingotronic.ch. 300 IN RRSIG DNSKEY 5 2 300 20150125003700 20141226001657 17430 ingotronic.ch. mEwZjhQqeWksWD0TCnNBrtce4YkWJL3edqL6PvAUu8Fn+Ih437kEs3+pqdkgRsdYQ9HW+lBm/8pWwJlNAv0bi9NykItXMwAUFtncgq+6Pnh3iAM972GXSa5VV4LcGQ5b8CBdHCHiEKDqyPv5Hr5QfYL/FQaWlcNRh4QZZlZNPFA=
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 940 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 14282
;; flags: qr aa rd ra cd ; qd: 1 an: 3 au: 0 ad: 1
;; QUESTIONS:
;; nsec3.ingotronic.ch., type = DS, class = IN
;; ANSWERS:
nsec3.ingotronic.ch. 300 IN DS 16758 7 1 1720FF268E09A2CB63805EC8782D10AAD20E12A5
nsec3.ingotronic.ch. 300 IN DS 16758 7 2 3C8DC02750A1636F829B45D6E6D642866768A9CD40A013AD9D25AB63734FFA13
nsec3.ingotronic.ch. 300 IN RRSIG DS 5 3 300 20150125011134 20141226002644 17430 ingotronic.ch. hNurzlGhlyHbSgezPDuhIrtN9ZMsMXZbKGc7HD5rUuM88wD3fM97NxdzF+2Hi1USvBZ5GsQv63L+lAzf+mFPBoPIFHtTiAv8up7kQKRKmi/EzzkCYd/CC4UYdDZbaUyv7esh7spSOGwjPJNdK831p+MgltoWaYtnSGVMgOKk5mc=
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 305 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 16947
;; flags: qr aa rd ra cd ; qd: 1 an: 4 au: 0 ad: 1
;; QUESTIONS:
;; nsec3.ingotronic.ch., type = DNSKEY, class = IN
;; ANSWERS:
nsec3.ingotronic.ch. 300 IN DNSKEY 256 3 7 AwEAAccAWxkTVGZ6UAp0VEozAlYpARhbh6Y6tYOl6Fg3UeBNFFtDQ9fTEEt1NkbnR9u8KkpVN6a67avlYiUN1egDqEwzDU7R1Rw+/USdhm2hqOARmmu3DBgjjX/iXjZLyv310cOGFJZ/smcodlDL4pDAAoPxh/qs6KEBaT0sc1KWcGq3
nsec3.ingotronic.ch. 300 IN DNSKEY 257 3 7 AwEAAaBuJTf9oGyeTH3biUkAFLrsYrkodX1H7Snsui4XsDHFCBvs5XYacHbs0Jg0/O51KPjmNnjwMW8SSyDkKqYQ+9uYAf2EQ/pnD/VGQqnV2cw0Vwk/t0E2V4FUCju4pnAoyzZFZXGs1eWbX9JXu++b0Azp+ACq6485qJLzHhWDiIrPoK/SvdbFVRK4s+nPPJLH3NGBbtdz6kPq7aFWYBMoGeAZdN1wsQpcNWUo5eOmaJY53nMc7+rDpAyYlMe/FKwSZdX2ZDd63Qsa6Im4FVUJq/nWLq7tlQ/mWks15uDTQyJy/OWfA0ICCO4N9Fel9rThJNpJWEzOCblvZyBoy405kZk=
nsec3.ingotronic.ch. 300 IN RRSIG DNSKEY 7 3 300 20150125001457 20141226000444 16758 nsec3.ingotronic.ch. mXi1ylDi8XkRPup+YlT8GPdYE+P7gb6+/VdAwtodI916IzrkGkOHOTLbnrbAqqJOh0HxVCYXdxovmEcbJKUFKwplrQg3XD7/9Sq4pKU1MhMFEGrm/QPkM4u0mgjQwyToDLGuPHuFyur3FSjO/n54uGhAEft9JOFk/WKtWdCnm2LLyQrpC6herA3efFaI8kZhdoEY02AwihWVJxHasmz7lOoKRgNrkfELU+fN4+V7ISsRfJMyZc6q5PuNeG6vFD0uNE8tpdLJCSMurKYVpelvYqzFIcRTYcIjXwmS+L3DGjupqWMzFZVmpQM62JG3KCCD0ffpnNb0nWoSoHwpSeh/3Q==
nsec3.ingotronic.ch. 300 IN RRSIG DNSKEY 7 3 300 20150125001457 20141226000444 62417 nsec3.ingotronic.ch. PyCrf8T5dAfJzapb1p+kcTALPjDuD2niSaXXo0KeHAunT+6gJicLML2S/ZpiYr7X7Ma4Z0TYqE02qH6pcLYNnSgv9BE8sZO0nRtPekSyTy5nLi4hFADYhjb3UjaB85qmQZcqm64vC/CJhWO4t6Eixg/5MYALw+Qdy5Fo0qy/U5E=
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 958 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 54802
;; flags: qr rd ra ad cd ; qd: 1 an: 4 au: 0 ad: 1
;; QUESTIONS:
;; ., type = DNSKEY, class = IN
;; ANSWERS:
. 87375 IN DNSKEY 257 3 8 AwEAAagAIKlVZrpC6Ia7gEzahOR+9W29euxhJhVVLOyQbSEW0O8gcCjFFVQUTf6v58fLjwBd0YI0EzrAcQqBGCzh/RStIoO8g0NfnfL2MTJRkxoXbfDaUeVPQuYEhg37NZWAJQ9VnMVDxP/VHL496M/QZxkjf5/Efucp2gaDX6RS6CXpoY68LsvPVjR0ZSwzz1apAzvN9dlzEheX7ICJBBtuA6G3LQpzW5hOA2hzCTMjJPJ8LbqF6dsV6DoBQzgul0sGIcGOYl7OyQdXfZ57relSQageu+ipAdTTJ25AsRTAoub8ONGcLmqrAmRLKBP1dfwhYB4N7knNnulqQxA+Uk1ihz0=
. 87375 IN DNSKEY 256 3 8 AwEAAaPD7Y7XIi1MOEREJNTrRhyqsY3gff6JWzg+XCbqut1sbcbvqyssHw8DT1AkRaAC92pO8xuyq5QEgEPL1IHfABLwpwXI5gTj4gdwi86bpkmlWs9fRpnn4DPDCTdrnxIejJXgClHikLJF3u3CdpNCMijq4CKdQbMlRZ3avv+G7rh7
. 87375 IN DNSKEY 256 3 8 AwEAAe3fSrbLBy3LOS7pnxEUhvPZTE2H5dIGsI/UfruI/nOEvWWa/PSX2BFedBkEqOlYdjdNF2f+6lmfk2Od/xu0v5bVqxFE+/24v3hZSlWBxvXzPTAGHrbW/IJYEPqlzVOAS4XdUgHg0N7IbLywNHMvB+Yf+Nm6ctyXXFLV4WTNnzs7
. 87375 IN RRSIG DNSKEY 8 0 172800 20150115235959 20150101000000 19036 . i8cAxD2pvQi1oAyvQxRpDfFlbqPzW+69QQEsDwE1eWOm5AtawO9U7lmsGps7sy/fVNvl1ljKBj4Djp9pb3U2FLogjiIlW0cDAkPmLlG9t+b/pjEfBNlhjANUVN06pvQVAfm+LcF26EaWT6FlISBqb6jSy4BHRa3Bdc4Sx7+pRSYSqVVvYxLkfAWsKPqGkvWhebJDndJJV9syXQXgZ+v/uJ+6XOS43xkAdeL8iBzIs/FlwMTfh3tVe3d0lb65IBBLlCzeQuetX+0Vu1YFcnD0mHc/wS2ZnAV5toAFmyVQBoY/XAZiZeaOkcROJ6Zmqezy7liwK7BqsYyAZntMhk8lbg==
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 883 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 19703
;; flags: qr rd ra cd ; qd: 1 an: 3 au: 0 ad: 1
;; QUESTIONS:
;; org., type = DS, class = IN
;; ANSWERS:
org. 1023 IN DS 21366 7 1 E6C1716CFB6BDC84E84CE1AB5510DAC69173B5B2
org. 1023 IN DS 21366 7 2 96EEB2FFD9B00CD4694E78278B5EFDAB0A80446567B69F634DA078F0D90F01BA
org. 1023 IN RRSIG DS 8 1 86400 20150112170000 20150105160000 16665 . TeNrVbBDgqdrbpdIweTad3yMLn+APxxlDpr717kqNgkOc8OxLFE/pFGzfSCYfc5hlMNB/nY1XhIJbWwvd26xOjwcB1rK3yo/Cfa5Pt4P+qV45QYW2JlatQVQPHtgMOf1KvUzXy4DlKzE5yHvHNGscfMOgIDeyWyDS8XwdrEIRR0=
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 275 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 10916
;; flags: qr rd ra cd ; qd: 1 an: 7 au: 0 ad: 1
;; QUESTIONS:
;; org., type = DNSKEY, class = IN
;; ANSWERS:
org. 899 IN DNSKEY 257 3 7 AwEAAZTjbIO5kIpxWUtyXc8avsKyHIIZ+LjC2Dv8naO+Tz6X2fqzDC1bdq7HlZwtkaqTkMVVJ+8gE9FIreGJ4c8G1GdbjQgbP1OyYIG7OHTc4hv5T2NlyWr6k6QFz98Q4zwFIGTFVvwBhmrMDYsOTtXakK6QwHovA1+83BsUACxlidpwB0hQacbD6x+I2RCDzYuTzj64Jv0/9XsX6AYV3ebcgn4hL1jIR2eJYyXlrAoWxdzxcW//5yeL5RVWuhRxejmnSVnCuxkfS4AQ485KH2tpdbWcCopLJZs6tw8q3jWcpTGzdh/v3xdYfNpQNcPImFlxAun3BtORPA2r8ti6MNoJEHU=
org. 899 IN DNSKEY 257 3 7 AwEAAYpYfj3aaRzzkxWQqMdl7YExY81NdYSv+qayuZDodnZ9IMh0bwMcYaVUdzNAbVeJ8gd6jq1sR3VvP/SR36mmGssbV4Udl5ORDtqiZP2TDNDHxEnKKTX+jWfytZeT7d3AbSzBKC0v7uZrM6M2eoJnl6id66rEUmQC2p9DrrDg9F6tXC9CD/zC7/y+BNNpiOdnM5DXk7HhZm7ra9E7ltL13h2mx7kEgU8e6npJlCoXjraIBgUDthYs48W/sdTDLu7N59rjCG+bpil+c8oZ9f7NR3qmSTpTP1m86RqUQnVErifrH8KjDqL+3wzUdF5ACkYwt1XhPVPU+wSIlzbaAQN49PU=
org. 899 IN DNSKEY 256 3 7 AwEAAXTZXCkp3UaDofhKlicjaZR/XeMFVkRSXRZsYP9OBRFZB44675hHORNE+QAijMdWOQeQt1SUWGyeJ5SHPVirGVxt9wCCqOeMTx7WvImZAKuqUl9H5N3Wn6FRidaub7d76IjxKZbkAHhGSJSzRTuuHbyjtrJVGcJ18kZHELyIsqZ3
org. 899 IN DNSKEY 256 3 7 AwEAAawm+6jDEf5ymhSAeQKaJrF0FTdqp4T0F1SE/KSFEcd/MUaBW0J8NyrJZXQJ0I3KpvXJSk3b0Z3X8StBpngUWOa9/iePG5WaR8Edj0JENd6Cy1R7WawrtYAfQ1AWnvGTbvf0rFa2GcMfhyNKeY8UO5TWKECE4AF4C+LlGe12TICh
org. 899 IN RRSIG DNSKEY 7 1 900 20150126170632 20150105160632 9795 org. b4jnXExJ1MgfUZffo8HVtxJ73qdbrustN+U6GBtgZLNEpdDgdpf9d4unRp/tqzDFoW0QuEoYOBatPCtpX3Re12/FQ+lWkfOAatcJMYMcW7kU2q86muY44W4p1BK/DxVb2zQHJ4AO7h22dH+TcM8J3WlGrlHYy/6k+emWPC7NpumCF3ctR/w26rAU4sv0lKuPvQSr9mOf3PyX29tz61lSfu4lAcymB6vh7B3D6TMkpHyobOAD67Ne59V1IgeeHXakURM8g0P0HMg87GT4GXwqo9+Aj7oWAq9D8iIIqelOLiijKys5jTzgdbOxM2vVn+l175xJybUzrJI0huJ9zKNCvg==
org. 899 IN RRSIG DNSKEY 7 1 900 20150126170632 20150105160632 21366 org. Edm9U+AtUcNeh2NXrWaLbfNYSRJovpziT1YcCphKGmdluvZPQk6rQAv1Y+2JBhE9Xmb37cY07lr7XHHfYxLWyhrPkpaKCX4ogqhGRylamy5R8BptqvVFhMTRUUHnK4tHvfYXqbtKuh9H84giLWMQIE2ZzQC9UqTvAIrc4FVUVIuwrNR7k6N96yy68feZnH8wcY+/RkyxoxMhcbMxXnZl2V9XP7xUxwtkULQBL1fq7IHI4jmlNyrdLzZltEgMIgtTK5HpgKaDborfoAcGBYnXxiC5RkAwHH81LAlT/BbK9shiWAI+yDhakLsIpl5ajUcTcbRBtLBBMkY6+4nAnXlSfg==
org. 899 IN RRSIG DNSKEY 7 1 900 20150126170632 20150105160632 53348 org. dAW5DYEjkxzfeM83ZCupwRh50L29jdR+dWkZYgt5GLDsYnyJDmRvjnHiHvJXVlHygvytafDMNK1MBlBODwHTBU/O7u7jLMbKvDU26bJpjm7cBJEtdUny3Bfckfr+VnxmT6UgmWLy1Cu8vuMOQS0t0fIMUs7fF2gJcD2bpcX85iY=
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 1625 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 43081
;; flags: qr rd ra cd ; qd: 1 an: 3 au: 0 ad: 1
;; QUESTIONS:
;; dnssec-failed.org., type = DS, class = IN
;; ANSWERS:
dnssec-failed.org. 1024 IN DS 106 5 1 4F219DCE274F820EA81EA1150638DABE21EB27FC
dnssec-failed.org. 1024 IN DS 106 5 2 AE3424C9B171AF3B202203767E5703426130D76EF6847175F2EED355F86EF1CE
dnssec-failed.org. 1024 IN RRSIG DS 7 2 86400 20150126170632 20150105160632 53348 org. fl/vMVXfynaiQTcME5ZuX+yIcMFidX9ykMnK8jBHug/BQW1OvqwxknH3q1UemVhS94KnQxNG+mQmEpHUX1BcQkHt57BFlreS0ZmDJpLvCeyT/6yG5jtNLBL3Vcyc1Bwq5OegPd7A7qaCQWaeXYOTBJsVbCZRLMfsh3mq1vBasOQ=
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 293 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 54857
;; flags: qr rd ra cd ; qd: 1 an: 4 au: 0 ad: 1
;; QUESTIONS:
;; dnssec-failed.org., type = DNSKEY, class = IN
;; ANSWERS:
dnssec-failed.org. 3599 IN DNSKEY 257 3 5 AwEAAb/f/pB/FLWoYp3j+HtldGkbUMT6caAw2rej0DZkgXVFOKn4PWi3BYjCozjEqxeramt+9b1SMuOSJ8vGKWr0YKrfyfJigsVxpsMgJ7QWcxeMACjC/oM8BPjDFBby/CgQQE63nPVX2SfDWCRhEhTOnsPZpKJvq66IHF/w+3u0IpyeplQWvO+HJ9OQPOQrstM7d/IPa7yKEtqS2nhBT0GWX2/GYhT6oE7F4vc2VF9f6MjpB/pWPzkcx636YaxG9P0QRBvzdD/Wztcbz1Scgxw5sUlIkQAzWV1mJfvXF+7NqzGcc94/kMt1VUzN2kYASRyn1ALiFPfNLz4VMUvSw5fpNS0=
dnssec-failed.org. 3599 IN DNSKEY 256 3 5 AwEAAcedvQhRqSGpERVGT4afbPjTQmRm0qipv7iYmE6L2h1toIyjdb4/qScsYfY/C29k8aGe3qdW8zMFP/Py1Lo4EZaH5oX46HsmRkb1muYZ3vGXkm3Bj9/tlrUAcmMg4VV3e68sLkhS78uMZP7cUYe72Dem89g8YdzjV64DaHzSPYXR
dnssec-failed.org. 3599 IN RRSIG DNSKEY 5 2 3600 20150109165051 20150102134551 41118 dnssec-failed.org. qnYEEspPHJthzgVkUk5IcR9Qr/8obR6wmFdHRmh01zz6q543ZMts4ItbMIVsRwHptIcw1M5vkUD0AhtM5rbwSyPOOa1jeL7WraFv6wHEruFAm2uQSiy/L525TB4/zTwML98jkICzdWVDhocV+PZjrLGRq2za7tT1mAX601rav4E=
dnssec-failed.org. 3599 IN RRSIG DNSKEY 5 2 3600 20150207135051 20141010095051 29521 dnssec-failed.org. MbRITRRHKnev1/LFG00Lfcy0DsTbCsoch5KzuNFaWu91k35zB0fxhQqwOhgsOT4nR5P/MmxYxIYp2/u5D4quq4OmkeaQCN4f9YcGXVqTj9k27m0p/1ibRPEILVzIovSplOGzOSjJMl+Vv75dB2SdEF6mBadl5oE+S/+6ZSAKJX+cRUnr4ENkAGHCoCfQ6l2juMz9KWNFrf4ym4dPbZ6DNCu31AskjqRehP7HcSstW9sg1gYXZ0Jm0oPkahHqWDMFwCr/em5BSTY+WK+ligc1OFOFkEYh9/HwIDxz4sJMeCxiTJ81xi6vTz9Llyz+pehMgxeco74gSSWS1pXE6/jhvw==
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 952 bytes
###############################################
dnssecjava-1.1.3/src/test/resources/recordings/org_jitsi_dnssec_TestCNames/testCNameToSignedA 0000664 0000000 0000000 00000017520 13020541473 0032542 0 ustar 00root root 0000000 0000000 #Date: 2015-01-06T22:34:57+01:00
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 52495
;; flags: qr aa rd ra cd ; qd: 1 an: 4 au: 2 ad: 3
;; QUESTIONS:
;; csigned.ingotronic.ch., type = A, class = IN
;; ANSWERS:
csigned.ingotronic.ch. 300 IN CNAME www.ingotronic.ch.
csigned.ingotronic.ch. 300 IN RRSIG CNAME 5 3 300 20150125005754 20141226001054 17430 ingotronic.ch. ZBVECD9hhC0kSJPnvROZVE5bcN7mtDOuoYEJeTJZzuVU9ipLU7QljKmz4Lxhqq/MbdkpkR9Q2IgTjoDfVFbgZeattaQxjytAmKawXSFD6MzGEC2+JxE0+d1Q0N/1i+fH4EiIFpAZ3QDJjB6DIVb2cwX6TKGeETib2eB9g6aL+Dc=
www.ingotronic.ch. 300 IN A 127.0.0.1
www.ingotronic.ch. 300 IN RRSIG A 5 3 300 20150125012443 20141226010256 17430 ingotronic.ch. hkD2bkHZKHoJX8cg69j6l1JXE7iYlVFc0iMo3/3hcq4TqieiT2El/9DLfMSxa7XyB/HRDG5Ul61E56pwlCDdxkwemtAuTzjCpqAtvQ5l5OEtTM4i6nijKBkRRzHjh99qDI1jh9GFv3jkTk5m7iaMQemUB4VTjKGLcZHXvWmQLbg=
;; AUTHORITY RECORDS:
ingotronic.ch. 300 IN NS ns1.ingotronic.ch.
ingotronic.ch. 300 IN RRSIG NS 5 2 300 20150125000532 20141225234703 17430 ingotronic.ch. VuzVJM3McSHlcdngCG/G23zCikq8tXE0CZV2ZSgUFXXFMIEoM6PMi1QRQ/8VF3tee4WGpRx2jhtkui0wFRFfwIhW7G1uPDT4qogaR3KLIyuCEsMxhRH3WJZNrLmLqlSBGvd9OBJwbmryqm3Zzqvrk+E+rh8OJeifnBBpHAX4eHg=
;; ADDITIONAL RECORDS:
ns1.ingotronic.ch. 300 IN A 62.192.5.131
ns1.ingotronic.ch. 300 IN RRSIG A 5 3 300 20150125005754 20141226001054 17430 ingotronic.ch. fNG1RZM53pXwBxruHNaSZszxVzNLoCq8VZsTjAzYH2vSLzHXYVGJFTLIeY0K9APAdyJU8WuwmABmn7XY0Kg39kRG77uoFlqUws2PdTz2QKOwJGZY7W88Ak2Y9lkDBcK8o3wJHVptrT8R7p/1U7UfjF0kqPUkakk2B0EbFWdagFg=
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 810 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 35772
;; flags: qr rd ra ad cd ; qd: 1 an: 4 au: 0 ad: 1
;; QUESTIONS:
;; ., type = DNSKEY, class = IN
;; ANSWERS:
. 87376 IN DNSKEY 257 3 8 AwEAAagAIKlVZrpC6Ia7gEzahOR+9W29euxhJhVVLOyQbSEW0O8gcCjFFVQUTf6v58fLjwBd0YI0EzrAcQqBGCzh/RStIoO8g0NfnfL2MTJRkxoXbfDaUeVPQuYEhg37NZWAJQ9VnMVDxP/VHL496M/QZxkjf5/Efucp2gaDX6RS6CXpoY68LsvPVjR0ZSwzz1apAzvN9dlzEheX7ICJBBtuA6G3LQpzW5hOA2hzCTMjJPJ8LbqF6dsV6DoBQzgul0sGIcGOYl7OyQdXfZ57relSQageu+ipAdTTJ25AsRTAoub8ONGcLmqrAmRLKBP1dfwhYB4N7knNnulqQxA+Uk1ihz0=
. 87376 IN DNSKEY 256 3 8 AwEAAe3fSrbLBy3LOS7pnxEUhvPZTE2H5dIGsI/UfruI/nOEvWWa/PSX2BFedBkEqOlYdjdNF2f+6lmfk2Od/xu0v5bVqxFE+/24v3hZSlWBxvXzPTAGHrbW/IJYEPqlzVOAS4XdUgHg0N7IbLywNHMvB+Yf+Nm6ctyXXFLV4WTNnzs7
. 87376 IN DNSKEY 256 3 8 AwEAAaPD7Y7XIi1MOEREJNTrRhyqsY3gff6JWzg+XCbqut1sbcbvqyssHw8DT1AkRaAC92pO8xuyq5QEgEPL1IHfABLwpwXI5gTj4gdwi86bpkmlWs9fRpnn4DPDCTdrnxIejJXgClHikLJF3u3CdpNCMijq4CKdQbMlRZ3avv+G7rh7
. 87376 IN RRSIG DNSKEY 8 0 172800 20150115235959 20150101000000 19036 . i8cAxD2pvQi1oAyvQxRpDfFlbqPzW+69QQEsDwE1eWOm5AtawO9U7lmsGps7sy/fVNvl1ljKBj4Djp9pb3U2FLogjiIlW0cDAkPmLlG9t+b/pjEfBNlhjANUVN06pvQVAfm+LcF26EaWT6FlISBqb6jSy4BHRa3Bdc4Sx7+pRSYSqVVvYxLkfAWsKPqGkvWhebJDndJJV9syXQXgZ+v/uJ+6XOS43xkAdeL8iBzIs/FlwMTfh3tVe3d0lb65IBBLlCzeQuetX+0Vu1YFcnD0mHc/wS2ZnAV5toAFmyVQBoY/XAZiZeaOkcROJ6Zmqezy7liwK7BqsYyAZntMhk8lbg==
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 883 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 30053
;; flags: qr rd ra ad cd ; qd: 1 an: 2 au: 0 ad: 1
;; QUESTIONS:
;; ch., type = DS, class = IN
;; ANSWERS:
ch. 976 IN DS 46375 8 2 8F96646FC68BB7E4AF4C0750A6096FBC0D4ECDA3D3FA6DA06FDDB42EE50C6CF3
ch. 976 IN RRSIG DS 8 1 86400 20150112170000 20150105160000 16665 . thY7xYWBBxiBjqbQIb9fAG4TmQgnziwM7q6P1T3/ITxmECdvOCQnnZA3uD7qmN8uM0HudsD7+y+zgD3rsH4RSTKdL4kHSI0OnCxToMTvklghEgFDezqIRm8NkWdI2H4Stwrj20nYKSpLQxPI2EE54gs18P3KyO8bAUYv8Qx73xU=
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 238 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 61795
;; flags: qr rd ra ad cd ; qd: 1 an: 4 au: 0 ad: 1
;; QUESTIONS:
;; ch., type = DNSKEY, class = IN
;; ANSWERS:
ch. 977 IN DNSKEY 257 3 8 AwEAAb7GhhZ8IAy/AhwmSms5DeQK5ad09wIIplEpYoiAIYXPtJvT1ReFzyfTp/2YP+g/PWDwHPh4qKAHa9x0VgbIQcGAeNakmfkAdWEmCnca323/SAml3mwfaX62G7/uYWae5zh8QTxZKNd+K1yZ5x0IxnI31chSl5xymRbTEHYZDKwSIRFM3fTxUMt93WFaBVWELReYotJBr++rvAWdnlay5TPBTvheLBkaiqtgM4GP8HK07Y+86lsZnEsj5K3G1KTV5SPpa82rqYAwxG9VKbmSE/6/kBR5jJHjt1rRt5Oe7v18aEtw0YCEN4vxq+KuvMoNVqXUsE9LBwHJD+QNwi6wmB0=
ch. 977 IN DNSKEY 256 3 8 AwEAAcsg0kY6fw1wzYMhSAKTy+Y2JzAst66P/1odp9NECJJHbU8f4nwziI3onoFSBV0ZiSZhY1aH5dhdDZ7BkrqhVXSrZPAz0CvzjIxmB1gSOf9DeZvjQvoy97HqYolxsf+B3QQv2RKBT67elF5+JisKg3/dQISelKn8LhabSoVrMlD1
ch. 977 IN DNSKEY 256 3 8 AwEAAcSLdT0fEmcFmLpeUkAJoeVaHKiu+nbuc43fWlqaCRVf8t2HA4uWxOk0O5ci9nrFTc8nq8oa5fk5Cj7CHh4yrX9qUCfTdIWTyp8BDEdJpS+Dyb0u9wQuVj+nQMj4fLzdQf4TJs3/qxuiLr3nL1UUwlhhXeqSqGVb7p3mtB5HJ8ad
ch. 977 IN RRSIG DNSKEY 8 1 86400 20150127100909 20141212090909 46375 ch. bT8q0FWyeMH0SulNo6UdIIgZYNATwYsee2bikq2Gh339Bufma8eaqWIPYT3XKmxYPBFOw0bVl+kLZxTwbR1CFoCDXoP+qgQhh4mf9qkNiv2CDSc+0FE3FRREn+DAhYTUEuB58FPiPakFB8s8O7T+k2qhDae7jy4/y7Jl1lnjaBY8s7bzOUPhF0KKCNZmvoKwtL23ZdVeTSV1xM3jkiNnpzBKbcoSWECSGJVp1SE0BnRXdwQP41YTXFZ0310YjaTAUCC5qbMIWdEkHjfdSQtKBImnc85mkapq9w++XQ4zhauPWBtrPV3CcoCahjUaWdjrKVkibomlJZaN8MEO23CfQw==
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 893 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 42380
;; flags: qr rd ra cd ; qd: 1 an: 3 au: 0 ad: 1
;; QUESTIONS:
;; ingotronic.ch., type = DS, class = IN
;; ANSWERS:
ingotronic.ch. 3585 IN DS 6031 5 1 733D0218B571CD617B1A7493564B9FC4F12ADE82
ingotronic.ch. 3585 IN DS 6031 5 2 4A948F2FDADA24686E473EDAC00DCF972584C75E3FAA92C2021B6221449FF87E
ingotronic.ch. 3585 IN RRSIG DS 8 2 3600 20150129033614 20150105123019 60789 ch. rVPJP2HhzW7OkroK2axFj5Lb4iVWCH8Fp/Iq1rF952NDo72b8RiKje2RaAKJAGQ+wd0YgE+PAej04GCmkhlDJA/zvPeeTxuhy3HbJzReMlQ7fjyH+wW1hli+FuIYvogXWf7nO/9VyPORt8X/f/pjrOr3Vlj9sGLN8TGYpEuVSw4=
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 288 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 45992
;; flags: qr aa rd ra cd ; qd: 1 an: 4 au: 0 ad: 1
;; QUESTIONS:
;; ingotronic.ch., type = DNSKEY, class = IN
;; ANSWERS:
ingotronic.ch. 300 IN DNSKEY 256 3 5 AwEAAZ2Xh77GFzpEDx7EHYxShqltHgkiG+BOjBGifEmnJhQSdE5/yNSLFNcdhZZ8HUPxYnaedTqJcFFg4AzUsQklF/fECegTJdZjaj2WoL0/I8K7HMfY/hVuRZUWPNglYi8agJRX6gdkFTCpUNI7stpgKqxtzUJhhw15uG/lKMplwqUr
ingotronic.ch. 300 IN DNSKEY 257 3 5 AwEAAeA1vzmjaB+eBAcvhzpKEgAEFpvQ1rg4uKDW6MsQtacKoqBpgyep2+LuWotz5p/xYxj3NGsArwN8Ad5cY0FHRr8miTT0elOv6nvlqGIfRuhj/BXAQ1x4ihpSFslHw0lJMYFwxsUZWpUyjWX/nv1xRZMMwF46gui0N4OEbyTYusCk77D+A71k+K0EAitFIbIH4GCUKmH1H7HmXhSVH9bN/n7KEGwW32lmsuuUcJoRKDkcUvbMXY/9Xoa2quERrUg/rBbDUHowRPjYDS5GzY1+f4YY8s40BufGiqyUTKKXL953MVFK8gmezXA0hbmrnZ7CBOw/7238mORAdzExaX8n7CE=
ingotronic.ch. 300 IN RRSIG DNSKEY 5 2 300 20150125003700 20141226001657 6031 ingotronic.ch. rs1QlP2SlSpA2ELbzwg3DgWLzXWL3Lpv6CUJE2Q0qH2Zp7Qdy3cD+ZEtNh9v24Qv1M6JJ3zFt8mmZoCeW2ycuMbJCqBkW9CBuwF+VznZvZY2MxwPipvhvEEGP//0M8YAZJ66yQPDv3PTdAP8FYbIrJyvY44vwyncwbslpfHT9jAsrbfr3vuMuWps86dnP462q+0s1TxBfqi8mzo3gdavjHKWVNwohLahLKT+tWeu6DSzQv0YwMjwtkLgF7QRgx3ctIIkloOrnx9nHH1N6y+hxEB89fOlyVDjHhgL5uVtsD5fEdT0FJ2Gc/2nShEMMqIwr1/J9kUq1mNySff/uEe65Q==
ingotronic.ch. 300 IN RRSIG DNSKEY 5 2 300 20150125003700 20141226001657 17430 ingotronic.ch. mEwZjhQqeWksWD0TCnNBrtce4YkWJL3edqL6PvAUu8Fn+Ih437kEs3+pqdkgRsdYQ9HW+lBm/8pWwJlNAv0bi9NykItXMwAUFtncgq+6Pnh3iAM972GXSa5VV4LcGQ5b8CBdHCHiEKDqyPv5Hr5QfYL/FQaWlcNRh4QZZlZNPFA=
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 940 bytes
###############################################
testCNameToSignedAExternal 0000664 0000000 0000000 00000037412 13020541473 0034170 0 ustar 00root root 0000000 0000000 dnssecjava-1.1.3/src/test/resources/recordings/org_jitsi_dnssec_TestCNames #Date: 2015-01-06T22:35:00+01:00
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 28485
;; flags: qr aa rd ra cd ; qd: 1 an: 4 au: 5 ad: 11
;; QUESTIONS:
;; csext.ingotronic.ch., type = A, class = IN
;; ANSWERS:
csext.ingotronic.ch. 300 IN CNAME www.isc.org.
csext.ingotronic.ch. 300 IN RRSIG CNAME 5 3 300 20150125021136 20141226011244 17430 ingotronic.ch. dtPhpp6j05dVvEsL1y2sAM58ZmRapjsRhiej8KRdJcCOdGw2OFhSYrHdYgW74hTKEEZztJ2d/9iDUv+pOcu2+chBgs2NVokLtuqLnVvRm7OdaekT3RXDZfNfhSYwWukBzl6/oewu5KyeNnOAuDAWLlbTpgCZFCGbnNMVKe2exnU=
www.isc.org. 60 IN A 149.20.64.69
www.isc.org. 60 IN RRSIG A 5 3 60 20150204233244 20150105233244 4521 isc.org. qX9Fqzc+cUB7TUgdAPDQztt+3L7A2TxqVPTGZht3gKb1oBizum2zL3Le6lSO/DI2b526/n+l6gyT7ZtSL058wmEWhXeFlurPojBEBCWYLBkJ7OBLTqMSKzVNN1zpdUIs2RA8QqLOhSWeFkBw0bcJaDnRC2uKr0513aMVJfk5uA8=
;; AUTHORITY RECORDS:
isc.org. 1027 IN NS ord.sns-pb.isc.org.
isc.org. 1027 IN NS sfba.sns-pb.isc.org.
isc.org. 1027 IN NS ns.isc.afilias-nst.info.
isc.org. 1027 IN NS ams.sns-pb.isc.org.
isc.org. 1027 IN RRSIG NS 5 2 7200 20150204233244 20150105233244 4521 isc.org. Olb3QQHiezY6ysFepLUtePsgyVqXgECmLMROkbaAJT5ndTyoMHy4NaX/zFc63LtvzilrS59l9x719c4Pcm37zuEEdKB1IdjtxYKzKqmCzJZ5GuSZ6XgLO2DPWoF2ws+1BVPJL2myZdoBeEu+cUxCLTsETOloSl9Jz5livJ+Xbxo=
;; ADDITIONAL RECORDS:
ns.isc.afilias-nst.info. 1027 IN A 199.254.63.254
ns.isc.afilias-nst.info. 1027 IN AAAA 2001:500:2c:0:0:0:0:254
ams.sns-pb.isc.org. 1027 IN A 199.6.1.30
ams.sns-pb.isc.org. 1027 IN AAAA 2001:500:60:0:0:0:0:30
ord.sns-pb.isc.org. 1027 IN A 199.6.0.30
ord.sns-pb.isc.org. 1027 IN AAAA 2001:500:71:0:0:0:0:30
sfba.sns-pb.isc.org. 1027 IN A 149.20.64.3
sfba.sns-pb.isc.org. 1027 IN AAAA 2001:4f8:0:2:0:0:0:19
ams.sns-pb.isc.org. 7200 IN RRSIG A 5 4 7200 20150204233244 20150105233244 4521 isc.org. SEjuacdGLjteFKFrB0UTyTcEjEP/VtAKeNWD6DqXLA4839PAk17M1qzCf13uKBGwtb9e1xr3U/GDlIhspbSkSNOIWBzfkKiM8PXQ9kZZuYaPrrz2sz5CzzyzThkz4bq4BicQwKNi/aD/ljLaCIWZDXfZwJabo0Uz+G3QlIq18YE=
ams.sns-pb.isc.org. 7200 IN RRSIG AAAA 5 4 7200 20150204233244 20150105233244 4521 isc.org. EGLJUSGvW1gxEUglZKYLS2NmlJsPNzZQFZSORxTKIXqgF+0A2fZpk+/vkGwxiwqkOsV5Tu7kXUFzC7fIWEI7VDn/L8XKLz575upoMoGvA3bAZ/7VWXjLSXbyTFrDTP9GKSA4knIRtrIsOY+dKieSwIGV6sykBYA8ONMpPcj0sCY=
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 1205 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 57660
;; flags: qr rd ra ad cd ; qd: 1 an: 4 au: 0 ad: 1
;; QUESTIONS:
;; ., type = DNSKEY, class = IN
;; ANSWERS:
. 87374 IN DNSKEY 257 3 8 AwEAAagAIKlVZrpC6Ia7gEzahOR+9W29euxhJhVVLOyQbSEW0O8gcCjFFVQUTf6v58fLjwBd0YI0EzrAcQqBGCzh/RStIoO8g0NfnfL2MTJRkxoXbfDaUeVPQuYEhg37NZWAJQ9VnMVDxP/VHL496M/QZxkjf5/Efucp2gaDX6RS6CXpoY68LsvPVjR0ZSwzz1apAzvN9dlzEheX7ICJBBtuA6G3LQpzW5hOA2hzCTMjJPJ8LbqF6dsV6DoBQzgul0sGIcGOYl7OyQdXfZ57relSQageu+ipAdTTJ25AsRTAoub8ONGcLmqrAmRLKBP1dfwhYB4N7knNnulqQxA+Uk1ihz0=
. 87374 IN DNSKEY 256 3 8 AwEAAe3fSrbLBy3LOS7pnxEUhvPZTE2H5dIGsI/UfruI/nOEvWWa/PSX2BFedBkEqOlYdjdNF2f+6lmfk2Od/xu0v5bVqxFE+/24v3hZSlWBxvXzPTAGHrbW/IJYEPqlzVOAS4XdUgHg0N7IbLywNHMvB+Yf+Nm6ctyXXFLV4WTNnzs7
. 87374 IN DNSKEY 256 3 8 AwEAAaPD7Y7XIi1MOEREJNTrRhyqsY3gff6JWzg+XCbqut1sbcbvqyssHw8DT1AkRaAC92pO8xuyq5QEgEPL1IHfABLwpwXI5gTj4gdwi86bpkmlWs9fRpnn4DPDCTdrnxIejJXgClHikLJF3u3CdpNCMijq4CKdQbMlRZ3avv+G7rh7
. 87374 IN RRSIG DNSKEY 8 0 172800 20150115235959 20150101000000 19036 . i8cAxD2pvQi1oAyvQxRpDfFlbqPzW+69QQEsDwE1eWOm5AtawO9U7lmsGps7sy/fVNvl1ljKBj4Djp9pb3U2FLogjiIlW0cDAkPmLlG9t+b/pjEfBNlhjANUVN06pvQVAfm+LcF26EaWT6FlISBqb6jSy4BHRa3Bdc4Sx7+pRSYSqVVvYxLkfAWsKPqGkvWhebJDndJJV9syXQXgZ+v/uJ+6XOS43xkAdeL8iBzIs/FlwMTfh3tVe3d0lb65IBBLlCzeQuetX+0Vu1YFcnD0mHc/wS2ZnAV5toAFmyVQBoY/XAZiZeaOkcROJ6Zmqezy7liwK7BqsYyAZntMhk8lbg==
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 883 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 19501
;; flags: qr rd ra ad cd ; qd: 1 an: 2 au: 0 ad: 1
;; QUESTIONS:
;; ch., type = DS, class = IN
;; ANSWERS:
ch. 974 IN DS 46375 8 2 8F96646FC68BB7E4AF4C0750A6096FBC0D4ECDA3D3FA6DA06FDDB42EE50C6CF3
ch. 974 IN RRSIG DS 8 1 86400 20150112170000 20150105160000 16665 . thY7xYWBBxiBjqbQIb9fAG4TmQgnziwM7q6P1T3/ITxmECdvOCQnnZA3uD7qmN8uM0HudsD7+y+zgD3rsH4RSTKdL4kHSI0OnCxToMTvklghEgFDezqIRm8NkWdI2H4Stwrj20nYKSpLQxPI2EE54gs18P3KyO8bAUYv8Qx73xU=
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 238 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 46749
;; flags: qr rd ra ad cd ; qd: 1 an: 4 au: 0 ad: 1
;; QUESTIONS:
;; ch., type = DNSKEY, class = IN
;; ANSWERS:
ch. 975 IN DNSKEY 256 3 8 AwEAAcsg0kY6fw1wzYMhSAKTy+Y2JzAst66P/1odp9NECJJHbU8f4nwziI3onoFSBV0ZiSZhY1aH5dhdDZ7BkrqhVXSrZPAz0CvzjIxmB1gSOf9DeZvjQvoy97HqYolxsf+B3QQv2RKBT67elF5+JisKg3/dQISelKn8LhabSoVrMlD1
ch. 975 IN DNSKEY 257 3 8 AwEAAb7GhhZ8IAy/AhwmSms5DeQK5ad09wIIplEpYoiAIYXPtJvT1ReFzyfTp/2YP+g/PWDwHPh4qKAHa9x0VgbIQcGAeNakmfkAdWEmCnca323/SAml3mwfaX62G7/uYWae5zh8QTxZKNd+K1yZ5x0IxnI31chSl5xymRbTEHYZDKwSIRFM3fTxUMt93WFaBVWELReYotJBr++rvAWdnlay5TPBTvheLBkaiqtgM4GP8HK07Y+86lsZnEsj5K3G1KTV5SPpa82rqYAwxG9VKbmSE/6/kBR5jJHjt1rRt5Oe7v18aEtw0YCEN4vxq+KuvMoNVqXUsE9LBwHJD+QNwi6wmB0=
ch. 975 IN DNSKEY 256 3 8 AwEAAcSLdT0fEmcFmLpeUkAJoeVaHKiu+nbuc43fWlqaCRVf8t2HA4uWxOk0O5ci9nrFTc8nq8oa5fk5Cj7CHh4yrX9qUCfTdIWTyp8BDEdJpS+Dyb0u9wQuVj+nQMj4fLzdQf4TJs3/qxuiLr3nL1UUwlhhXeqSqGVb7p3mtB5HJ8ad
ch. 975 IN RRSIG DNSKEY 8 1 86400 20150127100909 20141212090909 46375 ch. bT8q0FWyeMH0SulNo6UdIIgZYNATwYsee2bikq2Gh339Bufma8eaqWIPYT3XKmxYPBFOw0bVl+kLZxTwbR1CFoCDXoP+qgQhh4mf9qkNiv2CDSc+0FE3FRREn+DAhYTUEuB58FPiPakFB8s8O7T+k2qhDae7jy4/y7Jl1lnjaBY8s7bzOUPhF0KKCNZmvoKwtL23ZdVeTSV1xM3jkiNnpzBKbcoSWECSGJVp1SE0BnRXdwQP41YTXFZ0310YjaTAUCC5qbMIWdEkHjfdSQtKBImnc85mkapq9w++XQ4zhauPWBtrPV3CcoCahjUaWdjrKVkibomlJZaN8MEO23CfQw==
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 893 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 3597
;; flags: qr rd ra cd ; qd: 1 an: 3 au: 0 ad: 1
;; QUESTIONS:
;; ingotronic.ch., type = DS, class = IN
;; ANSWERS:
ingotronic.ch. 3582 IN DS 6031 5 1 733D0218B571CD617B1A7493564B9FC4F12ADE82
ingotronic.ch. 3582 IN DS 6031 5 2 4A948F2FDADA24686E473EDAC00DCF972584C75E3FAA92C2021B6221449FF87E
ingotronic.ch. 3582 IN RRSIG DS 8 2 3600 20150129033614 20150105123019 60789 ch. rVPJP2HhzW7OkroK2axFj5Lb4iVWCH8Fp/Iq1rF952NDo72b8RiKje2RaAKJAGQ+wd0YgE+PAej04GCmkhlDJA/zvPeeTxuhy3HbJzReMlQ7fjyH+wW1hli+FuIYvogXWf7nO/9VyPORt8X/f/pjrOr3Vlj9sGLN8TGYpEuVSw4=
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 288 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 53222
;; flags: qr aa rd ra cd ; qd: 1 an: 4 au: 0 ad: 1
;; QUESTIONS:
;; ingotronic.ch., type = DNSKEY, class = IN
;; ANSWERS:
ingotronic.ch. 300 IN DNSKEY 256 3 5 AwEAAZ2Xh77GFzpEDx7EHYxShqltHgkiG+BOjBGifEmnJhQSdE5/yNSLFNcdhZZ8HUPxYnaedTqJcFFg4AzUsQklF/fECegTJdZjaj2WoL0/I8K7HMfY/hVuRZUWPNglYi8agJRX6gdkFTCpUNI7stpgKqxtzUJhhw15uG/lKMplwqUr
ingotronic.ch. 300 IN DNSKEY 257 3 5 AwEAAeA1vzmjaB+eBAcvhzpKEgAEFpvQ1rg4uKDW6MsQtacKoqBpgyep2+LuWotz5p/xYxj3NGsArwN8Ad5cY0FHRr8miTT0elOv6nvlqGIfRuhj/BXAQ1x4ihpSFslHw0lJMYFwxsUZWpUyjWX/nv1xRZMMwF46gui0N4OEbyTYusCk77D+A71k+K0EAitFIbIH4GCUKmH1H7HmXhSVH9bN/n7KEGwW32lmsuuUcJoRKDkcUvbMXY/9Xoa2quERrUg/rBbDUHowRPjYDS5GzY1+f4YY8s40BufGiqyUTKKXL953MVFK8gmezXA0hbmrnZ7CBOw/7238mORAdzExaX8n7CE=
ingotronic.ch. 300 IN RRSIG DNSKEY 5 2 300 20150125003700 20141226001657 6031 ingotronic.ch. rs1QlP2SlSpA2ELbzwg3DgWLzXWL3Lpv6CUJE2Q0qH2Zp7Qdy3cD+ZEtNh9v24Qv1M6JJ3zFt8mmZoCeW2ycuMbJCqBkW9CBuwF+VznZvZY2MxwPipvhvEEGP//0M8YAZJ66yQPDv3PTdAP8FYbIrJyvY44vwyncwbslpfHT9jAsrbfr3vuMuWps86dnP462q+0s1TxBfqi8mzo3gdavjHKWVNwohLahLKT+tWeu6DSzQv0YwMjwtkLgF7QRgx3ctIIkloOrnx9nHH1N6y+hxEB89fOlyVDjHhgL5uVtsD5fEdT0FJ2Gc/2nShEMMqIwr1/J9kUq1mNySff/uEe65Q==
ingotronic.ch. 300 IN RRSIG DNSKEY 5 2 300 20150125003700 20141226001657 17430 ingotronic.ch. mEwZjhQqeWksWD0TCnNBrtce4YkWJL3edqL6PvAUu8Fn+Ih437kEs3+pqdkgRsdYQ9HW+lBm/8pWwJlNAv0bi9NykItXMwAUFtncgq+6Pnh3iAM972GXSa5VV4LcGQ5b8CBdHCHiEKDqyPv5Hr5QfYL/FQaWlcNRh4QZZlZNPFA=
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 940 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 15854
;; flags: qr rd ra ad cd ; qd: 1 an: 4 au: 0 ad: 1
;; QUESTIONS:
;; ., type = DNSKEY, class = IN
;; ANSWERS:
. 87373 IN DNSKEY 256 3 8 AwEAAaPD7Y7XIi1MOEREJNTrRhyqsY3gff6JWzg+XCbqut1sbcbvqyssHw8DT1AkRaAC92pO8xuyq5QEgEPL1IHfABLwpwXI5gTj4gdwi86bpkmlWs9fRpnn4DPDCTdrnxIejJXgClHikLJF3u3CdpNCMijq4CKdQbMlRZ3avv+G7rh7
. 87373 IN DNSKEY 256 3 8 AwEAAe3fSrbLBy3LOS7pnxEUhvPZTE2H5dIGsI/UfruI/nOEvWWa/PSX2BFedBkEqOlYdjdNF2f+6lmfk2Od/xu0v5bVqxFE+/24v3hZSlWBxvXzPTAGHrbW/IJYEPqlzVOAS4XdUgHg0N7IbLywNHMvB+Yf+Nm6ctyXXFLV4WTNnzs7
. 87373 IN DNSKEY 257 3 8 AwEAAagAIKlVZrpC6Ia7gEzahOR+9W29euxhJhVVLOyQbSEW0O8gcCjFFVQUTf6v58fLjwBd0YI0EzrAcQqBGCzh/RStIoO8g0NfnfL2MTJRkxoXbfDaUeVPQuYEhg37NZWAJQ9VnMVDxP/VHL496M/QZxkjf5/Efucp2gaDX6RS6CXpoY68LsvPVjR0ZSwzz1apAzvN9dlzEheX7ICJBBtuA6G3LQpzW5hOA2hzCTMjJPJ8LbqF6dsV6DoBQzgul0sGIcGOYl7OyQdXfZ57relSQageu+ipAdTTJ25AsRTAoub8ONGcLmqrAmRLKBP1dfwhYB4N7knNnulqQxA+Uk1ihz0=
. 87373 IN RRSIG DNSKEY 8 0 172800 20150115235959 20150101000000 19036 . i8cAxD2pvQi1oAyvQxRpDfFlbqPzW+69QQEsDwE1eWOm5AtawO9U7lmsGps7sy/fVNvl1ljKBj4Djp9pb3U2FLogjiIlW0cDAkPmLlG9t+b/pjEfBNlhjANUVN06pvQVAfm+LcF26EaWT6FlISBqb6jSy4BHRa3Bdc4Sx7+pRSYSqVVvYxLkfAWsKPqGkvWhebJDndJJV9syXQXgZ+v/uJ+6XOS43xkAdeL8iBzIs/FlwMTfh3tVe3d0lb65IBBLlCzeQuetX+0Vu1YFcnD0mHc/wS2ZnAV5toAFmyVQBoY/XAZiZeaOkcROJ6Zmqezy7liwK7BqsYyAZntMhk8lbg==
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 883 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 55128
;; flags: qr rd ra cd ; qd: 1 an: 3 au: 0 ad: 1
;; QUESTIONS:
;; org., type = DS, class = IN
;; ANSWERS:
org. 1022 IN DS 21366 7 2 96EEB2FFD9B00CD4694E78278B5EFDAB0A80446567B69F634DA078F0D90F01BA
org. 1022 IN DS 21366 7 1 E6C1716CFB6BDC84E84CE1AB5510DAC69173B5B2
org. 1022 IN RRSIG DS 8 1 86400 20150112170000 20150105160000 16665 . TeNrVbBDgqdrbpdIweTad3yMLn+APxxlDpr717kqNgkOc8OxLFE/pFGzfSCYfc5hlMNB/nY1XhIJbWwvd26xOjwcB1rK3yo/Cfa5Pt4P+qV45QYW2JlatQVQPHtgMOf1KvUzXy4DlKzE5yHvHNGscfMOgIDeyWyDS8XwdrEIRR0=
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 275 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 39672
;; flags: qr rd ra cd ; qd: 1 an: 7 au: 0 ad: 1
;; QUESTIONS:
;; org., type = DNSKEY, class = IN
;; ANSWERS:
org. 898 IN DNSKEY 256 3 7 AwEAAXTZXCkp3UaDofhKlicjaZR/XeMFVkRSXRZsYP9OBRFZB44675hHORNE+QAijMdWOQeQt1SUWGyeJ5SHPVirGVxt9wCCqOeMTx7WvImZAKuqUl9H5N3Wn6FRidaub7d76IjxKZbkAHhGSJSzRTuuHbyjtrJVGcJ18kZHELyIsqZ3
org. 898 IN DNSKEY 257 3 7 AwEAAYpYfj3aaRzzkxWQqMdl7YExY81NdYSv+qayuZDodnZ9IMh0bwMcYaVUdzNAbVeJ8gd6jq1sR3VvP/SR36mmGssbV4Udl5ORDtqiZP2TDNDHxEnKKTX+jWfytZeT7d3AbSzBKC0v7uZrM6M2eoJnl6id66rEUmQC2p9DrrDg9F6tXC9CD/zC7/y+BNNpiOdnM5DXk7HhZm7ra9E7ltL13h2mx7kEgU8e6npJlCoXjraIBgUDthYs48W/sdTDLu7N59rjCG+bpil+c8oZ9f7NR3qmSTpTP1m86RqUQnVErifrH8KjDqL+3wzUdF5ACkYwt1XhPVPU+wSIlzbaAQN49PU=
org. 898 IN DNSKEY 257 3 7 AwEAAZTjbIO5kIpxWUtyXc8avsKyHIIZ+LjC2Dv8naO+Tz6X2fqzDC1bdq7HlZwtkaqTkMVVJ+8gE9FIreGJ4c8G1GdbjQgbP1OyYIG7OHTc4hv5T2NlyWr6k6QFz98Q4zwFIGTFVvwBhmrMDYsOTtXakK6QwHovA1+83BsUACxlidpwB0hQacbD6x+I2RCDzYuTzj64Jv0/9XsX6AYV3ebcgn4hL1jIR2eJYyXlrAoWxdzxcW//5yeL5RVWuhRxejmnSVnCuxkfS4AQ485KH2tpdbWcCopLJZs6tw8q3jWcpTGzdh/v3xdYfNpQNcPImFlxAun3BtORPA2r8ti6MNoJEHU=
org. 898 IN DNSKEY 256 3 7 AwEAAawm+6jDEf5ymhSAeQKaJrF0FTdqp4T0F1SE/KSFEcd/MUaBW0J8NyrJZXQJ0I3KpvXJSk3b0Z3X8StBpngUWOa9/iePG5WaR8Edj0JENd6Cy1R7WawrtYAfQ1AWnvGTbvf0rFa2GcMfhyNKeY8UO5TWKECE4AF4C+LlGe12TICh
org. 898 IN RRSIG DNSKEY 7 1 900 20150126170632 20150105160632 9795 org. b4jnXExJ1MgfUZffo8HVtxJ73qdbrustN+U6GBtgZLNEpdDgdpf9d4unRp/tqzDFoW0QuEoYOBatPCtpX3Re12/FQ+lWkfOAatcJMYMcW7kU2q86muY44W4p1BK/DxVb2zQHJ4AO7h22dH+TcM8J3WlGrlHYy/6k+emWPC7NpumCF3ctR/w26rAU4sv0lKuPvQSr9mOf3PyX29tz61lSfu4lAcymB6vh7B3D6TMkpHyobOAD67Ne59V1IgeeHXakURM8g0P0HMg87GT4GXwqo9+Aj7oWAq9D8iIIqelOLiijKys5jTzgdbOxM2vVn+l175xJybUzrJI0huJ9zKNCvg==
org. 898 IN RRSIG DNSKEY 7 1 900 20150126170632 20150105160632 21366 org. Edm9U+AtUcNeh2NXrWaLbfNYSRJovpziT1YcCphKGmdluvZPQk6rQAv1Y+2JBhE9Xmb37cY07lr7XHHfYxLWyhrPkpaKCX4ogqhGRylamy5R8BptqvVFhMTRUUHnK4tHvfYXqbtKuh9H84giLWMQIE2ZzQC9UqTvAIrc4FVUVIuwrNR7k6N96yy68feZnH8wcY+/RkyxoxMhcbMxXnZl2V9XP7xUxwtkULQBL1fq7IHI4jmlNyrdLzZltEgMIgtTK5HpgKaDborfoAcGBYnXxiC5RkAwHH81LAlT/BbK9shiWAI+yDhakLsIpl5ajUcTcbRBtLBBMkY6+4nAnXlSfg==
org. 898 IN RRSIG DNSKEY 7 1 900 20150126170632 20150105160632 53348 org. dAW5DYEjkxzfeM83ZCupwRh50L29jdR+dWkZYgt5GLDsYnyJDmRvjnHiHvJXVlHygvytafDMNK1MBlBODwHTBU/O7u7jLMbKvDU26bJpjm7cBJEtdUny3Bfckfr+VnxmT6UgmWLy1Cu8vuMOQS0t0fIMUs7fF2gJcD2bpcX85iY=
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 1625 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 10645
;; flags: qr rd ra cd ; qd: 1 an: 3 au: 0 ad: 1
;; QUESTIONS:
;; isc.org., type = DS, class = IN
;; ANSWERS:
isc.org. 1027 IN DS 12892 5 1 982113D08B4C6A1D9F6AEE1E2237AEF69F3F9759
isc.org. 1027 IN DS 12892 5 2 F1E184C0E1D615D20EB3C223ACED3B03C773DD952D5F0EB5C777586DE18DA6B5
isc.org. 1027 IN RRSIG DS 7 2 86400 20150122163315 20150101153315 53348 org. mpNwUFgIi/ahCYVkPlQuyJ+AY6BGiRaLD4cRwBIBNnaGVeR5vHNrGPrOX32mfS38tegrfNjJS4y3icwavPeubuZwGKIja8CBRGhzzFj6JZgydRJpJ+lkKws6+vDhjQ3A8+VerV0TNs8IWXSBa+Vl4Gv+0bX5NlM4RF/7Kyd7lJA=
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 283 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 61039
;; flags: qr rd ra cd ; qd: 1 an: 4 au: 0 ad: 1
;; QUESTIONS:
;; isc.org., type = DNSKEY, class = IN
;; ANSWERS:
isc.org. 7200 IN DNSKEY 257 3 5 BEAAAAOhHQDBrhQbtphgq2wQUpEQ5t4DtUHxoMVFu2hWLDMvoOMRXjGrhhCeFvAZih7yJHf8ZGfW6hd38hXG/xylYCO6Krpbdojwx8YMXLA5/kA+u50WIL8ZR1R6KTbsYVMf/Qx5RiNbPClw+vT+U8eXEJmO20jIS1ULgqy347cBB1zMnnz/4LJpA0da9CbKj3A254T515sNIMcwsB8/2+2E63/zZrQzBkj0BrN/9Bexjpiks3jRhZatEsXn3dTy47R09Uix5WcJt+xzqZ7+ysyLKOOedS39Z7SDmsn2eA0FKtQpwA6LXeG2w+jxmw3oA8lVUgEf/rzeC/bByBNsO70aEFTd
isc.org. 7200 IN DNSKEY 256 3 5 AwEAAbJpDF4RemdHHE/HrJJhR3zpzAQ6zsHqFv0i4lCWTUf4sX+cq3vSu7fKO4QJtm97S1sbcnmHonVE3QPzLOsqsY630Wy5JzrPK3gUvQLgfIsovo2v+dosITL8WbvjU1mEXhIwfuuBhYmYSKySZ0X9gpHGhdxRd+J8M7riPfN7kHLP
isc.org. 7200 IN RRSIG DNSKEY 5 2 7200 20150204230128 20150105230128 4521 isc.org. F7Lm/p8NrLlHT1rzV09lYxakAu7fGcY9sRnZ2uLlq9d3SpXIXGUuudPg61sd1GdqrRRKiRwfXvNsmvpNL2t8B1/k3gpNUT9V/+SBkI99PKNSkXijVToCebFkCIjqgyjPXkXXFB28E8ZhUDjjYp1LAVMGsfBEnaw7NeHg4MQ3v10=
isc.org. 7200 IN RRSIG DNSKEY 5 2 7200 20150204230128 20150105230128 12892 isc.org. KFk6zXeVu/lULIjwpu5pzRonoksbZMC0Y0qr5K7SpzZK0P/pG4iEzDdSVHA8st+QxNxQ7O4aypeo2jxiJT61OfRzUhjKwopTPVRiiREDV7DFU/fEkgCYXWPlOP7w/An0NzIPc5OLxCDovQefKKgrJaA0hjrd+bTeINgLGdmra+b4FCgYusIZ9Cp+iNs/dByc6cGexce0a0JCyu/vBLnjzo0byjckZm/iiL4BPwtqlaV+NyXFgjucAoqegpSoUpAz1ozCNz9CcJ4yfA9HpWdiWLpYdO3hMt8kHJbk2DxJNkkLRdOP6ZES+3RBUgMgo0FnIYCrVC8QYYQGTO8f2cdfBw==
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 923 bytes
###############################################
dnssecjava-1.1.3/src/test/resources/recordings/org_jitsi_dnssec_TestCNames/testCNameToSignedMX 0000664 0000000 0000000 00000017160 13020541473 0032706 0 ustar 00root root 0000000 0000000 #Date: 2015-01-06T22:34:59+01:00
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 55073
;; flags: qr aa rd ra cd ; qd: 1 an: 2 au: 4 ad: 1
;; QUESTIONS:
;; csigned.ingotronic.ch., type = MX, class = IN
;; ANSWERS:
csigned.ingotronic.ch. 300 IN CNAME www.ingotronic.ch.
csigned.ingotronic.ch. 300 IN RRSIG CNAME 5 3 300 20150125005754 20141226001054 17430 ingotronic.ch. ZBVECD9hhC0kSJPnvROZVE5bcN7mtDOuoYEJeTJZzuVU9ipLU7QljKmz4Lxhqq/MbdkpkR9Q2IgTjoDfVFbgZeattaQxjytAmKawXSFD6MzGEC2+JxE0+d1Q0N/1i+fH4EiIFpAZ3QDJjB6DIVb2cwX6TKGeETib2eB9g6aL+Dc=
;; AUTHORITY RECORDS:
ingotronic.ch. 300 IN SOA ns1.ingotronic.ch. admin.ingotronic.ch. 2013032762 300 60 864000 300
ingotronic.ch. 300 IN RRSIG SOA 5 2 300 20150125021244 20141226011244 17430 ingotronic.ch. WDLpp9G0P/rlMBfpFn9sAfpEFoBnQfwyGSXbGCc/LG1FSkJoKLDQYDY696scLNsJgkrzZeJrl0oSSvA8AvRUhYRrmuqWMxTVFgYlRwPwqEMCKUqiVhKGVF4NYemoBiUQC4nJwBZd57xKCiF4AQ4CodBtiZxefJFAlTNE0g2yxtM=
www.ingotronic.ch. 300 IN NSEC z.ingotronic.ch. A AAAA RRSIG NSEC
www.ingotronic.ch. 300 IN RRSIG NSEC 5 3 300 20150125012443 20141226010256 17430 ingotronic.ch. fMbLmn92jrN7YeM4XWcq7/kKLiPB3Ll4yQSLiPRWQw79ZVeNJMkqEqdstEnnTyKu/hAId6YpvMKsJnIfCTVyoO75i6CaEKXOpvf9AT7TstEUj0YKjp4vWvcNs2F2144nrnqnaVFX8ZTxnUV50R+/AsqtKA+2/Tky6SlNhzeWVMI=
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 670 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 4926
;; flags: qr rd ra ad cd ; qd: 1 an: 4 au: 0 ad: 1
;; QUESTIONS:
;; ., type = DNSKEY, class = IN
;; ANSWERS:
. 87374 IN DNSKEY 257 3 8 AwEAAagAIKlVZrpC6Ia7gEzahOR+9W29euxhJhVVLOyQbSEW0O8gcCjFFVQUTf6v58fLjwBd0YI0EzrAcQqBGCzh/RStIoO8g0NfnfL2MTJRkxoXbfDaUeVPQuYEhg37NZWAJQ9VnMVDxP/VHL496M/QZxkjf5/Efucp2gaDX6RS6CXpoY68LsvPVjR0ZSwzz1apAzvN9dlzEheX7ICJBBtuA6G3LQpzW5hOA2hzCTMjJPJ8LbqF6dsV6DoBQzgul0sGIcGOYl7OyQdXfZ57relSQageu+ipAdTTJ25AsRTAoub8ONGcLmqrAmRLKBP1dfwhYB4N7knNnulqQxA+Uk1ihz0=
. 87374 IN DNSKEY 256 3 8 AwEAAe3fSrbLBy3LOS7pnxEUhvPZTE2H5dIGsI/UfruI/nOEvWWa/PSX2BFedBkEqOlYdjdNF2f+6lmfk2Od/xu0v5bVqxFE+/24v3hZSlWBxvXzPTAGHrbW/IJYEPqlzVOAS4XdUgHg0N7IbLywNHMvB+Yf+Nm6ctyXXFLV4WTNnzs7
. 87374 IN DNSKEY 256 3 8 AwEAAaPD7Y7XIi1MOEREJNTrRhyqsY3gff6JWzg+XCbqut1sbcbvqyssHw8DT1AkRaAC92pO8xuyq5QEgEPL1IHfABLwpwXI5gTj4gdwi86bpkmlWs9fRpnn4DPDCTdrnxIejJXgClHikLJF3u3CdpNCMijq4CKdQbMlRZ3avv+G7rh7
. 87374 IN RRSIG DNSKEY 8 0 172800 20150115235959 20150101000000 19036 . i8cAxD2pvQi1oAyvQxRpDfFlbqPzW+69QQEsDwE1eWOm5AtawO9U7lmsGps7sy/fVNvl1ljKBj4Djp9pb3U2FLogjiIlW0cDAkPmLlG9t+b/pjEfBNlhjANUVN06pvQVAfm+LcF26EaWT6FlISBqb6jSy4BHRa3Bdc4Sx7+pRSYSqVVvYxLkfAWsKPqGkvWhebJDndJJV9syXQXgZ+v/uJ+6XOS43xkAdeL8iBzIs/FlwMTfh3tVe3d0lb65IBBLlCzeQuetX+0Vu1YFcnD0mHc/wS2ZnAV5toAFmyVQBoY/XAZiZeaOkcROJ6Zmqezy7liwK7BqsYyAZntMhk8lbg==
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 883 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 65501
;; flags: qr rd ra ad cd ; qd: 1 an: 2 au: 0 ad: 1
;; QUESTIONS:
;; ch., type = DS, class = IN
;; ANSWERS:
ch. 974 IN DS 46375 8 2 8F96646FC68BB7E4AF4C0750A6096FBC0D4ECDA3D3FA6DA06FDDB42EE50C6CF3
ch. 974 IN RRSIG DS 8 1 86400 20150112170000 20150105160000 16665 . thY7xYWBBxiBjqbQIb9fAG4TmQgnziwM7q6P1T3/ITxmECdvOCQnnZA3uD7qmN8uM0HudsD7+y+zgD3rsH4RSTKdL4kHSI0OnCxToMTvklghEgFDezqIRm8NkWdI2H4Stwrj20nYKSpLQxPI2EE54gs18P3KyO8bAUYv8Qx73xU=
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 238 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 20356
;; flags: qr rd ra ad cd ; qd: 1 an: 4 au: 0 ad: 1
;; QUESTIONS:
;; ch., type = DNSKEY, class = IN
;; ANSWERS:
ch. 975 IN DNSKEY 257 3 8 AwEAAb7GhhZ8IAy/AhwmSms5DeQK5ad09wIIplEpYoiAIYXPtJvT1ReFzyfTp/2YP+g/PWDwHPh4qKAHa9x0VgbIQcGAeNakmfkAdWEmCnca323/SAml3mwfaX62G7/uYWae5zh8QTxZKNd+K1yZ5x0IxnI31chSl5xymRbTEHYZDKwSIRFM3fTxUMt93WFaBVWELReYotJBr++rvAWdnlay5TPBTvheLBkaiqtgM4GP8HK07Y+86lsZnEsj5K3G1KTV5SPpa82rqYAwxG9VKbmSE/6/kBR5jJHjt1rRt5Oe7v18aEtw0YCEN4vxq+KuvMoNVqXUsE9LBwHJD+QNwi6wmB0=
ch. 975 IN DNSKEY 256 3 8 AwEAAcsg0kY6fw1wzYMhSAKTy+Y2JzAst66P/1odp9NECJJHbU8f4nwziI3onoFSBV0ZiSZhY1aH5dhdDZ7BkrqhVXSrZPAz0CvzjIxmB1gSOf9DeZvjQvoy97HqYolxsf+B3QQv2RKBT67elF5+JisKg3/dQISelKn8LhabSoVrMlD1
ch. 975 IN DNSKEY 256 3 8 AwEAAcSLdT0fEmcFmLpeUkAJoeVaHKiu+nbuc43fWlqaCRVf8t2HA4uWxOk0O5ci9nrFTc8nq8oa5fk5Cj7CHh4yrX9qUCfTdIWTyp8BDEdJpS+Dyb0u9wQuVj+nQMj4fLzdQf4TJs3/qxuiLr3nL1UUwlhhXeqSqGVb7p3mtB5HJ8ad
ch. 975 IN RRSIG DNSKEY 8 1 86400 20150127100909 20141212090909 46375 ch. bT8q0FWyeMH0SulNo6UdIIgZYNATwYsee2bikq2Gh339Bufma8eaqWIPYT3XKmxYPBFOw0bVl+kLZxTwbR1CFoCDXoP+qgQhh4mf9qkNiv2CDSc+0FE3FRREn+DAhYTUEuB58FPiPakFB8s8O7T+k2qhDae7jy4/y7Jl1lnjaBY8s7bzOUPhF0KKCNZmvoKwtL23ZdVeTSV1xM3jkiNnpzBKbcoSWECSGJVp1SE0BnRXdwQP41YTXFZ0310YjaTAUCC5qbMIWdEkHjfdSQtKBImnc85mkapq9w++XQ4zhauPWBtrPV3CcoCahjUaWdjrKVkibomlJZaN8MEO23CfQw==
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 893 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 52970
;; flags: qr rd ra cd ; qd: 1 an: 3 au: 0 ad: 1
;; QUESTIONS:
;; ingotronic.ch., type = DS, class = IN
;; ANSWERS:
ingotronic.ch. 3583 IN DS 6031 5 2 4A948F2FDADA24686E473EDAC00DCF972584C75E3FAA92C2021B6221449FF87E
ingotronic.ch. 3583 IN DS 6031 5 1 733D0218B571CD617B1A7493564B9FC4F12ADE82
ingotronic.ch. 3583 IN RRSIG DS 8 2 3600 20150129033614 20150105123019 60789 ch. rVPJP2HhzW7OkroK2axFj5Lb4iVWCH8Fp/Iq1rF952NDo72b8RiKje2RaAKJAGQ+wd0YgE+PAej04GCmkhlDJA/zvPeeTxuhy3HbJzReMlQ7fjyH+wW1hli+FuIYvogXWf7nO/9VyPORt8X/f/pjrOr3Vlj9sGLN8TGYpEuVSw4=
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 288 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 24421
;; flags: qr aa rd ra cd ; qd: 1 an: 4 au: 0 ad: 1
;; QUESTIONS:
;; ingotronic.ch., type = DNSKEY, class = IN
;; ANSWERS:
ingotronic.ch. 300 IN DNSKEY 257 3 5 AwEAAeA1vzmjaB+eBAcvhzpKEgAEFpvQ1rg4uKDW6MsQtacKoqBpgyep2+LuWotz5p/xYxj3NGsArwN8Ad5cY0FHRr8miTT0elOv6nvlqGIfRuhj/BXAQ1x4ihpSFslHw0lJMYFwxsUZWpUyjWX/nv1xRZMMwF46gui0N4OEbyTYusCk77D+A71k+K0EAitFIbIH4GCUKmH1H7HmXhSVH9bN/n7KEGwW32lmsuuUcJoRKDkcUvbMXY/9Xoa2quERrUg/rBbDUHowRPjYDS5GzY1+f4YY8s40BufGiqyUTKKXL953MVFK8gmezXA0hbmrnZ7CBOw/7238mORAdzExaX8n7CE=
ingotronic.ch. 300 IN DNSKEY 256 3 5 AwEAAZ2Xh77GFzpEDx7EHYxShqltHgkiG+BOjBGifEmnJhQSdE5/yNSLFNcdhZZ8HUPxYnaedTqJcFFg4AzUsQklF/fECegTJdZjaj2WoL0/I8K7HMfY/hVuRZUWPNglYi8agJRX6gdkFTCpUNI7stpgKqxtzUJhhw15uG/lKMplwqUr
ingotronic.ch. 300 IN RRSIG DNSKEY 5 2 300 20150125003700 20141226001657 6031 ingotronic.ch. rs1QlP2SlSpA2ELbzwg3DgWLzXWL3Lpv6CUJE2Q0qH2Zp7Qdy3cD+ZEtNh9v24Qv1M6JJ3zFt8mmZoCeW2ycuMbJCqBkW9CBuwF+VznZvZY2MxwPipvhvEEGP//0M8YAZJ66yQPDv3PTdAP8FYbIrJyvY44vwyncwbslpfHT9jAsrbfr3vuMuWps86dnP462q+0s1TxBfqi8mzo3gdavjHKWVNwohLahLKT+tWeu6DSzQv0YwMjwtkLgF7QRgx3ctIIkloOrnx9nHH1N6y+hxEB89fOlyVDjHhgL5uVtsD5fEdT0FJ2Gc/2nShEMMqIwr1/J9kUq1mNySff/uEe65Q==
ingotronic.ch. 300 IN RRSIG DNSKEY 5 2 300 20150125003700 20141226001657 17430 ingotronic.ch. mEwZjhQqeWksWD0TCnNBrtce4YkWJL3edqL6PvAUu8Fn+Ih437kEs3+pqdkgRsdYQ9HW+lBm/8pWwJlNAv0bi9NykItXMwAUFtncgq+6Pnh3iAM972GXSa5VV4LcGQ5b8CBdHCHiEKDqyPv5Hr5QfYL/FQaWlcNRh4QZZlZNPFA=
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 940 bytes
###############################################
dnssecjava-1.1.3/src/test/resources/recordings/org_jitsi_dnssec_TestCNames/testCNameToSignedNsec3 0000664 0000000 0000000 00000024561 13020541473 0033340 0 ustar 00root root 0000000 0000000 #Date: 2015-01-06T22:34:57+01:00
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 18324
;; flags: qr aa rd ra cd ; qd: 1 an: 4 au: 2 ad: 3
;; QUESTIONS:
;; csigned.nsec3.ingotronic.ch., type = A, class = IN
;; ANSWERS:
csigned.nsec3.ingotronic.ch. 300 IN CNAME www.ingotronic.ch.
csigned.nsec3.ingotronic.ch. 300 IN RRSIG CNAME 7 4 300 20150125000452 20141225235516 62417 nsec3.ingotronic.ch. BaI9bT+Df9JqQuHHfPrcDsghZm7o1CCRXla/uzgUOBcCggW5Bk90hlXm0ih7ZIzmk764zHWNOcMJoBrCQ7XcFVIWVp+YUUVqCM6LmqPkz6rXwmeNpAS2mc04cjEg/DGEMTVo3IJLVW+kv7orci9AdWpaaZCC9oKz7aX68AlJyPc=
www.ingotronic.ch. 300 IN A 127.0.0.1
www.ingotronic.ch. 300 IN RRSIG A 5 3 300 20150125012443 20141226010256 17430 ingotronic.ch. hkD2bkHZKHoJX8cg69j6l1JXE7iYlVFc0iMo3/3hcq4TqieiT2El/9DLfMSxa7XyB/HRDG5Ul61E56pwlCDdxkwemtAuTzjCpqAtvQ5l5OEtTM4i6nijKBkRRzHjh99qDI1jh9GFv3jkTk5m7iaMQemUB4VTjKGLcZHXvWmQLbg=
;; AUTHORITY RECORDS:
ingotronic.ch. 300 IN NS ns1.ingotronic.ch.
ingotronic.ch. 300 IN RRSIG NS 5 2 300 20150125000532 20141225234703 17430 ingotronic.ch. VuzVJM3McSHlcdngCG/G23zCikq8tXE0CZV2ZSgUFXXFMIEoM6PMi1QRQ/8VF3tee4WGpRx2jhtkui0wFRFfwIhW7G1uPDT4qogaR3KLIyuCEsMxhRH3WJZNrLmLqlSBGvd9OBJwbmryqm3Zzqvrk+E+rh8OJeifnBBpHAX4eHg=
;; ADDITIONAL RECORDS:
ns1.ingotronic.ch. 300 IN A 62.192.5.131
ns1.ingotronic.ch. 300 IN RRSIG A 5 3 300 20150125005754 20141226001054 17430 ingotronic.ch. fNG1RZM53pXwBxruHNaSZszxVzNLoCq8VZsTjAzYH2vSLzHXYVGJFTLIeY0K9APAdyJU8WuwmABmn7XY0Kg39kRG77uoFlqUws2PdTz2QKOwJGZY7W88Ak2Y9lkDBcK8o3wJHVptrT8R7p/1U7UfjF0kqPUkakk2B0EbFWdagFg=
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 822 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 10716
;; flags: qr rd ra ad cd ; qd: 1 an: 4 au: 0 ad: 1
;; QUESTIONS:
;; ., type = DNSKEY, class = IN
;; ANSWERS:
. 87376 IN DNSKEY 256 3 8 AwEAAe3fSrbLBy3LOS7pnxEUhvPZTE2H5dIGsI/UfruI/nOEvWWa/PSX2BFedBkEqOlYdjdNF2f+6lmfk2Od/xu0v5bVqxFE+/24v3hZSlWBxvXzPTAGHrbW/IJYEPqlzVOAS4XdUgHg0N7IbLywNHMvB+Yf+Nm6ctyXXFLV4WTNnzs7
. 87376 IN DNSKEY 256 3 8 AwEAAaPD7Y7XIi1MOEREJNTrRhyqsY3gff6JWzg+XCbqut1sbcbvqyssHw8DT1AkRaAC92pO8xuyq5QEgEPL1IHfABLwpwXI5gTj4gdwi86bpkmlWs9fRpnn4DPDCTdrnxIejJXgClHikLJF3u3CdpNCMijq4CKdQbMlRZ3avv+G7rh7
. 87376 IN DNSKEY 257 3 8 AwEAAagAIKlVZrpC6Ia7gEzahOR+9W29euxhJhVVLOyQbSEW0O8gcCjFFVQUTf6v58fLjwBd0YI0EzrAcQqBGCzh/RStIoO8g0NfnfL2MTJRkxoXbfDaUeVPQuYEhg37NZWAJQ9VnMVDxP/VHL496M/QZxkjf5/Efucp2gaDX6RS6CXpoY68LsvPVjR0ZSwzz1apAzvN9dlzEheX7ICJBBtuA6G3LQpzW5hOA2hzCTMjJPJ8LbqF6dsV6DoBQzgul0sGIcGOYl7OyQdXfZ57relSQageu+ipAdTTJ25AsRTAoub8ONGcLmqrAmRLKBP1dfwhYB4N7knNnulqQxA+Uk1ihz0=
. 87376 IN RRSIG DNSKEY 8 0 172800 20150115235959 20150101000000 19036 . i8cAxD2pvQi1oAyvQxRpDfFlbqPzW+69QQEsDwE1eWOm5AtawO9U7lmsGps7sy/fVNvl1ljKBj4Djp9pb3U2FLogjiIlW0cDAkPmLlG9t+b/pjEfBNlhjANUVN06pvQVAfm+LcF26EaWT6FlISBqb6jSy4BHRa3Bdc4Sx7+pRSYSqVVvYxLkfAWsKPqGkvWhebJDndJJV9syXQXgZ+v/uJ+6XOS43xkAdeL8iBzIs/FlwMTfh3tVe3d0lb65IBBLlCzeQuetX+0Vu1YFcnD0mHc/wS2ZnAV5toAFmyVQBoY/XAZiZeaOkcROJ6Zmqezy7liwK7BqsYyAZntMhk8lbg==
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 883 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 47183
;; flags: qr rd ra ad cd ; qd: 1 an: 2 au: 0 ad: 1
;; QUESTIONS:
;; ch., type = DS, class = IN
;; ANSWERS:
ch. 976 IN DS 46375 8 2 8F96646FC68BB7E4AF4C0750A6096FBC0D4ECDA3D3FA6DA06FDDB42EE50C6CF3
ch. 976 IN RRSIG DS 8 1 86400 20150112170000 20150105160000 16665 . thY7xYWBBxiBjqbQIb9fAG4TmQgnziwM7q6P1T3/ITxmECdvOCQnnZA3uD7qmN8uM0HudsD7+y+zgD3rsH4RSTKdL4kHSI0OnCxToMTvklghEgFDezqIRm8NkWdI2H4Stwrj20nYKSpLQxPI2EE54gs18P3KyO8bAUYv8Qx73xU=
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 238 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 24709
;; flags: qr rd ra ad cd ; qd: 1 an: 4 au: 0 ad: 1
;; QUESTIONS:
;; ch., type = DNSKEY, class = IN
;; ANSWERS:
ch. 977 IN DNSKEY 257 3 8 AwEAAb7GhhZ8IAy/AhwmSms5DeQK5ad09wIIplEpYoiAIYXPtJvT1ReFzyfTp/2YP+g/PWDwHPh4qKAHa9x0VgbIQcGAeNakmfkAdWEmCnca323/SAml3mwfaX62G7/uYWae5zh8QTxZKNd+K1yZ5x0IxnI31chSl5xymRbTEHYZDKwSIRFM3fTxUMt93WFaBVWELReYotJBr++rvAWdnlay5TPBTvheLBkaiqtgM4GP8HK07Y+86lsZnEsj5K3G1KTV5SPpa82rqYAwxG9VKbmSE/6/kBR5jJHjt1rRt5Oe7v18aEtw0YCEN4vxq+KuvMoNVqXUsE9LBwHJD+QNwi6wmB0=
ch. 977 IN DNSKEY 256 3 8 AwEAAcSLdT0fEmcFmLpeUkAJoeVaHKiu+nbuc43fWlqaCRVf8t2HA4uWxOk0O5ci9nrFTc8nq8oa5fk5Cj7CHh4yrX9qUCfTdIWTyp8BDEdJpS+Dyb0u9wQuVj+nQMj4fLzdQf4TJs3/qxuiLr3nL1UUwlhhXeqSqGVb7p3mtB5HJ8ad
ch. 977 IN DNSKEY 256 3 8 AwEAAcsg0kY6fw1wzYMhSAKTy+Y2JzAst66P/1odp9NECJJHbU8f4nwziI3onoFSBV0ZiSZhY1aH5dhdDZ7BkrqhVXSrZPAz0CvzjIxmB1gSOf9DeZvjQvoy97HqYolxsf+B3QQv2RKBT67elF5+JisKg3/dQISelKn8LhabSoVrMlD1
ch. 977 IN RRSIG DNSKEY 8 1 86400 20150127100909 20141212090909 46375 ch. bT8q0FWyeMH0SulNo6UdIIgZYNATwYsee2bikq2Gh339Bufma8eaqWIPYT3XKmxYPBFOw0bVl+kLZxTwbR1CFoCDXoP+qgQhh4mf9qkNiv2CDSc+0FE3FRREn+DAhYTUEuB58FPiPakFB8s8O7T+k2qhDae7jy4/y7Jl1lnjaBY8s7bzOUPhF0KKCNZmvoKwtL23ZdVeTSV1xM3jkiNnpzBKbcoSWECSGJVp1SE0BnRXdwQP41YTXFZ0310YjaTAUCC5qbMIWdEkHjfdSQtKBImnc85mkapq9w++XQ4zhauPWBtrPV3CcoCahjUaWdjrKVkibomlJZaN8MEO23CfQw==
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 893 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 44808
;; flags: qr rd ra cd ; qd: 1 an: 3 au: 0 ad: 1
;; QUESTIONS:
;; ingotronic.ch., type = DS, class = IN
;; ANSWERS:
ingotronic.ch. 3585 IN DS 6031 5 2 4A948F2FDADA24686E473EDAC00DCF972584C75E3FAA92C2021B6221449FF87E
ingotronic.ch. 3585 IN DS 6031 5 1 733D0218B571CD617B1A7493564B9FC4F12ADE82
ingotronic.ch. 3585 IN RRSIG DS 8 2 3600 20150129033614 20150105123019 60789 ch. rVPJP2HhzW7OkroK2axFj5Lb4iVWCH8Fp/Iq1rF952NDo72b8RiKje2RaAKJAGQ+wd0YgE+PAej04GCmkhlDJA/zvPeeTxuhy3HbJzReMlQ7fjyH+wW1hli+FuIYvogXWf7nO/9VyPORt8X/f/pjrOr3Vlj9sGLN8TGYpEuVSw4=
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 288 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 43983
;; flags: qr aa rd ra cd ; qd: 1 an: 4 au: 0 ad: 1
;; QUESTIONS:
;; ingotronic.ch., type = DNSKEY, class = IN
;; ANSWERS:
ingotronic.ch. 300 IN DNSKEY 256 3 5 AwEAAZ2Xh77GFzpEDx7EHYxShqltHgkiG+BOjBGifEmnJhQSdE5/yNSLFNcdhZZ8HUPxYnaedTqJcFFg4AzUsQklF/fECegTJdZjaj2WoL0/I8K7HMfY/hVuRZUWPNglYi8agJRX6gdkFTCpUNI7stpgKqxtzUJhhw15uG/lKMplwqUr
ingotronic.ch. 300 IN DNSKEY 257 3 5 AwEAAeA1vzmjaB+eBAcvhzpKEgAEFpvQ1rg4uKDW6MsQtacKoqBpgyep2+LuWotz5p/xYxj3NGsArwN8Ad5cY0FHRr8miTT0elOv6nvlqGIfRuhj/BXAQ1x4ihpSFslHw0lJMYFwxsUZWpUyjWX/nv1xRZMMwF46gui0N4OEbyTYusCk77D+A71k+K0EAitFIbIH4GCUKmH1H7HmXhSVH9bN/n7KEGwW32lmsuuUcJoRKDkcUvbMXY/9Xoa2quERrUg/rBbDUHowRPjYDS5GzY1+f4YY8s40BufGiqyUTKKXL953MVFK8gmezXA0hbmrnZ7CBOw/7238mORAdzExaX8n7CE=
ingotronic.ch. 300 IN RRSIG DNSKEY 5 2 300 20150125003700 20141226001657 6031 ingotronic.ch. rs1QlP2SlSpA2ELbzwg3DgWLzXWL3Lpv6CUJE2Q0qH2Zp7Qdy3cD+ZEtNh9v24Qv1M6JJ3zFt8mmZoCeW2ycuMbJCqBkW9CBuwF+VznZvZY2MxwPipvhvEEGP//0M8YAZJ66yQPDv3PTdAP8FYbIrJyvY44vwyncwbslpfHT9jAsrbfr3vuMuWps86dnP462q+0s1TxBfqi8mzo3gdavjHKWVNwohLahLKT+tWeu6DSzQv0YwMjwtkLgF7QRgx3ctIIkloOrnx9nHH1N6y+hxEB89fOlyVDjHhgL5uVtsD5fEdT0FJ2Gc/2nShEMMqIwr1/J9kUq1mNySff/uEe65Q==
ingotronic.ch. 300 IN RRSIG DNSKEY 5 2 300 20150125003700 20141226001657 17430 ingotronic.ch. mEwZjhQqeWksWD0TCnNBrtce4YkWJL3edqL6PvAUu8Fn+Ih437kEs3+pqdkgRsdYQ9HW+lBm/8pWwJlNAv0bi9NykItXMwAUFtncgq+6Pnh3iAM972GXSa5VV4LcGQ5b8CBdHCHiEKDqyPv5Hr5QfYL/FQaWlcNRh4QZZlZNPFA=
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 940 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 59500
;; flags: qr aa rd ra cd ; qd: 1 an: 3 au: 0 ad: 1
;; QUESTIONS:
;; nsec3.ingotronic.ch., type = DS, class = IN
;; ANSWERS:
nsec3.ingotronic.ch. 300 IN DS 16758 7 1 1720FF268E09A2CB63805EC8782D10AAD20E12A5
nsec3.ingotronic.ch. 300 IN DS 16758 7 2 3C8DC02750A1636F829B45D6E6D642866768A9CD40A013AD9D25AB63734FFA13
nsec3.ingotronic.ch. 300 IN RRSIG DS 5 3 300 20150125011134 20141226002644 17430 ingotronic.ch. hNurzlGhlyHbSgezPDuhIrtN9ZMsMXZbKGc7HD5rUuM88wD3fM97NxdzF+2Hi1USvBZ5GsQv63L+lAzf+mFPBoPIFHtTiAv8up7kQKRKmi/EzzkCYd/CC4UYdDZbaUyv7esh7spSOGwjPJNdK831p+MgltoWaYtnSGVMgOKk5mc=
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 305 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 23927
;; flags: qr aa rd ra cd ; qd: 1 an: 4 au: 0 ad: 1
;; QUESTIONS:
;; nsec3.ingotronic.ch., type = DNSKEY, class = IN
;; ANSWERS:
nsec3.ingotronic.ch. 300 IN DNSKEY 257 3 7 AwEAAaBuJTf9oGyeTH3biUkAFLrsYrkodX1H7Snsui4XsDHFCBvs5XYacHbs0Jg0/O51KPjmNnjwMW8SSyDkKqYQ+9uYAf2EQ/pnD/VGQqnV2cw0Vwk/t0E2V4FUCju4pnAoyzZFZXGs1eWbX9JXu++b0Azp+ACq6485qJLzHhWDiIrPoK/SvdbFVRK4s+nPPJLH3NGBbtdz6kPq7aFWYBMoGeAZdN1wsQpcNWUo5eOmaJY53nMc7+rDpAyYlMe/FKwSZdX2ZDd63Qsa6Im4FVUJq/nWLq7tlQ/mWks15uDTQyJy/OWfA0ICCO4N9Fel9rThJNpJWEzOCblvZyBoy405kZk=
nsec3.ingotronic.ch. 300 IN DNSKEY 256 3 7 AwEAAccAWxkTVGZ6UAp0VEozAlYpARhbh6Y6tYOl6Fg3UeBNFFtDQ9fTEEt1NkbnR9u8KkpVN6a67avlYiUN1egDqEwzDU7R1Rw+/USdhm2hqOARmmu3DBgjjX/iXjZLyv310cOGFJZ/smcodlDL4pDAAoPxh/qs6KEBaT0sc1KWcGq3
nsec3.ingotronic.ch. 300 IN RRSIG DNSKEY 7 3 300 20150125001457 20141226000444 16758 nsec3.ingotronic.ch. mXi1ylDi8XkRPup+YlT8GPdYE+P7gb6+/VdAwtodI916IzrkGkOHOTLbnrbAqqJOh0HxVCYXdxovmEcbJKUFKwplrQg3XD7/9Sq4pKU1MhMFEGrm/QPkM4u0mgjQwyToDLGuPHuFyur3FSjO/n54uGhAEft9JOFk/WKtWdCnm2LLyQrpC6herA3efFaI8kZhdoEY02AwihWVJxHasmz7lOoKRgNrkfELU+fN4+V7ISsRfJMyZc6q5PuNeG6vFD0uNE8tpdLJCSMurKYVpelvYqzFIcRTYcIjXwmS+L3DGjupqWMzFZVmpQM62JG3KCCD0ffpnNb0nWoSoHwpSeh/3Q==
nsec3.ingotronic.ch. 300 IN RRSIG DNSKEY 7 3 300 20150125001457 20141226000444 62417 nsec3.ingotronic.ch. PyCrf8T5dAfJzapb1p+kcTALPjDuD2niSaXXo0KeHAunT+6gJicLML2S/ZpiYr7X7Ma4Z0TYqE02qH6pcLYNnSgv9BE8sZO0nRtPekSyTy5nLi4hFADYhjb3UjaB85qmQZcqm64vC/CJhWO4t6Eixg/5MYALw+Qdy5Fo0qy/U5E=
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 958 bytes
###############################################
dnssecjava-1.1.3/src/test/resources/recordings/org_jitsi_dnssec_TestCNames/testCNameToSubSigned 0000664 0000000 0000000 00000041105 13020541473 0033107 0 ustar 00root root 0000000 0000000 #Date: 2015-01-06T22:34:55+01:00
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 20853
;; flags: qr aa rd ra cd ; qd: 1 an: 4 au: 2 ad: 3
;; QUESTIONS:
;; cssub.ingotronic.ch., type = A, class = IN
;; ANSWERS:
cssub.ingotronic.ch. 300 IN CNAME www.nsec3.ingotronic.ch.
cssub.ingotronic.ch. 300 IN RRSIG CNAME 5 3 300 20150125005754 20141226001054 17430 ingotronic.ch. Xmz99ucY+QTITwoo0KkCpZqmxqJp67uxfAvpOTSviID9cdQCs/LX8H5cPPOrgCxRIutuZczRKoSwt/w49Z3Kd9B2HrOfU3TY6pa7cXnG6vzV4Er/RKxdsIQJWCnzaF734FLn906exR7Cyznm+wSuubJvAiz0LMvC+SjJ9IynVx0=
www.nsec3.ingotronic.ch. 300 IN A 127.0.0.1
www.nsec3.ingotronic.ch. 300 IN RRSIG A 7 4 300 20150125011553 20141226004758 62417 nsec3.ingotronic.ch. jQhCY33aj9YTcCTHgl71PhM02o2LL6tdTy5M8TQw/Kt8D7wHxjVpu75eT9XEaM3abIqvygero5hCxyPW6IfF+FKmdx3MNigQiaB2sKu2XDNmFMbaucmVAWDRDMRY1BFavjz316JSb0rXX3XcS/ixbj9+jAm9lCXROcuzmOPB7vw=
;; AUTHORITY RECORDS:
nsec3.ingotronic.ch. 300 IN NS ns1.ingotronic.ch.
nsec3.ingotronic.ch. 300 IN RRSIG NS 7 3 300 20150125010458 20141226002309 62417 nsec3.ingotronic.ch. fl2Q0YQQ1TduolGLyQx8vGqSApoBbb6A+go5SLFBYQobrPfO/rb+SM8JvnlzNX/Xa7dRhDYrnfBTFUm1mCur9aIi34gu5UwDNQvt/GXY5dC3+DEy/28bTZ43UuCs+qGH9u9leFwGX4neFNl0s5B4RpxBN4is8dXMUvOda6QcsOw=
;; ADDITIONAL RECORDS:
ns1.ingotronic.ch. 300 IN A 62.192.5.131
ns1.ingotronic.ch. 300 IN RRSIG A 5 3 300 20150125005754 20141226001054 17430 ingotronic.ch. fNG1RZM53pXwBxruHNaSZszxVzNLoCq8VZsTjAzYH2vSLzHXYVGJFTLIeY0K9APAdyJU8WuwmABmn7XY0Kg39kRG77uoFlqUws2PdTz2QKOwJGZY7W88Ak2Y9lkDBcK8o3wJHVptrT8R7p/1U7UfjF0kqPUkakk2B0EbFWdagFg=
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 826 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 24439
;; flags: qr rd ra ad cd ; qd: 1 an: 4 au: 0 ad: 1
;; QUESTIONS:
;; ., type = DNSKEY, class = IN
;; ANSWERS:
. 87379 IN DNSKEY 257 3 8 AwEAAagAIKlVZrpC6Ia7gEzahOR+9W29euxhJhVVLOyQbSEW0O8gcCjFFVQUTf6v58fLjwBd0YI0EzrAcQqBGCzh/RStIoO8g0NfnfL2MTJRkxoXbfDaUeVPQuYEhg37NZWAJQ9VnMVDxP/VHL496M/QZxkjf5/Efucp2gaDX6RS6CXpoY68LsvPVjR0ZSwzz1apAzvN9dlzEheX7ICJBBtuA6G3LQpzW5hOA2hzCTMjJPJ8LbqF6dsV6DoBQzgul0sGIcGOYl7OyQdXfZ57relSQageu+ipAdTTJ25AsRTAoub8ONGcLmqrAmRLKBP1dfwhYB4N7knNnulqQxA+Uk1ihz0=
. 87379 IN DNSKEY 256 3 8 AwEAAe3fSrbLBy3LOS7pnxEUhvPZTE2H5dIGsI/UfruI/nOEvWWa/PSX2BFedBkEqOlYdjdNF2f+6lmfk2Od/xu0v5bVqxFE+/24v3hZSlWBxvXzPTAGHrbW/IJYEPqlzVOAS4XdUgHg0N7IbLywNHMvB+Yf+Nm6ctyXXFLV4WTNnzs7
. 87379 IN DNSKEY 256 3 8 AwEAAaPD7Y7XIi1MOEREJNTrRhyqsY3gff6JWzg+XCbqut1sbcbvqyssHw8DT1AkRaAC92pO8xuyq5QEgEPL1IHfABLwpwXI5gTj4gdwi86bpkmlWs9fRpnn4DPDCTdrnxIejJXgClHikLJF3u3CdpNCMijq4CKdQbMlRZ3avv+G7rh7
. 87379 IN RRSIG DNSKEY 8 0 172800 20150115235959 20150101000000 19036 . i8cAxD2pvQi1oAyvQxRpDfFlbqPzW+69QQEsDwE1eWOm5AtawO9U7lmsGps7sy/fVNvl1ljKBj4Djp9pb3U2FLogjiIlW0cDAkPmLlG9t+b/pjEfBNlhjANUVN06pvQVAfm+LcF26EaWT6FlISBqb6jSy4BHRa3Bdc4Sx7+pRSYSqVVvYxLkfAWsKPqGkvWhebJDndJJV9syXQXgZ+v/uJ+6XOS43xkAdeL8iBzIs/FlwMTfh3tVe3d0lb65IBBLlCzeQuetX+0Vu1YFcnD0mHc/wS2ZnAV5toAFmyVQBoY/XAZiZeaOkcROJ6Zmqezy7liwK7BqsYyAZntMhk8lbg==
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 883 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 548
;; flags: qr rd ra ad cd ; qd: 1 an: 2 au: 0 ad: 1
;; QUESTIONS:
;; ch., type = DS, class = IN
;; ANSWERS:
ch. 978 IN DS 46375 8 2 8F96646FC68BB7E4AF4C0750A6096FBC0D4ECDA3D3FA6DA06FDDB42EE50C6CF3
ch. 978 IN RRSIG DS 8 1 86400 20150112170000 20150105160000 16665 . thY7xYWBBxiBjqbQIb9fAG4TmQgnziwM7q6P1T3/ITxmECdvOCQnnZA3uD7qmN8uM0HudsD7+y+zgD3rsH4RSTKdL4kHSI0OnCxToMTvklghEgFDezqIRm8NkWdI2H4Stwrj20nYKSpLQxPI2EE54gs18P3KyO8bAUYv8Qx73xU=
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 238 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 32630
;; flags: qr rd ra ad cd ; qd: 1 an: 4 au: 0 ad: 1
;; QUESTIONS:
;; ch., type = DNSKEY, class = IN
;; ANSWERS:
ch. 979 IN DNSKEY 256 3 8 AwEAAcSLdT0fEmcFmLpeUkAJoeVaHKiu+nbuc43fWlqaCRVf8t2HA4uWxOk0O5ci9nrFTc8nq8oa5fk5Cj7CHh4yrX9qUCfTdIWTyp8BDEdJpS+Dyb0u9wQuVj+nQMj4fLzdQf4TJs3/qxuiLr3nL1UUwlhhXeqSqGVb7p3mtB5HJ8ad
ch. 979 IN DNSKEY 256 3 8 AwEAAcsg0kY6fw1wzYMhSAKTy+Y2JzAst66P/1odp9NECJJHbU8f4nwziI3onoFSBV0ZiSZhY1aH5dhdDZ7BkrqhVXSrZPAz0CvzjIxmB1gSOf9DeZvjQvoy97HqYolxsf+B3QQv2RKBT67elF5+JisKg3/dQISelKn8LhabSoVrMlD1
ch. 979 IN DNSKEY 257 3 8 AwEAAb7GhhZ8IAy/AhwmSms5DeQK5ad09wIIplEpYoiAIYXPtJvT1ReFzyfTp/2YP+g/PWDwHPh4qKAHa9x0VgbIQcGAeNakmfkAdWEmCnca323/SAml3mwfaX62G7/uYWae5zh8QTxZKNd+K1yZ5x0IxnI31chSl5xymRbTEHYZDKwSIRFM3fTxUMt93WFaBVWELReYotJBr++rvAWdnlay5TPBTvheLBkaiqtgM4GP8HK07Y+86lsZnEsj5K3G1KTV5SPpa82rqYAwxG9VKbmSE/6/kBR5jJHjt1rRt5Oe7v18aEtw0YCEN4vxq+KuvMoNVqXUsE9LBwHJD+QNwi6wmB0=
ch. 979 IN RRSIG DNSKEY 8 1 86400 20150127100909 20141212090909 46375 ch. bT8q0FWyeMH0SulNo6UdIIgZYNATwYsee2bikq2Gh339Bufma8eaqWIPYT3XKmxYPBFOw0bVl+kLZxTwbR1CFoCDXoP+qgQhh4mf9qkNiv2CDSc+0FE3FRREn+DAhYTUEuB58FPiPakFB8s8O7T+k2qhDae7jy4/y7Jl1lnjaBY8s7bzOUPhF0KKCNZmvoKwtL23ZdVeTSV1xM3jkiNnpzBKbcoSWECSGJVp1SE0BnRXdwQP41YTXFZ0310YjaTAUCC5qbMIWdEkHjfdSQtKBImnc85mkapq9w++XQ4zhauPWBtrPV3CcoCahjUaWdjrKVkibomlJZaN8MEO23CfQw==
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 893 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 26037
;; flags: qr rd ra cd ; qd: 1 an: 3 au: 0 ad: 1
;; QUESTIONS:
;; ingotronic.ch., type = DS, class = IN
;; ANSWERS:
ingotronic.ch. 3587 IN DS 6031 5 2 4A948F2FDADA24686E473EDAC00DCF972584C75E3FAA92C2021B6221449FF87E
ingotronic.ch. 3587 IN DS 6031 5 1 733D0218B571CD617B1A7493564B9FC4F12ADE82
ingotronic.ch. 3587 IN RRSIG DS 8 2 3600 20150129033614 20150105123019 60789 ch. rVPJP2HhzW7OkroK2axFj5Lb4iVWCH8Fp/Iq1rF952NDo72b8RiKje2RaAKJAGQ+wd0YgE+PAej04GCmkhlDJA/zvPeeTxuhy3HbJzReMlQ7fjyH+wW1hli+FuIYvogXWf7nO/9VyPORt8X/f/pjrOr3Vlj9sGLN8TGYpEuVSw4=
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 288 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 53160
;; flags: qr aa rd ra cd ; qd: 1 an: 4 au: 0 ad: 1
;; QUESTIONS:
;; ingotronic.ch., type = DNSKEY, class = IN
;; ANSWERS:
ingotronic.ch. 300 IN DNSKEY 256 3 5 AwEAAZ2Xh77GFzpEDx7EHYxShqltHgkiG+BOjBGifEmnJhQSdE5/yNSLFNcdhZZ8HUPxYnaedTqJcFFg4AzUsQklF/fECegTJdZjaj2WoL0/I8K7HMfY/hVuRZUWPNglYi8agJRX6gdkFTCpUNI7stpgKqxtzUJhhw15uG/lKMplwqUr
ingotronic.ch. 300 IN DNSKEY 257 3 5 AwEAAeA1vzmjaB+eBAcvhzpKEgAEFpvQ1rg4uKDW6MsQtacKoqBpgyep2+LuWotz5p/xYxj3NGsArwN8Ad5cY0FHRr8miTT0elOv6nvlqGIfRuhj/BXAQ1x4ihpSFslHw0lJMYFwxsUZWpUyjWX/nv1xRZMMwF46gui0N4OEbyTYusCk77D+A71k+K0EAitFIbIH4GCUKmH1H7HmXhSVH9bN/n7KEGwW32lmsuuUcJoRKDkcUvbMXY/9Xoa2quERrUg/rBbDUHowRPjYDS5GzY1+f4YY8s40BufGiqyUTKKXL953MVFK8gmezXA0hbmrnZ7CBOw/7238mORAdzExaX8n7CE=
ingotronic.ch. 300 IN RRSIG DNSKEY 5 2 300 20150125003700 20141226001657 6031 ingotronic.ch. rs1QlP2SlSpA2ELbzwg3DgWLzXWL3Lpv6CUJE2Q0qH2Zp7Qdy3cD+ZEtNh9v24Qv1M6JJ3zFt8mmZoCeW2ycuMbJCqBkW9CBuwF+VznZvZY2MxwPipvhvEEGP//0M8YAZJ66yQPDv3PTdAP8FYbIrJyvY44vwyncwbslpfHT9jAsrbfr3vuMuWps86dnP462q+0s1TxBfqi8mzo3gdavjHKWVNwohLahLKT+tWeu6DSzQv0YwMjwtkLgF7QRgx3ctIIkloOrnx9nHH1N6y+hxEB89fOlyVDjHhgL5uVtsD5fEdT0FJ2Gc/2nShEMMqIwr1/J9kUq1mNySff/uEe65Q==
ingotronic.ch. 300 IN RRSIG DNSKEY 5 2 300 20150125003700 20141226001657 17430 ingotronic.ch. mEwZjhQqeWksWD0TCnNBrtce4YkWJL3edqL6PvAUu8Fn+Ih437kEs3+pqdkgRsdYQ9HW+lBm/8pWwJlNAv0bi9NykItXMwAUFtncgq+6Pnh3iAM972GXSa5VV4LcGQ5b8CBdHCHiEKDqyPv5Hr5QfYL/FQaWlcNRh4QZZlZNPFA=
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 940 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 56207
;; flags: qr rd ra ad cd ; qd: 1 an: 4 au: 0 ad: 1
;; QUESTIONS:
;; ., type = DNSKEY, class = IN
;; ANSWERS:
. 87378 IN DNSKEY 256 3 8 AwEAAe3fSrbLBy3LOS7pnxEUhvPZTE2H5dIGsI/UfruI/nOEvWWa/PSX2BFedBkEqOlYdjdNF2f+6lmfk2Od/xu0v5bVqxFE+/24v3hZSlWBxvXzPTAGHrbW/IJYEPqlzVOAS4XdUgHg0N7IbLywNHMvB+Yf+Nm6ctyXXFLV4WTNnzs7
. 87378 IN DNSKEY 256 3 8 AwEAAaPD7Y7XIi1MOEREJNTrRhyqsY3gff6JWzg+XCbqut1sbcbvqyssHw8DT1AkRaAC92pO8xuyq5QEgEPL1IHfABLwpwXI5gTj4gdwi86bpkmlWs9fRpnn4DPDCTdrnxIejJXgClHikLJF3u3CdpNCMijq4CKdQbMlRZ3avv+G7rh7
. 87378 IN DNSKEY 257 3 8 AwEAAagAIKlVZrpC6Ia7gEzahOR+9W29euxhJhVVLOyQbSEW0O8gcCjFFVQUTf6v58fLjwBd0YI0EzrAcQqBGCzh/RStIoO8g0NfnfL2MTJRkxoXbfDaUeVPQuYEhg37NZWAJQ9VnMVDxP/VHL496M/QZxkjf5/Efucp2gaDX6RS6CXpoY68LsvPVjR0ZSwzz1apAzvN9dlzEheX7ICJBBtuA6G3LQpzW5hOA2hzCTMjJPJ8LbqF6dsV6DoBQzgul0sGIcGOYl7OyQdXfZ57relSQageu+ipAdTTJ25AsRTAoub8ONGcLmqrAmRLKBP1dfwhYB4N7knNnulqQxA+Uk1ihz0=
. 87378 IN RRSIG DNSKEY 8 0 172800 20150115235959 20150101000000 19036 . i8cAxD2pvQi1oAyvQxRpDfFlbqPzW+69QQEsDwE1eWOm5AtawO9U7lmsGps7sy/fVNvl1ljKBj4Djp9pb3U2FLogjiIlW0cDAkPmLlG9t+b/pjEfBNlhjANUVN06pvQVAfm+LcF26EaWT6FlISBqb6jSy4BHRa3Bdc4Sx7+pRSYSqVVvYxLkfAWsKPqGkvWhebJDndJJV9syXQXgZ+v/uJ+6XOS43xkAdeL8iBzIs/FlwMTfh3tVe3d0lb65IBBLlCzeQuetX+0Vu1YFcnD0mHc/wS2ZnAV5toAFmyVQBoY/XAZiZeaOkcROJ6Zmqezy7liwK7BqsYyAZntMhk8lbg==
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 883 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 36556
;; flags: qr rd ra ad cd ; qd: 1 an: 2 au: 0 ad: 1
;; QUESTIONS:
;; ch., type = DS, class = IN
;; ANSWERS:
ch. 978 IN DS 46375 8 2 8F96646FC68BB7E4AF4C0750A6096FBC0D4ECDA3D3FA6DA06FDDB42EE50C6CF3
ch. 978 IN RRSIG DS 8 1 86400 20150112170000 20150105160000 16665 . thY7xYWBBxiBjqbQIb9fAG4TmQgnziwM7q6P1T3/ITxmECdvOCQnnZA3uD7qmN8uM0HudsD7+y+zgD3rsH4RSTKdL4kHSI0OnCxToMTvklghEgFDezqIRm8NkWdI2H4Stwrj20nYKSpLQxPI2EE54gs18P3KyO8bAUYv8Qx73xU=
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 238 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 36210
;; flags: qr rd ra ad cd ; qd: 1 an: 4 au: 0 ad: 1
;; QUESTIONS:
;; ch., type = DNSKEY, class = IN
;; ANSWERS:
ch. 979 IN DNSKEY 256 3 8 AwEAAcsg0kY6fw1wzYMhSAKTy+Y2JzAst66P/1odp9NECJJHbU8f4nwziI3onoFSBV0ZiSZhY1aH5dhdDZ7BkrqhVXSrZPAz0CvzjIxmB1gSOf9DeZvjQvoy97HqYolxsf+B3QQv2RKBT67elF5+JisKg3/dQISelKn8LhabSoVrMlD1
ch. 979 IN DNSKEY 257 3 8 AwEAAb7GhhZ8IAy/AhwmSms5DeQK5ad09wIIplEpYoiAIYXPtJvT1ReFzyfTp/2YP+g/PWDwHPh4qKAHa9x0VgbIQcGAeNakmfkAdWEmCnca323/SAml3mwfaX62G7/uYWae5zh8QTxZKNd+K1yZ5x0IxnI31chSl5xymRbTEHYZDKwSIRFM3fTxUMt93WFaBVWELReYotJBr++rvAWdnlay5TPBTvheLBkaiqtgM4GP8HK07Y+86lsZnEsj5K3G1KTV5SPpa82rqYAwxG9VKbmSE/6/kBR5jJHjt1rRt5Oe7v18aEtw0YCEN4vxq+KuvMoNVqXUsE9LBwHJD+QNwi6wmB0=
ch. 979 IN DNSKEY 256 3 8 AwEAAcSLdT0fEmcFmLpeUkAJoeVaHKiu+nbuc43fWlqaCRVf8t2HA4uWxOk0O5ci9nrFTc8nq8oa5fk5Cj7CHh4yrX9qUCfTdIWTyp8BDEdJpS+Dyb0u9wQuVj+nQMj4fLzdQf4TJs3/qxuiLr3nL1UUwlhhXeqSqGVb7p3mtB5HJ8ad
ch. 979 IN RRSIG DNSKEY 8 1 86400 20150127100909 20141212090909 46375 ch. bT8q0FWyeMH0SulNo6UdIIgZYNATwYsee2bikq2Gh339Bufma8eaqWIPYT3XKmxYPBFOw0bVl+kLZxTwbR1CFoCDXoP+qgQhh4mf9qkNiv2CDSc+0FE3FRREn+DAhYTUEuB58FPiPakFB8s8O7T+k2qhDae7jy4/y7Jl1lnjaBY8s7bzOUPhF0KKCNZmvoKwtL23ZdVeTSV1xM3jkiNnpzBKbcoSWECSGJVp1SE0BnRXdwQP41YTXFZ0310YjaTAUCC5qbMIWdEkHjfdSQtKBImnc85mkapq9w++XQ4zhauPWBtrPV3CcoCahjUaWdjrKVkibomlJZaN8MEO23CfQw==
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 893 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 32040
;; flags: qr rd ra cd ; qd: 1 an: 3 au: 0 ad: 1
;; QUESTIONS:
;; ingotronic.ch., type = DS, class = IN
;; ANSWERS:
ingotronic.ch. 3587 IN DS 6031 5 2 4A948F2FDADA24686E473EDAC00DCF972584C75E3FAA92C2021B6221449FF87E
ingotronic.ch. 3587 IN DS 6031 5 1 733D0218B571CD617B1A7493564B9FC4F12ADE82
ingotronic.ch. 3587 IN RRSIG DS 8 2 3600 20150129033614 20150105123019 60789 ch. rVPJP2HhzW7OkroK2axFj5Lb4iVWCH8Fp/Iq1rF952NDo72b8RiKje2RaAKJAGQ+wd0YgE+PAej04GCmkhlDJA/zvPeeTxuhy3HbJzReMlQ7fjyH+wW1hli+FuIYvogXWf7nO/9VyPORt8X/f/pjrOr3Vlj9sGLN8TGYpEuVSw4=
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 288 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 13921
;; flags: qr aa rd ra cd ; qd: 1 an: 4 au: 0 ad: 1
;; QUESTIONS:
;; ingotronic.ch., type = DNSKEY, class = IN
;; ANSWERS:
ingotronic.ch. 300 IN DNSKEY 256 3 5 AwEAAZ2Xh77GFzpEDx7EHYxShqltHgkiG+BOjBGifEmnJhQSdE5/yNSLFNcdhZZ8HUPxYnaedTqJcFFg4AzUsQklF/fECegTJdZjaj2WoL0/I8K7HMfY/hVuRZUWPNglYi8agJRX6gdkFTCpUNI7stpgKqxtzUJhhw15uG/lKMplwqUr
ingotronic.ch. 300 IN DNSKEY 257 3 5 AwEAAeA1vzmjaB+eBAcvhzpKEgAEFpvQ1rg4uKDW6MsQtacKoqBpgyep2+LuWotz5p/xYxj3NGsArwN8Ad5cY0FHRr8miTT0elOv6nvlqGIfRuhj/BXAQ1x4ihpSFslHw0lJMYFwxsUZWpUyjWX/nv1xRZMMwF46gui0N4OEbyTYusCk77D+A71k+K0EAitFIbIH4GCUKmH1H7HmXhSVH9bN/n7KEGwW32lmsuuUcJoRKDkcUvbMXY/9Xoa2quERrUg/rBbDUHowRPjYDS5GzY1+f4YY8s40BufGiqyUTKKXL953MVFK8gmezXA0hbmrnZ7CBOw/7238mORAdzExaX8n7CE=
ingotronic.ch. 300 IN RRSIG DNSKEY 5 2 300 20150125003700 20141226001657 6031 ingotronic.ch. rs1QlP2SlSpA2ELbzwg3DgWLzXWL3Lpv6CUJE2Q0qH2Zp7Qdy3cD+ZEtNh9v24Qv1M6JJ3zFt8mmZoCeW2ycuMbJCqBkW9CBuwF+VznZvZY2MxwPipvhvEEGP//0M8YAZJ66yQPDv3PTdAP8FYbIrJyvY44vwyncwbslpfHT9jAsrbfr3vuMuWps86dnP462q+0s1TxBfqi8mzo3gdavjHKWVNwohLahLKT+tWeu6DSzQv0YwMjwtkLgF7QRgx3ctIIkloOrnx9nHH1N6y+hxEB89fOlyVDjHhgL5uVtsD5fEdT0FJ2Gc/2nShEMMqIwr1/J9kUq1mNySff/uEe65Q==
ingotronic.ch. 300 IN RRSIG DNSKEY 5 2 300 20150125003700 20141226001657 17430 ingotronic.ch. mEwZjhQqeWksWD0TCnNBrtce4YkWJL3edqL6PvAUu8Fn+Ih437kEs3+pqdkgRsdYQ9HW+lBm/8pWwJlNAv0bi9NykItXMwAUFtncgq+6Pnh3iAM972GXSa5VV4LcGQ5b8CBdHCHiEKDqyPv5Hr5QfYL/FQaWlcNRh4QZZlZNPFA=
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 940 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 984
;; flags: qr aa rd ra cd ; qd: 1 an: 3 au: 0 ad: 1
;; QUESTIONS:
;; nsec3.ingotronic.ch., type = DS, class = IN
;; ANSWERS:
nsec3.ingotronic.ch. 300 IN DS 16758 7 1 1720FF268E09A2CB63805EC8782D10AAD20E12A5
nsec3.ingotronic.ch. 300 IN DS 16758 7 2 3C8DC02750A1636F829B45D6E6D642866768A9CD40A013AD9D25AB63734FFA13
nsec3.ingotronic.ch. 300 IN RRSIG DS 5 3 300 20150125011134 20141226002644 17430 ingotronic.ch. hNurzlGhlyHbSgezPDuhIrtN9ZMsMXZbKGc7HD5rUuM88wD3fM97NxdzF+2Hi1USvBZ5GsQv63L+lAzf+mFPBoPIFHtTiAv8up7kQKRKmi/EzzkCYd/CC4UYdDZbaUyv7esh7spSOGwjPJNdK831p+MgltoWaYtnSGVMgOKk5mc=
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 305 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 62463
;; flags: qr aa rd ra cd ; qd: 1 an: 4 au: 0 ad: 1
;; QUESTIONS:
;; nsec3.ingotronic.ch., type = DNSKEY, class = IN
;; ANSWERS:
nsec3.ingotronic.ch. 300 IN DNSKEY 256 3 7 AwEAAccAWxkTVGZ6UAp0VEozAlYpARhbh6Y6tYOl6Fg3UeBNFFtDQ9fTEEt1NkbnR9u8KkpVN6a67avlYiUN1egDqEwzDU7R1Rw+/USdhm2hqOARmmu3DBgjjX/iXjZLyv310cOGFJZ/smcodlDL4pDAAoPxh/qs6KEBaT0sc1KWcGq3
nsec3.ingotronic.ch. 300 IN DNSKEY 257 3 7 AwEAAaBuJTf9oGyeTH3biUkAFLrsYrkodX1H7Snsui4XsDHFCBvs5XYacHbs0Jg0/O51KPjmNnjwMW8SSyDkKqYQ+9uYAf2EQ/pnD/VGQqnV2cw0Vwk/t0E2V4FUCju4pnAoyzZFZXGs1eWbX9JXu++b0Azp+ACq6485qJLzHhWDiIrPoK/SvdbFVRK4s+nPPJLH3NGBbtdz6kPq7aFWYBMoGeAZdN1wsQpcNWUo5eOmaJY53nMc7+rDpAyYlMe/FKwSZdX2ZDd63Qsa6Im4FVUJq/nWLq7tlQ/mWks15uDTQyJy/OWfA0ICCO4N9Fel9rThJNpJWEzOCblvZyBoy405kZk=
nsec3.ingotronic.ch. 300 IN RRSIG DNSKEY 7 3 300 20150125001457 20141226000444 16758 nsec3.ingotronic.ch. mXi1ylDi8XkRPup+YlT8GPdYE+P7gb6+/VdAwtodI916IzrkGkOHOTLbnrbAqqJOh0HxVCYXdxovmEcbJKUFKwplrQg3XD7/9Sq4pKU1MhMFEGrm/QPkM4u0mgjQwyToDLGuPHuFyur3FSjO/n54uGhAEft9JOFk/WKtWdCnm2LLyQrpC6herA3efFaI8kZhdoEY02AwihWVJxHasmz7lOoKRgNrkfELU+fN4+V7ISsRfJMyZc6q5PuNeG6vFD0uNE8tpdLJCSMurKYVpelvYqzFIcRTYcIjXwmS+L3DGjupqWMzFZVmpQM62JG3KCCD0ffpnNb0nWoSoHwpSeh/3Q==
nsec3.ingotronic.ch. 300 IN RRSIG DNSKEY 7 3 300 20150125001457 20141226000444 62417 nsec3.ingotronic.ch. PyCrf8T5dAfJzapb1p+kcTALPjDuD2niSaXXo0KeHAunT+6gJicLML2S/ZpiYr7X7Ma4Z0TYqE02qH6pcLYNnSgv9BE8sZO0nRtPekSyTy5nLi4hFADYhjb3UjaB85qmQZcqm64vC/CJhWO4t6Eixg/5MYALw+Qdy5Fo0qy/U5E=
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 958 bytes
###############################################
dnssecjava-1.1.3/src/test/resources/recordings/org_jitsi_dnssec_TestCNames/testCNameToUnsignedA 0000664 0000000 0000000 00000031071 13020541473 0033102 0 ustar 00root root 0000000 0000000 #Date: 2015-01-06T22:34:54+01:00
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 37558
;; flags: qr aa rd ra cd ; qd: 1 an: 3 au: 3 ad: 6
;; QUESTIONS:
;; cunsinged.ingotronic.ch., type = A, class = IN
;; ANSWERS:
cunsinged.ingotronic.ch. 300 IN CNAME www.20min.ch.
cunsinged.ingotronic.ch. 300 IN RRSIG CNAME 5 3 300 20150125005754 20141226001054 17430 ingotronic.ch. Oq75+uqbjTpblXzShoTm9TUViMxIS/iTdyGSi9tc4dsF/EKBtw0GyBjZA4iHNDkBPVudQ0u+aN9Zh+Mr+OgqyylCtfKKYRDRGYbPhkjs+EufU2FBoxYfPeMeaDTYXhN+prj9lla6IUkEsxZX+8SZlw/+GlJ0nVIDeN00L3U8y6Y=
www.20min.ch. 599 IN A 83.140.105.62
;; AUTHORITY RECORDS:
20min.ch. 3599 IN NS robotns2.second-ns.de.
20min.ch. 3599 IN NS robotns3.second-ns.com.
20min.ch. 3599 IN NS ns1.first-ns.de.
;; ADDITIONAL RECORDS:
ns1.first-ns.de. 600 IN A 213.239.242.238
ns1.first-ns.de. 299 IN AAAA 2a01:4f8:0:a101:0:0:a:1
robotns2.second-ns.de. 1016 IN A 213.133.105.6
robotns3.second-ns.com. 7199 IN A 193.47.99.3
robotns3.second-ns.com. 599 IN AAAA 2a00:1158:4:0:0:0:add:a3
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 467 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 18340
;; flags: qr rd ra ad cd ; qd: 1 an: 4 au: 0 ad: 1
;; QUESTIONS:
;; ., type = DNSKEY, class = IN
;; ANSWERS:
. 87379 IN DNSKEY 256 3 8 AwEAAaPD7Y7XIi1MOEREJNTrRhyqsY3gff6JWzg+XCbqut1sbcbvqyssHw8DT1AkRaAC92pO8xuyq5QEgEPL1IHfABLwpwXI5gTj4gdwi86bpkmlWs9fRpnn4DPDCTdrnxIejJXgClHikLJF3u3CdpNCMijq4CKdQbMlRZ3avv+G7rh7
. 87379 IN DNSKEY 257 3 8 AwEAAagAIKlVZrpC6Ia7gEzahOR+9W29euxhJhVVLOyQbSEW0O8gcCjFFVQUTf6v58fLjwBd0YI0EzrAcQqBGCzh/RStIoO8g0NfnfL2MTJRkxoXbfDaUeVPQuYEhg37NZWAJQ9VnMVDxP/VHL496M/QZxkjf5/Efucp2gaDX6RS6CXpoY68LsvPVjR0ZSwzz1apAzvN9dlzEheX7ICJBBtuA6G3LQpzW5hOA2hzCTMjJPJ8LbqF6dsV6DoBQzgul0sGIcGOYl7OyQdXfZ57relSQageu+ipAdTTJ25AsRTAoub8ONGcLmqrAmRLKBP1dfwhYB4N7knNnulqQxA+Uk1ihz0=
. 87379 IN DNSKEY 256 3 8 AwEAAe3fSrbLBy3LOS7pnxEUhvPZTE2H5dIGsI/UfruI/nOEvWWa/PSX2BFedBkEqOlYdjdNF2f+6lmfk2Od/xu0v5bVqxFE+/24v3hZSlWBxvXzPTAGHrbW/IJYEPqlzVOAS4XdUgHg0N7IbLywNHMvB+Yf+Nm6ctyXXFLV4WTNnzs7
. 87379 IN RRSIG DNSKEY 8 0 172800 20150115235959 20150101000000 19036 . i8cAxD2pvQi1oAyvQxRpDfFlbqPzW+69QQEsDwE1eWOm5AtawO9U7lmsGps7sy/fVNvl1ljKBj4Djp9pb3U2FLogjiIlW0cDAkPmLlG9t+b/pjEfBNlhjANUVN06pvQVAfm+LcF26EaWT6FlISBqb6jSy4BHRa3Bdc4Sx7+pRSYSqVVvYxLkfAWsKPqGkvWhebJDndJJV9syXQXgZ+v/uJ+6XOS43xkAdeL8iBzIs/FlwMTfh3tVe3d0lb65IBBLlCzeQuetX+0Vu1YFcnD0mHc/wS2ZnAV5toAFmyVQBoY/XAZiZeaOkcROJ6Zmqezy7liwK7BqsYyAZntMhk8lbg==
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 883 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 37899
;; flags: qr rd ra ad cd ; qd: 1 an: 2 au: 0 ad: 1
;; QUESTIONS:
;; ch., type = DS, class = IN
;; ANSWERS:
ch. 979 IN DS 46375 8 2 8F96646FC68BB7E4AF4C0750A6096FBC0D4ECDA3D3FA6DA06FDDB42EE50C6CF3
ch. 979 IN RRSIG DS 8 1 86400 20150112170000 20150105160000 16665 . thY7xYWBBxiBjqbQIb9fAG4TmQgnziwM7q6P1T3/ITxmECdvOCQnnZA3uD7qmN8uM0HudsD7+y+zgD3rsH4RSTKdL4kHSI0OnCxToMTvklghEgFDezqIRm8NkWdI2H4Stwrj20nYKSpLQxPI2EE54gs18P3KyO8bAUYv8Qx73xU=
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 238 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 64743
;; flags: qr rd ra ad cd ; qd: 1 an: 4 au: 0 ad: 1
;; QUESTIONS:
;; ch., type = DNSKEY, class = IN
;; ANSWERS:
ch. 980 IN DNSKEY 257 3 8 AwEAAb7GhhZ8IAy/AhwmSms5DeQK5ad09wIIplEpYoiAIYXPtJvT1ReFzyfTp/2YP+g/PWDwHPh4qKAHa9x0VgbIQcGAeNakmfkAdWEmCnca323/SAml3mwfaX62G7/uYWae5zh8QTxZKNd+K1yZ5x0IxnI31chSl5xymRbTEHYZDKwSIRFM3fTxUMt93WFaBVWELReYotJBr++rvAWdnlay5TPBTvheLBkaiqtgM4GP8HK07Y+86lsZnEsj5K3G1KTV5SPpa82rqYAwxG9VKbmSE/6/kBR5jJHjt1rRt5Oe7v18aEtw0YCEN4vxq+KuvMoNVqXUsE9LBwHJD+QNwi6wmB0=
ch. 980 IN DNSKEY 256 3 8 AwEAAcsg0kY6fw1wzYMhSAKTy+Y2JzAst66P/1odp9NECJJHbU8f4nwziI3onoFSBV0ZiSZhY1aH5dhdDZ7BkrqhVXSrZPAz0CvzjIxmB1gSOf9DeZvjQvoy97HqYolxsf+B3QQv2RKBT67elF5+JisKg3/dQISelKn8LhabSoVrMlD1
ch. 980 IN DNSKEY 256 3 8 AwEAAcSLdT0fEmcFmLpeUkAJoeVaHKiu+nbuc43fWlqaCRVf8t2HA4uWxOk0O5ci9nrFTc8nq8oa5fk5Cj7CHh4yrX9qUCfTdIWTyp8BDEdJpS+Dyb0u9wQuVj+nQMj4fLzdQf4TJs3/qxuiLr3nL1UUwlhhXeqSqGVb7p3mtB5HJ8ad
ch. 980 IN RRSIG DNSKEY 8 1 86400 20150127100909 20141212090909 46375 ch. bT8q0FWyeMH0SulNo6UdIIgZYNATwYsee2bikq2Gh339Bufma8eaqWIPYT3XKmxYPBFOw0bVl+kLZxTwbR1CFoCDXoP+qgQhh4mf9qkNiv2CDSc+0FE3FRREn+DAhYTUEuB58FPiPakFB8s8O7T+k2qhDae7jy4/y7Jl1lnjaBY8s7bzOUPhF0KKCNZmvoKwtL23ZdVeTSV1xM3jkiNnpzBKbcoSWECSGJVp1SE0BnRXdwQP41YTXFZ0310YjaTAUCC5qbMIWdEkHjfdSQtKBImnc85mkapq9w++XQ4zhauPWBtrPV3CcoCahjUaWdjrKVkibomlJZaN8MEO23CfQw==
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 893 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 61336
;; flags: qr rd ra cd ; qd: 1 an: 3 au: 0 ad: 1
;; QUESTIONS:
;; ingotronic.ch., type = DS, class = IN
;; ANSWERS:
ingotronic.ch. 3588 IN DS 6031 5 1 733D0218B571CD617B1A7493564B9FC4F12ADE82
ingotronic.ch. 3588 IN DS 6031 5 2 4A948F2FDADA24686E473EDAC00DCF972584C75E3FAA92C2021B6221449FF87E
ingotronic.ch. 3588 IN RRSIG DS 8 2 3600 20150129033614 20150105123019 60789 ch. rVPJP2HhzW7OkroK2axFj5Lb4iVWCH8Fp/Iq1rF952NDo72b8RiKje2RaAKJAGQ+wd0YgE+PAej04GCmkhlDJA/zvPeeTxuhy3HbJzReMlQ7fjyH+wW1hli+FuIYvogXWf7nO/9VyPORt8X/f/pjrOr3Vlj9sGLN8TGYpEuVSw4=
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 288 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 18907
;; flags: qr aa rd ra cd ; qd: 1 an: 4 au: 0 ad: 1
;; QUESTIONS:
;; ingotronic.ch., type = DNSKEY, class = IN
;; ANSWERS:
ingotronic.ch. 300 IN DNSKEY 257 3 5 AwEAAeA1vzmjaB+eBAcvhzpKEgAEFpvQ1rg4uKDW6MsQtacKoqBpgyep2+LuWotz5p/xYxj3NGsArwN8Ad5cY0FHRr8miTT0elOv6nvlqGIfRuhj/BXAQ1x4ihpSFslHw0lJMYFwxsUZWpUyjWX/nv1xRZMMwF46gui0N4OEbyTYusCk77D+A71k+K0EAitFIbIH4GCUKmH1H7HmXhSVH9bN/n7KEGwW32lmsuuUcJoRKDkcUvbMXY/9Xoa2quERrUg/rBbDUHowRPjYDS5GzY1+f4YY8s40BufGiqyUTKKXL953MVFK8gmezXA0hbmrnZ7CBOw/7238mORAdzExaX8n7CE=
ingotronic.ch. 300 IN DNSKEY 256 3 5 AwEAAZ2Xh77GFzpEDx7EHYxShqltHgkiG+BOjBGifEmnJhQSdE5/yNSLFNcdhZZ8HUPxYnaedTqJcFFg4AzUsQklF/fECegTJdZjaj2WoL0/I8K7HMfY/hVuRZUWPNglYi8agJRX6gdkFTCpUNI7stpgKqxtzUJhhw15uG/lKMplwqUr
ingotronic.ch. 300 IN RRSIG DNSKEY 5 2 300 20150125003700 20141226001657 6031 ingotronic.ch. rs1QlP2SlSpA2ELbzwg3DgWLzXWL3Lpv6CUJE2Q0qH2Zp7Qdy3cD+ZEtNh9v24Qv1M6JJ3zFt8mmZoCeW2ycuMbJCqBkW9CBuwF+VznZvZY2MxwPipvhvEEGP//0M8YAZJ66yQPDv3PTdAP8FYbIrJyvY44vwyncwbslpfHT9jAsrbfr3vuMuWps86dnP462q+0s1TxBfqi8mzo3gdavjHKWVNwohLahLKT+tWeu6DSzQv0YwMjwtkLgF7QRgx3ctIIkloOrnx9nHH1N6y+hxEB89fOlyVDjHhgL5uVtsD5fEdT0FJ2Gc/2nShEMMqIwr1/J9kUq1mNySff/uEe65Q==
ingotronic.ch. 300 IN RRSIG DNSKEY 5 2 300 20150125003700 20141226001657 17430 ingotronic.ch. mEwZjhQqeWksWD0TCnNBrtce4YkWJL3edqL6PvAUu8Fn+Ih437kEs3+pqdkgRsdYQ9HW+lBm/8pWwJlNAv0bi9NykItXMwAUFtncgq+6Pnh3iAM972GXSa5VV4LcGQ5b8CBdHCHiEKDqyPv5Hr5QfYL/FQaWlcNRh4QZZlZNPFA=
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 940 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 43839
;; flags: qr rd ra ad cd ; qd: 1 an: 4 au: 0 ad: 1
;; QUESTIONS:
;; ., type = DNSKEY, class = IN
;; ANSWERS:
. 87379 IN DNSKEY 256 3 8 AwEAAe3fSrbLBy3LOS7pnxEUhvPZTE2H5dIGsI/UfruI/nOEvWWa/PSX2BFedBkEqOlYdjdNF2f+6lmfk2Od/xu0v5bVqxFE+/24v3hZSlWBxvXzPTAGHrbW/IJYEPqlzVOAS4XdUgHg0N7IbLywNHMvB+Yf+Nm6ctyXXFLV4WTNnzs7
. 87379 IN DNSKEY 257 3 8 AwEAAagAIKlVZrpC6Ia7gEzahOR+9W29euxhJhVVLOyQbSEW0O8gcCjFFVQUTf6v58fLjwBd0YI0EzrAcQqBGCzh/RStIoO8g0NfnfL2MTJRkxoXbfDaUeVPQuYEhg37NZWAJQ9VnMVDxP/VHL496M/QZxkjf5/Efucp2gaDX6RS6CXpoY68LsvPVjR0ZSwzz1apAzvN9dlzEheX7ICJBBtuA6G3LQpzW5hOA2hzCTMjJPJ8LbqF6dsV6DoBQzgul0sGIcGOYl7OyQdXfZ57relSQageu+ipAdTTJ25AsRTAoub8ONGcLmqrAmRLKBP1dfwhYB4N7knNnulqQxA+Uk1ihz0=
. 87379 IN DNSKEY 256 3 8 AwEAAaPD7Y7XIi1MOEREJNTrRhyqsY3gff6JWzg+XCbqut1sbcbvqyssHw8DT1AkRaAC92pO8xuyq5QEgEPL1IHfABLwpwXI5gTj4gdwi86bpkmlWs9fRpnn4DPDCTdrnxIejJXgClHikLJF3u3CdpNCMijq4CKdQbMlRZ3avv+G7rh7
. 87379 IN RRSIG DNSKEY 8 0 172800 20150115235959 20150101000000 19036 . i8cAxD2pvQi1oAyvQxRpDfFlbqPzW+69QQEsDwE1eWOm5AtawO9U7lmsGps7sy/fVNvl1ljKBj4Djp9pb3U2FLogjiIlW0cDAkPmLlG9t+b/pjEfBNlhjANUVN06pvQVAfm+LcF26EaWT6FlISBqb6jSy4BHRa3Bdc4Sx7+pRSYSqVVvYxLkfAWsKPqGkvWhebJDndJJV9syXQXgZ+v/uJ+6XOS43xkAdeL8iBzIs/FlwMTfh3tVe3d0lb65IBBLlCzeQuetX+0Vu1YFcnD0mHc/wS2ZnAV5toAFmyVQBoY/XAZiZeaOkcROJ6Zmqezy7liwK7BqsYyAZntMhk8lbg==
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 883 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 45479
;; flags: qr rd ra ad cd ; qd: 1 an: 2 au: 0 ad: 1
;; QUESTIONS:
;; ch., type = DS, class = IN
;; ANSWERS:
ch. 979 IN DS 46375 8 2 8F96646FC68BB7E4AF4C0750A6096FBC0D4ECDA3D3FA6DA06FDDB42EE50C6CF3
ch. 979 IN RRSIG DS 8 1 86400 20150112170000 20150105160000 16665 . thY7xYWBBxiBjqbQIb9fAG4TmQgnziwM7q6P1T3/ITxmECdvOCQnnZA3uD7qmN8uM0HudsD7+y+zgD3rsH4RSTKdL4kHSI0OnCxToMTvklghEgFDezqIRm8NkWdI2H4Stwrj20nYKSpLQxPI2EE54gs18P3KyO8bAUYv8Qx73xU=
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 238 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 5536
;; flags: qr rd ra ad cd ; qd: 1 an: 4 au: 0 ad: 1
;; QUESTIONS:
;; ch., type = DNSKEY, class = IN
;; ANSWERS:
ch. 980 IN DNSKEY 256 3 8 AwEAAcSLdT0fEmcFmLpeUkAJoeVaHKiu+nbuc43fWlqaCRVf8t2HA4uWxOk0O5ci9nrFTc8nq8oa5fk5Cj7CHh4yrX9qUCfTdIWTyp8BDEdJpS+Dyb0u9wQuVj+nQMj4fLzdQf4TJs3/qxuiLr3nL1UUwlhhXeqSqGVb7p3mtB5HJ8ad
ch. 980 IN DNSKEY 256 3 8 AwEAAcsg0kY6fw1wzYMhSAKTy+Y2JzAst66P/1odp9NECJJHbU8f4nwziI3onoFSBV0ZiSZhY1aH5dhdDZ7BkrqhVXSrZPAz0CvzjIxmB1gSOf9DeZvjQvoy97HqYolxsf+B3QQv2RKBT67elF5+JisKg3/dQISelKn8LhabSoVrMlD1
ch. 980 IN DNSKEY 257 3 8 AwEAAb7GhhZ8IAy/AhwmSms5DeQK5ad09wIIplEpYoiAIYXPtJvT1ReFzyfTp/2YP+g/PWDwHPh4qKAHa9x0VgbIQcGAeNakmfkAdWEmCnca323/SAml3mwfaX62G7/uYWae5zh8QTxZKNd+K1yZ5x0IxnI31chSl5xymRbTEHYZDKwSIRFM3fTxUMt93WFaBVWELReYotJBr++rvAWdnlay5TPBTvheLBkaiqtgM4GP8HK07Y+86lsZnEsj5K3G1KTV5SPpa82rqYAwxG9VKbmSE/6/kBR5jJHjt1rRt5Oe7v18aEtw0YCEN4vxq+KuvMoNVqXUsE9LBwHJD+QNwi6wmB0=
ch. 980 IN RRSIG DNSKEY 8 1 86400 20150127100909 20141212090909 46375 ch. bT8q0FWyeMH0SulNo6UdIIgZYNATwYsee2bikq2Gh339Bufma8eaqWIPYT3XKmxYPBFOw0bVl+kLZxTwbR1CFoCDXoP+qgQhh4mf9qkNiv2CDSc+0FE3FRREn+DAhYTUEuB58FPiPakFB8s8O7T+k2qhDae7jy4/y7Jl1lnjaBY8s7bzOUPhF0KKCNZmvoKwtL23ZdVeTSV1xM3jkiNnpzBKbcoSWECSGJVp1SE0BnRXdwQP41YTXFZ0310YjaTAUCC5qbMIWdEkHjfdSQtKBImnc85mkapq9w++XQ4zhauPWBtrPV3CcoCahjUaWdjrKVkibomlJZaN8MEO23CfQw==
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 893 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 20532
;; flags: qr rd ra cd ; qd: 1 an: 0 au: 6 ad: 1
;; QUESTIONS:
;; 20min.ch., type = DS, class = IN
;; ANSWERS:
;; AUTHORITY RECORDS:
ch. 3600 IN SOA a.nic.ch. helpdesk.nic.ch. 2015010622 900 600 1123200 3600
ch. 3600 IN RRSIG SOA 8 1 3600 20150205202115 20150106200400 60789 ch. gXFznlMM50NpTnKf/1GIa8PJjARc4OUJVjVzicybnZieYvXA1bXo9NnFabfSV8+ePmuvKlph1mdmXi4RWeCy75fT2DdWorJpW9/riW+4z0usW0fHNo5d7SLdxuUJGZCd22VM4y1F79crVmAftifagcsKmvDE0B8HrZ/8sH0Y6uQ=
E5N5J3RCG0FLHRQLGU5G3IN5ROJNRL21.ch. 3600 IN RRSIG NSEC3 8 2 3600 20150124000839 20150105123019 60789 ch. HznmGWxQqbLUD5mjv8FHCwSfsNZ0fk4X6vtgyFTA81rVSQs4mUfoopvrBrYHGB0iKz/eeRCgHisH99L7uw/dWUy8h9pTQM4UFmspLjTiVHDNad6COrKnFFywV8E7CwibCd+qcdo4yGME3TbVkH1BbSvzQrUKKKe5eO/hleMvhSk=
E5N5J3RCG0FLHRQLGU5G3IN5ROJNRL21.ch. 3600 IN NSEC3 1 1 2 A170C978 E5PB8JRENAJFIO1LLO9ELPG39F787FOL NS DS RRSIG
G6DPGFANFNS93LVDHH7362IPSUN8DK5T.ch. 3600 IN RRSIG NSEC3 8 2 3600 20150124064109 20150105123019 60789 ch. pvd/nB3QKjTbLpxM9H9xcJIwmLnNAJPsXMffmjtAjTbceZ7IfpQHmguLPyJS7awSyEOTAhKmpeaT7m4iHhFm1/X4ybZmUvRSexqskgmGzqK+39cjaPrxc+ghdiUgFSjxv36PhoyM5gYnclTqpwGuFR00HK3av9vnnEKEY7zWtmM=
G6DPGFANFNS93LVDHH7362IPSUN8DK5T.ch. 3600 IN NSEC3 1 1 2 A170C978 G6DQNPQ9VP0U8F95714HO3575MPP42V1 NS SOA RRSIG DNSKEY NSEC3PARAM
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 741 bytes
###############################################
dnssecjava-1.1.3/src/test/resources/recordings/org_jitsi_dnssec_TestCNames/testCNameToUnsignedMX 0000664 0000000 0000000 00000030362 13020541473 0033250 0 ustar 00root root 0000000 0000000 #Date: 2015-01-06T22:34:54+01:00
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 20119
;; flags: qr aa rd ra cd ; qd: 1 an: 2 au: 1 ad: 1
;; QUESTIONS:
;; cunsinged.ingotronic.ch., type = MX, class = IN
;; ANSWERS:
cunsinged.ingotronic.ch. 300 IN CNAME www.20min.ch.
cunsinged.ingotronic.ch. 300 IN RRSIG CNAME 5 3 300 20150125005754 20141226001054 17430 ingotronic.ch. Oq75+uqbjTpblXzShoTm9TUViMxIS/iTdyGSi9tc4dsF/EKBtw0GyBjZA4iHNDkBPVudQ0u+aN9Zh+Mr+OgqyylCtfKKYRDRGYbPhkjs+EufU2FBoxYfPeMeaDTYXhN+prj9lla6IUkEsxZX+8SZlw/+GlJ0nVIDeN00L3U8y6Y=
;; AUTHORITY RECORDS:
20min.ch. 300 IN SOA ns1.first-ns.de. postmaster.20min.ch. 2014121100 600 600 86400 600
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 311 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 30770
;; flags: qr rd ra ad cd ; qd: 1 an: 4 au: 0 ad: 1
;; QUESTIONS:
;; ., type = DNSKEY, class = IN
;; ANSWERS:
. 87379 IN DNSKEY 257 3 8 AwEAAagAIKlVZrpC6Ia7gEzahOR+9W29euxhJhVVLOyQbSEW0O8gcCjFFVQUTf6v58fLjwBd0YI0EzrAcQqBGCzh/RStIoO8g0NfnfL2MTJRkxoXbfDaUeVPQuYEhg37NZWAJQ9VnMVDxP/VHL496M/QZxkjf5/Efucp2gaDX6RS6CXpoY68LsvPVjR0ZSwzz1apAzvN9dlzEheX7ICJBBtuA6G3LQpzW5hOA2hzCTMjJPJ8LbqF6dsV6DoBQzgul0sGIcGOYl7OyQdXfZ57relSQageu+ipAdTTJ25AsRTAoub8ONGcLmqrAmRLKBP1dfwhYB4N7knNnulqQxA+Uk1ihz0=
. 87379 IN DNSKEY 256 3 8 AwEAAaPD7Y7XIi1MOEREJNTrRhyqsY3gff6JWzg+XCbqut1sbcbvqyssHw8DT1AkRaAC92pO8xuyq5QEgEPL1IHfABLwpwXI5gTj4gdwi86bpkmlWs9fRpnn4DPDCTdrnxIejJXgClHikLJF3u3CdpNCMijq4CKdQbMlRZ3avv+G7rh7
. 87379 IN DNSKEY 256 3 8 AwEAAe3fSrbLBy3LOS7pnxEUhvPZTE2H5dIGsI/UfruI/nOEvWWa/PSX2BFedBkEqOlYdjdNF2f+6lmfk2Od/xu0v5bVqxFE+/24v3hZSlWBxvXzPTAGHrbW/IJYEPqlzVOAS4XdUgHg0N7IbLywNHMvB+Yf+Nm6ctyXXFLV4WTNnzs7
. 87379 IN RRSIG DNSKEY 8 0 172800 20150115235959 20150101000000 19036 . i8cAxD2pvQi1oAyvQxRpDfFlbqPzW+69QQEsDwE1eWOm5AtawO9U7lmsGps7sy/fVNvl1ljKBj4Djp9pb3U2FLogjiIlW0cDAkPmLlG9t+b/pjEfBNlhjANUVN06pvQVAfm+LcF26EaWT6FlISBqb6jSy4BHRa3Bdc4Sx7+pRSYSqVVvYxLkfAWsKPqGkvWhebJDndJJV9syXQXgZ+v/uJ+6XOS43xkAdeL8iBzIs/FlwMTfh3tVe3d0lb65IBBLlCzeQuetX+0Vu1YFcnD0mHc/wS2ZnAV5toAFmyVQBoY/XAZiZeaOkcROJ6Zmqezy7liwK7BqsYyAZntMhk8lbg==
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 883 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 16869
;; flags: qr rd ra ad cd ; qd: 1 an: 2 au: 0 ad: 1
;; QUESTIONS:
;; ch., type = DS, class = IN
;; ANSWERS:
ch. 979 IN DS 46375 8 2 8F96646FC68BB7E4AF4C0750A6096FBC0D4ECDA3D3FA6DA06FDDB42EE50C6CF3
ch. 979 IN RRSIG DS 8 1 86400 20150112170000 20150105160000 16665 . thY7xYWBBxiBjqbQIb9fAG4TmQgnziwM7q6P1T3/ITxmECdvOCQnnZA3uD7qmN8uM0HudsD7+y+zgD3rsH4RSTKdL4kHSI0OnCxToMTvklghEgFDezqIRm8NkWdI2H4Stwrj20nYKSpLQxPI2EE54gs18P3KyO8bAUYv8Qx73xU=
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 238 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 35599
;; flags: qr rd ra ad cd ; qd: 1 an: 4 au: 0 ad: 1
;; QUESTIONS:
;; ch., type = DNSKEY, class = IN
;; ANSWERS:
ch. 980 IN DNSKEY 257 3 8 AwEAAb7GhhZ8IAy/AhwmSms5DeQK5ad09wIIplEpYoiAIYXPtJvT1ReFzyfTp/2YP+g/PWDwHPh4qKAHa9x0VgbIQcGAeNakmfkAdWEmCnca323/SAml3mwfaX62G7/uYWae5zh8QTxZKNd+K1yZ5x0IxnI31chSl5xymRbTEHYZDKwSIRFM3fTxUMt93WFaBVWELReYotJBr++rvAWdnlay5TPBTvheLBkaiqtgM4GP8HK07Y+86lsZnEsj5K3G1KTV5SPpa82rqYAwxG9VKbmSE/6/kBR5jJHjt1rRt5Oe7v18aEtw0YCEN4vxq+KuvMoNVqXUsE9LBwHJD+QNwi6wmB0=
ch. 980 IN DNSKEY 256 3 8 AwEAAcsg0kY6fw1wzYMhSAKTy+Y2JzAst66P/1odp9NECJJHbU8f4nwziI3onoFSBV0ZiSZhY1aH5dhdDZ7BkrqhVXSrZPAz0CvzjIxmB1gSOf9DeZvjQvoy97HqYolxsf+B3QQv2RKBT67elF5+JisKg3/dQISelKn8LhabSoVrMlD1
ch. 980 IN DNSKEY 256 3 8 AwEAAcSLdT0fEmcFmLpeUkAJoeVaHKiu+nbuc43fWlqaCRVf8t2HA4uWxOk0O5ci9nrFTc8nq8oa5fk5Cj7CHh4yrX9qUCfTdIWTyp8BDEdJpS+Dyb0u9wQuVj+nQMj4fLzdQf4TJs3/qxuiLr3nL1UUwlhhXeqSqGVb7p3mtB5HJ8ad
ch. 980 IN RRSIG DNSKEY 8 1 86400 20150127100909 20141212090909 46375 ch. bT8q0FWyeMH0SulNo6UdIIgZYNATwYsee2bikq2Gh339Bufma8eaqWIPYT3XKmxYPBFOw0bVl+kLZxTwbR1CFoCDXoP+qgQhh4mf9qkNiv2CDSc+0FE3FRREn+DAhYTUEuB58FPiPakFB8s8O7T+k2qhDae7jy4/y7Jl1lnjaBY8s7bzOUPhF0KKCNZmvoKwtL23ZdVeTSV1xM3jkiNnpzBKbcoSWECSGJVp1SE0BnRXdwQP41YTXFZ0310YjaTAUCC5qbMIWdEkHjfdSQtKBImnc85mkapq9w++XQ4zhauPWBtrPV3CcoCahjUaWdjrKVkibomlJZaN8MEO23CfQw==
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 893 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 35095
;; flags: qr rd ra cd ; qd: 1 an: 3 au: 0 ad: 1
;; QUESTIONS:
;; ingotronic.ch., type = DS, class = IN
;; ANSWERS:
ingotronic.ch. 3588 IN DS 6031 5 2 4A948F2FDADA24686E473EDAC00DCF972584C75E3FAA92C2021B6221449FF87E
ingotronic.ch. 3588 IN DS 6031 5 1 733D0218B571CD617B1A7493564B9FC4F12ADE82
ingotronic.ch. 3588 IN RRSIG DS 8 2 3600 20150129033614 20150105123019 60789 ch. rVPJP2HhzW7OkroK2axFj5Lb4iVWCH8Fp/Iq1rF952NDo72b8RiKje2RaAKJAGQ+wd0YgE+PAej04GCmkhlDJA/zvPeeTxuhy3HbJzReMlQ7fjyH+wW1hli+FuIYvogXWf7nO/9VyPORt8X/f/pjrOr3Vlj9sGLN8TGYpEuVSw4=
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 288 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 23106
;; flags: qr aa rd ra cd ; qd: 1 an: 4 au: 0 ad: 1
;; QUESTIONS:
;; ingotronic.ch., type = DNSKEY, class = IN
;; ANSWERS:
ingotronic.ch. 300 IN DNSKEY 256 3 5 AwEAAZ2Xh77GFzpEDx7EHYxShqltHgkiG+BOjBGifEmnJhQSdE5/yNSLFNcdhZZ8HUPxYnaedTqJcFFg4AzUsQklF/fECegTJdZjaj2WoL0/I8K7HMfY/hVuRZUWPNglYi8agJRX6gdkFTCpUNI7stpgKqxtzUJhhw15uG/lKMplwqUr
ingotronic.ch. 300 IN DNSKEY 257 3 5 AwEAAeA1vzmjaB+eBAcvhzpKEgAEFpvQ1rg4uKDW6MsQtacKoqBpgyep2+LuWotz5p/xYxj3NGsArwN8Ad5cY0FHRr8miTT0elOv6nvlqGIfRuhj/BXAQ1x4ihpSFslHw0lJMYFwxsUZWpUyjWX/nv1xRZMMwF46gui0N4OEbyTYusCk77D+A71k+K0EAitFIbIH4GCUKmH1H7HmXhSVH9bN/n7KEGwW32lmsuuUcJoRKDkcUvbMXY/9Xoa2quERrUg/rBbDUHowRPjYDS5GzY1+f4YY8s40BufGiqyUTKKXL953MVFK8gmezXA0hbmrnZ7CBOw/7238mORAdzExaX8n7CE=
ingotronic.ch. 300 IN RRSIG DNSKEY 5 2 300 20150125003700 20141226001657 6031 ingotronic.ch. rs1QlP2SlSpA2ELbzwg3DgWLzXWL3Lpv6CUJE2Q0qH2Zp7Qdy3cD+ZEtNh9v24Qv1M6JJ3zFt8mmZoCeW2ycuMbJCqBkW9CBuwF+VznZvZY2MxwPipvhvEEGP//0M8YAZJ66yQPDv3PTdAP8FYbIrJyvY44vwyncwbslpfHT9jAsrbfr3vuMuWps86dnP462q+0s1TxBfqi8mzo3gdavjHKWVNwohLahLKT+tWeu6DSzQv0YwMjwtkLgF7QRgx3ctIIkloOrnx9nHH1N6y+hxEB89fOlyVDjHhgL5uVtsD5fEdT0FJ2Gc/2nShEMMqIwr1/J9kUq1mNySff/uEe65Q==
ingotronic.ch. 300 IN RRSIG DNSKEY 5 2 300 20150125003700 20141226001657 17430 ingotronic.ch. mEwZjhQqeWksWD0TCnNBrtce4YkWJL3edqL6PvAUu8Fn+Ih437kEs3+pqdkgRsdYQ9HW+lBm/8pWwJlNAv0bi9NykItXMwAUFtncgq+6Pnh3iAM972GXSa5VV4LcGQ5b8CBdHCHiEKDqyPv5Hr5QfYL/FQaWlcNRh4QZZlZNPFA=
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 940 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 24914
;; flags: qr rd ra ad cd ; qd: 1 an: 4 au: 0 ad: 1
;; QUESTIONS:
;; ., type = DNSKEY, class = IN
;; ANSWERS:
. 87379 IN DNSKEY 256 3 8 AwEAAaPD7Y7XIi1MOEREJNTrRhyqsY3gff6JWzg+XCbqut1sbcbvqyssHw8DT1AkRaAC92pO8xuyq5QEgEPL1IHfABLwpwXI5gTj4gdwi86bpkmlWs9fRpnn4DPDCTdrnxIejJXgClHikLJF3u3CdpNCMijq4CKdQbMlRZ3avv+G7rh7
. 87379 IN DNSKEY 256 3 8 AwEAAe3fSrbLBy3LOS7pnxEUhvPZTE2H5dIGsI/UfruI/nOEvWWa/PSX2BFedBkEqOlYdjdNF2f+6lmfk2Od/xu0v5bVqxFE+/24v3hZSlWBxvXzPTAGHrbW/IJYEPqlzVOAS4XdUgHg0N7IbLywNHMvB+Yf+Nm6ctyXXFLV4WTNnzs7
. 87379 IN DNSKEY 257 3 8 AwEAAagAIKlVZrpC6Ia7gEzahOR+9W29euxhJhVVLOyQbSEW0O8gcCjFFVQUTf6v58fLjwBd0YI0EzrAcQqBGCzh/RStIoO8g0NfnfL2MTJRkxoXbfDaUeVPQuYEhg37NZWAJQ9VnMVDxP/VHL496M/QZxkjf5/Efucp2gaDX6RS6CXpoY68LsvPVjR0ZSwzz1apAzvN9dlzEheX7ICJBBtuA6G3LQpzW5hOA2hzCTMjJPJ8LbqF6dsV6DoBQzgul0sGIcGOYl7OyQdXfZ57relSQageu+ipAdTTJ25AsRTAoub8ONGcLmqrAmRLKBP1dfwhYB4N7knNnulqQxA+Uk1ihz0=
. 87379 IN RRSIG DNSKEY 8 0 172800 20150115235959 20150101000000 19036 . i8cAxD2pvQi1oAyvQxRpDfFlbqPzW+69QQEsDwE1eWOm5AtawO9U7lmsGps7sy/fVNvl1ljKBj4Djp9pb3U2FLogjiIlW0cDAkPmLlG9t+b/pjEfBNlhjANUVN06pvQVAfm+LcF26EaWT6FlISBqb6jSy4BHRa3Bdc4Sx7+pRSYSqVVvYxLkfAWsKPqGkvWhebJDndJJV9syXQXgZ+v/uJ+6XOS43xkAdeL8iBzIs/FlwMTfh3tVe3d0lb65IBBLlCzeQuetX+0Vu1YFcnD0mHc/wS2ZnAV5toAFmyVQBoY/XAZiZeaOkcROJ6Zmqezy7liwK7BqsYyAZntMhk8lbg==
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 883 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 26910
;; flags: qr rd ra ad cd ; qd: 1 an: 2 au: 0 ad: 1
;; QUESTIONS:
;; ch., type = DS, class = IN
;; ANSWERS:
ch. 979 IN DS 46375 8 2 8F96646FC68BB7E4AF4C0750A6096FBC0D4ECDA3D3FA6DA06FDDB42EE50C6CF3
ch. 979 IN RRSIG DS 8 1 86400 20150112170000 20150105160000 16665 . thY7xYWBBxiBjqbQIb9fAG4TmQgnziwM7q6P1T3/ITxmECdvOCQnnZA3uD7qmN8uM0HudsD7+y+zgD3rsH4RSTKdL4kHSI0OnCxToMTvklghEgFDezqIRm8NkWdI2H4Stwrj20nYKSpLQxPI2EE54gs18P3KyO8bAUYv8Qx73xU=
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 238 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 48955
;; flags: qr rd ra ad cd ; qd: 1 an: 4 au: 0 ad: 1
;; QUESTIONS:
;; ch., type = DNSKEY, class = IN
;; ANSWERS:
ch. 980 IN DNSKEY 256 3 8 AwEAAcSLdT0fEmcFmLpeUkAJoeVaHKiu+nbuc43fWlqaCRVf8t2HA4uWxOk0O5ci9nrFTc8nq8oa5fk5Cj7CHh4yrX9qUCfTdIWTyp8BDEdJpS+Dyb0u9wQuVj+nQMj4fLzdQf4TJs3/qxuiLr3nL1UUwlhhXeqSqGVb7p3mtB5HJ8ad
ch. 980 IN DNSKEY 257 3 8 AwEAAb7GhhZ8IAy/AhwmSms5DeQK5ad09wIIplEpYoiAIYXPtJvT1ReFzyfTp/2YP+g/PWDwHPh4qKAHa9x0VgbIQcGAeNakmfkAdWEmCnca323/SAml3mwfaX62G7/uYWae5zh8QTxZKNd+K1yZ5x0IxnI31chSl5xymRbTEHYZDKwSIRFM3fTxUMt93WFaBVWELReYotJBr++rvAWdnlay5TPBTvheLBkaiqtgM4GP8HK07Y+86lsZnEsj5K3G1KTV5SPpa82rqYAwxG9VKbmSE/6/kBR5jJHjt1rRt5Oe7v18aEtw0YCEN4vxq+KuvMoNVqXUsE9LBwHJD+QNwi6wmB0=
ch. 980 IN DNSKEY 256 3 8 AwEAAcsg0kY6fw1wzYMhSAKTy+Y2JzAst66P/1odp9NECJJHbU8f4nwziI3onoFSBV0ZiSZhY1aH5dhdDZ7BkrqhVXSrZPAz0CvzjIxmB1gSOf9DeZvjQvoy97HqYolxsf+B3QQv2RKBT67elF5+JisKg3/dQISelKn8LhabSoVrMlD1
ch. 980 IN RRSIG DNSKEY 8 1 86400 20150127100909 20141212090909 46375 ch. bT8q0FWyeMH0SulNo6UdIIgZYNATwYsee2bikq2Gh339Bufma8eaqWIPYT3XKmxYPBFOw0bVl+kLZxTwbR1CFoCDXoP+qgQhh4mf9qkNiv2CDSc+0FE3FRREn+DAhYTUEuB58FPiPakFB8s8O7T+k2qhDae7jy4/y7Jl1lnjaBY8s7bzOUPhF0KKCNZmvoKwtL23ZdVeTSV1xM3jkiNnpzBKbcoSWECSGJVp1SE0BnRXdwQP41YTXFZ0310YjaTAUCC5qbMIWdEkHjfdSQtKBImnc85mkapq9w++XQ4zhauPWBtrPV3CcoCahjUaWdjrKVkibomlJZaN8MEO23CfQw==
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 893 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 9000
;; flags: qr rd ra cd ; qd: 1 an: 0 au: 6 ad: 1
;; QUESTIONS:
;; 20min.ch., type = DS, class = IN
;; ANSWERS:
;; AUTHORITY RECORDS:
ch. 3600 IN SOA a.nic.ch. helpdesk.nic.ch. 2015010622 900 600 1123200 3600
ch. 3600 IN RRSIG SOA 8 1 3600 20150205202115 20150106200400 60789 ch. gXFznlMM50NpTnKf/1GIa8PJjARc4OUJVjVzicybnZieYvXA1bXo9NnFabfSV8+ePmuvKlph1mdmXi4RWeCy75fT2DdWorJpW9/riW+4z0usW0fHNo5d7SLdxuUJGZCd22VM4y1F79crVmAftifagcsKmvDE0B8HrZ/8sH0Y6uQ=
E5N5J3RCG0FLHRQLGU5G3IN5ROJNRL21.ch. 3600 IN RRSIG NSEC3 8 2 3600 20150124000839 20150105123019 60789 ch. HznmGWxQqbLUD5mjv8FHCwSfsNZ0fk4X6vtgyFTA81rVSQs4mUfoopvrBrYHGB0iKz/eeRCgHisH99L7uw/dWUy8h9pTQM4UFmspLjTiVHDNad6COrKnFFywV8E7CwibCd+qcdo4yGME3TbVkH1BbSvzQrUKKKe5eO/hleMvhSk=
E5N5J3RCG0FLHRQLGU5G3IN5ROJNRL21.ch. 3600 IN NSEC3 1 1 2 A170C978 E5PB8JRENAJFIO1LLO9ELPG39F787FOL NS DS RRSIG
G6DPGFANFNS93LVDHH7362IPSUN8DK5T.ch. 3600 IN RRSIG NSEC3 8 2 3600 20150124064109 20150105123019 60789 ch. pvd/nB3QKjTbLpxM9H9xcJIwmLnNAJPsXMffmjtAjTbceZ7IfpQHmguLPyJS7awSyEOTAhKmpeaT7m4iHhFm1/X4ybZmUvRSexqskgmGzqK+39cjaPrxc+ghdiUgFSjxv36PhoyM5gYnclTqpwGuFR00HK3av9vnnEKEY7zWtmM=
G6DPGFANFNS93LVDHH7362IPSUN8DK5T.ch. 3600 IN NSEC3 1 1 2 A170C978 G6DQNPQ9VP0U8F95714HO3575MPP42V1 NS SOA RRSIG DNSKEY NSEC3PARAM
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 741 bytes
###############################################
dnssecjava-1.1.3/src/test/resources/recordings/org_jitsi_dnssec_TestCNames/testCNameToUnsignedNsec3 0000664 0000000 0000000 00000035621 13020541473 0033702 0 ustar 00root root 0000000 0000000 #Date: 2015-01-06T22:34:53+01:00
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 30287
;; flags: qr aa rd ra cd ; qd: 1 an: 3 au: 3 ad: 2
;; QUESTIONS:
;; cunsinged.nsec3.ingotronic.ch., type = A, class = IN
;; ANSWERS:
cunsinged.nsec3.ingotronic.ch. 300 IN CNAME www.20min.ch.
cunsinged.nsec3.ingotronic.ch. 300 IN RRSIG CNAME 7 4 300 20150125000452 20141225235516 62417 nsec3.ingotronic.ch. rIfDPrgT5aS2eL0ZibS5jElaEZviflBjmKuzikS3r9/QXm+Ad/gO7+/cVdCjK98p4JOWW+RxowOQsL97bPhtmNQZiqUr1agKe3nLLqQw6Y+3hT74BZEcEHmi0xvzdS4syt4BdiiWkf9U7LnLZBvC4sK4d2gG1/apDJi1mOThcDw=
www.20min.ch. 600 IN A 83.140.105.62
;; AUTHORITY RECORDS:
20min.ch. 3600 IN NS ns1.first-ns.de.
20min.ch. 3600 IN NS robotns2.second-ns.de.
20min.ch. 3600 IN NS robotns3.second-ns.com.
;; ADDITIONAL RECORDS:
robotns2.second-ns.de. 1017 IN A 213.133.105.6
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 391 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 35001
;; flags: qr rd ra ad cd ; qd: 1 an: 4 au: 0 ad: 1
;; QUESTIONS:
;; ., type = DNSKEY, class = IN
;; ANSWERS:
. 87380 IN DNSKEY 256 3 8 AwEAAe3fSrbLBy3LOS7pnxEUhvPZTE2H5dIGsI/UfruI/nOEvWWa/PSX2BFedBkEqOlYdjdNF2f+6lmfk2Od/xu0v5bVqxFE+/24v3hZSlWBxvXzPTAGHrbW/IJYEPqlzVOAS4XdUgHg0N7IbLywNHMvB+Yf+Nm6ctyXXFLV4WTNnzs7
. 87380 IN DNSKEY 257 3 8 AwEAAagAIKlVZrpC6Ia7gEzahOR+9W29euxhJhVVLOyQbSEW0O8gcCjFFVQUTf6v58fLjwBd0YI0EzrAcQqBGCzh/RStIoO8g0NfnfL2MTJRkxoXbfDaUeVPQuYEhg37NZWAJQ9VnMVDxP/VHL496M/QZxkjf5/Efucp2gaDX6RS6CXpoY68LsvPVjR0ZSwzz1apAzvN9dlzEheX7ICJBBtuA6G3LQpzW5hOA2hzCTMjJPJ8LbqF6dsV6DoBQzgul0sGIcGOYl7OyQdXfZ57relSQageu+ipAdTTJ25AsRTAoub8ONGcLmqrAmRLKBP1dfwhYB4N7knNnulqQxA+Uk1ihz0=
. 87380 IN DNSKEY 256 3 8 AwEAAaPD7Y7XIi1MOEREJNTrRhyqsY3gff6JWzg+XCbqut1sbcbvqyssHw8DT1AkRaAC92pO8xuyq5QEgEPL1IHfABLwpwXI5gTj4gdwi86bpkmlWs9fRpnn4DPDCTdrnxIejJXgClHikLJF3u3CdpNCMijq4CKdQbMlRZ3avv+G7rh7
. 87380 IN RRSIG DNSKEY 8 0 172800 20150115235959 20150101000000 19036 . i8cAxD2pvQi1oAyvQxRpDfFlbqPzW+69QQEsDwE1eWOm5AtawO9U7lmsGps7sy/fVNvl1ljKBj4Djp9pb3U2FLogjiIlW0cDAkPmLlG9t+b/pjEfBNlhjANUVN06pvQVAfm+LcF26EaWT6FlISBqb6jSy4BHRa3Bdc4Sx7+pRSYSqVVvYxLkfAWsKPqGkvWhebJDndJJV9syXQXgZ+v/uJ+6XOS43xkAdeL8iBzIs/FlwMTfh3tVe3d0lb65IBBLlCzeQuetX+0Vu1YFcnD0mHc/wS2ZnAV5toAFmyVQBoY/XAZiZeaOkcROJ6Zmqezy7liwK7BqsYyAZntMhk8lbg==
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 883 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 37625
;; flags: qr rd ra ad cd ; qd: 1 an: 2 au: 0 ad: 1
;; QUESTIONS:
;; ch., type = DS, class = IN
;; ANSWERS:
ch. 980 IN DS 46375 8 2 8F96646FC68BB7E4AF4C0750A6096FBC0D4ECDA3D3FA6DA06FDDB42EE50C6CF3
ch. 980 IN RRSIG DS 8 1 86400 20150112170000 20150105160000 16665 . thY7xYWBBxiBjqbQIb9fAG4TmQgnziwM7q6P1T3/ITxmECdvOCQnnZA3uD7qmN8uM0HudsD7+y+zgD3rsH4RSTKdL4kHSI0OnCxToMTvklghEgFDezqIRm8NkWdI2H4Stwrj20nYKSpLQxPI2EE54gs18P3KyO8bAUYv8Qx73xU=
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 238 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 31241
;; flags: qr rd ra ad cd ; qd: 1 an: 4 au: 0 ad: 1
;; QUESTIONS:
;; ch., type = DNSKEY, class = IN
;; ANSWERS:
ch. 981 IN DNSKEY 256 3 8 AwEAAcsg0kY6fw1wzYMhSAKTy+Y2JzAst66P/1odp9NECJJHbU8f4nwziI3onoFSBV0ZiSZhY1aH5dhdDZ7BkrqhVXSrZPAz0CvzjIxmB1gSOf9DeZvjQvoy97HqYolxsf+B3QQv2RKBT67elF5+JisKg3/dQISelKn8LhabSoVrMlD1
ch. 981 IN DNSKEY 256 3 8 AwEAAcSLdT0fEmcFmLpeUkAJoeVaHKiu+nbuc43fWlqaCRVf8t2HA4uWxOk0O5ci9nrFTc8nq8oa5fk5Cj7CHh4yrX9qUCfTdIWTyp8BDEdJpS+Dyb0u9wQuVj+nQMj4fLzdQf4TJs3/qxuiLr3nL1UUwlhhXeqSqGVb7p3mtB5HJ8ad
ch. 981 IN DNSKEY 257 3 8 AwEAAb7GhhZ8IAy/AhwmSms5DeQK5ad09wIIplEpYoiAIYXPtJvT1ReFzyfTp/2YP+g/PWDwHPh4qKAHa9x0VgbIQcGAeNakmfkAdWEmCnca323/SAml3mwfaX62G7/uYWae5zh8QTxZKNd+K1yZ5x0IxnI31chSl5xymRbTEHYZDKwSIRFM3fTxUMt93WFaBVWELReYotJBr++rvAWdnlay5TPBTvheLBkaiqtgM4GP8HK07Y+86lsZnEsj5K3G1KTV5SPpa82rqYAwxG9VKbmSE/6/kBR5jJHjt1rRt5Oe7v18aEtw0YCEN4vxq+KuvMoNVqXUsE9LBwHJD+QNwi6wmB0=
ch. 981 IN RRSIG DNSKEY 8 1 86400 20150127100909 20141212090909 46375 ch. bT8q0FWyeMH0SulNo6UdIIgZYNATwYsee2bikq2Gh339Bufma8eaqWIPYT3XKmxYPBFOw0bVl+kLZxTwbR1CFoCDXoP+qgQhh4mf9qkNiv2CDSc+0FE3FRREn+DAhYTUEuB58FPiPakFB8s8O7T+k2qhDae7jy4/y7Jl1lnjaBY8s7bzOUPhF0KKCNZmvoKwtL23ZdVeTSV1xM3jkiNnpzBKbcoSWECSGJVp1SE0BnRXdwQP41YTXFZ0310YjaTAUCC5qbMIWdEkHjfdSQtKBImnc85mkapq9w++XQ4zhauPWBtrPV3CcoCahjUaWdjrKVkibomlJZaN8MEO23CfQw==
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 893 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 14796
;; flags: qr rd ra cd ; qd: 1 an: 3 au: 0 ad: 1
;; QUESTIONS:
;; ingotronic.ch., type = DS, class = IN
;; ANSWERS:
ingotronic.ch. 3589 IN DS 6031 5 2 4A948F2FDADA24686E473EDAC00DCF972584C75E3FAA92C2021B6221449FF87E
ingotronic.ch. 3589 IN DS 6031 5 1 733D0218B571CD617B1A7493564B9FC4F12ADE82
ingotronic.ch. 3589 IN RRSIG DS 8 2 3600 20150129033614 20150105123019 60789 ch. rVPJP2HhzW7OkroK2axFj5Lb4iVWCH8Fp/Iq1rF952NDo72b8RiKje2RaAKJAGQ+wd0YgE+PAej04GCmkhlDJA/zvPeeTxuhy3HbJzReMlQ7fjyH+wW1hli+FuIYvogXWf7nO/9VyPORt8X/f/pjrOr3Vlj9sGLN8TGYpEuVSw4=
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 288 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 47626
;; flags: qr aa rd ra cd ; qd: 1 an: 4 au: 0 ad: 1
;; QUESTIONS:
;; ingotronic.ch., type = DNSKEY, class = IN
;; ANSWERS:
ingotronic.ch. 300 IN DNSKEY 257 3 5 AwEAAeA1vzmjaB+eBAcvhzpKEgAEFpvQ1rg4uKDW6MsQtacKoqBpgyep2+LuWotz5p/xYxj3NGsArwN8Ad5cY0FHRr8miTT0elOv6nvlqGIfRuhj/BXAQ1x4ihpSFslHw0lJMYFwxsUZWpUyjWX/nv1xRZMMwF46gui0N4OEbyTYusCk77D+A71k+K0EAitFIbIH4GCUKmH1H7HmXhSVH9bN/n7KEGwW32lmsuuUcJoRKDkcUvbMXY/9Xoa2quERrUg/rBbDUHowRPjYDS5GzY1+f4YY8s40BufGiqyUTKKXL953MVFK8gmezXA0hbmrnZ7CBOw/7238mORAdzExaX8n7CE=
ingotronic.ch. 300 IN DNSKEY 256 3 5 AwEAAZ2Xh77GFzpEDx7EHYxShqltHgkiG+BOjBGifEmnJhQSdE5/yNSLFNcdhZZ8HUPxYnaedTqJcFFg4AzUsQklF/fECegTJdZjaj2WoL0/I8K7HMfY/hVuRZUWPNglYi8agJRX6gdkFTCpUNI7stpgKqxtzUJhhw15uG/lKMplwqUr
ingotronic.ch. 300 IN RRSIG DNSKEY 5 2 300 20150125003700 20141226001657 6031 ingotronic.ch. rs1QlP2SlSpA2ELbzwg3DgWLzXWL3Lpv6CUJE2Q0qH2Zp7Qdy3cD+ZEtNh9v24Qv1M6JJ3zFt8mmZoCeW2ycuMbJCqBkW9CBuwF+VznZvZY2MxwPipvhvEEGP//0M8YAZJ66yQPDv3PTdAP8FYbIrJyvY44vwyncwbslpfHT9jAsrbfr3vuMuWps86dnP462q+0s1TxBfqi8mzo3gdavjHKWVNwohLahLKT+tWeu6DSzQv0YwMjwtkLgF7QRgx3ctIIkloOrnx9nHH1N6y+hxEB89fOlyVDjHhgL5uVtsD5fEdT0FJ2Gc/2nShEMMqIwr1/J9kUq1mNySff/uEe65Q==
ingotronic.ch. 300 IN RRSIG DNSKEY 5 2 300 20150125003700 20141226001657 17430 ingotronic.ch. mEwZjhQqeWksWD0TCnNBrtce4YkWJL3edqL6PvAUu8Fn+Ih437kEs3+pqdkgRsdYQ9HW+lBm/8pWwJlNAv0bi9NykItXMwAUFtncgq+6Pnh3iAM972GXSa5VV4LcGQ5b8CBdHCHiEKDqyPv5Hr5QfYL/FQaWlcNRh4QZZlZNPFA=
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 940 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 22107
;; flags: qr aa rd ra cd ; qd: 1 an: 3 au: 0 ad: 1
;; QUESTIONS:
;; nsec3.ingotronic.ch., type = DS, class = IN
;; ANSWERS:
nsec3.ingotronic.ch. 300 IN DS 16758 7 2 3C8DC02750A1636F829B45D6E6D642866768A9CD40A013AD9D25AB63734FFA13
nsec3.ingotronic.ch. 300 IN DS 16758 7 1 1720FF268E09A2CB63805EC8782D10AAD20E12A5
nsec3.ingotronic.ch. 300 IN RRSIG DS 5 3 300 20150125011134 20141226002644 17430 ingotronic.ch. hNurzlGhlyHbSgezPDuhIrtN9ZMsMXZbKGc7HD5rUuM88wD3fM97NxdzF+2Hi1USvBZ5GsQv63L+lAzf+mFPBoPIFHtTiAv8up7kQKRKmi/EzzkCYd/CC4UYdDZbaUyv7esh7spSOGwjPJNdK831p+MgltoWaYtnSGVMgOKk5mc=
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 305 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 34962
;; flags: qr aa rd ra cd ; qd: 1 an: 4 au: 0 ad: 1
;; QUESTIONS:
;; nsec3.ingotronic.ch., type = DNSKEY, class = IN
;; ANSWERS:
nsec3.ingotronic.ch. 300 IN DNSKEY 257 3 7 AwEAAaBuJTf9oGyeTH3biUkAFLrsYrkodX1H7Snsui4XsDHFCBvs5XYacHbs0Jg0/O51KPjmNnjwMW8SSyDkKqYQ+9uYAf2EQ/pnD/VGQqnV2cw0Vwk/t0E2V4FUCju4pnAoyzZFZXGs1eWbX9JXu++b0Azp+ACq6485qJLzHhWDiIrPoK/SvdbFVRK4s+nPPJLH3NGBbtdz6kPq7aFWYBMoGeAZdN1wsQpcNWUo5eOmaJY53nMc7+rDpAyYlMe/FKwSZdX2ZDd63Qsa6Im4FVUJq/nWLq7tlQ/mWks15uDTQyJy/OWfA0ICCO4N9Fel9rThJNpJWEzOCblvZyBoy405kZk=
nsec3.ingotronic.ch. 300 IN DNSKEY 256 3 7 AwEAAccAWxkTVGZ6UAp0VEozAlYpARhbh6Y6tYOl6Fg3UeBNFFtDQ9fTEEt1NkbnR9u8KkpVN6a67avlYiUN1egDqEwzDU7R1Rw+/USdhm2hqOARmmu3DBgjjX/iXjZLyv310cOGFJZ/smcodlDL4pDAAoPxh/qs6KEBaT0sc1KWcGq3
nsec3.ingotronic.ch. 300 IN RRSIG DNSKEY 7 3 300 20150125001457 20141226000444 16758 nsec3.ingotronic.ch. mXi1ylDi8XkRPup+YlT8GPdYE+P7gb6+/VdAwtodI916IzrkGkOHOTLbnrbAqqJOh0HxVCYXdxovmEcbJKUFKwplrQg3XD7/9Sq4pKU1MhMFEGrm/QPkM4u0mgjQwyToDLGuPHuFyur3FSjO/n54uGhAEft9JOFk/WKtWdCnm2LLyQrpC6herA3efFaI8kZhdoEY02AwihWVJxHasmz7lOoKRgNrkfELU+fN4+V7ISsRfJMyZc6q5PuNeG6vFD0uNE8tpdLJCSMurKYVpelvYqzFIcRTYcIjXwmS+L3DGjupqWMzFZVmpQM62JG3KCCD0ffpnNb0nWoSoHwpSeh/3Q==
nsec3.ingotronic.ch. 300 IN RRSIG DNSKEY 7 3 300 20150125001457 20141226000444 62417 nsec3.ingotronic.ch. PyCrf8T5dAfJzapb1p+kcTALPjDuD2niSaXXo0KeHAunT+6gJicLML2S/ZpiYr7X7Ma4Z0TYqE02qH6pcLYNnSgv9BE8sZO0nRtPekSyTy5nLi4hFADYhjb3UjaB85qmQZcqm64vC/CJhWO4t6Eixg/5MYALw+Qdy5Fo0qy/U5E=
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 958 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 11098
;; flags: qr rd ra ad cd ; qd: 1 an: 4 au: 0 ad: 1
;; QUESTIONS:
;; ., type = DNSKEY, class = IN
;; ANSWERS:
. 87380 IN DNSKEY 256 3 8 AwEAAaPD7Y7XIi1MOEREJNTrRhyqsY3gff6JWzg+XCbqut1sbcbvqyssHw8DT1AkRaAC92pO8xuyq5QEgEPL1IHfABLwpwXI5gTj4gdwi86bpkmlWs9fRpnn4DPDCTdrnxIejJXgClHikLJF3u3CdpNCMijq4CKdQbMlRZ3avv+G7rh7
. 87380 IN DNSKEY 256 3 8 AwEAAe3fSrbLBy3LOS7pnxEUhvPZTE2H5dIGsI/UfruI/nOEvWWa/PSX2BFedBkEqOlYdjdNF2f+6lmfk2Od/xu0v5bVqxFE+/24v3hZSlWBxvXzPTAGHrbW/IJYEPqlzVOAS4XdUgHg0N7IbLywNHMvB+Yf+Nm6ctyXXFLV4WTNnzs7
. 87380 IN DNSKEY 257 3 8 AwEAAagAIKlVZrpC6Ia7gEzahOR+9W29euxhJhVVLOyQbSEW0O8gcCjFFVQUTf6v58fLjwBd0YI0EzrAcQqBGCzh/RStIoO8g0NfnfL2MTJRkxoXbfDaUeVPQuYEhg37NZWAJQ9VnMVDxP/VHL496M/QZxkjf5/Efucp2gaDX6RS6CXpoY68LsvPVjR0ZSwzz1apAzvN9dlzEheX7ICJBBtuA6G3LQpzW5hOA2hzCTMjJPJ8LbqF6dsV6DoBQzgul0sGIcGOYl7OyQdXfZ57relSQageu+ipAdTTJ25AsRTAoub8ONGcLmqrAmRLKBP1dfwhYB4N7knNnulqQxA+Uk1ihz0=
. 87380 IN RRSIG DNSKEY 8 0 172800 20150115235959 20150101000000 19036 . i8cAxD2pvQi1oAyvQxRpDfFlbqPzW+69QQEsDwE1eWOm5AtawO9U7lmsGps7sy/fVNvl1ljKBj4Djp9pb3U2FLogjiIlW0cDAkPmLlG9t+b/pjEfBNlhjANUVN06pvQVAfm+LcF26EaWT6FlISBqb6jSy4BHRa3Bdc4Sx7+pRSYSqVVvYxLkfAWsKPqGkvWhebJDndJJV9syXQXgZ+v/uJ+6XOS43xkAdeL8iBzIs/FlwMTfh3tVe3d0lb65IBBLlCzeQuetX+0Vu1YFcnD0mHc/wS2ZnAV5toAFmyVQBoY/XAZiZeaOkcROJ6Zmqezy7liwK7BqsYyAZntMhk8lbg==
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 883 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 14971
;; flags: qr rd ra ad cd ; qd: 1 an: 2 au: 0 ad: 1
;; QUESTIONS:
;; ch., type = DS, class = IN
;; ANSWERS:
ch. 980 IN DS 46375 8 2 8F96646FC68BB7E4AF4C0750A6096FBC0D4ECDA3D3FA6DA06FDDB42EE50C6CF3
ch. 980 IN RRSIG DS 8 1 86400 20150112170000 20150105160000 16665 . thY7xYWBBxiBjqbQIb9fAG4TmQgnziwM7q6P1T3/ITxmECdvOCQnnZA3uD7qmN8uM0HudsD7+y+zgD3rsH4RSTKdL4kHSI0OnCxToMTvklghEgFDezqIRm8NkWdI2H4Stwrj20nYKSpLQxPI2EE54gs18P3KyO8bAUYv8Qx73xU=
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 238 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 17809
;; flags: qr rd ra ad cd ; qd: 1 an: 4 au: 0 ad: 1
;; QUESTIONS:
;; ch., type = DNSKEY, class = IN
;; ANSWERS:
ch. 980 IN DNSKEY 256 3 8 AwEAAcSLdT0fEmcFmLpeUkAJoeVaHKiu+nbuc43fWlqaCRVf8t2HA4uWxOk0O5ci9nrFTc8nq8oa5fk5Cj7CHh4yrX9qUCfTdIWTyp8BDEdJpS+Dyb0u9wQuVj+nQMj4fLzdQf4TJs3/qxuiLr3nL1UUwlhhXeqSqGVb7p3mtB5HJ8ad
ch. 980 IN DNSKEY 256 3 8 AwEAAcsg0kY6fw1wzYMhSAKTy+Y2JzAst66P/1odp9NECJJHbU8f4nwziI3onoFSBV0ZiSZhY1aH5dhdDZ7BkrqhVXSrZPAz0CvzjIxmB1gSOf9DeZvjQvoy97HqYolxsf+B3QQv2RKBT67elF5+JisKg3/dQISelKn8LhabSoVrMlD1
ch. 980 IN DNSKEY 257 3 8 AwEAAb7GhhZ8IAy/AhwmSms5DeQK5ad09wIIplEpYoiAIYXPtJvT1ReFzyfTp/2YP+g/PWDwHPh4qKAHa9x0VgbIQcGAeNakmfkAdWEmCnca323/SAml3mwfaX62G7/uYWae5zh8QTxZKNd+K1yZ5x0IxnI31chSl5xymRbTEHYZDKwSIRFM3fTxUMt93WFaBVWELReYotJBr++rvAWdnlay5TPBTvheLBkaiqtgM4GP8HK07Y+86lsZnEsj5K3G1KTV5SPpa82rqYAwxG9VKbmSE/6/kBR5jJHjt1rRt5Oe7v18aEtw0YCEN4vxq+KuvMoNVqXUsE9LBwHJD+QNwi6wmB0=
ch. 980 IN RRSIG DNSKEY 8 1 86400 20150127100909 20141212090909 46375 ch. bT8q0FWyeMH0SulNo6UdIIgZYNATwYsee2bikq2Gh339Bufma8eaqWIPYT3XKmxYPBFOw0bVl+kLZxTwbR1CFoCDXoP+qgQhh4mf9qkNiv2CDSc+0FE3FRREn+DAhYTUEuB58FPiPakFB8s8O7T+k2qhDae7jy4/y7Jl1lnjaBY8s7bzOUPhF0KKCNZmvoKwtL23ZdVeTSV1xM3jkiNnpzBKbcoSWECSGJVp1SE0BnRXdwQP41YTXFZ0310YjaTAUCC5qbMIWdEkHjfdSQtKBImnc85mkapq9w++XQ4zhauPWBtrPV3CcoCahjUaWdjrKVkibomlJZaN8MEO23CfQw==
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 893 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 51464
;; flags: qr rd ra cd ; qd: 1 an: 0 au: 6 ad: 1
;; QUESTIONS:
;; 20min.ch., type = DS, class = IN
;; ANSWERS:
;; AUTHORITY RECORDS:
ch. 3600 IN SOA a.nic.ch. helpdesk.nic.ch. 2015010622 900 600 1123200 3600
ch. 3600 IN RRSIG SOA 8 1 3600 20150205202115 20150106200400 60789 ch. gXFznlMM50NpTnKf/1GIa8PJjARc4OUJVjVzicybnZieYvXA1bXo9NnFabfSV8+ePmuvKlph1mdmXi4RWeCy75fT2DdWorJpW9/riW+4z0usW0fHNo5d7SLdxuUJGZCd22VM4y1F79crVmAftifagcsKmvDE0B8HrZ/8sH0Y6uQ=
E5N5J3RCG0FLHRQLGU5G3IN5ROJNRL21.ch. 3600 IN RRSIG NSEC3 8 2 3600 20150124000839 20150105123019 60789 ch. HznmGWxQqbLUD5mjv8FHCwSfsNZ0fk4X6vtgyFTA81rVSQs4mUfoopvrBrYHGB0iKz/eeRCgHisH99L7uw/dWUy8h9pTQM4UFmspLjTiVHDNad6COrKnFFywV8E7CwibCd+qcdo4yGME3TbVkH1BbSvzQrUKKKe5eO/hleMvhSk=
E5N5J3RCG0FLHRQLGU5G3IN5ROJNRL21.ch. 3600 IN NSEC3 1 1 2 A170C978 E5PB8JRENAJFIO1LLO9ELPG39F787FOL NS DS RRSIG
G6DPGFANFNS93LVDHH7362IPSUN8DK5T.ch. 3600 IN RRSIG NSEC3 8 2 3600 20150124064109 20150105123019 60789 ch. pvd/nB3QKjTbLpxM9H9xcJIwmLnNAJPsXMffmjtAjTbceZ7IfpQHmguLPyJS7awSyEOTAhKmpeaT7m4iHhFm1/X4ybZmUvRSexqskgmGzqK+39cjaPrxc+ghdiUgFSjxv36PhoyM5gYnclTqpwGuFR00HK3av9vnnEKEY7zWtmM=
G6DPGFANFNS93LVDHH7362IPSUN8DK5T.ch. 3600 IN NSEC3 1 1 2 A170C978 G6DQNPQ9VP0U8F95714HO3575MPP42V1 NS SOA RRSIG DNSKEY NSEC3PARAM
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 741 bytes
###############################################
dnssecjava-1.1.3/src/test/resources/recordings/org_jitsi_dnssec_TestCNames/testCNameToUnsignedVoid 0000664 0000000 0000000 00000034472 13020541473 0033633 0 ustar 00root root 0000000 0000000 #Date: 2015-01-06T22:34:56+01:00
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 16068
;; flags: qr aa rd ra cd ; qd: 1 an: 2 au: 1 ad: 1
;; QUESTIONS:
;; cvoid4.ingotronic.ch., type = A, class = IN
;; ANSWERS:
cvoid4.ingotronic.ch. 300 IN CNAME gibtsnicht.unsigned.ingotronic.ch.
cvoid4.ingotronic.ch. 300 IN RRSIG CNAME 5 3 300 20150125010026 20141226003834 17430 ingotronic.ch. GJPzgBVNBOn1X/aX0VhnWdpr3eVFvil6+z2nyPo1ikIdf1hKkpt7uhC7NRpUM9+4Kapxjs+n3Om45LwXtnPrKQ4hYIJFjRoPwBgg+SZN5bFC38e1zSdZnhlSG5CVvz/E2Ga/9/Hoks87s7l3UPfW9/60GO9KTOwnr++PhL8RBa8=
;; AUTHORITY RECORDS:
unsigned.ingotronic.ch. 300 IN SOA ns1.ingotronic.ch. admin.ingotronic.ch. 2013032601 300 60 864000 300
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 302 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 13057
;; flags: qr rd ra ad cd ; qd: 1 an: 4 au: 0 ad: 1
;; QUESTIONS:
;; ., type = DNSKEY, class = IN
;; ANSWERS:
. 87377 IN DNSKEY 257 3 8 AwEAAagAIKlVZrpC6Ia7gEzahOR+9W29euxhJhVVLOyQbSEW0O8gcCjFFVQUTf6v58fLjwBd0YI0EzrAcQqBGCzh/RStIoO8g0NfnfL2MTJRkxoXbfDaUeVPQuYEhg37NZWAJQ9VnMVDxP/VHL496M/QZxkjf5/Efucp2gaDX6RS6CXpoY68LsvPVjR0ZSwzz1apAzvN9dlzEheX7ICJBBtuA6G3LQpzW5hOA2hzCTMjJPJ8LbqF6dsV6DoBQzgul0sGIcGOYl7OyQdXfZ57relSQageu+ipAdTTJ25AsRTAoub8ONGcLmqrAmRLKBP1dfwhYB4N7knNnulqQxA+Uk1ihz0=
. 87377 IN DNSKEY 256 3 8 AwEAAe3fSrbLBy3LOS7pnxEUhvPZTE2H5dIGsI/UfruI/nOEvWWa/PSX2BFedBkEqOlYdjdNF2f+6lmfk2Od/xu0v5bVqxFE+/24v3hZSlWBxvXzPTAGHrbW/IJYEPqlzVOAS4XdUgHg0N7IbLywNHMvB+Yf+Nm6ctyXXFLV4WTNnzs7
. 87377 IN DNSKEY 256 3 8 AwEAAaPD7Y7XIi1MOEREJNTrRhyqsY3gff6JWzg+XCbqut1sbcbvqyssHw8DT1AkRaAC92pO8xuyq5QEgEPL1IHfABLwpwXI5gTj4gdwi86bpkmlWs9fRpnn4DPDCTdrnxIejJXgClHikLJF3u3CdpNCMijq4CKdQbMlRZ3avv+G7rh7
. 87377 IN RRSIG DNSKEY 8 0 172800 20150115235959 20150101000000 19036 . i8cAxD2pvQi1oAyvQxRpDfFlbqPzW+69QQEsDwE1eWOm5AtawO9U7lmsGps7sy/fVNvl1ljKBj4Djp9pb3U2FLogjiIlW0cDAkPmLlG9t+b/pjEfBNlhjANUVN06pvQVAfm+LcF26EaWT6FlISBqb6jSy4BHRa3Bdc4Sx7+pRSYSqVVvYxLkfAWsKPqGkvWhebJDndJJV9syXQXgZ+v/uJ+6XOS43xkAdeL8iBzIs/FlwMTfh3tVe3d0lb65IBBLlCzeQuetX+0Vu1YFcnD0mHc/wS2ZnAV5toAFmyVQBoY/XAZiZeaOkcROJ6Zmqezy7liwK7BqsYyAZntMhk8lbg==
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 883 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 54555
;; flags: qr rd ra ad cd ; qd: 1 an: 2 au: 0 ad: 1
;; QUESTIONS:
;; ch., type = DS, class = IN
;; ANSWERS:
ch. 977 IN DS 46375 8 2 8F96646FC68BB7E4AF4C0750A6096FBC0D4ECDA3D3FA6DA06FDDB42EE50C6CF3
ch. 977 IN RRSIG DS 8 1 86400 20150112170000 20150105160000 16665 . thY7xYWBBxiBjqbQIb9fAG4TmQgnziwM7q6P1T3/ITxmECdvOCQnnZA3uD7qmN8uM0HudsD7+y+zgD3rsH4RSTKdL4kHSI0OnCxToMTvklghEgFDezqIRm8NkWdI2H4Stwrj20nYKSpLQxPI2EE54gs18P3KyO8bAUYv8Qx73xU=
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 238 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 62611
;; flags: qr rd ra ad cd ; qd: 1 an: 4 au: 0 ad: 1
;; QUESTIONS:
;; ch., type = DNSKEY, class = IN
;; ANSWERS:
ch. 978 IN DNSKEY 257 3 8 AwEAAb7GhhZ8IAy/AhwmSms5DeQK5ad09wIIplEpYoiAIYXPtJvT1ReFzyfTp/2YP+g/PWDwHPh4qKAHa9x0VgbIQcGAeNakmfkAdWEmCnca323/SAml3mwfaX62G7/uYWae5zh8QTxZKNd+K1yZ5x0IxnI31chSl5xymRbTEHYZDKwSIRFM3fTxUMt93WFaBVWELReYotJBr++rvAWdnlay5TPBTvheLBkaiqtgM4GP8HK07Y+86lsZnEsj5K3G1KTV5SPpa82rqYAwxG9VKbmSE/6/kBR5jJHjt1rRt5Oe7v18aEtw0YCEN4vxq+KuvMoNVqXUsE9LBwHJD+QNwi6wmB0=
ch. 978 IN DNSKEY 256 3 8 AwEAAcsg0kY6fw1wzYMhSAKTy+Y2JzAst66P/1odp9NECJJHbU8f4nwziI3onoFSBV0ZiSZhY1aH5dhdDZ7BkrqhVXSrZPAz0CvzjIxmB1gSOf9DeZvjQvoy97HqYolxsf+B3QQv2RKBT67elF5+JisKg3/dQISelKn8LhabSoVrMlD1
ch. 978 IN DNSKEY 256 3 8 AwEAAcSLdT0fEmcFmLpeUkAJoeVaHKiu+nbuc43fWlqaCRVf8t2HA4uWxOk0O5ci9nrFTc8nq8oa5fk5Cj7CHh4yrX9qUCfTdIWTyp8BDEdJpS+Dyb0u9wQuVj+nQMj4fLzdQf4TJs3/qxuiLr3nL1UUwlhhXeqSqGVb7p3mtB5HJ8ad
ch. 978 IN RRSIG DNSKEY 8 1 86400 20150127100909 20141212090909 46375 ch. bT8q0FWyeMH0SulNo6UdIIgZYNATwYsee2bikq2Gh339Bufma8eaqWIPYT3XKmxYPBFOw0bVl+kLZxTwbR1CFoCDXoP+qgQhh4mf9qkNiv2CDSc+0FE3FRREn+DAhYTUEuB58FPiPakFB8s8O7T+k2qhDae7jy4/y7Jl1lnjaBY8s7bzOUPhF0KKCNZmvoKwtL23ZdVeTSV1xM3jkiNnpzBKbcoSWECSGJVp1SE0BnRXdwQP41YTXFZ0310YjaTAUCC5qbMIWdEkHjfdSQtKBImnc85mkapq9w++XQ4zhauPWBtrPV3CcoCahjUaWdjrKVkibomlJZaN8MEO23CfQw==
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 893 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 9284
;; flags: qr rd ra cd ; qd: 1 an: 3 au: 0 ad: 1
;; QUESTIONS:
;; ingotronic.ch., type = DS, class = IN
;; ANSWERS:
ingotronic.ch. 3586 IN DS 6031 5 1 733D0218B571CD617B1A7493564B9FC4F12ADE82
ingotronic.ch. 3586 IN DS 6031 5 2 4A948F2FDADA24686E473EDAC00DCF972584C75E3FAA92C2021B6221449FF87E
ingotronic.ch. 3586 IN RRSIG DS 8 2 3600 20150129033614 20150105123019 60789 ch. rVPJP2HhzW7OkroK2axFj5Lb4iVWCH8Fp/Iq1rF952NDo72b8RiKje2RaAKJAGQ+wd0YgE+PAej04GCmkhlDJA/zvPeeTxuhy3HbJzReMlQ7fjyH+wW1hli+FuIYvogXWf7nO/9VyPORt8X/f/pjrOr3Vlj9sGLN8TGYpEuVSw4=
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 288 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 24290
;; flags: qr aa rd ra cd ; qd: 1 an: 4 au: 0 ad: 1
;; QUESTIONS:
;; ingotronic.ch., type = DNSKEY, class = IN
;; ANSWERS:
ingotronic.ch. 300 IN DNSKEY 257 3 5 AwEAAeA1vzmjaB+eBAcvhzpKEgAEFpvQ1rg4uKDW6MsQtacKoqBpgyep2+LuWotz5p/xYxj3NGsArwN8Ad5cY0FHRr8miTT0elOv6nvlqGIfRuhj/BXAQ1x4ihpSFslHw0lJMYFwxsUZWpUyjWX/nv1xRZMMwF46gui0N4OEbyTYusCk77D+A71k+K0EAitFIbIH4GCUKmH1H7HmXhSVH9bN/n7KEGwW32lmsuuUcJoRKDkcUvbMXY/9Xoa2quERrUg/rBbDUHowRPjYDS5GzY1+f4YY8s40BufGiqyUTKKXL953MVFK8gmezXA0hbmrnZ7CBOw/7238mORAdzExaX8n7CE=
ingotronic.ch. 300 IN DNSKEY 256 3 5 AwEAAZ2Xh77GFzpEDx7EHYxShqltHgkiG+BOjBGifEmnJhQSdE5/yNSLFNcdhZZ8HUPxYnaedTqJcFFg4AzUsQklF/fECegTJdZjaj2WoL0/I8K7HMfY/hVuRZUWPNglYi8agJRX6gdkFTCpUNI7stpgKqxtzUJhhw15uG/lKMplwqUr
ingotronic.ch. 300 IN RRSIG DNSKEY 5 2 300 20150125003700 20141226001657 6031 ingotronic.ch. rs1QlP2SlSpA2ELbzwg3DgWLzXWL3Lpv6CUJE2Q0qH2Zp7Qdy3cD+ZEtNh9v24Qv1M6JJ3zFt8mmZoCeW2ycuMbJCqBkW9CBuwF+VznZvZY2MxwPipvhvEEGP//0M8YAZJ66yQPDv3PTdAP8FYbIrJyvY44vwyncwbslpfHT9jAsrbfr3vuMuWps86dnP462q+0s1TxBfqi8mzo3gdavjHKWVNwohLahLKT+tWeu6DSzQv0YwMjwtkLgF7QRgx3ctIIkloOrnx9nHH1N6y+hxEB89fOlyVDjHhgL5uVtsD5fEdT0FJ2Gc/2nShEMMqIwr1/J9kUq1mNySff/uEe65Q==
ingotronic.ch. 300 IN RRSIG DNSKEY 5 2 300 20150125003700 20141226001657 17430 ingotronic.ch. mEwZjhQqeWksWD0TCnNBrtce4YkWJL3edqL6PvAUu8Fn+Ih437kEs3+pqdkgRsdYQ9HW+lBm/8pWwJlNAv0bi9NykItXMwAUFtncgq+6Pnh3iAM972GXSa5VV4LcGQ5b8CBdHCHiEKDqyPv5Hr5QfYL/FQaWlcNRh4QZZlZNPFA=
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 940 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 1013
;; flags: qr rd ra ad cd ; qd: 1 an: 4 au: 0 ad: 1
;; QUESTIONS:
;; ., type = DNSKEY, class = IN
;; ANSWERS:
. 87377 IN DNSKEY 256 3 8 AwEAAaPD7Y7XIi1MOEREJNTrRhyqsY3gff6JWzg+XCbqut1sbcbvqyssHw8DT1AkRaAC92pO8xuyq5QEgEPL1IHfABLwpwXI5gTj4gdwi86bpkmlWs9fRpnn4DPDCTdrnxIejJXgClHikLJF3u3CdpNCMijq4CKdQbMlRZ3avv+G7rh7
. 87377 IN DNSKEY 257 3 8 AwEAAagAIKlVZrpC6Ia7gEzahOR+9W29euxhJhVVLOyQbSEW0O8gcCjFFVQUTf6v58fLjwBd0YI0EzrAcQqBGCzh/RStIoO8g0NfnfL2MTJRkxoXbfDaUeVPQuYEhg37NZWAJQ9VnMVDxP/VHL496M/QZxkjf5/Efucp2gaDX6RS6CXpoY68LsvPVjR0ZSwzz1apAzvN9dlzEheX7ICJBBtuA6G3LQpzW5hOA2hzCTMjJPJ8LbqF6dsV6DoBQzgul0sGIcGOYl7OyQdXfZ57relSQageu+ipAdTTJ25AsRTAoub8ONGcLmqrAmRLKBP1dfwhYB4N7knNnulqQxA+Uk1ihz0=
. 87377 IN DNSKEY 256 3 8 AwEAAe3fSrbLBy3LOS7pnxEUhvPZTE2H5dIGsI/UfruI/nOEvWWa/PSX2BFedBkEqOlYdjdNF2f+6lmfk2Od/xu0v5bVqxFE+/24v3hZSlWBxvXzPTAGHrbW/IJYEPqlzVOAS4XdUgHg0N7IbLywNHMvB+Yf+Nm6ctyXXFLV4WTNnzs7
. 87377 IN RRSIG DNSKEY 8 0 172800 20150115235959 20150101000000 19036 . i8cAxD2pvQi1oAyvQxRpDfFlbqPzW+69QQEsDwE1eWOm5AtawO9U7lmsGps7sy/fVNvl1ljKBj4Djp9pb3U2FLogjiIlW0cDAkPmLlG9t+b/pjEfBNlhjANUVN06pvQVAfm+LcF26EaWT6FlISBqb6jSy4BHRa3Bdc4Sx7+pRSYSqVVvYxLkfAWsKPqGkvWhebJDndJJV9syXQXgZ+v/uJ+6XOS43xkAdeL8iBzIs/FlwMTfh3tVe3d0lb65IBBLlCzeQuetX+0Vu1YFcnD0mHc/wS2ZnAV5toAFmyVQBoY/XAZiZeaOkcROJ6Zmqezy7liwK7BqsYyAZntMhk8lbg==
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 883 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 38352
;; flags: qr rd ra ad cd ; qd: 1 an: 2 au: 0 ad: 1
;; QUESTIONS:
;; ch., type = DS, class = IN
;; ANSWERS:
ch. 977 IN DS 46375 8 2 8F96646FC68BB7E4AF4C0750A6096FBC0D4ECDA3D3FA6DA06FDDB42EE50C6CF3
ch. 977 IN RRSIG DS 8 1 86400 20150112170000 20150105160000 16665 . thY7xYWBBxiBjqbQIb9fAG4TmQgnziwM7q6P1T3/ITxmECdvOCQnnZA3uD7qmN8uM0HudsD7+y+zgD3rsH4RSTKdL4kHSI0OnCxToMTvklghEgFDezqIRm8NkWdI2H4Stwrj20nYKSpLQxPI2EE54gs18P3KyO8bAUYv8Qx73xU=
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 238 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 46761
;; flags: qr rd ra ad cd ; qd: 1 an: 4 au: 0 ad: 1
;; QUESTIONS:
;; ch., type = DNSKEY, class = IN
;; ANSWERS:
ch. 978 IN DNSKEY 256 3 8 AwEAAcSLdT0fEmcFmLpeUkAJoeVaHKiu+nbuc43fWlqaCRVf8t2HA4uWxOk0O5ci9nrFTc8nq8oa5fk5Cj7CHh4yrX9qUCfTdIWTyp8BDEdJpS+Dyb0u9wQuVj+nQMj4fLzdQf4TJs3/qxuiLr3nL1UUwlhhXeqSqGVb7p3mtB5HJ8ad
ch. 978 IN DNSKEY 257 3 8 AwEAAb7GhhZ8IAy/AhwmSms5DeQK5ad09wIIplEpYoiAIYXPtJvT1ReFzyfTp/2YP+g/PWDwHPh4qKAHa9x0VgbIQcGAeNakmfkAdWEmCnca323/SAml3mwfaX62G7/uYWae5zh8QTxZKNd+K1yZ5x0IxnI31chSl5xymRbTEHYZDKwSIRFM3fTxUMt93WFaBVWELReYotJBr++rvAWdnlay5TPBTvheLBkaiqtgM4GP8HK07Y+86lsZnEsj5K3G1KTV5SPpa82rqYAwxG9VKbmSE/6/kBR5jJHjt1rRt5Oe7v18aEtw0YCEN4vxq+KuvMoNVqXUsE9LBwHJD+QNwi6wmB0=
ch. 978 IN DNSKEY 256 3 8 AwEAAcsg0kY6fw1wzYMhSAKTy+Y2JzAst66P/1odp9NECJJHbU8f4nwziI3onoFSBV0ZiSZhY1aH5dhdDZ7BkrqhVXSrZPAz0CvzjIxmB1gSOf9DeZvjQvoy97HqYolxsf+B3QQv2RKBT67elF5+JisKg3/dQISelKn8LhabSoVrMlD1
ch. 978 IN RRSIG DNSKEY 8 1 86400 20150127100909 20141212090909 46375 ch. bT8q0FWyeMH0SulNo6UdIIgZYNATwYsee2bikq2Gh339Bufma8eaqWIPYT3XKmxYPBFOw0bVl+kLZxTwbR1CFoCDXoP+qgQhh4mf9qkNiv2CDSc+0FE3FRREn+DAhYTUEuB58FPiPakFB8s8O7T+k2qhDae7jy4/y7Jl1lnjaBY8s7bzOUPhF0KKCNZmvoKwtL23ZdVeTSV1xM3jkiNnpzBKbcoSWECSGJVp1SE0BnRXdwQP41YTXFZ0310YjaTAUCC5qbMIWdEkHjfdSQtKBImnc85mkapq9w++XQ4zhauPWBtrPV3CcoCahjUaWdjrKVkibomlJZaN8MEO23CfQw==
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 893 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 56933
;; flags: qr rd ra cd ; qd: 1 an: 3 au: 0 ad: 1
;; QUESTIONS:
;; ingotronic.ch., type = DS, class = IN
;; ANSWERS:
ingotronic.ch. 3586 IN DS 6031 5 1 733D0218B571CD617B1A7493564B9FC4F12ADE82
ingotronic.ch. 3586 IN DS 6031 5 2 4A948F2FDADA24686E473EDAC00DCF972584C75E3FAA92C2021B6221449FF87E
ingotronic.ch. 3586 IN RRSIG DS 8 2 3600 20150129033614 20150105123019 60789 ch. rVPJP2HhzW7OkroK2axFj5Lb4iVWCH8Fp/Iq1rF952NDo72b8RiKje2RaAKJAGQ+wd0YgE+PAej04GCmkhlDJA/zvPeeTxuhy3HbJzReMlQ7fjyH+wW1hli+FuIYvogXWf7nO/9VyPORt8X/f/pjrOr3Vlj9sGLN8TGYpEuVSw4=
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 288 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 32818
;; flags: qr aa rd ra cd ; qd: 1 an: 4 au: 0 ad: 1
;; QUESTIONS:
;; ingotronic.ch., type = DNSKEY, class = IN
;; ANSWERS:
ingotronic.ch. 300 IN DNSKEY 257 3 5 AwEAAeA1vzmjaB+eBAcvhzpKEgAEFpvQ1rg4uKDW6MsQtacKoqBpgyep2+LuWotz5p/xYxj3NGsArwN8Ad5cY0FHRr8miTT0elOv6nvlqGIfRuhj/BXAQ1x4ihpSFslHw0lJMYFwxsUZWpUyjWX/nv1xRZMMwF46gui0N4OEbyTYusCk77D+A71k+K0EAitFIbIH4GCUKmH1H7HmXhSVH9bN/n7KEGwW32lmsuuUcJoRKDkcUvbMXY/9Xoa2quERrUg/rBbDUHowRPjYDS5GzY1+f4YY8s40BufGiqyUTKKXL953MVFK8gmezXA0hbmrnZ7CBOw/7238mORAdzExaX8n7CE=
ingotronic.ch. 300 IN DNSKEY 256 3 5 AwEAAZ2Xh77GFzpEDx7EHYxShqltHgkiG+BOjBGifEmnJhQSdE5/yNSLFNcdhZZ8HUPxYnaedTqJcFFg4AzUsQklF/fECegTJdZjaj2WoL0/I8K7HMfY/hVuRZUWPNglYi8agJRX6gdkFTCpUNI7stpgKqxtzUJhhw15uG/lKMplwqUr
ingotronic.ch. 300 IN RRSIG DNSKEY 5 2 300 20150125003700 20141226001657 6031 ingotronic.ch. rs1QlP2SlSpA2ELbzwg3DgWLzXWL3Lpv6CUJE2Q0qH2Zp7Qdy3cD+ZEtNh9v24Qv1M6JJ3zFt8mmZoCeW2ycuMbJCqBkW9CBuwF+VznZvZY2MxwPipvhvEEGP//0M8YAZJ66yQPDv3PTdAP8FYbIrJyvY44vwyncwbslpfHT9jAsrbfr3vuMuWps86dnP462q+0s1TxBfqi8mzo3gdavjHKWVNwohLahLKT+tWeu6DSzQv0YwMjwtkLgF7QRgx3ctIIkloOrnx9nHH1N6y+hxEB89fOlyVDjHhgL5uVtsD5fEdT0FJ2Gc/2nShEMMqIwr1/J9kUq1mNySff/uEe65Q==
ingotronic.ch. 300 IN RRSIG DNSKEY 5 2 300 20150125003700 20141226001657 17430 ingotronic.ch. mEwZjhQqeWksWD0TCnNBrtce4YkWJL3edqL6PvAUu8Fn+Ih437kEs3+pqdkgRsdYQ9HW+lBm/8pWwJlNAv0bi9NykItXMwAUFtncgq+6Pnh3iAM972GXSa5VV4LcGQ5b8CBdHCHiEKDqyPv5Hr5QfYL/FQaWlcNRh4QZZlZNPFA=
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 940 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 13560
;; flags: qr aa rd ra cd ; qd: 1 an: 0 au: 4 ad: 1
;; QUESTIONS:
;; unsigned.ingotronic.ch., type = DS, class = IN
;; ANSWERS:
;; AUTHORITY RECORDS:
ingotronic.ch. 300 IN SOA ns1.ingotronic.ch. admin.ingotronic.ch. 2013032762 300 60 864000 300
ingotronic.ch. 300 IN RRSIG SOA 5 2 300 20150125021244 20141226011244 17430 ingotronic.ch. WDLpp9G0P/rlMBfpFn9sAfpEFoBnQfwyGSXbGCc/LG1FSkJoKLDQYDY696scLNsJgkrzZeJrl0oSSvA8AvRUhYRrmuqWMxTVFgYlRwPwqEMCKUqiVhKGVF4NYemoBiUQC4nJwBZd57xKCiF4AQ4CodBtiZxefJFAlTNE0g2yxtM=
unsigned.ingotronic.ch. 300 IN NSEC v.ingotronic.ch. NS RRSIG NSEC
unsigned.ingotronic.ch. 300 IN RRSIG NSEC 5 3 300 20150125004144 20141226003211 17430 ingotronic.ch. VsO/22QJi2Ny+QZBukileDIUc4/DqPdZwNssNbylPAscz0IBrLt9zKDcI26NSMqhFRFXIZqBXJScmKJseKB+wQUscwKK5kkzUIXK/SPbLQ8MLnOUKIXUgURDKDCp6W8eHoa/51dOS0Vb1woxmzN1kQnjTTUoW5z1igN7RcYCuGQ=
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 480 bytes
###############################################
dnssecjava-1.1.3/src/test/resources/recordings/org_jitsi_dnssec_TestCNames/testCNameToVoid 0000664 0000000 0000000 00000017730 13020541473 0032134 0 ustar 00root root 0000000 0000000 #Date: 2015-01-06T22:34:55+01:00
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 61136
;; flags: qr aa rd ra cd ; qd: 1 an: 2 au: 6 ad: 1
;; QUESTIONS:
;; cvoid1.ingotronic.ch., type = A, class = IN
;; ANSWERS:
cvoid1.ingotronic.ch. 300 IN CNAME gibtsnicht.ingotronic.ch.
cvoid1.ingotronic.ch. 300 IN RRSIG CNAME 5 3 300 20150125000532 20141225234703 17430 ingotronic.ch. bjZ5dgY+WNUzgkbA9Bvgz9Ux6lQxEVWzrtnkByK7C6itvwG3pS1LcxOCPi79a5PQqbGm1S4axCsEHtZkoZWWU2OEUvfiqJtATnxBGlb43q0eP8wQhmxMSqSC5DNedShLeT5v1hhvCyyJ7lEpMKwI1ROc/MMtFzvlWHKCqb81lxQ=
;; AUTHORITY RECORDS:
ingotronic.ch. 300 IN SOA ns1.ingotronic.ch. admin.ingotronic.ch. 2013032762 300 60 864000 300
ingotronic.ch. 300 IN RRSIG SOA 5 2 300 20150125021244 20141226011244 17430 ingotronic.ch. WDLpp9G0P/rlMBfpFn9sAfpEFoBnQfwyGSXbGCc/LG1FSkJoKLDQYDY696scLNsJgkrzZeJrl0oSSvA8AvRUhYRrmuqWMxTVFgYlRwPwqEMCKUqiVhKGVF4NYemoBiUQC4nJwBZd57xKCiF4AQ4CodBtiZxefJFAlTNE0g2yxtM=
ingotronic.ch. 300 IN NSEC alias.ingotronic.ch. A NS SOA RRSIG NSEC DNSKEY
ingotronic.ch. 300 IN RRSIG NSEC 5 2 300 20150125000532 20141225234703 17430 ingotronic.ch. en5BaZ6zWqEvoUFUDPm5g1pjz7THXBv/1kjKtV2tS+7xh0BtkLEzlA9n/H66ZZAX2EIh7vXj12xVJKOuEuM0o1mJwKsBaLQuTra60/zYAUIddwUOCzI3zzjiRFklPyHSnLkGoBODZcvehnsTzTPyBxkfoouleqpj7gN5jOSBL8M=
eccgost.ingotronic.ch. 300 IN NSEC invalid.ingotronic.ch. NS DS RRSIG NSEC
eccgost.ingotronic.ch. 300 IN RRSIG NSEC 5 3 300 20150125021136 20141226011244 17430 ingotronic.ch. lsX44/1144d1nG80WVhDnZCiywh+KTNqj9oEECk3GifEjOWNTJDTfbBnrGbdc7BIWs1mZmcPKFVfQB39QunMyzNQi4Wzjor3U1FPbXhUTn/g9fMul37g1aR00hUfS2Jo49vfDZEMZWp7th9ZFc+hlr8uWISceul5OJRq4SyMbzs=
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 905 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 16825
;; flags: qr rd ra ad cd ; qd: 1 an: 4 au: 0 ad: 1
;; QUESTIONS:
;; ., type = DNSKEY, class = IN
;; ANSWERS:
. 87378 IN DNSKEY 256 3 8 AwEAAe3fSrbLBy3LOS7pnxEUhvPZTE2H5dIGsI/UfruI/nOEvWWa/PSX2BFedBkEqOlYdjdNF2f+6lmfk2Od/xu0v5bVqxFE+/24v3hZSlWBxvXzPTAGHrbW/IJYEPqlzVOAS4XdUgHg0N7IbLywNHMvB+Yf+Nm6ctyXXFLV4WTNnzs7
. 87378 IN DNSKEY 257 3 8 AwEAAagAIKlVZrpC6Ia7gEzahOR+9W29euxhJhVVLOyQbSEW0O8gcCjFFVQUTf6v58fLjwBd0YI0EzrAcQqBGCzh/RStIoO8g0NfnfL2MTJRkxoXbfDaUeVPQuYEhg37NZWAJQ9VnMVDxP/VHL496M/QZxkjf5/Efucp2gaDX6RS6CXpoY68LsvPVjR0ZSwzz1apAzvN9dlzEheX7ICJBBtuA6G3LQpzW5hOA2hzCTMjJPJ8LbqF6dsV6DoBQzgul0sGIcGOYl7OyQdXfZ57relSQageu+ipAdTTJ25AsRTAoub8ONGcLmqrAmRLKBP1dfwhYB4N7knNnulqQxA+Uk1ihz0=
. 87378 IN DNSKEY 256 3 8 AwEAAaPD7Y7XIi1MOEREJNTrRhyqsY3gff6JWzg+XCbqut1sbcbvqyssHw8DT1AkRaAC92pO8xuyq5QEgEPL1IHfABLwpwXI5gTj4gdwi86bpkmlWs9fRpnn4DPDCTdrnxIejJXgClHikLJF3u3CdpNCMijq4CKdQbMlRZ3avv+G7rh7
. 87378 IN RRSIG DNSKEY 8 0 172800 20150115235959 20150101000000 19036 . i8cAxD2pvQi1oAyvQxRpDfFlbqPzW+69QQEsDwE1eWOm5AtawO9U7lmsGps7sy/fVNvl1ljKBj4Djp9pb3U2FLogjiIlW0cDAkPmLlG9t+b/pjEfBNlhjANUVN06pvQVAfm+LcF26EaWT6FlISBqb6jSy4BHRa3Bdc4Sx7+pRSYSqVVvYxLkfAWsKPqGkvWhebJDndJJV9syXQXgZ+v/uJ+6XOS43xkAdeL8iBzIs/FlwMTfh3tVe3d0lb65IBBLlCzeQuetX+0Vu1YFcnD0mHc/wS2ZnAV5toAFmyVQBoY/XAZiZeaOkcROJ6Zmqezy7liwK7BqsYyAZntMhk8lbg==
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 883 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 29298
;; flags: qr rd ra ad cd ; qd: 1 an: 2 au: 0 ad: 1
;; QUESTIONS:
;; ch., type = DS, class = IN
;; ANSWERS:
ch. 978 IN DS 46375 8 2 8F96646FC68BB7E4AF4C0750A6096FBC0D4ECDA3D3FA6DA06FDDB42EE50C6CF3
ch. 978 IN RRSIG DS 8 1 86400 20150112170000 20150105160000 16665 . thY7xYWBBxiBjqbQIb9fAG4TmQgnziwM7q6P1T3/ITxmECdvOCQnnZA3uD7qmN8uM0HudsD7+y+zgD3rsH4RSTKdL4kHSI0OnCxToMTvklghEgFDezqIRm8NkWdI2H4Stwrj20nYKSpLQxPI2EE54gs18P3KyO8bAUYv8Qx73xU=
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 238 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 33412
;; flags: qr rd ra ad cd ; qd: 1 an: 4 au: 0 ad: 1
;; QUESTIONS:
;; ch., type = DNSKEY, class = IN
;; ANSWERS:
ch. 979 IN DNSKEY 257 3 8 AwEAAb7GhhZ8IAy/AhwmSms5DeQK5ad09wIIplEpYoiAIYXPtJvT1ReFzyfTp/2YP+g/PWDwHPh4qKAHa9x0VgbIQcGAeNakmfkAdWEmCnca323/SAml3mwfaX62G7/uYWae5zh8QTxZKNd+K1yZ5x0IxnI31chSl5xymRbTEHYZDKwSIRFM3fTxUMt93WFaBVWELReYotJBr++rvAWdnlay5TPBTvheLBkaiqtgM4GP8HK07Y+86lsZnEsj5K3G1KTV5SPpa82rqYAwxG9VKbmSE/6/kBR5jJHjt1rRt5Oe7v18aEtw0YCEN4vxq+KuvMoNVqXUsE9LBwHJD+QNwi6wmB0=
ch. 979 IN DNSKEY 256 3 8 AwEAAcSLdT0fEmcFmLpeUkAJoeVaHKiu+nbuc43fWlqaCRVf8t2HA4uWxOk0O5ci9nrFTc8nq8oa5fk5Cj7CHh4yrX9qUCfTdIWTyp8BDEdJpS+Dyb0u9wQuVj+nQMj4fLzdQf4TJs3/qxuiLr3nL1UUwlhhXeqSqGVb7p3mtB5HJ8ad
ch. 979 IN DNSKEY 256 3 8 AwEAAcsg0kY6fw1wzYMhSAKTy+Y2JzAst66P/1odp9NECJJHbU8f4nwziI3onoFSBV0ZiSZhY1aH5dhdDZ7BkrqhVXSrZPAz0CvzjIxmB1gSOf9DeZvjQvoy97HqYolxsf+B3QQv2RKBT67elF5+JisKg3/dQISelKn8LhabSoVrMlD1
ch. 979 IN RRSIG DNSKEY 8 1 86400 20150127100909 20141212090909 46375 ch. bT8q0FWyeMH0SulNo6UdIIgZYNATwYsee2bikq2Gh339Bufma8eaqWIPYT3XKmxYPBFOw0bVl+kLZxTwbR1CFoCDXoP+qgQhh4mf9qkNiv2CDSc+0FE3FRREn+DAhYTUEuB58FPiPakFB8s8O7T+k2qhDae7jy4/y7Jl1lnjaBY8s7bzOUPhF0KKCNZmvoKwtL23ZdVeTSV1xM3jkiNnpzBKbcoSWECSGJVp1SE0BnRXdwQP41YTXFZ0310YjaTAUCC5qbMIWdEkHjfdSQtKBImnc85mkapq9w++XQ4zhauPWBtrPV3CcoCahjUaWdjrKVkibomlJZaN8MEO23CfQw==
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 893 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 13219
;; flags: qr rd ra cd ; qd: 1 an: 3 au: 0 ad: 1
;; QUESTIONS:
;; ingotronic.ch., type = DS, class = IN
;; ANSWERS:
ingotronic.ch. 3587 IN DS 6031 5 1 733D0218B571CD617B1A7493564B9FC4F12ADE82
ingotronic.ch. 3587 IN DS 6031 5 2 4A948F2FDADA24686E473EDAC00DCF972584C75E3FAA92C2021B6221449FF87E
ingotronic.ch. 3587 IN RRSIG DS 8 2 3600 20150129033614 20150105123019 60789 ch. rVPJP2HhzW7OkroK2axFj5Lb4iVWCH8Fp/Iq1rF952NDo72b8RiKje2RaAKJAGQ+wd0YgE+PAej04GCmkhlDJA/zvPeeTxuhy3HbJzReMlQ7fjyH+wW1hli+FuIYvogXWf7nO/9VyPORt8X/f/pjrOr3Vlj9sGLN8TGYpEuVSw4=
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 288 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 54010
;; flags: qr aa rd ra cd ; qd: 1 an: 4 au: 0 ad: 1
;; QUESTIONS:
;; ingotronic.ch., type = DNSKEY, class = IN
;; ANSWERS:
ingotronic.ch. 300 IN DNSKEY 256 3 5 AwEAAZ2Xh77GFzpEDx7EHYxShqltHgkiG+BOjBGifEmnJhQSdE5/yNSLFNcdhZZ8HUPxYnaedTqJcFFg4AzUsQklF/fECegTJdZjaj2WoL0/I8K7HMfY/hVuRZUWPNglYi8agJRX6gdkFTCpUNI7stpgKqxtzUJhhw15uG/lKMplwqUr
ingotronic.ch. 300 IN DNSKEY 257 3 5 AwEAAeA1vzmjaB+eBAcvhzpKEgAEFpvQ1rg4uKDW6MsQtacKoqBpgyep2+LuWotz5p/xYxj3NGsArwN8Ad5cY0FHRr8miTT0elOv6nvlqGIfRuhj/BXAQ1x4ihpSFslHw0lJMYFwxsUZWpUyjWX/nv1xRZMMwF46gui0N4OEbyTYusCk77D+A71k+K0EAitFIbIH4GCUKmH1H7HmXhSVH9bN/n7KEGwW32lmsuuUcJoRKDkcUvbMXY/9Xoa2quERrUg/rBbDUHowRPjYDS5GzY1+f4YY8s40BufGiqyUTKKXL953MVFK8gmezXA0hbmrnZ7CBOw/7238mORAdzExaX8n7CE=
ingotronic.ch. 300 IN RRSIG DNSKEY 5 2 300 20150125003700 20141226001657 6031 ingotronic.ch. rs1QlP2SlSpA2ELbzwg3DgWLzXWL3Lpv6CUJE2Q0qH2Zp7Qdy3cD+ZEtNh9v24Qv1M6JJ3zFt8mmZoCeW2ycuMbJCqBkW9CBuwF+VznZvZY2MxwPipvhvEEGP//0M8YAZJ66yQPDv3PTdAP8FYbIrJyvY44vwyncwbslpfHT9jAsrbfr3vuMuWps86dnP462q+0s1TxBfqi8mzo3gdavjHKWVNwohLahLKT+tWeu6DSzQv0YwMjwtkLgF7QRgx3ctIIkloOrnx9nHH1N6y+hxEB89fOlyVDjHhgL5uVtsD5fEdT0FJ2Gc/2nShEMMqIwr1/J9kUq1mNySff/uEe65Q==
ingotronic.ch. 300 IN RRSIG DNSKEY 5 2 300 20150125003700 20141226001657 17430 ingotronic.ch. mEwZjhQqeWksWD0TCnNBrtce4YkWJL3edqL6PvAUu8Fn+Ih437kEs3+pqdkgRsdYQ9HW+lBm/8pWwJlNAv0bi9NykItXMwAUFtncgq+6Pnh3iAM972GXSa5VV4LcGQ5b8CBdHCHiEKDqyPv5Hr5QfYL/FQaWlcNRh4QZZlZNPFA=
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 940 bytes
###############################################
dnssecjava-1.1.3/src/test/resources/recordings/org_jitsi_dnssec_TestCNames/testCNameToVoid2Chain 0000664 0000000 0000000 00000020442 13020541473 0033153 0 ustar 00root root 0000000 0000000 #Date: 2015-01-06T22:34:56+01:00
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 34279
;; flags: qr aa rd ra cd ; qd: 1 an: 4 au: 6 ad: 1
;; QUESTIONS:
;; cvoid2.ingotronic.ch., type = A, class = IN
;; ANSWERS:
cvoid2.ingotronic.ch. 300 IN CNAME cvoid1.ingotronic.ch.
cvoid2.ingotronic.ch. 300 IN RRSIG CNAME 5 3 300 20150125010026 20141226003834 17430 ingotronic.ch. TXsbQfrVD9b/bdPeIpYrLFxPxiihDhWpASKTwlH2qdJq1jj95azjtUKXDaiY5NQHey83W4Z3cS37stNAc/K2Du8novIqfXesZqf7g/1kYl1Yd/WXnU8h3ImPBrx4uGj1mv5K31cxpdfRp5EP73rarc2rgzO+pnCoKV7ofSXXYOo=
cvoid1.ingotronic.ch. 300 IN CNAME gibtsnicht.ingotronic.ch.
cvoid1.ingotronic.ch. 300 IN RRSIG CNAME 5 3 300 20150125000532 20141225234703 17430 ingotronic.ch. bjZ5dgY+WNUzgkbA9Bvgz9Ux6lQxEVWzrtnkByK7C6itvwG3pS1LcxOCPi79a5PQqbGm1S4axCsEHtZkoZWWU2OEUvfiqJtATnxBGlb43q0eP8wQhmxMSqSC5DNedShLeT5v1hhvCyyJ7lEpMKwI1ROc/MMtFzvlWHKCqb81lxQ=
;; AUTHORITY RECORDS:
ingotronic.ch. 300 IN SOA ns1.ingotronic.ch. admin.ingotronic.ch. 2013032762 300 60 864000 300
ingotronic.ch. 300 IN RRSIG SOA 5 2 300 20150125021244 20141226011244 17430 ingotronic.ch. WDLpp9G0P/rlMBfpFn9sAfpEFoBnQfwyGSXbGCc/LG1FSkJoKLDQYDY696scLNsJgkrzZeJrl0oSSvA8AvRUhYRrmuqWMxTVFgYlRwPwqEMCKUqiVhKGVF4NYemoBiUQC4nJwBZd57xKCiF4AQ4CodBtiZxefJFAlTNE0g2yxtM=
ingotronic.ch. 300 IN NSEC alias.ingotronic.ch. A NS SOA RRSIG NSEC DNSKEY
ingotronic.ch. 300 IN RRSIG NSEC 5 2 300 20150125000532 20141225234703 17430 ingotronic.ch. en5BaZ6zWqEvoUFUDPm5g1pjz7THXBv/1kjKtV2tS+7xh0BtkLEzlA9n/H66ZZAX2EIh7vXj12xVJKOuEuM0o1mJwKsBaLQuTra60/zYAUIddwUOCzI3zzjiRFklPyHSnLkGoBODZcvehnsTzTPyBxkfoouleqpj7gN5jOSBL8M=
eccgost.ingotronic.ch. 300 IN NSEC invalid.ingotronic.ch. NS DS RRSIG NSEC
eccgost.ingotronic.ch. 300 IN RRSIG NSEC 5 3 300 20150125021136 20141226011244 17430 ingotronic.ch. lsX44/1144d1nG80WVhDnZCiywh+KTNqj9oEECk3GifEjOWNTJDTfbBnrGbdc7BIWs1mZmcPKFVfQB39QunMyzNQi4Wzjor3U1FPbXhUTn/g9fMul37g1aR00hUfS2Jo49vfDZEMZWp7th9ZFc+hlr8uWISceul5OJRq4SyMbzs=
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 1099 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 59670
;; flags: qr rd ra ad cd ; qd: 1 an: 4 au: 0 ad: 1
;; QUESTIONS:
;; ., type = DNSKEY, class = IN
;; ANSWERS:
. 87378 IN DNSKEY 256 3 8 AwEAAe3fSrbLBy3LOS7pnxEUhvPZTE2H5dIGsI/UfruI/nOEvWWa/PSX2BFedBkEqOlYdjdNF2f+6lmfk2Od/xu0v5bVqxFE+/24v3hZSlWBxvXzPTAGHrbW/IJYEPqlzVOAS4XdUgHg0N7IbLywNHMvB+Yf+Nm6ctyXXFLV4WTNnzs7
. 87378 IN DNSKEY 256 3 8 AwEAAaPD7Y7XIi1MOEREJNTrRhyqsY3gff6JWzg+XCbqut1sbcbvqyssHw8DT1AkRaAC92pO8xuyq5QEgEPL1IHfABLwpwXI5gTj4gdwi86bpkmlWs9fRpnn4DPDCTdrnxIejJXgClHikLJF3u3CdpNCMijq4CKdQbMlRZ3avv+G7rh7
. 87378 IN DNSKEY 257 3 8 AwEAAagAIKlVZrpC6Ia7gEzahOR+9W29euxhJhVVLOyQbSEW0O8gcCjFFVQUTf6v58fLjwBd0YI0EzrAcQqBGCzh/RStIoO8g0NfnfL2MTJRkxoXbfDaUeVPQuYEhg37NZWAJQ9VnMVDxP/VHL496M/QZxkjf5/Efucp2gaDX6RS6CXpoY68LsvPVjR0ZSwzz1apAzvN9dlzEheX7ICJBBtuA6G3LQpzW5hOA2hzCTMjJPJ8LbqF6dsV6DoBQzgul0sGIcGOYl7OyQdXfZ57relSQageu+ipAdTTJ25AsRTAoub8ONGcLmqrAmRLKBP1dfwhYB4N7knNnulqQxA+Uk1ihz0=
. 87378 IN RRSIG DNSKEY 8 0 172800 20150115235959 20150101000000 19036 . i8cAxD2pvQi1oAyvQxRpDfFlbqPzW+69QQEsDwE1eWOm5AtawO9U7lmsGps7sy/fVNvl1ljKBj4Djp9pb3U2FLogjiIlW0cDAkPmLlG9t+b/pjEfBNlhjANUVN06pvQVAfm+LcF26EaWT6FlISBqb6jSy4BHRa3Bdc4Sx7+pRSYSqVVvYxLkfAWsKPqGkvWhebJDndJJV9syXQXgZ+v/uJ+6XOS43xkAdeL8iBzIs/FlwMTfh3tVe3d0lb65IBBLlCzeQuetX+0Vu1YFcnD0mHc/wS2ZnAV5toAFmyVQBoY/XAZiZeaOkcROJ6Zmqezy7liwK7BqsYyAZntMhk8lbg==
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 883 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 6373
;; flags: qr rd ra ad cd ; qd: 1 an: 2 au: 0 ad: 1
;; QUESTIONS:
;; ch., type = DS, class = IN
;; ANSWERS:
ch. 978 IN DS 46375 8 2 8F96646FC68BB7E4AF4C0750A6096FBC0D4ECDA3D3FA6DA06FDDB42EE50C6CF3
ch. 978 IN RRSIG DS 8 1 86400 20150112170000 20150105160000 16665 . thY7xYWBBxiBjqbQIb9fAG4TmQgnziwM7q6P1T3/ITxmECdvOCQnnZA3uD7qmN8uM0HudsD7+y+zgD3rsH4RSTKdL4kHSI0OnCxToMTvklghEgFDezqIRm8NkWdI2H4Stwrj20nYKSpLQxPI2EE54gs18P3KyO8bAUYv8Qx73xU=
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 238 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 48616
;; flags: qr rd ra ad cd ; qd: 1 an: 4 au: 0 ad: 1
;; QUESTIONS:
;; ch., type = DNSKEY, class = IN
;; ANSWERS:
ch. 979 IN DNSKEY 256 3 8 AwEAAcsg0kY6fw1wzYMhSAKTy+Y2JzAst66P/1odp9NECJJHbU8f4nwziI3onoFSBV0ZiSZhY1aH5dhdDZ7BkrqhVXSrZPAz0CvzjIxmB1gSOf9DeZvjQvoy97HqYolxsf+B3QQv2RKBT67elF5+JisKg3/dQISelKn8LhabSoVrMlD1
ch. 979 IN DNSKEY 256 3 8 AwEAAcSLdT0fEmcFmLpeUkAJoeVaHKiu+nbuc43fWlqaCRVf8t2HA4uWxOk0O5ci9nrFTc8nq8oa5fk5Cj7CHh4yrX9qUCfTdIWTyp8BDEdJpS+Dyb0u9wQuVj+nQMj4fLzdQf4TJs3/qxuiLr3nL1UUwlhhXeqSqGVb7p3mtB5HJ8ad
ch. 979 IN DNSKEY 257 3 8 AwEAAb7GhhZ8IAy/AhwmSms5DeQK5ad09wIIplEpYoiAIYXPtJvT1ReFzyfTp/2YP+g/PWDwHPh4qKAHa9x0VgbIQcGAeNakmfkAdWEmCnca323/SAml3mwfaX62G7/uYWae5zh8QTxZKNd+K1yZ5x0IxnI31chSl5xymRbTEHYZDKwSIRFM3fTxUMt93WFaBVWELReYotJBr++rvAWdnlay5TPBTvheLBkaiqtgM4GP8HK07Y+86lsZnEsj5K3G1KTV5SPpa82rqYAwxG9VKbmSE/6/kBR5jJHjt1rRt5Oe7v18aEtw0YCEN4vxq+KuvMoNVqXUsE9LBwHJD+QNwi6wmB0=
ch. 979 IN RRSIG DNSKEY 8 1 86400 20150127100909 20141212090909 46375 ch. bT8q0FWyeMH0SulNo6UdIIgZYNATwYsee2bikq2Gh339Bufma8eaqWIPYT3XKmxYPBFOw0bVl+kLZxTwbR1CFoCDXoP+qgQhh4mf9qkNiv2CDSc+0FE3FRREn+DAhYTUEuB58FPiPakFB8s8O7T+k2qhDae7jy4/y7Jl1lnjaBY8s7bzOUPhF0KKCNZmvoKwtL23ZdVeTSV1xM3jkiNnpzBKbcoSWECSGJVp1SE0BnRXdwQP41YTXFZ0310YjaTAUCC5qbMIWdEkHjfdSQtKBImnc85mkapq9w++XQ4zhauPWBtrPV3CcoCahjUaWdjrKVkibomlJZaN8MEO23CfQw==
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 893 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 14302
;; flags: qr rd ra cd ; qd: 1 an: 3 au: 0 ad: 1
;; QUESTIONS:
;; ingotronic.ch., type = DS, class = IN
;; ANSWERS:
ingotronic.ch. 3587 IN DS 6031 5 1 733D0218B571CD617B1A7493564B9FC4F12ADE82
ingotronic.ch. 3587 IN DS 6031 5 2 4A948F2FDADA24686E473EDAC00DCF972584C75E3FAA92C2021B6221449FF87E
ingotronic.ch. 3587 IN RRSIG DS 8 2 3600 20150129033614 20150105123019 60789 ch. rVPJP2HhzW7OkroK2axFj5Lb4iVWCH8Fp/Iq1rF952NDo72b8RiKje2RaAKJAGQ+wd0YgE+PAej04GCmkhlDJA/zvPeeTxuhy3HbJzReMlQ7fjyH+wW1hli+FuIYvogXWf7nO/9VyPORt8X/f/pjrOr3Vlj9sGLN8TGYpEuVSw4=
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 288 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 60529
;; flags: qr aa rd ra cd ; qd: 1 an: 4 au: 0 ad: 1
;; QUESTIONS:
;; ingotronic.ch., type = DNSKEY, class = IN
;; ANSWERS:
ingotronic.ch. 300 IN DNSKEY 256 3 5 AwEAAZ2Xh77GFzpEDx7EHYxShqltHgkiG+BOjBGifEmnJhQSdE5/yNSLFNcdhZZ8HUPxYnaedTqJcFFg4AzUsQklF/fECegTJdZjaj2WoL0/I8K7HMfY/hVuRZUWPNglYi8agJRX6gdkFTCpUNI7stpgKqxtzUJhhw15uG/lKMplwqUr
ingotronic.ch. 300 IN DNSKEY 257 3 5 AwEAAeA1vzmjaB+eBAcvhzpKEgAEFpvQ1rg4uKDW6MsQtacKoqBpgyep2+LuWotz5p/xYxj3NGsArwN8Ad5cY0FHRr8miTT0elOv6nvlqGIfRuhj/BXAQ1x4ihpSFslHw0lJMYFwxsUZWpUyjWX/nv1xRZMMwF46gui0N4OEbyTYusCk77D+A71k+K0EAitFIbIH4GCUKmH1H7HmXhSVH9bN/n7KEGwW32lmsuuUcJoRKDkcUvbMXY/9Xoa2quERrUg/rBbDUHowRPjYDS5GzY1+f4YY8s40BufGiqyUTKKXL953MVFK8gmezXA0hbmrnZ7CBOw/7238mORAdzExaX8n7CE=
ingotronic.ch. 300 IN RRSIG DNSKEY 5 2 300 20150125003700 20141226001657 6031 ingotronic.ch. rs1QlP2SlSpA2ELbzwg3DgWLzXWL3Lpv6CUJE2Q0qH2Zp7Qdy3cD+ZEtNh9v24Qv1M6JJ3zFt8mmZoCeW2ycuMbJCqBkW9CBuwF+VznZvZY2MxwPipvhvEEGP//0M8YAZJ66yQPDv3PTdAP8FYbIrJyvY44vwyncwbslpfHT9jAsrbfr3vuMuWps86dnP462q+0s1TxBfqi8mzo3gdavjHKWVNwohLahLKT+tWeu6DSzQv0YwMjwtkLgF7QRgx3ctIIkloOrnx9nHH1N6y+hxEB89fOlyVDjHhgL5uVtsD5fEdT0FJ2Gc/2nShEMMqIwr1/J9kUq1mNySff/uEe65Q==
ingotronic.ch. 300 IN RRSIG DNSKEY 5 2 300 20150125003700 20141226001657 17430 ingotronic.ch. mEwZjhQqeWksWD0TCnNBrtce4YkWJL3edqL6PvAUu8Fn+Ih437kEs3+pqdkgRsdYQ9HW+lBm/8pWwJlNAv0bi9NykItXMwAUFtncgq+6Pnh3iAM972GXSa5VV4LcGQ5b8CBdHCHiEKDqyPv5Hr5QfYL/FQaWlcNRh4QZZlZNPFA=
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 940 bytes
###############################################
dnssecjava-1.1.3/src/test/resources/recordings/org_jitsi_dnssec_TestCNames/testCNameToVoid3Chain 0000664 0000000 0000000 00000021155 13020541473 0033156 0 ustar 00root root 0000000 0000000 #Date: 2015-01-06T22:34:56+01:00
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 59635
;; flags: qr aa rd ra cd ; qd: 1 an: 6 au: 6 ad: 1
;; QUESTIONS:
;; cvoid3.ingotronic.ch., type = A, class = IN
;; ANSWERS:
cvoid3.ingotronic.ch. 300 IN CNAME cvoid2.ingotronic.ch.
cvoid3.ingotronic.ch. 300 IN RRSIG CNAME 5 3 300 20150125010026 20141226003834 17430 ingotronic.ch. Hu0GdbBDRA0DKRD4+sXTmQepSP4MiNAgYgD31P0HsW90u7EMg/urDVtDR4SGRQjgAJek5+YtYWoVD3Daqzbu5F6lJp8BATK7BcMbERdTv3R+3jnBbElA8sxyHUXBnMjuj6P1ifjFEN8cnS7zCVEDGZdKZN58TOCpNtuHAzl1J8A=
cvoid2.ingotronic.ch. 300 IN CNAME cvoid1.ingotronic.ch.
cvoid2.ingotronic.ch. 300 IN RRSIG CNAME 5 3 300 20150125010026 20141226003834 17430 ingotronic.ch. TXsbQfrVD9b/bdPeIpYrLFxPxiihDhWpASKTwlH2qdJq1jj95azjtUKXDaiY5NQHey83W4Z3cS37stNAc/K2Du8novIqfXesZqf7g/1kYl1Yd/WXnU8h3ImPBrx4uGj1mv5K31cxpdfRp5EP73rarc2rgzO+pnCoKV7ofSXXYOo=
cvoid1.ingotronic.ch. 300 IN CNAME gibtsnicht.ingotronic.ch.
cvoid1.ingotronic.ch. 300 IN RRSIG CNAME 5 3 300 20150125000532 20141225234703 17430 ingotronic.ch. bjZ5dgY+WNUzgkbA9Bvgz9Ux6lQxEVWzrtnkByK7C6itvwG3pS1LcxOCPi79a5PQqbGm1S4axCsEHtZkoZWWU2OEUvfiqJtATnxBGlb43q0eP8wQhmxMSqSC5DNedShLeT5v1hhvCyyJ7lEpMKwI1ROc/MMtFzvlWHKCqb81lxQ=
;; AUTHORITY RECORDS:
ingotronic.ch. 300 IN SOA ns1.ingotronic.ch. admin.ingotronic.ch. 2013032762 300 60 864000 300
ingotronic.ch. 300 IN RRSIG SOA 5 2 300 20150125021244 20141226011244 17430 ingotronic.ch. WDLpp9G0P/rlMBfpFn9sAfpEFoBnQfwyGSXbGCc/LG1FSkJoKLDQYDY696scLNsJgkrzZeJrl0oSSvA8AvRUhYRrmuqWMxTVFgYlRwPwqEMCKUqiVhKGVF4NYemoBiUQC4nJwBZd57xKCiF4AQ4CodBtiZxefJFAlTNE0g2yxtM=
ingotronic.ch. 300 IN NSEC alias.ingotronic.ch. A NS SOA RRSIG NSEC DNSKEY
ingotronic.ch. 300 IN RRSIG NSEC 5 2 300 20150125000532 20141225234703 17430 ingotronic.ch. en5BaZ6zWqEvoUFUDPm5g1pjz7THXBv/1kjKtV2tS+7xh0BtkLEzlA9n/H66ZZAX2EIh7vXj12xVJKOuEuM0o1mJwKsBaLQuTra60/zYAUIddwUOCzI3zzjiRFklPyHSnLkGoBODZcvehnsTzTPyBxkfoouleqpj7gN5jOSBL8M=
eccgost.ingotronic.ch. 300 IN NSEC invalid.ingotronic.ch. NS DS RRSIG NSEC
eccgost.ingotronic.ch. 300 IN RRSIG NSEC 5 3 300 20150125021136 20141226011244 17430 ingotronic.ch. lsX44/1144d1nG80WVhDnZCiywh+KTNqj9oEECk3GifEjOWNTJDTfbBnrGbdc7BIWs1mZmcPKFVfQB39QunMyzNQi4Wzjor3U1FPbXhUTn/g9fMul37g1aR00hUfS2Jo49vfDZEMZWp7th9ZFc+hlr8uWISceul5OJRq4SyMbzs=
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 1293 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 39640
;; flags: qr rd ra ad cd ; qd: 1 an: 4 au: 0 ad: 1
;; QUESTIONS:
;; ., type = DNSKEY, class = IN
;; ANSWERS:
. 87377 IN DNSKEY 257 3 8 AwEAAagAIKlVZrpC6Ia7gEzahOR+9W29euxhJhVVLOyQbSEW0O8gcCjFFVQUTf6v58fLjwBd0YI0EzrAcQqBGCzh/RStIoO8g0NfnfL2MTJRkxoXbfDaUeVPQuYEhg37NZWAJQ9VnMVDxP/VHL496M/QZxkjf5/Efucp2gaDX6RS6CXpoY68LsvPVjR0ZSwzz1apAzvN9dlzEheX7ICJBBtuA6G3LQpzW5hOA2hzCTMjJPJ8LbqF6dsV6DoBQzgul0sGIcGOYl7OyQdXfZ57relSQageu+ipAdTTJ25AsRTAoub8ONGcLmqrAmRLKBP1dfwhYB4N7knNnulqQxA+Uk1ihz0=
. 87377 IN DNSKEY 256 3 8 AwEAAe3fSrbLBy3LOS7pnxEUhvPZTE2H5dIGsI/UfruI/nOEvWWa/PSX2BFedBkEqOlYdjdNF2f+6lmfk2Od/xu0v5bVqxFE+/24v3hZSlWBxvXzPTAGHrbW/IJYEPqlzVOAS4XdUgHg0N7IbLywNHMvB+Yf+Nm6ctyXXFLV4WTNnzs7
. 87377 IN DNSKEY 256 3 8 AwEAAaPD7Y7XIi1MOEREJNTrRhyqsY3gff6JWzg+XCbqut1sbcbvqyssHw8DT1AkRaAC92pO8xuyq5QEgEPL1IHfABLwpwXI5gTj4gdwi86bpkmlWs9fRpnn4DPDCTdrnxIejJXgClHikLJF3u3CdpNCMijq4CKdQbMlRZ3avv+G7rh7
. 87377 IN RRSIG DNSKEY 8 0 172800 20150115235959 20150101000000 19036 . i8cAxD2pvQi1oAyvQxRpDfFlbqPzW+69QQEsDwE1eWOm5AtawO9U7lmsGps7sy/fVNvl1ljKBj4Djp9pb3U2FLogjiIlW0cDAkPmLlG9t+b/pjEfBNlhjANUVN06pvQVAfm+LcF26EaWT6FlISBqb6jSy4BHRa3Bdc4Sx7+pRSYSqVVvYxLkfAWsKPqGkvWhebJDndJJV9syXQXgZ+v/uJ+6XOS43xkAdeL8iBzIs/FlwMTfh3tVe3d0lb65IBBLlCzeQuetX+0Vu1YFcnD0mHc/wS2ZnAV5toAFmyVQBoY/XAZiZeaOkcROJ6Zmqezy7liwK7BqsYyAZntMhk8lbg==
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 883 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 10842
;; flags: qr rd ra ad cd ; qd: 1 an: 2 au: 0 ad: 1
;; QUESTIONS:
;; ch., type = DS, class = IN
;; ANSWERS:
ch. 977 IN DS 46375 8 2 8F96646FC68BB7E4AF4C0750A6096FBC0D4ECDA3D3FA6DA06FDDB42EE50C6CF3
ch. 977 IN RRSIG DS 8 1 86400 20150112170000 20150105160000 16665 . thY7xYWBBxiBjqbQIb9fAG4TmQgnziwM7q6P1T3/ITxmECdvOCQnnZA3uD7qmN8uM0HudsD7+y+zgD3rsH4RSTKdL4kHSI0OnCxToMTvklghEgFDezqIRm8NkWdI2H4Stwrj20nYKSpLQxPI2EE54gs18P3KyO8bAUYv8Qx73xU=
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 238 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 34860
;; flags: qr rd ra ad cd ; qd: 1 an: 4 au: 0 ad: 1
;; QUESTIONS:
;; ch., type = DNSKEY, class = IN
;; ANSWERS:
ch. 978 IN DNSKEY 256 3 8 AwEAAcsg0kY6fw1wzYMhSAKTy+Y2JzAst66P/1odp9NECJJHbU8f4nwziI3onoFSBV0ZiSZhY1aH5dhdDZ7BkrqhVXSrZPAz0CvzjIxmB1gSOf9DeZvjQvoy97HqYolxsf+B3QQv2RKBT67elF5+JisKg3/dQISelKn8LhabSoVrMlD1
ch. 978 IN DNSKEY 256 3 8 AwEAAcSLdT0fEmcFmLpeUkAJoeVaHKiu+nbuc43fWlqaCRVf8t2HA4uWxOk0O5ci9nrFTc8nq8oa5fk5Cj7CHh4yrX9qUCfTdIWTyp8BDEdJpS+Dyb0u9wQuVj+nQMj4fLzdQf4TJs3/qxuiLr3nL1UUwlhhXeqSqGVb7p3mtB5HJ8ad
ch. 978 IN DNSKEY 257 3 8 AwEAAb7GhhZ8IAy/AhwmSms5DeQK5ad09wIIplEpYoiAIYXPtJvT1ReFzyfTp/2YP+g/PWDwHPh4qKAHa9x0VgbIQcGAeNakmfkAdWEmCnca323/SAml3mwfaX62G7/uYWae5zh8QTxZKNd+K1yZ5x0IxnI31chSl5xymRbTEHYZDKwSIRFM3fTxUMt93WFaBVWELReYotJBr++rvAWdnlay5TPBTvheLBkaiqtgM4GP8HK07Y+86lsZnEsj5K3G1KTV5SPpa82rqYAwxG9VKbmSE/6/kBR5jJHjt1rRt5Oe7v18aEtw0YCEN4vxq+KuvMoNVqXUsE9LBwHJD+QNwi6wmB0=
ch. 978 IN RRSIG DNSKEY 8 1 86400 20150127100909 20141212090909 46375 ch. bT8q0FWyeMH0SulNo6UdIIgZYNATwYsee2bikq2Gh339Bufma8eaqWIPYT3XKmxYPBFOw0bVl+kLZxTwbR1CFoCDXoP+qgQhh4mf9qkNiv2CDSc+0FE3FRREn+DAhYTUEuB58FPiPakFB8s8O7T+k2qhDae7jy4/y7Jl1lnjaBY8s7bzOUPhF0KKCNZmvoKwtL23ZdVeTSV1xM3jkiNnpzBKbcoSWECSGJVp1SE0BnRXdwQP41YTXFZ0310YjaTAUCC5qbMIWdEkHjfdSQtKBImnc85mkapq9w++XQ4zhauPWBtrPV3CcoCahjUaWdjrKVkibomlJZaN8MEO23CfQw==
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 893 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 34516
;; flags: qr rd ra cd ; qd: 1 an: 3 au: 0 ad: 1
;; QUESTIONS:
;; ingotronic.ch., type = DS, class = IN
;; ANSWERS:
ingotronic.ch. 3586 IN DS 6031 5 1 733D0218B571CD617B1A7493564B9FC4F12ADE82
ingotronic.ch. 3586 IN DS 6031 5 2 4A948F2FDADA24686E473EDAC00DCF972584C75E3FAA92C2021B6221449FF87E
ingotronic.ch. 3586 IN RRSIG DS 8 2 3600 20150129033614 20150105123019 60789 ch. rVPJP2HhzW7OkroK2axFj5Lb4iVWCH8Fp/Iq1rF952NDo72b8RiKje2RaAKJAGQ+wd0YgE+PAej04GCmkhlDJA/zvPeeTxuhy3HbJzReMlQ7fjyH+wW1hli+FuIYvogXWf7nO/9VyPORt8X/f/pjrOr3Vlj9sGLN8TGYpEuVSw4=
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 288 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 50866
;; flags: qr aa rd ra cd ; qd: 1 an: 4 au: 0 ad: 1
;; QUESTIONS:
;; ingotronic.ch., type = DNSKEY, class = IN
;; ANSWERS:
ingotronic.ch. 300 IN DNSKEY 256 3 5 AwEAAZ2Xh77GFzpEDx7EHYxShqltHgkiG+BOjBGifEmnJhQSdE5/yNSLFNcdhZZ8HUPxYnaedTqJcFFg4AzUsQklF/fECegTJdZjaj2WoL0/I8K7HMfY/hVuRZUWPNglYi8agJRX6gdkFTCpUNI7stpgKqxtzUJhhw15uG/lKMplwqUr
ingotronic.ch. 300 IN DNSKEY 257 3 5 AwEAAeA1vzmjaB+eBAcvhzpKEgAEFpvQ1rg4uKDW6MsQtacKoqBpgyep2+LuWotz5p/xYxj3NGsArwN8Ad5cY0FHRr8miTT0elOv6nvlqGIfRuhj/BXAQ1x4ihpSFslHw0lJMYFwxsUZWpUyjWX/nv1xRZMMwF46gui0N4OEbyTYusCk77D+A71k+K0EAitFIbIH4GCUKmH1H7HmXhSVH9bN/n7KEGwW32lmsuuUcJoRKDkcUvbMXY/9Xoa2quERrUg/rBbDUHowRPjYDS5GzY1+f4YY8s40BufGiqyUTKKXL953MVFK8gmezXA0hbmrnZ7CBOw/7238mORAdzExaX8n7CE=
ingotronic.ch. 300 IN RRSIG DNSKEY 5 2 300 20150125003700 20141226001657 6031 ingotronic.ch. rs1QlP2SlSpA2ELbzwg3DgWLzXWL3Lpv6CUJE2Q0qH2Zp7Qdy3cD+ZEtNh9v24Qv1M6JJ3zFt8mmZoCeW2ycuMbJCqBkW9CBuwF+VznZvZY2MxwPipvhvEEGP//0M8YAZJ66yQPDv3PTdAP8FYbIrJyvY44vwyncwbslpfHT9jAsrbfr3vuMuWps86dnP462q+0s1TxBfqi8mzo3gdavjHKWVNwohLahLKT+tWeu6DSzQv0YwMjwtkLgF7QRgx3ctIIkloOrnx9nHH1N6y+hxEB89fOlyVDjHhgL5uVtsD5fEdT0FJ2Gc/2nShEMMqIwr1/J9kUq1mNySff/uEe65Q==
ingotronic.ch. 300 IN RRSIG DNSKEY 5 2 300 20150125003700 20141226001657 17430 ingotronic.ch. mEwZjhQqeWksWD0TCnNBrtce4YkWJL3edqL6PvAUu8Fn+Ih437kEs3+pqdkgRsdYQ9HW+lBm/8pWwJlNAv0bi9NykItXMwAUFtncgq+6Pnh3iAM972GXSa5VV4LcGQ5b8CBdHCHiEKDqyPv5Hr5QfYL/FQaWlcNRh4QZZlZNPFA=
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 940 bytes
###############################################
testCNameToVoidExternalInvalidTld 0000664 0000000 0000000 00000017562 13020541473 0035536 0 ustar 00root root 0000000 0000000 dnssecjava-1.1.3/src/test/resources/recordings/org_jitsi_dnssec_TestCNames #Date: 2015-01-06T22:34:59+01:00
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 6215
;; flags: qr aa rd ra cd ; qd: 1 an: 2 au: 6 ad: 1
;; QUESTIONS:
;; cvoidext1.ingotronic.ch., type = A, class = IN
;; ANSWERS:
cvoidext1.ingotronic.ch. 300 IN CNAME example.invalid.
cvoidext1.ingotronic.ch. 300 IN RRSIG CNAME 5 3 300 20150125010026 20141226003834 17430 ingotronic.ch. Xav60pS0YfajeVhUHndHfm+x6EwR84QywbttguX6n0aZIeh/wI4Hq9DBwGJXi69Q8yzLlnS8hL2UXKewYs4lPds0hYNDj6I01nxtUbZvsi+DDLnkQsdJ7pgWQh8L9zPDIMxOk2E6fcKD5M9DOV1ARfcXKwxUQX6cpy5xwp7/NGU=
;; AUTHORITY RECORDS:
. 10800 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2015010601 1800 900 604800 86400
. 10800 IN RRSIG SOA 8 0 86400 20150113170000 20150106160000 16665 . R9ZOwEb5fodQQNRl4WvguyqEzOxdNPQ18nI+0R5sB2JSqG4Qz45SwW+vfnFCF01UW43/GdEfGOScrYVP2UBM8F2WOM+tHMZN0t9BbP9uszTWhzdYNCl3UKYYJiB59b8HIhKXlERPVfW2UEgIiI2VajShJnUv67W8gQO56hgTNEE=
. 10800 IN RRSIG NSEC 8 0 86400 20150113170000 20150106160000 16665 . wlEpGn1C8YZzJjIrlJp/GSud5FuLAZZj9C54DrKEl9gELWeIFJgLwkI1tcH4EhabbsNScB7SPOmVmnLkuM4Q6yJkmI1HXeBrddxniI2YEw+m9++/i19AqfDxuVYs52peKxXdEZ/sIS5JtDz3bdB44IAp2k1ue780z0xRV796vUk=
. 10800 IN NSEC abogado. NS SOA RRSIG NSEC DNSKEY
international. 10800 IN RRSIG NSEC 8 1 86400 20150113170000 20150106160000 16665 . Bd+SEFOjCmN5pg924EOfuq15E0haMqLhX0Li2V3KDfosFYoA81Vs8Okg7Jvc5KJn1eRu4HnZlz81bIYZ9Kt5bJGoFie+5iCcnlZPBQhKTYN5M80/BepNJyrcvocFvgRDaEYv1si1cxRpLGMYDTVHHkykSNjygRTuVdP/JZ/A9LA=
international. 10800 IN NSEC investments. NS DS RRSIG NSEC
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 879 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 40638
;; flags: qr rd ra ad cd ; qd: 1 an: 4 au: 0 ad: 1
;; QUESTIONS:
;; ., type = DNSKEY, class = IN
;; ANSWERS:
. 87374 IN DNSKEY 256 3 8 AwEAAe3fSrbLBy3LOS7pnxEUhvPZTE2H5dIGsI/UfruI/nOEvWWa/PSX2BFedBkEqOlYdjdNF2f+6lmfk2Od/xu0v5bVqxFE+/24v3hZSlWBxvXzPTAGHrbW/IJYEPqlzVOAS4XdUgHg0N7IbLywNHMvB+Yf+Nm6ctyXXFLV4WTNnzs7
. 87374 IN DNSKEY 256 3 8 AwEAAaPD7Y7XIi1MOEREJNTrRhyqsY3gff6JWzg+XCbqut1sbcbvqyssHw8DT1AkRaAC92pO8xuyq5QEgEPL1IHfABLwpwXI5gTj4gdwi86bpkmlWs9fRpnn4DPDCTdrnxIejJXgClHikLJF3u3CdpNCMijq4CKdQbMlRZ3avv+G7rh7
. 87374 IN DNSKEY 257 3 8 AwEAAagAIKlVZrpC6Ia7gEzahOR+9W29euxhJhVVLOyQbSEW0O8gcCjFFVQUTf6v58fLjwBd0YI0EzrAcQqBGCzh/RStIoO8g0NfnfL2MTJRkxoXbfDaUeVPQuYEhg37NZWAJQ9VnMVDxP/VHL496M/QZxkjf5/Efucp2gaDX6RS6CXpoY68LsvPVjR0ZSwzz1apAzvN9dlzEheX7ICJBBtuA6G3LQpzW5hOA2hzCTMjJPJ8LbqF6dsV6DoBQzgul0sGIcGOYl7OyQdXfZ57relSQageu+ipAdTTJ25AsRTAoub8ONGcLmqrAmRLKBP1dfwhYB4N7knNnulqQxA+Uk1ihz0=
. 87374 IN RRSIG DNSKEY 8 0 172800 20150115235959 20150101000000 19036 . i8cAxD2pvQi1oAyvQxRpDfFlbqPzW+69QQEsDwE1eWOm5AtawO9U7lmsGps7sy/fVNvl1ljKBj4Djp9pb3U2FLogjiIlW0cDAkPmLlG9t+b/pjEfBNlhjANUVN06pvQVAfm+LcF26EaWT6FlISBqb6jSy4BHRa3Bdc4Sx7+pRSYSqVVvYxLkfAWsKPqGkvWhebJDndJJV9syXQXgZ+v/uJ+6XOS43xkAdeL8iBzIs/FlwMTfh3tVe3d0lb65IBBLlCzeQuetX+0Vu1YFcnD0mHc/wS2ZnAV5toAFmyVQBoY/XAZiZeaOkcROJ6Zmqezy7liwK7BqsYyAZntMhk8lbg==
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 883 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 38951
;; flags: qr rd ra ad cd ; qd: 1 an: 2 au: 0 ad: 1
;; QUESTIONS:
;; ch., type = DS, class = IN
;; ANSWERS:
ch. 974 IN DS 46375 8 2 8F96646FC68BB7E4AF4C0750A6096FBC0D4ECDA3D3FA6DA06FDDB42EE50C6CF3
ch. 974 IN RRSIG DS 8 1 86400 20150112170000 20150105160000 16665 . thY7xYWBBxiBjqbQIb9fAG4TmQgnziwM7q6P1T3/ITxmECdvOCQnnZA3uD7qmN8uM0HudsD7+y+zgD3rsH4RSTKdL4kHSI0OnCxToMTvklghEgFDezqIRm8NkWdI2H4Stwrj20nYKSpLQxPI2EE54gs18P3KyO8bAUYv8Qx73xU=
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 238 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 7331
;; flags: qr rd ra ad cd ; qd: 1 an: 4 au: 0 ad: 1
;; QUESTIONS:
;; ch., type = DNSKEY, class = IN
;; ANSWERS:
ch. 975 IN DNSKEY 257 3 8 AwEAAb7GhhZ8IAy/AhwmSms5DeQK5ad09wIIplEpYoiAIYXPtJvT1ReFzyfTp/2YP+g/PWDwHPh4qKAHa9x0VgbIQcGAeNakmfkAdWEmCnca323/SAml3mwfaX62G7/uYWae5zh8QTxZKNd+K1yZ5x0IxnI31chSl5xymRbTEHYZDKwSIRFM3fTxUMt93WFaBVWELReYotJBr++rvAWdnlay5TPBTvheLBkaiqtgM4GP8HK07Y+86lsZnEsj5K3G1KTV5SPpa82rqYAwxG9VKbmSE/6/kBR5jJHjt1rRt5Oe7v18aEtw0YCEN4vxq+KuvMoNVqXUsE9LBwHJD+QNwi6wmB0=
ch. 975 IN DNSKEY 256 3 8 AwEAAcSLdT0fEmcFmLpeUkAJoeVaHKiu+nbuc43fWlqaCRVf8t2HA4uWxOk0O5ci9nrFTc8nq8oa5fk5Cj7CHh4yrX9qUCfTdIWTyp8BDEdJpS+Dyb0u9wQuVj+nQMj4fLzdQf4TJs3/qxuiLr3nL1UUwlhhXeqSqGVb7p3mtB5HJ8ad
ch. 975 IN DNSKEY 256 3 8 AwEAAcsg0kY6fw1wzYMhSAKTy+Y2JzAst66P/1odp9NECJJHbU8f4nwziI3onoFSBV0ZiSZhY1aH5dhdDZ7BkrqhVXSrZPAz0CvzjIxmB1gSOf9DeZvjQvoy97HqYolxsf+B3QQv2RKBT67elF5+JisKg3/dQISelKn8LhabSoVrMlD1
ch. 975 IN RRSIG DNSKEY 8 1 86400 20150127100909 20141212090909 46375 ch. bT8q0FWyeMH0SulNo6UdIIgZYNATwYsee2bikq2Gh339Bufma8eaqWIPYT3XKmxYPBFOw0bVl+kLZxTwbR1CFoCDXoP+qgQhh4mf9qkNiv2CDSc+0FE3FRREn+DAhYTUEuB58FPiPakFB8s8O7T+k2qhDae7jy4/y7Jl1lnjaBY8s7bzOUPhF0KKCNZmvoKwtL23ZdVeTSV1xM3jkiNnpzBKbcoSWECSGJVp1SE0BnRXdwQP41YTXFZ0310YjaTAUCC5qbMIWdEkHjfdSQtKBImnc85mkapq9w++XQ4zhauPWBtrPV3CcoCahjUaWdjrKVkibomlJZaN8MEO23CfQw==
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 893 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 27566
;; flags: qr rd ra cd ; qd: 1 an: 3 au: 0 ad: 1
;; QUESTIONS:
;; ingotronic.ch., type = DS, class = IN
;; ANSWERS:
ingotronic.ch. 3583 IN DS 6031 5 1 733D0218B571CD617B1A7493564B9FC4F12ADE82
ingotronic.ch. 3583 IN DS 6031 5 2 4A948F2FDADA24686E473EDAC00DCF972584C75E3FAA92C2021B6221449FF87E
ingotronic.ch. 3583 IN RRSIG DS 8 2 3600 20150129033614 20150105123019 60789 ch. rVPJP2HhzW7OkroK2axFj5Lb4iVWCH8Fp/Iq1rF952NDo72b8RiKje2RaAKJAGQ+wd0YgE+PAej04GCmkhlDJA/zvPeeTxuhy3HbJzReMlQ7fjyH+wW1hli+FuIYvogXWf7nO/9VyPORt8X/f/pjrOr3Vlj9sGLN8TGYpEuVSw4=
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 288 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 9517
;; flags: qr aa rd ra cd ; qd: 1 an: 4 au: 0 ad: 1
;; QUESTIONS:
;; ingotronic.ch., type = DNSKEY, class = IN
;; ANSWERS:
ingotronic.ch. 300 IN DNSKEY 256 3 5 AwEAAZ2Xh77GFzpEDx7EHYxShqltHgkiG+BOjBGifEmnJhQSdE5/yNSLFNcdhZZ8HUPxYnaedTqJcFFg4AzUsQklF/fECegTJdZjaj2WoL0/I8K7HMfY/hVuRZUWPNglYi8agJRX6gdkFTCpUNI7stpgKqxtzUJhhw15uG/lKMplwqUr
ingotronic.ch. 300 IN DNSKEY 257 3 5 AwEAAeA1vzmjaB+eBAcvhzpKEgAEFpvQ1rg4uKDW6MsQtacKoqBpgyep2+LuWotz5p/xYxj3NGsArwN8Ad5cY0FHRr8miTT0elOv6nvlqGIfRuhj/BXAQ1x4ihpSFslHw0lJMYFwxsUZWpUyjWX/nv1xRZMMwF46gui0N4OEbyTYusCk77D+A71k+K0EAitFIbIH4GCUKmH1H7HmXhSVH9bN/n7KEGwW32lmsuuUcJoRKDkcUvbMXY/9Xoa2quERrUg/rBbDUHowRPjYDS5GzY1+f4YY8s40BufGiqyUTKKXL953MVFK8gmezXA0hbmrnZ7CBOw/7238mORAdzExaX8n7CE=
ingotronic.ch. 300 IN RRSIG DNSKEY 5 2 300 20150125003700 20141226001657 6031 ingotronic.ch. rs1QlP2SlSpA2ELbzwg3DgWLzXWL3Lpv6CUJE2Q0qH2Zp7Qdy3cD+ZEtNh9v24Qv1M6JJ3zFt8mmZoCeW2ycuMbJCqBkW9CBuwF+VznZvZY2MxwPipvhvEEGP//0M8YAZJ66yQPDv3PTdAP8FYbIrJyvY44vwyncwbslpfHT9jAsrbfr3vuMuWps86dnP462q+0s1TxBfqi8mzo3gdavjHKWVNwohLahLKT+tWeu6DSzQv0YwMjwtkLgF7QRgx3ctIIkloOrnx9nHH1N6y+hxEB89fOlyVDjHhgL5uVtsD5fEdT0FJ2Gc/2nShEMMqIwr1/J9kUq1mNySff/uEe65Q==
ingotronic.ch. 300 IN RRSIG DNSKEY 5 2 300 20150125003700 20141226001657 17430 ingotronic.ch. mEwZjhQqeWksWD0TCnNBrtce4YkWJL3edqL6PvAUu8Fn+Ih437kEs3+pqdkgRsdYQ9HW+lBm/8pWwJlNAv0bi9NykItXMwAUFtncgq+6Pnh3iAM972GXSa5VV4LcGQ5b8CBdHCHiEKDqyPv5Hr5QfYL/FQaWlcNRh4QZZlZNPFA=
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 940 bytes
###############################################
testCNameToVoidExternalValidTld 0000664 0000000 0000000 00000030404 13020541473 0035175 0 ustar 00root root 0000000 0000000 dnssecjava-1.1.3/src/test/resources/recordings/org_jitsi_dnssec_TestCNames #Date: 2015-01-06T22:34:57+01:00
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 46204
;; flags: qr aa rd ra cd ; qd: 1 an: 2 au: 8 ad: 1
;; QUESTIONS:
;; cvoidext2.ingotronic.ch., type = A, class = IN
;; ANSWERS:
cvoidext2.ingotronic.ch. 300 IN CNAME asdfasdfasdfasdfasdlallala.cz.
cvoidext2.ingotronic.ch. 300 IN RRSIG CNAME 5 3 300 20150125010026 20141226003834 17430 ingotronic.ch. gmo4G24J9Mvp33WaOCGbCb458CVIs/4I4Y3LKckPljSGiABf/yaQGvS9l3IzJPQnYSX8YQ4DIqlk7eusuJQY0fy2aAdOm04FwmwqUwyTmsAZLFVj3QTdKegKd5Dn6X3dkn0tey+B+f9vvAC7463cXnFBV/IH/FarIrI6k9ojzKY=
;; AUTHORITY RECORDS:
cz. 900 IN SOA a.ns.nic.cz. hostmaster.nic.cz. 1420578481 900 300 604800 900
cz. 900 IN RRSIG SOA 10 1 18000 20150120004808 20150106200801 12305 cz. wlLCApKp0+5n0FCqFyBqMMhIT3Ed0PZL096UZE52b6kbc1vlZMrJTVegCNAfqHA5lncr5IDiH74MRycOHXrASZbjRkrSlD/65Q6078U0eyUeMfkdTGtpbG4O9MIoYz2ZOYA+cm46kihukqqyL8TYW4k6tPPz38wM0ZtOOm6os68=
38GIO0D33Q2JTSPH3U5Q11N5T26Q7Q4K.cz. 900 IN RRSIG NSEC3 10 2 900 20150115154919 20150103133802 12305 cz. PJPc+o6k8nLCNnQLA7TsWdzq48+QO864/hWGqVRSCi9ukLgGDMKqv+jElAfWaUEC5+VjcqVFbPN4axf3f3YrujByVEeEh7w4xyszNT1PXuW8aRzxQY25w56qZg/0RS7u3iPqTTXD326C0YSviz9U+cUS01SDDG/VykuYNZ4HFW0=
38GIO0D33Q2JTSPH3U5Q11N5T26Q7Q4K.cz. 900 IN NSEC3 1 0 10 67B58E8C9BC9DB56 38GKDLFFUNLEL0AGNO2LSLVJVKI68LAG NS
8EFHGTJ1KPPOHHCDUN98RE9MQIJPGRTJ.cz. 900 IN RRSIG NSEC3 10 2 900 20150116070317 20150102073803 12305 cz. zOjazMb7y7VNKVJ0lV/GZWqzuQry0BGluA0L/r3jclBMei61EOK5OzZYz8w/rWbvYVD0bbRoicE2xnkfzABZU94vz+b62jYZQCbMymg53rYv3fiqIsxryxpZFxT/uJaHKpjN0qFUFbeWF6zSdx5LuH2d7dKK0GvQHm75YKljoXw=
8EFHGTJ1KPPOHHCDUN98RE9MQIJPGRTJ.cz. 900 IN NSEC3 1 0 10 67B58E8C9BC9DB56 8EFJ4IJ3TL227ELEVRADBRR79O7OI5GU NS DS RRSIG
FT1N74TQU0J7F46PTJVFUISFDM2FASQ9.cz. 900 IN RRSIG NSEC3 10 2 900 20150116012634 20150103003759 12305 cz. DuInt8AROXCbNdXO8QTeha9mLCaa/yw+6OhWNrRf65ZduFNSz+HVsAOK2XTmDoLUbrqGWzVSLS+ICJHYld40A8ApKEziLg5Kml5sLdZqQ/B3eFKAlCs085ZVqTRn7CtcSNFlO99nbcrLFum7Bd791XqNObAUuWULgEoknq/CqVc=
FT1N74TQU0J7F46PTJVFUISFDM2FASQ9.cz. 900 IN NSEC3 1 0 10 67B58E8C9BC9DB56 FT1N8G39QDVVI8P5NMEPU90HLCN2JE96 NS SOA RRSIG DNSKEY NSEC3PARAM
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 1229 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 4951
;; flags: qr rd ra ad cd ; qd: 1 an: 4 au: 0 ad: 1
;; QUESTIONS:
;; ., type = DNSKEY, class = IN
;; ANSWERS:
. 87377 IN DNSKEY 256 3 8 AwEAAe3fSrbLBy3LOS7pnxEUhvPZTE2H5dIGsI/UfruI/nOEvWWa/PSX2BFedBkEqOlYdjdNF2f+6lmfk2Od/xu0v5bVqxFE+/24v3hZSlWBxvXzPTAGHrbW/IJYEPqlzVOAS4XdUgHg0N7IbLywNHMvB+Yf+Nm6ctyXXFLV4WTNnzs7
. 87377 IN DNSKEY 256 3 8 AwEAAaPD7Y7XIi1MOEREJNTrRhyqsY3gff6JWzg+XCbqut1sbcbvqyssHw8DT1AkRaAC92pO8xuyq5QEgEPL1IHfABLwpwXI5gTj4gdwi86bpkmlWs9fRpnn4DPDCTdrnxIejJXgClHikLJF3u3CdpNCMijq4CKdQbMlRZ3avv+G7rh7
. 87377 IN DNSKEY 257 3 8 AwEAAagAIKlVZrpC6Ia7gEzahOR+9W29euxhJhVVLOyQbSEW0O8gcCjFFVQUTf6v58fLjwBd0YI0EzrAcQqBGCzh/RStIoO8g0NfnfL2MTJRkxoXbfDaUeVPQuYEhg37NZWAJQ9VnMVDxP/VHL496M/QZxkjf5/Efucp2gaDX6RS6CXpoY68LsvPVjR0ZSwzz1apAzvN9dlzEheX7ICJBBtuA6G3LQpzW5hOA2hzCTMjJPJ8LbqF6dsV6DoBQzgul0sGIcGOYl7OyQdXfZ57relSQageu+ipAdTTJ25AsRTAoub8ONGcLmqrAmRLKBP1dfwhYB4N7knNnulqQxA+Uk1ihz0=
. 87377 IN RRSIG DNSKEY 8 0 172800 20150115235959 20150101000000 19036 . i8cAxD2pvQi1oAyvQxRpDfFlbqPzW+69QQEsDwE1eWOm5AtawO9U7lmsGps7sy/fVNvl1ljKBj4Djp9pb3U2FLogjiIlW0cDAkPmLlG9t+b/pjEfBNlhjANUVN06pvQVAfm+LcF26EaWT6FlISBqb6jSy4BHRa3Bdc4Sx7+pRSYSqVVvYxLkfAWsKPqGkvWhebJDndJJV9syXQXgZ+v/uJ+6XOS43xkAdeL8iBzIs/FlwMTfh3tVe3d0lb65IBBLlCzeQuetX+0Vu1YFcnD0mHc/wS2ZnAV5toAFmyVQBoY/XAZiZeaOkcROJ6Zmqezy7liwK7BqsYyAZntMhk8lbg==
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 883 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 30086
;; flags: qr rd ra ad cd ; qd: 1 an: 2 au: 0 ad: 1
;; QUESTIONS:
;; ch., type = DS, class = IN
;; ANSWERS:
ch. 977 IN DS 46375 8 2 8F96646FC68BB7E4AF4C0750A6096FBC0D4ECDA3D3FA6DA06FDDB42EE50C6CF3
ch. 977 IN RRSIG DS 8 1 86400 20150112170000 20150105160000 16665 . thY7xYWBBxiBjqbQIb9fAG4TmQgnziwM7q6P1T3/ITxmECdvOCQnnZA3uD7qmN8uM0HudsD7+y+zgD3rsH4RSTKdL4kHSI0OnCxToMTvklghEgFDezqIRm8NkWdI2H4Stwrj20nYKSpLQxPI2EE54gs18P3KyO8bAUYv8Qx73xU=
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 238 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 44855
;; flags: qr rd ra ad cd ; qd: 1 an: 4 au: 0 ad: 1
;; QUESTIONS:
;; ch., type = DNSKEY, class = IN
;; ANSWERS:
ch. 978 IN DNSKEY 257 3 8 AwEAAb7GhhZ8IAy/AhwmSms5DeQK5ad09wIIplEpYoiAIYXPtJvT1ReFzyfTp/2YP+g/PWDwHPh4qKAHa9x0VgbIQcGAeNakmfkAdWEmCnca323/SAml3mwfaX62G7/uYWae5zh8QTxZKNd+K1yZ5x0IxnI31chSl5xymRbTEHYZDKwSIRFM3fTxUMt93WFaBVWELReYotJBr++rvAWdnlay5TPBTvheLBkaiqtgM4GP8HK07Y+86lsZnEsj5K3G1KTV5SPpa82rqYAwxG9VKbmSE/6/kBR5jJHjt1rRt5Oe7v18aEtw0YCEN4vxq+KuvMoNVqXUsE9LBwHJD+QNwi6wmB0=
ch. 978 IN DNSKEY 256 3 8 AwEAAcSLdT0fEmcFmLpeUkAJoeVaHKiu+nbuc43fWlqaCRVf8t2HA4uWxOk0O5ci9nrFTc8nq8oa5fk5Cj7CHh4yrX9qUCfTdIWTyp8BDEdJpS+Dyb0u9wQuVj+nQMj4fLzdQf4TJs3/qxuiLr3nL1UUwlhhXeqSqGVb7p3mtB5HJ8ad
ch. 978 IN DNSKEY 256 3 8 AwEAAcsg0kY6fw1wzYMhSAKTy+Y2JzAst66P/1odp9NECJJHbU8f4nwziI3onoFSBV0ZiSZhY1aH5dhdDZ7BkrqhVXSrZPAz0CvzjIxmB1gSOf9DeZvjQvoy97HqYolxsf+B3QQv2RKBT67elF5+JisKg3/dQISelKn8LhabSoVrMlD1
ch. 978 IN RRSIG DNSKEY 8 1 86400 20150127100909 20141212090909 46375 ch. bT8q0FWyeMH0SulNo6UdIIgZYNATwYsee2bikq2Gh339Bufma8eaqWIPYT3XKmxYPBFOw0bVl+kLZxTwbR1CFoCDXoP+qgQhh4mf9qkNiv2CDSc+0FE3FRREn+DAhYTUEuB58FPiPakFB8s8O7T+k2qhDae7jy4/y7Jl1lnjaBY8s7bzOUPhF0KKCNZmvoKwtL23ZdVeTSV1xM3jkiNnpzBKbcoSWECSGJVp1SE0BnRXdwQP41YTXFZ0310YjaTAUCC5qbMIWdEkHjfdSQtKBImnc85mkapq9w++XQ4zhauPWBtrPV3CcoCahjUaWdjrKVkibomlJZaN8MEO23CfQw==
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 893 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 30639
;; flags: qr rd ra cd ; qd: 1 an: 3 au: 0 ad: 1
;; QUESTIONS:
;; ingotronic.ch., type = DS, class = IN
;; ANSWERS:
ingotronic.ch. 3586 IN DS 6031 5 1 733D0218B571CD617B1A7493564B9FC4F12ADE82
ingotronic.ch. 3586 IN DS 6031 5 2 4A948F2FDADA24686E473EDAC00DCF972584C75E3FAA92C2021B6221449FF87E
ingotronic.ch. 3586 IN RRSIG DS 8 2 3600 20150129033614 20150105123019 60789 ch. rVPJP2HhzW7OkroK2axFj5Lb4iVWCH8Fp/Iq1rF952NDo72b8RiKje2RaAKJAGQ+wd0YgE+PAej04GCmkhlDJA/zvPeeTxuhy3HbJzReMlQ7fjyH+wW1hli+FuIYvogXWf7nO/9VyPORt8X/f/pjrOr3Vlj9sGLN8TGYpEuVSw4=
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 288 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 59579
;; flags: qr aa rd ra cd ; qd: 1 an: 4 au: 0 ad: 1
;; QUESTIONS:
;; ingotronic.ch., type = DNSKEY, class = IN
;; ANSWERS:
ingotronic.ch. 300 IN DNSKEY 256 3 5 AwEAAZ2Xh77GFzpEDx7EHYxShqltHgkiG+BOjBGifEmnJhQSdE5/yNSLFNcdhZZ8HUPxYnaedTqJcFFg4AzUsQklF/fECegTJdZjaj2WoL0/I8K7HMfY/hVuRZUWPNglYi8agJRX6gdkFTCpUNI7stpgKqxtzUJhhw15uG/lKMplwqUr
ingotronic.ch. 300 IN DNSKEY 257 3 5 AwEAAeA1vzmjaB+eBAcvhzpKEgAEFpvQ1rg4uKDW6MsQtacKoqBpgyep2+LuWotz5p/xYxj3NGsArwN8Ad5cY0FHRr8miTT0elOv6nvlqGIfRuhj/BXAQ1x4ihpSFslHw0lJMYFwxsUZWpUyjWX/nv1xRZMMwF46gui0N4OEbyTYusCk77D+A71k+K0EAitFIbIH4GCUKmH1H7HmXhSVH9bN/n7KEGwW32lmsuuUcJoRKDkcUvbMXY/9Xoa2quERrUg/rBbDUHowRPjYDS5GzY1+f4YY8s40BufGiqyUTKKXL953MVFK8gmezXA0hbmrnZ7CBOw/7238mORAdzExaX8n7CE=
ingotronic.ch. 300 IN RRSIG DNSKEY 5 2 300 20150125003700 20141226001657 6031 ingotronic.ch. rs1QlP2SlSpA2ELbzwg3DgWLzXWL3Lpv6CUJE2Q0qH2Zp7Qdy3cD+ZEtNh9v24Qv1M6JJ3zFt8mmZoCeW2ycuMbJCqBkW9CBuwF+VznZvZY2MxwPipvhvEEGP//0M8YAZJ66yQPDv3PTdAP8FYbIrJyvY44vwyncwbslpfHT9jAsrbfr3vuMuWps86dnP462q+0s1TxBfqi8mzo3gdavjHKWVNwohLahLKT+tWeu6DSzQv0YwMjwtkLgF7QRgx3ctIIkloOrnx9nHH1N6y+hxEB89fOlyVDjHhgL5uVtsD5fEdT0FJ2Gc/2nShEMMqIwr1/J9kUq1mNySff/uEe65Q==
ingotronic.ch. 300 IN RRSIG DNSKEY 5 2 300 20150125003700 20141226001657 17430 ingotronic.ch. mEwZjhQqeWksWD0TCnNBrtce4YkWJL3edqL6PvAUu8Fn+Ih437kEs3+pqdkgRsdYQ9HW+lBm/8pWwJlNAv0bi9NykItXMwAUFtncgq+6Pnh3iAM972GXSa5VV4LcGQ5b8CBdHCHiEKDqyPv5Hr5QfYL/FQaWlcNRh4QZZlZNPFA=
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 940 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 14960
;; flags: qr rd ra ad cd ; qd: 1 an: 4 au: 0 ad: 1
;; QUESTIONS:
;; ., type = DNSKEY, class = IN
;; ANSWERS:
. 87376 IN DNSKEY 256 3 8 AwEAAaPD7Y7XIi1MOEREJNTrRhyqsY3gff6JWzg+XCbqut1sbcbvqyssHw8DT1AkRaAC92pO8xuyq5QEgEPL1IHfABLwpwXI5gTj4gdwi86bpkmlWs9fRpnn4DPDCTdrnxIejJXgClHikLJF3u3CdpNCMijq4CKdQbMlRZ3avv+G7rh7
. 87376 IN DNSKEY 257 3 8 AwEAAagAIKlVZrpC6Ia7gEzahOR+9W29euxhJhVVLOyQbSEW0O8gcCjFFVQUTf6v58fLjwBd0YI0EzrAcQqBGCzh/RStIoO8g0NfnfL2MTJRkxoXbfDaUeVPQuYEhg37NZWAJQ9VnMVDxP/VHL496M/QZxkjf5/Efucp2gaDX6RS6CXpoY68LsvPVjR0ZSwzz1apAzvN9dlzEheX7ICJBBtuA6G3LQpzW5hOA2hzCTMjJPJ8LbqF6dsV6DoBQzgul0sGIcGOYl7OyQdXfZ57relSQageu+ipAdTTJ25AsRTAoub8ONGcLmqrAmRLKBP1dfwhYB4N7knNnulqQxA+Uk1ihz0=
. 87376 IN DNSKEY 256 3 8 AwEAAe3fSrbLBy3LOS7pnxEUhvPZTE2H5dIGsI/UfruI/nOEvWWa/PSX2BFedBkEqOlYdjdNF2f+6lmfk2Od/xu0v5bVqxFE+/24v3hZSlWBxvXzPTAGHrbW/IJYEPqlzVOAS4XdUgHg0N7IbLywNHMvB+Yf+Nm6ctyXXFLV4WTNnzs7
. 87376 IN RRSIG DNSKEY 8 0 172800 20150115235959 20150101000000 19036 . i8cAxD2pvQi1oAyvQxRpDfFlbqPzW+69QQEsDwE1eWOm5AtawO9U7lmsGps7sy/fVNvl1ljKBj4Djp9pb3U2FLogjiIlW0cDAkPmLlG9t+b/pjEfBNlhjANUVN06pvQVAfm+LcF26EaWT6FlISBqb6jSy4BHRa3Bdc4Sx7+pRSYSqVVvYxLkfAWsKPqGkvWhebJDndJJV9syXQXgZ+v/uJ+6XOS43xkAdeL8iBzIs/FlwMTfh3tVe3d0lb65IBBLlCzeQuetX+0Vu1YFcnD0mHc/wS2ZnAV5toAFmyVQBoY/XAZiZeaOkcROJ6Zmqezy7liwK7BqsYyAZntMhk8lbg==
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 883 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 43914
;; flags: qr rd ra cd ; qd: 1 an: 2 au: 0 ad: 1
;; QUESTIONS:
;; cz., type = DS, class = IN
;; ANSWERS:
cz. 1022 IN DS 54576 10 2 397E50C85EDE9CDE33F363A9E66FD1B216D788F8DD438A57A423A386869C8F06
cz. 1022 IN RRSIG DS 8 1 86400 20150112170000 20150105160000 16665 . usdJcSrC+uZEPY8AbHtkDdbuhCaz7ZGrKWHYZG3lixlcaEACfpf2Wl4Tz55FvIgCXKII9B6PUJ9umfupy+XOMvBUsjI8aD/Of8bEBWQ2QS35GOt8YMoyf5lI+nZT0hte/cY3Dgq0Vo2zHvvdrPC2kfgy0i/h4IMxLYWghQeCg1M=
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 238 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 23832
;; flags: qr rd ra cd ; qd: 1 an: 4 au: 0 ad: 1
;; QUESTIONS:
;; cz., type = DNSKEY, class = IN
;; ANSWERS:
cz. 18000 IN DNSKEY 257 3 10 AwEAAay0hi4HN2r/BqMQTpIPIVDyjmyF+9ZWvr5Lewx+q+947o/GrRv4FGFfkZxf9CFfYVUf0jG5Yq4i06pGVNwJl81HS9Ux2oeHRXUvgtLnl5HeRVLL+zgI5byx9HSNr4bPO8ZEn5OjoayhkNyGSFr4VWrzQk/K02vLP4d1cCEzUQy30eyZto2/tG5ZwCU/iRkS1PJOcOW98hiFIfFDZv1XjbEpqEYhT2PATs6rt+BKwSHKGISmg1PNdg+y0rItemYMWr1f9BGAdtTWoPCPCYPjOZMPoIyA4tMscD+ww54Jf/QNoHccY4hO1yHiuAXG7SUn8jo0IKQ9W7JJxES0aqFCX/0=
cz. 18000 IN DNSKEY 256 3 10 AwEAAd3ZDGaLTUBExTP4AxFwNmoNUbi/VuWW5/vdee9lnZynOe6QoXfw8+yxwAKEB1IMrPxXVcc1PIHSecFQYcm5ydYAFo2FD0x+NAk+7quCmepMjuWEo1qRMxlgVMxBjWCCOUM+zhGfkq/6u0GEEHzonevsRMazhkIbIZUWQmBMvUu7
cz. 18000 IN RRSIG DNSKEY 10 1 18000 20150116000000 20150102000000 54576 cz. Ghsts1kWqYSQ72PDf49ItDFLQjTGoTK6JA9Ogf/efflU6ZltiuuXVd17oKI15HPk1hjL/n9HNRiIf1htUpdA9vmUbYKfrjVp2MJXHIGNniH1vWU3cFxReh2dxMspUDTyK64LwBBbBIBmEWY7jadtzsvjdHXx1eqngN3e4WUPGS58JoSXVv1d38vcTZ1jYLWmOlnHrCvZEwj9t53Lq1Ln/fra2Ft3cfgO6i0P6qtBht/amX7kX1BAV0l6lO+fy0PXXbXWoTMRDIruId/8N0ND7FZolH+XBxSW9clDHzPx9ivkJsxKB3rHO8vNOVWcHyKyKacpW2O8FFUee5PLlCu+6g==
cz. 18000 IN RRSIG DNSKEY 10 1 18000 20150119154437 20150106200801 12305 cz. P48hNLytBKd+6k+EnJuE5W24xWSmxqjCvQy6M4UwDACyMyxDMZP4DmWuRgb+g/2OjpfSdGFvNTPSrTKAx3sOMynqLMJzYWRb5bRf2lPEIeHQH2Eeo9wvwh14uakw6HzHcNovak21iVTNoN61vmYR5QT1RyuBwYgFBGgUbMeiYpc=
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 907 bytes
###############################################
dnssecjava-1.1.3/src/test/resources/recordings/org_jitsi_dnssec_TestCNames/testCNameToVoidNsec3 0000664 0000000 0000000 00000026161 13020541473 0033026 0 ustar 00root root 0000000 0000000 #Date: 2015-01-06T22:34:53+01:00
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 10111
;; flags: qr aa rd ra cd ; qd: 1 an: 2 au: 8 ad: 1
;; QUESTIONS:
;; cvoid.nsec3.ingotronic.ch., type = A, class = IN
;; ANSWERS:
cvoid.nsec3.ingotronic.ch. 300 IN CNAME gibtsnicht.nsec3.ingotronic.ch.
cvoid.nsec3.ingotronic.ch. 300 IN RRSIG CNAME 7 4 300 20150125001848 20141225235834 62417 nsec3.ingotronic.ch. wkUoPvwxbSBQwn6foMsFYdPuGZNnmi1qKWN7sEtcuI4Hu17Gfjm7oBMpbj5fbaKETl83sqAAPQThWAeoYCM0DDhxyI114F6/fb52HLYgGFNLdMP3T75nHZiIcH8A2Z5t9DmqTEPmuSU3sZRCPYI7kfBXGHM1vb0gcLptQn5Zh20=
;; AUTHORITY RECORDS:
nsec3.ingotronic.ch. 300 IN SOA ns1.ingotronic.ch. admin.ingotronic.ch. 2013032932 300 60 864000 300
nsec3.ingotronic.ch. 300 IN RRSIG SOA 7 3 300 20150201003516 20150101233516 62417 nsec3.ingotronic.ch. RMXaAZCkydysBpA4+LWD2frs4CZH2FBxafAolq7MOG62Sw3ellwNcSIh2naMasviin2DU2BAzIYyFUqKJDbUqzTxZQjsM6d5LtgFy5iTNmWum6FnFP5Fz73Zs/9Q0LNEstR82MRRL8EDElADhFySAReavyT/vlSTScQGxx6slyQ=
NTV3QJT4VQDVBPB6BNOVM40NMKJ3H29P.nsec3.ingotronic.ch. 300 IN NSEC3 1 0 10 1234 O275F9OLQ9HNCER7U4SMD4V8AG7IPML9 A NS SOA RRSIG DNSKEY NSEC3PARAM
NTV3QJT4VQDVBPB6BNOVM40NMKJ3H29P.nsec3.ingotronic.ch. 300 IN RRSIG NSEC3 7 4 300 20150131235629 20150101233516 62417 nsec3.ingotronic.ch. xccCvQs/b3ndBUo6J2FbaCzDMg+LB1e4OWeI29VTBWcmfbuD3rZvneRdbA9B5AluJH1ar10xxdrt/+RSuhSWC70LswkdPDg4vshmCZMDeMCOJYFEkGR0UgcZUMynU6EewEDLVLgYtBkJmspeuZNMBMPk/ZUOolCElrkHfbUA1Cc=
UDUMPS9J6F8348HFHH2FAED6I9DDE0U6.nsec3.ingotronic.ch. 300 IN NSEC3 1 0 10 1234 0UPHA6GQV03I7D8EJUDKC30I0C6I1G1Q
UDUMPS9J6F8348HFHH2FAED6I9DDE0U6.nsec3.ingotronic.ch. 300 IN RRSIG NSEC3 7 4 300 20150125005926 20141226002759 62417 nsec3.ingotronic.ch. XV2q9ufbwzauD/tmjb2EKsNBF+kHQYL0/MNb6ivY1oH9Q2hzQNPUuHkUl1db2erDFodPvspmDk6p6WOXoV6wmmaYhN+JI1TQKYYThsnKC1bkt1h6QyjwsDc12d8HVHOopvoXpaYWoV4bbghsAylGVqRjEYyt8JtR3BPfphehloU=
L40SJG7ANKROIHCT5RA6C8CTKJ91CD3N.nsec3.ingotronic.ch. 300 IN NSEC3 1 0 10 1234 ND3HQPFBN314KVB64L6T40JF75US8HKT
L40SJG7ANKROIHCT5RA6C8CTKJ91CD3N.nsec3.ingotronic.ch. 300 IN RRSIG NSEC3 7 4 300 20150125005926 20141226002759 62417 nsec3.ingotronic.ch. v6NHEWwb2KxRGRPshC2KFoxJs4Mis3OmvncJmn5bIWBnzeTY4x75tsE4zlVPx9rp0rjmOAQsYn4KGtIFPUShDHNHy45qoOtKkvRzRgByx4K2l5Rq9OizQVYsEUUScXEYATilaDU9whifF0vPk7YPwFGRmiY3prCGAvY/jH4hQUM=
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 1248 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 32391
;; flags: qr rd ra ad cd ; qd: 1 an: 4 au: 0 ad: 1
;; QUESTIONS:
;; ., type = DNSKEY, class = IN
;; ANSWERS:
. 87380 IN DNSKEY 256 3 8 AwEAAe3fSrbLBy3LOS7pnxEUhvPZTE2H5dIGsI/UfruI/nOEvWWa/PSX2BFedBkEqOlYdjdNF2f+6lmfk2Od/xu0v5bVqxFE+/24v3hZSlWBxvXzPTAGHrbW/IJYEPqlzVOAS4XdUgHg0N7IbLywNHMvB+Yf+Nm6ctyXXFLV4WTNnzs7
. 87380 IN DNSKEY 257 3 8 AwEAAagAIKlVZrpC6Ia7gEzahOR+9W29euxhJhVVLOyQbSEW0O8gcCjFFVQUTf6v58fLjwBd0YI0EzrAcQqBGCzh/RStIoO8g0NfnfL2MTJRkxoXbfDaUeVPQuYEhg37NZWAJQ9VnMVDxP/VHL496M/QZxkjf5/Efucp2gaDX6RS6CXpoY68LsvPVjR0ZSwzz1apAzvN9dlzEheX7ICJBBtuA6G3LQpzW5hOA2hzCTMjJPJ8LbqF6dsV6DoBQzgul0sGIcGOYl7OyQdXfZ57relSQageu+ipAdTTJ25AsRTAoub8ONGcLmqrAmRLKBP1dfwhYB4N7knNnulqQxA+Uk1ihz0=
. 87380 IN DNSKEY 256 3 8 AwEAAaPD7Y7XIi1MOEREJNTrRhyqsY3gff6JWzg+XCbqut1sbcbvqyssHw8DT1AkRaAC92pO8xuyq5QEgEPL1IHfABLwpwXI5gTj4gdwi86bpkmlWs9fRpnn4DPDCTdrnxIejJXgClHikLJF3u3CdpNCMijq4CKdQbMlRZ3avv+G7rh7
. 87380 IN RRSIG DNSKEY 8 0 172800 20150115235959 20150101000000 19036 . i8cAxD2pvQi1oAyvQxRpDfFlbqPzW+69QQEsDwE1eWOm5AtawO9U7lmsGps7sy/fVNvl1ljKBj4Djp9pb3U2FLogjiIlW0cDAkPmLlG9t+b/pjEfBNlhjANUVN06pvQVAfm+LcF26EaWT6FlISBqb6jSy4BHRa3Bdc4Sx7+pRSYSqVVvYxLkfAWsKPqGkvWhebJDndJJV9syXQXgZ+v/uJ+6XOS43xkAdeL8iBzIs/FlwMTfh3tVe3d0lb65IBBLlCzeQuetX+0Vu1YFcnD0mHc/wS2ZnAV5toAFmyVQBoY/XAZiZeaOkcROJ6Zmqezy7liwK7BqsYyAZntMhk8lbg==
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 883 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 55778
;; flags: qr rd ra ad cd ; qd: 1 an: 2 au: 0 ad: 1
;; QUESTIONS:
;; ch., type = DS, class = IN
;; ANSWERS:
ch. 980 IN DS 46375 8 2 8F96646FC68BB7E4AF4C0750A6096FBC0D4ECDA3D3FA6DA06FDDB42EE50C6CF3
ch. 980 IN RRSIG DS 8 1 86400 20150112170000 20150105160000 16665 . thY7xYWBBxiBjqbQIb9fAG4TmQgnziwM7q6P1T3/ITxmECdvOCQnnZA3uD7qmN8uM0HudsD7+y+zgD3rsH4RSTKdL4kHSI0OnCxToMTvklghEgFDezqIRm8NkWdI2H4Stwrj20nYKSpLQxPI2EE54gs18P3KyO8bAUYv8Qx73xU=
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 238 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 33974
;; flags: qr rd ra ad cd ; qd: 1 an: 4 au: 0 ad: 1
;; QUESTIONS:
;; ch., type = DNSKEY, class = IN
;; ANSWERS:
ch. 981 IN DNSKEY 256 3 8 AwEAAcSLdT0fEmcFmLpeUkAJoeVaHKiu+nbuc43fWlqaCRVf8t2HA4uWxOk0O5ci9nrFTc8nq8oa5fk5Cj7CHh4yrX9qUCfTdIWTyp8BDEdJpS+Dyb0u9wQuVj+nQMj4fLzdQf4TJs3/qxuiLr3nL1UUwlhhXeqSqGVb7p3mtB5HJ8ad
ch. 981 IN DNSKEY 256 3 8 AwEAAcsg0kY6fw1wzYMhSAKTy+Y2JzAst66P/1odp9NECJJHbU8f4nwziI3onoFSBV0ZiSZhY1aH5dhdDZ7BkrqhVXSrZPAz0CvzjIxmB1gSOf9DeZvjQvoy97HqYolxsf+B3QQv2RKBT67elF5+JisKg3/dQISelKn8LhabSoVrMlD1
ch. 981 IN DNSKEY 257 3 8 AwEAAb7GhhZ8IAy/AhwmSms5DeQK5ad09wIIplEpYoiAIYXPtJvT1ReFzyfTp/2YP+g/PWDwHPh4qKAHa9x0VgbIQcGAeNakmfkAdWEmCnca323/SAml3mwfaX62G7/uYWae5zh8QTxZKNd+K1yZ5x0IxnI31chSl5xymRbTEHYZDKwSIRFM3fTxUMt93WFaBVWELReYotJBr++rvAWdnlay5TPBTvheLBkaiqtgM4GP8HK07Y+86lsZnEsj5K3G1KTV5SPpa82rqYAwxG9VKbmSE/6/kBR5jJHjt1rRt5Oe7v18aEtw0YCEN4vxq+KuvMoNVqXUsE9LBwHJD+QNwi6wmB0=
ch. 981 IN RRSIG DNSKEY 8 1 86400 20150127100909 20141212090909 46375 ch. bT8q0FWyeMH0SulNo6UdIIgZYNATwYsee2bikq2Gh339Bufma8eaqWIPYT3XKmxYPBFOw0bVl+kLZxTwbR1CFoCDXoP+qgQhh4mf9qkNiv2CDSc+0FE3FRREn+DAhYTUEuB58FPiPakFB8s8O7T+k2qhDae7jy4/y7Jl1lnjaBY8s7bzOUPhF0KKCNZmvoKwtL23ZdVeTSV1xM3jkiNnpzBKbcoSWECSGJVp1SE0BnRXdwQP41YTXFZ0310YjaTAUCC5qbMIWdEkHjfdSQtKBImnc85mkapq9w++XQ4zhauPWBtrPV3CcoCahjUaWdjrKVkibomlJZaN8MEO23CfQw==
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 893 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 45078
;; flags: qr rd ra cd ; qd: 1 an: 3 au: 0 ad: 1
;; QUESTIONS:
;; ingotronic.ch., type = DS, class = IN
;; ANSWERS:
ingotronic.ch. 3589 IN DS 6031 5 1 733D0218B571CD617B1A7493564B9FC4F12ADE82
ingotronic.ch. 3589 IN DS 6031 5 2 4A948F2FDADA24686E473EDAC00DCF972584C75E3FAA92C2021B6221449FF87E
ingotronic.ch. 3589 IN RRSIG DS 8 2 3600 20150129033614 20150105123019 60789 ch. rVPJP2HhzW7OkroK2axFj5Lb4iVWCH8Fp/Iq1rF952NDo72b8RiKje2RaAKJAGQ+wd0YgE+PAej04GCmkhlDJA/zvPeeTxuhy3HbJzReMlQ7fjyH+wW1hli+FuIYvogXWf7nO/9VyPORt8X/f/pjrOr3Vlj9sGLN8TGYpEuVSw4=
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 288 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 13899
;; flags: qr aa rd ra cd ; qd: 1 an: 4 au: 0 ad: 1
;; QUESTIONS:
;; ingotronic.ch., type = DNSKEY, class = IN
;; ANSWERS:
ingotronic.ch. 300 IN DNSKEY 257 3 5 AwEAAeA1vzmjaB+eBAcvhzpKEgAEFpvQ1rg4uKDW6MsQtacKoqBpgyep2+LuWotz5p/xYxj3NGsArwN8Ad5cY0FHRr8miTT0elOv6nvlqGIfRuhj/BXAQ1x4ihpSFslHw0lJMYFwxsUZWpUyjWX/nv1xRZMMwF46gui0N4OEbyTYusCk77D+A71k+K0EAitFIbIH4GCUKmH1H7HmXhSVH9bN/n7KEGwW32lmsuuUcJoRKDkcUvbMXY/9Xoa2quERrUg/rBbDUHowRPjYDS5GzY1+f4YY8s40BufGiqyUTKKXL953MVFK8gmezXA0hbmrnZ7CBOw/7238mORAdzExaX8n7CE=
ingotronic.ch. 300 IN DNSKEY 256 3 5 AwEAAZ2Xh77GFzpEDx7EHYxShqltHgkiG+BOjBGifEmnJhQSdE5/yNSLFNcdhZZ8HUPxYnaedTqJcFFg4AzUsQklF/fECegTJdZjaj2WoL0/I8K7HMfY/hVuRZUWPNglYi8agJRX6gdkFTCpUNI7stpgKqxtzUJhhw15uG/lKMplwqUr
ingotronic.ch. 300 IN RRSIG DNSKEY 5 2 300 20150125003700 20141226001657 6031 ingotronic.ch. rs1QlP2SlSpA2ELbzwg3DgWLzXWL3Lpv6CUJE2Q0qH2Zp7Qdy3cD+ZEtNh9v24Qv1M6JJ3zFt8mmZoCeW2ycuMbJCqBkW9CBuwF+VznZvZY2MxwPipvhvEEGP//0M8YAZJ66yQPDv3PTdAP8FYbIrJyvY44vwyncwbslpfHT9jAsrbfr3vuMuWps86dnP462q+0s1TxBfqi8mzo3gdavjHKWVNwohLahLKT+tWeu6DSzQv0YwMjwtkLgF7QRgx3ctIIkloOrnx9nHH1N6y+hxEB89fOlyVDjHhgL5uVtsD5fEdT0FJ2Gc/2nShEMMqIwr1/J9kUq1mNySff/uEe65Q==
ingotronic.ch. 300 IN RRSIG DNSKEY 5 2 300 20150125003700 20141226001657 17430 ingotronic.ch. mEwZjhQqeWksWD0TCnNBrtce4YkWJL3edqL6PvAUu8Fn+Ih437kEs3+pqdkgRsdYQ9HW+lBm/8pWwJlNAv0bi9NykItXMwAUFtncgq+6Pnh3iAM972GXSa5VV4LcGQ5b8CBdHCHiEKDqyPv5Hr5QfYL/FQaWlcNRh4QZZlZNPFA=
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 940 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 52296
;; flags: qr aa rd ra cd ; qd: 1 an: 3 au: 0 ad: 1
;; QUESTIONS:
;; nsec3.ingotronic.ch., type = DS, class = IN
;; ANSWERS:
nsec3.ingotronic.ch. 300 IN DS 16758 7 2 3C8DC02750A1636F829B45D6E6D642866768A9CD40A013AD9D25AB63734FFA13
nsec3.ingotronic.ch. 300 IN DS 16758 7 1 1720FF268E09A2CB63805EC8782D10AAD20E12A5
nsec3.ingotronic.ch. 300 IN RRSIG DS 5 3 300 20150125011134 20141226002644 17430 ingotronic.ch. hNurzlGhlyHbSgezPDuhIrtN9ZMsMXZbKGc7HD5rUuM88wD3fM97NxdzF+2Hi1USvBZ5GsQv63L+lAzf+mFPBoPIFHtTiAv8up7kQKRKmi/EzzkCYd/CC4UYdDZbaUyv7esh7spSOGwjPJNdK831p+MgltoWaYtnSGVMgOKk5mc=
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 305 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 58137
;; flags: qr aa rd ra cd ; qd: 1 an: 4 au: 0 ad: 1
;; QUESTIONS:
;; nsec3.ingotronic.ch., type = DNSKEY, class = IN
;; ANSWERS:
nsec3.ingotronic.ch. 300 IN DNSKEY 257 3 7 AwEAAaBuJTf9oGyeTH3biUkAFLrsYrkodX1H7Snsui4XsDHFCBvs5XYacHbs0Jg0/O51KPjmNnjwMW8SSyDkKqYQ+9uYAf2EQ/pnD/VGQqnV2cw0Vwk/t0E2V4FUCju4pnAoyzZFZXGs1eWbX9JXu++b0Azp+ACq6485qJLzHhWDiIrPoK/SvdbFVRK4s+nPPJLH3NGBbtdz6kPq7aFWYBMoGeAZdN1wsQpcNWUo5eOmaJY53nMc7+rDpAyYlMe/FKwSZdX2ZDd63Qsa6Im4FVUJq/nWLq7tlQ/mWks15uDTQyJy/OWfA0ICCO4N9Fel9rThJNpJWEzOCblvZyBoy405kZk=
nsec3.ingotronic.ch. 300 IN DNSKEY 256 3 7 AwEAAccAWxkTVGZ6UAp0VEozAlYpARhbh6Y6tYOl6Fg3UeBNFFtDQ9fTEEt1NkbnR9u8KkpVN6a67avlYiUN1egDqEwzDU7R1Rw+/USdhm2hqOARmmu3DBgjjX/iXjZLyv310cOGFJZ/smcodlDL4pDAAoPxh/qs6KEBaT0sc1KWcGq3
nsec3.ingotronic.ch. 300 IN RRSIG DNSKEY 7 3 300 20150125001457 20141226000444 16758 nsec3.ingotronic.ch. mXi1ylDi8XkRPup+YlT8GPdYE+P7gb6+/VdAwtodI916IzrkGkOHOTLbnrbAqqJOh0HxVCYXdxovmEcbJKUFKwplrQg3XD7/9Sq4pKU1MhMFEGrm/QPkM4u0mgjQwyToDLGuPHuFyur3FSjO/n54uGhAEft9JOFk/WKtWdCnm2LLyQrpC6herA3efFaI8kZhdoEY02AwihWVJxHasmz7lOoKRgNrkfELU+fN4+V7ISsRfJMyZc6q5PuNeG6vFD0uNE8tpdLJCSMurKYVpelvYqzFIcRTYcIjXwmS+L3DGjupqWMzFZVmpQM62JG3KCCD0ffpnNb0nWoSoHwpSeh/3Q==
nsec3.ingotronic.ch. 300 IN RRSIG DNSKEY 7 3 300 20150125001457 20141226000444 62417 nsec3.ingotronic.ch. PyCrf8T5dAfJzapb1p+kcTALPjDuD2niSaXXo0KeHAunT+6gJicLML2S/ZpiYr7X7Ma4Z0TYqE02qH6pcLYNnSgv9BE8sZO0nRtPekSyTy5nLi4hFADYhjb3UjaB85qmQZcqm64vC/CJhWO4t6Eixg/5MYALw+Qdy5Fo0qy/U5E=
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 958 bytes
###############################################
dnssecjava-1.1.3/src/test/resources/recordings/org_jitsi_dnssec_TestDNames/ 0000775 0000000 0000000 00000000000 13020541473 0027172 5 ustar 00root root 0000000 0000000 dnssecjava-1.1.3/src/test/resources/recordings/org_jitsi_dnssec_TestDNames/testDNameChain 0000664 0000000 0000000 00000025460 13020541473 0031753 0 ustar 00root root 0000000 0000000 #Date: 2015-01-06T22:35:18+01:00
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 44507
;; flags: qr aa rd ra cd ; qd: 1 an: 8 au: 2 ad: 3
;; QUESTIONS:
;; www.alias.nsec3.ingotronic.ch., type = A, class = IN
;; ANSWERS:
alias.nsec3.ingotronic.ch. 300 IN DNAME alias.ingotronic.ch.
alias.nsec3.ingotronic.ch. 300 IN RRSIG DNAME 7 4 300 20150125010458 20141226002309 62417 nsec3.ingotronic.ch. eYGi6EDpW/j20NoDaULrBkHTSTJhk45F8wsIRmGvmbdodQtvXH5Ax8kReCg3BxlkVnL+I4aQL4GrNFUU9F05JgIXHhDyW7ZixGVtj1rz2jCYHFYiQZC6RZSntnoUKdhcbgs/KI5ffIoFFMzrFfT8Aw6lUpBti0HRtnOdtepBHSc=
www.alias.nsec3.ingotronic.ch. 300 IN CNAME www.alias.ingotronic.ch.
alias.ingotronic.ch. 300 IN DNAME ingotronic.ch.
alias.ingotronic.ch. 300 IN RRSIG DNAME 5 3 300 20150125000532 20141225234703 17430 ingotronic.ch. GzAO4/bVZ3twjJhR1z1uujUYNI35rtGJi3jlDY6kbwQcaZeiu8WSeln5L90FijEVFVsXsv5rVvOZXAiXk5FP5jZgGg/A6H1iN8nNsVNSzc8XNWBd+Wv4+x0aQKZvcAD++Pcn3EW3nCEcHNdvnqVsjXbtdTJOiPYrvm/iC3QduCI=
www.alias.ingotronic.ch. 300 IN CNAME www.ingotronic.ch.
www.ingotronic.ch. 300 IN A 127.0.0.1
www.ingotronic.ch. 300 IN RRSIG A 5 3 300 20150125012443 20141226010256 17430 ingotronic.ch. hkD2bkHZKHoJX8cg69j6l1JXE7iYlVFc0iMo3/3hcq4TqieiT2El/9DLfMSxa7XyB/HRDG5Ul61E56pwlCDdxkwemtAuTzjCpqAtvQ5l5OEtTM4i6nijKBkRRzHjh99qDI1jh9GFv3jkTk5m7iaMQemUB4VTjKGLcZHXvWmQLbg=
;; AUTHORITY RECORDS:
ingotronic.ch. 300 IN NS ns1.ingotronic.ch.
ingotronic.ch. 300 IN RRSIG NS 5 2 300 20150125000532 20141225234703 17430 ingotronic.ch. VuzVJM3McSHlcdngCG/G23zCikq8tXE0CZV2ZSgUFXXFMIEoM6PMi1QRQ/8VF3tee4WGpRx2jhtkui0wFRFfwIhW7G1uPDT4qogaR3KLIyuCEsMxhRH3WJZNrLmLqlSBGvd9OBJwbmryqm3Zzqvrk+E+rh8OJeifnBBpHAX4eHg=
;; ADDITIONAL RECORDS:
ns1.ingotronic.ch. 300 IN A 62.192.5.131
ns1.ingotronic.ch. 300 IN RRSIG A 5 3 300 20150125005754 20141226001054 17430 ingotronic.ch. fNG1RZM53pXwBxruHNaSZszxVzNLoCq8VZsTjAzYH2vSLzHXYVGJFTLIeY0K9APAdyJU8WuwmABmn7XY0Kg39kRG77uoFlqUws2PdTz2QKOwJGZY7W88Ak2Y9lkDBcK8o3wJHVptrT8R7p/1U7UfjF0kqPUkakk2B0EbFWdagFg=
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 1075 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 59638
;; flags: qr rd ra ad cd ; qd: 1 an: 4 au: 0 ad: 1
;; QUESTIONS:
;; ., type = DNSKEY, class = IN
;; ANSWERS:
. 87355 IN DNSKEY 256 3 8 AwEAAaPD7Y7XIi1MOEREJNTrRhyqsY3gff6JWzg+XCbqut1sbcbvqyssHw8DT1AkRaAC92pO8xuyq5QEgEPL1IHfABLwpwXI5gTj4gdwi86bpkmlWs9fRpnn4DPDCTdrnxIejJXgClHikLJF3u3CdpNCMijq4CKdQbMlRZ3avv+G7rh7
. 87355 IN DNSKEY 257 3 8 AwEAAagAIKlVZrpC6Ia7gEzahOR+9W29euxhJhVVLOyQbSEW0O8gcCjFFVQUTf6v58fLjwBd0YI0EzrAcQqBGCzh/RStIoO8g0NfnfL2MTJRkxoXbfDaUeVPQuYEhg37NZWAJQ9VnMVDxP/VHL496M/QZxkjf5/Efucp2gaDX6RS6CXpoY68LsvPVjR0ZSwzz1apAzvN9dlzEheX7ICJBBtuA6G3LQpzW5hOA2hzCTMjJPJ8LbqF6dsV6DoBQzgul0sGIcGOYl7OyQdXfZ57relSQageu+ipAdTTJ25AsRTAoub8ONGcLmqrAmRLKBP1dfwhYB4N7knNnulqQxA+Uk1ihz0=
. 87355 IN DNSKEY 256 3 8 AwEAAe3fSrbLBy3LOS7pnxEUhvPZTE2H5dIGsI/UfruI/nOEvWWa/PSX2BFedBkEqOlYdjdNF2f+6lmfk2Od/xu0v5bVqxFE+/24v3hZSlWBxvXzPTAGHrbW/IJYEPqlzVOAS4XdUgHg0N7IbLywNHMvB+Yf+Nm6ctyXXFLV4WTNnzs7
. 87355 IN RRSIG DNSKEY 8 0 172800 20150115235959 20150101000000 19036 . i8cAxD2pvQi1oAyvQxRpDfFlbqPzW+69QQEsDwE1eWOm5AtawO9U7lmsGps7sy/fVNvl1ljKBj4Djp9pb3U2FLogjiIlW0cDAkPmLlG9t+b/pjEfBNlhjANUVN06pvQVAfm+LcF26EaWT6FlISBqb6jSy4BHRa3Bdc4Sx7+pRSYSqVVvYxLkfAWsKPqGkvWhebJDndJJV9syXQXgZ+v/uJ+6XOS43xkAdeL8iBzIs/FlwMTfh3tVe3d0lb65IBBLlCzeQuetX+0Vu1YFcnD0mHc/wS2ZnAV5toAFmyVQBoY/XAZiZeaOkcROJ6Zmqezy7liwK7BqsYyAZntMhk8lbg==
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 883 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 1139
;; flags: qr rd ra ad cd ; qd: 1 an: 2 au: 0 ad: 1
;; QUESTIONS:
;; ch., type = DS, class = IN
;; ANSWERS:
ch. 955 IN DS 46375 8 2 8F96646FC68BB7E4AF4C0750A6096FBC0D4ECDA3D3FA6DA06FDDB42EE50C6CF3
ch. 955 IN RRSIG DS 8 1 86400 20150112170000 20150105160000 16665 . thY7xYWBBxiBjqbQIb9fAG4TmQgnziwM7q6P1T3/ITxmECdvOCQnnZA3uD7qmN8uM0HudsD7+y+zgD3rsH4RSTKdL4kHSI0OnCxToMTvklghEgFDezqIRm8NkWdI2H4Stwrj20nYKSpLQxPI2EE54gs18P3KyO8bAUYv8Qx73xU=
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 238 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 28751
;; flags: qr rd ra ad cd ; qd: 1 an: 4 au: 0 ad: 1
;; QUESTIONS:
;; ch., type = DNSKEY, class = IN
;; ANSWERS:
ch. 956 IN DNSKEY 257 3 8 AwEAAb7GhhZ8IAy/AhwmSms5DeQK5ad09wIIplEpYoiAIYXPtJvT1ReFzyfTp/2YP+g/PWDwHPh4qKAHa9x0VgbIQcGAeNakmfkAdWEmCnca323/SAml3mwfaX62G7/uYWae5zh8QTxZKNd+K1yZ5x0IxnI31chSl5xymRbTEHYZDKwSIRFM3fTxUMt93WFaBVWELReYotJBr++rvAWdnlay5TPBTvheLBkaiqtgM4GP8HK07Y+86lsZnEsj5K3G1KTV5SPpa82rqYAwxG9VKbmSE/6/kBR5jJHjt1rRt5Oe7v18aEtw0YCEN4vxq+KuvMoNVqXUsE9LBwHJD+QNwi6wmB0=
ch. 956 IN DNSKEY 256 3 8 AwEAAcsg0kY6fw1wzYMhSAKTy+Y2JzAst66P/1odp9NECJJHbU8f4nwziI3onoFSBV0ZiSZhY1aH5dhdDZ7BkrqhVXSrZPAz0CvzjIxmB1gSOf9DeZvjQvoy97HqYolxsf+B3QQv2RKBT67elF5+JisKg3/dQISelKn8LhabSoVrMlD1
ch. 956 IN DNSKEY 256 3 8 AwEAAcSLdT0fEmcFmLpeUkAJoeVaHKiu+nbuc43fWlqaCRVf8t2HA4uWxOk0O5ci9nrFTc8nq8oa5fk5Cj7CHh4yrX9qUCfTdIWTyp8BDEdJpS+Dyb0u9wQuVj+nQMj4fLzdQf4TJs3/qxuiLr3nL1UUwlhhXeqSqGVb7p3mtB5HJ8ad
ch. 956 IN RRSIG DNSKEY 8 1 86400 20150127100909 20141212090909 46375 ch. bT8q0FWyeMH0SulNo6UdIIgZYNATwYsee2bikq2Gh339Bufma8eaqWIPYT3XKmxYPBFOw0bVl+kLZxTwbR1CFoCDXoP+qgQhh4mf9qkNiv2CDSc+0FE3FRREn+DAhYTUEuB58FPiPakFB8s8O7T+k2qhDae7jy4/y7Jl1lnjaBY8s7bzOUPhF0KKCNZmvoKwtL23ZdVeTSV1xM3jkiNnpzBKbcoSWECSGJVp1SE0BnRXdwQP41YTXFZ0310YjaTAUCC5qbMIWdEkHjfdSQtKBImnc85mkapq9w++XQ4zhauPWBtrPV3CcoCahjUaWdjrKVkibomlJZaN8MEO23CfQw==
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 893 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 45226
;; flags: qr rd ra cd ; qd: 1 an: 3 au: 0 ad: 1
;; QUESTIONS:
;; ingotronic.ch., type = DS, class = IN
;; ANSWERS:
ingotronic.ch. 3564 IN DS 6031 5 1 733D0218B571CD617B1A7493564B9FC4F12ADE82
ingotronic.ch. 3564 IN DS 6031 5 2 4A948F2FDADA24686E473EDAC00DCF972584C75E3FAA92C2021B6221449FF87E
ingotronic.ch. 3564 IN RRSIG DS 8 2 3600 20150129033614 20150105123019 60789 ch. rVPJP2HhzW7OkroK2axFj5Lb4iVWCH8Fp/Iq1rF952NDo72b8RiKje2RaAKJAGQ+wd0YgE+PAej04GCmkhlDJA/zvPeeTxuhy3HbJzReMlQ7fjyH+wW1hli+FuIYvogXWf7nO/9VyPORt8X/f/pjrOr3Vlj9sGLN8TGYpEuVSw4=
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 288 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 40277
;; flags: qr aa rd ra cd ; qd: 1 an: 4 au: 0 ad: 1
;; QUESTIONS:
;; ingotronic.ch., type = DNSKEY, class = IN
;; ANSWERS:
ingotronic.ch. 300 IN DNSKEY 257 3 5 AwEAAeA1vzmjaB+eBAcvhzpKEgAEFpvQ1rg4uKDW6MsQtacKoqBpgyep2+LuWotz5p/xYxj3NGsArwN8Ad5cY0FHRr8miTT0elOv6nvlqGIfRuhj/BXAQ1x4ihpSFslHw0lJMYFwxsUZWpUyjWX/nv1xRZMMwF46gui0N4OEbyTYusCk77D+A71k+K0EAitFIbIH4GCUKmH1H7HmXhSVH9bN/n7KEGwW32lmsuuUcJoRKDkcUvbMXY/9Xoa2quERrUg/rBbDUHowRPjYDS5GzY1+f4YY8s40BufGiqyUTKKXL953MVFK8gmezXA0hbmrnZ7CBOw/7238mORAdzExaX8n7CE=
ingotronic.ch. 300 IN DNSKEY 256 3 5 AwEAAZ2Xh77GFzpEDx7EHYxShqltHgkiG+BOjBGifEmnJhQSdE5/yNSLFNcdhZZ8HUPxYnaedTqJcFFg4AzUsQklF/fECegTJdZjaj2WoL0/I8K7HMfY/hVuRZUWPNglYi8agJRX6gdkFTCpUNI7stpgKqxtzUJhhw15uG/lKMplwqUr
ingotronic.ch. 300 IN RRSIG DNSKEY 5 2 300 20150125003700 20141226001657 6031 ingotronic.ch. rs1QlP2SlSpA2ELbzwg3DgWLzXWL3Lpv6CUJE2Q0qH2Zp7Qdy3cD+ZEtNh9v24Qv1M6JJ3zFt8mmZoCeW2ycuMbJCqBkW9CBuwF+VznZvZY2MxwPipvhvEEGP//0M8YAZJ66yQPDv3PTdAP8FYbIrJyvY44vwyncwbslpfHT9jAsrbfr3vuMuWps86dnP462q+0s1TxBfqi8mzo3gdavjHKWVNwohLahLKT+tWeu6DSzQv0YwMjwtkLgF7QRgx3ctIIkloOrnx9nHH1N6y+hxEB89fOlyVDjHhgL5uVtsD5fEdT0FJ2Gc/2nShEMMqIwr1/J9kUq1mNySff/uEe65Q==
ingotronic.ch. 300 IN RRSIG DNSKEY 5 2 300 20150125003700 20141226001657 17430 ingotronic.ch. mEwZjhQqeWksWD0TCnNBrtce4YkWJL3edqL6PvAUu8Fn+Ih437kEs3+pqdkgRsdYQ9HW+lBm/8pWwJlNAv0bi9NykItXMwAUFtncgq+6Pnh3iAM972GXSa5VV4LcGQ5b8CBdHCHiEKDqyPv5Hr5QfYL/FQaWlcNRh4QZZlZNPFA=
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 940 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 48824
;; flags: qr aa rd ra cd ; qd: 1 an: 3 au: 0 ad: 1
;; QUESTIONS:
;; nsec3.ingotronic.ch., type = DS, class = IN
;; ANSWERS:
nsec3.ingotronic.ch. 300 IN DS 16758 7 2 3C8DC02750A1636F829B45D6E6D642866768A9CD40A013AD9D25AB63734FFA13
nsec3.ingotronic.ch. 300 IN DS 16758 7 1 1720FF268E09A2CB63805EC8782D10AAD20E12A5
nsec3.ingotronic.ch. 300 IN RRSIG DS 5 3 300 20150125011134 20141226002644 17430 ingotronic.ch. hNurzlGhlyHbSgezPDuhIrtN9ZMsMXZbKGc7HD5rUuM88wD3fM97NxdzF+2Hi1USvBZ5GsQv63L+lAzf+mFPBoPIFHtTiAv8up7kQKRKmi/EzzkCYd/CC4UYdDZbaUyv7esh7spSOGwjPJNdK831p+MgltoWaYtnSGVMgOKk5mc=
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 305 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 39526
;; flags: qr aa rd ra cd ; qd: 1 an: 4 au: 0 ad: 1
;; QUESTIONS:
;; nsec3.ingotronic.ch., type = DNSKEY, class = IN
;; ANSWERS:
nsec3.ingotronic.ch. 300 IN DNSKEY 257 3 7 AwEAAaBuJTf9oGyeTH3biUkAFLrsYrkodX1H7Snsui4XsDHFCBvs5XYacHbs0Jg0/O51KPjmNnjwMW8SSyDkKqYQ+9uYAf2EQ/pnD/VGQqnV2cw0Vwk/t0E2V4FUCju4pnAoyzZFZXGs1eWbX9JXu++b0Azp+ACq6485qJLzHhWDiIrPoK/SvdbFVRK4s+nPPJLH3NGBbtdz6kPq7aFWYBMoGeAZdN1wsQpcNWUo5eOmaJY53nMc7+rDpAyYlMe/FKwSZdX2ZDd63Qsa6Im4FVUJq/nWLq7tlQ/mWks15uDTQyJy/OWfA0ICCO4N9Fel9rThJNpJWEzOCblvZyBoy405kZk=
nsec3.ingotronic.ch. 300 IN DNSKEY 256 3 7 AwEAAccAWxkTVGZ6UAp0VEozAlYpARhbh6Y6tYOl6Fg3UeBNFFtDQ9fTEEt1NkbnR9u8KkpVN6a67avlYiUN1egDqEwzDU7R1Rw+/USdhm2hqOARmmu3DBgjjX/iXjZLyv310cOGFJZ/smcodlDL4pDAAoPxh/qs6KEBaT0sc1KWcGq3
nsec3.ingotronic.ch. 300 IN RRSIG DNSKEY 7 3 300 20150125001457 20141226000444 16758 nsec3.ingotronic.ch. mXi1ylDi8XkRPup+YlT8GPdYE+P7gb6+/VdAwtodI916IzrkGkOHOTLbnrbAqqJOh0HxVCYXdxovmEcbJKUFKwplrQg3XD7/9Sq4pKU1MhMFEGrm/QPkM4u0mgjQwyToDLGuPHuFyur3FSjO/n54uGhAEft9JOFk/WKtWdCnm2LLyQrpC6herA3efFaI8kZhdoEY02AwihWVJxHasmz7lOoKRgNrkfELU+fN4+V7ISsRfJMyZc6q5PuNeG6vFD0uNE8tpdLJCSMurKYVpelvYqzFIcRTYcIjXwmS+L3DGjupqWMzFZVmpQM62JG3KCCD0ffpnNb0nWoSoHwpSeh/3Q==
nsec3.ingotronic.ch. 300 IN RRSIG DNSKEY 7 3 300 20150125001457 20141226000444 62417 nsec3.ingotronic.ch. PyCrf8T5dAfJzapb1p+kcTALPjDuD2niSaXXo0KeHAunT+6gJicLML2S/ZpiYr7X7Ma4Z0TYqE02qH6pcLYNnSgv9BE8sZO0nRtPekSyTy5nLi4hFADYhjb3UjaB85qmQZcqm64vC/CJhWO4t6Eixg/5MYALw+Qdy5Fo0qy/U5E=
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 958 bytes
###############################################
testDNameDirectQueryIsValid 0000664 0000000 0000000 00000017032 13020541473 0034362 0 ustar 00root root 0000000 0000000 dnssecjava-1.1.3/src/test/resources/recordings/org_jitsi_dnssec_TestDNames #Date: 2015-01-06T22:35:18+01:00
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 46984
;; flags: qr aa rd ra cd ; qd: 1 an: 2 au: 2 ad: 3
;; QUESTIONS:
;; alias.ingotronic.ch., type = DNAME, class = IN
;; ANSWERS:
alias.ingotronic.ch. 300 IN DNAME ingotronic.ch.
alias.ingotronic.ch. 300 IN RRSIG DNAME 5 3 300 20150125000532 20141225234703 17430 ingotronic.ch. GzAO4/bVZ3twjJhR1z1uujUYNI35rtGJi3jlDY6kbwQcaZeiu8WSeln5L90FijEVFVsXsv5rVvOZXAiXk5FP5jZgGg/A6H1iN8nNsVNSzc8XNWBd+Wv4+x0aQKZvcAD++Pcn3EW3nCEcHNdvnqVsjXbtdTJOiPYrvm/iC3QduCI=
;; AUTHORITY RECORDS:
ingotronic.ch. 300 IN NS ns1.ingotronic.ch.
ingotronic.ch. 300 IN RRSIG NS 5 2 300 20150125000532 20141225234703 17430 ingotronic.ch. VuzVJM3McSHlcdngCG/G23zCikq8tXE0CZV2ZSgUFXXFMIEoM6PMi1QRQ/8VF3tee4WGpRx2jhtkui0wFRFfwIhW7G1uPDT4qogaR3KLIyuCEsMxhRH3WJZNrLmLqlSBGvd9OBJwbmryqm3Zzqvrk+E+rh8OJeifnBBpHAX4eHg=
;; ADDITIONAL RECORDS:
ns1.ingotronic.ch. 300 IN A 62.192.5.131
ns1.ingotronic.ch. 300 IN RRSIG A 5 3 300 20150125005754 20141226001054 17430 ingotronic.ch. fNG1RZM53pXwBxruHNaSZszxVzNLoCq8VZsTjAzYH2vSLzHXYVGJFTLIeY0K9APAdyJU8WuwmABmn7XY0Kg39kRG77uoFlqUws2PdTz2QKOwJGZY7W88Ak2Y9lkDBcK8o3wJHVptrT8R7p/1U7UfjF0kqPUkakk2B0EbFWdagFg=
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 628 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 36002
;; flags: qr rd ra ad cd ; qd: 1 an: 4 au: 0 ad: 1
;; QUESTIONS:
;; ., type = DNSKEY, class = IN
;; ANSWERS:
. 87355 IN DNSKEY 256 3 8 AwEAAe3fSrbLBy3LOS7pnxEUhvPZTE2H5dIGsI/UfruI/nOEvWWa/PSX2BFedBkEqOlYdjdNF2f+6lmfk2Od/xu0v5bVqxFE+/24v3hZSlWBxvXzPTAGHrbW/IJYEPqlzVOAS4XdUgHg0N7IbLywNHMvB+Yf+Nm6ctyXXFLV4WTNnzs7
. 87355 IN DNSKEY 256 3 8 AwEAAaPD7Y7XIi1MOEREJNTrRhyqsY3gff6JWzg+XCbqut1sbcbvqyssHw8DT1AkRaAC92pO8xuyq5QEgEPL1IHfABLwpwXI5gTj4gdwi86bpkmlWs9fRpnn4DPDCTdrnxIejJXgClHikLJF3u3CdpNCMijq4CKdQbMlRZ3avv+G7rh7
. 87355 IN DNSKEY 257 3 8 AwEAAagAIKlVZrpC6Ia7gEzahOR+9W29euxhJhVVLOyQbSEW0O8gcCjFFVQUTf6v58fLjwBd0YI0EzrAcQqBGCzh/RStIoO8g0NfnfL2MTJRkxoXbfDaUeVPQuYEhg37NZWAJQ9VnMVDxP/VHL496M/QZxkjf5/Efucp2gaDX6RS6CXpoY68LsvPVjR0ZSwzz1apAzvN9dlzEheX7ICJBBtuA6G3LQpzW5hOA2hzCTMjJPJ8LbqF6dsV6DoBQzgul0sGIcGOYl7OyQdXfZ57relSQageu+ipAdTTJ25AsRTAoub8ONGcLmqrAmRLKBP1dfwhYB4N7knNnulqQxA+Uk1ihz0=
. 87355 IN RRSIG DNSKEY 8 0 172800 20150115235959 20150101000000 19036 . i8cAxD2pvQi1oAyvQxRpDfFlbqPzW+69QQEsDwE1eWOm5AtawO9U7lmsGps7sy/fVNvl1ljKBj4Djp9pb3U2FLogjiIlW0cDAkPmLlG9t+b/pjEfBNlhjANUVN06pvQVAfm+LcF26EaWT6FlISBqb6jSy4BHRa3Bdc4Sx7+pRSYSqVVvYxLkfAWsKPqGkvWhebJDndJJV9syXQXgZ+v/uJ+6XOS43xkAdeL8iBzIs/FlwMTfh3tVe3d0lb65IBBLlCzeQuetX+0Vu1YFcnD0mHc/wS2ZnAV5toAFmyVQBoY/XAZiZeaOkcROJ6Zmqezy7liwK7BqsYyAZntMhk8lbg==
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 883 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 16893
;; flags: qr rd ra ad cd ; qd: 1 an: 2 au: 0 ad: 1
;; QUESTIONS:
;; ch., type = DS, class = IN
;; ANSWERS:
ch. 955 IN DS 46375 8 2 8F96646FC68BB7E4AF4C0750A6096FBC0D4ECDA3D3FA6DA06FDDB42EE50C6CF3
ch. 955 IN RRSIG DS 8 1 86400 20150112170000 20150105160000 16665 . thY7xYWBBxiBjqbQIb9fAG4TmQgnziwM7q6P1T3/ITxmECdvOCQnnZA3uD7qmN8uM0HudsD7+y+zgD3rsH4RSTKdL4kHSI0OnCxToMTvklghEgFDezqIRm8NkWdI2H4Stwrj20nYKSpLQxPI2EE54gs18P3KyO8bAUYv8Qx73xU=
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 238 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 52063
;; flags: qr rd ra ad cd ; qd: 1 an: 4 au: 0 ad: 1
;; QUESTIONS:
;; ch., type = DNSKEY, class = IN
;; ANSWERS:
ch. 956 IN DNSKEY 256 3 8 AwEAAcSLdT0fEmcFmLpeUkAJoeVaHKiu+nbuc43fWlqaCRVf8t2HA4uWxOk0O5ci9nrFTc8nq8oa5fk5Cj7CHh4yrX9qUCfTdIWTyp8BDEdJpS+Dyb0u9wQuVj+nQMj4fLzdQf4TJs3/qxuiLr3nL1UUwlhhXeqSqGVb7p3mtB5HJ8ad
ch. 956 IN DNSKEY 256 3 8 AwEAAcsg0kY6fw1wzYMhSAKTy+Y2JzAst66P/1odp9NECJJHbU8f4nwziI3onoFSBV0ZiSZhY1aH5dhdDZ7BkrqhVXSrZPAz0CvzjIxmB1gSOf9DeZvjQvoy97HqYolxsf+B3QQv2RKBT67elF5+JisKg3/dQISelKn8LhabSoVrMlD1
ch. 956 IN DNSKEY 257 3 8 AwEAAb7GhhZ8IAy/AhwmSms5DeQK5ad09wIIplEpYoiAIYXPtJvT1ReFzyfTp/2YP+g/PWDwHPh4qKAHa9x0VgbIQcGAeNakmfkAdWEmCnca323/SAml3mwfaX62G7/uYWae5zh8QTxZKNd+K1yZ5x0IxnI31chSl5xymRbTEHYZDKwSIRFM3fTxUMt93WFaBVWELReYotJBr++rvAWdnlay5TPBTvheLBkaiqtgM4GP8HK07Y+86lsZnEsj5K3G1KTV5SPpa82rqYAwxG9VKbmSE/6/kBR5jJHjt1rRt5Oe7v18aEtw0YCEN4vxq+KuvMoNVqXUsE9LBwHJD+QNwi6wmB0=
ch. 956 IN RRSIG DNSKEY 8 1 86400 20150127100909 20141212090909 46375 ch. bT8q0FWyeMH0SulNo6UdIIgZYNATwYsee2bikq2Gh339Bufma8eaqWIPYT3XKmxYPBFOw0bVl+kLZxTwbR1CFoCDXoP+qgQhh4mf9qkNiv2CDSc+0FE3FRREn+DAhYTUEuB58FPiPakFB8s8O7T+k2qhDae7jy4/y7Jl1lnjaBY8s7bzOUPhF0KKCNZmvoKwtL23ZdVeTSV1xM3jkiNnpzBKbcoSWECSGJVp1SE0BnRXdwQP41YTXFZ0310YjaTAUCC5qbMIWdEkHjfdSQtKBImnc85mkapq9w++XQ4zhauPWBtrPV3CcoCahjUaWdjrKVkibomlJZaN8MEO23CfQw==
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 893 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 54102
;; flags: qr rd ra cd ; qd: 1 an: 3 au: 0 ad: 1
;; QUESTIONS:
;; ingotronic.ch., type = DS, class = IN
;; ANSWERS:
ingotronic.ch. 3564 IN DS 6031 5 1 733D0218B571CD617B1A7493564B9FC4F12ADE82
ingotronic.ch. 3564 IN DS 6031 5 2 4A948F2FDADA24686E473EDAC00DCF972584C75E3FAA92C2021B6221449FF87E
ingotronic.ch. 3564 IN RRSIG DS 8 2 3600 20150129033614 20150105123019 60789 ch. rVPJP2HhzW7OkroK2axFj5Lb4iVWCH8Fp/Iq1rF952NDo72b8RiKje2RaAKJAGQ+wd0YgE+PAej04GCmkhlDJA/zvPeeTxuhy3HbJzReMlQ7fjyH+wW1hli+FuIYvogXWf7nO/9VyPORt8X/f/pjrOr3Vlj9sGLN8TGYpEuVSw4=
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 288 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 52299
;; flags: qr aa rd ra cd ; qd: 1 an: 4 au: 0 ad: 1
;; QUESTIONS:
;; ingotronic.ch., type = DNSKEY, class = IN
;; ANSWERS:
ingotronic.ch. 300 IN DNSKEY 256 3 5 AwEAAZ2Xh77GFzpEDx7EHYxShqltHgkiG+BOjBGifEmnJhQSdE5/yNSLFNcdhZZ8HUPxYnaedTqJcFFg4AzUsQklF/fECegTJdZjaj2WoL0/I8K7HMfY/hVuRZUWPNglYi8agJRX6gdkFTCpUNI7stpgKqxtzUJhhw15uG/lKMplwqUr
ingotronic.ch. 300 IN DNSKEY 257 3 5 AwEAAeA1vzmjaB+eBAcvhzpKEgAEFpvQ1rg4uKDW6MsQtacKoqBpgyep2+LuWotz5p/xYxj3NGsArwN8Ad5cY0FHRr8miTT0elOv6nvlqGIfRuhj/BXAQ1x4ihpSFslHw0lJMYFwxsUZWpUyjWX/nv1xRZMMwF46gui0N4OEbyTYusCk77D+A71k+K0EAitFIbIH4GCUKmH1H7HmXhSVH9bN/n7KEGwW32lmsuuUcJoRKDkcUvbMXY/9Xoa2quERrUg/rBbDUHowRPjYDS5GzY1+f4YY8s40BufGiqyUTKKXL953MVFK8gmezXA0hbmrnZ7CBOw/7238mORAdzExaX8n7CE=
ingotronic.ch. 300 IN RRSIG DNSKEY 5 2 300 20150125003700 20141226001657 6031 ingotronic.ch. rs1QlP2SlSpA2ELbzwg3DgWLzXWL3Lpv6CUJE2Q0qH2Zp7Qdy3cD+ZEtNh9v24Qv1M6JJ3zFt8mmZoCeW2ycuMbJCqBkW9CBuwF+VznZvZY2MxwPipvhvEEGP//0M8YAZJ66yQPDv3PTdAP8FYbIrJyvY44vwyncwbslpfHT9jAsrbfr3vuMuWps86dnP462q+0s1TxBfqi8mzo3gdavjHKWVNwohLahLKT+tWeu6DSzQv0YwMjwtkLgF7QRgx3ctIIkloOrnx9nHH1N6y+hxEB89fOlyVDjHhgL5uVtsD5fEdT0FJ2Gc/2nShEMMqIwr1/J9kUq1mNySff/uEe65Q==
ingotronic.ch. 300 IN RRSIG DNSKEY 5 2 300 20150125003700 20141226001657 17430 ingotronic.ch. mEwZjhQqeWksWD0TCnNBrtce4YkWJL3edqL6PvAUu8Fn+Ih437kEs3+pqdkgRsdYQ9HW+lBm/8pWwJlNAv0bi9NykItXMwAUFtncgq+6Pnh3iAM972GXSa5VV4LcGQ5b8CBdHCHiEKDqyPv5Hr5QfYL/FQaWlcNRh4QZZlZNPFA=
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 940 bytes
###############################################
testDNameInNsecIsUnderstood_Rfc6672_5_3_4_1 0000664 0000000 0000000 00000032767 13020541473 0036634 0 ustar 00root root 0000000 0000000 dnssecjava-1.1.3/src/test/resources/recordings/org_jitsi_dnssec_TestDNames #Date: 2015-01-06T22:35:17+01:00
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 54975
;; flags: qr aa rd ra cd ; qd: 1 an: 0 au: 4 ad: 1
;; QUESTIONS:
;; alias.ingotronic.ch., type = NS, class = IN
;; ANSWERS:
;; AUTHORITY RECORDS:
ingotronic.ch. 300 IN SOA ns1.ingotronic.ch. admin.ingotronic.ch. 2013032762 300 60 864000 300
ingotronic.ch. 300 IN RRSIG SOA 5 2 300 20150125021244 20141226011244 17430 ingotronic.ch. WDLpp9G0P/rlMBfpFn9sAfpEFoBnQfwyGSXbGCc/LG1FSkJoKLDQYDY696scLNsJgkrzZeJrl0oSSvA8AvRUhYRrmuqWMxTVFgYlRwPwqEMCKUqiVhKGVF4NYemoBiUQC4nJwBZd57xKCiF4AQ4CodBtiZxefJFAlTNE0g2yxtM=
alias.ingotronic.ch. 300 IN NSEC a.b.ingotronic.ch. DNAME RRSIG NSEC
alias.ingotronic.ch. 300 IN RRSIG NSEC 5 3 300 20150125000532 20141225234703 17430 ingotronic.ch. mS+nh5skTxhOBdJlkwSGdrmhuA5FC9Am9emIhyIViET/1BoKotmbzLtfaBXAh2gRhcfDr+4OJJ6oyUcdMn/m4YG8NUsf4rAL92/YyxocUoF/oS8ZZv/BPXplCH5J4hsac+heElbPJ29v0kFVujErTaX/Ev0lYsUNI+9OmCrlQpk=
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 479 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 63210
;; flags: qr rd ra ad cd ; qd: 1 an: 4 au: 0 ad: 1
;; QUESTIONS:
;; ., type = DNSKEY, class = IN
;; ANSWERS:
. 87356 IN DNSKEY 256 3 8 AwEAAaPD7Y7XIi1MOEREJNTrRhyqsY3gff6JWzg+XCbqut1sbcbvqyssHw8DT1AkRaAC92pO8xuyq5QEgEPL1IHfABLwpwXI5gTj4gdwi86bpkmlWs9fRpnn4DPDCTdrnxIejJXgClHikLJF3u3CdpNCMijq4CKdQbMlRZ3avv+G7rh7
. 87356 IN DNSKEY 257 3 8 AwEAAagAIKlVZrpC6Ia7gEzahOR+9W29euxhJhVVLOyQbSEW0O8gcCjFFVQUTf6v58fLjwBd0YI0EzrAcQqBGCzh/RStIoO8g0NfnfL2MTJRkxoXbfDaUeVPQuYEhg37NZWAJQ9VnMVDxP/VHL496M/QZxkjf5/Efucp2gaDX6RS6CXpoY68LsvPVjR0ZSwzz1apAzvN9dlzEheX7ICJBBtuA6G3LQpzW5hOA2hzCTMjJPJ8LbqF6dsV6DoBQzgul0sGIcGOYl7OyQdXfZ57relSQageu+ipAdTTJ25AsRTAoub8ONGcLmqrAmRLKBP1dfwhYB4N7knNnulqQxA+Uk1ihz0=
. 87356 IN DNSKEY 256 3 8 AwEAAe3fSrbLBy3LOS7pnxEUhvPZTE2H5dIGsI/UfruI/nOEvWWa/PSX2BFedBkEqOlYdjdNF2f+6lmfk2Od/xu0v5bVqxFE+/24v3hZSlWBxvXzPTAGHrbW/IJYEPqlzVOAS4XdUgHg0N7IbLywNHMvB+Yf+Nm6ctyXXFLV4WTNnzs7
. 87356 IN RRSIG DNSKEY 8 0 172800 20150115235959 20150101000000 19036 . i8cAxD2pvQi1oAyvQxRpDfFlbqPzW+69QQEsDwE1eWOm5AtawO9U7lmsGps7sy/fVNvl1ljKBj4Djp9pb3U2FLogjiIlW0cDAkPmLlG9t+b/pjEfBNlhjANUVN06pvQVAfm+LcF26EaWT6FlISBqb6jSy4BHRa3Bdc4Sx7+pRSYSqVVvYxLkfAWsKPqGkvWhebJDndJJV9syXQXgZ+v/uJ+6XOS43xkAdeL8iBzIs/FlwMTfh3tVe3d0lb65IBBLlCzeQuetX+0Vu1YFcnD0mHc/wS2ZnAV5toAFmyVQBoY/XAZiZeaOkcROJ6Zmqezy7liwK7BqsYyAZntMhk8lbg==
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 883 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 43121
;; flags: qr rd ra ad cd ; qd: 1 an: 2 au: 0 ad: 1
;; QUESTIONS:
;; ch., type = DS, class = IN
;; ANSWERS:
ch. 956 IN DS 46375 8 2 8F96646FC68BB7E4AF4C0750A6096FBC0D4ECDA3D3FA6DA06FDDB42EE50C6CF3
ch. 956 IN RRSIG DS 8 1 86400 20150112170000 20150105160000 16665 . thY7xYWBBxiBjqbQIb9fAG4TmQgnziwM7q6P1T3/ITxmECdvOCQnnZA3uD7qmN8uM0HudsD7+y+zgD3rsH4RSTKdL4kHSI0OnCxToMTvklghEgFDezqIRm8NkWdI2H4Stwrj20nYKSpLQxPI2EE54gs18P3KyO8bAUYv8Qx73xU=
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 238 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 13758
;; flags: qr rd ra ad cd ; qd: 1 an: 4 au: 0 ad: 1
;; QUESTIONS:
;; ch., type = DNSKEY, class = IN
;; ANSWERS:
ch. 957 IN DNSKEY 257 3 8 AwEAAb7GhhZ8IAy/AhwmSms5DeQK5ad09wIIplEpYoiAIYXPtJvT1ReFzyfTp/2YP+g/PWDwHPh4qKAHa9x0VgbIQcGAeNakmfkAdWEmCnca323/SAml3mwfaX62G7/uYWae5zh8QTxZKNd+K1yZ5x0IxnI31chSl5xymRbTEHYZDKwSIRFM3fTxUMt93WFaBVWELReYotJBr++rvAWdnlay5TPBTvheLBkaiqtgM4GP8HK07Y+86lsZnEsj5K3G1KTV5SPpa82rqYAwxG9VKbmSE/6/kBR5jJHjt1rRt5Oe7v18aEtw0YCEN4vxq+KuvMoNVqXUsE9LBwHJD+QNwi6wmB0=
ch. 957 IN DNSKEY 256 3 8 AwEAAcsg0kY6fw1wzYMhSAKTy+Y2JzAst66P/1odp9NECJJHbU8f4nwziI3onoFSBV0ZiSZhY1aH5dhdDZ7BkrqhVXSrZPAz0CvzjIxmB1gSOf9DeZvjQvoy97HqYolxsf+B3QQv2RKBT67elF5+JisKg3/dQISelKn8LhabSoVrMlD1
ch. 957 IN DNSKEY 256 3 8 AwEAAcSLdT0fEmcFmLpeUkAJoeVaHKiu+nbuc43fWlqaCRVf8t2HA4uWxOk0O5ci9nrFTc8nq8oa5fk5Cj7CHh4yrX9qUCfTdIWTyp8BDEdJpS+Dyb0u9wQuVj+nQMj4fLzdQf4TJs3/qxuiLr3nL1UUwlhhXeqSqGVb7p3mtB5HJ8ad
ch. 957 IN RRSIG DNSKEY 8 1 86400 20150127100909 20141212090909 46375 ch. bT8q0FWyeMH0SulNo6UdIIgZYNATwYsee2bikq2Gh339Bufma8eaqWIPYT3XKmxYPBFOw0bVl+kLZxTwbR1CFoCDXoP+qgQhh4mf9qkNiv2CDSc+0FE3FRREn+DAhYTUEuB58FPiPakFB8s8O7T+k2qhDae7jy4/y7Jl1lnjaBY8s7bzOUPhF0KKCNZmvoKwtL23ZdVeTSV1xM3jkiNnpzBKbcoSWECSGJVp1SE0BnRXdwQP41YTXFZ0310YjaTAUCC5qbMIWdEkHjfdSQtKBImnc85mkapq9w++XQ4zhauPWBtrPV3CcoCahjUaWdjrKVkibomlJZaN8MEO23CfQw==
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 893 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 49588
;; flags: qr rd ra cd ; qd: 1 an: 3 au: 0 ad: 1
;; QUESTIONS:
;; ingotronic.ch., type = DS, class = IN
;; ANSWERS:
ingotronic.ch. 3565 IN DS 6031 5 2 4A948F2FDADA24686E473EDAC00DCF972584C75E3FAA92C2021B6221449FF87E
ingotronic.ch. 3565 IN DS 6031 5 1 733D0218B571CD617B1A7493564B9FC4F12ADE82
ingotronic.ch. 3565 IN RRSIG DS 8 2 3600 20150129033614 20150105123019 60789 ch. rVPJP2HhzW7OkroK2axFj5Lb4iVWCH8Fp/Iq1rF952NDo72b8RiKje2RaAKJAGQ+wd0YgE+PAej04GCmkhlDJA/zvPeeTxuhy3HbJzReMlQ7fjyH+wW1hli+FuIYvogXWf7nO/9VyPORt8X/f/pjrOr3Vlj9sGLN8TGYpEuVSw4=
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 288 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 2484
;; flags: qr aa rd ra cd ; qd: 1 an: 4 au: 0 ad: 1
;; QUESTIONS:
;; ingotronic.ch., type = DNSKEY, class = IN
;; ANSWERS:
ingotronic.ch. 300 IN DNSKEY 257 3 5 AwEAAeA1vzmjaB+eBAcvhzpKEgAEFpvQ1rg4uKDW6MsQtacKoqBpgyep2+LuWotz5p/xYxj3NGsArwN8Ad5cY0FHRr8miTT0elOv6nvlqGIfRuhj/BXAQ1x4ihpSFslHw0lJMYFwxsUZWpUyjWX/nv1xRZMMwF46gui0N4OEbyTYusCk77D+A71k+K0EAitFIbIH4GCUKmH1H7HmXhSVH9bN/n7KEGwW32lmsuuUcJoRKDkcUvbMXY/9Xoa2quERrUg/rBbDUHowRPjYDS5GzY1+f4YY8s40BufGiqyUTKKXL953MVFK8gmezXA0hbmrnZ7CBOw/7238mORAdzExaX8n7CE=
ingotronic.ch. 300 IN DNSKEY 256 3 5 AwEAAZ2Xh77GFzpEDx7EHYxShqltHgkiG+BOjBGifEmnJhQSdE5/yNSLFNcdhZZ8HUPxYnaedTqJcFFg4AzUsQklF/fECegTJdZjaj2WoL0/I8K7HMfY/hVuRZUWPNglYi8agJRX6gdkFTCpUNI7stpgKqxtzUJhhw15uG/lKMplwqUr
ingotronic.ch. 300 IN RRSIG DNSKEY 5 2 300 20150125003700 20141226001657 6031 ingotronic.ch. rs1QlP2SlSpA2ELbzwg3DgWLzXWL3Lpv6CUJE2Q0qH2Zp7Qdy3cD+ZEtNh9v24Qv1M6JJ3zFt8mmZoCeW2ycuMbJCqBkW9CBuwF+VznZvZY2MxwPipvhvEEGP//0M8YAZJ66yQPDv3PTdAP8FYbIrJyvY44vwyncwbslpfHT9jAsrbfr3vuMuWps86dnP462q+0s1TxBfqi8mzo3gdavjHKWVNwohLahLKT+tWeu6DSzQv0YwMjwtkLgF7QRgx3ctIIkloOrnx9nHH1N6y+hxEB89fOlyVDjHhgL5uVtsD5fEdT0FJ2Gc/2nShEMMqIwr1/J9kUq1mNySff/uEe65Q==
ingotronic.ch. 300 IN RRSIG DNSKEY 5 2 300 20150125003700 20141226001657 17430 ingotronic.ch. mEwZjhQqeWksWD0TCnNBrtce4YkWJL3edqL6PvAUu8Fn+Ih437kEs3+pqdkgRsdYQ9HW+lBm/8pWwJlNAv0bi9NykItXMwAUFtncgq+6Pnh3iAM972GXSa5VV4LcGQ5b8CBdHCHiEKDqyPv5Hr5QfYL/FQaWlcNRh4QZZlZNPFA=
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 940 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 34069
;; flags: qr rd ra ad cd ; qd: 1 an: 4 au: 0 ad: 1
;; QUESTIONS:
;; ., type = DNSKEY, class = IN
;; ANSWERS:
. 87356 IN DNSKEY 256 3 8 AwEAAe3fSrbLBy3LOS7pnxEUhvPZTE2H5dIGsI/UfruI/nOEvWWa/PSX2BFedBkEqOlYdjdNF2f+6lmfk2Od/xu0v5bVqxFE+/24v3hZSlWBxvXzPTAGHrbW/IJYEPqlzVOAS4XdUgHg0N7IbLywNHMvB+Yf+Nm6ctyXXFLV4WTNnzs7
. 87356 IN DNSKEY 257 3 8 AwEAAagAIKlVZrpC6Ia7gEzahOR+9W29euxhJhVVLOyQbSEW0O8gcCjFFVQUTf6v58fLjwBd0YI0EzrAcQqBGCzh/RStIoO8g0NfnfL2MTJRkxoXbfDaUeVPQuYEhg37NZWAJQ9VnMVDxP/VHL496M/QZxkjf5/Efucp2gaDX6RS6CXpoY68LsvPVjR0ZSwzz1apAzvN9dlzEheX7ICJBBtuA6G3LQpzW5hOA2hzCTMjJPJ8LbqF6dsV6DoBQzgul0sGIcGOYl7OyQdXfZ57relSQageu+ipAdTTJ25AsRTAoub8ONGcLmqrAmRLKBP1dfwhYB4N7knNnulqQxA+Uk1ihz0=
. 87356 IN DNSKEY 256 3 8 AwEAAaPD7Y7XIi1MOEREJNTrRhyqsY3gff6JWzg+XCbqut1sbcbvqyssHw8DT1AkRaAC92pO8xuyq5QEgEPL1IHfABLwpwXI5gTj4gdwi86bpkmlWs9fRpnn4DPDCTdrnxIejJXgClHikLJF3u3CdpNCMijq4CKdQbMlRZ3avv+G7rh7
. 87356 IN RRSIG DNSKEY 8 0 172800 20150115235959 20150101000000 19036 . i8cAxD2pvQi1oAyvQxRpDfFlbqPzW+69QQEsDwE1eWOm5AtawO9U7lmsGps7sy/fVNvl1ljKBj4Djp9pb3U2FLogjiIlW0cDAkPmLlG9t+b/pjEfBNlhjANUVN06pvQVAfm+LcF26EaWT6FlISBqb6jSy4BHRa3Bdc4Sx7+pRSYSqVVvYxLkfAWsKPqGkvWhebJDndJJV9syXQXgZ+v/uJ+6XOS43xkAdeL8iBzIs/FlwMTfh3tVe3d0lb65IBBLlCzeQuetX+0Vu1YFcnD0mHc/wS2ZnAV5toAFmyVQBoY/XAZiZeaOkcROJ6Zmqezy7liwK7BqsYyAZntMhk8lbg==
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 883 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 4828
;; flags: qr rd ra ad cd ; qd: 1 an: 2 au: 0 ad: 1
;; QUESTIONS:
;; ch., type = DS, class = IN
;; ANSWERS:
ch. 956 IN DS 46375 8 2 8F96646FC68BB7E4AF4C0750A6096FBC0D4ECDA3D3FA6DA06FDDB42EE50C6CF3
ch. 956 IN RRSIG DS 8 1 86400 20150112170000 20150105160000 16665 . thY7xYWBBxiBjqbQIb9fAG4TmQgnziwM7q6P1T3/ITxmECdvOCQnnZA3uD7qmN8uM0HudsD7+y+zgD3rsH4RSTKdL4kHSI0OnCxToMTvklghEgFDezqIRm8NkWdI2H4Stwrj20nYKSpLQxPI2EE54gs18P3KyO8bAUYv8Qx73xU=
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 238 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 61240
;; flags: qr rd ra ad cd ; qd: 1 an: 4 au: 0 ad: 1
;; QUESTIONS:
;; ch., type = DNSKEY, class = IN
;; ANSWERS:
ch. 957 IN DNSKEY 257 3 8 AwEAAb7GhhZ8IAy/AhwmSms5DeQK5ad09wIIplEpYoiAIYXPtJvT1ReFzyfTp/2YP+g/PWDwHPh4qKAHa9x0VgbIQcGAeNakmfkAdWEmCnca323/SAml3mwfaX62G7/uYWae5zh8QTxZKNd+K1yZ5x0IxnI31chSl5xymRbTEHYZDKwSIRFM3fTxUMt93WFaBVWELReYotJBr++rvAWdnlay5TPBTvheLBkaiqtgM4GP8HK07Y+86lsZnEsj5K3G1KTV5SPpa82rqYAwxG9VKbmSE/6/kBR5jJHjt1rRt5Oe7v18aEtw0YCEN4vxq+KuvMoNVqXUsE9LBwHJD+QNwi6wmB0=
ch. 957 IN DNSKEY 256 3 8 AwEAAcSLdT0fEmcFmLpeUkAJoeVaHKiu+nbuc43fWlqaCRVf8t2HA4uWxOk0O5ci9nrFTc8nq8oa5fk5Cj7CHh4yrX9qUCfTdIWTyp8BDEdJpS+Dyb0u9wQuVj+nQMj4fLzdQf4TJs3/qxuiLr3nL1UUwlhhXeqSqGVb7p3mtB5HJ8ad
ch. 957 IN DNSKEY 256 3 8 AwEAAcsg0kY6fw1wzYMhSAKTy+Y2JzAst66P/1odp9NECJJHbU8f4nwziI3onoFSBV0ZiSZhY1aH5dhdDZ7BkrqhVXSrZPAz0CvzjIxmB1gSOf9DeZvjQvoy97HqYolxsf+B3QQv2RKBT67elF5+JisKg3/dQISelKn8LhabSoVrMlD1
ch. 957 IN RRSIG DNSKEY 8 1 86400 20150127100909 20141212090909 46375 ch. bT8q0FWyeMH0SulNo6UdIIgZYNATwYsee2bikq2Gh339Bufma8eaqWIPYT3XKmxYPBFOw0bVl+kLZxTwbR1CFoCDXoP+qgQhh4mf9qkNiv2CDSc+0FE3FRREn+DAhYTUEuB58FPiPakFB8s8O7T+k2qhDae7jy4/y7Jl1lnjaBY8s7bzOUPhF0KKCNZmvoKwtL23ZdVeTSV1xM3jkiNnpzBKbcoSWECSGJVp1SE0BnRXdwQP41YTXFZ0310YjaTAUCC5qbMIWdEkHjfdSQtKBImnc85mkapq9w++XQ4zhauPWBtrPV3CcoCahjUaWdjrKVkibomlJZaN8MEO23CfQw==
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 893 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 11851
;; flags: qr rd ra cd ; qd: 1 an: 3 au: 0 ad: 1
;; QUESTIONS:
;; ingotronic.ch., type = DS, class = IN
;; ANSWERS:
ingotronic.ch. 3564 IN DS 6031 5 2 4A948F2FDADA24686E473EDAC00DCF972584C75E3FAA92C2021B6221449FF87E
ingotronic.ch. 3564 IN DS 6031 5 1 733D0218B571CD617B1A7493564B9FC4F12ADE82
ingotronic.ch. 3564 IN RRSIG DS 8 2 3600 20150129033614 20150105123019 60789 ch. rVPJP2HhzW7OkroK2axFj5Lb4iVWCH8Fp/Iq1rF952NDo72b8RiKje2RaAKJAGQ+wd0YgE+PAej04GCmkhlDJA/zvPeeTxuhy3HbJzReMlQ7fjyH+wW1hli+FuIYvogXWf7nO/9VyPORt8X/f/pjrOr3Vlj9sGLN8TGYpEuVSw4=
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 288 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 51177
;; flags: qr aa rd ra cd ; qd: 1 an: 4 au: 0 ad: 1
;; QUESTIONS:
;; ingotronic.ch., type = DNSKEY, class = IN
;; ANSWERS:
ingotronic.ch. 300 IN DNSKEY 257 3 5 AwEAAeA1vzmjaB+eBAcvhzpKEgAEFpvQ1rg4uKDW6MsQtacKoqBpgyep2+LuWotz5p/xYxj3NGsArwN8Ad5cY0FHRr8miTT0elOv6nvlqGIfRuhj/BXAQ1x4ihpSFslHw0lJMYFwxsUZWpUyjWX/nv1xRZMMwF46gui0N4OEbyTYusCk77D+A71k+K0EAitFIbIH4GCUKmH1H7HmXhSVH9bN/n7KEGwW32lmsuuUcJoRKDkcUvbMXY/9Xoa2quERrUg/rBbDUHowRPjYDS5GzY1+f4YY8s40BufGiqyUTKKXL953MVFK8gmezXA0hbmrnZ7CBOw/7238mORAdzExaX8n7CE=
ingotronic.ch. 300 IN DNSKEY 256 3 5 AwEAAZ2Xh77GFzpEDx7EHYxShqltHgkiG+BOjBGifEmnJhQSdE5/yNSLFNcdhZZ8HUPxYnaedTqJcFFg4AzUsQklF/fECegTJdZjaj2WoL0/I8K7HMfY/hVuRZUWPNglYi8agJRX6gdkFTCpUNI7stpgKqxtzUJhhw15uG/lKMplwqUr
ingotronic.ch. 300 IN RRSIG DNSKEY 5 2 300 20150125003700 20141226001657 6031 ingotronic.ch. rs1QlP2SlSpA2ELbzwg3DgWLzXWL3Lpv6CUJE2Q0qH2Zp7Qdy3cD+ZEtNh9v24Qv1M6JJ3zFt8mmZoCeW2ycuMbJCqBkW9CBuwF+VznZvZY2MxwPipvhvEEGP//0M8YAZJ66yQPDv3PTdAP8FYbIrJyvY44vwyncwbslpfHT9jAsrbfr3vuMuWps86dnP462q+0s1TxBfqi8mzo3gdavjHKWVNwohLahLKT+tWeu6DSzQv0YwMjwtkLgF7QRgx3ctIIkloOrnx9nHH1N6y+hxEB89fOlyVDjHhgL5uVtsD5fEdT0FJ2Gc/2nShEMMqIwr1/J9kUq1mNySff/uEe65Q==
ingotronic.ch. 300 IN RRSIG DNSKEY 5 2 300 20150125003700 20141226001657 17430 ingotronic.ch. mEwZjhQqeWksWD0TCnNBrtce4YkWJL3edqL6PvAUu8Fn+Ih437kEs3+pqdkgRsdYQ9HW+lBm/8pWwJlNAv0bi9NykItXMwAUFtncgq+6Pnh3iAM972GXSa5VV4LcGQ5b8CBdHCHiEKDqyPv5Hr5QfYL/FQaWlcNRh4QZZlZNPFA=
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 940 bytes
###############################################
testDNameToExistingIsValid 0000664 0000000 0000000 00000017602 13020541473 0034222 0 ustar 00root root 0000000 0000000 dnssecjava-1.1.3/src/test/resources/recordings/org_jitsi_dnssec_TestDNames #Date: 2015-01-06T22:35:18+01:00
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 38821
;; flags: qr aa rd ra cd ; qd: 1 an: 5 au: 2 ad: 3
;; QUESTIONS:
;; www.alias.ingotronic.ch., type = A, class = IN
;; ANSWERS:
alias.ingotronic.ch. 300 IN DNAME ingotronic.ch.
alias.ingotronic.ch. 300 IN RRSIG DNAME 5 3 300 20150125000532 20141225234703 17430 ingotronic.ch. GzAO4/bVZ3twjJhR1z1uujUYNI35rtGJi3jlDY6kbwQcaZeiu8WSeln5L90FijEVFVsXsv5rVvOZXAiXk5FP5jZgGg/A6H1iN8nNsVNSzc8XNWBd+Wv4+x0aQKZvcAD++Pcn3EW3nCEcHNdvnqVsjXbtdTJOiPYrvm/iC3QduCI=
www.alias.ingotronic.ch. 300 IN CNAME www.ingotronic.ch.
www.ingotronic.ch. 300 IN A 127.0.0.1
www.ingotronic.ch. 300 IN RRSIG A 5 3 300 20150125012443 20141226010256 17430 ingotronic.ch. hkD2bkHZKHoJX8cg69j6l1JXE7iYlVFc0iMo3/3hcq4TqieiT2El/9DLfMSxa7XyB/HRDG5Ul61E56pwlCDdxkwemtAuTzjCpqAtvQ5l5OEtTM4i6nijKBkRRzHjh99qDI1jh9GFv3jkTk5m7iaMQemUB4VTjKGLcZHXvWmQLbg=
;; AUTHORITY RECORDS:
ingotronic.ch. 300 IN NS ns1.ingotronic.ch.
ingotronic.ch. 300 IN RRSIG NS 5 2 300 20150125000532 20141225234703 17430 ingotronic.ch. VuzVJM3McSHlcdngCG/G23zCikq8tXE0CZV2ZSgUFXXFMIEoM6PMi1QRQ/8VF3tee4WGpRx2jhtkui0wFRFfwIhW7G1uPDT4qogaR3KLIyuCEsMxhRH3WJZNrLmLqlSBGvd9OBJwbmryqm3Zzqvrk+E+rh8OJeifnBBpHAX4eHg=
;; ADDITIONAL RECORDS:
ns1.ingotronic.ch. 300 IN A 62.192.5.131
ns1.ingotronic.ch. 300 IN RRSIG A 5 3 300 20150125005754 20141226001054 17430 ingotronic.ch. fNG1RZM53pXwBxruHNaSZszxVzNLoCq8VZsTjAzYH2vSLzHXYVGJFTLIeY0K9APAdyJU8WuwmABmn7XY0Kg39kRG77uoFlqUws2PdTz2QKOwJGZY7W88Ak2Y9lkDBcK8o3wJHVptrT8R7p/1U7UfjF0kqPUkakk2B0EbFWdagFg=
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 839 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 1484
;; flags: qr rd ra ad cd ; qd: 1 an: 4 au: 0 ad: 1
;; QUESTIONS:
;; ., type = DNSKEY, class = IN
;; ANSWERS:
. 87355 IN DNSKEY 256 3 8 AwEAAe3fSrbLBy3LOS7pnxEUhvPZTE2H5dIGsI/UfruI/nOEvWWa/PSX2BFedBkEqOlYdjdNF2f+6lmfk2Od/xu0v5bVqxFE+/24v3hZSlWBxvXzPTAGHrbW/IJYEPqlzVOAS4XdUgHg0N7IbLywNHMvB+Yf+Nm6ctyXXFLV4WTNnzs7
. 87355 IN DNSKEY 257 3 8 AwEAAagAIKlVZrpC6Ia7gEzahOR+9W29euxhJhVVLOyQbSEW0O8gcCjFFVQUTf6v58fLjwBd0YI0EzrAcQqBGCzh/RStIoO8g0NfnfL2MTJRkxoXbfDaUeVPQuYEhg37NZWAJQ9VnMVDxP/VHL496M/QZxkjf5/Efucp2gaDX6RS6CXpoY68LsvPVjR0ZSwzz1apAzvN9dlzEheX7ICJBBtuA6G3LQpzW5hOA2hzCTMjJPJ8LbqF6dsV6DoBQzgul0sGIcGOYl7OyQdXfZ57relSQageu+ipAdTTJ25AsRTAoub8ONGcLmqrAmRLKBP1dfwhYB4N7knNnulqQxA+Uk1ihz0=
. 87355 IN DNSKEY 256 3 8 AwEAAaPD7Y7XIi1MOEREJNTrRhyqsY3gff6JWzg+XCbqut1sbcbvqyssHw8DT1AkRaAC92pO8xuyq5QEgEPL1IHfABLwpwXI5gTj4gdwi86bpkmlWs9fRpnn4DPDCTdrnxIejJXgClHikLJF3u3CdpNCMijq4CKdQbMlRZ3avv+G7rh7
. 87355 IN RRSIG DNSKEY 8 0 172800 20150115235959 20150101000000 19036 . i8cAxD2pvQi1oAyvQxRpDfFlbqPzW+69QQEsDwE1eWOm5AtawO9U7lmsGps7sy/fVNvl1ljKBj4Djp9pb3U2FLogjiIlW0cDAkPmLlG9t+b/pjEfBNlhjANUVN06pvQVAfm+LcF26EaWT6FlISBqb6jSy4BHRa3Bdc4Sx7+pRSYSqVVvYxLkfAWsKPqGkvWhebJDndJJV9syXQXgZ+v/uJ+6XOS43xkAdeL8iBzIs/FlwMTfh3tVe3d0lb65IBBLlCzeQuetX+0Vu1YFcnD0mHc/wS2ZnAV5toAFmyVQBoY/XAZiZeaOkcROJ6Zmqezy7liwK7BqsYyAZntMhk8lbg==
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 883 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 32079
;; flags: qr rd ra ad cd ; qd: 1 an: 2 au: 0 ad: 1
;; QUESTIONS:
;; ch., type = DS, class = IN
;; ANSWERS:
ch. 955 IN DS 46375 8 2 8F96646FC68BB7E4AF4C0750A6096FBC0D4ECDA3D3FA6DA06FDDB42EE50C6CF3
ch. 955 IN RRSIG DS 8 1 86400 20150112170000 20150105160000 16665 . thY7xYWBBxiBjqbQIb9fAG4TmQgnziwM7q6P1T3/ITxmECdvOCQnnZA3uD7qmN8uM0HudsD7+y+zgD3rsH4RSTKdL4kHSI0OnCxToMTvklghEgFDezqIRm8NkWdI2H4Stwrj20nYKSpLQxPI2EE54gs18P3KyO8bAUYv8Qx73xU=
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 238 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 20143
;; flags: qr rd ra ad cd ; qd: 1 an: 4 au: 0 ad: 1
;; QUESTIONS:
;; ch., type = DNSKEY, class = IN
;; ANSWERS:
ch. 956 IN DNSKEY 257 3 8 AwEAAb7GhhZ8IAy/AhwmSms5DeQK5ad09wIIplEpYoiAIYXPtJvT1ReFzyfTp/2YP+g/PWDwHPh4qKAHa9x0VgbIQcGAeNakmfkAdWEmCnca323/SAml3mwfaX62G7/uYWae5zh8QTxZKNd+K1yZ5x0IxnI31chSl5xymRbTEHYZDKwSIRFM3fTxUMt93WFaBVWELReYotJBr++rvAWdnlay5TPBTvheLBkaiqtgM4GP8HK07Y+86lsZnEsj5K3G1KTV5SPpa82rqYAwxG9VKbmSE/6/kBR5jJHjt1rRt5Oe7v18aEtw0YCEN4vxq+KuvMoNVqXUsE9LBwHJD+QNwi6wmB0=
ch. 956 IN DNSKEY 256 3 8 AwEAAcSLdT0fEmcFmLpeUkAJoeVaHKiu+nbuc43fWlqaCRVf8t2HA4uWxOk0O5ci9nrFTc8nq8oa5fk5Cj7CHh4yrX9qUCfTdIWTyp8BDEdJpS+Dyb0u9wQuVj+nQMj4fLzdQf4TJs3/qxuiLr3nL1UUwlhhXeqSqGVb7p3mtB5HJ8ad
ch. 956 IN DNSKEY 256 3 8 AwEAAcsg0kY6fw1wzYMhSAKTy+Y2JzAst66P/1odp9NECJJHbU8f4nwziI3onoFSBV0ZiSZhY1aH5dhdDZ7BkrqhVXSrZPAz0CvzjIxmB1gSOf9DeZvjQvoy97HqYolxsf+B3QQv2RKBT67elF5+JisKg3/dQISelKn8LhabSoVrMlD1
ch. 956 IN RRSIG DNSKEY 8 1 86400 20150127100909 20141212090909 46375 ch. bT8q0FWyeMH0SulNo6UdIIgZYNATwYsee2bikq2Gh339Bufma8eaqWIPYT3XKmxYPBFOw0bVl+kLZxTwbR1CFoCDXoP+qgQhh4mf9qkNiv2CDSc+0FE3FRREn+DAhYTUEuB58FPiPakFB8s8O7T+k2qhDae7jy4/y7Jl1lnjaBY8s7bzOUPhF0KKCNZmvoKwtL23ZdVeTSV1xM3jkiNnpzBKbcoSWECSGJVp1SE0BnRXdwQP41YTXFZ0310YjaTAUCC5qbMIWdEkHjfdSQtKBImnc85mkapq9w++XQ4zhauPWBtrPV3CcoCahjUaWdjrKVkibomlJZaN8MEO23CfQw==
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 893 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 47237
;; flags: qr rd ra cd ; qd: 1 an: 3 au: 0 ad: 1
;; QUESTIONS:
;; ingotronic.ch., type = DS, class = IN
;; ANSWERS:
ingotronic.ch. 3564 IN DS 6031 5 1 733D0218B571CD617B1A7493564B9FC4F12ADE82
ingotronic.ch. 3564 IN DS 6031 5 2 4A948F2FDADA24686E473EDAC00DCF972584C75E3FAA92C2021B6221449FF87E
ingotronic.ch. 3564 IN RRSIG DS 8 2 3600 20150129033614 20150105123019 60789 ch. rVPJP2HhzW7OkroK2axFj5Lb4iVWCH8Fp/Iq1rF952NDo72b8RiKje2RaAKJAGQ+wd0YgE+PAej04GCmkhlDJA/zvPeeTxuhy3HbJzReMlQ7fjyH+wW1hli+FuIYvogXWf7nO/9VyPORt8X/f/pjrOr3Vlj9sGLN8TGYpEuVSw4=
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 288 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 23654
;; flags: qr aa rd ra cd ; qd: 1 an: 4 au: 0 ad: 1
;; QUESTIONS:
;; ingotronic.ch., type = DNSKEY, class = IN
;; ANSWERS:
ingotronic.ch. 300 IN DNSKEY 257 3 5 AwEAAeA1vzmjaB+eBAcvhzpKEgAEFpvQ1rg4uKDW6MsQtacKoqBpgyep2+LuWotz5p/xYxj3NGsArwN8Ad5cY0FHRr8miTT0elOv6nvlqGIfRuhj/BXAQ1x4ihpSFslHw0lJMYFwxsUZWpUyjWX/nv1xRZMMwF46gui0N4OEbyTYusCk77D+A71k+K0EAitFIbIH4GCUKmH1H7HmXhSVH9bN/n7KEGwW32lmsuuUcJoRKDkcUvbMXY/9Xoa2quERrUg/rBbDUHowRPjYDS5GzY1+f4YY8s40BufGiqyUTKKXL953MVFK8gmezXA0hbmrnZ7CBOw/7238mORAdzExaX8n7CE=
ingotronic.ch. 300 IN DNSKEY 256 3 5 AwEAAZ2Xh77GFzpEDx7EHYxShqltHgkiG+BOjBGifEmnJhQSdE5/yNSLFNcdhZZ8HUPxYnaedTqJcFFg4AzUsQklF/fECegTJdZjaj2WoL0/I8K7HMfY/hVuRZUWPNglYi8agJRX6gdkFTCpUNI7stpgKqxtzUJhhw15uG/lKMplwqUr
ingotronic.ch. 300 IN RRSIG DNSKEY 5 2 300 20150125003700 20141226001657 6031 ingotronic.ch. rs1QlP2SlSpA2ELbzwg3DgWLzXWL3Lpv6CUJE2Q0qH2Zp7Qdy3cD+ZEtNh9v24Qv1M6JJ3zFt8mmZoCeW2ycuMbJCqBkW9CBuwF+VznZvZY2MxwPipvhvEEGP//0M8YAZJ66yQPDv3PTdAP8FYbIrJyvY44vwyncwbslpfHT9jAsrbfr3vuMuWps86dnP462q+0s1TxBfqi8mzo3gdavjHKWVNwohLahLKT+tWeu6DSzQv0YwMjwtkLgF7QRgx3ctIIkloOrnx9nHH1N6y+hxEB89fOlyVDjHhgL5uVtsD5fEdT0FJ2Gc/2nShEMMqIwr1/J9kUq1mNySff/uEe65Q==
ingotronic.ch. 300 IN RRSIG DNSKEY 5 2 300 20150125003700 20141226001657 17430 ingotronic.ch. mEwZjhQqeWksWD0TCnNBrtce4YkWJL3edqL6PvAUu8Fn+Ih437kEs3+pqdkgRsdYQ9HW+lBm/8pWwJlNAv0bi9NykItXMwAUFtncgq+6Pnh3iAM972GXSa5VV4LcGQ5b8CBdHCHiEKDqyPv5Hr5QfYL/FQaWlcNRh4QZZlZNPFA=
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 940 bytes
###############################################
dnssecjava-1.1.3/src/test/resources/recordings/org_jitsi_dnssec_TestDNames/testDNameToExternal 0000664 0000000 0000000 00000037466 13020541473 0033027 0 ustar 00root root 0000000 0000000 #Date: 2015-01-06T22:35:19+01:00
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 47623
;; flags: qr aa rd ra cd ; qd: 1 an: 5 au: 5 ad: 11
;; QUESTIONS:
;; www.isc.ingotronic.ch., type = A, class = IN
;; ANSWERS:
isc.ingotronic.ch. 300 IN DNAME isc.org.
isc.ingotronic.ch. 300 IN RRSIG DNAME 5 3 300 20150125010136 20141226005030 17430 ingotronic.ch. Lq+1VhRumvgwRCg2inz0FZkNn28FaHbc2lfie4WJ6ScNxtvGmQwaVc7nGt5xcxQEZZc609yr+kEuYEHMckSiCoEY6jy7/qI9e2vGYe1UGzT2bbjWZ6j/v40kE7x/dWybFAcpaWJyi6x+Nx6n3EsNe30TqPLO9kGzuumYDHNnVMs=
www.isc.ingotronic.ch. 300 IN CNAME www.isc.org.
www.isc.org. 41 IN A 149.20.64.69
www.isc.org. 41 IN RRSIG A 5 3 60 20150204233244 20150105233244 4521 isc.org. qX9Fqzc+cUB7TUgdAPDQztt+3L7A2TxqVPTGZht3gKb1oBizum2zL3Le6lSO/DI2b526/n+l6gyT7ZtSL058wmEWhXeFlurPojBEBCWYLBkJ7OBLTqMSKzVNN1zpdUIs2RA8QqLOhSWeFkBw0bcJaDnRC2uKr0513aMVJfk5uA8=
;; AUTHORITY RECORDS:
isc.org. 1008 IN NS ns.isc.afilias-nst.info.
isc.org. 1008 IN NS ord.sns-pb.isc.org.
isc.org. 1008 IN NS sfba.sns-pb.isc.org.
isc.org. 1008 IN NS ams.sns-pb.isc.org.
isc.org. 1008 IN RRSIG NS 5 2 7200 20150204233244 20150105233244 4521 isc.org. Olb3QQHiezY6ysFepLUtePsgyVqXgECmLMROkbaAJT5ndTyoMHy4NaX/zFc63LtvzilrS59l9x719c4Pcm37zuEEdKB1IdjtxYKzKqmCzJZ5GuSZ6XgLO2DPWoF2ws+1BVPJL2myZdoBeEu+cUxCLTsETOloSl9Jz5livJ+Xbxo=
;; ADDITIONAL RECORDS:
ns.isc.afilias-nst.info. 1008 IN A 199.254.63.254
ns.isc.afilias-nst.info. 1008 IN AAAA 2001:500:2c:0:0:0:0:254
ams.sns-pb.isc.org. 1008 IN A 199.6.1.30
ams.sns-pb.isc.org. 1008 IN AAAA 2001:500:60:0:0:0:0:30
ord.sns-pb.isc.org. 1008 IN A 199.6.0.30
ord.sns-pb.isc.org. 1008 IN AAAA 2001:500:71:0:0:0:0:30
sfba.sns-pb.isc.org. 1008 IN A 149.20.64.3
sfba.sns-pb.isc.org. 1008 IN AAAA 2001:4f8:0:2:0:0:0:19
ams.sns-pb.isc.org. 7181 IN RRSIG A 5 4 7200 20150204233244 20150105233244 4521 isc.org. SEjuacdGLjteFKFrB0UTyTcEjEP/VtAKeNWD6DqXLA4839PAk17M1qzCf13uKBGwtb9e1xr3U/GDlIhspbSkSNOIWBzfkKiM8PXQ9kZZuYaPrrz2sz5CzzyzThkz4bq4BicQwKNi/aD/ljLaCIWZDXfZwJabo0Uz+G3QlIq18YE=
ams.sns-pb.isc.org. 7181 IN RRSIG AAAA 5 4 7200 20150204233244 20150105233244 4521 isc.org. EGLJUSGvW1gxEUglZKYLS2NmlJsPNzZQFZSORxTKIXqgF+0A2fZpk+/vkGwxiwqkOsV5Tu7kXUFzC7fIWEI7VDn/L8XKLz575upoMoGvA3bAZ/7VWXjLSXbyTFrDTP9GKSA4knIRtrIsOY+dKieSwIGV6sykBYA8ONMpPcj0sCY=
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 1221 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 21621
;; flags: qr rd ra ad cd ; qd: 1 an: 4 au: 0 ad: 1
;; QUESTIONS:
;; ., type = DNSKEY, class = IN
;; ANSWERS:
. 87355 IN DNSKEY 256 3 8 AwEAAe3fSrbLBy3LOS7pnxEUhvPZTE2H5dIGsI/UfruI/nOEvWWa/PSX2BFedBkEqOlYdjdNF2f+6lmfk2Od/xu0v5bVqxFE+/24v3hZSlWBxvXzPTAGHrbW/IJYEPqlzVOAS4XdUgHg0N7IbLywNHMvB+Yf+Nm6ctyXXFLV4WTNnzs7
. 87355 IN DNSKEY 257 3 8 AwEAAagAIKlVZrpC6Ia7gEzahOR+9W29euxhJhVVLOyQbSEW0O8gcCjFFVQUTf6v58fLjwBd0YI0EzrAcQqBGCzh/RStIoO8g0NfnfL2MTJRkxoXbfDaUeVPQuYEhg37NZWAJQ9VnMVDxP/VHL496M/QZxkjf5/Efucp2gaDX6RS6CXpoY68LsvPVjR0ZSwzz1apAzvN9dlzEheX7ICJBBtuA6G3LQpzW5hOA2hzCTMjJPJ8LbqF6dsV6DoBQzgul0sGIcGOYl7OyQdXfZ57relSQageu+ipAdTTJ25AsRTAoub8ONGcLmqrAmRLKBP1dfwhYB4N7knNnulqQxA+Uk1ihz0=
. 87355 IN DNSKEY 256 3 8 AwEAAaPD7Y7XIi1MOEREJNTrRhyqsY3gff6JWzg+XCbqut1sbcbvqyssHw8DT1AkRaAC92pO8xuyq5QEgEPL1IHfABLwpwXI5gTj4gdwi86bpkmlWs9fRpnn4DPDCTdrnxIejJXgClHikLJF3u3CdpNCMijq4CKdQbMlRZ3avv+G7rh7
. 87355 IN RRSIG DNSKEY 8 0 172800 20150115235959 20150101000000 19036 . i8cAxD2pvQi1oAyvQxRpDfFlbqPzW+69QQEsDwE1eWOm5AtawO9U7lmsGps7sy/fVNvl1ljKBj4Djp9pb3U2FLogjiIlW0cDAkPmLlG9t+b/pjEfBNlhjANUVN06pvQVAfm+LcF26EaWT6FlISBqb6jSy4BHRa3Bdc4Sx7+pRSYSqVVvYxLkfAWsKPqGkvWhebJDndJJV9syXQXgZ+v/uJ+6XOS43xkAdeL8iBzIs/FlwMTfh3tVe3d0lb65IBBLlCzeQuetX+0Vu1YFcnD0mHc/wS2ZnAV5toAFmyVQBoY/XAZiZeaOkcROJ6Zmqezy7liwK7BqsYyAZntMhk8lbg==
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 883 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 41228
;; flags: qr rd ra ad cd ; qd: 1 an: 2 au: 0 ad: 1
;; QUESTIONS:
;; ch., type = DS, class = IN
;; ANSWERS:
ch. 955 IN DS 46375 8 2 8F96646FC68BB7E4AF4C0750A6096FBC0D4ECDA3D3FA6DA06FDDB42EE50C6CF3
ch. 955 IN RRSIG DS 8 1 86400 20150112170000 20150105160000 16665 . thY7xYWBBxiBjqbQIb9fAG4TmQgnziwM7q6P1T3/ITxmECdvOCQnnZA3uD7qmN8uM0HudsD7+y+zgD3rsH4RSTKdL4kHSI0OnCxToMTvklghEgFDezqIRm8NkWdI2H4Stwrj20nYKSpLQxPI2EE54gs18P3KyO8bAUYv8Qx73xU=
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 238 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 25460
;; flags: qr rd ra ad cd ; qd: 1 an: 4 au: 0 ad: 1
;; QUESTIONS:
;; ch., type = DNSKEY, class = IN
;; ANSWERS:
ch. 955 IN DNSKEY 257 3 8 AwEAAb7GhhZ8IAy/AhwmSms5DeQK5ad09wIIplEpYoiAIYXPtJvT1ReFzyfTp/2YP+g/PWDwHPh4qKAHa9x0VgbIQcGAeNakmfkAdWEmCnca323/SAml3mwfaX62G7/uYWae5zh8QTxZKNd+K1yZ5x0IxnI31chSl5xymRbTEHYZDKwSIRFM3fTxUMt93WFaBVWELReYotJBr++rvAWdnlay5TPBTvheLBkaiqtgM4GP8HK07Y+86lsZnEsj5K3G1KTV5SPpa82rqYAwxG9VKbmSE/6/kBR5jJHjt1rRt5Oe7v18aEtw0YCEN4vxq+KuvMoNVqXUsE9LBwHJD+QNwi6wmB0=
ch. 955 IN DNSKEY 256 3 8 AwEAAcsg0kY6fw1wzYMhSAKTy+Y2JzAst66P/1odp9NECJJHbU8f4nwziI3onoFSBV0ZiSZhY1aH5dhdDZ7BkrqhVXSrZPAz0CvzjIxmB1gSOf9DeZvjQvoy97HqYolxsf+B3QQv2RKBT67elF5+JisKg3/dQISelKn8LhabSoVrMlD1
ch. 955 IN DNSKEY 256 3 8 AwEAAcSLdT0fEmcFmLpeUkAJoeVaHKiu+nbuc43fWlqaCRVf8t2HA4uWxOk0O5ci9nrFTc8nq8oa5fk5Cj7CHh4yrX9qUCfTdIWTyp8BDEdJpS+Dyb0u9wQuVj+nQMj4fLzdQf4TJs3/qxuiLr3nL1UUwlhhXeqSqGVb7p3mtB5HJ8ad
ch. 955 IN RRSIG DNSKEY 8 1 86400 20150127100909 20141212090909 46375 ch. bT8q0FWyeMH0SulNo6UdIIgZYNATwYsee2bikq2Gh339Bufma8eaqWIPYT3XKmxYPBFOw0bVl+kLZxTwbR1CFoCDXoP+qgQhh4mf9qkNiv2CDSc+0FE3FRREn+DAhYTUEuB58FPiPakFB8s8O7T+k2qhDae7jy4/y7Jl1lnjaBY8s7bzOUPhF0KKCNZmvoKwtL23ZdVeTSV1xM3jkiNnpzBKbcoSWECSGJVp1SE0BnRXdwQP41YTXFZ0310YjaTAUCC5qbMIWdEkHjfdSQtKBImnc85mkapq9w++XQ4zhauPWBtrPV3CcoCahjUaWdjrKVkibomlJZaN8MEO23CfQw==
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 893 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 29897
;; flags: qr rd ra cd ; qd: 1 an: 3 au: 0 ad: 1
;; QUESTIONS:
;; ingotronic.ch., type = DS, class = IN
;; ANSWERS:
ingotronic.ch. 3563 IN DS 6031 5 1 733D0218B571CD617B1A7493564B9FC4F12ADE82
ingotronic.ch. 3563 IN DS 6031 5 2 4A948F2FDADA24686E473EDAC00DCF972584C75E3FAA92C2021B6221449FF87E
ingotronic.ch. 3563 IN RRSIG DS 8 2 3600 20150129033614 20150105123019 60789 ch. rVPJP2HhzW7OkroK2axFj5Lb4iVWCH8Fp/Iq1rF952NDo72b8RiKje2RaAKJAGQ+wd0YgE+PAej04GCmkhlDJA/zvPeeTxuhy3HbJzReMlQ7fjyH+wW1hli+FuIYvogXWf7nO/9VyPORt8X/f/pjrOr3Vlj9sGLN8TGYpEuVSw4=
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 288 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 46136
;; flags: qr aa rd ra cd ; qd: 1 an: 4 au: 0 ad: 1
;; QUESTIONS:
;; ingotronic.ch., type = DNSKEY, class = IN
;; ANSWERS:
ingotronic.ch. 300 IN DNSKEY 257 3 5 AwEAAeA1vzmjaB+eBAcvhzpKEgAEFpvQ1rg4uKDW6MsQtacKoqBpgyep2+LuWotz5p/xYxj3NGsArwN8Ad5cY0FHRr8miTT0elOv6nvlqGIfRuhj/BXAQ1x4ihpSFslHw0lJMYFwxsUZWpUyjWX/nv1xRZMMwF46gui0N4OEbyTYusCk77D+A71k+K0EAitFIbIH4GCUKmH1H7HmXhSVH9bN/n7KEGwW32lmsuuUcJoRKDkcUvbMXY/9Xoa2quERrUg/rBbDUHowRPjYDS5GzY1+f4YY8s40BufGiqyUTKKXL953MVFK8gmezXA0hbmrnZ7CBOw/7238mORAdzExaX8n7CE=
ingotronic.ch. 300 IN DNSKEY 256 3 5 AwEAAZ2Xh77GFzpEDx7EHYxShqltHgkiG+BOjBGifEmnJhQSdE5/yNSLFNcdhZZ8HUPxYnaedTqJcFFg4AzUsQklF/fECegTJdZjaj2WoL0/I8K7HMfY/hVuRZUWPNglYi8agJRX6gdkFTCpUNI7stpgKqxtzUJhhw15uG/lKMplwqUr
ingotronic.ch. 300 IN RRSIG DNSKEY 5 2 300 20150125003700 20141226001657 6031 ingotronic.ch. rs1QlP2SlSpA2ELbzwg3DgWLzXWL3Lpv6CUJE2Q0qH2Zp7Qdy3cD+ZEtNh9v24Qv1M6JJ3zFt8mmZoCeW2ycuMbJCqBkW9CBuwF+VznZvZY2MxwPipvhvEEGP//0M8YAZJ66yQPDv3PTdAP8FYbIrJyvY44vwyncwbslpfHT9jAsrbfr3vuMuWps86dnP462q+0s1TxBfqi8mzo3gdavjHKWVNwohLahLKT+tWeu6DSzQv0YwMjwtkLgF7QRgx3ctIIkloOrnx9nHH1N6y+hxEB89fOlyVDjHhgL5uVtsD5fEdT0FJ2Gc/2nShEMMqIwr1/J9kUq1mNySff/uEe65Q==
ingotronic.ch. 300 IN RRSIG DNSKEY 5 2 300 20150125003700 20141226001657 17430 ingotronic.ch. mEwZjhQqeWksWD0TCnNBrtce4YkWJL3edqL6PvAUu8Fn+Ih437kEs3+pqdkgRsdYQ9HW+lBm/8pWwJlNAv0bi9NykItXMwAUFtncgq+6Pnh3iAM972GXSa5VV4LcGQ5b8CBdHCHiEKDqyPv5Hr5QfYL/FQaWlcNRh4QZZlZNPFA=
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 940 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 50984
;; flags: qr rd ra ad cd ; qd: 1 an: 4 au: 0 ad: 1
;; QUESTIONS:
;; ., type = DNSKEY, class = IN
;; ANSWERS:
. 87354 IN DNSKEY 256 3 8 AwEAAaPD7Y7XIi1MOEREJNTrRhyqsY3gff6JWzg+XCbqut1sbcbvqyssHw8DT1AkRaAC92pO8xuyq5QEgEPL1IHfABLwpwXI5gTj4gdwi86bpkmlWs9fRpnn4DPDCTdrnxIejJXgClHikLJF3u3CdpNCMijq4CKdQbMlRZ3avv+G7rh7
. 87354 IN DNSKEY 257 3 8 AwEAAagAIKlVZrpC6Ia7gEzahOR+9W29euxhJhVVLOyQbSEW0O8gcCjFFVQUTf6v58fLjwBd0YI0EzrAcQqBGCzh/RStIoO8g0NfnfL2MTJRkxoXbfDaUeVPQuYEhg37NZWAJQ9VnMVDxP/VHL496M/QZxkjf5/Efucp2gaDX6RS6CXpoY68LsvPVjR0ZSwzz1apAzvN9dlzEheX7ICJBBtuA6G3LQpzW5hOA2hzCTMjJPJ8LbqF6dsV6DoBQzgul0sGIcGOYl7OyQdXfZ57relSQageu+ipAdTTJ25AsRTAoub8ONGcLmqrAmRLKBP1dfwhYB4N7knNnulqQxA+Uk1ihz0=
. 87354 IN DNSKEY 256 3 8 AwEAAe3fSrbLBy3LOS7pnxEUhvPZTE2H5dIGsI/UfruI/nOEvWWa/PSX2BFedBkEqOlYdjdNF2f+6lmfk2Od/xu0v5bVqxFE+/24v3hZSlWBxvXzPTAGHrbW/IJYEPqlzVOAS4XdUgHg0N7IbLywNHMvB+Yf+Nm6ctyXXFLV4WTNnzs7
. 87354 IN RRSIG DNSKEY 8 0 172800 20150115235959 20150101000000 19036 . i8cAxD2pvQi1oAyvQxRpDfFlbqPzW+69QQEsDwE1eWOm5AtawO9U7lmsGps7sy/fVNvl1ljKBj4Djp9pb3U2FLogjiIlW0cDAkPmLlG9t+b/pjEfBNlhjANUVN06pvQVAfm+LcF26EaWT6FlISBqb6jSy4BHRa3Bdc4Sx7+pRSYSqVVvYxLkfAWsKPqGkvWhebJDndJJV9syXQXgZ+v/uJ+6XOS43xkAdeL8iBzIs/FlwMTfh3tVe3d0lb65IBBLlCzeQuetX+0Vu1YFcnD0mHc/wS2ZnAV5toAFmyVQBoY/XAZiZeaOkcROJ6Zmqezy7liwK7BqsYyAZntMhk8lbg==
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 883 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 38781
;; flags: qr rd ra cd ; qd: 1 an: 3 au: 0 ad: 1
;; QUESTIONS:
;; org., type = DS, class = IN
;; ANSWERS:
org. 1003 IN DS 21366 7 2 96EEB2FFD9B00CD4694E78278B5EFDAB0A80446567B69F634DA078F0D90F01BA
org. 1003 IN DS 21366 7 1 E6C1716CFB6BDC84E84CE1AB5510DAC69173B5B2
org. 1003 IN RRSIG DS 8 1 86400 20150112170000 20150105160000 16665 . TeNrVbBDgqdrbpdIweTad3yMLn+APxxlDpr717kqNgkOc8OxLFE/pFGzfSCYfc5hlMNB/nY1XhIJbWwvd26xOjwcB1rK3yo/Cfa5Pt4P+qV45QYW2JlatQVQPHtgMOf1KvUzXy4DlKzE5yHvHNGscfMOgIDeyWyDS8XwdrEIRR0=
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 275 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 14080
;; flags: qr rd ra cd ; qd: 1 an: 7 au: 0 ad: 1
;; QUESTIONS:
;; org., type = DNSKEY, class = IN
;; ANSWERS:
org. 879 IN DNSKEY 256 3 7 AwEAAawm+6jDEf5ymhSAeQKaJrF0FTdqp4T0F1SE/KSFEcd/MUaBW0J8NyrJZXQJ0I3KpvXJSk3b0Z3X8StBpngUWOa9/iePG5WaR8Edj0JENd6Cy1R7WawrtYAfQ1AWnvGTbvf0rFa2GcMfhyNKeY8UO5TWKECE4AF4C+LlGe12TICh
org. 879 IN DNSKEY 257 3 7 AwEAAZTjbIO5kIpxWUtyXc8avsKyHIIZ+LjC2Dv8naO+Tz6X2fqzDC1bdq7HlZwtkaqTkMVVJ+8gE9FIreGJ4c8G1GdbjQgbP1OyYIG7OHTc4hv5T2NlyWr6k6QFz98Q4zwFIGTFVvwBhmrMDYsOTtXakK6QwHovA1+83BsUACxlidpwB0hQacbD6x+I2RCDzYuTzj64Jv0/9XsX6AYV3ebcgn4hL1jIR2eJYyXlrAoWxdzxcW//5yeL5RVWuhRxejmnSVnCuxkfS4AQ485KH2tpdbWcCopLJZs6tw8q3jWcpTGzdh/v3xdYfNpQNcPImFlxAun3BtORPA2r8ti6MNoJEHU=
org. 879 IN DNSKEY 256 3 7 AwEAAXTZXCkp3UaDofhKlicjaZR/XeMFVkRSXRZsYP9OBRFZB44675hHORNE+QAijMdWOQeQt1SUWGyeJ5SHPVirGVxt9wCCqOeMTx7WvImZAKuqUl9H5N3Wn6FRidaub7d76IjxKZbkAHhGSJSzRTuuHbyjtrJVGcJ18kZHELyIsqZ3
org. 879 IN DNSKEY 257 3 7 AwEAAYpYfj3aaRzzkxWQqMdl7YExY81NdYSv+qayuZDodnZ9IMh0bwMcYaVUdzNAbVeJ8gd6jq1sR3VvP/SR36mmGssbV4Udl5ORDtqiZP2TDNDHxEnKKTX+jWfytZeT7d3AbSzBKC0v7uZrM6M2eoJnl6id66rEUmQC2p9DrrDg9F6tXC9CD/zC7/y+BNNpiOdnM5DXk7HhZm7ra9E7ltL13h2mx7kEgU8e6npJlCoXjraIBgUDthYs48W/sdTDLu7N59rjCG+bpil+c8oZ9f7NR3qmSTpTP1m86RqUQnVErifrH8KjDqL+3wzUdF5ACkYwt1XhPVPU+wSIlzbaAQN49PU=
org. 879 IN RRSIG DNSKEY 7 1 900 20150126170632 20150105160632 9795 org. b4jnXExJ1MgfUZffo8HVtxJ73qdbrustN+U6GBtgZLNEpdDgdpf9d4unRp/tqzDFoW0QuEoYOBatPCtpX3Re12/FQ+lWkfOAatcJMYMcW7kU2q86muY44W4p1BK/DxVb2zQHJ4AO7h22dH+TcM8J3WlGrlHYy/6k+emWPC7NpumCF3ctR/w26rAU4sv0lKuPvQSr9mOf3PyX29tz61lSfu4lAcymB6vh7B3D6TMkpHyobOAD67Ne59V1IgeeHXakURM8g0P0HMg87GT4GXwqo9+Aj7oWAq9D8iIIqelOLiijKys5jTzgdbOxM2vVn+l175xJybUzrJI0huJ9zKNCvg==
org. 879 IN RRSIG DNSKEY 7 1 900 20150126170632 20150105160632 21366 org. Edm9U+AtUcNeh2NXrWaLbfNYSRJovpziT1YcCphKGmdluvZPQk6rQAv1Y+2JBhE9Xmb37cY07lr7XHHfYxLWyhrPkpaKCX4ogqhGRylamy5R8BptqvVFhMTRUUHnK4tHvfYXqbtKuh9H84giLWMQIE2ZzQC9UqTvAIrc4FVUVIuwrNR7k6N96yy68feZnH8wcY+/RkyxoxMhcbMxXnZl2V9XP7xUxwtkULQBL1fq7IHI4jmlNyrdLzZltEgMIgtTK5HpgKaDborfoAcGBYnXxiC5RkAwHH81LAlT/BbK9shiWAI+yDhakLsIpl5ajUcTcbRBtLBBMkY6+4nAnXlSfg==
org. 879 IN RRSIG DNSKEY 7 1 900 20150126170632 20150105160632 53348 org. dAW5DYEjkxzfeM83ZCupwRh50L29jdR+dWkZYgt5GLDsYnyJDmRvjnHiHvJXVlHygvytafDMNK1MBlBODwHTBU/O7u7jLMbKvDU26bJpjm7cBJEtdUny3Bfckfr+VnxmT6UgmWLy1Cu8vuMOQS0t0fIMUs7fF2gJcD2bpcX85iY=
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 1625 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 48402
;; flags: qr rd ra cd ; qd: 1 an: 3 au: 0 ad: 1
;; QUESTIONS:
;; isc.org., type = DS, class = IN
;; ANSWERS:
isc.org. 1008 IN DS 12892 5 2 F1E184C0E1D615D20EB3C223ACED3B03C773DD952D5F0EB5C777586DE18DA6B5
isc.org. 1008 IN DS 12892 5 1 982113D08B4C6A1D9F6AEE1E2237AEF69F3F9759
isc.org. 1008 IN RRSIG DS 7 2 86400 20150122163315 20150101153315 53348 org. mpNwUFgIi/ahCYVkPlQuyJ+AY6BGiRaLD4cRwBIBNnaGVeR5vHNrGPrOX32mfS38tegrfNjJS4y3icwavPeubuZwGKIja8CBRGhzzFj6JZgydRJpJ+lkKws6+vDhjQ3A8+VerV0TNs8IWXSBa+Vl4Gv+0bX5NlM4RF/7Kyd7lJA=
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 283 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 58766
;; flags: qr rd ra cd ; qd: 1 an: 4 au: 0 ad: 1
;; QUESTIONS:
;; isc.org., type = DNSKEY, class = IN
;; ANSWERS:
isc.org. 7181 IN DNSKEY 257 3 5 BEAAAAOhHQDBrhQbtphgq2wQUpEQ5t4DtUHxoMVFu2hWLDMvoOMRXjGrhhCeFvAZih7yJHf8ZGfW6hd38hXG/xylYCO6Krpbdojwx8YMXLA5/kA+u50WIL8ZR1R6KTbsYVMf/Qx5RiNbPClw+vT+U8eXEJmO20jIS1ULgqy347cBB1zMnnz/4LJpA0da9CbKj3A254T515sNIMcwsB8/2+2E63/zZrQzBkj0BrN/9Bexjpiks3jRhZatEsXn3dTy47R09Uix5WcJt+xzqZ7+ysyLKOOedS39Z7SDmsn2eA0FKtQpwA6LXeG2w+jxmw3oA8lVUgEf/rzeC/bByBNsO70aEFTd
isc.org. 7181 IN DNSKEY 256 3 5 AwEAAbJpDF4RemdHHE/HrJJhR3zpzAQ6zsHqFv0i4lCWTUf4sX+cq3vSu7fKO4QJtm97S1sbcnmHonVE3QPzLOsqsY630Wy5JzrPK3gUvQLgfIsovo2v+dosITL8WbvjU1mEXhIwfuuBhYmYSKySZ0X9gpHGhdxRd+J8M7riPfN7kHLP
isc.org. 7181 IN RRSIG DNSKEY 5 2 7200 20150204230128 20150105230128 4521 isc.org. F7Lm/p8NrLlHT1rzV09lYxakAu7fGcY9sRnZ2uLlq9d3SpXIXGUuudPg61sd1GdqrRRKiRwfXvNsmvpNL2t8B1/k3gpNUT9V/+SBkI99PKNSkXijVToCebFkCIjqgyjPXkXXFB28E8ZhUDjjYp1LAVMGsfBEnaw7NeHg4MQ3v10=
isc.org. 7181 IN RRSIG DNSKEY 5 2 7200 20150204230128 20150105230128 12892 isc.org. KFk6zXeVu/lULIjwpu5pzRonoksbZMC0Y0qr5K7SpzZK0P/pG4iEzDdSVHA8st+QxNxQ7O4aypeo2jxiJT61OfRzUhjKwopTPVRiiREDV7DFU/fEkgCYXWPlOP7w/An0NzIPc5OLxCDovQefKKgrJaA0hjrd+bTeINgLGdmra+b4FCgYusIZ9Cp+iNs/dByc6cGexce0a0JCyu/vBLnjzo0byjckZm/iiL4BPwtqlaV+NyXFgjucAoqegpSoUpAz1ozCNz9CcJ4yfA9HpWdiWLpYdO3hMt8kHJbk2DxJNkkLRdOP6ZES+3RBUgMgo0FnIYCrVC8QYYQGTO8f2cdfBw==
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 923 bytes
###############################################
dnssecjava-1.1.3/src/test/resources/recordings/org_jitsi_dnssec_TestDNames/testDNameToNoDataIsValid 0000664 0000000 0000000 00000017244 13020541473 0033657 0 ustar 00root root 0000000 0000000 #Date: 2015-01-06T22:35:14+01:00
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 20564
;; flags: qr aa rd ra cd ; qd: 1 an: 3 au: 4 ad: 1
;; QUESTIONS:
;; www.alias.ingotronic.ch., type = MX, class = IN
;; ANSWERS:
alias.ingotronic.ch. 300 IN DNAME ingotronic.ch.
alias.ingotronic.ch. 300 IN RRSIG DNAME 5 3 300 20150125000532 20141225234703 17430 ingotronic.ch. GzAO4/bVZ3twjJhR1z1uujUYNI35rtGJi3jlDY6kbwQcaZeiu8WSeln5L90FijEVFVsXsv5rVvOZXAiXk5FP5jZgGg/A6H1iN8nNsVNSzc8XNWBd+Wv4+x0aQKZvcAD++Pcn3EW3nCEcHNdvnqVsjXbtdTJOiPYrvm/iC3QduCI=
www.alias.ingotronic.ch. 300 IN CNAME www.ingotronic.ch.
;; AUTHORITY RECORDS:
ingotronic.ch. 300 IN SOA ns1.ingotronic.ch. admin.ingotronic.ch. 2013032762 300 60 864000 300
ingotronic.ch. 300 IN RRSIG SOA 5 2 300 20150125021244 20141226011244 17430 ingotronic.ch. WDLpp9G0P/rlMBfpFn9sAfpEFoBnQfwyGSXbGCc/LG1FSkJoKLDQYDY696scLNsJgkrzZeJrl0oSSvA8AvRUhYRrmuqWMxTVFgYlRwPwqEMCKUqiVhKGVF4NYemoBiUQC4nJwBZd57xKCiF4AQ4CodBtiZxefJFAlTNE0g2yxtM=
www.ingotronic.ch. 300 IN NSEC z.ingotronic.ch. A AAAA RRSIG NSEC
www.ingotronic.ch. 300 IN RRSIG NSEC 5 3 300 20150125012443 20141226010256 17430 ingotronic.ch. fMbLmn92jrN7YeM4XWcq7/kKLiPB3Ll4yQSLiPRWQw79ZVeNJMkqEqdstEnnTyKu/hAId6YpvMKsJnIfCTVyoO75i6CaEKXOpvf9AT7TstEUj0YKjp4vWvcNs2F2144nrnqnaVFX8ZTxnUV50R+/AsqtKA+2/Tky6SlNhzeWVMI=
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 699 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 12186
;; flags: qr rd ra ad cd ; qd: 1 an: 4 au: 0 ad: 1
;; QUESTIONS:
;; ., type = DNSKEY, class = IN
;; ANSWERS:
. 87359 IN DNSKEY 256 3 8 AwEAAaPD7Y7XIi1MOEREJNTrRhyqsY3gff6JWzg+XCbqut1sbcbvqyssHw8DT1AkRaAC92pO8xuyq5QEgEPL1IHfABLwpwXI5gTj4gdwi86bpkmlWs9fRpnn4DPDCTdrnxIejJXgClHikLJF3u3CdpNCMijq4CKdQbMlRZ3avv+G7rh7
. 87359 IN DNSKEY 257 3 8 AwEAAagAIKlVZrpC6Ia7gEzahOR+9W29euxhJhVVLOyQbSEW0O8gcCjFFVQUTf6v58fLjwBd0YI0EzrAcQqBGCzh/RStIoO8g0NfnfL2MTJRkxoXbfDaUeVPQuYEhg37NZWAJQ9VnMVDxP/VHL496M/QZxkjf5/Efucp2gaDX6RS6CXpoY68LsvPVjR0ZSwzz1apAzvN9dlzEheX7ICJBBtuA6G3LQpzW5hOA2hzCTMjJPJ8LbqF6dsV6DoBQzgul0sGIcGOYl7OyQdXfZ57relSQageu+ipAdTTJ25AsRTAoub8ONGcLmqrAmRLKBP1dfwhYB4N7knNnulqQxA+Uk1ihz0=
. 87359 IN DNSKEY 256 3 8 AwEAAe3fSrbLBy3LOS7pnxEUhvPZTE2H5dIGsI/UfruI/nOEvWWa/PSX2BFedBkEqOlYdjdNF2f+6lmfk2Od/xu0v5bVqxFE+/24v3hZSlWBxvXzPTAGHrbW/IJYEPqlzVOAS4XdUgHg0N7IbLywNHMvB+Yf+Nm6ctyXXFLV4WTNnzs7
. 87359 IN RRSIG DNSKEY 8 0 172800 20150115235959 20150101000000 19036 . i8cAxD2pvQi1oAyvQxRpDfFlbqPzW+69QQEsDwE1eWOm5AtawO9U7lmsGps7sy/fVNvl1ljKBj4Djp9pb3U2FLogjiIlW0cDAkPmLlG9t+b/pjEfBNlhjANUVN06pvQVAfm+LcF26EaWT6FlISBqb6jSy4BHRa3Bdc4Sx7+pRSYSqVVvYxLkfAWsKPqGkvWhebJDndJJV9syXQXgZ+v/uJ+6XOS43xkAdeL8iBzIs/FlwMTfh3tVe3d0lb65IBBLlCzeQuetX+0Vu1YFcnD0mHc/wS2ZnAV5toAFmyVQBoY/XAZiZeaOkcROJ6Zmqezy7liwK7BqsYyAZntMhk8lbg==
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 883 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 60111
;; flags: qr rd ra ad cd ; qd: 1 an: 2 au: 0 ad: 1
;; QUESTIONS:
;; ch., type = DS, class = IN
;; ANSWERS:
ch. 959 IN DS 46375 8 2 8F96646FC68BB7E4AF4C0750A6096FBC0D4ECDA3D3FA6DA06FDDB42EE50C6CF3
ch. 959 IN RRSIG DS 8 1 86400 20150112170000 20150105160000 16665 . thY7xYWBBxiBjqbQIb9fAG4TmQgnziwM7q6P1T3/ITxmECdvOCQnnZA3uD7qmN8uM0HudsD7+y+zgD3rsH4RSTKdL4kHSI0OnCxToMTvklghEgFDezqIRm8NkWdI2H4Stwrj20nYKSpLQxPI2EE54gs18P3KyO8bAUYv8Qx73xU=
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 238 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 24158
;; flags: qr rd ra ad cd ; qd: 1 an: 4 au: 0 ad: 1
;; QUESTIONS:
;; ch., type = DNSKEY, class = IN
;; ANSWERS:
ch. 960 IN DNSKEY 256 3 8 AwEAAcSLdT0fEmcFmLpeUkAJoeVaHKiu+nbuc43fWlqaCRVf8t2HA4uWxOk0O5ci9nrFTc8nq8oa5fk5Cj7CHh4yrX9qUCfTdIWTyp8BDEdJpS+Dyb0u9wQuVj+nQMj4fLzdQf4TJs3/qxuiLr3nL1UUwlhhXeqSqGVb7p3mtB5HJ8ad
ch. 960 IN DNSKEY 256 3 8 AwEAAcsg0kY6fw1wzYMhSAKTy+Y2JzAst66P/1odp9NECJJHbU8f4nwziI3onoFSBV0ZiSZhY1aH5dhdDZ7BkrqhVXSrZPAz0CvzjIxmB1gSOf9DeZvjQvoy97HqYolxsf+B3QQv2RKBT67elF5+JisKg3/dQISelKn8LhabSoVrMlD1
ch. 960 IN DNSKEY 257 3 8 AwEAAb7GhhZ8IAy/AhwmSms5DeQK5ad09wIIplEpYoiAIYXPtJvT1ReFzyfTp/2YP+g/PWDwHPh4qKAHa9x0VgbIQcGAeNakmfkAdWEmCnca323/SAml3mwfaX62G7/uYWae5zh8QTxZKNd+K1yZ5x0IxnI31chSl5xymRbTEHYZDKwSIRFM3fTxUMt93WFaBVWELReYotJBr++rvAWdnlay5TPBTvheLBkaiqtgM4GP8HK07Y+86lsZnEsj5K3G1KTV5SPpa82rqYAwxG9VKbmSE/6/kBR5jJHjt1rRt5Oe7v18aEtw0YCEN4vxq+KuvMoNVqXUsE9LBwHJD+QNwi6wmB0=
ch. 960 IN RRSIG DNSKEY 8 1 86400 20150127100909 20141212090909 46375 ch. bT8q0FWyeMH0SulNo6UdIIgZYNATwYsee2bikq2Gh339Bufma8eaqWIPYT3XKmxYPBFOw0bVl+kLZxTwbR1CFoCDXoP+qgQhh4mf9qkNiv2CDSc+0FE3FRREn+DAhYTUEuB58FPiPakFB8s8O7T+k2qhDae7jy4/y7Jl1lnjaBY8s7bzOUPhF0KKCNZmvoKwtL23ZdVeTSV1xM3jkiNnpzBKbcoSWECSGJVp1SE0BnRXdwQP41YTXFZ0310YjaTAUCC5qbMIWdEkHjfdSQtKBImnc85mkapq9w++XQ4zhauPWBtrPV3CcoCahjUaWdjrKVkibomlJZaN8MEO23CfQw==
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 893 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 19242
;; flags: qr rd ra cd ; qd: 1 an: 3 au: 0 ad: 1
;; QUESTIONS:
;; ingotronic.ch., type = DS, class = IN
;; ANSWERS:
ingotronic.ch. 3568 IN DS 6031 5 1 733D0218B571CD617B1A7493564B9FC4F12ADE82
ingotronic.ch. 3568 IN DS 6031 5 2 4A948F2FDADA24686E473EDAC00DCF972584C75E3FAA92C2021B6221449FF87E
ingotronic.ch. 3568 IN RRSIG DS 8 2 3600 20150129033614 20150105123019 60789 ch. rVPJP2HhzW7OkroK2axFj5Lb4iVWCH8Fp/Iq1rF952NDo72b8RiKje2RaAKJAGQ+wd0YgE+PAej04GCmkhlDJA/zvPeeTxuhy3HbJzReMlQ7fjyH+wW1hli+FuIYvogXWf7nO/9VyPORt8X/f/pjrOr3Vlj9sGLN8TGYpEuVSw4=
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 288 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 60231
;; flags: qr aa rd ra cd ; qd: 1 an: 4 au: 0 ad: 1
;; QUESTIONS:
;; ingotronic.ch., type = DNSKEY, class = IN
;; ANSWERS:
ingotronic.ch. 300 IN DNSKEY 257 3 5 AwEAAeA1vzmjaB+eBAcvhzpKEgAEFpvQ1rg4uKDW6MsQtacKoqBpgyep2+LuWotz5p/xYxj3NGsArwN8Ad5cY0FHRr8miTT0elOv6nvlqGIfRuhj/BXAQ1x4ihpSFslHw0lJMYFwxsUZWpUyjWX/nv1xRZMMwF46gui0N4OEbyTYusCk77D+A71k+K0EAitFIbIH4GCUKmH1H7HmXhSVH9bN/n7KEGwW32lmsuuUcJoRKDkcUvbMXY/9Xoa2quERrUg/rBbDUHowRPjYDS5GzY1+f4YY8s40BufGiqyUTKKXL953MVFK8gmezXA0hbmrnZ7CBOw/7238mORAdzExaX8n7CE=
ingotronic.ch. 300 IN DNSKEY 256 3 5 AwEAAZ2Xh77GFzpEDx7EHYxShqltHgkiG+BOjBGifEmnJhQSdE5/yNSLFNcdhZZ8HUPxYnaedTqJcFFg4AzUsQklF/fECegTJdZjaj2WoL0/I8K7HMfY/hVuRZUWPNglYi8agJRX6gdkFTCpUNI7stpgKqxtzUJhhw15uG/lKMplwqUr
ingotronic.ch. 300 IN RRSIG DNSKEY 5 2 300 20150125003700 20141226001657 6031 ingotronic.ch. rs1QlP2SlSpA2ELbzwg3DgWLzXWL3Lpv6CUJE2Q0qH2Zp7Qdy3cD+ZEtNh9v24Qv1M6JJ3zFt8mmZoCeW2ycuMbJCqBkW9CBuwF+VznZvZY2MxwPipvhvEEGP//0M8YAZJ66yQPDv3PTdAP8FYbIrJyvY44vwyncwbslpfHT9jAsrbfr3vuMuWps86dnP462q+0s1TxBfqi8mzo3gdavjHKWVNwohLahLKT+tWeu6DSzQv0YwMjwtkLgF7QRgx3ctIIkloOrnx9nHH1N6y+hxEB89fOlyVDjHhgL5uVtsD5fEdT0FJ2Gc/2nShEMMqIwr1/J9kUq1mNySff/uEe65Q==
ingotronic.ch. 300 IN RRSIG DNSKEY 5 2 300 20150125003700 20141226001657 17430 ingotronic.ch. mEwZjhQqeWksWD0TCnNBrtce4YkWJL3edqL6PvAUu8Fn+Ih437kEs3+pqdkgRsdYQ9HW+lBm/8pWwJlNAv0bi9NykItXMwAUFtncgq+6Pnh3iAM972GXSa5VV4LcGQ5b8CBdHCHiEKDqyPv5Hr5QfYL/FQaWlcNRh4QZZlZNPFA=
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 940 bytes
###############################################
testDNameToNxDomainIsValid 0000664 0000000 0000000 00000017763 13020541473 0034155 0 ustar 00root root 0000000 0000000 dnssecjava-1.1.3/src/test/resources/recordings/org_jitsi_dnssec_TestDNames #Date: 2015-01-06T22:35:15+01:00
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 49797
;; flags: qr aa rd ra cd ; qd: 1 an: 3 au: 6 ad: 1
;; QUESTIONS:
;; x.alias.ingotronic.ch., type = A, class = IN
;; ANSWERS:
alias.ingotronic.ch. 300 IN DNAME ingotronic.ch.
alias.ingotronic.ch. 300 IN RRSIG DNAME 5 3 300 20150125000532 20141225234703 17430 ingotronic.ch. GzAO4/bVZ3twjJhR1z1uujUYNI35rtGJi3jlDY6kbwQcaZeiu8WSeln5L90FijEVFVsXsv5rVvOZXAiXk5FP5jZgGg/A6H1iN8nNsVNSzc8XNWBd+Wv4+x0aQKZvcAD++Pcn3EW3nCEcHNdvnqVsjXbtdTJOiPYrvm/iC3QduCI=
x.alias.ingotronic.ch. 300 IN CNAME x.ingotronic.ch.
;; AUTHORITY RECORDS:
ingotronic.ch. 300 IN SOA ns1.ingotronic.ch. admin.ingotronic.ch. 2013032762 300 60 864000 300
ingotronic.ch. 300 IN RRSIG SOA 5 2 300 20150125021244 20141226011244 17430 ingotronic.ch. WDLpp9G0P/rlMBfpFn9sAfpEFoBnQfwyGSXbGCc/LG1FSkJoKLDQYDY696scLNsJgkrzZeJrl0oSSvA8AvRUhYRrmuqWMxTVFgYlRwPwqEMCKUqiVhKGVF4NYemoBiUQC4nJwBZd57xKCiF4AQ4CodBtiZxefJFAlTNE0g2yxtM=
ingotronic.ch. 300 IN NSEC alias.ingotronic.ch. A NS SOA RRSIG NSEC DNSKEY
ingotronic.ch. 300 IN RRSIG NSEC 5 2 300 20150125000532 20141225234703 17430 ingotronic.ch. en5BaZ6zWqEvoUFUDPm5g1pjz7THXBv/1kjKtV2tS+7xh0BtkLEzlA9n/H66ZZAX2EIh7vXj12xVJKOuEuM0o1mJwKsBaLQuTra60/zYAUIddwUOCzI3zzjiRFklPyHSnLkGoBODZcvehnsTzTPyBxkfoouleqpj7gN5jOSBL8M=
www.ingotronic.ch. 300 IN NSEC z.ingotronic.ch. A AAAA RRSIG NSEC
www.ingotronic.ch. 300 IN RRSIG NSEC 5 3 300 20150125012443 20141226010256 17430 ingotronic.ch. fMbLmn92jrN7YeM4XWcq7/kKLiPB3Ll4yQSLiPRWQw79ZVeNJMkqEqdstEnnTyKu/hAId6YpvMKsJnIfCTVyoO75i6CaEKXOpvf9AT7TstEUj0YKjp4vWvcNs2F2144nrnqnaVFX8ZTxnUV50R+/AsqtKA+2/Tky6SlNhzeWVMI=
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 914 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 64372
;; flags: qr rd ra ad cd ; qd: 1 an: 4 au: 0 ad: 1
;; QUESTIONS:
;; ., type = DNSKEY, class = IN
;; ANSWERS:
. 87358 IN DNSKEY 256 3 8 AwEAAaPD7Y7XIi1MOEREJNTrRhyqsY3gff6JWzg+XCbqut1sbcbvqyssHw8DT1AkRaAC92pO8xuyq5QEgEPL1IHfABLwpwXI5gTj4gdwi86bpkmlWs9fRpnn4DPDCTdrnxIejJXgClHikLJF3u3CdpNCMijq4CKdQbMlRZ3avv+G7rh7
. 87358 IN DNSKEY 256 3 8 AwEAAe3fSrbLBy3LOS7pnxEUhvPZTE2H5dIGsI/UfruI/nOEvWWa/PSX2BFedBkEqOlYdjdNF2f+6lmfk2Od/xu0v5bVqxFE+/24v3hZSlWBxvXzPTAGHrbW/IJYEPqlzVOAS4XdUgHg0N7IbLywNHMvB+Yf+Nm6ctyXXFLV4WTNnzs7
. 87358 IN DNSKEY 257 3 8 AwEAAagAIKlVZrpC6Ia7gEzahOR+9W29euxhJhVVLOyQbSEW0O8gcCjFFVQUTf6v58fLjwBd0YI0EzrAcQqBGCzh/RStIoO8g0NfnfL2MTJRkxoXbfDaUeVPQuYEhg37NZWAJQ9VnMVDxP/VHL496M/QZxkjf5/Efucp2gaDX6RS6CXpoY68LsvPVjR0ZSwzz1apAzvN9dlzEheX7ICJBBtuA6G3LQpzW5hOA2hzCTMjJPJ8LbqF6dsV6DoBQzgul0sGIcGOYl7OyQdXfZ57relSQageu+ipAdTTJ25AsRTAoub8ONGcLmqrAmRLKBP1dfwhYB4N7knNnulqQxA+Uk1ihz0=
. 87358 IN RRSIG DNSKEY 8 0 172800 20150115235959 20150101000000 19036 . i8cAxD2pvQi1oAyvQxRpDfFlbqPzW+69QQEsDwE1eWOm5AtawO9U7lmsGps7sy/fVNvl1ljKBj4Djp9pb3U2FLogjiIlW0cDAkPmLlG9t+b/pjEfBNlhjANUVN06pvQVAfm+LcF26EaWT6FlISBqb6jSy4BHRa3Bdc4Sx7+pRSYSqVVvYxLkfAWsKPqGkvWhebJDndJJV9syXQXgZ+v/uJ+6XOS43xkAdeL8iBzIs/FlwMTfh3tVe3d0lb65IBBLlCzeQuetX+0Vu1YFcnD0mHc/wS2ZnAV5toAFmyVQBoY/XAZiZeaOkcROJ6Zmqezy7liwK7BqsYyAZntMhk8lbg==
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 883 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 36440
;; flags: qr rd ra ad cd ; qd: 1 an: 2 au: 0 ad: 1
;; QUESTIONS:
;; ch., type = DS, class = IN
;; ANSWERS:
ch. 958 IN DS 46375 8 2 8F96646FC68BB7E4AF4C0750A6096FBC0D4ECDA3D3FA6DA06FDDB42EE50C6CF3
ch. 958 IN RRSIG DS 8 1 86400 20150112170000 20150105160000 16665 . thY7xYWBBxiBjqbQIb9fAG4TmQgnziwM7q6P1T3/ITxmECdvOCQnnZA3uD7qmN8uM0HudsD7+y+zgD3rsH4RSTKdL4kHSI0OnCxToMTvklghEgFDezqIRm8NkWdI2H4Stwrj20nYKSpLQxPI2EE54gs18P3KyO8bAUYv8Qx73xU=
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 238 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 58358
;; flags: qr rd ra ad cd ; qd: 1 an: 4 au: 0 ad: 1
;; QUESTIONS:
;; ch., type = DNSKEY, class = IN
;; ANSWERS:
ch. 959 IN DNSKEY 256 3 8 AwEAAcsg0kY6fw1wzYMhSAKTy+Y2JzAst66P/1odp9NECJJHbU8f4nwziI3onoFSBV0ZiSZhY1aH5dhdDZ7BkrqhVXSrZPAz0CvzjIxmB1gSOf9DeZvjQvoy97HqYolxsf+B3QQv2RKBT67elF5+JisKg3/dQISelKn8LhabSoVrMlD1
ch. 959 IN DNSKEY 256 3 8 AwEAAcSLdT0fEmcFmLpeUkAJoeVaHKiu+nbuc43fWlqaCRVf8t2HA4uWxOk0O5ci9nrFTc8nq8oa5fk5Cj7CHh4yrX9qUCfTdIWTyp8BDEdJpS+Dyb0u9wQuVj+nQMj4fLzdQf4TJs3/qxuiLr3nL1UUwlhhXeqSqGVb7p3mtB5HJ8ad
ch. 959 IN DNSKEY 257 3 8 AwEAAb7GhhZ8IAy/AhwmSms5DeQK5ad09wIIplEpYoiAIYXPtJvT1ReFzyfTp/2YP+g/PWDwHPh4qKAHa9x0VgbIQcGAeNakmfkAdWEmCnca323/SAml3mwfaX62G7/uYWae5zh8QTxZKNd+K1yZ5x0IxnI31chSl5xymRbTEHYZDKwSIRFM3fTxUMt93WFaBVWELReYotJBr++rvAWdnlay5TPBTvheLBkaiqtgM4GP8HK07Y+86lsZnEsj5K3G1KTV5SPpa82rqYAwxG9VKbmSE/6/kBR5jJHjt1rRt5Oe7v18aEtw0YCEN4vxq+KuvMoNVqXUsE9LBwHJD+QNwi6wmB0=
ch. 959 IN RRSIG DNSKEY 8 1 86400 20150127100909 20141212090909 46375 ch. bT8q0FWyeMH0SulNo6UdIIgZYNATwYsee2bikq2Gh339Bufma8eaqWIPYT3XKmxYPBFOw0bVl+kLZxTwbR1CFoCDXoP+qgQhh4mf9qkNiv2CDSc+0FE3FRREn+DAhYTUEuB58FPiPakFB8s8O7T+k2qhDae7jy4/y7Jl1lnjaBY8s7bzOUPhF0KKCNZmvoKwtL23ZdVeTSV1xM3jkiNnpzBKbcoSWECSGJVp1SE0BnRXdwQP41YTXFZ0310YjaTAUCC5qbMIWdEkHjfdSQtKBImnc85mkapq9w++XQ4zhauPWBtrPV3CcoCahjUaWdjrKVkibomlJZaN8MEO23CfQw==
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 893 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 4469
;; flags: qr rd ra cd ; qd: 1 an: 3 au: 0 ad: 1
;; QUESTIONS:
;; ingotronic.ch., type = DS, class = IN
;; ANSWERS:
ingotronic.ch. 3567 IN DS 6031 5 2 4A948F2FDADA24686E473EDAC00DCF972584C75E3FAA92C2021B6221449FF87E
ingotronic.ch. 3567 IN DS 6031 5 1 733D0218B571CD617B1A7493564B9FC4F12ADE82
ingotronic.ch. 3567 IN RRSIG DS 8 2 3600 20150129033614 20150105123019 60789 ch. rVPJP2HhzW7OkroK2axFj5Lb4iVWCH8Fp/Iq1rF952NDo72b8RiKje2RaAKJAGQ+wd0YgE+PAej04GCmkhlDJA/zvPeeTxuhy3HbJzReMlQ7fjyH+wW1hli+FuIYvogXWf7nO/9VyPORt8X/f/pjrOr3Vlj9sGLN8TGYpEuVSw4=
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 288 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 61514
;; flags: qr aa rd ra cd ; qd: 1 an: 4 au: 0 ad: 1
;; QUESTIONS:
;; ingotronic.ch., type = DNSKEY, class = IN
;; ANSWERS:
ingotronic.ch. 300 IN DNSKEY 256 3 5 AwEAAZ2Xh77GFzpEDx7EHYxShqltHgkiG+BOjBGifEmnJhQSdE5/yNSLFNcdhZZ8HUPxYnaedTqJcFFg4AzUsQklF/fECegTJdZjaj2WoL0/I8K7HMfY/hVuRZUWPNglYi8agJRX6gdkFTCpUNI7stpgKqxtzUJhhw15uG/lKMplwqUr
ingotronic.ch. 300 IN DNSKEY 257 3 5 AwEAAeA1vzmjaB+eBAcvhzpKEgAEFpvQ1rg4uKDW6MsQtacKoqBpgyep2+LuWotz5p/xYxj3NGsArwN8Ad5cY0FHRr8miTT0elOv6nvlqGIfRuhj/BXAQ1x4ihpSFslHw0lJMYFwxsUZWpUyjWX/nv1xRZMMwF46gui0N4OEbyTYusCk77D+A71k+K0EAitFIbIH4GCUKmH1H7HmXhSVH9bN/n7KEGwW32lmsuuUcJoRKDkcUvbMXY/9Xoa2quERrUg/rBbDUHowRPjYDS5GzY1+f4YY8s40BufGiqyUTKKXL953MVFK8gmezXA0hbmrnZ7CBOw/7238mORAdzExaX8n7CE=
ingotronic.ch. 300 IN RRSIG DNSKEY 5 2 300 20150125003700 20141226001657 6031 ingotronic.ch. rs1QlP2SlSpA2ELbzwg3DgWLzXWL3Lpv6CUJE2Q0qH2Zp7Qdy3cD+ZEtNh9v24Qv1M6JJ3zFt8mmZoCeW2ycuMbJCqBkW9CBuwF+VznZvZY2MxwPipvhvEEGP//0M8YAZJ66yQPDv3PTdAP8FYbIrJyvY44vwyncwbslpfHT9jAsrbfr3vuMuWps86dnP462q+0s1TxBfqi8mzo3gdavjHKWVNwohLahLKT+tWeu6DSzQv0YwMjwtkLgF7QRgx3ctIIkloOrnx9nHH1N6y+hxEB89fOlyVDjHhgL5uVtsD5fEdT0FJ2Gc/2nShEMMqIwr1/J9kUq1mNySff/uEe65Q==
ingotronic.ch. 300 IN RRSIG DNSKEY 5 2 300 20150125003700 20141226001657 17430 ingotronic.ch. mEwZjhQqeWksWD0TCnNBrtce4YkWJL3edqL6PvAUu8Fn+Ih437kEs3+pqdkgRsdYQ9HW+lBm/8pWwJlNAv0bi9NykItXMwAUFtncgq+6Pnh3iAM972GXSa5VV4LcGQ5b8CBdHCHiEKDqyPv5Hr5QfYL/FQaWlcNRh4QZZlZNPFA=
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 940 bytes
###############################################
testDNameWithFakedCnameIsInvalid 0000664 0000000 0000000 00000034116 13020541473 0035265 0 ustar 00root root 0000000 0000000 dnssecjava-1.1.3/src/test/resources/recordings/org_jitsi_dnssec_TestDNames #Date: 2015-01-06T22:35:15+01:00
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 59873
;; flags: qr aa rd ra cd ; qd: 1 an: 5 au: 2 ad: 3
;; QUESTIONS:
;; www.alias.ingotronic.ch., type = A, class = IN
;; ANSWERS:
alias.ingotronic.ch. 300 IN DNAME ingotronic.ch.
alias.ingotronic.ch. 300 IN RRSIG DNAME 5 3 300 20150125000532 20141225234703 17430 ingotronic.ch. GzAO4/bVZ3twjJhR1z1uujUYNI35rtGJi3jlDY6kbwQcaZeiu8WSeln5L90FijEVFVsXsv5rVvOZXAiXk5FP5jZgGg/A6H1iN8nNsVNSzc8XNWBd+Wv4+x0aQKZvcAD++Pcn3EW3nCEcHNdvnqVsjXbtdTJOiPYrvm/iC3QduCI=
www.alias.ingotronic.ch. 300 IN CNAME www.ingotronic.ch.
www.ingotronic.ch. 300 IN A 127.0.0.1
www.ingotronic.ch. 300 IN RRSIG A 5 3 300 20150125012443 20141226010256 17430 ingotronic.ch. hkD2bkHZKHoJX8cg69j6l1JXE7iYlVFc0iMo3/3hcq4TqieiT2El/9DLfMSxa7XyB/HRDG5Ul61E56pwlCDdxkwemtAuTzjCpqAtvQ5l5OEtTM4i6nijKBkRRzHjh99qDI1jh9GFv3jkTk5m7iaMQemUB4VTjKGLcZHXvWmQLbg=
;; AUTHORITY RECORDS:
ingotronic.ch. 300 IN NS ns1.ingotronic.ch.
ingotronic.ch. 300 IN RRSIG NS 5 2 300 20150125000532 20141225234703 17430 ingotronic.ch. VuzVJM3McSHlcdngCG/G23zCikq8tXE0CZV2ZSgUFXXFMIEoM6PMi1QRQ/8VF3tee4WGpRx2jhtkui0wFRFfwIhW7G1uPDT4qogaR3KLIyuCEsMxhRH3WJZNrLmLqlSBGvd9OBJwbmryqm3Zzqvrk+E+rh8OJeifnBBpHAX4eHg=
;; ADDITIONAL RECORDS:
ns1.ingotronic.ch. 300 IN A 62.192.5.131
ns1.ingotronic.ch. 300 IN RRSIG A 5 3 300 20150125005754 20141226001054 17430 ingotronic.ch. fNG1RZM53pXwBxruHNaSZszxVzNLoCq8VZsTjAzYH2vSLzHXYVGJFTLIeY0K9APAdyJU8WuwmABmn7XY0Kg39kRG77uoFlqUws2PdTz2QKOwJGZY7W88Ak2Y9lkDBcK8o3wJHVptrT8R7p/1U7UfjF0kqPUkakk2B0EbFWdagFg=
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 839 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 32717
;; flags: qr rd ra ad cd ; qd: 1 an: 4 au: 0 ad: 1
;; QUESTIONS:
;; ., type = DNSKEY, class = IN
;; ANSWERS:
. 87358 IN DNSKEY 256 3 8 AwEAAe3fSrbLBy3LOS7pnxEUhvPZTE2H5dIGsI/UfruI/nOEvWWa/PSX2BFedBkEqOlYdjdNF2f+6lmfk2Od/xu0v5bVqxFE+/24v3hZSlWBxvXzPTAGHrbW/IJYEPqlzVOAS4XdUgHg0N7IbLywNHMvB+Yf+Nm6ctyXXFLV4WTNnzs7
. 87358 IN DNSKEY 256 3 8 AwEAAaPD7Y7XIi1MOEREJNTrRhyqsY3gff6JWzg+XCbqut1sbcbvqyssHw8DT1AkRaAC92pO8xuyq5QEgEPL1IHfABLwpwXI5gTj4gdwi86bpkmlWs9fRpnn4DPDCTdrnxIejJXgClHikLJF3u3CdpNCMijq4CKdQbMlRZ3avv+G7rh7
. 87358 IN DNSKEY 257 3 8 AwEAAagAIKlVZrpC6Ia7gEzahOR+9W29euxhJhVVLOyQbSEW0O8gcCjFFVQUTf6v58fLjwBd0YI0EzrAcQqBGCzh/RStIoO8g0NfnfL2MTJRkxoXbfDaUeVPQuYEhg37NZWAJQ9VnMVDxP/VHL496M/QZxkjf5/Efucp2gaDX6RS6CXpoY68LsvPVjR0ZSwzz1apAzvN9dlzEheX7ICJBBtuA6G3LQpzW5hOA2hzCTMjJPJ8LbqF6dsV6DoBQzgul0sGIcGOYl7OyQdXfZ57relSQageu+ipAdTTJ25AsRTAoub8ONGcLmqrAmRLKBP1dfwhYB4N7knNnulqQxA+Uk1ihz0=
. 87358 IN RRSIG DNSKEY 8 0 172800 20150115235959 20150101000000 19036 . i8cAxD2pvQi1oAyvQxRpDfFlbqPzW+69QQEsDwE1eWOm5AtawO9U7lmsGps7sy/fVNvl1ljKBj4Djp9pb3U2FLogjiIlW0cDAkPmLlG9t+b/pjEfBNlhjANUVN06pvQVAfm+LcF26EaWT6FlISBqb6jSy4BHRa3Bdc4Sx7+pRSYSqVVvYxLkfAWsKPqGkvWhebJDndJJV9syXQXgZ+v/uJ+6XOS43xkAdeL8iBzIs/FlwMTfh3tVe3d0lb65IBBLlCzeQuetX+0Vu1YFcnD0mHc/wS2ZnAV5toAFmyVQBoY/XAZiZeaOkcROJ6Zmqezy7liwK7BqsYyAZntMhk8lbg==
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 883 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 22278
;; flags: qr rd ra ad cd ; qd: 1 an: 2 au: 0 ad: 1
;; QUESTIONS:
;; ch., type = DS, class = IN
;; ANSWERS:
ch. 958 IN DS 46375 8 2 8F96646FC68BB7E4AF4C0750A6096FBC0D4ECDA3D3FA6DA06FDDB42EE50C6CF3
ch. 958 IN RRSIG DS 8 1 86400 20150112170000 20150105160000 16665 . thY7xYWBBxiBjqbQIb9fAG4TmQgnziwM7q6P1T3/ITxmECdvOCQnnZA3uD7qmN8uM0HudsD7+y+zgD3rsH4RSTKdL4kHSI0OnCxToMTvklghEgFDezqIRm8NkWdI2H4Stwrj20nYKSpLQxPI2EE54gs18P3KyO8bAUYv8Qx73xU=
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 238 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 39399
;; flags: qr rd ra ad cd ; qd: 1 an: 4 au: 0 ad: 1
;; QUESTIONS:
;; ch., type = DNSKEY, class = IN
;; ANSWERS:
ch. 959 IN DNSKEY 256 3 8 AwEAAcSLdT0fEmcFmLpeUkAJoeVaHKiu+nbuc43fWlqaCRVf8t2HA4uWxOk0O5ci9nrFTc8nq8oa5fk5Cj7CHh4yrX9qUCfTdIWTyp8BDEdJpS+Dyb0u9wQuVj+nQMj4fLzdQf4TJs3/qxuiLr3nL1UUwlhhXeqSqGVb7p3mtB5HJ8ad
ch. 959 IN DNSKEY 257 3 8 AwEAAb7GhhZ8IAy/AhwmSms5DeQK5ad09wIIplEpYoiAIYXPtJvT1ReFzyfTp/2YP+g/PWDwHPh4qKAHa9x0VgbIQcGAeNakmfkAdWEmCnca323/SAml3mwfaX62G7/uYWae5zh8QTxZKNd+K1yZ5x0IxnI31chSl5xymRbTEHYZDKwSIRFM3fTxUMt93WFaBVWELReYotJBr++rvAWdnlay5TPBTvheLBkaiqtgM4GP8HK07Y+86lsZnEsj5K3G1KTV5SPpa82rqYAwxG9VKbmSE/6/kBR5jJHjt1rRt5Oe7v18aEtw0YCEN4vxq+KuvMoNVqXUsE9LBwHJD+QNwi6wmB0=
ch. 959 IN DNSKEY 256 3 8 AwEAAcsg0kY6fw1wzYMhSAKTy+Y2JzAst66P/1odp9NECJJHbU8f4nwziI3onoFSBV0ZiSZhY1aH5dhdDZ7BkrqhVXSrZPAz0CvzjIxmB1gSOf9DeZvjQvoy97HqYolxsf+B3QQv2RKBT67elF5+JisKg3/dQISelKn8LhabSoVrMlD1
ch. 959 IN RRSIG DNSKEY 8 1 86400 20150127100909 20141212090909 46375 ch. bT8q0FWyeMH0SulNo6UdIIgZYNATwYsee2bikq2Gh339Bufma8eaqWIPYT3XKmxYPBFOw0bVl+kLZxTwbR1CFoCDXoP+qgQhh4mf9qkNiv2CDSc+0FE3FRREn+DAhYTUEuB58FPiPakFB8s8O7T+k2qhDae7jy4/y7Jl1lnjaBY8s7bzOUPhF0KKCNZmvoKwtL23ZdVeTSV1xM3jkiNnpzBKbcoSWECSGJVp1SE0BnRXdwQP41YTXFZ0310YjaTAUCC5qbMIWdEkHjfdSQtKBImnc85mkapq9w++XQ4zhauPWBtrPV3CcoCahjUaWdjrKVkibomlJZaN8MEO23CfQw==
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 893 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 30642
;; flags: qr rd ra cd ; qd: 1 an: 3 au: 0 ad: 1
;; QUESTIONS:
;; ingotronic.ch., type = DS, class = IN
;; ANSWERS:
ingotronic.ch. 3567 IN DS 6031 5 2 4A948F2FDADA24686E473EDAC00DCF972584C75E3FAA92C2021B6221449FF87E
ingotronic.ch. 3567 IN DS 6031 5 1 733D0218B571CD617B1A7493564B9FC4F12ADE82
ingotronic.ch. 3567 IN RRSIG DS 8 2 3600 20150129033614 20150105123019 60789 ch. rVPJP2HhzW7OkroK2axFj5Lb4iVWCH8Fp/Iq1rF952NDo72b8RiKje2RaAKJAGQ+wd0YgE+PAej04GCmkhlDJA/zvPeeTxuhy3HbJzReMlQ7fjyH+wW1hli+FuIYvogXWf7nO/9VyPORt8X/f/pjrOr3Vlj9sGLN8TGYpEuVSw4=
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 288 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 634
;; flags: qr aa rd ra cd ; qd: 1 an: 4 au: 0 ad: 1
;; QUESTIONS:
;; ingotronic.ch., type = DNSKEY, class = IN
;; ANSWERS:
ingotronic.ch. 300 IN DNSKEY 256 3 5 AwEAAZ2Xh77GFzpEDx7EHYxShqltHgkiG+BOjBGifEmnJhQSdE5/yNSLFNcdhZZ8HUPxYnaedTqJcFFg4AzUsQklF/fECegTJdZjaj2WoL0/I8K7HMfY/hVuRZUWPNglYi8agJRX6gdkFTCpUNI7stpgKqxtzUJhhw15uG/lKMplwqUr
ingotronic.ch. 300 IN DNSKEY 257 3 5 AwEAAeA1vzmjaB+eBAcvhzpKEgAEFpvQ1rg4uKDW6MsQtacKoqBpgyep2+LuWotz5p/xYxj3NGsArwN8Ad5cY0FHRr8miTT0elOv6nvlqGIfRuhj/BXAQ1x4ihpSFslHw0lJMYFwxsUZWpUyjWX/nv1xRZMMwF46gui0N4OEbyTYusCk77D+A71k+K0EAitFIbIH4GCUKmH1H7HmXhSVH9bN/n7KEGwW32lmsuuUcJoRKDkcUvbMXY/9Xoa2quERrUg/rBbDUHowRPjYDS5GzY1+f4YY8s40BufGiqyUTKKXL953MVFK8gmezXA0hbmrnZ7CBOw/7238mORAdzExaX8n7CE=
ingotronic.ch. 300 IN RRSIG DNSKEY 5 2 300 20150125003700 20141226001657 6031 ingotronic.ch. rs1QlP2SlSpA2ELbzwg3DgWLzXWL3Lpv6CUJE2Q0qH2Zp7Qdy3cD+ZEtNh9v24Qv1M6JJ3zFt8mmZoCeW2ycuMbJCqBkW9CBuwF+VznZvZY2MxwPipvhvEEGP//0M8YAZJ66yQPDv3PTdAP8FYbIrJyvY44vwyncwbslpfHT9jAsrbfr3vuMuWps86dnP462q+0s1TxBfqi8mzo3gdavjHKWVNwohLahLKT+tWeu6DSzQv0YwMjwtkLgF7QRgx3ctIIkloOrnx9nHH1N6y+hxEB89fOlyVDjHhgL5uVtsD5fEdT0FJ2Gc/2nShEMMqIwr1/J9kUq1mNySff/uEe65Q==
ingotronic.ch. 300 IN RRSIG DNSKEY 5 2 300 20150125003700 20141226001657 17430 ingotronic.ch. mEwZjhQqeWksWD0TCnNBrtce4YkWJL3edqL6PvAUu8Fn+Ih437kEs3+pqdkgRsdYQ9HW+lBm/8pWwJlNAv0bi9NykItXMwAUFtncgq+6Pnh3iAM972GXSa5VV4LcGQ5b8CBdHCHiEKDqyPv5Hr5QfYL/FQaWlcNRh4QZZlZNPFA=
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 940 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 21603
;; flags: qr rd ra ad cd ; qd: 1 an: 4 au: 0 ad: 1
;; QUESTIONS:
;; ., type = DNSKEY, class = IN
;; ANSWERS:
. 87358 IN DNSKEY 256 3 8 AwEAAaPD7Y7XIi1MOEREJNTrRhyqsY3gff6JWzg+XCbqut1sbcbvqyssHw8DT1AkRaAC92pO8xuyq5QEgEPL1IHfABLwpwXI5gTj4gdwi86bpkmlWs9fRpnn4DPDCTdrnxIejJXgClHikLJF3u3CdpNCMijq4CKdQbMlRZ3avv+G7rh7
. 87358 IN DNSKEY 256 3 8 AwEAAe3fSrbLBy3LOS7pnxEUhvPZTE2H5dIGsI/UfruI/nOEvWWa/PSX2BFedBkEqOlYdjdNF2f+6lmfk2Od/xu0v5bVqxFE+/24v3hZSlWBxvXzPTAGHrbW/IJYEPqlzVOAS4XdUgHg0N7IbLywNHMvB+Yf+Nm6ctyXXFLV4WTNnzs7
. 87358 IN DNSKEY 257 3 8 AwEAAagAIKlVZrpC6Ia7gEzahOR+9W29euxhJhVVLOyQbSEW0O8gcCjFFVQUTf6v58fLjwBd0YI0EzrAcQqBGCzh/RStIoO8g0NfnfL2MTJRkxoXbfDaUeVPQuYEhg37NZWAJQ9VnMVDxP/VHL496M/QZxkjf5/Efucp2gaDX6RS6CXpoY68LsvPVjR0ZSwzz1apAzvN9dlzEheX7ICJBBtuA6G3LQpzW5hOA2hzCTMjJPJ8LbqF6dsV6DoBQzgul0sGIcGOYl7OyQdXfZ57relSQageu+ipAdTTJ25AsRTAoub8ONGcLmqrAmRLKBP1dfwhYB4N7knNnulqQxA+Uk1ihz0=
. 87358 IN RRSIG DNSKEY 8 0 172800 20150115235959 20150101000000 19036 . i8cAxD2pvQi1oAyvQxRpDfFlbqPzW+69QQEsDwE1eWOm5AtawO9U7lmsGps7sy/fVNvl1ljKBj4Djp9pb3U2FLogjiIlW0cDAkPmLlG9t+b/pjEfBNlhjANUVN06pvQVAfm+LcF26EaWT6FlISBqb6jSy4BHRa3Bdc4Sx7+pRSYSqVVvYxLkfAWsKPqGkvWhebJDndJJV9syXQXgZ+v/uJ+6XOS43xkAdeL8iBzIs/FlwMTfh3tVe3d0lb65IBBLlCzeQuetX+0Vu1YFcnD0mHc/wS2ZnAV5toAFmyVQBoY/XAZiZeaOkcROJ6Zmqezy7liwK7BqsYyAZntMhk8lbg==
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 883 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 64817
;; flags: qr rd ra ad cd ; qd: 1 an: 2 au: 0 ad: 1
;; QUESTIONS:
;; ch., type = DS, class = IN
;; ANSWERS:
ch. 958 IN DS 46375 8 2 8F96646FC68BB7E4AF4C0750A6096FBC0D4ECDA3D3FA6DA06FDDB42EE50C6CF3
ch. 958 IN RRSIG DS 8 1 86400 20150112170000 20150105160000 16665 . thY7xYWBBxiBjqbQIb9fAG4TmQgnziwM7q6P1T3/ITxmECdvOCQnnZA3uD7qmN8uM0HudsD7+y+zgD3rsH4RSTKdL4kHSI0OnCxToMTvklghEgFDezqIRm8NkWdI2H4Stwrj20nYKSpLQxPI2EE54gs18P3KyO8bAUYv8Qx73xU=
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 238 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 11560
;; flags: qr rd ra ad cd ; qd: 1 an: 4 au: 0 ad: 1
;; QUESTIONS:
;; ch., type = DNSKEY, class = IN
;; ANSWERS:
ch. 959 IN DNSKEY 257 3 8 AwEAAb7GhhZ8IAy/AhwmSms5DeQK5ad09wIIplEpYoiAIYXPtJvT1ReFzyfTp/2YP+g/PWDwHPh4qKAHa9x0VgbIQcGAeNakmfkAdWEmCnca323/SAml3mwfaX62G7/uYWae5zh8QTxZKNd+K1yZ5x0IxnI31chSl5xymRbTEHYZDKwSIRFM3fTxUMt93WFaBVWELReYotJBr++rvAWdnlay5TPBTvheLBkaiqtgM4GP8HK07Y+86lsZnEsj5K3G1KTV5SPpa82rqYAwxG9VKbmSE/6/kBR5jJHjt1rRt5Oe7v18aEtw0YCEN4vxq+KuvMoNVqXUsE9LBwHJD+QNwi6wmB0=
ch. 959 IN DNSKEY 256 3 8 AwEAAcsg0kY6fw1wzYMhSAKTy+Y2JzAst66P/1odp9NECJJHbU8f4nwziI3onoFSBV0ZiSZhY1aH5dhdDZ7BkrqhVXSrZPAz0CvzjIxmB1gSOf9DeZvjQvoy97HqYolxsf+B3QQv2RKBT67elF5+JisKg3/dQISelKn8LhabSoVrMlD1
ch. 959 IN DNSKEY 256 3 8 AwEAAcSLdT0fEmcFmLpeUkAJoeVaHKiu+nbuc43fWlqaCRVf8t2HA4uWxOk0O5ci9nrFTc8nq8oa5fk5Cj7CHh4yrX9qUCfTdIWTyp8BDEdJpS+Dyb0u9wQuVj+nQMj4fLzdQf4TJs3/qxuiLr3nL1UUwlhhXeqSqGVb7p3mtB5HJ8ad
ch. 959 IN RRSIG DNSKEY 8 1 86400 20150127100909 20141212090909 46375 ch. bT8q0FWyeMH0SulNo6UdIIgZYNATwYsee2bikq2Gh339Bufma8eaqWIPYT3XKmxYPBFOw0bVl+kLZxTwbR1CFoCDXoP+qgQhh4mf9qkNiv2CDSc+0FE3FRREn+DAhYTUEuB58FPiPakFB8s8O7T+k2qhDae7jy4/y7Jl1lnjaBY8s7bzOUPhF0KKCNZmvoKwtL23ZdVeTSV1xM3jkiNnpzBKbcoSWECSGJVp1SE0BnRXdwQP41YTXFZ0310YjaTAUCC5qbMIWdEkHjfdSQtKBImnc85mkapq9w++XQ4zhauPWBtrPV3CcoCahjUaWdjrKVkibomlJZaN8MEO23CfQw==
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 893 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 24579
;; flags: qr rd ra cd ; qd: 1 an: 3 au: 0 ad: 1
;; QUESTIONS:
;; ingotronic.ch., type = DS, class = IN
;; ANSWERS:
ingotronic.ch. 3567 IN DS 6031 5 1 733D0218B571CD617B1A7493564B9FC4F12ADE82
ingotronic.ch. 3567 IN DS 6031 5 2 4A948F2FDADA24686E473EDAC00DCF972584C75E3FAA92C2021B6221449FF87E
ingotronic.ch. 3567 IN RRSIG DS 8 2 3600 20150129033614 20150105123019 60789 ch. rVPJP2HhzW7OkroK2axFj5Lb4iVWCH8Fp/Iq1rF952NDo72b8RiKje2RaAKJAGQ+wd0YgE+PAej04GCmkhlDJA/zvPeeTxuhy3HbJzReMlQ7fjyH+wW1hli+FuIYvogXWf7nO/9VyPORt8X/f/pjrOr3Vlj9sGLN8TGYpEuVSw4=
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 288 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 3482
;; flags: qr aa rd ra cd ; qd: 1 an: 4 au: 0 ad: 1
;; QUESTIONS:
;; ingotronic.ch., type = DNSKEY, class = IN
;; ANSWERS:
ingotronic.ch. 300 IN DNSKEY 256 3 5 AwEAAZ2Xh77GFzpEDx7EHYxShqltHgkiG+BOjBGifEmnJhQSdE5/yNSLFNcdhZZ8HUPxYnaedTqJcFFg4AzUsQklF/fECegTJdZjaj2WoL0/I8K7HMfY/hVuRZUWPNglYi8agJRX6gdkFTCpUNI7stpgKqxtzUJhhw15uG/lKMplwqUr
ingotronic.ch. 300 IN DNSKEY 257 3 5 AwEAAeA1vzmjaB+eBAcvhzpKEgAEFpvQ1rg4uKDW6MsQtacKoqBpgyep2+LuWotz5p/xYxj3NGsArwN8Ad5cY0FHRr8miTT0elOv6nvlqGIfRuhj/BXAQ1x4ihpSFslHw0lJMYFwxsUZWpUyjWX/nv1xRZMMwF46gui0N4OEbyTYusCk77D+A71k+K0EAitFIbIH4GCUKmH1H7HmXhSVH9bN/n7KEGwW32lmsuuUcJoRKDkcUvbMXY/9Xoa2quERrUg/rBbDUHowRPjYDS5GzY1+f4YY8s40BufGiqyUTKKXL953MVFK8gmezXA0hbmrnZ7CBOw/7238mORAdzExaX8n7CE=
ingotronic.ch. 300 IN RRSIG DNSKEY 5 2 300 20150125003700 20141226001657 6031 ingotronic.ch. rs1QlP2SlSpA2ELbzwg3DgWLzXWL3Lpv6CUJE2Q0qH2Zp7Qdy3cD+ZEtNh9v24Qv1M6JJ3zFt8mmZoCeW2ycuMbJCqBkW9CBuwF+VznZvZY2MxwPipvhvEEGP//0M8YAZJ66yQPDv3PTdAP8FYbIrJyvY44vwyncwbslpfHT9jAsrbfr3vuMuWps86dnP462q+0s1TxBfqi8mzo3gdavjHKWVNwohLahLKT+tWeu6DSzQv0YwMjwtkLgF7QRgx3ctIIkloOrnx9nHH1N6y+hxEB89fOlyVDjHhgL5uVtsD5fEdT0FJ2Gc/2nShEMMqIwr1/J9kUq1mNySff/uEe65Q==
ingotronic.ch. 300 IN RRSIG DNSKEY 5 2 300 20150125003700 20141226001657 17430 ingotronic.ch. mEwZjhQqeWksWD0TCnNBrtce4YkWJL3edqL6PvAUu8Fn+Ih437kEs3+pqdkgRsdYQ9HW+lBm/8pWwJlNAv0bi9NykItXMwAUFtncgq+6Pnh3iAM972GXSa5VV4LcGQ5b8CBdHCHiEKDqyPv5Hr5QfYL/FQaWlcNRh4QZZlZNPFA=
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 940 bytes
###############################################
testDNameWithMultipleCnamesIsInvalid 0000664 0000000 0000000 00000034121 13020541473 0036225 0 ustar 00root root 0000000 0000000 dnssecjava-1.1.3/src/test/resources/recordings/org_jitsi_dnssec_TestDNames #Date: 2015-01-06T22:35:14+01:00
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 49996
;; flags: qr aa rd ra cd ; qd: 1 an: 5 au: 2 ad: 3
;; QUESTIONS:
;; www.alias.ingotronic.ch., type = A, class = IN
;; ANSWERS:
alias.ingotronic.ch. 300 IN DNAME ingotronic.ch.
alias.ingotronic.ch. 300 IN RRSIG DNAME 5 3 300 20150125000532 20141225234703 17430 ingotronic.ch. GzAO4/bVZ3twjJhR1z1uujUYNI35rtGJi3jlDY6kbwQcaZeiu8WSeln5L90FijEVFVsXsv5rVvOZXAiXk5FP5jZgGg/A6H1iN8nNsVNSzc8XNWBd+Wv4+x0aQKZvcAD++Pcn3EW3nCEcHNdvnqVsjXbtdTJOiPYrvm/iC3QduCI=
www.alias.ingotronic.ch. 300 IN CNAME www.ingotronic.ch.
www.ingotronic.ch. 300 IN A 127.0.0.1
www.ingotronic.ch. 300 IN RRSIG A 5 3 300 20150125012443 20141226010256 17430 ingotronic.ch. hkD2bkHZKHoJX8cg69j6l1JXE7iYlVFc0iMo3/3hcq4TqieiT2El/9DLfMSxa7XyB/HRDG5Ul61E56pwlCDdxkwemtAuTzjCpqAtvQ5l5OEtTM4i6nijKBkRRzHjh99qDI1jh9GFv3jkTk5m7iaMQemUB4VTjKGLcZHXvWmQLbg=
;; AUTHORITY RECORDS:
ingotronic.ch. 300 IN NS ns1.ingotronic.ch.
ingotronic.ch. 300 IN RRSIG NS 5 2 300 20150125000532 20141225234703 17430 ingotronic.ch. VuzVJM3McSHlcdngCG/G23zCikq8tXE0CZV2ZSgUFXXFMIEoM6PMi1QRQ/8VF3tee4WGpRx2jhtkui0wFRFfwIhW7G1uPDT4qogaR3KLIyuCEsMxhRH3WJZNrLmLqlSBGvd9OBJwbmryqm3Zzqvrk+E+rh8OJeifnBBpHAX4eHg=
;; ADDITIONAL RECORDS:
ns1.ingotronic.ch. 300 IN A 62.192.5.131
ns1.ingotronic.ch. 300 IN RRSIG A 5 3 300 20150125005754 20141226001054 17430 ingotronic.ch. fNG1RZM53pXwBxruHNaSZszxVzNLoCq8VZsTjAzYH2vSLzHXYVGJFTLIeY0K9APAdyJU8WuwmABmn7XY0Kg39kRG77uoFlqUws2PdTz2QKOwJGZY7W88Ak2Y9lkDBcK8o3wJHVptrT8R7p/1U7UfjF0kqPUkakk2B0EbFWdagFg=
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 839 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 25388
;; flags: qr rd ra ad cd ; qd: 1 an: 4 au: 0 ad: 1
;; QUESTIONS:
;; ., type = DNSKEY, class = IN
;; ANSWERS:
. 87359 IN DNSKEY 257 3 8 AwEAAagAIKlVZrpC6Ia7gEzahOR+9W29euxhJhVVLOyQbSEW0O8gcCjFFVQUTf6v58fLjwBd0YI0EzrAcQqBGCzh/RStIoO8g0NfnfL2MTJRkxoXbfDaUeVPQuYEhg37NZWAJQ9VnMVDxP/VHL496M/QZxkjf5/Efucp2gaDX6RS6CXpoY68LsvPVjR0ZSwzz1apAzvN9dlzEheX7ICJBBtuA6G3LQpzW5hOA2hzCTMjJPJ8LbqF6dsV6DoBQzgul0sGIcGOYl7OyQdXfZ57relSQageu+ipAdTTJ25AsRTAoub8ONGcLmqrAmRLKBP1dfwhYB4N7knNnulqQxA+Uk1ihz0=
. 87359 IN DNSKEY 256 3 8 AwEAAe3fSrbLBy3LOS7pnxEUhvPZTE2H5dIGsI/UfruI/nOEvWWa/PSX2BFedBkEqOlYdjdNF2f+6lmfk2Od/xu0v5bVqxFE+/24v3hZSlWBxvXzPTAGHrbW/IJYEPqlzVOAS4XdUgHg0N7IbLywNHMvB+Yf+Nm6ctyXXFLV4WTNnzs7
. 87359 IN DNSKEY 256 3 8 AwEAAaPD7Y7XIi1MOEREJNTrRhyqsY3gff6JWzg+XCbqut1sbcbvqyssHw8DT1AkRaAC92pO8xuyq5QEgEPL1IHfABLwpwXI5gTj4gdwi86bpkmlWs9fRpnn4DPDCTdrnxIejJXgClHikLJF3u3CdpNCMijq4CKdQbMlRZ3avv+G7rh7
. 87359 IN RRSIG DNSKEY 8 0 172800 20150115235959 20150101000000 19036 . i8cAxD2pvQi1oAyvQxRpDfFlbqPzW+69QQEsDwE1eWOm5AtawO9U7lmsGps7sy/fVNvl1ljKBj4Djp9pb3U2FLogjiIlW0cDAkPmLlG9t+b/pjEfBNlhjANUVN06pvQVAfm+LcF26EaWT6FlISBqb6jSy4BHRa3Bdc4Sx7+pRSYSqVVvYxLkfAWsKPqGkvWhebJDndJJV9syXQXgZ+v/uJ+6XOS43xkAdeL8iBzIs/FlwMTfh3tVe3d0lb65IBBLlCzeQuetX+0Vu1YFcnD0mHc/wS2ZnAV5toAFmyVQBoY/XAZiZeaOkcROJ6Zmqezy7liwK7BqsYyAZntMhk8lbg==
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 883 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 64749
;; flags: qr rd ra ad cd ; qd: 1 an: 2 au: 0 ad: 1
;; QUESTIONS:
;; ch., type = DS, class = IN
;; ANSWERS:
ch. 959 IN DS 46375 8 2 8F96646FC68BB7E4AF4C0750A6096FBC0D4ECDA3D3FA6DA06FDDB42EE50C6CF3
ch. 959 IN RRSIG DS 8 1 86400 20150112170000 20150105160000 16665 . thY7xYWBBxiBjqbQIb9fAG4TmQgnziwM7q6P1T3/ITxmECdvOCQnnZA3uD7qmN8uM0HudsD7+y+zgD3rsH4RSTKdL4kHSI0OnCxToMTvklghEgFDezqIRm8NkWdI2H4Stwrj20nYKSpLQxPI2EE54gs18P3KyO8bAUYv8Qx73xU=
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 238 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 55977
;; flags: qr rd ra ad cd ; qd: 1 an: 4 au: 0 ad: 1
;; QUESTIONS:
;; ch., type = DNSKEY, class = IN
;; ANSWERS:
ch. 960 IN DNSKEY 256 3 8 AwEAAcSLdT0fEmcFmLpeUkAJoeVaHKiu+nbuc43fWlqaCRVf8t2HA4uWxOk0O5ci9nrFTc8nq8oa5fk5Cj7CHh4yrX9qUCfTdIWTyp8BDEdJpS+Dyb0u9wQuVj+nQMj4fLzdQf4TJs3/qxuiLr3nL1UUwlhhXeqSqGVb7p3mtB5HJ8ad
ch. 960 IN DNSKEY 256 3 8 AwEAAcsg0kY6fw1wzYMhSAKTy+Y2JzAst66P/1odp9NECJJHbU8f4nwziI3onoFSBV0ZiSZhY1aH5dhdDZ7BkrqhVXSrZPAz0CvzjIxmB1gSOf9DeZvjQvoy97HqYolxsf+B3QQv2RKBT67elF5+JisKg3/dQISelKn8LhabSoVrMlD1
ch. 960 IN DNSKEY 257 3 8 AwEAAb7GhhZ8IAy/AhwmSms5DeQK5ad09wIIplEpYoiAIYXPtJvT1ReFzyfTp/2YP+g/PWDwHPh4qKAHa9x0VgbIQcGAeNakmfkAdWEmCnca323/SAml3mwfaX62G7/uYWae5zh8QTxZKNd+K1yZ5x0IxnI31chSl5xymRbTEHYZDKwSIRFM3fTxUMt93WFaBVWELReYotJBr++rvAWdnlay5TPBTvheLBkaiqtgM4GP8HK07Y+86lsZnEsj5K3G1KTV5SPpa82rqYAwxG9VKbmSE/6/kBR5jJHjt1rRt5Oe7v18aEtw0YCEN4vxq+KuvMoNVqXUsE9LBwHJD+QNwi6wmB0=
ch. 960 IN RRSIG DNSKEY 8 1 86400 20150127100909 20141212090909 46375 ch. bT8q0FWyeMH0SulNo6UdIIgZYNATwYsee2bikq2Gh339Bufma8eaqWIPYT3XKmxYPBFOw0bVl+kLZxTwbR1CFoCDXoP+qgQhh4mf9qkNiv2CDSc+0FE3FRREn+DAhYTUEuB58FPiPakFB8s8O7T+k2qhDae7jy4/y7Jl1lnjaBY8s7bzOUPhF0KKCNZmvoKwtL23ZdVeTSV1xM3jkiNnpzBKbcoSWECSGJVp1SE0BnRXdwQP41YTXFZ0310YjaTAUCC5qbMIWdEkHjfdSQtKBImnc85mkapq9w++XQ4zhauPWBtrPV3CcoCahjUaWdjrKVkibomlJZaN8MEO23CfQw==
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 893 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 25126
;; flags: qr rd ra cd ; qd: 1 an: 3 au: 0 ad: 1
;; QUESTIONS:
;; ingotronic.ch., type = DS, class = IN
;; ANSWERS:
ingotronic.ch. 3568 IN DS 6031 5 2 4A948F2FDADA24686E473EDAC00DCF972584C75E3FAA92C2021B6221449FF87E
ingotronic.ch. 3568 IN DS 6031 5 1 733D0218B571CD617B1A7493564B9FC4F12ADE82
ingotronic.ch. 3568 IN RRSIG DS 8 2 3600 20150129033614 20150105123019 60789 ch. rVPJP2HhzW7OkroK2axFj5Lb4iVWCH8Fp/Iq1rF952NDo72b8RiKje2RaAKJAGQ+wd0YgE+PAej04GCmkhlDJA/zvPeeTxuhy3HbJzReMlQ7fjyH+wW1hli+FuIYvogXWf7nO/9VyPORt8X/f/pjrOr3Vlj9sGLN8TGYpEuVSw4=
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 288 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 46256
;; flags: qr aa rd ra cd ; qd: 1 an: 4 au: 0 ad: 1
;; QUESTIONS:
;; ingotronic.ch., type = DNSKEY, class = IN
;; ANSWERS:
ingotronic.ch. 300 IN DNSKEY 257 3 5 AwEAAeA1vzmjaB+eBAcvhzpKEgAEFpvQ1rg4uKDW6MsQtacKoqBpgyep2+LuWotz5p/xYxj3NGsArwN8Ad5cY0FHRr8miTT0elOv6nvlqGIfRuhj/BXAQ1x4ihpSFslHw0lJMYFwxsUZWpUyjWX/nv1xRZMMwF46gui0N4OEbyTYusCk77D+A71k+K0EAitFIbIH4GCUKmH1H7HmXhSVH9bN/n7KEGwW32lmsuuUcJoRKDkcUvbMXY/9Xoa2quERrUg/rBbDUHowRPjYDS5GzY1+f4YY8s40BufGiqyUTKKXL953MVFK8gmezXA0hbmrnZ7CBOw/7238mORAdzExaX8n7CE=
ingotronic.ch. 300 IN DNSKEY 256 3 5 AwEAAZ2Xh77GFzpEDx7EHYxShqltHgkiG+BOjBGifEmnJhQSdE5/yNSLFNcdhZZ8HUPxYnaedTqJcFFg4AzUsQklF/fECegTJdZjaj2WoL0/I8K7HMfY/hVuRZUWPNglYi8agJRX6gdkFTCpUNI7stpgKqxtzUJhhw15uG/lKMplwqUr
ingotronic.ch. 300 IN RRSIG DNSKEY 5 2 300 20150125003700 20141226001657 6031 ingotronic.ch. rs1QlP2SlSpA2ELbzwg3DgWLzXWL3Lpv6CUJE2Q0qH2Zp7Qdy3cD+ZEtNh9v24Qv1M6JJ3zFt8mmZoCeW2ycuMbJCqBkW9CBuwF+VznZvZY2MxwPipvhvEEGP//0M8YAZJ66yQPDv3PTdAP8FYbIrJyvY44vwyncwbslpfHT9jAsrbfr3vuMuWps86dnP462q+0s1TxBfqi8mzo3gdavjHKWVNwohLahLKT+tWeu6DSzQv0YwMjwtkLgF7QRgx3ctIIkloOrnx9nHH1N6y+hxEB89fOlyVDjHhgL5uVtsD5fEdT0FJ2Gc/2nShEMMqIwr1/J9kUq1mNySff/uEe65Q==
ingotronic.ch. 300 IN RRSIG DNSKEY 5 2 300 20150125003700 20141226001657 17430 ingotronic.ch. mEwZjhQqeWksWD0TCnNBrtce4YkWJL3edqL6PvAUu8Fn+Ih437kEs3+pqdkgRsdYQ9HW+lBm/8pWwJlNAv0bi9NykItXMwAUFtncgq+6Pnh3iAM972GXSa5VV4LcGQ5b8CBdHCHiEKDqyPv5Hr5QfYL/FQaWlcNRh4QZZlZNPFA=
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 940 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 51913
;; flags: qr rd ra ad cd ; qd: 1 an: 4 au: 0 ad: 1
;; QUESTIONS:
;; ., type = DNSKEY, class = IN
;; ANSWERS:
. 87359 IN DNSKEY 256 3 8 AwEAAe3fSrbLBy3LOS7pnxEUhvPZTE2H5dIGsI/UfruI/nOEvWWa/PSX2BFedBkEqOlYdjdNF2f+6lmfk2Od/xu0v5bVqxFE+/24v3hZSlWBxvXzPTAGHrbW/IJYEPqlzVOAS4XdUgHg0N7IbLywNHMvB+Yf+Nm6ctyXXFLV4WTNnzs7
. 87359 IN DNSKEY 257 3 8 AwEAAagAIKlVZrpC6Ia7gEzahOR+9W29euxhJhVVLOyQbSEW0O8gcCjFFVQUTf6v58fLjwBd0YI0EzrAcQqBGCzh/RStIoO8g0NfnfL2MTJRkxoXbfDaUeVPQuYEhg37NZWAJQ9VnMVDxP/VHL496M/QZxkjf5/Efucp2gaDX6RS6CXpoY68LsvPVjR0ZSwzz1apAzvN9dlzEheX7ICJBBtuA6G3LQpzW5hOA2hzCTMjJPJ8LbqF6dsV6DoBQzgul0sGIcGOYl7OyQdXfZ57relSQageu+ipAdTTJ25AsRTAoub8ONGcLmqrAmRLKBP1dfwhYB4N7knNnulqQxA+Uk1ihz0=
. 87359 IN DNSKEY 256 3 8 AwEAAaPD7Y7XIi1MOEREJNTrRhyqsY3gff6JWzg+XCbqut1sbcbvqyssHw8DT1AkRaAC92pO8xuyq5QEgEPL1IHfABLwpwXI5gTj4gdwi86bpkmlWs9fRpnn4DPDCTdrnxIejJXgClHikLJF3u3CdpNCMijq4CKdQbMlRZ3avv+G7rh7
. 87359 IN RRSIG DNSKEY 8 0 172800 20150115235959 20150101000000 19036 . i8cAxD2pvQi1oAyvQxRpDfFlbqPzW+69QQEsDwE1eWOm5AtawO9U7lmsGps7sy/fVNvl1ljKBj4Djp9pb3U2FLogjiIlW0cDAkPmLlG9t+b/pjEfBNlhjANUVN06pvQVAfm+LcF26EaWT6FlISBqb6jSy4BHRa3Bdc4Sx7+pRSYSqVVvYxLkfAWsKPqGkvWhebJDndJJV9syXQXgZ+v/uJ+6XOS43xkAdeL8iBzIs/FlwMTfh3tVe3d0lb65IBBLlCzeQuetX+0Vu1YFcnD0mHc/wS2ZnAV5toAFmyVQBoY/XAZiZeaOkcROJ6Zmqezy7liwK7BqsYyAZntMhk8lbg==
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 883 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 50080
;; flags: qr rd ra ad cd ; qd: 1 an: 2 au: 0 ad: 1
;; QUESTIONS:
;; ch., type = DS, class = IN
;; ANSWERS:
ch. 959 IN DS 46375 8 2 8F96646FC68BB7E4AF4C0750A6096FBC0D4ECDA3D3FA6DA06FDDB42EE50C6CF3
ch. 959 IN RRSIG DS 8 1 86400 20150112170000 20150105160000 16665 . thY7xYWBBxiBjqbQIb9fAG4TmQgnziwM7q6P1T3/ITxmECdvOCQnnZA3uD7qmN8uM0HudsD7+y+zgD3rsH4RSTKdL4kHSI0OnCxToMTvklghEgFDezqIRm8NkWdI2H4Stwrj20nYKSpLQxPI2EE54gs18P3KyO8bAUYv8Qx73xU=
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 238 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 34534
;; flags: qr rd ra ad cd ; qd: 1 an: 4 au: 0 ad: 1
;; QUESTIONS:
;; ch., type = DNSKEY, class = IN
;; ANSWERS:
ch. 960 IN DNSKEY 256 3 8 AwEAAcsg0kY6fw1wzYMhSAKTy+Y2JzAst66P/1odp9NECJJHbU8f4nwziI3onoFSBV0ZiSZhY1aH5dhdDZ7BkrqhVXSrZPAz0CvzjIxmB1gSOf9DeZvjQvoy97HqYolxsf+B3QQv2RKBT67elF5+JisKg3/dQISelKn8LhabSoVrMlD1
ch. 960 IN DNSKEY 256 3 8 AwEAAcSLdT0fEmcFmLpeUkAJoeVaHKiu+nbuc43fWlqaCRVf8t2HA4uWxOk0O5ci9nrFTc8nq8oa5fk5Cj7CHh4yrX9qUCfTdIWTyp8BDEdJpS+Dyb0u9wQuVj+nQMj4fLzdQf4TJs3/qxuiLr3nL1UUwlhhXeqSqGVb7p3mtB5HJ8ad
ch. 960 IN DNSKEY 257 3 8 AwEAAb7GhhZ8IAy/AhwmSms5DeQK5ad09wIIplEpYoiAIYXPtJvT1ReFzyfTp/2YP+g/PWDwHPh4qKAHa9x0VgbIQcGAeNakmfkAdWEmCnca323/SAml3mwfaX62G7/uYWae5zh8QTxZKNd+K1yZ5x0IxnI31chSl5xymRbTEHYZDKwSIRFM3fTxUMt93WFaBVWELReYotJBr++rvAWdnlay5TPBTvheLBkaiqtgM4GP8HK07Y+86lsZnEsj5K3G1KTV5SPpa82rqYAwxG9VKbmSE/6/kBR5jJHjt1rRt5Oe7v18aEtw0YCEN4vxq+KuvMoNVqXUsE9LBwHJD+QNwi6wmB0=
ch. 960 IN RRSIG DNSKEY 8 1 86400 20150127100909 20141212090909 46375 ch. bT8q0FWyeMH0SulNo6UdIIgZYNATwYsee2bikq2Gh339Bufma8eaqWIPYT3XKmxYPBFOw0bVl+kLZxTwbR1CFoCDXoP+qgQhh4mf9qkNiv2CDSc+0FE3FRREn+DAhYTUEuB58FPiPakFB8s8O7T+k2qhDae7jy4/y7Jl1lnjaBY8s7bzOUPhF0KKCNZmvoKwtL23ZdVeTSV1xM3jkiNnpzBKbcoSWECSGJVp1SE0BnRXdwQP41YTXFZ0310YjaTAUCC5qbMIWdEkHjfdSQtKBImnc85mkapq9w++XQ4zhauPWBtrPV3CcoCahjUaWdjrKVkibomlJZaN8MEO23CfQw==
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 893 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 31593
;; flags: qr rd ra cd ; qd: 1 an: 3 au: 0 ad: 1
;; QUESTIONS:
;; ingotronic.ch., type = DS, class = IN
;; ANSWERS:
ingotronic.ch. 3568 IN DS 6031 5 1 733D0218B571CD617B1A7493564B9FC4F12ADE82
ingotronic.ch. 3568 IN DS 6031 5 2 4A948F2FDADA24686E473EDAC00DCF972584C75E3FAA92C2021B6221449FF87E
ingotronic.ch. 3568 IN RRSIG DS 8 2 3600 20150129033614 20150105123019 60789 ch. rVPJP2HhzW7OkroK2axFj5Lb4iVWCH8Fp/Iq1rF952NDo72b8RiKje2RaAKJAGQ+wd0YgE+PAej04GCmkhlDJA/zvPeeTxuhy3HbJzReMlQ7fjyH+wW1hli+FuIYvogXWf7nO/9VyPORt8X/f/pjrOr3Vlj9sGLN8TGYpEuVSw4=
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 288 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 43999
;; flags: qr aa rd ra cd ; qd: 1 an: 4 au: 0 ad: 1
;; QUESTIONS:
;; ingotronic.ch., type = DNSKEY, class = IN
;; ANSWERS:
ingotronic.ch. 300 IN DNSKEY 256 3 5 AwEAAZ2Xh77GFzpEDx7EHYxShqltHgkiG+BOjBGifEmnJhQSdE5/yNSLFNcdhZZ8HUPxYnaedTqJcFFg4AzUsQklF/fECegTJdZjaj2WoL0/I8K7HMfY/hVuRZUWPNglYi8agJRX6gdkFTCpUNI7stpgKqxtzUJhhw15uG/lKMplwqUr
ingotronic.ch. 300 IN DNSKEY 257 3 5 AwEAAeA1vzmjaB+eBAcvhzpKEgAEFpvQ1rg4uKDW6MsQtacKoqBpgyep2+LuWotz5p/xYxj3NGsArwN8Ad5cY0FHRr8miTT0elOv6nvlqGIfRuhj/BXAQ1x4ihpSFslHw0lJMYFwxsUZWpUyjWX/nv1xRZMMwF46gui0N4OEbyTYusCk77D+A71k+K0EAitFIbIH4GCUKmH1H7HmXhSVH9bN/n7KEGwW32lmsuuUcJoRKDkcUvbMXY/9Xoa2quERrUg/rBbDUHowRPjYDS5GzY1+f4YY8s40BufGiqyUTKKXL953MVFK8gmezXA0hbmrnZ7CBOw/7238mORAdzExaX8n7CE=
ingotronic.ch. 300 IN RRSIG DNSKEY 5 2 300 20150125003700 20141226001657 6031 ingotronic.ch. rs1QlP2SlSpA2ELbzwg3DgWLzXWL3Lpv6CUJE2Q0qH2Zp7Qdy3cD+ZEtNh9v24Qv1M6JJ3zFt8mmZoCeW2ycuMbJCqBkW9CBuwF+VznZvZY2MxwPipvhvEEGP//0M8YAZJ66yQPDv3PTdAP8FYbIrJyvY44vwyncwbslpfHT9jAsrbfr3vuMuWps86dnP462q+0s1TxBfqi8mzo3gdavjHKWVNwohLahLKT+tWeu6DSzQv0YwMjwtkLgF7QRgx3ctIIkloOrnx9nHH1N6y+hxEB89fOlyVDjHhgL5uVtsD5fEdT0FJ2Gc/2nShEMMqIwr1/J9kUq1mNySff/uEe65Q==
ingotronic.ch. 300 IN RRSIG DNSKEY 5 2 300 20150125003700 20141226001657 17430 ingotronic.ch. mEwZjhQqeWksWD0TCnNBrtce4YkWJL3edqL6PvAUu8Fn+Ih437kEs3+pqdkgRsdYQ9HW+lBm/8pWwJlNAv0bi9NykItXMwAUFtncgq+6Pnh3iAM972GXSa5VV4LcGQ5b8CBdHCHiEKDqyPv5Hr5QfYL/FQaWlcNRh4QZZlZNPFA=
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 940 bytes
###############################################
testDNameWithNoCnameIsValid 0000664 0000000 0000000 00000072364 13020541473 0034307 0 ustar 00root root 0000000 0000000 dnssecjava-1.1.3/src/test/resources/recordings/org_jitsi_dnssec_TestDNames #Date: 2015-01-06T22:35:16+01:00
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 13618
;; flags: qr aa rd ra cd ; qd: 1 an: 5 au: 5 ad: 11
;; QUESTIONS:
;; www.isc.ingotronic.ch., type = A, class = IN
;; ANSWERS:
isc.ingotronic.ch. 300 IN DNAME isc.org.
isc.ingotronic.ch. 300 IN RRSIG DNAME 5 3 300 20150125010136 20141226005030 17430 ingotronic.ch. Lq+1VhRumvgwRCg2inz0FZkNn28FaHbc2lfie4WJ6ScNxtvGmQwaVc7nGt5xcxQEZZc609yr+kEuYEHMckSiCoEY6jy7/qI9e2vGYe1UGzT2bbjWZ6j/v40kE7x/dWybFAcpaWJyi6x+Nx6n3EsNe30TqPLO9kGzuumYDHNnVMs=
www.isc.ingotronic.ch. 300 IN CNAME www.isc.org.
www.isc.org. 44 IN A 149.20.64.69
www.isc.org. 44 IN RRSIG A 5 3 60 20150204233244 20150105233244 4521 isc.org. qX9Fqzc+cUB7TUgdAPDQztt+3L7A2TxqVPTGZht3gKb1oBizum2zL3Le6lSO/DI2b526/n+l6gyT7ZtSL058wmEWhXeFlurPojBEBCWYLBkJ7OBLTqMSKzVNN1zpdUIs2RA8QqLOhSWeFkBw0bcJaDnRC2uKr0513aMVJfk5uA8=
;; AUTHORITY RECORDS:
isc.org. 1011 IN NS ord.sns-pb.isc.org.
isc.org. 1011 IN NS ns.isc.afilias-nst.info.
isc.org. 1011 IN NS sfba.sns-pb.isc.org.
isc.org. 1011 IN NS ams.sns-pb.isc.org.
isc.org. 1011 IN RRSIG NS 5 2 7200 20150204233244 20150105233244 4521 isc.org. Olb3QQHiezY6ysFepLUtePsgyVqXgECmLMROkbaAJT5ndTyoMHy4NaX/zFc63LtvzilrS59l9x719c4Pcm37zuEEdKB1IdjtxYKzKqmCzJZ5GuSZ6XgLO2DPWoF2ws+1BVPJL2myZdoBeEu+cUxCLTsETOloSl9Jz5livJ+Xbxo=
;; ADDITIONAL RECORDS:
ns.isc.afilias-nst.info. 1011 IN A 199.254.63.254
ns.isc.afilias-nst.info. 1011 IN AAAA 2001:500:2c:0:0:0:0:254
ams.sns-pb.isc.org. 1011 IN A 199.6.1.30
ams.sns-pb.isc.org. 1011 IN AAAA 2001:500:60:0:0:0:0:30
ord.sns-pb.isc.org. 1011 IN A 199.6.0.30
ord.sns-pb.isc.org. 1011 IN AAAA 2001:500:71:0:0:0:0:30
sfba.sns-pb.isc.org. 1011 IN A 149.20.64.3
sfba.sns-pb.isc.org. 1011 IN AAAA 2001:4f8:0:2:0:0:0:19
ams.sns-pb.isc.org. 7184 IN RRSIG A 5 4 7200 20150204233244 20150105233244 4521 isc.org. SEjuacdGLjteFKFrB0UTyTcEjEP/VtAKeNWD6DqXLA4839PAk17M1qzCf13uKBGwtb9e1xr3U/GDlIhspbSkSNOIWBzfkKiM8PXQ9kZZuYaPrrz2sz5CzzyzThkz4bq4BicQwKNi/aD/ljLaCIWZDXfZwJabo0Uz+G3QlIq18YE=
ams.sns-pb.isc.org. 7184 IN RRSIG AAAA 5 4 7200 20150204233244 20150105233244 4521 isc.org. EGLJUSGvW1gxEUglZKYLS2NmlJsPNzZQFZSORxTKIXqgF+0A2fZpk+/vkGwxiwqkOsV5Tu7kXUFzC7fIWEI7VDn/L8XKLz575upoMoGvA3bAZ/7VWXjLSXbyTFrDTP9GKSA4knIRtrIsOY+dKieSwIGV6sykBYA8ONMpPcj0sCY=
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 1221 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 32562
;; flags: qr rd ra ad cd ; qd: 1 an: 4 au: 0 ad: 1
;; QUESTIONS:
;; ., type = DNSKEY, class = IN
;; ANSWERS:
. 87358 IN DNSKEY 256 3 8 AwEAAaPD7Y7XIi1MOEREJNTrRhyqsY3gff6JWzg+XCbqut1sbcbvqyssHw8DT1AkRaAC92pO8xuyq5QEgEPL1IHfABLwpwXI5gTj4gdwi86bpkmlWs9fRpnn4DPDCTdrnxIejJXgClHikLJF3u3CdpNCMijq4CKdQbMlRZ3avv+G7rh7
. 87358 IN DNSKEY 256 3 8 AwEAAe3fSrbLBy3LOS7pnxEUhvPZTE2H5dIGsI/UfruI/nOEvWWa/PSX2BFedBkEqOlYdjdNF2f+6lmfk2Od/xu0v5bVqxFE+/24v3hZSlWBxvXzPTAGHrbW/IJYEPqlzVOAS4XdUgHg0N7IbLywNHMvB+Yf+Nm6ctyXXFLV4WTNnzs7
. 87358 IN DNSKEY 257 3 8 AwEAAagAIKlVZrpC6Ia7gEzahOR+9W29euxhJhVVLOyQbSEW0O8gcCjFFVQUTf6v58fLjwBd0YI0EzrAcQqBGCzh/RStIoO8g0NfnfL2MTJRkxoXbfDaUeVPQuYEhg37NZWAJQ9VnMVDxP/VHL496M/QZxkjf5/Efucp2gaDX6RS6CXpoY68LsvPVjR0ZSwzz1apAzvN9dlzEheX7ICJBBtuA6G3LQpzW5hOA2hzCTMjJPJ8LbqF6dsV6DoBQzgul0sGIcGOYl7OyQdXfZ57relSQageu+ipAdTTJ25AsRTAoub8ONGcLmqrAmRLKBP1dfwhYB4N7knNnulqQxA+Uk1ihz0=
. 87358 IN RRSIG DNSKEY 8 0 172800 20150115235959 20150101000000 19036 . i8cAxD2pvQi1oAyvQxRpDfFlbqPzW+69QQEsDwE1eWOm5AtawO9U7lmsGps7sy/fVNvl1ljKBj4Djp9pb3U2FLogjiIlW0cDAkPmLlG9t+b/pjEfBNlhjANUVN06pvQVAfm+LcF26EaWT6FlISBqb6jSy4BHRa3Bdc4Sx7+pRSYSqVVvYxLkfAWsKPqGkvWhebJDndJJV9syXQXgZ+v/uJ+6XOS43xkAdeL8iBzIs/FlwMTfh3tVe3d0lb65IBBLlCzeQuetX+0Vu1YFcnD0mHc/wS2ZnAV5toAFmyVQBoY/XAZiZeaOkcROJ6Zmqezy7liwK7BqsYyAZntMhk8lbg==
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 883 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 51051
;; flags: qr rd ra ad cd ; qd: 1 an: 2 au: 0 ad: 1
;; QUESTIONS:
;; ch., type = DS, class = IN
;; ANSWERS:
ch. 958 IN DS 46375 8 2 8F96646FC68BB7E4AF4C0750A6096FBC0D4ECDA3D3FA6DA06FDDB42EE50C6CF3
ch. 958 IN RRSIG DS 8 1 86400 20150112170000 20150105160000 16665 . thY7xYWBBxiBjqbQIb9fAG4TmQgnziwM7q6P1T3/ITxmECdvOCQnnZA3uD7qmN8uM0HudsD7+y+zgD3rsH4RSTKdL4kHSI0OnCxToMTvklghEgFDezqIRm8NkWdI2H4Stwrj20nYKSpLQxPI2EE54gs18P3KyO8bAUYv8Qx73xU=
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 238 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 19837
;; flags: qr rd ra ad cd ; qd: 1 an: 4 au: 0 ad: 1
;; QUESTIONS:
;; ch., type = DNSKEY, class = IN
;; ANSWERS:
ch. 959 IN DNSKEY 257 3 8 AwEAAb7GhhZ8IAy/AhwmSms5DeQK5ad09wIIplEpYoiAIYXPtJvT1ReFzyfTp/2YP+g/PWDwHPh4qKAHa9x0VgbIQcGAeNakmfkAdWEmCnca323/SAml3mwfaX62G7/uYWae5zh8QTxZKNd+K1yZ5x0IxnI31chSl5xymRbTEHYZDKwSIRFM3fTxUMt93WFaBVWELReYotJBr++rvAWdnlay5TPBTvheLBkaiqtgM4GP8HK07Y+86lsZnEsj5K3G1KTV5SPpa82rqYAwxG9VKbmSE/6/kBR5jJHjt1rRt5Oe7v18aEtw0YCEN4vxq+KuvMoNVqXUsE9LBwHJD+QNwi6wmB0=
ch. 959 IN DNSKEY 256 3 8 AwEAAcSLdT0fEmcFmLpeUkAJoeVaHKiu+nbuc43fWlqaCRVf8t2HA4uWxOk0O5ci9nrFTc8nq8oa5fk5Cj7CHh4yrX9qUCfTdIWTyp8BDEdJpS+Dyb0u9wQuVj+nQMj4fLzdQf4TJs3/qxuiLr3nL1UUwlhhXeqSqGVb7p3mtB5HJ8ad
ch. 959 IN DNSKEY 256 3 8 AwEAAcsg0kY6fw1wzYMhSAKTy+Y2JzAst66P/1odp9NECJJHbU8f4nwziI3onoFSBV0ZiSZhY1aH5dhdDZ7BkrqhVXSrZPAz0CvzjIxmB1gSOf9DeZvjQvoy97HqYolxsf+B3QQv2RKBT67elF5+JisKg3/dQISelKn8LhabSoVrMlD1
ch. 959 IN RRSIG DNSKEY 8 1 86400 20150127100909 20141212090909 46375 ch. bT8q0FWyeMH0SulNo6UdIIgZYNATwYsee2bikq2Gh339Bufma8eaqWIPYT3XKmxYPBFOw0bVl+kLZxTwbR1CFoCDXoP+qgQhh4mf9qkNiv2CDSc+0FE3FRREn+DAhYTUEuB58FPiPakFB8s8O7T+k2qhDae7jy4/y7Jl1lnjaBY8s7bzOUPhF0KKCNZmvoKwtL23ZdVeTSV1xM3jkiNnpzBKbcoSWECSGJVp1SE0BnRXdwQP41YTXFZ0310YjaTAUCC5qbMIWdEkHjfdSQtKBImnc85mkapq9w++XQ4zhauPWBtrPV3CcoCahjUaWdjrKVkibomlJZaN8MEO23CfQw==
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 893 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 24177
;; flags: qr rd ra cd ; qd: 1 an: 3 au: 0 ad: 1
;; QUESTIONS:
;; ingotronic.ch., type = DS, class = IN
;; ANSWERS:
ingotronic.ch. 3567 IN DS 6031 5 1 733D0218B571CD617B1A7493564B9FC4F12ADE82
ingotronic.ch. 3567 IN DS 6031 5 2 4A948F2FDADA24686E473EDAC00DCF972584C75E3FAA92C2021B6221449FF87E
ingotronic.ch. 3567 IN RRSIG DS 8 2 3600 20150129033614 20150105123019 60789 ch. rVPJP2HhzW7OkroK2axFj5Lb4iVWCH8Fp/Iq1rF952NDo72b8RiKje2RaAKJAGQ+wd0YgE+PAej04GCmkhlDJA/zvPeeTxuhy3HbJzReMlQ7fjyH+wW1hli+FuIYvogXWf7nO/9VyPORt8X/f/pjrOr3Vlj9sGLN8TGYpEuVSw4=
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 288 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 9736
;; flags: qr aa rd ra cd ; qd: 1 an: 4 au: 0 ad: 1
;; QUESTIONS:
;; ingotronic.ch., type = DNSKEY, class = IN
;; ANSWERS:
ingotronic.ch. 300 IN DNSKEY 257 3 5 AwEAAeA1vzmjaB+eBAcvhzpKEgAEFpvQ1rg4uKDW6MsQtacKoqBpgyep2+LuWotz5p/xYxj3NGsArwN8Ad5cY0FHRr8miTT0elOv6nvlqGIfRuhj/BXAQ1x4ihpSFslHw0lJMYFwxsUZWpUyjWX/nv1xRZMMwF46gui0N4OEbyTYusCk77D+A71k+K0EAitFIbIH4GCUKmH1H7HmXhSVH9bN/n7KEGwW32lmsuuUcJoRKDkcUvbMXY/9Xoa2quERrUg/rBbDUHowRPjYDS5GzY1+f4YY8s40BufGiqyUTKKXL953MVFK8gmezXA0hbmrnZ7CBOw/7238mORAdzExaX8n7CE=
ingotronic.ch. 300 IN DNSKEY 256 3 5 AwEAAZ2Xh77GFzpEDx7EHYxShqltHgkiG+BOjBGifEmnJhQSdE5/yNSLFNcdhZZ8HUPxYnaedTqJcFFg4AzUsQklF/fECegTJdZjaj2WoL0/I8K7HMfY/hVuRZUWPNglYi8agJRX6gdkFTCpUNI7stpgKqxtzUJhhw15uG/lKMplwqUr
ingotronic.ch. 300 IN RRSIG DNSKEY 5 2 300 20150125003700 20141226001657 6031 ingotronic.ch. rs1QlP2SlSpA2ELbzwg3DgWLzXWL3Lpv6CUJE2Q0qH2Zp7Qdy3cD+ZEtNh9v24Qv1M6JJ3zFt8mmZoCeW2ycuMbJCqBkW9CBuwF+VznZvZY2MxwPipvhvEEGP//0M8YAZJ66yQPDv3PTdAP8FYbIrJyvY44vwyncwbslpfHT9jAsrbfr3vuMuWps86dnP462q+0s1TxBfqi8mzo3gdavjHKWVNwohLahLKT+tWeu6DSzQv0YwMjwtkLgF7QRgx3ctIIkloOrnx9nHH1N6y+hxEB89fOlyVDjHhgL5uVtsD5fEdT0FJ2Gc/2nShEMMqIwr1/J9kUq1mNySff/uEe65Q==
ingotronic.ch. 300 IN RRSIG DNSKEY 5 2 300 20150125003700 20141226001657 17430 ingotronic.ch. mEwZjhQqeWksWD0TCnNBrtce4YkWJL3edqL6PvAUu8Fn+Ih437kEs3+pqdkgRsdYQ9HW+lBm/8pWwJlNAv0bi9NykItXMwAUFtncgq+6Pnh3iAM972GXSa5VV4LcGQ5b8CBdHCHiEKDqyPv5Hr5QfYL/FQaWlcNRh4QZZlZNPFA=
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 940 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 27756
;; flags: qr rd ra ad cd ; qd: 1 an: 4 au: 0 ad: 1
;; QUESTIONS:
;; ., type = DNSKEY, class = IN
;; ANSWERS:
. 87357 IN DNSKEY 257 3 8 AwEAAagAIKlVZrpC6Ia7gEzahOR+9W29euxhJhVVLOyQbSEW0O8gcCjFFVQUTf6v58fLjwBd0YI0EzrAcQqBGCzh/RStIoO8g0NfnfL2MTJRkxoXbfDaUeVPQuYEhg37NZWAJQ9VnMVDxP/VHL496M/QZxkjf5/Efucp2gaDX6RS6CXpoY68LsvPVjR0ZSwzz1apAzvN9dlzEheX7ICJBBtuA6G3LQpzW5hOA2hzCTMjJPJ8LbqF6dsV6DoBQzgul0sGIcGOYl7OyQdXfZ57relSQageu+ipAdTTJ25AsRTAoub8ONGcLmqrAmRLKBP1dfwhYB4N7knNnulqQxA+Uk1ihz0=
. 87357 IN DNSKEY 256 3 8 AwEAAaPD7Y7XIi1MOEREJNTrRhyqsY3gff6JWzg+XCbqut1sbcbvqyssHw8DT1AkRaAC92pO8xuyq5QEgEPL1IHfABLwpwXI5gTj4gdwi86bpkmlWs9fRpnn4DPDCTdrnxIejJXgClHikLJF3u3CdpNCMijq4CKdQbMlRZ3avv+G7rh7
. 87357 IN DNSKEY 256 3 8 AwEAAe3fSrbLBy3LOS7pnxEUhvPZTE2H5dIGsI/UfruI/nOEvWWa/PSX2BFedBkEqOlYdjdNF2f+6lmfk2Od/xu0v5bVqxFE+/24v3hZSlWBxvXzPTAGHrbW/IJYEPqlzVOAS4XdUgHg0N7IbLywNHMvB+Yf+Nm6ctyXXFLV4WTNnzs7
. 87357 IN RRSIG DNSKEY 8 0 172800 20150115235959 20150101000000 19036 . i8cAxD2pvQi1oAyvQxRpDfFlbqPzW+69QQEsDwE1eWOm5AtawO9U7lmsGps7sy/fVNvl1ljKBj4Djp9pb3U2FLogjiIlW0cDAkPmLlG9t+b/pjEfBNlhjANUVN06pvQVAfm+LcF26EaWT6FlISBqb6jSy4BHRa3Bdc4Sx7+pRSYSqVVvYxLkfAWsKPqGkvWhebJDndJJV9syXQXgZ+v/uJ+6XOS43xkAdeL8iBzIs/FlwMTfh3tVe3d0lb65IBBLlCzeQuetX+0Vu1YFcnD0mHc/wS2ZnAV5toAFmyVQBoY/XAZiZeaOkcROJ6Zmqezy7liwK7BqsYyAZntMhk8lbg==
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 883 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 7390
;; flags: qr rd ra cd ; qd: 1 an: 3 au: 0 ad: 1
;; QUESTIONS:
;; org., type = DS, class = IN
;; ANSWERS:
org. 1006 IN DS 21366 7 1 E6C1716CFB6BDC84E84CE1AB5510DAC69173B5B2
org. 1006 IN DS 21366 7 2 96EEB2FFD9B00CD4694E78278B5EFDAB0A80446567B69F634DA078F0D90F01BA
org. 1006 IN RRSIG DS 8 1 86400 20150112170000 20150105160000 16665 . TeNrVbBDgqdrbpdIweTad3yMLn+APxxlDpr717kqNgkOc8OxLFE/pFGzfSCYfc5hlMNB/nY1XhIJbWwvd26xOjwcB1rK3yo/Cfa5Pt4P+qV45QYW2JlatQVQPHtgMOf1KvUzXy4DlKzE5yHvHNGscfMOgIDeyWyDS8XwdrEIRR0=
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 275 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 34399
;; flags: qr rd ra cd ; qd: 1 an: 7 au: 0 ad: 1
;; QUESTIONS:
;; org., type = DNSKEY, class = IN
;; ANSWERS:
org. 882 IN DNSKEY 257 3 7 AwEAAYpYfj3aaRzzkxWQqMdl7YExY81NdYSv+qayuZDodnZ9IMh0bwMcYaVUdzNAbVeJ8gd6jq1sR3VvP/SR36mmGssbV4Udl5ORDtqiZP2TDNDHxEnKKTX+jWfytZeT7d3AbSzBKC0v7uZrM6M2eoJnl6id66rEUmQC2p9DrrDg9F6tXC9CD/zC7/y+BNNpiOdnM5DXk7HhZm7ra9E7ltL13h2mx7kEgU8e6npJlCoXjraIBgUDthYs48W/sdTDLu7N59rjCG+bpil+c8oZ9f7NR3qmSTpTP1m86RqUQnVErifrH8KjDqL+3wzUdF5ACkYwt1XhPVPU+wSIlzbaAQN49PU=
org. 882 IN DNSKEY 257 3 7 AwEAAZTjbIO5kIpxWUtyXc8avsKyHIIZ+LjC2Dv8naO+Tz6X2fqzDC1bdq7HlZwtkaqTkMVVJ+8gE9FIreGJ4c8G1GdbjQgbP1OyYIG7OHTc4hv5T2NlyWr6k6QFz98Q4zwFIGTFVvwBhmrMDYsOTtXakK6QwHovA1+83BsUACxlidpwB0hQacbD6x+I2RCDzYuTzj64Jv0/9XsX6AYV3ebcgn4hL1jIR2eJYyXlrAoWxdzxcW//5yeL5RVWuhRxejmnSVnCuxkfS4AQ485KH2tpdbWcCopLJZs6tw8q3jWcpTGzdh/v3xdYfNpQNcPImFlxAun3BtORPA2r8ti6MNoJEHU=
org. 882 IN DNSKEY 256 3 7 AwEAAawm+6jDEf5ymhSAeQKaJrF0FTdqp4T0F1SE/KSFEcd/MUaBW0J8NyrJZXQJ0I3KpvXJSk3b0Z3X8StBpngUWOa9/iePG5WaR8Edj0JENd6Cy1R7WawrtYAfQ1AWnvGTbvf0rFa2GcMfhyNKeY8UO5TWKECE4AF4C+LlGe12TICh
org. 882 IN DNSKEY 256 3 7 AwEAAXTZXCkp3UaDofhKlicjaZR/XeMFVkRSXRZsYP9OBRFZB44675hHORNE+QAijMdWOQeQt1SUWGyeJ5SHPVirGVxt9wCCqOeMTx7WvImZAKuqUl9H5N3Wn6FRidaub7d76IjxKZbkAHhGSJSzRTuuHbyjtrJVGcJ18kZHELyIsqZ3
org. 882 IN RRSIG DNSKEY 7 1 900 20150126170632 20150105160632 9795 org. b4jnXExJ1MgfUZffo8HVtxJ73qdbrustN+U6GBtgZLNEpdDgdpf9d4unRp/tqzDFoW0QuEoYOBatPCtpX3Re12/FQ+lWkfOAatcJMYMcW7kU2q86muY44W4p1BK/DxVb2zQHJ4AO7h22dH+TcM8J3WlGrlHYy/6k+emWPC7NpumCF3ctR/w26rAU4sv0lKuPvQSr9mOf3PyX29tz61lSfu4lAcymB6vh7B3D6TMkpHyobOAD67Ne59V1IgeeHXakURM8g0P0HMg87GT4GXwqo9+Aj7oWAq9D8iIIqelOLiijKys5jTzgdbOxM2vVn+l175xJybUzrJI0huJ9zKNCvg==
org. 882 IN RRSIG DNSKEY 7 1 900 20150126170632 20150105160632 21366 org. Edm9U+AtUcNeh2NXrWaLbfNYSRJovpziT1YcCphKGmdluvZPQk6rQAv1Y+2JBhE9Xmb37cY07lr7XHHfYxLWyhrPkpaKCX4ogqhGRylamy5R8BptqvVFhMTRUUHnK4tHvfYXqbtKuh9H84giLWMQIE2ZzQC9UqTvAIrc4FVUVIuwrNR7k6N96yy68feZnH8wcY+/RkyxoxMhcbMxXnZl2V9XP7xUxwtkULQBL1fq7IHI4jmlNyrdLzZltEgMIgtTK5HpgKaDborfoAcGBYnXxiC5RkAwHH81LAlT/BbK9shiWAI+yDhakLsIpl5ajUcTcbRBtLBBMkY6+4nAnXlSfg==
org. 882 IN RRSIG DNSKEY 7 1 900 20150126170632 20150105160632 53348 org. dAW5DYEjkxzfeM83ZCupwRh50L29jdR+dWkZYgt5GLDsYnyJDmRvjnHiHvJXVlHygvytafDMNK1MBlBODwHTBU/O7u7jLMbKvDU26bJpjm7cBJEtdUny3Bfckfr+VnxmT6UgmWLy1Cu8vuMOQS0t0fIMUs7fF2gJcD2bpcX85iY=
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 1625 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 29726
;; flags: qr rd ra cd ; qd: 1 an: 3 au: 0 ad: 1
;; QUESTIONS:
;; isc.org., type = DS, class = IN
;; ANSWERS:
isc.org. 1011 IN DS 12892 5 1 982113D08B4C6A1D9F6AEE1E2237AEF69F3F9759
isc.org. 1011 IN DS 12892 5 2 F1E184C0E1D615D20EB3C223ACED3B03C773DD952D5F0EB5C777586DE18DA6B5
isc.org. 1011 IN RRSIG DS 7 2 86400 20150122163315 20150101153315 53348 org. mpNwUFgIi/ahCYVkPlQuyJ+AY6BGiRaLD4cRwBIBNnaGVeR5vHNrGPrOX32mfS38tegrfNjJS4y3icwavPeubuZwGKIja8CBRGhzzFj6JZgydRJpJ+lkKws6+vDhjQ3A8+VerV0TNs8IWXSBa+Vl4Gv+0bX5NlM4RF/7Kyd7lJA=
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 283 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 43826
;; flags: qr rd ra cd ; qd: 1 an: 4 au: 0 ad: 1
;; QUESTIONS:
;; isc.org., type = DNSKEY, class = IN
;; ANSWERS:
isc.org. 7184 IN DNSKEY 257 3 5 BEAAAAOhHQDBrhQbtphgq2wQUpEQ5t4DtUHxoMVFu2hWLDMvoOMRXjGrhhCeFvAZih7yJHf8ZGfW6hd38hXG/xylYCO6Krpbdojwx8YMXLA5/kA+u50WIL8ZR1R6KTbsYVMf/Qx5RiNbPClw+vT+U8eXEJmO20jIS1ULgqy347cBB1zMnnz/4LJpA0da9CbKj3A254T515sNIMcwsB8/2+2E63/zZrQzBkj0BrN/9Bexjpiks3jRhZatEsXn3dTy47R09Uix5WcJt+xzqZ7+ysyLKOOedS39Z7SDmsn2eA0FKtQpwA6LXeG2w+jxmw3oA8lVUgEf/rzeC/bByBNsO70aEFTd
isc.org. 7184 IN DNSKEY 256 3 5 AwEAAbJpDF4RemdHHE/HrJJhR3zpzAQ6zsHqFv0i4lCWTUf4sX+cq3vSu7fKO4QJtm97S1sbcnmHonVE3QPzLOsqsY630Wy5JzrPK3gUvQLgfIsovo2v+dosITL8WbvjU1mEXhIwfuuBhYmYSKySZ0X9gpHGhdxRd+J8M7riPfN7kHLP
isc.org. 7184 IN RRSIG DNSKEY 5 2 7200 20150204230128 20150105230128 4521 isc.org. F7Lm/p8NrLlHT1rzV09lYxakAu7fGcY9sRnZ2uLlq9d3SpXIXGUuudPg61sd1GdqrRRKiRwfXvNsmvpNL2t8B1/k3gpNUT9V/+SBkI99PKNSkXijVToCebFkCIjqgyjPXkXXFB28E8ZhUDjjYp1LAVMGsfBEnaw7NeHg4MQ3v10=
isc.org. 7184 IN RRSIG DNSKEY 5 2 7200 20150204230128 20150105230128 12892 isc.org. KFk6zXeVu/lULIjwpu5pzRonoksbZMC0Y0qr5K7SpzZK0P/pG4iEzDdSVHA8st+QxNxQ7O4aypeo2jxiJT61OfRzUhjKwopTPVRiiREDV7DFU/fEkgCYXWPlOP7w/An0NzIPc5OLxCDovQefKKgrJaA0hjrd+bTeINgLGdmra+b4FCgYusIZ9Cp+iNs/dByc6cGexce0a0JCyu/vBLnjzo0byjckZm/iiL4BPwtqlaV+NyXFgjucAoqegpSoUpAz1ozCNz9CcJ4yfA9HpWdiWLpYdO3hMt8kHJbk2DxJNkkLRdOP6ZES+3RBUgMgo0FnIYCrVC8QYYQGTO8f2cdfBw==
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 923 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 62271
;; flags: qr rd ra ad cd ; qd: 1 an: 4 au: 0 ad: 1
;; QUESTIONS:
;; ., type = DNSKEY, class = IN
;; ANSWERS:
. 87357 IN DNSKEY 256 3 8 AwEAAaPD7Y7XIi1MOEREJNTrRhyqsY3gff6JWzg+XCbqut1sbcbvqyssHw8DT1AkRaAC92pO8xuyq5QEgEPL1IHfABLwpwXI5gTj4gdwi86bpkmlWs9fRpnn4DPDCTdrnxIejJXgClHikLJF3u3CdpNCMijq4CKdQbMlRZ3avv+G7rh7
. 87357 IN DNSKEY 256 3 8 AwEAAe3fSrbLBy3LOS7pnxEUhvPZTE2H5dIGsI/UfruI/nOEvWWa/PSX2BFedBkEqOlYdjdNF2f+6lmfk2Od/xu0v5bVqxFE+/24v3hZSlWBxvXzPTAGHrbW/IJYEPqlzVOAS4XdUgHg0N7IbLywNHMvB+Yf+Nm6ctyXXFLV4WTNnzs7
. 87357 IN DNSKEY 257 3 8 AwEAAagAIKlVZrpC6Ia7gEzahOR+9W29euxhJhVVLOyQbSEW0O8gcCjFFVQUTf6v58fLjwBd0YI0EzrAcQqBGCzh/RStIoO8g0NfnfL2MTJRkxoXbfDaUeVPQuYEhg37NZWAJQ9VnMVDxP/VHL496M/QZxkjf5/Efucp2gaDX6RS6CXpoY68LsvPVjR0ZSwzz1apAzvN9dlzEheX7ICJBBtuA6G3LQpzW5hOA2hzCTMjJPJ8LbqF6dsV6DoBQzgul0sGIcGOYl7OyQdXfZ57relSQageu+ipAdTTJ25AsRTAoub8ONGcLmqrAmRLKBP1dfwhYB4N7knNnulqQxA+Uk1ihz0=
. 87357 IN RRSIG DNSKEY 8 0 172800 20150115235959 20150101000000 19036 . i8cAxD2pvQi1oAyvQxRpDfFlbqPzW+69QQEsDwE1eWOm5AtawO9U7lmsGps7sy/fVNvl1ljKBj4Djp9pb3U2FLogjiIlW0cDAkPmLlG9t+b/pjEfBNlhjANUVN06pvQVAfm+LcF26EaWT6FlISBqb6jSy4BHRa3Bdc4Sx7+pRSYSqVVvYxLkfAWsKPqGkvWhebJDndJJV9syXQXgZ+v/uJ+6XOS43xkAdeL8iBzIs/FlwMTfh3tVe3d0lb65IBBLlCzeQuetX+0Vu1YFcnD0mHc/wS2ZnAV5toAFmyVQBoY/XAZiZeaOkcROJ6Zmqezy7liwK7BqsYyAZntMhk8lbg==
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 883 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 46846
;; flags: qr rd ra ad cd ; qd: 1 an: 2 au: 0 ad: 1
;; QUESTIONS:
;; ch., type = DS, class = IN
;; ANSWERS:
ch. 957 IN DS 46375 8 2 8F96646FC68BB7E4AF4C0750A6096FBC0D4ECDA3D3FA6DA06FDDB42EE50C6CF3
ch. 957 IN RRSIG DS 8 1 86400 20150112170000 20150105160000 16665 . thY7xYWBBxiBjqbQIb9fAG4TmQgnziwM7q6P1T3/ITxmECdvOCQnnZA3uD7qmN8uM0HudsD7+y+zgD3rsH4RSTKdL4kHSI0OnCxToMTvklghEgFDezqIRm8NkWdI2H4Stwrj20nYKSpLQxPI2EE54gs18P3KyO8bAUYv8Qx73xU=
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 238 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 18781
;; flags: qr rd ra ad cd ; qd: 1 an: 4 au: 0 ad: 1
;; QUESTIONS:
;; ch., type = DNSKEY, class = IN
;; ANSWERS:
ch. 958 IN DNSKEY 257 3 8 AwEAAb7GhhZ8IAy/AhwmSms5DeQK5ad09wIIplEpYoiAIYXPtJvT1ReFzyfTp/2YP+g/PWDwHPh4qKAHa9x0VgbIQcGAeNakmfkAdWEmCnca323/SAml3mwfaX62G7/uYWae5zh8QTxZKNd+K1yZ5x0IxnI31chSl5xymRbTEHYZDKwSIRFM3fTxUMt93WFaBVWELReYotJBr++rvAWdnlay5TPBTvheLBkaiqtgM4GP8HK07Y+86lsZnEsj5K3G1KTV5SPpa82rqYAwxG9VKbmSE/6/kBR5jJHjt1rRt5Oe7v18aEtw0YCEN4vxq+KuvMoNVqXUsE9LBwHJD+QNwi6wmB0=
ch. 958 IN DNSKEY 256 3 8 AwEAAcsg0kY6fw1wzYMhSAKTy+Y2JzAst66P/1odp9NECJJHbU8f4nwziI3onoFSBV0ZiSZhY1aH5dhdDZ7BkrqhVXSrZPAz0CvzjIxmB1gSOf9DeZvjQvoy97HqYolxsf+B3QQv2RKBT67elF5+JisKg3/dQISelKn8LhabSoVrMlD1
ch. 958 IN DNSKEY 256 3 8 AwEAAcSLdT0fEmcFmLpeUkAJoeVaHKiu+nbuc43fWlqaCRVf8t2HA4uWxOk0O5ci9nrFTc8nq8oa5fk5Cj7CHh4yrX9qUCfTdIWTyp8BDEdJpS+Dyb0u9wQuVj+nQMj4fLzdQf4TJs3/qxuiLr3nL1UUwlhhXeqSqGVb7p3mtB5HJ8ad
ch. 958 IN RRSIG DNSKEY 8 1 86400 20150127100909 20141212090909 46375 ch. bT8q0FWyeMH0SulNo6UdIIgZYNATwYsee2bikq2Gh339Bufma8eaqWIPYT3XKmxYPBFOw0bVl+kLZxTwbR1CFoCDXoP+qgQhh4mf9qkNiv2CDSc+0FE3FRREn+DAhYTUEuB58FPiPakFB8s8O7T+k2qhDae7jy4/y7Jl1lnjaBY8s7bzOUPhF0KKCNZmvoKwtL23ZdVeTSV1xM3jkiNnpzBKbcoSWECSGJVp1SE0BnRXdwQP41YTXFZ0310YjaTAUCC5qbMIWdEkHjfdSQtKBImnc85mkapq9w++XQ4zhauPWBtrPV3CcoCahjUaWdjrKVkibomlJZaN8MEO23CfQw==
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 893 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 5666
;; flags: qr rd ra cd ; qd: 1 an: 3 au: 0 ad: 1
;; QUESTIONS:
;; ingotronic.ch., type = DS, class = IN
;; ANSWERS:
ingotronic.ch. 3566 IN DS 6031 5 1 733D0218B571CD617B1A7493564B9FC4F12ADE82
ingotronic.ch. 3566 IN DS 6031 5 2 4A948F2FDADA24686E473EDAC00DCF972584C75E3FAA92C2021B6221449FF87E
ingotronic.ch. 3566 IN RRSIG DS 8 2 3600 20150129033614 20150105123019 60789 ch. rVPJP2HhzW7OkroK2axFj5Lb4iVWCH8Fp/Iq1rF952NDo72b8RiKje2RaAKJAGQ+wd0YgE+PAej04GCmkhlDJA/zvPeeTxuhy3HbJzReMlQ7fjyH+wW1hli+FuIYvogXWf7nO/9VyPORt8X/f/pjrOr3Vlj9sGLN8TGYpEuVSw4=
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 288 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 16375
;; flags: qr aa rd ra cd ; qd: 1 an: 4 au: 0 ad: 1
;; QUESTIONS:
;; ingotronic.ch., type = DNSKEY, class = IN
;; ANSWERS:
ingotronic.ch. 300 IN DNSKEY 256 3 5 AwEAAZ2Xh77GFzpEDx7EHYxShqltHgkiG+BOjBGifEmnJhQSdE5/yNSLFNcdhZZ8HUPxYnaedTqJcFFg4AzUsQklF/fECegTJdZjaj2WoL0/I8K7HMfY/hVuRZUWPNglYi8agJRX6gdkFTCpUNI7stpgKqxtzUJhhw15uG/lKMplwqUr
ingotronic.ch. 300 IN DNSKEY 257 3 5 AwEAAeA1vzmjaB+eBAcvhzpKEgAEFpvQ1rg4uKDW6MsQtacKoqBpgyep2+LuWotz5p/xYxj3NGsArwN8Ad5cY0FHRr8miTT0elOv6nvlqGIfRuhj/BXAQ1x4ihpSFslHw0lJMYFwxsUZWpUyjWX/nv1xRZMMwF46gui0N4OEbyTYusCk77D+A71k+K0EAitFIbIH4GCUKmH1H7HmXhSVH9bN/n7KEGwW32lmsuuUcJoRKDkcUvbMXY/9Xoa2quERrUg/rBbDUHowRPjYDS5GzY1+f4YY8s40BufGiqyUTKKXL953MVFK8gmezXA0hbmrnZ7CBOw/7238mORAdzExaX8n7CE=
ingotronic.ch. 300 IN RRSIG DNSKEY 5 2 300 20150125003700 20141226001657 6031 ingotronic.ch. rs1QlP2SlSpA2ELbzwg3DgWLzXWL3Lpv6CUJE2Q0qH2Zp7Qdy3cD+ZEtNh9v24Qv1M6JJ3zFt8mmZoCeW2ycuMbJCqBkW9CBuwF+VznZvZY2MxwPipvhvEEGP//0M8YAZJ66yQPDv3PTdAP8FYbIrJyvY44vwyncwbslpfHT9jAsrbfr3vuMuWps86dnP462q+0s1TxBfqi8mzo3gdavjHKWVNwohLahLKT+tWeu6DSzQv0YwMjwtkLgF7QRgx3ctIIkloOrnx9nHH1N6y+hxEB89fOlyVDjHhgL5uVtsD5fEdT0FJ2Gc/2nShEMMqIwr1/J9kUq1mNySff/uEe65Q==
ingotronic.ch. 300 IN RRSIG DNSKEY 5 2 300 20150125003700 20141226001657 17430 ingotronic.ch. mEwZjhQqeWksWD0TCnNBrtce4YkWJL3edqL6PvAUu8Fn+Ih437kEs3+pqdkgRsdYQ9HW+lBm/8pWwJlNAv0bi9NykItXMwAUFtncgq+6Pnh3iAM972GXSa5VV4LcGQ5b8CBdHCHiEKDqyPv5Hr5QfYL/FQaWlcNRh4QZZlZNPFA=
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 940 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 29069
;; flags: qr rd ra ad cd ; qd: 1 an: 4 au: 0 ad: 1
;; QUESTIONS:
;; ., type = DNSKEY, class = IN
;; ANSWERS:
. 87357 IN DNSKEY 257 3 8 AwEAAagAIKlVZrpC6Ia7gEzahOR+9W29euxhJhVVLOyQbSEW0O8gcCjFFVQUTf6v58fLjwBd0YI0EzrAcQqBGCzh/RStIoO8g0NfnfL2MTJRkxoXbfDaUeVPQuYEhg37NZWAJQ9VnMVDxP/VHL496M/QZxkjf5/Efucp2gaDX6RS6CXpoY68LsvPVjR0ZSwzz1apAzvN9dlzEheX7ICJBBtuA6G3LQpzW5hOA2hzCTMjJPJ8LbqF6dsV6DoBQzgul0sGIcGOYl7OyQdXfZ57relSQageu+ipAdTTJ25AsRTAoub8ONGcLmqrAmRLKBP1dfwhYB4N7knNnulqQxA+Uk1ihz0=
. 87357 IN DNSKEY 256 3 8 AwEAAaPD7Y7XIi1MOEREJNTrRhyqsY3gff6JWzg+XCbqut1sbcbvqyssHw8DT1AkRaAC92pO8xuyq5QEgEPL1IHfABLwpwXI5gTj4gdwi86bpkmlWs9fRpnn4DPDCTdrnxIejJXgClHikLJF3u3CdpNCMijq4CKdQbMlRZ3avv+G7rh7
. 87357 IN DNSKEY 256 3 8 AwEAAe3fSrbLBy3LOS7pnxEUhvPZTE2H5dIGsI/UfruI/nOEvWWa/PSX2BFedBkEqOlYdjdNF2f+6lmfk2Od/xu0v5bVqxFE+/24v3hZSlWBxvXzPTAGHrbW/IJYEPqlzVOAS4XdUgHg0N7IbLywNHMvB+Yf+Nm6ctyXXFLV4WTNnzs7
. 87357 IN RRSIG DNSKEY 8 0 172800 20150115235959 20150101000000 19036 . i8cAxD2pvQi1oAyvQxRpDfFlbqPzW+69QQEsDwE1eWOm5AtawO9U7lmsGps7sy/fVNvl1ljKBj4Djp9pb3U2FLogjiIlW0cDAkPmLlG9t+b/pjEfBNlhjANUVN06pvQVAfm+LcF26EaWT6FlISBqb6jSy4BHRa3Bdc4Sx7+pRSYSqVVvYxLkfAWsKPqGkvWhebJDndJJV9syXQXgZ+v/uJ+6XOS43xkAdeL8iBzIs/FlwMTfh3tVe3d0lb65IBBLlCzeQuetX+0Vu1YFcnD0mHc/wS2ZnAV5toAFmyVQBoY/XAZiZeaOkcROJ6Zmqezy7liwK7BqsYyAZntMhk8lbg==
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 883 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 39361
;; flags: qr rd ra cd ; qd: 1 an: 3 au: 0 ad: 1
;; QUESTIONS:
;; org., type = DS, class = IN
;; ANSWERS:
org. 1006 IN DS 21366 7 1 E6C1716CFB6BDC84E84CE1AB5510DAC69173B5B2
org. 1006 IN DS 21366 7 2 96EEB2FFD9B00CD4694E78278B5EFDAB0A80446567B69F634DA078F0D90F01BA
org. 1006 IN RRSIG DS 8 1 86400 20150112170000 20150105160000 16665 . TeNrVbBDgqdrbpdIweTad3yMLn+APxxlDpr717kqNgkOc8OxLFE/pFGzfSCYfc5hlMNB/nY1XhIJbWwvd26xOjwcB1rK3yo/Cfa5Pt4P+qV45QYW2JlatQVQPHtgMOf1KvUzXy4DlKzE5yHvHNGscfMOgIDeyWyDS8XwdrEIRR0=
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 275 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 52936
;; flags: qr rd ra cd ; qd: 1 an: 7 au: 0 ad: 1
;; QUESTIONS:
;; org., type = DNSKEY, class = IN
;; ANSWERS:
org. 882 IN DNSKEY 256 3 7 AwEAAawm+6jDEf5ymhSAeQKaJrF0FTdqp4T0F1SE/KSFEcd/MUaBW0J8NyrJZXQJ0I3KpvXJSk3b0Z3X8StBpngUWOa9/iePG5WaR8Edj0JENd6Cy1R7WawrtYAfQ1AWnvGTbvf0rFa2GcMfhyNKeY8UO5TWKECE4AF4C+LlGe12TICh
org. 882 IN DNSKEY 257 3 7 AwEAAZTjbIO5kIpxWUtyXc8avsKyHIIZ+LjC2Dv8naO+Tz6X2fqzDC1bdq7HlZwtkaqTkMVVJ+8gE9FIreGJ4c8G1GdbjQgbP1OyYIG7OHTc4hv5T2NlyWr6k6QFz98Q4zwFIGTFVvwBhmrMDYsOTtXakK6QwHovA1+83BsUACxlidpwB0hQacbD6x+I2RCDzYuTzj64Jv0/9XsX6AYV3ebcgn4hL1jIR2eJYyXlrAoWxdzxcW//5yeL5RVWuhRxejmnSVnCuxkfS4AQ485KH2tpdbWcCopLJZs6tw8q3jWcpTGzdh/v3xdYfNpQNcPImFlxAun3BtORPA2r8ti6MNoJEHU=
org. 882 IN DNSKEY 256 3 7 AwEAAXTZXCkp3UaDofhKlicjaZR/XeMFVkRSXRZsYP9OBRFZB44675hHORNE+QAijMdWOQeQt1SUWGyeJ5SHPVirGVxt9wCCqOeMTx7WvImZAKuqUl9H5N3Wn6FRidaub7d76IjxKZbkAHhGSJSzRTuuHbyjtrJVGcJ18kZHELyIsqZ3
org. 882 IN DNSKEY 257 3 7 AwEAAYpYfj3aaRzzkxWQqMdl7YExY81NdYSv+qayuZDodnZ9IMh0bwMcYaVUdzNAbVeJ8gd6jq1sR3VvP/SR36mmGssbV4Udl5ORDtqiZP2TDNDHxEnKKTX+jWfytZeT7d3AbSzBKC0v7uZrM6M2eoJnl6id66rEUmQC2p9DrrDg9F6tXC9CD/zC7/y+BNNpiOdnM5DXk7HhZm7ra9E7ltL13h2mx7kEgU8e6npJlCoXjraIBgUDthYs48W/sdTDLu7N59rjCG+bpil+c8oZ9f7NR3qmSTpTP1m86RqUQnVErifrH8KjDqL+3wzUdF5ACkYwt1XhPVPU+wSIlzbaAQN49PU=
org. 882 IN RRSIG DNSKEY 7 1 900 20150126170632 20150105160632 9795 org. b4jnXExJ1MgfUZffo8HVtxJ73qdbrustN+U6GBtgZLNEpdDgdpf9d4unRp/tqzDFoW0QuEoYOBatPCtpX3Re12/FQ+lWkfOAatcJMYMcW7kU2q86muY44W4p1BK/DxVb2zQHJ4AO7h22dH+TcM8J3WlGrlHYy/6k+emWPC7NpumCF3ctR/w26rAU4sv0lKuPvQSr9mOf3PyX29tz61lSfu4lAcymB6vh7B3D6TMkpHyobOAD67Ne59V1IgeeHXakURM8g0P0HMg87GT4GXwqo9+Aj7oWAq9D8iIIqelOLiijKys5jTzgdbOxM2vVn+l175xJybUzrJI0huJ9zKNCvg==
org. 882 IN RRSIG DNSKEY 7 1 900 20150126170632 20150105160632 21366 org. Edm9U+AtUcNeh2NXrWaLbfNYSRJovpziT1YcCphKGmdluvZPQk6rQAv1Y+2JBhE9Xmb37cY07lr7XHHfYxLWyhrPkpaKCX4ogqhGRylamy5R8BptqvVFhMTRUUHnK4tHvfYXqbtKuh9H84giLWMQIE2ZzQC9UqTvAIrc4FVUVIuwrNR7k6N96yy68feZnH8wcY+/RkyxoxMhcbMxXnZl2V9XP7xUxwtkULQBL1fq7IHI4jmlNyrdLzZltEgMIgtTK5HpgKaDborfoAcGBYnXxiC5RkAwHH81LAlT/BbK9shiWAI+yDhakLsIpl5ajUcTcbRBtLBBMkY6+4nAnXlSfg==
org. 882 IN RRSIG DNSKEY 7 1 900 20150126170632 20150105160632 53348 org. dAW5DYEjkxzfeM83ZCupwRh50L29jdR+dWkZYgt5GLDsYnyJDmRvjnHiHvJXVlHygvytafDMNK1MBlBODwHTBU/O7u7jLMbKvDU26bJpjm7cBJEtdUny3Bfckfr+VnxmT6UgmWLy1Cu8vuMOQS0t0fIMUs7fF2gJcD2bpcX85iY=
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 1625 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 34869
;; flags: qr rd ra cd ; qd: 1 an: 3 au: 0 ad: 1
;; QUESTIONS:
;; isc.org., type = DS, class = IN
;; ANSWERS:
isc.org. 1011 IN DS 12892 5 1 982113D08B4C6A1D9F6AEE1E2237AEF69F3F9759
isc.org. 1011 IN DS 12892 5 2 F1E184C0E1D615D20EB3C223ACED3B03C773DD952D5F0EB5C777586DE18DA6B5
isc.org. 1011 IN RRSIG DS 7 2 86400 20150122163315 20150101153315 53348 org. mpNwUFgIi/ahCYVkPlQuyJ+AY6BGiRaLD4cRwBIBNnaGVeR5vHNrGPrOX32mfS38tegrfNjJS4y3icwavPeubuZwGKIja8CBRGhzzFj6JZgydRJpJ+lkKws6+vDhjQ3A8+VerV0TNs8IWXSBa+Vl4Gv+0bX5NlM4RF/7Kyd7lJA=
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 283 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 53707
;; flags: qr rd ra cd ; qd: 1 an: 4 au: 0 ad: 1
;; QUESTIONS:
;; isc.org., type = DNSKEY, class = IN
;; ANSWERS:
isc.org. 7184 IN DNSKEY 256 3 5 AwEAAbJpDF4RemdHHE/HrJJhR3zpzAQ6zsHqFv0i4lCWTUf4sX+cq3vSu7fKO4QJtm97S1sbcnmHonVE3QPzLOsqsY630Wy5JzrPK3gUvQLgfIsovo2v+dosITL8WbvjU1mEXhIwfuuBhYmYSKySZ0X9gpHGhdxRd+J8M7riPfN7kHLP
isc.org. 7184 IN DNSKEY 257 3 5 BEAAAAOhHQDBrhQbtphgq2wQUpEQ5t4DtUHxoMVFu2hWLDMvoOMRXjGrhhCeFvAZih7yJHf8ZGfW6hd38hXG/xylYCO6Krpbdojwx8YMXLA5/kA+u50WIL8ZR1R6KTbsYVMf/Qx5RiNbPClw+vT+U8eXEJmO20jIS1ULgqy347cBB1zMnnz/4LJpA0da9CbKj3A254T515sNIMcwsB8/2+2E63/zZrQzBkj0BrN/9Bexjpiks3jRhZatEsXn3dTy47R09Uix5WcJt+xzqZ7+ysyLKOOedS39Z7SDmsn2eA0FKtQpwA6LXeG2w+jxmw3oA8lVUgEf/rzeC/bByBNsO70aEFTd
isc.org. 7184 IN RRSIG DNSKEY 5 2 7200 20150204230128 20150105230128 4521 isc.org. F7Lm/p8NrLlHT1rzV09lYxakAu7fGcY9sRnZ2uLlq9d3SpXIXGUuudPg61sd1GdqrRRKiRwfXvNsmvpNL2t8B1/k3gpNUT9V/+SBkI99PKNSkXijVToCebFkCIjqgyjPXkXXFB28E8ZhUDjjYp1LAVMGsfBEnaw7NeHg4MQ3v10=
isc.org. 7184 IN RRSIG DNSKEY 5 2 7200 20150204230128 20150105230128 12892 isc.org. KFk6zXeVu/lULIjwpu5pzRonoksbZMC0Y0qr5K7SpzZK0P/pG4iEzDdSVHA8st+QxNxQ7O4aypeo2jxiJT61OfRzUhjKwopTPVRiiREDV7DFU/fEkgCYXWPlOP7w/An0NzIPc5OLxCDovQefKKgrJaA0hjrd+bTeINgLGdmra+b4FCgYusIZ9Cp+iNs/dByc6cGexce0a0JCyu/vBLnjzo0byjckZm/iiL4BPwtqlaV+NyXFgjucAoqegpSoUpAz1ozCNz9CcJ4yfA9HpWdiWLpYdO3hMt8kHJbk2DxJNkkLRdOP6ZES+3RBUgMgo0FnIYCrVC8QYYQGTO8f2cdfBw==
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 923 bytes
###############################################
testDNameWithTooLongCnameIsInvalid 0000664 0000000 0000000 00000055506 13020541473 0035642 0 ustar 00root root 0000000 0000000 dnssecjava-1.1.3/src/test/resources/recordings/org_jitsi_dnssec_TestDNames #Date: 2015-01-06T22:35:17+01:00
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 59527
;; flags: qr aa rd ra cd ; qd: 1 an: 5 au: 2 ad: 3
;; QUESTIONS:
;; www.n3.ingotronic.ch., type = A, class = IN
;; ANSWERS:
n3.ingotronic.ch. 300 IN DNAME nsec3.ingotronic.ch.
n3.ingotronic.ch. 300 IN RRSIG DNAME 5 3 300 20150125005754 20141226001054 17430 ingotronic.ch. Ww/ymB77saHhLbwoTg5cVq5O/hr0Iqbutn/L/JJUUNeeS1ZTTmTaL93mfVKllO2p23j0hWg7aVLvGnKIfk8+FYQH6YVFoqVActac0vuTwCuJSX5EdeV5OhevQXCIoGcI93lt3WN29C9FYI1/o5z8vk9iZtw1kJ+tOrUcSKlgfiU=
www.n3.ingotronic.ch. 300 IN CNAME www.nsec3.ingotronic.ch.
www.nsec3.ingotronic.ch. 300 IN A 127.0.0.1
www.nsec3.ingotronic.ch. 300 IN RRSIG A 7 4 300 20150125011553 20141226004758 62417 nsec3.ingotronic.ch. jQhCY33aj9YTcCTHgl71PhM02o2LL6tdTy5M8TQw/Kt8D7wHxjVpu75eT9XEaM3abIqvygero5hCxyPW6IfF+FKmdx3MNigQiaB2sKu2XDNmFMbaucmVAWDRDMRY1BFavjz316JSb0rXX3XcS/ixbj9+jAm9lCXROcuzmOPB7vw=
;; AUTHORITY RECORDS:
nsec3.ingotronic.ch. 300 IN NS ns1.ingotronic.ch.
nsec3.ingotronic.ch. 300 IN RRSIG NS 7 3 300 20150125010458 20141226002309 62417 nsec3.ingotronic.ch. fl2Q0YQQ1TduolGLyQx8vGqSApoBbb6A+go5SLFBYQobrPfO/rb+SM8JvnlzNX/Xa7dRhDYrnfBTFUm1mCur9aIi34gu5UwDNQvt/GXY5dC3+DEy/28bTZ43UuCs+qGH9u9leFwGX4neFNl0s5B4RpxBN4is8dXMUvOda6QcsOw=
;; ADDITIONAL RECORDS:
ns1.ingotronic.ch. 300 IN A 62.192.5.131
ns1.ingotronic.ch. 300 IN RRSIG A 5 3 300 20150125005754 20141226001054 17430 ingotronic.ch. fNG1RZM53pXwBxruHNaSZszxVzNLoCq8VZsTjAzYH2vSLzHXYVGJFTLIeY0K9APAdyJU8WuwmABmn7XY0Kg39kRG77uoFlqUws2PdTz2QKOwJGZY7W88Ak2Y9lkDBcK8o3wJHVptrT8R7p/1U7UfjF0kqPUkakk2B0EbFWdagFg=
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 854 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 35467
;; flags: qr rd ra ad cd ; qd: 1 an: 4 au: 0 ad: 1
;; QUESTIONS:
;; ., type = DNSKEY, class = IN
;; ANSWERS:
. 87357 IN DNSKEY 256 3 8 AwEAAaPD7Y7XIi1MOEREJNTrRhyqsY3gff6JWzg+XCbqut1sbcbvqyssHw8DT1AkRaAC92pO8xuyq5QEgEPL1IHfABLwpwXI5gTj4gdwi86bpkmlWs9fRpnn4DPDCTdrnxIejJXgClHikLJF3u3CdpNCMijq4CKdQbMlRZ3avv+G7rh7
. 87357 IN DNSKEY 257 3 8 AwEAAagAIKlVZrpC6Ia7gEzahOR+9W29euxhJhVVLOyQbSEW0O8gcCjFFVQUTf6v58fLjwBd0YI0EzrAcQqBGCzh/RStIoO8g0NfnfL2MTJRkxoXbfDaUeVPQuYEhg37NZWAJQ9VnMVDxP/VHL496M/QZxkjf5/Efucp2gaDX6RS6CXpoY68LsvPVjR0ZSwzz1apAzvN9dlzEheX7ICJBBtuA6G3LQpzW5hOA2hzCTMjJPJ8LbqF6dsV6DoBQzgul0sGIcGOYl7OyQdXfZ57relSQageu+ipAdTTJ25AsRTAoub8ONGcLmqrAmRLKBP1dfwhYB4N7knNnulqQxA+Uk1ihz0=
. 87357 IN DNSKEY 256 3 8 AwEAAe3fSrbLBy3LOS7pnxEUhvPZTE2H5dIGsI/UfruI/nOEvWWa/PSX2BFedBkEqOlYdjdNF2f+6lmfk2Od/xu0v5bVqxFE+/24v3hZSlWBxvXzPTAGHrbW/IJYEPqlzVOAS4XdUgHg0N7IbLywNHMvB+Yf+Nm6ctyXXFLV4WTNnzs7
. 87357 IN RRSIG DNSKEY 8 0 172800 20150115235959 20150101000000 19036 . i8cAxD2pvQi1oAyvQxRpDfFlbqPzW+69QQEsDwE1eWOm5AtawO9U7lmsGps7sy/fVNvl1ljKBj4Djp9pb3U2FLogjiIlW0cDAkPmLlG9t+b/pjEfBNlhjANUVN06pvQVAfm+LcF26EaWT6FlISBqb6jSy4BHRa3Bdc4Sx7+pRSYSqVVvYxLkfAWsKPqGkvWhebJDndJJV9syXQXgZ+v/uJ+6XOS43xkAdeL8iBzIs/FlwMTfh3tVe3d0lb65IBBLlCzeQuetX+0Vu1YFcnD0mHc/wS2ZnAV5toAFmyVQBoY/XAZiZeaOkcROJ6Zmqezy7liwK7BqsYyAZntMhk8lbg==
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 883 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 47591
;; flags: qr rd ra ad cd ; qd: 1 an: 2 au: 0 ad: 1
;; QUESTIONS:
;; ch., type = DS, class = IN
;; ANSWERS:
ch. 957 IN DS 46375 8 2 8F96646FC68BB7E4AF4C0750A6096FBC0D4ECDA3D3FA6DA06FDDB42EE50C6CF3
ch. 957 IN RRSIG DS 8 1 86400 20150112170000 20150105160000 16665 . thY7xYWBBxiBjqbQIb9fAG4TmQgnziwM7q6P1T3/ITxmECdvOCQnnZA3uD7qmN8uM0HudsD7+y+zgD3rsH4RSTKdL4kHSI0OnCxToMTvklghEgFDezqIRm8NkWdI2H4Stwrj20nYKSpLQxPI2EE54gs18P3KyO8bAUYv8Qx73xU=
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 238 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 49208
;; flags: qr rd ra ad cd ; qd: 1 an: 4 au: 0 ad: 1
;; QUESTIONS:
;; ch., type = DNSKEY, class = IN
;; ANSWERS:
ch. 958 IN DNSKEY 256 3 8 AwEAAcSLdT0fEmcFmLpeUkAJoeVaHKiu+nbuc43fWlqaCRVf8t2HA4uWxOk0O5ci9nrFTc8nq8oa5fk5Cj7CHh4yrX9qUCfTdIWTyp8BDEdJpS+Dyb0u9wQuVj+nQMj4fLzdQf4TJs3/qxuiLr3nL1UUwlhhXeqSqGVb7p3mtB5HJ8ad
ch. 958 IN DNSKEY 256 3 8 AwEAAcsg0kY6fw1wzYMhSAKTy+Y2JzAst66P/1odp9NECJJHbU8f4nwziI3onoFSBV0ZiSZhY1aH5dhdDZ7BkrqhVXSrZPAz0CvzjIxmB1gSOf9DeZvjQvoy97HqYolxsf+B3QQv2RKBT67elF5+JisKg3/dQISelKn8LhabSoVrMlD1
ch. 958 IN DNSKEY 257 3 8 AwEAAb7GhhZ8IAy/AhwmSms5DeQK5ad09wIIplEpYoiAIYXPtJvT1ReFzyfTp/2YP+g/PWDwHPh4qKAHa9x0VgbIQcGAeNakmfkAdWEmCnca323/SAml3mwfaX62G7/uYWae5zh8QTxZKNd+K1yZ5x0IxnI31chSl5xymRbTEHYZDKwSIRFM3fTxUMt93WFaBVWELReYotJBr++rvAWdnlay5TPBTvheLBkaiqtgM4GP8HK07Y+86lsZnEsj5K3G1KTV5SPpa82rqYAwxG9VKbmSE/6/kBR5jJHjt1rRt5Oe7v18aEtw0YCEN4vxq+KuvMoNVqXUsE9LBwHJD+QNwi6wmB0=
ch. 958 IN RRSIG DNSKEY 8 1 86400 20150127100909 20141212090909 46375 ch. bT8q0FWyeMH0SulNo6UdIIgZYNATwYsee2bikq2Gh339Bufma8eaqWIPYT3XKmxYPBFOw0bVl+kLZxTwbR1CFoCDXoP+qgQhh4mf9qkNiv2CDSc+0FE3FRREn+DAhYTUEuB58FPiPakFB8s8O7T+k2qhDae7jy4/y7Jl1lnjaBY8s7bzOUPhF0KKCNZmvoKwtL23ZdVeTSV1xM3jkiNnpzBKbcoSWECSGJVp1SE0BnRXdwQP41YTXFZ0310YjaTAUCC5qbMIWdEkHjfdSQtKBImnc85mkapq9w++XQ4zhauPWBtrPV3CcoCahjUaWdjrKVkibomlJZaN8MEO23CfQw==
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 893 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 58278
;; flags: qr rd ra cd ; qd: 1 an: 3 au: 0 ad: 1
;; QUESTIONS:
;; ingotronic.ch., type = DS, class = IN
;; ANSWERS:
ingotronic.ch. 3565 IN DS 6031 5 1 733D0218B571CD617B1A7493564B9FC4F12ADE82
ingotronic.ch. 3565 IN DS 6031 5 2 4A948F2FDADA24686E473EDAC00DCF972584C75E3FAA92C2021B6221449FF87E
ingotronic.ch. 3565 IN RRSIG DS 8 2 3600 20150129033614 20150105123019 60789 ch. rVPJP2HhzW7OkroK2axFj5Lb4iVWCH8Fp/Iq1rF952NDo72b8RiKje2RaAKJAGQ+wd0YgE+PAej04GCmkhlDJA/zvPeeTxuhy3HbJzReMlQ7fjyH+wW1hli+FuIYvogXWf7nO/9VyPORt8X/f/pjrOr3Vlj9sGLN8TGYpEuVSw4=
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 288 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 13703
;; flags: qr aa rd ra cd ; qd: 1 an: 4 au: 0 ad: 1
;; QUESTIONS:
;; ingotronic.ch., type = DNSKEY, class = IN
;; ANSWERS:
ingotronic.ch. 300 IN DNSKEY 256 3 5 AwEAAZ2Xh77GFzpEDx7EHYxShqltHgkiG+BOjBGifEmnJhQSdE5/yNSLFNcdhZZ8HUPxYnaedTqJcFFg4AzUsQklF/fECegTJdZjaj2WoL0/I8K7HMfY/hVuRZUWPNglYi8agJRX6gdkFTCpUNI7stpgKqxtzUJhhw15uG/lKMplwqUr
ingotronic.ch. 300 IN DNSKEY 257 3 5 AwEAAeA1vzmjaB+eBAcvhzpKEgAEFpvQ1rg4uKDW6MsQtacKoqBpgyep2+LuWotz5p/xYxj3NGsArwN8Ad5cY0FHRr8miTT0elOv6nvlqGIfRuhj/BXAQ1x4ihpSFslHw0lJMYFwxsUZWpUyjWX/nv1xRZMMwF46gui0N4OEbyTYusCk77D+A71k+K0EAitFIbIH4GCUKmH1H7HmXhSVH9bN/n7KEGwW32lmsuuUcJoRKDkcUvbMXY/9Xoa2quERrUg/rBbDUHowRPjYDS5GzY1+f4YY8s40BufGiqyUTKKXL953MVFK8gmezXA0hbmrnZ7CBOw/7238mORAdzExaX8n7CE=
ingotronic.ch. 300 IN RRSIG DNSKEY 5 2 300 20150125003700 20141226001657 6031 ingotronic.ch. rs1QlP2SlSpA2ELbzwg3DgWLzXWL3Lpv6CUJE2Q0qH2Zp7Qdy3cD+ZEtNh9v24Qv1M6JJ3zFt8mmZoCeW2ycuMbJCqBkW9CBuwF+VznZvZY2MxwPipvhvEEGP//0M8YAZJ66yQPDv3PTdAP8FYbIrJyvY44vwyncwbslpfHT9jAsrbfr3vuMuWps86dnP462q+0s1TxBfqi8mzo3gdavjHKWVNwohLahLKT+tWeu6DSzQv0YwMjwtkLgF7QRgx3ctIIkloOrnx9nHH1N6y+hxEB89fOlyVDjHhgL5uVtsD5fEdT0FJ2Gc/2nShEMMqIwr1/J9kUq1mNySff/uEe65Q==
ingotronic.ch. 300 IN RRSIG DNSKEY 5 2 300 20150125003700 20141226001657 17430 ingotronic.ch. mEwZjhQqeWksWD0TCnNBrtce4YkWJL3edqL6PvAUu8Fn+Ih437kEs3+pqdkgRsdYQ9HW+lBm/8pWwJlNAv0bi9NykItXMwAUFtncgq+6Pnh3iAM972GXSa5VV4LcGQ5b8CBdHCHiEKDqyPv5Hr5QfYL/FQaWlcNRh4QZZlZNPFA=
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 940 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 35066
;; flags: qr rd ra ad cd ; qd: 1 an: 4 au: 0 ad: 1
;; QUESTIONS:
;; ., type = DNSKEY, class = IN
;; ANSWERS:
. 87356 IN DNSKEY 257 3 8 AwEAAagAIKlVZrpC6Ia7gEzahOR+9W29euxhJhVVLOyQbSEW0O8gcCjFFVQUTf6v58fLjwBd0YI0EzrAcQqBGCzh/RStIoO8g0NfnfL2MTJRkxoXbfDaUeVPQuYEhg37NZWAJQ9VnMVDxP/VHL496M/QZxkjf5/Efucp2gaDX6RS6CXpoY68LsvPVjR0ZSwzz1apAzvN9dlzEheX7ICJBBtuA6G3LQpzW5hOA2hzCTMjJPJ8LbqF6dsV6DoBQzgul0sGIcGOYl7OyQdXfZ57relSQageu+ipAdTTJ25AsRTAoub8ONGcLmqrAmRLKBP1dfwhYB4N7knNnulqQxA+Uk1ihz0=
. 87356 IN DNSKEY 256 3 8 AwEAAe3fSrbLBy3LOS7pnxEUhvPZTE2H5dIGsI/UfruI/nOEvWWa/PSX2BFedBkEqOlYdjdNF2f+6lmfk2Od/xu0v5bVqxFE+/24v3hZSlWBxvXzPTAGHrbW/IJYEPqlzVOAS4XdUgHg0N7IbLywNHMvB+Yf+Nm6ctyXXFLV4WTNnzs7
. 87356 IN DNSKEY 256 3 8 AwEAAaPD7Y7XIi1MOEREJNTrRhyqsY3gff6JWzg+XCbqut1sbcbvqyssHw8DT1AkRaAC92pO8xuyq5QEgEPL1IHfABLwpwXI5gTj4gdwi86bpkmlWs9fRpnn4DPDCTdrnxIejJXgClHikLJF3u3CdpNCMijq4CKdQbMlRZ3avv+G7rh7
. 87356 IN RRSIG DNSKEY 8 0 172800 20150115235959 20150101000000 19036 . i8cAxD2pvQi1oAyvQxRpDfFlbqPzW+69QQEsDwE1eWOm5AtawO9U7lmsGps7sy/fVNvl1ljKBj4Djp9pb3U2FLogjiIlW0cDAkPmLlG9t+b/pjEfBNlhjANUVN06pvQVAfm+LcF26EaWT6FlISBqb6jSy4BHRa3Bdc4Sx7+pRSYSqVVvYxLkfAWsKPqGkvWhebJDndJJV9syXQXgZ+v/uJ+6XOS43xkAdeL8iBzIs/FlwMTfh3tVe3d0lb65IBBLlCzeQuetX+0Vu1YFcnD0mHc/wS2ZnAV5toAFmyVQBoY/XAZiZeaOkcROJ6Zmqezy7liwK7BqsYyAZntMhk8lbg==
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 883 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 18452
;; flags: qr rd ra ad cd ; qd: 1 an: 2 au: 0 ad: 1
;; QUESTIONS:
;; ch., type = DS, class = IN
;; ANSWERS:
ch. 956 IN DS 46375 8 2 8F96646FC68BB7E4AF4C0750A6096FBC0D4ECDA3D3FA6DA06FDDB42EE50C6CF3
ch. 956 IN RRSIG DS 8 1 86400 20150112170000 20150105160000 16665 . thY7xYWBBxiBjqbQIb9fAG4TmQgnziwM7q6P1T3/ITxmECdvOCQnnZA3uD7qmN8uM0HudsD7+y+zgD3rsH4RSTKdL4kHSI0OnCxToMTvklghEgFDezqIRm8NkWdI2H4Stwrj20nYKSpLQxPI2EE54gs18P3KyO8bAUYv8Qx73xU=
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 238 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 38903
;; flags: qr rd ra ad cd ; qd: 1 an: 4 au: 0 ad: 1
;; QUESTIONS:
;; ch., type = DNSKEY, class = IN
;; ANSWERS:
ch. 957 IN DNSKEY 256 3 8 AwEAAcSLdT0fEmcFmLpeUkAJoeVaHKiu+nbuc43fWlqaCRVf8t2HA4uWxOk0O5ci9nrFTc8nq8oa5fk5Cj7CHh4yrX9qUCfTdIWTyp8BDEdJpS+Dyb0u9wQuVj+nQMj4fLzdQf4TJs3/qxuiLr3nL1UUwlhhXeqSqGVb7p3mtB5HJ8ad
ch. 957 IN DNSKEY 257 3 8 AwEAAb7GhhZ8IAy/AhwmSms5DeQK5ad09wIIplEpYoiAIYXPtJvT1ReFzyfTp/2YP+g/PWDwHPh4qKAHa9x0VgbIQcGAeNakmfkAdWEmCnca323/SAml3mwfaX62G7/uYWae5zh8QTxZKNd+K1yZ5x0IxnI31chSl5xymRbTEHYZDKwSIRFM3fTxUMt93WFaBVWELReYotJBr++rvAWdnlay5TPBTvheLBkaiqtgM4GP8HK07Y+86lsZnEsj5K3G1KTV5SPpa82rqYAwxG9VKbmSE/6/kBR5jJHjt1rRt5Oe7v18aEtw0YCEN4vxq+KuvMoNVqXUsE9LBwHJD+QNwi6wmB0=
ch. 957 IN DNSKEY 256 3 8 AwEAAcsg0kY6fw1wzYMhSAKTy+Y2JzAst66P/1odp9NECJJHbU8f4nwziI3onoFSBV0ZiSZhY1aH5dhdDZ7BkrqhVXSrZPAz0CvzjIxmB1gSOf9DeZvjQvoy97HqYolxsf+B3QQv2RKBT67elF5+JisKg3/dQISelKn8LhabSoVrMlD1
ch. 957 IN RRSIG DNSKEY 8 1 86400 20150127100909 20141212090909 46375 ch. bT8q0FWyeMH0SulNo6UdIIgZYNATwYsee2bikq2Gh339Bufma8eaqWIPYT3XKmxYPBFOw0bVl+kLZxTwbR1CFoCDXoP+qgQhh4mf9qkNiv2CDSc+0FE3FRREn+DAhYTUEuB58FPiPakFB8s8O7T+k2qhDae7jy4/y7Jl1lnjaBY8s7bzOUPhF0KKCNZmvoKwtL23ZdVeTSV1xM3jkiNnpzBKbcoSWECSGJVp1SE0BnRXdwQP41YTXFZ0310YjaTAUCC5qbMIWdEkHjfdSQtKBImnc85mkapq9w++XQ4zhauPWBtrPV3CcoCahjUaWdjrKVkibomlJZaN8MEO23CfQw==
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 893 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 3695
;; flags: qr rd ra cd ; qd: 1 an: 3 au: 0 ad: 1
;; QUESTIONS:
;; ingotronic.ch., type = DS, class = IN
;; ANSWERS:
ingotronic.ch. 3565 IN DS 6031 5 1 733D0218B571CD617B1A7493564B9FC4F12ADE82
ingotronic.ch. 3565 IN DS 6031 5 2 4A948F2FDADA24686E473EDAC00DCF972584C75E3FAA92C2021B6221449FF87E
ingotronic.ch. 3565 IN RRSIG DS 8 2 3600 20150129033614 20150105123019 60789 ch. rVPJP2HhzW7OkroK2axFj5Lb4iVWCH8Fp/Iq1rF952NDo72b8RiKje2RaAKJAGQ+wd0YgE+PAej04GCmkhlDJA/zvPeeTxuhy3HbJzReMlQ7fjyH+wW1hli+FuIYvogXWf7nO/9VyPORt8X/f/pjrOr3Vlj9sGLN8TGYpEuVSw4=
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 288 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 60056
;; flags: qr aa rd ra cd ; qd: 1 an: 4 au: 0 ad: 1
;; QUESTIONS:
;; ingotronic.ch., type = DNSKEY, class = IN
;; ANSWERS:
ingotronic.ch. 300 IN DNSKEY 257 3 5 AwEAAeA1vzmjaB+eBAcvhzpKEgAEFpvQ1rg4uKDW6MsQtacKoqBpgyep2+LuWotz5p/xYxj3NGsArwN8Ad5cY0FHRr8miTT0elOv6nvlqGIfRuhj/BXAQ1x4ihpSFslHw0lJMYFwxsUZWpUyjWX/nv1xRZMMwF46gui0N4OEbyTYusCk77D+A71k+K0EAitFIbIH4GCUKmH1H7HmXhSVH9bN/n7KEGwW32lmsuuUcJoRKDkcUvbMXY/9Xoa2quERrUg/rBbDUHowRPjYDS5GzY1+f4YY8s40BufGiqyUTKKXL953MVFK8gmezXA0hbmrnZ7CBOw/7238mORAdzExaX8n7CE=
ingotronic.ch. 300 IN DNSKEY 256 3 5 AwEAAZ2Xh77GFzpEDx7EHYxShqltHgkiG+BOjBGifEmnJhQSdE5/yNSLFNcdhZZ8HUPxYnaedTqJcFFg4AzUsQklF/fECegTJdZjaj2WoL0/I8K7HMfY/hVuRZUWPNglYi8agJRX6gdkFTCpUNI7stpgKqxtzUJhhw15uG/lKMplwqUr
ingotronic.ch. 300 IN RRSIG DNSKEY 5 2 300 20150125003700 20141226001657 6031 ingotronic.ch. rs1QlP2SlSpA2ELbzwg3DgWLzXWL3Lpv6CUJE2Q0qH2Zp7Qdy3cD+ZEtNh9v24Qv1M6JJ3zFt8mmZoCeW2ycuMbJCqBkW9CBuwF+VznZvZY2MxwPipvhvEEGP//0M8YAZJ66yQPDv3PTdAP8FYbIrJyvY44vwyncwbslpfHT9jAsrbfr3vuMuWps86dnP462q+0s1TxBfqi8mzo3gdavjHKWVNwohLahLKT+tWeu6DSzQv0YwMjwtkLgF7QRgx3ctIIkloOrnx9nHH1N6y+hxEB89fOlyVDjHhgL5uVtsD5fEdT0FJ2Gc/2nShEMMqIwr1/J9kUq1mNySff/uEe65Q==
ingotronic.ch. 300 IN RRSIG DNSKEY 5 2 300 20150125003700 20141226001657 17430 ingotronic.ch. mEwZjhQqeWksWD0TCnNBrtce4YkWJL3edqL6PvAUu8Fn+Ih437kEs3+pqdkgRsdYQ9HW+lBm/8pWwJlNAv0bi9NykItXMwAUFtncgq+6Pnh3iAM972GXSa5VV4LcGQ5b8CBdHCHiEKDqyPv5Hr5QfYL/FQaWlcNRh4QZZlZNPFA=
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 940 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 6716
;; flags: qr aa rd ra cd ; qd: 1 an: 3 au: 0 ad: 1
;; QUESTIONS:
;; nsec3.ingotronic.ch., type = DS, class = IN
;; ANSWERS:
nsec3.ingotronic.ch. 300 IN DS 16758 7 1 1720FF268E09A2CB63805EC8782D10AAD20E12A5
nsec3.ingotronic.ch. 300 IN DS 16758 7 2 3C8DC02750A1636F829B45D6E6D642866768A9CD40A013AD9D25AB63734FFA13
nsec3.ingotronic.ch. 300 IN RRSIG DS 5 3 300 20150125011134 20141226002644 17430 ingotronic.ch. hNurzlGhlyHbSgezPDuhIrtN9ZMsMXZbKGc7HD5rUuM88wD3fM97NxdzF+2Hi1USvBZ5GsQv63L+lAzf+mFPBoPIFHtTiAv8up7kQKRKmi/EzzkCYd/CC4UYdDZbaUyv7esh7spSOGwjPJNdK831p+MgltoWaYtnSGVMgOKk5mc=
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 305 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 4224
;; flags: qr aa rd ra cd ; qd: 1 an: 4 au: 0 ad: 1
;; QUESTIONS:
;; nsec3.ingotronic.ch., type = DNSKEY, class = IN
;; ANSWERS:
nsec3.ingotronic.ch. 300 IN DNSKEY 256 3 7 AwEAAccAWxkTVGZ6UAp0VEozAlYpARhbh6Y6tYOl6Fg3UeBNFFtDQ9fTEEt1NkbnR9u8KkpVN6a67avlYiUN1egDqEwzDU7R1Rw+/USdhm2hqOARmmu3DBgjjX/iXjZLyv310cOGFJZ/smcodlDL4pDAAoPxh/qs6KEBaT0sc1KWcGq3
nsec3.ingotronic.ch. 300 IN DNSKEY 257 3 7 AwEAAaBuJTf9oGyeTH3biUkAFLrsYrkodX1H7Snsui4XsDHFCBvs5XYacHbs0Jg0/O51KPjmNnjwMW8SSyDkKqYQ+9uYAf2EQ/pnD/VGQqnV2cw0Vwk/t0E2V4FUCju4pnAoyzZFZXGs1eWbX9JXu++b0Azp+ACq6485qJLzHhWDiIrPoK/SvdbFVRK4s+nPPJLH3NGBbtdz6kPq7aFWYBMoGeAZdN1wsQpcNWUo5eOmaJY53nMc7+rDpAyYlMe/FKwSZdX2ZDd63Qsa6Im4FVUJq/nWLq7tlQ/mWks15uDTQyJy/OWfA0ICCO4N9Fel9rThJNpJWEzOCblvZyBoy405kZk=
nsec3.ingotronic.ch. 300 IN RRSIG DNSKEY 7 3 300 20150125001457 20141226000444 16758 nsec3.ingotronic.ch. mXi1ylDi8XkRPup+YlT8GPdYE+P7gb6+/VdAwtodI916IzrkGkOHOTLbnrbAqqJOh0HxVCYXdxovmEcbJKUFKwplrQg3XD7/9Sq4pKU1MhMFEGrm/QPkM4u0mgjQwyToDLGuPHuFyur3FSjO/n54uGhAEft9JOFk/WKtWdCnm2LLyQrpC6herA3efFaI8kZhdoEY02AwihWVJxHasmz7lOoKRgNrkfELU+fN4+V7ISsRfJMyZc6q5PuNeG6vFD0uNE8tpdLJCSMurKYVpelvYqzFIcRTYcIjXwmS+L3DGjupqWMzFZVmpQM62JG3KCCD0ffpnNb0nWoSoHwpSeh/3Q==
nsec3.ingotronic.ch. 300 IN RRSIG DNSKEY 7 3 300 20150125001457 20141226000444 62417 nsec3.ingotronic.ch. PyCrf8T5dAfJzapb1p+kcTALPjDuD2niSaXXo0KeHAunT+6gJicLML2S/ZpiYr7X7Ma4Z0TYqE02qH6pcLYNnSgv9BE8sZO0nRtPekSyTy5nLi4hFADYhjb3UjaB85qmQZcqm64vC/CJhWO4t6Eixg/5MYALw+Qdy5Fo0qy/U5E=
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 958 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 7930
;; flags: qr rd ra ad cd ; qd: 1 an: 4 au: 0 ad: 1
;; QUESTIONS:
;; ., type = DNSKEY, class = IN
;; ANSWERS:
. 87356 IN DNSKEY 257 3 8 AwEAAagAIKlVZrpC6Ia7gEzahOR+9W29euxhJhVVLOyQbSEW0O8gcCjFFVQUTf6v58fLjwBd0YI0EzrAcQqBGCzh/RStIoO8g0NfnfL2MTJRkxoXbfDaUeVPQuYEhg37NZWAJQ9VnMVDxP/VHL496M/QZxkjf5/Efucp2gaDX6RS6CXpoY68LsvPVjR0ZSwzz1apAzvN9dlzEheX7ICJBBtuA6G3LQpzW5hOA2hzCTMjJPJ8LbqF6dsV6DoBQzgul0sGIcGOYl7OyQdXfZ57relSQageu+ipAdTTJ25AsRTAoub8ONGcLmqrAmRLKBP1dfwhYB4N7knNnulqQxA+Uk1ihz0=
. 87356 IN DNSKEY 256 3 8 AwEAAe3fSrbLBy3LOS7pnxEUhvPZTE2H5dIGsI/UfruI/nOEvWWa/PSX2BFedBkEqOlYdjdNF2f+6lmfk2Od/xu0v5bVqxFE+/24v3hZSlWBxvXzPTAGHrbW/IJYEPqlzVOAS4XdUgHg0N7IbLywNHMvB+Yf+Nm6ctyXXFLV4WTNnzs7
. 87356 IN DNSKEY 256 3 8 AwEAAaPD7Y7XIi1MOEREJNTrRhyqsY3gff6JWzg+XCbqut1sbcbvqyssHw8DT1AkRaAC92pO8xuyq5QEgEPL1IHfABLwpwXI5gTj4gdwi86bpkmlWs9fRpnn4DPDCTdrnxIejJXgClHikLJF3u3CdpNCMijq4CKdQbMlRZ3avv+G7rh7
. 87356 IN RRSIG DNSKEY 8 0 172800 20150115235959 20150101000000 19036 . i8cAxD2pvQi1oAyvQxRpDfFlbqPzW+69QQEsDwE1eWOm5AtawO9U7lmsGps7sy/fVNvl1ljKBj4Djp9pb3U2FLogjiIlW0cDAkPmLlG9t+b/pjEfBNlhjANUVN06pvQVAfm+LcF26EaWT6FlISBqb6jSy4BHRa3Bdc4Sx7+pRSYSqVVvYxLkfAWsKPqGkvWhebJDndJJV9syXQXgZ+v/uJ+6XOS43xkAdeL8iBzIs/FlwMTfh3tVe3d0lb65IBBLlCzeQuetX+0Vu1YFcnD0mHc/wS2ZnAV5toAFmyVQBoY/XAZiZeaOkcROJ6Zmqezy7liwK7BqsYyAZntMhk8lbg==
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 883 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 16079
;; flags: qr rd ra ad cd ; qd: 1 an: 2 au: 0 ad: 1
;; QUESTIONS:
;; ch., type = DS, class = IN
;; ANSWERS:
ch. 956 IN DS 46375 8 2 8F96646FC68BB7E4AF4C0750A6096FBC0D4ECDA3D3FA6DA06FDDB42EE50C6CF3
ch. 956 IN RRSIG DS 8 1 86400 20150112170000 20150105160000 16665 . thY7xYWBBxiBjqbQIb9fAG4TmQgnziwM7q6P1T3/ITxmECdvOCQnnZA3uD7qmN8uM0HudsD7+y+zgD3rsH4RSTKdL4kHSI0OnCxToMTvklghEgFDezqIRm8NkWdI2H4Stwrj20nYKSpLQxPI2EE54gs18P3KyO8bAUYv8Qx73xU=
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 238 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 33342
;; flags: qr rd ra ad cd ; qd: 1 an: 4 au: 0 ad: 1
;; QUESTIONS:
;; ch., type = DNSKEY, class = IN
;; ANSWERS:
ch. 957 IN DNSKEY 256 3 8 AwEAAcsg0kY6fw1wzYMhSAKTy+Y2JzAst66P/1odp9NECJJHbU8f4nwziI3onoFSBV0ZiSZhY1aH5dhdDZ7BkrqhVXSrZPAz0CvzjIxmB1gSOf9DeZvjQvoy97HqYolxsf+B3QQv2RKBT67elF5+JisKg3/dQISelKn8LhabSoVrMlD1
ch. 957 IN DNSKEY 257 3 8 AwEAAb7GhhZ8IAy/AhwmSms5DeQK5ad09wIIplEpYoiAIYXPtJvT1ReFzyfTp/2YP+g/PWDwHPh4qKAHa9x0VgbIQcGAeNakmfkAdWEmCnca323/SAml3mwfaX62G7/uYWae5zh8QTxZKNd+K1yZ5x0IxnI31chSl5xymRbTEHYZDKwSIRFM3fTxUMt93WFaBVWELReYotJBr++rvAWdnlay5TPBTvheLBkaiqtgM4GP8HK07Y+86lsZnEsj5K3G1KTV5SPpa82rqYAwxG9VKbmSE/6/kBR5jJHjt1rRt5Oe7v18aEtw0YCEN4vxq+KuvMoNVqXUsE9LBwHJD+QNwi6wmB0=
ch. 957 IN DNSKEY 256 3 8 AwEAAcSLdT0fEmcFmLpeUkAJoeVaHKiu+nbuc43fWlqaCRVf8t2HA4uWxOk0O5ci9nrFTc8nq8oa5fk5Cj7CHh4yrX9qUCfTdIWTyp8BDEdJpS+Dyb0u9wQuVj+nQMj4fLzdQf4TJs3/qxuiLr3nL1UUwlhhXeqSqGVb7p3mtB5HJ8ad
ch. 957 IN RRSIG DNSKEY 8 1 86400 20150127100909 20141212090909 46375 ch. bT8q0FWyeMH0SulNo6UdIIgZYNATwYsee2bikq2Gh339Bufma8eaqWIPYT3XKmxYPBFOw0bVl+kLZxTwbR1CFoCDXoP+qgQhh4mf9qkNiv2CDSc+0FE3FRREn+DAhYTUEuB58FPiPakFB8s8O7T+k2qhDae7jy4/y7Jl1lnjaBY8s7bzOUPhF0KKCNZmvoKwtL23ZdVeTSV1xM3jkiNnpzBKbcoSWECSGJVp1SE0BnRXdwQP41YTXFZ0310YjaTAUCC5qbMIWdEkHjfdSQtKBImnc85mkapq9w++XQ4zhauPWBtrPV3CcoCahjUaWdjrKVkibomlJZaN8MEO23CfQw==
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 893 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 60462
;; flags: qr rd ra cd ; qd: 1 an: 3 au: 0 ad: 1
;; QUESTIONS:
;; ingotronic.ch., type = DS, class = IN
;; ANSWERS:
ingotronic.ch. 3565 IN DS 6031 5 2 4A948F2FDADA24686E473EDAC00DCF972584C75E3FAA92C2021B6221449FF87E
ingotronic.ch. 3565 IN DS 6031 5 1 733D0218B571CD617B1A7493564B9FC4F12ADE82
ingotronic.ch. 3565 IN RRSIG DS 8 2 3600 20150129033614 20150105123019 60789 ch. rVPJP2HhzW7OkroK2axFj5Lb4iVWCH8Fp/Iq1rF952NDo72b8RiKje2RaAKJAGQ+wd0YgE+PAej04GCmkhlDJA/zvPeeTxuhy3HbJzReMlQ7fjyH+wW1hli+FuIYvogXWf7nO/9VyPORt8X/f/pjrOr3Vlj9sGLN8TGYpEuVSw4=
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 288 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 41420
;; flags: qr aa rd ra cd ; qd: 1 an: 4 au: 0 ad: 1
;; QUESTIONS:
;; ingotronic.ch., type = DNSKEY, class = IN
;; ANSWERS:
ingotronic.ch. 300 IN DNSKEY 256 3 5 AwEAAZ2Xh77GFzpEDx7EHYxShqltHgkiG+BOjBGifEmnJhQSdE5/yNSLFNcdhZZ8HUPxYnaedTqJcFFg4AzUsQklF/fECegTJdZjaj2WoL0/I8K7HMfY/hVuRZUWPNglYi8agJRX6gdkFTCpUNI7stpgKqxtzUJhhw15uG/lKMplwqUr
ingotronic.ch. 300 IN DNSKEY 257 3 5 AwEAAeA1vzmjaB+eBAcvhzpKEgAEFpvQ1rg4uKDW6MsQtacKoqBpgyep2+LuWotz5p/xYxj3NGsArwN8Ad5cY0FHRr8miTT0elOv6nvlqGIfRuhj/BXAQ1x4ihpSFslHw0lJMYFwxsUZWpUyjWX/nv1xRZMMwF46gui0N4OEbyTYusCk77D+A71k+K0EAitFIbIH4GCUKmH1H7HmXhSVH9bN/n7KEGwW32lmsuuUcJoRKDkcUvbMXY/9Xoa2quERrUg/rBbDUHowRPjYDS5GzY1+f4YY8s40BufGiqyUTKKXL953MVFK8gmezXA0hbmrnZ7CBOw/7238mORAdzExaX8n7CE=
ingotronic.ch. 300 IN RRSIG DNSKEY 5 2 300 20150125003700 20141226001657 6031 ingotronic.ch. rs1QlP2SlSpA2ELbzwg3DgWLzXWL3Lpv6CUJE2Q0qH2Zp7Qdy3cD+ZEtNh9v24Qv1M6JJ3zFt8mmZoCeW2ycuMbJCqBkW9CBuwF+VznZvZY2MxwPipvhvEEGP//0M8YAZJ66yQPDv3PTdAP8FYbIrJyvY44vwyncwbslpfHT9jAsrbfr3vuMuWps86dnP462q+0s1TxBfqi8mzo3gdavjHKWVNwohLahLKT+tWeu6DSzQv0YwMjwtkLgF7QRgx3ctIIkloOrnx9nHH1N6y+hxEB89fOlyVDjHhgL5uVtsD5fEdT0FJ2Gc/2nShEMMqIwr1/J9kUq1mNySff/uEe65Q==
ingotronic.ch. 300 IN RRSIG DNSKEY 5 2 300 20150125003700 20141226001657 17430 ingotronic.ch. mEwZjhQqeWksWD0TCnNBrtce4YkWJL3edqL6PvAUu8Fn+Ih437kEs3+pqdkgRsdYQ9HW+lBm/8pWwJlNAv0bi9NykItXMwAUFtncgq+6Pnh3iAM972GXSa5VV4LcGQ5b8CBdHCHiEKDqyPv5Hr5QfYL/FQaWlcNRh4QZZlZNPFA=
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 940 bytes
###############################################
dnssecjava-1.1.3/src/test/resources/recordings/org_jitsi_dnssec_TestInvalid/ 0000775 0000000 0000000 00000000000 13020541473 0027411 5 ustar 00root root 0000000 0000000 dnssecjava-1.1.3/src/test/resources/recordings/org_jitsi_dnssec_TestInvalid/testBogusSig 0000664 0000000 0000000 00000023122 13020541473 0031756 0 ustar 00root root 0000000 0000000 #Date: 2013-08-21T00:06:14+02:00
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 20364
;; flags: qr rd ra cd ; qd: 1 an: 2 au: 2 ad: 5
;; QUESTIONS:
;; bogussig.dnssec.tjeb.nl., type = A, class = IN
;; ANSWERS:
bogussig.dnssec.tjeb.nl. 285 IN A 178.18.82.80
bogussig.dnssec.tjeb.nl. 285 IN RRSIG A 5 4 600 20200101000000 20120627091948 23637 bogussig.dnssec.tjeb.nl. C8Qxh6KKVmO0ZwHvdlQUnWXOJNTGZYgHsXyGwgdU+yjQJp0zdbQF8InG4fEw3yVRgtRVW2b3IFiFimAOj8797IT4+QiAEb+JWoC27QrX/+iE6IqWpogbhiKm223w0shjo349ELzdXjNIxTquNYCSM9zYGfmJlT1OmYvh1LLyj/g=
;; AUTHORITY RECORDS:
bogussig.dnssec.tjeb.nl. 285 IN NS ns2.tjeb.nl.
bogussig.dnssec.tjeb.nl. 285 IN RRSIG NS 5 4 600 20200101000000 20120627091948 23637 bogussig.dnssec.tjeb.nl. kDOnemdOfAsiN4wjgAQ2b/4v3jcFGgBQrRQNvkhL29OOekdiJYDf2XlvY6CVyrqKRx5oFSu29tbIj6UDAsU6ObQu13JfYZ0FZqQyVjMjCNFUlZnGui7VVyPgi2rb3gKjWlX+FQhFYz1t8jtsopksMUGUVAI+oG61u3vaY0OUh/c=
;; ADDITIONAL RECORDS:
ns2.tjeb.nl. 555 IN A 195.169.221.157
ns2.tjeb.nl. 555 IN AAAA 2001:470:1f15:17ba:0:0:0:53
ns2.tjeb.nl. 556 IN RRSIG A 8 3 3600 20130917053510 20130818045138 11499 tjeb.nl. pXJsbRFz7VdvCiKPuElW08X+THHEwYrSFmKl1qd4N7xaQQl9rwmnN48mfqz3ZsChbJdPKsJJ2xSIj9+PcJoXm1RX8TMZoHpCOGDAbZPfEMTgCpnRkfNTMEYgpH9y8pqV49w88ertZfbx5S8FMa7JmEr5y9axzNyW/x0ln3FnGyI=
ns2.tjeb.nl. 556 IN RRSIG AAAA 8 3 3600 20130828183606 20130729175112 11499 tjeb.nl. 4ObrppiU3IGWmXezHtz7x3rVnkEZfhAxej2lo2zhg58UYIZqFN3WhvQS/iST1wP5jdqtCmhUMBAc1yQmGMyXFINbBHVlckyI7DrZt4vPOlTBkVqWqJIwi8mwZ3Tp//hFcRXqhvfGOj2K8x+4mnnRvnLNBKf/r/MW6E5R5R8+nZs=
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 830 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 36619
;; flags: qr rd ra ad cd ; qd: 1 an: 3 au: 0 ad: 1
;; QUESTIONS:
;; ., type = DNSKEY, class = IN
;; ANSWERS:
. 138548 IN DNSKEY 257 3 8 AwEAAagAIKlVZrpC6Ia7gEzahOR+9W29euxhJhVVLOyQbSEW0O8gcCjFFVQUTf6v58fLjwBd0YI0EzrAcQqBGCzh/RStIoO8g0NfnfL2MTJRkxoXbfDaUeVPQuYEhg37NZWAJQ9VnMVDxP/VHL496M/QZxkjf5/Efucp2gaDX6RS6CXpoY68LsvPVjR0ZSwzz1apAzvN9dlzEheX7ICJBBtuA6G3LQpzW5hOA2hzCTMjJPJ8LbqF6dsV6DoBQzgul0sGIcGOYl7OyQdXfZ57relSQageu+ipAdTTJ25AsRTAoub8ONGcLmqrAmRLKBP1dfwhYB4N7knNnulqQxA+Uk1ihz0=
. 138548 IN DNSKEY 256 3 8 AwEAAcFTyWsmpTs49Q0FKVepUqft+7+c3elhdsfh+amh+orgWLcitLM1bBBiWe6eymWW0EakLZAG4tej28tyx4f+j37Q9VX+m5NAhO/Y0riQonVWfzxLGymx3Ti5x/x7VKvF5Y5hf5OWv2J7pvEumYFFCtu4glit9T9J85+i3UgqSHqf
. 138548 IN RRSIG DNSKEY 8 0 172800 20130903235959 20130820000000 19036 . fGmWbtROfDQ5bFTrhIQDesRvY2viY1/7Qzg7WHHH8g78QONdl33t10P9rSHwjN2JdgZ3Jbnwu/2LOFCKpwV5Ei5w9A3oUW5jcq/wnC/oKSVfvoHJ4zzJ/11KCMi1sGVUwHRf2BeNMvf8Kjpb59oUMx85NjWkIxlZYZDsC/cemeRcm1aaYrzIAS+rxck8Wmx9+1cEz/KF/w2C0sZSiMJL52Jda5XBv/24obY1NLlUHTNIQVxktAS6e5bPtHNve4zbb0YGI0QUbtIO6Bh56CoE5vnHo5bDdBY6Kdo9VOlZd4AGm1Nw9z2HLyftJanqGd495azQ6uLV6x9QN6LZ4WBVwg==
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 736 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 7247
;; flags: qr rd ra cd ; qd: 1 an: 2 au: 0 ad: 1
;; QUESTIONS:
;; nl., type = DS, class = IN
;; ANSWERS:
nl. 83355 IN DS 21362 8 2 881D17ECCD7FD67F1086247611CCB7FB8646E82D0074AA91E980B016FD3EDE98
nl. 83355 IN RRSIG DS 8 1 86400 20130827000000 20130819230000 49656 . LeBOQAStOr5mLRIDTX893FlBFMKap/amWnaHKgKs6ip/B93jAuoPXJggBPnGGvFrVEuTK8JJOi55FHOEOvKjzg6qDswY+DbqGIdmYOD/SaXv0FqF/iuAbrrNaYXj50MexeHKgExNcEd5mrFk9eQh5T5w7QLjeQG9InVTvoXK5G0=
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 238 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 38189
;; flags: qr rd ra cd ; qd: 1 an: 3 au: 0 ad: 1
;; QUESTIONS:
;; nl., type = DNSKEY, class = IN
;; ANSWERS:
nl. 4155 IN DNSKEY 257 3 8 AwEAAbgqMqYHpmZrqQd3zFNOzYv2lw8bWBnrtK9TjlwK/ZBYMwKGR6TNbmMuwdjebpIE2vFxTHGLQfb2PmUJpazAGkG0fUaqrjuIU99Qbe5hwLYXqyGe2Mm+ZNRsomBxhluR/ky/XX4V1TjTqeXYH4gkzEs7I6og5IE0tKyhhpU38XHtuFVj7uunIAWGn5g9tZ0ZNnv8CkwLE5hLmRf+AoNTd483ZBX4FUT32KbF6XV3ikctXbsMe2GqGlIf0gMqJQbNvYf1NuNMbxauh9YavEQ0yaavI1hz5eLMJRruq4wDTyRnMJHupxY69oZZ9IbIsEf0FurtaA7fXrAxqcfEfARr4b0=
nl. 4155 IN DNSKEY 256 3 8 AwEAAaq7dp+Ez3A1naHOO0A1zAIfcRtGzYRSptT7NOxuw9mKNXf3Z0258r+l4ghNYbnf5ZhAUUMrah7ydNBu5gz9z1y+hJFhm7cPl13rtYmhbMcQoF89ERdCD586HFtgE1RCggGRy/cxp+VDG7N3gheAjbSdAChMSPE2sGC11CFPuEx7
nl. 4155 IN RRSIG DNSKEY 8 1 7200 20130902072242 20130819161003 21362 nl. MB0vdAiJIq7TAfodDKy5uGVu0idlJ49vIFs7pDBWvcSfv/7aUohEODQ/b9m0QrZacJz/yssm/pgLyQJckdsyfCWxJ71F2XnJmoZwTRtBVWSArbuDqZx2sisGljn46C5PokGNTVz7stMpLgrp2UBtbkKIUcFxVOkP1aMoAEC2te7EG68Cl/uaAJsphxgU4TyccSJes1QxEwAXpra/apnk/I35Cx67NJzVXOitTSmIh6qI6fjlDIxX30PUyyZsW5bcjJc41wCRpzpFy5d5GCrwqfPLM9ycDcL2LTp5JtGAldzMZ72Jyr6bzVAc7/8DkB4m5EgGjQ8EnbqKcs2aI+XpcQ==
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 745 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 29247
;; flags: qr rd ra cd ; qd: 1 an: 2 au: 0 ad: 1
;; QUESTIONS:
;; tjeb.nl., type = DS, class = IN
;; ANSWERS:
tjeb.nl. 4155 IN DS 17992 8 2 764501411DE58E8618945054A3F620B36202E115D015A7773F4B78E0F952CECA
tjeb.nl. 4155 IN RRSIG DS 8 2 7200 20130830191348 20130816101003 11604 nl. EJl0DMR81ffQRZAcB0wLXtNsUwNtcXkri9GHO8GkjZtlrzhk6jODf1xwFmD7vFCGMBcXqqHZYYWs5IjYUrrdrtFq6ePKfKc1pHs51EoTJdJvjLlShDWN2U9FTfXLjMiVpyL4d3o3ZaPPSQiqiaZINneqzDVyXXan9o8PMBbW7Sg=
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 246 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 64862
;; flags: qr rd ra cd ; qd: 1 an: 4 au: 0 ad: 1
;; QUESTIONS:
;; tjeb.nl., type = DNSKEY, class = IN
;; ANSWERS:
tjeb.nl. 555 IN DNSKEY 256 3 8 AwEAAee4BKqSMI/wEKdLXQyn+TzOjEMWG5IXy+WRGw+6MiKrbLit60eJxNXszf/zR55UUtMqP76lAFkFwZgpmUs6ac3pYOTUYRVFjjG1/hnUF1/thd9uZLe1E3gwa5m6dcOHaspG5xYsJ2wEBmYj1z1xTh70892PwxVR9R9GMKh4YyNt
tjeb.nl. 555 IN DNSKEY 257 3 8 AwEAAcHR47QfC0dlPEQkAsKRh3VYFvUKlIerSdlT7HBS3/NOQ6ghVs9uYskdbs2pLSRbu4CSu6X0MgKZO0lxoJhi6FqBa33Oc0Mmp/dd6AW4pNdZa4icP6fKT+HcPbLU9dUsrjDo13iXgUy3gls5BLG9KnTaLzWs9KmxTInBUHFLjZa70Fl+ILNfJ/e1D6eX3C104nmGSWpO6OB+nQDz46ra23eGJ7EeNAu1/uhPcqeXg3HWKjqHTzQW5XxVyMhdXx/ILC3SZhsqNqlkKZjmmHbg7V1+iograUg1XEaxaOE25W9jrzvQnMxlZT8I9LTyyi1YArvxMCTcGkNWRi4Ca4/HEDs=
tjeb.nl. 555 IN RRSIG DNSKEY 8 2 3600 20130917040339 20130818034238 11499 tjeb.nl. ocva2TybPLT8eY4pSxeawEpQ0AM7rvqdGwA3msbiwgPWpW/VfgPWBiN5cZg6PDQA2+Z+BWuK1qgCGFcGEwcWdQ9hm0AsT9pFD8xAFCyNNxYxRiMRFiDop33ZpE2N4S5ukfVVbPa1YHVZ2qzW+RZbb7HjYg4xOJiQKhNuaUEK1b8=
tjeb.nl. 555 IN RRSIG DNSKEY 8 2 3600 20130917040339 20130818034238 17992 tjeb.nl. iqa2i2rUfeHGNHYlkbeSBfULinAmRg9qcsCzTdzlv7MhI0EJZn9LXOlpVA8fi1a1plpIub7qFt5Uu1fzatmlZU48RBxFGINQO4Ad0SKqDFg0WdbwMjwvFJxRmqFvsLhm4eZhOxRx5bCpa/UtTawzY2D5IGH7GGdn8pA0Fa1Dvv32Fw4eNjlcq/Y5xEs1j1ar/qDcG9EyG00O0L+DEc4TREXpPe+PoZkMoRL+glC8IqZ3jJc56O8wugzvJomZNFiaLXGmr2H/XMayhLVpm7ncTeaDknK7aJu0Z/jnATjoc9nyP8t2/Rcw53781pDP1sJlSmfVn/Xpz/MAfY6HQSTPOg==
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 922 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 14587
;; flags: qr rd ra cd ; qd: 1 an: 2 au: 0 ad: 1
;; QUESTIONS:
;; dnssec.tjeb.nl., type = DS, class = IN
;; ANSWERS:
dnssec.tjeb.nl. 555 IN DS 8340 5 1 5733A59841EA708AE9223822124B07B555E17332
dnssec.tjeb.nl. 555 IN RRSIG DS 8 3 3600 20130917051704 20130818051644 11499 tjeb.nl. WfurllImGCRujmNfI0ZBtJrmQgSo/68lGSTo95J8YBIm2W9iUqsFI+LwKj3F2QEwz3SsJ2c1mDWiAvkptSq9LgqdLgBJpjDtHNg7fGHdZyvffjlj/+I4ePZG+7Lk5mpNmUmkhx8tgDJiCHMTgfjPl4nAjPxdUPjD59GStEKBT2E=
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 246 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 52275
;; flags: qr rd ra cd ; qd: 1 an: 2 au: 0 ad: 1
;; QUESTIONS:
;; dnssec.tjeb.nl., type = DNSKEY, class = IN
;; ANSWERS:
dnssec.tjeb.nl. 556 IN DNSKEY 256 3 5 AwEAAdSl9MRil0yoBBkAGGHhxJIRyB//+lfi+ftbTh3a3pDoukvRahssEOKRjiNfmaoQRHbZA4HTqWxIHlu0CzhOc/e5phBPY2oEnGWKmFQRihJVYd2lwjwCTZNKHUz0PhN6PBM8/xlFAyBWduM1ldZf7sge2rod3xx8mZjhVekRnw+P
dnssec.tjeb.nl. 556 IN RRSIG DNSKEY 5 3 3600 20150101000000 20120726165632 8340 dnssec.tjeb.nl. EcmwD5XSZMN8hc1opbI+0+x/6gQ5OukiFl746FJLBM9fUdcYb7A3GnJ9qyWRqvaEPSq2FuzfE2zmW7+YQRHlUxP/INk2ffjDJJwcrIUtgbJv8J+ztWl0L5crReEL5eYpgetG4xgGDT19W+Bd0EHg2YP3o1VHJvV8qzDQxam2NKI=
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 365 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 40156
;; flags: qr rd ra cd ; qd: 1 an: 2 au: 0 ad: 1
;; QUESTIONS:
;; bogussig.dnssec.tjeb.nl., type = DS, class = IN
;; ANSWERS:
bogussig.dnssec.tjeb.nl. 285 IN DS 23637 5 1 AC0EEB922A964D8C78B37851CC8AAE1692886BC6
bogussig.dnssec.tjeb.nl. 285 IN RRSIG DS 5 4 600 20150101000000 20120726165632 8340 dnssec.tjeb.nl. DIBZxWmoKj9j/GyxWzBLNejuSvhk0nrb5yfihYTu0ZgQJtDlhSfTE1j9RkAfwlq8+nPwBqjpEIbe931cqpEZDE28CyeiIV18A5Dqo0/gHBkZu9RBl0+JIYW0U1VJZBA00fB476rlnbYslaylXbykxG1KHTcuLWqvO99z7lsEfVM=
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 262 bytes
###############################################
dnssecjava-1.1.3/src/test/resources/recordings/org_jitsi_dnssec_TestInvalid/testBogusSigNsec3 0000664 0000000 0000000 00000023246 13020541473 0032661 0 ustar 00root root 0000000 0000000 #Date: 2013-08-21T00:06:16+02:00
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 7880
;; flags: qr rd ra cd ; qd: 1 an: 2 au: 2 ad: 5
;; QUESTIONS:
;; bogussig.Nsec3.tjeb.nl., type = A, class = IN
;; ANSWERS:
bogussig.Nsec3.tjeb.nl. 285 IN A 178.18.82.80
bogussig.Nsec3.tjeb.nl. 285 IN RRSIG A 7 4 600 20150101000000 20110520094958 32453 bogussig.nsec3.tjeb.nl. W8LMPVphiwjNEnlmk0zTZTNg6c4MhplKjtqhHnt1d2Td8KBpzBLEU+egiq4IDvOWK42Jko5TCCI50y5Un1eX0O7pa+v2m5anAOOY452gBH1H8rY2sVTxtWSCzcq5T2MmF7QChDt10PlbCC1liL4VBugOLJ1FDywuQLpnazvPOIo=
;; AUTHORITY RECORDS:
bogussig.nsec3.tjeb.nl. 285 IN NS ns2.tjeb.nl.
bogussig.nsec3.tjeb.nl. 285 IN RRSIG NS 7 4 600 20150101000000 20110520094958 32453 bogussig.nsec3.tjeb.nl. 3W61pFbwMuNT2GZHgIODVnE7GKKMgmiJzpAKpIfeFCE2rQxIYLGtPYcyB1PHEKiVn/+oXg3B0KfRYGCGfS0jWeT9wo4V/e53UdzOIlEAWLFLPPHqjOhTQ7htSNc18ZwD+tsYgoj6vdIfT49TLvLZQqe2jCKJ0rir9a/Kx7yHN0M=
;; ADDITIONAL RECORDS:
ns2.tjeb.nl. 553 IN A 195.169.221.157
ns2.tjeb.nl. 553 IN AAAA 2001:470:1f15:17ba:0:0:0:53
ns2.tjeb.nl. 554 IN RRSIG A 8 3 3600 20130917053510 20130818045138 11499 tjeb.nl. pXJsbRFz7VdvCiKPuElW08X+THHEwYrSFmKl1qd4N7xaQQl9rwmnN48mfqz3ZsChbJdPKsJJ2xSIj9+PcJoXm1RX8TMZoHpCOGDAbZPfEMTgCpnRkfNTMEYgpH9y8pqV49w88ertZfbx5S8FMa7JmEr5y9axzNyW/x0ln3FnGyI=
ns2.tjeb.nl. 554 IN RRSIG AAAA 8 3 3600 20130828183606 20130729175112 11499 tjeb.nl. 4ObrppiU3IGWmXezHtz7x3rVnkEZfhAxej2lo2zhg58UYIZqFN3WhvQS/iST1wP5jdqtCmhUMBAc1yQmGMyXFINbBHVlckyI7DrZt4vPOlTBkVqWqJIwi8mwZ3Tp//hFcRXqhvfGOj2K8x+4mnnRvnLNBKf/r/MW6E5R5R8+nZs=
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 827 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 13757
;; flags: qr rd ra ad cd ; qd: 1 an: 3 au: 0 ad: 1
;; QUESTIONS:
;; ., type = DNSKEY, class = IN
;; ANSWERS:
. 138546 IN DNSKEY 257 3 8 AwEAAagAIKlVZrpC6Ia7gEzahOR+9W29euxhJhVVLOyQbSEW0O8gcCjFFVQUTf6v58fLjwBd0YI0EzrAcQqBGCzh/RStIoO8g0NfnfL2MTJRkxoXbfDaUeVPQuYEhg37NZWAJQ9VnMVDxP/VHL496M/QZxkjf5/Efucp2gaDX6RS6CXpoY68LsvPVjR0ZSwzz1apAzvN9dlzEheX7ICJBBtuA6G3LQpzW5hOA2hzCTMjJPJ8LbqF6dsV6DoBQzgul0sGIcGOYl7OyQdXfZ57relSQageu+ipAdTTJ25AsRTAoub8ONGcLmqrAmRLKBP1dfwhYB4N7knNnulqQxA+Uk1ihz0=
. 138546 IN DNSKEY 256 3 8 AwEAAcFTyWsmpTs49Q0FKVepUqft+7+c3elhdsfh+amh+orgWLcitLM1bBBiWe6eymWW0EakLZAG4tej28tyx4f+j37Q9VX+m5NAhO/Y0riQonVWfzxLGymx3Ti5x/x7VKvF5Y5hf5OWv2J7pvEumYFFCtu4glit9T9J85+i3UgqSHqf
. 138546 IN RRSIG DNSKEY 8 0 172800 20130903235959 20130820000000 19036 . fGmWbtROfDQ5bFTrhIQDesRvY2viY1/7Qzg7WHHH8g78QONdl33t10P9rSHwjN2JdgZ3Jbnwu/2LOFCKpwV5Ei5w9A3oUW5jcq/wnC/oKSVfvoHJ4zzJ/11KCMi1sGVUwHRf2BeNMvf8Kjpb59oUMx85NjWkIxlZYZDsC/cemeRcm1aaYrzIAS+rxck8Wmx9+1cEz/KF/w2C0sZSiMJL52Jda5XBv/24obY1NLlUHTNIQVxktAS6e5bPtHNve4zbb0YGI0QUbtIO6Bh56CoE5vnHo5bDdBY6Kdo9VOlZd4AGm1Nw9z2HLyftJanqGd495azQ6uLV6x9QN6LZ4WBVwg==
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 736 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 48548
;; flags: qr rd ra cd ; qd: 1 an: 2 au: 0 ad: 1
;; QUESTIONS:
;; nl., type = DS, class = IN
;; ANSWERS:
nl. 83353 IN DS 21362 8 2 881D17ECCD7FD67F1086247611CCB7FB8646E82D0074AA91E980B016FD3EDE98
nl. 83353 IN RRSIG DS 8 1 86400 20130827000000 20130819230000 49656 . LeBOQAStOr5mLRIDTX893FlBFMKap/amWnaHKgKs6ip/B93jAuoPXJggBPnGGvFrVEuTK8JJOi55FHOEOvKjzg6qDswY+DbqGIdmYOD/SaXv0FqF/iuAbrrNaYXj50MexeHKgExNcEd5mrFk9eQh5T5w7QLjeQG9InVTvoXK5G0=
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 238 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 7166
;; flags: qr rd ra cd ; qd: 1 an: 3 au: 0 ad: 1
;; QUESTIONS:
;; nl., type = DNSKEY, class = IN
;; ANSWERS:
nl. 4153 IN DNSKEY 257 3 8 AwEAAbgqMqYHpmZrqQd3zFNOzYv2lw8bWBnrtK9TjlwK/ZBYMwKGR6TNbmMuwdjebpIE2vFxTHGLQfb2PmUJpazAGkG0fUaqrjuIU99Qbe5hwLYXqyGe2Mm+ZNRsomBxhluR/ky/XX4V1TjTqeXYH4gkzEs7I6og5IE0tKyhhpU38XHtuFVj7uunIAWGn5g9tZ0ZNnv8CkwLE5hLmRf+AoNTd483ZBX4FUT32KbF6XV3ikctXbsMe2GqGlIf0gMqJQbNvYf1NuNMbxauh9YavEQ0yaavI1hz5eLMJRruq4wDTyRnMJHupxY69oZZ9IbIsEf0FurtaA7fXrAxqcfEfARr4b0=
nl. 4153 IN DNSKEY 256 3 8 AwEAAaq7dp+Ez3A1naHOO0A1zAIfcRtGzYRSptT7NOxuw9mKNXf3Z0258r+l4ghNYbnf5ZhAUUMrah7ydNBu5gz9z1y+hJFhm7cPl13rtYmhbMcQoF89ERdCD586HFtgE1RCggGRy/cxp+VDG7N3gheAjbSdAChMSPE2sGC11CFPuEx7
nl. 4153 IN RRSIG DNSKEY 8 1 7200 20130902072242 20130819161003 21362 nl. MB0vdAiJIq7TAfodDKy5uGVu0idlJ49vIFs7pDBWvcSfv/7aUohEODQ/b9m0QrZacJz/yssm/pgLyQJckdsyfCWxJ71F2XnJmoZwTRtBVWSArbuDqZx2sisGljn46C5PokGNTVz7stMpLgrp2UBtbkKIUcFxVOkP1aMoAEC2te7EG68Cl/uaAJsphxgU4TyccSJes1QxEwAXpra/apnk/I35Cx67NJzVXOitTSmIh6qI6fjlDIxX30PUyyZsW5bcjJc41wCRpzpFy5d5GCrwqfPLM9ycDcL2LTp5JtGAldzMZ72Jyr6bzVAc7/8DkB4m5EgGjQ8EnbqKcs2aI+XpcQ==
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 745 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 54240
;; flags: qr rd ra cd ; qd: 1 an: 2 au: 0 ad: 1
;; QUESTIONS:
;; tjeb.nl., type = DS, class = IN
;; ANSWERS:
tjeb.nl. 4153 IN DS 17992 8 2 764501411DE58E8618945054A3F620B36202E115D015A7773F4B78E0F952CECA
tjeb.nl. 4153 IN RRSIG DS 8 2 7200 20130830191348 20130816101003 11604 nl. EJl0DMR81ffQRZAcB0wLXtNsUwNtcXkri9GHO8GkjZtlrzhk6jODf1xwFmD7vFCGMBcXqqHZYYWs5IjYUrrdrtFq6ePKfKc1pHs51EoTJdJvjLlShDWN2U9FTfXLjMiVpyL4d3o3ZaPPSQiqiaZINneqzDVyXXan9o8PMBbW7Sg=
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 246 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 27859
;; flags: qr rd ra cd ; qd: 1 an: 4 au: 0 ad: 1
;; QUESTIONS:
;; tjeb.nl., type = DNSKEY, class = IN
;; ANSWERS:
tjeb.nl. 553 IN DNSKEY 256 3 8 AwEAAee4BKqSMI/wEKdLXQyn+TzOjEMWG5IXy+WRGw+6MiKrbLit60eJxNXszf/zR55UUtMqP76lAFkFwZgpmUs6ac3pYOTUYRVFjjG1/hnUF1/thd9uZLe1E3gwa5m6dcOHaspG5xYsJ2wEBmYj1z1xTh70892PwxVR9R9GMKh4YyNt
tjeb.nl. 553 IN DNSKEY 257 3 8 AwEAAcHR47QfC0dlPEQkAsKRh3VYFvUKlIerSdlT7HBS3/NOQ6ghVs9uYskdbs2pLSRbu4CSu6X0MgKZO0lxoJhi6FqBa33Oc0Mmp/dd6AW4pNdZa4icP6fKT+HcPbLU9dUsrjDo13iXgUy3gls5BLG9KnTaLzWs9KmxTInBUHFLjZa70Fl+ILNfJ/e1D6eX3C104nmGSWpO6OB+nQDz46ra23eGJ7EeNAu1/uhPcqeXg3HWKjqHTzQW5XxVyMhdXx/ILC3SZhsqNqlkKZjmmHbg7V1+iograUg1XEaxaOE25W9jrzvQnMxlZT8I9LTyyi1YArvxMCTcGkNWRi4Ca4/HEDs=
tjeb.nl. 553 IN RRSIG DNSKEY 8 2 3600 20130917040339 20130818034238 11499 tjeb.nl. ocva2TybPLT8eY4pSxeawEpQ0AM7rvqdGwA3msbiwgPWpW/VfgPWBiN5cZg6PDQA2+Z+BWuK1qgCGFcGEwcWdQ9hm0AsT9pFD8xAFCyNNxYxRiMRFiDop33ZpE2N4S5ukfVVbPa1YHVZ2qzW+RZbb7HjYg4xOJiQKhNuaUEK1b8=
tjeb.nl. 553 IN RRSIG DNSKEY 8 2 3600 20130917040339 20130818034238 17992 tjeb.nl. iqa2i2rUfeHGNHYlkbeSBfULinAmRg9qcsCzTdzlv7MhI0EJZn9LXOlpVA8fi1a1plpIub7qFt5Uu1fzatmlZU48RBxFGINQO4Ad0SKqDFg0WdbwMjwvFJxRmqFvsLhm4eZhOxRx5bCpa/UtTawzY2D5IGH7GGdn8pA0Fa1Dvv32Fw4eNjlcq/Y5xEs1j1ar/qDcG9EyG00O0L+DEc4TREXpPe+PoZkMoRL+glC8IqZ3jJc56O8wugzvJomZNFiaLXGmr2H/XMayhLVpm7ncTeaDknK7aJu0Z/jnATjoc9nyP8t2/Rcw53781pDP1sJlSmfVn/Xpz/MAfY6HQSTPOg==
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 922 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 5375
;; flags: qr rd ra cd ; qd: 1 an: 3 au: 0 ad: 1
;; QUESTIONS:
;; nsec3.tjeb.nl., type = DS, class = IN
;; ANSWERS:
nsec3.tjeb.nl. 554 IN DS 33022 7 1 A9BBB2B6B619282B263474B19BDBA7A724A11F9E
nsec3.tjeb.nl. 554 IN DS 21665 7 2 40B5D47EC3AD05AF64CA91478408DE035AA64F7CAF7FC372958C80033B330377
nsec3.tjeb.nl. 554 IN RRSIG DS 8 3 3600 20130917053510 20130818045138 11499 tjeb.nl. SXiF+5inBiEVdfFredApgDrdJ/qu6/sjIQ1Ek4M+ldzrgfjtG+HDFTH3A+cs79Mfeq62yUuQpYLGrkZ5Ok9G/4j7lhzdIGX7VZqOqA5TecpjtnATvHaUH1+3nhHYTMCZbDe4wMzsMBnjcNLVbTq+t+UhLKhiq6nsI4xt8TA4fVQ=
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 293 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 4198
;; flags: qr rd ra cd ; qd: 1 an: 2 au: 0 ad: 1
;; QUESTIONS:
;; nsec3.tjeb.nl., type = DNSKEY, class = IN
;; ANSWERS:
nsec3.tjeb.nl. 554 IN DNSKEY 256 3 7 AwEAAdWgR6bilcX8UdjeVDenTLcnR6AsrSYXpYccj8QF103GPzDkoLLkh9KS4/obiRYs8BRGotSZK7QT1Ew/xWml425bR0JzOgajHF0Au01M/TtvLSA/Vf4jFqXfFwSBCMWtZGbspSj3SEiILaHmdsyfS0KpqJwF8f+hnOdwmHYEmMkh
nsec3.tjeb.nl. 554 IN RRSIG DNSKEY 7 3 3600 20160101000000 20120416140921 21665 nsec3.tjeb.nl. B/gmYobsGg2zcwEwkTHrYp3xt3claIM4YFKJiqZk3A9H4thBv+9kjmlF9Mt1PHAHtbxAmtYOyuPLuFGLbNWn/qCgjP6ShKHInY5nJMqTsL1Sf3kGhxcKsHR4wUjFKg0eyaFUel1Dm88W6yeWhMWj6vAz0C+LtT/mZnJabN4WQnY=
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 363 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 58727
;; flags: qr rd ra cd ; qd: 1 an: 2 au: 0 ad: 1
;; QUESTIONS:
;; bogussig.nsec3.tjeb.nl., type = DS, class = IN
;; ANSWERS:
bogussig.nsec3.tjeb.nl. 556 IN DS 32453 7 1 9866886BAB4AC1F8701687E488220437741B870E
bogussig.nsec3.tjeb.nl. 556 IN RRSIG DS 7 4 3600 20160101000000 20120416140921 21665 nsec3.tjeb.nl. ZETBW1W1Gx3VPNcH18KWJhlZ8QGQec+JRB9u+WGdp/rIq+6780iPUdXeXakqKyJGXcZd8jFo1YZ5otGbyaPxyxOX5qQmjEo22TcUZgfsUYCm5/BfKaIVq5tyRsT3qBGP1K3MelDZ8ahATQPXFHUnqKJ4RV4AnLk6e9V5rj6z4sI=
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 260 bytes
###############################################
dnssecjava-1.1.3/src/test/resources/recordings/org_jitsi_dnssec_TestInvalid/testModifiedSignature 0000664 0000000 0000000 00000014055 13020541473 0033643 0 ustar 00root root 0000000 0000000 #Date: 2013-08-21T00:06:16+02:00
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 39790
;; flags: qr rd ra ad cd ; qd: 1 an: 3 au: 0 ad: 1
;; QUESTIONS:
;; ., type = DNSKEY, class = IN
;; ANSWERS:
. 138546 IN DNSKEY 256 3 8 AwEAAcFTyWsmpTs49Q0FKVepUqft+7+c3elhdsfh+amh+orgWLcitLM1bBBiWe6eymWW0EakLZAG4tej28tyx4f+j37Q9VX+m5NAhO/Y0riQonVWfzxLGymx3Ti5x/x7VKvF5Y5hf5OWv2J7pvEumYFFCtu4glit9T9J85+i3UgqSHqf
. 138546 IN DNSKEY 257 3 8 AwEAAagAIKlVZrpC6Ia7gEzahOR+9W29euxhJhVVLOyQbSEW0O8gcCjFFVQUTf6v58fLjwBd0YI0EzrAcQqBGCzh/RStIoO8g0NfnfL2MTJRkxoXbfDaUeVPQuYEhg37NZWAJQ9VnMVDxP/VHL496M/QZxkjf5/Efucp2gaDX6RS6CXpoY68LsvPVjR0ZSwzz1apAzvN9dlzEheX7ICJBBtuA6G3LQpzW5hOA2hzCTMjJPJ8LbqF6dsV6DoBQzgul0sGIcGOYl7OyQdXfZ57relSQageu+ipAdTTJ25AsRTAoub8ONGcLmqrAmRLKBP1dfwhYB4N7knNnulqQxA+Uk1ihz0=
. 138546 IN RRSIG DNSKEY 8 0 172800 20130903235959 20130820000000 19036 . fGmWbtROfDQ5bFTrhIQDesRvY2viY1/7Qzg7WHHH8g78QONdl33t10P9rSHwjN2JdgZ3Jbnwu/2LOFCKpwV5Ei5w9A3oUW5jcq/wnC/oKSVfvoHJ4zzJ/11KCMi1sGVUwHRf2BeNMvf8Kjpb59oUMx85NjWkIxlZYZDsC/cemeRcm1aaYrzIAS+rxck8Wmx9+1cEz/KF/w2C0sZSiMJL52Jda5XBv/24obY1NLlUHTNIQVxktAS6e5bPtHNve4zbb0YGI0QUbtIO6Bh56CoE5vnHo5bDdBY6Kdo9VOlZd4AGm1Nw9z2HLyftJanqGd495azQ6uLV6x9QN6LZ4WBVwg==
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 736 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 39048
;; flags: qr rd ra ad cd ; qd: 1 an: 2 au: 0 ad: 1
;; QUESTIONS:
;; ch., type = DS, class = IN
;; ANSWERS:
ch. 83338 IN DS 22072 8 2 94E4C1E425B28150D8DD7C974E27E1A933C1D4B51E535177B52DFF3F807A8C94
ch. 83338 IN RRSIG DS 8 1 86400 20130827000000 20130819230000 49656 . AuYFxV0Za5X6pLHTPxpmX8PBV8yODP6t5xcqlXSm9WNXjdpHs927Aa8mTgTtNOrtXWgTBQNhBhjrg1KxmV9To7eolWAgnLa6ZYM6FjO4PWkJxWye0UzufBCpjU5hIZ8P2E7BUyD+pFfO07+dr+44dXfV0eYiGYlyWQiO7SalOiE=
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 238 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 5703
;; flags: qr rd ra ad cd ; qd: 1 an: 4 au: 0 ad: 1
;; QUESTIONS:
;; ch., type = DNSKEY, class = IN
;; ANSWERS:
ch. 83338 IN DNSKEY 256 3 8 AwEAAbxjQGBSu3RdzMwH7MD1o5nuv3PZ+iGBPIX+sHKLTOVOzp0xGho//69OLYfJj8B5Fm5Id7IicmSb67qAkkOZHYqSVyjkbsF2FeNVj7lFhCGnQ4EcjFdU/vlbL49z34ILXVEQBHl3vMS40i9py9BoJ4XJIy0I+vKqO2DyvxGEx+j1
ch. 83338 IN DNSKEY 257 3 8 AwEAAeP0/M59JL65K0YWD0W+8k8x1T79hM4W2pi7cx0CxQULRd3udQnf/8ymUbKsPfVDMCXLQwW2evWHRu4B/OKnkRzDQsev7prdJ5UxAHWF4oFsWpGYx+A7WbqllTlmMFkV8bNz6TW6Trl4+RaLirt3ofRUFrJKyKCyNCKkxbtpFO6p6vP5K8V3CW854NndF3D/Xjz0s3nwd3dLwW3XVqi705mhJBvCSeorgsKMcY3PCBG6U5Twj/akb6P8I2nmoGsrIbtmvGk191zV5o4i8RTjk5DI6FcO5GL0J1w9sAiVYfXlN8wdyr90kqO6MGcvSQEItJCTaljyRT53bekbUhdRE50=
ch. 83338 IN DNSKEY 256 3 8 AwEAAaANwH4naX1c6xHWHYuFVHa7PLc9n7BPL8J3sa2LqKuQvQ1aTu3hIYAsO6c5wlDp4Pgw8HejPdEZC/VRBtHkXeWfe84IJ2731IQYjQGyD4rKq/L9VjD9bMlSjj6RtI7t4ItzEPlsSEEmEtXFLt8IDzq0xc2tQcec9PsfvvV5jIWN
ch. 83338 IN RRSIG DNSKEY 8 1 86400 20131004100909 20130819090909 22072 ch. Nwqv4Ibx3E8+0xjeHocT6/hNGB99sxwpA3Nnan82YRcwpc73M0B8xlvUb+tzsIHvbQVCL83MWWtBfwRsbd9a32eqHvCdzk7wdmgnc4e+vO2QBDrpqy/AXN4+urBK7iuueNy0yUpqjRlIoBE4Ku1Qo1HYQpKu1vUa29w9qMrvTjDIRudy5yJ4YHFYjWF25d80W8coIh00KL2IjAbeZXRYFaaMP9Vw7NQN3qNM64/6FWvGEtD3QNt3Xf86C4m27Antn+na6K3iGT+doMME2kFYJaGwOrHBlE9F3MqWMtRI4McMTnkc052MaOVGKvvtDzmpQBcNQTrrMO4rSC6OofBPBw==
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 893 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 39975
;; flags: qr rd ra cd ; qd: 1 an: 3 au: 0 ad: 1
;; QUESTIONS:
;; ingotronic.ch., type = DS, class = IN
;; ANSWERS:
ingotronic.ch. 539 IN DS 6031 5 1 733D0218B571CD617B1A7493564B9FC4F12ADE82
ingotronic.ch. 539 IN DS 6031 5 2 4A948F2FDADA24686E473EDAC00DCF972584C75E3FAA92C2021B6221449FF87E
ingotronic.ch. 539 IN RRSIG DS 8 2 3600 20130909002703 20130813122537 51783 ch. Ke4stscv7T3wI6xZa7YsiGpmKhs7b8yPTL/HnIuwVnkIdhQfBB7lbXxdxEyLTLq04dmfiC03EtXCAZSHYovU5sE7O3UA11g7bSljxBLSmuCS6h4es2DMIwNWBexGiIkHAtoCL6zedfjGkexz3IYhMA96OfH+ft2nt4ykuDsXXB8=
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 288 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 44453
;; flags: qr aa rd ra cd ; qd: 1 an: 4 au: 0 ad: 1
;; QUESTIONS:
;; ingotronic.ch., type = DNSKEY, class = IN
;; ANSWERS:
ingotronic.ch. 300 IN DNSKEY 257 3 5 AwEAAeA1vzmjaB+eBAcvhzpKEgAEFpvQ1rg4uKDW6MsQtacKoqBpgyep2+LuWotz5p/xYxj3NGsArwN8Ad5cY0FHRr8miTT0elOv6nvlqGIfRuhj/BXAQ1x4ihpSFslHw0lJMYFwxsUZWpUyjWX/nv1xRZMMwF46gui0N4OEbyTYusCk77D+A71k+K0EAitFIbIH4GCUKmH1H7HmXhSVH9bN/n7KEGwW32lmsuuUcJoRKDkcUvbMXY/9Xoa2quERrUg/rBbDUHowRPjYDS5GzY1+f4YY8s40BufGiqyUTKKXL953MVFK8gmezXA0hbmrnZ7CBOw/7238mORAdzExaX8n7CE=
ingotronic.ch. 300 IN DNSKEY 256 3 5 AwEAAZ2Xh77GFzpEDx7EHYxShqltHgkiG+BOjBGifEmnJhQSdE5/yNSLFNcdhZZ8HUPxYnaedTqJcFFg4AzUsQklF/fECegTJdZjaj2WoL0/I8K7HMfY/hVuRZUWPNglYi8agJRX6gdkFTCpUNI7stpgKqxtzUJhhw15uG/lKMplwqUr
ingotronic.ch. 300 IN RRSIG DNSKEY 5 2 300 20130908212226 20130809202226 6031 ingotronic.ch. w8yqzYuixi+QI+UMdX3dVJVYynpp+d1wL8PwlqNMjL2dTsHxD6xSFefo+Zxxl2cte2soXuzU1pL5HiM34RgQL577FyVOInxfTpUEztG+z+PNS1xXBmHfGek9T70doaUwtdcP++V93H2Z9vG1dmgk0NYTKrKEYV30m0F4LUtWOMvnnZ50bIFi/PZAPAn1UJXK6m/A/tLfsECM4/YcZCE/R+Ce2wTKK0cmzFq0qo+QjznktvQr7BolDTjXb3TSssMwsB97RRfaRo6zZ4AMOa4ipCnd3IJBrCADzXtaGjp2ErfhwVxJCp9p+UVDqlYyMwEZO3MqJqpybzbvuQzNEOLVtw==
ingotronic.ch. 300 IN RRSIG DNSKEY 5 2 300 20130908212226 20130809202226 17430 ingotronic.ch. Zv2um4K6MF35IV252+eZDTSpN/BF0ElGZXfVhrORtxgHLBaFQUGIAOvi7b6PlQTlMVhkaEQxwgxZSS1b81KqXeuqFC+Z9QUaX5N+A9c2klwOBV+njdktH6zi75bWWCnSN33wZsw1uOKgNEVSpF509GQq+2yUoJU7PHycmG4z0Y8=
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 940 bytes
###############################################
testReturnOriginalRcodeIfPrimaryQueryFails 0000664 0000000 0000000 00000000041 13020541473 0037721 0 ustar 00root root 0000000 0000000 dnssecjava-1.1.3/src/test/resources/recordings/org_jitsi_dnssec_TestInvalid #Date: 2013-08-21T00:06:16+02:00
testReturnServfailIfIntermediateQueryFails 0000664 0000000 0000000 00000005222 13020541473 0037750 0 ustar 00root root 0000000 0000000 dnssecjava-1.1.3/src/test/resources/recordings/org_jitsi_dnssec_TestInvalid #Date: 2013-08-21T00:06:15+02:00
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 25326
;; flags: qr aa rd ra cd ; qd: 1 an: 2 au: 2 ad: 3
;; QUESTIONS:
;; www.ingotronic.ch., type = A, class = IN
;; ANSWERS:
www.ingotronic.ch. 300 IN A 127.0.0.1
www.ingotronic.ch. 300 IN RRSIG A 5 3 300 20130908204313 20130809202226 17430 ingotronic.ch. OMZ2Z5XSFruxd0jBCyT1wYKzlz6aw2Ui2XmbBxp3Bom26n7UiEdjeGlTkoLce5gxsKaAgPuBLGy6MauZz9wLomlsMphsRAP7Y/U1c5UuKKFjF49cRSu/DTS9OstJ3YNIeoABphfPCMn6dOqBIJyjVHJybiBx2ZBROHdaC4cB1KM=
;; AUTHORITY RECORDS:
ingotronic.ch. 300 IN NS ns1.ingotronic.ch.
ingotronic.ch. 300 IN RRSIG NS 5 2 300 20130908202801 20130809202226 17430 ingotronic.ch. nYQXAE0xrUBWGMWP1cq+xhTFdD91xm2yfuP8SyjL9fI/0ixcW/fJs0PPPdLkStz3ZTGk/rO6alU64HCecshJdLLdwmjNH6cEt9LkudHA4/8TT0fMR7E3elzbYZPIK7iYEsjcfRKey02Hmq+Y+k3W4+lc2uFOlbNr02HfOwH7SDc=
;; ADDITIONAL RECORDS:
ns1.ingotronic.ch. 300 IN A 62.192.5.131
ns1.ingotronic.ch. 300 IN RRSIG A 5 3 300 20130908205459 20130809202226 17430 ingotronic.ch. cQ+BxomTy6psnCbedHYgSECQGeRaKghNGOpsFX1ra+WC6MZKdQWAiG/fRn/yU6L4bE1pi1FfFIfAWu79KWfQIbVhOSFUjcpqw/D3lwXtGVk9fjiNCSZN9vsoe6iXLoJtvd1hN/PeHUZAWRdJSkGH9EHEzsWfoki6+kryBYDFDyM=
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 615 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 47195
;; flags: qr rd ra ad cd ; qd: 1 an: 3 au: 0 ad: 1
;; QUESTIONS:
;; ., type = DNSKEY, class = IN
;; ANSWERS:
. 138548 IN DNSKEY 257 3 8 AwEAAagAIKlVZrpC6Ia7gEzahOR+9W29euxhJhVVLOyQbSEW0O8gcCjFFVQUTf6v58fLjwBd0YI0EzrAcQqBGCzh/RStIoO8g0NfnfL2MTJRkxoXbfDaUeVPQuYEhg37NZWAJQ9VnMVDxP/VHL496M/QZxkjf5/Efucp2gaDX6RS6CXpoY68LsvPVjR0ZSwzz1apAzvN9dlzEheX7ICJBBtuA6G3LQpzW5hOA2hzCTMjJPJ8LbqF6dsV6DoBQzgul0sGIcGOYl7OyQdXfZ57relSQageu+ipAdTTJ25AsRTAoub8ONGcLmqrAmRLKBP1dfwhYB4N7knNnulqQxA+Uk1ihz0=
. 138548 IN DNSKEY 256 3 8 AwEAAcFTyWsmpTs49Q0FKVepUqft+7+c3elhdsfh+amh+orgWLcitLM1bBBiWe6eymWW0EakLZAG4tej28tyx4f+j37Q9VX+m5NAhO/Y0riQonVWfzxLGymx3Ti5x/x7VKvF5Y5hf5OWv2J7pvEumYFFCtu4glit9T9J85+i3UgqSHqf
. 138548 IN RRSIG DNSKEY 8 0 172800 20130903235959 20130820000000 19036 . fGmWbtROfDQ5bFTrhIQDesRvY2viY1/7Qzg7WHHH8g78QONdl33t10P9rSHwjN2JdgZ3Jbnwu/2LOFCKpwV5Ei5w9A3oUW5jcq/wnC/oKSVfvoHJ4zzJ/11KCMi1sGVUwHRf2BeNMvf8Kjpb59oUMx85NjWkIxlZYZDsC/cemeRcm1aaYrzIAS+rxck8Wmx9+1cEz/KF/w2C0sZSiMJL52Jda5XBv/24obY1NLlUHTNIQVxktAS6e5bPtHNve4zbb0YGI0QUbtIO6Bh56CoE5vnHo5bDdBY6Kdo9VOlZd4AGm1Nw9z2HLyftJanqGd495azQ6uLV6x9QN6LZ4WBVwg==
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 736 bytes
###############################################
dnssecjava-1.1.3/src/test/resources/recordings/org_jitsi_dnssec_TestInvalid/testSigExpired 0000664 0000000 0000000 00000023145 13020541473 0032304 0 ustar 00root root 0000000 0000000 #Date: 2013-08-21T00:06:15+02:00
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 63037
;; flags: qr rd ra cd ; qd: 1 an: 2 au: 2 ad: 5
;; QUESTIONS:
;; sigexpired.dnssec.tjeb.nl., type = A, class = IN
;; ANSWERS:
sigexpired.dnssec.tjeb.nl. 285 IN A 178.18.82.80
sigexpired.dnssec.tjeb.nl. 285 IN RRSIG A 5 4 600 20110628091948 20100628091948 47010 sigexpired.dnssec.tjeb.nl. VHpZcN2Pu+/anXg/DSHObQ0Rb+Xg9mPjSUccXvZhQiQ7KpIRFsV+c28fQG/KRp7upnQlzF0x0OG9aVijIeiuxzyymh1rG+EkmUL9d1kYiWrlASBClAh7MNXoQAD+7hndHYDm/xT6WXtgFIbrfUx/OhF/MbTtGn1BLGc2912Qs/c=
;; AUTHORITY RECORDS:
sigexpired.dnssec.tjeb.nl. 285 IN NS ns2.tjeb.nl.
sigexpired.dnssec.tjeb.nl. 285 IN RRSIG NS 5 4 600 20110628091948 20100628091948 47010 sigexpired.dnssec.tjeb.nl. PhOlt2TSE6gJdgPgyDsrVGXDsEg/0oeCHnYj99Nkaz5KhTYRnrFJUjcKWh4uDGzwxINxdgiesmwgPMO/EKabIhZRv8K6O6kmRHrPdH4ZLNFKVT5Ly+zTGS5dFQSoVv3Flb016vIGSDZxdcFAhVdzqm0rZg1CNkJdvcVPACwASFg=
;; ADDITIONAL RECORDS:
ns2.tjeb.nl. 554 IN A 195.169.221.157
ns2.tjeb.nl. 554 IN AAAA 2001:470:1f15:17ba:0:0:0:53
ns2.tjeb.nl. 555 IN RRSIG A 8 3 3600 20130917053510 20130818045138 11499 tjeb.nl. pXJsbRFz7VdvCiKPuElW08X+THHEwYrSFmKl1qd4N7xaQQl9rwmnN48mfqz3ZsChbJdPKsJJ2xSIj9+PcJoXm1RX8TMZoHpCOGDAbZPfEMTgCpnRkfNTMEYgpH9y8pqV49w88ertZfbx5S8FMa7JmEr5y9axzNyW/x0ln3FnGyI=
ns2.tjeb.nl. 555 IN RRSIG AAAA 8 3 3600 20130828183606 20130729175112 11499 tjeb.nl. 4ObrppiU3IGWmXezHtz7x3rVnkEZfhAxej2lo2zhg58UYIZqFN3WhvQS/iST1wP5jdqtCmhUMBAc1yQmGMyXFINbBHVlckyI7DrZt4vPOlTBkVqWqJIwi8mwZ3Tp//hFcRXqhvfGOj2K8x+4mnnRvnLNBKf/r/MW6E5R5R8+nZs=
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 836 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 22753
;; flags: qr rd ra ad cd ; qd: 1 an: 3 au: 0 ad: 1
;; QUESTIONS:
;; ., type = DNSKEY, class = IN
;; ANSWERS:
. 138547 IN DNSKEY 256 3 8 AwEAAcFTyWsmpTs49Q0FKVepUqft+7+c3elhdsfh+amh+orgWLcitLM1bBBiWe6eymWW0EakLZAG4tej28tyx4f+j37Q9VX+m5NAhO/Y0riQonVWfzxLGymx3Ti5x/x7VKvF5Y5hf5OWv2J7pvEumYFFCtu4glit9T9J85+i3UgqSHqf
. 138547 IN DNSKEY 257 3 8 AwEAAagAIKlVZrpC6Ia7gEzahOR+9W29euxhJhVVLOyQbSEW0O8gcCjFFVQUTf6v58fLjwBd0YI0EzrAcQqBGCzh/RStIoO8g0NfnfL2MTJRkxoXbfDaUeVPQuYEhg37NZWAJQ9VnMVDxP/VHL496M/QZxkjf5/Efucp2gaDX6RS6CXpoY68LsvPVjR0ZSwzz1apAzvN9dlzEheX7ICJBBtuA6G3LQpzW5hOA2hzCTMjJPJ8LbqF6dsV6DoBQzgul0sGIcGOYl7OyQdXfZ57relSQageu+ipAdTTJ25AsRTAoub8ONGcLmqrAmRLKBP1dfwhYB4N7knNnulqQxA+Uk1ihz0=
. 138547 IN RRSIG DNSKEY 8 0 172800 20130903235959 20130820000000 19036 . fGmWbtROfDQ5bFTrhIQDesRvY2viY1/7Qzg7WHHH8g78QONdl33t10P9rSHwjN2JdgZ3Jbnwu/2LOFCKpwV5Ei5w9A3oUW5jcq/wnC/oKSVfvoHJ4zzJ/11KCMi1sGVUwHRf2BeNMvf8Kjpb59oUMx85NjWkIxlZYZDsC/cemeRcm1aaYrzIAS+rxck8Wmx9+1cEz/KF/w2C0sZSiMJL52Jda5XBv/24obY1NLlUHTNIQVxktAS6e5bPtHNve4zbb0YGI0QUbtIO6Bh56CoE5vnHo5bDdBY6Kdo9VOlZd4AGm1Nw9z2HLyftJanqGd495azQ6uLV6x9QN6LZ4WBVwg==
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 736 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 59940
;; flags: qr rd ra cd ; qd: 1 an: 2 au: 0 ad: 1
;; QUESTIONS:
;; nl., type = DS, class = IN
;; ANSWERS:
nl. 83354 IN DS 21362 8 2 881D17ECCD7FD67F1086247611CCB7FB8646E82D0074AA91E980B016FD3EDE98
nl. 83354 IN RRSIG DS 8 1 86400 20130827000000 20130819230000 49656 . LeBOQAStOr5mLRIDTX893FlBFMKap/amWnaHKgKs6ip/B93jAuoPXJggBPnGGvFrVEuTK8JJOi55FHOEOvKjzg6qDswY+DbqGIdmYOD/SaXv0FqF/iuAbrrNaYXj50MexeHKgExNcEd5mrFk9eQh5T5w7QLjeQG9InVTvoXK5G0=
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 238 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 29772
;; flags: qr rd ra cd ; qd: 1 an: 3 au: 0 ad: 1
;; QUESTIONS:
;; nl., type = DNSKEY, class = IN
;; ANSWERS:
nl. 4154 IN DNSKEY 257 3 8 AwEAAbgqMqYHpmZrqQd3zFNOzYv2lw8bWBnrtK9TjlwK/ZBYMwKGR6TNbmMuwdjebpIE2vFxTHGLQfb2PmUJpazAGkG0fUaqrjuIU99Qbe5hwLYXqyGe2Mm+ZNRsomBxhluR/ky/XX4V1TjTqeXYH4gkzEs7I6og5IE0tKyhhpU38XHtuFVj7uunIAWGn5g9tZ0ZNnv8CkwLE5hLmRf+AoNTd483ZBX4FUT32KbF6XV3ikctXbsMe2GqGlIf0gMqJQbNvYf1NuNMbxauh9YavEQ0yaavI1hz5eLMJRruq4wDTyRnMJHupxY69oZZ9IbIsEf0FurtaA7fXrAxqcfEfARr4b0=
nl. 4154 IN DNSKEY 256 3 8 AwEAAaq7dp+Ez3A1naHOO0A1zAIfcRtGzYRSptT7NOxuw9mKNXf3Z0258r+l4ghNYbnf5ZhAUUMrah7ydNBu5gz9z1y+hJFhm7cPl13rtYmhbMcQoF89ERdCD586HFtgE1RCggGRy/cxp+VDG7N3gheAjbSdAChMSPE2sGC11CFPuEx7
nl. 4154 IN RRSIG DNSKEY 8 1 7200 20130902072242 20130819161003 21362 nl. MB0vdAiJIq7TAfodDKy5uGVu0idlJ49vIFs7pDBWvcSfv/7aUohEODQ/b9m0QrZacJz/yssm/pgLyQJckdsyfCWxJ71F2XnJmoZwTRtBVWSArbuDqZx2sisGljn46C5PokGNTVz7stMpLgrp2UBtbkKIUcFxVOkP1aMoAEC2te7EG68Cl/uaAJsphxgU4TyccSJes1QxEwAXpra/apnk/I35Cx67NJzVXOitTSmIh6qI6fjlDIxX30PUyyZsW5bcjJc41wCRpzpFy5d5GCrwqfPLM9ycDcL2LTp5JtGAldzMZ72Jyr6bzVAc7/8DkB4m5EgGjQ8EnbqKcs2aI+XpcQ==
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 745 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 5661
;; flags: qr rd ra cd ; qd: 1 an: 2 au: 0 ad: 1
;; QUESTIONS:
;; tjeb.nl., type = DS, class = IN
;; ANSWERS:
tjeb.nl. 4154 IN DS 17992 8 2 764501411DE58E8618945054A3F620B36202E115D015A7773F4B78E0F952CECA
tjeb.nl. 4154 IN RRSIG DS 8 2 7200 20130830191348 20130816101003 11604 nl. EJl0DMR81ffQRZAcB0wLXtNsUwNtcXkri9GHO8GkjZtlrzhk6jODf1xwFmD7vFCGMBcXqqHZYYWs5IjYUrrdrtFq6ePKfKc1pHs51EoTJdJvjLlShDWN2U9FTfXLjMiVpyL4d3o3ZaPPSQiqiaZINneqzDVyXXan9o8PMBbW7Sg=
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 246 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 32649
;; flags: qr rd ra cd ; qd: 1 an: 4 au: 0 ad: 1
;; QUESTIONS:
;; tjeb.nl., type = DNSKEY, class = IN
;; ANSWERS:
tjeb.nl. 554 IN DNSKEY 256 3 8 AwEAAee4BKqSMI/wEKdLXQyn+TzOjEMWG5IXy+WRGw+6MiKrbLit60eJxNXszf/zR55UUtMqP76lAFkFwZgpmUs6ac3pYOTUYRVFjjG1/hnUF1/thd9uZLe1E3gwa5m6dcOHaspG5xYsJ2wEBmYj1z1xTh70892PwxVR9R9GMKh4YyNt
tjeb.nl. 554 IN DNSKEY 257 3 8 AwEAAcHR47QfC0dlPEQkAsKRh3VYFvUKlIerSdlT7HBS3/NOQ6ghVs9uYskdbs2pLSRbu4CSu6X0MgKZO0lxoJhi6FqBa33Oc0Mmp/dd6AW4pNdZa4icP6fKT+HcPbLU9dUsrjDo13iXgUy3gls5BLG9KnTaLzWs9KmxTInBUHFLjZa70Fl+ILNfJ/e1D6eX3C104nmGSWpO6OB+nQDz46ra23eGJ7EeNAu1/uhPcqeXg3HWKjqHTzQW5XxVyMhdXx/ILC3SZhsqNqlkKZjmmHbg7V1+iograUg1XEaxaOE25W9jrzvQnMxlZT8I9LTyyi1YArvxMCTcGkNWRi4Ca4/HEDs=
tjeb.nl. 554 IN RRSIG DNSKEY 8 2 3600 20130917040339 20130818034238 11499 tjeb.nl. ocva2TybPLT8eY4pSxeawEpQ0AM7rvqdGwA3msbiwgPWpW/VfgPWBiN5cZg6PDQA2+Z+BWuK1qgCGFcGEwcWdQ9hm0AsT9pFD8xAFCyNNxYxRiMRFiDop33ZpE2N4S5ukfVVbPa1YHVZ2qzW+RZbb7HjYg4xOJiQKhNuaUEK1b8=
tjeb.nl. 554 IN RRSIG DNSKEY 8 2 3600 20130917040339 20130818034238 17992 tjeb.nl. iqa2i2rUfeHGNHYlkbeSBfULinAmRg9qcsCzTdzlv7MhI0EJZn9LXOlpVA8fi1a1plpIub7qFt5Uu1fzatmlZU48RBxFGINQO4Ad0SKqDFg0WdbwMjwvFJxRmqFvsLhm4eZhOxRx5bCpa/UtTawzY2D5IGH7GGdn8pA0Fa1Dvv32Fw4eNjlcq/Y5xEs1j1ar/qDcG9EyG00O0L+DEc4TREXpPe+PoZkMoRL+glC8IqZ3jJc56O8wugzvJomZNFiaLXGmr2H/XMayhLVpm7ncTeaDknK7aJu0Z/jnATjoc9nyP8t2/Rcw53781pDP1sJlSmfVn/Xpz/MAfY6HQSTPOg==
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 922 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 5928
;; flags: qr rd ra cd ; qd: 1 an: 2 au: 0 ad: 1
;; QUESTIONS:
;; dnssec.tjeb.nl., type = DS, class = IN
;; ANSWERS:
dnssec.tjeb.nl. 554 IN DS 8340 5 1 5733A59841EA708AE9223822124B07B555E17332
dnssec.tjeb.nl. 554 IN RRSIG DS 8 3 3600 20130917051704 20130818051644 11499 tjeb.nl. WfurllImGCRujmNfI0ZBtJrmQgSo/68lGSTo95J8YBIm2W9iUqsFI+LwKj3F2QEwz3SsJ2c1mDWiAvkptSq9LgqdLgBJpjDtHNg7fGHdZyvffjlj/+I4ePZG+7Lk5mpNmUmkhx8tgDJiCHMTgfjPl4nAjPxdUPjD59GStEKBT2E=
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 246 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 33538
;; flags: qr rd ra cd ; qd: 1 an: 2 au: 0 ad: 1
;; QUESTIONS:
;; dnssec.tjeb.nl., type = DNSKEY, class = IN
;; ANSWERS:
dnssec.tjeb.nl. 555 IN DNSKEY 256 3 5 AwEAAdSl9MRil0yoBBkAGGHhxJIRyB//+lfi+ftbTh3a3pDoukvRahssEOKRjiNfmaoQRHbZA4HTqWxIHlu0CzhOc/e5phBPY2oEnGWKmFQRihJVYd2lwjwCTZNKHUz0PhN6PBM8/xlFAyBWduM1ldZf7sge2rod3xx8mZjhVekRnw+P
dnssec.tjeb.nl. 555 IN RRSIG DNSKEY 5 3 3600 20150101000000 20120726165632 8340 dnssec.tjeb.nl. EcmwD5XSZMN8hc1opbI+0+x/6gQ5OukiFl746FJLBM9fUdcYb7A3GnJ9qyWRqvaEPSq2FuzfE2zmW7+YQRHlUxP/INk2ffjDJJwcrIUtgbJv8J+ztWl0L5crReEL5eYpgetG4xgGDT19W+Bd0EHg2YP3o1VHJvV8qzDQxam2NKI=
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 365 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 33840
;; flags: qr rd ra cd ; qd: 1 an: 2 au: 0 ad: 1
;; QUESTIONS:
;; sigexpired.dnssec.tjeb.nl., type = DS, class = IN
;; ANSWERS:
sigexpired.dnssec.tjeb.nl. 285 IN DS 47010 5 1 674BE2F020B2D307E0505E844840DD63ACB17CB8
sigexpired.dnssec.tjeb.nl. 285 IN RRSIG DS 5 4 600 20110727165632 20100727165632 8340 dnssec.tjeb.nl. UIFRltFjBk5gEHjQ4OM9Quv/cuPkVYkPc0wjbmb2LoDHBGZ0MDJb6Ch1he7RxeDOe6KQ/m1PM2IoG57n+5kl6UXj/J8rmJw45ODrSVMNdAZZHJ4UUqx4CNzv4BlGnQc1x6qHHn/mPHF96Ma+anGBzi4/fk99dbqh3WJJ1uUM8u0=
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 264 bytes
###############################################
dnssecjava-1.1.3/src/test/resources/recordings/org_jitsi_dnssec_TestInvalid/testSigExpiredNsec3 0000664 0000000 0000000 00000023273 13020541473 0033202 0 ustar 00root root 0000000 0000000 #Date: 2013-08-21T00:06:16+02:00
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 2078
;; flags: qr rd ra cd ; qd: 1 an: 2 au: 2 ad: 5
;; QUESTIONS:
;; sigexpired.Nsec3.tjeb.nl., type = A, class = IN
;; ANSWERS:
sigexpired.Nsec3.tjeb.nl. 286 IN A 178.18.82.80
sigexpired.Nsec3.tjeb.nl. 286 IN RRSIG A 7 4 600 20100520094957 20090520094957 22928 sigexpired.nsec3.tjeb.nl. DsCkOAQ7CZhHBao7r2AU9x705AqbCEJ5b0J+zEKzNEjC7pDvy7RrBcwgvKhiwhNblvBvPU6LXl11qKddb0mHSRrR5neJ3LXiAEeig4TAT+IsFk79XJl6TAcCTAXYPbpYf8cbtgYbyAOTS9JDmej4aKP4B8vpB0cXRlWmWKj/8NU=
;; AUTHORITY RECORDS:
sigexpired.nsec3.tjeb.nl. 286 IN NS ns2.tjeb.nl.
sigexpired.nsec3.tjeb.nl. 286 IN RRSIG NS 7 4 600 20100520094957 20090520094957 22928 sigexpired.nsec3.tjeb.nl. HxSs03s9vuL+e5DYiRrFBGi7N6fOrzwZVPvJLFcjHEJ6P1u6vtspNFoOc2HOxAetdxHeUdrPCxvrvrbnQLW4u6oobu0N7zKtF+lytCbDVyl2gUYADayf3XnG4uxUolUkU8QZuOYiLPkTNzL3k+PjAzqsCmUeNwdUbeJLOKFcD8Q=
;; ADDITIONAL RECORDS:
ns2.tjeb.nl. 554 IN A 195.169.221.157
ns2.tjeb.nl. 554 IN AAAA 2001:470:1f15:17ba:0:0:0:53
ns2.tjeb.nl. 555 IN RRSIG A 8 3 3600 20130917053510 20130818045138 11499 tjeb.nl. pXJsbRFz7VdvCiKPuElW08X+THHEwYrSFmKl1qd4N7xaQQl9rwmnN48mfqz3ZsChbJdPKsJJ2xSIj9+PcJoXm1RX8TMZoHpCOGDAbZPfEMTgCpnRkfNTMEYgpH9y8pqV49w88ertZfbx5S8FMa7JmEr5y9axzNyW/x0ln3FnGyI=
ns2.tjeb.nl. 555 IN RRSIG AAAA 8 3 3600 20130828183606 20130729175112 11499 tjeb.nl. 4ObrppiU3IGWmXezHtz7x3rVnkEZfhAxej2lo2zhg58UYIZqFN3WhvQS/iST1wP5jdqtCmhUMBAc1yQmGMyXFINbBHVlckyI7DrZt4vPOlTBkVqWqJIwi8mwZ3Tp//hFcRXqhvfGOj2K8x+4mnnRvnLNBKf/r/MW6E5R5R8+nZs=
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 833 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 54087
;; flags: qr rd ra ad cd ; qd: 1 an: 3 au: 0 ad: 1
;; QUESTIONS:
;; ., type = DNSKEY, class = IN
;; ANSWERS:
. 138547 IN DNSKEY 257 3 8 AwEAAagAIKlVZrpC6Ia7gEzahOR+9W29euxhJhVVLOyQbSEW0O8gcCjFFVQUTf6v58fLjwBd0YI0EzrAcQqBGCzh/RStIoO8g0NfnfL2MTJRkxoXbfDaUeVPQuYEhg37NZWAJQ9VnMVDxP/VHL496M/QZxkjf5/Efucp2gaDX6RS6CXpoY68LsvPVjR0ZSwzz1apAzvN9dlzEheX7ICJBBtuA6G3LQpzW5hOA2hzCTMjJPJ8LbqF6dsV6DoBQzgul0sGIcGOYl7OyQdXfZ57relSQageu+ipAdTTJ25AsRTAoub8ONGcLmqrAmRLKBP1dfwhYB4N7knNnulqQxA+Uk1ihz0=
. 138547 IN DNSKEY 256 3 8 AwEAAcFTyWsmpTs49Q0FKVepUqft+7+c3elhdsfh+amh+orgWLcitLM1bBBiWe6eymWW0EakLZAG4tej28tyx4f+j37Q9VX+m5NAhO/Y0riQonVWfzxLGymx3Ti5x/x7VKvF5Y5hf5OWv2J7pvEumYFFCtu4glit9T9J85+i3UgqSHqf
. 138547 IN RRSIG DNSKEY 8 0 172800 20130903235959 20130820000000 19036 . fGmWbtROfDQ5bFTrhIQDesRvY2viY1/7Qzg7WHHH8g78QONdl33t10P9rSHwjN2JdgZ3Jbnwu/2LOFCKpwV5Ei5w9A3oUW5jcq/wnC/oKSVfvoHJ4zzJ/11KCMi1sGVUwHRf2BeNMvf8Kjpb59oUMx85NjWkIxlZYZDsC/cemeRcm1aaYrzIAS+rxck8Wmx9+1cEz/KF/w2C0sZSiMJL52Jda5XBv/24obY1NLlUHTNIQVxktAS6e5bPtHNve4zbb0YGI0QUbtIO6Bh56CoE5vnHo5bDdBY6Kdo9VOlZd4AGm1Nw9z2HLyftJanqGd495azQ6uLV6x9QN6LZ4WBVwg==
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 736 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 11045
;; flags: qr rd ra cd ; qd: 1 an: 2 au: 0 ad: 1
;; QUESTIONS:
;; nl., type = DS, class = IN
;; ANSWERS:
nl. 83354 IN DS 21362 8 2 881D17ECCD7FD67F1086247611CCB7FB8646E82D0074AA91E980B016FD3EDE98
nl. 83354 IN RRSIG DS 8 1 86400 20130827000000 20130819230000 49656 . LeBOQAStOr5mLRIDTX893FlBFMKap/amWnaHKgKs6ip/B93jAuoPXJggBPnGGvFrVEuTK8JJOi55FHOEOvKjzg6qDswY+DbqGIdmYOD/SaXv0FqF/iuAbrrNaYXj50MexeHKgExNcEd5mrFk9eQh5T5w7QLjeQG9InVTvoXK5G0=
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 238 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 13198
;; flags: qr rd ra cd ; qd: 1 an: 3 au: 0 ad: 1
;; QUESTIONS:
;; nl., type = DNSKEY, class = IN
;; ANSWERS:
nl. 4154 IN DNSKEY 256 3 8 AwEAAaq7dp+Ez3A1naHOO0A1zAIfcRtGzYRSptT7NOxuw9mKNXf3Z0258r+l4ghNYbnf5ZhAUUMrah7ydNBu5gz9z1y+hJFhm7cPl13rtYmhbMcQoF89ERdCD586HFtgE1RCggGRy/cxp+VDG7N3gheAjbSdAChMSPE2sGC11CFPuEx7
nl. 4154 IN DNSKEY 257 3 8 AwEAAbgqMqYHpmZrqQd3zFNOzYv2lw8bWBnrtK9TjlwK/ZBYMwKGR6TNbmMuwdjebpIE2vFxTHGLQfb2PmUJpazAGkG0fUaqrjuIU99Qbe5hwLYXqyGe2Mm+ZNRsomBxhluR/ky/XX4V1TjTqeXYH4gkzEs7I6og5IE0tKyhhpU38XHtuFVj7uunIAWGn5g9tZ0ZNnv8CkwLE5hLmRf+AoNTd483ZBX4FUT32KbF6XV3ikctXbsMe2GqGlIf0gMqJQbNvYf1NuNMbxauh9YavEQ0yaavI1hz5eLMJRruq4wDTyRnMJHupxY69oZZ9IbIsEf0FurtaA7fXrAxqcfEfARr4b0=
nl. 4154 IN RRSIG DNSKEY 8 1 7200 20130902072242 20130819161003 21362 nl. MB0vdAiJIq7TAfodDKy5uGVu0idlJ49vIFs7pDBWvcSfv/7aUohEODQ/b9m0QrZacJz/yssm/pgLyQJckdsyfCWxJ71F2XnJmoZwTRtBVWSArbuDqZx2sisGljn46C5PokGNTVz7stMpLgrp2UBtbkKIUcFxVOkP1aMoAEC2te7EG68Cl/uaAJsphxgU4TyccSJes1QxEwAXpra/apnk/I35Cx67NJzVXOitTSmIh6qI6fjlDIxX30PUyyZsW5bcjJc41wCRpzpFy5d5GCrwqfPLM9ycDcL2LTp5JtGAldzMZ72Jyr6bzVAc7/8DkB4m5EgGjQ8EnbqKcs2aI+XpcQ==
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 745 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 38179
;; flags: qr rd ra cd ; qd: 1 an: 2 au: 0 ad: 1
;; QUESTIONS:
;; tjeb.nl., type = DS, class = IN
;; ANSWERS:
tjeb.nl. 4153 IN DS 17992 8 2 764501411DE58E8618945054A3F620B36202E115D015A7773F4B78E0F952CECA
tjeb.nl. 4153 IN RRSIG DS 8 2 7200 20130830191348 20130816101003 11604 nl. EJl0DMR81ffQRZAcB0wLXtNsUwNtcXkri9GHO8GkjZtlrzhk6jODf1xwFmD7vFCGMBcXqqHZYYWs5IjYUrrdrtFq6ePKfKc1pHs51EoTJdJvjLlShDWN2U9FTfXLjMiVpyL4d3o3ZaPPSQiqiaZINneqzDVyXXan9o8PMBbW7Sg=
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 246 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 5863
;; flags: qr rd ra cd ; qd: 1 an: 4 au: 0 ad: 1
;; QUESTIONS:
;; tjeb.nl., type = DNSKEY, class = IN
;; ANSWERS:
tjeb.nl. 553 IN DNSKEY 256 3 8 AwEAAee4BKqSMI/wEKdLXQyn+TzOjEMWG5IXy+WRGw+6MiKrbLit60eJxNXszf/zR55UUtMqP76lAFkFwZgpmUs6ac3pYOTUYRVFjjG1/hnUF1/thd9uZLe1E3gwa5m6dcOHaspG5xYsJ2wEBmYj1z1xTh70892PwxVR9R9GMKh4YyNt
tjeb.nl. 553 IN DNSKEY 257 3 8 AwEAAcHR47QfC0dlPEQkAsKRh3VYFvUKlIerSdlT7HBS3/NOQ6ghVs9uYskdbs2pLSRbu4CSu6X0MgKZO0lxoJhi6FqBa33Oc0Mmp/dd6AW4pNdZa4icP6fKT+HcPbLU9dUsrjDo13iXgUy3gls5BLG9KnTaLzWs9KmxTInBUHFLjZa70Fl+ILNfJ/e1D6eX3C104nmGSWpO6OB+nQDz46ra23eGJ7EeNAu1/uhPcqeXg3HWKjqHTzQW5XxVyMhdXx/ILC3SZhsqNqlkKZjmmHbg7V1+iograUg1XEaxaOE25W9jrzvQnMxlZT8I9LTyyi1YArvxMCTcGkNWRi4Ca4/HEDs=
tjeb.nl. 553 IN RRSIG DNSKEY 8 2 3600 20130917040339 20130818034238 11499 tjeb.nl. ocva2TybPLT8eY4pSxeawEpQ0AM7rvqdGwA3msbiwgPWpW/VfgPWBiN5cZg6PDQA2+Z+BWuK1qgCGFcGEwcWdQ9hm0AsT9pFD8xAFCyNNxYxRiMRFiDop33ZpE2N4S5ukfVVbPa1YHVZ2qzW+RZbb7HjYg4xOJiQKhNuaUEK1b8=
tjeb.nl. 553 IN RRSIG DNSKEY 8 2 3600 20130917040339 20130818034238 17992 tjeb.nl. iqa2i2rUfeHGNHYlkbeSBfULinAmRg9qcsCzTdzlv7MhI0EJZn9LXOlpVA8fi1a1plpIub7qFt5Uu1fzatmlZU48RBxFGINQO4Ad0SKqDFg0WdbwMjwvFJxRmqFvsLhm4eZhOxRx5bCpa/UtTawzY2D5IGH7GGdn8pA0Fa1Dvv32Fw4eNjlcq/Y5xEs1j1ar/qDcG9EyG00O0L+DEc4TREXpPe+PoZkMoRL+glC8IqZ3jJc56O8wugzvJomZNFiaLXGmr2H/XMayhLVpm7ncTeaDknK7aJu0Z/jnATjoc9nyP8t2/Rcw53781pDP1sJlSmfVn/Xpz/MAfY6HQSTPOg==
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 922 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 25050
;; flags: qr rd ra cd ; qd: 1 an: 3 au: 0 ad: 1
;; QUESTIONS:
;; nsec3.tjeb.nl., type = DS, class = IN
;; ANSWERS:
nsec3.tjeb.nl. 554 IN DS 33022 7 1 A9BBB2B6B619282B263474B19BDBA7A724A11F9E
nsec3.tjeb.nl. 554 IN DS 21665 7 2 40B5D47EC3AD05AF64CA91478408DE035AA64F7CAF7FC372958C80033B330377
nsec3.tjeb.nl. 554 IN RRSIG DS 8 3 3600 20130917053510 20130818045138 11499 tjeb.nl. SXiF+5inBiEVdfFredApgDrdJ/qu6/sjIQ1Ek4M+ldzrgfjtG+HDFTH3A+cs79Mfeq62yUuQpYLGrkZ5Ok9G/4j7lhzdIGX7VZqOqA5TecpjtnATvHaUH1+3nhHYTMCZbDe4wMzsMBnjcNLVbTq+t+UhLKhiq6nsI4xt8TA4fVQ=
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 293 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 5411
;; flags: qr rd ra cd ; qd: 1 an: 2 au: 0 ad: 1
;; QUESTIONS:
;; nsec3.tjeb.nl., type = DNSKEY, class = IN
;; ANSWERS:
nsec3.tjeb.nl. 554 IN DNSKEY 256 3 7 AwEAAdWgR6bilcX8UdjeVDenTLcnR6AsrSYXpYccj8QF103GPzDkoLLkh9KS4/obiRYs8BRGotSZK7QT1Ew/xWml425bR0JzOgajHF0Au01M/TtvLSA/Vf4jFqXfFwSBCMWtZGbspSj3SEiILaHmdsyfS0KpqJwF8f+hnOdwmHYEmMkh
nsec3.tjeb.nl. 554 IN RRSIG DNSKEY 7 3 3600 20160101000000 20120416140921 21665 nsec3.tjeb.nl. B/gmYobsGg2zcwEwkTHrYp3xt3claIM4YFKJiqZk3A9H4thBv+9kjmlF9Mt1PHAHtbxAmtYOyuPLuFGLbNWn/qCgjP6ShKHInY5nJMqTsL1Sf3kGhxcKsHR4wUjFKg0eyaFUel1Dm88W6yeWhMWj6vAz0C+LtT/mZnJabN4WQnY=
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 363 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 62061
;; flags: qr rd ra cd ; qd: 1 an: 2 au: 0 ad: 1
;; QUESTIONS:
;; sigexpired.nsec3.tjeb.nl., type = DS, class = IN
;; ANSWERS:
sigexpired.nsec3.tjeb.nl. 556 IN DS 22928 7 1 E6E3CB649AB6A75A3CC63DA102F732209ACC3446
sigexpired.nsec3.tjeb.nl. 556 IN RRSIG DS 7 4 3600 20110417140921 20100417140921 21665 nsec3.tjeb.nl. vYYJzFbjol1BQVj+ERludhem01UT1DTMGvcjicDluoMXivinuXFB9QX+Ke5AZscUiRFHpkwJHEC5t66Z+2GUHGxIA2/p8bym2pnrVFUq2e/rZS4wr3Ge2BKkerwLDpxmHd8VBnxodFlk6b4GqUJymAQf6PUfkAf6RBYdASEdBbY=
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 262 bytes
###############################################
dnssecjava-1.1.3/src/test/resources/recordings/org_jitsi_dnssec_TestInvalid/testSigNotIncepted 0000664 0000000 0000000 00000025067 13020541473 0033125 0 ustar 00root root 0000000 0000000 #Date: 2013-08-15T07:02:55+02:00
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 2652
;; flags: qr rd ra cd ; qd: 1 an: 2 au: 2 ad: 5
;; QUESTIONS:
;; signotincepted.dnssec.tjeb.nl., type = A, class = IN
;; ANSWERS:
signotincepted.dnssec.tjeb.nl. 600 IN A 178.18.82.80
signotincepted.dnssec.tjeb.nl. 600 IN RRSIG A 5 4 600 20140627091948 20130627091948 43716 signotincepted.dnssec.tjeb.nl. w7fQYuhBbO3jIbZLYd5cMeqjjW40TDK36SfGlHsbopQJwbCwylE6wmNLvbVZUCe77hm0s+Kr5B+vwwP7P/aKM+p6Gz19sL0U6qg/tZJbU1wSvQmEAZAtQaOfHnme/w3bKZREez+dYijsuo/Hn2gXsiWQ9eE0DATmdFAJJsnILg0=
;; AUTHORITY RECORDS:
signotincepted.dnssec.tjeb.nl. 600 IN NS ns2.tjeb.nl.
signotincepted.dnssec.tjeb.nl. 600 IN RRSIG NS 5 4 600 20140627091948 20130627091948 43716 signotincepted.dnssec.tjeb.nl. QvuKObjjDNW0fZ2RAKjIGQEU1cUssdH0djFzptWO63ggisd/LWehS7OTvuIf7VXDl2qzY/teeKj+dOjWWRtEI/2CyBb98/9qtraWlndZzPRJoYAfSCRYlxCdL3151ddPlHqOG+YRcFp8NR+bKE/00rpiuJTVv/34kPtxrV57w0o=
;; ADDITIONAL RECORDS:
ns2.tjeb.nl. 3592 IN A 195.169.221.157
ns2.tjeb.nl. 3592 IN AAAA 2001:470:1f15:17ba:0:0:0:53
ns2.tjeb.nl. 3592 IN RRSIG A 8 3 3600 20130825175138 20130726171233 11499 tjeb.nl. XuFDQiAK5gU/IuAXrnpuh+5zzb+twQpESX1qO4VgUQIOLkJCmCrb1rM7E3ABWWxhLUTavV/5XwpdAOSZiF/HksxMQeebsbrQTHY0T7+DUqqYVn0+jDZFhzAZyQSG7OvAExPAN3s4Y1yDnoJjmGxShlDnDzOD3gikH02DrhV49aE=
ns2.tjeb.nl. 3592 IN RRSIG AAAA 8 3 3600 20130828183606 20130729175112 11499 tjeb.nl. 4ObrppiU3IGWmXezHtz7x3rVnkEZfhAxej2lo2zhg58UYIZqFN3WhvQS/iST1wP5jdqtCmhUMBAc1yQmGMyXFINbBHVlckyI7DrZt4vPOlTBkVqWqJIwi8mwZ3Tp//hFcRXqhvfGOj2K8x+4mnnRvnLNBKf/r/MW6E5R5R8+nZs=
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 848 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 61044
;; flags: qr rd ra ad cd ; qd: 1 an: 3 au: 0 ad: 1
;; QUESTIONS:
;; ., type = DNSKEY, class = IN
;; ANSWERS:
. 113369 IN DNSKEY 257 3 8 AwEAAagAIKlVZrpC6Ia7gEzahOR+9W29euxhJhVVLOyQbSEW0O8gcCjFFVQUTf6v58fLjwBd0YI0EzrAcQqBGCzh/RStIoO8g0NfnfL2MTJRkxoXbfDaUeVPQuYEhg37NZWAJQ9VnMVDxP/VHL496M/QZxkjf5/Efucp2gaDX6RS6CXpoY68LsvPVjR0ZSwzz1apAzvN9dlzEheX7ICJBBtuA6G3LQpzW5hOA2hzCTMjJPJ8LbqF6dsV6DoBQzgul0sGIcGOYl7OyQdXfZ57relSQageu+ipAdTTJ25AsRTAoub8ONGcLmqrAmRLKBP1dfwhYB4N7knNnulqQxA+Uk1ihz0=
. 113369 IN DNSKEY 256 3 8 AwEAAcFTyWsmpTs49Q0FKVepUqft+7+c3elhdsfh+amh+orgWLcitLM1bBBiWe6eymWW0EakLZAG4tej28tyx4f+j37Q9VX+m5NAhO/Y0riQonVWfzxLGymx3Ti5x/x7VKvF5Y5hf5OWv2J7pvEumYFFCtu4glit9T9J85+i3UgqSHqf
. 113369 IN RRSIG DNSKEY 8 0 172800 20130824235959 20130810000000 19036 . CY/nCYvqJFMZ9N+SUaKlNTrYijsGkgtK5TiRz1o/nNslahBpeuNFOtIkLkRCgVF9heJH9OWaO1wMieXk7wpRBcgGih6BTdQeQf7kNEwHxhDWq3+nOXE9rFuYa+n9WyHKfDpChJ3j3ATzbLnghnLvLV4KhHeYNutnsu7T6ChksqFBmR5XYXmhZAWiBW3XcRObZEPOuDz1q3Th7yuNnFZ5lsq2A0YXZeeKSt+4xbo/MD9c7i7w82aw7vCgQscl6W5imMW3Pl4dnu7zkcYj1nx8Mt49bjsD8gX6+9+5BQwJzV5UapAeyvNGf9x48Rs+tXtbhmtLZYD7k91JmbI659iGkA==
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 736 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 46452
;; flags: qr rd ra cd ; qd: 1 an: 2 au: 0 ad: 1
;; QUESTIONS:
;; nl., type = DS, class = IN
;; ANSWERS:
nl. 86391 IN DS 21362 8 2 881D17ECCD7FD67F1086247611CCB7FB8646E82D0074AA91E980B016FD3EDE98
nl. 86391 IN RRSIG DS 8 1 86400 20130821000000 20130813230000 49656 . qQZoutS49MWz96Ermk+d6rB/pExeva6QLy4MlgpLwVSLvFfqTeeSCA82TLbW0W8yMCA2QpMkhzLQqOviQ5kbhrKqV5ywMBHppzRQALuyOkwZGSr29uvixUdQucN7zgrkC0ZJpPaUmkzhCUY7gm49lED57/RYY7q9pVP0fHvXarw=
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 238 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 11415
;; flags: qr rd ra cd ; qd: 1 an: 3 au: 0 ad: 1
;; QUESTIONS:
;; nl., type = DNSKEY, class = IN
;; ANSWERS:
nl. 7192 IN DNSKEY 256 3 8 AwEAAaq7dp+Ez3A1naHOO0A1zAIfcRtGzYRSptT7NOxuw9mKNXf3Z0258r+l4ghNYbnf5ZhAUUMrah7ydNBu5gz9z1y+hJFhm7cPl13rtYmhbMcQoF89ERdCD586HFtgE1RCggGRy/cxp+VDG7N3gheAjbSdAChMSPE2sGC11CFPuEx7
nl. 7192 IN DNSKEY 257 3 8 AwEAAbgqMqYHpmZrqQd3zFNOzYv2lw8bWBnrtK9TjlwK/ZBYMwKGR6TNbmMuwdjebpIE2vFxTHGLQfb2PmUJpazAGkG0fUaqrjuIU99Qbe5hwLYXqyGe2Mm+ZNRsomBxhluR/ky/XX4V1TjTqeXYH4gkzEs7I6og5IE0tKyhhpU38XHtuFVj7uunIAWGn5g9tZ0ZNnv8CkwLE5hLmRf+AoNTd483ZBX4FUT32KbF6XV3ikctXbsMe2GqGlIf0gMqJQbNvYf1NuNMbxauh9YavEQ0yaavI1hz5eLMJRruq4wDTyRnMJHupxY69oZZ9IbIsEf0FurtaA7fXrAxqcfEfARr4b0=
nl. 7192 IN RRSIG DNSKEY 8 1 7200 20130822174107 20130808221003 21362 nl. ZrKZiEBCXkzfPTPjk6uNTK53ix78tVENfUhLCIAsF8crxZUX3bjq00k7HKkdzTgfTXkiHF4iKhuY8d5MfI3yjR1fwMRC0ziqXuG3tP3NQQyN6Y0R/e9nJTt6TxnUZR4GThJotGs1n00KCcpy3IwPd/bagLmE7Onxib/AiHhuUiq6EvDDOB9/gmtW8M6KgKK+xqqzOY32OcLl/OgoHlpzE+qxVgC9fGSzfou7nVcXO05DDrwsCMmokY3mR3OTIB2nyEpIktDPy6Tw7oIHBSzg9qkz8Uzu0vFEGELhHk6a0PDqDwHybXMvWT1S4GRYR907wMkapkL4zO5tpT67vAhDig==
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 745 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 13217
;; flags: qr rd ra cd ; qd: 1 an: 2 au: 0 ad: 1
;; QUESTIONS:
;; tjeb.nl., type = DS, class = IN
;; ANSWERS:
tjeb.nl. 7192 IN DS 17992 8 2 764501411DE58E8618945054A3F620B36202E115D015A7773F4B78E0F952CECA
tjeb.nl. 7192 IN RRSIG DS 8 2 7200 20130819103334 20130805121003 11604 nl. OQN8ktWgxtEmagu1RMH9qhDaT+6nS/3rkXcgwdzd5x6/kLnymhjFtXXZQXQ95Vy2Q9LF3fPa7y09W/7EPNjHpzXaGXntXjj8ziOwVeKEBsRck92NLBl7dGYxG3u/ZohFNu56fcpxdM2tb7aiX+Kvu0W4JjYlH0pJXmyyRN9VwoI=
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 246 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 15214
;; flags: qr rd ra cd ; qd: 1 an: 4 au: 0 ad: 1
;; QUESTIONS:
;; tjeb.nl., type = DNSKEY, class = IN
;; ANSWERS:
tjeb.nl. 3592 IN DNSKEY 256 3 8 AwEAAee4BKqSMI/wEKdLXQyn+TzOjEMWG5IXy+WRGw+6MiKrbLit60eJxNXszf/zR55UUtMqP76lAFkFwZgpmUs6ac3pYOTUYRVFjjG1/hnUF1/thd9uZLe1E3gwa5m6dcOHaspG5xYsJ2wEBmYj1z1xTh70892PwxVR9R9GMKh4YyNt
tjeb.nl. 3592 IN DNSKEY 257 3 8 AwEAAcHR47QfC0dlPEQkAsKRh3VYFvUKlIerSdlT7HBS3/NOQ6ghVs9uYskdbs2pLSRbu4CSu6X0MgKZO0lxoJhi6FqBa33Oc0Mmp/dd6AW4pNdZa4icP6fKT+HcPbLU9dUsrjDo13iXgUy3gls5BLG9KnTaLzWs9KmxTInBUHFLjZa70Fl+ILNfJ/e1D6eX3C104nmGSWpO6OB+nQDz46ra23eGJ7EeNAu1/uhPcqeXg3HWKjqHTzQW5XxVyMhdXx/ILC3SZhsqNqlkKZjmmHbg7V1+iograUg1XEaxaOE25W9jrzvQnMxlZT8I9LTyyi1YArvxMCTcGkNWRi4Ca4/HEDs=
tjeb.nl. 3592 IN RRSIG DNSKEY 8 2 3600 20130825164238 20130726163447 11499 tjeb.nl. ItV+yYWokp7Sr+ISInJIk5zmeBR6PpUsZaPRYn+PATQjCxlCK8qtANIrVgTren0d7JNSjXfAEvrY/Ogb7eFE4nzcjZc61W5fRhwb5NSmtUWze8LYsgTet3CYqDzw4kVItsYS3M5j+AT2PnZ7yt93ujzFKtnU7OjCN+fkUjMtfw4=
tjeb.nl. 3592 IN RRSIG DNSKEY 8 2 3600 20130825164238 20130726163447 17992 tjeb.nl. K8aSWTJyn0V88GfduWDMEdDYrRMQJYbnnfw39Yz/D3ilH9jVqIqWQmHAZbPnfwYRGlnRPSM/fVcMN29tiCpjbJGE8wzGr8VhAY/co/c8UFF54y04gaOMuhZ0OG7whNjuzXavpLk0p748kcggdOxZjdNxK5f9uXYZrPI/CiKWWzFtw3GHYvfhcx10LbGaw4Poiy2JvxYX21jwlplLoETfO5rB8VQV4XTj5d2KQWp1S3iCjGGHvVwbyvbmsfaEGgst6k6MKpY/oJKg9BjMvGfvk6GRDDaxp0Bg+lXWSOZC31yHr+s+/6QMl0uwgUivPB4NsvdVV3rZpVk9FhXOi53KWA==
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 922 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 4974
;; flags: qr rd ra cd ; qd: 1 an: 2 au: 0 ad: 1
;; QUESTIONS:
;; dnssec.tjeb.nl., type = DS, class = IN
;; ANSWERS:
dnssec.tjeb.nl. 3592 IN DS 8340 5 1 5733A59841EA708AE9223822124B07B555E17332
dnssec.tjeb.nl. 3592 IN RRSIG DS 8 3 3600 20130825181644 20130726174307 11499 tjeb.nl. LkunjIbAoYdh7yZg8eimy8DyRiRs/u+TK1T2kSKkWxigul2tYb8JHwkqSyTqgu7Ugq6TvAcqyta1j0Dc0uuIX9y+CWRoc1R7gNdBEWfT5gAYMzCVlP3VmkwXUashVcI3Vqf2MWgv1ljU4gR98BLkPuUwVbQt3PCzNtwIPEYCJwA=
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 246 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 55363
;; flags: qr rd ra cd ; qd: 1 an: 2 au: 0 ad: 1
;; QUESTIONS:
;; dnssec.tjeb.nl., type = DNSKEY, class = IN
;; ANSWERS:
dnssec.tjeb.nl. 3593 IN DNSKEY 256 3 5 AwEAAdSl9MRil0yoBBkAGGHhxJIRyB//+lfi+ftbTh3a3pDoukvRahssEOKRjiNfmaoQRHbZA4HTqWxIHlu0CzhOc/e5phBPY2oEnGWKmFQRihJVYd2lwjwCTZNKHUz0PhN6PBM8/xlFAyBWduM1ldZf7sge2rod3xx8mZjhVekRnw+P
dnssec.tjeb.nl. 3593 IN RRSIG DNSKEY 5 3 3600 20150101000000 20120726165632 8340 dnssec.tjeb.nl. EcmwD5XSZMN8hc1opbI+0+x/6gQ5OukiFl746FJLBM9fUdcYb7A3GnJ9qyWRqvaEPSq2FuzfE2zmW7+YQRHlUxP/INk2ffjDJJwcrIUtgbJv8J+ztWl0L5crReEL5eYpgetG4xgGDT19W+Bd0EHg2YP3o1VHJvV8qzDQxam2NKI=
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 365 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 50514
;; flags: qr rd ra cd ; qd: 1 an: 2 au: 0 ad: 1
;; QUESTIONS:
;; signotincepted.dnssec.tjeb.nl., type = DS, class = IN
;; ANSWERS:
signotincepted.dnssec.tjeb.nl. 600 IN DS 43716 5 1 4EA06CEC6579A35C665290C233BF14440703798C
signotincepted.dnssec.tjeb.nl. 600 IN RRSIG DS 5 4 600 20140726165632 20130726165632 8340 dnssec.tjeb.nl. C6CX+RsChpMF15AtsQxisDjNi8JUR22DkmGUICAcZKfNAXNB5t7UPRkm9h7t9Vo3hRJtK7tgoLos9qTxCp2rtvM9lXGfpu5sb6Nfl/QJt2aWapf+IphdUVo7OpVQutOF0ohtZ9hn5kBzGfucm/YJ3HCO0jPa8MFRmvs0xny0fCQ=
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 268 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 32874
;; flags: qr rd ra cd ; qd: 1 an: 2 au: 0 ad: 1
;; QUESTIONS:
;; signotincepted.dnssec.tjeb.nl., type = DNSKEY, class = IN
;; ANSWERS:
signotincepted.dnssec.tjeb.nl. 3600 IN DNSKEY 256 3 5 AwEAAc7fMtj1jfY8G1Mq79tHzhxVmLZG+emoDaHiWjyDIyAcaICEEr0SUJ+Iv8Z3gwyCF8Syl6RThrS/xioDJcp3m7hNXQ3FzpTfK1uluhWvano7evLXCyG/CZHKVRE0YLrM1BW4D2BKJT+rR6OFBewQzmnWbSoVLMjHcPTATx6XTcH/
signotincepted.dnssec.tjeb.nl. 3600 IN RRSIG DNSKEY 5 4 3600 20140627091948 20130627091948 43716 signotincepted.dnssec.tjeb.nl. nboex3FhaOYUiLn2vIJbxzsxqimuz43RN2M5HOfD5K/z1CuvgY5YYt1TiLjxIUCUnWbJmm6eUbjl819grpo+tOLZYlyScndajw+TW0wz07oDQxPpCZmT1mjSoPNsora0wafC38D1ZRPs8RO7lE1z7KzFGlfuTw1nuJxd788kLwc=
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 395 bytes
###############################################
dnssecjava-1.1.3/src/test/resources/recordings/org_jitsi_dnssec_TestInvalid/testSigNotInceptedNsec3 0000664 0000000 0000000 00000025175 13020541473 0034021 0 ustar 00root root 0000000 0000000 #Date: 2013-08-21T00:06:15+02:00
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 20575
;; flags: qr rd ra cd ; qd: 1 an: 2 au: 2 ad: 5
;; QUESTIONS:
;; signotincepted.Nsec3.tjeb.nl., type = A, class = IN
;; ANSWERS:
signotincepted.Nsec3.tjeb.nl. 285 IN A 178.18.82.80
signotincepted.Nsec3.tjeb.nl. 285 IN RRSIG A 7 4 600 20130519094957 20120519094957 20687 signotincepted.nsec3.tjeb.nl. RtLAboSb8JKajSSu0FXkKI/HRJC8xCs5UMYZUy76d3TId2DWDgg4cGMdcepvjlsXVgtiNF0dBUtgRdnlHQrP34iandxyoLsBO/c5SvJL3UVeIjR1CUIdEc22pKPG7QyrXP5HjluA9IM9QF98vBo5r2O3yOkTMmrN9vEc64AgARM=
;; AUTHORITY RECORDS:
signotincepted.nsec3.tjeb.nl. 285 IN NS ns2.tjeb.nl.
signotincepted.nsec3.tjeb.nl. 285 IN RRSIG NS 7 4 600 20130519094957 20120519094957 20687 signotincepted.nsec3.tjeb.nl. KNktxXrmtCJA7B92k9G7CrpeFu8Akms7pYJzK925Qimz/6wQ70ucfckwW37AWBtPD4nY0MMMkQqCq+wFgCJJ2PSUGrU8Z4j5qBhueHhImmm8jEJDciEEmIxj+9YAjowlMuPfPHQDtCTFmyqSWp9ybQ9TbYidCm3p1sv+E2mG4Bc=
;; ADDITIONAL RECORDS:
ns2.tjeb.nl. 555 IN A 195.169.221.157
ns2.tjeb.nl. 555 IN AAAA 2001:470:1f15:17ba:0:0:0:53
ns2.tjeb.nl. 556 IN RRSIG A 8 3 3600 20130917053510 20130818045138 11499 tjeb.nl. pXJsbRFz7VdvCiKPuElW08X+THHEwYrSFmKl1qd4N7xaQQl9rwmnN48mfqz3ZsChbJdPKsJJ2xSIj9+PcJoXm1RX8TMZoHpCOGDAbZPfEMTgCpnRkfNTMEYgpH9y8pqV49w88ertZfbx5S8FMa7JmEr5y9axzNyW/x0ln3FnGyI=
ns2.tjeb.nl. 556 IN RRSIG AAAA 8 3 3600 20130828183606 20130729175112 11499 tjeb.nl. 4ObrppiU3IGWmXezHtz7x3rVnkEZfhAxej2lo2zhg58UYIZqFN3WhvQS/iST1wP5jdqtCmhUMBAc1yQmGMyXFINbBHVlckyI7DrZt4vPOlTBkVqWqJIwi8mwZ3Tp//hFcRXqhvfGOj2K8x+4mnnRvnLNBKf/r/MW6E5R5R8+nZs=
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 845 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 61121
;; flags: qr rd ra ad cd ; qd: 1 an: 3 au: 0 ad: 1
;; QUESTIONS:
;; ., type = DNSKEY, class = IN
;; ANSWERS:
. 138548 IN DNSKEY 257 3 8 AwEAAagAIKlVZrpC6Ia7gEzahOR+9W29euxhJhVVLOyQbSEW0O8gcCjFFVQUTf6v58fLjwBd0YI0EzrAcQqBGCzh/RStIoO8g0NfnfL2MTJRkxoXbfDaUeVPQuYEhg37NZWAJQ9VnMVDxP/VHL496M/QZxkjf5/Efucp2gaDX6RS6CXpoY68LsvPVjR0ZSwzz1apAzvN9dlzEheX7ICJBBtuA6G3LQpzW5hOA2hzCTMjJPJ8LbqF6dsV6DoBQzgul0sGIcGOYl7OyQdXfZ57relSQageu+ipAdTTJ25AsRTAoub8ONGcLmqrAmRLKBP1dfwhYB4N7knNnulqQxA+Uk1ihz0=
. 138548 IN DNSKEY 256 3 8 AwEAAcFTyWsmpTs49Q0FKVepUqft+7+c3elhdsfh+amh+orgWLcitLM1bBBiWe6eymWW0EakLZAG4tej28tyx4f+j37Q9VX+m5NAhO/Y0riQonVWfzxLGymx3Ti5x/x7VKvF5Y5hf5OWv2J7pvEumYFFCtu4glit9T9J85+i3UgqSHqf
. 138548 IN RRSIG DNSKEY 8 0 172800 20130903235959 20130820000000 19036 . fGmWbtROfDQ5bFTrhIQDesRvY2viY1/7Qzg7WHHH8g78QONdl33t10P9rSHwjN2JdgZ3Jbnwu/2LOFCKpwV5Ei5w9A3oUW5jcq/wnC/oKSVfvoHJ4zzJ/11KCMi1sGVUwHRf2BeNMvf8Kjpb59oUMx85NjWkIxlZYZDsC/cemeRcm1aaYrzIAS+rxck8Wmx9+1cEz/KF/w2C0sZSiMJL52Jda5XBv/24obY1NLlUHTNIQVxktAS6e5bPtHNve4zbb0YGI0QUbtIO6Bh56CoE5vnHo5bDdBY6Kdo9VOlZd4AGm1Nw9z2HLyftJanqGd495azQ6uLV6x9QN6LZ4WBVwg==
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 736 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 64342
;; flags: qr rd ra cd ; qd: 1 an: 2 au: 0 ad: 1
;; QUESTIONS:
;; nl., type = DS, class = IN
;; ANSWERS:
nl. 83355 IN DS 21362 8 2 881D17ECCD7FD67F1086247611CCB7FB8646E82D0074AA91E980B016FD3EDE98
nl. 83355 IN RRSIG DS 8 1 86400 20130827000000 20130819230000 49656 . LeBOQAStOr5mLRIDTX893FlBFMKap/amWnaHKgKs6ip/B93jAuoPXJggBPnGGvFrVEuTK8JJOi55FHOEOvKjzg6qDswY+DbqGIdmYOD/SaXv0FqF/iuAbrrNaYXj50MexeHKgExNcEd5mrFk9eQh5T5w7QLjeQG9InVTvoXK5G0=
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 238 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 12956
;; flags: qr rd ra cd ; qd: 1 an: 3 au: 0 ad: 1
;; QUESTIONS:
;; nl., type = DNSKEY, class = IN
;; ANSWERS:
nl. 4155 IN DNSKEY 257 3 8 AwEAAbgqMqYHpmZrqQd3zFNOzYv2lw8bWBnrtK9TjlwK/ZBYMwKGR6TNbmMuwdjebpIE2vFxTHGLQfb2PmUJpazAGkG0fUaqrjuIU99Qbe5hwLYXqyGe2Mm+ZNRsomBxhluR/ky/XX4V1TjTqeXYH4gkzEs7I6og5IE0tKyhhpU38XHtuFVj7uunIAWGn5g9tZ0ZNnv8CkwLE5hLmRf+AoNTd483ZBX4FUT32KbF6XV3ikctXbsMe2GqGlIf0gMqJQbNvYf1NuNMbxauh9YavEQ0yaavI1hz5eLMJRruq4wDTyRnMJHupxY69oZZ9IbIsEf0FurtaA7fXrAxqcfEfARr4b0=
nl. 4155 IN DNSKEY 256 3 8 AwEAAaq7dp+Ez3A1naHOO0A1zAIfcRtGzYRSptT7NOxuw9mKNXf3Z0258r+l4ghNYbnf5ZhAUUMrah7ydNBu5gz9z1y+hJFhm7cPl13rtYmhbMcQoF89ERdCD586HFtgE1RCggGRy/cxp+VDG7N3gheAjbSdAChMSPE2sGC11CFPuEx7
nl. 4155 IN RRSIG DNSKEY 8 1 7200 20130902072242 20130819161003 21362 nl. MB0vdAiJIq7TAfodDKy5uGVu0idlJ49vIFs7pDBWvcSfv/7aUohEODQ/b9m0QrZacJz/yssm/pgLyQJckdsyfCWxJ71F2XnJmoZwTRtBVWSArbuDqZx2sisGljn46C5PokGNTVz7stMpLgrp2UBtbkKIUcFxVOkP1aMoAEC2te7EG68Cl/uaAJsphxgU4TyccSJes1QxEwAXpra/apnk/I35Cx67NJzVXOitTSmIh6qI6fjlDIxX30PUyyZsW5bcjJc41wCRpzpFy5d5GCrwqfPLM9ycDcL2LTp5JtGAldzMZ72Jyr6bzVAc7/8DkB4m5EgGjQ8EnbqKcs2aI+XpcQ==
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 745 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 54118
;; flags: qr rd ra cd ; qd: 1 an: 2 au: 0 ad: 1
;; QUESTIONS:
;; tjeb.nl., type = DS, class = IN
;; ANSWERS:
tjeb.nl. 4155 IN DS 17992 8 2 764501411DE58E8618945054A3F620B36202E115D015A7773F4B78E0F952CECA
tjeb.nl. 4155 IN RRSIG DS 8 2 7200 20130830191348 20130816101003 11604 nl. EJl0DMR81ffQRZAcB0wLXtNsUwNtcXkri9GHO8GkjZtlrzhk6jODf1xwFmD7vFCGMBcXqqHZYYWs5IjYUrrdrtFq6ePKfKc1pHs51EoTJdJvjLlShDWN2U9FTfXLjMiVpyL4d3o3ZaPPSQiqiaZINneqzDVyXXan9o8PMBbW7Sg=
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 246 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 36147
;; flags: qr rd ra cd ; qd: 1 an: 4 au: 0 ad: 1
;; QUESTIONS:
;; tjeb.nl., type = DNSKEY, class = IN
;; ANSWERS:
tjeb.nl. 555 IN DNSKEY 257 3 8 AwEAAcHR47QfC0dlPEQkAsKRh3VYFvUKlIerSdlT7HBS3/NOQ6ghVs9uYskdbs2pLSRbu4CSu6X0MgKZO0lxoJhi6FqBa33Oc0Mmp/dd6AW4pNdZa4icP6fKT+HcPbLU9dUsrjDo13iXgUy3gls5BLG9KnTaLzWs9KmxTInBUHFLjZa70Fl+ILNfJ/e1D6eX3C104nmGSWpO6OB+nQDz46ra23eGJ7EeNAu1/uhPcqeXg3HWKjqHTzQW5XxVyMhdXx/ILC3SZhsqNqlkKZjmmHbg7V1+iograUg1XEaxaOE25W9jrzvQnMxlZT8I9LTyyi1YArvxMCTcGkNWRi4Ca4/HEDs=
tjeb.nl. 555 IN DNSKEY 256 3 8 AwEAAee4BKqSMI/wEKdLXQyn+TzOjEMWG5IXy+WRGw+6MiKrbLit60eJxNXszf/zR55UUtMqP76lAFkFwZgpmUs6ac3pYOTUYRVFjjG1/hnUF1/thd9uZLe1E3gwa5m6dcOHaspG5xYsJ2wEBmYj1z1xTh70892PwxVR9R9GMKh4YyNt
tjeb.nl. 555 IN RRSIG DNSKEY 8 2 3600 20130917040339 20130818034238 11499 tjeb.nl. ocva2TybPLT8eY4pSxeawEpQ0AM7rvqdGwA3msbiwgPWpW/VfgPWBiN5cZg6PDQA2+Z+BWuK1qgCGFcGEwcWdQ9hm0AsT9pFD8xAFCyNNxYxRiMRFiDop33ZpE2N4S5ukfVVbPa1YHVZ2qzW+RZbb7HjYg4xOJiQKhNuaUEK1b8=
tjeb.nl. 555 IN RRSIG DNSKEY 8 2 3600 20130917040339 20130818034238 17992 tjeb.nl. iqa2i2rUfeHGNHYlkbeSBfULinAmRg9qcsCzTdzlv7MhI0EJZn9LXOlpVA8fi1a1plpIub7qFt5Uu1fzatmlZU48RBxFGINQO4Ad0SKqDFg0WdbwMjwvFJxRmqFvsLhm4eZhOxRx5bCpa/UtTawzY2D5IGH7GGdn8pA0Fa1Dvv32Fw4eNjlcq/Y5xEs1j1ar/qDcG9EyG00O0L+DEc4TREXpPe+PoZkMoRL+glC8IqZ3jJc56O8wugzvJomZNFiaLXGmr2H/XMayhLVpm7ncTeaDknK7aJu0Z/jnATjoc9nyP8t2/Rcw53781pDP1sJlSmfVn/Xpz/MAfY6HQSTPOg==
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 922 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 57702
;; flags: qr rd ra cd ; qd: 1 an: 3 au: 0 ad: 1
;; QUESTIONS:
;; nsec3.tjeb.nl., type = DS, class = IN
;; ANSWERS:
nsec3.tjeb.nl. 556 IN DS 33022 7 1 A9BBB2B6B619282B263474B19BDBA7A724A11F9E
nsec3.tjeb.nl. 556 IN DS 21665 7 2 40B5D47EC3AD05AF64CA91478408DE035AA64F7CAF7FC372958C80033B330377
nsec3.tjeb.nl. 556 IN RRSIG DS 8 3 3600 20130917053510 20130818045138 11499 tjeb.nl. SXiF+5inBiEVdfFredApgDrdJ/qu6/sjIQ1Ek4M+ldzrgfjtG+HDFTH3A+cs79Mfeq62yUuQpYLGrkZ5Ok9G/4j7lhzdIGX7VZqOqA5TecpjtnATvHaUH1+3nhHYTMCZbDe4wMzsMBnjcNLVbTq+t+UhLKhiq6nsI4xt8TA4fVQ=
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 293 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 1751
;; flags: qr rd ra cd ; qd: 1 an: 2 au: 0 ad: 1
;; QUESTIONS:
;; nsec3.tjeb.nl., type = DNSKEY, class = IN
;; ANSWERS:
nsec3.tjeb.nl. 556 IN DNSKEY 256 3 7 AwEAAdWgR6bilcX8UdjeVDenTLcnR6AsrSYXpYccj8QF103GPzDkoLLkh9KS4/obiRYs8BRGotSZK7QT1Ew/xWml425bR0JzOgajHF0Au01M/TtvLSA/Vf4jFqXfFwSBCMWtZGbspSj3SEiILaHmdsyfS0KpqJwF8f+hnOdwmHYEmMkh
nsec3.tjeb.nl. 556 IN RRSIG DNSKEY 7 3 3600 20160101000000 20120416140921 21665 nsec3.tjeb.nl. B/gmYobsGg2zcwEwkTHrYp3xt3claIM4YFKJiqZk3A9H4thBv+9kjmlF9Mt1PHAHtbxAmtYOyuPLuFGLbNWn/qCgjP6ShKHInY5nJMqTsL1Sf3kGhxcKsHR4wUjFKg0eyaFUel1Dm88W6yeWhMWj6vAz0C+LtT/mZnJabN4WQnY=
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 363 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 64657
;; flags: qr rd ra cd ; qd: 1 an: 2 au: 0 ad: 1
;; QUESTIONS:
;; signotincepted.nsec3.tjeb.nl., type = DS, class = IN
;; ANSWERS:
signotincepted.nsec3.tjeb.nl. 556 IN DS 20687 7 1 00B5793CA494CE43257B9D7FBC143A7250CC6AB9
signotincepted.nsec3.tjeb.nl. 556 IN RRSIG DS 7 4 3600 20140416140921 20130416140921 21665 nsec3.tjeb.nl. wetlXxyDm3b5hKgwPpEbF+SPp+U/9qYpfugJb9W+xtUqEKP+2fo1Q3uOdfPyba+WKksVZyJajYUejyQ384QL+6b6hT527+5m5eFHlyzRPvg0pX52t71LehyAAbc8QT2KyEFUOG2hIN0AZVU06gmifJthKJkeJV2xoE+82Niw+pY=
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 266 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 52580
;; flags: qr rd ra cd ; qd: 1 an: 2 au: 0 ad: 1
;; QUESTIONS:
;; signotincepted.nsec3.tjeb.nl., type = DNSKEY, class = IN
;; ANSWERS:
signotincepted.nsec3.tjeb.nl. 556 IN DNSKEY 256 3 7 AwEAAcqlMm0NgQ3WCSWJhojjzLDDP8AURG0zTRVaJYFgx2kcPFW/6csf/IsWT5rvt93HRADp1DQj+NyEP5+WRBgfsu/EJncrFsU+UlGoCcmXflq1tg5t/Ige9xXvnm6+iC9pz4VLhnnxHXP+brLT1lUwelkpG3qhvzU9csUPPLHVZhJJ
signotincepted.nsec3.tjeb.nl. 556 IN RRSIG DNSKEY 7 4 3600 20130519094957 20120519094957 20687 signotincepted.nsec3.tjeb.nl. Rx0x8WAfxaIgBce1fKT5wxcuHhethnPaZR1LcnZeE65WVE/Apn2bXbHeV28/Asl3jWpAKKB21e54vmgXwkT0mOGeR4dJvSq9d7o4l8NjWdFPVvX4/+7bqyyVgBqA83baR1k8hHr8ItKHLax4BlrlscPBZrS5SoXF3kqwQZPUrYM=
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 393 bytes
###############################################
testSignedBelowUnsignedBelowSigned 0000664 0000000 0000000 00000032230 13020541473 0036177 0 ustar 00root root 0000000 0000000 dnssecjava-1.1.3/src/test/resources/recordings/org_jitsi_dnssec_TestInvalid #Date: 2013-08-21T00:06:14+02:00
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 48748
;; flags: qr rd ra cd ; qd: 1 an: 2 au: 2 ad: 5
;; QUESTIONS:
;; ok.nods.ok.dnssec.tjeb.nl., type = A, class = IN
;; ANSWERS:
ok.nods.ok.dnssec.tjeb.nl. 285 IN A 178.18.82.80
ok.nods.ok.dnssec.tjeb.nl. 285 IN RRSIG A 5 6 600 20200101000000 20120627091943 54150 ok.nods.ok.dnssec.tjeb.nl. NF+Z/ab5m254P22XCo4QA0ErU5mo/ELn1g+hX5gmEzS0A/1tbWxJlgZ3vWrNyBghE8Q2nm6Lw2hRKIGzUB8S7i6B10HMZNDMcdXcOG0sUArHlhkfCSGS81y+8Ry/45lyn4QYPNDlziaUt/6IeBwXPvjmaEfd3c13d0AF5qTz7H0=
;; AUTHORITY RECORDS:
ok.nods.ok.dnssec.tjeb.nl. 285 IN NS ns2.tjeb.nl.
ok.nods.ok.dnssec.tjeb.nl. 285 IN RRSIG NS 5 6 600 20200101000000 20120627091943 54150 ok.nods.ok.dnssec.tjeb.nl. ddy2V0LFPwH96h3Mfg1OsPkuTxlGiJXquPvBuJmpXnM50LPWsUnCn42idMZgVQTePqA+GSCO3P5ql5Flwc/hDCPCOMsOOudEBtMu1jDDoyjrZdpb3tp0x0elrG6Ux8WB5EUKRVeTMcpoGTt0uO0s4KOYUYKgSRv45mHkNffdUag=
;; ADDITIONAL RECORDS:
ns2.tjeb.nl. 555 IN A 195.169.221.157
ns2.tjeb.nl. 555 IN AAAA 2001:470:1f15:17ba:0:0:0:53
ns2.tjeb.nl. 556 IN RRSIG A 8 3 3600 20130917053510 20130818045138 11499 tjeb.nl. pXJsbRFz7VdvCiKPuElW08X+THHEwYrSFmKl1qd4N7xaQQl9rwmnN48mfqz3ZsChbJdPKsJJ2xSIj9+PcJoXm1RX8TMZoHpCOGDAbZPfEMTgCpnRkfNTMEYgpH9y8pqV49w88ertZfbx5S8FMa7JmEr5y9axzNyW/x0ln3FnGyI=
ns2.tjeb.nl. 556 IN RRSIG AAAA 8 3 3600 20130828183606 20130729175112 11499 tjeb.nl. 4ObrppiU3IGWmXezHtz7x3rVnkEZfhAxej2lo2zhg58UYIZqFN3WhvQS/iST1wP5jdqtCmhUMBAc1yQmGMyXFINbBHVlckyI7DrZt4vPOlTBkVqWqJIwi8mwZ3Tp//hFcRXqhvfGOj2K8x+4mnnRvnLNBKf/r/MW6E5R5R8+nZs=
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 836 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 19875
;; flags: qr rd ra ad cd ; qd: 1 an: 3 au: 0 ad: 1
;; QUESTIONS:
;; ., type = DNSKEY, class = IN
;; ANSWERS:
. 138548 IN DNSKEY 256 3 8 AwEAAcFTyWsmpTs49Q0FKVepUqft+7+c3elhdsfh+amh+orgWLcitLM1bBBiWe6eymWW0EakLZAG4tej28tyx4f+j37Q9VX+m5NAhO/Y0riQonVWfzxLGymx3Ti5x/x7VKvF5Y5hf5OWv2J7pvEumYFFCtu4glit9T9J85+i3UgqSHqf
. 138548 IN DNSKEY 257 3 8 AwEAAagAIKlVZrpC6Ia7gEzahOR+9W29euxhJhVVLOyQbSEW0O8gcCjFFVQUTf6v58fLjwBd0YI0EzrAcQqBGCzh/RStIoO8g0NfnfL2MTJRkxoXbfDaUeVPQuYEhg37NZWAJQ9VnMVDxP/VHL496M/QZxkjf5/Efucp2gaDX6RS6CXpoY68LsvPVjR0ZSwzz1apAzvN9dlzEheX7ICJBBtuA6G3LQpzW5hOA2hzCTMjJPJ8LbqF6dsV6DoBQzgul0sGIcGOYl7OyQdXfZ57relSQageu+ipAdTTJ25AsRTAoub8ONGcLmqrAmRLKBP1dfwhYB4N7knNnulqQxA+Uk1ihz0=
. 138548 IN RRSIG DNSKEY 8 0 172800 20130903235959 20130820000000 19036 . fGmWbtROfDQ5bFTrhIQDesRvY2viY1/7Qzg7WHHH8g78QONdl33t10P9rSHwjN2JdgZ3Jbnwu/2LOFCKpwV5Ei5w9A3oUW5jcq/wnC/oKSVfvoHJ4zzJ/11KCMi1sGVUwHRf2BeNMvf8Kjpb59oUMx85NjWkIxlZYZDsC/cemeRcm1aaYrzIAS+rxck8Wmx9+1cEz/KF/w2C0sZSiMJL52Jda5XBv/24obY1NLlUHTNIQVxktAS6e5bPtHNve4zbb0YGI0QUbtIO6Bh56CoE5vnHo5bDdBY6Kdo9VOlZd4AGm1Nw9z2HLyftJanqGd495azQ6uLV6x9QN6LZ4WBVwg==
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 736 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 63605
;; flags: qr rd ra cd ; qd: 1 an: 2 au: 0 ad: 1
;; QUESTIONS:
;; nl., type = DS, class = IN
;; ANSWERS:
nl. 83355 IN DS 21362 8 2 881D17ECCD7FD67F1086247611CCB7FB8646E82D0074AA91E980B016FD3EDE98
nl. 83355 IN RRSIG DS 8 1 86400 20130827000000 20130819230000 49656 . LeBOQAStOr5mLRIDTX893FlBFMKap/amWnaHKgKs6ip/B93jAuoPXJggBPnGGvFrVEuTK8JJOi55FHOEOvKjzg6qDswY+DbqGIdmYOD/SaXv0FqF/iuAbrrNaYXj50MexeHKgExNcEd5mrFk9eQh5T5w7QLjeQG9InVTvoXK5G0=
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 238 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 50819
;; flags: qr rd ra cd ; qd: 1 an: 3 au: 0 ad: 1
;; QUESTIONS:
;; nl., type = DNSKEY, class = IN
;; ANSWERS:
nl. 4155 IN DNSKEY 256 3 8 AwEAAaq7dp+Ez3A1naHOO0A1zAIfcRtGzYRSptT7NOxuw9mKNXf3Z0258r+l4ghNYbnf5ZhAUUMrah7ydNBu5gz9z1y+hJFhm7cPl13rtYmhbMcQoF89ERdCD586HFtgE1RCggGRy/cxp+VDG7N3gheAjbSdAChMSPE2sGC11CFPuEx7
nl. 4155 IN DNSKEY 257 3 8 AwEAAbgqMqYHpmZrqQd3zFNOzYv2lw8bWBnrtK9TjlwK/ZBYMwKGR6TNbmMuwdjebpIE2vFxTHGLQfb2PmUJpazAGkG0fUaqrjuIU99Qbe5hwLYXqyGe2Mm+ZNRsomBxhluR/ky/XX4V1TjTqeXYH4gkzEs7I6og5IE0tKyhhpU38XHtuFVj7uunIAWGn5g9tZ0ZNnv8CkwLE5hLmRf+AoNTd483ZBX4FUT32KbF6XV3ikctXbsMe2GqGlIf0gMqJQbNvYf1NuNMbxauh9YavEQ0yaavI1hz5eLMJRruq4wDTyRnMJHupxY69oZZ9IbIsEf0FurtaA7fXrAxqcfEfARr4b0=
nl. 4155 IN RRSIG DNSKEY 8 1 7200 20130902072242 20130819161003 21362 nl. MB0vdAiJIq7TAfodDKy5uGVu0idlJ49vIFs7pDBWvcSfv/7aUohEODQ/b9m0QrZacJz/yssm/pgLyQJckdsyfCWxJ71F2XnJmoZwTRtBVWSArbuDqZx2sisGljn46C5PokGNTVz7stMpLgrp2UBtbkKIUcFxVOkP1aMoAEC2te7EG68Cl/uaAJsphxgU4TyccSJes1QxEwAXpra/apnk/I35Cx67NJzVXOitTSmIh6qI6fjlDIxX30PUyyZsW5bcjJc41wCRpzpFy5d5GCrwqfPLM9ycDcL2LTp5JtGAldzMZ72Jyr6bzVAc7/8DkB4m5EgGjQ8EnbqKcs2aI+XpcQ==
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 745 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 38082
;; flags: qr rd ra cd ; qd: 1 an: 2 au: 0 ad: 1
;; QUESTIONS:
;; tjeb.nl., type = DS, class = IN
;; ANSWERS:
tjeb.nl. 4155 IN DS 17992 8 2 764501411DE58E8618945054A3F620B36202E115D015A7773F4B78E0F952CECA
tjeb.nl. 4155 IN RRSIG DS 8 2 7200 20130830191348 20130816101003 11604 nl. EJl0DMR81ffQRZAcB0wLXtNsUwNtcXkri9GHO8GkjZtlrzhk6jODf1xwFmD7vFCGMBcXqqHZYYWs5IjYUrrdrtFq6ePKfKc1pHs51EoTJdJvjLlShDWN2U9FTfXLjMiVpyL4d3o3ZaPPSQiqiaZINneqzDVyXXan9o8PMBbW7Sg=
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 246 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 63327
;; flags: qr rd ra cd ; qd: 1 an: 4 au: 0 ad: 1
;; QUESTIONS:
;; tjeb.nl., type = DNSKEY, class = IN
;; ANSWERS:
tjeb.nl. 555 IN DNSKEY 257 3 8 AwEAAcHR47QfC0dlPEQkAsKRh3VYFvUKlIerSdlT7HBS3/NOQ6ghVs9uYskdbs2pLSRbu4CSu6X0MgKZO0lxoJhi6FqBa33Oc0Mmp/dd6AW4pNdZa4icP6fKT+HcPbLU9dUsrjDo13iXgUy3gls5BLG9KnTaLzWs9KmxTInBUHFLjZa70Fl+ILNfJ/e1D6eX3C104nmGSWpO6OB+nQDz46ra23eGJ7EeNAu1/uhPcqeXg3HWKjqHTzQW5XxVyMhdXx/ILC3SZhsqNqlkKZjmmHbg7V1+iograUg1XEaxaOE25W9jrzvQnMxlZT8I9LTyyi1YArvxMCTcGkNWRi4Ca4/HEDs=
tjeb.nl. 555 IN DNSKEY 256 3 8 AwEAAee4BKqSMI/wEKdLXQyn+TzOjEMWG5IXy+WRGw+6MiKrbLit60eJxNXszf/zR55UUtMqP76lAFkFwZgpmUs6ac3pYOTUYRVFjjG1/hnUF1/thd9uZLe1E3gwa5m6dcOHaspG5xYsJ2wEBmYj1z1xTh70892PwxVR9R9GMKh4YyNt
tjeb.nl. 555 IN RRSIG DNSKEY 8 2 3600 20130917040339 20130818034238 11499 tjeb.nl. ocva2TybPLT8eY4pSxeawEpQ0AM7rvqdGwA3msbiwgPWpW/VfgPWBiN5cZg6PDQA2+Z+BWuK1qgCGFcGEwcWdQ9hm0AsT9pFD8xAFCyNNxYxRiMRFiDop33ZpE2N4S5ukfVVbPa1YHVZ2qzW+RZbb7HjYg4xOJiQKhNuaUEK1b8=
tjeb.nl. 555 IN RRSIG DNSKEY 8 2 3600 20130917040339 20130818034238 17992 tjeb.nl. iqa2i2rUfeHGNHYlkbeSBfULinAmRg9qcsCzTdzlv7MhI0EJZn9LXOlpVA8fi1a1plpIub7qFt5Uu1fzatmlZU48RBxFGINQO4Ad0SKqDFg0WdbwMjwvFJxRmqFvsLhm4eZhOxRx5bCpa/UtTawzY2D5IGH7GGdn8pA0Fa1Dvv32Fw4eNjlcq/Y5xEs1j1ar/qDcG9EyG00O0L+DEc4TREXpPe+PoZkMoRL+glC8IqZ3jJc56O8wugzvJomZNFiaLXGmr2H/XMayhLVpm7ncTeaDknK7aJu0Z/jnATjoc9nyP8t2/Rcw53781pDP1sJlSmfVn/Xpz/MAfY6HQSTPOg==
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 922 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 39828
;; flags: qr rd ra cd ; qd: 1 an: 2 au: 0 ad: 1
;; QUESTIONS:
;; dnssec.tjeb.nl., type = DS, class = IN
;; ANSWERS:
dnssec.tjeb.nl. 555 IN DS 8340 5 1 5733A59841EA708AE9223822124B07B555E17332
dnssec.tjeb.nl. 555 IN RRSIG DS 8 3 3600 20130917051704 20130818051644 11499 tjeb.nl. WfurllImGCRujmNfI0ZBtJrmQgSo/68lGSTo95J8YBIm2W9iUqsFI+LwKj3F2QEwz3SsJ2c1mDWiAvkptSq9LgqdLgBJpjDtHNg7fGHdZyvffjlj/+I4ePZG+7Lk5mpNmUmkhx8tgDJiCHMTgfjPl4nAjPxdUPjD59GStEKBT2E=
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 246 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 58984
;; flags: qr rd ra cd ; qd: 1 an: 2 au: 0 ad: 1
;; QUESTIONS:
;; dnssec.tjeb.nl., type = DNSKEY, class = IN
;; ANSWERS:
dnssec.tjeb.nl. 556 IN DNSKEY 256 3 5 AwEAAdSl9MRil0yoBBkAGGHhxJIRyB//+lfi+ftbTh3a3pDoukvRahssEOKRjiNfmaoQRHbZA4HTqWxIHlu0CzhOc/e5phBPY2oEnGWKmFQRihJVYd2lwjwCTZNKHUz0PhN6PBM8/xlFAyBWduM1ldZf7sge2rod3xx8mZjhVekRnw+P
dnssec.tjeb.nl. 556 IN RRSIG DNSKEY 5 3 3600 20150101000000 20120726165632 8340 dnssec.tjeb.nl. EcmwD5XSZMN8hc1opbI+0+x/6gQ5OukiFl746FJLBM9fUdcYb7A3GnJ9qyWRqvaEPSq2FuzfE2zmW7+YQRHlUxP/INk2ffjDJJwcrIUtgbJv8J+ztWl0L5crReEL5eYpgetG4xgGDT19W+Bd0EHg2YP3o1VHJvV8qzDQxam2NKI=
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 365 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 41324
;; flags: qr rd ra cd ; qd: 1 an: 2 au: 0 ad: 1
;; QUESTIONS:
;; ok.dnssec.tjeb.nl., type = DS, class = IN
;; ANSWERS:
ok.dnssec.tjeb.nl. 285 IN DS 59280 5 1 C13C96F9AF5D63E74B3E21A04C46EEC14640A84C
ok.dnssec.tjeb.nl. 285 IN RRSIG DS 5 4 600 20150101000000 20120726165632 8340 dnssec.tjeb.nl. DbBJPY8+fItE/VoXXLXyWjyD7VX7Vfv2FsI9BQMbFqrPAcugotIPASV1HDoiZNlXd8314McC7baonMe1gADqhPRC5HQxaji/1ED7gQzF/dSKQdpiippDyAkwcLEOIhKKqpHACSp+QEzx8hoXZeJgOPqZo2NTMDHOfMiVmP+NVo8=
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 256 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 42335
;; flags: qr rd ra cd ; qd: 1 an: 2 au: 0 ad: 1
;; QUESTIONS:
;; ok.dnssec.tjeb.nl., type = DNSKEY, class = IN
;; ANSWERS:
ok.dnssec.tjeb.nl. 556 IN DNSKEY 256 3 5 AwEAAbqTfqZ3Mpwo2fZXfYN9+oLix0Au2ZyRfGjHKPgMCVDb94X7q6FWkrg01uxbcvfin9jvAzU5dG9SWh/S01NuXrthRbirLGngd4j0woNdQgRQZu3O8LhmUxTRobCFu+nkEOAOB6osS+yON0+3rATgAQxDsFJq+osg29CrzcrYhBBp
ok.dnssec.tjeb.nl. 556 IN RRSIG DNSKEY 5 4 3600 20200101000000 20120627091948 59280 ok.dnssec.tjeb.nl. f8cF15NA+XEHUu8m5UzGLt5hhId4Bl2JKakjORGW3ayRdBUCvyMSk7FcJly6KUMpypxVmO/IpzIdiR8DGjFSlRsPF8gL/N9P9JfWAlmaYCDeSEdcaR57sL4KpDned9KgmVa7YKclj/wk/j9KK4ecDmsiPj9x6GH7a9WFI1oskRs=
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 371 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 26534
;; flags: qr rd ra cd ; qd: 1 an: 2 au: 0 ad: 1
;; QUESTIONS:
;; nods.ok.dnssec.tjeb.nl., type = DS, class = IN
;; ANSWERS:
nods.ok.dnssec.tjeb.nl. 285 IN DS 18237 5 1 ED4130C00847B64B527F416D56308C0EFD0C09A1
nods.ok.dnssec.tjeb.nl. 285 IN RRSIG DS 5 5 600 20200101000000 20120627091948 59280 ok.dnssec.tjeb.nl. AsDYw6FRuvPc/OUSf8yE0ZJuE2eoEa9N97qj4vMDNEJ6cRIhf6wl57V0ssndUnjXQ7ShiLDXXIiOnqkj+sHrCRms6btKR5aZyiFUF/D2nVG51E7kz/Z3FhsgTZpwFGDQkNX/uY376Em1u0Vl6oAhRsSs8dxw5cM1OcKQW529fYo=
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 264 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 28097
;; flags: qr rd ra cd ; qd: 1 an: 2 au: 0 ad: 1
;; QUESTIONS:
;; nods.ok.dnssec.tjeb.nl., type = DNSKEY, class = IN
;; ANSWERS:
nods.ok.dnssec.tjeb.nl. 556 IN DNSKEY 256 3 5 AwEAAdmebhaUlvVyYVAyXq692krRBhj3DXq1EkLXujtwEKw+4dGgL2UZJSyeziBhiaunAq0PVE2hQwABuiw+d7NGNuRsIL4tUanzxN3AKWhOnFAKCqvpd+5b+USbVPbcmkbZsNNMAal9+W9yaPp+MqZXPZX+hW6YCJhLBzybxI4f5KN9
nods.ok.dnssec.tjeb.nl. 556 IN RRSIG DNSKEY 5 5 3600 20200101000000 20120627091947 18237 nods.ok.dnssec.tjeb.nl. 0oNDvs/odYESMMuURD7XVXH5ryciZzjhDBT0FUL4tJYBHR9RbfDib3ehBKL+ZkLsCE4k/UbbkIfrs3XyZt7+Z1ZUqururAFY36jXLWnd5INHO9PPXDvQkUYGuFLj0+OQRT+TJYMqTRJZ1vNUqlQHje8J8MMgiKQFu6VTF9xLaKU=
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 381 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 33309
;; flags: qr rd ra cd ; qd: 1 an: 0 au: 4 ad: 1
;; QUESTIONS:
;; ok.nods.ok.dnssec.tjeb.nl., type = DS, class = IN
;; ANSWERS:
;; AUTHORITY RECORDS:
ok.nods.ok.dnssec.tjeb.nl. 285 IN RRSIG NSEC 5 6 18000 20200101000000 20120627091947 18237 nods.ok.dnssec.tjeb.nl. avkoLWRhNaE1eIS7kOqAzCtgAQk9HjAL0HEUl2idwJ/nmw1Mh4cal/34iEeTTJQ1LeclkAdiuv3doyl2vahhaovge+R0cY+Yw5N6qf86fyRIq7B0BK6iFXAQ4UZLDWf2dXv70Bwp/RywN2EMTnGJ7XOTP5kQqpV8pYAtauA2RpA=
ok.nods.ok.dnssec.tjeb.nl. 285 IN NSEC sigexpired.nods.ok.dnssec.tjeb.nl. NS RRSIG NSEC
nods.ok.dnssec.tjeb.nl. 285 IN SOA ns2.tjeb.nl. tjeb.tjeb.nl. 2005080901 28800 7200 604800 18000
nods.ok.dnssec.tjeb.nl. 285 IN RRSIG SOA 5 5 600 20200101000000 20120627091947 18237 nods.ok.dnssec.tjeb.nl. vEkdhN9MjgTnql2TOq8/g7lrTHTGSGTdsc2/zu2wzzizyajH8Nn1k6i7TjTiefxUZ8u7T/uSopVmavBwR/C/cG8YPJ2QEcTSmEh0gVin4rkzLAwkAABV0mCVPd5MAg5lJSim8Q3U37p/WKlB4U/s3yE3VJjOM170SXJFuY9XZCQ=
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 518 bytes
###############################################
testSignedBelowUnsignedBelowSignedNsec3 0000664 0000000 0000000 00000032426 13020541473 0037102 0 ustar 00root root 0000000 0000000 dnssecjava-1.1.3/src/test/resources/recordings/org_jitsi_dnssec_TestInvalid #Date: 2013-08-21T00:06:15+02:00
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 40631
;; flags: qr rd ra cd ; qd: 1 an: 2 au: 2 ad: 5
;; QUESTIONS:
;; ok.nods.ok.Nsec3.tjeb.nl., type = A, class = IN
;; ANSWERS:
ok.nods.ok.Nsec3.tjeb.nl. 285 IN A 178.18.82.80
ok.nods.ok.Nsec3.tjeb.nl. 285 IN RRSIG A 7 6 600 20150101000000 20110520094930 51119 ok.nods.ok.nsec3.tjeb.nl. ANNO/Gps0zLNrGo3D/SU1x5S2q2tuuIjd3fqqjj3JUDXNVzu9V2cC2Bt/BnpnF5QXfPO+qmnfk6Y63zpV4I3NN4/R3PaY3WXkyS+UsUDPtrt0mnsyNLnVJbp0cUbCHi2CuwIVaWFVtnfHIKk/DyDajfOtc5q77b+jKqAwrlN+I0=
;; AUTHORITY RECORDS:
ok.nods.ok.nsec3.tjeb.nl. 285 IN NS ns2.tjeb.nl.
ok.nods.ok.nsec3.tjeb.nl. 285 IN RRSIG NS 7 6 600 20150101000000 20110520094930 51119 ok.nods.ok.nsec3.tjeb.nl. Ihi9NiaUENtDnd7QRfk+rVpu+u28TYt/ABUJcDOwhBMGunMryv6xa0+QgTL5MTP2qA2Tx7E3EBK/aJq+Ll9oOX6ZnDJ4McAA9HMk4AK2mNy43uU77WIkW17pwyTxh5sCJTx5AJ3V2TB9dWBtjuCWbFfBYCUXMQgenftrKinNUTM=
;; ADDITIONAL RECORDS:
ns2.tjeb.nl. 554 IN A 195.169.221.157
ns2.tjeb.nl. 554 IN AAAA 2001:470:1f15:17ba:0:0:0:53
ns2.tjeb.nl. 555 IN RRSIG A 8 3 3600 20130917053510 20130818045138 11499 tjeb.nl. pXJsbRFz7VdvCiKPuElW08X+THHEwYrSFmKl1qd4N7xaQQl9rwmnN48mfqz3ZsChbJdPKsJJ2xSIj9+PcJoXm1RX8TMZoHpCOGDAbZPfEMTgCpnRkfNTMEYgpH9y8pqV49w88ertZfbx5S8FMa7JmEr5y9axzNyW/x0ln3FnGyI=
ns2.tjeb.nl. 555 IN RRSIG AAAA 8 3 3600 20130828183606 20130729175112 11499 tjeb.nl. 4ObrppiU3IGWmXezHtz7x3rVnkEZfhAxej2lo2zhg58UYIZqFN3WhvQS/iST1wP5jdqtCmhUMBAc1yQmGMyXFINbBHVlckyI7DrZt4vPOlTBkVqWqJIwi8mwZ3Tp//hFcRXqhvfGOj2K8x+4mnnRvnLNBKf/r/MW6E5R5R8+nZs=
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 833 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 63252
;; flags: qr rd ra ad cd ; qd: 1 an: 3 au: 0 ad: 1
;; QUESTIONS:
;; ., type = DNSKEY, class = IN
;; ANSWERS:
. 138547 IN DNSKEY 257 3 8 AwEAAagAIKlVZrpC6Ia7gEzahOR+9W29euxhJhVVLOyQbSEW0O8gcCjFFVQUTf6v58fLjwBd0YI0EzrAcQqBGCzh/RStIoO8g0NfnfL2MTJRkxoXbfDaUeVPQuYEhg37NZWAJQ9VnMVDxP/VHL496M/QZxkjf5/Efucp2gaDX6RS6CXpoY68LsvPVjR0ZSwzz1apAzvN9dlzEheX7ICJBBtuA6G3LQpzW5hOA2hzCTMjJPJ8LbqF6dsV6DoBQzgul0sGIcGOYl7OyQdXfZ57relSQageu+ipAdTTJ25AsRTAoub8ONGcLmqrAmRLKBP1dfwhYB4N7knNnulqQxA+Uk1ihz0=
. 138547 IN DNSKEY 256 3 8 AwEAAcFTyWsmpTs49Q0FKVepUqft+7+c3elhdsfh+amh+orgWLcitLM1bBBiWe6eymWW0EakLZAG4tej28tyx4f+j37Q9VX+m5NAhO/Y0riQonVWfzxLGymx3Ti5x/x7VKvF5Y5hf5OWv2J7pvEumYFFCtu4glit9T9J85+i3UgqSHqf
. 138547 IN RRSIG DNSKEY 8 0 172800 20130903235959 20130820000000 19036 . fGmWbtROfDQ5bFTrhIQDesRvY2viY1/7Qzg7WHHH8g78QONdl33t10P9rSHwjN2JdgZ3Jbnwu/2LOFCKpwV5Ei5w9A3oUW5jcq/wnC/oKSVfvoHJ4zzJ/11KCMi1sGVUwHRf2BeNMvf8Kjpb59oUMx85NjWkIxlZYZDsC/cemeRcm1aaYrzIAS+rxck8Wmx9+1cEz/KF/w2C0sZSiMJL52Jda5XBv/24obY1NLlUHTNIQVxktAS6e5bPtHNve4zbb0YGI0QUbtIO6Bh56CoE5vnHo5bDdBY6Kdo9VOlZd4AGm1Nw9z2HLyftJanqGd495azQ6uLV6x9QN6LZ4WBVwg==
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 736 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 6681
;; flags: qr rd ra cd ; qd: 1 an: 2 au: 0 ad: 1
;; QUESTIONS:
;; nl., type = DS, class = IN
;; ANSWERS:
nl. 83354 IN DS 21362 8 2 881D17ECCD7FD67F1086247611CCB7FB8646E82D0074AA91E980B016FD3EDE98
nl. 83354 IN RRSIG DS 8 1 86400 20130827000000 20130819230000 49656 . LeBOQAStOr5mLRIDTX893FlBFMKap/amWnaHKgKs6ip/B93jAuoPXJggBPnGGvFrVEuTK8JJOi55FHOEOvKjzg6qDswY+DbqGIdmYOD/SaXv0FqF/iuAbrrNaYXj50MexeHKgExNcEd5mrFk9eQh5T5w7QLjeQG9InVTvoXK5G0=
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 238 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 8159
;; flags: qr rd ra cd ; qd: 1 an: 3 au: 0 ad: 1
;; QUESTIONS:
;; nl., type = DNSKEY, class = IN
;; ANSWERS:
nl. 4154 IN DNSKEY 256 3 8 AwEAAaq7dp+Ez3A1naHOO0A1zAIfcRtGzYRSptT7NOxuw9mKNXf3Z0258r+l4ghNYbnf5ZhAUUMrah7ydNBu5gz9z1y+hJFhm7cPl13rtYmhbMcQoF89ERdCD586HFtgE1RCggGRy/cxp+VDG7N3gheAjbSdAChMSPE2sGC11CFPuEx7
nl. 4154 IN DNSKEY 257 3 8 AwEAAbgqMqYHpmZrqQd3zFNOzYv2lw8bWBnrtK9TjlwK/ZBYMwKGR6TNbmMuwdjebpIE2vFxTHGLQfb2PmUJpazAGkG0fUaqrjuIU99Qbe5hwLYXqyGe2Mm+ZNRsomBxhluR/ky/XX4V1TjTqeXYH4gkzEs7I6og5IE0tKyhhpU38XHtuFVj7uunIAWGn5g9tZ0ZNnv8CkwLE5hLmRf+AoNTd483ZBX4FUT32KbF6XV3ikctXbsMe2GqGlIf0gMqJQbNvYf1NuNMbxauh9YavEQ0yaavI1hz5eLMJRruq4wDTyRnMJHupxY69oZZ9IbIsEf0FurtaA7fXrAxqcfEfARr4b0=
nl. 4154 IN RRSIG DNSKEY 8 1 7200 20130902072242 20130819161003 21362 nl. MB0vdAiJIq7TAfodDKy5uGVu0idlJ49vIFs7pDBWvcSfv/7aUohEODQ/b9m0QrZacJz/yssm/pgLyQJckdsyfCWxJ71F2XnJmoZwTRtBVWSArbuDqZx2sisGljn46C5PokGNTVz7stMpLgrp2UBtbkKIUcFxVOkP1aMoAEC2te7EG68Cl/uaAJsphxgU4TyccSJes1QxEwAXpra/apnk/I35Cx67NJzVXOitTSmIh6qI6fjlDIxX30PUyyZsW5bcjJc41wCRpzpFy5d5GCrwqfPLM9ycDcL2LTp5JtGAldzMZ72Jyr6bzVAc7/8DkB4m5EgGjQ8EnbqKcs2aI+XpcQ==
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 745 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 11951
;; flags: qr rd ra cd ; qd: 1 an: 2 au: 0 ad: 1
;; QUESTIONS:
;; tjeb.nl., type = DS, class = IN
;; ANSWERS:
tjeb.nl. 4154 IN DS 17992 8 2 764501411DE58E8618945054A3F620B36202E115D015A7773F4B78E0F952CECA
tjeb.nl. 4154 IN RRSIG DS 8 2 7200 20130830191348 20130816101003 11604 nl. EJl0DMR81ffQRZAcB0wLXtNsUwNtcXkri9GHO8GkjZtlrzhk6jODf1xwFmD7vFCGMBcXqqHZYYWs5IjYUrrdrtFq6ePKfKc1pHs51EoTJdJvjLlShDWN2U9FTfXLjMiVpyL4d3o3ZaPPSQiqiaZINneqzDVyXXan9o8PMBbW7Sg=
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 246 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 14217
;; flags: qr rd ra cd ; qd: 1 an: 4 au: 0 ad: 1
;; QUESTIONS:
;; tjeb.nl., type = DNSKEY, class = IN
;; ANSWERS:
tjeb.nl. 554 IN DNSKEY 257 3 8 AwEAAcHR47QfC0dlPEQkAsKRh3VYFvUKlIerSdlT7HBS3/NOQ6ghVs9uYskdbs2pLSRbu4CSu6X0MgKZO0lxoJhi6FqBa33Oc0Mmp/dd6AW4pNdZa4icP6fKT+HcPbLU9dUsrjDo13iXgUy3gls5BLG9KnTaLzWs9KmxTInBUHFLjZa70Fl+ILNfJ/e1D6eX3C104nmGSWpO6OB+nQDz46ra23eGJ7EeNAu1/uhPcqeXg3HWKjqHTzQW5XxVyMhdXx/ILC3SZhsqNqlkKZjmmHbg7V1+iograUg1XEaxaOE25W9jrzvQnMxlZT8I9LTyyi1YArvxMCTcGkNWRi4Ca4/HEDs=
tjeb.nl. 554 IN DNSKEY 256 3 8 AwEAAee4BKqSMI/wEKdLXQyn+TzOjEMWG5IXy+WRGw+6MiKrbLit60eJxNXszf/zR55UUtMqP76lAFkFwZgpmUs6ac3pYOTUYRVFjjG1/hnUF1/thd9uZLe1E3gwa5m6dcOHaspG5xYsJ2wEBmYj1z1xTh70892PwxVR9R9GMKh4YyNt
tjeb.nl. 554 IN RRSIG DNSKEY 8 2 3600 20130917040339 20130818034238 11499 tjeb.nl. ocva2TybPLT8eY4pSxeawEpQ0AM7rvqdGwA3msbiwgPWpW/VfgPWBiN5cZg6PDQA2+Z+BWuK1qgCGFcGEwcWdQ9hm0AsT9pFD8xAFCyNNxYxRiMRFiDop33ZpE2N4S5ukfVVbPa1YHVZ2qzW+RZbb7HjYg4xOJiQKhNuaUEK1b8=
tjeb.nl. 554 IN RRSIG DNSKEY 8 2 3600 20130917040339 20130818034238 17992 tjeb.nl. iqa2i2rUfeHGNHYlkbeSBfULinAmRg9qcsCzTdzlv7MhI0EJZn9LXOlpVA8fi1a1plpIub7qFt5Uu1fzatmlZU48RBxFGINQO4Ad0SKqDFg0WdbwMjwvFJxRmqFvsLhm4eZhOxRx5bCpa/UtTawzY2D5IGH7GGdn8pA0Fa1Dvv32Fw4eNjlcq/Y5xEs1j1ar/qDcG9EyG00O0L+DEc4TREXpPe+PoZkMoRL+glC8IqZ3jJc56O8wugzvJomZNFiaLXGmr2H/XMayhLVpm7ncTeaDknK7aJu0Z/jnATjoc9nyP8t2/Rcw53781pDP1sJlSmfVn/Xpz/MAfY6HQSTPOg==
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 922 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 36588
;; flags: qr rd ra cd ; qd: 1 an: 3 au: 0 ad: 1
;; QUESTIONS:
;; nsec3.tjeb.nl., type = DS, class = IN
;; ANSWERS:
nsec3.tjeb.nl. 555 IN DS 21665 7 2 40B5D47EC3AD05AF64CA91478408DE035AA64F7CAF7FC372958C80033B330377
nsec3.tjeb.nl. 555 IN DS 33022 7 1 A9BBB2B6B619282B263474B19BDBA7A724A11F9E
nsec3.tjeb.nl. 555 IN RRSIG DS 8 3 3600 20130917053510 20130818045138 11499 tjeb.nl. SXiF+5inBiEVdfFredApgDrdJ/qu6/sjIQ1Ek4M+ldzrgfjtG+HDFTH3A+cs79Mfeq62yUuQpYLGrkZ5Ok9G/4j7lhzdIGX7VZqOqA5TecpjtnATvHaUH1+3nhHYTMCZbDe4wMzsMBnjcNLVbTq+t+UhLKhiq6nsI4xt8TA4fVQ=
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 293 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 19122
;; flags: qr rd ra cd ; qd: 1 an: 2 au: 0 ad: 1
;; QUESTIONS:
;; nsec3.tjeb.nl., type = DNSKEY, class = IN
;; ANSWERS:
nsec3.tjeb.nl. 555 IN DNSKEY 256 3 7 AwEAAdWgR6bilcX8UdjeVDenTLcnR6AsrSYXpYccj8QF103GPzDkoLLkh9KS4/obiRYs8BRGotSZK7QT1Ew/xWml425bR0JzOgajHF0Au01M/TtvLSA/Vf4jFqXfFwSBCMWtZGbspSj3SEiILaHmdsyfS0KpqJwF8f+hnOdwmHYEmMkh
nsec3.tjeb.nl. 555 IN RRSIG DNSKEY 7 3 3600 20160101000000 20120416140921 21665 nsec3.tjeb.nl. B/gmYobsGg2zcwEwkTHrYp3xt3claIM4YFKJiqZk3A9H4thBv+9kjmlF9Mt1PHAHtbxAmtYOyuPLuFGLbNWn/qCgjP6ShKHInY5nJMqTsL1Sf3kGhxcKsHR4wUjFKg0eyaFUel1Dm88W6yeWhMWj6vAz0C+LtT/mZnJabN4WQnY=
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 363 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 28799
;; flags: qr rd ra cd ; qd: 1 an: 2 au: 0 ad: 1
;; QUESTIONS:
;; ok.nsec3.tjeb.nl., type = DS, class = IN
;; ANSWERS:
ok.nsec3.tjeb.nl. 556 IN DS 29015 7 1 CC9E46C7B681556F305BFA23D28B76B2FD4645C9
ok.nsec3.tjeb.nl. 556 IN RRSIG DS 7 4 3600 20160101000000 20120416140921 21665 nsec3.tjeb.nl. a8SDAhKngJlF4ev6aNMn/N7shOW2NRBTHw89Gwh2uVImoac3BHj1jVoHBj0DLB/5wRdJOoRCXnHf0mjs00fvmnc4iKmth32/rptNr4edHDvlXnHtVyOXM0fb2fbFzoTy4bZhwWZL/diw7wPZ8DMPSElp90FaC1lziTzUqZzDGwE=
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 254 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 6209
;; flags: qr rd ra cd ; qd: 1 an: 2 au: 0 ad: 1
;; QUESTIONS:
;; ok.nsec3.tjeb.nl., type = DNSKEY, class = IN
;; ANSWERS:
ok.nsec3.tjeb.nl. 556 IN DNSKEY 256 3 7 AwEAAceWOJhsrAn2TBLPwK/Bi+PK0QG2yxRsuhaq/wRTr33WEjJ9b3xc0CDfiqqyGxUZ/TUpj6nSYWGYiijQdTQpE7SPDWfJdqKF49OHbfYu9pcOztuLhhXME7iqWB0E0L8aaIe+iT8sVWh0DMBMQxnn16YT6p2lpOhoLmXvX9BEtY8B
ok.nsec3.tjeb.nl. 556 IN RRSIG DNSKEY 7 4 3600 20150101000000 20110520094959 29015 ok.nsec3.tjeb.nl. N7cMAbsKLWn2vIHcCrwSHYpQwIcwPvTTrUE0G6FmTHZZtaCvn4aJI48G0IkSxwdXqRkdo2QnFOwYb+909yR4bFVbkW18s1sjLrkoCX//+qC3HJUhqPg0NE930JlaMgB05gsdUKvsgnix4QbJeV+wDmX5A6fDqsMYzzTM9nJDC14=
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 369 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 21311
;; flags: qr rd ra cd ; qd: 1 an: 2 au: 0 ad: 1
;; QUESTIONS:
;; nods.ok.nsec3.tjeb.nl., type = DS, class = IN
;; ANSWERS:
nods.ok.nsec3.tjeb.nl. 556 IN DS 55175 7 1 A568CC122F255DB28A2D3722F73A3B0806F518F6
nods.ok.nsec3.tjeb.nl. 556 IN RRSIG DS 7 5 3600 20150101000000 20110520094959 29015 ok.nsec3.tjeb.nl. By8MnTo378q+EuGJn0nHqXvUCKFlTuGZ0A7e2Cj8Obn4uXlYHH3jthhqHTkdnHaKEUleUQPahceiw/LOtDl/6NIawJhU/XsHeAISQSwtIFEDh+Et2PbiUm7ctJzc8/RI5JZUOdmigDp16MosJgaZtqQ/jrrXgmVuNUoyKjMSDh4=
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 262 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 51720
;; flags: qr rd ra cd ; qd: 1 an: 2 au: 0 ad: 1
;; QUESTIONS:
;; nods.ok.nsec3.tjeb.nl., type = DNSKEY, class = IN
;; ANSWERS:
nods.ok.nsec3.tjeb.nl. 556 IN DNSKEY 256 3 7 AwEAAcdRLBNRBImIcppogur+tBYqebD1/4o1NUlZUzCrd3l/zK6QNpCz0l0xFzIaHmUanzvRqvU3EBWv38V2Y4/o5JBmNQFsAdvGCa9PrA7qUcSLUhf8sQyZZ+H1C5lbsLkQeIHpt4v+lUSrCyqR0YxIpuOTmy5ndlkft8ZVnhpB6sRp
nods.ok.nsec3.tjeb.nl. 556 IN RRSIG DNSKEY 7 5 3600 20150101000000 20110520094954 55175 nods.ok.nsec3.tjeb.nl. RDrU5bY24bqgA2yYFSe9RNNvOOy7KTb0GczvmG04hOgh3HprehZUqe57stXjNRvFCPNadAYvyXWXzr6Jwwardsq/yHx4Wc+Eg7FI3SKi9s4xfqQMznmhNReTbaOM9axhvh+Kjhhr0wd4ahTxUeR4RI7Ptt08S4YZR6xETg25Fes=
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 379 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 60428
;; flags: qr rd ra cd ; qd: 1 an: 0 au: 4 ad: 1
;; QUESTIONS:
;; ok.nods.ok.nsec3.tjeb.nl., type = DS, class = IN
;; ANSWERS:
;; AUTHORITY RECORDS:
nods.ok.nsec3.tjeb.nl. 285 IN SOA ns2.tjeb.nl. tjeb.tjeb.nl. 2005080901 28800 7200 604800 18000
nods.ok.nsec3.tjeb.nl. 285 IN RRSIG SOA 7 5 600 20150101000000 20110520094954 55175 nods.ok.nsec3.tjeb.nl. gvLwLEFhql1MoJQ5H3jEJbW55lvuzEhOfr6lbps+lCXu3LDLDf65DqFp059Irel6Yhm8aG18wy0bEed4FR9bFf/QrIgwVHPurGwdt9jEgKX32ymzLraCrtjuHVs3lQ5n4TDtNg8j4anoE5rPhzdhfxXto6kCrFUmp8prrdNrC44=
0QUE97DEAJOCAN6U144OOGAVCOPGSPJ3.nods.ok.nsec3.tjeb.nl. 285 IN RRSIG NSEC3 7 6 18000 20150101000000 20110520094954 55175 nods.ok.nsec3.tjeb.nl. gR78M3VVulOpbrZ7htYu0cteB0o09MkaenWab8DWL1Jkzyp+oVPmvPcDZ6PpTW4JPtBG95BXCk9as0ULf/bQg0YNFk2Dos05nNQNIS/S51lRRjj2BSINUVvV+9xmnMqPt6RixC+4jPIGJgh3cpVxOW9wOj/oOc2i+PevNPLmjDM=
0QUE97DEAJOCAN6U144OOGAVCOPGSPJ3.nods.ok.nsec3.tjeb.nl. 285 IN NSEC3 1 0 5 BEEF 6K87EVMP3OJ1N6STBBL5QGG00SSCMK23 NS
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 536 bytes
###############################################
dnssecjava-1.1.3/src/test/resources/recordings/org_jitsi_dnssec_TestInvalid/testUnknownAlg 0000664 0000000 0000000 00000023251 13020541473 0032322 0 ustar 00root root 0000000 0000000 #Date: 2013-08-21T00:06:15+02:00
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 61852
;; flags: qr rd ra cd ; qd: 1 an: 2 au: 2 ad: 5
;; QUESTIONS:
;; unknownalgorithm.dnssec.tjeb.nl., type = A, class = IN
;; ANSWERS:
unknownalgorithm.dnssec.tjeb.nl. 285 IN A 178.18.82.80
unknownalgorithm.dnssec.tjeb.nl. 285 IN RRSIG A 200 4 600 20200101000000 20120627091948 53226 unknownalgorithm.dnssec.tjeb.nl. tQyez4lEr7JzTX72UeaYwUFE5oogVrrQm2VGn3D70LP8oiIuWs8DH4NPBg2dkMcamTiDSH+BoVrk+SWCfJ4xMoolWhrzqioLIHuypSEfM6OkjxH6/0XluyecbBbAPbSvm4K/uREHglmskcg5qDdfX5rc34lyhjwE7ymYRPnwAEo=
;; AUTHORITY RECORDS:
unknownalgorithm.dnssec.tjeb.nl. 285 IN NS ns2.tjeb.nl.
unknownalgorithm.dnssec.tjeb.nl. 285 IN RRSIG NS 200 4 600 20200101000000 20120627091948 53226 unknownalgorithm.dnssec.tjeb.nl. NgvVRuG8jngOxSehdNhwpMRreJ2GhosG7Jq9hhwn6T2y3JtPGdPnZ2YLivP78cDuAVF6VV7WzbaHxWnuBegAfzKU2kSl1x885AboLQ3jniRchSUfgoWKSJWXhDtXcGL6fwWqXeA3Er4ww8E72FAVKczuexhIa1Sv2pr2AdLTROA=
;; ADDITIONAL RECORDS:
ns2.tjeb.nl. 554 IN A 195.169.221.157
ns2.tjeb.nl. 554 IN AAAA 2001:470:1f15:17ba:0:0:0:53
ns2.tjeb.nl. 555 IN RRSIG A 8 3 3600 20130917053510 20130818045138 11499 tjeb.nl. pXJsbRFz7VdvCiKPuElW08X+THHEwYrSFmKl1qd4N7xaQQl9rwmnN48mfqz3ZsChbJdPKsJJ2xSIj9+PcJoXm1RX8TMZoHpCOGDAbZPfEMTgCpnRkfNTMEYgpH9y8pqV49w88ertZfbx5S8FMa7JmEr5y9axzNyW/x0ln3FnGyI=
ns2.tjeb.nl. 555 IN RRSIG AAAA 8 3 3600 20130828183606 20130729175112 11499 tjeb.nl. 4ObrppiU3IGWmXezHtz7x3rVnkEZfhAxej2lo2zhg58UYIZqFN3WhvQS/iST1wP5jdqtCmhUMBAc1yQmGMyXFINbBHVlckyI7DrZt4vPOlTBkVqWqJIwi8mwZ3Tp//hFcRXqhvfGOj2K8x+4mnnRvnLNBKf/r/MW6E5R5R8+nZs=
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 854 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 33817
;; flags: qr rd ra ad cd ; qd: 1 an: 3 au: 0 ad: 1
;; QUESTIONS:
;; ., type = DNSKEY, class = IN
;; ANSWERS:
. 138547 IN DNSKEY 256 3 8 AwEAAcFTyWsmpTs49Q0FKVepUqft+7+c3elhdsfh+amh+orgWLcitLM1bBBiWe6eymWW0EakLZAG4tej28tyx4f+j37Q9VX+m5NAhO/Y0riQonVWfzxLGymx3Ti5x/x7VKvF5Y5hf5OWv2J7pvEumYFFCtu4glit9T9J85+i3UgqSHqf
. 138547 IN DNSKEY 257 3 8 AwEAAagAIKlVZrpC6Ia7gEzahOR+9W29euxhJhVVLOyQbSEW0O8gcCjFFVQUTf6v58fLjwBd0YI0EzrAcQqBGCzh/RStIoO8g0NfnfL2MTJRkxoXbfDaUeVPQuYEhg37NZWAJQ9VnMVDxP/VHL496M/QZxkjf5/Efucp2gaDX6RS6CXpoY68LsvPVjR0ZSwzz1apAzvN9dlzEheX7ICJBBtuA6G3LQpzW5hOA2hzCTMjJPJ8LbqF6dsV6DoBQzgul0sGIcGOYl7OyQdXfZ57relSQageu+ipAdTTJ25AsRTAoub8ONGcLmqrAmRLKBP1dfwhYB4N7knNnulqQxA+Uk1ihz0=
. 138547 IN RRSIG DNSKEY 8 0 172800 20130903235959 20130820000000 19036 . fGmWbtROfDQ5bFTrhIQDesRvY2viY1/7Qzg7WHHH8g78QONdl33t10P9rSHwjN2JdgZ3Jbnwu/2LOFCKpwV5Ei5w9A3oUW5jcq/wnC/oKSVfvoHJ4zzJ/11KCMi1sGVUwHRf2BeNMvf8Kjpb59oUMx85NjWkIxlZYZDsC/cemeRcm1aaYrzIAS+rxck8Wmx9+1cEz/KF/w2C0sZSiMJL52Jda5XBv/24obY1NLlUHTNIQVxktAS6e5bPtHNve4zbb0YGI0QUbtIO6Bh56CoE5vnHo5bDdBY6Kdo9VOlZd4AGm1Nw9z2HLyftJanqGd495azQ6uLV6x9QN6LZ4WBVwg==
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 736 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 39454
;; flags: qr rd ra cd ; qd: 1 an: 2 au: 0 ad: 1
;; QUESTIONS:
;; nl., type = DS, class = IN
;; ANSWERS:
nl. 83354 IN DS 21362 8 2 881D17ECCD7FD67F1086247611CCB7FB8646E82D0074AA91E980B016FD3EDE98
nl. 83354 IN RRSIG DS 8 1 86400 20130827000000 20130819230000 49656 . LeBOQAStOr5mLRIDTX893FlBFMKap/amWnaHKgKs6ip/B93jAuoPXJggBPnGGvFrVEuTK8JJOi55FHOEOvKjzg6qDswY+DbqGIdmYOD/SaXv0FqF/iuAbrrNaYXj50MexeHKgExNcEd5mrFk9eQh5T5w7QLjeQG9InVTvoXK5G0=
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 238 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 49985
;; flags: qr rd ra cd ; qd: 1 an: 3 au: 0 ad: 1
;; QUESTIONS:
;; nl., type = DNSKEY, class = IN
;; ANSWERS:
nl. 4154 IN DNSKEY 256 3 8 AwEAAaq7dp+Ez3A1naHOO0A1zAIfcRtGzYRSptT7NOxuw9mKNXf3Z0258r+l4ghNYbnf5ZhAUUMrah7ydNBu5gz9z1y+hJFhm7cPl13rtYmhbMcQoF89ERdCD586HFtgE1RCggGRy/cxp+VDG7N3gheAjbSdAChMSPE2sGC11CFPuEx7
nl. 4154 IN DNSKEY 257 3 8 AwEAAbgqMqYHpmZrqQd3zFNOzYv2lw8bWBnrtK9TjlwK/ZBYMwKGR6TNbmMuwdjebpIE2vFxTHGLQfb2PmUJpazAGkG0fUaqrjuIU99Qbe5hwLYXqyGe2Mm+ZNRsomBxhluR/ky/XX4V1TjTqeXYH4gkzEs7I6og5IE0tKyhhpU38XHtuFVj7uunIAWGn5g9tZ0ZNnv8CkwLE5hLmRf+AoNTd483ZBX4FUT32KbF6XV3ikctXbsMe2GqGlIf0gMqJQbNvYf1NuNMbxauh9YavEQ0yaavI1hz5eLMJRruq4wDTyRnMJHupxY69oZZ9IbIsEf0FurtaA7fXrAxqcfEfARr4b0=
nl. 4154 IN RRSIG DNSKEY 8 1 7200 20130902072242 20130819161003 21362 nl. MB0vdAiJIq7TAfodDKy5uGVu0idlJ49vIFs7pDBWvcSfv/7aUohEODQ/b9m0QrZacJz/yssm/pgLyQJckdsyfCWxJ71F2XnJmoZwTRtBVWSArbuDqZx2sisGljn46C5PokGNTVz7stMpLgrp2UBtbkKIUcFxVOkP1aMoAEC2te7EG68Cl/uaAJsphxgU4TyccSJes1QxEwAXpra/apnk/I35Cx67NJzVXOitTSmIh6qI6fjlDIxX30PUyyZsW5bcjJc41wCRpzpFy5d5GCrwqfPLM9ycDcL2LTp5JtGAldzMZ72Jyr6bzVAc7/8DkB4m5EgGjQ8EnbqKcs2aI+XpcQ==
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 745 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 47474
;; flags: qr rd ra cd ; qd: 1 an: 2 au: 0 ad: 1
;; QUESTIONS:
;; tjeb.nl., type = DS, class = IN
;; ANSWERS:
tjeb.nl. 4154 IN DS 17992 8 2 764501411DE58E8618945054A3F620B36202E115D015A7773F4B78E0F952CECA
tjeb.nl. 4154 IN RRSIG DS 8 2 7200 20130830191348 20130816101003 11604 nl. EJl0DMR81ffQRZAcB0wLXtNsUwNtcXkri9GHO8GkjZtlrzhk6jODf1xwFmD7vFCGMBcXqqHZYYWs5IjYUrrdrtFq6ePKfKc1pHs51EoTJdJvjLlShDWN2U9FTfXLjMiVpyL4d3o3ZaPPSQiqiaZINneqzDVyXXan9o8PMBbW7Sg=
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 246 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 12203
;; flags: qr rd ra cd ; qd: 1 an: 4 au: 0 ad: 1
;; QUESTIONS:
;; tjeb.nl., type = DNSKEY, class = IN
;; ANSWERS:
tjeb.nl. 554 IN DNSKEY 257 3 8 AwEAAcHR47QfC0dlPEQkAsKRh3VYFvUKlIerSdlT7HBS3/NOQ6ghVs9uYskdbs2pLSRbu4CSu6X0MgKZO0lxoJhi6FqBa33Oc0Mmp/dd6AW4pNdZa4icP6fKT+HcPbLU9dUsrjDo13iXgUy3gls5BLG9KnTaLzWs9KmxTInBUHFLjZa70Fl+ILNfJ/e1D6eX3C104nmGSWpO6OB+nQDz46ra23eGJ7EeNAu1/uhPcqeXg3HWKjqHTzQW5XxVyMhdXx/ILC3SZhsqNqlkKZjmmHbg7V1+iograUg1XEaxaOE25W9jrzvQnMxlZT8I9LTyyi1YArvxMCTcGkNWRi4Ca4/HEDs=
tjeb.nl. 554 IN DNSKEY 256 3 8 AwEAAee4BKqSMI/wEKdLXQyn+TzOjEMWG5IXy+WRGw+6MiKrbLit60eJxNXszf/zR55UUtMqP76lAFkFwZgpmUs6ac3pYOTUYRVFjjG1/hnUF1/thd9uZLe1E3gwa5m6dcOHaspG5xYsJ2wEBmYj1z1xTh70892PwxVR9R9GMKh4YyNt
tjeb.nl. 554 IN RRSIG DNSKEY 8 2 3600 20130917040339 20130818034238 11499 tjeb.nl. ocva2TybPLT8eY4pSxeawEpQ0AM7rvqdGwA3msbiwgPWpW/VfgPWBiN5cZg6PDQA2+Z+BWuK1qgCGFcGEwcWdQ9hm0AsT9pFD8xAFCyNNxYxRiMRFiDop33ZpE2N4S5ukfVVbPa1YHVZ2qzW+RZbb7HjYg4xOJiQKhNuaUEK1b8=
tjeb.nl. 554 IN RRSIG DNSKEY 8 2 3600 20130917040339 20130818034238 17992 tjeb.nl. iqa2i2rUfeHGNHYlkbeSBfULinAmRg9qcsCzTdzlv7MhI0EJZn9LXOlpVA8fi1a1plpIub7qFt5Uu1fzatmlZU48RBxFGINQO4Ad0SKqDFg0WdbwMjwvFJxRmqFvsLhm4eZhOxRx5bCpa/UtTawzY2D5IGH7GGdn8pA0Fa1Dvv32Fw4eNjlcq/Y5xEs1j1ar/qDcG9EyG00O0L+DEc4TREXpPe+PoZkMoRL+glC8IqZ3jJc56O8wugzvJomZNFiaLXGmr2H/XMayhLVpm7ncTeaDknK7aJu0Z/jnATjoc9nyP8t2/Rcw53781pDP1sJlSmfVn/Xpz/MAfY6HQSTPOg==
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 922 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 29046
;; flags: qr rd ra cd ; qd: 1 an: 2 au: 0 ad: 1
;; QUESTIONS:
;; dnssec.tjeb.nl., type = DS, class = IN
;; ANSWERS:
dnssec.tjeb.nl. 554 IN DS 8340 5 1 5733A59841EA708AE9223822124B07B555E17332
dnssec.tjeb.nl. 554 IN RRSIG DS 8 3 3600 20130917051704 20130818051644 11499 tjeb.nl. WfurllImGCRujmNfI0ZBtJrmQgSo/68lGSTo95J8YBIm2W9iUqsFI+LwKj3F2QEwz3SsJ2c1mDWiAvkptSq9LgqdLgBJpjDtHNg7fGHdZyvffjlj/+I4ePZG+7Lk5mpNmUmkhx8tgDJiCHMTgfjPl4nAjPxdUPjD59GStEKBT2E=
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 246 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 32116
;; flags: qr rd ra cd ; qd: 1 an: 2 au: 0 ad: 1
;; QUESTIONS:
;; dnssec.tjeb.nl., type = DNSKEY, class = IN
;; ANSWERS:
dnssec.tjeb.nl. 555 IN DNSKEY 256 3 5 AwEAAdSl9MRil0yoBBkAGGHhxJIRyB//+lfi+ftbTh3a3pDoukvRahssEOKRjiNfmaoQRHbZA4HTqWxIHlu0CzhOc/e5phBPY2oEnGWKmFQRihJVYd2lwjwCTZNKHUz0PhN6PBM8/xlFAyBWduM1ldZf7sge2rod3xx8mZjhVekRnw+P
dnssec.tjeb.nl. 555 IN RRSIG DNSKEY 5 3 3600 20150101000000 20120726165632 8340 dnssec.tjeb.nl. EcmwD5XSZMN8hc1opbI+0+x/6gQ5OukiFl746FJLBM9fUdcYb7A3GnJ9qyWRqvaEPSq2FuzfE2zmW7+YQRHlUxP/INk2ffjDJJwcrIUtgbJv8J+ztWl0L5crReEL5eYpgetG4xgGDT19W+Bd0EHg2YP3o1VHJvV8qzDQxam2NKI=
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 365 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 50593
;; flags: qr rd ra cd ; qd: 1 an: 2 au: 0 ad: 1
;; QUESTIONS:
;; unknownalgorithm.dnssec.tjeb.nl., type = DS, class = IN
;; ANSWERS:
unknownalgorithm.dnssec.tjeb.nl. 285 IN DS 53226 5 1 C7D58D23493A940041658E85BDBC03E2ED9F2690
unknownalgorithm.dnssec.tjeb.nl. 285 IN RRSIG DS 200 4 600 20150101000000 20120726165632 8340 dnssec.tjeb.nl. bew64pyLZ5sNhEybacmvNhcs7iU1HI42SXctSdv54jdrRacG5U9kXGLubDx23xKX4ffXAefTyDL+frfRBFp7LF1Jw3CesZvnrJA4iwNi4tA+CtqNEPegnWm2HHPbelcuwxkCx0VLBzdKsm96kqezM8awljFZEl/PUik3PUhk6CY=
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 270 bytes
###############################################
dnssecjava-1.1.3/src/test/resources/recordings/org_jitsi_dnssec_TestInvalid/testUnknownAlgNsec3 0000664 0000000 0000000 00000023376 13020541473 0033226 0 ustar 00root root 0000000 0000000 #Date: 2013-08-21T00:06:16+02:00
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 21525
;; flags: qr rd ra cd ; qd: 1 an: 2 au: 2 ad: 5
;; QUESTIONS:
;; unknownalgorithm.Nsec3.tjeb.nl., type = A, class = IN
;; ANSWERS:
unknownalgorithm.Nsec3.tjeb.nl. 285 IN A 178.18.82.80
unknownalgorithm.Nsec3.tjeb.nl. 285 IN RRSIG A 200 4 600 20150101000000 20110520094958 39629 unknownalgorithm.nsec3.tjeb.nl. xI243fqO7RkuWgmyiK9OSNUQ45hOGGZmm1N+J6xwi3V8QkQtmWHpOgmtbMS/A3OTOwFb6vd2VV+LrARLZYY/lRou+vkVrL0vLxcageOJmEkedI8S8HP/U/g4VSJj3uMlxqgLOxeCAGXmqFxljMH5tPuicjzUiVnc/c0SKj8O0vs=
;; AUTHORITY RECORDS:
unknownalgorithm.nsec3.tjeb.nl. 285 IN NS ns2.tjeb.nl.
unknownalgorithm.nsec3.tjeb.nl. 285 IN RRSIG NS 200 4 600 20150101000000 20110520094958 39629 unknownalgorithm.nsec3.tjeb.nl. pMcWMv8kW8AyLrvwGDVea3wpxee84EPZn4cmNJISZhWInbxZo8BtOtJHSpwWbY5Nh1Z0qd0tJrhBI7Ek3Lszda/2Tz/PEh9WUXEyPQ67CgZW7l/NH1xZPEfP4Q0883j+t25F7bhXgdW8qHpXPpkKy9TjxiR7alQ4l5WNIDtI2k8=
;; ADDITIONAL RECORDS:
ns2.tjeb.nl. 554 IN A 195.169.221.157
ns2.tjeb.nl. 554 IN AAAA 2001:470:1f15:17ba:0:0:0:53
ns2.tjeb.nl. 555 IN RRSIG A 8 3 3600 20130917053510 20130818045138 11499 tjeb.nl. pXJsbRFz7VdvCiKPuElW08X+THHEwYrSFmKl1qd4N7xaQQl9rwmnN48mfqz3ZsChbJdPKsJJ2xSIj9+PcJoXm1RX8TMZoHpCOGDAbZPfEMTgCpnRkfNTMEYgpH9y8pqV49w88ertZfbx5S8FMa7JmEr5y9axzNyW/x0ln3FnGyI=
ns2.tjeb.nl. 555 IN RRSIG AAAA 8 3 3600 20130828183606 20130729175112 11499 tjeb.nl. 4ObrppiU3IGWmXezHtz7x3rVnkEZfhAxej2lo2zhg58UYIZqFN3WhvQS/iST1wP5jdqtCmhUMBAc1yQmGMyXFINbBHVlckyI7DrZt4vPOlTBkVqWqJIwi8mwZ3Tp//hFcRXqhvfGOj2K8x+4mnnRvnLNBKf/r/MW6E5R5R8+nZs=
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 851 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 29473
;; flags: qr rd ra ad cd ; qd: 1 an: 3 au: 0 ad: 1
;; QUESTIONS:
;; ., type = DNSKEY, class = IN
;; ANSWERS:
. 138547 IN DNSKEY 256 3 8 AwEAAcFTyWsmpTs49Q0FKVepUqft+7+c3elhdsfh+amh+orgWLcitLM1bBBiWe6eymWW0EakLZAG4tej28tyx4f+j37Q9VX+m5NAhO/Y0riQonVWfzxLGymx3Ti5x/x7VKvF5Y5hf5OWv2J7pvEumYFFCtu4glit9T9J85+i3UgqSHqf
. 138547 IN DNSKEY 257 3 8 AwEAAagAIKlVZrpC6Ia7gEzahOR+9W29euxhJhVVLOyQbSEW0O8gcCjFFVQUTf6v58fLjwBd0YI0EzrAcQqBGCzh/RStIoO8g0NfnfL2MTJRkxoXbfDaUeVPQuYEhg37NZWAJQ9VnMVDxP/VHL496M/QZxkjf5/Efucp2gaDX6RS6CXpoY68LsvPVjR0ZSwzz1apAzvN9dlzEheX7ICJBBtuA6G3LQpzW5hOA2hzCTMjJPJ8LbqF6dsV6DoBQzgul0sGIcGOYl7OyQdXfZ57relSQageu+ipAdTTJ25AsRTAoub8ONGcLmqrAmRLKBP1dfwhYB4N7knNnulqQxA+Uk1ihz0=
. 138547 IN RRSIG DNSKEY 8 0 172800 20130903235959 20130820000000 19036 . fGmWbtROfDQ5bFTrhIQDesRvY2viY1/7Qzg7WHHH8g78QONdl33t10P9rSHwjN2JdgZ3Jbnwu/2LOFCKpwV5Ei5w9A3oUW5jcq/wnC/oKSVfvoHJ4zzJ/11KCMi1sGVUwHRf2BeNMvf8Kjpb59oUMx85NjWkIxlZYZDsC/cemeRcm1aaYrzIAS+rxck8Wmx9+1cEz/KF/w2C0sZSiMJL52Jda5XBv/24obY1NLlUHTNIQVxktAS6e5bPtHNve4zbb0YGI0QUbtIO6Bh56CoE5vnHo5bDdBY6Kdo9VOlZd4AGm1Nw9z2HLyftJanqGd495azQ6uLV6x9QN6LZ4WBVwg==
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 736 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 36416
;; flags: qr rd ra cd ; qd: 1 an: 2 au: 0 ad: 1
;; QUESTIONS:
;; nl., type = DS, class = IN
;; ANSWERS:
nl. 83354 IN DS 21362 8 2 881D17ECCD7FD67F1086247611CCB7FB8646E82D0074AA91E980B016FD3EDE98
nl. 83354 IN RRSIG DS 8 1 86400 20130827000000 20130819230000 49656 . LeBOQAStOr5mLRIDTX893FlBFMKap/amWnaHKgKs6ip/B93jAuoPXJggBPnGGvFrVEuTK8JJOi55FHOEOvKjzg6qDswY+DbqGIdmYOD/SaXv0FqF/iuAbrrNaYXj50MexeHKgExNcEd5mrFk9eQh5T5w7QLjeQG9InVTvoXK5G0=
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 238 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 4465
;; flags: qr rd ra cd ; qd: 1 an: 3 au: 0 ad: 1
;; QUESTIONS:
;; nl., type = DNSKEY, class = IN
;; ANSWERS:
nl. 4154 IN DNSKEY 256 3 8 AwEAAaq7dp+Ez3A1naHOO0A1zAIfcRtGzYRSptT7NOxuw9mKNXf3Z0258r+l4ghNYbnf5ZhAUUMrah7ydNBu5gz9z1y+hJFhm7cPl13rtYmhbMcQoF89ERdCD586HFtgE1RCggGRy/cxp+VDG7N3gheAjbSdAChMSPE2sGC11CFPuEx7
nl. 4154 IN DNSKEY 257 3 8 AwEAAbgqMqYHpmZrqQd3zFNOzYv2lw8bWBnrtK9TjlwK/ZBYMwKGR6TNbmMuwdjebpIE2vFxTHGLQfb2PmUJpazAGkG0fUaqrjuIU99Qbe5hwLYXqyGe2Mm+ZNRsomBxhluR/ky/XX4V1TjTqeXYH4gkzEs7I6og5IE0tKyhhpU38XHtuFVj7uunIAWGn5g9tZ0ZNnv8CkwLE5hLmRf+AoNTd483ZBX4FUT32KbF6XV3ikctXbsMe2GqGlIf0gMqJQbNvYf1NuNMbxauh9YavEQ0yaavI1hz5eLMJRruq4wDTyRnMJHupxY69oZZ9IbIsEf0FurtaA7fXrAxqcfEfARr4b0=
nl. 4154 IN RRSIG DNSKEY 8 1 7200 20130902072242 20130819161003 21362 nl. MB0vdAiJIq7TAfodDKy5uGVu0idlJ49vIFs7pDBWvcSfv/7aUohEODQ/b9m0QrZacJz/yssm/pgLyQJckdsyfCWxJ71F2XnJmoZwTRtBVWSArbuDqZx2sisGljn46C5PokGNTVz7stMpLgrp2UBtbkKIUcFxVOkP1aMoAEC2te7EG68Cl/uaAJsphxgU4TyccSJes1QxEwAXpra/apnk/I35Cx67NJzVXOitTSmIh6qI6fjlDIxX30PUyyZsW5bcjJc41wCRpzpFy5d5GCrwqfPLM9ycDcL2LTp5JtGAldzMZ72Jyr6bzVAc7/8DkB4m5EgGjQ8EnbqKcs2aI+XpcQ==
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 745 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 37669
;; flags: qr rd ra cd ; qd: 1 an: 2 au: 0 ad: 1
;; QUESTIONS:
;; tjeb.nl., type = DS, class = IN
;; ANSWERS:
tjeb.nl. 4154 IN DS 17992 8 2 764501411DE58E8618945054A3F620B36202E115D015A7773F4B78E0F952CECA
tjeb.nl. 4154 IN RRSIG DS 8 2 7200 20130830191348 20130816101003 11604 nl. EJl0DMR81ffQRZAcB0wLXtNsUwNtcXkri9GHO8GkjZtlrzhk6jODf1xwFmD7vFCGMBcXqqHZYYWs5IjYUrrdrtFq6ePKfKc1pHs51EoTJdJvjLlShDWN2U9FTfXLjMiVpyL4d3o3ZaPPSQiqiaZINneqzDVyXXan9o8PMBbW7Sg=
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 246 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 31112
;; flags: qr rd ra cd ; qd: 1 an: 4 au: 0 ad: 1
;; QUESTIONS:
;; tjeb.nl., type = DNSKEY, class = IN
;; ANSWERS:
tjeb.nl. 554 IN DNSKEY 257 3 8 AwEAAcHR47QfC0dlPEQkAsKRh3VYFvUKlIerSdlT7HBS3/NOQ6ghVs9uYskdbs2pLSRbu4CSu6X0MgKZO0lxoJhi6FqBa33Oc0Mmp/dd6AW4pNdZa4icP6fKT+HcPbLU9dUsrjDo13iXgUy3gls5BLG9KnTaLzWs9KmxTInBUHFLjZa70Fl+ILNfJ/e1D6eX3C104nmGSWpO6OB+nQDz46ra23eGJ7EeNAu1/uhPcqeXg3HWKjqHTzQW5XxVyMhdXx/ILC3SZhsqNqlkKZjmmHbg7V1+iograUg1XEaxaOE25W9jrzvQnMxlZT8I9LTyyi1YArvxMCTcGkNWRi4Ca4/HEDs=
tjeb.nl. 554 IN DNSKEY 256 3 8 AwEAAee4BKqSMI/wEKdLXQyn+TzOjEMWG5IXy+WRGw+6MiKrbLit60eJxNXszf/zR55UUtMqP76lAFkFwZgpmUs6ac3pYOTUYRVFjjG1/hnUF1/thd9uZLe1E3gwa5m6dcOHaspG5xYsJ2wEBmYj1z1xTh70892PwxVR9R9GMKh4YyNt
tjeb.nl. 554 IN RRSIG DNSKEY 8 2 3600 20130917040339 20130818034238 11499 tjeb.nl. ocva2TybPLT8eY4pSxeawEpQ0AM7rvqdGwA3msbiwgPWpW/VfgPWBiN5cZg6PDQA2+Z+BWuK1qgCGFcGEwcWdQ9hm0AsT9pFD8xAFCyNNxYxRiMRFiDop33ZpE2N4S5ukfVVbPa1YHVZ2qzW+RZbb7HjYg4xOJiQKhNuaUEK1b8=
tjeb.nl. 554 IN RRSIG DNSKEY 8 2 3600 20130917040339 20130818034238 17992 tjeb.nl. iqa2i2rUfeHGNHYlkbeSBfULinAmRg9qcsCzTdzlv7MhI0EJZn9LXOlpVA8fi1a1plpIub7qFt5Uu1fzatmlZU48RBxFGINQO4Ad0SKqDFg0WdbwMjwvFJxRmqFvsLhm4eZhOxRx5bCpa/UtTawzY2D5IGH7GGdn8pA0Fa1Dvv32Fw4eNjlcq/Y5xEs1j1ar/qDcG9EyG00O0L+DEc4TREXpPe+PoZkMoRL+glC8IqZ3jJc56O8wugzvJomZNFiaLXGmr2H/XMayhLVpm7ncTeaDknK7aJu0Z/jnATjoc9nyP8t2/Rcw53781pDP1sJlSmfVn/Xpz/MAfY6HQSTPOg==
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 922 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 62047
;; flags: qr rd ra cd ; qd: 1 an: 3 au: 0 ad: 1
;; QUESTIONS:
;; nsec3.tjeb.nl., type = DS, class = IN
;; ANSWERS:
nsec3.tjeb.nl. 555 IN DS 21665 7 2 40B5D47EC3AD05AF64CA91478408DE035AA64F7CAF7FC372958C80033B330377
nsec3.tjeb.nl. 555 IN DS 33022 7 1 A9BBB2B6B619282B263474B19BDBA7A724A11F9E
nsec3.tjeb.nl. 555 IN RRSIG DS 8 3 3600 20130917053510 20130818045138 11499 tjeb.nl. SXiF+5inBiEVdfFredApgDrdJ/qu6/sjIQ1Ek4M+ldzrgfjtG+HDFTH3A+cs79Mfeq62yUuQpYLGrkZ5Ok9G/4j7lhzdIGX7VZqOqA5TecpjtnATvHaUH1+3nhHYTMCZbDe4wMzsMBnjcNLVbTq+t+UhLKhiq6nsI4xt8TA4fVQ=
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 293 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 9653
;; flags: qr rd ra cd ; qd: 1 an: 2 au: 0 ad: 1
;; QUESTIONS:
;; nsec3.tjeb.nl., type = DNSKEY, class = IN
;; ANSWERS:
nsec3.tjeb.nl. 555 IN DNSKEY 256 3 7 AwEAAdWgR6bilcX8UdjeVDenTLcnR6AsrSYXpYccj8QF103GPzDkoLLkh9KS4/obiRYs8BRGotSZK7QT1Ew/xWml425bR0JzOgajHF0Au01M/TtvLSA/Vf4jFqXfFwSBCMWtZGbspSj3SEiILaHmdsyfS0KpqJwF8f+hnOdwmHYEmMkh
nsec3.tjeb.nl. 555 IN RRSIG DNSKEY 7 3 3600 20160101000000 20120416140921 21665 nsec3.tjeb.nl. B/gmYobsGg2zcwEwkTHrYp3xt3claIM4YFKJiqZk3A9H4thBv+9kjmlF9Mt1PHAHtbxAmtYOyuPLuFGLbNWn/qCgjP6ShKHInY5nJMqTsL1Sf3kGhxcKsHR4wUjFKg0eyaFUel1Dm88W6yeWhMWj6vAz0C+LtT/mZnJabN4WQnY=
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 363 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 38423
;; flags: qr rd ra cd ; qd: 1 an: 2 au: 0 ad: 1
;; QUESTIONS:
;; unknownalgorithm.nsec3.tjeb.nl., type = DS, class = IN
;; ANSWERS:
unknownalgorithm.nsec3.tjeb.nl. 557 IN DS 39629 7 1 7C7A8C7309C1B974A6C00E8418BB3DE40F21CADB
unknownalgorithm.nsec3.tjeb.nl. 557 IN RRSIG DS 200 4 3600 20160101000000 20120416140921 21665 nsec3.tjeb.nl. MCAkQ9lrNsU9jIlMgTk4/qAQLMKKr/nvWm7zd2PIZVyLJGXEJjSydol6Tczvgdz3VyZy0+6UP9JyEGt1TVcLbQr36SpLdxbxlyKf4I4A1d3mpL2QwKKnojGWwbtx8R7i1Ktw8JAsHsGLfFUe+THUL87HBjk1Vuly9+FzKNP1qHI=
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 268 bytes
###############################################
testUnsignedThatMustBeSigned 0000664 0000000 0000000 00000016143 13020541473 0035031 0 ustar 00root root 0000000 0000000 dnssecjava-1.1.3/src/test/resources/recordings/org_jitsi_dnssec_TestInvalid #Date: 2013-08-21T00:06:15+02:00
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 56424
;; flags: qr rd ra ad cd ; qd: 1 an: 3 au: 0 ad: 1
;; QUESTIONS:
;; ., type = DNSKEY, class = IN
;; ANSWERS:
. 138548 IN DNSKEY 256 3 8 AwEAAcFTyWsmpTs49Q0FKVepUqft+7+c3elhdsfh+amh+orgWLcitLM1bBBiWe6eymWW0EakLZAG4tej28tyx4f+j37Q9VX+m5NAhO/Y0riQonVWfzxLGymx3Ti5x/x7VKvF5Y5hf5OWv2J7pvEumYFFCtu4glit9T9J85+i3UgqSHqf
. 138548 IN DNSKEY 257 3 8 AwEAAagAIKlVZrpC6Ia7gEzahOR+9W29euxhJhVVLOyQbSEW0O8gcCjFFVQUTf6v58fLjwBd0YI0EzrAcQqBGCzh/RStIoO8g0NfnfL2MTJRkxoXbfDaUeVPQuYEhg37NZWAJQ9VnMVDxP/VHL496M/QZxkjf5/Efucp2gaDX6RS6CXpoY68LsvPVjR0ZSwzz1apAzvN9dlzEheX7ICJBBtuA6G3LQpzW5hOA2hzCTMjJPJ8LbqF6dsV6DoBQzgul0sGIcGOYl7OyQdXfZ57relSQageu+ipAdTTJ25AsRTAoub8ONGcLmqrAmRLKBP1dfwhYB4N7knNnulqQxA+Uk1ihz0=
. 138548 IN RRSIG DNSKEY 8 0 172800 20130903235959 20130820000000 19036 . fGmWbtROfDQ5bFTrhIQDesRvY2viY1/7Qzg7WHHH8g78QONdl33t10P9rSHwjN2JdgZ3Jbnwu/2LOFCKpwV5Ei5w9A3oUW5jcq/wnC/oKSVfvoHJ4zzJ/11KCMi1sGVUwHRf2BeNMvf8Kjpb59oUMx85NjWkIxlZYZDsC/cemeRcm1aaYrzIAS+rxck8Wmx9+1cEz/KF/w2C0sZSiMJL52Jda5XBv/24obY1NLlUHTNIQVxktAS6e5bPtHNve4zbb0YGI0QUbtIO6Bh56CoE5vnHo5bDdBY6Kdo9VOlZd4AGm1Nw9z2HLyftJanqGd495azQ6uLV6x9QN6LZ4WBVwg==
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 736 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 60938
;; flags: qr rd ra ad cd ; qd: 1 an: 2 au: 0 ad: 1
;; QUESTIONS:
;; ch., type = DS, class = IN
;; ANSWERS:
ch. 83340 IN DS 22072 8 2 94E4C1E425B28150D8DD7C974E27E1A933C1D4B51E535177B52DFF3F807A8C94
ch. 83340 IN RRSIG DS 8 1 86400 20130827000000 20130819230000 49656 . AuYFxV0Za5X6pLHTPxpmX8PBV8yODP6t5xcqlXSm9WNXjdpHs927Aa8mTgTtNOrtXWgTBQNhBhjrg1KxmV9To7eolWAgnLa6ZYM6FjO4PWkJxWye0UzufBCpjU5hIZ8P2E7BUyD+pFfO07+dr+44dXfV0eYiGYlyWQiO7SalOiE=
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 238 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 47777
;; flags: qr rd ra ad cd ; qd: 1 an: 4 au: 0 ad: 1
;; QUESTIONS:
;; ch., type = DNSKEY, class = IN
;; ANSWERS:
ch. 83340 IN DNSKEY 257 3 8 AwEAAeP0/M59JL65K0YWD0W+8k8x1T79hM4W2pi7cx0CxQULRd3udQnf/8ymUbKsPfVDMCXLQwW2evWHRu4B/OKnkRzDQsev7prdJ5UxAHWF4oFsWpGYx+A7WbqllTlmMFkV8bNz6TW6Trl4+RaLirt3ofRUFrJKyKCyNCKkxbtpFO6p6vP5K8V3CW854NndF3D/Xjz0s3nwd3dLwW3XVqi705mhJBvCSeorgsKMcY3PCBG6U5Twj/akb6P8I2nmoGsrIbtmvGk191zV5o4i8RTjk5DI6FcO5GL0J1w9sAiVYfXlN8wdyr90kqO6MGcvSQEItJCTaljyRT53bekbUhdRE50=
ch. 83340 IN DNSKEY 256 3 8 AwEAAaANwH4naX1c6xHWHYuFVHa7PLc9n7BPL8J3sa2LqKuQvQ1aTu3hIYAsO6c5wlDp4Pgw8HejPdEZC/VRBtHkXeWfe84IJ2731IQYjQGyD4rKq/L9VjD9bMlSjj6RtI7t4ItzEPlsSEEmEtXFLt8IDzq0xc2tQcec9PsfvvV5jIWN
ch. 83340 IN DNSKEY 256 3 8 AwEAAbxjQGBSu3RdzMwH7MD1o5nuv3PZ+iGBPIX+sHKLTOVOzp0xGho//69OLYfJj8B5Fm5Id7IicmSb67qAkkOZHYqSVyjkbsF2FeNVj7lFhCGnQ4EcjFdU/vlbL49z34ILXVEQBHl3vMS40i9py9BoJ4XJIy0I+vKqO2DyvxGEx+j1
ch. 83340 IN RRSIG DNSKEY 8 1 86400 20131004100909 20130819090909 22072 ch. Nwqv4Ibx3E8+0xjeHocT6/hNGB99sxwpA3Nnan82YRcwpc73M0B8xlvUb+tzsIHvbQVCL83MWWtBfwRsbd9a32eqHvCdzk7wdmgnc4e+vO2QBDrpqy/AXN4+urBK7iuueNy0yUpqjRlIoBE4Ku1Qo1HYQpKu1vUa29w9qMrvTjDIRudy5yJ4YHFYjWF25d80W8coIh00KL2IjAbeZXRYFaaMP9Vw7NQN3qNM64/6FWvGEtD3QNt3Xf86C4m27Antn+na6K3iGT+doMME2kFYJaGwOrHBlE9F3MqWMtRI4McMTnkc052MaOVGKvvtDzmpQBcNQTrrMO4rSC6OofBPBw==
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 893 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 50312
;; flags: qr rd ra cd ; qd: 1 an: 3 au: 0 ad: 1
;; QUESTIONS:
;; ingotronic.ch., type = DS, class = IN
;; ANSWERS:
ingotronic.ch. 541 IN DS 6031 5 1 733D0218B571CD617B1A7493564B9FC4F12ADE82
ingotronic.ch. 541 IN DS 6031 5 2 4A948F2FDADA24686E473EDAC00DCF972584C75E3FAA92C2021B6221449FF87E
ingotronic.ch. 541 IN RRSIG DS 8 2 3600 20130909002703 20130813122537 51783 ch. Ke4stscv7T3wI6xZa7YsiGpmKhs7b8yPTL/HnIuwVnkIdhQfBB7lbXxdxEyLTLq04dmfiC03EtXCAZSHYovU5sE7O3UA11g7bSljxBLSmuCS6h4es2DMIwNWBexGiIkHAtoCL6zedfjGkexz3IYhMA96OfH+ft2nt4ykuDsXXB8=
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 288 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 22330
;; flags: qr aa rd ra cd ; qd: 1 an: 4 au: 0 ad: 1
;; QUESTIONS:
;; ingotronic.ch., type = DNSKEY, class = IN
;; ANSWERS:
ingotronic.ch. 300 IN DNSKEY 256 3 5 AwEAAZ2Xh77GFzpEDx7EHYxShqltHgkiG+BOjBGifEmnJhQSdE5/yNSLFNcdhZZ8HUPxYnaedTqJcFFg4AzUsQklF/fECegTJdZjaj2WoL0/I8K7HMfY/hVuRZUWPNglYi8agJRX6gdkFTCpUNI7stpgKqxtzUJhhw15uG/lKMplwqUr
ingotronic.ch. 300 IN DNSKEY 257 3 5 AwEAAeA1vzmjaB+eBAcvhzpKEgAEFpvQ1rg4uKDW6MsQtacKoqBpgyep2+LuWotz5p/xYxj3NGsArwN8Ad5cY0FHRr8miTT0elOv6nvlqGIfRuhj/BXAQ1x4ihpSFslHw0lJMYFwxsUZWpUyjWX/nv1xRZMMwF46gui0N4OEbyTYusCk77D+A71k+K0EAitFIbIH4GCUKmH1H7HmXhSVH9bN/n7KEGwW32lmsuuUcJoRKDkcUvbMXY/9Xoa2quERrUg/rBbDUHowRPjYDS5GzY1+f4YY8s40BufGiqyUTKKXL953MVFK8gmezXA0hbmrnZ7CBOw/7238mORAdzExaX8n7CE=
ingotronic.ch. 300 IN RRSIG DNSKEY 5 2 300 20130908212226 20130809202226 6031 ingotronic.ch. w8yqzYuixi+QI+UMdX3dVJVYynpp+d1wL8PwlqNMjL2dTsHxD6xSFefo+Zxxl2cte2soXuzU1pL5HiM34RgQL577FyVOInxfTpUEztG+z+PNS1xXBmHfGek9T70doaUwtdcP++V93H2Z9vG1dmgk0NYTKrKEYV30m0F4LUtWOMvnnZ50bIFi/PZAPAn1UJXK6m/A/tLfsECM4/YcZCE/R+Ce2wTKK0cmzFq0qo+QjznktvQr7BolDTjXb3TSssMwsB97RRfaRo6zZ4AMOa4ipCnd3IJBrCADzXtaGjp2ErfhwVxJCp9p+UVDqlYyMwEZO3MqJqpybzbvuQzNEOLVtw==
ingotronic.ch. 300 IN RRSIG DNSKEY 5 2 300 20130908212226 20130809202226 17430 ingotronic.ch. Zv2um4K6MF35IV252+eZDTSpN/BF0ElGZXfVhrORtxgHLBaFQUGIAOvi7b6PlQTlMVhkaEQxwgxZSS1b81KqXeuqFC+Z9QUaX5N+A9c2klwOBV+njdktH6zi75bWWCnSN33wZsw1uOKgNEVSpF509GQq+2yUoJU7PHycmG4z0Y8=
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 940 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 27567
;; flags: qr aa rd ra cd ; qd: 1 an: 0 au: 4 ad: 1
;; QUESTIONS:
;; www.ingotronic.ch., type = DS, class = IN
;; ANSWERS:
;; AUTHORITY RECORDS:
ingotronic.ch. 300 IN SOA ns1.ingotronic.ch. admin.ingotronic.ch. 2013032613 300 60 864000 300
ingotronic.ch. 300 IN RRSIG SOA 5 2 300 20130908212440 20130809202440 17430 ingotronic.ch. Bv0THQWBGQh8Ymi6eLS7EIv8qA70/FmPrECD8ewe3nySf1N54/UqC++kOoIuG9sHoKNmSKl8SjoaYTulbVt0pUQROPKJh76eCAbfuusbY10dHWB4cZWYSY4NBW1z9twi9UfHHWhzeZloL/ILQG/eqVJAeKhlqwvhIzWzy2c1mWE=
www.ingotronic.ch. 300 IN NSEC z.ingotronic.ch. A AAAA RRSIG NSEC
www.ingotronic.ch. 300 IN RRSIG NSEC 5 3 300 20130908204313 20130809202226 17430 ingotronic.ch. D355Ot7NsJvQ0ED1dl4jSvr9Mxe2XnXwoXoF3d+dX5fikfJ5dnAH4txuGyAbVYchwmTmNpwdP2sPwPI/SBR9Ta7XuunxSfEUwibllU4GkktHNIBOzvH9fKZqqkpMfzIyxgthtEFr5WsKZACqKm02nykyoWIvbe2Ck3HVcscXVbY=
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 475 bytes
###############################################
dnssecjava-1.1.3/src/test/resources/recordings/org_jitsi_dnssec_TestKeyCacheUsage/ 0000775 0000000 0000000 00000000000 13020541473 0030464 5 ustar 00root root 0000000 0000000 dnssecjava-1.1.3/src/test/resources/recordings/org_jitsi_dnssec_TestKeyCacheUsage/testUnsigned 0000664 0000000 0000000 00000021546 13020541473 0033073 0 ustar 00root root 0000000 0000000 #Date: 2015-01-06T22:35:11+01:00
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 1856
;; flags: qr aa rd ra cd ; qd: 1 an: 1 au: 1 ad: 3
;; QUESTIONS:
;; www.unsigned.ingotronic.ch., type = A, class = IN
;; ANSWERS:
www.unsigned.ingotronic.ch. 300 IN A 127.0.0.1
;; AUTHORITY RECORDS:
unsigned.ingotronic.ch. 300 IN NS ns1.ingotronic.ch.
;; ADDITIONAL RECORDS:
ns1.ingotronic.ch. 300 IN A 62.192.5.131
ns1.ingotronic.ch. 300 IN RRSIG A 5 3 300 20150125005754 20141226001054 17430 ingotronic.ch. fNG1RZM53pXwBxruHNaSZszxVzNLoCq8VZsTjAzYH2vSLzHXYVGJFTLIeY0K9APAdyJU8WuwmABmn7XY0Kg39kRG77uoFlqUws2PdTz2QKOwJGZY7W88Ak2Y9lkDBcK8o3wJHVptrT8R7p/1U7UfjF0kqPUkakk2B0EbFWdagFg=
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 278 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 38534
;; flags: qr rd ra ad cd ; qd: 1 an: 4 au: 0 ad: 1
;; QUESTIONS:
;; ., type = DNSKEY, class = IN
;; ANSWERS:
. 87363 IN DNSKEY 256 3 8 AwEAAaPD7Y7XIi1MOEREJNTrRhyqsY3gff6JWzg+XCbqut1sbcbvqyssHw8DT1AkRaAC92pO8xuyq5QEgEPL1IHfABLwpwXI5gTj4gdwi86bpkmlWs9fRpnn4DPDCTdrnxIejJXgClHikLJF3u3CdpNCMijq4CKdQbMlRZ3avv+G7rh7
. 87363 IN DNSKEY 256 3 8 AwEAAe3fSrbLBy3LOS7pnxEUhvPZTE2H5dIGsI/UfruI/nOEvWWa/PSX2BFedBkEqOlYdjdNF2f+6lmfk2Od/xu0v5bVqxFE+/24v3hZSlWBxvXzPTAGHrbW/IJYEPqlzVOAS4XdUgHg0N7IbLywNHMvB+Yf+Nm6ctyXXFLV4WTNnzs7
. 87363 IN DNSKEY 257 3 8 AwEAAagAIKlVZrpC6Ia7gEzahOR+9W29euxhJhVVLOyQbSEW0O8gcCjFFVQUTf6v58fLjwBd0YI0EzrAcQqBGCzh/RStIoO8g0NfnfL2MTJRkxoXbfDaUeVPQuYEhg37NZWAJQ9VnMVDxP/VHL496M/QZxkjf5/Efucp2gaDX6RS6CXpoY68LsvPVjR0ZSwzz1apAzvN9dlzEheX7ICJBBtuA6G3LQpzW5hOA2hzCTMjJPJ8LbqF6dsV6DoBQzgul0sGIcGOYl7OyQdXfZ57relSQageu+ipAdTTJ25AsRTAoub8ONGcLmqrAmRLKBP1dfwhYB4N7knNnulqQxA+Uk1ihz0=
. 87363 IN RRSIG DNSKEY 8 0 172800 20150115235959 20150101000000 19036 . i8cAxD2pvQi1oAyvQxRpDfFlbqPzW+69QQEsDwE1eWOm5AtawO9U7lmsGps7sy/fVNvl1ljKBj4Djp9pb3U2FLogjiIlW0cDAkPmLlG9t+b/pjEfBNlhjANUVN06pvQVAfm+LcF26EaWT6FlISBqb6jSy4BHRa3Bdc4Sx7+pRSYSqVVvYxLkfAWsKPqGkvWhebJDndJJV9syXQXgZ+v/uJ+6XOS43xkAdeL8iBzIs/FlwMTfh3tVe3d0lb65IBBLlCzeQuetX+0Vu1YFcnD0mHc/wS2ZnAV5toAFmyVQBoY/XAZiZeaOkcROJ6Zmqezy7liwK7BqsYyAZntMhk8lbg==
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 883 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 61854
;; flags: qr rd ra ad cd ; qd: 1 an: 2 au: 0 ad: 1
;; QUESTIONS:
;; ch., type = DS, class = IN
;; ANSWERS:
ch. 963 IN DS 46375 8 2 8F96646FC68BB7E4AF4C0750A6096FBC0D4ECDA3D3FA6DA06FDDB42EE50C6CF3
ch. 963 IN RRSIG DS 8 1 86400 20150112170000 20150105160000 16665 . thY7xYWBBxiBjqbQIb9fAG4TmQgnziwM7q6P1T3/ITxmECdvOCQnnZA3uD7qmN8uM0HudsD7+y+zgD3rsH4RSTKdL4kHSI0OnCxToMTvklghEgFDezqIRm8NkWdI2H4Stwrj20nYKSpLQxPI2EE54gs18P3KyO8bAUYv8Qx73xU=
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 238 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 48752
;; flags: qr rd ra ad cd ; qd: 1 an: 4 au: 0 ad: 1
;; QUESTIONS:
;; ch., type = DNSKEY, class = IN
;; ANSWERS:
ch. 964 IN DNSKEY 257 3 8 AwEAAb7GhhZ8IAy/AhwmSms5DeQK5ad09wIIplEpYoiAIYXPtJvT1ReFzyfTp/2YP+g/PWDwHPh4qKAHa9x0VgbIQcGAeNakmfkAdWEmCnca323/SAml3mwfaX62G7/uYWae5zh8QTxZKNd+K1yZ5x0IxnI31chSl5xymRbTEHYZDKwSIRFM3fTxUMt93WFaBVWELReYotJBr++rvAWdnlay5TPBTvheLBkaiqtgM4GP8HK07Y+86lsZnEsj5K3G1KTV5SPpa82rqYAwxG9VKbmSE/6/kBR5jJHjt1rRt5Oe7v18aEtw0YCEN4vxq+KuvMoNVqXUsE9LBwHJD+QNwi6wmB0=
ch. 964 IN DNSKEY 256 3 8 AwEAAcSLdT0fEmcFmLpeUkAJoeVaHKiu+nbuc43fWlqaCRVf8t2HA4uWxOk0O5ci9nrFTc8nq8oa5fk5Cj7CHh4yrX9qUCfTdIWTyp8BDEdJpS+Dyb0u9wQuVj+nQMj4fLzdQf4TJs3/qxuiLr3nL1UUwlhhXeqSqGVb7p3mtB5HJ8ad
ch. 964 IN DNSKEY 256 3 8 AwEAAcsg0kY6fw1wzYMhSAKTy+Y2JzAst66P/1odp9NECJJHbU8f4nwziI3onoFSBV0ZiSZhY1aH5dhdDZ7BkrqhVXSrZPAz0CvzjIxmB1gSOf9DeZvjQvoy97HqYolxsf+B3QQv2RKBT67elF5+JisKg3/dQISelKn8LhabSoVrMlD1
ch. 964 IN RRSIG DNSKEY 8 1 86400 20150127100909 20141212090909 46375 ch. bT8q0FWyeMH0SulNo6UdIIgZYNATwYsee2bikq2Gh339Bufma8eaqWIPYT3XKmxYPBFOw0bVl+kLZxTwbR1CFoCDXoP+qgQhh4mf9qkNiv2CDSc+0FE3FRREn+DAhYTUEuB58FPiPakFB8s8O7T+k2qhDae7jy4/y7Jl1lnjaBY8s7bzOUPhF0KKCNZmvoKwtL23ZdVeTSV1xM3jkiNnpzBKbcoSWECSGJVp1SE0BnRXdwQP41YTXFZ0310YjaTAUCC5qbMIWdEkHjfdSQtKBImnc85mkapq9w++XQ4zhauPWBtrPV3CcoCahjUaWdjrKVkibomlJZaN8MEO23CfQw==
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 893 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 23116
;; flags: qr rd ra cd ; qd: 1 an: 3 au: 0 ad: 1
;; QUESTIONS:
;; ingotronic.ch., type = DS, class = IN
;; ANSWERS:
ingotronic.ch. 3572 IN DS 6031 5 1 733D0218B571CD617B1A7493564B9FC4F12ADE82
ingotronic.ch. 3572 IN DS 6031 5 2 4A948F2FDADA24686E473EDAC00DCF972584C75E3FAA92C2021B6221449FF87E
ingotronic.ch. 3572 IN RRSIG DS 8 2 3600 20150129033614 20150105123019 60789 ch. rVPJP2HhzW7OkroK2axFj5Lb4iVWCH8Fp/Iq1rF952NDo72b8RiKje2RaAKJAGQ+wd0YgE+PAej04GCmkhlDJA/zvPeeTxuhy3HbJzReMlQ7fjyH+wW1hli+FuIYvogXWf7nO/9VyPORt8X/f/pjrOr3Vlj9sGLN8TGYpEuVSw4=
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 288 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 39476
;; flags: qr aa rd ra cd ; qd: 1 an: 4 au: 0 ad: 1
;; QUESTIONS:
;; ingotronic.ch., type = DNSKEY, class = IN
;; ANSWERS:
ingotronic.ch. 300 IN DNSKEY 257 3 5 AwEAAeA1vzmjaB+eBAcvhzpKEgAEFpvQ1rg4uKDW6MsQtacKoqBpgyep2+LuWotz5p/xYxj3NGsArwN8Ad5cY0FHRr8miTT0elOv6nvlqGIfRuhj/BXAQ1x4ihpSFslHw0lJMYFwxsUZWpUyjWX/nv1xRZMMwF46gui0N4OEbyTYusCk77D+A71k+K0EAitFIbIH4GCUKmH1H7HmXhSVH9bN/n7KEGwW32lmsuuUcJoRKDkcUvbMXY/9Xoa2quERrUg/rBbDUHowRPjYDS5GzY1+f4YY8s40BufGiqyUTKKXL953MVFK8gmezXA0hbmrnZ7CBOw/7238mORAdzExaX8n7CE=
ingotronic.ch. 300 IN DNSKEY 256 3 5 AwEAAZ2Xh77GFzpEDx7EHYxShqltHgkiG+BOjBGifEmnJhQSdE5/yNSLFNcdhZZ8HUPxYnaedTqJcFFg4AzUsQklF/fECegTJdZjaj2WoL0/I8K7HMfY/hVuRZUWPNglYi8agJRX6gdkFTCpUNI7stpgKqxtzUJhhw15uG/lKMplwqUr
ingotronic.ch. 300 IN RRSIG DNSKEY 5 2 300 20150125003700 20141226001657 6031 ingotronic.ch. rs1QlP2SlSpA2ELbzwg3DgWLzXWL3Lpv6CUJE2Q0qH2Zp7Qdy3cD+ZEtNh9v24Qv1M6JJ3zFt8mmZoCeW2ycuMbJCqBkW9CBuwF+VznZvZY2MxwPipvhvEEGP//0M8YAZJ66yQPDv3PTdAP8FYbIrJyvY44vwyncwbslpfHT9jAsrbfr3vuMuWps86dnP462q+0s1TxBfqi8mzo3gdavjHKWVNwohLahLKT+tWeu6DSzQv0YwMjwtkLgF7QRgx3ctIIkloOrnx9nHH1N6y+hxEB89fOlyVDjHhgL5uVtsD5fEdT0FJ2Gc/2nShEMMqIwr1/J9kUq1mNySff/uEe65Q==
ingotronic.ch. 300 IN RRSIG DNSKEY 5 2 300 20150125003700 20141226001657 17430 ingotronic.ch. mEwZjhQqeWksWD0TCnNBrtce4YkWJL3edqL6PvAUu8Fn+Ih437kEs3+pqdkgRsdYQ9HW+lBm/8pWwJlNAv0bi9NykItXMwAUFtncgq+6Pnh3iAM972GXSa5VV4LcGQ5b8CBdHCHiEKDqyPv5Hr5QfYL/FQaWlcNRh4QZZlZNPFA=
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 940 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 45944
;; flags: qr aa rd ra cd ; qd: 1 an: 0 au: 4 ad: 1
;; QUESTIONS:
;; unsigned.ingotronic.ch., type = DS, class = IN
;; ANSWERS:
;; AUTHORITY RECORDS:
ingotronic.ch. 300 IN SOA ns1.ingotronic.ch. admin.ingotronic.ch. 2013032762 300 60 864000 300
ingotronic.ch. 300 IN RRSIG SOA 5 2 300 20150125021244 20141226011244 17430 ingotronic.ch. WDLpp9G0P/rlMBfpFn9sAfpEFoBnQfwyGSXbGCc/LG1FSkJoKLDQYDY696scLNsJgkrzZeJrl0oSSvA8AvRUhYRrmuqWMxTVFgYlRwPwqEMCKUqiVhKGVF4NYemoBiUQC4nJwBZd57xKCiF4AQ4CodBtiZxefJFAlTNE0g2yxtM=
unsigned.ingotronic.ch. 300 IN NSEC v.ingotronic.ch. NS RRSIG NSEC
unsigned.ingotronic.ch. 300 IN RRSIG NSEC 5 3 300 20150125004144 20141226003211 17430 ingotronic.ch. VsO/22QJi2Ny+QZBukileDIUc4/DqPdZwNssNbylPAscz0IBrLt9zKDcI26NSMqhFRFXIZqBXJScmKJseKB+wQUscwKK5kkzUIXK/SPbLQ8MLnOUKIXUgURDKDCp6W8eHoa/51dOS0Vb1woxmzN1kQnjTTUoW5z1igN7RcYCuGQ=
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 480 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 51417
;; flags: qr aa rd ra cd ; qd: 1 an: 1 au: 1 ad: 3
;; QUESTIONS:
;; www.unsigned.ingotronic.ch., type = A, class = IN
;; ANSWERS:
www.unsigned.ingotronic.ch. 300 IN A 127.0.0.1
;; AUTHORITY RECORDS:
unsigned.ingotronic.ch. 300 IN NS ns1.ingotronic.ch.
;; ADDITIONAL RECORDS:
ns1.ingotronic.ch. 300 IN A 62.192.5.131
ns1.ingotronic.ch. 300 IN RRSIG A 5 3 300 20150125005754 20141226001054 17430 ingotronic.ch. fNG1RZM53pXwBxruHNaSZszxVzNLoCq8VZsTjAzYH2vSLzHXYVGJFTLIeY0K9APAdyJU8WuwmABmn7XY0Kg39kRG77uoFlqUws2PdTz2QKOwJGZY7W88Ak2Y9lkDBcK8o3wJHVptrT8R7p/1U7UfjF0kqPUkakk2B0EbFWdagFg=
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 278 bytes
###############################################
dnssecjava-1.1.3/src/test/resources/recordings/org_jitsi_dnssec_TestNSEC3NoData/ 0000775 0000000 0000000 00000000000 13020541473 0027725 5 ustar 00root root 0000000 0000000 testNoDSProofCanExistForRoot 0000664 0000000 0000000 00000004244 13020541473 0035260 0 ustar 00root root 0000000 0000000 dnssecjava-1.1.3/src/test/resources/recordings/org_jitsi_dnssec_TestNSEC3NoData #Date: 2014-01-28T22:39:20+01:00
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 48189
;; flags: qr aa rd ra ; qd: 1 an: 0 au: 8 ad: 1
;; QUESTIONS:
;; ., type = DS, class = IN
;; ANSWERS:
;; AUTHORITY RECORDS:
;hash(.) -> hash(a.)
;key is the same as for nsec3.ingotronic.ch.
79anvqbpbhcdqbbli9adpmg4p0sof39o. 300 IN NSEC3 1 0 10 1234 9umm3m67j29mljvnfbcqa4prsu1gir2r NS SOA RRSIG
79anvqbpbhcdqbbli9adpmg4p0sof39o. 300 IN RRSIG NSEC3 7 1 300 20140215011722 20140116005424 16758 . BbqCmb/7I8FMxVbQuOTQ7+Yfpw/1NTNlL29y3AWu4GRh+v3Mrh13PqsS+pwEgBtHTQ2uUCMil+1kiUs2qNCnbz7N5gV3RNtiNZOW9dltU3B2gSwFuX4UKPdCuIrHTBeIVZo7IsSYZSL2/GZ3ECdwbL28KRtvvp1l7uOeHuDdmeIJm47XyowM9v+x1/iCch6GoDzw5XcuXFoEfT+4sXQdhxGneab64alYo49kSf1+lt0pwNTJOtNcyAHvrnsLO/g3Kk5cfR2MNw7ubVyJRicCYO82252LoXITZ/q2Y6k+OCquo5kmc0OLeijZySYF54xFyg2zlcv54j70c/wI9xle7g==
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 1051 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 60551
;; flags: qr rd ra ad cd ; qd: 1 an: 3 au: 0 ad: 1
;; QUESTIONS:
;; ., type = DNSKEY, class = IN
;; ANSWERS:
. 300 IN DNSKEY 257 3 7 AwEAAaBuJTf9oGyeTH3biUkAFLrsYrkodX1H7Snsui4XsDHFCBvs5XYacHbs0Jg0/O51KPjmNnjwMW8SSyDkKqYQ+9uYAf2EQ/pnD/VGQqnV2cw0Vwk/t0E2V4FUCju4pnAoyzZFZXGs1eWbX9JXu++b0Azp+ACq6485qJLzHhWDiIrPoK/SvdbFVRK4s+nPPJLH3NGBbtdz6kPq7aFWYBMoGeAZdN1wsQpcNWUo5eOmaJY53nMc7+rDpAyYlMe/FKwSZdX2ZDd63Qsa6Im4FVUJq/nWLq7tlQ/mWks15uDTQyJy/OWfA0ICCO4N9Fel9rThJNpJWEzOCblvZyBoy405kZk=
. 300 IN RRSIG DNSKEY 7 0 300 20140215011722 20140116005424 16758 . dFPeCHbVNX/k3Hx9XKC6T0WaboXStOxprTqqc8DQSvTTaUrazAwc41/ty1LMdgrcU1JpvZmB3UzLoQcFoYaMQKOcQyPm4GCABMzl0xNTWAOjYURIZggEIEuu61p4j0y4nc52CnRbLxgjUsQOAvPzgDyJHnQ7eSOnz9tZSrpyTmtzU/szKm623cH+7DkguG1QpbWCNl4cTjyqDPwefsdE82u/8PAQ0ANR/hy5sZ4IOwdOas/H1oYCMIc0y9IEtlYO0LPiOv9rx/UmgH64tuuLmmgiIGZXqExsh1XEsQqakCQ33Ux4+p1MCQl3uM/6WvGdJkKNR7/n4kktQy2BxF3ONA==
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 736 bytes
###############################################
testNodataApexNsec3Abused 0000664 0000000 0000000 00000023454 13020541473 0034545 0 ustar 00root root 0000000 0000000 dnssecjava-1.1.3/src/test/resources/recordings/org_jitsi_dnssec_TestNSEC3NoData #Date: 2014-01-28T22:39:20+01:00
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 48189
;; flags: qr aa rd ra ; qd: 1 an: 0 au: 8 ad: 1
;; QUESTIONS:
;; sub.nsec3.ingotronic.ch., type = A, class = IN
;; ANSWERS:
;; AUTHORITY RECORDS:
nsec3.ingotronic.ch. 300 IN SOA ns1.ingotronic.ch. admin.ingotronic.ch. 2013032736 300 60 864000 300
nsec3.ingotronic.ch. 300 IN RRSIG SOA 7 3 300 20140215042629 20140116032629 62417 nsec3.ingotronic.ch. DaTlmlI5j/Y1XJZtij2jplUmwYCcfcUr7O0fzFwUoP7y/3gjaqeT8YyhD1JJP2Agf1ZwEh2q12lD3ZiYp9RvOmkreWQiDv8zUbykBwNpY9w2ur6qgEZWtLQgB+BqdYUeAVV+EOOq+RfVSZzee+z9E+Pf/sEV4kXTbRTwGS+4XmM=
;hash(sub.nsec3.ingotronic.ch.), taken from parent zone
5RFQOLI81S6LKQTUG5HLI19UVJNKUL3H.nsec3.ingotronic.ch. 300 IN NSEC3 1 0 10 1234 74SO0776K6C87EPASDU8QK8SROIK00KK NS DS RRSIG
5RFQOLI81S6LKQTUG5HLI19UVJNKUL3H.nsec3.ingotronic.ch. 300 IN RRSIG NSEC3 7 4 300 20140215011722 20140116005424 62417 nsec3.ingotronic.ch. uen8Xh6XJzE+0Xw3vTOCt9w8B5TQ4w7VyLZtUIZaXkq2kS4xpwIiEw5YgrvR0YdlffhZi2IncBm9mxK7utPfz4GDyHurOZWQXzZS1umh8C0YiLwMjP7RybYakurL6BAJHh685XBTyVkUmbxcZ0udVvIwhvzqTamMj+0m04S20+4=
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 1051 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 60551
;; flags: qr rd ra ad cd ; qd: 1 an: 3 au: 0 ad: 1
;; QUESTIONS:
;; ., type = DNSKEY, class = IN
;; ANSWERS:
. 61065 IN DNSKEY 256 3 8 AwEAAb8sU6pbYMWRbkRnEuEZw9NSir707TkOcF+UL1XiK4NDJOvXRyX195Am5dQ7bRnnuySZ3daf37vvjUUhuIWUAQ4stht8nJfYxVQXDYjSpGH5I6Hf/0CZEoNP6cNvrQ7AFmKkmv00xWExKQjbvnRPI4bqpMwtHVzn6WybBZ6kuqED
. 61065 IN DNSKEY 257 3 8 AwEAAagAIKlVZrpC6Ia7gEzahOR+9W29euxhJhVVLOyQbSEW0O8gcCjFFVQUTf6v58fLjwBd0YI0EzrAcQqBGCzh/RStIoO8g0NfnfL2MTJRkxoXbfDaUeVPQuYEhg37NZWAJQ9VnMVDxP/VHL496M/QZxkjf5/Efucp2gaDX6RS6CXpoY68LsvPVjR0ZSwzz1apAzvN9dlzEheX7ICJBBtuA6G3LQpzW5hOA2hzCTMjJPJ8LbqF6dsV6DoBQzgul0sGIcGOYl7OyQdXfZ57relSQageu+ipAdTTJ25AsRTAoub8ONGcLmqrAmRLKBP1dfwhYB4N7knNnulqQxA+Uk1ihz0=
. 61065 IN RRSIG DNSKEY 8 0 172800 20140204235959 20140121000000 19036 . naUK900bmMkwXGEUg2wDRHVLN5vPQCU5l9LE3ZwiShbOze9KpWtFCluZ8v2G6Xlm35vNK+sq4B/UV/PVS9f4FhLgfQKJSThpAT8CqMOdvLgu+sTQ4bp+ve1h9sK3T20xjs3khQ16D4mDNUK+sdGEHpBJu7RlBGlprD9Xa8yE8CSkR/WFDm91wIU7AoTdqCz9Lkb1TFavj8SrSjQXYt/H+xwy8VzKxfxL/f9Lm70bfLmW8ZVRKjT12cbs+7TxG4IwP/W0TiTq7oa2fDESKJq3mAHOTifHl3cTG5DO7nldesDPcxWD4UZxYMz1teSlKSNgQGdcUVHIeMkhh1pBnfnCBA==
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 736 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 10015
;; flags: qr rd ra ad cd ; qd: 1 an: 2 au: 0 ad: 1
;; QUESTIONS:
;; ch., type = DS, class = IN
;; ANSWERS:
ch. 824 IN DS 24859 8 2 9AFD21261EAF98AFD7E24E89BE6B25767F93EB401C6C3DF21342F40EE82DCCF0
ch. 824 IN RRSIG DS 8 1 86400 20140203000000 20140126230000 33655 . vdEmh6O0rGMUcX5EDZtUAT/D7jadckSXdN9YILrNJZj32Xl7BwJOzvvI2nXngmG/o6KdxMqh+Cldp0alYKUvWXX3A16xIp89aLkxlyBWM84t1Bt8V0XPHFZJDCznfVvYhFYG0tnUpABg6F3rGiDwk2woCmFPTeZMjPgWk4p2IDI=
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 238 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 46537
;; flags: qr rd ra ad cd ; qd: 1 an: 4 au: 0 ad: 1
;; QUESTIONS:
;; ch., type = DNSKEY, class = IN
;; ANSWERS:
ch. 824 IN DNSKEY 257 3 8 AwEAAb5bW5/VfwMAh4475ab4xxrFwc7RIbAoKOABByzbIDMODUlQz1MQLlrI/z4SYANynrDCevw2f1f2ROUzriZpqwqiTN2w3K3GJrk7yZ+1e8OhI2uaGsxKVnTyxKiyzPlC9OLilEsZ4oLGoUIksfJgdDY9+Nj1971H1XS1eDNViJ6kSxgnbxH5tnHl5s75Wfzq8GxSyMu5KxoYbCGT/mvU5ZyZccULQUe/f11FE5JazLf9TgtyDSyWdCFRWl6mdIAR7lVCY82jtN0+Mhzp1PYF/YK3IReKs9P0vijM8qYDXem0NNSzse9lk7SiJWc02vVo/QmfxqTVkNrv2Fcg7fUoiCk=
ch. 824 IN DNSKEY 256 3 8 AwEAAfRZWbfzfBEayMyl/GmDY+e9zmYPNLVlfss3/eUxwnsfh704epy8rVQ6pJuVU0ihFWHTp583ZvWy73ZrVrtXwXbpa3z4+84vhxXDshHG6W67/XEThG0zQY/zFwopIQC+/LLhn7NAR5SZghdqS7+d4EoW52BZtGW/hZIyGuiWZynZ
ch. 824 IN DNSKEY 256 3 8 AwEAAcbnjesseojqOqAWrNxHDr7aw4jwJkQGfFtWdtr0KQEQApS112QmhbWIZ1yHS8IWbAd4jVGRFQqJ4KZoFW6HdgKfXcfrBQ5QXVfi0gyyZjzwAteOGxAH8NtuqbOwkhT3efDtntJcY+wQIwL5QQKKX/Aw2CvxhmUQxHCNhvsD2HPH
ch. 824 IN RRSIG DNSKEY 8 1 86400 20140303100909 20140116090909 24859 ch. F/gnqCvTxFwFFkUX/YEP4ifda8rSrU1DWEJKrj3lnobrd7LJQJRYwanOXbF0YRbNJWPsDXvw2v8/m9NggNy9EL7/iwR9TB2eNwwDAoZsrDitvmVFWm4ewueWNlXy63P96CyzeiTx37uxh59+PpC/w6+Z8Eb/ce6K714NW5PGg3ZM1ABNVt3VSv1WpbnOHdUKp0WHQtvUxSUh1EBN9OZAi9OsO/e44VmAEICA2qqVYcUR3hdiVBTCn0M+g+afXhTmavsUVSzeEdVtHpRLV7q1rIM2woWFmnhG27VGE+Fx5D7wwj9aC09vr4xADdmlTa05taoX0OKKqO5X1j/kT38SAg==
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 893 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 47971
;; flags: qr rd ra cd ; qd: 1 an: 3 au: 0 ad: 1
;; QUESTIONS:
;; ingotronic.ch., type = DS, class = IN
;; ANSWERS:
ingotronic.ch. 2355 IN DS 6031 5 2 4A948F2FDADA24686E473EDAC00DCF972584C75E3FAA92C2021B6221449FF87E
ingotronic.ch. 2355 IN DS 6031 5 1 733D0218B571CD617B1A7493564B9FC4F12ADE82
ingotronic.ch. 2355 IN RRSIG DS 8 2 3600 20140227194545 20140128190342 47694 ch. fI4xUfXJ/4RwPi0CQUX12gHlmSAh6NLE9AXNRFXv0JX2Jhprq1rwLnbCxZsdU0N27dHSIFeeOSb3b02EdaBKKtBAPegXOIYX67siXHhRnykXjqX0tuHDPWYPeegh7UttVLWi0ZHeBJ6YagYW+9Cu3EyoAhVt5V72rgKzB6cKWK0=
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 288 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 48551
;; flags: qr aa rd ra cd ; qd: 1 an: 4 au: 0 ad: 1
;; QUESTIONS:
;; ingotronic.ch., type = DNSKEY, class = IN
;; ANSWERS:
ingotronic.ch. 300 IN DNSKEY 256 3 5 AwEAAZ2Xh77GFzpEDx7EHYxShqltHgkiG+BOjBGifEmnJhQSdE5/yNSLFNcdhZZ8HUPxYnaedTqJcFFg4AzUsQklF/fECegTJdZjaj2WoL0/I8K7HMfY/hVuRZUWPNglYi8agJRX6gdkFTCpUNI7stpgKqxtzUJhhw15uG/lKMplwqUr
ingotronic.ch. 300 IN DNSKEY 257 3 5 AwEAAeA1vzmjaB+eBAcvhzpKEgAEFpvQ1rg4uKDW6MsQtacKoqBpgyep2+LuWotz5p/xYxj3NGsArwN8Ad5cY0FHRr8miTT0elOv6nvlqGIfRuhj/BXAQ1x4ihpSFslHw0lJMYFwxsUZWpUyjWX/nv1xRZMMwF46gui0N4OEbyTYusCk77D+A71k+K0EAitFIbIH4GCUKmH1H7HmXhSVH9bN/n7KEGwW32lmsuuUcJoRKDkcUvbMXY/9Xoa2quERrUg/rBbDUHowRPjYDS5GzY1+f4YY8s40BufGiqyUTKKXL953MVFK8gmezXA0hbmrnZ7CBOw/7238mORAdzExaX8n7CE=
ingotronic.ch. 300 IN RRSIG DNSKEY 5 2 300 20140218124422 20140119114422 6031 ingotronic.ch. ToVAQwGYFHE7lkZGc3b42RmbJxQgkCq0U/GBj/thBklPY+6ljKhNSKBSXbM6rFpMHGoWC2WAXlDLTLRZJT1mBziFDd2YXyxRItr+oj+FK2zGEYM5+JEUG/TW1XS7LH5y8Uj8RaJuXi76OUYtBG+r0KFidH+ix3dlxg/O43epn8nf3wMwnrJL7EddjuMGSujFjoIM+Fy0CKvu+R5RFyIQn2V7E2Y/ZoSzEn7Ey27IYRc1EiskzUz94opbIQHx0/YkngZpDOSs9P2d8FX7rJVBjy7pxvS6IA8EPytJMEwAEw4agaq9nCEc7M0rdN0knv81qTLZWF/p47m2X13yTGrhOw==
ingotronic.ch. 300 IN RRSIG DNSKEY 5 2 300 20140218124422 20140119114422 17430 ingotronic.ch. dW820FCc9H0HzcOEihkrGq7W5Cm8y0FXg4xcMWaobHzsX3jI5ResccGi9UnNclE6pXAnu4E7w7d8tOEdih+Eb8rt67eaXOIBReWynMaHkVpAbRASiil755vnCE3SsXathrunUVpRB3QkIVqRhTLGzM+LANC3H8jVXhGVRVy8Dog=
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 940 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 25297
;; flags: qr aa rd ra cd ; qd: 1 an: 3 au: 0 ad: 1
;; QUESTIONS:
;; nsec3.ingotronic.ch., type = DS, class = IN
;; ANSWERS:
nsec3.ingotronic.ch. 300 IN DS 16758 7 1 1720FF268E09A2CB63805EC8782D10AAD20E12A5
nsec3.ingotronic.ch. 300 IN DS 16758 7 2 3C8DC02750A1636F829B45D6E6D642866768A9CD40A013AD9D25AB63734FFA13
nsec3.ingotronic.ch. 300 IN RRSIG DS 5 3 300 20140218125024 20140119120700 17430 ingotronic.ch. JE66mSXrbaDE2usJScL/GXUxTXRn+GeO+Fi/iJyajr09aVnqTqd7UEN9eq454rLozFAv4dV3vKQywOI7BDMkM+OfVYQKy/Kro7CcvNpcuo+Tg8kX8ttl1a6C9kjy75wHh09X62TmKhA1a5bksHMs/P3SCTG87cXllmTpot3KlUE=
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 305 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 57018
;; flags: qr aa rd ra cd ; qd: 1 an: 4 au: 0 ad: 1
;; QUESTIONS:
;; nsec3.ingotronic.ch., type = DNSKEY, class = IN
;; ANSWERS:
nsec3.ingotronic.ch. 300 IN DNSKEY 256 3 7 AwEAAccAWxkTVGZ6UAp0VEozAlYpARhbh6Y6tYOl6Fg3UeBNFFtDQ9fTEEt1NkbnR9u8KkpVN6a67avlYiUN1egDqEwzDU7R1Rw+/USdhm2hqOARmmu3DBgjjX/iXjZLyv310cOGFJZ/smcodlDL4pDAAoPxh/qs6KEBaT0sc1KWcGq3
nsec3.ingotronic.ch. 300 IN DNSKEY 257 3 7 AwEAAaBuJTf9oGyeTH3biUkAFLrsYrkodX1H7Snsui4XsDHFCBvs5XYacHbs0Jg0/O51KPjmNnjwMW8SSyDkKqYQ+9uYAf2EQ/pnD/VGQqnV2cw0Vwk/t0E2V4FUCju4pnAoyzZFZXGs1eWbX9JXu++b0Azp+ACq6485qJLzHhWDiIrPoK/SvdbFVRK4s+nPPJLH3NGBbtdz6kPq7aFWYBMoGeAZdN1wsQpcNWUo5eOmaJY53nMc7+rDpAyYlMe/FKwSZdX2ZDd63Qsa6Im4FVUJq/nWLq7tlQ/mWks15uDTQyJy/OWfA0ICCO4N9Fel9rThJNpJWEzOCblvZyBoy405kZk=
nsec3.ingotronic.ch. 300 IN RRSIG DNSKEY 7 3 300 20140215023510 20140116021800 16758 nsec3.ingotronic.ch. RT1Lj82phLAEt5Ck6F/vg6VYvgT7Loy7sixOoZC13YCU7tJqe9lZEWWQuDATlvUdMeyApDXjDj0Czy2cDlCxPrtpZANm+/GWGn67+t8MUC2r8rgbVvFWjHFmMrb9nMLsdOajF5m7A9cnPIpFfng7uUqlpBZ7UvvBGtBOy6sRxErdxzr2KY+2B2dLyfGw7z9e04J9F75AC+jdL1Z+R0CSkaYJoroun53OULF8xhNOB9D4pbKx/fcVxVuNx2L8KcpDn2EsHGSkM4eIUo7l3kYx3f4OV0HFIL0pwByqDvc+66HCEcS5OBlEM+Z5EDKS1DGY3DE85RFZpu4sIShqffRB4A==
nsec3.ingotronic.ch. 300 IN RRSIG DNSKEY 7 3 300 20140215023510 20140116021800 62417 nsec3.ingotronic.ch. iGelQHd9Eqam20YcJGFoOLn6DTQgkCts5nJrRLRYuDndGNUOcpTt0EcPImOGiDYEk+0TiXXF3jfbKYaZtncsKvwE50m41E4osqdIA/rpJU9GFWwGgQ2EX5uizunyxEM/YzTgjr9+heIW9+MtgPV1NZRp8HPN3Tq96j3VI3lCQxs=
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 958 bytes
###############################################
testNodataApexNsec3AbusedForNoDS 0000664 0000000 0000000 00000023456 13020541473 0035742 0 ustar 00root root 0000000 0000000 dnssecjava-1.1.3/src/test/resources/recordings/org_jitsi_dnssec_TestNSEC3NoData #Date: 2014-01-28T22:39:20+01:00
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 48189
;; flags: qr aa rd ra ; qd: 1 an: 0 au: 8 ad: 1
;; QUESTIONS:
;; sub.nsec3.ingotronic.ch., type = DS, class = IN
;; ANSWERS:
;; AUTHORITY RECORDS:
nsec3.ingotronic.ch. 300 IN SOA ns1.ingotronic.ch. admin.ingotronic.ch. 2013032736 300 60 864000 300
nsec3.ingotronic.ch. 300 IN RRSIG SOA 7 3 300 20140215042629 20140116032629 62417 nsec3.ingotronic.ch. DaTlmlI5j/Y1XJZtij2jplUmwYCcfcUr7O0fzFwUoP7y/3gjaqeT8YyhD1JJP2Agf1ZwEh2q12lD3ZiYp9RvOmkreWQiDv8zUbykBwNpY9w2ur6qgEZWtLQgB+BqdYUeAVV+EOOq+RfVSZzee+z9E+Pf/sEV4kXTbRTwGS+4XmM=
;hash(sub.nsec3.ingotronic.ch.), taken from parent zone
5RFQOLI81S6LKQTUG5HLI19UVJNKUL3H.nsec3.ingotronic.ch. 300 IN NSEC3 1 0 10 1234 74SO0776K6C87EPASDU8QK8SROIK00KK NS SOA RRSIG
5RFQOLI81S6LKQTUG5HLI19UVJNKUL3H.nsec3.ingotronic.ch. 300 IN RRSIG NSEC3 7 4 300 20140215011722 20140116005424 62417 nsec3.ingotronic.ch. FdU0H+o81azPLo4Enzj5BZHEeU/kKDIQiPQ/UIWB0NO5VDDNqn4eH+3klmMtElS0nhi/0PDN14SrPVPUaRYO9E9kw4/9XEaHmO5nn0uqYF5tERlgx3uJmJ/89Pg8Ai1bQkLi+FpeOS/Vvnj73GYy+eOItcRfatv67wY57eRQA6w=
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 1051 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 60551
;; flags: qr rd ra ad cd ; qd: 1 an: 3 au: 0 ad: 1
;; QUESTIONS:
;; ., type = DNSKEY, class = IN
;; ANSWERS:
. 61065 IN DNSKEY 256 3 8 AwEAAb8sU6pbYMWRbkRnEuEZw9NSir707TkOcF+UL1XiK4NDJOvXRyX195Am5dQ7bRnnuySZ3daf37vvjUUhuIWUAQ4stht8nJfYxVQXDYjSpGH5I6Hf/0CZEoNP6cNvrQ7AFmKkmv00xWExKQjbvnRPI4bqpMwtHVzn6WybBZ6kuqED
. 61065 IN DNSKEY 257 3 8 AwEAAagAIKlVZrpC6Ia7gEzahOR+9W29euxhJhVVLOyQbSEW0O8gcCjFFVQUTf6v58fLjwBd0YI0EzrAcQqBGCzh/RStIoO8g0NfnfL2MTJRkxoXbfDaUeVPQuYEhg37NZWAJQ9VnMVDxP/VHL496M/QZxkjf5/Efucp2gaDX6RS6CXpoY68LsvPVjR0ZSwzz1apAzvN9dlzEheX7ICJBBtuA6G3LQpzW5hOA2hzCTMjJPJ8LbqF6dsV6DoBQzgul0sGIcGOYl7OyQdXfZ57relSQageu+ipAdTTJ25AsRTAoub8ONGcLmqrAmRLKBP1dfwhYB4N7knNnulqQxA+Uk1ihz0=
. 61065 IN RRSIG DNSKEY 8 0 172800 20140204235959 20140121000000 19036 . naUK900bmMkwXGEUg2wDRHVLN5vPQCU5l9LE3ZwiShbOze9KpWtFCluZ8v2G6Xlm35vNK+sq4B/UV/PVS9f4FhLgfQKJSThpAT8CqMOdvLgu+sTQ4bp+ve1h9sK3T20xjs3khQ16D4mDNUK+sdGEHpBJu7RlBGlprD9Xa8yE8CSkR/WFDm91wIU7AoTdqCz9Lkb1TFavj8SrSjQXYt/H+xwy8VzKxfxL/f9Lm70bfLmW8ZVRKjT12cbs+7TxG4IwP/W0TiTq7oa2fDESKJq3mAHOTifHl3cTG5DO7nldesDPcxWD4UZxYMz1teSlKSNgQGdcUVHIeMkhh1pBnfnCBA==
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 736 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 10015
;; flags: qr rd ra ad cd ; qd: 1 an: 2 au: 0 ad: 1
;; QUESTIONS:
;; ch., type = DS, class = IN
;; ANSWERS:
ch. 824 IN DS 24859 8 2 9AFD21261EAF98AFD7E24E89BE6B25767F93EB401C6C3DF21342F40EE82DCCF0
ch. 824 IN RRSIG DS 8 1 86400 20140203000000 20140126230000 33655 . vdEmh6O0rGMUcX5EDZtUAT/D7jadckSXdN9YILrNJZj32Xl7BwJOzvvI2nXngmG/o6KdxMqh+Cldp0alYKUvWXX3A16xIp89aLkxlyBWM84t1Bt8V0XPHFZJDCznfVvYhFYG0tnUpABg6F3rGiDwk2woCmFPTeZMjPgWk4p2IDI=
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 238 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 46537
;; flags: qr rd ra ad cd ; qd: 1 an: 4 au: 0 ad: 1
;; QUESTIONS:
;; ch., type = DNSKEY, class = IN
;; ANSWERS:
ch. 824 IN DNSKEY 257 3 8 AwEAAb5bW5/VfwMAh4475ab4xxrFwc7RIbAoKOABByzbIDMODUlQz1MQLlrI/z4SYANynrDCevw2f1f2ROUzriZpqwqiTN2w3K3GJrk7yZ+1e8OhI2uaGsxKVnTyxKiyzPlC9OLilEsZ4oLGoUIksfJgdDY9+Nj1971H1XS1eDNViJ6kSxgnbxH5tnHl5s75Wfzq8GxSyMu5KxoYbCGT/mvU5ZyZccULQUe/f11FE5JazLf9TgtyDSyWdCFRWl6mdIAR7lVCY82jtN0+Mhzp1PYF/YK3IReKs9P0vijM8qYDXem0NNSzse9lk7SiJWc02vVo/QmfxqTVkNrv2Fcg7fUoiCk=
ch. 824 IN DNSKEY 256 3 8 AwEAAfRZWbfzfBEayMyl/GmDY+e9zmYPNLVlfss3/eUxwnsfh704epy8rVQ6pJuVU0ihFWHTp583ZvWy73ZrVrtXwXbpa3z4+84vhxXDshHG6W67/XEThG0zQY/zFwopIQC+/LLhn7NAR5SZghdqS7+d4EoW52BZtGW/hZIyGuiWZynZ
ch. 824 IN DNSKEY 256 3 8 AwEAAcbnjesseojqOqAWrNxHDr7aw4jwJkQGfFtWdtr0KQEQApS112QmhbWIZ1yHS8IWbAd4jVGRFQqJ4KZoFW6HdgKfXcfrBQ5QXVfi0gyyZjzwAteOGxAH8NtuqbOwkhT3efDtntJcY+wQIwL5QQKKX/Aw2CvxhmUQxHCNhvsD2HPH
ch. 824 IN RRSIG DNSKEY 8 1 86400 20140303100909 20140116090909 24859 ch. F/gnqCvTxFwFFkUX/YEP4ifda8rSrU1DWEJKrj3lnobrd7LJQJRYwanOXbF0YRbNJWPsDXvw2v8/m9NggNy9EL7/iwR9TB2eNwwDAoZsrDitvmVFWm4ewueWNlXy63P96CyzeiTx37uxh59+PpC/w6+Z8Eb/ce6K714NW5PGg3ZM1ABNVt3VSv1WpbnOHdUKp0WHQtvUxSUh1EBN9OZAi9OsO/e44VmAEICA2qqVYcUR3hdiVBTCn0M+g+afXhTmavsUVSzeEdVtHpRLV7q1rIM2woWFmnhG27VGE+Fx5D7wwj9aC09vr4xADdmlTa05taoX0OKKqO5X1j/kT38SAg==
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 893 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 47971
;; flags: qr rd ra cd ; qd: 1 an: 3 au: 0 ad: 1
;; QUESTIONS:
;; ingotronic.ch., type = DS, class = IN
;; ANSWERS:
ingotronic.ch. 2355 IN DS 6031 5 2 4A948F2FDADA24686E473EDAC00DCF972584C75E3FAA92C2021B6221449FF87E
ingotronic.ch. 2355 IN DS 6031 5 1 733D0218B571CD617B1A7493564B9FC4F12ADE82
ingotronic.ch. 2355 IN RRSIG DS 8 2 3600 20140227194545 20140128190342 47694 ch. fI4xUfXJ/4RwPi0CQUX12gHlmSAh6NLE9AXNRFXv0JX2Jhprq1rwLnbCxZsdU0N27dHSIFeeOSb3b02EdaBKKtBAPegXOIYX67siXHhRnykXjqX0tuHDPWYPeegh7UttVLWi0ZHeBJ6YagYW+9Cu3EyoAhVt5V72rgKzB6cKWK0=
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 288 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 48551
;; flags: qr aa rd ra cd ; qd: 1 an: 4 au: 0 ad: 1
;; QUESTIONS:
;; ingotronic.ch., type = DNSKEY, class = IN
;; ANSWERS:
ingotronic.ch. 300 IN DNSKEY 256 3 5 AwEAAZ2Xh77GFzpEDx7EHYxShqltHgkiG+BOjBGifEmnJhQSdE5/yNSLFNcdhZZ8HUPxYnaedTqJcFFg4AzUsQklF/fECegTJdZjaj2WoL0/I8K7HMfY/hVuRZUWPNglYi8agJRX6gdkFTCpUNI7stpgKqxtzUJhhw15uG/lKMplwqUr
ingotronic.ch. 300 IN DNSKEY 257 3 5 AwEAAeA1vzmjaB+eBAcvhzpKEgAEFpvQ1rg4uKDW6MsQtacKoqBpgyep2+LuWotz5p/xYxj3NGsArwN8Ad5cY0FHRr8miTT0elOv6nvlqGIfRuhj/BXAQ1x4ihpSFslHw0lJMYFwxsUZWpUyjWX/nv1xRZMMwF46gui0N4OEbyTYusCk77D+A71k+K0EAitFIbIH4GCUKmH1H7HmXhSVH9bN/n7KEGwW32lmsuuUcJoRKDkcUvbMXY/9Xoa2quERrUg/rBbDUHowRPjYDS5GzY1+f4YY8s40BufGiqyUTKKXL953MVFK8gmezXA0hbmrnZ7CBOw/7238mORAdzExaX8n7CE=
ingotronic.ch. 300 IN RRSIG DNSKEY 5 2 300 20140218124422 20140119114422 6031 ingotronic.ch. ToVAQwGYFHE7lkZGc3b42RmbJxQgkCq0U/GBj/thBklPY+6ljKhNSKBSXbM6rFpMHGoWC2WAXlDLTLRZJT1mBziFDd2YXyxRItr+oj+FK2zGEYM5+JEUG/TW1XS7LH5y8Uj8RaJuXi76OUYtBG+r0KFidH+ix3dlxg/O43epn8nf3wMwnrJL7EddjuMGSujFjoIM+Fy0CKvu+R5RFyIQn2V7E2Y/ZoSzEn7Ey27IYRc1EiskzUz94opbIQHx0/YkngZpDOSs9P2d8FX7rJVBjy7pxvS6IA8EPytJMEwAEw4agaq9nCEc7M0rdN0knv81qTLZWF/p47m2X13yTGrhOw==
ingotronic.ch. 300 IN RRSIG DNSKEY 5 2 300 20140218124422 20140119114422 17430 ingotronic.ch. dW820FCc9H0HzcOEihkrGq7W5Cm8y0FXg4xcMWaobHzsX3jI5ResccGi9UnNclE6pXAnu4E7w7d8tOEdih+Eb8rt67eaXOIBReWynMaHkVpAbRASiil755vnCE3SsXathrunUVpRB3QkIVqRhTLGzM+LANC3H8jVXhGVRVy8Dog=
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 940 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 25297
;; flags: qr aa rd ra cd ; qd: 1 an: 3 au: 0 ad: 1
;; QUESTIONS:
;; nsec3.ingotronic.ch., type = DS, class = IN
;; ANSWERS:
nsec3.ingotronic.ch. 300 IN DS 16758 7 1 1720FF268E09A2CB63805EC8782D10AAD20E12A5
nsec3.ingotronic.ch. 300 IN DS 16758 7 2 3C8DC02750A1636F829B45D6E6D642866768A9CD40A013AD9D25AB63734FFA13
nsec3.ingotronic.ch. 300 IN RRSIG DS 5 3 300 20140218125024 20140119120700 17430 ingotronic.ch. JE66mSXrbaDE2usJScL/GXUxTXRn+GeO+Fi/iJyajr09aVnqTqd7UEN9eq454rLozFAv4dV3vKQywOI7BDMkM+OfVYQKy/Kro7CcvNpcuo+Tg8kX8ttl1a6C9kjy75wHh09X62TmKhA1a5bksHMs/P3SCTG87cXllmTpot3KlUE=
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 305 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 57018
;; flags: qr aa rd ra cd ; qd: 1 an: 4 au: 0 ad: 1
;; QUESTIONS:
;; nsec3.ingotronic.ch., type = DNSKEY, class = IN
;; ANSWERS:
nsec3.ingotronic.ch. 300 IN DNSKEY 256 3 7 AwEAAccAWxkTVGZ6UAp0VEozAlYpARhbh6Y6tYOl6Fg3UeBNFFtDQ9fTEEt1NkbnR9u8KkpVN6a67avlYiUN1egDqEwzDU7R1Rw+/USdhm2hqOARmmu3DBgjjX/iXjZLyv310cOGFJZ/smcodlDL4pDAAoPxh/qs6KEBaT0sc1KWcGq3
nsec3.ingotronic.ch. 300 IN DNSKEY 257 3 7 AwEAAaBuJTf9oGyeTH3biUkAFLrsYrkodX1H7Snsui4XsDHFCBvs5XYacHbs0Jg0/O51KPjmNnjwMW8SSyDkKqYQ+9uYAf2EQ/pnD/VGQqnV2cw0Vwk/t0E2V4FUCju4pnAoyzZFZXGs1eWbX9JXu++b0Azp+ACq6485qJLzHhWDiIrPoK/SvdbFVRK4s+nPPJLH3NGBbtdz6kPq7aFWYBMoGeAZdN1wsQpcNWUo5eOmaJY53nMc7+rDpAyYlMe/FKwSZdX2ZDd63Qsa6Im4FVUJq/nWLq7tlQ/mWks15uDTQyJy/OWfA0ICCO4N9Fel9rThJNpJWEzOCblvZyBoy405kZk=
nsec3.ingotronic.ch. 300 IN RRSIG DNSKEY 7 3 300 20140215023510 20140116021800 16758 nsec3.ingotronic.ch. RT1Lj82phLAEt5Ck6F/vg6VYvgT7Loy7sixOoZC13YCU7tJqe9lZEWWQuDATlvUdMeyApDXjDj0Czy2cDlCxPrtpZANm+/GWGn67+t8MUC2r8rgbVvFWjHFmMrb9nMLsdOajF5m7A9cnPIpFfng7uUqlpBZ7UvvBGtBOy6sRxErdxzr2KY+2B2dLyfGw7z9e04J9F75AC+jdL1Z+R0CSkaYJoroun53OULF8xhNOB9D4pbKx/fcVxVuNx2L8KcpDn2EsHGSkM4eIUo7l3kYx3f4OV0HFIL0pwByqDvc+66HCEcS5OBlEM+Z5EDKS1DGY3DE85RFZpu4sIShqffRB4A==
nsec3.ingotronic.ch. 300 IN RRSIG DNSKEY 7 3 300 20140215023510 20140116021800 62417 nsec3.ingotronic.ch. iGelQHd9Eqam20YcJGFoOLn6DTQgkCts5nJrRLRYuDndGNUOcpTt0EcPImOGiDYEk+0TiXXF3jfbKYaZtncsKvwE50m41E4osqdIA/rpJU9GFWwGgQ2EX5uizunyxEM/YzTgjr9+heIW9+MtgPV1NZRp8HPN3Tq96j3VI3lCQxs=
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 958 bytes
###############################################
testNodataApexNsec3ProofInsecureDelegation 0000664 0000000 0000000 00000023474 13020541473 0040123 0 ustar 00root root 0000000 0000000 dnssecjava-1.1.3/src/test/resources/recordings/org_jitsi_dnssec_TestNSEC3NoData #Date: 2014-01-28T22:39:20+01:00
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 48189
;; flags: qr aa rd ra ; qd: 1 an: 0 au: 8 ad: 1
;; QUESTIONS:
;; sub.nsec3.ingotronic.ch., type = A, class = IN
;; ANSWERS:
;; AUTHORITY RECORDS:
nsec3.ingotronic.ch. 300 IN SOA ns1.ingotronic.ch. admin.ingotronic.ch. 2013032736 300 60 864000 300
nsec3.ingotronic.ch. 300 IN RRSIG SOA 7 3 300 20140215042629 20140116032629 62417 nsec3.ingotronic.ch. DaTlmlI5j/Y1XJZtij2jplUmwYCcfcUr7O0fzFwUoP7y/3gjaqeT8YyhD1JJP2Agf1ZwEh2q12lD3ZiYp9RvOmkreWQiDv8zUbykBwNpY9w2ur6qgEZWtLQgB+BqdYUeAVV+EOOq+RfVSZzee+z9E+Pf/sEV4kXTbRTwGS+4XmM=
;hash(sub.nsec3.ingotronic.ch.), taken from parent zone and removed the DS
5RFQOLI81S6LKQTUG5HLI19UVJNKUL3H.nsec3.ingotronic.ch. 300 IN NSEC3 1 0 10 1234 74SO0776K6C87EPASDU8QK8SROIK00KK NS RRSIG
5RFQOLI81S6LKQTUG5HLI19UVJNKUL3H.nsec3.ingotronic.ch. 300 IN RRSIG NSEC3 7 4 300 20140215042629 20140116032629 62417 nsec3.ingotronic.ch. fjiw9C0JFM8mA45Wzu+0H4SMe7CIce05bKuTvXUMI6RY164xMRgU0a9mQpk++Upksk/eAnexzA/TlqYQISGg+/JWV/js5xUNc6jYVWUmy84wGPq2vSrC3uoLwBZgvmNjAJlEHMFFx3XX9ihS4+KhgFM66s5pqLiIAshPwe6wsqU=
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 1051 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 60551
;; flags: qr rd ra ad cd ; qd: 1 an: 3 au: 0 ad: 1
;; QUESTIONS:
;; ., type = DNSKEY, class = IN
;; ANSWERS:
. 61065 IN DNSKEY 256 3 8 AwEAAb8sU6pbYMWRbkRnEuEZw9NSir707TkOcF+UL1XiK4NDJOvXRyX195Am5dQ7bRnnuySZ3daf37vvjUUhuIWUAQ4stht8nJfYxVQXDYjSpGH5I6Hf/0CZEoNP6cNvrQ7AFmKkmv00xWExKQjbvnRPI4bqpMwtHVzn6WybBZ6kuqED
. 61065 IN DNSKEY 257 3 8 AwEAAagAIKlVZrpC6Ia7gEzahOR+9W29euxhJhVVLOyQbSEW0O8gcCjFFVQUTf6v58fLjwBd0YI0EzrAcQqBGCzh/RStIoO8g0NfnfL2MTJRkxoXbfDaUeVPQuYEhg37NZWAJQ9VnMVDxP/VHL496M/QZxkjf5/Efucp2gaDX6RS6CXpoY68LsvPVjR0ZSwzz1apAzvN9dlzEheX7ICJBBtuA6G3LQpzW5hOA2hzCTMjJPJ8LbqF6dsV6DoBQzgul0sGIcGOYl7OyQdXfZ57relSQageu+ipAdTTJ25AsRTAoub8ONGcLmqrAmRLKBP1dfwhYB4N7knNnulqQxA+Uk1ihz0=
. 61065 IN RRSIG DNSKEY 8 0 172800 20140204235959 20140121000000 19036 . naUK900bmMkwXGEUg2wDRHVLN5vPQCU5l9LE3ZwiShbOze9KpWtFCluZ8v2G6Xlm35vNK+sq4B/UV/PVS9f4FhLgfQKJSThpAT8CqMOdvLgu+sTQ4bp+ve1h9sK3T20xjs3khQ16D4mDNUK+sdGEHpBJu7RlBGlprD9Xa8yE8CSkR/WFDm91wIU7AoTdqCz9Lkb1TFavj8SrSjQXYt/H+xwy8VzKxfxL/f9Lm70bfLmW8ZVRKjT12cbs+7TxG4IwP/W0TiTq7oa2fDESKJq3mAHOTifHl3cTG5DO7nldesDPcxWD4UZxYMz1teSlKSNgQGdcUVHIeMkhh1pBnfnCBA==
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 736 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 10015
;; flags: qr rd ra ad cd ; qd: 1 an: 2 au: 0 ad: 1
;; QUESTIONS:
;; ch., type = DS, class = IN
;; ANSWERS:
ch. 824 IN DS 24859 8 2 9AFD21261EAF98AFD7E24E89BE6B25767F93EB401C6C3DF21342F40EE82DCCF0
ch. 824 IN RRSIG DS 8 1 86400 20140203000000 20140126230000 33655 . vdEmh6O0rGMUcX5EDZtUAT/D7jadckSXdN9YILrNJZj32Xl7BwJOzvvI2nXngmG/o6KdxMqh+Cldp0alYKUvWXX3A16xIp89aLkxlyBWM84t1Bt8V0XPHFZJDCznfVvYhFYG0tnUpABg6F3rGiDwk2woCmFPTeZMjPgWk4p2IDI=
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 238 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 46537
;; flags: qr rd ra ad cd ; qd: 1 an: 4 au: 0 ad: 1
;; QUESTIONS:
;; ch., type = DNSKEY, class = IN
;; ANSWERS:
ch. 824 IN DNSKEY 257 3 8 AwEAAb5bW5/VfwMAh4475ab4xxrFwc7RIbAoKOABByzbIDMODUlQz1MQLlrI/z4SYANynrDCevw2f1f2ROUzriZpqwqiTN2w3K3GJrk7yZ+1e8OhI2uaGsxKVnTyxKiyzPlC9OLilEsZ4oLGoUIksfJgdDY9+Nj1971H1XS1eDNViJ6kSxgnbxH5tnHl5s75Wfzq8GxSyMu5KxoYbCGT/mvU5ZyZccULQUe/f11FE5JazLf9TgtyDSyWdCFRWl6mdIAR7lVCY82jtN0+Mhzp1PYF/YK3IReKs9P0vijM8qYDXem0NNSzse9lk7SiJWc02vVo/QmfxqTVkNrv2Fcg7fUoiCk=
ch. 824 IN DNSKEY 256 3 8 AwEAAfRZWbfzfBEayMyl/GmDY+e9zmYPNLVlfss3/eUxwnsfh704epy8rVQ6pJuVU0ihFWHTp583ZvWy73ZrVrtXwXbpa3z4+84vhxXDshHG6W67/XEThG0zQY/zFwopIQC+/LLhn7NAR5SZghdqS7+d4EoW52BZtGW/hZIyGuiWZynZ
ch. 824 IN DNSKEY 256 3 8 AwEAAcbnjesseojqOqAWrNxHDr7aw4jwJkQGfFtWdtr0KQEQApS112QmhbWIZ1yHS8IWbAd4jVGRFQqJ4KZoFW6HdgKfXcfrBQ5QXVfi0gyyZjzwAteOGxAH8NtuqbOwkhT3efDtntJcY+wQIwL5QQKKX/Aw2CvxhmUQxHCNhvsD2HPH
ch. 824 IN RRSIG DNSKEY 8 1 86400 20140303100909 20140116090909 24859 ch. F/gnqCvTxFwFFkUX/YEP4ifda8rSrU1DWEJKrj3lnobrd7LJQJRYwanOXbF0YRbNJWPsDXvw2v8/m9NggNy9EL7/iwR9TB2eNwwDAoZsrDitvmVFWm4ewueWNlXy63P96CyzeiTx37uxh59+PpC/w6+Z8Eb/ce6K714NW5PGg3ZM1ABNVt3VSv1WpbnOHdUKp0WHQtvUxSUh1EBN9OZAi9OsO/e44VmAEICA2qqVYcUR3hdiVBTCn0M+g+afXhTmavsUVSzeEdVtHpRLV7q1rIM2woWFmnhG27VGE+Fx5D7wwj9aC09vr4xADdmlTa05taoX0OKKqO5X1j/kT38SAg==
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 893 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 47971
;; flags: qr rd ra cd ; qd: 1 an: 3 au: 0 ad: 1
;; QUESTIONS:
;; ingotronic.ch., type = DS, class = IN
;; ANSWERS:
ingotronic.ch. 2355 IN DS 6031 5 2 4A948F2FDADA24686E473EDAC00DCF972584C75E3FAA92C2021B6221449FF87E
ingotronic.ch. 2355 IN DS 6031 5 1 733D0218B571CD617B1A7493564B9FC4F12ADE82
ingotronic.ch. 2355 IN RRSIG DS 8 2 3600 20140227194545 20140128190342 47694 ch. fI4xUfXJ/4RwPi0CQUX12gHlmSAh6NLE9AXNRFXv0JX2Jhprq1rwLnbCxZsdU0N27dHSIFeeOSb3b02EdaBKKtBAPegXOIYX67siXHhRnykXjqX0tuHDPWYPeegh7UttVLWi0ZHeBJ6YagYW+9Cu3EyoAhVt5V72rgKzB6cKWK0=
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 288 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 48551
;; flags: qr aa rd ra cd ; qd: 1 an: 4 au: 0 ad: 1
;; QUESTIONS:
;; ingotronic.ch., type = DNSKEY, class = IN
;; ANSWERS:
ingotronic.ch. 300 IN DNSKEY 256 3 5 AwEAAZ2Xh77GFzpEDx7EHYxShqltHgkiG+BOjBGifEmnJhQSdE5/yNSLFNcdhZZ8HUPxYnaedTqJcFFg4AzUsQklF/fECegTJdZjaj2WoL0/I8K7HMfY/hVuRZUWPNglYi8agJRX6gdkFTCpUNI7stpgKqxtzUJhhw15uG/lKMplwqUr
ingotronic.ch. 300 IN DNSKEY 257 3 5 AwEAAeA1vzmjaB+eBAcvhzpKEgAEFpvQ1rg4uKDW6MsQtacKoqBpgyep2+LuWotz5p/xYxj3NGsArwN8Ad5cY0FHRr8miTT0elOv6nvlqGIfRuhj/BXAQ1x4ihpSFslHw0lJMYFwxsUZWpUyjWX/nv1xRZMMwF46gui0N4OEbyTYusCk77D+A71k+K0EAitFIbIH4GCUKmH1H7HmXhSVH9bN/n7KEGwW32lmsuuUcJoRKDkcUvbMXY/9Xoa2quERrUg/rBbDUHowRPjYDS5GzY1+f4YY8s40BufGiqyUTKKXL953MVFK8gmezXA0hbmrnZ7CBOw/7238mORAdzExaX8n7CE=
ingotronic.ch. 300 IN RRSIG DNSKEY 5 2 300 20140218124422 20140119114422 6031 ingotronic.ch. ToVAQwGYFHE7lkZGc3b42RmbJxQgkCq0U/GBj/thBklPY+6ljKhNSKBSXbM6rFpMHGoWC2WAXlDLTLRZJT1mBziFDd2YXyxRItr+oj+FK2zGEYM5+JEUG/TW1XS7LH5y8Uj8RaJuXi76OUYtBG+r0KFidH+ix3dlxg/O43epn8nf3wMwnrJL7EddjuMGSujFjoIM+Fy0CKvu+R5RFyIQn2V7E2Y/ZoSzEn7Ey27IYRc1EiskzUz94opbIQHx0/YkngZpDOSs9P2d8FX7rJVBjy7pxvS6IA8EPytJMEwAEw4agaq9nCEc7M0rdN0knv81qTLZWF/p47m2X13yTGrhOw==
ingotronic.ch. 300 IN RRSIG DNSKEY 5 2 300 20140218124422 20140119114422 17430 ingotronic.ch. dW820FCc9H0HzcOEihkrGq7W5Cm8y0FXg4xcMWaobHzsX3jI5ResccGi9UnNclE6pXAnu4E7w7d8tOEdih+Eb8rt67eaXOIBReWynMaHkVpAbRASiil755vnCE3SsXathrunUVpRB3QkIVqRhTLGzM+LANC3H8jVXhGVRVy8Dog=
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 940 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 25297
;; flags: qr aa rd ra cd ; qd: 1 an: 3 au: 0 ad: 1
;; QUESTIONS:
;; nsec3.ingotronic.ch., type = DS, class = IN
;; ANSWERS:
nsec3.ingotronic.ch. 300 IN DS 16758 7 1 1720FF268E09A2CB63805EC8782D10AAD20E12A5
nsec3.ingotronic.ch. 300 IN DS 16758 7 2 3C8DC02750A1636F829B45D6E6D642866768A9CD40A013AD9D25AB63734FFA13
nsec3.ingotronic.ch. 300 IN RRSIG DS 5 3 300 20140218125024 20140119120700 17430 ingotronic.ch. JE66mSXrbaDE2usJScL/GXUxTXRn+GeO+Fi/iJyajr09aVnqTqd7UEN9eq454rLozFAv4dV3vKQywOI7BDMkM+OfVYQKy/Kro7CcvNpcuo+Tg8kX8ttl1a6C9kjy75wHh09X62TmKhA1a5bksHMs/P3SCTG87cXllmTpot3KlUE=
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 305 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 57018
;; flags: qr aa rd ra cd ; qd: 1 an: 4 au: 0 ad: 1
;; QUESTIONS:
;; nsec3.ingotronic.ch., type = DNSKEY, class = IN
;; ANSWERS:
nsec3.ingotronic.ch. 300 IN DNSKEY 256 3 7 AwEAAccAWxkTVGZ6UAp0VEozAlYpARhbh6Y6tYOl6Fg3UeBNFFtDQ9fTEEt1NkbnR9u8KkpVN6a67avlYiUN1egDqEwzDU7R1Rw+/USdhm2hqOARmmu3DBgjjX/iXjZLyv310cOGFJZ/smcodlDL4pDAAoPxh/qs6KEBaT0sc1KWcGq3
nsec3.ingotronic.ch. 300 IN DNSKEY 257 3 7 AwEAAaBuJTf9oGyeTH3biUkAFLrsYrkodX1H7Snsui4XsDHFCBvs5XYacHbs0Jg0/O51KPjmNnjwMW8SSyDkKqYQ+9uYAf2EQ/pnD/VGQqnV2cw0Vwk/t0E2V4FUCju4pnAoyzZFZXGs1eWbX9JXu++b0Azp+ACq6485qJLzHhWDiIrPoK/SvdbFVRK4s+nPPJLH3NGBbtdz6kPq7aFWYBMoGeAZdN1wsQpcNWUo5eOmaJY53nMc7+rDpAyYlMe/FKwSZdX2ZDd63Qsa6Im4FVUJq/nWLq7tlQ/mWks15uDTQyJy/OWfA0ICCO4N9Fel9rThJNpJWEzOCblvZyBoy405kZk=
nsec3.ingotronic.ch. 300 IN RRSIG DNSKEY 7 3 300 20140215023510 20140116021800 16758 nsec3.ingotronic.ch. RT1Lj82phLAEt5Ck6F/vg6VYvgT7Loy7sixOoZC13YCU7tJqe9lZEWWQuDATlvUdMeyApDXjDj0Czy2cDlCxPrtpZANm+/GWGn67+t8MUC2r8rgbVvFWjHFmMrb9nMLsdOajF5m7A9cnPIpFfng7uUqlpBZ7UvvBGtBOy6sRxErdxzr2KY+2B2dLyfGw7z9e04J9F75AC+jdL1Z+R0CSkaYJoroun53OULF8xhNOB9D4pbKx/fcVxVuNx2L8KcpDn2EsHGSkM4eIUo7l3kYx3f4OV0HFIL0pwByqDvc+66HCEcS5OBlEM+Z5EDKS1DGY3DE85RFZpu4sIShqffRB4A==
nsec3.ingotronic.ch. 300 IN RRSIG DNSKEY 7 3 300 20140215023510 20140116021800 62417 nsec3.ingotronic.ch. iGelQHd9Eqam20YcJGFoOLn6DTQgkCts5nJrRLRYuDndGNUOcpTt0EcPImOGiDYEk+0TiXXF3jfbKYaZtncsKvwE50m41E4osqdIA/rpJU9GFWwGgQ2EX5uizunyxEM/YzTgjr9+heIW9+MtgPV1NZRp8HPN3Tq96j3VI3lCQxs=
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 958 bytes
###############################################
testNodataApexNsec3WithSOAValid 0000664 0000000 0000000 00000023560 13020541473 0035576 0 ustar 00root root 0000000 0000000 dnssecjava-1.1.3/src/test/resources/recordings/org_jitsi_dnssec_TestNSEC3NoData #Date: 2014-01-28T22:39:20+01:00
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 48189
;; flags: qr aa rd ra ; qd: 1 an: 0 au: 8 ad: 1
;; QUESTIONS:
;; sub.nsec3.ingotronic.ch., type = A, class = IN
;; ANSWERS:
;; AUTHORITY RECORDS:
nsec3.ingotronic.ch. 300 IN SOA ns1.ingotronic.ch. admin.ingotronic.ch. 2013032736 300 60 864000 300
nsec3.ingotronic.ch. 300 IN RRSIG SOA 7 3 300 20140215042629 20140116032629 62417 nsec3.ingotronic.ch. DaTlmlI5j/Y1XJZtij2jplUmwYCcfcUr7O0fzFwUoP7y/3gjaqeT8YyhD1JJP2Agf1ZwEh2q12lD3ZiYp9RvOmkreWQiDv8zUbykBwNpY9w2ur6qgEZWtLQgB+BqdYUeAVV+EOOq+RfVSZzee+z9E+Pf/sEV4kXTbRTwGS+4XmM=
;hash(sub.nsec3.ingotronic.ch.), taken from parent zone and added a SOA, which makes this repsonse actually valid again
5RFQOLI81S6LKQTUG5HLI19UVJNKUL3H.nsec3.ingotronic.ch. 300 IN NSEC3 1 0 10 1234 74SO0776K6C87EPASDU8QK8SROIK00KK NS DS SOA RRSIG
5RFQOLI81S6LKQTUG5HLI19UVJNKUL3H.nsec3.ingotronic.ch. 300 IN RRSIG NSEC3 7 4 300 20140215042629 20140116032629 62417 nsec3.ingotronic.ch. hDh7ATOdwszkVQCMmbGXPdQu5j24W1SLVRU5ZcwsqPPkRYmgUUsCqchpaHNV216S1Q0PYkdDWiuoCv26fkNVIRIydNlGC+kw567qlq520En2dFdVlTf4FFjADglWbCDjHBYagSx6e/y1ekDsvtPLDxi80M9wFruAhNLXlFd1KsE=
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 1051 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 60551
;; flags: qr rd ra ad cd ; qd: 1 an: 3 au: 0 ad: 1
;; QUESTIONS:
;; ., type = DNSKEY, class = IN
;; ANSWERS:
. 61065 IN DNSKEY 256 3 8 AwEAAb8sU6pbYMWRbkRnEuEZw9NSir707TkOcF+UL1XiK4NDJOvXRyX195Am5dQ7bRnnuySZ3daf37vvjUUhuIWUAQ4stht8nJfYxVQXDYjSpGH5I6Hf/0CZEoNP6cNvrQ7AFmKkmv00xWExKQjbvnRPI4bqpMwtHVzn6WybBZ6kuqED
. 61065 IN DNSKEY 257 3 8 AwEAAagAIKlVZrpC6Ia7gEzahOR+9W29euxhJhVVLOyQbSEW0O8gcCjFFVQUTf6v58fLjwBd0YI0EzrAcQqBGCzh/RStIoO8g0NfnfL2MTJRkxoXbfDaUeVPQuYEhg37NZWAJQ9VnMVDxP/VHL496M/QZxkjf5/Efucp2gaDX6RS6CXpoY68LsvPVjR0ZSwzz1apAzvN9dlzEheX7ICJBBtuA6G3LQpzW5hOA2hzCTMjJPJ8LbqF6dsV6DoBQzgul0sGIcGOYl7OyQdXfZ57relSQageu+ipAdTTJ25AsRTAoub8ONGcLmqrAmRLKBP1dfwhYB4N7knNnulqQxA+Uk1ihz0=
. 61065 IN RRSIG DNSKEY 8 0 172800 20140204235959 20140121000000 19036 . naUK900bmMkwXGEUg2wDRHVLN5vPQCU5l9LE3ZwiShbOze9KpWtFCluZ8v2G6Xlm35vNK+sq4B/UV/PVS9f4FhLgfQKJSThpAT8CqMOdvLgu+sTQ4bp+ve1h9sK3T20xjs3khQ16D4mDNUK+sdGEHpBJu7RlBGlprD9Xa8yE8CSkR/WFDm91wIU7AoTdqCz9Lkb1TFavj8SrSjQXYt/H+xwy8VzKxfxL/f9Lm70bfLmW8ZVRKjT12cbs+7TxG4IwP/W0TiTq7oa2fDESKJq3mAHOTifHl3cTG5DO7nldesDPcxWD4UZxYMz1teSlKSNgQGdcUVHIeMkhh1pBnfnCBA==
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 736 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 10015
;; flags: qr rd ra ad cd ; qd: 1 an: 2 au: 0 ad: 1
;; QUESTIONS:
;; ch., type = DS, class = IN
;; ANSWERS:
ch. 824 IN DS 24859 8 2 9AFD21261EAF98AFD7E24E89BE6B25767F93EB401C6C3DF21342F40EE82DCCF0
ch. 824 IN RRSIG DS 8 1 86400 20140203000000 20140126230000 33655 . vdEmh6O0rGMUcX5EDZtUAT/D7jadckSXdN9YILrNJZj32Xl7BwJOzvvI2nXngmG/o6KdxMqh+Cldp0alYKUvWXX3A16xIp89aLkxlyBWM84t1Bt8V0XPHFZJDCznfVvYhFYG0tnUpABg6F3rGiDwk2woCmFPTeZMjPgWk4p2IDI=
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 238 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 46537
;; flags: qr rd ra ad cd ; qd: 1 an: 4 au: 0 ad: 1
;; QUESTIONS:
;; ch., type = DNSKEY, class = IN
;; ANSWERS:
ch. 824 IN DNSKEY 257 3 8 AwEAAb5bW5/VfwMAh4475ab4xxrFwc7RIbAoKOABByzbIDMODUlQz1MQLlrI/z4SYANynrDCevw2f1f2ROUzriZpqwqiTN2w3K3GJrk7yZ+1e8OhI2uaGsxKVnTyxKiyzPlC9OLilEsZ4oLGoUIksfJgdDY9+Nj1971H1XS1eDNViJ6kSxgnbxH5tnHl5s75Wfzq8GxSyMu5KxoYbCGT/mvU5ZyZccULQUe/f11FE5JazLf9TgtyDSyWdCFRWl6mdIAR7lVCY82jtN0+Mhzp1PYF/YK3IReKs9P0vijM8qYDXem0NNSzse9lk7SiJWc02vVo/QmfxqTVkNrv2Fcg7fUoiCk=
ch. 824 IN DNSKEY 256 3 8 AwEAAfRZWbfzfBEayMyl/GmDY+e9zmYPNLVlfss3/eUxwnsfh704epy8rVQ6pJuVU0ihFWHTp583ZvWy73ZrVrtXwXbpa3z4+84vhxXDshHG6W67/XEThG0zQY/zFwopIQC+/LLhn7NAR5SZghdqS7+d4EoW52BZtGW/hZIyGuiWZynZ
ch. 824 IN DNSKEY 256 3 8 AwEAAcbnjesseojqOqAWrNxHDr7aw4jwJkQGfFtWdtr0KQEQApS112QmhbWIZ1yHS8IWbAd4jVGRFQqJ4KZoFW6HdgKfXcfrBQ5QXVfi0gyyZjzwAteOGxAH8NtuqbOwkhT3efDtntJcY+wQIwL5QQKKX/Aw2CvxhmUQxHCNhvsD2HPH
ch. 824 IN RRSIG DNSKEY 8 1 86400 20140303100909 20140116090909 24859 ch. F/gnqCvTxFwFFkUX/YEP4ifda8rSrU1DWEJKrj3lnobrd7LJQJRYwanOXbF0YRbNJWPsDXvw2v8/m9NggNy9EL7/iwR9TB2eNwwDAoZsrDitvmVFWm4ewueWNlXy63P96CyzeiTx37uxh59+PpC/w6+Z8Eb/ce6K714NW5PGg3ZM1ABNVt3VSv1WpbnOHdUKp0WHQtvUxSUh1EBN9OZAi9OsO/e44VmAEICA2qqVYcUR3hdiVBTCn0M+g+afXhTmavsUVSzeEdVtHpRLV7q1rIM2woWFmnhG27VGE+Fx5D7wwj9aC09vr4xADdmlTa05taoX0OKKqO5X1j/kT38SAg==
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 893 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 47971
;; flags: qr rd ra cd ; qd: 1 an: 3 au: 0 ad: 1
;; QUESTIONS:
;; ingotronic.ch., type = DS, class = IN
;; ANSWERS:
ingotronic.ch. 2355 IN DS 6031 5 2 4A948F2FDADA24686E473EDAC00DCF972584C75E3FAA92C2021B6221449FF87E
ingotronic.ch. 2355 IN DS 6031 5 1 733D0218B571CD617B1A7493564B9FC4F12ADE82
ingotronic.ch. 2355 IN RRSIG DS 8 2 3600 20140227194545 20140128190342 47694 ch. fI4xUfXJ/4RwPi0CQUX12gHlmSAh6NLE9AXNRFXv0JX2Jhprq1rwLnbCxZsdU0N27dHSIFeeOSb3b02EdaBKKtBAPegXOIYX67siXHhRnykXjqX0tuHDPWYPeegh7UttVLWi0ZHeBJ6YagYW+9Cu3EyoAhVt5V72rgKzB6cKWK0=
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 288 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 48551
;; flags: qr aa rd ra cd ; qd: 1 an: 4 au: 0 ad: 1
;; QUESTIONS:
;; ingotronic.ch., type = DNSKEY, class = IN
;; ANSWERS:
ingotronic.ch. 300 IN DNSKEY 256 3 5 AwEAAZ2Xh77GFzpEDx7EHYxShqltHgkiG+BOjBGifEmnJhQSdE5/yNSLFNcdhZZ8HUPxYnaedTqJcFFg4AzUsQklF/fECegTJdZjaj2WoL0/I8K7HMfY/hVuRZUWPNglYi8agJRX6gdkFTCpUNI7stpgKqxtzUJhhw15uG/lKMplwqUr
ingotronic.ch. 300 IN DNSKEY 257 3 5 AwEAAeA1vzmjaB+eBAcvhzpKEgAEFpvQ1rg4uKDW6MsQtacKoqBpgyep2+LuWotz5p/xYxj3NGsArwN8Ad5cY0FHRr8miTT0elOv6nvlqGIfRuhj/BXAQ1x4ihpSFslHw0lJMYFwxsUZWpUyjWX/nv1xRZMMwF46gui0N4OEbyTYusCk77D+A71k+K0EAitFIbIH4GCUKmH1H7HmXhSVH9bN/n7KEGwW32lmsuuUcJoRKDkcUvbMXY/9Xoa2quERrUg/rBbDUHowRPjYDS5GzY1+f4YY8s40BufGiqyUTKKXL953MVFK8gmezXA0hbmrnZ7CBOw/7238mORAdzExaX8n7CE=
ingotronic.ch. 300 IN RRSIG DNSKEY 5 2 300 20140218124422 20140119114422 6031 ingotronic.ch. ToVAQwGYFHE7lkZGc3b42RmbJxQgkCq0U/GBj/thBklPY+6ljKhNSKBSXbM6rFpMHGoWC2WAXlDLTLRZJT1mBziFDd2YXyxRItr+oj+FK2zGEYM5+JEUG/TW1XS7LH5y8Uj8RaJuXi76OUYtBG+r0KFidH+ix3dlxg/O43epn8nf3wMwnrJL7EddjuMGSujFjoIM+Fy0CKvu+R5RFyIQn2V7E2Y/ZoSzEn7Ey27IYRc1EiskzUz94opbIQHx0/YkngZpDOSs9P2d8FX7rJVBjy7pxvS6IA8EPytJMEwAEw4agaq9nCEc7M0rdN0knv81qTLZWF/p47m2X13yTGrhOw==
ingotronic.ch. 300 IN RRSIG DNSKEY 5 2 300 20140218124422 20140119114422 17430 ingotronic.ch. dW820FCc9H0HzcOEihkrGq7W5Cm8y0FXg4xcMWaobHzsX3jI5ResccGi9UnNclE6pXAnu4E7w7d8tOEdih+Eb8rt67eaXOIBReWynMaHkVpAbRASiil755vnCE3SsXathrunUVpRB3QkIVqRhTLGzM+LANC3H8jVXhGVRVy8Dog=
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 940 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 25297
;; flags: qr aa rd ra cd ; qd: 1 an: 3 au: 0 ad: 1
;; QUESTIONS:
;; nsec3.ingotronic.ch., type = DS, class = IN
;; ANSWERS:
nsec3.ingotronic.ch. 300 IN DS 16758 7 1 1720FF268E09A2CB63805EC8782D10AAD20E12A5
nsec3.ingotronic.ch. 300 IN DS 16758 7 2 3C8DC02750A1636F829B45D6E6D642866768A9CD40A013AD9D25AB63734FFA13
nsec3.ingotronic.ch. 300 IN RRSIG DS 5 3 300 20140218125024 20140119120700 17430 ingotronic.ch. JE66mSXrbaDE2usJScL/GXUxTXRn+GeO+Fi/iJyajr09aVnqTqd7UEN9eq454rLozFAv4dV3vKQywOI7BDMkM+OfVYQKy/Kro7CcvNpcuo+Tg8kX8ttl1a6C9kjy75wHh09X62TmKhA1a5bksHMs/P3SCTG87cXllmTpot3KlUE=
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 305 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 57018
;; flags: qr aa rd ra cd ; qd: 1 an: 4 au: 0 ad: 1
;; QUESTIONS:
;; nsec3.ingotronic.ch., type = DNSKEY, class = IN
;; ANSWERS:
nsec3.ingotronic.ch. 300 IN DNSKEY 256 3 7 AwEAAccAWxkTVGZ6UAp0VEozAlYpARhbh6Y6tYOl6Fg3UeBNFFtDQ9fTEEt1NkbnR9u8KkpVN6a67avlYiUN1egDqEwzDU7R1Rw+/USdhm2hqOARmmu3DBgjjX/iXjZLyv310cOGFJZ/smcodlDL4pDAAoPxh/qs6KEBaT0sc1KWcGq3
nsec3.ingotronic.ch. 300 IN DNSKEY 257 3 7 AwEAAaBuJTf9oGyeTH3biUkAFLrsYrkodX1H7Snsui4XsDHFCBvs5XYacHbs0Jg0/O51KPjmNnjwMW8SSyDkKqYQ+9uYAf2EQ/pnD/VGQqnV2cw0Vwk/t0E2V4FUCju4pnAoyzZFZXGs1eWbX9JXu++b0Azp+ACq6485qJLzHhWDiIrPoK/SvdbFVRK4s+nPPJLH3NGBbtdz6kPq7aFWYBMoGeAZdN1wsQpcNWUo5eOmaJY53nMc7+rDpAyYlMe/FKwSZdX2ZDd63Qsa6Im4FVUJq/nWLq7tlQ/mWks15uDTQyJy/OWfA0ICCO4N9Fel9rThJNpJWEzOCblvZyBoy405kZk=
nsec3.ingotronic.ch. 300 IN RRSIG DNSKEY 7 3 300 20140215023510 20140116021800 16758 nsec3.ingotronic.ch. RT1Lj82phLAEt5Ck6F/vg6VYvgT7Loy7sixOoZC13YCU7tJqe9lZEWWQuDATlvUdMeyApDXjDj0Czy2cDlCxPrtpZANm+/GWGn67+t8MUC2r8rgbVvFWjHFmMrb9nMLsdOajF5m7A9cnPIpFfng7uUqlpBZ7UvvBGtBOy6sRxErdxzr2KY+2B2dLyfGw7z9e04J9F75AC+jdL1Z+R0CSkaYJoroun53OULF8xhNOB9D4pbKx/fcVxVuNx2L8KcpDn2EsHGSkM4eIUo7l3kYx3f4OV0HFIL0pwByqDvc+66HCEcS5OBlEM+Z5EDKS1DGY3DE85RFZpu4sIShqffRB4A==
nsec3.ingotronic.ch. 300 IN RRSIG DNSKEY 7 3 300 20140215023510 20140116021800 62417 nsec3.ingotronic.ch. iGelQHd9Eqam20YcJGFoOLn6DTQgkCts5nJrRLRYuDndGNUOcpTt0EcPImOGiDYEk+0TiXXF3jfbKYaZtncsKvwE50m41E4osqdIA/rpJU9GFWwGgQ2EX5uizunyxEM/YzTgjr9+heIW9+MtgPV1NZRp8HPN3Tq96j3VI3lCQxs=
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 958 bytes
###############################################
testNodataButHasCname 0000664 0000000 0000000 00000023774 13020541473 0033767 0 ustar 00root root 0000000 0000000 dnssecjava-1.1.3/src/test/resources/recordings/org_jitsi_dnssec_TestNSEC3NoData #Date: 2014-01-28T22:39:20+01:00
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 38248
;; flags: qr aa rd ra cd ; qd: 1 an: 0 au: 4 ad: 1
;; QUESTIONS:
;; www.nsec3.ingotronic.ch., type = MX, class = IN
;; ANSWERS:
;; AUTHORITY RECORDS:
nsec3.ingotronic.ch. 300 IN SOA ns1.ingotronic.ch. admin.ingotronic.ch. 2013032736 300 60 864000 300
nsec3.ingotronic.ch. 300 IN RRSIG SOA 7 3 300 20140215042629 20140116032629 62417 nsec3.ingotronic.ch. DaTlmlI5j/Y1XJZtij2jplUmwYCcfcUr7O0fzFwUoP7y/3gjaqeT8YyhD1JJP2Agf1ZwEh2q12lD3ZiYp9RvOmkreWQiDv8zUbykBwNpY9w2ur6qgEZWtLQgB+BqdYUeAVV+EOOq+RfVSZzee+z9E+Pf/sEV4kXTbRTwGS+4XmM=
7L2K0NAC88UN3IJV0404HF7PM543BN3F.nsec3.ingotronic.ch. 300 IN NSEC3 1 0 10 1234 810L2KR9HCVTELBLO8GQM0EMIM8KD01E CNAME RRSIG
; ^^^^^
; Replaced from "A AAAA" and manually resigned
7L2K0NAC88UN3IJV0404HF7PM543BN3F.nsec3.ingotronic.ch. 300 IN RRSIG NSEC3 7 4 300 20140215011722 20140116005424 62417 nsec3.ingotronic.ch. fjkZKkZ/QS3fr27G/YL502r/m5yvAj1H5DozJMFJ1uFbyUO/gTP6L1GF3pijt4BjcqbMz7h3uMUikcDEW+ieAy7G4k0y5uU0quHPJvP7pbslCvEs516UIiAvzKsbK7LTn1Dv4Wau0UkImiWXZwx666M6SNh/etebNngPr0ZwGe4=
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 537 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 60551
;; flags: qr rd ra ad cd ; qd: 1 an: 3 au: 0 ad: 1
;; QUESTIONS:
;; ., type = DNSKEY, class = IN
;; ANSWERS:
. 61065 IN DNSKEY 256 3 8 AwEAAb8sU6pbYMWRbkRnEuEZw9NSir707TkOcF+UL1XiK4NDJOvXRyX195Am5dQ7bRnnuySZ3daf37vvjUUhuIWUAQ4stht8nJfYxVQXDYjSpGH5I6Hf/0CZEoNP6cNvrQ7AFmKkmv00xWExKQjbvnRPI4bqpMwtHVzn6WybBZ6kuqED
. 61065 IN DNSKEY 257 3 8 AwEAAagAIKlVZrpC6Ia7gEzahOR+9W29euxhJhVVLOyQbSEW0O8gcCjFFVQUTf6v58fLjwBd0YI0EzrAcQqBGCzh/RStIoO8g0NfnfL2MTJRkxoXbfDaUeVPQuYEhg37NZWAJQ9VnMVDxP/VHL496M/QZxkjf5/Efucp2gaDX6RS6CXpoY68LsvPVjR0ZSwzz1apAzvN9dlzEheX7ICJBBtuA6G3LQpzW5hOA2hzCTMjJPJ8LbqF6dsV6DoBQzgul0sGIcGOYl7OyQdXfZ57relSQageu+ipAdTTJ25AsRTAoub8ONGcLmqrAmRLKBP1dfwhYB4N7knNnulqQxA+Uk1ihz0=
. 61065 IN RRSIG DNSKEY 8 0 172800 20140204235959 20140121000000 19036 . naUK900bmMkwXGEUg2wDRHVLN5vPQCU5l9LE3ZwiShbOze9KpWtFCluZ8v2G6Xlm35vNK+sq4B/UV/PVS9f4FhLgfQKJSThpAT8CqMOdvLgu+sTQ4bp+ve1h9sK3T20xjs3khQ16D4mDNUK+sdGEHpBJu7RlBGlprD9Xa8yE8CSkR/WFDm91wIU7AoTdqCz9Lkb1TFavj8SrSjQXYt/H+xwy8VzKxfxL/f9Lm70bfLmW8ZVRKjT12cbs+7TxG4IwP/W0TiTq7oa2fDESKJq3mAHOTifHl3cTG5DO7nldesDPcxWD4UZxYMz1teSlKSNgQGdcUVHIeMkhh1pBnfnCBA==
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 736 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 10015
;; flags: qr rd ra ad cd ; qd: 1 an: 2 au: 0 ad: 1
;; QUESTIONS:
;; ch., type = DS, class = IN
;; ANSWERS:
ch. 824 IN DS 24859 8 2 9AFD21261EAF98AFD7E24E89BE6B25767F93EB401C6C3DF21342F40EE82DCCF0
ch. 824 IN RRSIG DS 8 1 86400 20140203000000 20140126230000 33655 . vdEmh6O0rGMUcX5EDZtUAT/D7jadckSXdN9YILrNJZj32Xl7BwJOzvvI2nXngmG/o6KdxMqh+Cldp0alYKUvWXX3A16xIp89aLkxlyBWM84t1Bt8V0XPHFZJDCznfVvYhFYG0tnUpABg6F3rGiDwk2woCmFPTeZMjPgWk4p2IDI=
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 238 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 46537
;; flags: qr rd ra ad cd ; qd: 1 an: 4 au: 0 ad: 1
;; QUESTIONS:
;; ch., type = DNSKEY, class = IN
;; ANSWERS:
ch. 824 IN DNSKEY 257 3 8 AwEAAb5bW5/VfwMAh4475ab4xxrFwc7RIbAoKOABByzbIDMODUlQz1MQLlrI/z4SYANynrDCevw2f1f2ROUzriZpqwqiTN2w3K3GJrk7yZ+1e8OhI2uaGsxKVnTyxKiyzPlC9OLilEsZ4oLGoUIksfJgdDY9+Nj1971H1XS1eDNViJ6kSxgnbxH5tnHl5s75Wfzq8GxSyMu5KxoYbCGT/mvU5ZyZccULQUe/f11FE5JazLf9TgtyDSyWdCFRWl6mdIAR7lVCY82jtN0+Mhzp1PYF/YK3IReKs9P0vijM8qYDXem0NNSzse9lk7SiJWc02vVo/QmfxqTVkNrv2Fcg7fUoiCk=
ch. 824 IN DNSKEY 256 3 8 AwEAAfRZWbfzfBEayMyl/GmDY+e9zmYPNLVlfss3/eUxwnsfh704epy8rVQ6pJuVU0ihFWHTp583ZvWy73ZrVrtXwXbpa3z4+84vhxXDshHG6W67/XEThG0zQY/zFwopIQC+/LLhn7NAR5SZghdqS7+d4EoW52BZtGW/hZIyGuiWZynZ
ch. 824 IN DNSKEY 256 3 8 AwEAAcbnjesseojqOqAWrNxHDr7aw4jwJkQGfFtWdtr0KQEQApS112QmhbWIZ1yHS8IWbAd4jVGRFQqJ4KZoFW6HdgKfXcfrBQ5QXVfi0gyyZjzwAteOGxAH8NtuqbOwkhT3efDtntJcY+wQIwL5QQKKX/Aw2CvxhmUQxHCNhvsD2HPH
ch. 824 IN RRSIG DNSKEY 8 1 86400 20140303100909 20140116090909 24859 ch. F/gnqCvTxFwFFkUX/YEP4ifda8rSrU1DWEJKrj3lnobrd7LJQJRYwanOXbF0YRbNJWPsDXvw2v8/m9NggNy9EL7/iwR9TB2eNwwDAoZsrDitvmVFWm4ewueWNlXy63P96CyzeiTx37uxh59+PpC/w6+Z8Eb/ce6K714NW5PGg3ZM1ABNVt3VSv1WpbnOHdUKp0WHQtvUxSUh1EBN9OZAi9OsO/e44VmAEICA2qqVYcUR3hdiVBTCn0M+g+afXhTmavsUVSzeEdVtHpRLV7q1rIM2woWFmnhG27VGE+Fx5D7wwj9aC09vr4xADdmlTa05taoX0OKKqO5X1j/kT38SAg==
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 893 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 47971
;; flags: qr rd ra cd ; qd: 1 an: 3 au: 0 ad: 1
;; QUESTIONS:
;; ingotronic.ch., type = DS, class = IN
;; ANSWERS:
ingotronic.ch. 2355 IN DS 6031 5 2 4A948F2FDADA24686E473EDAC00DCF972584C75E3FAA92C2021B6221449FF87E
ingotronic.ch. 2355 IN DS 6031 5 1 733D0218B571CD617B1A7493564B9FC4F12ADE82
ingotronic.ch. 2355 IN RRSIG DS 8 2 3600 20140227194545 20140128190342 47694 ch. fI4xUfXJ/4RwPi0CQUX12gHlmSAh6NLE9AXNRFXv0JX2Jhprq1rwLnbCxZsdU0N27dHSIFeeOSb3b02EdaBKKtBAPegXOIYX67siXHhRnykXjqX0tuHDPWYPeegh7UttVLWi0ZHeBJ6YagYW+9Cu3EyoAhVt5V72rgKzB6cKWK0=
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 288 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 48551
;; flags: qr aa rd ra cd ; qd: 1 an: 4 au: 0 ad: 1
;; QUESTIONS:
;; ingotronic.ch., type = DNSKEY, class = IN
;; ANSWERS:
ingotronic.ch. 300 IN DNSKEY 256 3 5 AwEAAZ2Xh77GFzpEDx7EHYxShqltHgkiG+BOjBGifEmnJhQSdE5/yNSLFNcdhZZ8HUPxYnaedTqJcFFg4AzUsQklF/fECegTJdZjaj2WoL0/I8K7HMfY/hVuRZUWPNglYi8agJRX6gdkFTCpUNI7stpgKqxtzUJhhw15uG/lKMplwqUr
ingotronic.ch. 300 IN DNSKEY 257 3 5 AwEAAeA1vzmjaB+eBAcvhzpKEgAEFpvQ1rg4uKDW6MsQtacKoqBpgyep2+LuWotz5p/xYxj3NGsArwN8Ad5cY0FHRr8miTT0elOv6nvlqGIfRuhj/BXAQ1x4ihpSFslHw0lJMYFwxsUZWpUyjWX/nv1xRZMMwF46gui0N4OEbyTYusCk77D+A71k+K0EAitFIbIH4GCUKmH1H7HmXhSVH9bN/n7KEGwW32lmsuuUcJoRKDkcUvbMXY/9Xoa2quERrUg/rBbDUHowRPjYDS5GzY1+f4YY8s40BufGiqyUTKKXL953MVFK8gmezXA0hbmrnZ7CBOw/7238mORAdzExaX8n7CE=
ingotronic.ch. 300 IN RRSIG DNSKEY 5 2 300 20140218124422 20140119114422 6031 ingotronic.ch. ToVAQwGYFHE7lkZGc3b42RmbJxQgkCq0U/GBj/thBklPY+6ljKhNSKBSXbM6rFpMHGoWC2WAXlDLTLRZJT1mBziFDd2YXyxRItr+oj+FK2zGEYM5+JEUG/TW1XS7LH5y8Uj8RaJuXi76OUYtBG+r0KFidH+ix3dlxg/O43epn8nf3wMwnrJL7EddjuMGSujFjoIM+Fy0CKvu+R5RFyIQn2V7E2Y/ZoSzEn7Ey27IYRc1EiskzUz94opbIQHx0/YkngZpDOSs9P2d8FX7rJVBjy7pxvS6IA8EPytJMEwAEw4agaq9nCEc7M0rdN0knv81qTLZWF/p47m2X13yTGrhOw==
ingotronic.ch. 300 IN RRSIG DNSKEY 5 2 300 20140218124422 20140119114422 17430 ingotronic.ch. dW820FCc9H0HzcOEihkrGq7W5Cm8y0FXg4xcMWaobHzsX3jI5ResccGi9UnNclE6pXAnu4E7w7d8tOEdih+Eb8rt67eaXOIBReWynMaHkVpAbRASiil755vnCE3SsXathrunUVpRB3QkIVqRhTLGzM+LANC3H8jVXhGVRVy8Dog=
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 940 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 25297
;; flags: qr aa rd ra cd ; qd: 1 an: 3 au: 0 ad: 1
;; QUESTIONS:
;; nsec3.ingotronic.ch., type = DS, class = IN
;; ANSWERS:
nsec3.ingotronic.ch. 300 IN DS 16758 7 1 1720FF268E09A2CB63805EC8782D10AAD20E12A5
nsec3.ingotronic.ch. 300 IN DS 16758 7 2 3C8DC02750A1636F829B45D6E6D642866768A9CD40A013AD9D25AB63734FFA13
nsec3.ingotronic.ch. 300 IN RRSIG DS 5 3 300 20140218125024 20140119120700 17430 ingotronic.ch. JE66mSXrbaDE2usJScL/GXUxTXRn+GeO+Fi/iJyajr09aVnqTqd7UEN9eq454rLozFAv4dV3vKQywOI7BDMkM+OfVYQKy/Kro7CcvNpcuo+Tg8kX8ttl1a6C9kjy75wHh09X62TmKhA1a5bksHMs/P3SCTG87cXllmTpot3KlUE=
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 305 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 57018
;; flags: qr aa rd ra cd ; qd: 1 an: 4 au: 0 ad: 1
;; QUESTIONS:
;; nsec3.ingotronic.ch., type = DNSKEY, class = IN
;; ANSWERS:
nsec3.ingotronic.ch. 300 IN DNSKEY 256 3 7 AwEAAccAWxkTVGZ6UAp0VEozAlYpARhbh6Y6tYOl6Fg3UeBNFFtDQ9fTEEt1NkbnR9u8KkpVN6a67avlYiUN1egDqEwzDU7R1Rw+/USdhm2hqOARmmu3DBgjjX/iXjZLyv310cOGFJZ/smcodlDL4pDAAoPxh/qs6KEBaT0sc1KWcGq3
nsec3.ingotronic.ch. 300 IN DNSKEY 257 3 7 AwEAAaBuJTf9oGyeTH3biUkAFLrsYrkodX1H7Snsui4XsDHFCBvs5XYacHbs0Jg0/O51KPjmNnjwMW8SSyDkKqYQ+9uYAf2EQ/pnD/VGQqnV2cw0Vwk/t0E2V4FUCju4pnAoyzZFZXGs1eWbX9JXu++b0Azp+ACq6485qJLzHhWDiIrPoK/SvdbFVRK4s+nPPJLH3NGBbtdz6kPq7aFWYBMoGeAZdN1wsQpcNWUo5eOmaJY53nMc7+rDpAyYlMe/FKwSZdX2ZDd63Qsa6Im4FVUJq/nWLq7tlQ/mWks15uDTQyJy/OWfA0ICCO4N9Fel9rThJNpJWEzOCblvZyBoy405kZk=
nsec3.ingotronic.ch. 300 IN RRSIG DNSKEY 7 3 300 20140215023510 20140116021800 16758 nsec3.ingotronic.ch. RT1Lj82phLAEt5Ck6F/vg6VYvgT7Loy7sixOoZC13YCU7tJqe9lZEWWQuDATlvUdMeyApDXjDj0Czy2cDlCxPrtpZANm+/GWGn67+t8MUC2r8rgbVvFWjHFmMrb9nMLsdOajF5m7A9cnPIpFfng7uUqlpBZ7UvvBGtBOy6sRxErdxzr2KY+2B2dLyfGw7z9e04J9F75AC+jdL1Z+R0CSkaYJoroun53OULF8xhNOB9D4pbKx/fcVxVuNx2L8KcpDn2EsHGSkM4eIUo7l3kYx3f4OV0HFIL0pwByqDvc+66HCEcS5OBlEM+Z5EDKS1DGY3DE85RFZpu4sIShqffRB4A==
nsec3.ingotronic.ch. 300 IN RRSIG DNSKEY 7 3 300 20140215023510 20140116021800 62417 nsec3.ingotronic.ch. iGelQHd9Eqam20YcJGFoOLn6DTQgkCts5nJrRLRYuDndGNUOcpTt0EcPImOGiDYEk+0TiXXF3jfbKYaZtncsKvwE50m41E4osqdIA/rpJU9GFWwGgQ2EX5uizunyxEM/YzTgjr9+heIW9+MtgPV1NZRp8HPN3Tq96j3VI3lCQxs=
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 958 bytes
###############################################
testNodataNsec3ForDSMustNotHaveSOA 0000664 0000000 0000000 00000004320 13020541473 0036171 0 ustar 00root root 0000000 0000000 dnssecjava-1.1.3/src/test/resources/recordings/org_jitsi_dnssec_TestNSEC3NoData #Date: 2014-01-28T22:39:20+01:00
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 48189
;; flags: qr aa rd ra ; qd: 1 an: 0 au: 8 ad: 1
;; QUESTIONS:
;; bogus., type = DS, class = IN
;; ANSWERS:
;; AUTHORITY RECORDS:
;hash(bogus.) -> hash(cogus.)
;key is the same as for nsec3.ingotronic.ch.
uroghcuh4jsasbi1f0ompeqpo1fgssvn.bogus. 300 IN NSEC3 1 0 10 1234 k0uipho2c78uta6m47n625jfjbl776m3 NS RRSIG
uroghcuh4jsasbi1f0ompeqpo1fgssvn.bogus. 300 IN RRSIG NSEC3 7 2 300 20140215011722 20140116005424 16758 bogus. D0q5h55pyybGzHMyxnHeFnchmmrEi1mZMuirbvZ/FgSZXN8zp0H5KW4FmOXMNMQwXLwXyYceymusBcGymM1DT3WeJWhds5LG1rqxvjk24Vbvaf/te+Q7aGxIXiEn3l5t3uHEM8m1Z0bc0wURzRLRLjhvaMXFUA06HaORYnEXlRmr3sl5d3BeQIoKtIgOWsdPB6Dk66saDFBAGc/EcWwmwHB6d+SKt1dUcYXYRPbIFL5Xx8EM4PKBE2dhiKi/2SYqQSx8pa8jtxBbBdpx6c/PchRA1zZ1w9V6TtIANSq2Hxrcj8Ey5nmeoR6M1p6r0Wtg46e0EJg0EGYB/rcrGlKilw==
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 1051 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 60551
;; flags: qr rd ra ad cd ; qd: 1 an: 3 au: 0 ad: 1
;; QUESTIONS:
;; bogus., type = DNSKEY, class = IN
;; ANSWERS:
bogus. 300 IN DNSKEY 257 3 7 AwEAAaBuJTf9oGyeTH3biUkAFLrsYrkodX1H7Snsui4XsDHFCBvs5XYacHbs0Jg0/O51KPjmNnjwMW8SSyDkKqYQ+9uYAf2EQ/pnD/VGQqnV2cw0Vwk/t0E2V4FUCju4pnAoyzZFZXGs1eWbX9JXu++b0Azp+ACq6485qJLzHhWDiIrPoK/SvdbFVRK4s+nPPJLH3NGBbtdz6kPq7aFWYBMoGeAZdN1wsQpcNWUo5eOmaJY53nMc7+rDpAyYlMe/FKwSZdX2ZDd63Qsa6Im4FVUJq/nWLq7tlQ/mWks15uDTQyJy/OWfA0ICCO4N9Fel9rThJNpJWEzOCblvZyBoy405kZk=
bogus. 300 IN RRSIG DNSKEY 7 1 300 20140215011722 20140116005424 16758 bogus. cN174LuYu9b/3QYN/5gA1ByWEjXPRFjIUVdGG1hidB4rPuqzWsvI0tOZ7vcQTC9Lagm9IpEYdczyAZWOJZyb727xYqqAQKsLKy/rzdqsD/ICzX0bs6GDA356dYECzW9eR4SqpX3xtMmttYC4lZ140IcZ6hacUqsjMqsxAfHlBbbyaJIf7QUyagwzG87GRgI42/bv0dL69t+CwfoQu2hR1GUcpUOxqEVUz2oPXy+/Cii3fiL8uJ/e65x/QDlMqTpHQ8f/IqLcYPxs364fitgnvwo7j8nDDORgvNuyGYf6lkuMnlRO70IhFBdjG4wmd8lU3fERLhHPFlLOy9g/lbnivw==
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 736 bytes
###############################################
testNsec3ClosestEncloserIsInsecureDelegation 0000664 0000000 0000000 00000027323 13020541473 0040471 0 ustar 00root root 0000000 0000000 dnssecjava-1.1.3/src/test/resources/recordings/org_jitsi_dnssec_TestNSEC3NoData #Date: 2013-08-04T20:43:22+02:00
# This is data for a constructed test: when a zone switches from signed to
# unsigned AND a resolver incorrectly returns data from the delegation point
# (instead of from the delegated child), the zone must be treated as insecure
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 52489
;; flags: qr rd ra ad cd ; qd: 1 an: 3 au: 0 ad: 1
;; QUESTIONS:
;; ., type = DNSKEY, class = IN
;; ANSWERS:
. 162318 IN DNSKEY 257 3 8 AwEAAagAIKlVZrpC6Ia7gEzahOR+9W29euxhJhVVLOyQbSEW0O8gcCjFFVQUTf6v58fLjwBd0YI0EzrAcQqBGCzh/RStIoO8g0NfnfL2MTJRkxoXbfDaUeVPQuYEhg37NZWAJQ9VnMVDxP/VHL496M/QZxkjf5/Efucp2gaDX6RS6CXpoY68LsvPVjR0ZSwzz1apAzvN9dlzEheX7ICJBBtuA6G3LQpzW5hOA2hzCTMjJPJ8LbqF6dsV6DoBQzgul0sGIcGOYl7OyQdXfZ57relSQageu+ipAdTTJ25AsRTAoub8ONGcLmqrAmRLKBP1dfwhYB4N7knNnulqQxA+Uk1ihz0=
. 162318 IN DNSKEY 256 3 8 AwEAAcFTyWsmpTs49Q0FKVepUqft+7+c3elhdsfh+amh+orgWLcitLM1bBBiWe6eymWW0EakLZAG4tej28tyx4f+j37Q9VX+m5NAhO/Y0riQonVWfzxLGymx3Ti5x/x7VKvF5Y5hf5OWv2J7pvEumYFFCtu4glit9T9J85+i3UgqSHqf
. 162318 IN RRSIG DNSKEY 8 0 172800 20130814235959 20130731000000 19036 . UUzEZTh+YdFwAThMqKdbiTJYoOYY2FoAwFanVv47w2lc9NTTz7Fb6wtnj/rb47ZtAdIGcBAlh5AWz1UisSIxW1f3bLXdHyaS6YlAZ8shdw5VMktJXrFlnnu8ibOdA8yADMuLvUARHknh9Ri78Po4CwvEdMA+FYha1YyHgm7j0DeqI2ZuRNhXqjF6p+u4Z9zqXjIDq29pog2eZI0NDUQ0EMpLpDuo0PdbbGh7QRiRjeSJ/Oqfb6FrWCn4J14NS6CctKRaumyHiN+SsGx/W+fCsODLkRb0WAVaAIytzNYT8R666eui0c7hnI4imUDUOC0unyj/396zZ1YWHCUgAyJIGg==
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 736 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 63054
;; flags: qr rd ra ad cd ; qd: 1 an: 2 au: 0 ad: 1
;; QUESTIONS:
;; ch., type = DS, class = IN
;; ANSWERS:
ch. 75918 IN DS 22072 8 2 94E4C1E425B28150D8DD7C974E27E1A933C1D4B51E535177B52DFF3F807A8C94
ch. 75918 IN RRSIG DS 8 1 86400 20130811000000 20130803230000 49656 . oyIAnRmpT1taLwIrZg0/WV3iqMBiWSNjIAXWZkoO9wp+cr0kMeVcrhrXYHAOTqGsL301YtMAT43BAPq9Cq0CZ4sD5K6OFOzo284SigLicuuWo0eEakJFdeYObB/+9wOERyN4iMVryjIl7GMz3D+UgLWrYMWWDDyVbmAm7ZY/3zs=
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 238 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 1681
;; flags: qr rd ra ad cd ; qd: 1 an: 4 au: 0 ad: 1
;; QUESTIONS:
;; ch., type = DNSKEY, class = IN
;; ANSWERS:
ch. 75919 IN DNSKEY 257 3 8 AwEAAeP0/M59JL65K0YWD0W+8k8x1T79hM4W2pi7cx0CxQULRd3udQnf/8ymUbKsPfVDMCXLQwW2evWHRu4B/OKnkRzDQsev7prdJ5UxAHWF4oFsWpGYx+A7WbqllTlmMFkV8bNz6TW6Trl4+RaLirt3ofRUFrJKyKCyNCKkxbtpFO6p6vP5K8V3CW854NndF3D/Xjz0s3nwd3dLwW3XVqi705mhJBvCSeorgsKMcY3PCBG6U5Twj/akb6P8I2nmoGsrIbtmvGk191zV5o4i8RTjk5DI6FcO5GL0J1w9sAiVYfXlN8wdyr90kqO6MGcvSQEItJCTaljyRT53bekbUhdRE50=
ch. 75919 IN DNSKEY 256 3 8 AwEAAaANwH4naX1c6xHWHYuFVHa7PLc9n7BPL8J3sa2LqKuQvQ1aTu3hIYAsO6c5wlDp4Pgw8HejPdEZC/VRBtHkXeWfe84IJ2731IQYjQGyD4rKq/L9VjD9bMlSjj6RtI7t4ItzEPlsSEEmEtXFLt8IDzq0xc2tQcec9PsfvvV5jIWN
ch. 75919 IN DNSKEY 256 3 8 AwEAAdmE6uljIBh3EdgS3jWT87HtnwhYwP/9/ciJH87VtWMSR8jtMqbr2CFWRFdO9sTIuQ27sOwYe24TXbHt2TBUR4EBiDuzVD+Oj7ikYK1hM0LslL0fYfCJZKVM2SCHnsdh2ExZda/o0v+HtVtRdL7MbTADGue+xGQg6MzvavRd8D2p
ch. 75919 IN RRSIG DNSKEY 8 1 86400 20130904100909 20130720090909 22072 ch. 1DIfkQfa6JMWoGs+y6vAwZ4F9Vf698b3hOpSgw3/Y3cdF/GqINRDQqiMi8OzGX5wV38QrBIG4wTCqHLB51VlHh2MHhU6F45eR/oA62LP6mmdIEuuG6hv2RuUj9S09r3eedr34ETjv8mRkydqekOFDqJaDG8t+B5EVku/94FU81x0pma05wEOvl5+IWQ62YqVuuzqd+Zz8+bObx5X74VAATC053XSftqbih0NJ65dWptOyyqs7MCvTXVpyWf5ipkfULexCWi9pjY7EuviTcJjdhwndiURl+uwMyzfMmf5XBREvJE03t/Cd1Xp9Ee3Iot2rXOpbQ83tUw3xqsgtGkfMg==
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 893 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 34393
;; flags: qr rd ra cd ; qd: 1 an: 3 au: 0 ad: 1
;; QUESTIONS:
;; ingotronic.ch., type = DS, class = IN
;; ANSWERS:
ingotronic.ch. 3583 IN DS 6031 5 1 733D0218B571CD617B1A7493564B9FC4F12ADE82
ingotronic.ch. 3583 IN DS 6031 5 2 4A948F2FDADA24686E473EDAC00DCF972584C75E3FAA92C2021B6221449FF87E
ingotronic.ch. 3583 IN RRSIG DS 8 2 3600 20130831110238 20130801120230 27249 ch. rhEK+na/h6EbbDBbOCBb2igPPPnkwKqKsJ1tAn11PLrrOoXkJs3Ke9LM/y6vxebH03H4gCJtS8VAavyzKWM7tzeraZP1oWlK6g855PeAwGyGYxtT6JVvwlwaFXQqLVoLNJy60eTobRQyKy0OqdDRHm0W/frnPPkM/zXLTr5g9pY=
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 288 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 40418
;; flags: qr aa rd ra cd ; qd: 1 an: 4 au: 0 ad: 1
;; QUESTIONS:
;; ingotronic.ch., type = DNSKEY, class = IN
;; ANSWERS:
ingotronic.ch. 300 IN DNSKEY 256 3 5 AwEAAZ2Xh77GFzpEDx7EHYxShqltHgkiG+BOjBGifEmnJhQSdE5/yNSLFNcdhZZ8HUPxYnaedTqJcFFg4AzUsQklF/fECegTJdZjaj2WoL0/I8K7HMfY/hVuRZUWPNglYi8agJRX6gdkFTCpUNI7stpgKqxtzUJhhw15uG/lKMplwqUr
ingotronic.ch. 300 IN DNSKEY 257 3 5 AwEAAeA1vzmjaB+eBAcvhzpKEgAEFpvQ1rg4uKDW6MsQtacKoqBpgyep2+LuWotz5p/xYxj3NGsArwN8Ad5cY0FHRr8miTT0elOv6nvlqGIfRuhj/BXAQ1x4ihpSFslHw0lJMYFwxsUZWpUyjWX/nv1xRZMMwF46gui0N4OEbyTYusCk77D+A71k+K0EAitFIbIH4GCUKmH1H7HmXhSVH9bN/n7KEGwW32lmsuuUcJoRKDkcUvbMXY/9Xoa2quERrUg/rBbDUHowRPjYDS5GzY1+f4YY8s40BufGiqyUTKKXL953MVFK8gmezXA0hbmrnZ7CBOw/7238mORAdzExaX8n7CE=
ingotronic.ch. 300 IN RRSIG DNSKEY 5 2 300 20130902082432 20130803075649 6031 ingotronic.ch. XYDiDlvzokZfrlCk+ZfvBof8cbStGsDqd8YCOtBf/rvnAOWTdV1LGQ1LxE64udTObpKM/+oRgCWFcULnajdwljH2vRw6ZnY/VQAE3QmyNNQHTCQYfOkoYGzUrOQZ9QwTFQaP7FXc/kx0pJwvswhg/cC1WFy/PEM3ydfzYBTSthFxs2G5ZbONUR30jVRq1fjBkjh/+ev6HQZAy8MfIZRM8AvIWEJUOEYJuP8pkwbJaE2Mp70aA6SYULVLLTY9g0LxwtLnv9SpdEOr4w2nz6BQ195BG4Ky6t5vQya2J3LAcpxovooopUMLfM3Tvwarr4Otz2HVAzn95UmA36h5Yvo+WA==
ingotronic.ch. 300 IN RRSIG DNSKEY 5 2 300 20130902082432 20130803075649 17430 ingotronic.ch. jwsrJ+V3kqYu2PTsgEokovbFlT+kLgTCPrw5iVXy5F+iTnwxUt5Mq+RkJ58nuKGdqjLTGZIjSybO1vVRdrMU7xyby17pSI1wc0TE5yeJnXhQQgYLh074bPvVfL4vzslX8Ab8U+JL5zo0/PnrVZhswjJLsrddpzlgGbkTQmcgKiM=
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 940 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 30648
;; flags: qr aa rd ra cd ; qd: 1 an: 3 au: 0 ad: 1
;; QUESTIONS:
;; nsec3.ingotronic.ch., type = DS, class = IN
;; ANSWERS:
nsec3.ingotronic.ch. 300 IN DS 16758 7 2 3C8DC02750A1636F829B45D6E6D642866768A9CD40A013AD9D25AB63734FFA13
nsec3.ingotronic.ch. 300 IN DS 16758 7 1 1720FF268E09A2CB63805EC8782D10AAD20E12A5
nsec3.ingotronic.ch. 300 IN RRSIG DS 5 3 300 20130902081456 20130803072435 17430 ingotronic.ch. ma2SzHd/Al7dZdivV0/D0M616DPN5bYQmUJMERLum+Dhw38Rl2/KbeBUiFsfamyBFsNLuG272Q35rZlOn62tmko/ysg7vttsZwqDsXXurAz53k4+7OISHYJ2kDFaLRxa5rGoKreCQ+YmiCMGGKtuFTtyoZb36Sl3cXbAKJRhIL0=
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 305 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 11577
;; flags: qr aa rd ra cd ; qd: 1 an: 4 au: 0 ad: 1
;; QUESTIONS:
;; nsec3.ingotronic.ch., type = DNSKEY, class = IN
;; ANSWERS:
nsec3.ingotronic.ch. 300 IN DNSKEY 256 3 7 AwEAAccAWxkTVGZ6UAp0VEozAlYpARhbh6Y6tYOl6Fg3UeBNFFtDQ9fTEEt1NkbnR9u8KkpVN6a67avlYiUN1egDqEwzDU7R1Rw+/USdhm2hqOARmmu3DBgjjX/iXjZLyv310cOGFJZ/smcodlDL4pDAAoPxh/qs6KEBaT0sc1KWcGq3
nsec3.ingotronic.ch. 300 IN DNSKEY 257 3 7 AwEAAaBuJTf9oGyeTH3biUkAFLrsYrkodX1H7Snsui4XsDHFCBvs5XYacHbs0Jg0/O51KPjmNnjwMW8SSyDkKqYQ+9uYAf2EQ/pnD/VGQqnV2cw0Vwk/t0E2V4FUCju4pnAoyzZFZXGs1eWbX9JXu++b0Azp+ACq6485qJLzHhWDiIrPoK/SvdbFVRK4s+nPPJLH3NGBbtdz6kPq7aFWYBMoGeAZdN1wsQpcNWUo5eOmaJY53nMc7+rDpAyYlMe/FKwSZdX2ZDd63Qsa6Im4FVUJq/nWLq7tlQ/mWks15uDTQyJy/OWfA0ICCO4N9Fel9rThJNpJWEzOCblvZyBoy405kZk=
nsec3.ingotronic.ch. 300 IN RRSIG DNSKEY 7 3 300 20130903154645 20130804144645 16758 nsec3.ingotronic.ch. emr2IJwIyRsu/o9tX2w3PLYc1Z4u3quRUBfbrWgTbMe02YpCDieyp7+f/IxmRspKvUpEIp+c0pcpIj0oHNL0ve2rfq9n5WPpwaYaJ3KycCFWF+iWwEAzzOyNdxdLwqsLdhN5rTX1lNTexak0czJXa7XXqiqdqLnfFr+xz610UfZ0R/dZdbdwsoUBrGd9bfTg6RCDzO2YJf6TKCT6Yn1s3fDnRYgb8RGCVOO0S6r38hqXxEqLoaNVnj8Qjd3pi1PpKnZf6/xrhV1+cJRoUtl7G1gK9aXwkn93KNqurrvialvw/0vP7OM1+WJauq2mXcdFQ8huQmCHRlm9QRWreorPxQ==
nsec3.ingotronic.ch. 300 IN RRSIG DNSKEY 7 3 300 20130903154645 20130804144645 62417 nsec3.ingotronic.ch. kMYZ2Xsa+n2x9vmiOYIIZqBp5S5IIeZVd6CmQNWY0UeztIhAH1xM2XEAXPbAZ5GqXjwtvWIir4+5S/U0IS4PwNOcTmysOX/jrsZVDDwpoidBoxTjnvD30pqTH9RkuiK9t5FpQYxNLmF8B6T4hK01g+OXC80QzBX4LEu8O4KDJ+8=
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 958 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 14675
;; flags: qr aa rd ra cd ; qd: 1 an: 0 au: 1 ad: 1
;; QUESTIONS:
;; a.unsigned.nsec3.ingotronic.ch., type = A, class = IN
;; ANSWERS:
;; AUTHORITY RECORDS:
S4K4EKRNHMVOBS9FF9M8V911BVL7NDUF.nsec3.ingotronic.ch. 300 IN NSEC3 1 0 10 1234 S5OG9G30J61V17I3RN5MPOG1VDUL8TMS NS
S4K4EKRNHMVOBS9FF9M8V911BVL7NDUF.nsec3.ingotronic.ch. 300 IN RRSIG NSEC3 7 4 300 20130903151143 20130804144753 62417 nsec3.ingotronic.ch. sgwh2RSVYzkVYQJUNd7y/yZZRIMpkscaTgKPFxBSSx+R0Qtl8gfCicRtM4C0XRtPEQdxXLAWGnh1YsqBASpMFNw6nlDBWNQpe6ctBLPLTLcNkCu6Yxi4Y6ouYAHlt/8rJy29mgyqZ1ViOVRAds+Oloomjvg/JDbiOZKw4c/Rsq4=
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 105 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 14675
;; flags: qr aa rd ra cd ; qd: 1 an: 0 au: 1 ad: 1
;; QUESTIONS:
;; unsigned.nsec3.ingotronic.ch., type = DS, class = IN
;; ANSWERS:
unsigned.nsec3.ingotronic.ch. 300 DS 23829 7 1 902429770AEE28DCBC72350E8BC260AFF4F239C5
unsigned.nsec3.ingotronic.ch. 300 DS 23829 7 2 20B0949D09A8FE56C33BE9835B46DE749598FFE20AB4897A1D2ACCCC94A96DF7
unsigned.nsec3.ingotronic.ch. 300 RRSIG DS 7 4 300 20130903175754 20130804175754 62417 nsec3.ingotronic.ch. uERbvGIS0r3tBJy3rGBFc21bE6ySOCE48zhxgM0mJHj3Y4UzGuhSK14cR0cZpCcZXAIvSlYBsJ7UQOu4U6Flf6Ep/Wzm7iitfOvGYfROFrbHVLsDwH06l08UueFSQK8TfueiNo9D+glxhqercts30j6ZEYwcDXE+HcHnQrR7k+o=
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
###############################################
# constructed response here: the NSEC3 is from the delegating zone for the
# child zone
# hash(n=unsigned.nsec3.ingotronic.ch.,it=10,s=1234)=s4k4ekrnhmvobs9ff9m8v911bvl7nduf
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 14675
;; flags: qr aa rd ra cd ; qd: 1 an: 0 au: 1 ad: 1
;; QUESTIONS:
;; a.unsigned.nsec3.ingotronic.ch., type = A, class = IN
;; ANSWERS:
;; AUTHORITY RECORDS:
S4K4EKRNHMVOBS9FF9M8V911BVL7NDUF.nsec3.ingotronic.ch. 300 IN NSEC3 1 0 10 1234 S5OG9G30J61V17I3RN5MPOG1VDUL8TMS NS
S4K4EKRNHMVOBS9FF9M8V911BVL7NDUF.nsec3.ingotronic.ch. 300 IN RRSIG NSEC3 7 4 300 20130903151143 20130804144753 62417 nsec3.ingotronic.ch. sgwh2RSVYzkVYQJUNd7y/yZZRIMpkscaTgKPFxBSSx+R0Qtl8gfCicRtM4C0XRtPEQdxXLAWGnh1YsqBASpMFNw6nlDBWNQpe6ctBLPLTLcNkCu6Yxi4Y6ouYAHlt/8rJy29mgyqZ1ViOVRAds+Oloomjvg/JDbiOZKw4c/Rsq4=
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
###############################################
testNsec3ClosestEncloserIsInsecureDelegationDS 0000664 0000000 0000000 00000027324 13020541473 0040721 0 ustar 00root root 0000000 0000000 dnssecjava-1.1.3/src/test/resources/recordings/org_jitsi_dnssec_TestNSEC3NoData #Date: 2013-08-04T20:43:22+02:00
# This is data for a constructed test: when a zone switches from signed to
# unsigned AND a resolver incorrectly returns data from the delegation point
# (instead of from the delegated child), the zone must be treated as insecure
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 52489
;; flags: qr rd ra ad cd ; qd: 1 an: 3 au: 0 ad: 1
;; QUESTIONS:
;; ., type = DNSKEY, class = IN
;; ANSWERS:
. 162318 IN DNSKEY 257 3 8 AwEAAagAIKlVZrpC6Ia7gEzahOR+9W29euxhJhVVLOyQbSEW0O8gcCjFFVQUTf6v58fLjwBd0YI0EzrAcQqBGCzh/RStIoO8g0NfnfL2MTJRkxoXbfDaUeVPQuYEhg37NZWAJQ9VnMVDxP/VHL496M/QZxkjf5/Efucp2gaDX6RS6CXpoY68LsvPVjR0ZSwzz1apAzvN9dlzEheX7ICJBBtuA6G3LQpzW5hOA2hzCTMjJPJ8LbqF6dsV6DoBQzgul0sGIcGOYl7OyQdXfZ57relSQageu+ipAdTTJ25AsRTAoub8ONGcLmqrAmRLKBP1dfwhYB4N7knNnulqQxA+Uk1ihz0=
. 162318 IN DNSKEY 256 3 8 AwEAAcFTyWsmpTs49Q0FKVepUqft+7+c3elhdsfh+amh+orgWLcitLM1bBBiWe6eymWW0EakLZAG4tej28tyx4f+j37Q9VX+m5NAhO/Y0riQonVWfzxLGymx3Ti5x/x7VKvF5Y5hf5OWv2J7pvEumYFFCtu4glit9T9J85+i3UgqSHqf
. 162318 IN RRSIG DNSKEY 8 0 172800 20130814235959 20130731000000 19036 . UUzEZTh+YdFwAThMqKdbiTJYoOYY2FoAwFanVv47w2lc9NTTz7Fb6wtnj/rb47ZtAdIGcBAlh5AWz1UisSIxW1f3bLXdHyaS6YlAZ8shdw5VMktJXrFlnnu8ibOdA8yADMuLvUARHknh9Ri78Po4CwvEdMA+FYha1YyHgm7j0DeqI2ZuRNhXqjF6p+u4Z9zqXjIDq29pog2eZI0NDUQ0EMpLpDuo0PdbbGh7QRiRjeSJ/Oqfb6FrWCn4J14NS6CctKRaumyHiN+SsGx/W+fCsODLkRb0WAVaAIytzNYT8R666eui0c7hnI4imUDUOC0unyj/396zZ1YWHCUgAyJIGg==
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 736 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 63054
;; flags: qr rd ra ad cd ; qd: 1 an: 2 au: 0 ad: 1
;; QUESTIONS:
;; ch., type = DS, class = IN
;; ANSWERS:
ch. 75918 IN DS 22072 8 2 94E4C1E425B28150D8DD7C974E27E1A933C1D4B51E535177B52DFF3F807A8C94
ch. 75918 IN RRSIG DS 8 1 86400 20130811000000 20130803230000 49656 . oyIAnRmpT1taLwIrZg0/WV3iqMBiWSNjIAXWZkoO9wp+cr0kMeVcrhrXYHAOTqGsL301YtMAT43BAPq9Cq0CZ4sD5K6OFOzo284SigLicuuWo0eEakJFdeYObB/+9wOERyN4iMVryjIl7GMz3D+UgLWrYMWWDDyVbmAm7ZY/3zs=
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 238 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 1681
;; flags: qr rd ra ad cd ; qd: 1 an: 4 au: 0 ad: 1
;; QUESTIONS:
;; ch., type = DNSKEY, class = IN
;; ANSWERS:
ch. 75919 IN DNSKEY 257 3 8 AwEAAeP0/M59JL65K0YWD0W+8k8x1T79hM4W2pi7cx0CxQULRd3udQnf/8ymUbKsPfVDMCXLQwW2evWHRu4B/OKnkRzDQsev7prdJ5UxAHWF4oFsWpGYx+A7WbqllTlmMFkV8bNz6TW6Trl4+RaLirt3ofRUFrJKyKCyNCKkxbtpFO6p6vP5K8V3CW854NndF3D/Xjz0s3nwd3dLwW3XVqi705mhJBvCSeorgsKMcY3PCBG6U5Twj/akb6P8I2nmoGsrIbtmvGk191zV5o4i8RTjk5DI6FcO5GL0J1w9sAiVYfXlN8wdyr90kqO6MGcvSQEItJCTaljyRT53bekbUhdRE50=
ch. 75919 IN DNSKEY 256 3 8 AwEAAaANwH4naX1c6xHWHYuFVHa7PLc9n7BPL8J3sa2LqKuQvQ1aTu3hIYAsO6c5wlDp4Pgw8HejPdEZC/VRBtHkXeWfe84IJ2731IQYjQGyD4rKq/L9VjD9bMlSjj6RtI7t4ItzEPlsSEEmEtXFLt8IDzq0xc2tQcec9PsfvvV5jIWN
ch. 75919 IN DNSKEY 256 3 8 AwEAAdmE6uljIBh3EdgS3jWT87HtnwhYwP/9/ciJH87VtWMSR8jtMqbr2CFWRFdO9sTIuQ27sOwYe24TXbHt2TBUR4EBiDuzVD+Oj7ikYK1hM0LslL0fYfCJZKVM2SCHnsdh2ExZda/o0v+HtVtRdL7MbTADGue+xGQg6MzvavRd8D2p
ch. 75919 IN RRSIG DNSKEY 8 1 86400 20130904100909 20130720090909 22072 ch. 1DIfkQfa6JMWoGs+y6vAwZ4F9Vf698b3hOpSgw3/Y3cdF/GqINRDQqiMi8OzGX5wV38QrBIG4wTCqHLB51VlHh2MHhU6F45eR/oA62LP6mmdIEuuG6hv2RuUj9S09r3eedr34ETjv8mRkydqekOFDqJaDG8t+B5EVku/94FU81x0pma05wEOvl5+IWQ62YqVuuzqd+Zz8+bObx5X74VAATC053XSftqbih0NJ65dWptOyyqs7MCvTXVpyWf5ipkfULexCWi9pjY7EuviTcJjdhwndiURl+uwMyzfMmf5XBREvJE03t/Cd1Xp9Ee3Iot2rXOpbQ83tUw3xqsgtGkfMg==
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 893 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 34393
;; flags: qr rd ra cd ; qd: 1 an: 3 au: 0 ad: 1
;; QUESTIONS:
;; ingotronic.ch., type = DS, class = IN
;; ANSWERS:
ingotronic.ch. 3583 IN DS 6031 5 1 733D0218B571CD617B1A7493564B9FC4F12ADE82
ingotronic.ch. 3583 IN DS 6031 5 2 4A948F2FDADA24686E473EDAC00DCF972584C75E3FAA92C2021B6221449FF87E
ingotronic.ch. 3583 IN RRSIG DS 8 2 3600 20130831110238 20130801120230 27249 ch. rhEK+na/h6EbbDBbOCBb2igPPPnkwKqKsJ1tAn11PLrrOoXkJs3Ke9LM/y6vxebH03H4gCJtS8VAavyzKWM7tzeraZP1oWlK6g855PeAwGyGYxtT6JVvwlwaFXQqLVoLNJy60eTobRQyKy0OqdDRHm0W/frnPPkM/zXLTr5g9pY=
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 288 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 40418
;; flags: qr aa rd ra cd ; qd: 1 an: 4 au: 0 ad: 1
;; QUESTIONS:
;; ingotronic.ch., type = DNSKEY, class = IN
;; ANSWERS:
ingotronic.ch. 300 IN DNSKEY 256 3 5 AwEAAZ2Xh77GFzpEDx7EHYxShqltHgkiG+BOjBGifEmnJhQSdE5/yNSLFNcdhZZ8HUPxYnaedTqJcFFg4AzUsQklF/fECegTJdZjaj2WoL0/I8K7HMfY/hVuRZUWPNglYi8agJRX6gdkFTCpUNI7stpgKqxtzUJhhw15uG/lKMplwqUr
ingotronic.ch. 300 IN DNSKEY 257 3 5 AwEAAeA1vzmjaB+eBAcvhzpKEgAEFpvQ1rg4uKDW6MsQtacKoqBpgyep2+LuWotz5p/xYxj3NGsArwN8Ad5cY0FHRr8miTT0elOv6nvlqGIfRuhj/BXAQ1x4ihpSFslHw0lJMYFwxsUZWpUyjWX/nv1xRZMMwF46gui0N4OEbyTYusCk77D+A71k+K0EAitFIbIH4GCUKmH1H7HmXhSVH9bN/n7KEGwW32lmsuuUcJoRKDkcUvbMXY/9Xoa2quERrUg/rBbDUHowRPjYDS5GzY1+f4YY8s40BufGiqyUTKKXL953MVFK8gmezXA0hbmrnZ7CBOw/7238mORAdzExaX8n7CE=
ingotronic.ch. 300 IN RRSIG DNSKEY 5 2 300 20130902082432 20130803075649 6031 ingotronic.ch. XYDiDlvzokZfrlCk+ZfvBof8cbStGsDqd8YCOtBf/rvnAOWTdV1LGQ1LxE64udTObpKM/+oRgCWFcULnajdwljH2vRw6ZnY/VQAE3QmyNNQHTCQYfOkoYGzUrOQZ9QwTFQaP7FXc/kx0pJwvswhg/cC1WFy/PEM3ydfzYBTSthFxs2G5ZbONUR30jVRq1fjBkjh/+ev6HQZAy8MfIZRM8AvIWEJUOEYJuP8pkwbJaE2Mp70aA6SYULVLLTY9g0LxwtLnv9SpdEOr4w2nz6BQ195BG4Ky6t5vQya2J3LAcpxovooopUMLfM3Tvwarr4Otz2HVAzn95UmA36h5Yvo+WA==
ingotronic.ch. 300 IN RRSIG DNSKEY 5 2 300 20130902082432 20130803075649 17430 ingotronic.ch. jwsrJ+V3kqYu2PTsgEokovbFlT+kLgTCPrw5iVXy5F+iTnwxUt5Mq+RkJ58nuKGdqjLTGZIjSybO1vVRdrMU7xyby17pSI1wc0TE5yeJnXhQQgYLh074bPvVfL4vzslX8Ab8U+JL5zo0/PnrVZhswjJLsrddpzlgGbkTQmcgKiM=
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 940 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 30648
;; flags: qr aa rd ra cd ; qd: 1 an: 3 au: 0 ad: 1
;; QUESTIONS:
;; nsec3.ingotronic.ch., type = DS, class = IN
;; ANSWERS:
nsec3.ingotronic.ch. 300 IN DS 16758 7 2 3C8DC02750A1636F829B45D6E6D642866768A9CD40A013AD9D25AB63734FFA13
nsec3.ingotronic.ch. 300 IN DS 16758 7 1 1720FF268E09A2CB63805EC8782D10AAD20E12A5
nsec3.ingotronic.ch. 300 IN RRSIG DS 5 3 300 20130902081456 20130803072435 17430 ingotronic.ch. ma2SzHd/Al7dZdivV0/D0M616DPN5bYQmUJMERLum+Dhw38Rl2/KbeBUiFsfamyBFsNLuG272Q35rZlOn62tmko/ysg7vttsZwqDsXXurAz53k4+7OISHYJ2kDFaLRxa5rGoKreCQ+YmiCMGGKtuFTtyoZb36Sl3cXbAKJRhIL0=
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 305 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 11577
;; flags: qr aa rd ra cd ; qd: 1 an: 4 au: 0 ad: 1
;; QUESTIONS:
;; nsec3.ingotronic.ch., type = DNSKEY, class = IN
;; ANSWERS:
nsec3.ingotronic.ch. 300 IN DNSKEY 256 3 7 AwEAAccAWxkTVGZ6UAp0VEozAlYpARhbh6Y6tYOl6Fg3UeBNFFtDQ9fTEEt1NkbnR9u8KkpVN6a67avlYiUN1egDqEwzDU7R1Rw+/USdhm2hqOARmmu3DBgjjX/iXjZLyv310cOGFJZ/smcodlDL4pDAAoPxh/qs6KEBaT0sc1KWcGq3
nsec3.ingotronic.ch. 300 IN DNSKEY 257 3 7 AwEAAaBuJTf9oGyeTH3biUkAFLrsYrkodX1H7Snsui4XsDHFCBvs5XYacHbs0Jg0/O51KPjmNnjwMW8SSyDkKqYQ+9uYAf2EQ/pnD/VGQqnV2cw0Vwk/t0E2V4FUCju4pnAoyzZFZXGs1eWbX9JXu++b0Azp+ACq6485qJLzHhWDiIrPoK/SvdbFVRK4s+nPPJLH3NGBbtdz6kPq7aFWYBMoGeAZdN1wsQpcNWUo5eOmaJY53nMc7+rDpAyYlMe/FKwSZdX2ZDd63Qsa6Im4FVUJq/nWLq7tlQ/mWks15uDTQyJy/OWfA0ICCO4N9Fel9rThJNpJWEzOCblvZyBoy405kZk=
nsec3.ingotronic.ch. 300 IN RRSIG DNSKEY 7 3 300 20130903154645 20130804144645 16758 nsec3.ingotronic.ch. emr2IJwIyRsu/o9tX2w3PLYc1Z4u3quRUBfbrWgTbMe02YpCDieyp7+f/IxmRspKvUpEIp+c0pcpIj0oHNL0ve2rfq9n5WPpwaYaJ3KycCFWF+iWwEAzzOyNdxdLwqsLdhN5rTX1lNTexak0czJXa7XXqiqdqLnfFr+xz610UfZ0R/dZdbdwsoUBrGd9bfTg6RCDzO2YJf6TKCT6Yn1s3fDnRYgb8RGCVOO0S6r38hqXxEqLoaNVnj8Qjd3pi1PpKnZf6/xrhV1+cJRoUtl7G1gK9aXwkn93KNqurrvialvw/0vP7OM1+WJauq2mXcdFQ8huQmCHRlm9QRWreorPxQ==
nsec3.ingotronic.ch. 300 IN RRSIG DNSKEY 7 3 300 20130903154645 20130804144645 62417 nsec3.ingotronic.ch. kMYZ2Xsa+n2x9vmiOYIIZqBp5S5IIeZVd6CmQNWY0UeztIhAH1xM2XEAXPbAZ5GqXjwtvWIir4+5S/U0IS4PwNOcTmysOX/jrsZVDDwpoidBoxTjnvD30pqTH9RkuiK9t5FpQYxNLmF8B6T4hK01g+OXC80QzBX4LEu8O4KDJ+8=
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 958 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 14675
;; flags: qr aa rd ra cd ; qd: 1 an: 0 au: 1 ad: 1
;; QUESTIONS:
;; a.unsigned.nsec3.ingotronic.ch., type = A, class = IN
;; ANSWERS:
;; AUTHORITY RECORDS:
S4K4EKRNHMVOBS9FF9M8V911BVL7NDUF.nsec3.ingotronic.ch. 300 IN NSEC3 1 0 10 1234 S5OG9G30J61V17I3RN5MPOG1VDUL8TMS NS
S4K4EKRNHMVOBS9FF9M8V911BVL7NDUF.nsec3.ingotronic.ch. 300 IN RRSIG NSEC3 7 4 300 20130903151143 20130804144753 62417 nsec3.ingotronic.ch. sgwh2RSVYzkVYQJUNd7y/yZZRIMpkscaTgKPFxBSSx+R0Qtl8gfCicRtM4C0XRtPEQdxXLAWGnh1YsqBASpMFNw6nlDBWNQpe6ctBLPLTLcNkCu6Yxi4Y6ouYAHlt/8rJy29mgyqZ1ViOVRAds+Oloomjvg/JDbiOZKw4c/Rsq4=
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 105 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 14675
;; flags: qr aa rd ra cd ; qd: 1 an: 0 au: 1 ad: 1
;; QUESTIONS:
;; unsigned.nsec3.ingotronic.ch., type = DS, class = IN
;; ANSWERS:
unsigned.nsec3.ingotronic.ch. 300 DS 23829 7 1 902429770AEE28DCBC72350E8BC260AFF4F239C5
unsigned.nsec3.ingotronic.ch. 300 DS 23829 7 2 20B0949D09A8FE56C33BE9835B46DE749598FFE20AB4897A1D2ACCCC94A96DF7
unsigned.nsec3.ingotronic.ch. 300 RRSIG DS 7 4 300 20130903175754 20130804175754 62417 nsec3.ingotronic.ch. uERbvGIS0r3tBJy3rGBFc21bE6ySOCE48zhxgM0mJHj3Y4UzGuhSK14cR0cZpCcZXAIvSlYBsJ7UQOu4U6Flf6Ep/Wzm7iitfOvGYfROFrbHVLsDwH06l08UueFSQK8TfueiNo9D+glxhqercts30j6ZEYwcDXE+HcHnQrR7k+o=
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
###############################################
# constructed response here: the NSEC3 is from the delegating zone for the
# child zone
# hash(n=unsigned.nsec3.ingotronic.ch.,it=10,s=1234)=s4k4ekrnhmvobs9ff9m8v911bvl7nduf
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 14675
;; flags: qr aa rd ra cd ; qd: 1 an: 0 au: 1 ad: 1
;; QUESTIONS:
;; a.unsigned.nsec3.ingotronic.ch., type = DS, class = IN
;; ANSWERS:
;; AUTHORITY RECORDS:
S4K4EKRNHMVOBS9FF9M8V911BVL7NDUF.nsec3.ingotronic.ch. 300 IN NSEC3 1 0 10 1234 S5OG9G30J61V17I3RN5MPOG1VDUL8TMS NS
S4K4EKRNHMVOBS9FF9M8V911BVL7NDUF.nsec3.ingotronic.ch. 300 IN RRSIG NSEC3 7 4 300 20130903151143 20130804144753 62417 nsec3.ingotronic.ch. sgwh2RSVYzkVYQJUNd7y/yZZRIMpkscaTgKPFxBSSx+R0Qtl8gfCicRtM4C0XRtPEQdxXLAWGnh1YsqBASpMFNw6nlDBWNQpe6ctBLPLTLcNkCu6Yxi4Y6ouYAHlt/8rJy29mgyqZ1ViOVRAds+Oloomjvg/JDbiOZKw4c/Rsq4=
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
###############################################
dnssecjava-1.1.3/src/test/resources/recordings/org_jitsi_dnssec_TestNoData/ 0000775 0000000 0000000 00000000000 13020541473 0027171 5 ustar 00root root 0000000 0000000 testFakedNoDataNsec3WithNsecs 0000664 0000000 0000000 00000045173 13020541473 0034574 0 ustar 00root root 0000000 0000000 dnssecjava-1.1.3/src/test/resources/recordings/org_jitsi_dnssec_TestNoData #Date: 2015-01-06T22:35:09+01:00
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 25734
;; flags: qr aa rd ra cd ; qd: 1 an: 0 au: 4 ad: 1
;; QUESTIONS:
;; www.nsec3.ingotronic.ch., type = MX, class = IN
;; ANSWERS:
;; AUTHORITY RECORDS:
nsec3.ingotronic.ch. 300 IN SOA ns1.ingotronic.ch. admin.ingotronic.ch. 2013032932 300 60 864000 300
nsec3.ingotronic.ch. 300 IN RRSIG SOA 7 3 300 20150201003516 20150101233516 62417 nsec3.ingotronic.ch. RMXaAZCkydysBpA4+LWD2frs4CZH2FBxafAolq7MOG62Sw3ellwNcSIh2naMasviin2DU2BAzIYyFUqKJDbUqzTxZQjsM6d5LtgFy5iTNmWum6FnFP5Fz73Zs/9Q0LNEstR82MRRL8EDElADhFySAReavyT/vlSTScQGxx6slyQ=
7L2K0NAC88UN3IJV0404HF7PM543BN3F.nsec3.ingotronic.ch. 300 IN NSEC3 1 0 10 1234 810L2KR9HCVTELBLO8GQM0EMIM8KD01E A AAAA RRSIG
7L2K0NAC88UN3IJV0404HF7PM543BN3F.nsec3.ingotronic.ch. 300 IN RRSIG NSEC3 7 4 300 20150125000452 20141225235516 62417 nsec3.ingotronic.ch. hOo4U9QFigY0lLf6UzA/WlwjZsXfs5EZdfiumlAHv2H/I81TiWBtKQhOvMyVUOFq1dMq44JnO2KJEEuPRKKNPiER4a3Y/kzpjscW+yfUWjOzOmZX4d2p9ustljj125/PVUwAOeCP7a8fFZMG/7Xughx49B4WFsDrIUEbMsw3Iqo=
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 537 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 20135
;; flags: qr rd ra ad cd ; qd: 1 an: 4 au: 0 ad: 1
;; QUESTIONS:
;; ., type = DNSKEY, class = IN
;; ANSWERS:
. 87364 IN DNSKEY 256 3 8 AwEAAe3fSrbLBy3LOS7pnxEUhvPZTE2H5dIGsI/UfruI/nOEvWWa/PSX2BFedBkEqOlYdjdNF2f+6lmfk2Od/xu0v5bVqxFE+/24v3hZSlWBxvXzPTAGHrbW/IJYEPqlzVOAS4XdUgHg0N7IbLywNHMvB+Yf+Nm6ctyXXFLV4WTNnzs7
. 87364 IN DNSKEY 257 3 8 AwEAAagAIKlVZrpC6Ia7gEzahOR+9W29euxhJhVVLOyQbSEW0O8gcCjFFVQUTf6v58fLjwBd0YI0EzrAcQqBGCzh/RStIoO8g0NfnfL2MTJRkxoXbfDaUeVPQuYEhg37NZWAJQ9VnMVDxP/VHL496M/QZxkjf5/Efucp2gaDX6RS6CXpoY68LsvPVjR0ZSwzz1apAzvN9dlzEheX7ICJBBtuA6G3LQpzW5hOA2hzCTMjJPJ8LbqF6dsV6DoBQzgul0sGIcGOYl7OyQdXfZ57relSQageu+ipAdTTJ25AsRTAoub8ONGcLmqrAmRLKBP1dfwhYB4N7knNnulqQxA+Uk1ihz0=
. 87364 IN DNSKEY 256 3 8 AwEAAaPD7Y7XIi1MOEREJNTrRhyqsY3gff6JWzg+XCbqut1sbcbvqyssHw8DT1AkRaAC92pO8xuyq5QEgEPL1IHfABLwpwXI5gTj4gdwi86bpkmlWs9fRpnn4DPDCTdrnxIejJXgClHikLJF3u3CdpNCMijq4CKdQbMlRZ3avv+G7rh7
. 87364 IN RRSIG DNSKEY 8 0 172800 20150115235959 20150101000000 19036 . i8cAxD2pvQi1oAyvQxRpDfFlbqPzW+69QQEsDwE1eWOm5AtawO9U7lmsGps7sy/fVNvl1ljKBj4Djp9pb3U2FLogjiIlW0cDAkPmLlG9t+b/pjEfBNlhjANUVN06pvQVAfm+LcF26EaWT6FlISBqb6jSy4BHRa3Bdc4Sx7+pRSYSqVVvYxLkfAWsKPqGkvWhebJDndJJV9syXQXgZ+v/uJ+6XOS43xkAdeL8iBzIs/FlwMTfh3tVe3d0lb65IBBLlCzeQuetX+0Vu1YFcnD0mHc/wS2ZnAV5toAFmyVQBoY/XAZiZeaOkcROJ6Zmqezy7liwK7BqsYyAZntMhk8lbg==
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 883 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 16754
;; flags: qr rd ra ad cd ; qd: 1 an: 2 au: 0 ad: 1
;; QUESTIONS:
;; ch., type = DS, class = IN
;; ANSWERS:
ch. 964 IN DS 46375 8 2 8F96646FC68BB7E4AF4C0750A6096FBC0D4ECDA3D3FA6DA06FDDB42EE50C6CF3
ch. 964 IN RRSIG DS 8 1 86400 20150112170000 20150105160000 16665 . thY7xYWBBxiBjqbQIb9fAG4TmQgnziwM7q6P1T3/ITxmECdvOCQnnZA3uD7qmN8uM0HudsD7+y+zgD3rsH4RSTKdL4kHSI0OnCxToMTvklghEgFDezqIRm8NkWdI2H4Stwrj20nYKSpLQxPI2EE54gs18P3KyO8bAUYv8Qx73xU=
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 238 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 6044
;; flags: qr rd ra ad cd ; qd: 1 an: 4 au: 0 ad: 1
;; QUESTIONS:
;; ch., type = DNSKEY, class = IN
;; ANSWERS:
ch. 965 IN DNSKEY 257 3 8 AwEAAb7GhhZ8IAy/AhwmSms5DeQK5ad09wIIplEpYoiAIYXPtJvT1ReFzyfTp/2YP+g/PWDwHPh4qKAHa9x0VgbIQcGAeNakmfkAdWEmCnca323/SAml3mwfaX62G7/uYWae5zh8QTxZKNd+K1yZ5x0IxnI31chSl5xymRbTEHYZDKwSIRFM3fTxUMt93WFaBVWELReYotJBr++rvAWdnlay5TPBTvheLBkaiqtgM4GP8HK07Y+86lsZnEsj5K3G1KTV5SPpa82rqYAwxG9VKbmSE/6/kBR5jJHjt1rRt5Oe7v18aEtw0YCEN4vxq+KuvMoNVqXUsE9LBwHJD+QNwi6wmB0=
ch. 965 IN DNSKEY 256 3 8 AwEAAcSLdT0fEmcFmLpeUkAJoeVaHKiu+nbuc43fWlqaCRVf8t2HA4uWxOk0O5ci9nrFTc8nq8oa5fk5Cj7CHh4yrX9qUCfTdIWTyp8BDEdJpS+Dyb0u9wQuVj+nQMj4fLzdQf4TJs3/qxuiLr3nL1UUwlhhXeqSqGVb7p3mtB5HJ8ad
ch. 965 IN DNSKEY 256 3 8 AwEAAcsg0kY6fw1wzYMhSAKTy+Y2JzAst66P/1odp9NECJJHbU8f4nwziI3onoFSBV0ZiSZhY1aH5dhdDZ7BkrqhVXSrZPAz0CvzjIxmB1gSOf9DeZvjQvoy97HqYolxsf+B3QQv2RKBT67elF5+JisKg3/dQISelKn8LhabSoVrMlD1
ch. 965 IN RRSIG DNSKEY 8 1 86400 20150127100909 20141212090909 46375 ch. bT8q0FWyeMH0SulNo6UdIIgZYNATwYsee2bikq2Gh339Bufma8eaqWIPYT3XKmxYPBFOw0bVl+kLZxTwbR1CFoCDXoP+qgQhh4mf9qkNiv2CDSc+0FE3FRREn+DAhYTUEuB58FPiPakFB8s8O7T+k2qhDae7jy4/y7Jl1lnjaBY8s7bzOUPhF0KKCNZmvoKwtL23ZdVeTSV1xM3jkiNnpzBKbcoSWECSGJVp1SE0BnRXdwQP41YTXFZ0310YjaTAUCC5qbMIWdEkHjfdSQtKBImnc85mkapq9w++XQ4zhauPWBtrPV3CcoCahjUaWdjrKVkibomlJZaN8MEO23CfQw==
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 893 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 60471
;; flags: qr rd ra cd ; qd: 1 an: 3 au: 0 ad: 1
;; QUESTIONS:
;; ingotronic.ch., type = DS, class = IN
;; ANSWERS:
ingotronic.ch. 3573 IN DS 6031 5 2 4A948F2FDADA24686E473EDAC00DCF972584C75E3FAA92C2021B6221449FF87E
ingotronic.ch. 3573 IN DS 6031 5 1 733D0218B571CD617B1A7493564B9FC4F12ADE82
ingotronic.ch. 3573 IN RRSIG DS 8 2 3600 20150129033614 20150105123019 60789 ch. rVPJP2HhzW7OkroK2axFj5Lb4iVWCH8Fp/Iq1rF952NDo72b8RiKje2RaAKJAGQ+wd0YgE+PAej04GCmkhlDJA/zvPeeTxuhy3HbJzReMlQ7fjyH+wW1hli+FuIYvogXWf7nO/9VyPORt8X/f/pjrOr3Vlj9sGLN8TGYpEuVSw4=
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 288 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 17951
;; flags: qr aa rd ra cd ; qd: 1 an: 4 au: 0 ad: 1
;; QUESTIONS:
;; ingotronic.ch., type = DNSKEY, class = IN
;; ANSWERS:
ingotronic.ch. 300 IN DNSKEY 256 3 5 AwEAAZ2Xh77GFzpEDx7EHYxShqltHgkiG+BOjBGifEmnJhQSdE5/yNSLFNcdhZZ8HUPxYnaedTqJcFFg4AzUsQklF/fECegTJdZjaj2WoL0/I8K7HMfY/hVuRZUWPNglYi8agJRX6gdkFTCpUNI7stpgKqxtzUJhhw15uG/lKMplwqUr
ingotronic.ch. 300 IN DNSKEY 257 3 5 AwEAAeA1vzmjaB+eBAcvhzpKEgAEFpvQ1rg4uKDW6MsQtacKoqBpgyep2+LuWotz5p/xYxj3NGsArwN8Ad5cY0FHRr8miTT0elOv6nvlqGIfRuhj/BXAQ1x4ihpSFslHw0lJMYFwxsUZWpUyjWX/nv1xRZMMwF46gui0N4OEbyTYusCk77D+A71k+K0EAitFIbIH4GCUKmH1H7HmXhSVH9bN/n7KEGwW32lmsuuUcJoRKDkcUvbMXY/9Xoa2quERrUg/rBbDUHowRPjYDS5GzY1+f4YY8s40BufGiqyUTKKXL953MVFK8gmezXA0hbmrnZ7CBOw/7238mORAdzExaX8n7CE=
ingotronic.ch. 300 IN RRSIG DNSKEY 5 2 300 20150125003700 20141226001657 6031 ingotronic.ch. rs1QlP2SlSpA2ELbzwg3DgWLzXWL3Lpv6CUJE2Q0qH2Zp7Qdy3cD+ZEtNh9v24Qv1M6JJ3zFt8mmZoCeW2ycuMbJCqBkW9CBuwF+VznZvZY2MxwPipvhvEEGP//0M8YAZJ66yQPDv3PTdAP8FYbIrJyvY44vwyncwbslpfHT9jAsrbfr3vuMuWps86dnP462q+0s1TxBfqi8mzo3gdavjHKWVNwohLahLKT+tWeu6DSzQv0YwMjwtkLgF7QRgx3ctIIkloOrnx9nHH1N6y+hxEB89fOlyVDjHhgL5uVtsD5fEdT0FJ2Gc/2nShEMMqIwr1/J9kUq1mNySff/uEe65Q==
ingotronic.ch. 300 IN RRSIG DNSKEY 5 2 300 20150125003700 20141226001657 17430 ingotronic.ch. mEwZjhQqeWksWD0TCnNBrtce4YkWJL3edqL6PvAUu8Fn+Ih437kEs3+pqdkgRsdYQ9HW+lBm/8pWwJlNAv0bi9NykItXMwAUFtncgq+6Pnh3iAM972GXSa5VV4LcGQ5b8CBdHCHiEKDqyPv5Hr5QfYL/FQaWlcNRh4QZZlZNPFA=
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 940 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 16136
;; flags: qr aa rd ra cd ; qd: 1 an: 3 au: 0 ad: 1
;; QUESTIONS:
;; nsec3.ingotronic.ch., type = DS, class = IN
;; ANSWERS:
nsec3.ingotronic.ch. 300 IN DS 16758 7 1 1720FF268E09A2CB63805EC8782D10AAD20E12A5
nsec3.ingotronic.ch. 300 IN DS 16758 7 2 3C8DC02750A1636F829B45D6E6D642866768A9CD40A013AD9D25AB63734FFA13
nsec3.ingotronic.ch. 300 IN RRSIG DS 5 3 300 20150125011134 20141226002644 17430 ingotronic.ch. hNurzlGhlyHbSgezPDuhIrtN9ZMsMXZbKGc7HD5rUuM88wD3fM97NxdzF+2Hi1USvBZ5GsQv63L+lAzf+mFPBoPIFHtTiAv8up7kQKRKmi/EzzkCYd/CC4UYdDZbaUyv7esh7spSOGwjPJNdK831p+MgltoWaYtnSGVMgOKk5mc=
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 305 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 40073
;; flags: qr aa rd ra cd ; qd: 1 an: 4 au: 0 ad: 1
;; QUESTIONS:
;; nsec3.ingotronic.ch., type = DNSKEY, class = IN
;; ANSWERS:
nsec3.ingotronic.ch. 300 IN DNSKEY 257 3 7 AwEAAaBuJTf9oGyeTH3biUkAFLrsYrkodX1H7Snsui4XsDHFCBvs5XYacHbs0Jg0/O51KPjmNnjwMW8SSyDkKqYQ+9uYAf2EQ/pnD/VGQqnV2cw0Vwk/t0E2V4FUCju4pnAoyzZFZXGs1eWbX9JXu++b0Azp+ACq6485qJLzHhWDiIrPoK/SvdbFVRK4s+nPPJLH3NGBbtdz6kPq7aFWYBMoGeAZdN1wsQpcNWUo5eOmaJY53nMc7+rDpAyYlMe/FKwSZdX2ZDd63Qsa6Im4FVUJq/nWLq7tlQ/mWks15uDTQyJy/OWfA0ICCO4N9Fel9rThJNpJWEzOCblvZyBoy405kZk=
nsec3.ingotronic.ch. 300 IN DNSKEY 256 3 7 AwEAAccAWxkTVGZ6UAp0VEozAlYpARhbh6Y6tYOl6Fg3UeBNFFtDQ9fTEEt1NkbnR9u8KkpVN6a67avlYiUN1egDqEwzDU7R1Rw+/USdhm2hqOARmmu3DBgjjX/iXjZLyv310cOGFJZ/smcodlDL4pDAAoPxh/qs6KEBaT0sc1KWcGq3
nsec3.ingotronic.ch. 300 IN RRSIG DNSKEY 7 3 300 20150125001457 20141226000444 16758 nsec3.ingotronic.ch. mXi1ylDi8XkRPup+YlT8GPdYE+P7gb6+/VdAwtodI916IzrkGkOHOTLbnrbAqqJOh0HxVCYXdxovmEcbJKUFKwplrQg3XD7/9Sq4pKU1MhMFEGrm/QPkM4u0mgjQwyToDLGuPHuFyur3FSjO/n54uGhAEft9JOFk/WKtWdCnm2LLyQrpC6herA3efFaI8kZhdoEY02AwihWVJxHasmz7lOoKRgNrkfELU+fN4+V7ISsRfJMyZc6q5PuNeG6vFD0uNE8tpdLJCSMurKYVpelvYqzFIcRTYcIjXwmS+L3DGjupqWMzFZVmpQM62JG3KCCD0ffpnNb0nWoSoHwpSeh/3Q==
nsec3.ingotronic.ch. 300 IN RRSIG DNSKEY 7 3 300 20150125001457 20141226000444 62417 nsec3.ingotronic.ch. PyCrf8T5dAfJzapb1p+kcTALPjDuD2niSaXXo0KeHAunT+6gJicLML2S/ZpiYr7X7Ma4Z0TYqE02qH6pcLYNnSgv9BE8sZO0nRtPekSyTy5nLi4hFADYhjb3UjaB85qmQZcqm64vC/CJhWO4t6Eixg/5MYALw+Qdy5Fo0qy/U5E=
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 958 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 36997
;; flags: qr rd ra ad cd ; qd: 1 an: 4 au: 0 ad: 1
;; QUESTIONS:
;; ., type = DNSKEY, class = IN
;; ANSWERS:
. 87364 IN DNSKEY 256 3 8 AwEAAe3fSrbLBy3LOS7pnxEUhvPZTE2H5dIGsI/UfruI/nOEvWWa/PSX2BFedBkEqOlYdjdNF2f+6lmfk2Od/xu0v5bVqxFE+/24v3hZSlWBxvXzPTAGHrbW/IJYEPqlzVOAS4XdUgHg0N7IbLywNHMvB+Yf+Nm6ctyXXFLV4WTNnzs7
. 87364 IN DNSKEY 256 3 8 AwEAAaPD7Y7XIi1MOEREJNTrRhyqsY3gff6JWzg+XCbqut1sbcbvqyssHw8DT1AkRaAC92pO8xuyq5QEgEPL1IHfABLwpwXI5gTj4gdwi86bpkmlWs9fRpnn4DPDCTdrnxIejJXgClHikLJF3u3CdpNCMijq4CKdQbMlRZ3avv+G7rh7
. 87364 IN DNSKEY 257 3 8 AwEAAagAIKlVZrpC6Ia7gEzahOR+9W29euxhJhVVLOyQbSEW0O8gcCjFFVQUTf6v58fLjwBd0YI0EzrAcQqBGCzh/RStIoO8g0NfnfL2MTJRkxoXbfDaUeVPQuYEhg37NZWAJQ9VnMVDxP/VHL496M/QZxkjf5/Efucp2gaDX6RS6CXpoY68LsvPVjR0ZSwzz1apAzvN9dlzEheX7ICJBBtuA6G3LQpzW5hOA2hzCTMjJPJ8LbqF6dsV6DoBQzgul0sGIcGOYl7OyQdXfZ57relSQageu+ipAdTTJ25AsRTAoub8ONGcLmqrAmRLKBP1dfwhYB4N7knNnulqQxA+Uk1ihz0=
. 87364 IN RRSIG DNSKEY 8 0 172800 20150115235959 20150101000000 19036 . i8cAxD2pvQi1oAyvQxRpDfFlbqPzW+69QQEsDwE1eWOm5AtawO9U7lmsGps7sy/fVNvl1ljKBj4Djp9pb3U2FLogjiIlW0cDAkPmLlG9t+b/pjEfBNlhjANUVN06pvQVAfm+LcF26EaWT6FlISBqb6jSy4BHRa3Bdc4Sx7+pRSYSqVVvYxLkfAWsKPqGkvWhebJDndJJV9syXQXgZ+v/uJ+6XOS43xkAdeL8iBzIs/FlwMTfh3tVe3d0lb65IBBLlCzeQuetX+0Vu1YFcnD0mHc/wS2ZnAV5toAFmyVQBoY/XAZiZeaOkcROJ6Zmqezy7liwK7BqsYyAZntMhk8lbg==
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 883 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 49791
;; flags: qr rd ra ad cd ; qd: 1 an: 2 au: 0 ad: 1
;; QUESTIONS:
;; ch., type = DS, class = IN
;; ANSWERS:
ch. 964 IN DS 46375 8 2 8F96646FC68BB7E4AF4C0750A6096FBC0D4ECDA3D3FA6DA06FDDB42EE50C6CF3
ch. 964 IN RRSIG DS 8 1 86400 20150112170000 20150105160000 16665 . thY7xYWBBxiBjqbQIb9fAG4TmQgnziwM7q6P1T3/ITxmECdvOCQnnZA3uD7qmN8uM0HudsD7+y+zgD3rsH4RSTKdL4kHSI0OnCxToMTvklghEgFDezqIRm8NkWdI2H4Stwrj20nYKSpLQxPI2EE54gs18P3KyO8bAUYv8Qx73xU=
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 238 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 8607
;; flags: qr rd ra ad cd ; qd: 1 an: 4 au: 0 ad: 1
;; QUESTIONS:
;; ch., type = DNSKEY, class = IN
;; ANSWERS:
ch. 964 IN DNSKEY 257 3 8 AwEAAb7GhhZ8IAy/AhwmSms5DeQK5ad09wIIplEpYoiAIYXPtJvT1ReFzyfTp/2YP+g/PWDwHPh4qKAHa9x0VgbIQcGAeNakmfkAdWEmCnca323/SAml3mwfaX62G7/uYWae5zh8QTxZKNd+K1yZ5x0IxnI31chSl5xymRbTEHYZDKwSIRFM3fTxUMt93WFaBVWELReYotJBr++rvAWdnlay5TPBTvheLBkaiqtgM4GP8HK07Y+86lsZnEsj5K3G1KTV5SPpa82rqYAwxG9VKbmSE/6/kBR5jJHjt1rRt5Oe7v18aEtw0YCEN4vxq+KuvMoNVqXUsE9LBwHJD+QNwi6wmB0=
ch. 964 IN DNSKEY 256 3 8 AwEAAcSLdT0fEmcFmLpeUkAJoeVaHKiu+nbuc43fWlqaCRVf8t2HA4uWxOk0O5ci9nrFTc8nq8oa5fk5Cj7CHh4yrX9qUCfTdIWTyp8BDEdJpS+Dyb0u9wQuVj+nQMj4fLzdQf4TJs3/qxuiLr3nL1UUwlhhXeqSqGVb7p3mtB5HJ8ad
ch. 964 IN DNSKEY 256 3 8 AwEAAcsg0kY6fw1wzYMhSAKTy+Y2JzAst66P/1odp9NECJJHbU8f4nwziI3onoFSBV0ZiSZhY1aH5dhdDZ7BkrqhVXSrZPAz0CvzjIxmB1gSOf9DeZvjQvoy97HqYolxsf+B3QQv2RKBT67elF5+JisKg3/dQISelKn8LhabSoVrMlD1
ch. 964 IN RRSIG DNSKEY 8 1 86400 20150127100909 20141212090909 46375 ch. bT8q0FWyeMH0SulNo6UdIIgZYNATwYsee2bikq2Gh339Bufma8eaqWIPYT3XKmxYPBFOw0bVl+kLZxTwbR1CFoCDXoP+qgQhh4mf9qkNiv2CDSc+0FE3FRREn+DAhYTUEuB58FPiPakFB8s8O7T+k2qhDae7jy4/y7Jl1lnjaBY8s7bzOUPhF0KKCNZmvoKwtL23ZdVeTSV1xM3jkiNnpzBKbcoSWECSGJVp1SE0BnRXdwQP41YTXFZ0310YjaTAUCC5qbMIWdEkHjfdSQtKBImnc85mkapq9w++XQ4zhauPWBtrPV3CcoCahjUaWdjrKVkibomlJZaN8MEO23CfQw==
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 893 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 534
;; flags: qr rd ra cd ; qd: 1 an: 3 au: 0 ad: 1
;; QUESTIONS:
;; ingotronic.ch., type = DS, class = IN
;; ANSWERS:
ingotronic.ch. 3572 IN DS 6031 5 2 4A948F2FDADA24686E473EDAC00DCF972584C75E3FAA92C2021B6221449FF87E
ingotronic.ch. 3572 IN DS 6031 5 1 733D0218B571CD617B1A7493564B9FC4F12ADE82
ingotronic.ch. 3572 IN RRSIG DS 8 2 3600 20150129033614 20150105123019 60789 ch. rVPJP2HhzW7OkroK2axFj5Lb4iVWCH8Fp/Iq1rF952NDo72b8RiKje2RaAKJAGQ+wd0YgE+PAej04GCmkhlDJA/zvPeeTxuhy3HbJzReMlQ7fjyH+wW1hli+FuIYvogXWf7nO/9VyPORt8X/f/pjrOr3Vlj9sGLN8TGYpEuVSw4=
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 288 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 33596
;; flags: qr aa rd ra cd ; qd: 1 an: 4 au: 0 ad: 1
;; QUESTIONS:
;; ingotronic.ch., type = DNSKEY, class = IN
;; ANSWERS:
ingotronic.ch. 300 IN DNSKEY 257 3 5 AwEAAeA1vzmjaB+eBAcvhzpKEgAEFpvQ1rg4uKDW6MsQtacKoqBpgyep2+LuWotz5p/xYxj3NGsArwN8Ad5cY0FHRr8miTT0elOv6nvlqGIfRuhj/BXAQ1x4ihpSFslHw0lJMYFwxsUZWpUyjWX/nv1xRZMMwF46gui0N4OEbyTYusCk77D+A71k+K0EAitFIbIH4GCUKmH1H7HmXhSVH9bN/n7KEGwW32lmsuuUcJoRKDkcUvbMXY/9Xoa2quERrUg/rBbDUHowRPjYDS5GzY1+f4YY8s40BufGiqyUTKKXL953MVFK8gmezXA0hbmrnZ7CBOw/7238mORAdzExaX8n7CE=
ingotronic.ch. 300 IN DNSKEY 256 3 5 AwEAAZ2Xh77GFzpEDx7EHYxShqltHgkiG+BOjBGifEmnJhQSdE5/yNSLFNcdhZZ8HUPxYnaedTqJcFFg4AzUsQklF/fECegTJdZjaj2WoL0/I8K7HMfY/hVuRZUWPNglYi8agJRX6gdkFTCpUNI7stpgKqxtzUJhhw15uG/lKMplwqUr
ingotronic.ch. 300 IN RRSIG DNSKEY 5 2 300 20150125003700 20141226001657 6031 ingotronic.ch. rs1QlP2SlSpA2ELbzwg3DgWLzXWL3Lpv6CUJE2Q0qH2Zp7Qdy3cD+ZEtNh9v24Qv1M6JJ3zFt8mmZoCeW2ycuMbJCqBkW9CBuwF+VznZvZY2MxwPipvhvEEGP//0M8YAZJ66yQPDv3PTdAP8FYbIrJyvY44vwyncwbslpfHT9jAsrbfr3vuMuWps86dnP462q+0s1TxBfqi8mzo3gdavjHKWVNwohLahLKT+tWeu6DSzQv0YwMjwtkLgF7QRgx3ctIIkloOrnx9nHH1N6y+hxEB89fOlyVDjHhgL5uVtsD5fEdT0FJ2Gc/2nShEMMqIwr1/J9kUq1mNySff/uEe65Q==
ingotronic.ch. 300 IN RRSIG DNSKEY 5 2 300 20150125003700 20141226001657 17430 ingotronic.ch. mEwZjhQqeWksWD0TCnNBrtce4YkWJL3edqL6PvAUu8Fn+Ih437kEs3+pqdkgRsdYQ9HW+lBm/8pWwJlNAv0bi9NykItXMwAUFtncgq+6Pnh3iAM972GXSa5VV4LcGQ5b8CBdHCHiEKDqyPv5Hr5QfYL/FQaWlcNRh4QZZlZNPFA=
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 940 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 33074
;; flags: qr aa rd ra cd ; qd: 1 an: 3 au: 0 ad: 1
;; QUESTIONS:
;; nsec3.ingotronic.ch., type = DS, class = IN
;; ANSWERS:
nsec3.ingotronic.ch. 300 IN DS 16758 7 1 1720FF268E09A2CB63805EC8782D10AAD20E12A5
nsec3.ingotronic.ch. 300 IN DS 16758 7 2 3C8DC02750A1636F829B45D6E6D642866768A9CD40A013AD9D25AB63734FFA13
nsec3.ingotronic.ch. 300 IN RRSIG DS 5 3 300 20150125011134 20141226002644 17430 ingotronic.ch. hNurzlGhlyHbSgezPDuhIrtN9ZMsMXZbKGc7HD5rUuM88wD3fM97NxdzF+2Hi1USvBZ5GsQv63L+lAzf+mFPBoPIFHtTiAv8up7kQKRKmi/EzzkCYd/CC4UYdDZbaUyv7esh7spSOGwjPJNdK831p+MgltoWaYtnSGVMgOKk5mc=
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 305 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 40277
;; flags: qr aa rd ra cd ; qd: 1 an: 4 au: 0 ad: 1
;; QUESTIONS:
;; nsec3.ingotronic.ch., type = DNSKEY, class = IN
;; ANSWERS:
nsec3.ingotronic.ch. 300 IN DNSKEY 257 3 7 AwEAAaBuJTf9oGyeTH3biUkAFLrsYrkodX1H7Snsui4XsDHFCBvs5XYacHbs0Jg0/O51KPjmNnjwMW8SSyDkKqYQ+9uYAf2EQ/pnD/VGQqnV2cw0Vwk/t0E2V4FUCju4pnAoyzZFZXGs1eWbX9JXu++b0Azp+ACq6485qJLzHhWDiIrPoK/SvdbFVRK4s+nPPJLH3NGBbtdz6kPq7aFWYBMoGeAZdN1wsQpcNWUo5eOmaJY53nMc7+rDpAyYlMe/FKwSZdX2ZDd63Qsa6Im4FVUJq/nWLq7tlQ/mWks15uDTQyJy/OWfA0ICCO4N9Fel9rThJNpJWEzOCblvZyBoy405kZk=
nsec3.ingotronic.ch. 300 IN DNSKEY 256 3 7 AwEAAccAWxkTVGZ6UAp0VEozAlYpARhbh6Y6tYOl6Fg3UeBNFFtDQ9fTEEt1NkbnR9u8KkpVN6a67avlYiUN1egDqEwzDU7R1Rw+/USdhm2hqOARmmu3DBgjjX/iXjZLyv310cOGFJZ/smcodlDL4pDAAoPxh/qs6KEBaT0sc1KWcGq3
nsec3.ingotronic.ch. 300 IN RRSIG DNSKEY 7 3 300 20150125001457 20141226000444 16758 nsec3.ingotronic.ch. mXi1ylDi8XkRPup+YlT8GPdYE+P7gb6+/VdAwtodI916IzrkGkOHOTLbnrbAqqJOh0HxVCYXdxovmEcbJKUFKwplrQg3XD7/9Sq4pKU1MhMFEGrm/QPkM4u0mgjQwyToDLGuPHuFyur3FSjO/n54uGhAEft9JOFk/WKtWdCnm2LLyQrpC6herA3efFaI8kZhdoEY02AwihWVJxHasmz7lOoKRgNrkfELU+fN4+V7ISsRfJMyZc6q5PuNeG6vFD0uNE8tpdLJCSMurKYVpelvYqzFIcRTYcIjXwmS+L3DGjupqWMzFZVmpQM62JG3KCCD0ffpnNb0nWoSoHwpSeh/3Q==
nsec3.ingotronic.ch. 300 IN RRSIG DNSKEY 7 3 300 20150125001457 20141226000444 62417 nsec3.ingotronic.ch. PyCrf8T5dAfJzapb1p+kcTALPjDuD2niSaXXo0KeHAunT+6gJicLML2S/ZpiYr7X7Ma4Z0TYqE02qH6pcLYNnSgv9BE8sZO0nRtPekSyTy5nLi4hFADYhjb3UjaB85qmQZcqm64vC/CJhWO4t6Eixg/5MYALw+Qdy5Fo0qy/U5E=
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 958 bytes
###############################################
testFakedNoDataNsec3WithoutNsecs 0000664 0000000 0000000 00000045411 13020541473 0035317 0 ustar 00root root 0000000 0000000 dnssecjava-1.1.3/src/test/resources/recordings/org_jitsi_dnssec_TestNoData #Date: 2015-01-06T22:35:10+01:00
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 18486
;; flags: qr aa rd ra cd ; qd: 1 an: 2 au: 2 ad: 3
;; QUESTIONS:
;; www.nsec3.ingotronic.ch., type = A, class = IN
;; ANSWERS:
www.nsec3.ingotronic.ch. 300 IN A 127.0.0.1
www.nsec3.ingotronic.ch. 300 IN RRSIG A 7 4 300 20150125011553 20141226004758 62417 nsec3.ingotronic.ch. jQhCY33aj9YTcCTHgl71PhM02o2LL6tdTy5M8TQw/Kt8D7wHxjVpu75eT9XEaM3abIqvygero5hCxyPW6IfF+FKmdx3MNigQiaB2sKu2XDNmFMbaucmVAWDRDMRY1BFavjz316JSb0rXX3XcS/ixbj9+jAm9lCXROcuzmOPB7vw=
;; AUTHORITY RECORDS:
nsec3.ingotronic.ch. 300 IN NS ns1.ingotronic.ch.
nsec3.ingotronic.ch. 300 IN RRSIG NS 7 3 300 20150125010458 20141226002309 62417 nsec3.ingotronic.ch. fl2Q0YQQ1TduolGLyQx8vGqSApoBbb6A+go5SLFBYQobrPfO/rb+SM8JvnlzNX/Xa7dRhDYrnfBTFUm1mCur9aIi34gu5UwDNQvt/GXY5dC3+DEy/28bTZ43UuCs+qGH9u9leFwGX4neFNl0s5B4RpxBN4is8dXMUvOda6QcsOw=
;; ADDITIONAL RECORDS:
ns1.ingotronic.ch. 300 IN A 62.192.5.131
ns1.ingotronic.ch. 300 IN RRSIG A 5 3 300 20150125005754 20141226001054 17430 ingotronic.ch. fNG1RZM53pXwBxruHNaSZszxVzNLoCq8VZsTjAzYH2vSLzHXYVGJFTLIeY0K9APAdyJU8WuwmABmn7XY0Kg39kRG77uoFlqUws2PdTz2QKOwJGZY7W88Ak2Y9lkDBcK8o3wJHVptrT8R7p/1U7UfjF0kqPUkakk2B0EbFWdagFg=
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 633 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 23218
;; flags: qr rd ra ad cd ; qd: 1 an: 4 au: 0 ad: 1
;; QUESTIONS:
;; ., type = DNSKEY, class = IN
;; ANSWERS:
. 87363 IN DNSKEY 256 3 8 AwEAAe3fSrbLBy3LOS7pnxEUhvPZTE2H5dIGsI/UfruI/nOEvWWa/PSX2BFedBkEqOlYdjdNF2f+6lmfk2Od/xu0v5bVqxFE+/24v3hZSlWBxvXzPTAGHrbW/IJYEPqlzVOAS4XdUgHg0N7IbLywNHMvB+Yf+Nm6ctyXXFLV4WTNnzs7
. 87363 IN DNSKEY 256 3 8 AwEAAaPD7Y7XIi1MOEREJNTrRhyqsY3gff6JWzg+XCbqut1sbcbvqyssHw8DT1AkRaAC92pO8xuyq5QEgEPL1IHfABLwpwXI5gTj4gdwi86bpkmlWs9fRpnn4DPDCTdrnxIejJXgClHikLJF3u3CdpNCMijq4CKdQbMlRZ3avv+G7rh7
. 87363 IN DNSKEY 257 3 8 AwEAAagAIKlVZrpC6Ia7gEzahOR+9W29euxhJhVVLOyQbSEW0O8gcCjFFVQUTf6v58fLjwBd0YI0EzrAcQqBGCzh/RStIoO8g0NfnfL2MTJRkxoXbfDaUeVPQuYEhg37NZWAJQ9VnMVDxP/VHL496M/QZxkjf5/Efucp2gaDX6RS6CXpoY68LsvPVjR0ZSwzz1apAzvN9dlzEheX7ICJBBtuA6G3LQpzW5hOA2hzCTMjJPJ8LbqF6dsV6DoBQzgul0sGIcGOYl7OyQdXfZ57relSQageu+ipAdTTJ25AsRTAoub8ONGcLmqrAmRLKBP1dfwhYB4N7knNnulqQxA+Uk1ihz0=
. 87363 IN RRSIG DNSKEY 8 0 172800 20150115235959 20150101000000 19036 . i8cAxD2pvQi1oAyvQxRpDfFlbqPzW+69QQEsDwE1eWOm5AtawO9U7lmsGps7sy/fVNvl1ljKBj4Djp9pb3U2FLogjiIlW0cDAkPmLlG9t+b/pjEfBNlhjANUVN06pvQVAfm+LcF26EaWT6FlISBqb6jSy4BHRa3Bdc4Sx7+pRSYSqVVvYxLkfAWsKPqGkvWhebJDndJJV9syXQXgZ+v/uJ+6XOS43xkAdeL8iBzIs/FlwMTfh3tVe3d0lb65IBBLlCzeQuetX+0Vu1YFcnD0mHc/wS2ZnAV5toAFmyVQBoY/XAZiZeaOkcROJ6Zmqezy7liwK7BqsYyAZntMhk8lbg==
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 883 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 56313
;; flags: qr rd ra ad cd ; qd: 1 an: 2 au: 0 ad: 1
;; QUESTIONS:
;; ch., type = DS, class = IN
;; ANSWERS:
ch. 963 IN DS 46375 8 2 8F96646FC68BB7E4AF4C0750A6096FBC0D4ECDA3D3FA6DA06FDDB42EE50C6CF3
ch. 963 IN RRSIG DS 8 1 86400 20150112170000 20150105160000 16665 . thY7xYWBBxiBjqbQIb9fAG4TmQgnziwM7q6P1T3/ITxmECdvOCQnnZA3uD7qmN8uM0HudsD7+y+zgD3rsH4RSTKdL4kHSI0OnCxToMTvklghEgFDezqIRm8NkWdI2H4Stwrj20nYKSpLQxPI2EE54gs18P3KyO8bAUYv8Qx73xU=
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 238 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 32662
;; flags: qr rd ra ad cd ; qd: 1 an: 4 au: 0 ad: 1
;; QUESTIONS:
;; ch., type = DNSKEY, class = IN
;; ANSWERS:
ch. 964 IN DNSKEY 256 3 8 AwEAAcsg0kY6fw1wzYMhSAKTy+Y2JzAst66P/1odp9NECJJHbU8f4nwziI3onoFSBV0ZiSZhY1aH5dhdDZ7BkrqhVXSrZPAz0CvzjIxmB1gSOf9DeZvjQvoy97HqYolxsf+B3QQv2RKBT67elF5+JisKg3/dQISelKn8LhabSoVrMlD1
ch. 964 IN DNSKEY 256 3 8 AwEAAcSLdT0fEmcFmLpeUkAJoeVaHKiu+nbuc43fWlqaCRVf8t2HA4uWxOk0O5ci9nrFTc8nq8oa5fk5Cj7CHh4yrX9qUCfTdIWTyp8BDEdJpS+Dyb0u9wQuVj+nQMj4fLzdQf4TJs3/qxuiLr3nL1UUwlhhXeqSqGVb7p3mtB5HJ8ad
ch. 964 IN DNSKEY 257 3 8 AwEAAb7GhhZ8IAy/AhwmSms5DeQK5ad09wIIplEpYoiAIYXPtJvT1ReFzyfTp/2YP+g/PWDwHPh4qKAHa9x0VgbIQcGAeNakmfkAdWEmCnca323/SAml3mwfaX62G7/uYWae5zh8QTxZKNd+K1yZ5x0IxnI31chSl5xymRbTEHYZDKwSIRFM3fTxUMt93WFaBVWELReYotJBr++rvAWdnlay5TPBTvheLBkaiqtgM4GP8HK07Y+86lsZnEsj5K3G1KTV5SPpa82rqYAwxG9VKbmSE/6/kBR5jJHjt1rRt5Oe7v18aEtw0YCEN4vxq+KuvMoNVqXUsE9LBwHJD+QNwi6wmB0=
ch. 964 IN RRSIG DNSKEY 8 1 86400 20150127100909 20141212090909 46375 ch. bT8q0FWyeMH0SulNo6UdIIgZYNATwYsee2bikq2Gh339Bufma8eaqWIPYT3XKmxYPBFOw0bVl+kLZxTwbR1CFoCDXoP+qgQhh4mf9qkNiv2CDSc+0FE3FRREn+DAhYTUEuB58FPiPakFB8s8O7T+k2qhDae7jy4/y7Jl1lnjaBY8s7bzOUPhF0KKCNZmvoKwtL23ZdVeTSV1xM3jkiNnpzBKbcoSWECSGJVp1SE0BnRXdwQP41YTXFZ0310YjaTAUCC5qbMIWdEkHjfdSQtKBImnc85mkapq9w++XQ4zhauPWBtrPV3CcoCahjUaWdjrKVkibomlJZaN8MEO23CfQw==
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 893 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 64353
;; flags: qr rd ra cd ; qd: 1 an: 3 au: 0 ad: 1
;; QUESTIONS:
;; ingotronic.ch., type = DS, class = IN
;; ANSWERS:
ingotronic.ch. 3572 IN DS 6031 5 1 733D0218B571CD617B1A7493564B9FC4F12ADE82
ingotronic.ch. 3572 IN DS 6031 5 2 4A948F2FDADA24686E473EDAC00DCF972584C75E3FAA92C2021B6221449FF87E
ingotronic.ch. 3572 IN RRSIG DS 8 2 3600 20150129033614 20150105123019 60789 ch. rVPJP2HhzW7OkroK2axFj5Lb4iVWCH8Fp/Iq1rF952NDo72b8RiKje2RaAKJAGQ+wd0YgE+PAej04GCmkhlDJA/zvPeeTxuhy3HbJzReMlQ7fjyH+wW1hli+FuIYvogXWf7nO/9VyPORt8X/f/pjrOr3Vlj9sGLN8TGYpEuVSw4=
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 288 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 13626
;; flags: qr aa rd ra cd ; qd: 1 an: 4 au: 0 ad: 1
;; QUESTIONS:
;; ingotronic.ch., type = DNSKEY, class = IN
;; ANSWERS:
ingotronic.ch. 300 IN DNSKEY 256 3 5 AwEAAZ2Xh77GFzpEDx7EHYxShqltHgkiG+BOjBGifEmnJhQSdE5/yNSLFNcdhZZ8HUPxYnaedTqJcFFg4AzUsQklF/fECegTJdZjaj2WoL0/I8K7HMfY/hVuRZUWPNglYi8agJRX6gdkFTCpUNI7stpgKqxtzUJhhw15uG/lKMplwqUr
ingotronic.ch. 300 IN DNSKEY 257 3 5 AwEAAeA1vzmjaB+eBAcvhzpKEgAEFpvQ1rg4uKDW6MsQtacKoqBpgyep2+LuWotz5p/xYxj3NGsArwN8Ad5cY0FHRr8miTT0elOv6nvlqGIfRuhj/BXAQ1x4ihpSFslHw0lJMYFwxsUZWpUyjWX/nv1xRZMMwF46gui0N4OEbyTYusCk77D+A71k+K0EAitFIbIH4GCUKmH1H7HmXhSVH9bN/n7KEGwW32lmsuuUcJoRKDkcUvbMXY/9Xoa2quERrUg/rBbDUHowRPjYDS5GzY1+f4YY8s40BufGiqyUTKKXL953MVFK8gmezXA0hbmrnZ7CBOw/7238mORAdzExaX8n7CE=
ingotronic.ch. 300 IN RRSIG DNSKEY 5 2 300 20150125003700 20141226001657 6031 ingotronic.ch. rs1QlP2SlSpA2ELbzwg3DgWLzXWL3Lpv6CUJE2Q0qH2Zp7Qdy3cD+ZEtNh9v24Qv1M6JJ3zFt8mmZoCeW2ycuMbJCqBkW9CBuwF+VznZvZY2MxwPipvhvEEGP//0M8YAZJ66yQPDv3PTdAP8FYbIrJyvY44vwyncwbslpfHT9jAsrbfr3vuMuWps86dnP462q+0s1TxBfqi8mzo3gdavjHKWVNwohLahLKT+tWeu6DSzQv0YwMjwtkLgF7QRgx3ctIIkloOrnx9nHH1N6y+hxEB89fOlyVDjHhgL5uVtsD5fEdT0FJ2Gc/2nShEMMqIwr1/J9kUq1mNySff/uEe65Q==
ingotronic.ch. 300 IN RRSIG DNSKEY 5 2 300 20150125003700 20141226001657 17430 ingotronic.ch. mEwZjhQqeWksWD0TCnNBrtce4YkWJL3edqL6PvAUu8Fn+Ih437kEs3+pqdkgRsdYQ9HW+lBm/8pWwJlNAv0bi9NykItXMwAUFtncgq+6Pnh3iAM972GXSa5VV4LcGQ5b8CBdHCHiEKDqyPv5Hr5QfYL/FQaWlcNRh4QZZlZNPFA=
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 940 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 48927
;; flags: qr aa rd ra cd ; qd: 1 an: 3 au: 0 ad: 1
;; QUESTIONS:
;; nsec3.ingotronic.ch., type = DS, class = IN
;; ANSWERS:
nsec3.ingotronic.ch. 300 IN DS 16758 7 1 1720FF268E09A2CB63805EC8782D10AAD20E12A5
nsec3.ingotronic.ch. 300 IN DS 16758 7 2 3C8DC02750A1636F829B45D6E6D642866768A9CD40A013AD9D25AB63734FFA13
nsec3.ingotronic.ch. 300 IN RRSIG DS 5 3 300 20150125011134 20141226002644 17430 ingotronic.ch. hNurzlGhlyHbSgezPDuhIrtN9ZMsMXZbKGc7HD5rUuM88wD3fM97NxdzF+2Hi1USvBZ5GsQv63L+lAzf+mFPBoPIFHtTiAv8up7kQKRKmi/EzzkCYd/CC4UYdDZbaUyv7esh7spSOGwjPJNdK831p+MgltoWaYtnSGVMgOKk5mc=
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 305 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 49642
;; flags: qr aa rd ra cd ; qd: 1 an: 4 au: 0 ad: 1
;; QUESTIONS:
;; nsec3.ingotronic.ch., type = DNSKEY, class = IN
;; ANSWERS:
nsec3.ingotronic.ch. 300 IN DNSKEY 256 3 7 AwEAAccAWxkTVGZ6UAp0VEozAlYpARhbh6Y6tYOl6Fg3UeBNFFtDQ9fTEEt1NkbnR9u8KkpVN6a67avlYiUN1egDqEwzDU7R1Rw+/USdhm2hqOARmmu3DBgjjX/iXjZLyv310cOGFJZ/smcodlDL4pDAAoPxh/qs6KEBaT0sc1KWcGq3
nsec3.ingotronic.ch. 300 IN DNSKEY 257 3 7 AwEAAaBuJTf9oGyeTH3biUkAFLrsYrkodX1H7Snsui4XsDHFCBvs5XYacHbs0Jg0/O51KPjmNnjwMW8SSyDkKqYQ+9uYAf2EQ/pnD/VGQqnV2cw0Vwk/t0E2V4FUCju4pnAoyzZFZXGs1eWbX9JXu++b0Azp+ACq6485qJLzHhWDiIrPoK/SvdbFVRK4s+nPPJLH3NGBbtdz6kPq7aFWYBMoGeAZdN1wsQpcNWUo5eOmaJY53nMc7+rDpAyYlMe/FKwSZdX2ZDd63Qsa6Im4FVUJq/nWLq7tlQ/mWks15uDTQyJy/OWfA0ICCO4N9Fel9rThJNpJWEzOCblvZyBoy405kZk=
nsec3.ingotronic.ch. 300 IN RRSIG DNSKEY 7 3 300 20150125001457 20141226000444 16758 nsec3.ingotronic.ch. mXi1ylDi8XkRPup+YlT8GPdYE+P7gb6+/VdAwtodI916IzrkGkOHOTLbnrbAqqJOh0HxVCYXdxovmEcbJKUFKwplrQg3XD7/9Sq4pKU1MhMFEGrm/QPkM4u0mgjQwyToDLGuPHuFyur3FSjO/n54uGhAEft9JOFk/WKtWdCnm2LLyQrpC6herA3efFaI8kZhdoEY02AwihWVJxHasmz7lOoKRgNrkfELU+fN4+V7ISsRfJMyZc6q5PuNeG6vFD0uNE8tpdLJCSMurKYVpelvYqzFIcRTYcIjXwmS+L3DGjupqWMzFZVmpQM62JG3KCCD0ffpnNb0nWoSoHwpSeh/3Q==
nsec3.ingotronic.ch. 300 IN RRSIG DNSKEY 7 3 300 20150125001457 20141226000444 62417 nsec3.ingotronic.ch. PyCrf8T5dAfJzapb1p+kcTALPjDuD2niSaXXo0KeHAunT+6gJicLML2S/ZpiYr7X7Ma4Z0TYqE02qH6pcLYNnSgv9BE8sZO0nRtPekSyTy5nLi4hFADYhjb3UjaB85qmQZcqm64vC/CJhWO4t6Eixg/5MYALw+Qdy5Fo0qy/U5E=
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 958 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 25015
;; flags: qr rd ra ad cd ; qd: 1 an: 4 au: 0 ad: 1
;; QUESTIONS:
;; ., type = DNSKEY, class = IN
;; ANSWERS:
. 87363 IN DNSKEY 257 3 8 AwEAAagAIKlVZrpC6Ia7gEzahOR+9W29euxhJhVVLOyQbSEW0O8gcCjFFVQUTf6v58fLjwBd0YI0EzrAcQqBGCzh/RStIoO8g0NfnfL2MTJRkxoXbfDaUeVPQuYEhg37NZWAJQ9VnMVDxP/VHL496M/QZxkjf5/Efucp2gaDX6RS6CXpoY68LsvPVjR0ZSwzz1apAzvN9dlzEheX7ICJBBtuA6G3LQpzW5hOA2hzCTMjJPJ8LbqF6dsV6DoBQzgul0sGIcGOYl7OyQdXfZ57relSQageu+ipAdTTJ25AsRTAoub8ONGcLmqrAmRLKBP1dfwhYB4N7knNnulqQxA+Uk1ihz0=
. 87363 IN DNSKEY 256 3 8 AwEAAe3fSrbLBy3LOS7pnxEUhvPZTE2H5dIGsI/UfruI/nOEvWWa/PSX2BFedBkEqOlYdjdNF2f+6lmfk2Od/xu0v5bVqxFE+/24v3hZSlWBxvXzPTAGHrbW/IJYEPqlzVOAS4XdUgHg0N7IbLywNHMvB+Yf+Nm6ctyXXFLV4WTNnzs7
. 87363 IN DNSKEY 256 3 8 AwEAAaPD7Y7XIi1MOEREJNTrRhyqsY3gff6JWzg+XCbqut1sbcbvqyssHw8DT1AkRaAC92pO8xuyq5QEgEPL1IHfABLwpwXI5gTj4gdwi86bpkmlWs9fRpnn4DPDCTdrnxIejJXgClHikLJF3u3CdpNCMijq4CKdQbMlRZ3avv+G7rh7
. 87363 IN RRSIG DNSKEY 8 0 172800 20150115235959 20150101000000 19036 . i8cAxD2pvQi1oAyvQxRpDfFlbqPzW+69QQEsDwE1eWOm5AtawO9U7lmsGps7sy/fVNvl1ljKBj4Djp9pb3U2FLogjiIlW0cDAkPmLlG9t+b/pjEfBNlhjANUVN06pvQVAfm+LcF26EaWT6FlISBqb6jSy4BHRa3Bdc4Sx7+pRSYSqVVvYxLkfAWsKPqGkvWhebJDndJJV9syXQXgZ+v/uJ+6XOS43xkAdeL8iBzIs/FlwMTfh3tVe3d0lb65IBBLlCzeQuetX+0Vu1YFcnD0mHc/wS2ZnAV5toAFmyVQBoY/XAZiZeaOkcROJ6Zmqezy7liwK7BqsYyAZntMhk8lbg==
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 883 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 34587
;; flags: qr rd ra ad cd ; qd: 1 an: 2 au: 0 ad: 1
;; QUESTIONS:
;; ch., type = DS, class = IN
;; ANSWERS:
ch. 963 IN DS 46375 8 2 8F96646FC68BB7E4AF4C0750A6096FBC0D4ECDA3D3FA6DA06FDDB42EE50C6CF3
ch. 963 IN RRSIG DS 8 1 86400 20150112170000 20150105160000 16665 . thY7xYWBBxiBjqbQIb9fAG4TmQgnziwM7q6P1T3/ITxmECdvOCQnnZA3uD7qmN8uM0HudsD7+y+zgD3rsH4RSTKdL4kHSI0OnCxToMTvklghEgFDezqIRm8NkWdI2H4Stwrj20nYKSpLQxPI2EE54gs18P3KyO8bAUYv8Qx73xU=
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 238 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 19027
;; flags: qr rd ra ad cd ; qd: 1 an: 4 au: 0 ad: 1
;; QUESTIONS:
;; ch., type = DNSKEY, class = IN
;; ANSWERS:
ch. 964 IN DNSKEY 256 3 8 AwEAAcSLdT0fEmcFmLpeUkAJoeVaHKiu+nbuc43fWlqaCRVf8t2HA4uWxOk0O5ci9nrFTc8nq8oa5fk5Cj7CHh4yrX9qUCfTdIWTyp8BDEdJpS+Dyb0u9wQuVj+nQMj4fLzdQf4TJs3/qxuiLr3nL1UUwlhhXeqSqGVb7p3mtB5HJ8ad
ch. 964 IN DNSKEY 257 3 8 AwEAAb7GhhZ8IAy/AhwmSms5DeQK5ad09wIIplEpYoiAIYXPtJvT1ReFzyfTp/2YP+g/PWDwHPh4qKAHa9x0VgbIQcGAeNakmfkAdWEmCnca323/SAml3mwfaX62G7/uYWae5zh8QTxZKNd+K1yZ5x0IxnI31chSl5xymRbTEHYZDKwSIRFM3fTxUMt93WFaBVWELReYotJBr++rvAWdnlay5TPBTvheLBkaiqtgM4GP8HK07Y+86lsZnEsj5K3G1KTV5SPpa82rqYAwxG9VKbmSE/6/kBR5jJHjt1rRt5Oe7v18aEtw0YCEN4vxq+KuvMoNVqXUsE9LBwHJD+QNwi6wmB0=
ch. 964 IN DNSKEY 256 3 8 AwEAAcsg0kY6fw1wzYMhSAKTy+Y2JzAst66P/1odp9NECJJHbU8f4nwziI3onoFSBV0ZiSZhY1aH5dhdDZ7BkrqhVXSrZPAz0CvzjIxmB1gSOf9DeZvjQvoy97HqYolxsf+B3QQv2RKBT67elF5+JisKg3/dQISelKn8LhabSoVrMlD1
ch. 964 IN RRSIG DNSKEY 8 1 86400 20150127100909 20141212090909 46375 ch. bT8q0FWyeMH0SulNo6UdIIgZYNATwYsee2bikq2Gh339Bufma8eaqWIPYT3XKmxYPBFOw0bVl+kLZxTwbR1CFoCDXoP+qgQhh4mf9qkNiv2CDSc+0FE3FRREn+DAhYTUEuB58FPiPakFB8s8O7T+k2qhDae7jy4/y7Jl1lnjaBY8s7bzOUPhF0KKCNZmvoKwtL23ZdVeTSV1xM3jkiNnpzBKbcoSWECSGJVp1SE0BnRXdwQP41YTXFZ0310YjaTAUCC5qbMIWdEkHjfdSQtKBImnc85mkapq9w++XQ4zhauPWBtrPV3CcoCahjUaWdjrKVkibomlJZaN8MEO23CfQw==
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 893 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 6277
;; flags: qr rd ra cd ; qd: 1 an: 3 au: 0 ad: 1
;; QUESTIONS:
;; ingotronic.ch., type = DS, class = IN
;; ANSWERS:
ingotronic.ch. 3572 IN DS 6031 5 2 4A948F2FDADA24686E473EDAC00DCF972584C75E3FAA92C2021B6221449FF87E
ingotronic.ch. 3572 IN DS 6031 5 1 733D0218B571CD617B1A7493564B9FC4F12ADE82
ingotronic.ch. 3572 IN RRSIG DS 8 2 3600 20150129033614 20150105123019 60789 ch. rVPJP2HhzW7OkroK2axFj5Lb4iVWCH8Fp/Iq1rF952NDo72b8RiKje2RaAKJAGQ+wd0YgE+PAej04GCmkhlDJA/zvPeeTxuhy3HbJzReMlQ7fjyH+wW1hli+FuIYvogXWf7nO/9VyPORt8X/f/pjrOr3Vlj9sGLN8TGYpEuVSw4=
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 288 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 26423
;; flags: qr aa rd ra cd ; qd: 1 an: 4 au: 0 ad: 1
;; QUESTIONS:
;; ingotronic.ch., type = DNSKEY, class = IN
;; ANSWERS:
ingotronic.ch. 300 IN DNSKEY 257 3 5 AwEAAeA1vzmjaB+eBAcvhzpKEgAEFpvQ1rg4uKDW6MsQtacKoqBpgyep2+LuWotz5p/xYxj3NGsArwN8Ad5cY0FHRr8miTT0elOv6nvlqGIfRuhj/BXAQ1x4ihpSFslHw0lJMYFwxsUZWpUyjWX/nv1xRZMMwF46gui0N4OEbyTYusCk77D+A71k+K0EAitFIbIH4GCUKmH1H7HmXhSVH9bN/n7KEGwW32lmsuuUcJoRKDkcUvbMXY/9Xoa2quERrUg/rBbDUHowRPjYDS5GzY1+f4YY8s40BufGiqyUTKKXL953MVFK8gmezXA0hbmrnZ7CBOw/7238mORAdzExaX8n7CE=
ingotronic.ch. 300 IN DNSKEY 256 3 5 AwEAAZ2Xh77GFzpEDx7EHYxShqltHgkiG+BOjBGifEmnJhQSdE5/yNSLFNcdhZZ8HUPxYnaedTqJcFFg4AzUsQklF/fECegTJdZjaj2WoL0/I8K7HMfY/hVuRZUWPNglYi8agJRX6gdkFTCpUNI7stpgKqxtzUJhhw15uG/lKMplwqUr
ingotronic.ch. 300 IN RRSIG DNSKEY 5 2 300 20150125003700 20141226001657 6031 ingotronic.ch. rs1QlP2SlSpA2ELbzwg3DgWLzXWL3Lpv6CUJE2Q0qH2Zp7Qdy3cD+ZEtNh9v24Qv1M6JJ3zFt8mmZoCeW2ycuMbJCqBkW9CBuwF+VznZvZY2MxwPipvhvEEGP//0M8YAZJ66yQPDv3PTdAP8FYbIrJyvY44vwyncwbslpfHT9jAsrbfr3vuMuWps86dnP462q+0s1TxBfqi8mzo3gdavjHKWVNwohLahLKT+tWeu6DSzQv0YwMjwtkLgF7QRgx3ctIIkloOrnx9nHH1N6y+hxEB89fOlyVDjHhgL5uVtsD5fEdT0FJ2Gc/2nShEMMqIwr1/J9kUq1mNySff/uEe65Q==
ingotronic.ch. 300 IN RRSIG DNSKEY 5 2 300 20150125003700 20141226001657 17430 ingotronic.ch. mEwZjhQqeWksWD0TCnNBrtce4YkWJL3edqL6PvAUu8Fn+Ih437kEs3+pqdkgRsdYQ9HW+lBm/8pWwJlNAv0bi9NykItXMwAUFtncgq+6Pnh3iAM972GXSa5VV4LcGQ5b8CBdHCHiEKDqyPv5Hr5QfYL/FQaWlcNRh4QZZlZNPFA=
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 940 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 58434
;; flags: qr aa rd ra cd ; qd: 1 an: 3 au: 0 ad: 1
;; QUESTIONS:
;; nsec3.ingotronic.ch., type = DS, class = IN
;; ANSWERS:
nsec3.ingotronic.ch. 300 IN DS 16758 7 1 1720FF268E09A2CB63805EC8782D10AAD20E12A5
nsec3.ingotronic.ch. 300 IN DS 16758 7 2 3C8DC02750A1636F829B45D6E6D642866768A9CD40A013AD9D25AB63734FFA13
nsec3.ingotronic.ch. 300 IN RRSIG DS 5 3 300 20150125011134 20141226002644 17430 ingotronic.ch. hNurzlGhlyHbSgezPDuhIrtN9ZMsMXZbKGc7HD5rUuM88wD3fM97NxdzF+2Hi1USvBZ5GsQv63L+lAzf+mFPBoPIFHtTiAv8up7kQKRKmi/EzzkCYd/CC4UYdDZbaUyv7esh7spSOGwjPJNdK831p+MgltoWaYtnSGVMgOKk5mc=
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 305 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 7700
;; flags: qr aa rd ra cd ; qd: 1 an: 4 au: 0 ad: 1
;; QUESTIONS:
;; nsec3.ingotronic.ch., type = DNSKEY, class = IN
;; ANSWERS:
nsec3.ingotronic.ch. 300 IN DNSKEY 257 3 7 AwEAAaBuJTf9oGyeTH3biUkAFLrsYrkodX1H7Snsui4XsDHFCBvs5XYacHbs0Jg0/O51KPjmNnjwMW8SSyDkKqYQ+9uYAf2EQ/pnD/VGQqnV2cw0Vwk/t0E2V4FUCju4pnAoyzZFZXGs1eWbX9JXu++b0Azp+ACq6485qJLzHhWDiIrPoK/SvdbFVRK4s+nPPJLH3NGBbtdz6kPq7aFWYBMoGeAZdN1wsQpcNWUo5eOmaJY53nMc7+rDpAyYlMe/FKwSZdX2ZDd63Qsa6Im4FVUJq/nWLq7tlQ/mWks15uDTQyJy/OWfA0ICCO4N9Fel9rThJNpJWEzOCblvZyBoy405kZk=
nsec3.ingotronic.ch. 300 IN DNSKEY 256 3 7 AwEAAccAWxkTVGZ6UAp0VEozAlYpARhbh6Y6tYOl6Fg3UeBNFFtDQ9fTEEt1NkbnR9u8KkpVN6a67avlYiUN1egDqEwzDU7R1Rw+/USdhm2hqOARmmu3DBgjjX/iXjZLyv310cOGFJZ/smcodlDL4pDAAoPxh/qs6KEBaT0sc1KWcGq3
nsec3.ingotronic.ch. 300 IN RRSIG DNSKEY 7 3 300 20150125001457 20141226000444 16758 nsec3.ingotronic.ch. mXi1ylDi8XkRPup+YlT8GPdYE+P7gb6+/VdAwtodI916IzrkGkOHOTLbnrbAqqJOh0HxVCYXdxovmEcbJKUFKwplrQg3XD7/9Sq4pKU1MhMFEGrm/QPkM4u0mgjQwyToDLGuPHuFyur3FSjO/n54uGhAEft9JOFk/WKtWdCnm2LLyQrpC6herA3efFaI8kZhdoEY02AwihWVJxHasmz7lOoKRgNrkfELU+fN4+V7ISsRfJMyZc6q5PuNeG6vFD0uNE8tpdLJCSMurKYVpelvYqzFIcRTYcIjXwmS+L3DGjupqWMzFZVmpQM62JG3KCCD0ffpnNb0nWoSoHwpSeh/3Q==
nsec3.ingotronic.ch. 300 IN RRSIG DNSKEY 7 3 300 20150125001457 20141226000444 62417 nsec3.ingotronic.ch. PyCrf8T5dAfJzapb1p+kcTALPjDuD2niSaXXo0KeHAunT+6gJicLML2S/ZpiYr7X7Ma4Z0TYqE02qH6pcLYNnSgv9BE8sZO0nRtPekSyTy5nLi4hFADYhjb3UjaB85qmQZcqm64vC/CJhWO4t6Eixg/5MYALw+Qdy5Fo0qy/U5E=
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 958 bytes
###############################################
dnssecjava-1.1.3/src/test/resources/recordings/org_jitsi_dnssec_TestNonExistence/ 0000775 0000000 0000000 00000000000 13020541473 0030425 5 ustar 00root root 0000000 0000000 testDoubleLabelABelowSigned 0000664 0000000 0000000 00000017231 13020541473 0035573 0 ustar 00root root 0000000 0000000 dnssecjava-1.1.3/src/test/resources/recordings/org_jitsi_dnssec_TestNonExistence #Date: 2015-01-06T22:34:44+01:00
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 59323
;; flags: qr aa rd ra cd ; qd: 1 an: 0 au: 6 ad: 1
;; QUESTIONS:
;; gibtsnicht.gibtsnicht.ingotronic.ch., type = A, class = IN
;; ANSWERS:
;; AUTHORITY RECORDS:
ingotronic.ch. 300 IN SOA ns1.ingotronic.ch. admin.ingotronic.ch. 2013032762 300 60 864000 300
ingotronic.ch. 300 IN RRSIG SOA 5 2 300 20150125021244 20141226011244 17430 ingotronic.ch. WDLpp9G0P/rlMBfpFn9sAfpEFoBnQfwyGSXbGCc/LG1FSkJoKLDQYDY696scLNsJgkrzZeJrl0oSSvA8AvRUhYRrmuqWMxTVFgYlRwPwqEMCKUqiVhKGVF4NYemoBiUQC4nJwBZd57xKCiF4AQ4CodBtiZxefJFAlTNE0g2yxtM=
ingotronic.ch. 300 IN NSEC alias.ingotronic.ch. A NS SOA RRSIG NSEC DNSKEY
ingotronic.ch. 300 IN RRSIG NSEC 5 2 300 20150125000532 20141225234703 17430 ingotronic.ch. en5BaZ6zWqEvoUFUDPm5g1pjz7THXBv/1kjKtV2tS+7xh0BtkLEzlA9n/H66ZZAX2EIh7vXj12xVJKOuEuM0o1mJwKsBaLQuTra60/zYAUIddwUOCzI3zzjiRFklPyHSnLkGoBODZcvehnsTzTPyBxkfoouleqpj7gN5jOSBL8M=
eccgost.ingotronic.ch. 300 IN NSEC invalid.ingotronic.ch. NS DS RRSIG NSEC
eccgost.ingotronic.ch. 300 IN RRSIG NSEC 5 3 300 20150125021136 20141226011244 17430 ingotronic.ch. lsX44/1144d1nG80WVhDnZCiywh+KTNqj9oEECk3GifEjOWNTJDTfbBnrGbdc7BIWs1mZmcPKFVfQB39QunMyzNQi4Wzjor3U1FPbXhUTn/g9fMul37g1aR00hUfS2Jo49vfDZEMZWp7th9ZFc+hlr8uWISceul5OJRq4SyMbzs=
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 722 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 32975
;; flags: qr rd ra ad cd ; qd: 1 an: 4 au: 0 ad: 1
;; QUESTIONS:
;; ., type = DNSKEY, class = IN
;; ANSWERS:
. 87389 IN DNSKEY 256 3 8 AwEAAaPD7Y7XIi1MOEREJNTrRhyqsY3gff6JWzg+XCbqut1sbcbvqyssHw8DT1AkRaAC92pO8xuyq5QEgEPL1IHfABLwpwXI5gTj4gdwi86bpkmlWs9fRpnn4DPDCTdrnxIejJXgClHikLJF3u3CdpNCMijq4CKdQbMlRZ3avv+G7rh7
. 87389 IN DNSKEY 257 3 8 AwEAAagAIKlVZrpC6Ia7gEzahOR+9W29euxhJhVVLOyQbSEW0O8gcCjFFVQUTf6v58fLjwBd0YI0EzrAcQqBGCzh/RStIoO8g0NfnfL2MTJRkxoXbfDaUeVPQuYEhg37NZWAJQ9VnMVDxP/VHL496M/QZxkjf5/Efucp2gaDX6RS6CXpoY68LsvPVjR0ZSwzz1apAzvN9dlzEheX7ICJBBtuA6G3LQpzW5hOA2hzCTMjJPJ8LbqF6dsV6DoBQzgul0sGIcGOYl7OyQdXfZ57relSQageu+ipAdTTJ25AsRTAoub8ONGcLmqrAmRLKBP1dfwhYB4N7knNnulqQxA+Uk1ihz0=
. 87389 IN DNSKEY 256 3 8 AwEAAe3fSrbLBy3LOS7pnxEUhvPZTE2H5dIGsI/UfruI/nOEvWWa/PSX2BFedBkEqOlYdjdNF2f+6lmfk2Od/xu0v5bVqxFE+/24v3hZSlWBxvXzPTAGHrbW/IJYEPqlzVOAS4XdUgHg0N7IbLywNHMvB+Yf+Nm6ctyXXFLV4WTNnzs7
. 87389 IN RRSIG DNSKEY 8 0 172800 20150115235959 20150101000000 19036 . i8cAxD2pvQi1oAyvQxRpDfFlbqPzW+69QQEsDwE1eWOm5AtawO9U7lmsGps7sy/fVNvl1ljKBj4Djp9pb3U2FLogjiIlW0cDAkPmLlG9t+b/pjEfBNlhjANUVN06pvQVAfm+LcF26EaWT6FlISBqb6jSy4BHRa3Bdc4Sx7+pRSYSqVVvYxLkfAWsKPqGkvWhebJDndJJV9syXQXgZ+v/uJ+6XOS43xkAdeL8iBzIs/FlwMTfh3tVe3d0lb65IBBLlCzeQuetX+0Vu1YFcnD0mHc/wS2ZnAV5toAFmyVQBoY/XAZiZeaOkcROJ6Zmqezy7liwK7BqsYyAZntMhk8lbg==
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 883 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 62255
;; flags: qr rd ra ad cd ; qd: 1 an: 2 au: 0 ad: 1
;; QUESTIONS:
;; ch., type = DS, class = IN
;; ANSWERS:
ch. 989 IN DS 46375 8 2 8F96646FC68BB7E4AF4C0750A6096FBC0D4ECDA3D3FA6DA06FDDB42EE50C6CF3
ch. 989 IN RRSIG DS 8 1 86400 20150112170000 20150105160000 16665 . thY7xYWBBxiBjqbQIb9fAG4TmQgnziwM7q6P1T3/ITxmECdvOCQnnZA3uD7qmN8uM0HudsD7+y+zgD3rsH4RSTKdL4kHSI0OnCxToMTvklghEgFDezqIRm8NkWdI2H4Stwrj20nYKSpLQxPI2EE54gs18P3KyO8bAUYv8Qx73xU=
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 238 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 42506
;; flags: qr rd ra ad cd ; qd: 1 an: 4 au: 0 ad: 1
;; QUESTIONS:
;; ch., type = DNSKEY, class = IN
;; ANSWERS:
ch. 990 IN DNSKEY 257 3 8 AwEAAb7GhhZ8IAy/AhwmSms5DeQK5ad09wIIplEpYoiAIYXPtJvT1ReFzyfTp/2YP+g/PWDwHPh4qKAHa9x0VgbIQcGAeNakmfkAdWEmCnca323/SAml3mwfaX62G7/uYWae5zh8QTxZKNd+K1yZ5x0IxnI31chSl5xymRbTEHYZDKwSIRFM3fTxUMt93WFaBVWELReYotJBr++rvAWdnlay5TPBTvheLBkaiqtgM4GP8HK07Y+86lsZnEsj5K3G1KTV5SPpa82rqYAwxG9VKbmSE/6/kBR5jJHjt1rRt5Oe7v18aEtw0YCEN4vxq+KuvMoNVqXUsE9LBwHJD+QNwi6wmB0=
ch. 990 IN DNSKEY 256 3 8 AwEAAcSLdT0fEmcFmLpeUkAJoeVaHKiu+nbuc43fWlqaCRVf8t2HA4uWxOk0O5ci9nrFTc8nq8oa5fk5Cj7CHh4yrX9qUCfTdIWTyp8BDEdJpS+Dyb0u9wQuVj+nQMj4fLzdQf4TJs3/qxuiLr3nL1UUwlhhXeqSqGVb7p3mtB5HJ8ad
ch. 990 IN DNSKEY 256 3 8 AwEAAcsg0kY6fw1wzYMhSAKTy+Y2JzAst66P/1odp9NECJJHbU8f4nwziI3onoFSBV0ZiSZhY1aH5dhdDZ7BkrqhVXSrZPAz0CvzjIxmB1gSOf9DeZvjQvoy97HqYolxsf+B3QQv2RKBT67elF5+JisKg3/dQISelKn8LhabSoVrMlD1
ch. 990 IN RRSIG DNSKEY 8 1 86400 20150127100909 20141212090909 46375 ch. bT8q0FWyeMH0SulNo6UdIIgZYNATwYsee2bikq2Gh339Bufma8eaqWIPYT3XKmxYPBFOw0bVl+kLZxTwbR1CFoCDXoP+qgQhh4mf9qkNiv2CDSc+0FE3FRREn+DAhYTUEuB58FPiPakFB8s8O7T+k2qhDae7jy4/y7Jl1lnjaBY8s7bzOUPhF0KKCNZmvoKwtL23ZdVeTSV1xM3jkiNnpzBKbcoSWECSGJVp1SE0BnRXdwQP41YTXFZ0310YjaTAUCC5qbMIWdEkHjfdSQtKBImnc85mkapq9w++XQ4zhauPWBtrPV3CcoCahjUaWdjrKVkibomlJZaN8MEO23CfQw==
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 893 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 20975
;; flags: qr rd ra cd ; qd: 1 an: 3 au: 0 ad: 1
;; QUESTIONS:
;; ingotronic.ch., type = DS, class = IN
;; ANSWERS:
ingotronic.ch. 3598 IN DS 6031 5 2 4A948F2FDADA24686E473EDAC00DCF972584C75E3FAA92C2021B6221449FF87E
ingotronic.ch. 3598 IN DS 6031 5 1 733D0218B571CD617B1A7493564B9FC4F12ADE82
ingotronic.ch. 3598 IN RRSIG DS 8 2 3600 20150129033614 20150105123019 60789 ch. rVPJP2HhzW7OkroK2axFj5Lb4iVWCH8Fp/Iq1rF952NDo72b8RiKje2RaAKJAGQ+wd0YgE+PAej04GCmkhlDJA/zvPeeTxuhy3HbJzReMlQ7fjyH+wW1hli+FuIYvogXWf7nO/9VyPORt8X/f/pjrOr3Vlj9sGLN8TGYpEuVSw4=
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 288 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 53458
;; flags: qr aa rd ra cd ; qd: 1 an: 4 au: 0 ad: 1
;; QUESTIONS:
;; ingotronic.ch., type = DNSKEY, class = IN
;; ANSWERS:
ingotronic.ch. 300 IN DNSKEY 257 3 5 AwEAAeA1vzmjaB+eBAcvhzpKEgAEFpvQ1rg4uKDW6MsQtacKoqBpgyep2+LuWotz5p/xYxj3NGsArwN8Ad5cY0FHRr8miTT0elOv6nvlqGIfRuhj/BXAQ1x4ihpSFslHw0lJMYFwxsUZWpUyjWX/nv1xRZMMwF46gui0N4OEbyTYusCk77D+A71k+K0EAitFIbIH4GCUKmH1H7HmXhSVH9bN/n7KEGwW32lmsuuUcJoRKDkcUvbMXY/9Xoa2quERrUg/rBbDUHowRPjYDS5GzY1+f4YY8s40BufGiqyUTKKXL953MVFK8gmezXA0hbmrnZ7CBOw/7238mORAdzExaX8n7CE=
ingotronic.ch. 300 IN DNSKEY 256 3 5 AwEAAZ2Xh77GFzpEDx7EHYxShqltHgkiG+BOjBGifEmnJhQSdE5/yNSLFNcdhZZ8HUPxYnaedTqJcFFg4AzUsQklF/fECegTJdZjaj2WoL0/I8K7HMfY/hVuRZUWPNglYi8agJRX6gdkFTCpUNI7stpgKqxtzUJhhw15uG/lKMplwqUr
ingotronic.ch. 300 IN RRSIG DNSKEY 5 2 300 20150125003700 20141226001657 6031 ingotronic.ch. rs1QlP2SlSpA2ELbzwg3DgWLzXWL3Lpv6CUJE2Q0qH2Zp7Qdy3cD+ZEtNh9v24Qv1M6JJ3zFt8mmZoCeW2ycuMbJCqBkW9CBuwF+VznZvZY2MxwPipvhvEEGP//0M8YAZJ66yQPDv3PTdAP8FYbIrJyvY44vwyncwbslpfHT9jAsrbfr3vuMuWps86dnP462q+0s1TxBfqi8mzo3gdavjHKWVNwohLahLKT+tWeu6DSzQv0YwMjwtkLgF7QRgx3ctIIkloOrnx9nHH1N6y+hxEB89fOlyVDjHhgL5uVtsD5fEdT0FJ2Gc/2nShEMMqIwr1/J9kUq1mNySff/uEe65Q==
ingotronic.ch. 300 IN RRSIG DNSKEY 5 2 300 20150125003700 20141226001657 17430 ingotronic.ch. mEwZjhQqeWksWD0TCnNBrtce4YkWJL3edqL6PvAUu8Fn+Ih437kEs3+pqdkgRsdYQ9HW+lBm/8pWwJlNAv0bi9NykItXMwAUFtncgq+6Pnh3iAM972GXSa5VV4LcGQ5b8CBdHCHiEKDqyPv5Hr5QfYL/FQaWlcNRh4QZZlZNPFA=
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 940 bytes
###############################################
testDoubleLabelABelowSignedBeforeZoneNsec3 0000664 0000000 0000000 00000025426 13020541473 0040453 0 ustar 00root root 0000000 0000000 dnssecjava-1.1.3/src/test/resources/recordings/org_jitsi_dnssec_TestNonExistence #Date: 2015-01-06T22:34:45+01:00
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 7362
;; flags: qr aa rd ra cd ; qd: 1 an: 0 au: 8 ad: 1
;; QUESTIONS:
;; alias.1gibtsnicht.nsec3.ingotronic.ch., type = A, class = IN
;; ANSWERS:
;; AUTHORITY RECORDS:
nsec3.ingotronic.ch. 300 IN SOA ns1.ingotronic.ch. admin.ingotronic.ch. 2013032932 300 60 864000 300
nsec3.ingotronic.ch. 300 IN RRSIG SOA 7 3 300 20150201003516 20150101233516 62417 nsec3.ingotronic.ch. RMXaAZCkydysBpA4+LWD2frs4CZH2FBxafAolq7MOG62Sw3ellwNcSIh2naMasviin2DU2BAzIYyFUqKJDbUqzTxZQjsM6d5LtgFy5iTNmWum6FnFP5Fz73Zs/9Q0LNEstR82MRRL8EDElADhFySAReavyT/vlSTScQGxx6slyQ=
NTV3QJT4VQDVBPB6BNOVM40NMKJ3H29P.nsec3.ingotronic.ch. 300 IN NSEC3 1 0 10 1234 O275F9OLQ9HNCER7U4SMD4V8AG7IPML9 A NS SOA RRSIG DNSKEY NSEC3PARAM
NTV3QJT4VQDVBPB6BNOVM40NMKJ3H29P.nsec3.ingotronic.ch. 300 IN RRSIG NSEC3 7 4 300 20150131235629 20150101233516 62417 nsec3.ingotronic.ch. xccCvQs/b3ndBUo6J2FbaCzDMg+LB1e4OWeI29VTBWcmfbuD3rZvneRdbA9B5AluJH1ar10xxdrt/+RSuhSWC70LswkdPDg4vshmCZMDeMCOJYFEkGR0UgcZUMynU6EewEDLVLgYtBkJmspeuZNMBMPk/ZUOolCElrkHfbUA1Cc=
UDUMPS9J6F8348HFHH2FAED6I9DDE0U6.nsec3.ingotronic.ch. 300 IN NSEC3 1 0 10 1234 0UPHA6GQV03I7D8EJUDKC30I0C6I1G1Q
UDUMPS9J6F8348HFHH2FAED6I9DDE0U6.nsec3.ingotronic.ch. 300 IN RRSIG NSEC3 7 4 300 20150125005926 20141226002759 62417 nsec3.ingotronic.ch. XV2q9ufbwzauD/tmjb2EKsNBF+kHQYL0/MNb6ivY1oH9Q2hzQNPUuHkUl1db2erDFodPvspmDk6p6WOXoV6wmmaYhN+JI1TQKYYThsnKC1bkt1h6QyjwsDc12d8HVHOopvoXpaYWoV4bbghsAylGVqRjEYyt8JtR3BPfphehloU=
L40SJG7ANKROIHCT5RA6C8CTKJ91CD3N.nsec3.ingotronic.ch. 300 IN NSEC3 1 0 10 1234 ND3HQPFBN314KVB64L6T40JF75US8HKT
L40SJG7ANKROIHCT5RA6C8CTKJ91CD3N.nsec3.ingotronic.ch. 300 IN RRSIG NSEC3 7 4 300 20150125005926 20141226002759 62417 nsec3.ingotronic.ch. v6NHEWwb2KxRGRPshC2KFoxJs4Mis3OmvncJmn5bIWBnzeTY4x75tsE4zlVPx9rp0rjmOAQsYn4KGtIFPUShDHNHy45qoOtKkvRzRgByx4K2l5Rq9OizQVYsEUUScXEYATilaDU9whifF0vPk7YPwFGRmiY3prCGAvY/jH4hQUM=
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 1056 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 56361
;; flags: qr rd ra ad cd ; qd: 1 an: 4 au: 0 ad: 1
;; QUESTIONS:
;; ., type = DNSKEY, class = IN
;; ANSWERS:
. 87388 IN DNSKEY 256 3 8 AwEAAe3fSrbLBy3LOS7pnxEUhvPZTE2H5dIGsI/UfruI/nOEvWWa/PSX2BFedBkEqOlYdjdNF2f+6lmfk2Od/xu0v5bVqxFE+/24v3hZSlWBxvXzPTAGHrbW/IJYEPqlzVOAS4XdUgHg0N7IbLywNHMvB+Yf+Nm6ctyXXFLV4WTNnzs7
. 87388 IN DNSKEY 256 3 8 AwEAAaPD7Y7XIi1MOEREJNTrRhyqsY3gff6JWzg+XCbqut1sbcbvqyssHw8DT1AkRaAC92pO8xuyq5QEgEPL1IHfABLwpwXI5gTj4gdwi86bpkmlWs9fRpnn4DPDCTdrnxIejJXgClHikLJF3u3CdpNCMijq4CKdQbMlRZ3avv+G7rh7
. 87388 IN DNSKEY 257 3 8 AwEAAagAIKlVZrpC6Ia7gEzahOR+9W29euxhJhVVLOyQbSEW0O8gcCjFFVQUTf6v58fLjwBd0YI0EzrAcQqBGCzh/RStIoO8g0NfnfL2MTJRkxoXbfDaUeVPQuYEhg37NZWAJQ9VnMVDxP/VHL496M/QZxkjf5/Efucp2gaDX6RS6CXpoY68LsvPVjR0ZSwzz1apAzvN9dlzEheX7ICJBBtuA6G3LQpzW5hOA2hzCTMjJPJ8LbqF6dsV6DoBQzgul0sGIcGOYl7OyQdXfZ57relSQageu+ipAdTTJ25AsRTAoub8ONGcLmqrAmRLKBP1dfwhYB4N7knNnulqQxA+Uk1ihz0=
. 87388 IN RRSIG DNSKEY 8 0 172800 20150115235959 20150101000000 19036 . i8cAxD2pvQi1oAyvQxRpDfFlbqPzW+69QQEsDwE1eWOm5AtawO9U7lmsGps7sy/fVNvl1ljKBj4Djp9pb3U2FLogjiIlW0cDAkPmLlG9t+b/pjEfBNlhjANUVN06pvQVAfm+LcF26EaWT6FlISBqb6jSy4BHRa3Bdc4Sx7+pRSYSqVVvYxLkfAWsKPqGkvWhebJDndJJV9syXQXgZ+v/uJ+6XOS43xkAdeL8iBzIs/FlwMTfh3tVe3d0lb65IBBLlCzeQuetX+0Vu1YFcnD0mHc/wS2ZnAV5toAFmyVQBoY/XAZiZeaOkcROJ6Zmqezy7liwK7BqsYyAZntMhk8lbg==
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 883 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 10038
;; flags: qr rd ra ad cd ; qd: 1 an: 2 au: 0 ad: 1
;; QUESTIONS:
;; ch., type = DS, class = IN
;; ANSWERS:
ch. 988 IN DS 46375 8 2 8F96646FC68BB7E4AF4C0750A6096FBC0D4ECDA3D3FA6DA06FDDB42EE50C6CF3
ch. 988 IN RRSIG DS 8 1 86400 20150112170000 20150105160000 16665 . thY7xYWBBxiBjqbQIb9fAG4TmQgnziwM7q6P1T3/ITxmECdvOCQnnZA3uD7qmN8uM0HudsD7+y+zgD3rsH4RSTKdL4kHSI0OnCxToMTvklghEgFDezqIRm8NkWdI2H4Stwrj20nYKSpLQxPI2EE54gs18P3KyO8bAUYv8Qx73xU=
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 238 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 8248
;; flags: qr rd ra ad cd ; qd: 1 an: 4 au: 0 ad: 1
;; QUESTIONS:
;; ch., type = DNSKEY, class = IN
;; ANSWERS:
ch. 989 IN DNSKEY 257 3 8 AwEAAb7GhhZ8IAy/AhwmSms5DeQK5ad09wIIplEpYoiAIYXPtJvT1ReFzyfTp/2YP+g/PWDwHPh4qKAHa9x0VgbIQcGAeNakmfkAdWEmCnca323/SAml3mwfaX62G7/uYWae5zh8QTxZKNd+K1yZ5x0IxnI31chSl5xymRbTEHYZDKwSIRFM3fTxUMt93WFaBVWELReYotJBr++rvAWdnlay5TPBTvheLBkaiqtgM4GP8HK07Y+86lsZnEsj5K3G1KTV5SPpa82rqYAwxG9VKbmSE/6/kBR5jJHjt1rRt5Oe7v18aEtw0YCEN4vxq+KuvMoNVqXUsE9LBwHJD+QNwi6wmB0=
ch. 989 IN DNSKEY 256 3 8 AwEAAcSLdT0fEmcFmLpeUkAJoeVaHKiu+nbuc43fWlqaCRVf8t2HA4uWxOk0O5ci9nrFTc8nq8oa5fk5Cj7CHh4yrX9qUCfTdIWTyp8BDEdJpS+Dyb0u9wQuVj+nQMj4fLzdQf4TJs3/qxuiLr3nL1UUwlhhXeqSqGVb7p3mtB5HJ8ad
ch. 989 IN DNSKEY 256 3 8 AwEAAcsg0kY6fw1wzYMhSAKTy+Y2JzAst66P/1odp9NECJJHbU8f4nwziI3onoFSBV0ZiSZhY1aH5dhdDZ7BkrqhVXSrZPAz0CvzjIxmB1gSOf9DeZvjQvoy97HqYolxsf+B3QQv2RKBT67elF5+JisKg3/dQISelKn8LhabSoVrMlD1
ch. 989 IN RRSIG DNSKEY 8 1 86400 20150127100909 20141212090909 46375 ch. bT8q0FWyeMH0SulNo6UdIIgZYNATwYsee2bikq2Gh339Bufma8eaqWIPYT3XKmxYPBFOw0bVl+kLZxTwbR1CFoCDXoP+qgQhh4mf9qkNiv2CDSc+0FE3FRREn+DAhYTUEuB58FPiPakFB8s8O7T+k2qhDae7jy4/y7Jl1lnjaBY8s7bzOUPhF0KKCNZmvoKwtL23ZdVeTSV1xM3jkiNnpzBKbcoSWECSGJVp1SE0BnRXdwQP41YTXFZ0310YjaTAUCC5qbMIWdEkHjfdSQtKBImnc85mkapq9w++XQ4zhauPWBtrPV3CcoCahjUaWdjrKVkibomlJZaN8MEO23CfQw==
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 893 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 60008
;; flags: qr rd ra cd ; qd: 1 an: 3 au: 0 ad: 1
;; QUESTIONS:
;; ingotronic.ch., type = DS, class = IN
;; ANSWERS:
ingotronic.ch. 3597 IN DS 6031 5 2 4A948F2FDADA24686E473EDAC00DCF972584C75E3FAA92C2021B6221449FF87E
ingotronic.ch. 3597 IN DS 6031 5 1 733D0218B571CD617B1A7493564B9FC4F12ADE82
ingotronic.ch. 3597 IN RRSIG DS 8 2 3600 20150129033614 20150105123019 60789 ch. rVPJP2HhzW7OkroK2axFj5Lb4iVWCH8Fp/Iq1rF952NDo72b8RiKje2RaAKJAGQ+wd0YgE+PAej04GCmkhlDJA/zvPeeTxuhy3HbJzReMlQ7fjyH+wW1hli+FuIYvogXWf7nO/9VyPORt8X/f/pjrOr3Vlj9sGLN8TGYpEuVSw4=
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 288 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 36858
;; flags: qr aa rd ra cd ; qd: 1 an: 4 au: 0 ad: 1
;; QUESTIONS:
;; ingotronic.ch., type = DNSKEY, class = IN
;; ANSWERS:
ingotronic.ch. 300 IN DNSKEY 257 3 5 AwEAAeA1vzmjaB+eBAcvhzpKEgAEFpvQ1rg4uKDW6MsQtacKoqBpgyep2+LuWotz5p/xYxj3NGsArwN8Ad5cY0FHRr8miTT0elOv6nvlqGIfRuhj/BXAQ1x4ihpSFslHw0lJMYFwxsUZWpUyjWX/nv1xRZMMwF46gui0N4OEbyTYusCk77D+A71k+K0EAitFIbIH4GCUKmH1H7HmXhSVH9bN/n7KEGwW32lmsuuUcJoRKDkcUvbMXY/9Xoa2quERrUg/rBbDUHowRPjYDS5GzY1+f4YY8s40BufGiqyUTKKXL953MVFK8gmezXA0hbmrnZ7CBOw/7238mORAdzExaX8n7CE=
ingotronic.ch. 300 IN DNSKEY 256 3 5 AwEAAZ2Xh77GFzpEDx7EHYxShqltHgkiG+BOjBGifEmnJhQSdE5/yNSLFNcdhZZ8HUPxYnaedTqJcFFg4AzUsQklF/fECegTJdZjaj2WoL0/I8K7HMfY/hVuRZUWPNglYi8agJRX6gdkFTCpUNI7stpgKqxtzUJhhw15uG/lKMplwqUr
ingotronic.ch. 300 IN RRSIG DNSKEY 5 2 300 20150125003700 20141226001657 6031 ingotronic.ch. rs1QlP2SlSpA2ELbzwg3DgWLzXWL3Lpv6CUJE2Q0qH2Zp7Qdy3cD+ZEtNh9v24Qv1M6JJ3zFt8mmZoCeW2ycuMbJCqBkW9CBuwF+VznZvZY2MxwPipvhvEEGP//0M8YAZJ66yQPDv3PTdAP8FYbIrJyvY44vwyncwbslpfHT9jAsrbfr3vuMuWps86dnP462q+0s1TxBfqi8mzo3gdavjHKWVNwohLahLKT+tWeu6DSzQv0YwMjwtkLgF7QRgx3ctIIkloOrnx9nHH1N6y+hxEB89fOlyVDjHhgL5uVtsD5fEdT0FJ2Gc/2nShEMMqIwr1/J9kUq1mNySff/uEe65Q==
ingotronic.ch. 300 IN RRSIG DNSKEY 5 2 300 20150125003700 20141226001657 17430 ingotronic.ch. mEwZjhQqeWksWD0TCnNBrtce4YkWJL3edqL6PvAUu8Fn+Ih437kEs3+pqdkgRsdYQ9HW+lBm/8pWwJlNAv0bi9NykItXMwAUFtncgq+6Pnh3iAM972GXSa5VV4LcGQ5b8CBdHCHiEKDqyPv5Hr5QfYL/FQaWlcNRh4QZZlZNPFA=
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 940 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 8889
;; flags: qr aa rd ra cd ; qd: 1 an: 3 au: 0 ad: 1
;; QUESTIONS:
;; nsec3.ingotronic.ch., type = DS, class = IN
;; ANSWERS:
nsec3.ingotronic.ch. 300 IN DS 16758 7 1 1720FF268E09A2CB63805EC8782D10AAD20E12A5
nsec3.ingotronic.ch. 300 IN DS 16758 7 2 3C8DC02750A1636F829B45D6E6D642866768A9CD40A013AD9D25AB63734FFA13
nsec3.ingotronic.ch. 300 IN RRSIG DS 5 3 300 20150125011134 20141226002644 17430 ingotronic.ch. hNurzlGhlyHbSgezPDuhIrtN9ZMsMXZbKGc7HD5rUuM88wD3fM97NxdzF+2Hi1USvBZ5GsQv63L+lAzf+mFPBoPIFHtTiAv8up7kQKRKmi/EzzkCYd/CC4UYdDZbaUyv7esh7spSOGwjPJNdK831p+MgltoWaYtnSGVMgOKk5mc=
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 305 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 12982
;; flags: qr aa rd ra cd ; qd: 1 an: 4 au: 0 ad: 1
;; QUESTIONS:
;; nsec3.ingotronic.ch., type = DNSKEY, class = IN
;; ANSWERS:
nsec3.ingotronic.ch. 300 IN DNSKEY 257 3 7 AwEAAaBuJTf9oGyeTH3biUkAFLrsYrkodX1H7Snsui4XsDHFCBvs5XYacHbs0Jg0/O51KPjmNnjwMW8SSyDkKqYQ+9uYAf2EQ/pnD/VGQqnV2cw0Vwk/t0E2V4FUCju4pnAoyzZFZXGs1eWbX9JXu++b0Azp+ACq6485qJLzHhWDiIrPoK/SvdbFVRK4s+nPPJLH3NGBbtdz6kPq7aFWYBMoGeAZdN1wsQpcNWUo5eOmaJY53nMc7+rDpAyYlMe/FKwSZdX2ZDd63Qsa6Im4FVUJq/nWLq7tlQ/mWks15uDTQyJy/OWfA0ICCO4N9Fel9rThJNpJWEzOCblvZyBoy405kZk=
nsec3.ingotronic.ch. 300 IN DNSKEY 256 3 7 AwEAAccAWxkTVGZ6UAp0VEozAlYpARhbh6Y6tYOl6Fg3UeBNFFtDQ9fTEEt1NkbnR9u8KkpVN6a67avlYiUN1egDqEwzDU7R1Rw+/USdhm2hqOARmmu3DBgjjX/iXjZLyv310cOGFJZ/smcodlDL4pDAAoPxh/qs6KEBaT0sc1KWcGq3
nsec3.ingotronic.ch. 300 IN RRSIG DNSKEY 7 3 300 20150125001457 20141226000444 16758 nsec3.ingotronic.ch. mXi1ylDi8XkRPup+YlT8GPdYE+P7gb6+/VdAwtodI916IzrkGkOHOTLbnrbAqqJOh0HxVCYXdxovmEcbJKUFKwplrQg3XD7/9Sq4pKU1MhMFEGrm/QPkM4u0mgjQwyToDLGuPHuFyur3FSjO/n54uGhAEft9JOFk/WKtWdCnm2LLyQrpC6herA3efFaI8kZhdoEY02AwihWVJxHasmz7lOoKRgNrkfELU+fN4+V7ISsRfJMyZc6q5PuNeG6vFD0uNE8tpdLJCSMurKYVpelvYqzFIcRTYcIjXwmS+L3DGjupqWMzFZVmpQM62JG3KCCD0ffpnNb0nWoSoHwpSeh/3Q==
nsec3.ingotronic.ch. 300 IN RRSIG DNSKEY 7 3 300 20150125001457 20141226000444 62417 nsec3.ingotronic.ch. PyCrf8T5dAfJzapb1p+kcTALPjDuD2niSaXXo0KeHAunT+6gJicLML2S/ZpiYr7X7Ma4Z0TYqE02qH6pcLYNnSgv9BE8sZO0nRtPekSyTy5nLi4hFADYhjb3UjaB85qmQZcqm64vC/CJhWO4t6Eixg/5MYALw+Qdy5Fo0qy/U5E=
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 958 bytes
###############################################
testDoubleLabelABelowSignedNsec3 0000664 0000000 0000000 00000025431 13020541473 0036470 0 ustar 00root root 0000000 0000000 dnssecjava-1.1.3/src/test/resources/recordings/org_jitsi_dnssec_TestNonExistence #Date: 2015-01-06T22:34:43+01:00
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 7636
;; flags: qr aa rd ra cd ; qd: 1 an: 0 au: 8 ad: 1
;; QUESTIONS:
;; gibtsnicht.gibtsnicht.nsec3.ingotronic.ch., type = A, class = IN
;; ANSWERS:
;; AUTHORITY RECORDS:
nsec3.ingotronic.ch. 300 IN SOA ns1.ingotronic.ch. admin.ingotronic.ch. 2013032932 300 60 864000 300
nsec3.ingotronic.ch. 300 IN RRSIG SOA 7 3 300 20150201003516 20150101233516 62417 nsec3.ingotronic.ch. RMXaAZCkydysBpA4+LWD2frs4CZH2FBxafAolq7MOG62Sw3ellwNcSIh2naMasviin2DU2BAzIYyFUqKJDbUqzTxZQjsM6d5LtgFy5iTNmWum6FnFP5Fz73Zs/9Q0LNEstR82MRRL8EDElADhFySAReavyT/vlSTScQGxx6slyQ=
NTV3QJT4VQDVBPB6BNOVM40NMKJ3H29P.nsec3.ingotronic.ch. 300 IN NSEC3 1 0 10 1234 O275F9OLQ9HNCER7U4SMD4V8AG7IPML9 A NS SOA RRSIG DNSKEY NSEC3PARAM
NTV3QJT4VQDVBPB6BNOVM40NMKJ3H29P.nsec3.ingotronic.ch. 300 IN RRSIG NSEC3 7 4 300 20150131235629 20150101233516 62417 nsec3.ingotronic.ch. xccCvQs/b3ndBUo6J2FbaCzDMg+LB1e4OWeI29VTBWcmfbuD3rZvneRdbA9B5AluJH1ar10xxdrt/+RSuhSWC70LswkdPDg4vshmCZMDeMCOJYFEkGR0UgcZUMynU6EewEDLVLgYtBkJmspeuZNMBMPk/ZUOolCElrkHfbUA1Cc=
UDUMPS9J6F8348HFHH2FAED6I9DDE0U6.nsec3.ingotronic.ch. 300 IN NSEC3 1 0 10 1234 0UPHA6GQV03I7D8EJUDKC30I0C6I1G1Q
UDUMPS9J6F8348HFHH2FAED6I9DDE0U6.nsec3.ingotronic.ch. 300 IN RRSIG NSEC3 7 4 300 20150125005926 20141226002759 62417 nsec3.ingotronic.ch. XV2q9ufbwzauD/tmjb2EKsNBF+kHQYL0/MNb6ivY1oH9Q2hzQNPUuHkUl1db2erDFodPvspmDk6p6WOXoV6wmmaYhN+JI1TQKYYThsnKC1bkt1h6QyjwsDc12d8HVHOopvoXpaYWoV4bbghsAylGVqRjEYyt8JtR3BPfphehloU=
L40SJG7ANKROIHCT5RA6C8CTKJ91CD3N.nsec3.ingotronic.ch. 300 IN NSEC3 1 0 10 1234 ND3HQPFBN314KVB64L6T40JF75US8HKT
L40SJG7ANKROIHCT5RA6C8CTKJ91CD3N.nsec3.ingotronic.ch. 300 IN RRSIG NSEC3 7 4 300 20150125005926 20141226002759 62417 nsec3.ingotronic.ch. v6NHEWwb2KxRGRPshC2KFoxJs4Mis3OmvncJmn5bIWBnzeTY4x75tsE4zlVPx9rp0rjmOAQsYn4KGtIFPUShDHNHy45qoOtKkvRzRgByx4K2l5Rq9OizQVYsEUUScXEYATilaDU9whifF0vPk7YPwFGRmiY3prCGAvY/jH4hQUM=
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 1060 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 26832
;; flags: qr rd ra ad cd ; qd: 1 an: 4 au: 0 ad: 1
;; QUESTIONS:
;; ., type = DNSKEY, class = IN
;; ANSWERS:
. 87390 IN DNSKEY 257 3 8 AwEAAagAIKlVZrpC6Ia7gEzahOR+9W29euxhJhVVLOyQbSEW0O8gcCjFFVQUTf6v58fLjwBd0YI0EzrAcQqBGCzh/RStIoO8g0NfnfL2MTJRkxoXbfDaUeVPQuYEhg37NZWAJQ9VnMVDxP/VHL496M/QZxkjf5/Efucp2gaDX6RS6CXpoY68LsvPVjR0ZSwzz1apAzvN9dlzEheX7ICJBBtuA6G3LQpzW5hOA2hzCTMjJPJ8LbqF6dsV6DoBQzgul0sGIcGOYl7OyQdXfZ57relSQageu+ipAdTTJ25AsRTAoub8ONGcLmqrAmRLKBP1dfwhYB4N7knNnulqQxA+Uk1ihz0=
. 87390 IN DNSKEY 256 3 8 AwEAAaPD7Y7XIi1MOEREJNTrRhyqsY3gff6JWzg+XCbqut1sbcbvqyssHw8DT1AkRaAC92pO8xuyq5QEgEPL1IHfABLwpwXI5gTj4gdwi86bpkmlWs9fRpnn4DPDCTdrnxIejJXgClHikLJF3u3CdpNCMijq4CKdQbMlRZ3avv+G7rh7
. 87390 IN DNSKEY 256 3 8 AwEAAe3fSrbLBy3LOS7pnxEUhvPZTE2H5dIGsI/UfruI/nOEvWWa/PSX2BFedBkEqOlYdjdNF2f+6lmfk2Od/xu0v5bVqxFE+/24v3hZSlWBxvXzPTAGHrbW/IJYEPqlzVOAS4XdUgHg0N7IbLywNHMvB+Yf+Nm6ctyXXFLV4WTNnzs7
. 87390 IN RRSIG DNSKEY 8 0 172800 20150115235959 20150101000000 19036 . i8cAxD2pvQi1oAyvQxRpDfFlbqPzW+69QQEsDwE1eWOm5AtawO9U7lmsGps7sy/fVNvl1ljKBj4Djp9pb3U2FLogjiIlW0cDAkPmLlG9t+b/pjEfBNlhjANUVN06pvQVAfm+LcF26EaWT6FlISBqb6jSy4BHRa3Bdc4Sx7+pRSYSqVVvYxLkfAWsKPqGkvWhebJDndJJV9syXQXgZ+v/uJ+6XOS43xkAdeL8iBzIs/FlwMTfh3tVe3d0lb65IBBLlCzeQuetX+0Vu1YFcnD0mHc/wS2ZnAV5toAFmyVQBoY/XAZiZeaOkcROJ6Zmqezy7liwK7BqsYyAZntMhk8lbg==
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 883 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 6927
;; flags: qr rd ra ad cd ; qd: 1 an: 2 au: 0 ad: 1
;; QUESTIONS:
;; ch., type = DS, class = IN
;; ANSWERS:
ch. 990 IN DS 46375 8 2 8F96646FC68BB7E4AF4C0750A6096FBC0D4ECDA3D3FA6DA06FDDB42EE50C6CF3
ch. 990 IN RRSIG DS 8 1 86400 20150112170000 20150105160000 16665 . thY7xYWBBxiBjqbQIb9fAG4TmQgnziwM7q6P1T3/ITxmECdvOCQnnZA3uD7qmN8uM0HudsD7+y+zgD3rsH4RSTKdL4kHSI0OnCxToMTvklghEgFDezqIRm8NkWdI2H4Stwrj20nYKSpLQxPI2EE54gs18P3KyO8bAUYv8Qx73xU=
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 238 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 34194
;; flags: qr rd ra ad cd ; qd: 1 an: 4 au: 0 ad: 1
;; QUESTIONS:
;; ch., type = DNSKEY, class = IN
;; ANSWERS:
ch. 991 IN DNSKEY 257 3 8 AwEAAb7GhhZ8IAy/AhwmSms5DeQK5ad09wIIplEpYoiAIYXPtJvT1ReFzyfTp/2YP+g/PWDwHPh4qKAHa9x0VgbIQcGAeNakmfkAdWEmCnca323/SAml3mwfaX62G7/uYWae5zh8QTxZKNd+K1yZ5x0IxnI31chSl5xymRbTEHYZDKwSIRFM3fTxUMt93WFaBVWELReYotJBr++rvAWdnlay5TPBTvheLBkaiqtgM4GP8HK07Y+86lsZnEsj5K3G1KTV5SPpa82rqYAwxG9VKbmSE/6/kBR5jJHjt1rRt5Oe7v18aEtw0YCEN4vxq+KuvMoNVqXUsE9LBwHJD+QNwi6wmB0=
ch. 991 IN DNSKEY 256 3 8 AwEAAcsg0kY6fw1wzYMhSAKTy+Y2JzAst66P/1odp9NECJJHbU8f4nwziI3onoFSBV0ZiSZhY1aH5dhdDZ7BkrqhVXSrZPAz0CvzjIxmB1gSOf9DeZvjQvoy97HqYolxsf+B3QQv2RKBT67elF5+JisKg3/dQISelKn8LhabSoVrMlD1
ch. 991 IN DNSKEY 256 3 8 AwEAAcSLdT0fEmcFmLpeUkAJoeVaHKiu+nbuc43fWlqaCRVf8t2HA4uWxOk0O5ci9nrFTc8nq8oa5fk5Cj7CHh4yrX9qUCfTdIWTyp8BDEdJpS+Dyb0u9wQuVj+nQMj4fLzdQf4TJs3/qxuiLr3nL1UUwlhhXeqSqGVb7p3mtB5HJ8ad
ch. 991 IN RRSIG DNSKEY 8 1 86400 20150127100909 20141212090909 46375 ch. bT8q0FWyeMH0SulNo6UdIIgZYNATwYsee2bikq2Gh339Bufma8eaqWIPYT3XKmxYPBFOw0bVl+kLZxTwbR1CFoCDXoP+qgQhh4mf9qkNiv2CDSc+0FE3FRREn+DAhYTUEuB58FPiPakFB8s8O7T+k2qhDae7jy4/y7Jl1lnjaBY8s7bzOUPhF0KKCNZmvoKwtL23ZdVeTSV1xM3jkiNnpzBKbcoSWECSGJVp1SE0BnRXdwQP41YTXFZ0310YjaTAUCC5qbMIWdEkHjfdSQtKBImnc85mkapq9w++XQ4zhauPWBtrPV3CcoCahjUaWdjrKVkibomlJZaN8MEO23CfQw==
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 893 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 20509
;; flags: qr rd ra cd ; qd: 1 an: 3 au: 0 ad: 1
;; QUESTIONS:
;; ingotronic.ch., type = DS, class = IN
;; ANSWERS:
ingotronic.ch. 3599 IN DS 6031 5 1 733D0218B571CD617B1A7493564B9FC4F12ADE82
ingotronic.ch. 3599 IN DS 6031 5 2 4A948F2FDADA24686E473EDAC00DCF972584C75E3FAA92C2021B6221449FF87E
ingotronic.ch. 3599 IN RRSIG DS 8 2 3600 20150129033614 20150105123019 60789 ch. rVPJP2HhzW7OkroK2axFj5Lb4iVWCH8Fp/Iq1rF952NDo72b8RiKje2RaAKJAGQ+wd0YgE+PAej04GCmkhlDJA/zvPeeTxuhy3HbJzReMlQ7fjyH+wW1hli+FuIYvogXWf7nO/9VyPORt8X/f/pjrOr3Vlj9sGLN8TGYpEuVSw4=
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 288 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 7967
;; flags: qr aa rd ra cd ; qd: 1 an: 4 au: 0 ad: 1
;; QUESTIONS:
;; ingotronic.ch., type = DNSKEY, class = IN
;; ANSWERS:
ingotronic.ch. 300 IN DNSKEY 257 3 5 AwEAAeA1vzmjaB+eBAcvhzpKEgAEFpvQ1rg4uKDW6MsQtacKoqBpgyep2+LuWotz5p/xYxj3NGsArwN8Ad5cY0FHRr8miTT0elOv6nvlqGIfRuhj/BXAQ1x4ihpSFslHw0lJMYFwxsUZWpUyjWX/nv1xRZMMwF46gui0N4OEbyTYusCk77D+A71k+K0EAitFIbIH4GCUKmH1H7HmXhSVH9bN/n7KEGwW32lmsuuUcJoRKDkcUvbMXY/9Xoa2quERrUg/rBbDUHowRPjYDS5GzY1+f4YY8s40BufGiqyUTKKXL953MVFK8gmezXA0hbmrnZ7CBOw/7238mORAdzExaX8n7CE=
ingotronic.ch. 300 IN DNSKEY 256 3 5 AwEAAZ2Xh77GFzpEDx7EHYxShqltHgkiG+BOjBGifEmnJhQSdE5/yNSLFNcdhZZ8HUPxYnaedTqJcFFg4AzUsQklF/fECegTJdZjaj2WoL0/I8K7HMfY/hVuRZUWPNglYi8agJRX6gdkFTCpUNI7stpgKqxtzUJhhw15uG/lKMplwqUr
ingotronic.ch. 300 IN RRSIG DNSKEY 5 2 300 20150125003700 20141226001657 6031 ingotronic.ch. rs1QlP2SlSpA2ELbzwg3DgWLzXWL3Lpv6CUJE2Q0qH2Zp7Qdy3cD+ZEtNh9v24Qv1M6JJ3zFt8mmZoCeW2ycuMbJCqBkW9CBuwF+VznZvZY2MxwPipvhvEEGP//0M8YAZJ66yQPDv3PTdAP8FYbIrJyvY44vwyncwbslpfHT9jAsrbfr3vuMuWps86dnP462q+0s1TxBfqi8mzo3gdavjHKWVNwohLahLKT+tWeu6DSzQv0YwMjwtkLgF7QRgx3ctIIkloOrnx9nHH1N6y+hxEB89fOlyVDjHhgL5uVtsD5fEdT0FJ2Gc/2nShEMMqIwr1/J9kUq1mNySff/uEe65Q==
ingotronic.ch. 300 IN RRSIG DNSKEY 5 2 300 20150125003700 20141226001657 17430 ingotronic.ch. mEwZjhQqeWksWD0TCnNBrtce4YkWJL3edqL6PvAUu8Fn+Ih437kEs3+pqdkgRsdYQ9HW+lBm/8pWwJlNAv0bi9NykItXMwAUFtncgq+6Pnh3iAM972GXSa5VV4LcGQ5b8CBdHCHiEKDqyPv5Hr5QfYL/FQaWlcNRh4QZZlZNPFA=
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 940 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 32230
;; flags: qr aa rd ra cd ; qd: 1 an: 3 au: 0 ad: 1
;; QUESTIONS:
;; nsec3.ingotronic.ch., type = DS, class = IN
;; ANSWERS:
nsec3.ingotronic.ch. 300 IN DS 16758 7 1 1720FF268E09A2CB63805EC8782D10AAD20E12A5
nsec3.ingotronic.ch. 300 IN DS 16758 7 2 3C8DC02750A1636F829B45D6E6D642866768A9CD40A013AD9D25AB63734FFA13
nsec3.ingotronic.ch. 300 IN RRSIG DS 5 3 300 20150125011134 20141226002644 17430 ingotronic.ch. hNurzlGhlyHbSgezPDuhIrtN9ZMsMXZbKGc7HD5rUuM88wD3fM97NxdzF+2Hi1USvBZ5GsQv63L+lAzf+mFPBoPIFHtTiAv8up7kQKRKmi/EzzkCYd/CC4UYdDZbaUyv7esh7spSOGwjPJNdK831p+MgltoWaYtnSGVMgOKk5mc=
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 305 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 3112
;; flags: qr aa rd ra cd ; qd: 1 an: 4 au: 0 ad: 1
;; QUESTIONS:
;; nsec3.ingotronic.ch., type = DNSKEY, class = IN
;; ANSWERS:
nsec3.ingotronic.ch. 300 IN DNSKEY 257 3 7 AwEAAaBuJTf9oGyeTH3biUkAFLrsYrkodX1H7Snsui4XsDHFCBvs5XYacHbs0Jg0/O51KPjmNnjwMW8SSyDkKqYQ+9uYAf2EQ/pnD/VGQqnV2cw0Vwk/t0E2V4FUCju4pnAoyzZFZXGs1eWbX9JXu++b0Azp+ACq6485qJLzHhWDiIrPoK/SvdbFVRK4s+nPPJLH3NGBbtdz6kPq7aFWYBMoGeAZdN1wsQpcNWUo5eOmaJY53nMc7+rDpAyYlMe/FKwSZdX2ZDd63Qsa6Im4FVUJq/nWLq7tlQ/mWks15uDTQyJy/OWfA0ICCO4N9Fel9rThJNpJWEzOCblvZyBoy405kZk=
nsec3.ingotronic.ch. 300 IN DNSKEY 256 3 7 AwEAAccAWxkTVGZ6UAp0VEozAlYpARhbh6Y6tYOl6Fg3UeBNFFtDQ9fTEEt1NkbnR9u8KkpVN6a67avlYiUN1egDqEwzDU7R1Rw+/USdhm2hqOARmmu3DBgjjX/iXjZLyv310cOGFJZ/smcodlDL4pDAAoPxh/qs6KEBaT0sc1KWcGq3
nsec3.ingotronic.ch. 300 IN RRSIG DNSKEY 7 3 300 20150125001457 20141226000444 16758 nsec3.ingotronic.ch. mXi1ylDi8XkRPup+YlT8GPdYE+P7gb6+/VdAwtodI916IzrkGkOHOTLbnrbAqqJOh0HxVCYXdxovmEcbJKUFKwplrQg3XD7/9Sq4pKU1MhMFEGrm/QPkM4u0mgjQwyToDLGuPHuFyur3FSjO/n54uGhAEft9JOFk/WKtWdCnm2LLyQrpC6herA3efFaI8kZhdoEY02AwihWVJxHasmz7lOoKRgNrkfELU+fN4+V7ISsRfJMyZc6q5PuNeG6vFD0uNE8tpdLJCSMurKYVpelvYqzFIcRTYcIjXwmS+L3DGjupqWMzFZVmpQM62JG3KCCD0ffpnNb0nWoSoHwpSeh/3Q==
nsec3.ingotronic.ch. 300 IN RRSIG DNSKEY 7 3 300 20150125001457 20141226000444 62417 nsec3.ingotronic.ch. PyCrf8T5dAfJzapb1p+kcTALPjDuD2niSaXXo0KeHAunT+6gJicLML2S/ZpiYr7X7Ma4Z0TYqE02qH6pcLYNnSgv9BE8sZO0nRtPekSyTy5nLi4hFADYhjb3UjaB85qmQZcqm64vC/CJhWO4t6Eixg/5MYALw+Qdy5Fo0qy/U5E=
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 958 bytes
###############################################
testDoubleLabelABelowSignedNsec3MissingNsec3 0000664 0000000 0000000 00000046760 13020541473 0040726 0 ustar 00root root 0000000 0000000 dnssecjava-1.1.3/src/test/resources/recordings/org_jitsi_dnssec_TestNonExistence #Date: 2015-01-06T22:34:46+01:00
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 56602
;; flags: qr aa rd ra cd ; qd: 1 an: 0 au: 8 ad: 1
;; QUESTIONS:
;; gibtsnicht.gibtsnicht.nsec3.ingotronic.ch., type = A, class = IN
;; ANSWERS:
;; AUTHORITY RECORDS:
nsec3.ingotronic.ch. 300 IN SOA ns1.ingotronic.ch. admin.ingotronic.ch. 2013032932 300 60 864000 300
nsec3.ingotronic.ch. 300 IN RRSIG SOA 7 3 300 20150201003516 20150101233516 62417 nsec3.ingotronic.ch. RMXaAZCkydysBpA4+LWD2frs4CZH2FBxafAolq7MOG62Sw3ellwNcSIh2naMasviin2DU2BAzIYyFUqKJDbUqzTxZQjsM6d5LtgFy5iTNmWum6FnFP5Fz73Zs/9Q0LNEstR82MRRL8EDElADhFySAReavyT/vlSTScQGxx6slyQ=
NTV3QJT4VQDVBPB6BNOVM40NMKJ3H29P.nsec3.ingotronic.ch. 300 IN NSEC3 1 0 10 1234 O275F9OLQ9HNCER7U4SMD4V8AG7IPML9 A NS SOA RRSIG DNSKEY NSEC3PARAM
NTV3QJT4VQDVBPB6BNOVM40NMKJ3H29P.nsec3.ingotronic.ch. 300 IN RRSIG NSEC3 7 4 300 20150131235629 20150101233516 62417 nsec3.ingotronic.ch. xccCvQs/b3ndBUo6J2FbaCzDMg+LB1e4OWeI29VTBWcmfbuD3rZvneRdbA9B5AluJH1ar10xxdrt/+RSuhSWC70LswkdPDg4vshmCZMDeMCOJYFEkGR0UgcZUMynU6EewEDLVLgYtBkJmspeuZNMBMPk/ZUOolCElrkHfbUA1Cc=
UDUMPS9J6F8348HFHH2FAED6I9DDE0U6.nsec3.ingotronic.ch. 300 IN NSEC3 1 0 10 1234 0UPHA6GQV03I7D8EJUDKC30I0C6I1G1Q
UDUMPS9J6F8348HFHH2FAED6I9DDE0U6.nsec3.ingotronic.ch. 300 IN RRSIG NSEC3 7 4 300 20150125005926 20141226002759 62417 nsec3.ingotronic.ch. XV2q9ufbwzauD/tmjb2EKsNBF+kHQYL0/MNb6ivY1oH9Q2hzQNPUuHkUl1db2erDFodPvspmDk6p6WOXoV6wmmaYhN+JI1TQKYYThsnKC1bkt1h6QyjwsDc12d8HVHOopvoXpaYWoV4bbghsAylGVqRjEYyt8JtR3BPfphehloU=
L40SJG7ANKROIHCT5RA6C8CTKJ91CD3N.nsec3.ingotronic.ch. 300 IN NSEC3 1 0 10 1234 ND3HQPFBN314KVB64L6T40JF75US8HKT
L40SJG7ANKROIHCT5RA6C8CTKJ91CD3N.nsec3.ingotronic.ch. 300 IN RRSIG NSEC3 7 4 300 20150125005926 20141226002759 62417 nsec3.ingotronic.ch. v6NHEWwb2KxRGRPshC2KFoxJs4Mis3OmvncJmn5bIWBnzeTY4x75tsE4zlVPx9rp0rjmOAQsYn4KGtIFPUShDHNHy45qoOtKkvRzRgByx4K2l5Rq9OizQVYsEUUScXEYATilaDU9whifF0vPk7YPwFGRmiY3prCGAvY/jH4hQUM=
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 1060 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 27538
;; flags: qr rd ra ad cd ; qd: 1 an: 4 au: 0 ad: 1
;; QUESTIONS:
;; ., type = DNSKEY, class = IN
;; ANSWERS:
. 87387 IN DNSKEY 256 3 8 AwEAAaPD7Y7XIi1MOEREJNTrRhyqsY3gff6JWzg+XCbqut1sbcbvqyssHw8DT1AkRaAC92pO8xuyq5QEgEPL1IHfABLwpwXI5gTj4gdwi86bpkmlWs9fRpnn4DPDCTdrnxIejJXgClHikLJF3u3CdpNCMijq4CKdQbMlRZ3avv+G7rh7
. 87387 IN DNSKEY 256 3 8 AwEAAe3fSrbLBy3LOS7pnxEUhvPZTE2H5dIGsI/UfruI/nOEvWWa/PSX2BFedBkEqOlYdjdNF2f+6lmfk2Od/xu0v5bVqxFE+/24v3hZSlWBxvXzPTAGHrbW/IJYEPqlzVOAS4XdUgHg0N7IbLywNHMvB+Yf+Nm6ctyXXFLV4WTNnzs7
. 87387 IN DNSKEY 257 3 8 AwEAAagAIKlVZrpC6Ia7gEzahOR+9W29euxhJhVVLOyQbSEW0O8gcCjFFVQUTf6v58fLjwBd0YI0EzrAcQqBGCzh/RStIoO8g0NfnfL2MTJRkxoXbfDaUeVPQuYEhg37NZWAJQ9VnMVDxP/VHL496M/QZxkjf5/Efucp2gaDX6RS6CXpoY68LsvPVjR0ZSwzz1apAzvN9dlzEheX7ICJBBtuA6G3LQpzW5hOA2hzCTMjJPJ8LbqF6dsV6DoBQzgul0sGIcGOYl7OyQdXfZ57relSQageu+ipAdTTJ25AsRTAoub8ONGcLmqrAmRLKBP1dfwhYB4N7knNnulqQxA+Uk1ihz0=
. 87387 IN RRSIG DNSKEY 8 0 172800 20150115235959 20150101000000 19036 . i8cAxD2pvQi1oAyvQxRpDfFlbqPzW+69QQEsDwE1eWOm5AtawO9U7lmsGps7sy/fVNvl1ljKBj4Djp9pb3U2FLogjiIlW0cDAkPmLlG9t+b/pjEfBNlhjANUVN06pvQVAfm+LcF26EaWT6FlISBqb6jSy4BHRa3Bdc4Sx7+pRSYSqVVvYxLkfAWsKPqGkvWhebJDndJJV9syXQXgZ+v/uJ+6XOS43xkAdeL8iBzIs/FlwMTfh3tVe3d0lb65IBBLlCzeQuetX+0Vu1YFcnD0mHc/wS2ZnAV5toAFmyVQBoY/XAZiZeaOkcROJ6Zmqezy7liwK7BqsYyAZntMhk8lbg==
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 883 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 17381
;; flags: qr rd ra ad cd ; qd: 1 an: 2 au: 0 ad: 1
;; QUESTIONS:
;; ch., type = DS, class = IN
;; ANSWERS:
ch. 987 IN DS 46375 8 2 8F96646FC68BB7E4AF4C0750A6096FBC0D4ECDA3D3FA6DA06FDDB42EE50C6CF3
ch. 987 IN RRSIG DS 8 1 86400 20150112170000 20150105160000 16665 . thY7xYWBBxiBjqbQIb9fAG4TmQgnziwM7q6P1T3/ITxmECdvOCQnnZA3uD7qmN8uM0HudsD7+y+zgD3rsH4RSTKdL4kHSI0OnCxToMTvklghEgFDezqIRm8NkWdI2H4Stwrj20nYKSpLQxPI2EE54gs18P3KyO8bAUYv8Qx73xU=
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 238 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 42716
;; flags: qr rd ra ad cd ; qd: 1 an: 4 au: 0 ad: 1
;; QUESTIONS:
;; ch., type = DNSKEY, class = IN
;; ANSWERS:
ch. 988 IN DNSKEY 256 3 8 AwEAAcSLdT0fEmcFmLpeUkAJoeVaHKiu+nbuc43fWlqaCRVf8t2HA4uWxOk0O5ci9nrFTc8nq8oa5fk5Cj7CHh4yrX9qUCfTdIWTyp8BDEdJpS+Dyb0u9wQuVj+nQMj4fLzdQf4TJs3/qxuiLr3nL1UUwlhhXeqSqGVb7p3mtB5HJ8ad
ch. 988 IN DNSKEY 256 3 8 AwEAAcsg0kY6fw1wzYMhSAKTy+Y2JzAst66P/1odp9NECJJHbU8f4nwziI3onoFSBV0ZiSZhY1aH5dhdDZ7BkrqhVXSrZPAz0CvzjIxmB1gSOf9DeZvjQvoy97HqYolxsf+B3QQv2RKBT67elF5+JisKg3/dQISelKn8LhabSoVrMlD1
ch. 988 IN DNSKEY 257 3 8 AwEAAb7GhhZ8IAy/AhwmSms5DeQK5ad09wIIplEpYoiAIYXPtJvT1ReFzyfTp/2YP+g/PWDwHPh4qKAHa9x0VgbIQcGAeNakmfkAdWEmCnca323/SAml3mwfaX62G7/uYWae5zh8QTxZKNd+K1yZ5x0IxnI31chSl5xymRbTEHYZDKwSIRFM3fTxUMt93WFaBVWELReYotJBr++rvAWdnlay5TPBTvheLBkaiqtgM4GP8HK07Y+86lsZnEsj5K3G1KTV5SPpa82rqYAwxG9VKbmSE/6/kBR5jJHjt1rRt5Oe7v18aEtw0YCEN4vxq+KuvMoNVqXUsE9LBwHJD+QNwi6wmB0=
ch. 988 IN RRSIG DNSKEY 8 1 86400 20150127100909 20141212090909 46375 ch. bT8q0FWyeMH0SulNo6UdIIgZYNATwYsee2bikq2Gh339Bufma8eaqWIPYT3XKmxYPBFOw0bVl+kLZxTwbR1CFoCDXoP+qgQhh4mf9qkNiv2CDSc+0FE3FRREn+DAhYTUEuB58FPiPakFB8s8O7T+k2qhDae7jy4/y7Jl1lnjaBY8s7bzOUPhF0KKCNZmvoKwtL23ZdVeTSV1xM3jkiNnpzBKbcoSWECSGJVp1SE0BnRXdwQP41YTXFZ0310YjaTAUCC5qbMIWdEkHjfdSQtKBImnc85mkapq9w++XQ4zhauPWBtrPV3CcoCahjUaWdjrKVkibomlJZaN8MEO23CfQw==
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 893 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 4183
;; flags: qr rd ra cd ; qd: 1 an: 3 au: 0 ad: 1
;; QUESTIONS:
;; ingotronic.ch., type = DS, class = IN
;; ANSWERS:
ingotronic.ch. 3596 IN DS 6031 5 2 4A948F2FDADA24686E473EDAC00DCF972584C75E3FAA92C2021B6221449FF87E
ingotronic.ch. 3596 IN DS 6031 5 1 733D0218B571CD617B1A7493564B9FC4F12ADE82
ingotronic.ch. 3596 IN RRSIG DS 8 2 3600 20150129033614 20150105123019 60789 ch. rVPJP2HhzW7OkroK2axFj5Lb4iVWCH8Fp/Iq1rF952NDo72b8RiKje2RaAKJAGQ+wd0YgE+PAej04GCmkhlDJA/zvPeeTxuhy3HbJzReMlQ7fjyH+wW1hli+FuIYvogXWf7nO/9VyPORt8X/f/pjrOr3Vlj9sGLN8TGYpEuVSw4=
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 288 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 13829
;; flags: qr aa rd ra cd ; qd: 1 an: 4 au: 0 ad: 1
;; QUESTIONS:
;; ingotronic.ch., type = DNSKEY, class = IN
;; ANSWERS:
ingotronic.ch. 300 IN DNSKEY 257 3 5 AwEAAeA1vzmjaB+eBAcvhzpKEgAEFpvQ1rg4uKDW6MsQtacKoqBpgyep2+LuWotz5p/xYxj3NGsArwN8Ad5cY0FHRr8miTT0elOv6nvlqGIfRuhj/BXAQ1x4ihpSFslHw0lJMYFwxsUZWpUyjWX/nv1xRZMMwF46gui0N4OEbyTYusCk77D+A71k+K0EAitFIbIH4GCUKmH1H7HmXhSVH9bN/n7KEGwW32lmsuuUcJoRKDkcUvbMXY/9Xoa2quERrUg/rBbDUHowRPjYDS5GzY1+f4YY8s40BufGiqyUTKKXL953MVFK8gmezXA0hbmrnZ7CBOw/7238mORAdzExaX8n7CE=
ingotronic.ch. 300 IN DNSKEY 256 3 5 AwEAAZ2Xh77GFzpEDx7EHYxShqltHgkiG+BOjBGifEmnJhQSdE5/yNSLFNcdhZZ8HUPxYnaedTqJcFFg4AzUsQklF/fECegTJdZjaj2WoL0/I8K7HMfY/hVuRZUWPNglYi8agJRX6gdkFTCpUNI7stpgKqxtzUJhhw15uG/lKMplwqUr
ingotronic.ch. 300 IN RRSIG DNSKEY 5 2 300 20150125003700 20141226001657 6031 ingotronic.ch. rs1QlP2SlSpA2ELbzwg3DgWLzXWL3Lpv6CUJE2Q0qH2Zp7Qdy3cD+ZEtNh9v24Qv1M6JJ3zFt8mmZoCeW2ycuMbJCqBkW9CBuwF+VznZvZY2MxwPipvhvEEGP//0M8YAZJ66yQPDv3PTdAP8FYbIrJyvY44vwyncwbslpfHT9jAsrbfr3vuMuWps86dnP462q+0s1TxBfqi8mzo3gdavjHKWVNwohLahLKT+tWeu6DSzQv0YwMjwtkLgF7QRgx3ctIIkloOrnx9nHH1N6y+hxEB89fOlyVDjHhgL5uVtsD5fEdT0FJ2Gc/2nShEMMqIwr1/J9kUq1mNySff/uEe65Q==
ingotronic.ch. 300 IN RRSIG DNSKEY 5 2 300 20150125003700 20141226001657 17430 ingotronic.ch. mEwZjhQqeWksWD0TCnNBrtce4YkWJL3edqL6PvAUu8Fn+Ih437kEs3+pqdkgRsdYQ9HW+lBm/8pWwJlNAv0bi9NykItXMwAUFtncgq+6Pnh3iAM972GXSa5VV4LcGQ5b8CBdHCHiEKDqyPv5Hr5QfYL/FQaWlcNRh4QZZlZNPFA=
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 940 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 8061
;; flags: qr aa rd ra cd ; qd: 1 an: 3 au: 0 ad: 1
;; QUESTIONS:
;; nsec3.ingotronic.ch., type = DS, class = IN
;; ANSWERS:
nsec3.ingotronic.ch. 300 IN DS 16758 7 1 1720FF268E09A2CB63805EC8782D10AAD20E12A5
nsec3.ingotronic.ch. 300 IN DS 16758 7 2 3C8DC02750A1636F829B45D6E6D642866768A9CD40A013AD9D25AB63734FFA13
nsec3.ingotronic.ch. 300 IN RRSIG DS 5 3 300 20150125011134 20141226002644 17430 ingotronic.ch. hNurzlGhlyHbSgezPDuhIrtN9ZMsMXZbKGc7HD5rUuM88wD3fM97NxdzF+2Hi1USvBZ5GsQv63L+lAzf+mFPBoPIFHtTiAv8up7kQKRKmi/EzzkCYd/CC4UYdDZbaUyv7esh7spSOGwjPJNdK831p+MgltoWaYtnSGVMgOKk5mc=
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 305 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 35158
;; flags: qr aa rd ra cd ; qd: 1 an: 4 au: 0 ad: 1
;; QUESTIONS:
;; nsec3.ingotronic.ch., type = DNSKEY, class = IN
;; ANSWERS:
nsec3.ingotronic.ch. 300 IN DNSKEY 256 3 7 AwEAAccAWxkTVGZ6UAp0VEozAlYpARhbh6Y6tYOl6Fg3UeBNFFtDQ9fTEEt1NkbnR9u8KkpVN6a67avlYiUN1egDqEwzDU7R1Rw+/USdhm2hqOARmmu3DBgjjX/iXjZLyv310cOGFJZ/smcodlDL4pDAAoPxh/qs6KEBaT0sc1KWcGq3
nsec3.ingotronic.ch. 300 IN DNSKEY 257 3 7 AwEAAaBuJTf9oGyeTH3biUkAFLrsYrkodX1H7Snsui4XsDHFCBvs5XYacHbs0Jg0/O51KPjmNnjwMW8SSyDkKqYQ+9uYAf2EQ/pnD/VGQqnV2cw0Vwk/t0E2V4FUCju4pnAoyzZFZXGs1eWbX9JXu++b0Azp+ACq6485qJLzHhWDiIrPoK/SvdbFVRK4s+nPPJLH3NGBbtdz6kPq7aFWYBMoGeAZdN1wsQpcNWUo5eOmaJY53nMc7+rDpAyYlMe/FKwSZdX2ZDd63Qsa6Im4FVUJq/nWLq7tlQ/mWks15uDTQyJy/OWfA0ICCO4N9Fel9rThJNpJWEzOCblvZyBoy405kZk=
nsec3.ingotronic.ch. 300 IN RRSIG DNSKEY 7 3 300 20150125001457 20141226000444 16758 nsec3.ingotronic.ch. mXi1ylDi8XkRPup+YlT8GPdYE+P7gb6+/VdAwtodI916IzrkGkOHOTLbnrbAqqJOh0HxVCYXdxovmEcbJKUFKwplrQg3XD7/9Sq4pKU1MhMFEGrm/QPkM4u0mgjQwyToDLGuPHuFyur3FSjO/n54uGhAEft9JOFk/WKtWdCnm2LLyQrpC6herA3efFaI8kZhdoEY02AwihWVJxHasmz7lOoKRgNrkfELU+fN4+V7ISsRfJMyZc6q5PuNeG6vFD0uNE8tpdLJCSMurKYVpelvYqzFIcRTYcIjXwmS+L3DGjupqWMzFZVmpQM62JG3KCCD0ffpnNb0nWoSoHwpSeh/3Q==
nsec3.ingotronic.ch. 300 IN RRSIG DNSKEY 7 3 300 20150125001457 20141226000444 62417 nsec3.ingotronic.ch. PyCrf8T5dAfJzapb1p+kcTALPjDuD2niSaXXo0KeHAunT+6gJicLML2S/ZpiYr7X7Ma4Z0TYqE02qH6pcLYNnSgv9BE8sZO0nRtPekSyTy5nLi4hFADYhjb3UjaB85qmQZcqm64vC/CJhWO4t6Eixg/5MYALw+Qdy5Fo0qy/U5E=
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 958 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 25776
;; flags: qr rd ra ad cd ; qd: 1 an: 4 au: 0 ad: 1
;; QUESTIONS:
;; ., type = DNSKEY, class = IN
;; ANSWERS:
. 87387 IN DNSKEY 256 3 8 AwEAAe3fSrbLBy3LOS7pnxEUhvPZTE2H5dIGsI/UfruI/nOEvWWa/PSX2BFedBkEqOlYdjdNF2f+6lmfk2Od/xu0v5bVqxFE+/24v3hZSlWBxvXzPTAGHrbW/IJYEPqlzVOAS4XdUgHg0N7IbLywNHMvB+Yf+Nm6ctyXXFLV4WTNnzs7
. 87387 IN DNSKEY 257 3 8 AwEAAagAIKlVZrpC6Ia7gEzahOR+9W29euxhJhVVLOyQbSEW0O8gcCjFFVQUTf6v58fLjwBd0YI0EzrAcQqBGCzh/RStIoO8g0NfnfL2MTJRkxoXbfDaUeVPQuYEhg37NZWAJQ9VnMVDxP/VHL496M/QZxkjf5/Efucp2gaDX6RS6CXpoY68LsvPVjR0ZSwzz1apAzvN9dlzEheX7ICJBBtuA6G3LQpzW5hOA2hzCTMjJPJ8LbqF6dsV6DoBQzgul0sGIcGOYl7OyQdXfZ57relSQageu+ipAdTTJ25AsRTAoub8ONGcLmqrAmRLKBP1dfwhYB4N7knNnulqQxA+Uk1ihz0=
. 87387 IN DNSKEY 256 3 8 AwEAAaPD7Y7XIi1MOEREJNTrRhyqsY3gff6JWzg+XCbqut1sbcbvqyssHw8DT1AkRaAC92pO8xuyq5QEgEPL1IHfABLwpwXI5gTj4gdwi86bpkmlWs9fRpnn4DPDCTdrnxIejJXgClHikLJF3u3CdpNCMijq4CKdQbMlRZ3avv+G7rh7
. 87387 IN RRSIG DNSKEY 8 0 172800 20150115235959 20150101000000 19036 . i8cAxD2pvQi1oAyvQxRpDfFlbqPzW+69QQEsDwE1eWOm5AtawO9U7lmsGps7sy/fVNvl1ljKBj4Djp9pb3U2FLogjiIlW0cDAkPmLlG9t+b/pjEfBNlhjANUVN06pvQVAfm+LcF26EaWT6FlISBqb6jSy4BHRa3Bdc4Sx7+pRSYSqVVvYxLkfAWsKPqGkvWhebJDndJJV9syXQXgZ+v/uJ+6XOS43xkAdeL8iBzIs/FlwMTfh3tVe3d0lb65IBBLlCzeQuetX+0Vu1YFcnD0mHc/wS2ZnAV5toAFmyVQBoY/XAZiZeaOkcROJ6Zmqezy7liwK7BqsYyAZntMhk8lbg==
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 883 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 42269
;; flags: qr rd ra ad cd ; qd: 1 an: 2 au: 0 ad: 1
;; QUESTIONS:
;; ch., type = DS, class = IN
;; ANSWERS:
ch. 987 IN DS 46375 8 2 8F96646FC68BB7E4AF4C0750A6096FBC0D4ECDA3D3FA6DA06FDDB42EE50C6CF3
ch. 987 IN RRSIG DS 8 1 86400 20150112170000 20150105160000 16665 . thY7xYWBBxiBjqbQIb9fAG4TmQgnziwM7q6P1T3/ITxmECdvOCQnnZA3uD7qmN8uM0HudsD7+y+zgD3rsH4RSTKdL4kHSI0OnCxToMTvklghEgFDezqIRm8NkWdI2H4Stwrj20nYKSpLQxPI2EE54gs18P3KyO8bAUYv8Qx73xU=
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 238 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 6552
;; flags: qr rd ra ad cd ; qd: 1 an: 4 au: 0 ad: 1
;; QUESTIONS:
;; ch., type = DNSKEY, class = IN
;; ANSWERS:
ch. 987 IN DNSKEY 256 3 8 AwEAAcsg0kY6fw1wzYMhSAKTy+Y2JzAst66P/1odp9NECJJHbU8f4nwziI3onoFSBV0ZiSZhY1aH5dhdDZ7BkrqhVXSrZPAz0CvzjIxmB1gSOf9DeZvjQvoy97HqYolxsf+B3QQv2RKBT67elF5+JisKg3/dQISelKn8LhabSoVrMlD1
ch. 987 IN DNSKEY 257 3 8 AwEAAb7GhhZ8IAy/AhwmSms5DeQK5ad09wIIplEpYoiAIYXPtJvT1ReFzyfTp/2YP+g/PWDwHPh4qKAHa9x0VgbIQcGAeNakmfkAdWEmCnca323/SAml3mwfaX62G7/uYWae5zh8QTxZKNd+K1yZ5x0IxnI31chSl5xymRbTEHYZDKwSIRFM3fTxUMt93WFaBVWELReYotJBr++rvAWdnlay5TPBTvheLBkaiqtgM4GP8HK07Y+86lsZnEsj5K3G1KTV5SPpa82rqYAwxG9VKbmSE/6/kBR5jJHjt1rRt5Oe7v18aEtw0YCEN4vxq+KuvMoNVqXUsE9LBwHJD+QNwi6wmB0=
ch. 987 IN DNSKEY 256 3 8 AwEAAcSLdT0fEmcFmLpeUkAJoeVaHKiu+nbuc43fWlqaCRVf8t2HA4uWxOk0O5ci9nrFTc8nq8oa5fk5Cj7CHh4yrX9qUCfTdIWTyp8BDEdJpS+Dyb0u9wQuVj+nQMj4fLzdQf4TJs3/qxuiLr3nL1UUwlhhXeqSqGVb7p3mtB5HJ8ad
ch. 987 IN RRSIG DNSKEY 8 1 86400 20150127100909 20141212090909 46375 ch. bT8q0FWyeMH0SulNo6UdIIgZYNATwYsee2bikq2Gh339Bufma8eaqWIPYT3XKmxYPBFOw0bVl+kLZxTwbR1CFoCDXoP+qgQhh4mf9qkNiv2CDSc+0FE3FRREn+DAhYTUEuB58FPiPakFB8s8O7T+k2qhDae7jy4/y7Jl1lnjaBY8s7bzOUPhF0KKCNZmvoKwtL23ZdVeTSV1xM3jkiNnpzBKbcoSWECSGJVp1SE0BnRXdwQP41YTXFZ0310YjaTAUCC5qbMIWdEkHjfdSQtKBImnc85mkapq9w++XQ4zhauPWBtrPV3CcoCahjUaWdjrKVkibomlJZaN8MEO23CfQw==
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 893 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 15230
;; flags: qr rd ra cd ; qd: 1 an: 3 au: 0 ad: 1
;; QUESTIONS:
;; ingotronic.ch., type = DS, class = IN
;; ANSWERS:
ingotronic.ch. 3595 IN DS 6031 5 2 4A948F2FDADA24686E473EDAC00DCF972584C75E3FAA92C2021B6221449FF87E
ingotronic.ch. 3595 IN DS 6031 5 1 733D0218B571CD617B1A7493564B9FC4F12ADE82
ingotronic.ch. 3595 IN RRSIG DS 8 2 3600 20150129033614 20150105123019 60789 ch. rVPJP2HhzW7OkroK2axFj5Lb4iVWCH8Fp/Iq1rF952NDo72b8RiKje2RaAKJAGQ+wd0YgE+PAej04GCmkhlDJA/zvPeeTxuhy3HbJzReMlQ7fjyH+wW1hli+FuIYvogXWf7nO/9VyPORt8X/f/pjrOr3Vlj9sGLN8TGYpEuVSw4=
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 288 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 57871
;; flags: qr aa rd ra cd ; qd: 1 an: 4 au: 0 ad: 1
;; QUESTIONS:
;; ingotronic.ch., type = DNSKEY, class = IN
;; ANSWERS:
ingotronic.ch. 300 IN DNSKEY 257 3 5 AwEAAeA1vzmjaB+eBAcvhzpKEgAEFpvQ1rg4uKDW6MsQtacKoqBpgyep2+LuWotz5p/xYxj3NGsArwN8Ad5cY0FHRr8miTT0elOv6nvlqGIfRuhj/BXAQ1x4ihpSFslHw0lJMYFwxsUZWpUyjWX/nv1xRZMMwF46gui0N4OEbyTYusCk77D+A71k+K0EAitFIbIH4GCUKmH1H7HmXhSVH9bN/n7KEGwW32lmsuuUcJoRKDkcUvbMXY/9Xoa2quERrUg/rBbDUHowRPjYDS5GzY1+f4YY8s40BufGiqyUTKKXL953MVFK8gmezXA0hbmrnZ7CBOw/7238mORAdzExaX8n7CE=
ingotronic.ch. 300 IN DNSKEY 256 3 5 AwEAAZ2Xh77GFzpEDx7EHYxShqltHgkiG+BOjBGifEmnJhQSdE5/yNSLFNcdhZZ8HUPxYnaedTqJcFFg4AzUsQklF/fECegTJdZjaj2WoL0/I8K7HMfY/hVuRZUWPNglYi8agJRX6gdkFTCpUNI7stpgKqxtzUJhhw15uG/lKMplwqUr
ingotronic.ch. 300 IN RRSIG DNSKEY 5 2 300 20150125003700 20141226001657 6031 ingotronic.ch. rs1QlP2SlSpA2ELbzwg3DgWLzXWL3Lpv6CUJE2Q0qH2Zp7Qdy3cD+ZEtNh9v24Qv1M6JJ3zFt8mmZoCeW2ycuMbJCqBkW9CBuwF+VznZvZY2MxwPipvhvEEGP//0M8YAZJ66yQPDv3PTdAP8FYbIrJyvY44vwyncwbslpfHT9jAsrbfr3vuMuWps86dnP462q+0s1TxBfqi8mzo3gdavjHKWVNwohLahLKT+tWeu6DSzQv0YwMjwtkLgF7QRgx3ctIIkloOrnx9nHH1N6y+hxEB89fOlyVDjHhgL5uVtsD5fEdT0FJ2Gc/2nShEMMqIwr1/J9kUq1mNySff/uEe65Q==
ingotronic.ch. 300 IN RRSIG DNSKEY 5 2 300 20150125003700 20141226001657 17430 ingotronic.ch. mEwZjhQqeWksWD0TCnNBrtce4YkWJL3edqL6PvAUu8Fn+Ih437kEs3+pqdkgRsdYQ9HW+lBm/8pWwJlNAv0bi9NykItXMwAUFtncgq+6Pnh3iAM972GXSa5VV4LcGQ5b8CBdHCHiEKDqyPv5Hr5QfYL/FQaWlcNRh4QZZlZNPFA=
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 940 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 60830
;; flags: qr aa rd ra cd ; qd: 1 an: 3 au: 0 ad: 1
;; QUESTIONS:
;; nsec3.ingotronic.ch., type = DS, class = IN
;; ANSWERS:
nsec3.ingotronic.ch. 300 IN DS 16758 7 2 3C8DC02750A1636F829B45D6E6D642866768A9CD40A013AD9D25AB63734FFA13
nsec3.ingotronic.ch. 300 IN DS 16758 7 1 1720FF268E09A2CB63805EC8782D10AAD20E12A5
nsec3.ingotronic.ch. 300 IN RRSIG DS 5 3 300 20150125011134 20141226002644 17430 ingotronic.ch. hNurzlGhlyHbSgezPDuhIrtN9ZMsMXZbKGc7HD5rUuM88wD3fM97NxdzF+2Hi1USvBZ5GsQv63L+lAzf+mFPBoPIFHtTiAv8up7kQKRKmi/EzzkCYd/CC4UYdDZbaUyv7esh7spSOGwjPJNdK831p+MgltoWaYtnSGVMgOKk5mc=
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 305 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 6067
;; flags: qr aa rd ra cd ; qd: 1 an: 4 au: 0 ad: 1
;; QUESTIONS:
;; nsec3.ingotronic.ch., type = DNSKEY, class = IN
;; ANSWERS:
nsec3.ingotronic.ch. 300 IN DNSKEY 257 3 7 AwEAAaBuJTf9oGyeTH3biUkAFLrsYrkodX1H7Snsui4XsDHFCBvs5XYacHbs0Jg0/O51KPjmNnjwMW8SSyDkKqYQ+9uYAf2EQ/pnD/VGQqnV2cw0Vwk/t0E2V4FUCju4pnAoyzZFZXGs1eWbX9JXu++b0Azp+ACq6485qJLzHhWDiIrPoK/SvdbFVRK4s+nPPJLH3NGBbtdz6kPq7aFWYBMoGeAZdN1wsQpcNWUo5eOmaJY53nMc7+rDpAyYlMe/FKwSZdX2ZDd63Qsa6Im4FVUJq/nWLq7tlQ/mWks15uDTQyJy/OWfA0ICCO4N9Fel9rThJNpJWEzOCblvZyBoy405kZk=
nsec3.ingotronic.ch. 300 IN DNSKEY 256 3 7 AwEAAccAWxkTVGZ6UAp0VEozAlYpARhbh6Y6tYOl6Fg3UeBNFFtDQ9fTEEt1NkbnR9u8KkpVN6a67avlYiUN1egDqEwzDU7R1Rw+/USdhm2hqOARmmu3DBgjjX/iXjZLyv310cOGFJZ/smcodlDL4pDAAoPxh/qs6KEBaT0sc1KWcGq3
nsec3.ingotronic.ch. 300 IN RRSIG DNSKEY 7 3 300 20150125001457 20141226000444 16758 nsec3.ingotronic.ch. mXi1ylDi8XkRPup+YlT8GPdYE+P7gb6+/VdAwtodI916IzrkGkOHOTLbnrbAqqJOh0HxVCYXdxovmEcbJKUFKwplrQg3XD7/9Sq4pKU1MhMFEGrm/QPkM4u0mgjQwyToDLGuPHuFyur3FSjO/n54uGhAEft9JOFk/WKtWdCnm2LLyQrpC6herA3efFaI8kZhdoEY02AwihWVJxHasmz7lOoKRgNrkfELU+fN4+V7ISsRfJMyZc6q5PuNeG6vFD0uNE8tpdLJCSMurKYVpelvYqzFIcRTYcIjXwmS+L3DGjupqWMzFZVmpQM62JG3KCCD0ffpnNb0nWoSoHwpSeh/3Q==
nsec3.ingotronic.ch. 300 IN RRSIG DNSKEY 7 3 300 20150125001457 20141226000444 62417 nsec3.ingotronic.ch. PyCrf8T5dAfJzapb1p+kcTALPjDuD2niSaXXo0KeHAunT+6gJicLML2S/ZpiYr7X7Ma4Z0TYqE02qH6pcLYNnSgv9BE8sZO0nRtPekSyTy5nLi4hFADYhjb3UjaB85qmQZcqm64vC/CJhWO4t6Eixg/5MYALw+Qdy5Fo0qy/U5E=
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 958 bytes
###############################################
testDoubleLabelMXBelowSignedForExistingA 0000664 0000000 0000000 00000016440 13020541473 0040223 0 ustar 00root root 0000000 0000000 dnssecjava-1.1.3/src/test/resources/recordings/org_jitsi_dnssec_TestNonExistence #Date: 2015-01-06T22:34:44+01:00
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 21797
;; flags: qr aa rd ra cd ; qd: 1 an: 0 au: 4 ad: 1
;; QUESTIONS:
;; a.b.ingotronic.ch., type = MX, class = IN
;; ANSWERS:
;; AUTHORITY RECORDS:
ingotronic.ch. 300 IN SOA ns1.ingotronic.ch. admin.ingotronic.ch. 2013032762 300 60 864000 300
ingotronic.ch. 300 IN RRSIG SOA 5 2 300 20150125021244 20141226011244 17430 ingotronic.ch. WDLpp9G0P/rlMBfpFn9sAfpEFoBnQfwyGSXbGCc/LG1FSkJoKLDQYDY696scLNsJgkrzZeJrl0oSSvA8AvRUhYRrmuqWMxTVFgYlRwPwqEMCKUqiVhKGVF4NYemoBiUQC4nJwBZd57xKCiF4AQ4CodBtiZxefJFAlTNE0g2yxtM=
a.b.ingotronic.ch. 300 IN NSEC *.c.ingotronic.ch. A RRSIG NSEC
a.b.ingotronic.ch. 300 IN RRSIG NSEC 5 4 300 20150125000532 20141225234703 17430 ingotronic.ch. HMCFItkk6JIV9hcHJ+p+OO5CI8B7H4fWy6w8kMfKPA/Z/lUcjlSKSexxd4ppubXfaVDhTW5j3Nd0rEpKbxztd9MZGVbvk7LJibvpD4ACR0xSmE69fyjrxrN/uDPYVPL5uOTklgDAlinQS3E6KulWr5iST9H4gmhfrk5MpvK4fcc=
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 477 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 3215
;; flags: qr rd ra ad cd ; qd: 1 an: 4 au: 0 ad: 1
;; QUESTIONS:
;; ., type = DNSKEY, class = IN
;; ANSWERS:
. 87389 IN DNSKEY 256 3 8 AwEAAaPD7Y7XIi1MOEREJNTrRhyqsY3gff6JWzg+XCbqut1sbcbvqyssHw8DT1AkRaAC92pO8xuyq5QEgEPL1IHfABLwpwXI5gTj4gdwi86bpkmlWs9fRpnn4DPDCTdrnxIejJXgClHikLJF3u3CdpNCMijq4CKdQbMlRZ3avv+G7rh7
. 87389 IN DNSKEY 256 3 8 AwEAAe3fSrbLBy3LOS7pnxEUhvPZTE2H5dIGsI/UfruI/nOEvWWa/PSX2BFedBkEqOlYdjdNF2f+6lmfk2Od/xu0v5bVqxFE+/24v3hZSlWBxvXzPTAGHrbW/IJYEPqlzVOAS4XdUgHg0N7IbLywNHMvB+Yf+Nm6ctyXXFLV4WTNnzs7
. 87389 IN DNSKEY 257 3 8 AwEAAagAIKlVZrpC6Ia7gEzahOR+9W29euxhJhVVLOyQbSEW0O8gcCjFFVQUTf6v58fLjwBd0YI0EzrAcQqBGCzh/RStIoO8g0NfnfL2MTJRkxoXbfDaUeVPQuYEhg37NZWAJQ9VnMVDxP/VHL496M/QZxkjf5/Efucp2gaDX6RS6CXpoY68LsvPVjR0ZSwzz1apAzvN9dlzEheX7ICJBBtuA6G3LQpzW5hOA2hzCTMjJPJ8LbqF6dsV6DoBQzgul0sGIcGOYl7OyQdXfZ57relSQageu+ipAdTTJ25AsRTAoub8ONGcLmqrAmRLKBP1dfwhYB4N7knNnulqQxA+Uk1ihz0=
. 87389 IN RRSIG DNSKEY 8 0 172800 20150115235959 20150101000000 19036 . i8cAxD2pvQi1oAyvQxRpDfFlbqPzW+69QQEsDwE1eWOm5AtawO9U7lmsGps7sy/fVNvl1ljKBj4Djp9pb3U2FLogjiIlW0cDAkPmLlG9t+b/pjEfBNlhjANUVN06pvQVAfm+LcF26EaWT6FlISBqb6jSy4BHRa3Bdc4Sx7+pRSYSqVVvYxLkfAWsKPqGkvWhebJDndJJV9syXQXgZ+v/uJ+6XOS43xkAdeL8iBzIs/FlwMTfh3tVe3d0lb65IBBLlCzeQuetX+0Vu1YFcnD0mHc/wS2ZnAV5toAFmyVQBoY/XAZiZeaOkcROJ6Zmqezy7liwK7BqsYyAZntMhk8lbg==
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 883 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 19457
;; flags: qr rd ra ad cd ; qd: 1 an: 2 au: 0 ad: 1
;; QUESTIONS:
;; ch., type = DS, class = IN
;; ANSWERS:
ch. 989 IN DS 46375 8 2 8F96646FC68BB7E4AF4C0750A6096FBC0D4ECDA3D3FA6DA06FDDB42EE50C6CF3
ch. 989 IN RRSIG DS 8 1 86400 20150112170000 20150105160000 16665 . thY7xYWBBxiBjqbQIb9fAG4TmQgnziwM7q6P1T3/ITxmECdvOCQnnZA3uD7qmN8uM0HudsD7+y+zgD3rsH4RSTKdL4kHSI0OnCxToMTvklghEgFDezqIRm8NkWdI2H4Stwrj20nYKSpLQxPI2EE54gs18P3KyO8bAUYv8Qx73xU=
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 238 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 13543
;; flags: qr rd ra ad cd ; qd: 1 an: 4 au: 0 ad: 1
;; QUESTIONS:
;; ch., type = DNSKEY, class = IN
;; ANSWERS:
ch. 990 IN DNSKEY 257 3 8 AwEAAb7GhhZ8IAy/AhwmSms5DeQK5ad09wIIplEpYoiAIYXPtJvT1ReFzyfTp/2YP+g/PWDwHPh4qKAHa9x0VgbIQcGAeNakmfkAdWEmCnca323/SAml3mwfaX62G7/uYWae5zh8QTxZKNd+K1yZ5x0IxnI31chSl5xymRbTEHYZDKwSIRFM3fTxUMt93WFaBVWELReYotJBr++rvAWdnlay5TPBTvheLBkaiqtgM4GP8HK07Y+86lsZnEsj5K3G1KTV5SPpa82rqYAwxG9VKbmSE/6/kBR5jJHjt1rRt5Oe7v18aEtw0YCEN4vxq+KuvMoNVqXUsE9LBwHJD+QNwi6wmB0=
ch. 990 IN DNSKEY 256 3 8 AwEAAcSLdT0fEmcFmLpeUkAJoeVaHKiu+nbuc43fWlqaCRVf8t2HA4uWxOk0O5ci9nrFTc8nq8oa5fk5Cj7CHh4yrX9qUCfTdIWTyp8BDEdJpS+Dyb0u9wQuVj+nQMj4fLzdQf4TJs3/qxuiLr3nL1UUwlhhXeqSqGVb7p3mtB5HJ8ad
ch. 990 IN DNSKEY 256 3 8 AwEAAcsg0kY6fw1wzYMhSAKTy+Y2JzAst66P/1odp9NECJJHbU8f4nwziI3onoFSBV0ZiSZhY1aH5dhdDZ7BkrqhVXSrZPAz0CvzjIxmB1gSOf9DeZvjQvoy97HqYolxsf+B3QQv2RKBT67elF5+JisKg3/dQISelKn8LhabSoVrMlD1
ch. 990 IN RRSIG DNSKEY 8 1 86400 20150127100909 20141212090909 46375 ch. bT8q0FWyeMH0SulNo6UdIIgZYNATwYsee2bikq2Gh339Bufma8eaqWIPYT3XKmxYPBFOw0bVl+kLZxTwbR1CFoCDXoP+qgQhh4mf9qkNiv2CDSc+0FE3FRREn+DAhYTUEuB58FPiPakFB8s8O7T+k2qhDae7jy4/y7Jl1lnjaBY8s7bzOUPhF0KKCNZmvoKwtL23ZdVeTSV1xM3jkiNnpzBKbcoSWECSGJVp1SE0BnRXdwQP41YTXFZ0310YjaTAUCC5qbMIWdEkHjfdSQtKBImnc85mkapq9w++XQ4zhauPWBtrPV3CcoCahjUaWdjrKVkibomlJZaN8MEO23CfQw==
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 893 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 44836
;; flags: qr rd ra cd ; qd: 1 an: 3 au: 0 ad: 1
;; QUESTIONS:
;; ingotronic.ch., type = DS, class = IN
;; ANSWERS:
ingotronic.ch. 3598 IN DS 6031 5 1 733D0218B571CD617B1A7493564B9FC4F12ADE82
ingotronic.ch. 3598 IN DS 6031 5 2 4A948F2FDADA24686E473EDAC00DCF972584C75E3FAA92C2021B6221449FF87E
ingotronic.ch. 3598 IN RRSIG DS 8 2 3600 20150129033614 20150105123019 60789 ch. rVPJP2HhzW7OkroK2axFj5Lb4iVWCH8Fp/Iq1rF952NDo72b8RiKje2RaAKJAGQ+wd0YgE+PAej04GCmkhlDJA/zvPeeTxuhy3HbJzReMlQ7fjyH+wW1hli+FuIYvogXWf7nO/9VyPORt8X/f/pjrOr3Vlj9sGLN8TGYpEuVSw4=
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 288 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 26288
;; flags: qr aa rd ra cd ; qd: 1 an: 4 au: 0 ad: 1
;; QUESTIONS:
;; ingotronic.ch., type = DNSKEY, class = IN
;; ANSWERS:
ingotronic.ch. 300 IN DNSKEY 257 3 5 AwEAAeA1vzmjaB+eBAcvhzpKEgAEFpvQ1rg4uKDW6MsQtacKoqBpgyep2+LuWotz5p/xYxj3NGsArwN8Ad5cY0FHRr8miTT0elOv6nvlqGIfRuhj/BXAQ1x4ihpSFslHw0lJMYFwxsUZWpUyjWX/nv1xRZMMwF46gui0N4OEbyTYusCk77D+A71k+K0EAitFIbIH4GCUKmH1H7HmXhSVH9bN/n7KEGwW32lmsuuUcJoRKDkcUvbMXY/9Xoa2quERrUg/rBbDUHowRPjYDS5GzY1+f4YY8s40BufGiqyUTKKXL953MVFK8gmezXA0hbmrnZ7CBOw/7238mORAdzExaX8n7CE=
ingotronic.ch. 300 IN DNSKEY 256 3 5 AwEAAZ2Xh77GFzpEDx7EHYxShqltHgkiG+BOjBGifEmnJhQSdE5/yNSLFNcdhZZ8HUPxYnaedTqJcFFg4AzUsQklF/fECegTJdZjaj2WoL0/I8K7HMfY/hVuRZUWPNglYi8agJRX6gdkFTCpUNI7stpgKqxtzUJhhw15uG/lKMplwqUr
ingotronic.ch. 300 IN RRSIG DNSKEY 5 2 300 20150125003700 20141226001657 6031 ingotronic.ch. rs1QlP2SlSpA2ELbzwg3DgWLzXWL3Lpv6CUJE2Q0qH2Zp7Qdy3cD+ZEtNh9v24Qv1M6JJ3zFt8mmZoCeW2ycuMbJCqBkW9CBuwF+VznZvZY2MxwPipvhvEEGP//0M8YAZJ66yQPDv3PTdAP8FYbIrJyvY44vwyncwbslpfHT9jAsrbfr3vuMuWps86dnP462q+0s1TxBfqi8mzo3gdavjHKWVNwohLahLKT+tWeu6DSzQv0YwMjwtkLgF7QRgx3ctIIkloOrnx9nHH1N6y+hxEB89fOlyVDjHhgL5uVtsD5fEdT0FJ2Gc/2nShEMMqIwr1/J9kUq1mNySff/uEe65Q==
ingotronic.ch. 300 IN RRSIG DNSKEY 5 2 300 20150125003700 20141226001657 17430 ingotronic.ch. mEwZjhQqeWksWD0TCnNBrtce4YkWJL3edqL6PvAUu8Fn+Ih437kEs3+pqdkgRsdYQ9HW+lBm/8pWwJlNAv0bi9NykItXMwAUFtncgq+6Pnh3iAM972GXSa5VV4LcGQ5b8CBdHCHiEKDqyPv5Hr5QfYL/FQaWlcNRh4QZZlZNPFA=
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 940 bytes
###############################################
testDoubleLabelMXBelowSignedForExistingANsec3 0000664 0000000 0000000 00000023641 13020541473 0041120 0 ustar 00root root 0000000 0000000 dnssecjava-1.1.3/src/test/resources/recordings/org_jitsi_dnssec_TestNonExistence #Date: 2015-01-06T22:34:42+01:00
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 19002
;; flags: qr aa rd ra cd ; qd: 1 an: 0 au: 4 ad: 1
;; QUESTIONS:
;; a.b.nsec3.ingotronic.ch., type = MX, class = IN
;; ANSWERS:
;; AUTHORITY RECORDS:
nsec3.ingotronic.ch. 300 IN SOA ns1.ingotronic.ch. admin.ingotronic.ch. 2013032932 300 60 864000 300
nsec3.ingotronic.ch. 300 IN RRSIG SOA 7 3 300 20150201003516 20150101233516 62417 nsec3.ingotronic.ch. RMXaAZCkydysBpA4+LWD2frs4CZH2FBxafAolq7MOG62Sw3ellwNcSIh2naMasviin2DU2BAzIYyFUqKJDbUqzTxZQjsM6d5LtgFy5iTNmWum6FnFP5Fz73Zs/9Q0LNEstR82MRRL8EDElADhFySAReavyT/vlSTScQGxx6slyQ=
4FQSC7ORQNKH924CH6L2DOAISKM28080.nsec3.ingotronic.ch. 300 IN NSEC3 1 0 10 1234 5RFQOLI81S6LKQTUG5HLI19UVJNKUL3H A RRSIG
4FQSC7ORQNKH924CH6L2DOAISKM28080.nsec3.ingotronic.ch. 300 IN RRSIG NSEC3 7 4 300 20150125000452 20141225235516 62417 nsec3.ingotronic.ch. CqoGO4BUVNtHXxUXDPRCTvVPGnqBDwrO8Uyw1NKGELf71x5TKQKFZCBmlT8G/aRgK5fu7xor/zldHS+6yR7nfHEwdW2Y+GzpUawe8ul8nL+Z8DNDFTuCxJtnoP82X0u/EsaT63RVPZAP94jFlvOpzr9NN/De33EcNdl7B/EB/J0=
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 537 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 30530
;; flags: qr rd ra ad cd ; qd: 1 an: 4 au: 0 ad: 1
;; QUESTIONS:
;; ., type = DNSKEY, class = IN
;; ANSWERS:
. 87391 IN DNSKEY 256 3 8 AwEAAe3fSrbLBy3LOS7pnxEUhvPZTE2H5dIGsI/UfruI/nOEvWWa/PSX2BFedBkEqOlYdjdNF2f+6lmfk2Od/xu0v5bVqxFE+/24v3hZSlWBxvXzPTAGHrbW/IJYEPqlzVOAS4XdUgHg0N7IbLywNHMvB+Yf+Nm6ctyXXFLV4WTNnzs7
. 87391 IN DNSKEY 257 3 8 AwEAAagAIKlVZrpC6Ia7gEzahOR+9W29euxhJhVVLOyQbSEW0O8gcCjFFVQUTf6v58fLjwBd0YI0EzrAcQqBGCzh/RStIoO8g0NfnfL2MTJRkxoXbfDaUeVPQuYEhg37NZWAJQ9VnMVDxP/VHL496M/QZxkjf5/Efucp2gaDX6RS6CXpoY68LsvPVjR0ZSwzz1apAzvN9dlzEheX7ICJBBtuA6G3LQpzW5hOA2hzCTMjJPJ8LbqF6dsV6DoBQzgul0sGIcGOYl7OyQdXfZ57relSQageu+ipAdTTJ25AsRTAoub8ONGcLmqrAmRLKBP1dfwhYB4N7knNnulqQxA+Uk1ihz0=
. 87391 IN DNSKEY 256 3 8 AwEAAaPD7Y7XIi1MOEREJNTrRhyqsY3gff6JWzg+XCbqut1sbcbvqyssHw8DT1AkRaAC92pO8xuyq5QEgEPL1IHfABLwpwXI5gTj4gdwi86bpkmlWs9fRpnn4DPDCTdrnxIejJXgClHikLJF3u3CdpNCMijq4CKdQbMlRZ3avv+G7rh7
. 87391 IN RRSIG DNSKEY 8 0 172800 20150115235959 20150101000000 19036 . i8cAxD2pvQi1oAyvQxRpDfFlbqPzW+69QQEsDwE1eWOm5AtawO9U7lmsGps7sy/fVNvl1ljKBj4Djp9pb3U2FLogjiIlW0cDAkPmLlG9t+b/pjEfBNlhjANUVN06pvQVAfm+LcF26EaWT6FlISBqb6jSy4BHRa3Bdc4Sx7+pRSYSqVVvYxLkfAWsKPqGkvWhebJDndJJV9syXQXgZ+v/uJ+6XOS43xkAdeL8iBzIs/FlwMTfh3tVe3d0lb65IBBLlCzeQuetX+0Vu1YFcnD0mHc/wS2ZnAV5toAFmyVQBoY/XAZiZeaOkcROJ6Zmqezy7liwK7BqsYyAZntMhk8lbg==
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 883 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 5039
;; flags: qr rd ra ad cd ; qd: 1 an: 2 au: 0 ad: 1
;; QUESTIONS:
;; ch., type = DS, class = IN
;; ANSWERS:
ch. 991 IN DS 46375 8 2 8F96646FC68BB7E4AF4C0750A6096FBC0D4ECDA3D3FA6DA06FDDB42EE50C6CF3
ch. 991 IN RRSIG DS 8 1 86400 20150112170000 20150105160000 16665 . thY7xYWBBxiBjqbQIb9fAG4TmQgnziwM7q6P1T3/ITxmECdvOCQnnZA3uD7qmN8uM0HudsD7+y+zgD3rsH4RSTKdL4kHSI0OnCxToMTvklghEgFDezqIRm8NkWdI2H4Stwrj20nYKSpLQxPI2EE54gs18P3KyO8bAUYv8Qx73xU=
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 238 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 9676
;; flags: qr rd ra ad cd ; qd: 1 an: 4 au: 0 ad: 1
;; QUESTIONS:
;; ch., type = DNSKEY, class = IN
;; ANSWERS:
ch. 992 IN DNSKEY 257 3 8 AwEAAb7GhhZ8IAy/AhwmSms5DeQK5ad09wIIplEpYoiAIYXPtJvT1ReFzyfTp/2YP+g/PWDwHPh4qKAHa9x0VgbIQcGAeNakmfkAdWEmCnca323/SAml3mwfaX62G7/uYWae5zh8QTxZKNd+K1yZ5x0IxnI31chSl5xymRbTEHYZDKwSIRFM3fTxUMt93WFaBVWELReYotJBr++rvAWdnlay5TPBTvheLBkaiqtgM4GP8HK07Y+86lsZnEsj5K3G1KTV5SPpa82rqYAwxG9VKbmSE/6/kBR5jJHjt1rRt5Oe7v18aEtw0YCEN4vxq+KuvMoNVqXUsE9LBwHJD+QNwi6wmB0=
ch. 992 IN DNSKEY 256 3 8 AwEAAcsg0kY6fw1wzYMhSAKTy+Y2JzAst66P/1odp9NECJJHbU8f4nwziI3onoFSBV0ZiSZhY1aH5dhdDZ7BkrqhVXSrZPAz0CvzjIxmB1gSOf9DeZvjQvoy97HqYolxsf+B3QQv2RKBT67elF5+JisKg3/dQISelKn8LhabSoVrMlD1
ch. 992 IN DNSKEY 256 3 8 AwEAAcSLdT0fEmcFmLpeUkAJoeVaHKiu+nbuc43fWlqaCRVf8t2HA4uWxOk0O5ci9nrFTc8nq8oa5fk5Cj7CHh4yrX9qUCfTdIWTyp8BDEdJpS+Dyb0u9wQuVj+nQMj4fLzdQf4TJs3/qxuiLr3nL1UUwlhhXeqSqGVb7p3mtB5HJ8ad
ch. 992 IN RRSIG DNSKEY 8 1 86400 20150127100909 20141212090909 46375 ch. bT8q0FWyeMH0SulNo6UdIIgZYNATwYsee2bikq2Gh339Bufma8eaqWIPYT3XKmxYPBFOw0bVl+kLZxTwbR1CFoCDXoP+qgQhh4mf9qkNiv2CDSc+0FE3FRREn+DAhYTUEuB58FPiPakFB8s8O7T+k2qhDae7jy4/y7Jl1lnjaBY8s7bzOUPhF0KKCNZmvoKwtL23ZdVeTSV1xM3jkiNnpzBKbcoSWECSGJVp1SE0BnRXdwQP41YTXFZ0310YjaTAUCC5qbMIWdEkHjfdSQtKBImnc85mkapq9w++XQ4zhauPWBtrPV3CcoCahjUaWdjrKVkibomlJZaN8MEO23CfQw==
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 893 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 52839
;; flags: qr rd ra cd ; qd: 1 an: 3 au: 0 ad: 1
;; QUESTIONS:
;; ingotronic.ch., type = DS, class = IN
;; ANSWERS:
ingotronic.ch. 3600 IN DS 6031 5 2 4A948F2FDADA24686E473EDAC00DCF972584C75E3FAA92C2021B6221449FF87E
ingotronic.ch. 3600 IN DS 6031 5 1 733D0218B571CD617B1A7493564B9FC4F12ADE82
ingotronic.ch. 3600 IN RRSIG DS 8 2 3600 20150129033614 20150105123019 60789 ch. rVPJP2HhzW7OkroK2axFj5Lb4iVWCH8Fp/Iq1rF952NDo72b8RiKje2RaAKJAGQ+wd0YgE+PAej04GCmkhlDJA/zvPeeTxuhy3HbJzReMlQ7fjyH+wW1hli+FuIYvogXWf7nO/9VyPORt8X/f/pjrOr3Vlj9sGLN8TGYpEuVSw4=
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 288 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 34478
;; flags: qr aa rd ra cd ; qd: 1 an: 4 au: 0 ad: 1
;; QUESTIONS:
;; ingotronic.ch., type = DNSKEY, class = IN
;; ANSWERS:
ingotronic.ch. 300 IN DNSKEY 256 3 5 AwEAAZ2Xh77GFzpEDx7EHYxShqltHgkiG+BOjBGifEmnJhQSdE5/yNSLFNcdhZZ8HUPxYnaedTqJcFFg4AzUsQklF/fECegTJdZjaj2WoL0/I8K7HMfY/hVuRZUWPNglYi8agJRX6gdkFTCpUNI7stpgKqxtzUJhhw15uG/lKMplwqUr
ingotronic.ch. 300 IN DNSKEY 257 3 5 AwEAAeA1vzmjaB+eBAcvhzpKEgAEFpvQ1rg4uKDW6MsQtacKoqBpgyep2+LuWotz5p/xYxj3NGsArwN8Ad5cY0FHRr8miTT0elOv6nvlqGIfRuhj/BXAQ1x4ihpSFslHw0lJMYFwxsUZWpUyjWX/nv1xRZMMwF46gui0N4OEbyTYusCk77D+A71k+K0EAitFIbIH4GCUKmH1H7HmXhSVH9bN/n7KEGwW32lmsuuUcJoRKDkcUvbMXY/9Xoa2quERrUg/rBbDUHowRPjYDS5GzY1+f4YY8s40BufGiqyUTKKXL953MVFK8gmezXA0hbmrnZ7CBOw/7238mORAdzExaX8n7CE=
ingotronic.ch. 300 IN RRSIG DNSKEY 5 2 300 20150125003700 20141226001657 6031 ingotronic.ch. rs1QlP2SlSpA2ELbzwg3DgWLzXWL3Lpv6CUJE2Q0qH2Zp7Qdy3cD+ZEtNh9v24Qv1M6JJ3zFt8mmZoCeW2ycuMbJCqBkW9CBuwF+VznZvZY2MxwPipvhvEEGP//0M8YAZJ66yQPDv3PTdAP8FYbIrJyvY44vwyncwbslpfHT9jAsrbfr3vuMuWps86dnP462q+0s1TxBfqi8mzo3gdavjHKWVNwohLahLKT+tWeu6DSzQv0YwMjwtkLgF7QRgx3ctIIkloOrnx9nHH1N6y+hxEB89fOlyVDjHhgL5uVtsD5fEdT0FJ2Gc/2nShEMMqIwr1/J9kUq1mNySff/uEe65Q==
ingotronic.ch. 300 IN RRSIG DNSKEY 5 2 300 20150125003700 20141226001657 17430 ingotronic.ch. mEwZjhQqeWksWD0TCnNBrtce4YkWJL3edqL6PvAUu8Fn+Ih437kEs3+pqdkgRsdYQ9HW+lBm/8pWwJlNAv0bi9NykItXMwAUFtncgq+6Pnh3iAM972GXSa5VV4LcGQ5b8CBdHCHiEKDqyPv5Hr5QfYL/FQaWlcNRh4QZZlZNPFA=
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 940 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 58519
;; flags: qr aa rd ra cd ; qd: 1 an: 3 au: 0 ad: 1
;; QUESTIONS:
;; nsec3.ingotronic.ch., type = DS, class = IN
;; ANSWERS:
nsec3.ingotronic.ch. 300 IN DS 16758 7 1 1720FF268E09A2CB63805EC8782D10AAD20E12A5
nsec3.ingotronic.ch. 300 IN DS 16758 7 2 3C8DC02750A1636F829B45D6E6D642866768A9CD40A013AD9D25AB63734FFA13
nsec3.ingotronic.ch. 300 IN RRSIG DS 5 3 300 20150125011134 20141226002644 17430 ingotronic.ch. hNurzlGhlyHbSgezPDuhIrtN9ZMsMXZbKGc7HD5rUuM88wD3fM97NxdzF+2Hi1USvBZ5GsQv63L+lAzf+mFPBoPIFHtTiAv8up7kQKRKmi/EzzkCYd/CC4UYdDZbaUyv7esh7spSOGwjPJNdK831p+MgltoWaYtnSGVMgOKk5mc=
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 305 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 59867
;; flags: qr aa rd ra cd ; qd: 1 an: 4 au: 0 ad: 1
;; QUESTIONS:
;; nsec3.ingotronic.ch., type = DNSKEY, class = IN
;; ANSWERS:
nsec3.ingotronic.ch. 300 IN DNSKEY 256 3 7 AwEAAccAWxkTVGZ6UAp0VEozAlYpARhbh6Y6tYOl6Fg3UeBNFFtDQ9fTEEt1NkbnR9u8KkpVN6a67avlYiUN1egDqEwzDU7R1Rw+/USdhm2hqOARmmu3DBgjjX/iXjZLyv310cOGFJZ/smcodlDL4pDAAoPxh/qs6KEBaT0sc1KWcGq3
nsec3.ingotronic.ch. 300 IN DNSKEY 257 3 7 AwEAAaBuJTf9oGyeTH3biUkAFLrsYrkodX1H7Snsui4XsDHFCBvs5XYacHbs0Jg0/O51KPjmNnjwMW8SSyDkKqYQ+9uYAf2EQ/pnD/VGQqnV2cw0Vwk/t0E2V4FUCju4pnAoyzZFZXGs1eWbX9JXu++b0Azp+ACq6485qJLzHhWDiIrPoK/SvdbFVRK4s+nPPJLH3NGBbtdz6kPq7aFWYBMoGeAZdN1wsQpcNWUo5eOmaJY53nMc7+rDpAyYlMe/FKwSZdX2ZDd63Qsa6Im4FVUJq/nWLq7tlQ/mWks15uDTQyJy/OWfA0ICCO4N9Fel9rThJNpJWEzOCblvZyBoy405kZk=
nsec3.ingotronic.ch. 300 IN RRSIG DNSKEY 7 3 300 20150125001457 20141226000444 16758 nsec3.ingotronic.ch. mXi1ylDi8XkRPup+YlT8GPdYE+P7gb6+/VdAwtodI916IzrkGkOHOTLbnrbAqqJOh0HxVCYXdxovmEcbJKUFKwplrQg3XD7/9Sq4pKU1MhMFEGrm/QPkM4u0mgjQwyToDLGuPHuFyur3FSjO/n54uGhAEft9JOFk/WKtWdCnm2LLyQrpC6herA3efFaI8kZhdoEY02AwihWVJxHasmz7lOoKRgNrkfELU+fN4+V7ISsRfJMyZc6q5PuNeG6vFD0uNE8tpdLJCSMurKYVpelvYqzFIcRTYcIjXwmS+L3DGjupqWMzFZVmpQM62JG3KCCD0ffpnNb0nWoSoHwpSeh/3Q==
nsec3.ingotronic.ch. 300 IN RRSIG DNSKEY 7 3 300 20150125001457 20141226000444 62417 nsec3.ingotronic.ch. PyCrf8T5dAfJzapb1p+kcTALPjDuD2niSaXXo0KeHAunT+6gJicLML2S/ZpiYr7X7Ma4Z0TYqE02qH6pcLYNnSgv9BE8sZO0nRtPekSyTy5nLi4hFADYhjb3UjaB85qmQZcqm64vC/CJhWO4t6Eixg/5MYALw+Qdy5Fo0qy/U5E=
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 958 bytes
###############################################
testDoubleLabelMXBelowSignedForExistingWildcardA 0000664 0000000 0000000 00000017153 13020541473 0041677 0 ustar 00root root 0000000 0000000 dnssecjava-1.1.3/src/test/resources/recordings/org_jitsi_dnssec_TestNonExistence #Date: 2015-01-06T22:34:43+01:00
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 47937
;; flags: qr aa rd ra cd ; qd: 1 an: 0 au: 6 ad: 1
;; QUESTIONS:
;; b.d.ingotronic.ch., type = MX, class = IN
;; ANSWERS:
;; AUTHORITY RECORDS:
ingotronic.ch. 300 IN SOA ns1.ingotronic.ch. admin.ingotronic.ch. 2013032762 300 60 864000 300
ingotronic.ch. 300 IN RRSIG SOA 5 2 300 20150125021244 20141226011244 17430 ingotronic.ch. WDLpp9G0P/rlMBfpFn9sAfpEFoBnQfwyGSXbGCc/LG1FSkJoKLDQYDY696scLNsJgkrzZeJrl0oSSvA8AvRUhYRrmuqWMxTVFgYlRwPwqEMCKUqiVhKGVF4NYemoBiUQC4nJwBZd57xKCiF4AQ4CodBtiZxefJFAlTNE0g2yxtM=
a.d.ingotronic.ch. 300 IN NSEC a.e.ingotronic.ch. A RRSIG NSEC
a.d.ingotronic.ch. 300 IN RRSIG NSEC 5 4 300 20150125011134 20141226002644 17430 ingotronic.ch. Xlth6wbhlD20uaeZZWKeREQgQBsYN6ztO8zPCWCeklur7YQ3X3aZJGhiNqPPhrdP2g9VEadeFQjCI5eGslXFoJtRPqAVswbk2K0wD8NSeoKRAXhW3N91AQodcalgOhiX5yuqST6gLxJl3WXgwUDvco+JvrfSFWV8FLwZ3RQ/26U=
*.d.ingotronic.ch. 300 IN NSEC a.d.ingotronic.ch. A RRSIG NSEC
*.d.ingotronic.ch. 300 IN RRSIG NSEC 5 3 300 20150125012443 20141226010256 17430 ingotronic.ch. CYABmp/vM/1o6z+h7pehEcE6wLRMeRBmWuVD0f2f+nynCX/DQyncjlyDcBc1SiQBuz5BQQz6fN8/vHjpAQXDpdOpftz/YLMME29g87c9APFRzhcU3imp87hFUKyaTBJ4VD9oLZ7NcTvsSnbvnn4pykZTUVI87jIt13zQuAdBPTs=
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 693 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 2900
;; flags: qr rd ra ad cd ; qd: 1 an: 4 au: 0 ad: 1
;; QUESTIONS:
;; ., type = DNSKEY, class = IN
;; ANSWERS:
. 87390 IN DNSKEY 256 3 8 AwEAAaPD7Y7XIi1MOEREJNTrRhyqsY3gff6JWzg+XCbqut1sbcbvqyssHw8DT1AkRaAC92pO8xuyq5QEgEPL1IHfABLwpwXI5gTj4gdwi86bpkmlWs9fRpnn4DPDCTdrnxIejJXgClHikLJF3u3CdpNCMijq4CKdQbMlRZ3avv+G7rh7
. 87390 IN DNSKEY 256 3 8 AwEAAe3fSrbLBy3LOS7pnxEUhvPZTE2H5dIGsI/UfruI/nOEvWWa/PSX2BFedBkEqOlYdjdNF2f+6lmfk2Od/xu0v5bVqxFE+/24v3hZSlWBxvXzPTAGHrbW/IJYEPqlzVOAS4XdUgHg0N7IbLywNHMvB+Yf+Nm6ctyXXFLV4WTNnzs7
. 87390 IN DNSKEY 257 3 8 AwEAAagAIKlVZrpC6Ia7gEzahOR+9W29euxhJhVVLOyQbSEW0O8gcCjFFVQUTf6v58fLjwBd0YI0EzrAcQqBGCzh/RStIoO8g0NfnfL2MTJRkxoXbfDaUeVPQuYEhg37NZWAJQ9VnMVDxP/VHL496M/QZxkjf5/Efucp2gaDX6RS6CXpoY68LsvPVjR0ZSwzz1apAzvN9dlzEheX7ICJBBtuA6G3LQpzW5hOA2hzCTMjJPJ8LbqF6dsV6DoBQzgul0sGIcGOYl7OyQdXfZ57relSQageu+ipAdTTJ25AsRTAoub8ONGcLmqrAmRLKBP1dfwhYB4N7knNnulqQxA+Uk1ihz0=
. 87390 IN RRSIG DNSKEY 8 0 172800 20150115235959 20150101000000 19036 . i8cAxD2pvQi1oAyvQxRpDfFlbqPzW+69QQEsDwE1eWOm5AtawO9U7lmsGps7sy/fVNvl1ljKBj4Djp9pb3U2FLogjiIlW0cDAkPmLlG9t+b/pjEfBNlhjANUVN06pvQVAfm+LcF26EaWT6FlISBqb6jSy4BHRa3Bdc4Sx7+pRSYSqVVvYxLkfAWsKPqGkvWhebJDndJJV9syXQXgZ+v/uJ+6XOS43xkAdeL8iBzIs/FlwMTfh3tVe3d0lb65IBBLlCzeQuetX+0Vu1YFcnD0mHc/wS2ZnAV5toAFmyVQBoY/XAZiZeaOkcROJ6Zmqezy7liwK7BqsYyAZntMhk8lbg==
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 883 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 63505
;; flags: qr rd ra ad cd ; qd: 1 an: 2 au: 0 ad: 1
;; QUESTIONS:
;; ch., type = DS, class = IN
;; ANSWERS:
ch. 990 IN DS 46375 8 2 8F96646FC68BB7E4AF4C0750A6096FBC0D4ECDA3D3FA6DA06FDDB42EE50C6CF3
ch. 990 IN RRSIG DS 8 1 86400 20150112170000 20150105160000 16665 . thY7xYWBBxiBjqbQIb9fAG4TmQgnziwM7q6P1T3/ITxmECdvOCQnnZA3uD7qmN8uM0HudsD7+y+zgD3rsH4RSTKdL4kHSI0OnCxToMTvklghEgFDezqIRm8NkWdI2H4Stwrj20nYKSpLQxPI2EE54gs18P3KyO8bAUYv8Qx73xU=
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 238 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 45285
;; flags: qr rd ra ad cd ; qd: 1 an: 4 au: 0 ad: 1
;; QUESTIONS:
;; ch., type = DNSKEY, class = IN
;; ANSWERS:
ch. 991 IN DNSKEY 257 3 8 AwEAAb7GhhZ8IAy/AhwmSms5DeQK5ad09wIIplEpYoiAIYXPtJvT1ReFzyfTp/2YP+g/PWDwHPh4qKAHa9x0VgbIQcGAeNakmfkAdWEmCnca323/SAml3mwfaX62G7/uYWae5zh8QTxZKNd+K1yZ5x0IxnI31chSl5xymRbTEHYZDKwSIRFM3fTxUMt93WFaBVWELReYotJBr++rvAWdnlay5TPBTvheLBkaiqtgM4GP8HK07Y+86lsZnEsj5K3G1KTV5SPpa82rqYAwxG9VKbmSE/6/kBR5jJHjt1rRt5Oe7v18aEtw0YCEN4vxq+KuvMoNVqXUsE9LBwHJD+QNwi6wmB0=
ch. 991 IN DNSKEY 256 3 8 AwEAAcsg0kY6fw1wzYMhSAKTy+Y2JzAst66P/1odp9NECJJHbU8f4nwziI3onoFSBV0ZiSZhY1aH5dhdDZ7BkrqhVXSrZPAz0CvzjIxmB1gSOf9DeZvjQvoy97HqYolxsf+B3QQv2RKBT67elF5+JisKg3/dQISelKn8LhabSoVrMlD1
ch. 991 IN DNSKEY 256 3 8 AwEAAcSLdT0fEmcFmLpeUkAJoeVaHKiu+nbuc43fWlqaCRVf8t2HA4uWxOk0O5ci9nrFTc8nq8oa5fk5Cj7CHh4yrX9qUCfTdIWTyp8BDEdJpS+Dyb0u9wQuVj+nQMj4fLzdQf4TJs3/qxuiLr3nL1UUwlhhXeqSqGVb7p3mtB5HJ8ad
ch. 991 IN RRSIG DNSKEY 8 1 86400 20150127100909 20141212090909 46375 ch. bT8q0FWyeMH0SulNo6UdIIgZYNATwYsee2bikq2Gh339Bufma8eaqWIPYT3XKmxYPBFOw0bVl+kLZxTwbR1CFoCDXoP+qgQhh4mf9qkNiv2CDSc+0FE3FRREn+DAhYTUEuB58FPiPakFB8s8O7T+k2qhDae7jy4/y7Jl1lnjaBY8s7bzOUPhF0KKCNZmvoKwtL23ZdVeTSV1xM3jkiNnpzBKbcoSWECSGJVp1SE0BnRXdwQP41YTXFZ0310YjaTAUCC5qbMIWdEkHjfdSQtKBImnc85mkapq9w++XQ4zhauPWBtrPV3CcoCahjUaWdjrKVkibomlJZaN8MEO23CfQw==
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 893 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 40411
;; flags: qr rd ra cd ; qd: 1 an: 3 au: 0 ad: 1
;; QUESTIONS:
;; ingotronic.ch., type = DS, class = IN
;; ANSWERS:
ingotronic.ch. 3599 IN DS 6031 5 1 733D0218B571CD617B1A7493564B9FC4F12ADE82
ingotronic.ch. 3599 IN DS 6031 5 2 4A948F2FDADA24686E473EDAC00DCF972584C75E3FAA92C2021B6221449FF87E
ingotronic.ch. 3599 IN RRSIG DS 8 2 3600 20150129033614 20150105123019 60789 ch. rVPJP2HhzW7OkroK2axFj5Lb4iVWCH8Fp/Iq1rF952NDo72b8RiKje2RaAKJAGQ+wd0YgE+PAej04GCmkhlDJA/zvPeeTxuhy3HbJzReMlQ7fjyH+wW1hli+FuIYvogXWf7nO/9VyPORt8X/f/pjrOr3Vlj9sGLN8TGYpEuVSw4=
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 288 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 9413
;; flags: qr aa rd ra cd ; qd: 1 an: 4 au: 0 ad: 1
;; QUESTIONS:
;; ingotronic.ch., type = DNSKEY, class = IN
;; ANSWERS:
ingotronic.ch. 300 IN DNSKEY 256 3 5 AwEAAZ2Xh77GFzpEDx7EHYxShqltHgkiG+BOjBGifEmnJhQSdE5/yNSLFNcdhZZ8HUPxYnaedTqJcFFg4AzUsQklF/fECegTJdZjaj2WoL0/I8K7HMfY/hVuRZUWPNglYi8agJRX6gdkFTCpUNI7stpgKqxtzUJhhw15uG/lKMplwqUr
ingotronic.ch. 300 IN DNSKEY 257 3 5 AwEAAeA1vzmjaB+eBAcvhzpKEgAEFpvQ1rg4uKDW6MsQtacKoqBpgyep2+LuWotz5p/xYxj3NGsArwN8Ad5cY0FHRr8miTT0elOv6nvlqGIfRuhj/BXAQ1x4ihpSFslHw0lJMYFwxsUZWpUyjWX/nv1xRZMMwF46gui0N4OEbyTYusCk77D+A71k+K0EAitFIbIH4GCUKmH1H7HmXhSVH9bN/n7KEGwW32lmsuuUcJoRKDkcUvbMXY/9Xoa2quERrUg/rBbDUHowRPjYDS5GzY1+f4YY8s40BufGiqyUTKKXL953MVFK8gmezXA0hbmrnZ7CBOw/7238mORAdzExaX8n7CE=
ingotronic.ch. 300 IN RRSIG DNSKEY 5 2 300 20150125003700 20141226001657 6031 ingotronic.ch. rs1QlP2SlSpA2ELbzwg3DgWLzXWL3Lpv6CUJE2Q0qH2Zp7Qdy3cD+ZEtNh9v24Qv1M6JJ3zFt8mmZoCeW2ycuMbJCqBkW9CBuwF+VznZvZY2MxwPipvhvEEGP//0M8YAZJ66yQPDv3PTdAP8FYbIrJyvY44vwyncwbslpfHT9jAsrbfr3vuMuWps86dnP462q+0s1TxBfqi8mzo3gdavjHKWVNwohLahLKT+tWeu6DSzQv0YwMjwtkLgF7QRgx3ctIIkloOrnx9nHH1N6y+hxEB89fOlyVDjHhgL5uVtsD5fEdT0FJ2Gc/2nShEMMqIwr1/J9kUq1mNySff/uEe65Q==
ingotronic.ch. 300 IN RRSIG DNSKEY 5 2 300 20150125003700 20141226001657 17430 ingotronic.ch. mEwZjhQqeWksWD0TCnNBrtce4YkWJL3edqL6PvAUu8Fn+Ih437kEs3+pqdkgRsdYQ9HW+lBm/8pWwJlNAv0bi9NykItXMwAUFtncgq+6Pnh3iAM972GXSa5VV4LcGQ5b8CBdHCHiEKDqyPv5Hr5QfYL/FQaWlcNRh4QZZlZNPFA=
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 940 bytes
###############################################
testDoubleLabelMXBelowSignedForExistingWildcardANsec3 0000664 0000000 0000000 00000025376 13020541473 0042601 0 ustar 00root root 0000000 0000000 dnssecjava-1.1.3/src/test/resources/recordings/org_jitsi_dnssec_TestNonExistence #Date: 2015-01-06T22:34:42+01:00
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 55533
;; flags: qr aa rd ra cd ; qd: 1 an: 0 au: 8 ad: 1
;; QUESTIONS:
;; b.d.nsec3.ingotronic.ch., type = MX, class = IN
;; ANSWERS:
;; AUTHORITY RECORDS:
944O996IVI1HPK8C89UTQR054EFGQF8T.nsec3.ingotronic.ch. 300 IN NSEC3 1 0 10 1234 BIKV50K9D505ABGB6K0F3JPQ62P5MGMI
944O996IVI1HPK8C89UTQR054EFGQF8T.nsec3.ingotronic.ch. 300 IN RRSIG NSEC3 7 4 300 20150125000452 20141225235516 62417 nsec3.ingotronic.ch. ggw9BV94fHJY0yfaqkdoAbh5CZiU99hSi5Y22hccMNzh8wPffhH+wEyuTj9OwKpiw6HCX6wFIKniTxeLlUeTtHvreBBgiaAGPqvNDCzn4lAwsIMSd8P9+fmrChoioqqJ4sBhWUCHRfwg0qqzpRC/PhOGaa3/7XZwYpnK/vgu2og=
810L2KR9HCVTELBLO8GQM0EMIM8KD01E.nsec3.ingotronic.ch. 300 IN NSEC3 1 0 10 1234 8VOO8LLV6NQKGVAP6LG1M4QMLMOS8LMK CNAME RRSIG
810L2KR9HCVTELBLO8GQM0EMIM8KD01E.nsec3.ingotronic.ch. 300 IN RRSIG NSEC3 7 4 300 20150125010458 20141226002309 62417 nsec3.ingotronic.ch. oVpQ8URiobH7xZcbioe1KuVi7wDEvJDLlS1vN4phMRXDhe8JwA6iGHi8jq+iOT4FkzhO9LTsFJJEI6Nj509+1X2zvRwAfYauanMdXog5vh5d7WF+/Q3LxbybKeol0HvIrJGXeoVnaFJAh8WvMWwnb1tM6mHp1GKtWoWiH8pv6+0=
74SO0776K6C87EPASDU8QK8SROIK00KK.nsec3.ingotronic.ch. 300 IN NSEC3 1 0 10 1234 7L2K0NAC88UN3IJV0404HF7PM543BN3F A RRSIG
74SO0776K6C87EPASDU8QK8SROIK00KK.nsec3.ingotronic.ch. 300 IN RRSIG NSEC3 7 4 300 20150125001457 20141226000444 62417 nsec3.ingotronic.ch. LgiRXOhpvpRNy0EsyYBIIjHyl8J32vg+EqLB2BMsfxWO311YP3lME0gp8PN4p0Qo/ZIE1Q/V+LFElSSvwroBsIB+/qFjdf4tj022dRDxvkRdEPgo6oO/xqK1rTOUkvPZRfpHuhZbZ0m/j8v2+RyfPLrM2x3ebzcSNT6tDIpL6+A=
nsec3.ingotronic.ch. 300 IN SOA ns1.ingotronic.ch. admin.ingotronic.ch. 2013032932 300 60 864000 300
nsec3.ingotronic.ch. 300 IN RRSIG SOA 7 3 300 20150201003516 20150101233516 62417 nsec3.ingotronic.ch. RMXaAZCkydysBpA4+LWD2frs4CZH2FBxafAolq7MOG62Sw3ellwNcSIh2naMasviin2DU2BAzIYyFUqKJDbUqzTxZQjsM6d5LtgFy5iTNmWum6FnFP5Fz73Zs/9Q0LNEstR82MRRL8EDElADhFySAReavyT/vlSTScQGxx6slyQ=
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 1049 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 56181
;; flags: qr rd ra ad cd ; qd: 1 an: 4 au: 0 ad: 1
;; QUESTIONS:
;; ., type = DNSKEY, class = IN
;; ANSWERS:
. 87391 IN DNSKEY 256 3 8 AwEAAaPD7Y7XIi1MOEREJNTrRhyqsY3gff6JWzg+XCbqut1sbcbvqyssHw8DT1AkRaAC92pO8xuyq5QEgEPL1IHfABLwpwXI5gTj4gdwi86bpkmlWs9fRpnn4DPDCTdrnxIejJXgClHikLJF3u3CdpNCMijq4CKdQbMlRZ3avv+G7rh7
. 87391 IN DNSKEY 256 3 8 AwEAAe3fSrbLBy3LOS7pnxEUhvPZTE2H5dIGsI/UfruI/nOEvWWa/PSX2BFedBkEqOlYdjdNF2f+6lmfk2Od/xu0v5bVqxFE+/24v3hZSlWBxvXzPTAGHrbW/IJYEPqlzVOAS4XdUgHg0N7IbLywNHMvB+Yf+Nm6ctyXXFLV4WTNnzs7
. 87391 IN DNSKEY 257 3 8 AwEAAagAIKlVZrpC6Ia7gEzahOR+9W29euxhJhVVLOyQbSEW0O8gcCjFFVQUTf6v58fLjwBd0YI0EzrAcQqBGCzh/RStIoO8g0NfnfL2MTJRkxoXbfDaUeVPQuYEhg37NZWAJQ9VnMVDxP/VHL496M/QZxkjf5/Efucp2gaDX6RS6CXpoY68LsvPVjR0ZSwzz1apAzvN9dlzEheX7ICJBBtuA6G3LQpzW5hOA2hzCTMjJPJ8LbqF6dsV6DoBQzgul0sGIcGOYl7OyQdXfZ57relSQageu+ipAdTTJ25AsRTAoub8ONGcLmqrAmRLKBP1dfwhYB4N7knNnulqQxA+Uk1ihz0=
. 87391 IN RRSIG DNSKEY 8 0 172800 20150115235959 20150101000000 19036 . i8cAxD2pvQi1oAyvQxRpDfFlbqPzW+69QQEsDwE1eWOm5AtawO9U7lmsGps7sy/fVNvl1ljKBj4Djp9pb3U2FLogjiIlW0cDAkPmLlG9t+b/pjEfBNlhjANUVN06pvQVAfm+LcF26EaWT6FlISBqb6jSy4BHRa3Bdc4Sx7+pRSYSqVVvYxLkfAWsKPqGkvWhebJDndJJV9syXQXgZ+v/uJ+6XOS43xkAdeL8iBzIs/FlwMTfh3tVe3d0lb65IBBLlCzeQuetX+0Vu1YFcnD0mHc/wS2ZnAV5toAFmyVQBoY/XAZiZeaOkcROJ6Zmqezy7liwK7BqsYyAZntMhk8lbg==
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 883 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 48499
;; flags: qr rd ra ad cd ; qd: 1 an: 2 au: 0 ad: 1
;; QUESTIONS:
;; ch., type = DS, class = IN
;; ANSWERS:
ch. 991 IN DS 46375 8 2 8F96646FC68BB7E4AF4C0750A6096FBC0D4ECDA3D3FA6DA06FDDB42EE50C6CF3
ch. 991 IN RRSIG DS 8 1 86400 20150112170000 20150105160000 16665 . thY7xYWBBxiBjqbQIb9fAG4TmQgnziwM7q6P1T3/ITxmECdvOCQnnZA3uD7qmN8uM0HudsD7+y+zgD3rsH4RSTKdL4kHSI0OnCxToMTvklghEgFDezqIRm8NkWdI2H4Stwrj20nYKSpLQxPI2EE54gs18P3KyO8bAUYv8Qx73xU=
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 238 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 22381
;; flags: qr rd ra ad cd ; qd: 1 an: 4 au: 0 ad: 1
;; QUESTIONS:
;; ch., type = DNSKEY, class = IN
;; ANSWERS:
ch. 992 IN DNSKEY 256 3 8 AwEAAcSLdT0fEmcFmLpeUkAJoeVaHKiu+nbuc43fWlqaCRVf8t2HA4uWxOk0O5ci9nrFTc8nq8oa5fk5Cj7CHh4yrX9qUCfTdIWTyp8BDEdJpS+Dyb0u9wQuVj+nQMj4fLzdQf4TJs3/qxuiLr3nL1UUwlhhXeqSqGVb7p3mtB5HJ8ad
ch. 992 IN DNSKEY 257 3 8 AwEAAb7GhhZ8IAy/AhwmSms5DeQK5ad09wIIplEpYoiAIYXPtJvT1ReFzyfTp/2YP+g/PWDwHPh4qKAHa9x0VgbIQcGAeNakmfkAdWEmCnca323/SAml3mwfaX62G7/uYWae5zh8QTxZKNd+K1yZ5x0IxnI31chSl5xymRbTEHYZDKwSIRFM3fTxUMt93WFaBVWELReYotJBr++rvAWdnlay5TPBTvheLBkaiqtgM4GP8HK07Y+86lsZnEsj5K3G1KTV5SPpa82rqYAwxG9VKbmSE/6/kBR5jJHjt1rRt5Oe7v18aEtw0YCEN4vxq+KuvMoNVqXUsE9LBwHJD+QNwi6wmB0=
ch. 992 IN DNSKEY 256 3 8 AwEAAcsg0kY6fw1wzYMhSAKTy+Y2JzAst66P/1odp9NECJJHbU8f4nwziI3onoFSBV0ZiSZhY1aH5dhdDZ7BkrqhVXSrZPAz0CvzjIxmB1gSOf9DeZvjQvoy97HqYolxsf+B3QQv2RKBT67elF5+JisKg3/dQISelKn8LhabSoVrMlD1
ch. 992 IN RRSIG DNSKEY 8 1 86400 20150127100909 20141212090909 46375 ch. bT8q0FWyeMH0SulNo6UdIIgZYNATwYsee2bikq2Gh339Bufma8eaqWIPYT3XKmxYPBFOw0bVl+kLZxTwbR1CFoCDXoP+qgQhh4mf9qkNiv2CDSc+0FE3FRREn+DAhYTUEuB58FPiPakFB8s8O7T+k2qhDae7jy4/y7Jl1lnjaBY8s7bzOUPhF0KKCNZmvoKwtL23ZdVeTSV1xM3jkiNnpzBKbcoSWECSGJVp1SE0BnRXdwQP41YTXFZ0310YjaTAUCC5qbMIWdEkHjfdSQtKBImnc85mkapq9w++XQ4zhauPWBtrPV3CcoCahjUaWdjrKVkibomlJZaN8MEO23CfQw==
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 893 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 58697
;; flags: qr rd ra cd ; qd: 1 an: 3 au: 0 ad: 1
;; QUESTIONS:
;; ingotronic.ch., type = DS, class = IN
;; ANSWERS:
ingotronic.ch. 3600 IN DS 6031 5 1 733D0218B571CD617B1A7493564B9FC4F12ADE82
ingotronic.ch. 3600 IN DS 6031 5 2 4A948F2FDADA24686E473EDAC00DCF972584C75E3FAA92C2021B6221449FF87E
ingotronic.ch. 3600 IN RRSIG DS 8 2 3600 20150129033614 20150105123019 60789 ch. rVPJP2HhzW7OkroK2axFj5Lb4iVWCH8Fp/Iq1rF952NDo72b8RiKje2RaAKJAGQ+wd0YgE+PAej04GCmkhlDJA/zvPeeTxuhy3HbJzReMlQ7fjyH+wW1hli+FuIYvogXWf7nO/9VyPORt8X/f/pjrOr3Vlj9sGLN8TGYpEuVSw4=
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 288 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 15181
;; flags: qr aa rd ra cd ; qd: 1 an: 4 au: 0 ad: 1
;; QUESTIONS:
;; ingotronic.ch., type = DNSKEY, class = IN
;; ANSWERS:
ingotronic.ch. 300 IN DNSKEY 256 3 5 AwEAAZ2Xh77GFzpEDx7EHYxShqltHgkiG+BOjBGifEmnJhQSdE5/yNSLFNcdhZZ8HUPxYnaedTqJcFFg4AzUsQklF/fECegTJdZjaj2WoL0/I8K7HMfY/hVuRZUWPNglYi8agJRX6gdkFTCpUNI7stpgKqxtzUJhhw15uG/lKMplwqUr
ingotronic.ch. 300 IN DNSKEY 257 3 5 AwEAAeA1vzmjaB+eBAcvhzpKEgAEFpvQ1rg4uKDW6MsQtacKoqBpgyep2+LuWotz5p/xYxj3NGsArwN8Ad5cY0FHRr8miTT0elOv6nvlqGIfRuhj/BXAQ1x4ihpSFslHw0lJMYFwxsUZWpUyjWX/nv1xRZMMwF46gui0N4OEbyTYusCk77D+A71k+K0EAitFIbIH4GCUKmH1H7HmXhSVH9bN/n7KEGwW32lmsuuUcJoRKDkcUvbMXY/9Xoa2quERrUg/rBbDUHowRPjYDS5GzY1+f4YY8s40BufGiqyUTKKXL953MVFK8gmezXA0hbmrnZ7CBOw/7238mORAdzExaX8n7CE=
ingotronic.ch. 300 IN RRSIG DNSKEY 5 2 300 20150125003700 20141226001657 6031 ingotronic.ch. rs1QlP2SlSpA2ELbzwg3DgWLzXWL3Lpv6CUJE2Q0qH2Zp7Qdy3cD+ZEtNh9v24Qv1M6JJ3zFt8mmZoCeW2ycuMbJCqBkW9CBuwF+VznZvZY2MxwPipvhvEEGP//0M8YAZJ66yQPDv3PTdAP8FYbIrJyvY44vwyncwbslpfHT9jAsrbfr3vuMuWps86dnP462q+0s1TxBfqi8mzo3gdavjHKWVNwohLahLKT+tWeu6DSzQv0YwMjwtkLgF7QRgx3ctIIkloOrnx9nHH1N6y+hxEB89fOlyVDjHhgL5uVtsD5fEdT0FJ2Gc/2nShEMMqIwr1/J9kUq1mNySff/uEe65Q==
ingotronic.ch. 300 IN RRSIG DNSKEY 5 2 300 20150125003700 20141226001657 17430 ingotronic.ch. mEwZjhQqeWksWD0TCnNBrtce4YkWJL3edqL6PvAUu8Fn+Ih437kEs3+pqdkgRsdYQ9HW+lBm/8pWwJlNAv0bi9NykItXMwAUFtncgq+6Pnh3iAM972GXSa5VV4LcGQ5b8CBdHCHiEKDqyPv5Hr5QfYL/FQaWlcNRh4QZZlZNPFA=
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 940 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 40988
;; flags: qr aa rd ra cd ; qd: 1 an: 3 au: 0 ad: 1
;; QUESTIONS:
;; nsec3.ingotronic.ch., type = DS, class = IN
;; ANSWERS:
nsec3.ingotronic.ch. 300 IN DS 16758 7 1 1720FF268E09A2CB63805EC8782D10AAD20E12A5
nsec3.ingotronic.ch. 300 IN DS 16758 7 2 3C8DC02750A1636F829B45D6E6D642866768A9CD40A013AD9D25AB63734FFA13
nsec3.ingotronic.ch. 300 IN RRSIG DS 5 3 300 20150125011134 20141226002644 17430 ingotronic.ch. hNurzlGhlyHbSgezPDuhIrtN9ZMsMXZbKGc7HD5rUuM88wD3fM97NxdzF+2Hi1USvBZ5GsQv63L+lAzf+mFPBoPIFHtTiAv8up7kQKRKmi/EzzkCYd/CC4UYdDZbaUyv7esh7spSOGwjPJNdK831p+MgltoWaYtnSGVMgOKk5mc=
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 305 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 13710
;; flags: qr aa rd ra cd ; qd: 1 an: 4 au: 0 ad: 1
;; QUESTIONS:
;; nsec3.ingotronic.ch., type = DNSKEY, class = IN
;; ANSWERS:
nsec3.ingotronic.ch. 300 IN DNSKEY 256 3 7 AwEAAccAWxkTVGZ6UAp0VEozAlYpARhbh6Y6tYOl6Fg3UeBNFFtDQ9fTEEt1NkbnR9u8KkpVN6a67avlYiUN1egDqEwzDU7R1Rw+/USdhm2hqOARmmu3DBgjjX/iXjZLyv310cOGFJZ/smcodlDL4pDAAoPxh/qs6KEBaT0sc1KWcGq3
nsec3.ingotronic.ch. 300 IN DNSKEY 257 3 7 AwEAAaBuJTf9oGyeTH3biUkAFLrsYrkodX1H7Snsui4XsDHFCBvs5XYacHbs0Jg0/O51KPjmNnjwMW8SSyDkKqYQ+9uYAf2EQ/pnD/VGQqnV2cw0Vwk/t0E2V4FUCju4pnAoyzZFZXGs1eWbX9JXu++b0Azp+ACq6485qJLzHhWDiIrPoK/SvdbFVRK4s+nPPJLH3NGBbtdz6kPq7aFWYBMoGeAZdN1wsQpcNWUo5eOmaJY53nMc7+rDpAyYlMe/FKwSZdX2ZDd63Qsa6Im4FVUJq/nWLq7tlQ/mWks15uDTQyJy/OWfA0ICCO4N9Fel9rThJNpJWEzOCblvZyBoy405kZk=
nsec3.ingotronic.ch. 300 IN RRSIG DNSKEY 7 3 300 20150125001457 20141226000444 16758 nsec3.ingotronic.ch. mXi1ylDi8XkRPup+YlT8GPdYE+P7gb6+/VdAwtodI916IzrkGkOHOTLbnrbAqqJOh0HxVCYXdxovmEcbJKUFKwplrQg3XD7/9Sq4pKU1MhMFEGrm/QPkM4u0mgjQwyToDLGuPHuFyur3FSjO/n54uGhAEft9JOFk/WKtWdCnm2LLyQrpC6herA3efFaI8kZhdoEY02AwihWVJxHasmz7lOoKRgNrkfELU+fN4+V7ISsRfJMyZc6q5PuNeG6vFD0uNE8tpdLJCSMurKYVpelvYqzFIcRTYcIjXwmS+L3DGjupqWMzFZVmpQM62JG3KCCD0ffpnNb0nWoSoHwpSeh/3Q==
nsec3.ingotronic.ch. 300 IN RRSIG DNSKEY 7 3 300 20150125001457 20141226000444 62417 nsec3.ingotronic.ch. PyCrf8T5dAfJzapb1p+kcTALPjDuD2niSaXXo0KeHAunT+6gJicLML2S/ZpiYr7X7Ma4Z0TYqE02qH6pcLYNnSgv9BE8sZO0nRtPekSyTy5nLi4hFADYhjb3UjaB85qmQZcqm64vC/CJhWO4t6Eixg/5MYALw+Qdy5Fo0qy/U5E=
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 958 bytes
###############################################
dnssecjava-1.1.3/src/test/resources/recordings/org_jitsi_dnssec_TestNonExistence/testNoDataOnENT 0000664 0000000 0000000 00000016444 13020541473 0033273 0 ustar 00root root 0000000 0000000 #Date: 2015-01-06T22:34:45+01:00
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 25863
;; flags: qr aa rd ra cd ; qd: 1 an: 0 au: 4 ad: 1
;; QUESTIONS:
;; b.ingotronic.ch., type = A, class = IN
;; ANSWERS:
;; AUTHORITY RECORDS:
ingotronic.ch. 300 IN SOA ns1.ingotronic.ch. admin.ingotronic.ch. 2013032762 300 60 864000 300
ingotronic.ch. 300 IN RRSIG SOA 5 2 300 20150125021244 20141226011244 17430 ingotronic.ch. WDLpp9G0P/rlMBfpFn9sAfpEFoBnQfwyGSXbGCc/LG1FSkJoKLDQYDY696scLNsJgkrzZeJrl0oSSvA8AvRUhYRrmuqWMxTVFgYlRwPwqEMCKUqiVhKGVF4NYemoBiUQC4nJwBZd57xKCiF4AQ4CodBtiZxefJFAlTNE0g2yxtM=
alias.ingotronic.ch. 300 IN NSEC a.b.ingotronic.ch. DNAME RRSIG NSEC
alias.ingotronic.ch. 300 IN RRSIG NSEC 5 3 300 20150125000532 20141225234703 17430 ingotronic.ch. mS+nh5skTxhOBdJlkwSGdrmhuA5FC9Am9emIhyIViET/1BoKotmbzLtfaBXAh2gRhcfDr+4OJJ6oyUcdMn/m4YG8NUsf4rAL92/YyxocUoF/oS8ZZv/BPXplCH5J4hsac+heElbPJ29v0kFVujErTaX/Ev0lYsUNI+9OmCrlQpk=
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 481 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 1668
;; flags: qr rd ra ad cd ; qd: 1 an: 4 au: 0 ad: 1
;; QUESTIONS:
;; ., type = DNSKEY, class = IN
;; ANSWERS:
. 87389 IN DNSKEY 256 3 8 AwEAAe3fSrbLBy3LOS7pnxEUhvPZTE2H5dIGsI/UfruI/nOEvWWa/PSX2BFedBkEqOlYdjdNF2f+6lmfk2Od/xu0v5bVqxFE+/24v3hZSlWBxvXzPTAGHrbW/IJYEPqlzVOAS4XdUgHg0N7IbLywNHMvB+Yf+Nm6ctyXXFLV4WTNnzs7
. 87389 IN DNSKEY 257 3 8 AwEAAagAIKlVZrpC6Ia7gEzahOR+9W29euxhJhVVLOyQbSEW0O8gcCjFFVQUTf6v58fLjwBd0YI0EzrAcQqBGCzh/RStIoO8g0NfnfL2MTJRkxoXbfDaUeVPQuYEhg37NZWAJQ9VnMVDxP/VHL496M/QZxkjf5/Efucp2gaDX6RS6CXpoY68LsvPVjR0ZSwzz1apAzvN9dlzEheX7ICJBBtuA6G3LQpzW5hOA2hzCTMjJPJ8LbqF6dsV6DoBQzgul0sGIcGOYl7OyQdXfZ57relSQageu+ipAdTTJ25AsRTAoub8ONGcLmqrAmRLKBP1dfwhYB4N7knNnulqQxA+Uk1ihz0=
. 87389 IN DNSKEY 256 3 8 AwEAAaPD7Y7XIi1MOEREJNTrRhyqsY3gff6JWzg+XCbqut1sbcbvqyssHw8DT1AkRaAC92pO8xuyq5QEgEPL1IHfABLwpwXI5gTj4gdwi86bpkmlWs9fRpnn4DPDCTdrnxIejJXgClHikLJF3u3CdpNCMijq4CKdQbMlRZ3avv+G7rh7
. 87389 IN RRSIG DNSKEY 8 0 172800 20150115235959 20150101000000 19036 . i8cAxD2pvQi1oAyvQxRpDfFlbqPzW+69QQEsDwE1eWOm5AtawO9U7lmsGps7sy/fVNvl1ljKBj4Djp9pb3U2FLogjiIlW0cDAkPmLlG9t+b/pjEfBNlhjANUVN06pvQVAfm+LcF26EaWT6FlISBqb6jSy4BHRa3Bdc4Sx7+pRSYSqVVvYxLkfAWsKPqGkvWhebJDndJJV9syXQXgZ+v/uJ+6XOS43xkAdeL8iBzIs/FlwMTfh3tVe3d0lb65IBBLlCzeQuetX+0Vu1YFcnD0mHc/wS2ZnAV5toAFmyVQBoY/XAZiZeaOkcROJ6Zmqezy7liwK7BqsYyAZntMhk8lbg==
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 883 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 19837
;; flags: qr rd ra ad cd ; qd: 1 an: 2 au: 0 ad: 1
;; QUESTIONS:
;; ch., type = DS, class = IN
;; ANSWERS:
ch. 988 IN DS 46375 8 2 8F96646FC68BB7E4AF4C0750A6096FBC0D4ECDA3D3FA6DA06FDDB42EE50C6CF3
ch. 988 IN RRSIG DS 8 1 86400 20150112170000 20150105160000 16665 . thY7xYWBBxiBjqbQIb9fAG4TmQgnziwM7q6P1T3/ITxmECdvOCQnnZA3uD7qmN8uM0HudsD7+y+zgD3rsH4RSTKdL4kHSI0OnCxToMTvklghEgFDezqIRm8NkWdI2H4Stwrj20nYKSpLQxPI2EE54gs18P3KyO8bAUYv8Qx73xU=
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 238 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 28569
;; flags: qr rd ra ad cd ; qd: 1 an: 4 au: 0 ad: 1
;; QUESTIONS:
;; ch., type = DNSKEY, class = IN
;; ANSWERS:
ch. 989 IN DNSKEY 256 3 8 AwEAAcsg0kY6fw1wzYMhSAKTy+Y2JzAst66P/1odp9NECJJHbU8f4nwziI3onoFSBV0ZiSZhY1aH5dhdDZ7BkrqhVXSrZPAz0CvzjIxmB1gSOf9DeZvjQvoy97HqYolxsf+B3QQv2RKBT67elF5+JisKg3/dQISelKn8LhabSoVrMlD1
ch. 989 IN DNSKEY 256 3 8 AwEAAcSLdT0fEmcFmLpeUkAJoeVaHKiu+nbuc43fWlqaCRVf8t2HA4uWxOk0O5ci9nrFTc8nq8oa5fk5Cj7CHh4yrX9qUCfTdIWTyp8BDEdJpS+Dyb0u9wQuVj+nQMj4fLzdQf4TJs3/qxuiLr3nL1UUwlhhXeqSqGVb7p3mtB5HJ8ad
ch. 989 IN DNSKEY 257 3 8 AwEAAb7GhhZ8IAy/AhwmSms5DeQK5ad09wIIplEpYoiAIYXPtJvT1ReFzyfTp/2YP+g/PWDwHPh4qKAHa9x0VgbIQcGAeNakmfkAdWEmCnca323/SAml3mwfaX62G7/uYWae5zh8QTxZKNd+K1yZ5x0IxnI31chSl5xymRbTEHYZDKwSIRFM3fTxUMt93WFaBVWELReYotJBr++rvAWdnlay5TPBTvheLBkaiqtgM4GP8HK07Y+86lsZnEsj5K3G1KTV5SPpa82rqYAwxG9VKbmSE/6/kBR5jJHjt1rRt5Oe7v18aEtw0YCEN4vxq+KuvMoNVqXUsE9LBwHJD+QNwi6wmB0=
ch. 989 IN RRSIG DNSKEY 8 1 86400 20150127100909 20141212090909 46375 ch. bT8q0FWyeMH0SulNo6UdIIgZYNATwYsee2bikq2Gh339Bufma8eaqWIPYT3XKmxYPBFOw0bVl+kLZxTwbR1CFoCDXoP+qgQhh4mf9qkNiv2CDSc+0FE3FRREn+DAhYTUEuB58FPiPakFB8s8O7T+k2qhDae7jy4/y7Jl1lnjaBY8s7bzOUPhF0KKCNZmvoKwtL23ZdVeTSV1xM3jkiNnpzBKbcoSWECSGJVp1SE0BnRXdwQP41YTXFZ0310YjaTAUCC5qbMIWdEkHjfdSQtKBImnc85mkapq9w++XQ4zhauPWBtrPV3CcoCahjUaWdjrKVkibomlJZaN8MEO23CfQw==
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 893 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 17551
;; flags: qr rd ra cd ; qd: 1 an: 3 au: 0 ad: 1
;; QUESTIONS:
;; ingotronic.ch., type = DS, class = IN
;; ANSWERS:
ingotronic.ch. 3597 IN DS 6031 5 2 4A948F2FDADA24686E473EDAC00DCF972584C75E3FAA92C2021B6221449FF87E
ingotronic.ch. 3597 IN DS 6031 5 1 733D0218B571CD617B1A7493564B9FC4F12ADE82
ingotronic.ch. 3597 IN RRSIG DS 8 2 3600 20150129033614 20150105123019 60789 ch. rVPJP2HhzW7OkroK2axFj5Lb4iVWCH8Fp/Iq1rF952NDo72b8RiKje2RaAKJAGQ+wd0YgE+PAej04GCmkhlDJA/zvPeeTxuhy3HbJzReMlQ7fjyH+wW1hli+FuIYvogXWf7nO/9VyPORt8X/f/pjrOr3Vlj9sGLN8TGYpEuVSw4=
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 288 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 3475
;; flags: qr aa rd ra cd ; qd: 1 an: 4 au: 0 ad: 1
;; QUESTIONS:
;; ingotronic.ch., type = DNSKEY, class = IN
;; ANSWERS:
ingotronic.ch. 300 IN DNSKEY 257 3 5 AwEAAeA1vzmjaB+eBAcvhzpKEgAEFpvQ1rg4uKDW6MsQtacKoqBpgyep2+LuWotz5p/xYxj3NGsArwN8Ad5cY0FHRr8miTT0elOv6nvlqGIfRuhj/BXAQ1x4ihpSFslHw0lJMYFwxsUZWpUyjWX/nv1xRZMMwF46gui0N4OEbyTYusCk77D+A71k+K0EAitFIbIH4GCUKmH1H7HmXhSVH9bN/n7KEGwW32lmsuuUcJoRKDkcUvbMXY/9Xoa2quERrUg/rBbDUHowRPjYDS5GzY1+f4YY8s40BufGiqyUTKKXL953MVFK8gmezXA0hbmrnZ7CBOw/7238mORAdzExaX8n7CE=
ingotronic.ch. 300 IN DNSKEY 256 3 5 AwEAAZ2Xh77GFzpEDx7EHYxShqltHgkiG+BOjBGifEmnJhQSdE5/yNSLFNcdhZZ8HUPxYnaedTqJcFFg4AzUsQklF/fECegTJdZjaj2WoL0/I8K7HMfY/hVuRZUWPNglYi8agJRX6gdkFTCpUNI7stpgKqxtzUJhhw15uG/lKMplwqUr
ingotronic.ch. 300 IN RRSIG DNSKEY 5 2 300 20150125003700 20141226001657 6031 ingotronic.ch. rs1QlP2SlSpA2ELbzwg3DgWLzXWL3Lpv6CUJE2Q0qH2Zp7Qdy3cD+ZEtNh9v24Qv1M6JJ3zFt8mmZoCeW2ycuMbJCqBkW9CBuwF+VznZvZY2MxwPipvhvEEGP//0M8YAZJ66yQPDv3PTdAP8FYbIrJyvY44vwyncwbslpfHT9jAsrbfr3vuMuWps86dnP462q+0s1TxBfqi8mzo3gdavjHKWVNwohLahLKT+tWeu6DSzQv0YwMjwtkLgF7QRgx3ctIIkloOrnx9nHH1N6y+hxEB89fOlyVDjHhgL5uVtsD5fEdT0FJ2Gc/2nShEMMqIwr1/J9kUq1mNySff/uEe65Q==
ingotronic.ch. 300 IN RRSIG DNSKEY 5 2 300 20150125003700 20141226001657 17430 ingotronic.ch. mEwZjhQqeWksWD0TCnNBrtce4YkWJL3edqL6PvAUu8Fn+Ih437kEs3+pqdkgRsdYQ9HW+lBm/8pWwJlNAv0bi9NykItXMwAUFtncgq+6Pnh3iAM972GXSa5VV4LcGQ5b8CBdHCHiEKDqyPv5Hr5QfYL/FQaWlcNRh4QZZlZNPFA=
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 940 bytes
###############################################
testNoDataWithInvalidNsecSignature 0000664 0000000 0000000 00000032757 13020541473 0037213 0 ustar 00root root 0000000 0000000 dnssecjava-1.1.3/src/test/resources/recordings/org_jitsi_dnssec_TestNonExistence #Date: 2015-01-06T22:34:43+01:00
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 65247
;; flags: qr aa rd ra cd ; qd: 1 an: 0 au: 4 ad: 1
;; QUESTIONS:
;; www.ingotronic.ch., type = MX, class = IN
;; ANSWERS:
;; AUTHORITY RECORDS:
ingotronic.ch. 300 IN SOA ns1.ingotronic.ch. admin.ingotronic.ch. 2013032762 300 60 864000 300
ingotronic.ch. 300 IN RRSIG SOA 5 2 300 20150125021244 20141226011244 17430 ingotronic.ch. WDLpp9G0P/rlMBfpFn9sAfpEFoBnQfwyGSXbGCc/LG1FSkJoKLDQYDY696scLNsJgkrzZeJrl0oSSvA8AvRUhYRrmuqWMxTVFgYlRwPwqEMCKUqiVhKGVF4NYemoBiUQC4nJwBZd57xKCiF4AQ4CodBtiZxefJFAlTNE0g2yxtM=
www.ingotronic.ch. 300 IN NSEC z.ingotronic.ch. A AAAA RRSIG NSEC
www.ingotronic.ch. 300 IN RRSIG NSEC 5 3 300 20150125012443 20141226010256 17430 ingotronic.ch. fMbLmn92jrN7YeM4XWcq7/kKLiPB3Ll4yQSLiPRWQw79ZVeNJMkqEqdstEnnTyKu/hAId6YpvMKsJnIfCTVyoO75i6CaEKXOpvf9AT7TstEUj0YKjp4vWvcNs2F2144nrnqnaVFX8ZTxnUV50R+/AsqtKA+2/Tky6SlNhzeWVMI=
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 475 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 10629
;; flags: qr rd ra ad cd ; qd: 1 an: 4 au: 0 ad: 1
;; QUESTIONS:
;; ., type = DNSKEY, class = IN
;; ANSWERS:
. 87391 IN DNSKEY 256 3 8 AwEAAe3fSrbLBy3LOS7pnxEUhvPZTE2H5dIGsI/UfruI/nOEvWWa/PSX2BFedBkEqOlYdjdNF2f+6lmfk2Od/xu0v5bVqxFE+/24v3hZSlWBxvXzPTAGHrbW/IJYEPqlzVOAS4XdUgHg0N7IbLywNHMvB+Yf+Nm6ctyXXFLV4WTNnzs7
. 87391 IN DNSKEY 256 3 8 AwEAAaPD7Y7XIi1MOEREJNTrRhyqsY3gff6JWzg+XCbqut1sbcbvqyssHw8DT1AkRaAC92pO8xuyq5QEgEPL1IHfABLwpwXI5gTj4gdwi86bpkmlWs9fRpnn4DPDCTdrnxIejJXgClHikLJF3u3CdpNCMijq4CKdQbMlRZ3avv+G7rh7
. 87391 IN DNSKEY 257 3 8 AwEAAagAIKlVZrpC6Ia7gEzahOR+9W29euxhJhVVLOyQbSEW0O8gcCjFFVQUTf6v58fLjwBd0YI0EzrAcQqBGCzh/RStIoO8g0NfnfL2MTJRkxoXbfDaUeVPQuYEhg37NZWAJQ9VnMVDxP/VHL496M/QZxkjf5/Efucp2gaDX6RS6CXpoY68LsvPVjR0ZSwzz1apAzvN9dlzEheX7ICJBBtuA6G3LQpzW5hOA2hzCTMjJPJ8LbqF6dsV6DoBQzgul0sGIcGOYl7OyQdXfZ57relSQageu+ipAdTTJ25AsRTAoub8ONGcLmqrAmRLKBP1dfwhYB4N7knNnulqQxA+Uk1ihz0=
. 87391 IN RRSIG DNSKEY 8 0 172800 20150115235959 20150101000000 19036 . i8cAxD2pvQi1oAyvQxRpDfFlbqPzW+69QQEsDwE1eWOm5AtawO9U7lmsGps7sy/fVNvl1ljKBj4Djp9pb3U2FLogjiIlW0cDAkPmLlG9t+b/pjEfBNlhjANUVN06pvQVAfm+LcF26EaWT6FlISBqb6jSy4BHRa3Bdc4Sx7+pRSYSqVVvYxLkfAWsKPqGkvWhebJDndJJV9syXQXgZ+v/uJ+6XOS43xkAdeL8iBzIs/FlwMTfh3tVe3d0lb65IBBLlCzeQuetX+0Vu1YFcnD0mHc/wS2ZnAV5toAFmyVQBoY/XAZiZeaOkcROJ6Zmqezy7liwK7BqsYyAZntMhk8lbg==
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 883 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 35482
;; flags: qr rd ra ad cd ; qd: 1 an: 2 au: 0 ad: 1
;; QUESTIONS:
;; ch., type = DS, class = IN
;; ANSWERS:
ch. 991 IN DS 46375 8 2 8F96646FC68BB7E4AF4C0750A6096FBC0D4ECDA3D3FA6DA06FDDB42EE50C6CF3
ch. 991 IN RRSIG DS 8 1 86400 20150112170000 20150105160000 16665 . thY7xYWBBxiBjqbQIb9fAG4TmQgnziwM7q6P1T3/ITxmECdvOCQnnZA3uD7qmN8uM0HudsD7+y+zgD3rsH4RSTKdL4kHSI0OnCxToMTvklghEgFDezqIRm8NkWdI2H4Stwrj20nYKSpLQxPI2EE54gs18P3KyO8bAUYv8Qx73xU=
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 238 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 12915
;; flags: qr rd ra ad cd ; qd: 1 an: 4 au: 0 ad: 1
;; QUESTIONS:
;; ch., type = DNSKEY, class = IN
;; ANSWERS:
ch. 992 IN DNSKEY 256 3 8 AwEAAcsg0kY6fw1wzYMhSAKTy+Y2JzAst66P/1odp9NECJJHbU8f4nwziI3onoFSBV0ZiSZhY1aH5dhdDZ7BkrqhVXSrZPAz0CvzjIxmB1gSOf9DeZvjQvoy97HqYolxsf+B3QQv2RKBT67elF5+JisKg3/dQISelKn8LhabSoVrMlD1
ch. 992 IN DNSKEY 257 3 8 AwEAAb7GhhZ8IAy/AhwmSms5DeQK5ad09wIIplEpYoiAIYXPtJvT1ReFzyfTp/2YP+g/PWDwHPh4qKAHa9x0VgbIQcGAeNakmfkAdWEmCnca323/SAml3mwfaX62G7/uYWae5zh8QTxZKNd+K1yZ5x0IxnI31chSl5xymRbTEHYZDKwSIRFM3fTxUMt93WFaBVWELReYotJBr++rvAWdnlay5TPBTvheLBkaiqtgM4GP8HK07Y+86lsZnEsj5K3G1KTV5SPpa82rqYAwxG9VKbmSE/6/kBR5jJHjt1rRt5Oe7v18aEtw0YCEN4vxq+KuvMoNVqXUsE9LBwHJD+QNwi6wmB0=
ch. 992 IN DNSKEY 256 3 8 AwEAAcSLdT0fEmcFmLpeUkAJoeVaHKiu+nbuc43fWlqaCRVf8t2HA4uWxOk0O5ci9nrFTc8nq8oa5fk5Cj7CHh4yrX9qUCfTdIWTyp8BDEdJpS+Dyb0u9wQuVj+nQMj4fLzdQf4TJs3/qxuiLr3nL1UUwlhhXeqSqGVb7p3mtB5HJ8ad
ch. 992 IN RRSIG DNSKEY 8 1 86400 20150127100909 20141212090909 46375 ch. bT8q0FWyeMH0SulNo6UdIIgZYNATwYsee2bikq2Gh339Bufma8eaqWIPYT3XKmxYPBFOw0bVl+kLZxTwbR1CFoCDXoP+qgQhh4mf9qkNiv2CDSc+0FE3FRREn+DAhYTUEuB58FPiPakFB8s8O7T+k2qhDae7jy4/y7Jl1lnjaBY8s7bzOUPhF0KKCNZmvoKwtL23ZdVeTSV1xM3jkiNnpzBKbcoSWECSGJVp1SE0BnRXdwQP41YTXFZ0310YjaTAUCC5qbMIWdEkHjfdSQtKBImnc85mkapq9w++XQ4zhauPWBtrPV3CcoCahjUaWdjrKVkibomlJZaN8MEO23CfQw==
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 893 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 59605
;; flags: qr rd ra cd ; qd: 1 an: 3 au: 0 ad: 1
;; QUESTIONS:
;; ingotronic.ch., type = DS, class = IN
;; ANSWERS:
ingotronic.ch. 3600 IN DS 6031 5 1 733D0218B571CD617B1A7493564B9FC4F12ADE82
ingotronic.ch. 3600 IN DS 6031 5 2 4A948F2FDADA24686E473EDAC00DCF972584C75E3FAA92C2021B6221449FF87E
ingotronic.ch. 3600 IN RRSIG DS 8 2 3600 20150129033614 20150105123019 60789 ch. rVPJP2HhzW7OkroK2axFj5Lb4iVWCH8Fp/Iq1rF952NDo72b8RiKje2RaAKJAGQ+wd0YgE+PAej04GCmkhlDJA/zvPeeTxuhy3HbJzReMlQ7fjyH+wW1hli+FuIYvogXWf7nO/9VyPORt8X/f/pjrOr3Vlj9sGLN8TGYpEuVSw4=
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 288 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 21625
;; flags: qr aa rd ra cd ; qd: 1 an: 4 au: 0 ad: 1
;; QUESTIONS:
;; ingotronic.ch., type = DNSKEY, class = IN
;; ANSWERS:
ingotronic.ch. 300 IN DNSKEY 256 3 5 AwEAAZ2Xh77GFzpEDx7EHYxShqltHgkiG+BOjBGifEmnJhQSdE5/yNSLFNcdhZZ8HUPxYnaedTqJcFFg4AzUsQklF/fECegTJdZjaj2WoL0/I8K7HMfY/hVuRZUWPNglYi8agJRX6gdkFTCpUNI7stpgKqxtzUJhhw15uG/lKMplwqUr
ingotronic.ch. 300 IN DNSKEY 257 3 5 AwEAAeA1vzmjaB+eBAcvhzpKEgAEFpvQ1rg4uKDW6MsQtacKoqBpgyep2+LuWotz5p/xYxj3NGsArwN8Ad5cY0FHRr8miTT0elOv6nvlqGIfRuhj/BXAQ1x4ihpSFslHw0lJMYFwxsUZWpUyjWX/nv1xRZMMwF46gui0N4OEbyTYusCk77D+A71k+K0EAitFIbIH4GCUKmH1H7HmXhSVH9bN/n7KEGwW32lmsuuUcJoRKDkcUvbMXY/9Xoa2quERrUg/rBbDUHowRPjYDS5GzY1+f4YY8s40BufGiqyUTKKXL953MVFK8gmezXA0hbmrnZ7CBOw/7238mORAdzExaX8n7CE=
ingotronic.ch. 300 IN RRSIG DNSKEY 5 2 300 20150125003700 20141226001657 6031 ingotronic.ch. rs1QlP2SlSpA2ELbzwg3DgWLzXWL3Lpv6CUJE2Q0qH2Zp7Qdy3cD+ZEtNh9v24Qv1M6JJ3zFt8mmZoCeW2ycuMbJCqBkW9CBuwF+VznZvZY2MxwPipvhvEEGP//0M8YAZJ66yQPDv3PTdAP8FYbIrJyvY44vwyncwbslpfHT9jAsrbfr3vuMuWps86dnP462q+0s1TxBfqi8mzo3gdavjHKWVNwohLahLKT+tWeu6DSzQv0YwMjwtkLgF7QRgx3ctIIkloOrnx9nHH1N6y+hxEB89fOlyVDjHhgL5uVtsD5fEdT0FJ2Gc/2nShEMMqIwr1/J9kUq1mNySff/uEe65Q==
ingotronic.ch. 300 IN RRSIG DNSKEY 5 2 300 20150125003700 20141226001657 17430 ingotronic.ch. mEwZjhQqeWksWD0TCnNBrtce4YkWJL3edqL6PvAUu8Fn+Ih437kEs3+pqdkgRsdYQ9HW+lBm/8pWwJlNAv0bi9NykItXMwAUFtncgq+6Pnh3iAM972GXSa5VV4LcGQ5b8CBdHCHiEKDqyPv5Hr5QfYL/FQaWlcNRh4QZZlZNPFA=
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 940 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 5462
;; flags: qr rd ra ad cd ; qd: 1 an: 4 au: 0 ad: 1
;; QUESTIONS:
;; ., type = DNSKEY, class = IN
;; ANSWERS:
. 87390 IN DNSKEY 256 3 8 AwEAAe3fSrbLBy3LOS7pnxEUhvPZTE2H5dIGsI/UfruI/nOEvWWa/PSX2BFedBkEqOlYdjdNF2f+6lmfk2Od/xu0v5bVqxFE+/24v3hZSlWBxvXzPTAGHrbW/IJYEPqlzVOAS4XdUgHg0N7IbLywNHMvB+Yf+Nm6ctyXXFLV4WTNnzs7
. 87390 IN DNSKEY 256 3 8 AwEAAaPD7Y7XIi1MOEREJNTrRhyqsY3gff6JWzg+XCbqut1sbcbvqyssHw8DT1AkRaAC92pO8xuyq5QEgEPL1IHfABLwpwXI5gTj4gdwi86bpkmlWs9fRpnn4DPDCTdrnxIejJXgClHikLJF3u3CdpNCMijq4CKdQbMlRZ3avv+G7rh7
. 87390 IN DNSKEY 257 3 8 AwEAAagAIKlVZrpC6Ia7gEzahOR+9W29euxhJhVVLOyQbSEW0O8gcCjFFVQUTf6v58fLjwBd0YI0EzrAcQqBGCzh/RStIoO8g0NfnfL2MTJRkxoXbfDaUeVPQuYEhg37NZWAJQ9VnMVDxP/VHL496M/QZxkjf5/Efucp2gaDX6RS6CXpoY68LsvPVjR0ZSwzz1apAzvN9dlzEheX7ICJBBtuA6G3LQpzW5hOA2hzCTMjJPJ8LbqF6dsV6DoBQzgul0sGIcGOYl7OyQdXfZ57relSQageu+ipAdTTJ25AsRTAoub8ONGcLmqrAmRLKBP1dfwhYB4N7knNnulqQxA+Uk1ihz0=
. 87390 IN RRSIG DNSKEY 8 0 172800 20150115235959 20150101000000 19036 . i8cAxD2pvQi1oAyvQxRpDfFlbqPzW+69QQEsDwE1eWOm5AtawO9U7lmsGps7sy/fVNvl1ljKBj4Djp9pb3U2FLogjiIlW0cDAkPmLlG9t+b/pjEfBNlhjANUVN06pvQVAfm+LcF26EaWT6FlISBqb6jSy4BHRa3Bdc4Sx7+pRSYSqVVvYxLkfAWsKPqGkvWhebJDndJJV9syXQXgZ+v/uJ+6XOS43xkAdeL8iBzIs/FlwMTfh3tVe3d0lb65IBBLlCzeQuetX+0Vu1YFcnD0mHc/wS2ZnAV5toAFmyVQBoY/XAZiZeaOkcROJ6Zmqezy7liwK7BqsYyAZntMhk8lbg==
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 883 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 239
;; flags: qr rd ra ad cd ; qd: 1 an: 2 au: 0 ad: 1
;; QUESTIONS:
;; ch., type = DS, class = IN
;; ANSWERS:
ch. 990 IN DS 46375 8 2 8F96646FC68BB7E4AF4C0750A6096FBC0D4ECDA3D3FA6DA06FDDB42EE50C6CF3
ch. 990 IN RRSIG DS 8 1 86400 20150112170000 20150105160000 16665 . thY7xYWBBxiBjqbQIb9fAG4TmQgnziwM7q6P1T3/ITxmECdvOCQnnZA3uD7qmN8uM0HudsD7+y+zgD3rsH4RSTKdL4kHSI0OnCxToMTvklghEgFDezqIRm8NkWdI2H4Stwrj20nYKSpLQxPI2EE54gs18P3KyO8bAUYv8Qx73xU=
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 238 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 17622
;; flags: qr rd ra ad cd ; qd: 1 an: 4 au: 0 ad: 1
;; QUESTIONS:
;; ch., type = DNSKEY, class = IN
;; ANSWERS:
ch. 991 IN DNSKEY 257 3 8 AwEAAb7GhhZ8IAy/AhwmSms5DeQK5ad09wIIplEpYoiAIYXPtJvT1ReFzyfTp/2YP+g/PWDwHPh4qKAHa9x0VgbIQcGAeNakmfkAdWEmCnca323/SAml3mwfaX62G7/uYWae5zh8QTxZKNd+K1yZ5x0IxnI31chSl5xymRbTEHYZDKwSIRFM3fTxUMt93WFaBVWELReYotJBr++rvAWdnlay5TPBTvheLBkaiqtgM4GP8HK07Y+86lsZnEsj5K3G1KTV5SPpa82rqYAwxG9VKbmSE/6/kBR5jJHjt1rRt5Oe7v18aEtw0YCEN4vxq+KuvMoNVqXUsE9LBwHJD+QNwi6wmB0=
ch. 991 IN DNSKEY 256 3 8 AwEAAcSLdT0fEmcFmLpeUkAJoeVaHKiu+nbuc43fWlqaCRVf8t2HA4uWxOk0O5ci9nrFTc8nq8oa5fk5Cj7CHh4yrX9qUCfTdIWTyp8BDEdJpS+Dyb0u9wQuVj+nQMj4fLzdQf4TJs3/qxuiLr3nL1UUwlhhXeqSqGVb7p3mtB5HJ8ad
ch. 991 IN DNSKEY 256 3 8 AwEAAcsg0kY6fw1wzYMhSAKTy+Y2JzAst66P/1odp9NECJJHbU8f4nwziI3onoFSBV0ZiSZhY1aH5dhdDZ7BkrqhVXSrZPAz0CvzjIxmB1gSOf9DeZvjQvoy97HqYolxsf+B3QQv2RKBT67elF5+JisKg3/dQISelKn8LhabSoVrMlD1
ch. 991 IN RRSIG DNSKEY 8 1 86400 20150127100909 20141212090909 46375 ch. bT8q0FWyeMH0SulNo6UdIIgZYNATwYsee2bikq2Gh339Bufma8eaqWIPYT3XKmxYPBFOw0bVl+kLZxTwbR1CFoCDXoP+qgQhh4mf9qkNiv2CDSc+0FE3FRREn+DAhYTUEuB58FPiPakFB8s8O7T+k2qhDae7jy4/y7Jl1lnjaBY8s7bzOUPhF0KKCNZmvoKwtL23ZdVeTSV1xM3jkiNnpzBKbcoSWECSGJVp1SE0BnRXdwQP41YTXFZ0310YjaTAUCC5qbMIWdEkHjfdSQtKBImnc85mkapq9w++XQ4zhauPWBtrPV3CcoCahjUaWdjrKVkibomlJZaN8MEO23CfQw==
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 893 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 27845
;; flags: qr rd ra cd ; qd: 1 an: 3 au: 0 ad: 1
;; QUESTIONS:
;; ingotronic.ch., type = DS, class = IN
;; ANSWERS:
ingotronic.ch. 3599 IN DS 6031 5 2 4A948F2FDADA24686E473EDAC00DCF972584C75E3FAA92C2021B6221449FF87E
ingotronic.ch. 3599 IN DS 6031 5 1 733D0218B571CD617B1A7493564B9FC4F12ADE82
ingotronic.ch. 3599 IN RRSIG DS 8 2 3600 20150129033614 20150105123019 60789 ch. rVPJP2HhzW7OkroK2axFj5Lb4iVWCH8Fp/Iq1rF952NDo72b8RiKje2RaAKJAGQ+wd0YgE+PAej04GCmkhlDJA/zvPeeTxuhy3HbJzReMlQ7fjyH+wW1hli+FuIYvogXWf7nO/9VyPORt8X/f/pjrOr3Vlj9sGLN8TGYpEuVSw4=
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 288 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 17702
;; flags: qr aa rd ra cd ; qd: 1 an: 4 au: 0 ad: 1
;; QUESTIONS:
;; ingotronic.ch., type = DNSKEY, class = IN
;; ANSWERS:
ingotronic.ch. 300 IN DNSKEY 257 3 5 AwEAAeA1vzmjaB+eBAcvhzpKEgAEFpvQ1rg4uKDW6MsQtacKoqBpgyep2+LuWotz5p/xYxj3NGsArwN8Ad5cY0FHRr8miTT0elOv6nvlqGIfRuhj/BXAQ1x4ihpSFslHw0lJMYFwxsUZWpUyjWX/nv1xRZMMwF46gui0N4OEbyTYusCk77D+A71k+K0EAitFIbIH4GCUKmH1H7HmXhSVH9bN/n7KEGwW32lmsuuUcJoRKDkcUvbMXY/9Xoa2quERrUg/rBbDUHowRPjYDS5GzY1+f4YY8s40BufGiqyUTKKXL953MVFK8gmezXA0hbmrnZ7CBOw/7238mORAdzExaX8n7CE=
ingotronic.ch. 300 IN DNSKEY 256 3 5 AwEAAZ2Xh77GFzpEDx7EHYxShqltHgkiG+BOjBGifEmnJhQSdE5/yNSLFNcdhZZ8HUPxYnaedTqJcFFg4AzUsQklF/fECegTJdZjaj2WoL0/I8K7HMfY/hVuRZUWPNglYi8agJRX6gdkFTCpUNI7stpgKqxtzUJhhw15uG/lKMplwqUr
ingotronic.ch. 300 IN RRSIG DNSKEY 5 2 300 20150125003700 20141226001657 6031 ingotronic.ch. rs1QlP2SlSpA2ELbzwg3DgWLzXWL3Lpv6CUJE2Q0qH2Zp7Qdy3cD+ZEtNh9v24Qv1M6JJ3zFt8mmZoCeW2ycuMbJCqBkW9CBuwF+VznZvZY2MxwPipvhvEEGP//0M8YAZJ66yQPDv3PTdAP8FYbIrJyvY44vwyncwbslpfHT9jAsrbfr3vuMuWps86dnP462q+0s1TxBfqi8mzo3gdavjHKWVNwohLahLKT+tWeu6DSzQv0YwMjwtkLgF7QRgx3ctIIkloOrnx9nHH1N6y+hxEB89fOlyVDjHhgL5uVtsD5fEdT0FJ2Gc/2nShEMMqIwr1/J9kUq1mNySff/uEe65Q==
ingotronic.ch. 300 IN RRSIG DNSKEY 5 2 300 20150125003700 20141226001657 17430 ingotronic.ch. mEwZjhQqeWksWD0TCnNBrtce4YkWJL3edqL6PvAUu8Fn+Ih437kEs3+pqdkgRsdYQ9HW+lBm/8pWwJlNAv0bi9NykItXMwAUFtncgq+6Pnh3iAM972GXSa5VV4LcGQ5b8CBdHCHiEKDqyPv5Hr5QfYL/FQaWlcNRh4QZZlZNPFA=
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 940 bytes
###############################################
testNonExistingBelowRoot 0000664 0000000 0000000 00000005530 13020541473 0035276 0 ustar 00root root 0000000 0000000 dnssecjava-1.1.3/src/test/resources/recordings/org_jitsi_dnssec_TestNonExistence #Date: 2015-01-06T22:34:46+01:00
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 32300
;; flags: qr rd ra cd ; qd: 1 an: 0 au: 6 ad: 1
;; QUESTIONS:
;; gibtsnicht., type = A, class = IN
;; ANSWERS:
;; AUTHORITY RECORDS:
. 10800 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2015010601 1800 900 604800 86400
. 10800 IN RRSIG SOA 8 0 86400 20150113170000 20150106160000 16665 . R9ZOwEb5fodQQNRl4WvguyqEzOxdNPQ18nI+0R5sB2JSqG4Qz45SwW+vfnFCF01UW43/GdEfGOScrYVP2UBM8F2WOM+tHMZN0t9BbP9uszTWhzdYNCl3UKYYJiB59b8HIhKXlERPVfW2UEgIiI2VajShJnUv67W8gQO56hgTNEE=
. 10800 IN RRSIG NSEC 8 0 86400 20150113170000 20150106160000 16665 . wlEpGn1C8YZzJjIrlJp/GSud5FuLAZZj9C54DrKEl9gELWeIFJgLwkI1tcH4EhabbsNScB7SPOmVmnLkuM4Q6yJkmI1HXeBrddxniI2YEw+m9++/i19AqfDxuVYs52peKxXdEZ/sIS5JtDz3bdB44IAp2k1ue780z0xRV796vUk=
. 10800 IN NSEC abogado. NS SOA RRSIG NSEC DNSKEY
gi. 10800 IN RRSIG NSEC 8 1 86400 20150113170000 20150106160000 16665 . jvKrJLijjO866a3A9fkv130tf/UsyS0FgH+k9afhIaNcvTzEwUeVP8+RosGM/b8BWhgASmx2ONSl+BD1LIH1JRkUXKZRVbItdDE27gdKQHTHORYybBDTiHHhnMet1vsceRvN77TAvrdFhm9RYFehZ3ddkQDvy8IACiA5PMhLyQg=
gi. 10800 IN NSEC gift. NS DS RRSIG NSEC
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 646 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 36258
;; flags: qr rd ra ad cd ; qd: 1 an: 4 au: 0 ad: 1
;; QUESTIONS:
;; ., type = DNSKEY, class = IN
;; ANSWERS:
. 87387 IN DNSKEY 256 3 8 AwEAAe3fSrbLBy3LOS7pnxEUhvPZTE2H5dIGsI/UfruI/nOEvWWa/PSX2BFedBkEqOlYdjdNF2f+6lmfk2Od/xu0v5bVqxFE+/24v3hZSlWBxvXzPTAGHrbW/IJYEPqlzVOAS4XdUgHg0N7IbLywNHMvB+Yf+Nm6ctyXXFLV4WTNnzs7
. 87387 IN DNSKEY 256 3 8 AwEAAaPD7Y7XIi1MOEREJNTrRhyqsY3gff6JWzg+XCbqut1sbcbvqyssHw8DT1AkRaAC92pO8xuyq5QEgEPL1IHfABLwpwXI5gTj4gdwi86bpkmlWs9fRpnn4DPDCTdrnxIejJXgClHikLJF3u3CdpNCMijq4CKdQbMlRZ3avv+G7rh7
. 87387 IN DNSKEY 257 3 8 AwEAAagAIKlVZrpC6Ia7gEzahOR+9W29euxhJhVVLOyQbSEW0O8gcCjFFVQUTf6v58fLjwBd0YI0EzrAcQqBGCzh/RStIoO8g0NfnfL2MTJRkxoXbfDaUeVPQuYEhg37NZWAJQ9VnMVDxP/VHL496M/QZxkjf5/Efucp2gaDX6RS6CXpoY68LsvPVjR0ZSwzz1apAzvN9dlzEheX7ICJBBtuA6G3LQpzW5hOA2hzCTMjJPJ8LbqF6dsV6DoBQzgul0sGIcGOYl7OyQdXfZ57relSQageu+ipAdTTJ25AsRTAoub8ONGcLmqrAmRLKBP1dfwhYB4N7knNnulqQxA+Uk1ihz0=
. 87387 IN RRSIG DNSKEY 8 0 172800 20150115235959 20150101000000 19036 . i8cAxD2pvQi1oAyvQxRpDfFlbqPzW+69QQEsDwE1eWOm5AtawO9U7lmsGps7sy/fVNvl1ljKBj4Djp9pb3U2FLogjiIlW0cDAkPmLlG9t+b/pjEfBNlhjANUVN06pvQVAfm+LcF26EaWT6FlISBqb6jSy4BHRa3Bdc4Sx7+pRSYSqVVvYxLkfAWsKPqGkvWhebJDndJJV9syXQXgZ+v/uJ+6XOS43xkAdeL8iBzIs/FlwMTfh3tVe3d0lb65IBBLlCzeQuetX+0Vu1YFcnD0mHc/wS2ZnAV5toAFmyVQBoY/XAZiZeaOkcROJ6Zmqezy7liwK7BqsYyAZntMhk8lbg==
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 883 bytes
###############################################
testNxDomainWithInvalidNsecSignature 0000664 0000000 0000000 00000033501 13020541473 0037546 0 ustar 00root root 0000000 0000000 dnssecjava-1.1.3/src/test/resources/recordings/org_jitsi_dnssec_TestNonExistence #Date: 2015-01-06T22:34:44+01:00
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 12938
;; flags: qr aa rd ra cd ; qd: 1 an: 0 au: 6 ad: 1
;; QUESTIONS:
;; x.ingotronic.ch., type = A, class = IN
;; ANSWERS:
;; AUTHORITY RECORDS:
ingotronic.ch. 300 IN SOA ns1.ingotronic.ch. admin.ingotronic.ch. 2013032762 300 60 864000 300
ingotronic.ch. 300 IN RRSIG SOA 5 2 300 20150125021244 20141226011244 17430 ingotronic.ch. WDLpp9G0P/rlMBfpFn9sAfpEFoBnQfwyGSXbGCc/LG1FSkJoKLDQYDY696scLNsJgkrzZeJrl0oSSvA8AvRUhYRrmuqWMxTVFgYlRwPwqEMCKUqiVhKGVF4NYemoBiUQC4nJwBZd57xKCiF4AQ4CodBtiZxefJFAlTNE0g2yxtM=
ingotronic.ch. 300 IN NSEC alias.ingotronic.ch. A NS SOA RRSIG NSEC DNSKEY
ingotronic.ch. 300 IN RRSIG NSEC 5 2 300 20150125000532 20141225234703 17430 ingotronic.ch. en5BaZ6zWqEvoUFUDPm5g1pjz7THXBv/1kjKtV2tS+7xh0BtkLEzlA9n/H66ZZAX2EIh7vXj12xVJKOuEuM0o1mJwKsBaLQuTra60/zYAUIddwUOCzI3zzjiRFklPyHSnLkGoBODZcvehnsTzTPyBxkfoouleqpj7gN5jOSBL8M=
www.ingotronic.ch. 300 IN NSEC z.ingotronic.ch. A AAAA RRSIG NSEC
www.ingotronic.ch. 300 IN RRSIG NSEC 5 3 300 20150125012443 20141226010256 17430 ingotronic.ch. fMbLmn92jrN7YeM4XWcq7/kKLiPB3Ll4yQSLiPRWQw79ZVeNJMkqEqdstEnnTyKu/hAId6YpvMKsJnIfCTVyoO75i6CaEKXOpvf9AT7TstEUj0YKjp4vWvcNs2F2144nrnqnaVFX8ZTxnUV50R+/AsqtKA+2/Tky6SlNhzeWVMI=
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 692 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 40248
;; flags: qr rd ra ad cd ; qd: 1 an: 4 au: 0 ad: 1
;; QUESTIONS:
;; ., type = DNSKEY, class = IN
;; ANSWERS:
. 87390 IN DNSKEY 256 3 8 AwEAAe3fSrbLBy3LOS7pnxEUhvPZTE2H5dIGsI/UfruI/nOEvWWa/PSX2BFedBkEqOlYdjdNF2f+6lmfk2Od/xu0v5bVqxFE+/24v3hZSlWBxvXzPTAGHrbW/IJYEPqlzVOAS4XdUgHg0N7IbLywNHMvB+Yf+Nm6ctyXXFLV4WTNnzs7
. 87390 IN DNSKEY 257 3 8 AwEAAagAIKlVZrpC6Ia7gEzahOR+9W29euxhJhVVLOyQbSEW0O8gcCjFFVQUTf6v58fLjwBd0YI0EzrAcQqBGCzh/RStIoO8g0NfnfL2MTJRkxoXbfDaUeVPQuYEhg37NZWAJQ9VnMVDxP/VHL496M/QZxkjf5/Efucp2gaDX6RS6CXpoY68LsvPVjR0ZSwzz1apAzvN9dlzEheX7ICJBBtuA6G3LQpzW5hOA2hzCTMjJPJ8LbqF6dsV6DoBQzgul0sGIcGOYl7OyQdXfZ57relSQageu+ipAdTTJ25AsRTAoub8ONGcLmqrAmRLKBP1dfwhYB4N7knNnulqQxA+Uk1ihz0=
. 87390 IN DNSKEY 256 3 8 AwEAAaPD7Y7XIi1MOEREJNTrRhyqsY3gff6JWzg+XCbqut1sbcbvqyssHw8DT1AkRaAC92pO8xuyq5QEgEPL1IHfABLwpwXI5gTj4gdwi86bpkmlWs9fRpnn4DPDCTdrnxIejJXgClHikLJF3u3CdpNCMijq4CKdQbMlRZ3avv+G7rh7
. 87390 IN RRSIG DNSKEY 8 0 172800 20150115235959 20150101000000 19036 . i8cAxD2pvQi1oAyvQxRpDfFlbqPzW+69QQEsDwE1eWOm5AtawO9U7lmsGps7sy/fVNvl1ljKBj4Djp9pb3U2FLogjiIlW0cDAkPmLlG9t+b/pjEfBNlhjANUVN06pvQVAfm+LcF26EaWT6FlISBqb6jSy4BHRa3Bdc4Sx7+pRSYSqVVvYxLkfAWsKPqGkvWhebJDndJJV9syXQXgZ+v/uJ+6XOS43xkAdeL8iBzIs/FlwMTfh3tVe3d0lb65IBBLlCzeQuetX+0Vu1YFcnD0mHc/wS2ZnAV5toAFmyVQBoY/XAZiZeaOkcROJ6Zmqezy7liwK7BqsYyAZntMhk8lbg==
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 883 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 21278
;; flags: qr rd ra ad cd ; qd: 1 an: 2 au: 0 ad: 1
;; QUESTIONS:
;; ch., type = DS, class = IN
;; ANSWERS:
ch. 989 IN DS 46375 8 2 8F96646FC68BB7E4AF4C0750A6096FBC0D4ECDA3D3FA6DA06FDDB42EE50C6CF3
ch. 989 IN RRSIG DS 8 1 86400 20150112170000 20150105160000 16665 . thY7xYWBBxiBjqbQIb9fAG4TmQgnziwM7q6P1T3/ITxmECdvOCQnnZA3uD7qmN8uM0HudsD7+y+zgD3rsH4RSTKdL4kHSI0OnCxToMTvklghEgFDezqIRm8NkWdI2H4Stwrj20nYKSpLQxPI2EE54gs18P3KyO8bAUYv8Qx73xU=
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 238 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 9749
;; flags: qr rd ra ad cd ; qd: 1 an: 4 au: 0 ad: 1
;; QUESTIONS:
;; ch., type = DNSKEY, class = IN
;; ANSWERS:
ch. 990 IN DNSKEY 257 3 8 AwEAAb7GhhZ8IAy/AhwmSms5DeQK5ad09wIIplEpYoiAIYXPtJvT1ReFzyfTp/2YP+g/PWDwHPh4qKAHa9x0VgbIQcGAeNakmfkAdWEmCnca323/SAml3mwfaX62G7/uYWae5zh8QTxZKNd+K1yZ5x0IxnI31chSl5xymRbTEHYZDKwSIRFM3fTxUMt93WFaBVWELReYotJBr++rvAWdnlay5TPBTvheLBkaiqtgM4GP8HK07Y+86lsZnEsj5K3G1KTV5SPpa82rqYAwxG9VKbmSE/6/kBR5jJHjt1rRt5Oe7v18aEtw0YCEN4vxq+KuvMoNVqXUsE9LBwHJD+QNwi6wmB0=
ch. 990 IN DNSKEY 256 3 8 AwEAAcSLdT0fEmcFmLpeUkAJoeVaHKiu+nbuc43fWlqaCRVf8t2HA4uWxOk0O5ci9nrFTc8nq8oa5fk5Cj7CHh4yrX9qUCfTdIWTyp8BDEdJpS+Dyb0u9wQuVj+nQMj4fLzdQf4TJs3/qxuiLr3nL1UUwlhhXeqSqGVb7p3mtB5HJ8ad
ch. 990 IN DNSKEY 256 3 8 AwEAAcsg0kY6fw1wzYMhSAKTy+Y2JzAst66P/1odp9NECJJHbU8f4nwziI3onoFSBV0ZiSZhY1aH5dhdDZ7BkrqhVXSrZPAz0CvzjIxmB1gSOf9DeZvjQvoy97HqYolxsf+B3QQv2RKBT67elF5+JisKg3/dQISelKn8LhabSoVrMlD1
ch. 990 IN RRSIG DNSKEY 8 1 86400 20150127100909 20141212090909 46375 ch. bT8q0FWyeMH0SulNo6UdIIgZYNATwYsee2bikq2Gh339Bufma8eaqWIPYT3XKmxYPBFOw0bVl+kLZxTwbR1CFoCDXoP+qgQhh4mf9qkNiv2CDSc+0FE3FRREn+DAhYTUEuB58FPiPakFB8s8O7T+k2qhDae7jy4/y7Jl1lnjaBY8s7bzOUPhF0KKCNZmvoKwtL23ZdVeTSV1xM3jkiNnpzBKbcoSWECSGJVp1SE0BnRXdwQP41YTXFZ0310YjaTAUCC5qbMIWdEkHjfdSQtKBImnc85mkapq9w++XQ4zhauPWBtrPV3CcoCahjUaWdjrKVkibomlJZaN8MEO23CfQw==
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 893 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 20291
;; flags: qr rd ra cd ; qd: 1 an: 3 au: 0 ad: 1
;; QUESTIONS:
;; ingotronic.ch., type = DS, class = IN
;; ANSWERS:
ingotronic.ch. 3598 IN DS 6031 5 1 733D0218B571CD617B1A7493564B9FC4F12ADE82
ingotronic.ch. 3598 IN DS 6031 5 2 4A948F2FDADA24686E473EDAC00DCF972584C75E3FAA92C2021B6221449FF87E
ingotronic.ch. 3598 IN RRSIG DS 8 2 3600 20150129033614 20150105123019 60789 ch. rVPJP2HhzW7OkroK2axFj5Lb4iVWCH8Fp/Iq1rF952NDo72b8RiKje2RaAKJAGQ+wd0YgE+PAej04GCmkhlDJA/zvPeeTxuhy3HbJzReMlQ7fjyH+wW1hli+FuIYvogXWf7nO/9VyPORt8X/f/pjrOr3Vlj9sGLN8TGYpEuVSw4=
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 288 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 62908
;; flags: qr aa rd ra cd ; qd: 1 an: 4 au: 0 ad: 1
;; QUESTIONS:
;; ingotronic.ch., type = DNSKEY, class = IN
;; ANSWERS:
ingotronic.ch. 300 IN DNSKEY 257 3 5 AwEAAeA1vzmjaB+eBAcvhzpKEgAEFpvQ1rg4uKDW6MsQtacKoqBpgyep2+LuWotz5p/xYxj3NGsArwN8Ad5cY0FHRr8miTT0elOv6nvlqGIfRuhj/BXAQ1x4ihpSFslHw0lJMYFwxsUZWpUyjWX/nv1xRZMMwF46gui0N4OEbyTYusCk77D+A71k+K0EAitFIbIH4GCUKmH1H7HmXhSVH9bN/n7KEGwW32lmsuuUcJoRKDkcUvbMXY/9Xoa2quERrUg/rBbDUHowRPjYDS5GzY1+f4YY8s40BufGiqyUTKKXL953MVFK8gmezXA0hbmrnZ7CBOw/7238mORAdzExaX8n7CE=
ingotronic.ch. 300 IN DNSKEY 256 3 5 AwEAAZ2Xh77GFzpEDx7EHYxShqltHgkiG+BOjBGifEmnJhQSdE5/yNSLFNcdhZZ8HUPxYnaedTqJcFFg4AzUsQklF/fECegTJdZjaj2WoL0/I8K7HMfY/hVuRZUWPNglYi8agJRX6gdkFTCpUNI7stpgKqxtzUJhhw15uG/lKMplwqUr
ingotronic.ch. 300 IN RRSIG DNSKEY 5 2 300 20150125003700 20141226001657 6031 ingotronic.ch. rs1QlP2SlSpA2ELbzwg3DgWLzXWL3Lpv6CUJE2Q0qH2Zp7Qdy3cD+ZEtNh9v24Qv1M6JJ3zFt8mmZoCeW2ycuMbJCqBkW9CBuwF+VznZvZY2MxwPipvhvEEGP//0M8YAZJ66yQPDv3PTdAP8FYbIrJyvY44vwyncwbslpfHT9jAsrbfr3vuMuWps86dnP462q+0s1TxBfqi8mzo3gdavjHKWVNwohLahLKT+tWeu6DSzQv0YwMjwtkLgF7QRgx3ctIIkloOrnx9nHH1N6y+hxEB89fOlyVDjHhgL5uVtsD5fEdT0FJ2Gc/2nShEMMqIwr1/J9kUq1mNySff/uEe65Q==
ingotronic.ch. 300 IN RRSIG DNSKEY 5 2 300 20150125003700 20141226001657 17430 ingotronic.ch. mEwZjhQqeWksWD0TCnNBrtce4YkWJL3edqL6PvAUu8Fn+Ih437kEs3+pqdkgRsdYQ9HW+lBm/8pWwJlNAv0bi9NykItXMwAUFtncgq+6Pnh3iAM972GXSa5VV4LcGQ5b8CBdHCHiEKDqyPv5Hr5QfYL/FQaWlcNRh4QZZlZNPFA=
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 940 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 40211
;; flags: qr rd ra ad cd ; qd: 1 an: 4 au: 0 ad: 1
;; QUESTIONS:
;; ., type = DNSKEY, class = IN
;; ANSWERS:
. 87389 IN DNSKEY 257 3 8 AwEAAagAIKlVZrpC6Ia7gEzahOR+9W29euxhJhVVLOyQbSEW0O8gcCjFFVQUTf6v58fLjwBd0YI0EzrAcQqBGCzh/RStIoO8g0NfnfL2MTJRkxoXbfDaUeVPQuYEhg37NZWAJQ9VnMVDxP/VHL496M/QZxkjf5/Efucp2gaDX6RS6CXpoY68LsvPVjR0ZSwzz1apAzvN9dlzEheX7ICJBBtuA6G3LQpzW5hOA2hzCTMjJPJ8LbqF6dsV6DoBQzgul0sGIcGOYl7OyQdXfZ57relSQageu+ipAdTTJ25AsRTAoub8ONGcLmqrAmRLKBP1dfwhYB4N7knNnulqQxA+Uk1ihz0=
. 87389 IN DNSKEY 256 3 8 AwEAAe3fSrbLBy3LOS7pnxEUhvPZTE2H5dIGsI/UfruI/nOEvWWa/PSX2BFedBkEqOlYdjdNF2f+6lmfk2Od/xu0v5bVqxFE+/24v3hZSlWBxvXzPTAGHrbW/IJYEPqlzVOAS4XdUgHg0N7IbLywNHMvB+Yf+Nm6ctyXXFLV4WTNnzs7
. 87389 IN DNSKEY 256 3 8 AwEAAaPD7Y7XIi1MOEREJNTrRhyqsY3gff6JWzg+XCbqut1sbcbvqyssHw8DT1AkRaAC92pO8xuyq5QEgEPL1IHfABLwpwXI5gTj4gdwi86bpkmlWs9fRpnn4DPDCTdrnxIejJXgClHikLJF3u3CdpNCMijq4CKdQbMlRZ3avv+G7rh7
. 87389 IN RRSIG DNSKEY 8 0 172800 20150115235959 20150101000000 19036 . i8cAxD2pvQi1oAyvQxRpDfFlbqPzW+69QQEsDwE1eWOm5AtawO9U7lmsGps7sy/fVNvl1ljKBj4Djp9pb3U2FLogjiIlW0cDAkPmLlG9t+b/pjEfBNlhjANUVN06pvQVAfm+LcF26EaWT6FlISBqb6jSy4BHRa3Bdc4Sx7+pRSYSqVVvYxLkfAWsKPqGkvWhebJDndJJV9syXQXgZ+v/uJ+6XOS43xkAdeL8iBzIs/FlwMTfh3tVe3d0lb65IBBLlCzeQuetX+0Vu1YFcnD0mHc/wS2ZnAV5toAFmyVQBoY/XAZiZeaOkcROJ6Zmqezy7liwK7BqsYyAZntMhk8lbg==
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 883 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 25429
;; flags: qr rd ra ad cd ; qd: 1 an: 2 au: 0 ad: 1
;; QUESTIONS:
;; ch., type = DS, class = IN
;; ANSWERS:
ch. 989 IN DS 46375 8 2 8F96646FC68BB7E4AF4C0750A6096FBC0D4ECDA3D3FA6DA06FDDB42EE50C6CF3
ch. 989 IN RRSIG DS 8 1 86400 20150112170000 20150105160000 16665 . thY7xYWBBxiBjqbQIb9fAG4TmQgnziwM7q6P1T3/ITxmECdvOCQnnZA3uD7qmN8uM0HudsD7+y+zgD3rsH4RSTKdL4kHSI0OnCxToMTvklghEgFDezqIRm8NkWdI2H4Stwrj20nYKSpLQxPI2EE54gs18P3KyO8bAUYv8Qx73xU=
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 238 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 742
;; flags: qr rd ra ad cd ; qd: 1 an: 4 au: 0 ad: 1
;; QUESTIONS:
;; ch., type = DNSKEY, class = IN
;; ANSWERS:
ch. 990 IN DNSKEY 257 3 8 AwEAAb7GhhZ8IAy/AhwmSms5DeQK5ad09wIIplEpYoiAIYXPtJvT1ReFzyfTp/2YP+g/PWDwHPh4qKAHa9x0VgbIQcGAeNakmfkAdWEmCnca323/SAml3mwfaX62G7/uYWae5zh8QTxZKNd+K1yZ5x0IxnI31chSl5xymRbTEHYZDKwSIRFM3fTxUMt93WFaBVWELReYotJBr++rvAWdnlay5TPBTvheLBkaiqtgM4GP8HK07Y+86lsZnEsj5K3G1KTV5SPpa82rqYAwxG9VKbmSE/6/kBR5jJHjt1rRt5Oe7v18aEtw0YCEN4vxq+KuvMoNVqXUsE9LBwHJD+QNwi6wmB0=
ch. 990 IN DNSKEY 256 3 8 AwEAAcsg0kY6fw1wzYMhSAKTy+Y2JzAst66P/1odp9NECJJHbU8f4nwziI3onoFSBV0ZiSZhY1aH5dhdDZ7BkrqhVXSrZPAz0CvzjIxmB1gSOf9DeZvjQvoy97HqYolxsf+B3QQv2RKBT67elF5+JisKg3/dQISelKn8LhabSoVrMlD1
ch. 990 IN DNSKEY 256 3 8 AwEAAcSLdT0fEmcFmLpeUkAJoeVaHKiu+nbuc43fWlqaCRVf8t2HA4uWxOk0O5ci9nrFTc8nq8oa5fk5Cj7CHh4yrX9qUCfTdIWTyp8BDEdJpS+Dyb0u9wQuVj+nQMj4fLzdQf4TJs3/qxuiLr3nL1UUwlhhXeqSqGVb7p3mtB5HJ8ad
ch. 990 IN RRSIG DNSKEY 8 1 86400 20150127100909 20141212090909 46375 ch. bT8q0FWyeMH0SulNo6UdIIgZYNATwYsee2bikq2Gh339Bufma8eaqWIPYT3XKmxYPBFOw0bVl+kLZxTwbR1CFoCDXoP+qgQhh4mf9qkNiv2CDSc+0FE3FRREn+DAhYTUEuB58FPiPakFB8s8O7T+k2qhDae7jy4/y7Jl1lnjaBY8s7bzOUPhF0KKCNZmvoKwtL23ZdVeTSV1xM3jkiNnpzBKbcoSWECSGJVp1SE0BnRXdwQP41YTXFZ0310YjaTAUCC5qbMIWdEkHjfdSQtKBImnc85mkapq9w++XQ4zhauPWBtrPV3CcoCahjUaWdjrKVkibomlJZaN8MEO23CfQw==
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 893 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 6866
;; flags: qr rd ra cd ; qd: 1 an: 3 au: 0 ad: 1
;; QUESTIONS:
;; ingotronic.ch., type = DS, class = IN
;; ANSWERS:
ingotronic.ch. 3598 IN DS 6031 5 1 733D0218B571CD617B1A7493564B9FC4F12ADE82
ingotronic.ch. 3598 IN DS 6031 5 2 4A948F2FDADA24686E473EDAC00DCF972584C75E3FAA92C2021B6221449FF87E
ingotronic.ch. 3598 IN RRSIG DS 8 2 3600 20150129033614 20150105123019 60789 ch. rVPJP2HhzW7OkroK2axFj5Lb4iVWCH8Fp/Iq1rF952NDo72b8RiKje2RaAKJAGQ+wd0YgE+PAej04GCmkhlDJA/zvPeeTxuhy3HbJzReMlQ7fjyH+wW1hli+FuIYvogXWf7nO/9VyPORt8X/f/pjrOr3Vlj9sGLN8TGYpEuVSw4=
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 288 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 4819
;; flags: qr aa rd ra cd ; qd: 1 an: 4 au: 0 ad: 1
;; QUESTIONS:
;; ingotronic.ch., type = DNSKEY, class = IN
;; ANSWERS:
ingotronic.ch. 300 IN DNSKEY 257 3 5 AwEAAeA1vzmjaB+eBAcvhzpKEgAEFpvQ1rg4uKDW6MsQtacKoqBpgyep2+LuWotz5p/xYxj3NGsArwN8Ad5cY0FHRr8miTT0elOv6nvlqGIfRuhj/BXAQ1x4ihpSFslHw0lJMYFwxsUZWpUyjWX/nv1xRZMMwF46gui0N4OEbyTYusCk77D+A71k+K0EAitFIbIH4GCUKmH1H7HmXhSVH9bN/n7KEGwW32lmsuuUcJoRKDkcUvbMXY/9Xoa2quERrUg/rBbDUHowRPjYDS5GzY1+f4YY8s40BufGiqyUTKKXL953MVFK8gmezXA0hbmrnZ7CBOw/7238mORAdzExaX8n7CE=
ingotronic.ch. 300 IN DNSKEY 256 3 5 AwEAAZ2Xh77GFzpEDx7EHYxShqltHgkiG+BOjBGifEmnJhQSdE5/yNSLFNcdhZZ8HUPxYnaedTqJcFFg4AzUsQklF/fECegTJdZjaj2WoL0/I8K7HMfY/hVuRZUWPNglYi8agJRX6gdkFTCpUNI7stpgKqxtzUJhhw15uG/lKMplwqUr
ingotronic.ch. 300 IN RRSIG DNSKEY 5 2 300 20150125003700 20141226001657 6031 ingotronic.ch. rs1QlP2SlSpA2ELbzwg3DgWLzXWL3Lpv6CUJE2Q0qH2Zp7Qdy3cD+ZEtNh9v24Qv1M6JJ3zFt8mmZoCeW2ycuMbJCqBkW9CBuwF+VznZvZY2MxwPipvhvEEGP//0M8YAZJ66yQPDv3PTdAP8FYbIrJyvY44vwyncwbslpfHT9jAsrbfr3vuMuWps86dnP462q+0s1TxBfqi8mzo3gdavjHKWVNwohLahLKT+tWeu6DSzQv0YwMjwtkLgF7QRgx3ctIIkloOrnx9nHH1N6y+hxEB89fOlyVDjHhgL5uVtsD5fEdT0FJ2Gc/2nShEMMqIwr1/J9kUq1mNySff/uEe65Q==
ingotronic.ch. 300 IN RRSIG DNSKEY 5 2 300 20150125003700 20141226001657 17430 ingotronic.ch. mEwZjhQqeWksWD0TCnNBrtce4YkWJL3edqL6PvAUu8Fn+Ih437kEs3+pqdkgRsdYQ9HW+lBm/8pWwJlNAv0bi9NykItXMwAUFtncgq+6Pnh3iAM972GXSa5VV4LcGQ5b8CBdHCHiEKDqyPv5Hr5QfYL/FQaWlcNRh4QZZlZNPFA=
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 940 bytes
###############################################
testSingleLabelABelowSigned 0000664 0000000 0000000 00000017215 13020541473 0035604 0 ustar 00root root 0000000 0000000 dnssecjava-1.1.3/src/test/resources/recordings/org_jitsi_dnssec_TestNonExistence #Date: 2015-01-06T22:34:47+01:00
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 19015
;; flags: qr aa rd ra cd ; qd: 1 an: 0 au: 6 ad: 1
;; QUESTIONS:
;; gibtsnicht.ingotronic.ch., type = A, class = IN
;; ANSWERS:
;; AUTHORITY RECORDS:
ingotronic.ch. 300 IN SOA ns1.ingotronic.ch. admin.ingotronic.ch. 2013032762 300 60 864000 300
ingotronic.ch. 300 IN RRSIG SOA 5 2 300 20150125021244 20141226011244 17430 ingotronic.ch. WDLpp9G0P/rlMBfpFn9sAfpEFoBnQfwyGSXbGCc/LG1FSkJoKLDQYDY696scLNsJgkrzZeJrl0oSSvA8AvRUhYRrmuqWMxTVFgYlRwPwqEMCKUqiVhKGVF4NYemoBiUQC4nJwBZd57xKCiF4AQ4CodBtiZxefJFAlTNE0g2yxtM=
ingotronic.ch. 300 IN NSEC alias.ingotronic.ch. A NS SOA RRSIG NSEC DNSKEY
ingotronic.ch. 300 IN RRSIG NSEC 5 2 300 20150125000532 20141225234703 17430 ingotronic.ch. en5BaZ6zWqEvoUFUDPm5g1pjz7THXBv/1kjKtV2tS+7xh0BtkLEzlA9n/H66ZZAX2EIh7vXj12xVJKOuEuM0o1mJwKsBaLQuTra60/zYAUIddwUOCzI3zzjiRFklPyHSnLkGoBODZcvehnsTzTPyBxkfoouleqpj7gN5jOSBL8M=
eccgost.ingotronic.ch. 300 IN NSEC invalid.ingotronic.ch. NS DS RRSIG NSEC
eccgost.ingotronic.ch. 300 IN RRSIG NSEC 5 3 300 20150125021136 20141226011244 17430 ingotronic.ch. lsX44/1144d1nG80WVhDnZCiywh+KTNqj9oEECk3GifEjOWNTJDTfbBnrGbdc7BIWs1mZmcPKFVfQB39QunMyzNQi4Wzjor3U1FPbXhUTn/g9fMul37g1aR00hUfS2Jo49vfDZEMZWp7th9ZFc+hlr8uWISceul5OJRq4SyMbzs=
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 711 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 61810
;; flags: qr rd ra ad cd ; qd: 1 an: 4 au: 0 ad: 1
;; QUESTIONS:
;; ., type = DNSKEY, class = IN
;; ANSWERS:
. 87386 IN DNSKEY 257 3 8 AwEAAagAIKlVZrpC6Ia7gEzahOR+9W29euxhJhVVLOyQbSEW0O8gcCjFFVQUTf6v58fLjwBd0YI0EzrAcQqBGCzh/RStIoO8g0NfnfL2MTJRkxoXbfDaUeVPQuYEhg37NZWAJQ9VnMVDxP/VHL496M/QZxkjf5/Efucp2gaDX6RS6CXpoY68LsvPVjR0ZSwzz1apAzvN9dlzEheX7ICJBBtuA6G3LQpzW5hOA2hzCTMjJPJ8LbqF6dsV6DoBQzgul0sGIcGOYl7OyQdXfZ57relSQageu+ipAdTTJ25AsRTAoub8ONGcLmqrAmRLKBP1dfwhYB4N7knNnulqQxA+Uk1ihz0=
. 87386 IN DNSKEY 256 3 8 AwEAAe3fSrbLBy3LOS7pnxEUhvPZTE2H5dIGsI/UfruI/nOEvWWa/PSX2BFedBkEqOlYdjdNF2f+6lmfk2Od/xu0v5bVqxFE+/24v3hZSlWBxvXzPTAGHrbW/IJYEPqlzVOAS4XdUgHg0N7IbLywNHMvB+Yf+Nm6ctyXXFLV4WTNnzs7
. 87386 IN DNSKEY 256 3 8 AwEAAaPD7Y7XIi1MOEREJNTrRhyqsY3gff6JWzg+XCbqut1sbcbvqyssHw8DT1AkRaAC92pO8xuyq5QEgEPL1IHfABLwpwXI5gTj4gdwi86bpkmlWs9fRpnn4DPDCTdrnxIejJXgClHikLJF3u3CdpNCMijq4CKdQbMlRZ3avv+G7rh7
. 87386 IN RRSIG DNSKEY 8 0 172800 20150115235959 20150101000000 19036 . i8cAxD2pvQi1oAyvQxRpDfFlbqPzW+69QQEsDwE1eWOm5AtawO9U7lmsGps7sy/fVNvl1ljKBj4Djp9pb3U2FLogjiIlW0cDAkPmLlG9t+b/pjEfBNlhjANUVN06pvQVAfm+LcF26EaWT6FlISBqb6jSy4BHRa3Bdc4Sx7+pRSYSqVVvYxLkfAWsKPqGkvWhebJDndJJV9syXQXgZ+v/uJ+6XOS43xkAdeL8iBzIs/FlwMTfh3tVe3d0lb65IBBLlCzeQuetX+0Vu1YFcnD0mHc/wS2ZnAV5toAFmyVQBoY/XAZiZeaOkcROJ6Zmqezy7liwK7BqsYyAZntMhk8lbg==
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 883 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 38737
;; flags: qr rd ra ad cd ; qd: 1 an: 2 au: 0 ad: 1
;; QUESTIONS:
;; ch., type = DS, class = IN
;; ANSWERS:
ch. 986 IN DS 46375 8 2 8F96646FC68BB7E4AF4C0750A6096FBC0D4ECDA3D3FA6DA06FDDB42EE50C6CF3
ch. 986 IN RRSIG DS 8 1 86400 20150112170000 20150105160000 16665 . thY7xYWBBxiBjqbQIb9fAG4TmQgnziwM7q6P1T3/ITxmECdvOCQnnZA3uD7qmN8uM0HudsD7+y+zgD3rsH4RSTKdL4kHSI0OnCxToMTvklghEgFDezqIRm8NkWdI2H4Stwrj20nYKSpLQxPI2EE54gs18P3KyO8bAUYv8Qx73xU=
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 238 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 12449
;; flags: qr rd ra ad cd ; qd: 1 an: 4 au: 0 ad: 1
;; QUESTIONS:
;; ch., type = DNSKEY, class = IN
;; ANSWERS:
ch. 987 IN DNSKEY 257 3 8 AwEAAb7GhhZ8IAy/AhwmSms5DeQK5ad09wIIplEpYoiAIYXPtJvT1ReFzyfTp/2YP+g/PWDwHPh4qKAHa9x0VgbIQcGAeNakmfkAdWEmCnca323/SAml3mwfaX62G7/uYWae5zh8QTxZKNd+K1yZ5x0IxnI31chSl5xymRbTEHYZDKwSIRFM3fTxUMt93WFaBVWELReYotJBr++rvAWdnlay5TPBTvheLBkaiqtgM4GP8HK07Y+86lsZnEsj5K3G1KTV5SPpa82rqYAwxG9VKbmSE/6/kBR5jJHjt1rRt5Oe7v18aEtw0YCEN4vxq+KuvMoNVqXUsE9LBwHJD+QNwi6wmB0=
ch. 987 IN DNSKEY 256 3 8 AwEAAcSLdT0fEmcFmLpeUkAJoeVaHKiu+nbuc43fWlqaCRVf8t2HA4uWxOk0O5ci9nrFTc8nq8oa5fk5Cj7CHh4yrX9qUCfTdIWTyp8BDEdJpS+Dyb0u9wQuVj+nQMj4fLzdQf4TJs3/qxuiLr3nL1UUwlhhXeqSqGVb7p3mtB5HJ8ad
ch. 987 IN DNSKEY 256 3 8 AwEAAcsg0kY6fw1wzYMhSAKTy+Y2JzAst66P/1odp9NECJJHbU8f4nwziI3onoFSBV0ZiSZhY1aH5dhdDZ7BkrqhVXSrZPAz0CvzjIxmB1gSOf9DeZvjQvoy97HqYolxsf+B3QQv2RKBT67elF5+JisKg3/dQISelKn8LhabSoVrMlD1
ch. 987 IN RRSIG DNSKEY 8 1 86400 20150127100909 20141212090909 46375 ch. bT8q0FWyeMH0SulNo6UdIIgZYNATwYsee2bikq2Gh339Bufma8eaqWIPYT3XKmxYPBFOw0bVl+kLZxTwbR1CFoCDXoP+qgQhh4mf9qkNiv2CDSc+0FE3FRREn+DAhYTUEuB58FPiPakFB8s8O7T+k2qhDae7jy4/y7Jl1lnjaBY8s7bzOUPhF0KKCNZmvoKwtL23ZdVeTSV1xM3jkiNnpzBKbcoSWECSGJVp1SE0BnRXdwQP41YTXFZ0310YjaTAUCC5qbMIWdEkHjfdSQtKBImnc85mkapq9w++XQ4zhauPWBtrPV3CcoCahjUaWdjrKVkibomlJZaN8MEO23CfQw==
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 893 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 3260
;; flags: qr rd ra cd ; qd: 1 an: 3 au: 0 ad: 1
;; QUESTIONS:
;; ingotronic.ch., type = DS, class = IN
;; ANSWERS:
ingotronic.ch. 3595 IN DS 6031 5 1 733D0218B571CD617B1A7493564B9FC4F12ADE82
ingotronic.ch. 3595 IN DS 6031 5 2 4A948F2FDADA24686E473EDAC00DCF972584C75E3FAA92C2021B6221449FF87E
ingotronic.ch. 3595 IN RRSIG DS 8 2 3600 20150129033614 20150105123019 60789 ch. rVPJP2HhzW7OkroK2axFj5Lb4iVWCH8Fp/Iq1rF952NDo72b8RiKje2RaAKJAGQ+wd0YgE+PAej04GCmkhlDJA/zvPeeTxuhy3HbJzReMlQ7fjyH+wW1hli+FuIYvogXWf7nO/9VyPORt8X/f/pjrOr3Vlj9sGLN8TGYpEuVSw4=
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 288 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 41331
;; flags: qr aa rd ra cd ; qd: 1 an: 4 au: 0 ad: 1
;; QUESTIONS:
;; ingotronic.ch., type = DNSKEY, class = IN
;; ANSWERS:
ingotronic.ch. 300 IN DNSKEY 257 3 5 AwEAAeA1vzmjaB+eBAcvhzpKEgAEFpvQ1rg4uKDW6MsQtacKoqBpgyep2+LuWotz5p/xYxj3NGsArwN8Ad5cY0FHRr8miTT0elOv6nvlqGIfRuhj/BXAQ1x4ihpSFslHw0lJMYFwxsUZWpUyjWX/nv1xRZMMwF46gui0N4OEbyTYusCk77D+A71k+K0EAitFIbIH4GCUKmH1H7HmXhSVH9bN/n7KEGwW32lmsuuUcJoRKDkcUvbMXY/9Xoa2quERrUg/rBbDUHowRPjYDS5GzY1+f4YY8s40BufGiqyUTKKXL953MVFK8gmezXA0hbmrnZ7CBOw/7238mORAdzExaX8n7CE=
ingotronic.ch. 300 IN DNSKEY 256 3 5 AwEAAZ2Xh77GFzpEDx7EHYxShqltHgkiG+BOjBGifEmnJhQSdE5/yNSLFNcdhZZ8HUPxYnaedTqJcFFg4AzUsQklF/fECegTJdZjaj2WoL0/I8K7HMfY/hVuRZUWPNglYi8agJRX6gdkFTCpUNI7stpgKqxtzUJhhw15uG/lKMplwqUr
ingotronic.ch. 300 IN RRSIG DNSKEY 5 2 300 20150125003700 20141226001657 6031 ingotronic.ch. rs1QlP2SlSpA2ELbzwg3DgWLzXWL3Lpv6CUJE2Q0qH2Zp7Qdy3cD+ZEtNh9v24Qv1M6JJ3zFt8mmZoCeW2ycuMbJCqBkW9CBuwF+VznZvZY2MxwPipvhvEEGP//0M8YAZJ66yQPDv3PTdAP8FYbIrJyvY44vwyncwbslpfHT9jAsrbfr3vuMuWps86dnP462q+0s1TxBfqi8mzo3gdavjHKWVNwohLahLKT+tWeu6DSzQv0YwMjwtkLgF7QRgx3ctIIkloOrnx9nHH1N6y+hxEB89fOlyVDjHhgL5uVtsD5fEdT0FJ2Gc/2nShEMMqIwr1/J9kUq1mNySff/uEe65Q==
ingotronic.ch. 300 IN RRSIG DNSKEY 5 2 300 20150125003700 20141226001657 17430 ingotronic.ch. mEwZjhQqeWksWD0TCnNBrtce4YkWJL3edqL6PvAUu8Fn+Ih437kEs3+pqdkgRsdYQ9HW+lBm/8pWwJlNAv0bi9NykItXMwAUFtncgq+6Pnh3iAM972GXSa5VV4LcGQ5b8CBdHCHiEKDqyPv5Hr5QfYL/FQaWlcNRh4QZZlZNPFA=
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 940 bytes
###############################################
testSingleLabelABelowSignedNsec3 0000664 0000000 0000000 00000025421 13020541473 0036476 0 ustar 00root root 0000000 0000000 dnssecjava-1.1.3/src/test/resources/recordings/org_jitsi_dnssec_TestNonExistence #Date: 2015-01-06T22:34:45+01:00
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 61261
;; flags: qr aa rd ra cd ; qd: 1 an: 0 au: 8 ad: 1
;; QUESTIONS:
;; gibtsnicht.nsec3.ingotronic.ch., type = A, class = IN
;; ANSWERS:
;; AUTHORITY RECORDS:
nsec3.ingotronic.ch. 300 IN SOA ns1.ingotronic.ch. admin.ingotronic.ch. 2013032932 300 60 864000 300
nsec3.ingotronic.ch. 300 IN RRSIG SOA 7 3 300 20150201003516 20150101233516 62417 nsec3.ingotronic.ch. RMXaAZCkydysBpA4+LWD2frs4CZH2FBxafAolq7MOG62Sw3ellwNcSIh2naMasviin2DU2BAzIYyFUqKJDbUqzTxZQjsM6d5LtgFy5iTNmWum6FnFP5Fz73Zs/9Q0LNEstR82MRRL8EDElADhFySAReavyT/vlSTScQGxx6slyQ=
NTV3QJT4VQDVBPB6BNOVM40NMKJ3H29P.nsec3.ingotronic.ch. 300 IN NSEC3 1 0 10 1234 O275F9OLQ9HNCER7U4SMD4V8AG7IPML9 A NS SOA RRSIG DNSKEY NSEC3PARAM
NTV3QJT4VQDVBPB6BNOVM40NMKJ3H29P.nsec3.ingotronic.ch. 300 IN RRSIG NSEC3 7 4 300 20150131235629 20150101233516 62417 nsec3.ingotronic.ch. xccCvQs/b3ndBUo6J2FbaCzDMg+LB1e4OWeI29VTBWcmfbuD3rZvneRdbA9B5AluJH1ar10xxdrt/+RSuhSWC70LswkdPDg4vshmCZMDeMCOJYFEkGR0UgcZUMynU6EewEDLVLgYtBkJmspeuZNMBMPk/ZUOolCElrkHfbUA1Cc=
UDUMPS9J6F8348HFHH2FAED6I9DDE0U6.nsec3.ingotronic.ch. 300 IN NSEC3 1 0 10 1234 0UPHA6GQV03I7D8EJUDKC30I0C6I1G1Q
UDUMPS9J6F8348HFHH2FAED6I9DDE0U6.nsec3.ingotronic.ch. 300 IN RRSIG NSEC3 7 4 300 20150125005926 20141226002759 62417 nsec3.ingotronic.ch. XV2q9ufbwzauD/tmjb2EKsNBF+kHQYL0/MNb6ivY1oH9Q2hzQNPUuHkUl1db2erDFodPvspmDk6p6WOXoV6wmmaYhN+JI1TQKYYThsnKC1bkt1h6QyjwsDc12d8HVHOopvoXpaYWoV4bbghsAylGVqRjEYyt8JtR3BPfphehloU=
L40SJG7ANKROIHCT5RA6C8CTKJ91CD3N.nsec3.ingotronic.ch. 300 IN NSEC3 1 0 10 1234 ND3HQPFBN314KVB64L6T40JF75US8HKT
L40SJG7ANKROIHCT5RA6C8CTKJ91CD3N.nsec3.ingotronic.ch. 300 IN RRSIG NSEC3 7 4 300 20150125005926 20141226002759 62417 nsec3.ingotronic.ch. v6NHEWwb2KxRGRPshC2KFoxJs4Mis3OmvncJmn5bIWBnzeTY4x75tsE4zlVPx9rp0rjmOAQsYn4KGtIFPUShDHNHy45qoOtKkvRzRgByx4K2l5Rq9OizQVYsEUUScXEYATilaDU9whifF0vPk7YPwFGRmiY3prCGAvY/jH4hQUM=
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 1049 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 45173
;; flags: qr rd ra ad cd ; qd: 1 an: 4 au: 0 ad: 1
;; QUESTIONS:
;; ., type = DNSKEY, class = IN
;; ANSWERS:
. 87388 IN DNSKEY 256 3 8 AwEAAaPD7Y7XIi1MOEREJNTrRhyqsY3gff6JWzg+XCbqut1sbcbvqyssHw8DT1AkRaAC92pO8xuyq5QEgEPL1IHfABLwpwXI5gTj4gdwi86bpkmlWs9fRpnn4DPDCTdrnxIejJXgClHikLJF3u3CdpNCMijq4CKdQbMlRZ3avv+G7rh7
. 87388 IN DNSKEY 256 3 8 AwEAAe3fSrbLBy3LOS7pnxEUhvPZTE2H5dIGsI/UfruI/nOEvWWa/PSX2BFedBkEqOlYdjdNF2f+6lmfk2Od/xu0v5bVqxFE+/24v3hZSlWBxvXzPTAGHrbW/IJYEPqlzVOAS4XdUgHg0N7IbLywNHMvB+Yf+Nm6ctyXXFLV4WTNnzs7
. 87388 IN DNSKEY 257 3 8 AwEAAagAIKlVZrpC6Ia7gEzahOR+9W29euxhJhVVLOyQbSEW0O8gcCjFFVQUTf6v58fLjwBd0YI0EzrAcQqBGCzh/RStIoO8g0NfnfL2MTJRkxoXbfDaUeVPQuYEhg37NZWAJQ9VnMVDxP/VHL496M/QZxkjf5/Efucp2gaDX6RS6CXpoY68LsvPVjR0ZSwzz1apAzvN9dlzEheX7ICJBBtuA6G3LQpzW5hOA2hzCTMjJPJ8LbqF6dsV6DoBQzgul0sGIcGOYl7OyQdXfZ57relSQageu+ipAdTTJ25AsRTAoub8ONGcLmqrAmRLKBP1dfwhYB4N7knNnulqQxA+Uk1ihz0=
. 87388 IN RRSIG DNSKEY 8 0 172800 20150115235959 20150101000000 19036 . i8cAxD2pvQi1oAyvQxRpDfFlbqPzW+69QQEsDwE1eWOm5AtawO9U7lmsGps7sy/fVNvl1ljKBj4Djp9pb3U2FLogjiIlW0cDAkPmLlG9t+b/pjEfBNlhjANUVN06pvQVAfm+LcF26EaWT6FlISBqb6jSy4BHRa3Bdc4Sx7+pRSYSqVVvYxLkfAWsKPqGkvWhebJDndJJV9syXQXgZ+v/uJ+6XOS43xkAdeL8iBzIs/FlwMTfh3tVe3d0lb65IBBLlCzeQuetX+0Vu1YFcnD0mHc/wS2ZnAV5toAFmyVQBoY/XAZiZeaOkcROJ6Zmqezy7liwK7BqsYyAZntMhk8lbg==
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 883 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 43258
;; flags: qr rd ra ad cd ; qd: 1 an: 2 au: 0 ad: 1
;; QUESTIONS:
;; ch., type = DS, class = IN
;; ANSWERS:
ch. 988 IN DS 46375 8 2 8F96646FC68BB7E4AF4C0750A6096FBC0D4ECDA3D3FA6DA06FDDB42EE50C6CF3
ch. 988 IN RRSIG DS 8 1 86400 20150112170000 20150105160000 16665 . thY7xYWBBxiBjqbQIb9fAG4TmQgnziwM7q6P1T3/ITxmECdvOCQnnZA3uD7qmN8uM0HudsD7+y+zgD3rsH4RSTKdL4kHSI0OnCxToMTvklghEgFDezqIRm8NkWdI2H4Stwrj20nYKSpLQxPI2EE54gs18P3KyO8bAUYv8Qx73xU=
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 238 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 36397
;; flags: qr rd ra ad cd ; qd: 1 an: 4 au: 0 ad: 1
;; QUESTIONS:
;; ch., type = DNSKEY, class = IN
;; ANSWERS:
ch. 989 IN DNSKEY 256 3 8 AwEAAcsg0kY6fw1wzYMhSAKTy+Y2JzAst66P/1odp9NECJJHbU8f4nwziI3onoFSBV0ZiSZhY1aH5dhdDZ7BkrqhVXSrZPAz0CvzjIxmB1gSOf9DeZvjQvoy97HqYolxsf+B3QQv2RKBT67elF5+JisKg3/dQISelKn8LhabSoVrMlD1
ch. 989 IN DNSKEY 257 3 8 AwEAAb7GhhZ8IAy/AhwmSms5DeQK5ad09wIIplEpYoiAIYXPtJvT1ReFzyfTp/2YP+g/PWDwHPh4qKAHa9x0VgbIQcGAeNakmfkAdWEmCnca323/SAml3mwfaX62G7/uYWae5zh8QTxZKNd+K1yZ5x0IxnI31chSl5xymRbTEHYZDKwSIRFM3fTxUMt93WFaBVWELReYotJBr++rvAWdnlay5TPBTvheLBkaiqtgM4GP8HK07Y+86lsZnEsj5K3G1KTV5SPpa82rqYAwxG9VKbmSE/6/kBR5jJHjt1rRt5Oe7v18aEtw0YCEN4vxq+KuvMoNVqXUsE9LBwHJD+QNwi6wmB0=
ch. 989 IN DNSKEY 256 3 8 AwEAAcSLdT0fEmcFmLpeUkAJoeVaHKiu+nbuc43fWlqaCRVf8t2HA4uWxOk0O5ci9nrFTc8nq8oa5fk5Cj7CHh4yrX9qUCfTdIWTyp8BDEdJpS+Dyb0u9wQuVj+nQMj4fLzdQf4TJs3/qxuiLr3nL1UUwlhhXeqSqGVb7p3mtB5HJ8ad
ch. 989 IN RRSIG DNSKEY 8 1 86400 20150127100909 20141212090909 46375 ch. bT8q0FWyeMH0SulNo6UdIIgZYNATwYsee2bikq2Gh339Bufma8eaqWIPYT3XKmxYPBFOw0bVl+kLZxTwbR1CFoCDXoP+qgQhh4mf9qkNiv2CDSc+0FE3FRREn+DAhYTUEuB58FPiPakFB8s8O7T+k2qhDae7jy4/y7Jl1lnjaBY8s7bzOUPhF0KKCNZmvoKwtL23ZdVeTSV1xM3jkiNnpzBKbcoSWECSGJVp1SE0BnRXdwQP41YTXFZ0310YjaTAUCC5qbMIWdEkHjfdSQtKBImnc85mkapq9w++XQ4zhauPWBtrPV3CcoCahjUaWdjrKVkibomlJZaN8MEO23CfQw==
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 893 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 9276
;; flags: qr rd ra cd ; qd: 1 an: 3 au: 0 ad: 1
;; QUESTIONS:
;; ingotronic.ch., type = DS, class = IN
;; ANSWERS:
ingotronic.ch. 3597 IN DS 6031 5 1 733D0218B571CD617B1A7493564B9FC4F12ADE82
ingotronic.ch. 3597 IN DS 6031 5 2 4A948F2FDADA24686E473EDAC00DCF972584C75E3FAA92C2021B6221449FF87E
ingotronic.ch. 3597 IN RRSIG DS 8 2 3600 20150129033614 20150105123019 60789 ch. rVPJP2HhzW7OkroK2axFj5Lb4iVWCH8Fp/Iq1rF952NDo72b8RiKje2RaAKJAGQ+wd0YgE+PAej04GCmkhlDJA/zvPeeTxuhy3HbJzReMlQ7fjyH+wW1hli+FuIYvogXWf7nO/9VyPORt8X/f/pjrOr3Vlj9sGLN8TGYpEuVSw4=
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 288 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 49214
;; flags: qr aa rd ra cd ; qd: 1 an: 4 au: 0 ad: 1
;; QUESTIONS:
;; ingotronic.ch., type = DNSKEY, class = IN
;; ANSWERS:
ingotronic.ch. 300 IN DNSKEY 256 3 5 AwEAAZ2Xh77GFzpEDx7EHYxShqltHgkiG+BOjBGifEmnJhQSdE5/yNSLFNcdhZZ8HUPxYnaedTqJcFFg4AzUsQklF/fECegTJdZjaj2WoL0/I8K7HMfY/hVuRZUWPNglYi8agJRX6gdkFTCpUNI7stpgKqxtzUJhhw15uG/lKMplwqUr
ingotronic.ch. 300 IN DNSKEY 257 3 5 AwEAAeA1vzmjaB+eBAcvhzpKEgAEFpvQ1rg4uKDW6MsQtacKoqBpgyep2+LuWotz5p/xYxj3NGsArwN8Ad5cY0FHRr8miTT0elOv6nvlqGIfRuhj/BXAQ1x4ihpSFslHw0lJMYFwxsUZWpUyjWX/nv1xRZMMwF46gui0N4OEbyTYusCk77D+A71k+K0EAitFIbIH4GCUKmH1H7HmXhSVH9bN/n7KEGwW32lmsuuUcJoRKDkcUvbMXY/9Xoa2quERrUg/rBbDUHowRPjYDS5GzY1+f4YY8s40BufGiqyUTKKXL953MVFK8gmezXA0hbmrnZ7CBOw/7238mORAdzExaX8n7CE=
ingotronic.ch. 300 IN RRSIG DNSKEY 5 2 300 20150125003700 20141226001657 6031 ingotronic.ch. rs1QlP2SlSpA2ELbzwg3DgWLzXWL3Lpv6CUJE2Q0qH2Zp7Qdy3cD+ZEtNh9v24Qv1M6JJ3zFt8mmZoCeW2ycuMbJCqBkW9CBuwF+VznZvZY2MxwPipvhvEEGP//0M8YAZJ66yQPDv3PTdAP8FYbIrJyvY44vwyncwbslpfHT9jAsrbfr3vuMuWps86dnP462q+0s1TxBfqi8mzo3gdavjHKWVNwohLahLKT+tWeu6DSzQv0YwMjwtkLgF7QRgx3ctIIkloOrnx9nHH1N6y+hxEB89fOlyVDjHhgL5uVtsD5fEdT0FJ2Gc/2nShEMMqIwr1/J9kUq1mNySff/uEe65Q==
ingotronic.ch. 300 IN RRSIG DNSKEY 5 2 300 20150125003700 20141226001657 17430 ingotronic.ch. mEwZjhQqeWksWD0TCnNBrtce4YkWJL3edqL6PvAUu8Fn+Ih437kEs3+pqdkgRsdYQ9HW+lBm/8pWwJlNAv0bi9NykItXMwAUFtncgq+6Pnh3iAM972GXSa5VV4LcGQ5b8CBdHCHiEKDqyPv5Hr5QfYL/FQaWlcNRh4QZZlZNPFA=
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 940 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 64194
;; flags: qr aa rd ra cd ; qd: 1 an: 3 au: 0 ad: 1
;; QUESTIONS:
;; nsec3.ingotronic.ch., type = DS, class = IN
;; ANSWERS:
nsec3.ingotronic.ch. 300 IN DS 16758 7 1 1720FF268E09A2CB63805EC8782D10AAD20E12A5
nsec3.ingotronic.ch. 300 IN DS 16758 7 2 3C8DC02750A1636F829B45D6E6D642866768A9CD40A013AD9D25AB63734FFA13
nsec3.ingotronic.ch. 300 IN RRSIG DS 5 3 300 20150125011134 20141226002644 17430 ingotronic.ch. hNurzlGhlyHbSgezPDuhIrtN9ZMsMXZbKGc7HD5rUuM88wD3fM97NxdzF+2Hi1USvBZ5GsQv63L+lAzf+mFPBoPIFHtTiAv8up7kQKRKmi/EzzkCYd/CC4UYdDZbaUyv7esh7spSOGwjPJNdK831p+MgltoWaYtnSGVMgOKk5mc=
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 305 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 51334
;; flags: qr aa rd ra cd ; qd: 1 an: 4 au: 0 ad: 1
;; QUESTIONS:
;; nsec3.ingotronic.ch., type = DNSKEY, class = IN
;; ANSWERS:
nsec3.ingotronic.ch. 300 IN DNSKEY 257 3 7 AwEAAaBuJTf9oGyeTH3biUkAFLrsYrkodX1H7Snsui4XsDHFCBvs5XYacHbs0Jg0/O51KPjmNnjwMW8SSyDkKqYQ+9uYAf2EQ/pnD/VGQqnV2cw0Vwk/t0E2V4FUCju4pnAoyzZFZXGs1eWbX9JXu++b0Azp+ACq6485qJLzHhWDiIrPoK/SvdbFVRK4s+nPPJLH3NGBbtdz6kPq7aFWYBMoGeAZdN1wsQpcNWUo5eOmaJY53nMc7+rDpAyYlMe/FKwSZdX2ZDd63Qsa6Im4FVUJq/nWLq7tlQ/mWks15uDTQyJy/OWfA0ICCO4N9Fel9rThJNpJWEzOCblvZyBoy405kZk=
nsec3.ingotronic.ch. 300 IN DNSKEY 256 3 7 AwEAAccAWxkTVGZ6UAp0VEozAlYpARhbh6Y6tYOl6Fg3UeBNFFtDQ9fTEEt1NkbnR9u8KkpVN6a67avlYiUN1egDqEwzDU7R1Rw+/USdhm2hqOARmmu3DBgjjX/iXjZLyv310cOGFJZ/smcodlDL4pDAAoPxh/qs6KEBaT0sc1KWcGq3
nsec3.ingotronic.ch. 300 IN RRSIG DNSKEY 7 3 300 20150125001457 20141226000444 16758 nsec3.ingotronic.ch. mXi1ylDi8XkRPup+YlT8GPdYE+P7gb6+/VdAwtodI916IzrkGkOHOTLbnrbAqqJOh0HxVCYXdxovmEcbJKUFKwplrQg3XD7/9Sq4pKU1MhMFEGrm/QPkM4u0mgjQwyToDLGuPHuFyur3FSjO/n54uGhAEft9JOFk/WKtWdCnm2LLyQrpC6herA3efFaI8kZhdoEY02AwihWVJxHasmz7lOoKRgNrkfELU+fN4+V7ISsRfJMyZc6q5PuNeG6vFD0uNE8tpdLJCSMurKYVpelvYqzFIcRTYcIjXwmS+L3DGjupqWMzFZVmpQM62JG3KCCD0ffpnNb0nWoSoHwpSeh/3Q==
nsec3.ingotronic.ch. 300 IN RRSIG DNSKEY 7 3 300 20150125001457 20141226000444 62417 nsec3.ingotronic.ch. PyCrf8T5dAfJzapb1p+kcTALPjDuD2niSaXXo0KeHAunT+6gJicLML2S/ZpiYr7X7Ma4Z0TYqE02qH6pcLYNnSgv9BE8sZO0nRtPekSyTy5nLi4hFADYhjb3UjaB85qmQZcqm64vC/CJhWO4t6Eixg/5MYALw+Qdy5Fo0qy/U5E=
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 958 bytes
###############################################
testSingleLabelMXBelowSignedForExistingA 0000664 0000000 0000000 00000016442 13020541473 0040234 0 ustar 00root root 0000000 0000000 dnssecjava-1.1.3/src/test/resources/recordings/org_jitsi_dnssec_TestNonExistence #Date: 2015-01-06T22:34:46+01:00
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 55491
;; flags: qr aa rd ra cd ; qd: 1 an: 0 au: 4 ad: 1
;; QUESTIONS:
;; www.ingotronic.ch., type = MX, class = IN
;; ANSWERS:
;; AUTHORITY RECORDS:
ingotronic.ch. 300 IN SOA ns1.ingotronic.ch. admin.ingotronic.ch. 2013032762 300 60 864000 300
ingotronic.ch. 300 IN RRSIG SOA 5 2 300 20150125021244 20141226011244 17430 ingotronic.ch. WDLpp9G0P/rlMBfpFn9sAfpEFoBnQfwyGSXbGCc/LG1FSkJoKLDQYDY696scLNsJgkrzZeJrl0oSSvA8AvRUhYRrmuqWMxTVFgYlRwPwqEMCKUqiVhKGVF4NYemoBiUQC4nJwBZd57xKCiF4AQ4CodBtiZxefJFAlTNE0g2yxtM=
www.ingotronic.ch. 300 IN NSEC z.ingotronic.ch. A AAAA RRSIG NSEC
www.ingotronic.ch. 300 IN RRSIG NSEC 5 3 300 20150125012443 20141226010256 17430 ingotronic.ch. fMbLmn92jrN7YeM4XWcq7/kKLiPB3Ll4yQSLiPRWQw79ZVeNJMkqEqdstEnnTyKu/hAId6YpvMKsJnIfCTVyoO75i6CaEKXOpvf9AT7TstEUj0YKjp4vWvcNs2F2144nrnqnaVFX8ZTxnUV50R+/AsqtKA+2/Tky6SlNhzeWVMI=
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 475 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 50097
;; flags: qr rd ra ad cd ; qd: 1 an: 4 au: 0 ad: 1
;; QUESTIONS:
;; ., type = DNSKEY, class = IN
;; ANSWERS:
. 87387 IN DNSKEY 256 3 8 AwEAAaPD7Y7XIi1MOEREJNTrRhyqsY3gff6JWzg+XCbqut1sbcbvqyssHw8DT1AkRaAC92pO8xuyq5QEgEPL1IHfABLwpwXI5gTj4gdwi86bpkmlWs9fRpnn4DPDCTdrnxIejJXgClHikLJF3u3CdpNCMijq4CKdQbMlRZ3avv+G7rh7
. 87387 IN DNSKEY 256 3 8 AwEAAe3fSrbLBy3LOS7pnxEUhvPZTE2H5dIGsI/UfruI/nOEvWWa/PSX2BFedBkEqOlYdjdNF2f+6lmfk2Od/xu0v5bVqxFE+/24v3hZSlWBxvXzPTAGHrbW/IJYEPqlzVOAS4XdUgHg0N7IbLywNHMvB+Yf+Nm6ctyXXFLV4WTNnzs7
. 87387 IN DNSKEY 257 3 8 AwEAAagAIKlVZrpC6Ia7gEzahOR+9W29euxhJhVVLOyQbSEW0O8gcCjFFVQUTf6v58fLjwBd0YI0EzrAcQqBGCzh/RStIoO8g0NfnfL2MTJRkxoXbfDaUeVPQuYEhg37NZWAJQ9VnMVDxP/VHL496M/QZxkjf5/Efucp2gaDX6RS6CXpoY68LsvPVjR0ZSwzz1apAzvN9dlzEheX7ICJBBtuA6G3LQpzW5hOA2hzCTMjJPJ8LbqF6dsV6DoBQzgul0sGIcGOYl7OyQdXfZ57relSQageu+ipAdTTJ25AsRTAoub8ONGcLmqrAmRLKBP1dfwhYB4N7knNnulqQxA+Uk1ihz0=
. 87387 IN RRSIG DNSKEY 8 0 172800 20150115235959 20150101000000 19036 . i8cAxD2pvQi1oAyvQxRpDfFlbqPzW+69QQEsDwE1eWOm5AtawO9U7lmsGps7sy/fVNvl1ljKBj4Djp9pb3U2FLogjiIlW0cDAkPmLlG9t+b/pjEfBNlhjANUVN06pvQVAfm+LcF26EaWT6FlISBqb6jSy4BHRa3Bdc4Sx7+pRSYSqVVvYxLkfAWsKPqGkvWhebJDndJJV9syXQXgZ+v/uJ+6XOS43xkAdeL8iBzIs/FlwMTfh3tVe3d0lb65IBBLlCzeQuetX+0Vu1YFcnD0mHc/wS2ZnAV5toAFmyVQBoY/XAZiZeaOkcROJ6Zmqezy7liwK7BqsYyAZntMhk8lbg==
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 883 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 21262
;; flags: qr rd ra ad cd ; qd: 1 an: 2 au: 0 ad: 1
;; QUESTIONS:
;; ch., type = DS, class = IN
;; ANSWERS:
ch. 987 IN DS 46375 8 2 8F96646FC68BB7E4AF4C0750A6096FBC0D4ECDA3D3FA6DA06FDDB42EE50C6CF3
ch. 987 IN RRSIG DS 8 1 86400 20150112170000 20150105160000 16665 . thY7xYWBBxiBjqbQIb9fAG4TmQgnziwM7q6P1T3/ITxmECdvOCQnnZA3uD7qmN8uM0HudsD7+y+zgD3rsH4RSTKdL4kHSI0OnCxToMTvklghEgFDezqIRm8NkWdI2H4Stwrj20nYKSpLQxPI2EE54gs18P3KyO8bAUYv8Qx73xU=
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 238 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 221
;; flags: qr rd ra ad cd ; qd: 1 an: 4 au: 0 ad: 1
;; QUESTIONS:
;; ch., type = DNSKEY, class = IN
;; ANSWERS:
ch. 988 IN DNSKEY 256 3 8 AwEAAcsg0kY6fw1wzYMhSAKTy+Y2JzAst66P/1odp9NECJJHbU8f4nwziI3onoFSBV0ZiSZhY1aH5dhdDZ7BkrqhVXSrZPAz0CvzjIxmB1gSOf9DeZvjQvoy97HqYolxsf+B3QQv2RKBT67elF5+JisKg3/dQISelKn8LhabSoVrMlD1
ch. 988 IN DNSKEY 257 3 8 AwEAAb7GhhZ8IAy/AhwmSms5DeQK5ad09wIIplEpYoiAIYXPtJvT1ReFzyfTp/2YP+g/PWDwHPh4qKAHa9x0VgbIQcGAeNakmfkAdWEmCnca323/SAml3mwfaX62G7/uYWae5zh8QTxZKNd+K1yZ5x0IxnI31chSl5xymRbTEHYZDKwSIRFM3fTxUMt93WFaBVWELReYotJBr++rvAWdnlay5TPBTvheLBkaiqtgM4GP8HK07Y+86lsZnEsj5K3G1KTV5SPpa82rqYAwxG9VKbmSE/6/kBR5jJHjt1rRt5Oe7v18aEtw0YCEN4vxq+KuvMoNVqXUsE9LBwHJD+QNwi6wmB0=
ch. 988 IN DNSKEY 256 3 8 AwEAAcSLdT0fEmcFmLpeUkAJoeVaHKiu+nbuc43fWlqaCRVf8t2HA4uWxOk0O5ci9nrFTc8nq8oa5fk5Cj7CHh4yrX9qUCfTdIWTyp8BDEdJpS+Dyb0u9wQuVj+nQMj4fLzdQf4TJs3/qxuiLr3nL1UUwlhhXeqSqGVb7p3mtB5HJ8ad
ch. 988 IN RRSIG DNSKEY 8 1 86400 20150127100909 20141212090909 46375 ch. bT8q0FWyeMH0SulNo6UdIIgZYNATwYsee2bikq2Gh339Bufma8eaqWIPYT3XKmxYPBFOw0bVl+kLZxTwbR1CFoCDXoP+qgQhh4mf9qkNiv2CDSc+0FE3FRREn+DAhYTUEuB58FPiPakFB8s8O7T+k2qhDae7jy4/y7Jl1lnjaBY8s7bzOUPhF0KKCNZmvoKwtL23ZdVeTSV1xM3jkiNnpzBKbcoSWECSGJVp1SE0BnRXdwQP41YTXFZ0310YjaTAUCC5qbMIWdEkHjfdSQtKBImnc85mkapq9w++XQ4zhauPWBtrPV3CcoCahjUaWdjrKVkibomlJZaN8MEO23CfQw==
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 893 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 23462
;; flags: qr rd ra cd ; qd: 1 an: 3 au: 0 ad: 1
;; QUESTIONS:
;; ingotronic.ch., type = DS, class = IN
;; ANSWERS:
ingotronic.ch. 3596 IN DS 6031 5 2 4A948F2FDADA24686E473EDAC00DCF972584C75E3FAA92C2021B6221449FF87E
ingotronic.ch. 3596 IN DS 6031 5 1 733D0218B571CD617B1A7493564B9FC4F12ADE82
ingotronic.ch. 3596 IN RRSIG DS 8 2 3600 20150129033614 20150105123019 60789 ch. rVPJP2HhzW7OkroK2axFj5Lb4iVWCH8Fp/Iq1rF952NDo72b8RiKje2RaAKJAGQ+wd0YgE+PAej04GCmkhlDJA/zvPeeTxuhy3HbJzReMlQ7fjyH+wW1hli+FuIYvogXWf7nO/9VyPORt8X/f/pjrOr3Vlj9sGLN8TGYpEuVSw4=
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 288 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 14899
;; flags: qr aa rd ra cd ; qd: 1 an: 4 au: 0 ad: 1
;; QUESTIONS:
;; ingotronic.ch., type = DNSKEY, class = IN
;; ANSWERS:
ingotronic.ch. 300 IN DNSKEY 257 3 5 AwEAAeA1vzmjaB+eBAcvhzpKEgAEFpvQ1rg4uKDW6MsQtacKoqBpgyep2+LuWotz5p/xYxj3NGsArwN8Ad5cY0FHRr8miTT0elOv6nvlqGIfRuhj/BXAQ1x4ihpSFslHw0lJMYFwxsUZWpUyjWX/nv1xRZMMwF46gui0N4OEbyTYusCk77D+A71k+K0EAitFIbIH4GCUKmH1H7HmXhSVH9bN/n7KEGwW32lmsuuUcJoRKDkcUvbMXY/9Xoa2quERrUg/rBbDUHowRPjYDS5GzY1+f4YY8s40BufGiqyUTKKXL953MVFK8gmezXA0hbmrnZ7CBOw/7238mORAdzExaX8n7CE=
ingotronic.ch. 300 IN DNSKEY 256 3 5 AwEAAZ2Xh77GFzpEDx7EHYxShqltHgkiG+BOjBGifEmnJhQSdE5/yNSLFNcdhZZ8HUPxYnaedTqJcFFg4AzUsQklF/fECegTJdZjaj2WoL0/I8K7HMfY/hVuRZUWPNglYi8agJRX6gdkFTCpUNI7stpgKqxtzUJhhw15uG/lKMplwqUr
ingotronic.ch. 300 IN RRSIG DNSKEY 5 2 300 20150125003700 20141226001657 6031 ingotronic.ch. rs1QlP2SlSpA2ELbzwg3DgWLzXWL3Lpv6CUJE2Q0qH2Zp7Qdy3cD+ZEtNh9v24Qv1M6JJ3zFt8mmZoCeW2ycuMbJCqBkW9CBuwF+VznZvZY2MxwPipvhvEEGP//0M8YAZJ66yQPDv3PTdAP8FYbIrJyvY44vwyncwbslpfHT9jAsrbfr3vuMuWps86dnP462q+0s1TxBfqi8mzo3gdavjHKWVNwohLahLKT+tWeu6DSzQv0YwMjwtkLgF7QRgx3ctIIkloOrnx9nHH1N6y+hxEB89fOlyVDjHhgL5uVtsD5fEdT0FJ2Gc/2nShEMMqIwr1/J9kUq1mNySff/uEe65Q==
ingotronic.ch. 300 IN RRSIG DNSKEY 5 2 300 20150125003700 20141226001657 17430 ingotronic.ch. mEwZjhQqeWksWD0TCnNBrtce4YkWJL3edqL6PvAUu8Fn+Ih437kEs3+pqdkgRsdYQ9HW+lBm/8pWwJlNAv0bi9NykItXMwAUFtncgq+6Pnh3iAM972GXSa5VV4LcGQ5b8CBdHCHiEKDqyPv5Hr5QfYL/FQaWlcNRh4QZZlZNPFA=
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 940 bytes
###############################################
testSingleLabelMXBelowSignedForExistingANsec3 0000664 0000000 0000000 00000023646 13020541473 0041134 0 ustar 00root root 0000000 0000000 dnssecjava-1.1.3/src/test/resources/recordings/org_jitsi_dnssec_TestNonExistence #Date: 2015-01-06T22:34:46+01:00
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 20397
;; flags: qr aa rd ra cd ; qd: 1 an: 0 au: 4 ad: 1
;; QUESTIONS:
;; www.nsec3.ingotronic.ch., type = MX, class = IN
;; ANSWERS:
;; AUTHORITY RECORDS:
nsec3.ingotronic.ch. 300 IN SOA ns1.ingotronic.ch. admin.ingotronic.ch. 2013032932 300 60 864000 300
nsec3.ingotronic.ch. 300 IN RRSIG SOA 7 3 300 20150201003516 20150101233516 62417 nsec3.ingotronic.ch. RMXaAZCkydysBpA4+LWD2frs4CZH2FBxafAolq7MOG62Sw3ellwNcSIh2naMasviin2DU2BAzIYyFUqKJDbUqzTxZQjsM6d5LtgFy5iTNmWum6FnFP5Fz73Zs/9Q0LNEstR82MRRL8EDElADhFySAReavyT/vlSTScQGxx6slyQ=
7L2K0NAC88UN3IJV0404HF7PM543BN3F.nsec3.ingotronic.ch. 300 IN NSEC3 1 0 10 1234 810L2KR9HCVTELBLO8GQM0EMIM8KD01E A AAAA RRSIG
7L2K0NAC88UN3IJV0404HF7PM543BN3F.nsec3.ingotronic.ch. 300 IN RRSIG NSEC3 7 4 300 20150125000452 20141225235516 62417 nsec3.ingotronic.ch. hOo4U9QFigY0lLf6UzA/WlwjZsXfs5EZdfiumlAHv2H/I81TiWBtKQhOvMyVUOFq1dMq44JnO2KJEEuPRKKNPiER4a3Y/kzpjscW+yfUWjOzOmZX4d2p9ustljj125/PVUwAOeCP7a8fFZMG/7Xughx49B4WFsDrIUEbMsw3Iqo=
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 537 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 13329
;; flags: qr rd ra ad cd ; qd: 1 an: 4 au: 0 ad: 1
;; QUESTIONS:
;; ., type = DNSKEY, class = IN
;; ANSWERS:
. 87388 IN DNSKEY 256 3 8 AwEAAe3fSrbLBy3LOS7pnxEUhvPZTE2H5dIGsI/UfruI/nOEvWWa/PSX2BFedBkEqOlYdjdNF2f+6lmfk2Od/xu0v5bVqxFE+/24v3hZSlWBxvXzPTAGHrbW/IJYEPqlzVOAS4XdUgHg0N7IbLywNHMvB+Yf+Nm6ctyXXFLV4WTNnzs7
. 87388 IN DNSKEY 256 3 8 AwEAAaPD7Y7XIi1MOEREJNTrRhyqsY3gff6JWzg+XCbqut1sbcbvqyssHw8DT1AkRaAC92pO8xuyq5QEgEPL1IHfABLwpwXI5gTj4gdwi86bpkmlWs9fRpnn4DPDCTdrnxIejJXgClHikLJF3u3CdpNCMijq4CKdQbMlRZ3avv+G7rh7
. 87388 IN DNSKEY 257 3 8 AwEAAagAIKlVZrpC6Ia7gEzahOR+9W29euxhJhVVLOyQbSEW0O8gcCjFFVQUTf6v58fLjwBd0YI0EzrAcQqBGCzh/RStIoO8g0NfnfL2MTJRkxoXbfDaUeVPQuYEhg37NZWAJQ9VnMVDxP/VHL496M/QZxkjf5/Efucp2gaDX6RS6CXpoY68LsvPVjR0ZSwzz1apAzvN9dlzEheX7ICJBBtuA6G3LQpzW5hOA2hzCTMjJPJ8LbqF6dsV6DoBQzgul0sGIcGOYl7OyQdXfZ57relSQageu+ipAdTTJ25AsRTAoub8ONGcLmqrAmRLKBP1dfwhYB4N7knNnulqQxA+Uk1ihz0=
. 87388 IN RRSIG DNSKEY 8 0 172800 20150115235959 20150101000000 19036 . i8cAxD2pvQi1oAyvQxRpDfFlbqPzW+69QQEsDwE1eWOm5AtawO9U7lmsGps7sy/fVNvl1ljKBj4Djp9pb3U2FLogjiIlW0cDAkPmLlG9t+b/pjEfBNlhjANUVN06pvQVAfm+LcF26EaWT6FlISBqb6jSy4BHRa3Bdc4Sx7+pRSYSqVVvYxLkfAWsKPqGkvWhebJDndJJV9syXQXgZ+v/uJ+6XOS43xkAdeL8iBzIs/FlwMTfh3tVe3d0lb65IBBLlCzeQuetX+0Vu1YFcnD0mHc/wS2ZnAV5toAFmyVQBoY/XAZiZeaOkcROJ6Zmqezy7liwK7BqsYyAZntMhk8lbg==
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 883 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 27135
;; flags: qr rd ra ad cd ; qd: 1 an: 2 au: 0 ad: 1
;; QUESTIONS:
;; ch., type = DS, class = IN
;; ANSWERS:
ch. 988 IN DS 46375 8 2 8F96646FC68BB7E4AF4C0750A6096FBC0D4ECDA3D3FA6DA06FDDB42EE50C6CF3
ch. 988 IN RRSIG DS 8 1 86400 20150112170000 20150105160000 16665 . thY7xYWBBxiBjqbQIb9fAG4TmQgnziwM7q6P1T3/ITxmECdvOCQnnZA3uD7qmN8uM0HudsD7+y+zgD3rsH4RSTKdL4kHSI0OnCxToMTvklghEgFDezqIRm8NkWdI2H4Stwrj20nYKSpLQxPI2EE54gs18P3KyO8bAUYv8Qx73xU=
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 238 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 14048
;; flags: qr rd ra ad cd ; qd: 1 an: 4 au: 0 ad: 1
;; QUESTIONS:
;; ch., type = DNSKEY, class = IN
;; ANSWERS:
ch. 989 IN DNSKEY 256 3 8 AwEAAcsg0kY6fw1wzYMhSAKTy+Y2JzAst66P/1odp9NECJJHbU8f4nwziI3onoFSBV0ZiSZhY1aH5dhdDZ7BkrqhVXSrZPAz0CvzjIxmB1gSOf9DeZvjQvoy97HqYolxsf+B3QQv2RKBT67elF5+JisKg3/dQISelKn8LhabSoVrMlD1
ch. 989 IN DNSKEY 257 3 8 AwEAAb7GhhZ8IAy/AhwmSms5DeQK5ad09wIIplEpYoiAIYXPtJvT1ReFzyfTp/2YP+g/PWDwHPh4qKAHa9x0VgbIQcGAeNakmfkAdWEmCnca323/SAml3mwfaX62G7/uYWae5zh8QTxZKNd+K1yZ5x0IxnI31chSl5xymRbTEHYZDKwSIRFM3fTxUMt93WFaBVWELReYotJBr++rvAWdnlay5TPBTvheLBkaiqtgM4GP8HK07Y+86lsZnEsj5K3G1KTV5SPpa82rqYAwxG9VKbmSE/6/kBR5jJHjt1rRt5Oe7v18aEtw0YCEN4vxq+KuvMoNVqXUsE9LBwHJD+QNwi6wmB0=
ch. 989 IN DNSKEY 256 3 8 AwEAAcSLdT0fEmcFmLpeUkAJoeVaHKiu+nbuc43fWlqaCRVf8t2HA4uWxOk0O5ci9nrFTc8nq8oa5fk5Cj7CHh4yrX9qUCfTdIWTyp8BDEdJpS+Dyb0u9wQuVj+nQMj4fLzdQf4TJs3/qxuiLr3nL1UUwlhhXeqSqGVb7p3mtB5HJ8ad
ch. 989 IN RRSIG DNSKEY 8 1 86400 20150127100909 20141212090909 46375 ch. bT8q0FWyeMH0SulNo6UdIIgZYNATwYsee2bikq2Gh339Bufma8eaqWIPYT3XKmxYPBFOw0bVl+kLZxTwbR1CFoCDXoP+qgQhh4mf9qkNiv2CDSc+0FE3FRREn+DAhYTUEuB58FPiPakFB8s8O7T+k2qhDae7jy4/y7Jl1lnjaBY8s7bzOUPhF0KKCNZmvoKwtL23ZdVeTSV1xM3jkiNnpzBKbcoSWECSGJVp1SE0BnRXdwQP41YTXFZ0310YjaTAUCC5qbMIWdEkHjfdSQtKBImnc85mkapq9w++XQ4zhauPWBtrPV3CcoCahjUaWdjrKVkibomlJZaN8MEO23CfQw==
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 893 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 6090
;; flags: qr rd ra cd ; qd: 1 an: 3 au: 0 ad: 1
;; QUESTIONS:
;; ingotronic.ch., type = DS, class = IN
;; ANSWERS:
ingotronic.ch. 3596 IN DS 6031 5 1 733D0218B571CD617B1A7493564B9FC4F12ADE82
ingotronic.ch. 3596 IN DS 6031 5 2 4A948F2FDADA24686E473EDAC00DCF972584C75E3FAA92C2021B6221449FF87E
ingotronic.ch. 3596 IN RRSIG DS 8 2 3600 20150129033614 20150105123019 60789 ch. rVPJP2HhzW7OkroK2axFj5Lb4iVWCH8Fp/Iq1rF952NDo72b8RiKje2RaAKJAGQ+wd0YgE+PAej04GCmkhlDJA/zvPeeTxuhy3HbJzReMlQ7fjyH+wW1hli+FuIYvogXWf7nO/9VyPORt8X/f/pjrOr3Vlj9sGLN8TGYpEuVSw4=
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 288 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 8413
;; flags: qr aa rd ra cd ; qd: 1 an: 4 au: 0 ad: 1
;; QUESTIONS:
;; ingotronic.ch., type = DNSKEY, class = IN
;; ANSWERS:
ingotronic.ch. 300 IN DNSKEY 256 3 5 AwEAAZ2Xh77GFzpEDx7EHYxShqltHgkiG+BOjBGifEmnJhQSdE5/yNSLFNcdhZZ8HUPxYnaedTqJcFFg4AzUsQklF/fECegTJdZjaj2WoL0/I8K7HMfY/hVuRZUWPNglYi8agJRX6gdkFTCpUNI7stpgKqxtzUJhhw15uG/lKMplwqUr
ingotronic.ch. 300 IN DNSKEY 257 3 5 AwEAAeA1vzmjaB+eBAcvhzpKEgAEFpvQ1rg4uKDW6MsQtacKoqBpgyep2+LuWotz5p/xYxj3NGsArwN8Ad5cY0FHRr8miTT0elOv6nvlqGIfRuhj/BXAQ1x4ihpSFslHw0lJMYFwxsUZWpUyjWX/nv1xRZMMwF46gui0N4OEbyTYusCk77D+A71k+K0EAitFIbIH4GCUKmH1H7HmXhSVH9bN/n7KEGwW32lmsuuUcJoRKDkcUvbMXY/9Xoa2quERrUg/rBbDUHowRPjYDS5GzY1+f4YY8s40BufGiqyUTKKXL953MVFK8gmezXA0hbmrnZ7CBOw/7238mORAdzExaX8n7CE=
ingotronic.ch. 300 IN RRSIG DNSKEY 5 2 300 20150125003700 20141226001657 6031 ingotronic.ch. rs1QlP2SlSpA2ELbzwg3DgWLzXWL3Lpv6CUJE2Q0qH2Zp7Qdy3cD+ZEtNh9v24Qv1M6JJ3zFt8mmZoCeW2ycuMbJCqBkW9CBuwF+VznZvZY2MxwPipvhvEEGP//0M8YAZJ66yQPDv3PTdAP8FYbIrJyvY44vwyncwbslpfHT9jAsrbfr3vuMuWps86dnP462q+0s1TxBfqi8mzo3gdavjHKWVNwohLahLKT+tWeu6DSzQv0YwMjwtkLgF7QRgx3ctIIkloOrnx9nHH1N6y+hxEB89fOlyVDjHhgL5uVtsD5fEdT0FJ2Gc/2nShEMMqIwr1/J9kUq1mNySff/uEe65Q==
ingotronic.ch. 300 IN RRSIG DNSKEY 5 2 300 20150125003700 20141226001657 17430 ingotronic.ch. mEwZjhQqeWksWD0TCnNBrtce4YkWJL3edqL6PvAUu8Fn+Ih437kEs3+pqdkgRsdYQ9HW+lBm/8pWwJlNAv0bi9NykItXMwAUFtncgq+6Pnh3iAM972GXSa5VV4LcGQ5b8CBdHCHiEKDqyPv5Hr5QfYL/FQaWlcNRh4QZZlZNPFA=
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 940 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 63148
;; flags: qr aa rd ra cd ; qd: 1 an: 3 au: 0 ad: 1
;; QUESTIONS:
;; nsec3.ingotronic.ch., type = DS, class = IN
;; ANSWERS:
nsec3.ingotronic.ch. 300 IN DS 16758 7 1 1720FF268E09A2CB63805EC8782D10AAD20E12A5
nsec3.ingotronic.ch. 300 IN DS 16758 7 2 3C8DC02750A1636F829B45D6E6D642866768A9CD40A013AD9D25AB63734FFA13
nsec3.ingotronic.ch. 300 IN RRSIG DS 5 3 300 20150125011134 20141226002644 17430 ingotronic.ch. hNurzlGhlyHbSgezPDuhIrtN9ZMsMXZbKGc7HD5rUuM88wD3fM97NxdzF+2Hi1USvBZ5GsQv63L+lAzf+mFPBoPIFHtTiAv8up7kQKRKmi/EzzkCYd/CC4UYdDZbaUyv7esh7spSOGwjPJNdK831p+MgltoWaYtnSGVMgOKk5mc=
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 305 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 46698
;; flags: qr aa rd ra cd ; qd: 1 an: 4 au: 0 ad: 1
;; QUESTIONS:
;; nsec3.ingotronic.ch., type = DNSKEY, class = IN
;; ANSWERS:
nsec3.ingotronic.ch. 300 IN DNSKEY 256 3 7 AwEAAccAWxkTVGZ6UAp0VEozAlYpARhbh6Y6tYOl6Fg3UeBNFFtDQ9fTEEt1NkbnR9u8KkpVN6a67avlYiUN1egDqEwzDU7R1Rw+/USdhm2hqOARmmu3DBgjjX/iXjZLyv310cOGFJZ/smcodlDL4pDAAoPxh/qs6KEBaT0sc1KWcGq3
nsec3.ingotronic.ch. 300 IN DNSKEY 257 3 7 AwEAAaBuJTf9oGyeTH3biUkAFLrsYrkodX1H7Snsui4XsDHFCBvs5XYacHbs0Jg0/O51KPjmNnjwMW8SSyDkKqYQ+9uYAf2EQ/pnD/VGQqnV2cw0Vwk/t0E2V4FUCju4pnAoyzZFZXGs1eWbX9JXu++b0Azp+ACq6485qJLzHhWDiIrPoK/SvdbFVRK4s+nPPJLH3NGBbtdz6kPq7aFWYBMoGeAZdN1wsQpcNWUo5eOmaJY53nMc7+rDpAyYlMe/FKwSZdX2ZDd63Qsa6Im4FVUJq/nWLq7tlQ/mWks15uDTQyJy/OWfA0ICCO4N9Fel9rThJNpJWEzOCblvZyBoy405kZk=
nsec3.ingotronic.ch. 300 IN RRSIG DNSKEY 7 3 300 20150125001457 20141226000444 16758 nsec3.ingotronic.ch. mXi1ylDi8XkRPup+YlT8GPdYE+P7gb6+/VdAwtodI916IzrkGkOHOTLbnrbAqqJOh0HxVCYXdxovmEcbJKUFKwplrQg3XD7/9Sq4pKU1MhMFEGrm/QPkM4u0mgjQwyToDLGuPHuFyur3FSjO/n54uGhAEft9JOFk/WKtWdCnm2LLyQrpC6herA3efFaI8kZhdoEY02AwihWVJxHasmz7lOoKRgNrkfELU+fN4+V7ISsRfJMyZc6q5PuNeG6vFD0uNE8tpdLJCSMurKYVpelvYqzFIcRTYcIjXwmS+L3DGjupqWMzFZVmpQM62JG3KCCD0ffpnNb0nWoSoHwpSeh/3Q==
nsec3.ingotronic.ch. 300 IN RRSIG DNSKEY 7 3 300 20150125001457 20141226000444 62417 nsec3.ingotronic.ch. PyCrf8T5dAfJzapb1p+kcTALPjDuD2niSaXXo0KeHAunT+6gJicLML2S/ZpiYr7X7Ma4Z0TYqE02qH6pcLYNnSgv9BE8sZO0nRtPekSyTy5nLi4hFADYhjb3UjaB85qmQZcqm64vC/CJhWO4t6Eixg/5MYALw+Qdy5Fo0qy/U5E=
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 958 bytes
###############################################
dnssecjava-1.1.3/src/test/resources/recordings/org_jitsi_dnssec_TestPartiallyInvalid/ 0000775 0000000 0000000 00000000000 13020541473 0031273 5 ustar 00root root 0000000 0000000 testValidExising 0000664 0000000 0000000 00000024127 13020541473 0034433 0 ustar 00root root 0000000 0000000 dnssecjava-1.1.3/src/test/resources/recordings/org_jitsi_dnssec_TestPartiallyInvalid #Date: 2015-01-06T22:35:11+01:00
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 16004
;; flags: qr aa rd ra cd ; qd: 1 an: 2 au: 2 ad: 3
;; QUESTIONS:
;; www.partial.ingotronic.ch., type = A, class = IN
;; ANSWERS:
www.partial.ingotronic.ch. 300 IN A 127.0.0.1
www.partial.ingotronic.ch. 300 IN RRSIG A 5 4 300 20150131215743 20150101214134 10287 partial.ingotronic.ch. OYNYXjNIKxup6LLAt9ljYbOHYRlXIUSaYg14UkTpjyQmqRTnlbIz+4S+n8l57liP8YbTY2mnl2x91JpHb4Zr/Ctzw35tVACfosuteELaGEgdcf6xplDVIKQtAQwm1vuZBCYNgGT2Zg3qPypqWndIpZu3bWZZlBaXgyCzyURBdWk=
;; AUTHORITY RECORDS:
partial.ingotronic.ch. 300 IN NS ns1.ingotronic.ch.
partial.ingotronic.ch. 300 IN RRSIG NS 5 3 300 20150131215743 20150101214134 10287 partial.ingotronic.ch. d+G3QpjVut5sxsMrjk+Cvgu06jVN7SCMZnGD3EmcoBKXTK9CUyF0Gmt4oYl1OxEKEUslunt7JOZGqSo078xNr3KzfSis53mrMqbUmc4QEhi+Y6zGjEXAKWLoIn76GO26ee+E/sE1wiy9150hV3Wcbd5Ctrk5sxQzwYJMo4K+ErM=
;; ADDITIONAL RECORDS:
ns1.ingotronic.ch. 300 IN A 62.192.5.131
ns1.ingotronic.ch. 300 IN RRSIG A 5 3 300 20150125005754 20141226001054 17430 ingotronic.ch. fNG1RZM53pXwBxruHNaSZszxVzNLoCq8VZsTjAzYH2vSLzHXYVGJFTLIeY0K9APAdyJU8WuwmABmn7XY0Kg39kRG77uoFlqUws2PdTz2QKOwJGZY7W88Ak2Y9lkDBcK8o3wJHVptrT8R7p/1U7UfjF0kqPUkakk2B0EbFWdagFg=
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 639 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 40355
;; flags: qr rd ra ad cd ; qd: 1 an: 4 au: 0 ad: 1
;; QUESTIONS:
;; ., type = DNSKEY, class = IN
;; ANSWERS:
. 87362 IN DNSKEY 257 3 8 AwEAAagAIKlVZrpC6Ia7gEzahOR+9W29euxhJhVVLOyQbSEW0O8gcCjFFVQUTf6v58fLjwBd0YI0EzrAcQqBGCzh/RStIoO8g0NfnfL2MTJRkxoXbfDaUeVPQuYEhg37NZWAJQ9VnMVDxP/VHL496M/QZxkjf5/Efucp2gaDX6RS6CXpoY68LsvPVjR0ZSwzz1apAzvN9dlzEheX7ICJBBtuA6G3LQpzW5hOA2hzCTMjJPJ8LbqF6dsV6DoBQzgul0sGIcGOYl7OyQdXfZ57relSQageu+ipAdTTJ25AsRTAoub8ONGcLmqrAmRLKBP1dfwhYB4N7knNnulqQxA+Uk1ihz0=
. 87362 IN DNSKEY 256 3 8 AwEAAe3fSrbLBy3LOS7pnxEUhvPZTE2H5dIGsI/UfruI/nOEvWWa/PSX2BFedBkEqOlYdjdNF2f+6lmfk2Od/xu0v5bVqxFE+/24v3hZSlWBxvXzPTAGHrbW/IJYEPqlzVOAS4XdUgHg0N7IbLywNHMvB+Yf+Nm6ctyXXFLV4WTNnzs7
. 87362 IN DNSKEY 256 3 8 AwEAAaPD7Y7XIi1MOEREJNTrRhyqsY3gff6JWzg+XCbqut1sbcbvqyssHw8DT1AkRaAC92pO8xuyq5QEgEPL1IHfABLwpwXI5gTj4gdwi86bpkmlWs9fRpnn4DPDCTdrnxIejJXgClHikLJF3u3CdpNCMijq4CKdQbMlRZ3avv+G7rh7
. 87362 IN RRSIG DNSKEY 8 0 172800 20150115235959 20150101000000 19036 . i8cAxD2pvQi1oAyvQxRpDfFlbqPzW+69QQEsDwE1eWOm5AtawO9U7lmsGps7sy/fVNvl1ljKBj4Djp9pb3U2FLogjiIlW0cDAkPmLlG9t+b/pjEfBNlhjANUVN06pvQVAfm+LcF26EaWT6FlISBqb6jSy4BHRa3Bdc4Sx7+pRSYSqVVvYxLkfAWsKPqGkvWhebJDndJJV9syXQXgZ+v/uJ+6XOS43xkAdeL8iBzIs/FlwMTfh3tVe3d0lb65IBBLlCzeQuetX+0Vu1YFcnD0mHc/wS2ZnAV5toAFmyVQBoY/XAZiZeaOkcROJ6Zmqezy7liwK7BqsYyAZntMhk8lbg==
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 883 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 4739
;; flags: qr rd ra ad cd ; qd: 1 an: 2 au: 0 ad: 1
;; QUESTIONS:
;; ch., type = DS, class = IN
;; ANSWERS:
ch. 962 IN DS 46375 8 2 8F96646FC68BB7E4AF4C0750A6096FBC0D4ECDA3D3FA6DA06FDDB42EE50C6CF3
ch. 962 IN RRSIG DS 8 1 86400 20150112170000 20150105160000 16665 . thY7xYWBBxiBjqbQIb9fAG4TmQgnziwM7q6P1T3/ITxmECdvOCQnnZA3uD7qmN8uM0HudsD7+y+zgD3rsH4RSTKdL4kHSI0OnCxToMTvklghEgFDezqIRm8NkWdI2H4Stwrj20nYKSpLQxPI2EE54gs18P3KyO8bAUYv8Qx73xU=
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 238 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 65018
;; flags: qr rd ra ad cd ; qd: 1 an: 4 au: 0 ad: 1
;; QUESTIONS:
;; ch., type = DNSKEY, class = IN
;; ANSWERS:
ch. 963 IN DNSKEY 257 3 8 AwEAAb7GhhZ8IAy/AhwmSms5DeQK5ad09wIIplEpYoiAIYXPtJvT1ReFzyfTp/2YP+g/PWDwHPh4qKAHa9x0VgbIQcGAeNakmfkAdWEmCnca323/SAml3mwfaX62G7/uYWae5zh8QTxZKNd+K1yZ5x0IxnI31chSl5xymRbTEHYZDKwSIRFM3fTxUMt93WFaBVWELReYotJBr++rvAWdnlay5TPBTvheLBkaiqtgM4GP8HK07Y+86lsZnEsj5K3G1KTV5SPpa82rqYAwxG9VKbmSE/6/kBR5jJHjt1rRt5Oe7v18aEtw0YCEN4vxq+KuvMoNVqXUsE9LBwHJD+QNwi6wmB0=
ch. 963 IN DNSKEY 256 3 8 AwEAAcSLdT0fEmcFmLpeUkAJoeVaHKiu+nbuc43fWlqaCRVf8t2HA4uWxOk0O5ci9nrFTc8nq8oa5fk5Cj7CHh4yrX9qUCfTdIWTyp8BDEdJpS+Dyb0u9wQuVj+nQMj4fLzdQf4TJs3/qxuiLr3nL1UUwlhhXeqSqGVb7p3mtB5HJ8ad
ch. 963 IN DNSKEY 256 3 8 AwEAAcsg0kY6fw1wzYMhSAKTy+Y2JzAst66P/1odp9NECJJHbU8f4nwziI3onoFSBV0ZiSZhY1aH5dhdDZ7BkrqhVXSrZPAz0CvzjIxmB1gSOf9DeZvjQvoy97HqYolxsf+B3QQv2RKBT67elF5+JisKg3/dQISelKn8LhabSoVrMlD1
ch. 963 IN RRSIG DNSKEY 8 1 86400 20150127100909 20141212090909 46375 ch. bT8q0FWyeMH0SulNo6UdIIgZYNATwYsee2bikq2Gh339Bufma8eaqWIPYT3XKmxYPBFOw0bVl+kLZxTwbR1CFoCDXoP+qgQhh4mf9qkNiv2CDSc+0FE3FRREn+DAhYTUEuB58FPiPakFB8s8O7T+k2qhDae7jy4/y7Jl1lnjaBY8s7bzOUPhF0KKCNZmvoKwtL23ZdVeTSV1xM3jkiNnpzBKbcoSWECSGJVp1SE0BnRXdwQP41YTXFZ0310YjaTAUCC5qbMIWdEkHjfdSQtKBImnc85mkapq9w++XQ4zhauPWBtrPV3CcoCahjUaWdjrKVkibomlJZaN8MEO23CfQw==
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 893 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 60585
;; flags: qr rd ra cd ; qd: 1 an: 3 au: 0 ad: 1
;; QUESTIONS:
;; ingotronic.ch., type = DS, class = IN
;; ANSWERS:
ingotronic.ch. 3571 IN DS 6031 5 2 4A948F2FDADA24686E473EDAC00DCF972584C75E3FAA92C2021B6221449FF87E
ingotronic.ch. 3571 IN DS 6031 5 1 733D0218B571CD617B1A7493564B9FC4F12ADE82
ingotronic.ch. 3571 IN RRSIG DS 8 2 3600 20150129033614 20150105123019 60789 ch. rVPJP2HhzW7OkroK2axFj5Lb4iVWCH8Fp/Iq1rF952NDo72b8RiKje2RaAKJAGQ+wd0YgE+PAej04GCmkhlDJA/zvPeeTxuhy3HbJzReMlQ7fjyH+wW1hli+FuIYvogXWf7nO/9VyPORt8X/f/pjrOr3Vlj9sGLN8TGYpEuVSw4=
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 288 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 43956
;; flags: qr aa rd ra cd ; qd: 1 an: 4 au: 0 ad: 1
;; QUESTIONS:
;; ingotronic.ch., type = DNSKEY, class = IN
;; ANSWERS:
ingotronic.ch. 300 IN DNSKEY 257 3 5 AwEAAeA1vzmjaB+eBAcvhzpKEgAEFpvQ1rg4uKDW6MsQtacKoqBpgyep2+LuWotz5p/xYxj3NGsArwN8Ad5cY0FHRr8miTT0elOv6nvlqGIfRuhj/BXAQ1x4ihpSFslHw0lJMYFwxsUZWpUyjWX/nv1xRZMMwF46gui0N4OEbyTYusCk77D+A71k+K0EAitFIbIH4GCUKmH1H7HmXhSVH9bN/n7KEGwW32lmsuuUcJoRKDkcUvbMXY/9Xoa2quERrUg/rBbDUHowRPjYDS5GzY1+f4YY8s40BufGiqyUTKKXL953MVFK8gmezXA0hbmrnZ7CBOw/7238mORAdzExaX8n7CE=
ingotronic.ch. 300 IN DNSKEY 256 3 5 AwEAAZ2Xh77GFzpEDx7EHYxShqltHgkiG+BOjBGifEmnJhQSdE5/yNSLFNcdhZZ8HUPxYnaedTqJcFFg4AzUsQklF/fECegTJdZjaj2WoL0/I8K7HMfY/hVuRZUWPNglYi8agJRX6gdkFTCpUNI7stpgKqxtzUJhhw15uG/lKMplwqUr
ingotronic.ch. 300 IN RRSIG DNSKEY 5 2 300 20150125003700 20141226001657 6031 ingotronic.ch. rs1QlP2SlSpA2ELbzwg3DgWLzXWL3Lpv6CUJE2Q0qH2Zp7Qdy3cD+ZEtNh9v24Qv1M6JJ3zFt8mmZoCeW2ycuMbJCqBkW9CBuwF+VznZvZY2MxwPipvhvEEGP//0M8YAZJ66yQPDv3PTdAP8FYbIrJyvY44vwyncwbslpfHT9jAsrbfr3vuMuWps86dnP462q+0s1TxBfqi8mzo3gdavjHKWVNwohLahLKT+tWeu6DSzQv0YwMjwtkLgF7QRgx3ctIIkloOrnx9nHH1N6y+hxEB89fOlyVDjHhgL5uVtsD5fEdT0FJ2Gc/2nShEMMqIwr1/J9kUq1mNySff/uEe65Q==
ingotronic.ch. 300 IN RRSIG DNSKEY 5 2 300 20150125003700 20141226001657 17430 ingotronic.ch. mEwZjhQqeWksWD0TCnNBrtce4YkWJL3edqL6PvAUu8Fn+Ih437kEs3+pqdkgRsdYQ9HW+lBm/8pWwJlNAv0bi9NykItXMwAUFtncgq+6Pnh3iAM972GXSa5VV4LcGQ5b8CBdHCHiEKDqyPv5Hr5QfYL/FQaWlcNRh4QZZlZNPFA=
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 940 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 28869
;; flags: qr aa rd ra cd ; qd: 1 an: 3 au: 0 ad: 1
;; QUESTIONS:
;; partial.ingotronic.ch., type = DS, class = IN
;; ANSWERS:
partial.ingotronic.ch. 300 IN DS 13138 5 1 8FF29061811A3FADE7757B05CE3AD82B6086D1DD
partial.ingotronic.ch. 300 IN DS 13138 5 2 394763F1A8678BB4F411ECD5D9C49FA071C253C9D834F6160667B853A6B7C4B9
partial.ingotronic.ch. 300 IN RRSIG DS 5 3 300 20150125004144 20141226003211 17430 ingotronic.ch. GMEz0/NesDaxYzP4XHC5owCth8S713p6ltAYBi2azla5dWomDM80ptsptRLL85LP/pRUL/VHrSGLMOKjH2pFDzZzFfFoBSMK2LFol/E+hBg7gMEovDkaORsqfoVslloq6v+D/o3i2Qxs2GNRSiXjx7ghCYP8kN0qLCWDAcejHgw=
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 307 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 27071
;; flags: qr aa rd ra cd ; qd: 1 an: 4 au: 0 ad: 1
;; QUESTIONS:
;; partial.ingotronic.ch., type = DNSKEY, class = IN
;; ANSWERS:
partial.ingotronic.ch. 300 IN DNSKEY 256 3 5 AwEAAZpJkpX2HWKaFlYyWe6ZFKl0EJ1SKDcOJpa2KpxY7LXNHgh2M48YGvns4rVWfwcdxlYBC8I0g9sp6+I3leShroDO+khZg7j3sCsljmxPynWQ2MT6vDexl1a85MDj7U27s16EhGbjfDyHZkLR/0VT17Vaw+cQu5gPtSN767suaRR3
partial.ingotronic.ch. 300 IN DNSKEY 257 3 5 AwEAAdFaXI5Oh7YBgtdA3Lt1q3wvDAwTs/dqhZEWrRyFtudddJAof4IJa4lmheaUzxaDDtrRB9D5UGuhA9SQTxJTJWogsN5KJH0dBr/8MiL/H6CZHGXGzs1nCDiiyzq/AL/dyYJrRD+AOHqzXmuW7wjjvaWgGRDTYJ2pvCujpv/UPJ6Z1yo1Xz/zLhRgsv7SDjDapfh93ZuzH8tFei8Z06jm+j2Wt/Izj9P0chRwUOP2pjgD9fNVv9yNh2ktEGwnKR/N/tqmI6xyNed2x5Xupw/flckUTisx4O/JcfcjutczA8p5Bwl1+atwfZX3Fc6fkPJNeY7DS/6/bK+YNDngXAD0oP8=
partial.ingotronic.ch. 300 IN RRSIG DNSKEY 5 3 300 20150131221503 20150101221029 10287 partial.ingotronic.ch. ErXJpzUqhyN/3lF6d+cQ9d4wXQ7iD10483V4dbuoli5mZjZWdODzxrOIdrD+s5JUGw0ZDlpuVobDGzah9aPKZzrsZkdn2+D1AmOd0g0yybrkq+aDVf5u9HfLzcjwta9ZZILaZh1fy8lMue+saVrQ6ApVqwX95IDtqmhZ99mUEa0=
partial.ingotronic.ch. 300 IN RRSIG DNSKEY 5 3 300 20150131221503 20150101221029 13138 partial.ingotronic.ch. qgUereTamIG/Wy59QOglwGVSPwGtaR8zbdFpgGtyvLo1AgxqWp0ndkhaMfUp/PtRHe/4YlpCD3UYqC0xd06znt6gKUDygZEz6uxF9r1jXaj8kVXPkubMm0BB/BY1rxMV0LvtN3CcAlA1Ma6aaszSG8QczWSIOOpgKyRmg+OqV9eT157+YBlkB4tdBYitxApZfMbvUdMBtoS5bGHiUkjfIvim1OWq4rDq48rflI9A6u+39ahp1th5UvTyA5N5xoyWinheK6QJsXL6mSfchukg7JylebvuVTkvuM7/mgFLIFrow2vYWFL4NTjbu0EhJVedTEp9ENBMpGtxeFwyQ/P0oQ==
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 964 bytes
###############################################
testValidExisingNoType 0000664 0000000 0000000 00000023574 13020541473 0035577 0 ustar 00root root 0000000 0000000 dnssecjava-1.1.3/src/test/resources/recordings/org_jitsi_dnssec_TestPartiallyInvalid #Date: 2015-01-06T22:35:11+01:00
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 5930
;; flags: qr aa rd ra cd ; qd: 1 an: 0 au: 4 ad: 1
;; QUESTIONS:
;; www.partial.ingotronic.ch., type = MX, class = IN
;; ANSWERS:
;; AUTHORITY RECORDS:
partial.ingotronic.ch. 300 IN SOA ns1.ingotronic.ch. admin.ingotronic.ch. 2013032732 300 60 864000 300
partial.ingotronic.ch. 300 IN RRSIG SOA 5 3 300 20150131234913 20150101224913 10287 partial.ingotronic.ch. j9iaBtgpVcN1UdJRxfBoPmITC25ul+di6s0SZrDz/+tKZtJa2Pt5OEMuZwyPyoTXLxOw95/fsRBBEe7ltdU832BQbc7bc26y6lJRB8xYwtyr4ponxairB2qafUtJge50Euik5B5hvPEtJ0Uaqah9Tgd6jIk3FOZjr+eOS+3/Uus=
www.partial.ingotronic.ch. 300 IN NSEC partial.ingotronic.ch. A AAAA RRSIG NSEC
www.partial.ingotronic.ch. 300 IN RRSIG NSEC 5 4 300 20150131215743 20150101214134 10287 partial.ingotronic.ch. eNizfw2eY5+3HBTqj3MHCS4N9oHo+wILp/SjEY2YVOvgWb9TafylcSQzcKV493wr/OLQYChAZylaXUwZEfKVXI5CM9kpksSOj4QqwP2IOiVBaYYCbycLhWOwZEADpDO9L1bQbpM1IW0EGrtOhwnAc1t9FX+3ihgq5R02OHMXXnk=
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 505 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 45090
;; flags: qr rd ra ad cd ; qd: 1 an: 4 au: 0 ad: 1
;; QUESTIONS:
;; ., type = DNSKEY, class = IN
;; ANSWERS:
. 87362 IN DNSKEY 256 3 8 AwEAAaPD7Y7XIi1MOEREJNTrRhyqsY3gff6JWzg+XCbqut1sbcbvqyssHw8DT1AkRaAC92pO8xuyq5QEgEPL1IHfABLwpwXI5gTj4gdwi86bpkmlWs9fRpnn4DPDCTdrnxIejJXgClHikLJF3u3CdpNCMijq4CKdQbMlRZ3avv+G7rh7
. 87362 IN DNSKEY 257 3 8 AwEAAagAIKlVZrpC6Ia7gEzahOR+9W29euxhJhVVLOyQbSEW0O8gcCjFFVQUTf6v58fLjwBd0YI0EzrAcQqBGCzh/RStIoO8g0NfnfL2MTJRkxoXbfDaUeVPQuYEhg37NZWAJQ9VnMVDxP/VHL496M/QZxkjf5/Efucp2gaDX6RS6CXpoY68LsvPVjR0ZSwzz1apAzvN9dlzEheX7ICJBBtuA6G3LQpzW5hOA2hzCTMjJPJ8LbqF6dsV6DoBQzgul0sGIcGOYl7OyQdXfZ57relSQageu+ipAdTTJ25AsRTAoub8ONGcLmqrAmRLKBP1dfwhYB4N7knNnulqQxA+Uk1ihz0=
. 87362 IN DNSKEY 256 3 8 AwEAAe3fSrbLBy3LOS7pnxEUhvPZTE2H5dIGsI/UfruI/nOEvWWa/PSX2BFedBkEqOlYdjdNF2f+6lmfk2Od/xu0v5bVqxFE+/24v3hZSlWBxvXzPTAGHrbW/IJYEPqlzVOAS4XdUgHg0N7IbLywNHMvB+Yf+Nm6ctyXXFLV4WTNnzs7
. 87362 IN RRSIG DNSKEY 8 0 172800 20150115235959 20150101000000 19036 . i8cAxD2pvQi1oAyvQxRpDfFlbqPzW+69QQEsDwE1eWOm5AtawO9U7lmsGps7sy/fVNvl1ljKBj4Djp9pb3U2FLogjiIlW0cDAkPmLlG9t+b/pjEfBNlhjANUVN06pvQVAfm+LcF26EaWT6FlISBqb6jSy4BHRa3Bdc4Sx7+pRSYSqVVvYxLkfAWsKPqGkvWhebJDndJJV9syXQXgZ+v/uJ+6XOS43xkAdeL8iBzIs/FlwMTfh3tVe3d0lb65IBBLlCzeQuetX+0Vu1YFcnD0mHc/wS2ZnAV5toAFmyVQBoY/XAZiZeaOkcROJ6Zmqezy7liwK7BqsYyAZntMhk8lbg==
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 883 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 9660
;; flags: qr rd ra ad cd ; qd: 1 an: 2 au: 0 ad: 1
;; QUESTIONS:
;; ch., type = DS, class = IN
;; ANSWERS:
ch. 962 IN DS 46375 8 2 8F96646FC68BB7E4AF4C0750A6096FBC0D4ECDA3D3FA6DA06FDDB42EE50C6CF3
ch. 962 IN RRSIG DS 8 1 86400 20150112170000 20150105160000 16665 . thY7xYWBBxiBjqbQIb9fAG4TmQgnziwM7q6P1T3/ITxmECdvOCQnnZA3uD7qmN8uM0HudsD7+y+zgD3rsH4RSTKdL4kHSI0OnCxToMTvklghEgFDezqIRm8NkWdI2H4Stwrj20nYKSpLQxPI2EE54gs18P3KyO8bAUYv8Qx73xU=
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 238 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 59668
;; flags: qr rd ra ad cd ; qd: 1 an: 4 au: 0 ad: 1
;; QUESTIONS:
;; ch., type = DNSKEY, class = IN
;; ANSWERS:
ch. 963 IN DNSKEY 256 3 8 AwEAAcsg0kY6fw1wzYMhSAKTy+Y2JzAst66P/1odp9NECJJHbU8f4nwziI3onoFSBV0ZiSZhY1aH5dhdDZ7BkrqhVXSrZPAz0CvzjIxmB1gSOf9DeZvjQvoy97HqYolxsf+B3QQv2RKBT67elF5+JisKg3/dQISelKn8LhabSoVrMlD1
ch. 963 IN DNSKEY 257 3 8 AwEAAb7GhhZ8IAy/AhwmSms5DeQK5ad09wIIplEpYoiAIYXPtJvT1ReFzyfTp/2YP+g/PWDwHPh4qKAHa9x0VgbIQcGAeNakmfkAdWEmCnca323/SAml3mwfaX62G7/uYWae5zh8QTxZKNd+K1yZ5x0IxnI31chSl5xymRbTEHYZDKwSIRFM3fTxUMt93WFaBVWELReYotJBr++rvAWdnlay5TPBTvheLBkaiqtgM4GP8HK07Y+86lsZnEsj5K3G1KTV5SPpa82rqYAwxG9VKbmSE/6/kBR5jJHjt1rRt5Oe7v18aEtw0YCEN4vxq+KuvMoNVqXUsE9LBwHJD+QNwi6wmB0=
ch. 963 IN DNSKEY 256 3 8 AwEAAcSLdT0fEmcFmLpeUkAJoeVaHKiu+nbuc43fWlqaCRVf8t2HA4uWxOk0O5ci9nrFTc8nq8oa5fk5Cj7CHh4yrX9qUCfTdIWTyp8BDEdJpS+Dyb0u9wQuVj+nQMj4fLzdQf4TJs3/qxuiLr3nL1UUwlhhXeqSqGVb7p3mtB5HJ8ad
ch. 963 IN RRSIG DNSKEY 8 1 86400 20150127100909 20141212090909 46375 ch. bT8q0FWyeMH0SulNo6UdIIgZYNATwYsee2bikq2Gh339Bufma8eaqWIPYT3XKmxYPBFOw0bVl+kLZxTwbR1CFoCDXoP+qgQhh4mf9qkNiv2CDSc+0FE3FRREn+DAhYTUEuB58FPiPakFB8s8O7T+k2qhDae7jy4/y7Jl1lnjaBY8s7bzOUPhF0KKCNZmvoKwtL23ZdVeTSV1xM3jkiNnpzBKbcoSWECSGJVp1SE0BnRXdwQP41YTXFZ0310YjaTAUCC5qbMIWdEkHjfdSQtKBImnc85mkapq9w++XQ4zhauPWBtrPV3CcoCahjUaWdjrKVkibomlJZaN8MEO23CfQw==
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 893 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 1543
;; flags: qr rd ra cd ; qd: 1 an: 3 au: 0 ad: 1
;; QUESTIONS:
;; ingotronic.ch., type = DS, class = IN
;; ANSWERS:
ingotronic.ch. 3571 IN DS 6031 5 2 4A948F2FDADA24686E473EDAC00DCF972584C75E3FAA92C2021B6221449FF87E
ingotronic.ch. 3571 IN DS 6031 5 1 733D0218B571CD617B1A7493564B9FC4F12ADE82
ingotronic.ch. 3571 IN RRSIG DS 8 2 3600 20150129033614 20150105123019 60789 ch. rVPJP2HhzW7OkroK2axFj5Lb4iVWCH8Fp/Iq1rF952NDo72b8RiKje2RaAKJAGQ+wd0YgE+PAej04GCmkhlDJA/zvPeeTxuhy3HbJzReMlQ7fjyH+wW1hli+FuIYvogXWf7nO/9VyPORt8X/f/pjrOr3Vlj9sGLN8TGYpEuVSw4=
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 288 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 17828
;; flags: qr aa rd ra cd ; qd: 1 an: 4 au: 0 ad: 1
;; QUESTIONS:
;; ingotronic.ch., type = DNSKEY, class = IN
;; ANSWERS:
ingotronic.ch. 300 IN DNSKEY 256 3 5 AwEAAZ2Xh77GFzpEDx7EHYxShqltHgkiG+BOjBGifEmnJhQSdE5/yNSLFNcdhZZ8HUPxYnaedTqJcFFg4AzUsQklF/fECegTJdZjaj2WoL0/I8K7HMfY/hVuRZUWPNglYi8agJRX6gdkFTCpUNI7stpgKqxtzUJhhw15uG/lKMplwqUr
ingotronic.ch. 300 IN DNSKEY 257 3 5 AwEAAeA1vzmjaB+eBAcvhzpKEgAEFpvQ1rg4uKDW6MsQtacKoqBpgyep2+LuWotz5p/xYxj3NGsArwN8Ad5cY0FHRr8miTT0elOv6nvlqGIfRuhj/BXAQ1x4ihpSFslHw0lJMYFwxsUZWpUyjWX/nv1xRZMMwF46gui0N4OEbyTYusCk77D+A71k+K0EAitFIbIH4GCUKmH1H7HmXhSVH9bN/n7KEGwW32lmsuuUcJoRKDkcUvbMXY/9Xoa2quERrUg/rBbDUHowRPjYDS5GzY1+f4YY8s40BufGiqyUTKKXL953MVFK8gmezXA0hbmrnZ7CBOw/7238mORAdzExaX8n7CE=
ingotronic.ch. 300 IN RRSIG DNSKEY 5 2 300 20150125003700 20141226001657 6031 ingotronic.ch. rs1QlP2SlSpA2ELbzwg3DgWLzXWL3Lpv6CUJE2Q0qH2Zp7Qdy3cD+ZEtNh9v24Qv1M6JJ3zFt8mmZoCeW2ycuMbJCqBkW9CBuwF+VznZvZY2MxwPipvhvEEGP//0M8YAZJ66yQPDv3PTdAP8FYbIrJyvY44vwyncwbslpfHT9jAsrbfr3vuMuWps86dnP462q+0s1TxBfqi8mzo3gdavjHKWVNwohLahLKT+tWeu6DSzQv0YwMjwtkLgF7QRgx3ctIIkloOrnx9nHH1N6y+hxEB89fOlyVDjHhgL5uVtsD5fEdT0FJ2Gc/2nShEMMqIwr1/J9kUq1mNySff/uEe65Q==
ingotronic.ch. 300 IN RRSIG DNSKEY 5 2 300 20150125003700 20141226001657 17430 ingotronic.ch. mEwZjhQqeWksWD0TCnNBrtce4YkWJL3edqL6PvAUu8Fn+Ih437kEs3+pqdkgRsdYQ9HW+lBm/8pWwJlNAv0bi9NykItXMwAUFtncgq+6Pnh3iAM972GXSa5VV4LcGQ5b8CBdHCHiEKDqyPv5Hr5QfYL/FQaWlcNRh4QZZlZNPFA=
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 940 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 22934
;; flags: qr aa rd ra cd ; qd: 1 an: 3 au: 0 ad: 1
;; QUESTIONS:
;; partial.ingotronic.ch., type = DS, class = IN
;; ANSWERS:
partial.ingotronic.ch. 300 IN DS 13138 5 1 8FF29061811A3FADE7757B05CE3AD82B6086D1DD
partial.ingotronic.ch. 300 IN DS 13138 5 2 394763F1A8678BB4F411ECD5D9C49FA071C253C9D834F6160667B853A6B7C4B9
partial.ingotronic.ch. 300 IN RRSIG DS 5 3 300 20150125004144 20141226003211 17430 ingotronic.ch. GMEz0/NesDaxYzP4XHC5owCth8S713p6ltAYBi2azla5dWomDM80ptsptRLL85LP/pRUL/VHrSGLMOKjH2pFDzZzFfFoBSMK2LFol/E+hBg7gMEovDkaORsqfoVslloq6v+D/o3i2Qxs2GNRSiXjx7ghCYP8kN0qLCWDAcejHgw=
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 307 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 16901
;; flags: qr aa rd ra cd ; qd: 1 an: 4 au: 0 ad: 1
;; QUESTIONS:
;; partial.ingotronic.ch., type = DNSKEY, class = IN
;; ANSWERS:
partial.ingotronic.ch. 300 IN DNSKEY 256 3 5 AwEAAZpJkpX2HWKaFlYyWe6ZFKl0EJ1SKDcOJpa2KpxY7LXNHgh2M48YGvns4rVWfwcdxlYBC8I0g9sp6+I3leShroDO+khZg7j3sCsljmxPynWQ2MT6vDexl1a85MDj7U27s16EhGbjfDyHZkLR/0VT17Vaw+cQu5gPtSN767suaRR3
partial.ingotronic.ch. 300 IN DNSKEY 257 3 5 AwEAAdFaXI5Oh7YBgtdA3Lt1q3wvDAwTs/dqhZEWrRyFtudddJAof4IJa4lmheaUzxaDDtrRB9D5UGuhA9SQTxJTJWogsN5KJH0dBr/8MiL/H6CZHGXGzs1nCDiiyzq/AL/dyYJrRD+AOHqzXmuW7wjjvaWgGRDTYJ2pvCujpv/UPJ6Z1yo1Xz/zLhRgsv7SDjDapfh93ZuzH8tFei8Z06jm+j2Wt/Izj9P0chRwUOP2pjgD9fNVv9yNh2ktEGwnKR/N/tqmI6xyNed2x5Xupw/flckUTisx4O/JcfcjutczA8p5Bwl1+atwfZX3Fc6fkPJNeY7DS/6/bK+YNDngXAD0oP8=
partial.ingotronic.ch. 300 IN RRSIG DNSKEY 5 3 300 20150131221503 20150101221029 10287 partial.ingotronic.ch. ErXJpzUqhyN/3lF6d+cQ9d4wXQ7iD10483V4dbuoli5mZjZWdODzxrOIdrD+s5JUGw0ZDlpuVobDGzah9aPKZzrsZkdn2+D1AmOd0g0yybrkq+aDVf5u9HfLzcjwta9ZZILaZh1fy8lMue+saVrQ6ApVqwX95IDtqmhZ99mUEa0=
partial.ingotronic.ch. 300 IN RRSIG DNSKEY 5 3 300 20150131221503 20150101221029 13138 partial.ingotronic.ch. qgUereTamIG/Wy59QOglwGVSPwGtaR8zbdFpgGtyvLo1AgxqWp0ndkhaMfUp/PtRHe/4YlpCD3UYqC0xd06znt6gKUDygZEz6uxF9r1jXaj8kVXPkubMm0BB/BY1rxMV0LvtN3CcAlA1Ma6aaszSG8QczWSIOOpgKyRmg+OqV9eT157+YBlkB4tdBYitxApZfMbvUdMBtoS5bGHiUkjfIvim1OWq4rDq48rflI9A6u+39ahp1th5UvTyA5N5xoyWinheK6QJsXL6mSfchukg7JylebvuVTkvuM7/mgFLIFrow2vYWFL4NTjbu0EhJVedTEp9ENBMpGtxeFwyQ/P0oQ==
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 964 bytes
###############################################
testValidNonExising 0000664 0000000 0000000 00000024373 13020541473 0035111 0 ustar 00root root 0000000 0000000 dnssecjava-1.1.3/src/test/resources/recordings/org_jitsi_dnssec_TestPartiallyInvalid #Date: 2015-01-06T22:35:12+01:00
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 33483
;; flags: qr aa rd ra cd ; qd: 1 an: 0 au: 6 ad: 1
;; QUESTIONS:
;; www.gibtsnicht.partial.ingotronic.ch., type = A, class = IN
;; ANSWERS:
;; AUTHORITY RECORDS:
partial.ingotronic.ch. 300 IN SOA ns1.ingotronic.ch. admin.ingotronic.ch. 2013032732 300 60 864000 300
partial.ingotronic.ch. 300 IN RRSIG SOA 5 3 300 20150131234913 20150101224913 10287 partial.ingotronic.ch. j9iaBtgpVcN1UdJRxfBoPmITC25ul+di6s0SZrDz/+tKZtJa2Pt5OEMuZwyPyoTXLxOw95/fsRBBEe7ltdU832BQbc7bc26y6lJRB8xYwtyr4ponxairB2qafUtJge50Euik5B5hvPEtJ0Uaqah9Tgd6jIk3FOZjr+eOS+3/Uus=
partial.ingotronic.ch. 300 IN NSEC a.b.partial.ingotronic.ch. A NS SOA RRSIG NSEC DNSKEY
partial.ingotronic.ch. 300 IN RRSIG NSEC 5 3 300 20150114201832 20141215193100 10287 partial.ingotronic.ch. lPXkSiRb1MAI4Vvl7B21CPy5VLsoBwsNA5n6daRwUxXgMcQTgoeQF+/pU7ljIRr/8Ha3jIDBPIDMnH3t/UL2+9fTe0kch9EjeWTy4eTGJAwNZri6IwEnpAecFtWllSJKcFq6oYv7BK6hFfnDeRr95LOtFSqhdTXydPC+MtmN3YM=
a.d.partial.ingotronic.ch. 300 IN NSEC www.partial.ingotronic.ch. A RRSIG NSEC
a.d.partial.ingotronic.ch. 300 IN RRSIG NSEC 5 5 300 20150131215743 20150101214134 10287 partial.ingotronic.ch. JLvNDN5napvCnhCvMYMA4bB/q/odOgHEUR1YDMvYGJDhjToN+ciwjuiiXYcSqHmF7fRQxi6c04eoq0sCgC+cM1Gpnw/JJPzOO6WoT3+gf3XGmdIg7n0Kp9W0/GIwkWp1h6/f3JDig/XY/1bJL9307VyWsc/Bq25O1u8h0gosTUw=
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 753 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 38613
;; flags: qr rd ra ad cd ; qd: 1 an: 4 au: 0 ad: 1
;; QUESTIONS:
;; ., type = DNSKEY, class = IN
;; ANSWERS:
. 87362 IN DNSKEY 257 3 8 AwEAAagAIKlVZrpC6Ia7gEzahOR+9W29euxhJhVVLOyQbSEW0O8gcCjFFVQUTf6v58fLjwBd0YI0EzrAcQqBGCzh/RStIoO8g0NfnfL2MTJRkxoXbfDaUeVPQuYEhg37NZWAJQ9VnMVDxP/VHL496M/QZxkjf5/Efucp2gaDX6RS6CXpoY68LsvPVjR0ZSwzz1apAzvN9dlzEheX7ICJBBtuA6G3LQpzW5hOA2hzCTMjJPJ8LbqF6dsV6DoBQzgul0sGIcGOYl7OyQdXfZ57relSQageu+ipAdTTJ25AsRTAoub8ONGcLmqrAmRLKBP1dfwhYB4N7knNnulqQxA+Uk1ihz0=
. 87362 IN DNSKEY 256 3 8 AwEAAaPD7Y7XIi1MOEREJNTrRhyqsY3gff6JWzg+XCbqut1sbcbvqyssHw8DT1AkRaAC92pO8xuyq5QEgEPL1IHfABLwpwXI5gTj4gdwi86bpkmlWs9fRpnn4DPDCTdrnxIejJXgClHikLJF3u3CdpNCMijq4CKdQbMlRZ3avv+G7rh7
. 87362 IN DNSKEY 256 3 8 AwEAAe3fSrbLBy3LOS7pnxEUhvPZTE2H5dIGsI/UfruI/nOEvWWa/PSX2BFedBkEqOlYdjdNF2f+6lmfk2Od/xu0v5bVqxFE+/24v3hZSlWBxvXzPTAGHrbW/IJYEPqlzVOAS4XdUgHg0N7IbLywNHMvB+Yf+Nm6ctyXXFLV4WTNnzs7
. 87362 IN RRSIG DNSKEY 8 0 172800 20150115235959 20150101000000 19036 . i8cAxD2pvQi1oAyvQxRpDfFlbqPzW+69QQEsDwE1eWOm5AtawO9U7lmsGps7sy/fVNvl1ljKBj4Djp9pb3U2FLogjiIlW0cDAkPmLlG9t+b/pjEfBNlhjANUVN06pvQVAfm+LcF26EaWT6FlISBqb6jSy4BHRa3Bdc4Sx7+pRSYSqVVvYxLkfAWsKPqGkvWhebJDndJJV9syXQXgZ+v/uJ+6XOS43xkAdeL8iBzIs/FlwMTfh3tVe3d0lb65IBBLlCzeQuetX+0Vu1YFcnD0mHc/wS2ZnAV5toAFmyVQBoY/XAZiZeaOkcROJ6Zmqezy7liwK7BqsYyAZntMhk8lbg==
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 883 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 30892
;; flags: qr rd ra ad cd ; qd: 1 an: 2 au: 0 ad: 1
;; QUESTIONS:
;; ch., type = DS, class = IN
;; ANSWERS:
ch. 962 IN DS 46375 8 2 8F96646FC68BB7E4AF4C0750A6096FBC0D4ECDA3D3FA6DA06FDDB42EE50C6CF3
ch. 962 IN RRSIG DS 8 1 86400 20150112170000 20150105160000 16665 . thY7xYWBBxiBjqbQIb9fAG4TmQgnziwM7q6P1T3/ITxmECdvOCQnnZA3uD7qmN8uM0HudsD7+y+zgD3rsH4RSTKdL4kHSI0OnCxToMTvklghEgFDezqIRm8NkWdI2H4Stwrj20nYKSpLQxPI2EE54gs18P3KyO8bAUYv8Qx73xU=
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 238 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 50832
;; flags: qr rd ra ad cd ; qd: 1 an: 4 au: 0 ad: 1
;; QUESTIONS:
;; ch., type = DNSKEY, class = IN
;; ANSWERS:
ch. 963 IN DNSKEY 256 3 8 AwEAAcsg0kY6fw1wzYMhSAKTy+Y2JzAst66P/1odp9NECJJHbU8f4nwziI3onoFSBV0ZiSZhY1aH5dhdDZ7BkrqhVXSrZPAz0CvzjIxmB1gSOf9DeZvjQvoy97HqYolxsf+B3QQv2RKBT67elF5+JisKg3/dQISelKn8LhabSoVrMlD1
ch. 963 IN DNSKEY 256 3 8 AwEAAcSLdT0fEmcFmLpeUkAJoeVaHKiu+nbuc43fWlqaCRVf8t2HA4uWxOk0O5ci9nrFTc8nq8oa5fk5Cj7CHh4yrX9qUCfTdIWTyp8BDEdJpS+Dyb0u9wQuVj+nQMj4fLzdQf4TJs3/qxuiLr3nL1UUwlhhXeqSqGVb7p3mtB5HJ8ad
ch. 963 IN DNSKEY 257 3 8 AwEAAb7GhhZ8IAy/AhwmSms5DeQK5ad09wIIplEpYoiAIYXPtJvT1ReFzyfTp/2YP+g/PWDwHPh4qKAHa9x0VgbIQcGAeNakmfkAdWEmCnca323/SAml3mwfaX62G7/uYWae5zh8QTxZKNd+K1yZ5x0IxnI31chSl5xymRbTEHYZDKwSIRFM3fTxUMt93WFaBVWELReYotJBr++rvAWdnlay5TPBTvheLBkaiqtgM4GP8HK07Y+86lsZnEsj5K3G1KTV5SPpa82rqYAwxG9VKbmSE/6/kBR5jJHjt1rRt5Oe7v18aEtw0YCEN4vxq+KuvMoNVqXUsE9LBwHJD+QNwi6wmB0=
ch. 963 IN RRSIG DNSKEY 8 1 86400 20150127100909 20141212090909 46375 ch. bT8q0FWyeMH0SulNo6UdIIgZYNATwYsee2bikq2Gh339Bufma8eaqWIPYT3XKmxYPBFOw0bVl+kLZxTwbR1CFoCDXoP+qgQhh4mf9qkNiv2CDSc+0FE3FRREn+DAhYTUEuB58FPiPakFB8s8O7T+k2qhDae7jy4/y7Jl1lnjaBY8s7bzOUPhF0KKCNZmvoKwtL23ZdVeTSV1xM3jkiNnpzBKbcoSWECSGJVp1SE0BnRXdwQP41YTXFZ0310YjaTAUCC5qbMIWdEkHjfdSQtKBImnc85mkapq9w++XQ4zhauPWBtrPV3CcoCahjUaWdjrKVkibomlJZaN8MEO23CfQw==
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 893 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 57379
;; flags: qr rd ra cd ; qd: 1 an: 3 au: 0 ad: 1
;; QUESTIONS:
;; ingotronic.ch., type = DS, class = IN
;; ANSWERS:
ingotronic.ch. 3571 IN DS 6031 5 1 733D0218B571CD617B1A7493564B9FC4F12ADE82
ingotronic.ch. 3571 IN DS 6031 5 2 4A948F2FDADA24686E473EDAC00DCF972584C75E3FAA92C2021B6221449FF87E
ingotronic.ch. 3571 IN RRSIG DS 8 2 3600 20150129033614 20150105123019 60789 ch. rVPJP2HhzW7OkroK2axFj5Lb4iVWCH8Fp/Iq1rF952NDo72b8RiKje2RaAKJAGQ+wd0YgE+PAej04GCmkhlDJA/zvPeeTxuhy3HbJzReMlQ7fjyH+wW1hli+FuIYvogXWf7nO/9VyPORt8X/f/pjrOr3Vlj9sGLN8TGYpEuVSw4=
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 288 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 44173
;; flags: qr aa rd ra cd ; qd: 1 an: 4 au: 0 ad: 1
;; QUESTIONS:
;; ingotronic.ch., type = DNSKEY, class = IN
;; ANSWERS:
ingotronic.ch. 300 IN DNSKEY 256 3 5 AwEAAZ2Xh77GFzpEDx7EHYxShqltHgkiG+BOjBGifEmnJhQSdE5/yNSLFNcdhZZ8HUPxYnaedTqJcFFg4AzUsQklF/fECegTJdZjaj2WoL0/I8K7HMfY/hVuRZUWPNglYi8agJRX6gdkFTCpUNI7stpgKqxtzUJhhw15uG/lKMplwqUr
ingotronic.ch. 300 IN DNSKEY 257 3 5 AwEAAeA1vzmjaB+eBAcvhzpKEgAEFpvQ1rg4uKDW6MsQtacKoqBpgyep2+LuWotz5p/xYxj3NGsArwN8Ad5cY0FHRr8miTT0elOv6nvlqGIfRuhj/BXAQ1x4ihpSFslHw0lJMYFwxsUZWpUyjWX/nv1xRZMMwF46gui0N4OEbyTYusCk77D+A71k+K0EAitFIbIH4GCUKmH1H7HmXhSVH9bN/n7KEGwW32lmsuuUcJoRKDkcUvbMXY/9Xoa2quERrUg/rBbDUHowRPjYDS5GzY1+f4YY8s40BufGiqyUTKKXL953MVFK8gmezXA0hbmrnZ7CBOw/7238mORAdzExaX8n7CE=
ingotronic.ch. 300 IN RRSIG DNSKEY 5 2 300 20150125003700 20141226001657 6031 ingotronic.ch. rs1QlP2SlSpA2ELbzwg3DgWLzXWL3Lpv6CUJE2Q0qH2Zp7Qdy3cD+ZEtNh9v24Qv1M6JJ3zFt8mmZoCeW2ycuMbJCqBkW9CBuwF+VznZvZY2MxwPipvhvEEGP//0M8YAZJ66yQPDv3PTdAP8FYbIrJyvY44vwyncwbslpfHT9jAsrbfr3vuMuWps86dnP462q+0s1TxBfqi8mzo3gdavjHKWVNwohLahLKT+tWeu6DSzQv0YwMjwtkLgF7QRgx3ctIIkloOrnx9nHH1N6y+hxEB89fOlyVDjHhgL5uVtsD5fEdT0FJ2Gc/2nShEMMqIwr1/J9kUq1mNySff/uEe65Q==
ingotronic.ch. 300 IN RRSIG DNSKEY 5 2 300 20150125003700 20141226001657 17430 ingotronic.ch. mEwZjhQqeWksWD0TCnNBrtce4YkWJL3edqL6PvAUu8Fn+Ih437kEs3+pqdkgRsdYQ9HW+lBm/8pWwJlNAv0bi9NykItXMwAUFtncgq+6Pnh3iAM972GXSa5VV4LcGQ5b8CBdHCHiEKDqyPv5Hr5QfYL/FQaWlcNRh4QZZlZNPFA=
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 940 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 46232
;; flags: qr aa rd ra cd ; qd: 1 an: 3 au: 0 ad: 1
;; QUESTIONS:
;; partial.ingotronic.ch., type = DS, class = IN
;; ANSWERS:
partial.ingotronic.ch. 300 IN DS 13138 5 2 394763F1A8678BB4F411ECD5D9C49FA071C253C9D834F6160667B853A6B7C4B9
partial.ingotronic.ch. 300 IN DS 13138 5 1 8FF29061811A3FADE7757B05CE3AD82B6086D1DD
partial.ingotronic.ch. 300 IN RRSIG DS 5 3 300 20150125004144 20141226003211 17430 ingotronic.ch. GMEz0/NesDaxYzP4XHC5owCth8S713p6ltAYBi2azla5dWomDM80ptsptRLL85LP/pRUL/VHrSGLMOKjH2pFDzZzFfFoBSMK2LFol/E+hBg7gMEovDkaORsqfoVslloq6v+D/o3i2Qxs2GNRSiXjx7ghCYP8kN0qLCWDAcejHgw=
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 307 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 16111
;; flags: qr aa rd ra cd ; qd: 1 an: 4 au: 0 ad: 1
;; QUESTIONS:
;; partial.ingotronic.ch., type = DNSKEY, class = IN
;; ANSWERS:
partial.ingotronic.ch. 300 IN DNSKEY 257 3 5 AwEAAdFaXI5Oh7YBgtdA3Lt1q3wvDAwTs/dqhZEWrRyFtudddJAof4IJa4lmheaUzxaDDtrRB9D5UGuhA9SQTxJTJWogsN5KJH0dBr/8MiL/H6CZHGXGzs1nCDiiyzq/AL/dyYJrRD+AOHqzXmuW7wjjvaWgGRDTYJ2pvCujpv/UPJ6Z1yo1Xz/zLhRgsv7SDjDapfh93ZuzH8tFei8Z06jm+j2Wt/Izj9P0chRwUOP2pjgD9fNVv9yNh2ktEGwnKR/N/tqmI6xyNed2x5Xupw/flckUTisx4O/JcfcjutczA8p5Bwl1+atwfZX3Fc6fkPJNeY7DS/6/bK+YNDngXAD0oP8=
partial.ingotronic.ch. 300 IN DNSKEY 256 3 5 AwEAAZpJkpX2HWKaFlYyWe6ZFKl0EJ1SKDcOJpa2KpxY7LXNHgh2M48YGvns4rVWfwcdxlYBC8I0g9sp6+I3leShroDO+khZg7j3sCsljmxPynWQ2MT6vDexl1a85MDj7U27s16EhGbjfDyHZkLR/0VT17Vaw+cQu5gPtSN767suaRR3
partial.ingotronic.ch. 300 IN RRSIG DNSKEY 5 3 300 20150131221503 20150101221029 10287 partial.ingotronic.ch. ErXJpzUqhyN/3lF6d+cQ9d4wXQ7iD10483V4dbuoli5mZjZWdODzxrOIdrD+s5JUGw0ZDlpuVobDGzah9aPKZzrsZkdn2+D1AmOd0g0yybrkq+aDVf5u9HfLzcjwta9ZZILaZh1fy8lMue+saVrQ6ApVqwX95IDtqmhZ99mUEa0=
partial.ingotronic.ch. 300 IN RRSIG DNSKEY 5 3 300 20150131221503 20150101221029 13138 partial.ingotronic.ch. qgUereTamIG/Wy59QOglwGVSPwGtaR8zbdFpgGtyvLo1AgxqWp0ndkhaMfUp/PtRHe/4YlpCD3UYqC0xd06znt6gKUDygZEz6uxF9r1jXaj8kVXPkubMm0BB/BY1rxMV0LvtN3CcAlA1Ma6aaszSG8QczWSIOOpgKyRmg+OqV9eT157+YBlkB4tdBYitxApZfMbvUdMBtoS5bGHiUkjfIvim1OWq4rDq48rflI9A6u+39ahp1th5UvTyA5N5xoyWinheK6QJsXL6mSfchukg7JylebvuVTkvuM7/mgFLIFrow2vYWFL4NTjbu0EhJVedTEp9ENBMpGtxeFwyQ/P0oQ==
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 964 bytes
###############################################
dnssecjava-1.1.3/src/test/resources/recordings/org_jitsi_dnssec_TestPositive/ 0000775 0000000 0000000 00000000000 13020541473 0027625 5 ustar 00root root 0000000 0000000 testCDonQueryDoesntDoAnything 0000664 0000000 0000000 00000017003 13020541473 0035405 0 ustar 00root root 0000000 0000000 dnssecjava-1.1.3/src/test/resources/recordings/org_jitsi_dnssec_TestPositive #Date: 2015-01-06T22:35:26+01:00
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 53070
;; flags: qr aa rd ra cd ; qd: 1 an: 2 au: 2 ad: 3
;; QUESTIONS:
;; www.ingotronic.ch., type = A, class = IN
;; ANSWERS:
www.ingotronic.ch. 300 IN A 127.0.0.1
www.ingotronic.ch. 300 IN RRSIG A 5 3 300 20150125012443 20141226010256 17430 ingotronic.ch. hkD2bkHZKHoJX8cg69j6l1JXE7iYlVFc0iMo3/3hcq4TqieiT2El/9DLfMSxa7XyB/HRDG5Ul61E56pwlCDdxkwemtAuTzjCpqAtvQ5l5OEtTM4i6nijKBkRRzHjh99qDI1jh9GFv3jkTk5m7iaMQemUB4VTjKGLcZHXvWmQLbg=
;; AUTHORITY RECORDS:
ingotronic.ch. 300 IN NS ns1.ingotronic.ch.
ingotronic.ch. 300 IN RRSIG NS 5 2 300 20150125000532 20141225234703 17430 ingotronic.ch. VuzVJM3McSHlcdngCG/G23zCikq8tXE0CZV2ZSgUFXXFMIEoM6PMi1QRQ/8VF3tee4WGpRx2jhtkui0wFRFfwIhW7G1uPDT4qogaR3KLIyuCEsMxhRH3WJZNrLmLqlSBGvd9OBJwbmryqm3Zzqvrk+E+rh8OJeifnBBpHAX4eHg=
;; ADDITIONAL RECORDS:
ns1.ingotronic.ch. 300 IN A 62.192.5.131
ns1.ingotronic.ch. 300 IN RRSIG A 5 3 300 20150125005754 20141226001054 17430 ingotronic.ch. fNG1RZM53pXwBxruHNaSZszxVzNLoCq8VZsTjAzYH2vSLzHXYVGJFTLIeY0K9APAdyJU8WuwmABmn7XY0Kg39kRG77uoFlqUws2PdTz2QKOwJGZY7W88Ak2Y9lkDBcK8o3wJHVptrT8R7p/1U7UfjF0kqPUkakk2B0EbFWdagFg=
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 615 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 44772
;; flags: qr rd ra ad cd ; qd: 1 an: 4 au: 0 ad: 1
;; QUESTIONS:
;; ., type = DNSKEY, class = IN
;; ANSWERS:
. 87347 IN DNSKEY 256 3 8 AwEAAaPD7Y7XIi1MOEREJNTrRhyqsY3gff6JWzg+XCbqut1sbcbvqyssHw8DT1AkRaAC92pO8xuyq5QEgEPL1IHfABLwpwXI5gTj4gdwi86bpkmlWs9fRpnn4DPDCTdrnxIejJXgClHikLJF3u3CdpNCMijq4CKdQbMlRZ3avv+G7rh7
. 87347 IN DNSKEY 256 3 8 AwEAAe3fSrbLBy3LOS7pnxEUhvPZTE2H5dIGsI/UfruI/nOEvWWa/PSX2BFedBkEqOlYdjdNF2f+6lmfk2Od/xu0v5bVqxFE+/24v3hZSlWBxvXzPTAGHrbW/IJYEPqlzVOAS4XdUgHg0N7IbLywNHMvB+Yf+Nm6ctyXXFLV4WTNnzs7
. 87347 IN DNSKEY 257 3 8 AwEAAagAIKlVZrpC6Ia7gEzahOR+9W29euxhJhVVLOyQbSEW0O8gcCjFFVQUTf6v58fLjwBd0YI0EzrAcQqBGCzh/RStIoO8g0NfnfL2MTJRkxoXbfDaUeVPQuYEhg37NZWAJQ9VnMVDxP/VHL496M/QZxkjf5/Efucp2gaDX6RS6CXpoY68LsvPVjR0ZSwzz1apAzvN9dlzEheX7ICJBBtuA6G3LQpzW5hOA2hzCTMjJPJ8LbqF6dsV6DoBQzgul0sGIcGOYl7OyQdXfZ57relSQageu+ipAdTTJ25AsRTAoub8ONGcLmqrAmRLKBP1dfwhYB4N7knNnulqQxA+Uk1ihz0=
. 87347 IN RRSIG DNSKEY 8 0 172800 20150115235959 20150101000000 19036 . i8cAxD2pvQi1oAyvQxRpDfFlbqPzW+69QQEsDwE1eWOm5AtawO9U7lmsGps7sy/fVNvl1ljKBj4Djp9pb3U2FLogjiIlW0cDAkPmLlG9t+b/pjEfBNlhjANUVN06pvQVAfm+LcF26EaWT6FlISBqb6jSy4BHRa3Bdc4Sx7+pRSYSqVVvYxLkfAWsKPqGkvWhebJDndJJV9syXQXgZ+v/uJ+6XOS43xkAdeL8iBzIs/FlwMTfh3tVe3d0lb65IBBLlCzeQuetX+0Vu1YFcnD0mHc/wS2ZnAV5toAFmyVQBoY/XAZiZeaOkcROJ6Zmqezy7liwK7BqsYyAZntMhk8lbg==
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 883 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 59154
;; flags: qr rd ra ad cd ; qd: 1 an: 2 au: 0 ad: 1
;; QUESTIONS:
;; ch., type = DS, class = IN
;; ANSWERS:
ch. 947 IN DS 46375 8 2 8F96646FC68BB7E4AF4C0750A6096FBC0D4ECDA3D3FA6DA06FDDB42EE50C6CF3
ch. 947 IN RRSIG DS 8 1 86400 20150112170000 20150105160000 16665 . thY7xYWBBxiBjqbQIb9fAG4TmQgnziwM7q6P1T3/ITxmECdvOCQnnZA3uD7qmN8uM0HudsD7+y+zgD3rsH4RSTKdL4kHSI0OnCxToMTvklghEgFDezqIRm8NkWdI2H4Stwrj20nYKSpLQxPI2EE54gs18P3KyO8bAUYv8Qx73xU=
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 238 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 51168
;; flags: qr rd ra ad cd ; qd: 1 an: 4 au: 0 ad: 1
;; QUESTIONS:
;; ch., type = DNSKEY, class = IN
;; ANSWERS:
ch. 948 IN DNSKEY 256 3 8 AwEAAcsg0kY6fw1wzYMhSAKTy+Y2JzAst66P/1odp9NECJJHbU8f4nwziI3onoFSBV0ZiSZhY1aH5dhdDZ7BkrqhVXSrZPAz0CvzjIxmB1gSOf9DeZvjQvoy97HqYolxsf+B3QQv2RKBT67elF5+JisKg3/dQISelKn8LhabSoVrMlD1
ch. 948 IN DNSKEY 257 3 8 AwEAAb7GhhZ8IAy/AhwmSms5DeQK5ad09wIIplEpYoiAIYXPtJvT1ReFzyfTp/2YP+g/PWDwHPh4qKAHa9x0VgbIQcGAeNakmfkAdWEmCnca323/SAml3mwfaX62G7/uYWae5zh8QTxZKNd+K1yZ5x0IxnI31chSl5xymRbTEHYZDKwSIRFM3fTxUMt93WFaBVWELReYotJBr++rvAWdnlay5TPBTvheLBkaiqtgM4GP8HK07Y+86lsZnEsj5K3G1KTV5SPpa82rqYAwxG9VKbmSE/6/kBR5jJHjt1rRt5Oe7v18aEtw0YCEN4vxq+KuvMoNVqXUsE9LBwHJD+QNwi6wmB0=
ch. 948 IN DNSKEY 256 3 8 AwEAAcSLdT0fEmcFmLpeUkAJoeVaHKiu+nbuc43fWlqaCRVf8t2HA4uWxOk0O5ci9nrFTc8nq8oa5fk5Cj7CHh4yrX9qUCfTdIWTyp8BDEdJpS+Dyb0u9wQuVj+nQMj4fLzdQf4TJs3/qxuiLr3nL1UUwlhhXeqSqGVb7p3mtB5HJ8ad
ch. 948 IN RRSIG DNSKEY 8 1 86400 20150127100909 20141212090909 46375 ch. bT8q0FWyeMH0SulNo6UdIIgZYNATwYsee2bikq2Gh339Bufma8eaqWIPYT3XKmxYPBFOw0bVl+kLZxTwbR1CFoCDXoP+qgQhh4mf9qkNiv2CDSc+0FE3FRREn+DAhYTUEuB58FPiPakFB8s8O7T+k2qhDae7jy4/y7Jl1lnjaBY8s7bzOUPhF0KKCNZmvoKwtL23ZdVeTSV1xM3jkiNnpzBKbcoSWECSGJVp1SE0BnRXdwQP41YTXFZ0310YjaTAUCC5qbMIWdEkHjfdSQtKBImnc85mkapq9w++XQ4zhauPWBtrPV3CcoCahjUaWdjrKVkibomlJZaN8MEO23CfQw==
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 893 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 48789
;; flags: qr rd ra cd ; qd: 1 an: 3 au: 0 ad: 1
;; QUESTIONS:
;; ingotronic.ch., type = DS, class = IN
;; ANSWERS:
ingotronic.ch. 3556 IN DS 6031 5 2 4A948F2FDADA24686E473EDAC00DCF972584C75E3FAA92C2021B6221449FF87E
ingotronic.ch. 3556 IN DS 6031 5 1 733D0218B571CD617B1A7493564B9FC4F12ADE82
ingotronic.ch. 3556 IN RRSIG DS 8 2 3600 20150129033614 20150105123019 60789 ch. rVPJP2HhzW7OkroK2axFj5Lb4iVWCH8Fp/Iq1rF952NDo72b8RiKje2RaAKJAGQ+wd0YgE+PAej04GCmkhlDJA/zvPeeTxuhy3HbJzReMlQ7fjyH+wW1hli+FuIYvogXWf7nO/9VyPORt8X/f/pjrOr3Vlj9sGLN8TGYpEuVSw4=
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 288 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 43654
;; flags: qr aa rd ra cd ; qd: 1 an: 4 au: 0 ad: 1
;; QUESTIONS:
;; ingotronic.ch., type = DNSKEY, class = IN
;; ANSWERS:
ingotronic.ch. 300 IN DNSKEY 256 3 5 AwEAAZ2Xh77GFzpEDx7EHYxShqltHgkiG+BOjBGifEmnJhQSdE5/yNSLFNcdhZZ8HUPxYnaedTqJcFFg4AzUsQklF/fECegTJdZjaj2WoL0/I8K7HMfY/hVuRZUWPNglYi8agJRX6gdkFTCpUNI7stpgKqxtzUJhhw15uG/lKMplwqUr
ingotronic.ch. 300 IN DNSKEY 257 3 5 AwEAAeA1vzmjaB+eBAcvhzpKEgAEFpvQ1rg4uKDW6MsQtacKoqBpgyep2+LuWotz5p/xYxj3NGsArwN8Ad5cY0FHRr8miTT0elOv6nvlqGIfRuhj/BXAQ1x4ihpSFslHw0lJMYFwxsUZWpUyjWX/nv1xRZMMwF46gui0N4OEbyTYusCk77D+A71k+K0EAitFIbIH4GCUKmH1H7HmXhSVH9bN/n7KEGwW32lmsuuUcJoRKDkcUvbMXY/9Xoa2quERrUg/rBbDUHowRPjYDS5GzY1+f4YY8s40BufGiqyUTKKXL953MVFK8gmezXA0hbmrnZ7CBOw/7238mORAdzExaX8n7CE=
ingotronic.ch. 300 IN RRSIG DNSKEY 5 2 300 20150125003700 20141226001657 6031 ingotronic.ch. rs1QlP2SlSpA2ELbzwg3DgWLzXWL3Lpv6CUJE2Q0qH2Zp7Qdy3cD+ZEtNh9v24Qv1M6JJ3zFt8mmZoCeW2ycuMbJCqBkW9CBuwF+VznZvZY2MxwPipvhvEEGP//0M8YAZJ66yQPDv3PTdAP8FYbIrJyvY44vwyncwbslpfHT9jAsrbfr3vuMuWps86dnP462q+0s1TxBfqi8mzo3gdavjHKWVNwohLahLKT+tWeu6DSzQv0YwMjwtkLgF7QRgx3ctIIkloOrnx9nHH1N6y+hxEB89fOlyVDjHhgL5uVtsD5fEdT0FJ2Gc/2nShEMMqIwr1/J9kUq1mNySff/uEe65Q==
ingotronic.ch. 300 IN RRSIG DNSKEY 5 2 300 20150125003700 20141226001657 17430 ingotronic.ch. mEwZjhQqeWksWD0TCnNBrtce4YkWJL3edqL6PvAUu8Fn+Ih437kEs3+pqdkgRsdYQ9HW+lBm/8pWwJlNAv0bi9NykItXMwAUFtncgq+6Pnh3iAM972GXSa5VV4LcGQ5b8CBdHCHiEKDqyPv5Hr5QfYL/FQaWlcNRh4QZZlZNPFA=
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 940 bytes
###############################################
testValidAnswerToDifferentQueryTypeIsBogus 0000664 0000000 0000000 00000017003 13020541473 0040127 0 ustar 00root root 0000000 0000000 dnssecjava-1.1.3/src/test/resources/recordings/org_jitsi_dnssec_TestPositive #Date: 2015-01-06T22:35:26+01:00
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 17080
;; flags: qr aa rd ra cd ; qd: 1 an: 2 au: 2 ad: 3
;; QUESTIONS:
;; www.ingotronic.ch., type = A, class = IN
;; ANSWERS:
www.ingotronic.ch. 300 IN A 127.0.0.1
www.ingotronic.ch. 300 IN RRSIG A 5 3 300 20150125012443 20141226010256 17430 ingotronic.ch. hkD2bkHZKHoJX8cg69j6l1JXE7iYlVFc0iMo3/3hcq4TqieiT2El/9DLfMSxa7XyB/HRDG5Ul61E56pwlCDdxkwemtAuTzjCpqAtvQ5l5OEtTM4i6nijKBkRRzHjh99qDI1jh9GFv3jkTk5m7iaMQemUB4VTjKGLcZHXvWmQLbg=
;; AUTHORITY RECORDS:
ingotronic.ch. 300 IN NS ns1.ingotronic.ch.
ingotronic.ch. 300 IN RRSIG NS 5 2 300 20150125000532 20141225234703 17430 ingotronic.ch. VuzVJM3McSHlcdngCG/G23zCikq8tXE0CZV2ZSgUFXXFMIEoM6PMi1QRQ/8VF3tee4WGpRx2jhtkui0wFRFfwIhW7G1uPDT4qogaR3KLIyuCEsMxhRH3WJZNrLmLqlSBGvd9OBJwbmryqm3Zzqvrk+E+rh8OJeifnBBpHAX4eHg=
;; ADDITIONAL RECORDS:
ns1.ingotronic.ch. 300 IN A 62.192.5.131
ns1.ingotronic.ch. 300 IN RRSIG A 5 3 300 20150125005754 20141226001054 17430 ingotronic.ch. fNG1RZM53pXwBxruHNaSZszxVzNLoCq8VZsTjAzYH2vSLzHXYVGJFTLIeY0K9APAdyJU8WuwmABmn7XY0Kg39kRG77uoFlqUws2PdTz2QKOwJGZY7W88Ak2Y9lkDBcK8o3wJHVptrT8R7p/1U7UfjF0kqPUkakk2B0EbFWdagFg=
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 615 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 11713
;; flags: qr rd ra ad cd ; qd: 1 an: 4 au: 0 ad: 1
;; QUESTIONS:
;; ., type = DNSKEY, class = IN
;; ANSWERS:
. 87347 IN DNSKEY 256 3 8 AwEAAe3fSrbLBy3LOS7pnxEUhvPZTE2H5dIGsI/UfruI/nOEvWWa/PSX2BFedBkEqOlYdjdNF2f+6lmfk2Od/xu0v5bVqxFE+/24v3hZSlWBxvXzPTAGHrbW/IJYEPqlzVOAS4XdUgHg0N7IbLywNHMvB+Yf+Nm6ctyXXFLV4WTNnzs7
. 87347 IN DNSKEY 256 3 8 AwEAAaPD7Y7XIi1MOEREJNTrRhyqsY3gff6JWzg+XCbqut1sbcbvqyssHw8DT1AkRaAC92pO8xuyq5QEgEPL1IHfABLwpwXI5gTj4gdwi86bpkmlWs9fRpnn4DPDCTdrnxIejJXgClHikLJF3u3CdpNCMijq4CKdQbMlRZ3avv+G7rh7
. 87347 IN DNSKEY 257 3 8 AwEAAagAIKlVZrpC6Ia7gEzahOR+9W29euxhJhVVLOyQbSEW0O8gcCjFFVQUTf6v58fLjwBd0YI0EzrAcQqBGCzh/RStIoO8g0NfnfL2MTJRkxoXbfDaUeVPQuYEhg37NZWAJQ9VnMVDxP/VHL496M/QZxkjf5/Efucp2gaDX6RS6CXpoY68LsvPVjR0ZSwzz1apAzvN9dlzEheX7ICJBBtuA6G3LQpzW5hOA2hzCTMjJPJ8LbqF6dsV6DoBQzgul0sGIcGOYl7OyQdXfZ57relSQageu+ipAdTTJ25AsRTAoub8ONGcLmqrAmRLKBP1dfwhYB4N7knNnulqQxA+Uk1ihz0=
. 87347 IN RRSIG DNSKEY 8 0 172800 20150115235959 20150101000000 19036 . i8cAxD2pvQi1oAyvQxRpDfFlbqPzW+69QQEsDwE1eWOm5AtawO9U7lmsGps7sy/fVNvl1ljKBj4Djp9pb3U2FLogjiIlW0cDAkPmLlG9t+b/pjEfBNlhjANUVN06pvQVAfm+LcF26EaWT6FlISBqb6jSy4BHRa3Bdc4Sx7+pRSYSqVVvYxLkfAWsKPqGkvWhebJDndJJV9syXQXgZ+v/uJ+6XOS43xkAdeL8iBzIs/FlwMTfh3tVe3d0lb65IBBLlCzeQuetX+0Vu1YFcnD0mHc/wS2ZnAV5toAFmyVQBoY/XAZiZeaOkcROJ6Zmqezy7liwK7BqsYyAZntMhk8lbg==
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 883 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 41417
;; flags: qr rd ra ad cd ; qd: 1 an: 2 au: 0 ad: 1
;; QUESTIONS:
;; ch., type = DS, class = IN
;; ANSWERS:
ch. 947 IN DS 46375 8 2 8F96646FC68BB7E4AF4C0750A6096FBC0D4ECDA3D3FA6DA06FDDB42EE50C6CF3
ch. 947 IN RRSIG DS 8 1 86400 20150112170000 20150105160000 16665 . thY7xYWBBxiBjqbQIb9fAG4TmQgnziwM7q6P1T3/ITxmECdvOCQnnZA3uD7qmN8uM0HudsD7+y+zgD3rsH4RSTKdL4kHSI0OnCxToMTvklghEgFDezqIRm8NkWdI2H4Stwrj20nYKSpLQxPI2EE54gs18P3KyO8bAUYv8Qx73xU=
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 238 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 37187
;; flags: qr rd ra ad cd ; qd: 1 an: 4 au: 0 ad: 1
;; QUESTIONS:
;; ch., type = DNSKEY, class = IN
;; ANSWERS:
ch. 948 IN DNSKEY 256 3 8 AwEAAcSLdT0fEmcFmLpeUkAJoeVaHKiu+nbuc43fWlqaCRVf8t2HA4uWxOk0O5ci9nrFTc8nq8oa5fk5Cj7CHh4yrX9qUCfTdIWTyp8BDEdJpS+Dyb0u9wQuVj+nQMj4fLzdQf4TJs3/qxuiLr3nL1UUwlhhXeqSqGVb7p3mtB5HJ8ad
ch. 948 IN DNSKEY 256 3 8 AwEAAcsg0kY6fw1wzYMhSAKTy+Y2JzAst66P/1odp9NECJJHbU8f4nwziI3onoFSBV0ZiSZhY1aH5dhdDZ7BkrqhVXSrZPAz0CvzjIxmB1gSOf9DeZvjQvoy97HqYolxsf+B3QQv2RKBT67elF5+JisKg3/dQISelKn8LhabSoVrMlD1
ch. 948 IN DNSKEY 257 3 8 AwEAAb7GhhZ8IAy/AhwmSms5DeQK5ad09wIIplEpYoiAIYXPtJvT1ReFzyfTp/2YP+g/PWDwHPh4qKAHa9x0VgbIQcGAeNakmfkAdWEmCnca323/SAml3mwfaX62G7/uYWae5zh8QTxZKNd+K1yZ5x0IxnI31chSl5xymRbTEHYZDKwSIRFM3fTxUMt93WFaBVWELReYotJBr++rvAWdnlay5TPBTvheLBkaiqtgM4GP8HK07Y+86lsZnEsj5K3G1KTV5SPpa82rqYAwxG9VKbmSE/6/kBR5jJHjt1rRt5Oe7v18aEtw0YCEN4vxq+KuvMoNVqXUsE9LBwHJD+QNwi6wmB0=
ch. 948 IN RRSIG DNSKEY 8 1 86400 20150127100909 20141212090909 46375 ch. bT8q0FWyeMH0SulNo6UdIIgZYNATwYsee2bikq2Gh339Bufma8eaqWIPYT3XKmxYPBFOw0bVl+kLZxTwbR1CFoCDXoP+qgQhh4mf9qkNiv2CDSc+0FE3FRREn+DAhYTUEuB58FPiPakFB8s8O7T+k2qhDae7jy4/y7Jl1lnjaBY8s7bzOUPhF0KKCNZmvoKwtL23ZdVeTSV1xM3jkiNnpzBKbcoSWECSGJVp1SE0BnRXdwQP41YTXFZ0310YjaTAUCC5qbMIWdEkHjfdSQtKBImnc85mkapq9w++XQ4zhauPWBtrPV3CcoCahjUaWdjrKVkibomlJZaN8MEO23CfQw==
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 893 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 11702
;; flags: qr rd ra cd ; qd: 1 an: 3 au: 0 ad: 1
;; QUESTIONS:
;; ingotronic.ch., type = DS, class = IN
;; ANSWERS:
ingotronic.ch. 3556 IN DS 6031 5 1 733D0218B571CD617B1A7493564B9FC4F12ADE82
ingotronic.ch. 3556 IN DS 6031 5 2 4A948F2FDADA24686E473EDAC00DCF972584C75E3FAA92C2021B6221449FF87E
ingotronic.ch. 3556 IN RRSIG DS 8 2 3600 20150129033614 20150105123019 60789 ch. rVPJP2HhzW7OkroK2axFj5Lb4iVWCH8Fp/Iq1rF952NDo72b8RiKje2RaAKJAGQ+wd0YgE+PAej04GCmkhlDJA/zvPeeTxuhy3HbJzReMlQ7fjyH+wW1hli+FuIYvogXWf7nO/9VyPORt8X/f/pjrOr3Vlj9sGLN8TGYpEuVSw4=
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 288 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 51726
;; flags: qr aa rd ra cd ; qd: 1 an: 4 au: 0 ad: 1
;; QUESTIONS:
;; ingotronic.ch., type = DNSKEY, class = IN
;; ANSWERS:
ingotronic.ch. 300 IN DNSKEY 257 3 5 AwEAAeA1vzmjaB+eBAcvhzpKEgAEFpvQ1rg4uKDW6MsQtacKoqBpgyep2+LuWotz5p/xYxj3NGsArwN8Ad5cY0FHRr8miTT0elOv6nvlqGIfRuhj/BXAQ1x4ihpSFslHw0lJMYFwxsUZWpUyjWX/nv1xRZMMwF46gui0N4OEbyTYusCk77D+A71k+K0EAitFIbIH4GCUKmH1H7HmXhSVH9bN/n7KEGwW32lmsuuUcJoRKDkcUvbMXY/9Xoa2quERrUg/rBbDUHowRPjYDS5GzY1+f4YY8s40BufGiqyUTKKXL953MVFK8gmezXA0hbmrnZ7CBOw/7238mORAdzExaX8n7CE=
ingotronic.ch. 300 IN DNSKEY 256 3 5 AwEAAZ2Xh77GFzpEDx7EHYxShqltHgkiG+BOjBGifEmnJhQSdE5/yNSLFNcdhZZ8HUPxYnaedTqJcFFg4AzUsQklF/fECegTJdZjaj2WoL0/I8K7HMfY/hVuRZUWPNglYi8agJRX6gdkFTCpUNI7stpgKqxtzUJhhw15uG/lKMplwqUr
ingotronic.ch. 300 IN RRSIG DNSKEY 5 2 300 20150125003700 20141226001657 6031 ingotronic.ch. rs1QlP2SlSpA2ELbzwg3DgWLzXWL3Lpv6CUJE2Q0qH2Zp7Qdy3cD+ZEtNh9v24Qv1M6JJ3zFt8mmZoCeW2ycuMbJCqBkW9CBuwF+VznZvZY2MxwPipvhvEEGP//0M8YAZJ66yQPDv3PTdAP8FYbIrJyvY44vwyncwbslpfHT9jAsrbfr3vuMuWps86dnP462q+0s1TxBfqi8mzo3gdavjHKWVNwohLahLKT+tWeu6DSzQv0YwMjwtkLgF7QRgx3ctIIkloOrnx9nHH1N6y+hxEB89fOlyVDjHhgL5uVtsD5fEdT0FJ2Gc/2nShEMMqIwr1/J9kUq1mNySff/uEe65Q==
ingotronic.ch. 300 IN RRSIG DNSKEY 5 2 300 20150125003700 20141226001657 17430 ingotronic.ch. mEwZjhQqeWksWD0TCnNBrtce4YkWJL3edqL6PvAUu8Fn+Ih437kEs3+pqdkgRsdYQ9HW+lBm/8pWwJlNAv0bi9NykItXMwAUFtncgq+6Pnh3iAM972GXSa5VV4LcGQ5b8CBdHCHiEKDqyPv5Hr5QfYL/FQaWlcNRh4QZZlZNPFA=
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 940 bytes
###############################################
dnssecjava-1.1.3/src/test/resources/recordings/org_jitsi_dnssec_TestPositive/testValidExising 0000664 0000000 0000000 00000016776 13020541473 0033057 0 ustar 00root root 0000000 0000000 #Date: 2015-01-06T22:35:26+01:00
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 416
;; flags: qr aa rd ra cd ; qd: 1 an: 2 au: 2 ad: 3
;; QUESTIONS:
;; www.ingotronic.ch., type = A, class = IN
;; ANSWERS:
www.ingotronic.ch. 300 IN A 127.0.0.1
www.ingotronic.ch. 300 IN RRSIG A 5 3 300 20150125012443 20141226010256 17430 ingotronic.ch. hkD2bkHZKHoJX8cg69j6l1JXE7iYlVFc0iMo3/3hcq4TqieiT2El/9DLfMSxa7XyB/HRDG5Ul61E56pwlCDdxkwemtAuTzjCpqAtvQ5l5OEtTM4i6nijKBkRRzHjh99qDI1jh9GFv3jkTk5m7iaMQemUB4VTjKGLcZHXvWmQLbg=
;; AUTHORITY RECORDS:
ingotronic.ch. 300 IN NS ns1.ingotronic.ch.
ingotronic.ch. 300 IN RRSIG NS 5 2 300 20150125000532 20141225234703 17430 ingotronic.ch. VuzVJM3McSHlcdngCG/G23zCikq8tXE0CZV2ZSgUFXXFMIEoM6PMi1QRQ/8VF3tee4WGpRx2jhtkui0wFRFfwIhW7G1uPDT4qogaR3KLIyuCEsMxhRH3WJZNrLmLqlSBGvd9OBJwbmryqm3Zzqvrk+E+rh8OJeifnBBpHAX4eHg=
;; ADDITIONAL RECORDS:
ns1.ingotronic.ch. 300 IN A 62.192.5.131
ns1.ingotronic.ch. 300 IN RRSIG A 5 3 300 20150125005754 20141226001054 17430 ingotronic.ch. fNG1RZM53pXwBxruHNaSZszxVzNLoCq8VZsTjAzYH2vSLzHXYVGJFTLIeY0K9APAdyJU8WuwmABmn7XY0Kg39kRG77uoFlqUws2PdTz2QKOwJGZY7W88Ak2Y9lkDBcK8o3wJHVptrT8R7p/1U7UfjF0kqPUkakk2B0EbFWdagFg=
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 615 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 8443
;; flags: qr rd ra ad cd ; qd: 1 an: 4 au: 0 ad: 1
;; QUESTIONS:
;; ., type = DNSKEY, class = IN
;; ANSWERS:
. 87348 IN DNSKEY 256 3 8 AwEAAaPD7Y7XIi1MOEREJNTrRhyqsY3gff6JWzg+XCbqut1sbcbvqyssHw8DT1AkRaAC92pO8xuyq5QEgEPL1IHfABLwpwXI5gTj4gdwi86bpkmlWs9fRpnn4DPDCTdrnxIejJXgClHikLJF3u3CdpNCMijq4CKdQbMlRZ3avv+G7rh7
. 87348 IN DNSKEY 257 3 8 AwEAAagAIKlVZrpC6Ia7gEzahOR+9W29euxhJhVVLOyQbSEW0O8gcCjFFVQUTf6v58fLjwBd0YI0EzrAcQqBGCzh/RStIoO8g0NfnfL2MTJRkxoXbfDaUeVPQuYEhg37NZWAJQ9VnMVDxP/VHL496M/QZxkjf5/Efucp2gaDX6RS6CXpoY68LsvPVjR0ZSwzz1apAzvN9dlzEheX7ICJBBtuA6G3LQpzW5hOA2hzCTMjJPJ8LbqF6dsV6DoBQzgul0sGIcGOYl7OyQdXfZ57relSQageu+ipAdTTJ25AsRTAoub8ONGcLmqrAmRLKBP1dfwhYB4N7knNnulqQxA+Uk1ihz0=
. 87348 IN DNSKEY 256 3 8 AwEAAe3fSrbLBy3LOS7pnxEUhvPZTE2H5dIGsI/UfruI/nOEvWWa/PSX2BFedBkEqOlYdjdNF2f+6lmfk2Od/xu0v5bVqxFE+/24v3hZSlWBxvXzPTAGHrbW/IJYEPqlzVOAS4XdUgHg0N7IbLywNHMvB+Yf+Nm6ctyXXFLV4WTNnzs7
. 87348 IN RRSIG DNSKEY 8 0 172800 20150115235959 20150101000000 19036 . i8cAxD2pvQi1oAyvQxRpDfFlbqPzW+69QQEsDwE1eWOm5AtawO9U7lmsGps7sy/fVNvl1ljKBj4Djp9pb3U2FLogjiIlW0cDAkPmLlG9t+b/pjEfBNlhjANUVN06pvQVAfm+LcF26EaWT6FlISBqb6jSy4BHRa3Bdc4Sx7+pRSYSqVVvYxLkfAWsKPqGkvWhebJDndJJV9syXQXgZ+v/uJ+6XOS43xkAdeL8iBzIs/FlwMTfh3tVe3d0lb65IBBLlCzeQuetX+0Vu1YFcnD0mHc/wS2ZnAV5toAFmyVQBoY/XAZiZeaOkcROJ6Zmqezy7liwK7BqsYyAZntMhk8lbg==
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 883 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 57680
;; flags: qr rd ra ad cd ; qd: 1 an: 2 au: 0 ad: 1
;; QUESTIONS:
;; ch., type = DS, class = IN
;; ANSWERS:
ch. 948 IN DS 46375 8 2 8F96646FC68BB7E4AF4C0750A6096FBC0D4ECDA3D3FA6DA06FDDB42EE50C6CF3
ch. 948 IN RRSIG DS 8 1 86400 20150112170000 20150105160000 16665 . thY7xYWBBxiBjqbQIb9fAG4TmQgnziwM7q6P1T3/ITxmECdvOCQnnZA3uD7qmN8uM0HudsD7+y+zgD3rsH4RSTKdL4kHSI0OnCxToMTvklghEgFDezqIRm8NkWdI2H4Stwrj20nYKSpLQxPI2EE54gs18P3KyO8bAUYv8Qx73xU=
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 238 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 6455
;; flags: qr rd ra ad cd ; qd: 1 an: 4 au: 0 ad: 1
;; QUESTIONS:
;; ch., type = DNSKEY, class = IN
;; ANSWERS:
ch. 948 IN DNSKEY 256 3 8 AwEAAcsg0kY6fw1wzYMhSAKTy+Y2JzAst66P/1odp9NECJJHbU8f4nwziI3onoFSBV0ZiSZhY1aH5dhdDZ7BkrqhVXSrZPAz0CvzjIxmB1gSOf9DeZvjQvoy97HqYolxsf+B3QQv2RKBT67elF5+JisKg3/dQISelKn8LhabSoVrMlD1
ch. 948 IN DNSKEY 256 3 8 AwEAAcSLdT0fEmcFmLpeUkAJoeVaHKiu+nbuc43fWlqaCRVf8t2HA4uWxOk0O5ci9nrFTc8nq8oa5fk5Cj7CHh4yrX9qUCfTdIWTyp8BDEdJpS+Dyb0u9wQuVj+nQMj4fLzdQf4TJs3/qxuiLr3nL1UUwlhhXeqSqGVb7p3mtB5HJ8ad
ch. 948 IN DNSKEY 257 3 8 AwEAAb7GhhZ8IAy/AhwmSms5DeQK5ad09wIIplEpYoiAIYXPtJvT1ReFzyfTp/2YP+g/PWDwHPh4qKAHa9x0VgbIQcGAeNakmfkAdWEmCnca323/SAml3mwfaX62G7/uYWae5zh8QTxZKNd+K1yZ5x0IxnI31chSl5xymRbTEHYZDKwSIRFM3fTxUMt93WFaBVWELReYotJBr++rvAWdnlay5TPBTvheLBkaiqtgM4GP8HK07Y+86lsZnEsj5K3G1KTV5SPpa82rqYAwxG9VKbmSE/6/kBR5jJHjt1rRt5Oe7v18aEtw0YCEN4vxq+KuvMoNVqXUsE9LBwHJD+QNwi6wmB0=
ch. 948 IN RRSIG DNSKEY 8 1 86400 20150127100909 20141212090909 46375 ch. bT8q0FWyeMH0SulNo6UdIIgZYNATwYsee2bikq2Gh339Bufma8eaqWIPYT3XKmxYPBFOw0bVl+kLZxTwbR1CFoCDXoP+qgQhh4mf9qkNiv2CDSc+0FE3FRREn+DAhYTUEuB58FPiPakFB8s8O7T+k2qhDae7jy4/y7Jl1lnjaBY8s7bzOUPhF0KKCNZmvoKwtL23ZdVeTSV1xM3jkiNnpzBKbcoSWECSGJVp1SE0BnRXdwQP41YTXFZ0310YjaTAUCC5qbMIWdEkHjfdSQtKBImnc85mkapq9w++XQ4zhauPWBtrPV3CcoCahjUaWdjrKVkibomlJZaN8MEO23CfQw==
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 893 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 45403
;; flags: qr rd ra cd ; qd: 1 an: 3 au: 0 ad: 1
;; QUESTIONS:
;; ingotronic.ch., type = DS, class = IN
;; ANSWERS:
ingotronic.ch. 3556 IN DS 6031 5 1 733D0218B571CD617B1A7493564B9FC4F12ADE82
ingotronic.ch. 3556 IN DS 6031 5 2 4A948F2FDADA24686E473EDAC00DCF972584C75E3FAA92C2021B6221449FF87E
ingotronic.ch. 3556 IN RRSIG DS 8 2 3600 20150129033614 20150105123019 60789 ch. rVPJP2HhzW7OkroK2axFj5Lb4iVWCH8Fp/Iq1rF952NDo72b8RiKje2RaAKJAGQ+wd0YgE+PAej04GCmkhlDJA/zvPeeTxuhy3HbJzReMlQ7fjyH+wW1hli+FuIYvogXWf7nO/9VyPORt8X/f/pjrOr3Vlj9sGLN8TGYpEuVSw4=
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 288 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 5657
;; flags: qr aa rd ra cd ; qd: 1 an: 4 au: 0 ad: 1
;; QUESTIONS:
;; ingotronic.ch., type = DNSKEY, class = IN
;; ANSWERS:
ingotronic.ch. 300 IN DNSKEY 257 3 5 AwEAAeA1vzmjaB+eBAcvhzpKEgAEFpvQ1rg4uKDW6MsQtacKoqBpgyep2+LuWotz5p/xYxj3NGsArwN8Ad5cY0FHRr8miTT0elOv6nvlqGIfRuhj/BXAQ1x4ihpSFslHw0lJMYFwxsUZWpUyjWX/nv1xRZMMwF46gui0N4OEbyTYusCk77D+A71k+K0EAitFIbIH4GCUKmH1H7HmXhSVH9bN/n7KEGwW32lmsuuUcJoRKDkcUvbMXY/9Xoa2quERrUg/rBbDUHowRPjYDS5GzY1+f4YY8s40BufGiqyUTKKXL953MVFK8gmezXA0hbmrnZ7CBOw/7238mORAdzExaX8n7CE=
ingotronic.ch. 300 IN DNSKEY 256 3 5 AwEAAZ2Xh77GFzpEDx7EHYxShqltHgkiG+BOjBGifEmnJhQSdE5/yNSLFNcdhZZ8HUPxYnaedTqJcFFg4AzUsQklF/fECegTJdZjaj2WoL0/I8K7HMfY/hVuRZUWPNglYi8agJRX6gdkFTCpUNI7stpgKqxtzUJhhw15uG/lKMplwqUr
ingotronic.ch. 300 IN RRSIG DNSKEY 5 2 300 20150125003700 20141226001657 6031 ingotronic.ch. rs1QlP2SlSpA2ELbzwg3DgWLzXWL3Lpv6CUJE2Q0qH2Zp7Qdy3cD+ZEtNh9v24Qv1M6JJ3zFt8mmZoCeW2ycuMbJCqBkW9CBuwF+VznZvZY2MxwPipvhvEEGP//0M8YAZJ66yQPDv3PTdAP8FYbIrJyvY44vwyncwbslpfHT9jAsrbfr3vuMuWps86dnP462q+0s1TxBfqi8mzo3gdavjHKWVNwohLahLKT+tWeu6DSzQv0YwMjwtkLgF7QRgx3ctIIkloOrnx9nHH1N6y+hxEB89fOlyVDjHhgL5uVtsD5fEdT0FJ2Gc/2nShEMMqIwr1/J9kUq1mNySff/uEe65Q==
ingotronic.ch. 300 IN RRSIG DNSKEY 5 2 300 20150125003700 20141226001657 17430 ingotronic.ch. mEwZjhQqeWksWD0TCnNBrtce4YkWJL3edqL6PvAUu8Fn+Ih437kEs3+pqdkgRsdYQ9HW+lBm/8pWwJlNAv0bi9NykItXMwAUFtncgq+6Pnh3iAM972GXSa5VV4LcGQ5b8CBdHCHiEKDqyPv5Hr5QfYL/FQaWlcNRh4QZZlZNPFA=
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 940 bytes
###############################################
dnssecjava-1.1.3/src/test/resources/recordings/org_jitsi_dnssec_TestPositive/testValidNonExising 0000664 0000000 0000000 00000022730 13020541473 0033515 0 ustar 00root root 0000000 0000000 #Date: 2015-01-06T22:35:26+01:00
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 17546
;; flags: qr aa rd ra cd ; qd: 1 an: 12 au: 0 ad: 3
;; QUESTIONS:
;; ingotronic.ch., type = ANY, class = IN
;; ANSWERS:
ingotronic.ch. 300 IN RRSIG NSEC 5 2 300 20150125000532 20141225234703 17430 ingotronic.ch. en5BaZ6zWqEvoUFUDPm5g1pjz7THXBv/1kjKtV2tS+7xh0BtkLEzlA9n/H66ZZAX2EIh7vXj12xVJKOuEuM0o1mJwKsBaLQuTra60/zYAUIddwUOCzI3zzjiRFklPyHSnLkGoBODZcvehnsTzTPyBxkfoouleqpj7gN5jOSBL8M=
ingotronic.ch. 300 IN NSEC alias.ingotronic.ch. A NS SOA RRSIG NSEC DNSKEY
ingotronic.ch. 300 IN SOA ns1.ingotronic.ch. admin.ingotronic.ch. 2013032762 300 60 864000 300
ingotronic.ch. 300 IN NS ns1.ingotronic.ch.
ingotronic.ch. 300 IN A 127.0.0.1
ingotronic.ch. 300 IN DNSKEY 257 3 5 AwEAAeA1vzmjaB+eBAcvhzpKEgAEFpvQ1rg4uKDW6MsQtacKoqBpgyep2+LuWotz5p/xYxj3NGsArwN8Ad5cY0FHRr8miTT0elOv6nvlqGIfRuhj/BXAQ1x4ihpSFslHw0lJMYFwxsUZWpUyjWX/nv1xRZMMwF46gui0N4OEbyTYusCk77D+A71k+K0EAitFIbIH4GCUKmH1H7HmXhSVH9bN/n7KEGwW32lmsuuUcJoRKDkcUvbMXY/9Xoa2quERrUg/rBbDUHowRPjYDS5GzY1+f4YY8s40BufGiqyUTKKXL953MVFK8gmezXA0hbmrnZ7CBOw/7238mORAdzExaX8n7CE=
ingotronic.ch. 300 IN DNSKEY 256 3 5 AwEAAZ2Xh77GFzpEDx7EHYxShqltHgkiG+BOjBGifEmnJhQSdE5/yNSLFNcdhZZ8HUPxYnaedTqJcFFg4AzUsQklF/fECegTJdZjaj2WoL0/I8K7HMfY/hVuRZUWPNglYi8agJRX6gdkFTCpUNI7stpgKqxtzUJhhw15uG/lKMplwqUr
ingotronic.ch. 300 IN RRSIG DNSKEY 5 2 300 20150125003700 20141226001657 6031 ingotronic.ch. rs1QlP2SlSpA2ELbzwg3DgWLzXWL3Lpv6CUJE2Q0qH2Zp7Qdy3cD+ZEtNh9v24Qv1M6JJ3zFt8mmZoCeW2ycuMbJCqBkW9CBuwF+VznZvZY2MxwPipvhvEEGP//0M8YAZJ66yQPDv3PTdAP8FYbIrJyvY44vwyncwbslpfHT9jAsrbfr3vuMuWps86dnP462q+0s1TxBfqi8mzo3gdavjHKWVNwohLahLKT+tWeu6DSzQv0YwMjwtkLgF7QRgx3ctIIkloOrnx9nHH1N6y+hxEB89fOlyVDjHhgL5uVtsD5fEdT0FJ2Gc/2nShEMMqIwr1/J9kUq1mNySff/uEe65Q==
ingotronic.ch. 300 IN RRSIG DNSKEY 5 2 300 20150125003700 20141226001657 17430 ingotronic.ch. mEwZjhQqeWksWD0TCnNBrtce4YkWJL3edqL6PvAUu8Fn+Ih437kEs3+pqdkgRsdYQ9HW+lBm/8pWwJlNAv0bi9NykItXMwAUFtncgq+6Pnh3iAM972GXSa5VV4LcGQ5b8CBdHCHiEKDqyPv5Hr5QfYL/FQaWlcNRh4QZZlZNPFA=
ingotronic.ch. 300 IN RRSIG SOA 5 2 300 20150125021244 20141226011244 17430 ingotronic.ch. WDLpp9G0P/rlMBfpFn9sAfpEFoBnQfwyGSXbGCc/LG1FSkJoKLDQYDY696scLNsJgkrzZeJrl0oSSvA8AvRUhYRrmuqWMxTVFgYlRwPwqEMCKUqiVhKGVF4NYemoBiUQC4nJwBZd57xKCiF4AQ4CodBtiZxefJFAlTNE0g2yxtM=
ingotronic.ch. 300 IN RRSIG A 5 2 300 20150125000532 20141225234703 17430 ingotronic.ch. GTY5ES29arEKcafghM9Ui3mdS+cS3vTtQ6ROJhCg5Lv+oaYMiMPhljJ1K5hF8r4Hpukc7ZyTf6bAez3/r2VlhMU5Q7qrx148sk63vgm8qaA3/78UKs3Fib1Z8D2fCmPHz3hmpKe/jtwX/nnyf5qhP7lpPy30QnjsjAD1xbQd1f8=
ingotronic.ch. 300 IN RRSIG NS 5 2 300 20150125000532 20141225234703 17430 ingotronic.ch. VuzVJM3McSHlcdngCG/G23zCikq8tXE0CZV2ZSgUFXXFMIEoM6PMi1QRQ/8VF3tee4WGpRx2jhtkui0wFRFfwIhW7G1uPDT4qogaR3KLIyuCEsMxhRH3WJZNrLmLqlSBGvd9OBJwbmryqm3Zzqvrk+E+rh8OJeifnBBpHAX4eHg=
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
ns1.ingotronic.ch. 300 IN A 62.192.5.131
ns1.ingotronic.ch. 300 IN RRSIG A 5 3 300 20150125005754 20141226001054 17430 ingotronic.ch. fNG1RZM53pXwBxruHNaSZszxVzNLoCq8VZsTjAzYH2vSLzHXYVGJFTLIeY0K9APAdyJU8WuwmABmn7XY0Kg39kRG77uoFlqUws2PdTz2QKOwJGZY7W88Ak2Y9lkDBcK8o3wJHVptrT8R7p/1U7UfjF0kqPUkakk2B0EbFWdagFg=
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 1939 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 35981
;; flags: qr rd ra ad cd ; qd: 1 an: 4 au: 0 ad: 1
;; QUESTIONS:
;; ., type = DNSKEY, class = IN
;; ANSWERS:
. 87347 IN DNSKEY 256 3 8 AwEAAe3fSrbLBy3LOS7pnxEUhvPZTE2H5dIGsI/UfruI/nOEvWWa/PSX2BFedBkEqOlYdjdNF2f+6lmfk2Od/xu0v5bVqxFE+/24v3hZSlWBxvXzPTAGHrbW/IJYEPqlzVOAS4XdUgHg0N7IbLywNHMvB+Yf+Nm6ctyXXFLV4WTNnzs7
. 87347 IN DNSKEY 256 3 8 AwEAAaPD7Y7XIi1MOEREJNTrRhyqsY3gff6JWzg+XCbqut1sbcbvqyssHw8DT1AkRaAC92pO8xuyq5QEgEPL1IHfABLwpwXI5gTj4gdwi86bpkmlWs9fRpnn4DPDCTdrnxIejJXgClHikLJF3u3CdpNCMijq4CKdQbMlRZ3avv+G7rh7
. 87347 IN DNSKEY 257 3 8 AwEAAagAIKlVZrpC6Ia7gEzahOR+9W29euxhJhVVLOyQbSEW0O8gcCjFFVQUTf6v58fLjwBd0YI0EzrAcQqBGCzh/RStIoO8g0NfnfL2MTJRkxoXbfDaUeVPQuYEhg37NZWAJQ9VnMVDxP/VHL496M/QZxkjf5/Efucp2gaDX6RS6CXpoY68LsvPVjR0ZSwzz1apAzvN9dlzEheX7ICJBBtuA6G3LQpzW5hOA2hzCTMjJPJ8LbqF6dsV6DoBQzgul0sGIcGOYl7OyQdXfZ57relSQageu+ipAdTTJ25AsRTAoub8ONGcLmqrAmRLKBP1dfwhYB4N7knNnulqQxA+Uk1ihz0=
. 87347 IN RRSIG DNSKEY 8 0 172800 20150115235959 20150101000000 19036 . i8cAxD2pvQi1oAyvQxRpDfFlbqPzW+69QQEsDwE1eWOm5AtawO9U7lmsGps7sy/fVNvl1ljKBj4Djp9pb3U2FLogjiIlW0cDAkPmLlG9t+b/pjEfBNlhjANUVN06pvQVAfm+LcF26EaWT6FlISBqb6jSy4BHRa3Bdc4Sx7+pRSYSqVVvYxLkfAWsKPqGkvWhebJDndJJV9syXQXgZ+v/uJ+6XOS43xkAdeL8iBzIs/FlwMTfh3tVe3d0lb65IBBLlCzeQuetX+0Vu1YFcnD0mHc/wS2ZnAV5toAFmyVQBoY/XAZiZeaOkcROJ6Zmqezy7liwK7BqsYyAZntMhk8lbg==
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 883 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 2430
;; flags: qr rd ra ad cd ; qd: 1 an: 2 au: 0 ad: 1
;; QUESTIONS:
;; ch., type = DS, class = IN
;; ANSWERS:
ch. 947 IN DS 46375 8 2 8F96646FC68BB7E4AF4C0750A6096FBC0D4ECDA3D3FA6DA06FDDB42EE50C6CF3
ch. 947 IN RRSIG DS 8 1 86400 20150112170000 20150105160000 16665 . thY7xYWBBxiBjqbQIb9fAG4TmQgnziwM7q6P1T3/ITxmECdvOCQnnZA3uD7qmN8uM0HudsD7+y+zgD3rsH4RSTKdL4kHSI0OnCxToMTvklghEgFDezqIRm8NkWdI2H4Stwrj20nYKSpLQxPI2EE54gs18P3KyO8bAUYv8Qx73xU=
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 238 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 21918
;; flags: qr rd ra ad cd ; qd: 1 an: 4 au: 0 ad: 1
;; QUESTIONS:
;; ch., type = DNSKEY, class = IN
;; ANSWERS:
ch. 948 IN DNSKEY 256 3 8 AwEAAcSLdT0fEmcFmLpeUkAJoeVaHKiu+nbuc43fWlqaCRVf8t2HA4uWxOk0O5ci9nrFTc8nq8oa5fk5Cj7CHh4yrX9qUCfTdIWTyp8BDEdJpS+Dyb0u9wQuVj+nQMj4fLzdQf4TJs3/qxuiLr3nL1UUwlhhXeqSqGVb7p3mtB5HJ8ad
ch. 948 IN DNSKEY 256 3 8 AwEAAcsg0kY6fw1wzYMhSAKTy+Y2JzAst66P/1odp9NECJJHbU8f4nwziI3onoFSBV0ZiSZhY1aH5dhdDZ7BkrqhVXSrZPAz0CvzjIxmB1gSOf9DeZvjQvoy97HqYolxsf+B3QQv2RKBT67elF5+JisKg3/dQISelKn8LhabSoVrMlD1
ch. 948 IN DNSKEY 257 3 8 AwEAAb7GhhZ8IAy/AhwmSms5DeQK5ad09wIIplEpYoiAIYXPtJvT1ReFzyfTp/2YP+g/PWDwHPh4qKAHa9x0VgbIQcGAeNakmfkAdWEmCnca323/SAml3mwfaX62G7/uYWae5zh8QTxZKNd+K1yZ5x0IxnI31chSl5xymRbTEHYZDKwSIRFM3fTxUMt93WFaBVWELReYotJBr++rvAWdnlay5TPBTvheLBkaiqtgM4GP8HK07Y+86lsZnEsj5K3G1KTV5SPpa82rqYAwxG9VKbmSE/6/kBR5jJHjt1rRt5Oe7v18aEtw0YCEN4vxq+KuvMoNVqXUsE9LBwHJD+QNwi6wmB0=
ch. 948 IN RRSIG DNSKEY 8 1 86400 20150127100909 20141212090909 46375 ch. bT8q0FWyeMH0SulNo6UdIIgZYNATwYsee2bikq2Gh339Bufma8eaqWIPYT3XKmxYPBFOw0bVl+kLZxTwbR1CFoCDXoP+qgQhh4mf9qkNiv2CDSc+0FE3FRREn+DAhYTUEuB58FPiPakFB8s8O7T+k2qhDae7jy4/y7Jl1lnjaBY8s7bzOUPhF0KKCNZmvoKwtL23ZdVeTSV1xM3jkiNnpzBKbcoSWECSGJVp1SE0BnRXdwQP41YTXFZ0310YjaTAUCC5qbMIWdEkHjfdSQtKBImnc85mkapq9w++XQ4zhauPWBtrPV3CcoCahjUaWdjrKVkibomlJZaN8MEO23CfQw==
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 893 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 43744
;; flags: qr rd ra cd ; qd: 1 an: 3 au: 0 ad: 1
;; QUESTIONS:
;; ingotronic.ch., type = DS, class = IN
;; ANSWERS:
ingotronic.ch. 3556 IN DS 6031 5 2 4A948F2FDADA24686E473EDAC00DCF972584C75E3FAA92C2021B6221449FF87E
ingotronic.ch. 3556 IN DS 6031 5 1 733D0218B571CD617B1A7493564B9FC4F12ADE82
ingotronic.ch. 3556 IN RRSIG DS 8 2 3600 20150129033614 20150105123019 60789 ch. rVPJP2HhzW7OkroK2axFj5Lb4iVWCH8Fp/Iq1rF952NDo72b8RiKje2RaAKJAGQ+wd0YgE+PAej04GCmkhlDJA/zvPeeTxuhy3HbJzReMlQ7fjyH+wW1hli+FuIYvogXWf7nO/9VyPORt8X/f/pjrOr3Vlj9sGLN8TGYpEuVSw4=
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 288 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 18065
;; flags: qr aa rd ra cd ; qd: 1 an: 4 au: 0 ad: 1
;; QUESTIONS:
;; ingotronic.ch., type = DNSKEY, class = IN
;; ANSWERS:
ingotronic.ch. 300 IN DNSKEY 256 3 5 AwEAAZ2Xh77GFzpEDx7EHYxShqltHgkiG+BOjBGifEmnJhQSdE5/yNSLFNcdhZZ8HUPxYnaedTqJcFFg4AzUsQklF/fECegTJdZjaj2WoL0/I8K7HMfY/hVuRZUWPNglYi8agJRX6gdkFTCpUNI7stpgKqxtzUJhhw15uG/lKMplwqUr
ingotronic.ch. 300 IN DNSKEY 257 3 5 AwEAAeA1vzmjaB+eBAcvhzpKEgAEFpvQ1rg4uKDW6MsQtacKoqBpgyep2+LuWotz5p/xYxj3NGsArwN8Ad5cY0FHRr8miTT0elOv6nvlqGIfRuhj/BXAQ1x4ihpSFslHw0lJMYFwxsUZWpUyjWX/nv1xRZMMwF46gui0N4OEbyTYusCk77D+A71k+K0EAitFIbIH4GCUKmH1H7HmXhSVH9bN/n7KEGwW32lmsuuUcJoRKDkcUvbMXY/9Xoa2quERrUg/rBbDUHowRPjYDS5GzY1+f4YY8s40BufGiqyUTKKXL953MVFK8gmezXA0hbmrnZ7CBOw/7238mORAdzExaX8n7CE=
ingotronic.ch. 300 IN RRSIG DNSKEY 5 2 300 20150125003700 20141226001657 6031 ingotronic.ch. rs1QlP2SlSpA2ELbzwg3DgWLzXWL3Lpv6CUJE2Q0qH2Zp7Qdy3cD+ZEtNh9v24Qv1M6JJ3zFt8mmZoCeW2ycuMbJCqBkW9CBuwF+VznZvZY2MxwPipvhvEEGP//0M8YAZJ66yQPDv3PTdAP8FYbIrJyvY44vwyncwbslpfHT9jAsrbfr3vuMuWps86dnP462q+0s1TxBfqi8mzo3gdavjHKWVNwohLahLKT+tWeu6DSzQv0YwMjwtkLgF7QRgx3ctIIkloOrnx9nHH1N6y+hxEB89fOlyVDjHhgL5uVtsD5fEdT0FJ2Gc/2nShEMMqIwr1/J9kUq1mNySff/uEe65Q==
ingotronic.ch. 300 IN RRSIG DNSKEY 5 2 300 20150125003700 20141226001657 17430 ingotronic.ch. mEwZjhQqeWksWD0TCnNBrtce4YkWJL3edqL6PvAUu8Fn+Ih437kEs3+pqdkgRsdYQ9HW+lBm/8pWwJlNAv0bi9NykItXMwAUFtncgq+6Pnh3iAM972GXSa5VV4LcGQ5b8CBdHCHiEKDqyPv5Hr5QfYL/FQaWlcNRh4QZZlZNPFA=
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 940 bytes
###############################################
dnssecjava-1.1.3/src/test/resources/recordings/org_jitsi_dnssec_TestPriming/ 0000775 0000000 0000000 00000000000 13020541473 0027430 5 ustar 00root root 0000000 0000000 testDnskeyPrimeResponseWithEmptyAnswerIsBad 0000664 0000000 0000000 00000002465 13020541473 0040112 0 ustar 00root root 0000000 0000000 dnssecjava-1.1.3/src/test/resources/recordings/org_jitsi_dnssec_TestPriming #Date: 2015-01-06T22:34:53+01:00
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 57078
;; flags: qr aa rd ra cd ; qd: 1 an: 2 au: 2 ad: 3
;; QUESTIONS:
;; www.ingotronic.ch., type = A, class = IN
;; ANSWERS:
www.ingotronic.ch. 300 IN A 127.0.0.1
www.ingotronic.ch. 300 IN RRSIG A 5 3 300 20150125012443 20141226010256 17430 ingotronic.ch. hkD2bkHZKHoJX8cg69j6l1JXE7iYlVFc0iMo3/3hcq4TqieiT2El/9DLfMSxa7XyB/HRDG5Ul61E56pwlCDdxkwemtAuTzjCpqAtvQ5l5OEtTM4i6nijKBkRRzHjh99qDI1jh9GFv3jkTk5m7iaMQemUB4VTjKGLcZHXvWmQLbg=
;; AUTHORITY RECORDS:
ingotronic.ch. 300 IN NS ns1.ingotronic.ch.
ingotronic.ch. 300 IN RRSIG NS 5 2 300 20150125000532 20141225234703 17430 ingotronic.ch. VuzVJM3McSHlcdngCG/G23zCikq8tXE0CZV2ZSgUFXXFMIEoM6PMi1QRQ/8VF3tee4WGpRx2jhtkui0wFRFfwIhW7G1uPDT4qogaR3KLIyuCEsMxhRH3WJZNrLmLqlSBGvd9OBJwbmryqm3Zzqvrk+E+rh8OJeifnBBpHAX4eHg=
;; ADDITIONAL RECORDS:
ns1.ingotronic.ch. 300 IN A 62.192.5.131
ns1.ingotronic.ch. 300 IN RRSIG A 5 3 300 20150125005754 20141226001054 17430 ingotronic.ch. fNG1RZM53pXwBxruHNaSZszxVzNLoCq8VZsTjAzYH2vSLzHXYVGJFTLIeY0K9APAdyJU8WuwmABmn7XY0Kg39kRG77uoFlqUws2PdTz2QKOwJGZY7W88Ak2Y9lkDBcK8o3wJHVptrT8R7p/1U7UfjF0kqPUkakk2B0EbFWdagFg=
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 615 bytes
###############################################
testDnskeyPrimeResponseWithInvalidSignatureIsBad 0000664 0000000 0000000 00000010603 13020541473 0041075 0 ustar 00root root 0000000 0000000 dnssecjava-1.1.3/src/test/resources/recordings/org_jitsi_dnssec_TestPriming #Date: 2015-01-06T22:34:51+01:00
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 58452
;; flags: qr rd ra ad cd ; qd: 1 an: 4 au: 0 ad: 1
;; QUESTIONS:
;; ., type = DNSKEY, class = IN
;; ANSWERS:
. 87382 IN DNSKEY 257 3 8 AwEAAagAIKlVZrpC6Ia7gEzahOR+9W29euxhJhVVLOyQbSEW0O8gcCjFFVQUTf6v58fLjwBd0YI0EzrAcQqBGCzh/RStIoO8g0NfnfL2MTJRkxoXbfDaUeVPQuYEhg37NZWAJQ9VnMVDxP/VHL496M/QZxkjf5/Efucp2gaDX6RS6CXpoY68LsvPVjR0ZSwzz1apAzvN9dlzEheX7ICJBBtuA6G3LQpzW5hOA2hzCTMjJPJ8LbqF6dsV6DoBQzgul0sGIcGOYl7OyQdXfZ57relSQageu+ipAdTTJ25AsRTAoub8ONGcLmqrAmRLKBP1dfwhYB4N7knNnulqQxA+Uk1ihz0=
. 87382 IN DNSKEY 256 3 8 AwEAAe3fSrbLBy3LOS7pnxEUhvPZTE2H5dIGsI/UfruI/nOEvWWa/PSX2BFedBkEqOlYdjdNF2f+6lmfk2Od/xu0v5bVqxFE+/24v3hZSlWBxvXzPTAGHrbW/IJYEPqlzVOAS4XdUgHg0N7IbLywNHMvB+Yf+Nm6ctyXXFLV4WTNnzs7
. 87382 IN DNSKEY 256 3 8 AwEAAaPD7Y7XIi1MOEREJNTrRhyqsY3gff6JWzg+XCbqut1sbcbvqyssHw8DT1AkRaAC92pO8xuyq5QEgEPL1IHfABLwpwXI5gTj4gdwi86bpkmlWs9fRpnn4DPDCTdrnxIejJXgClHikLJF3u3CdpNCMijq4CKdQbMlRZ3avv+G7rh7
. 87382 IN RRSIG DNSKEY 8 0 172800 20150115235959 20150101000000 19036 . i8cAxD2pvQi1oAyvQxRpDfFlbqPzW+69QQEsDwE1eWOm5AtawO9U7lmsGps7sy/fVNvl1ljKBj4Djp9pb3U2FLogjiIlW0cDAkPmLlG9t+b/pjEfBNlhjANUVN06pvQVAfm+LcF26EaWT6FlISBqb6jSy4BHRa3Bdc4Sx7+pRSYSqVVvYxLkfAWsKPqGkvWhebJDndJJV9syXQXgZ+v/uJ+6XOS43xkAdeL8iBzIs/FlwMTfh3tVe3d0lb65IBBLlCzeQuetX+0Vu1YFcnD0mHc/wS2ZnAV5toAFmyVQBoY/XAZiZeaOkcROJ6Zmqezy7liwK7BqsYyAZntMhk8lbg==
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 883 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 30876
;; flags: qr rd ra ad cd ; qd: 1 an: 4 au: 0 ad: 1
;; QUESTIONS:
;; ., type = DNSKEY, class = IN
;; ANSWERS:
. 87382 IN DNSKEY 256 3 8 AwEAAe3fSrbLBy3LOS7pnxEUhvPZTE2H5dIGsI/UfruI/nOEvWWa/PSX2BFedBkEqOlYdjdNF2f+6lmfk2Od/xu0v5bVqxFE+/24v3hZSlWBxvXzPTAGHrbW/IJYEPqlzVOAS4XdUgHg0N7IbLywNHMvB+Yf+Nm6ctyXXFLV4WTNnzs7
. 87382 IN DNSKEY 257 3 8 AwEAAagAIKlVZrpC6Ia7gEzahOR+9W29euxhJhVVLOyQbSEW0O8gcCjFFVQUTf6v58fLjwBd0YI0EzrAcQqBGCzh/RStIoO8g0NfnfL2MTJRkxoXbfDaUeVPQuYEhg37NZWAJQ9VnMVDxP/VHL496M/QZxkjf5/Efucp2gaDX6RS6CXpoY68LsvPVjR0ZSwzz1apAzvN9dlzEheX7ICJBBtuA6G3LQpzW5hOA2hzCTMjJPJ8LbqF6dsV6DoBQzgul0sGIcGOYl7OyQdXfZ57relSQageu+ipAdTTJ25AsRTAoub8ONGcLmqrAmRLKBP1dfwhYB4N7knNnulqQxA+Uk1ihz0=
. 87382 IN DNSKEY 256 3 8 AwEAAaPD7Y7XIi1MOEREJNTrRhyqsY3gff6JWzg+XCbqut1sbcbvqyssHw8DT1AkRaAC92pO8xuyq5QEgEPL1IHfABLwpwXI5gTj4gdwi86bpkmlWs9fRpnn4DPDCTdrnxIejJXgClHikLJF3u3CdpNCMijq4CKdQbMlRZ3avv+G7rh7
. 87382 IN RRSIG DNSKEY 8 0 172800 20150115235959 20150101000000 19036 . i8cAxD2pvQi1oAyvQxRpDfFlbqPzW+69QQEsDwE1eWOm5AtawO9U7lmsGps7sy/fVNvl1ljKBj4Djp9pb3U2FLogjiIlW0cDAkPmLlG9t+b/pjEfBNlhjANUVN06pvQVAfm+LcF26EaWT6FlISBqb6jSy4BHRa3Bdc4Sx7+pRSYSqVVvYxLkfAWsKPqGkvWhebJDndJJV9syXQXgZ+v/uJ+6XOS43xkAdeL8iBzIs/FlwMTfh3tVe3d0lb65IBBLlCzeQuetX+0Vu1YFcnD0mHc/wS2ZnAV5toAFmyVQBoY/XAZiZeaOkcROJ6Zmqezy7liwK7BqsYyAZntMhk8lbg==
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 883 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 60920
;; flags: qr aa rd ra cd ; qd: 1 an: 2 au: 2 ad: 3
;; QUESTIONS:
;; www.ingotronic.ch., type = A, class = IN
;; ANSWERS:
www.ingotronic.ch. 300 IN A 127.0.0.1
www.ingotronic.ch. 300 IN RRSIG A 5 3 300 20150125012443 20141226010256 17430 ingotronic.ch. hkD2bkHZKHoJX8cg69j6l1JXE7iYlVFc0iMo3/3hcq4TqieiT2El/9DLfMSxa7XyB/HRDG5Ul61E56pwlCDdxkwemtAuTzjCpqAtvQ5l5OEtTM4i6nijKBkRRzHjh99qDI1jh9GFv3jkTk5m7iaMQemUB4VTjKGLcZHXvWmQLbg=
;; AUTHORITY RECORDS:
ingotronic.ch. 300 IN NS ns1.ingotronic.ch.
ingotronic.ch. 300 IN RRSIG NS 5 2 300 20150125000532 20141225234703 17430 ingotronic.ch. VuzVJM3McSHlcdngCG/G23zCikq8tXE0CZV2ZSgUFXXFMIEoM6PMi1QRQ/8VF3tee4WGpRx2jhtkui0wFRFfwIhW7G1uPDT4qogaR3KLIyuCEsMxhRH3WJZNrLmLqlSBGvd9OBJwbmryqm3Zzqvrk+E+rh8OJeifnBBpHAX4eHg=
;; ADDITIONAL RECORDS:
ns1.ingotronic.ch. 300 IN A 62.192.5.131
ns1.ingotronic.ch. 300 IN RRSIG A 5 3 300 20150125005754 20141226001054 17430 ingotronic.ch. fNG1RZM53pXwBxruHNaSZszxVzNLoCq8VZsTjAzYH2vSLzHXYVGJFTLIeY0K9APAdyJU8WuwmABmn7XY0Kg39kRG77uoFlqUws2PdTz2QKOwJGZY7W88Ak2Y9lkDBcK8o3wJHVptrT8R7p/1U7UfjF0kqPUkakk2B0EbFWdagFg=
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 615 bytes
###############################################
testDnskeyPrimeResponseWithMismatchedAlgorithmIsBad 0000664 0000000 0000000 00000005534 13020541473 0041561 0 ustar 00root root 0000000 0000000 dnssecjava-1.1.3/src/test/resources/recordings/org_jitsi_dnssec_TestPriming #Date: 2015-01-06T22:34:52+01:00
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 23439
;; flags: qr aa rd ra cd ; qd: 1 an: 2 au: 2 ad: 3
;; QUESTIONS:
;; www.ingotronic.ch., type = A, class = IN
;; ANSWERS:
www.ingotronic.ch. 300 IN A 127.0.0.1
www.ingotronic.ch. 300 IN RRSIG A 5 3 300 20150125012443 20141226010256 17430 ingotronic.ch. hkD2bkHZKHoJX8cg69j6l1JXE7iYlVFc0iMo3/3hcq4TqieiT2El/9DLfMSxa7XyB/HRDG5Ul61E56pwlCDdxkwemtAuTzjCpqAtvQ5l5OEtTM4i6nijKBkRRzHjh99qDI1jh9GFv3jkTk5m7iaMQemUB4VTjKGLcZHXvWmQLbg=
;; AUTHORITY RECORDS:
ingotronic.ch. 300 IN NS ns1.ingotronic.ch.
ingotronic.ch. 300 IN RRSIG NS 5 2 300 20150125000532 20141225234703 17430 ingotronic.ch. VuzVJM3McSHlcdngCG/G23zCikq8tXE0CZV2ZSgUFXXFMIEoM6PMi1QRQ/8VF3tee4WGpRx2jhtkui0wFRFfwIhW7G1uPDT4qogaR3KLIyuCEsMxhRH3WJZNrLmLqlSBGvd9OBJwbmryqm3Zzqvrk+E+rh8OJeifnBBpHAX4eHg=
;; ADDITIONAL RECORDS:
ns1.ingotronic.ch. 300 IN A 62.192.5.131
ns1.ingotronic.ch. 300 IN RRSIG A 5 3 300 20150125005754 20141226001054 17430 ingotronic.ch. fNG1RZM53pXwBxruHNaSZszxVzNLoCq8VZsTjAzYH2vSLzHXYVGJFTLIeY0K9APAdyJU8WuwmABmn7XY0Kg39kRG77uoFlqUws2PdTz2QKOwJGZY7W88Ak2Y9lkDBcK8o3wJHVptrT8R7p/1U7UfjF0kqPUkakk2B0EbFWdagFg=
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 615 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 59888
;; flags: qr rd ra ad cd ; qd: 1 an: 4 au: 0 ad: 1
;; QUESTIONS:
;; ., type = DNSKEY, class = IN
;; ANSWERS:
. 87381 IN DNSKEY 256 3 8 AwEAAaPD7Y7XIi1MOEREJNTrRhyqsY3gff6JWzg+XCbqut1sbcbvqyssHw8DT1AkRaAC92pO8xuyq5QEgEPL1IHfABLwpwXI5gTj4gdwi86bpkmlWs9fRpnn4DPDCTdrnxIejJXgClHikLJF3u3CdpNCMijq4CKdQbMlRZ3avv+G7rh7
. 87381 IN DNSKEY 256 3 8 AwEAAe3fSrbLBy3LOS7pnxEUhvPZTE2H5dIGsI/UfruI/nOEvWWa/PSX2BFedBkEqOlYdjdNF2f+6lmfk2Od/xu0v5bVqxFE+/24v3hZSlWBxvXzPTAGHrbW/IJYEPqlzVOAS4XdUgHg0N7IbLywNHMvB+Yf+Nm6ctyXXFLV4WTNnzs7
. 87381 IN DNSKEY 257 3 8 AwEAAagAIKlVZrpC6Ia7gEzahOR+9W29euxhJhVVLOyQbSEW0O8gcCjFFVQUTf6v58fLjwBd0YI0EzrAcQqBGCzh/RStIoO8g0NfnfL2MTJRkxoXbfDaUeVPQuYEhg37NZWAJQ9VnMVDxP/VHL496M/QZxkjf5/Efucp2gaDX6RS6CXpoY68LsvPVjR0ZSwzz1apAzvN9dlzEheX7ICJBBtuA6G3LQpzW5hOA2hzCTMjJPJ8LbqF6dsV6DoBQzgul0sGIcGOYl7OyQdXfZ57relSQageu+ipAdTTJ25AsRTAoub8ONGcLmqrAmRLKBP1dfwhYB4N7knNnulqQxA+Uk1ihz0=
. 87381 IN RRSIG DNSKEY 8 0 172800 20150115235959 20150101000000 19036 . i8cAxD2pvQi1oAyvQxRpDfFlbqPzW+69QQEsDwE1eWOm5AtawO9U7lmsGps7sy/fVNvl1ljKBj4Djp9pb3U2FLogjiIlW0cDAkPmLlG9t+b/pjEfBNlhjANUVN06pvQVAfm+LcF26EaWT6FlISBqb6jSy4BHRa3Bdc4Sx7+pRSYSqVVvYxLkfAWsKPqGkvWhebJDndJJV9syXQXgZ+v/uJ+6XOS43xkAdeL8iBzIs/FlwMTfh3tVe3d0lb65IBBLlCzeQuetX+0Vu1YFcnD0mHc/wS2ZnAV5toAFmyVQBoY/XAZiZeaOkcROJ6Zmqezy7liwK7BqsYyAZntMhk8lbg==
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 883 bytes
###############################################
testDnskeyPrimeResponseWithMismatchedFootprintIsBad 0000664 0000000 0000000 00000005534 13020541473 0041617 0 ustar 00root root 0000000 0000000 dnssecjava-1.1.3/src/test/resources/recordings/org_jitsi_dnssec_TestPriming #Date: 2015-01-06T22:34:51+01:00
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 42047
;; flags: qr aa rd ra cd ; qd: 1 an: 2 au: 2 ad: 3
;; QUESTIONS:
;; www.ingotronic.ch., type = A, class = IN
;; ANSWERS:
www.ingotronic.ch. 300 IN A 127.0.0.1
www.ingotronic.ch. 300 IN RRSIG A 5 3 300 20150125012443 20141226010256 17430 ingotronic.ch. hkD2bkHZKHoJX8cg69j6l1JXE7iYlVFc0iMo3/3hcq4TqieiT2El/9DLfMSxa7XyB/HRDG5Ul61E56pwlCDdxkwemtAuTzjCpqAtvQ5l5OEtTM4i6nijKBkRRzHjh99qDI1jh9GFv3jkTk5m7iaMQemUB4VTjKGLcZHXvWmQLbg=
;; AUTHORITY RECORDS:
ingotronic.ch. 300 IN NS ns1.ingotronic.ch.
ingotronic.ch. 300 IN RRSIG NS 5 2 300 20150125000532 20141225234703 17430 ingotronic.ch. VuzVJM3McSHlcdngCG/G23zCikq8tXE0CZV2ZSgUFXXFMIEoM6PMi1QRQ/8VF3tee4WGpRx2jhtkui0wFRFfwIhW7G1uPDT4qogaR3KLIyuCEsMxhRH3WJZNrLmLqlSBGvd9OBJwbmryqm3Zzqvrk+E+rh8OJeifnBBpHAX4eHg=
;; ADDITIONAL RECORDS:
ns1.ingotronic.ch. 300 IN A 62.192.5.131
ns1.ingotronic.ch. 300 IN RRSIG A 5 3 300 20150125005754 20141226001054 17430 ingotronic.ch. fNG1RZM53pXwBxruHNaSZszxVzNLoCq8VZsTjAzYH2vSLzHXYVGJFTLIeY0K9APAdyJU8WuwmABmn7XY0Kg39kRG77uoFlqUws2PdTz2QKOwJGZY7W88Ak2Y9lkDBcK8o3wJHVptrT8R7p/1U7UfjF0kqPUkakk2B0EbFWdagFg=
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 615 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 46248
;; flags: qr rd ra ad cd ; qd: 1 an: 4 au: 0 ad: 1
;; QUESTIONS:
;; ., type = DNSKEY, class = IN
;; ANSWERS:
. 87382 IN DNSKEY 257 3 8 AwEAAagAIKlVZrpC6Ia7gEzahOR+9W29euxhJhVVLOyQbSEW0O8gcCjFFVQUTf6v58fLjwBd0YI0EzrAcQqBGCzh/RStIoO8g0NfnfL2MTJRkxoXbfDaUeVPQuYEhg37NZWAJQ9VnMVDxP/VHL496M/QZxkjf5/Efucp2gaDX6RS6CXpoY68LsvPVjR0ZSwzz1apAzvN9dlzEheX7ICJBBtuA6G3LQpzW5hOA2hzCTMjJPJ8LbqF6dsV6DoBQzgul0sGIcGOYl7OyQdXfZ57relSQageu+ipAdTTJ25AsRTAoub8ONGcLmqrAmRLKBP1dfwhYB4N7knNnulqQxA+Uk1ihz0=
. 87382 IN DNSKEY 256 3 8 AwEAAe3fSrbLBy3LOS7pnxEUhvPZTE2H5dIGsI/UfruI/nOEvWWa/PSX2BFedBkEqOlYdjdNF2f+6lmfk2Od/xu0v5bVqxFE+/24v3hZSlWBxvXzPTAGHrbW/IJYEPqlzVOAS4XdUgHg0N7IbLywNHMvB+Yf+Nm6ctyXXFLV4WTNnzs7
. 87382 IN DNSKEY 256 3 8 AwEAAaPD7Y7XIi1MOEREJNTrRhyqsY3gff6JWzg+XCbqut1sbcbvqyssHw8DT1AkRaAC92pO8xuyq5QEgEPL1IHfABLwpwXI5gTj4gdwi86bpkmlWs9fRpnn4DPDCTdrnxIejJXgClHikLJF3u3CdpNCMijq4CKdQbMlRZ3avv+G7rh7
. 87382 IN RRSIG DNSKEY 8 0 172800 20150115235959 20150101000000 19036 . i8cAxD2pvQi1oAyvQxRpDfFlbqPzW+69QQEsDwE1eWOm5AtawO9U7lmsGps7sy/fVNvl1ljKBj4Djp9pb3U2FLogjiIlW0cDAkPmLlG9t+b/pjEfBNlhjANUVN06pvQVAfm+LcF26EaWT6FlISBqb6jSy4BHRa3Bdc4Sx7+pRSYSqVVvYxLkfAWsKPqGkvWhebJDndJJV9syXQXgZ+v/uJ+6XOS43xkAdeL8iBzIs/FlwMTfh3tVe3d0lb65IBBLlCzeQuetX+0Vu1YFcnD0mHc/wS2ZnAV5toAFmyVQBoY/XAZiZeaOkcROJ6Zmqezy7liwK7BqsYyAZntMhk8lbg==
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 883 bytes
###############################################
testDnskeyPrimeResponseWithWeirdHashIsBad 0000664 0000000 0000000 00000005534 13020541473 0037512 0 ustar 00root root 0000000 0000000 dnssecjava-1.1.3/src/test/resources/recordings/org_jitsi_dnssec_TestPriming #Date: 2015-01-06T22:34:50+01:00
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 53507
;; flags: qr aa rd ra cd ; qd: 1 an: 2 au: 2 ad: 3
;; QUESTIONS:
;; www.ingotronic.ch., type = A, class = IN
;; ANSWERS:
www.ingotronic.ch. 300 IN A 127.0.0.1
www.ingotronic.ch. 300 IN RRSIG A 5 3 300 20150125012443 20141226010256 17430 ingotronic.ch. hkD2bkHZKHoJX8cg69j6l1JXE7iYlVFc0iMo3/3hcq4TqieiT2El/9DLfMSxa7XyB/HRDG5Ul61E56pwlCDdxkwemtAuTzjCpqAtvQ5l5OEtTM4i6nijKBkRRzHjh99qDI1jh9GFv3jkTk5m7iaMQemUB4VTjKGLcZHXvWmQLbg=
;; AUTHORITY RECORDS:
ingotronic.ch. 300 IN NS ns1.ingotronic.ch.
ingotronic.ch. 300 IN RRSIG NS 5 2 300 20150125000532 20141225234703 17430 ingotronic.ch. VuzVJM3McSHlcdngCG/G23zCikq8tXE0CZV2ZSgUFXXFMIEoM6PMi1QRQ/8VF3tee4WGpRx2jhtkui0wFRFfwIhW7G1uPDT4qogaR3KLIyuCEsMxhRH3WJZNrLmLqlSBGvd9OBJwbmryqm3Zzqvrk+E+rh8OJeifnBBpHAX4eHg=
;; ADDITIONAL RECORDS:
ns1.ingotronic.ch. 300 IN A 62.192.5.131
ns1.ingotronic.ch. 300 IN RRSIG A 5 3 300 20150125005754 20141226001054 17430 ingotronic.ch. fNG1RZM53pXwBxruHNaSZszxVzNLoCq8VZsTjAzYH2vSLzHXYVGJFTLIeY0K9APAdyJU8WuwmABmn7XY0Kg39kRG77uoFlqUws2PdTz2QKOwJGZY7W88Ak2Y9lkDBcK8o3wJHVptrT8R7p/1U7UfjF0kqPUkakk2B0EbFWdagFg=
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 615 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 31035
;; flags: qr rd ra ad cd ; qd: 1 an: 4 au: 0 ad: 1
;; QUESTIONS:
;; ., type = DNSKEY, class = IN
;; ANSWERS:
. 87383 IN DNSKEY 257 3 8 AwEAAagAIKlVZrpC6Ia7gEzahOR+9W29euxhJhVVLOyQbSEW0O8gcCjFFVQUTf6v58fLjwBd0YI0EzrAcQqBGCzh/RStIoO8g0NfnfL2MTJRkxoXbfDaUeVPQuYEhg37NZWAJQ9VnMVDxP/VHL496M/QZxkjf5/Efucp2gaDX6RS6CXpoY68LsvPVjR0ZSwzz1apAzvN9dlzEheX7ICJBBtuA6G3LQpzW5hOA2hzCTMjJPJ8LbqF6dsV6DoBQzgul0sGIcGOYl7OyQdXfZ57relSQageu+ipAdTTJ25AsRTAoub8ONGcLmqrAmRLKBP1dfwhYB4N7knNnulqQxA+Uk1ihz0=
. 87383 IN DNSKEY 256 3 8 AwEAAaPD7Y7XIi1MOEREJNTrRhyqsY3gff6JWzg+XCbqut1sbcbvqyssHw8DT1AkRaAC92pO8xuyq5QEgEPL1IHfABLwpwXI5gTj4gdwi86bpkmlWs9fRpnn4DPDCTdrnxIejJXgClHikLJF3u3CdpNCMijq4CKdQbMlRZ3avv+G7rh7
. 87383 IN DNSKEY 256 3 8 AwEAAe3fSrbLBy3LOS7pnxEUhvPZTE2H5dIGsI/UfruI/nOEvWWa/PSX2BFedBkEqOlYdjdNF2f+6lmfk2Od/xu0v5bVqxFE+/24v3hZSlWBxvXzPTAGHrbW/IJYEPqlzVOAS4XdUgHg0N7IbLywNHMvB+Yf+Nm6ctyXXFLV4WTNnzs7
. 87383 IN RRSIG DNSKEY 8 0 172800 20150115235959 20150101000000 19036 . i8cAxD2pvQi1oAyvQxRpDfFlbqPzW+69QQEsDwE1eWOm5AtawO9U7lmsGps7sy/fVNvl1ljKBj4Djp9pb3U2FLogjiIlW0cDAkPmLlG9t+b/pjEfBNlhjANUVN06pvQVAfm+LcF26EaWT6FlISBqb6jSy4BHRa3Bdc4Sx7+pRSYSqVVvYxLkfAWsKPqGkvWhebJDndJJV9syXQXgZ+v/uJ+6XOS43xkAdeL8iBzIs/FlwMTfh3tVe3d0lb65IBBLlCzeQuetX+0Vu1YFcnD0mHc/wS2ZnAV5toAFmyVQBoY/XAZiZeaOkcROJ6Zmqezy7liwK7BqsYyAZntMhk8lbg==
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 883 bytes
###############################################
testDsNoDataWhenNsecIsFromChildApex 0000664 0000000 0000000 00000042442 13020541473 0036174 0 ustar 00root root 0000000 0000000 dnssecjava-1.1.3/src/test/resources/recordings/org_jitsi_dnssec_TestPriming #Date: 2015-01-06T22:34:51+01:00
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 7434
;; flags: qr aa rd ra cd ; qd: 1 an: 0 au: 4 ad: 1
;; QUESTIONS:
;; 1.sub.ingotronic.ch., type = NSEC, class = IN
;; ANSWERS:
;; AUTHORITY RECORDS:
sub.ingotronic.ch. 300 IN SOA ns1.ingotronic.ch. admin.ingotronic.ch. 2013032794 300 60 864000 300
sub.ingotronic.ch. 300 IN RRSIG SOA 5 3 300 20150201081246 20150102071246 3600 sub.ingotronic.ch. iyj09Qcj7m6Eec8MbAZiQW0sPEzTCtrulsANwrkOvg6wMTcKZt+EDaGRxdp0+6PcAURD60WP5PdKojY2qqN0th49nxA02e7d8xqlYDlD4B3svbviaf16p5AT012mFQ7JUSNQMgkj/4HznmfQtvpKjX+GHvlCBKKXbBKPFXKu77w=
sub.ingotronic.ch. 300 IN NSEC alias.sub.ingotronic.ch. A NS SOA RRSIG NSEC DNSKEY
sub.ingotronic.ch. 300 IN RRSIG NSEC 5 3 300 20150201075325 20150102071246 3600 sub.ingotronic.ch. Mm93ERE64aeLL7go+Dc0oamkdUWUAFe0zWDP1yYv1Zo+bVlk8WPxGdaT7soi/42qJZ27KMuYJBDgyy2GaapMbTgtLUcIwIp8fCtweVwoOSMs4jHCCmGNX6imjQR/xzx9Df0xYBYJNm3glN8qawn06tgpiG9zOqIQUcURr2E5lbo=
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 494 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 39413
;; flags: qr rd ra ad cd ; qd: 1 an: 4 au: 0 ad: 1
;; QUESTIONS:
;; ., type = DNSKEY, class = IN
;; ANSWERS:
. 87382 IN DNSKEY 256 3 8 AwEAAaPD7Y7XIi1MOEREJNTrRhyqsY3gff6JWzg+XCbqut1sbcbvqyssHw8DT1AkRaAC92pO8xuyq5QEgEPL1IHfABLwpwXI5gTj4gdwi86bpkmlWs9fRpnn4DPDCTdrnxIejJXgClHikLJF3u3CdpNCMijq4CKdQbMlRZ3avv+G7rh7
. 87382 IN DNSKEY 257 3 8 AwEAAagAIKlVZrpC6Ia7gEzahOR+9W29euxhJhVVLOyQbSEW0O8gcCjFFVQUTf6v58fLjwBd0YI0EzrAcQqBGCzh/RStIoO8g0NfnfL2MTJRkxoXbfDaUeVPQuYEhg37NZWAJQ9VnMVDxP/VHL496M/QZxkjf5/Efucp2gaDX6RS6CXpoY68LsvPVjR0ZSwzz1apAzvN9dlzEheX7ICJBBtuA6G3LQpzW5hOA2hzCTMjJPJ8LbqF6dsV6DoBQzgul0sGIcGOYl7OyQdXfZ57relSQageu+ipAdTTJ25AsRTAoub8ONGcLmqrAmRLKBP1dfwhYB4N7knNnulqQxA+Uk1ihz0=
. 87382 IN DNSKEY 256 3 8 AwEAAe3fSrbLBy3LOS7pnxEUhvPZTE2H5dIGsI/UfruI/nOEvWWa/PSX2BFedBkEqOlYdjdNF2f+6lmfk2Od/xu0v5bVqxFE+/24v3hZSlWBxvXzPTAGHrbW/IJYEPqlzVOAS4XdUgHg0N7IbLywNHMvB+Yf+Nm6ctyXXFLV4WTNnzs7
. 87382 IN RRSIG DNSKEY 8 0 172800 20150115235959 20150101000000 19036 . i8cAxD2pvQi1oAyvQxRpDfFlbqPzW+69QQEsDwE1eWOm5AtawO9U7lmsGps7sy/fVNvl1ljKBj4Djp9pb3U2FLogjiIlW0cDAkPmLlG9t+b/pjEfBNlhjANUVN06pvQVAfm+LcF26EaWT6FlISBqb6jSy4BHRa3Bdc4Sx7+pRSYSqVVvYxLkfAWsKPqGkvWhebJDndJJV9syXQXgZ+v/uJ+6XOS43xkAdeL8iBzIs/FlwMTfh3tVe3d0lb65IBBLlCzeQuetX+0Vu1YFcnD0mHc/wS2ZnAV5toAFmyVQBoY/XAZiZeaOkcROJ6Zmqezy7liwK7BqsYyAZntMhk8lbg==
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 883 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 409
;; flags: qr rd ra ad cd ; qd: 1 an: 2 au: 0 ad: 1
;; QUESTIONS:
;; ch., type = DS, class = IN
;; ANSWERS:
ch. 982 IN DS 46375 8 2 8F96646FC68BB7E4AF4C0750A6096FBC0D4ECDA3D3FA6DA06FDDB42EE50C6CF3
ch. 982 IN RRSIG DS 8 1 86400 20150112170000 20150105160000 16665 . thY7xYWBBxiBjqbQIb9fAG4TmQgnziwM7q6P1T3/ITxmECdvOCQnnZA3uD7qmN8uM0HudsD7+y+zgD3rsH4RSTKdL4kHSI0OnCxToMTvklghEgFDezqIRm8NkWdI2H4Stwrj20nYKSpLQxPI2EE54gs18P3KyO8bAUYv8Qx73xU=
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 238 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 55860
;; flags: qr rd ra ad cd ; qd: 1 an: 4 au: 0 ad: 1
;; QUESTIONS:
;; ch., type = DNSKEY, class = IN
;; ANSWERS:
ch. 983 IN DNSKEY 256 3 8 AwEAAcSLdT0fEmcFmLpeUkAJoeVaHKiu+nbuc43fWlqaCRVf8t2HA4uWxOk0O5ci9nrFTc8nq8oa5fk5Cj7CHh4yrX9qUCfTdIWTyp8BDEdJpS+Dyb0u9wQuVj+nQMj4fLzdQf4TJs3/qxuiLr3nL1UUwlhhXeqSqGVb7p3mtB5HJ8ad
ch. 983 IN DNSKEY 256 3 8 AwEAAcsg0kY6fw1wzYMhSAKTy+Y2JzAst66P/1odp9NECJJHbU8f4nwziI3onoFSBV0ZiSZhY1aH5dhdDZ7BkrqhVXSrZPAz0CvzjIxmB1gSOf9DeZvjQvoy97HqYolxsf+B3QQv2RKBT67elF5+JisKg3/dQISelKn8LhabSoVrMlD1
ch. 983 IN DNSKEY 257 3 8 AwEAAb7GhhZ8IAy/AhwmSms5DeQK5ad09wIIplEpYoiAIYXPtJvT1ReFzyfTp/2YP+g/PWDwHPh4qKAHa9x0VgbIQcGAeNakmfkAdWEmCnca323/SAml3mwfaX62G7/uYWae5zh8QTxZKNd+K1yZ5x0IxnI31chSl5xymRbTEHYZDKwSIRFM3fTxUMt93WFaBVWELReYotJBr++rvAWdnlay5TPBTvheLBkaiqtgM4GP8HK07Y+86lsZnEsj5K3G1KTV5SPpa82rqYAwxG9VKbmSE/6/kBR5jJHjt1rRt5Oe7v18aEtw0YCEN4vxq+KuvMoNVqXUsE9LBwHJD+QNwi6wmB0=
ch. 983 IN RRSIG DNSKEY 8 1 86400 20150127100909 20141212090909 46375 ch. bT8q0FWyeMH0SulNo6UdIIgZYNATwYsee2bikq2Gh339Bufma8eaqWIPYT3XKmxYPBFOw0bVl+kLZxTwbR1CFoCDXoP+qgQhh4mf9qkNiv2CDSc+0FE3FRREn+DAhYTUEuB58FPiPakFB8s8O7T+k2qhDae7jy4/y7Jl1lnjaBY8s7bzOUPhF0KKCNZmvoKwtL23ZdVeTSV1xM3jkiNnpzBKbcoSWECSGJVp1SE0BnRXdwQP41YTXFZ0310YjaTAUCC5qbMIWdEkHjfdSQtKBImnc85mkapq9w++XQ4zhauPWBtrPV3CcoCahjUaWdjrKVkibomlJZaN8MEO23CfQw==
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 893 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 32310
;; flags: qr rd ra cd ; qd: 1 an: 3 au: 0 ad: 1
;; QUESTIONS:
;; ingotronic.ch., type = DS, class = IN
;; ANSWERS:
ingotronic.ch. 3591 IN DS 6031 5 1 733D0218B571CD617B1A7493564B9FC4F12ADE82
ingotronic.ch. 3591 IN DS 6031 5 2 4A948F2FDADA24686E473EDAC00DCF972584C75E3FAA92C2021B6221449FF87E
ingotronic.ch. 3591 IN RRSIG DS 8 2 3600 20150129033614 20150105123019 60789 ch. rVPJP2HhzW7OkroK2axFj5Lb4iVWCH8Fp/Iq1rF952NDo72b8RiKje2RaAKJAGQ+wd0YgE+PAej04GCmkhlDJA/zvPeeTxuhy3HbJzReMlQ7fjyH+wW1hli+FuIYvogXWf7nO/9VyPORt8X/f/pjrOr3Vlj9sGLN8TGYpEuVSw4=
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 288 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 23793
;; flags: qr aa rd ra cd ; qd: 1 an: 4 au: 0 ad: 1
;; QUESTIONS:
;; ingotronic.ch., type = DNSKEY, class = IN
;; ANSWERS:
ingotronic.ch. 300 IN DNSKEY 256 3 5 AwEAAZ2Xh77GFzpEDx7EHYxShqltHgkiG+BOjBGifEmnJhQSdE5/yNSLFNcdhZZ8HUPxYnaedTqJcFFg4AzUsQklF/fECegTJdZjaj2WoL0/I8K7HMfY/hVuRZUWPNglYi8agJRX6gdkFTCpUNI7stpgKqxtzUJhhw15uG/lKMplwqUr
ingotronic.ch. 300 IN DNSKEY 257 3 5 AwEAAeA1vzmjaB+eBAcvhzpKEgAEFpvQ1rg4uKDW6MsQtacKoqBpgyep2+LuWotz5p/xYxj3NGsArwN8Ad5cY0FHRr8miTT0elOv6nvlqGIfRuhj/BXAQ1x4ihpSFslHw0lJMYFwxsUZWpUyjWX/nv1xRZMMwF46gui0N4OEbyTYusCk77D+A71k+K0EAitFIbIH4GCUKmH1H7HmXhSVH9bN/n7KEGwW32lmsuuUcJoRKDkcUvbMXY/9Xoa2quERrUg/rBbDUHowRPjYDS5GzY1+f4YY8s40BufGiqyUTKKXL953MVFK8gmezXA0hbmrnZ7CBOw/7238mORAdzExaX8n7CE=
ingotronic.ch. 300 IN RRSIG DNSKEY 5 2 300 20150125003700 20141226001657 6031 ingotronic.ch. rs1QlP2SlSpA2ELbzwg3DgWLzXWL3Lpv6CUJE2Q0qH2Zp7Qdy3cD+ZEtNh9v24Qv1M6JJ3zFt8mmZoCeW2ycuMbJCqBkW9CBuwF+VznZvZY2MxwPipvhvEEGP//0M8YAZJ66yQPDv3PTdAP8FYbIrJyvY44vwyncwbslpfHT9jAsrbfr3vuMuWps86dnP462q+0s1TxBfqi8mzo3gdavjHKWVNwohLahLKT+tWeu6DSzQv0YwMjwtkLgF7QRgx3ctIIkloOrnx9nHH1N6y+hxEB89fOlyVDjHhgL5uVtsD5fEdT0FJ2Gc/2nShEMMqIwr1/J9kUq1mNySff/uEe65Q==
ingotronic.ch. 300 IN RRSIG DNSKEY 5 2 300 20150125003700 20141226001657 17430 ingotronic.ch. mEwZjhQqeWksWD0TCnNBrtce4YkWJL3edqL6PvAUu8Fn+Ih437kEs3+pqdkgRsdYQ9HW+lBm/8pWwJlNAv0bi9NykItXMwAUFtncgq+6Pnh3iAM972GXSa5VV4LcGQ5b8CBdHCHiEKDqyPv5Hr5QfYL/FQaWlcNRh4QZZlZNPFA=
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 940 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 49730
;; flags: qr aa rd ra cd ; qd: 1 an: 3 au: 0 ad: 1
;; QUESTIONS:
;; sub.ingotronic.ch., type = DS, class = IN
;; ANSWERS:
sub.ingotronic.ch. 300 IN DS 42976 5 1 E638863370B9DE424C31CA03B99CCED96027B88C
sub.ingotronic.ch. 300 IN DS 42976 5 2 C54339C4B4EAACF8643D8FAE6C57836F8207F8D82088F1C51AF100123D2A42EF
sub.ingotronic.ch. 300 IN RRSIG DS 5 3 300 20150125004144 20141226003211 17430 ingotronic.ch. m1gkZjYlA6aeCibofiRybFhOLgRvP+UG5nzWjH4yfzjPnfODRqo8TkEbRc1wUS1etARSq9TrsCjlWSKdn3JBdQfi0uGa27lLproj6oHi1+enh+OKIjFRxScP1bPPcbCALRFOeIp9JA1TEAGsyn+pWSwRF/wpEfrTTbOj94tsxX0=
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 303 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 52421
;; flags: qr aa rd ra cd ; qd: 1 an: 4 au: 0 ad: 1
;; QUESTIONS:
;; sub.ingotronic.ch., type = DNSKEY, class = IN
;; ANSWERS:
sub.ingotronic.ch. 300 IN DNSKEY 257 3 5 AwEAAbVAfHflzOy0uICze0QDBfbrZrU1UN1LNc5D987u8qhP9Vz2pd4yb3rSLOuH9hG7ouAkI63qmtmq6TP71jRXyHr4F9/ZbD3hzhCkyXdo+KaPO70VXWtdIZUom5WuA92pzTB/WuiaWJ217SUeRXU9e4NwrpbDINd6sXcb+sBEFDRt0d/VbwAxa7vo8fl5qOmr/PzD7FoKFTnTWTfUduRsHMdlyYY+j8JfikDdTdeRuYuHzUCO3q3BcUEHrBnKE87JtEM0TQnDSe9OaLFxYARq+LMdHY2P/OZP8nWStSnB8d3E7Sc/FEOQZ9xKkmh1japxgoStjcnBKvz53DmwIXcvcRc=
sub.ingotronic.ch. 300 IN DNSKEY 256 3 5 AwEAAcsnnxVGj8qUAxBox/LKOrpdJG0S8Zfn/mMl+f52Odke62Et5blo+jrbXiOWa6+AlASOMYprqpaZ32b16UvtsuqruErqwy+M427TVTmG6LXEDe7rCNrJF0tIesQpwkA8WjlTRE2bcVHTwARL//smGhTlE9WTPAQGDdXyTUWYr1rX
sub.ingotronic.ch. 300 IN RRSIG DNSKEY 5 3 300 20150131230442 20150101222529 3600 sub.ingotronic.ch. mPYA7Wo+MdzLLleV32ZvynRVzdnL97XgGqzeUPiI7LSXfaSEOtpoE3GeosbLIjGmZ42wLTYOXWm4YS/Mb9ctQGuNPQRMgQbVPkv/aOO6tX+Vqq1XJkKgdb7dRdvvs4jzjIOH/a++OpUy0EBKKioAkwKCrcTNqLkRQ0IkTyoaaCA=
sub.ingotronic.ch. 300 IN RRSIG DNSKEY 5 3 300 20150131230442 20150101222529 42976 sub.ingotronic.ch. Z2/JMubvx8hgfIzmvmXVSfe/qCbZZ3XlJsj3ZrAa8+izrRODKYrGVOtJ+ONPOwid6NQN40yizJoxNFfvkDDqUiZJO6vpb9FmStj034RD1hfC/7qsLoCdOLkLoQwrQDoYTIwLywpsduCW83JzbGBzzCkC9+aoFPVXIkcGUqoQCdYB5OXzF9/2uWq8tD7AQ6t5MzPeMJC+VcNOjqBPRkunl27yUreNt1Nb65C38S72DAJNzAZIZqj1A8jZ6tk0fdixmZ+KWelP8S9SW2TpeGxwJ4kbHJJ+vSo7dkqRtnIYv4GPW6Xp3GH1oErTMGeqp9mquQ6n6jWP6ejlwc6puMxjNQ==
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 952 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 31198
;; flags: qr aa rd ra cd ; qd: 1 an: 2 au: 2 ad: 3
;; QUESTIONS:
;; sub.ingotronic.ch., type = A, class = IN
;; ANSWERS:
sub.ingotronic.ch. 300 IN A 127.0.0.1
sub.ingotronic.ch. 300 IN RRSIG A 5 3 300 20150131215757 20150101212100 3600 sub.ingotronic.ch. n5sXfpaxmFD6fFEvMEW+DwUJSP3yshFzkbc6idvWENf2b7F90jp093w4y0YkYsG5fWroQvHCJAMnXbawOEfFWquLhVJc8HHvZDXUeQb55rFYg8qYd1fOoP7/Z5hbwBNLSCGn3JPjCRXVfnEa58lKARgr+KZ1gqI/2Dm+jOoZ2Uc=
;; AUTHORITY RECORDS:
sub.ingotronic.ch. 300 IN NS ns1.ingotronic.ch.
sub.ingotronic.ch. 300 IN RRSIG NS 5 3 300 20150131215757 20150101212100 3600 sub.ingotronic.ch. sXlfjCvwDECHOum9PfpnP+/d7A1MntO1H4jYBpsFvQru3YoR02TghQhoReszEeds39AUWJFT8u9Bk+OrKUS+Ubi6i+wbaiKFpoRHdzWDN3YFu3flRx+2chdVl9KkGywcYBi2j51iDWjKbWoCE3E1t7OoA/DBqSACyeLLsolagpY=
;; ADDITIONAL RECORDS:
ns1.ingotronic.ch. 300 IN A 62.192.5.131
ns1.ingotronic.ch. 300 IN RRSIG A 5 3 300 20150125005754 20141226001054 17430 ingotronic.ch. fNG1RZM53pXwBxruHNaSZszxVzNLoCq8VZsTjAzYH2vSLzHXYVGJFTLIeY0K9APAdyJU8WuwmABmn7XY0Kg39kRG77uoFlqUws2PdTz2QKOwJGZY7W88Ak2Y9lkDBcK8o3wJHVptrT8R7p/1U7UfjF0kqPUkakk2B0EbFWdagFg=
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 623 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 12532
;; flags: qr rd ra ad cd ; qd: 1 an: 4 au: 0 ad: 1
;; QUESTIONS:
;; ., type = DNSKEY, class = IN
;; ANSWERS:
. 87382 IN DNSKEY 257 3 8 AwEAAagAIKlVZrpC6Ia7gEzahOR+9W29euxhJhVVLOyQbSEW0O8gcCjFFVQUTf6v58fLjwBd0YI0EzrAcQqBGCzh/RStIoO8g0NfnfL2MTJRkxoXbfDaUeVPQuYEhg37NZWAJQ9VnMVDxP/VHL496M/QZxkjf5/Efucp2gaDX6RS6CXpoY68LsvPVjR0ZSwzz1apAzvN9dlzEheX7ICJBBtuA6G3LQpzW5hOA2hzCTMjJPJ8LbqF6dsV6DoBQzgul0sGIcGOYl7OyQdXfZ57relSQageu+ipAdTTJ25AsRTAoub8ONGcLmqrAmRLKBP1dfwhYB4N7knNnulqQxA+Uk1ihz0=
. 87382 IN DNSKEY 256 3 8 AwEAAaPD7Y7XIi1MOEREJNTrRhyqsY3gff6JWzg+XCbqut1sbcbvqyssHw8DT1AkRaAC92pO8xuyq5QEgEPL1IHfABLwpwXI5gTj4gdwi86bpkmlWs9fRpnn4DPDCTdrnxIejJXgClHikLJF3u3CdpNCMijq4CKdQbMlRZ3avv+G7rh7
. 87382 IN DNSKEY 256 3 8 AwEAAe3fSrbLBy3LOS7pnxEUhvPZTE2H5dIGsI/UfruI/nOEvWWa/PSX2BFedBkEqOlYdjdNF2f+6lmfk2Od/xu0v5bVqxFE+/24v3hZSlWBxvXzPTAGHrbW/IJYEPqlzVOAS4XdUgHg0N7IbLywNHMvB+Yf+Nm6ctyXXFLV4WTNnzs7
. 87382 IN RRSIG DNSKEY 8 0 172800 20150115235959 20150101000000 19036 . i8cAxD2pvQi1oAyvQxRpDfFlbqPzW+69QQEsDwE1eWOm5AtawO9U7lmsGps7sy/fVNvl1ljKBj4Djp9pb3U2FLogjiIlW0cDAkPmLlG9t+b/pjEfBNlhjANUVN06pvQVAfm+LcF26EaWT6FlISBqb6jSy4BHRa3Bdc4Sx7+pRSYSqVVvYxLkfAWsKPqGkvWhebJDndJJV9syXQXgZ+v/uJ+6XOS43xkAdeL8iBzIs/FlwMTfh3tVe3d0lb65IBBLlCzeQuetX+0Vu1YFcnD0mHc/wS2ZnAV5toAFmyVQBoY/XAZiZeaOkcROJ6Zmqezy7liwK7BqsYyAZntMhk8lbg==
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 883 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 27836
;; flags: qr rd ra ad cd ; qd: 1 an: 2 au: 0 ad: 1
;; QUESTIONS:
;; ch., type = DS, class = IN
;; ANSWERS:
ch. 982 IN DS 46375 8 2 8F96646FC68BB7E4AF4C0750A6096FBC0D4ECDA3D3FA6DA06FDDB42EE50C6CF3
ch. 982 IN RRSIG DS 8 1 86400 20150112170000 20150105160000 16665 . thY7xYWBBxiBjqbQIb9fAG4TmQgnziwM7q6P1T3/ITxmECdvOCQnnZA3uD7qmN8uM0HudsD7+y+zgD3rsH4RSTKdL4kHSI0OnCxToMTvklghEgFDezqIRm8NkWdI2H4Stwrj20nYKSpLQxPI2EE54gs18P3KyO8bAUYv8Qx73xU=
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 238 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 39901
;; flags: qr rd ra ad cd ; qd: 1 an: 4 au: 0 ad: 1
;; QUESTIONS:
;; ch., type = DNSKEY, class = IN
;; ANSWERS:
ch. 983 IN DNSKEY 256 3 8 AwEAAcSLdT0fEmcFmLpeUkAJoeVaHKiu+nbuc43fWlqaCRVf8t2HA4uWxOk0O5ci9nrFTc8nq8oa5fk5Cj7CHh4yrX9qUCfTdIWTyp8BDEdJpS+Dyb0u9wQuVj+nQMj4fLzdQf4TJs3/qxuiLr3nL1UUwlhhXeqSqGVb7p3mtB5HJ8ad
ch. 983 IN DNSKEY 256 3 8 AwEAAcsg0kY6fw1wzYMhSAKTy+Y2JzAst66P/1odp9NECJJHbU8f4nwziI3onoFSBV0ZiSZhY1aH5dhdDZ7BkrqhVXSrZPAz0CvzjIxmB1gSOf9DeZvjQvoy97HqYolxsf+B3QQv2RKBT67elF5+JisKg3/dQISelKn8LhabSoVrMlD1
ch. 983 IN DNSKEY 257 3 8 AwEAAb7GhhZ8IAy/AhwmSms5DeQK5ad09wIIplEpYoiAIYXPtJvT1ReFzyfTp/2YP+g/PWDwHPh4qKAHa9x0VgbIQcGAeNakmfkAdWEmCnca323/SAml3mwfaX62G7/uYWae5zh8QTxZKNd+K1yZ5x0IxnI31chSl5xymRbTEHYZDKwSIRFM3fTxUMt93WFaBVWELReYotJBr++rvAWdnlay5TPBTvheLBkaiqtgM4GP8HK07Y+86lsZnEsj5K3G1KTV5SPpa82rqYAwxG9VKbmSE/6/kBR5jJHjt1rRt5Oe7v18aEtw0YCEN4vxq+KuvMoNVqXUsE9LBwHJD+QNwi6wmB0=
ch. 983 IN RRSIG DNSKEY 8 1 86400 20150127100909 20141212090909 46375 ch. bT8q0FWyeMH0SulNo6UdIIgZYNATwYsee2bikq2Gh339Bufma8eaqWIPYT3XKmxYPBFOw0bVl+kLZxTwbR1CFoCDXoP+qgQhh4mf9qkNiv2CDSc+0FE3FRREn+DAhYTUEuB58FPiPakFB8s8O7T+k2qhDae7jy4/y7Jl1lnjaBY8s7bzOUPhF0KKCNZmvoKwtL23ZdVeTSV1xM3jkiNnpzBKbcoSWECSGJVp1SE0BnRXdwQP41YTXFZ0310YjaTAUCC5qbMIWdEkHjfdSQtKBImnc85mkapq9w++XQ4zhauPWBtrPV3CcoCahjUaWdjrKVkibomlJZaN8MEO23CfQw==
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 893 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 45415
;; flags: qr rd ra cd ; qd: 1 an: 3 au: 0 ad: 1
;; QUESTIONS:
;; ingotronic.ch., type = DS, class = IN
;; ANSWERS:
ingotronic.ch. 3590 IN DS 6031 5 2 4A948F2FDADA24686E473EDAC00DCF972584C75E3FAA92C2021B6221449FF87E
ingotronic.ch. 3590 IN DS 6031 5 1 733D0218B571CD617B1A7493564B9FC4F12ADE82
ingotronic.ch. 3590 IN RRSIG DS 8 2 3600 20150129033614 20150105123019 60789 ch. rVPJP2HhzW7OkroK2axFj5Lb4iVWCH8Fp/Iq1rF952NDo72b8RiKje2RaAKJAGQ+wd0YgE+PAej04GCmkhlDJA/zvPeeTxuhy3HbJzReMlQ7fjyH+wW1hli+FuIYvogXWf7nO/9VyPORt8X/f/pjrOr3Vlj9sGLN8TGYpEuVSw4=
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 288 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 9413
;; flags: qr aa rd ra cd ; qd: 1 an: 4 au: 0 ad: 1
;; QUESTIONS:
;; ingotronic.ch., type = DNSKEY, class = IN
;; ANSWERS:
ingotronic.ch. 300 IN DNSKEY 256 3 5 AwEAAZ2Xh77GFzpEDx7EHYxShqltHgkiG+BOjBGifEmnJhQSdE5/yNSLFNcdhZZ8HUPxYnaedTqJcFFg4AzUsQklF/fECegTJdZjaj2WoL0/I8K7HMfY/hVuRZUWPNglYi8agJRX6gdkFTCpUNI7stpgKqxtzUJhhw15uG/lKMplwqUr
ingotronic.ch. 300 IN DNSKEY 257 3 5 AwEAAeA1vzmjaB+eBAcvhzpKEgAEFpvQ1rg4uKDW6MsQtacKoqBpgyep2+LuWotz5p/xYxj3NGsArwN8Ad5cY0FHRr8miTT0elOv6nvlqGIfRuhj/BXAQ1x4ihpSFslHw0lJMYFwxsUZWpUyjWX/nv1xRZMMwF46gui0N4OEbyTYusCk77D+A71k+K0EAitFIbIH4GCUKmH1H7HmXhSVH9bN/n7KEGwW32lmsuuUcJoRKDkcUvbMXY/9Xoa2quERrUg/rBbDUHowRPjYDS5GzY1+f4YY8s40BufGiqyUTKKXL953MVFK8gmezXA0hbmrnZ7CBOw/7238mORAdzExaX8n7CE=
ingotronic.ch. 300 IN RRSIG DNSKEY 5 2 300 20150125003700 20141226001657 6031 ingotronic.ch. rs1QlP2SlSpA2ELbzwg3DgWLzXWL3Lpv6CUJE2Q0qH2Zp7Qdy3cD+ZEtNh9v24Qv1M6JJ3zFt8mmZoCeW2ycuMbJCqBkW9CBuwF+VznZvZY2MxwPipvhvEEGP//0M8YAZJ66yQPDv3PTdAP8FYbIrJyvY44vwyncwbslpfHT9jAsrbfr3vuMuWps86dnP462q+0s1TxBfqi8mzo3gdavjHKWVNwohLahLKT+tWeu6DSzQv0YwMjwtkLgF7QRgx3ctIIkloOrnx9nHH1N6y+hxEB89fOlyVDjHhgL5uVtsD5fEdT0FJ2Gc/2nShEMMqIwr1/J9kUq1mNySff/uEe65Q==
ingotronic.ch. 300 IN RRSIG DNSKEY 5 2 300 20150125003700 20141226001657 17430 ingotronic.ch. mEwZjhQqeWksWD0TCnNBrtce4YkWJL3edqL6PvAUu8Fn+Ih437kEs3+pqdkgRsdYQ9HW+lBm/8pWwJlNAv0bi9NykItXMwAUFtncgq+6Pnh3iAM972GXSa5VV4LcGQ5b8CBdHCHiEKDqyPv5Hr5QfYL/FQaWlcNRh4QZZlZNPFA=
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 940 bytes
###############################################
testDsNoDataWhenNsecOnEntIsBad 0000664 0000000 0000000 00000034360 13020541473 0035141 0 ustar 00root root 0000000 0000000 dnssecjava-1.1.3/src/test/resources/recordings/org_jitsi_dnssec_TestPriming #Date: 2015-01-06T22:34:52+01:00
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 3444
;; flags: qr aa rd ra cd ; qd: 1 an: 0 au: 4 ad: 1
;; QUESTIONS:
;; e.ingotronic.ch., type = DS, class = IN
;; ANSWERS:
;; AUTHORITY RECORDS:
ingotronic.ch. 300 IN SOA ns1.ingotronic.ch. admin.ingotronic.ch. 2013032762 300 60 864000 300
ingotronic.ch. 300 IN RRSIG SOA 5 2 300 20150125021244 20141226011244 17430 ingotronic.ch. WDLpp9G0P/rlMBfpFn9sAfpEFoBnQfwyGSXbGCc/LG1FSkJoKLDQYDY696scLNsJgkrzZeJrl0oSSvA8AvRUhYRrmuqWMxTVFgYlRwPwqEMCKUqiVhKGVF4NYemoBiUQC4nJwBZd57xKCiF4AQ4CodBtiZxefJFAlTNE0g2yxtM=
a.d.ingotronic.ch. 300 IN NSEC a.e.ingotronic.ch. A RRSIG NSEC
a.d.ingotronic.ch. 300 IN RRSIG NSEC 5 4 300 20150125011134 20141226002644 17430 ingotronic.ch. Xlth6wbhlD20uaeZZWKeREQgQBsYN6ztO8zPCWCeklur7YQ3X3aZJGhiNqPPhrdP2g9VEadeFQjCI5eGslXFoJtRPqAVswbk2K0wD8NSeoKRAXhW3N91AQodcalgOhiX5yuqST6gLxJl3WXgwUDvco+JvrfSFWV8FLwZ3RQ/26U=
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 479 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 45334
;; flags: qr rd ra ad cd ; qd: 1 an: 4 au: 0 ad: 1
;; QUESTIONS:
;; ., type = DNSKEY, class = IN
;; ANSWERS:
. 87381 IN DNSKEY 256 3 8 AwEAAaPD7Y7XIi1MOEREJNTrRhyqsY3gff6JWzg+XCbqut1sbcbvqyssHw8DT1AkRaAC92pO8xuyq5QEgEPL1IHfABLwpwXI5gTj4gdwi86bpkmlWs9fRpnn4DPDCTdrnxIejJXgClHikLJF3u3CdpNCMijq4CKdQbMlRZ3avv+G7rh7
. 87381 IN DNSKEY 257 3 8 AwEAAagAIKlVZrpC6Ia7gEzahOR+9W29euxhJhVVLOyQbSEW0O8gcCjFFVQUTf6v58fLjwBd0YI0EzrAcQqBGCzh/RStIoO8g0NfnfL2MTJRkxoXbfDaUeVPQuYEhg37NZWAJQ9VnMVDxP/VHL496M/QZxkjf5/Efucp2gaDX6RS6CXpoY68LsvPVjR0ZSwzz1apAzvN9dlzEheX7ICJBBtuA6G3LQpzW5hOA2hzCTMjJPJ8LbqF6dsV6DoBQzgul0sGIcGOYl7OyQdXfZ57relSQageu+ipAdTTJ25AsRTAoub8ONGcLmqrAmRLKBP1dfwhYB4N7knNnulqQxA+Uk1ihz0=
. 87381 IN DNSKEY 256 3 8 AwEAAe3fSrbLBy3LOS7pnxEUhvPZTE2H5dIGsI/UfruI/nOEvWWa/PSX2BFedBkEqOlYdjdNF2f+6lmfk2Od/xu0v5bVqxFE+/24v3hZSlWBxvXzPTAGHrbW/IJYEPqlzVOAS4XdUgHg0N7IbLywNHMvB+Yf+Nm6ctyXXFLV4WTNnzs7
. 87381 IN RRSIG DNSKEY 8 0 172800 20150115235959 20150101000000 19036 . i8cAxD2pvQi1oAyvQxRpDfFlbqPzW+69QQEsDwE1eWOm5AtawO9U7lmsGps7sy/fVNvl1ljKBj4Djp9pb3U2FLogjiIlW0cDAkPmLlG9t+b/pjEfBNlhjANUVN06pvQVAfm+LcF26EaWT6FlISBqb6jSy4BHRa3Bdc4Sx7+pRSYSqVVvYxLkfAWsKPqGkvWhebJDndJJV9syXQXgZ+v/uJ+6XOS43xkAdeL8iBzIs/FlwMTfh3tVe3d0lb65IBBLlCzeQuetX+0Vu1YFcnD0mHc/wS2ZnAV5toAFmyVQBoY/XAZiZeaOkcROJ6Zmqezy7liwK7BqsYyAZntMhk8lbg==
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 883 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 28115
;; flags: qr rd ra ad cd ; qd: 1 an: 2 au: 0 ad: 1
;; QUESTIONS:
;; ch., type = DS, class = IN
;; ANSWERS:
ch. 981 IN DS 46375 8 2 8F96646FC68BB7E4AF4C0750A6096FBC0D4ECDA3D3FA6DA06FDDB42EE50C6CF3
ch. 981 IN RRSIG DS 8 1 86400 20150112170000 20150105160000 16665 . thY7xYWBBxiBjqbQIb9fAG4TmQgnziwM7q6P1T3/ITxmECdvOCQnnZA3uD7qmN8uM0HudsD7+y+zgD3rsH4RSTKdL4kHSI0OnCxToMTvklghEgFDezqIRm8NkWdI2H4Stwrj20nYKSpLQxPI2EE54gs18P3KyO8bAUYv8Qx73xU=
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 238 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 8220
;; flags: qr rd ra ad cd ; qd: 1 an: 4 au: 0 ad: 1
;; QUESTIONS:
;; ch., type = DNSKEY, class = IN
;; ANSWERS:
ch. 982 IN DNSKEY 257 3 8 AwEAAb7GhhZ8IAy/AhwmSms5DeQK5ad09wIIplEpYoiAIYXPtJvT1ReFzyfTp/2YP+g/PWDwHPh4qKAHa9x0VgbIQcGAeNakmfkAdWEmCnca323/SAml3mwfaX62G7/uYWae5zh8QTxZKNd+K1yZ5x0IxnI31chSl5xymRbTEHYZDKwSIRFM3fTxUMt93WFaBVWELReYotJBr++rvAWdnlay5TPBTvheLBkaiqtgM4GP8HK07Y+86lsZnEsj5K3G1KTV5SPpa82rqYAwxG9VKbmSE/6/kBR5jJHjt1rRt5Oe7v18aEtw0YCEN4vxq+KuvMoNVqXUsE9LBwHJD+QNwi6wmB0=
ch. 982 IN DNSKEY 256 3 8 AwEAAcsg0kY6fw1wzYMhSAKTy+Y2JzAst66P/1odp9NECJJHbU8f4nwziI3onoFSBV0ZiSZhY1aH5dhdDZ7BkrqhVXSrZPAz0CvzjIxmB1gSOf9DeZvjQvoy97HqYolxsf+B3QQv2RKBT67elF5+JisKg3/dQISelKn8LhabSoVrMlD1
ch. 982 IN DNSKEY 256 3 8 AwEAAcSLdT0fEmcFmLpeUkAJoeVaHKiu+nbuc43fWlqaCRVf8t2HA4uWxOk0O5ci9nrFTc8nq8oa5fk5Cj7CHh4yrX9qUCfTdIWTyp8BDEdJpS+Dyb0u9wQuVj+nQMj4fLzdQf4TJs3/qxuiLr3nL1UUwlhhXeqSqGVb7p3mtB5HJ8ad
ch. 982 IN RRSIG DNSKEY 8 1 86400 20150127100909 20141212090909 46375 ch. bT8q0FWyeMH0SulNo6UdIIgZYNATwYsee2bikq2Gh339Bufma8eaqWIPYT3XKmxYPBFOw0bVl+kLZxTwbR1CFoCDXoP+qgQhh4mf9qkNiv2CDSc+0FE3FRREn+DAhYTUEuB58FPiPakFB8s8O7T+k2qhDae7jy4/y7Jl1lnjaBY8s7bzOUPhF0KKCNZmvoKwtL23ZdVeTSV1xM3jkiNnpzBKbcoSWECSGJVp1SE0BnRXdwQP41YTXFZ0310YjaTAUCC5qbMIWdEkHjfdSQtKBImnc85mkapq9w++XQ4zhauPWBtrPV3CcoCahjUaWdjrKVkibomlJZaN8MEO23CfQw==
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 893 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 12780
;; flags: qr rd ra cd ; qd: 1 an: 3 au: 0 ad: 1
;; QUESTIONS:
;; ingotronic.ch., type = DS, class = IN
;; ANSWERS:
ingotronic.ch. 3590 IN DS 6031 5 2 4A948F2FDADA24686E473EDAC00DCF972584C75E3FAA92C2021B6221449FF87E
ingotronic.ch. 3590 IN DS 6031 5 1 733D0218B571CD617B1A7493564B9FC4F12ADE82
ingotronic.ch. 3590 IN RRSIG DS 8 2 3600 20150129033614 20150105123019 60789 ch. rVPJP2HhzW7OkroK2axFj5Lb4iVWCH8Fp/Iq1rF952NDo72b8RiKje2RaAKJAGQ+wd0YgE+PAej04GCmkhlDJA/zvPeeTxuhy3HbJzReMlQ7fjyH+wW1hli+FuIYvogXWf7nO/9VyPORt8X/f/pjrOr3Vlj9sGLN8TGYpEuVSw4=
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 288 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 57848
;; flags: qr aa rd ra cd ; qd: 1 an: 4 au: 0 ad: 1
;; QUESTIONS:
;; ingotronic.ch., type = DNSKEY, class = IN
;; ANSWERS:
ingotronic.ch. 300 IN DNSKEY 257 3 5 AwEAAeA1vzmjaB+eBAcvhzpKEgAEFpvQ1rg4uKDW6MsQtacKoqBpgyep2+LuWotz5p/xYxj3NGsArwN8Ad5cY0FHRr8miTT0elOv6nvlqGIfRuhj/BXAQ1x4ihpSFslHw0lJMYFwxsUZWpUyjWX/nv1xRZMMwF46gui0N4OEbyTYusCk77D+A71k+K0EAitFIbIH4GCUKmH1H7HmXhSVH9bN/n7KEGwW32lmsuuUcJoRKDkcUvbMXY/9Xoa2quERrUg/rBbDUHowRPjYDS5GzY1+f4YY8s40BufGiqyUTKKXL953MVFK8gmezXA0hbmrnZ7CBOw/7238mORAdzExaX8n7CE=
ingotronic.ch. 300 IN DNSKEY 256 3 5 AwEAAZ2Xh77GFzpEDx7EHYxShqltHgkiG+BOjBGifEmnJhQSdE5/yNSLFNcdhZZ8HUPxYnaedTqJcFFg4AzUsQklF/fECegTJdZjaj2WoL0/I8K7HMfY/hVuRZUWPNglYi8agJRX6gdkFTCpUNI7stpgKqxtzUJhhw15uG/lKMplwqUr
ingotronic.ch. 300 IN RRSIG DNSKEY 5 2 300 20150125003700 20141226001657 6031 ingotronic.ch. rs1QlP2SlSpA2ELbzwg3DgWLzXWL3Lpv6CUJE2Q0qH2Zp7Qdy3cD+ZEtNh9v24Qv1M6JJ3zFt8mmZoCeW2ycuMbJCqBkW9CBuwF+VznZvZY2MxwPipvhvEEGP//0M8YAZJ66yQPDv3PTdAP8FYbIrJyvY44vwyncwbslpfHT9jAsrbfr3vuMuWps86dnP462q+0s1TxBfqi8mzo3gdavjHKWVNwohLahLKT+tWeu6DSzQv0YwMjwtkLgF7QRgx3ctIIkloOrnx9nHH1N6y+hxEB89fOlyVDjHhgL5uVtsD5fEdT0FJ2Gc/2nShEMMqIwr1/J9kUq1mNySff/uEe65Q==
ingotronic.ch. 300 IN RRSIG DNSKEY 5 2 300 20150125003700 20141226001657 17430 ingotronic.ch. mEwZjhQqeWksWD0TCnNBrtce4YkWJL3edqL6PvAUu8Fn+Ih437kEs3+pqdkgRsdYQ9HW+lBm/8pWwJlNAv0bi9NykItXMwAUFtncgq+6Pnh3iAM972GXSa5VV4LcGQ5b8CBdHCHiEKDqyPv5Hr5QfYL/FQaWlcNRh4QZZlZNPFA=
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 940 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 46058
;; flags: qr aa rd ra cd ; qd: 1 an: 1 au: 1 ad: 3
;; QUESTIONS:
;; a.e.ingotronic.ch., type = A, class = IN
;; ANSWERS:
a.e.ingotronic.ch. 300 IN A 127.0.0.1
;; AUTHORITY RECORDS:
a.e.ingotronic.ch. 300 IN NS ns1.ingotronic.ch.
;; ADDITIONAL RECORDS:
ns1.ingotronic.ch. 300 IN A 62.192.5.131
ns1.ingotronic.ch. 300 IN RRSIG A 5 3 300 20150125005754 20141226001054 17430 ingotronic.ch. fNG1RZM53pXwBxruHNaSZszxVzNLoCq8VZsTjAzYH2vSLzHXYVGJFTLIeY0K9APAdyJU8WuwmABmn7XY0Kg39kRG77uoFlqUws2PdTz2QKOwJGZY7W88Ak2Y9lkDBcK8o3wJHVptrT8R7p/1U7UfjF0kqPUkakk2B0EbFWdagFg=
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 269 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 42039
;; flags: qr rd ra ad cd ; qd: 1 an: 4 au: 0 ad: 1
;; QUESTIONS:
;; ., type = DNSKEY, class = IN
;; ANSWERS:
. 87381 IN DNSKEY 257 3 8 AwEAAagAIKlVZrpC6Ia7gEzahOR+9W29euxhJhVVLOyQbSEW0O8gcCjFFVQUTf6v58fLjwBd0YI0EzrAcQqBGCzh/RStIoO8g0NfnfL2MTJRkxoXbfDaUeVPQuYEhg37NZWAJQ9VnMVDxP/VHL496M/QZxkjf5/Efucp2gaDX6RS6CXpoY68LsvPVjR0ZSwzz1apAzvN9dlzEheX7ICJBBtuA6G3LQpzW5hOA2hzCTMjJPJ8LbqF6dsV6DoBQzgul0sGIcGOYl7OyQdXfZ57relSQageu+ipAdTTJ25AsRTAoub8ONGcLmqrAmRLKBP1dfwhYB4N7knNnulqQxA+Uk1ihz0=
. 87381 IN DNSKEY 256 3 8 AwEAAaPD7Y7XIi1MOEREJNTrRhyqsY3gff6JWzg+XCbqut1sbcbvqyssHw8DT1AkRaAC92pO8xuyq5QEgEPL1IHfABLwpwXI5gTj4gdwi86bpkmlWs9fRpnn4DPDCTdrnxIejJXgClHikLJF3u3CdpNCMijq4CKdQbMlRZ3avv+G7rh7
. 87381 IN DNSKEY 256 3 8 AwEAAe3fSrbLBy3LOS7pnxEUhvPZTE2H5dIGsI/UfruI/nOEvWWa/PSX2BFedBkEqOlYdjdNF2f+6lmfk2Od/xu0v5bVqxFE+/24v3hZSlWBxvXzPTAGHrbW/IJYEPqlzVOAS4XdUgHg0N7IbLywNHMvB+Yf+Nm6ctyXXFLV4WTNnzs7
. 87381 IN RRSIG DNSKEY 8 0 172800 20150115235959 20150101000000 19036 . i8cAxD2pvQi1oAyvQxRpDfFlbqPzW+69QQEsDwE1eWOm5AtawO9U7lmsGps7sy/fVNvl1ljKBj4Djp9pb3U2FLogjiIlW0cDAkPmLlG9t+b/pjEfBNlhjANUVN06pvQVAfm+LcF26EaWT6FlISBqb6jSy4BHRa3Bdc4Sx7+pRSYSqVVvYxLkfAWsKPqGkvWhebJDndJJV9syXQXgZ+v/uJ+6XOS43xkAdeL8iBzIs/FlwMTfh3tVe3d0lb65IBBLlCzeQuetX+0Vu1YFcnD0mHc/wS2ZnAV5toAFmyVQBoY/XAZiZeaOkcROJ6Zmqezy7liwK7BqsYyAZntMhk8lbg==
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 883 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 44314
;; flags: qr rd ra ad cd ; qd: 1 an: 2 au: 0 ad: 1
;; QUESTIONS:
;; ch., type = DS, class = IN
;; ANSWERS:
ch. 981 IN DS 46375 8 2 8F96646FC68BB7E4AF4C0750A6096FBC0D4ECDA3D3FA6DA06FDDB42EE50C6CF3
ch. 981 IN RRSIG DS 8 1 86400 20150112170000 20150105160000 16665 . thY7xYWBBxiBjqbQIb9fAG4TmQgnziwM7q6P1T3/ITxmECdvOCQnnZA3uD7qmN8uM0HudsD7+y+zgD3rsH4RSTKdL4kHSI0OnCxToMTvklghEgFDezqIRm8NkWdI2H4Stwrj20nYKSpLQxPI2EE54gs18P3KyO8bAUYv8Qx73xU=
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 238 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 56200
;; flags: qr rd ra ad cd ; qd: 1 an: 4 au: 0 ad: 1
;; QUESTIONS:
;; ch., type = DNSKEY, class = IN
;; ANSWERS:
ch. 982 IN DNSKEY 257 3 8 AwEAAb7GhhZ8IAy/AhwmSms5DeQK5ad09wIIplEpYoiAIYXPtJvT1ReFzyfTp/2YP+g/PWDwHPh4qKAHa9x0VgbIQcGAeNakmfkAdWEmCnca323/SAml3mwfaX62G7/uYWae5zh8QTxZKNd+K1yZ5x0IxnI31chSl5xymRbTEHYZDKwSIRFM3fTxUMt93WFaBVWELReYotJBr++rvAWdnlay5TPBTvheLBkaiqtgM4GP8HK07Y+86lsZnEsj5K3G1KTV5SPpa82rqYAwxG9VKbmSE/6/kBR5jJHjt1rRt5Oe7v18aEtw0YCEN4vxq+KuvMoNVqXUsE9LBwHJD+QNwi6wmB0=
ch. 982 IN DNSKEY 256 3 8 AwEAAcsg0kY6fw1wzYMhSAKTy+Y2JzAst66P/1odp9NECJJHbU8f4nwziI3onoFSBV0ZiSZhY1aH5dhdDZ7BkrqhVXSrZPAz0CvzjIxmB1gSOf9DeZvjQvoy97HqYolxsf+B3QQv2RKBT67elF5+JisKg3/dQISelKn8LhabSoVrMlD1
ch. 982 IN DNSKEY 256 3 8 AwEAAcSLdT0fEmcFmLpeUkAJoeVaHKiu+nbuc43fWlqaCRVf8t2HA4uWxOk0O5ci9nrFTc8nq8oa5fk5Cj7CHh4yrX9qUCfTdIWTyp8BDEdJpS+Dyb0u9wQuVj+nQMj4fLzdQf4TJs3/qxuiLr3nL1UUwlhhXeqSqGVb7p3mtB5HJ8ad
ch. 982 IN RRSIG DNSKEY 8 1 86400 20150127100909 20141212090909 46375 ch. bT8q0FWyeMH0SulNo6UdIIgZYNATwYsee2bikq2Gh339Bufma8eaqWIPYT3XKmxYPBFOw0bVl+kLZxTwbR1CFoCDXoP+qgQhh4mf9qkNiv2CDSc+0FE3FRREn+DAhYTUEuB58FPiPakFB8s8O7T+k2qhDae7jy4/y7Jl1lnjaBY8s7bzOUPhF0KKCNZmvoKwtL23ZdVeTSV1xM3jkiNnpzBKbcoSWECSGJVp1SE0BnRXdwQP41YTXFZ0310YjaTAUCC5qbMIWdEkHjfdSQtKBImnc85mkapq9w++XQ4zhauPWBtrPV3CcoCahjUaWdjrKVkibomlJZaN8MEO23CfQw==
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 893 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 56568
;; flags: qr rd ra cd ; qd: 1 an: 3 au: 0 ad: 1
;; QUESTIONS:
;; ingotronic.ch., type = DS, class = IN
;; ANSWERS:
ingotronic.ch. 3590 IN DS 6031 5 1 733D0218B571CD617B1A7493564B9FC4F12ADE82
ingotronic.ch. 3590 IN DS 6031 5 2 4A948F2FDADA24686E473EDAC00DCF972584C75E3FAA92C2021B6221449FF87E
ingotronic.ch. 3590 IN RRSIG DS 8 2 3600 20150129033614 20150105123019 60789 ch. rVPJP2HhzW7OkroK2axFj5Lb4iVWCH8Fp/Iq1rF952NDo72b8RiKje2RaAKJAGQ+wd0YgE+PAej04GCmkhlDJA/zvPeeTxuhy3HbJzReMlQ7fjyH+wW1hli+FuIYvogXWf7nO/9VyPORt8X/f/pjrOr3Vlj9sGLN8TGYpEuVSw4=
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 288 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 57563
;; flags: qr aa rd ra cd ; qd: 1 an: 4 au: 0 ad: 1
;; QUESTIONS:
;; ingotronic.ch., type = DNSKEY, class = IN
;; ANSWERS:
ingotronic.ch. 300 IN DNSKEY 257 3 5 AwEAAeA1vzmjaB+eBAcvhzpKEgAEFpvQ1rg4uKDW6MsQtacKoqBpgyep2+LuWotz5p/xYxj3NGsArwN8Ad5cY0FHRr8miTT0elOv6nvlqGIfRuhj/BXAQ1x4ihpSFslHw0lJMYFwxsUZWpUyjWX/nv1xRZMMwF46gui0N4OEbyTYusCk77D+A71k+K0EAitFIbIH4GCUKmH1H7HmXhSVH9bN/n7KEGwW32lmsuuUcJoRKDkcUvbMXY/9Xoa2quERrUg/rBbDUHowRPjYDS5GzY1+f4YY8s40BufGiqyUTKKXL953MVFK8gmezXA0hbmrnZ7CBOw/7238mORAdzExaX8n7CE=
ingotronic.ch. 300 IN DNSKEY 256 3 5 AwEAAZ2Xh77GFzpEDx7EHYxShqltHgkiG+BOjBGifEmnJhQSdE5/yNSLFNcdhZZ8HUPxYnaedTqJcFFg4AzUsQklF/fECegTJdZjaj2WoL0/I8K7HMfY/hVuRZUWPNglYi8agJRX6gdkFTCpUNI7stpgKqxtzUJhhw15uG/lKMplwqUr
ingotronic.ch. 300 IN RRSIG DNSKEY 5 2 300 20150125003700 20141226001657 6031 ingotronic.ch. rs1QlP2SlSpA2ELbzwg3DgWLzXWL3Lpv6CUJE2Q0qH2Zp7Qdy3cD+ZEtNh9v24Qv1M6JJ3zFt8mmZoCeW2ycuMbJCqBkW9CBuwF+VznZvZY2MxwPipvhvEEGP//0M8YAZJ66yQPDv3PTdAP8FYbIrJyvY44vwyncwbslpfHT9jAsrbfr3vuMuWps86dnP462q+0s1TxBfqi8mzo3gdavjHKWVNwohLahLKT+tWeu6DSzQv0YwMjwtkLgF7QRgx3ctIIkloOrnx9nHH1N6y+hxEB89fOlyVDjHhgL5uVtsD5fEdT0FJ2Gc/2nShEMMqIwr1/J9kUq1mNySff/uEe65Q==
ingotronic.ch. 300 IN RRSIG DNSKEY 5 2 300 20150125003700 20141226001657 17430 ingotronic.ch. mEwZjhQqeWksWD0TCnNBrtce4YkWJL3edqL6PvAUu8Fn+Ih437kEs3+pqdkgRsdYQ9HW+lBm/8pWwJlNAv0bi9NykItXMwAUFtncgq+6Pnh3iAM972GXSa5VV4LcGQ5b8CBdHCHiEKDqyPv5Hr5QfYL/FQaWlcNRh4QZZlZNPFA=
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 940 bytes
###############################################
testDsNoDataWhenOnInsecureDelegationWithWrongNsec 0000664 0000000 0000000 00000035023 13020541473 0041127 0 ustar 00root root 0000000 0000000 dnssecjava-1.1.3/src/test/resources/recordings/org_jitsi_dnssec_TestPriming #Date: 2015-01-06T22:34:51+01:00
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 54648
;; flags: qr aa rd ra cd ; qd: 1 an: 2 au: 2 ad: 3
;; QUESTIONS:
;; alias.ingotronic.ch., type = NSEC, class = IN
;; ANSWERS:
alias.ingotronic.ch. 300 IN NSEC a.b.ingotronic.ch. DNAME RRSIG NSEC
alias.ingotronic.ch. 300 IN RRSIG NSEC 5 3 300 20150125000532 20141225234703 17430 ingotronic.ch. mS+nh5skTxhOBdJlkwSGdrmhuA5FC9Am9emIhyIViET/1BoKotmbzLtfaBXAh2gRhcfDr+4OJJ6oyUcdMn/m4YG8NUsf4rAL92/YyxocUoF/oS8ZZv/BPXplCH5J4hsac+heElbPJ29v0kFVujErTaX/Ev0lYsUNI+9OmCrlQpk=
;; AUTHORITY RECORDS:
ingotronic.ch. 300 IN NS ns1.ingotronic.ch.
ingotronic.ch. 300 IN RRSIG NS 5 2 300 20150125000532 20141225234703 17430 ingotronic.ch. VuzVJM3McSHlcdngCG/G23zCikq8tXE0CZV2ZSgUFXXFMIEoM6PMi1QRQ/8VF3tee4WGpRx2jhtkui0wFRFfwIhW7G1uPDT4qogaR3KLIyuCEsMxhRH3WJZNrLmLqlSBGvd9OBJwbmryqm3Zzqvrk+E+rh8OJeifnBBpHAX4eHg=
;; ADDITIONAL RECORDS:
ns1.ingotronic.ch. 300 IN A 62.192.5.131
ns1.ingotronic.ch. 300 IN RRSIG A 5 3 300 20150125005754 20141226001054 17430 ingotronic.ch. fNG1RZM53pXwBxruHNaSZszxVzNLoCq8VZsTjAzYH2vSLzHXYVGJFTLIeY0K9APAdyJU8WuwmABmn7XY0Kg39kRG77uoFlqUws2PdTz2QKOwJGZY7W88Ak2Y9lkDBcK8o3wJHVptrT8R7p/1U7UfjF0kqPUkakk2B0EbFWdagFg=
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 640 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 1473
;; flags: qr rd ra ad cd ; qd: 1 an: 4 au: 0 ad: 1
;; QUESTIONS:
;; ., type = DNSKEY, class = IN
;; ANSWERS:
. 87383 IN DNSKEY 256 3 8 AwEAAaPD7Y7XIi1MOEREJNTrRhyqsY3gff6JWzg+XCbqut1sbcbvqyssHw8DT1AkRaAC92pO8xuyq5QEgEPL1IHfABLwpwXI5gTj4gdwi86bpkmlWs9fRpnn4DPDCTdrnxIejJXgClHikLJF3u3CdpNCMijq4CKdQbMlRZ3avv+G7rh7
. 87383 IN DNSKEY 257 3 8 AwEAAagAIKlVZrpC6Ia7gEzahOR+9W29euxhJhVVLOyQbSEW0O8gcCjFFVQUTf6v58fLjwBd0YI0EzrAcQqBGCzh/RStIoO8g0NfnfL2MTJRkxoXbfDaUeVPQuYEhg37NZWAJQ9VnMVDxP/VHL496M/QZxkjf5/Efucp2gaDX6RS6CXpoY68LsvPVjR0ZSwzz1apAzvN9dlzEheX7ICJBBtuA6G3LQpzW5hOA2hzCTMjJPJ8LbqF6dsV6DoBQzgul0sGIcGOYl7OyQdXfZ57relSQageu+ipAdTTJ25AsRTAoub8ONGcLmqrAmRLKBP1dfwhYB4N7knNnulqQxA+Uk1ihz0=
. 87383 IN DNSKEY 256 3 8 AwEAAe3fSrbLBy3LOS7pnxEUhvPZTE2H5dIGsI/UfruI/nOEvWWa/PSX2BFedBkEqOlYdjdNF2f+6lmfk2Od/xu0v5bVqxFE+/24v3hZSlWBxvXzPTAGHrbW/IJYEPqlzVOAS4XdUgHg0N7IbLywNHMvB+Yf+Nm6ctyXXFLV4WTNnzs7
. 87383 IN RRSIG DNSKEY 8 0 172800 20150115235959 20150101000000 19036 . i8cAxD2pvQi1oAyvQxRpDfFlbqPzW+69QQEsDwE1eWOm5AtawO9U7lmsGps7sy/fVNvl1ljKBj4Djp9pb3U2FLogjiIlW0cDAkPmLlG9t+b/pjEfBNlhjANUVN06pvQVAfm+LcF26EaWT6FlISBqb6jSy4BHRa3Bdc4Sx7+pRSYSqVVvYxLkfAWsKPqGkvWhebJDndJJV9syXQXgZ+v/uJ+6XOS43xkAdeL8iBzIs/FlwMTfh3tVe3d0lb65IBBLlCzeQuetX+0Vu1YFcnD0mHc/wS2ZnAV5toAFmyVQBoY/XAZiZeaOkcROJ6Zmqezy7liwK7BqsYyAZntMhk8lbg==
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 883 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 12527
;; flags: qr rd ra ad cd ; qd: 1 an: 2 au: 0 ad: 1
;; QUESTIONS:
;; ch., type = DS, class = IN
;; ANSWERS:
ch. 983 IN DS 46375 8 2 8F96646FC68BB7E4AF4C0750A6096FBC0D4ECDA3D3FA6DA06FDDB42EE50C6CF3
ch. 983 IN RRSIG DS 8 1 86400 20150112170000 20150105160000 16665 . thY7xYWBBxiBjqbQIb9fAG4TmQgnziwM7q6P1T3/ITxmECdvOCQnnZA3uD7qmN8uM0HudsD7+y+zgD3rsH4RSTKdL4kHSI0OnCxToMTvklghEgFDezqIRm8NkWdI2H4Stwrj20nYKSpLQxPI2EE54gs18P3KyO8bAUYv8Qx73xU=
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 238 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 45087
;; flags: qr rd ra ad cd ; qd: 1 an: 4 au: 0 ad: 1
;; QUESTIONS:
;; ch., type = DNSKEY, class = IN
;; ANSWERS:
ch. 984 IN DNSKEY 256 3 8 AwEAAcSLdT0fEmcFmLpeUkAJoeVaHKiu+nbuc43fWlqaCRVf8t2HA4uWxOk0O5ci9nrFTc8nq8oa5fk5Cj7CHh4yrX9qUCfTdIWTyp8BDEdJpS+Dyb0u9wQuVj+nQMj4fLzdQf4TJs3/qxuiLr3nL1UUwlhhXeqSqGVb7p3mtB5HJ8ad
ch. 984 IN DNSKEY 256 3 8 AwEAAcsg0kY6fw1wzYMhSAKTy+Y2JzAst66P/1odp9NECJJHbU8f4nwziI3onoFSBV0ZiSZhY1aH5dhdDZ7BkrqhVXSrZPAz0CvzjIxmB1gSOf9DeZvjQvoy97HqYolxsf+B3QQv2RKBT67elF5+JisKg3/dQISelKn8LhabSoVrMlD1
ch. 984 IN DNSKEY 257 3 8 AwEAAb7GhhZ8IAy/AhwmSms5DeQK5ad09wIIplEpYoiAIYXPtJvT1ReFzyfTp/2YP+g/PWDwHPh4qKAHa9x0VgbIQcGAeNakmfkAdWEmCnca323/SAml3mwfaX62G7/uYWae5zh8QTxZKNd+K1yZ5x0IxnI31chSl5xymRbTEHYZDKwSIRFM3fTxUMt93WFaBVWELReYotJBr++rvAWdnlay5TPBTvheLBkaiqtgM4GP8HK07Y+86lsZnEsj5K3G1KTV5SPpa82rqYAwxG9VKbmSE/6/kBR5jJHjt1rRt5Oe7v18aEtw0YCEN4vxq+KuvMoNVqXUsE9LBwHJD+QNwi6wmB0=
ch. 984 IN RRSIG DNSKEY 8 1 86400 20150127100909 20141212090909 46375 ch. bT8q0FWyeMH0SulNo6UdIIgZYNATwYsee2bikq2Gh339Bufma8eaqWIPYT3XKmxYPBFOw0bVl+kLZxTwbR1CFoCDXoP+qgQhh4mf9qkNiv2CDSc+0FE3FRREn+DAhYTUEuB58FPiPakFB8s8O7T+k2qhDae7jy4/y7Jl1lnjaBY8s7bzOUPhF0KKCNZmvoKwtL23ZdVeTSV1xM3jkiNnpzBKbcoSWECSGJVp1SE0BnRXdwQP41YTXFZ0310YjaTAUCC5qbMIWdEkHjfdSQtKBImnc85mkapq9w++XQ4zhauPWBtrPV3CcoCahjUaWdjrKVkibomlJZaN8MEO23CfQw==
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 893 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 10272
;; flags: qr rd ra cd ; qd: 1 an: 3 au: 0 ad: 1
;; QUESTIONS:
;; ingotronic.ch., type = DS, class = IN
;; ANSWERS:
ingotronic.ch. 3592 IN DS 6031 5 2 4A948F2FDADA24686E473EDAC00DCF972584C75E3FAA92C2021B6221449FF87E
ingotronic.ch. 3592 IN DS 6031 5 1 733D0218B571CD617B1A7493564B9FC4F12ADE82
ingotronic.ch. 3592 IN RRSIG DS 8 2 3600 20150129033614 20150105123019 60789 ch. rVPJP2HhzW7OkroK2axFj5Lb4iVWCH8Fp/Iq1rF952NDo72b8RiKje2RaAKJAGQ+wd0YgE+PAej04GCmkhlDJA/zvPeeTxuhy3HbJzReMlQ7fjyH+wW1hli+FuIYvogXWf7nO/9VyPORt8X/f/pjrOr3Vlj9sGLN8TGYpEuVSw4=
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 288 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 19066
;; flags: qr aa rd ra cd ; qd: 1 an: 4 au: 0 ad: 1
;; QUESTIONS:
;; ingotronic.ch., type = DNSKEY, class = IN
;; ANSWERS:
ingotronic.ch. 300 IN DNSKEY 256 3 5 AwEAAZ2Xh77GFzpEDx7EHYxShqltHgkiG+BOjBGifEmnJhQSdE5/yNSLFNcdhZZ8HUPxYnaedTqJcFFg4AzUsQklF/fECegTJdZjaj2WoL0/I8K7HMfY/hVuRZUWPNglYi8agJRX6gdkFTCpUNI7stpgKqxtzUJhhw15uG/lKMplwqUr
ingotronic.ch. 300 IN DNSKEY 257 3 5 AwEAAeA1vzmjaB+eBAcvhzpKEgAEFpvQ1rg4uKDW6MsQtacKoqBpgyep2+LuWotz5p/xYxj3NGsArwN8Ad5cY0FHRr8miTT0elOv6nvlqGIfRuhj/BXAQ1x4ihpSFslHw0lJMYFwxsUZWpUyjWX/nv1xRZMMwF46gui0N4OEbyTYusCk77D+A71k+K0EAitFIbIH4GCUKmH1H7HmXhSVH9bN/n7KEGwW32lmsuuUcJoRKDkcUvbMXY/9Xoa2quERrUg/rBbDUHowRPjYDS5GzY1+f4YY8s40BufGiqyUTKKXL953MVFK8gmezXA0hbmrnZ7CBOw/7238mORAdzExaX8n7CE=
ingotronic.ch. 300 IN RRSIG DNSKEY 5 2 300 20150125003700 20141226001657 6031 ingotronic.ch. rs1QlP2SlSpA2ELbzwg3DgWLzXWL3Lpv6CUJE2Q0qH2Zp7Qdy3cD+ZEtNh9v24Qv1M6JJ3zFt8mmZoCeW2ycuMbJCqBkW9CBuwF+VznZvZY2MxwPipvhvEEGP//0M8YAZJ66yQPDv3PTdAP8FYbIrJyvY44vwyncwbslpfHT9jAsrbfr3vuMuWps86dnP462q+0s1TxBfqi8mzo3gdavjHKWVNwohLahLKT+tWeu6DSzQv0YwMjwtkLgF7QRgx3ctIIkloOrnx9nHH1N6y+hxEB89fOlyVDjHhgL5uVtsD5fEdT0FJ2Gc/2nShEMMqIwr1/J9kUq1mNySff/uEe65Q==
ingotronic.ch. 300 IN RRSIG DNSKEY 5 2 300 20150125003700 20141226001657 17430 ingotronic.ch. mEwZjhQqeWksWD0TCnNBrtce4YkWJL3edqL6PvAUu8Fn+Ih437kEs3+pqdkgRsdYQ9HW+lBm/8pWwJlNAv0bi9NykItXMwAUFtncgq+6Pnh3iAM972GXSa5VV4LcGQ5b8CBdHCHiEKDqyPv5Hr5QfYL/FQaWlcNRh4QZZlZNPFA=
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 940 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 40136
;; flags: qr aa rd ra cd ; qd: 1 an: 1 au: 1 ad: 3
;; QUESTIONS:
;; www.unsigned.ingotronic.ch., type = A, class = IN
;; ANSWERS:
www.unsigned.ingotronic.ch. 300 IN A 127.0.0.1
;; AUTHORITY RECORDS:
unsigned.ingotronic.ch. 300 IN NS ns1.ingotronic.ch.
;; ADDITIONAL RECORDS:
ns1.ingotronic.ch. 300 IN A 62.192.5.131
ns1.ingotronic.ch. 300 IN RRSIG A 5 3 300 20150125005754 20141226001054 17430 ingotronic.ch. fNG1RZM53pXwBxruHNaSZszxVzNLoCq8VZsTjAzYH2vSLzHXYVGJFTLIeY0K9APAdyJU8WuwmABmn7XY0Kg39kRG77uoFlqUws2PdTz2QKOwJGZY7W88Ak2Y9lkDBcK8o3wJHVptrT8R7p/1U7UfjF0kqPUkakk2B0EbFWdagFg=
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 278 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 8431
;; flags: qr rd ra ad cd ; qd: 1 an: 4 au: 0 ad: 1
;; QUESTIONS:
;; ., type = DNSKEY, class = IN
;; ANSWERS:
. 87382 IN DNSKEY 256 3 8 AwEAAe3fSrbLBy3LOS7pnxEUhvPZTE2H5dIGsI/UfruI/nOEvWWa/PSX2BFedBkEqOlYdjdNF2f+6lmfk2Od/xu0v5bVqxFE+/24v3hZSlWBxvXzPTAGHrbW/IJYEPqlzVOAS4XdUgHg0N7IbLywNHMvB+Yf+Nm6ctyXXFLV4WTNnzs7
. 87382 IN DNSKEY 256 3 8 AwEAAaPD7Y7XIi1MOEREJNTrRhyqsY3gff6JWzg+XCbqut1sbcbvqyssHw8DT1AkRaAC92pO8xuyq5QEgEPL1IHfABLwpwXI5gTj4gdwi86bpkmlWs9fRpnn4DPDCTdrnxIejJXgClHikLJF3u3CdpNCMijq4CKdQbMlRZ3avv+G7rh7
. 87382 IN DNSKEY 257 3 8 AwEAAagAIKlVZrpC6Ia7gEzahOR+9W29euxhJhVVLOyQbSEW0O8gcCjFFVQUTf6v58fLjwBd0YI0EzrAcQqBGCzh/RStIoO8g0NfnfL2MTJRkxoXbfDaUeVPQuYEhg37NZWAJQ9VnMVDxP/VHL496M/QZxkjf5/Efucp2gaDX6RS6CXpoY68LsvPVjR0ZSwzz1apAzvN9dlzEheX7ICJBBtuA6G3LQpzW5hOA2hzCTMjJPJ8LbqF6dsV6DoBQzgul0sGIcGOYl7OyQdXfZ57relSQageu+ipAdTTJ25AsRTAoub8ONGcLmqrAmRLKBP1dfwhYB4N7knNnulqQxA+Uk1ihz0=
. 87382 IN RRSIG DNSKEY 8 0 172800 20150115235959 20150101000000 19036 . i8cAxD2pvQi1oAyvQxRpDfFlbqPzW+69QQEsDwE1eWOm5AtawO9U7lmsGps7sy/fVNvl1ljKBj4Djp9pb3U2FLogjiIlW0cDAkPmLlG9t+b/pjEfBNlhjANUVN06pvQVAfm+LcF26EaWT6FlISBqb6jSy4BHRa3Bdc4Sx7+pRSYSqVVvYxLkfAWsKPqGkvWhebJDndJJV9syXQXgZ+v/uJ+6XOS43xkAdeL8iBzIs/FlwMTfh3tVe3d0lb65IBBLlCzeQuetX+0Vu1YFcnD0mHc/wS2ZnAV5toAFmyVQBoY/XAZiZeaOkcROJ6Zmqezy7liwK7BqsYyAZntMhk8lbg==
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 883 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 19263
;; flags: qr rd ra ad cd ; qd: 1 an: 2 au: 0 ad: 1
;; QUESTIONS:
;; ch., type = DS, class = IN
;; ANSWERS:
ch. 982 IN DS 46375 8 2 8F96646FC68BB7E4AF4C0750A6096FBC0D4ECDA3D3FA6DA06FDDB42EE50C6CF3
ch. 982 IN RRSIG DS 8 1 86400 20150112170000 20150105160000 16665 . thY7xYWBBxiBjqbQIb9fAG4TmQgnziwM7q6P1T3/ITxmECdvOCQnnZA3uD7qmN8uM0HudsD7+y+zgD3rsH4RSTKdL4kHSI0OnCxToMTvklghEgFDezqIRm8NkWdI2H4Stwrj20nYKSpLQxPI2EE54gs18P3KyO8bAUYv8Qx73xU=
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 238 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 2609
;; flags: qr rd ra ad cd ; qd: 1 an: 4 au: 0 ad: 1
;; QUESTIONS:
;; ch., type = DNSKEY, class = IN
;; ANSWERS:
ch. 983 IN DNSKEY 257 3 8 AwEAAb7GhhZ8IAy/AhwmSms5DeQK5ad09wIIplEpYoiAIYXPtJvT1ReFzyfTp/2YP+g/PWDwHPh4qKAHa9x0VgbIQcGAeNakmfkAdWEmCnca323/SAml3mwfaX62G7/uYWae5zh8QTxZKNd+K1yZ5x0IxnI31chSl5xymRbTEHYZDKwSIRFM3fTxUMt93WFaBVWELReYotJBr++rvAWdnlay5TPBTvheLBkaiqtgM4GP8HK07Y+86lsZnEsj5K3G1KTV5SPpa82rqYAwxG9VKbmSE/6/kBR5jJHjt1rRt5Oe7v18aEtw0YCEN4vxq+KuvMoNVqXUsE9LBwHJD+QNwi6wmB0=
ch. 983 IN DNSKEY 256 3 8 AwEAAcSLdT0fEmcFmLpeUkAJoeVaHKiu+nbuc43fWlqaCRVf8t2HA4uWxOk0O5ci9nrFTc8nq8oa5fk5Cj7CHh4yrX9qUCfTdIWTyp8BDEdJpS+Dyb0u9wQuVj+nQMj4fLzdQf4TJs3/qxuiLr3nL1UUwlhhXeqSqGVb7p3mtB5HJ8ad
ch. 983 IN DNSKEY 256 3 8 AwEAAcsg0kY6fw1wzYMhSAKTy+Y2JzAst66P/1odp9NECJJHbU8f4nwziI3onoFSBV0ZiSZhY1aH5dhdDZ7BkrqhVXSrZPAz0CvzjIxmB1gSOf9DeZvjQvoy97HqYolxsf+B3QQv2RKBT67elF5+JisKg3/dQISelKn8LhabSoVrMlD1
ch. 983 IN RRSIG DNSKEY 8 1 86400 20150127100909 20141212090909 46375 ch. bT8q0FWyeMH0SulNo6UdIIgZYNATwYsee2bikq2Gh339Bufma8eaqWIPYT3XKmxYPBFOw0bVl+kLZxTwbR1CFoCDXoP+qgQhh4mf9qkNiv2CDSc+0FE3FRREn+DAhYTUEuB58FPiPakFB8s8O7T+k2qhDae7jy4/y7Jl1lnjaBY8s7bzOUPhF0KKCNZmvoKwtL23ZdVeTSV1xM3jkiNnpzBKbcoSWECSGJVp1SE0BnRXdwQP41YTXFZ0310YjaTAUCC5qbMIWdEkHjfdSQtKBImnc85mkapq9w++XQ4zhauPWBtrPV3CcoCahjUaWdjrKVkibomlJZaN8MEO23CfQw==
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 893 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 29809
;; flags: qr rd ra cd ; qd: 1 an: 3 au: 0 ad: 1
;; QUESTIONS:
;; ingotronic.ch., type = DS, class = IN
;; ANSWERS:
ingotronic.ch. 3591 IN DS 6031 5 2 4A948F2FDADA24686E473EDAC00DCF972584C75E3FAA92C2021B6221449FF87E
ingotronic.ch. 3591 IN DS 6031 5 1 733D0218B571CD617B1A7493564B9FC4F12ADE82
ingotronic.ch. 3591 IN RRSIG DS 8 2 3600 20150129033614 20150105123019 60789 ch. rVPJP2HhzW7OkroK2axFj5Lb4iVWCH8Fp/Iq1rF952NDo72b8RiKje2RaAKJAGQ+wd0YgE+PAej04GCmkhlDJA/zvPeeTxuhy3HbJzReMlQ7fjyH+wW1hli+FuIYvogXWf7nO/9VyPORt8X/f/pjrOr3Vlj9sGLN8TGYpEuVSw4=
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 288 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 43821
;; flags: qr aa rd ra cd ; qd: 1 an: 4 au: 0 ad: 1
;; QUESTIONS:
;; ingotronic.ch., type = DNSKEY, class = IN
;; ANSWERS:
ingotronic.ch. 300 IN DNSKEY 256 3 5 AwEAAZ2Xh77GFzpEDx7EHYxShqltHgkiG+BOjBGifEmnJhQSdE5/yNSLFNcdhZZ8HUPxYnaedTqJcFFg4AzUsQklF/fECegTJdZjaj2WoL0/I8K7HMfY/hVuRZUWPNglYi8agJRX6gdkFTCpUNI7stpgKqxtzUJhhw15uG/lKMplwqUr
ingotronic.ch. 300 IN DNSKEY 257 3 5 AwEAAeA1vzmjaB+eBAcvhzpKEgAEFpvQ1rg4uKDW6MsQtacKoqBpgyep2+LuWotz5p/xYxj3NGsArwN8Ad5cY0FHRr8miTT0elOv6nvlqGIfRuhj/BXAQ1x4ihpSFslHw0lJMYFwxsUZWpUyjWX/nv1xRZMMwF46gui0N4OEbyTYusCk77D+A71k+K0EAitFIbIH4GCUKmH1H7HmXhSVH9bN/n7KEGwW32lmsuuUcJoRKDkcUvbMXY/9Xoa2quERrUg/rBbDUHowRPjYDS5GzY1+f4YY8s40BufGiqyUTKKXL953MVFK8gmezXA0hbmrnZ7CBOw/7238mORAdzExaX8n7CE=
ingotronic.ch. 300 IN RRSIG DNSKEY 5 2 300 20150125003700 20141226001657 6031 ingotronic.ch. rs1QlP2SlSpA2ELbzwg3DgWLzXWL3Lpv6CUJE2Q0qH2Zp7Qdy3cD+ZEtNh9v24Qv1M6JJ3zFt8mmZoCeW2ycuMbJCqBkW9CBuwF+VznZvZY2MxwPipvhvEEGP//0M8YAZJ66yQPDv3PTdAP8FYbIrJyvY44vwyncwbslpfHT9jAsrbfr3vuMuWps86dnP462q+0s1TxBfqi8mzo3gdavjHKWVNwohLahLKT+tWeu6DSzQv0YwMjwtkLgF7QRgx3ctIIkloOrnx9nHH1N6y+hxEB89fOlyVDjHhgL5uVtsD5fEdT0FJ2Gc/2nShEMMqIwr1/J9kUq1mNySff/uEe65Q==
ingotronic.ch. 300 IN RRSIG DNSKEY 5 2 300 20150125003700 20141226001657 17430 ingotronic.ch. mEwZjhQqeWksWD0TCnNBrtce4YkWJL3edqL6PvAUu8Fn+Ih437kEs3+pqdkgRsdYQ9HW+lBm/8pWwJlNAv0bi9NykItXMwAUFtncgq+6Pnh3iAM972GXSa5VV4LcGQ5b8CBdHCHiEKDqyPv5Hr5QfYL/FQaWlcNRh4QZZlZNPFA=
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 940 bytes
###############################################
testDsPrimeResponseWithEmptyAnswerIsBad 0000664 0000000 0000000 00000005534 13020541473 0037223 0 ustar 00root root 0000000 0000000 dnssecjava-1.1.3/src/test/resources/recordings/org_jitsi_dnssec_TestPriming #Date: 2015-01-06T22:34:50+01:00
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 45525
;; flags: qr aa rd ra cd ; qd: 1 an: 2 au: 2 ad: 3
;; QUESTIONS:
;; www.ingotronic.ch., type = A, class = IN
;; ANSWERS:
www.ingotronic.ch. 300 IN A 127.0.0.1
www.ingotronic.ch. 300 IN RRSIG A 5 3 300 20150125012443 20141226010256 17430 ingotronic.ch. hkD2bkHZKHoJX8cg69j6l1JXE7iYlVFc0iMo3/3hcq4TqieiT2El/9DLfMSxa7XyB/HRDG5Ul61E56pwlCDdxkwemtAuTzjCpqAtvQ5l5OEtTM4i6nijKBkRRzHjh99qDI1jh9GFv3jkTk5m7iaMQemUB4VTjKGLcZHXvWmQLbg=
;; AUTHORITY RECORDS:
ingotronic.ch. 300 IN NS ns1.ingotronic.ch.
ingotronic.ch. 300 IN RRSIG NS 5 2 300 20150125000532 20141225234703 17430 ingotronic.ch. VuzVJM3McSHlcdngCG/G23zCikq8tXE0CZV2ZSgUFXXFMIEoM6PMi1QRQ/8VF3tee4WGpRx2jhtkui0wFRFfwIhW7G1uPDT4qogaR3KLIyuCEsMxhRH3WJZNrLmLqlSBGvd9OBJwbmryqm3Zzqvrk+E+rh8OJeifnBBpHAX4eHg=
;; ADDITIONAL RECORDS:
ns1.ingotronic.ch. 300 IN A 62.192.5.131
ns1.ingotronic.ch. 300 IN RRSIG A 5 3 300 20150125005754 20141226001054 17430 ingotronic.ch. fNG1RZM53pXwBxruHNaSZszxVzNLoCq8VZsTjAzYH2vSLzHXYVGJFTLIeY0K9APAdyJU8WuwmABmn7XY0Kg39kRG77uoFlqUws2PdTz2QKOwJGZY7W88Ak2Y9lkDBcK8o3wJHVptrT8R7p/1U7UfjF0kqPUkakk2B0EbFWdagFg=
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 615 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 54828
;; flags: qr rd ra ad cd ; qd: 1 an: 4 au: 0 ad: 1
;; QUESTIONS:
;; ., type = DNSKEY, class = IN
;; ANSWERS:
. 87383 IN DNSKEY 256 3 8 AwEAAe3fSrbLBy3LOS7pnxEUhvPZTE2H5dIGsI/UfruI/nOEvWWa/PSX2BFedBkEqOlYdjdNF2f+6lmfk2Od/xu0v5bVqxFE+/24v3hZSlWBxvXzPTAGHrbW/IJYEPqlzVOAS4XdUgHg0N7IbLywNHMvB+Yf+Nm6ctyXXFLV4WTNnzs7
. 87383 IN DNSKEY 257 3 8 AwEAAagAIKlVZrpC6Ia7gEzahOR+9W29euxhJhVVLOyQbSEW0O8gcCjFFVQUTf6v58fLjwBd0YI0EzrAcQqBGCzh/RStIoO8g0NfnfL2MTJRkxoXbfDaUeVPQuYEhg37NZWAJQ9VnMVDxP/VHL496M/QZxkjf5/Efucp2gaDX6RS6CXpoY68LsvPVjR0ZSwzz1apAzvN9dlzEheX7ICJBBtuA6G3LQpzW5hOA2hzCTMjJPJ8LbqF6dsV6DoBQzgul0sGIcGOYl7OyQdXfZ57relSQageu+ipAdTTJ25AsRTAoub8ONGcLmqrAmRLKBP1dfwhYB4N7knNnulqQxA+Uk1ihz0=
. 87383 IN DNSKEY 256 3 8 AwEAAaPD7Y7XIi1MOEREJNTrRhyqsY3gff6JWzg+XCbqut1sbcbvqyssHw8DT1AkRaAC92pO8xuyq5QEgEPL1IHfABLwpwXI5gTj4gdwi86bpkmlWs9fRpnn4DPDCTdrnxIejJXgClHikLJF3u3CdpNCMijq4CKdQbMlRZ3avv+G7rh7
. 87383 IN RRSIG DNSKEY 8 0 172800 20150115235959 20150101000000 19036 . i8cAxD2pvQi1oAyvQxRpDfFlbqPzW+69QQEsDwE1eWOm5AtawO9U7lmsGps7sy/fVNvl1ljKBj4Djp9pb3U2FLogjiIlW0cDAkPmLlG9t+b/pjEfBNlhjANUVN06pvQVAfm+LcF26EaWT6FlISBqb6jSy4BHRa3Bdc4Sx7+pRSYSqVVvYxLkfAWsKPqGkvWhebJDndJJV9syXQXgZ+v/uJ+6XOS43xkAdeL8iBzIs/FlwMTfh3tVe3d0lb65IBBLlCzeQuetX+0Vu1YFcnD0mHc/wS2ZnAV5toAFmyVQBoY/XAZiZeaOkcROJ6Zmqezy7liwK7BqsYyAZntMhk8lbg==
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 883 bytes
###############################################
testDsPrimeResponseWithNxDomainForTld 0000664 0000000 0000000 00000005534 13020541473 0036672 0 ustar 00root root 0000000 0000000 dnssecjava-1.1.3/src/test/resources/recordings/org_jitsi_dnssec_TestPriming #Date: 2015-01-06T22:34:53+01:00
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 28876
;; flags: qr aa rd ra cd ; qd: 1 an: 2 au: 2 ad: 3
;; QUESTIONS:
;; www.ingotronic.ch., type = A, class = IN
;; ANSWERS:
www.ingotronic.ch. 300 IN A 127.0.0.1
www.ingotronic.ch. 300 IN RRSIG A 5 3 300 20150125012443 20141226010256 17430 ingotronic.ch. hkD2bkHZKHoJX8cg69j6l1JXE7iYlVFc0iMo3/3hcq4TqieiT2El/9DLfMSxa7XyB/HRDG5Ul61E56pwlCDdxkwemtAuTzjCpqAtvQ5l5OEtTM4i6nijKBkRRzHjh99qDI1jh9GFv3jkTk5m7iaMQemUB4VTjKGLcZHXvWmQLbg=
;; AUTHORITY RECORDS:
ingotronic.ch. 300 IN NS ns1.ingotronic.ch.
ingotronic.ch. 300 IN RRSIG NS 5 2 300 20150125000532 20141225234703 17430 ingotronic.ch. VuzVJM3McSHlcdngCG/G23zCikq8tXE0CZV2ZSgUFXXFMIEoM6PMi1QRQ/8VF3tee4WGpRx2jhtkui0wFRFfwIhW7G1uPDT4qogaR3KLIyuCEsMxhRH3WJZNrLmLqlSBGvd9OBJwbmryqm3Zzqvrk+E+rh8OJeifnBBpHAX4eHg=
;; ADDITIONAL RECORDS:
ns1.ingotronic.ch. 300 IN A 62.192.5.131
ns1.ingotronic.ch. 300 IN RRSIG A 5 3 300 20150125005754 20141226001054 17430 ingotronic.ch. fNG1RZM53pXwBxruHNaSZszxVzNLoCq8VZsTjAzYH2vSLzHXYVGJFTLIeY0K9APAdyJU8WuwmABmn7XY0Kg39kRG77uoFlqUws2PdTz2QKOwJGZY7W88Ak2Y9lkDBcK8o3wJHVptrT8R7p/1U7UfjF0kqPUkakk2B0EbFWdagFg=
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 615 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 21203
;; flags: qr rd ra ad cd ; qd: 1 an: 4 au: 0 ad: 1
;; QUESTIONS:
;; ., type = DNSKEY, class = IN
;; ANSWERS:
. 87381 IN DNSKEY 256 3 8 AwEAAaPD7Y7XIi1MOEREJNTrRhyqsY3gff6JWzg+XCbqut1sbcbvqyssHw8DT1AkRaAC92pO8xuyq5QEgEPL1IHfABLwpwXI5gTj4gdwi86bpkmlWs9fRpnn4DPDCTdrnxIejJXgClHikLJF3u3CdpNCMijq4CKdQbMlRZ3avv+G7rh7
. 87381 IN DNSKEY 256 3 8 AwEAAe3fSrbLBy3LOS7pnxEUhvPZTE2H5dIGsI/UfruI/nOEvWWa/PSX2BFedBkEqOlYdjdNF2f+6lmfk2Od/xu0v5bVqxFE+/24v3hZSlWBxvXzPTAGHrbW/IJYEPqlzVOAS4XdUgHg0N7IbLywNHMvB+Yf+Nm6ctyXXFLV4WTNnzs7
. 87381 IN DNSKEY 257 3 8 AwEAAagAIKlVZrpC6Ia7gEzahOR+9W29euxhJhVVLOyQbSEW0O8gcCjFFVQUTf6v58fLjwBd0YI0EzrAcQqBGCzh/RStIoO8g0NfnfL2MTJRkxoXbfDaUeVPQuYEhg37NZWAJQ9VnMVDxP/VHL496M/QZxkjf5/Efucp2gaDX6RS6CXpoY68LsvPVjR0ZSwzz1apAzvN9dlzEheX7ICJBBtuA6G3LQpzW5hOA2hzCTMjJPJ8LbqF6dsV6DoBQzgul0sGIcGOYl7OyQdXfZ57relSQageu+ipAdTTJ25AsRTAoub8ONGcLmqrAmRLKBP1dfwhYB4N7knNnulqQxA+Uk1ihz0=
. 87381 IN RRSIG DNSKEY 8 0 172800 20150115235959 20150101000000 19036 . i8cAxD2pvQi1oAyvQxRpDfFlbqPzW+69QQEsDwE1eWOm5AtawO9U7lmsGps7sy/fVNvl1ljKBj4Djp9pb3U2FLogjiIlW0cDAkPmLlG9t+b/pjEfBNlhjANUVN06pvQVAfm+LcF26EaWT6FlISBqb6jSy4BHRa3Bdc4Sx7+pRSYSqVVvYxLkfAWsKPqGkvWhebJDndJJV9syXQXgZ+v/uJ+6XOS43xkAdeL8iBzIs/FlwMTfh3tVe3d0lb65IBBLlCzeQuetX+0Vu1YFcnD0mHc/wS2ZnAV5toAFmyVQBoY/XAZiZeaOkcROJ6Zmqezy7liwK7BqsYyAZntMhk8lbg==
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 883 bytes
###############################################
testRootDnskeyPrimeResponseWithNxDomainIsBad 0000664 0000000 0000000 00000002465 13020541473 0040215 0 ustar 00root root 0000000 0000000 dnssecjava-1.1.3/src/test/resources/recordings/org_jitsi_dnssec_TestPriming #Date: 2015-01-06T22:34:51+01:00
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 24908
;; flags: qr aa rd ra cd ; qd: 1 an: 2 au: 2 ad: 3
;; QUESTIONS:
;; www.ingotronic.ch., type = A, class = IN
;; ANSWERS:
www.ingotronic.ch. 300 IN A 127.0.0.1
www.ingotronic.ch. 300 IN RRSIG A 5 3 300 20150125012443 20141226010256 17430 ingotronic.ch. hkD2bkHZKHoJX8cg69j6l1JXE7iYlVFc0iMo3/3hcq4TqieiT2El/9DLfMSxa7XyB/HRDG5Ul61E56pwlCDdxkwemtAuTzjCpqAtvQ5l5OEtTM4i6nijKBkRRzHjh99qDI1jh9GFv3jkTk5m7iaMQemUB4VTjKGLcZHXvWmQLbg=
;; AUTHORITY RECORDS:
ingotronic.ch. 300 IN NS ns1.ingotronic.ch.
ingotronic.ch. 300 IN RRSIG NS 5 2 300 20150125000532 20141225234703 17430 ingotronic.ch. VuzVJM3McSHlcdngCG/G23zCikq8tXE0CZV2ZSgUFXXFMIEoM6PMi1QRQ/8VF3tee4WGpRx2jhtkui0wFRFfwIhW7G1uPDT4qogaR3KLIyuCEsMxhRH3WJZNrLmLqlSBGvd9OBJwbmryqm3Zzqvrk+E+rh8OJeifnBBpHAX4eHg=
;; ADDITIONAL RECORDS:
ns1.ingotronic.ch. 300 IN A 62.192.5.131
ns1.ingotronic.ch. 300 IN RRSIG A 5 3 300 20150125005754 20141226001054 17430 ingotronic.ch. fNG1RZM53pXwBxruHNaSZszxVzNLoCq8VZsTjAzYH2vSLzHXYVGJFTLIeY0K9APAdyJU8WuwmABmn7XY0Kg39kRG77uoFlqUws2PdTz2QKOwJGZY7W88Ak2Y9lkDBcK8o3wJHVptrT8R7p/1U7UfjF0kqPUkakk2B0EbFWdagFg=
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 615 bytes
###############################################
dnssecjava-1.1.3/src/test/resources/recordings/org_jitsi_dnssec_TestRRsig/ 0000775 0000000 0000000 00000000000 13020541473 0027051 5 ustar 00root root 0000000 0000000 dnssecjava-1.1.3/src/test/resources/recordings/org_jitsi_dnssec_TestRRsig/testRRsigNodata 0000664 0000000 0000000 00000000041 13020541473 0032044 0 ustar 00root root 0000000 0000000 #Date: 2015-01-06T22:35:12+01:00
dnssecjava-1.1.3/src/test/resources/recordings/org_jitsi_dnssec_TestRRsig/testRRsigServfail 0000664 0000000 0000000 00000000041 13020541473 0032411 0 ustar 00root root 0000000 0000000 #Date: 2015-01-06T22:35:12+01:00
dnssecjava-1.1.3/src/test/resources/recordings/org_jitsi_dnssec_TestTrustAnchorLoading/ 0000775 0000000 0000000 00000000000 13020541473 0031575 5 ustar 00root root 0000000 0000000 testInitializingWithEmptyConfigDoesNotFail 0000664 0000000 0000000 00000000041 13020541473 0042057 0 ustar 00root root 0000000 0000000 dnssecjava-1.1.3/src/test/resources/recordings/org_jitsi_dnssec_TestTrustAnchorLoading #Date: 2015-01-06T22:35:27+01:00
testInitializingWithNonExistingFileThrows 0000664 0000000 0000000 00000000041 13020541473 0042017 0 ustar 00root root 0000000 0000000 dnssecjava-1.1.3/src/test/resources/recordings/org_jitsi_dnssec_TestTrustAnchorLoading #Date: 2015-01-06T22:35:27+01:00
testInsecureWithEmptyTrustAnchor 0000664 0000000 0000000 00000002465 13020541473 0040175 0 ustar 00root root 0000000 0000000 dnssecjava-1.1.3/src/test/resources/recordings/org_jitsi_dnssec_TestTrustAnchorLoading #Date: 2015-01-06T22:35:27+01:00
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 33750
;; flags: qr aa rd ra cd ; qd: 1 an: 2 au: 2 ad: 3
;; QUESTIONS:
;; www.ingotronic.ch., type = A, class = IN
;; ANSWERS:
www.ingotronic.ch. 300 IN A 127.0.0.1
www.ingotronic.ch. 300 IN RRSIG A 5 3 300 20150125012443 20141226010256 17430 ingotronic.ch. hkD2bkHZKHoJX8cg69j6l1JXE7iYlVFc0iMo3/3hcq4TqieiT2El/9DLfMSxa7XyB/HRDG5Ul61E56pwlCDdxkwemtAuTzjCpqAtvQ5l5OEtTM4i6nijKBkRRzHjh99qDI1jh9GFv3jkTk5m7iaMQemUB4VTjKGLcZHXvWmQLbg=
;; AUTHORITY RECORDS:
ingotronic.ch. 300 IN NS ns1.ingotronic.ch.
ingotronic.ch. 300 IN RRSIG NS 5 2 300 20150125000532 20141225234703 17430 ingotronic.ch. VuzVJM3McSHlcdngCG/G23zCikq8tXE0CZV2ZSgUFXXFMIEoM6PMi1QRQ/8VF3tee4WGpRx2jhtkui0wFRFfwIhW7G1uPDT4qogaR3KLIyuCEsMxhRH3WJZNrLmLqlSBGvd9OBJwbmryqm3Zzqvrk+E+rh8OJeifnBBpHAX4eHg=
;; ADDITIONAL RECORDS:
ns1.ingotronic.ch. 300 IN A 62.192.5.131
ns1.ingotronic.ch. 300 IN RRSIG A 5 3 300 20150125005754 20141226001054 17430 ingotronic.ch. fNG1RZM53pXwBxruHNaSZszxVzNLoCq8VZsTjAzYH2vSLzHXYVGJFTLIeY0K9APAdyJU8WuwmABmn7XY0Kg39kRG77uoFlqUws2PdTz2QKOwJGZY7W88Ak2Y9lkDBcK8o3wJHVptrT8R7p/1U7UfjF0kqPUkakk2B0EbFWdagFg=
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 615 bytes
###############################################
testLoadEmptyTrustAnchors 0000664 0000000 0000000 00000000041 13020541473 0036612 0 ustar 00root root 0000000 0000000 dnssecjava-1.1.3/src/test/resources/recordings/org_jitsi_dnssec_TestTrustAnchorLoading #Date: 2015-01-06T22:35:27+01:00
testLoadRootTrustAnchorWithDNSKEY 0000664 0000000 0000000 00000025120 13020541473 0040033 0 ustar 00root root 0000000 0000000 dnssecjava-1.1.3/src/test/resources/recordings/org_jitsi_dnssec_TestTrustAnchorLoading #Date: 2015-01-06T22:35:27+01:00
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 40286
;; flags: qr rd ra ad cd ; qd: 1 an: 4 au: 0 ad: 1
;; QUESTIONS:
;; ., type = DNSKEY, class = IN
;; ANSWERS:
. 87346 IN DNSKEY 257 3 8 AwEAAagAIKlVZrpC6Ia7gEzahOR+9W29euxhJhVVLOyQbSEW0O8gcCjFFVQUTf6v58fLjwBd0YI0EzrAcQqBGCzh/RStIoO8g0NfnfL2MTJRkxoXbfDaUeVPQuYEhg37NZWAJQ9VnMVDxP/VHL496M/QZxkjf5/Efucp2gaDX6RS6CXpoY68LsvPVjR0ZSwzz1apAzvN9dlzEheX7ICJBBtuA6G3LQpzW5hOA2hzCTMjJPJ8LbqF6dsV6DoBQzgul0sGIcGOYl7OyQdXfZ57relSQageu+ipAdTTJ25AsRTAoub8ONGcLmqrAmRLKBP1dfwhYB4N7knNnulqQxA+Uk1ihz0=
. 87346 IN DNSKEY 256 3 8 AwEAAe3fSrbLBy3LOS7pnxEUhvPZTE2H5dIGsI/UfruI/nOEvWWa/PSX2BFedBkEqOlYdjdNF2f+6lmfk2Od/xu0v5bVqxFE+/24v3hZSlWBxvXzPTAGHrbW/IJYEPqlzVOAS4XdUgHg0N7IbLywNHMvB+Yf+Nm6ctyXXFLV4WTNnzs7
. 87346 IN DNSKEY 256 3 8 AwEAAaPD7Y7XIi1MOEREJNTrRhyqsY3gff6JWzg+XCbqut1sbcbvqyssHw8DT1AkRaAC92pO8xuyq5QEgEPL1IHfABLwpwXI5gTj4gdwi86bpkmlWs9fRpnn4DPDCTdrnxIejJXgClHikLJF3u3CdpNCMijq4CKdQbMlRZ3avv+G7rh7
. 87346 IN RRSIG DNSKEY 8 0 172800 20150115235959 20150101000000 19036 . i8cAxD2pvQi1oAyvQxRpDfFlbqPzW+69QQEsDwE1eWOm5AtawO9U7lmsGps7sy/fVNvl1ljKBj4Djp9pb3U2FLogjiIlW0cDAkPmLlG9t+b/pjEfBNlhjANUVN06pvQVAfm+LcF26EaWT6FlISBqb6jSy4BHRa3Bdc4Sx7+pRSYSqVVvYxLkfAWsKPqGkvWhebJDndJJV9syXQXgZ+v/uJ+6XOS43xkAdeL8iBzIs/FlwMTfh3tVe3d0lb65IBBLlCzeQuetX+0Vu1YFcnD0mHc/wS2ZnAV5toAFmyVQBoY/XAZiZeaOkcROJ6Zmqezy7liwK7BqsYyAZntMhk8lbg==
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 883 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 46375
;; flags: qr rd ra ad cd ; qd: 1 an: 4 au: 0 ad: 1
;; QUESTIONS:
;; ., type = DNSKEY, class = IN
;; ANSWERS:
. 87346 IN DNSKEY 257 3 8 AwEAAagAIKlVZrpC6Ia7gEzahOR+9W29euxhJhVVLOyQbSEW0O8gcCjFFVQUTf6v58fLjwBd0YI0EzrAcQqBGCzh/RStIoO8g0NfnfL2MTJRkxoXbfDaUeVPQuYEhg37NZWAJQ9VnMVDxP/VHL496M/QZxkjf5/Efucp2gaDX6RS6CXpoY68LsvPVjR0ZSwzz1apAzvN9dlzEheX7ICJBBtuA6G3LQpzW5hOA2hzCTMjJPJ8LbqF6dsV6DoBQzgul0sGIcGOYl7OyQdXfZ57relSQageu+ipAdTTJ25AsRTAoub8ONGcLmqrAmRLKBP1dfwhYB4N7knNnulqQxA+Uk1ihz0=
. 87346 IN DNSKEY 256 3 8 AwEAAaPD7Y7XIi1MOEREJNTrRhyqsY3gff6JWzg+XCbqut1sbcbvqyssHw8DT1AkRaAC92pO8xuyq5QEgEPL1IHfABLwpwXI5gTj4gdwi86bpkmlWs9fRpnn4DPDCTdrnxIejJXgClHikLJF3u3CdpNCMijq4CKdQbMlRZ3avv+G7rh7
. 87346 IN DNSKEY 256 3 8 AwEAAe3fSrbLBy3LOS7pnxEUhvPZTE2H5dIGsI/UfruI/nOEvWWa/PSX2BFedBkEqOlYdjdNF2f+6lmfk2Od/xu0v5bVqxFE+/24v3hZSlWBxvXzPTAGHrbW/IJYEPqlzVOAS4XdUgHg0N7IbLywNHMvB+Yf+Nm6ctyXXFLV4WTNnzs7
. 87346 IN RRSIG DNSKEY 8 0 172800 20150115235959 20150101000000 19036 . i8cAxD2pvQi1oAyvQxRpDfFlbqPzW+69QQEsDwE1eWOm5AtawO9U7lmsGps7sy/fVNvl1ljKBj4Djp9pb3U2FLogjiIlW0cDAkPmLlG9t+b/pjEfBNlhjANUVN06pvQVAfm+LcF26EaWT6FlISBqb6jSy4BHRa3Bdc4Sx7+pRSYSqVVvYxLkfAWsKPqGkvWhebJDndJJV9syXQXgZ+v/uJ+6XOS43xkAdeL8iBzIs/FlwMTfh3tVe3d0lb65IBBLlCzeQuetX+0Vu1YFcnD0mHc/wS2ZnAV5toAFmyVQBoY/XAZiZeaOkcROJ6Zmqezy7liwK7BqsYyAZntMhk8lbg==
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 883 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 46387
;; flags: qr aa rd ra cd ; qd: 1 an: 2 au: 2 ad: 3
;; QUESTIONS:
;; www.ingotronic.ch., type = A, class = IN
;; ANSWERS:
www.ingotronic.ch. 300 IN A 127.0.0.1
www.ingotronic.ch. 300 IN RRSIG A 5 3 300 20150125012443 20141226010256 17430 ingotronic.ch. hkD2bkHZKHoJX8cg69j6l1JXE7iYlVFc0iMo3/3hcq4TqieiT2El/9DLfMSxa7XyB/HRDG5Ul61E56pwlCDdxkwemtAuTzjCpqAtvQ5l5OEtTM4i6nijKBkRRzHjh99qDI1jh9GFv3jkTk5m7iaMQemUB4VTjKGLcZHXvWmQLbg=
;; AUTHORITY RECORDS:
ingotronic.ch. 300 IN NS ns1.ingotronic.ch.
ingotronic.ch. 300 IN RRSIG NS 5 2 300 20150125000532 20141225234703 17430 ingotronic.ch. VuzVJM3McSHlcdngCG/G23zCikq8tXE0CZV2ZSgUFXXFMIEoM6PMi1QRQ/8VF3tee4WGpRx2jhtkui0wFRFfwIhW7G1uPDT4qogaR3KLIyuCEsMxhRH3WJZNrLmLqlSBGvd9OBJwbmryqm3Zzqvrk+E+rh8OJeifnBBpHAX4eHg=
;; ADDITIONAL RECORDS:
ns1.ingotronic.ch. 300 IN A 62.192.5.131
ns1.ingotronic.ch. 300 IN RRSIG A 5 3 300 20150125005754 20141226001054 17430 ingotronic.ch. fNG1RZM53pXwBxruHNaSZszxVzNLoCq8VZsTjAzYH2vSLzHXYVGJFTLIeY0K9APAdyJU8WuwmABmn7XY0Kg39kRG77uoFlqUws2PdTz2QKOwJGZY7W88Ak2Y9lkDBcK8o3wJHVptrT8R7p/1U7UfjF0kqPUkakk2B0EbFWdagFg=
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 615 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 32118
;; flags: qr rd ra ad cd ; qd: 1 an: 4 au: 0 ad: 1
;; QUESTIONS:
;; ., type = DNSKEY, class = IN
;; ANSWERS:
. 87346 IN DNSKEY 256 3 8 AwEAAe3fSrbLBy3LOS7pnxEUhvPZTE2H5dIGsI/UfruI/nOEvWWa/PSX2BFedBkEqOlYdjdNF2f+6lmfk2Od/xu0v5bVqxFE+/24v3hZSlWBxvXzPTAGHrbW/IJYEPqlzVOAS4XdUgHg0N7IbLywNHMvB+Yf+Nm6ctyXXFLV4WTNnzs7
. 87346 IN DNSKEY 257 3 8 AwEAAagAIKlVZrpC6Ia7gEzahOR+9W29euxhJhVVLOyQbSEW0O8gcCjFFVQUTf6v58fLjwBd0YI0EzrAcQqBGCzh/RStIoO8g0NfnfL2MTJRkxoXbfDaUeVPQuYEhg37NZWAJQ9VnMVDxP/VHL496M/QZxkjf5/Efucp2gaDX6RS6CXpoY68LsvPVjR0ZSwzz1apAzvN9dlzEheX7ICJBBtuA6G3LQpzW5hOA2hzCTMjJPJ8LbqF6dsV6DoBQzgul0sGIcGOYl7OyQdXfZ57relSQageu+ipAdTTJ25AsRTAoub8ONGcLmqrAmRLKBP1dfwhYB4N7knNnulqQxA+Uk1ihz0=
. 87346 IN DNSKEY 256 3 8 AwEAAaPD7Y7XIi1MOEREJNTrRhyqsY3gff6JWzg+XCbqut1sbcbvqyssHw8DT1AkRaAC92pO8xuyq5QEgEPL1IHfABLwpwXI5gTj4gdwi86bpkmlWs9fRpnn4DPDCTdrnxIejJXgClHikLJF3u3CdpNCMijq4CKdQbMlRZ3avv+G7rh7
. 87346 IN RRSIG DNSKEY 8 0 172800 20150115235959 20150101000000 19036 . i8cAxD2pvQi1oAyvQxRpDfFlbqPzW+69QQEsDwE1eWOm5AtawO9U7lmsGps7sy/fVNvl1ljKBj4Djp9pb3U2FLogjiIlW0cDAkPmLlG9t+b/pjEfBNlhjANUVN06pvQVAfm+LcF26EaWT6FlISBqb6jSy4BHRa3Bdc4Sx7+pRSYSqVVvYxLkfAWsKPqGkvWhebJDndJJV9syXQXgZ+v/uJ+6XOS43xkAdeL8iBzIs/FlwMTfh3tVe3d0lb65IBBLlCzeQuetX+0Vu1YFcnD0mHc/wS2ZnAV5toAFmyVQBoY/XAZiZeaOkcROJ6Zmqezy7liwK7BqsYyAZntMhk8lbg==
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 883 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 2082
;; flags: qr rd ra ad cd ; qd: 1 an: 2 au: 0 ad: 1
;; QUESTIONS:
;; ch., type = DS, class = IN
;; ANSWERS:
ch. 946 IN DS 46375 8 2 8F96646FC68BB7E4AF4C0750A6096FBC0D4ECDA3D3FA6DA06FDDB42EE50C6CF3
ch. 946 IN RRSIG DS 8 1 86400 20150112170000 20150105160000 16665 . thY7xYWBBxiBjqbQIb9fAG4TmQgnziwM7q6P1T3/ITxmECdvOCQnnZA3uD7qmN8uM0HudsD7+y+zgD3rsH4RSTKdL4kHSI0OnCxToMTvklghEgFDezqIRm8NkWdI2H4Stwrj20nYKSpLQxPI2EE54gs18P3KyO8bAUYv8Qx73xU=
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 238 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 29359
;; flags: qr rd ra ad cd ; qd: 1 an: 4 au: 0 ad: 1
;; QUESTIONS:
;; ch., type = DNSKEY, class = IN
;; ANSWERS:
ch. 947 IN DNSKEY 257 3 8 AwEAAb7GhhZ8IAy/AhwmSms5DeQK5ad09wIIplEpYoiAIYXPtJvT1ReFzyfTp/2YP+g/PWDwHPh4qKAHa9x0VgbIQcGAeNakmfkAdWEmCnca323/SAml3mwfaX62G7/uYWae5zh8QTxZKNd+K1yZ5x0IxnI31chSl5xymRbTEHYZDKwSIRFM3fTxUMt93WFaBVWELReYotJBr++rvAWdnlay5TPBTvheLBkaiqtgM4GP8HK07Y+86lsZnEsj5K3G1KTV5SPpa82rqYAwxG9VKbmSE/6/kBR5jJHjt1rRt5Oe7v18aEtw0YCEN4vxq+KuvMoNVqXUsE9LBwHJD+QNwi6wmB0=
ch. 947 IN DNSKEY 256 3 8 AwEAAcsg0kY6fw1wzYMhSAKTy+Y2JzAst66P/1odp9NECJJHbU8f4nwziI3onoFSBV0ZiSZhY1aH5dhdDZ7BkrqhVXSrZPAz0CvzjIxmB1gSOf9DeZvjQvoy97HqYolxsf+B3QQv2RKBT67elF5+JisKg3/dQISelKn8LhabSoVrMlD1
ch. 947 IN DNSKEY 256 3 8 AwEAAcSLdT0fEmcFmLpeUkAJoeVaHKiu+nbuc43fWlqaCRVf8t2HA4uWxOk0O5ci9nrFTc8nq8oa5fk5Cj7CHh4yrX9qUCfTdIWTyp8BDEdJpS+Dyb0u9wQuVj+nQMj4fLzdQf4TJs3/qxuiLr3nL1UUwlhhXeqSqGVb7p3mtB5HJ8ad
ch. 947 IN RRSIG DNSKEY 8 1 86400 20150127100909 20141212090909 46375 ch. bT8q0FWyeMH0SulNo6UdIIgZYNATwYsee2bikq2Gh339Bufma8eaqWIPYT3XKmxYPBFOw0bVl+kLZxTwbR1CFoCDXoP+qgQhh4mf9qkNiv2CDSc+0FE3FRREn+DAhYTUEuB58FPiPakFB8s8O7T+k2qhDae7jy4/y7Jl1lnjaBY8s7bzOUPhF0KKCNZmvoKwtL23ZdVeTSV1xM3jkiNnpzBKbcoSWECSGJVp1SE0BnRXdwQP41YTXFZ0310YjaTAUCC5qbMIWdEkHjfdSQtKBImnc85mkapq9w++XQ4zhauPWBtrPV3CcoCahjUaWdjrKVkibomlJZaN8MEO23CfQw==
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 893 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 60271
;; flags: qr rd ra cd ; qd: 1 an: 3 au: 0 ad: 1
;; QUESTIONS:
;; ingotronic.ch., type = DS, class = IN
;; ANSWERS:
ingotronic.ch. 3555 IN DS 6031 5 2 4A948F2FDADA24686E473EDAC00DCF972584C75E3FAA92C2021B6221449FF87E
ingotronic.ch. 3555 IN DS 6031 5 1 733D0218B571CD617B1A7493564B9FC4F12ADE82
ingotronic.ch. 3555 IN RRSIG DS 8 2 3600 20150129033614 20150105123019 60789 ch. rVPJP2HhzW7OkroK2axFj5Lb4iVWCH8Fp/Iq1rF952NDo72b8RiKje2RaAKJAGQ+wd0YgE+PAej04GCmkhlDJA/zvPeeTxuhy3HbJzReMlQ7fjyH+wW1hli+FuIYvogXWf7nO/9VyPORt8X/f/pjrOr3Vlj9sGLN8TGYpEuVSw4=
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 288 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 32326
;; flags: qr aa rd ra cd ; qd: 1 an: 4 au: 0 ad: 1
;; QUESTIONS:
;; ingotronic.ch., type = DNSKEY, class = IN
;; ANSWERS:
ingotronic.ch. 300 IN DNSKEY 256 3 5 AwEAAZ2Xh77GFzpEDx7EHYxShqltHgkiG+BOjBGifEmnJhQSdE5/yNSLFNcdhZZ8HUPxYnaedTqJcFFg4AzUsQklF/fECegTJdZjaj2WoL0/I8K7HMfY/hVuRZUWPNglYi8agJRX6gdkFTCpUNI7stpgKqxtzUJhhw15uG/lKMplwqUr
ingotronic.ch. 300 IN DNSKEY 257 3 5 AwEAAeA1vzmjaB+eBAcvhzpKEgAEFpvQ1rg4uKDW6MsQtacKoqBpgyep2+LuWotz5p/xYxj3NGsArwN8Ad5cY0FHRr8miTT0elOv6nvlqGIfRuhj/BXAQ1x4ihpSFslHw0lJMYFwxsUZWpUyjWX/nv1xRZMMwF46gui0N4OEbyTYusCk77D+A71k+K0EAitFIbIH4GCUKmH1H7HmXhSVH9bN/n7KEGwW32lmsuuUcJoRKDkcUvbMXY/9Xoa2quERrUg/rBbDUHowRPjYDS5GzY1+f4YY8s40BufGiqyUTKKXL953MVFK8gmezXA0hbmrnZ7CBOw/7238mORAdzExaX8n7CE=
ingotronic.ch. 300 IN RRSIG DNSKEY 5 2 300 20150125003700 20141226001657 6031 ingotronic.ch. rs1QlP2SlSpA2ELbzwg3DgWLzXWL3Lpv6CUJE2Q0qH2Zp7Qdy3cD+ZEtNh9v24Qv1M6JJ3zFt8mmZoCeW2ycuMbJCqBkW9CBuwF+VznZvZY2MxwPipvhvEEGP//0M8YAZJ66yQPDv3PTdAP8FYbIrJyvY44vwyncwbslpfHT9jAsrbfr3vuMuWps86dnP462q+0s1TxBfqi8mzo3gdavjHKWVNwohLahLKT+tWeu6DSzQv0YwMjwtkLgF7QRgx3ctIIkloOrnx9nHH1N6y+hxEB89fOlyVDjHhgL5uVtsD5fEdT0FJ2Gc/2nShEMMqIwr1/J9kUq1mNySff/uEe65Q==
ingotronic.ch. 300 IN RRSIG DNSKEY 5 2 300 20150125003700 20141226001657 17430 ingotronic.ch. mEwZjhQqeWksWD0TCnNBrtce4YkWJL3edqL6PvAUu8Fn+Ih437kEs3+pqdkgRsdYQ9HW+lBm/8pWwJlNAv0bi9NykItXMwAUFtncgq+6Pnh3iAM972GXSa5VV4LcGQ5b8CBdHCHiEKDqyPv5Hr5QfYL/FQaWlcNRh4QZZlZNPFA=
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 940 bytes
###############################################
testLoadRootTrustAnchorWithInvalidDNSKEY 0000664 0000000 0000000 00000005533 13020541473 0041350 0 ustar 00root root 0000000 0000000 dnssecjava-1.1.3/src/test/resources/recordings/org_jitsi_dnssec_TestTrustAnchorLoading #Date: 2015-01-06T22:35:27+01:00
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 6910
;; flags: qr aa rd ra cd ; qd: 1 an: 2 au: 2 ad: 3
;; QUESTIONS:
;; www.ingotronic.ch., type = A, class = IN
;; ANSWERS:
www.ingotronic.ch. 300 IN A 127.0.0.1
www.ingotronic.ch. 300 IN RRSIG A 5 3 300 20150125012443 20141226010256 17430 ingotronic.ch. hkD2bkHZKHoJX8cg69j6l1JXE7iYlVFc0iMo3/3hcq4TqieiT2El/9DLfMSxa7XyB/HRDG5Ul61E56pwlCDdxkwemtAuTzjCpqAtvQ5l5OEtTM4i6nijKBkRRzHjh99qDI1jh9GFv3jkTk5m7iaMQemUB4VTjKGLcZHXvWmQLbg=
;; AUTHORITY RECORDS:
ingotronic.ch. 300 IN NS ns1.ingotronic.ch.
ingotronic.ch. 300 IN RRSIG NS 5 2 300 20150125000532 20141225234703 17430 ingotronic.ch. VuzVJM3McSHlcdngCG/G23zCikq8tXE0CZV2ZSgUFXXFMIEoM6PMi1QRQ/8VF3tee4WGpRx2jhtkui0wFRFfwIhW7G1uPDT4qogaR3KLIyuCEsMxhRH3WJZNrLmLqlSBGvd9OBJwbmryqm3Zzqvrk+E+rh8OJeifnBBpHAX4eHg=
;; ADDITIONAL RECORDS:
ns1.ingotronic.ch. 300 IN A 62.192.5.131
ns1.ingotronic.ch. 300 IN RRSIG A 5 3 300 20150125005754 20141226001054 17430 ingotronic.ch. fNG1RZM53pXwBxruHNaSZszxVzNLoCq8VZsTjAzYH2vSLzHXYVGJFTLIeY0K9APAdyJU8WuwmABmn7XY0Kg39kRG77uoFlqUws2PdTz2QKOwJGZY7W88Ak2Y9lkDBcK8o3wJHVptrT8R7p/1U7UfjF0kqPUkakk2B0EbFWdagFg=
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 615 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 53829
;; flags: qr rd ra ad cd ; qd: 1 an: 4 au: 0 ad: 1
;; QUESTIONS:
;; ., type = DNSKEY, class = IN
;; ANSWERS:
. 87346 IN DNSKEY 257 3 8 AwEAAagAIKlVZrpC6Ia7gEzahOR+9W29euxhJhVVLOyQbSEW0O8gcCjFFVQUTf6v58fLjwBd0YI0EzrAcQqBGCzh/RStIoO8g0NfnfL2MTJRkxoXbfDaUeVPQuYEhg37NZWAJQ9VnMVDxP/VHL496M/QZxkjf5/Efucp2gaDX6RS6CXpoY68LsvPVjR0ZSwzz1apAzvN9dlzEheX7ICJBBtuA6G3LQpzW5hOA2hzCTMjJPJ8LbqF6dsV6DoBQzgul0sGIcGOYl7OyQdXfZ57relSQageu+ipAdTTJ25AsRTAoub8ONGcLmqrAmRLKBP1dfwhYB4N7knNnulqQxA+Uk1ihz0=
. 87346 IN DNSKEY 256 3 8 AwEAAaPD7Y7XIi1MOEREJNTrRhyqsY3gff6JWzg+XCbqut1sbcbvqyssHw8DT1AkRaAC92pO8xuyq5QEgEPL1IHfABLwpwXI5gTj4gdwi86bpkmlWs9fRpnn4DPDCTdrnxIejJXgClHikLJF3u3CdpNCMijq4CKdQbMlRZ3avv+G7rh7
. 87346 IN DNSKEY 256 3 8 AwEAAe3fSrbLBy3LOS7pnxEUhvPZTE2H5dIGsI/UfruI/nOEvWWa/PSX2BFedBkEqOlYdjdNF2f+6lmfk2Od/xu0v5bVqxFE+/24v3hZSlWBxvXzPTAGHrbW/IJYEPqlzVOAS4XdUgHg0N7IbLywNHMvB+Yf+Nm6ctyXXFLV4WTNnzs7
. 87346 IN RRSIG DNSKEY 8 0 172800 20150115235959 20150101000000 19036 . i8cAxD2pvQi1oAyvQxRpDfFlbqPzW+69QQEsDwE1eWOm5AtawO9U7lmsGps7sy/fVNvl1ljKBj4Djp9pb3U2FLogjiIlW0cDAkPmLlG9t+b/pjEfBNlhjANUVN06pvQVAfm+LcF26EaWT6FlISBqb6jSy4BHRa3Bdc4Sx7+pRSYSqVVvYxLkfAWsKPqGkvWhebJDndJJV9syXQXgZ+v/uJ+6XOS43xkAdeL8iBzIs/FlwMTfh3tVe3d0lb65IBBLlCzeQuetX+0Vu1YFcnD0mHc/wS2ZnAV5toAFmyVQBoY/XAZiZeaOkcROJ6Zmqezy7liwK7BqsYyAZntMhk8lbg==
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 883 bytes
###############################################
testLoadRootTrustAnchorWithInvalidDS 0000664 0000000 0000000 00000005531 13020541473 0040657 0 ustar 00root root 0000000 0000000 dnssecjava-1.1.3/src/test/resources/recordings/org_jitsi_dnssec_TestTrustAnchorLoading #Date: 2015-01-06T22:35:27+01:00
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 198
;; flags: qr aa rd ra cd ; qd: 1 an: 2 au: 2 ad: 3
;; QUESTIONS:
;; www.ingotronic.ch., type = A, class = IN
;; ANSWERS:
www.ingotronic.ch. 300 IN A 127.0.0.1
www.ingotronic.ch. 300 IN RRSIG A 5 3 300 20150125012443 20141226010256 17430 ingotronic.ch. hkD2bkHZKHoJX8cg69j6l1JXE7iYlVFc0iMo3/3hcq4TqieiT2El/9DLfMSxa7XyB/HRDG5Ul61E56pwlCDdxkwemtAuTzjCpqAtvQ5l5OEtTM4i6nijKBkRRzHjh99qDI1jh9GFv3jkTk5m7iaMQemUB4VTjKGLcZHXvWmQLbg=
;; AUTHORITY RECORDS:
ingotronic.ch. 300 IN NS ns1.ingotronic.ch.
ingotronic.ch. 300 IN RRSIG NS 5 2 300 20150125000532 20141225234703 17430 ingotronic.ch. VuzVJM3McSHlcdngCG/G23zCikq8tXE0CZV2ZSgUFXXFMIEoM6PMi1QRQ/8VF3tee4WGpRx2jhtkui0wFRFfwIhW7G1uPDT4qogaR3KLIyuCEsMxhRH3WJZNrLmLqlSBGvd9OBJwbmryqm3Zzqvrk+E+rh8OJeifnBBpHAX4eHg=
;; ADDITIONAL RECORDS:
ns1.ingotronic.ch. 300 IN A 62.192.5.131
ns1.ingotronic.ch. 300 IN RRSIG A 5 3 300 20150125005754 20141226001054 17430 ingotronic.ch. fNG1RZM53pXwBxruHNaSZszxVzNLoCq8VZsTjAzYH2vSLzHXYVGJFTLIeY0K9APAdyJU8WuwmABmn7XY0Kg39kRG77uoFlqUws2PdTz2QKOwJGZY7W88Ak2Y9lkDBcK8o3wJHVptrT8R7p/1U7UfjF0kqPUkakk2B0EbFWdagFg=
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 615 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 7218
;; flags: qr rd ra ad cd ; qd: 1 an: 4 au: 0 ad: 1
;; QUESTIONS:
;; ., type = DNSKEY, class = IN
;; ANSWERS:
. 87346 IN DNSKEY 256 3 8 AwEAAaPD7Y7XIi1MOEREJNTrRhyqsY3gff6JWzg+XCbqut1sbcbvqyssHw8DT1AkRaAC92pO8xuyq5QEgEPL1IHfABLwpwXI5gTj4gdwi86bpkmlWs9fRpnn4DPDCTdrnxIejJXgClHikLJF3u3CdpNCMijq4CKdQbMlRZ3avv+G7rh7
. 87346 IN DNSKEY 256 3 8 AwEAAe3fSrbLBy3LOS7pnxEUhvPZTE2H5dIGsI/UfruI/nOEvWWa/PSX2BFedBkEqOlYdjdNF2f+6lmfk2Od/xu0v5bVqxFE+/24v3hZSlWBxvXzPTAGHrbW/IJYEPqlzVOAS4XdUgHg0N7IbLywNHMvB+Yf+Nm6ctyXXFLV4WTNnzs7
. 87346 IN DNSKEY 257 3 8 AwEAAagAIKlVZrpC6Ia7gEzahOR+9W29euxhJhVVLOyQbSEW0O8gcCjFFVQUTf6v58fLjwBd0YI0EzrAcQqBGCzh/RStIoO8g0NfnfL2MTJRkxoXbfDaUeVPQuYEhg37NZWAJQ9VnMVDxP/VHL496M/QZxkjf5/Efucp2gaDX6RS6CXpoY68LsvPVjR0ZSwzz1apAzvN9dlzEheX7ICJBBtuA6G3LQpzW5hOA2hzCTMjJPJ8LbqF6dsV6DoBQzgul0sGIcGOYl7OyQdXfZ57relSQageu+ipAdTTJ25AsRTAoub8ONGcLmqrAmRLKBP1dfwhYB4N7knNnulqQxA+Uk1ihz0=
. 87346 IN RRSIG DNSKEY 8 0 172800 20150115235959 20150101000000 19036 . i8cAxD2pvQi1oAyvQxRpDfFlbqPzW+69QQEsDwE1eWOm5AtawO9U7lmsGps7sy/fVNvl1ljKBj4Djp9pb3U2FLogjiIlW0cDAkPmLlG9t+b/pjEfBNlhjANUVN06pvQVAfm+LcF26EaWT6FlISBqb6jSy4BHRa3Bdc4Sx7+pRSYSqVVvYxLkfAWsKPqGkvWhebJDndJJV9syXQXgZ+v/uJ+6XOS43xkAdeL8iBzIs/FlwMTfh3tVe3d0lb65IBBLlCzeQuetX+0Vu1YFcnD0mHc/wS2ZnAV5toAFmyVQBoY/XAZiZeaOkcROJ6Zmqezy7liwK7BqsYyAZntMhk8lbg==
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 883 bytes
###############################################
testLoadRootTrustAnchors 0000664 0000000 0000000 00000000041 13020541473 0036437 0 ustar 00root root 0000000 0000000 dnssecjava-1.1.3/src/test/resources/recordings/org_jitsi_dnssec_TestTrustAnchorLoading #Date: 2015-01-06T22:35:27+01:00
testLoadRootTrustAnchorsAlongWithGarbage 0000664 0000000 0000000 00000000041 13020541473 0041525 0 ustar 00root root 0000000 0000000 dnssecjava-1.1.3/src/test/resources/recordings/org_jitsi_dnssec_TestTrustAnchorLoading #Date: 2015-01-06T22:35:27+01:00
testLoadRootTrustAnchorsFromFile 0000664 0000000 0000000 00000000041 13020541473 0040063 0 ustar 00root root 0000000 0000000 dnssecjava-1.1.3/src/test/resources/recordings/org_jitsi_dnssec_TestTrustAnchorLoading #Date: 2015-01-06T22:35:27+01:00
dnssecjava-1.1.3/src/test/resources/recordings/org_jitsi_dnssec_TestUnsigned/ 0000775 0000000 0000000 00000000000 13020541473 0027577 5 ustar 00root root 0000000 0000000 testUnsignedBelowSignedTldNsec3NoOptOut 0000664 0000000 0000000 00000014013 13020541473 0037251 0 ustar 00root root 0000000 0000000 dnssecjava-1.1.3/src/test/resources/recordings/org_jitsi_dnssec_TestUnsigned #Date: 2015-01-06T22:35:06+01:00
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 9484
;; flags: qr rd ra cd ; qd: 1 an: 1 au: 3 ad: 6
;; QUESTIONS:
;; 20min.ch., type = A, class = IN
;; ANSWERS:
20min.ch. 300 IN A 83.140.105.62
;; AUTHORITY RECORDS:
20min.ch. 3587 IN NS ns1.first-ns.de.
20min.ch. 3587 IN NS robotns2.second-ns.de.
20min.ch. 3587 IN NS robotns3.second-ns.com.
;; ADDITIONAL RECORDS:
ns1.first-ns.de. 588 IN A 213.239.242.238
ns1.first-ns.de. 287 IN AAAA 2a01:4f8:0:a101:0:0:a:1
robotns2.second-ns.de. 1004 IN A 213.133.105.6
robotns3.second-ns.com. 7187 IN A 193.47.99.3
robotns3.second-ns.com. 587 IN AAAA 2a00:1158:4:0:0:0:add:a3
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 255 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 30662
;; flags: qr rd ra ad cd ; qd: 1 an: 4 au: 0 ad: 1
;; QUESTIONS:
;; ., type = DNSKEY, class = IN
;; ANSWERS:
. 87367 IN DNSKEY 256 3 8 AwEAAaPD7Y7XIi1MOEREJNTrRhyqsY3gff6JWzg+XCbqut1sbcbvqyssHw8DT1AkRaAC92pO8xuyq5QEgEPL1IHfABLwpwXI5gTj4gdwi86bpkmlWs9fRpnn4DPDCTdrnxIejJXgClHikLJF3u3CdpNCMijq4CKdQbMlRZ3avv+G7rh7
. 87367 IN DNSKEY 257 3 8 AwEAAagAIKlVZrpC6Ia7gEzahOR+9W29euxhJhVVLOyQbSEW0O8gcCjFFVQUTf6v58fLjwBd0YI0EzrAcQqBGCzh/RStIoO8g0NfnfL2MTJRkxoXbfDaUeVPQuYEhg37NZWAJQ9VnMVDxP/VHL496M/QZxkjf5/Efucp2gaDX6RS6CXpoY68LsvPVjR0ZSwzz1apAzvN9dlzEheX7ICJBBtuA6G3LQpzW5hOA2hzCTMjJPJ8LbqF6dsV6DoBQzgul0sGIcGOYl7OyQdXfZ57relSQageu+ipAdTTJ25AsRTAoub8ONGcLmqrAmRLKBP1dfwhYB4N7knNnulqQxA+Uk1ihz0=
. 87367 IN DNSKEY 256 3 8 AwEAAe3fSrbLBy3LOS7pnxEUhvPZTE2H5dIGsI/UfruI/nOEvWWa/PSX2BFedBkEqOlYdjdNF2f+6lmfk2Od/xu0v5bVqxFE+/24v3hZSlWBxvXzPTAGHrbW/IJYEPqlzVOAS4XdUgHg0N7IbLywNHMvB+Yf+Nm6ctyXXFLV4WTNnzs7
. 87367 IN RRSIG DNSKEY 8 0 172800 20150115235959 20150101000000 19036 . i8cAxD2pvQi1oAyvQxRpDfFlbqPzW+69QQEsDwE1eWOm5AtawO9U7lmsGps7sy/fVNvl1ljKBj4Djp9pb3U2FLogjiIlW0cDAkPmLlG9t+b/pjEfBNlhjANUVN06pvQVAfm+LcF26EaWT6FlISBqb6jSy4BHRa3Bdc4Sx7+pRSYSqVVvYxLkfAWsKPqGkvWhebJDndJJV9syXQXgZ+v/uJ+6XOS43xkAdeL8iBzIs/FlwMTfh3tVe3d0lb65IBBLlCzeQuetX+0Vu1YFcnD0mHc/wS2ZnAV5toAFmyVQBoY/XAZiZeaOkcROJ6Zmqezy7liwK7BqsYyAZntMhk8lbg==
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 883 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 23607
;; flags: qr rd ra ad cd ; qd: 1 an: 2 au: 0 ad: 1
;; QUESTIONS:
;; ch., type = DS, class = IN
;; ANSWERS:
ch. 967 IN DS 46375 8 2 8F96646FC68BB7E4AF4C0750A6096FBC0D4ECDA3D3FA6DA06FDDB42EE50C6CF3
ch. 967 IN RRSIG DS 8 1 86400 20150112170000 20150105160000 16665 . thY7xYWBBxiBjqbQIb9fAG4TmQgnziwM7q6P1T3/ITxmECdvOCQnnZA3uD7qmN8uM0HudsD7+y+zgD3rsH4RSTKdL4kHSI0OnCxToMTvklghEgFDezqIRm8NkWdI2H4Stwrj20nYKSpLQxPI2EE54gs18P3KyO8bAUYv8Qx73xU=
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 238 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 979
;; flags: qr rd ra ad cd ; qd: 1 an: 4 au: 0 ad: 1
;; QUESTIONS:
;; ch., type = DNSKEY, class = IN
;; ANSWERS:
ch. 968 IN DNSKEY 256 3 8 AwEAAcSLdT0fEmcFmLpeUkAJoeVaHKiu+nbuc43fWlqaCRVf8t2HA4uWxOk0O5ci9nrFTc8nq8oa5fk5Cj7CHh4yrX9qUCfTdIWTyp8BDEdJpS+Dyb0u9wQuVj+nQMj4fLzdQf4TJs3/qxuiLr3nL1UUwlhhXeqSqGVb7p3mtB5HJ8ad
ch. 968 IN DNSKEY 257 3 8 AwEAAb7GhhZ8IAy/AhwmSms5DeQK5ad09wIIplEpYoiAIYXPtJvT1ReFzyfTp/2YP+g/PWDwHPh4qKAHa9x0VgbIQcGAeNakmfkAdWEmCnca323/SAml3mwfaX62G7/uYWae5zh8QTxZKNd+K1yZ5x0IxnI31chSl5xymRbTEHYZDKwSIRFM3fTxUMt93WFaBVWELReYotJBr++rvAWdnlay5TPBTvheLBkaiqtgM4GP8HK07Y+86lsZnEsj5K3G1KTV5SPpa82rqYAwxG9VKbmSE/6/kBR5jJHjt1rRt5Oe7v18aEtw0YCEN4vxq+KuvMoNVqXUsE9LBwHJD+QNwi6wmB0=
ch. 968 IN DNSKEY 256 3 8 AwEAAcsg0kY6fw1wzYMhSAKTy+Y2JzAst66P/1odp9NECJJHbU8f4nwziI3onoFSBV0ZiSZhY1aH5dhdDZ7BkrqhVXSrZPAz0CvzjIxmB1gSOf9DeZvjQvoy97HqYolxsf+B3QQv2RKBT67elF5+JisKg3/dQISelKn8LhabSoVrMlD1
ch. 968 IN RRSIG DNSKEY 8 1 86400 20150127100909 20141212090909 46375 ch. bT8q0FWyeMH0SulNo6UdIIgZYNATwYsee2bikq2Gh339Bufma8eaqWIPYT3XKmxYPBFOw0bVl+kLZxTwbR1CFoCDXoP+qgQhh4mf9qkNiv2CDSc+0FE3FRREn+DAhYTUEuB58FPiPakFB8s8O7T+k2qhDae7jy4/y7Jl1lnjaBY8s7bzOUPhF0KKCNZmvoKwtL23ZdVeTSV1xM3jkiNnpzBKbcoSWECSGJVp1SE0BnRXdwQP41YTXFZ0310YjaTAUCC5qbMIWdEkHjfdSQtKBImnc85mkapq9w++XQ4zhauPWBtrPV3CcoCahjUaWdjrKVkibomlJZaN8MEO23CfQw==
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 893 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 57818
;; flags: qr rd ra cd ; qd: 1 an: 0 au: 6 ad: 1
;; QUESTIONS:
;; 20min.ch., type = DS, class = IN
;; ANSWERS:
;; AUTHORITY RECORDS:
ch. 3588 IN SOA a.nic.ch. helpdesk.nic.ch. 2015010622 900 600 1123200 3600
ch. 3588 IN RRSIG SOA 8 1 3600 20150205202115 20150106200400 60789 ch. gXFznlMM50NpTnKf/1GIa8PJjARc4OUJVjVzicybnZieYvXA1bXo9NnFabfSV8+ePmuvKlph1mdmXi4RWeCy75fT2DdWorJpW9/riW+4z0usW0fHNo5d7SLdxuUJGZCd22VM4y1F79crVmAftifagcsKmvDE0B8HrZ/8sH0Y6uQ=
E5N5J3RCG0FLHRQLGU5G3IN5ROJNRL21.ch. 3588 IN RRSIG NSEC3 8 2 3600 20150124000839 20150105123019 60789 ch. HznmGWxQqbLUD5mjv8FHCwSfsNZ0fk4X6vtgyFTA81rVSQs4mUfoopvrBrYHGB0iKz/eeRCgHisH99L7uw/dWUy8h9pTQM4UFmspLjTiVHDNad6COrKnFFywV8E7CwibCd+qcdo4yGME3TbVkH1BbSvzQrUKKKe5eO/hleMvhSk=
E5N5J3RCG0FLHRQLGU5G3IN5ROJNRL21.ch. 3588 IN NSEC3 1 1 2 A170C978 E5PB8JRENAJFIO1LLO9ELPG39F787FOL NS DS RRSIG
G6DPGFANFNS93LVDHH7362IPSUN8DK5T.ch. 3588 IN RRSIG NSEC3 8 2 3600 20150124064109 20150105123019 60789 ch. pvd/nB3QKjTbLpxM9H9xcJIwmLnNAJPsXMffmjtAjTbceZ7IfpQHmguLPyJS7awSyEOTAhKmpeaT7m4iHhFm1/X4ybZmUvRSexqskgmGzqK+39cjaPrxc+ghdiUgFSjxv36PhoyM5gYnclTqpwGuFR00HK3av9vnnEKEY7zWtmM=
G6DPGFANFNS93LVDHH7362IPSUN8DK5T.ch. 3588 IN NSEC3 1 1 2 A170C978 G6DQNPQ9VP0U8F95714HO3575MPP42V1 NS SOA RRSIG DNSKEY NSEC3PARAM
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 741 bytes
###############################################
testUnsignedBelowSignedTldNsec3OptOut 0000664 0000000 0000000 00000013752 13020541473 0036765 0 ustar 00root root 0000000 0000000 dnssecjava-1.1.3/src/test/resources/recordings/org_jitsi_dnssec_TestUnsigned #Date: 2015-01-06T22:35:06+01:00
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 15612
;; flags: qr rd ra cd ; qd: 1 an: 3 au: 5 ad: 7
;; QUESTIONS:
;; yahoo.com., type = A, class = IN
;; ANSWERS:
yahoo.com. 1800 IN A 98.138.253.109
yahoo.com. 1800 IN A 206.190.36.45
yahoo.com. 1800 IN A 98.139.183.24
;; AUTHORITY RECORDS:
yahoo.com. 87436 IN NS ns1.yahoo.com.
yahoo.com. 87436 IN NS ns5.yahoo.com.
yahoo.com. 87436 IN NS ns2.yahoo.com.
yahoo.com. 87436 IN NS ns4.yahoo.com.
yahoo.com. 87436 IN NS ns3.yahoo.com.
;; ADDITIONAL RECORDS:
ns1.yahoo.com. 87436 IN A 68.180.131.16
ns2.yahoo.com. 87436 IN A 68.142.255.16
ns3.yahoo.com. 87436 IN A 203.84.221.53
ns3.yahoo.com. 1800 IN AAAA 2406:8600:b8:fe03:0:0:0:1003
ns4.yahoo.com. 87436 IN A 98.138.11.157
ns5.yahoo.com. 87436 IN A 119.160.247.124
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 284 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 38276
;; flags: qr rd ra ad cd ; qd: 1 an: 4 au: 0 ad: 1
;; QUESTIONS:
;; ., type = DNSKEY, class = IN
;; ANSWERS:
. 87368 IN DNSKEY 256 3 8 AwEAAaPD7Y7XIi1MOEREJNTrRhyqsY3gff6JWzg+XCbqut1sbcbvqyssHw8DT1AkRaAC92pO8xuyq5QEgEPL1IHfABLwpwXI5gTj4gdwi86bpkmlWs9fRpnn4DPDCTdrnxIejJXgClHikLJF3u3CdpNCMijq4CKdQbMlRZ3avv+G7rh7
. 87368 IN DNSKEY 257 3 8 AwEAAagAIKlVZrpC6Ia7gEzahOR+9W29euxhJhVVLOyQbSEW0O8gcCjFFVQUTf6v58fLjwBd0YI0EzrAcQqBGCzh/RStIoO8g0NfnfL2MTJRkxoXbfDaUeVPQuYEhg37NZWAJQ9VnMVDxP/VHL496M/QZxkjf5/Efucp2gaDX6RS6CXpoY68LsvPVjR0ZSwzz1apAzvN9dlzEheX7ICJBBtuA6G3LQpzW5hOA2hzCTMjJPJ8LbqF6dsV6DoBQzgul0sGIcGOYl7OyQdXfZ57relSQageu+ipAdTTJ25AsRTAoub8ONGcLmqrAmRLKBP1dfwhYB4N7knNnulqQxA+Uk1ihz0=
. 87368 IN DNSKEY 256 3 8 AwEAAe3fSrbLBy3LOS7pnxEUhvPZTE2H5dIGsI/UfruI/nOEvWWa/PSX2BFedBkEqOlYdjdNF2f+6lmfk2Od/xu0v5bVqxFE+/24v3hZSlWBxvXzPTAGHrbW/IJYEPqlzVOAS4XdUgHg0N7IbLywNHMvB+Yf+Nm6ctyXXFLV4WTNnzs7
. 87368 IN RRSIG DNSKEY 8 0 172800 20150115235959 20150101000000 19036 . i8cAxD2pvQi1oAyvQxRpDfFlbqPzW+69QQEsDwE1eWOm5AtawO9U7lmsGps7sy/fVNvl1ljKBj4Djp9pb3U2FLogjiIlW0cDAkPmLlG9t+b/pjEfBNlhjANUVN06pvQVAfm+LcF26EaWT6FlISBqb6jSy4BHRa3Bdc4Sx7+pRSYSqVVvYxLkfAWsKPqGkvWhebJDndJJV9syXQXgZ+v/uJ+6XOS43xkAdeL8iBzIs/FlwMTfh3tVe3d0lb65IBBLlCzeQuetX+0Vu1YFcnD0mHc/wS2ZnAV5toAFmyVQBoY/XAZiZeaOkcROJ6Zmqezy7liwK7BqsYyAZntMhk8lbg==
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 883 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 50370
;; flags: qr rd ra cd ; qd: 1 an: 2 au: 0 ad: 1
;; QUESTIONS:
;; com., type = DS, class = IN
;; ANSWERS:
com. 1036 IN DS 30909 8 2 E2D3C916F6DEEAC73294E8268FB5885044A833FC5459588F4A9184CFC41A5766
com. 1036 IN RRSIG DS 8 1 86400 20150112170000 20150105160000 16665 . EdNGsG+8slVhJncXMIfcIv5EWXpnDNbGHFHGO2qo64xZ7i8v3dMN0f2vvzNBMufCttyxWAC44s0fHzP24IuuLzTQRyPb4x7/xOXPNM/GsDSEWRrSxXD9wxswpa7XdD8gxqlrrLIlFkOJ59R88L/haMC7dzG0uo9lvE3r8fcynp4=
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 239 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 40305
;; flags: qr rd ra cd ; qd: 1 an: 3 au: 0 ad: 1
;; QUESTIONS:
;; com., type = DNSKEY, class = IN
;; ANSWERS:
com. 1037 IN DNSKEY 257 3 8 AQPDzldNmMvZFX4NcNJ0uEnKDg7tmv/F3MyQR0lpBmVcNcsIszxNFxsBfKNW9JYCYqpik8366LE7VbIcNRzfp2h9OO8HRl+H+E08zauK8k7evWEmu/6od+2boggPoiEfGNyvNPaSI7FOIroDsnw/taggzHRX1Z7SOiOiPWPNIwSUyWOZ79VmcQ1GLkC6NlYvG3HwYmynQv6oFwGv/KELSw7ZSdrbTQ0HXvZbqMUI7BaMskmvgm1G7oKZ1YiF7O9ioVNc0+7ASbqmZN7Z98EGU/Qh2K/BgUe8Hs0XVcdPKrtyYnoQHd2ynKPcMMlTEih2/2HDHjRPJ2aywIpKNnv4oPo/
com. 1037 IN DNSKEY 256 3 8 AQOzd48WKiAn+RyfIqkS/ZqQTguv/+dbIENccl9CWvJ8Sx7cLc29uZtDkHjmvqhgI6eKwt1sOhDQdyB6saNImQnG5z6ZoILNlW4h1ljy2LEi16WDf93iQnLekcW3Pr8b0YjmJZu6DXKUrcU1uBYtsULaHpa4ERUJFePn3dmX+2brVQ==
com. 1037 IN RRSIG DNSKEY 8 1 86400 20150108192533 20150101192033 30909 com. qZxb8vx3uSMQJMcx9hLn6OyDBcq67tkDsvcE5Tk3y8UOiJghAJW/4zlyji1C8yQzACqcXtE8g21u3BGyGIhLIDG+v6kaOeqKrWGQfvqer8ihd0NpwuOguV4g68ZcE0qFgFYHNKcpqnxAgIYkcoRda+2tPxcCLTPzEPPyEY0pHX9zC2HL88EneK4xP3qn5YIRDbFfHdDXMU61uXh9p4ASRTpy1l+pKnSf2c/LoUBJyPdFjUw2lQPMHZSNo7qjTkJxv1Mn2WSp8rO+xknqQu12zqihIb40KIyZHPgQ5wCCCT70kf3RmKEqmH1F6T7AWT9oBAzuD192ACyRJSXm5KdW1Q==
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 743 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 12758
;; flags: qr rd ra cd ; qd: 1 an: 0 au: 6 ad: 1
;; QUESTIONS:
;; yahoo.com., type = DS, class = IN
;; ANSWERS:
;; AUTHORITY RECORDS:
com. 900 IN SOA a.gtld-servers.net. nstld.verisign-grs.com. 1420580086 1800 900 604800 86400
com. 900 IN RRSIG SOA 8 1 900 20150113213446 20150106202446 48758 com. qu8Cf1ULvc3Iziz9agwXZMNlbG29SEJLVSkeqoiH7KHk4BOu/VroRuYnSnO3XYfHmUfcb4iOulUFxywVWrKr+3WnDWI9K9W9ColDY1RQHuiZNV+V3wGmdf+LSXPiGgCT5INi3aCgCz7ASWee82D6uHg5DroaYqkd1mRHz4djry0=
CK0POJMG874LJREF7EFN8430QVIT8BSM.com. 900 IN RRSIG NSEC3 8 2 86400 20150112055507 20150105044507 48758 com. jxmK9TYR0jbMXKL6irMe5NSnXv8TA54f3OnR6Z6FsGAYufuJ5GD38pHzAet0qkn+Bj4qH/mMsAH+McuXXpsLjQqOLI3Vi+ezSyiibgMDWMCx4485rFnoyWuv7P85jjDf0RI/Vi3KhJ2Eo7c7YGLwBeNlf7Rf+mOtsE+Pe/rwWO4=
CK0POJMG874LJREF7EFN8430QVIT8BSM.com. 900 IN NSEC3 1 1 0 - CK0QFMDQRCSRU0651QLVA1JQB21IF7UR NS SOA RRSIG DNSKEY NSEC3PARAM
GPIKIEOSOPL79LLAGN0NKTKIIIG03PO1.com. 900 IN RRSIG NSEC3 8 2 86400 20150112051957 20150105040957 48758 com. nG70oihFwICnzK+GXlNIWLTNPpD05C6aWAWUC5rdBhGY/JkNWSdIk2+Gokv+BkNChaIixEO32hsmuLd5frh4E3UtJ1fhiIjX8Ty5FUAT5FM8URfy2nOxlgtp+/qhpM0Fl6YebYWBvjS87gT0m3ihpwyUX5Cc9TDfX/WRxEeYF94=
GPIKIEOSOPL79LLAGN0NKTKIIIG03PO1.com. 900 IN NSEC3 1 1 0 - GPIPCMMD0H5PRLQHL08EAICA0CBFSUMP NS DS RRSIG
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 759 bytes
###############################################
testUnsignedBelowSignedZoneBind 0000664 0000000 0000000 00000020112 13020541473 0035667 0 ustar 00root root 0000000 0000000 dnssecjava-1.1.3/src/test/resources/recordings/org_jitsi_dnssec_TestUnsigned #Date: 2015-01-06T22:35:05+01:00
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 56956
;; flags: qr aa rd ra cd ; qd: 1 an: 1 au: 1 ad: 3
;; QUESTIONS:
;; www.unsigned.ingotronic.ch., type = A, class = IN
;; ANSWERS:
www.unsigned.ingotronic.ch. 300 IN A 127.0.0.1
;; AUTHORITY RECORDS:
unsigned.ingotronic.ch. 300 IN NS ns1.ingotronic.ch.
;; ADDITIONAL RECORDS:
ns1.ingotronic.ch. 300 IN A 62.192.5.131
ns1.ingotronic.ch. 300 IN RRSIG A 5 3 300 20150125005754 20141226001054 17430 ingotronic.ch. fNG1RZM53pXwBxruHNaSZszxVzNLoCq8VZsTjAzYH2vSLzHXYVGJFTLIeY0K9APAdyJU8WuwmABmn7XY0Kg39kRG77uoFlqUws2PdTz2QKOwJGZY7W88Ak2Y9lkDBcK8o3wJHVptrT8R7p/1U7UfjF0kqPUkakk2B0EbFWdagFg=
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 278 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 4514
;; flags: qr rd ra ad cd ; qd: 1 an: 4 au: 0 ad: 1
;; QUESTIONS:
;; ., type = DNSKEY, class = IN
;; ANSWERS:
. 87368 IN DNSKEY 256 3 8 AwEAAaPD7Y7XIi1MOEREJNTrRhyqsY3gff6JWzg+XCbqut1sbcbvqyssHw8DT1AkRaAC92pO8xuyq5QEgEPL1IHfABLwpwXI5gTj4gdwi86bpkmlWs9fRpnn4DPDCTdrnxIejJXgClHikLJF3u3CdpNCMijq4CKdQbMlRZ3avv+G7rh7
. 87368 IN DNSKEY 256 3 8 AwEAAe3fSrbLBy3LOS7pnxEUhvPZTE2H5dIGsI/UfruI/nOEvWWa/PSX2BFedBkEqOlYdjdNF2f+6lmfk2Od/xu0v5bVqxFE+/24v3hZSlWBxvXzPTAGHrbW/IJYEPqlzVOAS4XdUgHg0N7IbLywNHMvB+Yf+Nm6ctyXXFLV4WTNnzs7
. 87368 IN DNSKEY 257 3 8 AwEAAagAIKlVZrpC6Ia7gEzahOR+9W29euxhJhVVLOyQbSEW0O8gcCjFFVQUTf6v58fLjwBd0YI0EzrAcQqBGCzh/RStIoO8g0NfnfL2MTJRkxoXbfDaUeVPQuYEhg37NZWAJQ9VnMVDxP/VHL496M/QZxkjf5/Efucp2gaDX6RS6CXpoY68LsvPVjR0ZSwzz1apAzvN9dlzEheX7ICJBBtuA6G3LQpzW5hOA2hzCTMjJPJ8LbqF6dsV6DoBQzgul0sGIcGOYl7OyQdXfZ57relSQageu+ipAdTTJ25AsRTAoub8ONGcLmqrAmRLKBP1dfwhYB4N7knNnulqQxA+Uk1ihz0=
. 87368 IN RRSIG DNSKEY 8 0 172800 20150115235959 20150101000000 19036 . i8cAxD2pvQi1oAyvQxRpDfFlbqPzW+69QQEsDwE1eWOm5AtawO9U7lmsGps7sy/fVNvl1ljKBj4Djp9pb3U2FLogjiIlW0cDAkPmLlG9t+b/pjEfBNlhjANUVN06pvQVAfm+LcF26EaWT6FlISBqb6jSy4BHRa3Bdc4Sx7+pRSYSqVVvYxLkfAWsKPqGkvWhebJDndJJV9syXQXgZ+v/uJ+6XOS43xkAdeL8iBzIs/FlwMTfh3tVe3d0lb65IBBLlCzeQuetX+0Vu1YFcnD0mHc/wS2ZnAV5toAFmyVQBoY/XAZiZeaOkcROJ6Zmqezy7liwK7BqsYyAZntMhk8lbg==
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 883 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 41695
;; flags: qr rd ra ad cd ; qd: 1 an: 2 au: 0 ad: 1
;; QUESTIONS:
;; ch., type = DS, class = IN
;; ANSWERS:
ch. 968 IN DS 46375 8 2 8F96646FC68BB7E4AF4C0750A6096FBC0D4ECDA3D3FA6DA06FDDB42EE50C6CF3
ch. 968 IN RRSIG DS 8 1 86400 20150112170000 20150105160000 16665 . thY7xYWBBxiBjqbQIb9fAG4TmQgnziwM7q6P1T3/ITxmECdvOCQnnZA3uD7qmN8uM0HudsD7+y+zgD3rsH4RSTKdL4kHSI0OnCxToMTvklghEgFDezqIRm8NkWdI2H4Stwrj20nYKSpLQxPI2EE54gs18P3KyO8bAUYv8Qx73xU=
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 238 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 39298
;; flags: qr rd ra ad cd ; qd: 1 an: 4 au: 0 ad: 1
;; QUESTIONS:
;; ch., type = DNSKEY, class = IN
;; ANSWERS:
ch. 969 IN DNSKEY 257 3 8 AwEAAb7GhhZ8IAy/AhwmSms5DeQK5ad09wIIplEpYoiAIYXPtJvT1ReFzyfTp/2YP+g/PWDwHPh4qKAHa9x0VgbIQcGAeNakmfkAdWEmCnca323/SAml3mwfaX62G7/uYWae5zh8QTxZKNd+K1yZ5x0IxnI31chSl5xymRbTEHYZDKwSIRFM3fTxUMt93WFaBVWELReYotJBr++rvAWdnlay5TPBTvheLBkaiqtgM4GP8HK07Y+86lsZnEsj5K3G1KTV5SPpa82rqYAwxG9VKbmSE/6/kBR5jJHjt1rRt5Oe7v18aEtw0YCEN4vxq+KuvMoNVqXUsE9LBwHJD+QNwi6wmB0=
ch. 969 IN DNSKEY 256 3 8 AwEAAcSLdT0fEmcFmLpeUkAJoeVaHKiu+nbuc43fWlqaCRVf8t2HA4uWxOk0O5ci9nrFTc8nq8oa5fk5Cj7CHh4yrX9qUCfTdIWTyp8BDEdJpS+Dyb0u9wQuVj+nQMj4fLzdQf4TJs3/qxuiLr3nL1UUwlhhXeqSqGVb7p3mtB5HJ8ad
ch. 969 IN DNSKEY 256 3 8 AwEAAcsg0kY6fw1wzYMhSAKTy+Y2JzAst66P/1odp9NECJJHbU8f4nwziI3onoFSBV0ZiSZhY1aH5dhdDZ7BkrqhVXSrZPAz0CvzjIxmB1gSOf9DeZvjQvoy97HqYolxsf+B3QQv2RKBT67elF5+JisKg3/dQISelKn8LhabSoVrMlD1
ch. 969 IN RRSIG DNSKEY 8 1 86400 20150127100909 20141212090909 46375 ch. bT8q0FWyeMH0SulNo6UdIIgZYNATwYsee2bikq2Gh339Bufma8eaqWIPYT3XKmxYPBFOw0bVl+kLZxTwbR1CFoCDXoP+qgQhh4mf9qkNiv2CDSc+0FE3FRREn+DAhYTUEuB58FPiPakFB8s8O7T+k2qhDae7jy4/y7Jl1lnjaBY8s7bzOUPhF0KKCNZmvoKwtL23ZdVeTSV1xM3jkiNnpzBKbcoSWECSGJVp1SE0BnRXdwQP41YTXFZ0310YjaTAUCC5qbMIWdEkHjfdSQtKBImnc85mkapq9w++XQ4zhauPWBtrPV3CcoCahjUaWdjrKVkibomlJZaN8MEO23CfQw==
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 893 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 30277
;; flags: qr rd ra cd ; qd: 1 an: 3 au: 0 ad: 1
;; QUESTIONS:
;; ingotronic.ch., type = DS, class = IN
;; ANSWERS:
ingotronic.ch. 3577 IN DS 6031 5 1 733D0218B571CD617B1A7493564B9FC4F12ADE82
ingotronic.ch. 3577 IN DS 6031 5 2 4A948F2FDADA24686E473EDAC00DCF972584C75E3FAA92C2021B6221449FF87E
ingotronic.ch. 3577 IN RRSIG DS 8 2 3600 20150129033614 20150105123019 60789 ch. rVPJP2HhzW7OkroK2axFj5Lb4iVWCH8Fp/Iq1rF952NDo72b8RiKje2RaAKJAGQ+wd0YgE+PAej04GCmkhlDJA/zvPeeTxuhy3HbJzReMlQ7fjyH+wW1hli+FuIYvogXWf7nO/9VyPORt8X/f/pjrOr3Vlj9sGLN8TGYpEuVSw4=
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 288 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 29421
;; flags: qr aa rd ra cd ; qd: 1 an: 4 au: 0 ad: 1
;; QUESTIONS:
;; ingotronic.ch., type = DNSKEY, class = IN
;; ANSWERS:
ingotronic.ch. 300 IN DNSKEY 256 3 5 AwEAAZ2Xh77GFzpEDx7EHYxShqltHgkiG+BOjBGifEmnJhQSdE5/yNSLFNcdhZZ8HUPxYnaedTqJcFFg4AzUsQklF/fECegTJdZjaj2WoL0/I8K7HMfY/hVuRZUWPNglYi8agJRX6gdkFTCpUNI7stpgKqxtzUJhhw15uG/lKMplwqUr
ingotronic.ch. 300 IN DNSKEY 257 3 5 AwEAAeA1vzmjaB+eBAcvhzpKEgAEFpvQ1rg4uKDW6MsQtacKoqBpgyep2+LuWotz5p/xYxj3NGsArwN8Ad5cY0FHRr8miTT0elOv6nvlqGIfRuhj/BXAQ1x4ihpSFslHw0lJMYFwxsUZWpUyjWX/nv1xRZMMwF46gui0N4OEbyTYusCk77D+A71k+K0EAitFIbIH4GCUKmH1H7HmXhSVH9bN/n7KEGwW32lmsuuUcJoRKDkcUvbMXY/9Xoa2quERrUg/rBbDUHowRPjYDS5GzY1+f4YY8s40BufGiqyUTKKXL953MVFK8gmezXA0hbmrnZ7CBOw/7238mORAdzExaX8n7CE=
ingotronic.ch. 300 IN RRSIG DNSKEY 5 2 300 20150125003700 20141226001657 6031 ingotronic.ch. rs1QlP2SlSpA2ELbzwg3DgWLzXWL3Lpv6CUJE2Q0qH2Zp7Qdy3cD+ZEtNh9v24Qv1M6JJ3zFt8mmZoCeW2ycuMbJCqBkW9CBuwF+VznZvZY2MxwPipvhvEEGP//0M8YAZJ66yQPDv3PTdAP8FYbIrJyvY44vwyncwbslpfHT9jAsrbfr3vuMuWps86dnP462q+0s1TxBfqi8mzo3gdavjHKWVNwohLahLKT+tWeu6DSzQv0YwMjwtkLgF7QRgx3ctIIkloOrnx9nHH1N6y+hxEB89fOlyVDjHhgL5uVtsD5fEdT0FJ2Gc/2nShEMMqIwr1/J9kUq1mNySff/uEe65Q==
ingotronic.ch. 300 IN RRSIG DNSKEY 5 2 300 20150125003700 20141226001657 17430 ingotronic.ch. mEwZjhQqeWksWD0TCnNBrtce4YkWJL3edqL6PvAUu8Fn+Ih437kEs3+pqdkgRsdYQ9HW+lBm/8pWwJlNAv0bi9NykItXMwAUFtncgq+6Pnh3iAM972GXSa5VV4LcGQ5b8CBdHCHiEKDqyPv5Hr5QfYL/FQaWlcNRh4QZZlZNPFA=
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 940 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 64953
;; flags: qr aa rd ra cd ; qd: 1 an: 0 au: 4 ad: 1
;; QUESTIONS:
;; unsigned.ingotronic.ch., type = DS, class = IN
;; ANSWERS:
;; AUTHORITY RECORDS:
ingotronic.ch. 300 IN SOA ns1.ingotronic.ch. admin.ingotronic.ch. 2013032762 300 60 864000 300
ingotronic.ch. 300 IN RRSIG SOA 5 2 300 20150125021244 20141226011244 17430 ingotronic.ch. WDLpp9G0P/rlMBfpFn9sAfpEFoBnQfwyGSXbGCc/LG1FSkJoKLDQYDY696scLNsJgkrzZeJrl0oSSvA8AvRUhYRrmuqWMxTVFgYlRwPwqEMCKUqiVhKGVF4NYemoBiUQC4nJwBZd57xKCiF4AQ4CodBtiZxefJFAlTNE0g2yxtM=
unsigned.ingotronic.ch. 300 IN NSEC v.ingotronic.ch. NS RRSIG NSEC
unsigned.ingotronic.ch. 300 IN RRSIG NSEC 5 3 300 20150125004144 20141226003211 17430 ingotronic.ch. VsO/22QJi2Ny+QZBukileDIUc4/DqPdZwNssNbylPAscz0IBrLt9zKDcI26NSMqhFRFXIZqBXJScmKJseKB+wQUscwKK5kkzUIXK/SPbLQ8MLnOUKIXUgURDKDCp6W8eHoa/51dOS0Vb1woxmzN1kQnjTTUoW5z1igN7RcYCuGQ=
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 480 bytes
###############################################
testUnsignedBelowUnsignedZone 0000664 0000000 0000000 00000020126 13020541473 0035442 0 ustar 00root root 0000000 0000000 dnssecjava-1.1.3/src/test/resources/recordings/org_jitsi_dnssec_TestUnsigned #Date: 2015-01-06T22:35:06+01:00
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 65513
;; flags: qr aa rd ra cd ; qd: 1 an: 1 au: 1 ad: 3
;; QUESTIONS:
;; www.sub.unsigned.ingotronic.ch., type = A, class = IN
;; ANSWERS:
www.sub.unsigned.ingotronic.ch. 300 IN A 127.0.0.1
;; AUTHORITY RECORDS:
sub.unsigned.ingotronic.ch. 300 IN NS ns1.ingotronic.ch.
;; ADDITIONAL RECORDS:
ns1.ingotronic.ch. 300 IN A 62.192.5.131
ns1.ingotronic.ch. 300 IN RRSIG A 5 3 300 20150125005754 20141226001054 17430 ingotronic.ch. fNG1RZM53pXwBxruHNaSZszxVzNLoCq8VZsTjAzYH2vSLzHXYVGJFTLIeY0K9APAdyJU8WuwmABmn7XY0Kg39kRG77uoFlqUws2PdTz2QKOwJGZY7W88Ak2Y9lkDBcK8o3wJHVptrT8R7p/1U7UfjF0kqPUkakk2B0EbFWdagFg=
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 282 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 6175
;; flags: qr rd ra ad cd ; qd: 1 an: 4 au: 0 ad: 1
;; QUESTIONS:
;; ., type = DNSKEY, class = IN
;; ANSWERS:
. 87367 IN DNSKEY 256 3 8 AwEAAe3fSrbLBy3LOS7pnxEUhvPZTE2H5dIGsI/UfruI/nOEvWWa/PSX2BFedBkEqOlYdjdNF2f+6lmfk2Od/xu0v5bVqxFE+/24v3hZSlWBxvXzPTAGHrbW/IJYEPqlzVOAS4XdUgHg0N7IbLywNHMvB+Yf+Nm6ctyXXFLV4WTNnzs7
. 87367 IN DNSKEY 256 3 8 AwEAAaPD7Y7XIi1MOEREJNTrRhyqsY3gff6JWzg+XCbqut1sbcbvqyssHw8DT1AkRaAC92pO8xuyq5QEgEPL1IHfABLwpwXI5gTj4gdwi86bpkmlWs9fRpnn4DPDCTdrnxIejJXgClHikLJF3u3CdpNCMijq4CKdQbMlRZ3avv+G7rh7
. 87367 IN DNSKEY 257 3 8 AwEAAagAIKlVZrpC6Ia7gEzahOR+9W29euxhJhVVLOyQbSEW0O8gcCjFFVQUTf6v58fLjwBd0YI0EzrAcQqBGCzh/RStIoO8g0NfnfL2MTJRkxoXbfDaUeVPQuYEhg37NZWAJQ9VnMVDxP/VHL496M/QZxkjf5/Efucp2gaDX6RS6CXpoY68LsvPVjR0ZSwzz1apAzvN9dlzEheX7ICJBBtuA6G3LQpzW5hOA2hzCTMjJPJ8LbqF6dsV6DoBQzgul0sGIcGOYl7OyQdXfZ57relSQageu+ipAdTTJ25AsRTAoub8ONGcLmqrAmRLKBP1dfwhYB4N7knNnulqQxA+Uk1ihz0=
. 87367 IN RRSIG DNSKEY 8 0 172800 20150115235959 20150101000000 19036 . i8cAxD2pvQi1oAyvQxRpDfFlbqPzW+69QQEsDwE1eWOm5AtawO9U7lmsGps7sy/fVNvl1ljKBj4Djp9pb3U2FLogjiIlW0cDAkPmLlG9t+b/pjEfBNlhjANUVN06pvQVAfm+LcF26EaWT6FlISBqb6jSy4BHRa3Bdc4Sx7+pRSYSqVVvYxLkfAWsKPqGkvWhebJDndJJV9syXQXgZ+v/uJ+6XOS43xkAdeL8iBzIs/FlwMTfh3tVe3d0lb65IBBLlCzeQuetX+0Vu1YFcnD0mHc/wS2ZnAV5toAFmyVQBoY/XAZiZeaOkcROJ6Zmqezy7liwK7BqsYyAZntMhk8lbg==
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 883 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 15153
;; flags: qr rd ra ad cd ; qd: 1 an: 2 au: 0 ad: 1
;; QUESTIONS:
;; ch., type = DS, class = IN
;; ANSWERS:
ch. 967 IN DS 46375 8 2 8F96646FC68BB7E4AF4C0750A6096FBC0D4ECDA3D3FA6DA06FDDB42EE50C6CF3
ch. 967 IN RRSIG DS 8 1 86400 20150112170000 20150105160000 16665 . thY7xYWBBxiBjqbQIb9fAG4TmQgnziwM7q6P1T3/ITxmECdvOCQnnZA3uD7qmN8uM0HudsD7+y+zgD3rsH4RSTKdL4kHSI0OnCxToMTvklghEgFDezqIRm8NkWdI2H4Stwrj20nYKSpLQxPI2EE54gs18P3KyO8bAUYv8Qx73xU=
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 238 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 13386
;; flags: qr rd ra ad cd ; qd: 1 an: 4 au: 0 ad: 1
;; QUESTIONS:
;; ch., type = DNSKEY, class = IN
;; ANSWERS:
ch. 968 IN DNSKEY 257 3 8 AwEAAb7GhhZ8IAy/AhwmSms5DeQK5ad09wIIplEpYoiAIYXPtJvT1ReFzyfTp/2YP+g/PWDwHPh4qKAHa9x0VgbIQcGAeNakmfkAdWEmCnca323/SAml3mwfaX62G7/uYWae5zh8QTxZKNd+K1yZ5x0IxnI31chSl5xymRbTEHYZDKwSIRFM3fTxUMt93WFaBVWELReYotJBr++rvAWdnlay5TPBTvheLBkaiqtgM4GP8HK07Y+86lsZnEsj5K3G1KTV5SPpa82rqYAwxG9VKbmSE/6/kBR5jJHjt1rRt5Oe7v18aEtw0YCEN4vxq+KuvMoNVqXUsE9LBwHJD+QNwi6wmB0=
ch. 968 IN DNSKEY 256 3 8 AwEAAcSLdT0fEmcFmLpeUkAJoeVaHKiu+nbuc43fWlqaCRVf8t2HA4uWxOk0O5ci9nrFTc8nq8oa5fk5Cj7CHh4yrX9qUCfTdIWTyp8BDEdJpS+Dyb0u9wQuVj+nQMj4fLzdQf4TJs3/qxuiLr3nL1UUwlhhXeqSqGVb7p3mtB5HJ8ad
ch. 968 IN DNSKEY 256 3 8 AwEAAcsg0kY6fw1wzYMhSAKTy+Y2JzAst66P/1odp9NECJJHbU8f4nwziI3onoFSBV0ZiSZhY1aH5dhdDZ7BkrqhVXSrZPAz0CvzjIxmB1gSOf9DeZvjQvoy97HqYolxsf+B3QQv2RKBT67elF5+JisKg3/dQISelKn8LhabSoVrMlD1
ch. 968 IN RRSIG DNSKEY 8 1 86400 20150127100909 20141212090909 46375 ch. bT8q0FWyeMH0SulNo6UdIIgZYNATwYsee2bikq2Gh339Bufma8eaqWIPYT3XKmxYPBFOw0bVl+kLZxTwbR1CFoCDXoP+qgQhh4mf9qkNiv2CDSc+0FE3FRREn+DAhYTUEuB58FPiPakFB8s8O7T+k2qhDae7jy4/y7Jl1lnjaBY8s7bzOUPhF0KKCNZmvoKwtL23ZdVeTSV1xM3jkiNnpzBKbcoSWECSGJVp1SE0BnRXdwQP41YTXFZ0310YjaTAUCC5qbMIWdEkHjfdSQtKBImnc85mkapq9w++XQ4zhauPWBtrPV3CcoCahjUaWdjrKVkibomlJZaN8MEO23CfQw==
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 893 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 43748
;; flags: qr rd ra cd ; qd: 1 an: 3 au: 0 ad: 1
;; QUESTIONS:
;; ingotronic.ch., type = DS, class = IN
;; ANSWERS:
ingotronic.ch. 3576 IN DS 6031 5 1 733D0218B571CD617B1A7493564B9FC4F12ADE82
ingotronic.ch. 3576 IN DS 6031 5 2 4A948F2FDADA24686E473EDAC00DCF972584C75E3FAA92C2021B6221449FF87E
ingotronic.ch. 3576 IN RRSIG DS 8 2 3600 20150129033614 20150105123019 60789 ch. rVPJP2HhzW7OkroK2axFj5Lb4iVWCH8Fp/Iq1rF952NDo72b8RiKje2RaAKJAGQ+wd0YgE+PAej04GCmkhlDJA/zvPeeTxuhy3HbJzReMlQ7fjyH+wW1hli+FuIYvogXWf7nO/9VyPORt8X/f/pjrOr3Vlj9sGLN8TGYpEuVSw4=
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 288 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 40343
;; flags: qr aa rd ra cd ; qd: 1 an: 4 au: 0 ad: 1
;; QUESTIONS:
;; ingotronic.ch., type = DNSKEY, class = IN
;; ANSWERS:
ingotronic.ch. 300 IN DNSKEY 256 3 5 AwEAAZ2Xh77GFzpEDx7EHYxShqltHgkiG+BOjBGifEmnJhQSdE5/yNSLFNcdhZZ8HUPxYnaedTqJcFFg4AzUsQklF/fECegTJdZjaj2WoL0/I8K7HMfY/hVuRZUWPNglYi8agJRX6gdkFTCpUNI7stpgKqxtzUJhhw15uG/lKMplwqUr
ingotronic.ch. 300 IN DNSKEY 257 3 5 AwEAAeA1vzmjaB+eBAcvhzpKEgAEFpvQ1rg4uKDW6MsQtacKoqBpgyep2+LuWotz5p/xYxj3NGsArwN8Ad5cY0FHRr8miTT0elOv6nvlqGIfRuhj/BXAQ1x4ihpSFslHw0lJMYFwxsUZWpUyjWX/nv1xRZMMwF46gui0N4OEbyTYusCk77D+A71k+K0EAitFIbIH4GCUKmH1H7HmXhSVH9bN/n7KEGwW32lmsuuUcJoRKDkcUvbMXY/9Xoa2quERrUg/rBbDUHowRPjYDS5GzY1+f4YY8s40BufGiqyUTKKXL953MVFK8gmezXA0hbmrnZ7CBOw/7238mORAdzExaX8n7CE=
ingotronic.ch. 300 IN RRSIG DNSKEY 5 2 300 20150125003700 20141226001657 6031 ingotronic.ch. rs1QlP2SlSpA2ELbzwg3DgWLzXWL3Lpv6CUJE2Q0qH2Zp7Qdy3cD+ZEtNh9v24Qv1M6JJ3zFt8mmZoCeW2ycuMbJCqBkW9CBuwF+VznZvZY2MxwPipvhvEEGP//0M8YAZJ66yQPDv3PTdAP8FYbIrJyvY44vwyncwbslpfHT9jAsrbfr3vuMuWps86dnP462q+0s1TxBfqi8mzo3gdavjHKWVNwohLahLKT+tWeu6DSzQv0YwMjwtkLgF7QRgx3ctIIkloOrnx9nHH1N6y+hxEB89fOlyVDjHhgL5uVtsD5fEdT0FJ2Gc/2nShEMMqIwr1/J9kUq1mNySff/uEe65Q==
ingotronic.ch. 300 IN RRSIG DNSKEY 5 2 300 20150125003700 20141226001657 17430 ingotronic.ch. mEwZjhQqeWksWD0TCnNBrtce4YkWJL3edqL6PvAUu8Fn+Ih437kEs3+pqdkgRsdYQ9HW+lBm/8pWwJlNAv0bi9NykItXMwAUFtncgq+6Pnh3iAM972GXSa5VV4LcGQ5b8CBdHCHiEKDqyPv5Hr5QfYL/FQaWlcNRh4QZZlZNPFA=
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 940 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 33055
;; flags: qr aa rd ra cd ; qd: 1 an: 0 au: 4 ad: 1
;; QUESTIONS:
;; unsigned.ingotronic.ch., type = DS, class = IN
;; ANSWERS:
;; AUTHORITY RECORDS:
ingotronic.ch. 300 IN SOA ns1.ingotronic.ch. admin.ingotronic.ch. 2013032762 300 60 864000 300
ingotronic.ch. 300 IN RRSIG SOA 5 2 300 20150125021244 20141226011244 17430 ingotronic.ch. WDLpp9G0P/rlMBfpFn9sAfpEFoBnQfwyGSXbGCc/LG1FSkJoKLDQYDY696scLNsJgkrzZeJrl0oSSvA8AvRUhYRrmuqWMxTVFgYlRwPwqEMCKUqiVhKGVF4NYemoBiUQC4nJwBZd57xKCiF4AQ4CodBtiZxefJFAlTNE0g2yxtM=
unsigned.ingotronic.ch. 300 IN NSEC v.ingotronic.ch. NS RRSIG NSEC
unsigned.ingotronic.ch. 300 IN RRSIG NSEC 5 3 300 20150125004144 20141226003211 17430 ingotronic.ch. VsO/22QJi2Ny+QZBukileDIUc4/DqPdZwNssNbylPAscz0IBrLt9zKDcI26NSMqhFRFXIZqBXJScmKJseKB+wQUscwKK5kkzUIXK/SPbLQ8MLnOUKIXUgURDKDCp6W8eHoa/51dOS0Vb1woxmzN1kQnjTTUoW5z1igN7RcYCuGQ=
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 480 bytes
###############################################
dnssecjava-1.1.3/src/test/resources/recordings/org_jitsi_dnssec_TestWildcard/ 0000775 0000000 0000000 00000000000 13020541473 0027554 5 ustar 00root root 0000000 0000000 testDsNodataFromWildcardNsecChild 0000664 0000000 0000000 00000022616 13020541473 0036077 0 ustar 00root root 0000000 0000000 dnssecjava-1.1.3/src/test/resources/recordings/org_jitsi_dnssec_TestWildcard #Date: 2015-01-06T22:35:05+01:00
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 30309
;; flags: qr rd ra ad cd ; qd: 1 an: 4 au: 0 ad: 1
;; QUESTIONS:
;; ., type = DNSKEY, class = IN
;; ANSWERS:
. 87368 IN DNSKEY 256 3 8 AwEAAaPD7Y7XIi1MOEREJNTrRhyqsY3gff6JWzg+XCbqut1sbcbvqyssHw8DT1AkRaAC92pO8xuyq5QEgEPL1IHfABLwpwXI5gTj4gdwi86bpkmlWs9fRpnn4DPDCTdrnxIejJXgClHikLJF3u3CdpNCMijq4CKdQbMlRZ3avv+G7rh7
. 87368 IN DNSKEY 256 3 8 AwEAAe3fSrbLBy3LOS7pnxEUhvPZTE2H5dIGsI/UfruI/nOEvWWa/PSX2BFedBkEqOlYdjdNF2f+6lmfk2Od/xu0v5bVqxFE+/24v3hZSlWBxvXzPTAGHrbW/IJYEPqlzVOAS4XdUgHg0N7IbLywNHMvB+Yf+Nm6ctyXXFLV4WTNnzs7
. 87368 IN DNSKEY 257 3 8 AwEAAagAIKlVZrpC6Ia7gEzahOR+9W29euxhJhVVLOyQbSEW0O8gcCjFFVQUTf6v58fLjwBd0YI0EzrAcQqBGCzh/RStIoO8g0NfnfL2MTJRkxoXbfDaUeVPQuYEhg37NZWAJQ9VnMVDxP/VHL496M/QZxkjf5/Efucp2gaDX6RS6CXpoY68LsvPVjR0ZSwzz1apAzvN9dlzEheX7ICJBBtuA6G3LQpzW5hOA2hzCTMjJPJ8LbqF6dsV6DoBQzgul0sGIcGOYl7OyQdXfZ57relSQageu+ipAdTTJ25AsRTAoub8ONGcLmqrAmRLKBP1dfwhYB4N7knNnulqQxA+Uk1ihz0=
. 87368 IN RRSIG DNSKEY 8 0 172800 20150115235959 20150101000000 19036 . i8cAxD2pvQi1oAyvQxRpDfFlbqPzW+69QQEsDwE1eWOm5AtawO9U7lmsGps7sy/fVNvl1ljKBj4Djp9pb3U2FLogjiIlW0cDAkPmLlG9t+b/pjEfBNlhjANUVN06pvQVAfm+LcF26EaWT6FlISBqb6jSy4BHRa3Bdc4Sx7+pRSYSqVVvYxLkfAWsKPqGkvWhebJDndJJV9syXQXgZ+v/uJ+6XOS43xkAdeL8iBzIs/FlwMTfh3tVe3d0lb65IBBLlCzeQuetX+0Vu1YFcnD0mHc/wS2ZnAV5toAFmyVQBoY/XAZiZeaOkcROJ6Zmqezy7liwK7BqsYyAZntMhk8lbg==
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 883 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 51543
;; flags: qr rd ra ad cd ; qd: 1 an: 2 au: 0 ad: 1
;; QUESTIONS:
;; ch., type = DS, class = IN
;; ANSWERS:
ch. 968 IN DS 46375 8 2 8F96646FC68BB7E4AF4C0750A6096FBC0D4ECDA3D3FA6DA06FDDB42EE50C6CF3
ch. 968 IN RRSIG DS 8 1 86400 20150112170000 20150105160000 16665 . thY7xYWBBxiBjqbQIb9fAG4TmQgnziwM7q6P1T3/ITxmECdvOCQnnZA3uD7qmN8uM0HudsD7+y+zgD3rsH4RSTKdL4kHSI0OnCxToMTvklghEgFDezqIRm8NkWdI2H4Stwrj20nYKSpLQxPI2EE54gs18P3KyO8bAUYv8Qx73xU=
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 238 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 29661
;; flags: qr rd ra ad cd ; qd: 1 an: 4 au: 0 ad: 1
;; QUESTIONS:
;; ch., type = DNSKEY, class = IN
;; ANSWERS:
ch. 969 IN DNSKEY 257 3 8 AwEAAb7GhhZ8IAy/AhwmSms5DeQK5ad09wIIplEpYoiAIYXPtJvT1ReFzyfTp/2YP+g/PWDwHPh4qKAHa9x0VgbIQcGAeNakmfkAdWEmCnca323/SAml3mwfaX62G7/uYWae5zh8QTxZKNd+K1yZ5x0IxnI31chSl5xymRbTEHYZDKwSIRFM3fTxUMt93WFaBVWELReYotJBr++rvAWdnlay5TPBTvheLBkaiqtgM4GP8HK07Y+86lsZnEsj5K3G1KTV5SPpa82rqYAwxG9VKbmSE/6/kBR5jJHjt1rRt5Oe7v18aEtw0YCEN4vxq+KuvMoNVqXUsE9LBwHJD+QNwi6wmB0=
ch. 969 IN DNSKEY 256 3 8 AwEAAcSLdT0fEmcFmLpeUkAJoeVaHKiu+nbuc43fWlqaCRVf8t2HA4uWxOk0O5ci9nrFTc8nq8oa5fk5Cj7CHh4yrX9qUCfTdIWTyp8BDEdJpS+Dyb0u9wQuVj+nQMj4fLzdQf4TJs3/qxuiLr3nL1UUwlhhXeqSqGVb7p3mtB5HJ8ad
ch. 969 IN DNSKEY 256 3 8 AwEAAcsg0kY6fw1wzYMhSAKTy+Y2JzAst66P/1odp9NECJJHbU8f4nwziI3onoFSBV0ZiSZhY1aH5dhdDZ7BkrqhVXSrZPAz0CvzjIxmB1gSOf9DeZvjQvoy97HqYolxsf+B3QQv2RKBT67elF5+JisKg3/dQISelKn8LhabSoVrMlD1
ch. 969 IN RRSIG DNSKEY 8 1 86400 20150127100909 20141212090909 46375 ch. bT8q0FWyeMH0SulNo6UdIIgZYNATwYsee2bikq2Gh339Bufma8eaqWIPYT3XKmxYPBFOw0bVl+kLZxTwbR1CFoCDXoP+qgQhh4mf9qkNiv2CDSc+0FE3FRREn+DAhYTUEuB58FPiPakFB8s8O7T+k2qhDae7jy4/y7Jl1lnjaBY8s7bzOUPhF0KKCNZmvoKwtL23ZdVeTSV1xM3jkiNnpzBKbcoSWECSGJVp1SE0BnRXdwQP41YTXFZ0310YjaTAUCC5qbMIWdEkHjfdSQtKBImnc85mkapq9w++XQ4zhauPWBtrPV3CcoCahjUaWdjrKVkibomlJZaN8MEO23CfQw==
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 893 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 10556
;; flags: qr rd ra cd ; qd: 1 an: 3 au: 0 ad: 1
;; QUESTIONS:
;; ingotronic.ch., type = DS, class = IN
;; ANSWERS:
ingotronic.ch. 3577 IN DS 6031 5 1 733D0218B571CD617B1A7493564B9FC4F12ADE82
ingotronic.ch. 3577 IN DS 6031 5 2 4A948F2FDADA24686E473EDAC00DCF972584C75E3FAA92C2021B6221449FF87E
ingotronic.ch. 3577 IN RRSIG DS 8 2 3600 20150129033614 20150105123019 60789 ch. rVPJP2HhzW7OkroK2axFj5Lb4iVWCH8Fp/Iq1rF952NDo72b8RiKje2RaAKJAGQ+wd0YgE+PAej04GCmkhlDJA/zvPeeTxuhy3HbJzReMlQ7fjyH+wW1hli+FuIYvogXWf7nO/9VyPORt8X/f/pjrOr3Vlj9sGLN8TGYpEuVSw4=
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 288 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 55011
;; flags: qr aa rd ra cd ; qd: 1 an: 4 au: 0 ad: 1
;; QUESTIONS:
;; ingotronic.ch., type = DNSKEY, class = IN
;; ANSWERS:
ingotronic.ch. 300 IN DNSKEY 256 3 5 AwEAAZ2Xh77GFzpEDx7EHYxShqltHgkiG+BOjBGifEmnJhQSdE5/yNSLFNcdhZZ8HUPxYnaedTqJcFFg4AzUsQklF/fECegTJdZjaj2WoL0/I8K7HMfY/hVuRZUWPNglYi8agJRX6gdkFTCpUNI7stpgKqxtzUJhhw15uG/lKMplwqUr
ingotronic.ch. 300 IN DNSKEY 257 3 5 AwEAAeA1vzmjaB+eBAcvhzpKEgAEFpvQ1rg4uKDW6MsQtacKoqBpgyep2+LuWotz5p/xYxj3NGsArwN8Ad5cY0FHRr8miTT0elOv6nvlqGIfRuhj/BXAQ1x4ihpSFslHw0lJMYFwxsUZWpUyjWX/nv1xRZMMwF46gui0N4OEbyTYusCk77D+A71k+K0EAitFIbIH4GCUKmH1H7HmXhSVH9bN/n7KEGwW32lmsuuUcJoRKDkcUvbMXY/9Xoa2quERrUg/rBbDUHowRPjYDS5GzY1+f4YY8s40BufGiqyUTKKXL953MVFK8gmezXA0hbmrnZ7CBOw/7238mORAdzExaX8n7CE=
ingotronic.ch. 300 IN RRSIG DNSKEY 5 2 300 20150125003700 20141226001657 6031 ingotronic.ch. rs1QlP2SlSpA2ELbzwg3DgWLzXWL3Lpv6CUJE2Q0qH2Zp7Qdy3cD+ZEtNh9v24Qv1M6JJ3zFt8mmZoCeW2ycuMbJCqBkW9CBuwF+VznZvZY2MxwPipvhvEEGP//0M8YAZJ66yQPDv3PTdAP8FYbIrJyvY44vwyncwbslpfHT9jAsrbfr3vuMuWps86dnP462q+0s1TxBfqi8mzo3gdavjHKWVNwohLahLKT+tWeu6DSzQv0YwMjwtkLgF7QRgx3ctIIkloOrnx9nHH1N6y+hxEB89fOlyVDjHhgL5uVtsD5fEdT0FJ2Gc/2nShEMMqIwr1/J9kUq1mNySff/uEe65Q==
ingotronic.ch. 300 IN RRSIG DNSKEY 5 2 300 20150125003700 20141226001657 17430 ingotronic.ch. mEwZjhQqeWksWD0TCnNBrtce4YkWJL3edqL6PvAUu8Fn+Ih437kEs3+pqdkgRsdYQ9HW+lBm/8pWwJlNAv0bi9NykItXMwAUFtncgq+6Pnh3iAM972GXSa5VV4LcGQ5b8CBdHCHiEKDqyPv5Hr5QfYL/FQaWlcNRh4QZZlZNPFA=
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 940 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 60076
;; flags: qr aa rd ra cd ; qd: 1 an: 0 au: 4 ad: 1
;; QUESTIONS:
;; c.ingotronic.ch., type = DS, class = IN
;; ANSWERS:
;; AUTHORITY RECORDS:
ingotronic.ch. 300 IN SOA ns1.ingotronic.ch. admin.ingotronic.ch. 2013032762 300 60 864000 300
ingotronic.ch. 300 IN RRSIG SOA 5 2 300 20150125021244 20141226011244 17430 ingotronic.ch. WDLpp9G0P/rlMBfpFn9sAfpEFoBnQfwyGSXbGCc/LG1FSkJoKLDQYDY696scLNsJgkrzZeJrl0oSSvA8AvRUhYRrmuqWMxTVFgYlRwPwqEMCKUqiVhKGVF4NYemoBiUQC4nJwBZd57xKCiF4AQ4CodBtiZxefJFAlTNE0g2yxtM=
a.b.ingotronic.ch. 300 IN NSEC *.c.ingotronic.ch. A RRSIG NSEC
a.b.ingotronic.ch. 300 IN RRSIG NSEC 5 4 300 20150125000532 20141225234703 17430 ingotronic.ch. HMCFItkk6JIV9hcHJ+p+OO5CI8B7H4fWy6w8kMfKPA/Z/lUcjlSKSexxd4ppubXfaVDhTW5j3Nd0rEpKbxztd9MZGVbvk7LJibvpD4ACR0xSmE69fyjrxrN/uDPYVPL5uOTklgDAlinQS3E6KulWr5iST9H4gmhfrk5MpvK4fcc=
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 479 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 60766
;; flags: qr aa rd ra cd ; qd: 1 an: 0 au: 4 ad: 1
;; QUESTIONS:
;; x.c.ingotronic.ch., type = DS, class = IN
;; ANSWERS:
;; AUTHORITY RECORDS:
ingotronic.ch. 300 IN SOA ns1.ingotronic.ch. admin.ingotronic.ch. 2013032762 300 60 864000 300
ingotronic.ch. 300 IN RRSIG SOA 5 2 300 20150125021244 20141226011244 17430 ingotronic.ch. WDLpp9G0P/rlMBfpFn9sAfpEFoBnQfwyGSXbGCc/LG1FSkJoKLDQYDY696scLNsJgkrzZeJrl0oSSvA8AvRUhYRrmuqWMxTVFgYlRwPwqEMCKUqiVhKGVF4NYemoBiUQC4nJwBZd57xKCiF4AQ4CodBtiZxefJFAlTNE0g2yxtM=
*.c.ingotronic.ch. 300 IN NSEC cfailed.ingotronic.ch. A RRSIG NSEC
*.c.ingotronic.ch. 300 IN RRSIG NSEC 5 3 300 20150125000532 20141225234703 17430 ingotronic.ch. Lf7FP3WsqHc3SUznxjp367ehSI5mcUE7OzvHQj68BfC77FPylpt3YLtyirEZVjVKPjQ6maarQakizn6u7KFf1jFr2kGpS1rZCvyfAxGX6wwIZK/Wf0lfhP0IquQd+kX2OlmRbbemFI/lFG72NAcB+19t8tcwV5k6ADkxC2L6o/4=
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 483 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 8878
;; flags: qr aa rd ra cd ; qd: 1 an: 0 au: 4 ad: 1
;; QUESTIONS:
;; www.x.c.ingotronic.ch., type = DS, class = IN
;; ANSWERS:
;; AUTHORITY RECORDS:
ingotronic.ch. 300 IN SOA ns1.ingotronic.ch. admin.ingotronic.ch. 2013032762 300 60 864000 300
ingotronic.ch. 300 IN RRSIG SOA 5 2 300 20150125021244 20141226011244 17430 ingotronic.ch. WDLpp9G0P/rlMBfpFn9sAfpEFoBnQfwyGSXbGCc/LG1FSkJoKLDQYDY696scLNsJgkrzZeJrl0oSSvA8AvRUhYRrmuqWMxTVFgYlRwPwqEMCKUqiVhKGVF4NYemoBiUQC4nJwBZd57xKCiF4AQ4CodBtiZxefJFAlTNE0g2yxtM=
*.c.ingotronic.ch. 300 IN NSEC cfailed.ingotronic.ch. A RRSIG NSEC
*.c.ingotronic.ch. 300 IN RRSIG NSEC 5 3 300 20150125000532 20141225234703 17430 ingotronic.ch. Lf7FP3WsqHc3SUznxjp367ehSI5mcUE7OzvHQj68BfC77FPylpt3YLtyirEZVjVKPjQ6maarQakizn6u7KFf1jFr2kGpS1rZCvyfAxGX6wwIZK/Wf0lfhP0IquQd+kX2OlmRbbemFI/lFG72NAcB+19t8tcwV5k6ADkxC2L6o/4=
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 487 bytes
###############################################
testDsNodataFromWildcardNsecCovered 0000664 0000000 0000000 00000017173 13020541473 0036445 0 ustar 00root root 0000000 0000000 dnssecjava-1.1.3/src/test/resources/recordings/org_jitsi_dnssec_TestWildcard #Date: 2015-01-06T22:35:03+01:00
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 50725
;; flags: qr rd ra ad cd ; qd: 1 an: 4 au: 0 ad: 1
;; QUESTIONS:
;; ., type = DNSKEY, class = IN
;; ANSWERS:
. 87370 IN DNSKEY 256 3 8 AwEAAe3fSrbLBy3LOS7pnxEUhvPZTE2H5dIGsI/UfruI/nOEvWWa/PSX2BFedBkEqOlYdjdNF2f+6lmfk2Od/xu0v5bVqxFE+/24v3hZSlWBxvXzPTAGHrbW/IJYEPqlzVOAS4XdUgHg0N7IbLywNHMvB+Yf+Nm6ctyXXFLV4WTNnzs7
. 87370 IN DNSKEY 256 3 8 AwEAAaPD7Y7XIi1MOEREJNTrRhyqsY3gff6JWzg+XCbqut1sbcbvqyssHw8DT1AkRaAC92pO8xuyq5QEgEPL1IHfABLwpwXI5gTj4gdwi86bpkmlWs9fRpnn4DPDCTdrnxIejJXgClHikLJF3u3CdpNCMijq4CKdQbMlRZ3avv+G7rh7
. 87370 IN DNSKEY 257 3 8 AwEAAagAIKlVZrpC6Ia7gEzahOR+9W29euxhJhVVLOyQbSEW0O8gcCjFFVQUTf6v58fLjwBd0YI0EzrAcQqBGCzh/RStIoO8g0NfnfL2MTJRkxoXbfDaUeVPQuYEhg37NZWAJQ9VnMVDxP/VHL496M/QZxkjf5/Efucp2gaDX6RS6CXpoY68LsvPVjR0ZSwzz1apAzvN9dlzEheX7ICJBBtuA6G3LQpzW5hOA2hzCTMjJPJ8LbqF6dsV6DoBQzgul0sGIcGOYl7OyQdXfZ57relSQageu+ipAdTTJ25AsRTAoub8ONGcLmqrAmRLKBP1dfwhYB4N7knNnulqQxA+Uk1ihz0=
. 87370 IN RRSIG DNSKEY 8 0 172800 20150115235959 20150101000000 19036 . i8cAxD2pvQi1oAyvQxRpDfFlbqPzW+69QQEsDwE1eWOm5AtawO9U7lmsGps7sy/fVNvl1ljKBj4Djp9pb3U2FLogjiIlW0cDAkPmLlG9t+b/pjEfBNlhjANUVN06pvQVAfm+LcF26EaWT6FlISBqb6jSy4BHRa3Bdc4Sx7+pRSYSqVVvYxLkfAWsKPqGkvWhebJDndJJV9syXQXgZ+v/uJ+6XOS43xkAdeL8iBzIs/FlwMTfh3tVe3d0lb65IBBLlCzeQuetX+0Vu1YFcnD0mHc/wS2ZnAV5toAFmyVQBoY/XAZiZeaOkcROJ6Zmqezy7liwK7BqsYyAZntMhk8lbg==
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 883 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 29961
;; flags: qr rd ra ad cd ; qd: 1 an: 2 au: 0 ad: 1
;; QUESTIONS:
;; ch., type = DS, class = IN
;; ANSWERS:
ch. 970 IN DS 46375 8 2 8F96646FC68BB7E4AF4C0750A6096FBC0D4ECDA3D3FA6DA06FDDB42EE50C6CF3
ch. 970 IN RRSIG DS 8 1 86400 20150112170000 20150105160000 16665 . thY7xYWBBxiBjqbQIb9fAG4TmQgnziwM7q6P1T3/ITxmECdvOCQnnZA3uD7qmN8uM0HudsD7+y+zgD3rsH4RSTKdL4kHSI0OnCxToMTvklghEgFDezqIRm8NkWdI2H4Stwrj20nYKSpLQxPI2EE54gs18P3KyO8bAUYv8Qx73xU=
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 238 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 35385
;; flags: qr rd ra ad cd ; qd: 1 an: 4 au: 0 ad: 1
;; QUESTIONS:
;; ch., type = DNSKEY, class = IN
;; ANSWERS:
ch. 971 IN DNSKEY 256 3 8 AwEAAcsg0kY6fw1wzYMhSAKTy+Y2JzAst66P/1odp9NECJJHbU8f4nwziI3onoFSBV0ZiSZhY1aH5dhdDZ7BkrqhVXSrZPAz0CvzjIxmB1gSOf9DeZvjQvoy97HqYolxsf+B3QQv2RKBT67elF5+JisKg3/dQISelKn8LhabSoVrMlD1
ch. 971 IN DNSKEY 257 3 8 AwEAAb7GhhZ8IAy/AhwmSms5DeQK5ad09wIIplEpYoiAIYXPtJvT1ReFzyfTp/2YP+g/PWDwHPh4qKAHa9x0VgbIQcGAeNakmfkAdWEmCnca323/SAml3mwfaX62G7/uYWae5zh8QTxZKNd+K1yZ5x0IxnI31chSl5xymRbTEHYZDKwSIRFM3fTxUMt93WFaBVWELReYotJBr++rvAWdnlay5TPBTvheLBkaiqtgM4GP8HK07Y+86lsZnEsj5K3G1KTV5SPpa82rqYAwxG9VKbmSE/6/kBR5jJHjt1rRt5Oe7v18aEtw0YCEN4vxq+KuvMoNVqXUsE9LBwHJD+QNwi6wmB0=
ch. 971 IN DNSKEY 256 3 8 AwEAAcSLdT0fEmcFmLpeUkAJoeVaHKiu+nbuc43fWlqaCRVf8t2HA4uWxOk0O5ci9nrFTc8nq8oa5fk5Cj7CHh4yrX9qUCfTdIWTyp8BDEdJpS+Dyb0u9wQuVj+nQMj4fLzdQf4TJs3/qxuiLr3nL1UUwlhhXeqSqGVb7p3mtB5HJ8ad
ch. 971 IN RRSIG DNSKEY 8 1 86400 20150127100909 20141212090909 46375 ch. bT8q0FWyeMH0SulNo6UdIIgZYNATwYsee2bikq2Gh339Bufma8eaqWIPYT3XKmxYPBFOw0bVl+kLZxTwbR1CFoCDXoP+qgQhh4mf9qkNiv2CDSc+0FE3FRREn+DAhYTUEuB58FPiPakFB8s8O7T+k2qhDae7jy4/y7Jl1lnjaBY8s7bzOUPhF0KKCNZmvoKwtL23ZdVeTSV1xM3jkiNnpzBKbcoSWECSGJVp1SE0BnRXdwQP41YTXFZ0310YjaTAUCC5qbMIWdEkHjfdSQtKBImnc85mkapq9w++XQ4zhauPWBtrPV3CcoCahjUaWdjrKVkibomlJZaN8MEO23CfQw==
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 893 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 20327
;; flags: qr rd ra cd ; qd: 1 an: 3 au: 0 ad: 1
;; QUESTIONS:
;; ingotronic.ch., type = DS, class = IN
;; ANSWERS:
ingotronic.ch. 3579 IN DS 6031 5 2 4A948F2FDADA24686E473EDAC00DCF972584C75E3FAA92C2021B6221449FF87E
ingotronic.ch. 3579 IN DS 6031 5 1 733D0218B571CD617B1A7493564B9FC4F12ADE82
ingotronic.ch. 3579 IN RRSIG DS 8 2 3600 20150129033614 20150105123019 60789 ch. rVPJP2HhzW7OkroK2axFj5Lb4iVWCH8Fp/Iq1rF952NDo72b8RiKje2RaAKJAGQ+wd0YgE+PAej04GCmkhlDJA/zvPeeTxuhy3HbJzReMlQ7fjyH+wW1hli+FuIYvogXWf7nO/9VyPORt8X/f/pjrOr3Vlj9sGLN8TGYpEuVSw4=
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 288 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 47920
;; flags: qr aa rd ra cd ; qd: 1 an: 4 au: 0 ad: 1
;; QUESTIONS:
;; ingotronic.ch., type = DNSKEY, class = IN
;; ANSWERS:
ingotronic.ch. 300 IN DNSKEY 256 3 5 AwEAAZ2Xh77GFzpEDx7EHYxShqltHgkiG+BOjBGifEmnJhQSdE5/yNSLFNcdhZZ8HUPxYnaedTqJcFFg4AzUsQklF/fECegTJdZjaj2WoL0/I8K7HMfY/hVuRZUWPNglYi8agJRX6gdkFTCpUNI7stpgKqxtzUJhhw15uG/lKMplwqUr
ingotronic.ch. 300 IN DNSKEY 257 3 5 AwEAAeA1vzmjaB+eBAcvhzpKEgAEFpvQ1rg4uKDW6MsQtacKoqBpgyep2+LuWotz5p/xYxj3NGsArwN8Ad5cY0FHRr8miTT0elOv6nvlqGIfRuhj/BXAQ1x4ihpSFslHw0lJMYFwxsUZWpUyjWX/nv1xRZMMwF46gui0N4OEbyTYusCk77D+A71k+K0EAitFIbIH4GCUKmH1H7HmXhSVH9bN/n7KEGwW32lmsuuUcJoRKDkcUvbMXY/9Xoa2quERrUg/rBbDUHowRPjYDS5GzY1+f4YY8s40BufGiqyUTKKXL953MVFK8gmezXA0hbmrnZ7CBOw/7238mORAdzExaX8n7CE=
ingotronic.ch. 300 IN RRSIG DNSKEY 5 2 300 20150125003700 20141226001657 6031 ingotronic.ch. rs1QlP2SlSpA2ELbzwg3DgWLzXWL3Lpv6CUJE2Q0qH2Zp7Qdy3cD+ZEtNh9v24Qv1M6JJ3zFt8mmZoCeW2ycuMbJCqBkW9CBuwF+VznZvZY2MxwPipvhvEEGP//0M8YAZJ66yQPDv3PTdAP8FYbIrJyvY44vwyncwbslpfHT9jAsrbfr3vuMuWps86dnP462q+0s1TxBfqi8mzo3gdavjHKWVNwohLahLKT+tWeu6DSzQv0YwMjwtkLgF7QRgx3ctIIkloOrnx9nHH1N6y+hxEB89fOlyVDjHhgL5uVtsD5fEdT0FJ2Gc/2nShEMMqIwr1/J9kUq1mNySff/uEe65Q==
ingotronic.ch. 300 IN RRSIG DNSKEY 5 2 300 20150125003700 20141226001657 17430 ingotronic.ch. mEwZjhQqeWksWD0TCnNBrtce4YkWJL3edqL6PvAUu8Fn+Ih437kEs3+pqdkgRsdYQ9HW+lBm/8pWwJlNAv0bi9NykItXMwAUFtncgq+6Pnh3iAM972GXSa5VV4LcGQ5b8CBdHCHiEKDqyPv5Hr5QfYL/FQaWlcNRh4QZZlZNPFA=
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 940 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 20309
;; flags: qr aa rd ra cd ; qd: 1 an: 0 au: 6 ad: 1
;; QUESTIONS:
;; ce.ingotronic.ch., type = DS, class = IN
;; ANSWERS:
;; AUTHORITY RECORDS:
ingotronic.ch. 300 IN SOA ns1.ingotronic.ch. admin.ingotronic.ch. 2013032762 300 60 864000 300
ingotronic.ch. 300 IN RRSIG SOA 5 2 300 20150125021244 20141226011244 17430 ingotronic.ch. WDLpp9G0P/rlMBfpFn9sAfpEFoBnQfwyGSXbGCc/LG1FSkJoKLDQYDY696scLNsJgkrzZeJrl0oSSvA8AvRUhYRrmuqWMxTVFgYlRwPwqEMCKUqiVhKGVF4NYemoBiUQC4nJwBZd57xKCiF4AQ4CodBtiZxefJFAlTNE0g2yxtM=
ingotronic.ch. 300 IN NSEC alias.ingotronic.ch. A NS SOA RRSIG NSEC DNSKEY
ingotronic.ch. 300 IN RRSIG NSEC 5 2 300 20150125000532 20141225234703 17430 ingotronic.ch. en5BaZ6zWqEvoUFUDPm5g1pjz7THXBv/1kjKtV2tS+7xh0BtkLEzlA9n/H66ZZAX2EIh7vXj12xVJKOuEuM0o1mJwKsBaLQuTra60/zYAUIddwUOCzI3zzjiRFklPyHSnLkGoBODZcvehnsTzTPyBxkfoouleqpj7gN5jOSBL8M=
*.c.ingotronic.ch. 300 IN NSEC cfailed.ingotronic.ch. A RRSIG NSEC
*.c.ingotronic.ch. 300 IN RRSIG NSEC 5 3 300 20150125000532 20141225234703 17430 ingotronic.ch. Lf7FP3WsqHc3SUznxjp367ehSI5mcUE7OzvHQj68BfC77FPylpt3YLtyirEZVjVKPjQ6maarQakizn6u7KFf1jFr2kGpS1rZCvyfAxGX6wwIZK/Wf0lfhP0IquQd+kX2OlmRbbemFI/lFG72NAcB+19t8tcwV5k6ADkxC2L6o/4=
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 699 bytes
###############################################
testLabelCountInSignaturesNotAllSame 0000664 0000000 0000000 00000046730 13020541473 0036636 0 ustar 00root root 0000000 0000000 dnssecjava-1.1.3/src/test/resources/recordings/org_jitsi_dnssec_TestWildcard #Date: 2015-01-06T22:35:02+01:00
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 6386
;; flags: qr aa rd ra cd ; qd: 1 an: 2 au: 4 ad: 3
;; QUESTIONS:
;; b.d.nsec3.ingotronic.ch., type = A, class = IN
;; ANSWERS:
b.d.nsec3.ingotronic.ch. 300 IN A 127.0.0.1
b.d.nsec3.ingotronic.ch. 300 IN RRSIG A 7 5 300 20150125011553 20141226004758 62417 nsec3.ingotronic.ch. vYIVCLyXQa6nNezkqsRtXFfx5Ne/9O665IJRyIn5InKvS1YQ16rEbSAitkDNRU8rdYrojjbl0ZZD6VNh21UwM2QOpM+I/Fv8VXTLSOUD24unM3NjPUMI6sLk+25EFGjEqv+IConZgmMylZwqdtocH8gOXid1IYVsU1u6x47GsLs=
b.d.nsec3.ingotronic.ch. 300 IN RRSIG A 7 4 300 20150125011553 20141226004758 62417 nsec3.ingotronic.ch. eTKm2GV3eV5Y8U6GoqwV+r3ddroqbgszQ6ffKiDPOSnPjgBQ5NP0MgR4ZC8iP7yp/ycVAx8BsnCwUfv1CDIZ1eeOAFRDmOiUlU3NqUA+Lklz+HLkK67P9w8WKcVkn079CPyPvp6Z0VNHq1o3WhRhVWzRYK2BMvZhqT2anYe8uQY=
;; AUTHORITY RECORDS:
nsec3.ingotronic.ch. 300 IN NS ns1.ingotronic.ch.
nsec3.ingotronic.ch. 300 IN RRSIG NS 7 3 300 20150125010458 20141226002309 62417 nsec3.ingotronic.ch. fl2Q0YQQ1TduolGLyQx8vGqSApoBbb6A+go5SLFBYQobrPfO/rb+SM8JvnlzNX/Xa7dRhDYrnfBTFUm1mCur9aIi34gu5UwDNQvt/GXY5dC3+DEy/28bTZ43UuCs+qGH9u9leFwGX4neFNl0s5B4RpxBN4is8dXMUvOda6QcsOw=
810L2KR9HCVTELBLO8GQM0EMIM8KD01E.nsec3.ingotronic.ch. 300 IN NSEC3 1 0 10 1234 8VOO8LLV6NQKGVAP6LG1M4QMLMOS8LMK CNAME RRSIG
810L2KR9HCVTELBLO8GQM0EMIM8KD01E.nsec3.ingotronic.ch. 300 IN RRSIG NSEC3 7 4 300 20150125010458 20141226002309 62417 nsec3.ingotronic.ch. oVpQ8URiobH7xZcbioe1KuVi7wDEvJDLlS1vN4phMRXDhe8JwA6iGHi8jq+iOT4FkzhO9LTsFJJEI6Nj509+1X2zvRwAfYauanMdXog5vh5d7WF+/Q3LxbybKeol0HvIrJGXeoVnaFJAh8WvMWwnb1tM6mHp1GKtWoWiH8pv6+0=
;; ADDITIONAL RECORDS:
ns1.ingotronic.ch. 300 IN A 62.192.5.131
ns1.ingotronic.ch. 300 IN RRSIG A 5 3 300 20150125005754 20141226001054 17430 ingotronic.ch. fNG1RZM53pXwBxruHNaSZszxVzNLoCq8VZsTjAzYH2vSLzHXYVGJFTLIeY0K9APAdyJU8WuwmABmn7XY0Kg39kRG77uoFlqUws2PdTz2QKOwJGZY7W88Ak2Y9lkDBcK8o3wJHVptrT8R7p/1U7UfjF0kqPUkakk2B0EbFWdagFg=
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 893 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 29930
;; flags: qr rd ra ad cd ; qd: 1 an: 4 au: 0 ad: 1
;; QUESTIONS:
;; ., type = DNSKEY, class = IN
;; ANSWERS:
. 87371 IN DNSKEY 257 3 8 AwEAAagAIKlVZrpC6Ia7gEzahOR+9W29euxhJhVVLOyQbSEW0O8gcCjFFVQUTf6v58fLjwBd0YI0EzrAcQqBGCzh/RStIoO8g0NfnfL2MTJRkxoXbfDaUeVPQuYEhg37NZWAJQ9VnMVDxP/VHL496M/QZxkjf5/Efucp2gaDX6RS6CXpoY68LsvPVjR0ZSwzz1apAzvN9dlzEheX7ICJBBtuA6G3LQpzW5hOA2hzCTMjJPJ8LbqF6dsV6DoBQzgul0sGIcGOYl7OyQdXfZ57relSQageu+ipAdTTJ25AsRTAoub8ONGcLmqrAmRLKBP1dfwhYB4N7knNnulqQxA+Uk1ihz0=
. 87371 IN DNSKEY 256 3 8 AwEAAaPD7Y7XIi1MOEREJNTrRhyqsY3gff6JWzg+XCbqut1sbcbvqyssHw8DT1AkRaAC92pO8xuyq5QEgEPL1IHfABLwpwXI5gTj4gdwi86bpkmlWs9fRpnn4DPDCTdrnxIejJXgClHikLJF3u3CdpNCMijq4CKdQbMlRZ3avv+G7rh7
. 87371 IN DNSKEY 256 3 8 AwEAAe3fSrbLBy3LOS7pnxEUhvPZTE2H5dIGsI/UfruI/nOEvWWa/PSX2BFedBkEqOlYdjdNF2f+6lmfk2Od/xu0v5bVqxFE+/24v3hZSlWBxvXzPTAGHrbW/IJYEPqlzVOAS4XdUgHg0N7IbLywNHMvB+Yf+Nm6ctyXXFLV4WTNnzs7
. 87371 IN RRSIG DNSKEY 8 0 172800 20150115235959 20150101000000 19036 . i8cAxD2pvQi1oAyvQxRpDfFlbqPzW+69QQEsDwE1eWOm5AtawO9U7lmsGps7sy/fVNvl1ljKBj4Djp9pb3U2FLogjiIlW0cDAkPmLlG9t+b/pjEfBNlhjANUVN06pvQVAfm+LcF26EaWT6FlISBqb6jSy4BHRa3Bdc4Sx7+pRSYSqVVvYxLkfAWsKPqGkvWhebJDndJJV9syXQXgZ+v/uJ+6XOS43xkAdeL8iBzIs/FlwMTfh3tVe3d0lb65IBBLlCzeQuetX+0Vu1YFcnD0mHc/wS2ZnAV5toAFmyVQBoY/XAZiZeaOkcROJ6Zmqezy7liwK7BqsYyAZntMhk8lbg==
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 883 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 12727
;; flags: qr rd ra ad cd ; qd: 1 an: 2 au: 0 ad: 1
;; QUESTIONS:
;; ch., type = DS, class = IN
;; ANSWERS:
ch. 971 IN DS 46375 8 2 8F96646FC68BB7E4AF4C0750A6096FBC0D4ECDA3D3FA6DA06FDDB42EE50C6CF3
ch. 971 IN RRSIG DS 8 1 86400 20150112170000 20150105160000 16665 . thY7xYWBBxiBjqbQIb9fAG4TmQgnziwM7q6P1T3/ITxmECdvOCQnnZA3uD7qmN8uM0HudsD7+y+zgD3rsH4RSTKdL4kHSI0OnCxToMTvklghEgFDezqIRm8NkWdI2H4Stwrj20nYKSpLQxPI2EE54gs18P3KyO8bAUYv8Qx73xU=
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 238 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 14423
;; flags: qr rd ra ad cd ; qd: 1 an: 4 au: 0 ad: 1
;; QUESTIONS:
;; ch., type = DNSKEY, class = IN
;; ANSWERS:
ch. 972 IN DNSKEY 257 3 8 AwEAAb7GhhZ8IAy/AhwmSms5DeQK5ad09wIIplEpYoiAIYXPtJvT1ReFzyfTp/2YP+g/PWDwHPh4qKAHa9x0VgbIQcGAeNakmfkAdWEmCnca323/SAml3mwfaX62G7/uYWae5zh8QTxZKNd+K1yZ5x0IxnI31chSl5xymRbTEHYZDKwSIRFM3fTxUMt93WFaBVWELReYotJBr++rvAWdnlay5TPBTvheLBkaiqtgM4GP8HK07Y+86lsZnEsj5K3G1KTV5SPpa82rqYAwxG9VKbmSE/6/kBR5jJHjt1rRt5Oe7v18aEtw0YCEN4vxq+KuvMoNVqXUsE9LBwHJD+QNwi6wmB0=
ch. 972 IN DNSKEY 256 3 8 AwEAAcSLdT0fEmcFmLpeUkAJoeVaHKiu+nbuc43fWlqaCRVf8t2HA4uWxOk0O5ci9nrFTc8nq8oa5fk5Cj7CHh4yrX9qUCfTdIWTyp8BDEdJpS+Dyb0u9wQuVj+nQMj4fLzdQf4TJs3/qxuiLr3nL1UUwlhhXeqSqGVb7p3mtB5HJ8ad
ch. 972 IN DNSKEY 256 3 8 AwEAAcsg0kY6fw1wzYMhSAKTy+Y2JzAst66P/1odp9NECJJHbU8f4nwziI3onoFSBV0ZiSZhY1aH5dhdDZ7BkrqhVXSrZPAz0CvzjIxmB1gSOf9DeZvjQvoy97HqYolxsf+B3QQv2RKBT67elF5+JisKg3/dQISelKn8LhabSoVrMlD1
ch. 972 IN RRSIG DNSKEY 8 1 86400 20150127100909 20141212090909 46375 ch. bT8q0FWyeMH0SulNo6UdIIgZYNATwYsee2bikq2Gh339Bufma8eaqWIPYT3XKmxYPBFOw0bVl+kLZxTwbR1CFoCDXoP+qgQhh4mf9qkNiv2CDSc+0FE3FRREn+DAhYTUEuB58FPiPakFB8s8O7T+k2qhDae7jy4/y7Jl1lnjaBY8s7bzOUPhF0KKCNZmvoKwtL23ZdVeTSV1xM3jkiNnpzBKbcoSWECSGJVp1SE0BnRXdwQP41YTXFZ0310YjaTAUCC5qbMIWdEkHjfdSQtKBImnc85mkapq9w++XQ4zhauPWBtrPV3CcoCahjUaWdjrKVkibomlJZaN8MEO23CfQw==
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 893 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 57122
;; flags: qr rd ra cd ; qd: 1 an: 3 au: 0 ad: 1
;; QUESTIONS:
;; ingotronic.ch., type = DS, class = IN
;; ANSWERS:
ingotronic.ch. 3580 IN DS 6031 5 1 733D0218B571CD617B1A7493564B9FC4F12ADE82
ingotronic.ch. 3580 IN DS 6031 5 2 4A948F2FDADA24686E473EDAC00DCF972584C75E3FAA92C2021B6221449FF87E
ingotronic.ch. 3580 IN RRSIG DS 8 2 3600 20150129033614 20150105123019 60789 ch. rVPJP2HhzW7OkroK2axFj5Lb4iVWCH8Fp/Iq1rF952NDo72b8RiKje2RaAKJAGQ+wd0YgE+PAej04GCmkhlDJA/zvPeeTxuhy3HbJzReMlQ7fjyH+wW1hli+FuIYvogXWf7nO/9VyPORt8X/f/pjrOr3Vlj9sGLN8TGYpEuVSw4=
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 288 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 12690
;; flags: qr aa rd ra cd ; qd: 1 an: 4 au: 0 ad: 1
;; QUESTIONS:
;; ingotronic.ch., type = DNSKEY, class = IN
;; ANSWERS:
ingotronic.ch. 300 IN DNSKEY 257 3 5 AwEAAeA1vzmjaB+eBAcvhzpKEgAEFpvQ1rg4uKDW6MsQtacKoqBpgyep2+LuWotz5p/xYxj3NGsArwN8Ad5cY0FHRr8miTT0elOv6nvlqGIfRuhj/BXAQ1x4ihpSFslHw0lJMYFwxsUZWpUyjWX/nv1xRZMMwF46gui0N4OEbyTYusCk77D+A71k+K0EAitFIbIH4GCUKmH1H7HmXhSVH9bN/n7KEGwW32lmsuuUcJoRKDkcUvbMXY/9Xoa2quERrUg/rBbDUHowRPjYDS5GzY1+f4YY8s40BufGiqyUTKKXL953MVFK8gmezXA0hbmrnZ7CBOw/7238mORAdzExaX8n7CE=
ingotronic.ch. 300 IN DNSKEY 256 3 5 AwEAAZ2Xh77GFzpEDx7EHYxShqltHgkiG+BOjBGifEmnJhQSdE5/yNSLFNcdhZZ8HUPxYnaedTqJcFFg4AzUsQklF/fECegTJdZjaj2WoL0/I8K7HMfY/hVuRZUWPNglYi8agJRX6gdkFTCpUNI7stpgKqxtzUJhhw15uG/lKMplwqUr
ingotronic.ch. 300 IN RRSIG DNSKEY 5 2 300 20150125003700 20141226001657 6031 ingotronic.ch. rs1QlP2SlSpA2ELbzwg3DgWLzXWL3Lpv6CUJE2Q0qH2Zp7Qdy3cD+ZEtNh9v24Qv1M6JJ3zFt8mmZoCeW2ycuMbJCqBkW9CBuwF+VznZvZY2MxwPipvhvEEGP//0M8YAZJ66yQPDv3PTdAP8FYbIrJyvY44vwyncwbslpfHT9jAsrbfr3vuMuWps86dnP462q+0s1TxBfqi8mzo3gdavjHKWVNwohLahLKT+tWeu6DSzQv0YwMjwtkLgF7QRgx3ctIIkloOrnx9nHH1N6y+hxEB89fOlyVDjHhgL5uVtsD5fEdT0FJ2Gc/2nShEMMqIwr1/J9kUq1mNySff/uEe65Q==
ingotronic.ch. 300 IN RRSIG DNSKEY 5 2 300 20150125003700 20141226001657 17430 ingotronic.ch. mEwZjhQqeWksWD0TCnNBrtce4YkWJL3edqL6PvAUu8Fn+Ih437kEs3+pqdkgRsdYQ9HW+lBm/8pWwJlNAv0bi9NykItXMwAUFtncgq+6Pnh3iAM972GXSa5VV4LcGQ5b8CBdHCHiEKDqyPv5Hr5QfYL/FQaWlcNRh4QZZlZNPFA=
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 940 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 18356
;; flags: qr aa rd ra cd ; qd: 1 an: 3 au: 0 ad: 1
;; QUESTIONS:
;; nsec3.ingotronic.ch., type = DS, class = IN
;; ANSWERS:
nsec3.ingotronic.ch. 300 IN DS 16758 7 2 3C8DC02750A1636F829B45D6E6D642866768A9CD40A013AD9D25AB63734FFA13
nsec3.ingotronic.ch. 300 IN DS 16758 7 1 1720FF268E09A2CB63805EC8782D10AAD20E12A5
nsec3.ingotronic.ch. 300 IN RRSIG DS 5 3 300 20150125011134 20141226002644 17430 ingotronic.ch. hNurzlGhlyHbSgezPDuhIrtN9ZMsMXZbKGc7HD5rUuM88wD3fM97NxdzF+2Hi1USvBZ5GsQv63L+lAzf+mFPBoPIFHtTiAv8up7kQKRKmi/EzzkCYd/CC4UYdDZbaUyv7esh7spSOGwjPJNdK831p+MgltoWaYtnSGVMgOKk5mc=
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 305 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 21569
;; flags: qr aa rd ra cd ; qd: 1 an: 4 au: 0 ad: 1
;; QUESTIONS:
;; nsec3.ingotronic.ch., type = DNSKEY, class = IN
;; ANSWERS:
nsec3.ingotronic.ch. 300 IN DNSKEY 257 3 7 AwEAAaBuJTf9oGyeTH3biUkAFLrsYrkodX1H7Snsui4XsDHFCBvs5XYacHbs0Jg0/O51KPjmNnjwMW8SSyDkKqYQ+9uYAf2EQ/pnD/VGQqnV2cw0Vwk/t0E2V4FUCju4pnAoyzZFZXGs1eWbX9JXu++b0Azp+ACq6485qJLzHhWDiIrPoK/SvdbFVRK4s+nPPJLH3NGBbtdz6kPq7aFWYBMoGeAZdN1wsQpcNWUo5eOmaJY53nMc7+rDpAyYlMe/FKwSZdX2ZDd63Qsa6Im4FVUJq/nWLq7tlQ/mWks15uDTQyJy/OWfA0ICCO4N9Fel9rThJNpJWEzOCblvZyBoy405kZk=
nsec3.ingotronic.ch. 300 IN DNSKEY 256 3 7 AwEAAccAWxkTVGZ6UAp0VEozAlYpARhbh6Y6tYOl6Fg3UeBNFFtDQ9fTEEt1NkbnR9u8KkpVN6a67avlYiUN1egDqEwzDU7R1Rw+/USdhm2hqOARmmu3DBgjjX/iXjZLyv310cOGFJZ/smcodlDL4pDAAoPxh/qs6KEBaT0sc1KWcGq3
nsec3.ingotronic.ch. 300 IN RRSIG DNSKEY 7 3 300 20150125001457 20141226000444 16758 nsec3.ingotronic.ch. mXi1ylDi8XkRPup+YlT8GPdYE+P7gb6+/VdAwtodI916IzrkGkOHOTLbnrbAqqJOh0HxVCYXdxovmEcbJKUFKwplrQg3XD7/9Sq4pKU1MhMFEGrm/QPkM4u0mgjQwyToDLGuPHuFyur3FSjO/n54uGhAEft9JOFk/WKtWdCnm2LLyQrpC6herA3efFaI8kZhdoEY02AwihWVJxHasmz7lOoKRgNrkfELU+fN4+V7ISsRfJMyZc6q5PuNeG6vFD0uNE8tpdLJCSMurKYVpelvYqzFIcRTYcIjXwmS+L3DGjupqWMzFZVmpQM62JG3KCCD0ffpnNb0nWoSoHwpSeh/3Q==
nsec3.ingotronic.ch. 300 IN RRSIG DNSKEY 7 3 300 20150125001457 20141226000444 62417 nsec3.ingotronic.ch. PyCrf8T5dAfJzapb1p+kcTALPjDuD2niSaXXo0KeHAunT+6gJicLML2S/ZpiYr7X7Ma4Z0TYqE02qH6pcLYNnSgv9BE8sZO0nRtPekSyTy5nLi4hFADYhjb3UjaB85qmQZcqm64vC/CJhWO4t6Eixg/5MYALw+Qdy5Fo0qy/U5E=
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 958 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 53334
;; flags: qr rd ra ad cd ; qd: 1 an: 4 au: 0 ad: 1
;; QUESTIONS:
;; ., type = DNSKEY, class = IN
;; ANSWERS:
. 87371 IN DNSKEY 257 3 8 AwEAAagAIKlVZrpC6Ia7gEzahOR+9W29euxhJhVVLOyQbSEW0O8gcCjFFVQUTf6v58fLjwBd0YI0EzrAcQqBGCzh/RStIoO8g0NfnfL2MTJRkxoXbfDaUeVPQuYEhg37NZWAJQ9VnMVDxP/VHL496M/QZxkjf5/Efucp2gaDX6RS6CXpoY68LsvPVjR0ZSwzz1apAzvN9dlzEheX7ICJBBtuA6G3LQpzW5hOA2hzCTMjJPJ8LbqF6dsV6DoBQzgul0sGIcGOYl7OyQdXfZ57relSQageu+ipAdTTJ25AsRTAoub8ONGcLmqrAmRLKBP1dfwhYB4N7knNnulqQxA+Uk1ihz0=
. 87371 IN DNSKEY 256 3 8 AwEAAe3fSrbLBy3LOS7pnxEUhvPZTE2H5dIGsI/UfruI/nOEvWWa/PSX2BFedBkEqOlYdjdNF2f+6lmfk2Od/xu0v5bVqxFE+/24v3hZSlWBxvXzPTAGHrbW/IJYEPqlzVOAS4XdUgHg0N7IbLywNHMvB+Yf+Nm6ctyXXFLV4WTNnzs7
. 87371 IN DNSKEY 256 3 8 AwEAAaPD7Y7XIi1MOEREJNTrRhyqsY3gff6JWzg+XCbqut1sbcbvqyssHw8DT1AkRaAC92pO8xuyq5QEgEPL1IHfABLwpwXI5gTj4gdwi86bpkmlWs9fRpnn4DPDCTdrnxIejJXgClHikLJF3u3CdpNCMijq4CKdQbMlRZ3avv+G7rh7
. 87371 IN RRSIG DNSKEY 8 0 172800 20150115235959 20150101000000 19036 . i8cAxD2pvQi1oAyvQxRpDfFlbqPzW+69QQEsDwE1eWOm5AtawO9U7lmsGps7sy/fVNvl1ljKBj4Djp9pb3U2FLogjiIlW0cDAkPmLlG9t+b/pjEfBNlhjANUVN06pvQVAfm+LcF26EaWT6FlISBqb6jSy4BHRa3Bdc4Sx7+pRSYSqVVvYxLkfAWsKPqGkvWhebJDndJJV9syXQXgZ+v/uJ+6XOS43xkAdeL8iBzIs/FlwMTfh3tVe3d0lb65IBBLlCzeQuetX+0Vu1YFcnD0mHc/wS2ZnAV5toAFmyVQBoY/XAZiZeaOkcROJ6Zmqezy7liwK7BqsYyAZntMhk8lbg==
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 883 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 33527
;; flags: qr rd ra ad cd ; qd: 1 an: 2 au: 0 ad: 1
;; QUESTIONS:
;; ch., type = DS, class = IN
;; ANSWERS:
ch. 971 IN DS 46375 8 2 8F96646FC68BB7E4AF4C0750A6096FBC0D4ECDA3D3FA6DA06FDDB42EE50C6CF3
ch. 971 IN RRSIG DS 8 1 86400 20150112170000 20150105160000 16665 . thY7xYWBBxiBjqbQIb9fAG4TmQgnziwM7q6P1T3/ITxmECdvOCQnnZA3uD7qmN8uM0HudsD7+y+zgD3rsH4RSTKdL4kHSI0OnCxToMTvklghEgFDezqIRm8NkWdI2H4Stwrj20nYKSpLQxPI2EE54gs18P3KyO8bAUYv8Qx73xU=
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 238 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 17311
;; flags: qr rd ra ad cd ; qd: 1 an: 4 au: 0 ad: 1
;; QUESTIONS:
;; ch., type = DNSKEY, class = IN
;; ANSWERS:
ch. 972 IN DNSKEY 256 3 8 AwEAAcsg0kY6fw1wzYMhSAKTy+Y2JzAst66P/1odp9NECJJHbU8f4nwziI3onoFSBV0ZiSZhY1aH5dhdDZ7BkrqhVXSrZPAz0CvzjIxmB1gSOf9DeZvjQvoy97HqYolxsf+B3QQv2RKBT67elF5+JisKg3/dQISelKn8LhabSoVrMlD1
ch. 972 IN DNSKEY 257 3 8 AwEAAb7GhhZ8IAy/AhwmSms5DeQK5ad09wIIplEpYoiAIYXPtJvT1ReFzyfTp/2YP+g/PWDwHPh4qKAHa9x0VgbIQcGAeNakmfkAdWEmCnca323/SAml3mwfaX62G7/uYWae5zh8QTxZKNd+K1yZ5x0IxnI31chSl5xymRbTEHYZDKwSIRFM3fTxUMt93WFaBVWELReYotJBr++rvAWdnlay5TPBTvheLBkaiqtgM4GP8HK07Y+86lsZnEsj5K3G1KTV5SPpa82rqYAwxG9VKbmSE/6/kBR5jJHjt1rRt5Oe7v18aEtw0YCEN4vxq+KuvMoNVqXUsE9LBwHJD+QNwi6wmB0=
ch. 972 IN DNSKEY 256 3 8 AwEAAcSLdT0fEmcFmLpeUkAJoeVaHKiu+nbuc43fWlqaCRVf8t2HA4uWxOk0O5ci9nrFTc8nq8oa5fk5Cj7CHh4yrX9qUCfTdIWTyp8BDEdJpS+Dyb0u9wQuVj+nQMj4fLzdQf4TJs3/qxuiLr3nL1UUwlhhXeqSqGVb7p3mtB5HJ8ad
ch. 972 IN RRSIG DNSKEY 8 1 86400 20150127100909 20141212090909 46375 ch. bT8q0FWyeMH0SulNo6UdIIgZYNATwYsee2bikq2Gh339Bufma8eaqWIPYT3XKmxYPBFOw0bVl+kLZxTwbR1CFoCDXoP+qgQhh4mf9qkNiv2CDSc+0FE3FRREn+DAhYTUEuB58FPiPakFB8s8O7T+k2qhDae7jy4/y7Jl1lnjaBY8s7bzOUPhF0KKCNZmvoKwtL23ZdVeTSV1xM3jkiNnpzBKbcoSWECSGJVp1SE0BnRXdwQP41YTXFZ0310YjaTAUCC5qbMIWdEkHjfdSQtKBImnc85mkapq9w++XQ4zhauPWBtrPV3CcoCahjUaWdjrKVkibomlJZaN8MEO23CfQw==
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 893 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 51328
;; flags: qr rd ra cd ; qd: 1 an: 3 au: 0 ad: 1
;; QUESTIONS:
;; ingotronic.ch., type = DS, class = IN
;; ANSWERS:
ingotronic.ch. 3580 IN DS 6031 5 1 733D0218B571CD617B1A7493564B9FC4F12ADE82
ingotronic.ch. 3580 IN DS 6031 5 2 4A948F2FDADA24686E473EDAC00DCF972584C75E3FAA92C2021B6221449FF87E
ingotronic.ch. 3580 IN RRSIG DS 8 2 3600 20150129033614 20150105123019 60789 ch. rVPJP2HhzW7OkroK2axFj5Lb4iVWCH8Fp/Iq1rF952NDo72b8RiKje2RaAKJAGQ+wd0YgE+PAej04GCmkhlDJA/zvPeeTxuhy3HbJzReMlQ7fjyH+wW1hli+FuIYvogXWf7nO/9VyPORt8X/f/pjrOr3Vlj9sGLN8TGYpEuVSw4=
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 288 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 6320
;; flags: qr aa rd ra cd ; qd: 1 an: 4 au: 0 ad: 1
;; QUESTIONS:
;; ingotronic.ch., type = DNSKEY, class = IN
;; ANSWERS:
ingotronic.ch. 300 IN DNSKEY 256 3 5 AwEAAZ2Xh77GFzpEDx7EHYxShqltHgkiG+BOjBGifEmnJhQSdE5/yNSLFNcdhZZ8HUPxYnaedTqJcFFg4AzUsQklF/fECegTJdZjaj2WoL0/I8K7HMfY/hVuRZUWPNglYi8agJRX6gdkFTCpUNI7stpgKqxtzUJhhw15uG/lKMplwqUr
ingotronic.ch. 300 IN DNSKEY 257 3 5 AwEAAeA1vzmjaB+eBAcvhzpKEgAEFpvQ1rg4uKDW6MsQtacKoqBpgyep2+LuWotz5p/xYxj3NGsArwN8Ad5cY0FHRr8miTT0elOv6nvlqGIfRuhj/BXAQ1x4ihpSFslHw0lJMYFwxsUZWpUyjWX/nv1xRZMMwF46gui0N4OEbyTYusCk77D+A71k+K0EAitFIbIH4GCUKmH1H7HmXhSVH9bN/n7KEGwW32lmsuuUcJoRKDkcUvbMXY/9Xoa2quERrUg/rBbDUHowRPjYDS5GzY1+f4YY8s40BufGiqyUTKKXL953MVFK8gmezXA0hbmrnZ7CBOw/7238mORAdzExaX8n7CE=
ingotronic.ch. 300 IN RRSIG DNSKEY 5 2 300 20150125003700 20141226001657 6031 ingotronic.ch. rs1QlP2SlSpA2ELbzwg3DgWLzXWL3Lpv6CUJE2Q0qH2Zp7Qdy3cD+ZEtNh9v24Qv1M6JJ3zFt8mmZoCeW2ycuMbJCqBkW9CBuwF+VznZvZY2MxwPipvhvEEGP//0M8YAZJ66yQPDv3PTdAP8FYbIrJyvY44vwyncwbslpfHT9jAsrbfr3vuMuWps86dnP462q+0s1TxBfqi8mzo3gdavjHKWVNwohLahLKT+tWeu6DSzQv0YwMjwtkLgF7QRgx3ctIIkloOrnx9nHH1N6y+hxEB89fOlyVDjHhgL5uVtsD5fEdT0FJ2Gc/2nShEMMqIwr1/J9kUq1mNySff/uEe65Q==
ingotronic.ch. 300 IN RRSIG DNSKEY 5 2 300 20150125003700 20141226001657 17430 ingotronic.ch. mEwZjhQqeWksWD0TCnNBrtce4YkWJL3edqL6PvAUu8Fn+Ih437kEs3+pqdkgRsdYQ9HW+lBm/8pWwJlNAv0bi9NykItXMwAUFtncgq+6Pnh3iAM972GXSa5VV4LcGQ5b8CBdHCHiEKDqyPv5Hr5QfYL/FQaWlcNRh4QZZlZNPFA=
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 940 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 43131
;; flags: qr aa rd ra cd ; qd: 1 an: 3 au: 0 ad: 1
;; QUESTIONS:
;; nsec3.ingotronic.ch., type = DS, class = IN
;; ANSWERS:
nsec3.ingotronic.ch. 300 IN DS 16758 7 1 1720FF268E09A2CB63805EC8782D10AAD20E12A5
nsec3.ingotronic.ch. 300 IN DS 16758 7 2 3C8DC02750A1636F829B45D6E6D642866768A9CD40A013AD9D25AB63734FFA13
nsec3.ingotronic.ch. 300 IN RRSIG DS 5 3 300 20150125011134 20141226002644 17430 ingotronic.ch. hNurzlGhlyHbSgezPDuhIrtN9ZMsMXZbKGc7HD5rUuM88wD3fM97NxdzF+2Hi1USvBZ5GsQv63L+lAzf+mFPBoPIFHtTiAv8up7kQKRKmi/EzzkCYd/CC4UYdDZbaUyv7esh7spSOGwjPJNdK831p+MgltoWaYtnSGVMgOKk5mc=
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 305 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 52988
;; flags: qr aa rd ra cd ; qd: 1 an: 4 au: 0 ad: 1
;; QUESTIONS:
;; nsec3.ingotronic.ch., type = DNSKEY, class = IN
;; ANSWERS:
nsec3.ingotronic.ch. 300 IN DNSKEY 256 3 7 AwEAAccAWxkTVGZ6UAp0VEozAlYpARhbh6Y6tYOl6Fg3UeBNFFtDQ9fTEEt1NkbnR9u8KkpVN6a67avlYiUN1egDqEwzDU7R1Rw+/USdhm2hqOARmmu3DBgjjX/iXjZLyv310cOGFJZ/smcodlDL4pDAAoPxh/qs6KEBaT0sc1KWcGq3
nsec3.ingotronic.ch. 300 IN DNSKEY 257 3 7 AwEAAaBuJTf9oGyeTH3biUkAFLrsYrkodX1H7Snsui4XsDHFCBvs5XYacHbs0Jg0/O51KPjmNnjwMW8SSyDkKqYQ+9uYAf2EQ/pnD/VGQqnV2cw0Vwk/t0E2V4FUCju4pnAoyzZFZXGs1eWbX9JXu++b0Azp+ACq6485qJLzHhWDiIrPoK/SvdbFVRK4s+nPPJLH3NGBbtdz6kPq7aFWYBMoGeAZdN1wsQpcNWUo5eOmaJY53nMc7+rDpAyYlMe/FKwSZdX2ZDd63Qsa6Im4FVUJq/nWLq7tlQ/mWks15uDTQyJy/OWfA0ICCO4N9Fel9rThJNpJWEzOCblvZyBoy405kZk=
nsec3.ingotronic.ch. 300 IN RRSIG DNSKEY 7 3 300 20150125001457 20141226000444 16758 nsec3.ingotronic.ch. mXi1ylDi8XkRPup+YlT8GPdYE+P7gb6+/VdAwtodI916IzrkGkOHOTLbnrbAqqJOh0HxVCYXdxovmEcbJKUFKwplrQg3XD7/9Sq4pKU1MhMFEGrm/QPkM4u0mgjQwyToDLGuPHuFyur3FSjO/n54uGhAEft9JOFk/WKtWdCnm2LLyQrpC6herA3efFaI8kZhdoEY02AwihWVJxHasmz7lOoKRgNrkfELU+fN4+V7ISsRfJMyZc6q5PuNeG6vFD0uNE8tpdLJCSMurKYVpelvYqzFIcRTYcIjXwmS+L3DGjupqWMzFZVmpQM62JG3KCCD0ffpnNb0nWoSoHwpSeh/3Q==
nsec3.ingotronic.ch. 300 IN RRSIG DNSKEY 7 3 300 20150125001457 20141226000444 62417 nsec3.ingotronic.ch. PyCrf8T5dAfJzapb1p+kcTALPjDuD2niSaXXo0KeHAunT+6gJicLML2S/ZpiYr7X7Ma4Z0TYqE02qH6pcLYNnSgv9BE8sZO0nRtPekSyTy5nLi4hFADYhjb3UjaB85qmQZcqm64vC/CJhWO4t6Eixg/5MYALw+Qdy5Fo0qy/U5E=
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 958 bytes
###############################################
testNameNotExpandedFromWildcardWhenNonWildcardExists 0000664 0000000 0000000 00000034030 13020541473 0041777 0 ustar 00root root 0000000 0000000 dnssecjava-1.1.3/src/test/resources/recordings/org_jitsi_dnssec_TestWildcard #Date: 2015-01-06T22:35:03+01:00
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 5694
;; flags: qr aa rd ra cd ; qd: 1 an: 2 au: 4 ad: 3
;; QUESTIONS:
;; b.d.ingotronic.ch., type = A, class = IN
;; ANSWERS:
b.d.ingotronic.ch. 300 IN A 127.0.0.2
b.d.ingotronic.ch. 300 IN RRSIG A 5 3 300 20150125012443 20141226010256 17430 ingotronic.ch. R/R9YKXD6MKoCLSiSyedgPvCyz4vC5twiGXU0ho/612q1zukfCBpfehpthnlhaers9I+3sQZKsRjUYq2e7hs+5pawLne4wxlAJUVR8qZ/u3U0zZlDLFyswQQebTUfx5cUn1r5xWTMsODa/Za3QcxaNWRBlX7SQmP4CaHVD8BlsY=
;; AUTHORITY RECORDS:
ingotronic.ch. 300 IN NS ns1.ingotronic.ch.
ingotronic.ch. 300 IN RRSIG NS 5 2 300 20150125000532 20141225234703 17430 ingotronic.ch. VuzVJM3McSHlcdngCG/G23zCikq8tXE0CZV2ZSgUFXXFMIEoM6PMi1QRQ/8VF3tee4WGpRx2jhtkui0wFRFfwIhW7G1uPDT4qogaR3KLIyuCEsMxhRH3WJZNrLmLqlSBGvd9OBJwbmryqm3Zzqvrk+E+rh8OJeifnBBpHAX4eHg=
a.d.ingotronic.ch. 300 IN NSEC a.e.ingotronic.ch. A RRSIG NSEC
a.d.ingotronic.ch. 300 IN RRSIG NSEC 5 4 300 20150125011134 20141226002644 17430 ingotronic.ch. Xlth6wbhlD20uaeZZWKeREQgQBsYN6ztO8zPCWCeklur7YQ3X3aZJGhiNqPPhrdP2g9VEadeFQjCI5eGslXFoJtRPqAVswbk2K0wD8NSeoKRAXhW3N91AQodcalgOhiX5yuqST6gLxJl3WXgwUDvco+JvrfSFWV8FLwZ3RQ/26U=
;; ADDITIONAL RECORDS:
ns1.ingotronic.ch. 300 IN A 62.192.5.131
ns1.ingotronic.ch. 300 IN RRSIG A 5 3 300 20150125005754 20141226001054 17430 ingotronic.ch. fNG1RZM53pXwBxruHNaSZszxVzNLoCq8VZsTjAzYH2vSLzHXYVGJFTLIeY0K9APAdyJU8WuwmABmn7XY0Kg39kRG77uoFlqUws2PdTz2QKOwJGZY7W88Ak2Y9lkDBcK8o3wJHVptrT8R7p/1U7UfjF0kqPUkakk2B0EbFWdagFg=
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 829 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 56054
;; flags: qr rd ra ad cd ; qd: 1 an: 4 au: 0 ad: 1
;; QUESTIONS:
;; ., type = DNSKEY, class = IN
;; ANSWERS:
. 87370 IN DNSKEY 256 3 8 AwEAAaPD7Y7XIi1MOEREJNTrRhyqsY3gff6JWzg+XCbqut1sbcbvqyssHw8DT1AkRaAC92pO8xuyq5QEgEPL1IHfABLwpwXI5gTj4gdwi86bpkmlWs9fRpnn4DPDCTdrnxIejJXgClHikLJF3u3CdpNCMijq4CKdQbMlRZ3avv+G7rh7
. 87370 IN DNSKEY 256 3 8 AwEAAe3fSrbLBy3LOS7pnxEUhvPZTE2H5dIGsI/UfruI/nOEvWWa/PSX2BFedBkEqOlYdjdNF2f+6lmfk2Od/xu0v5bVqxFE+/24v3hZSlWBxvXzPTAGHrbW/IJYEPqlzVOAS4XdUgHg0N7IbLywNHMvB+Yf+Nm6ctyXXFLV4WTNnzs7
. 87370 IN DNSKEY 257 3 8 AwEAAagAIKlVZrpC6Ia7gEzahOR+9W29euxhJhVVLOyQbSEW0O8gcCjFFVQUTf6v58fLjwBd0YI0EzrAcQqBGCzh/RStIoO8g0NfnfL2MTJRkxoXbfDaUeVPQuYEhg37NZWAJQ9VnMVDxP/VHL496M/QZxkjf5/Efucp2gaDX6RS6CXpoY68LsvPVjR0ZSwzz1apAzvN9dlzEheX7ICJBBtuA6G3LQpzW5hOA2hzCTMjJPJ8LbqF6dsV6DoBQzgul0sGIcGOYl7OyQdXfZ57relSQageu+ipAdTTJ25AsRTAoub8ONGcLmqrAmRLKBP1dfwhYB4N7knNnulqQxA+Uk1ihz0=
. 87370 IN RRSIG DNSKEY 8 0 172800 20150115235959 20150101000000 19036 . i8cAxD2pvQi1oAyvQxRpDfFlbqPzW+69QQEsDwE1eWOm5AtawO9U7lmsGps7sy/fVNvl1ljKBj4Djp9pb3U2FLogjiIlW0cDAkPmLlG9t+b/pjEfBNlhjANUVN06pvQVAfm+LcF26EaWT6FlISBqb6jSy4BHRa3Bdc4Sx7+pRSYSqVVvYxLkfAWsKPqGkvWhebJDndJJV9syXQXgZ+v/uJ+6XOS43xkAdeL8iBzIs/FlwMTfh3tVe3d0lb65IBBLlCzeQuetX+0Vu1YFcnD0mHc/wS2ZnAV5toAFmyVQBoY/XAZiZeaOkcROJ6Zmqezy7liwK7BqsYyAZntMhk8lbg==
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 883 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 2068
;; flags: qr rd ra ad cd ; qd: 1 an: 2 au: 0 ad: 1
;; QUESTIONS:
;; ch., type = DS, class = IN
;; ANSWERS:
ch. 970 IN DS 46375 8 2 8F96646FC68BB7E4AF4C0750A6096FBC0D4ECDA3D3FA6DA06FDDB42EE50C6CF3
ch. 970 IN RRSIG DS 8 1 86400 20150112170000 20150105160000 16665 . thY7xYWBBxiBjqbQIb9fAG4TmQgnziwM7q6P1T3/ITxmECdvOCQnnZA3uD7qmN8uM0HudsD7+y+zgD3rsH4RSTKdL4kHSI0OnCxToMTvklghEgFDezqIRm8NkWdI2H4Stwrj20nYKSpLQxPI2EE54gs18P3KyO8bAUYv8Qx73xU=
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 238 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 30440
;; flags: qr rd ra ad cd ; qd: 1 an: 4 au: 0 ad: 1
;; QUESTIONS:
;; ch., type = DNSKEY, class = IN
;; ANSWERS:
ch. 971 IN DNSKEY 257 3 8 AwEAAb7GhhZ8IAy/AhwmSms5DeQK5ad09wIIplEpYoiAIYXPtJvT1ReFzyfTp/2YP+g/PWDwHPh4qKAHa9x0VgbIQcGAeNakmfkAdWEmCnca323/SAml3mwfaX62G7/uYWae5zh8QTxZKNd+K1yZ5x0IxnI31chSl5xymRbTEHYZDKwSIRFM3fTxUMt93WFaBVWELReYotJBr++rvAWdnlay5TPBTvheLBkaiqtgM4GP8HK07Y+86lsZnEsj5K3G1KTV5SPpa82rqYAwxG9VKbmSE/6/kBR5jJHjt1rRt5Oe7v18aEtw0YCEN4vxq+KuvMoNVqXUsE9LBwHJD+QNwi6wmB0=
ch. 971 IN DNSKEY 256 3 8 AwEAAcsg0kY6fw1wzYMhSAKTy+Y2JzAst66P/1odp9NECJJHbU8f4nwziI3onoFSBV0ZiSZhY1aH5dhdDZ7BkrqhVXSrZPAz0CvzjIxmB1gSOf9DeZvjQvoy97HqYolxsf+B3QQv2RKBT67elF5+JisKg3/dQISelKn8LhabSoVrMlD1
ch. 971 IN DNSKEY 256 3 8 AwEAAcSLdT0fEmcFmLpeUkAJoeVaHKiu+nbuc43fWlqaCRVf8t2HA4uWxOk0O5ci9nrFTc8nq8oa5fk5Cj7CHh4yrX9qUCfTdIWTyp8BDEdJpS+Dyb0u9wQuVj+nQMj4fLzdQf4TJs3/qxuiLr3nL1UUwlhhXeqSqGVb7p3mtB5HJ8ad
ch. 971 IN RRSIG DNSKEY 8 1 86400 20150127100909 20141212090909 46375 ch. bT8q0FWyeMH0SulNo6UdIIgZYNATwYsee2bikq2Gh339Bufma8eaqWIPYT3XKmxYPBFOw0bVl+kLZxTwbR1CFoCDXoP+qgQhh4mf9qkNiv2CDSc+0FE3FRREn+DAhYTUEuB58FPiPakFB8s8O7T+k2qhDae7jy4/y7Jl1lnjaBY8s7bzOUPhF0KKCNZmvoKwtL23ZdVeTSV1xM3jkiNnpzBKbcoSWECSGJVp1SE0BnRXdwQP41YTXFZ0310YjaTAUCC5qbMIWdEkHjfdSQtKBImnc85mkapq9w++XQ4zhauPWBtrPV3CcoCahjUaWdjrKVkibomlJZaN8MEO23CfQw==
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 893 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 39575
;; flags: qr rd ra cd ; qd: 1 an: 3 au: 0 ad: 1
;; QUESTIONS:
;; ingotronic.ch., type = DS, class = IN
;; ANSWERS:
ingotronic.ch. 3579 IN DS 6031 5 1 733D0218B571CD617B1A7493564B9FC4F12ADE82
ingotronic.ch. 3579 IN DS 6031 5 2 4A948F2FDADA24686E473EDAC00DCF972584C75E3FAA92C2021B6221449FF87E
ingotronic.ch. 3579 IN RRSIG DS 8 2 3600 20150129033614 20150105123019 60789 ch. rVPJP2HhzW7OkroK2axFj5Lb4iVWCH8Fp/Iq1rF952NDo72b8RiKje2RaAKJAGQ+wd0YgE+PAej04GCmkhlDJA/zvPeeTxuhy3HbJzReMlQ7fjyH+wW1hli+FuIYvogXWf7nO/9VyPORt8X/f/pjrOr3Vlj9sGLN8TGYpEuVSw4=
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 288 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 13421
;; flags: qr aa rd ra cd ; qd: 1 an: 4 au: 0 ad: 1
;; QUESTIONS:
;; ingotronic.ch., type = DNSKEY, class = IN
;; ANSWERS:
ingotronic.ch. 300 IN DNSKEY 257 3 5 AwEAAeA1vzmjaB+eBAcvhzpKEgAEFpvQ1rg4uKDW6MsQtacKoqBpgyep2+LuWotz5p/xYxj3NGsArwN8Ad5cY0FHRr8miTT0elOv6nvlqGIfRuhj/BXAQ1x4ihpSFslHw0lJMYFwxsUZWpUyjWX/nv1xRZMMwF46gui0N4OEbyTYusCk77D+A71k+K0EAitFIbIH4GCUKmH1H7HmXhSVH9bN/n7KEGwW32lmsuuUcJoRKDkcUvbMXY/9Xoa2quERrUg/rBbDUHowRPjYDS5GzY1+f4YY8s40BufGiqyUTKKXL953MVFK8gmezXA0hbmrnZ7CBOw/7238mORAdzExaX8n7CE=
ingotronic.ch. 300 IN DNSKEY 256 3 5 AwEAAZ2Xh77GFzpEDx7EHYxShqltHgkiG+BOjBGifEmnJhQSdE5/yNSLFNcdhZZ8HUPxYnaedTqJcFFg4AzUsQklF/fECegTJdZjaj2WoL0/I8K7HMfY/hVuRZUWPNglYi8agJRX6gdkFTCpUNI7stpgKqxtzUJhhw15uG/lKMplwqUr
ingotronic.ch. 300 IN RRSIG DNSKEY 5 2 300 20150125003700 20141226001657 6031 ingotronic.ch. rs1QlP2SlSpA2ELbzwg3DgWLzXWL3Lpv6CUJE2Q0qH2Zp7Qdy3cD+ZEtNh9v24Qv1M6JJ3zFt8mmZoCeW2ycuMbJCqBkW9CBuwF+VznZvZY2MxwPipvhvEEGP//0M8YAZJ66yQPDv3PTdAP8FYbIrJyvY44vwyncwbslpfHT9jAsrbfr3vuMuWps86dnP462q+0s1TxBfqi8mzo3gdavjHKWVNwohLahLKT+tWeu6DSzQv0YwMjwtkLgF7QRgx3ctIIkloOrnx9nHH1N6y+hxEB89fOlyVDjHhgL5uVtsD5fEdT0FJ2Gc/2nShEMMqIwr1/J9kUq1mNySff/uEe65Q==
ingotronic.ch. 300 IN RRSIG DNSKEY 5 2 300 20150125003700 20141226001657 17430 ingotronic.ch. mEwZjhQqeWksWD0TCnNBrtce4YkWJL3edqL6PvAUu8Fn+Ih437kEs3+pqdkgRsdYQ9HW+lBm/8pWwJlNAv0bi9NykItXMwAUFtncgq+6Pnh3iAM972GXSa5VV4LcGQ5b8CBdHCHiEKDqyPv5Hr5QfYL/FQaWlcNRh4QZZlZNPFA=
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 940 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 472
;; flags: qr rd ra ad cd ; qd: 1 an: 4 au: 0 ad: 1
;; QUESTIONS:
;; ., type = DNSKEY, class = IN
;; ANSWERS:
. 87370 IN DNSKEY 256 3 8 AwEAAaPD7Y7XIi1MOEREJNTrRhyqsY3gff6JWzg+XCbqut1sbcbvqyssHw8DT1AkRaAC92pO8xuyq5QEgEPL1IHfABLwpwXI5gTj4gdwi86bpkmlWs9fRpnn4DPDCTdrnxIejJXgClHikLJF3u3CdpNCMijq4CKdQbMlRZ3avv+G7rh7
. 87370 IN DNSKEY 256 3 8 AwEAAe3fSrbLBy3LOS7pnxEUhvPZTE2H5dIGsI/UfruI/nOEvWWa/PSX2BFedBkEqOlYdjdNF2f+6lmfk2Od/xu0v5bVqxFE+/24v3hZSlWBxvXzPTAGHrbW/IJYEPqlzVOAS4XdUgHg0N7IbLywNHMvB+Yf+Nm6ctyXXFLV4WTNnzs7
. 87370 IN DNSKEY 257 3 8 AwEAAagAIKlVZrpC6Ia7gEzahOR+9W29euxhJhVVLOyQbSEW0O8gcCjFFVQUTf6v58fLjwBd0YI0EzrAcQqBGCzh/RStIoO8g0NfnfL2MTJRkxoXbfDaUeVPQuYEhg37NZWAJQ9VnMVDxP/VHL496M/QZxkjf5/Efucp2gaDX6RS6CXpoY68LsvPVjR0ZSwzz1apAzvN9dlzEheX7ICJBBtuA6G3LQpzW5hOA2hzCTMjJPJ8LbqF6dsV6DoBQzgul0sGIcGOYl7OyQdXfZ57relSQageu+ipAdTTJ25AsRTAoub8ONGcLmqrAmRLKBP1dfwhYB4N7knNnulqQxA+Uk1ihz0=
. 87370 IN RRSIG DNSKEY 8 0 172800 20150115235959 20150101000000 19036 . i8cAxD2pvQi1oAyvQxRpDfFlbqPzW+69QQEsDwE1eWOm5AtawO9U7lmsGps7sy/fVNvl1ljKBj4Djp9pb3U2FLogjiIlW0cDAkPmLlG9t+b/pjEfBNlhjANUVN06pvQVAfm+LcF26EaWT6FlISBqb6jSy4BHRa3Bdc4Sx7+pRSYSqVVvYxLkfAWsKPqGkvWhebJDndJJV9syXQXgZ+v/uJ+6XOS43xkAdeL8iBzIs/FlwMTfh3tVe3d0lb65IBBLlCzeQuetX+0Vu1YFcnD0mHc/wS2ZnAV5toAFmyVQBoY/XAZiZeaOkcROJ6Zmqezy7liwK7BqsYyAZntMhk8lbg==
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 883 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 52500
;; flags: qr rd ra ad cd ; qd: 1 an: 2 au: 0 ad: 1
;; QUESTIONS:
;; ch., type = DS, class = IN
;; ANSWERS:
ch. 970 IN DS 46375 8 2 8F96646FC68BB7E4AF4C0750A6096FBC0D4ECDA3D3FA6DA06FDDB42EE50C6CF3
ch. 970 IN RRSIG DS 8 1 86400 20150112170000 20150105160000 16665 . thY7xYWBBxiBjqbQIb9fAG4TmQgnziwM7q6P1T3/ITxmECdvOCQnnZA3uD7qmN8uM0HudsD7+y+zgD3rsH4RSTKdL4kHSI0OnCxToMTvklghEgFDezqIRm8NkWdI2H4Stwrj20nYKSpLQxPI2EE54gs18P3KyO8bAUYv8Qx73xU=
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 238 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 3503
;; flags: qr rd ra ad cd ; qd: 1 an: 4 au: 0 ad: 1
;; QUESTIONS:
;; ch., type = DNSKEY, class = IN
;; ANSWERS:
ch. 971 IN DNSKEY 257 3 8 AwEAAb7GhhZ8IAy/AhwmSms5DeQK5ad09wIIplEpYoiAIYXPtJvT1ReFzyfTp/2YP+g/PWDwHPh4qKAHa9x0VgbIQcGAeNakmfkAdWEmCnca323/SAml3mwfaX62G7/uYWae5zh8QTxZKNd+K1yZ5x0IxnI31chSl5xymRbTEHYZDKwSIRFM3fTxUMt93WFaBVWELReYotJBr++rvAWdnlay5TPBTvheLBkaiqtgM4GP8HK07Y+86lsZnEsj5K3G1KTV5SPpa82rqYAwxG9VKbmSE/6/kBR5jJHjt1rRt5Oe7v18aEtw0YCEN4vxq+KuvMoNVqXUsE9LBwHJD+QNwi6wmB0=
ch. 971 IN DNSKEY 256 3 8 AwEAAcsg0kY6fw1wzYMhSAKTy+Y2JzAst66P/1odp9NECJJHbU8f4nwziI3onoFSBV0ZiSZhY1aH5dhdDZ7BkrqhVXSrZPAz0CvzjIxmB1gSOf9DeZvjQvoy97HqYolxsf+B3QQv2RKBT67elF5+JisKg3/dQISelKn8LhabSoVrMlD1
ch. 971 IN DNSKEY 256 3 8 AwEAAcSLdT0fEmcFmLpeUkAJoeVaHKiu+nbuc43fWlqaCRVf8t2HA4uWxOk0O5ci9nrFTc8nq8oa5fk5Cj7CHh4yrX9qUCfTdIWTyp8BDEdJpS+Dyb0u9wQuVj+nQMj4fLzdQf4TJs3/qxuiLr3nL1UUwlhhXeqSqGVb7p3mtB5HJ8ad
ch. 971 IN RRSIG DNSKEY 8 1 86400 20150127100909 20141212090909 46375 ch. bT8q0FWyeMH0SulNo6UdIIgZYNATwYsee2bikq2Gh339Bufma8eaqWIPYT3XKmxYPBFOw0bVl+kLZxTwbR1CFoCDXoP+qgQhh4mf9qkNiv2CDSc+0FE3FRREn+DAhYTUEuB58FPiPakFB8s8O7T+k2qhDae7jy4/y7Jl1lnjaBY8s7bzOUPhF0KKCNZmvoKwtL23ZdVeTSV1xM3jkiNnpzBKbcoSWECSGJVp1SE0BnRXdwQP41YTXFZ0310YjaTAUCC5qbMIWdEkHjfdSQtKBImnc85mkapq9w++XQ4zhauPWBtrPV3CcoCahjUaWdjrKVkibomlJZaN8MEO23CfQw==
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 893 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 61608
;; flags: qr rd ra cd ; qd: 1 an: 3 au: 0 ad: 1
;; QUESTIONS:
;; ingotronic.ch., type = DS, class = IN
;; ANSWERS:
ingotronic.ch. 3578 IN DS 6031 5 1 733D0218B571CD617B1A7493564B9FC4F12ADE82
ingotronic.ch. 3578 IN DS 6031 5 2 4A948F2FDADA24686E473EDAC00DCF972584C75E3FAA92C2021B6221449FF87E
ingotronic.ch. 3578 IN RRSIG DS 8 2 3600 20150129033614 20150105123019 60789 ch. rVPJP2HhzW7OkroK2axFj5Lb4iVWCH8Fp/Iq1rF952NDo72b8RiKje2RaAKJAGQ+wd0YgE+PAej04GCmkhlDJA/zvPeeTxuhy3HbJzReMlQ7fjyH+wW1hli+FuIYvogXWf7nO/9VyPORt8X/f/pjrOr3Vlj9sGLN8TGYpEuVSw4=
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 288 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 16525
;; flags: qr aa rd ra cd ; qd: 1 an: 4 au: 0 ad: 1
;; QUESTIONS:
;; ingotronic.ch., type = DNSKEY, class = IN
;; ANSWERS:
ingotronic.ch. 300 IN DNSKEY 256 3 5 AwEAAZ2Xh77GFzpEDx7EHYxShqltHgkiG+BOjBGifEmnJhQSdE5/yNSLFNcdhZZ8HUPxYnaedTqJcFFg4AzUsQklF/fECegTJdZjaj2WoL0/I8K7HMfY/hVuRZUWPNglYi8agJRX6gdkFTCpUNI7stpgKqxtzUJhhw15uG/lKMplwqUr
ingotronic.ch. 300 IN DNSKEY 257 3 5 AwEAAeA1vzmjaB+eBAcvhzpKEgAEFpvQ1rg4uKDW6MsQtacKoqBpgyep2+LuWotz5p/xYxj3NGsArwN8Ad5cY0FHRr8miTT0elOv6nvlqGIfRuhj/BXAQ1x4ihpSFslHw0lJMYFwxsUZWpUyjWX/nv1xRZMMwF46gui0N4OEbyTYusCk77D+A71k+K0EAitFIbIH4GCUKmH1H7HmXhSVH9bN/n7KEGwW32lmsuuUcJoRKDkcUvbMXY/9Xoa2quERrUg/rBbDUHowRPjYDS5GzY1+f4YY8s40BufGiqyUTKKXL953MVFK8gmezXA0hbmrnZ7CBOw/7238mORAdzExaX8n7CE=
ingotronic.ch. 300 IN RRSIG DNSKEY 5 2 300 20150125003700 20141226001657 6031 ingotronic.ch. rs1QlP2SlSpA2ELbzwg3DgWLzXWL3Lpv6CUJE2Q0qH2Zp7Qdy3cD+ZEtNh9v24Qv1M6JJ3zFt8mmZoCeW2ycuMbJCqBkW9CBuwF+VznZvZY2MxwPipvhvEEGP//0M8YAZJ66yQPDv3PTdAP8FYbIrJyvY44vwyncwbslpfHT9jAsrbfr3vuMuWps86dnP462q+0s1TxBfqi8mzo3gdavjHKWVNwohLahLKT+tWeu6DSzQv0YwMjwtkLgF7QRgx3ctIIkloOrnx9nHH1N6y+hxEB89fOlyVDjHhgL5uVtsD5fEdT0FJ2Gc/2nShEMMqIwr1/J9kUq1mNySff/uEe65Q==
ingotronic.ch. 300 IN RRSIG DNSKEY 5 2 300 20150125003700 20141226001657 17430 ingotronic.ch. mEwZjhQqeWksWD0TCnNBrtce4YkWJL3edqL6PvAUu8Fn+Ih437kEs3+pqdkgRsdYQ9HW+lBm/8pWwJlNAv0bi9NykItXMwAUFtncgq+6Pnh3iAM972GXSa5VV4LcGQ5b8CBdHCHiEKDqyPv5Hr5QfYL/FQaWlcNRh4QZZlZNPFA=
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 940 bytes
###############################################
testNameNotExpandedFromWildcardWhenNonWildcardExistsNsec3 0000664 0000000 0000000 00000046274 13020541473 0042710 0 ustar 00root root 0000000 0000000 dnssecjava-1.1.3/src/test/resources/recordings/org_jitsi_dnssec_TestWildcard #Date: 2015-01-06T22:35:02+01:00
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 6386
;; flags: qr aa rd ra cd ; qd: 1 an: 2 au: 4 ad: 3
;; QUESTIONS:
;; b.d.nsec3.ingotronic.ch., type = A, class = IN
;; ANSWERS:
b.d.nsec3.ingotronic.ch. 300 IN A 127.0.0.1
b.d.nsec3.ingotronic.ch. 300 IN RRSIG A 7 4 300 20150125011553 20141226004758 62417 nsec3.ingotronic.ch. eTKm2GV3eV5Y8U6GoqwV+r3ddroqbgszQ6ffKiDPOSnPjgBQ5NP0MgR4ZC8iP7yp/ycVAx8BsnCwUfv1CDIZ1eeOAFRDmOiUlU3NqUA+Lklz+HLkK67P9w8WKcVkn079CPyPvp6Z0VNHq1o3WhRhVWzRYK2BMvZhqT2anYe8uQY=
;; AUTHORITY RECORDS:
nsec3.ingotronic.ch. 300 IN NS ns1.ingotronic.ch.
nsec3.ingotronic.ch. 300 IN RRSIG NS 7 3 300 20150125010458 20141226002309 62417 nsec3.ingotronic.ch. fl2Q0YQQ1TduolGLyQx8vGqSApoBbb6A+go5SLFBYQobrPfO/rb+SM8JvnlzNX/Xa7dRhDYrnfBTFUm1mCur9aIi34gu5UwDNQvt/GXY5dC3+DEy/28bTZ43UuCs+qGH9u9leFwGX4neFNl0s5B4RpxBN4is8dXMUvOda6QcsOw=
810L2KR9HCVTELBLO8GQM0EMIM8KD01E.nsec3.ingotronic.ch. 300 IN NSEC3 1 0 10 1234 8VOO8LLV6NQKGVAP6LG1M4QMLMOS8LMK CNAME RRSIG
810L2KR9HCVTELBLO8GQM0EMIM8KD01E.nsec3.ingotronic.ch. 300 IN RRSIG NSEC3 7 4 300 20150125010458 20141226002309 62417 nsec3.ingotronic.ch. oVpQ8URiobH7xZcbioe1KuVi7wDEvJDLlS1vN4phMRXDhe8JwA6iGHi8jq+iOT4FkzhO9LTsFJJEI6Nj509+1X2zvRwAfYauanMdXog5vh5d7WF+/Q3LxbybKeol0HvIrJGXeoVnaFJAh8WvMWwnb1tM6mHp1GKtWoWiH8pv6+0=
;; ADDITIONAL RECORDS:
ns1.ingotronic.ch. 300 IN A 62.192.5.131
ns1.ingotronic.ch. 300 IN RRSIG A 5 3 300 20150125005754 20141226001054 17430 ingotronic.ch. fNG1RZM53pXwBxruHNaSZszxVzNLoCq8VZsTjAzYH2vSLzHXYVGJFTLIeY0K9APAdyJU8WuwmABmn7XY0Kg39kRG77uoFlqUws2PdTz2QKOwJGZY7W88Ak2Y9lkDBcK8o3wJHVptrT8R7p/1U7UfjF0kqPUkakk2B0EbFWdagFg=
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 893 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 29930
;; flags: qr rd ra ad cd ; qd: 1 an: 4 au: 0 ad: 1
;; QUESTIONS:
;; ., type = DNSKEY, class = IN
;; ANSWERS:
. 87371 IN DNSKEY 257 3 8 AwEAAagAIKlVZrpC6Ia7gEzahOR+9W29euxhJhVVLOyQbSEW0O8gcCjFFVQUTf6v58fLjwBd0YI0EzrAcQqBGCzh/RStIoO8g0NfnfL2MTJRkxoXbfDaUeVPQuYEhg37NZWAJQ9VnMVDxP/VHL496M/QZxkjf5/Efucp2gaDX6RS6CXpoY68LsvPVjR0ZSwzz1apAzvN9dlzEheX7ICJBBtuA6G3LQpzW5hOA2hzCTMjJPJ8LbqF6dsV6DoBQzgul0sGIcGOYl7OyQdXfZ57relSQageu+ipAdTTJ25AsRTAoub8ONGcLmqrAmRLKBP1dfwhYB4N7knNnulqQxA+Uk1ihz0=
. 87371 IN DNSKEY 256 3 8 AwEAAaPD7Y7XIi1MOEREJNTrRhyqsY3gff6JWzg+XCbqut1sbcbvqyssHw8DT1AkRaAC92pO8xuyq5QEgEPL1IHfABLwpwXI5gTj4gdwi86bpkmlWs9fRpnn4DPDCTdrnxIejJXgClHikLJF3u3CdpNCMijq4CKdQbMlRZ3avv+G7rh7
. 87371 IN DNSKEY 256 3 8 AwEAAe3fSrbLBy3LOS7pnxEUhvPZTE2H5dIGsI/UfruI/nOEvWWa/PSX2BFedBkEqOlYdjdNF2f+6lmfk2Od/xu0v5bVqxFE+/24v3hZSlWBxvXzPTAGHrbW/IJYEPqlzVOAS4XdUgHg0N7IbLywNHMvB+Yf+Nm6ctyXXFLV4WTNnzs7
. 87371 IN RRSIG DNSKEY 8 0 172800 20150115235959 20150101000000 19036 . i8cAxD2pvQi1oAyvQxRpDfFlbqPzW+69QQEsDwE1eWOm5AtawO9U7lmsGps7sy/fVNvl1ljKBj4Djp9pb3U2FLogjiIlW0cDAkPmLlG9t+b/pjEfBNlhjANUVN06pvQVAfm+LcF26EaWT6FlISBqb6jSy4BHRa3Bdc4Sx7+pRSYSqVVvYxLkfAWsKPqGkvWhebJDndJJV9syXQXgZ+v/uJ+6XOS43xkAdeL8iBzIs/FlwMTfh3tVe3d0lb65IBBLlCzeQuetX+0Vu1YFcnD0mHc/wS2ZnAV5toAFmyVQBoY/XAZiZeaOkcROJ6Zmqezy7liwK7BqsYyAZntMhk8lbg==
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 883 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 12727
;; flags: qr rd ra ad cd ; qd: 1 an: 2 au: 0 ad: 1
;; QUESTIONS:
;; ch., type = DS, class = IN
;; ANSWERS:
ch. 971 IN DS 46375 8 2 8F96646FC68BB7E4AF4C0750A6096FBC0D4ECDA3D3FA6DA06FDDB42EE50C6CF3
ch. 971 IN RRSIG DS 8 1 86400 20150112170000 20150105160000 16665 . thY7xYWBBxiBjqbQIb9fAG4TmQgnziwM7q6P1T3/ITxmECdvOCQnnZA3uD7qmN8uM0HudsD7+y+zgD3rsH4RSTKdL4kHSI0OnCxToMTvklghEgFDezqIRm8NkWdI2H4Stwrj20nYKSpLQxPI2EE54gs18P3KyO8bAUYv8Qx73xU=
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 238 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 14423
;; flags: qr rd ra ad cd ; qd: 1 an: 4 au: 0 ad: 1
;; QUESTIONS:
;; ch., type = DNSKEY, class = IN
;; ANSWERS:
ch. 972 IN DNSKEY 257 3 8 AwEAAb7GhhZ8IAy/AhwmSms5DeQK5ad09wIIplEpYoiAIYXPtJvT1ReFzyfTp/2YP+g/PWDwHPh4qKAHa9x0VgbIQcGAeNakmfkAdWEmCnca323/SAml3mwfaX62G7/uYWae5zh8QTxZKNd+K1yZ5x0IxnI31chSl5xymRbTEHYZDKwSIRFM3fTxUMt93WFaBVWELReYotJBr++rvAWdnlay5TPBTvheLBkaiqtgM4GP8HK07Y+86lsZnEsj5K3G1KTV5SPpa82rqYAwxG9VKbmSE/6/kBR5jJHjt1rRt5Oe7v18aEtw0YCEN4vxq+KuvMoNVqXUsE9LBwHJD+QNwi6wmB0=
ch. 972 IN DNSKEY 256 3 8 AwEAAcSLdT0fEmcFmLpeUkAJoeVaHKiu+nbuc43fWlqaCRVf8t2HA4uWxOk0O5ci9nrFTc8nq8oa5fk5Cj7CHh4yrX9qUCfTdIWTyp8BDEdJpS+Dyb0u9wQuVj+nQMj4fLzdQf4TJs3/qxuiLr3nL1UUwlhhXeqSqGVb7p3mtB5HJ8ad
ch. 972 IN DNSKEY 256 3 8 AwEAAcsg0kY6fw1wzYMhSAKTy+Y2JzAst66P/1odp9NECJJHbU8f4nwziI3onoFSBV0ZiSZhY1aH5dhdDZ7BkrqhVXSrZPAz0CvzjIxmB1gSOf9DeZvjQvoy97HqYolxsf+B3QQv2RKBT67elF5+JisKg3/dQISelKn8LhabSoVrMlD1
ch. 972 IN RRSIG DNSKEY 8 1 86400 20150127100909 20141212090909 46375 ch. bT8q0FWyeMH0SulNo6UdIIgZYNATwYsee2bikq2Gh339Bufma8eaqWIPYT3XKmxYPBFOw0bVl+kLZxTwbR1CFoCDXoP+qgQhh4mf9qkNiv2CDSc+0FE3FRREn+DAhYTUEuB58FPiPakFB8s8O7T+k2qhDae7jy4/y7Jl1lnjaBY8s7bzOUPhF0KKCNZmvoKwtL23ZdVeTSV1xM3jkiNnpzBKbcoSWECSGJVp1SE0BnRXdwQP41YTXFZ0310YjaTAUCC5qbMIWdEkHjfdSQtKBImnc85mkapq9w++XQ4zhauPWBtrPV3CcoCahjUaWdjrKVkibomlJZaN8MEO23CfQw==
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 893 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 57122
;; flags: qr rd ra cd ; qd: 1 an: 3 au: 0 ad: 1
;; QUESTIONS:
;; ingotronic.ch., type = DS, class = IN
;; ANSWERS:
ingotronic.ch. 3580 IN DS 6031 5 1 733D0218B571CD617B1A7493564B9FC4F12ADE82
ingotronic.ch. 3580 IN DS 6031 5 2 4A948F2FDADA24686E473EDAC00DCF972584C75E3FAA92C2021B6221449FF87E
ingotronic.ch. 3580 IN RRSIG DS 8 2 3600 20150129033614 20150105123019 60789 ch. rVPJP2HhzW7OkroK2axFj5Lb4iVWCH8Fp/Iq1rF952NDo72b8RiKje2RaAKJAGQ+wd0YgE+PAej04GCmkhlDJA/zvPeeTxuhy3HbJzReMlQ7fjyH+wW1hli+FuIYvogXWf7nO/9VyPORt8X/f/pjrOr3Vlj9sGLN8TGYpEuVSw4=
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 288 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 12690
;; flags: qr aa rd ra cd ; qd: 1 an: 4 au: 0 ad: 1
;; QUESTIONS:
;; ingotronic.ch., type = DNSKEY, class = IN
;; ANSWERS:
ingotronic.ch. 300 IN DNSKEY 257 3 5 AwEAAeA1vzmjaB+eBAcvhzpKEgAEFpvQ1rg4uKDW6MsQtacKoqBpgyep2+LuWotz5p/xYxj3NGsArwN8Ad5cY0FHRr8miTT0elOv6nvlqGIfRuhj/BXAQ1x4ihpSFslHw0lJMYFwxsUZWpUyjWX/nv1xRZMMwF46gui0N4OEbyTYusCk77D+A71k+K0EAitFIbIH4GCUKmH1H7HmXhSVH9bN/n7KEGwW32lmsuuUcJoRKDkcUvbMXY/9Xoa2quERrUg/rBbDUHowRPjYDS5GzY1+f4YY8s40BufGiqyUTKKXL953MVFK8gmezXA0hbmrnZ7CBOw/7238mORAdzExaX8n7CE=
ingotronic.ch. 300 IN DNSKEY 256 3 5 AwEAAZ2Xh77GFzpEDx7EHYxShqltHgkiG+BOjBGifEmnJhQSdE5/yNSLFNcdhZZ8HUPxYnaedTqJcFFg4AzUsQklF/fECegTJdZjaj2WoL0/I8K7HMfY/hVuRZUWPNglYi8agJRX6gdkFTCpUNI7stpgKqxtzUJhhw15uG/lKMplwqUr
ingotronic.ch. 300 IN RRSIG DNSKEY 5 2 300 20150125003700 20141226001657 6031 ingotronic.ch. rs1QlP2SlSpA2ELbzwg3DgWLzXWL3Lpv6CUJE2Q0qH2Zp7Qdy3cD+ZEtNh9v24Qv1M6JJ3zFt8mmZoCeW2ycuMbJCqBkW9CBuwF+VznZvZY2MxwPipvhvEEGP//0M8YAZJ66yQPDv3PTdAP8FYbIrJyvY44vwyncwbslpfHT9jAsrbfr3vuMuWps86dnP462q+0s1TxBfqi8mzo3gdavjHKWVNwohLahLKT+tWeu6DSzQv0YwMjwtkLgF7QRgx3ctIIkloOrnx9nHH1N6y+hxEB89fOlyVDjHhgL5uVtsD5fEdT0FJ2Gc/2nShEMMqIwr1/J9kUq1mNySff/uEe65Q==
ingotronic.ch. 300 IN RRSIG DNSKEY 5 2 300 20150125003700 20141226001657 17430 ingotronic.ch. mEwZjhQqeWksWD0TCnNBrtce4YkWJL3edqL6PvAUu8Fn+Ih437kEs3+pqdkgRsdYQ9HW+lBm/8pWwJlNAv0bi9NykItXMwAUFtncgq+6Pnh3iAM972GXSa5VV4LcGQ5b8CBdHCHiEKDqyPv5Hr5QfYL/FQaWlcNRh4QZZlZNPFA=
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 940 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 18356
;; flags: qr aa rd ra cd ; qd: 1 an: 3 au: 0 ad: 1
;; QUESTIONS:
;; nsec3.ingotronic.ch., type = DS, class = IN
;; ANSWERS:
nsec3.ingotronic.ch. 300 IN DS 16758 7 2 3C8DC02750A1636F829B45D6E6D642866768A9CD40A013AD9D25AB63734FFA13
nsec3.ingotronic.ch. 300 IN DS 16758 7 1 1720FF268E09A2CB63805EC8782D10AAD20E12A5
nsec3.ingotronic.ch. 300 IN RRSIG DS 5 3 300 20150125011134 20141226002644 17430 ingotronic.ch. hNurzlGhlyHbSgezPDuhIrtN9ZMsMXZbKGc7HD5rUuM88wD3fM97NxdzF+2Hi1USvBZ5GsQv63L+lAzf+mFPBoPIFHtTiAv8up7kQKRKmi/EzzkCYd/CC4UYdDZbaUyv7esh7spSOGwjPJNdK831p+MgltoWaYtnSGVMgOKk5mc=
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 305 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 21569
;; flags: qr aa rd ra cd ; qd: 1 an: 4 au: 0 ad: 1
;; QUESTIONS:
;; nsec3.ingotronic.ch., type = DNSKEY, class = IN
;; ANSWERS:
nsec3.ingotronic.ch. 300 IN DNSKEY 257 3 7 AwEAAaBuJTf9oGyeTH3biUkAFLrsYrkodX1H7Snsui4XsDHFCBvs5XYacHbs0Jg0/O51KPjmNnjwMW8SSyDkKqYQ+9uYAf2EQ/pnD/VGQqnV2cw0Vwk/t0E2V4FUCju4pnAoyzZFZXGs1eWbX9JXu++b0Azp+ACq6485qJLzHhWDiIrPoK/SvdbFVRK4s+nPPJLH3NGBbtdz6kPq7aFWYBMoGeAZdN1wsQpcNWUo5eOmaJY53nMc7+rDpAyYlMe/FKwSZdX2ZDd63Qsa6Im4FVUJq/nWLq7tlQ/mWks15uDTQyJy/OWfA0ICCO4N9Fel9rThJNpJWEzOCblvZyBoy405kZk=
nsec3.ingotronic.ch. 300 IN DNSKEY 256 3 7 AwEAAccAWxkTVGZ6UAp0VEozAlYpARhbh6Y6tYOl6Fg3UeBNFFtDQ9fTEEt1NkbnR9u8KkpVN6a67avlYiUN1egDqEwzDU7R1Rw+/USdhm2hqOARmmu3DBgjjX/iXjZLyv310cOGFJZ/smcodlDL4pDAAoPxh/qs6KEBaT0sc1KWcGq3
nsec3.ingotronic.ch. 300 IN RRSIG DNSKEY 7 3 300 20150125001457 20141226000444 16758 nsec3.ingotronic.ch. mXi1ylDi8XkRPup+YlT8GPdYE+P7gb6+/VdAwtodI916IzrkGkOHOTLbnrbAqqJOh0HxVCYXdxovmEcbJKUFKwplrQg3XD7/9Sq4pKU1MhMFEGrm/QPkM4u0mgjQwyToDLGuPHuFyur3FSjO/n54uGhAEft9JOFk/WKtWdCnm2LLyQrpC6herA3efFaI8kZhdoEY02AwihWVJxHasmz7lOoKRgNrkfELU+fN4+V7ISsRfJMyZc6q5PuNeG6vFD0uNE8tpdLJCSMurKYVpelvYqzFIcRTYcIjXwmS+L3DGjupqWMzFZVmpQM62JG3KCCD0ffpnNb0nWoSoHwpSeh/3Q==
nsec3.ingotronic.ch. 300 IN RRSIG DNSKEY 7 3 300 20150125001457 20141226000444 62417 nsec3.ingotronic.ch. PyCrf8T5dAfJzapb1p+kcTALPjDuD2niSaXXo0KeHAunT+6gJicLML2S/ZpiYr7X7Ma4Z0TYqE02qH6pcLYNnSgv9BE8sZO0nRtPekSyTy5nLi4hFADYhjb3UjaB85qmQZcqm64vC/CJhWO4t6Eixg/5MYALw+Qdy5Fo0qy/U5E=
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 958 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 53334
;; flags: qr rd ra ad cd ; qd: 1 an: 4 au: 0 ad: 1
;; QUESTIONS:
;; ., type = DNSKEY, class = IN
;; ANSWERS:
. 87371 IN DNSKEY 257 3 8 AwEAAagAIKlVZrpC6Ia7gEzahOR+9W29euxhJhVVLOyQbSEW0O8gcCjFFVQUTf6v58fLjwBd0YI0EzrAcQqBGCzh/RStIoO8g0NfnfL2MTJRkxoXbfDaUeVPQuYEhg37NZWAJQ9VnMVDxP/VHL496M/QZxkjf5/Efucp2gaDX6RS6CXpoY68LsvPVjR0ZSwzz1apAzvN9dlzEheX7ICJBBtuA6G3LQpzW5hOA2hzCTMjJPJ8LbqF6dsV6DoBQzgul0sGIcGOYl7OyQdXfZ57relSQageu+ipAdTTJ25AsRTAoub8ONGcLmqrAmRLKBP1dfwhYB4N7knNnulqQxA+Uk1ihz0=
. 87371 IN DNSKEY 256 3 8 AwEAAe3fSrbLBy3LOS7pnxEUhvPZTE2H5dIGsI/UfruI/nOEvWWa/PSX2BFedBkEqOlYdjdNF2f+6lmfk2Od/xu0v5bVqxFE+/24v3hZSlWBxvXzPTAGHrbW/IJYEPqlzVOAS4XdUgHg0N7IbLywNHMvB+Yf+Nm6ctyXXFLV4WTNnzs7
. 87371 IN DNSKEY 256 3 8 AwEAAaPD7Y7XIi1MOEREJNTrRhyqsY3gff6JWzg+XCbqut1sbcbvqyssHw8DT1AkRaAC92pO8xuyq5QEgEPL1IHfABLwpwXI5gTj4gdwi86bpkmlWs9fRpnn4DPDCTdrnxIejJXgClHikLJF3u3CdpNCMijq4CKdQbMlRZ3avv+G7rh7
. 87371 IN RRSIG DNSKEY 8 0 172800 20150115235959 20150101000000 19036 . i8cAxD2pvQi1oAyvQxRpDfFlbqPzW+69QQEsDwE1eWOm5AtawO9U7lmsGps7sy/fVNvl1ljKBj4Djp9pb3U2FLogjiIlW0cDAkPmLlG9t+b/pjEfBNlhjANUVN06pvQVAfm+LcF26EaWT6FlISBqb6jSy4BHRa3Bdc4Sx7+pRSYSqVVvYxLkfAWsKPqGkvWhebJDndJJV9syXQXgZ+v/uJ+6XOS43xkAdeL8iBzIs/FlwMTfh3tVe3d0lb65IBBLlCzeQuetX+0Vu1YFcnD0mHc/wS2ZnAV5toAFmyVQBoY/XAZiZeaOkcROJ6Zmqezy7liwK7BqsYyAZntMhk8lbg==
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 883 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 33527
;; flags: qr rd ra ad cd ; qd: 1 an: 2 au: 0 ad: 1
;; QUESTIONS:
;; ch., type = DS, class = IN
;; ANSWERS:
ch. 971 IN DS 46375 8 2 8F96646FC68BB7E4AF4C0750A6096FBC0D4ECDA3D3FA6DA06FDDB42EE50C6CF3
ch. 971 IN RRSIG DS 8 1 86400 20150112170000 20150105160000 16665 . thY7xYWBBxiBjqbQIb9fAG4TmQgnziwM7q6P1T3/ITxmECdvOCQnnZA3uD7qmN8uM0HudsD7+y+zgD3rsH4RSTKdL4kHSI0OnCxToMTvklghEgFDezqIRm8NkWdI2H4Stwrj20nYKSpLQxPI2EE54gs18P3KyO8bAUYv8Qx73xU=
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 238 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 17311
;; flags: qr rd ra ad cd ; qd: 1 an: 4 au: 0 ad: 1
;; QUESTIONS:
;; ch., type = DNSKEY, class = IN
;; ANSWERS:
ch. 972 IN DNSKEY 256 3 8 AwEAAcsg0kY6fw1wzYMhSAKTy+Y2JzAst66P/1odp9NECJJHbU8f4nwziI3onoFSBV0ZiSZhY1aH5dhdDZ7BkrqhVXSrZPAz0CvzjIxmB1gSOf9DeZvjQvoy97HqYolxsf+B3QQv2RKBT67elF5+JisKg3/dQISelKn8LhabSoVrMlD1
ch. 972 IN DNSKEY 257 3 8 AwEAAb7GhhZ8IAy/AhwmSms5DeQK5ad09wIIplEpYoiAIYXPtJvT1ReFzyfTp/2YP+g/PWDwHPh4qKAHa9x0VgbIQcGAeNakmfkAdWEmCnca323/SAml3mwfaX62G7/uYWae5zh8QTxZKNd+K1yZ5x0IxnI31chSl5xymRbTEHYZDKwSIRFM3fTxUMt93WFaBVWELReYotJBr++rvAWdnlay5TPBTvheLBkaiqtgM4GP8HK07Y+86lsZnEsj5K3G1KTV5SPpa82rqYAwxG9VKbmSE/6/kBR5jJHjt1rRt5Oe7v18aEtw0YCEN4vxq+KuvMoNVqXUsE9LBwHJD+QNwi6wmB0=
ch. 972 IN DNSKEY 256 3 8 AwEAAcSLdT0fEmcFmLpeUkAJoeVaHKiu+nbuc43fWlqaCRVf8t2HA4uWxOk0O5ci9nrFTc8nq8oa5fk5Cj7CHh4yrX9qUCfTdIWTyp8BDEdJpS+Dyb0u9wQuVj+nQMj4fLzdQf4TJs3/qxuiLr3nL1UUwlhhXeqSqGVb7p3mtB5HJ8ad
ch. 972 IN RRSIG DNSKEY 8 1 86400 20150127100909 20141212090909 46375 ch. bT8q0FWyeMH0SulNo6UdIIgZYNATwYsee2bikq2Gh339Bufma8eaqWIPYT3XKmxYPBFOw0bVl+kLZxTwbR1CFoCDXoP+qgQhh4mf9qkNiv2CDSc+0FE3FRREn+DAhYTUEuB58FPiPakFB8s8O7T+k2qhDae7jy4/y7Jl1lnjaBY8s7bzOUPhF0KKCNZmvoKwtL23ZdVeTSV1xM3jkiNnpzBKbcoSWECSGJVp1SE0BnRXdwQP41YTXFZ0310YjaTAUCC5qbMIWdEkHjfdSQtKBImnc85mkapq9w++XQ4zhauPWBtrPV3CcoCahjUaWdjrKVkibomlJZaN8MEO23CfQw==
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 893 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 51328
;; flags: qr rd ra cd ; qd: 1 an: 3 au: 0 ad: 1
;; QUESTIONS:
;; ingotronic.ch., type = DS, class = IN
;; ANSWERS:
ingotronic.ch. 3580 IN DS 6031 5 1 733D0218B571CD617B1A7493564B9FC4F12ADE82
ingotronic.ch. 3580 IN DS 6031 5 2 4A948F2FDADA24686E473EDAC00DCF972584C75E3FAA92C2021B6221449FF87E
ingotronic.ch. 3580 IN RRSIG DS 8 2 3600 20150129033614 20150105123019 60789 ch. rVPJP2HhzW7OkroK2axFj5Lb4iVWCH8Fp/Iq1rF952NDo72b8RiKje2RaAKJAGQ+wd0YgE+PAej04GCmkhlDJA/zvPeeTxuhy3HbJzReMlQ7fjyH+wW1hli+FuIYvogXWf7nO/9VyPORt8X/f/pjrOr3Vlj9sGLN8TGYpEuVSw4=
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 288 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 6320
;; flags: qr aa rd ra cd ; qd: 1 an: 4 au: 0 ad: 1
;; QUESTIONS:
;; ingotronic.ch., type = DNSKEY, class = IN
;; ANSWERS:
ingotronic.ch. 300 IN DNSKEY 256 3 5 AwEAAZ2Xh77GFzpEDx7EHYxShqltHgkiG+BOjBGifEmnJhQSdE5/yNSLFNcdhZZ8HUPxYnaedTqJcFFg4AzUsQklF/fECegTJdZjaj2WoL0/I8K7HMfY/hVuRZUWPNglYi8agJRX6gdkFTCpUNI7stpgKqxtzUJhhw15uG/lKMplwqUr
ingotronic.ch. 300 IN DNSKEY 257 3 5 AwEAAeA1vzmjaB+eBAcvhzpKEgAEFpvQ1rg4uKDW6MsQtacKoqBpgyep2+LuWotz5p/xYxj3NGsArwN8Ad5cY0FHRr8miTT0elOv6nvlqGIfRuhj/BXAQ1x4ihpSFslHw0lJMYFwxsUZWpUyjWX/nv1xRZMMwF46gui0N4OEbyTYusCk77D+A71k+K0EAitFIbIH4GCUKmH1H7HmXhSVH9bN/n7KEGwW32lmsuuUcJoRKDkcUvbMXY/9Xoa2quERrUg/rBbDUHowRPjYDS5GzY1+f4YY8s40BufGiqyUTKKXL953MVFK8gmezXA0hbmrnZ7CBOw/7238mORAdzExaX8n7CE=
ingotronic.ch. 300 IN RRSIG DNSKEY 5 2 300 20150125003700 20141226001657 6031 ingotronic.ch. rs1QlP2SlSpA2ELbzwg3DgWLzXWL3Lpv6CUJE2Q0qH2Zp7Qdy3cD+ZEtNh9v24Qv1M6JJ3zFt8mmZoCeW2ycuMbJCqBkW9CBuwF+VznZvZY2MxwPipvhvEEGP//0M8YAZJ66yQPDv3PTdAP8FYbIrJyvY44vwyncwbslpfHT9jAsrbfr3vuMuWps86dnP462q+0s1TxBfqi8mzo3gdavjHKWVNwohLahLKT+tWeu6DSzQv0YwMjwtkLgF7QRgx3ctIIkloOrnx9nHH1N6y+hxEB89fOlyVDjHhgL5uVtsD5fEdT0FJ2Gc/2nShEMMqIwr1/J9kUq1mNySff/uEe65Q==
ingotronic.ch. 300 IN RRSIG DNSKEY 5 2 300 20150125003700 20141226001657 17430 ingotronic.ch. mEwZjhQqeWksWD0TCnNBrtce4YkWJL3edqL6PvAUu8Fn+Ih437kEs3+pqdkgRsdYQ9HW+lBm/8pWwJlNAv0bi9NykItXMwAUFtncgq+6Pnh3iAM972GXSa5VV4LcGQ5b8CBdHCHiEKDqyPv5Hr5QfYL/FQaWlcNRh4QZZlZNPFA=
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 940 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 43131
;; flags: qr aa rd ra cd ; qd: 1 an: 3 au: 0 ad: 1
;; QUESTIONS:
;; nsec3.ingotronic.ch., type = DS, class = IN
;; ANSWERS:
nsec3.ingotronic.ch. 300 IN DS 16758 7 1 1720FF268E09A2CB63805EC8782D10AAD20E12A5
nsec3.ingotronic.ch. 300 IN DS 16758 7 2 3C8DC02750A1636F829B45D6E6D642866768A9CD40A013AD9D25AB63734FFA13
nsec3.ingotronic.ch. 300 IN RRSIG DS 5 3 300 20150125011134 20141226002644 17430 ingotronic.ch. hNurzlGhlyHbSgezPDuhIrtN9ZMsMXZbKGc7HD5rUuM88wD3fM97NxdzF+2Hi1USvBZ5GsQv63L+lAzf+mFPBoPIFHtTiAv8up7kQKRKmi/EzzkCYd/CC4UYdDZbaUyv7esh7spSOGwjPJNdK831p+MgltoWaYtnSGVMgOKk5mc=
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 305 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 52988
;; flags: qr aa rd ra cd ; qd: 1 an: 4 au: 0 ad: 1
;; QUESTIONS:
;; nsec3.ingotronic.ch., type = DNSKEY, class = IN
;; ANSWERS:
nsec3.ingotronic.ch. 300 IN DNSKEY 256 3 7 AwEAAccAWxkTVGZ6UAp0VEozAlYpARhbh6Y6tYOl6Fg3UeBNFFtDQ9fTEEt1NkbnR9u8KkpVN6a67avlYiUN1egDqEwzDU7R1Rw+/USdhm2hqOARmmu3DBgjjX/iXjZLyv310cOGFJZ/smcodlDL4pDAAoPxh/qs6KEBaT0sc1KWcGq3
nsec3.ingotronic.ch. 300 IN DNSKEY 257 3 7 AwEAAaBuJTf9oGyeTH3biUkAFLrsYrkodX1H7Snsui4XsDHFCBvs5XYacHbs0Jg0/O51KPjmNnjwMW8SSyDkKqYQ+9uYAf2EQ/pnD/VGQqnV2cw0Vwk/t0E2V4FUCju4pnAoyzZFZXGs1eWbX9JXu++b0Azp+ACq6485qJLzHhWDiIrPoK/SvdbFVRK4s+nPPJLH3NGBbtdz6kPq7aFWYBMoGeAZdN1wsQpcNWUo5eOmaJY53nMc7+rDpAyYlMe/FKwSZdX2ZDd63Qsa6Im4FVUJq/nWLq7tlQ/mWks15uDTQyJy/OWfA0ICCO4N9Fel9rThJNpJWEzOCblvZyBoy405kZk=
nsec3.ingotronic.ch. 300 IN RRSIG DNSKEY 7 3 300 20150125001457 20141226000444 16758 nsec3.ingotronic.ch. mXi1ylDi8XkRPup+YlT8GPdYE+P7gb6+/VdAwtodI916IzrkGkOHOTLbnrbAqqJOh0HxVCYXdxovmEcbJKUFKwplrQg3XD7/9Sq4pKU1MhMFEGrm/QPkM4u0mgjQwyToDLGuPHuFyur3FSjO/n54uGhAEft9JOFk/WKtWdCnm2LLyQrpC6herA3efFaI8kZhdoEY02AwihWVJxHasmz7lOoKRgNrkfELU+fN4+V7ISsRfJMyZc6q5PuNeG6vFD0uNE8tpdLJCSMurKYVpelvYqzFIcRTYcIjXwmS+L3DGjupqWMzFZVmpQM62JG3KCCD0ffpnNb0nWoSoHwpSeh/3Q==
nsec3.ingotronic.ch. 300 IN RRSIG DNSKEY 7 3 300 20150125001457 20141226000444 62417 nsec3.ingotronic.ch. PyCrf8T5dAfJzapb1p+kcTALPjDuD2niSaXXo0KeHAunT+6gJicLML2S/ZpiYr7X7Ma4Z0TYqE02qH6pcLYNnSgv9BE8sZO0nRtPekSyTy5nLi4hFADYhjb3UjaB85qmQZcqm64vC/CJhWO4t6Eixg/5MYALw+Qdy5Fo0qy/U5E=
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 958 bytes
###############################################
testNodataWilcardWithoutCe 0000664 0000000 0000000 00000033473 13020541473 0034702 0 ustar 00root root 0000000 0000000 dnssecjava-1.1.3/src/test/resources/recordings/org_jitsi_dnssec_TestWildcard #Date: 2015-01-06T22:35:02+01:00
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 19025
;; flags: qr aa rd ra cd ; qd: 1 an: 0 au: 6 ad: 1
;; QUESTIONS:
;; \001.c.ingotronic.ch., type = MX, class = IN
;; ANSWERS:
;; AUTHORITY RECORDS:
ingotronic.ch. 300 IN SOA ns1.ingotronic.ch. admin.ingotronic.ch. 2013032762 300 60 864000 300
ingotronic.ch. 300 IN RRSIG SOA 5 2 300 20150125021244 20141226011244 17430 ingotronic.ch. WDLpp9G0P/rlMBfpFn9sAfpEFoBnQfwyGSXbGCc/LG1FSkJoKLDQYDY696scLNsJgkrzZeJrl0oSSvA8AvRUhYRrmuqWMxTVFgYlRwPwqEMCKUqiVhKGVF4NYemoBiUQC4nJwBZd57xKCiF4AQ4CodBtiZxefJFAlTNE0g2yxtM=
a.b.ingotronic.ch. 300 IN NSEC *.c.ingotronic.ch. A RRSIG NSEC
a.b.ingotronic.ch. 300 IN RRSIG NSEC 5 4 300 20150125000532 20141225234703 17430 ingotronic.ch. HMCFItkk6JIV9hcHJ+p+OO5CI8B7H4fWy6w8kMfKPA/Z/lUcjlSKSexxd4ppubXfaVDhTW5j3Nd0rEpKbxztd9MZGVbvk7LJibvpD4ACR0xSmE69fyjrxrN/uDPYVPL5uOTklgDAlinQS3E6KulWr5iST9H4gmhfrk5MpvK4fcc=
*.c.ingotronic.ch. 300 IN NSEC cfailed.ingotronic.ch. A RRSIG NSEC
*.c.ingotronic.ch. 300 IN RRSIG NSEC 5 3 300 20150125000532 20141225234703 17430 ingotronic.ch. Lf7FP3WsqHc3SUznxjp367ehSI5mcUE7OzvHQj68BfC77FPylpt3YLtyirEZVjVKPjQ6maarQakizn6u7KFf1jFr2kGpS1rZCvyfAxGX6wwIZK/Wf0lfhP0IquQd+kX2OlmRbbemFI/lFG72NAcB+19t8tcwV5k6ADkxC2L6o/4=
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 697 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 43123
;; flags: qr rd ra ad cd ; qd: 1 an: 4 au: 0 ad: 1
;; QUESTIONS:
;; ., type = DNSKEY, class = IN
;; ANSWERS:
. 87372 IN DNSKEY 257 3 8 AwEAAagAIKlVZrpC6Ia7gEzahOR+9W29euxhJhVVLOyQbSEW0O8gcCjFFVQUTf6v58fLjwBd0YI0EzrAcQqBGCzh/RStIoO8g0NfnfL2MTJRkxoXbfDaUeVPQuYEhg37NZWAJQ9VnMVDxP/VHL496M/QZxkjf5/Efucp2gaDX6RS6CXpoY68LsvPVjR0ZSwzz1apAzvN9dlzEheX7ICJBBtuA6G3LQpzW5hOA2hzCTMjJPJ8LbqF6dsV6DoBQzgul0sGIcGOYl7OyQdXfZ57relSQageu+ipAdTTJ25AsRTAoub8ONGcLmqrAmRLKBP1dfwhYB4N7knNnulqQxA+Uk1ihz0=
. 87372 IN DNSKEY 256 3 8 AwEAAaPD7Y7XIi1MOEREJNTrRhyqsY3gff6JWzg+XCbqut1sbcbvqyssHw8DT1AkRaAC92pO8xuyq5QEgEPL1IHfABLwpwXI5gTj4gdwi86bpkmlWs9fRpnn4DPDCTdrnxIejJXgClHikLJF3u3CdpNCMijq4CKdQbMlRZ3avv+G7rh7
. 87372 IN DNSKEY 256 3 8 AwEAAe3fSrbLBy3LOS7pnxEUhvPZTE2H5dIGsI/UfruI/nOEvWWa/PSX2BFedBkEqOlYdjdNF2f+6lmfk2Od/xu0v5bVqxFE+/24v3hZSlWBxvXzPTAGHrbW/IJYEPqlzVOAS4XdUgHg0N7IbLywNHMvB+Yf+Nm6ctyXXFLV4WTNnzs7
. 87372 IN RRSIG DNSKEY 8 0 172800 20150115235959 20150101000000 19036 . i8cAxD2pvQi1oAyvQxRpDfFlbqPzW+69QQEsDwE1eWOm5AtawO9U7lmsGps7sy/fVNvl1ljKBj4Djp9pb3U2FLogjiIlW0cDAkPmLlG9t+b/pjEfBNlhjANUVN06pvQVAfm+LcF26EaWT6FlISBqb6jSy4BHRa3Bdc4Sx7+pRSYSqVVvYxLkfAWsKPqGkvWhebJDndJJV9syXQXgZ+v/uJ+6XOS43xkAdeL8iBzIs/FlwMTfh3tVe3d0lb65IBBLlCzeQuetX+0Vu1YFcnD0mHc/wS2ZnAV5toAFmyVQBoY/XAZiZeaOkcROJ6Zmqezy7liwK7BqsYyAZntMhk8lbg==
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 883 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 9093
;; flags: qr rd ra ad cd ; qd: 1 an: 2 au: 0 ad: 1
;; QUESTIONS:
;; ch., type = DS, class = IN
;; ANSWERS:
ch. 972 IN DS 46375 8 2 8F96646FC68BB7E4AF4C0750A6096FBC0D4ECDA3D3FA6DA06FDDB42EE50C6CF3
ch. 972 IN RRSIG DS 8 1 86400 20150112170000 20150105160000 16665 . thY7xYWBBxiBjqbQIb9fAG4TmQgnziwM7q6P1T3/ITxmECdvOCQnnZA3uD7qmN8uM0HudsD7+y+zgD3rsH4RSTKdL4kHSI0OnCxToMTvklghEgFDezqIRm8NkWdI2H4Stwrj20nYKSpLQxPI2EE54gs18P3KyO8bAUYv8Qx73xU=
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 238 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 5
;; flags: qr rd ra ad cd ; qd: 1 an: 4 au: 0 ad: 1
;; QUESTIONS:
;; ch., type = DNSKEY, class = IN
;; ANSWERS:
ch. 972 IN DNSKEY 256 3 8 AwEAAcsg0kY6fw1wzYMhSAKTy+Y2JzAst66P/1odp9NECJJHbU8f4nwziI3onoFSBV0ZiSZhY1aH5dhdDZ7BkrqhVXSrZPAz0CvzjIxmB1gSOf9DeZvjQvoy97HqYolxsf+B3QQv2RKBT67elF5+JisKg3/dQISelKn8LhabSoVrMlD1
ch. 972 IN DNSKEY 256 3 8 AwEAAcSLdT0fEmcFmLpeUkAJoeVaHKiu+nbuc43fWlqaCRVf8t2HA4uWxOk0O5ci9nrFTc8nq8oa5fk5Cj7CHh4yrX9qUCfTdIWTyp8BDEdJpS+Dyb0u9wQuVj+nQMj4fLzdQf4TJs3/qxuiLr3nL1UUwlhhXeqSqGVb7p3mtB5HJ8ad
ch. 972 IN DNSKEY 257 3 8 AwEAAb7GhhZ8IAy/AhwmSms5DeQK5ad09wIIplEpYoiAIYXPtJvT1ReFzyfTp/2YP+g/PWDwHPh4qKAHa9x0VgbIQcGAeNakmfkAdWEmCnca323/SAml3mwfaX62G7/uYWae5zh8QTxZKNd+K1yZ5x0IxnI31chSl5xymRbTEHYZDKwSIRFM3fTxUMt93WFaBVWELReYotJBr++rvAWdnlay5TPBTvheLBkaiqtgM4GP8HK07Y+86lsZnEsj5K3G1KTV5SPpa82rqYAwxG9VKbmSE/6/kBR5jJHjt1rRt5Oe7v18aEtw0YCEN4vxq+KuvMoNVqXUsE9LBwHJD+QNwi6wmB0=
ch. 972 IN RRSIG DNSKEY 8 1 86400 20150127100909 20141212090909 46375 ch. bT8q0FWyeMH0SulNo6UdIIgZYNATwYsee2bikq2Gh339Bufma8eaqWIPYT3XKmxYPBFOw0bVl+kLZxTwbR1CFoCDXoP+qgQhh4mf9qkNiv2CDSc+0FE3FRREn+DAhYTUEuB58FPiPakFB8s8O7T+k2qhDae7jy4/y7Jl1lnjaBY8s7bzOUPhF0KKCNZmvoKwtL23ZdVeTSV1xM3jkiNnpzBKbcoSWECSGJVp1SE0BnRXdwQP41YTXFZ0310YjaTAUCC5qbMIWdEkHjfdSQtKBImnc85mkapq9w++XQ4zhauPWBtrPV3CcoCahjUaWdjrKVkibomlJZaN8MEO23CfQw==
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 893 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 11698
;; flags: qr rd ra cd ; qd: 1 an: 3 au: 0 ad: 1
;; QUESTIONS:
;; ingotronic.ch., type = DS, class = IN
;; ANSWERS:
ingotronic.ch. 3580 IN DS 6031 5 1 733D0218B571CD617B1A7493564B9FC4F12ADE82
ingotronic.ch. 3580 IN DS 6031 5 2 4A948F2FDADA24686E473EDAC00DCF972584C75E3FAA92C2021B6221449FF87E
ingotronic.ch. 3580 IN RRSIG DS 8 2 3600 20150129033614 20150105123019 60789 ch. rVPJP2HhzW7OkroK2axFj5Lb4iVWCH8Fp/Iq1rF952NDo72b8RiKje2RaAKJAGQ+wd0YgE+PAej04GCmkhlDJA/zvPeeTxuhy3HbJzReMlQ7fjyH+wW1hli+FuIYvogXWf7nO/9VyPORt8X/f/pjrOr3Vlj9sGLN8TGYpEuVSw4=
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 288 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 46520
;; flags: qr aa rd ra cd ; qd: 1 an: 4 au: 0 ad: 1
;; QUESTIONS:
;; ingotronic.ch., type = DNSKEY, class = IN
;; ANSWERS:
ingotronic.ch. 300 IN DNSKEY 257 3 5 AwEAAeA1vzmjaB+eBAcvhzpKEgAEFpvQ1rg4uKDW6MsQtacKoqBpgyep2+LuWotz5p/xYxj3NGsArwN8Ad5cY0FHRr8miTT0elOv6nvlqGIfRuhj/BXAQ1x4ihpSFslHw0lJMYFwxsUZWpUyjWX/nv1xRZMMwF46gui0N4OEbyTYusCk77D+A71k+K0EAitFIbIH4GCUKmH1H7HmXhSVH9bN/n7KEGwW32lmsuuUcJoRKDkcUvbMXY/9Xoa2quERrUg/rBbDUHowRPjYDS5GzY1+f4YY8s40BufGiqyUTKKXL953MVFK8gmezXA0hbmrnZ7CBOw/7238mORAdzExaX8n7CE=
ingotronic.ch. 300 IN DNSKEY 256 3 5 AwEAAZ2Xh77GFzpEDx7EHYxShqltHgkiG+BOjBGifEmnJhQSdE5/yNSLFNcdhZZ8HUPxYnaedTqJcFFg4AzUsQklF/fECegTJdZjaj2WoL0/I8K7HMfY/hVuRZUWPNglYi8agJRX6gdkFTCpUNI7stpgKqxtzUJhhw15uG/lKMplwqUr
ingotronic.ch. 300 IN RRSIG DNSKEY 5 2 300 20150125003700 20141226001657 6031 ingotronic.ch. rs1QlP2SlSpA2ELbzwg3DgWLzXWL3Lpv6CUJE2Q0qH2Zp7Qdy3cD+ZEtNh9v24Qv1M6JJ3zFt8mmZoCeW2ycuMbJCqBkW9CBuwF+VznZvZY2MxwPipvhvEEGP//0M8YAZJ66yQPDv3PTdAP8FYbIrJyvY44vwyncwbslpfHT9jAsrbfr3vuMuWps86dnP462q+0s1TxBfqi8mzo3gdavjHKWVNwohLahLKT+tWeu6DSzQv0YwMjwtkLgF7QRgx3ctIIkloOrnx9nHH1N6y+hxEB89fOlyVDjHhgL5uVtsD5fEdT0FJ2Gc/2nShEMMqIwr1/J9kUq1mNySff/uEe65Q==
ingotronic.ch. 300 IN RRSIG DNSKEY 5 2 300 20150125003700 20141226001657 17430 ingotronic.ch. mEwZjhQqeWksWD0TCnNBrtce4YkWJL3edqL6PvAUu8Fn+Ih437kEs3+pqdkgRsdYQ9HW+lBm/8pWwJlNAv0bi9NykItXMwAUFtncgq+6Pnh3iAM972GXSa5VV4LcGQ5b8CBdHCHiEKDqyPv5Hr5QfYL/FQaWlcNRh4QZZlZNPFA=
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 940 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 30476
;; flags: qr rd ra ad cd ; qd: 1 an: 4 au: 0 ad: 1
;; QUESTIONS:
;; ., type = DNSKEY, class = IN
;; ANSWERS:
. 87371 IN DNSKEY 257 3 8 AwEAAagAIKlVZrpC6Ia7gEzahOR+9W29euxhJhVVLOyQbSEW0O8gcCjFFVQUTf6v58fLjwBd0YI0EzrAcQqBGCzh/RStIoO8g0NfnfL2MTJRkxoXbfDaUeVPQuYEhg37NZWAJQ9VnMVDxP/VHL496M/QZxkjf5/Efucp2gaDX6RS6CXpoY68LsvPVjR0ZSwzz1apAzvN9dlzEheX7ICJBBtuA6G3LQpzW5hOA2hzCTMjJPJ8LbqF6dsV6DoBQzgul0sGIcGOYl7OyQdXfZ57relSQageu+ipAdTTJ25AsRTAoub8ONGcLmqrAmRLKBP1dfwhYB4N7knNnulqQxA+Uk1ihz0=
. 87371 IN DNSKEY 256 3 8 AwEAAaPD7Y7XIi1MOEREJNTrRhyqsY3gff6JWzg+XCbqut1sbcbvqyssHw8DT1AkRaAC92pO8xuyq5QEgEPL1IHfABLwpwXI5gTj4gdwi86bpkmlWs9fRpnn4DPDCTdrnxIejJXgClHikLJF3u3CdpNCMijq4CKdQbMlRZ3avv+G7rh7
. 87371 IN DNSKEY 256 3 8 AwEAAe3fSrbLBy3LOS7pnxEUhvPZTE2H5dIGsI/UfruI/nOEvWWa/PSX2BFedBkEqOlYdjdNF2f+6lmfk2Od/xu0v5bVqxFE+/24v3hZSlWBxvXzPTAGHrbW/IJYEPqlzVOAS4XdUgHg0N7IbLywNHMvB+Yf+Nm6ctyXXFLV4WTNnzs7
. 87371 IN RRSIG DNSKEY 8 0 172800 20150115235959 20150101000000 19036 . i8cAxD2pvQi1oAyvQxRpDfFlbqPzW+69QQEsDwE1eWOm5AtawO9U7lmsGps7sy/fVNvl1ljKBj4Djp9pb3U2FLogjiIlW0cDAkPmLlG9t+b/pjEfBNlhjANUVN06pvQVAfm+LcF26EaWT6FlISBqb6jSy4BHRa3Bdc4Sx7+pRSYSqVVvYxLkfAWsKPqGkvWhebJDndJJV9syXQXgZ+v/uJ+6XOS43xkAdeL8iBzIs/FlwMTfh3tVe3d0lb65IBBLlCzeQuetX+0Vu1YFcnD0mHc/wS2ZnAV5toAFmyVQBoY/XAZiZeaOkcROJ6Zmqezy7liwK7BqsYyAZntMhk8lbg==
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 883 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 2117
;; flags: qr rd ra ad cd ; qd: 1 an: 2 au: 0 ad: 1
;; QUESTIONS:
;; ch., type = DS, class = IN
;; ANSWERS:
ch. 971 IN DS 46375 8 2 8F96646FC68BB7E4AF4C0750A6096FBC0D4ECDA3D3FA6DA06FDDB42EE50C6CF3
ch. 971 IN RRSIG DS 8 1 86400 20150112170000 20150105160000 16665 . thY7xYWBBxiBjqbQIb9fAG4TmQgnziwM7q6P1T3/ITxmECdvOCQnnZA3uD7qmN8uM0HudsD7+y+zgD3rsH4RSTKdL4kHSI0OnCxToMTvklghEgFDezqIRm8NkWdI2H4Stwrj20nYKSpLQxPI2EE54gs18P3KyO8bAUYv8Qx73xU=
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 238 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 46135
;; flags: qr rd ra ad cd ; qd: 1 an: 4 au: 0 ad: 1
;; QUESTIONS:
;; ch., type = DNSKEY, class = IN
;; ANSWERS:
ch. 972 IN DNSKEY 256 3 8 AwEAAcsg0kY6fw1wzYMhSAKTy+Y2JzAst66P/1odp9NECJJHbU8f4nwziI3onoFSBV0ZiSZhY1aH5dhdDZ7BkrqhVXSrZPAz0CvzjIxmB1gSOf9DeZvjQvoy97HqYolxsf+B3QQv2RKBT67elF5+JisKg3/dQISelKn8LhabSoVrMlD1
ch. 972 IN DNSKEY 257 3 8 AwEAAb7GhhZ8IAy/AhwmSms5DeQK5ad09wIIplEpYoiAIYXPtJvT1ReFzyfTp/2YP+g/PWDwHPh4qKAHa9x0VgbIQcGAeNakmfkAdWEmCnca323/SAml3mwfaX62G7/uYWae5zh8QTxZKNd+K1yZ5x0IxnI31chSl5xymRbTEHYZDKwSIRFM3fTxUMt93WFaBVWELReYotJBr++rvAWdnlay5TPBTvheLBkaiqtgM4GP8HK07Y+86lsZnEsj5K3G1KTV5SPpa82rqYAwxG9VKbmSE/6/kBR5jJHjt1rRt5Oe7v18aEtw0YCEN4vxq+KuvMoNVqXUsE9LBwHJD+QNwi6wmB0=
ch. 972 IN DNSKEY 256 3 8 AwEAAcSLdT0fEmcFmLpeUkAJoeVaHKiu+nbuc43fWlqaCRVf8t2HA4uWxOk0O5ci9nrFTc8nq8oa5fk5Cj7CHh4yrX9qUCfTdIWTyp8BDEdJpS+Dyb0u9wQuVj+nQMj4fLzdQf4TJs3/qxuiLr3nL1UUwlhhXeqSqGVb7p3mtB5HJ8ad
ch. 972 IN RRSIG DNSKEY 8 1 86400 20150127100909 20141212090909 46375 ch. bT8q0FWyeMH0SulNo6UdIIgZYNATwYsee2bikq2Gh339Bufma8eaqWIPYT3XKmxYPBFOw0bVl+kLZxTwbR1CFoCDXoP+qgQhh4mf9qkNiv2CDSc+0FE3FRREn+DAhYTUEuB58FPiPakFB8s8O7T+k2qhDae7jy4/y7Jl1lnjaBY8s7bzOUPhF0KKCNZmvoKwtL23ZdVeTSV1xM3jkiNnpzBKbcoSWECSGJVp1SE0BnRXdwQP41YTXFZ0310YjaTAUCC5qbMIWdEkHjfdSQtKBImnc85mkapq9w++XQ4zhauPWBtrPV3CcoCahjUaWdjrKVkibomlJZaN8MEO23CfQw==
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 893 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 9267
;; flags: qr rd ra cd ; qd: 1 an: 3 au: 0 ad: 1
;; QUESTIONS:
;; ingotronic.ch., type = DS, class = IN
;; ANSWERS:
ingotronic.ch. 3580 IN DS 6031 5 2 4A948F2FDADA24686E473EDAC00DCF972584C75E3FAA92C2021B6221449FF87E
ingotronic.ch. 3580 IN DS 6031 5 1 733D0218B571CD617B1A7493564B9FC4F12ADE82
ingotronic.ch. 3580 IN RRSIG DS 8 2 3600 20150129033614 20150105123019 60789 ch. rVPJP2HhzW7OkroK2axFj5Lb4iVWCH8Fp/Iq1rF952NDo72b8RiKje2RaAKJAGQ+wd0YgE+PAej04GCmkhlDJA/zvPeeTxuhy3HbJzReMlQ7fjyH+wW1hli+FuIYvogXWf7nO/9VyPORt8X/f/pjrOr3Vlj9sGLN8TGYpEuVSw4=
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 288 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 23660
;; flags: qr aa rd ra cd ; qd: 1 an: 4 au: 0 ad: 1
;; QUESTIONS:
;; ingotronic.ch., type = DNSKEY, class = IN
;; ANSWERS:
ingotronic.ch. 300 IN DNSKEY 256 3 5 AwEAAZ2Xh77GFzpEDx7EHYxShqltHgkiG+BOjBGifEmnJhQSdE5/yNSLFNcdhZZ8HUPxYnaedTqJcFFg4AzUsQklF/fECegTJdZjaj2WoL0/I8K7HMfY/hVuRZUWPNglYi8agJRX6gdkFTCpUNI7stpgKqxtzUJhhw15uG/lKMplwqUr
ingotronic.ch. 300 IN DNSKEY 257 3 5 AwEAAeA1vzmjaB+eBAcvhzpKEgAEFpvQ1rg4uKDW6MsQtacKoqBpgyep2+LuWotz5p/xYxj3NGsArwN8Ad5cY0FHRr8miTT0elOv6nvlqGIfRuhj/BXAQ1x4ihpSFslHw0lJMYFwxsUZWpUyjWX/nv1xRZMMwF46gui0N4OEbyTYusCk77D+A71k+K0EAitFIbIH4GCUKmH1H7HmXhSVH9bN/n7KEGwW32lmsuuUcJoRKDkcUvbMXY/9Xoa2quERrUg/rBbDUHowRPjYDS5GzY1+f4YY8s40BufGiqyUTKKXL953MVFK8gmezXA0hbmrnZ7CBOw/7238mORAdzExaX8n7CE=
ingotronic.ch. 300 IN RRSIG DNSKEY 5 2 300 20150125003700 20141226001657 6031 ingotronic.ch. rs1QlP2SlSpA2ELbzwg3DgWLzXWL3Lpv6CUJE2Q0qH2Zp7Qdy3cD+ZEtNh9v24Qv1M6JJ3zFt8mmZoCeW2ycuMbJCqBkW9CBuwF+VznZvZY2MxwPipvhvEEGP//0M8YAZJ66yQPDv3PTdAP8FYbIrJyvY44vwyncwbslpfHT9jAsrbfr3vuMuWps86dnP462q+0s1TxBfqi8mzo3gdavjHKWVNwohLahLKT+tWeu6DSzQv0YwMjwtkLgF7QRgx3ctIIkloOrnx9nHH1N6y+hxEB89fOlyVDjHhgL5uVtsD5fEdT0FJ2Gc/2nShEMMqIwr1/J9kUq1mNySff/uEe65Q==
ingotronic.ch. 300 IN RRSIG DNSKEY 5 2 300 20150125003700 20141226001657 17430 ingotronic.ch. mEwZjhQqeWksWD0TCnNBrtce4YkWJL3edqL6PvAUu8Fn+Ih437kEs3+pqdkgRsdYQ9HW+lBm/8pWwJlNAv0bi9NykItXMwAUFtncgq+6Pnh3iAM972GXSa5VV4LcGQ5b8CBdHCHiEKDqyPv5Hr5QfYL/FQaWlcNRh4QZZlZNPFA=
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 940 bytes
###############################################
testPositiveWithInvalidNsecSignature 0000664 0000000 0000000 00000034041 13020541473 0036762 0 ustar 00root root 0000000 0000000 dnssecjava-1.1.3/src/test/resources/recordings/org_jitsi_dnssec_TestWildcard #Date: 2015-01-06T22:35:04+01:00
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 52897
;; flags: qr aa rd ra cd ; qd: 1 an: 2 au: 4 ad: 3
;; QUESTIONS:
;; a.c.ingotronic.ch., type = A, class = IN
;; ANSWERS:
a.c.ingotronic.ch. 300 IN A 127.0.0.2
a.c.ingotronic.ch. 300 IN RRSIG A 5 3 300 20150125000532 20141225234703 17430 ingotronic.ch. geU9+RShND1QSzoFR2S1RAJxA6G4xzDzW7bzjFlzYdsFS22qF7sfkO09No9Dh8GaaYNZSyJ00y6ldeO+jWrqeulgP99ogJcdC9vGnzYJxgl6T1BPzKOMtLg/peXAqARBK1NyDgLTjNSmVPVda5Xpe6aAZDOr1elE464SkEMiQHg=
;; AUTHORITY RECORDS:
ingotronic.ch. 300 IN NS ns1.ingotronic.ch.
ingotronic.ch. 300 IN RRSIG NS 5 2 300 20150125000532 20141225234703 17430 ingotronic.ch. VuzVJM3McSHlcdngCG/G23zCikq8tXE0CZV2ZSgUFXXFMIEoM6PMi1QRQ/8VF3tee4WGpRx2jhtkui0wFRFfwIhW7G1uPDT4qogaR3KLIyuCEsMxhRH3WJZNrLmLqlSBGvd9OBJwbmryqm3Zzqvrk+E+rh8OJeifnBBpHAX4eHg=
*.c.ingotronic.ch. 300 IN NSEC cfailed.ingotronic.ch. A RRSIG NSEC
*.c.ingotronic.ch. 300 IN RRSIG NSEC 5 3 300 20150125000532 20141225234703 17430 ingotronic.ch. Lf7FP3WsqHc3SUznxjp367ehSI5mcUE7OzvHQj68BfC77FPylpt3YLtyirEZVjVKPjQ6maarQakizn6u7KFf1jFr2kGpS1rZCvyfAxGX6wwIZK/Wf0lfhP0IquQd+kX2OlmRbbemFI/lFG72NAcB+19t8tcwV5k6ADkxC2L6o/4=
;; ADDITIONAL RECORDS:
ns1.ingotronic.ch. 300 IN A 62.192.5.131
ns1.ingotronic.ch. 300 IN RRSIG A 5 3 300 20150125005754 20141226001054 17430 ingotronic.ch. fNG1RZM53pXwBxruHNaSZszxVzNLoCq8VZsTjAzYH2vSLzHXYVGJFTLIeY0K9APAdyJU8WuwmABmn7XY0Kg39kRG77uoFlqUws2PdTz2QKOwJGZY7W88Ak2Y9lkDBcK8o3wJHVptrT8R7p/1U7UfjF0kqPUkakk2B0EbFWdagFg=
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 833 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 23232
;; flags: qr rd ra ad cd ; qd: 1 an: 4 au: 0 ad: 1
;; QUESTIONS:
;; ., type = DNSKEY, class = IN
;; ANSWERS:
. 87369 IN DNSKEY 257 3 8 AwEAAagAIKlVZrpC6Ia7gEzahOR+9W29euxhJhVVLOyQbSEW0O8gcCjFFVQUTf6v58fLjwBd0YI0EzrAcQqBGCzh/RStIoO8g0NfnfL2MTJRkxoXbfDaUeVPQuYEhg37NZWAJQ9VnMVDxP/VHL496M/QZxkjf5/Efucp2gaDX6RS6CXpoY68LsvPVjR0ZSwzz1apAzvN9dlzEheX7ICJBBtuA6G3LQpzW5hOA2hzCTMjJPJ8LbqF6dsV6DoBQzgul0sGIcGOYl7OyQdXfZ57relSQageu+ipAdTTJ25AsRTAoub8ONGcLmqrAmRLKBP1dfwhYB4N7knNnulqQxA+Uk1ihz0=
. 87369 IN DNSKEY 256 3 8 AwEAAe3fSrbLBy3LOS7pnxEUhvPZTE2H5dIGsI/UfruI/nOEvWWa/PSX2BFedBkEqOlYdjdNF2f+6lmfk2Od/xu0v5bVqxFE+/24v3hZSlWBxvXzPTAGHrbW/IJYEPqlzVOAS4XdUgHg0N7IbLywNHMvB+Yf+Nm6ctyXXFLV4WTNnzs7
. 87369 IN DNSKEY 256 3 8 AwEAAaPD7Y7XIi1MOEREJNTrRhyqsY3gff6JWzg+XCbqut1sbcbvqyssHw8DT1AkRaAC92pO8xuyq5QEgEPL1IHfABLwpwXI5gTj4gdwi86bpkmlWs9fRpnn4DPDCTdrnxIejJXgClHikLJF3u3CdpNCMijq4CKdQbMlRZ3avv+G7rh7
. 87369 IN RRSIG DNSKEY 8 0 172800 20150115235959 20150101000000 19036 . i8cAxD2pvQi1oAyvQxRpDfFlbqPzW+69QQEsDwE1eWOm5AtawO9U7lmsGps7sy/fVNvl1ljKBj4Djp9pb3U2FLogjiIlW0cDAkPmLlG9t+b/pjEfBNlhjANUVN06pvQVAfm+LcF26EaWT6FlISBqb6jSy4BHRa3Bdc4Sx7+pRSYSqVVvYxLkfAWsKPqGkvWhebJDndJJV9syXQXgZ+v/uJ+6XOS43xkAdeL8iBzIs/FlwMTfh3tVe3d0lb65IBBLlCzeQuetX+0Vu1YFcnD0mHc/wS2ZnAV5toAFmyVQBoY/XAZiZeaOkcROJ6Zmqezy7liwK7BqsYyAZntMhk8lbg==
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 883 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 15202
;; flags: qr rd ra ad cd ; qd: 1 an: 2 au: 0 ad: 1
;; QUESTIONS:
;; ch., type = DS, class = IN
;; ANSWERS:
ch. 969 IN DS 46375 8 2 8F96646FC68BB7E4AF4C0750A6096FBC0D4ECDA3D3FA6DA06FDDB42EE50C6CF3
ch. 969 IN RRSIG DS 8 1 86400 20150112170000 20150105160000 16665 . thY7xYWBBxiBjqbQIb9fAG4TmQgnziwM7q6P1T3/ITxmECdvOCQnnZA3uD7qmN8uM0HudsD7+y+zgD3rsH4RSTKdL4kHSI0OnCxToMTvklghEgFDezqIRm8NkWdI2H4Stwrj20nYKSpLQxPI2EE54gs18P3KyO8bAUYv8Qx73xU=
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 238 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 46342
;; flags: qr rd ra ad cd ; qd: 1 an: 4 au: 0 ad: 1
;; QUESTIONS:
;; ch., type = DNSKEY, class = IN
;; ANSWERS:
ch. 970 IN DNSKEY 256 3 8 AwEAAcsg0kY6fw1wzYMhSAKTy+Y2JzAst66P/1odp9NECJJHbU8f4nwziI3onoFSBV0ZiSZhY1aH5dhdDZ7BkrqhVXSrZPAz0CvzjIxmB1gSOf9DeZvjQvoy97HqYolxsf+B3QQv2RKBT67elF5+JisKg3/dQISelKn8LhabSoVrMlD1
ch. 970 IN DNSKEY 256 3 8 AwEAAcSLdT0fEmcFmLpeUkAJoeVaHKiu+nbuc43fWlqaCRVf8t2HA4uWxOk0O5ci9nrFTc8nq8oa5fk5Cj7CHh4yrX9qUCfTdIWTyp8BDEdJpS+Dyb0u9wQuVj+nQMj4fLzdQf4TJs3/qxuiLr3nL1UUwlhhXeqSqGVb7p3mtB5HJ8ad
ch. 970 IN DNSKEY 257 3 8 AwEAAb7GhhZ8IAy/AhwmSms5DeQK5ad09wIIplEpYoiAIYXPtJvT1ReFzyfTp/2YP+g/PWDwHPh4qKAHa9x0VgbIQcGAeNakmfkAdWEmCnca323/SAml3mwfaX62G7/uYWae5zh8QTxZKNd+K1yZ5x0IxnI31chSl5xymRbTEHYZDKwSIRFM3fTxUMt93WFaBVWELReYotJBr++rvAWdnlay5TPBTvheLBkaiqtgM4GP8HK07Y+86lsZnEsj5K3G1KTV5SPpa82rqYAwxG9VKbmSE/6/kBR5jJHjt1rRt5Oe7v18aEtw0YCEN4vxq+KuvMoNVqXUsE9LBwHJD+QNwi6wmB0=
ch. 970 IN RRSIG DNSKEY 8 1 86400 20150127100909 20141212090909 46375 ch. bT8q0FWyeMH0SulNo6UdIIgZYNATwYsee2bikq2Gh339Bufma8eaqWIPYT3XKmxYPBFOw0bVl+kLZxTwbR1CFoCDXoP+qgQhh4mf9qkNiv2CDSc+0FE3FRREn+DAhYTUEuB58FPiPakFB8s8O7T+k2qhDae7jy4/y7Jl1lnjaBY8s7bzOUPhF0KKCNZmvoKwtL23ZdVeTSV1xM3jkiNnpzBKbcoSWECSGJVp1SE0BnRXdwQP41YTXFZ0310YjaTAUCC5qbMIWdEkHjfdSQtKBImnc85mkapq9w++XQ4zhauPWBtrPV3CcoCahjUaWdjrKVkibomlJZaN8MEO23CfQw==
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 893 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 32974
;; flags: qr rd ra cd ; qd: 1 an: 3 au: 0 ad: 1
;; QUESTIONS:
;; ingotronic.ch., type = DS, class = IN
;; ANSWERS:
ingotronic.ch. 3578 IN DS 6031 5 1 733D0218B571CD617B1A7493564B9FC4F12ADE82
ingotronic.ch. 3578 IN DS 6031 5 2 4A948F2FDADA24686E473EDAC00DCF972584C75E3FAA92C2021B6221449FF87E
ingotronic.ch. 3578 IN RRSIG DS 8 2 3600 20150129033614 20150105123019 60789 ch. rVPJP2HhzW7OkroK2axFj5Lb4iVWCH8Fp/Iq1rF952NDo72b8RiKje2RaAKJAGQ+wd0YgE+PAej04GCmkhlDJA/zvPeeTxuhy3HbJzReMlQ7fjyH+wW1hli+FuIYvogXWf7nO/9VyPORt8X/f/pjrOr3Vlj9sGLN8TGYpEuVSw4=
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 288 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 51129
;; flags: qr aa rd ra cd ; qd: 1 an: 4 au: 0 ad: 1
;; QUESTIONS:
;; ingotronic.ch., type = DNSKEY, class = IN
;; ANSWERS:
ingotronic.ch. 300 IN DNSKEY 257 3 5 AwEAAeA1vzmjaB+eBAcvhzpKEgAEFpvQ1rg4uKDW6MsQtacKoqBpgyep2+LuWotz5p/xYxj3NGsArwN8Ad5cY0FHRr8miTT0elOv6nvlqGIfRuhj/BXAQ1x4ihpSFslHw0lJMYFwxsUZWpUyjWX/nv1xRZMMwF46gui0N4OEbyTYusCk77D+A71k+K0EAitFIbIH4GCUKmH1H7HmXhSVH9bN/n7KEGwW32lmsuuUcJoRKDkcUvbMXY/9Xoa2quERrUg/rBbDUHowRPjYDS5GzY1+f4YY8s40BufGiqyUTKKXL953MVFK8gmezXA0hbmrnZ7CBOw/7238mORAdzExaX8n7CE=
ingotronic.ch. 300 IN DNSKEY 256 3 5 AwEAAZ2Xh77GFzpEDx7EHYxShqltHgkiG+BOjBGifEmnJhQSdE5/yNSLFNcdhZZ8HUPxYnaedTqJcFFg4AzUsQklF/fECegTJdZjaj2WoL0/I8K7HMfY/hVuRZUWPNglYi8agJRX6gdkFTCpUNI7stpgKqxtzUJhhw15uG/lKMplwqUr
ingotronic.ch. 300 IN RRSIG DNSKEY 5 2 300 20150125003700 20141226001657 6031 ingotronic.ch. rs1QlP2SlSpA2ELbzwg3DgWLzXWL3Lpv6CUJE2Q0qH2Zp7Qdy3cD+ZEtNh9v24Qv1M6JJ3zFt8mmZoCeW2ycuMbJCqBkW9CBuwF+VznZvZY2MxwPipvhvEEGP//0M8YAZJ66yQPDv3PTdAP8FYbIrJyvY44vwyncwbslpfHT9jAsrbfr3vuMuWps86dnP462q+0s1TxBfqi8mzo3gdavjHKWVNwohLahLKT+tWeu6DSzQv0YwMjwtkLgF7QRgx3ctIIkloOrnx9nHH1N6y+hxEB89fOlyVDjHhgL5uVtsD5fEdT0FJ2Gc/2nShEMMqIwr1/J9kUq1mNySff/uEe65Q==
ingotronic.ch. 300 IN RRSIG DNSKEY 5 2 300 20150125003700 20141226001657 17430 ingotronic.ch. mEwZjhQqeWksWD0TCnNBrtce4YkWJL3edqL6PvAUu8Fn+Ih437kEs3+pqdkgRsdYQ9HW+lBm/8pWwJlNAv0bi9NykItXMwAUFtncgq+6Pnh3iAM972GXSa5VV4LcGQ5b8CBdHCHiEKDqyPv5Hr5QfYL/FQaWlcNRh4QZZlZNPFA=
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 940 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 56199
;; flags: qr rd ra ad cd ; qd: 1 an: 4 au: 0 ad: 1
;; QUESTIONS:
;; ., type = DNSKEY, class = IN
;; ANSWERS:
. 87369 IN DNSKEY 257 3 8 AwEAAagAIKlVZrpC6Ia7gEzahOR+9W29euxhJhVVLOyQbSEW0O8gcCjFFVQUTf6v58fLjwBd0YI0EzrAcQqBGCzh/RStIoO8g0NfnfL2MTJRkxoXbfDaUeVPQuYEhg37NZWAJQ9VnMVDxP/VHL496M/QZxkjf5/Efucp2gaDX6RS6CXpoY68LsvPVjR0ZSwzz1apAzvN9dlzEheX7ICJBBtuA6G3LQpzW5hOA2hzCTMjJPJ8LbqF6dsV6DoBQzgul0sGIcGOYl7OyQdXfZ57relSQageu+ipAdTTJ25AsRTAoub8ONGcLmqrAmRLKBP1dfwhYB4N7knNnulqQxA+Uk1ihz0=
. 87369 IN DNSKEY 256 3 8 AwEAAaPD7Y7XIi1MOEREJNTrRhyqsY3gff6JWzg+XCbqut1sbcbvqyssHw8DT1AkRaAC92pO8xuyq5QEgEPL1IHfABLwpwXI5gTj4gdwi86bpkmlWs9fRpnn4DPDCTdrnxIejJXgClHikLJF3u3CdpNCMijq4CKdQbMlRZ3avv+G7rh7
. 87369 IN DNSKEY 256 3 8 AwEAAe3fSrbLBy3LOS7pnxEUhvPZTE2H5dIGsI/UfruI/nOEvWWa/PSX2BFedBkEqOlYdjdNF2f+6lmfk2Od/xu0v5bVqxFE+/24v3hZSlWBxvXzPTAGHrbW/IJYEPqlzVOAS4XdUgHg0N7IbLywNHMvB+Yf+Nm6ctyXXFLV4WTNnzs7
. 87369 IN RRSIG DNSKEY 8 0 172800 20150115235959 20150101000000 19036 . i8cAxD2pvQi1oAyvQxRpDfFlbqPzW+69QQEsDwE1eWOm5AtawO9U7lmsGps7sy/fVNvl1ljKBj4Djp9pb3U2FLogjiIlW0cDAkPmLlG9t+b/pjEfBNlhjANUVN06pvQVAfm+LcF26EaWT6FlISBqb6jSy4BHRa3Bdc4Sx7+pRSYSqVVvYxLkfAWsKPqGkvWhebJDndJJV9syXQXgZ+v/uJ+6XOS43xkAdeL8iBzIs/FlwMTfh3tVe3d0lb65IBBLlCzeQuetX+0Vu1YFcnD0mHc/wS2ZnAV5toAFmyVQBoY/XAZiZeaOkcROJ6Zmqezy7liwK7BqsYyAZntMhk8lbg==
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 883 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 36411
;; flags: qr rd ra ad cd ; qd: 1 an: 2 au: 0 ad: 1
;; QUESTIONS:
;; ch., type = DS, class = IN
;; ANSWERS:
ch. 969 IN DS 46375 8 2 8F96646FC68BB7E4AF4C0750A6096FBC0D4ECDA3D3FA6DA06FDDB42EE50C6CF3
ch. 969 IN RRSIG DS 8 1 86400 20150112170000 20150105160000 16665 . thY7xYWBBxiBjqbQIb9fAG4TmQgnziwM7q6P1T3/ITxmECdvOCQnnZA3uD7qmN8uM0HudsD7+y+zgD3rsH4RSTKdL4kHSI0OnCxToMTvklghEgFDezqIRm8NkWdI2H4Stwrj20nYKSpLQxPI2EE54gs18P3KyO8bAUYv8Qx73xU=
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 238 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 21233
;; flags: qr rd ra ad cd ; qd: 1 an: 4 au: 0 ad: 1
;; QUESTIONS:
;; ch., type = DNSKEY, class = IN
;; ANSWERS:
ch. 970 IN DNSKEY 257 3 8 AwEAAb7GhhZ8IAy/AhwmSms5DeQK5ad09wIIplEpYoiAIYXPtJvT1ReFzyfTp/2YP+g/PWDwHPh4qKAHa9x0VgbIQcGAeNakmfkAdWEmCnca323/SAml3mwfaX62G7/uYWae5zh8QTxZKNd+K1yZ5x0IxnI31chSl5xymRbTEHYZDKwSIRFM3fTxUMt93WFaBVWELReYotJBr++rvAWdnlay5TPBTvheLBkaiqtgM4GP8HK07Y+86lsZnEsj5K3G1KTV5SPpa82rqYAwxG9VKbmSE/6/kBR5jJHjt1rRt5Oe7v18aEtw0YCEN4vxq+KuvMoNVqXUsE9LBwHJD+QNwi6wmB0=
ch. 970 IN DNSKEY 256 3 8 AwEAAcsg0kY6fw1wzYMhSAKTy+Y2JzAst66P/1odp9NECJJHbU8f4nwziI3onoFSBV0ZiSZhY1aH5dhdDZ7BkrqhVXSrZPAz0CvzjIxmB1gSOf9DeZvjQvoy97HqYolxsf+B3QQv2RKBT67elF5+JisKg3/dQISelKn8LhabSoVrMlD1
ch. 970 IN DNSKEY 256 3 8 AwEAAcSLdT0fEmcFmLpeUkAJoeVaHKiu+nbuc43fWlqaCRVf8t2HA4uWxOk0O5ci9nrFTc8nq8oa5fk5Cj7CHh4yrX9qUCfTdIWTyp8BDEdJpS+Dyb0u9wQuVj+nQMj4fLzdQf4TJs3/qxuiLr3nL1UUwlhhXeqSqGVb7p3mtB5HJ8ad
ch. 970 IN RRSIG DNSKEY 8 1 86400 20150127100909 20141212090909 46375 ch. bT8q0FWyeMH0SulNo6UdIIgZYNATwYsee2bikq2Gh339Bufma8eaqWIPYT3XKmxYPBFOw0bVl+kLZxTwbR1CFoCDXoP+qgQhh4mf9qkNiv2CDSc+0FE3FRREn+DAhYTUEuB58FPiPakFB8s8O7T+k2qhDae7jy4/y7Jl1lnjaBY8s7bzOUPhF0KKCNZmvoKwtL23ZdVeTSV1xM3jkiNnpzBKbcoSWECSGJVp1SE0BnRXdwQP41YTXFZ0310YjaTAUCC5qbMIWdEkHjfdSQtKBImnc85mkapq9w++XQ4zhauPWBtrPV3CcoCahjUaWdjrKVkibomlJZaN8MEO23CfQw==
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 893 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 42201
;; flags: qr rd ra cd ; qd: 1 an: 3 au: 0 ad: 1
;; QUESTIONS:
;; ingotronic.ch., type = DS, class = IN
;; ANSWERS:
ingotronic.ch. 3578 IN DS 6031 5 2 4A948F2FDADA24686E473EDAC00DCF972584C75E3FAA92C2021B6221449FF87E
ingotronic.ch. 3578 IN DS 6031 5 1 733D0218B571CD617B1A7493564B9FC4F12ADE82
ingotronic.ch. 3578 IN RRSIG DS 8 2 3600 20150129033614 20150105123019 60789 ch. rVPJP2HhzW7OkroK2axFj5Lb4iVWCH8Fp/Iq1rF952NDo72b8RiKje2RaAKJAGQ+wd0YgE+PAej04GCmkhlDJA/zvPeeTxuhy3HbJzReMlQ7fjyH+wW1hli+FuIYvogXWf7nO/9VyPORt8X/f/pjrOr3Vlj9sGLN8TGYpEuVSw4=
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 288 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 52631
;; flags: qr aa rd ra cd ; qd: 1 an: 4 au: 0 ad: 1
;; QUESTIONS:
;; ingotronic.ch., type = DNSKEY, class = IN
;; ANSWERS:
ingotronic.ch. 300 IN DNSKEY 256 3 5 AwEAAZ2Xh77GFzpEDx7EHYxShqltHgkiG+BOjBGifEmnJhQSdE5/yNSLFNcdhZZ8HUPxYnaedTqJcFFg4AzUsQklF/fECegTJdZjaj2WoL0/I8K7HMfY/hVuRZUWPNglYi8agJRX6gdkFTCpUNI7stpgKqxtzUJhhw15uG/lKMplwqUr
ingotronic.ch. 300 IN DNSKEY 257 3 5 AwEAAeA1vzmjaB+eBAcvhzpKEgAEFpvQ1rg4uKDW6MsQtacKoqBpgyep2+LuWotz5p/xYxj3NGsArwN8Ad5cY0FHRr8miTT0elOv6nvlqGIfRuhj/BXAQ1x4ihpSFslHw0lJMYFwxsUZWpUyjWX/nv1xRZMMwF46gui0N4OEbyTYusCk77D+A71k+K0EAitFIbIH4GCUKmH1H7HmXhSVH9bN/n7KEGwW32lmsuuUcJoRKDkcUvbMXY/9Xoa2quERrUg/rBbDUHowRPjYDS5GzY1+f4YY8s40BufGiqyUTKKXL953MVFK8gmezXA0hbmrnZ7CBOw/7238mORAdzExaX8n7CE=
ingotronic.ch. 300 IN RRSIG DNSKEY 5 2 300 20150125003700 20141226001657 6031 ingotronic.ch. rs1QlP2SlSpA2ELbzwg3DgWLzXWL3Lpv6CUJE2Q0qH2Zp7Qdy3cD+ZEtNh9v24Qv1M6JJ3zFt8mmZoCeW2ycuMbJCqBkW9CBuwF+VznZvZY2MxwPipvhvEEGP//0M8YAZJ66yQPDv3PTdAP8FYbIrJyvY44vwyncwbslpfHT9jAsrbfr3vuMuWps86dnP462q+0s1TxBfqi8mzo3gdavjHKWVNwohLahLKT+tWeu6DSzQv0YwMjwtkLgF7QRgx3ctIIkloOrnx9nHH1N6y+hxEB89fOlyVDjHhgL5uVtsD5fEdT0FJ2Gc/2nShEMMqIwr1/J9kUq1mNySff/uEe65Q==
ingotronic.ch. 300 IN RRSIG DNSKEY 5 2 300 20150125003700 20141226001657 17430 ingotronic.ch. mEwZjhQqeWksWD0TCnNBrtce4YkWJL3edqL6PvAUu8Fn+Ih437kEs3+pqdkgRsdYQ9HW+lBm/8pWwJlNAv0bi9NykItXMwAUFtncgq+6Pnh3iAM972GXSa5VV4LcGQ5b8CBdHCHiEKDqyPv5Hr5QfYL/FQaWlcNRh4QZZlZNPFA=
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 940 bytes
###############################################
testSynthesisUsesCorrectWildcard 0000664 0000000 0000000 00000034043 13020541473 0036151 0 ustar 00root root 0000000 0000000 dnssecjava-1.1.3/src/test/resources/recordings/org_jitsi_dnssec_TestWildcard #Date: 2015-01-06T22:35:03+01:00
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 11754
;; flags: qr aa rd ra cd ; qd: 1 an: 2 au: 4 ad: 3
;; QUESTIONS:
;; a.wc.ingotronic.ch., type = A, class = IN
;; ANSWERS:
a.wc.ingotronic.ch. 300 IN A 127.0.0.2
a.wc.ingotronic.ch. 300 IN RRSIG A 5 3 300 20150125011134 20141226002644 17430 ingotronic.ch. XZpNDVyI2aAxNL0fMgxbKCHH6iFYitqUSc6KETJARx12GJt/0fkas+y6YRfS5oz4pBi8dsnlb/rjsDYoQ6aG6hCvAKnqSmZFO27Zp39AR6Uf+UMTR2H4tAgpvTm5tFBPh9POiH/e9YzGacKrXNkOZETXYdwzV7RQ0Ct9Gt2qLEw=
;; AUTHORITY RECORDS:
ingotronic.ch. 300 IN NS ns1.ingotronic.ch.
ingotronic.ch. 300 IN RRSIG NS 5 2 300 20150125000532 20141225234703 17430 ingotronic.ch. VuzVJM3McSHlcdngCG/G23zCikq8tXE0CZV2ZSgUFXXFMIEoM6PMi1QRQ/8VF3tee4WGpRx2jhtkui0wFRFfwIhW7G1uPDT4qogaR3KLIyuCEsMxhRH3WJZNrLmLqlSBGvd9OBJwbmryqm3Zzqvrk+E+rh8OJeifnBBpHAX4eHg=
*.wc.ingotronic.ch. 300 IN NSEC *.sub.wc.ingotronic.ch. A RRSIG NSEC
*.wc.ingotronic.ch. 300 IN RRSIG NSEC 5 3 300 20150125011134 20141226002644 17430 ingotronic.ch. ReylzrruAa2BPfMdmDkTLgj/cLWzXR7V22zk/LPIChZUI7K8JIZHUzFA2XO6Cho+Dj3SGEXlwwgncN6RNImAthvYh1SMfj6GjM7beo7g5WBbJrwkAnrR/G/LIXj4D0xhcX3yFrDVt9Xp1wSqrJmurvodjkbo/8m8O4yhZFSiuWM=
;; ADDITIONAL RECORDS:
ns1.ingotronic.ch. 300 IN A 62.192.5.131
ns1.ingotronic.ch. 300 IN RRSIG A 5 3 300 20150125005754 20141226001054 17430 ingotronic.ch. fNG1RZM53pXwBxruHNaSZszxVzNLoCq8VZsTjAzYH2vSLzHXYVGJFTLIeY0K9APAdyJU8WuwmABmn7XY0Kg39kRG77uoFlqUws2PdTz2QKOwJGZY7W88Ak2Y9lkDBcK8o3wJHVptrT8R7p/1U7UfjF0kqPUkakk2B0EbFWdagFg=
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 835 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 255
;; flags: qr rd ra ad cd ; qd: 1 an: 4 au: 0 ad: 1
;; QUESTIONS:
;; ., type = DNSKEY, class = IN
;; ANSWERS:
. 87371 IN DNSKEY 256 3 8 AwEAAe3fSrbLBy3LOS7pnxEUhvPZTE2H5dIGsI/UfruI/nOEvWWa/PSX2BFedBkEqOlYdjdNF2f+6lmfk2Od/xu0v5bVqxFE+/24v3hZSlWBxvXzPTAGHrbW/IJYEPqlzVOAS4XdUgHg0N7IbLywNHMvB+Yf+Nm6ctyXXFLV4WTNnzs7
. 87371 IN DNSKEY 256 3 8 AwEAAaPD7Y7XIi1MOEREJNTrRhyqsY3gff6JWzg+XCbqut1sbcbvqyssHw8DT1AkRaAC92pO8xuyq5QEgEPL1IHfABLwpwXI5gTj4gdwi86bpkmlWs9fRpnn4DPDCTdrnxIejJXgClHikLJF3u3CdpNCMijq4CKdQbMlRZ3avv+G7rh7
. 87371 IN DNSKEY 257 3 8 AwEAAagAIKlVZrpC6Ia7gEzahOR+9W29euxhJhVVLOyQbSEW0O8gcCjFFVQUTf6v58fLjwBd0YI0EzrAcQqBGCzh/RStIoO8g0NfnfL2MTJRkxoXbfDaUeVPQuYEhg37NZWAJQ9VnMVDxP/VHL496M/QZxkjf5/Efucp2gaDX6RS6CXpoY68LsvPVjR0ZSwzz1apAzvN9dlzEheX7ICJBBtuA6G3LQpzW5hOA2hzCTMjJPJ8LbqF6dsV6DoBQzgul0sGIcGOYl7OyQdXfZ57relSQageu+ipAdTTJ25AsRTAoub8ONGcLmqrAmRLKBP1dfwhYB4N7knNnulqQxA+Uk1ihz0=
. 87371 IN RRSIG DNSKEY 8 0 172800 20150115235959 20150101000000 19036 . i8cAxD2pvQi1oAyvQxRpDfFlbqPzW+69QQEsDwE1eWOm5AtawO9U7lmsGps7sy/fVNvl1ljKBj4Djp9pb3U2FLogjiIlW0cDAkPmLlG9t+b/pjEfBNlhjANUVN06pvQVAfm+LcF26EaWT6FlISBqb6jSy4BHRa3Bdc4Sx7+pRSYSqVVvYxLkfAWsKPqGkvWhebJDndJJV9syXQXgZ+v/uJ+6XOS43xkAdeL8iBzIs/FlwMTfh3tVe3d0lb65IBBLlCzeQuetX+0Vu1YFcnD0mHc/wS2ZnAV5toAFmyVQBoY/XAZiZeaOkcROJ6Zmqezy7liwK7BqsYyAZntMhk8lbg==
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 883 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 2733
;; flags: qr rd ra ad cd ; qd: 1 an: 2 au: 0 ad: 1
;; QUESTIONS:
;; ch., type = DS, class = IN
;; ANSWERS:
ch. 970 IN DS 46375 8 2 8F96646FC68BB7E4AF4C0750A6096FBC0D4ECDA3D3FA6DA06FDDB42EE50C6CF3
ch. 970 IN RRSIG DS 8 1 86400 20150112170000 20150105160000 16665 . thY7xYWBBxiBjqbQIb9fAG4TmQgnziwM7q6P1T3/ITxmECdvOCQnnZA3uD7qmN8uM0HudsD7+y+zgD3rsH4RSTKdL4kHSI0OnCxToMTvklghEgFDezqIRm8NkWdI2H4Stwrj20nYKSpLQxPI2EE54gs18P3KyO8bAUYv8Qx73xU=
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 238 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 30372
;; flags: qr rd ra ad cd ; qd: 1 an: 4 au: 0 ad: 1
;; QUESTIONS:
;; ch., type = DNSKEY, class = IN
;; ANSWERS:
ch. 971 IN DNSKEY 256 3 8 AwEAAcSLdT0fEmcFmLpeUkAJoeVaHKiu+nbuc43fWlqaCRVf8t2HA4uWxOk0O5ci9nrFTc8nq8oa5fk5Cj7CHh4yrX9qUCfTdIWTyp8BDEdJpS+Dyb0u9wQuVj+nQMj4fLzdQf4TJs3/qxuiLr3nL1UUwlhhXeqSqGVb7p3mtB5HJ8ad
ch. 971 IN DNSKEY 256 3 8 AwEAAcsg0kY6fw1wzYMhSAKTy+Y2JzAst66P/1odp9NECJJHbU8f4nwziI3onoFSBV0ZiSZhY1aH5dhdDZ7BkrqhVXSrZPAz0CvzjIxmB1gSOf9DeZvjQvoy97HqYolxsf+B3QQv2RKBT67elF5+JisKg3/dQISelKn8LhabSoVrMlD1
ch. 971 IN DNSKEY 257 3 8 AwEAAb7GhhZ8IAy/AhwmSms5DeQK5ad09wIIplEpYoiAIYXPtJvT1ReFzyfTp/2YP+g/PWDwHPh4qKAHa9x0VgbIQcGAeNakmfkAdWEmCnca323/SAml3mwfaX62G7/uYWae5zh8QTxZKNd+K1yZ5x0IxnI31chSl5xymRbTEHYZDKwSIRFM3fTxUMt93WFaBVWELReYotJBr++rvAWdnlay5TPBTvheLBkaiqtgM4GP8HK07Y+86lsZnEsj5K3G1KTV5SPpa82rqYAwxG9VKbmSE/6/kBR5jJHjt1rRt5Oe7v18aEtw0YCEN4vxq+KuvMoNVqXUsE9LBwHJD+QNwi6wmB0=
ch. 971 IN RRSIG DNSKEY 8 1 86400 20150127100909 20141212090909 46375 ch. bT8q0FWyeMH0SulNo6UdIIgZYNATwYsee2bikq2Gh339Bufma8eaqWIPYT3XKmxYPBFOw0bVl+kLZxTwbR1CFoCDXoP+qgQhh4mf9qkNiv2CDSc+0FE3FRREn+DAhYTUEuB58FPiPakFB8s8O7T+k2qhDae7jy4/y7Jl1lnjaBY8s7bzOUPhF0KKCNZmvoKwtL23ZdVeTSV1xM3jkiNnpzBKbcoSWECSGJVp1SE0BnRXdwQP41YTXFZ0310YjaTAUCC5qbMIWdEkHjfdSQtKBImnc85mkapq9w++XQ4zhauPWBtrPV3CcoCahjUaWdjrKVkibomlJZaN8MEO23CfQw==
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 893 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 18005
;; flags: qr rd ra cd ; qd: 1 an: 3 au: 0 ad: 1
;; QUESTIONS:
;; ingotronic.ch., type = DS, class = IN
;; ANSWERS:
ingotronic.ch. 3579 IN DS 6031 5 2 4A948F2FDADA24686E473EDAC00DCF972584C75E3FAA92C2021B6221449FF87E
ingotronic.ch. 3579 IN DS 6031 5 1 733D0218B571CD617B1A7493564B9FC4F12ADE82
ingotronic.ch. 3579 IN RRSIG DS 8 2 3600 20150129033614 20150105123019 60789 ch. rVPJP2HhzW7OkroK2axFj5Lb4iVWCH8Fp/Iq1rF952NDo72b8RiKje2RaAKJAGQ+wd0YgE+PAej04GCmkhlDJA/zvPeeTxuhy3HbJzReMlQ7fjyH+wW1hli+FuIYvogXWf7nO/9VyPORt8X/f/pjrOr3Vlj9sGLN8TGYpEuVSw4=
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 288 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 35032
;; flags: qr aa rd ra cd ; qd: 1 an: 4 au: 0 ad: 1
;; QUESTIONS:
;; ingotronic.ch., type = DNSKEY, class = IN
;; ANSWERS:
ingotronic.ch. 300 IN DNSKEY 257 3 5 AwEAAeA1vzmjaB+eBAcvhzpKEgAEFpvQ1rg4uKDW6MsQtacKoqBpgyep2+LuWotz5p/xYxj3NGsArwN8Ad5cY0FHRr8miTT0elOv6nvlqGIfRuhj/BXAQ1x4ihpSFslHw0lJMYFwxsUZWpUyjWX/nv1xRZMMwF46gui0N4OEbyTYusCk77D+A71k+K0EAitFIbIH4GCUKmH1H7HmXhSVH9bN/n7KEGwW32lmsuuUcJoRKDkcUvbMXY/9Xoa2quERrUg/rBbDUHowRPjYDS5GzY1+f4YY8s40BufGiqyUTKKXL953MVFK8gmezXA0hbmrnZ7CBOw/7238mORAdzExaX8n7CE=
ingotronic.ch. 300 IN DNSKEY 256 3 5 AwEAAZ2Xh77GFzpEDx7EHYxShqltHgkiG+BOjBGifEmnJhQSdE5/yNSLFNcdhZZ8HUPxYnaedTqJcFFg4AzUsQklF/fECegTJdZjaj2WoL0/I8K7HMfY/hVuRZUWPNglYi8agJRX6gdkFTCpUNI7stpgKqxtzUJhhw15uG/lKMplwqUr
ingotronic.ch. 300 IN RRSIG DNSKEY 5 2 300 20150125003700 20141226001657 6031 ingotronic.ch. rs1QlP2SlSpA2ELbzwg3DgWLzXWL3Lpv6CUJE2Q0qH2Zp7Qdy3cD+ZEtNh9v24Qv1M6JJ3zFt8mmZoCeW2ycuMbJCqBkW9CBuwF+VznZvZY2MxwPipvhvEEGP//0M8YAZJ66yQPDv3PTdAP8FYbIrJyvY44vwyncwbslpfHT9jAsrbfr3vuMuWps86dnP462q+0s1TxBfqi8mzo3gdavjHKWVNwohLahLKT+tWeu6DSzQv0YwMjwtkLgF7QRgx3ctIIkloOrnx9nHH1N6y+hxEB89fOlyVDjHhgL5uVtsD5fEdT0FJ2Gc/2nShEMMqIwr1/J9kUq1mNySff/uEe65Q==
ingotronic.ch. 300 IN RRSIG DNSKEY 5 2 300 20150125003700 20141226001657 17430 ingotronic.ch. mEwZjhQqeWksWD0TCnNBrtce4YkWJL3edqL6PvAUu8Fn+Ih437kEs3+pqdkgRsdYQ9HW+lBm/8pWwJlNAv0bi9NykItXMwAUFtncgq+6Pnh3iAM972GXSa5VV4LcGQ5b8CBdHCHiEKDqyPv5Hr5QfYL/FQaWlcNRh4QZZlZNPFA=
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 940 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 4440
;; flags: qr rd ra ad cd ; qd: 1 an: 4 au: 0 ad: 1
;; QUESTIONS:
;; ., type = DNSKEY, class = IN
;; ANSWERS:
. 87370 IN DNSKEY 257 3 8 AwEAAagAIKlVZrpC6Ia7gEzahOR+9W29euxhJhVVLOyQbSEW0O8gcCjFFVQUTf6v58fLjwBd0YI0EzrAcQqBGCzh/RStIoO8g0NfnfL2MTJRkxoXbfDaUeVPQuYEhg37NZWAJQ9VnMVDxP/VHL496M/QZxkjf5/Efucp2gaDX6RS6CXpoY68LsvPVjR0ZSwzz1apAzvN9dlzEheX7ICJBBtuA6G3LQpzW5hOA2hzCTMjJPJ8LbqF6dsV6DoBQzgul0sGIcGOYl7OyQdXfZ57relSQageu+ipAdTTJ25AsRTAoub8ONGcLmqrAmRLKBP1dfwhYB4N7knNnulqQxA+Uk1ihz0=
. 87370 IN DNSKEY 256 3 8 AwEAAaPD7Y7XIi1MOEREJNTrRhyqsY3gff6JWzg+XCbqut1sbcbvqyssHw8DT1AkRaAC92pO8xuyq5QEgEPL1IHfABLwpwXI5gTj4gdwi86bpkmlWs9fRpnn4DPDCTdrnxIejJXgClHikLJF3u3CdpNCMijq4CKdQbMlRZ3avv+G7rh7
. 87370 IN DNSKEY 256 3 8 AwEAAe3fSrbLBy3LOS7pnxEUhvPZTE2H5dIGsI/UfruI/nOEvWWa/PSX2BFedBkEqOlYdjdNF2f+6lmfk2Od/xu0v5bVqxFE+/24v3hZSlWBxvXzPTAGHrbW/IJYEPqlzVOAS4XdUgHg0N7IbLywNHMvB+Yf+Nm6ctyXXFLV4WTNnzs7
. 87370 IN RRSIG DNSKEY 8 0 172800 20150115235959 20150101000000 19036 . i8cAxD2pvQi1oAyvQxRpDfFlbqPzW+69QQEsDwE1eWOm5AtawO9U7lmsGps7sy/fVNvl1ljKBj4Djp9pb3U2FLogjiIlW0cDAkPmLlG9t+b/pjEfBNlhjANUVN06pvQVAfm+LcF26EaWT6FlISBqb6jSy4BHRa3Bdc4Sx7+pRSYSqVVvYxLkfAWsKPqGkvWhebJDndJJV9syXQXgZ+v/uJ+6XOS43xkAdeL8iBzIs/FlwMTfh3tVe3d0lb65IBBLlCzeQuetX+0Vu1YFcnD0mHc/wS2ZnAV5toAFmyVQBoY/XAZiZeaOkcROJ6Zmqezy7liwK7BqsYyAZntMhk8lbg==
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 883 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 24442
;; flags: qr rd ra ad cd ; qd: 1 an: 2 au: 0 ad: 1
;; QUESTIONS:
;; ch., type = DS, class = IN
;; ANSWERS:
ch. 970 IN DS 46375 8 2 8F96646FC68BB7E4AF4C0750A6096FBC0D4ECDA3D3FA6DA06FDDB42EE50C6CF3
ch. 970 IN RRSIG DS 8 1 86400 20150112170000 20150105160000 16665 . thY7xYWBBxiBjqbQIb9fAG4TmQgnziwM7q6P1T3/ITxmECdvOCQnnZA3uD7qmN8uM0HudsD7+y+zgD3rsH4RSTKdL4kHSI0OnCxToMTvklghEgFDezqIRm8NkWdI2H4Stwrj20nYKSpLQxPI2EE54gs18P3KyO8bAUYv8Qx73xU=
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 238 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 49540
;; flags: qr rd ra ad cd ; qd: 1 an: 4 au: 0 ad: 1
;; QUESTIONS:
;; ch., type = DNSKEY, class = IN
;; ANSWERS:
ch. 971 IN DNSKEY 256 3 8 AwEAAcSLdT0fEmcFmLpeUkAJoeVaHKiu+nbuc43fWlqaCRVf8t2HA4uWxOk0O5ci9nrFTc8nq8oa5fk5Cj7CHh4yrX9qUCfTdIWTyp8BDEdJpS+Dyb0u9wQuVj+nQMj4fLzdQf4TJs3/qxuiLr3nL1UUwlhhXeqSqGVb7p3mtB5HJ8ad
ch. 971 IN DNSKEY 256 3 8 AwEAAcsg0kY6fw1wzYMhSAKTy+Y2JzAst66P/1odp9NECJJHbU8f4nwziI3onoFSBV0ZiSZhY1aH5dhdDZ7BkrqhVXSrZPAz0CvzjIxmB1gSOf9DeZvjQvoy97HqYolxsf+B3QQv2RKBT67elF5+JisKg3/dQISelKn8LhabSoVrMlD1
ch. 971 IN DNSKEY 257 3 8 AwEAAb7GhhZ8IAy/AhwmSms5DeQK5ad09wIIplEpYoiAIYXPtJvT1ReFzyfTp/2YP+g/PWDwHPh4qKAHa9x0VgbIQcGAeNakmfkAdWEmCnca323/SAml3mwfaX62G7/uYWae5zh8QTxZKNd+K1yZ5x0IxnI31chSl5xymRbTEHYZDKwSIRFM3fTxUMt93WFaBVWELReYotJBr++rvAWdnlay5TPBTvheLBkaiqtgM4GP8HK07Y+86lsZnEsj5K3G1KTV5SPpa82rqYAwxG9VKbmSE/6/kBR5jJHjt1rRt5Oe7v18aEtw0YCEN4vxq+KuvMoNVqXUsE9LBwHJD+QNwi6wmB0=
ch. 971 IN RRSIG DNSKEY 8 1 86400 20150127100909 20141212090909 46375 ch. bT8q0FWyeMH0SulNo6UdIIgZYNATwYsee2bikq2Gh339Bufma8eaqWIPYT3XKmxYPBFOw0bVl+kLZxTwbR1CFoCDXoP+qgQhh4mf9qkNiv2CDSc+0FE3FRREn+DAhYTUEuB58FPiPakFB8s8O7T+k2qhDae7jy4/y7Jl1lnjaBY8s7bzOUPhF0KKCNZmvoKwtL23ZdVeTSV1xM3jkiNnpzBKbcoSWECSGJVp1SE0BnRXdwQP41YTXFZ0310YjaTAUCC5qbMIWdEkHjfdSQtKBImnc85mkapq9w++XQ4zhauPWBtrPV3CcoCahjUaWdjrKVkibomlJZaN8MEO23CfQw==
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 893 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 12172
;; flags: qr rd ra cd ; qd: 1 an: 3 au: 0 ad: 1
;; QUESTIONS:
;; ingotronic.ch., type = DS, class = IN
;; ANSWERS:
ingotronic.ch. 3579 IN DS 6031 5 2 4A948F2FDADA24686E473EDAC00DCF972584C75E3FAA92C2021B6221449FF87E
ingotronic.ch. 3579 IN DS 6031 5 1 733D0218B571CD617B1A7493564B9FC4F12ADE82
ingotronic.ch. 3579 IN RRSIG DS 8 2 3600 20150129033614 20150105123019 60789 ch. rVPJP2HhzW7OkroK2axFj5Lb4iVWCH8Fp/Iq1rF952NDo72b8RiKje2RaAKJAGQ+wd0YgE+PAej04GCmkhlDJA/zvPeeTxuhy3HbJzReMlQ7fjyH+wW1hli+FuIYvogXWf7nO/9VyPORt8X/f/pjrOr3Vlj9sGLN8TGYpEuVSw4=
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 288 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 53492
;; flags: qr aa rd ra cd ; qd: 1 an: 4 au: 0 ad: 1
;; QUESTIONS:
;; ingotronic.ch., type = DNSKEY, class = IN
;; ANSWERS:
ingotronic.ch. 300 IN DNSKEY 257 3 5 AwEAAeA1vzmjaB+eBAcvhzpKEgAEFpvQ1rg4uKDW6MsQtacKoqBpgyep2+LuWotz5p/xYxj3NGsArwN8Ad5cY0FHRr8miTT0elOv6nvlqGIfRuhj/BXAQ1x4ihpSFslHw0lJMYFwxsUZWpUyjWX/nv1xRZMMwF46gui0N4OEbyTYusCk77D+A71k+K0EAitFIbIH4GCUKmH1H7HmXhSVH9bN/n7KEGwW32lmsuuUcJoRKDkcUvbMXY/9Xoa2quERrUg/rBbDUHowRPjYDS5GzY1+f4YY8s40BufGiqyUTKKXL953MVFK8gmezXA0hbmrnZ7CBOw/7238mORAdzExaX8n7CE=
ingotronic.ch. 300 IN DNSKEY 256 3 5 AwEAAZ2Xh77GFzpEDx7EHYxShqltHgkiG+BOjBGifEmnJhQSdE5/yNSLFNcdhZZ8HUPxYnaedTqJcFFg4AzUsQklF/fECegTJdZjaj2WoL0/I8K7HMfY/hVuRZUWPNglYi8agJRX6gdkFTCpUNI7stpgKqxtzUJhhw15uG/lKMplwqUr
ingotronic.ch. 300 IN RRSIG DNSKEY 5 2 300 20150125003700 20141226001657 6031 ingotronic.ch. rs1QlP2SlSpA2ELbzwg3DgWLzXWL3Lpv6CUJE2Q0qH2Zp7Qdy3cD+ZEtNh9v24Qv1M6JJ3zFt8mmZoCeW2ycuMbJCqBkW9CBuwF+VznZvZY2MxwPipvhvEEGP//0M8YAZJ66yQPDv3PTdAP8FYbIrJyvY44vwyncwbslpfHT9jAsrbfr3vuMuWps86dnP462q+0s1TxBfqi8mzo3gdavjHKWVNwohLahLKT+tWeu6DSzQv0YwMjwtkLgF7QRgx3ctIIkloOrnx9nHH1N6y+hxEB89fOlyVDjHhgL5uVtsD5fEdT0FJ2Gc/2nShEMMqIwr1/J9kUq1mNySff/uEe65Q==
ingotronic.ch. 300 IN RRSIG DNSKEY 5 2 300 20150125003700 20141226001657 17430 ingotronic.ch. mEwZjhQqeWksWD0TCnNBrtce4YkWJL3edqL6PvAUu8Fn+Ih437kEs3+pqdkgRsdYQ9HW+lBm/8pWwJlNAv0bi9NykItXMwAUFtncgq+6Pnh3iAM972GXSa5VV4LcGQ5b8CBdHCHiEKDqyPv5Hr5QfYL/FQaWlcNRh4QZZlZNPFA=
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 940 bytes
###############################################
testSynthesisUsesCorrectWildcardNodata 0000664 0000000 0000000 00000032763 13020541473 0037307 0 ustar 00root root 0000000 0000000 dnssecjava-1.1.3/src/test/resources/recordings/org_jitsi_dnssec_TestWildcard #Date: 2015-01-06T22:35:01+01:00
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 575
;; flags: qr aa rd ra cd ; qd: 1 an: 0 au: 4 ad: 1
;; QUESTIONS:
;; a.wc.ingotronic.ch., type = MX, class = IN
;; ANSWERS:
;; AUTHORITY RECORDS:
ingotronic.ch. 300 IN SOA ns1.ingotronic.ch. admin.ingotronic.ch. 2013032762 300 60 864000 300
ingotronic.ch. 300 IN RRSIG SOA 5 2 300 20150125021244 20141226011244 17430 ingotronic.ch. WDLpp9G0P/rlMBfpFn9sAfpEFoBnQfwyGSXbGCc/LG1FSkJoKLDQYDY696scLNsJgkrzZeJrl0oSSvA8AvRUhYRrmuqWMxTVFgYlRwPwqEMCKUqiVhKGVF4NYemoBiUQC4nJwBZd57xKCiF4AQ4CodBtiZxefJFAlTNE0g2yxtM=
*.wc.ingotronic.ch. 300 IN NSEC *.sub.wc.ingotronic.ch. A RRSIG NSEC
*.wc.ingotronic.ch. 300 IN RRSIG NSEC 5 3 300 20150125011134 20141226002644 17430 ingotronic.ch. ReylzrruAa2BPfMdmDkTLgj/cLWzXR7V22zk/LPIChZUI7K8JIZHUzFA2XO6Cho+Dj3SGEXlwwgncN6RNImAthvYh1SMfj6GjM7beo7g5WBbJrwkAnrR/G/LIXj4D0xhcX3yFrDVt9Xp1wSqrJmurvodjkbo/8m8O4yhZFSiuWM=
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 485 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 52336
;; flags: qr rd ra ad cd ; qd: 1 an: 4 au: 0 ad: 1
;; QUESTIONS:
;; ., type = DNSKEY, class = IN
;; ANSWERS:
. 87372 IN DNSKEY 256 3 8 AwEAAe3fSrbLBy3LOS7pnxEUhvPZTE2H5dIGsI/UfruI/nOEvWWa/PSX2BFedBkEqOlYdjdNF2f+6lmfk2Od/xu0v5bVqxFE+/24v3hZSlWBxvXzPTAGHrbW/IJYEPqlzVOAS4XdUgHg0N7IbLywNHMvB+Yf+Nm6ctyXXFLV4WTNnzs7
. 87372 IN DNSKEY 257 3 8 AwEAAagAIKlVZrpC6Ia7gEzahOR+9W29euxhJhVVLOyQbSEW0O8gcCjFFVQUTf6v58fLjwBd0YI0EzrAcQqBGCzh/RStIoO8g0NfnfL2MTJRkxoXbfDaUeVPQuYEhg37NZWAJQ9VnMVDxP/VHL496M/QZxkjf5/Efucp2gaDX6RS6CXpoY68LsvPVjR0ZSwzz1apAzvN9dlzEheX7ICJBBtuA6G3LQpzW5hOA2hzCTMjJPJ8LbqF6dsV6DoBQzgul0sGIcGOYl7OyQdXfZ57relSQageu+ipAdTTJ25AsRTAoub8ONGcLmqrAmRLKBP1dfwhYB4N7knNnulqQxA+Uk1ihz0=
. 87372 IN DNSKEY 256 3 8 AwEAAaPD7Y7XIi1MOEREJNTrRhyqsY3gff6JWzg+XCbqut1sbcbvqyssHw8DT1AkRaAC92pO8xuyq5QEgEPL1IHfABLwpwXI5gTj4gdwi86bpkmlWs9fRpnn4DPDCTdrnxIejJXgClHikLJF3u3CdpNCMijq4CKdQbMlRZ3avv+G7rh7
. 87372 IN RRSIG DNSKEY 8 0 172800 20150115235959 20150101000000 19036 . i8cAxD2pvQi1oAyvQxRpDfFlbqPzW+69QQEsDwE1eWOm5AtawO9U7lmsGps7sy/fVNvl1ljKBj4Djp9pb3U2FLogjiIlW0cDAkPmLlG9t+b/pjEfBNlhjANUVN06pvQVAfm+LcF26EaWT6FlISBqb6jSy4BHRa3Bdc4Sx7+pRSYSqVVvYxLkfAWsKPqGkvWhebJDndJJV9syXQXgZ+v/uJ+6XOS43xkAdeL8iBzIs/FlwMTfh3tVe3d0lb65IBBLlCzeQuetX+0Vu1YFcnD0mHc/wS2ZnAV5toAFmyVQBoY/XAZiZeaOkcROJ6Zmqezy7liwK7BqsYyAZntMhk8lbg==
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 883 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 19347
;; flags: qr rd ra ad cd ; qd: 1 an: 2 au: 0 ad: 1
;; QUESTIONS:
;; ch., type = DS, class = IN
;; ANSWERS:
ch. 972 IN DS 46375 8 2 8F96646FC68BB7E4AF4C0750A6096FBC0D4ECDA3D3FA6DA06FDDB42EE50C6CF3
ch. 972 IN RRSIG DS 8 1 86400 20150112170000 20150105160000 16665 . thY7xYWBBxiBjqbQIb9fAG4TmQgnziwM7q6P1T3/ITxmECdvOCQnnZA3uD7qmN8uM0HudsD7+y+zgD3rsH4RSTKdL4kHSI0OnCxToMTvklghEgFDezqIRm8NkWdI2H4Stwrj20nYKSpLQxPI2EE54gs18P3KyO8bAUYv8Qx73xU=
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 238 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 6261
;; flags: qr rd ra ad cd ; qd: 1 an: 4 au: 0 ad: 1
;; QUESTIONS:
;; ch., type = DNSKEY, class = IN
;; ANSWERS:
ch. 973 IN DNSKEY 256 3 8 AwEAAcSLdT0fEmcFmLpeUkAJoeVaHKiu+nbuc43fWlqaCRVf8t2HA4uWxOk0O5ci9nrFTc8nq8oa5fk5Cj7CHh4yrX9qUCfTdIWTyp8BDEdJpS+Dyb0u9wQuVj+nQMj4fLzdQf4TJs3/qxuiLr3nL1UUwlhhXeqSqGVb7p3mtB5HJ8ad
ch. 973 IN DNSKEY 257 3 8 AwEAAb7GhhZ8IAy/AhwmSms5DeQK5ad09wIIplEpYoiAIYXPtJvT1ReFzyfTp/2YP+g/PWDwHPh4qKAHa9x0VgbIQcGAeNakmfkAdWEmCnca323/SAml3mwfaX62G7/uYWae5zh8QTxZKNd+K1yZ5x0IxnI31chSl5xymRbTEHYZDKwSIRFM3fTxUMt93WFaBVWELReYotJBr++rvAWdnlay5TPBTvheLBkaiqtgM4GP8HK07Y+86lsZnEsj5K3G1KTV5SPpa82rqYAwxG9VKbmSE/6/kBR5jJHjt1rRt5Oe7v18aEtw0YCEN4vxq+KuvMoNVqXUsE9LBwHJD+QNwi6wmB0=
ch. 973 IN DNSKEY 256 3 8 AwEAAcsg0kY6fw1wzYMhSAKTy+Y2JzAst66P/1odp9NECJJHbU8f4nwziI3onoFSBV0ZiSZhY1aH5dhdDZ7BkrqhVXSrZPAz0CvzjIxmB1gSOf9DeZvjQvoy97HqYolxsf+B3QQv2RKBT67elF5+JisKg3/dQISelKn8LhabSoVrMlD1
ch. 973 IN RRSIG DNSKEY 8 1 86400 20150127100909 20141212090909 46375 ch. bT8q0FWyeMH0SulNo6UdIIgZYNATwYsee2bikq2Gh339Bufma8eaqWIPYT3XKmxYPBFOw0bVl+kLZxTwbR1CFoCDXoP+qgQhh4mf9qkNiv2CDSc+0FE3FRREn+DAhYTUEuB58FPiPakFB8s8O7T+k2qhDae7jy4/y7Jl1lnjaBY8s7bzOUPhF0KKCNZmvoKwtL23ZdVeTSV1xM3jkiNnpzBKbcoSWECSGJVp1SE0BnRXdwQP41YTXFZ0310YjaTAUCC5qbMIWdEkHjfdSQtKBImnc85mkapq9w++XQ4zhauPWBtrPV3CcoCahjUaWdjrKVkibomlJZaN8MEO23CfQw==
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 893 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 15861
;; flags: qr rd ra cd ; qd: 1 an: 3 au: 0 ad: 1
;; QUESTIONS:
;; ingotronic.ch., type = DS, class = IN
;; ANSWERS:
ingotronic.ch. 3581 IN DS 6031 5 2 4A948F2FDADA24686E473EDAC00DCF972584C75E3FAA92C2021B6221449FF87E
ingotronic.ch. 3581 IN DS 6031 5 1 733D0218B571CD617B1A7493564B9FC4F12ADE82
ingotronic.ch. 3581 IN RRSIG DS 8 2 3600 20150129033614 20150105123019 60789 ch. rVPJP2HhzW7OkroK2axFj5Lb4iVWCH8Fp/Iq1rF952NDo72b8RiKje2RaAKJAGQ+wd0YgE+PAej04GCmkhlDJA/zvPeeTxuhy3HbJzReMlQ7fjyH+wW1hli+FuIYvogXWf7nO/9VyPORt8X/f/pjrOr3Vlj9sGLN8TGYpEuVSw4=
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 288 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 47780
;; flags: qr aa rd ra cd ; qd: 1 an: 4 au: 0 ad: 1
;; QUESTIONS:
;; ingotronic.ch., type = DNSKEY, class = IN
;; ANSWERS:
ingotronic.ch. 300 IN DNSKEY 256 3 5 AwEAAZ2Xh77GFzpEDx7EHYxShqltHgkiG+BOjBGifEmnJhQSdE5/yNSLFNcdhZZ8HUPxYnaedTqJcFFg4AzUsQklF/fECegTJdZjaj2WoL0/I8K7HMfY/hVuRZUWPNglYi8agJRX6gdkFTCpUNI7stpgKqxtzUJhhw15uG/lKMplwqUr
ingotronic.ch. 300 IN DNSKEY 257 3 5 AwEAAeA1vzmjaB+eBAcvhzpKEgAEFpvQ1rg4uKDW6MsQtacKoqBpgyep2+LuWotz5p/xYxj3NGsArwN8Ad5cY0FHRr8miTT0elOv6nvlqGIfRuhj/BXAQ1x4ihpSFslHw0lJMYFwxsUZWpUyjWX/nv1xRZMMwF46gui0N4OEbyTYusCk77D+A71k+K0EAitFIbIH4GCUKmH1H7HmXhSVH9bN/n7KEGwW32lmsuuUcJoRKDkcUvbMXY/9Xoa2quERrUg/rBbDUHowRPjYDS5GzY1+f4YY8s40BufGiqyUTKKXL953MVFK8gmezXA0hbmrnZ7CBOw/7238mORAdzExaX8n7CE=
ingotronic.ch. 300 IN RRSIG DNSKEY 5 2 300 20150125003700 20141226001657 6031 ingotronic.ch. rs1QlP2SlSpA2ELbzwg3DgWLzXWL3Lpv6CUJE2Q0qH2Zp7Qdy3cD+ZEtNh9v24Qv1M6JJ3zFt8mmZoCeW2ycuMbJCqBkW9CBuwF+VznZvZY2MxwPipvhvEEGP//0M8YAZJ66yQPDv3PTdAP8FYbIrJyvY44vwyncwbslpfHT9jAsrbfr3vuMuWps86dnP462q+0s1TxBfqi8mzo3gdavjHKWVNwohLahLKT+tWeu6DSzQv0YwMjwtkLgF7QRgx3ctIIkloOrnx9nHH1N6y+hxEB89fOlyVDjHhgL5uVtsD5fEdT0FJ2Gc/2nShEMMqIwr1/J9kUq1mNySff/uEe65Q==
ingotronic.ch. 300 IN RRSIG DNSKEY 5 2 300 20150125003700 20141226001657 17430 ingotronic.ch. mEwZjhQqeWksWD0TCnNBrtce4YkWJL3edqL6PvAUu8Fn+Ih437kEs3+pqdkgRsdYQ9HW+lBm/8pWwJlNAv0bi9NykItXMwAUFtncgq+6Pnh3iAM972GXSa5VV4LcGQ5b8CBdHCHiEKDqyPv5Hr5QfYL/FQaWlcNRh4QZZlZNPFA=
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 940 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 11858
;; flags: qr rd ra ad cd ; qd: 1 an: 4 au: 0 ad: 1
;; QUESTIONS:
;; ., type = DNSKEY, class = IN
;; ANSWERS:
. 87372 IN DNSKEY 256 3 8 AwEAAaPD7Y7XIi1MOEREJNTrRhyqsY3gff6JWzg+XCbqut1sbcbvqyssHw8DT1AkRaAC92pO8xuyq5QEgEPL1IHfABLwpwXI5gTj4gdwi86bpkmlWs9fRpnn4DPDCTdrnxIejJXgClHikLJF3u3CdpNCMijq4CKdQbMlRZ3avv+G7rh7
. 87372 IN DNSKEY 256 3 8 AwEAAe3fSrbLBy3LOS7pnxEUhvPZTE2H5dIGsI/UfruI/nOEvWWa/PSX2BFedBkEqOlYdjdNF2f+6lmfk2Od/xu0v5bVqxFE+/24v3hZSlWBxvXzPTAGHrbW/IJYEPqlzVOAS4XdUgHg0N7IbLywNHMvB+Yf+Nm6ctyXXFLV4WTNnzs7
. 87372 IN DNSKEY 257 3 8 AwEAAagAIKlVZrpC6Ia7gEzahOR+9W29euxhJhVVLOyQbSEW0O8gcCjFFVQUTf6v58fLjwBd0YI0EzrAcQqBGCzh/RStIoO8g0NfnfL2MTJRkxoXbfDaUeVPQuYEhg37NZWAJQ9VnMVDxP/VHL496M/QZxkjf5/Efucp2gaDX6RS6CXpoY68LsvPVjR0ZSwzz1apAzvN9dlzEheX7ICJBBtuA6G3LQpzW5hOA2hzCTMjJPJ8LbqF6dsV6DoBQzgul0sGIcGOYl7OyQdXfZ57relSQageu+ipAdTTJ25AsRTAoub8ONGcLmqrAmRLKBP1dfwhYB4N7knNnulqQxA+Uk1ihz0=
. 87372 IN RRSIG DNSKEY 8 0 172800 20150115235959 20150101000000 19036 . i8cAxD2pvQi1oAyvQxRpDfFlbqPzW+69QQEsDwE1eWOm5AtawO9U7lmsGps7sy/fVNvl1ljKBj4Djp9pb3U2FLogjiIlW0cDAkPmLlG9t+b/pjEfBNlhjANUVN06pvQVAfm+LcF26EaWT6FlISBqb6jSy4BHRa3Bdc4Sx7+pRSYSqVVvYxLkfAWsKPqGkvWhebJDndJJV9syXQXgZ+v/uJ+6XOS43xkAdeL8iBzIs/FlwMTfh3tVe3d0lb65IBBLlCzeQuetX+0Vu1YFcnD0mHc/wS2ZnAV5toAFmyVQBoY/XAZiZeaOkcROJ6Zmqezy7liwK7BqsYyAZntMhk8lbg==
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 883 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 52147
;; flags: qr rd ra ad cd ; qd: 1 an: 2 au: 0 ad: 1
;; QUESTIONS:
;; ch., type = DS, class = IN
;; ANSWERS:
ch. 972 IN DS 46375 8 2 8F96646FC68BB7E4AF4C0750A6096FBC0D4ECDA3D3FA6DA06FDDB42EE50C6CF3
ch. 972 IN RRSIG DS 8 1 86400 20150112170000 20150105160000 16665 . thY7xYWBBxiBjqbQIb9fAG4TmQgnziwM7q6P1T3/ITxmECdvOCQnnZA3uD7qmN8uM0HudsD7+y+zgD3rsH4RSTKdL4kHSI0OnCxToMTvklghEgFDezqIRm8NkWdI2H4Stwrj20nYKSpLQxPI2EE54gs18P3KyO8bAUYv8Qx73xU=
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 238 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 42646
;; flags: qr rd ra ad cd ; qd: 1 an: 4 au: 0 ad: 1
;; QUESTIONS:
;; ch., type = DNSKEY, class = IN
;; ANSWERS:
ch. 973 IN DNSKEY 257 3 8 AwEAAb7GhhZ8IAy/AhwmSms5DeQK5ad09wIIplEpYoiAIYXPtJvT1ReFzyfTp/2YP+g/PWDwHPh4qKAHa9x0VgbIQcGAeNakmfkAdWEmCnca323/SAml3mwfaX62G7/uYWae5zh8QTxZKNd+K1yZ5x0IxnI31chSl5xymRbTEHYZDKwSIRFM3fTxUMt93WFaBVWELReYotJBr++rvAWdnlay5TPBTvheLBkaiqtgM4GP8HK07Y+86lsZnEsj5K3G1KTV5SPpa82rqYAwxG9VKbmSE/6/kBR5jJHjt1rRt5Oe7v18aEtw0YCEN4vxq+KuvMoNVqXUsE9LBwHJD+QNwi6wmB0=
ch. 973 IN DNSKEY 256 3 8 AwEAAcsg0kY6fw1wzYMhSAKTy+Y2JzAst66P/1odp9NECJJHbU8f4nwziI3onoFSBV0ZiSZhY1aH5dhdDZ7BkrqhVXSrZPAz0CvzjIxmB1gSOf9DeZvjQvoy97HqYolxsf+B3QQv2RKBT67elF5+JisKg3/dQISelKn8LhabSoVrMlD1
ch. 973 IN DNSKEY 256 3 8 AwEAAcSLdT0fEmcFmLpeUkAJoeVaHKiu+nbuc43fWlqaCRVf8t2HA4uWxOk0O5ci9nrFTc8nq8oa5fk5Cj7CHh4yrX9qUCfTdIWTyp8BDEdJpS+Dyb0u9wQuVj+nQMj4fLzdQf4TJs3/qxuiLr3nL1UUwlhhXeqSqGVb7p3mtB5HJ8ad
ch. 973 IN RRSIG DNSKEY 8 1 86400 20150127100909 20141212090909 46375 ch. bT8q0FWyeMH0SulNo6UdIIgZYNATwYsee2bikq2Gh339Bufma8eaqWIPYT3XKmxYPBFOw0bVl+kLZxTwbR1CFoCDXoP+qgQhh4mf9qkNiv2CDSc+0FE3FRREn+DAhYTUEuB58FPiPakFB8s8O7T+k2qhDae7jy4/y7Jl1lnjaBY8s7bzOUPhF0KKCNZmvoKwtL23ZdVeTSV1xM3jkiNnpzBKbcoSWECSGJVp1SE0BnRXdwQP41YTXFZ0310YjaTAUCC5qbMIWdEkHjfdSQtKBImnc85mkapq9w++XQ4zhauPWBtrPV3CcoCahjUaWdjrKVkibomlJZaN8MEO23CfQw==
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 893 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 39084
;; flags: qr rd ra cd ; qd: 1 an: 3 au: 0 ad: 1
;; QUESTIONS:
;; ingotronic.ch., type = DS, class = IN
;; ANSWERS:
ingotronic.ch. 3581 IN DS 6031 5 1 733D0218B571CD617B1A7493564B9FC4F12ADE82
ingotronic.ch. 3581 IN DS 6031 5 2 4A948F2FDADA24686E473EDAC00DCF972584C75E3FAA92C2021B6221449FF87E
ingotronic.ch. 3581 IN RRSIG DS 8 2 3600 20150129033614 20150105123019 60789 ch. rVPJP2HhzW7OkroK2axFj5Lb4iVWCH8Fp/Iq1rF952NDo72b8RiKje2RaAKJAGQ+wd0YgE+PAej04GCmkhlDJA/zvPeeTxuhy3HbJzReMlQ7fjyH+wW1hli+FuIYvogXWf7nO/9VyPORt8X/f/pjrOr3Vlj9sGLN8TGYpEuVSw4=
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 288 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 5987
;; flags: qr aa rd ra cd ; qd: 1 an: 4 au: 0 ad: 1
;; QUESTIONS:
;; ingotronic.ch., type = DNSKEY, class = IN
;; ANSWERS:
ingotronic.ch. 300 IN DNSKEY 257 3 5 AwEAAeA1vzmjaB+eBAcvhzpKEgAEFpvQ1rg4uKDW6MsQtacKoqBpgyep2+LuWotz5p/xYxj3NGsArwN8Ad5cY0FHRr8miTT0elOv6nvlqGIfRuhj/BXAQ1x4ihpSFslHw0lJMYFwxsUZWpUyjWX/nv1xRZMMwF46gui0N4OEbyTYusCk77D+A71k+K0EAitFIbIH4GCUKmH1H7HmXhSVH9bN/n7KEGwW32lmsuuUcJoRKDkcUvbMXY/9Xoa2quERrUg/rBbDUHowRPjYDS5GzY1+f4YY8s40BufGiqyUTKKXL953MVFK8gmezXA0hbmrnZ7CBOw/7238mORAdzExaX8n7CE=
ingotronic.ch. 300 IN DNSKEY 256 3 5 AwEAAZ2Xh77GFzpEDx7EHYxShqltHgkiG+BOjBGifEmnJhQSdE5/yNSLFNcdhZZ8HUPxYnaedTqJcFFg4AzUsQklF/fECegTJdZjaj2WoL0/I8K7HMfY/hVuRZUWPNglYi8agJRX6gdkFTCpUNI7stpgKqxtzUJhhw15uG/lKMplwqUr
ingotronic.ch. 300 IN RRSIG DNSKEY 5 2 300 20150125003700 20141226001657 6031 ingotronic.ch. rs1QlP2SlSpA2ELbzwg3DgWLzXWL3Lpv6CUJE2Q0qH2Zp7Qdy3cD+ZEtNh9v24Qv1M6JJ3zFt8mmZoCeW2ycuMbJCqBkW9CBuwF+VznZvZY2MxwPipvhvEEGP//0M8YAZJ66yQPDv3PTdAP8FYbIrJyvY44vwyncwbslpfHT9jAsrbfr3vuMuWps86dnP462q+0s1TxBfqi8mzo3gdavjHKWVNwohLahLKT+tWeu6DSzQv0YwMjwtkLgF7QRgx3ctIIkloOrnx9nHH1N6y+hxEB89fOlyVDjHhgL5uVtsD5fEdT0FJ2Gc/2nShEMMqIwr1/J9kUq1mNySff/uEe65Q==
ingotronic.ch. 300 IN RRSIG DNSKEY 5 2 300 20150125003700 20141226001657 17430 ingotronic.ch. mEwZjhQqeWksWD0TCnNBrtce4YkWJL3edqL6PvAUu8Fn+Ih437kEs3+pqdkgRsdYQ9HW+lBm/8pWwJlNAv0bi9NykItXMwAUFtncgq+6Pnh3iAM972GXSa5VV4LcGQ5b8CBdHCHiEKDqyPv5Hr5QfYL/FQaWlcNRh4QZZlZNPFA=
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 940 bytes
###############################################
testSynthesisUsesCorrectWildcardNodataNsec3 0000664 0000000 0000000 00000046724 13020541473 0040205 0 ustar 00root root 0000000 0000000 dnssecjava-1.1.3/src/test/resources/recordings/org_jitsi_dnssec_TestWildcard #Date: 2015-01-06T22:35:04+01:00
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 22667
;; flags: qr aa rd ra cd ; qd: 1 an: 0 au: 8 ad: 1
;; QUESTIONS:
;; a.wc.nsec3.ingotronic.ch., type = MX, class = IN
;; ANSWERS:
;; AUTHORITY RECORDS:
L40SJG7ANKROIHCT5RA6C8CTKJ91CD3N.nsec3.ingotronic.ch. 300 IN NSEC3 1 0 10 1234 ND3HQPFBN314KVB64L6T40JF75US8HKT
L40SJG7ANKROIHCT5RA6C8CTKJ91CD3N.nsec3.ingotronic.ch. 300 IN RRSIG NSEC3 7 4 300 20150125005926 20141226002759 62417 nsec3.ingotronic.ch. v6NHEWwb2KxRGRPshC2KFoxJs4Mis3OmvncJmn5bIWBnzeTY4x75tsE4zlVPx9rp0rjmOAQsYn4KGtIFPUShDHNHy45qoOtKkvRzRgByx4K2l5Rq9OizQVYsEUUScXEYATilaDU9whifF0vPk7YPwFGRmiY3prCGAvY/jH4hQUM=
O275F9OLQ9HNCER7U4SMD4V8AG7IPML9.nsec3.ingotronic.ch. 300 IN NSEC3 1 0 10 1234 QM439T9VOCEM9QOGUD483A42508V4G4E CNAME RRSIG
O275F9OLQ9HNCER7U4SMD4V8AG7IPML9.nsec3.ingotronic.ch. 300 IN RRSIG NSEC3 7 4 300 20150125000452 20141225235516 62417 nsec3.ingotronic.ch. oNHVOddpZW5FtTmBoQuwUk/8Ufa7OjqtzrJWNNcRufe7gJf/k+cKIGnf/JsZC4FFu+KlTbeOU2RkgfgdvjUv4B+5K9WM4Lc33/4lo4hiH9MiQBIKbneShRwBBCXTlUpSzJvksvl/Ld8VZJ2Dbe2q18A7JQvRNW1o1Gx9vxT1kO8=
ES29HF5NN8D4NUDKH2QBR28NEVBFODG2.nsec3.ingotronic.ch. 300 IN NSEC3 1 0 10 1234 FH50CGGM3TBSI8M477ILPD3VAT8TM76S A RRSIG
ES29HF5NN8D4NUDKH2QBR28NEVBFODG2.nsec3.ingotronic.ch. 300 IN RRSIG NSEC3 7 4 300 20150125005926 20141226002759 62417 nsec3.ingotronic.ch. CMXrIb7iTUoxImX+qODyUAo0rJ4PyOdS6Fa5yLuCc8OgPTafAgXYNb7oF1esZcYJh6Bn05J+1kIbO9YnIeCLU74bUfQURaeQOwyC+/l/B5Hx1VFo+F304llVBsoge2VvT/IQrtFGBAKpZY5iiQO4DH5yI8yfHprskj3ZB0jvcIY=
nsec3.ingotronic.ch. 300 IN SOA ns1.ingotronic.ch. admin.ingotronic.ch. 2013032932 300 60 864000 300
nsec3.ingotronic.ch. 300 IN RRSIG SOA 7 3 300 20150201003516 20150101233516 62417 nsec3.ingotronic.ch. RMXaAZCkydysBpA4+LWD2frs4CZH2FBxafAolq7MOG62Sw3ellwNcSIh2naMasviin2DU2BAzIYyFUqKJDbUqzTxZQjsM6d5LtgFy5iTNmWum6FnFP5Fz73Zs/9Q0LNEstR82MRRL8EDElADhFySAReavyT/vlSTScQGxx6slyQ=
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 1050 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 20815
;; flags: qr rd ra ad cd ; qd: 1 an: 4 au: 0 ad: 1
;; QUESTIONS:
;; ., type = DNSKEY, class = IN
;; ANSWERS:
. 87369 IN DNSKEY 257 3 8 AwEAAagAIKlVZrpC6Ia7gEzahOR+9W29euxhJhVVLOyQbSEW0O8gcCjFFVQUTf6v58fLjwBd0YI0EzrAcQqBGCzh/RStIoO8g0NfnfL2MTJRkxoXbfDaUeVPQuYEhg37NZWAJQ9VnMVDxP/VHL496M/QZxkjf5/Efucp2gaDX6RS6CXpoY68LsvPVjR0ZSwzz1apAzvN9dlzEheX7ICJBBtuA6G3LQpzW5hOA2hzCTMjJPJ8LbqF6dsV6DoBQzgul0sGIcGOYl7OyQdXfZ57relSQageu+ipAdTTJ25AsRTAoub8ONGcLmqrAmRLKBP1dfwhYB4N7knNnulqQxA+Uk1ihz0=
. 87369 IN DNSKEY 256 3 8 AwEAAaPD7Y7XIi1MOEREJNTrRhyqsY3gff6JWzg+XCbqut1sbcbvqyssHw8DT1AkRaAC92pO8xuyq5QEgEPL1IHfABLwpwXI5gTj4gdwi86bpkmlWs9fRpnn4DPDCTdrnxIejJXgClHikLJF3u3CdpNCMijq4CKdQbMlRZ3avv+G7rh7
. 87369 IN DNSKEY 256 3 8 AwEAAe3fSrbLBy3LOS7pnxEUhvPZTE2H5dIGsI/UfruI/nOEvWWa/PSX2BFedBkEqOlYdjdNF2f+6lmfk2Od/xu0v5bVqxFE+/24v3hZSlWBxvXzPTAGHrbW/IJYEPqlzVOAS4XdUgHg0N7IbLywNHMvB+Yf+Nm6ctyXXFLV4WTNnzs7
. 87369 IN RRSIG DNSKEY 8 0 172800 20150115235959 20150101000000 19036 . i8cAxD2pvQi1oAyvQxRpDfFlbqPzW+69QQEsDwE1eWOm5AtawO9U7lmsGps7sy/fVNvl1ljKBj4Djp9pb3U2FLogjiIlW0cDAkPmLlG9t+b/pjEfBNlhjANUVN06pvQVAfm+LcF26EaWT6FlISBqb6jSy4BHRa3Bdc4Sx7+pRSYSqVVvYxLkfAWsKPqGkvWhebJDndJJV9syXQXgZ+v/uJ+6XOS43xkAdeL8iBzIs/FlwMTfh3tVe3d0lb65IBBLlCzeQuetX+0Vu1YFcnD0mHc/wS2ZnAV5toAFmyVQBoY/XAZiZeaOkcROJ6Zmqezy7liwK7BqsYyAZntMhk8lbg==
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 883 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 56020
;; flags: qr rd ra ad cd ; qd: 1 an: 2 au: 0 ad: 1
;; QUESTIONS:
;; ch., type = DS, class = IN
;; ANSWERS:
ch. 969 IN DS 46375 8 2 8F96646FC68BB7E4AF4C0750A6096FBC0D4ECDA3D3FA6DA06FDDB42EE50C6CF3
ch. 969 IN RRSIG DS 8 1 86400 20150112170000 20150105160000 16665 . thY7xYWBBxiBjqbQIb9fAG4TmQgnziwM7q6P1T3/ITxmECdvOCQnnZA3uD7qmN8uM0HudsD7+y+zgD3rsH4RSTKdL4kHSI0OnCxToMTvklghEgFDezqIRm8NkWdI2H4Stwrj20nYKSpLQxPI2EE54gs18P3KyO8bAUYv8Qx73xU=
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 238 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 47777
;; flags: qr rd ra ad cd ; qd: 1 an: 4 au: 0 ad: 1
;; QUESTIONS:
;; ch., type = DNSKEY, class = IN
;; ANSWERS:
ch. 970 IN DNSKEY 256 3 8 AwEAAcsg0kY6fw1wzYMhSAKTy+Y2JzAst66P/1odp9NECJJHbU8f4nwziI3onoFSBV0ZiSZhY1aH5dhdDZ7BkrqhVXSrZPAz0CvzjIxmB1gSOf9DeZvjQvoy97HqYolxsf+B3QQv2RKBT67elF5+JisKg3/dQISelKn8LhabSoVrMlD1
ch. 970 IN DNSKEY 257 3 8 AwEAAb7GhhZ8IAy/AhwmSms5DeQK5ad09wIIplEpYoiAIYXPtJvT1ReFzyfTp/2YP+g/PWDwHPh4qKAHa9x0VgbIQcGAeNakmfkAdWEmCnca323/SAml3mwfaX62G7/uYWae5zh8QTxZKNd+K1yZ5x0IxnI31chSl5xymRbTEHYZDKwSIRFM3fTxUMt93WFaBVWELReYotJBr++rvAWdnlay5TPBTvheLBkaiqtgM4GP8HK07Y+86lsZnEsj5K3G1KTV5SPpa82rqYAwxG9VKbmSE/6/kBR5jJHjt1rRt5Oe7v18aEtw0YCEN4vxq+KuvMoNVqXUsE9LBwHJD+QNwi6wmB0=
ch. 970 IN DNSKEY 256 3 8 AwEAAcSLdT0fEmcFmLpeUkAJoeVaHKiu+nbuc43fWlqaCRVf8t2HA4uWxOk0O5ci9nrFTc8nq8oa5fk5Cj7CHh4yrX9qUCfTdIWTyp8BDEdJpS+Dyb0u9wQuVj+nQMj4fLzdQf4TJs3/qxuiLr3nL1UUwlhhXeqSqGVb7p3mtB5HJ8ad
ch. 970 IN RRSIG DNSKEY 8 1 86400 20150127100909 20141212090909 46375 ch. bT8q0FWyeMH0SulNo6UdIIgZYNATwYsee2bikq2Gh339Bufma8eaqWIPYT3XKmxYPBFOw0bVl+kLZxTwbR1CFoCDXoP+qgQhh4mf9qkNiv2CDSc+0FE3FRREn+DAhYTUEuB58FPiPakFB8s8O7T+k2qhDae7jy4/y7Jl1lnjaBY8s7bzOUPhF0KKCNZmvoKwtL23ZdVeTSV1xM3jkiNnpzBKbcoSWECSGJVp1SE0BnRXdwQP41YTXFZ0310YjaTAUCC5qbMIWdEkHjfdSQtKBImnc85mkapq9w++XQ4zhauPWBtrPV3CcoCahjUaWdjrKVkibomlJZaN8MEO23CfQw==
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 893 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 31925
;; flags: qr rd ra cd ; qd: 1 an: 3 au: 0 ad: 1
;; QUESTIONS:
;; ingotronic.ch., type = DS, class = IN
;; ANSWERS:
ingotronic.ch. 3578 IN DS 6031 5 1 733D0218B571CD617B1A7493564B9FC4F12ADE82
ingotronic.ch. 3578 IN DS 6031 5 2 4A948F2FDADA24686E473EDAC00DCF972584C75E3FAA92C2021B6221449FF87E
ingotronic.ch. 3578 IN RRSIG DS 8 2 3600 20150129033614 20150105123019 60789 ch. rVPJP2HhzW7OkroK2axFj5Lb4iVWCH8Fp/Iq1rF952NDo72b8RiKje2RaAKJAGQ+wd0YgE+PAej04GCmkhlDJA/zvPeeTxuhy3HbJzReMlQ7fjyH+wW1hli+FuIYvogXWf7nO/9VyPORt8X/f/pjrOr3Vlj9sGLN8TGYpEuVSw4=
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 288 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 54791
;; flags: qr aa rd ra cd ; qd: 1 an: 4 au: 0 ad: 1
;; QUESTIONS:
;; ingotronic.ch., type = DNSKEY, class = IN
;; ANSWERS:
ingotronic.ch. 300 IN DNSKEY 257 3 5 AwEAAeA1vzmjaB+eBAcvhzpKEgAEFpvQ1rg4uKDW6MsQtacKoqBpgyep2+LuWotz5p/xYxj3NGsArwN8Ad5cY0FHRr8miTT0elOv6nvlqGIfRuhj/BXAQ1x4ihpSFslHw0lJMYFwxsUZWpUyjWX/nv1xRZMMwF46gui0N4OEbyTYusCk77D+A71k+K0EAitFIbIH4GCUKmH1H7HmXhSVH9bN/n7KEGwW32lmsuuUcJoRKDkcUvbMXY/9Xoa2quERrUg/rBbDUHowRPjYDS5GzY1+f4YY8s40BufGiqyUTKKXL953MVFK8gmezXA0hbmrnZ7CBOw/7238mORAdzExaX8n7CE=
ingotronic.ch. 300 IN DNSKEY 256 3 5 AwEAAZ2Xh77GFzpEDx7EHYxShqltHgkiG+BOjBGifEmnJhQSdE5/yNSLFNcdhZZ8HUPxYnaedTqJcFFg4AzUsQklF/fECegTJdZjaj2WoL0/I8K7HMfY/hVuRZUWPNglYi8agJRX6gdkFTCpUNI7stpgKqxtzUJhhw15uG/lKMplwqUr
ingotronic.ch. 300 IN RRSIG DNSKEY 5 2 300 20150125003700 20141226001657 6031 ingotronic.ch. rs1QlP2SlSpA2ELbzwg3DgWLzXWL3Lpv6CUJE2Q0qH2Zp7Qdy3cD+ZEtNh9v24Qv1M6JJ3zFt8mmZoCeW2ycuMbJCqBkW9CBuwF+VznZvZY2MxwPipvhvEEGP//0M8YAZJ66yQPDv3PTdAP8FYbIrJyvY44vwyncwbslpfHT9jAsrbfr3vuMuWps86dnP462q+0s1TxBfqi8mzo3gdavjHKWVNwohLahLKT+tWeu6DSzQv0YwMjwtkLgF7QRgx3ctIIkloOrnx9nHH1N6y+hxEB89fOlyVDjHhgL5uVtsD5fEdT0FJ2Gc/2nShEMMqIwr1/J9kUq1mNySff/uEe65Q==
ingotronic.ch. 300 IN RRSIG DNSKEY 5 2 300 20150125003700 20141226001657 17430 ingotronic.ch. mEwZjhQqeWksWD0TCnNBrtce4YkWJL3edqL6PvAUu8Fn+Ih437kEs3+pqdkgRsdYQ9HW+lBm/8pWwJlNAv0bi9NykItXMwAUFtncgq+6Pnh3iAM972GXSa5VV4LcGQ5b8CBdHCHiEKDqyPv5Hr5QfYL/FQaWlcNRh4QZZlZNPFA=
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 940 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 54694
;; flags: qr aa rd ra cd ; qd: 1 an: 3 au: 0 ad: 1
;; QUESTIONS:
;; nsec3.ingotronic.ch., type = DS, class = IN
;; ANSWERS:
nsec3.ingotronic.ch. 300 IN DS 16758 7 2 3C8DC02750A1636F829B45D6E6D642866768A9CD40A013AD9D25AB63734FFA13
nsec3.ingotronic.ch. 300 IN DS 16758 7 1 1720FF268E09A2CB63805EC8782D10AAD20E12A5
nsec3.ingotronic.ch. 300 IN RRSIG DS 5 3 300 20150125011134 20141226002644 17430 ingotronic.ch. hNurzlGhlyHbSgezPDuhIrtN9ZMsMXZbKGc7HD5rUuM88wD3fM97NxdzF+2Hi1USvBZ5GsQv63L+lAzf+mFPBoPIFHtTiAv8up7kQKRKmi/EzzkCYd/CC4UYdDZbaUyv7esh7spSOGwjPJNdK831p+MgltoWaYtnSGVMgOKk5mc=
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 305 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 17499
;; flags: qr aa rd ra cd ; qd: 1 an: 4 au: 0 ad: 1
;; QUESTIONS:
;; nsec3.ingotronic.ch., type = DNSKEY, class = IN
;; ANSWERS:
nsec3.ingotronic.ch. 300 IN DNSKEY 257 3 7 AwEAAaBuJTf9oGyeTH3biUkAFLrsYrkodX1H7Snsui4XsDHFCBvs5XYacHbs0Jg0/O51KPjmNnjwMW8SSyDkKqYQ+9uYAf2EQ/pnD/VGQqnV2cw0Vwk/t0E2V4FUCju4pnAoyzZFZXGs1eWbX9JXu++b0Azp+ACq6485qJLzHhWDiIrPoK/SvdbFVRK4s+nPPJLH3NGBbtdz6kPq7aFWYBMoGeAZdN1wsQpcNWUo5eOmaJY53nMc7+rDpAyYlMe/FKwSZdX2ZDd63Qsa6Im4FVUJq/nWLq7tlQ/mWks15uDTQyJy/OWfA0ICCO4N9Fel9rThJNpJWEzOCblvZyBoy405kZk=
nsec3.ingotronic.ch. 300 IN DNSKEY 256 3 7 AwEAAccAWxkTVGZ6UAp0VEozAlYpARhbh6Y6tYOl6Fg3UeBNFFtDQ9fTEEt1NkbnR9u8KkpVN6a67avlYiUN1egDqEwzDU7R1Rw+/USdhm2hqOARmmu3DBgjjX/iXjZLyv310cOGFJZ/smcodlDL4pDAAoPxh/qs6KEBaT0sc1KWcGq3
nsec3.ingotronic.ch. 300 IN RRSIG DNSKEY 7 3 300 20150125001457 20141226000444 16758 nsec3.ingotronic.ch. mXi1ylDi8XkRPup+YlT8GPdYE+P7gb6+/VdAwtodI916IzrkGkOHOTLbnrbAqqJOh0HxVCYXdxovmEcbJKUFKwplrQg3XD7/9Sq4pKU1MhMFEGrm/QPkM4u0mgjQwyToDLGuPHuFyur3FSjO/n54uGhAEft9JOFk/WKtWdCnm2LLyQrpC6herA3efFaI8kZhdoEY02AwihWVJxHasmz7lOoKRgNrkfELU+fN4+V7ISsRfJMyZc6q5PuNeG6vFD0uNE8tpdLJCSMurKYVpelvYqzFIcRTYcIjXwmS+L3DGjupqWMzFZVmpQM62JG3KCCD0ffpnNb0nWoSoHwpSeh/3Q==
nsec3.ingotronic.ch. 300 IN RRSIG DNSKEY 7 3 300 20150125001457 20141226000444 62417 nsec3.ingotronic.ch. PyCrf8T5dAfJzapb1p+kcTALPjDuD2niSaXXo0KeHAunT+6gJicLML2S/ZpiYr7X7Ma4Z0TYqE02qH6pcLYNnSgv9BE8sZO0nRtPekSyTy5nLi4hFADYhjb3UjaB85qmQZcqm64vC/CJhWO4t6Eixg/5MYALw+Qdy5Fo0qy/U5E=
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 958 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 6987
;; flags: qr rd ra ad cd ; qd: 1 an: 4 au: 0 ad: 1
;; QUESTIONS:
;; ., type = DNSKEY, class = IN
;; ANSWERS:
. 87369 IN DNSKEY 256 3 8 AwEAAaPD7Y7XIi1MOEREJNTrRhyqsY3gff6JWzg+XCbqut1sbcbvqyssHw8DT1AkRaAC92pO8xuyq5QEgEPL1IHfABLwpwXI5gTj4gdwi86bpkmlWs9fRpnn4DPDCTdrnxIejJXgClHikLJF3u3CdpNCMijq4CKdQbMlRZ3avv+G7rh7
. 87369 IN DNSKEY 257 3 8 AwEAAagAIKlVZrpC6Ia7gEzahOR+9W29euxhJhVVLOyQbSEW0O8gcCjFFVQUTf6v58fLjwBd0YI0EzrAcQqBGCzh/RStIoO8g0NfnfL2MTJRkxoXbfDaUeVPQuYEhg37NZWAJQ9VnMVDxP/VHL496M/QZxkjf5/Efucp2gaDX6RS6CXpoY68LsvPVjR0ZSwzz1apAzvN9dlzEheX7ICJBBtuA6G3LQpzW5hOA2hzCTMjJPJ8LbqF6dsV6DoBQzgul0sGIcGOYl7OyQdXfZ57relSQageu+ipAdTTJ25AsRTAoub8ONGcLmqrAmRLKBP1dfwhYB4N7knNnulqQxA+Uk1ihz0=
. 87369 IN DNSKEY 256 3 8 AwEAAe3fSrbLBy3LOS7pnxEUhvPZTE2H5dIGsI/UfruI/nOEvWWa/PSX2BFedBkEqOlYdjdNF2f+6lmfk2Od/xu0v5bVqxFE+/24v3hZSlWBxvXzPTAGHrbW/IJYEPqlzVOAS4XdUgHg0N7IbLywNHMvB+Yf+Nm6ctyXXFLV4WTNnzs7
. 87369 IN RRSIG DNSKEY 8 0 172800 20150115235959 20150101000000 19036 . i8cAxD2pvQi1oAyvQxRpDfFlbqPzW+69QQEsDwE1eWOm5AtawO9U7lmsGps7sy/fVNvl1ljKBj4Djp9pb3U2FLogjiIlW0cDAkPmLlG9t+b/pjEfBNlhjANUVN06pvQVAfm+LcF26EaWT6FlISBqb6jSy4BHRa3Bdc4Sx7+pRSYSqVVvYxLkfAWsKPqGkvWhebJDndJJV9syXQXgZ+v/uJ+6XOS43xkAdeL8iBzIs/FlwMTfh3tVe3d0lb65IBBLlCzeQuetX+0Vu1YFcnD0mHc/wS2ZnAV5toAFmyVQBoY/XAZiZeaOkcROJ6Zmqezy7liwK7BqsYyAZntMhk8lbg==
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 883 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 4743
;; flags: qr rd ra ad cd ; qd: 1 an: 2 au: 0 ad: 1
;; QUESTIONS:
;; ch., type = DS, class = IN
;; ANSWERS:
ch. 969 IN DS 46375 8 2 8F96646FC68BB7E4AF4C0750A6096FBC0D4ECDA3D3FA6DA06FDDB42EE50C6CF3
ch. 969 IN RRSIG DS 8 1 86400 20150112170000 20150105160000 16665 . thY7xYWBBxiBjqbQIb9fAG4TmQgnziwM7q6P1T3/ITxmECdvOCQnnZA3uD7qmN8uM0HudsD7+y+zgD3rsH4RSTKdL4kHSI0OnCxToMTvklghEgFDezqIRm8NkWdI2H4Stwrj20nYKSpLQxPI2EE54gs18P3KyO8bAUYv8Qx73xU=
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 238 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 63386
;; flags: qr rd ra ad cd ; qd: 1 an: 4 au: 0 ad: 1
;; QUESTIONS:
;; ch., type = DNSKEY, class = IN
;; ANSWERS:
ch. 970 IN DNSKEY 256 3 8 AwEAAcsg0kY6fw1wzYMhSAKTy+Y2JzAst66P/1odp9NECJJHbU8f4nwziI3onoFSBV0ZiSZhY1aH5dhdDZ7BkrqhVXSrZPAz0CvzjIxmB1gSOf9DeZvjQvoy97HqYolxsf+B3QQv2RKBT67elF5+JisKg3/dQISelKn8LhabSoVrMlD1
ch. 970 IN DNSKEY 257 3 8 AwEAAb7GhhZ8IAy/AhwmSms5DeQK5ad09wIIplEpYoiAIYXPtJvT1ReFzyfTp/2YP+g/PWDwHPh4qKAHa9x0VgbIQcGAeNakmfkAdWEmCnca323/SAml3mwfaX62G7/uYWae5zh8QTxZKNd+K1yZ5x0IxnI31chSl5xymRbTEHYZDKwSIRFM3fTxUMt93WFaBVWELReYotJBr++rvAWdnlay5TPBTvheLBkaiqtgM4GP8HK07Y+86lsZnEsj5K3G1KTV5SPpa82rqYAwxG9VKbmSE/6/kBR5jJHjt1rRt5Oe7v18aEtw0YCEN4vxq+KuvMoNVqXUsE9LBwHJD+QNwi6wmB0=
ch. 970 IN DNSKEY 256 3 8 AwEAAcSLdT0fEmcFmLpeUkAJoeVaHKiu+nbuc43fWlqaCRVf8t2HA4uWxOk0O5ci9nrFTc8nq8oa5fk5Cj7CHh4yrX9qUCfTdIWTyp8BDEdJpS+Dyb0u9wQuVj+nQMj4fLzdQf4TJs3/qxuiLr3nL1UUwlhhXeqSqGVb7p3mtB5HJ8ad
ch. 970 IN RRSIG DNSKEY 8 1 86400 20150127100909 20141212090909 46375 ch. bT8q0FWyeMH0SulNo6UdIIgZYNATwYsee2bikq2Gh339Bufma8eaqWIPYT3XKmxYPBFOw0bVl+kLZxTwbR1CFoCDXoP+qgQhh4mf9qkNiv2CDSc+0FE3FRREn+DAhYTUEuB58FPiPakFB8s8O7T+k2qhDae7jy4/y7Jl1lnjaBY8s7bzOUPhF0KKCNZmvoKwtL23ZdVeTSV1xM3jkiNnpzBKbcoSWECSGJVp1SE0BnRXdwQP41YTXFZ0310YjaTAUCC5qbMIWdEkHjfdSQtKBImnc85mkapq9w++XQ4zhauPWBtrPV3CcoCahjUaWdjrKVkibomlJZaN8MEO23CfQw==
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 893 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 59366
;; flags: qr rd ra cd ; qd: 1 an: 3 au: 0 ad: 1
;; QUESTIONS:
;; ingotronic.ch., type = DS, class = IN
;; ANSWERS:
ingotronic.ch. 3578 IN DS 6031 5 1 733D0218B571CD617B1A7493564B9FC4F12ADE82
ingotronic.ch. 3578 IN DS 6031 5 2 4A948F2FDADA24686E473EDAC00DCF972584C75E3FAA92C2021B6221449FF87E
ingotronic.ch. 3578 IN RRSIG DS 8 2 3600 20150129033614 20150105123019 60789 ch. rVPJP2HhzW7OkroK2axFj5Lb4iVWCH8Fp/Iq1rF952NDo72b8RiKje2RaAKJAGQ+wd0YgE+PAej04GCmkhlDJA/zvPeeTxuhy3HbJzReMlQ7fjyH+wW1hli+FuIYvogXWf7nO/9VyPORt8X/f/pjrOr3Vlj9sGLN8TGYpEuVSw4=
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 288 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 62132
;; flags: qr aa rd ra cd ; qd: 1 an: 4 au: 0 ad: 1
;; QUESTIONS:
;; ingotronic.ch., type = DNSKEY, class = IN
;; ANSWERS:
ingotronic.ch. 300 IN DNSKEY 256 3 5 AwEAAZ2Xh77GFzpEDx7EHYxShqltHgkiG+BOjBGifEmnJhQSdE5/yNSLFNcdhZZ8HUPxYnaedTqJcFFg4AzUsQklF/fECegTJdZjaj2WoL0/I8K7HMfY/hVuRZUWPNglYi8agJRX6gdkFTCpUNI7stpgKqxtzUJhhw15uG/lKMplwqUr
ingotronic.ch. 300 IN DNSKEY 257 3 5 AwEAAeA1vzmjaB+eBAcvhzpKEgAEFpvQ1rg4uKDW6MsQtacKoqBpgyep2+LuWotz5p/xYxj3NGsArwN8Ad5cY0FHRr8miTT0elOv6nvlqGIfRuhj/BXAQ1x4ihpSFslHw0lJMYFwxsUZWpUyjWX/nv1xRZMMwF46gui0N4OEbyTYusCk77D+A71k+K0EAitFIbIH4GCUKmH1H7HmXhSVH9bN/n7KEGwW32lmsuuUcJoRKDkcUvbMXY/9Xoa2quERrUg/rBbDUHowRPjYDS5GzY1+f4YY8s40BufGiqyUTKKXL953MVFK8gmezXA0hbmrnZ7CBOw/7238mORAdzExaX8n7CE=
ingotronic.ch. 300 IN RRSIG DNSKEY 5 2 300 20150125003700 20141226001657 6031 ingotronic.ch. rs1QlP2SlSpA2ELbzwg3DgWLzXWL3Lpv6CUJE2Q0qH2Zp7Qdy3cD+ZEtNh9v24Qv1M6JJ3zFt8mmZoCeW2ycuMbJCqBkW9CBuwF+VznZvZY2MxwPipvhvEEGP//0M8YAZJ66yQPDv3PTdAP8FYbIrJyvY44vwyncwbslpfHT9jAsrbfr3vuMuWps86dnP462q+0s1TxBfqi8mzo3gdavjHKWVNwohLahLKT+tWeu6DSzQv0YwMjwtkLgF7QRgx3ctIIkloOrnx9nHH1N6y+hxEB89fOlyVDjHhgL5uVtsD5fEdT0FJ2Gc/2nShEMMqIwr1/J9kUq1mNySff/uEe65Q==
ingotronic.ch. 300 IN RRSIG DNSKEY 5 2 300 20150125003700 20141226001657 17430 ingotronic.ch. mEwZjhQqeWksWD0TCnNBrtce4YkWJL3edqL6PvAUu8Fn+Ih437kEs3+pqdkgRsdYQ9HW+lBm/8pWwJlNAv0bi9NykItXMwAUFtncgq+6Pnh3iAM972GXSa5VV4LcGQ5b8CBdHCHiEKDqyPv5Hr5QfYL/FQaWlcNRh4QZZlZNPFA=
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 940 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 64272
;; flags: qr aa rd ra cd ; qd: 1 an: 3 au: 0 ad: 1
;; QUESTIONS:
;; nsec3.ingotronic.ch., type = DS, class = IN
;; ANSWERS:
nsec3.ingotronic.ch. 300 IN DS 16758 7 2 3C8DC02750A1636F829B45D6E6D642866768A9CD40A013AD9D25AB63734FFA13
nsec3.ingotronic.ch. 300 IN DS 16758 7 1 1720FF268E09A2CB63805EC8782D10AAD20E12A5
nsec3.ingotronic.ch. 300 IN RRSIG DS 5 3 300 20150125011134 20141226002644 17430 ingotronic.ch. hNurzlGhlyHbSgezPDuhIrtN9ZMsMXZbKGc7HD5rUuM88wD3fM97NxdzF+2Hi1USvBZ5GsQv63L+lAzf+mFPBoPIFHtTiAv8up7kQKRKmi/EzzkCYd/CC4UYdDZbaUyv7esh7spSOGwjPJNdK831p+MgltoWaYtnSGVMgOKk5mc=
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 305 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 52804
;; flags: qr aa rd ra cd ; qd: 1 an: 4 au: 0 ad: 1
;; QUESTIONS:
;; nsec3.ingotronic.ch., type = DNSKEY, class = IN
;; ANSWERS:
nsec3.ingotronic.ch. 300 IN DNSKEY 256 3 7 AwEAAccAWxkTVGZ6UAp0VEozAlYpARhbh6Y6tYOl6Fg3UeBNFFtDQ9fTEEt1NkbnR9u8KkpVN6a67avlYiUN1egDqEwzDU7R1Rw+/USdhm2hqOARmmu3DBgjjX/iXjZLyv310cOGFJZ/smcodlDL4pDAAoPxh/qs6KEBaT0sc1KWcGq3
nsec3.ingotronic.ch. 300 IN DNSKEY 257 3 7 AwEAAaBuJTf9oGyeTH3biUkAFLrsYrkodX1H7Snsui4XsDHFCBvs5XYacHbs0Jg0/O51KPjmNnjwMW8SSyDkKqYQ+9uYAf2EQ/pnD/VGQqnV2cw0Vwk/t0E2V4FUCju4pnAoyzZFZXGs1eWbX9JXu++b0Azp+ACq6485qJLzHhWDiIrPoK/SvdbFVRK4s+nPPJLH3NGBbtdz6kPq7aFWYBMoGeAZdN1wsQpcNWUo5eOmaJY53nMc7+rDpAyYlMe/FKwSZdX2ZDd63Qsa6Im4FVUJq/nWLq7tlQ/mWks15uDTQyJy/OWfA0ICCO4N9Fel9rThJNpJWEzOCblvZyBoy405kZk=
nsec3.ingotronic.ch. 300 IN RRSIG DNSKEY 7 3 300 20150125001457 20141226000444 16758 nsec3.ingotronic.ch. mXi1ylDi8XkRPup+YlT8GPdYE+P7gb6+/VdAwtodI916IzrkGkOHOTLbnrbAqqJOh0HxVCYXdxovmEcbJKUFKwplrQg3XD7/9Sq4pKU1MhMFEGrm/QPkM4u0mgjQwyToDLGuPHuFyur3FSjO/n54uGhAEft9JOFk/WKtWdCnm2LLyQrpC6herA3efFaI8kZhdoEY02AwihWVJxHasmz7lOoKRgNrkfELU+fN4+V7ISsRfJMyZc6q5PuNeG6vFD0uNE8tpdLJCSMurKYVpelvYqzFIcRTYcIjXwmS+L3DGjupqWMzFZVmpQM62JG3KCCD0ffpnNb0nWoSoHwpSeh/3Q==
nsec3.ingotronic.ch. 300 IN RRSIG DNSKEY 7 3 300 20150125001457 20141226000444 62417 nsec3.ingotronic.ch. PyCrf8T5dAfJzapb1p+kcTALPjDuD2niSaXXo0KeHAunT+6gJicLML2S/ZpiYr7X7Ma4Z0TYqE02qH6pcLYNnSgv9BE8sZO0nRtPekSyTy5nLi4hFADYhjb3UjaB85qmQZcqm64vC/CJhWO4t6Eixg/5MYALw+Qdy5Fo0qy/U5E=
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 958 bytes
###############################################
dnssecjava-1.1.3/src/test/resources/recordings/org_jitsi_dnssec_validator_TestNsec3ValUtils/ 0000775 0000000 0000000 00000000000 13020541473 0032527 5 ustar 00root root 0000000 0000000 testInvalidIterationCountMarksInsecure 0000664 0000000 0000000 00000024756 13020541473 0042263 0 ustar 00root root 0000000 0000000 dnssecjava-1.1.3/src/test/resources/recordings/org_jitsi_dnssec_validator_TestNsec3ValUtils #Date: 2015-01-06T22:35:30+01:00
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 55905
;; flags: qr aa rd ra cd ; qd: 1 an: 2 au: 4 ad: 3
;; QUESTIONS:
;; www.wc.nsec3.ingotronic.ch., type = A, class = IN
;; ANSWERS:
www.wc.nsec3.ingotronic.ch. 300 IN A 127.0.0.2
www.wc.nsec3.ingotronic.ch. 300 IN RRSIG A 7 4 300 20150125011553 20141226004758 62417 nsec3.ingotronic.ch. dIDse8tpnBhl5X20CZ5c8rO8cuj9dKMeA/qiyQYEqEFp1QnnVawapqDh1pCrJhBxcKnT7THqKSP6XpDIQA70jcHSecAVRqBZBA2coWZTSOi3dnsARJfIueh8kpsmtYsn6ejuG+7sroQKH9Niu4xoi433ez7Anr9itet9kAP9dmA=
;; AUTHORITY RECORDS:
nsec3.ingotronic.ch. 300 IN NS ns1.ingotronic.ch.
nsec3.ingotronic.ch. 300 IN RRSIG NS 7 3 300 20150125010458 20141226002309 62417 nsec3.ingotronic.ch. fl2Q0YQQ1TduolGLyQx8vGqSApoBbb6A+go5SLFBYQobrPfO/rb+SM8JvnlzNX/Xa7dRhDYrnfBTFUm1mCur9aIi34gu5UwDNQvt/GXY5dC3+DEy/28bTZ43UuCs+qGH9u9leFwGX4neFNl0s5B4RpxBN4is8dXMUvOda6QcsOw=
2HKTRIEPNUPMRM91OD7L5M677RDC4DFD.nsec3.ingotronic.ch. 300 IN NSEC3 1 0 10 1234 4FQSC7ORQNKH924CH6L2DOAISKM28080 CNAME RRSIG
2HKTRIEPNUPMRM91OD7L5M677RDC4DFD.nsec3.ingotronic.ch. 300 IN RRSIG NSEC3 7 4 300 20150125011553 20141226004758 62417 nsec3.ingotronic.ch. BXhW2wGFkkGdsdGKqFMr9QqwGrtCA56D8CH/CKjOn51Udirm6asczVWIVStM0no1VIZNAa3oF6F/RzcDVKtkJTw4KHrSX5LHiWW19pyB1fql2krTQ3Zfr0mZsUb/JMf2/yPqXQu9QYN8XrlicZ60LwFWFRNO2gscMqgHnNtdidk=
;; ADDITIONAL RECORDS:
ns1.ingotronic.ch. 300 IN A 62.192.5.131
ns1.ingotronic.ch. 300 IN RRSIG A 5 3 300 20150125005754 20141226001054 17430 ingotronic.ch. fNG1RZM53pXwBxruHNaSZszxVzNLoCq8VZsTjAzYH2vSLzHXYVGJFTLIeY0K9APAdyJU8WuwmABmn7XY0Kg39kRG77uoFlqUws2PdTz2QKOwJGZY7W88Ak2Y9lkDBcK8o3wJHVptrT8R7p/1U7UfjF0kqPUkakk2B0EbFWdagFg=
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 896 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 7035
;; flags: qr rd ra ad cd ; qd: 1 an: 4 au: 0 ad: 1
;; QUESTIONS:
;; ., type = DNSKEY, class = IN
;; ANSWERS:
. 87343 IN DNSKEY 257 3 8 AwEAAagAIKlVZrpC6Ia7gEzahOR+9W29euxhJhVVLOyQbSEW0O8gcCjFFVQUTf6v58fLjwBd0YI0EzrAcQqBGCzh/RStIoO8g0NfnfL2MTJRkxoXbfDaUeVPQuYEhg37NZWAJQ9VnMVDxP/VHL496M/QZxkjf5/Efucp2gaDX6RS6CXpoY68LsvPVjR0ZSwzz1apAzvN9dlzEheX7ICJBBtuA6G3LQpzW5hOA2hzCTMjJPJ8LbqF6dsV6DoBQzgul0sGIcGOYl7OyQdXfZ57relSQageu+ipAdTTJ25AsRTAoub8ONGcLmqrAmRLKBP1dfwhYB4N7knNnulqQxA+Uk1ihz0=
. 87343 IN DNSKEY 256 3 8 AwEAAaPD7Y7XIi1MOEREJNTrRhyqsY3gff6JWzg+XCbqut1sbcbvqyssHw8DT1AkRaAC92pO8xuyq5QEgEPL1IHfABLwpwXI5gTj4gdwi86bpkmlWs9fRpnn4DPDCTdrnxIejJXgClHikLJF3u3CdpNCMijq4CKdQbMlRZ3avv+G7rh7
. 87343 IN DNSKEY 256 3 8 AwEAAe3fSrbLBy3LOS7pnxEUhvPZTE2H5dIGsI/UfruI/nOEvWWa/PSX2BFedBkEqOlYdjdNF2f+6lmfk2Od/xu0v5bVqxFE+/24v3hZSlWBxvXzPTAGHrbW/IJYEPqlzVOAS4XdUgHg0N7IbLywNHMvB+Yf+Nm6ctyXXFLV4WTNnzs7
. 87343 IN RRSIG DNSKEY 8 0 172800 20150115235959 20150101000000 19036 . i8cAxD2pvQi1oAyvQxRpDfFlbqPzW+69QQEsDwE1eWOm5AtawO9U7lmsGps7sy/fVNvl1ljKBj4Djp9pb3U2FLogjiIlW0cDAkPmLlG9t+b/pjEfBNlhjANUVN06pvQVAfm+LcF26EaWT6FlISBqb6jSy4BHRa3Bdc4Sx7+pRSYSqVVvYxLkfAWsKPqGkvWhebJDndJJV9syXQXgZ+v/uJ+6XOS43xkAdeL8iBzIs/FlwMTfh3tVe3d0lb65IBBLlCzeQuetX+0Vu1YFcnD0mHc/wS2ZnAV5toAFmyVQBoY/XAZiZeaOkcROJ6Zmqezy7liwK7BqsYyAZntMhk8lbg==
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 883 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 44863
;; flags: qr rd ra ad cd ; qd: 1 an: 2 au: 0 ad: 1
;; QUESTIONS:
;; ch., type = DS, class = IN
;; ANSWERS:
ch. 943 IN DS 46375 8 2 8F96646FC68BB7E4AF4C0750A6096FBC0D4ECDA3D3FA6DA06FDDB42EE50C6CF3
ch. 943 IN RRSIG DS 8 1 86400 20150112170000 20150105160000 16665 . thY7xYWBBxiBjqbQIb9fAG4TmQgnziwM7q6P1T3/ITxmECdvOCQnnZA3uD7qmN8uM0HudsD7+y+zgD3rsH4RSTKdL4kHSI0OnCxToMTvklghEgFDezqIRm8NkWdI2H4Stwrj20nYKSpLQxPI2EE54gs18P3KyO8bAUYv8Qx73xU=
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 238 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 13081
;; flags: qr rd ra ad cd ; qd: 1 an: 4 au: 0 ad: 1
;; QUESTIONS:
;; ch., type = DNSKEY, class = IN
;; ANSWERS:
ch. 944 IN DNSKEY 256 3 8 AwEAAcSLdT0fEmcFmLpeUkAJoeVaHKiu+nbuc43fWlqaCRVf8t2HA4uWxOk0O5ci9nrFTc8nq8oa5fk5Cj7CHh4yrX9qUCfTdIWTyp8BDEdJpS+Dyb0u9wQuVj+nQMj4fLzdQf4TJs3/qxuiLr3nL1UUwlhhXeqSqGVb7p3mtB5HJ8ad
ch. 944 IN DNSKEY 257 3 8 AwEAAb7GhhZ8IAy/AhwmSms5DeQK5ad09wIIplEpYoiAIYXPtJvT1ReFzyfTp/2YP+g/PWDwHPh4qKAHa9x0VgbIQcGAeNakmfkAdWEmCnca323/SAml3mwfaX62G7/uYWae5zh8QTxZKNd+K1yZ5x0IxnI31chSl5xymRbTEHYZDKwSIRFM3fTxUMt93WFaBVWELReYotJBr++rvAWdnlay5TPBTvheLBkaiqtgM4GP8HK07Y+86lsZnEsj5K3G1KTV5SPpa82rqYAwxG9VKbmSE/6/kBR5jJHjt1rRt5Oe7v18aEtw0YCEN4vxq+KuvMoNVqXUsE9LBwHJD+QNwi6wmB0=
ch. 944 IN DNSKEY 256 3 8 AwEAAcsg0kY6fw1wzYMhSAKTy+Y2JzAst66P/1odp9NECJJHbU8f4nwziI3onoFSBV0ZiSZhY1aH5dhdDZ7BkrqhVXSrZPAz0CvzjIxmB1gSOf9DeZvjQvoy97HqYolxsf+B3QQv2RKBT67elF5+JisKg3/dQISelKn8LhabSoVrMlD1
ch. 944 IN RRSIG DNSKEY 8 1 86400 20150127100909 20141212090909 46375 ch. bT8q0FWyeMH0SulNo6UdIIgZYNATwYsee2bikq2Gh339Bufma8eaqWIPYT3XKmxYPBFOw0bVl+kLZxTwbR1CFoCDXoP+qgQhh4mf9qkNiv2CDSc+0FE3FRREn+DAhYTUEuB58FPiPakFB8s8O7T+k2qhDae7jy4/y7Jl1lnjaBY8s7bzOUPhF0KKCNZmvoKwtL23ZdVeTSV1xM3jkiNnpzBKbcoSWECSGJVp1SE0BnRXdwQP41YTXFZ0310YjaTAUCC5qbMIWdEkHjfdSQtKBImnc85mkapq9w++XQ4zhauPWBtrPV3CcoCahjUaWdjrKVkibomlJZaN8MEO23CfQw==
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 893 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 12443
;; flags: qr rd ra cd ; qd: 1 an: 3 au: 0 ad: 1
;; QUESTIONS:
;; ingotronic.ch., type = DS, class = IN
;; ANSWERS:
ingotronic.ch. 3552 IN DS 6031 5 2 4A948F2FDADA24686E473EDAC00DCF972584C75E3FAA92C2021B6221449FF87E
ingotronic.ch. 3552 IN DS 6031 5 1 733D0218B571CD617B1A7493564B9FC4F12ADE82
ingotronic.ch. 3552 IN RRSIG DS 8 2 3600 20150129033614 20150105123019 60789 ch. rVPJP2HhzW7OkroK2axFj5Lb4iVWCH8Fp/Iq1rF952NDo72b8RiKje2RaAKJAGQ+wd0YgE+PAej04GCmkhlDJA/zvPeeTxuhy3HbJzReMlQ7fjyH+wW1hli+FuIYvogXWf7nO/9VyPORt8X/f/pjrOr3Vlj9sGLN8TGYpEuVSw4=
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 288 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 6113
;; flags: qr aa rd ra cd ; qd: 1 an: 4 au: 0 ad: 1
;; QUESTIONS:
;; ingotronic.ch., type = DNSKEY, class = IN
;; ANSWERS:
ingotronic.ch. 300 IN DNSKEY 257 3 5 AwEAAeA1vzmjaB+eBAcvhzpKEgAEFpvQ1rg4uKDW6MsQtacKoqBpgyep2+LuWotz5p/xYxj3NGsArwN8Ad5cY0FHRr8miTT0elOv6nvlqGIfRuhj/BXAQ1x4ihpSFslHw0lJMYFwxsUZWpUyjWX/nv1xRZMMwF46gui0N4OEbyTYusCk77D+A71k+K0EAitFIbIH4GCUKmH1H7HmXhSVH9bN/n7KEGwW32lmsuuUcJoRKDkcUvbMXY/9Xoa2quERrUg/rBbDUHowRPjYDS5GzY1+f4YY8s40BufGiqyUTKKXL953MVFK8gmezXA0hbmrnZ7CBOw/7238mORAdzExaX8n7CE=
ingotronic.ch. 300 IN DNSKEY 256 3 5 AwEAAZ2Xh77GFzpEDx7EHYxShqltHgkiG+BOjBGifEmnJhQSdE5/yNSLFNcdhZZ8HUPxYnaedTqJcFFg4AzUsQklF/fECegTJdZjaj2WoL0/I8K7HMfY/hVuRZUWPNglYi8agJRX6gdkFTCpUNI7stpgKqxtzUJhhw15uG/lKMplwqUr
ingotronic.ch. 300 IN RRSIG DNSKEY 5 2 300 20150125003700 20141226001657 6031 ingotronic.ch. rs1QlP2SlSpA2ELbzwg3DgWLzXWL3Lpv6CUJE2Q0qH2Zp7Qdy3cD+ZEtNh9v24Qv1M6JJ3zFt8mmZoCeW2ycuMbJCqBkW9CBuwF+VznZvZY2MxwPipvhvEEGP//0M8YAZJ66yQPDv3PTdAP8FYbIrJyvY44vwyncwbslpfHT9jAsrbfr3vuMuWps86dnP462q+0s1TxBfqi8mzo3gdavjHKWVNwohLahLKT+tWeu6DSzQv0YwMjwtkLgF7QRgx3ctIIkloOrnx9nHH1N6y+hxEB89fOlyVDjHhgL5uVtsD5fEdT0FJ2Gc/2nShEMMqIwr1/J9kUq1mNySff/uEe65Q==
ingotronic.ch. 300 IN RRSIG DNSKEY 5 2 300 20150125003700 20141226001657 17430 ingotronic.ch. mEwZjhQqeWksWD0TCnNBrtce4YkWJL3edqL6PvAUu8Fn+Ih437kEs3+pqdkgRsdYQ9HW+lBm/8pWwJlNAv0bi9NykItXMwAUFtncgq+6Pnh3iAM972GXSa5VV4LcGQ5b8CBdHCHiEKDqyPv5Hr5QfYL/FQaWlcNRh4QZZlZNPFA=
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 940 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 41147
;; flags: qr aa rd ra cd ; qd: 1 an: 3 au: 0 ad: 1
;; QUESTIONS:
;; nsec3.ingotronic.ch., type = DS, class = IN
;; ANSWERS:
nsec3.ingotronic.ch. 300 IN DS 16758 7 2 3C8DC02750A1636F829B45D6E6D642866768A9CD40A013AD9D25AB63734FFA13
nsec3.ingotronic.ch. 300 IN DS 16758 7 1 1720FF268E09A2CB63805EC8782D10AAD20E12A5
nsec3.ingotronic.ch. 300 IN RRSIG DS 5 3 300 20150125011134 20141226002644 17430 ingotronic.ch. hNurzlGhlyHbSgezPDuhIrtN9ZMsMXZbKGc7HD5rUuM88wD3fM97NxdzF+2Hi1USvBZ5GsQv63L+lAzf+mFPBoPIFHtTiAv8up7kQKRKmi/EzzkCYd/CC4UYdDZbaUyv7esh7spSOGwjPJNdK831p+MgltoWaYtnSGVMgOKk5mc=
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 305 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 28760
;; flags: qr aa rd ra cd ; qd: 1 an: 4 au: 0 ad: 1
;; QUESTIONS:
;; nsec3.ingotronic.ch., type = DNSKEY, class = IN
;; ANSWERS:
nsec3.ingotronic.ch. 300 IN DNSKEY 256 3 7 AwEAAccAWxkTVGZ6UAp0VEozAlYpARhbh6Y6tYOl6Fg3UeBNFFtDQ9fTEEt1NkbnR9u8KkpVN6a67avlYiUN1egDqEwzDU7R1Rw+/USdhm2hqOARmmu3DBgjjX/iXjZLyv310cOGFJZ/smcodlDL4pDAAoPxh/qs6KEBaT0sc1KWcGq3
nsec3.ingotronic.ch. 300 IN DNSKEY 257 3 7 AwEAAaBuJTf9oGyeTH3biUkAFLrsYrkodX1H7Snsui4XsDHFCBvs5XYacHbs0Jg0/O51KPjmNnjwMW8SSyDkKqYQ+9uYAf2EQ/pnD/VGQqnV2cw0Vwk/t0E2V4FUCju4pnAoyzZFZXGs1eWbX9JXu++b0Azp+ACq6485qJLzHhWDiIrPoK/SvdbFVRK4s+nPPJLH3NGBbtdz6kPq7aFWYBMoGeAZdN1wsQpcNWUo5eOmaJY53nMc7+rDpAyYlMe/FKwSZdX2ZDd63Qsa6Im4FVUJq/nWLq7tlQ/mWks15uDTQyJy/OWfA0ICCO4N9Fel9rThJNpJWEzOCblvZyBoy405kZk=
nsec3.ingotronic.ch. 300 IN RRSIG DNSKEY 7 3 300 20150125001457 20141226000444 16758 nsec3.ingotronic.ch. mXi1ylDi8XkRPup+YlT8GPdYE+P7gb6+/VdAwtodI916IzrkGkOHOTLbnrbAqqJOh0HxVCYXdxovmEcbJKUFKwplrQg3XD7/9Sq4pKU1MhMFEGrm/QPkM4u0mgjQwyToDLGuPHuFyur3FSjO/n54uGhAEft9JOFk/WKtWdCnm2LLyQrpC6herA3efFaI8kZhdoEY02AwihWVJxHasmz7lOoKRgNrkfELU+fN4+V7ISsRfJMyZc6q5PuNeG6vFD0uNE8tpdLJCSMurKYVpelvYqzFIcRTYcIjXwmS+L3DGjupqWMzFZVmpQM62JG3KCCD0ffpnNb0nWoSoHwpSeh/3Q==
nsec3.ingotronic.ch. 300 IN RRSIG DNSKEY 7 3 300 20150125001457 20141226000444 62417 nsec3.ingotronic.ch. PyCrf8T5dAfJzapb1p+kcTALPjDuD2niSaXXo0KeHAunT+6gJicLML2S/ZpiYr7X7Ma4Z0TYqE02qH6pcLYNnSgv9BE8sZO0nRtPekSyTy5nLi4hFADYhjb3UjaB85qmQZcqm64vC/CJhWO4t6Eixg/5MYALw+Qdy5Fo0qy/U5E=
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 958 bytes
###############################################
testNsec3ClosestEncloserIsDelegation 0000664 0000000 0000000 00000106606 13020541473 0041577 0 ustar 00root root 0000000 0000000 dnssecjava-1.1.3/src/test/resources/recordings/org_jitsi_dnssec_validator_TestNsec3ValUtils #Date: 2015-01-06T22:35:28+01:00
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 4332
;; flags: qr aa rd ra cd ; qd: 1 an: 0 au: 8 ad: 1
;; QUESTIONS:
;; 9.nsec3.ingotronic.ch., type = A, class = IN
;; ANSWERS:
;; AUTHORITY RECORDS:
nsec3.ingotronic.ch. 300 IN SOA ns1.ingotronic.ch. admin.ingotronic.ch. 2013032932 300 60 864000 300
nsec3.ingotronic.ch. 300 IN RRSIG SOA 7 3 300 20150201003516 20150101233516 62417 nsec3.ingotronic.ch. RMXaAZCkydysBpA4+LWD2frs4CZH2FBxafAolq7MOG62Sw3ellwNcSIh2naMasviin2DU2BAzIYyFUqKJDbUqzTxZQjsM6d5LtgFy5iTNmWum6FnFP5Fz73Zs/9Q0LNEstR82MRRL8EDElADhFySAReavyT/vlSTScQGxx6slyQ=
NTV3QJT4VQDVBPB6BNOVM40NMKJ3H29P.nsec3.ingotronic.ch. 300 IN NSEC3 1 0 10 1234 O275F9OLQ9HNCER7U4SMD4V8AG7IPML9 A NS SOA RRSIG DNSKEY NSEC3PARAM
NTV3QJT4VQDVBPB6BNOVM40NMKJ3H29P.nsec3.ingotronic.ch. 300 IN RRSIG NSEC3 7 4 300 20150131235629 20150101233516 62417 nsec3.ingotronic.ch. xccCvQs/b3ndBUo6J2FbaCzDMg+LB1e4OWeI29VTBWcmfbuD3rZvneRdbA9B5AluJH1ar10xxdrt/+RSuhSWC70LswkdPDg4vshmCZMDeMCOJYFEkGR0UgcZUMynU6EewEDLVLgYtBkJmspeuZNMBMPk/ZUOolCElrkHfbUA1Cc=
5RFQOLI81S6LKQTUG5HLI19UVJNKUL3H.nsec3.ingotronic.ch. 300 IN NSEC3 1 0 10 1234 74SO0776K6C87EPASDU8QK8SROIK00KK NS DS RRSIG
5RFQOLI81S6LKQTUG5HLI19UVJNKUL3H.nsec3.ingotronic.ch. 300 IN RRSIG NSEC3 7 4 300 20150125000452 20141225235516 62417 nsec3.ingotronic.ch. Fj0oqoPcn/OEnskMdbw0fTkESOsr6nyhXAqiB0BrGv+PIQEeYPguOFDKvV5CkHaoX+R1OrLHnbc3TFrgopy8cA/Uo3+YxNhIJn6tnm9ynyw7n6RoqWNsY6SYiCwM44Ea4sW7xcMmz8YUiPAJe+NrJYVoFnGjRbRWhLqI+q1iU3M=
L40SJG7ANKROIHCT5RA6C8CTKJ91CD3N.nsec3.ingotronic.ch. 300 IN NSEC3 1 0 10 1234 ND3HQPFBN314KVB64L6T40JF75US8HKT
L40SJG7ANKROIHCT5RA6C8CTKJ91CD3N.nsec3.ingotronic.ch. 300 IN RRSIG NSEC3 7 4 300 20150125005926 20141226002759 62417 nsec3.ingotronic.ch. v6NHEWwb2KxRGRPshC2KFoxJs4Mis3OmvncJmn5bIWBnzeTY4x75tsE4zlVPx9rp0rjmOAQsYn4KGtIFPUShDHNHy45qoOtKkvRzRgByx4K2l5Rq9OizQVYsEUUScXEYATilaDU9whifF0vPk7YPwFGRmiY3prCGAvY/jH4hQUM=
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 1048 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 52037
;; flags: qr rd ra ad cd ; qd: 1 an: 4 au: 0 ad: 1
;; QUESTIONS:
;; ., type = DNSKEY, class = IN
;; ANSWERS:
. 87345 IN DNSKEY 257 3 8 AwEAAagAIKlVZrpC6Ia7gEzahOR+9W29euxhJhVVLOyQbSEW0O8gcCjFFVQUTf6v58fLjwBd0YI0EzrAcQqBGCzh/RStIoO8g0NfnfL2MTJRkxoXbfDaUeVPQuYEhg37NZWAJQ9VnMVDxP/VHL496M/QZxkjf5/Efucp2gaDX6RS6CXpoY68LsvPVjR0ZSwzz1apAzvN9dlzEheX7ICJBBtuA6G3LQpzW5hOA2hzCTMjJPJ8LbqF6dsV6DoBQzgul0sGIcGOYl7OyQdXfZ57relSQageu+ipAdTTJ25AsRTAoub8ONGcLmqrAmRLKBP1dfwhYB4N7knNnulqQxA+Uk1ihz0=
. 87345 IN DNSKEY 256 3 8 AwEAAaPD7Y7XIi1MOEREJNTrRhyqsY3gff6JWzg+XCbqut1sbcbvqyssHw8DT1AkRaAC92pO8xuyq5QEgEPL1IHfABLwpwXI5gTj4gdwi86bpkmlWs9fRpnn4DPDCTdrnxIejJXgClHikLJF3u3CdpNCMijq4CKdQbMlRZ3avv+G7rh7
. 87345 IN DNSKEY 256 3 8 AwEAAe3fSrbLBy3LOS7pnxEUhvPZTE2H5dIGsI/UfruI/nOEvWWa/PSX2BFedBkEqOlYdjdNF2f+6lmfk2Od/xu0v5bVqxFE+/24v3hZSlWBxvXzPTAGHrbW/IJYEPqlzVOAS4XdUgHg0N7IbLywNHMvB+Yf+Nm6ctyXXFLV4WTNnzs7
. 87345 IN RRSIG DNSKEY 8 0 172800 20150115235959 20150101000000 19036 . i8cAxD2pvQi1oAyvQxRpDfFlbqPzW+69QQEsDwE1eWOm5AtawO9U7lmsGps7sy/fVNvl1ljKBj4Djp9pb3U2FLogjiIlW0cDAkPmLlG9t+b/pjEfBNlhjANUVN06pvQVAfm+LcF26EaWT6FlISBqb6jSy4BHRa3Bdc4Sx7+pRSYSqVVvYxLkfAWsKPqGkvWhebJDndJJV9syXQXgZ+v/uJ+6XOS43xkAdeL8iBzIs/FlwMTfh3tVe3d0lb65IBBLlCzeQuetX+0Vu1YFcnD0mHc/wS2ZnAV5toAFmyVQBoY/XAZiZeaOkcROJ6Zmqezy7liwK7BqsYyAZntMhk8lbg==
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 883 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 8702
;; flags: qr rd ra ad cd ; qd: 1 an: 2 au: 0 ad: 1
;; QUESTIONS:
;; ch., type = DS, class = IN
;; ANSWERS:
ch. 945 IN DS 46375 8 2 8F96646FC68BB7E4AF4C0750A6096FBC0D4ECDA3D3FA6DA06FDDB42EE50C6CF3
ch. 945 IN RRSIG DS 8 1 86400 20150112170000 20150105160000 16665 . thY7xYWBBxiBjqbQIb9fAG4TmQgnziwM7q6P1T3/ITxmECdvOCQnnZA3uD7qmN8uM0HudsD7+y+zgD3rsH4RSTKdL4kHSI0OnCxToMTvklghEgFDezqIRm8NkWdI2H4Stwrj20nYKSpLQxPI2EE54gs18P3KyO8bAUYv8Qx73xU=
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 238 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 51929
;; flags: qr rd ra ad cd ; qd: 1 an: 4 au: 0 ad: 1
;; QUESTIONS:
;; ch., type = DNSKEY, class = IN
;; ANSWERS:
ch. 946 IN DNSKEY 257 3 8 AwEAAb7GhhZ8IAy/AhwmSms5DeQK5ad09wIIplEpYoiAIYXPtJvT1ReFzyfTp/2YP+g/PWDwHPh4qKAHa9x0VgbIQcGAeNakmfkAdWEmCnca323/SAml3mwfaX62G7/uYWae5zh8QTxZKNd+K1yZ5x0IxnI31chSl5xymRbTEHYZDKwSIRFM3fTxUMt93WFaBVWELReYotJBr++rvAWdnlay5TPBTvheLBkaiqtgM4GP8HK07Y+86lsZnEsj5K3G1KTV5SPpa82rqYAwxG9VKbmSE/6/kBR5jJHjt1rRt5Oe7v18aEtw0YCEN4vxq+KuvMoNVqXUsE9LBwHJD+QNwi6wmB0=
ch. 946 IN DNSKEY 256 3 8 AwEAAcsg0kY6fw1wzYMhSAKTy+Y2JzAst66P/1odp9NECJJHbU8f4nwziI3onoFSBV0ZiSZhY1aH5dhdDZ7BkrqhVXSrZPAz0CvzjIxmB1gSOf9DeZvjQvoy97HqYolxsf+B3QQv2RKBT67elF5+JisKg3/dQISelKn8LhabSoVrMlD1
ch. 946 IN DNSKEY 256 3 8 AwEAAcSLdT0fEmcFmLpeUkAJoeVaHKiu+nbuc43fWlqaCRVf8t2HA4uWxOk0O5ci9nrFTc8nq8oa5fk5Cj7CHh4yrX9qUCfTdIWTyp8BDEdJpS+Dyb0u9wQuVj+nQMj4fLzdQf4TJs3/qxuiLr3nL1UUwlhhXeqSqGVb7p3mtB5HJ8ad
ch. 946 IN RRSIG DNSKEY 8 1 86400 20150127100909 20141212090909 46375 ch. bT8q0FWyeMH0SulNo6UdIIgZYNATwYsee2bikq2Gh339Bufma8eaqWIPYT3XKmxYPBFOw0bVl+kLZxTwbR1CFoCDXoP+qgQhh4mf9qkNiv2CDSc+0FE3FRREn+DAhYTUEuB58FPiPakFB8s8O7T+k2qhDae7jy4/y7Jl1lnjaBY8s7bzOUPhF0KKCNZmvoKwtL23ZdVeTSV1xM3jkiNnpzBKbcoSWECSGJVp1SE0BnRXdwQP41YTXFZ0310YjaTAUCC5qbMIWdEkHjfdSQtKBImnc85mkapq9w++XQ4zhauPWBtrPV3CcoCahjUaWdjrKVkibomlJZaN8MEO23CfQw==
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 893 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 20671
;; flags: qr rd ra cd ; qd: 1 an: 3 au: 0 ad: 1
;; QUESTIONS:
;; ingotronic.ch., type = DS, class = IN
;; ANSWERS:
ingotronic.ch. 3554 IN DS 6031 5 1 733D0218B571CD617B1A7493564B9FC4F12ADE82
ingotronic.ch. 3554 IN DS 6031 5 2 4A948F2FDADA24686E473EDAC00DCF972584C75E3FAA92C2021B6221449FF87E
ingotronic.ch. 3554 IN RRSIG DS 8 2 3600 20150129033614 20150105123019 60789 ch. rVPJP2HhzW7OkroK2axFj5Lb4iVWCH8Fp/Iq1rF952NDo72b8RiKje2RaAKJAGQ+wd0YgE+PAej04GCmkhlDJA/zvPeeTxuhy3HbJzReMlQ7fjyH+wW1hli+FuIYvogXWf7nO/9VyPORt8X/f/pjrOr3Vlj9sGLN8TGYpEuVSw4=
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 288 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 65359
;; flags: qr aa rd ra cd ; qd: 1 an: 4 au: 0 ad: 1
;; QUESTIONS:
;; ingotronic.ch., type = DNSKEY, class = IN
;; ANSWERS:
ingotronic.ch. 300 IN DNSKEY 256 3 5 AwEAAZ2Xh77GFzpEDx7EHYxShqltHgkiG+BOjBGifEmnJhQSdE5/yNSLFNcdhZZ8HUPxYnaedTqJcFFg4AzUsQklF/fECegTJdZjaj2WoL0/I8K7HMfY/hVuRZUWPNglYi8agJRX6gdkFTCpUNI7stpgKqxtzUJhhw15uG/lKMplwqUr
ingotronic.ch. 300 IN DNSKEY 257 3 5 AwEAAeA1vzmjaB+eBAcvhzpKEgAEFpvQ1rg4uKDW6MsQtacKoqBpgyep2+LuWotz5p/xYxj3NGsArwN8Ad5cY0FHRr8miTT0elOv6nvlqGIfRuhj/BXAQ1x4ihpSFslHw0lJMYFwxsUZWpUyjWX/nv1xRZMMwF46gui0N4OEbyTYusCk77D+A71k+K0EAitFIbIH4GCUKmH1H7HmXhSVH9bN/n7KEGwW32lmsuuUcJoRKDkcUvbMXY/9Xoa2quERrUg/rBbDUHowRPjYDS5GzY1+f4YY8s40BufGiqyUTKKXL953MVFK8gmezXA0hbmrnZ7CBOw/7238mORAdzExaX8n7CE=
ingotronic.ch. 300 IN RRSIG DNSKEY 5 2 300 20150125003700 20141226001657 6031 ingotronic.ch. rs1QlP2SlSpA2ELbzwg3DgWLzXWL3Lpv6CUJE2Q0qH2Zp7Qdy3cD+ZEtNh9v24Qv1M6JJ3zFt8mmZoCeW2ycuMbJCqBkW9CBuwF+VznZvZY2MxwPipvhvEEGP//0M8YAZJ66yQPDv3PTdAP8FYbIrJyvY44vwyncwbslpfHT9jAsrbfr3vuMuWps86dnP462q+0s1TxBfqi8mzo3gdavjHKWVNwohLahLKT+tWeu6DSzQv0YwMjwtkLgF7QRgx3ctIIkloOrnx9nHH1N6y+hxEB89fOlyVDjHhgL5uVtsD5fEdT0FJ2Gc/2nShEMMqIwr1/J9kUq1mNySff/uEe65Q==
ingotronic.ch. 300 IN RRSIG DNSKEY 5 2 300 20150125003700 20141226001657 17430 ingotronic.ch. mEwZjhQqeWksWD0TCnNBrtce4YkWJL3edqL6PvAUu8Fn+Ih437kEs3+pqdkgRsdYQ9HW+lBm/8pWwJlNAv0bi9NykItXMwAUFtncgq+6Pnh3iAM972GXSa5VV4LcGQ5b8CBdHCHiEKDqyPv5Hr5QfYL/FQaWlcNRh4QZZlZNPFA=
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 940 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 8194
;; flags: qr aa rd ra cd ; qd: 1 an: 3 au: 0 ad: 1
;; QUESTIONS:
;; nsec3.ingotronic.ch., type = DS, class = IN
;; ANSWERS:
nsec3.ingotronic.ch. 300 IN DS 16758 7 2 3C8DC02750A1636F829B45D6E6D642866768A9CD40A013AD9D25AB63734FFA13
nsec3.ingotronic.ch. 300 IN DS 16758 7 1 1720FF268E09A2CB63805EC8782D10AAD20E12A5
nsec3.ingotronic.ch. 300 IN RRSIG DS 5 3 300 20150125011134 20141226002644 17430 ingotronic.ch. hNurzlGhlyHbSgezPDuhIrtN9ZMsMXZbKGc7HD5rUuM88wD3fM97NxdzF+2Hi1USvBZ5GsQv63L+lAzf+mFPBoPIFHtTiAv8up7kQKRKmi/EzzkCYd/CC4UYdDZbaUyv7esh7spSOGwjPJNdK831p+MgltoWaYtnSGVMgOKk5mc=
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 305 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 59006
;; flags: qr aa rd ra cd ; qd: 1 an: 4 au: 0 ad: 1
;; QUESTIONS:
;; nsec3.ingotronic.ch., type = DNSKEY, class = IN
;; ANSWERS:
nsec3.ingotronic.ch. 300 IN DNSKEY 256 3 7 AwEAAccAWxkTVGZ6UAp0VEozAlYpARhbh6Y6tYOl6Fg3UeBNFFtDQ9fTEEt1NkbnR9u8KkpVN6a67avlYiUN1egDqEwzDU7R1Rw+/USdhm2hqOARmmu3DBgjjX/iXjZLyv310cOGFJZ/smcodlDL4pDAAoPxh/qs6KEBaT0sc1KWcGq3
nsec3.ingotronic.ch. 300 IN DNSKEY 257 3 7 AwEAAaBuJTf9oGyeTH3biUkAFLrsYrkodX1H7Snsui4XsDHFCBvs5XYacHbs0Jg0/O51KPjmNnjwMW8SSyDkKqYQ+9uYAf2EQ/pnD/VGQqnV2cw0Vwk/t0E2V4FUCju4pnAoyzZFZXGs1eWbX9JXu++b0Azp+ACq6485qJLzHhWDiIrPoK/SvdbFVRK4s+nPPJLH3NGBbtdz6kPq7aFWYBMoGeAZdN1wsQpcNWUo5eOmaJY53nMc7+rDpAyYlMe/FKwSZdX2ZDd63Qsa6Im4FVUJq/nWLq7tlQ/mWks15uDTQyJy/OWfA0ICCO4N9Fel9rThJNpJWEzOCblvZyBoy405kZk=
nsec3.ingotronic.ch. 300 IN RRSIG DNSKEY 7 3 300 20150125001457 20141226000444 16758 nsec3.ingotronic.ch. mXi1ylDi8XkRPup+YlT8GPdYE+P7gb6+/VdAwtodI916IzrkGkOHOTLbnrbAqqJOh0HxVCYXdxovmEcbJKUFKwplrQg3XD7/9Sq4pKU1MhMFEGrm/QPkM4u0mgjQwyToDLGuPHuFyur3FSjO/n54uGhAEft9JOFk/WKtWdCnm2LLyQrpC6herA3efFaI8kZhdoEY02AwihWVJxHasmz7lOoKRgNrkfELU+fN4+V7ISsRfJMyZc6q5PuNeG6vFD0uNE8tpdLJCSMurKYVpelvYqzFIcRTYcIjXwmS+L3DGjupqWMzFZVmpQM62JG3KCCD0ffpnNb0nWoSoHwpSeh/3Q==
nsec3.ingotronic.ch. 300 IN RRSIG DNSKEY 7 3 300 20150125001457 20141226000444 62417 nsec3.ingotronic.ch. PyCrf8T5dAfJzapb1p+kcTALPjDuD2niSaXXo0KeHAunT+6gJicLML2S/ZpiYr7X7Ma4Z0TYqE02qH6pcLYNnSgv9BE8sZO0nRtPekSyTy5nLi4hFADYhjb3UjaB85qmQZcqm64vC/CJhWO4t6Eixg/5MYALw+Qdy5Fo0qy/U5E=
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 958 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 12595
;; flags: qr aa rd ra cd ; qd: 1 an: 0 au: 8 ad: 1
;; QUESTIONS:
;; a.sub.nsec3.ingotronic.ch., type = A, class = IN
;; ANSWERS:
;; AUTHORITY RECORDS:
sub.nsec3.ingotronic.ch. 300 IN SOA ns1.ingotronic.ch. admin.ingotronic.ch. 2013032916 300 60 864000 300
sub.nsec3.ingotronic.ch. 300 IN RRSIG SOA 7 4 300 20150125015740 20141226005740 47588 sub.nsec3.ingotronic.ch. Bf4LTgw0NTtweK4jIpwJHZ1TXexTWKUsBz2jG0/tMeTkcIZOUNVFrOxBfSG6/bMDUA3jSbz5jJ1m9s65BST+KkUqQX+vcRTWQAZT3Hrl3Si82mC1pxOB/84yyR1C0AYrgx9LA+XMsXP1asYWpIHMK+r8A5SVkOyH4lbhqOieEi4=
8N8QLBCUIH7R2BG7DMCJ5AEE63K4KVUA.sub.nsec3.ingotronic.ch. 300 IN NSEC3 1 0 11 4321 8Q9N8IJMR07MUTMO8TDS0N9UEQA8QVD9 A NS SOA RRSIG DNSKEY NSEC3PARAM
8N8QLBCUIH7R2BG7DMCJ5AEE63K4KVUA.sub.nsec3.ingotronic.ch. 300 IN RRSIG NSEC3 7 5 300 20150125013111 20141226005322 47588 sub.nsec3.ingotronic.ch. le09pR2JyiMdQqnRMEzP8x0R4TM2GEjW4KQ3H/rwewL6FZYuTUUtby44kqCAVS9pZ+bxKtT0A7F5RG06S2fwSx5OP62O6OFQoz/qmjc4ecsaciSMX+Rh3BbVSy8NyHoy0v2G9kAijyXrdz9xBSm/nRoS74RjL2mu7TPw/PTM3mI=
0NEGNVKPNDG8COAS7H0J86LJOO3HD9DA.sub.nsec3.ingotronic.ch. 300 IN NSEC3 1 0 11 4321 4IGI4A0AMGQ33TEQ30KODCUNR3GUQ9PM A RRSIG
0NEGNVKPNDG8COAS7H0J86LJOO3HD9DA.sub.nsec3.ingotronic.ch. 300 IN RRSIG NSEC3 7 5 300 20150125010632 20141226002446 47588 sub.nsec3.ingotronic.ch. UTxl/DGaYhwIhPk3igVHrExeG7bWR9/rSEOa+qmijHN2h/MnA7vf40Egh1kzCE5IEMlWbJTyH7SQtcIBO+QNY5wcZIs1ROhGsLQCK03d8MhYZeWw16+8kPpnwV1ZskVVHJ355Sm6iMumxEPmjEzhpxeDAQ3A9SHBBBHPZ0gk0Ew=
DFLBG9075O3J47SUNJOFNAMQIE6355M6.sub.nsec3.ingotronic.ch. 300 IN NSEC3 1 0 11 4321 FF6HDF6NIR1O4UO4N6BO1NT1P5BLEM45 A RRSIG
DFLBG9075O3J47SUNJOFNAMQIE6355M6.sub.nsec3.ingotronic.ch. 300 IN RRSIG NSEC3 7 5 300 20150125011509 20141226005740 47588 sub.nsec3.ingotronic.ch. LOf771yhl0XefM1p1t99S7KH4hiQaT78qev2VFkdgv9WN/w2JrZOkO0bx5ikNzt2MuELtdh8IDTP9KdRss9XsSEr7AIkKg0CN3oG6xxKgt+rrY5O+GfbvrgBFhn7H4JGTBlacnAnoMjreyCSxNtE1bHSIZOHOevkxZ4voFIQ0OQ=
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 1076 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 13990
;; flags: qr rd ra ad cd ; qd: 1 an: 4 au: 0 ad: 1
;; QUESTIONS:
;; ., type = DNSKEY, class = IN
;; ANSWERS:
. 87345 IN DNSKEY 256 3 8 AwEAAe3fSrbLBy3LOS7pnxEUhvPZTE2H5dIGsI/UfruI/nOEvWWa/PSX2BFedBkEqOlYdjdNF2f+6lmfk2Od/xu0v5bVqxFE+/24v3hZSlWBxvXzPTAGHrbW/IJYEPqlzVOAS4XdUgHg0N7IbLywNHMvB+Yf+Nm6ctyXXFLV4WTNnzs7
. 87345 IN DNSKEY 257 3 8 AwEAAagAIKlVZrpC6Ia7gEzahOR+9W29euxhJhVVLOyQbSEW0O8gcCjFFVQUTf6v58fLjwBd0YI0EzrAcQqBGCzh/RStIoO8g0NfnfL2MTJRkxoXbfDaUeVPQuYEhg37NZWAJQ9VnMVDxP/VHL496M/QZxkjf5/Efucp2gaDX6RS6CXpoY68LsvPVjR0ZSwzz1apAzvN9dlzEheX7ICJBBtuA6G3LQpzW5hOA2hzCTMjJPJ8LbqF6dsV6DoBQzgul0sGIcGOYl7OyQdXfZ57relSQageu+ipAdTTJ25AsRTAoub8ONGcLmqrAmRLKBP1dfwhYB4N7knNnulqQxA+Uk1ihz0=
. 87345 IN DNSKEY 256 3 8 AwEAAaPD7Y7XIi1MOEREJNTrRhyqsY3gff6JWzg+XCbqut1sbcbvqyssHw8DT1AkRaAC92pO8xuyq5QEgEPL1IHfABLwpwXI5gTj4gdwi86bpkmlWs9fRpnn4DPDCTdrnxIejJXgClHikLJF3u3CdpNCMijq4CKdQbMlRZ3avv+G7rh7
. 87345 IN RRSIG DNSKEY 8 0 172800 20150115235959 20150101000000 19036 . i8cAxD2pvQi1oAyvQxRpDfFlbqPzW+69QQEsDwE1eWOm5AtawO9U7lmsGps7sy/fVNvl1ljKBj4Djp9pb3U2FLogjiIlW0cDAkPmLlG9t+b/pjEfBNlhjANUVN06pvQVAfm+LcF26EaWT6FlISBqb6jSy4BHRa3Bdc4Sx7+pRSYSqVVvYxLkfAWsKPqGkvWhebJDndJJV9syXQXgZ+v/uJ+6XOS43xkAdeL8iBzIs/FlwMTfh3tVe3d0lb65IBBLlCzeQuetX+0Vu1YFcnD0mHc/wS2ZnAV5toAFmyVQBoY/XAZiZeaOkcROJ6Zmqezy7liwK7BqsYyAZntMhk8lbg==
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 883 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 22861
;; flags: qr rd ra ad cd ; qd: 1 an: 2 au: 0 ad: 1
;; QUESTIONS:
;; ch., type = DS, class = IN
;; ANSWERS:
ch. 945 IN DS 46375 8 2 8F96646FC68BB7E4AF4C0750A6096FBC0D4ECDA3D3FA6DA06FDDB42EE50C6CF3
ch. 945 IN RRSIG DS 8 1 86400 20150112170000 20150105160000 16665 . thY7xYWBBxiBjqbQIb9fAG4TmQgnziwM7q6P1T3/ITxmECdvOCQnnZA3uD7qmN8uM0HudsD7+y+zgD3rsH4RSTKdL4kHSI0OnCxToMTvklghEgFDezqIRm8NkWdI2H4Stwrj20nYKSpLQxPI2EE54gs18P3KyO8bAUYv8Qx73xU=
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 238 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 62841
;; flags: qr rd ra ad cd ; qd: 1 an: 4 au: 0 ad: 1
;; QUESTIONS:
;; ch., type = DNSKEY, class = IN
;; ANSWERS:
ch. 946 IN DNSKEY 256 3 8 AwEAAcSLdT0fEmcFmLpeUkAJoeVaHKiu+nbuc43fWlqaCRVf8t2HA4uWxOk0O5ci9nrFTc8nq8oa5fk5Cj7CHh4yrX9qUCfTdIWTyp8BDEdJpS+Dyb0u9wQuVj+nQMj4fLzdQf4TJs3/qxuiLr3nL1UUwlhhXeqSqGVb7p3mtB5HJ8ad
ch. 946 IN DNSKEY 257 3 8 AwEAAb7GhhZ8IAy/AhwmSms5DeQK5ad09wIIplEpYoiAIYXPtJvT1ReFzyfTp/2YP+g/PWDwHPh4qKAHa9x0VgbIQcGAeNakmfkAdWEmCnca323/SAml3mwfaX62G7/uYWae5zh8QTxZKNd+K1yZ5x0IxnI31chSl5xymRbTEHYZDKwSIRFM3fTxUMt93WFaBVWELReYotJBr++rvAWdnlay5TPBTvheLBkaiqtgM4GP8HK07Y+86lsZnEsj5K3G1KTV5SPpa82rqYAwxG9VKbmSE/6/kBR5jJHjt1rRt5Oe7v18aEtw0YCEN4vxq+KuvMoNVqXUsE9LBwHJD+QNwi6wmB0=
ch. 946 IN DNSKEY 256 3 8 AwEAAcsg0kY6fw1wzYMhSAKTy+Y2JzAst66P/1odp9NECJJHbU8f4nwziI3onoFSBV0ZiSZhY1aH5dhdDZ7BkrqhVXSrZPAz0CvzjIxmB1gSOf9DeZvjQvoy97HqYolxsf+B3QQv2RKBT67elF5+JisKg3/dQISelKn8LhabSoVrMlD1
ch. 946 IN RRSIG DNSKEY 8 1 86400 20150127100909 20141212090909 46375 ch. bT8q0FWyeMH0SulNo6UdIIgZYNATwYsee2bikq2Gh339Bufma8eaqWIPYT3XKmxYPBFOw0bVl+kLZxTwbR1CFoCDXoP+qgQhh4mf9qkNiv2CDSc+0FE3FRREn+DAhYTUEuB58FPiPakFB8s8O7T+k2qhDae7jy4/y7Jl1lnjaBY8s7bzOUPhF0KKCNZmvoKwtL23ZdVeTSV1xM3jkiNnpzBKbcoSWECSGJVp1SE0BnRXdwQP41YTXFZ0310YjaTAUCC5qbMIWdEkHjfdSQtKBImnc85mkapq9w++XQ4zhauPWBtrPV3CcoCahjUaWdjrKVkibomlJZaN8MEO23CfQw==
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 893 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 7825
;; flags: qr rd ra cd ; qd: 1 an: 3 au: 0 ad: 1
;; QUESTIONS:
;; ingotronic.ch., type = DS, class = IN
;; ANSWERS:
ingotronic.ch. 3554 IN DS 6031 5 1 733D0218B571CD617B1A7493564B9FC4F12ADE82
ingotronic.ch. 3554 IN DS 6031 5 2 4A948F2FDADA24686E473EDAC00DCF972584C75E3FAA92C2021B6221449FF87E
ingotronic.ch. 3554 IN RRSIG DS 8 2 3600 20150129033614 20150105123019 60789 ch. rVPJP2HhzW7OkroK2axFj5Lb4iVWCH8Fp/Iq1rF952NDo72b8RiKje2RaAKJAGQ+wd0YgE+PAej04GCmkhlDJA/zvPeeTxuhy3HbJzReMlQ7fjyH+wW1hli+FuIYvogXWf7nO/9VyPORt8X/f/pjrOr3Vlj9sGLN8TGYpEuVSw4=
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 288 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 54026
;; flags: qr aa rd ra cd ; qd: 1 an: 4 au: 0 ad: 1
;; QUESTIONS:
;; ingotronic.ch., type = DNSKEY, class = IN
;; ANSWERS:
ingotronic.ch. 300 IN DNSKEY 257 3 5 AwEAAeA1vzmjaB+eBAcvhzpKEgAEFpvQ1rg4uKDW6MsQtacKoqBpgyep2+LuWotz5p/xYxj3NGsArwN8Ad5cY0FHRr8miTT0elOv6nvlqGIfRuhj/BXAQ1x4ihpSFslHw0lJMYFwxsUZWpUyjWX/nv1xRZMMwF46gui0N4OEbyTYusCk77D+A71k+K0EAitFIbIH4GCUKmH1H7HmXhSVH9bN/n7KEGwW32lmsuuUcJoRKDkcUvbMXY/9Xoa2quERrUg/rBbDUHowRPjYDS5GzY1+f4YY8s40BufGiqyUTKKXL953MVFK8gmezXA0hbmrnZ7CBOw/7238mORAdzExaX8n7CE=
ingotronic.ch. 300 IN DNSKEY 256 3 5 AwEAAZ2Xh77GFzpEDx7EHYxShqltHgkiG+BOjBGifEmnJhQSdE5/yNSLFNcdhZZ8HUPxYnaedTqJcFFg4AzUsQklF/fECegTJdZjaj2WoL0/I8K7HMfY/hVuRZUWPNglYi8agJRX6gdkFTCpUNI7stpgKqxtzUJhhw15uG/lKMplwqUr
ingotronic.ch. 300 IN RRSIG DNSKEY 5 2 300 20150125003700 20141226001657 6031 ingotronic.ch. rs1QlP2SlSpA2ELbzwg3DgWLzXWL3Lpv6CUJE2Q0qH2Zp7Qdy3cD+ZEtNh9v24Qv1M6JJ3zFt8mmZoCeW2ycuMbJCqBkW9CBuwF+VznZvZY2MxwPipvhvEEGP//0M8YAZJ66yQPDv3PTdAP8FYbIrJyvY44vwyncwbslpfHT9jAsrbfr3vuMuWps86dnP462q+0s1TxBfqi8mzo3gdavjHKWVNwohLahLKT+tWeu6DSzQv0YwMjwtkLgF7QRgx3ctIIkloOrnx9nHH1N6y+hxEB89fOlyVDjHhgL5uVtsD5fEdT0FJ2Gc/2nShEMMqIwr1/J9kUq1mNySff/uEe65Q==
ingotronic.ch. 300 IN RRSIG DNSKEY 5 2 300 20150125003700 20141226001657 17430 ingotronic.ch. mEwZjhQqeWksWD0TCnNBrtce4YkWJL3edqL6PvAUu8Fn+Ih437kEs3+pqdkgRsdYQ9HW+lBm/8pWwJlNAv0bi9NykItXMwAUFtncgq+6Pnh3iAM972GXSa5VV4LcGQ5b8CBdHCHiEKDqyPv5Hr5QfYL/FQaWlcNRh4QZZlZNPFA=
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 940 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 8144
;; flags: qr aa rd ra cd ; qd: 1 an: 3 au: 0 ad: 1
;; QUESTIONS:
;; nsec3.ingotronic.ch., type = DS, class = IN
;; ANSWERS:
nsec3.ingotronic.ch. 300 IN DS 16758 7 1 1720FF268E09A2CB63805EC8782D10AAD20E12A5
nsec3.ingotronic.ch. 300 IN DS 16758 7 2 3C8DC02750A1636F829B45D6E6D642866768A9CD40A013AD9D25AB63734FFA13
nsec3.ingotronic.ch. 300 IN RRSIG DS 5 3 300 20150125011134 20141226002644 17430 ingotronic.ch. hNurzlGhlyHbSgezPDuhIrtN9ZMsMXZbKGc7HD5rUuM88wD3fM97NxdzF+2Hi1USvBZ5GsQv63L+lAzf+mFPBoPIFHtTiAv8up7kQKRKmi/EzzkCYd/CC4UYdDZbaUyv7esh7spSOGwjPJNdK831p+MgltoWaYtnSGVMgOKk5mc=
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 305 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 65284
;; flags: qr aa rd ra cd ; qd: 1 an: 4 au: 0 ad: 1
;; QUESTIONS:
;; nsec3.ingotronic.ch., type = DNSKEY, class = IN
;; ANSWERS:
nsec3.ingotronic.ch. 300 IN DNSKEY 256 3 7 AwEAAccAWxkTVGZ6UAp0VEozAlYpARhbh6Y6tYOl6Fg3UeBNFFtDQ9fTEEt1NkbnR9u8KkpVN6a67avlYiUN1egDqEwzDU7R1Rw+/USdhm2hqOARmmu3DBgjjX/iXjZLyv310cOGFJZ/smcodlDL4pDAAoPxh/qs6KEBaT0sc1KWcGq3
nsec3.ingotronic.ch. 300 IN DNSKEY 257 3 7 AwEAAaBuJTf9oGyeTH3biUkAFLrsYrkodX1H7Snsui4XsDHFCBvs5XYacHbs0Jg0/O51KPjmNnjwMW8SSyDkKqYQ+9uYAf2EQ/pnD/VGQqnV2cw0Vwk/t0E2V4FUCju4pnAoyzZFZXGs1eWbX9JXu++b0Azp+ACq6485qJLzHhWDiIrPoK/SvdbFVRK4s+nPPJLH3NGBbtdz6kPq7aFWYBMoGeAZdN1wsQpcNWUo5eOmaJY53nMc7+rDpAyYlMe/FKwSZdX2ZDd63Qsa6Im4FVUJq/nWLq7tlQ/mWks15uDTQyJy/OWfA0ICCO4N9Fel9rThJNpJWEzOCblvZyBoy405kZk=
nsec3.ingotronic.ch. 300 IN RRSIG DNSKEY 7 3 300 20150125001457 20141226000444 16758 nsec3.ingotronic.ch. mXi1ylDi8XkRPup+YlT8GPdYE+P7gb6+/VdAwtodI916IzrkGkOHOTLbnrbAqqJOh0HxVCYXdxovmEcbJKUFKwplrQg3XD7/9Sq4pKU1MhMFEGrm/QPkM4u0mgjQwyToDLGuPHuFyur3FSjO/n54uGhAEft9JOFk/WKtWdCnm2LLyQrpC6herA3efFaI8kZhdoEY02AwihWVJxHasmz7lOoKRgNrkfELU+fN4+V7ISsRfJMyZc6q5PuNeG6vFD0uNE8tpdLJCSMurKYVpelvYqzFIcRTYcIjXwmS+L3DGjupqWMzFZVmpQM62JG3KCCD0ffpnNb0nWoSoHwpSeh/3Q==
nsec3.ingotronic.ch. 300 IN RRSIG DNSKEY 7 3 300 20150125001457 20141226000444 62417 nsec3.ingotronic.ch. PyCrf8T5dAfJzapb1p+kcTALPjDuD2niSaXXo0KeHAunT+6gJicLML2S/ZpiYr7X7Ma4Z0TYqE02qH6pcLYNnSgv9BE8sZO0nRtPekSyTy5nLi4hFADYhjb3UjaB85qmQZcqm64vC/CJhWO4t6Eixg/5MYALw+Qdy5Fo0qy/U5E=
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 958 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 2523
;; flags: qr aa rd ra cd ; qd: 1 an: 3 au: 0 ad: 1
;; QUESTIONS:
;; sub.nsec3.ingotronic.ch., type = DS, class = IN
;; ANSWERS:
sub.nsec3.ingotronic.ch. 300 IN DS 14583 7 2 450CACC87D02E5FF421230909AA852C6FDD2687F884AA44254DD94DA85535077
sub.nsec3.ingotronic.ch. 300 IN DS 14583 7 1 D51C5631497C1D29CA98691288D65554DC02748E
sub.nsec3.ingotronic.ch. 300 IN RRSIG DS 7 4 300 20150125011553 20141226004758 62417 nsec3.ingotronic.ch. YaXJXminnSCzuVyXM/bgnRohbK4kN+wMi8/14ahyigDbBktZ0TWNv3PaYXRE5TFRrnmFRka0TEeCcU4HjQv1goi7BHXvn9VtoAlsi2NrboZOTYt5vo4cFhyPkBPajJWfKtQE4W4AW2CdW6736gKzevMGsJza0ZE+phasic+lwnY=
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 315 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 21959
;; flags: qr aa rd ra cd ; qd: 1 an: 4 au: 0 ad: 1
;; QUESTIONS:
;; sub.nsec3.ingotronic.ch., type = DNSKEY, class = IN
;; ANSWERS:
sub.nsec3.ingotronic.ch. 300 IN DNSKEY 256 3 7 AwEAAaxrudePJ21EN1RmgBFOZJG5tL4EBLzvqDwCasrBCCd7A/4cXJ2hGXpWhfmGi6Jw0aE2H9DSQf3Tpky1gIijeq/bwfxT4QIbrfqOn9Qoo0eVhJ5eLadg91vD9zPu9LrsV66dn8WIoeHyXOW6jTweKRVvTg0y3RMgofQwKj4ZLQuD
sub.nsec3.ingotronic.ch. 300 IN DNSKEY 257 3 7 AwEAAfbT4DoA+kmKQSfhaS4IkklDaqgrxdD3OlrG9dctyUcoxignP3hChGSj9cX+ojrGakS4rI6H7oQVhPAdL2ZOr3mcrKgj52kwD+aAsW19nhS4aEahbseRm8Sq3ebt1zefQRezLrDC+3BPzeCMmuZe53bEN01BQpLwJHz86gtibPZ/xFkmSPIXK5AiqqGTULJRKFm8IqNVKvEwZ+OCiT5NH+Wfzidd+DfRjAD/N5TalP863+nZhp5TdoIPcQfxqrsYyv//UewvC/sijmw1uljwXncRNCA8nMKWKZwPFqJft7pGepRPvojSAmnPZjpHhZh+tHYMk4GQpACDJSF+9uCoOXM=
sub.nsec3.ingotronic.ch. 300 IN RRSIG DNSKEY 7 4 300 20150125004357 20141226000657 14583 sub.nsec3.ingotronic.ch. QbclcvQd9lPzpy8w1Z7g9jSeIHGMAwnHYf1wsi9w/dFaxOWnqKZxSkjbxu8JPq8WzDhGnXlCD/wksK7oAnvr1IStV4jSjh3JQ0JHlvy30c6n2ZEgN1Y6OlUTIH88eaEFEt8zykZKhMNPZcfhh+hqC7hl0oUzgZcA42Tn/U6JNz+DWfQBSJBmAUgzgQFcTnJkR/U9BRoCe19isbBXG2HwrmDNl3PYTudkeJTOEXSuKcTAUdV6twuZ7y+j7uWeqCkXRw9WBzAOQ/bH4x1JSGKt6OZOG5wJ2cdhBVHuR9hLfIJJau8ZgnKjKI2MQ3WWF23ZDMCBILsp3KFPUKEy3tZMKA==
sub.nsec3.ingotronic.ch. 300 IN RRSIG DNSKEY 7 4 300 20150125004357 20141226000657 47588 sub.nsec3.ingotronic.ch. KAsXqPyHIH2Y/iV8QR5JQ/EfUrVfxNeoaTYINar0gtvk84VThpsS/8lhpdwU9NbukXUyD0QZfQm+nF+WIFs4mYPU06tW2Nn0CHiPwBXdA8ZaApVasxbtCmk//BQi9LlRyMriylPUIZeUMLyTTisIffIdTuLBf9xhaYe81uZmpB8=
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 970 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 40054
;; flags: qr rd ra ad cd ; qd: 1 an: 4 au: 0 ad: 1
;; QUESTIONS:
;; ., type = DNSKEY, class = IN
;; ANSWERS:
. 87344 IN DNSKEY 257 3 8 AwEAAagAIKlVZrpC6Ia7gEzahOR+9W29euxhJhVVLOyQbSEW0O8gcCjFFVQUTf6v58fLjwBd0YI0EzrAcQqBGCzh/RStIoO8g0NfnfL2MTJRkxoXbfDaUeVPQuYEhg37NZWAJQ9VnMVDxP/VHL496M/QZxkjf5/Efucp2gaDX6RS6CXpoY68LsvPVjR0ZSwzz1apAzvN9dlzEheX7ICJBBtuA6G3LQpzW5hOA2hzCTMjJPJ8LbqF6dsV6DoBQzgul0sGIcGOYl7OyQdXfZ57relSQageu+ipAdTTJ25AsRTAoub8ONGcLmqrAmRLKBP1dfwhYB4N7knNnulqQxA+Uk1ihz0=
. 87344 IN DNSKEY 256 3 8 AwEAAe3fSrbLBy3LOS7pnxEUhvPZTE2H5dIGsI/UfruI/nOEvWWa/PSX2BFedBkEqOlYdjdNF2f+6lmfk2Od/xu0v5bVqxFE+/24v3hZSlWBxvXzPTAGHrbW/IJYEPqlzVOAS4XdUgHg0N7IbLywNHMvB+Yf+Nm6ctyXXFLV4WTNnzs7
. 87344 IN DNSKEY 256 3 8 AwEAAaPD7Y7XIi1MOEREJNTrRhyqsY3gff6JWzg+XCbqut1sbcbvqyssHw8DT1AkRaAC92pO8xuyq5QEgEPL1IHfABLwpwXI5gTj4gdwi86bpkmlWs9fRpnn4DPDCTdrnxIejJXgClHikLJF3u3CdpNCMijq4CKdQbMlRZ3avv+G7rh7
. 87344 IN RRSIG DNSKEY 8 0 172800 20150115235959 20150101000000 19036 . i8cAxD2pvQi1oAyvQxRpDfFlbqPzW+69QQEsDwE1eWOm5AtawO9U7lmsGps7sy/fVNvl1ljKBj4Djp9pb3U2FLogjiIlW0cDAkPmLlG9t+b/pjEfBNlhjANUVN06pvQVAfm+LcF26EaWT6FlISBqb6jSy4BHRa3Bdc4Sx7+pRSYSqVVvYxLkfAWsKPqGkvWhebJDndJJV9syXQXgZ+v/uJ+6XOS43xkAdeL8iBzIs/FlwMTfh3tVe3d0lb65IBBLlCzeQuetX+0Vu1YFcnD0mHc/wS2ZnAV5toAFmyVQBoY/XAZiZeaOkcROJ6Zmqezy7liwK7BqsYyAZntMhk8lbg==
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 883 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 49011
;; flags: qr rd ra ad cd ; qd: 1 an: 2 au: 0 ad: 1
;; QUESTIONS:
;; ch., type = DS, class = IN
;; ANSWERS:
ch. 944 IN DS 46375 8 2 8F96646FC68BB7E4AF4C0750A6096FBC0D4ECDA3D3FA6DA06FDDB42EE50C6CF3
ch. 944 IN RRSIG DS 8 1 86400 20150112170000 20150105160000 16665 . thY7xYWBBxiBjqbQIb9fAG4TmQgnziwM7q6P1T3/ITxmECdvOCQnnZA3uD7qmN8uM0HudsD7+y+zgD3rsH4RSTKdL4kHSI0OnCxToMTvklghEgFDezqIRm8NkWdI2H4Stwrj20nYKSpLQxPI2EE54gs18P3KyO8bAUYv8Qx73xU=
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 238 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 19308
;; flags: qr rd ra ad cd ; qd: 1 an: 4 au: 0 ad: 1
;; QUESTIONS:
;; ch., type = DNSKEY, class = IN
;; ANSWERS:
ch. 945 IN DNSKEY 257 3 8 AwEAAb7GhhZ8IAy/AhwmSms5DeQK5ad09wIIplEpYoiAIYXPtJvT1ReFzyfTp/2YP+g/PWDwHPh4qKAHa9x0VgbIQcGAeNakmfkAdWEmCnca323/SAml3mwfaX62G7/uYWae5zh8QTxZKNd+K1yZ5x0IxnI31chSl5xymRbTEHYZDKwSIRFM3fTxUMt93WFaBVWELReYotJBr++rvAWdnlay5TPBTvheLBkaiqtgM4GP8HK07Y+86lsZnEsj5K3G1KTV5SPpa82rqYAwxG9VKbmSE/6/kBR5jJHjt1rRt5Oe7v18aEtw0YCEN4vxq+KuvMoNVqXUsE9LBwHJD+QNwi6wmB0=
ch. 945 IN DNSKEY 256 3 8 AwEAAcsg0kY6fw1wzYMhSAKTy+Y2JzAst66P/1odp9NECJJHbU8f4nwziI3onoFSBV0ZiSZhY1aH5dhdDZ7BkrqhVXSrZPAz0CvzjIxmB1gSOf9DeZvjQvoy97HqYolxsf+B3QQv2RKBT67elF5+JisKg3/dQISelKn8LhabSoVrMlD1
ch. 945 IN DNSKEY 256 3 8 AwEAAcSLdT0fEmcFmLpeUkAJoeVaHKiu+nbuc43fWlqaCRVf8t2HA4uWxOk0O5ci9nrFTc8nq8oa5fk5Cj7CHh4yrX9qUCfTdIWTyp8BDEdJpS+Dyb0u9wQuVj+nQMj4fLzdQf4TJs3/qxuiLr3nL1UUwlhhXeqSqGVb7p3mtB5HJ8ad
ch. 945 IN RRSIG DNSKEY 8 1 86400 20150127100909 20141212090909 46375 ch. bT8q0FWyeMH0SulNo6UdIIgZYNATwYsee2bikq2Gh339Bufma8eaqWIPYT3XKmxYPBFOw0bVl+kLZxTwbR1CFoCDXoP+qgQhh4mf9qkNiv2CDSc+0FE3FRREn+DAhYTUEuB58FPiPakFB8s8O7T+k2qhDae7jy4/y7Jl1lnjaBY8s7bzOUPhF0KKCNZmvoKwtL23ZdVeTSV1xM3jkiNnpzBKbcoSWECSGJVp1SE0BnRXdwQP41YTXFZ0310YjaTAUCC5qbMIWdEkHjfdSQtKBImnc85mkapq9w++XQ4zhauPWBtrPV3CcoCahjUaWdjrKVkibomlJZaN8MEO23CfQw==
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 893 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 5655
;; flags: qr rd ra cd ; qd: 1 an: 3 au: 0 ad: 1
;; QUESTIONS:
;; ingotronic.ch., type = DS, class = IN
;; ANSWERS:
ingotronic.ch. 3553 IN DS 6031 5 2 4A948F2FDADA24686E473EDAC00DCF972584C75E3FAA92C2021B6221449FF87E
ingotronic.ch. 3553 IN DS 6031 5 1 733D0218B571CD617B1A7493564B9FC4F12ADE82
ingotronic.ch. 3553 IN RRSIG DS 8 2 3600 20150129033614 20150105123019 60789 ch. rVPJP2HhzW7OkroK2axFj5Lb4iVWCH8Fp/Iq1rF952NDo72b8RiKje2RaAKJAGQ+wd0YgE+PAej04GCmkhlDJA/zvPeeTxuhy3HbJzReMlQ7fjyH+wW1hli+FuIYvogXWf7nO/9VyPORt8X/f/pjrOr3Vlj9sGLN8TGYpEuVSw4=
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 288 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 7346
;; flags: qr aa rd ra cd ; qd: 1 an: 4 au: 0 ad: 1
;; QUESTIONS:
;; ingotronic.ch., type = DNSKEY, class = IN
;; ANSWERS:
ingotronic.ch. 300 IN DNSKEY 257 3 5 AwEAAeA1vzmjaB+eBAcvhzpKEgAEFpvQ1rg4uKDW6MsQtacKoqBpgyep2+LuWotz5p/xYxj3NGsArwN8Ad5cY0FHRr8miTT0elOv6nvlqGIfRuhj/BXAQ1x4ihpSFslHw0lJMYFwxsUZWpUyjWX/nv1xRZMMwF46gui0N4OEbyTYusCk77D+A71k+K0EAitFIbIH4GCUKmH1H7HmXhSVH9bN/n7KEGwW32lmsuuUcJoRKDkcUvbMXY/9Xoa2quERrUg/rBbDUHowRPjYDS5GzY1+f4YY8s40BufGiqyUTKKXL953MVFK8gmezXA0hbmrnZ7CBOw/7238mORAdzExaX8n7CE=
ingotronic.ch. 300 IN DNSKEY 256 3 5 AwEAAZ2Xh77GFzpEDx7EHYxShqltHgkiG+BOjBGifEmnJhQSdE5/yNSLFNcdhZZ8HUPxYnaedTqJcFFg4AzUsQklF/fECegTJdZjaj2WoL0/I8K7HMfY/hVuRZUWPNglYi8agJRX6gdkFTCpUNI7stpgKqxtzUJhhw15uG/lKMplwqUr
ingotronic.ch. 300 IN RRSIG DNSKEY 5 2 300 20150125003700 20141226001657 6031 ingotronic.ch. rs1QlP2SlSpA2ELbzwg3DgWLzXWL3Lpv6CUJE2Q0qH2Zp7Qdy3cD+ZEtNh9v24Qv1M6JJ3zFt8mmZoCeW2ycuMbJCqBkW9CBuwF+VznZvZY2MxwPipvhvEEGP//0M8YAZJ66yQPDv3PTdAP8FYbIrJyvY44vwyncwbslpfHT9jAsrbfr3vuMuWps86dnP462q+0s1TxBfqi8mzo3gdavjHKWVNwohLahLKT+tWeu6DSzQv0YwMjwtkLgF7QRgx3ctIIkloOrnx9nHH1N6y+hxEB89fOlyVDjHhgL5uVtsD5fEdT0FJ2Gc/2nShEMMqIwr1/J9kUq1mNySff/uEe65Q==
ingotronic.ch. 300 IN RRSIG DNSKEY 5 2 300 20150125003700 20141226001657 17430 ingotronic.ch. mEwZjhQqeWksWD0TCnNBrtce4YkWJL3edqL6PvAUu8Fn+Ih437kEs3+pqdkgRsdYQ9HW+lBm/8pWwJlNAv0bi9NykItXMwAUFtncgq+6Pnh3iAM972GXSa5VV4LcGQ5b8CBdHCHiEKDqyPv5Hr5QfYL/FQaWlcNRh4QZZlZNPFA=
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 940 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 61808
;; flags: qr aa rd ra cd ; qd: 1 an: 3 au: 0 ad: 1
;; QUESTIONS:
;; nsec3.ingotronic.ch., type = DS, class = IN
;; ANSWERS:
nsec3.ingotronic.ch. 300 IN DS 16758 7 2 3C8DC02750A1636F829B45D6E6D642866768A9CD40A013AD9D25AB63734FFA13
nsec3.ingotronic.ch. 300 IN DS 16758 7 1 1720FF268E09A2CB63805EC8782D10AAD20E12A5
nsec3.ingotronic.ch. 300 IN RRSIG DS 5 3 300 20150125011134 20141226002644 17430 ingotronic.ch. hNurzlGhlyHbSgezPDuhIrtN9ZMsMXZbKGc7HD5rUuM88wD3fM97NxdzF+2Hi1USvBZ5GsQv63L+lAzf+mFPBoPIFHtTiAv8up7kQKRKmi/EzzkCYd/CC4UYdDZbaUyv7esh7spSOGwjPJNdK831p+MgltoWaYtnSGVMgOKk5mc=
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 305 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 23642
;; flags: qr aa rd ra cd ; qd: 1 an: 4 au: 0 ad: 1
;; QUESTIONS:
;; nsec3.ingotronic.ch., type = DNSKEY, class = IN
;; ANSWERS:
nsec3.ingotronic.ch. 300 IN DNSKEY 257 3 7 AwEAAaBuJTf9oGyeTH3biUkAFLrsYrkodX1H7Snsui4XsDHFCBvs5XYacHbs0Jg0/O51KPjmNnjwMW8SSyDkKqYQ+9uYAf2EQ/pnD/VGQqnV2cw0Vwk/t0E2V4FUCju4pnAoyzZFZXGs1eWbX9JXu++b0Azp+ACq6485qJLzHhWDiIrPoK/SvdbFVRK4s+nPPJLH3NGBbtdz6kPq7aFWYBMoGeAZdN1wsQpcNWUo5eOmaJY53nMc7+rDpAyYlMe/FKwSZdX2ZDd63Qsa6Im4FVUJq/nWLq7tlQ/mWks15uDTQyJy/OWfA0ICCO4N9Fel9rThJNpJWEzOCblvZyBoy405kZk=
nsec3.ingotronic.ch. 300 IN DNSKEY 256 3 7 AwEAAccAWxkTVGZ6UAp0VEozAlYpARhbh6Y6tYOl6Fg3UeBNFFtDQ9fTEEt1NkbnR9u8KkpVN6a67avlYiUN1egDqEwzDU7R1Rw+/USdhm2hqOARmmu3DBgjjX/iXjZLyv310cOGFJZ/smcodlDL4pDAAoPxh/qs6KEBaT0sc1KWcGq3
nsec3.ingotronic.ch. 300 IN RRSIG DNSKEY 7 3 300 20150125001457 20141226000444 16758 nsec3.ingotronic.ch. mXi1ylDi8XkRPup+YlT8GPdYE+P7gb6+/VdAwtodI916IzrkGkOHOTLbnrbAqqJOh0HxVCYXdxovmEcbJKUFKwplrQg3XD7/9Sq4pKU1MhMFEGrm/QPkM4u0mgjQwyToDLGuPHuFyur3FSjO/n54uGhAEft9JOFk/WKtWdCnm2LLyQrpC6herA3efFaI8kZhdoEY02AwihWVJxHasmz7lOoKRgNrkfELU+fN4+V7ISsRfJMyZc6q5PuNeG6vFD0uNE8tpdLJCSMurKYVpelvYqzFIcRTYcIjXwmS+L3DGjupqWMzFZVmpQM62JG3KCCD0ffpnNb0nWoSoHwpSeh/3Q==
nsec3.ingotronic.ch. 300 IN RRSIG DNSKEY 7 3 300 20150125001457 20141226000444 62417 nsec3.ingotronic.ch. PyCrf8T5dAfJzapb1p+kcTALPjDuD2niSaXXo0KeHAunT+6gJicLML2S/ZpiYr7X7Ma4Z0TYqE02qH6pcLYNnSgv9BE8sZO0nRtPekSyTy5nLi4hFADYhjb3UjaB85qmQZcqm64vC/CJhWO4t6Eixg/5MYALw+Qdy5Fo0qy/U5E=
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 958 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 13871
;; flags: qr aa rd ra cd ; qd: 1 an: 3 au: 0 ad: 1
;; QUESTIONS:
;; sub.nsec3.ingotronic.ch., type = DS, class = IN
;; ANSWERS:
sub.nsec3.ingotronic.ch. 300 IN DS 14583 7 2 450CACC87D02E5FF421230909AA852C6FDD2687F884AA44254DD94DA85535077
sub.nsec3.ingotronic.ch. 300 IN DS 14583 7 1 D51C5631497C1D29CA98691288D65554DC02748E
sub.nsec3.ingotronic.ch. 300 IN RRSIG DS 7 4 300 20150125011553 20141226004758 62417 nsec3.ingotronic.ch. YaXJXminnSCzuVyXM/bgnRohbK4kN+wMi8/14ahyigDbBktZ0TWNv3PaYXRE5TFRrnmFRka0TEeCcU4HjQv1goi7BHXvn9VtoAlsi2NrboZOTYt5vo4cFhyPkBPajJWfKtQE4W4AW2CdW6736gKzevMGsJza0ZE+phasic+lwnY=
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 315 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 39441
;; flags: qr aa rd ra cd ; qd: 1 an: 4 au: 0 ad: 1
;; QUESTIONS:
;; sub.nsec3.ingotronic.ch., type = DNSKEY, class = IN
;; ANSWERS:
sub.nsec3.ingotronic.ch. 300 IN DNSKEY 257 3 7 AwEAAfbT4DoA+kmKQSfhaS4IkklDaqgrxdD3OlrG9dctyUcoxignP3hChGSj9cX+ojrGakS4rI6H7oQVhPAdL2ZOr3mcrKgj52kwD+aAsW19nhS4aEahbseRm8Sq3ebt1zefQRezLrDC+3BPzeCMmuZe53bEN01BQpLwJHz86gtibPZ/xFkmSPIXK5AiqqGTULJRKFm8IqNVKvEwZ+OCiT5NH+Wfzidd+DfRjAD/N5TalP863+nZhp5TdoIPcQfxqrsYyv//UewvC/sijmw1uljwXncRNCA8nMKWKZwPFqJft7pGepRPvojSAmnPZjpHhZh+tHYMk4GQpACDJSF+9uCoOXM=
sub.nsec3.ingotronic.ch. 300 IN DNSKEY 256 3 7 AwEAAaxrudePJ21EN1RmgBFOZJG5tL4EBLzvqDwCasrBCCd7A/4cXJ2hGXpWhfmGi6Jw0aE2H9DSQf3Tpky1gIijeq/bwfxT4QIbrfqOn9Qoo0eVhJ5eLadg91vD9zPu9LrsV66dn8WIoeHyXOW6jTweKRVvTg0y3RMgofQwKj4ZLQuD
sub.nsec3.ingotronic.ch. 300 IN RRSIG DNSKEY 7 4 300 20150125004357 20141226000657 14583 sub.nsec3.ingotronic.ch. QbclcvQd9lPzpy8w1Z7g9jSeIHGMAwnHYf1wsi9w/dFaxOWnqKZxSkjbxu8JPq8WzDhGnXlCD/wksK7oAnvr1IStV4jSjh3JQ0JHlvy30c6n2ZEgN1Y6OlUTIH88eaEFEt8zykZKhMNPZcfhh+hqC7hl0oUzgZcA42Tn/U6JNz+DWfQBSJBmAUgzgQFcTnJkR/U9BRoCe19isbBXG2HwrmDNl3PYTudkeJTOEXSuKcTAUdV6twuZ7y+j7uWeqCkXRw9WBzAOQ/bH4x1JSGKt6OZOG5wJ2cdhBVHuR9hLfIJJau8ZgnKjKI2MQ3WWF23ZDMCBILsp3KFPUKEy3tZMKA==
sub.nsec3.ingotronic.ch. 300 IN RRSIG DNSKEY 7 4 300 20150125004357 20141226000657 47588 sub.nsec3.ingotronic.ch. KAsXqPyHIH2Y/iV8QR5JQ/EfUrVfxNeoaTYINar0gtvk84VThpsS/8lhpdwU9NbukXUyD0QZfQm+nF+WIFs4mYPU06tW2Nn0CHiPwBXdA8ZaApVasxbtCmk//BQi9LlRyMriylPUIZeUMLyTTisIffIdTuLBf9xhaYe81uZmpB8=
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 970 bytes
###############################################
testNsec3ClosestEncloserIsInsecureDelegation 0000664 0000000 0000000 00000027324 13020541473 0043274 0 ustar 00root root 0000000 0000000 dnssecjava-1.1.3/src/test/resources/recordings/org_jitsi_dnssec_validator_TestNsec3ValUtils #Date: 2013-08-04T20:43:22+02:00
# This is data for a constructed test: when a zone switches from signed to
# unsigned AND a resolver incorrectly returns data from the delegation point
# (instead of from the delegated child), the zone must be treated as insecure
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 52489
;; flags: qr rd ra ad cd ; qd: 1 an: 3 au: 0 ad: 1
;; QUESTIONS:
;; ., type = DNSKEY, class = IN
;; ANSWERS:
. 162318 IN DNSKEY 257 3 8 AwEAAagAIKlVZrpC6Ia7gEzahOR+9W29euxhJhVVLOyQbSEW0O8gcCjFFVQUTf6v58fLjwBd0YI0EzrAcQqBGCzh/RStIoO8g0NfnfL2MTJRkxoXbfDaUeVPQuYEhg37NZWAJQ9VnMVDxP/VHL496M/QZxkjf5/Efucp2gaDX6RS6CXpoY68LsvPVjR0ZSwzz1apAzvN9dlzEheX7ICJBBtuA6G3LQpzW5hOA2hzCTMjJPJ8LbqF6dsV6DoBQzgul0sGIcGOYl7OyQdXfZ57relSQageu+ipAdTTJ25AsRTAoub8ONGcLmqrAmRLKBP1dfwhYB4N7knNnulqQxA+Uk1ihz0=
. 162318 IN DNSKEY 256 3 8 AwEAAcFTyWsmpTs49Q0FKVepUqft+7+c3elhdsfh+amh+orgWLcitLM1bBBiWe6eymWW0EakLZAG4tej28tyx4f+j37Q9VX+m5NAhO/Y0riQonVWfzxLGymx3Ti5x/x7VKvF5Y5hf5OWv2J7pvEumYFFCtu4glit9T9J85+i3UgqSHqf
. 162318 IN RRSIG DNSKEY 8 0 172800 20130814235959 20130731000000 19036 . UUzEZTh+YdFwAThMqKdbiTJYoOYY2FoAwFanVv47w2lc9NTTz7Fb6wtnj/rb47ZtAdIGcBAlh5AWz1UisSIxW1f3bLXdHyaS6YlAZ8shdw5VMktJXrFlnnu8ibOdA8yADMuLvUARHknh9Ri78Po4CwvEdMA+FYha1YyHgm7j0DeqI2ZuRNhXqjF6p+u4Z9zqXjIDq29pog2eZI0NDUQ0EMpLpDuo0PdbbGh7QRiRjeSJ/Oqfb6FrWCn4J14NS6CctKRaumyHiN+SsGx/W+fCsODLkRb0WAVaAIytzNYT8R666eui0c7hnI4imUDUOC0unyj/396zZ1YWHCUgAyJIGg==
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 736 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 63054
;; flags: qr rd ra ad cd ; qd: 1 an: 2 au: 0 ad: 1
;; QUESTIONS:
;; ch., type = DS, class = IN
;; ANSWERS:
ch. 75918 IN DS 22072 8 2 94E4C1E425B28150D8DD7C974E27E1A933C1D4B51E535177B52DFF3F807A8C94
ch. 75918 IN RRSIG DS 8 1 86400 20130811000000 20130803230000 49656 . oyIAnRmpT1taLwIrZg0/WV3iqMBiWSNjIAXWZkoO9wp+cr0kMeVcrhrXYHAOTqGsL301YtMAT43BAPq9Cq0CZ4sD5K6OFOzo284SigLicuuWo0eEakJFdeYObB/+9wOERyN4iMVryjIl7GMz3D+UgLWrYMWWDDyVbmAm7ZY/3zs=
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 238 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 1681
;; flags: qr rd ra ad cd ; qd: 1 an: 4 au: 0 ad: 1
;; QUESTIONS:
;; ch., type = DNSKEY, class = IN
;; ANSWERS:
ch. 75919 IN DNSKEY 257 3 8 AwEAAeP0/M59JL65K0YWD0W+8k8x1T79hM4W2pi7cx0CxQULRd3udQnf/8ymUbKsPfVDMCXLQwW2evWHRu4B/OKnkRzDQsev7prdJ5UxAHWF4oFsWpGYx+A7WbqllTlmMFkV8bNz6TW6Trl4+RaLirt3ofRUFrJKyKCyNCKkxbtpFO6p6vP5K8V3CW854NndF3D/Xjz0s3nwd3dLwW3XVqi705mhJBvCSeorgsKMcY3PCBG6U5Twj/akb6P8I2nmoGsrIbtmvGk191zV5o4i8RTjk5DI6FcO5GL0J1w9sAiVYfXlN8wdyr90kqO6MGcvSQEItJCTaljyRT53bekbUhdRE50=
ch. 75919 IN DNSKEY 256 3 8 AwEAAaANwH4naX1c6xHWHYuFVHa7PLc9n7BPL8J3sa2LqKuQvQ1aTu3hIYAsO6c5wlDp4Pgw8HejPdEZC/VRBtHkXeWfe84IJ2731IQYjQGyD4rKq/L9VjD9bMlSjj6RtI7t4ItzEPlsSEEmEtXFLt8IDzq0xc2tQcec9PsfvvV5jIWN
ch. 75919 IN DNSKEY 256 3 8 AwEAAdmE6uljIBh3EdgS3jWT87HtnwhYwP/9/ciJH87VtWMSR8jtMqbr2CFWRFdO9sTIuQ27sOwYe24TXbHt2TBUR4EBiDuzVD+Oj7ikYK1hM0LslL0fYfCJZKVM2SCHnsdh2ExZda/o0v+HtVtRdL7MbTADGue+xGQg6MzvavRd8D2p
ch. 75919 IN RRSIG DNSKEY 8 1 86400 20130904100909 20130720090909 22072 ch. 1DIfkQfa6JMWoGs+y6vAwZ4F9Vf698b3hOpSgw3/Y3cdF/GqINRDQqiMi8OzGX5wV38QrBIG4wTCqHLB51VlHh2MHhU6F45eR/oA62LP6mmdIEuuG6hv2RuUj9S09r3eedr34ETjv8mRkydqekOFDqJaDG8t+B5EVku/94FU81x0pma05wEOvl5+IWQ62YqVuuzqd+Zz8+bObx5X74VAATC053XSftqbih0NJ65dWptOyyqs7MCvTXVpyWf5ipkfULexCWi9pjY7EuviTcJjdhwndiURl+uwMyzfMmf5XBREvJE03t/Cd1Xp9Ee3Iot2rXOpbQ83tUw3xqsgtGkfMg==
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 893 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 34393
;; flags: qr rd ra cd ; qd: 1 an: 3 au: 0 ad: 1
;; QUESTIONS:
;; ingotronic.ch., type = DS, class = IN
;; ANSWERS:
ingotronic.ch. 3583 IN DS 6031 5 1 733D0218B571CD617B1A7493564B9FC4F12ADE82
ingotronic.ch. 3583 IN DS 6031 5 2 4A948F2FDADA24686E473EDAC00DCF972584C75E3FAA92C2021B6221449FF87E
ingotronic.ch. 3583 IN RRSIG DS 8 2 3600 20130831110238 20130801120230 27249 ch. rhEK+na/h6EbbDBbOCBb2igPPPnkwKqKsJ1tAn11PLrrOoXkJs3Ke9LM/y6vxebH03H4gCJtS8VAavyzKWM7tzeraZP1oWlK6g855PeAwGyGYxtT6JVvwlwaFXQqLVoLNJy60eTobRQyKy0OqdDRHm0W/frnPPkM/zXLTr5g9pY=
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 288 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 40418
;; flags: qr aa rd ra cd ; qd: 1 an: 4 au: 0 ad: 1
;; QUESTIONS:
;; ingotronic.ch., type = DNSKEY, class = IN
;; ANSWERS:
ingotronic.ch. 300 IN DNSKEY 256 3 5 AwEAAZ2Xh77GFzpEDx7EHYxShqltHgkiG+BOjBGifEmnJhQSdE5/yNSLFNcdhZZ8HUPxYnaedTqJcFFg4AzUsQklF/fECegTJdZjaj2WoL0/I8K7HMfY/hVuRZUWPNglYi8agJRX6gdkFTCpUNI7stpgKqxtzUJhhw15uG/lKMplwqUr
ingotronic.ch. 300 IN DNSKEY 257 3 5 AwEAAeA1vzmjaB+eBAcvhzpKEgAEFpvQ1rg4uKDW6MsQtacKoqBpgyep2+LuWotz5p/xYxj3NGsArwN8Ad5cY0FHRr8miTT0elOv6nvlqGIfRuhj/BXAQ1x4ihpSFslHw0lJMYFwxsUZWpUyjWX/nv1xRZMMwF46gui0N4OEbyTYusCk77D+A71k+K0EAitFIbIH4GCUKmH1H7HmXhSVH9bN/n7KEGwW32lmsuuUcJoRKDkcUvbMXY/9Xoa2quERrUg/rBbDUHowRPjYDS5GzY1+f4YY8s40BufGiqyUTKKXL953MVFK8gmezXA0hbmrnZ7CBOw/7238mORAdzExaX8n7CE=
ingotronic.ch. 300 IN RRSIG DNSKEY 5 2 300 20130902082432 20130803075649 6031 ingotronic.ch. XYDiDlvzokZfrlCk+ZfvBof8cbStGsDqd8YCOtBf/rvnAOWTdV1LGQ1LxE64udTObpKM/+oRgCWFcULnajdwljH2vRw6ZnY/VQAE3QmyNNQHTCQYfOkoYGzUrOQZ9QwTFQaP7FXc/kx0pJwvswhg/cC1WFy/PEM3ydfzYBTSthFxs2G5ZbONUR30jVRq1fjBkjh/+ev6HQZAy8MfIZRM8AvIWEJUOEYJuP8pkwbJaE2Mp70aA6SYULVLLTY9g0LxwtLnv9SpdEOr4w2nz6BQ195BG4Ky6t5vQya2J3LAcpxovooopUMLfM3Tvwarr4Otz2HVAzn95UmA36h5Yvo+WA==
ingotronic.ch. 300 IN RRSIG DNSKEY 5 2 300 20130902082432 20130803075649 17430 ingotronic.ch. jwsrJ+V3kqYu2PTsgEokovbFlT+kLgTCPrw5iVXy5F+iTnwxUt5Mq+RkJ58nuKGdqjLTGZIjSybO1vVRdrMU7xyby17pSI1wc0TE5yeJnXhQQgYLh074bPvVfL4vzslX8Ab8U+JL5zo0/PnrVZhswjJLsrddpzlgGbkTQmcgKiM=
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 940 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 30648
;; flags: qr aa rd ra cd ; qd: 1 an: 3 au: 0 ad: 1
;; QUESTIONS:
;; nsec3.ingotronic.ch., type = DS, class = IN
;; ANSWERS:
nsec3.ingotronic.ch. 300 IN DS 16758 7 2 3C8DC02750A1636F829B45D6E6D642866768A9CD40A013AD9D25AB63734FFA13
nsec3.ingotronic.ch. 300 IN DS 16758 7 1 1720FF268E09A2CB63805EC8782D10AAD20E12A5
nsec3.ingotronic.ch. 300 IN RRSIG DS 5 3 300 20130902081456 20130803072435 17430 ingotronic.ch. ma2SzHd/Al7dZdivV0/D0M616DPN5bYQmUJMERLum+Dhw38Rl2/KbeBUiFsfamyBFsNLuG272Q35rZlOn62tmko/ysg7vttsZwqDsXXurAz53k4+7OISHYJ2kDFaLRxa5rGoKreCQ+YmiCMGGKtuFTtyoZb36Sl3cXbAKJRhIL0=
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 305 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 11577
;; flags: qr aa rd ra cd ; qd: 1 an: 4 au: 0 ad: 1
;; QUESTIONS:
;; nsec3.ingotronic.ch., type = DNSKEY, class = IN
;; ANSWERS:
nsec3.ingotronic.ch. 300 IN DNSKEY 256 3 7 AwEAAccAWxkTVGZ6UAp0VEozAlYpARhbh6Y6tYOl6Fg3UeBNFFtDQ9fTEEt1NkbnR9u8KkpVN6a67avlYiUN1egDqEwzDU7R1Rw+/USdhm2hqOARmmu3DBgjjX/iXjZLyv310cOGFJZ/smcodlDL4pDAAoPxh/qs6KEBaT0sc1KWcGq3
nsec3.ingotronic.ch. 300 IN DNSKEY 257 3 7 AwEAAaBuJTf9oGyeTH3biUkAFLrsYrkodX1H7Snsui4XsDHFCBvs5XYacHbs0Jg0/O51KPjmNnjwMW8SSyDkKqYQ+9uYAf2EQ/pnD/VGQqnV2cw0Vwk/t0E2V4FUCju4pnAoyzZFZXGs1eWbX9JXu++b0Azp+ACq6485qJLzHhWDiIrPoK/SvdbFVRK4s+nPPJLH3NGBbtdz6kPq7aFWYBMoGeAZdN1wsQpcNWUo5eOmaJY53nMc7+rDpAyYlMe/FKwSZdX2ZDd63Qsa6Im4FVUJq/nWLq7tlQ/mWks15uDTQyJy/OWfA0ICCO4N9Fel9rThJNpJWEzOCblvZyBoy405kZk=
nsec3.ingotronic.ch. 300 IN RRSIG DNSKEY 7 3 300 20130903154645 20130804144645 16758 nsec3.ingotronic.ch. emr2IJwIyRsu/o9tX2w3PLYc1Z4u3quRUBfbrWgTbMe02YpCDieyp7+f/IxmRspKvUpEIp+c0pcpIj0oHNL0ve2rfq9n5WPpwaYaJ3KycCFWF+iWwEAzzOyNdxdLwqsLdhN5rTX1lNTexak0czJXa7XXqiqdqLnfFr+xz610UfZ0R/dZdbdwsoUBrGd9bfTg6RCDzO2YJf6TKCT6Yn1s3fDnRYgb8RGCVOO0S6r38hqXxEqLoaNVnj8Qjd3pi1PpKnZf6/xrhV1+cJRoUtl7G1gK9aXwkn93KNqurrvialvw/0vP7OM1+WJauq2mXcdFQ8huQmCHRlm9QRWreorPxQ==
nsec3.ingotronic.ch. 300 IN RRSIG DNSKEY 7 3 300 20130903154645 20130804144645 62417 nsec3.ingotronic.ch. kMYZ2Xsa+n2x9vmiOYIIZqBp5S5IIeZVd6CmQNWY0UeztIhAH1xM2XEAXPbAZ5GqXjwtvWIir4+5S/U0IS4PwNOcTmysOX/jrsZVDDwpoidBoxTjnvD30pqTH9RkuiK9t5FpQYxNLmF8B6T4hK01g+OXC80QzBX4LEu8O4KDJ+8=
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 958 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 14675
;; flags: qr aa rd ra cd ; qd: 1 an: 0 au: 1 ad: 1
;; QUESTIONS:
;; a.unsigned.nsec3.ingotronic.ch., type = A, class = IN
;; ANSWERS:
;; AUTHORITY RECORDS:
S4K4EKRNHMVOBS9FF9M8V911BVL7NDUF.nsec3.ingotronic.ch. 300 IN NSEC3 1 0 10 1234 S5OG9G30J61V17I3RN5MPOG1VDUL8TMS NS
S4K4EKRNHMVOBS9FF9M8V911BVL7NDUF.nsec3.ingotronic.ch. 300 IN RRSIG NSEC3 7 4 300 20130903151143 20130804144753 62417 nsec3.ingotronic.ch. sgwh2RSVYzkVYQJUNd7y/yZZRIMpkscaTgKPFxBSSx+R0Qtl8gfCicRtM4C0XRtPEQdxXLAWGnh1YsqBASpMFNw6nlDBWNQpe6ctBLPLTLcNkCu6Yxi4Y6ouYAHlt/8rJy29mgyqZ1ViOVRAds+Oloomjvg/JDbiOZKw4c/Rsq4=
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 105 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 14675
;; flags: qr aa rd ra cd ; qd: 1 an: 0 au: 1 ad: 1
;; QUESTIONS:
;; unsigned.nsec3.ingotronic.ch., type = DS, class = IN
;; ANSWERS:
unsigned.nsec3.ingotronic.ch. 300 DS 23829 7 1 902429770AEE28DCBC72350E8BC260AFF4F239C5
unsigned.nsec3.ingotronic.ch. 300 DS 23829 7 2 20B0949D09A8FE56C33BE9835B46DE749598FFE20AB4897A1D2ACCCC94A96DF7
unsigned.nsec3.ingotronic.ch. 300 RRSIG DS 7 4 300 20130903175754 20130804175754 62417 nsec3.ingotronic.ch. uERbvGIS0r3tBJy3rGBFc21bE6ySOCE48zhxgM0mJHj3Y4UzGuhSK14cR0cZpCcZXAIvSlYBsJ7UQOu4U6Flf6Ep/Wzm7iitfOvGYfROFrbHVLsDwH06l08UueFSQK8TfueiNo9D+glxhqercts30j6ZEYwcDXE+HcHnQrR7k+o=
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
###############################################
# constructed response here: the NSEC3 is from the delegating zone for the
# child zone
# hash(n=unsigned.nsec3.ingotronic.ch.,it=10,s=1234)=s4k4ekrnhmvobs9ff9m8v911bvl7nduf
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 14675
;; flags: qr aa rd ra cd ; qd: 1 an: 0 au: 1 ad: 1
;; QUESTIONS:
;; a.unsigned.nsec3.ingotronic.ch., type = A, class = IN
;; ANSWERS:
;; AUTHORITY RECORDS:
S4K4EKRNHMVOBS9FF9M8V911BVL7NDUF.nsec3.ingotronic.ch. 300 IN NSEC3 1 0 10 1234 S5OG9G30J61V17I3RN5MPOG1VDUL8TMS NS
S4K4EKRNHMVOBS9FF9M8V911BVL7NDUF.nsec3.ingotronic.ch. 300 IN RRSIG NSEC3 7 4 300 20130903151143 20130804144753 62417 nsec3.ingotronic.ch. sgwh2RSVYzkVYQJUNd7y/yZZRIMpkscaTgKPFxBSSx+R0Qtl8gfCicRtM4C0XRtPEQdxXLAWGnh1YsqBASpMFNw6nlDBWNQpe6ctBLPLTLcNkCu6Yxi4Y6ouYAHlt/8rJy29mgyqZ1ViOVRAds+Oloomjvg/JDbiOZKw4c/Rsq4=
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
###############################################
testNsec3NodataChangedToNxdomainIsBogus 0000664 0000000 0000000 00000045166 13020541473 0042160 0 ustar 00root root 0000000 0000000 dnssecjava-1.1.3/src/test/resources/recordings/org_jitsi_dnssec_validator_TestNsec3ValUtils #Date: 2015-01-06T22:35:29+01:00
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 4070
;; flags: qr aa rd ra cd ; qd: 1 an: 0 au: 4 ad: 1
;; QUESTIONS:
;; a.b.nsec3.ingotronic.ch., type = MX, class = IN
;; ANSWERS:
;; AUTHORITY RECORDS:
nsec3.ingotronic.ch. 300 IN SOA ns1.ingotronic.ch. admin.ingotronic.ch. 2013032932 300 60 864000 300
nsec3.ingotronic.ch. 300 IN RRSIG SOA 7 3 300 20150201003516 20150101233516 62417 nsec3.ingotronic.ch. RMXaAZCkydysBpA4+LWD2frs4CZH2FBxafAolq7MOG62Sw3ellwNcSIh2naMasviin2DU2BAzIYyFUqKJDbUqzTxZQjsM6d5LtgFy5iTNmWum6FnFP5Fz73Zs/9Q0LNEstR82MRRL8EDElADhFySAReavyT/vlSTScQGxx6slyQ=
4FQSC7ORQNKH924CH6L2DOAISKM28080.nsec3.ingotronic.ch. 300 IN NSEC3 1 0 10 1234 5RFQOLI81S6LKQTUG5HLI19UVJNKUL3H A RRSIG
4FQSC7ORQNKH924CH6L2DOAISKM28080.nsec3.ingotronic.ch. 300 IN RRSIG NSEC3 7 4 300 20150125000452 20141225235516 62417 nsec3.ingotronic.ch. CqoGO4BUVNtHXxUXDPRCTvVPGnqBDwrO8Uyw1NKGELf71x5TKQKFZCBmlT8G/aRgK5fu7xor/zldHS+6yR7nfHEwdW2Y+GzpUawe8ul8nL+Z8DNDFTuCxJtnoP82X0u/EsaT63RVPZAP94jFlvOpzr9NN/De33EcNdl7B/EB/J0=
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 537 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 56602
;; flags: qr rd ra ad cd ; qd: 1 an: 4 au: 0 ad: 1
;; QUESTIONS:
;; ., type = DNSKEY, class = IN
;; ANSWERS:
. 87344 IN DNSKEY 256 3 8 AwEAAe3fSrbLBy3LOS7pnxEUhvPZTE2H5dIGsI/UfruI/nOEvWWa/PSX2BFedBkEqOlYdjdNF2f+6lmfk2Od/xu0v5bVqxFE+/24v3hZSlWBxvXzPTAGHrbW/IJYEPqlzVOAS4XdUgHg0N7IbLywNHMvB+Yf+Nm6ctyXXFLV4WTNnzs7
. 87344 IN DNSKEY 256 3 8 AwEAAaPD7Y7XIi1MOEREJNTrRhyqsY3gff6JWzg+XCbqut1sbcbvqyssHw8DT1AkRaAC92pO8xuyq5QEgEPL1IHfABLwpwXI5gTj4gdwi86bpkmlWs9fRpnn4DPDCTdrnxIejJXgClHikLJF3u3CdpNCMijq4CKdQbMlRZ3avv+G7rh7
. 87344 IN DNSKEY 257 3 8 AwEAAagAIKlVZrpC6Ia7gEzahOR+9W29euxhJhVVLOyQbSEW0O8gcCjFFVQUTf6v58fLjwBd0YI0EzrAcQqBGCzh/RStIoO8g0NfnfL2MTJRkxoXbfDaUeVPQuYEhg37NZWAJQ9VnMVDxP/VHL496M/QZxkjf5/Efucp2gaDX6RS6CXpoY68LsvPVjR0ZSwzz1apAzvN9dlzEheX7ICJBBtuA6G3LQpzW5hOA2hzCTMjJPJ8LbqF6dsV6DoBQzgul0sGIcGOYl7OyQdXfZ57relSQageu+ipAdTTJ25AsRTAoub8ONGcLmqrAmRLKBP1dfwhYB4N7knNnulqQxA+Uk1ihz0=
. 87344 IN RRSIG DNSKEY 8 0 172800 20150115235959 20150101000000 19036 . i8cAxD2pvQi1oAyvQxRpDfFlbqPzW+69QQEsDwE1eWOm5AtawO9U7lmsGps7sy/fVNvl1ljKBj4Djp9pb3U2FLogjiIlW0cDAkPmLlG9t+b/pjEfBNlhjANUVN06pvQVAfm+LcF26EaWT6FlISBqb6jSy4BHRa3Bdc4Sx7+pRSYSqVVvYxLkfAWsKPqGkvWhebJDndJJV9syXQXgZ+v/uJ+6XOS43xkAdeL8iBzIs/FlwMTfh3tVe3d0lb65IBBLlCzeQuetX+0Vu1YFcnD0mHc/wS2ZnAV5toAFmyVQBoY/XAZiZeaOkcROJ6Zmqezy7liwK7BqsYyAZntMhk8lbg==
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 883 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 12984
;; flags: qr rd ra ad cd ; qd: 1 an: 2 au: 0 ad: 1
;; QUESTIONS:
;; ch., type = DS, class = IN
;; ANSWERS:
ch. 944 IN DS 46375 8 2 8F96646FC68BB7E4AF4C0750A6096FBC0D4ECDA3D3FA6DA06FDDB42EE50C6CF3
ch. 944 IN RRSIG DS 8 1 86400 20150112170000 20150105160000 16665 . thY7xYWBBxiBjqbQIb9fAG4TmQgnziwM7q6P1T3/ITxmECdvOCQnnZA3uD7qmN8uM0HudsD7+y+zgD3rsH4RSTKdL4kHSI0OnCxToMTvklghEgFDezqIRm8NkWdI2H4Stwrj20nYKSpLQxPI2EE54gs18P3KyO8bAUYv8Qx73xU=
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 238 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 38377
;; flags: qr rd ra ad cd ; qd: 1 an: 4 au: 0 ad: 1
;; QUESTIONS:
;; ch., type = DNSKEY, class = IN
;; ANSWERS:
ch. 945 IN DNSKEY 256 3 8 AwEAAcSLdT0fEmcFmLpeUkAJoeVaHKiu+nbuc43fWlqaCRVf8t2HA4uWxOk0O5ci9nrFTc8nq8oa5fk5Cj7CHh4yrX9qUCfTdIWTyp8BDEdJpS+Dyb0u9wQuVj+nQMj4fLzdQf4TJs3/qxuiLr3nL1UUwlhhXeqSqGVb7p3mtB5HJ8ad
ch. 945 IN DNSKEY 257 3 8 AwEAAb7GhhZ8IAy/AhwmSms5DeQK5ad09wIIplEpYoiAIYXPtJvT1ReFzyfTp/2YP+g/PWDwHPh4qKAHa9x0VgbIQcGAeNakmfkAdWEmCnca323/SAml3mwfaX62G7/uYWae5zh8QTxZKNd+K1yZ5x0IxnI31chSl5xymRbTEHYZDKwSIRFM3fTxUMt93WFaBVWELReYotJBr++rvAWdnlay5TPBTvheLBkaiqtgM4GP8HK07Y+86lsZnEsj5K3G1KTV5SPpa82rqYAwxG9VKbmSE/6/kBR5jJHjt1rRt5Oe7v18aEtw0YCEN4vxq+KuvMoNVqXUsE9LBwHJD+QNwi6wmB0=
ch. 945 IN DNSKEY 256 3 8 AwEAAcsg0kY6fw1wzYMhSAKTy+Y2JzAst66P/1odp9NECJJHbU8f4nwziI3onoFSBV0ZiSZhY1aH5dhdDZ7BkrqhVXSrZPAz0CvzjIxmB1gSOf9DeZvjQvoy97HqYolxsf+B3QQv2RKBT67elF5+JisKg3/dQISelKn8LhabSoVrMlD1
ch. 945 IN RRSIG DNSKEY 8 1 86400 20150127100909 20141212090909 46375 ch. bT8q0FWyeMH0SulNo6UdIIgZYNATwYsee2bikq2Gh339Bufma8eaqWIPYT3XKmxYPBFOw0bVl+kLZxTwbR1CFoCDXoP+qgQhh4mf9qkNiv2CDSc+0FE3FRREn+DAhYTUEuB58FPiPakFB8s8O7T+k2qhDae7jy4/y7Jl1lnjaBY8s7bzOUPhF0KKCNZmvoKwtL23ZdVeTSV1xM3jkiNnpzBKbcoSWECSGJVp1SE0BnRXdwQP41YTXFZ0310YjaTAUCC5qbMIWdEkHjfdSQtKBImnc85mkapq9w++XQ4zhauPWBtrPV3CcoCahjUaWdjrKVkibomlJZaN8MEO23CfQw==
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 893 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 43754
;; flags: qr rd ra cd ; qd: 1 an: 3 au: 0 ad: 1
;; QUESTIONS:
;; ingotronic.ch., type = DS, class = IN
;; ANSWERS:
ingotronic.ch. 3553 IN DS 6031 5 2 4A948F2FDADA24686E473EDAC00DCF972584C75E3FAA92C2021B6221449FF87E
ingotronic.ch. 3553 IN DS 6031 5 1 733D0218B571CD617B1A7493564B9FC4F12ADE82
ingotronic.ch. 3553 IN RRSIG DS 8 2 3600 20150129033614 20150105123019 60789 ch. rVPJP2HhzW7OkroK2axFj5Lb4iVWCH8Fp/Iq1rF952NDo72b8RiKje2RaAKJAGQ+wd0YgE+PAej04GCmkhlDJA/zvPeeTxuhy3HbJzReMlQ7fjyH+wW1hli+FuIYvogXWf7nO/9VyPORt8X/f/pjrOr3Vlj9sGLN8TGYpEuVSw4=
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 288 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 10069
;; flags: qr aa rd ra cd ; qd: 1 an: 4 au: 0 ad: 1
;; QUESTIONS:
;; ingotronic.ch., type = DNSKEY, class = IN
;; ANSWERS:
ingotronic.ch. 300 IN DNSKEY 257 3 5 AwEAAeA1vzmjaB+eBAcvhzpKEgAEFpvQ1rg4uKDW6MsQtacKoqBpgyep2+LuWotz5p/xYxj3NGsArwN8Ad5cY0FHRr8miTT0elOv6nvlqGIfRuhj/BXAQ1x4ihpSFslHw0lJMYFwxsUZWpUyjWX/nv1xRZMMwF46gui0N4OEbyTYusCk77D+A71k+K0EAitFIbIH4GCUKmH1H7HmXhSVH9bN/n7KEGwW32lmsuuUcJoRKDkcUvbMXY/9Xoa2quERrUg/rBbDUHowRPjYDS5GzY1+f4YY8s40BufGiqyUTKKXL953MVFK8gmezXA0hbmrnZ7CBOw/7238mORAdzExaX8n7CE=
ingotronic.ch. 300 IN DNSKEY 256 3 5 AwEAAZ2Xh77GFzpEDx7EHYxShqltHgkiG+BOjBGifEmnJhQSdE5/yNSLFNcdhZZ8HUPxYnaedTqJcFFg4AzUsQklF/fECegTJdZjaj2WoL0/I8K7HMfY/hVuRZUWPNglYi8agJRX6gdkFTCpUNI7stpgKqxtzUJhhw15uG/lKMplwqUr
ingotronic.ch. 300 IN RRSIG DNSKEY 5 2 300 20150125003700 20141226001657 6031 ingotronic.ch. rs1QlP2SlSpA2ELbzwg3DgWLzXWL3Lpv6CUJE2Q0qH2Zp7Qdy3cD+ZEtNh9v24Qv1M6JJ3zFt8mmZoCeW2ycuMbJCqBkW9CBuwF+VznZvZY2MxwPipvhvEEGP//0M8YAZJ66yQPDv3PTdAP8FYbIrJyvY44vwyncwbslpfHT9jAsrbfr3vuMuWps86dnP462q+0s1TxBfqi8mzo3gdavjHKWVNwohLahLKT+tWeu6DSzQv0YwMjwtkLgF7QRgx3ctIIkloOrnx9nHH1N6y+hxEB89fOlyVDjHhgL5uVtsD5fEdT0FJ2Gc/2nShEMMqIwr1/J9kUq1mNySff/uEe65Q==
ingotronic.ch. 300 IN RRSIG DNSKEY 5 2 300 20150125003700 20141226001657 17430 ingotronic.ch. mEwZjhQqeWksWD0TCnNBrtce4YkWJL3edqL6PvAUu8Fn+Ih437kEs3+pqdkgRsdYQ9HW+lBm/8pWwJlNAv0bi9NykItXMwAUFtncgq+6Pnh3iAM972GXSa5VV4LcGQ5b8CBdHCHiEKDqyPv5Hr5QfYL/FQaWlcNRh4QZZlZNPFA=
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 940 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 38115
;; flags: qr aa rd ra cd ; qd: 1 an: 3 au: 0 ad: 1
;; QUESTIONS:
;; nsec3.ingotronic.ch., type = DS, class = IN
;; ANSWERS:
nsec3.ingotronic.ch. 300 IN DS 16758 7 1 1720FF268E09A2CB63805EC8782D10AAD20E12A5
nsec3.ingotronic.ch. 300 IN DS 16758 7 2 3C8DC02750A1636F829B45D6E6D642866768A9CD40A013AD9D25AB63734FFA13
nsec3.ingotronic.ch. 300 IN RRSIG DS 5 3 300 20150125011134 20141226002644 17430 ingotronic.ch. hNurzlGhlyHbSgezPDuhIrtN9ZMsMXZbKGc7HD5rUuM88wD3fM97NxdzF+2Hi1USvBZ5GsQv63L+lAzf+mFPBoPIFHtTiAv8up7kQKRKmi/EzzkCYd/CC4UYdDZbaUyv7esh7spSOGwjPJNdK831p+MgltoWaYtnSGVMgOKk5mc=
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 305 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 25812
;; flags: qr aa rd ra cd ; qd: 1 an: 4 au: 0 ad: 1
;; QUESTIONS:
;; nsec3.ingotronic.ch., type = DNSKEY, class = IN
;; ANSWERS:
nsec3.ingotronic.ch. 300 IN DNSKEY 257 3 7 AwEAAaBuJTf9oGyeTH3biUkAFLrsYrkodX1H7Snsui4XsDHFCBvs5XYacHbs0Jg0/O51KPjmNnjwMW8SSyDkKqYQ+9uYAf2EQ/pnD/VGQqnV2cw0Vwk/t0E2V4FUCju4pnAoyzZFZXGs1eWbX9JXu++b0Azp+ACq6485qJLzHhWDiIrPoK/SvdbFVRK4s+nPPJLH3NGBbtdz6kPq7aFWYBMoGeAZdN1wsQpcNWUo5eOmaJY53nMc7+rDpAyYlMe/FKwSZdX2ZDd63Qsa6Im4FVUJq/nWLq7tlQ/mWks15uDTQyJy/OWfA0ICCO4N9Fel9rThJNpJWEzOCblvZyBoy405kZk=
nsec3.ingotronic.ch. 300 IN DNSKEY 256 3 7 AwEAAccAWxkTVGZ6UAp0VEozAlYpARhbh6Y6tYOl6Fg3UeBNFFtDQ9fTEEt1NkbnR9u8KkpVN6a67avlYiUN1egDqEwzDU7R1Rw+/USdhm2hqOARmmu3DBgjjX/iXjZLyv310cOGFJZ/smcodlDL4pDAAoPxh/qs6KEBaT0sc1KWcGq3
nsec3.ingotronic.ch. 300 IN RRSIG DNSKEY 7 3 300 20150125001457 20141226000444 16758 nsec3.ingotronic.ch. mXi1ylDi8XkRPup+YlT8GPdYE+P7gb6+/VdAwtodI916IzrkGkOHOTLbnrbAqqJOh0HxVCYXdxovmEcbJKUFKwplrQg3XD7/9Sq4pKU1MhMFEGrm/QPkM4u0mgjQwyToDLGuPHuFyur3FSjO/n54uGhAEft9JOFk/WKtWdCnm2LLyQrpC6herA3efFaI8kZhdoEY02AwihWVJxHasmz7lOoKRgNrkfELU+fN4+V7ISsRfJMyZc6q5PuNeG6vFD0uNE8tpdLJCSMurKYVpelvYqzFIcRTYcIjXwmS+L3DGjupqWMzFZVmpQM62JG3KCCD0ffpnNb0nWoSoHwpSeh/3Q==
nsec3.ingotronic.ch. 300 IN RRSIG DNSKEY 7 3 300 20150125001457 20141226000444 62417 nsec3.ingotronic.ch. PyCrf8T5dAfJzapb1p+kcTALPjDuD2niSaXXo0KeHAunT+6gJicLML2S/ZpiYr7X7Ma4Z0TYqE02qH6pcLYNnSgv9BE8sZO0nRtPekSyTy5nLi4hFADYhjb3UjaB85qmQZcqm64vC/CJhWO4t6Eixg/5MYALw+Qdy5Fo0qy/U5E=
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 958 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 56275
;; flags: qr rd ra ad cd ; qd: 1 an: 4 au: 0 ad: 1
;; QUESTIONS:
;; ., type = DNSKEY, class = IN
;; ANSWERS:
. 87344 IN DNSKEY 256 3 8 AwEAAaPD7Y7XIi1MOEREJNTrRhyqsY3gff6JWzg+XCbqut1sbcbvqyssHw8DT1AkRaAC92pO8xuyq5QEgEPL1IHfABLwpwXI5gTj4gdwi86bpkmlWs9fRpnn4DPDCTdrnxIejJXgClHikLJF3u3CdpNCMijq4CKdQbMlRZ3avv+G7rh7
. 87344 IN DNSKEY 256 3 8 AwEAAe3fSrbLBy3LOS7pnxEUhvPZTE2H5dIGsI/UfruI/nOEvWWa/PSX2BFedBkEqOlYdjdNF2f+6lmfk2Od/xu0v5bVqxFE+/24v3hZSlWBxvXzPTAGHrbW/IJYEPqlzVOAS4XdUgHg0N7IbLywNHMvB+Yf+Nm6ctyXXFLV4WTNnzs7
. 87344 IN DNSKEY 257 3 8 AwEAAagAIKlVZrpC6Ia7gEzahOR+9W29euxhJhVVLOyQbSEW0O8gcCjFFVQUTf6v58fLjwBd0YI0EzrAcQqBGCzh/RStIoO8g0NfnfL2MTJRkxoXbfDaUeVPQuYEhg37NZWAJQ9VnMVDxP/VHL496M/QZxkjf5/Efucp2gaDX6RS6CXpoY68LsvPVjR0ZSwzz1apAzvN9dlzEheX7ICJBBtuA6G3LQpzW5hOA2hzCTMjJPJ8LbqF6dsV6DoBQzgul0sGIcGOYl7OyQdXfZ57relSQageu+ipAdTTJ25AsRTAoub8ONGcLmqrAmRLKBP1dfwhYB4N7knNnulqQxA+Uk1ihz0=
. 87344 IN RRSIG DNSKEY 8 0 172800 20150115235959 20150101000000 19036 . i8cAxD2pvQi1oAyvQxRpDfFlbqPzW+69QQEsDwE1eWOm5AtawO9U7lmsGps7sy/fVNvl1ljKBj4Djp9pb3U2FLogjiIlW0cDAkPmLlG9t+b/pjEfBNlhjANUVN06pvQVAfm+LcF26EaWT6FlISBqb6jSy4BHRa3Bdc4Sx7+pRSYSqVVvYxLkfAWsKPqGkvWhebJDndJJV9syXQXgZ+v/uJ+6XOS43xkAdeL8iBzIs/FlwMTfh3tVe3d0lb65IBBLlCzeQuetX+0Vu1YFcnD0mHc/wS2ZnAV5toAFmyVQBoY/XAZiZeaOkcROJ6Zmqezy7liwK7BqsYyAZntMhk8lbg==
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 883 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 43002
;; flags: qr rd ra ad cd ; qd: 1 an: 2 au: 0 ad: 1
;; QUESTIONS:
;; ch., type = DS, class = IN
;; ANSWERS:
ch. 944 IN DS 46375 8 2 8F96646FC68BB7E4AF4C0750A6096FBC0D4ECDA3D3FA6DA06FDDB42EE50C6CF3
ch. 944 IN RRSIG DS 8 1 86400 20150112170000 20150105160000 16665 . thY7xYWBBxiBjqbQIb9fAG4TmQgnziwM7q6P1T3/ITxmECdvOCQnnZA3uD7qmN8uM0HudsD7+y+zgD3rsH4RSTKdL4kHSI0OnCxToMTvklghEgFDezqIRm8NkWdI2H4Stwrj20nYKSpLQxPI2EE54gs18P3KyO8bAUYv8Qx73xU=
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 238 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 4041
;; flags: qr rd ra ad cd ; qd: 1 an: 4 au: 0 ad: 1
;; QUESTIONS:
;; ch., type = DNSKEY, class = IN
;; ANSWERS:
ch. 944 IN DNSKEY 256 3 8 AwEAAcSLdT0fEmcFmLpeUkAJoeVaHKiu+nbuc43fWlqaCRVf8t2HA4uWxOk0O5ci9nrFTc8nq8oa5fk5Cj7CHh4yrX9qUCfTdIWTyp8BDEdJpS+Dyb0u9wQuVj+nQMj4fLzdQf4TJs3/qxuiLr3nL1UUwlhhXeqSqGVb7p3mtB5HJ8ad
ch. 944 IN DNSKEY 256 3 8 AwEAAcsg0kY6fw1wzYMhSAKTy+Y2JzAst66P/1odp9NECJJHbU8f4nwziI3onoFSBV0ZiSZhY1aH5dhdDZ7BkrqhVXSrZPAz0CvzjIxmB1gSOf9DeZvjQvoy97HqYolxsf+B3QQv2RKBT67elF5+JisKg3/dQISelKn8LhabSoVrMlD1
ch. 944 IN DNSKEY 257 3 8 AwEAAb7GhhZ8IAy/AhwmSms5DeQK5ad09wIIplEpYoiAIYXPtJvT1ReFzyfTp/2YP+g/PWDwHPh4qKAHa9x0VgbIQcGAeNakmfkAdWEmCnca323/SAml3mwfaX62G7/uYWae5zh8QTxZKNd+K1yZ5x0IxnI31chSl5xymRbTEHYZDKwSIRFM3fTxUMt93WFaBVWELReYotJBr++rvAWdnlay5TPBTvheLBkaiqtgM4GP8HK07Y+86lsZnEsj5K3G1KTV5SPpa82rqYAwxG9VKbmSE/6/kBR5jJHjt1rRt5Oe7v18aEtw0YCEN4vxq+KuvMoNVqXUsE9LBwHJD+QNwi6wmB0=
ch. 944 IN RRSIG DNSKEY 8 1 86400 20150127100909 20141212090909 46375 ch. bT8q0FWyeMH0SulNo6UdIIgZYNATwYsee2bikq2Gh339Bufma8eaqWIPYT3XKmxYPBFOw0bVl+kLZxTwbR1CFoCDXoP+qgQhh4mf9qkNiv2CDSc+0FE3FRREn+DAhYTUEuB58FPiPakFB8s8O7T+k2qhDae7jy4/y7Jl1lnjaBY8s7bzOUPhF0KKCNZmvoKwtL23ZdVeTSV1xM3jkiNnpzBKbcoSWECSGJVp1SE0BnRXdwQP41YTXFZ0310YjaTAUCC5qbMIWdEkHjfdSQtKBImnc85mkapq9w++XQ4zhauPWBtrPV3CcoCahjUaWdjrKVkibomlJZaN8MEO23CfQw==
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 893 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 1277
;; flags: qr rd ra cd ; qd: 1 an: 3 au: 0 ad: 1
;; QUESTIONS:
;; ingotronic.ch., type = DS, class = IN
;; ANSWERS:
ingotronic.ch. 3552 IN DS 6031 5 1 733D0218B571CD617B1A7493564B9FC4F12ADE82
ingotronic.ch. 3552 IN DS 6031 5 2 4A948F2FDADA24686E473EDAC00DCF972584C75E3FAA92C2021B6221449FF87E
ingotronic.ch. 3552 IN RRSIG DS 8 2 3600 20150129033614 20150105123019 60789 ch. rVPJP2HhzW7OkroK2axFj5Lb4iVWCH8Fp/Iq1rF952NDo72b8RiKje2RaAKJAGQ+wd0YgE+PAej04GCmkhlDJA/zvPeeTxuhy3HbJzReMlQ7fjyH+wW1hli+FuIYvogXWf7nO/9VyPORt8X/f/pjrOr3Vlj9sGLN8TGYpEuVSw4=
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 288 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 3516
;; flags: qr aa rd ra cd ; qd: 1 an: 4 au: 0 ad: 1
;; QUESTIONS:
;; ingotronic.ch., type = DNSKEY, class = IN
;; ANSWERS:
ingotronic.ch. 300 IN DNSKEY 257 3 5 AwEAAeA1vzmjaB+eBAcvhzpKEgAEFpvQ1rg4uKDW6MsQtacKoqBpgyep2+LuWotz5p/xYxj3NGsArwN8Ad5cY0FHRr8miTT0elOv6nvlqGIfRuhj/BXAQ1x4ihpSFslHw0lJMYFwxsUZWpUyjWX/nv1xRZMMwF46gui0N4OEbyTYusCk77D+A71k+K0EAitFIbIH4GCUKmH1H7HmXhSVH9bN/n7KEGwW32lmsuuUcJoRKDkcUvbMXY/9Xoa2quERrUg/rBbDUHowRPjYDS5GzY1+f4YY8s40BufGiqyUTKKXL953MVFK8gmezXA0hbmrnZ7CBOw/7238mORAdzExaX8n7CE=
ingotronic.ch. 300 IN DNSKEY 256 3 5 AwEAAZ2Xh77GFzpEDx7EHYxShqltHgkiG+BOjBGifEmnJhQSdE5/yNSLFNcdhZZ8HUPxYnaedTqJcFFg4AzUsQklF/fECegTJdZjaj2WoL0/I8K7HMfY/hVuRZUWPNglYi8agJRX6gdkFTCpUNI7stpgKqxtzUJhhw15uG/lKMplwqUr
ingotronic.ch. 300 IN RRSIG DNSKEY 5 2 300 20150125003700 20141226001657 6031 ingotronic.ch. rs1QlP2SlSpA2ELbzwg3DgWLzXWL3Lpv6CUJE2Q0qH2Zp7Qdy3cD+ZEtNh9v24Qv1M6JJ3zFt8mmZoCeW2ycuMbJCqBkW9CBuwF+VznZvZY2MxwPipvhvEEGP//0M8YAZJ66yQPDv3PTdAP8FYbIrJyvY44vwyncwbslpfHT9jAsrbfr3vuMuWps86dnP462q+0s1TxBfqi8mzo3gdavjHKWVNwohLahLKT+tWeu6DSzQv0YwMjwtkLgF7QRgx3ctIIkloOrnx9nHH1N6y+hxEB89fOlyVDjHhgL5uVtsD5fEdT0FJ2Gc/2nShEMMqIwr1/J9kUq1mNySff/uEe65Q==
ingotronic.ch. 300 IN RRSIG DNSKEY 5 2 300 20150125003700 20141226001657 17430 ingotronic.ch. mEwZjhQqeWksWD0TCnNBrtce4YkWJL3edqL6PvAUu8Fn+Ih437kEs3+pqdkgRsdYQ9HW+lBm/8pWwJlNAv0bi9NykItXMwAUFtncgq+6Pnh3iAM972GXSa5VV4LcGQ5b8CBdHCHiEKDqyPv5Hr5QfYL/FQaWlcNRh4QZZlZNPFA=
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 940 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 25335
;; flags: qr aa rd ra cd ; qd: 1 an: 3 au: 0 ad: 1
;; QUESTIONS:
;; nsec3.ingotronic.ch., type = DS, class = IN
;; ANSWERS:
nsec3.ingotronic.ch. 300 IN DS 16758 7 2 3C8DC02750A1636F829B45D6E6D642866768A9CD40A013AD9D25AB63734FFA13
nsec3.ingotronic.ch. 300 IN DS 16758 7 1 1720FF268E09A2CB63805EC8782D10AAD20E12A5
nsec3.ingotronic.ch. 300 IN RRSIG DS 5 3 300 20150125011134 20141226002644 17430 ingotronic.ch. hNurzlGhlyHbSgezPDuhIrtN9ZMsMXZbKGc7HD5rUuM88wD3fM97NxdzF+2Hi1USvBZ5GsQv63L+lAzf+mFPBoPIFHtTiAv8up7kQKRKmi/EzzkCYd/CC4UYdDZbaUyv7esh7spSOGwjPJNdK831p+MgltoWaYtnSGVMgOKk5mc=
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 305 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 44320
;; flags: qr aa rd ra cd ; qd: 1 an: 4 au: 0 ad: 1
;; QUESTIONS:
;; nsec3.ingotronic.ch., type = DNSKEY, class = IN
;; ANSWERS:
nsec3.ingotronic.ch. 300 IN DNSKEY 256 3 7 AwEAAccAWxkTVGZ6UAp0VEozAlYpARhbh6Y6tYOl6Fg3UeBNFFtDQ9fTEEt1NkbnR9u8KkpVN6a67avlYiUN1egDqEwzDU7R1Rw+/USdhm2hqOARmmu3DBgjjX/iXjZLyv310cOGFJZ/smcodlDL4pDAAoPxh/qs6KEBaT0sc1KWcGq3
nsec3.ingotronic.ch. 300 IN DNSKEY 257 3 7 AwEAAaBuJTf9oGyeTH3biUkAFLrsYrkodX1H7Snsui4XsDHFCBvs5XYacHbs0Jg0/O51KPjmNnjwMW8SSyDkKqYQ+9uYAf2EQ/pnD/VGQqnV2cw0Vwk/t0E2V4FUCju4pnAoyzZFZXGs1eWbX9JXu++b0Azp+ACq6485qJLzHhWDiIrPoK/SvdbFVRK4s+nPPJLH3NGBbtdz6kPq7aFWYBMoGeAZdN1wsQpcNWUo5eOmaJY53nMc7+rDpAyYlMe/FKwSZdX2ZDd63Qsa6Im4FVUJq/nWLq7tlQ/mWks15uDTQyJy/OWfA0ICCO4N9Fel9rThJNpJWEzOCblvZyBoy405kZk=
nsec3.ingotronic.ch. 300 IN RRSIG DNSKEY 7 3 300 20150125001457 20141226000444 16758 nsec3.ingotronic.ch. mXi1ylDi8XkRPup+YlT8GPdYE+P7gb6+/VdAwtodI916IzrkGkOHOTLbnrbAqqJOh0HxVCYXdxovmEcbJKUFKwplrQg3XD7/9Sq4pKU1MhMFEGrm/QPkM4u0mgjQwyToDLGuPHuFyur3FSjO/n54uGhAEft9JOFk/WKtWdCnm2LLyQrpC6herA3efFaI8kZhdoEY02AwihWVJxHasmz7lOoKRgNrkfELU+fN4+V7ISsRfJMyZc6q5PuNeG6vFD0uNE8tpdLJCSMurKYVpelvYqzFIcRTYcIjXwmS+L3DGjupqWMzFZVmpQM62JG3KCCD0ffpnNb0nWoSoHwpSeh/3Q==
nsec3.ingotronic.ch. 300 IN RRSIG DNSKEY 7 3 300 20150125001457 20141226000444 62417 nsec3.ingotronic.ch. PyCrf8T5dAfJzapb1p+kcTALPjDuD2niSaXXo0KeHAunT+6gJicLML2S/ZpiYr7X7Ma4Z0TYqE02qH6pcLYNnSgv9BE8sZO0nRtPekSyTy5nLi4hFADYhjb3UjaB85qmQZcqm64vC/CJhWO4t6Eixg/5MYALw+Qdy5Fo0qy/U5E=
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 958 bytes
###############################################
testNsec3WithoutClosestEncloser 0000664 0000000 0000000 00000046760 13020541473 0040677 0 ustar 00root root 0000000 0000000 dnssecjava-1.1.3/src/test/resources/recordings/org_jitsi_dnssec_validator_TestNsec3ValUtils #Date: 2015-01-06T22:35:28+01:00
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 10035
;; flags: qr aa rd ra cd ; qd: 1 an: 0 au: 8 ad: 1
;; QUESTIONS:
;; gibtsnicht.gibtsnicht.nsec3.ingotronic.ch., type = A, class = IN
;; ANSWERS:
;; AUTHORITY RECORDS:
nsec3.ingotronic.ch. 300 IN SOA ns1.ingotronic.ch. admin.ingotronic.ch. 2013032932 300 60 864000 300
nsec3.ingotronic.ch. 300 IN RRSIG SOA 7 3 300 20150201003516 20150101233516 62417 nsec3.ingotronic.ch. RMXaAZCkydysBpA4+LWD2frs4CZH2FBxafAolq7MOG62Sw3ellwNcSIh2naMasviin2DU2BAzIYyFUqKJDbUqzTxZQjsM6d5LtgFy5iTNmWum6FnFP5Fz73Zs/9Q0LNEstR82MRRL8EDElADhFySAReavyT/vlSTScQGxx6slyQ=
NTV3QJT4VQDVBPB6BNOVM40NMKJ3H29P.nsec3.ingotronic.ch. 300 IN NSEC3 1 0 10 1234 O275F9OLQ9HNCER7U4SMD4V8AG7IPML9 A NS SOA RRSIG DNSKEY NSEC3PARAM
NTV3QJT4VQDVBPB6BNOVM40NMKJ3H29P.nsec3.ingotronic.ch. 300 IN RRSIG NSEC3 7 4 300 20150131235629 20150101233516 62417 nsec3.ingotronic.ch. xccCvQs/b3ndBUo6J2FbaCzDMg+LB1e4OWeI29VTBWcmfbuD3rZvneRdbA9B5AluJH1ar10xxdrt/+RSuhSWC70LswkdPDg4vshmCZMDeMCOJYFEkGR0UgcZUMynU6EewEDLVLgYtBkJmspeuZNMBMPk/ZUOolCElrkHfbUA1Cc=
UDUMPS9J6F8348HFHH2FAED6I9DDE0U6.nsec3.ingotronic.ch. 300 IN NSEC3 1 0 10 1234 0UPHA6GQV03I7D8EJUDKC30I0C6I1G1Q
UDUMPS9J6F8348HFHH2FAED6I9DDE0U6.nsec3.ingotronic.ch. 300 IN RRSIG NSEC3 7 4 300 20150125005926 20141226002759 62417 nsec3.ingotronic.ch. XV2q9ufbwzauD/tmjb2EKsNBF+kHQYL0/MNb6ivY1oH9Q2hzQNPUuHkUl1db2erDFodPvspmDk6p6WOXoV6wmmaYhN+JI1TQKYYThsnKC1bkt1h6QyjwsDc12d8HVHOopvoXpaYWoV4bbghsAylGVqRjEYyt8JtR3BPfphehloU=
L40SJG7ANKROIHCT5RA6C8CTKJ91CD3N.nsec3.ingotronic.ch. 300 IN NSEC3 1 0 10 1234 ND3HQPFBN314KVB64L6T40JF75US8HKT
L40SJG7ANKROIHCT5RA6C8CTKJ91CD3N.nsec3.ingotronic.ch. 300 IN RRSIG NSEC3 7 4 300 20150125005926 20141226002759 62417 nsec3.ingotronic.ch. v6NHEWwb2KxRGRPshC2KFoxJs4Mis3OmvncJmn5bIWBnzeTY4x75tsE4zlVPx9rp0rjmOAQsYn4KGtIFPUShDHNHy45qoOtKkvRzRgByx4K2l5Rq9OizQVYsEUUScXEYATilaDU9whifF0vPk7YPwFGRmiY3prCGAvY/jH4hQUM=
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 1060 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 48118
;; flags: qr rd ra ad cd ; qd: 1 an: 4 au: 0 ad: 1
;; QUESTIONS:
;; ., type = DNSKEY, class = IN
;; ANSWERS:
. 87346 IN DNSKEY 256 3 8 AwEAAaPD7Y7XIi1MOEREJNTrRhyqsY3gff6JWzg+XCbqut1sbcbvqyssHw8DT1AkRaAC92pO8xuyq5QEgEPL1IHfABLwpwXI5gTj4gdwi86bpkmlWs9fRpnn4DPDCTdrnxIejJXgClHikLJF3u3CdpNCMijq4CKdQbMlRZ3avv+G7rh7
. 87346 IN DNSKEY 256 3 8 AwEAAe3fSrbLBy3LOS7pnxEUhvPZTE2H5dIGsI/UfruI/nOEvWWa/PSX2BFedBkEqOlYdjdNF2f+6lmfk2Od/xu0v5bVqxFE+/24v3hZSlWBxvXzPTAGHrbW/IJYEPqlzVOAS4XdUgHg0N7IbLywNHMvB+Yf+Nm6ctyXXFLV4WTNnzs7
. 87346 IN DNSKEY 257 3 8 AwEAAagAIKlVZrpC6Ia7gEzahOR+9W29euxhJhVVLOyQbSEW0O8gcCjFFVQUTf6v58fLjwBd0YI0EzrAcQqBGCzh/RStIoO8g0NfnfL2MTJRkxoXbfDaUeVPQuYEhg37NZWAJQ9VnMVDxP/VHL496M/QZxkjf5/Efucp2gaDX6RS6CXpoY68LsvPVjR0ZSwzz1apAzvN9dlzEheX7ICJBBtuA6G3LQpzW5hOA2hzCTMjJPJ8LbqF6dsV6DoBQzgul0sGIcGOYl7OyQdXfZ57relSQageu+ipAdTTJ25AsRTAoub8ONGcLmqrAmRLKBP1dfwhYB4N7knNnulqQxA+Uk1ihz0=
. 87346 IN RRSIG DNSKEY 8 0 172800 20150115235959 20150101000000 19036 . i8cAxD2pvQi1oAyvQxRpDfFlbqPzW+69QQEsDwE1eWOm5AtawO9U7lmsGps7sy/fVNvl1ljKBj4Djp9pb3U2FLogjiIlW0cDAkPmLlG9t+b/pjEfBNlhjANUVN06pvQVAfm+LcF26EaWT6FlISBqb6jSy4BHRa3Bdc4Sx7+pRSYSqVVvYxLkfAWsKPqGkvWhebJDndJJV9syXQXgZ+v/uJ+6XOS43xkAdeL8iBzIs/FlwMTfh3tVe3d0lb65IBBLlCzeQuetX+0Vu1YFcnD0mHc/wS2ZnAV5toAFmyVQBoY/XAZiZeaOkcROJ6Zmqezy7liwK7BqsYyAZntMhk8lbg==
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 883 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 30744
;; flags: qr rd ra ad cd ; qd: 1 an: 2 au: 0 ad: 1
;; QUESTIONS:
;; ch., type = DS, class = IN
;; ANSWERS:
ch. 946 IN DS 46375 8 2 8F96646FC68BB7E4AF4C0750A6096FBC0D4ECDA3D3FA6DA06FDDB42EE50C6CF3
ch. 946 IN RRSIG DS 8 1 86400 20150112170000 20150105160000 16665 . thY7xYWBBxiBjqbQIb9fAG4TmQgnziwM7q6P1T3/ITxmECdvOCQnnZA3uD7qmN8uM0HudsD7+y+zgD3rsH4RSTKdL4kHSI0OnCxToMTvklghEgFDezqIRm8NkWdI2H4Stwrj20nYKSpLQxPI2EE54gs18P3KyO8bAUYv8Qx73xU=
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 238 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 54353
;; flags: qr rd ra ad cd ; qd: 1 an: 4 au: 0 ad: 1
;; QUESTIONS:
;; ch., type = DNSKEY, class = IN
;; ANSWERS:
ch. 946 IN DNSKEY 256 3 8 AwEAAcSLdT0fEmcFmLpeUkAJoeVaHKiu+nbuc43fWlqaCRVf8t2HA4uWxOk0O5ci9nrFTc8nq8oa5fk5Cj7CHh4yrX9qUCfTdIWTyp8BDEdJpS+Dyb0u9wQuVj+nQMj4fLzdQf4TJs3/qxuiLr3nL1UUwlhhXeqSqGVb7p3mtB5HJ8ad
ch. 946 IN DNSKEY 257 3 8 AwEAAb7GhhZ8IAy/AhwmSms5DeQK5ad09wIIplEpYoiAIYXPtJvT1ReFzyfTp/2YP+g/PWDwHPh4qKAHa9x0VgbIQcGAeNakmfkAdWEmCnca323/SAml3mwfaX62G7/uYWae5zh8QTxZKNd+K1yZ5x0IxnI31chSl5xymRbTEHYZDKwSIRFM3fTxUMt93WFaBVWELReYotJBr++rvAWdnlay5TPBTvheLBkaiqtgM4GP8HK07Y+86lsZnEsj5K3G1KTV5SPpa82rqYAwxG9VKbmSE/6/kBR5jJHjt1rRt5Oe7v18aEtw0YCEN4vxq+KuvMoNVqXUsE9LBwHJD+QNwi6wmB0=
ch. 946 IN DNSKEY 256 3 8 AwEAAcsg0kY6fw1wzYMhSAKTy+Y2JzAst66P/1odp9NECJJHbU8f4nwziI3onoFSBV0ZiSZhY1aH5dhdDZ7BkrqhVXSrZPAz0CvzjIxmB1gSOf9DeZvjQvoy97HqYolxsf+B3QQv2RKBT67elF5+JisKg3/dQISelKn8LhabSoVrMlD1
ch. 946 IN RRSIG DNSKEY 8 1 86400 20150127100909 20141212090909 46375 ch. bT8q0FWyeMH0SulNo6UdIIgZYNATwYsee2bikq2Gh339Bufma8eaqWIPYT3XKmxYPBFOw0bVl+kLZxTwbR1CFoCDXoP+qgQhh4mf9qkNiv2CDSc+0FE3FRREn+DAhYTUEuB58FPiPakFB8s8O7T+k2qhDae7jy4/y7Jl1lnjaBY8s7bzOUPhF0KKCNZmvoKwtL23ZdVeTSV1xM3jkiNnpzBKbcoSWECSGJVp1SE0BnRXdwQP41YTXFZ0310YjaTAUCC5qbMIWdEkHjfdSQtKBImnc85mkapq9w++XQ4zhauPWBtrPV3CcoCahjUaWdjrKVkibomlJZaN8MEO23CfQw==
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 893 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 39530
;; flags: qr rd ra cd ; qd: 1 an: 3 au: 0 ad: 1
;; QUESTIONS:
;; ingotronic.ch., type = DS, class = IN
;; ANSWERS:
ingotronic.ch. 3554 IN DS 6031 5 2 4A948F2FDADA24686E473EDAC00DCF972584C75E3FAA92C2021B6221449FF87E
ingotronic.ch. 3554 IN DS 6031 5 1 733D0218B571CD617B1A7493564B9FC4F12ADE82
ingotronic.ch. 3554 IN RRSIG DS 8 2 3600 20150129033614 20150105123019 60789 ch. rVPJP2HhzW7OkroK2axFj5Lb4iVWCH8Fp/Iq1rF952NDo72b8RiKje2RaAKJAGQ+wd0YgE+PAej04GCmkhlDJA/zvPeeTxuhy3HbJzReMlQ7fjyH+wW1hli+FuIYvogXWf7nO/9VyPORt8X/f/pjrOr3Vlj9sGLN8TGYpEuVSw4=
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 288 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 14008
;; flags: qr aa rd ra cd ; qd: 1 an: 4 au: 0 ad: 1
;; QUESTIONS:
;; ingotronic.ch., type = DNSKEY, class = IN
;; ANSWERS:
ingotronic.ch. 300 IN DNSKEY 256 3 5 AwEAAZ2Xh77GFzpEDx7EHYxShqltHgkiG+BOjBGifEmnJhQSdE5/yNSLFNcdhZZ8HUPxYnaedTqJcFFg4AzUsQklF/fECegTJdZjaj2WoL0/I8K7HMfY/hVuRZUWPNglYi8agJRX6gdkFTCpUNI7stpgKqxtzUJhhw15uG/lKMplwqUr
ingotronic.ch. 300 IN DNSKEY 257 3 5 AwEAAeA1vzmjaB+eBAcvhzpKEgAEFpvQ1rg4uKDW6MsQtacKoqBpgyep2+LuWotz5p/xYxj3NGsArwN8Ad5cY0FHRr8miTT0elOv6nvlqGIfRuhj/BXAQ1x4ihpSFslHw0lJMYFwxsUZWpUyjWX/nv1xRZMMwF46gui0N4OEbyTYusCk77D+A71k+K0EAitFIbIH4GCUKmH1H7HmXhSVH9bN/n7KEGwW32lmsuuUcJoRKDkcUvbMXY/9Xoa2quERrUg/rBbDUHowRPjYDS5GzY1+f4YY8s40BufGiqyUTKKXL953MVFK8gmezXA0hbmrnZ7CBOw/7238mORAdzExaX8n7CE=
ingotronic.ch. 300 IN RRSIG DNSKEY 5 2 300 20150125003700 20141226001657 6031 ingotronic.ch. rs1QlP2SlSpA2ELbzwg3DgWLzXWL3Lpv6CUJE2Q0qH2Zp7Qdy3cD+ZEtNh9v24Qv1M6JJ3zFt8mmZoCeW2ycuMbJCqBkW9CBuwF+VznZvZY2MxwPipvhvEEGP//0M8YAZJ66yQPDv3PTdAP8FYbIrJyvY44vwyncwbslpfHT9jAsrbfr3vuMuWps86dnP462q+0s1TxBfqi8mzo3gdavjHKWVNwohLahLKT+tWeu6DSzQv0YwMjwtkLgF7QRgx3ctIIkloOrnx9nHH1N6y+hxEB89fOlyVDjHhgL5uVtsD5fEdT0FJ2Gc/2nShEMMqIwr1/J9kUq1mNySff/uEe65Q==
ingotronic.ch. 300 IN RRSIG DNSKEY 5 2 300 20150125003700 20141226001657 17430 ingotronic.ch. mEwZjhQqeWksWD0TCnNBrtce4YkWJL3edqL6PvAUu8Fn+Ih437kEs3+pqdkgRsdYQ9HW+lBm/8pWwJlNAv0bi9NykItXMwAUFtncgq+6Pnh3iAM972GXSa5VV4LcGQ5b8CBdHCHiEKDqyPv5Hr5QfYL/FQaWlcNRh4QZZlZNPFA=
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 940 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 26735
;; flags: qr aa rd ra cd ; qd: 1 an: 3 au: 0 ad: 1
;; QUESTIONS:
;; nsec3.ingotronic.ch., type = DS, class = IN
;; ANSWERS:
nsec3.ingotronic.ch. 300 IN DS 16758 7 1 1720FF268E09A2CB63805EC8782D10AAD20E12A5
nsec3.ingotronic.ch. 300 IN DS 16758 7 2 3C8DC02750A1636F829B45D6E6D642866768A9CD40A013AD9D25AB63734FFA13
nsec3.ingotronic.ch. 300 IN RRSIG DS 5 3 300 20150125011134 20141226002644 17430 ingotronic.ch. hNurzlGhlyHbSgezPDuhIrtN9ZMsMXZbKGc7HD5rUuM88wD3fM97NxdzF+2Hi1USvBZ5GsQv63L+lAzf+mFPBoPIFHtTiAv8up7kQKRKmi/EzzkCYd/CC4UYdDZbaUyv7esh7spSOGwjPJNdK831p+MgltoWaYtnSGVMgOKk5mc=
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 305 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 46506
;; flags: qr aa rd ra cd ; qd: 1 an: 4 au: 0 ad: 1
;; QUESTIONS:
;; nsec3.ingotronic.ch., type = DNSKEY, class = IN
;; ANSWERS:
nsec3.ingotronic.ch. 300 IN DNSKEY 257 3 7 AwEAAaBuJTf9oGyeTH3biUkAFLrsYrkodX1H7Snsui4XsDHFCBvs5XYacHbs0Jg0/O51KPjmNnjwMW8SSyDkKqYQ+9uYAf2EQ/pnD/VGQqnV2cw0Vwk/t0E2V4FUCju4pnAoyzZFZXGs1eWbX9JXu++b0Azp+ACq6485qJLzHhWDiIrPoK/SvdbFVRK4s+nPPJLH3NGBbtdz6kPq7aFWYBMoGeAZdN1wsQpcNWUo5eOmaJY53nMc7+rDpAyYlMe/FKwSZdX2ZDd63Qsa6Im4FVUJq/nWLq7tlQ/mWks15uDTQyJy/OWfA0ICCO4N9Fel9rThJNpJWEzOCblvZyBoy405kZk=
nsec3.ingotronic.ch. 300 IN DNSKEY 256 3 7 AwEAAccAWxkTVGZ6UAp0VEozAlYpARhbh6Y6tYOl6Fg3UeBNFFtDQ9fTEEt1NkbnR9u8KkpVN6a67avlYiUN1egDqEwzDU7R1Rw+/USdhm2hqOARmmu3DBgjjX/iXjZLyv310cOGFJZ/smcodlDL4pDAAoPxh/qs6KEBaT0sc1KWcGq3
nsec3.ingotronic.ch. 300 IN RRSIG DNSKEY 7 3 300 20150125001457 20141226000444 16758 nsec3.ingotronic.ch. mXi1ylDi8XkRPup+YlT8GPdYE+P7gb6+/VdAwtodI916IzrkGkOHOTLbnrbAqqJOh0HxVCYXdxovmEcbJKUFKwplrQg3XD7/9Sq4pKU1MhMFEGrm/QPkM4u0mgjQwyToDLGuPHuFyur3FSjO/n54uGhAEft9JOFk/WKtWdCnm2LLyQrpC6herA3efFaI8kZhdoEY02AwihWVJxHasmz7lOoKRgNrkfELU+fN4+V7ISsRfJMyZc6q5PuNeG6vFD0uNE8tpdLJCSMurKYVpelvYqzFIcRTYcIjXwmS+L3DGjupqWMzFZVmpQM62JG3KCCD0ffpnNb0nWoSoHwpSeh/3Q==
nsec3.ingotronic.ch. 300 IN RRSIG DNSKEY 7 3 300 20150125001457 20141226000444 62417 nsec3.ingotronic.ch. PyCrf8T5dAfJzapb1p+kcTALPjDuD2niSaXXo0KeHAunT+6gJicLML2S/ZpiYr7X7Ma4Z0TYqE02qH6pcLYNnSgv9BE8sZO0nRtPekSyTy5nLi4hFADYhjb3UjaB85qmQZcqm64vC/CJhWO4t6Eixg/5MYALw+Qdy5Fo0qy/U5E=
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 958 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 51992
;; flags: qr rd ra ad cd ; qd: 1 an: 4 au: 0 ad: 1
;; QUESTIONS:
;; ., type = DNSKEY, class = IN
;; ANSWERS:
. 87345 IN DNSKEY 257 3 8 AwEAAagAIKlVZrpC6Ia7gEzahOR+9W29euxhJhVVLOyQbSEW0O8gcCjFFVQUTf6v58fLjwBd0YI0EzrAcQqBGCzh/RStIoO8g0NfnfL2MTJRkxoXbfDaUeVPQuYEhg37NZWAJQ9VnMVDxP/VHL496M/QZxkjf5/Efucp2gaDX6RS6CXpoY68LsvPVjR0ZSwzz1apAzvN9dlzEheX7ICJBBtuA6G3LQpzW5hOA2hzCTMjJPJ8LbqF6dsV6DoBQzgul0sGIcGOYl7OyQdXfZ57relSQageu+ipAdTTJ25AsRTAoub8ONGcLmqrAmRLKBP1dfwhYB4N7knNnulqQxA+Uk1ihz0=
. 87345 IN DNSKEY 256 3 8 AwEAAaPD7Y7XIi1MOEREJNTrRhyqsY3gff6JWzg+XCbqut1sbcbvqyssHw8DT1AkRaAC92pO8xuyq5QEgEPL1IHfABLwpwXI5gTj4gdwi86bpkmlWs9fRpnn4DPDCTdrnxIejJXgClHikLJF3u3CdpNCMijq4CKdQbMlRZ3avv+G7rh7
. 87345 IN DNSKEY 256 3 8 AwEAAe3fSrbLBy3LOS7pnxEUhvPZTE2H5dIGsI/UfruI/nOEvWWa/PSX2BFedBkEqOlYdjdNF2f+6lmfk2Od/xu0v5bVqxFE+/24v3hZSlWBxvXzPTAGHrbW/IJYEPqlzVOAS4XdUgHg0N7IbLywNHMvB+Yf+Nm6ctyXXFLV4WTNnzs7
. 87345 IN RRSIG DNSKEY 8 0 172800 20150115235959 20150101000000 19036 . i8cAxD2pvQi1oAyvQxRpDfFlbqPzW+69QQEsDwE1eWOm5AtawO9U7lmsGps7sy/fVNvl1ljKBj4Djp9pb3U2FLogjiIlW0cDAkPmLlG9t+b/pjEfBNlhjANUVN06pvQVAfm+LcF26EaWT6FlISBqb6jSy4BHRa3Bdc4Sx7+pRSYSqVVvYxLkfAWsKPqGkvWhebJDndJJV9syXQXgZ+v/uJ+6XOS43xkAdeL8iBzIs/FlwMTfh3tVe3d0lb65IBBLlCzeQuetX+0Vu1YFcnD0mHc/wS2ZnAV5toAFmyVQBoY/XAZiZeaOkcROJ6Zmqezy7liwK7BqsYyAZntMhk8lbg==
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 883 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 56174
;; flags: qr rd ra ad cd ; qd: 1 an: 2 au: 0 ad: 1
;; QUESTIONS:
;; ch., type = DS, class = IN
;; ANSWERS:
ch. 945 IN DS 46375 8 2 8F96646FC68BB7E4AF4C0750A6096FBC0D4ECDA3D3FA6DA06FDDB42EE50C6CF3
ch. 945 IN RRSIG DS 8 1 86400 20150112170000 20150105160000 16665 . thY7xYWBBxiBjqbQIb9fAG4TmQgnziwM7q6P1T3/ITxmECdvOCQnnZA3uD7qmN8uM0HudsD7+y+zgD3rsH4RSTKdL4kHSI0OnCxToMTvklghEgFDezqIRm8NkWdI2H4Stwrj20nYKSpLQxPI2EE54gs18P3KyO8bAUYv8Qx73xU=
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 238 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 29049
;; flags: qr rd ra ad cd ; qd: 1 an: 4 au: 0 ad: 1
;; QUESTIONS:
;; ch., type = DNSKEY, class = IN
;; ANSWERS:
ch. 946 IN DNSKEY 257 3 8 AwEAAb7GhhZ8IAy/AhwmSms5DeQK5ad09wIIplEpYoiAIYXPtJvT1ReFzyfTp/2YP+g/PWDwHPh4qKAHa9x0VgbIQcGAeNakmfkAdWEmCnca323/SAml3mwfaX62G7/uYWae5zh8QTxZKNd+K1yZ5x0IxnI31chSl5xymRbTEHYZDKwSIRFM3fTxUMt93WFaBVWELReYotJBr++rvAWdnlay5TPBTvheLBkaiqtgM4GP8HK07Y+86lsZnEsj5K3G1KTV5SPpa82rqYAwxG9VKbmSE/6/kBR5jJHjt1rRt5Oe7v18aEtw0YCEN4vxq+KuvMoNVqXUsE9LBwHJD+QNwi6wmB0=
ch. 946 IN DNSKEY 256 3 8 AwEAAcsg0kY6fw1wzYMhSAKTy+Y2JzAst66P/1odp9NECJJHbU8f4nwziI3onoFSBV0ZiSZhY1aH5dhdDZ7BkrqhVXSrZPAz0CvzjIxmB1gSOf9DeZvjQvoy97HqYolxsf+B3QQv2RKBT67elF5+JisKg3/dQISelKn8LhabSoVrMlD1
ch. 946 IN DNSKEY 256 3 8 AwEAAcSLdT0fEmcFmLpeUkAJoeVaHKiu+nbuc43fWlqaCRVf8t2HA4uWxOk0O5ci9nrFTc8nq8oa5fk5Cj7CHh4yrX9qUCfTdIWTyp8BDEdJpS+Dyb0u9wQuVj+nQMj4fLzdQf4TJs3/qxuiLr3nL1UUwlhhXeqSqGVb7p3mtB5HJ8ad
ch. 946 IN RRSIG DNSKEY 8 1 86400 20150127100909 20141212090909 46375 ch. bT8q0FWyeMH0SulNo6UdIIgZYNATwYsee2bikq2Gh339Bufma8eaqWIPYT3XKmxYPBFOw0bVl+kLZxTwbR1CFoCDXoP+qgQhh4mf9qkNiv2CDSc+0FE3FRREn+DAhYTUEuB58FPiPakFB8s8O7T+k2qhDae7jy4/y7Jl1lnjaBY8s7bzOUPhF0KKCNZmvoKwtL23ZdVeTSV1xM3jkiNnpzBKbcoSWECSGJVp1SE0BnRXdwQP41YTXFZ0310YjaTAUCC5qbMIWdEkHjfdSQtKBImnc85mkapq9w++XQ4zhauPWBtrPV3CcoCahjUaWdjrKVkibomlJZaN8MEO23CfQw==
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 893 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 11093
;; flags: qr rd ra cd ; qd: 1 an: 3 au: 0 ad: 1
;; QUESTIONS:
;; ingotronic.ch., type = DS, class = IN
;; ANSWERS:
ingotronic.ch. 3554 IN DS 6031 5 2 4A948F2FDADA24686E473EDAC00DCF972584C75E3FAA92C2021B6221449FF87E
ingotronic.ch. 3554 IN DS 6031 5 1 733D0218B571CD617B1A7493564B9FC4F12ADE82
ingotronic.ch. 3554 IN RRSIG DS 8 2 3600 20150129033614 20150105123019 60789 ch. rVPJP2HhzW7OkroK2axFj5Lb4iVWCH8Fp/Iq1rF952NDo72b8RiKje2RaAKJAGQ+wd0YgE+PAej04GCmkhlDJA/zvPeeTxuhy3HbJzReMlQ7fjyH+wW1hli+FuIYvogXWf7nO/9VyPORt8X/f/pjrOr3Vlj9sGLN8TGYpEuVSw4=
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 288 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 907
;; flags: qr aa rd ra cd ; qd: 1 an: 4 au: 0 ad: 1
;; QUESTIONS:
;; ingotronic.ch., type = DNSKEY, class = IN
;; ANSWERS:
ingotronic.ch. 300 IN DNSKEY 257 3 5 AwEAAeA1vzmjaB+eBAcvhzpKEgAEFpvQ1rg4uKDW6MsQtacKoqBpgyep2+LuWotz5p/xYxj3NGsArwN8Ad5cY0FHRr8miTT0elOv6nvlqGIfRuhj/BXAQ1x4ihpSFslHw0lJMYFwxsUZWpUyjWX/nv1xRZMMwF46gui0N4OEbyTYusCk77D+A71k+K0EAitFIbIH4GCUKmH1H7HmXhSVH9bN/n7KEGwW32lmsuuUcJoRKDkcUvbMXY/9Xoa2quERrUg/rBbDUHowRPjYDS5GzY1+f4YY8s40BufGiqyUTKKXL953MVFK8gmezXA0hbmrnZ7CBOw/7238mORAdzExaX8n7CE=
ingotronic.ch. 300 IN DNSKEY 256 3 5 AwEAAZ2Xh77GFzpEDx7EHYxShqltHgkiG+BOjBGifEmnJhQSdE5/yNSLFNcdhZZ8HUPxYnaedTqJcFFg4AzUsQklF/fECegTJdZjaj2WoL0/I8K7HMfY/hVuRZUWPNglYi8agJRX6gdkFTCpUNI7stpgKqxtzUJhhw15uG/lKMplwqUr
ingotronic.ch. 300 IN RRSIG DNSKEY 5 2 300 20150125003700 20141226001657 6031 ingotronic.ch. rs1QlP2SlSpA2ELbzwg3DgWLzXWL3Lpv6CUJE2Q0qH2Zp7Qdy3cD+ZEtNh9v24Qv1M6JJ3zFt8mmZoCeW2ycuMbJCqBkW9CBuwF+VznZvZY2MxwPipvhvEEGP//0M8YAZJ66yQPDv3PTdAP8FYbIrJyvY44vwyncwbslpfHT9jAsrbfr3vuMuWps86dnP462q+0s1TxBfqi8mzo3gdavjHKWVNwohLahLKT+tWeu6DSzQv0YwMjwtkLgF7QRgx3ctIIkloOrnx9nHH1N6y+hxEB89fOlyVDjHhgL5uVtsD5fEdT0FJ2Gc/2nShEMMqIwr1/J9kUq1mNySff/uEe65Q==
ingotronic.ch. 300 IN RRSIG DNSKEY 5 2 300 20150125003700 20141226001657 17430 ingotronic.ch. mEwZjhQqeWksWD0TCnNBrtce4YkWJL3edqL6PvAUu8Fn+Ih437kEs3+pqdkgRsdYQ9HW+lBm/8pWwJlNAv0bi9NykItXMwAUFtncgq+6Pnh3iAM972GXSa5VV4LcGQ5b8CBdHCHiEKDqyPv5Hr5QfYL/FQaWlcNRh4QZZlZNPFA=
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 940 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 977
;; flags: qr aa rd ra cd ; qd: 1 an: 3 au: 0 ad: 1
;; QUESTIONS:
;; nsec3.ingotronic.ch., type = DS, class = IN
;; ANSWERS:
nsec3.ingotronic.ch. 300 IN DS 16758 7 2 3C8DC02750A1636F829B45D6E6D642866768A9CD40A013AD9D25AB63734FFA13
nsec3.ingotronic.ch. 300 IN DS 16758 7 1 1720FF268E09A2CB63805EC8782D10AAD20E12A5
nsec3.ingotronic.ch. 300 IN RRSIG DS 5 3 300 20150125011134 20141226002644 17430 ingotronic.ch. hNurzlGhlyHbSgezPDuhIrtN9ZMsMXZbKGc7HD5rUuM88wD3fM97NxdzF+2Hi1USvBZ5GsQv63L+lAzf+mFPBoPIFHtTiAv8up7kQKRKmi/EzzkCYd/CC4UYdDZbaUyv7esh7spSOGwjPJNdK831p+MgltoWaYtnSGVMgOKk5mc=
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 305 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 37865
;; flags: qr aa rd ra cd ; qd: 1 an: 4 au: 0 ad: 1
;; QUESTIONS:
;; nsec3.ingotronic.ch., type = DNSKEY, class = IN
;; ANSWERS:
nsec3.ingotronic.ch. 300 IN DNSKEY 257 3 7 AwEAAaBuJTf9oGyeTH3biUkAFLrsYrkodX1H7Snsui4XsDHFCBvs5XYacHbs0Jg0/O51KPjmNnjwMW8SSyDkKqYQ+9uYAf2EQ/pnD/VGQqnV2cw0Vwk/t0E2V4FUCju4pnAoyzZFZXGs1eWbX9JXu++b0Azp+ACq6485qJLzHhWDiIrPoK/SvdbFVRK4s+nPPJLH3NGBbtdz6kPq7aFWYBMoGeAZdN1wsQpcNWUo5eOmaJY53nMc7+rDpAyYlMe/FKwSZdX2ZDd63Qsa6Im4FVUJq/nWLq7tlQ/mWks15uDTQyJy/OWfA0ICCO4N9Fel9rThJNpJWEzOCblvZyBoy405kZk=
nsec3.ingotronic.ch. 300 IN DNSKEY 256 3 7 AwEAAccAWxkTVGZ6UAp0VEozAlYpARhbh6Y6tYOl6Fg3UeBNFFtDQ9fTEEt1NkbnR9u8KkpVN6a67avlYiUN1egDqEwzDU7R1Rw+/USdhm2hqOARmmu3DBgjjX/iXjZLyv310cOGFJZ/smcodlDL4pDAAoPxh/qs6KEBaT0sc1KWcGq3
nsec3.ingotronic.ch. 300 IN RRSIG DNSKEY 7 3 300 20150125001457 20141226000444 16758 nsec3.ingotronic.ch. mXi1ylDi8XkRPup+YlT8GPdYE+P7gb6+/VdAwtodI916IzrkGkOHOTLbnrbAqqJOh0HxVCYXdxovmEcbJKUFKwplrQg3XD7/9Sq4pKU1MhMFEGrm/QPkM4u0mgjQwyToDLGuPHuFyur3FSjO/n54uGhAEft9JOFk/WKtWdCnm2LLyQrpC6herA3efFaI8kZhdoEY02AwihWVJxHasmz7lOoKRgNrkfELU+fN4+V7ISsRfJMyZc6q5PuNeG6vFD0uNE8tpdLJCSMurKYVpelvYqzFIcRTYcIjXwmS+L3DGjupqWMzFZVmpQM62JG3KCCD0ffpnNb0nWoSoHwpSeh/3Q==
nsec3.ingotronic.ch. 300 IN RRSIG DNSKEY 7 3 300 20150125001457 20141226000444 62417 nsec3.ingotronic.ch. PyCrf8T5dAfJzapb1p+kcTALPjDuD2niSaXXo0KeHAunT+6gJicLML2S/ZpiYr7X7Ma4Z0TYqE02qH6pcLYNnSgv9BE8sZO0nRtPekSyTy5nLi4hFADYhjb3UjaB85qmQZcqm64vC/CJhWO4t6Eixg/5MYALw+Qdy5Fo0qy/U5E=
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 958 bytes
###############################################
testNsecEcdsa256 0000664 0000000 0000000 00000023376 13020541473 0035373 0 ustar 00root root 0000000 0000000 dnssecjava-1.1.3/src/test/resources/recordings/org_jitsi_dnssec_validator_TestNsec3ValUtils #Date: 2015-01-06T22:35:30+01:00
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 12560
;; flags: qr aa rd ra cd ; qd: 1 an: 2 au: 4 ad: 3
;; QUESTIONS:
;; www.wc.nsec3-ecdsa256.ingotronic.ch., type = A, class = IN
;; ANSWERS:
www.wc.nsec3-ecdsa256.ingotronic.ch. 300 IN A 127.0.0.2
www.wc.nsec3-ecdsa256.ingotronic.ch. 300 IN RRSIG A 13 4 300 20150125011638 20141226004859 11718 nsec3-ecdsa256.ingotronic.ch. hGzbQF4VEX6ElyuHpiWGZjbn3w4Kgs8JSd4gF1WhP1a6R+dXuV8MQiM6QGANd2w1ZsyTNcG48Oh6uDXbaydGNQ==
;; AUTHORITY RECORDS:
nsec3-ecdsa256.ingotronic.ch. 300 IN NS ns1.ingotronic.ch.
nsec3-ecdsa256.ingotronic.ch. 300 IN RRSIG NS 13 3 300 20150125011658 20141226003607 11718 nsec3-ecdsa256.ingotronic.ch. +4TGfjT5xeiYyaO4djJ7l8UieBWAS6xItC8o4gbz7aquazQs1soT+rAw1g+3c4K7XBc9BSfXwS4z0rqKpJ2IhA==
10VLR9985NIK55R4PDCL4C86BA92RJKP.nsec3-ecdsa256.ingotronic.ch. 300 IN NSEC3 1 0 10 1234 31LKSGKTRGKLURR153AK64J90ET1Q7VS
10VLR9985NIK55R4PDCL4C86BA92RJKP.nsec3-ecdsa256.ingotronic.ch. 300 IN RRSIG NSEC3 13 4 300 20150125004222 20141226002655 11718 nsec3-ecdsa256.ingotronic.ch. o0DVYmgeaLhxcKdd5OwIV+aqYjiLwiqVh2AHUy8/GrvdegZSMuI8i7rzuxzmMvchyWYc+aqiIsdF5HfkbBeX+g==
;; ADDITIONAL RECORDS:
ns1.ingotronic.ch. 300 IN A 62.192.5.131
ns1.ingotronic.ch. 300 IN RRSIG A 5 3 300 20150125005754 20141226001054 17430 ingotronic.ch. fNG1RZM53pXwBxruHNaSZszxVzNLoCq8VZsTjAzYH2vSLzHXYVGJFTLIeY0K9APAdyJU8WuwmABmn7XY0Kg39kRG77uoFlqUws2PdTz2QKOwJGZY7W88Ak2Y9lkDBcK8o3wJHVptrT8R7p/1U7UfjF0kqPUkakk2B0EbFWdagFg=
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 732 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 54921
;; flags: qr rd ra ad cd ; qd: 1 an: 4 au: 0 ad: 1
;; QUESTIONS:
;; ., type = DNSKEY, class = IN
;; ANSWERS:
. 87343 IN DNSKEY 257 3 8 AwEAAagAIKlVZrpC6Ia7gEzahOR+9W29euxhJhVVLOyQbSEW0O8gcCjFFVQUTf6v58fLjwBd0YI0EzrAcQqBGCzh/RStIoO8g0NfnfL2MTJRkxoXbfDaUeVPQuYEhg37NZWAJQ9VnMVDxP/VHL496M/QZxkjf5/Efucp2gaDX6RS6CXpoY68LsvPVjR0ZSwzz1apAzvN9dlzEheX7ICJBBtuA6G3LQpzW5hOA2hzCTMjJPJ8LbqF6dsV6DoBQzgul0sGIcGOYl7OyQdXfZ57relSQageu+ipAdTTJ25AsRTAoub8ONGcLmqrAmRLKBP1dfwhYB4N7knNnulqQxA+Uk1ihz0=
. 87343 IN DNSKEY 256 3 8 AwEAAe3fSrbLBy3LOS7pnxEUhvPZTE2H5dIGsI/UfruI/nOEvWWa/PSX2BFedBkEqOlYdjdNF2f+6lmfk2Od/xu0v5bVqxFE+/24v3hZSlWBxvXzPTAGHrbW/IJYEPqlzVOAS4XdUgHg0N7IbLywNHMvB+Yf+Nm6ctyXXFLV4WTNnzs7
. 87343 IN DNSKEY 256 3 8 AwEAAaPD7Y7XIi1MOEREJNTrRhyqsY3gff6JWzg+XCbqut1sbcbvqyssHw8DT1AkRaAC92pO8xuyq5QEgEPL1IHfABLwpwXI5gTj4gdwi86bpkmlWs9fRpnn4DPDCTdrnxIejJXgClHikLJF3u3CdpNCMijq4CKdQbMlRZ3avv+G7rh7
. 87343 IN RRSIG DNSKEY 8 0 172800 20150115235959 20150101000000 19036 . i8cAxD2pvQi1oAyvQxRpDfFlbqPzW+69QQEsDwE1eWOm5AtawO9U7lmsGps7sy/fVNvl1ljKBj4Djp9pb3U2FLogjiIlW0cDAkPmLlG9t+b/pjEfBNlhjANUVN06pvQVAfm+LcF26EaWT6FlISBqb6jSy4BHRa3Bdc4Sx7+pRSYSqVVvYxLkfAWsKPqGkvWhebJDndJJV9syXQXgZ+v/uJ+6XOS43xkAdeL8iBzIs/FlwMTfh3tVe3d0lb65IBBLlCzeQuetX+0Vu1YFcnD0mHc/wS2ZnAV5toAFmyVQBoY/XAZiZeaOkcROJ6Zmqezy7liwK7BqsYyAZntMhk8lbg==
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 883 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 18027
;; flags: qr rd ra ad cd ; qd: 1 an: 2 au: 0 ad: 1
;; QUESTIONS:
;; ch., type = DS, class = IN
;; ANSWERS:
ch. 943 IN DS 46375 8 2 8F96646FC68BB7E4AF4C0750A6096FBC0D4ECDA3D3FA6DA06FDDB42EE50C6CF3
ch. 943 IN RRSIG DS 8 1 86400 20150112170000 20150105160000 16665 . thY7xYWBBxiBjqbQIb9fAG4TmQgnziwM7q6P1T3/ITxmECdvOCQnnZA3uD7qmN8uM0HudsD7+y+zgD3rsH4RSTKdL4kHSI0OnCxToMTvklghEgFDezqIRm8NkWdI2H4Stwrj20nYKSpLQxPI2EE54gs18P3KyO8bAUYv8Qx73xU=
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 238 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 53874
;; flags: qr rd ra ad cd ; qd: 1 an: 4 au: 0 ad: 1
;; QUESTIONS:
;; ch., type = DNSKEY, class = IN
;; ANSWERS:
ch. 944 IN DNSKEY 256 3 8 AwEAAcsg0kY6fw1wzYMhSAKTy+Y2JzAst66P/1odp9NECJJHbU8f4nwziI3onoFSBV0ZiSZhY1aH5dhdDZ7BkrqhVXSrZPAz0CvzjIxmB1gSOf9DeZvjQvoy97HqYolxsf+B3QQv2RKBT67elF5+JisKg3/dQISelKn8LhabSoVrMlD1
ch. 944 IN DNSKEY 257 3 8 AwEAAb7GhhZ8IAy/AhwmSms5DeQK5ad09wIIplEpYoiAIYXPtJvT1ReFzyfTp/2YP+g/PWDwHPh4qKAHa9x0VgbIQcGAeNakmfkAdWEmCnca323/SAml3mwfaX62G7/uYWae5zh8QTxZKNd+K1yZ5x0IxnI31chSl5xymRbTEHYZDKwSIRFM3fTxUMt93WFaBVWELReYotJBr++rvAWdnlay5TPBTvheLBkaiqtgM4GP8HK07Y+86lsZnEsj5K3G1KTV5SPpa82rqYAwxG9VKbmSE/6/kBR5jJHjt1rRt5Oe7v18aEtw0YCEN4vxq+KuvMoNVqXUsE9LBwHJD+QNwi6wmB0=
ch. 944 IN DNSKEY 256 3 8 AwEAAcSLdT0fEmcFmLpeUkAJoeVaHKiu+nbuc43fWlqaCRVf8t2HA4uWxOk0O5ci9nrFTc8nq8oa5fk5Cj7CHh4yrX9qUCfTdIWTyp8BDEdJpS+Dyb0u9wQuVj+nQMj4fLzdQf4TJs3/qxuiLr3nL1UUwlhhXeqSqGVb7p3mtB5HJ8ad
ch. 944 IN RRSIG DNSKEY 8 1 86400 20150127100909 20141212090909 46375 ch. bT8q0FWyeMH0SulNo6UdIIgZYNATwYsee2bikq2Gh339Bufma8eaqWIPYT3XKmxYPBFOw0bVl+kLZxTwbR1CFoCDXoP+qgQhh4mf9qkNiv2CDSc+0FE3FRREn+DAhYTUEuB58FPiPakFB8s8O7T+k2qhDae7jy4/y7Jl1lnjaBY8s7bzOUPhF0KKCNZmvoKwtL23ZdVeTSV1xM3jkiNnpzBKbcoSWECSGJVp1SE0BnRXdwQP41YTXFZ0310YjaTAUCC5qbMIWdEkHjfdSQtKBImnc85mkapq9w++XQ4zhauPWBtrPV3CcoCahjUaWdjrKVkibomlJZaN8MEO23CfQw==
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 893 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 54600
;; flags: qr rd ra cd ; qd: 1 an: 3 au: 0 ad: 1
;; QUESTIONS:
;; ingotronic.ch., type = DS, class = IN
;; ANSWERS:
ingotronic.ch. 3552 IN DS 6031 5 1 733D0218B571CD617B1A7493564B9FC4F12ADE82
ingotronic.ch. 3552 IN DS 6031 5 2 4A948F2FDADA24686E473EDAC00DCF972584C75E3FAA92C2021B6221449FF87E
ingotronic.ch. 3552 IN RRSIG DS 8 2 3600 20150129033614 20150105123019 60789 ch. rVPJP2HhzW7OkroK2axFj5Lb4iVWCH8Fp/Iq1rF952NDo72b8RiKje2RaAKJAGQ+wd0YgE+PAej04GCmkhlDJA/zvPeeTxuhy3HbJzReMlQ7fjyH+wW1hli+FuIYvogXWf7nO/9VyPORt8X/f/pjrOr3Vlj9sGLN8TGYpEuVSw4=
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 288 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 20701
;; flags: qr aa rd ra cd ; qd: 1 an: 4 au: 0 ad: 1
;; QUESTIONS:
;; ingotronic.ch., type = DNSKEY, class = IN
;; ANSWERS:
ingotronic.ch. 300 IN DNSKEY 256 3 5 AwEAAZ2Xh77GFzpEDx7EHYxShqltHgkiG+BOjBGifEmnJhQSdE5/yNSLFNcdhZZ8HUPxYnaedTqJcFFg4AzUsQklF/fECegTJdZjaj2WoL0/I8K7HMfY/hVuRZUWPNglYi8agJRX6gdkFTCpUNI7stpgKqxtzUJhhw15uG/lKMplwqUr
ingotronic.ch. 300 IN DNSKEY 257 3 5 AwEAAeA1vzmjaB+eBAcvhzpKEgAEFpvQ1rg4uKDW6MsQtacKoqBpgyep2+LuWotz5p/xYxj3NGsArwN8Ad5cY0FHRr8miTT0elOv6nvlqGIfRuhj/BXAQ1x4ihpSFslHw0lJMYFwxsUZWpUyjWX/nv1xRZMMwF46gui0N4OEbyTYusCk77D+A71k+K0EAitFIbIH4GCUKmH1H7HmXhSVH9bN/n7KEGwW32lmsuuUcJoRKDkcUvbMXY/9Xoa2quERrUg/rBbDUHowRPjYDS5GzY1+f4YY8s40BufGiqyUTKKXL953MVFK8gmezXA0hbmrnZ7CBOw/7238mORAdzExaX8n7CE=
ingotronic.ch. 300 IN RRSIG DNSKEY 5 2 300 20150125003700 20141226001657 6031 ingotronic.ch. rs1QlP2SlSpA2ELbzwg3DgWLzXWL3Lpv6CUJE2Q0qH2Zp7Qdy3cD+ZEtNh9v24Qv1M6JJ3zFt8mmZoCeW2ycuMbJCqBkW9CBuwF+VznZvZY2MxwPipvhvEEGP//0M8YAZJ66yQPDv3PTdAP8FYbIrJyvY44vwyncwbslpfHT9jAsrbfr3vuMuWps86dnP462q+0s1TxBfqi8mzo3gdavjHKWVNwohLahLKT+tWeu6DSzQv0YwMjwtkLgF7QRgx3ctIIkloOrnx9nHH1N6y+hxEB89fOlyVDjHhgL5uVtsD5fEdT0FJ2Gc/2nShEMMqIwr1/J9kUq1mNySff/uEe65Q==
ingotronic.ch. 300 IN RRSIG DNSKEY 5 2 300 20150125003700 20141226001657 17430 ingotronic.ch. mEwZjhQqeWksWD0TCnNBrtce4YkWJL3edqL6PvAUu8Fn+Ih437kEs3+pqdkgRsdYQ9HW+lBm/8pWwJlNAv0bi9NykItXMwAUFtncgq+6Pnh3iAM972GXSa5VV4LcGQ5b8CBdHCHiEKDqyPv5Hr5QfYL/FQaWlcNRh4QZZlZNPFA=
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 940 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 16374
;; flags: qr aa rd ra cd ; qd: 1 an: 3 au: 0 ad: 1
;; QUESTIONS:
;; nsec3-ecdsa256.ingotronic.ch., type = DS, class = IN
;; ANSWERS:
nsec3-ecdsa256.ingotronic.ch. 300 IN DS 24801 13 2 88CCE5FCE4A356E10AD5ECA8EEED7EC8814277CE4791A94FE1A49B50BBB948FF
nsec3-ecdsa256.ingotronic.ch. 300 IN DS 24801 13 1 7E9B512FE0840FB596EA82894BA7FF4A7B052732
nsec3-ecdsa256.ingotronic.ch. 300 IN RRSIG DS 5 3 300 20150125004144 20141226003211 17430 ingotronic.ch. f57P+OkQdUyTus3thb8doi0qQ3whVRetDl6Sj2joISJ+Hmc+uG5Vzw8GAbLow3yumIHMGg6D59h/IKbJi5BA6F/ivr+LxWUm3XbJhLhNZpN3Pn8w0FuciH5Afu8gp0ohzA2Jc1n6vNF1DF5KUMqyUUm/lJLlDHAH7qCSvcHt7mo=
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 314 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 27735
;; flags: qr aa rd ra cd ; qd: 1 an: 4 au: 0 ad: 1
;; QUESTIONS:
;; nsec3-ecdsa256.ingotronic.ch., type = DNSKEY, class = IN
;; ANSWERS:
nsec3-ecdsa256.ingotronic.ch. 300 IN DNSKEY 256 3 13 TMiIf94UMj0oa7VwU25gnE4rxFs2nO/eSHFrR/juBKbk+bCgLHM4rKH4VvssNHmn5vvsvjuZtMtePwuS2YIm6w==
nsec3-ecdsa256.ingotronic.ch. 300 IN DNSKEY 257 3 13 Ten7/v9T+PaV9C9wWvFfxE/Yl9KVCMSWd+2a/hqDyNtywhcxr0yVBB9/QmM9Fl1vgaac6bZgGNEZWXptv1FXaQ==
nsec3-ecdsa256.ingotronic.ch. 300 IN RRSIG DNSKEY 13 3 300 20150125011658 20141226003607 11718 nsec3-ecdsa256.ingotronic.ch. Q4P4J3hiheLNMFxvOP9wKMwmtPT+0khpAmNZKh6sF68/O/S7TTAnpI8Ku13fNvJYFwL9buEl5aPe3tRAZHmZBw==
nsec3-ecdsa256.ingotronic.ch. 300 IN RRSIG DNSKEY 13 3 300 20150125011658 20141226003607 24801 nsec3-ecdsa256.ingotronic.ch. hXrbEWZUZlmf+sjRg0jx/sbolBLZ3Trd+F4Pf2iy9DTkCPSrHzWKKOoie/ovF1QLLETxmbqrXHSZBuJamlpoIg==
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 465 bytes
###############################################
testNsecEcdsa384 0000664 0000000 0000000 00000024033 13020541473 0035364 0 ustar 00root root 0000000 0000000 dnssecjava-1.1.3/src/test/resources/recordings/org_jitsi_dnssec_validator_TestNsec3ValUtils #Date: 2015-01-06T22:35:31+01:00
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 21233
;; flags: qr aa rd ra cd ; qd: 1 an: 2 au: 4 ad: 3
;; QUESTIONS:
;; www.wc.nsec3-ecdsa384.ingotronic.ch., type = A, class = IN
;; ANSWERS:
www.wc.nsec3-ecdsa384.ingotronic.ch. 300 IN A 127.0.0.2
www.wc.nsec3-ecdsa384.ingotronic.ch. 300 IN RRSIG A 14 4 300 20150125000743 20141225234740 39491 nsec3-ecdsa384.ingotronic.ch. Yd8elljgUjLfYSy0rY7gBfttrig42BNNzSm1WhS5bmHzmJylFnRVM25b91yqAW2ccinrOcaNdIDE5bX9WXUPumLHJc5X/Kn1GIHCcQScoC0tr8BTD4526o79lVuVnTc4
;; AUTHORITY RECORDS:
nsec3-ecdsa384.ingotronic.ch. 300 IN NS ns1.ingotronic.ch.
nsec3-ecdsa384.ingotronic.ch. 300 IN RRSIG NS 14 3 300 20150125005853 20141226004214 39491 nsec3-ecdsa384.ingotronic.ch. KIiuzqJsmy8xRJqdd7IvpBjQiUqiEPz5XxySWS8slHB3hmhW9fsdzjfHA15Z22lUoRIXYXGATOjZxfBntPPvtQ47TNq8qaxt8xxAkXNM9Xr/3kdMYctelGRW4Bu5Lzeo
BJF4RC63JPAP9OEN6NMVFBLTG3RT824D.nsec3-ecdsa384.ingotronic.ch. 300 IN NSEC3 1 0 10 1234 EHFCGCNSUDQECLCVFJAKPSAPU6IJGP5D CNAME RRSIG
BJF4RC63JPAP9OEN6NMVFBLTG3RT824D.nsec3-ecdsa384.ingotronic.ch. 300 IN RRSIG NSEC3 14 4 300 20150125010505 20141226003022 39491 nsec3-ecdsa384.ingotronic.ch. nFYeW0c9S2OoiCWVishsl58AtLOYUSwDkNPpPaDYQm1i+Q0UdGOXnk+Yw9MiXj7wcvl1jaAkbMLAn6WaRocOdAQl2S7l2QN/6ZdX02y6yJPfRDIShYW2b+WSrbEG/fsr
;; ADDITIONAL RECORDS:
ns1.ingotronic.ch. 300 IN A 62.192.5.131
ns1.ingotronic.ch. 300 IN RRSIG A 5 3 300 20150125005754 20141226001054 17430 ingotronic.ch. fNG1RZM53pXwBxruHNaSZszxVzNLoCq8VZsTjAzYH2vSLzHXYVGJFTLIeY0K9APAdyJU8WuwmABmn7XY0Kg39kRG77uoFlqUws2PdTz2QKOwJGZY7W88Ak2Y9lkDBcK8o3wJHVptrT8R7p/1U7UfjF0kqPUkakk2B0EbFWdagFg=
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 836 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 38908
;; flags: qr rd ra ad cd ; qd: 1 an: 4 au: 0 ad: 1
;; QUESTIONS:
;; ., type = DNSKEY, class = IN
;; ANSWERS:
. 87342 IN DNSKEY 256 3 8 AwEAAaPD7Y7XIi1MOEREJNTrRhyqsY3gff6JWzg+XCbqut1sbcbvqyssHw8DT1AkRaAC92pO8xuyq5QEgEPL1IHfABLwpwXI5gTj4gdwi86bpkmlWs9fRpnn4DPDCTdrnxIejJXgClHikLJF3u3CdpNCMijq4CKdQbMlRZ3avv+G7rh7
. 87342 IN DNSKEY 257 3 8 AwEAAagAIKlVZrpC6Ia7gEzahOR+9W29euxhJhVVLOyQbSEW0O8gcCjFFVQUTf6v58fLjwBd0YI0EzrAcQqBGCzh/RStIoO8g0NfnfL2MTJRkxoXbfDaUeVPQuYEhg37NZWAJQ9VnMVDxP/VHL496M/QZxkjf5/Efucp2gaDX6RS6CXpoY68LsvPVjR0ZSwzz1apAzvN9dlzEheX7ICJBBtuA6G3LQpzW5hOA2hzCTMjJPJ8LbqF6dsV6DoBQzgul0sGIcGOYl7OyQdXfZ57relSQageu+ipAdTTJ25AsRTAoub8ONGcLmqrAmRLKBP1dfwhYB4N7knNnulqQxA+Uk1ihz0=
. 87342 IN DNSKEY 256 3 8 AwEAAe3fSrbLBy3LOS7pnxEUhvPZTE2H5dIGsI/UfruI/nOEvWWa/PSX2BFedBkEqOlYdjdNF2f+6lmfk2Od/xu0v5bVqxFE+/24v3hZSlWBxvXzPTAGHrbW/IJYEPqlzVOAS4XdUgHg0N7IbLywNHMvB+Yf+Nm6ctyXXFLV4WTNnzs7
. 87342 IN RRSIG DNSKEY 8 0 172800 20150115235959 20150101000000 19036 . i8cAxD2pvQi1oAyvQxRpDfFlbqPzW+69QQEsDwE1eWOm5AtawO9U7lmsGps7sy/fVNvl1ljKBj4Djp9pb3U2FLogjiIlW0cDAkPmLlG9t+b/pjEfBNlhjANUVN06pvQVAfm+LcF26EaWT6FlISBqb6jSy4BHRa3Bdc4Sx7+pRSYSqVVvYxLkfAWsKPqGkvWhebJDndJJV9syXQXgZ+v/uJ+6XOS43xkAdeL8iBzIs/FlwMTfh3tVe3d0lb65IBBLlCzeQuetX+0Vu1YFcnD0mHc/wS2ZnAV5toAFmyVQBoY/XAZiZeaOkcROJ6Zmqezy7liwK7BqsYyAZntMhk8lbg==
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 883 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 9434
;; flags: qr rd ra ad cd ; qd: 1 an: 2 au: 0 ad: 1
;; QUESTIONS:
;; ch., type = DS, class = IN
;; ANSWERS:
ch. 942 IN DS 46375 8 2 8F96646FC68BB7E4AF4C0750A6096FBC0D4ECDA3D3FA6DA06FDDB42EE50C6CF3
ch. 942 IN RRSIG DS 8 1 86400 20150112170000 20150105160000 16665 . thY7xYWBBxiBjqbQIb9fAG4TmQgnziwM7q6P1T3/ITxmECdvOCQnnZA3uD7qmN8uM0HudsD7+y+zgD3rsH4RSTKdL4kHSI0OnCxToMTvklghEgFDezqIRm8NkWdI2H4Stwrj20nYKSpLQxPI2EE54gs18P3KyO8bAUYv8Qx73xU=
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 238 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 53000
;; flags: qr rd ra ad cd ; qd: 1 an: 4 au: 0 ad: 1
;; QUESTIONS:
;; ch., type = DNSKEY, class = IN
;; ANSWERS:
ch. 943 IN DNSKEY 256 3 8 AwEAAcsg0kY6fw1wzYMhSAKTy+Y2JzAst66P/1odp9NECJJHbU8f4nwziI3onoFSBV0ZiSZhY1aH5dhdDZ7BkrqhVXSrZPAz0CvzjIxmB1gSOf9DeZvjQvoy97HqYolxsf+B3QQv2RKBT67elF5+JisKg3/dQISelKn8LhabSoVrMlD1
ch. 943 IN DNSKEY 257 3 8 AwEAAb7GhhZ8IAy/AhwmSms5DeQK5ad09wIIplEpYoiAIYXPtJvT1ReFzyfTp/2YP+g/PWDwHPh4qKAHa9x0VgbIQcGAeNakmfkAdWEmCnca323/SAml3mwfaX62G7/uYWae5zh8QTxZKNd+K1yZ5x0IxnI31chSl5xymRbTEHYZDKwSIRFM3fTxUMt93WFaBVWELReYotJBr++rvAWdnlay5TPBTvheLBkaiqtgM4GP8HK07Y+86lsZnEsj5K3G1KTV5SPpa82rqYAwxG9VKbmSE/6/kBR5jJHjt1rRt5Oe7v18aEtw0YCEN4vxq+KuvMoNVqXUsE9LBwHJD+QNwi6wmB0=
ch. 943 IN DNSKEY 256 3 8 AwEAAcSLdT0fEmcFmLpeUkAJoeVaHKiu+nbuc43fWlqaCRVf8t2HA4uWxOk0O5ci9nrFTc8nq8oa5fk5Cj7CHh4yrX9qUCfTdIWTyp8BDEdJpS+Dyb0u9wQuVj+nQMj4fLzdQf4TJs3/qxuiLr3nL1UUwlhhXeqSqGVb7p3mtB5HJ8ad
ch. 943 IN RRSIG DNSKEY 8 1 86400 20150127100909 20141212090909 46375 ch. bT8q0FWyeMH0SulNo6UdIIgZYNATwYsee2bikq2Gh339Bufma8eaqWIPYT3XKmxYPBFOw0bVl+kLZxTwbR1CFoCDXoP+qgQhh4mf9qkNiv2CDSc+0FE3FRREn+DAhYTUEuB58FPiPakFB8s8O7T+k2qhDae7jy4/y7Jl1lnjaBY8s7bzOUPhF0KKCNZmvoKwtL23ZdVeTSV1xM3jkiNnpzBKbcoSWECSGJVp1SE0BnRXdwQP41YTXFZ0310YjaTAUCC5qbMIWdEkHjfdSQtKBImnc85mkapq9w++XQ4zhauPWBtrPV3CcoCahjUaWdjrKVkibomlJZaN8MEO23CfQw==
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 893 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 13857
;; flags: qr rd ra cd ; qd: 1 an: 3 au: 0 ad: 1
;; QUESTIONS:
;; ingotronic.ch., type = DS, class = IN
;; ANSWERS:
ingotronic.ch. 3551 IN DS 6031 5 2 4A948F2FDADA24686E473EDAC00DCF972584C75E3FAA92C2021B6221449FF87E
ingotronic.ch. 3551 IN DS 6031 5 1 733D0218B571CD617B1A7493564B9FC4F12ADE82
ingotronic.ch. 3551 IN RRSIG DS 8 2 3600 20150129033614 20150105123019 60789 ch. rVPJP2HhzW7OkroK2axFj5Lb4iVWCH8Fp/Iq1rF952NDo72b8RiKje2RaAKJAGQ+wd0YgE+PAej04GCmkhlDJA/zvPeeTxuhy3HbJzReMlQ7fjyH+wW1hli+FuIYvogXWf7nO/9VyPORt8X/f/pjrOr3Vlj9sGLN8TGYpEuVSw4=
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 288 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 18602
;; flags: qr aa rd ra cd ; qd: 1 an: 4 au: 0 ad: 1
;; QUESTIONS:
;; ingotronic.ch., type = DNSKEY, class = IN
;; ANSWERS:
ingotronic.ch. 300 IN DNSKEY 257 3 5 AwEAAeA1vzmjaB+eBAcvhzpKEgAEFpvQ1rg4uKDW6MsQtacKoqBpgyep2+LuWotz5p/xYxj3NGsArwN8Ad5cY0FHRr8miTT0elOv6nvlqGIfRuhj/BXAQ1x4ihpSFslHw0lJMYFwxsUZWpUyjWX/nv1xRZMMwF46gui0N4OEbyTYusCk77D+A71k+K0EAitFIbIH4GCUKmH1H7HmXhSVH9bN/n7KEGwW32lmsuuUcJoRKDkcUvbMXY/9Xoa2quERrUg/rBbDUHowRPjYDS5GzY1+f4YY8s40BufGiqyUTKKXL953MVFK8gmezXA0hbmrnZ7CBOw/7238mORAdzExaX8n7CE=
ingotronic.ch. 300 IN DNSKEY 256 3 5 AwEAAZ2Xh77GFzpEDx7EHYxShqltHgkiG+BOjBGifEmnJhQSdE5/yNSLFNcdhZZ8HUPxYnaedTqJcFFg4AzUsQklF/fECegTJdZjaj2WoL0/I8K7HMfY/hVuRZUWPNglYi8agJRX6gdkFTCpUNI7stpgKqxtzUJhhw15uG/lKMplwqUr
ingotronic.ch. 300 IN RRSIG DNSKEY 5 2 300 20150125003700 20141226001657 6031 ingotronic.ch. rs1QlP2SlSpA2ELbzwg3DgWLzXWL3Lpv6CUJE2Q0qH2Zp7Qdy3cD+ZEtNh9v24Qv1M6JJ3zFt8mmZoCeW2ycuMbJCqBkW9CBuwF+VznZvZY2MxwPipvhvEEGP//0M8YAZJ66yQPDv3PTdAP8FYbIrJyvY44vwyncwbslpfHT9jAsrbfr3vuMuWps86dnP462q+0s1TxBfqi8mzo3gdavjHKWVNwohLahLKT+tWeu6DSzQv0YwMjwtkLgF7QRgx3ctIIkloOrnx9nHH1N6y+hxEB89fOlyVDjHhgL5uVtsD5fEdT0FJ2Gc/2nShEMMqIwr1/J9kUq1mNySff/uEe65Q==
ingotronic.ch. 300 IN RRSIG DNSKEY 5 2 300 20150125003700 20141226001657 17430 ingotronic.ch. mEwZjhQqeWksWD0TCnNBrtce4YkWJL3edqL6PvAUu8Fn+Ih437kEs3+pqdkgRsdYQ9HW+lBm/8pWwJlNAv0bi9NykItXMwAUFtncgq+6Pnh3iAM972GXSa5VV4LcGQ5b8CBdHCHiEKDqyPv5Hr5QfYL/FQaWlcNRh4QZZlZNPFA=
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 940 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 27656
;; flags: qr aa rd ra cd ; qd: 1 an: 3 au: 0 ad: 1
;; QUESTIONS:
;; nsec3-ecdsa384.ingotronic.ch., type = DS, class = IN
;; ANSWERS:
nsec3-ecdsa384.ingotronic.ch. 300 IN DS 899 14 2 A5F35102F5DF2856F2003049D030740D4BAD1EEC72ACCC3402C279F873A34B5A
nsec3-ecdsa384.ingotronic.ch. 300 IN DS 899 14 1 29AA736895A3A3F8B3C5C0309C017EFF90FEB343
nsec3-ecdsa384.ingotronic.ch. 300 IN RRSIG DS 5 3 300 20150125011134 20141226002644 17430 ingotronic.ch. hJVcDnmPA0OetM2f8sbWmQXhvu0GfKQhR57a3OIMZwJRDScZ/hl15v2jMzPvekB+4hHn8Zf9akDzkrUcLFbCL+5VzXuXtjRElLHVvRN//8+xb5FF3gfKXy9SvrGnYsm8ZDjih1zS9mCI1n+krAdw2nDcOwWD6HCPW96yEtFocas=
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 314 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 28870
;; flags: qr aa rd ra cd ; qd: 1 an: 4 au: 0 ad: 1
;; QUESTIONS:
;; nsec3-ecdsa384.ingotronic.ch., type = DNSKEY, class = IN
;; ANSWERS:
nsec3-ecdsa384.ingotronic.ch. 300 IN DNSKEY 256 3 14 68j+WI9Rs6vK68I0R3UqfzqUhloOrZFI6fn6AHRpPdinUmZ63ATp6K4jED8Bea7d6/96/vKCl6aUo8as7sNxtVcE7x93Htsz7JEV7a3tUtkam3C9YuC3m8+VdF35agSL
nsec3-ecdsa384.ingotronic.ch. 300 IN DNSKEY 257 3 14 hQcr8vExudFuOusjGrfTC5V4JecOJQ2/ahtNRqTpIVafQG+iZ9aiOeaHRmw6oIB7E/LJKtXr99PQwA4fqrxXlEbc+OhG8iSNgYD9LoG2psmpeoqyVsOY2bYmBw7XD2/c
nsec3-ecdsa384.ingotronic.ch. 300 IN RRSIG DNSKEY 14 3 300 20150125002339 20141225233316 899 nsec3-ecdsa384.ingotronic.ch. PO4InPbCNmcJ77b4heo/zQhqPx4/92RhBRDquDDp8TKYb57F86lZLnJX+YSnLx4ZTs/eCaWBwNBTiqN+XUKINBETCC2SD8ygYGmofmUANU9bZoOmB0DQ5xH+cpSuMUAR
nsec3-ecdsa384.ingotronic.ch. 300 IN RRSIG DNSKEY 14 3 300 20150125002339 20141225233316 39491 nsec3-ecdsa384.ingotronic.ch. DVa/mHiv5pYDvzC6jHY0d6i8gfKAZGzFttXizD2y9supRNiII5Ji9COjQ43aG7mcO2DI9VgUoRcd+XKdC5Nn/0t2y80G7Y3YsNpgZ4sKbxaHahxEZAxIqAUST1Rb3+Gy
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 593 bytes
###############################################
testPublicKeyLoadingException 0000664 0000000 0000000 00000024757 13020541473 0040356 0 ustar 00root root 0000000 0000000 dnssecjava-1.1.3/src/test/resources/recordings/org_jitsi_dnssec_validator_TestNsec3ValUtils #Date: 2015-01-06T22:35:27+01:00
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 7616
;; flags: qr aa rd ra cd ; qd: 1 an: 2 au: 4 ad: 3
;; QUESTIONS:
;; www.wc.nsec3.ingotronic.ch., type = A, class = IN
;; ANSWERS:
www.wc.nsec3.ingotronic.ch. 300 IN A 127.0.0.2
www.wc.nsec3.ingotronic.ch. 300 IN RRSIG A 7 4 300 20150125011553 20141226004758 62417 nsec3.ingotronic.ch. dIDse8tpnBhl5X20CZ5c8rO8cuj9dKMeA/qiyQYEqEFp1QnnVawapqDh1pCrJhBxcKnT7THqKSP6XpDIQA70jcHSecAVRqBZBA2coWZTSOi3dnsARJfIueh8kpsmtYsn6ejuG+7sroQKH9Niu4xoi433ez7Anr9itet9kAP9dmA=
;; AUTHORITY RECORDS:
nsec3.ingotronic.ch. 300 IN NS ns1.ingotronic.ch.
nsec3.ingotronic.ch. 300 IN RRSIG NS 7 3 300 20150125010458 20141226002309 62417 nsec3.ingotronic.ch. fl2Q0YQQ1TduolGLyQx8vGqSApoBbb6A+go5SLFBYQobrPfO/rb+SM8JvnlzNX/Xa7dRhDYrnfBTFUm1mCur9aIi34gu5UwDNQvt/GXY5dC3+DEy/28bTZ43UuCs+qGH9u9leFwGX4neFNl0s5B4RpxBN4is8dXMUvOda6QcsOw=
2HKTRIEPNUPMRM91OD7L5M677RDC4DFD.nsec3.ingotronic.ch. 300 IN NSEC3 1 0 10 1234 4FQSC7ORQNKH924CH6L2DOAISKM28080 CNAME RRSIG
2HKTRIEPNUPMRM91OD7L5M677RDC4DFD.nsec3.ingotronic.ch. 300 IN RRSIG NSEC3 7 4 300 20150125011553 20141226004758 62417 nsec3.ingotronic.ch. BXhW2wGFkkGdsdGKqFMr9QqwGrtCA56D8CH/CKjOn51Udirm6asczVWIVStM0no1VIZNAa3oF6F/RzcDVKtkJTw4KHrSX5LHiWW19pyB1fql2krTQ3Zfr0mZsUb/JMf2/yPqXQu9QYN8XrlicZ60LwFWFRNO2gscMqgHnNtdidk=
;; ADDITIONAL RECORDS:
ns1.ingotronic.ch. 300 IN A 62.192.5.131
ns1.ingotronic.ch. 300 IN RRSIG A 5 3 300 20150125005754 20141226001054 17430 ingotronic.ch. fNG1RZM53pXwBxruHNaSZszxVzNLoCq8VZsTjAzYH2vSLzHXYVGJFTLIeY0K9APAdyJU8WuwmABmn7XY0Kg39kRG77uoFlqUws2PdTz2QKOwJGZY7W88Ak2Y9lkDBcK8o3wJHVptrT8R7p/1U7UfjF0kqPUkakk2B0EbFWdagFg=
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 896 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 56906
;; flags: qr rd ra ad cd ; qd: 1 an: 4 au: 0 ad: 1
;; QUESTIONS:
;; ., type = DNSKEY, class = IN
;; ANSWERS:
. 87346 IN DNSKEY 256 3 8 AwEAAe3fSrbLBy3LOS7pnxEUhvPZTE2H5dIGsI/UfruI/nOEvWWa/PSX2BFedBkEqOlYdjdNF2f+6lmfk2Od/xu0v5bVqxFE+/24v3hZSlWBxvXzPTAGHrbW/IJYEPqlzVOAS4XdUgHg0N7IbLywNHMvB+Yf+Nm6ctyXXFLV4WTNnzs7
. 87346 IN DNSKEY 257 3 8 AwEAAagAIKlVZrpC6Ia7gEzahOR+9W29euxhJhVVLOyQbSEW0O8gcCjFFVQUTf6v58fLjwBd0YI0EzrAcQqBGCzh/RStIoO8g0NfnfL2MTJRkxoXbfDaUeVPQuYEhg37NZWAJQ9VnMVDxP/VHL496M/QZxkjf5/Efucp2gaDX6RS6CXpoY68LsvPVjR0ZSwzz1apAzvN9dlzEheX7ICJBBtuA6G3LQpzW5hOA2hzCTMjJPJ8LbqF6dsV6DoBQzgul0sGIcGOYl7OyQdXfZ57relSQageu+ipAdTTJ25AsRTAoub8ONGcLmqrAmRLKBP1dfwhYB4N7knNnulqQxA+Uk1ihz0=
. 87346 IN DNSKEY 256 3 8 AwEAAaPD7Y7XIi1MOEREJNTrRhyqsY3gff6JWzg+XCbqut1sbcbvqyssHw8DT1AkRaAC92pO8xuyq5QEgEPL1IHfABLwpwXI5gTj4gdwi86bpkmlWs9fRpnn4DPDCTdrnxIejJXgClHikLJF3u3CdpNCMijq4CKdQbMlRZ3avv+G7rh7
. 87346 IN RRSIG DNSKEY 8 0 172800 20150115235959 20150101000000 19036 . i8cAxD2pvQi1oAyvQxRpDfFlbqPzW+69QQEsDwE1eWOm5AtawO9U7lmsGps7sy/fVNvl1ljKBj4Djp9pb3U2FLogjiIlW0cDAkPmLlG9t+b/pjEfBNlhjANUVN06pvQVAfm+LcF26EaWT6FlISBqb6jSy4BHRa3Bdc4Sx7+pRSYSqVVvYxLkfAWsKPqGkvWhebJDndJJV9syXQXgZ+v/uJ+6XOS43xkAdeL8iBzIs/FlwMTfh3tVe3d0lb65IBBLlCzeQuetX+0Vu1YFcnD0mHc/wS2ZnAV5toAFmyVQBoY/XAZiZeaOkcROJ6Zmqezy7liwK7BqsYyAZntMhk8lbg==
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 883 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 62181
;; flags: qr rd ra ad cd ; qd: 1 an: 2 au: 0 ad: 1
;; QUESTIONS:
;; ch., type = DS, class = IN
;; ANSWERS:
ch. 946 IN DS 46375 8 2 8F96646FC68BB7E4AF4C0750A6096FBC0D4ECDA3D3FA6DA06FDDB42EE50C6CF3
ch. 946 IN RRSIG DS 8 1 86400 20150112170000 20150105160000 16665 . thY7xYWBBxiBjqbQIb9fAG4TmQgnziwM7q6P1T3/ITxmECdvOCQnnZA3uD7qmN8uM0HudsD7+y+zgD3rsH4RSTKdL4kHSI0OnCxToMTvklghEgFDezqIRm8NkWdI2H4Stwrj20nYKSpLQxPI2EE54gs18P3KyO8bAUYv8Qx73xU=
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 238 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 64065
;; flags: qr rd ra ad cd ; qd: 1 an: 4 au: 0 ad: 1
;; QUESTIONS:
;; ch., type = DNSKEY, class = IN
;; ANSWERS:
ch. 947 IN DNSKEY 256 3 8 AwEAAcsg0kY6fw1wzYMhSAKTy+Y2JzAst66P/1odp9NECJJHbU8f4nwziI3onoFSBV0ZiSZhY1aH5dhdDZ7BkrqhVXSrZPAz0CvzjIxmB1gSOf9DeZvjQvoy97HqYolxsf+B3QQv2RKBT67elF5+JisKg3/dQISelKn8LhabSoVrMlD1
ch. 947 IN DNSKEY 257 3 8 AwEAAb7GhhZ8IAy/AhwmSms5DeQK5ad09wIIplEpYoiAIYXPtJvT1ReFzyfTp/2YP+g/PWDwHPh4qKAHa9x0VgbIQcGAeNakmfkAdWEmCnca323/SAml3mwfaX62G7/uYWae5zh8QTxZKNd+K1yZ5x0IxnI31chSl5xymRbTEHYZDKwSIRFM3fTxUMt93WFaBVWELReYotJBr++rvAWdnlay5TPBTvheLBkaiqtgM4GP8HK07Y+86lsZnEsj5K3G1KTV5SPpa82rqYAwxG9VKbmSE/6/kBR5jJHjt1rRt5Oe7v18aEtw0YCEN4vxq+KuvMoNVqXUsE9LBwHJD+QNwi6wmB0=
ch. 947 IN DNSKEY 256 3 8 AwEAAcSLdT0fEmcFmLpeUkAJoeVaHKiu+nbuc43fWlqaCRVf8t2HA4uWxOk0O5ci9nrFTc8nq8oa5fk5Cj7CHh4yrX9qUCfTdIWTyp8BDEdJpS+Dyb0u9wQuVj+nQMj4fLzdQf4TJs3/qxuiLr3nL1UUwlhhXeqSqGVb7p3mtB5HJ8ad
ch. 947 IN RRSIG DNSKEY 8 1 86400 20150127100909 20141212090909 46375 ch. bT8q0FWyeMH0SulNo6UdIIgZYNATwYsee2bikq2Gh339Bufma8eaqWIPYT3XKmxYPBFOw0bVl+kLZxTwbR1CFoCDXoP+qgQhh4mf9qkNiv2CDSc+0FE3FRREn+DAhYTUEuB58FPiPakFB8s8O7T+k2qhDae7jy4/y7Jl1lnjaBY8s7bzOUPhF0KKCNZmvoKwtL23ZdVeTSV1xM3jkiNnpzBKbcoSWECSGJVp1SE0BnRXdwQP41YTXFZ0310YjaTAUCC5qbMIWdEkHjfdSQtKBImnc85mkapq9w++XQ4zhauPWBtrPV3CcoCahjUaWdjrKVkibomlJZaN8MEO23CfQw==
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 893 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 41647
;; flags: qr rd ra cd ; qd: 1 an: 3 au: 0 ad: 1
;; QUESTIONS:
;; ingotronic.ch., type = DS, class = IN
;; ANSWERS:
ingotronic.ch. 3555 IN DS 6031 5 2 4A948F2FDADA24686E473EDAC00DCF972584C75E3FAA92C2021B6221449FF87E
ingotronic.ch. 3555 IN DS 6031 5 1 733D0218B571CD617B1A7493564B9FC4F12ADE82
ingotronic.ch. 3555 IN RRSIG DS 8 2 3600 20150129033614 20150105123019 60789 ch. rVPJP2HhzW7OkroK2axFj5Lb4iVWCH8Fp/Iq1rF952NDo72b8RiKje2RaAKJAGQ+wd0YgE+PAej04GCmkhlDJA/zvPeeTxuhy3HbJzReMlQ7fjyH+wW1hli+FuIYvogXWf7nO/9VyPORt8X/f/pjrOr3Vlj9sGLN8TGYpEuVSw4=
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 288 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 38680
;; flags: qr aa rd ra cd ; qd: 1 an: 4 au: 0 ad: 1
;; QUESTIONS:
;; ingotronic.ch., type = DNSKEY, class = IN
;; ANSWERS:
ingotronic.ch. 300 IN DNSKEY 257 3 5 AwEAAeA1vzmjaB+eBAcvhzpKEgAEFpvQ1rg4uKDW6MsQtacKoqBpgyep2+LuWotz5p/xYxj3NGsArwN8Ad5cY0FHRr8miTT0elOv6nvlqGIfRuhj/BXAQ1x4ihpSFslHw0lJMYFwxsUZWpUyjWX/nv1xRZMMwF46gui0N4OEbyTYusCk77D+A71k+K0EAitFIbIH4GCUKmH1H7HmXhSVH9bN/n7KEGwW32lmsuuUcJoRKDkcUvbMXY/9Xoa2quERrUg/rBbDUHowRPjYDS5GzY1+f4YY8s40BufGiqyUTKKXL953MVFK8gmezXA0hbmrnZ7CBOw/7238mORAdzExaX8n7CE=
ingotronic.ch. 300 IN DNSKEY 256 3 5 AwEAAZ2Xh77GFzpEDx7EHYxShqltHgkiG+BOjBGifEmnJhQSdE5/yNSLFNcdhZZ8HUPxYnaedTqJcFFg4AzUsQklF/fECegTJdZjaj2WoL0/I8K7HMfY/hVuRZUWPNglYi8agJRX6gdkFTCpUNI7stpgKqxtzUJhhw15uG/lKMplwqUr
ingotronic.ch. 300 IN RRSIG DNSKEY 5 2 300 20150125003700 20141226001657 6031 ingotronic.ch. rs1QlP2SlSpA2ELbzwg3DgWLzXWL3Lpv6CUJE2Q0qH2Zp7Qdy3cD+ZEtNh9v24Qv1M6JJ3zFt8mmZoCeW2ycuMbJCqBkW9CBuwF+VznZvZY2MxwPipvhvEEGP//0M8YAZJ66yQPDv3PTdAP8FYbIrJyvY44vwyncwbslpfHT9jAsrbfr3vuMuWps86dnP462q+0s1TxBfqi8mzo3gdavjHKWVNwohLahLKT+tWeu6DSzQv0YwMjwtkLgF7QRgx3ctIIkloOrnx9nHH1N6y+hxEB89fOlyVDjHhgL5uVtsD5fEdT0FJ2Gc/2nShEMMqIwr1/J9kUq1mNySff/uEe65Q==
ingotronic.ch. 300 IN RRSIG DNSKEY 5 2 300 20150125003700 20141226001657 17430 ingotronic.ch. mEwZjhQqeWksWD0TCnNBrtce4YkWJL3edqL6PvAUu8Fn+Ih437kEs3+pqdkgRsdYQ9HW+lBm/8pWwJlNAv0bi9NykItXMwAUFtncgq+6Pnh3iAM972GXSa5VV4LcGQ5b8CBdHCHiEKDqyPv5Hr5QfYL/FQaWlcNRh4QZZlZNPFA=
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 940 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 21506
;; flags: qr aa rd ra cd ; qd: 1 an: 3 au: 0 ad: 1
;; QUESTIONS:
;; nsec3.ingotronic.ch., type = DS, class = IN
;; ANSWERS:
nsec3.ingotronic.ch. 300 IN DS 16758 7 2 3C8DC02750A1636F829B45D6E6D642866768A9CD40A013AD9D25AB63734FFA13
nsec3.ingotronic.ch. 300 IN DS 16758 7 1 1720FF268E09A2CB63805EC8782D10AAD20E12A5
nsec3.ingotronic.ch. 300 IN RRSIG DS 5 3 300 20150125011134 20141226002644 17430 ingotronic.ch. hNurzlGhlyHbSgezPDuhIrtN9ZMsMXZbKGc7HD5rUuM88wD3fM97NxdzF+2Hi1USvBZ5GsQv63L+lAzf+mFPBoPIFHtTiAv8up7kQKRKmi/EzzkCYd/CC4UYdDZbaUyv7esh7spSOGwjPJNdK831p+MgltoWaYtnSGVMgOKk5mc=
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 305 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 34837
;; flags: qr aa rd ra cd ; qd: 1 an: 4 au: 0 ad: 1
;; QUESTIONS:
;; nsec3.ingotronic.ch., type = DNSKEY, class = IN
;; ANSWERS:
nsec3.ingotronic.ch. 300 IN DNSKEY 256 3 7 AwEAAccAWxkTVGZ6UAp0VEozAlYpARhbh6Y6tYOl6Fg3UeBNFFtDQ9fTEEt1NkbnR9u8KkpVN6a67avlYiUN1egDqEwzDU7R1Rw+/USdhm2hqOARmmu3DBgjjX/iXjZLyv310cOGFJZ/smcodlDL4pDAAoPxh/qs6KEBaT0sc1KWcGq3
nsec3.ingotronic.ch. 300 IN DNSKEY 257 3 7 AwEAAaBuJTf9oGyeTH3biUkAFLrsYrkodX1H7Snsui4XsDHFCBvs5XYacHbs0Jg0/O51KPjmNnjwMW8SSyDkKqYQ+9uYAf2EQ/pnD/VGQqnV2cw0Vwk/t0E2V4FUCju4pnAoyzZFZXGs1eWbX9JXu++b0Azp+ACq6485qJLzHhWDiIrPoK/SvdbFVRK4s+nPPJLH3NGBbtdz6kPq7aFWYBMoGeAZdN1wsQpcNWUo5eOmaJY53nMc7+rDpAyYlMe/FKwSZdX2ZDd63Qsa6Im4FVUJq/nWLq7tlQ/mWks15uDTQyJy/OWfA0ICCO4N9Fel9rThJNpJWEzOCblvZyBoy405kZk=
nsec3.ingotronic.ch. 300 IN RRSIG DNSKEY 7 3 300 20150125001457 20141226000444 16758 nsec3.ingotronic.ch. mXi1ylDi8XkRPup+YlT8GPdYE+P7gb6+/VdAwtodI916IzrkGkOHOTLbnrbAqqJOh0HxVCYXdxovmEcbJKUFKwplrQg3XD7/9Sq4pKU1MhMFEGrm/QPkM4u0mgjQwyToDLGuPHuFyur3FSjO/n54uGhAEft9JOFk/WKtWdCnm2LLyQrpC6herA3efFaI8kZhdoEY02AwihWVJxHasmz7lOoKRgNrkfELU+fN4+V7ISsRfJMyZc6q5PuNeG6vFD0uNE8tpdLJCSMurKYVpelvYqzFIcRTYcIjXwmS+L3DGjupqWMzFZVmpQM62JG3KCCD0ffpnNb0nWoSoHwpSeh/3Q==
nsec3.ingotronic.ch. 300 IN RRSIG DNSKEY 7 3 300 20150125001457 20141226000444 62417 nsec3.ingotronic.ch. PyCrf8T5dAfJzapb1p+kcTALPjDuD2niSaXXo0KeHAunT+6gJicLML2S/ZpiYr7X7Ma4Z0TYqE02qH6pcLYNnSgv9BE8sZO0nRtPekSyTy5nLi4hFADYhjb3UjaB85qmQZcqm64vC/CJhWO4t6Eixg/5MYALw+Qdy5Fo0qy/U5E=
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 958 bytes
###############################################
testTooLargeIterationCountMustThrow 0000664 0000000 0000000 00000000041 13020541473 0041567 0 ustar 00root root 0000000 0000000 dnssecjava-1.1.3/src/test/resources/recordings/org_jitsi_dnssec_validator_TestNsec3ValUtils #Date: 2015-01-06T22:35:28+01:00
dnssecjava-1.1.3/src/test/resources/recordings/org_jitsi_dnssec_validator_TestValUtils/ 0000775 0000000 0000000 00000000000 13020541473 0031633 5 ustar 00root root 0000000 0000000 testAtLeastOneDigestSupportedWithOnlyNonDSRecords 0000664 0000000 0000000 00000000041 13020541473 0043361 0 ustar 00root root 0000000 0000000 dnssecjava-1.1.3/src/test/resources/recordings/org_jitsi_dnssec_validator_TestValUtils #Date: 2015-01-06T22:35:25+01:00
testAtLeastOneSupportedAlgorithmWithOnlyNonDSRecords 0000664 0000000 0000000 00000000041 13020541473 0044070 0 ustar 00root root 0000000 0000000 dnssecjava-1.1.3/src/test/resources/recordings/org_jitsi_dnssec_validator_TestValUtils #Date: 2015-01-06T22:35:21+01:00
testDsNoDataWhenNsecProvesDs 0000664 0000000 0000000 00000036163 13020541473 0037166 0 ustar 00root root 0000000 0000000 dnssecjava-1.1.3/src/test/resources/recordings/org_jitsi_dnssec_validator_TestValUtils #Date: 2015-01-06T22:35:21+01:00
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 2340
;; flags: qr aa rd ra cd ; qd: 1 an: 0 au: 6 ad: 1
;; QUESTIONS:
;; sub1.ingotronic.ch., type = NSEC, class = IN
;; ANSWERS:
;; AUTHORITY RECORDS:
ingotronic.ch. 300 IN SOA ns1.ingotronic.ch. admin.ingotronic.ch. 2013032762 300 60 864000 300
ingotronic.ch. 300 IN RRSIG SOA 5 2 300 20150125021244 20141226011244 17430 ingotronic.ch. WDLpp9G0P/rlMBfpFn9sAfpEFoBnQfwyGSXbGCc/LG1FSkJoKLDQYDY696scLNsJgkrzZeJrl0oSSvA8AvRUhYRrmuqWMxTVFgYlRwPwqEMCKUqiVhKGVF4NYemoBiUQC4nJwBZd57xKCiF4AQ4CodBtiZxefJFAlTNE0g2yxtM=
ingotronic.ch. 300 IN NSEC alias.ingotronic.ch. A NS SOA RRSIG NSEC DNSKEY
ingotronic.ch. 300 IN RRSIG NSEC 5 2 300 20150125000532 20141225234703 17430 ingotronic.ch. en5BaZ6zWqEvoUFUDPm5g1pjz7THXBv/1kjKtV2tS+7xh0BtkLEzlA9n/H66ZZAX2EIh7vXj12xVJKOuEuM0o1mJwKsBaLQuTra60/zYAUIddwUOCzI3zzjiRFklPyHSnLkGoBODZcvehnsTzTPyBxkfoouleqpj7gN5jOSBL8M=
sub.ingotronic.ch. 300 IN NSEC unknown-alg.ingotronic.ch. NS DS RRSIG NSEC
sub.ingotronic.ch. 300 IN RRSIG NSEC 5 3 300 20150125004144 20141226003211 17430 ingotronic.ch. bNZQZZypKi/2MlAYJ6h0W69GSCLxnkvq4cXdR5oBfvcGlvP5AMnuqqY0HwjByPHqg8TMn/lrlpoXPODAjeAadRD73F3GD1YgyWDr1eCeSGCIHisadDYpzdeqgQNHxYbz2UMtB5d/6Q/C4yyzWuxk3Rpwg+bV77yYlOjDxgVYMhg=
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 705 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 41220
;; flags: qr rd ra ad cd ; qd: 1 an: 4 au: 0 ad: 1
;; QUESTIONS:
;; ., type = DNSKEY, class = IN
;; ANSWERS:
. 87352 IN DNSKEY 256 3 8 AwEAAaPD7Y7XIi1MOEREJNTrRhyqsY3gff6JWzg+XCbqut1sbcbvqyssHw8DT1AkRaAC92pO8xuyq5QEgEPL1IHfABLwpwXI5gTj4gdwi86bpkmlWs9fRpnn4DPDCTdrnxIejJXgClHikLJF3u3CdpNCMijq4CKdQbMlRZ3avv+G7rh7
. 87352 IN DNSKEY 257 3 8 AwEAAagAIKlVZrpC6Ia7gEzahOR+9W29euxhJhVVLOyQbSEW0O8gcCjFFVQUTf6v58fLjwBd0YI0EzrAcQqBGCzh/RStIoO8g0NfnfL2MTJRkxoXbfDaUeVPQuYEhg37NZWAJQ9VnMVDxP/VHL496M/QZxkjf5/Efucp2gaDX6RS6CXpoY68LsvPVjR0ZSwzz1apAzvN9dlzEheX7ICJBBtuA6G3LQpzW5hOA2hzCTMjJPJ8LbqF6dsV6DoBQzgul0sGIcGOYl7OyQdXfZ57relSQageu+ipAdTTJ25AsRTAoub8ONGcLmqrAmRLKBP1dfwhYB4N7knNnulqQxA+Uk1ihz0=
. 87352 IN DNSKEY 256 3 8 AwEAAe3fSrbLBy3LOS7pnxEUhvPZTE2H5dIGsI/UfruI/nOEvWWa/PSX2BFedBkEqOlYdjdNF2f+6lmfk2Od/xu0v5bVqxFE+/24v3hZSlWBxvXzPTAGHrbW/IJYEPqlzVOAS4XdUgHg0N7IbLywNHMvB+Yf+Nm6ctyXXFLV4WTNnzs7
. 87352 IN RRSIG DNSKEY 8 0 172800 20150115235959 20150101000000 19036 . i8cAxD2pvQi1oAyvQxRpDfFlbqPzW+69QQEsDwE1eWOm5AtawO9U7lmsGps7sy/fVNvl1ljKBj4Djp9pb3U2FLogjiIlW0cDAkPmLlG9t+b/pjEfBNlhjANUVN06pvQVAfm+LcF26EaWT6FlISBqb6jSy4BHRa3Bdc4Sx7+pRSYSqVVvYxLkfAWsKPqGkvWhebJDndJJV9syXQXgZ+v/uJ+6XOS43xkAdeL8iBzIs/FlwMTfh3tVe3d0lb65IBBLlCzeQuetX+0Vu1YFcnD0mHc/wS2ZnAV5toAFmyVQBoY/XAZiZeaOkcROJ6Zmqezy7liwK7BqsYyAZntMhk8lbg==
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 883 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 28241
;; flags: qr rd ra ad cd ; qd: 1 an: 2 au: 0 ad: 1
;; QUESTIONS:
;; ch., type = DS, class = IN
;; ANSWERS:
ch. 952 IN DS 46375 8 2 8F96646FC68BB7E4AF4C0750A6096FBC0D4ECDA3D3FA6DA06FDDB42EE50C6CF3
ch. 952 IN RRSIG DS 8 1 86400 20150112170000 20150105160000 16665 . thY7xYWBBxiBjqbQIb9fAG4TmQgnziwM7q6P1T3/ITxmECdvOCQnnZA3uD7qmN8uM0HudsD7+y+zgD3rsH4RSTKdL4kHSI0OnCxToMTvklghEgFDezqIRm8NkWdI2H4Stwrj20nYKSpLQxPI2EE54gs18P3KyO8bAUYv8Qx73xU=
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 238 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 39612
;; flags: qr rd ra ad cd ; qd: 1 an: 4 au: 0 ad: 1
;; QUESTIONS:
;; ch., type = DNSKEY, class = IN
;; ANSWERS:
ch. 953 IN DNSKEY 256 3 8 AwEAAcSLdT0fEmcFmLpeUkAJoeVaHKiu+nbuc43fWlqaCRVf8t2HA4uWxOk0O5ci9nrFTc8nq8oa5fk5Cj7CHh4yrX9qUCfTdIWTyp8BDEdJpS+Dyb0u9wQuVj+nQMj4fLzdQf4TJs3/qxuiLr3nL1UUwlhhXeqSqGVb7p3mtB5HJ8ad
ch. 953 IN DNSKEY 256 3 8 AwEAAcsg0kY6fw1wzYMhSAKTy+Y2JzAst66P/1odp9NECJJHbU8f4nwziI3onoFSBV0ZiSZhY1aH5dhdDZ7BkrqhVXSrZPAz0CvzjIxmB1gSOf9DeZvjQvoy97HqYolxsf+B3QQv2RKBT67elF5+JisKg3/dQISelKn8LhabSoVrMlD1
ch. 953 IN DNSKEY 257 3 8 AwEAAb7GhhZ8IAy/AhwmSms5DeQK5ad09wIIplEpYoiAIYXPtJvT1ReFzyfTp/2YP+g/PWDwHPh4qKAHa9x0VgbIQcGAeNakmfkAdWEmCnca323/SAml3mwfaX62G7/uYWae5zh8QTxZKNd+K1yZ5x0IxnI31chSl5xymRbTEHYZDKwSIRFM3fTxUMt93WFaBVWELReYotJBr++rvAWdnlay5TPBTvheLBkaiqtgM4GP8HK07Y+86lsZnEsj5K3G1KTV5SPpa82rqYAwxG9VKbmSE/6/kBR5jJHjt1rRt5Oe7v18aEtw0YCEN4vxq+KuvMoNVqXUsE9LBwHJD+QNwi6wmB0=
ch. 953 IN RRSIG DNSKEY 8 1 86400 20150127100909 20141212090909 46375 ch. bT8q0FWyeMH0SulNo6UdIIgZYNATwYsee2bikq2Gh339Bufma8eaqWIPYT3XKmxYPBFOw0bVl+kLZxTwbR1CFoCDXoP+qgQhh4mf9qkNiv2CDSc+0FE3FRREn+DAhYTUEuB58FPiPakFB8s8O7T+k2qhDae7jy4/y7Jl1lnjaBY8s7bzOUPhF0KKCNZmvoKwtL23ZdVeTSV1xM3jkiNnpzBKbcoSWECSGJVp1SE0BnRXdwQP41YTXFZ0310YjaTAUCC5qbMIWdEkHjfdSQtKBImnc85mkapq9w++XQ4zhauPWBtrPV3CcoCahjUaWdjrKVkibomlJZaN8MEO23CfQw==
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 893 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 32740
;; flags: qr rd ra cd ; qd: 1 an: 3 au: 0 ad: 1
;; QUESTIONS:
;; ingotronic.ch., type = DS, class = IN
;; ANSWERS:
ingotronic.ch. 3561 IN DS 6031 5 2 4A948F2FDADA24686E473EDAC00DCF972584C75E3FAA92C2021B6221449FF87E
ingotronic.ch. 3561 IN DS 6031 5 1 733D0218B571CD617B1A7493564B9FC4F12ADE82
ingotronic.ch. 3561 IN RRSIG DS 8 2 3600 20150129033614 20150105123019 60789 ch. rVPJP2HhzW7OkroK2axFj5Lb4iVWCH8Fp/Iq1rF952NDo72b8RiKje2RaAKJAGQ+wd0YgE+PAej04GCmkhlDJA/zvPeeTxuhy3HbJzReMlQ7fjyH+wW1hli+FuIYvogXWf7nO/9VyPORt8X/f/pjrOr3Vlj9sGLN8TGYpEuVSw4=
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 288 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 17983
;; flags: qr aa rd ra cd ; qd: 1 an: 4 au: 0 ad: 1
;; QUESTIONS:
;; ingotronic.ch., type = DNSKEY, class = IN
;; ANSWERS:
ingotronic.ch. 300 IN DNSKEY 256 3 5 AwEAAZ2Xh77GFzpEDx7EHYxShqltHgkiG+BOjBGifEmnJhQSdE5/yNSLFNcdhZZ8HUPxYnaedTqJcFFg4AzUsQklF/fECegTJdZjaj2WoL0/I8K7HMfY/hVuRZUWPNglYi8agJRX6gdkFTCpUNI7stpgKqxtzUJhhw15uG/lKMplwqUr
ingotronic.ch. 300 IN DNSKEY 257 3 5 AwEAAeA1vzmjaB+eBAcvhzpKEgAEFpvQ1rg4uKDW6MsQtacKoqBpgyep2+LuWotz5p/xYxj3NGsArwN8Ad5cY0FHRr8miTT0elOv6nvlqGIfRuhj/BXAQ1x4ihpSFslHw0lJMYFwxsUZWpUyjWX/nv1xRZMMwF46gui0N4OEbyTYusCk77D+A71k+K0EAitFIbIH4GCUKmH1H7HmXhSVH9bN/n7KEGwW32lmsuuUcJoRKDkcUvbMXY/9Xoa2quERrUg/rBbDUHowRPjYDS5GzY1+f4YY8s40BufGiqyUTKKXL953MVFK8gmezXA0hbmrnZ7CBOw/7238mORAdzExaX8n7CE=
ingotronic.ch. 300 IN RRSIG DNSKEY 5 2 300 20150125003700 20141226001657 6031 ingotronic.ch. rs1QlP2SlSpA2ELbzwg3DgWLzXWL3Lpv6CUJE2Q0qH2Zp7Qdy3cD+ZEtNh9v24Qv1M6JJ3zFt8mmZoCeW2ycuMbJCqBkW9CBuwF+VznZvZY2MxwPipvhvEEGP//0M8YAZJ66yQPDv3PTdAP8FYbIrJyvY44vwyncwbslpfHT9jAsrbfr3vuMuWps86dnP462q+0s1TxBfqi8mzo3gdavjHKWVNwohLahLKT+tWeu6DSzQv0YwMjwtkLgF7QRgx3ctIIkloOrnx9nHH1N6y+hxEB89fOlyVDjHhgL5uVtsD5fEdT0FJ2Gc/2nShEMMqIwr1/J9kUq1mNySff/uEe65Q==
ingotronic.ch. 300 IN RRSIG DNSKEY 5 2 300 20150125003700 20141226001657 17430 ingotronic.ch. mEwZjhQqeWksWD0TCnNBrtce4YkWJL3edqL6PvAUu8Fn+Ih437kEs3+pqdkgRsdYQ9HW+lBm/8pWwJlNAv0bi9NykItXMwAUFtncgq+6Pnh3iAM972GXSa5VV4LcGQ5b8CBdHCHiEKDqyPv5Hr5QfYL/FQaWlcNRh4QZZlZNPFA=
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 940 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 14892
;; flags: qr aa rd ra cd ; qd: 1 an: 2 au: 2 ad: 3
;; QUESTIONS:
;; sub.ingotronic.ch., type = A, class = IN
;; ANSWERS:
sub.ingotronic.ch. 300 IN A 127.0.0.1
sub.ingotronic.ch. 300 IN RRSIG A 5 3 300 20150131215757 20150101212100 3600 sub.ingotronic.ch. n5sXfpaxmFD6fFEvMEW+DwUJSP3yshFzkbc6idvWENf2b7F90jp093w4y0YkYsG5fWroQvHCJAMnXbawOEfFWquLhVJc8HHvZDXUeQb55rFYg8qYd1fOoP7/Z5hbwBNLSCGn3JPjCRXVfnEa58lKARgr+KZ1gqI/2Dm+jOoZ2Uc=
;; AUTHORITY RECORDS:
sub.ingotronic.ch. 300 IN NS ns1.ingotronic.ch.
sub.ingotronic.ch. 300 IN RRSIG NS 5 3 300 20150131215757 20150101212100 3600 sub.ingotronic.ch. sXlfjCvwDECHOum9PfpnP+/d7A1MntO1H4jYBpsFvQru3YoR02TghQhoReszEeds39AUWJFT8u9Bk+OrKUS+Ubi6i+wbaiKFpoRHdzWDN3YFu3flRx+2chdVl9KkGywcYBi2j51iDWjKbWoCE3E1t7OoA/DBqSACyeLLsolagpY=
;; ADDITIONAL RECORDS:
ns1.ingotronic.ch. 300 IN A 62.192.5.131
ns1.ingotronic.ch. 300 IN RRSIG A 5 3 300 20150125005754 20141226001054 17430 ingotronic.ch. fNG1RZM53pXwBxruHNaSZszxVzNLoCq8VZsTjAzYH2vSLzHXYVGJFTLIeY0K9APAdyJU8WuwmABmn7XY0Kg39kRG77uoFlqUws2PdTz2QKOwJGZY7W88Ak2Y9lkDBcK8o3wJHVptrT8R7p/1U7UfjF0kqPUkakk2B0EbFWdagFg=
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 623 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 25278
;; flags: qr rd ra ad cd ; qd: 1 an: 4 au: 0 ad: 1
;; QUESTIONS:
;; ., type = DNSKEY, class = IN
;; ANSWERS:
. 87352 IN DNSKEY 256 3 8 AwEAAaPD7Y7XIi1MOEREJNTrRhyqsY3gff6JWzg+XCbqut1sbcbvqyssHw8DT1AkRaAC92pO8xuyq5QEgEPL1IHfABLwpwXI5gTj4gdwi86bpkmlWs9fRpnn4DPDCTdrnxIejJXgClHikLJF3u3CdpNCMijq4CKdQbMlRZ3avv+G7rh7
. 87352 IN DNSKEY 257 3 8 AwEAAagAIKlVZrpC6Ia7gEzahOR+9W29euxhJhVVLOyQbSEW0O8gcCjFFVQUTf6v58fLjwBd0YI0EzrAcQqBGCzh/RStIoO8g0NfnfL2MTJRkxoXbfDaUeVPQuYEhg37NZWAJQ9VnMVDxP/VHL496M/QZxkjf5/Efucp2gaDX6RS6CXpoY68LsvPVjR0ZSwzz1apAzvN9dlzEheX7ICJBBtuA6G3LQpzW5hOA2hzCTMjJPJ8LbqF6dsV6DoBQzgul0sGIcGOYl7OyQdXfZ57relSQageu+ipAdTTJ25AsRTAoub8ONGcLmqrAmRLKBP1dfwhYB4N7knNnulqQxA+Uk1ihz0=
. 87352 IN DNSKEY 256 3 8 AwEAAe3fSrbLBy3LOS7pnxEUhvPZTE2H5dIGsI/UfruI/nOEvWWa/PSX2BFedBkEqOlYdjdNF2f+6lmfk2Od/xu0v5bVqxFE+/24v3hZSlWBxvXzPTAGHrbW/IJYEPqlzVOAS4XdUgHg0N7IbLywNHMvB+Yf+Nm6ctyXXFLV4WTNnzs7
. 87352 IN RRSIG DNSKEY 8 0 172800 20150115235959 20150101000000 19036 . i8cAxD2pvQi1oAyvQxRpDfFlbqPzW+69QQEsDwE1eWOm5AtawO9U7lmsGps7sy/fVNvl1ljKBj4Djp9pb3U2FLogjiIlW0cDAkPmLlG9t+b/pjEfBNlhjANUVN06pvQVAfm+LcF26EaWT6FlISBqb6jSy4BHRa3Bdc4Sx7+pRSYSqVVvYxLkfAWsKPqGkvWhebJDndJJV9syXQXgZ+v/uJ+6XOS43xkAdeL8iBzIs/FlwMTfh3tVe3d0lb65IBBLlCzeQuetX+0Vu1YFcnD0mHc/wS2ZnAV5toAFmyVQBoY/XAZiZeaOkcROJ6Zmqezy7liwK7BqsYyAZntMhk8lbg==
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 883 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 22717
;; flags: qr rd ra ad cd ; qd: 1 an: 2 au: 0 ad: 1
;; QUESTIONS:
;; ch., type = DS, class = IN
;; ANSWERS:
ch. 952 IN DS 46375 8 2 8F96646FC68BB7E4AF4C0750A6096FBC0D4ECDA3D3FA6DA06FDDB42EE50C6CF3
ch. 952 IN RRSIG DS 8 1 86400 20150112170000 20150105160000 16665 . thY7xYWBBxiBjqbQIb9fAG4TmQgnziwM7q6P1T3/ITxmECdvOCQnnZA3uD7qmN8uM0HudsD7+y+zgD3rsH4RSTKdL4kHSI0OnCxToMTvklghEgFDezqIRm8NkWdI2H4Stwrj20nYKSpLQxPI2EE54gs18P3KyO8bAUYv8Qx73xU=
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 238 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 54290
;; flags: qr rd ra ad cd ; qd: 1 an: 4 au: 0 ad: 1
;; QUESTIONS:
;; ch., type = DNSKEY, class = IN
;; ANSWERS:
ch. 953 IN DNSKEY 256 3 8 AwEAAcsg0kY6fw1wzYMhSAKTy+Y2JzAst66P/1odp9NECJJHbU8f4nwziI3onoFSBV0ZiSZhY1aH5dhdDZ7BkrqhVXSrZPAz0CvzjIxmB1gSOf9DeZvjQvoy97HqYolxsf+B3QQv2RKBT67elF5+JisKg3/dQISelKn8LhabSoVrMlD1
ch. 953 IN DNSKEY 257 3 8 AwEAAb7GhhZ8IAy/AhwmSms5DeQK5ad09wIIplEpYoiAIYXPtJvT1ReFzyfTp/2YP+g/PWDwHPh4qKAHa9x0VgbIQcGAeNakmfkAdWEmCnca323/SAml3mwfaX62G7/uYWae5zh8QTxZKNd+K1yZ5x0IxnI31chSl5xymRbTEHYZDKwSIRFM3fTxUMt93WFaBVWELReYotJBr++rvAWdnlay5TPBTvheLBkaiqtgM4GP8HK07Y+86lsZnEsj5K3G1KTV5SPpa82rqYAwxG9VKbmSE/6/kBR5jJHjt1rRt5Oe7v18aEtw0YCEN4vxq+KuvMoNVqXUsE9LBwHJD+QNwi6wmB0=
ch. 953 IN DNSKEY 256 3 8 AwEAAcSLdT0fEmcFmLpeUkAJoeVaHKiu+nbuc43fWlqaCRVf8t2HA4uWxOk0O5ci9nrFTc8nq8oa5fk5Cj7CHh4yrX9qUCfTdIWTyp8BDEdJpS+Dyb0u9wQuVj+nQMj4fLzdQf4TJs3/qxuiLr3nL1UUwlhhXeqSqGVb7p3mtB5HJ8ad
ch. 953 IN RRSIG DNSKEY 8 1 86400 20150127100909 20141212090909 46375 ch. bT8q0FWyeMH0SulNo6UdIIgZYNATwYsee2bikq2Gh339Bufma8eaqWIPYT3XKmxYPBFOw0bVl+kLZxTwbR1CFoCDXoP+qgQhh4mf9qkNiv2CDSc+0FE3FRREn+DAhYTUEuB58FPiPakFB8s8O7T+k2qhDae7jy4/y7Jl1lnjaBY8s7bzOUPhF0KKCNZmvoKwtL23ZdVeTSV1xM3jkiNnpzBKbcoSWECSGJVp1SE0BnRXdwQP41YTXFZ0310YjaTAUCC5qbMIWdEkHjfdSQtKBImnc85mkapq9w++XQ4zhauPWBtrPV3CcoCahjUaWdjrKVkibomlJZaN8MEO23CfQw==
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 893 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 49739
;; flags: qr rd ra cd ; qd: 1 an: 3 au: 0 ad: 1
;; QUESTIONS:
;; ingotronic.ch., type = DS, class = IN
;; ANSWERS:
ingotronic.ch. 3561 IN DS 6031 5 1 733D0218B571CD617B1A7493564B9FC4F12ADE82
ingotronic.ch. 3561 IN DS 6031 5 2 4A948F2FDADA24686E473EDAC00DCF972584C75E3FAA92C2021B6221449FF87E
ingotronic.ch. 3561 IN RRSIG DS 8 2 3600 20150129033614 20150105123019 60789 ch. rVPJP2HhzW7OkroK2axFj5Lb4iVWCH8Fp/Iq1rF952NDo72b8RiKje2RaAKJAGQ+wd0YgE+PAej04GCmkhlDJA/zvPeeTxuhy3HbJzReMlQ7fjyH+wW1hli+FuIYvogXWf7nO/9VyPORt8X/f/pjrOr3Vlj9sGLN8TGYpEuVSw4=
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 288 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 4917
;; flags: qr aa rd ra cd ; qd: 1 an: 4 au: 0 ad: 1
;; QUESTIONS:
;; ingotronic.ch., type = DNSKEY, class = IN
;; ANSWERS:
ingotronic.ch. 300 IN DNSKEY 257 3 5 AwEAAeA1vzmjaB+eBAcvhzpKEgAEFpvQ1rg4uKDW6MsQtacKoqBpgyep2+LuWotz5p/xYxj3NGsArwN8Ad5cY0FHRr8miTT0elOv6nvlqGIfRuhj/BXAQ1x4ihpSFslHw0lJMYFwxsUZWpUyjWX/nv1xRZMMwF46gui0N4OEbyTYusCk77D+A71k+K0EAitFIbIH4GCUKmH1H7HmXhSVH9bN/n7KEGwW32lmsuuUcJoRKDkcUvbMXY/9Xoa2quERrUg/rBbDUHowRPjYDS5GzY1+f4YY8s40BufGiqyUTKKXL953MVFK8gmezXA0hbmrnZ7CBOw/7238mORAdzExaX8n7CE=
ingotronic.ch. 300 IN DNSKEY 256 3 5 AwEAAZ2Xh77GFzpEDx7EHYxShqltHgkiG+BOjBGifEmnJhQSdE5/yNSLFNcdhZZ8HUPxYnaedTqJcFFg4AzUsQklF/fECegTJdZjaj2WoL0/I8K7HMfY/hVuRZUWPNglYi8agJRX6gdkFTCpUNI7stpgKqxtzUJhhw15uG/lKMplwqUr
ingotronic.ch. 300 IN RRSIG DNSKEY 5 2 300 20150125003700 20141226001657 6031 ingotronic.ch. rs1QlP2SlSpA2ELbzwg3DgWLzXWL3Lpv6CUJE2Q0qH2Zp7Qdy3cD+ZEtNh9v24Qv1M6JJ3zFt8mmZoCeW2ycuMbJCqBkW9CBuwF+VznZvZY2MxwPipvhvEEGP//0M8YAZJ66yQPDv3PTdAP8FYbIrJyvY44vwyncwbslpfHT9jAsrbfr3vuMuWps86dnP462q+0s1TxBfqi8mzo3gdavjHKWVNwohLahLKT+tWeu6DSzQv0YwMjwtkLgF7QRgx3ctIIkloOrnx9nHH1N6y+hxEB89fOlyVDjHhgL5uVtsD5fEdT0FJ2Gc/2nShEMMqIwr1/J9kUq1mNySff/uEe65Q==
ingotronic.ch. 300 IN RRSIG DNSKEY 5 2 300 20150125003700 20141226001657 17430 ingotronic.ch. mEwZjhQqeWksWD0TCnNBrtce4YkWJL3edqL6PvAUu8Fn+Ih437kEs3+pqdkgRsdYQ9HW+lBm/8pWwJlNAv0bi9NykItXMwAUFtncgq+6Pnh3iAM972GXSa5VV4LcGQ5b8CBdHCHiEKDqyPv5Hr5QfYL/FQaWlcNRh4QZZlZNPFA=
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 940 bytes
###############################################
testHasSignedNsecsWithoutSignedSigsReturnsFalse 0000664 0000000 0000000 00000000041 13020541473 0043135 0 ustar 00root root 0000000 0000000 dnssecjava-1.1.3/src/test/resources/recordings/org_jitsi_dnssec_validator_TestValUtils #Date: 2015-01-06T22:35:21+01:00
testLongestCommonNameRootIsRoot 0000664 0000000 0000000 00000000041 13020541473 0037763 0 ustar 00root root 0000000 0000000 dnssecjava-1.1.3/src/test/resources/recordings/org_jitsi_dnssec_validator_TestValUtils #Date: 2015-01-06T22:35:24+01:00
testNameErrorWhenNsecIsLastAndQnameBefore 0000664 0000000 0000000 00000033477 13020541473 0041612 0 ustar 00root root 0000000 0000000 dnssecjava-1.1.3/src/test/resources/recordings/org_jitsi_dnssec_validator_TestValUtils #Date: 2015-01-06T22:35:21+01:00
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 62178
;; flags: qr aa rd ra cd ; qd: 1 an: 0 au: 6 ad: 1
;; QUESTIONS:
;; zz.ingotronic.ch., type = NSEC, class = IN
;; ANSWERS:
;; AUTHORITY RECORDS:
ingotronic.ch. 300 IN SOA ns1.ingotronic.ch. admin.ingotronic.ch. 2013032762 300 60 864000 300
ingotronic.ch. 300 IN RRSIG SOA 5 2 300 20150125021244 20141226011244 17430 ingotronic.ch. WDLpp9G0P/rlMBfpFn9sAfpEFoBnQfwyGSXbGCc/LG1FSkJoKLDQYDY696scLNsJgkrzZeJrl0oSSvA8AvRUhYRrmuqWMxTVFgYlRwPwqEMCKUqiVhKGVF4NYemoBiUQC4nJwBZd57xKCiF4AQ4CodBtiZxefJFAlTNE0g2yxtM=
ingotronic.ch. 300 IN NSEC alias.ingotronic.ch. A NS SOA RRSIG NSEC DNSKEY
ingotronic.ch. 300 IN RRSIG NSEC 5 2 300 20150125000532 20141225234703 17430 ingotronic.ch. en5BaZ6zWqEvoUFUDPm5g1pjz7THXBv/1kjKtV2tS+7xh0BtkLEzlA9n/H66ZZAX2EIh7vXj12xVJKOuEuM0o1mJwKsBaLQuTra60/zYAUIddwUOCzI3zzjiRFklPyHSnLkGoBODZcvehnsTzTPyBxkfoouleqpj7gN5jOSBL8M=
z.ingotronic.ch. 300 IN NSEC ingotronic.ch. A RRSIG NSEC
z.ingotronic.ch. 300 IN RRSIG NSEC 5 3 300 20150125012443 20141226010256 17430 ingotronic.ch. GGnZrgc0Q9aUOAh8w4G7j9GS2G2WcY16ZpETaX5J5x6ZshQGBgKzXDGo2A42YFLalrRas5h44O9qPMIWzwWlZMOB8vEoD+cWSjrBv/gQwzrCyxkBp4v3TLE9lFpvWwTqdKZO0MjrV37IRW91EFR4Mg2Nfb1CVDQaj67CT2ldYdo=
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 689 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 19186
;; flags: qr rd ra ad cd ; qd: 1 an: 4 au: 0 ad: 1
;; QUESTIONS:
;; ., type = DNSKEY, class = IN
;; ANSWERS:
. 87352 IN DNSKEY 257 3 8 AwEAAagAIKlVZrpC6Ia7gEzahOR+9W29euxhJhVVLOyQbSEW0O8gcCjFFVQUTf6v58fLjwBd0YI0EzrAcQqBGCzh/RStIoO8g0NfnfL2MTJRkxoXbfDaUeVPQuYEhg37NZWAJQ9VnMVDxP/VHL496M/QZxkjf5/Efucp2gaDX6RS6CXpoY68LsvPVjR0ZSwzz1apAzvN9dlzEheX7ICJBBtuA6G3LQpzW5hOA2hzCTMjJPJ8LbqF6dsV6DoBQzgul0sGIcGOYl7OyQdXfZ57relSQageu+ipAdTTJ25AsRTAoub8ONGcLmqrAmRLKBP1dfwhYB4N7knNnulqQxA+Uk1ihz0=
. 87352 IN DNSKEY 256 3 8 AwEAAaPD7Y7XIi1MOEREJNTrRhyqsY3gff6JWzg+XCbqut1sbcbvqyssHw8DT1AkRaAC92pO8xuyq5QEgEPL1IHfABLwpwXI5gTj4gdwi86bpkmlWs9fRpnn4DPDCTdrnxIejJXgClHikLJF3u3CdpNCMijq4CKdQbMlRZ3avv+G7rh7
. 87352 IN DNSKEY 256 3 8 AwEAAe3fSrbLBy3LOS7pnxEUhvPZTE2H5dIGsI/UfruI/nOEvWWa/PSX2BFedBkEqOlYdjdNF2f+6lmfk2Od/xu0v5bVqxFE+/24v3hZSlWBxvXzPTAGHrbW/IJYEPqlzVOAS4XdUgHg0N7IbLywNHMvB+Yf+Nm6ctyXXFLV4WTNnzs7
. 87352 IN RRSIG DNSKEY 8 0 172800 20150115235959 20150101000000 19036 . i8cAxD2pvQi1oAyvQxRpDfFlbqPzW+69QQEsDwE1eWOm5AtawO9U7lmsGps7sy/fVNvl1ljKBj4Djp9pb3U2FLogjiIlW0cDAkPmLlG9t+b/pjEfBNlhjANUVN06pvQVAfm+LcF26EaWT6FlISBqb6jSy4BHRa3Bdc4Sx7+pRSYSqVVvYxLkfAWsKPqGkvWhebJDndJJV9syXQXgZ+v/uJ+6XOS43xkAdeL8iBzIs/FlwMTfh3tVe3d0lb65IBBLlCzeQuetX+0Vu1YFcnD0mHc/wS2ZnAV5toAFmyVQBoY/XAZiZeaOkcROJ6Zmqezy7liwK7BqsYyAZntMhk8lbg==
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 883 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 46485
;; flags: qr rd ra ad cd ; qd: 1 an: 2 au: 0 ad: 1
;; QUESTIONS:
;; ch., type = DS, class = IN
;; ANSWERS:
ch. 952 IN DS 46375 8 2 8F96646FC68BB7E4AF4C0750A6096FBC0D4ECDA3D3FA6DA06FDDB42EE50C6CF3
ch. 952 IN RRSIG DS 8 1 86400 20150112170000 20150105160000 16665 . thY7xYWBBxiBjqbQIb9fAG4TmQgnziwM7q6P1T3/ITxmECdvOCQnnZA3uD7qmN8uM0HudsD7+y+zgD3rsH4RSTKdL4kHSI0OnCxToMTvklghEgFDezqIRm8NkWdI2H4Stwrj20nYKSpLQxPI2EE54gs18P3KyO8bAUYv8Qx73xU=
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 238 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 54965
;; flags: qr rd ra ad cd ; qd: 1 an: 4 au: 0 ad: 1
;; QUESTIONS:
;; ch., type = DNSKEY, class = IN
;; ANSWERS:
ch. 953 IN DNSKEY 256 3 8 AwEAAcsg0kY6fw1wzYMhSAKTy+Y2JzAst66P/1odp9NECJJHbU8f4nwziI3onoFSBV0ZiSZhY1aH5dhdDZ7BkrqhVXSrZPAz0CvzjIxmB1gSOf9DeZvjQvoy97HqYolxsf+B3QQv2RKBT67elF5+JisKg3/dQISelKn8LhabSoVrMlD1
ch. 953 IN DNSKEY 256 3 8 AwEAAcSLdT0fEmcFmLpeUkAJoeVaHKiu+nbuc43fWlqaCRVf8t2HA4uWxOk0O5ci9nrFTc8nq8oa5fk5Cj7CHh4yrX9qUCfTdIWTyp8BDEdJpS+Dyb0u9wQuVj+nQMj4fLzdQf4TJs3/qxuiLr3nL1UUwlhhXeqSqGVb7p3mtB5HJ8ad
ch. 953 IN DNSKEY 257 3 8 AwEAAb7GhhZ8IAy/AhwmSms5DeQK5ad09wIIplEpYoiAIYXPtJvT1ReFzyfTp/2YP+g/PWDwHPh4qKAHa9x0VgbIQcGAeNakmfkAdWEmCnca323/SAml3mwfaX62G7/uYWae5zh8QTxZKNd+K1yZ5x0IxnI31chSl5xymRbTEHYZDKwSIRFM3fTxUMt93WFaBVWELReYotJBr++rvAWdnlay5TPBTvheLBkaiqtgM4GP8HK07Y+86lsZnEsj5K3G1KTV5SPpa82rqYAwxG9VKbmSE/6/kBR5jJHjt1rRt5Oe7v18aEtw0YCEN4vxq+KuvMoNVqXUsE9LBwHJD+QNwi6wmB0=
ch. 953 IN RRSIG DNSKEY 8 1 86400 20150127100909 20141212090909 46375 ch. bT8q0FWyeMH0SulNo6UdIIgZYNATwYsee2bikq2Gh339Bufma8eaqWIPYT3XKmxYPBFOw0bVl+kLZxTwbR1CFoCDXoP+qgQhh4mf9qkNiv2CDSc+0FE3FRREn+DAhYTUEuB58FPiPakFB8s8O7T+k2qhDae7jy4/y7Jl1lnjaBY8s7bzOUPhF0KKCNZmvoKwtL23ZdVeTSV1xM3jkiNnpzBKbcoSWECSGJVp1SE0BnRXdwQP41YTXFZ0310YjaTAUCC5qbMIWdEkHjfdSQtKBImnc85mkapq9w++XQ4zhauPWBtrPV3CcoCahjUaWdjrKVkibomlJZaN8MEO23CfQw==
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 893 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 18838
;; flags: qr rd ra cd ; qd: 1 an: 3 au: 0 ad: 1
;; QUESTIONS:
;; ingotronic.ch., type = DS, class = IN
;; ANSWERS:
ingotronic.ch. 3561 IN DS 6031 5 1 733D0218B571CD617B1A7493564B9FC4F12ADE82
ingotronic.ch. 3561 IN DS 6031 5 2 4A948F2FDADA24686E473EDAC00DCF972584C75E3FAA92C2021B6221449FF87E
ingotronic.ch. 3561 IN RRSIG DS 8 2 3600 20150129033614 20150105123019 60789 ch. rVPJP2HhzW7OkroK2axFj5Lb4iVWCH8Fp/Iq1rF952NDo72b8RiKje2RaAKJAGQ+wd0YgE+PAej04GCmkhlDJA/zvPeeTxuhy3HbJzReMlQ7fjyH+wW1hli+FuIYvogXWf7nO/9VyPORt8X/f/pjrOr3Vlj9sGLN8TGYpEuVSw4=
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 288 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 26238
;; flags: qr aa rd ra cd ; qd: 1 an: 4 au: 0 ad: 1
;; QUESTIONS:
;; ingotronic.ch., type = DNSKEY, class = IN
;; ANSWERS:
ingotronic.ch. 300 IN DNSKEY 256 3 5 AwEAAZ2Xh77GFzpEDx7EHYxShqltHgkiG+BOjBGifEmnJhQSdE5/yNSLFNcdhZZ8HUPxYnaedTqJcFFg4AzUsQklF/fECegTJdZjaj2WoL0/I8K7HMfY/hVuRZUWPNglYi8agJRX6gdkFTCpUNI7stpgKqxtzUJhhw15uG/lKMplwqUr
ingotronic.ch. 300 IN DNSKEY 257 3 5 AwEAAeA1vzmjaB+eBAcvhzpKEgAEFpvQ1rg4uKDW6MsQtacKoqBpgyep2+LuWotz5p/xYxj3NGsArwN8Ad5cY0FHRr8miTT0elOv6nvlqGIfRuhj/BXAQ1x4ihpSFslHw0lJMYFwxsUZWpUyjWX/nv1xRZMMwF46gui0N4OEbyTYusCk77D+A71k+K0EAitFIbIH4GCUKmH1H7HmXhSVH9bN/n7KEGwW32lmsuuUcJoRKDkcUvbMXY/9Xoa2quERrUg/rBbDUHowRPjYDS5GzY1+f4YY8s40BufGiqyUTKKXL953MVFK8gmezXA0hbmrnZ7CBOw/7238mORAdzExaX8n7CE=
ingotronic.ch. 300 IN RRSIG DNSKEY 5 2 300 20150125003700 20141226001657 6031 ingotronic.ch. rs1QlP2SlSpA2ELbzwg3DgWLzXWL3Lpv6CUJE2Q0qH2Zp7Qdy3cD+ZEtNh9v24Qv1M6JJ3zFt8mmZoCeW2ycuMbJCqBkW9CBuwF+VznZvZY2MxwPipvhvEEGP//0M8YAZJ66yQPDv3PTdAP8FYbIrJyvY44vwyncwbslpfHT9jAsrbfr3vuMuWps86dnP462q+0s1TxBfqi8mzo3gdavjHKWVNwohLahLKT+tWeu6DSzQv0YwMjwtkLgF7QRgx3ctIIkloOrnx9nHH1N6y+hxEB89fOlyVDjHhgL5uVtsD5fEdT0FJ2Gc/2nShEMMqIwr1/J9kUq1mNySff/uEe65Q==
ingotronic.ch. 300 IN RRSIG DNSKEY 5 2 300 20150125003700 20141226001657 17430 ingotronic.ch. mEwZjhQqeWksWD0TCnNBrtce4YkWJL3edqL6PvAUu8Fn+Ih437kEs3+pqdkgRsdYQ9HW+lBm/8pWwJlNAv0bi9NykItXMwAUFtncgq+6Pnh3iAM972GXSa5VV4LcGQ5b8CBdHCHiEKDqyPv5Hr5QfYL/FQaWlcNRh4QZZlZNPFA=
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 940 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 57008
;; flags: qr rd ra ad cd ; qd: 1 an: 4 au: 0 ad: 1
;; QUESTIONS:
;; ., type = DNSKEY, class = IN
;; ANSWERS:
. 87352 IN DNSKEY 256 3 8 AwEAAaPD7Y7XIi1MOEREJNTrRhyqsY3gff6JWzg+XCbqut1sbcbvqyssHw8DT1AkRaAC92pO8xuyq5QEgEPL1IHfABLwpwXI5gTj4gdwi86bpkmlWs9fRpnn4DPDCTdrnxIejJXgClHikLJF3u3CdpNCMijq4CKdQbMlRZ3avv+G7rh7
. 87352 IN DNSKEY 257 3 8 AwEAAagAIKlVZrpC6Ia7gEzahOR+9W29euxhJhVVLOyQbSEW0O8gcCjFFVQUTf6v58fLjwBd0YI0EzrAcQqBGCzh/RStIoO8g0NfnfL2MTJRkxoXbfDaUeVPQuYEhg37NZWAJQ9VnMVDxP/VHL496M/QZxkjf5/Efucp2gaDX6RS6CXpoY68LsvPVjR0ZSwzz1apAzvN9dlzEheX7ICJBBtuA6G3LQpzW5hOA2hzCTMjJPJ8LbqF6dsV6DoBQzgul0sGIcGOYl7OyQdXfZ57relSQageu+ipAdTTJ25AsRTAoub8ONGcLmqrAmRLKBP1dfwhYB4N7knNnulqQxA+Uk1ihz0=
. 87352 IN DNSKEY 256 3 8 AwEAAe3fSrbLBy3LOS7pnxEUhvPZTE2H5dIGsI/UfruI/nOEvWWa/PSX2BFedBkEqOlYdjdNF2f+6lmfk2Od/xu0v5bVqxFE+/24v3hZSlWBxvXzPTAGHrbW/IJYEPqlzVOAS4XdUgHg0N7IbLywNHMvB+Yf+Nm6ctyXXFLV4WTNnzs7
. 87352 IN RRSIG DNSKEY 8 0 172800 20150115235959 20150101000000 19036 . i8cAxD2pvQi1oAyvQxRpDfFlbqPzW+69QQEsDwE1eWOm5AtawO9U7lmsGps7sy/fVNvl1ljKBj4Djp9pb3U2FLogjiIlW0cDAkPmLlG9t+b/pjEfBNlhjANUVN06pvQVAfm+LcF26EaWT6FlISBqb6jSy4BHRa3Bdc4Sx7+pRSYSqVVvYxLkfAWsKPqGkvWhebJDndJJV9syXQXgZ+v/uJ+6XOS43xkAdeL8iBzIs/FlwMTfh3tVe3d0lb65IBBLlCzeQuetX+0Vu1YFcnD0mHc/wS2ZnAV5toAFmyVQBoY/XAZiZeaOkcROJ6Zmqezy7liwK7BqsYyAZntMhk8lbg==
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 883 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 44823
;; flags: qr rd ra ad cd ; qd: 1 an: 2 au: 0 ad: 1
;; QUESTIONS:
;; ch., type = DS, class = IN
;; ANSWERS:
ch. 952 IN DS 46375 8 2 8F96646FC68BB7E4AF4C0750A6096FBC0D4ECDA3D3FA6DA06FDDB42EE50C6CF3
ch. 952 IN RRSIG DS 8 1 86400 20150112170000 20150105160000 16665 . thY7xYWBBxiBjqbQIb9fAG4TmQgnziwM7q6P1T3/ITxmECdvOCQnnZA3uD7qmN8uM0HudsD7+y+zgD3rsH4RSTKdL4kHSI0OnCxToMTvklghEgFDezqIRm8NkWdI2H4Stwrj20nYKSpLQxPI2EE54gs18P3KyO8bAUYv8Qx73xU=
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 238 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 29043
;; flags: qr rd ra ad cd ; qd: 1 an: 4 au: 0 ad: 1
;; QUESTIONS:
;; ch., type = DNSKEY, class = IN
;; ANSWERS:
ch. 953 IN DNSKEY 257 3 8 AwEAAb7GhhZ8IAy/AhwmSms5DeQK5ad09wIIplEpYoiAIYXPtJvT1ReFzyfTp/2YP+g/PWDwHPh4qKAHa9x0VgbIQcGAeNakmfkAdWEmCnca323/SAml3mwfaX62G7/uYWae5zh8QTxZKNd+K1yZ5x0IxnI31chSl5xymRbTEHYZDKwSIRFM3fTxUMt93WFaBVWELReYotJBr++rvAWdnlay5TPBTvheLBkaiqtgM4GP8HK07Y+86lsZnEsj5K3G1KTV5SPpa82rqYAwxG9VKbmSE/6/kBR5jJHjt1rRt5Oe7v18aEtw0YCEN4vxq+KuvMoNVqXUsE9LBwHJD+QNwi6wmB0=
ch. 953 IN DNSKEY 256 3 8 AwEAAcSLdT0fEmcFmLpeUkAJoeVaHKiu+nbuc43fWlqaCRVf8t2HA4uWxOk0O5ci9nrFTc8nq8oa5fk5Cj7CHh4yrX9qUCfTdIWTyp8BDEdJpS+Dyb0u9wQuVj+nQMj4fLzdQf4TJs3/qxuiLr3nL1UUwlhhXeqSqGVb7p3mtB5HJ8ad
ch. 953 IN DNSKEY 256 3 8 AwEAAcsg0kY6fw1wzYMhSAKTy+Y2JzAst66P/1odp9NECJJHbU8f4nwziI3onoFSBV0ZiSZhY1aH5dhdDZ7BkrqhVXSrZPAz0CvzjIxmB1gSOf9DeZvjQvoy97HqYolxsf+B3QQv2RKBT67elF5+JisKg3/dQISelKn8LhabSoVrMlD1
ch. 953 IN RRSIG DNSKEY 8 1 86400 20150127100909 20141212090909 46375 ch. bT8q0FWyeMH0SulNo6UdIIgZYNATwYsee2bikq2Gh339Bufma8eaqWIPYT3XKmxYPBFOw0bVl+kLZxTwbR1CFoCDXoP+qgQhh4mf9qkNiv2CDSc+0FE3FRREn+DAhYTUEuB58FPiPakFB8s8O7T+k2qhDae7jy4/y7Jl1lnjaBY8s7bzOUPhF0KKCNZmvoKwtL23ZdVeTSV1xM3jkiNnpzBKbcoSWECSGJVp1SE0BnRXdwQP41YTXFZ0310YjaTAUCC5qbMIWdEkHjfdSQtKBImnc85mkapq9w++XQ4zhauPWBtrPV3CcoCahjUaWdjrKVkibomlJZaN8MEO23CfQw==
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 893 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 62522
;; flags: qr rd ra cd ; qd: 1 an: 3 au: 0 ad: 1
;; QUESTIONS:
;; ingotronic.ch., type = DS, class = IN
;; ANSWERS:
ingotronic.ch. 3561 IN DS 6031 5 1 733D0218B571CD617B1A7493564B9FC4F12ADE82
ingotronic.ch. 3561 IN DS 6031 5 2 4A948F2FDADA24686E473EDAC00DCF972584C75E3FAA92C2021B6221449FF87E
ingotronic.ch. 3561 IN RRSIG DS 8 2 3600 20150129033614 20150105123019 60789 ch. rVPJP2HhzW7OkroK2axFj5Lb4iVWCH8Fp/Iq1rF952NDo72b8RiKje2RaAKJAGQ+wd0YgE+PAej04GCmkhlDJA/zvPeeTxuhy3HbJzReMlQ7fjyH+wW1hli+FuIYvogXWf7nO/9VyPORt8X/f/pjrOr3Vlj9sGLN8TGYpEuVSw4=
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 288 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 24379
;; flags: qr aa rd ra cd ; qd: 1 an: 4 au: 0 ad: 1
;; QUESTIONS:
;; ingotronic.ch., type = DNSKEY, class = IN
;; ANSWERS:
ingotronic.ch. 300 IN DNSKEY 256 3 5 AwEAAZ2Xh77GFzpEDx7EHYxShqltHgkiG+BOjBGifEmnJhQSdE5/yNSLFNcdhZZ8HUPxYnaedTqJcFFg4AzUsQklF/fECegTJdZjaj2WoL0/I8K7HMfY/hVuRZUWPNglYi8agJRX6gdkFTCpUNI7stpgKqxtzUJhhw15uG/lKMplwqUr
ingotronic.ch. 300 IN DNSKEY 257 3 5 AwEAAeA1vzmjaB+eBAcvhzpKEgAEFpvQ1rg4uKDW6MsQtacKoqBpgyep2+LuWotz5p/xYxj3NGsArwN8Ad5cY0FHRr8miTT0elOv6nvlqGIfRuhj/BXAQ1x4ihpSFslHw0lJMYFwxsUZWpUyjWX/nv1xRZMMwF46gui0N4OEbyTYusCk77D+A71k+K0EAitFIbIH4GCUKmH1H7HmXhSVH9bN/n7KEGwW32lmsuuUcJoRKDkcUvbMXY/9Xoa2quERrUg/rBbDUHowRPjYDS5GzY1+f4YY8s40BufGiqyUTKKXL953MVFK8gmezXA0hbmrnZ7CBOw/7238mORAdzExaX8n7CE=
ingotronic.ch. 300 IN RRSIG DNSKEY 5 2 300 20150125003700 20141226001657 6031 ingotronic.ch. rs1QlP2SlSpA2ELbzwg3DgWLzXWL3Lpv6CUJE2Q0qH2Zp7Qdy3cD+ZEtNh9v24Qv1M6JJ3zFt8mmZoCeW2ycuMbJCqBkW9CBuwF+VznZvZY2MxwPipvhvEEGP//0M8YAZJ66yQPDv3PTdAP8FYbIrJyvY44vwyncwbslpfHT9jAsrbfr3vuMuWps86dnP462q+0s1TxBfqi8mzo3gdavjHKWVNwohLahLKT+tWeu6DSzQv0YwMjwtkLgF7QRgx3ctIIkloOrnx9nHH1N6y+hxEB89fOlyVDjHhgL5uVtsD5fEdT0FJ2Gc/2nShEMMqIwr1/J9kUq1mNySff/uEe65Q==
ingotronic.ch. 300 IN RRSIG DNSKEY 5 2 300 20150125003700 20141226001657 17430 ingotronic.ch. mEwZjhQqeWksWD0TCnNBrtce4YkWJL3edqL6PvAUu8Fn+Ih437kEs3+pqdkgRsdYQ9HW+lBm/8pWwJlNAv0bi9NykItXMwAUFtncgq+6Pnh3iAM972GXSa5VV4LcGQ5b8CBdHCHiEKDqyPv5Hr5QfYL/FQaWlcNRh4QZZlZNPFA=
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 940 bytes
###############################################
testNameErrorWhenNsecIsLastAndQnameDifferentDomain 0000664 0000000 0000000 00000033474 13020541473 0043443 0 ustar 00root root 0000000 0000000 dnssecjava-1.1.3/src/test/resources/recordings/org_jitsi_dnssec_validator_TestValUtils #Date: 2015-01-06T22:35:20+01:00
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 3858
;; flags: qr aa rd ra cd ; qd: 1 an: 0 au: 6 ad: 1
;; QUESTIONS:
;; zz.ingotronic.ch., type = NSEC, class = IN
;; ANSWERS:
;; AUTHORITY RECORDS:
ingotronic.ch. 300 IN SOA ns1.ingotronic.ch. admin.ingotronic.ch. 2013032762 300 60 864000 300
ingotronic.ch. 300 IN RRSIG SOA 5 2 300 20150125021244 20141226011244 17430 ingotronic.ch. WDLpp9G0P/rlMBfpFn9sAfpEFoBnQfwyGSXbGCc/LG1FSkJoKLDQYDY696scLNsJgkrzZeJrl0oSSvA8AvRUhYRrmuqWMxTVFgYlRwPwqEMCKUqiVhKGVF4NYemoBiUQC4nJwBZd57xKCiF4AQ4CodBtiZxefJFAlTNE0g2yxtM=
ingotronic.ch. 300 IN NSEC alias.ingotronic.ch. A NS SOA RRSIG NSEC DNSKEY
ingotronic.ch. 300 IN RRSIG NSEC 5 2 300 20150125000532 20141225234703 17430 ingotronic.ch. en5BaZ6zWqEvoUFUDPm5g1pjz7THXBv/1kjKtV2tS+7xh0BtkLEzlA9n/H66ZZAX2EIh7vXj12xVJKOuEuM0o1mJwKsBaLQuTra60/zYAUIddwUOCzI3zzjiRFklPyHSnLkGoBODZcvehnsTzTPyBxkfoouleqpj7gN5jOSBL8M=
z.ingotronic.ch. 300 IN NSEC ingotronic.ch. A RRSIG NSEC
z.ingotronic.ch. 300 IN RRSIG NSEC 5 3 300 20150125012443 20141226010256 17430 ingotronic.ch. GGnZrgc0Q9aUOAh8w4G7j9GS2G2WcY16ZpETaX5J5x6ZshQGBgKzXDGo2A42YFLalrRas5h44O9qPMIWzwWlZMOB8vEoD+cWSjrBv/gQwzrCyxkBp4v3TLE9lFpvWwTqdKZO0MjrV37IRW91EFR4Mg2Nfb1CVDQaj67CT2ldYdo=
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 689 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 2610
;; flags: qr rd ra ad cd ; qd: 1 an: 4 au: 0 ad: 1
;; QUESTIONS:
;; ., type = DNSKEY, class = IN
;; ANSWERS:
. 87353 IN DNSKEY 256 3 8 AwEAAaPD7Y7XIi1MOEREJNTrRhyqsY3gff6JWzg+XCbqut1sbcbvqyssHw8DT1AkRaAC92pO8xuyq5QEgEPL1IHfABLwpwXI5gTj4gdwi86bpkmlWs9fRpnn4DPDCTdrnxIejJXgClHikLJF3u3CdpNCMijq4CKdQbMlRZ3avv+G7rh7
. 87353 IN DNSKEY 257 3 8 AwEAAagAIKlVZrpC6Ia7gEzahOR+9W29euxhJhVVLOyQbSEW0O8gcCjFFVQUTf6v58fLjwBd0YI0EzrAcQqBGCzh/RStIoO8g0NfnfL2MTJRkxoXbfDaUeVPQuYEhg37NZWAJQ9VnMVDxP/VHL496M/QZxkjf5/Efucp2gaDX6RS6CXpoY68LsvPVjR0ZSwzz1apAzvN9dlzEheX7ICJBBtuA6G3LQpzW5hOA2hzCTMjJPJ8LbqF6dsV6DoBQzgul0sGIcGOYl7OyQdXfZ57relSQageu+ipAdTTJ25AsRTAoub8ONGcLmqrAmRLKBP1dfwhYB4N7knNnulqQxA+Uk1ihz0=
. 87353 IN DNSKEY 256 3 8 AwEAAe3fSrbLBy3LOS7pnxEUhvPZTE2H5dIGsI/UfruI/nOEvWWa/PSX2BFedBkEqOlYdjdNF2f+6lmfk2Od/xu0v5bVqxFE+/24v3hZSlWBxvXzPTAGHrbW/IJYEPqlzVOAS4XdUgHg0N7IbLywNHMvB+Yf+Nm6ctyXXFLV4WTNnzs7
. 87353 IN RRSIG DNSKEY 8 0 172800 20150115235959 20150101000000 19036 . i8cAxD2pvQi1oAyvQxRpDfFlbqPzW+69QQEsDwE1eWOm5AtawO9U7lmsGps7sy/fVNvl1ljKBj4Djp9pb3U2FLogjiIlW0cDAkPmLlG9t+b/pjEfBNlhjANUVN06pvQVAfm+LcF26EaWT6FlISBqb6jSy4BHRa3Bdc4Sx7+pRSYSqVVvYxLkfAWsKPqGkvWhebJDndJJV9syXQXgZ+v/uJ+6XOS43xkAdeL8iBzIs/FlwMTfh3tVe3d0lb65IBBLlCzeQuetX+0Vu1YFcnD0mHc/wS2ZnAV5toAFmyVQBoY/XAZiZeaOkcROJ6Zmqezy7liwK7BqsYyAZntMhk8lbg==
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 883 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 41375
;; flags: qr rd ra ad cd ; qd: 1 an: 2 au: 0 ad: 1
;; QUESTIONS:
;; ch., type = DS, class = IN
;; ANSWERS:
ch. 953 IN DS 46375 8 2 8F96646FC68BB7E4AF4C0750A6096FBC0D4ECDA3D3FA6DA06FDDB42EE50C6CF3
ch. 953 IN RRSIG DS 8 1 86400 20150112170000 20150105160000 16665 . thY7xYWBBxiBjqbQIb9fAG4TmQgnziwM7q6P1T3/ITxmECdvOCQnnZA3uD7qmN8uM0HudsD7+y+zgD3rsH4RSTKdL4kHSI0OnCxToMTvklghEgFDezqIRm8NkWdI2H4Stwrj20nYKSpLQxPI2EE54gs18P3KyO8bAUYv8Qx73xU=
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 238 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 28417
;; flags: qr rd ra ad cd ; qd: 1 an: 4 au: 0 ad: 1
;; QUESTIONS:
;; ch., type = DNSKEY, class = IN
;; ANSWERS:
ch. 954 IN DNSKEY 256 3 8 AwEAAcsg0kY6fw1wzYMhSAKTy+Y2JzAst66P/1odp9NECJJHbU8f4nwziI3onoFSBV0ZiSZhY1aH5dhdDZ7BkrqhVXSrZPAz0CvzjIxmB1gSOf9DeZvjQvoy97HqYolxsf+B3QQv2RKBT67elF5+JisKg3/dQISelKn8LhabSoVrMlD1
ch. 954 IN DNSKEY 256 3 8 AwEAAcSLdT0fEmcFmLpeUkAJoeVaHKiu+nbuc43fWlqaCRVf8t2HA4uWxOk0O5ci9nrFTc8nq8oa5fk5Cj7CHh4yrX9qUCfTdIWTyp8BDEdJpS+Dyb0u9wQuVj+nQMj4fLzdQf4TJs3/qxuiLr3nL1UUwlhhXeqSqGVb7p3mtB5HJ8ad
ch. 954 IN DNSKEY 257 3 8 AwEAAb7GhhZ8IAy/AhwmSms5DeQK5ad09wIIplEpYoiAIYXPtJvT1ReFzyfTp/2YP+g/PWDwHPh4qKAHa9x0VgbIQcGAeNakmfkAdWEmCnca323/SAml3mwfaX62G7/uYWae5zh8QTxZKNd+K1yZ5x0IxnI31chSl5xymRbTEHYZDKwSIRFM3fTxUMt93WFaBVWELReYotJBr++rvAWdnlay5TPBTvheLBkaiqtgM4GP8HK07Y+86lsZnEsj5K3G1KTV5SPpa82rqYAwxG9VKbmSE/6/kBR5jJHjt1rRt5Oe7v18aEtw0YCEN4vxq+KuvMoNVqXUsE9LBwHJD+QNwi6wmB0=
ch. 954 IN RRSIG DNSKEY 8 1 86400 20150127100909 20141212090909 46375 ch. bT8q0FWyeMH0SulNo6UdIIgZYNATwYsee2bikq2Gh339Bufma8eaqWIPYT3XKmxYPBFOw0bVl+kLZxTwbR1CFoCDXoP+qgQhh4mf9qkNiv2CDSc+0FE3FRREn+DAhYTUEuB58FPiPakFB8s8O7T+k2qhDae7jy4/y7Jl1lnjaBY8s7bzOUPhF0KKCNZmvoKwtL23ZdVeTSV1xM3jkiNnpzBKbcoSWECSGJVp1SE0BnRXdwQP41YTXFZ0310YjaTAUCC5qbMIWdEkHjfdSQtKBImnc85mkapq9w++XQ4zhauPWBtrPV3CcoCahjUaWdjrKVkibomlJZaN8MEO23CfQw==
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 893 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 7903
;; flags: qr rd ra cd ; qd: 1 an: 3 au: 0 ad: 1
;; QUESTIONS:
;; ingotronic.ch., type = DS, class = IN
;; ANSWERS:
ingotronic.ch. 3562 IN DS 6031 5 2 4A948F2FDADA24686E473EDAC00DCF972584C75E3FAA92C2021B6221449FF87E
ingotronic.ch. 3562 IN DS 6031 5 1 733D0218B571CD617B1A7493564B9FC4F12ADE82
ingotronic.ch. 3562 IN RRSIG DS 8 2 3600 20150129033614 20150105123019 60789 ch. rVPJP2HhzW7OkroK2axFj5Lb4iVWCH8Fp/Iq1rF952NDo72b8RiKje2RaAKJAGQ+wd0YgE+PAej04GCmkhlDJA/zvPeeTxuhy3HbJzReMlQ7fjyH+wW1hli+FuIYvogXWf7nO/9VyPORt8X/f/pjrOr3Vlj9sGLN8TGYpEuVSw4=
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 288 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 25373
;; flags: qr aa rd ra cd ; qd: 1 an: 4 au: 0 ad: 1
;; QUESTIONS:
;; ingotronic.ch., type = DNSKEY, class = IN
;; ANSWERS:
ingotronic.ch. 300 IN DNSKEY 257 3 5 AwEAAeA1vzmjaB+eBAcvhzpKEgAEFpvQ1rg4uKDW6MsQtacKoqBpgyep2+LuWotz5p/xYxj3NGsArwN8Ad5cY0FHRr8miTT0elOv6nvlqGIfRuhj/BXAQ1x4ihpSFslHw0lJMYFwxsUZWpUyjWX/nv1xRZMMwF46gui0N4OEbyTYusCk77D+A71k+K0EAitFIbIH4GCUKmH1H7HmXhSVH9bN/n7KEGwW32lmsuuUcJoRKDkcUvbMXY/9Xoa2quERrUg/rBbDUHowRPjYDS5GzY1+f4YY8s40BufGiqyUTKKXL953MVFK8gmezXA0hbmrnZ7CBOw/7238mORAdzExaX8n7CE=
ingotronic.ch. 300 IN DNSKEY 256 3 5 AwEAAZ2Xh77GFzpEDx7EHYxShqltHgkiG+BOjBGifEmnJhQSdE5/yNSLFNcdhZZ8HUPxYnaedTqJcFFg4AzUsQklF/fECegTJdZjaj2WoL0/I8K7HMfY/hVuRZUWPNglYi8agJRX6gdkFTCpUNI7stpgKqxtzUJhhw15uG/lKMplwqUr
ingotronic.ch. 300 IN RRSIG DNSKEY 5 2 300 20150125003700 20141226001657 6031 ingotronic.ch. rs1QlP2SlSpA2ELbzwg3DgWLzXWL3Lpv6CUJE2Q0qH2Zp7Qdy3cD+ZEtNh9v24Qv1M6JJ3zFt8mmZoCeW2ycuMbJCqBkW9CBuwF+VznZvZY2MxwPipvhvEEGP//0M8YAZJ66yQPDv3PTdAP8FYbIrJyvY44vwyncwbslpfHT9jAsrbfr3vuMuWps86dnP462q+0s1TxBfqi8mzo3gdavjHKWVNwohLahLKT+tWeu6DSzQv0YwMjwtkLgF7QRgx3ctIIkloOrnx9nHH1N6y+hxEB89fOlyVDjHhgL5uVtsD5fEdT0FJ2Gc/2nShEMMqIwr1/J9kUq1mNySff/uEe65Q==
ingotronic.ch. 300 IN RRSIG DNSKEY 5 2 300 20150125003700 20141226001657 17430 ingotronic.ch. mEwZjhQqeWksWD0TCnNBrtce4YkWJL3edqL6PvAUu8Fn+Ih437kEs3+pqdkgRsdYQ9HW+lBm/8pWwJlNAv0bi9NykItXMwAUFtncgq+6Pnh3iAM972GXSa5VV4LcGQ5b8CBdHCHiEKDqyPv5Hr5QfYL/FQaWlcNRh4QZZlZNPFA=
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 940 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 32204
;; flags: qr rd ra ad cd ; qd: 1 an: 4 au: 0 ad: 1
;; QUESTIONS:
;; ., type = DNSKEY, class = IN
;; ANSWERS:
. 87353 IN DNSKEY 256 3 8 AwEAAe3fSrbLBy3LOS7pnxEUhvPZTE2H5dIGsI/UfruI/nOEvWWa/PSX2BFedBkEqOlYdjdNF2f+6lmfk2Od/xu0v5bVqxFE+/24v3hZSlWBxvXzPTAGHrbW/IJYEPqlzVOAS4XdUgHg0N7IbLywNHMvB+Yf+Nm6ctyXXFLV4WTNnzs7
. 87353 IN DNSKEY 257 3 8 AwEAAagAIKlVZrpC6Ia7gEzahOR+9W29euxhJhVVLOyQbSEW0O8gcCjFFVQUTf6v58fLjwBd0YI0EzrAcQqBGCzh/RStIoO8g0NfnfL2MTJRkxoXbfDaUeVPQuYEhg37NZWAJQ9VnMVDxP/VHL496M/QZxkjf5/Efucp2gaDX6RS6CXpoY68LsvPVjR0ZSwzz1apAzvN9dlzEheX7ICJBBtuA6G3LQpzW5hOA2hzCTMjJPJ8LbqF6dsV6DoBQzgul0sGIcGOYl7OyQdXfZ57relSQageu+ipAdTTJ25AsRTAoub8ONGcLmqrAmRLKBP1dfwhYB4N7knNnulqQxA+Uk1ihz0=
. 87353 IN DNSKEY 256 3 8 AwEAAaPD7Y7XIi1MOEREJNTrRhyqsY3gff6JWzg+XCbqut1sbcbvqyssHw8DT1AkRaAC92pO8xuyq5QEgEPL1IHfABLwpwXI5gTj4gdwi86bpkmlWs9fRpnn4DPDCTdrnxIejJXgClHikLJF3u3CdpNCMijq4CKdQbMlRZ3avv+G7rh7
. 87353 IN RRSIG DNSKEY 8 0 172800 20150115235959 20150101000000 19036 . i8cAxD2pvQi1oAyvQxRpDfFlbqPzW+69QQEsDwE1eWOm5AtawO9U7lmsGps7sy/fVNvl1ljKBj4Djp9pb3U2FLogjiIlW0cDAkPmLlG9t+b/pjEfBNlhjANUVN06pvQVAfm+LcF26EaWT6FlISBqb6jSy4BHRa3Bdc4Sx7+pRSYSqVVvYxLkfAWsKPqGkvWhebJDndJJV9syXQXgZ+v/uJ+6XOS43xkAdeL8iBzIs/FlwMTfh3tVe3d0lb65IBBLlCzeQuetX+0Vu1YFcnD0mHc/wS2ZnAV5toAFmyVQBoY/XAZiZeaOkcROJ6Zmqezy7liwK7BqsYyAZntMhk8lbg==
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 883 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 47679
;; flags: qr rd ra ad cd ; qd: 1 an: 2 au: 0 ad: 1
;; QUESTIONS:
;; ch., type = DS, class = IN
;; ANSWERS:
ch. 953 IN DS 46375 8 2 8F96646FC68BB7E4AF4C0750A6096FBC0D4ECDA3D3FA6DA06FDDB42EE50C6CF3
ch. 953 IN RRSIG DS 8 1 86400 20150112170000 20150105160000 16665 . thY7xYWBBxiBjqbQIb9fAG4TmQgnziwM7q6P1T3/ITxmECdvOCQnnZA3uD7qmN8uM0HudsD7+y+zgD3rsH4RSTKdL4kHSI0OnCxToMTvklghEgFDezqIRm8NkWdI2H4Stwrj20nYKSpLQxPI2EE54gs18P3KyO8bAUYv8Qx73xU=
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 238 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 14319
;; flags: qr rd ra ad cd ; qd: 1 an: 4 au: 0 ad: 1
;; QUESTIONS:
;; ch., type = DNSKEY, class = IN
;; ANSWERS:
ch. 954 IN DNSKEY 257 3 8 AwEAAb7GhhZ8IAy/AhwmSms5DeQK5ad09wIIplEpYoiAIYXPtJvT1ReFzyfTp/2YP+g/PWDwHPh4qKAHa9x0VgbIQcGAeNakmfkAdWEmCnca323/SAml3mwfaX62G7/uYWae5zh8QTxZKNd+K1yZ5x0IxnI31chSl5xymRbTEHYZDKwSIRFM3fTxUMt93WFaBVWELReYotJBr++rvAWdnlay5TPBTvheLBkaiqtgM4GP8HK07Y+86lsZnEsj5K3G1KTV5SPpa82rqYAwxG9VKbmSE/6/kBR5jJHjt1rRt5Oe7v18aEtw0YCEN4vxq+KuvMoNVqXUsE9LBwHJD+QNwi6wmB0=
ch. 954 IN DNSKEY 256 3 8 AwEAAcsg0kY6fw1wzYMhSAKTy+Y2JzAst66P/1odp9NECJJHbU8f4nwziI3onoFSBV0ZiSZhY1aH5dhdDZ7BkrqhVXSrZPAz0CvzjIxmB1gSOf9DeZvjQvoy97HqYolxsf+B3QQv2RKBT67elF5+JisKg3/dQISelKn8LhabSoVrMlD1
ch. 954 IN DNSKEY 256 3 8 AwEAAcSLdT0fEmcFmLpeUkAJoeVaHKiu+nbuc43fWlqaCRVf8t2HA4uWxOk0O5ci9nrFTc8nq8oa5fk5Cj7CHh4yrX9qUCfTdIWTyp8BDEdJpS+Dyb0u9wQuVj+nQMj4fLzdQf4TJs3/qxuiLr3nL1UUwlhhXeqSqGVb7p3mtB5HJ8ad
ch. 954 IN RRSIG DNSKEY 8 1 86400 20150127100909 20141212090909 46375 ch. bT8q0FWyeMH0SulNo6UdIIgZYNATwYsee2bikq2Gh339Bufma8eaqWIPYT3XKmxYPBFOw0bVl+kLZxTwbR1CFoCDXoP+qgQhh4mf9qkNiv2CDSc+0FE3FRREn+DAhYTUEuB58FPiPakFB8s8O7T+k2qhDae7jy4/y7Jl1lnjaBY8s7bzOUPhF0KKCNZmvoKwtL23ZdVeTSV1xM3jkiNnpzBKbcoSWECSGJVp1SE0BnRXdwQP41YTXFZ0310YjaTAUCC5qbMIWdEkHjfdSQtKBImnc85mkapq9w++XQ4zhauPWBtrPV3CcoCahjUaWdjrKVkibomlJZaN8MEO23CfQw==
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 893 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 59925
;; flags: qr rd ra cd ; qd: 1 an: 3 au: 0 ad: 1
;; QUESTIONS:
;; ingotronic.ch., type = DS, class = IN
;; ANSWERS:
ingotronic.ch. 3562 IN DS 6031 5 2 4A948F2FDADA24686E473EDAC00DCF972584C75E3FAA92C2021B6221449FF87E
ingotronic.ch. 3562 IN DS 6031 5 1 733D0218B571CD617B1A7493564B9FC4F12ADE82
ingotronic.ch. 3562 IN RRSIG DS 8 2 3600 20150129033614 20150105123019 60789 ch. rVPJP2HhzW7OkroK2axFj5Lb4iVWCH8Fp/Iq1rF952NDo72b8RiKje2RaAKJAGQ+wd0YgE+PAej04GCmkhlDJA/zvPeeTxuhy3HbJzReMlQ7fjyH+wW1hli+FuIYvogXWf7nO/9VyPORt8X/f/pjrOr3Vlj9sGLN8TGYpEuVSw4=
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 288 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 34298
;; flags: qr aa rd ra cd ; qd: 1 an: 4 au: 0 ad: 1
;; QUESTIONS:
;; ingotronic.ch., type = DNSKEY, class = IN
;; ANSWERS:
ingotronic.ch. 300 IN DNSKEY 257 3 5 AwEAAeA1vzmjaB+eBAcvhzpKEgAEFpvQ1rg4uKDW6MsQtacKoqBpgyep2+LuWotz5p/xYxj3NGsArwN8Ad5cY0FHRr8miTT0elOv6nvlqGIfRuhj/BXAQ1x4ihpSFslHw0lJMYFwxsUZWpUyjWX/nv1xRZMMwF46gui0N4OEbyTYusCk77D+A71k+K0EAitFIbIH4GCUKmH1H7HmXhSVH9bN/n7KEGwW32lmsuuUcJoRKDkcUvbMXY/9Xoa2quERrUg/rBbDUHowRPjYDS5GzY1+f4YY8s40BufGiqyUTKKXL953MVFK8gmezXA0hbmrnZ7CBOw/7238mORAdzExaX8n7CE=
ingotronic.ch. 300 IN DNSKEY 256 3 5 AwEAAZ2Xh77GFzpEDx7EHYxShqltHgkiG+BOjBGifEmnJhQSdE5/yNSLFNcdhZZ8HUPxYnaedTqJcFFg4AzUsQklF/fECegTJdZjaj2WoL0/I8K7HMfY/hVuRZUWPNglYi8agJRX6gdkFTCpUNI7stpgKqxtzUJhhw15uG/lKMplwqUr
ingotronic.ch. 300 IN RRSIG DNSKEY 5 2 300 20150125003700 20141226001657 6031 ingotronic.ch. rs1QlP2SlSpA2ELbzwg3DgWLzXWL3Lpv6CUJE2Q0qH2Zp7Qdy3cD+ZEtNh9v24Qv1M6JJ3zFt8mmZoCeW2ycuMbJCqBkW9CBuwF+VznZvZY2MxwPipvhvEEGP//0M8YAZJ66yQPDv3PTdAP8FYbIrJyvY44vwyncwbslpfHT9jAsrbfr3vuMuWps86dnP462q+0s1TxBfqi8mzo3gdavjHKWVNwohLahLKT+tWeu6DSzQv0YwMjwtkLgF7QRgx3ctIIkloOrnx9nHH1N6y+hxEB89fOlyVDjHhgL5uVtsD5fEdT0FJ2Gc/2nShEMMqIwr1/J9kUq1mNySff/uEe65Q==
ingotronic.ch. 300 IN RRSIG DNSKEY 5 2 300 20150125003700 20141226001657 17430 ingotronic.ch. mEwZjhQqeWksWD0TCnNBrtce4YkWJL3edqL6PvAUu8Fn+Ih437kEs3+pqdkgRsdYQ9HW+lBm/8pWwJlNAv0bi9NykItXMwAUFtncgq+6Pnh3iAM972GXSa5VV4LcGQ5b8CBdHCHiEKDqyPv5Hr5QfYL/FQaWlcNRh4QZZlZNPFA=
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 940 bytes
###############################################
testNameErrorWhenNsecIsLastAndQnameIsZoneApex 0000664 0000000 0000000 00000033476 13020541473 0042434 0 ustar 00root root 0000000 0000000 dnssecjava-1.1.3/src/test/resources/recordings/org_jitsi_dnssec_validator_TestValUtils #Date: 2015-01-06T22:35:25+01:00
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 46196
;; flags: qr aa rd ra cd ; qd: 1 an: 0 au: 6 ad: 1
;; QUESTIONS:
;; zz.ingotronic.ch., type = NSEC, class = IN
;; ANSWERS:
;; AUTHORITY RECORDS:
ingotronic.ch. 300 IN SOA ns1.ingotronic.ch. admin.ingotronic.ch. 2013032762 300 60 864000 300
ingotronic.ch. 300 IN RRSIG SOA 5 2 300 20150125021244 20141226011244 17430 ingotronic.ch. WDLpp9G0P/rlMBfpFn9sAfpEFoBnQfwyGSXbGCc/LG1FSkJoKLDQYDY696scLNsJgkrzZeJrl0oSSvA8AvRUhYRrmuqWMxTVFgYlRwPwqEMCKUqiVhKGVF4NYemoBiUQC4nJwBZd57xKCiF4AQ4CodBtiZxefJFAlTNE0g2yxtM=
ingotronic.ch. 300 IN NSEC alias.ingotronic.ch. A NS SOA RRSIG NSEC DNSKEY
ingotronic.ch. 300 IN RRSIG NSEC 5 2 300 20150125000532 20141225234703 17430 ingotronic.ch. en5BaZ6zWqEvoUFUDPm5g1pjz7THXBv/1kjKtV2tS+7xh0BtkLEzlA9n/H66ZZAX2EIh7vXj12xVJKOuEuM0o1mJwKsBaLQuTra60/zYAUIddwUOCzI3zzjiRFklPyHSnLkGoBODZcvehnsTzTPyBxkfoouleqpj7gN5jOSBL8M=
z.ingotronic.ch. 300 IN NSEC ingotronic.ch. A RRSIG NSEC
z.ingotronic.ch. 300 IN RRSIG NSEC 5 3 300 20150125012443 20141226010256 17430 ingotronic.ch. GGnZrgc0Q9aUOAh8w4G7j9GS2G2WcY16ZpETaX5J5x6ZshQGBgKzXDGo2A42YFLalrRas5h44O9qPMIWzwWlZMOB8vEoD+cWSjrBv/gQwzrCyxkBp4v3TLE9lFpvWwTqdKZO0MjrV37IRW91EFR4Mg2Nfb1CVDQaj67CT2ldYdo=
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 689 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 46226
;; flags: qr rd ra ad cd ; qd: 1 an: 4 au: 0 ad: 1
;; QUESTIONS:
;; ., type = DNSKEY, class = IN
;; ANSWERS:
. 87348 IN DNSKEY 256 3 8 AwEAAe3fSrbLBy3LOS7pnxEUhvPZTE2H5dIGsI/UfruI/nOEvWWa/PSX2BFedBkEqOlYdjdNF2f+6lmfk2Od/xu0v5bVqxFE+/24v3hZSlWBxvXzPTAGHrbW/IJYEPqlzVOAS4XdUgHg0N7IbLywNHMvB+Yf+Nm6ctyXXFLV4WTNnzs7
. 87348 IN DNSKEY 257 3 8 AwEAAagAIKlVZrpC6Ia7gEzahOR+9W29euxhJhVVLOyQbSEW0O8gcCjFFVQUTf6v58fLjwBd0YI0EzrAcQqBGCzh/RStIoO8g0NfnfL2MTJRkxoXbfDaUeVPQuYEhg37NZWAJQ9VnMVDxP/VHL496M/QZxkjf5/Efucp2gaDX6RS6CXpoY68LsvPVjR0ZSwzz1apAzvN9dlzEheX7ICJBBtuA6G3LQpzW5hOA2hzCTMjJPJ8LbqF6dsV6DoBQzgul0sGIcGOYl7OyQdXfZ57relSQageu+ipAdTTJ25AsRTAoub8ONGcLmqrAmRLKBP1dfwhYB4N7knNnulqQxA+Uk1ihz0=
. 87348 IN DNSKEY 256 3 8 AwEAAaPD7Y7XIi1MOEREJNTrRhyqsY3gff6JWzg+XCbqut1sbcbvqyssHw8DT1AkRaAC92pO8xuyq5QEgEPL1IHfABLwpwXI5gTj4gdwi86bpkmlWs9fRpnn4DPDCTdrnxIejJXgClHikLJF3u3CdpNCMijq4CKdQbMlRZ3avv+G7rh7
. 87348 IN RRSIG DNSKEY 8 0 172800 20150115235959 20150101000000 19036 . i8cAxD2pvQi1oAyvQxRpDfFlbqPzW+69QQEsDwE1eWOm5AtawO9U7lmsGps7sy/fVNvl1ljKBj4Djp9pb3U2FLogjiIlW0cDAkPmLlG9t+b/pjEfBNlhjANUVN06pvQVAfm+LcF26EaWT6FlISBqb6jSy4BHRa3Bdc4Sx7+pRSYSqVVvYxLkfAWsKPqGkvWhebJDndJJV9syXQXgZ+v/uJ+6XOS43xkAdeL8iBzIs/FlwMTfh3tVe3d0lb65IBBLlCzeQuetX+0Vu1YFcnD0mHc/wS2ZnAV5toAFmyVQBoY/XAZiZeaOkcROJ6Zmqezy7liwK7BqsYyAZntMhk8lbg==
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 883 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 14685
;; flags: qr rd ra ad cd ; qd: 1 an: 2 au: 0 ad: 1
;; QUESTIONS:
;; ch., type = DS, class = IN
;; ANSWERS:
ch. 948 IN DS 46375 8 2 8F96646FC68BB7E4AF4C0750A6096FBC0D4ECDA3D3FA6DA06FDDB42EE50C6CF3
ch. 948 IN RRSIG DS 8 1 86400 20150112170000 20150105160000 16665 . thY7xYWBBxiBjqbQIb9fAG4TmQgnziwM7q6P1T3/ITxmECdvOCQnnZA3uD7qmN8uM0HudsD7+y+zgD3rsH4RSTKdL4kHSI0OnCxToMTvklghEgFDezqIRm8NkWdI2H4Stwrj20nYKSpLQxPI2EE54gs18P3KyO8bAUYv8Qx73xU=
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 238 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 64652
;; flags: qr rd ra ad cd ; qd: 1 an: 4 au: 0 ad: 1
;; QUESTIONS:
;; ch., type = DNSKEY, class = IN
;; ANSWERS:
ch. 949 IN DNSKEY 256 3 8 AwEAAcSLdT0fEmcFmLpeUkAJoeVaHKiu+nbuc43fWlqaCRVf8t2HA4uWxOk0O5ci9nrFTc8nq8oa5fk5Cj7CHh4yrX9qUCfTdIWTyp8BDEdJpS+Dyb0u9wQuVj+nQMj4fLzdQf4TJs3/qxuiLr3nL1UUwlhhXeqSqGVb7p3mtB5HJ8ad
ch. 949 IN DNSKEY 257 3 8 AwEAAb7GhhZ8IAy/AhwmSms5DeQK5ad09wIIplEpYoiAIYXPtJvT1ReFzyfTp/2YP+g/PWDwHPh4qKAHa9x0VgbIQcGAeNakmfkAdWEmCnca323/SAml3mwfaX62G7/uYWae5zh8QTxZKNd+K1yZ5x0IxnI31chSl5xymRbTEHYZDKwSIRFM3fTxUMt93WFaBVWELReYotJBr++rvAWdnlay5TPBTvheLBkaiqtgM4GP8HK07Y+86lsZnEsj5K3G1KTV5SPpa82rqYAwxG9VKbmSE/6/kBR5jJHjt1rRt5Oe7v18aEtw0YCEN4vxq+KuvMoNVqXUsE9LBwHJD+QNwi6wmB0=
ch. 949 IN DNSKEY 256 3 8 AwEAAcsg0kY6fw1wzYMhSAKTy+Y2JzAst66P/1odp9NECJJHbU8f4nwziI3onoFSBV0ZiSZhY1aH5dhdDZ7BkrqhVXSrZPAz0CvzjIxmB1gSOf9DeZvjQvoy97HqYolxsf+B3QQv2RKBT67elF5+JisKg3/dQISelKn8LhabSoVrMlD1
ch. 949 IN RRSIG DNSKEY 8 1 86400 20150127100909 20141212090909 46375 ch. bT8q0FWyeMH0SulNo6UdIIgZYNATwYsee2bikq2Gh339Bufma8eaqWIPYT3XKmxYPBFOw0bVl+kLZxTwbR1CFoCDXoP+qgQhh4mf9qkNiv2CDSc+0FE3FRREn+DAhYTUEuB58FPiPakFB8s8O7T+k2qhDae7jy4/y7Jl1lnjaBY8s7bzOUPhF0KKCNZmvoKwtL23ZdVeTSV1xM3jkiNnpzBKbcoSWECSGJVp1SE0BnRXdwQP41YTXFZ0310YjaTAUCC5qbMIWdEkHjfdSQtKBImnc85mkapq9w++XQ4zhauPWBtrPV3CcoCahjUaWdjrKVkibomlJZaN8MEO23CfQw==
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 893 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 11788
;; flags: qr rd ra cd ; qd: 1 an: 3 au: 0 ad: 1
;; QUESTIONS:
;; ingotronic.ch., type = DS, class = IN
;; ANSWERS:
ingotronic.ch. 3557 IN DS 6031 5 2 4A948F2FDADA24686E473EDAC00DCF972584C75E3FAA92C2021B6221449FF87E
ingotronic.ch. 3557 IN DS 6031 5 1 733D0218B571CD617B1A7493564B9FC4F12ADE82
ingotronic.ch. 3557 IN RRSIG DS 8 2 3600 20150129033614 20150105123019 60789 ch. rVPJP2HhzW7OkroK2axFj5Lb4iVWCH8Fp/Iq1rF952NDo72b8RiKje2RaAKJAGQ+wd0YgE+PAej04GCmkhlDJA/zvPeeTxuhy3HbJzReMlQ7fjyH+wW1hli+FuIYvogXWf7nO/9VyPORt8X/f/pjrOr3Vlj9sGLN8TGYpEuVSw4=
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 288 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 55534
;; flags: qr aa rd ra cd ; qd: 1 an: 4 au: 0 ad: 1
;; QUESTIONS:
;; ingotronic.ch., type = DNSKEY, class = IN
;; ANSWERS:
ingotronic.ch. 300 IN DNSKEY 256 3 5 AwEAAZ2Xh77GFzpEDx7EHYxShqltHgkiG+BOjBGifEmnJhQSdE5/yNSLFNcdhZZ8HUPxYnaedTqJcFFg4AzUsQklF/fECegTJdZjaj2WoL0/I8K7HMfY/hVuRZUWPNglYi8agJRX6gdkFTCpUNI7stpgKqxtzUJhhw15uG/lKMplwqUr
ingotronic.ch. 300 IN DNSKEY 257 3 5 AwEAAeA1vzmjaB+eBAcvhzpKEgAEFpvQ1rg4uKDW6MsQtacKoqBpgyep2+LuWotz5p/xYxj3NGsArwN8Ad5cY0FHRr8miTT0elOv6nvlqGIfRuhj/BXAQ1x4ihpSFslHw0lJMYFwxsUZWpUyjWX/nv1xRZMMwF46gui0N4OEbyTYusCk77D+A71k+K0EAitFIbIH4GCUKmH1H7HmXhSVH9bN/n7KEGwW32lmsuuUcJoRKDkcUvbMXY/9Xoa2quERrUg/rBbDUHowRPjYDS5GzY1+f4YY8s40BufGiqyUTKKXL953MVFK8gmezXA0hbmrnZ7CBOw/7238mORAdzExaX8n7CE=
ingotronic.ch. 300 IN RRSIG DNSKEY 5 2 300 20150125003700 20141226001657 6031 ingotronic.ch. rs1QlP2SlSpA2ELbzwg3DgWLzXWL3Lpv6CUJE2Q0qH2Zp7Qdy3cD+ZEtNh9v24Qv1M6JJ3zFt8mmZoCeW2ycuMbJCqBkW9CBuwF+VznZvZY2MxwPipvhvEEGP//0M8YAZJ66yQPDv3PTdAP8FYbIrJyvY44vwyncwbslpfHT9jAsrbfr3vuMuWps86dnP462q+0s1TxBfqi8mzo3gdavjHKWVNwohLahLKT+tWeu6DSzQv0YwMjwtkLgF7QRgx3ctIIkloOrnx9nHH1N6y+hxEB89fOlyVDjHhgL5uVtsD5fEdT0FJ2Gc/2nShEMMqIwr1/J9kUq1mNySff/uEe65Q==
ingotronic.ch. 300 IN RRSIG DNSKEY 5 2 300 20150125003700 20141226001657 17430 ingotronic.ch. mEwZjhQqeWksWD0TCnNBrtce4YkWJL3edqL6PvAUu8Fn+Ih437kEs3+pqdkgRsdYQ9HW+lBm/8pWwJlNAv0bi9NykItXMwAUFtncgq+6Pnh3iAM972GXSa5VV4LcGQ5b8CBdHCHiEKDqyPv5Hr5QfYL/FQaWlcNRh4QZZlZNPFA=
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 940 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 2043
;; flags: qr rd ra ad cd ; qd: 1 an: 4 au: 0 ad: 1
;; QUESTIONS:
;; ., type = DNSKEY, class = IN
;; ANSWERS:
. 87348 IN DNSKEY 256 3 8 AwEAAaPD7Y7XIi1MOEREJNTrRhyqsY3gff6JWzg+XCbqut1sbcbvqyssHw8DT1AkRaAC92pO8xuyq5QEgEPL1IHfABLwpwXI5gTj4gdwi86bpkmlWs9fRpnn4DPDCTdrnxIejJXgClHikLJF3u3CdpNCMijq4CKdQbMlRZ3avv+G7rh7
. 87348 IN DNSKEY 256 3 8 AwEAAe3fSrbLBy3LOS7pnxEUhvPZTE2H5dIGsI/UfruI/nOEvWWa/PSX2BFedBkEqOlYdjdNF2f+6lmfk2Od/xu0v5bVqxFE+/24v3hZSlWBxvXzPTAGHrbW/IJYEPqlzVOAS4XdUgHg0N7IbLywNHMvB+Yf+Nm6ctyXXFLV4WTNnzs7
. 87348 IN DNSKEY 257 3 8 AwEAAagAIKlVZrpC6Ia7gEzahOR+9W29euxhJhVVLOyQbSEW0O8gcCjFFVQUTf6v58fLjwBd0YI0EzrAcQqBGCzh/RStIoO8g0NfnfL2MTJRkxoXbfDaUeVPQuYEhg37NZWAJQ9VnMVDxP/VHL496M/QZxkjf5/Efucp2gaDX6RS6CXpoY68LsvPVjR0ZSwzz1apAzvN9dlzEheX7ICJBBtuA6G3LQpzW5hOA2hzCTMjJPJ8LbqF6dsV6DoBQzgul0sGIcGOYl7OyQdXfZ57relSQageu+ipAdTTJ25AsRTAoub8ONGcLmqrAmRLKBP1dfwhYB4N7knNnulqQxA+Uk1ihz0=
. 87348 IN RRSIG DNSKEY 8 0 172800 20150115235959 20150101000000 19036 . i8cAxD2pvQi1oAyvQxRpDfFlbqPzW+69QQEsDwE1eWOm5AtawO9U7lmsGps7sy/fVNvl1ljKBj4Djp9pb3U2FLogjiIlW0cDAkPmLlG9t+b/pjEfBNlhjANUVN06pvQVAfm+LcF26EaWT6FlISBqb6jSy4BHRa3Bdc4Sx7+pRSYSqVVvYxLkfAWsKPqGkvWhebJDndJJV9syXQXgZ+v/uJ+6XOS43xkAdeL8iBzIs/FlwMTfh3tVe3d0lb65IBBLlCzeQuetX+0Vu1YFcnD0mHc/wS2ZnAV5toAFmyVQBoY/XAZiZeaOkcROJ6Zmqezy7liwK7BqsYyAZntMhk8lbg==
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 883 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 58372
;; flags: qr rd ra ad cd ; qd: 1 an: 2 au: 0 ad: 1
;; QUESTIONS:
;; ch., type = DS, class = IN
;; ANSWERS:
ch. 948 IN DS 46375 8 2 8F96646FC68BB7E4AF4C0750A6096FBC0D4ECDA3D3FA6DA06FDDB42EE50C6CF3
ch. 948 IN RRSIG DS 8 1 86400 20150112170000 20150105160000 16665 . thY7xYWBBxiBjqbQIb9fAG4TmQgnziwM7q6P1T3/ITxmECdvOCQnnZA3uD7qmN8uM0HudsD7+y+zgD3rsH4RSTKdL4kHSI0OnCxToMTvklghEgFDezqIRm8NkWdI2H4Stwrj20nYKSpLQxPI2EE54gs18P3KyO8bAUYv8Qx73xU=
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 238 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 49750
;; flags: qr rd ra ad cd ; qd: 1 an: 4 au: 0 ad: 1
;; QUESTIONS:
;; ch., type = DNSKEY, class = IN
;; ANSWERS:
ch. 949 IN DNSKEY 256 3 8 AwEAAcSLdT0fEmcFmLpeUkAJoeVaHKiu+nbuc43fWlqaCRVf8t2HA4uWxOk0O5ci9nrFTc8nq8oa5fk5Cj7CHh4yrX9qUCfTdIWTyp8BDEdJpS+Dyb0u9wQuVj+nQMj4fLzdQf4TJs3/qxuiLr3nL1UUwlhhXeqSqGVb7p3mtB5HJ8ad
ch. 949 IN DNSKEY 257 3 8 AwEAAb7GhhZ8IAy/AhwmSms5DeQK5ad09wIIplEpYoiAIYXPtJvT1ReFzyfTp/2YP+g/PWDwHPh4qKAHa9x0VgbIQcGAeNakmfkAdWEmCnca323/SAml3mwfaX62G7/uYWae5zh8QTxZKNd+K1yZ5x0IxnI31chSl5xymRbTEHYZDKwSIRFM3fTxUMt93WFaBVWELReYotJBr++rvAWdnlay5TPBTvheLBkaiqtgM4GP8HK07Y+86lsZnEsj5K3G1KTV5SPpa82rqYAwxG9VKbmSE/6/kBR5jJHjt1rRt5Oe7v18aEtw0YCEN4vxq+KuvMoNVqXUsE9LBwHJD+QNwi6wmB0=
ch. 949 IN DNSKEY 256 3 8 AwEAAcsg0kY6fw1wzYMhSAKTy+Y2JzAst66P/1odp9NECJJHbU8f4nwziI3onoFSBV0ZiSZhY1aH5dhdDZ7BkrqhVXSrZPAz0CvzjIxmB1gSOf9DeZvjQvoy97HqYolxsf+B3QQv2RKBT67elF5+JisKg3/dQISelKn8LhabSoVrMlD1
ch. 949 IN RRSIG DNSKEY 8 1 86400 20150127100909 20141212090909 46375 ch. bT8q0FWyeMH0SulNo6UdIIgZYNATwYsee2bikq2Gh339Bufma8eaqWIPYT3XKmxYPBFOw0bVl+kLZxTwbR1CFoCDXoP+qgQhh4mf9qkNiv2CDSc+0FE3FRREn+DAhYTUEuB58FPiPakFB8s8O7T+k2qhDae7jy4/y7Jl1lnjaBY8s7bzOUPhF0KKCNZmvoKwtL23ZdVeTSV1xM3jkiNnpzBKbcoSWECSGJVp1SE0BnRXdwQP41YTXFZ0310YjaTAUCC5qbMIWdEkHjfdSQtKBImnc85mkapq9w++XQ4zhauPWBtrPV3CcoCahjUaWdjrKVkibomlJZaN8MEO23CfQw==
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 893 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 17160
;; flags: qr rd ra cd ; qd: 1 an: 3 au: 0 ad: 1
;; QUESTIONS:
;; ingotronic.ch., type = DS, class = IN
;; ANSWERS:
ingotronic.ch. 3557 IN DS 6031 5 2 4A948F2FDADA24686E473EDAC00DCF972584C75E3FAA92C2021B6221449FF87E
ingotronic.ch. 3557 IN DS 6031 5 1 733D0218B571CD617B1A7493564B9FC4F12ADE82
ingotronic.ch. 3557 IN RRSIG DS 8 2 3600 20150129033614 20150105123019 60789 ch. rVPJP2HhzW7OkroK2axFj5Lb4iVWCH8Fp/Iq1rF952NDo72b8RiKje2RaAKJAGQ+wd0YgE+PAej04GCmkhlDJA/zvPeeTxuhy3HbJzReMlQ7fjyH+wW1hli+FuIYvogXWf7nO/9VyPORt8X/f/pjrOr3Vlj9sGLN8TGYpEuVSw4=
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 288 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 13681
;; flags: qr aa rd ra cd ; qd: 1 an: 4 au: 0 ad: 1
;; QUESTIONS:
;; ingotronic.ch., type = DNSKEY, class = IN
;; ANSWERS:
ingotronic.ch. 300 IN DNSKEY 257 3 5 AwEAAeA1vzmjaB+eBAcvhzpKEgAEFpvQ1rg4uKDW6MsQtacKoqBpgyep2+LuWotz5p/xYxj3NGsArwN8Ad5cY0FHRr8miTT0elOv6nvlqGIfRuhj/BXAQ1x4ihpSFslHw0lJMYFwxsUZWpUyjWX/nv1xRZMMwF46gui0N4OEbyTYusCk77D+A71k+K0EAitFIbIH4GCUKmH1H7HmXhSVH9bN/n7KEGwW32lmsuuUcJoRKDkcUvbMXY/9Xoa2quERrUg/rBbDUHowRPjYDS5GzY1+f4YY8s40BufGiqyUTKKXL953MVFK8gmezXA0hbmrnZ7CBOw/7238mORAdzExaX8n7CE=
ingotronic.ch. 300 IN DNSKEY 256 3 5 AwEAAZ2Xh77GFzpEDx7EHYxShqltHgkiG+BOjBGifEmnJhQSdE5/yNSLFNcdhZZ8HUPxYnaedTqJcFFg4AzUsQklF/fECegTJdZjaj2WoL0/I8K7HMfY/hVuRZUWPNglYi8agJRX6gdkFTCpUNI7stpgKqxtzUJhhw15uG/lKMplwqUr
ingotronic.ch. 300 IN RRSIG DNSKEY 5 2 300 20150125003700 20141226001657 6031 ingotronic.ch. rs1QlP2SlSpA2ELbzwg3DgWLzXWL3Lpv6CUJE2Q0qH2Zp7Qdy3cD+ZEtNh9v24Qv1M6JJ3zFt8mmZoCeW2ycuMbJCqBkW9CBuwF+VznZvZY2MxwPipvhvEEGP//0M8YAZJ66yQPDv3PTdAP8FYbIrJyvY44vwyncwbslpfHT9jAsrbfr3vuMuWps86dnP462q+0s1TxBfqi8mzo3gdavjHKWVNwohLahLKT+tWeu6DSzQv0YwMjwtkLgF7QRgx3ctIIkloOrnx9nHH1N6y+hxEB89fOlyVDjHhgL5uVtsD5fEdT0FJ2Gc/2nShEMMqIwr1/J9kUq1mNySff/uEe65Q==
ingotronic.ch. 300 IN RRSIG DNSKEY 5 2 300 20150125003700 20141226001657 17430 ingotronic.ch. mEwZjhQqeWksWD0TCnNBrtce4YkWJL3edqL6PvAUu8Fn+Ih437kEs3+pqdkgRsdYQ9HW+lBm/8pWwJlNAv0bi9NykItXMwAUFtncgq+6Pnh3iAM972GXSa5VV4LcGQ5b8CBdHCHiEKDqyPv5Hr5QfYL/FQaWlcNRh4QZZlZNPFA=
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 940 bytes
###############################################
testNameErrorWhenNsecIsNotFromApex 0000664 0000000 0000000 00000016446 13020541473 0040356 0 ustar 00root root 0000000 0000000 dnssecjava-1.1.3/src/test/resources/recordings/org_jitsi_dnssec_validator_TestValUtils #Date: 2015-01-06T22:35:22+01:00
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 22814
;; flags: qr aa rd ra cd ; qd: 1 an: 0 au: 4 ad: 1
;; QUESTIONS:
;; 1.www.ingotronic.ch., type = A, class = IN
;; ANSWERS:
;; AUTHORITY RECORDS:
ingotronic.ch. 300 IN SOA ns1.ingotronic.ch. admin.ingotronic.ch. 2013032762 300 60 864000 300
ingotronic.ch. 300 IN RRSIG SOA 5 2 300 20150125021244 20141226011244 17430 ingotronic.ch. WDLpp9G0P/rlMBfpFn9sAfpEFoBnQfwyGSXbGCc/LG1FSkJoKLDQYDY696scLNsJgkrzZeJrl0oSSvA8AvRUhYRrmuqWMxTVFgYlRwPwqEMCKUqiVhKGVF4NYemoBiUQC4nJwBZd57xKCiF4AQ4CodBtiZxefJFAlTNE0g2yxtM=
www.ingotronic.ch. 300 IN NSEC z.ingotronic.ch. A AAAA RRSIG NSEC
www.ingotronic.ch. 300 IN RRSIG NSEC 5 3 300 20150125012443 20141226010256 17430 ingotronic.ch. fMbLmn92jrN7YeM4XWcq7/kKLiPB3Ll4yQSLiPRWQw79ZVeNJMkqEqdstEnnTyKu/hAId6YpvMKsJnIfCTVyoO75i6CaEKXOpvf9AT7TstEUj0YKjp4vWvcNs2F2144nrnqnaVFX8ZTxnUV50R+/AsqtKA+2/Tky6SlNhzeWVMI=
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 477 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 53508
;; flags: qr rd ra ad cd ; qd: 1 an: 4 au: 0 ad: 1
;; QUESTIONS:
;; ., type = DNSKEY, class = IN
;; ANSWERS:
. 87351 IN DNSKEY 256 3 8 AwEAAaPD7Y7XIi1MOEREJNTrRhyqsY3gff6JWzg+XCbqut1sbcbvqyssHw8DT1AkRaAC92pO8xuyq5QEgEPL1IHfABLwpwXI5gTj4gdwi86bpkmlWs9fRpnn4DPDCTdrnxIejJXgClHikLJF3u3CdpNCMijq4CKdQbMlRZ3avv+G7rh7
. 87351 IN DNSKEY 256 3 8 AwEAAe3fSrbLBy3LOS7pnxEUhvPZTE2H5dIGsI/UfruI/nOEvWWa/PSX2BFedBkEqOlYdjdNF2f+6lmfk2Od/xu0v5bVqxFE+/24v3hZSlWBxvXzPTAGHrbW/IJYEPqlzVOAS4XdUgHg0N7IbLywNHMvB+Yf+Nm6ctyXXFLV4WTNnzs7
. 87351 IN DNSKEY 257 3 8 AwEAAagAIKlVZrpC6Ia7gEzahOR+9W29euxhJhVVLOyQbSEW0O8gcCjFFVQUTf6v58fLjwBd0YI0EzrAcQqBGCzh/RStIoO8g0NfnfL2MTJRkxoXbfDaUeVPQuYEhg37NZWAJQ9VnMVDxP/VHL496M/QZxkjf5/Efucp2gaDX6RS6CXpoY68LsvPVjR0ZSwzz1apAzvN9dlzEheX7ICJBBtuA6G3LQpzW5hOA2hzCTMjJPJ8LbqF6dsV6DoBQzgul0sGIcGOYl7OyQdXfZ57relSQageu+ipAdTTJ25AsRTAoub8ONGcLmqrAmRLKBP1dfwhYB4N7knNnulqQxA+Uk1ihz0=
. 87351 IN RRSIG DNSKEY 8 0 172800 20150115235959 20150101000000 19036 . i8cAxD2pvQi1oAyvQxRpDfFlbqPzW+69QQEsDwE1eWOm5AtawO9U7lmsGps7sy/fVNvl1ljKBj4Djp9pb3U2FLogjiIlW0cDAkPmLlG9t+b/pjEfBNlhjANUVN06pvQVAfm+LcF26EaWT6FlISBqb6jSy4BHRa3Bdc4Sx7+pRSYSqVVvYxLkfAWsKPqGkvWhebJDndJJV9syXQXgZ+v/uJ+6XOS43xkAdeL8iBzIs/FlwMTfh3tVe3d0lb65IBBLlCzeQuetX+0Vu1YFcnD0mHc/wS2ZnAV5toAFmyVQBoY/XAZiZeaOkcROJ6Zmqezy7liwK7BqsYyAZntMhk8lbg==
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 883 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 36666
;; flags: qr rd ra ad cd ; qd: 1 an: 2 au: 0 ad: 1
;; QUESTIONS:
;; ch., type = DS, class = IN
;; ANSWERS:
ch. 951 IN DS 46375 8 2 8F96646FC68BB7E4AF4C0750A6096FBC0D4ECDA3D3FA6DA06FDDB42EE50C6CF3
ch. 951 IN RRSIG DS 8 1 86400 20150112170000 20150105160000 16665 . thY7xYWBBxiBjqbQIb9fAG4TmQgnziwM7q6P1T3/ITxmECdvOCQnnZA3uD7qmN8uM0HudsD7+y+zgD3rsH4RSTKdL4kHSI0OnCxToMTvklghEgFDezqIRm8NkWdI2H4Stwrj20nYKSpLQxPI2EE54gs18P3KyO8bAUYv8Qx73xU=
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 238 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 23619
;; flags: qr rd ra ad cd ; qd: 1 an: 4 au: 0 ad: 1
;; QUESTIONS:
;; ch., type = DNSKEY, class = IN
;; ANSWERS:
ch. 952 IN DNSKEY 256 3 8 AwEAAcsg0kY6fw1wzYMhSAKTy+Y2JzAst66P/1odp9NECJJHbU8f4nwziI3onoFSBV0ZiSZhY1aH5dhdDZ7BkrqhVXSrZPAz0CvzjIxmB1gSOf9DeZvjQvoy97HqYolxsf+B3QQv2RKBT67elF5+JisKg3/dQISelKn8LhabSoVrMlD1
ch. 952 IN DNSKEY 257 3 8 AwEAAb7GhhZ8IAy/AhwmSms5DeQK5ad09wIIplEpYoiAIYXPtJvT1ReFzyfTp/2YP+g/PWDwHPh4qKAHa9x0VgbIQcGAeNakmfkAdWEmCnca323/SAml3mwfaX62G7/uYWae5zh8QTxZKNd+K1yZ5x0IxnI31chSl5xymRbTEHYZDKwSIRFM3fTxUMt93WFaBVWELReYotJBr++rvAWdnlay5TPBTvheLBkaiqtgM4GP8HK07Y+86lsZnEsj5K3G1KTV5SPpa82rqYAwxG9VKbmSE/6/kBR5jJHjt1rRt5Oe7v18aEtw0YCEN4vxq+KuvMoNVqXUsE9LBwHJD+QNwi6wmB0=
ch. 952 IN DNSKEY 256 3 8 AwEAAcSLdT0fEmcFmLpeUkAJoeVaHKiu+nbuc43fWlqaCRVf8t2HA4uWxOk0O5ci9nrFTc8nq8oa5fk5Cj7CHh4yrX9qUCfTdIWTyp8BDEdJpS+Dyb0u9wQuVj+nQMj4fLzdQf4TJs3/qxuiLr3nL1UUwlhhXeqSqGVb7p3mtB5HJ8ad
ch. 952 IN RRSIG DNSKEY 8 1 86400 20150127100909 20141212090909 46375 ch. bT8q0FWyeMH0SulNo6UdIIgZYNATwYsee2bikq2Gh339Bufma8eaqWIPYT3XKmxYPBFOw0bVl+kLZxTwbR1CFoCDXoP+qgQhh4mf9qkNiv2CDSc+0FE3FRREn+DAhYTUEuB58FPiPakFB8s8O7T+k2qhDae7jy4/y7Jl1lnjaBY8s7bzOUPhF0KKCNZmvoKwtL23ZdVeTSV1xM3jkiNnpzBKbcoSWECSGJVp1SE0BnRXdwQP41YTXFZ0310YjaTAUCC5qbMIWdEkHjfdSQtKBImnc85mkapq9w++XQ4zhauPWBtrPV3CcoCahjUaWdjrKVkibomlJZaN8MEO23CfQw==
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 893 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 14849
;; flags: qr rd ra cd ; qd: 1 an: 3 au: 0 ad: 1
;; QUESTIONS:
;; ingotronic.ch., type = DS, class = IN
;; ANSWERS:
ingotronic.ch. 3560 IN DS 6031 5 1 733D0218B571CD617B1A7493564B9FC4F12ADE82
ingotronic.ch. 3560 IN DS 6031 5 2 4A948F2FDADA24686E473EDAC00DCF972584C75E3FAA92C2021B6221449FF87E
ingotronic.ch. 3560 IN RRSIG DS 8 2 3600 20150129033614 20150105123019 60789 ch. rVPJP2HhzW7OkroK2axFj5Lb4iVWCH8Fp/Iq1rF952NDo72b8RiKje2RaAKJAGQ+wd0YgE+PAej04GCmkhlDJA/zvPeeTxuhy3HbJzReMlQ7fjyH+wW1hli+FuIYvogXWf7nO/9VyPORt8X/f/pjrOr3Vlj9sGLN8TGYpEuVSw4=
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 288 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 44885
;; flags: qr aa rd ra cd ; qd: 1 an: 4 au: 0 ad: 1
;; QUESTIONS:
;; ingotronic.ch., type = DNSKEY, class = IN
;; ANSWERS:
ingotronic.ch. 300 IN DNSKEY 256 3 5 AwEAAZ2Xh77GFzpEDx7EHYxShqltHgkiG+BOjBGifEmnJhQSdE5/yNSLFNcdhZZ8HUPxYnaedTqJcFFg4AzUsQklF/fECegTJdZjaj2WoL0/I8K7HMfY/hVuRZUWPNglYi8agJRX6gdkFTCpUNI7stpgKqxtzUJhhw15uG/lKMplwqUr
ingotronic.ch. 300 IN DNSKEY 257 3 5 AwEAAeA1vzmjaB+eBAcvhzpKEgAEFpvQ1rg4uKDW6MsQtacKoqBpgyep2+LuWotz5p/xYxj3NGsArwN8Ad5cY0FHRr8miTT0elOv6nvlqGIfRuhj/BXAQ1x4ihpSFslHw0lJMYFwxsUZWpUyjWX/nv1xRZMMwF46gui0N4OEbyTYusCk77D+A71k+K0EAitFIbIH4GCUKmH1H7HmXhSVH9bN/n7KEGwW32lmsuuUcJoRKDkcUvbMXY/9Xoa2quERrUg/rBbDUHowRPjYDS5GzY1+f4YY8s40BufGiqyUTKKXL953MVFK8gmezXA0hbmrnZ7CBOw/7238mORAdzExaX8n7CE=
ingotronic.ch. 300 IN RRSIG DNSKEY 5 2 300 20150125003700 20141226001657 6031 ingotronic.ch. rs1QlP2SlSpA2ELbzwg3DgWLzXWL3Lpv6CUJE2Q0qH2Zp7Qdy3cD+ZEtNh9v24Qv1M6JJ3zFt8mmZoCeW2ycuMbJCqBkW9CBuwF+VznZvZY2MxwPipvhvEEGP//0M8YAZJ66yQPDv3PTdAP8FYbIrJyvY44vwyncwbslpfHT9jAsrbfr3vuMuWps86dnP462q+0s1TxBfqi8mzo3gdavjHKWVNwohLahLKT+tWeu6DSzQv0YwMjwtkLgF7QRgx3ctIIkloOrnx9nHH1N6y+hxEB89fOlyVDjHhgL5uVtsD5fEdT0FJ2Gc/2nShEMMqIwr1/J9kUq1mNySff/uEe65Q==
ingotronic.ch. 300 IN RRSIG DNSKEY 5 2 300 20150125003700 20141226001657 17430 ingotronic.ch. mEwZjhQqeWksWD0TCnNBrtce4YkWJL3edqL6PvAUu8Fn+Ih437kEs3+pqdkgRsdYQ9HW+lBm/8pWwJlNAv0bi9NykItXMwAUFtncgq+6Pnh3iAM972GXSa5VV4LcGQ5b8CBdHCHiEKDqyPv5Hr5QfYL/FQaWlcNRh4QZZlZNPFA=
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 940 bytes
###############################################
testNameErrorWhenResultIsFromDelegationPoint 0000664 0000000 0000000 00000033522 13020541473 0042445 0 ustar 00root root 0000000 0000000 dnssecjava-1.1.3/src/test/resources/recordings/org_jitsi_dnssec_validator_TestValUtils #Date: 2015-01-06T22:35:24+01:00
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 6532
;; flags: qr aa rd ra cd ; qd: 1 an: 0 au: 6 ad: 1
;; QUESTIONS:
;; sub1.ingotronic.ch., type = NSEC, class = IN
;; ANSWERS:
;; AUTHORITY RECORDS:
ingotronic.ch. 300 IN SOA ns1.ingotronic.ch. admin.ingotronic.ch. 2013032762 300 60 864000 300
ingotronic.ch. 300 IN RRSIG SOA 5 2 300 20150125021244 20141226011244 17430 ingotronic.ch. WDLpp9G0P/rlMBfpFn9sAfpEFoBnQfwyGSXbGCc/LG1FSkJoKLDQYDY696scLNsJgkrzZeJrl0oSSvA8AvRUhYRrmuqWMxTVFgYlRwPwqEMCKUqiVhKGVF4NYemoBiUQC4nJwBZd57xKCiF4AQ4CodBtiZxefJFAlTNE0g2yxtM=
ingotronic.ch. 300 IN NSEC alias.ingotronic.ch. A NS SOA RRSIG NSEC DNSKEY
ingotronic.ch. 300 IN RRSIG NSEC 5 2 300 20150125000532 20141225234703 17430 ingotronic.ch. en5BaZ6zWqEvoUFUDPm5g1pjz7THXBv/1kjKtV2tS+7xh0BtkLEzlA9n/H66ZZAX2EIh7vXj12xVJKOuEuM0o1mJwKsBaLQuTra60/zYAUIddwUOCzI3zzjiRFklPyHSnLkGoBODZcvehnsTzTPyBxkfoouleqpj7gN5jOSBL8M=
sub.ingotronic.ch. 300 IN NSEC unknown-alg.ingotronic.ch. NS DS RRSIG NSEC
sub.ingotronic.ch. 300 IN RRSIG NSEC 5 3 300 20150125004144 20141226003211 17430 ingotronic.ch. bNZQZZypKi/2MlAYJ6h0W69GSCLxnkvq4cXdR5oBfvcGlvP5AMnuqqY0HwjByPHqg8TMn/lrlpoXPODAjeAadRD73F3GD1YgyWDr1eCeSGCIHisadDYpzdeqgQNHxYbz2UMtB5d/6Q/C4yyzWuxk3Rpwg+bV77yYlOjDxgVYMhg=
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 705 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 31146
;; flags: qr rd ra ad cd ; qd: 1 an: 4 au: 0 ad: 1
;; QUESTIONS:
;; ., type = DNSKEY, class = IN
;; ANSWERS:
. 87349 IN DNSKEY 256 3 8 AwEAAaPD7Y7XIi1MOEREJNTrRhyqsY3gff6JWzg+XCbqut1sbcbvqyssHw8DT1AkRaAC92pO8xuyq5QEgEPL1IHfABLwpwXI5gTj4gdwi86bpkmlWs9fRpnn4DPDCTdrnxIejJXgClHikLJF3u3CdpNCMijq4CKdQbMlRZ3avv+G7rh7
. 87349 IN DNSKEY 257 3 8 AwEAAagAIKlVZrpC6Ia7gEzahOR+9W29euxhJhVVLOyQbSEW0O8gcCjFFVQUTf6v58fLjwBd0YI0EzrAcQqBGCzh/RStIoO8g0NfnfL2MTJRkxoXbfDaUeVPQuYEhg37NZWAJQ9VnMVDxP/VHL496M/QZxkjf5/Efucp2gaDX6RS6CXpoY68LsvPVjR0ZSwzz1apAzvN9dlzEheX7ICJBBtuA6G3LQpzW5hOA2hzCTMjJPJ8LbqF6dsV6DoBQzgul0sGIcGOYl7OyQdXfZ57relSQageu+ipAdTTJ25AsRTAoub8ONGcLmqrAmRLKBP1dfwhYB4N7knNnulqQxA+Uk1ihz0=
. 87349 IN DNSKEY 256 3 8 AwEAAe3fSrbLBy3LOS7pnxEUhvPZTE2H5dIGsI/UfruI/nOEvWWa/PSX2BFedBkEqOlYdjdNF2f+6lmfk2Od/xu0v5bVqxFE+/24v3hZSlWBxvXzPTAGHrbW/IJYEPqlzVOAS4XdUgHg0N7IbLywNHMvB+Yf+Nm6ctyXXFLV4WTNnzs7
. 87349 IN RRSIG DNSKEY 8 0 172800 20150115235959 20150101000000 19036 . i8cAxD2pvQi1oAyvQxRpDfFlbqPzW+69QQEsDwE1eWOm5AtawO9U7lmsGps7sy/fVNvl1ljKBj4Djp9pb3U2FLogjiIlW0cDAkPmLlG9t+b/pjEfBNlhjANUVN06pvQVAfm+LcF26EaWT6FlISBqb6jSy4BHRa3Bdc4Sx7+pRSYSqVVvYxLkfAWsKPqGkvWhebJDndJJV9syXQXgZ+v/uJ+6XOS43xkAdeL8iBzIs/FlwMTfh3tVe3d0lb65IBBLlCzeQuetX+0Vu1YFcnD0mHc/wS2ZnAV5toAFmyVQBoY/XAZiZeaOkcROJ6Zmqezy7liwK7BqsYyAZntMhk8lbg==
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 883 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 16372
;; flags: qr rd ra ad cd ; qd: 1 an: 2 au: 0 ad: 1
;; QUESTIONS:
;; ch., type = DS, class = IN
;; ANSWERS:
ch. 949 IN DS 46375 8 2 8F96646FC68BB7E4AF4C0750A6096FBC0D4ECDA3D3FA6DA06FDDB42EE50C6CF3
ch. 949 IN RRSIG DS 8 1 86400 20150112170000 20150105160000 16665 . thY7xYWBBxiBjqbQIb9fAG4TmQgnziwM7q6P1T3/ITxmECdvOCQnnZA3uD7qmN8uM0HudsD7+y+zgD3rsH4RSTKdL4kHSI0OnCxToMTvklghEgFDezqIRm8NkWdI2H4Stwrj20nYKSpLQxPI2EE54gs18P3KyO8bAUYv8Qx73xU=
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 238 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 39104
;; flags: qr rd ra ad cd ; qd: 1 an: 4 au: 0 ad: 1
;; QUESTIONS:
;; ch., type = DNSKEY, class = IN
;; ANSWERS:
ch. 950 IN DNSKEY 257 3 8 AwEAAb7GhhZ8IAy/AhwmSms5DeQK5ad09wIIplEpYoiAIYXPtJvT1ReFzyfTp/2YP+g/PWDwHPh4qKAHa9x0VgbIQcGAeNakmfkAdWEmCnca323/SAml3mwfaX62G7/uYWae5zh8QTxZKNd+K1yZ5x0IxnI31chSl5xymRbTEHYZDKwSIRFM3fTxUMt93WFaBVWELReYotJBr++rvAWdnlay5TPBTvheLBkaiqtgM4GP8HK07Y+86lsZnEsj5K3G1KTV5SPpa82rqYAwxG9VKbmSE/6/kBR5jJHjt1rRt5Oe7v18aEtw0YCEN4vxq+KuvMoNVqXUsE9LBwHJD+QNwi6wmB0=
ch. 950 IN DNSKEY 256 3 8 AwEAAcSLdT0fEmcFmLpeUkAJoeVaHKiu+nbuc43fWlqaCRVf8t2HA4uWxOk0O5ci9nrFTc8nq8oa5fk5Cj7CHh4yrX9qUCfTdIWTyp8BDEdJpS+Dyb0u9wQuVj+nQMj4fLzdQf4TJs3/qxuiLr3nL1UUwlhhXeqSqGVb7p3mtB5HJ8ad
ch. 950 IN DNSKEY 256 3 8 AwEAAcsg0kY6fw1wzYMhSAKTy+Y2JzAst66P/1odp9NECJJHbU8f4nwziI3onoFSBV0ZiSZhY1aH5dhdDZ7BkrqhVXSrZPAz0CvzjIxmB1gSOf9DeZvjQvoy97HqYolxsf+B3QQv2RKBT67elF5+JisKg3/dQISelKn8LhabSoVrMlD1
ch. 950 IN RRSIG DNSKEY 8 1 86400 20150127100909 20141212090909 46375 ch. bT8q0FWyeMH0SulNo6UdIIgZYNATwYsee2bikq2Gh339Bufma8eaqWIPYT3XKmxYPBFOw0bVl+kLZxTwbR1CFoCDXoP+qgQhh4mf9qkNiv2CDSc+0FE3FRREn+DAhYTUEuB58FPiPakFB8s8O7T+k2qhDae7jy4/y7Jl1lnjaBY8s7bzOUPhF0KKCNZmvoKwtL23ZdVeTSV1xM3jkiNnpzBKbcoSWECSGJVp1SE0BnRXdwQP41YTXFZ0310YjaTAUCC5qbMIWdEkHjfdSQtKBImnc85mkapq9w++XQ4zhauPWBtrPV3CcoCahjUaWdjrKVkibomlJZaN8MEO23CfQw==
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 893 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 6834
;; flags: qr rd ra cd ; qd: 1 an: 3 au: 0 ad: 1
;; QUESTIONS:
;; ingotronic.ch., type = DS, class = IN
;; ANSWERS:
ingotronic.ch. 3558 IN DS 6031 5 1 733D0218B571CD617B1A7493564B9FC4F12ADE82
ingotronic.ch. 3558 IN DS 6031 5 2 4A948F2FDADA24686E473EDAC00DCF972584C75E3FAA92C2021B6221449FF87E
ingotronic.ch. 3558 IN RRSIG DS 8 2 3600 20150129033614 20150105123019 60789 ch. rVPJP2HhzW7OkroK2axFj5Lb4iVWCH8Fp/Iq1rF952NDo72b8RiKje2RaAKJAGQ+wd0YgE+PAej04GCmkhlDJA/zvPeeTxuhy3HbJzReMlQ7fjyH+wW1hli+FuIYvogXWf7nO/9VyPORt8X/f/pjrOr3Vlj9sGLN8TGYpEuVSw4=
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 288 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 3299
;; flags: qr aa rd ra cd ; qd: 1 an: 4 au: 0 ad: 1
;; QUESTIONS:
;; ingotronic.ch., type = DNSKEY, class = IN
;; ANSWERS:
ingotronic.ch. 300 IN DNSKEY 257 3 5 AwEAAeA1vzmjaB+eBAcvhzpKEgAEFpvQ1rg4uKDW6MsQtacKoqBpgyep2+LuWotz5p/xYxj3NGsArwN8Ad5cY0FHRr8miTT0elOv6nvlqGIfRuhj/BXAQ1x4ihpSFslHw0lJMYFwxsUZWpUyjWX/nv1xRZMMwF46gui0N4OEbyTYusCk77D+A71k+K0EAitFIbIH4GCUKmH1H7HmXhSVH9bN/n7KEGwW32lmsuuUcJoRKDkcUvbMXY/9Xoa2quERrUg/rBbDUHowRPjYDS5GzY1+f4YY8s40BufGiqyUTKKXL953MVFK8gmezXA0hbmrnZ7CBOw/7238mORAdzExaX8n7CE=
ingotronic.ch. 300 IN DNSKEY 256 3 5 AwEAAZ2Xh77GFzpEDx7EHYxShqltHgkiG+BOjBGifEmnJhQSdE5/yNSLFNcdhZZ8HUPxYnaedTqJcFFg4AzUsQklF/fECegTJdZjaj2WoL0/I8K7HMfY/hVuRZUWPNglYi8agJRX6gdkFTCpUNI7stpgKqxtzUJhhw15uG/lKMplwqUr
ingotronic.ch. 300 IN RRSIG DNSKEY 5 2 300 20150125003700 20141226001657 6031 ingotronic.ch. rs1QlP2SlSpA2ELbzwg3DgWLzXWL3Lpv6CUJE2Q0qH2Zp7Qdy3cD+ZEtNh9v24Qv1M6JJ3zFt8mmZoCeW2ycuMbJCqBkW9CBuwF+VznZvZY2MxwPipvhvEEGP//0M8YAZJ66yQPDv3PTdAP8FYbIrJyvY44vwyncwbslpfHT9jAsrbfr3vuMuWps86dnP462q+0s1TxBfqi8mzo3gdavjHKWVNwohLahLKT+tWeu6DSzQv0YwMjwtkLgF7QRgx3ctIIkloOrnx9nHH1N6y+hxEB89fOlyVDjHhgL5uVtsD5fEdT0FJ2Gc/2nShEMMqIwr1/J9kUq1mNySff/uEe65Q==
ingotronic.ch. 300 IN RRSIG DNSKEY 5 2 300 20150125003700 20141226001657 17430 ingotronic.ch. mEwZjhQqeWksWD0TCnNBrtce4YkWJL3edqL6PvAUu8Fn+Ih437kEs3+pqdkgRsdYQ9HW+lBm/8pWwJlNAv0bi9NykItXMwAUFtncgq+6Pnh3iAM972GXSa5VV4LcGQ5b8CBdHCHiEKDqyPv5Hr5QfYL/FQaWlcNRh4QZZlZNPFA=
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 940 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 55115
;; flags: qr rd ra ad cd ; qd: 1 an: 4 au: 0 ad: 1
;; QUESTIONS:
;; ., type = DNSKEY, class = IN
;; ANSWERS:
. 87349 IN DNSKEY 256 3 8 AwEAAe3fSrbLBy3LOS7pnxEUhvPZTE2H5dIGsI/UfruI/nOEvWWa/PSX2BFedBkEqOlYdjdNF2f+6lmfk2Od/xu0v5bVqxFE+/24v3hZSlWBxvXzPTAGHrbW/IJYEPqlzVOAS4XdUgHg0N7IbLywNHMvB+Yf+Nm6ctyXXFLV4WTNnzs7
. 87349 IN DNSKEY 256 3 8 AwEAAaPD7Y7XIi1MOEREJNTrRhyqsY3gff6JWzg+XCbqut1sbcbvqyssHw8DT1AkRaAC92pO8xuyq5QEgEPL1IHfABLwpwXI5gTj4gdwi86bpkmlWs9fRpnn4DPDCTdrnxIejJXgClHikLJF3u3CdpNCMijq4CKdQbMlRZ3avv+G7rh7
. 87349 IN DNSKEY 257 3 8 AwEAAagAIKlVZrpC6Ia7gEzahOR+9W29euxhJhVVLOyQbSEW0O8gcCjFFVQUTf6v58fLjwBd0YI0EzrAcQqBGCzh/RStIoO8g0NfnfL2MTJRkxoXbfDaUeVPQuYEhg37NZWAJQ9VnMVDxP/VHL496M/QZxkjf5/Efucp2gaDX6RS6CXpoY68LsvPVjR0ZSwzz1apAzvN9dlzEheX7ICJBBtuA6G3LQpzW5hOA2hzCTMjJPJ8LbqF6dsV6DoBQzgul0sGIcGOYl7OyQdXfZ57relSQageu+ipAdTTJ25AsRTAoub8ONGcLmqrAmRLKBP1dfwhYB4N7knNnulqQxA+Uk1ihz0=
. 87349 IN RRSIG DNSKEY 8 0 172800 20150115235959 20150101000000 19036 . i8cAxD2pvQi1oAyvQxRpDfFlbqPzW+69QQEsDwE1eWOm5AtawO9U7lmsGps7sy/fVNvl1ljKBj4Djp9pb3U2FLogjiIlW0cDAkPmLlG9t+b/pjEfBNlhjANUVN06pvQVAfm+LcF26EaWT6FlISBqb6jSy4BHRa3Bdc4Sx7+pRSYSqVVvYxLkfAWsKPqGkvWhebJDndJJV9syXQXgZ+v/uJ+6XOS43xkAdeL8iBzIs/FlwMTfh3tVe3d0lb65IBBLlCzeQuetX+0Vu1YFcnD0mHc/wS2ZnAV5toAFmyVQBoY/XAZiZeaOkcROJ6Zmqezy7liwK7BqsYyAZntMhk8lbg==
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 883 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 17514
;; flags: qr rd ra ad cd ; qd: 1 an: 2 au: 0 ad: 1
;; QUESTIONS:
;; ch., type = DS, class = IN
;; ANSWERS:
ch. 949 IN DS 46375 8 2 8F96646FC68BB7E4AF4C0750A6096FBC0D4ECDA3D3FA6DA06FDDB42EE50C6CF3
ch. 949 IN RRSIG DS 8 1 86400 20150112170000 20150105160000 16665 . thY7xYWBBxiBjqbQIb9fAG4TmQgnziwM7q6P1T3/ITxmECdvOCQnnZA3uD7qmN8uM0HudsD7+y+zgD3rsH4RSTKdL4kHSI0OnCxToMTvklghEgFDezqIRm8NkWdI2H4Stwrj20nYKSpLQxPI2EE54gs18P3KyO8bAUYv8Qx73xU=
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 238 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 53512
;; flags: qr rd ra ad cd ; qd: 1 an: 4 au: 0 ad: 1
;; QUESTIONS:
;; ch., type = DNSKEY, class = IN
;; ANSWERS:
ch. 950 IN DNSKEY 256 3 8 AwEAAcSLdT0fEmcFmLpeUkAJoeVaHKiu+nbuc43fWlqaCRVf8t2HA4uWxOk0O5ci9nrFTc8nq8oa5fk5Cj7CHh4yrX9qUCfTdIWTyp8BDEdJpS+Dyb0u9wQuVj+nQMj4fLzdQf4TJs3/qxuiLr3nL1UUwlhhXeqSqGVb7p3mtB5HJ8ad
ch. 950 IN DNSKEY 257 3 8 AwEAAb7GhhZ8IAy/AhwmSms5DeQK5ad09wIIplEpYoiAIYXPtJvT1ReFzyfTp/2YP+g/PWDwHPh4qKAHa9x0VgbIQcGAeNakmfkAdWEmCnca323/SAml3mwfaX62G7/uYWae5zh8QTxZKNd+K1yZ5x0IxnI31chSl5xymRbTEHYZDKwSIRFM3fTxUMt93WFaBVWELReYotJBr++rvAWdnlay5TPBTvheLBkaiqtgM4GP8HK07Y+86lsZnEsj5K3G1KTV5SPpa82rqYAwxG9VKbmSE/6/kBR5jJHjt1rRt5Oe7v18aEtw0YCEN4vxq+KuvMoNVqXUsE9LBwHJD+QNwi6wmB0=
ch. 950 IN DNSKEY 256 3 8 AwEAAcsg0kY6fw1wzYMhSAKTy+Y2JzAst66P/1odp9NECJJHbU8f4nwziI3onoFSBV0ZiSZhY1aH5dhdDZ7BkrqhVXSrZPAz0CvzjIxmB1gSOf9DeZvjQvoy97HqYolxsf+B3QQv2RKBT67elF5+JisKg3/dQISelKn8LhabSoVrMlD1
ch. 950 IN RRSIG DNSKEY 8 1 86400 20150127100909 20141212090909 46375 ch. bT8q0FWyeMH0SulNo6UdIIgZYNATwYsee2bikq2Gh339Bufma8eaqWIPYT3XKmxYPBFOw0bVl+kLZxTwbR1CFoCDXoP+qgQhh4mf9qkNiv2CDSc+0FE3FRREn+DAhYTUEuB58FPiPakFB8s8O7T+k2qhDae7jy4/y7Jl1lnjaBY8s7bzOUPhF0KKCNZmvoKwtL23ZdVeTSV1xM3jkiNnpzBKbcoSWECSGJVp1SE0BnRXdwQP41YTXFZ0310YjaTAUCC5qbMIWdEkHjfdSQtKBImnc85mkapq9w++XQ4zhauPWBtrPV3CcoCahjUaWdjrKVkibomlJZaN8MEO23CfQw==
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 893 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 38139
;; flags: qr rd ra cd ; qd: 1 an: 3 au: 0 ad: 1
;; QUESTIONS:
;; ingotronic.ch., type = DS, class = IN
;; ANSWERS:
ingotronic.ch. 3558 IN DS 6031 5 1 733D0218B571CD617B1A7493564B9FC4F12ADE82
ingotronic.ch. 3558 IN DS 6031 5 2 4A948F2FDADA24686E473EDAC00DCF972584C75E3FAA92C2021B6221449FF87E
ingotronic.ch. 3558 IN RRSIG DS 8 2 3600 20150129033614 20150105123019 60789 ch. rVPJP2HhzW7OkroK2axFj5Lb4iVWCH8Fp/Iq1rF952NDo72b8RiKje2RaAKJAGQ+wd0YgE+PAej04GCmkhlDJA/zvPeeTxuhy3HbJzReMlQ7fjyH+wW1hli+FuIYvogXWf7nO/9VyPORt8X/f/pjrOr3Vlj9sGLN8TGYpEuVSw4=
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 288 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 29757
;; flags: qr aa rd ra cd ; qd: 1 an: 4 au: 0 ad: 1
;; QUESTIONS:
;; ingotronic.ch., type = DNSKEY, class = IN
;; ANSWERS:
ingotronic.ch. 300 IN DNSKEY 256 3 5 AwEAAZ2Xh77GFzpEDx7EHYxShqltHgkiG+BOjBGifEmnJhQSdE5/yNSLFNcdhZZ8HUPxYnaedTqJcFFg4AzUsQklF/fECegTJdZjaj2WoL0/I8K7HMfY/hVuRZUWPNglYi8agJRX6gdkFTCpUNI7stpgKqxtzUJhhw15uG/lKMplwqUr
ingotronic.ch. 300 IN DNSKEY 257 3 5 AwEAAeA1vzmjaB+eBAcvhzpKEgAEFpvQ1rg4uKDW6MsQtacKoqBpgyep2+LuWotz5p/xYxj3NGsArwN8Ad5cY0FHRr8miTT0elOv6nvlqGIfRuhj/BXAQ1x4ihpSFslHw0lJMYFwxsUZWpUyjWX/nv1xRZMMwF46gui0N4OEbyTYusCk77D+A71k+K0EAitFIbIH4GCUKmH1H7HmXhSVH9bN/n7KEGwW32lmsuuUcJoRKDkcUvbMXY/9Xoa2quERrUg/rBbDUHowRPjYDS5GzY1+f4YY8s40BufGiqyUTKKXL953MVFK8gmezXA0hbmrnZ7CBOw/7238mORAdzExaX8n7CE=
ingotronic.ch. 300 IN RRSIG DNSKEY 5 2 300 20150125003700 20141226001657 6031 ingotronic.ch. rs1QlP2SlSpA2ELbzwg3DgWLzXWL3Lpv6CUJE2Q0qH2Zp7Qdy3cD+ZEtNh9v24Qv1M6JJ3zFt8mmZoCeW2ycuMbJCqBkW9CBuwF+VznZvZY2MxwPipvhvEEGP//0M8YAZJ66yQPDv3PTdAP8FYbIrJyvY44vwyncwbslpfHT9jAsrbfr3vuMuWps86dnP462q+0s1TxBfqi8mzo3gdavjHKWVNwohLahLKT+tWeu6DSzQv0YwMjwtkLgF7QRgx3ctIIkloOrnx9nHH1N6y+hxEB89fOlyVDjHhgL5uVtsD5fEdT0FJ2Gc/2nShEMMqIwr1/J9kUq1mNySff/uEe65Q==
ingotronic.ch. 300 IN RRSIG DNSKEY 5 2 300 20150125003700 20141226001657 17430 ingotronic.ch. mEwZjhQqeWksWD0TCnNBrtce4YkWJL3edqL6PvAUu8Fn+Ih437kEs3+pqdkgRsdYQ9HW+lBm/8pWwJlNAv0bi9NykItXMwAUFtncgq+6Pnh3iAM972GXSa5VV4LcGQ5b8CBdHCHiEKDqyPv5Hr5QfYL/FQaWlcNRh4QZZlZNPFA=
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 940 bytes
###############################################
testNoDataOfDSForRoot 0000664 0000000 0000000 00000005054 13020541473 0035600 0 ustar 00root root 0000000 0000000 dnssecjava-1.1.3/src/test/resources/recordings/org_jitsi_dnssec_validator_TestValUtils #Date: 2015-01-06T22:35:22+01:00
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 57811
;; flags: qr rd ra cd ; qd: 1 an: 0 au: 4 ad: 1
;; QUESTIONS:
;; ., type = DS, class = IN
;; ANSWERS:
;; AUTHORITY RECORDS:
. 10800 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2015010601 1800 900 604800 86400
. 10800 IN RRSIG SOA 8 0 86400 20150113170000 20150106160000 16665 . R9ZOwEb5fodQQNRl4WvguyqEzOxdNPQ18nI+0R5sB2JSqG4Qz45SwW+vfnFCF01UW43/GdEfGOScrYVP2UBM8F2WOM+tHMZN0t9BbP9uszTWhzdYNCl3UKYYJiB59b8HIhKXlERPVfW2UEgIiI2VajShJnUv67W8gQO56hgTNEE=
. 10800 IN RRSIG NSEC 8 0 86400 20150113170000 20150106160000 16665 . wlEpGn1C8YZzJjIrlJp/GSud5FuLAZZj9C54DrKEl9gELWeIFJgLwkI1tcH4EhabbsNScB7SPOmVmnLkuM4Q6yJkmI1HXeBrddxniI2YEw+m9++/i19AqfDxuVYs52peKxXdEZ/sIS5JtDz3bdB44IAp2k1ue780z0xRV796vUk=
. 10800 IN NSEC abogado. NS SOA RRSIG NSEC DNSKEY
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 448 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 65502
;; flags: qr rd ra ad cd ; qd: 1 an: 4 au: 0 ad: 1
;; QUESTIONS:
;; ., type = DNSKEY, class = IN
;; ANSWERS:
. 87351 IN DNSKEY 256 3 8 AwEAAe3fSrbLBy3LOS7pnxEUhvPZTE2H5dIGsI/UfruI/nOEvWWa/PSX2BFedBkEqOlYdjdNF2f+6lmfk2Od/xu0v5bVqxFE+/24v3hZSlWBxvXzPTAGHrbW/IJYEPqlzVOAS4XdUgHg0N7IbLywNHMvB+Yf+Nm6ctyXXFLV4WTNnzs7
. 87351 IN DNSKEY 257 3 8 AwEAAagAIKlVZrpC6Ia7gEzahOR+9W29euxhJhVVLOyQbSEW0O8gcCjFFVQUTf6v58fLjwBd0YI0EzrAcQqBGCzh/RStIoO8g0NfnfL2MTJRkxoXbfDaUeVPQuYEhg37NZWAJQ9VnMVDxP/VHL496M/QZxkjf5/Efucp2gaDX6RS6CXpoY68LsvPVjR0ZSwzz1apAzvN9dlzEheX7ICJBBtuA6G3LQpzW5hOA2hzCTMjJPJ8LbqF6dsV6DoBQzgul0sGIcGOYl7OyQdXfZ57relSQageu+ipAdTTJ25AsRTAoub8ONGcLmqrAmRLKBP1dfwhYB4N7knNnulqQxA+Uk1ihz0=
. 87351 IN DNSKEY 256 3 8 AwEAAaPD7Y7XIi1MOEREJNTrRhyqsY3gff6JWzg+XCbqut1sbcbvqyssHw8DT1AkRaAC92pO8xuyq5QEgEPL1IHfABLwpwXI5gTj4gdwi86bpkmlWs9fRpnn4DPDCTdrnxIejJXgClHikLJF3u3CdpNCMijq4CKdQbMlRZ3avv+G7rh7
. 87351 IN RRSIG DNSKEY 8 0 172800 20150115235959 20150101000000 19036 . i8cAxD2pvQi1oAyvQxRpDfFlbqPzW+69QQEsDwE1eWOm5AtawO9U7lmsGps7sy/fVNvl1ljKBj4Djp9pb3U2FLogjiIlW0cDAkPmLlG9t+b/pjEfBNlhjANUVN06pvQVAfm+LcF26EaWT6FlISBqb6jSy4BHRa3Bdc4Sx7+pRSYSqVVvYxLkfAWsKPqGkvWhebJDndJJV9syXQXgZ+v/uJ+6XOS43xkAdeL8iBzIs/FlwMTfh3tVe3d0lb65IBBLlCzeQuetX+0Vu1YFcnD0mHc/wS2ZnAV5toAFmyVQBoY/XAZiZeaOkcROJ6Zmqezy7liwK7BqsYyAZntMhk8lbg==
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 883 bytes
###############################################
testNoDataOnEntWithWrongNsec 0000664 0000000 0000000 00000033366 13020541473 0037206 0 ustar 00root root 0000000 0000000 dnssecjava-1.1.3/src/test/resources/recordings/org_jitsi_dnssec_validator_TestValUtils #Date: 2015-01-06T22:35:23+01:00
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 3464
;; flags: qr aa rd ra cd ; qd: 1 an: 2 au: 2 ad: 3
;; QUESTIONS:
;; alias.ingotronic.ch., type = NSEC, class = IN
;; ANSWERS:
alias.ingotronic.ch. 300 IN NSEC a.b.ingotronic.ch. DNAME RRSIG NSEC
alias.ingotronic.ch. 300 IN RRSIG NSEC 5 3 300 20150125000532 20141225234703 17430 ingotronic.ch. mS+nh5skTxhOBdJlkwSGdrmhuA5FC9Am9emIhyIViET/1BoKotmbzLtfaBXAh2gRhcfDr+4OJJ6oyUcdMn/m4YG8NUsf4rAL92/YyxocUoF/oS8ZZv/BPXplCH5J4hsac+heElbPJ29v0kFVujErTaX/Ev0lYsUNI+9OmCrlQpk=
;; AUTHORITY RECORDS:
ingotronic.ch. 300 IN NS ns1.ingotronic.ch.
ingotronic.ch. 300 IN RRSIG NS 5 2 300 20150125000532 20141225234703 17430 ingotronic.ch. VuzVJM3McSHlcdngCG/G23zCikq8tXE0CZV2ZSgUFXXFMIEoM6PMi1QRQ/8VF3tee4WGpRx2jhtkui0wFRFfwIhW7G1uPDT4qogaR3KLIyuCEsMxhRH3WJZNrLmLqlSBGvd9OBJwbmryqm3Zzqvrk+E+rh8OJeifnBBpHAX4eHg=
;; ADDITIONAL RECORDS:
ns1.ingotronic.ch. 300 IN A 62.192.5.131
ns1.ingotronic.ch. 300 IN RRSIG A 5 3 300 20150125005754 20141226001054 17430 ingotronic.ch. fNG1RZM53pXwBxruHNaSZszxVzNLoCq8VZsTjAzYH2vSLzHXYVGJFTLIeY0K9APAdyJU8WuwmABmn7XY0Kg39kRG77uoFlqUws2PdTz2QKOwJGZY7W88Ak2Y9lkDBcK8o3wJHVptrT8R7p/1U7UfjF0kqPUkakk2B0EbFWdagFg=
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 640 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 53101
;; flags: qr rd ra ad cd ; qd: 1 an: 4 au: 0 ad: 1
;; QUESTIONS:
;; ., type = DNSKEY, class = IN
;; ANSWERS:
. 87350 IN DNSKEY 257 3 8 AwEAAagAIKlVZrpC6Ia7gEzahOR+9W29euxhJhVVLOyQbSEW0O8gcCjFFVQUTf6v58fLjwBd0YI0EzrAcQqBGCzh/RStIoO8g0NfnfL2MTJRkxoXbfDaUeVPQuYEhg37NZWAJQ9VnMVDxP/VHL496M/QZxkjf5/Efucp2gaDX6RS6CXpoY68LsvPVjR0ZSwzz1apAzvN9dlzEheX7ICJBBtuA6G3LQpzW5hOA2hzCTMjJPJ8LbqF6dsV6DoBQzgul0sGIcGOYl7OyQdXfZ57relSQageu+ipAdTTJ25AsRTAoub8ONGcLmqrAmRLKBP1dfwhYB4N7knNnulqQxA+Uk1ihz0=
. 87350 IN DNSKEY 256 3 8 AwEAAe3fSrbLBy3LOS7pnxEUhvPZTE2H5dIGsI/UfruI/nOEvWWa/PSX2BFedBkEqOlYdjdNF2f+6lmfk2Od/xu0v5bVqxFE+/24v3hZSlWBxvXzPTAGHrbW/IJYEPqlzVOAS4XdUgHg0N7IbLywNHMvB+Yf+Nm6ctyXXFLV4WTNnzs7
. 87350 IN DNSKEY 256 3 8 AwEAAaPD7Y7XIi1MOEREJNTrRhyqsY3gff6JWzg+XCbqut1sbcbvqyssHw8DT1AkRaAC92pO8xuyq5QEgEPL1IHfABLwpwXI5gTj4gdwi86bpkmlWs9fRpnn4DPDCTdrnxIejJXgClHikLJF3u3CdpNCMijq4CKdQbMlRZ3avv+G7rh7
. 87350 IN RRSIG DNSKEY 8 0 172800 20150115235959 20150101000000 19036 . i8cAxD2pvQi1oAyvQxRpDfFlbqPzW+69QQEsDwE1eWOm5AtawO9U7lmsGps7sy/fVNvl1ljKBj4Djp9pb3U2FLogjiIlW0cDAkPmLlG9t+b/pjEfBNlhjANUVN06pvQVAfm+LcF26EaWT6FlISBqb6jSy4BHRa3Bdc4Sx7+pRSYSqVVvYxLkfAWsKPqGkvWhebJDndJJV9syXQXgZ+v/uJ+6XOS43xkAdeL8iBzIs/FlwMTfh3tVe3d0lb65IBBLlCzeQuetX+0Vu1YFcnD0mHc/wS2ZnAV5toAFmyVQBoY/XAZiZeaOkcROJ6Zmqezy7liwK7BqsYyAZntMhk8lbg==
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 883 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 30899
;; flags: qr rd ra ad cd ; qd: 1 an: 2 au: 0 ad: 1
;; QUESTIONS:
;; ch., type = DS, class = IN
;; ANSWERS:
ch. 950 IN DS 46375 8 2 8F96646FC68BB7E4AF4C0750A6096FBC0D4ECDA3D3FA6DA06FDDB42EE50C6CF3
ch. 950 IN RRSIG DS 8 1 86400 20150112170000 20150105160000 16665 . thY7xYWBBxiBjqbQIb9fAG4TmQgnziwM7q6P1T3/ITxmECdvOCQnnZA3uD7qmN8uM0HudsD7+y+zgD3rsH4RSTKdL4kHSI0OnCxToMTvklghEgFDezqIRm8NkWdI2H4Stwrj20nYKSpLQxPI2EE54gs18P3KyO8bAUYv8Qx73xU=
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 238 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 8785
;; flags: qr rd ra ad cd ; qd: 1 an: 4 au: 0 ad: 1
;; QUESTIONS:
;; ch., type = DNSKEY, class = IN
;; ANSWERS:
ch. 951 IN DNSKEY 257 3 8 AwEAAb7GhhZ8IAy/AhwmSms5DeQK5ad09wIIplEpYoiAIYXPtJvT1ReFzyfTp/2YP+g/PWDwHPh4qKAHa9x0VgbIQcGAeNakmfkAdWEmCnca323/SAml3mwfaX62G7/uYWae5zh8QTxZKNd+K1yZ5x0IxnI31chSl5xymRbTEHYZDKwSIRFM3fTxUMt93WFaBVWELReYotJBr++rvAWdnlay5TPBTvheLBkaiqtgM4GP8HK07Y+86lsZnEsj5K3G1KTV5SPpa82rqYAwxG9VKbmSE/6/kBR5jJHjt1rRt5Oe7v18aEtw0YCEN4vxq+KuvMoNVqXUsE9LBwHJD+QNwi6wmB0=
ch. 951 IN DNSKEY 256 3 8 AwEAAcSLdT0fEmcFmLpeUkAJoeVaHKiu+nbuc43fWlqaCRVf8t2HA4uWxOk0O5ci9nrFTc8nq8oa5fk5Cj7CHh4yrX9qUCfTdIWTyp8BDEdJpS+Dyb0u9wQuVj+nQMj4fLzdQf4TJs3/qxuiLr3nL1UUwlhhXeqSqGVb7p3mtB5HJ8ad
ch. 951 IN DNSKEY 256 3 8 AwEAAcsg0kY6fw1wzYMhSAKTy+Y2JzAst66P/1odp9NECJJHbU8f4nwziI3onoFSBV0ZiSZhY1aH5dhdDZ7BkrqhVXSrZPAz0CvzjIxmB1gSOf9DeZvjQvoy97HqYolxsf+B3QQv2RKBT67elF5+JisKg3/dQISelKn8LhabSoVrMlD1
ch. 951 IN RRSIG DNSKEY 8 1 86400 20150127100909 20141212090909 46375 ch. bT8q0FWyeMH0SulNo6UdIIgZYNATwYsee2bikq2Gh339Bufma8eaqWIPYT3XKmxYPBFOw0bVl+kLZxTwbR1CFoCDXoP+qgQhh4mf9qkNiv2CDSc+0FE3FRREn+DAhYTUEuB58FPiPakFB8s8O7T+k2qhDae7jy4/y7Jl1lnjaBY8s7bzOUPhF0KKCNZmvoKwtL23ZdVeTSV1xM3jkiNnpzBKbcoSWECSGJVp1SE0BnRXdwQP41YTXFZ0310YjaTAUCC5qbMIWdEkHjfdSQtKBImnc85mkapq9w++XQ4zhauPWBtrPV3CcoCahjUaWdjrKVkibomlJZaN8MEO23CfQw==
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 893 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 18505
;; flags: qr rd ra cd ; qd: 1 an: 3 au: 0 ad: 1
;; QUESTIONS:
;; ingotronic.ch., type = DS, class = IN
;; ANSWERS:
ingotronic.ch. 3559 IN DS 6031 5 2 4A948F2FDADA24686E473EDAC00DCF972584C75E3FAA92C2021B6221449FF87E
ingotronic.ch. 3559 IN DS 6031 5 1 733D0218B571CD617B1A7493564B9FC4F12ADE82
ingotronic.ch. 3559 IN RRSIG DS 8 2 3600 20150129033614 20150105123019 60789 ch. rVPJP2HhzW7OkroK2axFj5Lb4iVWCH8Fp/Iq1rF952NDo72b8RiKje2RaAKJAGQ+wd0YgE+PAej04GCmkhlDJA/zvPeeTxuhy3HbJzReMlQ7fjyH+wW1hli+FuIYvogXWf7nO/9VyPORt8X/f/pjrOr3Vlj9sGLN8TGYpEuVSw4=
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 288 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 8855
;; flags: qr aa rd ra cd ; qd: 1 an: 4 au: 0 ad: 1
;; QUESTIONS:
;; ingotronic.ch., type = DNSKEY, class = IN
;; ANSWERS:
ingotronic.ch. 300 IN DNSKEY 256 3 5 AwEAAZ2Xh77GFzpEDx7EHYxShqltHgkiG+BOjBGifEmnJhQSdE5/yNSLFNcdhZZ8HUPxYnaedTqJcFFg4AzUsQklF/fECegTJdZjaj2WoL0/I8K7HMfY/hVuRZUWPNglYi8agJRX6gdkFTCpUNI7stpgKqxtzUJhhw15uG/lKMplwqUr
ingotronic.ch. 300 IN DNSKEY 257 3 5 AwEAAeA1vzmjaB+eBAcvhzpKEgAEFpvQ1rg4uKDW6MsQtacKoqBpgyep2+LuWotz5p/xYxj3NGsArwN8Ad5cY0FHRr8miTT0elOv6nvlqGIfRuhj/BXAQ1x4ihpSFslHw0lJMYFwxsUZWpUyjWX/nv1xRZMMwF46gui0N4OEbyTYusCk77D+A71k+K0EAitFIbIH4GCUKmH1H7HmXhSVH9bN/n7KEGwW32lmsuuUcJoRKDkcUvbMXY/9Xoa2quERrUg/rBbDUHowRPjYDS5GzY1+f4YY8s40BufGiqyUTKKXL953MVFK8gmezXA0hbmrnZ7CBOw/7238mORAdzExaX8n7CE=
ingotronic.ch. 300 IN RRSIG DNSKEY 5 2 300 20150125003700 20141226001657 6031 ingotronic.ch. rs1QlP2SlSpA2ELbzwg3DgWLzXWL3Lpv6CUJE2Q0qH2Zp7Qdy3cD+ZEtNh9v24Qv1M6JJ3zFt8mmZoCeW2ycuMbJCqBkW9CBuwF+VznZvZY2MxwPipvhvEEGP//0M8YAZJ66yQPDv3PTdAP8FYbIrJyvY44vwyncwbslpfHT9jAsrbfr3vuMuWps86dnP462q+0s1TxBfqi8mzo3gdavjHKWVNwohLahLKT+tWeu6DSzQv0YwMjwtkLgF7QRgx3ctIIkloOrnx9nHH1N6y+hxEB89fOlyVDjHhgL5uVtsD5fEdT0FJ2Gc/2nShEMMqIwr1/J9kUq1mNySff/uEe65Q==
ingotronic.ch. 300 IN RRSIG DNSKEY 5 2 300 20150125003700 20141226001657 17430 ingotronic.ch. mEwZjhQqeWksWD0TCnNBrtce4YkWJL3edqL6PvAUu8Fn+Ih437kEs3+pqdkgRsdYQ9HW+lBm/8pWwJlNAv0bi9NykItXMwAUFtncgq+6Pnh3iAM972GXSa5VV4LcGQ5b8CBdHCHiEKDqyPv5Hr5QfYL/FQaWlcNRh4QZZlZNPFA=
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 940 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 41255
;; flags: qr rd ra ad cd ; qd: 1 an: 4 au: 0 ad: 1
;; QUESTIONS:
;; ., type = DNSKEY, class = IN
;; ANSWERS:
. 87350 IN DNSKEY 256 3 8 AwEAAe3fSrbLBy3LOS7pnxEUhvPZTE2H5dIGsI/UfruI/nOEvWWa/PSX2BFedBkEqOlYdjdNF2f+6lmfk2Od/xu0v5bVqxFE+/24v3hZSlWBxvXzPTAGHrbW/IJYEPqlzVOAS4XdUgHg0N7IbLywNHMvB+Yf+Nm6ctyXXFLV4WTNnzs7
. 87350 IN DNSKEY 256 3 8 AwEAAaPD7Y7XIi1MOEREJNTrRhyqsY3gff6JWzg+XCbqut1sbcbvqyssHw8DT1AkRaAC92pO8xuyq5QEgEPL1IHfABLwpwXI5gTj4gdwi86bpkmlWs9fRpnn4DPDCTdrnxIejJXgClHikLJF3u3CdpNCMijq4CKdQbMlRZ3avv+G7rh7
. 87350 IN DNSKEY 257 3 8 AwEAAagAIKlVZrpC6Ia7gEzahOR+9W29euxhJhVVLOyQbSEW0O8gcCjFFVQUTf6v58fLjwBd0YI0EzrAcQqBGCzh/RStIoO8g0NfnfL2MTJRkxoXbfDaUeVPQuYEhg37NZWAJQ9VnMVDxP/VHL496M/QZxkjf5/Efucp2gaDX6RS6CXpoY68LsvPVjR0ZSwzz1apAzvN9dlzEheX7ICJBBtuA6G3LQpzW5hOA2hzCTMjJPJ8LbqF6dsV6DoBQzgul0sGIcGOYl7OyQdXfZ57relSQageu+ipAdTTJ25AsRTAoub8ONGcLmqrAmRLKBP1dfwhYB4N7knNnulqQxA+Uk1ihz0=
. 87350 IN RRSIG DNSKEY 8 0 172800 20150115235959 20150101000000 19036 . i8cAxD2pvQi1oAyvQxRpDfFlbqPzW+69QQEsDwE1eWOm5AtawO9U7lmsGps7sy/fVNvl1ljKBj4Djp9pb3U2FLogjiIlW0cDAkPmLlG9t+b/pjEfBNlhjANUVN06pvQVAfm+LcF26EaWT6FlISBqb6jSy4BHRa3Bdc4Sx7+pRSYSqVVvYxLkfAWsKPqGkvWhebJDndJJV9syXQXgZ+v/uJ+6XOS43xkAdeL8iBzIs/FlwMTfh3tVe3d0lb65IBBLlCzeQuetX+0Vu1YFcnD0mHc/wS2ZnAV5toAFmyVQBoY/XAZiZeaOkcROJ6Zmqezy7liwK7BqsYyAZntMhk8lbg==
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 883 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 43022
;; flags: qr rd ra ad cd ; qd: 1 an: 2 au: 0 ad: 1
;; QUESTIONS:
;; ch., type = DS, class = IN
;; ANSWERS:
ch. 950 IN DS 46375 8 2 8F96646FC68BB7E4AF4C0750A6096FBC0D4ECDA3D3FA6DA06FDDB42EE50C6CF3
ch. 950 IN RRSIG DS 8 1 86400 20150112170000 20150105160000 16665 . thY7xYWBBxiBjqbQIb9fAG4TmQgnziwM7q6P1T3/ITxmECdvOCQnnZA3uD7qmN8uM0HudsD7+y+zgD3rsH4RSTKdL4kHSI0OnCxToMTvklghEgFDezqIRm8NkWdI2H4Stwrj20nYKSpLQxPI2EE54gs18P3KyO8bAUYv8Qx73xU=
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 238 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 46782
;; flags: qr rd ra ad cd ; qd: 1 an: 4 au: 0 ad: 1
;; QUESTIONS:
;; ch., type = DNSKEY, class = IN
;; ANSWERS:
ch. 951 IN DNSKEY 256 3 8 AwEAAcSLdT0fEmcFmLpeUkAJoeVaHKiu+nbuc43fWlqaCRVf8t2HA4uWxOk0O5ci9nrFTc8nq8oa5fk5Cj7CHh4yrX9qUCfTdIWTyp8BDEdJpS+Dyb0u9wQuVj+nQMj4fLzdQf4TJs3/qxuiLr3nL1UUwlhhXeqSqGVb7p3mtB5HJ8ad
ch. 951 IN DNSKEY 256 3 8 AwEAAcsg0kY6fw1wzYMhSAKTy+Y2JzAst66P/1odp9NECJJHbU8f4nwziI3onoFSBV0ZiSZhY1aH5dhdDZ7BkrqhVXSrZPAz0CvzjIxmB1gSOf9DeZvjQvoy97HqYolxsf+B3QQv2RKBT67elF5+JisKg3/dQISelKn8LhabSoVrMlD1
ch. 951 IN DNSKEY 257 3 8 AwEAAb7GhhZ8IAy/AhwmSms5DeQK5ad09wIIplEpYoiAIYXPtJvT1ReFzyfTp/2YP+g/PWDwHPh4qKAHa9x0VgbIQcGAeNakmfkAdWEmCnca323/SAml3mwfaX62G7/uYWae5zh8QTxZKNd+K1yZ5x0IxnI31chSl5xymRbTEHYZDKwSIRFM3fTxUMt93WFaBVWELReYotJBr++rvAWdnlay5TPBTvheLBkaiqtgM4GP8HK07Y+86lsZnEsj5K3G1KTV5SPpa82rqYAwxG9VKbmSE/6/kBR5jJHjt1rRt5Oe7v18aEtw0YCEN4vxq+KuvMoNVqXUsE9LBwHJD+QNwi6wmB0=
ch. 951 IN RRSIG DNSKEY 8 1 86400 20150127100909 20141212090909 46375 ch. bT8q0FWyeMH0SulNo6UdIIgZYNATwYsee2bikq2Gh339Bufma8eaqWIPYT3XKmxYPBFOw0bVl+kLZxTwbR1CFoCDXoP+qgQhh4mf9qkNiv2CDSc+0FE3FRREn+DAhYTUEuB58FPiPakFB8s8O7T+k2qhDae7jy4/y7Jl1lnjaBY8s7bzOUPhF0KKCNZmvoKwtL23ZdVeTSV1xM3jkiNnpzBKbcoSWECSGJVp1SE0BnRXdwQP41YTXFZ0310YjaTAUCC5qbMIWdEkHjfdSQtKBImnc85mkapq9w++XQ4zhauPWBtrPV3CcoCahjUaWdjrKVkibomlJZaN8MEO23CfQw==
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 893 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 9216
;; flags: qr rd ra cd ; qd: 1 an: 3 au: 0 ad: 1
;; QUESTIONS:
;; ingotronic.ch., type = DS, class = IN
;; ANSWERS:
ingotronic.ch. 3559 IN DS 6031 5 1 733D0218B571CD617B1A7493564B9FC4F12ADE82
ingotronic.ch. 3559 IN DS 6031 5 2 4A948F2FDADA24686E473EDAC00DCF972584C75E3FAA92C2021B6221449FF87E
ingotronic.ch. 3559 IN RRSIG DS 8 2 3600 20150129033614 20150105123019 60789 ch. rVPJP2HhzW7OkroK2axFj5Lb4iVWCH8Fp/Iq1rF952NDo72b8RiKje2RaAKJAGQ+wd0YgE+PAej04GCmkhlDJA/zvPeeTxuhy3HbJzReMlQ7fjyH+wW1hli+FuIYvogXWf7nO/9VyPORt8X/f/pjrOr3Vlj9sGLN8TGYpEuVSw4=
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 288 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 20989
;; flags: qr aa rd ra cd ; qd: 1 an: 4 au: 0 ad: 1
;; QUESTIONS:
;; ingotronic.ch., type = DNSKEY, class = IN
;; ANSWERS:
ingotronic.ch. 300 IN DNSKEY 257 3 5 AwEAAeA1vzmjaB+eBAcvhzpKEgAEFpvQ1rg4uKDW6MsQtacKoqBpgyep2+LuWotz5p/xYxj3NGsArwN8Ad5cY0FHRr8miTT0elOv6nvlqGIfRuhj/BXAQ1x4ihpSFslHw0lJMYFwxsUZWpUyjWX/nv1xRZMMwF46gui0N4OEbyTYusCk77D+A71k+K0EAitFIbIH4GCUKmH1H7HmXhSVH9bN/n7KEGwW32lmsuuUcJoRKDkcUvbMXY/9Xoa2quERrUg/rBbDUHowRPjYDS5GzY1+f4YY8s40BufGiqyUTKKXL953MVFK8gmezXA0hbmrnZ7CBOw/7238mORAdzExaX8n7CE=
ingotronic.ch. 300 IN DNSKEY 256 3 5 AwEAAZ2Xh77GFzpEDx7EHYxShqltHgkiG+BOjBGifEmnJhQSdE5/yNSLFNcdhZZ8HUPxYnaedTqJcFFg4AzUsQklF/fECegTJdZjaj2WoL0/I8K7HMfY/hVuRZUWPNglYi8agJRX6gdkFTCpUNI7stpgKqxtzUJhhw15uG/lKMplwqUr
ingotronic.ch. 300 IN RRSIG DNSKEY 5 2 300 20150125003700 20141226001657 6031 ingotronic.ch. rs1QlP2SlSpA2ELbzwg3DgWLzXWL3Lpv6CUJE2Q0qH2Zp7Qdy3cD+ZEtNh9v24Qv1M6JJ3zFt8mmZoCeW2ycuMbJCqBkW9CBuwF+VznZvZY2MxwPipvhvEEGP//0M8YAZJ66yQPDv3PTdAP8FYbIrJyvY44vwyncwbslpfHT9jAsrbfr3vuMuWps86dnP462q+0s1TxBfqi8mzo3gdavjHKWVNwohLahLKT+tWeu6DSzQv0YwMjwtkLgF7QRgx3ctIIkloOrnx9nHH1N6y+hxEB89fOlyVDjHhgL5uVtsD5fEdT0FJ2Gc/2nShEMMqIwr1/J9kUq1mNySff/uEe65Q==
ingotronic.ch. 300 IN RRSIG DNSKEY 5 2 300 20150125003700 20141226001657 17430 ingotronic.ch. mEwZjhQqeWksWD0TCnNBrtce4YkWJL3edqL6PvAUu8Fn+Ih437kEs3+pqdkgRsdYQ9HW+lBm/8pWwJlNAv0bi9NykItXMwAUFtncgq+6Pnh3iAM972GXSa5VV4LcGQ5b8CBdHCHiEKDqyPv5Hr5QfYL/FQaWlcNRh4QZZlZNPFA=
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 940 bytes
###############################################
testNoDataWhenDSResultIsFromChild 0000664 0000000 0000000 00000023576 13020541473 0040116 0 ustar 00root root 0000000 0000000 dnssecjava-1.1.3/src/test/resources/recordings/org_jitsi_dnssec_validator_TestValUtils #Date: 2015-01-06T22:35:20+01:00
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 6051
;; flags: qr aa rd ra cd ; qd: 1 an: 0 au: 4 ad: 1
;; QUESTIONS:
;; samekey.ingotronic.ch., type = MX, class = IN
;; ANSWERS:
;; AUTHORITY RECORDS:
samekey.ingotronic.ch. 300 IN SOA ns1.ingotronic.ch. admin.ingotronic.ch. 2013032788 300 60 864000 300
samekey.ingotronic.ch. 300 IN RRSIG SOA 5 3 300 20150205115016 20150106105016 17430 samekey.ingotronic.ch. QbR6Z1is3E2h59dciJcIMGEwjq6FT42BIWdZJx2yThVOEEkcqBRX3UrXsWeeByMoyj2zIvlje8zCTFIQWT5zG/4gvt6x1VAQjDL+SJ7ZzNMBUoX42ySyH1vCosPXCwUGpjp2ODNXMBVQ67+llUi+JC+jg6L3CLa3EP4K4fobRgA=
samekey.ingotronic.ch. 300 IN NSEC alias.samekey.ingotronic.ch. A NS SOA RRSIG NSEC DNSKEY
samekey.ingotronic.ch. 300 IN RRSIG NSEC 5 3 300 20150205112840 20150106102924 17430 samekey.ingotronic.ch. NSvTE2dxRxxbqpxBcLZw3UKLiK/GZhSnHIm8f7OV1oNepPdYEhKQ1h0ou/KCl4QlJ3pqJq/phwqpssclEcA3bebi5IBp7uDTU1s1lAvvBg0XtGd5Sody9LelOObAhNFAeBy8f7PyA3ORIstEBf2bJCJ5X/UmMcexq3G/RS+wMpc=
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 508 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 51124
;; flags: qr rd ra ad cd ; qd: 1 an: 4 au: 0 ad: 1
;; QUESTIONS:
;; ., type = DNSKEY, class = IN
;; ANSWERS:
. 87353 IN DNSKEY 257 3 8 AwEAAagAIKlVZrpC6Ia7gEzahOR+9W29euxhJhVVLOyQbSEW0O8gcCjFFVQUTf6v58fLjwBd0YI0EzrAcQqBGCzh/RStIoO8g0NfnfL2MTJRkxoXbfDaUeVPQuYEhg37NZWAJQ9VnMVDxP/VHL496M/QZxkjf5/Efucp2gaDX6RS6CXpoY68LsvPVjR0ZSwzz1apAzvN9dlzEheX7ICJBBtuA6G3LQpzW5hOA2hzCTMjJPJ8LbqF6dsV6DoBQzgul0sGIcGOYl7OyQdXfZ57relSQageu+ipAdTTJ25AsRTAoub8ONGcLmqrAmRLKBP1dfwhYB4N7knNnulqQxA+Uk1ihz0=
. 87353 IN DNSKEY 256 3 8 AwEAAaPD7Y7XIi1MOEREJNTrRhyqsY3gff6JWzg+XCbqut1sbcbvqyssHw8DT1AkRaAC92pO8xuyq5QEgEPL1IHfABLwpwXI5gTj4gdwi86bpkmlWs9fRpnn4DPDCTdrnxIejJXgClHikLJF3u3CdpNCMijq4CKdQbMlRZ3avv+G7rh7
. 87353 IN DNSKEY 256 3 8 AwEAAe3fSrbLBy3LOS7pnxEUhvPZTE2H5dIGsI/UfruI/nOEvWWa/PSX2BFedBkEqOlYdjdNF2f+6lmfk2Od/xu0v5bVqxFE+/24v3hZSlWBxvXzPTAGHrbW/IJYEPqlzVOAS4XdUgHg0N7IbLywNHMvB+Yf+Nm6ctyXXFLV4WTNnzs7
. 87353 IN RRSIG DNSKEY 8 0 172800 20150115235959 20150101000000 19036 . i8cAxD2pvQi1oAyvQxRpDfFlbqPzW+69QQEsDwE1eWOm5AtawO9U7lmsGps7sy/fVNvl1ljKBj4Djp9pb3U2FLogjiIlW0cDAkPmLlG9t+b/pjEfBNlhjANUVN06pvQVAfm+LcF26EaWT6FlISBqb6jSy4BHRa3Bdc4Sx7+pRSYSqVVvYxLkfAWsKPqGkvWhebJDndJJV9syXQXgZ+v/uJ+6XOS43xkAdeL8iBzIs/FlwMTfh3tVe3d0lb65IBBLlCzeQuetX+0Vu1YFcnD0mHc/wS2ZnAV5toAFmyVQBoY/XAZiZeaOkcROJ6Zmqezy7liwK7BqsYyAZntMhk8lbg==
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 883 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 35150
;; flags: qr rd ra ad cd ; qd: 1 an: 2 au: 0 ad: 1
;; QUESTIONS:
;; ch., type = DS, class = IN
;; ANSWERS:
ch. 953 IN DS 46375 8 2 8F96646FC68BB7E4AF4C0750A6096FBC0D4ECDA3D3FA6DA06FDDB42EE50C6CF3
ch. 953 IN RRSIG DS 8 1 86400 20150112170000 20150105160000 16665 . thY7xYWBBxiBjqbQIb9fAG4TmQgnziwM7q6P1T3/ITxmECdvOCQnnZA3uD7qmN8uM0HudsD7+y+zgD3rsH4RSTKdL4kHSI0OnCxToMTvklghEgFDezqIRm8NkWdI2H4Stwrj20nYKSpLQxPI2EE54gs18P3KyO8bAUYv8Qx73xU=
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 238 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 63134
;; flags: qr rd ra ad cd ; qd: 1 an: 4 au: 0 ad: 1
;; QUESTIONS:
;; ch., type = DNSKEY, class = IN
;; ANSWERS:
ch. 954 IN DNSKEY 256 3 8 AwEAAcsg0kY6fw1wzYMhSAKTy+Y2JzAst66P/1odp9NECJJHbU8f4nwziI3onoFSBV0ZiSZhY1aH5dhdDZ7BkrqhVXSrZPAz0CvzjIxmB1gSOf9DeZvjQvoy97HqYolxsf+B3QQv2RKBT67elF5+JisKg3/dQISelKn8LhabSoVrMlD1
ch. 954 IN DNSKEY 257 3 8 AwEAAb7GhhZ8IAy/AhwmSms5DeQK5ad09wIIplEpYoiAIYXPtJvT1ReFzyfTp/2YP+g/PWDwHPh4qKAHa9x0VgbIQcGAeNakmfkAdWEmCnca323/SAml3mwfaX62G7/uYWae5zh8QTxZKNd+K1yZ5x0IxnI31chSl5xymRbTEHYZDKwSIRFM3fTxUMt93WFaBVWELReYotJBr++rvAWdnlay5TPBTvheLBkaiqtgM4GP8HK07Y+86lsZnEsj5K3G1KTV5SPpa82rqYAwxG9VKbmSE/6/kBR5jJHjt1rRt5Oe7v18aEtw0YCEN4vxq+KuvMoNVqXUsE9LBwHJD+QNwi6wmB0=
ch. 954 IN DNSKEY 256 3 8 AwEAAcSLdT0fEmcFmLpeUkAJoeVaHKiu+nbuc43fWlqaCRVf8t2HA4uWxOk0O5ci9nrFTc8nq8oa5fk5Cj7CHh4yrX9qUCfTdIWTyp8BDEdJpS+Dyb0u9wQuVj+nQMj4fLzdQf4TJs3/qxuiLr3nL1UUwlhhXeqSqGVb7p3mtB5HJ8ad
ch. 954 IN RRSIG DNSKEY 8 1 86400 20150127100909 20141212090909 46375 ch. bT8q0FWyeMH0SulNo6UdIIgZYNATwYsee2bikq2Gh339Bufma8eaqWIPYT3XKmxYPBFOw0bVl+kLZxTwbR1CFoCDXoP+qgQhh4mf9qkNiv2CDSc+0FE3FRREn+DAhYTUEuB58FPiPakFB8s8O7T+k2qhDae7jy4/y7Jl1lnjaBY8s7bzOUPhF0KKCNZmvoKwtL23ZdVeTSV1xM3jkiNnpzBKbcoSWECSGJVp1SE0BnRXdwQP41YTXFZ0310YjaTAUCC5qbMIWdEkHjfdSQtKBImnc85mkapq9w++XQ4zhauPWBtrPV3CcoCahjUaWdjrKVkibomlJZaN8MEO23CfQw==
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 893 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 35961
;; flags: qr rd ra cd ; qd: 1 an: 3 au: 0 ad: 1
;; QUESTIONS:
;; ingotronic.ch., type = DS, class = IN
;; ANSWERS:
ingotronic.ch. 3562 IN DS 6031 5 2 4A948F2FDADA24686E473EDAC00DCF972584C75E3FAA92C2021B6221449FF87E
ingotronic.ch. 3562 IN DS 6031 5 1 733D0218B571CD617B1A7493564B9FC4F12ADE82
ingotronic.ch. 3562 IN RRSIG DS 8 2 3600 20150129033614 20150105123019 60789 ch. rVPJP2HhzW7OkroK2axFj5Lb4iVWCH8Fp/Iq1rF952NDo72b8RiKje2RaAKJAGQ+wd0YgE+PAej04GCmkhlDJA/zvPeeTxuhy3HbJzReMlQ7fjyH+wW1hli+FuIYvogXWf7nO/9VyPORt8X/f/pjrOr3Vlj9sGLN8TGYpEuVSw4=
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 288 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 40209
;; flags: qr aa rd ra cd ; qd: 1 an: 4 au: 0 ad: 1
;; QUESTIONS:
;; ingotronic.ch., type = DNSKEY, class = IN
;; ANSWERS:
ingotronic.ch. 300 IN DNSKEY 257 3 5 AwEAAeA1vzmjaB+eBAcvhzpKEgAEFpvQ1rg4uKDW6MsQtacKoqBpgyep2+LuWotz5p/xYxj3NGsArwN8Ad5cY0FHRr8miTT0elOv6nvlqGIfRuhj/BXAQ1x4ihpSFslHw0lJMYFwxsUZWpUyjWX/nv1xRZMMwF46gui0N4OEbyTYusCk77D+A71k+K0EAitFIbIH4GCUKmH1H7HmXhSVH9bN/n7KEGwW32lmsuuUcJoRKDkcUvbMXY/9Xoa2quERrUg/rBbDUHowRPjYDS5GzY1+f4YY8s40BufGiqyUTKKXL953MVFK8gmezXA0hbmrnZ7CBOw/7238mORAdzExaX8n7CE=
ingotronic.ch. 300 IN DNSKEY 256 3 5 AwEAAZ2Xh77GFzpEDx7EHYxShqltHgkiG+BOjBGifEmnJhQSdE5/yNSLFNcdhZZ8HUPxYnaedTqJcFFg4AzUsQklF/fECegTJdZjaj2WoL0/I8K7HMfY/hVuRZUWPNglYi8agJRX6gdkFTCpUNI7stpgKqxtzUJhhw15uG/lKMplwqUr
ingotronic.ch. 300 IN RRSIG DNSKEY 5 2 300 20150125003700 20141226001657 6031 ingotronic.ch. rs1QlP2SlSpA2ELbzwg3DgWLzXWL3Lpv6CUJE2Q0qH2Zp7Qdy3cD+ZEtNh9v24Qv1M6JJ3zFt8mmZoCeW2ycuMbJCqBkW9CBuwF+VznZvZY2MxwPipvhvEEGP//0M8YAZJ66yQPDv3PTdAP8FYbIrJyvY44vwyncwbslpfHT9jAsrbfr3vuMuWps86dnP462q+0s1TxBfqi8mzo3gdavjHKWVNwohLahLKT+tWeu6DSzQv0YwMjwtkLgF7QRgx3ctIIkloOrnx9nHH1N6y+hxEB89fOlyVDjHhgL5uVtsD5fEdT0FJ2Gc/2nShEMMqIwr1/J9kUq1mNySff/uEe65Q==
ingotronic.ch. 300 IN RRSIG DNSKEY 5 2 300 20150125003700 20141226001657 17430 ingotronic.ch. mEwZjhQqeWksWD0TCnNBrtce4YkWJL3edqL6PvAUu8Fn+Ih437kEs3+pqdkgRsdYQ9HW+lBm/8pWwJlNAv0bi9NykItXMwAUFtncgq+6Pnh3iAM972GXSa5VV4LcGQ5b8CBdHCHiEKDqyPv5Hr5QfYL/FQaWlcNRh4QZZlZNPFA=
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 940 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 57689
;; flags: qr aa rd ra cd ; qd: 1 an: 3 au: 0 ad: 1
;; QUESTIONS:
;; samekey.ingotronic.ch., type = DS, class = IN
;; ANSWERS:
samekey.ingotronic.ch. 300 IN DS 6031 5 2 DAFB8A4B65418C56F9BC6DE782EAE8C65F5F710A7AAA4E70A36E3E263028F01D
samekey.ingotronic.ch. 300 IN DS 6031 5 1 730C461CC98117784DC920C4FB19D284F22C1D64
samekey.ingotronic.ch. 300 IN RRSIG DS 5 3 300 20150125021136 20141226011244 17430 ingotronic.ch. ABaSrSVKd/CoCD9HiieVOpexP9iUHLXFtrAG+1Q7iju4potpve5C30V9+XJoVsLhArQ90QcDspN95U45Qks4+r8S2MezBDM7jV5B34VGkrWb8+AltxqFg4bIl2VhGiwInW6KKVO161ZS76x5x2ssWhJzY8G8uC0LIxe10N7AfDc=
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 307 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 57832
;; flags: qr aa rd ra cd ; qd: 1 an: 4 au: 0 ad: 1
;; QUESTIONS:
;; samekey.ingotronic.ch., type = DNSKEY, class = IN
;; ANSWERS:
samekey.ingotronic.ch. 300 IN DNSKEY 257 3 5 AwEAAeA1vzmjaB+eBAcvhzpKEgAEFpvQ1rg4uKDW6MsQtacKoqBpgyep2+LuWotz5p/xYxj3NGsArwN8Ad5cY0FHRr8miTT0elOv6nvlqGIfRuhj/BXAQ1x4ihpSFslHw0lJMYFwxsUZWpUyjWX/nv1xRZMMwF46gui0N4OEbyTYusCk77D+A71k+K0EAitFIbIH4GCUKmH1H7HmXhSVH9bN/n7KEGwW32lmsuuUcJoRKDkcUvbMXY/9Xoa2quERrUg/rBbDUHowRPjYDS5GzY1+f4YY8s40BufGiqyUTKKXL953MVFK8gmezXA0hbmrnZ7CBOw/7238mORAdzExaX8n7CE=
samekey.ingotronic.ch. 300 IN DNSKEY 256 3 5 AwEAAZ2Xh77GFzpEDx7EHYxShqltHgkiG+BOjBGifEmnJhQSdE5/yNSLFNcdhZZ8HUPxYnaedTqJcFFg4AzUsQklF/fECegTJdZjaj2WoL0/I8K7HMfY/hVuRZUWPNglYi8agJRX6gdkFTCpUNI7stpgKqxtzUJhhw15uG/lKMplwqUr
samekey.ingotronic.ch. 300 IN RRSIG DNSKEY 5 3 300 20150205095731 20150106090229 6031 samekey.ingotronic.ch. LuUccRlxgSN+RaFn1OXEFuDOelKnTj40UbXtTRU3DSvw5CSIsFYW5tz2qFMc9TKdyfXct4tCs1IbaxOxDn2S7gLGC0fSQJhR5QJBt//+d9/bPsrbzWdbX1VjGjK0Ei/BQYlybmda7mIhZgdT6PzXu00zR9wenJuUBETR7Iq0j2JSaFdD/NOxDKrMybH6sioa/D/iUV7tCCgNStppcpCE4QHK9ZZLtmwdPe0ai1zpFlJIAqclJeYANoQuul/MbR5QlPz64oVYq30kHK/OMd9sJTOtpcYqBCaknUygHuWOEzzVz8w1pd6XVFknzOiduFRO5eMJ0Epmme2QSOxNPbKSSg==
samekey.ingotronic.ch. 300 IN RRSIG DNSKEY 5 3 300 20150205095731 20150106090229 17430 samekey.ingotronic.ch. Nnz0tzShNXJ5ypcEiLZ4Ky/dY2JULHptYl6G2wWkjZ2R98N3wDJkXQQN2XolOGwBmNyfdMAcI8AVL9SD1oRUmWPnj4yFBu5uS4qR037DsJYEz6pq4t8U0P7O+8Pnkvq/tFMLXE9E17CoWfLRhrqTq7U5kYYn/x0yIXpY0S6M1bA=
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 964 bytes
###############################################
testNoDataWhenNsecHasCname 0000664 0000000 0000000 00000033401 13020541473 0036601 0 ustar 00root root 0000000 0000000 dnssecjava-1.1.3/src/test/resources/recordings/org_jitsi_dnssec_validator_TestValUtils #Date: 2015-01-06T22:35:23+01:00
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 50344
;; flags: qr aa rd ra cd ; qd: 1 an: 2 au: 2 ad: 3
;; QUESTIONS:
;; csigned.ingotronic.ch., type = NSEC, class = IN
;; ANSWERS:
csigned.ingotronic.ch. 300 IN NSEC cssub.ingotronic.ch. CNAME RRSIG NSEC
csigned.ingotronic.ch. 300 IN RRSIG NSEC 5 3 300 20150125000532 20141225234703 17430 ingotronic.ch. BCAjQxw7Hn8eMh8JNtWlHkprUpQPqCMa9Xca1SQTbgrkuKU6wPOd0tyvqZQZwXh90x54t/Z3OjFvT25Iqf3RSJ5T/1iJHUwdOlB5yHqc/c7E8yUs1cqSNf6ccXotsFJzXTLlpmrPzP7mjG5lpyGcN/hmXVWiMcq4SCeapRI19C4=
;; AUTHORITY RECORDS:
ingotronic.ch. 300 IN NS ns1.ingotronic.ch.
ingotronic.ch. 300 IN RRSIG NS 5 2 300 20150125000532 20141225234703 17430 ingotronic.ch. VuzVJM3McSHlcdngCG/G23zCikq8tXE0CZV2ZSgUFXXFMIEoM6PMi1QRQ/8VF3tee4WGpRx2jhtkui0wFRFfwIhW7G1uPDT4qogaR3KLIyuCEsMxhRH3WJZNrLmLqlSBGvd9OBJwbmryqm3Zzqvrk+E+rh8OJeifnBBpHAX4eHg=
;; ADDITIONAL RECORDS:
ns1.ingotronic.ch. 300 IN A 62.192.5.131
ns1.ingotronic.ch. 300 IN RRSIG A 5 3 300 20150125005754 20141226001054 17430 ingotronic.ch. fNG1RZM53pXwBxruHNaSZszxVzNLoCq8VZsTjAzYH2vSLzHXYVGJFTLIeY0K9APAdyJU8WuwmABmn7XY0Kg39kRG77uoFlqUws2PdTz2QKOwJGZY7W88Ak2Y9lkDBcK8o3wJHVptrT8R7p/1U7UfjF0kqPUkakk2B0EbFWdagFg=
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 644 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 38761
;; flags: qr rd ra ad cd ; qd: 1 an: 4 au: 0 ad: 1
;; QUESTIONS:
;; ., type = DNSKEY, class = IN
;; ANSWERS:
. 87350 IN DNSKEY 257 3 8 AwEAAagAIKlVZrpC6Ia7gEzahOR+9W29euxhJhVVLOyQbSEW0O8gcCjFFVQUTf6v58fLjwBd0YI0EzrAcQqBGCzh/RStIoO8g0NfnfL2MTJRkxoXbfDaUeVPQuYEhg37NZWAJQ9VnMVDxP/VHL496M/QZxkjf5/Efucp2gaDX6RS6CXpoY68LsvPVjR0ZSwzz1apAzvN9dlzEheX7ICJBBtuA6G3LQpzW5hOA2hzCTMjJPJ8LbqF6dsV6DoBQzgul0sGIcGOYl7OyQdXfZ57relSQageu+ipAdTTJ25AsRTAoub8ONGcLmqrAmRLKBP1dfwhYB4N7knNnulqQxA+Uk1ihz0=
. 87350 IN DNSKEY 256 3 8 AwEAAaPD7Y7XIi1MOEREJNTrRhyqsY3gff6JWzg+XCbqut1sbcbvqyssHw8DT1AkRaAC92pO8xuyq5QEgEPL1IHfABLwpwXI5gTj4gdwi86bpkmlWs9fRpnn4DPDCTdrnxIejJXgClHikLJF3u3CdpNCMijq4CKdQbMlRZ3avv+G7rh7
. 87350 IN DNSKEY 256 3 8 AwEAAe3fSrbLBy3LOS7pnxEUhvPZTE2H5dIGsI/UfruI/nOEvWWa/PSX2BFedBkEqOlYdjdNF2f+6lmfk2Od/xu0v5bVqxFE+/24v3hZSlWBxvXzPTAGHrbW/IJYEPqlzVOAS4XdUgHg0N7IbLywNHMvB+Yf+Nm6ctyXXFLV4WTNnzs7
. 87350 IN RRSIG DNSKEY 8 0 172800 20150115235959 20150101000000 19036 . i8cAxD2pvQi1oAyvQxRpDfFlbqPzW+69QQEsDwE1eWOm5AtawO9U7lmsGps7sy/fVNvl1ljKBj4Djp9pb3U2FLogjiIlW0cDAkPmLlG9t+b/pjEfBNlhjANUVN06pvQVAfm+LcF26EaWT6FlISBqb6jSy4BHRa3Bdc4Sx7+pRSYSqVVvYxLkfAWsKPqGkvWhebJDndJJV9syXQXgZ+v/uJ+6XOS43xkAdeL8iBzIs/FlwMTfh3tVe3d0lb65IBBLlCzeQuetX+0Vu1YFcnD0mHc/wS2ZnAV5toAFmyVQBoY/XAZiZeaOkcROJ6Zmqezy7liwK7BqsYyAZntMhk8lbg==
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 883 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 7194
;; flags: qr rd ra ad cd ; qd: 1 an: 2 au: 0 ad: 1
;; QUESTIONS:
;; ch., type = DS, class = IN
;; ANSWERS:
ch. 950 IN DS 46375 8 2 8F96646FC68BB7E4AF4C0750A6096FBC0D4ECDA3D3FA6DA06FDDB42EE50C6CF3
ch. 950 IN RRSIG DS 8 1 86400 20150112170000 20150105160000 16665 . thY7xYWBBxiBjqbQIb9fAG4TmQgnziwM7q6P1T3/ITxmECdvOCQnnZA3uD7qmN8uM0HudsD7+y+zgD3rsH4RSTKdL4kHSI0OnCxToMTvklghEgFDezqIRm8NkWdI2H4Stwrj20nYKSpLQxPI2EE54gs18P3KyO8bAUYv8Qx73xU=
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 238 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 39259
;; flags: qr rd ra ad cd ; qd: 1 an: 4 au: 0 ad: 1
;; QUESTIONS:
;; ch., type = DNSKEY, class = IN
;; ANSWERS:
ch. 951 IN DNSKEY 256 3 8 AwEAAcsg0kY6fw1wzYMhSAKTy+Y2JzAst66P/1odp9NECJJHbU8f4nwziI3onoFSBV0ZiSZhY1aH5dhdDZ7BkrqhVXSrZPAz0CvzjIxmB1gSOf9DeZvjQvoy97HqYolxsf+B3QQv2RKBT67elF5+JisKg3/dQISelKn8LhabSoVrMlD1
ch. 951 IN DNSKEY 257 3 8 AwEAAb7GhhZ8IAy/AhwmSms5DeQK5ad09wIIplEpYoiAIYXPtJvT1ReFzyfTp/2YP+g/PWDwHPh4qKAHa9x0VgbIQcGAeNakmfkAdWEmCnca323/SAml3mwfaX62G7/uYWae5zh8QTxZKNd+K1yZ5x0IxnI31chSl5xymRbTEHYZDKwSIRFM3fTxUMt93WFaBVWELReYotJBr++rvAWdnlay5TPBTvheLBkaiqtgM4GP8HK07Y+86lsZnEsj5K3G1KTV5SPpa82rqYAwxG9VKbmSE/6/kBR5jJHjt1rRt5Oe7v18aEtw0YCEN4vxq+KuvMoNVqXUsE9LBwHJD+QNwi6wmB0=
ch. 951 IN DNSKEY 256 3 8 AwEAAcSLdT0fEmcFmLpeUkAJoeVaHKiu+nbuc43fWlqaCRVf8t2HA4uWxOk0O5ci9nrFTc8nq8oa5fk5Cj7CHh4yrX9qUCfTdIWTyp8BDEdJpS+Dyb0u9wQuVj+nQMj4fLzdQf4TJs3/qxuiLr3nL1UUwlhhXeqSqGVb7p3mtB5HJ8ad
ch. 951 IN RRSIG DNSKEY 8 1 86400 20150127100909 20141212090909 46375 ch. bT8q0FWyeMH0SulNo6UdIIgZYNATwYsee2bikq2Gh339Bufma8eaqWIPYT3XKmxYPBFOw0bVl+kLZxTwbR1CFoCDXoP+qgQhh4mf9qkNiv2CDSc+0FE3FRREn+DAhYTUEuB58FPiPakFB8s8O7T+k2qhDae7jy4/y7Jl1lnjaBY8s7bzOUPhF0KKCNZmvoKwtL23ZdVeTSV1xM3jkiNnpzBKbcoSWECSGJVp1SE0BnRXdwQP41YTXFZ0310YjaTAUCC5qbMIWdEkHjfdSQtKBImnc85mkapq9w++XQ4zhauPWBtrPV3CcoCahjUaWdjrKVkibomlJZaN8MEO23CfQw==
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 893 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 29906
;; flags: qr rd ra cd ; qd: 1 an: 3 au: 0 ad: 1
;; QUESTIONS:
;; ingotronic.ch., type = DS, class = IN
;; ANSWERS:
ingotronic.ch. 3559 IN DS 6031 5 1 733D0218B571CD617B1A7493564B9FC4F12ADE82
ingotronic.ch. 3559 IN DS 6031 5 2 4A948F2FDADA24686E473EDAC00DCF972584C75E3FAA92C2021B6221449FF87E
ingotronic.ch. 3559 IN RRSIG DS 8 2 3600 20150129033614 20150105123019 60789 ch. rVPJP2HhzW7OkroK2axFj5Lb4iVWCH8Fp/Iq1rF952NDo72b8RiKje2RaAKJAGQ+wd0YgE+PAej04GCmkhlDJA/zvPeeTxuhy3HbJzReMlQ7fjyH+wW1hli+FuIYvogXWf7nO/9VyPORt8X/f/pjrOr3Vlj9sGLN8TGYpEuVSw4=
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 288 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 44555
;; flags: qr aa rd ra cd ; qd: 1 an: 4 au: 0 ad: 1
;; QUESTIONS:
;; ingotronic.ch., type = DNSKEY, class = IN
;; ANSWERS:
ingotronic.ch. 300 IN DNSKEY 257 3 5 AwEAAeA1vzmjaB+eBAcvhzpKEgAEFpvQ1rg4uKDW6MsQtacKoqBpgyep2+LuWotz5p/xYxj3NGsArwN8Ad5cY0FHRr8miTT0elOv6nvlqGIfRuhj/BXAQ1x4ihpSFslHw0lJMYFwxsUZWpUyjWX/nv1xRZMMwF46gui0N4OEbyTYusCk77D+A71k+K0EAitFIbIH4GCUKmH1H7HmXhSVH9bN/n7KEGwW32lmsuuUcJoRKDkcUvbMXY/9Xoa2quERrUg/rBbDUHowRPjYDS5GzY1+f4YY8s40BufGiqyUTKKXL953MVFK8gmezXA0hbmrnZ7CBOw/7238mORAdzExaX8n7CE=
ingotronic.ch. 300 IN DNSKEY 256 3 5 AwEAAZ2Xh77GFzpEDx7EHYxShqltHgkiG+BOjBGifEmnJhQSdE5/yNSLFNcdhZZ8HUPxYnaedTqJcFFg4AzUsQklF/fECegTJdZjaj2WoL0/I8K7HMfY/hVuRZUWPNglYi8agJRX6gdkFTCpUNI7stpgKqxtzUJhhw15uG/lKMplwqUr
ingotronic.ch. 300 IN RRSIG DNSKEY 5 2 300 20150125003700 20141226001657 6031 ingotronic.ch. rs1QlP2SlSpA2ELbzwg3DgWLzXWL3Lpv6CUJE2Q0qH2Zp7Qdy3cD+ZEtNh9v24Qv1M6JJ3zFt8mmZoCeW2ycuMbJCqBkW9CBuwF+VznZvZY2MxwPipvhvEEGP//0M8YAZJ66yQPDv3PTdAP8FYbIrJyvY44vwyncwbslpfHT9jAsrbfr3vuMuWps86dnP462q+0s1TxBfqi8mzo3gdavjHKWVNwohLahLKT+tWeu6DSzQv0YwMjwtkLgF7QRgx3ctIIkloOrnx9nHH1N6y+hxEB89fOlyVDjHhgL5uVtsD5fEdT0FJ2Gc/2nShEMMqIwr1/J9kUq1mNySff/uEe65Q==
ingotronic.ch. 300 IN RRSIG DNSKEY 5 2 300 20150125003700 20141226001657 17430 ingotronic.ch. mEwZjhQqeWksWD0TCnNBrtce4YkWJL3edqL6PvAUu8Fn+Ih437kEs3+pqdkgRsdYQ9HW+lBm/8pWwJlNAv0bi9NykItXMwAUFtncgq+6Pnh3iAM972GXSa5VV4LcGQ5b8CBdHCHiEKDqyPv5Hr5QfYL/FQaWlcNRh4QZZlZNPFA=
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 940 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 53393
;; flags: qr rd ra ad cd ; qd: 1 an: 4 au: 0 ad: 1
;; QUESTIONS:
;; ., type = DNSKEY, class = IN
;; ANSWERS:
. 87350 IN DNSKEY 256 3 8 AwEAAaPD7Y7XIi1MOEREJNTrRhyqsY3gff6JWzg+XCbqut1sbcbvqyssHw8DT1AkRaAC92pO8xuyq5QEgEPL1IHfABLwpwXI5gTj4gdwi86bpkmlWs9fRpnn4DPDCTdrnxIejJXgClHikLJF3u3CdpNCMijq4CKdQbMlRZ3avv+G7rh7
. 87350 IN DNSKEY 256 3 8 AwEAAe3fSrbLBy3LOS7pnxEUhvPZTE2H5dIGsI/UfruI/nOEvWWa/PSX2BFedBkEqOlYdjdNF2f+6lmfk2Od/xu0v5bVqxFE+/24v3hZSlWBxvXzPTAGHrbW/IJYEPqlzVOAS4XdUgHg0N7IbLywNHMvB+Yf+Nm6ctyXXFLV4WTNnzs7
. 87350 IN DNSKEY 257 3 8 AwEAAagAIKlVZrpC6Ia7gEzahOR+9W29euxhJhVVLOyQbSEW0O8gcCjFFVQUTf6v58fLjwBd0YI0EzrAcQqBGCzh/RStIoO8g0NfnfL2MTJRkxoXbfDaUeVPQuYEhg37NZWAJQ9VnMVDxP/VHL496M/QZxkjf5/Efucp2gaDX6RS6CXpoY68LsvPVjR0ZSwzz1apAzvN9dlzEheX7ICJBBtuA6G3LQpzW5hOA2hzCTMjJPJ8LbqF6dsV6DoBQzgul0sGIcGOYl7OyQdXfZ57relSQageu+ipAdTTJ25AsRTAoub8ONGcLmqrAmRLKBP1dfwhYB4N7knNnulqQxA+Uk1ihz0=
. 87350 IN RRSIG DNSKEY 8 0 172800 20150115235959 20150101000000 19036 . i8cAxD2pvQi1oAyvQxRpDfFlbqPzW+69QQEsDwE1eWOm5AtawO9U7lmsGps7sy/fVNvl1ljKBj4Djp9pb3U2FLogjiIlW0cDAkPmLlG9t+b/pjEfBNlhjANUVN06pvQVAfm+LcF26EaWT6FlISBqb6jSy4BHRa3Bdc4Sx7+pRSYSqVVvYxLkfAWsKPqGkvWhebJDndJJV9syXQXgZ+v/uJ+6XOS43xkAdeL8iBzIs/FlwMTfh3tVe3d0lb65IBBLlCzeQuetX+0Vu1YFcnD0mHc/wS2ZnAV5toAFmyVQBoY/XAZiZeaOkcROJ6Zmqezy7liwK7BqsYyAZntMhk8lbg==
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 883 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 59544
;; flags: qr rd ra ad cd ; qd: 1 an: 2 au: 0 ad: 1
;; QUESTIONS:
;; ch., type = DS, class = IN
;; ANSWERS:
ch. 950 IN DS 46375 8 2 8F96646FC68BB7E4AF4C0750A6096FBC0D4ECDA3D3FA6DA06FDDB42EE50C6CF3
ch. 950 IN RRSIG DS 8 1 86400 20150112170000 20150105160000 16665 . thY7xYWBBxiBjqbQIb9fAG4TmQgnziwM7q6P1T3/ITxmECdvOCQnnZA3uD7qmN8uM0HudsD7+y+zgD3rsH4RSTKdL4kHSI0OnCxToMTvklghEgFDezqIRm8NkWdI2H4Stwrj20nYKSpLQxPI2EE54gs18P3KyO8bAUYv8Qx73xU=
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 238 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 21621
;; flags: qr rd ra ad cd ; qd: 1 an: 4 au: 0 ad: 1
;; QUESTIONS:
;; ch., type = DNSKEY, class = IN
;; ANSWERS:
ch. 951 IN DNSKEY 257 3 8 AwEAAb7GhhZ8IAy/AhwmSms5DeQK5ad09wIIplEpYoiAIYXPtJvT1ReFzyfTp/2YP+g/PWDwHPh4qKAHa9x0VgbIQcGAeNakmfkAdWEmCnca323/SAml3mwfaX62G7/uYWae5zh8QTxZKNd+K1yZ5x0IxnI31chSl5xymRbTEHYZDKwSIRFM3fTxUMt93WFaBVWELReYotJBr++rvAWdnlay5TPBTvheLBkaiqtgM4GP8HK07Y+86lsZnEsj5K3G1KTV5SPpa82rqYAwxG9VKbmSE/6/kBR5jJHjt1rRt5Oe7v18aEtw0YCEN4vxq+KuvMoNVqXUsE9LBwHJD+QNwi6wmB0=
ch. 951 IN DNSKEY 256 3 8 AwEAAcSLdT0fEmcFmLpeUkAJoeVaHKiu+nbuc43fWlqaCRVf8t2HA4uWxOk0O5ci9nrFTc8nq8oa5fk5Cj7CHh4yrX9qUCfTdIWTyp8BDEdJpS+Dyb0u9wQuVj+nQMj4fLzdQf4TJs3/qxuiLr3nL1UUwlhhXeqSqGVb7p3mtB5HJ8ad
ch. 951 IN DNSKEY 256 3 8 AwEAAcsg0kY6fw1wzYMhSAKTy+Y2JzAst66P/1odp9NECJJHbU8f4nwziI3onoFSBV0ZiSZhY1aH5dhdDZ7BkrqhVXSrZPAz0CvzjIxmB1gSOf9DeZvjQvoy97HqYolxsf+B3QQv2RKBT67elF5+JisKg3/dQISelKn8LhabSoVrMlD1
ch. 951 IN RRSIG DNSKEY 8 1 86400 20150127100909 20141212090909 46375 ch. bT8q0FWyeMH0SulNo6UdIIgZYNATwYsee2bikq2Gh339Bufma8eaqWIPYT3XKmxYPBFOw0bVl+kLZxTwbR1CFoCDXoP+qgQhh4mf9qkNiv2CDSc+0FE3FRREn+DAhYTUEuB58FPiPakFB8s8O7T+k2qhDae7jy4/y7Jl1lnjaBY8s7bzOUPhF0KKCNZmvoKwtL23ZdVeTSV1xM3jkiNnpzBKbcoSWECSGJVp1SE0BnRXdwQP41YTXFZ0310YjaTAUCC5qbMIWdEkHjfdSQtKBImnc85mkapq9w++XQ4zhauPWBtrPV3CcoCahjUaWdjrKVkibomlJZaN8MEO23CfQw==
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 893 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 21667
;; flags: qr rd ra cd ; qd: 1 an: 3 au: 0 ad: 1
;; QUESTIONS:
;; ingotronic.ch., type = DS, class = IN
;; ANSWERS:
ingotronic.ch. 3559 IN DS 6031 5 2 4A948F2FDADA24686E473EDAC00DCF972584C75E3FAA92C2021B6221449FF87E
ingotronic.ch. 3559 IN DS 6031 5 1 733D0218B571CD617B1A7493564B9FC4F12ADE82
ingotronic.ch. 3559 IN RRSIG DS 8 2 3600 20150129033614 20150105123019 60789 ch. rVPJP2HhzW7OkroK2axFj5Lb4iVWCH8Fp/Iq1rF952NDo72b8RiKje2RaAKJAGQ+wd0YgE+PAej04GCmkhlDJA/zvPeeTxuhy3HbJzReMlQ7fjyH+wW1hli+FuIYvogXWf7nO/9VyPORt8X/f/pjrOr3Vlj9sGLN8TGYpEuVSw4=
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 288 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 13905
;; flags: qr aa rd ra cd ; qd: 1 an: 4 au: 0 ad: 1
;; QUESTIONS:
;; ingotronic.ch., type = DNSKEY, class = IN
;; ANSWERS:
ingotronic.ch. 300 IN DNSKEY 257 3 5 AwEAAeA1vzmjaB+eBAcvhzpKEgAEFpvQ1rg4uKDW6MsQtacKoqBpgyep2+LuWotz5p/xYxj3NGsArwN8Ad5cY0FHRr8miTT0elOv6nvlqGIfRuhj/BXAQ1x4ihpSFslHw0lJMYFwxsUZWpUyjWX/nv1xRZMMwF46gui0N4OEbyTYusCk77D+A71k+K0EAitFIbIH4GCUKmH1H7HmXhSVH9bN/n7KEGwW32lmsuuUcJoRKDkcUvbMXY/9Xoa2quERrUg/rBbDUHowRPjYDS5GzY1+f4YY8s40BufGiqyUTKKXL953MVFK8gmezXA0hbmrnZ7CBOw/7238mORAdzExaX8n7CE=
ingotronic.ch. 300 IN DNSKEY 256 3 5 AwEAAZ2Xh77GFzpEDx7EHYxShqltHgkiG+BOjBGifEmnJhQSdE5/yNSLFNcdhZZ8HUPxYnaedTqJcFFg4AzUsQklF/fECegTJdZjaj2WoL0/I8K7HMfY/hVuRZUWPNglYi8agJRX6gdkFTCpUNI7stpgKqxtzUJhhw15uG/lKMplwqUr
ingotronic.ch. 300 IN RRSIG DNSKEY 5 2 300 20150125003700 20141226001657 6031 ingotronic.ch. rs1QlP2SlSpA2ELbzwg3DgWLzXWL3Lpv6CUJE2Q0qH2Zp7Qdy3cD+ZEtNh9v24Qv1M6JJ3zFt8mmZoCeW2ycuMbJCqBkW9CBuwF+VznZvZY2MxwPipvhvEEGP//0M8YAZJ66yQPDv3PTdAP8FYbIrJyvY44vwyncwbslpfHT9jAsrbfr3vuMuWps86dnP462q+0s1TxBfqi8mzo3gdavjHKWVNwohLahLKT+tWeu6DSzQv0YwMjwtkLgF7QRgx3ctIIkloOrnx9nHH1N6y+hxEB89fOlyVDjHhgL5uVtsD5fEdT0FJ2Gc/2nShEMMqIwr1/J9kUq1mNySff/uEe65Q==
ingotronic.ch. 300 IN RRSIG DNSKEY 5 2 300 20150125003700 20141226001657 17430 ingotronic.ch. mEwZjhQqeWksWD0TCnNBrtce4YkWJL3edqL6PvAUu8Fn+Ih437kEs3+pqdkgRsdYQ9HW+lBm/8pWwJlNAv0bi9NykItXMwAUFtncgq+6Pnh3iAM972GXSa5VV4LcGQ5b8CBdHCHiEKDqyPv5Hr5QfYL/FQaWlcNRh4QZZlZNPFA=
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 940 bytes
###############################################
testNoDataWhenNsecProvesExistence 0000664 0000000 0000000 00000033361 13020541473 0040255 0 ustar 00root root 0000000 0000000 dnssecjava-1.1.3/src/test/resources/recordings/org_jitsi_dnssec_validator_TestValUtils #Date: 2015-01-06T22:35:25+01:00
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 41730
;; flags: qr aa rd ra cd ; qd: 1 an: 2 au: 2 ad: 3
;; QUESTIONS:
;; www.ingotronic.ch., type = NSEC, class = IN
;; ANSWERS:
www.ingotronic.ch. 300 IN NSEC z.ingotronic.ch. A AAAA RRSIG NSEC
www.ingotronic.ch. 300 IN RRSIG NSEC 5 3 300 20150125012443 20141226010256 17430 ingotronic.ch. fMbLmn92jrN7YeM4XWcq7/kKLiPB3Ll4yQSLiPRWQw79ZVeNJMkqEqdstEnnTyKu/hAId6YpvMKsJnIfCTVyoO75i6CaEKXOpvf9AT7TstEUj0YKjp4vWvcNs2F2144nrnqnaVFX8ZTxnUV50R+/AsqtKA+2/Tky6SlNhzeWVMI=
;; AUTHORITY RECORDS:
ingotronic.ch. 300 IN NS ns1.ingotronic.ch.
ingotronic.ch. 300 IN RRSIG NS 5 2 300 20150125000532 20141225234703 17430 ingotronic.ch. VuzVJM3McSHlcdngCG/G23zCikq8tXE0CZV2ZSgUFXXFMIEoM6PMi1QRQ/8VF3tee4WGpRx2jhtkui0wFRFfwIhW7G1uPDT4qogaR3KLIyuCEsMxhRH3WJZNrLmLqlSBGvd9OBJwbmryqm3Zzqvrk+E+rh8OJeifnBBpHAX4eHg=
;; ADDITIONAL RECORDS:
ns1.ingotronic.ch. 300 IN A 62.192.5.131
ns1.ingotronic.ch. 300 IN RRSIG A 5 3 300 20150125005754 20141226001054 17430 ingotronic.ch. fNG1RZM53pXwBxruHNaSZszxVzNLoCq8VZsTjAzYH2vSLzHXYVGJFTLIeY0K9APAdyJU8WuwmABmn7XY0Kg39kRG77uoFlqUws2PdTz2QKOwJGZY7W88Ak2Y9lkDBcK8o3wJHVptrT8R7p/1U7UfjF0kqPUkakk2B0EbFWdagFg=
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 636 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 8881
;; flags: qr rd ra ad cd ; qd: 1 an: 4 au: 0 ad: 1
;; QUESTIONS:
;; ., type = DNSKEY, class = IN
;; ANSWERS:
. 87348 IN DNSKEY 256 3 8 AwEAAe3fSrbLBy3LOS7pnxEUhvPZTE2H5dIGsI/UfruI/nOEvWWa/PSX2BFedBkEqOlYdjdNF2f+6lmfk2Od/xu0v5bVqxFE+/24v3hZSlWBxvXzPTAGHrbW/IJYEPqlzVOAS4XdUgHg0N7IbLywNHMvB+Yf+Nm6ctyXXFLV4WTNnzs7
. 87348 IN DNSKEY 257 3 8 AwEAAagAIKlVZrpC6Ia7gEzahOR+9W29euxhJhVVLOyQbSEW0O8gcCjFFVQUTf6v58fLjwBd0YI0EzrAcQqBGCzh/RStIoO8g0NfnfL2MTJRkxoXbfDaUeVPQuYEhg37NZWAJQ9VnMVDxP/VHL496M/QZxkjf5/Efucp2gaDX6RS6CXpoY68LsvPVjR0ZSwzz1apAzvN9dlzEheX7ICJBBtuA6G3LQpzW5hOA2hzCTMjJPJ8LbqF6dsV6DoBQzgul0sGIcGOYl7OyQdXfZ57relSQageu+ipAdTTJ25AsRTAoub8ONGcLmqrAmRLKBP1dfwhYB4N7knNnulqQxA+Uk1ihz0=
. 87348 IN DNSKEY 256 3 8 AwEAAaPD7Y7XIi1MOEREJNTrRhyqsY3gff6JWzg+XCbqut1sbcbvqyssHw8DT1AkRaAC92pO8xuyq5QEgEPL1IHfABLwpwXI5gTj4gdwi86bpkmlWs9fRpnn4DPDCTdrnxIejJXgClHikLJF3u3CdpNCMijq4CKdQbMlRZ3avv+G7rh7
. 87348 IN RRSIG DNSKEY 8 0 172800 20150115235959 20150101000000 19036 . i8cAxD2pvQi1oAyvQxRpDfFlbqPzW+69QQEsDwE1eWOm5AtawO9U7lmsGps7sy/fVNvl1ljKBj4Djp9pb3U2FLogjiIlW0cDAkPmLlG9t+b/pjEfBNlhjANUVN06pvQVAfm+LcF26EaWT6FlISBqb6jSy4BHRa3Bdc4Sx7+pRSYSqVVvYxLkfAWsKPqGkvWhebJDndJJV9syXQXgZ+v/uJ+6XOS43xkAdeL8iBzIs/FlwMTfh3tVe3d0lb65IBBLlCzeQuetX+0Vu1YFcnD0mHc/wS2ZnAV5toAFmyVQBoY/XAZiZeaOkcROJ6Zmqezy7liwK7BqsYyAZntMhk8lbg==
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 883 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 59326
;; flags: qr rd ra ad cd ; qd: 1 an: 2 au: 0 ad: 1
;; QUESTIONS:
;; ch., type = DS, class = IN
;; ANSWERS:
ch. 948 IN DS 46375 8 2 8F96646FC68BB7E4AF4C0750A6096FBC0D4ECDA3D3FA6DA06FDDB42EE50C6CF3
ch. 948 IN RRSIG DS 8 1 86400 20150112170000 20150105160000 16665 . thY7xYWBBxiBjqbQIb9fAG4TmQgnziwM7q6P1T3/ITxmECdvOCQnnZA3uD7qmN8uM0HudsD7+y+zgD3rsH4RSTKdL4kHSI0OnCxToMTvklghEgFDezqIRm8NkWdI2H4Stwrj20nYKSpLQxPI2EE54gs18P3KyO8bAUYv8Qx73xU=
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 238 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 48712
;; flags: qr rd ra ad cd ; qd: 1 an: 4 au: 0 ad: 1
;; QUESTIONS:
;; ch., type = DNSKEY, class = IN
;; ANSWERS:
ch. 949 IN DNSKEY 257 3 8 AwEAAb7GhhZ8IAy/AhwmSms5DeQK5ad09wIIplEpYoiAIYXPtJvT1ReFzyfTp/2YP+g/PWDwHPh4qKAHa9x0VgbIQcGAeNakmfkAdWEmCnca323/SAml3mwfaX62G7/uYWae5zh8QTxZKNd+K1yZ5x0IxnI31chSl5xymRbTEHYZDKwSIRFM3fTxUMt93WFaBVWELReYotJBr++rvAWdnlay5TPBTvheLBkaiqtgM4GP8HK07Y+86lsZnEsj5K3G1KTV5SPpa82rqYAwxG9VKbmSE/6/kBR5jJHjt1rRt5Oe7v18aEtw0YCEN4vxq+KuvMoNVqXUsE9LBwHJD+QNwi6wmB0=
ch. 949 IN DNSKEY 256 3 8 AwEAAcSLdT0fEmcFmLpeUkAJoeVaHKiu+nbuc43fWlqaCRVf8t2HA4uWxOk0O5ci9nrFTc8nq8oa5fk5Cj7CHh4yrX9qUCfTdIWTyp8BDEdJpS+Dyb0u9wQuVj+nQMj4fLzdQf4TJs3/qxuiLr3nL1UUwlhhXeqSqGVb7p3mtB5HJ8ad
ch. 949 IN DNSKEY 256 3 8 AwEAAcsg0kY6fw1wzYMhSAKTy+Y2JzAst66P/1odp9NECJJHbU8f4nwziI3onoFSBV0ZiSZhY1aH5dhdDZ7BkrqhVXSrZPAz0CvzjIxmB1gSOf9DeZvjQvoy97HqYolxsf+B3QQv2RKBT67elF5+JisKg3/dQISelKn8LhabSoVrMlD1
ch. 949 IN RRSIG DNSKEY 8 1 86400 20150127100909 20141212090909 46375 ch. bT8q0FWyeMH0SulNo6UdIIgZYNATwYsee2bikq2Gh339Bufma8eaqWIPYT3XKmxYPBFOw0bVl+kLZxTwbR1CFoCDXoP+qgQhh4mf9qkNiv2CDSc+0FE3FRREn+DAhYTUEuB58FPiPakFB8s8O7T+k2qhDae7jy4/y7Jl1lnjaBY8s7bzOUPhF0KKCNZmvoKwtL23ZdVeTSV1xM3jkiNnpzBKbcoSWECSGJVp1SE0BnRXdwQP41YTXFZ0310YjaTAUCC5qbMIWdEkHjfdSQtKBImnc85mkapq9w++XQ4zhauPWBtrPV3CcoCahjUaWdjrKVkibomlJZaN8MEO23CfQw==
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 893 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 54200
;; flags: qr rd ra cd ; qd: 1 an: 3 au: 0 ad: 1
;; QUESTIONS:
;; ingotronic.ch., type = DS, class = IN
;; ANSWERS:
ingotronic.ch. 3557 IN DS 6031 5 1 733D0218B571CD617B1A7493564B9FC4F12ADE82
ingotronic.ch. 3557 IN DS 6031 5 2 4A948F2FDADA24686E473EDAC00DCF972584C75E3FAA92C2021B6221449FF87E
ingotronic.ch. 3557 IN RRSIG DS 8 2 3600 20150129033614 20150105123019 60789 ch. rVPJP2HhzW7OkroK2axFj5Lb4iVWCH8Fp/Iq1rF952NDo72b8RiKje2RaAKJAGQ+wd0YgE+PAej04GCmkhlDJA/zvPeeTxuhy3HbJzReMlQ7fjyH+wW1hli+FuIYvogXWf7nO/9VyPORt8X/f/pjrOr3Vlj9sGLN8TGYpEuVSw4=
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 288 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 27755
;; flags: qr aa rd ra cd ; qd: 1 an: 4 au: 0 ad: 1
;; QUESTIONS:
;; ingotronic.ch., type = DNSKEY, class = IN
;; ANSWERS:
ingotronic.ch. 300 IN DNSKEY 257 3 5 AwEAAeA1vzmjaB+eBAcvhzpKEgAEFpvQ1rg4uKDW6MsQtacKoqBpgyep2+LuWotz5p/xYxj3NGsArwN8Ad5cY0FHRr8miTT0elOv6nvlqGIfRuhj/BXAQ1x4ihpSFslHw0lJMYFwxsUZWpUyjWX/nv1xRZMMwF46gui0N4OEbyTYusCk77D+A71k+K0EAitFIbIH4GCUKmH1H7HmXhSVH9bN/n7KEGwW32lmsuuUcJoRKDkcUvbMXY/9Xoa2quERrUg/rBbDUHowRPjYDS5GzY1+f4YY8s40BufGiqyUTKKXL953MVFK8gmezXA0hbmrnZ7CBOw/7238mORAdzExaX8n7CE=
ingotronic.ch. 300 IN DNSKEY 256 3 5 AwEAAZ2Xh77GFzpEDx7EHYxShqltHgkiG+BOjBGifEmnJhQSdE5/yNSLFNcdhZZ8HUPxYnaedTqJcFFg4AzUsQklF/fECegTJdZjaj2WoL0/I8K7HMfY/hVuRZUWPNglYi8agJRX6gdkFTCpUNI7stpgKqxtzUJhhw15uG/lKMplwqUr
ingotronic.ch. 300 IN RRSIG DNSKEY 5 2 300 20150125003700 20141226001657 6031 ingotronic.ch. rs1QlP2SlSpA2ELbzwg3DgWLzXWL3Lpv6CUJE2Q0qH2Zp7Qdy3cD+ZEtNh9v24Qv1M6JJ3zFt8mmZoCeW2ycuMbJCqBkW9CBuwF+VznZvZY2MxwPipvhvEEGP//0M8YAZJ66yQPDv3PTdAP8FYbIrJyvY44vwyncwbslpfHT9jAsrbfr3vuMuWps86dnP462q+0s1TxBfqi8mzo3gdavjHKWVNwohLahLKT+tWeu6DSzQv0YwMjwtkLgF7QRgx3ctIIkloOrnx9nHH1N6y+hxEB89fOlyVDjHhgL5uVtsD5fEdT0FJ2Gc/2nShEMMqIwr1/J9kUq1mNySff/uEe65Q==
ingotronic.ch. 300 IN RRSIG DNSKEY 5 2 300 20150125003700 20141226001657 17430 ingotronic.ch. mEwZjhQqeWksWD0TCnNBrtce4YkWJL3edqL6PvAUu8Fn+Ih437kEs3+pqdkgRsdYQ9HW+lBm/8pWwJlNAv0bi9NykItXMwAUFtncgq+6Pnh3iAM972GXSa5VV4LcGQ5b8CBdHCHiEKDqyPv5Hr5QfYL/FQaWlcNRh4QZZlZNPFA=
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 940 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 48898
;; flags: qr rd ra ad cd ; qd: 1 an: 4 au: 0 ad: 1
;; QUESTIONS:
;; ., type = DNSKEY, class = IN
;; ANSWERS:
. 87348 IN DNSKEY 256 3 8 AwEAAaPD7Y7XIi1MOEREJNTrRhyqsY3gff6JWzg+XCbqut1sbcbvqyssHw8DT1AkRaAC92pO8xuyq5QEgEPL1IHfABLwpwXI5gTj4gdwi86bpkmlWs9fRpnn4DPDCTdrnxIejJXgClHikLJF3u3CdpNCMijq4CKdQbMlRZ3avv+G7rh7
. 87348 IN DNSKEY 257 3 8 AwEAAagAIKlVZrpC6Ia7gEzahOR+9W29euxhJhVVLOyQbSEW0O8gcCjFFVQUTf6v58fLjwBd0YI0EzrAcQqBGCzh/RStIoO8g0NfnfL2MTJRkxoXbfDaUeVPQuYEhg37NZWAJQ9VnMVDxP/VHL496M/QZxkjf5/Efucp2gaDX6RS6CXpoY68LsvPVjR0ZSwzz1apAzvN9dlzEheX7ICJBBtuA6G3LQpzW5hOA2hzCTMjJPJ8LbqF6dsV6DoBQzgul0sGIcGOYl7OyQdXfZ57relSQageu+ipAdTTJ25AsRTAoub8ONGcLmqrAmRLKBP1dfwhYB4N7knNnulqQxA+Uk1ihz0=
. 87348 IN DNSKEY 256 3 8 AwEAAe3fSrbLBy3LOS7pnxEUhvPZTE2H5dIGsI/UfruI/nOEvWWa/PSX2BFedBkEqOlYdjdNF2f+6lmfk2Od/xu0v5bVqxFE+/24v3hZSlWBxvXzPTAGHrbW/IJYEPqlzVOAS4XdUgHg0N7IbLywNHMvB+Yf+Nm6ctyXXFLV4WTNnzs7
. 87348 IN RRSIG DNSKEY 8 0 172800 20150115235959 20150101000000 19036 . i8cAxD2pvQi1oAyvQxRpDfFlbqPzW+69QQEsDwE1eWOm5AtawO9U7lmsGps7sy/fVNvl1ljKBj4Djp9pb3U2FLogjiIlW0cDAkPmLlG9t+b/pjEfBNlhjANUVN06pvQVAfm+LcF26EaWT6FlISBqb6jSy4BHRa3Bdc4Sx7+pRSYSqVVvYxLkfAWsKPqGkvWhebJDndJJV9syXQXgZ+v/uJ+6XOS43xkAdeL8iBzIs/FlwMTfh3tVe3d0lb65IBBLlCzeQuetX+0Vu1YFcnD0mHc/wS2ZnAV5toAFmyVQBoY/XAZiZeaOkcROJ6Zmqezy7liwK7BqsYyAZntMhk8lbg==
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 883 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 10818
;; flags: qr rd ra ad cd ; qd: 1 an: 2 au: 0 ad: 1
;; QUESTIONS:
;; ch., type = DS, class = IN
;; ANSWERS:
ch. 948 IN DS 46375 8 2 8F96646FC68BB7E4AF4C0750A6096FBC0D4ECDA3D3FA6DA06FDDB42EE50C6CF3
ch. 948 IN RRSIG DS 8 1 86400 20150112170000 20150105160000 16665 . thY7xYWBBxiBjqbQIb9fAG4TmQgnziwM7q6P1T3/ITxmECdvOCQnnZA3uD7qmN8uM0HudsD7+y+zgD3rsH4RSTKdL4kHSI0OnCxToMTvklghEgFDezqIRm8NkWdI2H4Stwrj20nYKSpLQxPI2EE54gs18P3KyO8bAUYv8Qx73xU=
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 238 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 44946
;; flags: qr rd ra ad cd ; qd: 1 an: 4 au: 0 ad: 1
;; QUESTIONS:
;; ch., type = DNSKEY, class = IN
;; ANSWERS:
ch. 949 IN DNSKEY 257 3 8 AwEAAb7GhhZ8IAy/AhwmSms5DeQK5ad09wIIplEpYoiAIYXPtJvT1ReFzyfTp/2YP+g/PWDwHPh4qKAHa9x0VgbIQcGAeNakmfkAdWEmCnca323/SAml3mwfaX62G7/uYWae5zh8QTxZKNd+K1yZ5x0IxnI31chSl5xymRbTEHYZDKwSIRFM3fTxUMt93WFaBVWELReYotJBr++rvAWdnlay5TPBTvheLBkaiqtgM4GP8HK07Y+86lsZnEsj5K3G1KTV5SPpa82rqYAwxG9VKbmSE/6/kBR5jJHjt1rRt5Oe7v18aEtw0YCEN4vxq+KuvMoNVqXUsE9LBwHJD+QNwi6wmB0=
ch. 949 IN DNSKEY 256 3 8 AwEAAcsg0kY6fw1wzYMhSAKTy+Y2JzAst66P/1odp9NECJJHbU8f4nwziI3onoFSBV0ZiSZhY1aH5dhdDZ7BkrqhVXSrZPAz0CvzjIxmB1gSOf9DeZvjQvoy97HqYolxsf+B3QQv2RKBT67elF5+JisKg3/dQISelKn8LhabSoVrMlD1
ch. 949 IN DNSKEY 256 3 8 AwEAAcSLdT0fEmcFmLpeUkAJoeVaHKiu+nbuc43fWlqaCRVf8t2HA4uWxOk0O5ci9nrFTc8nq8oa5fk5Cj7CHh4yrX9qUCfTdIWTyp8BDEdJpS+Dyb0u9wQuVj+nQMj4fLzdQf4TJs3/qxuiLr3nL1UUwlhhXeqSqGVb7p3mtB5HJ8ad
ch. 949 IN RRSIG DNSKEY 8 1 86400 20150127100909 20141212090909 46375 ch. bT8q0FWyeMH0SulNo6UdIIgZYNATwYsee2bikq2Gh339Bufma8eaqWIPYT3XKmxYPBFOw0bVl+kLZxTwbR1CFoCDXoP+qgQhh4mf9qkNiv2CDSc+0FE3FRREn+DAhYTUEuB58FPiPakFB8s8O7T+k2qhDae7jy4/y7Jl1lnjaBY8s7bzOUPhF0KKCNZmvoKwtL23ZdVeTSV1xM3jkiNnpzBKbcoSWECSGJVp1SE0BnRXdwQP41YTXFZ0310YjaTAUCC5qbMIWdEkHjfdSQtKBImnc85mkapq9w++XQ4zhauPWBtrPV3CcoCahjUaWdjrKVkibomlJZaN8MEO23CfQw==
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 893 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 50782
;; flags: qr rd ra cd ; qd: 1 an: 3 au: 0 ad: 1
;; QUESTIONS:
;; ingotronic.ch., type = DS, class = IN
;; ANSWERS:
ingotronic.ch. 3557 IN DS 6031 5 1 733D0218B571CD617B1A7493564B9FC4F12ADE82
ingotronic.ch. 3557 IN DS 6031 5 2 4A948F2FDADA24686E473EDAC00DCF972584C75E3FAA92C2021B6221449FF87E
ingotronic.ch. 3557 IN RRSIG DS 8 2 3600 20150129033614 20150105123019 60789 ch. rVPJP2HhzW7OkroK2axFj5Lb4iVWCH8Fp/Iq1rF952NDo72b8RiKje2RaAKJAGQ+wd0YgE+PAej04GCmkhlDJA/zvPeeTxuhy3HbJzReMlQ7fjyH+wW1hli+FuIYvogXWf7nO/9VyPORt8X/f/pjrOr3Vlj9sGLN8TGYpEuVSw4=
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 288 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 8263
;; flags: qr aa rd ra cd ; qd: 1 an: 4 au: 0 ad: 1
;; QUESTIONS:
;; ingotronic.ch., type = DNSKEY, class = IN
;; ANSWERS:
ingotronic.ch. 300 IN DNSKEY 257 3 5 AwEAAeA1vzmjaB+eBAcvhzpKEgAEFpvQ1rg4uKDW6MsQtacKoqBpgyep2+LuWotz5p/xYxj3NGsArwN8Ad5cY0FHRr8miTT0elOv6nvlqGIfRuhj/BXAQ1x4ihpSFslHw0lJMYFwxsUZWpUyjWX/nv1xRZMMwF46gui0N4OEbyTYusCk77D+A71k+K0EAitFIbIH4GCUKmH1H7HmXhSVH9bN/n7KEGwW32lmsuuUcJoRKDkcUvbMXY/9Xoa2quERrUg/rBbDUHowRPjYDS5GzY1+f4YY8s40BufGiqyUTKKXL953MVFK8gmezXA0hbmrnZ7CBOw/7238mORAdzExaX8n7CE=
ingotronic.ch. 300 IN DNSKEY 256 3 5 AwEAAZ2Xh77GFzpEDx7EHYxShqltHgkiG+BOjBGifEmnJhQSdE5/yNSLFNcdhZZ8HUPxYnaedTqJcFFg4AzUsQklF/fECegTJdZjaj2WoL0/I8K7HMfY/hVuRZUWPNglYi8agJRX6gdkFTCpUNI7stpgKqxtzUJhhw15uG/lKMplwqUr
ingotronic.ch. 300 IN RRSIG DNSKEY 5 2 300 20150125003700 20141226001657 6031 ingotronic.ch. rs1QlP2SlSpA2ELbzwg3DgWLzXWL3Lpv6CUJE2Q0qH2Zp7Qdy3cD+ZEtNh9v24Qv1M6JJ3zFt8mmZoCeW2ycuMbJCqBkW9CBuwF+VznZvZY2MxwPipvhvEEGP//0M8YAZJ66yQPDv3PTdAP8FYbIrJyvY44vwyncwbslpfHT9jAsrbfr3vuMuWps86dnP462q+0s1TxBfqi8mzo3gdavjHKWVNwohLahLKT+tWeu6DSzQv0YwMjwtkLgF7QRgx3ctIIkloOrnx9nHH1N6y+hxEB89fOlyVDjHhgL5uVtsD5fEdT0FJ2Gc/2nShEMMqIwr1/J9kUq1mNySff/uEe65Q==
ingotronic.ch. 300 IN RRSIG DNSKEY 5 2 300 20150125003700 20141226001657 17430 ingotronic.ch. mEwZjhQqeWksWD0TCnNBrtce4YkWJL3edqL6PvAUu8Fn+Ih437kEs3+pqdkgRsdYQ9HW+lBm/8pWwJlNAv0bi9NykItXMwAUFtncgq+6Pnh3iAM972GXSa5VV4LcGQ5b8CBdHCHiEKDqyPv5Hr5QfYL/FQaWlcNRh4QZZlZNPFA=
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 940 bytes
###############################################
testNoDataWhenResultIsFromDelegationPoint 0000664 0000000 0000000 00000057136 13020541473 0041730 0 ustar 00root root 0000000 0000000 dnssecjava-1.1.3/src/test/resources/recordings/org_jitsi_dnssec_validator_TestValUtils #Date: 2015-01-06T22:35:22+01:00
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 57267
;; flags: qr aa rd ra cd ; qd: 1 an: 0 au: 6 ad: 1
;; QUESTIONS:
;; t.ingotronic.ch., type = A, class = IN
;; ANSWERS:
;; AUTHORITY RECORDS:
ingotronic.ch. 300 IN SOA ns1.ingotronic.ch. admin.ingotronic.ch. 2013032762 300 60 864000 300
ingotronic.ch. 300 IN RRSIG SOA 5 2 300 20150125021244 20141226011244 17430 ingotronic.ch. WDLpp9G0P/rlMBfpFn9sAfpEFoBnQfwyGSXbGCc/LG1FSkJoKLDQYDY696scLNsJgkrzZeJrl0oSSvA8AvRUhYRrmuqWMxTVFgYlRwPwqEMCKUqiVhKGVF4NYemoBiUQC4nJwBZd57xKCiF4AQ4CodBtiZxefJFAlTNE0g2yxtM=
ingotronic.ch. 300 IN NSEC alias.ingotronic.ch. A NS SOA RRSIG NSEC DNSKEY
ingotronic.ch. 300 IN RRSIG NSEC 5 2 300 20150125000532 20141225234703 17430 ingotronic.ch. en5BaZ6zWqEvoUFUDPm5g1pjz7THXBv/1kjKtV2tS+7xh0BtkLEzlA9n/H66ZZAX2EIh7vXj12xVJKOuEuM0o1mJwKsBaLQuTra60/zYAUIddwUOCzI3zzjiRFklPyHSnLkGoBODZcvehnsTzTPyBxkfoouleqpj7gN5jOSBL8M=
sub.ingotronic.ch. 300 IN NSEC unknown-alg.ingotronic.ch. NS DS RRSIG NSEC
sub.ingotronic.ch. 300 IN RRSIG NSEC 5 3 300 20150125004144 20141226003211 17430 ingotronic.ch. bNZQZZypKi/2MlAYJ6h0W69GSCLxnkvq4cXdR5oBfvcGlvP5AMnuqqY0HwjByPHqg8TMn/lrlpoXPODAjeAadRD73F3GD1YgyWDr1eCeSGCIHisadDYpzdeqgQNHxYbz2UMtB5d/6Q/C4yyzWuxk3Rpwg+bV77yYlOjDxgVYMhg=
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 702 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 8953
;; flags: qr rd ra ad cd ; qd: 1 an: 4 au: 0 ad: 1
;; QUESTIONS:
;; ., type = DNSKEY, class = IN
;; ANSWERS:
. 87351 IN DNSKEY 256 3 8 AwEAAaPD7Y7XIi1MOEREJNTrRhyqsY3gff6JWzg+XCbqut1sbcbvqyssHw8DT1AkRaAC92pO8xuyq5QEgEPL1IHfABLwpwXI5gTj4gdwi86bpkmlWs9fRpnn4DPDCTdrnxIejJXgClHikLJF3u3CdpNCMijq4CKdQbMlRZ3avv+G7rh7
. 87351 IN DNSKEY 256 3 8 AwEAAe3fSrbLBy3LOS7pnxEUhvPZTE2H5dIGsI/UfruI/nOEvWWa/PSX2BFedBkEqOlYdjdNF2f+6lmfk2Od/xu0v5bVqxFE+/24v3hZSlWBxvXzPTAGHrbW/IJYEPqlzVOAS4XdUgHg0N7IbLywNHMvB+Yf+Nm6ctyXXFLV4WTNnzs7
. 87351 IN DNSKEY 257 3 8 AwEAAagAIKlVZrpC6Ia7gEzahOR+9W29euxhJhVVLOyQbSEW0O8gcCjFFVQUTf6v58fLjwBd0YI0EzrAcQqBGCzh/RStIoO8g0NfnfL2MTJRkxoXbfDaUeVPQuYEhg37NZWAJQ9VnMVDxP/VHL496M/QZxkjf5/Efucp2gaDX6RS6CXpoY68LsvPVjR0ZSwzz1apAzvN9dlzEheX7ICJBBtuA6G3LQpzW5hOA2hzCTMjJPJ8LbqF6dsV6DoBQzgul0sGIcGOYl7OyQdXfZ57relSQageu+ipAdTTJ25AsRTAoub8ONGcLmqrAmRLKBP1dfwhYB4N7knNnulqQxA+Uk1ihz0=
. 87351 IN RRSIG DNSKEY 8 0 172800 20150115235959 20150101000000 19036 . i8cAxD2pvQi1oAyvQxRpDfFlbqPzW+69QQEsDwE1eWOm5AtawO9U7lmsGps7sy/fVNvl1ljKBj4Djp9pb3U2FLogjiIlW0cDAkPmLlG9t+b/pjEfBNlhjANUVN06pvQVAfm+LcF26EaWT6FlISBqb6jSy4BHRa3Bdc4Sx7+pRSYSqVVvYxLkfAWsKPqGkvWhebJDndJJV9syXQXgZ+v/uJ+6XOS43xkAdeL8iBzIs/FlwMTfh3tVe3d0lb65IBBLlCzeQuetX+0Vu1YFcnD0mHc/wS2ZnAV5toAFmyVQBoY/XAZiZeaOkcROJ6Zmqezy7liwK7BqsYyAZntMhk8lbg==
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 883 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 17144
;; flags: qr rd ra ad cd ; qd: 1 an: 2 au: 0 ad: 1
;; QUESTIONS:
;; ch., type = DS, class = IN
;; ANSWERS:
ch. 951 IN DS 46375 8 2 8F96646FC68BB7E4AF4C0750A6096FBC0D4ECDA3D3FA6DA06FDDB42EE50C6CF3
ch. 951 IN RRSIG DS 8 1 86400 20150112170000 20150105160000 16665 . thY7xYWBBxiBjqbQIb9fAG4TmQgnziwM7q6P1T3/ITxmECdvOCQnnZA3uD7qmN8uM0HudsD7+y+zgD3rsH4RSTKdL4kHSI0OnCxToMTvklghEgFDezqIRm8NkWdI2H4Stwrj20nYKSpLQxPI2EE54gs18P3KyO8bAUYv8Qx73xU=
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 238 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 3356
;; flags: qr rd ra ad cd ; qd: 1 an: 4 au: 0 ad: 1
;; QUESTIONS:
;; ch., type = DNSKEY, class = IN
;; ANSWERS:
ch. 952 IN DNSKEY 256 3 8 AwEAAcsg0kY6fw1wzYMhSAKTy+Y2JzAst66P/1odp9NECJJHbU8f4nwziI3onoFSBV0ZiSZhY1aH5dhdDZ7BkrqhVXSrZPAz0CvzjIxmB1gSOf9DeZvjQvoy97HqYolxsf+B3QQv2RKBT67elF5+JisKg3/dQISelKn8LhabSoVrMlD1
ch. 952 IN DNSKEY 257 3 8 AwEAAb7GhhZ8IAy/AhwmSms5DeQK5ad09wIIplEpYoiAIYXPtJvT1ReFzyfTp/2YP+g/PWDwHPh4qKAHa9x0VgbIQcGAeNakmfkAdWEmCnca323/SAml3mwfaX62G7/uYWae5zh8QTxZKNd+K1yZ5x0IxnI31chSl5xymRbTEHYZDKwSIRFM3fTxUMt93WFaBVWELReYotJBr++rvAWdnlay5TPBTvheLBkaiqtgM4GP8HK07Y+86lsZnEsj5K3G1KTV5SPpa82rqYAwxG9VKbmSE/6/kBR5jJHjt1rRt5Oe7v18aEtw0YCEN4vxq+KuvMoNVqXUsE9LBwHJD+QNwi6wmB0=
ch. 952 IN DNSKEY 256 3 8 AwEAAcSLdT0fEmcFmLpeUkAJoeVaHKiu+nbuc43fWlqaCRVf8t2HA4uWxOk0O5ci9nrFTc8nq8oa5fk5Cj7CHh4yrX9qUCfTdIWTyp8BDEdJpS+Dyb0u9wQuVj+nQMj4fLzdQf4TJs3/qxuiLr3nL1UUwlhhXeqSqGVb7p3mtB5HJ8ad
ch. 952 IN RRSIG DNSKEY 8 1 86400 20150127100909 20141212090909 46375 ch. bT8q0FWyeMH0SulNo6UdIIgZYNATwYsee2bikq2Gh339Bufma8eaqWIPYT3XKmxYPBFOw0bVl+kLZxTwbR1CFoCDXoP+qgQhh4mf9qkNiv2CDSc+0FE3FRREn+DAhYTUEuB58FPiPakFB8s8O7T+k2qhDae7jy4/y7Jl1lnjaBY8s7bzOUPhF0KKCNZmvoKwtL23ZdVeTSV1xM3jkiNnpzBKbcoSWECSGJVp1SE0BnRXdwQP41YTXFZ0310YjaTAUCC5qbMIWdEkHjfdSQtKBImnc85mkapq9w++XQ4zhauPWBtrPV3CcoCahjUaWdjrKVkibomlJZaN8MEO23CfQw==
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 893 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 62665
;; flags: qr rd ra cd ; qd: 1 an: 3 au: 0 ad: 1
;; QUESTIONS:
;; ingotronic.ch., type = DS, class = IN
;; ANSWERS:
ingotronic.ch. 3560 IN DS 6031 5 2 4A948F2FDADA24686E473EDAC00DCF972584C75E3FAA92C2021B6221449FF87E
ingotronic.ch. 3560 IN DS 6031 5 1 733D0218B571CD617B1A7493564B9FC4F12ADE82
ingotronic.ch. 3560 IN RRSIG DS 8 2 3600 20150129033614 20150105123019 60789 ch. rVPJP2HhzW7OkroK2axFj5Lb4iVWCH8Fp/Iq1rF952NDo72b8RiKje2RaAKJAGQ+wd0YgE+PAej04GCmkhlDJA/zvPeeTxuhy3HbJzReMlQ7fjyH+wW1hli+FuIYvogXWf7nO/9VyPORt8X/f/pjrOr3Vlj9sGLN8TGYpEuVSw4=
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 288 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 43084
;; flags: qr aa rd ra cd ; qd: 1 an: 4 au: 0 ad: 1
;; QUESTIONS:
;; ingotronic.ch., type = DNSKEY, class = IN
;; ANSWERS:
ingotronic.ch. 300 IN DNSKEY 256 3 5 AwEAAZ2Xh77GFzpEDx7EHYxShqltHgkiG+BOjBGifEmnJhQSdE5/yNSLFNcdhZZ8HUPxYnaedTqJcFFg4AzUsQklF/fECegTJdZjaj2WoL0/I8K7HMfY/hVuRZUWPNglYi8agJRX6gdkFTCpUNI7stpgKqxtzUJhhw15uG/lKMplwqUr
ingotronic.ch. 300 IN DNSKEY 257 3 5 AwEAAeA1vzmjaB+eBAcvhzpKEgAEFpvQ1rg4uKDW6MsQtacKoqBpgyep2+LuWotz5p/xYxj3NGsArwN8Ad5cY0FHRr8miTT0elOv6nvlqGIfRuhj/BXAQ1x4ihpSFslHw0lJMYFwxsUZWpUyjWX/nv1xRZMMwF46gui0N4OEbyTYusCk77D+A71k+K0EAitFIbIH4GCUKmH1H7HmXhSVH9bN/n7KEGwW32lmsuuUcJoRKDkcUvbMXY/9Xoa2quERrUg/rBbDUHowRPjYDS5GzY1+f4YY8s40BufGiqyUTKKXL953MVFK8gmezXA0hbmrnZ7CBOw/7238mORAdzExaX8n7CE=
ingotronic.ch. 300 IN RRSIG DNSKEY 5 2 300 20150125003700 20141226001657 6031 ingotronic.ch. rs1QlP2SlSpA2ELbzwg3DgWLzXWL3Lpv6CUJE2Q0qH2Zp7Qdy3cD+ZEtNh9v24Qv1M6JJ3zFt8mmZoCeW2ycuMbJCqBkW9CBuwF+VznZvZY2MxwPipvhvEEGP//0M8YAZJ66yQPDv3PTdAP8FYbIrJyvY44vwyncwbslpfHT9jAsrbfr3vuMuWps86dnP462q+0s1TxBfqi8mzo3gdavjHKWVNwohLahLKT+tWeu6DSzQv0YwMjwtkLgF7QRgx3ctIIkloOrnx9nHH1N6y+hxEB89fOlyVDjHhgL5uVtsD5fEdT0FJ2Gc/2nShEMMqIwr1/J9kUq1mNySff/uEe65Q==
ingotronic.ch. 300 IN RRSIG DNSKEY 5 2 300 20150125003700 20141226001657 17430 ingotronic.ch. mEwZjhQqeWksWD0TCnNBrtce4YkWJL3edqL6PvAUu8Fn+Ih437kEs3+pqdkgRsdYQ9HW+lBm/8pWwJlNAv0bi9NykItXMwAUFtncgq+6Pnh3iAM972GXSa5VV4LcGQ5b8CBdHCHiEKDqyPv5Hr5QfYL/FQaWlcNRh4QZZlZNPFA=
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 940 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 48797
;; flags: qr aa rd ra cd ; qd: 1 an: 0 au: 4 ad: 1
;; QUESTIONS:
;; sub.ingotronic.ch., type = MX, class = IN
;; ANSWERS:
;; AUTHORITY RECORDS:
sub.ingotronic.ch. 300 IN SOA ns1.ingotronic.ch. admin.ingotronic.ch. 2013032794 300 60 864000 300
sub.ingotronic.ch. 300 IN RRSIG SOA 5 3 300 20150201081246 20150102071246 3600 sub.ingotronic.ch. iyj09Qcj7m6Eec8MbAZiQW0sPEzTCtrulsANwrkOvg6wMTcKZt+EDaGRxdp0+6PcAURD60WP5PdKojY2qqN0th49nxA02e7d8xqlYDlD4B3svbviaf16p5AT012mFQ7JUSNQMgkj/4HznmfQtvpKjX+GHvlCBKKXbBKPFXKu77w=
sub.ingotronic.ch. 300 IN NSEC alias.sub.ingotronic.ch. A NS SOA RRSIG NSEC DNSKEY
sub.ingotronic.ch. 300 IN RRSIG NSEC 5 3 300 20150201075325 20150102071246 3600 sub.ingotronic.ch. Mm93ERE64aeLL7go+Dc0oamkdUWUAFe0zWDP1yYv1Zo+bVlk8WPxGdaT7soi/42qJZ27KMuYJBDgyy2GaapMbTgtLUcIwIp8fCtweVwoOSMs4jHCCmGNX6imjQR/xzx9Df0xYBYJNm3glN8qawn06tgpiG9zOqIQUcURr2E5lbo=
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 492 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 49848
;; flags: qr rd ra ad cd ; qd: 1 an: 4 au: 0 ad: 1
;; QUESTIONS:
;; ., type = DNSKEY, class = IN
;; ANSWERS:
. 87351 IN DNSKEY 257 3 8 AwEAAagAIKlVZrpC6Ia7gEzahOR+9W29euxhJhVVLOyQbSEW0O8gcCjFFVQUTf6v58fLjwBd0YI0EzrAcQqBGCzh/RStIoO8g0NfnfL2MTJRkxoXbfDaUeVPQuYEhg37NZWAJQ9VnMVDxP/VHL496M/QZxkjf5/Efucp2gaDX6RS6CXpoY68LsvPVjR0ZSwzz1apAzvN9dlzEheX7ICJBBtuA6G3LQpzW5hOA2hzCTMjJPJ8LbqF6dsV6DoBQzgul0sGIcGOYl7OyQdXfZ57relSQageu+ipAdTTJ25AsRTAoub8ONGcLmqrAmRLKBP1dfwhYB4N7knNnulqQxA+Uk1ihz0=
. 87351 IN DNSKEY 256 3 8 AwEAAe3fSrbLBy3LOS7pnxEUhvPZTE2H5dIGsI/UfruI/nOEvWWa/PSX2BFedBkEqOlYdjdNF2f+6lmfk2Od/xu0v5bVqxFE+/24v3hZSlWBxvXzPTAGHrbW/IJYEPqlzVOAS4XdUgHg0N7IbLywNHMvB+Yf+Nm6ctyXXFLV4WTNnzs7
. 87351 IN DNSKEY 256 3 8 AwEAAaPD7Y7XIi1MOEREJNTrRhyqsY3gff6JWzg+XCbqut1sbcbvqyssHw8DT1AkRaAC92pO8xuyq5QEgEPL1IHfABLwpwXI5gTj4gdwi86bpkmlWs9fRpnn4DPDCTdrnxIejJXgClHikLJF3u3CdpNCMijq4CKdQbMlRZ3avv+G7rh7
. 87351 IN RRSIG DNSKEY 8 0 172800 20150115235959 20150101000000 19036 . i8cAxD2pvQi1oAyvQxRpDfFlbqPzW+69QQEsDwE1eWOm5AtawO9U7lmsGps7sy/fVNvl1ljKBj4Djp9pb3U2FLogjiIlW0cDAkPmLlG9t+b/pjEfBNlhjANUVN06pvQVAfm+LcF26EaWT6FlISBqb6jSy4BHRa3Bdc4Sx7+pRSYSqVVvYxLkfAWsKPqGkvWhebJDndJJV9syXQXgZ+v/uJ+6XOS43xkAdeL8iBzIs/FlwMTfh3tVe3d0lb65IBBLlCzeQuetX+0Vu1YFcnD0mHc/wS2ZnAV5toAFmyVQBoY/XAZiZeaOkcROJ6Zmqezy7liwK7BqsYyAZntMhk8lbg==
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 883 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 14757
;; flags: qr rd ra ad cd ; qd: 1 an: 2 au: 0 ad: 1
;; QUESTIONS:
;; ch., type = DS, class = IN
;; ANSWERS:
ch. 951 IN DS 46375 8 2 8F96646FC68BB7E4AF4C0750A6096FBC0D4ECDA3D3FA6DA06FDDB42EE50C6CF3
ch. 951 IN RRSIG DS 8 1 86400 20150112170000 20150105160000 16665 . thY7xYWBBxiBjqbQIb9fAG4TmQgnziwM7q6P1T3/ITxmECdvOCQnnZA3uD7qmN8uM0HudsD7+y+zgD3rsH4RSTKdL4kHSI0OnCxToMTvklghEgFDezqIRm8NkWdI2H4Stwrj20nYKSpLQxPI2EE54gs18P3KyO8bAUYv8Qx73xU=
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 238 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 38755
;; flags: qr rd ra ad cd ; qd: 1 an: 4 au: 0 ad: 1
;; QUESTIONS:
;; ch., type = DNSKEY, class = IN
;; ANSWERS:
ch. 952 IN DNSKEY 256 3 8 AwEAAcsg0kY6fw1wzYMhSAKTy+Y2JzAst66P/1odp9NECJJHbU8f4nwziI3onoFSBV0ZiSZhY1aH5dhdDZ7BkrqhVXSrZPAz0CvzjIxmB1gSOf9DeZvjQvoy97HqYolxsf+B3QQv2RKBT67elF5+JisKg3/dQISelKn8LhabSoVrMlD1
ch. 952 IN DNSKEY 257 3 8 AwEAAb7GhhZ8IAy/AhwmSms5DeQK5ad09wIIplEpYoiAIYXPtJvT1ReFzyfTp/2YP+g/PWDwHPh4qKAHa9x0VgbIQcGAeNakmfkAdWEmCnca323/SAml3mwfaX62G7/uYWae5zh8QTxZKNd+K1yZ5x0IxnI31chSl5xymRbTEHYZDKwSIRFM3fTxUMt93WFaBVWELReYotJBr++rvAWdnlay5TPBTvheLBkaiqtgM4GP8HK07Y+86lsZnEsj5K3G1KTV5SPpa82rqYAwxG9VKbmSE/6/kBR5jJHjt1rRt5Oe7v18aEtw0YCEN4vxq+KuvMoNVqXUsE9LBwHJD+QNwi6wmB0=
ch. 952 IN DNSKEY 256 3 8 AwEAAcSLdT0fEmcFmLpeUkAJoeVaHKiu+nbuc43fWlqaCRVf8t2HA4uWxOk0O5ci9nrFTc8nq8oa5fk5Cj7CHh4yrX9qUCfTdIWTyp8BDEdJpS+Dyb0u9wQuVj+nQMj4fLzdQf4TJs3/qxuiLr3nL1UUwlhhXeqSqGVb7p3mtB5HJ8ad
ch. 952 IN RRSIG DNSKEY 8 1 86400 20150127100909 20141212090909 46375 ch. bT8q0FWyeMH0SulNo6UdIIgZYNATwYsee2bikq2Gh339Bufma8eaqWIPYT3XKmxYPBFOw0bVl+kLZxTwbR1CFoCDXoP+qgQhh4mf9qkNiv2CDSc+0FE3FRREn+DAhYTUEuB58FPiPakFB8s8O7T+k2qhDae7jy4/y7Jl1lnjaBY8s7bzOUPhF0KKCNZmvoKwtL23ZdVeTSV1xM3jkiNnpzBKbcoSWECSGJVp1SE0BnRXdwQP41YTXFZ0310YjaTAUCC5qbMIWdEkHjfdSQtKBImnc85mkapq9w++XQ4zhauPWBtrPV3CcoCahjUaWdjrKVkibomlJZaN8MEO23CfQw==
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 893 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 45312
;; flags: qr rd ra cd ; qd: 1 an: 3 au: 0 ad: 1
;; QUESTIONS:
;; ingotronic.ch., type = DS, class = IN
;; ANSWERS:
ingotronic.ch. 3560 IN DS 6031 5 1 733D0218B571CD617B1A7493564B9FC4F12ADE82
ingotronic.ch. 3560 IN DS 6031 5 2 4A948F2FDADA24686E473EDAC00DCF972584C75E3FAA92C2021B6221449FF87E
ingotronic.ch. 3560 IN RRSIG DS 8 2 3600 20150129033614 20150105123019 60789 ch. rVPJP2HhzW7OkroK2axFj5Lb4iVWCH8Fp/Iq1rF952NDo72b8RiKje2RaAKJAGQ+wd0YgE+PAej04GCmkhlDJA/zvPeeTxuhy3HbJzReMlQ7fjyH+wW1hli+FuIYvogXWf7nO/9VyPORt8X/f/pjrOr3Vlj9sGLN8TGYpEuVSw4=
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 288 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 36026
;; flags: qr aa rd ra cd ; qd: 1 an: 4 au: 0 ad: 1
;; QUESTIONS:
;; ingotronic.ch., type = DNSKEY, class = IN
;; ANSWERS:
ingotronic.ch. 300 IN DNSKEY 256 3 5 AwEAAZ2Xh77GFzpEDx7EHYxShqltHgkiG+BOjBGifEmnJhQSdE5/yNSLFNcdhZZ8HUPxYnaedTqJcFFg4AzUsQklF/fECegTJdZjaj2WoL0/I8K7HMfY/hVuRZUWPNglYi8agJRX6gdkFTCpUNI7stpgKqxtzUJhhw15uG/lKMplwqUr
ingotronic.ch. 300 IN DNSKEY 257 3 5 AwEAAeA1vzmjaB+eBAcvhzpKEgAEFpvQ1rg4uKDW6MsQtacKoqBpgyep2+LuWotz5p/xYxj3NGsArwN8Ad5cY0FHRr8miTT0elOv6nvlqGIfRuhj/BXAQ1x4ihpSFslHw0lJMYFwxsUZWpUyjWX/nv1xRZMMwF46gui0N4OEbyTYusCk77D+A71k+K0EAitFIbIH4GCUKmH1H7HmXhSVH9bN/n7KEGwW32lmsuuUcJoRKDkcUvbMXY/9Xoa2quERrUg/rBbDUHowRPjYDS5GzY1+f4YY8s40BufGiqyUTKKXL953MVFK8gmezXA0hbmrnZ7CBOw/7238mORAdzExaX8n7CE=
ingotronic.ch. 300 IN RRSIG DNSKEY 5 2 300 20150125003700 20141226001657 6031 ingotronic.ch. rs1QlP2SlSpA2ELbzwg3DgWLzXWL3Lpv6CUJE2Q0qH2Zp7Qdy3cD+ZEtNh9v24Qv1M6JJ3zFt8mmZoCeW2ycuMbJCqBkW9CBuwF+VznZvZY2MxwPipvhvEEGP//0M8YAZJ66yQPDv3PTdAP8FYbIrJyvY44vwyncwbslpfHT9jAsrbfr3vuMuWps86dnP462q+0s1TxBfqi8mzo3gdavjHKWVNwohLahLKT+tWeu6DSzQv0YwMjwtkLgF7QRgx3ctIIkloOrnx9nHH1N6y+hxEB89fOlyVDjHhgL5uVtsD5fEdT0FJ2Gc/2nShEMMqIwr1/J9kUq1mNySff/uEe65Q==
ingotronic.ch. 300 IN RRSIG DNSKEY 5 2 300 20150125003700 20141226001657 17430 ingotronic.ch. mEwZjhQqeWksWD0TCnNBrtce4YkWJL3edqL6PvAUu8Fn+Ih437kEs3+pqdkgRsdYQ9HW+lBm/8pWwJlNAv0bi9NykItXMwAUFtncgq+6Pnh3iAM972GXSa5VV4LcGQ5b8CBdHCHiEKDqyPv5Hr5QfYL/FQaWlcNRh4QZZlZNPFA=
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 940 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 55654
;; flags: qr aa rd ra cd ; qd: 1 an: 3 au: 0 ad: 1
;; QUESTIONS:
;; sub.ingotronic.ch., type = DS, class = IN
;; ANSWERS:
sub.ingotronic.ch. 300 IN DS 42976 5 2 C54339C4B4EAACF8643D8FAE6C57836F8207F8D82088F1C51AF100123D2A42EF
sub.ingotronic.ch. 300 IN DS 42976 5 1 E638863370B9DE424C31CA03B99CCED96027B88C
sub.ingotronic.ch. 300 IN RRSIG DS 5 3 300 20150125004144 20141226003211 17430 ingotronic.ch. m1gkZjYlA6aeCibofiRybFhOLgRvP+UG5nzWjH4yfzjPnfODRqo8TkEbRc1wUS1etARSq9TrsCjlWSKdn3JBdQfi0uGa27lLproj6oHi1+enh+OKIjFRxScP1bPPcbCALRFOeIp9JA1TEAGsyn+pWSwRF/wpEfrTTbOj94tsxX0=
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 303 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 7891
;; flags: qr aa rd ra cd ; qd: 1 an: 4 au: 0 ad: 1
;; QUESTIONS:
;; sub.ingotronic.ch., type = DNSKEY, class = IN
;; ANSWERS:
sub.ingotronic.ch. 300 IN DNSKEY 257 3 5 AwEAAbVAfHflzOy0uICze0QDBfbrZrU1UN1LNc5D987u8qhP9Vz2pd4yb3rSLOuH9hG7ouAkI63qmtmq6TP71jRXyHr4F9/ZbD3hzhCkyXdo+KaPO70VXWtdIZUom5WuA92pzTB/WuiaWJ217SUeRXU9e4NwrpbDINd6sXcb+sBEFDRt0d/VbwAxa7vo8fl5qOmr/PzD7FoKFTnTWTfUduRsHMdlyYY+j8JfikDdTdeRuYuHzUCO3q3BcUEHrBnKE87JtEM0TQnDSe9OaLFxYARq+LMdHY2P/OZP8nWStSnB8d3E7Sc/FEOQZ9xKkmh1japxgoStjcnBKvz53DmwIXcvcRc=
sub.ingotronic.ch. 300 IN DNSKEY 256 3 5 AwEAAcsnnxVGj8qUAxBox/LKOrpdJG0S8Zfn/mMl+f52Odke62Et5blo+jrbXiOWa6+AlASOMYprqpaZ32b16UvtsuqruErqwy+M427TVTmG6LXEDe7rCNrJF0tIesQpwkA8WjlTRE2bcVHTwARL//smGhTlE9WTPAQGDdXyTUWYr1rX
sub.ingotronic.ch. 300 IN RRSIG DNSKEY 5 3 300 20150131230442 20150101222529 3600 sub.ingotronic.ch. mPYA7Wo+MdzLLleV32ZvynRVzdnL97XgGqzeUPiI7LSXfaSEOtpoE3GeosbLIjGmZ42wLTYOXWm4YS/Mb9ctQGuNPQRMgQbVPkv/aOO6tX+Vqq1XJkKgdb7dRdvvs4jzjIOH/a++OpUy0EBKKioAkwKCrcTNqLkRQ0IkTyoaaCA=
sub.ingotronic.ch. 300 IN RRSIG DNSKEY 5 3 300 20150131230442 20150101222529 42976 sub.ingotronic.ch. Z2/JMubvx8hgfIzmvmXVSfe/qCbZZ3XlJsj3ZrAa8+izrRODKYrGVOtJ+ONPOwid6NQN40yizJoxNFfvkDDqUiZJO6vpb9FmStj034RD1hfC/7qsLoCdOLkLoQwrQDoYTIwLywpsduCW83JzbGBzzCkC9+aoFPVXIkcGUqoQCdYB5OXzF9/2uWq8tD7AQ6t5MzPeMJC+VcNOjqBPRkunl27yUreNt1Nb65C38S72DAJNzAZIZqj1A8jZ6tk0fdixmZ+KWelP8S9SW2TpeGxwJ4kbHJJ+vSo7dkqRtnIYv4GPW6Xp3GH1oErTMGeqp9mquQ6n6jWP6ejlwc6puMxjNQ==
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 952 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 41767
;; flags: qr rd ra ad cd ; qd: 1 an: 4 au: 0 ad: 1
;; QUESTIONS:
;; ., type = DNSKEY, class = IN
;; ANSWERS:
. 87351 IN DNSKEY 257 3 8 AwEAAagAIKlVZrpC6Ia7gEzahOR+9W29euxhJhVVLOyQbSEW0O8gcCjFFVQUTf6v58fLjwBd0YI0EzrAcQqBGCzh/RStIoO8g0NfnfL2MTJRkxoXbfDaUeVPQuYEhg37NZWAJQ9VnMVDxP/VHL496M/QZxkjf5/Efucp2gaDX6RS6CXpoY68LsvPVjR0ZSwzz1apAzvN9dlzEheX7ICJBBtuA6G3LQpzW5hOA2hzCTMjJPJ8LbqF6dsV6DoBQzgul0sGIcGOYl7OyQdXfZ57relSQageu+ipAdTTJ25AsRTAoub8ONGcLmqrAmRLKBP1dfwhYB4N7knNnulqQxA+Uk1ihz0=
. 87351 IN DNSKEY 256 3 8 AwEAAe3fSrbLBy3LOS7pnxEUhvPZTE2H5dIGsI/UfruI/nOEvWWa/PSX2BFedBkEqOlYdjdNF2f+6lmfk2Od/xu0v5bVqxFE+/24v3hZSlWBxvXzPTAGHrbW/IJYEPqlzVOAS4XdUgHg0N7IbLywNHMvB+Yf+Nm6ctyXXFLV4WTNnzs7
. 87351 IN DNSKEY 256 3 8 AwEAAaPD7Y7XIi1MOEREJNTrRhyqsY3gff6JWzg+XCbqut1sbcbvqyssHw8DT1AkRaAC92pO8xuyq5QEgEPL1IHfABLwpwXI5gTj4gdwi86bpkmlWs9fRpnn4DPDCTdrnxIejJXgClHikLJF3u3CdpNCMijq4CKdQbMlRZ3avv+G7rh7
. 87351 IN RRSIG DNSKEY 8 0 172800 20150115235959 20150101000000 19036 . i8cAxD2pvQi1oAyvQxRpDfFlbqPzW+69QQEsDwE1eWOm5AtawO9U7lmsGps7sy/fVNvl1ljKBj4Djp9pb3U2FLogjiIlW0cDAkPmLlG9t+b/pjEfBNlhjANUVN06pvQVAfm+LcF26EaWT6FlISBqb6jSy4BHRa3Bdc4Sx7+pRSYSqVVvYxLkfAWsKPqGkvWhebJDndJJV9syXQXgZ+v/uJ+6XOS43xkAdeL8iBzIs/FlwMTfh3tVe3d0lb65IBBLlCzeQuetX+0Vu1YFcnD0mHc/wS2ZnAV5toAFmyVQBoY/XAZiZeaOkcROJ6Zmqezy7liwK7BqsYyAZntMhk8lbg==
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 883 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 49409
;; flags: qr rd ra ad cd ; qd: 1 an: 2 au: 0 ad: 1
;; QUESTIONS:
;; ch., type = DS, class = IN
;; ANSWERS:
ch. 951 IN DS 46375 8 2 8F96646FC68BB7E4AF4C0750A6096FBC0D4ECDA3D3FA6DA06FDDB42EE50C6CF3
ch. 951 IN RRSIG DS 8 1 86400 20150112170000 20150105160000 16665 . thY7xYWBBxiBjqbQIb9fAG4TmQgnziwM7q6P1T3/ITxmECdvOCQnnZA3uD7qmN8uM0HudsD7+y+zgD3rsH4RSTKdL4kHSI0OnCxToMTvklghEgFDezqIRm8NkWdI2H4Stwrj20nYKSpLQxPI2EE54gs18P3KyO8bAUYv8Qx73xU=
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 238 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 35186
;; flags: qr rd ra ad cd ; qd: 1 an: 4 au: 0 ad: 1
;; QUESTIONS:
;; ch., type = DNSKEY, class = IN
;; ANSWERS:
ch. 951 IN DNSKEY 257 3 8 AwEAAb7GhhZ8IAy/AhwmSms5DeQK5ad09wIIplEpYoiAIYXPtJvT1ReFzyfTp/2YP+g/PWDwHPh4qKAHa9x0VgbIQcGAeNakmfkAdWEmCnca323/SAml3mwfaX62G7/uYWae5zh8QTxZKNd+K1yZ5x0IxnI31chSl5xymRbTEHYZDKwSIRFM3fTxUMt93WFaBVWELReYotJBr++rvAWdnlay5TPBTvheLBkaiqtgM4GP8HK07Y+86lsZnEsj5K3G1KTV5SPpa82rqYAwxG9VKbmSE/6/kBR5jJHjt1rRt5Oe7v18aEtw0YCEN4vxq+KuvMoNVqXUsE9LBwHJD+QNwi6wmB0=
ch. 951 IN DNSKEY 256 3 8 AwEAAcSLdT0fEmcFmLpeUkAJoeVaHKiu+nbuc43fWlqaCRVf8t2HA4uWxOk0O5ci9nrFTc8nq8oa5fk5Cj7CHh4yrX9qUCfTdIWTyp8BDEdJpS+Dyb0u9wQuVj+nQMj4fLzdQf4TJs3/qxuiLr3nL1UUwlhhXeqSqGVb7p3mtB5HJ8ad
ch. 951 IN DNSKEY 256 3 8 AwEAAcsg0kY6fw1wzYMhSAKTy+Y2JzAst66P/1odp9NECJJHbU8f4nwziI3onoFSBV0ZiSZhY1aH5dhdDZ7BkrqhVXSrZPAz0CvzjIxmB1gSOf9DeZvjQvoy97HqYolxsf+B3QQv2RKBT67elF5+JisKg3/dQISelKn8LhabSoVrMlD1
ch. 951 IN RRSIG DNSKEY 8 1 86400 20150127100909 20141212090909 46375 ch. bT8q0FWyeMH0SulNo6UdIIgZYNATwYsee2bikq2Gh339Bufma8eaqWIPYT3XKmxYPBFOw0bVl+kLZxTwbR1CFoCDXoP+qgQhh4mf9qkNiv2CDSc+0FE3FRREn+DAhYTUEuB58FPiPakFB8s8O7T+k2qhDae7jy4/y7Jl1lnjaBY8s7bzOUPhF0KKCNZmvoKwtL23ZdVeTSV1xM3jkiNnpzBKbcoSWECSGJVp1SE0BnRXdwQP41YTXFZ0310YjaTAUCC5qbMIWdEkHjfdSQtKBImnc85mkapq9w++XQ4zhauPWBtrPV3CcoCahjUaWdjrKVkibomlJZaN8MEO23CfQw==
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 893 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 23542
;; flags: qr rd ra cd ; qd: 1 an: 3 au: 0 ad: 1
;; QUESTIONS:
;; ingotronic.ch., type = DS, class = IN
;; ANSWERS:
ingotronic.ch. 3559 IN DS 6031 5 1 733D0218B571CD617B1A7493564B9FC4F12ADE82
ingotronic.ch. 3559 IN DS 6031 5 2 4A948F2FDADA24686E473EDAC00DCF972584C75E3FAA92C2021B6221449FF87E
ingotronic.ch. 3559 IN RRSIG DS 8 2 3600 20150129033614 20150105123019 60789 ch. rVPJP2HhzW7OkroK2axFj5Lb4iVWCH8Fp/Iq1rF952NDo72b8RiKje2RaAKJAGQ+wd0YgE+PAej04GCmkhlDJA/zvPeeTxuhy3HbJzReMlQ7fjyH+wW1hli+FuIYvogXWf7nO/9VyPORt8X/f/pjrOr3Vlj9sGLN8TGYpEuVSw4=
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 288 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 19631
;; flags: qr aa rd ra cd ; qd: 1 an: 4 au: 0 ad: 1
;; QUESTIONS:
;; ingotronic.ch., type = DNSKEY, class = IN
;; ANSWERS:
ingotronic.ch. 300 IN DNSKEY 256 3 5 AwEAAZ2Xh77GFzpEDx7EHYxShqltHgkiG+BOjBGifEmnJhQSdE5/yNSLFNcdhZZ8HUPxYnaedTqJcFFg4AzUsQklF/fECegTJdZjaj2WoL0/I8K7HMfY/hVuRZUWPNglYi8agJRX6gdkFTCpUNI7stpgKqxtzUJhhw15uG/lKMplwqUr
ingotronic.ch. 300 IN DNSKEY 257 3 5 AwEAAeA1vzmjaB+eBAcvhzpKEgAEFpvQ1rg4uKDW6MsQtacKoqBpgyep2+LuWotz5p/xYxj3NGsArwN8Ad5cY0FHRr8miTT0elOv6nvlqGIfRuhj/BXAQ1x4ihpSFslHw0lJMYFwxsUZWpUyjWX/nv1xRZMMwF46gui0N4OEbyTYusCk77D+A71k+K0EAitFIbIH4GCUKmH1H7HmXhSVH9bN/n7KEGwW32lmsuuUcJoRKDkcUvbMXY/9Xoa2quERrUg/rBbDUHowRPjYDS5GzY1+f4YY8s40BufGiqyUTKKXL953MVFK8gmezXA0hbmrnZ7CBOw/7238mORAdzExaX8n7CE=
ingotronic.ch. 300 IN RRSIG DNSKEY 5 2 300 20150125003700 20141226001657 6031 ingotronic.ch. rs1QlP2SlSpA2ELbzwg3DgWLzXWL3Lpv6CUJE2Q0qH2Zp7Qdy3cD+ZEtNh9v24Qv1M6JJ3zFt8mmZoCeW2ycuMbJCqBkW9CBuwF+VznZvZY2MxwPipvhvEEGP//0M8YAZJ66yQPDv3PTdAP8FYbIrJyvY44vwyncwbslpfHT9jAsrbfr3vuMuWps86dnP462q+0s1TxBfqi8mzo3gdavjHKWVNwohLahLKT+tWeu6DSzQv0YwMjwtkLgF7QRgx3ctIIkloOrnx9nHH1N6y+hxEB89fOlyVDjHhgL5uVtsD5fEdT0FJ2Gc/2nShEMMqIwr1/J9kUq1mNySff/uEe65Q==
ingotronic.ch. 300 IN RRSIG DNSKEY 5 2 300 20150125003700 20141226001657 17430 ingotronic.ch. mEwZjhQqeWksWD0TCnNBrtce4YkWJL3edqL6PvAUu8Fn+Ih437kEs3+pqdkgRsdYQ9HW+lBm/8pWwJlNAv0bi9NykItXMwAUFtncgq+6Pnh3iAM972GXSa5VV4LcGQ5b8CBdHCHiEKDqyPv5Hr5QfYL/FQaWlcNRh4QZZlZNPFA=
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 940 bytes
###############################################
testNoDataWhenWcNsecIsForDifferentName 0000664 0000000 0000000 00000033360 13020541473 0041072 0 ustar 00root root 0000000 0000000 dnssecjava-1.1.3/src/test/resources/recordings/org_jitsi_dnssec_validator_TestValUtils #Date: 2015-01-06T22:35:19+01:00
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 53349
;; flags: qr aa rd ra cd ; qd: 1 an: 2 au: 2 ad: 3
;; QUESTIONS:
;; *.c.ingotronic.ch., type = NSEC, class = IN
;; ANSWERS:
*.c.ingotronic.ch. 300 IN NSEC cfailed.ingotronic.ch. A RRSIG NSEC
*.c.ingotronic.ch. 300 IN RRSIG NSEC 5 3 300 20150125000532 20141225234703 17430 ingotronic.ch. Lf7FP3WsqHc3SUznxjp367ehSI5mcUE7OzvHQj68BfC77FPylpt3YLtyirEZVjVKPjQ6maarQakizn6u7KFf1jFr2kGpS1rZCvyfAxGX6wwIZK/Wf0lfhP0IquQd+kX2OlmRbbemFI/lFG72NAcB+19t8tcwV5k6ADkxC2L6o/4=
;; AUTHORITY RECORDS:
ingotronic.ch. 300 IN NS ns1.ingotronic.ch.
ingotronic.ch. 300 IN RRSIG NS 5 2 300 20150125000532 20141225234703 17430 ingotronic.ch. VuzVJM3McSHlcdngCG/G23zCikq8tXE0CZV2ZSgUFXXFMIEoM6PMi1QRQ/8VF3tee4WGpRx2jhtkui0wFRFfwIhW7G1uPDT4qogaR3KLIyuCEsMxhRH3WJZNrLmLqlSBGvd9OBJwbmryqm3Zzqvrk+E+rh8OJeifnBBpHAX4eHg=
;; ADDITIONAL RECORDS:
ns1.ingotronic.ch. 300 IN A 62.192.5.131
ns1.ingotronic.ch. 300 IN RRSIG A 5 3 300 20150125005754 20141226001054 17430 ingotronic.ch. fNG1RZM53pXwBxruHNaSZszxVzNLoCq8VZsTjAzYH2vSLzHXYVGJFTLIeY0K9APAdyJU8WuwmABmn7XY0Kg39kRG77uoFlqUws2PdTz2QKOwJGZY7W88Ak2Y9lkDBcK8o3wJHVptrT8R7p/1U7UfjF0kqPUkakk2B0EbFWdagFg=
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 642 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 28003
;; flags: qr rd ra ad cd ; qd: 1 an: 4 au: 0 ad: 1
;; QUESTIONS:
;; ., type = DNSKEY, class = IN
;; ANSWERS:
. 87354 IN DNSKEY 257 3 8 AwEAAagAIKlVZrpC6Ia7gEzahOR+9W29euxhJhVVLOyQbSEW0O8gcCjFFVQUTf6v58fLjwBd0YI0EzrAcQqBGCzh/RStIoO8g0NfnfL2MTJRkxoXbfDaUeVPQuYEhg37NZWAJQ9VnMVDxP/VHL496M/QZxkjf5/Efucp2gaDX6RS6CXpoY68LsvPVjR0ZSwzz1apAzvN9dlzEheX7ICJBBtuA6G3LQpzW5hOA2hzCTMjJPJ8LbqF6dsV6DoBQzgul0sGIcGOYl7OyQdXfZ57relSQageu+ipAdTTJ25AsRTAoub8ONGcLmqrAmRLKBP1dfwhYB4N7knNnulqQxA+Uk1ihz0=
. 87354 IN DNSKEY 256 3 8 AwEAAaPD7Y7XIi1MOEREJNTrRhyqsY3gff6JWzg+XCbqut1sbcbvqyssHw8DT1AkRaAC92pO8xuyq5QEgEPL1IHfABLwpwXI5gTj4gdwi86bpkmlWs9fRpnn4DPDCTdrnxIejJXgClHikLJF3u3CdpNCMijq4CKdQbMlRZ3avv+G7rh7
. 87354 IN DNSKEY 256 3 8 AwEAAe3fSrbLBy3LOS7pnxEUhvPZTE2H5dIGsI/UfruI/nOEvWWa/PSX2BFedBkEqOlYdjdNF2f+6lmfk2Od/xu0v5bVqxFE+/24v3hZSlWBxvXzPTAGHrbW/IJYEPqlzVOAS4XdUgHg0N7IbLywNHMvB+Yf+Nm6ctyXXFLV4WTNnzs7
. 87354 IN RRSIG DNSKEY 8 0 172800 20150115235959 20150101000000 19036 . i8cAxD2pvQi1oAyvQxRpDfFlbqPzW+69QQEsDwE1eWOm5AtawO9U7lmsGps7sy/fVNvl1ljKBj4Djp9pb3U2FLogjiIlW0cDAkPmLlG9t+b/pjEfBNlhjANUVN06pvQVAfm+LcF26EaWT6FlISBqb6jSy4BHRa3Bdc4Sx7+pRSYSqVVvYxLkfAWsKPqGkvWhebJDndJJV9syXQXgZ+v/uJ+6XOS43xkAdeL8iBzIs/FlwMTfh3tVe3d0lb65IBBLlCzeQuetX+0Vu1YFcnD0mHc/wS2ZnAV5toAFmyVQBoY/XAZiZeaOkcROJ6Zmqezy7liwK7BqsYyAZntMhk8lbg==
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 883 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 3842
;; flags: qr rd ra ad cd ; qd: 1 an: 2 au: 0 ad: 1
;; QUESTIONS:
;; ch., type = DS, class = IN
;; ANSWERS:
ch. 954 IN DS 46375 8 2 8F96646FC68BB7E4AF4C0750A6096FBC0D4ECDA3D3FA6DA06FDDB42EE50C6CF3
ch. 954 IN RRSIG DS 8 1 86400 20150112170000 20150105160000 16665 . thY7xYWBBxiBjqbQIb9fAG4TmQgnziwM7q6P1T3/ITxmECdvOCQnnZA3uD7qmN8uM0HudsD7+y+zgD3rsH4RSTKdL4kHSI0OnCxToMTvklghEgFDezqIRm8NkWdI2H4Stwrj20nYKSpLQxPI2EE54gs18P3KyO8bAUYv8Qx73xU=
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 238 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 64566
;; flags: qr rd ra ad cd ; qd: 1 an: 4 au: 0 ad: 1
;; QUESTIONS:
;; ch., type = DNSKEY, class = IN
;; ANSWERS:
ch. 955 IN DNSKEY 256 3 8 AwEAAcsg0kY6fw1wzYMhSAKTy+Y2JzAst66P/1odp9NECJJHbU8f4nwziI3onoFSBV0ZiSZhY1aH5dhdDZ7BkrqhVXSrZPAz0CvzjIxmB1gSOf9DeZvjQvoy97HqYolxsf+B3QQv2RKBT67elF5+JisKg3/dQISelKn8LhabSoVrMlD1
ch. 955 IN DNSKEY 257 3 8 AwEAAb7GhhZ8IAy/AhwmSms5DeQK5ad09wIIplEpYoiAIYXPtJvT1ReFzyfTp/2YP+g/PWDwHPh4qKAHa9x0VgbIQcGAeNakmfkAdWEmCnca323/SAml3mwfaX62G7/uYWae5zh8QTxZKNd+K1yZ5x0IxnI31chSl5xymRbTEHYZDKwSIRFM3fTxUMt93WFaBVWELReYotJBr++rvAWdnlay5TPBTvheLBkaiqtgM4GP8HK07Y+86lsZnEsj5K3G1KTV5SPpa82rqYAwxG9VKbmSE/6/kBR5jJHjt1rRt5Oe7v18aEtw0YCEN4vxq+KuvMoNVqXUsE9LBwHJD+QNwi6wmB0=
ch. 955 IN DNSKEY 256 3 8 AwEAAcSLdT0fEmcFmLpeUkAJoeVaHKiu+nbuc43fWlqaCRVf8t2HA4uWxOk0O5ci9nrFTc8nq8oa5fk5Cj7CHh4yrX9qUCfTdIWTyp8BDEdJpS+Dyb0u9wQuVj+nQMj4fLzdQf4TJs3/qxuiLr3nL1UUwlhhXeqSqGVb7p3mtB5HJ8ad
ch. 955 IN RRSIG DNSKEY 8 1 86400 20150127100909 20141212090909 46375 ch. bT8q0FWyeMH0SulNo6UdIIgZYNATwYsee2bikq2Gh339Bufma8eaqWIPYT3XKmxYPBFOw0bVl+kLZxTwbR1CFoCDXoP+qgQhh4mf9qkNiv2CDSc+0FE3FRREn+DAhYTUEuB58FPiPakFB8s8O7T+k2qhDae7jy4/y7Jl1lnjaBY8s7bzOUPhF0KKCNZmvoKwtL23ZdVeTSV1xM3jkiNnpzBKbcoSWECSGJVp1SE0BnRXdwQP41YTXFZ0310YjaTAUCC5qbMIWdEkHjfdSQtKBImnc85mkapq9w++XQ4zhauPWBtrPV3CcoCahjUaWdjrKVkibomlJZaN8MEO23CfQw==
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 893 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 53409
;; flags: qr rd ra cd ; qd: 1 an: 3 au: 0 ad: 1
;; QUESTIONS:
;; ingotronic.ch., type = DS, class = IN
;; ANSWERS:
ingotronic.ch. 3563 IN DS 6031 5 2 4A948F2FDADA24686E473EDAC00DCF972584C75E3FAA92C2021B6221449FF87E
ingotronic.ch. 3563 IN DS 6031 5 1 733D0218B571CD617B1A7493564B9FC4F12ADE82
ingotronic.ch. 3563 IN RRSIG DS 8 2 3600 20150129033614 20150105123019 60789 ch. rVPJP2HhzW7OkroK2axFj5Lb4iVWCH8Fp/Iq1rF952NDo72b8RiKje2RaAKJAGQ+wd0YgE+PAej04GCmkhlDJA/zvPeeTxuhy3HbJzReMlQ7fjyH+wW1hli+FuIYvogXWf7nO/9VyPORt8X/f/pjrOr3Vlj9sGLN8TGYpEuVSw4=
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 288 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 18388
;; flags: qr aa rd ra cd ; qd: 1 an: 4 au: 0 ad: 1
;; QUESTIONS:
;; ingotronic.ch., type = DNSKEY, class = IN
;; ANSWERS:
ingotronic.ch. 300 IN DNSKEY 257 3 5 AwEAAeA1vzmjaB+eBAcvhzpKEgAEFpvQ1rg4uKDW6MsQtacKoqBpgyep2+LuWotz5p/xYxj3NGsArwN8Ad5cY0FHRr8miTT0elOv6nvlqGIfRuhj/BXAQ1x4ihpSFslHw0lJMYFwxsUZWpUyjWX/nv1xRZMMwF46gui0N4OEbyTYusCk77D+A71k+K0EAitFIbIH4GCUKmH1H7HmXhSVH9bN/n7KEGwW32lmsuuUcJoRKDkcUvbMXY/9Xoa2quERrUg/rBbDUHowRPjYDS5GzY1+f4YY8s40BufGiqyUTKKXL953MVFK8gmezXA0hbmrnZ7CBOw/7238mORAdzExaX8n7CE=
ingotronic.ch. 300 IN DNSKEY 256 3 5 AwEAAZ2Xh77GFzpEDx7EHYxShqltHgkiG+BOjBGifEmnJhQSdE5/yNSLFNcdhZZ8HUPxYnaedTqJcFFg4AzUsQklF/fECegTJdZjaj2WoL0/I8K7HMfY/hVuRZUWPNglYi8agJRX6gdkFTCpUNI7stpgKqxtzUJhhw15uG/lKMplwqUr
ingotronic.ch. 300 IN RRSIG DNSKEY 5 2 300 20150125003700 20141226001657 6031 ingotronic.ch. rs1QlP2SlSpA2ELbzwg3DgWLzXWL3Lpv6CUJE2Q0qH2Zp7Qdy3cD+ZEtNh9v24Qv1M6JJ3zFt8mmZoCeW2ycuMbJCqBkW9CBuwF+VznZvZY2MxwPipvhvEEGP//0M8YAZJ66yQPDv3PTdAP8FYbIrJyvY44vwyncwbslpfHT9jAsrbfr3vuMuWps86dnP462q+0s1TxBfqi8mzo3gdavjHKWVNwohLahLKT+tWeu6DSzQv0YwMjwtkLgF7QRgx3ctIIkloOrnx9nHH1N6y+hxEB89fOlyVDjHhgL5uVtsD5fEdT0FJ2Gc/2nShEMMqIwr1/J9kUq1mNySff/uEe65Q==
ingotronic.ch. 300 IN RRSIG DNSKEY 5 2 300 20150125003700 20141226001657 17430 ingotronic.ch. mEwZjhQqeWksWD0TCnNBrtce4YkWJL3edqL6PvAUu8Fn+Ih437kEs3+pqdkgRsdYQ9HW+lBm/8pWwJlNAv0bi9NykItXMwAUFtncgq+6Pnh3iAM972GXSa5VV4LcGQ5b8CBdHCHiEKDqyPv5Hr5QfYL/FQaWlcNRh4QZZlZNPFA=
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 940 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 40922
;; flags: qr rd ra ad cd ; qd: 1 an: 4 au: 0 ad: 1
;; QUESTIONS:
;; ., type = DNSKEY, class = IN
;; ANSWERS:
. 87354 IN DNSKEY 256 3 8 AwEAAe3fSrbLBy3LOS7pnxEUhvPZTE2H5dIGsI/UfruI/nOEvWWa/PSX2BFedBkEqOlYdjdNF2f+6lmfk2Od/xu0v5bVqxFE+/24v3hZSlWBxvXzPTAGHrbW/IJYEPqlzVOAS4XdUgHg0N7IbLywNHMvB+Yf+Nm6ctyXXFLV4WTNnzs7
. 87354 IN DNSKEY 257 3 8 AwEAAagAIKlVZrpC6Ia7gEzahOR+9W29euxhJhVVLOyQbSEW0O8gcCjFFVQUTf6v58fLjwBd0YI0EzrAcQqBGCzh/RStIoO8g0NfnfL2MTJRkxoXbfDaUeVPQuYEhg37NZWAJQ9VnMVDxP/VHL496M/QZxkjf5/Efucp2gaDX6RS6CXpoY68LsvPVjR0ZSwzz1apAzvN9dlzEheX7ICJBBtuA6G3LQpzW5hOA2hzCTMjJPJ8LbqF6dsV6DoBQzgul0sGIcGOYl7OyQdXfZ57relSQageu+ipAdTTJ25AsRTAoub8ONGcLmqrAmRLKBP1dfwhYB4N7knNnulqQxA+Uk1ihz0=
. 87354 IN DNSKEY 256 3 8 AwEAAaPD7Y7XIi1MOEREJNTrRhyqsY3gff6JWzg+XCbqut1sbcbvqyssHw8DT1AkRaAC92pO8xuyq5QEgEPL1IHfABLwpwXI5gTj4gdwi86bpkmlWs9fRpnn4DPDCTdrnxIejJXgClHikLJF3u3CdpNCMijq4CKdQbMlRZ3avv+G7rh7
. 87354 IN RRSIG DNSKEY 8 0 172800 20150115235959 20150101000000 19036 . i8cAxD2pvQi1oAyvQxRpDfFlbqPzW+69QQEsDwE1eWOm5AtawO9U7lmsGps7sy/fVNvl1ljKBj4Djp9pb3U2FLogjiIlW0cDAkPmLlG9t+b/pjEfBNlhjANUVN06pvQVAfm+LcF26EaWT6FlISBqb6jSy4BHRa3Bdc4Sx7+pRSYSqVVvYxLkfAWsKPqGkvWhebJDndJJV9syXQXgZ+v/uJ+6XOS43xkAdeL8iBzIs/FlwMTfh3tVe3d0lb65IBBLlCzeQuetX+0Vu1YFcnD0mHc/wS2ZnAV5toAFmyVQBoY/XAZiZeaOkcROJ6Zmqezy7liwK7BqsYyAZntMhk8lbg==
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 883 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 2222
;; flags: qr rd ra ad cd ; qd: 1 an: 2 au: 0 ad: 1
;; QUESTIONS:
;; ch., type = DS, class = IN
;; ANSWERS:
ch. 954 IN DS 46375 8 2 8F96646FC68BB7E4AF4C0750A6096FBC0D4ECDA3D3FA6DA06FDDB42EE50C6CF3
ch. 954 IN RRSIG DS 8 1 86400 20150112170000 20150105160000 16665 . thY7xYWBBxiBjqbQIb9fAG4TmQgnziwM7q6P1T3/ITxmECdvOCQnnZA3uD7qmN8uM0HudsD7+y+zgD3rsH4RSTKdL4kHSI0OnCxToMTvklghEgFDezqIRm8NkWdI2H4Stwrj20nYKSpLQxPI2EE54gs18P3KyO8bAUYv8Qx73xU=
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 238 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 2371
;; flags: qr rd ra ad cd ; qd: 1 an: 4 au: 0 ad: 1
;; QUESTIONS:
;; ch., type = DNSKEY, class = IN
;; ANSWERS:
ch. 955 IN DNSKEY 256 3 8 AwEAAcsg0kY6fw1wzYMhSAKTy+Y2JzAst66P/1odp9NECJJHbU8f4nwziI3onoFSBV0ZiSZhY1aH5dhdDZ7BkrqhVXSrZPAz0CvzjIxmB1gSOf9DeZvjQvoy97HqYolxsf+B3QQv2RKBT67elF5+JisKg3/dQISelKn8LhabSoVrMlD1
ch. 955 IN DNSKEY 256 3 8 AwEAAcSLdT0fEmcFmLpeUkAJoeVaHKiu+nbuc43fWlqaCRVf8t2HA4uWxOk0O5ci9nrFTc8nq8oa5fk5Cj7CHh4yrX9qUCfTdIWTyp8BDEdJpS+Dyb0u9wQuVj+nQMj4fLzdQf4TJs3/qxuiLr3nL1UUwlhhXeqSqGVb7p3mtB5HJ8ad
ch. 955 IN DNSKEY 257 3 8 AwEAAb7GhhZ8IAy/AhwmSms5DeQK5ad09wIIplEpYoiAIYXPtJvT1ReFzyfTp/2YP+g/PWDwHPh4qKAHa9x0VgbIQcGAeNakmfkAdWEmCnca323/SAml3mwfaX62G7/uYWae5zh8QTxZKNd+K1yZ5x0IxnI31chSl5xymRbTEHYZDKwSIRFM3fTxUMt93WFaBVWELReYotJBr++rvAWdnlay5TPBTvheLBkaiqtgM4GP8HK07Y+86lsZnEsj5K3G1KTV5SPpa82rqYAwxG9VKbmSE/6/kBR5jJHjt1rRt5Oe7v18aEtw0YCEN4vxq+KuvMoNVqXUsE9LBwHJD+QNwi6wmB0=
ch. 955 IN RRSIG DNSKEY 8 1 86400 20150127100909 20141212090909 46375 ch. bT8q0FWyeMH0SulNo6UdIIgZYNATwYsee2bikq2Gh339Bufma8eaqWIPYT3XKmxYPBFOw0bVl+kLZxTwbR1CFoCDXoP+qgQhh4mf9qkNiv2CDSc+0FE3FRREn+DAhYTUEuB58FPiPakFB8s8O7T+k2qhDae7jy4/y7Jl1lnjaBY8s7bzOUPhF0KKCNZmvoKwtL23ZdVeTSV1xM3jkiNnpzBKbcoSWECSGJVp1SE0BnRXdwQP41YTXFZ0310YjaTAUCC5qbMIWdEkHjfdSQtKBImnc85mkapq9w++XQ4zhauPWBtrPV3CcoCahjUaWdjrKVkibomlJZaN8MEO23CfQw==
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 893 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 39664
;; flags: qr rd ra cd ; qd: 1 an: 3 au: 0 ad: 1
;; QUESTIONS:
;; ingotronic.ch., type = DS, class = IN
;; ANSWERS:
ingotronic.ch. 3563 IN DS 6031 5 1 733D0218B571CD617B1A7493564B9FC4F12ADE82
ingotronic.ch. 3563 IN DS 6031 5 2 4A948F2FDADA24686E473EDAC00DCF972584C75E3FAA92C2021B6221449FF87E
ingotronic.ch. 3563 IN RRSIG DS 8 2 3600 20150129033614 20150105123019 60789 ch. rVPJP2HhzW7OkroK2axFj5Lb4iVWCH8Fp/Iq1rF952NDo72b8RiKje2RaAKJAGQ+wd0YgE+PAej04GCmkhlDJA/zvPeeTxuhy3HbJzReMlQ7fjyH+wW1hli+FuIYvogXWf7nO/9VyPORt8X/f/pjrOr3Vlj9sGLN8TGYpEuVSw4=
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 288 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 2175
;; flags: qr aa rd ra cd ; qd: 1 an: 4 au: 0 ad: 1
;; QUESTIONS:
;; ingotronic.ch., type = DNSKEY, class = IN
;; ANSWERS:
ingotronic.ch. 300 IN DNSKEY 256 3 5 AwEAAZ2Xh77GFzpEDx7EHYxShqltHgkiG+BOjBGifEmnJhQSdE5/yNSLFNcdhZZ8HUPxYnaedTqJcFFg4AzUsQklF/fECegTJdZjaj2WoL0/I8K7HMfY/hVuRZUWPNglYi8agJRX6gdkFTCpUNI7stpgKqxtzUJhhw15uG/lKMplwqUr
ingotronic.ch. 300 IN DNSKEY 257 3 5 AwEAAeA1vzmjaB+eBAcvhzpKEgAEFpvQ1rg4uKDW6MsQtacKoqBpgyep2+LuWotz5p/xYxj3NGsArwN8Ad5cY0FHRr8miTT0elOv6nvlqGIfRuhj/BXAQ1x4ihpSFslHw0lJMYFwxsUZWpUyjWX/nv1xRZMMwF46gui0N4OEbyTYusCk77D+A71k+K0EAitFIbIH4GCUKmH1H7HmXhSVH9bN/n7KEGwW32lmsuuUcJoRKDkcUvbMXY/9Xoa2quERrUg/rBbDUHowRPjYDS5GzY1+f4YY8s40BufGiqyUTKKXL953MVFK8gmezXA0hbmrnZ7CBOw/7238mORAdzExaX8n7CE=
ingotronic.ch. 300 IN RRSIG DNSKEY 5 2 300 20150125003700 20141226001657 6031 ingotronic.ch. rs1QlP2SlSpA2ELbzwg3DgWLzXWL3Lpv6CUJE2Q0qH2Zp7Qdy3cD+ZEtNh9v24Qv1M6JJ3zFt8mmZoCeW2ycuMbJCqBkW9CBuwF+VznZvZY2MxwPipvhvEEGP//0M8YAZJ66yQPDv3PTdAP8FYbIrJyvY44vwyncwbslpfHT9jAsrbfr3vuMuWps86dnP462q+0s1TxBfqi8mzo3gdavjHKWVNwohLahLKT+tWeu6DSzQv0YwMjwtkLgF7QRgx3ctIIkloOrnx9nHH1N6y+hxEB89fOlyVDjHhgL5uVtsD5fEdT0FJ2Gc/2nShEMMqIwr1/J9kUq1mNySff/uEe65Q==
ingotronic.ch. 300 IN RRSIG DNSKEY 5 2 300 20150125003700 20141226001657 17430 ingotronic.ch. mEwZjhQqeWksWD0TCnNBrtce4YkWJL3edqL6PvAUu8Fn+Ih437kEs3+pqdkgRsdYQ9HW+lBm/8pWwJlNAv0bi9NykItXMwAUFtncgq+6Pnh3iAM972GXSa5VV4LcGQ5b8CBdHCHiEKDqyPv5Hr5QfYL/FQaWlcNRh4QZZlZNPFA=
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 940 bytes
###############################################
testNoDataWhenWcNsecProvesCname 0000664 0000000 0000000 00000033371 13020541473 0037644 0 ustar 00root root 0000000 0000000 dnssecjava-1.1.3/src/test/resources/recordings/org_jitsi_dnssec_validator_TestValUtils #Date: 2015-01-06T22:35:20+01:00
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 16955
;; flags: qr aa rd ra cd ; qd: 1 an: 2 au: 2 ad: 3
;; QUESTIONS:
;; *.cwv.ingotronic.ch., type = NSEC, class = IN
;; ANSWERS:
*.cwv.ingotronic.ch. 300 IN NSEC *.d.ingotronic.ch. CNAME RRSIG NSEC
*.cwv.ingotronic.ch. 300 IN RRSIG NSEC 5 3 300 20150125021136 20141226011244 17430 ingotronic.ch. BCuqOula4CbP7OMTfAcntmW8o/Irr0N4NOcG7h7AH+Z+1YBJmITWukLUL8iEmC5UnEXTi807YiCnv0Fp2qKyIxSO7x4Kfpb/smHQC1zgeCdfkiyXOIj9iePyizW0/7jJTTY0DQzDF0fPe5t393eS4qSDiwHSnFqsDN+jKPtR5A0=
;; AUTHORITY RECORDS:
ingotronic.ch. 300 IN NS ns1.ingotronic.ch.
ingotronic.ch. 300 IN RRSIG NS 5 2 300 20150125000532 20141225234703 17430 ingotronic.ch. VuzVJM3McSHlcdngCG/G23zCikq8tXE0CZV2ZSgUFXXFMIEoM6PMi1QRQ/8VF3tee4WGpRx2jhtkui0wFRFfwIhW7G1uPDT4qogaR3KLIyuCEsMxhRH3WJZNrLmLqlSBGvd9OBJwbmryqm3Zzqvrk+E+rh8OJeifnBBpHAX4eHg=
;; ADDITIONAL RECORDS:
ns1.ingotronic.ch. 300 IN A 62.192.5.131
ns1.ingotronic.ch. 300 IN RRSIG A 5 3 300 20150125005754 20141226001054 17430 ingotronic.ch. fNG1RZM53pXwBxruHNaSZszxVzNLoCq8VZsTjAzYH2vSLzHXYVGJFTLIeY0K9APAdyJU8WuwmABmn7XY0Kg39kRG77uoFlqUws2PdTz2QKOwJGZY7W88Ak2Y9lkDBcK8o3wJHVptrT8R7p/1U7UfjF0kqPUkakk2B0EbFWdagFg=
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 640 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 7189
;; flags: qr rd ra ad cd ; qd: 1 an: 4 au: 0 ad: 1
;; QUESTIONS:
;; ., type = DNSKEY, class = IN
;; ANSWERS:
. 87354 IN DNSKEY 257 3 8 AwEAAagAIKlVZrpC6Ia7gEzahOR+9W29euxhJhVVLOyQbSEW0O8gcCjFFVQUTf6v58fLjwBd0YI0EzrAcQqBGCzh/RStIoO8g0NfnfL2MTJRkxoXbfDaUeVPQuYEhg37NZWAJQ9VnMVDxP/VHL496M/QZxkjf5/Efucp2gaDX6RS6CXpoY68LsvPVjR0ZSwzz1apAzvN9dlzEheX7ICJBBtuA6G3LQpzW5hOA2hzCTMjJPJ8LbqF6dsV6DoBQzgul0sGIcGOYl7OyQdXfZ57relSQageu+ipAdTTJ25AsRTAoub8ONGcLmqrAmRLKBP1dfwhYB4N7knNnulqQxA+Uk1ihz0=
. 87354 IN DNSKEY 256 3 8 AwEAAe3fSrbLBy3LOS7pnxEUhvPZTE2H5dIGsI/UfruI/nOEvWWa/PSX2BFedBkEqOlYdjdNF2f+6lmfk2Od/xu0v5bVqxFE+/24v3hZSlWBxvXzPTAGHrbW/IJYEPqlzVOAS4XdUgHg0N7IbLywNHMvB+Yf+Nm6ctyXXFLV4WTNnzs7
. 87354 IN DNSKEY 256 3 8 AwEAAaPD7Y7XIi1MOEREJNTrRhyqsY3gff6JWzg+XCbqut1sbcbvqyssHw8DT1AkRaAC92pO8xuyq5QEgEPL1IHfABLwpwXI5gTj4gdwi86bpkmlWs9fRpnn4DPDCTdrnxIejJXgClHikLJF3u3CdpNCMijq4CKdQbMlRZ3avv+G7rh7
. 87354 IN RRSIG DNSKEY 8 0 172800 20150115235959 20150101000000 19036 . i8cAxD2pvQi1oAyvQxRpDfFlbqPzW+69QQEsDwE1eWOm5AtawO9U7lmsGps7sy/fVNvl1ljKBj4Djp9pb3U2FLogjiIlW0cDAkPmLlG9t+b/pjEfBNlhjANUVN06pvQVAfm+LcF26EaWT6FlISBqb6jSy4BHRa3Bdc4Sx7+pRSYSqVVvYxLkfAWsKPqGkvWhebJDndJJV9syXQXgZ+v/uJ+6XOS43xkAdeL8iBzIs/FlwMTfh3tVe3d0lb65IBBLlCzeQuetX+0Vu1YFcnD0mHc/wS2ZnAV5toAFmyVQBoY/XAZiZeaOkcROJ6Zmqezy7liwK7BqsYyAZntMhk8lbg==
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 883 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 24849
;; flags: qr rd ra ad cd ; qd: 1 an: 2 au: 0 ad: 1
;; QUESTIONS:
;; ch., type = DS, class = IN
;; ANSWERS:
ch. 954 IN DS 46375 8 2 8F96646FC68BB7E4AF4C0750A6096FBC0D4ECDA3D3FA6DA06FDDB42EE50C6CF3
ch. 954 IN RRSIG DS 8 1 86400 20150112170000 20150105160000 16665 . thY7xYWBBxiBjqbQIb9fAG4TmQgnziwM7q6P1T3/ITxmECdvOCQnnZA3uD7qmN8uM0HudsD7+y+zgD3rsH4RSTKdL4kHSI0OnCxToMTvklghEgFDezqIRm8NkWdI2H4Stwrj20nYKSpLQxPI2EE54gs18P3KyO8bAUYv8Qx73xU=
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 238 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 49755
;; flags: qr rd ra ad cd ; qd: 1 an: 4 au: 0 ad: 1
;; QUESTIONS:
;; ch., type = DNSKEY, class = IN
;; ANSWERS:
ch. 955 IN DNSKEY 256 3 8 AwEAAcsg0kY6fw1wzYMhSAKTy+Y2JzAst66P/1odp9NECJJHbU8f4nwziI3onoFSBV0ZiSZhY1aH5dhdDZ7BkrqhVXSrZPAz0CvzjIxmB1gSOf9DeZvjQvoy97HqYolxsf+B3QQv2RKBT67elF5+JisKg3/dQISelKn8LhabSoVrMlD1
ch. 955 IN DNSKEY 256 3 8 AwEAAcSLdT0fEmcFmLpeUkAJoeVaHKiu+nbuc43fWlqaCRVf8t2HA4uWxOk0O5ci9nrFTc8nq8oa5fk5Cj7CHh4yrX9qUCfTdIWTyp8BDEdJpS+Dyb0u9wQuVj+nQMj4fLzdQf4TJs3/qxuiLr3nL1UUwlhhXeqSqGVb7p3mtB5HJ8ad
ch. 955 IN DNSKEY 257 3 8 AwEAAb7GhhZ8IAy/AhwmSms5DeQK5ad09wIIplEpYoiAIYXPtJvT1ReFzyfTp/2YP+g/PWDwHPh4qKAHa9x0VgbIQcGAeNakmfkAdWEmCnca323/SAml3mwfaX62G7/uYWae5zh8QTxZKNd+K1yZ5x0IxnI31chSl5xymRbTEHYZDKwSIRFM3fTxUMt93WFaBVWELReYotJBr++rvAWdnlay5TPBTvheLBkaiqtgM4GP8HK07Y+86lsZnEsj5K3G1KTV5SPpa82rqYAwxG9VKbmSE/6/kBR5jJHjt1rRt5Oe7v18aEtw0YCEN4vxq+KuvMoNVqXUsE9LBwHJD+QNwi6wmB0=
ch. 955 IN RRSIG DNSKEY 8 1 86400 20150127100909 20141212090909 46375 ch. bT8q0FWyeMH0SulNo6UdIIgZYNATwYsee2bikq2Gh339Bufma8eaqWIPYT3XKmxYPBFOw0bVl+kLZxTwbR1CFoCDXoP+qgQhh4mf9qkNiv2CDSc+0FE3FRREn+DAhYTUEuB58FPiPakFB8s8O7T+k2qhDae7jy4/y7Jl1lnjaBY8s7bzOUPhF0KKCNZmvoKwtL23ZdVeTSV1xM3jkiNnpzBKbcoSWECSGJVp1SE0BnRXdwQP41YTXFZ0310YjaTAUCC5qbMIWdEkHjfdSQtKBImnc85mkapq9w++XQ4zhauPWBtrPV3CcoCahjUaWdjrKVkibomlJZaN8MEO23CfQw==
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 893 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 37764
;; flags: qr rd ra cd ; qd: 1 an: 3 au: 0 ad: 1
;; QUESTIONS:
;; ingotronic.ch., type = DS, class = IN
;; ANSWERS:
ingotronic.ch. 3562 IN DS 6031 5 2 4A948F2FDADA24686E473EDAC00DCF972584C75E3FAA92C2021B6221449FF87E
ingotronic.ch. 3562 IN DS 6031 5 1 733D0218B571CD617B1A7493564B9FC4F12ADE82
ingotronic.ch. 3562 IN RRSIG DS 8 2 3600 20150129033614 20150105123019 60789 ch. rVPJP2HhzW7OkroK2axFj5Lb4iVWCH8Fp/Iq1rF952NDo72b8RiKje2RaAKJAGQ+wd0YgE+PAej04GCmkhlDJA/zvPeeTxuhy3HbJzReMlQ7fjyH+wW1hli+FuIYvogXWf7nO/9VyPORt8X/f/pjrOr3Vlj9sGLN8TGYpEuVSw4=
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 288 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 58114
;; flags: qr aa rd ra cd ; qd: 1 an: 4 au: 0 ad: 1
;; QUESTIONS:
;; ingotronic.ch., type = DNSKEY, class = IN
;; ANSWERS:
ingotronic.ch. 300 IN DNSKEY 257 3 5 AwEAAeA1vzmjaB+eBAcvhzpKEgAEFpvQ1rg4uKDW6MsQtacKoqBpgyep2+LuWotz5p/xYxj3NGsArwN8Ad5cY0FHRr8miTT0elOv6nvlqGIfRuhj/BXAQ1x4ihpSFslHw0lJMYFwxsUZWpUyjWX/nv1xRZMMwF46gui0N4OEbyTYusCk77D+A71k+K0EAitFIbIH4GCUKmH1H7HmXhSVH9bN/n7KEGwW32lmsuuUcJoRKDkcUvbMXY/9Xoa2quERrUg/rBbDUHowRPjYDS5GzY1+f4YY8s40BufGiqyUTKKXL953MVFK8gmezXA0hbmrnZ7CBOw/7238mORAdzExaX8n7CE=
ingotronic.ch. 300 IN DNSKEY 256 3 5 AwEAAZ2Xh77GFzpEDx7EHYxShqltHgkiG+BOjBGifEmnJhQSdE5/yNSLFNcdhZZ8HUPxYnaedTqJcFFg4AzUsQklF/fECegTJdZjaj2WoL0/I8K7HMfY/hVuRZUWPNglYi8agJRX6gdkFTCpUNI7stpgKqxtzUJhhw15uG/lKMplwqUr
ingotronic.ch. 300 IN RRSIG DNSKEY 5 2 300 20150125003700 20141226001657 6031 ingotronic.ch. rs1QlP2SlSpA2ELbzwg3DgWLzXWL3Lpv6CUJE2Q0qH2Zp7Qdy3cD+ZEtNh9v24Qv1M6JJ3zFt8mmZoCeW2ycuMbJCqBkW9CBuwF+VznZvZY2MxwPipvhvEEGP//0M8YAZJ66yQPDv3PTdAP8FYbIrJyvY44vwyncwbslpfHT9jAsrbfr3vuMuWps86dnP462q+0s1TxBfqi8mzo3gdavjHKWVNwohLahLKT+tWeu6DSzQv0YwMjwtkLgF7QRgx3ctIIkloOrnx9nHH1N6y+hxEB89fOlyVDjHhgL5uVtsD5fEdT0FJ2Gc/2nShEMMqIwr1/J9kUq1mNySff/uEe65Q==
ingotronic.ch. 300 IN RRSIG DNSKEY 5 2 300 20150125003700 20141226001657 17430 ingotronic.ch. mEwZjhQqeWksWD0TCnNBrtce4YkWJL3edqL6PvAUu8Fn+Ih437kEs3+pqdkgRsdYQ9HW+lBm/8pWwJlNAv0bi9NykItXMwAUFtncgq+6Pnh3iAM972GXSa5VV4LcGQ5b8CBdHCHiEKDqyPv5Hr5QfYL/FQaWlcNRh4QZZlZNPFA=
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 940 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 48146
;; flags: qr rd ra ad cd ; qd: 1 an: 4 au: 0 ad: 1
;; QUESTIONS:
;; ., type = DNSKEY, class = IN
;; ANSWERS:
. 87353 IN DNSKEY 256 3 8 AwEAAe3fSrbLBy3LOS7pnxEUhvPZTE2H5dIGsI/UfruI/nOEvWWa/PSX2BFedBkEqOlYdjdNF2f+6lmfk2Od/xu0v5bVqxFE+/24v3hZSlWBxvXzPTAGHrbW/IJYEPqlzVOAS4XdUgHg0N7IbLywNHMvB+Yf+Nm6ctyXXFLV4WTNnzs7
. 87353 IN DNSKEY 256 3 8 AwEAAaPD7Y7XIi1MOEREJNTrRhyqsY3gff6JWzg+XCbqut1sbcbvqyssHw8DT1AkRaAC92pO8xuyq5QEgEPL1IHfABLwpwXI5gTj4gdwi86bpkmlWs9fRpnn4DPDCTdrnxIejJXgClHikLJF3u3CdpNCMijq4CKdQbMlRZ3avv+G7rh7
. 87353 IN DNSKEY 257 3 8 AwEAAagAIKlVZrpC6Ia7gEzahOR+9W29euxhJhVVLOyQbSEW0O8gcCjFFVQUTf6v58fLjwBd0YI0EzrAcQqBGCzh/RStIoO8g0NfnfL2MTJRkxoXbfDaUeVPQuYEhg37NZWAJQ9VnMVDxP/VHL496M/QZxkjf5/Efucp2gaDX6RS6CXpoY68LsvPVjR0ZSwzz1apAzvN9dlzEheX7ICJBBtuA6G3LQpzW5hOA2hzCTMjJPJ8LbqF6dsV6DoBQzgul0sGIcGOYl7OyQdXfZ57relSQageu+ipAdTTJ25AsRTAoub8ONGcLmqrAmRLKBP1dfwhYB4N7knNnulqQxA+Uk1ihz0=
. 87353 IN RRSIG DNSKEY 8 0 172800 20150115235959 20150101000000 19036 . i8cAxD2pvQi1oAyvQxRpDfFlbqPzW+69QQEsDwE1eWOm5AtawO9U7lmsGps7sy/fVNvl1ljKBj4Djp9pb3U2FLogjiIlW0cDAkPmLlG9t+b/pjEfBNlhjANUVN06pvQVAfm+LcF26EaWT6FlISBqb6jSy4BHRa3Bdc4Sx7+pRSYSqVVvYxLkfAWsKPqGkvWhebJDndJJV9syXQXgZ+v/uJ+6XOS43xkAdeL8iBzIs/FlwMTfh3tVe3d0lb65IBBLlCzeQuetX+0Vu1YFcnD0mHc/wS2ZnAV5toAFmyVQBoY/XAZiZeaOkcROJ6Zmqezy7liwK7BqsYyAZntMhk8lbg==
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 883 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 59133
;; flags: qr rd ra ad cd ; qd: 1 an: 2 au: 0 ad: 1
;; QUESTIONS:
;; ch., type = DS, class = IN
;; ANSWERS:
ch. 953 IN DS 46375 8 2 8F96646FC68BB7E4AF4C0750A6096FBC0D4ECDA3D3FA6DA06FDDB42EE50C6CF3
ch. 953 IN RRSIG DS 8 1 86400 20150112170000 20150105160000 16665 . thY7xYWBBxiBjqbQIb9fAG4TmQgnziwM7q6P1T3/ITxmECdvOCQnnZA3uD7qmN8uM0HudsD7+y+zgD3rsH4RSTKdL4kHSI0OnCxToMTvklghEgFDezqIRm8NkWdI2H4Stwrj20nYKSpLQxPI2EE54gs18P3KyO8bAUYv8Qx73xU=
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 238 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 61813
;; flags: qr rd ra ad cd ; qd: 1 an: 4 au: 0 ad: 1
;; QUESTIONS:
;; ch., type = DNSKEY, class = IN
;; ANSWERS:
ch. 954 IN DNSKEY 256 3 8 AwEAAcSLdT0fEmcFmLpeUkAJoeVaHKiu+nbuc43fWlqaCRVf8t2HA4uWxOk0O5ci9nrFTc8nq8oa5fk5Cj7CHh4yrX9qUCfTdIWTyp8BDEdJpS+Dyb0u9wQuVj+nQMj4fLzdQf4TJs3/qxuiLr3nL1UUwlhhXeqSqGVb7p3mtB5HJ8ad
ch. 954 IN DNSKEY 256 3 8 AwEAAcsg0kY6fw1wzYMhSAKTy+Y2JzAst66P/1odp9NECJJHbU8f4nwziI3onoFSBV0ZiSZhY1aH5dhdDZ7BkrqhVXSrZPAz0CvzjIxmB1gSOf9DeZvjQvoy97HqYolxsf+B3QQv2RKBT67elF5+JisKg3/dQISelKn8LhabSoVrMlD1
ch. 954 IN DNSKEY 257 3 8 AwEAAb7GhhZ8IAy/AhwmSms5DeQK5ad09wIIplEpYoiAIYXPtJvT1ReFzyfTp/2YP+g/PWDwHPh4qKAHa9x0VgbIQcGAeNakmfkAdWEmCnca323/SAml3mwfaX62G7/uYWae5zh8QTxZKNd+K1yZ5x0IxnI31chSl5xymRbTEHYZDKwSIRFM3fTxUMt93WFaBVWELReYotJBr++rvAWdnlay5TPBTvheLBkaiqtgM4GP8HK07Y+86lsZnEsj5K3G1KTV5SPpa82rqYAwxG9VKbmSE/6/kBR5jJHjt1rRt5Oe7v18aEtw0YCEN4vxq+KuvMoNVqXUsE9LBwHJD+QNwi6wmB0=
ch. 954 IN RRSIG DNSKEY 8 1 86400 20150127100909 20141212090909 46375 ch. bT8q0FWyeMH0SulNo6UdIIgZYNATwYsee2bikq2Gh339Bufma8eaqWIPYT3XKmxYPBFOw0bVl+kLZxTwbR1CFoCDXoP+qgQhh4mf9qkNiv2CDSc+0FE3FRREn+DAhYTUEuB58FPiPakFB8s8O7T+k2qhDae7jy4/y7Jl1lnjaBY8s7bzOUPhF0KKCNZmvoKwtL23ZdVeTSV1xM3jkiNnpzBKbcoSWECSGJVp1SE0BnRXdwQP41YTXFZ0310YjaTAUCC5qbMIWdEkHjfdSQtKBImnc85mkapq9w++XQ4zhauPWBtrPV3CcoCahjUaWdjrKVkibomlJZaN8MEO23CfQw==
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 893 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 12624
;; flags: qr rd ra cd ; qd: 1 an: 3 au: 0 ad: 1
;; QUESTIONS:
;; ingotronic.ch., type = DS, class = IN
;; ANSWERS:
ingotronic.ch. 3562 IN DS 6031 5 2 4A948F2FDADA24686E473EDAC00DCF972584C75E3FAA92C2021B6221449FF87E
ingotronic.ch. 3562 IN DS 6031 5 1 733D0218B571CD617B1A7493564B9FC4F12ADE82
ingotronic.ch. 3562 IN RRSIG DS 8 2 3600 20150129033614 20150105123019 60789 ch. rVPJP2HhzW7OkroK2axFj5Lb4iVWCH8Fp/Iq1rF952NDo72b8RiKje2RaAKJAGQ+wd0YgE+PAej04GCmkhlDJA/zvPeeTxuhy3HbJzReMlQ7fjyH+wW1hli+FuIYvogXWf7nO/9VyPORt8X/f/pjrOr3Vlj9sGLN8TGYpEuVSw4=
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 288 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 55368
;; flags: qr aa rd ra cd ; qd: 1 an: 4 au: 0 ad: 1
;; QUESTIONS:
;; ingotronic.ch., type = DNSKEY, class = IN
;; ANSWERS:
ingotronic.ch. 300 IN DNSKEY 257 3 5 AwEAAeA1vzmjaB+eBAcvhzpKEgAEFpvQ1rg4uKDW6MsQtacKoqBpgyep2+LuWotz5p/xYxj3NGsArwN8Ad5cY0FHRr8miTT0elOv6nvlqGIfRuhj/BXAQ1x4ihpSFslHw0lJMYFwxsUZWpUyjWX/nv1xRZMMwF46gui0N4OEbyTYusCk77D+A71k+K0EAitFIbIH4GCUKmH1H7HmXhSVH9bN/n7KEGwW32lmsuuUcJoRKDkcUvbMXY/9Xoa2quERrUg/rBbDUHowRPjYDS5GzY1+f4YY8s40BufGiqyUTKKXL953MVFK8gmezXA0hbmrnZ7CBOw/7238mORAdzExaX8n7CE=
ingotronic.ch. 300 IN DNSKEY 256 3 5 AwEAAZ2Xh77GFzpEDx7EHYxShqltHgkiG+BOjBGifEmnJhQSdE5/yNSLFNcdhZZ8HUPxYnaedTqJcFFg4AzUsQklF/fECegTJdZjaj2WoL0/I8K7HMfY/hVuRZUWPNglYi8agJRX6gdkFTCpUNI7stpgKqxtzUJhhw15uG/lKMplwqUr
ingotronic.ch. 300 IN RRSIG DNSKEY 5 2 300 20150125003700 20141226001657 6031 ingotronic.ch. rs1QlP2SlSpA2ELbzwg3DgWLzXWL3Lpv6CUJE2Q0qH2Zp7Qdy3cD+ZEtNh9v24Qv1M6JJ3zFt8mmZoCeW2ycuMbJCqBkW9CBuwF+VznZvZY2MxwPipvhvEEGP//0M8YAZJ66yQPDv3PTdAP8FYbIrJyvY44vwyncwbslpfHT9jAsrbfr3vuMuWps86dnP462q+0s1TxBfqi8mzo3gdavjHKWVNwohLahLKT+tWeu6DSzQv0YwMjwtkLgF7QRgx3ctIIkloOrnx9nHH1N6y+hxEB89fOlyVDjHhgL5uVtsD5fEdT0FJ2Gc/2nShEMMqIwr1/J9kUq1mNySff/uEe65Q==
ingotronic.ch. 300 IN RRSIG DNSKEY 5 2 300 20150125003700 20141226001657 17430 ingotronic.ch. mEwZjhQqeWksWD0TCnNBrtce4YkWJL3edqL6PvAUu8Fn+Ih437kEs3+pqdkgRsdYQ9HW+lBm/8pWwJlNAv0bi9NykItXMwAUFtncgq+6Pnh3iAM972GXSa5VV4LcGQ5b8CBdHCHiEKDqyPv5Hr5QfYL/FQaWlcNRh4QZZlZNPFA=
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 940 bytes
###############################################
testNoDataWhenWcNsecProvesType 0000664 0000000 0000000 00000033364 13020541473 0037544 0 ustar 00root root 0000000 0000000 dnssecjava-1.1.3/src/test/resources/recordings/org_jitsi_dnssec_validator_TestValUtils #Date: 2015-01-06T22:35:24+01:00
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 54210
;; flags: qr aa rd ra cd ; qd: 1 an: 2 au: 2 ad: 3
;; QUESTIONS:
;; *.c.ingotronic.ch., type = NSEC, class = IN
;; ANSWERS:
*.c.ingotronic.ch. 300 IN NSEC cfailed.ingotronic.ch. A RRSIG NSEC
*.c.ingotronic.ch. 300 IN RRSIG NSEC 5 3 300 20150125000532 20141225234703 17430 ingotronic.ch. Lf7FP3WsqHc3SUznxjp367ehSI5mcUE7OzvHQj68BfC77FPylpt3YLtyirEZVjVKPjQ6maarQakizn6u7KFf1jFr2kGpS1rZCvyfAxGX6wwIZK/Wf0lfhP0IquQd+kX2OlmRbbemFI/lFG72NAcB+19t8tcwV5k6ADkxC2L6o/4=
;; AUTHORITY RECORDS:
ingotronic.ch. 300 IN NS ns1.ingotronic.ch.
ingotronic.ch. 300 IN RRSIG NS 5 2 300 20150125000532 20141225234703 17430 ingotronic.ch. VuzVJM3McSHlcdngCG/G23zCikq8tXE0CZV2ZSgUFXXFMIEoM6PMi1QRQ/8VF3tee4WGpRx2jhtkui0wFRFfwIhW7G1uPDT4qogaR3KLIyuCEsMxhRH3WJZNrLmLqlSBGvd9OBJwbmryqm3Zzqvrk+E+rh8OJeifnBBpHAX4eHg=
;; ADDITIONAL RECORDS:
ns1.ingotronic.ch. 300 IN A 62.192.5.131
ns1.ingotronic.ch. 300 IN RRSIG A 5 3 300 20150125005754 20141226001054 17430 ingotronic.ch. fNG1RZM53pXwBxruHNaSZszxVzNLoCq8VZsTjAzYH2vSLzHXYVGJFTLIeY0K9APAdyJU8WuwmABmn7XY0Kg39kRG77uoFlqUws2PdTz2QKOwJGZY7W88Ak2Y9lkDBcK8o3wJHVptrT8R7p/1U7UfjF0kqPUkakk2B0EbFWdagFg=
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 642 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 39900
;; flags: qr rd ra ad cd ; qd: 1 an: 4 au: 0 ad: 1
;; QUESTIONS:
;; ., type = DNSKEY, class = IN
;; ANSWERS:
. 87349 IN DNSKEY 257 3 8 AwEAAagAIKlVZrpC6Ia7gEzahOR+9W29euxhJhVVLOyQbSEW0O8gcCjFFVQUTf6v58fLjwBd0YI0EzrAcQqBGCzh/RStIoO8g0NfnfL2MTJRkxoXbfDaUeVPQuYEhg37NZWAJQ9VnMVDxP/VHL496M/QZxkjf5/Efucp2gaDX6RS6CXpoY68LsvPVjR0ZSwzz1apAzvN9dlzEheX7ICJBBtuA6G3LQpzW5hOA2hzCTMjJPJ8LbqF6dsV6DoBQzgul0sGIcGOYl7OyQdXfZ57relSQageu+ipAdTTJ25AsRTAoub8ONGcLmqrAmRLKBP1dfwhYB4N7knNnulqQxA+Uk1ihz0=
. 87349 IN DNSKEY 256 3 8 AwEAAaPD7Y7XIi1MOEREJNTrRhyqsY3gff6JWzg+XCbqut1sbcbvqyssHw8DT1AkRaAC92pO8xuyq5QEgEPL1IHfABLwpwXI5gTj4gdwi86bpkmlWs9fRpnn4DPDCTdrnxIejJXgClHikLJF3u3CdpNCMijq4CKdQbMlRZ3avv+G7rh7
. 87349 IN DNSKEY 256 3 8 AwEAAe3fSrbLBy3LOS7pnxEUhvPZTE2H5dIGsI/UfruI/nOEvWWa/PSX2BFedBkEqOlYdjdNF2f+6lmfk2Od/xu0v5bVqxFE+/24v3hZSlWBxvXzPTAGHrbW/IJYEPqlzVOAS4XdUgHg0N7IbLywNHMvB+Yf+Nm6ctyXXFLV4WTNnzs7
. 87349 IN RRSIG DNSKEY 8 0 172800 20150115235959 20150101000000 19036 . i8cAxD2pvQi1oAyvQxRpDfFlbqPzW+69QQEsDwE1eWOm5AtawO9U7lmsGps7sy/fVNvl1ljKBj4Djp9pb3U2FLogjiIlW0cDAkPmLlG9t+b/pjEfBNlhjANUVN06pvQVAfm+LcF26EaWT6FlISBqb6jSy4BHRa3Bdc4Sx7+pRSYSqVVvYxLkfAWsKPqGkvWhebJDndJJV9syXQXgZ+v/uJ+6XOS43xkAdeL8iBzIs/FlwMTfh3tVe3d0lb65IBBLlCzeQuetX+0Vu1YFcnD0mHc/wS2ZnAV5toAFmyVQBoY/XAZiZeaOkcROJ6Zmqezy7liwK7BqsYyAZntMhk8lbg==
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 883 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 12390
;; flags: qr rd ra ad cd ; qd: 1 an: 2 au: 0 ad: 1
;; QUESTIONS:
;; ch., type = DS, class = IN
;; ANSWERS:
ch. 949 IN DS 46375 8 2 8F96646FC68BB7E4AF4C0750A6096FBC0D4ECDA3D3FA6DA06FDDB42EE50C6CF3
ch. 949 IN RRSIG DS 8 1 86400 20150112170000 20150105160000 16665 . thY7xYWBBxiBjqbQIb9fAG4TmQgnziwM7q6P1T3/ITxmECdvOCQnnZA3uD7qmN8uM0HudsD7+y+zgD3rsH4RSTKdL4kHSI0OnCxToMTvklghEgFDezqIRm8NkWdI2H4Stwrj20nYKSpLQxPI2EE54gs18P3KyO8bAUYv8Qx73xU=
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 238 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 21937
;; flags: qr rd ra ad cd ; qd: 1 an: 4 au: 0 ad: 1
;; QUESTIONS:
;; ch., type = DNSKEY, class = IN
;; ANSWERS:
ch. 950 IN DNSKEY 257 3 8 AwEAAb7GhhZ8IAy/AhwmSms5DeQK5ad09wIIplEpYoiAIYXPtJvT1ReFzyfTp/2YP+g/PWDwHPh4qKAHa9x0VgbIQcGAeNakmfkAdWEmCnca323/SAml3mwfaX62G7/uYWae5zh8QTxZKNd+K1yZ5x0IxnI31chSl5xymRbTEHYZDKwSIRFM3fTxUMt93WFaBVWELReYotJBr++rvAWdnlay5TPBTvheLBkaiqtgM4GP8HK07Y+86lsZnEsj5K3G1KTV5SPpa82rqYAwxG9VKbmSE/6/kBR5jJHjt1rRt5Oe7v18aEtw0YCEN4vxq+KuvMoNVqXUsE9LBwHJD+QNwi6wmB0=
ch. 950 IN DNSKEY 256 3 8 AwEAAcsg0kY6fw1wzYMhSAKTy+Y2JzAst66P/1odp9NECJJHbU8f4nwziI3onoFSBV0ZiSZhY1aH5dhdDZ7BkrqhVXSrZPAz0CvzjIxmB1gSOf9DeZvjQvoy97HqYolxsf+B3QQv2RKBT67elF5+JisKg3/dQISelKn8LhabSoVrMlD1
ch. 950 IN DNSKEY 256 3 8 AwEAAcSLdT0fEmcFmLpeUkAJoeVaHKiu+nbuc43fWlqaCRVf8t2HA4uWxOk0O5ci9nrFTc8nq8oa5fk5Cj7CHh4yrX9qUCfTdIWTyp8BDEdJpS+Dyb0u9wQuVj+nQMj4fLzdQf4TJs3/qxuiLr3nL1UUwlhhXeqSqGVb7p3mtB5HJ8ad
ch. 950 IN RRSIG DNSKEY 8 1 86400 20150127100909 20141212090909 46375 ch. bT8q0FWyeMH0SulNo6UdIIgZYNATwYsee2bikq2Gh339Bufma8eaqWIPYT3XKmxYPBFOw0bVl+kLZxTwbR1CFoCDXoP+qgQhh4mf9qkNiv2CDSc+0FE3FRREn+DAhYTUEuB58FPiPakFB8s8O7T+k2qhDae7jy4/y7Jl1lnjaBY8s7bzOUPhF0KKCNZmvoKwtL23ZdVeTSV1xM3jkiNnpzBKbcoSWECSGJVp1SE0BnRXdwQP41YTXFZ0310YjaTAUCC5qbMIWdEkHjfdSQtKBImnc85mkapq9w++XQ4zhauPWBtrPV3CcoCahjUaWdjrKVkibomlJZaN8MEO23CfQw==
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 893 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 52675
;; flags: qr rd ra cd ; qd: 1 an: 3 au: 0 ad: 1
;; QUESTIONS:
;; ingotronic.ch., type = DS, class = IN
;; ANSWERS:
ingotronic.ch. 3558 IN DS 6031 5 2 4A948F2FDADA24686E473EDAC00DCF972584C75E3FAA92C2021B6221449FF87E
ingotronic.ch. 3558 IN DS 6031 5 1 733D0218B571CD617B1A7493564B9FC4F12ADE82
ingotronic.ch. 3558 IN RRSIG DS 8 2 3600 20150129033614 20150105123019 60789 ch. rVPJP2HhzW7OkroK2axFj5Lb4iVWCH8Fp/Iq1rF952NDo72b8RiKje2RaAKJAGQ+wd0YgE+PAej04GCmkhlDJA/zvPeeTxuhy3HbJzReMlQ7fjyH+wW1hli+FuIYvogXWf7nO/9VyPORt8X/f/pjrOr3Vlj9sGLN8TGYpEuVSw4=
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 288 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 27862
;; flags: qr aa rd ra cd ; qd: 1 an: 4 au: 0 ad: 1
;; QUESTIONS:
;; ingotronic.ch., type = DNSKEY, class = IN
;; ANSWERS:
ingotronic.ch. 300 IN DNSKEY 256 3 5 AwEAAZ2Xh77GFzpEDx7EHYxShqltHgkiG+BOjBGifEmnJhQSdE5/yNSLFNcdhZZ8HUPxYnaedTqJcFFg4AzUsQklF/fECegTJdZjaj2WoL0/I8K7HMfY/hVuRZUWPNglYi8agJRX6gdkFTCpUNI7stpgKqxtzUJhhw15uG/lKMplwqUr
ingotronic.ch. 300 IN DNSKEY 257 3 5 AwEAAeA1vzmjaB+eBAcvhzpKEgAEFpvQ1rg4uKDW6MsQtacKoqBpgyep2+LuWotz5p/xYxj3NGsArwN8Ad5cY0FHRr8miTT0elOv6nvlqGIfRuhj/BXAQ1x4ihpSFslHw0lJMYFwxsUZWpUyjWX/nv1xRZMMwF46gui0N4OEbyTYusCk77D+A71k+K0EAitFIbIH4GCUKmH1H7HmXhSVH9bN/n7KEGwW32lmsuuUcJoRKDkcUvbMXY/9Xoa2quERrUg/rBbDUHowRPjYDS5GzY1+f4YY8s40BufGiqyUTKKXL953MVFK8gmezXA0hbmrnZ7CBOw/7238mORAdzExaX8n7CE=
ingotronic.ch. 300 IN RRSIG DNSKEY 5 2 300 20150125003700 20141226001657 6031 ingotronic.ch. rs1QlP2SlSpA2ELbzwg3DgWLzXWL3Lpv6CUJE2Q0qH2Zp7Qdy3cD+ZEtNh9v24Qv1M6JJ3zFt8mmZoCeW2ycuMbJCqBkW9CBuwF+VznZvZY2MxwPipvhvEEGP//0M8YAZJ66yQPDv3PTdAP8FYbIrJyvY44vwyncwbslpfHT9jAsrbfr3vuMuWps86dnP462q+0s1TxBfqi8mzo3gdavjHKWVNwohLahLKT+tWeu6DSzQv0YwMjwtkLgF7QRgx3ctIIkloOrnx9nHH1N6y+hxEB89fOlyVDjHhgL5uVtsD5fEdT0FJ2Gc/2nShEMMqIwr1/J9kUq1mNySff/uEe65Q==
ingotronic.ch. 300 IN RRSIG DNSKEY 5 2 300 20150125003700 20141226001657 17430 ingotronic.ch. mEwZjhQqeWksWD0TCnNBrtce4YkWJL3edqL6PvAUu8Fn+Ih437kEs3+pqdkgRsdYQ9HW+lBm/8pWwJlNAv0bi9NykItXMwAUFtncgq+6Pnh3iAM972GXSa5VV4LcGQ5b8CBdHCHiEKDqyPv5Hr5QfYL/FQaWlcNRh4QZZlZNPFA=
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 940 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 59857
;; flags: qr rd ra ad cd ; qd: 1 an: 4 au: 0 ad: 1
;; QUESTIONS:
;; ., type = DNSKEY, class = IN
;; ANSWERS:
. 87349 IN DNSKEY 256 3 8 AwEAAe3fSrbLBy3LOS7pnxEUhvPZTE2H5dIGsI/UfruI/nOEvWWa/PSX2BFedBkEqOlYdjdNF2f+6lmfk2Od/xu0v5bVqxFE+/24v3hZSlWBxvXzPTAGHrbW/IJYEPqlzVOAS4XdUgHg0N7IbLywNHMvB+Yf+Nm6ctyXXFLV4WTNnzs7
. 87349 IN DNSKEY 257 3 8 AwEAAagAIKlVZrpC6Ia7gEzahOR+9W29euxhJhVVLOyQbSEW0O8gcCjFFVQUTf6v58fLjwBd0YI0EzrAcQqBGCzh/RStIoO8g0NfnfL2MTJRkxoXbfDaUeVPQuYEhg37NZWAJQ9VnMVDxP/VHL496M/QZxkjf5/Efucp2gaDX6RS6CXpoY68LsvPVjR0ZSwzz1apAzvN9dlzEheX7ICJBBtuA6G3LQpzW5hOA2hzCTMjJPJ8LbqF6dsV6DoBQzgul0sGIcGOYl7OyQdXfZ57relSQageu+ipAdTTJ25AsRTAoub8ONGcLmqrAmRLKBP1dfwhYB4N7knNnulqQxA+Uk1ihz0=
. 87349 IN DNSKEY 256 3 8 AwEAAaPD7Y7XIi1MOEREJNTrRhyqsY3gff6JWzg+XCbqut1sbcbvqyssHw8DT1AkRaAC92pO8xuyq5QEgEPL1IHfABLwpwXI5gTj4gdwi86bpkmlWs9fRpnn4DPDCTdrnxIejJXgClHikLJF3u3CdpNCMijq4CKdQbMlRZ3avv+G7rh7
. 87349 IN RRSIG DNSKEY 8 0 172800 20150115235959 20150101000000 19036 . i8cAxD2pvQi1oAyvQxRpDfFlbqPzW+69QQEsDwE1eWOm5AtawO9U7lmsGps7sy/fVNvl1ljKBj4Djp9pb3U2FLogjiIlW0cDAkPmLlG9t+b/pjEfBNlhjANUVN06pvQVAfm+LcF26EaWT6FlISBqb6jSy4BHRa3Bdc4Sx7+pRSYSqVVvYxLkfAWsKPqGkvWhebJDndJJV9syXQXgZ+v/uJ+6XOS43xkAdeL8iBzIs/FlwMTfh3tVe3d0lb65IBBLlCzeQuetX+0Vu1YFcnD0mHc/wS2ZnAV5toAFmyVQBoY/XAZiZeaOkcROJ6Zmqezy7liwK7BqsYyAZntMhk8lbg==
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 883 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 58740
;; flags: qr rd ra ad cd ; qd: 1 an: 2 au: 0 ad: 1
;; QUESTIONS:
;; ch., type = DS, class = IN
;; ANSWERS:
ch. 949 IN DS 46375 8 2 8F96646FC68BB7E4AF4C0750A6096FBC0D4ECDA3D3FA6DA06FDDB42EE50C6CF3
ch. 949 IN RRSIG DS 8 1 86400 20150112170000 20150105160000 16665 . thY7xYWBBxiBjqbQIb9fAG4TmQgnziwM7q6P1T3/ITxmECdvOCQnnZA3uD7qmN8uM0HudsD7+y+zgD3rsH4RSTKdL4kHSI0OnCxToMTvklghEgFDezqIRm8NkWdI2H4Stwrj20nYKSpLQxPI2EE54gs18P3KyO8bAUYv8Qx73xU=
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 238 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 33518
;; flags: qr rd ra ad cd ; qd: 1 an: 4 au: 0 ad: 1
;; QUESTIONS:
;; ch., type = DNSKEY, class = IN
;; ANSWERS:
ch. 950 IN DNSKEY 256 3 8 AwEAAcSLdT0fEmcFmLpeUkAJoeVaHKiu+nbuc43fWlqaCRVf8t2HA4uWxOk0O5ci9nrFTc8nq8oa5fk5Cj7CHh4yrX9qUCfTdIWTyp8BDEdJpS+Dyb0u9wQuVj+nQMj4fLzdQf4TJs3/qxuiLr3nL1UUwlhhXeqSqGVb7p3mtB5HJ8ad
ch. 950 IN DNSKEY 256 3 8 AwEAAcsg0kY6fw1wzYMhSAKTy+Y2JzAst66P/1odp9NECJJHbU8f4nwziI3onoFSBV0ZiSZhY1aH5dhdDZ7BkrqhVXSrZPAz0CvzjIxmB1gSOf9DeZvjQvoy97HqYolxsf+B3QQv2RKBT67elF5+JisKg3/dQISelKn8LhabSoVrMlD1
ch. 950 IN DNSKEY 257 3 8 AwEAAb7GhhZ8IAy/AhwmSms5DeQK5ad09wIIplEpYoiAIYXPtJvT1ReFzyfTp/2YP+g/PWDwHPh4qKAHa9x0VgbIQcGAeNakmfkAdWEmCnca323/SAml3mwfaX62G7/uYWae5zh8QTxZKNd+K1yZ5x0IxnI31chSl5xymRbTEHYZDKwSIRFM3fTxUMt93WFaBVWELReYotJBr++rvAWdnlay5TPBTvheLBkaiqtgM4GP8HK07Y+86lsZnEsj5K3G1KTV5SPpa82rqYAwxG9VKbmSE/6/kBR5jJHjt1rRt5Oe7v18aEtw0YCEN4vxq+KuvMoNVqXUsE9LBwHJD+QNwi6wmB0=
ch. 950 IN RRSIG DNSKEY 8 1 86400 20150127100909 20141212090909 46375 ch. bT8q0FWyeMH0SulNo6UdIIgZYNATwYsee2bikq2Gh339Bufma8eaqWIPYT3XKmxYPBFOw0bVl+kLZxTwbR1CFoCDXoP+qgQhh4mf9qkNiv2CDSc+0FE3FRREn+DAhYTUEuB58FPiPakFB8s8O7T+k2qhDae7jy4/y7Jl1lnjaBY8s7bzOUPhF0KKCNZmvoKwtL23ZdVeTSV1xM3jkiNnpzBKbcoSWECSGJVp1SE0BnRXdwQP41YTXFZ0310YjaTAUCC5qbMIWdEkHjfdSQtKBImnc85mkapq9w++XQ4zhauPWBtrPV3CcoCahjUaWdjrKVkibomlJZaN8MEO23CfQw==
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 893 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 60752
;; flags: qr rd ra cd ; qd: 1 an: 3 au: 0 ad: 1
;; QUESTIONS:
;; ingotronic.ch., type = DS, class = IN
;; ANSWERS:
ingotronic.ch. 3558 IN DS 6031 5 1 733D0218B571CD617B1A7493564B9FC4F12ADE82
ingotronic.ch. 3558 IN DS 6031 5 2 4A948F2FDADA24686E473EDAC00DCF972584C75E3FAA92C2021B6221449FF87E
ingotronic.ch. 3558 IN RRSIG DS 8 2 3600 20150129033614 20150105123019 60789 ch. rVPJP2HhzW7OkroK2axFj5Lb4iVWCH8Fp/Iq1rF952NDo72b8RiKje2RaAKJAGQ+wd0YgE+PAej04GCmkhlDJA/zvPeeTxuhy3HbJzReMlQ7fjyH+wW1hli+FuIYvogXWf7nO/9VyPORt8X/f/pjrOr3Vlj9sGLN8TGYpEuVSw4=
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 288 bytes
###############################################
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 35134
;; flags: qr aa rd ra cd ; qd: 1 an: 4 au: 0 ad: 1
;; QUESTIONS:
;; ingotronic.ch., type = DNSKEY, class = IN
;; ANSWERS:
ingotronic.ch. 300 IN DNSKEY 257 3 5 AwEAAeA1vzmjaB+eBAcvhzpKEgAEFpvQ1rg4uKDW6MsQtacKoqBpgyep2+LuWotz5p/xYxj3NGsArwN8Ad5cY0FHRr8miTT0elOv6nvlqGIfRuhj/BXAQ1x4ihpSFslHw0lJMYFwxsUZWpUyjWX/nv1xRZMMwF46gui0N4OEbyTYusCk77D+A71k+K0EAitFIbIH4GCUKmH1H7HmXhSVH9bN/n7KEGwW32lmsuuUcJoRKDkcUvbMXY/9Xoa2quERrUg/rBbDUHowRPjYDS5GzY1+f4YY8s40BufGiqyUTKKXL953MVFK8gmezXA0hbmrnZ7CBOw/7238mORAdzExaX8n7CE=
ingotronic.ch. 300 IN DNSKEY 256 3 5 AwEAAZ2Xh77GFzpEDx7EHYxShqltHgkiG+BOjBGifEmnJhQSdE5/yNSLFNcdhZZ8HUPxYnaedTqJcFFg4AzUsQklF/fECegTJdZjaj2WoL0/I8K7HMfY/hVuRZUWPNglYi8agJRX6gdkFTCpUNI7stpgKqxtzUJhhw15uG/lKMplwqUr
ingotronic.ch. 300 IN RRSIG DNSKEY 5 2 300 20150125003700 20141226001657 6031 ingotronic.ch. rs1QlP2SlSpA2ELbzwg3DgWLzXWL3Lpv6CUJE2Q0qH2Zp7Qdy3cD+ZEtNh9v24Qv1M6JJ3zFt8mmZoCeW2ycuMbJCqBkW9CBuwF+VznZvZY2MxwPipvhvEEGP//0M8YAZJ66yQPDv3PTdAP8FYbIrJyvY44vwyncwbslpfHT9jAsrbfr3vuMuWps86dnP462q+0s1TxBfqi8mzo3gdavjHKWVNwohLahLKT+tWeu6DSzQv0YwMjwtkLgF7QRgx3ctIIkloOrnx9nHH1N6y+hxEB89fOlyVDjHhgL5uVtsD5fEdT0FJ2Gc/2nShEMMqIwr1/J9kUq1mNySff/uEe65Q==
ingotronic.ch. 300 IN RRSIG DNSKEY 5 2 300 20150125003700 20141226001657 17430 ingotronic.ch. mEwZjhQqeWksWD0TCnNBrtce4YkWJL3edqL6PvAUu8Fn+Ih437kEs3+pqdkgRsdYQ9HW+lBm/8pWwJlNAv0bi9NykItXMwAUFtncgq+6Pnh3iAM972GXSa5VV4LcGQ5b8CBdHCHiEKDqyPv5Hr5QfYL/FQaWlcNRh4QZZlZNPFA=
;; AUTHORITY RECORDS:
;; ADDITIONAL RECORDS:
. 32768 CLASS4096 OPT ; payload 4096, xrcode 0, version 0, flags 32768
;; Message size: 940 bytes
###############################################
testNsecProvesNoDS 0000664 0000000 0000000 00000000041 13020541473 0035205 0 ustar 00root root 0000000 0000000 dnssecjava-1.1.3/src/test/resources/recordings/org_jitsi_dnssec_validator_TestValUtils #Date: 2015-01-06T22:35:22+01:00
testNsecProvesNoDSWithDSPresentForRoot 0000664 0000000 0000000 00000000041 13020541473 0041144 0 ustar 00root root 0000000 0000000 dnssecjava-1.1.3/src/test/resources/recordings/org_jitsi_dnssec_validator_TestValUtils #Date: 2015-01-06T22:35:22+01:00
testNsecProvesNoDSWithSOAForNonRoot 0000664 0000000 0000000 00000000041 13020541473 0040372 0 ustar 00root root 0000000 0000000 dnssecjava-1.1.3/src/test/resources/recordings/org_jitsi_dnssec_validator_TestValUtils #Date: 2015-01-06T22:35:21+01:00
dnssecjava-1.1.3/src/test/resources/trust_anchors 0000664 0000000 0000000 00000000216 13020541473 0022234 0 ustar 00root root 0000000 0000000 . IN DS 19036 8 1 B256BD09DC8DD59F0E0F0D8541B8328DD986DF6E
. IN DS 19036 8 2 49AAC11D7B6F6446702E54A1607371607A1A41855200FD2CE1CDDE32F24E8FB5
dnssecjava-1.1.3/src/test/resources/trust_anchors_dnskey_invalid 0000664 0000000 0000000 00000001136 13020541473 0025321 0 ustar 00root root 0000000 0000000 . 148029 IN DNSKEY 257 3 8 BwEAAagAIKlVZrpC6Ia7gEzahOR+9W29euxhJhVVLOyQbSEW0O8gcCjFFVQUTf6v58fLjwBd0YI0EzrAcQqBGCzh/RStIoO8g0NfnfL2MTJRkxoXbfDaUeVPQuYEhg37NZWAJQ9VnMVDxP/VHL496M/QZxkjf5/Efucp2gaDX6RS6CXpoY68LsvPVjR0ZSwzz1apAzvN9dlzEheX7ICJBBtuA6G3LQpzW5hOA2hzCTMjJPJ8LbqF6dsV6DoBQzgul0sGIcGOYl7OyQdXfZ57relSQageu+ipAdTTJ25AsRTAoub8ONGcLmqrAmRLKBP1dfwhYB4N7knNnulqQxA+Uk1ihz0=
. 148029 IN DNSKEY 256 3 8 BwEAAc5byZvwmHUlCQt7WSeAr3OZ2ao4x0Yj/3UcbtFzQ0T67N7CpYmNqFmfvXxksS1/E+mtT0axFVDjiJjtklUsyqIm9ZlWGZKU3GZqI9Sfp1BjQkhi+yLa4m4y4z2N28rxWXsWHCY740PREnmUtgXRdthwABYaB2WPum3yRGxNCP1/
dnssecjava-1.1.3/src/test/resources/trust_anchors_empty 0000664 0000000 0000000 00000000001 13020541473 0023442 0 ustar 00root root 0000000 0000000
dnssecjava-1.1.3/src/test/resources/trust_anchors_invalid 0000664 0000000 0000000 00000000216 13020541473 0023742 0 ustar 00root root 0000000 0000000 . IN DS 19036 8 1 B256BD09DC8DD59F0E0F0D8541B8328DD986DF6F
. IN DS 19036 8 2 49AAC11D7B6F6446702E54A1607371607A1A41855200FD2CE1CDDE32F24E8FB6
dnssecjava-1.1.3/src/test/resources/trust_anchors_test 0000664 0000000 0000000 00000001376 13020541473 0023303 0 ustar 00root root 0000000 0000000 . IN DS 19036 8 1 B256BD09DC8DD59F0E0F0D8541B8328DD986DF6E
. IN DS 19036 8 2 49AAC11D7B6F6446702E54A1607371607A1A41855200FD2CE1CDDE32F24E8FB5
. CH DS 19036 8 1 B256BD09DC8DD59F0E0F0D8541B8328DD986DF6E
bla. IN DS 19036 8 1 B256BD09DC8DD59F0E0F0D8541B8328DD986DF6E
bla. IN DNSKEY 256 3 5 ( AQPSKmynfzW4kyBv015MUG2DeIQ3
Cbl+BBZH4b/0PY1kxkmvHjcZc8no
kfzj31GajIQKY+5CptLr3buXA10h
WqTkF7H6RfoRqXQeogmMHfpftf6z
Mv1LyBUgia7za6ZEzOJBOztyvhjL
742iU/TpPSEDhm2SNKLijfUppn1U
aNvv4w== )
x. IN A 127.0.0.1
x. IN MX 10 asdf.bla.
dnssecjava-1.1.3/src/test/resources/unbound/ 0000775 0000000 0000000 00000000000 13020541473 0021066 5 ustar 00root root 0000000 0000000 dnssecjava-1.1.3/src/test/resources/unbound/val_adbit.rpl 0000664 0000000 0000000 00000012653 13020541473 0023541 0 ustar 00root root 0000000 0000000 ; config options
; The island of trust is at example.com
server:
trust-anchor: "example.com. 3600 IN DS 2854 3 1 46e4ffc6e9a4793b488954bd3f0cc6af0dfb201b"
val-override-date: "20070916134226"
target-fetch-policy: "0 0 0 0 0"
stub-zone:
name: "."
stub-addr: 193.0.14.129 # K.ROOT-SERVERS.NET.
CONFIG_END
SCENARIO_BEGIN Test validator AD bit signaling
; K.ROOT-SERVERS.NET.
RANGE_BEGIN 0 100
ADDRESS 193.0.14.129
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
. IN NS
SECTION ANSWER
. IN NS K.ROOT-SERVERS.NET.
SECTION ADDITIONAL
K.ROOT-SERVERS.NET. IN A 193.0.14.129
ENTRY_END
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
www.example.com. IN A
SECTION AUTHORITY
com. IN NS a.gtld-servers.net.
SECTION ADDITIONAL
a.gtld-servers.net. IN A 192.5.6.30
ENTRY_END
RANGE_END
; a.gtld-servers.net.
RANGE_BEGIN 0 100
ADDRESS 192.5.6.30
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
com. IN NS
SECTION ANSWER
com. IN NS a.gtld-servers.net.
SECTION ADDITIONAL
a.gtld-servers.net. IN A 192.5.6.30
ENTRY_END
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
www.example.com. IN A
SECTION AUTHORITY
example.com. IN NS ns.example.com.
SECTION ADDITIONAL
ns.example.com. IN A 1.2.3.4
ENTRY_END
RANGE_END
; ns.example.com.
RANGE_BEGIN 0 100
ADDRESS 1.2.3.4
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
example.com. IN NS
SECTION ANSWER
example.com. IN NS ns.example.com.
example.com. 3600 IN RRSIG NS 3 2 3600 20070926134150 20070829134150 2854 example.com. MC0CFQCN+qHdJxoI/2tNKwsb08pra/G7aAIUAWA5sDdJTbrXA1/3OaesGBAO3sI= ;{id = 2854}
SECTION ADDITIONAL
ns.example.com. IN A 1.2.3.4
ns.example.com. 3600 IN RRSIG A 3 3 3600 20070926135752 20070829135752 2854 example.com. MC0CFQCMSWxVehgOQLoYclB9PIAbNP229AIUeH0vNNGJhjnZiqgIOKvs1EhzqAo= ;{id = 2854}
ENTRY_END
; response to DNSKEY priming query
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
example.com. IN DNSKEY
SECTION ANSWER
example.com. 3600 IN DNSKEY 256 3 3 ALXLUsWqUrY3JYER3T4TBJII s70j+sDS/UT2QRp61SE7S3E EXopNXoFE73JLRmvpi/UrOO/Vz4Se 6wXv/CYCKjGw06U4WRgR YXcpEhJROyNapmdIKSx hOzfLVE1gqA0PweZR8d tY3aNQSRn3sPpwJr6Mi /PqQKAMMrZ9ckJpf1+b QMOOvxgzz2U1GS18b3y ZKcgTMEaJzd/GZYzi/B N2DzQ0MsrSwYXfsNLFO Bbs8PJMW4LYIxeeOe6rUgkWOF 7CC9Dh/dduQ1QrsJhmZAEFfd6ByYV+ ;{id = 2854 (zsk), size = 1688b}
example.com. 3600 IN RRSIG DNSKEY 3 2 3600 20070926134802 20070829134802 2854 example.com. MCwCFG1yhRNtTEa3Eno2zhVVuy2EJX3wAhQeLyUp6+UXcpC5qGNu9tkrTEgPUg== ;{id = 2854}
SECTION AUTHORITY
example.com. IN NS ns.example.com.
example.com. 3600 IN RRSIG NS 3 2 3600 20070926134150 20070829134150 2854 example.com. MC0CFQCN+qHdJxoI/2tNKwsb08pra/G7aAIUAWA5sDdJTbrXA1/3OaesGBAO3sI= ;{id = 2854}
SECTION ADDITIONAL
ns.example.com. IN A 1.2.3.4
ns.example.com. 3600 IN RRSIG A 3 3 3600 20070926135752 20070829135752 2854 example.com. MC0CFQCMSWxVehgOQLoYclB9PIAbNP229AIUeH0vNNGJhjnZiqgIOKvs1EhzqAo= ;{id = 2854}
ENTRY_END
; response to query of interest
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
www.example.com. IN A
SECTION ANSWER
www.example.com. IN A 10.20.30.40
www.example.com. 3600 IN RRSIG A 3 3 3600 20070926134150 20070829134150 2854 example.com. MC0CFC99iE9K5y2WNgI0gFvBWaTi9wm6AhUAoUqOpDtG5Zct+Qr9F3mSdnbc6V4= ;{id = 2854}
SECTION AUTHORITY
example.com. IN NS ns.example.com.
example.com. 3600 IN RRSIG NS 3 2 3600 20070926134150 20070829134150 2854 example.com. MC0CFQCN+qHdJxoI/2tNKwsb08pra/G7aAIUAWA5sDdJTbrXA1/3OaesGBAO3sI= ;{id = 2854}
SECTION ADDITIONAL
ns.example.com. IN A 1.2.3.4
ns.example.com. 3600 IN RRSIG A 3 3 3600 20070926134150 20070829134150 2854 example.com. MC0CFQCQMyTjn7WWwpwAR1LlVeLpRgZGuQIUCcJDEkwAuzytTDRlYK7nIMwH1CM= ;{id = 2854}
ENTRY_END
RANGE_END
STEP 1 QUERY
ENTRY_BEGIN
REPLY RD AD
SECTION QUESTION
www.example.com. IN A
ENTRY_END
; recursion happens here.
STEP 10 CHECK_ANSWER
ENTRY_BEGIN
MATCH all
REPLY QR RD RA AD NOERROR
SECTION QUESTION
www.example.com. IN A
SECTION ANSWER
www.example.com. IN A 10.20.30.40
www.example.com. 3600 IN RRSIG A 3 3 3600 20070926134150 20070829134150 2854 example.com. MC0CFC99iE9K5y2WNgI0gFvBWaTi9wm6AhUAoUqOpDtG5Zct+Qr9F3mSdnbc6V4= ;{id = 2854}
SECTION AUTHORITY
example.com. IN NS ns.example.com.
example.com. 3600 IN RRSIG NS 3 2 3600 20070926134150 20070829134150 2854 example.com. MC0CFQCN+qHdJxoI/2tNKwsb08pra/G7aAIUAWA5sDdJTbrXA1/3OaesGBAO3sI= ;{id = 2854}
SECTION ADDITIONAL
ns.example.com. IN A 1.2.3.4
ENTRY_END
; ask from cache too
STEP 21 QUERY
ENTRY_BEGIN
REPLY RD AD
SECTION QUESTION
www.example.com. IN A
ENTRY_END
STEP 23 CHECK_ANSWER
ENTRY_BEGIN
MATCH all
REPLY QR RD RA AD NOERROR
SECTION QUESTION
www.example.com. IN A
SECTION ANSWER
www.example.com. IN A 10.20.30.40
www.example.com. 3600 IN RRSIG A 3 3 3600 20070926134150 20070829134150 2854 example.com. MC0CFC99iE9K5y2WNgI0gFvBWaTi9wm6AhUAoUqOpDtG5Zct+Qr9F3mSdnbc6V4= ;{id = 2854}
SECTION AUTHORITY
example.com. IN NS ns.example.com.
example.com. 3600 IN RRSIG NS 3 2 3600 20070926134150 20070829134150 2854 example.com. MC0CFQCN+qHdJxoI/2tNKwsb08pra/G7aAIUAWA5sDdJTbrXA1/3OaesGBAO3sI= ;{id = 2854}
SECTION ADDITIONAL
ns.example.com. IN A 1.2.3.4
ENTRY_END
SCENARIO_END
dnssecjava-1.1.3/src/test/resources/unbound/val_adcopy.rpl 0000664 0000000 0000000 00000011374 13020541473 0023734 0 ustar 00root root 0000000 0000000 ; config options
; The island of trust is at example.com
server:
#trust-anchor: "example.com. 3600 IN DS 2854 3 1 46e4ffc6e9a4793b488954bd3f0cc6af0dfb201b"
val-override-date: "20070916134226"
target-fetch-policy: "0 0 0 0 0"
stub-zone:
name: "."
stub-addr: 193.0.14.129 # K.ROOT-SERVERS.NET.
CONFIG_END
SCENARIO_BEGIN Test validator AD bit sent by untrusted upstream
; K.ROOT-SERVERS.NET.
RANGE_BEGIN 0 100
ADDRESS 193.0.14.129
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
. IN NS
SECTION ANSWER
. IN NS K.ROOT-SERVERS.NET.
SECTION ADDITIONAL
K.ROOT-SERVERS.NET. IN A 193.0.14.129
ENTRY_END
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
www.example.com. IN A
SECTION AUTHORITY
com. IN NS a.gtld-servers.net.
SECTION ADDITIONAL
a.gtld-servers.net. IN A 192.5.6.30
ENTRY_END
RANGE_END
; a.gtld-servers.net.
RANGE_BEGIN 0 100
ADDRESS 192.5.6.30
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
com. IN NS
SECTION ANSWER
com. IN NS a.gtld-servers.net.
SECTION ADDITIONAL
a.gtld-servers.net. IN A 192.5.6.30
ENTRY_END
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
www.example.com. IN A
SECTION AUTHORITY
example.com. IN NS ns.example.com.
SECTION ADDITIONAL
ns.example.com. IN A 1.2.3.4
ENTRY_END
RANGE_END
; ns.example.com.
RANGE_BEGIN 0 100
ADDRESS 1.2.3.4
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR AA RA AD NOERROR
SECTION QUESTION
example.com. IN NS
SECTION ANSWER
example.com. IN NS ns.example.com.
example.com. 3600 IN RRSIG NS 3 2 3600 20070926134150 20070829134150 2854 example.com. MC0CFQCN+qHdJxoI/2tNKwsb08pra/G7aAIUAWA5sDdJTbrXA1/3OaesGBAO3sI= ;{id = 2854}
SECTION ADDITIONAL
ns.example.com. IN A 1.2.3.4
ns.example.com. 3600 IN RRSIG A 3 3 3600 20070926135752 20070829135752 2854 example.com. MC0CFQCMSWxVehgOQLoYclB9PIAbNP229AIUeH0vNNGJhjnZiqgIOKvs1EhzqAo= ;{id = 2854}
ENTRY_END
; response to DNSKEY priming query
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR AA RA AD NOERROR
SECTION QUESTION
example.com. IN DNSKEY
SECTION ANSWER
example.com. 3600 IN DNSKEY 256 3 3 ALXLUsWqUrY3JYER3T4TBJII s70j+sDS/UT2QRp61SE7S3E EXopNXoFE73JLRmvpi/UrOO/Vz4Se 6wXv/CYCKjGw06U4WRgR YXcpEhJROyNapmdIKSx hOzfLVE1gqA0PweZR8d tY3aNQSRn3sPpwJr6Mi /PqQKAMMrZ9ckJpf1+b QMOOvxgzz2U1GS18b3y ZKcgTMEaJzd/GZYzi/B N2DzQ0MsrSwYXfsNLFO Bbs8PJMW4LYIxeeOe6rUgkWOF 7CC9Dh/dduQ1QrsJhmZAEFfd6ByYV+ ;{id = 2854 (zsk), size = 1688b}
example.com. 3600 IN RRSIG DNSKEY 3 2 3600 20070926134802 20070829134802 2854 example.com. MCwCFG1yhRNtTEa3Eno2zhVVuy2EJX3wAhQeLyUp6+UXcpC5qGNu9tkrTEgPUg== ;{id = 2854}
SECTION AUTHORITY
example.com. IN NS ns.example.com.
example.com. 3600 IN RRSIG NS 3 2 3600 20070926134150 20070829134150 2854 example.com. MC0CFQCN+qHdJxoI/2tNKwsb08pra/G7aAIUAWA5sDdJTbrXA1/3OaesGBAO3sI= ;{id = 2854}
SECTION ADDITIONAL
ns.example.com. IN A 1.2.3.4
ns.example.com. 3600 IN RRSIG A 3 3 3600 20070926135752 20070829135752 2854 example.com. MC0CFQCMSWxVehgOQLoYclB9PIAbNP229AIUeH0vNNGJhjnZiqgIOKvs1EhzqAo= ;{id = 2854}
ENTRY_END
; response to query of interest
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR AA RA AD NOERROR
SECTION QUESTION
www.example.com. IN A
SECTION ANSWER
www.example.com. IN A 10.20.30.40
ns.example.com. 3600 IN RRSIG A 3 3 3600 20070926134150 20070829134150 2854 example.com. MC0CFQCQMyTjn7WWwpwAR1LlVeLpRgZGuQIUCcJDEkwAuzytTDRlYK7nIMwH1CM= ;{id = 2854}
SECTION AUTHORITY
example.com. IN NS ns.example.com.
example.com. 3600 IN RRSIG NS 3 2 3600 20070926134150 20070829134150 2854 example.com. MC0CFQCN+qHdJxoI/2tNKwsb08pra/G7aAIUAWA5sDdJTbrXA1/3OaesGBAO3sI= ;{id = 2854}
SECTION ADDITIONAL
ns.example.com. IN A 1.2.3.4
www.example.com. 3600 IN RRSIG A 3 3 3600 20070926134150 20070829134150 2854 example.com. MC0CFC99iE9K5y2WNgI0gFvBWaTi9wm6AhUAoUqOpDtG5Zct+Qr9F3mSdnbc6V4= ;{id = 2854}
ENTRY_END
RANGE_END
STEP 1 QUERY
ENTRY_BEGIN
REPLY RD AD
SECTION QUESTION
www.example.com. IN A
ENTRY_END
; recursion happens here.
STEP 10 CHECK_ANSWER
ENTRY_BEGIN
MATCH all
REPLY QR RD RA NOERROR
SECTION QUESTION
www.example.com. IN A
SECTION ANSWER
www.example.com. IN A 10.20.30.40
SECTION AUTHORITY
example.com. IN NS ns.example.com.
SECTION ADDITIONAL
ns.example.com. IN A 1.2.3.4
ENTRY_END
; ask from cache too
STEP 21 QUERY
ENTRY_BEGIN
REPLY RD AD
SECTION QUESTION
www.example.com. IN A
ENTRY_END
STEP 23 CHECK_ANSWER
ENTRY_BEGIN
MATCH all
REPLY QR RD RA NOERROR
SECTION QUESTION
www.example.com. IN A
SECTION ANSWER
www.example.com. IN A 10.20.30.40
SECTION AUTHORITY
example.com. IN NS ns.example.com.
SECTION ADDITIONAL
ns.example.com. IN A 1.2.3.4
ENTRY_END
SCENARIO_END
dnssecjava-1.1.3/src/test/resources/unbound/val_anchor_nx.rpl 0000664 0000000 0000000 00000021315 13020541473 0024430 0 ustar 00root root 0000000 0000000 ; config options
; The island of trust is at example.com
server:
trust-anchor: "example.com. 3600 IN DS 2854 3 1 46e4ffc6e9a4793b488954bd3f0cc6af0dfb201b"
trust-anchor: "sub.example.com. 3600 IN DS 30899 RSASHA1 1 f7ed618f24d5e5202927e1d27bc2e84a141cb4b3"
val-override-date: "20070916134226"
target-fetch-policy: "0 0 0 0 0"
stub-zone:
name: "."
stub-addr: 193.0.14.129 # K.ROOT-SERVERS.NET.
CONFIG_END
SCENARIO_BEGIN Test validator with secure proof of trust anchor nxdomain
; K.ROOT-SERVERS.NET.
RANGE_BEGIN 0 100
ADDRESS 193.0.14.129
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
. IN NS
SECTION ANSWER
. IN NS K.ROOT-SERVERS.NET.
SECTION ADDITIONAL
K.ROOT-SERVERS.NET. IN A 193.0.14.129
ENTRY_END
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
www.sub.example.com. IN A
SECTION AUTHORITY
com. IN NS a.gtld-servers.net.
SECTION ADDITIONAL
a.gtld-servers.net. IN A 192.5.6.30
ENTRY_END
RANGE_END
; a.gtld-servers.net.
RANGE_BEGIN 0 100
ADDRESS 192.5.6.30
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
com. IN NS
SECTION ANSWER
com. IN NS a.gtld-servers.net.
SECTION ADDITIONAL
a.gtld-servers.net. IN A 192.5.6.30
ENTRY_END
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
www.sub.example.com. IN A
SECTION AUTHORITY
example.com. IN NS ns.example.com.
SECTION ADDITIONAL
ns.example.com. IN A 1.2.3.4
ENTRY_END
RANGE_END
; ns.example.com.
RANGE_BEGIN 0 100
ADDRESS 1.2.3.4
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
example.com. IN NS
SECTION ANSWER
example.com. IN NS ns.example.com.
example.com. 3600 IN RRSIG NS 3 2 3600 20070926134150 20070829134150 2854 example.com. MC0CFQCN+qHdJxoI/2tNKwsb08pra/G7aAIUAWA5sDdJTbrXA1/3OaesGBAO3sI= ;{id = 2854}
SECTION ADDITIONAL
ns.example.com. IN A 1.2.3.4
ns.example.com. 3600 IN RRSIG A 3 3 3600 20070926135752 20070829135752 2854 example.com. MC0CFQCMSWxVehgOQLoYclB9PIAbNP229AIUeH0vNNGJhjnZiqgIOKvs1EhzqAo= ;{id = 2854}
ENTRY_END
; response to DNSKEY priming query
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
example.com. IN DNSKEY
SECTION ANSWER
example.com. 3600 IN DNSKEY 256 3 3 ALXLUsWqUrY3JYER3T4TBJII s70j+sDS/UT2QRp61SE7S3E EXopNXoFE73JLRmvpi/UrOO/Vz4Se 6wXv/CYCKjGw06U4WRgR YXcpEhJROyNapmdIKSx hOzfLVE1gqA0PweZR8d tY3aNQSRn3sPpwJr6Mi /PqQKAMMrZ9ckJpf1+b QMOOvxgzz2U1GS18b3y ZKcgTMEaJzd/GZYzi/B N2DzQ0MsrSwYXfsNLFO Bbs8PJMW4LYIxeeOe6rUgkWOF 7CC9Dh/dduQ1QrsJhmZAEFfd6ByYV+ ;{id = 2854 (zsk), size = 1688b}
example.com. 3600 IN RRSIG DNSKEY DSA 2 3600 20070926134150 20070829134150 2854 example.com. MCwCFBQRtlR4BEv9ohi+PGFjp+AHsJuHAhRCvz0shggvnvI88DFnBDCczHUcVA== ;{id = 2854}
SECTION AUTHORITY
example.com. IN NS ns.example.com.
example.com. 3600 IN RRSIG NS 3 2 3600 20070926134150 20070829134150 2854 example.com. MC0CFQCN+qHdJxoI/2tNKwsb08pra/G7aAIUAWA5sDdJTbrXA1/3OaesGBAO3sI= ;{id = 2854}
SECTION ADDITIONAL
ns.example.com. IN A 1.2.3.4
ns.example.com. 3600 IN RRSIG A 3 3 3600 20070926135752 20070829135752 2854 example.com. MC0CFQCMSWxVehgOQLoYclB9PIAbNP229AIUeH0vNNGJhjnZiqgIOKvs1EhzqAo= ;{id = 2854}
ENTRY_END
; response for sub.example.com.
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NXDOMAIN
SECTION QUESTION
www.sub.example.com. IN A
SECTION AUTHORITY
example.com. SOA ns.example.com. h.example.com. 2007090504 1800 1800 2419200 7200
example.com. 3600 IN RRSIG SOA 3 2 3600 20070926134150 20070829134150 2854 example.com. MCwCFC5uwIHSehZtetK2CMNXttSFUB0XAhROFDAgy/FaxR8zFXJzyPdpQG93Sw== ;{id = 2854}
blub.example.com. NSEC znub.example.com. A MX RRSIG NSEC
blub.example.com. 3600 IN RRSIG NSEC 3 3 3600 20070926134150 20070829134150 2854 example.com. MCwCFCic/WwyMtdDE/84g8l0S0M8AOtnAhR88hQEp5cD5XQ3EmQ79RUuNTCgdg== ;{id = 2854}
example.com. NSEC blub.example.com. SOA NS MX DNSKEY RRSIG NSEC
example.com. 3600 IN RRSIG NSEC 3 2 3600 20070926134150 20070829134150 2854 example.com. MC0CFFYX7iNIlT79gNFFlvnn44Ittm6HAhUAg7u0hZ4to87qyfkonZu2jVLW3xw= ;{id = 2854}
ENTRY_END
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NXDOMAIN
SECTION QUESTION
www.sub.example.com. IN DS
SECTION AUTHORITY
example.com. SOA ns.example.com. h.example.com. 2007090504 1800 1800 2419200 7200
example.com. 3600 IN RRSIG SOA 3 2 3600 20070926134150 20070829134150 2854 example.com. MCwCFC5uwIHSehZtetK2CMNXttSFUB0XAhROFDAgy/FaxR8zFXJzyPdpQG93Sw== ;{id = 2854}
blub.example.com. NSEC znub.example.com. A MX RRSIG NSEC
blub.example.com. 3600 IN RRSIG NSEC 3 3 3600 20070926134150 20070829134150 2854 example.com. MCwCFCic/WwyMtdDE/84g8l0S0M8AOtnAhR88hQEp5cD5XQ3EmQ79RUuNTCgdg== ;{id = 2854}
example.com. NSEC blub.example.com. SOA NS MX DNSKEY RRSIG NSEC
example.com. 3600 IN RRSIG NSEC 3 2 3600 20070926134150 20070829134150 2854 example.com. MC0CFFYX7iNIlT79gNFFlvnn44Ittm6HAhUAg7u0hZ4to87qyfkonZu2jVLW3xw= ;{id = 2854}
ENTRY_END
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NXDOMAIN
SECTION QUESTION
sub.example.com. IN DNSKEY
SECTION AUTHORITY
example.com. SOA ns.example.com. h.example.com. 2007090504 1800 1800 2419200 7200
example.com. 3600 IN RRSIG SOA 3 2 3600 20070926134150 20070829134150 2854 example.com. MCwCFC5uwIHSehZtetK2CMNXttSFUB0XAhROFDAgy/FaxR8zFXJzyPdpQG93Sw== ;{id = 2854}
blub.example.com. NSEC znub.example.com. A MX RRSIG NSEC
blub.example.com. 3600 IN RRSIG NSEC 3 3 3600 20070926134150 20070829134150 2854 example.com. MCwCFCic/WwyMtdDE/84g8l0S0M8AOtnAhR88hQEp5cD5XQ3EmQ79RUuNTCgdg== ;{id = 2854}
example.com. NSEC blub.example.com. SOA NS MX DNSKEY RRSIG NSEC
example.com. 3600 IN RRSIG NSEC 3 2 3600 20070926134150 20070829134150 2854 example.com. MC0CFFYX7iNIlT79gNFFlvnn44Ittm6HAhUAg7u0hZ4to87qyfkonZu2jVLW3xw= ;{id = 2854}
ENTRY_END
RANGE_END
; ns.sub.example.com.
RANGE_BEGIN 0 100
ADDRESS 1.2.3.6
; response to DNSKEY priming query
; sub.example.com. 3600 IN DS 30899 RSASHA1 1 f7ed618f24d5e5202927e1d27bc2e84a141cb4b3
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
sub.example.com. IN DNSKEY
SECTION ANSWER
sub.example.com. 3600 IN DNSKEY 256 3 5 AQPQ41chR9DEHt/aIzIFAqanbDlRflJoRs5yz1jFsoRIT7dWf0r+PeDuewdxkszNH6wnU4QL8pfKFRh5PIYVBLK3 ;{id = 30899 (zsk), size = 512b}
sub.example.com. 3600 IN RRSIG DNSKEY 5 3 3600 20070926134150 20070829134150 30899 sub.example.com. uNGp99iznjD7oOX02XnQbDnbg75UwBHRvZSKYUorTKvPUnCWMHKdRsQ+mf+Fx3GZ+Fz9BVjoCmQqpnfgXLEYqw== ;{id = 30899}
SECTION AUTHORITY
sub.example.com. IN NS ns.sub.example.com.
sub.example.com. 3600 IN RRSIG NS 5 3 3600 20070926134150 20070829134150 30899 sub.example.com. wcpHeBILHfo8C9uxMhcW03gcURZeUffiKdSTb50ZjzTHgMNhRyMfpcvSpXEd9548A9UTmWKeLZChfr5Z/glONw== ;{id = 30899}
SECTION ADDITIONAL
ns.sub.example.com. IN A 1.2.3.6
ns.sub.example.com. 3600 IN RRSIG A 5 4 3600 20070926134150 20070829134150 30899 sub.example.com. UF7shD/gt1FOp2UHgLTNbPzVykklSXFMEtJ1xD+Hholwf/PIzd7zoaIttIYibNa4fUXCqMg22H9P7MRhfmFe6g== ;{id = 30899}
ENTRY_END
; response to query of interest
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
www.sub.example.com. IN A
SECTION ANSWER
www.sub.example.com. IN A 11.11.11.11
www.sub.example.com. 3600 IN RRSIG A 5 4 3600 20070926134150 20070829134150 30899 sub.example.com. 0DqqRfRtm7VSEQ4mmBbzrKRqQAay3JAE8DPDGmjtokrrjN9F1G/HxozDV7bjdIh2EChlQea8FPwf/GepJMUVxg== ;{id = 30899}
SECTION AUTHORITY
SECTION ADDITIONAL
ENTRY_END
RANGE_END
STEP 1 QUERY
ENTRY_BEGIN
REPLY RD DO
SECTION QUESTION
www.sub.example.com. IN A
ENTRY_END
; recursion happens here.
STEP 10 CHECK_ANSWER
ENTRY_BEGIN
MATCH all
REPLY QR RD RA AD NXDOMAIN
SECTION QUESTION
www.sub.example.com. IN A
SECTION ANSWER
SECTION AUTHORITY
example.com. SOA ns.example.com. h.example.com. 2007090504 1800 1800 2419200 7200
example.com. 3600 IN RRSIG SOA 3 2 3600 20070926134150 20070829134150 2854 example.com. MCwCFC5uwIHSehZtetK2CMNXttSFUB0XAhROFDAgy/FaxR8zFXJzyPdpQG93Sw== ;{id = 2854}
blub.example.com. NSEC znub.example.com. A MX RRSIG NSEC
blub.example.com. 3600 IN RRSIG NSEC 3 3 3600 20070926134150 20070829134150 2854 example.com. MCwCFCic/WwyMtdDE/84g8l0S0M8AOtnAhR88hQEp5cD5XQ3EmQ79RUuNTCgdg== ;{id = 2854}
example.com. NSEC blub.example.com. SOA NS MX DNSKEY RRSIG NSEC
example.com. 3600 IN RRSIG NSEC 3 2 3600 20070926134150 20070829134150 2854 example.com. MC0CFFYX7iNIlT79gNFFlvnn44Ittm6HAhUAg7u0hZ4to87qyfkonZu2jVLW3xw= ;{id = 2854}
SECTION ADDITIONAL
ENTRY_END
SCENARIO_END
dnssecjava-1.1.3/src/test/resources/unbound/val_anchor_nx_nosig.rpl 0000664 0000000 0000000 00000021115 13020541473 0025625 0 ustar 00root root 0000000 0000000 ; config options
; The island of trust is at example.com
server:
trust-anchor: "sub.example.com. 3600 IN DS 30899 5 1 f7ed618f24d5e5202927e1d27bc2e84a141cb4b3"
val-override-date: "20070916134226"
target-fetch-policy: "0 0 0 0 0"
stub-zone:
name: "."
stub-addr: 193.0.14.129 # K.ROOT-SERVERS.NET.
CONFIG_END
SCENARIO_BEGIN Test validator with unsigned denial of trust anchor
; K.ROOT-SERVERS.NET.
RANGE_BEGIN 0 100
ADDRESS 193.0.14.129
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
. IN NS
SECTION ANSWER
. IN NS K.ROOT-SERVERS.NET.
SECTION ADDITIONAL
K.ROOT-SERVERS.NET. IN A 193.0.14.129
ENTRY_END
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
www.sub.example.com. IN A
SECTION AUTHORITY
com. IN NS a.gtld-servers.net.
SECTION ADDITIONAL
a.gtld-servers.net. IN A 192.5.6.30
ENTRY_END
RANGE_END
; a.gtld-servers.net.
RANGE_BEGIN 0 100
ADDRESS 192.5.6.30
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
com. IN NS
SECTION ANSWER
com. IN NS a.gtld-servers.net.
SECTION ADDITIONAL
a.gtld-servers.net. IN A 192.5.6.30
ENTRY_END
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
www.sub.example.com. IN A
SECTION AUTHORITY
example.com. IN NS ns.example.com.
SECTION ADDITIONAL
ns.example.com. IN A 1.2.3.4
ENTRY_END
RANGE_END
; ns.example.com.
RANGE_BEGIN 0 100
ADDRESS 1.2.3.4
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
example.com. IN NS
SECTION ANSWER
example.com. IN NS ns.example.com.
example.com. 3600 IN RRSIG NS 3 2 3600 20070926134150 20070829134150 2854 example.com. MC0CFQCN+qHdJxoI/2tNKwsb08pra/G7aAIUAWA5sDdJTbrXA1/3OaesGBAO3sI= ;{id = 2854}
SECTION ADDITIONAL
ns.example.com. IN A 1.2.3.4
ns.example.com. 3600 IN RRSIG A 3 3 3600 20070926135752 20070829135752 2854 example.com. MC0CFQCMSWxVehgOQLoYclB9PIAbNP229AIUeH0vNNGJhjnZiqgIOKvs1EhzqAo= ;{id = 2854}
ENTRY_END
; response to DNSKEY priming query
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
example.com. IN DNSKEY
SECTION ANSWER
example.com. 3600 IN DNSKEY 256 3 3 ALXLUsWqUrY3JYER3T4TBJII s70j+sDS/UT2QRp61SE7S3E EXopNXoFE73JLRmvpi/UrOO/Vz4Se 6wXv/CYCKjGw06U4WRgR YXcpEhJROyNapmdIKSx hOzfLVE1gqA0PweZR8d tY3aNQSRn3sPpwJr6Mi /PqQKAMMrZ9ckJpf1+b QMOOvxgzz2U1GS18b3y ZKcgTMEaJzd/GZYzi/B N2DzQ0MsrSwYXfsNLFO Bbs8PJMW4LYIxeeOe6rUgkWOF 7CC9Dh/dduQ1QrsJhmZAEFfd6ByYV+ ;{id = 2854 (zsk), size = 1688b}
example.com. 3600 IN RRSIG DNSKEY DSA 2 3600 20070926134150 20070829134150 2854 example.com. MCwCFBQRtlR4BEv9ohi+PGFjp+AHsJuHAhRCvz0shggvnvI88DFnBDCczHUcVA== ;{id = 2854}
SECTION AUTHORITY
example.com. IN NS ns.example.com.
example.com. 3600 IN RRSIG NS 3 2 3600 20070926134150 20070829134150 2854 example.com. MC0CFQCN+qHdJxoI/2tNKwsb08pra/G7aAIUAWA5sDdJTbrXA1/3OaesGBAO3sI= ;{id = 2854}
SECTION ADDITIONAL
ns.example.com. IN A 1.2.3.4
ns.example.com. 3600 IN RRSIG A 3 3 3600 20070926135752 20070829135752 2854 example.com. MC0CFQCMSWxVehgOQLoYclB9PIAbNP229AIUeH0vNNGJhjnZiqgIOKvs1EhzqAo= ;{id = 2854}
ENTRY_END
; response for sub.example.com.
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NXDOMAIN
SECTION QUESTION
www.sub.example.com. IN A
SECTION AUTHORITY
example.com. SOA ns.example.com. h.example.com. 2007090504 1800 1800 2419200 7200
example.com. 3600 IN RRSIG SOA 3 2 3600 20070926134150 20070829134150 2854 example.com. MCwCFC5uwIHSehZtetK2CMNXttSFUB0XAhROFDAgy/FaxR8zFXJzyPdpQG93Sw== ;{id = 2854}
blub.example.com. NSEC znub.example.com. A MX RRSIG NSEC
blub.example.com. 3600 IN RRSIG NSEC 3 3 3600 20070926134150 20070829134150 2854 example.com. MCwCFCic/WwyMtdDE/84g8l0S0M8AOtnAhR88hQEp5cD5XQ3EmQ79RUuNTCgdg== ;{id = 2854}
example.com. NSEC blub.example.com. SOA NS MX DNSKEY RRSIG NSEC
example.com. 3600 IN RRSIG NSEC 3 2 3600 20070926134150 20070829134150 2854 example.com. MC0CFFYX7iNIlT79gNFFlvnn44Ittm6HAhUAg7u0hZ4to87qyfkonZu2jVLW3xw= ;{id = 2854}
ENTRY_END
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NXDOMAIN
SECTION QUESTION
www.sub.example.com. IN DS
SECTION AUTHORITY
example.com. SOA ns.example.com. h.example.com. 2007090504 1800 1800 2419200 7200
example.com. 3600 IN RRSIG SOA 3 2 3600 20070926134150 20070829134150 2854 example.com. MCwCFC5uwIHSehZtetK2CMNXttSFUB0XAhROFDAgy/FaxR8zFXJzyPdpQG93Sw== ;{id = 2854}
blub.example.com. NSEC znub.example.com. A MX RRSIG NSEC
blub.example.com. 3600 IN RRSIG NSEC 3 3 3600 20070926134150 20070829134150 2854 example.com. MCwCFCic/WwyMtdDE/84g8l0S0M8AOtnAhR88hQEp5cD5XQ3EmQ79RUuNTCgdg== ;{id = 2854}
example.com. NSEC blub.example.com. SOA NS MX DNSKEY RRSIG NSEC
example.com. 3600 IN RRSIG NSEC 3 2 3600 20070926134150 20070829134150 2854 example.com. MC0CFFYX7iNIlT79gNFFlvnn44Ittm6HAhUAg7u0hZ4to87qyfkonZu2jVLW3xw= ;{id = 2854}
ENTRY_END
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NXDOMAIN
SECTION QUESTION
sub.example.com. IN DNSKEY
SECTION AUTHORITY
example.com. SOA ns.example.com. h.example.com. 2007090504 1800 1800 2419200 7200
example.com. 3600 IN RRSIG SOA 3 2 3600 20070926134150 20070829134150 2854 example.com. MCwCFC5uwIHSehZtetK2CMNXttSFUB0XAhROFDAgy/FaxR8zFXJzyPdpQG93Sw== ;{id = 2854}
blub.example.com. NSEC znub.example.com. A MX RRSIG NSEC
blub.example.com. 3600 IN RRSIG NSEC 3 3 3600 20070926134150 20070829134150 2854 example.com. MCwCFCic/WwyMtdDE/84g8l0S0M8AOtnAhR88hQEp5cD5XQ3EmQ79RUuNTCgdg== ;{id = 2854}
example.com. NSEC blub.example.com. SOA NS MX DNSKEY RRSIG NSEC
example.com. 3600 IN RRSIG NSEC 3 2 3600 20070926134150 20070829134150 2854 example.com. MC0CFFYX7iNIlT79gNFFlvnn44Ittm6HAhUAg7u0hZ4to87qyfkonZu2jVLW3xw= ;{id = 2854}
ENTRY_END
RANGE_END
; ns.sub.example.com.
RANGE_BEGIN 0 100
ADDRESS 1.2.3.6
; response to DNSKEY priming query
; sub.example.com. 3600 IN DS 30899 5 1 f7ed618f24d5e5202927e1d27bc2e84a141cb4b3
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
sub.example.com. IN DNSKEY
SECTION ANSWER
sub.example.com. 3600 IN DNSKEY 256 3 5 AQPQ41chR9DEHt/aIzIFAqanbDlRflJoRs5yz1jFsoRIT7dWf0r+PeDuewdxkszNH6wnU4QL8pfKFRh5PIYVBLK3 ;{id = 30899 (zsk), size = 512b}
sub.example.com. 3600 IN RRSIG DNSKEY 5 3 3600 20070926134150 20070829134150 30899 sub.example.com. uNGp99iznjD7oOX02XnQbDnbg75UwBHRvZSKYUorTKvPUnCWMHKdRsQ+mf+Fx3GZ+Fz9BVjoCmQqpnfgXLEYqw== ;{id = 30899}
SECTION AUTHORITY
sub.example.com. IN NS ns.sub.example.com.
sub.example.com. 3600 IN RRSIG NS 5 3 3600 20070926134150 20070829134150 30899 sub.example.com. wcpHeBILHfo8C9uxMhcW03gcURZeUffiKdSTb50ZjzTHgMNhRyMfpcvSpXEd9548A9UTmWKeLZChfr5Z/glONw== ;{id = 30899}
SECTION ADDITIONAL
ns.sub.example.com. IN A 1.2.3.6
ns.sub.example.com. 3600 IN RRSIG A 5 4 3600 20070926134150 20070829134150 30899 sub.example.com. UF7shD/gt1FOp2UHgLTNbPzVykklSXFMEtJ1xD+Hholwf/PIzd7zoaIttIYibNa4fUXCqMg22H9P7MRhfmFe6g== ;{id = 30899}
ENTRY_END
; response to query of interest
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
www.sub.example.com. IN A
SECTION ANSWER
www.sub.example.com. IN A 11.11.11.11
www.sub.example.com. 3600 IN RRSIG A 5 4 3600 20070926134150 20070829134150 30899 sub.example.com. 0DqqRfRtm7VSEQ4mmBbzrKRqQAay3JAE8DPDGmjtokrrjN9F1G/HxozDV7bjdIh2EChlQea8FPwf/GepJMUVxg== ;{id = 30899}
SECTION AUTHORITY
SECTION ADDITIONAL
ENTRY_END
RANGE_END
STEP 1 QUERY
ENTRY_BEGIN
REPLY RD DO
SECTION QUESTION
www.sub.example.com. IN A
ENTRY_END
; recursion happens here.
STEP 10 CHECK_ANSWER
ENTRY_BEGIN
MATCH all
REPLY QR RD RA NXDOMAIN
SECTION QUESTION
www.sub.example.com. IN A
SECTION ANSWER
SECTION AUTHORITY
example.com. SOA ns.example.com. h.example.com. 2007090504 1800 1800 2419200 7200
example.com. 3600 IN RRSIG SOA 3 2 3600 20070926134150 20070829134150 2854 example.com. MCwCFC5uwIHSehZtetK2CMNXttSFUB0XAhROFDAgy/FaxR8zFXJzyPdpQG93Sw== ;{id = 2854}
blub.example.com. NSEC znub.example.com. A MX RRSIG NSEC
blub.example.com. 3600 IN RRSIG NSEC 3 3 3600 20070926134150 20070829134150 2854 example.com. MCwCFCic/WwyMtdDE/84g8l0S0M8AOtnAhR88hQEp5cD5XQ3EmQ79RUuNTCgdg== ;{id = 2854}
example.com. NSEC blub.example.com. SOA NS MX DNSKEY RRSIG NSEC
example.com. 3600 IN RRSIG NSEC 3 2 3600 20070926134150 20070829134150 2854 example.com. MC0CFFYX7iNIlT79gNFFlvnn44Ittm6HAhUAg7u0hZ4to87qyfkonZu2jVLW3xw= ;{id = 2854}
SECTION ADDITIONAL
ENTRY_END
SCENARIO_END
dnssecjava-1.1.3/src/test/resources/unbound/val_ans_dsent.rpl 0000664 0000000 0000000 00000021612 13020541473 0024427 0 ustar 00root root 0000000 0000000 ; config options
; The island of trust is at example.com
server:
trust-anchor: "example.com. 3600 IN DS 2854 3 1 46e4ffc6e9a4793b488954bd3f0cc6af0dfb201b"
val-override-date: "20070916134226"
target-fetch-policy: "0 0 0 0 0"
stub-zone:
name: "."
stub-addr: 193.0.14.129 # K.ROOT-SERVERS.NET.
CONFIG_END
SCENARIO_BEGIN Test validator with empty nonterminals on the trust chain.
; K.ROOT-SERVERS.NET.
RANGE_BEGIN 0 100
ADDRESS 193.0.14.129
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
. IN NS
SECTION ANSWER
. IN NS K.ROOT-SERVERS.NET.
SECTION ADDITIONAL
K.ROOT-SERVERS.NET. IN A 193.0.14.129
ENTRY_END
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
328.0.0.194.example.com. IN A
SECTION AUTHORITY
com. IN NS a.gtld-servers.net.
SECTION ADDITIONAL
a.gtld-servers.net. IN A 192.5.6.30
ENTRY_END
RANGE_END
; a.gtld-servers.net.
RANGE_BEGIN 0 100
ADDRESS 192.5.6.30
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
com. IN NS
SECTION ANSWER
com. IN NS a.gtld-servers.net.
SECTION ADDITIONAL
a.gtld-servers.net. IN A 192.5.6.30
ENTRY_END
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
328.0.0.194.example.com. IN A
SECTION AUTHORITY
example.com. IN NS ns.example.com.
SECTION ADDITIONAL
ns.example.com. IN A 1.2.3.4
ENTRY_END
RANGE_END
; ns.example.com.
RANGE_BEGIN 0 100
ADDRESS 1.2.3.4
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
example.com. IN NS
SECTION ANSWER
example.com. IN NS ns.example.com.
example.com. 3600 IN RRSIG NS 3 2 3600 20070926134150 20070829134150 2854 example.com. MC0CFQCN+qHdJxoI/2tNKwsb08pra/G7aAIUAWA5sDdJTbrXA1/3OaesGBAO3sI= ;{id = 2854}
SECTION ADDITIONAL
ns.example.com. IN A 1.2.3.4
ns.example.com. 3600 IN RRSIG A 3 3 3600 20070926135752 20070829135752 2854 example.com. MC0CFQCMSWxVehgOQLoYclB9PIAbNP229AIUeH0vNNGJhjnZiqgIOKvs1EhzqAo= ;{id = 2854}
ENTRY_END
; response to DNSKEY priming query
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
example.com. IN DNSKEY
SECTION ANSWER
example.com. 3600 IN DNSKEY 256 3 3 ALXLUsWqUrY3JYER3T4TBJII s70j+sDS/UT2QRp61SE7S3E EXopNXoFE73JLRmvpi/UrOO/Vz4Se 6wXv/CYCKjGw06U4WRgR YXcpEhJROyNapmdIKSx hOzfLVE1gqA0PweZR8d tY3aNQSRn3sPpwJr6Mi /PqQKAMMrZ9ckJpf1+b QMOOvxgzz2U1GS18b3y ZKcgTMEaJzd/GZYzi/B N2DzQ0MsrSwYXfsNLFO Bbs8PJMW4LYIxeeOe6rUgkWOF 7CC9Dh/dduQ1QrsJhmZAEFfd6ByYV+ ;{id = 2854 (zsk), size = 1688b}
example.com. 3600 IN RRSIG DNSKEY DSA 2 3600 20070926134150 20070829134150 2854 example.com. MCwCFBQRtlR4BEv9ohi+PGFjp+AHsJuHAhRCvz0shggvnvI88DFnBDCczHUcVA== ;{id = 2854}
SECTION AUTHORITY
example.com. IN NS ns.example.com.
example.com. 3600 IN RRSIG NS 3 2 3600 20070926134150 20070829134150 2854 example.com. MC0CFQCN+qHdJxoI/2tNKwsb08pra/G7aAIUAWA5sDdJTbrXA1/3OaesGBAO3sI= ;{id = 2854}
SECTION ADDITIONAL
ns.example.com. IN A 1.2.3.4
ns.example.com. 3600 IN RRSIG A 3 3 3600 20070926135752 20070829135752 2854 example.com. MC0CFQCMSWxVehgOQLoYclB9PIAbNP229AIUeH0vNNGJhjnZiqgIOKvs1EhzqAo= ;{id = 2854}
ENTRY_END
; responses to DS empty nonterminal queries.
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR AA NOERROR
SECTION QUESTION
194.example.com. IN DS
SECTION AUTHORITY
example.com. 3600 IN SOA ns.example.com. host.example.com. 2007091980 3600 7200 1209600 7200
example.com. 3600 IN RRSIG SOA 3 2 3600 20070926135752 20070829135752 2854 example.com. MC0CFCOn5qKBIV7bwFMBA+Qqiblx0cylAhUAoFiGtFm2wHhJpq9MooTYdeVw45s= ;{id = 2854}
; This NSEC proves the NOERROR/NODATA case.
194.example.com. IN NSEC 0.0.194.example.com. A RRSIG NSEC
194.example.com. 3600 IN RRSIG NSEC 3 3 3600 20070926135752 20070829135752 2854 example.com. MC0CFDcoKl74U9FjsuYF3Vc0E8GQ2GgzAhUAhlyhO2MMcAWQMxIhEZ4MguokN5g= ;{id = 2854}
ENTRY_END
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
; this should be NOERROR.
REPLY QR AA NOERROR
SECTION QUESTION
0.194.example.com. IN DS
SECTION AUTHORITY
example.com. 3600 IN SOA ns.example.com. host.example.com. 2007091980 3600 7200 1209600 7200
example.com. 3600 IN RRSIG SOA 3 2 3600 20070926135752 20070829135752 2854 example.com. MC0CFCOn5qKBIV7bwFMBA+Qqiblx0cylAhUAoFiGtFm2wHhJpq9MooTYdeVw45s= ;{id = 2854}
; This NSEC proves the NOERROR/NODATA case.
194.example.com. IN NSEC 0.0.194.example.com. A RRSIG NSEC
194.example.com. 3600 IN RRSIG NSEC 3 3 3600 20070926135752 20070829135752 2854 example.com. MC0CFDcoKl74U9FjsuYF3Vc0E8GQ2GgzAhUAhlyhO2MMcAWQMxIhEZ4MguokN5g= ;{id = 2854}
ENTRY_END
; response for delegation to sub zone.
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
0.0.194.example.com. IN DS
SECTION ANSWER
0.0.194.example.com. 3600 IN DS 30899 RSASHA1 1 aa46f0717075d9750ac3596c659a2e326b33c28c
0.0.194.example.com. 3600 IN RRSIG DS 3 5 3600 20070926135752 20070829135752 2854 example.com. MCwCFC9GIqtp/103hktw6bPpD83gr+0iAhQ8yev2yUaR9l64rYBUYTJqOoTKdw== ;{id = 2854}
SECTION AUTHORITY
SECTION ADDITIONAL
ns.sub.example.com. IN A 1.2.3.6
ENTRY_END
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
328.0.0.194.example.com. IN A
SECTION ANSWER
SECTION AUTHORITY
0.0.194.example.com. IN NS ns.sub.example.com.
0.0.194.example.com. 3600 IN DS 30899 RSASHA1 1 aa46f0717075d9750ac3596c659a2e326b33c28c
0.0.194.example.com. 3600 IN RRSIG DS 3 5 3600 20070926135752 20070829135752 2854 example.com. MCwCFC9GIqtp/103hktw6bPpD83gr+0iAhQ8yev2yUaR9l64rYBUYTJqOoTKdw== ;{id = 2854}
SECTION ADDITIONAL
ns.sub.example.com. IN A 1.2.3.6
ENTRY_END
; response for delegation to sub zone
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
0.0.194.example.com. IN DNSKEY
SECTION ANSWER
SECTION AUTHORITY
0.0.194.example.com. IN NS ns.sub.example.com.
0.0.194.example.com. 3600 IN DS 30899 RSASHA1 1 aa46f0717075d9750ac3596c659a2e326b33c28c
0.0.194.example.com. 3600 IN RRSIG DS 3 5 3600 20070926135752 20070829135752 2854 example.com. MCwCFC9GIqtp/103hktw6bPpD83gr+0iAhQ8yev2yUaR9l64rYBUYTJqOoTKdw== ;{id = 2854}
SECTION ADDITIONAL
ns.sub.example.com. IN A 1.2.3.6
ENTRY_END
RANGE_END
; ns.sub.example.com. for zone 0.0.194.example.com.
RANGE_BEGIN 0 100
ADDRESS 1.2.3.6
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
0.0.194.example.com. IN NS
SECTION ANSWER
0.0.194.example.com. IN NS ns.sub.example.com.
0.0.194.example.com. 3600 IN RRSIG NS 5 5 3600 20070926135752 20070829135752 30899 0.0.194.example.com. KXDA+/PJAE+dXhv6O6Z0ZovDwabSRJcIt+GT5AL6ewlj46hzo/SDKUtEhYCeT1IVQvYtXrESwFZjpp7N0rXXBg== ;{id = 30899}
SECTION ADDITIONAL
ns.sub.example.com. IN A 1.2.3.6
ENTRY_END
; response to DNSKEY priming query
; 0.0.194.example.com. 3600 IN DS 30899 RSASHA1 1 aa46f0717075d9750ac3596c659a2e326b33c28c
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
0.0.194.example.com. IN DNSKEY
SECTION ANSWER
0.0.194.example.com. 3600 IN DNSKEY 256 3 5 AQPQ41chR9DEHt/aIzIFAqanbDlRflJoRs5yz1jFsoRIT7dWf0r+PeDuewdxkszNH6wnU4QL8pfKFRh5PIYVBLK3 ;{id = 30899 (zsk), size = 512b}
0.0.194.example.com. 3600 IN RRSIG DNSKEY 5 5 3600 20070926135752 20070829135752 30899 0.0.194.example.com. fSmc7ef6NwbDXC0o4wPc/aa8LakW5ZJwEZ4xPYl3tTZKmPNM7hPXskl1tFlvst9Va4u37F62v+16trprHb+SCQ== ;{id = 30899}
SECTION AUTHORITY
0.0.194.example.com. IN NS ns.sub.example.com.
0.0.194.example.com. 3600 IN RRSIG NS 5 5 3600 20070926135752 20070829135752 30899 0.0.194.example.com. KXDA+/PJAE+dXhv6O6Z0ZovDwabSRJcIt+GT5AL6ewlj46hzo/SDKUtEhYCeT1IVQvYtXrESwFZjpp7N0rXXBg== ;{id = 30899}
SECTION ADDITIONAL
ns.sub.example.com. IN A 1.2.3.6
ENTRY_END
; response to query of interest
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
328.0.0.194.example.com. IN A
SECTION ANSWER
328.0.0.194.example.com. IN A 11.11.11.11
328.0.0.194.example.com. 3600 IN RRSIG A 5 6 3600 20070926135752 20070829135752 30899 0.0.194.example.com. chZW77mqywhw/4ch6BxXQ4EbFgb9zgh2xF75FLlKq/7ey6CfHSJRpJRjRqtMTn+1i18UL2B4nPS/WnK5DZeqlA== ;{id = 30899}
SECTION AUTHORITY
SECTION ADDITIONAL
ENTRY_END
RANGE_END
STEP 1 QUERY
ENTRY_BEGIN
REPLY RD DO
SECTION QUESTION
328.0.0.194.example.com. IN A
ENTRY_END
; recursion happens here.
STEP 10 CHECK_ANSWER
ENTRY_BEGIN
MATCH all
REPLY QR RD RA AD NOERROR
SECTION QUESTION
328.0.0.194.example.com. IN A
SECTION ANSWER
328.0.0.194.example.com. 3600 IN A 11.11.11.11
328.0.0.194.example.com. 3600 IN RRSIG A 5 6 3600 20070926135752 20070829135752 30899 0.0.194.example.com. chZW77mqywhw/4ch6BxXQ4EbFgb9zgh2xF75FLlKq/7ey6CfHSJRpJRjRqtMTn+1i18UL2B4nPS/WnK5DZeqlA== ;{id = 30899}
SECTION AUTHORITY
SECTION ADDITIONAL
ENTRY_END
SCENARIO_END
dnssecjava-1.1.3/src/test/resources/unbound/val_ans_nx.rpl 0000664 0000000 0000000 00000021142 13020541473 0023735 0 ustar 00root root 0000000 0000000 ; config options
; The island of trust is at example.com
server:
trust-anchor: "example.com. 3600 IN DS 2854 3 1 46e4ffc6e9a4793b488954bd3f0cc6af0dfb201b"
val-override-date: "20070916134226"
target-fetch-policy: "0 0 0 0 0"
stub-zone:
name: "."
stub-addr: 193.0.14.129 # K.ROOT-SERVERS.NET.
CONFIG_END
SCENARIO_BEGIN Test validator with DS nodata as nxdomain on trust chain
; This is a bug in ANS 2.8.1.0 where it gives an NXDOMAIN instead of
; NOERROR for an empty nonterminal DS query. The proof for this NXDOMAIN
; is the NSEC that proves emptynonterminal.
; K.ROOT-SERVERS.NET.
RANGE_BEGIN 0 100
ADDRESS 193.0.14.129
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
. IN NS
SECTION ANSWER
. IN NS K.ROOT-SERVERS.NET.
SECTION ADDITIONAL
K.ROOT-SERVERS.NET. IN A 193.0.14.129
ENTRY_END
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
328.0.0.194.example.com. IN A
SECTION AUTHORITY
com. IN NS a.gtld-servers.net.
SECTION ADDITIONAL
a.gtld-servers.net. IN A 192.5.6.30
ENTRY_END
RANGE_END
; a.gtld-servers.net.
RANGE_BEGIN 0 100
ADDRESS 192.5.6.30
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
com. IN NS
SECTION ANSWER
com. IN NS a.gtld-servers.net.
SECTION ADDITIONAL
a.gtld-servers.net. IN A 192.5.6.30
ENTRY_END
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
328.0.0.194.example.com. IN A
SECTION AUTHORITY
example.com. IN NS ns.example.com.
SECTION ADDITIONAL
ns.example.com. IN A 1.2.3.4
ENTRY_END
RANGE_END
; ns.example.com.
RANGE_BEGIN 0 100
ADDRESS 1.2.3.4
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
example.com. IN NS
SECTION ANSWER
example.com. IN NS ns.example.com.
example.com. 3600 IN RRSIG NS 3 2 3600 20070926134150 20070829134150 2854 example.com. MC0CFQCN+qHdJxoI/2tNKwsb08pra/G7aAIUAWA5sDdJTbrXA1/3OaesGBAO3sI= ;{id = 2854}
SECTION ADDITIONAL
ns.example.com. IN A 1.2.3.4
ns.example.com. 3600 IN RRSIG A 3 3 3600 20070926135752 20070829135752 2854 example.com. MC0CFQCMSWxVehgOQLoYclB9PIAbNP229AIUeH0vNNGJhjnZiqgIOKvs1EhzqAo= ;{id = 2854}
ENTRY_END
; response to DNSKEY priming query
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
example.com. IN DNSKEY
SECTION ANSWER
example.com. 3600 IN DNSKEY 256 3 3 ALXLUsWqUrY3JYER3T4TBJII s70j+sDS/UT2QRp61SE7S3E EXopNXoFE73JLRmvpi/UrOO/Vz4Se 6wXv/CYCKjGw06U4WRgR YXcpEhJROyNapmdIKSx hOzfLVE1gqA0PweZR8d tY3aNQSRn3sPpwJr6Mi /PqQKAMMrZ9ckJpf1+b QMOOvxgzz2U1GS18b3y ZKcgTMEaJzd/GZYzi/B N2DzQ0MsrSwYXfsNLFO Bbs8PJMW4LYIxeeOe6rUgkWOF 7CC9Dh/dduQ1QrsJhmZAEFfd6ByYV+ ;{id = 2854 (zsk), size = 1688b}
example.com. 3600 IN RRSIG DNSKEY DSA 2 3600 20070926134150 20070829134150 2854 example.com. MCwCFBQRtlR4BEv9ohi+PGFjp+AHsJuHAhRCvz0shggvnvI88DFnBDCczHUcVA== ;{id = 2854}
SECTION AUTHORITY
example.com. IN NS ns.example.com.
example.com. 3600 IN RRSIG NS 3 2 3600 20070926134150 20070829134150 2854 example.com. MC0CFQCN+qHdJxoI/2tNKwsb08pra/G7aAIUAWA5sDdJTbrXA1/3OaesGBAO3sI= ;{id = 2854}
SECTION ADDITIONAL
ns.example.com. IN A 1.2.3.4
ns.example.com. 3600 IN RRSIG A 3 3 3600 20070926135752 20070829135752 2854 example.com. MC0CFQCMSWxVehgOQLoYclB9PIAbNP229AIUeH0vNNGJhjnZiqgIOKvs1EhzqAo= ;{id = 2854}
ENTRY_END
; responses to DS empty nonterminal queries.
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR AA NOERROR
SECTION QUESTION
194.example.com. IN DS
SECTION AUTHORITY
example.com. 3600 IN SOA ns.example.com. host.example.com. 2007091980 3600 7200 1209600 7200
example.com. 3600 IN RRSIG SOA 3 2 3600 20070926135752 20070829135752 2854 example.com. MC0CFCOn5qKBIV7bwFMBA+Qqiblx0cylAhUAoFiGtFm2wHhJpq9MooTYdeVw45s= ;{id = 2854}
; This NSEC proves the NOERROR/NODATA case.
194.example.com. IN NSEC 0.0.194.example.com. A RRSIG NSEC
194.example.com. 3600 IN RRSIG NSEC 3 3 3600 20070926135752 20070829135752 2854 example.com. MC0CFDcoKl74U9FjsuYF3Vc0E8GQ2GgzAhUAhlyhO2MMcAWQMxIhEZ4MguokN5g= ;{id = 2854}
ENTRY_END
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
; Bad NXDOMAIN response, this should be NOERROR.
REPLY QR AA NXDOMAIN
SECTION QUESTION
0.194.example.com. IN DS
SECTION AUTHORITY
example.com. 3600 IN SOA ns.example.com. host.example.com. 2007091980 3600 7200 1209600 7200
example.com. 3600 IN RRSIG SOA 3 2 3600 20070926135752 20070829135752 2854 example.com. MC0CFCOn5qKBIV7bwFMBA+Qqiblx0cylAhUAoFiGtFm2wHhJpq9MooTYdeVw45s= ;{id = 2854}
; This NSEC proves the NOERROR/NODATA case.
194.example.com. IN NSEC 0.0.194.example.com. A RRSIG NSEC
194.example.com. 3600 IN RRSIG NSEC 3 3 3600 20070926135752 20070829135752 2854 example.com. MC0CFDcoKl74U9FjsuYF3Vc0E8GQ2GgzAhUAhlyhO2MMcAWQMxIhEZ4MguokN5g= ;{id = 2854}
ENTRY_END
; response for delegation to sub zone.
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
0.0.194.example.com. IN DS
SECTION ANSWER
0.0.194.example.com. 3600 IN DS 30899 RSASHA1 1 aa46f0717075d9750ac3596c659a2e326b33c28c
0.0.194.example.com. 3600 IN RRSIG DS 3 5 3600 20070926135752 20070829135752 2854 example.com. MCwCFC9GIqtp/103hktw6bPpD83gr+0iAhQ8yev2yUaR9l64rYBUYTJqOoTKdw== ;{id = 2854}
SECTION AUTHORITY
0.0.194.example.com. IN NS ns.sub.example.com.
SECTION ADDITIONAL
ns.sub.example.com. IN A 1.2.3.6
ENTRY_END
; response for delegation to sub zone
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
0.0.194.example.com. IN DNSKEY
SECTION ANSWER
SECTION AUTHORITY
0.0.194.example.com. IN NS ns.sub.example.com.
0.0.194.example.com. 3600 IN DS 30899 RSASHA1 1 aa46f0717075d9750ac3596c659a2e326b33c28c
0.0.194.example.com. 3600 IN RRSIG DS 3 5 3600 20070926135752 20070829135752 2854 example.com. MCwCFC9GIqtp/103hktw6bPpD83gr+0iAhQ8yev2yUaR9l64rYBUYTJqOoTKdw== ;{id = 2854}
SECTION ADDITIONAL
ns.sub.example.com. IN A 1.2.3.6
ENTRY_END
RANGE_END
; ns.sub.example.com. for zone 0.0.194.example.com.
RANGE_BEGIN 0 100
ADDRESS 1.2.3.6
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
0.0.194.example.com. IN NS
SECTION ANSWER
0.0.194.example.com. IN NS ns.sub.example.com.
0.0.194.example.com. 3600 IN RRSIG NS 5 5 3600 20070926135752 20070829135752 30899 0.0.194.example.com. KXDA+/PJAE+dXhv6O6Z0ZovDwabSRJcIt+GT5AL6ewlj46hzo/SDKUtEhYCeT1IVQvYtXrESwFZjpp7N0rXXBg== ;{id = 30899}
SECTION ADDITIONAL
ns.sub.example.com. IN A 1.2.3.6
ENTRY_END
; response to DNSKEY priming query
; 0.0.194.example.com. 3600 IN DS 30899 RSASHA1 1 aa46f0717075d9750ac3596c659a2e326b33c28c
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
0.0.194.example.com. IN DNSKEY
SECTION ANSWER
0.0.194.example.com. 3600 IN DNSKEY 256 3 5 AQPQ41chR9DEHt/aIzIFAqanbDlRflJoRs5yz1jFsoRIT7dWf0r+PeDuewdxkszNH6wnU4QL8pfKFRh5PIYVBLK3 ;{id = 30899 (zsk), size = 512b}
0.0.194.example.com. 3600 IN RRSIG DNSKEY 5 5 3600 20070926135752 20070829135752 30899 0.0.194.example.com. fSmc7ef6NwbDXC0o4wPc/aa8LakW5ZJwEZ4xPYl3tTZKmPNM7hPXskl1tFlvst9Va4u37F62v+16trprHb+SCQ== ;{id = 30899}
SECTION AUTHORITY
0.0.194.example.com. IN NS ns.sub.example.com.
0.0.194.example.com. 3600 IN RRSIG NS 5 5 3600 20070926135752 20070829135752 30899 0.0.194.example.com. KXDA+/PJAE+dXhv6O6Z0ZovDwabSRJcIt+GT5AL6ewlj46hzo/SDKUtEhYCeT1IVQvYtXrESwFZjpp7N0rXXBg== ;{id = 30899}
SECTION ADDITIONAL
ns.sub.example.com. IN A 1.2.3.6
ENTRY_END
; response to query of interest
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
328.0.0.194.example.com. IN A
SECTION ANSWER
328.0.0.194.example.com. IN A 11.11.11.11
328.0.0.194.example.com. 3600 IN RRSIG A 5 6 3600 20070926135752 20070829135752 30899 0.0.194.example.com. chZW77mqywhw/4ch6BxXQ4EbFgb9zgh2xF75FLlKq/7ey6CfHSJRpJRjRqtMTn+1i18UL2B4nPS/WnK5DZeqlA== ;{id = 30899}
SECTION AUTHORITY
SECTION ADDITIONAL
ENTRY_END
RANGE_END
STEP 1 QUERY
ENTRY_BEGIN
REPLY RD DO
SECTION QUESTION
328.0.0.194.example.com. IN A
ENTRY_END
; recursion happens here.
STEP 10 CHECK_ANSWER
ENTRY_BEGIN
MATCH all
REPLY QR RD RA AD NOERROR
SECTION QUESTION
328.0.0.194.example.com. IN A
SECTION ANSWER
328.0.0.194.example.com. 3600 IN A 11.11.11.11
328.0.0.194.example.com. 3600 IN RRSIG A 5 6 3600 20070926135752 20070829135752 30899 0.0.194.example.com. chZW77mqywhw/4ch6BxXQ4EbFgb9zgh2xF75FLlKq/7ey6CfHSJRpJRjRqtMTn+1i18UL2B4nPS/WnK5DZeqlA== ;{id = 30899}
SECTION AUTHORITY
SECTION ADDITIONAL
ENTRY_END
SCENARIO_END
dnssecjava-1.1.3/src/test/resources/unbound/val_any.rpl 0000664 0000000 0000000 00000026211 13020541473 0023240 0 ustar 00root root 0000000 0000000 ; config options
; The island of trust is at example.com
server:
trust-anchor: "example.com. 3600 IN DS 2854 3 1 46e4ffc6e9a4793b488954bd3f0cc6af0dfb201b"
val-override-date: "20070916134226"
target-fetch-policy: "0 0 0 0 0"
stub-zone:
name: "."
stub-addr: 193.0.14.129 # K.ROOT-SERVERS.NET.
CONFIG_END
SCENARIO_BEGIN Test validator with response to qtype ANY
; K.ROOT-SERVERS.NET.
RANGE_BEGIN 0 100
ADDRESS 193.0.14.129
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
. IN NS
SECTION ANSWER
. IN NS K.ROOT-SERVERS.NET.
SECTION ADDITIONAL
K.ROOT-SERVERS.NET. IN A 193.0.14.129
ENTRY_END
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
example.com. IN ANY
SECTION AUTHORITY
com. IN NS a.gtld-servers.net.
SECTION ADDITIONAL
a.gtld-servers.net. IN A 192.5.6.30
ENTRY_END
RANGE_END
; a.gtld-servers.net.
RANGE_BEGIN 0 100
ADDRESS 192.5.6.30
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
com. IN NS
SECTION ANSWER
com. IN NS a.gtld-servers.net.
SECTION ADDITIONAL
a.gtld-servers.net. IN A 192.5.6.30
ENTRY_END
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
example.com. IN ANY
SECTION AUTHORITY
example.com. IN NS ns.example.com.
SECTION ADDITIONAL
ns.example.com. IN A 1.2.3.4
ENTRY_END
RANGE_END
; ns.example.com.
RANGE_BEGIN 0 100
ADDRESS 1.2.3.4
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
example.com. IN NS
SECTION ANSWER
example.com. IN NS ns.example.com.
example.com. 3600 IN RRSIG NS 3 2 3600 20070926134150 20070829134150 2854 example.com. MC0CFQCN+qHdJxoI/2tNKwsb08pra/G7aAIUAWA5sDdJTbrXA1/3OaesGBAO3sI= ;{id = 2854}
SECTION ADDITIONAL
ns.example.com. IN A 1.2.3.4
ns.example.com. 3600 IN RRSIG A 3 3 3600 20070926135752 20070829135752 2854 example.com. MC0CFQCMSWxVehgOQLoYclB9PIAbNP229AIUeH0vNNGJhjnZiqgIOKvs1EhzqAo= ;{id = 2854}
ENTRY_END
; response to DNSKEY priming query
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
example.com. IN DNSKEY
SECTION ANSWER
example.com. 3600 IN DNSKEY 256 3 3 ALXLUsWqUrY3JYER3T4TBJII s70j+sDS/UT2QRp61SE7S3E EXopNXoFE73JLRmvpi/UrOO/Vz4Se 6wXv/CYCKjGw06U4WRgR YXcpEhJROyNapmdIKSx hOzfLVE1gqA0PweZR8d tY3aNQSRn3sPpwJr6Mi /PqQKAMMrZ9ckJpf1+b QMOOvxgzz2U1GS18b3y ZKcgTMEaJzd/GZYzi/B N2DzQ0MsrSwYXfsNLFO Bbs8PJMW4LYIxeeOe6rUgkWOF 7CC9Dh/dduQ1QrsJhmZAEFfd6ByYV+ ;{id = 2854 (zsk), size = 1688b}
example.com. 3600 IN RRSIG DNSKEY 3 2 3600 20070926134802 20070829134802 2854 example.com. MCwCFG1yhRNtTEa3Eno2zhVVuy2EJX3wAhQeLyUp6+UXcpC5qGNu9tkrTEgPUg== ;{id = 2854}
SECTION AUTHORITY
example.com. IN NS ns.example.com.
example.com. 3600 IN RRSIG NS 3 2 3600 20070926134150 20070829134150 2854 example.com. MC0CFQCN+qHdJxoI/2tNKwsb08pra/G7aAIUAWA5sDdJTbrXA1/3OaesGBAO3sI= ;{id = 2854}
SECTION ADDITIONAL
ns.example.com. IN A 1.2.3.4
ns.example.com. 3600 IN RRSIG A 3 3 3600 20070926135752 20070829135752 2854 example.com. MC0CFQCMSWxVehgOQLoYclB9PIAbNP229AIUeH0vNNGJhjnZiqgIOKvs1EhzqAo= ;{id = 2854}
ENTRY_END
; response to query of interest
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
example.com. IN ANY
SECTION ANSWER
example.com. 86400 IN SOA open.example.com. hostmaster.example.com. 2007090400 28800 7200 604800 18000
example.com. 86400 IN RRSIG SOA 3 2 86400 20070926134150 20070829134150 2854 example.com. MC0CFQCSs8KJepwaIp5vu++/0hk04lkXvgIUdphJSAE/MYob30WcRei9/nL49tE= ;{id = 2854}
example.com. 3600 IN DNSKEY 256 3 3 ALXLUsWqUrY3JYER3T4TBJIIs70j+sDS/UT2QRp61SE7S3EEXopNXoFE73JLRmvpi/UrOO/Vz4Se6wXv/CYCKjGw06U4WRgRYXcpEhJROyNapmdIKSxhOzfLVE1gqA0PweZR8dtY3aNQSRn3sPpwJr6Mi/PqQKAMMrZ9ckJpf1+bQMOOvxgzz2U1GS18b3yZKcgTMEaJzd/GZYzi/BN2DzQ0MsrSwYXfsNLFOBbs8PJMW4LYIxeeOe6rUgkWOF7CC9Dh/dduQ1QrsJhmZAEFfd6ByYV+ ;{id = 2854 (zsk), size = 1688b}
example.com. 3600 IN RRSIG DNSKEY 3 2 3600 20070926134150 20070829134150 2854 example.com. MCwCFHq7BNVAeLW+Uw/rkjVS08lrMDk/AhR+bvChHfiE4jLb6uoyE54/irCuqA== ;{id = 2854}
example.com. 600 IN NAPTR 20 0 "s" "SIP+D2U" "" _sip._udp.example.com.
example.com. 600 IN RRSIG NAPTR 3 2 600 20070926134150 20070829134150 2854 example.com. MC0CFE8qs66bzuOyKmTIacamrmqabMRzAhUAn0MujX1LB0UpTHuLMgdgMgJJlq4= ;{id = 2854}
example.com. 86400 IN AAAA 2001:7b8:206:1::1
example.com. 86400 IN RRSIG AAAA 3 2 86400 20070926134150 20070829134150 2854 example.com. MC0CFEqS4WHyqhUkv7t42TsBZJk/Q9paAhUAtTZ8GaXGpot0PmsM0oGzQU+2iw4= ;{id = 2854}
example.com. 86400 IN TXT "Stichting NLnet Labs"
example.com. 86400 IN RRSIG TXT 3 2 86400 20070926134150 20070829134150 2854 example.com. MCwCFH3otn2u8zXczBS8L0VKpyAYZGSkAhQLGaQclkzMAzlB5j73opFjdkh8TA== ;{id = 2854}
example.com. 86400 IN MX 100 v.net.example.
example.com. 86400 IN MX 50 open.example.com.
example.com. 86400 IN RRSIG MX 3 2 86400 20070926134150 20070829134150 2854 example.com. MCwCFEKh3jeqh69zcOqWWv3GNKlMECPyAhR9HJkcPLqlyVWUccWDFJfGGcQfdg== ;{id = 2854}
example.com. 86400 IN NS v.net.example.
example.com. 86400 IN NS open.example.com.
example.com. 86400 IN NS ns7.domain-registry.example.
example.com. 86400 IN RRSIG NS 3 2 86400 20070926134150 20070829134150 2854 example.com. MC0CFQCaRn30X4neKW7KYoTa2kcsoOLgfgIURvKEyDczLypWlx99KpxzMxRYhEc= ;{id = 2854}
example.com. 86400 IN A 213.154.224.1
example.com. 86400 IN RRSIG A 3 2 86400 20070926134150 20070829134150 2854 example.com. MCwCFH8kSLxmRTwzlGDxvF1e4y/gM+5dAhQkzyQ2a6Gf+CMaHzVScaUvTt9HhQ== ;{id = 2854}
example.com. 18000 IN NSEC _sip._udp.example.com. A NS SOA MX TXT AAAA NAPTR RRSIG NSEC DNSKEY
example.com. 18000 IN RRSIG NSEC 3 2 18000 20070926134150 20070829134150 2854 example.com. MCwCFBzOGtpgq4uJ2jeuLPYl2HowIRzDAhQVXNz1haQ1mI7z9lt5gcvWW+lFhA== ;{id = 2854}
SECTION AUTHORITY
SECTION ADDITIONAL
ns7.domain-registry.example. 80173 IN A 62.4.86.230
open.example.com. 600 IN A 213.154.224.1
open.example.com. 600 IN AAAA 2001:7b8:206:1::53
open.example.com. 600 IN AAAA 2001:7b8:206:1::1
v.net.example. 28800 IN A 213.154.224.17
v.net.example. 28800 IN AAAA 2001:7b8:206:1:200:39ff:fe59:b187
johnny.example.com. 600 IN A 213.154.224.44
open.example.com. 600 IN RRSIG A 3 3 600 20070926134150 20070829134150 2854 example.com. MC0CFQCh8bja923UJmg1+sYXMK8WIE4dpgIUQe9sZa0GOcUYSgb2rXoogF8af+Y= ;{id = 2854}
open.example.com. 600 IN RRSIG AAAA 3 3 600 20070926134150 20070829134150 2854 example.com. MC0CFQCRGJgIS6kEVG7aJfovuG/q3cgOWwIUYEIFCnfRQlMIYWF7BKMQoMbdkE0= ;{id = 2854}
johnny.example.com. 600 IN RRSIG A 3 3 600 20070926134150 20070829134150 2854 example.com. MCwCFAh0/zSpCd/9eMNz7AyfnuGQFD1ZAhQEpNFNw4XByNEcbi/vsVeii9kp7g== ;{id = 2854}
_sip._udp.example.com. 600 IN RRSIG SRV 3 4 600 20070926134150 20070829134150 2854 example.com. MCwCFFSRVgOcq1ihVuO6MhCuzWs6SxpVAhRPHHCKy0JxymVkYeFOxTkbVSWMMw== ;{id = 2854}
_sip._udp.example.com. 600 IN SRV 0 0 5060 johnny.example.com.
ENTRY_END
RANGE_END
STEP 1 QUERY
ENTRY_BEGIN
MATCH TCP
REPLY RD DO
SECTION QUESTION
example.com. IN ANY
ENTRY_END
; recursion happens here.
STEP 10 CHECK_ANSWER
ENTRY_BEGIN
MATCH all
REPLY QR RD RA AD NOERROR
SECTION QUESTION
example.com. IN ANY
SECTION ANSWER
example.com. 86400 IN SOA open.example.com. hostmaster.example.com. 2007090400 28800 7200 604800 18000
example.com. 86400 IN RRSIG SOA 3 2 86400 20070926134150 20070829134150 2854 example.com. MC0CFQCSs8KJepwaIp5vu++/0hk04lkXvgIUdphJSAE/MYob30WcRei9/nL49tE= ;{id = 2854}
example.com. 3600 IN DNSKEY 256 3 3 ALXLUsWqUrY3JYER3T4TBJIIs70j+sDS/UT2QRp61SE7S3EEXopNXoFE73JLRmvpi/UrOO/Vz4Se6wXv/CYCKjGw06U4WRgRYXcpEhJROyNapmdIKSxhOzfLVE1gqA0PweZR8dtY3aNQSRn3sPpwJr6Mi/PqQKAMMrZ9ckJpf1+bQMOOvxgzz2U1GS18b3yZKcgTMEaJzd/GZYzi/BN2DzQ0MsrSwYXfsNLFOBbs8PJMW4LYIxeeOe6rUgkWOF7CC9Dh/dduQ1QrsJhmZAEFfd6ByYV+ ;{id = 2854 (zsk), size = 1688b}
example.com. 3600 IN RRSIG DNSKEY 3 2 3600 20070926134150 20070829134150 2854 example.com. MCwCFHq7BNVAeLW+Uw/rkjVS08lrMDk/AhR+bvChHfiE4jLb6uoyE54/irCuqA== ;{id = 2854}
example.com. 600 IN NAPTR 20 0 "s" "SIP+D2U" "" _sip._udp.example.com.
example.com. 600 IN RRSIG NAPTR 3 2 600 20070926134150 20070829134150 2854 example.com. MC0CFE8qs66bzuOyKmTIacamrmqabMRzAhUAn0MujX1LB0UpTHuLMgdgMgJJlq4= ;{id = 2854}
example.com. 86400 IN AAAA 2001:7b8:206:1::1
example.com. 86400 IN RRSIG AAAA 3 2 86400 20070926134150 20070829134150 2854 example.com. MC0CFEqS4WHyqhUkv7t42TsBZJk/Q9paAhUAtTZ8GaXGpot0PmsM0oGzQU+2iw4= ;{id = 2854}
example.com. 86400 IN TXT "Stichting NLnet Labs"
example.com. 86400 IN RRSIG TXT 3 2 86400 20070926134150 20070829134150 2854 example.com. MCwCFH3otn2u8zXczBS8L0VKpyAYZGSkAhQLGaQclkzMAzlB5j73opFjdkh8TA== ;{id = 2854}
example.com. 86400 IN MX 100 v.net.example.
example.com. 86400 IN MX 50 open.example.com.
example.com. 86400 IN RRSIG MX 3 2 86400 20070926134150 20070829134150 2854 example.com. MCwCFEKh3jeqh69zcOqWWv3GNKlMECPyAhR9HJkcPLqlyVWUccWDFJfGGcQfdg== ;{id = 2854}
example.com. 86400 IN NS v.net.example.
example.com. 86400 IN NS open.example.com.
example.com. 86400 IN NS ns7.domain-registry.example.
example.com. 86400 IN RRSIG NS 3 2 86400 20070926134150 20070829134150 2854 example.com. MC0CFQCaRn30X4neKW7KYoTa2kcsoOLgfgIURvKEyDczLypWlx99KpxzMxRYhEc= ;{id = 2854}
example.com. 86400 IN A 213.154.224.1
example.com. 86400 IN RRSIG A 3 2 86400 20070926134150 20070829134150 2854 example.com. MCwCFH8kSLxmRTwzlGDxvF1e4y/gM+5dAhQkzyQ2a6Gf+CMaHzVScaUvTt9HhQ== ;{id = 2854}
example.com. 18000 IN NSEC _sip._udp.example.com. A NS SOA MX TXT AAAA NAPTR RRSIG NSEC DNSKEY
example.com. 18000 IN RRSIG NSEC 3 2 18000 20070926134150 20070829134150 2854 example.com. MCwCFBzOGtpgq4uJ2jeuLPYl2HowIRzDAhQVXNz1haQ1mI7z9lt5gcvWW+lFhA== ;{id = 2854}
SECTION AUTHORITY
SECTION ADDITIONAL
open.example.com. 600 IN A 213.154.224.1
open.example.com. 600 IN AAAA 2001:7b8:206:1::53
open.example.com. 600 IN AAAA 2001:7b8:206:1::1
_sip._udp.example.com. 600 IN SRV 0 0 5060 johnny.example.com.
open.example.com. 600 IN RRSIG A 3 3 600 20070926134150 20070829134150 2854 example.com. MC0CFQCh8bja923UJmg1+sYXMK8WIE4dpgIUQe9sZa0GOcUYSgb2rXoogF8af+Y= ;{id = 2854}
open.example.com. 600 IN RRSIG AAAA 3 3 600 20070926134150 20070829134150 2854 example.com. MC0CFQCRGJgIS6kEVG7aJfovuG/q3cgOWwIUYEIFCnfRQlMIYWF7BKMQoMbdkE0= ;{id = 2854}
_sip._udp.example.com. 600 IN RRSIG SRV 3 4 600 20070926134150 20070829134150 2854 example.com. MCwCFFSRVgOcq1ihVuO6MhCuzWs6SxpVAhRPHHCKy0JxymVkYeFOxTkbVSWMMw== ;{id = 2854}
ENTRY_END
SCENARIO_END
dnssecjava-1.1.3/src/test/resources/unbound/val_any_cname.rpl 0000664 0000000 0000000 00000012165 13020541473 0024406 0 ustar 00root root 0000000 0000000 ; config options
; The island of trust is at example.com
server:
trust-anchor: "example.com. 3600 IN DS 2854 3 1 46e4ffc6e9a4793b488954bd3f0cc6af0dfb201b"
val-override-date: "20070916134226"
target-fetch-policy: "0 0 0 0 0"
stub-zone:
name: "."
stub-addr: 193.0.14.129 # K.ROOT-SERVERS.NET.
CONFIG_END
SCENARIO_BEGIN Test validator with response to qtype ANY that includes CNAME
; K.ROOT-SERVERS.NET.
RANGE_BEGIN 0 100
ADDRESS 193.0.14.129
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
. IN NS
SECTION ANSWER
. IN NS K.ROOT-SERVERS.NET.
SECTION ADDITIONAL
K.ROOT-SERVERS.NET. IN A 193.0.14.129
ENTRY_END
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
www.example.com. IN ANY
SECTION AUTHORITY
com. IN NS a.gtld-servers.net.
SECTION ADDITIONAL
a.gtld-servers.net. IN A 192.5.6.30
ENTRY_END
RANGE_END
; a.gtld-servers.net.
RANGE_BEGIN 0 100
ADDRESS 192.5.6.30
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
com. IN NS
SECTION ANSWER
com. IN NS a.gtld-servers.net.
SECTION ADDITIONAL
a.gtld-servers.net. IN A 192.5.6.30
ENTRY_END
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
www.example.com. IN ANY
SECTION AUTHORITY
example.com. IN NS ns.example.com.
SECTION ADDITIONAL
ns.example.com. IN A 1.2.3.4
ENTRY_END
RANGE_END
; ns.example.com.
RANGE_BEGIN 0 100
ADDRESS 1.2.3.4
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
example.com. IN NS
SECTION ANSWER
example.com. IN NS ns.example.com.
example.com. 3600 IN RRSIG NS 3 2 3600 20070926134150 20070829134150 2854 example.com. MC0CFQCN+qHdJxoI/2tNKwsb08pra/G7aAIUAWA5sDdJTbrXA1/3OaesGBAO3sI= ;{id = 2854}
SECTION ADDITIONAL
ns.example.com. IN A 1.2.3.4
ns.example.com. 3600 IN RRSIG A 3 3 3600 20070926135752 20070829135752 2854 example.com. MC0CFQCMSWxVehgOQLoYclB9PIAbNP229AIUeH0vNNGJhjnZiqgIOKvs1EhzqAo= ;{id = 2854}
ENTRY_END
; response to DNSKEY priming query
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
example.com. IN DNSKEY
SECTION ANSWER
example.com. 3600 IN DNSKEY 256 3 3 ALXLUsWqUrY3JYER3T4TBJII s70j+sDS/UT2QRp61SE7S3E EXopNXoFE73JLRmvpi/UrOO/Vz4Se 6wXv/CYCKjGw06U4WRgR YXcpEhJROyNapmdIKSx hOzfLVE1gqA0PweZR8d tY3aNQSRn3sPpwJr6Mi /PqQKAMMrZ9ckJpf1+b QMOOvxgzz2U1GS18b3y ZKcgTMEaJzd/GZYzi/B N2DzQ0MsrSwYXfsNLFO Bbs8PJMW4LYIxeeOe6rUgkWOF 7CC9Dh/dduQ1QrsJhmZAEFfd6ByYV+ ;{id = 2854 (zsk), size = 1688b}
example.com. 3600 IN RRSIG DNSKEY 3 2 3600 20070926134802 20070829134802 2854 example.com. MCwCFG1yhRNtTEa3Eno2zhVVuy2EJX3wAhQeLyUp6+UXcpC5qGNu9tkrTEgPUg== ;{id = 2854}
SECTION AUTHORITY
example.com. IN NS ns.example.com.
example.com. 3600 IN RRSIG NS 3 2 3600 20070926134150 20070829134150 2854 example.com. MC0CFQCN+qHdJxoI/2tNKwsb08pra/G7aAIUAWA5sDdJTbrXA1/3OaesGBAO3sI= ;{id = 2854}
SECTION ADDITIONAL
ns.example.com. IN A 1.2.3.4
ns.example.com. 3600 IN RRSIG A 3 3 3600 20070926135752 20070829135752 2854 example.com. MC0CFQCMSWxVehgOQLoYclB9PIAbNP229AIUeH0vNNGJhjnZiqgIOKvs1EhzqAo= ;{id = 2854}
ENTRY_END
; response to query of interest
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
www.example.com. IN ANY
SECTION ANSWER
www.example.com. 3600 IN CNAME serf.example.com.
www.example.com. 3600 IN RRSIG CNAME 3 3 3600 20070926134150 20070829134150 2854 example.com. AH/qSA7et6tXS08u4UUsWmXbIedGFpBKhiCqqVAgV8Z95dgn/vrB5ag= ;{id = 2854}
www.example.com. 18000 IN NSEC example.com. CNAME RRSIG NSEC
www.example.com. 18000 IN RRSIG NSEC 3 3 18000 20070926134150 20070829134150 2854 example.com. ACqeCl/aLq90zkeSfneQY+HnvJTUAeyTF03HWdXr3WhnYzupKAdnuQ4= ;{id = 2854}
SECTION AUTHORITY
SECTION ADDITIONAL
ENTRY_END
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
serf.example.com. IN ANY
SECTION ANSWER
serf.example.com. 3600 IN A 192.0.2.1
serf.example.com. 3600 IN RRSIG A 3 3 3600 20070926134150 20070829134150 2854 example.com. AGLOiUcDNkSCplT07hT8szlUfMHNfPh6/104ydBt4bJ6UcfXUiM3pV8= ;{id = 2854}
serf.example.com. 18000 IN NSEC www.example.com. A RRSIG NSEC
serf.example.com. 18000 IN RRSIG NSEC 3 3 18000 20070926134150 20070829134150 2854 example.com. AEBNiqg7Uz+NfNvoyA4KjkqJPb7hrjyS7oPE2MGNgVwUgQrcRIxd7DA= ;{id = 2854}
SECTION AUTHORITY
SECTION ADDITIONAL
ENTRY_END
RANGE_END
STEP 1 QUERY
ENTRY_BEGIN
MATCH TCP
REPLY RD DO
SECTION QUESTION
www.example.com. IN ANY
ENTRY_END
; recursion happens here.
STEP 10 CHECK_ANSWER
ENTRY_BEGIN
MATCH all
REPLY QR RD RA AD NOERROR
SECTION QUESTION
www.example.com. IN ANY
SECTION ANSWER
www.example.com. 3600 IN CNAME serf.example.com.
www.example.com. 3600 IN RRSIG CNAME 3 3 3600 20070926134150 20070829134150 2854 example.com. AH/qSA7et6tXS08u4UUsWmXbIedGFpBKhiCqqVAgV8Z95dgn/vrB5ag= ;{id = 2854}
www.example.com. 18000 IN NSEC example.com. CNAME RRSIG NSEC
www.example.com. 18000 IN RRSIG NSEC 3 3 18000 20070926134150 20070829134150 2854 example.com. ACqeCl/aLq90zkeSfneQY+HnvJTUAeyTF03HWdXr3WhnYzupKAdnuQ4= ;{id = 2854}
ENTRY_END
SCENARIO_END
dnssecjava-1.1.3/src/test/resources/unbound/val_any_dname.rpl 0000664 0000000 0000000 00000027127 13020541473 0024413 0 ustar 00root root 0000000 0000000 ; config options
; The island of trust is at example.com
server:
trust-anchor: "example.com. 3600 IN DS 2854 3 1 46e4ffc6e9a4793b488954bd3f0cc6af0dfb201b"
val-override-date: "20070916134226"
target-fetch-policy: "0 0 0 0 0"
stub-zone:
name: "."
stub-addr: 193.0.14.129 # K.ROOT-SERVERS.NET.
CONFIG_END
SCENARIO_BEGIN Test validator with response to qtype ANY that includes DNAME
; K.ROOT-SERVERS.NET.
RANGE_BEGIN 0 100
ADDRESS 193.0.14.129
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
. IN NS
SECTION ANSWER
. IN NS K.ROOT-SERVERS.NET.
SECTION ADDITIONAL
K.ROOT-SERVERS.NET. IN A 193.0.14.129
ENTRY_END
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
example.com. IN ANY
SECTION AUTHORITY
com. IN NS a.gtld-servers.net.
SECTION ADDITIONAL
a.gtld-servers.net. IN A 192.5.6.30
ENTRY_END
RANGE_END
; a.gtld-servers.net.
RANGE_BEGIN 0 100
ADDRESS 192.5.6.30
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
com. IN NS
SECTION ANSWER
com. IN NS a.gtld-servers.net.
SECTION ADDITIONAL
a.gtld-servers.net. IN A 192.5.6.30
ENTRY_END
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
example.com. IN ANY
SECTION AUTHORITY
example.com. IN NS ns.example.com.
SECTION ADDITIONAL
ns.example.com. IN A 1.2.3.4
ENTRY_END
RANGE_END
; ns.example.com.
RANGE_BEGIN 0 100
ADDRESS 1.2.3.4
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
example.com. IN NS
SECTION ANSWER
example.com. IN NS ns.example.com.
example.com. 3600 IN RRSIG NS 3 2 3600 20070926134150 20070829134150 2854 example.com. MC0CFQCN+qHdJxoI/2tNKwsb08pra/G7aAIUAWA5sDdJTbrXA1/3OaesGBAO3sI= ;{id = 2854}
SECTION ADDITIONAL
ns.example.com. IN A 1.2.3.4
ns.example.com. 3600 IN RRSIG A 3 3 3600 20070926135752 20070829135752 2854 example.com. MC0CFQCMSWxVehgOQLoYclB9PIAbNP229AIUeH0vNNGJhjnZiqgIOKvs1EhzqAo= ;{id = 2854}
ENTRY_END
; response to DNSKEY priming query
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
example.com. IN DNSKEY
SECTION ANSWER
example.com. 3600 IN DNSKEY 256 3 3 ALXLUsWqUrY3JYER3T4TBJII s70j+sDS/UT2QRp61SE7S3E EXopNXoFE73JLRmvpi/UrOO/Vz4Se 6wXv/CYCKjGw06U4WRgR YXcpEhJROyNapmdIKSx hOzfLVE1gqA0PweZR8d tY3aNQSRn3sPpwJr6Mi /PqQKAMMrZ9ckJpf1+b QMOOvxgzz2U1GS18b3y ZKcgTMEaJzd/GZYzi/B N2DzQ0MsrSwYXfsNLFO Bbs8PJMW4LYIxeeOe6rUgkWOF 7CC9Dh/dduQ1QrsJhmZAEFfd6ByYV+ ;{id = 2854 (zsk), size = 1688b}
example.com. 3600 IN RRSIG DNSKEY 3 2 3600 20070926134802 20070829134802 2854 example.com. MCwCFG1yhRNtTEa3Eno2zhVVuy2EJX3wAhQeLyUp6+UXcpC5qGNu9tkrTEgPUg== ;{id = 2854}
SECTION AUTHORITY
example.com. IN NS ns.example.com.
example.com. 3600 IN RRSIG NS 3 2 3600 20070926134150 20070829134150 2854 example.com. MC0CFQCN+qHdJxoI/2tNKwsb08pra/G7aAIUAWA5sDdJTbrXA1/3OaesGBAO3sI= ;{id = 2854}
SECTION ADDITIONAL
ns.example.com. IN A 1.2.3.4
ns.example.com. 3600 IN RRSIG A 3 3 3600 20070926135752 20070829135752 2854 example.com. MC0CFQCMSWxVehgOQLoYclB9PIAbNP229AIUeH0vNNGJhjnZiqgIOKvs1EhzqAo= ;{id = 2854}
ENTRY_END
; response to query of interest
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
example.com. IN ANY
SECTION ANSWER
example.com. 86400 IN SOA open.example.com. hostmaster.example.com. 2007090400 28800 7200 604800 18000
example.com. 86400 IN RRSIG SOA 3 2 86400 20070926134150 20070829134150 2854 example.com. MC0CFQCSs8KJepwaIp5vu++/0hk04lkXvgIUdphJSAE/MYob30WcRei9/nL49tE= ;{id = 2854}
example.com. 3600 IN DNAME example.net.
example.com. 3600 IN RRSIG DNAME 3 2 3600 20070926134150 20070829134150 2854 example.com. MC0CFQCdje5lZfq9kENX9a8lOOKn79BRlQIUbVCx/fXo0kfvAgC5kB8Dvd5LodQ= ;{id = 2854}
example.com. 3600 IN DNSKEY 256 3 3 ALXLUsWqUrY3JYER3T4TBJIIs70j+sDS/UT2QRp61SE7S3EEXopNXoFE73JLRmvpi/UrOO/Vz4Se6wXv/CYCKjGw06U4WRgRYXcpEhJROyNapmdIKSxhOzfLVE1gqA0PweZR8dtY3aNQSRn3sPpwJr6Mi/PqQKAMMrZ9ckJpf1+bQMOOvxgzz2U1GS18b3yZKcgTMEaJzd/GZYzi/BN2DzQ0MsrSwYXfsNLFOBbs8PJMW4LYIxeeOe6rUgkWOF7CC9Dh/dduQ1QrsJhmZAEFfd6ByYV+ ;{id = 2854 (zsk), size = 1688b}
example.com. 3600 IN RRSIG DNSKEY 3 2 3600 20070926134150 20070829134150 2854 example.com. MCwCFHq7BNVAeLW+Uw/rkjVS08lrMDk/AhR+bvChHfiE4jLb6uoyE54/irCuqA== ;{id = 2854}
example.com. 600 IN NAPTR 20 0 "s" "SIP+D2U" "" _sip._udp.example.com.
example.com. 600 IN RRSIG NAPTR 3 2 600 20070926134150 20070829134150 2854 example.com. MC0CFE8qs66bzuOyKmTIacamrmqabMRzAhUAn0MujX1LB0UpTHuLMgdgMgJJlq4= ;{id = 2854}
example.com. 86400 IN AAAA 2001:7b8:206:1::1
example.com. 86400 IN RRSIG AAAA 3 2 86400 20070926134150 20070829134150 2854 example.com. MC0CFEqS4WHyqhUkv7t42TsBZJk/Q9paAhUAtTZ8GaXGpot0PmsM0oGzQU+2iw4= ;{id = 2854}
example.com. 86400 IN TXT "Stichting NLnet Labs"
example.com. 86400 IN RRSIG TXT 3 2 86400 20070926134150 20070829134150 2854 example.com. MCwCFH3otn2u8zXczBS8L0VKpyAYZGSkAhQLGaQclkzMAzlB5j73opFjdkh8TA== ;{id = 2854}
example.com. 86400 IN MX 100 v.net.example.
example.com. 86400 IN MX 50 open.example.com.
example.com. 86400 IN RRSIG MX 3 2 86400 20070926134150 20070829134150 2854 example.com. MCwCFEKh3jeqh69zcOqWWv3GNKlMECPyAhR9HJkcPLqlyVWUccWDFJfGGcQfdg== ;{id = 2854}
example.com. 86400 IN NS v.net.example.
example.com. 86400 IN NS open.example.com.
example.com. 86400 IN NS ns7.domain-registry.example.
example.com. 86400 IN RRSIG NS 3 2 86400 20070926134150 20070829134150 2854 example.com. MC0CFQCaRn30X4neKW7KYoTa2kcsoOLgfgIURvKEyDczLypWlx99KpxzMxRYhEc= ;{id = 2854}
example.com. 86400 IN A 213.154.224.1
example.com. 86400 IN RRSIG A 3 2 86400 20070926134150 20070829134150 2854 example.com. MCwCFH8kSLxmRTwzlGDxvF1e4y/gM+5dAhQkzyQ2a6Gf+CMaHzVScaUvTt9HhQ== ;{id = 2854}
example.com. 18000 IN NSEC _sip._udp.example.com. A NS SOA MX TXT AAAA NAPTR RRSIG NSEC DNSKEY
example.com. 18000 IN RRSIG NSEC 3 2 18000 20070926134150 20070829134150 2854 example.com. MCwCFBzOGtpgq4uJ2jeuLPYl2HowIRzDAhQVXNz1haQ1mI7z9lt5gcvWW+lFhA== ;{id = 2854}
SECTION AUTHORITY
SECTION ADDITIONAL
ns7.domain-registry.example. 80173 IN A 62.4.86.230
open.example.com. 600 IN A 213.154.224.1
open.example.com. 600 IN AAAA 2001:7b8:206:1::53
open.example.com. 600 IN AAAA 2001:7b8:206:1::1
v.net.example. 28800 IN A 213.154.224.17
v.net.example. 28800 IN AAAA 2001:7b8:206:1:200:39ff:fe59:b187
johnny.example.com. 600 IN A 213.154.224.44
open.example.com. 600 IN RRSIG A 3 3 600 20070926134150 20070829134150 2854 example.com. MC0CFQCh8bja923UJmg1+sYXMK8WIE4dpgIUQe9sZa0GOcUYSgb2rXoogF8af+Y= ;{id = 2854}
open.example.com. 600 IN RRSIG AAAA 3 3 600 20070926134150 20070829134150 2854 example.com. MC0CFQCRGJgIS6kEVG7aJfovuG/q3cgOWwIUYEIFCnfRQlMIYWF7BKMQoMbdkE0= ;{id = 2854}
johnny.example.com. 600 IN RRSIG A 3 3 600 20070926134150 20070829134150 2854 example.com. MCwCFAh0/zSpCd/9eMNz7AyfnuGQFD1ZAhQEpNFNw4XByNEcbi/vsVeii9kp7g== ;{id = 2854}
_sip._udp.example.com. 600 IN RRSIG SRV 3 4 600 20070926134150 20070829134150 2854 example.com. MCwCFFSRVgOcq1ihVuO6MhCuzWs6SxpVAhRPHHCKy0JxymVkYeFOxTkbVSWMMw== ;{id = 2854}
_sip._udp.example.com. 600 IN SRV 0 0 5060 johnny.example.com.
ENTRY_END
RANGE_END
STEP 1 QUERY
ENTRY_BEGIN
MATCH TCP
REPLY RD DO
SECTION QUESTION
example.com. IN ANY
ENTRY_END
; recursion happens here.
STEP 10 CHECK_ANSWER
ENTRY_BEGIN
MATCH all
REPLY QR RD RA AD NOERROR
SECTION QUESTION
example.com. IN ANY
SECTION ANSWER
example.com. 86400 IN SOA open.example.com. hostmaster.example.com. 2007090400 28800 7200 604800 18000
example.com. 86400 IN RRSIG SOA 3 2 86400 20070926134150 20070829134150 2854 example.com. MC0CFQCSs8KJepwaIp5vu++/0hk04lkXvgIUdphJSAE/MYob30WcRei9/nL49tE= ;{id = 2854}
example.com. 3600 IN DNAME example.net.
example.com. 3600 IN RRSIG DNAME 3 2 3600 20070926134150 20070829134150 2854 example.com. MC0CFQCdje5lZfq9kENX9a8lOOKn79BRlQIUbVCx/fXo0kfvAgC5kB8Dvd5LodQ= ;{id = 2854}
example.com. 3600 IN DNSKEY 256 3 3 ALXLUsWqUrY3JYER3T4TBJIIs70j+sDS/UT2QRp61SE7S3EEXopNXoFE73JLRmvpi/UrOO/Vz4Se6wXv/CYCKjGw06U4WRgRYXcpEhJROyNapmdIKSxhOzfLVE1gqA0PweZR8dtY3aNQSRn3sPpwJr6Mi/PqQKAMMrZ9ckJpf1+bQMOOvxgzz2U1GS18b3yZKcgTMEaJzd/GZYzi/BN2DzQ0MsrSwYXfsNLFOBbs8PJMW4LYIxeeOe6rUgkWOF7CC9Dh/dduQ1QrsJhmZAEFfd6ByYV+ ;{id = 2854 (zsk), size = 1688b}
example.com. 3600 IN RRSIG DNSKEY 3 2 3600 20070926134150 20070829134150 2854 example.com. MCwCFHq7BNVAeLW+Uw/rkjVS08lrMDk/AhR+bvChHfiE4jLb6uoyE54/irCuqA== ;{id = 2854}
example.com. 600 IN NAPTR 20 0 "s" "SIP+D2U" "" _sip._udp.example.com.
example.com. 600 IN RRSIG NAPTR 3 2 600 20070926134150 20070829134150 2854 example.com. MC0CFE8qs66bzuOyKmTIacamrmqabMRzAhUAn0MujX1LB0UpTHuLMgdgMgJJlq4= ;{id = 2854}
example.com. 86400 IN AAAA 2001:7b8:206:1::1
example.com. 86400 IN RRSIG AAAA 3 2 86400 20070926134150 20070829134150 2854 example.com. MC0CFEqS4WHyqhUkv7t42TsBZJk/Q9paAhUAtTZ8GaXGpot0PmsM0oGzQU+2iw4= ;{id = 2854}
example.com. 86400 IN TXT "Stichting NLnet Labs"
example.com. 86400 IN RRSIG TXT 3 2 86400 20070926134150 20070829134150 2854 example.com. MCwCFH3otn2u8zXczBS8L0VKpyAYZGSkAhQLGaQclkzMAzlB5j73opFjdkh8TA== ;{id = 2854}
example.com. 86400 IN MX 100 v.net.example.
example.com. 86400 IN MX 50 open.example.com.
example.com. 86400 IN RRSIG MX 3 2 86400 20070926134150 20070829134150 2854 example.com. MCwCFEKh3jeqh69zcOqWWv3GNKlMECPyAhR9HJkcPLqlyVWUccWDFJfGGcQfdg== ;{id = 2854}
example.com. 86400 IN NS v.net.example.
example.com. 86400 IN NS open.example.com.
example.com. 86400 IN NS ns7.domain-registry.example.
example.com. 86400 IN RRSIG NS 3 2 86400 20070926134150 20070829134150 2854 example.com. MC0CFQCaRn30X4neKW7KYoTa2kcsoOLgfgIURvKEyDczLypWlx99KpxzMxRYhEc= ;{id = 2854}
example.com. 86400 IN A 213.154.224.1
example.com. 86400 IN RRSIG A 3 2 86400 20070926134150 20070829134150 2854 example.com. MCwCFH8kSLxmRTwzlGDxvF1e4y/gM+5dAhQkzyQ2a6Gf+CMaHzVScaUvTt9HhQ== ;{id = 2854}
example.com. 18000 IN NSEC _sip._udp.example.com. A NS SOA MX TXT AAAA NAPTR RRSIG NSEC DNSKEY
example.com. 18000 IN RRSIG NSEC 3 2 18000 20070926134150 20070829134150 2854 example.com. MCwCFBzOGtpgq4uJ2jeuLPYl2HowIRzDAhQVXNz1haQ1mI7z9lt5gcvWW+lFhA== ;{id = 2854}
SECTION AUTHORITY
SECTION ADDITIONAL
open.example.com. 600 IN A 213.154.224.1
open.example.com. 600 IN AAAA 2001:7b8:206:1::53
open.example.com. 600 IN AAAA 2001:7b8:206:1::1
_sip._udp.example.com. 600 IN SRV 0 0 5060 johnny.example.com.
open.example.com. 600 IN RRSIG A 3 3 600 20070926134150 20070829134150 2854 example.com. MC0CFQCh8bja923UJmg1+sYXMK8WIE4dpgIUQe9sZa0GOcUYSgb2rXoogF8af+Y= ;{id = 2854}
open.example.com. 600 IN RRSIG AAAA 3 3 600 20070926134150 20070829134150 2854 example.com. MC0CFQCRGJgIS6kEVG7aJfovuG/q3cgOWwIUYEIFCnfRQlMIYWF7BKMQoMbdkE0= ;{id = 2854}
_sip._udp.example.com. 600 IN RRSIG SRV 3 4 600 20070926134150 20070829134150 2854 example.com. MCwCFFSRVgOcq1ihVuO6MhCuzWs6SxpVAhRPHHCKy0JxymVkYeFOxTkbVSWMMw== ;{id = 2854}
ENTRY_END
SCENARIO_END
dnssecjava-1.1.3/src/test/resources/unbound/val_cname_loop1.rpl 0000664 0000000 0000000 00000010461 13020541473 0024646 0 ustar 00root root 0000000 0000000 ; config options
; The island of trust is at example.com
server:
trust-anchor: "example.com. 3600 IN DS 2854 3 1 46e4ffc6e9a4793b488954bd3f0cc6af0dfb201b"
val-override-date: "20070916134226"
target-fetch-policy: "0 0 0 0 0"
stub-zone:
name: "."
stub-addr: 193.0.14.129 # K.ROOT-SERVERS.NET.
CONFIG_END
SCENARIO_BEGIN Test validator with cname loop
; K.ROOT-SERVERS.NET.
RANGE_BEGIN 0 100
ADDRESS 193.0.14.129
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
. IN NS
SECTION ANSWER
. IN NS K.ROOT-SERVERS.NET.
SECTION ADDITIONAL
K.ROOT-SERVERS.NET. IN A 193.0.14.129
ENTRY_END
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
www.example.com. IN A
SECTION AUTHORITY
com. IN NS a.gtld-servers.net.
SECTION ADDITIONAL
a.gtld-servers.net. IN A 192.5.6.30
ENTRY_END
RANGE_END
; a.gtld-servers.net.
RANGE_BEGIN 0 100
ADDRESS 192.5.6.30
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
com. IN NS
SECTION ANSWER
com. IN NS a.gtld-servers.net.
SECTION ADDITIONAL
a.gtld-servers.net. IN A 192.5.6.30
ENTRY_END
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
www.example.com. IN A
SECTION AUTHORITY
example.com. IN NS ns.example.com.
SECTION ADDITIONAL
ns.example.com. IN A 1.2.3.4
ENTRY_END
RANGE_END
; ns.example.com.
RANGE_BEGIN 0 100
ADDRESS 1.2.3.4
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
example.com. IN NS
SECTION ANSWER
example.com. IN NS ns.example.com.
example.com. 3600 IN RRSIG NS 3 2 3600 20070926134150 20070829134150 2854 example.com. MC0CFQCN+qHdJxoI/2tNKwsb08pra/G7aAIUAWA5sDdJTbrXA1/3OaesGBAO3sI= ;{id = 2854}
SECTION ADDITIONAL
ns.example.com. IN A 1.2.3.4
ns.example.com. 3600 IN RRSIG A 3 3 3600 20070926135752 20070829135752 2854 example.com. MC0CFQCMSWxVehgOQLoYclB9PIAbNP229AIUeH0vNNGJhjnZiqgIOKvs1EhzqAo= ;{id = 2854}
ENTRY_END
; response to DNSKEY priming query
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
example.com. IN DNSKEY
SECTION ANSWER
example.com. 3600 IN DNSKEY 256 3 3 ALXLUsWqUrY3JYER3T4TBJII s70j+sDS/UT2QRp61SE7S3E EXopNXoFE73JLRmvpi/UrOO/Vz4Se 6wXv/CYCKjGw06U4WRgR YXcpEhJROyNapmdIKSx hOzfLVE1gqA0PweZR8d tY3aNQSRn3sPpwJr6Mi /PqQKAMMrZ9ckJpf1+b QMOOvxgzz2U1GS18b3y ZKcgTMEaJzd/GZYzi/B N2DzQ0MsrSwYXfsNLFO Bbs8PJMW4LYIxeeOe6rUgkWOF 7CC9Dh/dduQ1QrsJhmZAEFfd6ByYV+ ;{id = 2854 (zsk), size = 1688b}
example.com. 3600 IN RRSIG DNSKEY 3 2 3600 20070926134802 20070829134802 2854 example.com. MCwCFG1yhRNtTEa3Eno2zhVVuy2EJX3wAhQeLyUp6+UXcpC5qGNu9tkrTEgPUg== ;{id = 2854}
SECTION AUTHORITY
example.com. IN NS ns.example.com.
example.com. 3600 IN RRSIG NS 3 2 3600 20070926134150 20070829134150 2854 example.com. MC0CFQCN+qHdJxoI/2tNKwsb08pra/G7aAIUAWA5sDdJTbrXA1/3OaesGBAO3sI= ;{id = 2854}
SECTION ADDITIONAL
ns.example.com. IN A 1.2.3.4
ns.example.com. 3600 IN RRSIG A 3 3 3600 20070926135752 20070829135752 2854 example.com. MC0CFQCMSWxVehgOQLoYclB9PIAbNP229AIUeH0vNNGJhjnZiqgIOKvs1EhzqAo= ;{id = 2854}
ENTRY_END
; response to query of interest
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
www.example.com. IN A
SECTION ANSWER
www.example.com. IN CNAME www.example.com.
www.example.com. 3600 IN RRSIG CNAME DSA 3 3600 20070926134150 20070829134150 2854 example.com. MCwCFH0SwLHe7u56TshoVciFRHEl1KqbAhQ3zBOZMlL8bt1DqoDoM5ni8U/1UA== ;{id = 2854}
SECTION AUTHORITY
example.com. IN NS ns.example.com.
example.com. 3600 IN RRSIG NS 3 2 3600 20070926134150 20070829134150 2854 example.com. MC0CFQCN+qHdJxoI/2tNKwsb08pra/G7aAIUAWA5sDdJTbrXA1/3OaesGBAO3sI= ;{id = 2854}
SECTION ADDITIONAL
ns.example.com. IN A 1.2.3.4
www.example.com. 3600 IN RRSIG A 3 3 3600 20070926134150 20070829134150 2854 example.com. MC0CFC99iE9K5y2WNgI0gFvBWaTi9wm6AhUAoUqOpDtG5Zct+Qr9F3mSdnbc6V4= ;{id = 2854}
ENTRY_END
RANGE_END
STEP 1 QUERY
ENTRY_BEGIN
REPLY RD DO
SECTION QUESTION
www.example.com. IN A
ENTRY_END
; recursion happens here.
STEP 10 CHECK_ANSWER
ENTRY_BEGIN
MATCH all
REPLY QR RD RA SERVFAIL
SECTION QUESTION
www.example.com. IN A
SECTION ANSWER
SECTION AUTHORITY
SECTION ADDITIONAL
ENTRY_END
SCENARIO_END
dnssecjava-1.1.3/src/test/resources/unbound/val_cname_loop2.rpl 0000664 0000000 0000000 00000010440 13020541473 0024644 0 ustar 00root root 0000000 0000000 ; config options
; The island of trust is at example.com
server:
trust-anchor: "example.com. 3600 IN DS 2854 3 1 46e4ffc6e9a4793b488954bd3f0cc6af0dfb201b"
val-override-date: "20070916134226"
target-fetch-policy: "0 0 0 0 0"
stub-zone:
name: "."
stub-addr: 193.0.14.129 # K.ROOT-SERVERS.NET.
CONFIG_END
SCENARIO_BEGIN Test validator with cname 2 step loop
; K.ROOT-SERVERS.NET.
RANGE_BEGIN 0 100
ADDRESS 193.0.14.129
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
. IN NS
SECTION ANSWER
. IN NS K.ROOT-SERVERS.NET.
SECTION ADDITIONAL
K.ROOT-SERVERS.NET. IN A 193.0.14.129
ENTRY_END
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
www.example.com. IN A
SECTION AUTHORITY
com. IN NS a.gtld-servers.net.
SECTION ADDITIONAL
a.gtld-servers.net. IN A 192.5.6.30
ENTRY_END
RANGE_END
; a.gtld-servers.net.
RANGE_BEGIN 0 100
ADDRESS 192.5.6.30
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
com. IN NS
SECTION ANSWER
com. IN NS a.gtld-servers.net.
SECTION ADDITIONAL
a.gtld-servers.net. IN A 192.5.6.30
ENTRY_END
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
www.example.com. IN A
SECTION AUTHORITY
example.com. IN NS ns.example.com.
SECTION ADDITIONAL
ns.example.com. IN A 1.2.3.4
ENTRY_END
RANGE_END
; ns.example.com.
RANGE_BEGIN 0 100
ADDRESS 1.2.3.4
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
example.com. IN NS
SECTION ANSWER
example.com. IN NS ns.example.com.
example.com. 3600 IN RRSIG NS 3 2 3600 20070926134150 20070829134150 2854 example.com. MC0CFQCN+qHdJxoI/2tNKwsb08pra/G7aAIUAWA5sDdJTbrXA1/3OaesGBAO3sI= ;{id = 2854}
SECTION ADDITIONAL
ns.example.com. IN A 1.2.3.4
ns.example.com. 3600 IN RRSIG A 3 3 3600 20070926135752 20070829135752 2854 example.com. MC0CFQCMSWxVehgOQLoYclB9PIAbNP229AIUeH0vNNGJhjnZiqgIOKvs1EhzqAo= ;{id = 2854}
ENTRY_END
; response to DNSKEY priming query
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
example.com. IN DNSKEY
SECTION ANSWER
example.com. 3600 IN DNSKEY 256 3 3 ALXLUsWqUrY3JYER3T4TBJII s70j+sDS/UT2QRp61SE7S3E EXopNXoFE73JLRmvpi/UrOO/Vz4Se 6wXv/CYCKjGw06U4WRgR YXcpEhJROyNapmdIKSx hOzfLVE1gqA0PweZR8d tY3aNQSRn3sPpwJr6Mi /PqQKAMMrZ9ckJpf1+b QMOOvxgzz2U1GS18b3y ZKcgTMEaJzd/GZYzi/B N2DzQ0MsrSwYXfsNLFO Bbs8PJMW4LYIxeeOe6rUgkWOF 7CC9Dh/dduQ1QrsJhmZAEFfd6ByYV+ ;{id = 2854 (zsk), size = 1688b}
example.com. 3600 IN RRSIG DNSKEY 3 2 3600 20070926134802 20070829134802 2854 example.com. MCwCFG1yhRNtTEa3Eno2zhVVuy2EJX3wAhQeLyUp6+UXcpC5qGNu9tkrTEgPUg== ;{id = 2854}
SECTION AUTHORITY
example.com. IN NS ns.example.com.
example.com. 3600 IN RRSIG NS 3 2 3600 20070926134150 20070829134150 2854 example.com. MC0CFQCN+qHdJxoI/2tNKwsb08pra/G7aAIUAWA5sDdJTbrXA1/3OaesGBAO3sI= ;{id = 2854}
SECTION ADDITIONAL
ns.example.com. IN A 1.2.3.4
ns.example.com. 3600 IN RRSIG A 3 3 3600 20070926135752 20070829135752 2854 example.com. MC0CFQCMSWxVehgOQLoYclB9PIAbNP229AIUeH0vNNGJhjnZiqgIOKvs1EhzqAo= ;{id = 2854}
ENTRY_END
; response to query of interest
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
www.example.com. IN A
SECTION ANSWER
www.example.com. IN CNAME foo.example.com.
www.example.com. 3600 IN RRSIG CNAME DSA 3 3600 20070926134150 20070829134150 2854 example.com. MCwCFH0SwLHe7u56TshoVciFRHEl1KqbAhQ3zBOZMlL8bt1DqoDoM5ni8U/1UA== ;{id = 2854}
SECTION AUTHORITY
SECTION ADDITIONAL
ENTRY_END
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
foo.example.com. IN A
SECTION ANSWER
foo.example.com. IN CNAME www.example.com.
foo.example.com. 3600 IN RRSIG CNAME DSA 3 3600 20070926134150 20070829134150 2854 example.com. MC0CFC7kcWPsMnGbjvzj5UNnxQzM0YvnAhUAgxIKgs1huJHvcAP2Xt3p8Adpy/c= ;{id = 2854}
SECTION AUTHORITY
SECTION ADDITIONAL
ENTRY_END
RANGE_END
STEP 1 QUERY
ENTRY_BEGIN
REPLY RD DO
SECTION QUESTION
www.example.com. IN A
ENTRY_END
; recursion happens here.
STEP 10 CHECK_ANSWER
ENTRY_BEGIN
MATCH all
REPLY QR RD RA SERVFAIL
SECTION QUESTION
www.example.com. IN A
SECTION ANSWER
SECTION AUTHORITY
SECTION ADDITIONAL
ENTRY_END
SCENARIO_END
dnssecjava-1.1.3/src/test/resources/unbound/val_cname_loop3.rpl 0000664 0000000 0000000 00000011262 13020541473 0024650 0 ustar 00root root 0000000 0000000 ; config options
; The island of trust is at example.com
server:
trust-anchor: "example.com. 3600 IN DS 2854 3 1 46e4ffc6e9a4793b488954bd3f0cc6af0dfb201b"
val-override-date: "20070916134226"
target-fetch-policy: "0 0 0 0 0"
stub-zone:
name: "."
stub-addr: 193.0.14.129 # K.ROOT-SERVERS.NET.
CONFIG_END
SCENARIO_BEGIN Test validator with cname 3 step loop
; K.ROOT-SERVERS.NET.
RANGE_BEGIN 0 100
ADDRESS 193.0.14.129
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
. IN NS
SECTION ANSWER
. IN NS K.ROOT-SERVERS.NET.
SECTION ADDITIONAL
K.ROOT-SERVERS.NET. IN A 193.0.14.129
ENTRY_END
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
www.example.com. IN A
SECTION AUTHORITY
com. IN NS a.gtld-servers.net.
SECTION ADDITIONAL
a.gtld-servers.net. IN A 192.5.6.30
ENTRY_END
RANGE_END
; a.gtld-servers.net.
RANGE_BEGIN 0 100
ADDRESS 192.5.6.30
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
com. IN NS
SECTION ANSWER
com. IN NS a.gtld-servers.net.
SECTION ADDITIONAL
a.gtld-servers.net. IN A 192.5.6.30
ENTRY_END
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
www.example.com. IN A
SECTION AUTHORITY
example.com. IN NS ns.example.com.
SECTION ADDITIONAL
ns.example.com. IN A 1.2.3.4
ENTRY_END
RANGE_END
; ns.example.com.
RANGE_BEGIN 0 100
ADDRESS 1.2.3.4
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
example.com. IN NS
SECTION ANSWER
example.com. IN NS ns.example.com.
example.com. 3600 IN RRSIG NS 3 2 3600 20070926134150 20070829134150 2854 example.com. MC0CFQCN+qHdJxoI/2tNKwsb08pra/G7aAIUAWA5sDdJTbrXA1/3OaesGBAO3sI= ;{id = 2854}
SECTION ADDITIONAL
ns.example.com. IN A 1.2.3.4
ns.example.com. 3600 IN RRSIG A 3 3 3600 20070926135752 20070829135752 2854 example.com. MC0CFQCMSWxVehgOQLoYclB9PIAbNP229AIUeH0vNNGJhjnZiqgIOKvs1EhzqAo= ;{id = 2854}
ENTRY_END
; response to DNSKEY priming query
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
example.com. IN DNSKEY
SECTION ANSWER
example.com. 3600 IN DNSKEY 256 3 3 ALXLUsWqUrY3JYER3T4TBJII s70j+sDS/UT2QRp61SE7S3E EXopNXoFE73JLRmvpi/UrOO/Vz4Se 6wXv/CYCKjGw06U4WRgR YXcpEhJROyNapmdIKSx hOzfLVE1gqA0PweZR8d tY3aNQSRn3sPpwJr6Mi /PqQKAMMrZ9ckJpf1+b QMOOvxgzz2U1GS18b3y ZKcgTMEaJzd/GZYzi/B N2DzQ0MsrSwYXfsNLFO Bbs8PJMW4LYIxeeOe6rUgkWOF 7CC9Dh/dduQ1QrsJhmZAEFfd6ByYV+ ;{id = 2854 (zsk), size = 1688b}
example.com. 3600 IN RRSIG DNSKEY 3 2 3600 20070926134802 20070829134802 2854 example.com. MCwCFG1yhRNtTEa3Eno2zhVVuy2EJX3wAhQeLyUp6+UXcpC5qGNu9tkrTEgPUg== ;{id = 2854}
SECTION AUTHORITY
example.com. IN NS ns.example.com.
example.com. 3600 IN RRSIG NS 3 2 3600 20070926134150 20070829134150 2854 example.com. MC0CFQCN+qHdJxoI/2tNKwsb08pra/G7aAIUAWA5sDdJTbrXA1/3OaesGBAO3sI= ;{id = 2854}
SECTION ADDITIONAL
ns.example.com. IN A 1.2.3.4
ns.example.com. 3600 IN RRSIG A 3 3 3600 20070926135752 20070829135752 2854 example.com. MC0CFQCMSWxVehgOQLoYclB9PIAbNP229AIUeH0vNNGJhjnZiqgIOKvs1EhzqAo= ;{id = 2854}
ENTRY_END
; response to query of interest
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
www.example.com. IN A
SECTION ANSWER
www.example.com. IN CNAME foo.example.com.
www.example.com. 3600 IN RRSIG CNAME DSA 3 3600 20070926134150 20070829134150 2854 example.com. MCwCFH0SwLHe7u56TshoVciFRHEl1KqbAhQ3zBOZMlL8bt1DqoDoM5ni8U/1UA== ;{id = 2854}
SECTION AUTHORITY
SECTION ADDITIONAL
ENTRY_END
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
foo.example.com. IN A
SECTION ANSWER
foo.example.com. IN CNAME bar.example.com.
foo.example.com. 3600 IN RRSIG CNAME DSA 3 3600 20070926134150 20070829134150 2854 example.com. MC0CFFMlXuWrNL/8aYOl9U9WYjgif8gAAhUAqsC/xOXakHP1SYxMSLANziOik94= ;{id = 2854}
SECTION AUTHORITY
SECTION ADDITIONAL
ENTRY_END
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
bar.example.com. IN A
SECTION ANSWER
bar.example.com. IN CNAME www.example.com.
bar.example.com. 3600 IN RRSIG CNAME DSA 3 3600 20070926134150 20070829134150 2854 example.com. MCwCFAsalUJJSV86uPlfiGS3kKDc0JB7AhQ+qmHqagY/r36Re/J3Q1OfvcA1dA== ;{id = 2854}
SECTION AUTHORITY
SECTION ADDITIONAL
ENTRY_END
RANGE_END
STEP 1 QUERY
ENTRY_BEGIN
REPLY RD
SECTION QUESTION
www.example.com. IN A
ENTRY_END
; recursion happens here.
STEP 10 CHECK_ANSWER
ENTRY_BEGIN
MATCH all
REPLY QR RD RA SERVFAIL
SECTION QUESTION
www.example.com. IN A
SECTION ANSWER
SECTION AUTHORITY
SECTION ADDITIONAL
ENTRY_END
SCENARIO_END
dnssecjava-1.1.3/src/test/resources/unbound/val_cnameinsectopos.rpl 0000664 0000000 0000000 00000021371 13020541473 0025645 0 ustar 00root root 0000000 0000000 ; config options
; The island of trust is at example.com
server:
;trust-anchor: "example.com. 3600 IN DS 2854 3 1 46e4ffc6e9a4793b488954bd3f0cc6af0dfb201b"
trust-anchor: "example.net. 3600 IN DNSKEY 256 3 5 AQPQ41chR9DEHt/aIzIFAqanbDlRflJoRs5yz1jFsoRIT7dWf0r+PeDuewdxkszNH6wnU4QL8pfKFRh5PIYVBLK3 ;{id = 30899 (zsk), size = 512b}"
val-override-date: "20070916134226"
target-fetch-policy: "0 0 0 0 0"
stub-zone:
name: "."
stub-addr: 193.0.14.129 # K.ROOT-SERVERS.NET.
CONFIG_END
SCENARIO_BEGIN Test validator with an insecure cname to positive cached
; K.ROOT-SERVERS.NET.
RANGE_BEGIN 0 100
ADDRESS 193.0.14.129
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
. IN NS
SECTION ANSWER
. IN NS K.ROOT-SERVERS.NET.
SECTION ADDITIONAL
K.ROOT-SERVERS.NET. IN A 193.0.14.129
ENTRY_END
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
www.example.com. IN A
SECTION AUTHORITY
com. IN NS a.gtld-servers.net.
SECTION ADDITIONAL
a.gtld-servers.net. IN A 192.5.6.30
ENTRY_END
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
www.example.net. IN A
SECTION AUTHORITY
net. IN NS a.gtld-servers.net.
SECTION ADDITIONAL
a.gtld-servers.net. IN A 192.5.6.30
ENTRY_END
RANGE_END
; a.gtld-servers.net.
RANGE_BEGIN 0 100
ADDRESS 192.5.6.30
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
com. IN NS
SECTION ANSWER
com. IN NS a.gtld-servers.net.
SECTION ADDITIONAL
a.gtld-servers.net. IN A 192.5.6.30
ENTRY_END
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
net. IN NS
SECTION ANSWER
net. IN NS a.gtld-servers.net.
SECTION ADDITIONAL
a.gtld-servers.net. IN A 192.5.6.30
ENTRY_END
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
www.example.com. IN A
SECTION AUTHORITY
example.com. IN NS ns.example.com.
SECTION ADDITIONAL
ns.example.com. IN A 1.2.3.4
ENTRY_END
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
www.example.net. IN A
SECTION AUTHORITY
example.net. IN NS ns.example.net.
SECTION ADDITIONAL
ns.example.net. IN A 1.2.3.5
ENTRY_END
RANGE_END
; ns.example.com.
RANGE_BEGIN 0 100
ADDRESS 1.2.3.4
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
example.com. IN NS
SECTION ANSWER
example.com. IN NS ns.example.com.
example.com. 3600 IN RRSIG NS 3 2 3600 20070926134150 20070829134150 2854 example.com. MC0CFQCN+qHdJxoI/2tNKwsb08pra/G7aAIUAWA5sDdJTbrXA1/3OaesGBAO3sI= ;{id = 2854}
SECTION ADDITIONAL
ns.example.com. IN A 1.2.3.4
ns.example.com. 3600 IN RRSIG A 3 3 3600 20070926135752 20070829135752 2854 example.com. MC0CFQCMSWxVehgOQLoYclB9PIAbNP229AIUeH0vNNGJhjnZiqgIOKvs1EhzqAo= ;{id = 2854}
ENTRY_END
; response to DNSKEY priming query
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
example.com. IN DNSKEY
SECTION ANSWER
example.com. 3600 IN DNSKEY 256 3 3 ALXLUsWqUrY3JYER3T4TBJII s70j+sDS/UT2QRp61SE7S3E EXopNXoFE73JLRmvpi/UrOO/Vz4Se 6wXv/CYCKjGw06U4WRgR YXcpEhJROyNapmdIKSx hOzfLVE1gqA0PweZR8d tY3aNQSRn3sPpwJr6Mi /PqQKAMMrZ9ckJpf1+b QMOOvxgzz2U1GS18b3y ZKcgTMEaJzd/GZYzi/B N2DzQ0MsrSwYXfsNLFO Bbs8PJMW4LYIxeeOe6rUgkWOF 7CC9Dh/dduQ1QrsJhmZAEFfd6ByYV+ ;{id = 2854 (zsk), size = 1688b}
example.com. 3600 IN RRSIG DNSKEY DSA 2 3600 20070926134150 20070829134150 2854 example.com. MCwCFBQRtlR4BEv9ohi+PGFjp+AHsJuHAhRCvz0shggvnvI88DFnBDCczHUcVA== ;{id = 2854}
SECTION AUTHORITY
example.com. IN NS ns.example.com.
example.com. 3600 IN RRSIG NS 3 2 3600 20070926134150 20070829134150 2854 example.com. MC0CFQCN+qHdJxoI/2tNKwsb08pra/G7aAIUAWA5sDdJTbrXA1/3OaesGBAO3sI= ;{id = 2854}
SECTION ADDITIONAL
ns.example.com. IN A 1.2.3.4
ns.example.com. 3600 IN RRSIG A 3 3 3600 20070926135752 20070829135752 2854 example.com. MC0CFQCMSWxVehgOQLoYclB9PIAbNP229AIUeH0vNNGJhjnZiqgIOKvs1EhzqAo= ;{id = 2854}
ENTRY_END
; response to query of interest
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
www.example.com. IN A
SECTION ANSWER
www.example.com. IN CNAME www.example.net.
www.example.com. 3600 IN RRSIG CNAME DSA 3 3600 20070926134150 20070829134150 2854 example.com. MC0CFGcJxnNxpWCBzXejiSdl4p1BKRMnAhUApoJrugVBRwFgAoYAhhqlZFac7fE= ;{id = 2854}
SECTION AUTHORITY
SECTION ADDITIONAL
ENTRY_END
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR AA NOERROR
SECTION QUESTION
insecure.example.com. IN A
SECTION ANSWER
insecure.example.com. IN CNAME www.example.net.
SECTION AUTHORITY
SECTION ADDITIONAL
ENTRY_END
RANGE_END
; ns.example.net.
RANGE_BEGIN 0 100
ADDRESS 1.2.3.5
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
example.net. IN NS
SECTION ANSWER
example.net. IN NS ns.example.net.
example.net. 3600 IN RRSIG NS RSASHA1 2 3600 20070926134150 20070829134150 30899 example.net. E8JX0l4B+cSR5bkHQwOJy1pBmlLMTYCJ8EwfNMU/eCv0YhKwo26rHhn52FGisgv+Nwp7/NbhHqQ+kJgoZC94XA== ;{id = 30899}
SECTION ADDITIONAL
ns.example.net. IN A 1.2.3.5
ns.example.net. 3600 IN RRSIG A RSASHA1 3 3600 20070926134150 20070829134150 30899 example.net. x+tQMC9FhzT7Fcy1pM5NrOC7E8nLd7THPI3C6ie4EwL8PrxllqlR3q/DKB0d/m0qCOPcgN6HFOYURV1s4uAcsw== ;{id = 30899}
ENTRY_END
; response to DNSKEY priming query
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
example.net. IN DNSKEY
SECTION ANSWER
example.net. 3600 IN DNSKEY 256 3 5 AQPQ41chR9DEHt/aIzIFAqanbDlRflJoRs5yz1jFsoRIT7dWf0r+PeDuewdxkszNH6wnU4QL8pfKFRh5PIYVBLK3 ;{id = 30899 (zsk), size = 512b}
example.net. 3600 IN RRSIG DNSKEY RSASHA1 2 3600 20070926134150 20070829134150 30899 example.net. hiFzlQ8VoYgCuvIsfVuxC3mfJDqsTh0yc6abs5xMx5uEcIjb0dndFQx7INOM+imlzveEN73Hqp4OLFpFhsWLlw== ;{id = 30899}
SECTION AUTHORITY
example.net. IN NS ns.example.net.
example.net. 3600 IN RRSIG NS RSASHA1 2 3600 20070926134150 20070829134150 30899 example.net. E8JX0l4B+cSR5bkHQwOJy1pBmlLMTYCJ8EwfNMU/eCv0YhKwo26rHhn52FGisgv+Nwp7/NbhHqQ+kJgoZC94XA== ;{id = 30899}
SECTION ADDITIONAL
ns.example.net. IN A 1.2.3.5
ns.example.net. 3600 IN RRSIG A RSASHA1 3 3600 20070926134150 20070829134150 30899 example.net. x+tQMC9FhzT7Fcy1pM5NrOC7E8nLd7THPI3C6ie4EwL8PrxllqlR3q/DKB0d/m0qCOPcgN6HFOYURV1s4uAcsw== ;{id = 30899}
ENTRY_END
; response to query of interest
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
www.example.net. IN A
SECTION ANSWER
www.example.net. IN A 11.12.13.14
www.example.net. 3600 IN RRSIG A 5 3 3600 20070926134150 20070829134150 30899 example.net. CPxF5hK9Kg5eT7W6LgZwr0ePYEm9HMcSY4vvqCS6gDWB4X9jvXLCfBkCLhsNybPBpGWlsLi5wM6MTdJXuPpsRA== ;{id = 30899}
SECTION AUTHORITY
SECTION ADDITIONAL
ENTRY_END
RANGE_END
STEP 1 QUERY
ENTRY_BEGIN
REPLY RD DO
SECTION QUESTION
www.example.com. IN A
ENTRY_END
; recursion happens here.
STEP 10 CHECK_ANSWER
ENTRY_BEGIN
MATCH all
REPLY QR RD RA NOERROR
SECTION QUESTION
www.example.com. IN A
SECTION ANSWER
www.example.com. IN CNAME www.example.net.
www.example.com. 3600 IN RRSIG CNAME DSA 3 3600 20070926134150 20070829134150 2854 example.com. MC0CFGcJxnNxpWCBzXejiSdl4p1BKRMnAhUApoJrugVBRwFgAoYAhhqlZFac7fE= ;{id = 2854}
www.example.net. IN A 11.12.13.14
www.example.net. 3600 IN RRSIG A 5 3 3600 20070926134150 20070829134150 30899 example.net. CPxF5hK9Kg5eT7W6LgZwr0ePYEm9HMcSY4vvqCS6gDWB4X9jvXLCfBkCLhsNybPBpGWlsLi5wM6MTdJXuPpsRA== ;{id = 30899}
SECTION AUTHORITY
SECTION ADDITIONAL
ENTRY_END
; Get www.example.net validated in the cache.
STEP 30 QUERY
ENTRY_BEGIN
REPLY RD DO
SECTION QUESTION
www.example.net. IN A
ENTRY_END
; recursion happens here.
STEP 40 CHECK_ANSWER
ENTRY_BEGIN
MATCH all
REPLY QR RD RA AD NOERROR
SECTION QUESTION
www.example.net. IN A
SECTION ANSWER
www.example.net. IN A 11.12.13.14
www.example.net. 3600 IN RRSIG A 5 3 3600 20070926134150 20070829134150 30899 example.net. CPxF5hK9Kg5eT7W6LgZwr0ePYEm9HMcSY4vvqCS6gDWB4X9jvXLCfBkCLhsNybPBpGWlsLi5wM6MTdJXuPpsRA== ;{id = 30899}
SECTION AUTHORITY
SECTION ADDITIONAL
ENTRY_END
; reference the cache object
STEP 50 QUERY
ENTRY_BEGIN
REPLY RD DO
SECTION QUESTION
insecure.example.com. IN A
ENTRY_END
STEP 60 CHECK_ANSWER
ENTRY_BEGIN
MATCH all
REPLY QR RD RA NOERROR
SECTION QUESTION
insecure.example.com. IN A
SECTION ANSWER
insecure.example.com. IN CNAME www.example.net.
www.example.net. IN A 11.12.13.14
www.example.net. 3600 IN RRSIG A 5 3 3600 20070926134150 20070829134150 30899 example.net. CPxF5hK9Kg5eT7W6LgZwr0ePYEm9HMcSY4vvqCS6gDWB4X9jvXLCfBkCLhsNybPBpGWlsLi5wM6MTdJXuPpsRA== ;{id = 30899}
SECTION AUTHORITY
SECTION ADDITIONAL
ENTRY_END
SCENARIO_END
dnssecjava-1.1.3/src/test/resources/unbound/val_cnamenx_dblnsec.rpl 0000664 0000000 0000000 00000015426 13020541473 0025602 0 ustar 00root root 0000000 0000000 ; config options
; The island of trust is at example.com
server:
trust-anchor: "example.com. 3600 IN DS 2854 3 1 46e4ffc6e9a4793b488954bd3f0cc6af0dfb201b"
val-override-date: "20070916134226"
target-fetch-policy: "0 0 0 0 0"
stub-zone:
name: "."
stub-addr: 193.0.14.129 # K.ROOT-SERVERS.NET.
CONFIG_END
SCENARIO_BEGIN Test validator with cname-nxdomain for duplicate NSEC detection
; K.ROOT-SERVERS.NET.
RANGE_BEGIN 0 100
ADDRESS 193.0.14.129
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
. IN NS
SECTION ANSWER
. IN NS K.ROOT-SERVERS.NET.
SECTION ADDITIONAL
K.ROOT-SERVERS.NET. IN A 193.0.14.129
ENTRY_END
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
cname.example.com. IN A
SECTION AUTHORITY
com. IN NS a.gtld-servers.net.
SECTION ADDITIONAL
a.gtld-servers.net. IN A 192.5.6.30
ENTRY_END
RANGE_END
; a.gtld-servers.net.
RANGE_BEGIN 0 100
ADDRESS 192.5.6.30
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
com. IN NS
SECTION ANSWER
com. IN NS a.gtld-servers.net.
SECTION ADDITIONAL
a.gtld-servers.net. IN A 192.5.6.30
ENTRY_END
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
cname.example.com. IN A
SECTION AUTHORITY
example.com. IN NS ns.example.com.
SECTION ADDITIONAL
ns.example.com. IN A 1.2.3.4
ENTRY_END
RANGE_END
; ns.example.com.
RANGE_BEGIN 0 100
ADDRESS 1.2.3.4
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
example.com. IN NS
SECTION ANSWER
example.com. IN NS ns.example.com.
example.com. 3600 IN RRSIG NS 3 2 3600 20070926134150 20070829134150 2854 example.com. MC0CFQCN+qHdJxoI/2tNKwsb08pra/G7aAIUAWA5sDdJTbrXA1/3OaesGBAO3sI= ;{id = 2854}
SECTION ADDITIONAL
ns.example.com. IN A 1.2.3.4
ns.example.com. 3600 IN RRSIG A 3 3 3600 20070926135752 20070829135752 2854 example.com. MC0CFQCMSWxVehgOQLoYclB9PIAbNP229AIUeH0vNNGJhjnZiqgIOKvs1EhzqAo= ;{id = 2854}
ENTRY_END
; response to DNSKEY priming query
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
example.com. IN DNSKEY
SECTION ANSWER
example.com. 3600 IN DNSKEY 256 3 3 ALXLUsWqUrY3JYER3T4TBJII s70j+sDS/UT2QRp61SE7S3E EXopNXoFE73JLRmvpi/UrOO/Vz4Se 6wXv/CYCKjGw06U4WRgR YXcpEhJROyNapmdIKSx hOzfLVE1gqA0PweZR8d tY3aNQSRn3sPpwJr6Mi /PqQKAMMrZ9ckJpf1+b QMOOvxgzz2U1GS18b3y ZKcgTMEaJzd/GZYzi/B N2DzQ0MsrSwYXfsNLFO Bbs8PJMW4LYIxeeOe6rUgkWOF 7CC9Dh/dduQ1QrsJhmZAEFfd6ByYV+ ;{id = 2854 (zsk), size = 1688b}
example.com. 3600 IN RRSIG DNSKEY 3 2 3600 20070926134802 20070829134802 2854 example.com. MCwCFG1yhRNtTEa3Eno2zhVVuy2EJX3wAhQeLyUp6+UXcpC5qGNu9tkrTEgPUg== ;{id = 2854}
SECTION AUTHORITY
example.com. IN NS ns.example.com.
example.com. 3600 IN RRSIG NS 3 2 3600 20070926134150 20070829134150 2854 example.com. MC0CFQCN+qHdJxoI/2tNKwsb08pra/G7aAIUAWA5sDdJTbrXA1/3OaesGBAO3sI= ;{id = 2854}
SECTION ADDITIONAL
ns.example.com. IN A 1.2.3.4
ns.example.com. 3600 IN RRSIG A 3 3 3600 20070926135752 20070829135752 2854 example.com. MC0CFQCMSWxVehgOQLoYclB9PIAbNP229AIUeH0vNNGJhjnZiqgIOKvs1EhzqAo= ;{id = 2854}
ENTRY_END
; response to query of interest
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR AA NXDOMAIN
SECTION QUESTION
cname.example.com. IN A
SECTION ANSWER
cname.example.com. 3600 IN CNAME www.example.com.
cname.example.com. 3600 IN RRSIG CNAME 3 3 3600 20070926134150 20070829134150 2854 example.com. MC0CFBhJC8qi+g+EOYqzT2q6RxE8Im09AhUAotz8NFnpY+cpEDNBKjM940a74/E= ;{id = 2854}
SECTION AUTHORITY
; already includes the necessary NSECs
example.com. IN SOA ns.example.com. hostmaster.example.com. 2007090400 28800 7200 604800 18000
example.com. 3600 IN RRSIG SOA 3 2 3600 20070926134150 20070829134150 2854 example.com. MC0CFCNGZ+/OfElYQMCZ77O9Lw9rhk7PAhUAmDcvTAst6Bq83qPq3r6c/Dm1nFc= ;{id = 2854}
; wildcard denial
example.com. IN NSEC abc.example.com. SOA NS DNSKEY NSEC RRSIG
example.com. 3600 IN RRSIG NSEC 3 2 3600 20070926134150 20070829134150 2854 example.com. MCwCFHV2IBWyTmDJvZ+sT+WsGrJX0op/AhQkAijjnjPAtx/tNub2FAGqcexJSg== ;{id = 2854}
; qname denial
wab.example.com. IN NSEC wzz.example.com. A NSEC RRSIG
wab.example.com. 3600 IN RRSIG NSEC 3 3 3600 20070926134150 20070829134150 2854 example.com. MC0CFG5DZSEIZC088rjcB1e6sQx8nQz4AhUAtQ09tP1YYLJkhL/Wg1KV2pW4Ivk= ;{id = 2854}
SECTION ADDITIONAL
ENTRY_END
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR AA NXDOMAIN
SECTION QUESTION
www.example.com. IN A
SECTION ANSWER
SECTION AUTHORITY
example.com. IN SOA ns.example.com. hostmaster.example.com. 2007090400 28800 7200 604800 18000
example.com. 3600 IN RRSIG SOA 3 2 3600 20070926134150 20070829134150 2854 example.com. MC0CFCNGZ+/OfElYQMCZ77O9Lw9rhk7PAhUAmDcvTAst6Bq83qPq3r6c/Dm1nFc= ;{id = 2854}
; wildcard denial
example.com. IN NSEC abc.example.com. SOA NS DNSKEY NSEC RRSIG
example.com. 3600 IN RRSIG NSEC 3 2 3600 20070926134150 20070829134150 2854 example.com. MCwCFHV2IBWyTmDJvZ+sT+WsGrJX0op/AhQkAijjnjPAtx/tNub2FAGqcexJSg== ;{id = 2854}
; qname denial
wab.example.com. IN NSEC wzz.example.com. A NSEC RRSIG
wab.example.com. 3600 IN RRSIG NSEC 3 3 3600 20070926134150 20070829134150 2854 example.com. MC0CFG5DZSEIZC088rjcB1e6sQx8nQz4AhUAtQ09tP1YYLJkhL/Wg1KV2pW4Ivk= ;{id = 2854}
SECTION ADDITIONAL
ENTRY_END
RANGE_END
STEP 1 QUERY
ENTRY_BEGIN
REPLY RD DO
SECTION QUESTION
cname.example.com. IN A
ENTRY_END
; recursion happens here.
STEP 10 CHECK_ANSWER
ENTRY_BEGIN
MATCH all
REPLY QR RD RA AD NXDOMAIN
SECTION QUESTION
cname.example.com. IN A
SECTION ANSWER
cname.example.com. 3600 IN CNAME www.example.com.
cname.example.com. 3600 IN RRSIG CNAME 3 3 3600 20070926134150 20070829134150 2854 example.com. MC0CFBhJC8qi+g+EOYqzT2q6RxE8Im09AhUAotz8NFnpY+cpEDNBKjM940a74/E= ;{id = 2854}
SECTION AUTHORITY
example.com. IN SOA ns.example.com. hostmaster.example.com. 2007090400 28800 7200 604800 18000
example.com. 3600 IN RRSIG SOA 3 2 3600 20070926134150 20070829134150 2854 example.com. MC0CFCNGZ+/OfElYQMCZ77O9Lw9rhk7PAhUAmDcvTAst6Bq83qPq3r6c/Dm1nFc= ;{id = 2854}
example.com. IN NSEC abc.example.com. SOA NS DNSKEY NSEC RRSIG
example.com. 3600 IN RRSIG NSEC 3 2 3600 20070926134150 20070829134150 2854 example.com. MCwCFHV2IBWyTmDJvZ+sT+WsGrJX0op/AhQkAijjnjPAtx/tNub2FAGqcexJSg== ;{id = 2854}
wab.example.com. IN NSEC wzz.example.com. A NSEC RRSIG
wab.example.com. 3600 IN RRSIG NSEC 3 3 3600 20070926134150 20070829134150 2854 example.com. MC0CFG5DZSEIZC088rjcB1e6sQx8nQz4AhUAtQ09tP1YYLJkhL/Wg1KV2pW4Ivk= ;{id = 2854}
SECTION ADDITIONAL
ENTRY_END
SCENARIO_END
dnssecjava-1.1.3/src/test/resources/unbound/val_cnamenx_rcodenx.rpl 0000664 0000000 0000000 00000017741 13020541473 0025634 0 ustar 00root root 0000000 0000000 ; config options
; The island of trust is at example.com
server:
trust-anchor: "example.com. 3600 IN DS 2854 3 1 46e4ffc6e9a4793b488954bd3f0cc6af0dfb201b"
trust-anchor: "example.net. 3600 IN DNSKEY 256 3 5 AQPQ41chR9DEHt/aIzIFAqanbDlRflJoRs5yz1jFsoRIT7dWf0r+PeDuewdxkszNH6wnU4QL8pfKFRh5PIYVBLK3 ;{id = 30899 (zsk), size = 512b}"
val-override-date: "20070916134226"
target-fetch-policy: "0 0 0 0 0"
stub-zone:
name: "."
stub-addr: 193.0.14.129 # K.ROOT-SERVERS.NET.
CONFIG_END
SCENARIO_BEGIN Test validator with cname-nxdomain with rcode nxdomain
; K.ROOT-SERVERS.NET.
RANGE_BEGIN 0 100
ADDRESS 193.0.14.129
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
. IN NS
SECTION ANSWER
. IN NS K.ROOT-SERVERS.NET.
SECTION ADDITIONAL
K.ROOT-SERVERS.NET. IN A 193.0.14.129
ENTRY_END
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
www.example.com. IN A
SECTION AUTHORITY
com. IN NS a.gtld-servers.net.
SECTION ADDITIONAL
a.gtld-servers.net. IN A 192.5.6.30
ENTRY_END
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
www.example.net. IN A
SECTION AUTHORITY
net. IN NS a.gtld-servers.net.
SECTION ADDITIONAL
a.gtld-servers.net. IN A 192.5.6.30
ENTRY_END
RANGE_END
; a.gtld-servers.net.
RANGE_BEGIN 0 100
ADDRESS 192.5.6.30
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
com. IN NS
SECTION ANSWER
com. IN NS a.gtld-servers.net.
SECTION ADDITIONAL
a.gtld-servers.net. IN A 192.5.6.30
ENTRY_END
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
net. IN NS
SECTION ANSWER
net. IN NS a.gtld-servers.net.
SECTION ADDITIONAL
a.gtld-servers.net. IN A 192.5.6.30
ENTRY_END
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
www.example.com. IN A
SECTION AUTHORITY
example.com. IN NS ns.example.com.
SECTION ADDITIONAL
ns.example.com. IN A 1.2.3.4
ENTRY_END
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
www.example.net. IN A
SECTION AUTHORITY
example.net. IN NS ns.example.net.
SECTION ADDITIONAL
ns.example.net. IN A 1.2.3.5
ENTRY_END
RANGE_END
; ns.example.com.
RANGE_BEGIN 0 100
ADDRESS 1.2.3.4
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
example.com. IN NS
SECTION ANSWER
example.com. IN NS ns.example.com.
example.com. 3600 IN RRSIG NS 3 2 3600 20070926134150 20070829134150 2854 example.com. MC0CFQCN+qHdJxoI/2tNKwsb08pra/G7aAIUAWA5sDdJTbrXA1/3OaesGBAO3sI= ;{id = 2854}
SECTION ADDITIONAL
ns.example.com. IN A 1.2.3.4
ns.example.com. 3600 IN RRSIG A 3 3 3600 20070926135752 20070829135752 2854 example.com. MC0CFQCMSWxVehgOQLoYclB9PIAbNP229AIUeH0vNNGJhjnZiqgIOKvs1EhzqAo= ;{id = 2854}
ENTRY_END
; response to DNSKEY priming query
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
example.com. IN DNSKEY
SECTION ANSWER
example.com. 3600 IN DNSKEY 256 3 3 ALXLUsWqUrY3JYER3T4TBJII s70j+sDS/UT2QRp61SE7S3E EXopNXoFE73JLRmvpi/UrOO/Vz4Se 6wXv/CYCKjGw06U4WRgR YXcpEhJROyNapmdIKSx hOzfLVE1gqA0PweZR8d tY3aNQSRn3sPpwJr6Mi /PqQKAMMrZ9ckJpf1+b QMOOvxgzz2U1GS18b3y ZKcgTMEaJzd/GZYzi/B N2DzQ0MsrSwYXfsNLFO Bbs8PJMW4LYIxeeOe6rUgkWOF 7CC9Dh/dduQ1QrsJhmZAEFfd6ByYV+ ;{id = 2854 (zsk), size = 1688b}
example.com. 3600 IN RRSIG DNSKEY DSA 2 3600 20070926134150 20070829134150 2854 example.com. MCwCFBQRtlR4BEv9ohi+PGFjp+AHsJuHAhRCvz0shggvnvI88DFnBDCczHUcVA== ;{id = 2854}
SECTION AUTHORITY
example.com. IN NS ns.example.com.
example.com. 3600 IN RRSIG NS 3 2 3600 20070926134150 20070829134150 2854 example.com. MC0CFQCN+qHdJxoI/2tNKwsb08pra/G7aAIUAWA5sDdJTbrXA1/3OaesGBAO3sI= ;{id = 2854}
SECTION ADDITIONAL
ns.example.com. IN A 1.2.3.4
ns.example.com. 3600 IN RRSIG A 3 3 3600 20070926135752 20070829135752 2854 example.com. MC0CFQCMSWxVehgOQLoYclB9PIAbNP229AIUeH0vNNGJhjnZiqgIOKvs1EhzqAo= ;{id = 2854}
ENTRY_END
; response to query of interest
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NXDOMAIN
SECTION QUESTION
www.example.com. IN A
SECTION ANSWER
www.example.com. 3600 IN CNAME www.example.net.
www.example.com. 3600 IN RRSIG CNAME 3 3 3600 20070926134150 20070829134150 2854 example.com. MCwCFGtYzScyRnHV8U/jOIPYwrlI9t3oAhRF0PIf+IthUR7uCWIvskWp5CfReQ== ;{id = 2854}
SECTION AUTHORITY
SECTION ADDITIONAL
ENTRY_END
RANGE_END
; ns.example.net.
RANGE_BEGIN 0 100
ADDRESS 1.2.3.5
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
example.net. IN NS
SECTION ANSWER
example.net. IN NS ns.example.net.
example.net. 3600 IN RRSIG NS RSASHA1 2 3600 20070926134150 20070829134150 30899 example.net. E8JX0l4B+cSR5bkHQwOJy1pBmlLMTYCJ8EwfNMU/eCv0YhKwo26rHhn52FGisgv+Nwp7/NbhHqQ+kJgoZC94XA== ;{id = 30899}
SECTION ADDITIONAL
ns.example.net. IN A 1.2.3.5
ns.example.net. 3600 IN RRSIG A RSASHA1 3 3600 20070926134150 20070829134150 30899 example.net. x+tQMC9FhzT7Fcy1pM5NrOC7E8nLd7THPI3C6ie4EwL8PrxllqlR3q/DKB0d/m0qCOPcgN6HFOYURV1s4uAcsw== ;{id = 30899}
ENTRY_END
; response to DNSKEY priming query
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
example.net. IN DNSKEY
SECTION ANSWER
example.net. 3600 IN DNSKEY 256 3 5 AQPQ41chR9DEHt/aIzIFAqanbDlRflJoRs5yz1jFsoRIT7dWf0r+PeDuewdxkszNH6wnU4QL8pfKFRh5PIYVBLK3 ;{id = 30899 (zsk), size = 512b}
example.net. 3600 IN RRSIG DNSKEY RSASHA1 2 3600 20070926134150 20070829134150 30899 example.net. hiFzlQ8VoYgCuvIsfVuxC3mfJDqsTh0yc6abs5xMx5uEcIjb0dndFQx7INOM+imlzveEN73Hqp4OLFpFhsWLlw== ;{id = 30899}
SECTION AUTHORITY
example.net. IN NS ns.example.net.
example.net. 3600 IN RRSIG NS RSASHA1 2 3600 20070926134150 20070829134150 30899 example.net. E8JX0l4B+cSR5bkHQwOJy1pBmlLMTYCJ8EwfNMU/eCv0YhKwo26rHhn52FGisgv+Nwp7/NbhHqQ+kJgoZC94XA== ;{id = 30899}
SECTION ADDITIONAL
ns.example.net. IN A 1.2.3.5
ns.example.net. 3600 IN RRSIG A RSASHA1 3 3600 20070926134150 20070829134150 30899 example.net. x+tQMC9FhzT7Fcy1pM5NrOC7E8nLd7THPI3C6ie4EwL8PrxllqlR3q/DKB0d/m0qCOPcgN6HFOYURV1s4uAcsw== ;{id = 30899}
ENTRY_END
; response to query of interest
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NXDOMAIN
SECTION QUESTION
www.example.net. IN A
SECTION ANSWER
SECTION AUTHORITY
example.net. IN NSEC abc.example.net. SOA NS DNSKEY NSEC RRSIG
example.net. 3600 IN RRSIG NSEC 5 2 3600 20070926134150 20070829134150 30899 example.net. SEHthmjHyqGlzaOp3Dx6Jn5Fnvvtknw/IF6YSFY8NZLe+YSh1oRJbdEkQ8G92IT08n1jSN6jvKRsFBOUoFOQAw== ;{id = 30899}
wab.example.net. IN NSEC wzz.example.net. A NSEC RRSIG
wab.example.net. 3600 IN RRSIG NSEC 5 3 3600 20070926134150 20070829134150 30899 example.net. gl8vkI3xfSWx4Pyv5OdOthiewE6u/13kclY7UG9ptuFBddamdJO3RQqyxM6Xcmq+ToO4kMCCyaKijp01gTDoGg== ;{id = 30899}
SECTION ADDITIONAL
ENTRY_END
RANGE_END
STEP 1 QUERY
ENTRY_BEGIN
REPLY RD DO
SECTION QUESTION
www.example.com. IN A
ENTRY_END
; recursion happens here.
STEP 10 CHECK_ANSWER
ENTRY_BEGIN
MATCH all
REPLY QR RD RA AD NXDOMAIN
SECTION QUESTION
www.example.com. IN A
SECTION ANSWER
www.example.com. IN CNAME www.example.net.
www.example.com. 3600 IN RRSIG CNAME 3 3 3600 20070926134150 20070829134150 2854 example.com. MCwCFGtYzScyRnHV8U/jOIPYwrlI9t3oAhRF0PIf+IthUR7uCWIvskWp5CfReQ== ;{id = 2854}
SECTION AUTHORITY
example.net. IN NSEC abc.example.net. SOA NS DNSKEY NSEC RRSIG
example.net. 3600 IN RRSIG NSEC 5 2 3600 20070926134150 20070829134150 30899 example.net. SEHthmjHyqGlzaOp3Dx6Jn5Fnvvtknw/IF6YSFY8NZLe+YSh1oRJbdEkQ8G92IT08n1jSN6jvKRsFBOUoFOQAw== ;{id = 30899}
wab.example.net. IN NSEC wzz.example.net. A NSEC RRSIG
wab.example.net. 3600 IN RRSIG NSEC 5 3 3600 20070926134150 20070829134150 30899 example.net. gl8vkI3xfSWx4Pyv5OdOthiewE6u/13kclY7UG9ptuFBddamdJO3RQqyxM6Xcmq+ToO4kMCCyaKijp01gTDoGg== ;{id = 30899}
SECTION ADDITIONAL
ENTRY_END
SCENARIO_END
dnssecjava-1.1.3/src/test/resources/unbound/val_cnameqtype.rpl 0000664 0000000 0000000 00000016236 13020541473 0024625 0 ustar 00root root 0000000 0000000 ; config options
; The island of trust is at example.com
server:
trust-anchor: "example.com. 3600 IN DS 2854 3 1 46e4ffc6e9a4793b488954bd3f0cc6af0dfb201b"
trust-anchor: "example.net. 3600 IN DNSKEY 256 3 5 AQPQ41chR9DEHt/aIzIFAqanbDlRflJoRs5yz1jFsoRIT7dWf0r+PeDuewdxkszNH6wnU4QL8pfKFRh5PIYVBLK3 ;{id = 30899 (zsk), size = 512b}"
val-override-date: "20070916134226"
target-fetch-policy: "0 0 0 0 0"
stub-zone:
name: "."
stub-addr: 193.0.14.129 # K.ROOT-SERVERS.NET.
CONFIG_END
SCENARIO_BEGIN Test validator with a query for type cname
; K.ROOT-SERVERS.NET.
RANGE_BEGIN 0 100
ADDRESS 193.0.14.129
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
. IN NS
SECTION ANSWER
. IN NS K.ROOT-SERVERS.NET.
SECTION ADDITIONAL
K.ROOT-SERVERS.NET. IN A 193.0.14.129
ENTRY_END
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
www.example.com. IN CNAME
SECTION AUTHORITY
com. IN NS a.gtld-servers.net.
SECTION ADDITIONAL
a.gtld-servers.net. IN A 192.5.6.30
ENTRY_END
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
www.example.net. IN CNAME
SECTION AUTHORITY
net. IN NS a.gtld-servers.net.
SECTION ADDITIONAL
a.gtld-servers.net. IN A 192.5.6.30
ENTRY_END
RANGE_END
; a.gtld-servers.net.
RANGE_BEGIN 0 100
ADDRESS 192.5.6.30
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
com. IN NS
SECTION ANSWER
com. IN NS a.gtld-servers.net.
SECTION ADDITIONAL
a.gtld-servers.net. IN A 192.5.6.30
ENTRY_END
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
net. IN NS
SECTION ANSWER
net. IN NS a.gtld-servers.net.
SECTION ADDITIONAL
a.gtld-servers.net. IN A 192.5.6.30
ENTRY_END
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
www.example.com. IN CNAME
SECTION AUTHORITY
example.com. IN NS ns.example.com.
SECTION ADDITIONAL
ns.example.com. IN A 1.2.3.4
ENTRY_END
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
www.example.net. IN A
SECTION AUTHORITY
example.net. IN NS ns.example.net.
SECTION ADDITIONAL
ns.example.net. IN A 1.2.3.5
ENTRY_END
RANGE_END
; ns.example.com.
RANGE_BEGIN 0 100
ADDRESS 1.2.3.4
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
example.com. IN NS
SECTION ANSWER
example.com. IN NS ns.example.com.
example.com. 3600 IN RRSIG NS 3 2 3600 20070926134150 20070829134150 2854 example.com. MC0CFQCN+qHdJxoI/2tNKwsb08pra/G7aAIUAWA5sDdJTbrXA1/3OaesGBAO3sI= ;{id = 2854}
SECTION ADDITIONAL
ns.example.com. IN A 1.2.3.4
ns.example.com. 3600 IN RRSIG A 3 3 3600 20070926135752 20070829135752 2854 example.com. MC0CFQCMSWxVehgOQLoYclB9PIAbNP229AIUeH0vNNGJhjnZiqgIOKvs1EhzqAo= ;{id = 2854}
ENTRY_END
; response to DNSKEY priming query
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
example.com. IN DNSKEY
SECTION ANSWER
example.com. 3600 IN DNSKEY 256 3 3 ALXLUsWqUrY3JYER3T4TBJII s70j+sDS/UT2QRp61SE7S3E EXopNXoFE73JLRmvpi/UrOO/Vz4Se 6wXv/CYCKjGw06U4WRgR YXcpEhJROyNapmdIKSx hOzfLVE1gqA0PweZR8d tY3aNQSRn3sPpwJr6Mi /PqQKAMMrZ9ckJpf1+b QMOOvxgzz2U1GS18b3y ZKcgTMEaJzd/GZYzi/B N2DzQ0MsrSwYXfsNLFO Bbs8PJMW4LYIxeeOe6rUgkWOF 7CC9Dh/dduQ1QrsJhmZAEFfd6ByYV+ ;{id = 2854 (zsk), size = 1688b}
example.com. 3600 IN RRSIG DNSKEY DSA 2 3600 20070926134150 20070829134150 2854 example.com. MCwCFBQRtlR4BEv9ohi+PGFjp+AHsJuHAhRCvz0shggvnvI88DFnBDCczHUcVA== ;{id = 2854}
SECTION AUTHORITY
example.com. IN NS ns.example.com.
example.com. 3600 IN RRSIG NS 3 2 3600 20070926134150 20070829134150 2854 example.com. MC0CFQCN+qHdJxoI/2tNKwsb08pra/G7aAIUAWA5sDdJTbrXA1/3OaesGBAO3sI= ;{id = 2854}
SECTION ADDITIONAL
ns.example.com. IN A 1.2.3.4
ns.example.com. 3600 IN RRSIG A 3 3 3600 20070926135752 20070829135752 2854 example.com. MC0CFQCMSWxVehgOQLoYclB9PIAbNP229AIUeH0vNNGJhjnZiqgIOKvs1EhzqAo= ;{id = 2854}
ENTRY_END
; response to query of interest
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
www.example.com. IN CNAME
SECTION ANSWER
www.example.com. IN CNAME www.example.net.
www.example.com. 3600 IN RRSIG CNAME DSA 3 3600 20070926134150 20070829134150 2854 example.com. MC0CFGcJxnNxpWCBzXejiSdl4p1BKRMnAhUApoJrugVBRwFgAoYAhhqlZFac7fE= ;{id = 2854}
SECTION AUTHORITY
SECTION ADDITIONAL
ENTRY_END
RANGE_END
; ns.example.net.
RANGE_BEGIN 0 100
ADDRESS 1.2.3.5
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
example.net. IN NS
SECTION ANSWER
example.net. IN NS ns.example.net.
example.net. 3600 IN RRSIG NS RSASHA1 2 3600 20070926134150 20070829134150 30899 example.net. E8JX0l4B+cSR5bkHQwOJy1pBmlLMTYCJ8EwfNMU/eCv0YhKwo26rHhn52FGisgv+Nwp7/NbhHqQ+kJgoZC94XA== ;{id = 30899}
SECTION ADDITIONAL
ns.example.net. IN A 1.2.3.5
ns.example.net. 3600 IN RRSIG A RSASHA1 3 3600 20070926134150 20070829134150 30899 example.net. x+tQMC9FhzT7Fcy1pM5NrOC7E8nLd7THPI3C6ie4EwL8PrxllqlR3q/DKB0d/m0qCOPcgN6HFOYURV1s4uAcsw== ;{id = 30899}
ENTRY_END
; response to DNSKEY priming query
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
example.net. IN DNSKEY
SECTION ANSWER
example.net. 3600 IN DNSKEY 256 3 5 AQPQ41chR9DEHt/aIzIFAqanbDlRflJoRs5yz1jFsoRIT7dWf0r+PeDuewdxkszNH6wnU4QL8pfKFRh5PIYVBLK3 ;{id = 30899 (zsk), size = 512b}
example.net. 3600 IN RRSIG DNSKEY RSASHA1 2 3600 20070926134150 20070829134150 30899 example.net. hiFzlQ8VoYgCuvIsfVuxC3mfJDqsTh0yc6abs5xMx5uEcIjb0dndFQx7INOM+imlzveEN73Hqp4OLFpFhsWLlw== ;{id = 30899}
SECTION AUTHORITY
example.net. IN NS ns.example.net.
example.net. 3600 IN RRSIG NS RSASHA1 2 3600 20070926134150 20070829134150 30899 example.net. E8JX0l4B+cSR5bkHQwOJy1pBmlLMTYCJ8EwfNMU/eCv0YhKwo26rHhn52FGisgv+Nwp7/NbhHqQ+kJgoZC94XA== ;{id = 30899}
SECTION ADDITIONAL
ns.example.net. IN A 1.2.3.5
ns.example.net. 3600 IN RRSIG A RSASHA1 3 3600 20070926134150 20070829134150 30899 example.net. x+tQMC9FhzT7Fcy1pM5NrOC7E8nLd7THPI3C6ie4EwL8PrxllqlR3q/DKB0d/m0qCOPcgN6HFOYURV1s4uAcsw== ;{id = 30899}
ENTRY_END
; response to query of interest
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
www.example.net. IN A
SECTION ANSWER
www.example.net. IN A 11.12.13.14
www.example.net. 3600 IN RRSIG A 5 3 3600 20070926134150 20070829134150 30899 example.net. CPxF5hK9Kg5eT7W6LgZwr0ePYEm9HMcSY4vvqCS6gDWB4X9jvXLCfBkCLhsNybPBpGWlsLi5wM6MTdJXuPpsRA== ;{id = 30899}
SECTION AUTHORITY
SECTION ADDITIONAL
ENTRY_END
RANGE_END
STEP 1 QUERY
ENTRY_BEGIN
REPLY RD DO
SECTION QUESTION
www.example.com. IN CNAME
ENTRY_END
; recursion happens here.
STEP 10 CHECK_ANSWER
ENTRY_BEGIN
MATCH all
REPLY QR RD RA AD NOERROR
SECTION QUESTION
www.example.com. IN CNAME
SECTION ANSWER
www.example.com. IN CNAME www.example.net.
www.example.com. 3600 IN RRSIG CNAME DSA 3 3600 20070926134150 20070829134150 2854 example.com. MC0CFGcJxnNxpWCBzXejiSdl4p1BKRMnAhUApoJrugVBRwFgAoYAhhqlZFac7fE= ;{id = 2854}
SECTION AUTHORITY
SECTION ADDITIONAL
ENTRY_END
SCENARIO_END
dnssecjava-1.1.3/src/test/resources/unbound/val_cnametocloser.rpl 0000664 0000000 0000000 00000011530 13020541473 0025305 0 ustar 00root root 0000000 0000000 ; config options
server:
trust-anchor: "example.com. 3600 IN DS 30899 5 1 d4bf9d2e10f6d76840d42ef5913022abcd0bf512"
trust-anchor: "a.b.example.com. 3600 IN DNSKEY 257 3 5 AwEAAas/cAhCFXvBUgTSNZCvQp0pLx1dY+7rXR0hH4/3EUgWmsmbYUpI1qD0xhwKD/oYGEwAm291fyWJ9c0oVxXDEK8="
val-override-date: "20091113091234"
forward-zone:
name: "."
forward-addr: 192.0.2.1
CONFIG_END
SCENARIO_BEGIN Test validator with CNAME to closer anchor under optout.
RANGE_BEGIN 0 100
ADDRESS 192.0.2.1
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
www.example.com. IN AAAA
SECTION ANSWER
www.example.com. IN CNAME www.a.b.example.com.
www.example.com. 3600 IN RRSIG CNAME 5 3 3600 20091213091234 20091111091234 30899 example.com. mfQXJgOsRe8wiqNDZT4+ygSgRqzNowJ20o5+b681Mssp0xc007dq1ZaUYwUCdZjTn/GhF+f74t0UI1oqsFw2XA== ;{id = 30899}
SECTION AUTHORITY
;; nsec3param 1 1 1 d399eaab
; example.com. -> l0c0e5lac37ai0lpij31sj699hkktdmb.
; b.example.com. -> 1lq6sb4omkd2vgj0l8lro2cbie223hco.
;; closest encloser: example.com.
l0c0e5lac37ai0lpij31sj699hkktdmb.example.com. IN NSEC3 1 1 1 d399eaab l0c0e5lac37ai0lpij31sj699hkktdmc SOA NS DNSKEY NSEC3PARAM RRSIG
l0c0e5lac37ai0lpij31sj699hkktdmb.example.com. 3600 IN RRSIG NSEC3 5 3 3600 20091213091234 20091111091234 30899 example.com. qjV0zsbDWLuoOQQ3tgCE2zo1z31bK9nv/Wh6xqKhmhyFI87nw2HM0lZGfRQrpWvWfBDczLRxHH9WNZkeIzv28w== ;{id = 30899}
;; nextcloser is: b.example.com. ; under optout range.
; disproof of DS using the optout range.
1lq4sb4omkd2vgj0l8lro2cbie223hco.example.com. IN NSEC3 1 1 1 d399eaab 1lq8sb4omkd2vgj0l8lro2cbie223hco NS RRSIG
1lq4sb4omkd2vgj0l8lro2cbie223hco.example.com. 3600 IN RRSIG NSEC3 5 3 3600 20091213091234 20091111091234 30899 example.com. ZOJhHYt+YkGHBxHynuXlyZ8PEGg4YyqD/roWiEtBoP2PiGoPNCNqtWd0WjRgsUT0YFp/VqjqAU/RH8D45B8S8A== ;{id = 30899}
ENTRY_END
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
www.a.b.example.com. IN AAAA
SECTION ANSWER
SECTION AUTHORITY
; NSEC that proves there is no AAAA record
www.a.b.example.com. IN NSEC zzz.a.b.example.com. A NSEC RRSIG MX
www.a.b.example.com. 3600 IN RRSIG NSEC 5 5 3600 20091213091234 20091111091234 16486 a.b.example.com. pOj+aOIolZ8VXlLpaLD1NsYVbl8FW4wmsJbiVTYAMcyDOlgxOsbhTtlB4jQ7uV9pRVAzkvdm1V5wc/1PcncTuw== ;{id = 16486}
ENTRY_END
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
example.com. IN DNSKEY
SECTION ANSWER
example.com. 3600 IN DNSKEY 256 3 5 AQPQ41chR9DEHt/aIzIFAqanbDlRflJoRs5yz1jFsoRIT7dWf0r+PeDuewdxkszNH6wnU4QL8pfKFRh5PIYVBLK3 ;{id = 30899 (zsk), size = 512b}
example.com. 3600 IN RRSIG DNSKEY 5 2 3600 20091213091234 20091111091234 30899 example.com. hc+1QLqhy6lcfgH95k6eabsXrYsdH2oTLqDu6BjHYrmLi0kX4ZDiOI+syhIcGw9+hRqW1j8t+lsHvzvi7BgcXg== ;{id = 30899}
ENTRY_END
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
a.b.example.com. IN DNSKEY
SECTION ANSWER
a.b.example.com. 3600 IN DNSKEY 257 3 5 AwEAAas/cAhCFXvBUgTSNZCvQp0pLx1dY+7rXR0hH4/3EUgWmsmbYUpI1qD0xhwKD/oYGEwAm291fyWJ9c0oVxXDEK8= ;{id = 16486 (ksk), size = 512b}
a.b.example.com. 3600 IN RRSIG DNSKEY 5 4 3600 20091213091234 20091111091234 16486 a.b.example.com. kPftbF2Rut5h2Sc2k/gp27XS+4I9WQ/EYa5NJOnqfJZqpw/es7GuLyWAAZyvNhBDIUEenXtZ8k1H8F8poKdNXw== ;{id = 16486}
ENTRY_END
RANGE_END
STEP 1 QUERY
ENTRY_BEGIN
REPLY RD DO
SECTION QUESTION
www.example.com. IN AAAA
ENTRY_END
; recursion happens here.
STEP 10 CHECK_ANSWER
ENTRY_BEGIN
MATCH all
REPLY QR RD RA AD NOERROR
SECTION QUESTION
www.example.com. IN AAAA
SECTION ANSWER
www.example.com. IN CNAME www.a.b.example.com.
www.example.com. 3600 IN RRSIG CNAME 5 3 3600 20091213091234 20091111091234 30899 example.com. mfQXJgOsRe8wiqNDZT4+ygSgRqzNowJ20o5+b681Mssp0xc007dq1ZaUYwUCdZjTn/GhF+f74t0UI1oqsFw2XA== ;{id = 30899}
SECTION AUTHORITY
l0c0e5lac37ai0lpij31sj699hkktdmb.example.com. 3600 IN NSEC3 1 1 1 d399eaab l0c0e5lac37ai0lpij31sj699hkktdmc NS SOA RRSIG DNSKEY NSEC3PARAM ; flags: optout
l0c0e5lac37ai0lpij31sj699hkktdmb.example.com. 3600 IN RRSIG NSEC3 5 3 3600 20091213091234 20091111091234 30899 example.com. qjV0zsbDWLuoOQQ3tgCE2zo1z31bK9nv/Wh6xqKhmhyFI87nw2HM0lZGfRQrpWvWfBDczLRxHH9WNZkeIzv28w== ;{id = 30899}
1lq4sb4omkd2vgj0l8lro2cbie223hco.example.com. 3600 IN NSEC3 1 1 1 d399eaab 1lq8sb4omkd2vgj0l8lro2cbie223hco NS RRSIG ; flags: optout
1lq4sb4omkd2vgj0l8lro2cbie223hco.example.com. 3600 IN RRSIG NSEC3 5 3 3600 20091213091234 20091111091234 30899 example.com. ZOJhHYt+YkGHBxHynuXlyZ8PEGg4YyqD/roWiEtBoP2PiGoPNCNqtWd0WjRgsUT0YFp/VqjqAU/RH8D45B8S8A== ;{id = 30899}
www.a.b.example.com. 3600 IN NSEC zzz.a.b.example.com. A MX RRSIG NSEC
www.a.b.example.com. 3600 IN RRSIG NSEC 5 5 3600 20091213091234 20091111091234 16486 a.b.example.com. pOj+aOIolZ8VXlLpaLD1NsYVbl8FW4wmsJbiVTYAMcyDOlgxOsbhTtlB4jQ7uV9pRVAzkvdm1V5wc/1PcncTuw== ;{id = 16486}
ENTRY_END
SCENARIO_END
dnssecjava-1.1.3/src/test/resources/unbound/val_cnametocloser_nosig.rpl 0000664 0000000 0000000 00000007070 13020541473 0026510 0 ustar 00root root 0000000 0000000 ; config options
server:
trust-anchor: "example.com. 3600 IN DS 30899 5 1 d4bf9d2e10f6d76840d42ef5913022abcd0bf512"
trust-anchor: "a.b.example.com. 3600 IN DNSKEY 257 3 5 AwEAAas/cAhCFXvBUgTSNZCvQp0pLx1dY+7rXR0hH4/3EUgWmsmbYUpI1qD0xhwKD/oYGEwAm291fyWJ9c0oVxXDEK8="
val-override-date: "20091113091234"
forward-zone:
name: "."
forward-addr: 192.0.2.1
CONFIG_END
SCENARIO_BEGIN Test validator with CNAME to closer anchor optout missing sigs.
RANGE_BEGIN 0 100
ADDRESS 192.0.2.1
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
www.example.com. IN AAAA
SECTION ANSWER
www.example.com. IN CNAME www.a.b.example.com.
www.example.com. 3600 IN RRSIG CNAME 5 3 3600 20091213091234 20091111091234 30899 example.com. mfQXJgOsRe8wiqNDZT4+ygSgRqzNowJ20o5+b681Mssp0xc007dq1ZaUYwUCdZjTn/GhF+f74t0UI1oqsFw2XA== ;{id = 30899}
SECTION AUTHORITY
;; nsec3param 1 1 1 d399eaab
; example.com. -> l0c0e5lac37ai0lpij31sj699hkktdmb.
; b.example.com. -> 1lq6sb4omkd2vgj0l8lro2cbie223hco.
;; closest encloser: example.com.
l0c0e5lac37ai0lpij31sj699hkktdmb.example.com. IN NSEC3 1 1 1 d399eaab l0c0e5lac37ai0lpij31sj699hkktdmc SOA NS DNSKEY NSEC3PARAM RRSIG
l0c0e5lac37ai0lpij31sj699hkktdmb.example.com. 3600 IN RRSIG NSEC3 5 3 3600 20091213091234 20091111091234 30899 example.com. qjV0zsbDWLuoOQQ3tgCE2zo1z31bK9nv/Wh6xqKhmhyFI87nw2HM0lZGfRQrpWvWfBDczLRxHH9WNZkeIzv28w== ;{id = 30899}
;; nextcloser is: b.example.com. ; under optout range.
; disproof of DS using the optout range.
1lq4sb4omkd2vgj0l8lro2cbie223hco.example.com. IN NSEC3 1 1 1 d399eaab 1lq8sb4omkd2vgj0l8lro2cbie223hco NS RRSIG
1lq4sb4omkd2vgj0l8lro2cbie223hco.example.com. 3600 IN RRSIG NSEC3 5 3 3600 20091213091234 20091111091234 30899 example.com. ZOJhHYt+YkGHBxHynuXlyZ8PEGg4YyqD/roWiEtBoP2PiGoPNCNqtWd0WjRgsUT0YFp/VqjqAU/RH8D45B8S8A== ;{id = 30899}
ENTRY_END
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
www.a.b.example.com. IN AAAA
SECTION ANSWER
SECTION AUTHORITY
; NSEC that proves there is no AAAA record
www.a.b.example.com. IN NSEC zzz.a.b.example.com. A NSEC RRSIG MX
; signature missing!
;www.a.b.example.com. 3600 IN RRSIG NSEC 5 5 3600 20091213091234 20091111091234 16486 a.b.example.com. pOj+aOIolZ8VXlLpaLD1NsYVbl8FW4wmsJbiVTYAMcyDOlgxOsbhTtlB4jQ7uV9pRVAzkvdm1V5wc/1PcncTuw== ;{id = 16486}
ENTRY_END
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
example.com. IN DNSKEY
SECTION ANSWER
example.com. 3600 IN DNSKEY 256 3 5 AQPQ41chR9DEHt/aIzIFAqanbDlRflJoRs5yz1jFsoRIT7dWf0r+PeDuewdxkszNH6wnU4QL8pfKFRh5PIYVBLK3 ;{id = 30899 (zsk), size = 512b}
example.com. 3600 IN RRSIG DNSKEY 5 2 3600 20091213091234 20091111091234 30899 example.com. hc+1QLqhy6lcfgH95k6eabsXrYsdH2oTLqDu6BjHYrmLi0kX4ZDiOI+syhIcGw9+hRqW1j8t+lsHvzvi7BgcXg== ;{id = 30899}
ENTRY_END
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
a.b.example.com. IN DNSKEY
SECTION ANSWER
a.b.example.com. 3600 IN DNSKEY 257 3 5 AwEAAas/cAhCFXvBUgTSNZCvQp0pLx1dY+7rXR0hH4/3EUgWmsmbYUpI1qD0xhwKD/oYGEwAm291fyWJ9c0oVxXDEK8= ;{id = 16486 (ksk), size = 512b}
; signature missing!
;a.b.example.com. 3600 IN RRSIG DNSKEY 5 4 3600 20091213091234 20091111091234 16486 a.b.example.com. kPftbF2Rut5h2Sc2k/gp27XS+4I9WQ/EYa5NJOnqfJZqpw/es7GuLyWAAZyvNhBDIUEenXtZ8k1H8F8poKdNXw== ;{id = 16486}
ENTRY_END
RANGE_END
STEP 1 QUERY
ENTRY_BEGIN
REPLY RD DO
SECTION QUESTION
www.example.com. IN AAAA
ENTRY_END
; recursion happens here.
STEP 10 CHECK_ANSWER
ENTRY_BEGIN
MATCH all
REPLY QR RD RA SERVFAIL
SECTION QUESTION
www.example.com. IN AAAA
SECTION ANSWER
ENTRY_END
SCENARIO_END
dnssecjava-1.1.3/src/test/resources/unbound/val_cnametocnamewctoposwc.rpl 0000664 0000000 0000000 00000027146 13020541473 0027064 0 ustar 00root root 0000000 0000000 ; config options
; The island of trust is at example.com
server:
trust-anchor: "example.com. IN DNSKEY 257 3 8 AwEAAdL6YJdvoKQJEt/SgB6MrbQ2RDwnrcQQb6bDE8FpGgLen6hvF31ntVsZ3RZzhCmwL6lvumOLFIRKaP9ZBEVutT9iMoF2dNRbT0TCUrv6uQNHcuCZ0BJhuDNBU42f3yOnfFv7PKxd0NP+yFHJkvDQAVLMB5GeUQuYnvgQGeZsf/3b"
val-override-date: "20121030123249"
target-fetch-policy: "0 0 0 0 0"
stub-zone:
name: "."
stub-addr: 193.0.14.129 # K.ROOT-SERVERS.NET.
CONFIG_END
SCENARIO_BEGIN Test validator with a regular cname to wildcard cname to wildcard response
; K.ROOT-SERVERS.NET.
RANGE_BEGIN 0 100
ADDRESS 193.0.14.129
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
. IN NS
SECTION ANSWER
. IN NS K.ROOT-SERVERS.NET.
SECTION ADDITIONAL
K.ROOT-SERVERS.NET. IN A 193.0.14.129
ENTRY_END
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
start.example.com. IN A
SECTION AUTHORITY
com. IN NS a.gtld-servers.net.
SECTION ADDITIONAL
a.gtld-servers.net. IN A 192.5.6.30
ENTRY_END
RANGE_END
; a.gtld-servers.net.
RANGE_BEGIN 0 100
ADDRESS 192.5.6.30
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
com. IN NS
SECTION ANSWER
com. IN NS a.gtld-servers.net.
SECTION ADDITIONAL
a.gtld-servers.net. IN A 192.5.6.30
ENTRY_END
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
start.example.com. IN A
SECTION AUTHORITY
example.com. IN NS ns.example.com.
SECTION ADDITIONAL
ns.example.com. 120 IN A 1.2.3.4
ENTRY_END
RANGE_END
; ns.example.com.
RANGE_BEGIN 0 100
ADDRESS 1.2.3.4
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
example.com. IN NS
SECTION ANSWER
example.com. 3600 IN NS ns.example.com.
example.com. 3600 IN RRSIG NS 8 2 3600 20121126123249 20121029123249 64050 example.com. cpLjgKPacNxVIGo59tYMZ98GVYpH28WHRWj3AeIHK0StYFcAlflGLdkae1LEgMwfUmzrayrA5GMe3AH8LyuTgA2Dn1oNFxGfuShQvK2MFQ+LxvQfiuoqlAlL5Aa94IWcSoU/wLrr66I1K8oSB2yK1Tyyv73c2N40D1mBbzIE70U=
SECTION ADDITIONAL
ns.example.com. 3600 IN A 1.2.3.4
ns.example.com. 3600 IN RRSIG A 8 2 3600 20121126123249 20121029123249 64050 example.com. zxGyimwFsd39j8T7jJ+tSAQPwZ7tjk6HHmzosTMCRePM4k4newbLb5HbrpucSiW/plaEZvjRTDTJ6bPkw0msPXjPCI/22Zh236XO5vhGtMOlxDgAEazuhifVF6UsM7GZwONPBCvw705HgWQyCR1YlTK2w9ffH3GopU9f4oP7Pmk=
ENTRY_END
; response to DNSKEY priming query
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
example.com. IN DNSKEY
SECTION ANSWER
example.com. 3600 IN DNSKEY 256 3 8 AwEAAdWzfjQD2bfQuoQGNYuS0ByosBxiTkoKcy9kMoWOQ/jx9rvTRhHImWxTxFtIyZOoRgn6E6mE71e5Y1q1nuyH544Em+4rNRMMW4bzecQmMmPk+B97MqW9aW6e4BwiCTt52IGfL++5GORYcaITw9UOlQLYH1oHHUNUC6ebHENofLTj ;{id = 64050 (zsk), size = 1024b}
example.com. 3600 IN DNSKEY 257 3 8 AwEAAdL6YJdvoKQJEt/SgB6MrbQ2RDwnrcQQb6bDE8FpGgLen6hvF31ntVsZ3RZzhCmwL6lvumOLFIRKaP9ZBEVutT9iMoF2dNRbT0TCUrv6uQNHcuCZ0BJhuDNBU42f3yOnfFv7PKxd0NP+yFHJkvDQAVLMB5GeUQuYnvgQGeZsf/3b ;{id = 46426 (ksk), size = 1024b}
example.com. 3600 IN RRSIG DNSKEY 8 2 3600 20121126123249 20121029123249 46426 example.com. pisNb/A40XDEiMpcYtxc+yO6osISyfpqz+0UZ61pd70+TLXMF197zr9SqOVJHyRI6G2lSnFggxYrZDpxLbxOW0RY/KfjD3xlI14M/2DieJ1NdlQuYFGgTwxcoINUJ/wRd4YUxkF4JS0D4NBdQ0yQYR0KqDr84oyhnULEHX6WB7s=
SECTION AUTHORITY
SECTION ADDITIONAL
ENTRY_END
; response to query of interest
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
start.example.com. IN A
SECTION ANSWER
start.example.com. 3600 IN CNAME x.y.z.wc.example.com.
start.example.com. 3600 IN RRSIG CNAME 8 3 3600 20121126131853 20121029131853 64050 example.com. uN8+hg2b9kqpso4zTtpb8CdkGkgOdlbayH1Ui7NVSi1Y8un8FDG4NHy2gpCi0zIMpeAOa5bENe3cdTEwYZKHQdvnGjaI/zFWpFAzXsEFg0VlLxDQXSzRB6GtoFoUEYiZBHsmLIy3zWjuihlWK9fRzyPyVtBDDmqU8KK7+H3BYp0=
x.y.z.wc.example.com. 3600 IN CNAME x.y.z.end.example.com.
x.y.z.wc.example.com. 3600 IN RRSIG CNAME 8 3 3600 20121126131853 20121029131853 64050 example.com. NQTIY1uMK1jxVMHOaMB4shedyhdAERZuPiZXytfqSH36hDVMf1C8tSxdbCjJ90lOLEWNtMmT09l5kh14gp1XIaBHzLuDsYmZJVeudBGCaQRkbM5focd2VMd8V4hHQk4odwsRrSY6IETftHeqeFiRifru/rI3x5Dlv8awI6V5TZI=
x.y.z.end.example.com. 3600 IN A 1.2.3.5
x.y.z.end.example.com. 3600 IN RRSIG A 8 3 3600 20121126131826 20121029131826 64050 example.com. iS1Pe45xt8SLGlmfmrSPTrnIAlwpIX8leTrsoLgpQJc98aA0XJmO/D32CbMTRZzAM1oBVggm80ht2RIQkX3W1NvN/prcu+Gp0Zrm0rtW+7Q7VwcSbo7jyHh5K8Mppp2OsCleexco5NVAKpDMvD0nyG+CsKtNMQpKK2DlumQsraE=
SECTION AUTHORITY
*.wc.example.com. 86400 IN NSEC www.example.com. CNAME RRSIG NSEC
*.wc.example.com. 86400 IN RRSIG NSEC 8 3 86400 20121126131853 20121029131853 64050 example.com. YrmCLu0uGgD2gcU4p12BGnUGYcrKmfg82MJHSF5OnVmmJxXiSbSBnZPahbJNGA/kPLt+SlDyBTcssZKXWxM6bW7WF57OwffOj7rMyr5vhx7J6OsuWKotPVqnUFDx9j/rOum24yCKqoBWvpW/RYUHLuX1Wm05WMCgNWhuN4wqwiU=
*.end.example.com. 86400 IN NSEC escapedtext.example.com. A RRSIG NSEC
*.end.example.com. 86400 IN RRSIG NSEC 8 3 86400 20121126131826 20121029131826 64050 example.com. P6uJSImaee+5NHlTP06pMxgO69qxjJc0Uo1+htjVyE8f15MhG8A7NttvzggbtyzmfLMPr7TilM+Mm7hC3pIk/TeBEdH8p+8qypnY0NzPntz5z1+6C6ZTjDXp6NxDwMz7th31r3B3u4xo/K4qMnXmrAFOIE5Lopk0uDGXfjKPCKE=
example.com. 3600 IN NS ns.example.com.
example.com. 3600 IN RRSIG NS 8 2 3600 20121126131826 20121029131826 64050 example.com. NgY7UAdkXprnCi/O6c5XoB82tqLBd1bY9LmDG9wwN0zEUR5aHQcOmX9waHyqXQI86SOFQbGCvO2wDLqdqWniw1IYf4S66Vf9KrpaH2gVbvHKiEpGJPeDYQcD5xkv50Lsp4ktcLyuO/dk8ORCP7E2yC5IQVNeFgUfaqttZcJoxuQ=
SECTION ADDITIONAL
ns.example.com. 3600 IN A 1.2.3.4
ns.example.com. 3600 IN RRSIG A 8 2 3600 20121126131826 20121029131826 64050 example.com. L/EsWsRNhM0Lt8877XYfm0FkVc+utuRPYlW/yxEi/Nzs/mTb9BMrOygsW0qfpYakYgfFvinR7S7ce9/naWidzGkWKYR85g2WFms3/TgchpmfjZHEsNyuT8zsiGrj3bQ3RxpT5cmt/IS2QlOak/RhdtawKfd9aqkMTVpP2idEQwY=
ENTRY_END
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
x.y.z.wc.example.com. IN A
SECTION ANSWER
x.y.z.wc.example.com. 3600 IN CNAME x.y.z.end.example.com.
x.y.z.wc.example.com. 3600 IN RRSIG CNAME 8 3 3600 20121126131853 20121029131853 64050 example.com. NQTIY1uMK1jxVMHOaMB4shedyhdAERZuPiZXytfqSH36hDVMf1C8tSxdbCjJ90lOLEWNtMmT09l5kh14gp1XIaBHzLuDsYmZJVeudBGCaQRkbM5focd2VMd8V4hHQk4odwsRrSY6IETftHeqeFiRifru/rI3x5Dlv8awI6V5TZI=
x.y.z.end.example.com. 3600 IN A 1.2.3.5
x.y.z.end.example.com. 3600 IN RRSIG A 8 3 3600 20121126131826 20121029131826 64050 example.com. iS1Pe45xt8SLGlmfmrSPTrnIAlwpIX8leTrsoLgpQJc98aA0XJmO/D32CbMTRZzAM1oBVggm80ht2RIQkX3W1NvN/prcu+Gp0Zrm0rtW+7Q7VwcSbo7jyHh5K8Mppp2OsCleexco5NVAKpDMvD0nyG+CsKtNMQpKK2DlumQsraE=
SECTION AUTHORITY
*.wc.example.com. 86400 IN NSEC www.example.com. CNAME RRSIG NSEC
*.wc.example.com. 86400 IN RRSIG NSEC 8 3 86400 20121126131853 20121029131853 64050 example.com. YrmCLu0uGgD2gcU4p12BGnUGYcrKmfg82MJHSF5OnVmmJxXiSbSBnZPahbJNGA/kPLt+SlDyBTcssZKXWxM6bW7WF57OwffOj7rMyr5vhx7J6OsuWKotPVqnUFDx9j/rOum24yCKqoBWvpW/RYUHLuX1Wm05WMCgNWhuN4wqwiU=
*.end.example.com. 86400 IN NSEC escapedtext.example.com. A RRSIG NSEC
*.end.example.com. 86400 IN RRSIG NSEC 8 3 86400 20121126131826 20121029131826 64050 example.com. P6uJSImaee+5NHlTP06pMxgO69qxjJc0Uo1+htjVyE8f15MhG8A7NttvzggbtyzmfLMPr7TilM+Mm7hC3pIk/TeBEdH8p+8qypnY0NzPntz5z1+6C6ZTjDXp6NxDwMz7th31r3B3u4xo/K4qMnXmrAFOIE5Lopk0uDGXfjKPCKE=
example.com. 3600 IN NS ns.example.com.
example.com. 3600 IN RRSIG NS 8 2 3600 20121126131826 20121029131826 64050 example.com. NgY7UAdkXprnCi/O6c5XoB82tqLBd1bY9LmDG9wwN0zEUR5aHQcOmX9waHyqXQI86SOFQbGCvO2wDLqdqWniw1IYf4S66Vf9KrpaH2gVbvHKiEpGJPeDYQcD5xkv50Lsp4ktcLyuO/dk8ORCP7E2yC5IQVNeFgUfaqttZcJoxuQ=
SECTION ADDITIONAL
ns.example.com. 3600 IN A 1.2.3.4
ns.example.com. 3600 IN RRSIG A 8 2 3600 20121126131826 20121029131826 64050 example.com. L/EsWsRNhM0Lt8877XYfm0FkVc+utuRPYlW/yxEi/Nzs/mTb9BMrOygsW0qfpYakYgfFvinR7S7ce9/naWidzGkWKYR85g2WFms3/TgchpmfjZHEsNyuT8zsiGrj3bQ3RxpT5cmt/IS2QlOak/RhdtawKfd9aqkMTVpP2idEQwY=
ENTRY_END
ENTRY_BEGING
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
x.y.z.end.example.com. IN A
SECTION ANSWER
x.y.z.end.example.com. 3600 IN A 1.2.3.5
x.y.z.end.example.com. 3600 IN RRSIG A 8 3 3600 20121126131826 20121029131826 64050 example.com. iS1Pe45xt8SLGlmfmrSPTrnIAlwpIX8leTrsoLgpQJc98aA0XJmO/D32CbMTRZzAM1oBVggm80ht2RIQkX3W1NvN/prcu+Gp0Zrm0rtW+7Q7VwcSbo7jyHh5K8Mppp2OsCleexco5NVAKpDMvD0nyG+CsKtNMQpKK2DlumQsraE=
SECTION AUTHORITY
*.end.example.com. 86400 IN NSEC escapedtext.example.com. A RRSIG NSEC
*.end.example.com. 86400 IN RRSIG NSEC 8 3 86400 20121126131826 20121029131826 64050 example.com. P6uJSImaee+5NHlTP06pMxgO69qxjJc0Uo1+htjVyE8f15MhG8A7NttvzggbtyzmfLMPr7TilM+Mm7hC3pIk/TeBEdH8p+8qypnY0NzPntz5z1+6C6ZTjDXp6NxDwMz7th31r3B3u4xo/K4qMnXmrAFOIE5Lopk0uDGXfjKPCKE=
example.com. 3600 IN NS ns.example.com.
example.com. 3600 IN RRSIG NS 8 2 3600 20121126131826 20121029131826 64050 example.com. NgY7UAdkXprnCi/O6c5XoB82tqLBd1bY9LmDG9wwN0zEUR5aHQcOmX9waHyqXQI86SOFQbGCvO2wDLqdqWniw1IYf4S66Vf9KrpaH2gVbvHKiEpGJPeDYQcD5xkv50Lsp4ktcLyuO/dk8ORCP7E2yC5IQVNeFgUfaqttZcJoxuQ=
SECTION ADDITIONAL
ns.example.com. 3600 IN A 1.2.3.4
ns.example.com. 3600 IN RRSIG A 8 2 3600 20121126123249 20121029123249 64050 example.com. zxGyimwFsd39j8T7jJ+tSAQPwZ7tjk6HHmzosTMCRePM4k4newbLb5HbrpucSiW/plaEZvjRTDTJ6bPkw0msPXjPCI/22Zh236XO5vhGtMOlxDgAEazuhifVF6UsM7GZwONPBCvw705HgWQyCR1YlTK2w9ffH3GopU9f4oP7Pmk=
ENTRY_END
RANGE_END
STEP 1 QUERY
ENTRY_BEGIN
REPLY RD DO
SECTION QUESTION
start.example.com. IN A
ENTRY_END
; recursion happens here.
STEP 10 CHECK_ANSWER
ENTRY_BEGIN
MATCH all
REPLY QR RD RA AD NOERROR
SECTION QUESTION
start.example.com. IN A
SECTION ANSWER
start.example.com. 3600 IN CNAME x.y.z.wc.example.com.
start.example.com. 3600 IN RRSIG CNAME 8 3 3600 20121126131853 20121029131853 64050 example.com. uN8+hg2b9kqpso4zTtpb8CdkGkgOdlbayH1Ui7NVSi1Y8un8FDG4NHy2gpCi0zIMpeAOa5bENe3cdTEwYZKHQdvnGjaI/zFWpFAzXsEFg0VlLxDQXSzRB6GtoFoUEYiZBHsmLIy3zWjuihlWK9fRzyPyVtBDDmqU8KK7+H3BYp0=
x.y.z.wc.example.com. 3600 IN CNAME x.y.z.end.example.com.
x.y.z.wc.example.com. 3600 IN RRSIG CNAME 8 3 3600 20121126131853 20121029131853 64050 example.com. NQTIY1uMK1jxVMHOaMB4shedyhdAERZuPiZXytfqSH36hDVMf1C8tSxdbCjJ90lOLEWNtMmT09l5kh14gp1XIaBHzLuDsYmZJVeudBGCaQRkbM5focd2VMd8V4hHQk4odwsRrSY6IETftHeqeFiRifru/rI3x5Dlv8awI6V5TZI=
x.y.z.end.example.com. 3600 IN A 1.2.3.5
x.y.z.end.example.com. 3600 IN RRSIG A 8 3 3600 20121126131826 20121029131826 64050 example.com. iS1Pe45xt8SLGlmfmrSPTrnIAlwpIX8leTrsoLgpQJc98aA0XJmO/D32CbMTRZzAM1oBVggm80ht2RIQkX3W1NvN/prcu+Gp0Zrm0rtW+7Q7VwcSbo7jyHh5K8Mppp2OsCleexco5NVAKpDMvD0nyG+CsKtNMQpKK2DlumQsraE=
SECTION AUTHORITY
*.wc.example.com. 86400 IN NSEC www.example.com. CNAME RRSIG NSEC
*.wc.example.com. 86400 IN RRSIG NSEC 8 3 86400 20121126131853 20121029131853 64050 example.com. YrmCLu0uGgD2gcU4p12BGnUGYcrKmfg82MJHSF5OnVmmJxXiSbSBnZPahbJNGA/kPLt+SlDyBTcssZKXWxM6bW7WF57OwffOj7rMyr5vhx7J6OsuWKotPVqnUFDx9j/rOum24yCKqoBWvpW/RYUHLuX1Wm05WMCgNWhuN4wqwiU=
*.end.example.com. 86400 IN NSEC escapedtext.example.com. A RRSIG NSEC
*.end.example.com. 86400 IN RRSIG NSEC 8 3 86400 20121126131826 20121029131826 64050 example.com. P6uJSImaee+5NHlTP06pMxgO69qxjJc0Uo1+htjVyE8f15MhG8A7NttvzggbtyzmfLMPr7TilM+Mm7hC3pIk/TeBEdH8p+8qypnY0NzPntz5z1+6C6ZTjDXp6NxDwMz7th31r3B3u4xo/K4qMnXmrAFOIE5Lopk0uDGXfjKPCKE=
example.com. 3600 IN NS ns.example.com.
example.com. 3600 IN RRSIG NS 8 2 3600 20121126131826 20121029131826 64050 example.com. NgY7UAdkXprnCi/O6c5XoB82tqLBd1bY9LmDG9wwN0zEUR5aHQcOmX9waHyqXQI86SOFQbGCvO2wDLqdqWniw1IYf4S66Vf9KrpaH2gVbvHKiEpGJPeDYQcD5xkv50Lsp4ktcLyuO/dk8ORCP7E2yC5IQVNeFgUfaqttZcJoxuQ=
SECTION ADDITIONAL
ns.example.com. 3600 IN A 1.2.3.4
ns.example.com. 3600 IN RRSIG A 8 2 3600 20121126123249 20121029123249 64050 example.com. zxGyimwFsd39j8T7jJ+tSAQPwZ7tjk6HHmzosTMCRePM4k4newbLb5HbrpucSiW/plaEZvjRTDTJ6bPkw0msPXjPCI/22Zh236XO5vhGtMOlxDgAEazuhifVF6UsM7GZwONPBCvw705HgWQyCR1YlTK2w9ffH3GopU9f4oP7Pmk=
ENTRY_END
SCENARIO_END
dnssecjava-1.1.3/src/test/resources/unbound/val_cnametodname.rpl 0000664 0000000 0000000 00000016661 13020541473 0025114 0 ustar 00root root 0000000 0000000 ; config options
; The island of trust is at example.com
server:
trust-anchor: "example.com. 3600 IN DS 2854 3 1 46e4ffc6e9a4793b488954bd3f0cc6af0dfb201b"
trust-anchor: "example.net. 3600 IN DNSKEY 256 3 5 AQPQ41chR9DEHt/aIzIFAqanbDlRflJoRs5yz1jFsoRIT7dWf0r+PeDuewdxkszNH6wnU4QL8pfKFRh5PIYVBLK3 ;{id = 30899 (zsk), size = 512b}"
val-override-date: "20070916134226"
target-fetch-policy: "0 0 0 0 0"
stub-zone:
name: "."
stub-addr: 193.0.14.129 # K.ROOT-SERVERS.NET.
CONFIG_END
SCENARIO_BEGIN Test validator with a cname to a dname
; K.ROOT-SERVERS.NET.
RANGE_BEGIN 0 100
ADDRESS 193.0.14.129
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
. IN NS
SECTION ANSWER
. IN NS K.ROOT-SERVERS.NET.
SECTION ADDITIONAL
K.ROOT-SERVERS.NET. IN A 193.0.14.129
ENTRY_END
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
www.example.com. IN DNAME
SECTION AUTHORITY
com. IN NS a.gtld-servers.net.
SECTION ADDITIONAL
a.gtld-servers.net. IN A 192.5.6.30
ENTRY_END
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
www.example.net. IN DNAME
SECTION AUTHORITY
net. IN NS a.gtld-servers.net.
SECTION ADDITIONAL
a.gtld-servers.net. IN A 192.5.6.30
ENTRY_END
RANGE_END
; a.gtld-servers.net.
RANGE_BEGIN 0 100
ADDRESS 192.5.6.30
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
com. IN NS
SECTION ANSWER
com. IN NS a.gtld-servers.net.
SECTION ADDITIONAL
a.gtld-servers.net. IN A 192.5.6.30
ENTRY_END
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
net. IN NS
SECTION ANSWER
net. IN NS a.gtld-servers.net.
SECTION ADDITIONAL
a.gtld-servers.net. IN A 192.5.6.30
ENTRY_END
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
www.example.com. IN DNAME
SECTION AUTHORITY
example.com. IN NS ns.example.com.
SECTION ADDITIONAL
ns.example.com. IN A 1.2.3.4
ENTRY_END
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
www.example.net. IN DNAME
SECTION AUTHORITY
example.net. IN NS ns.example.net.
SECTION ADDITIONAL
ns.example.net. IN A 1.2.3.5
ENTRY_END
RANGE_END
; ns.example.com.
RANGE_BEGIN 0 100
ADDRESS 1.2.3.4
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
example.com. IN NS
SECTION ANSWER
example.com. IN NS ns.example.com.
example.com. 3600 IN RRSIG NS 3 2 3600 20070926134150 20070829134150 2854 example.com. MC0CFQCN+qHdJxoI/2tNKwsb08pra/G7aAIUAWA5sDdJTbrXA1/3OaesGBAO3sI= ;{id = 2854}
SECTION ADDITIONAL
ns.example.com. IN A 1.2.3.4
ns.example.com. 3600 IN RRSIG A 3 3 3600 20070926135752 20070829135752 2854 example.com. MC0CFQCMSWxVehgOQLoYclB9PIAbNP229AIUeH0vNNGJhjnZiqgIOKvs1EhzqAo= ;{id = 2854}
ENTRY_END
; response to DNSKEY priming query
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
example.com. IN DNSKEY
SECTION ANSWER
example.com. 3600 IN DNSKEY 256 3 3 ALXLUsWqUrY3JYER3T4TBJII s70j+sDS/UT2QRp61SE7S3E EXopNXoFE73JLRmvpi/UrOO/Vz4Se 6wXv/CYCKjGw06U4WRgR YXcpEhJROyNapmdIKSx hOzfLVE1gqA0PweZR8d tY3aNQSRn3sPpwJr6Mi /PqQKAMMrZ9ckJpf1+b QMOOvxgzz2U1GS18b3y ZKcgTMEaJzd/GZYzi/B N2DzQ0MsrSwYXfsNLFO Bbs8PJMW4LYIxeeOe6rUgkWOF 7CC9Dh/dduQ1QrsJhmZAEFfd6ByYV+ ;{id = 2854 (zsk), size = 1688b}
example.com. 3600 IN RRSIG DNSKEY DSA 2 3600 20070926134150 20070829134150 2854 example.com. MCwCFBQRtlR4BEv9ohi+PGFjp+AHsJuHAhRCvz0shggvnvI88DFnBDCczHUcVA== ;{id = 2854}
SECTION AUTHORITY
example.com. IN NS ns.example.com.
example.com. 3600 IN RRSIG NS 3 2 3600 20070926134150 20070829134150 2854 example.com. MC0CFQCN+qHdJxoI/2tNKwsb08pra/G7aAIUAWA5sDdJTbrXA1/3OaesGBAO3sI= ;{id = 2854}
SECTION ADDITIONAL
ns.example.com. IN A 1.2.3.4
ns.example.com. 3600 IN RRSIG A 3 3 3600 20070926135752 20070829135752 2854 example.com. MC0CFQCMSWxVehgOQLoYclB9PIAbNP229AIUeH0vNNGJhjnZiqgIOKvs1EhzqAo= ;{id = 2854}
ENTRY_END
; response to query of interest
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
www.example.com. IN DNAME
SECTION ANSWER
www.example.com. IN CNAME www.example.net.
www.example.com. 3600 IN RRSIG CNAME DSA 3 3600 20070926134150 20070829134150 2854 example.com. MC0CFGcJxnNxpWCBzXejiSdl4p1BKRMnAhUApoJrugVBRwFgAoYAhhqlZFac7fE= ;{id = 2854}
SECTION AUTHORITY
SECTION ADDITIONAL
ENTRY_END
RANGE_END
; ns.example.net.
RANGE_BEGIN 0 100
ADDRESS 1.2.3.5
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
example.net. IN NS
SECTION ANSWER
example.net. IN NS ns.example.net.
example.net. 3600 IN RRSIG NS RSASHA1 2 3600 20070926134150 20070829134150 30899 example.net. E8JX0l4B+cSR5bkHQwOJy1pBmlLMTYCJ8EwfNMU/eCv0YhKwo26rHhn52FGisgv+Nwp7/NbhHqQ+kJgoZC94XA== ;{id = 30899}
SECTION ADDITIONAL
ns.example.net. IN A 1.2.3.5
ns.example.net. 3600 IN RRSIG A RSASHA1 3 3600 20070926134150 20070829134150 30899 example.net. x+tQMC9FhzT7Fcy1pM5NrOC7E8nLd7THPI3C6ie4EwL8PrxllqlR3q/DKB0d/m0qCOPcgN6HFOYURV1s4uAcsw== ;{id = 30899}
ENTRY_END
; response to DNSKEY priming query
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
example.net. IN DNSKEY
SECTION ANSWER
example.net. 3600 IN DNSKEY 256 3 5 AQPQ41chR9DEHt/aIzIFAqanbDlRflJoRs5yz1jFsoRIT7dWf0r+PeDuewdxkszNH6wnU4QL8pfKFRh5PIYVBLK3 ;{id = 30899 (zsk), size = 512b}
example.net. 3600 IN RRSIG DNSKEY RSASHA1 2 3600 20070926134150 20070829134150 30899 example.net. hiFzlQ8VoYgCuvIsfVuxC3mfJDqsTh0yc6abs5xMx5uEcIjb0dndFQx7INOM+imlzveEN73Hqp4OLFpFhsWLlw== ;{id = 30899}
SECTION AUTHORITY
example.net. IN NS ns.example.net.
example.net. 3600 IN RRSIG NS RSASHA1 2 3600 20070926134150 20070829134150 30899 example.net. E8JX0l4B+cSR5bkHQwOJy1pBmlLMTYCJ8EwfNMU/eCv0YhKwo26rHhn52FGisgv+Nwp7/NbhHqQ+kJgoZC94XA== ;{id = 30899}
SECTION ADDITIONAL
ns.example.net. IN A 1.2.3.5
ns.example.net. 3600 IN RRSIG A RSASHA1 3 3600 20070926134150 20070829134150 30899 example.net. x+tQMC9FhzT7Fcy1pM5NrOC7E8nLd7THPI3C6ie4EwL8PrxllqlR3q/DKB0d/m0qCOPcgN6HFOYURV1s4uAcsw== ;{id = 30899}
ENTRY_END
; response to query of interest
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
www.example.net. IN DNAME
SECTION ANSWER
www.example.net. IN DNAME blarg.com.
www.example.net. 3600 IN RRSIG DNAME RSASHA1 3 3600 20070926134150 20070829134150 30899 example.net. ByevtOI1ChCDb8CD8Qvu2pNcooUWN4LkNXQj0vzSLp62rCltiWWTg8iU6DiojeOx2inVqx+PZXyiX1nX80kCgg== ;{id = 30899}
SECTION AUTHORITY
SECTION ADDITIONAL
ENTRY_END
RANGE_END
STEP 1 QUERY
ENTRY_BEGIN
REPLY RD DO
SECTION QUESTION
www.example.com. IN DNAME
ENTRY_END
; recursion happens here.
STEP 10 CHECK_ANSWER
ENTRY_BEGIN
MATCH all
REPLY QR RD RA AD NOERROR
SECTION QUESTION
www.example.com. IN DNAME
SECTION ANSWER
www.example.com. IN CNAME www.example.net.
www.example.com. 3600 IN RRSIG CNAME DSA 3 3600 20070926134150 20070829134150 2854 example.com. MC0CFGcJxnNxpWCBzXejiSdl4p1BKRMnAhUApoJrugVBRwFgAoYAhhqlZFac7fE= ;{id = 2854}
www.example.net. IN DNAME blarg.com.
www.example.net. 3600 IN RRSIG DNAME RSASHA1 3 3600 20070926134150 20070829134150 30899 example.net. ByevtOI1ChCDb8CD8Qvu2pNcooUWN4LkNXQj0vzSLp62rCltiWWTg8iU6DiojeOx2inVqx+PZXyiX1nX80kCgg== ;{id = 30899}
SECTION AUTHORITY
SECTION ADDITIONAL
ENTRY_END
SCENARIO_END
dnssecjava-1.1.3/src/test/resources/unbound/val_cnametodnametocnametopos.rpl 0000664 0000000 0000000 00000036316 13020541473 0027547 0 ustar 00root root 0000000 0000000 ; config options
; The island of trust is at example.com
server:
trust-anchor: "example.com. 3600 IN DS 2854 3 1 46e4ffc6e9a4793b488954bd3f0cc6af0dfb201b"
trust-anchor: "example.net. 3600 IN DNSKEY 256 3 5 AQPQ41chR9DEHt/aIzIFAqanbDlRflJoRs5yz1jFsoRIT7dWf0r+PeDuewdxkszNH6wnU4QL8pfKFRh5PIYVBLK3 ;{id = 30899 (zsk), size = 512b}"
trust-anchor: "example.org. 3600 IN DNSKEY 256 3 3 ALXLUsWqUrY3JYER3T4TBJIIs70j+sDS/UT2QRp61SE7S3EEXopNXoFE73JLRmvpi/UrOO/Vz4Se6wXv/CYCKjGw06U4WRgRYXcpEhJROyNapmdIKSxhOzfLVE1gqA0PweZR8dtY3aNQSRn3sPpwJr6Mi/PqQKAMMrZ9ckJpf1+bQMOOvxgzz2U1GS18b3yZKcgTMEaJzd/GZYzi/BN2DzQ0MsrSwYXfsNLFOBbs8PJMW4LYIxeeOe6rUgkWOF7CC9Dh/dduQ1QrsJhmZAEFfd6ByYV+ ;{id = 2854 (zsk), size = 1688b}"
val-override-date: "20070916134226"
target-fetch-policy: "0 0 0 0 0"
stub-zone:
name: "."
stub-addr: 193.0.14.129 # K.ROOT-SERVERS.NET.
CONFIG_END
SCENARIO_BEGIN Test validator with cname, dname, cname, positive answer
; K.ROOT-SERVERS.NET.
RANGE_BEGIN 0 100
ADDRESS 193.0.14.129
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
. IN NS
SECTION ANSWER
. IN NS K.ROOT-SERVERS.NET.
SECTION ADDITIONAL
K.ROOT-SERVERS.NET. IN A 193.0.14.129
ENTRY_END
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
www.example.com. IN A
SECTION AUTHORITY
com. IN NS a.gtld-servers.net.
SECTION ADDITIONAL
a.gtld-servers.net. IN A 192.5.6.30
ENTRY_END
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
www.sub.example.net. IN A
SECTION AUTHORITY
net. IN NS a.gtld-servers.net.
SECTION ADDITIONAL
a.gtld-servers.net. IN A 192.5.6.30
ENTRY_END
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
www.example.org. IN A
SECTION AUTHORITY
org. IN NS a.gtld-servers.net.
SECTION ADDITIONAL
a.gtld-servers.net. IN A 192.5.6.30
ENTRY_END
RANGE_END
; a.gtld-servers.net.
RANGE_BEGIN 0 100
ADDRESS 192.5.6.30
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
com. IN NS
SECTION ANSWER
com. IN NS a.gtld-servers.net.
SECTION ADDITIONAL
a.gtld-servers.net. IN A 192.5.6.30
ENTRY_END
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
net. IN NS
SECTION ANSWER
net. IN NS a.gtld-servers.net.
SECTION ADDITIONAL
a.gtld-servers.net. IN A 192.5.6.30
ENTRY_END
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
org. IN NS
SECTION ANSWER
org. IN NS a.gtld-servers.net.
SECTION ADDITIONAL
a.gtld-servers.net. IN A 192.5.6.30
ENTRY_END
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
www.example.com. IN A
SECTION AUTHORITY
example.com. IN NS ns.example.com.
SECTION ADDITIONAL
ns.example.com. IN A 1.2.3.4
ENTRY_END
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
www.sub.example.net. IN A
SECTION AUTHORITY
example.net. IN NS ns.example.net.
SECTION ADDITIONAL
ns.example.net. IN A 1.2.3.5
ENTRY_END
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
www.example.org. IN A
SECTION AUTHORITY
example.org. IN NS ns.example.org.
SECTION ADDITIONAL
ns.example.org. IN A 1.2.3.7
ENTRY_END
RANGE_END
; ns.example.com.
RANGE_BEGIN 0 100
ADDRESS 1.2.3.4
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
example.com. IN NS
SECTION ANSWER
example.com. IN NS ns.example.com.
example.com. 3600 IN RRSIG NS 3 2 3600 20070926134150 20070829134150 2854 example.com. MC0CFQCN+qHdJxoI/2tNKwsb08pra/G7aAIUAWA5sDdJTbrXA1/3OaesGBAO3sI= ;{id = 2854}
SECTION ADDITIONAL
ns.example.com. IN A 1.2.3.4
ns.example.com. 3600 IN RRSIG A 3 3 3600 20070926135752 20070829135752 2854 example.com. MC0CFQCMSWxVehgOQLoYclB9PIAbNP229AIUeH0vNNGJhjnZiqgIOKvs1EhzqAo= ;{id = 2854}
ENTRY_END
; response to DNSKEY priming query
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
example.com. IN DNSKEY
SECTION ANSWER
example.com. 3600 IN DNSKEY 256 3 3 ALXLUsWqUrY3JYER3T4TBJII s70j+sDS/UT2QRp61SE7S3E EXopNXoFE73JLRmvpi/UrOO/Vz4Se 6wXv/CYCKjGw06U4WRgR YXcpEhJROyNapmdIKSx hOzfLVE1gqA0PweZR8d tY3aNQSRn3sPpwJr6Mi /PqQKAMMrZ9ckJpf1+b QMOOvxgzz2U1GS18b3y ZKcgTMEaJzd/GZYzi/B N2DzQ0MsrSwYXfsNLFO Bbs8PJMW4LYIxeeOe6rUgkWOF 7CC9Dh/dduQ1QrsJhmZAEFfd6ByYV+ ;{id = 2854 (zsk), size = 1688b}
example.com. 3600 IN RRSIG DNSKEY DSA 2 3600 20070926134150 20070829134150 2854 example.com. MCwCFBQRtlR4BEv9ohi+PGFjp+AHsJuHAhRCvz0shggvnvI88DFnBDCczHUcVA== ;{id = 2854}
SECTION AUTHORITY
example.com. IN NS ns.example.com.
example.com. 3600 IN RRSIG NS 3 2 3600 20070926134150 20070829134150 2854 example.com. MC0CFQCN+qHdJxoI/2tNKwsb08pra/G7aAIUAWA5sDdJTbrXA1/3OaesGBAO3sI= ;{id = 2854}
SECTION ADDITIONAL
ns.example.com. IN A 1.2.3.4
ns.example.com. 3600 IN RRSIG A 3 3 3600 20070926135752 20070829135752 2854 example.com. MC0CFQCMSWxVehgOQLoYclB9PIAbNP229AIUeH0vNNGJhjnZiqgIOKvs1EhzqAo= ;{id = 2854}
ENTRY_END
; response to query of interest
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
www.example.com. IN A
SECTION ANSWER
www.example.com. IN CNAME www.sub.example.net.
www.example.com. 3600 IN RRSIG CNAME 3 3 3600 20070926134150 20070829134150 2854 example.com. MC0CFEv1gOb7KEskzkJNtFKKVBxY+Hb2AhUAqKJDIZJvNl+AdzqAt+JgdvnYAF0= ;{id = 2854}
SECTION AUTHORITY
SECTION ADDITIONAL
ENTRY_END
; response for delegation to sub.example.com.
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
www.sub.example.com. IN A
SECTION ANSWER
SECTION AUTHORITY
sub.example.com. IN NS ns.sub.example.com.
sub.example.com. 3600 IN DS 30899 RSASHA1 1 f7ed618f24d5e5202927e1d27bc2e84a141cb4b3
sub.example.com. 3600 IN RRSIG DS 3 3 3600 20070926134150 20070829134150 2854 example.com. MCwCFCW3ix0GD4BSvNLWIbROCJt5DAW9AhRt/kg9kBKJ20UBUdumrBUHqnskdA== ;{id = 2854}
SECTION ADDITIONAL
ns.sub.example.com. IN A 1.2.3.6
ENTRY_END
; response for delegation to sub.example.com.
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
sub.example.com. IN DNSKEY
SECTION ANSWER
SECTION AUTHORITY
sub.example.com. IN NS ns.sub.example.com.
sub.example.com. 3600 IN DS 30899 RSASHA1 1 f7ed618f24d5e5202927e1d27bc2e84a141cb4b3
sub.example.com. 3600 IN RRSIG DS 3 3 3600 20070926134150 20070829134150 2854 example.com. MCwCFCW3ix0GD4BSvNLWIbROCJt5DAW9AhRt/kg9kBKJ20UBUdumrBUHqnskdA== ;{id = 2854}
SECTION ADDITIONAL
ns.sub.example.com. IN A 1.2.3.6
ENTRY_END
RANGE_END
; ns.example.net.
RANGE_BEGIN 0 100
ADDRESS 1.2.3.5
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
example.net. IN NS
SECTION ANSWER
example.net. IN NS ns.example.net.
example.net. 3600 IN RRSIG NS RSASHA1 2 3600 20070926134150 20070829134150 30899 example.net. E8JX0l4B+cSR5bkHQwOJy1pBmlLMTYCJ8EwfNMU/eCv0YhKwo26rHhn52FGisgv+Nwp7/NbhHqQ+kJgoZC94XA== ;{id = 30899}
SECTION ADDITIONAL
ns.example.net. IN A 1.2.3.5
ns.example.net. 3600 IN RRSIG A RSASHA1 3 3600 20070926134150 20070829134150 30899 example.net. x+tQMC9FhzT7Fcy1pM5NrOC7E8nLd7THPI3C6ie4EwL8PrxllqlR3q/DKB0d/m0qCOPcgN6HFOYURV1s4uAcsw== ;{id = 30899}
ENTRY_END
; response to DNSKEY priming query
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
example.net. IN DNSKEY
SECTION ANSWER
example.net. 3600 IN DNSKEY 256 3 5 AQPQ41chR9DEHt/aIzIFAqanbDlRflJoRs5yz1jFsoRIT7dWf0r+PeDuewdxkszNH6wnU4QL8pfKFRh5PIYVBLK3 ;{id = 30899 (zsk), size = 512b}
example.net. 3600 IN RRSIG DNSKEY RSASHA1 2 3600 20070926134150 20070829134150 30899 example.net. hiFzlQ8VoYgCuvIsfVuxC3mfJDqsTh0yc6abs5xMx5uEcIjb0dndFQx7INOM+imlzveEN73Hqp4OLFpFhsWLlw== ;{id = 30899}
SECTION AUTHORITY
example.net. IN NS ns.example.net.
example.net. 3600 IN RRSIG NS RSASHA1 2 3600 20070926134150 20070829134150 30899 example.net. E8JX0l4B+cSR5bkHQwOJy1pBmlLMTYCJ8EwfNMU/eCv0YhKwo26rHhn52FGisgv+Nwp7/NbhHqQ+kJgoZC94XA== ;{id = 30899}
SECTION ADDITIONAL
ns.example.net. IN A 1.2.3.5
ns.example.net. 3600 IN RRSIG A RSASHA1 3 3600 20070926134150 20070829134150 30899 example.net. x+tQMC9FhzT7Fcy1pM5NrOC7E8nLd7THPI3C6ie4EwL8PrxllqlR3q/DKB0d/m0qCOPcgN6HFOYURV1s4uAcsw== ;{id = 30899}
ENTRY_END
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
sub.example.net. IN DS
SECTION ANSWER
SECTION AUTHORITY
sub.example.net. IN NSEC www.example.net. DNAME RRSIG NSEC
sub.example.net. 3600 IN RRSIG NSEC 5 3 3600 20070926134150 20070829134150 30899 example.net. PsKlcOSNElUi3u7Cn6c5+Sv8CRLTqmooMbvloTwUCkM53SuAirXcCA+9Pz5y0unO9+5IxwdkwssnoCOX5FqnCQ== ;{id = 30899}
SECTION ADDITIONAL
ENTRY_END
; response to query of interest
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
www.sub.example.net. IN A
SECTION ANSWER
sub.example.net. IN DNAME sub.example.com.
sub.example.net. 3600 IN RRSIG DNAME 5 3 3600 20070926134150 20070829134150 30899 example.net. G/UmcL1VmCF2mjB1O9IeNM2DnvayxEy6vOrvA+Ic/Gqcsgnq/f4VTCV9soQQIAWEir2v5Vt8hqPDP8rCRbMnyA== ;{id = 30899}
www.sub.example.net. IN CNAME www.sub.example.com.
SECTION AUTHORITY
SECTION ADDITIONAL
ENTRY_END
RANGE_END
; ns.sub.example.com.
RANGE_BEGIN 0 100
ADDRESS 1.2.3.6
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
sub.example.com. IN NS
SECTION ANSWER
sub.example.com. IN NS ns.sub.example.com.
sub.example.com. 3600 IN RRSIG NS 5 3 3600 20070926134150 20070829134150 30899 sub.example.com. wcpHeBILHfo8C9uxMhcW03gcURZeUffiKdSTb50ZjzTHgMNhRyMfpcvSpXEd9548A9UTmWKeLZChfr5Z/glONw== ;{id = 30899}
SECTION ADDITIONAL
ns.sub.example.com. IN A 1.2.3.6
ns.sub.example.com. 3600 IN RRSIG A 5 4 3600 20070926134150 20070829134150 30899 sub.example.com. UF7shD/gt1FOp2UHgLTNbPzVykklSXFMEtJ1xD+Hholwf/PIzd7zoaIttIYibNa4fUXCqMg22H9P7MRhfmFe6g== ;{id = 30899}
ENTRY_END
; response to DNSKEY priming query
; sub.example.com. 3600 IN DS 30899 RSASHA1 1 f7ed618f24d5e5202927e1d27bc2e84a141cb4b3
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
sub.example.com. IN DNSKEY
SECTION ANSWER
sub.example.com. 3600 IN DNSKEY 256 3 5 AQPQ41chR9DEHt/aIzIFAqanbDlRflJoRs5yz1jFsoRIT7dWf0r+PeDuewdxkszNH6wnU4QL8pfKFRh5PIYVBLK3 ;{id = 30899 (zsk), size = 512b}
sub.example.com. 3600 IN RRSIG DNSKEY 5 3 3600 20070926134150 20070829134150 30899 sub.example.com. uNGp99iznjD7oOX02XnQbDnbg75UwBHRvZSKYUorTKvPUnCWMHKdRsQ+mf+Fx3GZ+Fz9BVjoCmQqpnfgXLEYqw== ;{id = 30899}
SECTION AUTHORITY
sub.example.com. IN NS ns.sub.example.com.
sub.example.com. 3600 IN RRSIG NS 5 3 3600 20070926134150 20070829134150 30899 sub.example.com. wcpHeBILHfo8C9uxMhcW03gcURZeUffiKdSTb50ZjzTHgMNhRyMfpcvSpXEd9548A9UTmWKeLZChfr5Z/glONw== ;{id = 30899}
SECTION ADDITIONAL
ns.sub.example.com. IN A 1.2.3.6
ns.sub.example.com. 3600 IN RRSIG A 5 4 3600 20070926134150 20070829134150 30899 sub.example.com. UF7shD/gt1FOp2UHgLTNbPzVykklSXFMEtJ1xD+Hholwf/PIzd7zoaIttIYibNa4fUXCqMg22H9P7MRhfmFe6g== ;{id = 30899}
ENTRY_END
; response to query of interest
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
www.sub.example.com. IN A
SECTION ANSWER
www.sub.example.com. IN CNAME www.example.org.
www.sub.example.com. 3600 IN RRSIG CNAME 5 4 3600 20070926134150 20070829134150 30899 sub.example.com. ZE6A4pkyeUpNCscu2oeBv/3JbbirdwUaAMgmQ/ighzacUJCC6Lh8vAL5aYDEyTk7oktb8uS7gmYan171aM9/tg== ;{id = 30899}
SECTION AUTHORITY
SECTION ADDITIONAL
ENTRY_END
RANGE_END
; ns.example.org.
RANGE_BEGIN 0 100
ADDRESS 1.2.3.7
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
example.org. IN NS
SECTION ANSWER
example.org. IN NS ns.example.org.
example.org. 3600 IN RRSIG NS 3 2 3600 20070926134150 20070829134150 2854 example.org. MCwCFAE1sQemdwqUPt4Qo+mr59a66DlFAhRV1mftIFs2YnkmIWsGtikIOJvh5A== ;{id = 2854}
SECTION ADDITIONAL
ns.example.org. IN A 1.2.3.7
ns.example.org. 3600 IN RRSIG A 3 3 3600 20070926134150 20070829134150 2854 example.org. MC0CFQC0yXaA8ywsZF+7dHukVIBFD820wQIUONbyI+UX9SDSDFmFnr+ApuTEooY= ;{id = 2854}
ENTRY_END
; response to DNSKEY priming query
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
example.org. IN DNSKEY
SECTION ANSWER
example.org. 3600 IN DNSKEY 256 3 3 ALXLUsWqUrY3JYER3T4TBJII s70j+sDS/UT2QRp61SE7S3E EXopNXoFE73JLRmvpi/UrOO/Vz4Se 6wXv/CYCKjGw06U4WRgR YXcpEhJROyNapmdIKSx hOzfLVE1gqA0PweZR8d tY3aNQSRn3sPpwJr6Mi /PqQKAMMrZ9ckJpf1+b QMOOvxgzz2U1GS18b3y ZKcgTMEaJzd/GZYzi/B N2DzQ0MsrSwYXfsNLFO Bbs8PJMW4LYIxeeOe6rUgkWOF 7CC9Dh/dduQ1QrsJhmZAEFfd6ByYV+ ;{id = 2854 (zsk), size = 1688b}
example.org. 3600 IN RRSIG DNSKEY 3 2 3600 20070926134150 20070829134150 2854 example.org. MC0CFBCSESiUl5XEht/LRecGFuX2Xad7AhUAoURP4DsIEbwMjlB955vziIB798E= ;{id = 2854}
SECTION AUTHORITY
example.org. IN NS ns.example.org.
example.org. 3600 IN RRSIG NS 3 2 3600 20070926134150 20070829134150 2854 example.org. MCwCFAE1sQemdwqUPt4Qo+mr59a66DlFAhRV1mftIFs2YnkmIWsGtikIOJvh5A== ;{id = 2854}
SECTION ADDITIONAL
ns.example.org. IN A 1.2.3.7
ns.example.org. 3600 IN RRSIG A 3 3 3600 20070926134150 20070829134150 2854 example.org. MC0CFQC0yXaA8ywsZF+7dHukVIBFD820wQIUONbyI+UX9SDSDFmFnr+ApuTEooY= ;{id = 2854}
ENTRY_END
; response to query of interest
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
www.example.org. IN A
SECTION ANSWER
www.example.org. IN A 11.11.11.11
www.example.org. 3600 IN RRSIG A 3 3 3600 20070926134150 20070829134150 2854 example.org. MC0CFB/erEAxSMqW0I51r6VQMq861B+yAhUAqJ7DPU7xHFpWJGILOQ0WW3aDGi0= ;{id = 2854}
SECTION AUTHORITY
SECTION ADDITIONAL
ENTRY_END
RANGE_END
STEP 1 QUERY
ENTRY_BEGIN
REPLY RD DO
SECTION QUESTION
www.example.com. IN A
ENTRY_END
; recursion happens here.
STEP 10 CHECK_ANSWER
ENTRY_BEGIN
MATCH all
REPLY QR RD RA AD NOERROR
SECTION QUESTION
www.example.com. IN A
SECTION ANSWER
www.example.com. 3600 IN CNAME www.sub.example.net.
www.example.com. 3600 IN RRSIG CNAME 3 3 3600 20070926134150 20070829134150 2854 example.com. MC0CFEv1gOb7KEskzkJNtFKKVBxY+Hb2AhUAqKJDIZJvNl+AdzqAt+JgdvnYAF0= ;{id = 2854}
sub.example.net. 3600 IN DNAME sub.example.com.
sub.example.net. 3600 IN RRSIG DNAME 5 3 3600 20070926134150 20070829134150 30899 example.net. G/UmcL1VmCF2mjB1O9IeNM2DnvayxEy6vOrvA+Ic/Gqcsgnq/f4VTCV9soQQIAWEir2v5Vt8hqPDP8rCRbMnyA== ;{id = 30899}
www.sub.example.net. 0 IN CNAME www.sub.example.com.
www.sub.example.com. 3600 IN CNAME www.example.org.
www.sub.example.com. 3600 IN RRSIG CNAME 5 4 3600 20070926134150 20070829134150 30899 sub.example.com. ZE6A4pkyeUpNCscu2oeBv/3JbbirdwUaAMgmQ/ighzacUJCC6Lh8vAL5aYDEyTk7oktb8uS7gmYan171aM9/tg== ;{id = 30899}
www.example.org. 3600 IN A 11.11.11.11
www.example.org. 3600 IN RRSIG A 3 3 3600 20070926134150 20070829134150 2854 example.org. MC0CFB/erEAxSMqW0I51r6VQMq861B+yAhUAqJ7DPU7xHFpWJGILOQ0WW3aDGi0= ;{id = 2854}
SECTION AUTHORITY
SECTION ADDITIONAL
ENTRY_END
SCENARIO_END
dnssecjava-1.1.3/src/test/resources/unbound/val_cnametoinsecure.rpl 0000664 0000000 0000000 00000012226 13020541473 0025636 0 ustar 00root root 0000000 0000000 ; config options
server:
trust-anchor: "example.com. 3600 IN DNSKEY 256 3 5 AQPQ41chR9DEHt/aIzIFAqanbDlRflJoRs5yz1jFsoRIT7dWf0r+PeDuewdxkszNH6wnU4QL8pfKFRh5PIYVBLK3 ;{id = 30899 (zsk), size = 512b}"
trust-anchor: "example.org. 3600 IN DNSKEY 256 3 5 AQPQ41chR9DEHt/aIzIFAqanbDlRflJoRs5yz1jFsoRIT7dWf0r+PeDuewdxkszNH6wnU4QL8pfKFRh5PIYVBLK3 ;{id = 30899 (zsk), size = 512b}"
val-override-date: "20091011000000"
forward-zone:
name: "."
forward-addr: 192.0.2.1
CONFIG_END
SCENARIO_BEGIN Test validator with CNAME to insecure NSEC or NSEC3.
RANGE_BEGIN 0 100
ADDRESS 192.0.2.1
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
example.com. IN DNSKEY
SECTION ANSWER
example.com. 3600 IN DNSKEY 256 3 5 AQPQ41chR9DEHt/aIzIFAqanbDlRflJoRs5yz1jFsoRIT7dWf0r+PeDuewdxkszNH6wnU4QL8pfKFRh5PIYVBLK3 ;{id = 30899 (zsk), size = 512b}
example.com. 3600 IN RRSIG DNSKEY 5 2 3600 20091012000000 20091010000000 30899 example.com. BeCk6+D0ysmO1+X0CjvXH55AO78C7Vxrq58C3YgO0wt2eTG/deZCiWI3bz+3OC64cICbJr5fvCfqUuJDABU/fw== ;{id = 30899}
ENTRY_END
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
www.example.com. IN AAAA
SECTION ANSWER
www.example.com. 3600 IN CNAME unsafe.example.com.
www.example.com. 3600 IN RRSIG CNAME 5 3 3600 20091012000000 20091010000000 30899 example.com. FJN0bZitZfxNQNTD1V2vcDBQ9cb4y4YGa35Ilr+VnrBiisAB9ZyrO8umvdtwzV1VPIlfFDQTJrKh5aZparLHPw== ;{id = 30899}
SECTION AUTHORITY
; really an insecure delegation, but co-hosted on the server.
unsafe.example.com. 3600 IN NSEC v.example.com. NS RRSIG NSEC
unsafe.example.com. 3600 IN RRSIG NSEC 5 3 3600 20091012000000 20091010000000 30899 example.com. Le9EsRd2MxkOGRCvGtQkXRDAob5ZJOFQlZbDvcWAh5OXVpmcwZmCHctxw/Zyi4LkNYoYCSCc8PiVRrJM3IsGrQ== ;{id = 30899}
ENTRY_END
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
unsafe.example.com. IN AAAA
SECTION ANSWER
; empty response
ENTRY_END
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
example.org. IN DNSKEY
SECTION ANSWER
example.org. 3600 IN DNSKEY 256 3 5 AQPQ41chR9DEHt/aIzIFAqanbDlRflJoRs5yz1jFsoRIT7dWf0r+PeDuewdxkszNH6wnU4QL8pfKFRh5PIYVBLK3 ;{id = 30899 (zsk), size = 512b}
example.org. 3600 IN RRSIG DNSKEY 5 2 3600 20091012000000 20091010000000 30899 example.org. rd9aoXbeaE0zyT96Z0sjN3Mz5Nz/wuRsIH1lwcjwUFmAAT7F+SjwVWeo8nGaTBd8JDSUdiL+VwotEE0I22RrnA== ;{id = 30899}
ENTRY_END
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
www.example.org. IN AAAA
SECTION ANSWER
www.example.org. 3600 IN CNAME unsafe.example.org.
www.example.org. 3600 IN RRSIG CNAME 5 3 3600 20091012000000 20091010000000 30899 example.org. ZgRbMnunAqa1K46GINIihekkI73/1PkGFSAJRn7bSTxBpLM+qiHJDU1+QgS2SjaSKHqNqbXy/eeG3qX9r9y87g== ;{id = 30899}
SECTION AUTHORITY
; really an insecure delegation, but co-hosted on the server.
; h(unsafe.example.org.) = ltchu0548v0cof8f25u2pj4mjf4shcms.
ltchu0548v0cof8f25u2pj4mjf4shcms.example.org. IN NSEC3 1 0 1 - ltchu0548v0cof8f25u2pj4mjf4shcmt NS
ltchu0548v0cof8f25u2pj4mjf4shcms.example.org. 3600 IN RRSIG NSEC3 5 3 3600 20091012000000 20091010000000 30899 example.org. yxuYgfkg8QTdB5yBMN9Up9GyKu7xjKDScqq95/tsy3lx22tLsdLD9Fojdrq7eB+K7Tr72AejmVJs44v6TmWkZw== ;{id = 30899}
ENTRY_END
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
unsafe.example.org. IN AAAA
SECTION ANSWER
; empty response
ENTRY_END
RANGE_END
; NSEC
STEP 1 QUERY
ENTRY_BEGIN
REPLY RD DO
SECTION QUESTION
www.example.com. IN AAAA
ENTRY_END
; recursion happens here.
STEP 10 CHECK_ANSWER
ENTRY_BEGIN
MATCH all
REPLY QR RD RA NOERROR
SECTION QUESTION
www.example.com. IN AAAA
SECTION ANSWER
www.example.com. 3600 IN CNAME unsafe.example.com.
www.example.com. 3600 IN RRSIG CNAME 5 3 3600 20091012000000 20091010000000 30899 example.com. FJN0bZitZfxNQNTD1V2vcDBQ9cb4y4YGa35Ilr+VnrBiisAB9ZyrO8umvdtwzV1VPIlfFDQTJrKh5aZparLHPw== ;{id = 30899}
SECTION AUTHORITY
unsafe.example.com. 3600 IN NSEC v.example.com. NS RRSIG NSEC
unsafe.example.com. 3600 IN RRSIG NSEC 5 3 3600 20091012000000 20091010000000 30899 example.com. Le9EsRd2MxkOGRCvGtQkXRDAob5ZJOFQlZbDvcWAh5OXVpmcwZmCHctxw/Zyi4LkNYoYCSCc8PiVRrJM3IsGrQ== ;{id = 30899}
ENTRY_END
; NSEC3
STEP 20 QUERY
ENTRY_BEGIN
REPLY RD DO
SECTION QUESTION
www.example.org. IN AAAA
ENTRY_END
; recursion happens here.
STEP 30 CHECK_ANSWER
ENTRY_BEGIN
MATCH all
REPLY QR RD RA NOERROR
SECTION QUESTION
www.example.org. IN AAAA
SECTION ANSWER
www.example.org. 3600 IN CNAME unsafe.example.org.
www.example.org. 3600 IN RRSIG CNAME 5 3 3600 20091012000000 20091010000000 30899 example.org. ZgRbMnunAqa1K46GINIihekkI73/1PkGFSAJRn7bSTxBpLM+qiHJDU1+QgS2SjaSKHqNqbXy/eeG3qX9r9y87g== ;{id = 30899}
SECTION AUTHORITY
ltchu0548v0cof8f25u2pj4mjf4shcms.example.org. 3600 IN NSEC3 1 0 1 - ltchu0548v0cof8f25u2pj4mjf4shcmt NS
ltchu0548v0cof8f25u2pj4mjf4shcms.example.org. 3600 IN RRSIG NSEC3 5 3 3600 20091012000000 20091010000000 30899 example.org. yxuYgfkg8QTdB5yBMN9Up9GyKu7xjKDScqq95/tsy3lx22tLsdLD9Fojdrq7eB+K7Tr72AejmVJs44v6TmWkZw== ;{id = 30899}
ENTRY_END
SCENARIO_END
dnssecjava-1.1.3/src/test/resources/unbound/val_cnametonodata.rpl 0000664 0000000 0000000 00000016652 13020541473 0025276 0 ustar 00root root 0000000 0000000 ; config options
; The island of trust is at example.com
server:
trust-anchor: "example.com. 3600 IN DS 2854 3 1 46e4ffc6e9a4793b488954bd3f0cc6af0dfb201b"
trust-anchor: "example.net. 3600 IN DNSKEY 256 3 5 AQPQ41chR9DEHt/aIzIFAqanbDlRflJoRs5yz1jFsoRIT7dWf0r+PeDuewdxkszNH6wnU4QL8pfKFRh5PIYVBLK3 ;{id = 30899 (zsk), size = 512b}"
val-override-date: "20070916134226"
target-fetch-policy: "0 0 0 0 0"
stub-zone:
name: "."
stub-addr: 193.0.14.129 # K.ROOT-SERVERS.NET.
CONFIG_END
SCENARIO_BEGIN Test validator with cname to nodata
; K.ROOT-SERVERS.NET.
RANGE_BEGIN 0 100
ADDRESS 193.0.14.129
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
. IN NS
SECTION ANSWER
. IN NS K.ROOT-SERVERS.NET.
SECTION ADDITIONAL
K.ROOT-SERVERS.NET. IN A 193.0.14.129
ENTRY_END
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
www.example.com. IN A
SECTION AUTHORITY
com. IN NS a.gtld-servers.net.
SECTION ADDITIONAL
a.gtld-servers.net. IN A 192.5.6.30
ENTRY_END
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
www.example.net. IN A
SECTION AUTHORITY
net. IN NS a.gtld-servers.net.
SECTION ADDITIONAL
a.gtld-servers.net. IN A 192.5.6.30
ENTRY_END
RANGE_END
; a.gtld-servers.net.
RANGE_BEGIN 0 100
ADDRESS 192.5.6.30
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
com. IN NS
SECTION ANSWER
com. IN NS a.gtld-servers.net.
SECTION ADDITIONAL
a.gtld-servers.net. IN A 192.5.6.30
ENTRY_END
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
net. IN NS
SECTION ANSWER
net. IN NS a.gtld-servers.net.
SECTION ADDITIONAL
a.gtld-servers.net. IN A 192.5.6.30
ENTRY_END
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
www.example.com. IN A
SECTION AUTHORITY
example.com. IN NS ns.example.com.
SECTION ADDITIONAL
ns.example.com. IN A 1.2.3.4
ENTRY_END
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
www.example.net. IN A
SECTION AUTHORITY
example.net. IN NS ns.example.net.
SECTION ADDITIONAL
ns.example.net. IN A 1.2.3.5
ENTRY_END
RANGE_END
; ns.example.com.
RANGE_BEGIN 0 100
ADDRESS 1.2.3.4
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
example.com. IN NS
SECTION ANSWER
example.com. IN NS ns.example.com.
example.com. 3600 IN RRSIG NS 3 2 3600 20070926134150 20070829134150 2854 example.com. MC0CFQCN+qHdJxoI/2tNKwsb08pra/G7aAIUAWA5sDdJTbrXA1/3OaesGBAO3sI= ;{id = 2854}
SECTION ADDITIONAL
ns.example.com. IN A 1.2.3.4
ns.example.com. 3600 IN RRSIG A 3 3 3600 20070926135752 20070829135752 2854 example.com. MC0CFQCMSWxVehgOQLoYclB9PIAbNP229AIUeH0vNNGJhjnZiqgIOKvs1EhzqAo= ;{id = 2854}
ENTRY_END
; response to DNSKEY priming query
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
example.com. IN DNSKEY
SECTION ANSWER
example.com. 3600 IN DNSKEY 256 3 3 ALXLUsWqUrY3JYER3T4TBJII s70j+sDS/UT2QRp61SE7S3E EXopNXoFE73JLRmvpi/UrOO/Vz4Se 6wXv/CYCKjGw06U4WRgR YXcpEhJROyNapmdIKSx hOzfLVE1gqA0PweZR8d tY3aNQSRn3sPpwJr6Mi /PqQKAMMrZ9ckJpf1+b QMOOvxgzz2U1GS18b3y ZKcgTMEaJzd/GZYzi/B N2DzQ0MsrSwYXfsNLFO Bbs8PJMW4LYIxeeOe6rUgkWOF 7CC9Dh/dduQ1QrsJhmZAEFfd6ByYV+ ;{id = 2854 (zsk), size = 1688b}
example.com. 3600 IN RRSIG DNSKEY DSA 2 3600 20070926134150 20070829134150 2854 example.com. MCwCFBQRtlR4BEv9ohi+PGFjp+AHsJuHAhRCvz0shggvnvI88DFnBDCczHUcVA== ;{id = 2854}
SECTION AUTHORITY
example.com. IN NS ns.example.com.
example.com. 3600 IN RRSIG NS 3 2 3600 20070926134150 20070829134150 2854 example.com. MC0CFQCN+qHdJxoI/2tNKwsb08pra/G7aAIUAWA5sDdJTbrXA1/3OaesGBAO3sI= ;{id = 2854}
SECTION ADDITIONAL
ns.example.com. IN A 1.2.3.4
ns.example.com. 3600 IN RRSIG A 3 3 3600 20070926135752 20070829135752 2854 example.com. MC0CFQCMSWxVehgOQLoYclB9PIAbNP229AIUeH0vNNGJhjnZiqgIOKvs1EhzqAo= ;{id = 2854}
ENTRY_END
; response to query of interest
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
www.example.com. IN A
SECTION ANSWER
www.example.com. 3600 IN CNAME www.example.net.
www.example.com. 3600 IN RRSIG CNAME 3 3 3600 20070926134150 20070829134150 2854 example.com. MCwCFGtYzScyRnHV8U/jOIPYwrlI9t3oAhRF0PIf+IthUR7uCWIvskWp5CfReQ== ;{id = 2854}
SECTION AUTHORITY
SECTION ADDITIONAL
ENTRY_END
RANGE_END
; ns.example.net.
RANGE_BEGIN 0 100
ADDRESS 1.2.3.5
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
example.net. IN NS
SECTION ANSWER
example.net. IN NS ns.example.net.
example.net. 3600 IN RRSIG NS RSASHA1 2 3600 20070926134150 20070829134150 30899 example.net. E8JX0l4B+cSR5bkHQwOJy1pBmlLMTYCJ8EwfNMU/eCv0YhKwo26rHhn52FGisgv+Nwp7/NbhHqQ+kJgoZC94XA== ;{id = 30899}
SECTION ADDITIONAL
ns.example.net. IN A 1.2.3.5
ns.example.net. 3600 IN RRSIG A RSASHA1 3 3600 20070926134150 20070829134150 30899 example.net. x+tQMC9FhzT7Fcy1pM5NrOC7E8nLd7THPI3C6ie4EwL8PrxllqlR3q/DKB0d/m0qCOPcgN6HFOYURV1s4uAcsw== ;{id = 30899}
ENTRY_END
; response to DNSKEY priming query
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
example.net. IN DNSKEY
SECTION ANSWER
example.net. 3600 IN DNSKEY 256 3 5 AQPQ41chR9DEHt/aIzIFAqanbDlRflJoRs5yz1jFsoRIT7dWf0r+PeDuewdxkszNH6wnU4QL8pfKFRh5PIYVBLK3 ;{id = 30899 (zsk), size = 512b}
example.net. 3600 IN RRSIG DNSKEY RSASHA1 2 3600 20070926134150 20070829134150 30899 example.net. hiFzlQ8VoYgCuvIsfVuxC3mfJDqsTh0yc6abs5xMx5uEcIjb0dndFQx7INOM+imlzveEN73Hqp4OLFpFhsWLlw== ;{id = 30899}
SECTION AUTHORITY
example.net. IN NS ns.example.net.
example.net. 3600 IN RRSIG NS RSASHA1 2 3600 20070926134150 20070829134150 30899 example.net. E8JX0l4B+cSR5bkHQwOJy1pBmlLMTYCJ8EwfNMU/eCv0YhKwo26rHhn52FGisgv+Nwp7/NbhHqQ+kJgoZC94XA== ;{id = 30899}
SECTION ADDITIONAL
ns.example.net. IN A 1.2.3.5
ns.example.net. 3600 IN RRSIG A RSASHA1 3 3600 20070926134150 20070829134150 30899 example.net. x+tQMC9FhzT7Fcy1pM5NrOC7E8nLd7THPI3C6ie4EwL8PrxllqlR3q/DKB0d/m0qCOPcgN6HFOYURV1s4uAcsw== ;{id = 30899}
ENTRY_END
; response to query of interest
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
www.example.net. IN A
SECTION ANSWER
SECTION AUTHORITY
www.example.net. IN NSEC example.net. MX NSEC RRSIG
www.example.net. 3600 IN RRSIG NSEC 5 3 3600 20070926134150 20070829134150 30899 example.net. Z+3/WKJEqhWoMOQLC7Yb1dTVGaqzmU0bZ2cH9jSfNQZiT0O37yzCNNUmMsW4gsJOh3o61iZ+hxpze3aO3aedqQ== ;{id = 30899}
SECTION ADDITIONAL
ENTRY_END
RANGE_END
STEP 1 QUERY
ENTRY_BEGIN
REPLY RD DO
SECTION QUESTION
www.example.com. IN A
ENTRY_END
; recursion happens here.
STEP 10 CHECK_ANSWER
ENTRY_BEGIN
MATCH all
REPLY QR RD RA AD NOERROR
SECTION QUESTION
www.example.com. IN A
SECTION ANSWER
www.example.com. IN CNAME www.example.net.
www.example.com. 3600 IN RRSIG CNAME 3 3 3600 20070926134150 20070829134150 2854 example.com. MCwCFGtYzScyRnHV8U/jOIPYwrlI9t3oAhRF0PIf+IthUR7uCWIvskWp5CfReQ== ;{id = 2854}
SECTION AUTHORITY
www.example.net. IN NSEC example.net. MX NSEC RRSIG
www.example.net. 3600 IN RRSIG NSEC 5 3 3600 20070926134150 20070829134150 30899 example.net. Z+3/WKJEqhWoMOQLC7Yb1dTVGaqzmU0bZ2cH9jSfNQZiT0O37yzCNNUmMsW4gsJOh3o61iZ+hxpze3aO3aedqQ== ;{id = 30899}
SECTION ADDITIONAL
ENTRY_END
SCENARIO_END
dnssecjava-1.1.3/src/test/resources/unbound/val_cnametonodata_nonsec.rpl 0000664 0000000 0000000 00000017322 13020541473 0026636 0 ustar 00root root 0000000 0000000 ; config options
; The island of trust is at example.com
server:
trust-anchor: "example.com. 3600 IN DS 2854 3 1 46e4ffc6e9a4793b488954bd3f0cc6af0dfb201b"
trust-anchor: "example.net. 3600 IN DNSKEY 256 3 5 AQPQ41chR9DEHt/aIzIFAqanbDlRflJoRs5yz1jFsoRIT7dWf0r+PeDuewdxkszNH6wnU4QL8pfKFRh5PIYVBLK3 ;{id = 30899 (zsk), size = 512b}"
val-override-date: "20070916134226"
target-fetch-policy: "0 0 0 0 0"
stub-zone:
name: "."
stub-addr: 193.0.14.129 # K.ROOT-SERVERS.NET.
CONFIG_END
SCENARIO_BEGIN Test validator with cname to nodata
; K.ROOT-SERVERS.NET.
RANGE_BEGIN 0 100
ADDRESS 193.0.14.129
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
. IN NS
SECTION ANSWER
. IN NS K.ROOT-SERVERS.NET.
SECTION ADDITIONAL
K.ROOT-SERVERS.NET. IN A 193.0.14.129
ENTRY_END
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
www.example.com. IN A
SECTION AUTHORITY
com. IN NS a.gtld-servers.net.
SECTION ADDITIONAL
a.gtld-servers.net. IN A 192.5.6.30
ENTRY_END
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
www.example.net. IN A
SECTION AUTHORITY
net. IN NS a.gtld-servers.net.
SECTION ADDITIONAL
a.gtld-servers.net. IN A 192.5.6.30
ENTRY_END
RANGE_END
; a.gtld-servers.net.
RANGE_BEGIN 0 100
ADDRESS 192.5.6.30
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
com. IN NS
SECTION ANSWER
com. IN NS a.gtld-servers.net.
SECTION ADDITIONAL
a.gtld-servers.net. IN A 192.5.6.30
ENTRY_END
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
net. IN NS
SECTION ANSWER
net. IN NS a.gtld-servers.net.
SECTION ADDITIONAL
a.gtld-servers.net. IN A 192.5.6.30
ENTRY_END
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
www.example.com. IN A
SECTION AUTHORITY
example.com. IN NS ns.example.com.
SECTION ADDITIONAL
ns.example.com. IN A 1.2.3.4
ENTRY_END
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
www.example.net. IN A
SECTION AUTHORITY
example.net. IN NS ns.example.net.
SECTION ADDITIONAL
ns.example.net. IN A 1.2.3.5
ENTRY_END
RANGE_END
; ns.example.com.
RANGE_BEGIN 0 100
ADDRESS 1.2.3.4
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
example.com. IN NS
SECTION ANSWER
example.com. IN NS ns.example.com.
example.com. 3600 IN RRSIG NS 3 2 3600 20070926134150 20070829134150 2854 example.com. MC0CFQCN+qHdJxoI/2tNKwsb08pra/G7aAIUAWA5sDdJTbrXA1/3OaesGBAO3sI= ;{id = 2854}
SECTION ADDITIONAL
ns.example.com. IN A 1.2.3.4
ns.example.com. 3600 IN RRSIG A 3 3 3600 20070926135752 20070829135752 2854 example.com. MC0CFQCMSWxVehgOQLoYclB9PIAbNP229AIUeH0vNNGJhjnZiqgIOKvs1EhzqAo= ;{id = 2854}
ENTRY_END
; response to DNSKEY priming query
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
example.com. IN DNSKEY
SECTION ANSWER
example.com. 3600 IN DNSKEY 256 3 3 ALXLUsWqUrY3JYER3T4TBJII s70j+sDS/UT2QRp61SE7S3E EXopNXoFE73JLRmvpi/UrOO/Vz4Se 6wXv/CYCKjGw06U4WRgR YXcpEhJROyNapmdIKSx hOzfLVE1gqA0PweZR8d tY3aNQSRn3sPpwJr6Mi /PqQKAMMrZ9ckJpf1+b QMOOvxgzz2U1GS18b3y ZKcgTMEaJzd/GZYzi/B N2DzQ0MsrSwYXfsNLFO Bbs8PJMW4LYIxeeOe6rUgkWOF 7CC9Dh/dduQ1QrsJhmZAEFfd6ByYV+ ;{id = 2854 (zsk), size = 1688b}
example.com. 3600 IN RRSIG DNSKEY DSA 2 3600 20070926134150 20070829134150 2854 example.com. MCwCFBQRtlR4BEv9ohi+PGFjp+AHsJuHAhRCvz0shggvnvI88DFnBDCczHUcVA== ;{id = 2854}
SECTION AUTHORITY
example.com. IN NS ns.example.com.
example.com. 3600 IN RRSIG NS 3 2 3600 20070926134150 20070829134150 2854 example.com. MC0CFQCN+qHdJxoI/2tNKwsb08pra/G7aAIUAWA5sDdJTbrXA1/3OaesGBAO3sI= ;{id = 2854}
SECTION ADDITIONAL
ns.example.com. IN A 1.2.3.4
ns.example.com. 3600 IN RRSIG A 3 3 3600 20070926135752 20070829135752 2854 example.com. MC0CFQCMSWxVehgOQLoYclB9PIAbNP229AIUeH0vNNGJhjnZiqgIOKvs1EhzqAo= ;{id = 2854}
ENTRY_END
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
ns.example.com. IN AAAA
SECTION ANSWER
SECTION AUTHORITY
; NSEC here ...
SECTION ADDITIONAL
ENTRY_END
; response to query of interest
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
www.example.com. IN A
SECTION ANSWER
www.example.com. 3600 IN CNAME www.example.net.
www.example.com. 3600 IN RRSIG CNAME 3 3 3600 20070926134150 20070829134150 2854 example.com. MCwCFGtYzScyRnHV8U/jOIPYwrlI9t3oAhRF0PIf+IthUR7uCWIvskWp5CfReQ== ;{id = 2854}
SECTION AUTHORITY
SECTION ADDITIONAL
ENTRY_END
RANGE_END
; ns.example.net.
RANGE_BEGIN 0 100
ADDRESS 1.2.3.5
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
example.net. IN NS
SECTION ANSWER
example.net. IN NS ns.example.net.
example.net. 3600 IN RRSIG NS RSASHA1 2 3600 20070926134150 20070829134150 30899 example.net. E8JX0l4B+cSR5bkHQwOJy1pBmlLMTYCJ8EwfNMU/eCv0YhKwo26rHhn52FGisgv+Nwp7/NbhHqQ+kJgoZC94XA== ;{id = 30899}
SECTION ADDITIONAL
ns.example.net. IN A 1.2.3.5
ns.example.net. 3600 IN RRSIG A RSASHA1 3 3600 20070926134150 20070829134150 30899 example.net. x+tQMC9FhzT7Fcy1pM5NrOC7E8nLd7THPI3C6ie4EwL8PrxllqlR3q/DKB0d/m0qCOPcgN6HFOYURV1s4uAcsw== ;{id = 30899}
ENTRY_END
; response to DNSKEY priming query
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
example.net. IN DNSKEY
SECTION ANSWER
example.net. 3600 IN DNSKEY 256 3 5 AQPQ41chR9DEHt/aIzIFAqanbDlRflJoRs5yz1jFsoRIT7dWf0r+PeDuewdxkszNH6wnU4QL8pfKFRh5PIYVBLK3 ;{id = 30899 (zsk), size = 512b}
example.net. 3600 IN RRSIG DNSKEY RSASHA1 2 3600 20070926134150 20070829134150 30899 example.net. hiFzlQ8VoYgCuvIsfVuxC3mfJDqsTh0yc6abs5xMx5uEcIjb0dndFQx7INOM+imlzveEN73Hqp4OLFpFhsWLlw== ;{id = 30899}
SECTION AUTHORITY
example.net. IN NS ns.example.net.
example.net. 3600 IN RRSIG NS RSASHA1 2 3600 20070926134150 20070829134150 30899 example.net. E8JX0l4B+cSR5bkHQwOJy1pBmlLMTYCJ8EwfNMU/eCv0YhKwo26rHhn52FGisgv+Nwp7/NbhHqQ+kJgoZC94XA== ;{id = 30899}
SECTION ADDITIONAL
ns.example.net. IN A 1.2.3.5
ns.example.net. 3600 IN RRSIG A RSASHA1 3 3600 20070926134150 20070829134150 30899 example.net. x+tQMC9FhzT7Fcy1pM5NrOC7E8nLd7THPI3C6ie4EwL8PrxllqlR3q/DKB0d/m0qCOPcgN6HFOYURV1s4uAcsw== ;{id = 30899}
ENTRY_END
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
ns.example.net. IN AAAA
SECTION ANSWER
SECTION AUTHORITY
; NSEC here
SECTION ADDITIONAL
ENTRY_END
; response to query of interest
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
www.example.net. IN A
SECTION ANSWER
SECTION AUTHORITY
;www.example.net. IN NSEC example.net. MX NSEC RRSIG
;www.example.net. 3600 IN RRSIG NSEC 5 3 3600 20070926134150 20070829134150 30899 example.net. Z+3/WKJEqhWoMOQLC7Yb1dTVGaqzmU0bZ2cH9jSfNQZiT0O37yzCNNUmMsW4gsJOh3o61iZ+hxpze3aO3aedqQ== ;{id = 30899}
SECTION ADDITIONAL
ENTRY_END
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
www.example.net. IN DS
SECTION ANSWER
SECTION AUTHORITY
www.example.net. IN NSEC example.net. MX NSEC RRSIG
www.example.net. 3600 IN RRSIG NSEC 5 3 3600 20070926134150 20070829134150 30899 example.net. Z+3/WKJEqhWoMOQLC7Yb1dTVGaqzmU0bZ2cH9jSfNQZiT0O37yzCNNUmMsW4gsJOh3o61iZ+hxpze3aO3aedqQ== ;{id = 30899}
SECTION ADDITIONAL
ENTRY_END
RANGE_END
STEP 1 QUERY
ENTRY_BEGIN
REPLY RD DO
SECTION QUESTION
www.example.com. IN A
ENTRY_END
; recursion happens here.
STEP 10 CHECK_ANSWER
ENTRY_BEGIN
MATCH all
REPLY QR RD RA SERVFAIL
SECTION QUESTION
www.example.com. IN A
SECTION ANSWER
SECTION ADDITIONAL
ENTRY_END
SCENARIO_END
dnssecjava-1.1.3/src/test/resources/unbound/val_cnametonsec.rpl 0000664 0000000 0000000 00000011365 13020541473 0024754 0 ustar 00root root 0000000 0000000 ; config options
; The island of trust is at example.com
server:
trust-anchor: "example.com. 3600 IN DS 2854 3 1 46e4ffc6e9a4793b488954bd3f0cc6af0dfb201b"
val-override-date: "20070916134226"
target-fetch-policy: "0 0 0 0 0"
stub-zone:
name: "."
stub-addr: 193.0.14.129 # K.ROOT-SERVERS.NET.
CONFIG_END
SCENARIO_BEGIN Test validator with CNAME to insecure NSEC delegation
; K.ROOT-SERVERS.NET.
RANGE_BEGIN 0 100
ADDRESS 193.0.14.129
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
. IN NS
SECTION ANSWER
. IN NS K.ROOT-SERVERS.NET.
SECTION ADDITIONAL
K.ROOT-SERVERS.NET. IN A 193.0.14.129
ENTRY_END
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
www.example.com. IN A
SECTION AUTHORITY
com. IN NS a.gtld-servers.net.
SECTION ADDITIONAL
a.gtld-servers.net. IN A 192.5.6.30
ENTRY_END
RANGE_END
; a.gtld-servers.net.
RANGE_BEGIN 0 100
ADDRESS 192.5.6.30
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
com. IN NS
SECTION ANSWER
com. IN NS a.gtld-servers.net.
SECTION ADDITIONAL
a.gtld-servers.net. IN A 192.5.6.30
ENTRY_END
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
www.example.com. IN A
SECTION AUTHORITY
example.com. IN NS ns.example.com.
SECTION ADDITIONAL
ns.example.com. IN A 1.2.3.4
ENTRY_END
RANGE_END
; ns.example.com.
RANGE_BEGIN 0 100
ADDRESS 1.2.3.4
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
example.com. IN NS
SECTION ANSWER
example.com. IN NS ns.example.com.
example.com. 3600 IN RRSIG NS 3 2 3600 20070926134150 20070829134150 2854 example.com. MC0CFQCN+qHdJxoI/2tNKwsb08pra/G7aAIUAWA5sDdJTbrXA1/3OaesGBAO3sI= ;{id = 2854}
SECTION ADDITIONAL
ns.example.com. IN A 1.2.3.4
ns.example.com. 3600 IN RRSIG A 3 3 3600 20070926135752 20070829135752 2854 example.com. MC0CFQCMSWxVehgOQLoYclB9PIAbNP229AIUeH0vNNGJhjnZiqgIOKvs1EhzqAo= ;{id = 2854}
ENTRY_END
; response to DNSKEY priming query
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
example.com. IN DNSKEY
SECTION ANSWER
example.com. 3600 IN DNSKEY 256 3 3 ALXLUsWqUrY3JYER3T4TBJII s70j+sDS/UT2QRp61SE7S3E EXopNXoFE73JLRmvpi/UrOO/Vz4Se 6wXv/CYCKjGw06U4WRgR YXcpEhJROyNapmdIKSx hOzfLVE1gqA0PweZR8d tY3aNQSRn3sPpwJr6Mi /PqQKAMMrZ9ckJpf1+b QMOOvxgzz2U1GS18b3y ZKcgTMEaJzd/GZYzi/B N2DzQ0MsrSwYXfsNLFO Bbs8PJMW4LYIxeeOe6rUgkWOF 7CC9Dh/dduQ1QrsJhmZAEFfd6ByYV+ ;{id = 2854 (zsk), size = 1688b}
example.com. 3600 IN RRSIG DNSKEY 3 2 3600 20070926134802 20070829134802 2854 example.com. MCwCFG1yhRNtTEa3Eno2zhVVuy2EJX3wAhQeLyUp6+UXcpC5qGNu9tkrTEgPUg== ;{id = 2854}
SECTION AUTHORITY
example.com. IN NS ns.example.com.
example.com. 3600 IN RRSIG NS 3 2 3600 20070926134150 20070829134150 2854 example.com. MC0CFQCN+qHdJxoI/2tNKwsb08pra/G7aAIUAWA5sDdJTbrXA1/3OaesGBAO3sI= ;{id = 2854}
SECTION ADDITIONAL
ns.example.com. IN A 1.2.3.4
ns.example.com. 3600 IN RRSIG A 3 3 3600 20070926135752 20070829135752 2854 example.com. MC0CFQCMSWxVehgOQLoYclB9PIAbNP229AIUeH0vNNGJhjnZiqgIOKvs1EhzqAo= ;{id = 2854}
ENTRY_END
; response to query of interest
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
www.example.com. IN A
SECTION ANSWER
www.example.com. IN CNAME www.sub.example.com.
www.example.com. 3600 IN RRSIG CNAME 3 3 3600 20070926134802 20070829134802 2854 example.com. AKvv+5rFiCFiNRbdpna4rQtyARsLltUL9lXRWgpBVB5voJNJ9g/n/f4= ;{id = 2854}
SECTION AUTHORITY
sub.example.com. IN NSEC zzz.example.com. NS
sub.example.com. 3600 IN RRSIG NSEC 3 3 3600 20070926134802 20070829134802 2854 example.com. AJPvjSrqGbe3ZBOxV9J3XyFeOqrcPfIYPIWnlmj6G+PebJdAkvwIu9o= ;{id = 2854}
SECTION ADDITIONAL
ENTRY_END
; this server also serves the zone sub.example.com.
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
www.sub.example.com. IN A
SECTION AUTHORITY
sub.example.com. IN SOA a. b. 1 2 3 4 5
ENTRY_END
RANGE_END
STEP 1 QUERY
ENTRY_BEGIN
REPLY RD DO
SECTION QUESTION
www.example.com. IN A
ENTRY_END
; recursion happens here.
STEP 10 CHECK_ANSWER
ENTRY_BEGIN
MATCH all
REPLY QR RD RA NOERROR
SECTION QUESTION
www.example.com. IN A
SECTION ANSWER
www.example.com. IN CNAME www.sub.example.com.
www.example.com. 3600 IN RRSIG CNAME 3 3 3600 20070926134802 20070829134802 2854 example.com. AKvv+5rFiCFiNRbdpna4rQtyARsLltUL9lXRWgpBVB5voJNJ9g/n/f4= ;{id = 2854}
SECTION AUTHORITY
sub.example.com. IN NSEC zzz.example.com. NS
sub.example.com. 3600 IN RRSIG NSEC 3 3 3600 20070926134802 20070829134802 2854 example.com. AJPvjSrqGbe3ZBOxV9J3XyFeOqrcPfIYPIWnlmj6G+PebJdAkvwIu9o= ;{id = 2854}
sub.example.com. IN SOA a. b. 1 2 3 4 5
ENTRY_END
SCENARIO_END
dnssecjava-1.1.3/src/test/resources/unbound/val_cnametonx.rpl 0000664 0000000 0000000 00000017716 13020541473 0024457 0 ustar 00root root 0000000 0000000 ; config options
; The island of trust is at example.com
server:
trust-anchor: "example.com. 3600 IN DS 2854 3 1 46e4ffc6e9a4793b488954bd3f0cc6af0dfb201b"
trust-anchor: "example.net. 3600 IN DNSKEY 256 3 5 AQPQ41chR9DEHt/aIzIFAqanbDlRflJoRs5yz1jFsoRIT7dWf0r+PeDuewdxkszNH6wnU4QL8pfKFRh5PIYVBLK3 ;{id = 30899 (zsk), size = 512b}"
val-override-date: "20070916134226"
target-fetch-policy: "0 0 0 0 0"
stub-zone:
name: "."
stub-addr: 193.0.14.129 # K.ROOT-SERVERS.NET.
CONFIG_END
SCENARIO_BEGIN Test validator with cname to nxdomain
; K.ROOT-SERVERS.NET.
RANGE_BEGIN 0 100
ADDRESS 193.0.14.129
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
. IN NS
SECTION ANSWER
. IN NS K.ROOT-SERVERS.NET.
SECTION ADDITIONAL
K.ROOT-SERVERS.NET. IN A 193.0.14.129
ENTRY_END
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
www.example.com. IN A
SECTION AUTHORITY
com. IN NS a.gtld-servers.net.
SECTION ADDITIONAL
a.gtld-servers.net. IN A 192.5.6.30
ENTRY_END
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
www.example.net. IN A
SECTION AUTHORITY
net. IN NS a.gtld-servers.net.
SECTION ADDITIONAL
a.gtld-servers.net. IN A 192.5.6.30
ENTRY_END
RANGE_END
; a.gtld-servers.net.
RANGE_BEGIN 0 100
ADDRESS 192.5.6.30
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
com. IN NS
SECTION ANSWER
com. IN NS a.gtld-servers.net.
SECTION ADDITIONAL
a.gtld-servers.net. IN A 192.5.6.30
ENTRY_END
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
net. IN NS
SECTION ANSWER
net. IN NS a.gtld-servers.net.
SECTION ADDITIONAL
a.gtld-servers.net. IN A 192.5.6.30
ENTRY_END
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
www.example.com. IN A
SECTION AUTHORITY
example.com. IN NS ns.example.com.
SECTION ADDITIONAL
ns.example.com. IN A 1.2.3.4
ENTRY_END
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
www.example.net. IN A
SECTION AUTHORITY
example.net. IN NS ns.example.net.
SECTION ADDITIONAL
ns.example.net. IN A 1.2.3.5
ENTRY_END
RANGE_END
; ns.example.com.
RANGE_BEGIN 0 100
ADDRESS 1.2.3.4
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
example.com. IN NS
SECTION ANSWER
example.com. IN NS ns.example.com.
example.com. 3600 IN RRSIG NS 3 2 3600 20070926134150 20070829134150 2854 example.com. MC0CFQCN+qHdJxoI/2tNKwsb08pra/G7aAIUAWA5sDdJTbrXA1/3OaesGBAO3sI= ;{id = 2854}
SECTION ADDITIONAL
ns.example.com. IN A 1.2.3.4
ns.example.com. 3600 IN RRSIG A 3 3 3600 20070926135752 20070829135752 2854 example.com. MC0CFQCMSWxVehgOQLoYclB9PIAbNP229AIUeH0vNNGJhjnZiqgIOKvs1EhzqAo= ;{id = 2854}
ENTRY_END
; response to DNSKEY priming query
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
example.com. IN DNSKEY
SECTION ANSWER
example.com. 3600 IN DNSKEY 256 3 3 ALXLUsWqUrY3JYER3T4TBJII s70j+sDS/UT2QRp61SE7S3E EXopNXoFE73JLRmvpi/UrOO/Vz4Se 6wXv/CYCKjGw06U4WRgR YXcpEhJROyNapmdIKSx hOzfLVE1gqA0PweZR8d tY3aNQSRn3sPpwJr6Mi /PqQKAMMrZ9ckJpf1+b QMOOvxgzz2U1GS18b3y ZKcgTMEaJzd/GZYzi/B N2DzQ0MsrSwYXfsNLFO Bbs8PJMW4LYIxeeOe6rUgkWOF 7CC9Dh/dduQ1QrsJhmZAEFfd6ByYV+ ;{id = 2854 (zsk), size = 1688b}
example.com. 3600 IN RRSIG DNSKEY DSA 2 3600 20070926134150 20070829134150 2854 example.com. MCwCFBQRtlR4BEv9ohi+PGFjp+AHsJuHAhRCvz0shggvnvI88DFnBDCczHUcVA== ;{id = 2854}
SECTION AUTHORITY
example.com. IN NS ns.example.com.
example.com. 3600 IN RRSIG NS 3 2 3600 20070926134150 20070829134150 2854 example.com. MC0CFQCN+qHdJxoI/2tNKwsb08pra/G7aAIUAWA5sDdJTbrXA1/3OaesGBAO3sI= ;{id = 2854}
SECTION ADDITIONAL
ns.example.com. IN A 1.2.3.4
ns.example.com. 3600 IN RRSIG A 3 3 3600 20070926135752 20070829135752 2854 example.com. MC0CFQCMSWxVehgOQLoYclB9PIAbNP229AIUeH0vNNGJhjnZiqgIOKvs1EhzqAo= ;{id = 2854}
ENTRY_END
; response to query of interest
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
www.example.com. IN A
SECTION ANSWER
www.example.com. 3600 IN CNAME www.example.net.
www.example.com. 3600 IN RRSIG CNAME 3 3 3600 20070926134150 20070829134150 2854 example.com. MCwCFGtYzScyRnHV8U/jOIPYwrlI9t3oAhRF0PIf+IthUR7uCWIvskWp5CfReQ== ;{id = 2854}
SECTION AUTHORITY
SECTION ADDITIONAL
ENTRY_END
RANGE_END
; ns.example.net.
RANGE_BEGIN 0 100
ADDRESS 1.2.3.5
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
example.net. IN NS
SECTION ANSWER
example.net. IN NS ns.example.net.
example.net. 3600 IN RRSIG NS RSASHA1 2 3600 20070926134150 20070829134150 30899 example.net. E8JX0l4B+cSR5bkHQwOJy1pBmlLMTYCJ8EwfNMU/eCv0YhKwo26rHhn52FGisgv+Nwp7/NbhHqQ+kJgoZC94XA== ;{id = 30899}
SECTION ADDITIONAL
ns.example.net. IN A 1.2.3.5
ns.example.net. 3600 IN RRSIG A RSASHA1 3 3600 20070926134150 20070829134150 30899 example.net. x+tQMC9FhzT7Fcy1pM5NrOC7E8nLd7THPI3C6ie4EwL8PrxllqlR3q/DKB0d/m0qCOPcgN6HFOYURV1s4uAcsw== ;{id = 30899}
ENTRY_END
; response to DNSKEY priming query
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
example.net. IN DNSKEY
SECTION ANSWER
example.net. 3600 IN DNSKEY 256 3 5 AQPQ41chR9DEHt/aIzIFAqanbDlRflJoRs5yz1jFsoRIT7dWf0r+PeDuewdxkszNH6wnU4QL8pfKFRh5PIYVBLK3 ;{id = 30899 (zsk), size = 512b}
example.net. 3600 IN RRSIG DNSKEY RSASHA1 2 3600 20070926134150 20070829134150 30899 example.net. hiFzlQ8VoYgCuvIsfVuxC3mfJDqsTh0yc6abs5xMx5uEcIjb0dndFQx7INOM+imlzveEN73Hqp4OLFpFhsWLlw== ;{id = 30899}
SECTION AUTHORITY
example.net. IN NS ns.example.net.
example.net. 3600 IN RRSIG NS RSASHA1 2 3600 20070926134150 20070829134150 30899 example.net. E8JX0l4B+cSR5bkHQwOJy1pBmlLMTYCJ8EwfNMU/eCv0YhKwo26rHhn52FGisgv+Nwp7/NbhHqQ+kJgoZC94XA== ;{id = 30899}
SECTION ADDITIONAL
ns.example.net. IN A 1.2.3.5
ns.example.net. 3600 IN RRSIG A RSASHA1 3 3600 20070926134150 20070829134150 30899 example.net. x+tQMC9FhzT7Fcy1pM5NrOC7E8nLd7THPI3C6ie4EwL8PrxllqlR3q/DKB0d/m0qCOPcgN6HFOYURV1s4uAcsw== ;{id = 30899}
ENTRY_END
; response to query of interest
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NXDOMAIN
SECTION QUESTION
www.example.net. IN A
SECTION ANSWER
SECTION AUTHORITY
example.net. IN NSEC abc.example.net. SOA NS DNSKEY NSEC RRSIG
example.net. 3600 IN RRSIG NSEC 5 2 3600 20070926134150 20070829134150 30899 example.net. SEHthmjHyqGlzaOp3Dx6Jn5Fnvvtknw/IF6YSFY8NZLe+YSh1oRJbdEkQ8G92IT08n1jSN6jvKRsFBOUoFOQAw== ;{id = 30899}
wab.example.net. IN NSEC wzz.example.net. A NSEC RRSIG
wab.example.net. 3600 IN RRSIG NSEC 5 3 3600 20070926134150 20070829134150 30899 example.net. gl8vkI3xfSWx4Pyv5OdOthiewE6u/13kclY7UG9ptuFBddamdJO3RQqyxM6Xcmq+ToO4kMCCyaKijp01gTDoGg== ;{id = 30899}
SECTION ADDITIONAL
ENTRY_END
RANGE_END
STEP 1 QUERY
ENTRY_BEGIN
REPLY RD DO
SECTION QUESTION
www.example.com. IN A
ENTRY_END
; recursion happens here.
STEP 10 CHECK_ANSWER
ENTRY_BEGIN
MATCH all
REPLY QR RD RA AD NXDOMAIN
SECTION QUESTION
www.example.com. IN A
SECTION ANSWER
www.example.com. IN CNAME www.example.net.
www.example.com. 3600 IN RRSIG CNAME 3 3 3600 20070926134150 20070829134150 2854 example.com. MCwCFGtYzScyRnHV8U/jOIPYwrlI9t3oAhRF0PIf+IthUR7uCWIvskWp5CfReQ== ;{id = 2854}
SECTION AUTHORITY
example.net. IN NSEC abc.example.net. SOA NS DNSKEY NSEC RRSIG
example.net. 3600 IN RRSIG NSEC 5 2 3600 20070926134150 20070829134150 30899 example.net. SEHthmjHyqGlzaOp3Dx6Jn5Fnvvtknw/IF6YSFY8NZLe+YSh1oRJbdEkQ8G92IT08n1jSN6jvKRsFBOUoFOQAw== ;{id = 30899}
wab.example.net. IN NSEC wzz.example.net. A NSEC RRSIG
wab.example.net. 3600 IN RRSIG NSEC 5 3 3600 20070926134150 20070829134150 30899 example.net. gl8vkI3xfSWx4Pyv5OdOthiewE6u/13kclY7UG9ptuFBddamdJO3RQqyxM6Xcmq+ToO4kMCCyaKijp01gTDoGg== ;{id = 30899}
SECTION ADDITIONAL
ENTRY_END
SCENARIO_END
dnssecjava-1.1.3/src/test/resources/unbound/val_cnametooptin.rpl 0000664 0000000 0000000 00000012122 13020541473 0025145 0 ustar 00root root 0000000 0000000 ; config options
; The island of trust is at example.com
server:
trust-anchor: "example.com. 3600 IN DS 2854 3 1 46e4ffc6e9a4793b488954bd3f0cc6af0dfb201b"
val-override-date: "20070916134226"
target-fetch-policy: "0 0 0 0 0"
stub-zone:
name: "."
stub-addr: 193.0.14.129 # K.ROOT-SERVERS.NET.
CONFIG_END
SCENARIO_BEGIN Test validator with CNAME to insecure optin NSEC3
; K.ROOT-SERVERS.NET.
RANGE_BEGIN 0 100
ADDRESS 193.0.14.129
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
. IN NS
SECTION ANSWER
. IN NS K.ROOT-SERVERS.NET.
SECTION ADDITIONAL
K.ROOT-SERVERS.NET. IN A 193.0.14.129
ENTRY_END
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
www.example.com. IN A
SECTION AUTHORITY
com. IN NS a.gtld-servers.net.
SECTION ADDITIONAL
a.gtld-servers.net. IN A 192.5.6.30
ENTRY_END
RANGE_END
; a.gtld-servers.net.
RANGE_BEGIN 0 100
ADDRESS 192.5.6.30
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
com. IN NS
SECTION ANSWER
com. IN NS a.gtld-servers.net.
SECTION ADDITIONAL
a.gtld-servers.net. IN A 192.5.6.30
ENTRY_END
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
www.example.com. IN A
SECTION AUTHORITY
example.com. IN NS ns.example.com.
SECTION ADDITIONAL
ns.example.com. IN A 1.2.3.4
ENTRY_END
RANGE_END
; ns.example.com.
RANGE_BEGIN 0 100
ADDRESS 1.2.3.4
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
example.com. IN NS
SECTION ANSWER
example.com. IN NS ns.example.com.
example.com. 3600 IN RRSIG NS 3 2 3600 20070926134150 20070829134150 2854 example.com. MC0CFQCN+qHdJxoI/2tNKwsb08pra/G7aAIUAWA5sDdJTbrXA1/3OaesGBAO3sI= ;{id = 2854}
SECTION ADDITIONAL
ns.example.com. IN A 1.2.3.4
ns.example.com. 3600 IN RRSIG A 3 3 3600 20070926135752 20070829135752 2854 example.com. MC0CFQCMSWxVehgOQLoYclB9PIAbNP229AIUeH0vNNGJhjnZiqgIOKvs1EhzqAo= ;{id = 2854}
ENTRY_END
; response to DNSKEY priming query
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
example.com. IN DNSKEY
SECTION ANSWER
example.com. 3600 IN DNSKEY 256 3 3 ALXLUsWqUrY3JYER3T4TBJII s70j+sDS/UT2QRp61SE7S3E EXopNXoFE73JLRmvpi/UrOO/Vz4Se 6wXv/CYCKjGw06U4WRgR YXcpEhJROyNapmdIKSx hOzfLVE1gqA0PweZR8d tY3aNQSRn3sPpwJr6Mi /PqQKAMMrZ9ckJpf1+b QMOOvxgzz2U1GS18b3y ZKcgTMEaJzd/GZYzi/B N2DzQ0MsrSwYXfsNLFO Bbs8PJMW4LYIxeeOe6rUgkWOF 7CC9Dh/dduQ1QrsJhmZAEFfd6ByYV+ ;{id = 2854 (zsk), size = 1688b}
example.com. 3600 IN RRSIG DNSKEY 3 2 3600 20070926134802 20070829134802 2854 example.com. MCwCFG1yhRNtTEa3Eno2zhVVuy2EJX3wAhQeLyUp6+UXcpC5qGNu9tkrTEgPUg== ;{id = 2854}
SECTION AUTHORITY
example.com. IN NS ns.example.com.
example.com. 3600 IN RRSIG NS 3 2 3600 20070926134150 20070829134150 2854 example.com. MC0CFQCN+qHdJxoI/2tNKwsb08pra/G7aAIUAWA5sDdJTbrXA1/3OaesGBAO3sI= ;{id = 2854}
SECTION ADDITIONAL
ns.example.com. IN A 1.2.3.4
ns.example.com. 3600 IN RRSIG A 3 3 3600 20070926135752 20070829135752 2854 example.com. MC0CFQCMSWxVehgOQLoYclB9PIAbNP229AIUeH0vNNGJhjnZiqgIOKvs1EhzqAo= ;{id = 2854}
ENTRY_END
; response to query of interest
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
www.example.com. IN A
SECTION ANSWER
www.example.com. IN CNAME www.sub.example.com.
www.example.com. 3600 IN RRSIG CNAME 3 3 3600 20070926134802 20070829134802 2854 example.com. AKvv+5rFiCFiNRbdpna4rQtyARsLltUL9lXRWgpBVB5voJNJ9g/n/f4= ;{id = 2854}
SECTION AUTHORITY
; NSEC3PARAM 1 0 1 -
; example.com. -> 9vq38lj9qs6s1aruer131mbtsfnvek2p.
; sub.example.com. -> 7t1ect6t5vp0s7se8si9d07roqupr3gc.
; www.example.com. -> 0lverorlcjoa2lji5rik0otij3lgoj3l.
7t1ect6t5vp0s7se8si9d07roqupr3gc.example.com. IN NSEC3 1 0 1 - 7t1ect6t5vp0s7se8si9d07roqupr3gd NS
7t1ect6t5vp0s7se8si9d07roqupr3gc.example.com. 3600 IN RRSIG NSEC3 3 3 3600 20070926134802 20070829134802 2854 example.com. AIiTSxI4hTDiDzo+bMaOKSvjIyoChgjY19y2NQG/Mtt80sNbDBY126I= ;{id = 2854}
SECTION ADDITIONAL
ENTRY_END
; this server also serves the zone sub.example.com.
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
www.sub.example.com. IN A
SECTION AUTHORITY
sub.example.com. IN SOA a. b. 1 2 3 4 5
ENTRY_END
RANGE_END
STEP 1 QUERY
ENTRY_BEGIN
REPLY RD DO
SECTION QUESTION
www.example.com. IN A
ENTRY_END
; recursion happens here.
STEP 10 CHECK_ANSWER
ENTRY_BEGIN
MATCH all
REPLY QR RD RA NOERROR
SECTION QUESTION
www.example.com. IN A
SECTION ANSWER
www.example.com. IN CNAME www.sub.example.com.
www.example.com. 3600 IN RRSIG CNAME 3 3 3600 20070926134802 20070829134802 2854 example.com. AKvv+5rFiCFiNRbdpna4rQtyARsLltUL9lXRWgpBVB5voJNJ9g/n/f4= ;{id = 2854}
SECTION AUTHORITY
7t1ect6t5vp0s7se8si9d07roqupr3gc.example.com. IN NSEC3 1 0 1 - 7t1ect6t5vp0s7se8si9d07roqupr3gd NS
7t1ect6t5vp0s7se8si9d07roqupr3gc.example.com. 3600 IN RRSIG NSEC3 3 3 3600 20070926134802 20070829134802 2854 example.com. AIiTSxI4hTDiDzo+bMaOKSvjIyoChgjY19y2NQG/Mtt80sNbDBY126I= ;{id = 2854}
sub.example.com. IN SOA a. b. 1 2 3 4 5
ENTRY_END
SCENARIO_END
dnssecjava-1.1.3/src/test/resources/unbound/val_cnametooptout.rpl 0000664 0000000 0000000 00000024004 13020541473 0025350 0 ustar 00root root 0000000 0000000 ; config options
server:
trust-anchor: "GOV. DS 26079 7 2 4ED5FFBC8A40262B56E1232135B929192804ACC006930D087AAB38A611C89041"
val-override-date: "20091113091234"
forward-zone:
name: "."
forward-addr: 192.0.2.1
CONFIG_END
SCENARIO_BEGIN Test validator with CNAME to optout NSEC3 span NODATA
RANGE_BEGIN 0 100
ADDRESS 192.0.2.1
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
www.hud.gov. IN AAAA
SECTION ANSWER
www.hud.gov. 86400 IN CNAME www.content.hud.gov.
www.hud.gov. 86400 IN RRSIG CNAME 7 3 86400 20091204150200 20091104150200 64775 hud.gov. taZtumaTp8eSlcj0vEGnY0Up05RtlC2NhHrtHDUdq1TskAPQH8Eu9AoVe6gKrFEyCC1ixprOhT8Ni661d/ZykdzgceZ8KgFIlSQ84Whm59yB2gcbXLen9rApF0+NuyRgdAph6yjMYMtfoRQWAASG7SqS/v52dkHNf/a9PXaDvHBvjoiTK+dXPKFulkmEl0KyhXBdsikl6/Xd68FF41FdDNzWS8ZzYCdd4CWaXXkwTtPSFsKyXGZeXOTxqGQJnD+hNBkn2sAca1oLiAsfaiCHec66I+rHGXT+mPB7HXez32jbbeInkgB7M2TUoRXehifuloR8sur8Xck9FPRv24Si8A== ;{id = 64775}
SECTION AUTHORITY
content.hud.gov. 86400 IN NS drfswitch.hud.gov.
content.hud.gov. 86400 IN NS lanswitch.hud.gov.
3RUD2HK5O5KA0IC6BF22C1T4R1BJGJ3R.hud.gov. 86400 IN NSEC3 1 1 5 abcd 42bsks495i3mb2s3f6nhusc6rfm54g4g A NS SOA MX RRSIG DNSKEY NSEC3PARAM ; flags: optout
3RUD2HK5O5KA0IC6BF22C1T4R1BJGJ3R.hud.gov. 86400 IN RRSIG NSEC3 7 3 86400 20091204150200 20091104150200 64775 hud.gov. APf75Nx4eY9eHov3T9hduDLuG4TJfVfEUEhSgm7HIZRvSPFgajHz2q+Wy6888G3C0T1Zft1qL2PdHMonK6H1OEE+NiOxroDsZaH+aWZjAsbIO86qQ2xcC+/Z9DsddQtONk0zAqpuYxHSn879rAk/BIKeDukNoBChHCSTy8olUFiYt7XEmjz5AOoc8R5VQhMQi/vmbmC0BoFOemDxxowG2MX27Hj2MbVBEJiT8xioFEk41jsdDI0WQtpnory2NT/UM4kWZdmDdxbpwu2F8oixe3oi4AOI9j3EukoOZT9f0Sx+tCg/I9zLNZJi+VuI5oUlpZkSH5EoUyRgK33eO+KJhQ== ;{id = 64775}
GO8CPDSLPULIOURE31GBK5JJKA0BKIVN.hud.gov. 86400 IN NSEC3 1 1 5 abcd gvfjd9enpjtet8a14uhb8hlrfeon2b72 A RRSIG ; flags: optout
GO8CPDSLPULIOURE31GBK5JJKA0BKIVN.hud.gov. 86400 IN RRSIG NSEC3 7 3 86400 20091204150200 20091104150200 64775 hud.gov. eQFg/RvJ640k+Fa5yIUZwkx8FvsYSivykYFjc6dOiGt7r3VprfxwGWeYpyjYr/+mzu0ugE5ePDjZWtr5naK3dvqmt7qKk4/nEvVDoUmrg7joIUmeTzami9RB9lzCq2O/ddempQ6jpwfjiIDuEKUxHMpBFpw8QQZnZSZHKKQCDB4pOj8U8J/wNJXCS+SP7plU1hEVroC+QXCOYS8NHY2wFyeuW7A+xvg9tyYp9PH6c5MoNMkRQt36Kdvfk1nk3osktwalJNLmMhDr/vtErFieGGD6E9Ud9Pg70bPF2G5nqwwLDRevy7hIFjaMDHfYrcWc4B5hrUSpGtLJkYog9vsd2w== ;{id = 64775}
SECTION ADDITIONAL
drfswitch.hud.gov. 86400 IN A 170.97.167.1
lanswitch.hud.gov. 86400 IN A 170.97.67.78
drfswitch.hud.gov. 86400 IN RRSIG A 7 3 86400 20091204150200 20091104150200 64775 hud.gov. ub6Anb7XgDMRsTYxqKDRUOYnntLetcJMXM9SVbG7Cb2n+ccp4OO38u6KnGO1i8U5rhTQ6WPlG6iKA+8U0mQuWp3fkzBaE+a5R3eEfzLlRE/MbjUqHjTb0MVYQnMWaA7YXmj/1BNFjBuAam+J3QnU4JR3RqN9WDmHXYx8IUEY9BYSWvTMhOnzebRu6z9MUBQWFfm69pFxf0Z1SkpInznU/mxGdGlslzxL8ScKAUMSBiQG1tyL90OEXW3Yp7kbOtpTxGrXucpMiMB9lXI/z9UiRJenZrJ7swyyyJ5Do0TjCiS3oS8RBhX8ou09sNftUmF9crKz/BdNq90wVYoHXYz9vg== ;{id = 64775}
lanswitch.hud.gov. 86400 IN RRSIG A 7 3 86400 20091204150200 20091104150200 64775 hud.gov. QO+quzaZXrIBZy0JXhx85/8auhBj8dCqeidaUCs6rzCd/lgUDt7B/mH8IanU33o+PyKsBN+B5r9bavFFCNc4sPDUVwNcnZfKCyFQvvUnI3rztCJb/ESYnJ/xu/5g966cRLOajzAvvLAWZ6vT4p3b9+CpaONOJ19D08RpwsWnTkqiEP/UiXaWBpVwyt4JHN0oiNmMGshk5zjbHir1gUInd7QbJk3SpyiIgHT5Z4nhTUGkd1sIve++aIxjsQ8MVrE+INw4v56dJaoYD6bqQewmg2yAr9nYemYUHYi8+USy7/anEaUsOvk9zZfncevTfY/sOORFWoD15bHF2BWUo2YwaQ== ;{id = 64775}
ENTRY_END
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
www.content.hud.gov. IN AAAA
SECTION ANSWER
ENTRY_END
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
GOV. IN DNSKEY
SECTION ANSWER
GOV. 86400 IN DNSKEY 256 3 7 AwEAAaQ6vDoHd2QDRBLwB+n63RxnmJExvIcOz7uv9gM+l8QSMAJTTCDpqJ8R+8UfYs97cn6LM3cT3kcl9V0GnjljNzNMk39W11Ej7htNcbf4u1n5z2e4WsnpjQJJmKoWv2FORIfJmLKbxzGILSK13mrDUETj9onhdtOsjkhcK/7S+h1d ;{id = 51998 (zsk), size = 1024b}
GOV. 86400 IN DNSKEY 257 3 7 AwEAAZ1OCt7zZxeaROvzXNCNlqQWIi++p5ABXSoxqJ65WQko6xrI9RImK7IBT5roFhXjBDGJ8ld9CYIEN94kK83K/QwUGCJ+v3vIQFi09IqsPeRdHTQyghWWbhzAZpnlZ16imXB4yFZjdbV2iM66KcgsESQMPEcIayDQJh6JEi1wmslrYvRRJ6YPOWrlLD0RmdtCaRuzlUE0RiWSem/i8vDFdmsSwChRMcORklKqjqt1+RBIiEFJGKIz7lGc9DXRwkBfb+halii+jrELiZAPzfO7rf08l3QlgHEuxclTTdEaxctPd2O2U/Hl9tRgkxRL/Zv1i0sEx2mOJGcUCeVm4Hf2aM8= ;{id = 26079 (ksk), size = 2048b}
GOV. 86400 IN RRSIG DNSKEY 7 1 86400 20091117211705 20091112211705 26079 gov. OR2ltuGs0IxWqikvqWIoXLy7gPpWafolM+fyQ9uyuzPdxILo8QboVzfRr3Q8X/hOa6MRwR0KHGci2NH/29p9cekafdMbOer0kvh0hndnf+yGLuDcd9HLj5hpoZ5uecZ2r02OWtRHCKetAPF95SYrIQBzoqUNOswdDlSTW1R8v/BQ6UpztuUQcciZJxARbXlovzSkMbnoyjtehgKjXPP/Zy79vSwhjpTJ4XAsc2E3Tw1qAE7ZZUzYpN8uGmAQYVtZraQIjazE/A+xVo+XB0dZdhlM00xUs6GNuZytckUOqecBKZ2IKlxBe+kBEkj2nz1PBRAzmZUoS3ZZPkKaA6ygTA== ;{id = 26079}
GOV. 86400 IN RRSIG DNSKEY 7 1 86400 20091117211705 20091112211705 51998 gov. VDizeuAywZB0tQm4kmbOSGhrK1eJYC9VSSND/wG7oTj/oWDAKMEke1XrQXGEoIFyBKZk5dHpUB6tmEA9RPLMwI51ue66pM9RRT1aNLba08r6TDzr6ZxKjtqBDj4Xy16h6PWZ2jC9JASGeNGINg6zCeVmU75yqXh6+X+KeypO64E= ;{id = 51998}
ENTRY_END
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
hud.gov. IN DS
SECTION ANSWER
hud.gov. 86399 IN DS 52146 7 2 54af554fc3ffc532bb898b9ab39f1276fd17b59d3e44772c3142ea62680d71c7 ; xihap-zehog-zybyz-zecaf-dyvym-nydun-pusan-zagil-kezyc-lutyn-tazog-gyted-sosig-depyk-dypeb-tasas-lexix
hud.gov. 86399 IN RRSIG DS 7 2 86400 20091117211705 20091112211705 51998 gov. FHDstL7xVBBedCaG83M884pnxCV8PY9GjUulwH7BSTVIaFBJe/kxlKGTsD0j5x4QfezjBWKenjpvw5SiMGeQOnIJeA/z6Ze9QBCGVrbx0ZgoKEoSRyfD0vIjvM7J4T2PLgslI8fsMpWFs4KzmujKJNRVq4aFzFk9k8bFCJnEPJk= ;{id = 51998}
ENTRY_END
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
hud.gov. IN DNSKEY
SECTION ANSWER
hud.gov. 86400 IN DNSKEY 256 3 7 AwEAAcAOoW+zclZqs8kCGmm290DImA1DDfKqbifB1oGNjOcmz6xz6PigLa8ORaAG0zpabZwLMXyhMaKbseR+beGnOf2wh5N0oxN8grCNTJm+YAMeyvCn2dz3J8YEoclyST4bhU38MGFsEVVZukXsIniFfvnKfpVxArpO7ocbDXI+EN3RA8EHFTIHOCfEbCS7zyO0mtrdM88Y/tIX9fjsYUig6lfVUNISJUL4TyUMpmi8/hu2dLdTuXXIAEMx/vyQHVFq2ZZM0nnDJ9vJCZEgwFAjUE5/BjlrDgofonxdY8SLDbQvn11z/SPugKiA16bdO6i/ND4FjEhG2HUJHeeQCrZ61rE= ;{id = 64775 (zsk), size = 2048b}
hud.gov. 86400 IN DNSKEY 256 3 7 AwEAAfFubFVJ6m7jO8HvInmFEXivfnqZZpS7SnsucTlfGg5yhIayzS3tC0UMAt1QU+pEIyVH+qa2fG2+/45gAp+iG3zwyepyZuup8eo/SlXefWXZ9CIjBNaaptd2sSDsuF8mPtdQmtm3AbPqGEe7p7edIHHJBxPy90AzJQeKppyRcRcrGO3QNC9Glso177NbHZVZuY46V63RdaY3Qf5t7/03xy/Z68KWFEJKUCBxkHjAVIH0KaT9M37dPzs9L7F/+NyOLfMUzk87ctv4ivW9dcJRf79aulzoIV4LlGu0ZsrvxRZ5t+ind+GDeTvaKseH0NWF5Am2dG/QrHtewQL9qGztjN8= ;{id = 41402 (zsk), size = 2048b}
hud.gov. 86400 IN DNSKEY 257 3 7 AwEAAZ50d20TkOzWzJD+anUMSIMfGaI8m4If6DMax4NQnZ34yta6UOb907SRqBs2vJ+MpcJkyRuLx/Z9vGlfZQ7V9eBgI62EZwmfiitanwSFPZgCzM8nVswpDS+/CmaHhXUoLdgNgUYh4WSl/7fXroluC/18xyMl3ZGQRRjJftpQSMXubP/n9nCHZXE5YiDw1cRklqA4lLyNeXBgadWa8klekr89WNij454KApevbg0GSudEJw7IWzbOb09npvQ1hnLz8pmDsaahfIsGBvcHSUEJrjSkk3J1oHDj0B7Gxm+tZH4Er21RTucEWeroyIJSQmsYN+Cm0FyfgJ75bNEsRe5M4Vc= ;{id = 52146 (ksk), size = 2048b}
hud.gov. 86400 IN RRSIG DNSKEY 7 2 86400 20091204150200 20091104150200 52146 hud.gov. KWIA6wH6BqwuF7d6dyTbfqbcLgbUG2ZKJA4vVfhWqOC76Xnt7gXPLeB2GQwwyhSR0s3IHIzAB0Uj+RAGGcz2NH5JanfxNC9rAvubYESXSlLr/FC33exLeOxGisJZzRnPpk5NynXwyT8TXul1ew48/Mpyi7j6+tlqakqHw2HlId7oblxO2cjN6JV0JLZ44l7tCw6ALYhamA48PQ1WeJbGcfH7buCEG7S1ceZSZlG6kml+u7pb65QL9AZjCnDIecXk7B3HMCdIT8zyrO8QK0GiLMMak9RogF/5gBiH/WDCq7146vcVneW/Hn/+hLnY104iOKuadJcbmStlMF5k0iBzng== ;{id = 52146}
hud.gov. 86400 IN RRSIG DNSKEY 7 2 86400 20091204150200 20091104150200 64775 hud.gov. V0JSAtTmQn76T408nyntg1ydX5sVvq8RSCN/Bf+cqTPXMFlPpmOs4VQv791bY85n28qOehV7Ws2CrhfxbyFbyYRXPBtWkg6jH3JXicYPn7Abm7E5N2Y6Mkm1Z9xt/APCw+aSkt0swMJzYBO5P5aeDesIB+Pz5I+SLuOPin3GFjGYL+YB5j5rTY/Nqnp2eQytF0SoFdqCIPCP7l9ZtYdaxBDQNX3Hklm4dRYP5U9wL8sqaeUwgKjJTGcbXiXdPXF9+3AojshKMpk14lcplHcy+cQ4p5ehSngtDwdWtG8gcWKCg829I/1iOFcnPgJ1YK1DdPVEGTgUFgGGwTx+HYMsPA== ;{id = 64775}
ENTRY_END
RANGE_END
STEP 1 QUERY
ENTRY_BEGIN
REPLY RD DO
SECTION QUESTION
www.hud.gov. IN AAAA
ENTRY_END
; recursion happens here.
STEP 10 CHECK_ANSWER
ENTRY_BEGIN
MATCH all
REPLY QR RD RA NOERROR
SECTION QUESTION
www.hud.gov. IN AAAA
SECTION ANSWER
www.hud.gov. 86400 IN CNAME www.content.hud.gov.
www.hud.gov. 86400 IN RRSIG CNAME 7 3 86400 20091204150200 20091104150200 64775 hud.gov. taZtumaTp8eSlcj0vEGnY0Up05RtlC2NhHrtHDUdq1TskAPQH8Eu9AoVe6gKrFEyCC1ixprOhT8Ni661d/ZykdzgceZ8KgFIlSQ84Whm59yB2gcbXLen9rApF0+NuyRgdAph6yjMYMtfoRQWAASG7SqS/v52dkHNf/a9PXaDvHBvjoiTK+dXPKFulkmEl0KyhXBdsikl6/Xd68FF41FdDNzWS8ZzYCdd4CWaXXkwTtPSFsKyXGZeXOTxqGQJnD+hNBkn2sAca1oLiAsfaiCHec66I+rHGXT+mPB7HXez32jbbeInkgB7M2TUoRXehifuloR8sur8Xck9FPRv24Si8A== ;{id = 64775}
SECTION AUTHORITY
3RUD2HK5O5KA0IC6BF22C1T4R1BJGJ3R.hud.gov. 86400 IN NSEC3 1 1 5 abcd 42bsks495i3mb2s3f6nhusc6rfm54g4g A NS SOA MX RRSIG DNSKEY NSEC3PARAM ; flags: optout
3RUD2HK5O5KA0IC6BF22C1T4R1BJGJ3R.hud.gov. 86400 IN RRSIG NSEC3 7 3 86400 20091204150200 20091104150200 64775 hud.gov. APf75Nx4eY9eHov3T9hduDLuG4TJfVfEUEhSgm7HIZRvSPFgajHz2q+Wy6888G3C0T1Zft1qL2PdHMonK6H1OEE+NiOxroDsZaH+aWZjAsbIO86qQ2xcC+/Z9DsddQtONk0zAqpuYxHSn879rAk/BIKeDukNoBChHCSTy8olUFiYt7XEmjz5AOoc8R5VQhMQi/vmbmC0BoFOemDxxowG2MX27Hj2MbVBEJiT8xioFEk41jsdDI0WQtpnory2NT/UM4kWZdmDdxbpwu2F8oixe3oi4AOI9j3EukoOZT9f0Sx+tCg/I9zLNZJi+VuI5oUlpZkSH5EoUyRgK33eO+KJhQ== ;{id = 64775}
GO8CPDSLPULIOURE31GBK5JJKA0BKIVN.hud.gov. 86400 IN NSEC3 1 1 5 abcd gvfjd9enpjtet8a14uhb8hlrfeon2b72 A RRSIG ; flags: optout
GO8CPDSLPULIOURE31GBK5JJKA0BKIVN.hud.gov. 86400 IN RRSIG NSEC3 7 3 86400 20091204150200 20091104150200 64775 hud.gov. eQFg/RvJ640k+Fa5yIUZwkx8FvsYSivykYFjc6dOiGt7r3VprfxwGWeYpyjYr/+mzu0ugE5ePDjZWtr5naK3dvqmt7qKk4/nEvVDoUmrg7joIUmeTzami9RB9lzCq2O/ddempQ6jpwfjiIDuEKUxHMpBFpw8QQZnZSZHKKQCDB4pOj8U8J/wNJXCS+SP7plU1hEVroC+QXCOYS8NHY2wFyeuW7A+xvg9tyYp9PH6c5MoNMkRQt36Kdvfk1nk3osktwalJNLmMhDr/vtErFieGGD6E9Ud9Pg70bPF2G5nqwwLDRevy7hIFjaMDHfYrcWc4B5hrUSpGtLJkYog9vsd2w== ;{id = 64775}
ENTRY_END
SCENARIO_END
dnssecjava-1.1.3/src/test/resources/unbound/val_cnametopos.rpl 0000664 0000000 0000000 00000016570 13020541473 0024630 0 ustar 00root root 0000000 0000000 ; config options
; The island of trust is at example.com
server:
trust-anchor: "example.com. 3600 IN DS 2854 3 1 46e4ffc6e9a4793b488954bd3f0cc6af0dfb201b"
trust-anchor: "example.net. 3600 IN DNSKEY 256 3 5 AQPQ41chR9DEHt/aIzIFAqanbDlRflJoRs5yz1jFsoRIT7dWf0r+PeDuewdxkszNH6wnU4QL8pfKFRh5PIYVBLK3 ;{id = 30899 (zsk), size = 512b}"
val-override-date: "20070916134226"
target-fetch-policy: "0 0 0 0 0"
stub-zone:
name: "."
stub-addr: 193.0.14.129 # K.ROOT-SERVERS.NET.
CONFIG_END
SCENARIO_BEGIN Test validator with a cname to positive
; K.ROOT-SERVERS.NET.
RANGE_BEGIN 0 100
ADDRESS 193.0.14.129
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
. IN NS
SECTION ANSWER
. IN NS K.ROOT-SERVERS.NET.
SECTION ADDITIONAL
K.ROOT-SERVERS.NET. IN A 193.0.14.129
ENTRY_END
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
www.example.com. IN A
SECTION AUTHORITY
com. IN NS a.gtld-servers.net.
SECTION ADDITIONAL
a.gtld-servers.net. IN A 192.5.6.30
ENTRY_END
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
www.example.net. IN A
SECTION AUTHORITY
net. IN NS a.gtld-servers.net.
SECTION ADDITIONAL
a.gtld-servers.net. IN A 192.5.6.30
ENTRY_END
RANGE_END
; a.gtld-servers.net.
RANGE_BEGIN 0 100
ADDRESS 192.5.6.30
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
com. IN NS
SECTION ANSWER
com. IN NS a.gtld-servers.net.
SECTION ADDITIONAL
a.gtld-servers.net. IN A 192.5.6.30
ENTRY_END
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
net. IN NS
SECTION ANSWER
net. IN NS a.gtld-servers.net.
SECTION ADDITIONAL
a.gtld-servers.net. IN A 192.5.6.30
ENTRY_END
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
www.example.com. IN A
SECTION AUTHORITY
example.com. IN NS ns.example.com.
SECTION ADDITIONAL
ns.example.com. IN A 1.2.3.4
ENTRY_END
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
www.example.net. IN A
SECTION AUTHORITY
example.net. IN NS ns.example.net.
SECTION ADDITIONAL
ns.example.net. IN A 1.2.3.5
ENTRY_END
RANGE_END
; ns.example.com.
RANGE_BEGIN 0 100
ADDRESS 1.2.3.4
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
example.com. IN NS
SECTION ANSWER
example.com. IN NS ns.example.com.
example.com. 3600 IN RRSIG NS 3 2 3600 20070926134150 20070829134150 2854 example.com. MC0CFQCN+qHdJxoI/2tNKwsb08pra/G7aAIUAWA5sDdJTbrXA1/3OaesGBAO3sI= ;{id = 2854}
SECTION ADDITIONAL
ns.example.com. IN A 1.2.3.4
ns.example.com. 3600 IN RRSIG A 3 3 3600 20070926135752 20070829135752 2854 example.com. MC0CFQCMSWxVehgOQLoYclB9PIAbNP229AIUeH0vNNGJhjnZiqgIOKvs1EhzqAo= ;{id = 2854}
ENTRY_END
; response to DNSKEY priming query
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
example.com. IN DNSKEY
SECTION ANSWER
example.com. 3600 IN DNSKEY 256 3 3 ALXLUsWqUrY3JYER3T4TBJII s70j+sDS/UT2QRp61SE7S3E EXopNXoFE73JLRmvpi/UrOO/Vz4Se 6wXv/CYCKjGw06U4WRgR YXcpEhJROyNapmdIKSx hOzfLVE1gqA0PweZR8d tY3aNQSRn3sPpwJr6Mi /PqQKAMMrZ9ckJpf1+b QMOOvxgzz2U1GS18b3y ZKcgTMEaJzd/GZYzi/B N2DzQ0MsrSwYXfsNLFO Bbs8PJMW4LYIxeeOe6rUgkWOF 7CC9Dh/dduQ1QrsJhmZAEFfd6ByYV+ ;{id = 2854 (zsk), size = 1688b}
example.com. 3600 IN RRSIG DNSKEY DSA 2 3600 20070926134150 20070829134150 2854 example.com. MCwCFBQRtlR4BEv9ohi+PGFjp+AHsJuHAhRCvz0shggvnvI88DFnBDCczHUcVA== ;{id = 2854}
SECTION AUTHORITY
example.com. IN NS ns.example.com.
example.com. 3600 IN RRSIG NS 3 2 3600 20070926134150 20070829134150 2854 example.com. MC0CFQCN+qHdJxoI/2tNKwsb08pra/G7aAIUAWA5sDdJTbrXA1/3OaesGBAO3sI= ;{id = 2854}
SECTION ADDITIONAL
ns.example.com. IN A 1.2.3.4
ns.example.com. 3600 IN RRSIG A 3 3 3600 20070926135752 20070829135752 2854 example.com. MC0CFQCMSWxVehgOQLoYclB9PIAbNP229AIUeH0vNNGJhjnZiqgIOKvs1EhzqAo= ;{id = 2854}
ENTRY_END
; response to query of interest
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
www.example.com. IN A
SECTION ANSWER
www.example.com. IN CNAME www.example.net.
www.example.com. 3600 IN RRSIG CNAME DSA 3 3600 20070926134150 20070829134150 2854 example.com. MC0CFGcJxnNxpWCBzXejiSdl4p1BKRMnAhUApoJrugVBRwFgAoYAhhqlZFac7fE= ;{id = 2854}
SECTION AUTHORITY
SECTION ADDITIONAL
ENTRY_END
RANGE_END
; ns.example.net.
RANGE_BEGIN 0 100
ADDRESS 1.2.3.5
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
example.net. IN NS
SECTION ANSWER
example.net. IN NS ns.example.net.
example.net. 3600 IN RRSIG NS RSASHA1 2 3600 20070926134150 20070829134150 30899 example.net. E8JX0l4B+cSR5bkHQwOJy1pBmlLMTYCJ8EwfNMU/eCv0YhKwo26rHhn52FGisgv+Nwp7/NbhHqQ+kJgoZC94XA== ;{id = 30899}
SECTION ADDITIONAL
ns.example.net. IN A 1.2.3.5
ns.example.net. 3600 IN RRSIG A RSASHA1 3 3600 20070926134150 20070829134150 30899 example.net. x+tQMC9FhzT7Fcy1pM5NrOC7E8nLd7THPI3C6ie4EwL8PrxllqlR3q/DKB0d/m0qCOPcgN6HFOYURV1s4uAcsw== ;{id = 30899}
ENTRY_END
; response to DNSKEY priming query
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
example.net. IN DNSKEY
SECTION ANSWER
example.net. 3600 IN DNSKEY 256 3 5 AQPQ41chR9DEHt/aIzIFAqanbDlRflJoRs5yz1jFsoRIT7dWf0r+PeDuewdxkszNH6wnU4QL8pfKFRh5PIYVBLK3 ;{id = 30899 (zsk), size = 512b}
example.net. 3600 IN RRSIG DNSKEY RSASHA1 2 3600 20070926134150 20070829134150 30899 example.net. hiFzlQ8VoYgCuvIsfVuxC3mfJDqsTh0yc6abs5xMx5uEcIjb0dndFQx7INOM+imlzveEN73Hqp4OLFpFhsWLlw== ;{id = 30899}
SECTION AUTHORITY
example.net. IN NS ns.example.net.
example.net. 3600 IN RRSIG NS RSASHA1 2 3600 20070926134150 20070829134150 30899 example.net. E8JX0l4B+cSR5bkHQwOJy1pBmlLMTYCJ8EwfNMU/eCv0YhKwo26rHhn52FGisgv+Nwp7/NbhHqQ+kJgoZC94XA== ;{id = 30899}
SECTION ADDITIONAL
ns.example.net. IN A 1.2.3.5
ns.example.net. 3600 IN RRSIG A RSASHA1 3 3600 20070926134150 20070829134150 30899 example.net. x+tQMC9FhzT7Fcy1pM5NrOC7E8nLd7THPI3C6ie4EwL8PrxllqlR3q/DKB0d/m0qCOPcgN6HFOYURV1s4uAcsw== ;{id = 30899}
ENTRY_END
; response to query of interest
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
www.example.net. IN A
SECTION ANSWER
www.example.net. IN A 11.12.13.14
www.example.net. 3600 IN RRSIG A 5 3 3600 20070926134150 20070829134150 30899 example.net. CPxF5hK9Kg5eT7W6LgZwr0ePYEm9HMcSY4vvqCS6gDWB4X9jvXLCfBkCLhsNybPBpGWlsLi5wM6MTdJXuPpsRA== ;{id = 30899}
SECTION AUTHORITY
SECTION ADDITIONAL
ENTRY_END
RANGE_END
STEP 1 QUERY
ENTRY_BEGIN
REPLY RD DO
SECTION QUESTION
www.example.com. IN A
ENTRY_END
; recursion happens here.
STEP 10 CHECK_ANSWER
ENTRY_BEGIN
MATCH all
REPLY QR RD RA AD NOERROR
SECTION QUESTION
www.example.com. IN A
SECTION ANSWER
www.example.com. IN CNAME www.example.net.
www.example.com. 3600 IN RRSIG CNAME DSA 3 3600 20070926134150 20070829134150 2854 example.com. MC0CFGcJxnNxpWCBzXejiSdl4p1BKRMnAhUApoJrugVBRwFgAoYAhhqlZFac7fE= ;{id = 2854}
www.example.net. IN A 11.12.13.14
www.example.net. 3600 IN RRSIG A 5 3 3600 20070926134150 20070829134150 30899 example.net. CPxF5hK9Kg5eT7W6LgZwr0ePYEm9HMcSY4vvqCS6gDWB4X9jvXLCfBkCLhsNybPBpGWlsLi5wM6MTdJXuPpsRA== ;{id = 30899}
SECTION AUTHORITY
SECTION ADDITIONAL
ENTRY_END
SCENARIO_END
dnssecjava-1.1.3/src/test/resources/unbound/val_cnametoposnowc.rpl 0000664 0000000 0000000 00000017320 13020541473 0025511 0 ustar 00root root 0000000 0000000 ; config options
; The island of trust is at example.com
server:
trust-anchor: "example.com. 3600 IN DS 2854 3 1 46e4ffc6e9a4793b488954bd3f0cc6af0dfb201b"
trust-anchor: "example.net. 3600 IN DNSKEY 256 3 5 AQPQ41chR9DEHt/aIzIFAqanbDlRflJoRs5yz1jFsoRIT7dWf0r+PeDuewdxkszNH6wnU4QL8pfKFRh5PIYVBLK3 ;{id = 30899 (zsk), size = 512b}"
val-override-date: "20070916134226"
target-fetch-policy: "0 0 0 0 0"
stub-zone:
name: "."
stub-addr: 193.0.14.129 # K.ROOT-SERVERS.NET.
CONFIG_END
SCENARIO_BEGIN Test validator with a cname to positive wildcard without proof
; K.ROOT-SERVERS.NET.
RANGE_BEGIN 0 100
ADDRESS 193.0.14.129
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
. IN NS
SECTION ANSWER
. IN NS K.ROOT-SERVERS.NET.
SECTION ADDITIONAL
K.ROOT-SERVERS.NET. IN A 193.0.14.129
ENTRY_END
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
www.example.com. IN A
SECTION AUTHORITY
com. IN NS a.gtld-servers.net.
SECTION ADDITIONAL
a.gtld-servers.net. IN A 192.5.6.30
ENTRY_END
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
www.example.net. IN A
SECTION AUTHORITY
net. IN NS a.gtld-servers.net.
SECTION ADDITIONAL
a.gtld-servers.net. IN A 192.5.6.30
ENTRY_END
RANGE_END
; a.gtld-servers.net.
RANGE_BEGIN 0 100
ADDRESS 192.5.6.30
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
com. IN NS
SECTION ANSWER
com. IN NS a.gtld-servers.net.
SECTION ADDITIONAL
a.gtld-servers.net. IN A 192.5.6.30
ENTRY_END
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
net. IN NS
SECTION ANSWER
net. IN NS a.gtld-servers.net.
SECTION ADDITIONAL
a.gtld-servers.net. IN A 192.5.6.30
ENTRY_END
ENTRY_BEGIN
MATCH opcode subdomain
ADJUST copy_id copy_query
REPLY QR NOERROR
SECTION QUESTION
example.com. IN A
SECTION AUTHORITY
example.com. IN NS ns.example.com.
SECTION ADDITIONAL
ns.example.com. IN A 1.2.3.4
ENTRY_END
ENTRY_BEGIN
MATCH opcode subdomain
ADJUST copy_id copy_query
REPLY QR NOERROR
SECTION QUESTION
example.net. IN A
SECTION AUTHORITY
example.net. IN NS ns.example.net.
SECTION ADDITIONAL
ns.example.net. IN A 1.2.3.5
ENTRY_END
RANGE_END
; ns.example.com.
RANGE_BEGIN 0 100
ADDRESS 1.2.3.4
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
example.com. IN NS
SECTION ANSWER
example.com. IN NS ns.example.com.
example.com. 3600 IN RRSIG NS 3 2 3600 20070926134150 20070829134150 2854 example.com. MC0CFQCN+qHdJxoI/2tNKwsb08pra/G7aAIUAWA5sDdJTbrXA1/3OaesGBAO3sI= ;{id = 2854}
SECTION ADDITIONAL
ns.example.com. IN A 1.2.3.4
ns.example.com. 3600 IN RRSIG A 3 3 3600 20070926135752 20070829135752 2854 example.com. MC0CFQCMSWxVehgOQLoYclB9PIAbNP229AIUeH0vNNGJhjnZiqgIOKvs1EhzqAo= ;{id = 2854}
ENTRY_END
; response to DNSKEY priming query
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
example.com. IN DNSKEY
SECTION ANSWER
example.com. 3600 IN DNSKEY 256 3 3 ALXLUsWqUrY3JYER3T4TBJII s70j+sDS/UT2QRp61SE7S3E EXopNXoFE73JLRmvpi/UrOO/Vz4Se 6wXv/CYCKjGw06U4WRgR YXcpEhJROyNapmdIKSx hOzfLVE1gqA0PweZR8d tY3aNQSRn3sPpwJr6Mi /PqQKAMMrZ9ckJpf1+b QMOOvxgzz2U1GS18b3y ZKcgTMEaJzd/GZYzi/B N2DzQ0MsrSwYXfsNLFO Bbs8PJMW4LYIxeeOe6rUgkWOF 7CC9Dh/dduQ1QrsJhmZAEFfd6ByYV+ ;{id = 2854 (zsk), size = 1688b}
example.com. 3600 IN RRSIG DNSKEY DSA 2 3600 20070926134150 20070829134150 2854 example.com. MCwCFBQRtlR4BEv9ohi+PGFjp+AHsJuHAhRCvz0shggvnvI88DFnBDCczHUcVA== ;{id = 2854}
SECTION AUTHORITY
example.com. IN NS ns.example.com.
example.com. 3600 IN RRSIG NS 3 2 3600 20070926134150 20070829134150 2854 example.com. MC0CFQCN+qHdJxoI/2tNKwsb08pra/G7aAIUAWA5sDdJTbrXA1/3OaesGBAO3sI= ;{id = 2854}
SECTION ADDITIONAL
ns.example.com. IN A 1.2.3.4
ns.example.com. 3600 IN RRSIG A 3 3 3600 20070926135752 20070829135752 2854 example.com. MC0CFQCMSWxVehgOQLoYclB9PIAbNP229AIUeH0vNNGJhjnZiqgIOKvs1EhzqAo= ;{id = 2854}
ENTRY_END
; response to query of interest
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
www.example.com. IN A
SECTION ANSWER
www.example.com. IN CNAME www.example.net.
www.example.com. 3600 IN RRSIG CNAME DSA 3 3600 20070926134150 20070829134150 2854 example.com. MC0CFGcJxnNxpWCBzXejiSdl4p1BKRMnAhUApoJrugVBRwFgAoYAhhqlZFac7fE= ;{id = 2854}
SECTION AUTHORITY
SECTION ADDITIONAL
ENTRY_END
ENTRY_BEGIN
MATCH opcode qname qtype
ADJUST copy_id
REPLY QR AA REFUSED
SECTION QUESTION
ns.example.com. IN AAAA
ENTRY_END
ENTRY_BEGIN
MATCH opcode qname qtype
ADJUST copy_id
REPLY QR AA REFUSED
SECTION QUESTION
ns.example.com. IN A
ENTRY_END
RANGE_END
; ns.example.net.
RANGE_BEGIN 0 100
ADDRESS 1.2.3.5
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
example.net. IN NS
SECTION ANSWER
example.net. IN NS ns.example.net.
example.net. 3600 IN RRSIG NS RSASHA1 2 3600 20070926134150 20070829134150 30899 example.net. E8JX0l4B+cSR5bkHQwOJy1pBmlLMTYCJ8EwfNMU/eCv0YhKwo26rHhn52FGisgv+Nwp7/NbhHqQ+kJgoZC94XA== ;{id = 30899}
SECTION ADDITIONAL
ns.example.net. IN A 1.2.3.5
ns.example.net. 3600 IN RRSIG A RSASHA1 3 3600 20070926134150 20070829134150 30899 example.net. x+tQMC9FhzT7Fcy1pM5NrOC7E8nLd7THPI3C6ie4EwL8PrxllqlR3q/DKB0d/m0qCOPcgN6HFOYURV1s4uAcsw== ;{id = 30899}
ENTRY_END
; response to DNSKEY priming query
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
example.net. IN DNSKEY
SECTION ANSWER
example.net. 3600 IN DNSKEY 256 3 5 AQPQ41chR9DEHt/aIzIFAqanbDlRflJoRs5yz1jFsoRIT7dWf0r+PeDuewdxkszNH6wnU4QL8pfKFRh5PIYVBLK3 ;{id = 30899 (zsk), size = 512b}
example.net. 3600 IN RRSIG DNSKEY RSASHA1 2 3600 20070926134150 20070829134150 30899 example.net. hiFzlQ8VoYgCuvIsfVuxC3mfJDqsTh0yc6abs5xMx5uEcIjb0dndFQx7INOM+imlzveEN73Hqp4OLFpFhsWLlw== ;{id = 30899}
SECTION AUTHORITY
example.net. IN NS ns.example.net.
example.net. 3600 IN RRSIG NS RSASHA1 2 3600 20070926134150 20070829134150 30899 example.net. E8JX0l4B+cSR5bkHQwOJy1pBmlLMTYCJ8EwfNMU/eCv0YhKwo26rHhn52FGisgv+Nwp7/NbhHqQ+kJgoZC94XA== ;{id = 30899}
SECTION ADDITIONAL
ns.example.net. IN A 1.2.3.5
ns.example.net. 3600 IN RRSIG A RSASHA1 3 3600 20070926134150 20070829134150 30899 example.net. x+tQMC9FhzT7Fcy1pM5NrOC7E8nLd7THPI3C6ie4EwL8PrxllqlR3q/DKB0d/m0qCOPcgN6HFOYURV1s4uAcsw== ;{id = 30899}
ENTRY_END
; response to query of interest
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
www.example.net. IN A
SECTION ANSWER
; from *.example.net.
www.example.net. IN A 11.12.13.14
www.example.net. 3600 IN RRSIG A 5 2 3600 20070926134150 20070829134150 30899 example.net. quSyDbSeHRvyMmanqq5rW+APC9MKOswbRLB5QP/G+C2iyokQFLuRTlX9Wmo/jo1Oo1MGBefJUmP9NdRd2EqABA== ;{id = 30899}
SECTION AUTHORITY
; missing proof
;wab.example.net IN NSEC wzz.example.net. A NSEC RRSIG
;wab.example.net. 3600 IN RRSIG NSEC 5 3 3600 20070926134150 20070829134150 30899 example.net. gl8vkI3xfSWx4Pyv5OdOthiewE6u/13kclY7UG9ptuFBddamdJO3RQqyxM6Xcmq+ToO4kMCCyaKijp01gTDoGg== ;{id = 30899}
SECTION ADDITIONAL
ENTRY_END
ENTRY_BEGIN
MATCH opcode qname qtype
ADJUST copy_id
REPLY QR AA REFUSED
SECTION QUESTION
ns.example.net. IN A
ENTRY_END
ENTRY_BEGIN
MATCH opcode qname qtype
ADJUST copy_id
REPLY QR AA REFUSED
SECTION QUESTION
ns.example.net. IN AAAA
ENTRY_END
RANGE_END
STEP 1 QUERY
ENTRY_BEGIN
REPLY RD DO
SECTION QUESTION
www.example.com. IN A
ENTRY_END
; recursion happens here.
STEP 10 CHECK_ANSWER
ENTRY_BEGIN
MATCH all
REPLY QR RD RA SERVFAIL
SECTION QUESTION
www.example.com. IN A
SECTION ANSWER
SECTION AUTHORITY
SECTION ADDITIONAL
ENTRY_END
SCENARIO_END
dnssecjava-1.1.3/src/test/resources/unbound/val_cnametoposwc.rpl 0000664 0000000 0000000 00000017646 13020541473 0025167 0 ustar 00root root 0000000 0000000 ; config options
; The island of trust is at example.com
server:
trust-anchor: "example.com. 3600 IN DS 2854 3 1 46e4ffc6e9a4793b488954bd3f0cc6af0dfb201b"
trust-anchor: "example.net. 3600 IN DNSKEY 256 3 5 AQPQ41chR9DEHt/aIzIFAqanbDlRflJoRs5yz1jFsoRIT7dWf0r+PeDuewdxkszNH6wnU4QL8pfKFRh5PIYVBLK3 ;{id = 30899 (zsk), size = 512b}"
val-override-date: "20070916134226"
target-fetch-policy: "0 0 0 0 0"
stub-zone:
name: "."
stub-addr: 193.0.14.129 # K.ROOT-SERVERS.NET.
CONFIG_END
SCENARIO_BEGIN Test validator with a cname to positive wildcard
; K.ROOT-SERVERS.NET.
RANGE_BEGIN 0 100
ADDRESS 193.0.14.129
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
. IN NS
SECTION ANSWER
. IN NS K.ROOT-SERVERS.NET.
SECTION ADDITIONAL
K.ROOT-SERVERS.NET. IN A 193.0.14.129
ENTRY_END
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
www.example.com. IN A
SECTION AUTHORITY
com. IN NS a.gtld-servers.net.
SECTION ADDITIONAL
a.gtld-servers.net. IN A 192.5.6.30
ENTRY_END
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
www.example.net. IN A
SECTION AUTHORITY
net. IN NS a.gtld-servers.net.
SECTION ADDITIONAL
a.gtld-servers.net. IN A 192.5.6.30
ENTRY_END
RANGE_END
; a.gtld-servers.net.
RANGE_BEGIN 0 100
ADDRESS 192.5.6.30
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
com. IN NS
SECTION ANSWER
com. IN NS a.gtld-servers.net.
SECTION ADDITIONAL
a.gtld-servers.net. IN A 192.5.6.30
ENTRY_END
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
net. IN NS
SECTION ANSWER
net. IN NS a.gtld-servers.net.
SECTION ADDITIONAL
a.gtld-servers.net. IN A 192.5.6.30
ENTRY_END
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
www.example.com. IN A
SECTION AUTHORITY
example.com. IN NS ns.example.com.
SECTION ADDITIONAL
ns.example.com. IN A 1.2.3.4
ENTRY_END
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
www.example.net. IN A
SECTION AUTHORITY
example.net. IN NS ns.example.net.
SECTION ADDITIONAL
ns.example.net. IN A 1.2.3.5
ENTRY_END
RANGE_END
; ns.example.com.
RANGE_BEGIN 0 100
ADDRESS 1.2.3.4
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
example.com. IN NS
SECTION ANSWER
example.com. IN NS ns.example.com.
example.com. 3600 IN RRSIG NS 3 2 3600 20070926134150 20070829134150 2854 example.com. MC0CFQCN+qHdJxoI/2tNKwsb08pra/G7aAIUAWA5sDdJTbrXA1/3OaesGBAO3sI= ;{id = 2854}
SECTION ADDITIONAL
ns.example.com. IN A 1.2.3.4
ns.example.com. 3600 IN RRSIG A 3 3 3600 20070926135752 20070829135752 2854 example.com. MC0CFQCMSWxVehgOQLoYclB9PIAbNP229AIUeH0vNNGJhjnZiqgIOKvs1EhzqAo= ;{id = 2854}
ENTRY_END
; response to DNSKEY priming query
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
example.com. IN DNSKEY
SECTION ANSWER
example.com. 3600 IN DNSKEY 256 3 3 ALXLUsWqUrY3JYER3T4TBJII s70j+sDS/UT2QRp61SE7S3E EXopNXoFE73JLRmvpi/UrOO/Vz4Se 6wXv/CYCKjGw06U4WRgR YXcpEhJROyNapmdIKSx hOzfLVE1gqA0PweZR8d tY3aNQSRn3sPpwJr6Mi /PqQKAMMrZ9ckJpf1+b QMOOvxgzz2U1GS18b3y ZKcgTMEaJzd/GZYzi/B N2DzQ0MsrSwYXfsNLFO Bbs8PJMW4LYIxeeOe6rUgkWOF 7CC9Dh/dduQ1QrsJhmZAEFfd6ByYV+ ;{id = 2854 (zsk), size = 1688b}
example.com. 3600 IN RRSIG DNSKEY DSA 2 3600 20070926134150 20070829134150 2854 example.com. MCwCFBQRtlR4BEv9ohi+PGFjp+AHsJuHAhRCvz0shggvnvI88DFnBDCczHUcVA== ;{id = 2854}
SECTION AUTHORITY
example.com. IN NS ns.example.com.
example.com. 3600 IN RRSIG NS 3 2 3600 20070926134150 20070829134150 2854 example.com. MC0CFQCN+qHdJxoI/2tNKwsb08pra/G7aAIUAWA5sDdJTbrXA1/3OaesGBAO3sI= ;{id = 2854}
SECTION ADDITIONAL
ns.example.com. IN A 1.2.3.4
ns.example.com. 3600 IN RRSIG A 3 3 3600 20070926135752 20070829135752 2854 example.com. MC0CFQCMSWxVehgOQLoYclB9PIAbNP229AIUeH0vNNGJhjnZiqgIOKvs1EhzqAo= ;{id = 2854}
ENTRY_END
; response to query of interest
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
www.example.com. IN A
SECTION ANSWER
www.example.com. IN CNAME www.example.net.
www.example.com. 3600 IN RRSIG CNAME DSA 3 3600 20070926134150 20070829134150 2854 example.com. MC0CFGcJxnNxpWCBzXejiSdl4p1BKRMnAhUApoJrugVBRwFgAoYAhhqlZFac7fE= ;{id = 2854}
SECTION AUTHORITY
SECTION ADDITIONAL
ENTRY_END
RANGE_END
; ns.example.net.
RANGE_BEGIN 0 100
ADDRESS 1.2.3.5
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
example.net. IN NS
SECTION ANSWER
example.net. IN NS ns.example.net.
example.net. 3600 IN RRSIG NS RSASHA1 2 3600 20070926134150 20070829134150 30899 example.net. E8JX0l4B+cSR5bkHQwOJy1pBmlLMTYCJ8EwfNMU/eCv0YhKwo26rHhn52FGisgv+Nwp7/NbhHqQ+kJgoZC94XA== ;{id = 30899}
SECTION ADDITIONAL
ns.example.net. IN A 1.2.3.5
ns.example.net. 3600 IN RRSIG A RSASHA1 3 3600 20070926134150 20070829134150 30899 example.net. x+tQMC9FhzT7Fcy1pM5NrOC7E8nLd7THPI3C6ie4EwL8PrxllqlR3q/DKB0d/m0qCOPcgN6HFOYURV1s4uAcsw== ;{id = 30899}
ENTRY_END
; response to DNSKEY priming query
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
example.net. IN DNSKEY
SECTION ANSWER
example.net. 3600 IN DNSKEY 256 3 5 AQPQ41chR9DEHt/aIzIFAqanbDlRflJoRs5yz1jFsoRIT7dWf0r+PeDuewdxkszNH6wnU4QL8pfKFRh5PIYVBLK3 ;{id = 30899 (zsk), size = 512b}
example.net. 3600 IN RRSIG DNSKEY RSASHA1 2 3600 20070926134150 20070829134150 30899 example.net. hiFzlQ8VoYgCuvIsfVuxC3mfJDqsTh0yc6abs5xMx5uEcIjb0dndFQx7INOM+imlzveEN73Hqp4OLFpFhsWLlw== ;{id = 30899}
SECTION AUTHORITY
example.net. IN NS ns.example.net.
example.net. 3600 IN RRSIG NS RSASHA1 2 3600 20070926134150 20070829134150 30899 example.net. E8JX0l4B+cSR5bkHQwOJy1pBmlLMTYCJ8EwfNMU/eCv0YhKwo26rHhn52FGisgv+Nwp7/NbhHqQ+kJgoZC94XA== ;{id = 30899}
SECTION ADDITIONAL
ns.example.net. IN A 1.2.3.5
ns.example.net. 3600 IN RRSIG A RSASHA1 3 3600 20070926134150 20070829134150 30899 example.net. x+tQMC9FhzT7Fcy1pM5NrOC7E8nLd7THPI3C6ie4EwL8PrxllqlR3q/DKB0d/m0qCOPcgN6HFOYURV1s4uAcsw== ;{id = 30899}
ENTRY_END
; response to query of interest
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
www.example.net. IN A
SECTION ANSWER
; from *.example.net.
www.example.net. IN A 11.12.13.14
www.example.net. 3600 IN RRSIG A 5 2 3600 20070926134150 20070829134150 30899 example.net. quSyDbSeHRvyMmanqq5rW+APC9MKOswbRLB5QP/G+C2iyokQFLuRTlX9Wmo/jo1Oo1MGBefJUmP9NdRd2EqABA== ;{id = 30899}
SECTION AUTHORITY
wab.example.net. IN NSEC wzz.example.net. A NSEC RRSIG
wab.example.net. 3600 IN RRSIG NSEC 5 3 3600 20070926134150 20070829134150 30899 example.net. gl8vkI3xfSWx4Pyv5OdOthiewE6u/13kclY7UG9ptuFBddamdJO3RQqyxM6Xcmq+ToO4kMCCyaKijp01gTDoGg== ;{id = 30899}
SECTION ADDITIONAL
ENTRY_END
RANGE_END
STEP 1 QUERY
ENTRY_BEGIN
REPLY RD DO
SECTION QUESTION
www.example.com. IN A
ENTRY_END
; recursion happens here.
STEP 10 CHECK_ANSWER
ENTRY_BEGIN
MATCH all
REPLY QR RD RA AD NOERROR
SECTION QUESTION
www.example.com. IN A
SECTION ANSWER
www.example.com. IN CNAME www.example.net.
www.example.com. 3600 IN RRSIG CNAME DSA 3 3600 20070926134150 20070829134150 2854 example.com. MC0CFGcJxnNxpWCBzXejiSdl4p1BKRMnAhUApoJrugVBRwFgAoYAhhqlZFac7fE= ;{id = 2854}
www.example.net. IN A 11.12.13.14
www.example.net. 3600 IN RRSIG A 5 2 3600 20070926134150 20070829134150 30899 example.net. quSyDbSeHRvyMmanqq5rW+APC9MKOswbRLB5QP/G+C2iyokQFLuRTlX9Wmo/jo1Oo1MGBefJUmP9NdRd2EqABA== ;{id = 30899}
SECTION AUTHORITY
wab.example.net. IN NSEC wzz.example.net. A NSEC RRSIG
wab.example.net. 3600 IN RRSIG NSEC 5 3 3600 20070926134150 20070829134150 30899 example.net. gl8vkI3xfSWx4Pyv5OdOthiewE6u/13kclY7UG9ptuFBddamdJO3RQqyxM6Xcmq+ToO4kMCCyaKijp01gTDoGg== ;{id = 30899}
SECTION ADDITIONAL
ENTRY_END
SCENARIO_END
dnssecjava-1.1.3/src/test/resources/unbound/val_cnamewctonodata.rpl 0000664 0000000 0000000 00000017564 13020541473 0025633 0 ustar 00root root 0000000 0000000 ; config options
; The island of trust is at example.com
server:
trust-anchor: "example.com. 3600 IN DS 2854 3 1 46e4ffc6e9a4793b488954bd3f0cc6af0dfb201b"
trust-anchor: "example.net. 3600 IN DNSKEY 256 3 5 AQPQ41chR9DEHt/aIzIFAqanbDlRflJoRs5yz1jFsoRIT7dWf0r+PeDuewdxkszNH6wnU4QL8pfKFRh5PIYVBLK3 ;{id = 30899 (zsk), size = 512b}"
val-override-date: "20070916134226"
target-fetch-policy: "0 0 0 0 0"
stub-zone:
name: "."
stub-addr: 193.0.14.129 # K.ROOT-SERVERS.NET.
CONFIG_END
SCENARIO_BEGIN Test validator with wilcard cname to nodata
; K.ROOT-SERVERS.NET.
RANGE_BEGIN 0 100
ADDRESS 193.0.14.129
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
. IN NS
SECTION ANSWER
. IN NS K.ROOT-SERVERS.NET.
SECTION ADDITIONAL
K.ROOT-SERVERS.NET. IN A 193.0.14.129
ENTRY_END
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
www.example.com. IN A
SECTION AUTHORITY
com. IN NS a.gtld-servers.net.
SECTION ADDITIONAL
a.gtld-servers.net. IN A 192.5.6.30
ENTRY_END
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
www.example.net. IN A
SECTION AUTHORITY
net. IN NS a.gtld-servers.net.
SECTION ADDITIONAL
a.gtld-servers.net. IN A 192.5.6.30
ENTRY_END
RANGE_END
; a.gtld-servers.net.
RANGE_BEGIN 0 100
ADDRESS 192.5.6.30
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
com. IN NS
SECTION ANSWER
com. IN NS a.gtld-servers.net.
SECTION ADDITIONAL
a.gtld-servers.net. IN A 192.5.6.30
ENTRY_END
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
net. IN NS
SECTION ANSWER
net. IN NS a.gtld-servers.net.
SECTION ADDITIONAL
a.gtld-servers.net. IN A 192.5.6.30
ENTRY_END
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
www.example.com. IN A
SECTION AUTHORITY
example.com. IN NS ns.example.com.
SECTION ADDITIONAL
ns.example.com. IN A 1.2.3.4
ENTRY_END
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
www.example.net. IN A
SECTION AUTHORITY
example.net. IN NS ns.example.net.
SECTION ADDITIONAL
ns.example.net. IN A 1.2.3.5
ENTRY_END
RANGE_END
; ns.example.com.
RANGE_BEGIN 0 100
ADDRESS 1.2.3.4
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
example.com. IN NS
SECTION ANSWER
example.com. IN NS ns.example.com.
example.com. 3600 IN RRSIG NS 3 2 3600 20070926134150 20070829134150 2854 example.com. MC0CFQCN+qHdJxoI/2tNKwsb08pra/G7aAIUAWA5sDdJTbrXA1/3OaesGBAO3sI= ;{id = 2854}
SECTION ADDITIONAL
ns.example.com. IN A 1.2.3.4
ns.example.com. 3600 IN RRSIG A 3 3 3600 20070926135752 20070829135752 2854 example.com. MC0CFQCMSWxVehgOQLoYclB9PIAbNP229AIUeH0vNNGJhjnZiqgIOKvs1EhzqAo= ;{id = 2854}
ENTRY_END
; response to DNSKEY priming query
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
example.com. IN DNSKEY
SECTION ANSWER
example.com. 3600 IN DNSKEY 256 3 3 ALXLUsWqUrY3JYER3T4TBJII s70j+sDS/UT2QRp61SE7S3E EXopNXoFE73JLRmvpi/UrOO/Vz4Se 6wXv/CYCKjGw06U4WRgR YXcpEhJROyNapmdIKSx hOzfLVE1gqA0PweZR8d tY3aNQSRn3sPpwJr6Mi /PqQKAMMrZ9ckJpf1+b QMOOvxgzz2U1GS18b3y ZKcgTMEaJzd/GZYzi/B N2DzQ0MsrSwYXfsNLFO Bbs8PJMW4LYIxeeOe6rUgkWOF 7CC9Dh/dduQ1QrsJhmZAEFfd6ByYV+ ;{id = 2854 (zsk), size = 1688b}
example.com. 3600 IN RRSIG DNSKEY DSA 2 3600 20070926134150 20070829134150 2854 example.com. MCwCFBQRtlR4BEv9ohi+PGFjp+AHsJuHAhRCvz0shggvnvI88DFnBDCczHUcVA== ;{id = 2854}
SECTION AUTHORITY
example.com. IN NS ns.example.com.
example.com. 3600 IN RRSIG NS 3 2 3600 20070926134150 20070829134150 2854 example.com. MC0CFQCN+qHdJxoI/2tNKwsb08pra/G7aAIUAWA5sDdJTbrXA1/3OaesGBAO3sI= ;{id = 2854}
SECTION ADDITIONAL
ns.example.com. IN A 1.2.3.4
ns.example.com. 3600 IN RRSIG A 3 3 3600 20070926135752 20070829135752 2854 example.com. MC0CFQCMSWxVehgOQLoYclB9PIAbNP229AIUeH0vNNGJhjnZiqgIOKvs1EhzqAo= ;{id = 2854}
ENTRY_END
; response to query of interest
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
www.example.com. IN A
SECTION ANSWER
www.example.com. 3600 IN CNAME www.example.net.
www.example.com. 3600 IN RRSIG CNAME 3 2 3600 20070926134150 20070829134150 2854 example.com. MC0CFDwBErFx90ixZDOdIsKz1QaXA1WzAhUAprOUlV1d5fmUiOp7DZ0TWWcM81Q= ;{id = 2854}
SECTION AUTHORITY
u.example.com. IN NSEC z.example.com. NSEC RRSIG
u.example.com. 3600 IN RRSIG NSEC 3 3 3600 20070926134150 20070829134150 2854 example.com. MCwCFCdc/AWOi3BbYLOClSaw7uVkEf0/AhRJLUUXhuvEsdxEXESjotO3tJZyog== ;{id = 2854}
SECTION ADDITIONAL
ENTRY_END
RANGE_END
; ns.example.net.
RANGE_BEGIN 0 100
ADDRESS 1.2.3.5
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
example.net. IN NS
SECTION ANSWER
example.net. IN NS ns.example.net.
example.net. 3600 IN RRSIG NS RSASHA1 2 3600 20070926134150 20070829134150 30899 example.net. E8JX0l4B+cSR5bkHQwOJy1pBmlLMTYCJ8EwfNMU/eCv0YhKwo26rHhn52FGisgv+Nwp7/NbhHqQ+kJgoZC94XA== ;{id = 30899}
SECTION ADDITIONAL
ns.example.net. IN A 1.2.3.5
ns.example.net. 3600 IN RRSIG A RSASHA1 3 3600 20070926134150 20070829134150 30899 example.net. x+tQMC9FhzT7Fcy1pM5NrOC7E8nLd7THPI3C6ie4EwL8PrxllqlR3q/DKB0d/m0qCOPcgN6HFOYURV1s4uAcsw== ;{id = 30899}
ENTRY_END
; response to DNSKEY priming query
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
example.net. IN DNSKEY
SECTION ANSWER
example.net. 3600 IN DNSKEY 256 3 5 AQPQ41chR9DEHt/aIzIFAqanbDlRflJoRs5yz1jFsoRIT7dWf0r+PeDuewdxkszNH6wnU4QL8pfKFRh5PIYVBLK3 ;{id = 30899 (zsk), size = 512b}
example.net. 3600 IN RRSIG DNSKEY RSASHA1 2 3600 20070926134150 20070829134150 30899 example.net. hiFzlQ8VoYgCuvIsfVuxC3mfJDqsTh0yc6abs5xMx5uEcIjb0dndFQx7INOM+imlzveEN73Hqp4OLFpFhsWLlw== ;{id = 30899}
SECTION AUTHORITY
example.net. IN NS ns.example.net.
example.net. 3600 IN RRSIG NS RSASHA1 2 3600 20070926134150 20070829134150 30899 example.net. E8JX0l4B+cSR5bkHQwOJy1pBmlLMTYCJ8EwfNMU/eCv0YhKwo26rHhn52FGisgv+Nwp7/NbhHqQ+kJgoZC94XA== ;{id = 30899}
SECTION ADDITIONAL
ns.example.net. IN A 1.2.3.5
ns.example.net. 3600 IN RRSIG A RSASHA1 3 3600 20070926134150 20070829134150 30899 example.net. x+tQMC9FhzT7Fcy1pM5NrOC7E8nLd7THPI3C6ie4EwL8PrxllqlR3q/DKB0d/m0qCOPcgN6HFOYURV1s4uAcsw== ;{id = 30899}
ENTRY_END
; response to query of interest
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
www.example.net. IN A
SECTION ANSWER
SECTION AUTHORITY
www.example.net. IN NSEC example.net. MX NSEC RRSIG
www.example.net. 3600 IN RRSIG NSEC 5 3 3600 20070926134150 20070829134150 30899 example.net. Z+3/WKJEqhWoMOQLC7Yb1dTVGaqzmU0bZ2cH9jSfNQZiT0O37yzCNNUmMsW4gsJOh3o61iZ+hxpze3aO3aedqQ== ;{id = 30899}
SECTION ADDITIONAL
ENTRY_END
RANGE_END
STEP 1 QUERY
ENTRY_BEGIN
REPLY RD DO
SECTION QUESTION
www.example.com. IN A
ENTRY_END
; recursion happens here.
STEP 10 CHECK_ANSWER
ENTRY_BEGIN
MATCH all
REPLY QR RD RA AD NOERROR
SECTION QUESTION
www.example.com. IN A
SECTION ANSWER
www.example.com. IN CNAME www.example.net.
www.example.com. 3600 IN RRSIG CNAME 3 2 3600 20070926134150 20070829134150 2854 example.com. MC0CFDwBErFx90ixZDOdIsKz1QaXA1WzAhUAprOUlV1d5fmUiOp7DZ0TWWcM81Q= ;{id = 2854}
SECTION AUTHORITY
u.example.com. IN NSEC z.example.com. NSEC RRSIG
u.example.com. 3600 IN RRSIG NSEC 3 3 3600 20070926134150 20070829134150 2854 example.com. MCwCFCdc/AWOi3BbYLOClSaw7uVkEf0/AhRJLUUXhuvEsdxEXESjotO3tJZyog== ;{id = 2854}
www.example.net. IN NSEC example.net. MX NSEC RRSIG
www.example.net. 3600 IN RRSIG NSEC 5 3 3600 20070926134150 20070829134150 30899 example.net. Z+3/WKJEqhWoMOQLC7Yb1dTVGaqzmU0bZ2cH9jSfNQZiT0O37yzCNNUmMsW4gsJOh3o61iZ+hxpze3aO3aedqQ== ;{id = 30899}
SECTION ADDITIONAL
ENTRY_END
SCENARIO_END
dnssecjava-1.1.3/src/test/resources/unbound/val_cnamewctonx.rpl 0000664 0000000 0000000 00000020625 13020541473 0025002 0 ustar 00root root 0000000 0000000 ; config options
; The island of trust is at example.com
server:
trust-anchor: "example.com. 3600 IN DS 2854 3 1 46e4ffc6e9a4793b488954bd3f0cc6af0dfb201b"
trust-anchor: "example.net. 3600 IN DNSKEY 256 3 5 AQPQ41chR9DEHt/aIzIFAqanbDlRflJoRs5yz1jFsoRIT7dWf0r+PeDuewdxkszNH6wnU4QL8pfKFRh5PIYVBLK3 ;{id = 30899 (zsk), size = 512b}"
val-override-date: "20070916134226"
target-fetch-policy: "0 0 0 0 0"
stub-zone:
name: "."
stub-addr: 193.0.14.129 # K.ROOT-SERVERS.NET.
CONFIG_END
SCENARIO_BEGIN Test validator with wildcard cname to nxdomain
; K.ROOT-SERVERS.NET.
RANGE_BEGIN 0 100
ADDRESS 193.0.14.129
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
. IN NS
SECTION ANSWER
. IN NS K.ROOT-SERVERS.NET.
SECTION ADDITIONAL
K.ROOT-SERVERS.NET. IN A 193.0.14.129
ENTRY_END
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
www.example.com. IN A
SECTION AUTHORITY
com. IN NS a.gtld-servers.net.
SECTION ADDITIONAL
a.gtld-servers.net. IN A 192.5.6.30
ENTRY_END
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
www.example.net. IN A
SECTION AUTHORITY
net. IN NS a.gtld-servers.net.
SECTION ADDITIONAL
a.gtld-servers.net. IN A 192.5.6.30
ENTRY_END
RANGE_END
; a.gtld-servers.net.
RANGE_BEGIN 0 100
ADDRESS 192.5.6.30
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
com. IN NS
SECTION ANSWER
com. IN NS a.gtld-servers.net.
SECTION ADDITIONAL
a.gtld-servers.net. IN A 192.5.6.30
ENTRY_END
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
net. IN NS
SECTION ANSWER
net. IN NS a.gtld-servers.net.
SECTION ADDITIONAL
a.gtld-servers.net. IN A 192.5.6.30
ENTRY_END
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
www.example.com. IN A
SECTION AUTHORITY
example.com. IN NS ns.example.com.
SECTION ADDITIONAL
ns.example.com. IN A 1.2.3.4
ENTRY_END
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
www.example.net. IN A
SECTION AUTHORITY
example.net. IN NS ns.example.net.
SECTION ADDITIONAL
ns.example.net. IN A 1.2.3.5
ENTRY_END
RANGE_END
; ns.example.com.
RANGE_BEGIN 0 100
ADDRESS 1.2.3.4
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
example.com. IN NS
SECTION ANSWER
example.com. IN NS ns.example.com.
example.com. 3600 IN RRSIG NS 3 2 3600 20070926134150 20070829134150 2854 example.com. MC0CFQCN+qHdJxoI/2tNKwsb08pra/G7aAIUAWA5sDdJTbrXA1/3OaesGBAO3sI= ;{id = 2854}
SECTION ADDITIONAL
ns.example.com. IN A 1.2.3.4
ns.example.com. 3600 IN RRSIG A 3 3 3600 20070926135752 20070829135752 2854 example.com. MC0CFQCMSWxVehgOQLoYclB9PIAbNP229AIUeH0vNNGJhjnZiqgIOKvs1EhzqAo= ;{id = 2854}
ENTRY_END
; response to DNSKEY priming query
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
example.com. IN DNSKEY
SECTION ANSWER
example.com. 3600 IN DNSKEY 256 3 3 ALXLUsWqUrY3JYER3T4TBJII s70j+sDS/UT2QRp61SE7S3E EXopNXoFE73JLRmvpi/UrOO/Vz4Se 6wXv/CYCKjGw06U4WRgR YXcpEhJROyNapmdIKSx hOzfLVE1gqA0PweZR8d tY3aNQSRn3sPpwJr6Mi /PqQKAMMrZ9ckJpf1+b QMOOvxgzz2U1GS18b3y ZKcgTMEaJzd/GZYzi/B N2DzQ0MsrSwYXfsNLFO Bbs8PJMW4LYIxeeOe6rUgkWOF 7CC9Dh/dduQ1QrsJhmZAEFfd6ByYV+ ;{id = 2854 (zsk), size = 1688b}
example.com. 3600 IN RRSIG DNSKEY DSA 2 3600 20070926134150 20070829134150 2854 example.com. MCwCFBQRtlR4BEv9ohi+PGFjp+AHsJuHAhRCvz0shggvnvI88DFnBDCczHUcVA== ;{id = 2854}
SECTION AUTHORITY
example.com. IN NS ns.example.com.
example.com. 3600 IN RRSIG NS 3 2 3600 20070926134150 20070829134150 2854 example.com. MC0CFQCN+qHdJxoI/2tNKwsb08pra/G7aAIUAWA5sDdJTbrXA1/3OaesGBAO3sI= ;{id = 2854}
SECTION ADDITIONAL
ns.example.com. IN A 1.2.3.4
ns.example.com. 3600 IN RRSIG A 3 3 3600 20070926135752 20070829135752 2854 example.com. MC0CFQCMSWxVehgOQLoYclB9PIAbNP229AIUeH0vNNGJhjnZiqgIOKvs1EhzqAo= ;{id = 2854}
ENTRY_END
; response to query of interest
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
www.example.com. IN A
SECTION ANSWER
www.example.com. 3600 IN CNAME www.example.net.
www.example.com. 3600 IN RRSIG CNAME 3 2 3600 20070926134150 20070829134150 2854 example.com. MC0CFDwBErFx90ixZDOdIsKz1QaXA1WzAhUAprOUlV1d5fmUiOp7DZ0TWWcM81Q= ;{id = 2854}
SECTION AUTHORITY
u.example.com. IN NSEC z.example.com. NSEC RRSIG
u.example.com. 3600 IN RRSIG NSEC 3 3 3600 20070926134150 20070829134150 2854 example.com. MCwCFCdc/AWOi3BbYLOClSaw7uVkEf0/AhRJLUUXhuvEsdxEXESjotO3tJZyog== ;{id = 2854}
SECTION ADDITIONAL
ENTRY_END
RANGE_END
; ns.example.net.
RANGE_BEGIN 0 100
ADDRESS 1.2.3.5
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
example.net. IN NS
SECTION ANSWER
example.net. IN NS ns.example.net.
example.net. 3600 IN RRSIG NS RSASHA1 2 3600 20070926134150 20070829134150 30899 example.net. E8JX0l4B+cSR5bkHQwOJy1pBmlLMTYCJ8EwfNMU/eCv0YhKwo26rHhn52FGisgv+Nwp7/NbhHqQ+kJgoZC94XA== ;{id = 30899}
SECTION ADDITIONAL
ns.example.net. IN A 1.2.3.5
ns.example.net. 3600 IN RRSIG A RSASHA1 3 3600 20070926134150 20070829134150 30899 example.net. x+tQMC9FhzT7Fcy1pM5NrOC7E8nLd7THPI3C6ie4EwL8PrxllqlR3q/DKB0d/m0qCOPcgN6HFOYURV1s4uAcsw== ;{id = 30899}
ENTRY_END
; response to DNSKEY priming query
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
example.net. IN DNSKEY
SECTION ANSWER
example.net. 3600 IN DNSKEY 256 3 5 AQPQ41chR9DEHt/aIzIFAqanbDlRflJoRs5yz1jFsoRIT7dWf0r+PeDuewdxkszNH6wnU4QL8pfKFRh5PIYVBLK3 ;{id = 30899 (zsk), size = 512b}
example.net. 3600 IN RRSIG DNSKEY RSASHA1 2 3600 20070926134150 20070829134150 30899 example.net. hiFzlQ8VoYgCuvIsfVuxC3mfJDqsTh0yc6abs5xMx5uEcIjb0dndFQx7INOM+imlzveEN73Hqp4OLFpFhsWLlw== ;{id = 30899}
SECTION AUTHORITY
example.net. IN NS ns.example.net.
example.net. 3600 IN RRSIG NS RSASHA1 2 3600 20070926134150 20070829134150 30899 example.net. E8JX0l4B+cSR5bkHQwOJy1pBmlLMTYCJ8EwfNMU/eCv0YhKwo26rHhn52FGisgv+Nwp7/NbhHqQ+kJgoZC94XA== ;{id = 30899}
SECTION ADDITIONAL
ns.example.net. IN A 1.2.3.5
ns.example.net. 3600 IN RRSIG A RSASHA1 3 3600 20070926134150 20070829134150 30899 example.net. x+tQMC9FhzT7Fcy1pM5NrOC7E8nLd7THPI3C6ie4EwL8PrxllqlR3q/DKB0d/m0qCOPcgN6HFOYURV1s4uAcsw== ;{id = 30899}
ENTRY_END
; response to query of interest
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NXDOMAIN
SECTION QUESTION
www.example.net. IN A
SECTION ANSWER
SECTION AUTHORITY
example.net. IN NSEC abc.example.net. SOA NS DNSKEY NSEC RRSIG
example.net. 3600 IN RRSIG NSEC 5 2 3600 20070926134150 20070829134150 30899 example.net. SEHthmjHyqGlzaOp3Dx6Jn5Fnvvtknw/IF6YSFY8NZLe+YSh1oRJbdEkQ8G92IT08n1jSN6jvKRsFBOUoFOQAw== ;{id = 30899}
wab.example.net. IN NSEC wzz.example.net. A NSEC RRSIG
wab.example.net. 3600 IN RRSIG NSEC 5 3 3600 20070926134150 20070829134150 30899 example.net. gl8vkI3xfSWx4Pyv5OdOthiewE6u/13kclY7UG9ptuFBddamdJO3RQqyxM6Xcmq+ToO4kMCCyaKijp01gTDoGg== ;{id = 30899}
SECTION ADDITIONAL
ENTRY_END
RANGE_END
STEP 1 QUERY
ENTRY_BEGIN
REPLY RD DO
SECTION QUESTION
www.example.com. IN A
ENTRY_END
; recursion happens here.
STEP 10 CHECK_ANSWER
ENTRY_BEGIN
MATCH all
REPLY QR RD RA AD NXDOMAIN
SECTION QUESTION
www.example.com. IN A
SECTION ANSWER
www.example.com. IN CNAME www.example.net.
www.example.com. 3600 IN RRSIG CNAME 3 2 3600 20070926134150 20070829134150 2854 example.com. MC0CFDwBErFx90ixZDOdIsKz1QaXA1WzAhUAprOUlV1d5fmUiOp7DZ0TWWcM81Q= ;{id = 2854}
SECTION AUTHORITY
u.example.com. IN NSEC z.example.com. NSEC RRSIG
u.example.com. 3600 IN RRSIG NSEC 3 3 3600 20070926134150 20070829134150 2854 example.com. MCwCFCdc/AWOi3BbYLOClSaw7uVkEf0/AhRJLUUXhuvEsdxEXESjotO3tJZyog== ;{id = 2854}
example.net. IN NSEC abc.example.net. SOA NS DNSKEY NSEC RRSIG
example.net. 3600 IN RRSIG NSEC 5 2 3600 20070926134150 20070829134150 30899 example.net. SEHthmjHyqGlzaOp3Dx6Jn5Fnvvtknw/IF6YSFY8NZLe+YSh1oRJbdEkQ8G92IT08n1jSN6jvKRsFBOUoFOQAw== ;{id = 30899}
wab.example.net. IN NSEC wzz.example.net. A NSEC RRSIG
wab.example.net. 3600 IN RRSIG NSEC 5 3 3600 20070926134150 20070829134150 30899 example.net. gl8vkI3xfSWx4Pyv5OdOthiewE6u/13kclY7UG9ptuFBddamdJO3RQqyxM6Xcmq+ToO4kMCCyaKijp01gTDoGg== ;{id = 30899}
SECTION ADDITIONAL
ENTRY_END
SCENARIO_END
dnssecjava-1.1.3/src/test/resources/unbound/val_cnamewctoposwc.rpl 0000664 0000000 0000000 00000021044 13020541473 0025504 0 ustar 00root root 0000000 0000000 ; config options
; The island of trust is at example.com
server:
trust-anchor: "example.com. 3600 IN DS 2854 3 1 46e4ffc6e9a4793b488954bd3f0cc6af0dfb201b"
trust-anchor: "example.net. 3600 IN DNSKEY 256 3 5 AQPQ41chR9DEHt/aIzIFAqanbDlRflJoRs5yz1jFsoRIT7dWf0r+PeDuewdxkszNH6wnU4QL8pfKFRh5PIYVBLK3 ;{id = 30899 (zsk), size = 512b}"
val-override-date: "20070916134226"
target-fetch-policy: "0 0 0 0 0"
stub-zone:
name: "."
stub-addr: 193.0.14.129 # K.ROOT-SERVERS.NET.
CONFIG_END
SCENARIO_BEGIN Test validator with wildcard cname to positive wildcard
; K.ROOT-SERVERS.NET.
RANGE_BEGIN 0 100
ADDRESS 193.0.14.129
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
. IN NS
SECTION ANSWER
. IN NS K.ROOT-SERVERS.NET.
SECTION ADDITIONAL
K.ROOT-SERVERS.NET. IN A 193.0.14.129
ENTRY_END
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
www.example.com. IN A
SECTION AUTHORITY
com. IN NS a.gtld-servers.net.
SECTION ADDITIONAL
a.gtld-servers.net. IN A 192.5.6.30
ENTRY_END
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
www.example.net. IN A
SECTION AUTHORITY
net. IN NS a.gtld-servers.net.
SECTION ADDITIONAL
a.gtld-servers.net. IN A 192.5.6.30
ENTRY_END
RANGE_END
; a.gtld-servers.net.
RANGE_BEGIN 0 100
ADDRESS 192.5.6.30
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
com. IN NS
SECTION ANSWER
com. IN NS a.gtld-servers.net.
SECTION ADDITIONAL
a.gtld-servers.net. IN A 192.5.6.30
ENTRY_END
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
net. IN NS
SECTION ANSWER
net. IN NS a.gtld-servers.net.
SECTION ADDITIONAL
a.gtld-servers.net. IN A 192.5.6.30
ENTRY_END
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
www.example.com. IN A
SECTION AUTHORITY
example.com. IN NS ns.example.com.
SECTION ADDITIONAL
ns.example.com. IN A 1.2.3.4
ENTRY_END
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
www.example.net. IN A
SECTION AUTHORITY
example.net. IN NS ns.example.net.
SECTION ADDITIONAL
ns.example.net. IN A 1.2.3.5
ENTRY_END
RANGE_END
; ns.example.com.
RANGE_BEGIN 0 100
ADDRESS 1.2.3.4
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
example.com. IN NS
SECTION ANSWER
example.com. IN NS ns.example.com.
example.com. 3600 IN RRSIG NS 3 2 3600 20070926134150 20070829134150 2854 example.com. MC0CFQCN+qHdJxoI/2tNKwsb08pra/G7aAIUAWA5sDdJTbrXA1/3OaesGBAO3sI= ;{id = 2854}
SECTION ADDITIONAL
ns.example.com. IN A 1.2.3.4
ns.example.com. 3600 IN RRSIG A 3 3 3600 20070926135752 20070829135752 2854 example.com. MC0CFQCMSWxVehgOQLoYclB9PIAbNP229AIUeH0vNNGJhjnZiqgIOKvs1EhzqAo= ;{id = 2854}
ENTRY_END
; response to DNSKEY priming query
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
example.com. IN DNSKEY
SECTION ANSWER
example.com. 3600 IN DNSKEY 256 3 3 ALXLUsWqUrY3JYER3T4TBJII s70j+sDS/UT2QRp61SE7S3E EXopNXoFE73JLRmvpi/UrOO/Vz4Se 6wXv/CYCKjGw06U4WRgR YXcpEhJROyNapmdIKSx hOzfLVE1gqA0PweZR8d tY3aNQSRn3sPpwJr6Mi /PqQKAMMrZ9ckJpf1+b QMOOvxgzz2U1GS18b3y ZKcgTMEaJzd/GZYzi/B N2DzQ0MsrSwYXfsNLFO Bbs8PJMW4LYIxeeOe6rUgkWOF 7CC9Dh/dduQ1QrsJhmZAEFfd6ByYV+ ;{id = 2854 (zsk), size = 1688b}
example.com. 3600 IN RRSIG DNSKEY DSA 2 3600 20070926134150 20070829134150 2854 example.com. MCwCFBQRtlR4BEv9ohi+PGFjp+AHsJuHAhRCvz0shggvnvI88DFnBDCczHUcVA== ;{id = 2854}
SECTION AUTHORITY
example.com. IN NS ns.example.com.
example.com. 3600 IN RRSIG NS 3 2 3600 20070926134150 20070829134150 2854 example.com. MC0CFQCN+qHdJxoI/2tNKwsb08pra/G7aAIUAWA5sDdJTbrXA1/3OaesGBAO3sI= ;{id = 2854}
SECTION ADDITIONAL
ns.example.com. IN A 1.2.3.4
ns.example.com. 3600 IN RRSIG A 3 3 3600 20070926135752 20070829135752 2854 example.com. MC0CFQCMSWxVehgOQLoYclB9PIAbNP229AIUeH0vNNGJhjnZiqgIOKvs1EhzqAo= ;{id = 2854}
ENTRY_END
; response to query of interest
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
www.example.com. IN A
SECTION ANSWER
; *.example.com. IN CNAME www.example.net.
www.example.com. 3600 IN CNAME www.example.net.
www.example.com. 3600 IN RRSIG CNAME 3 2 3600 20070926134150 20070829134150 2854 example.com. MCwCFCA2HhM4cInPoUZ58o6t9CVlqv+kAhRjxWXvnFecgDxnDphpEVEoc0Ps6Q== ;{id = 2854}
SECTION AUTHORITY
; weird NSEC that denies everything. But validly signed, so valid.
; extreme version of 'white lies' :-)
example.com. IN NSEC example.com. SOA NS A NSEC RRSIG DNSKEY
example.com. 3600 IN RRSIG NSEC 3 2 3600 20070926134150 20070829134150 2854 example.com. MC0CFQCSPaRH721mYjuTGb6fZ+nR3pnVxAIUAxEctE1hzMQSw0CWJSMLHS/A+Xk= ;{id = 2854}
SECTION ADDITIONAL
ENTRY_END
RANGE_END
; ns.example.net.
RANGE_BEGIN 0 100
ADDRESS 1.2.3.5
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
example.net. IN NS
SECTION ANSWER
example.net. IN NS ns.example.net.
example.net. 3600 IN RRSIG NS RSASHA1 2 3600 20070926134150 20070829134150 30899 example.net. E8JX0l4B+cSR5bkHQwOJy1pBmlLMTYCJ8EwfNMU/eCv0YhKwo26rHhn52FGisgv+Nwp7/NbhHqQ+kJgoZC94XA== ;{id = 30899}
SECTION ADDITIONAL
ns.example.net. IN A 1.2.3.5
ns.example.net. 3600 IN RRSIG A RSASHA1 3 3600 20070926134150 20070829134150 30899 example.net. x+tQMC9FhzT7Fcy1pM5NrOC7E8nLd7THPI3C6ie4EwL8PrxllqlR3q/DKB0d/m0qCOPcgN6HFOYURV1s4uAcsw== ;{id = 30899}
ENTRY_END
; response to DNSKEY priming query
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
example.net. IN DNSKEY
SECTION ANSWER
example.net. 3600 IN DNSKEY 256 3 5 AQPQ41chR9DEHt/aIzIFAqanbDlRflJoRs5yz1jFsoRIT7dWf0r+PeDuewdxkszNH6wnU4QL8pfKFRh5PIYVBLK3 ;{id = 30899 (zsk), size = 512b}
example.net. 3600 IN RRSIG DNSKEY RSASHA1 2 3600 20070926134150 20070829134150 30899 example.net. hiFzlQ8VoYgCuvIsfVuxC3mfJDqsTh0yc6abs5xMx5uEcIjb0dndFQx7INOM+imlzveEN73Hqp4OLFpFhsWLlw== ;{id = 30899}
SECTION AUTHORITY
example.net. IN NS ns.example.net.
example.net. 3600 IN RRSIG NS RSASHA1 2 3600 20070926134150 20070829134150 30899 example.net. E8JX0l4B+cSR5bkHQwOJy1pBmlLMTYCJ8EwfNMU/eCv0YhKwo26rHhn52FGisgv+Nwp7/NbhHqQ+kJgoZC94XA== ;{id = 30899}
SECTION ADDITIONAL
ns.example.net. IN A 1.2.3.5
ns.example.net. 3600 IN RRSIG A RSASHA1 3 3600 20070926134150 20070829134150 30899 example.net. x+tQMC9FhzT7Fcy1pM5NrOC7E8nLd7THPI3C6ie4EwL8PrxllqlR3q/DKB0d/m0qCOPcgN6HFOYURV1s4uAcsw== ;{id = 30899}
ENTRY_END
; response to query of interest
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
www.example.net. IN A
SECTION ANSWER
; from *.example.net.
www.example.net. IN A 11.12.13.14
www.example.net. 3600 IN RRSIG A 5 2 3600 20070926134150 20070829134150 30899 example.net. quSyDbSeHRvyMmanqq5rW+APC9MKOswbRLB5QP/G+C2iyokQFLuRTlX9Wmo/jo1Oo1MGBefJUmP9NdRd2EqABA== ;{id = 30899}
SECTION AUTHORITY
wab.example.net. IN NSEC wzz.example.net. A NSEC RRSIG
wab.example.net. 3600 IN RRSIG NSEC 5 3 3600 20070926134150 20070829134150 30899 example.net. gl8vkI3xfSWx4Pyv5OdOthiewE6u/13kclY7UG9ptuFBddamdJO3RQqyxM6Xcmq+ToO4kMCCyaKijp01gTDoGg== ;{id = 30899}
SECTION ADDITIONAL
ENTRY_END
RANGE_END
STEP 1 QUERY
ENTRY_BEGIN
REPLY RD DO
SECTION QUESTION
www.example.com. IN A
ENTRY_END
; recursion happens here.
STEP 10 CHECK_ANSWER
ENTRY_BEGIN
MATCH all
REPLY QR RD RA AD NOERROR
SECTION QUESTION
www.example.com. IN A
SECTION ANSWER
www.example.com. IN CNAME www.example.net.
www.example.com. 3600 IN RRSIG CNAME 3 2 3600 20070926134150 20070829134150 2854 example.com. MCwCFCA2HhM4cInPoUZ58o6t9CVlqv+kAhRjxWXvnFecgDxnDphpEVEoc0Ps6Q== ;{id = 2854}
www.example.net. IN A 11.12.13.14
www.example.net. 3600 IN RRSIG A 5 2 3600 20070926134150 20070829134150 30899 example.net. quSyDbSeHRvyMmanqq5rW+APC9MKOswbRLB5QP/G+C2iyokQFLuRTlX9Wmo/jo1Oo1MGBefJUmP9NdRd2EqABA== ;{id = 30899}
SECTION AUTHORITY
example.com. IN NSEC example.com. SOA NS A NSEC RRSIG DNSKEY
example.com. 3600 IN RRSIG NSEC 3 2 3600 20070926134150 20070829134150 2854 example.com. MC0CFQCSPaRH721mYjuTGb6fZ+nR3pnVxAIUAxEctE1hzMQSw0CWJSMLHS/A+Xk= ;{id = 2854}
wab.example.net. IN NSEC wzz.example.net. A NSEC RRSIG
wab.example.net. 3600 IN RRSIG NSEC 5 3 3600 20070926134150 20070829134150 30899 example.net. gl8vkI3xfSWx4Pyv5OdOthiewE6u/13kclY7UG9ptuFBddamdJO3RQqyxM6Xcmq+ToO4kMCCyaKijp01gTDoGg== ;{id = 30899}
SECTION ADDITIONAL
ENTRY_END
SCENARIO_END
dnssecjava-1.1.3/src/test/resources/unbound/val_dnametoolong.rpl 0000664 0000000 0000000 00000020330 13020541473 0025133 0 ustar 00root root 0000000 0000000 ; config options
; The island of trust is at example.com
server:
trust-anchor: "example.com. 3600 IN DS 2854 3 1 46e4ffc6e9a4793b488954bd3f0cc6af0dfb201b"
trust-anchor: "example.net. 3600 IN DNSKEY 256 3 5 AQPQ41chR9DEHt/aIzIFAqanbDlRflJoRs5yz1jFsoRIT7dWf0r+PeDuewdxkszNH6wnU4QL8pfKFRh5PIYVBLK3 ;{id = 30899 (zsk), size = 512b}"
val-override-date: "20070916134226"
target-fetch-policy: "0 0 0 0 0"
stub-zone:
name: "."
stub-addr: 193.0.14.129 # K.ROOT-SERVERS.NET.
CONFIG_END
SCENARIO_BEGIN Test validator with a dname too long response
; K.ROOT-SERVERS.NET.
RANGE_BEGIN 0 100
ADDRESS 193.0.14.129
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
. IN NS
SECTION ANSWER
. IN NS K.ROOT-SERVERS.NET.
SECTION ADDITIONAL
K.ROOT-SERVERS.NET. IN A 193.0.14.129
ENTRY_END
ENTRY_BEGIN
MATCH opcode subdomain
ADJUST copy_id copy_query
REPLY QR NOERROR
SECTION QUESTION
com. IN A
SECTION AUTHORITY
com. IN NS a.gtld-servers.net.
SECTION ADDITIONAL
a.gtld-servers.net. IN A 192.5.6.30
ENTRY_END
ENTRY_BEGIN
MATCH opcode subdomain
ADJUST copy_id copy_query
REPLY QR NOERROR
SECTION QUESTION
net. IN A
SECTION AUTHORITY
net. IN NS a.gtld-servers.net.
SECTION ADDITIONAL
a.gtld-servers.net. IN A 192.5.6.30
ENTRY_END
RANGE_END
; a.gtld-servers.net.
RANGE_BEGIN 0 100
ADDRESS 192.5.6.30
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
com. IN NS
SECTION ANSWER
com. IN NS a.gtld-servers.net.
SECTION ADDITIONAL
a.gtld-servers.net. IN A 192.5.6.30
ENTRY_END
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
net. IN NS
SECTION ANSWER
net. IN NS a.gtld-servers.net.
SECTION ADDITIONAL
a.gtld-servers.net. IN A 192.5.6.30
ENTRY_END
ENTRY_BEGIN
MATCH opcode subdomain
ADJUST copy_id copy_query
REPLY QR NOERROR
SECTION QUESTION
example.com. IN A
SECTION AUTHORITY
example.com. IN NS ns.example.com.
SECTION ADDITIONAL
ns.example.com. IN A 1.2.3.4
ENTRY_END
ENTRY_BEGIN
MATCH opcode subdomain
ADJUST copy_id copy_query
REPLY QR NOERROR
SECTION QUESTION
example.net. IN A
SECTION AUTHORITY
example.net. IN NS ns.example.net.
SECTION ADDITIONAL
ns.example.net. IN A 1.2.3.5
ENTRY_END
RANGE_END
; ns.example.com.
RANGE_BEGIN 0 100
ADDRESS 1.2.3.4
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
example.com. IN NS
SECTION ANSWER
example.com. IN NS ns.example.com.
example.com. 3600 IN RRSIG NS 3 2 3600 20070926134150 20070829134150 2854 example.com. MC0CFQCN+qHdJxoI/2tNKwsb08pra/G7aAIUAWA5sDdJTbrXA1/3OaesGBAO3sI= ;{id = 2854}
SECTION ADDITIONAL
ns.example.com. IN A 1.2.3.4
ns.example.com. 3600 IN RRSIG A 3 3 3600 20070926135752 20070829135752 2854 example.com. MC0CFQCMSWxVehgOQLoYclB9PIAbNP229AIUeH0vNNGJhjnZiqgIOKvs1EhzqAo= ;{id = 2854}
ENTRY_END
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
ns.example.com. IN A
SECTION ANSWER
ns.example.com. IN A 1.2.3.4
ns.example.com. 3600 IN RRSIG A 3 3 3600 20070926135752 20070829135752 2854 example.com. MC0CFQCMSWxVehgOQLoYclB9PIAbNP229AIUeH0vNNGJhjnZiqgIOKvs1EhzqAo= ;{id = 2854}
SECTION AUTHORITY
example.com. IN NS ns.example.com.
example.com. 3600 IN RRSIG NS 3 2 3600 20070926134150 20070829134150 2854 example.com. MC0CFQCN+qHdJxoI/2tNKwsb08pra/G7aAIUAWA5sDdJTbrXA1/3OaesGBAO3sI= ;{id = 2854}
ENTRY_END
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
ns.example.com. IN AAAA
SECTION ANSWER
ENTRY_END
; response to DNSKEY priming query
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
example.com. IN DNSKEY
SECTION ANSWER
example.com. 3600 IN DNSKEY 256 3 3 ALXLUsWqUrY3JYER3T4TBJII s70j+sDS/UT2QRp61SE7S3E EXopNXoFE73JLRmvpi/UrOO/Vz4Se 6wXv/CYCKjGw06U4WRgR YXcpEhJROyNapmdIKSx hOzfLVE1gqA0PweZR8d tY3aNQSRn3sPpwJr6Mi /PqQKAMMrZ9ckJpf1+b QMOOvxgzz2U1GS18b3y ZKcgTMEaJzd/GZYzi/B N2DzQ0MsrSwYXfsNLFO Bbs8PJMW4LYIxeeOe6rUgkWOF 7CC9Dh/dduQ1QrsJhmZAEFfd6ByYV+ ;{id = 2854 (zsk), size = 1688b}
example.com. 3600 IN RRSIG DNSKEY DSA 2 3600 20070926134150 20070829134150 2854 example.com. MCwCFBQRtlR4BEv9ohi+PGFjp+AHsJuHAhRCvz0shggvnvI88DFnBDCczHUcVA== ;{id = 2854}
SECTION AUTHORITY
example.com. IN NS ns.example.com.
example.com. 3600 IN RRSIG NS 3 2 3600 20070926134150 20070829134150 2854 example.com. MC0CFQCN+qHdJxoI/2tNKwsb08pra/G7aAIUAWA5sDdJTbrXA1/3OaesGBAO3sI= ;{id = 2854}
SECTION ADDITIONAL
ns.example.com. IN A 1.2.3.4
ns.example.com. 3600 IN RRSIG A 3 3 3600 20070926135752 20070829135752 2854 example.com. MC0CFQCMSWxVehgOQLoYclB9PIAbNP229AIUeH0vNNGJhjnZiqgIOKvs1EhzqAo= ;{id = 2854}
ENTRY_END
; response to query of interest
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR YXDOMAIN
SECTION QUESTION
www.example.com. IN A
SECTION ANSWER
; length
; www. = 4
; long1234567890abcdef. = 21
; long1234567890abcdef.long1234567890abcdef.long1234567890abcdef.long1234567890abcdef.long1234567890abcdef.long1234567890abcdef.long1234567890abcdef.long1234567890abcdef.long1234567890abcdef.long1234567890abcdef.long1234567890abcdef.long1234567890abcdef. = 12 * 21 = 252
example.com. IN DNAME long1234567890abcdef.long1234567890abcdef.long1234567890abcdef.long1234567890abcdef.long1234567890abcdef.long1234567890abcdef.long1234567890abcdef.long1234567890abcdef.long1234567890abcdef.long1234567890abcdef.long1234567890abcdef.long1234567890abcdef.
example.com. 3600 IN RRSIG DNAME 3 2 3600 20070926134150 20070829134150 2854 example.com. MC0CFBdWQE6lzktCN4vdAx9HY1zZe6dYAhUAghsHM4lSJAykdvp5p0wppml03K0= ;{id = 2854}
; unsigned CNAME synthesis is too long
SECTION AUTHORITY
SECTION ADDITIONAL
ENTRY_END
RANGE_END
; ns.example.net.
RANGE_BEGIN 0 100
ADDRESS 1.2.3.5
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
example.net. IN NS
SECTION ANSWER
example.net. IN NS ns.example.net.
example.net. 3600 IN RRSIG NS RSASHA1 2 3600 20070926134150 20070829134150 30899 example.net. E8JX0l4B+cSR5bkHQwOJy1pBmlLMTYCJ8EwfNMU/eCv0YhKwo26rHhn52FGisgv+Nwp7/NbhHqQ+kJgoZC94XA== ;{id = 30899}
SECTION ADDITIONAL
ns.example.net. IN A 1.2.3.5
ns.example.net. 3600 IN RRSIG A RSASHA1 3 3600 20070926134150 20070829134150 30899 example.net. x+tQMC9FhzT7Fcy1pM5NrOC7E8nLd7THPI3C6ie4EwL8PrxllqlR3q/DKB0d/m0qCOPcgN6HFOYURV1s4uAcsw== ;{id = 30899}
ENTRY_END
; response to DNSKEY priming query
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
example.net. IN DNSKEY
SECTION ANSWER
example.net. 3600 IN DNSKEY 256 3 5 AQPQ41chR9DEHt/aIzIFAqanbDlRflJoRs5yz1jFsoRIT7dWf0r+PeDuewdxkszNH6wnU4QL8pfKFRh5PIYVBLK3 ;{id = 30899 (zsk), size = 512b}
example.net. 3600 IN RRSIG DNSKEY RSASHA1 2 3600 20070926134150 20070829134150 30899 example.net. hiFzlQ8VoYgCuvIsfVuxC3mfJDqsTh0yc6abs5xMx5uEcIjb0dndFQx7INOM+imlzveEN73Hqp4OLFpFhsWLlw== ;{id = 30899}
SECTION AUTHORITY
example.net. IN NS ns.example.net.
example.net. 3600 IN RRSIG NS RSASHA1 2 3600 20070926134150 20070829134150 30899 example.net. E8JX0l4B+cSR5bkHQwOJy1pBmlLMTYCJ8EwfNMU/eCv0YhKwo26rHhn52FGisgv+Nwp7/NbhHqQ+kJgoZC94XA== ;{id = 30899}
SECTION ADDITIONAL
ns.example.net. IN A 1.2.3.5
ns.example.net. 3600 IN RRSIG A RSASHA1 3 3600 20070926134150 20070829134150 30899 example.net. x+tQMC9FhzT7Fcy1pM5NrOC7E8nLd7THPI3C6ie4EwL8PrxllqlR3q/DKB0d/m0qCOPcgN6HFOYURV1s4uAcsw== ;{id = 30899}
ENTRY_END
; response to query of interest
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
www.example.net. IN A
SECTION ANSWER
; from *.example.net.
www.example.net. IN A 11.12.13.14
www.example.net. 3600 IN RRSIG A 5 3 3600 20070926134150 20070829134150 30899 example.net. CPxF5hK9Kg5eT7W6LgZwr0ePYEm9HMcSY4vvqCS6gDWB4X9jvXLCfBkCLhsNybPBpGWlsLi5wM6MTdJXuPpsRA== ;{id = 30899}
SECTION AUTHORITY
SECTION ADDITIONAL
ENTRY_END
RANGE_END
STEP 1 QUERY
ENTRY_BEGIN
REPLY RD DO
SECTION QUESTION
www.example.com. IN A
ENTRY_END
; recursion happens here.
STEP 10 CHECK_ANSWER
ENTRY_BEGIN
MATCH all
REPLY QR RD RA SERVFAIL
SECTION QUESTION
www.example.com. IN A
SECTION ANSWER
SECTION AUTHORITY
SECTION ADDITIONAL
ENTRY_END
SCENARIO_END
dnssecjava-1.1.3/src/test/resources/unbound/val_dnametopos.rpl 0000664 0000000 0000000 00000017023 13020541473 0024623 0 ustar 00root root 0000000 0000000 ; config options
; The island of trust is at example.com
server:
trust-anchor: "example.com. 3600 IN DS 2854 3 1 46e4ffc6e9a4793b488954bd3f0cc6af0dfb201b"
trust-anchor: "example.net. 3600 IN DNSKEY 256 3 5 AQPQ41chR9DEHt/aIzIFAqanbDlRflJoRs5yz1jFsoRIT7dWf0r+PeDuewdxkszNH6wnU4QL8pfKFRh5PIYVBLK3 ;{id = 30899 (zsk), size = 512b}"
val-override-date: "20070916134226"
target-fetch-policy: "0 0 0 0 0"
stub-zone:
name: "."
stub-addr: 193.0.14.129 # K.ROOT-SERVERS.NET.
CONFIG_END
SCENARIO_BEGIN Test validator with a dname to positive
; K.ROOT-SERVERS.NET.
RANGE_BEGIN 0 100
ADDRESS 193.0.14.129
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
. IN NS
SECTION ANSWER
. IN NS K.ROOT-SERVERS.NET.
SECTION ADDITIONAL
K.ROOT-SERVERS.NET. IN A 193.0.14.129
ENTRY_END
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
www.example.com. IN A
SECTION AUTHORITY
com. IN NS a.gtld-servers.net.
SECTION ADDITIONAL
a.gtld-servers.net. IN A 192.5.6.30
ENTRY_END
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
www.example.net. IN A
SECTION AUTHORITY
net. IN NS a.gtld-servers.net.
SECTION ADDITIONAL
a.gtld-servers.net. IN A 192.5.6.30
ENTRY_END
RANGE_END
; a.gtld-servers.net.
RANGE_BEGIN 0 100
ADDRESS 192.5.6.30
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
com. IN NS
SECTION ANSWER
com. IN NS a.gtld-servers.net.
SECTION ADDITIONAL
a.gtld-servers.net. IN A 192.5.6.30
ENTRY_END
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
net. IN NS
SECTION ANSWER
net. IN NS a.gtld-servers.net.
SECTION ADDITIONAL
a.gtld-servers.net. IN A 192.5.6.30
ENTRY_END
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
www.example.com. IN A
SECTION AUTHORITY
example.com. IN NS ns.example.com.
SECTION ADDITIONAL
ns.example.com. IN A 1.2.3.4
ENTRY_END
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
www.example.net. IN A
SECTION AUTHORITY
example.net. IN NS ns.example.net.
SECTION ADDITIONAL
ns.example.net. IN A 1.2.3.5
ENTRY_END
RANGE_END
; ns.example.com.
RANGE_BEGIN 0 100
ADDRESS 1.2.3.4
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
example.com. IN NS
SECTION ANSWER
example.com. IN NS ns.example.com.
example.com. 3600 IN RRSIG NS 3 2 3600 20070926134150 20070829134150 2854 example.com. MC0CFQCN+qHdJxoI/2tNKwsb08pra/G7aAIUAWA5sDdJTbrXA1/3OaesGBAO3sI= ;{id = 2854}
SECTION ADDITIONAL
ns.example.com. IN A 1.2.3.4
ns.example.com. 3600 IN RRSIG A 3 3 3600 20070926135752 20070829135752 2854 example.com. MC0CFQCMSWxVehgOQLoYclB9PIAbNP229AIUeH0vNNGJhjnZiqgIOKvs1EhzqAo= ;{id = 2854}
ENTRY_END
; response to DNSKEY priming query
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
example.com. IN DNSKEY
SECTION ANSWER
example.com. 3600 IN DNSKEY 256 3 3 ALXLUsWqUrY3JYER3T4TBJII s70j+sDS/UT2QRp61SE7S3E EXopNXoFE73JLRmvpi/UrOO/Vz4Se 6wXv/CYCKjGw06U4WRgR YXcpEhJROyNapmdIKSx hOzfLVE1gqA0PweZR8d tY3aNQSRn3sPpwJr6Mi /PqQKAMMrZ9ckJpf1+b QMOOvxgzz2U1GS18b3y ZKcgTMEaJzd/GZYzi/B N2DzQ0MsrSwYXfsNLFO Bbs8PJMW4LYIxeeOe6rUgkWOF 7CC9Dh/dduQ1QrsJhmZAEFfd6ByYV+ ;{id = 2854 (zsk), size = 1688b}
example.com. 3600 IN RRSIG DNSKEY DSA 2 3600 20070926134150 20070829134150 2854 example.com. MCwCFBQRtlR4BEv9ohi+PGFjp+AHsJuHAhRCvz0shggvnvI88DFnBDCczHUcVA== ;{id = 2854}
SECTION AUTHORITY
example.com. IN NS ns.example.com.
example.com. 3600 IN RRSIG NS 3 2 3600 20070926134150 20070829134150 2854 example.com. MC0CFQCN+qHdJxoI/2tNKwsb08pra/G7aAIUAWA5sDdJTbrXA1/3OaesGBAO3sI= ;{id = 2854}
SECTION ADDITIONAL
ns.example.com. IN A 1.2.3.4
ns.example.com. 3600 IN RRSIG A 3 3 3600 20070926135752 20070829135752 2854 example.com. MC0CFQCMSWxVehgOQLoYclB9PIAbNP229AIUeH0vNNGJhjnZiqgIOKvs1EhzqAo= ;{id = 2854}
ENTRY_END
; response to query of interest
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
www.example.com. IN A
SECTION ANSWER
example.com. IN DNAME example.net.
example.com. 3600 IN RRSIG DNAME 3 2 3600 20070926134150 20070829134150 2854 example.com. MCwCFH1xw24Hswia3g10AVL1yFUHUPdFAhQDrA+qZJwqXRPg2C1oiNPk9fosGg== ;{id = 2854}
; unsigned CNAME
www.example.com. IN CNAME www.example.net.
SECTION AUTHORITY
SECTION ADDITIONAL
ENTRY_END
RANGE_END
; ns.example.net.
RANGE_BEGIN 0 100
ADDRESS 1.2.3.5
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
example.net. IN NS
SECTION ANSWER
example.net. IN NS ns.example.net.
example.net. 3600 IN RRSIG NS RSASHA1 2 3600 20070926134150 20070829134150 30899 example.net. E8JX0l4B+cSR5bkHQwOJy1pBmlLMTYCJ8EwfNMU/eCv0YhKwo26rHhn52FGisgv+Nwp7/NbhHqQ+kJgoZC94XA== ;{id = 30899}
SECTION ADDITIONAL
ns.example.net. IN A 1.2.3.5
ns.example.net. 3600 IN RRSIG A RSASHA1 3 3600 20070926134150 20070829134150 30899 example.net. x+tQMC9FhzT7Fcy1pM5NrOC7E8nLd7THPI3C6ie4EwL8PrxllqlR3q/DKB0d/m0qCOPcgN6HFOYURV1s4uAcsw== ;{id = 30899}
ENTRY_END
; response to DNSKEY priming query
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
example.net. IN DNSKEY
SECTION ANSWER
example.net. 3600 IN DNSKEY 256 3 5 AQPQ41chR9DEHt/aIzIFAqanbDlRflJoRs5yz1jFsoRIT7dWf0r+PeDuewdxkszNH6wnU4QL8pfKFRh5PIYVBLK3 ;{id = 30899 (zsk), size = 512b}
example.net. 3600 IN RRSIG DNSKEY RSASHA1 2 3600 20070926134150 20070829134150 30899 example.net. hiFzlQ8VoYgCuvIsfVuxC3mfJDqsTh0yc6abs5xMx5uEcIjb0dndFQx7INOM+imlzveEN73Hqp4OLFpFhsWLlw== ;{id = 30899}
SECTION AUTHORITY
example.net. IN NS ns.example.net.
example.net. 3600 IN RRSIG NS RSASHA1 2 3600 20070926134150 20070829134150 30899 example.net. E8JX0l4B+cSR5bkHQwOJy1pBmlLMTYCJ8EwfNMU/eCv0YhKwo26rHhn52FGisgv+Nwp7/NbhHqQ+kJgoZC94XA== ;{id = 30899}
SECTION ADDITIONAL
ns.example.net. IN A 1.2.3.5
ns.example.net. 3600 IN RRSIG A RSASHA1 3 3600 20070926134150 20070829134150 30899 example.net. x+tQMC9FhzT7Fcy1pM5NrOC7E8nLd7THPI3C6ie4EwL8PrxllqlR3q/DKB0d/m0qCOPcgN6HFOYURV1s4uAcsw== ;{id = 30899}
ENTRY_END
; response to query of interest
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
www.example.net. IN A
SECTION ANSWER
; from *.example.net.
www.example.net. IN A 11.12.13.14
www.example.net. 3600 IN RRSIG A 5 3 3600 20070926134150 20070829134150 30899 example.net. CPxF5hK9Kg5eT7W6LgZwr0ePYEm9HMcSY4vvqCS6gDWB4X9jvXLCfBkCLhsNybPBpGWlsLi5wM6MTdJXuPpsRA== ;{id = 30899}
SECTION AUTHORITY
SECTION ADDITIONAL
ENTRY_END
RANGE_END
STEP 1 QUERY
ENTRY_BEGIN
REPLY RD DO
SECTION QUESTION
www.example.com. IN A
ENTRY_END
; recursion happens here.
STEP 10 CHECK_ANSWER
ENTRY_BEGIN
MATCH all
REPLY QR RD RA AD NOERROR
SECTION QUESTION
www.example.com. IN A
SECTION ANSWER
example.com. 3600 IN DNAME example.net.
example.com. 3600 IN RRSIG DNAME 3 2 3600 20070926134150 20070829134150 2854 example.com. MCwCFH1xw24Hswia3g10AVL1yFUHUPdFAhQDrA+qZJwqXRPg2C1oiNPk9fosGg== ;{id = 2854}
www.example.com. 0 IN CNAME www.example.net.
www.example.net. 3600 IN A 11.12.13.14
www.example.net. 3600 IN RRSIG A 5 3 3600 20070926134150 20070829134150 30899 example.net. CPxF5hK9Kg5eT7W6LgZwr0ePYEm9HMcSY4vvqCS6gDWB4X9jvXLCfBkCLhsNybPBpGWlsLi5wM6MTdJXuPpsRA== ;{id = 30899}
SECTION AUTHORITY
SECTION ADDITIONAL
ENTRY_END
SCENARIO_END
dnssecjava-1.1.3/src/test/resources/unbound/val_dnametoposwc.rpl 0000664 0000000 0000000 00000017764 13020541473 0025171 0 ustar 00root root 0000000 0000000 ; config options
; The island of trust is at example.com
server:
trust-anchor: "example.com. 3600 IN DS 2854 3 1 46e4ffc6e9a4793b488954bd3f0cc6af0dfb201b"
trust-anchor: "example.net. 3600 IN DNSKEY 256 3 5 AQPQ41chR9DEHt/aIzIFAqanbDlRflJoRs5yz1jFsoRIT7dWf0r+PeDuewdxkszNH6wnU4QL8pfKFRh5PIYVBLK3 ;{id = 30899 (zsk), size = 512b}"
val-override-date: "20070916134226"
target-fetch-policy: "0 0 0 0 0"
stub-zone:
name: "."
stub-addr: 193.0.14.129 # K.ROOT-SERVERS.NET.
CONFIG_END
SCENARIO_BEGIN Test validator with a dname to positive wildcard
; K.ROOT-SERVERS.NET.
RANGE_BEGIN 0 100
ADDRESS 193.0.14.129
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
. IN NS
SECTION ANSWER
. IN NS K.ROOT-SERVERS.NET.
SECTION ADDITIONAL
K.ROOT-SERVERS.NET. IN A 193.0.14.129
ENTRY_END
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
www.example.com. IN A
SECTION AUTHORITY
com. IN NS a.gtld-servers.net.
SECTION ADDITIONAL
a.gtld-servers.net. IN A 192.5.6.30
ENTRY_END
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
www.example.net. IN A
SECTION AUTHORITY
net. IN NS a.gtld-servers.net.
SECTION ADDITIONAL
a.gtld-servers.net. IN A 192.5.6.30
ENTRY_END
RANGE_END
; a.gtld-servers.net.
RANGE_BEGIN 0 100
ADDRESS 192.5.6.30
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
com. IN NS
SECTION ANSWER
com. IN NS a.gtld-servers.net.
SECTION ADDITIONAL
a.gtld-servers.net. IN A 192.5.6.30
ENTRY_END
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
net. IN NS
SECTION ANSWER
net. IN NS a.gtld-servers.net.
SECTION ADDITIONAL
a.gtld-servers.net. IN A 192.5.6.30
ENTRY_END
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
www.example.com. IN A
SECTION AUTHORITY
example.com. IN NS ns.example.com.
SECTION ADDITIONAL
ns.example.com. IN A 1.2.3.4
ENTRY_END
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
www.example.net. IN A
SECTION AUTHORITY
example.net. IN NS ns.example.net.
SECTION ADDITIONAL
ns.example.net. IN A 1.2.3.5
ENTRY_END
RANGE_END
; ns.example.com.
RANGE_BEGIN 0 100
ADDRESS 1.2.3.4
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
example.com. IN NS
SECTION ANSWER
example.com. IN NS ns.example.com.
example.com. 3600 IN RRSIG NS 3 2 3600 20070926134150 20070829134150 2854 example.com. MC0CFQCN+qHdJxoI/2tNKwsb08pra/G7aAIUAWA5sDdJTbrXA1/3OaesGBAO3sI= ;{id = 2854}
SECTION ADDITIONAL
ns.example.com. IN A 1.2.3.4
ns.example.com. 3600 IN RRSIG A 3 3 3600 20070926135752 20070829135752 2854 example.com. MC0CFQCMSWxVehgOQLoYclB9PIAbNP229AIUeH0vNNGJhjnZiqgIOKvs1EhzqAo= ;{id = 2854}
ENTRY_END
; response to DNSKEY priming query
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
example.com. IN DNSKEY
SECTION ANSWER
example.com. 3600 IN DNSKEY 256 3 3 ALXLUsWqUrY3JYER3T4TBJII s70j+sDS/UT2QRp61SE7S3E EXopNXoFE73JLRmvpi/UrOO/Vz4Se 6wXv/CYCKjGw06U4WRgR YXcpEhJROyNapmdIKSx hOzfLVE1gqA0PweZR8d tY3aNQSRn3sPpwJr6Mi /PqQKAMMrZ9ckJpf1+b QMOOvxgzz2U1GS18b3y ZKcgTMEaJzd/GZYzi/B N2DzQ0MsrSwYXfsNLFO Bbs8PJMW4LYIxeeOe6rUgkWOF 7CC9Dh/dduQ1QrsJhmZAEFfd6ByYV+ ;{id = 2854 (zsk), size = 1688b}
example.com. 3600 IN RRSIG DNSKEY DSA 2 3600 20070926134150 20070829134150 2854 example.com. MCwCFBQRtlR4BEv9ohi+PGFjp+AHsJuHAhRCvz0shggvnvI88DFnBDCczHUcVA== ;{id = 2854}
SECTION AUTHORITY
example.com. IN NS ns.example.com.
example.com. 3600 IN RRSIG NS 3 2 3600 20070926134150 20070829134150 2854 example.com. MC0CFQCN+qHdJxoI/2tNKwsb08pra/G7aAIUAWA5sDdJTbrXA1/3OaesGBAO3sI= ;{id = 2854}
SECTION ADDITIONAL
ns.example.com. IN A 1.2.3.4
ns.example.com. 3600 IN RRSIG A 3 3 3600 20070926135752 20070829135752 2854 example.com. MC0CFQCMSWxVehgOQLoYclB9PIAbNP229AIUeH0vNNGJhjnZiqgIOKvs1EhzqAo= ;{id = 2854}
ENTRY_END
; response to query of interest
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
www.example.com. IN A
SECTION ANSWER
example.com. IN DNAME example.net.
example.com. 3600 IN RRSIG DNAME 3 2 3600 20070926134150 20070829134150 2854 example.com. MCwCFH1xw24Hswia3g10AVL1yFUHUPdFAhQDrA+qZJwqXRPg2C1oiNPk9fosGg== ;{id = 2854}
; unsigned CNAME
www.example.com. IN CNAME www.example.net.
SECTION AUTHORITY
SECTION ADDITIONAL
ENTRY_END
RANGE_END
; ns.example.net.
RANGE_BEGIN 0 100
ADDRESS 1.2.3.5
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
example.net. IN NS
SECTION ANSWER
example.net. IN NS ns.example.net.
example.net. 3600 IN RRSIG NS RSASHA1 2 3600 20070926134150 20070829134150 30899 example.net. E8JX0l4B+cSR5bkHQwOJy1pBmlLMTYCJ8EwfNMU/eCv0YhKwo26rHhn52FGisgv+Nwp7/NbhHqQ+kJgoZC94XA== ;{id = 30899}
SECTION ADDITIONAL
ns.example.net. IN A 1.2.3.5
ns.example.net. 3600 IN RRSIG A RSASHA1 3 3600 20070926134150 20070829134150 30899 example.net. x+tQMC9FhzT7Fcy1pM5NrOC7E8nLd7THPI3C6ie4EwL8PrxllqlR3q/DKB0d/m0qCOPcgN6HFOYURV1s4uAcsw== ;{id = 30899}
ENTRY_END
; response to DNSKEY priming query
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
example.net. IN DNSKEY
SECTION ANSWER
example.net. 3600 IN DNSKEY 256 3 5 AQPQ41chR9DEHt/aIzIFAqanbDlRflJoRs5yz1jFsoRIT7dWf0r+PeDuewdxkszNH6wnU4QL8pfKFRh5PIYVBLK3 ;{id = 30899 (zsk), size = 512b}
example.net. 3600 IN RRSIG DNSKEY RSASHA1 2 3600 20070926134150 20070829134150 30899 example.net. hiFzlQ8VoYgCuvIsfVuxC3mfJDqsTh0yc6abs5xMx5uEcIjb0dndFQx7INOM+imlzveEN73Hqp4OLFpFhsWLlw== ;{id = 30899}
SECTION AUTHORITY
example.net. IN NS ns.example.net.
example.net. 3600 IN RRSIG NS RSASHA1 2 3600 20070926134150 20070829134150 30899 example.net. E8JX0l4B+cSR5bkHQwOJy1pBmlLMTYCJ8EwfNMU/eCv0YhKwo26rHhn52FGisgv+Nwp7/NbhHqQ+kJgoZC94XA== ;{id = 30899}
SECTION ADDITIONAL
ns.example.net. IN A 1.2.3.5
ns.example.net. 3600 IN RRSIG A RSASHA1 3 3600 20070926134150 20070829134150 30899 example.net. x+tQMC9FhzT7Fcy1pM5NrOC7E8nLd7THPI3C6ie4EwL8PrxllqlR3q/DKB0d/m0qCOPcgN6HFOYURV1s4uAcsw== ;{id = 30899}
ENTRY_END
; response to query of interest
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
www.example.net. IN A
SECTION ANSWER
; from *.example.net.
www.example.net. IN A 11.12.13.14
www.example.net. 3600 IN RRSIG A 5 2 3600 20070926134150 20070829134150 30899 example.net. quSyDbSeHRvyMmanqq5rW+APC9MKOswbRLB5QP/G+C2iyokQFLuRTlX9Wmo/jo1Oo1MGBefJUmP9NdRd2EqABA== ;{id = 30899}
SECTION AUTHORITY
wab.example.net. IN NSEC wzz.example.net. A NSEC RRSIG
wab.example.net. 3600 IN RRSIG NSEC 5 3 3600 20070926134150 20070829134150 30899 example.net. gl8vkI3xfSWx4Pyv5OdOthiewE6u/13kclY7UG9ptuFBddamdJO3RQqyxM6Xcmq+ToO4kMCCyaKijp01gTDoGg== ;{id = 30899}
SECTION ADDITIONAL
ENTRY_END
RANGE_END
STEP 1 QUERY
ENTRY_BEGIN
REPLY RD DO
SECTION QUESTION
www.example.com. IN A
ENTRY_END
; recursion happens here.
STEP 10 CHECK_ANSWER
ENTRY_BEGIN
MATCH all
REPLY QR RD RA AD NOERROR
SECTION QUESTION
www.example.com. IN A
SECTION ANSWER
example.com. 3600 IN DNAME example.net.
example.com. 3600 IN RRSIG DNAME 3 2 3600 20070926134150 20070829134150 2854 example.com. MCwCFH1xw24Hswia3g10AVL1yFUHUPdFAhQDrA+qZJwqXRPg2C1oiNPk9fosGg== ;{id = 2854}
www.example.com. 0 IN CNAME www.example.net.
www.example.net. 3600 IN A 11.12.13.14
www.example.net. 3600 IN RRSIG A 5 2 3600 20070926134150 20070829134150 30899 example.net. quSyDbSeHRvyMmanqq5rW+APC9MKOswbRLB5QP/G+C2iyokQFLuRTlX9Wmo/jo1Oo1MGBefJUmP9NdRd2EqABA== ;{id = 30899}
SECTION AUTHORITY
wab.example.net. IN NSEC wzz.example.net. A NSEC RRSIG
wab.example.net. 3600 IN RRSIG NSEC 5 3 3600 20070926134150 20070829134150 30899 example.net. gl8vkI3xfSWx4Pyv5OdOthiewE6u/13kclY7UG9ptuFBddamdJO3RQqyxM6Xcmq+ToO4kMCCyaKijp01gTDoGg== ;{id = 30899}
SECTION ADDITIONAL
ENTRY_END
SCENARIO_END
dnssecjava-1.1.3/src/test/resources/unbound/val_dnamewc.rpl 0000664 0000000 0000000 00000017514 13020541473 0024075 0 ustar 00root root 0000000 0000000 ; config options
; The island of trust is at example.com
server:
trust-anchor: "example.com. 3600 IN DS 2854 3 1 46e4ffc6e9a4793b488954bd3f0cc6af0dfb201b"
trust-anchor: "example.net. 3600 IN DNSKEY 256 3 5 AQPQ41chR9DEHt/aIzIFAqanbDlRflJoRs5yz1jFsoRIT7dWf0r+PeDuewdxkszNH6wnU4QL8pfKFRh5PIYVBLK3 ;{id = 30899 (zsk), size = 512b}"
val-override-date: "20070916134226"
target-fetch-policy: "0 0 0 0 0"
stub-zone:
name: "."
stub-addr: 193.0.14.129 # K.ROOT-SERVERS.NET.
CONFIG_END
SCENARIO_BEGIN Test validator with a wildcarded dname
; K.ROOT-SERVERS.NET.
RANGE_BEGIN 0 100
ADDRESS 193.0.14.129
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
. IN NS
SECTION ANSWER
. IN NS K.ROOT-SERVERS.NET.
SECTION ADDITIONAL
K.ROOT-SERVERS.NET. IN A 193.0.14.129
ENTRY_END
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
www.sub.example.com. IN A
SECTION AUTHORITY
com. IN NS a.gtld-servers.net.
SECTION ADDITIONAL
a.gtld-servers.net. IN A 192.5.6.30
ENTRY_END
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
www.example.net. IN A
SECTION AUTHORITY
net. IN NS a.gtld-servers.net.
SECTION ADDITIONAL
a.gtld-servers.net. IN A 192.5.6.30
ENTRY_END
RANGE_END
; a.gtld-servers.net.
RANGE_BEGIN 0 100
ADDRESS 192.5.6.30
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
com. IN NS
SECTION ANSWER
com. IN NS a.gtld-servers.net.
SECTION ADDITIONAL
a.gtld-servers.net. IN A 192.5.6.30
ENTRY_END
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
net. IN NS
SECTION ANSWER
net. IN NS a.gtld-servers.net.
SECTION ADDITIONAL
a.gtld-servers.net. IN A 192.5.6.30
ENTRY_END
ENTRY_BEGIN
MATCH opcode subdomain
ADJUST copy_id copy_query
REPLY QR NOERROR
SECTION QUESTION
example.com. IN A
SECTION AUTHORITY
example.com. IN NS ns.example.com.
SECTION ADDITIONAL
ns.example.com. IN A 1.2.3.4
ENTRY_END
ENTRY_BEGIN
MATCH opcode subdomain
ADJUST copy_id copy_query
REPLY QR NOERROR
SECTION QUESTION
example.net. IN A
SECTION AUTHORITY
example.net. IN NS ns.example.net.
SECTION ADDITIONAL
ns.example.net. IN A 1.2.3.5
ENTRY_END
RANGE_END
; ns.example.com.
RANGE_BEGIN 0 100
ADDRESS 1.2.3.4
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR AA REFUSED
SECTION QUESTION
ns.example.com. IN AAAA
ENTRY_END
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR AA REFUSED
SECTION QUESTION
ns.example.com. IN A
ENTRY_END
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
example.com. IN NS
SECTION ANSWER
example.com. IN NS ns.example.com.
example.com. 3600 IN RRSIG NS 3 2 3600 20070926134150 20070829134150 2854 example.com. MC0CFQCN+qHdJxoI/2tNKwsb08pra/G7aAIUAWA5sDdJTbrXA1/3OaesGBAO3sI= ;{id = 2854}
SECTION ADDITIONAL
ns.example.com. IN A 1.2.3.4
ns.example.com. 3600 IN RRSIG A 3 3 3600 20070926135752 20070829135752 2854 example.com. MC0CFQCMSWxVehgOQLoYclB9PIAbNP229AIUeH0vNNGJhjnZiqgIOKvs1EhzqAo= ;{id = 2854}
ENTRY_END
; response to DNSKEY priming query
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
example.com. IN DNSKEY
SECTION ANSWER
example.com. 3600 IN DNSKEY 256 3 3 ALXLUsWqUrY3JYER3T4TBJII s70j+sDS/UT2QRp61SE7S3E EXopNXoFE73JLRmvpi/UrOO/Vz4Se 6wXv/CYCKjGw06U4WRgR YXcpEhJROyNapmdIKSx hOzfLVE1gqA0PweZR8d tY3aNQSRn3sPpwJr6Mi /PqQKAMMrZ9ckJpf1+b QMOOvxgzz2U1GS18b3y ZKcgTMEaJzd/GZYzi/B N2DzQ0MsrSwYXfsNLFO Bbs8PJMW4LYIxeeOe6rUgkWOF 7CC9Dh/dduQ1QrsJhmZAEFfd6ByYV+ ;{id = 2854 (zsk), size = 1688b}
example.com. 3600 IN RRSIG DNSKEY DSA 2 3600 20070926134150 20070829134150 2854 example.com. MCwCFBQRtlR4BEv9ohi+PGFjp+AHsJuHAhRCvz0shggvnvI88DFnBDCczHUcVA== ;{id = 2854}
SECTION AUTHORITY
example.com. IN NS ns.example.com.
example.com. 3600 IN RRSIG NS 3 2 3600 20070926134150 20070829134150 2854 example.com. MC0CFQCN+qHdJxoI/2tNKwsb08pra/G7aAIUAWA5sDdJTbrXA1/3OaesGBAO3sI= ;{id = 2854}
SECTION ADDITIONAL
ns.example.com. IN A 1.2.3.4
ns.example.com. 3600 IN RRSIG A 3 3 3600 20070926135752 20070829135752 2854 example.com. MC0CFQCMSWxVehgOQLoYclB9PIAbNP229AIUeH0vNNGJhjnZiqgIOKvs1EhzqAo= ;{id = 2854}
ENTRY_END
; response to query of interest
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
www.sub.example.com. IN A
SECTION ANSWER
; *.example.com. IN DNAME example.net.
sub.example.com. IN DNAME example.net.
sub.example.com. 3600 IN RRSIG DNAME 3 2 3600 20070926134150 20070829134150 2854 example.com. MCwCFEyO+NY3QgAf/cF0mmZhsj3TqgoGAhRqJhHoCd+aA1FbBp16WGfk1HmeIg== ;{id = 2854}
; unsigned CNAME; one interpretation of the wildcarded DNAME expansion
www.sub.example.com. IN CNAME www.example.net.
SECTION AUTHORITY
; prove original does not exist
ns.example.com. IN NSEC www.example.com. A RRSIG NSEC
ns.example.com. 3600 IN RRSIG NSEC 3 3 3600 20070926134150 20070829134150 2854 example.com. MC0CFQCCqvDUT+jMCvfm7OHL2IDY75JDmQIUfOtDiiyeSiwjuq3i3OuLnVRyoJ8= ;{id = 2854}
SECTION ADDITIONAL
ENTRY_END
RANGE_END
; ns.example.net.
RANGE_BEGIN 0 100
ADDRESS 1.2.3.5
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR AA REFUSED
SECTION QUESTION
ns.example.net. IN AAAA
ENTRY_END
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR AA REFUSED
SECTION QUESTION
ns.example.net. IN A
ENTRY_END
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
example.net. IN NS
SECTION ANSWER
example.net. IN NS ns.example.net.
example.net. 3600 IN RRSIG NS RSASHA1 2 3600 20070926134150 20070829134150 30899 example.net. E8JX0l4B+cSR5bkHQwOJy1pBmlLMTYCJ8EwfNMU/eCv0YhKwo26rHhn52FGisgv+Nwp7/NbhHqQ+kJgoZC94XA== ;{id = 30899}
SECTION ADDITIONAL
ns.example.net. IN A 1.2.3.5
ns.example.net. 3600 IN RRSIG A RSASHA1 3 3600 20070926134150 20070829134150 30899 example.net. x+tQMC9FhzT7Fcy1pM5NrOC7E8nLd7THPI3C6ie4EwL8PrxllqlR3q/DKB0d/m0qCOPcgN6HFOYURV1s4uAcsw== ;{id = 30899}
ENTRY_END
; response to DNSKEY priming query
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
example.net. IN DNSKEY
SECTION ANSWER
example.net. 3600 IN DNSKEY 256 3 5 AQPQ41chR9DEHt/aIzIFAqanbDlRflJoRs5yz1jFsoRIT7dWf0r+PeDuewdxkszNH6wnU4QL8pfKFRh5PIYVBLK3 ;{id = 30899 (zsk), size = 512b}
example.net. 3600 IN RRSIG DNSKEY RSASHA1 2 3600 20070926134150 20070829134150 30899 example.net. hiFzlQ8VoYgCuvIsfVuxC3mfJDqsTh0yc6abs5xMx5uEcIjb0dndFQx7INOM+imlzveEN73Hqp4OLFpFhsWLlw== ;{id = 30899}
SECTION AUTHORITY
example.net. IN NS ns.example.net.
example.net. 3600 IN RRSIG NS RSASHA1 2 3600 20070926134150 20070829134150 30899 example.net. E8JX0l4B+cSR5bkHQwOJy1pBmlLMTYCJ8EwfNMU/eCv0YhKwo26rHhn52FGisgv+Nwp7/NbhHqQ+kJgoZC94XA== ;{id = 30899}
SECTION ADDITIONAL
ns.example.net. IN A 1.2.3.5
ns.example.net. 3600 IN RRSIG A RSASHA1 3 3600 20070926134150 20070829134150 30899 example.net. x+tQMC9FhzT7Fcy1pM5NrOC7E8nLd7THPI3C6ie4EwL8PrxllqlR3q/DKB0d/m0qCOPcgN6HFOYURV1s4uAcsw== ;{id = 30899}
ENTRY_END
; response to query of interest
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
www.example.net. IN A
SECTION ANSWER
; from *.example.net.
www.example.net. IN A 11.12.13.14
www.example.net. 3600 IN RRSIG A 5 3 3600 20070926134150 20070829134150 30899 example.net. CPxF5hK9Kg5eT7W6LgZwr0ePYEm9HMcSY4vvqCS6gDWB4X9jvXLCfBkCLhsNybPBpGWlsLi5wM6MTdJXuPpsRA== ;{id = 30899}
SECTION AUTHORITY
SECTION ADDITIONAL
ENTRY_END
RANGE_END
STEP 1 QUERY
ENTRY_BEGIN
REPLY RD DO
SECTION QUESTION
www.sub.example.com. IN A
ENTRY_END
; recursion happens here.
STEP 10 CHECK_ANSWER
ENTRY_BEGIN
MATCH all
REPLY QR RD RA SERVFAIL
SECTION QUESTION
www.sub.example.com. IN A
SECTION ANSWER
SECTION AUTHORITY
SECTION ADDITIONAL
ENTRY_END
SCENARIO_END
dnssecjava-1.1.3/src/test/resources/unbound/val_ds_afterprime.rpl 0000664 0000000 0000000 00000012701 13020541473 0025274 0 ustar 00root root 0000000 0000000 ; config options
; The island of trust is at example.com
server:
trust-anchor: "example.com. 3600 IN DS 2854 3 1 46e4ffc6e9a4793b488954bd3f0cc6af0dfb201b"
val-override-date: "20070916134226"
target-fetch-policy: "0 0 0 0 0"
stub-zone:
name: "."
stub-addr: 193.0.14.129 # K.ROOT-SERVERS.NET.
CONFIG_END
SCENARIO_BEGIN Test DS lookup after key prime is done.
; K.ROOT-SERVERS.NET.
RANGE_BEGIN 0 100
ADDRESS 193.0.14.129
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
. IN NS
SECTION ANSWER
. IN NS K.ROOT-SERVERS.NET.
SECTION ADDITIONAL
K.ROOT-SERVERS.NET. IN A 193.0.14.129
ENTRY_END
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
www.example.com. IN A
SECTION AUTHORITY
com. IN NS a.gtld-servers.net.
SECTION ADDITIONAL
a.gtld-servers.net. IN A 192.5.6.30
ENTRY_END
RANGE_END
; a.gtld-servers.net.
RANGE_BEGIN 0 100
ADDRESS 192.5.6.30
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
com. IN NS
SECTION ANSWER
com. IN NS a.gtld-servers.net.
SECTION ADDITIONAL
a.gtld-servers.net. IN A 192.5.6.30
ENTRY_END
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
www.example.com. IN A
SECTION AUTHORITY
example.com. IN NS ns.example.com.
SECTION ADDITIONAL
ns.example.com. IN A 1.2.3.4
ENTRY_END
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
example.com. IN DS
SECTION AUTHORITY
com. 900 IN SOA a.gtld-servers.net. nstld.verisign-grs.com. 1251367385 1800 900 604800 86400
ENTRY_END
RANGE_END
; ns.example.com.
RANGE_BEGIN 0 100
ADDRESS 1.2.3.4
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
example.com. IN NS
SECTION ANSWER
example.com. IN NS ns.example.com.
example.com. 3600 IN RRSIG NS 3 2 3600 20070926134150 20070829134150 2854 example.com. MC0CFQCN+qHdJxoI/2tNKwsb08pra/G7aAIUAWA5sDdJTbrXA1/3OaesGBAO3sI= ;{id = 2854}
SECTION ADDITIONAL
ns.example.com. IN A 1.2.3.4
ns.example.com. 3600 IN RRSIG A 3 3 3600 20070926135752 20070829135752 2854 example.com. MC0CFQCMSWxVehgOQLoYclB9PIAbNP229AIUeH0vNNGJhjnZiqgIOKvs1EhzqAo= ;{id = 2854}
ENTRY_END
; response to DNSKEY priming query
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
example.com. IN DNSKEY
SECTION ANSWER
example.com. 3600 IN DNSKEY 256 3 3 ALXLUsWqUrY3JYER3T4TBJII s70j+sDS/UT2QRp61SE7S3E EXopNXoFE73JLRmvpi/UrOO/Vz4Se 6wXv/CYCKjGw06U4WRgR YXcpEhJROyNapmdIKSx hOzfLVE1gqA0PweZR8d tY3aNQSRn3sPpwJr6Mi /PqQKAMMrZ9ckJpf1+b QMOOvxgzz2U1GS18b3y ZKcgTMEaJzd/GZYzi/B N2DzQ0MsrSwYXfsNLFO Bbs8PJMW4LYIxeeOe6rUgkWOF 7CC9Dh/dduQ1QrsJhmZAEFfd6ByYV+ ;{id = 2854 (zsk), size = 1688b}
example.com. 3600 IN RRSIG DNSKEY 3 2 3600 20070926134802 20070829134802 2854 example.com. MCwCFG1yhRNtTEa3Eno2zhVVuy2EJX3wAhQeLyUp6+UXcpC5qGNu9tkrTEgPUg== ;{id = 2854}
SECTION AUTHORITY
example.com. IN NS ns.example.com.
example.com. 3600 IN RRSIG NS 3 2 3600 20070926134150 20070829134150 2854 example.com. MC0CFQCN+qHdJxoI/2tNKwsb08pra/G7aAIUAWA5sDdJTbrXA1/3OaesGBAO3sI= ;{id = 2854}
SECTION ADDITIONAL
ns.example.com. IN A 1.2.3.4
ns.example.com. 3600 IN RRSIG A 3 3 3600 20070926135752 20070829135752 2854 example.com. MC0CFQCMSWxVehgOQLoYclB9PIAbNP229AIUeH0vNNGJhjnZiqgIOKvs1EhzqAo= ;{id = 2854}
ENTRY_END
; response to query of interest
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
www.example.com. IN A
SECTION ANSWER
www.example.com. IN A 10.20.30.40
www.example.com. 3600 IN RRSIG A 3 3 3600 20070926134150 20070829134150 2854 example.com. MC0CFC99iE9K5y2WNgI0gFvBWaTi9wm6AhUAoUqOpDtG5Zct+Qr9F3mSdnbc6V4= ;{id = 2854}
SECTION AUTHORITY
example.com. IN NS ns.example.com.
example.com. 3600 IN RRSIG NS 3 2 3600 20070926134150 20070829134150 2854 example.com. MC0CFQCN+qHdJxoI/2tNKwsb08pra/G7aAIUAWA5sDdJTbrXA1/3OaesGBAO3sI= ;{id = 2854}
SECTION ADDITIONAL
ns.example.com. IN A 1.2.3.4
ns.example.com. 3600 IN RRSIG A 3 3 3600 20070926134150 20070829134150 2854 example.com. MC0CFQCQMyTjn7WWwpwAR1LlVeLpRgZGuQIUCcJDEkwAuzytTDRlYK7nIMwH1CM= ;{id = 2854}
ENTRY_END
RANGE_END
STEP 1 QUERY
ENTRY_BEGIN
REPLY RD DO
SECTION QUESTION
www.example.com. IN A
ENTRY_END
; recursion happens here.
STEP 10 CHECK_ANSWER
ENTRY_BEGIN
MATCH all
REPLY QR RD RA AD NOERROR
SECTION QUESTION
www.example.com. IN A
SECTION ANSWER
www.example.com. IN A 10.20.30.40
www.example.com. 3600 IN RRSIG A 3 3 3600 20070926134150 20070829134150 2854 example.com. MC0CFC99iE9K5y2WNgI0gFvBWaTi9wm6AhUAoUqOpDtG5Zct+Qr9F3mSdnbc6V4= ;{id = 2854}
SECTION AUTHORITY
example.com. IN NS ns.example.com.
example.com. 3600 IN RRSIG NS 3 2 3600 20070926134150 20070829134150 2854 example.com. MC0CFQCN+qHdJxoI/2tNKwsb08pra/G7aAIUAWA5sDdJTbrXA1/3OaesGBAO3sI= ;{id = 2854}
SECTION ADDITIONAL
ns.example.com. IN A 1.2.3.4
ns.example.com. 3600 IN RRSIG A 3 3 3600 20070926134150 20070829134150 2854 example.com. MC0CFQCQMyTjn7WWwpwAR1LlVeLpRgZGuQIUCcJDEkwAuzytTDRlYK7nIMwH1CM= ;{id = 2854}
ENTRY_END
STEP 20 QUERY
ENTRY_BEGIN
REPLY RD DO
SECTION QUESTION
example.com. IN DS
ENTRY_END
STEP 30 CHECK_ANSWER
ENTRY_BEGIN
MATCH all
REPLY QR RD RA NOERROR
SECTION QUESTION
example.com. IN DS
SECTION AUTHORITY
com. 900 IN SOA a.gtld-servers.net. nstld.verisign-grs.com. 1251367385 1800 900 604800 86400
ENTRY_END
SCENARIO_END
dnssecjava-1.1.3/src/test/resources/unbound/val_ds_cname.rpl 0000664 0000000 0000000 00000015132 13020541473 0024222 0 ustar 00root root 0000000 0000000 ; config options
; The island of trust is at example.com
server:
trust-anchor: "example.com. 3600 IN DS 2854 3 1 46e4ffc6e9a4793b488954bd3f0cc6af0dfb201b"
val-override-date: "20070916134226"
target-fetch-policy: "0 0 0 0 0"
stub-zone:
name: "."
stub-addr: 193.0.14.129 # K.ROOT-SERVERS.NET.
CONFIG_END
SCENARIO_BEGIN Test validator with CNAME response to DS
; K.ROOT-SERVERS.NET.
RANGE_BEGIN 0 100
ADDRESS 193.0.14.129
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
. IN NS
SECTION ANSWER
. IN NS K.ROOT-SERVERS.NET.
SECTION ADDITIONAL
K.ROOT-SERVERS.NET. IN A 193.0.14.129
ENTRY_END
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
www.example.com. IN A
SECTION AUTHORITY
com. IN NS a.gtld-servers.net.
SECTION ADDITIONAL
a.gtld-servers.net. IN A 192.5.6.30
ENTRY_END
RANGE_END
; a.gtld-servers.net.
RANGE_BEGIN 0 100
ADDRESS 192.5.6.30
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
com. IN NS
SECTION ANSWER
com. IN NS a.gtld-servers.net.
SECTION ADDITIONAL
a.gtld-servers.net. IN A 192.5.6.30
ENTRY_END
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
www.example.com. IN A
SECTION AUTHORITY
example.com. IN NS ns.example.com.
SECTION ADDITIONAL
ns.example.com. IN A 1.2.3.4
ENTRY_END
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR AA NOERROR
SECTION QUESTION
ns.example.com. IN AAAA
SECTION ANSWER
ENTRY_END
RANGE_END
; ns.example.com.
RANGE_BEGIN 0 100
ADDRESS 1.2.3.4
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
ns.example.com. IN AAAA
SECTION ANSWER
; not legal NOERROR/NODATA response, but leniently accepted (not validated)
SECTION AUTHORITY
example.com. IN NS ns.example.com.
example.com. 3600 IN RRSIG NS 3 2 3600 20070926134150 20070829134150 2854 example.com. MC0CFQCN+qHdJxoI/2tNKwsb08pra/G7aAIUAWA5sDdJTbrXA1/3OaesGBAO3sI= ;{id = 2854}
SECTION ADDITIONAL
ns.example.com. IN A 1.2.3.4
ns.example.com. 3600 IN RRSIG A 3 3 3600 20070926135752 20070829135752 2854 example.com. MC0CFQCMSWxVehgOQLoYclB9PIAbNP229AIUeH0vNNGJhjnZiqgIOKvs1EhzqAo= ;{id = 2854}
ENTRY_END
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
example.com. IN NS
SECTION ANSWER
example.com. IN NS ns.example.com.
example.com. 3600 IN RRSIG NS 3 2 3600 20070926134150 20070829134150 2854 example.com. MC0CFQCN+qHdJxoI/2tNKwsb08pra/G7aAIUAWA5sDdJTbrXA1/3OaesGBAO3sI= ;{id = 2854}
SECTION ADDITIONAL
ns.example.com. IN A 1.2.3.4
ns.example.com. 3600 IN RRSIG A 3 3 3600 20070926135752 20070829135752 2854 example.com. MC0CFQCMSWxVehgOQLoYclB9PIAbNP229AIUeH0vNNGJhjnZiqgIOKvs1EhzqAo= ;{id = 2854}
ENTRY_END
; response to DNSKEY priming query
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
example.com. IN DNSKEY
SECTION ANSWER
example.com. 3600 IN DNSKEY 256 3 3 ALXLUsWqUrY3JYER3T4TBJII s70j+sDS/UT2QRp61SE7S3E EXopNXoFE73JLRmvpi/UrOO/Vz4Se 6wXv/CYCKjGw06U4WRgR YXcpEhJROyNapmdIKSx hOzfLVE1gqA0PweZR8d tY3aNQSRn3sPpwJr6Mi /PqQKAMMrZ9ckJpf1+b QMOOvxgzz2U1GS18b3y ZKcgTMEaJzd/GZYzi/B N2DzQ0MsrSwYXfsNLFO Bbs8PJMW4LYIxeeOe6rUgkWOF 7CC9Dh/dduQ1QrsJhmZAEFfd6ByYV+ ;{id = 2854 (zsk), size = 1688b}
example.com. 3600 IN RRSIG DNSKEY 3 2 3600 20070926134802 20070829134802 2854 example.com. MCwCFG1yhRNtTEa3Eno2zhVVuy2EJX3wAhQeLyUp6+UXcpC5qGNu9tkrTEgPUg== ;{id = 2854}
SECTION AUTHORITY
example.com. IN NS ns.example.com.
example.com. 3600 IN RRSIG NS 3 2 3600 20070926134150 20070829134150 2854 example.com. MC0CFQCN+qHdJxoI/2tNKwsb08pra/G7aAIUAWA5sDdJTbrXA1/3OaesGBAO3sI= ;{id = 2854}
SECTION ADDITIONAL
ns.example.com. IN A 1.2.3.4
ns.example.com. 3600 IN RRSIG A 3 3 3600 20070926135752 20070829135752 2854 example.com. MC0CFQCMSWxVehgOQLoYclB9PIAbNP229AIUeH0vNNGJhjnZiqgIOKvs1EhzqAo= ;{id = 2854}
ENTRY_END
; response to query of interest
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR AA NOERROR
SECTION QUESTION
www.example.com. IN A
SECTION ANSWER
; nothing here, not even NSECs
SECTION AUTHORITY
example.com. IN NS ns.example.com.
example.com. 3600 IN RRSIG NS 3 2 3600 20070926134150 20070829134150 2854 example.com. MC0CFQCN+qHdJxoI/2tNKwsb08pra/G7aAIUAWA5sDdJTbrXA1/3OaesGBAO3sI= ;{id = 2854}
SECTION ADDITIONAL
ENTRY_END
; DS query
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR AA NOERROR
SECTION QUESTION
www.example.com. IN DS
SECTION ANSWER
www.example.com. IN CNAME zzz.example.com.
www.example.com. 3600 IN RRSIG CNAME 3 2 3600 20070926134150 20070829134150 2854 example.com. AERsv3PiBObAEhZ/dKyamie0sjvYLn7YaEKgv9ExB14KKLgWvzCaOWo= ;{id = 2854}
;*.example.com. IN CNAME zzz.example.com.
;*.example.com. 3600 IN RRSIG CNAME 3 2 3600 20070926134150 20070829134150 2854 example.com. AERsv3PiBObAEhZ/dKyamie0sjvYLn7YaEKgv9ExB14KKLgWvzCaOWo= ;{id = 2854}
SECTION AUTHORITY
*.example.com. IN NSEC zzz.example.com. CNAME RRSIG NSEC
*.example.com. 3600 IN RRSIG NSEC 3 2 3600 20070926134150 20070829134150 2854 example.com. AJxl2TXciyhbKqSakVNtjlt8Bbkco02zpl5RlY88iqVmSa6ts+/guU4= ;{id = 2854}
zzz.example.com. IN NSEC *.zzz.example.com. A RRSIG NSEC
zzz.example.com. 3600 IN RRSIG NSEC 3 3 3600 20070926134150 20070829134150 2854 example.com. ACtgx/h0YfGEK79zg4G16jB/0oRWH0nxrMzUc/4hCY3oprsP8DrdjqU= ;{id = 2854}
example.com. IN SOA alfa.ns.example.com.cz. hostmaster.example.com. 2010030800 10800 86400 604800 86400
example.com. 3600 IN RRSIG SOA 3 2 3600 20070926134150 20070829134150 2854 example.com. ADsxLOHjxFzwFmwIiGOubqD9nKWAp4RccRIXQ0+EAUGfSDZMCB0ZiFA= ;{id = 2854}
SECTION ADDITIONAL
ENTRY_END
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR AA NOERROR
SECTION QUESTION
zzz.example.com. IN DS
SECTION ANSWER
SECTION AUTHORITY
zzz.example.com. IN NSEC *.zzz.example.com. A RRSIG NSEC
zzz.example.com. 3600 IN RRSIG NSEC 3 3 3600 20070926134150 20070829134150 2854 example.com. ACtgx/h0YfGEK79zg4G16jB/0oRWH0nxrMzUc/4hCY3oprsP8DrdjqU= ;{id = 2854}
example.com. IN SOA alfa.ns.example.com.cz. hostmaster.example.com. 2010030800 10800 86400 604800 86400
example.com. 3600 IN RRSIG SOA 3 2 3600 20070926134150 20070829134150 2854 example.com. ADsxLOHjxFzwFmwIiGOubqD9nKWAp4RccRIXQ0+EAUGfSDZMCB0ZiFA= ;{id = 2854}
SECTION ADDITIONAL
ENTRY_END
RANGE_END
STEP 1 QUERY
ENTRY_BEGIN
REPLY RD DO
SECTION QUESTION
www.example.com. IN A
ENTRY_END
; recursion happens here.
STEP 10 CHECK_ANSWER
ENTRY_BEGIN
MATCH all
REPLY QR RD RA SERVFAIL
SECTION QUESTION
www.example.com. IN A
SECTION ANSWER
ENTRY_END
SCENARIO_END
dnssecjava-1.1.3/src/test/resources/unbound/val_ds_cnamesub.rpl 0000664 0000000 0000000 00000020434 13020541473 0024735 0 ustar 00root root 0000000 0000000 ; config options
; The island of trust is at example.com
server:
trust-anchor: "example.com. 3600 IN DS 2854 3 1 46e4ffc6e9a4793b488954bd3f0cc6af0dfb201b"
val-override-date: "20070916134226"
target-fetch-policy: "0 0 0 0 0"
stub-zone:
name: "."
stub-addr: 193.0.14.129 # K.ROOT-SERVERS.NET.
CONFIG_END
SCENARIO_BEGIN Test validator with CNAME response to DS in chain of trust
; the CNAME is at a nonempty nonterminal name in the parent zone.
; K.ROOT-SERVERS.NET.
RANGE_BEGIN 0 100
ADDRESS 193.0.14.129
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
. IN NS
SECTION ANSWER
. IN NS K.ROOT-SERVERS.NET.
SECTION ADDITIONAL
K.ROOT-SERVERS.NET. IN A 193.0.14.129
ENTRY_END
ENTRY_BEGIN
MATCH opcode subdomain
ADJUST copy_id copy_query
REPLY QR NOERROR
SECTION QUESTION
com. IN A
SECTION AUTHORITY
com. IN NS a.gtld-servers.net.
SECTION ADDITIONAL
a.gtld-servers.net. IN A 192.5.6.30
ENTRY_END
ENTRY_BEGIN
MATCH opcode subdomain
ADJUST copy_id copy_query
REPLY QR NOERROR
SECTION QUESTION
net. IN A
SECTION AUTHORITY
net. IN NS a.gtld-servers.net.
SECTION ADDITIONAL
a.gtld-servers.net. IN A 192.5.6.30
ENTRY_END
RANGE_END
; a.gtld-servers.net.
RANGE_BEGIN 0 100
ADDRESS 192.5.6.30
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
com. IN NS
SECTION ANSWER
com. IN NS a.gtld-servers.net.
SECTION ADDITIONAL
a.gtld-servers.net. IN A 192.5.6.30
ENTRY_END
ENTRY_BEGIN
MATCH opcode subdomain
ADJUST copy_id copy_query
REPLY QR NOERROR
SECTION QUESTION
example.com. IN A
SECTION AUTHORITY
example.com. IN NS ns.example.com.
SECTION ADDITIONAL
ns.example.com. IN A 1.2.3.4
ENTRY_END
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR AA NOERROR
SECTION QUESTION
ns.example.com. IN AAAA
SECTION ANSWER
ENTRY_END
ENTRY_BEGIN
MATCH opcode subdomain
ADJUST copy_id copy_query
REPLY QR AA NOERROR
SECTION QUESTION
example.net. IN A
SECTION AUTHORITY
example.net. IN NS ns.example.net.
SECTION ADDITIONAL
ns.example.net. IN A 1.2.3.6
ENTRY_END
RANGE_END
; ns.example.com.
RANGE_BEGIN 0 100
ADDRESS 1.2.3.4
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
ns.example.com. IN AAAA
SECTION ANSWER
; not legal NOERROR/NODATA response, but leniently accepted (not validated)
SECTION AUTHORITY
example.com. IN NS ns.example.com.
example.com. 3600 IN RRSIG NS 3 2 3600 20070926134150 20070829134150 2854 example.com. MC0CFQCN+qHdJxoI/2tNKwsb08pra/G7aAIUAWA5sDdJTbrXA1/3OaesGBAO3sI= ;{id = 2854}
;example.com. IN SOA alfa.ns.example.com.cz. hostmaster.example.com. 2010030800 10800 86400 604800 86400
;example.com. 3600 IN RRSIG SOA 3 2 3600 20070926134150 20070829134150 2854 example.com. ADsxLOHjxFzwFmwIiGOubqD9nKWAp4RccRIXQ0+EAUGfSDZMCB0ZiFA= ;{id = 2854}
SECTION ADDITIONAL
ns.example.com. IN A 1.2.3.4
ns.example.com. 3600 IN RRSIG A 3 3 3600 20070926135752 20070829135752 2854 example.com. MC0CFQCMSWxVehgOQLoYclB9PIAbNP229AIUeH0vNNGJhjnZiqgIOKvs1EhzqAo= ;{id = 2854}
ENTRY_END
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
example.com. IN NS
SECTION ANSWER
example.com. IN NS ns.example.com.
example.com. 3600 IN RRSIG NS 3 2 3600 20070926134150 20070829134150 2854 example.com. MC0CFQCN+qHdJxoI/2tNKwsb08pra/G7aAIUAWA5sDdJTbrXA1/3OaesGBAO3sI= ;{id = 2854}
SECTION ADDITIONAL
ns.example.com. IN A 1.2.3.4
ns.example.com. 3600 IN RRSIG A 3 3 3600 20070926135752 20070829135752 2854 example.com. MC0CFQCMSWxVehgOQLoYclB9PIAbNP229AIUeH0vNNGJhjnZiqgIOKvs1EhzqAo= ;{id = 2854}
ENTRY_END
; response to DNSKEY priming query
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
example.com. IN DNSKEY
SECTION ANSWER
example.com. 3600 IN DNSKEY 256 3 3 ALXLUsWqUrY3JYER3T4TBJII s70j+sDS/UT2QRp61SE7S3E EXopNXoFE73JLRmvpi/UrOO/Vz4Se 6wXv/CYCKjGw06U4WRgR YXcpEhJROyNapmdIKSx hOzfLVE1gqA0PweZR8d tY3aNQSRn3sPpwJr6Mi /PqQKAMMrZ9ckJpf1+b QMOOvxgzz2U1GS18b3y ZKcgTMEaJzd/GZYzi/B N2DzQ0MsrSwYXfsNLFO Bbs8PJMW4LYIxeeOe6rUgkWOF 7CC9Dh/dduQ1QrsJhmZAEFfd6ByYV+ ;{id = 2854 (zsk), size = 1688b}
example.com. 3600 IN RRSIG DNSKEY 3 2 3600 20070926134802 20070829134802 2854 example.com. MCwCFG1yhRNtTEa3Eno2zhVVuy2EJX3wAhQeLyUp6+UXcpC5qGNu9tkrTEgPUg== ;{id = 2854}
SECTION AUTHORITY
example.com. IN NS ns.example.com.
example.com. 3600 IN RRSIG NS 3 2 3600 20070926134150 20070829134150 2854 example.com. MC0CFQCN+qHdJxoI/2tNKwsb08pra/G7aAIUAWA5sDdJTbrXA1/3OaesGBAO3sI= ;{id = 2854}
SECTION ADDITIONAL
ns.example.com. IN A 1.2.3.4
ns.example.com. 3600 IN RRSIG A 3 3 3600 20070926135752 20070829135752 2854 example.com. MC0CFQCMSWxVehgOQLoYclB9PIAbNP229AIUeH0vNNGJhjnZiqgIOKvs1EhzqAo= ;{id = 2854}
ENTRY_END
; response to DS query for a.example.com, a CNAME
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR AA NOERROR
SECTION QUESTION
a.example.com. IN DS
SECTION ANSWER
a.example.com. IN CNAME zzz.example.net.
a.example.com. 3600 IN RRSIG CNAME 3 3 3600 20070926134150 20070829134150 2854 example.com. AKM6/j6yowuwqbazKzi4fEsavcLwXo3PjglhH9KD68ANZOrdN9y1ZCc=
SECTION AUTHORITY
SECTION ADDITIONAL
ENTRY_END
; response to DS query for sub.a.example.com.
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR AA NOERROR
SECTION QUESTION
sub.a.example.com. IN DS
SECTION ANSWER
sub.a.example.com. 3600 IN DS 57024 7 1 e54100bff773a794854808694c5d217267a53649
sub.a.example.com. 3600 IN RRSIG DS 3 4 3600 20070926134150 20070829134150 2854 example.com. ALHDGmpgZlXnAb54z4FbBKw/9nXVBdosG0UCEuh4qU7Lm/fs5Dv9aJw=
SECTION AUTHORITY
SECTION ADDITIONAL
ENTRY_END
; delegation down
ENTRY_BEGIN
MATCH opcode subdomain
ADJUST copy_id copy_query
REPLY QR NOERROR
SECTION QUESTION
sub.a.example.com. IN NS
SECTION ANSWER
SECTION AUTHORITY
sub.a.example.com. 3600 IN DS 57024 7 1 e54100bff773a794854808694c5d217267a53649
sub.a.example.com. 3600 IN RRSIG DS 3 4 3600 20070926134150 20070829134150 2854 example.com. ALHDGmpgZlXnAb54z4FbBKw/9nXVBdosG0UCEuh4qU7Lm/fs5Dv9aJw=
sub.a.example.com. IN NS ns.sub.a.example.com.
SECTION ADDITIONAL
ns.sub.a.example.com. IN A 1.2.3.5
ENTRY_END
RANGE_END
; ns.sub.a.example.com.
RANGE_BEGIN 0 100
ADDRESS 1.2.3.5
; DNSKEY query
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR AA NOERROR
SECTION QUESTION
sub.a.example.com. IN DNSKEY
SECTION ANSWER
sub.a.example.com. 3600 IN DNSKEY 257 3 7 AwEAAbvre/wK/WVeoj0SiwVkTD+NefvHPru9YIqLWY0m+0E5NYOpJZdc+PGQQYRzFNOlugVZtFirmv5Lmz7GNiASXtG/IFi//SlE30DxEKQOjt2F6qSZTZ1nZ5XOIMGTwWyp4OoI0egk5JavC5mQbyXqcj82ywt6F5Z3CmnThVl6MtOv ;{id = 57024 (ksk), size = 1024b}
sub.a.example.com. 3600 IN RRSIG DNSKEY 7 4 3600 20070926134150 20070829134150 57024 sub.a.example.com. TB3rkkPBD/ESQR9WBpfq2aV+2howI+EJq2+om2EI6PiemQOdpN6ovLvKwCILb0LOsTEFfPpAvRCOuDzRC24sJqBgWpZ4xLxMTcQJ8hMvv7rIUfZotDPO2JYNHSRmpeQLuDGA6P+AtJLYIr7yfOltJmJ0aCJxy3Fm9RQxJxHVbEQ=
SECTION AUTHORITY
SECTION ADDITIONAL
ENTRY_END
; query of interest
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR AA NOERROR
SECTION QUESTION
www.sub.a.example.com. IN A
SECTION ANSWER
www.sub.a.example.com. IN A 10.20.30.40
www.sub.a.example.com. 3600 IN RRSIG A 7 5 3600 20070926134150 20070829134150 57024 sub.a.example.com. az44R7VbfooRtaSOO65W+GP4K/fHlIcKMkF/z3LVvDXOdCK+zuYPJycBCYljH5cAhslMXgDeHMOWdcPhKIZ3EjykYUJIGlMckVIMobBieFKFhIX9r/bRpT0vlsCF2YKbmvyjpeRF/sIg2iSNMf/s6wxpZq02Kq6yuHtUEqgx7uA=
SECTION AUTHORITY
SECTION ADDITIONAL
ENTRY_END
RANGE_END
; ns.example.net.
RANGE_BEGIN 0 100
ADDRESS 1.2.3.6
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR AA NOERROR
SECTION QUESTION
zzz.example.net. IN DS
SECTION ANSWER
SECTION AUTHORITY
example.net. IN SOA root. host. 1 2 3 4 5
SECTION ADDITIONAL
ENTRY_END
RANGE_END
STEP 1 QUERY
ENTRY_BEGIN
REPLY RD DO
SECTION QUESTION
www.sub.a.example.com. IN A
ENTRY_END
; recursion happens here.
STEP 10 CHECK_ANSWER
ENTRY_BEGIN
MATCH all
REPLY QR RD RA AD NOERROR
SECTION QUESTION
www.sub.a.example.com. IN A
SECTION ANSWER
www.sub.a.example.com. 3600 IN A 10.20.30.40
www.sub.a.example.com. 3600 IN RRSIG A 7 5 3600 20070926134150 20070829134150 57024 sub.a.example.com. az44R7VbfooRtaSOO65W+GP4K/fHlIcKMkF/z3LVvDXOdCK+zuYPJycBCYljH5cAhslMXgDeHMOWdcPhKIZ3EjykYUJIGlMckVIMobBieFKFhIX9r/bRpT0vlsCF2YKbmvyjpeRF/sIg2iSNMf/s6wxpZq02Kq6yuHtUEqgx7uA=
ENTRY_END
SCENARIO_END
dnssecjava-1.1.3/src/test/resources/unbound/val_ds_cnamesubbogus.rpl 0000664 0000000 0000000 00000020506 13020541473 0025775 0 ustar 00root root 0000000 0000000 ; config options
; The island of trust is at example.com
server:
trust-anchor: "example.com. 3600 IN DS 2854 3 1 46e4ffc6e9a4793b488954bd3f0cc6af0dfb201b"
val-override-date: "20070916134226"
target-fetch-policy: "0 0 0 0 0"
stub-zone:
name: "."
stub-addr: 193.0.14.129 # K.ROOT-SERVERS.NET.
CONFIG_END
SCENARIO_BEGIN Test validator with bogus CNAME response to DS in chain of trust
; the CNAME is at a nonempty nonterminal name in the parent zone.
; K.ROOT-SERVERS.NET.
RANGE_BEGIN 0 100
ADDRESS 193.0.14.129
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
. IN NS
SECTION ANSWER
. IN NS K.ROOT-SERVERS.NET.
SECTION ADDITIONAL
K.ROOT-SERVERS.NET. IN A 193.0.14.129
ENTRY_END
ENTRY_BEGIN
MATCH opcode subdomain
ADJUST copy_id copy_query
REPLY QR NOERROR
SECTION QUESTION
com. IN A
SECTION AUTHORITY
com. IN NS a.gtld-servers.net.
SECTION ADDITIONAL
a.gtld-servers.net. IN A 192.5.6.30
ENTRY_END
ENTRY_BEGIN
MATCH opcode subdomain
ADJUST copy_id copy_query
REPLY QR NOERROR
SECTION QUESTION
net. IN A
SECTION AUTHORITY
net. IN NS a.gtld-servers.net.
SECTION ADDITIONAL
a.gtld-servers.net. IN A 192.5.6.30
ENTRY_END
RANGE_END
; a.gtld-servers.net.
RANGE_BEGIN 0 100
ADDRESS 192.5.6.30
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
com. IN NS
SECTION ANSWER
com. IN NS a.gtld-servers.net.
SECTION ADDITIONAL
a.gtld-servers.net. IN A 192.5.6.30
ENTRY_END
ENTRY_BEGIN
MATCH opcode subdomain
ADJUST copy_id copy_query
REPLY QR NOERROR
SECTION QUESTION
example.com. IN A
SECTION AUTHORITY
example.com. IN NS ns.example.com.
SECTION ADDITIONAL
ns.example.com. IN A 1.2.3.4
ENTRY_END
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR AA NOERROR
SECTION QUESTION
ns.example.com. IN AAAA
SECTION ANSWER
ENTRY_END
ENTRY_BEGIN
MATCH opcode subdomain
ADJUST copy_id copy_query
REPLY QR AA NOERROR
SECTION QUESTION
example.net. IN A
SECTION AUTHORITY
example.net. IN NS ns.example.net.
SECTION ADDITIONAL
ns.example.net. IN A 1.2.3.6
ENTRY_END
RANGE_END
; ns.example.com.
RANGE_BEGIN 0 100
ADDRESS 1.2.3.4
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
ns.example.com. IN AAAA
SECTION ANSWER
; not legal NOERROR/NODATA response, but leniently accepted (not validated)
SECTION AUTHORITY
example.com. IN NS ns.example.com.
example.com. 3600 IN RRSIG NS 3 2 3600 20070926134150 20070829134150 2854 example.com. MC0CFQCN+qHdJxoI/2tNKwsb08pra/G7aAIUAWA5sDdJTbrXA1/3OaesGBAO3sI= ;{id = 2854}
;example.com. IN SOA alfa.ns.example.com.cz. hostmaster.example.com. 2010030800 10800 86400 604800 86400
;example.com. 3600 IN RRSIG SOA 3 2 3600 20070926134150 20070829134150 2854 example.com. ADsxLOHjxFzwFmwIiGOubqD9nKWAp4RccRIXQ0+EAUGfSDZMCB0ZiFA= ;{id = 2854}
SECTION ADDITIONAL
ns.example.com. IN A 1.2.3.4
ns.example.com. 3600 IN RRSIG A 3 3 3600 20070926135752 20070829135752 2854 example.com. MC0CFQCMSWxVehgOQLoYclB9PIAbNP229AIUeH0vNNGJhjnZiqgIOKvs1EhzqAo= ;{id = 2854}
ENTRY_END
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
example.com. IN NS
SECTION ANSWER
example.com. IN NS ns.example.com.
example.com. 3600 IN RRSIG NS 3 2 3600 20070926134150 20070829134150 2854 example.com. MC0CFQCN+qHdJxoI/2tNKwsb08pra/G7aAIUAWA5sDdJTbrXA1/3OaesGBAO3sI= ;{id = 2854}
SECTION ADDITIONAL
ns.example.com. IN A 1.2.3.4
ns.example.com. 3600 IN RRSIG A 3 3 3600 20070926135752 20070829135752 2854 example.com. MC0CFQCMSWxVehgOQLoYclB9PIAbNP229AIUeH0vNNGJhjnZiqgIOKvs1EhzqAo= ;{id = 2854}
ENTRY_END
; response to DNSKEY priming query
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
example.com. IN DNSKEY
SECTION ANSWER
example.com. 3600 IN DNSKEY 256 3 3 ALXLUsWqUrY3JYER3T4TBJII s70j+sDS/UT2QRp61SE7S3E EXopNXoFE73JLRmvpi/UrOO/Vz4Se 6wXv/CYCKjGw06U4WRgR YXcpEhJROyNapmdIKSx hOzfLVE1gqA0PweZR8d tY3aNQSRn3sPpwJr6Mi /PqQKAMMrZ9ckJpf1+b QMOOvxgzz2U1GS18b3y ZKcgTMEaJzd/GZYzi/B N2DzQ0MsrSwYXfsNLFO Bbs8PJMW4LYIxeeOe6rUgkWOF 7CC9Dh/dduQ1QrsJhmZAEFfd6ByYV+ ;{id = 2854 (zsk), size = 1688b}
example.com. 3600 IN RRSIG DNSKEY 3 2 3600 20070926134802 20070829134802 2854 example.com. MCwCFG1yhRNtTEa3Eno2zhVVuy2EJX3wAhQeLyUp6+UXcpC5qGNu9tkrTEgPUg== ;{id = 2854}
SECTION AUTHORITY
example.com. IN NS ns.example.com.
example.com. 3600 IN RRSIG NS 3 2 3600 20070926134150 20070829134150 2854 example.com. MC0CFQCN+qHdJxoI/2tNKwsb08pra/G7aAIUAWA5sDdJTbrXA1/3OaesGBAO3sI= ;{id = 2854}
SECTION ADDITIONAL
ns.example.com. IN A 1.2.3.4
ns.example.com. 3600 IN RRSIG A 3 3 3600 20070926135752 20070829135752 2854 example.com. MC0CFQCMSWxVehgOQLoYclB9PIAbNP229AIUeH0vNNGJhjnZiqgIOKvs1EhzqAo= ;{id = 2854}
ENTRY_END
; response to DS query for a.example.com, a CNAME
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR AA NOERROR
SECTION QUESTION
a.example.com. IN DS
SECTION ANSWER
;bogus CNAME, must fail validation
a.example.com. IN CNAME zzzz.example.net.
a.example.com. 3600 IN RRSIG CNAME 3 3 3600 20070926134150 20070829134150 2854 example.com. AKM6/j6yowuwqbazKzi4fEsavcLwXo3PjglhH9KD68ANZOrdN9y1ZCc=
SECTION AUTHORITY
SECTION ADDITIONAL
ENTRY_END
; response to DS query for sub.a.example.com.
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR AA NOERROR
SECTION QUESTION
sub.a.example.com. IN DS
SECTION ANSWER
sub.a.example.com. 3600 IN DS 57024 7 1 e54100bff773a794854808694c5d217267a53649
sub.a.example.com. 3600 IN RRSIG DS 3 4 3600 20070926134150 20070829134150 2854 example.com. ALHDGmpgZlXnAb54z4FbBKw/9nXVBdosG0UCEuh4qU7Lm/fs5Dv9aJw=
SECTION AUTHORITY
SECTION ADDITIONAL
ENTRY_END
; delegation down
ENTRY_BEGIN
MATCH opcode subdomain
ADJUST copy_id copy_query
REPLY QR NOERROR
SECTION QUESTION
sub.a.example.com. IN NS
SECTION ANSWER
SECTION AUTHORITY
sub.a.example.com. 3600 IN DS 57024 7 1 e54100bff773a794854808694c5d217267a53649
sub.a.example.com. 3600 IN RRSIG DS 3 4 3600 20070926134150 20070829134150 2854 example.com. ALHDGmpgZlXnAb54z4FbBKw/9nXVBdosG0UCEuh4qU7Lm/fs5Dv9aJw=
sub.a.example.com. IN NS ns.sub.a.example.com.
SECTION ADDITIONAL
ns.sub.a.example.com. IN A 1.2.3.5
ENTRY_END
RANGE_END
; ns.sub.a.example.com.
RANGE_BEGIN 0 100
ADDRESS 1.2.3.5
; DNSKEY query
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR AA NOERROR
SECTION QUESTION
sub.a.example.com. IN DNSKEY
SECTION ANSWER
sub.a.example.com. 3600 IN DNSKEY 257 3 7 AwEAAbvre/wK/WVeoj0SiwVkTD+NefvHPru9YIqLWY0m+0E5NYOpJZdc+PGQQYRzFNOlugVZtFirmv5Lmz7GNiASXtG/IFi//SlE30DxEKQOjt2F6qSZTZ1nZ5XOIMGTwWyp4OoI0egk5JavC5mQbyXqcj82ywt6F5Z3CmnThVl6MtOv ;{id = 57024 (ksk), size = 1024b}
sub.a.example.com. 3600 IN RRSIG DNSKEY 7 4 3600 20070926134150 20070829134150 57024 sub.a.example.com. TB3rkkPBD/ESQR9WBpfq2aV+2howI+EJq2+om2EI6PiemQOdpN6ovLvKwCILb0LOsTEFfPpAvRCOuDzRC24sJqBgWpZ4xLxMTcQJ8hMvv7rIUfZotDPO2JYNHSRmpeQLuDGA6P+AtJLYIr7yfOltJmJ0aCJxy3Fm9RQxJxHVbEQ=
SECTION AUTHORITY
SECTION ADDITIONAL
ENTRY_END
; query of interest
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR AA NOERROR
SECTION QUESTION
www.sub.a.example.com. IN A
SECTION ANSWER
www.sub.a.example.com. IN A 10.20.30.40
www.sub.a.example.com. 3600 IN RRSIG A 7 5 3600 20070926134150 20070829134150 57024 sub.a.example.com. az44R7VbfooRtaSOO65W+GP4K/fHlIcKMkF/z3LVvDXOdCK+zuYPJycBCYljH5cAhslMXgDeHMOWdcPhKIZ3EjykYUJIGlMckVIMobBieFKFhIX9r/bRpT0vlsCF2YKbmvyjpeRF/sIg2iSNMf/s6wxpZq02Kq6yuHtUEqgx7uA=
SECTION AUTHORITY
SECTION ADDITIONAL
ENTRY_END
RANGE_END
; ns.example.net.
RANGE_BEGIN 0 100
ADDRESS 1.2.3.6
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR AA NOERROR
SECTION QUESTION
zzz.example.net. IN DS
SECTION ANSWER
SECTION AUTHORITY
example.net. IN SOA root. host. 1 2 3 4 5
SECTION ADDITIONAL
ENTRY_END
RANGE_END
STEP 1 QUERY
ENTRY_BEGIN
REPLY RD DO
SECTION QUESTION
www.sub.a.example.com. IN A
ENTRY_END
; recursion happens here.
STEP 10 CHECK_ANSWER
ENTRY_BEGIN
MATCH all
REPLY QR RD RA SERVFAIL
SECTION QUESTION
www.sub.a.example.com. IN A
SECTION ANSWER
;www.sub.a.example.com. 3600 IN A 10.20.30.40
;www.sub.a.example.com. 3600 IN RRSIG A 7 5 3600 20070926134150 20070829134150 57024 sub.a.example.com. az44R7VbfooRtaSOO65W+GP4K/fHlIcKMkF/z3LVvDXOdCK+zuYPJycBCYljH5cAhslMXgDeHMOWdcPhKIZ3EjykYUJIGlMckVIMobBieFKFhIX9r/bRpT0vlsCF2YKbmvyjpeRF/sIg2iSNMf/s6wxpZq02Kq6yuHtUEqgx7uA=
ENTRY_END
SCENARIO_END
dnssecjava-1.1.3/src/test/resources/unbound/val_ds_gost.rpl 0000664 0000000 0000000 00000015700 13020541473 0024114 0 ustar 00root root 0000000 0000000 ; config options
; The island of trust is at example.com
server:
trust-anchor: "example.com. 3600 IN DS 2854 3 1 46e4ffc6e9a4793b488954bd3f0cc6af0dfb201b"
val-override-date: "20070916134226"
target-fetch-policy: "0 0 0 0 0"
stub-zone:
name: "."
stub-addr: 193.0.14.129 # K.ROOT-SERVERS.NET.
CONFIG_END
SCENARIO_BEGIN Test validator with GOST DS digest
; K.ROOT-SERVERS.NET.
RANGE_BEGIN 0 100
ADDRESS 193.0.14.129
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
. IN NS
SECTION ANSWER
. IN NS K.ROOT-SERVERS.NET.
SECTION ADDITIONAL
K.ROOT-SERVERS.NET. IN A 193.0.14.129
ENTRY_END
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
www.sub.example.com. IN A
SECTION AUTHORITY
com. IN NS a.gtld-servers.net.
SECTION ADDITIONAL
a.gtld-servers.net. IN A 192.5.6.30
ENTRY_END
RANGE_END
; a.gtld-servers.net.
RANGE_BEGIN 0 100
ADDRESS 192.5.6.30
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
com. IN NS
SECTION ANSWER
com. IN NS a.gtld-servers.net.
SECTION ADDITIONAL
a.gtld-servers.net. IN A 192.5.6.30
ENTRY_END
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
www.sub.example.com. IN A
SECTION AUTHORITY
example.com. IN NS ns.example.com.
SECTION ADDITIONAL
ns.example.com. IN A 1.2.3.4
ENTRY_END
RANGE_END
; ns.example.com.
RANGE_BEGIN 0 100
ADDRESS 1.2.3.4
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
example.com. IN NS
SECTION ANSWER
example.com. IN NS ns.example.com.
example.com. 3600 IN RRSIG NS 3 2 3600 20070926134150 20070829134150 2854 example.com. MC0CFQCN+qHdJxoI/2tNKwsb08pra/G7aAIUAWA5sDdJTbrXA1/3OaesGBAO3sI= ;{id = 2854}
SECTION ADDITIONAL
ns.example.com. IN A 1.2.3.4
ns.example.com. 3600 IN RRSIG A 3 3 3600 20070926135752 20070829135752 2854 example.com. MC0CFQCMSWxVehgOQLoYclB9PIAbNP229AIUeH0vNNGJhjnZiqgIOKvs1EhzqAo= ;{id = 2854}
ENTRY_END
; response to DNSKEY priming query
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
example.com. IN DNSKEY
SECTION ANSWER
example.com. 3600 IN DNSKEY 256 3 3 ALXLUsWqUrY3JYER3T4TBJII s70j+sDS/UT2QRp61SE7S3E EXopNXoFE73JLRmvpi/UrOO/Vz4Se 6wXv/CYCKjGw06U4WRgR YXcpEhJROyNapmdIKSx hOzfLVE1gqA0PweZR8d tY3aNQSRn3sPpwJr6Mi /PqQKAMMrZ9ckJpf1+b QMOOvxgzz2U1GS18b3y ZKcgTMEaJzd/GZYzi/B N2DzQ0MsrSwYXfsNLFO Bbs8PJMW4LYIxeeOe6rUgkWOF 7CC9Dh/dduQ1QrsJhmZAEFfd6ByYV+ ;{id = 2854 (zsk), size = 1688b}
example.com. 3600 IN RRSIG DNSKEY DSA 2 3600 20070926134150 20070829134150 2854 example.com. MCwCFBQRtlR4BEv9ohi+PGFjp+AHsJuHAhRCvz0shggvnvI88DFnBDCczHUcVA== ;{id = 2854}
SECTION AUTHORITY
example.com. IN NS ns.example.com.
example.com. 3600 IN RRSIG NS 3 2 3600 20070926134150 20070829134150 2854 example.com. MC0CFQCN+qHdJxoI/2tNKwsb08pra/G7aAIUAWA5sDdJTbrXA1/3OaesGBAO3sI= ;{id = 2854}
SECTION ADDITIONAL
ns.example.com. IN A 1.2.3.4
ns.example.com. 3600 IN RRSIG A 3 3 3600 20070926135752 20070829135752 2854 example.com. MC0CFQCMSWxVehgOQLoYclB9PIAbNP229AIUeH0vNNGJhjnZiqgIOKvs1EhzqAo= ;{id = 2854}
ENTRY_END
; response for delegation to sub.example.com.
ENTRY_BEGIN
MATCH opcode subdomain
ADJUST copy_id copy_query
REPLY QR NOERROR
SECTION QUESTION
sub.example.com. IN A
SECTION ANSWER
SECTION AUTHORITY
sub.example.com. IN NS ns.sub.example.com.
; GOST DS for sub.example.com.
sub.example.com. 3600 IN DS 60385 12 3 2be04f63b3d069fd65f81a3b810b661a00d39be3ff00d1c7481a150b93b0d027 ; xepov-bofek-fuset-bipiz-tunoz-mukyf-rybyb-ranic-pobet-fakov-fozob-bagus-ludac-pyheb-rygor-bygyd-lyxyx
; SHA DS for sub.example.com.
;sub.example.com. 3600 IN DS 60385 12 1 0a66f7923318bb1e208bfd975ffa2e30cfcdf962 ; xedik-katin-dasec-myvic-vumum-rizan-luluz-paraf-befas-tovek-dyxax
;sub.example.com. 3600 IN DS 60385 12 2 cd3290b84b457d02ca29846a005a5eba61640256ced8deca0ef8345d2cd34a58 ; xufef-dugir-modog-hyzyb-dadod-nicuk-pubyh-polor-pomuk-gobuh-kufet-mulus-pofyz-metoh-tarit-fudih-moxex
sub.example.com. 3600 IN RRSIG DS 3 3 3600 20070926135752 20070829135752 2854 example.com. ADwjiGkzrz8RPRJ6LAB37cNEQxTXSaR6Stu/GwGvcQ7KVGH/Qw76ktI= ;{id = 2854}
SECTION ADDITIONAL
ns.sub.example.com. IN A 1.2.3.6
ENTRY_END
RANGE_END
; ns.sub.example.com.
RANGE_BEGIN 0 100
ADDRESS 1.2.3.6
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
sub.example.com. IN NS
SECTION ANSWER
sub.example.com. IN NS ns.sub.example.com.
sub.example.com. 3600 IN RRSIG NS 12 3 3600 20070926134150 20070829134150 60385 sub.example.com. LAgerMKnwGgapo7tDs2jV8kjA+RminByvkR6qHineRDv4SYbRdDlCtYcFR4CoYo9aigLPej1WBmaZjFV+/7AVA== ;{id = 60385}
SECTION ADDITIONAL
ns.sub.example.com. IN A 1.2.3.6
ns.sub.example.com. 3600 IN RRSIG A 12 4 3600 20070926134150 20070829134150 60385 sub.example.com. qYVQEwiVNWwRRoDJxK3c3LaXtfvOm/YzOEzXbN2MxPHZXHaa2nCzWLsILNstot/wTAbrk4wNcT16gKxF5JguNw== ;{id = 60385}
ENTRY_END
; response to DNSKEY priming query
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
sub.example.com. IN DNSKEY
SECTION ANSWER
sub.example.com. 3600 IN DNSKEY 256 3 12 9SZY+xB3wKtrLoRHzkBs9L3fjcvazjnk5HF3gMaD1PVp4pthrwgHIm0TUaLrd3YCa2VCl5wj+MzbhZi8NEJ/Cg== ;{id = 60385 (zsk), size = 512b}
sub.example.com. 3600 IN RRSIG DNSKEY 12 3 3600 20070926134150 20070829134150 60385 sub.example.com. zyZCppfMjlMS9xs3pJfbWkdA6EgV5MqI11AdVRV8pBsyI7diYLWm8RAHlhEI5MT59A6IT6Di9YjOCvWJjzZ9tA== ;{id = 60385}
SECTION AUTHORITY
sub.example.com. IN NS ns.sub.example.com.
sub.example.com. 3600 IN RRSIG NS 12 3 3600 20070926134150 20070829134150 60385 sub.example.com. 3y6qmOn5GIytQQtXmdhkyL0+8Um7uNzOA0m0CkWFtzN81T98jHdGcCGNC3CIGMyhKaWKqPlOoSwIfm55fa4qRA== ;{id = 60385}
SECTION ADDITIONAL
ns.sub.example.com. IN A 1.2.3.6
ns.sub.example.com. 3600 IN RRSIG A 12 4 3600 20070926134150 20070829134150 60385 sub.example.com. VS97UxG9Kn7DIYFCnBDJQ3n7sQ+aYF42/cU6s8jF1Y4nHSorKPFa0KHn0WVmaW33hA+Vs4BWTvJ1/JOpbiJskA== ;{id = 60385}
ENTRY_END
; response to query of interest
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
www.sub.example.com. IN A
SECTION ANSWER
www.sub.example.com. IN A 11.11.11.11
www.sub.example.com. 3600 IN RRSIG A 12 4 3600 20070926134150 20070829134150 60385 sub.example.com. KVDpNBH83UM8l1e9yAdXA1fV+wFJSJF4NtOnDLTtbpfyVbndNW3tvPc2YfLBxTEZeUCns2QrqcmIMdZ086frOQ== ;{id = 60385}
SECTION AUTHORITY
SECTION ADDITIONAL
ENTRY_END
RANGE_END
STEP 1 QUERY
ENTRY_BEGIN
REPLY RD DO
SECTION QUESTION
www.sub.example.com. IN A
ENTRY_END
; recursion happens here.
STEP 10 CHECK_ANSWER
ENTRY_BEGIN
MATCH all
REPLY QR RD RA AD NOERROR
SECTION QUESTION
www.sub.example.com. IN A
SECTION ANSWER
www.sub.example.com. 3600 IN A 11.11.11.11
www.sub.example.com. 3600 IN RRSIG A 12 4 3600 20070926134150 20070829134150 60385 sub.example.com. KVDpNBH83UM8l1e9yAdXA1fV+wFJSJF4NtOnDLTtbpfyVbndNW3tvPc2YfLBxTEZeUCns2QrqcmIMdZ086frOQ== ;{id = 60385}
SECTION AUTHORITY
SECTION ADDITIONAL
ENTRY_END
SCENARIO_END
dnssecjava-1.1.3/src/test/resources/unbound/val_ds_gost_downgrade.rpl 0000664 0000000 0000000 00000020305 13020541473 0026143 0 ustar 00root root 0000000 0000000 ; config options
; The island of trust is at example.com
server:
trust-anchor: "example.com. 3600 IN DS 2854 3 1 46e4ffc6e9a4793b488954bd3f0cc6af0dfb201b"
val-override-date: "20070916134226"
target-fetch-policy: "0 0 0 0 0"
stub-zone:
name: "."
stub-addr: 193.0.14.129 # K.ROOT-SERVERS.NET.
CONFIG_END
SCENARIO_BEGIN Test validator with GOST DS digest downgrade attack
; K.ROOT-SERVERS.NET.
RANGE_BEGIN 0 100
ADDRESS 193.0.14.129
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
. IN NS
SECTION ANSWER
. IN NS K.ROOT-SERVERS.NET.
SECTION ADDITIONAL
K.ROOT-SERVERS.NET. IN A 193.0.14.129
ENTRY_END
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
www.sub.example.com. IN A
SECTION AUTHORITY
com. IN NS a.gtld-servers.net.
SECTION ADDITIONAL
a.gtld-servers.net. IN A 192.5.6.30
ENTRY_END
RANGE_END
; a.gtld-servers.net.
RANGE_BEGIN 0 100
ADDRESS 192.5.6.30
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
com. IN NS
SECTION ANSWER
com. IN NS a.gtld-servers.net.
SECTION ADDITIONAL
a.gtld-servers.net. IN A 192.5.6.30
ENTRY_END
ENTRY_BEGIN
MATCH opcode subdomain
ADJUST copy_id copy_query
REPLY QR NOERROR
SECTION QUESTION
example.com. IN A
SECTION AUTHORITY
example.com. IN NS ns.example.com.
SECTION ADDITIONAL
ns.example.com. IN A 1.2.3.4
ENTRY_END
RANGE_END
; ns.example.com.
RANGE_BEGIN 0 100
ADDRESS 1.2.3.4
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR AA REFUSED
SECTION QUESTION
ns.example.com. IN AAAA
ENTRY_END
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
example.com. IN NS
SECTION ANSWER
example.com. IN NS ns.example.com.
example.com. 3600 IN RRSIG NS 3 2 3600 20070926134150 20070829134150 2854 example.com. MC0CFQCN+qHdJxoI/2tNKwsb08pra/G7aAIUAWA5sDdJTbrXA1/3OaesGBAO3sI= ;{id = 2854}
SECTION ADDITIONAL
ns.example.com. IN A 1.2.3.4
ns.example.com. 3600 IN RRSIG A 3 3 3600 20070926135752 20070829135752 2854 example.com. MC0CFQCMSWxVehgOQLoYclB9PIAbNP229AIUeH0vNNGJhjnZiqgIOKvs1EhzqAo= ;{id = 2854}
ENTRY_END
; response to DNSKEY priming query
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
example.com. IN DNSKEY
SECTION ANSWER
example.com. 3600 IN DNSKEY 256 3 3 ALXLUsWqUrY3JYER3T4TBJII s70j+sDS/UT2QRp61SE7S3E EXopNXoFE73JLRmvpi/UrOO/Vz4Se 6wXv/CYCKjGw06U4WRgR YXcpEhJROyNapmdIKSx hOzfLVE1gqA0PweZR8d tY3aNQSRn3sPpwJr6Mi /PqQKAMMrZ9ckJpf1+b QMOOvxgzz2U1GS18b3y ZKcgTMEaJzd/GZYzi/B N2DzQ0MsrSwYXfsNLFO Bbs8PJMW4LYIxeeOe6rUgkWOF 7CC9Dh/dduQ1QrsJhmZAEFfd6ByYV+ ;{id = 2854 (zsk), size = 1688b}
example.com. 3600 IN RRSIG DNSKEY DSA 2 3600 20070926134150 20070829134150 2854 example.com. MCwCFBQRtlR4BEv9ohi+PGFjp+AHsJuHAhRCvz0shggvnvI88DFnBDCczHUcVA== ;{id = 2854}
SECTION AUTHORITY
example.com. IN NS ns.example.com.
example.com. 3600 IN RRSIG NS 3 2 3600 20070926134150 20070829134150 2854 example.com. MC0CFQCN+qHdJxoI/2tNKwsb08pra/G7aAIUAWA5sDdJTbrXA1/3OaesGBAO3sI= ;{id = 2854}
SECTION ADDITIONAL
ns.example.com. IN A 1.2.3.4
ns.example.com. 3600 IN RRSIG A 3 3 3600 20070926135752 20070829135752 2854 example.com. MC0CFQCMSWxVehgOQLoYclB9PIAbNP229AIUeH0vNNGJhjnZiqgIOKvs1EhzqAo= ;{id = 2854}
ENTRY_END
; response for delegation to sub.example.com.
ENTRY_BEGIN
MATCH opcode subdomain
ADJUST copy_id copy_query
REPLY QR NOERROR
SECTION QUESTION
sub.example.com. IN A
SECTION ANSWER
SECTION AUTHORITY
sub.example.com. IN NS ns.sub.example.com.
; downgrade: false GOST, correct SHA
sub.example.com. 3600 IN DS 60385 12 3 2be04f63b3d069fd65f81a3b810b661a00d39be3ff00d1c7481a150b93b0d028
; correct GOST DS for sub.example.com.
; sub.example.com. 3600 IN DS 60385 12 3 2be04f63b3d069fd65f81a3b810b661a00d39be3ff00d1c7481a150b93b0d027 ; xepov-bofek-fuset-bipiz-tunoz-mukyf-rybyb-ranic-pobet-fakov-fozob-bagus-ludac-pyheb-rygor-bygyd-lyxyx
; SHA1 DS for sub.example.com.
sub.example.com. 3600 IN DS 60385 12 1 0a66f7923318bb1e208bfd975ffa2e30cfcdf962 ; xedik-katin-dasec-myvic-vumum-rizan-luluz-paraf-befas-tovek-dyxax
; SHA256 DS for sub.example.com.
sub.example.com. 3600 IN DS 60385 12 2 cd3290b84b457d02ca29846a005a5eba61640256ced8deca0ef8345d2cd34a58 ; xufef-dugir-modog-hyzyb-dadod-nicuk-pubyh-polor-pomuk-gobuh-kufet-mulus-pofyz-metoh-tarit-fudih-moxex
; signs SHA1, SHA2 and GOST DSes
sub.example.com. 3600 IN RRSIG DS 3 3 3600 20070926135752 20070829135752 2854 example.com. ADB1PPtGoPKRrhNtRtkqeqpgnZdbPOdJMgjdZVxPfgGCoMTu3JFQVbo= ;{id = 2854}
SECTION ADDITIONAL
ns.sub.example.com. IN A 1.2.3.6
ENTRY_END
RANGE_END
; ns.sub.example.com.
RANGE_BEGIN 0 100
ADDRESS 1.2.3.6
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
sub.example.com. IN NS
SECTION ANSWER
sub.example.com. IN NS ns.sub.example.com.
sub.example.com. 3600 IN RRSIG NS 12 3 3600 20070926134150 20070829134150 60385 sub.example.com. 6mNrX32/DC2RU1A+yWCccn5H6wnsbNYTlf8e/LyF1fsuNfw6tH12sKGBCtk1mp4HpDIgH02HDHplJskSFOvzTw== ;{id = 60385}
SECTION ADDITIONAL
ns.sub.example.com. IN A 1.2.3.6
ns.sub.example.com. 3600 IN RRSIG A 12 4 3600 20070926134150 20070829134150 60385 sub.example.com. kJEyinL7BkpiPW2HxmFHRLAi68EdrLXToJiK83a5cedDe5ABL7c/k+nFHd3WjATUtVoueY3pSnCDVCJaFmd+/A== ;{id = 60385}
ENTRY_END
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR AA NOERROR
SECTION QUESTION
ns.sub.example.com. IN A
SECTION ANSWER
ns.sub.example.com. IN A 1.2.3.6
ns.sub.example.com. 3600 IN RRSIG A 12 4 3600 20070926134150 20070829134150 60385 sub.example.com. kJEyinL7BkpiPW2HxmFHRLAi68EdrLXToJiK83a5cedDe5ABL7c/k+nFHd3WjATUtVoueY3pSnCDVCJaFmd+/A== ;{id = 60385}
SECTION AUTHORITY
sub.example.com. IN NS ns.sub.example.com.
sub.example.com. 3600 IN RRSIG NS 12 3 3600 20070926134150 20070829134150 60385 sub.example.com. 6mNrX32/DC2RU1A+yWCccn5H6wnsbNYTlf8e/LyF1fsuNfw6tH12sKGBCtk1mp4HpDIgH02HDHplJskSFOvzTw== ;{id = 60385}
ENTRY_END
; response to DNSKEY priming query
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
sub.example.com. IN DNSKEY
SECTION ANSWER
sub.example.com. 3600 IN DNSKEY 256 3 12 9SZY+xB3wKtrLoRHzkBs9L3fjcvazjnk5HF3gMaD1PVp4pthrwgHIm0TUaLrd3YCa2VCl5wj+MzbhZi8NEJ/Cg== ;{id = 60385 (zsk), size = 512b}
sub.example.com. 3600 IN RRSIG DNSKEY 12 3 3600 20070926134150 20070829134150 60385 sub.example.com. zyZCppfMjlMS9xs3pJfbWkdA6EgV5MqI11AdVRV8pBsyI7diYLWm8RAHlhEI5MT59A6IT6Di9YjOCvWJjzZ9tA== ;{id = 60385}
SECTION AUTHORITY
sub.example.com. IN NS ns.sub.example.com.
sub.example.com. 3600 IN RRSIG NS 12 3 3600 20070926134150 20070829134150 60385 sub.example.com. 6mNrX32/DC2RU1A+yWCccn5H6wnsbNYTlf8e/LyF1fsuNfw6tH12sKGBCtk1mp4HpDIgH02HDHplJskSFOvzTw== ;{id = 60385}
SECTION ADDITIONAL
ns.sub.example.com. IN A 1.2.3.6
ns.sub.example.com. 3600 IN RRSIG A 12 4 3600 20070926134150 20070829134150 60385 sub.example.com. kJEyinL7BkpiPW2HxmFHRLAi68EdrLXToJiK83a5cedDe5ABL7c/k+nFHd3WjATUtVoueY3pSnCDVCJaFmd+/A== ;{id = 60385}
ENTRY_END
; response to query of interest
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
www.sub.example.com. IN A
SECTION ANSWER
www.sub.example.com. IN A 11.11.11.11
www.sub.example.com. 3600 IN RRSIG A 12 4 3600 20070926134150 20070829134150 60385 sub.example.com. KVDpNBH83UM8l1e9yAdXA1fV+wFJSJF4NtOnDLTtbpfyVbndNW3tvPc2YfLBxTEZeUCns2QrqcmIMdZ086frOQ== ;{id = 60385}
SECTION AUTHORITY
SECTION ADDITIONAL
ENTRY_END
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR AA REFUSED
SECTION QUESTION
ns.sub.example.com. IN AAAA
ENTRY_END
RANGE_END
STEP 1 QUERY
ENTRY_BEGIN
REPLY RD DO
SECTION QUESTION
www.sub.example.com. IN A
ENTRY_END
; recursion happens here.
; must servfail bogus
STEP 10 CHECK_ANSWER
ENTRY_BEGIN
MATCH all
REPLY QR RD RA SERVFAIL
SECTION QUESTION
www.sub.example.com. IN A
SECTION ANSWER
;www.sub.example.com. 3600 IN A 11.11.11.11
;www.sub.example.com. 3600 IN RRSIG A 12 4 3600 20070926134150 20070829134150 60385 sub.example.com. KVDpNBH83UM8l1e9yAdXA1fV+wFJSJF4NtOnDLTtbpfyVbndNW3tvPc2YfLBxTEZeUCns2QrqcmIMdZ086frOQ== ;{id = 60385}
SECTION AUTHORITY
SECTION ADDITIONAL
ENTRY_END
SCENARIO_END
dnssecjava-1.1.3/src/test/resources/unbound/val_ds_sha2.rpl 0000664 0000000 0000000 00000015467 13020541473 0024007 0 ustar 00root root 0000000 0000000 ; config options
; The island of trust is at example.com
server:
trust-anchor: "example.com. 3600 IN DS 2854 3 1 46e4ffc6e9a4793b488954bd3f0cc6af0dfb201b"
val-override-date: "20070916134226"
target-fetch-policy: "0 0 0 0 0"
stub-zone:
name: "."
stub-addr: 193.0.14.129 # K.ROOT-SERVERS.NET.
CONFIG_END
SCENARIO_BEGIN Test validator with SHA256 DS digest
; K.ROOT-SERVERS.NET.
RANGE_BEGIN 0 100
ADDRESS 193.0.14.129
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
. IN NS
SECTION ANSWER
. IN NS K.ROOT-SERVERS.NET.
SECTION ADDITIONAL
K.ROOT-SERVERS.NET. IN A 193.0.14.129
ENTRY_END
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
www.sub.example.com. IN A
SECTION AUTHORITY
com. IN NS a.gtld-servers.net.
SECTION ADDITIONAL
a.gtld-servers.net. IN A 192.5.6.30
ENTRY_END
RANGE_END
; a.gtld-servers.net.
RANGE_BEGIN 0 100
ADDRESS 192.5.6.30
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
com. IN NS
SECTION ANSWER
com. IN NS a.gtld-servers.net.
SECTION ADDITIONAL
a.gtld-servers.net. IN A 192.5.6.30
ENTRY_END
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
www.sub.example.com. IN A
SECTION AUTHORITY
example.com. IN NS ns.example.com.
SECTION ADDITIONAL
ns.example.com. IN A 1.2.3.4
ENTRY_END
RANGE_END
; ns.example.com.
RANGE_BEGIN 0 100
ADDRESS 1.2.3.4
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
example.com. IN NS
SECTION ANSWER
example.com. IN NS ns.example.com.
example.com. 3600 IN RRSIG NS 3 2 3600 20070926134150 20070829134150 2854 example.com. MC0CFQCN+qHdJxoI/2tNKwsb08pra/G7aAIUAWA5sDdJTbrXA1/3OaesGBAO3sI= ;{id = 2854}
SECTION ADDITIONAL
ns.example.com. IN A 1.2.3.4
ns.example.com. 3600 IN RRSIG A 3 3 3600 20070926135752 20070829135752 2854 example.com. MC0CFQCMSWxVehgOQLoYclB9PIAbNP229AIUeH0vNNGJhjnZiqgIOKvs1EhzqAo= ;{id = 2854}
ENTRY_END
; response to DNSKEY priming query
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
example.com. IN DNSKEY
SECTION ANSWER
example.com. 3600 IN DNSKEY 256 3 3 ALXLUsWqUrY3JYER3T4TBJII s70j+sDS/UT2QRp61SE7S3E EXopNXoFE73JLRmvpi/UrOO/Vz4Se 6wXv/CYCKjGw06U4WRgR YXcpEhJROyNapmdIKSx hOzfLVE1gqA0PweZR8d tY3aNQSRn3sPpwJr6Mi /PqQKAMMrZ9ckJpf1+b QMOOvxgzz2U1GS18b3y ZKcgTMEaJzd/GZYzi/B N2DzQ0MsrSwYXfsNLFO Bbs8PJMW4LYIxeeOe6rUgkWOF 7CC9Dh/dduQ1QrsJhmZAEFfd6ByYV+ ;{id = 2854 (zsk), size = 1688b}
example.com. 3600 IN RRSIG DNSKEY DSA 2 3600 20070926134150 20070829134150 2854 example.com. MCwCFBQRtlR4BEv9ohi+PGFjp+AHsJuHAhRCvz0shggvnvI88DFnBDCczHUcVA== ;{id = 2854}
SECTION AUTHORITY
example.com. IN NS ns.example.com.
example.com. 3600 IN RRSIG NS 3 2 3600 20070926134150 20070829134150 2854 example.com. MC0CFQCN+qHdJxoI/2tNKwsb08pra/G7aAIUAWA5sDdJTbrXA1/3OaesGBAO3sI= ;{id = 2854}
SECTION ADDITIONAL
ns.example.com. IN A 1.2.3.4
ns.example.com. 3600 IN RRSIG A 3 3 3600 20070926135752 20070829135752 2854 example.com. MC0CFQCMSWxVehgOQLoYclB9PIAbNP229AIUeH0vNNGJhjnZiqgIOKvs1EhzqAo= ;{id = 2854}
ENTRY_END
; response for delegation to sub.example.com.
ENTRY_BEGIN
MATCH opcode subdomain
ADJUST copy_id copy_query
REPLY QR NOERROR
SECTION QUESTION
sub.example.com. IN A
SECTION ANSWER
SECTION AUTHORITY
sub.example.com. IN NS ns.sub.example.com.
; SHA256 DS for sub.example.com.
sub.example.com. 3600 IN DS 30899 5 2 51be8e847cc663f2775d0f2b6d15e41553c97ecb99b8dd667f18244e2f652033
sub.example.com. 3600 IN RRSIG DS 3 3 3600 20070926135752 20070829135752 2854 example.com. AJ6FL7yKjrpEEO8WMKlG7TVZoGjgFblJeu0rkJCmJxfdeh6ysUlWQWs= ;{id = 2854}
; SHA1 DS for sub.example.com.
;sub.example.com. 3600 IN DS 30899 RSASHA1 1 f7ed618f24d5e5202927e1d27bc2e84a141cb4b3
SECTION ADDITIONAL
ns.sub.example.com. IN A 1.2.3.6
ENTRY_END
RANGE_END
; ns.sub.example.com.
RANGE_BEGIN 0 100
ADDRESS 1.2.3.6
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
sub.example.com. IN NS
SECTION ANSWER
sub.example.com. IN NS ns.sub.example.com.
sub.example.com. 3600 IN RRSIG NS 5 3 3600 20070926134150 20070829134150 30899 sub.example.com. wcpHeBILHfo8C9uxMhcW03gcURZeUffiKdSTb50ZjzTHgMNhRyMfpcvSpXEd9548A9UTmWKeLZChfr5Z/glONw== ;{id = 30899}
SECTION ADDITIONAL
ns.sub.example.com. IN A 1.2.3.6
ns.sub.example.com. 3600 IN RRSIG A 5 4 3600 20070926134150 20070829134150 30899 sub.example.com. UF7shD/gt1FOp2UHgLTNbPzVykklSXFMEtJ1xD+Hholwf/PIzd7zoaIttIYibNa4fUXCqMg22H9P7MRhfmFe6g== ;{id = 30899}
ENTRY_END
; response to DNSKEY priming query
; sub.example.com. 3600 IN DS 30899 RSASHA1 1 f7ed618f24d5e5202927e1d27bc2e84a141cb4b3
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
sub.example.com. IN DNSKEY
SECTION ANSWER
sub.example.com. 3600 IN DNSKEY 256 3 5 AQPQ41chR9DEHt/aIzIFAqanbDlRflJoRs5yz1jFsoRIT7dWf0r+PeDuewdxkszNH6wnU4QL8pfKFRh5PIYVBLK3 ;{id = 30899 (zsk), size = 512b}
sub.example.com. 3600 IN RRSIG DNSKEY 5 3 3600 20070926134150 20070829134150 30899 sub.example.com. uNGp99iznjD7oOX02XnQbDnbg75UwBHRvZSKYUorTKvPUnCWMHKdRsQ+mf+Fx3GZ+Fz9BVjoCmQqpnfgXLEYqw== ;{id = 30899}
SECTION AUTHORITY
sub.example.com. IN NS ns.sub.example.com.
sub.example.com. 3600 IN RRSIG NS 5 3 3600 20070926134150 20070829134150 30899 sub.example.com. wcpHeBILHfo8C9uxMhcW03gcURZeUffiKdSTb50ZjzTHgMNhRyMfpcvSpXEd9548A9UTmWKeLZChfr5Z/glONw== ;{id = 30899}
SECTION ADDITIONAL
ns.sub.example.com. IN A 1.2.3.6
ns.sub.example.com. 3600 IN RRSIG A 5 4 3600 20070926134150 20070829134150 30899 sub.example.com. UF7shD/gt1FOp2UHgLTNbPzVykklSXFMEtJ1xD+Hholwf/PIzd7zoaIttIYibNa4fUXCqMg22H9P7MRhfmFe6g== ;{id = 30899}
ENTRY_END
; response to query of interest
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
www.sub.example.com. IN A
SECTION ANSWER
www.sub.example.com. IN A 11.11.11.11
www.sub.example.com. 3600 IN RRSIG A 5 4 3600 20070926134150 20070829134150 30899 sub.example.com. 0DqqRfRtm7VSEQ4mmBbzrKRqQAay3JAE8DPDGmjtokrrjN9F1G/HxozDV7bjdIh2EChlQea8FPwf/GepJMUVxg== ;{id = 30899}
SECTION AUTHORITY
SECTION ADDITIONAL
ENTRY_END
RANGE_END
STEP 1 QUERY
ENTRY_BEGIN
REPLY RD DO
SECTION QUESTION
www.sub.example.com. IN A
ENTRY_END
; recursion happens here.
STEP 10 CHECK_ANSWER
ENTRY_BEGIN
MATCH all
REPLY QR RD RA AD NOERROR
SECTION QUESTION
www.sub.example.com. IN A
SECTION ANSWER
www.sub.example.com. 3600 IN A 11.11.11.11
www.sub.example.com. 3600 IN RRSIG A 5 4 3600 20070926134150 20070829134150 30899 sub.example.com. 0DqqRfRtm7VSEQ4mmBbzrKRqQAay3JAE8DPDGmjtokrrjN9F1G/HxozDV7bjdIh2EChlQea8FPwf/GepJMUVxg== ;{id = 30899}
SECTION AUTHORITY
SECTION ADDITIONAL
ENTRY_END
SCENARIO_END
dnssecjava-1.1.3/src/test/resources/unbound/val_ds_sha2_downgrade.rpl 0000664 0000000 0000000 00000016375 13020541473 0026040 0 ustar 00root root 0000000 0000000 ; config options
; The island of trust is at example.com
server:
trust-anchor: "example.com. 3600 IN DS 2854 3 1 46e4ffc6e9a4793b488954bd3f0cc6af0dfb201b"
val-override-date: "20070916134226"
target-fetch-policy: "0 0 0 0 0"
stub-zone:
name: "."
stub-addr: 193.0.14.129 # K.ROOT-SERVERS.NET.
CONFIG_END
SCENARIO_BEGIN Test validator with SHA256 DS downgrade to SHA1
; K.ROOT-SERVERS.NET.
RANGE_BEGIN 0 100
ADDRESS 193.0.14.129
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
. IN NS
SECTION ANSWER
. IN NS K.ROOT-SERVERS.NET.
SECTION ADDITIONAL
K.ROOT-SERVERS.NET. IN A 193.0.14.129
ENTRY_END
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
www.sub.example.com. IN A
SECTION AUTHORITY
com. IN NS a.gtld-servers.net.
SECTION ADDITIONAL
a.gtld-servers.net. IN A 192.5.6.30
ENTRY_END
RANGE_END
; a.gtld-servers.net.
RANGE_BEGIN 0 100
ADDRESS 192.5.6.30
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
com. IN NS
SECTION ANSWER
com. IN NS a.gtld-servers.net.
SECTION ADDITIONAL
a.gtld-servers.net. IN A 192.5.6.30
ENTRY_END
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
www.sub.example.com. IN A
SECTION AUTHORITY
example.com. IN NS ns.example.com.
SECTION ADDITIONAL
ns.example.com. IN A 1.2.3.4
ENTRY_END
RANGE_END
; ns.example.com.
RANGE_BEGIN 0 100
ADDRESS 1.2.3.4
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
example.com. IN NS
SECTION ANSWER
example.com. IN NS ns.example.com.
example.com. 3600 IN RRSIG NS 3 2 3600 20070926134150 20070829134150 2854 example.com. MC0CFQCN+qHdJxoI/2tNKwsb08pra/G7aAIUAWA5sDdJTbrXA1/3OaesGBAO3sI= ;{id = 2854}
SECTION ADDITIONAL
ns.example.com. IN A 1.2.3.4
ns.example.com. 3600 IN RRSIG A 3 3 3600 20070926135752 20070829135752 2854 example.com. MC0CFQCMSWxVehgOQLoYclB9PIAbNP229AIUeH0vNNGJhjnZiqgIOKvs1EhzqAo= ;{id = 2854}
ENTRY_END
; response to DNSKEY priming query
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
example.com. IN DNSKEY
SECTION ANSWER
example.com. 3600 IN DNSKEY 256 3 3 ALXLUsWqUrY3JYER3T4TBJII s70j+sDS/UT2QRp61SE7S3E EXopNXoFE73JLRmvpi/UrOO/Vz4Se 6wXv/CYCKjGw06U4WRgR YXcpEhJROyNapmdIKSx hOzfLVE1gqA0PweZR8d tY3aNQSRn3sPpwJr6Mi /PqQKAMMrZ9ckJpf1+b QMOOvxgzz2U1GS18b3y ZKcgTMEaJzd/GZYzi/B N2DzQ0MsrSwYXfsNLFO Bbs8PJMW4LYIxeeOe6rUgkWOF 7CC9Dh/dduQ1QrsJhmZAEFfd6ByYV+ ;{id = 2854 (zsk), size = 1688b}
example.com. 3600 IN RRSIG DNSKEY DSA 2 3600 20070926134150 20070829134150 2854 example.com. MCwCFBQRtlR4BEv9ohi+PGFjp+AHsJuHAhRCvz0shggvnvI88DFnBDCczHUcVA== ;{id = 2854}
SECTION AUTHORITY
example.com. IN NS ns.example.com.
example.com. 3600 IN RRSIG NS 3 2 3600 20070926134150 20070829134150 2854 example.com. MC0CFQCN+qHdJxoI/2tNKwsb08pra/G7aAIUAWA5sDdJTbrXA1/3OaesGBAO3sI= ;{id = 2854}
SECTION ADDITIONAL
ns.example.com. IN A 1.2.3.4
ns.example.com. 3600 IN RRSIG A 3 3 3600 20070926135752 20070829135752 2854 example.com. MC0CFQCMSWxVehgOQLoYclB9PIAbNP229AIUeH0vNNGJhjnZiqgIOKvs1EhzqAo= ;{id = 2854}
ENTRY_END
; response for delegation to sub.example.com.
ENTRY_BEGIN
MATCH opcode subdomain
ADJUST copy_id copy_query
REPLY QR NOERROR
SECTION QUESTION
sub.example.com. IN A
SECTION ANSWER
SECTION AUTHORITY
sub.example.com. IN NS ns.sub.example.com.
; Downgrade attack: false SHA2, correct SHA1
; SHA256 DS for sub.example.com.
;sub.example.com. 3600 IN DS 30899 5 2 51be8e847cc663f2775d0f2b6d15e41553c97ecb99b8dd667f18244e2f652033
; BAD SHA256 DS
sub.example.com. 3600 IN DS 30899 5 2 51be8e847cc663f2775d0f2b6d15e41553c97ecb99b8dd667f18244e2f652000
; SHA1 DS for sub.example.com.
sub.example.com. 3600 IN DS 30899 RSASHA1 1 f7ed618f24d5e5202927e1d27bc2e84a141cb4b3
sub.example.com. 3600 IN RRSIG DS 3 3 3600 20070926135752 20070829135752 2854 example.com. ACqqpk1ow07XJvN1orEpiWOeqMLdDKQtTgWB8Mp6CF/9VTfHuWWmsu8= ;{id = 2854}
SECTION ADDITIONAL
ns.sub.example.com. IN A 1.2.3.6
ENTRY_END
RANGE_END
; ns.sub.example.com.
RANGE_BEGIN 0 100
ADDRESS 1.2.3.6
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
sub.example.com. IN NS
SECTION ANSWER
sub.example.com. IN NS ns.sub.example.com.
sub.example.com. 3600 IN RRSIG NS 5 3 3600 20070926134150 20070829134150 30899 sub.example.com. wcpHeBILHfo8C9uxMhcW03gcURZeUffiKdSTb50ZjzTHgMNhRyMfpcvSpXEd9548A9UTmWKeLZChfr5Z/glONw== ;{id = 30899}
SECTION ADDITIONAL
ns.sub.example.com. IN A 1.2.3.6
ns.sub.example.com. 3600 IN RRSIG A 5 4 3600 20070926134150 20070829134150 30899 sub.example.com. UF7shD/gt1FOp2UHgLTNbPzVykklSXFMEtJ1xD+Hholwf/PIzd7zoaIttIYibNa4fUXCqMg22H9P7MRhfmFe6g== ;{id = 30899}
ENTRY_END
; response to DNSKEY priming query
; sub.example.com. 3600 IN DS 30899 RSASHA1 1 f7ed618f24d5e5202927e1d27bc2e84a141cb4b3
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
sub.example.com. IN DNSKEY
SECTION ANSWER
sub.example.com. 3600 IN DNSKEY 256 3 5 AQPQ41chR9DEHt/aIzIFAqanbDlRflJoRs5yz1jFsoRIT7dWf0r+PeDuewdxkszNH6wnU4QL8pfKFRh5PIYVBLK3 ;{id = 30899 (zsk), size = 512b}
sub.example.com. 3600 IN RRSIG DNSKEY 5 3 3600 20070926134150 20070829134150 30899 sub.example.com. uNGp99iznjD7oOX02XnQbDnbg75UwBHRvZSKYUorTKvPUnCWMHKdRsQ+mf+Fx3GZ+Fz9BVjoCmQqpnfgXLEYqw== ;{id = 30899}
SECTION AUTHORITY
sub.example.com. IN NS ns.sub.example.com.
sub.example.com. 3600 IN RRSIG NS 5 3 3600 20070926134150 20070829134150 30899 sub.example.com. wcpHeBILHfo8C9uxMhcW03gcURZeUffiKdSTb50ZjzTHgMNhRyMfpcvSpXEd9548A9UTmWKeLZChfr5Z/glONw== ;{id = 30899}
SECTION ADDITIONAL
ns.sub.example.com. IN A 1.2.3.6
ns.sub.example.com. 3600 IN RRSIG A 5 4 3600 20070926134150 20070829134150 30899 sub.example.com. UF7shD/gt1FOp2UHgLTNbPzVykklSXFMEtJ1xD+Hholwf/PIzd7zoaIttIYibNa4fUXCqMg22H9P7MRhfmFe6g== ;{id = 30899}
ENTRY_END
; response to query of interest
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
www.sub.example.com. IN A
SECTION ANSWER
www.sub.example.com. IN A 11.11.11.11
www.sub.example.com. 3600 IN RRSIG A 5 4 3600 20070926134150 20070829134150 30899 sub.example.com. 0DqqRfRtm7VSEQ4mmBbzrKRqQAay3JAE8DPDGmjtokrrjN9F1G/HxozDV7bjdIh2EChlQea8FPwf/GepJMUVxg== ;{id = 30899}
SECTION AUTHORITY
SECTION ADDITIONAL
ENTRY_END
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR AA REFUSED
SECTION QUESTION
ns.sub.example.com. IN A
ENTRY_END
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR AA REFUSED
SECTION QUESTION
ns.sub.example.com. IN AAAA
ENTRY_END
RANGE_END
STEP 1 QUERY
ENTRY_BEGIN
REPLY RD DO
SECTION QUESTION
www.sub.example.com. IN A
ENTRY_END
; recursion happens here.
; must servfail, BOGUS
STEP 10 CHECK_ANSWER
ENTRY_BEGIN
MATCH all
REPLY QR RD RA SERVFAIL
SECTION QUESTION
www.sub.example.com. IN A
SECTION ANSWER
;www.sub.example.com. 3600 IN A 11.11.11.11
;www.sub.example.com. 3600 IN RRSIG A 5 4 3600 20070926134150 20070829134150 30899 sub.example.com. 0DqqRfRtm7VSEQ4mmBbzrKRqQAay3JAE8DPDGmjtokrrjN9F1G/HxozDV7bjdIh2EChlQea8FPwf/GepJMUVxg== ;{id = 30899}
SECTION AUTHORITY
SECTION ADDITIONAL
ENTRY_END
SCENARIO_END
dnssecjava-1.1.3/src/test/resources/unbound/val_ds_sha2_downgrade_override.rpl 0000664 0000000 0000000 00000016521 13020541473 0027730 0 ustar 00root root 0000000 0000000 ; config options
; The island of trust is at example.com
server:
trust-anchor: "example.com. 3600 IN DS 2854 3 1 46e4ffc6e9a4793b488954bd3f0cc6af0dfb201b"
val-override-date: "20070916134226"
target-fetch-policy: "0 0 0 0 0"
val-digest-preference: "1,2"
stub-zone:
name: "."
stub-addr: 193.0.14.129 # K.ROOT-SERVERS.NET.
CONFIG_END
SCENARIO_BEGIN Test validator with SHA256 DS downgrade to SHA1
; K.ROOT-SERVERS.NET.
RANGE_BEGIN 0 100
ADDRESS 193.0.14.129
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
. IN NS
SECTION ANSWER
. IN NS K.ROOT-SERVERS.NET.
SECTION ADDITIONAL
K.ROOT-SERVERS.NET. IN A 193.0.14.129
ENTRY_END
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
www.sub.example.com. IN A
SECTION AUTHORITY
com. IN NS a.gtld-servers.net.
SECTION ADDITIONAL
a.gtld-servers.net. IN A 192.5.6.30
ENTRY_END
RANGE_END
; a.gtld-servers.net.
RANGE_BEGIN 0 100
ADDRESS 192.5.6.30
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
com. IN NS
SECTION ANSWER
com. IN NS a.gtld-servers.net.
SECTION ADDITIONAL
a.gtld-servers.net. IN A 192.5.6.30
ENTRY_END
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
www.sub.example.com. IN A
SECTION AUTHORITY
example.com. IN NS ns.example.com.
SECTION ADDITIONAL
ns.example.com. IN A 1.2.3.4
ENTRY_END
RANGE_END
; ns.example.com.
RANGE_BEGIN 0 100
ADDRESS 1.2.3.4
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
example.com. IN NS
SECTION ANSWER
example.com. IN NS ns.example.com.
example.com. 3600 IN RRSIG NS 3 2 3600 20070926134150 20070829134150 2854 example.com. MC0CFQCN+qHdJxoI/2tNKwsb08pra/G7aAIUAWA5sDdJTbrXA1/3OaesGBAO3sI= ;{id = 2854}
SECTION ADDITIONAL
ns.example.com. IN A 1.2.3.4
ns.example.com. 3600 IN RRSIG A 3 3 3600 20070926135752 20070829135752 2854 example.com. MC0CFQCMSWxVehgOQLoYclB9PIAbNP229AIUeH0vNNGJhjnZiqgIOKvs1EhzqAo= ;{id = 2854}
ENTRY_END
; response to DNSKEY priming query
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
example.com. IN DNSKEY
SECTION ANSWER
example.com. 3600 IN DNSKEY 256 3 3 ALXLUsWqUrY3JYER3T4TBJII s70j+sDS/UT2QRp61SE7S3E EXopNXoFE73JLRmvpi/UrOO/Vz4Se 6wXv/CYCKjGw06U4WRgR YXcpEhJROyNapmdIKSx hOzfLVE1gqA0PweZR8d tY3aNQSRn3sPpwJr6Mi /PqQKAMMrZ9ckJpf1+b QMOOvxgzz2U1GS18b3y ZKcgTMEaJzd/GZYzi/B N2DzQ0MsrSwYXfsNLFO Bbs8PJMW4LYIxeeOe6rUgkWOF 7CC9Dh/dduQ1QrsJhmZAEFfd6ByYV+ ;{id = 2854 (zsk), size = 1688b}
example.com. 3600 IN RRSIG DNSKEY DSA 2 3600 20070926134150 20070829134150 2854 example.com. MCwCFBQRtlR4BEv9ohi+PGFjp+AHsJuHAhRCvz0shggvnvI88DFnBDCczHUcVA== ;{id = 2854}
SECTION AUTHORITY
example.com. IN NS ns.example.com.
example.com. 3600 IN RRSIG NS 3 2 3600 20070926134150 20070829134150 2854 example.com. MC0CFQCN+qHdJxoI/2tNKwsb08pra/G7aAIUAWA5sDdJTbrXA1/3OaesGBAO3sI= ;{id = 2854}
SECTION ADDITIONAL
ns.example.com. IN A 1.2.3.4
ns.example.com. 3600 IN RRSIG A 3 3 3600 20070926135752 20070829135752 2854 example.com. MC0CFQCMSWxVehgOQLoYclB9PIAbNP229AIUeH0vNNGJhjnZiqgIOKvs1EhzqAo= ;{id = 2854}
ENTRY_END
; response for delegation to sub.example.com.
ENTRY_BEGIN
MATCH opcode subdomain
ADJUST copy_id copy_query
REPLY QR NOERROR
SECTION QUESTION
sub.example.com. IN A
SECTION ANSWER
SECTION AUTHORITY
sub.example.com. IN NS ns.sub.example.com.
; Downgrade attack: false SHA2, correct SHA1
; SHA256 DS for sub.example.com.
;sub.example.com. 3600 IN DS 30899 5 2 51be8e847cc663f2775d0f2b6d15e41553c97ecb99b8dd667f18244e2f652033
; BAD SHA256 DS
sub.example.com. 3600 IN DS 30899 5 2 51be8e847cc663f2775d0f2b6d15e41553c97ecb99b8dd667f18244e2f652000
; SHA1 DS for sub.example.com.
sub.example.com. 3600 IN DS 30899 RSASHA1 1 f7ed618f24d5e5202927e1d27bc2e84a141cb4b3
sub.example.com. 3600 IN RRSIG DS 3 3 3600 20070926135752 20070829135752 2854 example.com. ACqqpk1ow07XJvN1orEpiWOeqMLdDKQtTgWB8Mp6CF/9VTfHuWWmsu8= ;{id = 2854}
SECTION ADDITIONAL
ns.sub.example.com. IN A 1.2.3.6
ENTRY_END
RANGE_END
; ns.sub.example.com.
RANGE_BEGIN 0 100
ADDRESS 1.2.3.6
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
sub.example.com. IN NS
SECTION ANSWER
sub.example.com. IN NS ns.sub.example.com.
sub.example.com. 3600 IN RRSIG NS 5 3 3600 20070926134150 20070829134150 30899 sub.example.com. wcpHeBILHfo8C9uxMhcW03gcURZeUffiKdSTb50ZjzTHgMNhRyMfpcvSpXEd9548A9UTmWKeLZChfr5Z/glONw== ;{id = 30899}
SECTION ADDITIONAL
ns.sub.example.com. IN A 1.2.3.6
ns.sub.example.com. 3600 IN RRSIG A 5 4 3600 20070926134150 20070829134150 30899 sub.example.com. UF7shD/gt1FOp2UHgLTNbPzVykklSXFMEtJ1xD+Hholwf/PIzd7zoaIttIYibNa4fUXCqMg22H9P7MRhfmFe6g== ;{id = 30899}
ENTRY_END
; response to DNSKEY priming query
; sub.example.com. 3600 IN DS 30899 RSASHA1 1 f7ed618f24d5e5202927e1d27bc2e84a141cb4b3
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
sub.example.com. IN DNSKEY
SECTION ANSWER
sub.example.com. 3600 IN DNSKEY 256 3 5 AQPQ41chR9DEHt/aIzIFAqanbDlRflJoRs5yz1jFsoRIT7dWf0r+PeDuewdxkszNH6wnU4QL8pfKFRh5PIYVBLK3 ;{id = 30899 (zsk), size = 512b}
sub.example.com. 3600 IN RRSIG DNSKEY 5 3 3600 20070926134150 20070829134150 30899 sub.example.com. uNGp99iznjD7oOX02XnQbDnbg75UwBHRvZSKYUorTKvPUnCWMHKdRsQ+mf+Fx3GZ+Fz9BVjoCmQqpnfgXLEYqw== ;{id = 30899}
SECTION AUTHORITY
sub.example.com. IN NS ns.sub.example.com.
sub.example.com. 3600 IN RRSIG NS 5 3 3600 20070926134150 20070829134150 30899 sub.example.com. wcpHeBILHfo8C9uxMhcW03gcURZeUffiKdSTb50ZjzTHgMNhRyMfpcvSpXEd9548A9UTmWKeLZChfr5Z/glONw== ;{id = 30899}
SECTION ADDITIONAL
ns.sub.example.com. IN A 1.2.3.6
ns.sub.example.com. 3600 IN RRSIG A 5 4 3600 20070926134150 20070829134150 30899 sub.example.com. UF7shD/gt1FOp2UHgLTNbPzVykklSXFMEtJ1xD+Hholwf/PIzd7zoaIttIYibNa4fUXCqMg22H9P7MRhfmFe6g== ;{id = 30899}
ENTRY_END
; response to query of interest
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
www.sub.example.com. IN A
SECTION ANSWER
www.sub.example.com. IN A 11.11.11.11
www.sub.example.com. 3600 IN RRSIG A 5 4 3600 20070926134150 20070829134150 30899 sub.example.com. 0DqqRfRtm7VSEQ4mmBbzrKRqQAay3JAE8DPDGmjtokrrjN9F1G/HxozDV7bjdIh2EChlQea8FPwf/GepJMUVxg== ;{id = 30899}
SECTION AUTHORITY
SECTION ADDITIONAL
ENTRY_END
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR AA REFUSED
SECTION QUESTION
ns.sub.example.com. IN A
ENTRY_END
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR AA REFUSED
SECTION QUESTION
ns.sub.example.com. IN AAAA
ENTRY_END
RANGE_END
STEP 1 QUERY
ENTRY_BEGIN
REPLY RD DO
SECTION QUESTION
www.sub.example.com. IN A
ENTRY_END
; recursion happens here.
; must NOT servfail, despite the BOGUS SHA2 as the digest order is overriden
STEP 10 CHECK_ANSWER
ENTRY_BEGIN
MATCH all
REPLY QR RD RA AD NOERROR
SECTION QUESTION
www.sub.example.com. IN A
SECTION ANSWER
www.sub.example.com. 3600 IN A 11.11.11.11
www.sub.example.com. 3600 IN RRSIG A 5 4 3600 20070926134150 20070829134150 30899 sub.example.com. 0DqqRfRtm7VSEQ4mmBbzrKRqQAay3JAE8DPDGmjtokrrjN9F1G/HxozDV7bjdIh2EChlQea8FPwf/GepJMUVxg== ;{id = 30899}
SECTION AUTHORITY
SECTION ADDITIONAL
ENTRY_END
SCENARIO_END
dnssecjava-1.1.3/src/test/resources/unbound/val_dsnsec.rpl 0000664 0000000 0000000 00000024346 13020541473 0023737 0 ustar 00root root 0000000 0000000 ; config options
; The island of trust is at example.com
server:
trust-anchor: "example.com. 3600 IN DS 2854 3 1 46e4ffc6e9a4793b488954bd3f0cc6af0dfb201b"
val-override-date: "20070916134226"
target-fetch-policy: "0 0 0 0 0"
stub-zone:
name: "."
stub-addr: 193.0.14.129 # K.ROOT-SERVERS.NET.
CONFIG_END
SCENARIO_BEGIN Test pickup of DS NSEC from the cache.
; make sure unbound does not pick up the wrong nsec.
; K.ROOT-SERVERS.NET.
RANGE_BEGIN 0 100
ADDRESS 193.0.14.129
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
. IN NS
SECTION ANSWER
. IN NS K.ROOT-SERVERS.NET.
SECTION ADDITIONAL
K.ROOT-SERVERS.NET. IN A 193.0.14.129
ENTRY_END
ENTRY_BEGIN
MATCH opcode subdomain
ADJUST copy_id copy_query
REPLY QR NOERROR
SECTION QUESTION
com. IN A
SECTION AUTHORITY
com. IN NS a.gtld-servers.net.
SECTION ADDITIONAL
a.gtld-servers.net. IN A 192.5.6.30
ENTRY_END
RANGE_END
; a.gtld-servers.net.
RANGE_BEGIN 0 100
ADDRESS 192.5.6.30
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
com. IN NS
SECTION ANSWER
com. IN NS a.gtld-servers.net.
SECTION ADDITIONAL
a.gtld-servers.net. IN A 192.5.6.30
ENTRY_END
ENTRY_BEGIN
MATCH opcode subdomain
ADJUST copy_id copy_query
REPLY QR NOERROR
SECTION QUESTION
example.com. IN A
SECTION AUTHORITY
example.com. IN NS ns.example.com.
SECTION ADDITIONAL
ns.example.com. IN A 1.2.3.4
ENTRY_END
RANGE_END
; ns.example.com.
RANGE_BEGIN 0 100
ADDRESS 1.2.3.4
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
example.com. IN NS
SECTION ANSWER
example.com. IN NS ns.example.com.
example.com. 3600 IN RRSIG NS 3 2 3600 20070926134150 20070829134150 2854 example.com. MC0CFQCN+qHdJxoI/2tNKwsb08pra/G7aAIUAWA5sDdJTbrXA1/3OaesGBAO3sI= ;{id = 2854}
SECTION ADDITIONAL
ns.example.com. IN A 1.2.3.4
ns.example.com. 3600 IN RRSIG A 3 3 3600 20070926135752 20070829135752 2854 example.com. MC0CFQCMSWxVehgOQLoYclB9PIAbNP229AIUeH0vNNGJhjnZiqgIOKvs1EhzqAo= ;{id = 2854}
ENTRY_END
; barely valid nodata for AAAA
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
ns.example.com. IN AAAA
SECTION ANSWER
SECTION AUTHORITY
example.com. IN NS ns.example.com.
example.com. 3600 IN RRSIG NS 3 2 3600 20070926134150 20070829134150 2854 example.com. MC0CFQCN+qHdJxoI/2tNKwsb08pra/G7aAIUAWA5sDdJTbrXA1/3OaesGBAO3sI= ;{id = 2854}
ENTRY_END
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
ns.example.com. IN A
SECTION ANSWER
ns.example.com. IN A 1.2.3.4
ns.example.com. 3600 IN RRSIG A 3 3 3600 20070926135752 20070829135752 2854 example.com. MC0CFQCMSWxVehgOQLoYclB9PIAbNP229AIUeH0vNNGJhjnZiqgIOKvs1EhzqAo= ;{id = 2854}
SECTION AUTHORITY
example.com. IN NS ns.example.com.
example.com. 3600 IN RRSIG NS 3 2 3600 20070926134150 20070829134150 2854 example.com. MC0CFQCN+qHdJxoI/2tNKwsb08pra/G7aAIUAWA5sDdJTbrXA1/3OaesGBAO3sI= ;{id = 2854}
ENTRY_END
; response to DNSKEY priming query
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
example.com. IN DNSKEY
SECTION ANSWER
example.com. 3600 IN DNSKEY 256 3 3 ALXLUsWqUrY3JYER3T4TBJII s70j+sDS/UT2QRp61SE7S3E EXopNXoFE73JLRmvpi/UrOO/Vz4Se 6wXv/CYCKjGw06U4WRgR YXcpEhJROyNapmdIKSx hOzfLVE1gqA0PweZR8d tY3aNQSRn3sPpwJr6Mi /PqQKAMMrZ9ckJpf1+b QMOOvxgzz2U1GS18b3y ZKcgTMEaJzd/GZYzi/B N2DzQ0MsrSwYXfsNLFO Bbs8PJMW4LYIxeeOe6rUgkWOF 7CC9Dh/dduQ1QrsJhmZAEFfd6ByYV+ ;{id = 2854 (zsk), size = 1688b}
example.com. 3600 IN RRSIG DNSKEY DSA 2 3600 20070926134150 20070829134150 2854 example.com. MCwCFBQRtlR4BEv9ohi+PGFjp+AHsJuHAhRCvz0shggvnvI88DFnBDCczHUcVA== ;{id = 2854}
SECTION AUTHORITY
example.com. IN NS ns.example.com.
example.com. 3600 IN RRSIG NS 3 2 3600 20070926134150 20070829134150 2854 example.com. MC0CFQCN+qHdJxoI/2tNKwsb08pra/G7aAIUAWA5sDdJTbrXA1/3OaesGBAO3sI= ;{id = 2854}
SECTION ADDITIONAL
ns.example.com. IN A 1.2.3.4
ns.example.com. 3600 IN RRSIG A 3 3 3600 20070926135752 20070829135752 2854 example.com. MC0CFQCMSWxVehgOQLoYclB9PIAbNP229AIUeH0vNNGJhjnZiqgIOKvs1EhzqAo= ;{id = 2854}
ENTRY_END
; response for tub.example.com
ENTRY_BEGIN
MATCH opcode subdomain
ADJUST copy_id copy_query
REPLY QR NXDOMAIN
SECTION QUESTION
tub.example.com. IN DNSKEY
SECTION ANSWER
SECTION AUTHORITY
; SOA record
example.com. IN SOA ns.iana.org. NSTLD.iana.org. 2009061200 1800 900 604800 86400
example.com. 3600 IN RRSIG SOA 3 2 3600 20070926134150 20070829134150 2854 example.com. AAvpEruGS0UJzMoO6ou/+y8ZyHjjrFC6HKDWU8a61Ru9qtl4R66fC1c= ;{id = 2854}
; qname denial
sub.example.com. IN NSEC wub.example.com. NS DS RRSIG NSEC
sub.example.com. 3600 IN RRSIG NSEC 3 3 3600 20070926134150 20070829134150 2854 example.com. AA4+SSCI8kQZ2/iGj+9rxpNZyaIJNNRZ4eM0fEw2D5fVR/+WLUZ9GdE= ;{id = 2854}
; wildcard denial
example.com. IN NSEC blub.example.com. NS SOA RRSIG NSEC DNSKEY
example.com. 3600 IN RRSIG NSEC 3 2 3600 20070926134150 20070829134150 2854 example.com. AARheDFiRjrnKHzsPloUJ0FC+8aAM6H49Lnm2AJrgxE9RlBlH2E4sRo= ;{id = 2854}
SECTION ADDITIONAL
ENTRY_END
; DS query for sub.example.com
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
sub.example.com. IN DS
SECTION ANSWER
sub.example.com. 3600 IN DS 30899 RSASHA1 1 f7ed618f24d5e5202927e1d27bc2e84a141cb4b3
sub.example.com. 3600 IN RRSIG DS 3 3 3600 20070926134150 20070829134150 2854 example.com. MCwCFCW3ix0GD4BSvNLWIbROCJt5DAW9AhRt/kg9kBKJ20UBUdumrBUHqnskdA== ;{id = 2854}
SECTION AUTHORITY
SECTION ADDITIONAL
ENTRY_END
; response for delegation to sub.example.com.
ENTRY_BEGIN
MATCH opcode subdomain
ADJUST copy_id copy_query
REPLY QR NOERROR
SECTION QUESTION
sub.example.com. IN DNSKEY
SECTION ANSWER
SECTION AUTHORITY
sub.example.com. IN NS ns.sub.example.com.
;sub.example.com. 3600 IN DS 30899 RSASHA1 1 f7ed618f24d5e5202927e1d27bc2e84a141cb4b3
;sub.example.com. 3600 IN RRSIG DS 3 3 3600 20070926134150 20070829134150 2854 example.com. MCwCFCW3ix0GD4BSvNLWIbROCJt5DAW9AhRt/kg9kBKJ20UBUdumrBUHqnskdA== ;{id = 2854}
SECTION ADDITIONAL
ns.sub.example.com. IN A 1.2.3.6
ENTRY_END
RANGE_END
; ns.sub.example.com.
RANGE_BEGIN 0 100
ADDRESS 1.2.3.6
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
sub.example.com. IN NS
SECTION ANSWER
sub.example.com. IN NS ns.sub.example.com.
sub.example.com. 3600 IN RRSIG NS 5 3 3600 20070926134150 20070829134150 30899 sub.example.com. wcpHeBILHfo8C9uxMhcW03gcURZeUffiKdSTb50ZjzTHgMNhRyMfpcvSpXEd9548A9UTmWKeLZChfr5Z/glONw== ;{id = 30899}
SECTION ADDITIONAL
ns.sub.example.com. IN A 1.2.3.6
ns.sub.example.com. 3600 IN RRSIG A 5 4 3600 20070926134150 20070829134150 30899 sub.example.com. UF7shD/gt1FOp2UHgLTNbPzVykklSXFMEtJ1xD+Hholwf/PIzd7zoaIttIYibNa4fUXCqMg22H9P7MRhfmFe6g== ;{id = 30899}
ENTRY_END
; response to DNSKEY priming query
; sub.example.com. 3600 IN DS 30899 RSASHA1 1 f7ed618f24d5e5202927e1d27bc2e84a141cb4b3
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
sub.example.com. IN DNSKEY
SECTION ANSWER
sub.example.com. 3600 IN DNSKEY 256 3 5 AQPQ41chR9DEHt/aIzIFAqanbDlRflJoRs5yz1jFsoRIT7dWf0r+PeDuewdxkszNH6wnU4QL8pfKFRh5PIYVBLK3 ;{id = 30899 (zsk), size = 512b}
sub.example.com. 3600 IN RRSIG DNSKEY 5 3 3600 20070926134150 20070829134150 30899 sub.example.com. uNGp99iznjD7oOX02XnQbDnbg75UwBHRvZSKYUorTKvPUnCWMHKdRsQ+mf+Fx3GZ+Fz9BVjoCmQqpnfgXLEYqw== ;{id = 30899}
SECTION AUTHORITY
sub.example.com. IN NS ns.sub.example.com.
sub.example.com. 3600 IN RRSIG NS 5 3 3600 20070926134150 20070829134150 30899 sub.example.com. wcpHeBILHfo8C9uxMhcW03gcURZeUffiKdSTb50ZjzTHgMNhRyMfpcvSpXEd9548A9UTmWKeLZChfr5Z/glONw== ;{id = 30899}
SECTION ADDITIONAL
ns.sub.example.com. IN A 1.2.3.6
ns.sub.example.com. 3600 IN RRSIG A 5 4 3600 20070926134150 20070829134150 30899 sub.example.com. UF7shD/gt1FOp2UHgLTNbPzVykklSXFMEtJ1xD+Hholwf/PIzd7zoaIttIYibNa4fUXCqMg22H9P7MRhfmFe6g== ;{id = 30899}
ENTRY_END
; response to query of interest
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
www.sub.example.com. IN A
SECTION ANSWER
www.sub.example.com. IN A 11.11.11.11
www.sub.example.com. 3600 IN RRSIG A 5 4 3600 20070926134150 20070829134150 30899 sub.example.com. 0DqqRfRtm7VSEQ4mmBbzrKRqQAay3JAE8DPDGmjtokrrjN9F1G/HxozDV7bjdIh2EChlQea8FPwf/GepJMUVxg== ;{id = 30899}
SECTION AUTHORITY
SECTION ADDITIONAL
ENTRY_END
RANGE_END
; query for a domain next to it, so the wrong NSEC gets in the cache.
STEP 1 QUERY
ENTRY_BEGIN
REPLY RD DO
SECTION QUESTION
www.tub.example.com. IN A
ENTRY_END
; recursion happens here.
STEP 10 CHECK_ANSWER
ENTRY_BEGIN
MATCH all
REPLY QR RD RA AD NXDOMAIN
SECTION QUESTION
www.tub.example.com. IN A
SECTION ANSWER
SECTION AUTHORITY
example.com. 3600 IN SOA ns.iana.org. NSTLD.iana.org. 2009061200 1800 900 604800 86400
example.com. 3600 IN RRSIG SOA 3 2 3600 20070926134150 20070829134150 2854 example.com. AAvpEruGS0UJzMoO6ou/+y8ZyHjjrFC6HKDWU8a61Ru9qtl4R66fC1c= ;{id = 2854}
sub.example.com. 3600 IN NSEC wub.example.com. NS DS RRSIG NSEC
sub.example.com. 3600 IN RRSIG NSEC 3 3 3600 20070926134150 20070829134150 2854 example.com. AA4+SSCI8kQZ2/iGj+9rxpNZyaIJNNRZ4eM0fEw2D5fVR/+WLUZ9GdE= ;{id = 2854}
example.com. 3600 IN NSEC blub.example.com. NS SOA RRSIG NSEC DNSKEY
example.com. 3600 IN RRSIG NSEC 3 2 3600 20070926134150 20070829134150 2854 example.com. AARheDFiRjrnKHzsPloUJ0FC+8aAM6H49Lnm2AJrgxE9RlBlH2E4sRo= ;{id = 2854}
SECTION ADDITIONAL
ENTRY_END
; query of interest.
STEP 30 QUERY
ENTRY_BEGIN
REPLY RD DO
SECTION QUESTION
www.sub.example.com. IN A
ENTRY_END
STEP 40 CHECK_ANSWER
ENTRY_BEGIN
MATCH all
REPLY QR RD RA AD NOERROR
SECTION QUESTION
www.sub.example.com. IN A
SECTION ANSWER
www.sub.example.com. 3600 IN A 11.11.11.11
www.sub.example.com. 3600 IN RRSIG A 5 4 3600 20070926134150 20070829134150 30899 sub.example.com. 0DqqRfRtm7VSEQ4mmBbzrKRqQAay3JAE8DPDGmjtokrrjN9F1G/HxozDV7bjdIh2EChlQea8FPwf/GepJMUVxg== ;{id = 30899}
SECTION AUTHORITY
SECTION ADDITIONAL
ENTRY_END
SCENARIO_END
dnssecjava-1.1.3/src/test/resources/unbound/val_entds.rpl 0000664 0000000 0000000 00000022776 13020541473 0023602 0 ustar 00root root 0000000 0000000 ; config options
; The island of trust is at example.com
server:
trust-anchor: "example.com. 3600 IN DS 2854 3 1 46e4ffc6e9a4793b488954bd3f0cc6af0dfb201b"
val-override-date: "20070916134226"
target-fetch-policy: "0 0 0 0 0"
stub-zone:
name: "."
stub-addr: 193.0.14.129 # K.ROOT-SERVERS.NET.
CONFIG_END
SCENARIO_BEGIN Test validator with lots of ENTs in the chain of trust
; query is for a.1.2.b.3.4.c.5.6.example.com.
; labels 1-6 are empty nonterminals.
; there are DNSKEYs at labels b, c, example.com.
; and DSes at b and c.
; K.ROOT-SERVERS.NET.
RANGE_BEGIN 0 100
ADDRESS 193.0.14.129
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
. IN NS
SECTION ANSWER
. IN NS K.ROOT-SERVERS.NET.
SECTION ADDITIONAL
K.ROOT-SERVERS.NET. IN A 193.0.14.129
ENTRY_END
ENTRY_BEGIN
MATCH opcode qtype
ADJUST copy_id copy_query
REPLY QR NOERROR
SECTION QUESTION
www.sub.example.com. IN A
SECTION AUTHORITY
com. IN NS a.gtld-servers.net.
SECTION ADDITIONAL
a.gtld-servers.net. IN A 192.5.6.30
ENTRY_END
RANGE_END
; a.gtld-servers.net.
RANGE_BEGIN 0 100
ADDRESS 192.5.6.30
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
com. IN NS
SECTION ANSWER
com. IN NS a.gtld-servers.net.
SECTION ADDITIONAL
a.gtld-servers.net. IN A 192.5.6.30
ENTRY_END
ENTRY_BEGIN
MATCH opcode qtype
ADJUST copy_id copy_query
REPLY QR NOERROR
SECTION QUESTION
www.sub.example.com. IN A
SECTION AUTHORITY
example.com. IN NS ns.example.com.
SECTION ADDITIONAL
ns.example.com. IN A 1.2.3.4
ENTRY_END
RANGE_END
; ns.example.com.
RANGE_BEGIN 0 100
ADDRESS 1.2.3.4
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
example.com. IN NS
SECTION ANSWER
example.com. IN NS ns.example.com.
example.com. 3600 IN RRSIG NS 3 2 3600 20070926134150 20070829134150 2854 example.com. MC0CFQCN+qHdJxoI/2tNKwsb08pra/G7aAIUAWA5sDdJTbrXA1/3OaesGBAO3sI= ;{id = 2854}
SECTION ADDITIONAL
ns.example.com. IN A 1.2.3.4
ns.example.com. 3600 IN RRSIG A 3 3 3600 20070926135752 20070829135752 2854 example.com. MC0CFQCMSWxVehgOQLoYclB9PIAbNP229AIUeH0vNNGJhjnZiqgIOKvs1EhzqAo= ;{id = 2854}
ENTRY_END
; response to DNSKEY priming query
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY AA QR NOERROR
SECTION QUESTION
example.com. IN DNSKEY
SECTION ANSWER
example.com. 3600 IN DNSKEY 256 3 3 ALXLUsWqUrY3JYER3T4TBJII s70j+sDS/UT2QRp61SE7S3E EXopNXoFE73JLRmvpi/UrOO/Vz4Se 6wXv/CYCKjGw06U4WRgR YXcpEhJROyNapmdIKSx hOzfLVE1gqA0PweZR8d tY3aNQSRn3sPpwJr6Mi /PqQKAMMrZ9ckJpf1+b QMOOvxgzz2U1GS18b3y ZKcgTMEaJzd/GZYzi/B N2DzQ0MsrSwYXfsNLFO Bbs8PJMW4LYIxeeOe6rUgkWOF 7CC9Dh/dduQ1QrsJhmZAEFfd6ByYV+ ;{id = 2854 (zsk), size = 1688b}
example.com. 3600 IN RRSIG DNSKEY DSA 2 3600 20070926134150 20070829134150 2854 example.com. MCwCFBQRtlR4BEv9ohi+PGFjp+AHsJuHAhRCvz0shggvnvI88DFnBDCczHUcVA== ;{id = 2854}
SECTION AUTHORITY
example.com. IN NS ns.example.com.
example.com. 3600 IN RRSIG NS 3 2 3600 20070926134150 20070829134150 2854 example.com. MC0CFQCN+qHdJxoI/2tNKwsb08pra/G7aAIUAWA5sDdJTbrXA1/3OaesGBAO3sI= ;{id = 2854}
SECTION ADDITIONAL
ns.example.com. IN A 1.2.3.4
ns.example.com. 3600 IN RRSIG A 3 3 3600 20070926135752 20070829135752 2854 example.com. MC0CFQCMSWxVehgOQLoYclB9PIAbNP229AIUeH0vNNGJhjnZiqgIOKvs1EhzqAo= ;{id = 2854}
ENTRY_END
; response for ENT DS queries.
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY AA QR NOERROR
SECTION QUESTION
6.example.com. IN DS
SECTION AUTHORITY
example.com. NSEC c.5.6.example.com. SOA DNSKEY NS RRSIG NSEC
example.com. 3600 IN RRSIG NSEC 3 2 3600 20070926134150 20070829134150 2854 example.com. MC0CFQCoocKDsR+Hius4e+5zJPlXeeWNowIUO+pa14FBcWH/dCNK5R0vRrlWY5s= ;{id = 2854}
ENTRY_END
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY AA QR NOERROR
SECTION QUESTION
5.6.example.com. IN DS
SECTION AUTHORITY
example.com. NSEC c.5.6.example.com. SOA DNSKEY NS RRSIG NSEC
example.com. 3600 IN RRSIG NSEC 3 2 3600 20070926134150 20070829134150 2854 example.com. MC0CFQCoocKDsR+Hius4e+5zJPlXeeWNowIUO+pa14FBcWH/dCNK5R0vRrlWY5s= ;{id = 2854}
ENTRY_END
; response for query in question - delegation
ENTRY_BEGIN
MATCH opcode
ADJUST copy_id copy_query
REPLY QR NOERROR
SECTION QUESTION
c.5.6.example.com. IN DS
SECTION ANSWER
c.5.6.example.com. 3600 IN DS 2854 3 1 4449f16fa7d712283aa43cc8dcc8e07c05856e08
c.5.6.example.com. 3600 IN RRSIG DS 3 5 3600 20070926134150 20070829134150 2854 example.com. MC0CFQCgiF7eFL89mSqjUPEpQuL5QEa1OgIUWdfUmMkwVBwOgmxlxZIKfGs5od0= ;{id = 2854}
SECTION AUTHORITY
SECTION ADDITIONAL
ns.c.5.6.example.com. IN A 1.2.3.6
ENTRY_END
RANGE_END
; and all other queries, receive a delegation to c.5.6.example.com.
ENTRY_BEGIN
MATCH opcode
ADJUST copy_id copy_query
REPLY QR NOERROR
SECTION QUESTION
a.1.2.b.3.4.c.5.6.example.com. IN A
SECTION ANSWER
SECTION AUTHORITY
c.5.6.example.com. IN NS ns.c.5.6.example.com.
c.5.6.example.com. 3600 IN DS 2854 3 1 4449f16fa7d712283aa43cc8dcc8e07c05856e08
c.5.6.example.com. 3600 IN RRSIG DS 3 5 3600 20070926134150 20070829134150 2854 example.com. MC0CFQCgiF7eFL89mSqjUPEpQuL5QEa1OgIUWdfUmMkwVBwOgmxlxZIKfGs5od0= ;{id = 2854}
SECTION ADDITIONAL
ns.c.5.6.example.com. IN A 1.2.3.6
ENTRY_END
RANGE_END
; ns.c.5.6.example.com.
RANGE_BEGIN 0 100
ADDRESS 1.2.3.6
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY AA QR NOERROR
SECTION QUESTION
c.5.6.example.com. IN NS
SECTION ANSWER
ENTRY_END
; response to DNSKEY priming query
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY AA QR NOERROR
SECTION QUESTION
c.5.6.example.com. IN DNSKEY
SECTION ANSWER
c.5.6.example.com. 3600 IN DNSKEY 256 3 3 ALXLUsWqUrY3JYER3T4TBJII s70j+sDS/UT2QRp61SE7S3E EXopNXoFE73JLRmvpi/UrOO/Vz4Se 6wXv/CYCKjGw06U4WRgR YXcpEhJROyNapmdIKSx hOzfLVE1gqA0PweZR8d tY3aNQSRn3sPpwJr6Mi /PqQKAMMrZ9ckJpf1+b QMOOvxgzz2U1GS18b3y ZKcgTMEaJzd/GZYzi/B N2DzQ0MsrSwYXfsNLFO Bbs8PJMW4LYIxeeOe6rUgkWOF 7CC9Dh/dduQ1QrsJhmZAEFfd6ByYV+ ;{id = 2854 (zsk), size = 1688b}
c.5.6.example.com. 3600 IN RRSIG DNSKEY 3 5 3600 20070926134150 20070829134150 2854 c.5.6.example.com. MC0CFHsYd4tGO5BotXFzG9d8fzHkX576AhUAoZ2d1FNUBsrwxl6XSz/hoxme/4Q= ;{id = 2854}
ENTRY_END
; response to DS queries.
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY AA QR NOERROR
SECTION QUESTION
4.c.5.6.example.com. IN DS
SECTION AUTHORITY
3.c.5.6.example.com. IN NSEC b.3.4.c.5.6.example.com. NS DS RRSIG NSEC
3.c.5.6.example.com. 3600 IN RRSIG NSEC 3 6 3600 20070926134150 20070829134150 2854 c.5.6.example.com. MCwCFFFF5WwGibkPunDt0BW2W9lncACcAhQuFh7FbfCE1ulJqBFf1YxjvT/WHQ== ;{id = 2854}
ENTRY_END
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY AA QR NOERROR
SECTION QUESTION
3.4.c.5.6.example.com. IN DS
SECTION AUTHORITY
3.c.5.6.example.com. IN NSEC b.3.4.c.5.6.example.com. NS DS RRSIG NSEC
3.c.5.6.example.com. 3600 IN RRSIG NSEC 3 6 3600 20070926134150 20070829134150 2854 c.5.6.example.com. MCwCFFFF5WwGibkPunDt0BW2W9lncACcAhQuFh7FbfCE1ulJqBFf1YxjvT/WHQ== ;{id = 2854}
ENTRY_END
; any other query gets a referral
ENTRY_BEGIN
MATCH opcode
ADJUST copy_id copy_query
REPLY AA QR NOERROR
SECTION QUESTION
b.3.4.c.5.6.example.com. IN DS
SECTION ANSWER
b.3.4.c.5.6.example.com. 3600 IN DS 30899 5 1 849ebbdefa338db3e6c3ddffd58851523ba701de
b.3.4.c.5.6.example.com. 3600 IN RRSIG DS 3 8 3600 20070926134150 20070829134150 2854 c.5.6.example.com. MC0CFEuXbvClpAOx7E1SXeH0d+Q4jpySAhUAtbEbQ8qtRF5chUOWNtg31ESAjWg= ;{id = 2854}
SECTION AUTHORITY
SECTION ADDITIONAL
ns.b.3.4.c.5.6.example.com. IN A 1.2.3.7
ENTRY_END
RANGE_END
; ns.b.3.4.c.5.6.example.com.
RANGE_BEGIN 0 100
ADDRESS 1.2.3.7
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR AA NOERROR
SECTION QUESTION
b.3.4.c.5.6.example.com. IN NS
SECTION ANSWER
ENTRY_END
; response to DNSKEY priming query
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR AA NOERROR
SECTION QUESTION
b.3.4.c.5.6.example.com. IN DNSKEY
SECTION ANSWER
b.3.4.c.5.6.example.com. 3600 IN DNSKEY 256 3 5 AQPQ41chR9DEHt/aIzIFAqanbDlRflJoRs5yz1jFsoRIT7dWf0r+PeDuewdxkszNH6wnU4QL8pfKFRh5PIYVBLK3 ;{id = 30899 (zsk), size = 512b}
b.3.4.c.5.6.example.com. 3600 IN RRSIG DNSKEY 5 8 3600 20070926134150 20070829134150 30899 b.3.4.c.5.6.example.com. KNftlGVkrfvo3l3Wliq+i695MqJI9B8QnTVhCHKhFPZfEq0HCxV8gO3ZlaTUle1YEnr7+yXUritXlzjFOlf1hw== ;{id = 30899}
ENTRY_END
; response to query of interest
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR AA NOERROR
SECTION QUESTION
a.1.2.b.3.4.c.5.6.example.com. IN A
SECTION ANSWER
a.1.2.b.3.4.c.5.6.example.com. IN A 11.11.11.11
a.1.2.b.3.4.c.5.6.example.com. 3600 IN RRSIG A 5 11 3600 20070926134150 20070829134150 30899 b.3.4.c.5.6.example.com. GUZcUHhxAvc6FYwAzVJcTqsjz5L36bGA45dyeSupEGEhhUJj0wm/FaYCAlO8J+H2zcFEqbgK0KzHdrFmNHkgUQ== ;{id = 30899}
SECTION AUTHORITY
SECTION ADDITIONAL
ENTRY_END
RANGE_END
STEP 1 QUERY
ENTRY_BEGIN
REPLY RD DO
SECTION QUESTION
a.1.2.b.3.4.c.5.6.example.com. IN A
ENTRY_END
; recursion happens here.
STEP 10 CHECK_ANSWER
ENTRY_BEGIN
MATCH all
REPLY QR RD RA AD NOERROR
SECTION QUESTION
a.1.2.b.3.4.c.5.6.example.com. IN A
SECTION ANSWER
a.1.2.b.3.4.c.5.6.example.com. 3600 IN A 11.11.11.11
a.1.2.b.3.4.c.5.6.example.com. 3600 IN RRSIG A 5 11 3600 20070926134150 20070829134150 30899 b.3.4.c.5.6.example.com. GUZcUHhxAvc6FYwAzVJcTqsjz5L36bGA45dyeSupEGEhhUJj0wm/FaYCAlO8J+H2zcFEqbgK0KzHdrFmNHkgUQ== ;{id = 30899}
SECTION AUTHORITY
SECTION ADDITIONAL
ENTRY_END
SCENARIO_END
dnssecjava-1.1.3/src/test/resources/unbound/val_faildnskey.rpl 0000664 0000000 0000000 00000012101 13020541473 0024573 0 ustar 00root root 0000000 0000000 ; config options
; The island of trust is at example.com
server:
trust-anchor: "example.com. 3600 IN DS 2854 3 1 46e4ffc6e9a4793b488954bd3f0cc6af0dfb201b"
val-override-date: "20070916134226"
target-fetch-policy: "0 0 0 0 0"
# test that default value of harden-dnssec-stripped is still yes.
stub-zone:
name: "."
stub-addr: 193.0.14.129 # K.ROOT-SERVERS.NET.
CONFIG_END
SCENARIO_BEGIN Test validator with failed DNSKEY request
; K.ROOT-SERVERS.NET.
RANGE_BEGIN 0 100
ADDRESS 193.0.14.129
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
. IN NS
SECTION ANSWER
. IN NS K.ROOT-SERVERS.NET.
SECTION ADDITIONAL
K.ROOT-SERVERS.NET. IN A 193.0.14.129
ENTRY_END
ENTRY_BEGIN
MATCH opcode subdomain
ADJUST copy_id copy_query
REPLY QR NOERROR
SECTION QUESTION
com. IN A
SECTION AUTHORITY
com. IN NS a.gtld-servers.net.
SECTION ADDITIONAL
a.gtld-servers.net. IN A 192.5.6.30
ENTRY_END
RANGE_END
; a.gtld-servers.net.
RANGE_BEGIN 0 100
ADDRESS 192.5.6.30
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
com. IN NS
SECTION ANSWER
com. IN NS a.gtld-servers.net.
SECTION ADDITIONAL
a.gtld-servers.net. IN A 192.5.6.30
ENTRY_END
ENTRY_BEGIN
MATCH opcode subdomain
ADJUST copy_id copy_query
REPLY QR NOERROR
SECTION QUESTION
example.com. IN A
SECTION AUTHORITY
example.com. IN NS ns.example.com.
SECTION ADDITIONAL
ns.example.com. IN A 1.2.3.4
ENTRY_END
RANGE_END
; ns.example.com.
RANGE_BEGIN 0 100
ADDRESS 1.2.3.4
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
example.com. IN NS
SECTION ANSWER
example.com. IN NS ns.example.com.
example.com. 3600 IN RRSIG NS 3 2 3600 20070926134150 20070829134150 2854 example.com. MC0CFQCN+qHdJxoI/2tNKwsb08pra/G7aAIUAWA5sDdJTbrXA1/3OaesGBAO3sI= ;{id = 2854}
SECTION ADDITIONAL
ns.example.com. IN A 1.2.3.4
ns.example.com. 3600 IN RRSIG A 3 3 3600 20070926135752 20070829135752 2854 example.com. MC0CFQCMSWxVehgOQLoYclB9PIAbNP229AIUeH0vNNGJhjnZiqgIOKvs1EhzqAo= ;{id = 2854}
ENTRY_END
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
ns.example.com. IN A
SECTION ANSWER
ns.example.com. IN A 1.2.3.4
ns.example.com. 3600 IN RRSIG A 3 3 3600 20070926135752 20070829135752 2854 example.com. MC0CFQCMSWxVehgOQLoYclB9PIAbNP229AIUeH0vNNGJhjnZiqgIOKvs1EhzqAo= ;{id = 2854}
SECTION AUTHORITY
example.com. IN NS ns.example.com.
example.com. 3600 IN RRSIG NS 3 2 3600 20070926134150 20070829134150 2854 example.com. MC0CFQCN+qHdJxoI/2tNKwsb08pra/G7aAIUAWA5sDdJTbrXA1/3OaesGBAO3sI= ;{id = 2854}
ENTRY_END
; response to DNSKEY priming query
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
;REPLY QR AA NOERROR
REPLY QR AA SERVFAIL
SECTION QUESTION
example.com. IN DNSKEY
SECTION ANSWER
;example.com. 3600 IN DNSKEY 256 3 3 ALXLUsWqUrY3JYER3T4TBJII s70j+sDS/UT2QRp61SE7S3E EXopNXoFE73JLRmvpi/UrOO/Vz4Se 6wXv/CYCKjGw06U4WRgR YXcpEhJROyNapmdIKSx hOzfLVE1gqA0PweZR8d tY3aNQSRn3sPpwJr6Mi /PqQKAMMrZ9ckJpf1+b QMOOvxgzz2U1GS18b3y ZKcgTMEaJzd/GZYzi/B N2DzQ0MsrSwYXfsNLFO Bbs8PJMW4LYIxeeOe6rUgkWOF 7CC9Dh/dduQ1QrsJhmZAEFfd6ByYV+ ;{id = 2854 (zsk), size = 1688b}
;example.com. 3600 IN RRSIG DNSKEY 3 2 3600 20070926134802 20070829134802 2854 example.com. MCwCFG1yhRNtTEa3Eno2zhVVuy2EJX3wAhQeLyUp6+UXcpC5qGNu9tkrTEgPUg== ;{id = 2854}
;SECTION AUTHORITY
;example.com. IN NS ns.example.com.
;example.com. 3600 IN RRSIG NS 3 2 3600 20070926134150 20070829134150 2854 example.com. MC0CFQCN+qHdJxoI/2tNKwsb08pra/G7aAIUAWA5sDdJTbrXA1/3OaesGBAO3sI= ;{id = 2854}
;SECTION ADDITIONAL
;ns.example.com. IN A 1.2.3.4
;ns.example.com. 3600 IN RRSIG A 3 3 3600 20070926135752 20070829135752 2854 example.com. MC0CFQCMSWxVehgOQLoYclB9PIAbNP229AIUeH0vNNGJhjnZiqgIOKvs1EhzqAo= ;{id = 2854}
ENTRY_END
; response to query of interest
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
www.example.com. IN A
SECTION ANSWER
www.example.com. IN A 10.20.30.40
ns.example.com. 3600 IN RRSIG A 3 3 3600 20070926134150 20070829134150 2854 example.com. MC0CFQCQMyTjn7WWwpwAR1LlVeLpRgZGuQIUCcJDEkwAuzytTDRlYK7nIMwH1CM= ;{id = 2854}
SECTION AUTHORITY
example.com. IN NS ns.example.com.
example.com. 3600 IN RRSIG NS 3 2 3600 20070926134150 20070829134150 2854 example.com. MC0CFQCN+qHdJxoI/2tNKwsb08pra/G7aAIUAWA5sDdJTbrXA1/3OaesGBAO3sI= ;{id = 2854}
SECTION ADDITIONAL
ns.example.com. IN A 1.2.3.4
www.example.com. 3600 IN RRSIG A 3 3 3600 20070926134150 20070829134150 2854 example.com. MC0CFC99iE9K5y2WNgI0gFvBWaTi9wm6AhUAoUqOpDtG5Zct+Qr9F3mSdnbc6V4= ;{id = 2854}
ENTRY_END
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
ns.example.com. IN AAAA
SECTION ANSWER
ENTRY_END
RANGE_END
STEP 1 QUERY
ENTRY_BEGIN
REPLY RD DO
SECTION QUESTION
www.example.com. IN A
ENTRY_END
; recursion happens here.
STEP 10 CHECK_ANSWER
ENTRY_BEGIN
MATCH all
REPLY QR RD RA SERVFAIL
SECTION QUESTION
www.example.com. IN A
SECTION ANSWER
ENTRY_END
SCENARIO_END
dnssecjava-1.1.3/src/test/resources/unbound/val_faildnskey_ok.rpl 0000664 0000000 0000000 00000013322 13020541473 0025272 0 ustar 00root root 0000000 0000000 ; config options
; The island of trust is at example.com
server:
trust-anchor: "example.com. 3600 IN DS 2854 3 1 46e4ffc6e9a4793b488954bd3f0cc6af0dfb201b"
val-override-date: "20070916134226"
harden-dnssec-stripped: no
target-fetch-policy: "0 0 0 0 0"
stub-zone:
name: "."
stub-addr: 193.0.14.129 # K.ROOT-SERVERS.NET.
CONFIG_END
SCENARIO_BEGIN Test validator with failed DNSKEY request, but not hardened.
; K.ROOT-SERVERS.NET.
RANGE_BEGIN 0 100
ADDRESS 193.0.14.129
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
. IN NS
SECTION ANSWER
. IN NS K.ROOT-SERVERS.NET.
SECTION ADDITIONAL
K.ROOT-SERVERS.NET. IN A 193.0.14.129
ENTRY_END
ENTRY_BEGIN
MATCH opcode subdomain
ADJUST copy_id copy_query
REPLY QR NOERROR
SECTION QUESTION
com. IN A
SECTION AUTHORITY
com. IN NS a.gtld-servers.net.
SECTION ADDITIONAL
a.gtld-servers.net. IN A 192.5.6.30
ENTRY_END
RANGE_END
; a.gtld-servers.net.
RANGE_BEGIN 0 100
ADDRESS 192.5.6.30
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
com. IN NS
SECTION ANSWER
com. IN NS a.gtld-servers.net.
SECTION ADDITIONAL
a.gtld-servers.net. IN A 192.5.6.30
ENTRY_END
ENTRY_BEGIN
MATCH opcode subdomain
ADJUST copy_id copy_query
REPLY QR NOERROR
SECTION QUESTION
example.com. IN A
SECTION AUTHORITY
example.com. IN NS ns.example.com.
SECTION ADDITIONAL
ns.example.com. IN A 1.2.3.4
ENTRY_END
RANGE_END
; ns.example.com.
RANGE_BEGIN 0 100
ADDRESS 1.2.3.4
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
example.com. IN NS
SECTION ANSWER
example.com. IN NS ns.example.com.
example.com. 3600 IN RRSIG NS 3 2 3600 20070926134150 20070829134150 2854 example.com. MC0CFQCN+qHdJxoI/2tNKwsb08pra/G7aAIUAWA5sDdJTbrXA1/3OaesGBAO3sI= ;{id = 2854}
SECTION ADDITIONAL
ns.example.com. IN A 1.2.3.4
ns.example.com. 3600 IN RRSIG A 3 3 3600 20070926135752 20070829135752 2854 example.com. MC0CFQCMSWxVehgOQLoYclB9PIAbNP229AIUeH0vNNGJhjnZiqgIOKvs1EhzqAo= ;{id = 2854}
ENTRY_END
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
ns.example.com. IN A
SECTION ANSWER
ns.example.com. IN A 1.2.3.4
ns.example.com. 3600 IN RRSIG A 3 3 3600 20070926135752 20070829135752 2854 example.com. MC0CFQCMSWxVehgOQLoYclB9PIAbNP229AIUeH0vNNGJhjnZiqgIOKvs1EhzqAo= ;{id = 2854}
SECTION AUTHORITY
example.com. IN NS ns.example.com.
example.com. 3600 IN RRSIG NS 3 2 3600 20070926134150 20070829134150 2854 example.com. MC0CFQCN+qHdJxoI/2tNKwsb08pra/G7aAIUAWA5sDdJTbrXA1/3OaesGBAO3sI= ;{id = 2854}
ENTRY_END
; response to DNSKEY priming query
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
;REPLY QR AA NOERROR
REPLY QR AA SERVFAIL
SECTION QUESTION
example.com. IN DNSKEY
SECTION ANSWER
;example.com. 3600 IN DNSKEY 256 3 3 ALXLUsWqUrY3JYER3T4TBJII s70j+sDS/UT2QRp61SE7S3E EXopNXoFE73JLRmvpi/UrOO/Vz4Se 6wXv/CYCKjGw06U4WRgR YXcpEhJROyNapmdIKSx hOzfLVE1gqA0PweZR8d tY3aNQSRn3sPpwJr6Mi /PqQKAMMrZ9ckJpf1+b QMOOvxgzz2U1GS18b3y ZKcgTMEaJzd/GZYzi/B N2DzQ0MsrSwYXfsNLFO Bbs8PJMW4LYIxeeOe6rUgkWOF 7CC9Dh/dduQ1QrsJhmZAEFfd6ByYV+ ;{id = 2854 (zsk), size = 1688b}
;example.com. 3600 IN RRSIG DNSKEY 3 2 3600 20070926134802 20070829134802 2854 example.com. MCwCFG1yhRNtTEa3Eno2zhVVuy2EJX3wAhQeLyUp6+UXcpC5qGNu9tkrTEgPUg== ;{id = 2854}
;SECTION AUTHORITY
;example.com. IN NS ns.example.com.
;example.com. 3600 IN RRSIG NS 3 2 3600 20070926134150 20070829134150 2854 example.com. MC0CFQCN+qHdJxoI/2tNKwsb08pra/G7aAIUAWA5sDdJTbrXA1/3OaesGBAO3sI= ;{id = 2854}
;SECTION ADDITIONAL
;ns.example.com. IN A 1.2.3.4
;ns.example.com. 3600 IN RRSIG A 3 3 3600 20070926135752 20070829135752 2854 example.com. MC0CFQCMSWxVehgOQLoYclB9PIAbNP229AIUeH0vNNGJhjnZiqgIOKvs1EhzqAo= ;{id = 2854}
ENTRY_END
; response to query of interest
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
www.example.com. IN A
SECTION ANSWER
www.example.com. IN A 10.20.30.40
ns.example.com. 3600 IN RRSIG A 3 3 3600 20070926134150 20070829134150 2854 example.com. MC0CFQCQMyTjn7WWwpwAR1LlVeLpRgZGuQIUCcJDEkwAuzytTDRlYK7nIMwH1CM= ;{id = 2854}
SECTION AUTHORITY
example.com. IN NS ns.example.com.
example.com. 3600 IN RRSIG NS 3 2 3600 20070926134150 20070829134150 2854 example.com. MC0CFQCN+qHdJxoI/2tNKwsb08pra/G7aAIUAWA5sDdJTbrXA1/3OaesGBAO3sI= ;{id = 2854}
SECTION ADDITIONAL
ns.example.com. IN A 1.2.3.4
www.example.com. 3600 IN RRSIG A 3 3 3600 20070926134150 20070829134150 2854 example.com. MC0CFC99iE9K5y2WNgI0gFvBWaTi9wm6AhUAoUqOpDtG5Zct+Qr9F3mSdnbc6V4= ;{id = 2854}
ENTRY_END
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
ns.example.com. IN AAAA
SECTION ANSWER
ENTRY_END
RANGE_END
STEP 1 QUERY
ENTRY_BEGIN
REPLY RD DO
SECTION QUESTION
www.example.com. IN A
ENTRY_END
; recursion happens here.
STEP 10 CHECK_ANSWER
ENTRY_BEGIN
MATCH all
REPLY QR RD RA NOERROR
SECTION QUESTION
www.example.com. IN A
SECTION ANSWER
www.example.com. IN A 10.20.30.40
www.example.com. 3600 IN RRSIG A 3 3 3600 20070926134150 20070829134150 2854 example.com. MC0CFC99iE9K5y2WNgI0gFvBWaTi9wm6AhUAoUqOpDtG5Zct+Qr9F3mSdnbc6V4= ;{id = 2854}
SECTION AUTHORITY
example.com. IN NS ns.example.com.
example.com. 3600 IN RRSIG NS 3 2 3600 20070926134150 20070829134150 2854 example.com. MC0CFQCN+qHdJxoI/2tNKwsb08pra/G7aAIUAWA5sDdJTbrXA1/3OaesGBAO3sI= ;{id = 2854}
SECTION ADDITIONAL
ns.example.com. IN A 1.2.3.4
ns.example.com. 3600 IN RRSIG A 3 3 3600 20070926134150 20070829134150 2854 example.com. MC0CFQCQMyTjn7WWwpwAR1LlVeLpRgZGuQIUCcJDEkwAuzytTDRlYK7nIMwH1CM= ;{id = 2854}
ENTRY_END
SCENARIO_END
dnssecjava-1.1.3/src/test/resources/unbound/val_fwdds.rpl 0000664 0000000 0000000 00000036352 13020541473 0023567 0 ustar 00root root 0000000 0000000 ; config options
; The island of trust is at example.com
server:
trust-anchor: "example.com. 3600 IN DS 2854 3 1 46e4ffc6e9a4793b488954bd3f0cc6af0dfb201b"
val-override-date: "20070916134226"
target-fetch-policy: "0 0 0 0 0"
stub-zone:
name: "."
stub-addr: 193.0.14.129 # K.ROOT-SERVERS.NET.
forward-zone:
name: "sub.example.com"
forward-addr: 1.2.3.6
CONFIG_END
SCENARIO_BEGIN Test forward-zone with DS query
; The fwd zone is linked validly with a DS to the public internet zone.
; unbound just has to be able to ask the DS from the right server (not
; from the fwd).
; Here the fwd is not even recursive, just the plain server for sub.example.com
; K.ROOT-SERVERS.NET.
RANGE_BEGIN 0 100
ADDRESS 193.0.14.129
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
. IN NS
SECTION ANSWER
. IN NS K.ROOT-SERVERS.NET.
SECTION ADDITIONAL
K.ROOT-SERVERS.NET. IN A 193.0.14.129
ENTRY_END
ENTRY_BEGIN
MATCH opcode subdomain
ADJUST copy_id copy_query
REPLY QR NOERROR
SECTION QUESTION
com. IN NS
SECTION AUTHORITY
com. IN NS a.gtld-servers.net.
SECTION ADDITIONAL
a.gtld-servers.net. IN A 192.5.6.30
ENTRY_END
RANGE_END
; a.gtld-servers.net.
RANGE_BEGIN 0 100
ADDRESS 192.5.6.30
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
com. IN NS
SECTION ANSWER
com. IN NS a.gtld-servers.net.
SECTION ADDITIONAL
a.gtld-servers.net. IN A 192.5.6.30
ENTRY_END
ENTRY_BEGIN
MATCH opcode subdomain
ADJUST copy_id copy_query
REPLY QR NOERROR
SECTION QUESTION
example.com. IN A
SECTION AUTHORITY
example.com. IN NS ns.example.com.
SECTION ADDITIONAL
ns.example.com. IN A 1.2.3.4
ENTRY_END
RANGE_END
; ns.example.com.
RANGE_BEGIN 0 100
ADDRESS 1.2.3.4
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
example.com. IN NS
SECTION ANSWER
example.com. IN NS ns.example.com.
example.com. 3600 IN RRSIG NS 3 2 3600 20070926134150 20070829134150 2854 example.com. MC0CFQCN+qHdJxoI/2tNKwsb08pra/G7aAIUAWA5sDdJTbrXA1/3OaesGBAO3sI= ;{id = 2854}
SECTION ADDITIONAL
ns.example.com. IN A 1.2.3.4
ns.example.com. 3600 IN RRSIG A 3 3 3600 20070926135752 20070829135752 2854 example.com. MC0CFQCMSWxVehgOQLoYclB9PIAbNP229AIUeH0vNNGJhjnZiqgIOKvs1EhzqAo= ;{id = 2854}
ENTRY_END
; response to DNSKEY priming query
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
example.com. IN DNSKEY
SECTION ANSWER
example.com. 3600 IN DNSKEY 256 3 3 ALXLUsWqUrY3JYER3T4TBJII s70j+sDS/UT2QRp61SE7S3E EXopNXoFE73JLRmvpi/UrOO/Vz4Se 6wXv/CYCKjGw06U4WRgR YXcpEhJROyNapmdIKSx hOzfLVE1gqA0PweZR8d tY3aNQSRn3sPpwJr6Mi /PqQKAMMrZ9ckJpf1+b QMOOvxgzz2U1GS18b3y ZKcgTMEaJzd/GZYzi/B N2DzQ0MsrSwYXfsNLFO Bbs8PJMW4LYIxeeOe6rUgkWOF 7CC9Dh/dduQ1QrsJhmZAEFfd6ByYV+ ;{id = 2854 (zsk), size = 1688b}
example.com. 3600 IN RRSIG DNSKEY DSA 2 3600 20070926134150 20070829134150 2854 example.com. MCwCFBQRtlR4BEv9ohi+PGFjp+AHsJuHAhRCvz0shggvnvI88DFnBDCczHUcVA== ;{id = 2854}
SECTION AUTHORITY
example.com. IN NS ns.example.com.
example.com. 3600 IN RRSIG NS 3 2 3600 20070926134150 20070829134150 2854 example.com. MC0CFQCN+qHdJxoI/2tNKwsb08pra/G7aAIUAWA5sDdJTbrXA1/3OaesGBAO3sI= ;{id = 2854}
SECTION ADDITIONAL
ns.example.com. IN A 1.2.3.4
ns.example.com. 3600 IN RRSIG A 3 3 3600 20070926135752 20070829135752 2854 example.com. MC0CFQCMSWxVehgOQLoYclB9PIAbNP229AIUeH0vNNGJhjnZiqgIOKvs1EhzqAo= ;{id = 2854}
ENTRY_END
; response for DS of sub.example.com.
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
sub.example.com. IN DS
SECTION ANSWER
sub.example.com. 3600 IN DS 30899 RSASHA1 1 f7ed618f24d5e5202927e1d27bc2e84a141cb4b3
sub.example.com. 3600 IN RRSIG DS 3 3 3600 20070926134150 20070829134150 2854 example.com. MCwCFCW3ix0GD4BSvNLWIbROCJt5DAW9AhRt/kg9kBKJ20UBUdumrBUHqnskdA== ;{id = 2854}
SECTION AUTHORITY
SECTION ADDITIONAL
ENTRY_END
; response for delegation to sub.example.com.
ENTRY_BEGIN
MATCH opcode subdomain
ADJUST copy_id copy_query
REPLY QR NOERROR
SECTION QUESTION
sub.example.com. IN A
SECTION ANSWER
SECTION AUTHORITY
sub.example.com. IN NS ns.sub.example.com.
sub.example.com. 3600 IN DS 30899 RSASHA1 1 f7ed618f24d5e5202927e1d27bc2e84a141cb4b3
sub.example.com. 3600 IN RRSIG DS 3 3 3600 20070926134150 20070829134150 2854 example.com. MCwCFCW3ix0GD4BSvNLWIbROCJt5DAW9AhRt/kg9kBKJ20UBUdumrBUHqnskdA== ;{id = 2854}
SECTION ADDITIONAL
ns.sub.example.com. IN A 1.2.3.6
ENTRY_END
RANGE_END
; ns.sub.example.com.
RANGE_BEGIN 0 100
ADDRESS 1.2.3.6
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
sub.example.com. IN NS
SECTION ANSWER
sub.example.com. IN NS ns.sub.example.com.
sub.example.com. 3600 IN RRSIG NS 5 3 3600 20070926134150 20070829134150 30899 sub.example.com. wcpHeBILHfo8C9uxMhcW03gcURZeUffiKdSTb50ZjzTHgMNhRyMfpcvSpXEd9548A9UTmWKeLZChfr5Z/glONw== ;{id = 30899}
SECTION ADDITIONAL
ns.sub.example.com. IN A 1.2.3.6
ns.sub.example.com. 3600 IN RRSIG A 5 4 3600 20070926134150 20070829134150 30899 sub.example.com. UF7shD/gt1FOp2UHgLTNbPzVykklSXFMEtJ1xD+Hholwf/PIzd7zoaIttIYibNa4fUXCqMg22H9P7MRhfmFe6g== ;{id = 30899}
ENTRY_END
; response to DNSKEY priming query
; sub.example.com. 3600 IN DS 30899 RSASHA1 1 f7ed618f24d5e5202927e1d27bc2e84a141cb4b3
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
sub.example.com. IN DNSKEY
SECTION ANSWER
sub.example.com. 3600 IN DNSKEY 256 3 5 AQPQ41chR9DEHt/aIzIFAqanbDlRflJoRs5yz1jFsoRIT7dWf0r+PeDuewdxkszNH6wnU4QL8pfKFRh5PIYVBLK3 ;{id = 30899 (zsk), size = 512b}
sub.example.com. 3600 IN RRSIG DNSKEY 5 3 3600 20070926134150 20070829134150 30899 sub.example.com. uNGp99iznjD7oOX02XnQbDnbg75UwBHRvZSKYUorTKvPUnCWMHKdRsQ+mf+Fx3GZ+Fz9BVjoCmQqpnfgXLEYqw== ;{id = 30899}
SECTION AUTHORITY
sub.example.com. IN NS ns.sub.example.com.
sub.example.com. 3600 IN RRSIG NS 5 3 3600 20070926134150 20070829134150 30899 sub.example.com. wcpHeBILHfo8C9uxMhcW03gcURZeUffiKdSTb50ZjzTHgMNhRyMfpcvSpXEd9548A9UTmWKeLZChfr5Z/glONw== ;{id = 30899}
SECTION ADDITIONAL
ns.sub.example.com. IN A 1.2.3.6
ns.sub.example.com. 3600 IN RRSIG A 5 4 3600 20070926134150 20070829134150 30899 sub.example.com. UF7shD/gt1FOp2UHgLTNbPzVykklSXFMEtJ1xD+Hholwf/PIzd7zoaIttIYibNa4fUXCqMg22H9P7MRhfmFe6g== ;{id = 30899}
ENTRY_END
; response for qtype DS. This is not available here.
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR SERVFAIL
SECTION QUESTION
sub.example.com. IN DS
SECTION ANSWER
SECTION AUTHORITY
SECTION ADDITIONAL
ENTRY_END
; response to query of interest
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
www.sub.example.com. IN A
SECTION ANSWER
www.sub.example.com. IN A 11.11.11.11
www.sub.example.com. 3600 IN RRSIG A 5 4 3600 20070926134150 20070829134150 30899 sub.example.com. 0DqqRfRtm7VSEQ4mmBbzrKRqQAay3JAE8DPDGmjtokrrjN9F1G/HxozDV7bjdIh2EChlQea8FPwf/GepJMUVxg== ;{id = 30899}
SECTION AUTHORITY
SECTION ADDITIONAL
ENTRY_END
RANGE_END
STEP 1 QUERY
ENTRY_BEGIN
REPLY RD DO
SECTION QUESTION
www.sub.example.com. IN A
ENTRY_END
; recursion happens here.
STEP 10 CHECK_ANSWER
ENTRY_BEGIN
MATCH all
REPLY QR RD RA AD NOERROR
SECTION QUESTION
www.sub.example.com. IN A
SECTION ANSWER
www.sub.example.com. 3600 IN A 11.11.11.11
www.sub.example.com. 3600 IN RRSIG A 5 4 3600 20070926134150 20070829134150 30899 sub.example.com. 0DqqRfRtm7VSEQ4mmBbzrKRqQAay3JAE8DPDGmjtokrrjN9F1G/HxozDV7bjdIh2EChlQea8FPwf/GepJMUVxg== ;{id = 30899}
SECTION AUTHORITY
SECTION ADDITIONAL
ENTRY_END
SCENARIO_END
; config options
; The island of trust is at example.com
server:
trust-anchor: "example.com. 3600 IN DS 2854 3 1 46e4ffc6e9a4793b488954bd3f0cc6af0dfb201b"
val-override-date: "20070916134226"
target-fetch-policy: "0 0 0 0 0"
stub-zone:
name: "."
stub-addr: 193.0.14.129 # K.ROOT-SERVERS.NET.
stub-zone:
name: "sub.example.com"
stub-addr: 1.2.3.6
CONFIG_END
SCENARIO_BEGIN Test stub with DS query
; The stub zone is linked validly with a DS to the public internet zone.
; unbound just has to be able to ask the DS from the right server (not
; from the stub).
; K.ROOT-SERVERS.NET.
RANGE_BEGIN 0 100
ADDRESS 193.0.14.129
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
. IN NS
SECTION ANSWER
. IN NS K.ROOT-SERVERS.NET.
SECTION ADDITIONAL
K.ROOT-SERVERS.NET. IN A 193.0.14.129
ENTRY_END
ENTRY_BEGIN
MATCH opcode subdomain
ADJUST copy_id copy_query
REPLY QR NOERROR
SECTION QUESTION
com. IN NS
SECTION AUTHORITY
com. IN NS a.gtld-servers.net.
SECTION ADDITIONAL
a.gtld-servers.net. IN A 192.5.6.30
ENTRY_END
RANGE_END
; a.gtld-servers.net.
RANGE_BEGIN 0 100
ADDRESS 192.5.6.30
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
com. IN NS
SECTION ANSWER
com. IN NS a.gtld-servers.net.
SECTION ADDITIONAL
a.gtld-servers.net. IN A 192.5.6.30
ENTRY_END
ENTRY_BEGIN
MATCH opcode subdomain
ADJUST copy_id copy_query
REPLY QR NOERROR
SECTION QUESTION
example.com. IN A
SECTION AUTHORITY
example.com. IN NS ns.example.com.
SECTION ADDITIONAL
ns.example.com. IN A 1.2.3.4
ENTRY_END
RANGE_END
; ns.example.com.
RANGE_BEGIN 0 100
ADDRESS 1.2.3.4
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
example.com. IN NS
SECTION ANSWER
example.com. IN NS ns.example.com.
example.com. 3600 IN RRSIG NS 3 2 3600 20070926134150 20070829134150 2854 example.com. MC0CFQCN+qHdJxoI/2tNKwsb08pra/G7aAIUAWA5sDdJTbrXA1/3OaesGBAO3sI= ;{id = 2854}
SECTION ADDITIONAL
ns.example.com. IN A 1.2.3.4
ns.example.com. 3600 IN RRSIG A 3 3 3600 20070926135752 20070829135752 2854 example.com. MC0CFQCMSWxVehgOQLoYclB9PIAbNP229AIUeH0vNNGJhjnZiqgIOKvs1EhzqAo= ;{id = 2854}
ENTRY_END
; response to DNSKEY priming query
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
example.com. IN DNSKEY
SECTION ANSWER
example.com. 3600 IN DNSKEY 256 3 3 ALXLUsWqUrY3JYER3T4TBJII s70j+sDS/UT2QRp61SE7S3E EXopNXoFE73JLRmvpi/UrOO/Vz4Se 6wXv/CYCKjGw06U4WRgR YXcpEhJROyNapmdIKSx hOzfLVE1gqA0PweZR8d tY3aNQSRn3sPpwJr6Mi /PqQKAMMrZ9ckJpf1+b QMOOvxgzz2U1GS18b3y ZKcgTMEaJzd/GZYzi/B N2DzQ0MsrSwYXfsNLFO Bbs8PJMW4LYIxeeOe6rUgkWOF 7CC9Dh/dduQ1QrsJhmZAEFfd6ByYV+ ;{id = 2854 (zsk), size = 1688b}
example.com. 3600 IN RRSIG DNSKEY DSA 2 3600 20070926134150 20070829134150 2854 example.com. MCwCFBQRtlR4BEv9ohi+PGFjp+AHsJuHAhRCvz0shggvnvI88DFnBDCczHUcVA== ;{id = 2854}
SECTION AUTHORITY
example.com. IN NS ns.example.com.
example.com. 3600 IN RRSIG NS 3 2 3600 20070926134150 20070829134150 2854 example.com. MC0CFQCN+qHdJxoI/2tNKwsb08pra/G7aAIUAWA5sDdJTbrXA1/3OaesGBAO3sI= ;{id = 2854}
SECTION ADDITIONAL
ns.example.com. IN A 1.2.3.4
ns.example.com. 3600 IN RRSIG A 3 3 3600 20070926135752 20070829135752 2854 example.com. MC0CFQCMSWxVehgOQLoYclB9PIAbNP229AIUeH0vNNGJhjnZiqgIOKvs1EhzqAo= ;{id = 2854}
ENTRY_END
; response for DS of sub.example.com.
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
sub.example.com. IN DS
SECTION ANSWER
sub.example.com. 3600 IN DS 30899 RSASHA1 1 f7ed618f24d5e5202927e1d27bc2e84a141cb4b3
sub.example.com. 3600 IN RRSIG DS 3 3 3600 20070926134150 20070829134150 2854 example.com. MCwCFCW3ix0GD4BSvNLWIbROCJt5DAW9AhRt/kg9kBKJ20UBUdumrBUHqnskdA== ;{id = 2854}
SECTION AUTHORITY
SECTION ADDITIONAL
ENTRY_END
; response for delegation to sub.example.com.
ENTRY_BEGIN
MATCH opcode subdomain
ADJUST copy_id copy_query
REPLY QR NOERROR
SECTION QUESTION
sub.example.com. IN A
SECTION ANSWER
SECTION AUTHORITY
sub.example.com. IN NS ns.sub.example.com.
sub.example.com. 3600 IN DS 30899 RSASHA1 1 f7ed618f24d5e5202927e1d27bc2e84a141cb4b3
sub.example.com. 3600 IN RRSIG DS 3 3 3600 20070926134150 20070829134150 2854 example.com. MCwCFCW3ix0GD4BSvNLWIbROCJt5DAW9AhRt/kg9kBKJ20UBUdumrBUHqnskdA== ;{id = 2854}
SECTION ADDITIONAL
ns.sub.example.com. IN A 1.2.3.6
ENTRY_END
RANGE_END
; ns.sub.example.com.
RANGE_BEGIN 0 100
ADDRESS 1.2.3.6
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
sub.example.com. IN NS
SECTION ANSWER
sub.example.com. IN NS ns.sub.example.com.
sub.example.com. 3600 IN RRSIG NS 5 3 3600 20070926134150 20070829134150 30899 sub.example.com. wcpHeBILHfo8C9uxMhcW03gcURZeUffiKdSTb50ZjzTHgMNhRyMfpcvSpXEd9548A9UTmWKeLZChfr5Z/glONw== ;{id = 30899}
SECTION ADDITIONAL
ns.sub.example.com. IN A 1.2.3.6
ns.sub.example.com. 3600 IN RRSIG A 5 4 3600 20070926134150 20070829134150 30899 sub.example.com. UF7shD/gt1FOp2UHgLTNbPzVykklSXFMEtJ1xD+Hholwf/PIzd7zoaIttIYibNa4fUXCqMg22H9P7MRhfmFe6g== ;{id = 30899}
ENTRY_END
; response to DNSKEY priming query
; sub.example.com. 3600 IN DS 30899 RSASHA1 1 f7ed618f24d5e5202927e1d27bc2e84a141cb4b3
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
sub.example.com. IN DNSKEY
SECTION ANSWER
sub.example.com. 3600 IN DNSKEY 256 3 5 AQPQ41chR9DEHt/aIzIFAqanbDlRflJoRs5yz1jFsoRIT7dWf0r+PeDuewdxkszNH6wnU4QL8pfKFRh5PIYVBLK3 ;{id = 30899 (zsk), size = 512b}
sub.example.com. 3600 IN RRSIG DNSKEY 5 3 3600 20070926134150 20070829134150 30899 sub.example.com. uNGp99iznjD7oOX02XnQbDnbg75UwBHRvZSKYUorTKvPUnCWMHKdRsQ+mf+Fx3GZ+Fz9BVjoCmQqpnfgXLEYqw== ;{id = 30899}
SECTION AUTHORITY
sub.example.com. IN NS ns.sub.example.com.
sub.example.com. 3600 IN RRSIG NS 5 3 3600 20070926134150 20070829134150 30899 sub.example.com. wcpHeBILHfo8C9uxMhcW03gcURZeUffiKdSTb50ZjzTHgMNhRyMfpcvSpXEd9548A9UTmWKeLZChfr5Z/glONw== ;{id = 30899}
SECTION ADDITIONAL
ns.sub.example.com. IN A 1.2.3.6
ns.sub.example.com. 3600 IN RRSIG A 5 4 3600 20070926134150 20070829134150 30899 sub.example.com. UF7shD/gt1FOp2UHgLTNbPzVykklSXFMEtJ1xD+Hholwf/PIzd7zoaIttIYibNa4fUXCqMg22H9P7MRhfmFe6g== ;{id = 30899}
ENTRY_END
; response for qtype DS. This is not available here.
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR SERVFAIL
SECTION QUESTION
sub.example.com. IN DS
SECTION ANSWER
SECTION AUTHORITY
SECTION ADDITIONAL
ENTRY_END
; response to query of interest
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
www.sub.example.com. IN A
SECTION ANSWER
www.sub.example.com. IN A 11.11.11.11
www.sub.example.com. 3600 IN RRSIG A 5 4 3600 20070926134150 20070829134150 30899 sub.example.com. 0DqqRfRtm7VSEQ4mmBbzrKRqQAay3JAE8DPDGmjtokrrjN9F1G/HxozDV7bjdIh2EChlQea8FPwf/GepJMUVxg== ;{id = 30899}
SECTION AUTHORITY
SECTION ADDITIONAL
ENTRY_END
RANGE_END
STEP 1 QUERY
ENTRY_BEGIN
REPLY RD DO
SECTION QUESTION
www.sub.example.com. IN A
ENTRY_END
; recursion happens here.
STEP 10 CHECK_ANSWER
ENTRY_BEGIN
MATCH all
REPLY QR RD RA AD NOERROR
SECTION QUESTION
www.sub.example.com. IN A
SECTION ANSWER
www.sub.example.com. 3600 IN A 11.11.11.11
www.sub.example.com. 3600 IN RRSIG A 5 4 3600 20070926134150 20070829134150 30899 sub.example.com. 0DqqRfRtm7VSEQ4mmBbzrKRqQAay3JAE8DPDGmjtokrrjN9F1G/HxozDV7bjdIh2EChlQea8FPwf/GepJMUVxg== ;{id = 30899}
SECTION AUTHORITY
SECTION ADDITIONAL
ENTRY_END
SCENARIO_END
dnssecjava-1.1.3/src/test/resources/unbound/val_keyprefetch.rpl 0000664 0000000 0000000 00000016374 13020541473 0024773 0 ustar 00root root 0000000 0000000 ; config options
; The island of trust is at example.com
server:
trust-anchor: "example.com. 3600 IN DS 2854 3 1 46e4ffc6e9a4793b488954bd3f0cc6af0dfb201b"
val-override-date: "20070916134226"
target-fetch-policy: "0 0 0 0 0"
prefetch-key: yes
stub-zone:
name: "."
stub-addr: 193.0.14.129 # K.ROOT-SERVERS.NET.
CONFIG_END
SCENARIO_BEGIN Test validator with key prefetch
; K.ROOT-SERVERS.NET.
RANGE_BEGIN 0 100
ADDRESS 193.0.14.129
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
. IN NS
SECTION ANSWER
. IN NS K.ROOT-SERVERS.NET.
SECTION ADDITIONAL
K.ROOT-SERVERS.NET. IN A 193.0.14.129
ENTRY_END
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
www.sub.example.com. IN A
SECTION AUTHORITY
com. IN NS a.gtld-servers.net.
SECTION ADDITIONAL
a.gtld-servers.net. IN A 192.5.6.30
ENTRY_END
RANGE_END
; a.gtld-servers.net.
RANGE_BEGIN 0 100
ADDRESS 192.5.6.30
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
com. IN NS
SECTION ANSWER
com. IN NS a.gtld-servers.net.
SECTION ADDITIONAL
a.gtld-servers.net. IN A 192.5.6.30
ENTRY_END
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
www.sub.example.com. IN A
SECTION AUTHORITY
example.com. IN NS ns.example.com.
SECTION ADDITIONAL
ns.example.com. IN A 1.2.3.4
ENTRY_END
RANGE_END
; ns.example.com.
RANGE_BEGIN 0 100
ADDRESS 1.2.3.4
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
example.com. IN NS
SECTION ANSWER
example.com. IN NS ns.example.com.
example.com. 3600 IN RRSIG NS 3 2 3600 20070926134150 20070829134150 2854 example.com. MC0CFQCN+qHdJxoI/2tNKwsb08pra/G7aAIUAWA5sDdJTbrXA1/3OaesGBAO3sI= ;{id = 2854}
SECTION ADDITIONAL
ns.example.com. IN A 1.2.3.4
ns.example.com. 3600 IN RRSIG A 3 3 3600 20070926135752 20070829135752 2854 example.com. MC0CFQCMSWxVehgOQLoYclB9PIAbNP229AIUeH0vNNGJhjnZiqgIOKvs1EhzqAo= ;{id = 2854}
ENTRY_END
; response to DNSKEY priming query
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
example.com. IN DNSKEY
SECTION ANSWER
example.com. 3600 IN DNSKEY 256 3 3 ALXLUsWqUrY3JYER3T4TBJII s70j+sDS/UT2QRp61SE7S3E EXopNXoFE73JLRmvpi/UrOO/Vz4Se 6wXv/CYCKjGw06U4WRgR YXcpEhJROyNapmdIKSx hOzfLVE1gqA0PweZR8d tY3aNQSRn3sPpwJr6Mi /PqQKAMMrZ9ckJpf1+b QMOOvxgzz2U1GS18b3y ZKcgTMEaJzd/GZYzi/B N2DzQ0MsrSwYXfsNLFO Bbs8PJMW4LYIxeeOe6rUgkWOF 7CC9Dh/dduQ1QrsJhmZAEFfd6ByYV+ ;{id = 2854 (zsk), size = 1688b}
example.com. 3600 IN RRSIG DNSKEY DSA 2 3600 20070926134150 20070829134150 2854 example.com. MCwCFBQRtlR4BEv9ohi+PGFjp+AHsJuHAhRCvz0shggvnvI88DFnBDCczHUcVA== ;{id = 2854}
SECTION AUTHORITY
example.com. IN NS ns.example.com.
example.com. 3600 IN RRSIG NS 3 2 3600 20070926134150 20070829134150 2854 example.com. MC0CFQCN+qHdJxoI/2tNKwsb08pra/G7aAIUAWA5sDdJTbrXA1/3OaesGBAO3sI= ;{id = 2854}
SECTION ADDITIONAL
ns.example.com. IN A 1.2.3.4
ns.example.com. 3600 IN RRSIG A 3 3 3600 20070926135752 20070829135752 2854 example.com. MC0CFQCMSWxVehgOQLoYclB9PIAbNP229AIUeH0vNNGJhjnZiqgIOKvs1EhzqAo= ;{id = 2854}
ENTRY_END
; response for delegation to sub.example.com.
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
www.sub.example.com. IN A
SECTION ANSWER
SECTION AUTHORITY
sub.example.com. IN NS ns.sub.example.com.
sub.example.com. 3600 IN DS 30899 RSASHA1 1 f7ed618f24d5e5202927e1d27bc2e84a141cb4b3
sub.example.com. 3600 IN RRSIG DS 3 3 3600 20070926134150 20070829134150 2854 example.com. MCwCFCW3ix0GD4BSvNLWIbROCJt5DAW9AhRt/kg9kBKJ20UBUdumrBUHqnskdA== ;{id = 2854}
SECTION ADDITIONAL
ns.sub.example.com. IN A 1.2.3.6
ENTRY_END
; response for delegation to sub.example.com.
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
sub.example.com. IN DNSKEY
SECTION ANSWER
SECTION AUTHORITY
sub.example.com. IN NS ns.sub.example.com.
sub.example.com. 3600 IN DS 30899 RSASHA1 1 f7ed618f24d5e5202927e1d27bc2e84a141cb4b3
sub.example.com. 3600 IN RRSIG DS 3 3 3600 20070926134150 20070829134150 2854 example.com. MCwCFCW3ix0GD4BSvNLWIbROCJt5DAW9AhRt/kg9kBKJ20UBUdumrBUHqnskdA== ;{id = 2854}
SECTION ADDITIONAL
ns.sub.example.com. IN A 1.2.3.6
ENTRY_END
RANGE_END
; ns.sub.example.com.
RANGE_BEGIN 0 100
ADDRESS 1.2.3.6
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
sub.example.com. IN NS
SECTION ANSWER
sub.example.com. IN NS ns.sub.example.com.
sub.example.com. 3600 IN RRSIG NS 5 3 3600 20070926134150 20070829134150 30899 sub.example.com. wcpHeBILHfo8C9uxMhcW03gcURZeUffiKdSTb50ZjzTHgMNhRyMfpcvSpXEd9548A9UTmWKeLZChfr5Z/glONw== ;{id = 30899}
SECTION ADDITIONAL
ns.sub.example.com. IN A 1.2.3.6
ns.sub.example.com. 3600 IN RRSIG A 5 4 3600 20070926134150 20070829134150 30899 sub.example.com. UF7shD/gt1FOp2UHgLTNbPzVykklSXFMEtJ1xD+Hholwf/PIzd7zoaIttIYibNa4fUXCqMg22H9P7MRhfmFe6g== ;{id = 30899}
ENTRY_END
; response to DNSKEY priming query
; sub.example.com. 3600 IN DS 30899 RSASHA1 1 f7ed618f24d5e5202927e1d27bc2e84a141cb4b3
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
sub.example.com. IN DNSKEY
SECTION ANSWER
sub.example.com. 3600 IN DNSKEY 256 3 5 AQPQ41chR9DEHt/aIzIFAqanbDlRflJoRs5yz1jFsoRIT7dWf0r+PeDuewdxkszNH6wnU4QL8pfKFRh5PIYVBLK3 ;{id = 30899 (zsk), size = 512b}
sub.example.com. 3600 IN RRSIG DNSKEY 5 3 3600 20070926134150 20070829134150 30899 sub.example.com. uNGp99iznjD7oOX02XnQbDnbg75UwBHRvZSKYUorTKvPUnCWMHKdRsQ+mf+Fx3GZ+Fz9BVjoCmQqpnfgXLEYqw== ;{id = 30899}
SECTION AUTHORITY
sub.example.com. IN NS ns.sub.example.com.
sub.example.com. 3600 IN RRSIG NS 5 3 3600 20070926134150 20070829134150 30899 sub.example.com. wcpHeBILHfo8C9uxMhcW03gcURZeUffiKdSTb50ZjzTHgMNhRyMfpcvSpXEd9548A9UTmWKeLZChfr5Z/glONw== ;{id = 30899}
SECTION ADDITIONAL
ns.sub.example.com. IN A 1.2.3.6
ns.sub.example.com. 3600 IN RRSIG A 5 4 3600 20070926134150 20070829134150 30899 sub.example.com. UF7shD/gt1FOp2UHgLTNbPzVykklSXFMEtJ1xD+Hholwf/PIzd7zoaIttIYibNa4fUXCqMg22H9P7MRhfmFe6g== ;{id = 30899}
ENTRY_END
; response to query of interest
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
www.sub.example.com. IN A
SECTION ANSWER
www.sub.example.com. IN A 11.11.11.11
www.sub.example.com. 3600 IN RRSIG A 5 4 3600 20070926134150 20070829134150 30899 sub.example.com. 0DqqRfRtm7VSEQ4mmBbzrKRqQAay3JAE8DPDGmjtokrrjN9F1G/HxozDV7bjdIh2EChlQea8FPwf/GepJMUVxg== ;{id = 30899}
SECTION AUTHORITY
SECTION ADDITIONAL
ENTRY_END
RANGE_END
STEP 1 QUERY
ENTRY_BEGIN
REPLY RD DO
SECTION QUESTION
www.sub.example.com. IN A
ENTRY_END
; recursion happens here.
STEP 10 CHECK_ANSWER
ENTRY_BEGIN
MATCH all
REPLY QR RD RA AD NOERROR
SECTION QUESTION
www.sub.example.com. IN A
SECTION ANSWER
www.sub.example.com. 3600 IN A 11.11.11.11
www.sub.example.com. 3600 IN RRSIG A 5 4 3600 20070926134150 20070829134150 30899 sub.example.com. 0DqqRfRtm7VSEQ4mmBbzrKRqQAay3JAE8DPDGmjtokrrjN9F1G/HxozDV7bjdIh2EChlQea8FPwf/GepJMUVxg== ;{id = 30899}
SECTION AUTHORITY
SECTION ADDITIONAL
ENTRY_END
SCENARIO_END
dnssecjava-1.1.3/src/test/resources/unbound/val_keyprefetch_verify.rpl 0000664 0000000 0000000 00000021164 13020541473 0026350 0 ustar 00root root 0000000 0000000 ; config options
; The island of trust is at example.com
server:
trust-anchor: "example.com. 3600 IN DS 2854 3 1 46e4ffc6e9a4793b488954bd3f0cc6af0dfb201b"
val-override-date: "20070916134226"
target-fetch-policy: "0 0 0 0 0"
prefetch-key: yes
prefetch: yes
stub-zone:
name: "."
stub-addr: 193.0.14.129 # K.ROOT-SERVERS.NET.
CONFIG_END
SCENARIO_BEGIN Test validator with key prefetch and verify with the anchor
; K.ROOT-SERVERS.NET.
RANGE_BEGIN 0 100
ADDRESS 193.0.14.129
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
. IN NS
SECTION ANSWER
. IN NS K.ROOT-SERVERS.NET.
SECTION ADDITIONAL
K.ROOT-SERVERS.NET. IN A 193.0.14.129
ENTRY_END
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
www.sub.example.com. IN A
SECTION AUTHORITY
com. IN NS a.gtld-servers.net.
SECTION ADDITIONAL
a.gtld-servers.net. IN A 192.5.6.30
ENTRY_END
RANGE_END
; a.gtld-servers.net.
RANGE_BEGIN 0 100
ADDRESS 192.5.6.30
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
com. IN NS
SECTION ANSWER
com. IN NS a.gtld-servers.net.
SECTION ADDITIONAL
a.gtld-servers.net. IN A 192.5.6.30
ENTRY_END
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
www.sub.example.com. IN A
SECTION AUTHORITY
example.com. IN NS ns.example.com.
SECTION ADDITIONAL
ns.example.com. IN A 1.2.3.4
ENTRY_END
RANGE_END
; ns.example.com.
RANGE_BEGIN 0 100
ADDRESS 1.2.3.4
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
example.com. IN NS
SECTION ANSWER
example.com. IN NS ns.example.com.
example.com. 3600 IN RRSIG NS 3 2 3600 20070926134150 20070829134150 2854 example.com. MC0CFQCN+qHdJxoI/2tNKwsb08pra/G7aAIUAWA5sDdJTbrXA1/3OaesGBAO3sI= ;{id = 2854}
SECTION ADDITIONAL
ns.example.com. IN A 1.2.3.4
ns.example.com. 3600 IN RRSIG A 3 3 3600 20070926135752 20070829135752 2854 example.com. MC0CFQCMSWxVehgOQLoYclB9PIAbNP229AIUeH0vNNGJhjnZiqgIOKvs1EhzqAo= ;{id = 2854}
ENTRY_END
; response to DNSKEY priming query
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
example.com. IN DNSKEY
SECTION ANSWER
example.com. 3600 IN DNSKEY 256 3 3 ALXLUsWqUrY3JYER3T4TBJII s70j+sDS/UT2QRp61SE7S3E EXopNXoFE73JLRmvpi/UrOO/Vz4Se 6wXv/CYCKjGw06U4WRgR YXcpEhJROyNapmdIKSx hOzfLVE1gqA0PweZR8d tY3aNQSRn3sPpwJr6Mi /PqQKAMMrZ9ckJpf1+b QMOOvxgzz2U1GS18b3y ZKcgTMEaJzd/GZYzi/B N2DzQ0MsrSwYXfsNLFO Bbs8PJMW4LYIxeeOe6rUgkWOF 7CC9Dh/dduQ1QrsJhmZAEFfd6ByYV+ ;{id = 2854 (zsk), size = 1688b}
example.com. 3600 IN RRSIG DNSKEY DSA 2 3600 20070926134150 20070829134150 2854 example.com. MCwCFBQRtlR4BEv9ohi+PGFjp+AHsJuHAhRCvz0shggvnvI88DFnBDCczHUcVA== ;{id = 2854}
SECTION AUTHORITY
example.com. IN NS ns.example.com.
example.com. 3600 IN RRSIG NS 3 2 3600 20070926134150 20070829134150 2854 example.com. MC0CFQCN+qHdJxoI/2tNKwsb08pra/G7aAIUAWA5sDdJTbrXA1/3OaesGBAO3sI= ;{id = 2854}
SECTION ADDITIONAL
ns.example.com. IN A 1.2.3.4
ns.example.com. 3600 IN RRSIG A 3 3 3600 20070926135752 20070829135752 2854 example.com. MC0CFQCMSWxVehgOQLoYclB9PIAbNP229AIUeH0vNNGJhjnZiqgIOKvs1EhzqAo= ;{id = 2854}
ENTRY_END
; response for delegation to sub.example.com.
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
www.sub.example.com. IN A
SECTION ANSWER
SECTION AUTHORITY
sub.example.com. IN NS ns.sub.example.com.
sub.example.com. 3600 IN DS 30899 RSASHA1 1 f7ed618f24d5e5202927e1d27bc2e84a141cb4b3
sub.example.com. 3600 IN RRSIG DS 3 3 3600 20070926134150 20070829134150 2854 example.com. MCwCFCW3ix0GD4BSvNLWIbROCJt5DAW9AhRt/kg9kBKJ20UBUdumrBUHqnskdA== ;{id = 2854}
SECTION ADDITIONAL
ns.sub.example.com. IN A 1.2.3.6
ENTRY_END
; response for delegation to sub.example.com.
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
sub.example.com. IN DNSKEY
SECTION ANSWER
SECTION AUTHORITY
sub.example.com. IN NS ns.sub.example.com.
sub.example.com. 3600 IN DS 30899 RSASHA1 1 f7ed618f24d5e5202927e1d27bc2e84a141cb4b3
sub.example.com. 3600 IN RRSIG DS 3 3 3600 20070926134150 20070829134150 2854 example.com. MCwCFCW3ix0GD4BSvNLWIbROCJt5DAW9AhRt/kg9kBKJ20UBUdumrBUHqnskdA== ;{id = 2854}
SECTION ADDITIONAL
ns.sub.example.com. IN A 1.2.3.6
ENTRY_END
RANGE_END
; ns.sub.example.com.
RANGE_BEGIN 0 100
ADDRESS 1.2.3.6
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
sub.example.com. IN NS
SECTION ANSWER
sub.example.com. IN NS ns.sub.example.com.
sub.example.com. 3600 IN RRSIG NS 5 3 3600 20070926134150 20070829134150 30899 sub.example.com. wcpHeBILHfo8C9uxMhcW03gcURZeUffiKdSTb50ZjzTHgMNhRyMfpcvSpXEd9548A9UTmWKeLZChfr5Z/glONw== ;{id = 30899}
SECTION ADDITIONAL
ns.sub.example.com. IN A 1.2.3.6
ns.sub.example.com. 3600 IN RRSIG A 5 4 3600 20070926134150 20070829134150 30899 sub.example.com. UF7shD/gt1FOp2UHgLTNbPzVykklSXFMEtJ1xD+Hholwf/PIzd7zoaIttIYibNa4fUXCqMg22H9P7MRhfmFe6g== ;{id = 30899}
ENTRY_END
; response to DNSKEY priming query
; sub.example.com. 3600 IN DS 30899 RSASHA1 1 f7ed618f24d5e5202927e1d27bc2e84a141cb4b3
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
sub.example.com. IN DNSKEY
SECTION ANSWER
sub.example.com. 3600 IN DNSKEY 256 3 5 AQPQ41chR9DEHt/aIzIFAqanbDlRflJoRs5yz1jFsoRIT7dWf0r+PeDuewdxkszNH6wnU4QL8pfKFRh5PIYVBLK3 ;{id = 30899 (zsk), size = 512b}
sub.example.com. 3600 IN RRSIG DNSKEY 5 3 3600 20070926134150 20070829134150 30899 sub.example.com. uNGp99iznjD7oOX02XnQbDnbg75UwBHRvZSKYUorTKvPUnCWMHKdRsQ+mf+Fx3GZ+Fz9BVjoCmQqpnfgXLEYqw== ;{id = 30899}
SECTION AUTHORITY
sub.example.com. IN NS ns.sub.example.com.
sub.example.com. 3600 IN RRSIG NS 5 3 3600 20070926134150 20070829134150 30899 sub.example.com. wcpHeBILHfo8C9uxMhcW03gcURZeUffiKdSTb50ZjzTHgMNhRyMfpcvSpXEd9548A9UTmWKeLZChfr5Z/glONw== ;{id = 30899}
SECTION ADDITIONAL
ns.sub.example.com. IN A 1.2.3.6
ns.sub.example.com. 3600 IN RRSIG A 5 4 3600 20070926134150 20070829134150 30899 sub.example.com. UF7shD/gt1FOp2UHgLTNbPzVykklSXFMEtJ1xD+Hholwf/PIzd7zoaIttIYibNa4fUXCqMg22H9P7MRhfmFe6g== ;{id = 30899}
ENTRY_END
; response to query of interest
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
www.sub.example.com. IN A
SECTION ANSWER
www.sub.example.com. IN A 11.11.11.11
www.sub.example.com. 3600 IN RRSIG A 5 4 3600 20070926134150 20070829134150 30899 sub.example.com. 0DqqRfRtm7VSEQ4mmBbzrKRqQAay3JAE8DPDGmjtokrrjN9F1G/HxozDV7bjdIh2EChlQea8FPwf/GepJMUVxg== ;{id = 30899}
SECTION AUTHORITY
SECTION ADDITIONAL
ENTRY_END
RANGE_END
STEP 1 QUERY
ENTRY_BEGIN
REPLY RD DO
SECTION QUESTION
www.sub.example.com. IN A
ENTRY_END
; recursion happens here.
STEP 10 CHECK_ANSWER
ENTRY_BEGIN
MATCH all
REPLY QR RD RA AD NOERROR
SECTION QUESTION
www.sub.example.com. IN A
SECTION ANSWER
www.sub.example.com. 3600 IN A 11.11.11.11
www.sub.example.com. 3600 IN RRSIG A 5 4 3600 20070926134150 20070829134150 30899 sub.example.com. 0DqqRfRtm7VSEQ4mmBbzrKRqQAay3JAE8DPDGmjtokrrjN9F1G/HxozDV7bjdIh2EChlQea8FPwf/GepJMUVxg== ;{id = 30899}
SECTION AUTHORITY
SECTION ADDITIONAL
ENTRY_END
STEP 20 TIME_PASSES ELAPSE 3400
; now the key gets prefetched and has to be verified with the anchor,
; not with the key itself.
; this answer is from cache enyway.
STEP 30 QUERY
ENTRY_BEGIN
REPLY RD DO
SECTION QUESTION
sub.example.com. IN DNSKEY
ENTRY_END
STEP 40 CHECK_ANSWER
ENTRY_BEGIN
MATCH all
REPLY QR RD RA AD NOERROR
SECTION QUESTION
sub.example.com. IN DNSKEY
SECTION ANSWER
sub.example.com. 3600 IN DNSKEY 256 3 5 AQPQ41chR9DEHt/aIzIFAqanbDlRflJoRs5yz1jFsoRIT7dWf0r+PeDuewdxkszNH6wnU4QL8pfKFRh5PIYVBLK3 ;{id = 30899 (zsk), size = 512b}
sub.example.com. 3600 IN RRSIG DNSKEY 5 3 3600 20070926134150 20070829134150 30899 sub.example.com. uNGp99iznjD7oOX02XnQbDnbg75UwBHRvZSKYUorTKvPUnCWMHKdRsQ+mf+Fx3GZ+Fz9BVjoCmQqpnfgXLEYqw== ;{id = 30899}
SECTION AUTHORITY
sub.example.com. IN NS ns.sub.example.com.
sub.example.com. 3600 IN RRSIG NS 5 3 3600 20070926134150 20070829134150 30899 sub.example.com. wcpHeBILHfo8C9uxMhcW03gcURZeUffiKdSTb50ZjzTHgMNhRyMfpcvSpXEd9548A9UTmWKeLZChfr5Z/glONw== ;{id = 30899}
SECTION ADDITIONAL
ns.sub.example.com. IN A 1.2.3.6
ns.sub.example.com. 3600 IN RRSIG A 5 4 3600 20070926134150 20070829134150 30899 sub.example.com. UF7shD/gt1FOp2UHgLTNbPzVykklSXFMEtJ1xD+Hholwf/PIzd7zoaIttIYibNa4fUXCqMg22H9P7MRhfmFe6g== ;{id = 30899}
ENTRY_END
STEP 50 TRAFFIC
SCENARIO_END
dnssecjava-1.1.3/src/test/resources/unbound/val_mal_wc.rpl 0000664 0000000 0000000 00000011416 13020541473 0023714 0 ustar 00root root 0000000 0000000 ; config options
; The island of trust is at example.com
server:
trust-anchor: "example.com. 3600 IN DS 2854 3 1 46e4ffc6e9a4793b488954bd3f0cc6af0dfb201b"
val-override-date: "20070916134226"
target-fetch-policy: "0 0 0 0 0"
stub-zone:
name: "."
stub-addr: 193.0.14.129 # K.ROOT-SERVERS.NET.
CONFIG_END
SCENARIO_BEGIN Test validator with nodata, wildcards and ENT
; K.ROOT-SERVERS.NET.
RANGE_BEGIN 0 100
ADDRESS 193.0.14.129
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
. IN NS
SECTION ANSWER
. IN NS K.ROOT-SERVERS.NET.
SECTION ADDITIONAL
K.ROOT-SERVERS.NET. IN A 193.0.14.129
ENTRY_END
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
b.example.com. IN DS
SECTION AUTHORITY
com. IN NS a.gtld-servers.net.
SECTION ADDITIONAL
a.gtld-servers.net. IN A 192.5.6.30
ENTRY_END
RANGE_END
; a.gtld-servers.net.
RANGE_BEGIN 0 100
ADDRESS 192.5.6.30
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
com. IN NS
SECTION ANSWER
com. IN NS a.gtld-servers.net.
SECTION ADDITIONAL
a.gtld-servers.net. IN A 192.5.6.30
ENTRY_END
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
b.example.com. IN DS
SECTION AUTHORITY
example.com. IN NS ns.example.com.
SECTION ADDITIONAL
ns.example.com. IN A 1.2.3.4
ENTRY_END
RANGE_END
; ns.example.com.
RANGE_BEGIN 0 100
ADDRESS 1.2.3.4
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
example.com. IN NS
SECTION ANSWER
example.com. IN NS ns.example.com.
example.com. 3600 IN RRSIG NS 3 2 3600 20070926134150 20070829134150 2854 example.com. MC0CFQCN+qHdJxoI/2tNKwsb08pra/G7aAIUAWA5sDdJTbrXA1/3OaesGBAO3sI= ;{id = 2854}
SECTION ADDITIONAL
ns.example.com. IN A 1.2.3.4
ns.example.com. 3600 IN RRSIG A 3 3 3600 20070926135752 20070829135752 2854 example.com. MC0CFQCMSWxVehgOQLoYclB9PIAbNP229AIUeH0vNNGJhjnZiqgIOKvs1EhzqAo= ;{id = 2854}
ENTRY_END
; response to DNSKEY priming query
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
example.com. IN DNSKEY
SECTION ANSWER
example.com. 3600 IN DNSKEY 256 3 3 ALXLUsWqUrY3JYER3T4TBJII s70j+sDS/UT2QRp61SE7S3E EXopNXoFE73JLRmvpi/UrOO/Vz4Se 6wXv/CYCKjGw06U4WRgR YXcpEhJROyNapmdIKSx hOzfLVE1gqA0PweZR8d tY3aNQSRn3sPpwJr6Mi /PqQKAMMrZ9ckJpf1+b QMOOvxgzz2U1GS18b3y ZKcgTMEaJzd/GZYzi/B N2DzQ0MsrSwYXfsNLFO Bbs8PJMW4LYIxeeOe6rUgkWOF 7CC9Dh/dduQ1QrsJhmZAEFfd6ByYV+ ;{id = 2854 (zsk), size = 1688b}
example.com. 3600 IN RRSIG DNSKEY 3 2 3600 20070926134802 20070829134802 2854 example.com. MCwCFG1yhRNtTEa3Eno2zhVVuy2EJX3wAhQeLyUp6+UXcpC5qGNu9tkrTEgPUg== ;{id = 2854}
SECTION AUTHORITY
example.com. IN NS ns.example.com.
example.com. 3600 IN RRSIG NS 3 2 3600 20070926134150 20070829134150 2854 example.com. MC0CFQCN+qHdJxoI/2tNKwsb08pra/G7aAIUAWA5sDdJTbrXA1/3OaesGBAO3sI= ;{id = 2854}
SECTION ADDITIONAL
ns.example.com. IN A 1.2.3.4
ns.example.com. 3600 IN RRSIG A 3 3 3600 20070926135752 20070829135752 2854 example.com. MC0CFQCMSWxVehgOQLoYclB9PIAbNP229AIUeH0vNNGJhjnZiqgIOKvs1EhzqAo= ;{id = 2854}
ENTRY_END
; response to query of interest
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR AA NOERROR
SECTION QUESTION
b.example.com. IN DS
SECTION ANSWER
SECTION AUTHORITY
example.com. 86394 IN SOA NS.IANA.ORG. NSTLD.IANA.ORG. 2007092000 1800 900 604800 86400
example.com. 86394 IN RRSIG SOA 3 2 86394 20070926135752 20070829135752 2854 example.com. MCwCFFHjDbVjiPywHcXm669wMUJ7dlcoAhRfuauTUoExMSx96lTVYbBHOXtQEw== ;{id = 2854}
; note that b.example.com. is an empty nonterminal
*.example.com. 3600 IN NSEC *.b.example.com. A MX RRSIG NSEC
*.example.com. 3600 IN RRSIG NSEC 3 2 3600 20070926135752 20070829135752 2854 example.com. MCwCFE9CopvxP6w/1HqnqxNluh1Qbgk0AhRgKrdjk/YoEm4tcYflNX6McDMCgQ== ;{id = 2854}
SECTION ADDITIONAL
ENTRY_END
RANGE_END
STEP 1 QUERY
ENTRY_BEGIN
REPLY RD DO
SECTION QUESTION
b.example.com. IN DS
ENTRY_END
; recursion happens here.
STEP 10 CHECK_ANSWER
ENTRY_BEGIN
MATCH all
REPLY QR RD RA AD NOERROR
SECTION QUESTION
b.example.com. IN DS
SECTION ANSWER
SECTION AUTHORITY
example.com. 86394 IN SOA NS.IANA.ORG. NSTLD.IANA.ORG. 2007092000 1800 900 604800 86400
example.com. 86394 IN RRSIG SOA 3 2 86394 20070926135752 20070829135752 2854 example.com. MCwCFFHjDbVjiPywHcXm669wMUJ7dlcoAhRfuauTUoExMSx96lTVYbBHOXtQEw== ;{id = 2854}
*.example.com. 3600 IN NSEC *.b.example.com. A MX RRSIG NSEC
*.example.com. 3600 IN RRSIG NSEC 3 2 3600 20070926135752 20070829135752 2854 example.com. MCwCFE9CopvxP6w/1HqnqxNluh1Qbgk0AhRgKrdjk/YoEm4tcYflNX6McDMCgQ== ;{id = 2854}
SECTION ADDITIONAL
ENTRY_END
SCENARIO_END
dnssecjava-1.1.3/src/test/resources/unbound/val_negcache_ds.rpl 0000664 0000000 0000000 00000014134 13020541473 0024675 0 ustar 00root root 0000000 0000000 ; config options
; The island of trust is at example.com
server:
trust-anchor: "example.com. 3600 IN DS 2854 3 1 46e4ffc6e9a4793b488954bd3f0cc6af0dfb201b"
val-override-date: "20070916134226"
target-fetch-policy: "0 0 0 0 0"
stub-zone:
name: "."
stub-addr: 193.0.14.129 # K.ROOT-SERVERS.NET.
CONFIG_END
SCENARIO_BEGIN Test validator with negative cache DS response
; K.ROOT-SERVERS.NET.
RANGE_BEGIN 0 100
ADDRESS 193.0.14.129
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
. IN NS
SECTION ANSWER
. IN NS K.ROOT-SERVERS.NET.
SECTION ADDITIONAL
K.ROOT-SERVERS.NET. IN A 193.0.14.129
ENTRY_END
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
www.sub.example.com. IN A
SECTION AUTHORITY
com. IN NS a.gtld-servers.net.
SECTION ADDITIONAL
a.gtld-servers.net. IN A 192.5.6.30
ENTRY_END
RANGE_END
; a.gtld-servers.net.
RANGE_BEGIN 0 100
ADDRESS 192.5.6.30
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
com. IN NS
SECTION ANSWER
com. IN NS a.gtld-servers.net.
SECTION ADDITIONAL
a.gtld-servers.net. IN A 192.5.6.30
ENTRY_END
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
www.sub.example.com. IN A
SECTION AUTHORITY
example.com. IN NS ns.example.com.
SECTION ADDITIONAL
ns.example.com. IN A 1.2.3.4
ENTRY_END
RANGE_END
; ns.example.com.
RANGE_BEGIN 0 100
ADDRESS 1.2.3.4
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
example.com. IN NS
SECTION ANSWER
example.com. IN NS ns.example.com.
example.com. 3600 IN RRSIG NS 3 2 3600 20070926134150 20070829134150 2854 example.com. MC0CFQCN+qHdJxoI/2tNKwsb08pra/G7aAIUAWA5sDdJTbrXA1/3OaesGBAO3sI= ;{id = 2854}
SECTION ADDITIONAL
ns.example.com. IN A 1.2.3.4
ns.example.com. 3600 IN RRSIG A 3 3 3600 20070926135752 20070829135752 2854 example.com. MC0CFQCMSWxVehgOQLoYclB9PIAbNP229AIUeH0vNNGJhjnZiqgIOKvs1EhzqAo= ;{id = 2854}
ENTRY_END
; response to DNSKEY priming query
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
example.com. IN DNSKEY
SECTION ANSWER
example.com. 3600 IN DNSKEY 256 3 3 ALXLUsWqUrY3JYER3T4TBJII s70j+sDS/UT2QRp61SE7S3E EXopNXoFE73JLRmvpi/UrOO/Vz4Se 6wXv/CYCKjGw06U4WRgR YXcpEhJROyNapmdIKSx hOzfLVE1gqA0PweZR8d tY3aNQSRn3sPpwJr6Mi /PqQKAMMrZ9ckJpf1+b QMOOvxgzz2U1GS18b3y ZKcgTMEaJzd/GZYzi/B N2DzQ0MsrSwYXfsNLFO Bbs8PJMW4LYIxeeOe6rUgkWOF 7CC9Dh/dduQ1QrsJhmZAEFfd6ByYV+ ;{id = 2854 (zsk), size = 1688b}
example.com. 3600 IN RRSIG DNSKEY DSA 2 3600 20070926134150 20070829134150 2854 example.com. MCwCFBQRtlR4BEv9ohi+PGFjp+AHsJuHAhRCvz0shggvnvI88DFnBDCczHUcVA== ;{id = 2854}
SECTION AUTHORITY
example.com. IN NS ns.example.com.
example.com. 3600 IN RRSIG NS 3 2 3600 20070926134150 20070829134150 2854 example.com. MC0CFQCN+qHdJxoI/2tNKwsb08pra/G7aAIUAWA5sDdJTbrXA1/3OaesGBAO3sI= ;{id = 2854}
SECTION ADDITIONAL
ns.example.com. IN A 1.2.3.4
ns.example.com. 3600 IN RRSIG A 3 3 3600 20070926135752 20070829135752 2854 example.com. MC0CFQCMSWxVehgOQLoYclB9PIAbNP229AIUeH0vNNGJhjnZiqgIOKvs1EhzqAo= ;{id = 2854}
ENTRY_END
; response for delegation to sub.example.com.
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
www.sub.example.com. IN A
SECTION ANSWER
SECTION AUTHORITY
sub.example.com. IN NS ns.sub.example.com.
sub.example.com. IN NSEC www.example.com. NS RRSIG NSEC
sub.example.com. 3600 IN RRSIG NSEC 3 3 3600 20070926134150 20070829134150 2854 example.com. MCwCFDCaiDM6G+glwNW276HWdH+McmjgAhRSwF5OfimNQCqkWgnYotLOwUghKQ== ;{id = 2854}
SECTION ADDITIONAL
ns.sub.example.com. IN A 1.2.3.6
ENTRY_END
; query for missing DS record.
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
sub.example.com. IN DS
SECTION ANSWER
SECTION AUTHORITY
example.com. IN SOA ns.example.com. h.example.com. 2007090504 1800 1800 2419200 7200
example.com. 3600 IN RRSIG SOA 3 2 3600 20070926134150 20070829134150 2854 example.com. MCwCFC5uwIHSehZtetK2CMNXttSFUB0XAhROFDAgy/FaxR8zFXJzyPdpQG93Sw== ;{id = 2854}
sub.example.com. IN NSEC www.example.com. NS RRSIG NSEC
sub.example.com. 3600 IN RRSIG NSEC 3 3 3600 20070926134150 20070829134150 2854 example.com. MCwCFDCaiDM6G+glwNW276HWdH+McmjgAhRSwF5OfimNQCqkWgnYotLOwUghKQ== ;{id = 2854}
SECTION ADDITIONAL
ns.sub.example.com. IN A 1.2.3.6
ENTRY_END
RANGE_END
; ns.sub.example.com.
RANGE_BEGIN 0 100
ADDRESS 1.2.3.6
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
sub.example.com. IN NS
SECTION ANSWER
sub.example.com. IN NS ns.sub.example.com.
SECTION ADDITIONAL
ns.sub.example.com. IN A 1.2.3.6
ENTRY_END
; response to query of interest
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
www.sub.example.com. IN A
SECTION ANSWER
www.sub.example.com. IN A 11.11.11.11
SECTION AUTHORITY
SECTION ADDITIONAL
ENTRY_END
RANGE_END
STEP 1 QUERY
ENTRY_BEGIN
REPLY RD DO
SECTION QUESTION
www.sub.example.com. IN A
ENTRY_END
; recursion happens here.
STEP 10 CHECK_ANSWER
ENTRY_BEGIN
MATCH all
REPLY QR RD RA NOERROR
SECTION QUESTION
www.sub.example.com. IN A
SECTION ANSWER
www.sub.example.com. 3600 IN A 11.11.11.11
SECTION AUTHORITY
SECTION ADDITIONAL
ENTRY_END
; the downstream validator wants the DS record.
STEP 20 QUERY
ENTRY_BEGIN
REPLY RD DO
SECTION QUESTION
sub.example.com. IN DS
ENTRY_END
STEP 30 CHECK_ANSWER
ENTRY_BEGIN
MATCH all
REPLY QR RD RA AD NOERROR
SECTION QUESTION
sub.example.com. IN DS
SECTION ANSWER
SECTION AUTHORITY
example.com. IN SOA ns.example.com. h.example.com. 2007090504 1800 1800 2419200 7200
example.com. 3600 IN RRSIG SOA 3 2 3600 20070926134150 20070829134150 2854 example.com. MCwCFC5uwIHSehZtetK2CMNXttSFUB0XAhROFDAgy/FaxR8zFXJzyPdpQG93Sw== ;{id = 2854}
sub.example.com. IN NSEC www.example.com. NS RRSIG NSEC
sub.example.com. 3600 IN RRSIG NSEC 3 3 3600 20070926134150 20070829134150 2854 example.com. MCwCFDCaiDM6G+glwNW276HWdH+McmjgAhRSwF5OfimNQCqkWgnYotLOwUghKQ== ;{id = 2854}
ENTRY_END
SCENARIO_END
dnssecjava-1.1.3/src/test/resources/unbound/val_negcache_dssoa.rpl 0000664 0000000 0000000 00000017730 13020541473 0025405 0 ustar 00root root 0000000 0000000 ; config options
; The island of trust is at example.com
server:
trust-anchor: "example.com. 3600 IN DS 2854 3 1 46e4ffc6e9a4793b488954bd3f0cc6af0dfb201b"
val-override-date: "20070916134226"
target-fetch-policy: "0 0 0 0 0"
stub-zone:
name: "."
stub-addr: 193.0.14.129 # K.ROOT-SERVERS.NET.
CONFIG_END
SCENARIO_BEGIN Test validator with negative cache DS response with cached SOA
; K.ROOT-SERVERS.NET.
RANGE_BEGIN 0 100
ADDRESS 193.0.14.129
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
. IN NS
SECTION ANSWER
. IN NS K.ROOT-SERVERS.NET.
SECTION ADDITIONAL
K.ROOT-SERVERS.NET. IN A 193.0.14.129
ENTRY_END
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
www.sub.example.com. IN A
SECTION AUTHORITY
com. IN NS a.gtld-servers.net.
SECTION ADDITIONAL
a.gtld-servers.net. IN A 192.5.6.30
ENTRY_END
RANGE_END
; a.gtld-servers.net.
RANGE_BEGIN 0 100
ADDRESS 192.5.6.30
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
com. IN NS
SECTION ANSWER
com. IN NS a.gtld-servers.net.
SECTION ADDITIONAL
a.gtld-servers.net. IN A 192.5.6.30
ENTRY_END
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
www.sub.example.com. IN A
SECTION AUTHORITY
example.com. IN NS ns.example.com.
SECTION ADDITIONAL
ns.example.com. IN A 1.2.3.4
ENTRY_END
RANGE_END
; ns.example.com.
RANGE_BEGIN 0 100
ADDRESS 1.2.3.4
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
example.com. IN NS
SECTION ANSWER
example.com. IN NS ns.example.com.
example.com. 3600 IN RRSIG NS 3 2 3600 20070926134150 20070829134150 2854 example.com. MC0CFQCN+qHdJxoI/2tNKwsb08pra/G7aAIUAWA5sDdJTbrXA1/3OaesGBAO3sI= ;{id = 2854}
SECTION ADDITIONAL
ns.example.com. IN A 1.2.3.4
ns.example.com. 3600 IN RRSIG A 3 3 3600 20070926135752 20070829135752 2854 example.com. MC0CFQCMSWxVehgOQLoYclB9PIAbNP229AIUeH0vNNGJhjnZiqgIOKvs1EhzqAo= ;{id = 2854}
ENTRY_END
; response to DNSKEY priming query
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
example.com. IN DNSKEY
SECTION ANSWER
example.com. 3600 IN DNSKEY 256 3 3 ALXLUsWqUrY3JYER3T4TBJII s70j+sDS/UT2QRp61SE7S3E EXopNXoFE73JLRmvpi/UrOO/Vz4Se 6wXv/CYCKjGw06U4WRgR YXcpEhJROyNapmdIKSx hOzfLVE1gqA0PweZR8d tY3aNQSRn3sPpwJr6Mi /PqQKAMMrZ9ckJpf1+b QMOOvxgzz2U1GS18b3y ZKcgTMEaJzd/GZYzi/B N2DzQ0MsrSwYXfsNLFO Bbs8PJMW4LYIxeeOe6rUgkWOF 7CC9Dh/dduQ1QrsJhmZAEFfd6ByYV+ ;{id = 2854 (zsk), size = 1688b}
example.com. 3600 IN RRSIG DNSKEY DSA 2 3600 20070926134150 20070829134150 2854 example.com. MCwCFBQRtlR4BEv9ohi+PGFjp+AHsJuHAhRCvz0shggvnvI88DFnBDCczHUcVA== ;{id = 2854}
SECTION AUTHORITY
example.com. IN NS ns.example.com.
example.com. 3600 IN RRSIG NS 3 2 3600 20070926134150 20070829134150 2854 example.com. MC0CFQCN+qHdJxoI/2tNKwsb08pra/G7aAIUAWA5sDdJTbrXA1/3OaesGBAO3sI= ;{id = 2854}
SECTION ADDITIONAL
ns.example.com. IN A 1.2.3.4
ns.example.com. 3600 IN RRSIG A 3 3 3600 20070926135752 20070829135752 2854 example.com. MC0CFQCMSWxVehgOQLoYclB9PIAbNP229AIUeH0vNNGJhjnZiqgIOKvs1EhzqAo= ;{id = 2854}
ENTRY_END
; response for delegation to sub.example.com.
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
www.sub.example.com. IN A
SECTION ANSWER
SECTION AUTHORITY
sub.example.com. IN NS ns.sub.example.com.
sub.example.com. IN NSEC www.example.com. NS RRSIG NSEC
sub.example.com. 3600 IN RRSIG NSEC 3 3 3600 20070926134150 20070829134150 2854 example.com. MCwCFDCaiDM6G+glwNW276HWdH+McmjgAhRSwF5OfimNQCqkWgnYotLOwUghKQ== ;{id = 2854}
SECTION ADDITIONAL
ns.sub.example.com. IN A 1.2.3.6
ENTRY_END
; query for missing DS record.
; commented out, this query should not happen as negative cache works.
;ENTRY_BEGIN
;MATCH opcode qtype qname
;ADJUST copy_id
;REPLY QR NOERROR
;SECTION QUESTION
;sub.example.com. IN DS
;SECTION ANSWER
;SECTION AUTHORITY
;example.com. IN SOA ns.example.com. h.example.com. 2007090504 1800 1800 2419200 7200
;example.com. 3600 IN RRSIG SOA 3 2 3600 20070926134150 20070829134150 2854 example.com. MCwCFC5uwIHSehZtetK2CMNXttSFUB0XAhROFDAgy/FaxR8zFXJzyPdpQG93Sw== ;{id = 2854}
;sub.example.com. IN NSEC www.example.com. NS RRSIG NSEC
;sub.example.com. 3600 IN RRSIG NSEC 3 3 3600 20070926134150 20070829134150 2854 example.com. MCwCFDCaiDM6G+glwNW276HWdH+McmjgAhRSwF5OfimNQCqkWgnYotLOwUghKQ== ;{id = 2854}
;SECTION ADDITIONAL
;ns.sub.example.com. IN A 1.2.3.6
;ENTRY_END
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR AA NXDOMAIN
SECTION QUESTION
nx.example.com. IN A
SECTION AUTHORITY
example.com. 7200 IN SOA ns.example.com. h.example.com. 2007090504 1800 1800 2419200 7200
example.com. 7200 IN RRSIG SOA 3 2 3600 20070926134150 20070829134150 2854 example.com. MCwCFC5uwIHSehZtetK2CMNXttSFUB0XAhROFDAgy/FaxR8zFXJzyPdpQG93Sw== ;{id = 2854}
nw.example.com. 7200 IN NSEC ny.example.com. A RRSIG
nw.example.com. 7200 IN RRSIG NSEC 3 3 3600 20070926134150 20070829134150 2854 example.com. AHMp+sqWyR3JL6P0LhJ10fufMFSkW9+DM3QghOokyqgbRu54Q1XrHoE= ;{id = 2854}
!.example.com. 7200 IN NSEC +.example.com. A RRSIG
!.example.com. 7200 IN RRSIG NSEC 3 3 7200 20070926134150 20070829134150 2854 example.com. AJsNy2VkFTJEMShfEcvIkBe+UViVYDJbNNuGnwf/QecOrhONaVpIXy4= ;{id = 2854}
ENTRY_END
RANGE_END
; ns.sub.example.com.
RANGE_BEGIN 0 100
ADDRESS 1.2.3.6
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
sub.example.com. IN NS
SECTION ANSWER
sub.example.com. IN NS ns.sub.example.com.
SECTION ADDITIONAL
ns.sub.example.com. IN A 1.2.3.6
ENTRY_END
; response to query of interest
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
www.sub.example.com. IN A
SECTION ANSWER
www.sub.example.com. IN A 11.11.11.11
SECTION AUTHORITY
SECTION ADDITIONAL
ENTRY_END
RANGE_END
STEP 1 QUERY
ENTRY_BEGIN
REPLY RD DO
SECTION QUESTION
www.sub.example.com. IN A
ENTRY_END
; recursion happens here.
STEP 10 CHECK_ANSWER
ENTRY_BEGIN
MATCH all
REPLY QR RD RA NOERROR
SECTION QUESTION
www.sub.example.com. IN A
SECTION ANSWER
www.sub.example.com. 3600 IN A 11.11.11.11
SECTION AUTHORITY
SECTION ADDITIONAL
ENTRY_END
; put the SOA into the cache
STEP 14 QUERY
ENTRY_BEGIN
REPLY RD DO
SECTION QUESTION
nx.example.com. IN A
ENTRY_END
STEP 15 CHECK_ANSWER
ENTRY_BEGIN
MATCH all
REPLY QR RD RA AD NXDOMAIN
SECTION QUESTION
nx.example.com. IN A
SECTION ANSWER
SECTION AUTHORITY
example.com. 7200 IN SOA ns.example.com. h.example.com. 2007090504 1800 1800 2419200 7200
example.com. 7200 IN RRSIG SOA 3 2 3600 20070926134150 20070829134150 2854 example.com. MCwCFC5uwIHSehZtetK2CMNXttSFUB0XAhROFDAgy/FaxR8zFXJzyPdpQG93Sw== ;{id = 2854}
nw.example.com. 7200 IN NSEC ny.example.com. A RRSIG
nw.example.com. 7200 IN RRSIG NSEC 3 3 3600 20070926134150 20070829134150 2854 example.com. AHMp+sqWyR3JL6P0LhJ10fufMFSkW9+DM3QghOokyqgbRu54Q1XrHoE= ;{id = 2854}
!.example.com. 7200 IN NSEC +.example.com. A RRSIG
!.example.com. 7200 IN RRSIG NSEC 3 3 7200 20070926134150 20070829134150 2854 example.com. AJsNy2VkFTJEMShfEcvIkBe+UViVYDJbNNuGnwf/QecOrhONaVpIXy4= ;{id = 2854}
SECTION ADDITIONAL
ENTRY_END
; the downstream validator wants the DS record.
STEP 20 QUERY
ENTRY_BEGIN
REPLY RD DO
SECTION QUESTION
sub.example.com. IN DS
ENTRY_END
STEP 30 CHECK_ANSWER
ENTRY_BEGIN
MATCH all
REPLY QR RD RA AD NOERROR
SECTION QUESTION
sub.example.com. IN DS
SECTION ANSWER
SECTION AUTHORITY
sub.example.com. IN NSEC www.example.com. NS RRSIG NSEC
sub.example.com. 3600 IN RRSIG NSEC 3 3 3600 20070926134150 20070829134150 2854 example.com. MCwCFDCaiDM6G+glwNW276HWdH+McmjgAhRSwF5OfimNQCqkWgnYotLOwUghKQ== ;{id = 2854}
example.com. 7200 IN SOA ns.example.com. h.example.com. 2007090504 1800 1800 2419200 7200
example.com. 7200 IN RRSIG SOA 3 2 3600 20070926134150 20070829134150 2854 example.com. MCwCFC5uwIHSehZtetK2CMNXttSFUB0XAhROFDAgy/FaxR8zFXJzyPdpQG93Sw== ;{id = 2854}
ENTRY_END
SCENARIO_END
dnssecjava-1.1.3/src/test/resources/unbound/val_noadwhennodo.rpl 0000664 0000000 0000000 00000010756 13020541473 0025143 0 ustar 00root root 0000000 0000000 ; config options
; The island of trust is at example.com
server:
trust-anchor: "example.com. 3600 IN DS 2854 3 1 46e4ffc6e9a4793b488954bd3f0cc6af0dfb201b"
val-override-date: "20070916134226"
target-fetch-policy: "0 0 0 0 0"
stub-zone:
name: "."
stub-addr: 193.0.14.129 # K.ROOT-SERVERS.NET.
CONFIG_END
SCENARIO_BEGIN Test if AD bit is returned on non-DO query.
; K.ROOT-SERVERS.NET.
RANGE_BEGIN 0 100
ADDRESS 193.0.14.129
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
. IN NS
SECTION ANSWER
. IN NS K.ROOT-SERVERS.NET.
SECTION ADDITIONAL
K.ROOT-SERVERS.NET. IN A 193.0.14.129
ENTRY_END
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
www.example.com. IN A
SECTION AUTHORITY
com. IN NS a.gtld-servers.net.
SECTION ADDITIONAL
a.gtld-servers.net. IN A 192.5.6.30
ENTRY_END
RANGE_END
; a.gtld-servers.net.
RANGE_BEGIN 0 100
ADDRESS 192.5.6.30
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
com. IN NS
SECTION ANSWER
com. IN NS a.gtld-servers.net.
SECTION ADDITIONAL
a.gtld-servers.net. IN A 192.5.6.30
ENTRY_END
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
www.example.com. IN A
SECTION AUTHORITY
example.com. IN NS ns.example.com.
SECTION ADDITIONAL
ns.example.com. IN A 1.2.3.4
ENTRY_END
RANGE_END
; ns.example.com.
RANGE_BEGIN 0 100
ADDRESS 1.2.3.4
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
example.com. IN NS
SECTION ANSWER
example.com. IN NS ns.example.com.
example.com. 3600 IN RRSIG NS 3 2 3600 20070926134150 20070829134150 2854 example.com. MC0CFQCN+qHdJxoI/2tNKwsb08pra/G7aAIUAWA5sDdJTbrXA1/3OaesGBAO3sI= ;{id = 2854}
SECTION ADDITIONAL
ns.example.com. IN A 1.2.3.4
ns.example.com. 3600 IN RRSIG A 3 3 3600 20070926135752 20070829135752 2854 example.com. MC0CFQCMSWxVehgOQLoYclB9PIAbNP229AIUeH0vNNGJhjnZiqgIOKvs1EhzqAo= ;{id = 2854}
ENTRY_END
; response to DNSKEY priming query
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
example.com. IN DNSKEY
SECTION ANSWER
example.com. 3600 IN DNSKEY 256 3 3 ALXLUsWqUrY3JYER3T4TBJII s70j+sDS/UT2QRp61SE7S3E EXopNXoFE73JLRmvpi/UrOO/Vz4Se 6wXv/CYCKjGw06U4WRgR YXcpEhJROyNapmdIKSx hOzfLVE1gqA0PweZR8d tY3aNQSRn3sPpwJr6Mi /PqQKAMMrZ9ckJpf1+b QMOOvxgzz2U1GS18b3y ZKcgTMEaJzd/GZYzi/B N2DzQ0MsrSwYXfsNLFO Bbs8PJMW4LYIxeeOe6rUgkWOF 7CC9Dh/dduQ1QrsJhmZAEFfd6ByYV+ ;{id = 2854 (zsk), size = 1688b}
example.com. 3600 IN RRSIG DNSKEY 3 2 3600 20070926134802 20070829134802 2854 example.com. MCwCFG1yhRNtTEa3Eno2zhVVuy2EJX3wAhQeLyUp6+UXcpC5qGNu9tkrTEgPUg== ;{id = 2854}
SECTION AUTHORITY
example.com. IN NS ns.example.com.
example.com. 3600 IN RRSIG NS 3 2 3600 20070926134150 20070829134150 2854 example.com. MC0CFQCN+qHdJxoI/2tNKwsb08pra/G7aAIUAWA5sDdJTbrXA1/3OaesGBAO3sI= ;{id = 2854}
SECTION ADDITIONAL
ns.example.com. IN A 1.2.3.4
ns.example.com. 3600 IN RRSIG A 3 3 3600 20070926135752 20070829135752 2854 example.com. MC0CFQCMSWxVehgOQLoYclB9PIAbNP229AIUeH0vNNGJhjnZiqgIOKvs1EhzqAo= ;{id = 2854}
ENTRY_END
; response to query of interest
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
www.example.com. IN A
SECTION ANSWER
www.example.com. IN A 10.20.30.40
ns.example.com. 3600 IN RRSIG A 3 3 3600 20070926134150 20070829134150 2854 example.com. MC0CFQCQMyTjn7WWwpwAR1LlVeLpRgZGuQIUCcJDEkwAuzytTDRlYK7nIMwH1CM= ;{id = 2854}
SECTION AUTHORITY
example.com. IN NS ns.example.com.
example.com. 3600 IN RRSIG NS 3 2 3600 20070926134150 20070829134150 2854 example.com. MC0CFQCN+qHdJxoI/2tNKwsb08pra/G7aAIUAWA5sDdJTbrXA1/3OaesGBAO3sI= ;{id = 2854}
SECTION ADDITIONAL
ns.example.com. IN A 1.2.3.4
www.example.com. 3600 IN RRSIG A 3 3 3600 20070926134150 20070829134150 2854 example.com. MC0CFC99iE9K5y2WNgI0gFvBWaTi9wm6AhUAoUqOpDtG5Zct+Qr9F3mSdnbc6V4= ;{id = 2854}
ENTRY_END
RANGE_END
STEP 1 QUERY
ENTRY_BEGIN
REPLY RD
SECTION QUESTION
www.example.com. IN A
ENTRY_END
; recursion happens here.
; it is validated, but no AD bit, because no AD was requested.
; (this is a copy of val_positive.rpl).
STEP 10 CHECK_ANSWER
ENTRY_BEGIN
MATCH all
REPLY QR RD RA NOERROR
SECTION QUESTION
www.example.com. IN A
SECTION ANSWER
www.example.com. IN A 10.20.30.40
SECTION AUTHORITY
example.com. IN NS ns.example.com.
SECTION ADDITIONAL
ns.example.com. IN A 1.2.3.4
ENTRY_END
SCENARIO_END
dnssecjava-1.1.3/src/test/resources/unbound/val_nodata.rpl 0000664 0000000 0000000 00000010727 13020541473 0023724 0 ustar 00root root 0000000 0000000 ; config options
; The island of trust is at example.com
server:
trust-anchor: "example.com. 3600 IN DS 2854 3 1 46e4ffc6e9a4793b488954bd3f0cc6af0dfb201b"
val-override-date: "20070916134226"
target-fetch-policy: "0 0 0 0 0"
stub-zone:
name: "."
stub-addr: 193.0.14.129 # K.ROOT-SERVERS.NET.
CONFIG_END
SCENARIO_BEGIN Test validator with nodata response
; K.ROOT-SERVERS.NET.
RANGE_BEGIN 0 100
ADDRESS 193.0.14.129
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
. IN NS
SECTION ANSWER
. IN NS K.ROOT-SERVERS.NET.
SECTION ADDITIONAL
K.ROOT-SERVERS.NET. IN A 193.0.14.129
ENTRY_END
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
www.example.com. IN A
SECTION AUTHORITY
com. IN NS a.gtld-servers.net.
SECTION ADDITIONAL
a.gtld-servers.net. IN A 192.5.6.30
ENTRY_END
RANGE_END
; a.gtld-servers.net.
RANGE_BEGIN 0 100
ADDRESS 192.5.6.30
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
com. IN NS
SECTION ANSWER
com. IN NS a.gtld-servers.net.
SECTION ADDITIONAL
a.gtld-servers.net. IN A 192.5.6.30
ENTRY_END
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
www.example.com. IN A
SECTION AUTHORITY
example.com. IN NS ns.example.com.
SECTION ADDITIONAL
ns.example.com. IN A 1.2.3.4
ENTRY_END
RANGE_END
; ns.example.com.
RANGE_BEGIN 0 100
ADDRESS 1.2.3.4
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
example.com. IN NS
SECTION ANSWER
example.com. IN NS ns.example.com.
example.com. 3600 IN RRSIG NS 3 2 3600 20070926134150 20070829134150 2854 example.com. MC0CFQCN+qHdJxoI/2tNKwsb08pra/G7aAIUAWA5sDdJTbrXA1/3OaesGBAO3sI= ;{id = 2854}
SECTION ADDITIONAL
ns.example.com. IN A 1.2.3.4
ns.example.com. 3600 IN RRSIG A 3 3 3600 20070926135752 20070829135752 2854 example.com. MC0CFQCMSWxVehgOQLoYclB9PIAbNP229AIUeH0vNNGJhjnZiqgIOKvs1EhzqAo= ;{id = 2854}
ENTRY_END
; response to DNSKEY priming query
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
example.com. IN DNSKEY
SECTION ANSWER
example.com. 3600 IN DNSKEY 256 3 3 ALXLUsWqUrY3JYER3T4TBJII s70j+sDS/UT2QRp61SE7S3E EXopNXoFE73JLRmvpi/UrOO/Vz4Se 6wXv/CYCKjGw06U4WRgR YXcpEhJROyNapmdIKSx hOzfLVE1gqA0PweZR8d tY3aNQSRn3sPpwJr6Mi /PqQKAMMrZ9ckJpf1+b QMOOvxgzz2U1GS18b3y ZKcgTMEaJzd/GZYzi/B N2DzQ0MsrSwYXfsNLFO Bbs8PJMW4LYIxeeOe6rUgkWOF 7CC9Dh/dduQ1QrsJhmZAEFfd6ByYV+ ;{id = 2854 (zsk), size = 1688b}
example.com. 3600 IN RRSIG DNSKEY 3 2 3600 20070926134802 20070829134802 2854 example.com. MCwCFG1yhRNtTEa3Eno2zhVVuy2EJX3wAhQeLyUp6+UXcpC5qGNu9tkrTEgPUg== ;{id = 2854}
SECTION AUTHORITY
example.com. IN NS ns.example.com.
example.com. 3600 IN RRSIG NS 3 2 3600 20070926134150 20070829134150 2854 example.com. MC0CFQCN+qHdJxoI/2tNKwsb08pra/G7aAIUAWA5sDdJTbrXA1/3OaesGBAO3sI= ;{id = 2854}
SECTION ADDITIONAL
ns.example.com. IN A 1.2.3.4
ns.example.com. 3600 IN RRSIG A 3 3 3600 20070926135752 20070829135752 2854 example.com. MC0CFQCMSWxVehgOQLoYclB9PIAbNP229AIUeH0vNNGJhjnZiqgIOKvs1EhzqAo= ;{id = 2854}
ENTRY_END
; response to query of interest
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
www.example.com. IN A
SECTION ANSWER
SECTION AUTHORITY
; SOA record is missing in reply.
; Denies A, note this is the end of the NSEC chain.
www.example.com. IN NSEC example.com. RRSIG NSEC
www.example.com. 3600 IN RRSIG NSEC 3 3 3600 20070926135752 20070829135752 2854 example.com. MC0CFQCreYgWjFPE/E47n+KUp6vAPIfS4gIUaof1QcUQeIcsxVi1/M73CuHVwEc= ;{id = 2854}
; Denies wildcard
;example.com. IN NSEC ns.example.com. NS SOA RRSIG NSEC DNSKEY
;example.com. 3600 IN RRSIG NSEC 3 2 3600 20070926135752 20070829135752 2854 example.com. MCwCFGlz/gvGdVxEo3Kpr+MijEGCZgwaAhRU7qbF13vmCVgR8dFw7LQFKopV6w== ;{id = 2854}
SECTION ADDITIONAL
ENTRY_END
RANGE_END
STEP 1 QUERY
ENTRY_BEGIN
REPLY RD DO
SECTION QUESTION
www.example.com. IN A
ENTRY_END
; recursion happens here.
STEP 10 CHECK_ANSWER
ENTRY_BEGIN
MATCH all
REPLY QR RD RA AD NOERROR
SECTION QUESTION
www.example.com. IN A
SECTION ANSWER
SECTION AUTHORITY
www.example.com. IN NSEC example.com. RRSIG NSEC
www.example.com. 3600 IN RRSIG NSEC 3 3 3600 20070926135752 20070829135752 2854 example.com. MC0CFQCreYgWjFPE/E47n+KUp6vAPIfS4gIUaof1QcUQeIcsxVi1/M73CuHVwEc= ;{id = 2854}
SECTION ADDITIONAL
ENTRY_END
SCENARIO_END
dnssecjava-1.1.3/src/test/resources/unbound/val_nodata_ent.rpl 0000664 0000000 0000000 00000012323 13020541473 0024564 0 ustar 00root root 0000000 0000000 ; config options
; The island of trust is at example.com
server:
trust-anchor: "example.com. 3600 IN DS 2854 3 1 46e4ffc6e9a4793b488954bd3f0cc6af0dfb201b"
val-override-date: "20070916134226"
target-fetch-policy: "0 0 0 0 0"
stub-zone:
name: "."
stub-addr: 193.0.14.129 # K.ROOT-SERVERS.NET.
CONFIG_END
SCENARIO_BEGIN Test validator with nodata on empty nonterminal response
; K.ROOT-SERVERS.NET.
RANGE_BEGIN 0 100
ADDRESS 193.0.14.129
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
. IN NS
SECTION ANSWER
. IN NS K.ROOT-SERVERS.NET.
SECTION ADDITIONAL
K.ROOT-SERVERS.NET. IN A 193.0.14.129
ENTRY_END
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
www.example.com. IN A
SECTION AUTHORITY
com. IN NS a.gtld-servers.net.
SECTION ADDITIONAL
a.gtld-servers.net. IN A 192.5.6.30
ENTRY_END
RANGE_END
; a.gtld-servers.net.
RANGE_BEGIN 0 100
ADDRESS 192.5.6.30
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
com. IN NS
SECTION ANSWER
com. IN NS a.gtld-servers.net.
SECTION ADDITIONAL
a.gtld-servers.net. IN A 192.5.6.30
ENTRY_END
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
www.example.com. IN A
SECTION AUTHORITY
example.com. IN NS ns.example.com.
SECTION ADDITIONAL
ns.example.com. IN A 1.2.3.4
ENTRY_END
RANGE_END
; ns.example.com.
RANGE_BEGIN 0 100
ADDRESS 1.2.3.4
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
example.com. IN NS
SECTION ANSWER
example.com. IN NS ns.example.com.
example.com. 3600 IN RRSIG NS 3 2 3600 20070926134150 20070829134150 2854 example.com. MC0CFQCN+qHdJxoI/2tNKwsb08pra/G7aAIUAWA5sDdJTbrXA1/3OaesGBAO3sI= ;{id = 2854}
SECTION ADDITIONAL
ns.example.com. IN A 1.2.3.4
ns.example.com. 3600 IN RRSIG A 3 3 3600 20070926135752 20070829135752 2854 example.com. MC0CFQCMSWxVehgOQLoYclB9PIAbNP229AIUeH0vNNGJhjnZiqgIOKvs1EhzqAo= ;{id = 2854}
ENTRY_END
; response to DNSKEY priming query
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
example.com. IN DNSKEY
SECTION ANSWER
example.com. 3600 IN DNSKEY 256 3 3 ALXLUsWqUrY3JYER3T4TBJII s70j+sDS/UT2QRp61SE7S3E EXopNXoFE73JLRmvpi/UrOO/Vz4Se 6wXv/CYCKjGw06U4WRgR YXcpEhJROyNapmdIKSx hOzfLVE1gqA0PweZR8d tY3aNQSRn3sPpwJr6Mi /PqQKAMMrZ9ckJpf1+b QMOOvxgzz2U1GS18b3y ZKcgTMEaJzd/GZYzi/B N2DzQ0MsrSwYXfsNLFO Bbs8PJMW4LYIxeeOe6rUgkWOF 7CC9Dh/dduQ1QrsJhmZAEFfd6ByYV+ ;{id = 2854 (zsk), size = 1688b}
example.com. 3600 IN RRSIG DNSKEY 3 2 3600 20070926134802 20070829134802 2854 example.com. MCwCFG1yhRNtTEa3Eno2zhVVuy2EJX3wAhQeLyUp6+UXcpC5qGNu9tkrTEgPUg== ;{id = 2854}
SECTION AUTHORITY
example.com. IN NS ns.example.com.
example.com. 3600 IN RRSIG NS 3 2 3600 20070926134150 20070829134150 2854 example.com. MC0CFQCN+qHdJxoI/2tNKwsb08pra/G7aAIUAWA5sDdJTbrXA1/3OaesGBAO3sI= ;{id = 2854}
SECTION ADDITIONAL
ns.example.com. IN A 1.2.3.4
ns.example.com. 3600 IN RRSIG A 3 3 3600 20070926135752 20070829135752 2854 example.com. MC0CFQCMSWxVehgOQLoYclB9PIAbNP229AIUeH0vNNGJhjnZiqgIOKvs1EhzqAo= ;{id = 2854}
ENTRY_END
; response to query of interest
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
www.example.com. IN A
SECTION ANSWER
SECTION AUTHORITY
example.com. IN SOA ns.example.com. h.example.com. 2007090504 1800 1800 2419200 7200
example.com. 3600 IN RRSIG SOA 3 2 3600 20070926134150 20070829134150 2854 example.com. MCwCFC5uwIHSehZtetK2CMNXttSFUB0XAhROFDAgy/FaxR8zFXJzyPdpQG93Sw== ;{id = 2854}
; Denies A, note this is the end of the NSEC chain.
u.example.com. IN NSEC y.www.example.com. RRSIG NSEC
u.example.com. 3600 IN RRSIG NSEC 3 3 3600 20070926134150 20070829134150 2854 example.com. MC0CFQCvUG2P/8Q8b02C6agrgtJX4YfBbwIUaF/fIuS4OFmGVNkFzgiLAkpze3M= ;{id = 2854}
; Denies wildcard
example.com. IN NSEC ns.example.com. NS SOA RRSIG NSEC DNSKEY
example.com. 3600 IN RRSIG NSEC 3 2 3600 20070926135752 20070829135752 2854 example.com. MCwCFGlz/gvGdVxEo3Kpr+MijEGCZgwaAhRU7qbF13vmCVgR8dFw7LQFKopV6w== ;{id = 2854}
SECTION ADDITIONAL
ENTRY_END
RANGE_END
STEP 1 QUERY
ENTRY_BEGIN
REPLY RD DO
SECTION QUESTION
www.example.com. IN A
ENTRY_END
; recursion happens here.
STEP 10 CHECK_ANSWER
ENTRY_BEGIN
MATCH all
REPLY QR RD RA AD NOERROR
SECTION QUESTION
www.example.com. IN A
SECTION ANSWER
SECTION AUTHORITY
example.com. IN SOA ns.example.com. h.example.com. 2007090504 1800 1800 2419200 7200
example.com. 3600 IN RRSIG SOA 3 2 3600 20070926134150 20070829134150 2854 example.com. MCwCFC5uwIHSehZtetK2CMNXttSFUB0XAhROFDAgy/FaxR8zFXJzyPdpQG93Sw== ;{id = 2854}
u.example.com. IN NSEC y.www.example.com. RRSIG NSEC
u.example.com. 3600 IN RRSIG NSEC 3 3 3600 20070926134150 20070829134150 2854 example.com. MC0CFQCvUG2P/8Q8b02C6agrgtJX4YfBbwIUaF/fIuS4OFmGVNkFzgiLAkpze3M= ;{id = 2854}
example.com. IN NSEC ns.example.com. NS SOA RRSIG NSEC DNSKEY
example.com. 3600 IN RRSIG NSEC 3 2 3600 20070926135752 20070829135752 2854 example.com. MCwCFGlz/gvGdVxEo3Kpr+MijEGCZgwaAhRU7qbF13vmCVgR8dFw7LQFKopV6w== ;{id = 2854}
SECTION ADDITIONAL
ENTRY_END
SCENARIO_END
dnssecjava-1.1.3/src/test/resources/unbound/val_nodata_entwc.rpl 0000664 0000000 0000000 00000012360 13020541473 0025117 0 ustar 00root root 0000000 0000000 ; config options
; The island of trust is at example.com
server:
trust-anchor: "example.com. 3600 IN DS 2854 3 1 46e4ffc6e9a4793b488954bd3f0cc6af0dfb201b"
val-override-date: "20070916134226"
target-fetch-policy: "0 0 0 0 0"
stub-zone:
name: "."
stub-addr: 193.0.14.129 # K.ROOT-SERVERS.NET.
CONFIG_END
SCENARIO_BEGIN Test validator with wildcard nodata on empty nonterminal response
; K.ROOT-SERVERS.NET.
RANGE_BEGIN 0 100
ADDRESS 193.0.14.129
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
. IN NS
SECTION ANSWER
. IN NS K.ROOT-SERVERS.NET.
SECTION ADDITIONAL
K.ROOT-SERVERS.NET. IN A 193.0.14.129
ENTRY_END
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
www.example.com. IN A
SECTION AUTHORITY
com. IN NS a.gtld-servers.net.
SECTION ADDITIONAL
a.gtld-servers.net. IN A 192.5.6.30
ENTRY_END
RANGE_END
; a.gtld-servers.net.
RANGE_BEGIN 0 100
ADDRESS 192.5.6.30
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
com. IN NS
SECTION ANSWER
com. IN NS a.gtld-servers.net.
SECTION ADDITIONAL
a.gtld-servers.net. IN A 192.5.6.30
ENTRY_END
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
www.example.com. IN A
SECTION AUTHORITY
example.com. IN NS ns.example.com.
SECTION ADDITIONAL
ns.example.com. IN A 1.2.3.4
ENTRY_END
RANGE_END
; ns.example.com.
RANGE_BEGIN 0 100
ADDRESS 1.2.3.4
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
example.com. IN NS
SECTION ANSWER
example.com. IN NS ns.example.com.
example.com. 3600 IN RRSIG NS 3 2 3600 20070926134150 20070829134150 2854 example.com. MC0CFQCN+qHdJxoI/2tNKwsb08pra/G7aAIUAWA5sDdJTbrXA1/3OaesGBAO3sI= ;{id = 2854}
SECTION ADDITIONAL
ns.example.com. IN A 1.2.3.4
ns.example.com. 3600 IN RRSIG A 3 3 3600 20070926135752 20070829135752 2854 example.com. MC0CFQCMSWxVehgOQLoYclB9PIAbNP229AIUeH0vNNGJhjnZiqgIOKvs1EhzqAo= ;{id = 2854}
ENTRY_END
; response to DNSKEY priming query
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
example.com. IN DNSKEY
SECTION ANSWER
example.com. 3600 IN DNSKEY 256 3 3 ALXLUsWqUrY3JYER3T4TBJII s70j+sDS/UT2QRp61SE7S3E EXopNXoFE73JLRmvpi/UrOO/Vz4Se 6wXv/CYCKjGw06U4WRgR YXcpEhJROyNapmdIKSx hOzfLVE1gqA0PweZR8d tY3aNQSRn3sPpwJr6Mi /PqQKAMMrZ9ckJpf1+b QMOOvxgzz2U1GS18b3y ZKcgTMEaJzd/GZYzi/B N2DzQ0MsrSwYXfsNLFO Bbs8PJMW4LYIxeeOe6rUgkWOF 7CC9Dh/dduQ1QrsJhmZAEFfd6ByYV+ ;{id = 2854 (zsk), size = 1688b}
example.com. 3600 IN RRSIG DNSKEY 3 2 3600 20070926134802 20070829134802 2854 example.com. MCwCFG1yhRNtTEa3Eno2zhVVuy2EJX3wAhQeLyUp6+UXcpC5qGNu9tkrTEgPUg== ;{id = 2854}
SECTION AUTHORITY
example.com. IN NS ns.example.com.
example.com. 3600 IN RRSIG NS 3 2 3600 20070926134150 20070829134150 2854 example.com. MC0CFQCN+qHdJxoI/2tNKwsb08pra/G7aAIUAWA5sDdJTbrXA1/3OaesGBAO3sI= ;{id = 2854}
SECTION ADDITIONAL
ns.example.com. IN A 1.2.3.4
ns.example.com. 3600 IN RRSIG A 3 3 3600 20070926135752 20070829135752 2854 example.com. MC0CFQCMSWxVehgOQLoYclB9PIAbNP229AIUeH0vNNGJhjnZiqgIOKvs1EhzqAo= ;{id = 2854}
ENTRY_END
; response to query of interest
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
www.example.com. IN A
SECTION ANSWER
SECTION AUTHORITY
example.com. IN SOA ns.example.com. h.example.com. 2007090504 1800 1800 2419200 7200
example.com. 3600 IN RRSIG SOA 3 2 3600 20070926134150 20070829134150 2854 example.com. MCwCFC5uwIHSehZtetK2CMNXttSFUB0XAhROFDAgy/FaxR8zFXJzyPdpQG93Sw== ;{id = 2854}
; Denies A, note this is the end of the NSEC chain.
*.u.example.com. IN NSEC y.www.example.com. RRSIG NSEC
*.u.example.com. 3600 IN RRSIG NSEC 3 3 3600 20070926134150 20070829134150 2854 example.com. MCwCFEiVqFPbtbpIh8NrE/YjNCDPFYZgAhR9/9SDX2lwxckJZR299JcRRsjnqw== ;{id = 2854}
; Denies wildcard
example.com. IN NSEC ns.example.com. NS SOA RRSIG NSEC DNSKEY
example.com. 3600 IN RRSIG NSEC 3 2 3600 20070926135752 20070829135752 2854 example.com. MCwCFGlz/gvGdVxEo3Kpr+MijEGCZgwaAhRU7qbF13vmCVgR8dFw7LQFKopV6w== ;{id = 2854}
SECTION ADDITIONAL
ENTRY_END
RANGE_END
STEP 1 QUERY
ENTRY_BEGIN
REPLY RD DO
SECTION QUESTION
www.example.com. IN A
ENTRY_END
; recursion happens here.
STEP 10 CHECK_ANSWER
ENTRY_BEGIN
MATCH all
REPLY QR RD RA AD NOERROR
SECTION QUESTION
www.example.com. IN A
SECTION ANSWER
SECTION AUTHORITY
example.com. IN SOA ns.example.com. h.example.com. 2007090504 1800 1800 2419200 7200
example.com. 3600 IN RRSIG SOA 3 2 3600 20070926134150 20070829134150 2854 example.com. MCwCFC5uwIHSehZtetK2CMNXttSFUB0XAhROFDAgy/FaxR8zFXJzyPdpQG93Sw== ;{id = 2854}
*.u.example.com. IN NSEC y.www.example.com. RRSIG NSEC
*.u.example.com. 3600 IN RRSIG NSEC 3 3 3600 20070926134150 20070829134150 2854 example.com. MCwCFEiVqFPbtbpIh8NrE/YjNCDPFYZgAhR9/9SDX2lwxckJZR299JcRRsjnqw== ;{id = 2854}
example.com. IN NSEC ns.example.com. NS SOA RRSIG NSEC DNSKEY
example.com. 3600 IN RRSIG NSEC 3 2 3600 20070926135752 20070829135752 2854 example.com. MCwCFGlz/gvGdVxEo3Kpr+MijEGCZgwaAhRU7qbF13vmCVgR8dFw7LQFKopV6w== ;{id = 2854}
SECTION ADDITIONAL
ENTRY_END
SCENARIO_END
dnssecjava-1.1.3/src/test/resources/unbound/val_nodata_failsig.rpl 0000664 0000000 0000000 00000010761 13020541473 0025420 0 ustar 00root root 0000000 0000000 ; config options
; The island of trust is at example.com
server:
trust-anchor: "example.com. 3600 IN DS 2854 3 1 46e4ffc6e9a4793b488954bd3f0cc6af0dfb201b"
val-override-date: "20070916134226"
target-fetch-policy: "0 0 0 0 0"
stub-zone:
name: "."
stub-addr: 193.0.14.129 # K.ROOT-SERVERS.NET.
CONFIG_END
SCENARIO_BEGIN Test validator with nodata response with bogus RRSIG
; K.ROOT-SERVERS.NET.
RANGE_BEGIN 0 100
ADDRESS 193.0.14.129
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
. IN NS
SECTION ANSWER
. IN NS K.ROOT-SERVERS.NET.
SECTION ADDITIONAL
K.ROOT-SERVERS.NET. IN A 193.0.14.129
ENTRY_END
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
www.example.com. IN A
SECTION AUTHORITY
com. IN NS a.gtld-servers.net.
SECTION ADDITIONAL
a.gtld-servers.net. IN A 192.5.6.30
ENTRY_END
RANGE_END
; a.gtld-servers.net.
RANGE_BEGIN 0 100
ADDRESS 192.5.6.30
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
com. IN NS
SECTION ANSWER
com. IN NS a.gtld-servers.net.
SECTION ADDITIONAL
a.gtld-servers.net. IN A 192.5.6.30
ENTRY_END
ENTRY_BEGIN
MATCH opcode subdomain
ADJUST copy_id copy_query
REPLY QR NOERROR
SECTION QUESTION
example.com. IN A
SECTION AUTHORITY
example.com. IN NS ns.example.com.
SECTION ADDITIONAL
ns.example.com. IN A 1.2.3.4
ENTRY_END
RANGE_END
; ns.example.com.
RANGE_BEGIN 0 100
ADDRESS 1.2.3.4
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR AA REFUSED
SECTION QUESTION
ns.example.com. IN A
ENTRY_END
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR AA REFUSED
SECTION QUESTION
ns.example.com. IN AAAA
ENTRY_END
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
example.com. IN NS
SECTION ANSWER
example.com. IN NS ns.example.com.
example.com. 3600 IN RRSIG NS 3 2 3600 20070926134150 20070829134150 2854 example.com. MC0CFQCN+qHdJxoI/2tNKwsb08pra/G7aAIUAWA5sDdJTbrXA1/3OaesGBAO3sI= ;{id = 2854}
SECTION ADDITIONAL
ns.example.com. IN A 1.2.3.4
ns.example.com. 3600 IN RRSIG A 3 3 3600 20070926135752 20070829135752 2854 example.com. MC0CFQCMSWxVehgOQLoYclB9PIAbNP229AIUeH0vNNGJhjnZiqgIOKvs1EhzqAo= ;{id = 2854}
ENTRY_END
; response to DNSKEY priming query
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
example.com. IN DNSKEY
SECTION ANSWER
example.com. 3600 IN DNSKEY 256 3 3 ALXLUsWqUrY3JYER3T4TBJII s70j+sDS/UT2QRp61SE7S3E EXopNXoFE73JLRmvpi/UrOO/Vz4Se 6wXv/CYCKjGw06U4WRgR YXcpEhJROyNapmdIKSx hOzfLVE1gqA0PweZR8d tY3aNQSRn3sPpwJr6Mi /PqQKAMMrZ9ckJpf1+b QMOOvxgzz2U1GS18b3y ZKcgTMEaJzd/GZYzi/B N2DzQ0MsrSwYXfsNLFO Bbs8PJMW4LYIxeeOe6rUgkWOF 7CC9Dh/dduQ1QrsJhmZAEFfd6ByYV+ ;{id = 2854 (zsk), size = 1688b}
example.com. 3600 IN RRSIG DNSKEY 3 2 3600 20070926134802 20070829134802 2854 example.com. MCwCFG1yhRNtTEa3Eno2zhVVuy2EJX3wAhQeLyUp6+UXcpC5qGNu9tkrTEgPUg== ;{id = 2854}
SECTION AUTHORITY
example.com. IN NS ns.example.com.
example.com. 3600 IN RRSIG NS 3 2 3600 20070926134150 20070829134150 2854 example.com. MC0CFQCN+qHdJxoI/2tNKwsb08pra/G7aAIUAWA5sDdJTbrXA1/3OaesGBAO3sI= ;{id = 2854}
SECTION ADDITIONAL
ns.example.com. IN A 1.2.3.4
ns.example.com. 3600 IN RRSIG A 3 3 3600 20070926135752 20070829135752 2854 example.com. MC0CFQCMSWxVehgOQLoYclB9PIAbNP229AIUeH0vNNGJhjnZiqgIOKvs1EhzqAo= ;{id = 2854}
ENTRY_END
; response to query of interest
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
www.example.com. IN A
SECTION ANSWER
SECTION AUTHORITY
; SOA record is missing in reply.
; Denies A, note this is the end of the NSEC chain.
www.example.com. IN NSEC example.com. RRSIG NSEC
www.example.com. 3600 IN RRSIG NSEC 3 3 3600 20070926135752 20070829135752 2854 example.com. MC0CFDA8yqBITvLruoQjn/eqjYjwCwySAhUAk5/f3H1HKMsvM+spmmswwFtndyY= ;{id = 2854}
; Denies wildcard
example.com. IN NSEC ns.example.com. NS SOA RRSIG NSEC DNSKEY
example.com. 3600 IN RRSIG NSEC 3 2 3600 20070926135752 20070829135752 2854 example.com. MCwCFGlz/gvGdVxEo3Kpr+MijEGCZgwaAhRU7qbF13vmCVgR8dFw7LQFKopV6w== ;{id = 2854}
SECTION ADDITIONAL
ENTRY_END
RANGE_END
STEP 1 QUERY
ENTRY_BEGIN
REPLY RD DO
SECTION QUESTION
www.example.com. IN A
ENTRY_END
; recursion happens here.
STEP 10 CHECK_ANSWER
ENTRY_BEGIN
MATCH all
REPLY QR RD RA SERVFAIL
SECTION QUESTION
www.example.com. IN A
SECTION ANSWER
SECTION AUTHORITY
SECTION ADDITIONAL
ENTRY_END
SCENARIO_END
dnssecjava-1.1.3/src/test/resources/unbound/val_nodata_hasdata.rpl 0000664 0000000 0000000 00000010766 13020541473 0025414 0 ustar 00root root 0000000 0000000 ; config options
; The island of trust is at example.com
server:
trust-anchor: "example.com. 3600 IN DS 2854 3 1 46e4ffc6e9a4793b488954bd3f0cc6af0dfb201b"
val-override-date: "20070916134226"
target-fetch-policy: "0 0 0 0 0"
stub-zone:
name: "."
stub-addr: 193.0.14.129 # K.ROOT-SERVERS.NET.
CONFIG_END
SCENARIO_BEGIN Test validator with nodata response, that proves the data.
; K.ROOT-SERVERS.NET.
RANGE_BEGIN 0 100
ADDRESS 193.0.14.129
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
. IN NS
SECTION ANSWER
. IN NS K.ROOT-SERVERS.NET.
SECTION ADDITIONAL
K.ROOT-SERVERS.NET. IN A 193.0.14.129
ENTRY_END
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
www.example.com. IN A
SECTION AUTHORITY
com. IN NS a.gtld-servers.net.
SECTION ADDITIONAL
a.gtld-servers.net. IN A 192.5.6.30
ENTRY_END
RANGE_END
; a.gtld-servers.net.
RANGE_BEGIN 0 100
ADDRESS 192.5.6.30
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
com. IN NS
SECTION ANSWER
com. IN NS a.gtld-servers.net.
SECTION ADDITIONAL
a.gtld-servers.net. IN A 192.5.6.30
ENTRY_END
ENTRY_BEGIN
MATCH opcode subdomain
ADJUST copy_id copy_query
REPLY QR NOERROR
SECTION QUESTION
example.com. IN A
SECTION AUTHORITY
example.com. IN NS ns.example.com.
SECTION ADDITIONAL
ns.example.com. IN A 1.2.3.4
ENTRY_END
RANGE_END
; ns.example.com.
RANGE_BEGIN 0 100
ADDRESS 1.2.3.4
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR AA REFUSED
SECTION QUESTION
ns.example.com. IN A
ENTRY_END
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR AA REFUSED
SECTION QUESTION
ns.example.com. IN AAAA
ENTRY_END
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
example.com. IN NS
SECTION ANSWER
example.com. IN NS ns.example.com.
example.com. 3600 IN RRSIG NS 3 2 3600 20070926134150 20070829134150 2854 example.com. MC0CFQCN+qHdJxoI/2tNKwsb08pra/G7aAIUAWA5sDdJTbrXA1/3OaesGBAO3sI= ;{id = 2854}
SECTION ADDITIONAL
ns.example.com. IN A 1.2.3.4
ns.example.com. 3600 IN RRSIG A 3 3 3600 20070926135752 20070829135752 2854 example.com. MC0CFQCMSWxVehgOQLoYclB9PIAbNP229AIUeH0vNNGJhjnZiqgIOKvs1EhzqAo= ;{id = 2854}
ENTRY_END
; response to DNSKEY priming query
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
example.com. IN DNSKEY
SECTION ANSWER
example.com. 3600 IN DNSKEY 256 3 3 ALXLUsWqUrY3JYER3T4TBJII s70j+sDS/UT2QRp61SE7S3E EXopNXoFE73JLRmvpi/UrOO/Vz4Se 6wXv/CYCKjGw06U4WRgR YXcpEhJROyNapmdIKSx hOzfLVE1gqA0PweZR8d tY3aNQSRn3sPpwJr6Mi /PqQKAMMrZ9ckJpf1+b QMOOvxgzz2U1GS18b3y ZKcgTMEaJzd/GZYzi/B N2DzQ0MsrSwYXfsNLFO Bbs8PJMW4LYIxeeOe6rUgkWOF 7CC9Dh/dduQ1QrsJhmZAEFfd6ByYV+ ;{id = 2854 (zsk), size = 1688b}
example.com. 3600 IN RRSIG DNSKEY 3 2 3600 20070926134802 20070829134802 2854 example.com. MCwCFG1yhRNtTEa3Eno2zhVVuy2EJX3wAhQeLyUp6+UXcpC5qGNu9tkrTEgPUg== ;{id = 2854}
SECTION AUTHORITY
example.com. IN NS ns.example.com.
example.com. 3600 IN RRSIG NS 3 2 3600 20070926134150 20070829134150 2854 example.com. MC0CFQCN+qHdJxoI/2tNKwsb08pra/G7aAIUAWA5sDdJTbrXA1/3OaesGBAO3sI= ;{id = 2854}
SECTION ADDITIONAL
ns.example.com. IN A 1.2.3.4
ns.example.com. 3600 IN RRSIG A 3 3 3600 20070926135752 20070829135752 2854 example.com. MC0CFQCMSWxVehgOQLoYclB9PIAbNP229AIUeH0vNNGJhjnZiqgIOKvs1EhzqAo= ;{id = 2854}
ENTRY_END
; response to query of interest
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
www.example.com. IN A
SECTION ANSWER
SECTION AUTHORITY
; SOA record is missing in reply.
; Denies A, note this is the end of the NSEC chain.
www.example.com. IN NSEC example.com. A RRSIG NSEC
www.example.com. 3600 IN RRSIG NSEC 3 3 3600 20070926135752 20070829135752 2854 example.com. MC0CFDA8yqBITvLruoQjn/eqjYjwCwySAhUAk5/f3H1HKMsvM+spmmswwFtndyY= ;{id = 2854}
; Denies wildcard
example.com. IN NSEC ns.example.com. NS SOA RRSIG NSEC DNSKEY
example.com. 3600 IN RRSIG NSEC 3 2 3600 20070926135752 20070829135752 2854 example.com. MCwCFGlz/gvGdVxEo3Kpr+MijEGCZgwaAhRU7qbF13vmCVgR8dFw7LQFKopV6w== ;{id = 2854}
SECTION ADDITIONAL
ENTRY_END
RANGE_END
STEP 1 QUERY
ENTRY_BEGIN
REPLY RD
SECTION QUESTION
www.example.com. IN A
ENTRY_END
; recursion happens here.
STEP 10 CHECK_ANSWER
ENTRY_BEGIN
MATCH all
REPLY QR RD RA SERVFAIL
SECTION QUESTION
www.example.com. IN A
SECTION ANSWER
SECTION AUTHORITY
SECTION ADDITIONAL
ENTRY_END
SCENARIO_END
dnssecjava-1.1.3/src/test/resources/unbound/val_nodata_zonecut.rpl 0000664 0000000 0000000 00000010406 13020541473 0025465 0 ustar 00root root 0000000 0000000 ; config options
; The island of trust is at example.com
server:
trust-anchor: "example.com. 3600 IN DS 2854 3 1 46e4ffc6e9a4793b488954bd3f0cc6af0dfb201b"
val-override-date: "20070916134226"
target-fetch-policy: "0 0 0 0 0"
stub-zone:
name: "."
stub-addr: 193.0.14.129 # K.ROOT-SERVERS.NET.
CONFIG_END
SCENARIO_BEGIN Test validator with nodata response from wrong side of zonecut
; K.ROOT-SERVERS.NET.
RANGE_BEGIN 0 100
ADDRESS 193.0.14.129
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
. IN NS
SECTION ANSWER
. IN NS K.ROOT-SERVERS.NET.
SECTION ADDITIONAL
K.ROOT-SERVERS.NET. IN A 193.0.14.129
ENTRY_END
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
www.example.com. IN A
SECTION AUTHORITY
com. IN NS a.gtld-servers.net.
SECTION ADDITIONAL
a.gtld-servers.net. IN A 192.5.6.30
ENTRY_END
RANGE_END
; a.gtld-servers.net.
RANGE_BEGIN 0 100
ADDRESS 192.5.6.30
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
com. IN NS
SECTION ANSWER
com. IN NS a.gtld-servers.net.
SECTION ADDITIONAL
a.gtld-servers.net. IN A 192.5.6.30
ENTRY_END
ENTRY_BEGIN
MATCH opcode subdomain
ADJUST copy_id copy_query
REPLY QR NOERROR
SECTION QUESTION
example.com. IN A
SECTION AUTHORITY
example.com. IN NS ns.example.com.
SECTION ADDITIONAL
ns.example.com. IN A 1.2.3.4
ENTRY_END
RANGE_END
; ns.example.com.
RANGE_BEGIN 0 100
ADDRESS 1.2.3.4
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR AA REFUSED
SECTION QUESTION
ns.example.com. IN A
ENTRY_END
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR AA REFUSED
SECTION QUESTION
ns.example.com. IN AAAA
ENTRY_END
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
example.com. IN NS
SECTION ANSWER
example.com. IN NS ns.example.com.
example.com. 3600 IN RRSIG NS 3 2 3600 20070926134150 20070829134150 2854 example.com. MC0CFQCN+qHdJxoI/2tNKwsb08pra/G7aAIUAWA5sDdJTbrXA1/3OaesGBAO3sI= ;{id = 2854}
SECTION ADDITIONAL
ns.example.com. IN A 1.2.3.4
ns.example.com. 3600 IN RRSIG A 3 3 3600 20070926135752 20070829135752 2854 example.com. MC0CFQCMSWxVehgOQLoYclB9PIAbNP229AIUeH0vNNGJhjnZiqgIOKvs1EhzqAo= ;{id = 2854}
ENTRY_END
; response to DNSKEY priming query
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
example.com. IN DNSKEY
SECTION ANSWER
example.com. 3600 IN DNSKEY 256 3 3 ALXLUsWqUrY3JYER3T4TBJII s70j+sDS/UT2QRp61SE7S3E EXopNXoFE73JLRmvpi/UrOO/Vz4Se 6wXv/CYCKjGw06U4WRgR YXcpEhJROyNapmdIKSx hOzfLVE1gqA0PweZR8d tY3aNQSRn3sPpwJr6Mi /PqQKAMMrZ9ckJpf1+b QMOOvxgzz2U1GS18b3y ZKcgTMEaJzd/GZYzi/B N2DzQ0MsrSwYXfsNLFO Bbs8PJMW4LYIxeeOe6rUgkWOF 7CC9Dh/dduQ1QrsJhmZAEFfd6ByYV+ ;{id = 2854 (zsk), size = 1688b}
example.com. 3600 IN RRSIG DNSKEY 3 2 3600 20070926134802 20070829134802 2854 example.com. MCwCFG1yhRNtTEa3Eno2zhVVuy2EJX3wAhQeLyUp6+UXcpC5qGNu9tkrTEgPUg== ;{id = 2854}
SECTION AUTHORITY
example.com. IN NS ns.example.com.
example.com. 3600 IN RRSIG NS 3 2 3600 20070926134150 20070829134150 2854 example.com. MC0CFQCN+qHdJxoI/2tNKwsb08pra/G7aAIUAWA5sDdJTbrXA1/3OaesGBAO3sI= ;{id = 2854}
SECTION ADDITIONAL
ns.example.com. IN A 1.2.3.4
ns.example.com. 3600 IN RRSIG A 3 3 3600 20070926135752 20070829135752 2854 example.com. MC0CFQCMSWxVehgOQLoYclB9PIAbNP229AIUeH0vNNGJhjnZiqgIOKvs1EhzqAo= ;{id = 2854}
ENTRY_END
; response to query of interest
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
www.example.com. IN A
SECTION ANSWER
SECTION AUTHORITY
; SOA record is missing in reply.
; Denies A, note this is the end of the NSEC chain.
; from wrong side of zone-cut
www.example.com. 3600 IN NSEC example.com. NS DS RRSIG NSEC
www.example.com. 3600 IN RRSIG NSEC 3 3 3600 20070926135752 20070829135752 2854 example.com. AA+3mzAYPyQ8G9EKxeyNM+UZY+RtCiS5BOkS8h4wSxMT3lfVdadGpn8= ;{id = 2854}
SECTION ADDITIONAL
ENTRY_END
RANGE_END
STEP 1 QUERY
ENTRY_BEGIN
REPLY RD
SECTION QUESTION
www.example.com. IN A
ENTRY_END
; recursion happens here.
STEP 10 CHECK_ANSWER
ENTRY_BEGIN
MATCH all
REPLY QR RD RA SERVFAIL
SECTION QUESTION
www.example.com. IN A
SECTION ANSWER
SECTION AUTHORITY
SECTION ADDITIONAL
ENTRY_END
SCENARIO_END
dnssecjava-1.1.3/src/test/resources/unbound/val_nodatawc.rpl 0000664 0000000 0000000 00000011331 13020541473 0024246 0 ustar 00root root 0000000 0000000 ; config options
; The island of trust is at example.com
server:
trust-anchor: "example.com. 3600 IN DS 2854 3 1 46e4ffc6e9a4793b488954bd3f0cc6af0dfb201b"
val-override-date: "20070916134226"
target-fetch-policy: "0 0 0 0 0"
stub-zone:
name: "."
stub-addr: 193.0.14.129 # K.ROOT-SERVERS.NET.
CONFIG_END
SCENARIO_BEGIN Test validator with wildcard nodata response
; K.ROOT-SERVERS.NET.
RANGE_BEGIN 0 100
ADDRESS 193.0.14.129
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
. IN NS
SECTION ANSWER
. IN NS K.ROOT-SERVERS.NET.
SECTION ADDITIONAL
K.ROOT-SERVERS.NET. IN A 193.0.14.129
ENTRY_END
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
www.example.com. IN A
SECTION AUTHORITY
com. IN NS a.gtld-servers.net.
SECTION ADDITIONAL
a.gtld-servers.net. IN A 192.5.6.30
ENTRY_END
RANGE_END
; a.gtld-servers.net.
RANGE_BEGIN 0 100
ADDRESS 192.5.6.30
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
com. IN NS
SECTION ANSWER
com. IN NS a.gtld-servers.net.
SECTION ADDITIONAL
a.gtld-servers.net. IN A 192.5.6.30
ENTRY_END
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
www.example.com. IN A
SECTION AUTHORITY
example.com. IN NS ns.example.com.
SECTION ADDITIONAL
ns.example.com. IN A 1.2.3.4
ENTRY_END
RANGE_END
; ns.example.com.
RANGE_BEGIN 0 100
ADDRESS 1.2.3.4
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
example.com. IN NS
SECTION ANSWER
example.com. IN NS ns.example.com.
example.com. 3600 IN RRSIG NS 3 2 3600 20070926134150 20070829134150 2854 example.com. MC0CFQCN+qHdJxoI/2tNKwsb08pra/G7aAIUAWA5sDdJTbrXA1/3OaesGBAO3sI= ;{id = 2854}
SECTION ADDITIONAL
ns.example.com. IN A 1.2.3.4
ns.example.com. 3600 IN RRSIG A 3 3 3600 20070926135752 20070829135752 2854 example.com. MC0CFQCMSWxVehgOQLoYclB9PIAbNP229AIUeH0vNNGJhjnZiqgIOKvs1EhzqAo= ;{id = 2854}
ENTRY_END
; response to DNSKEY priming query
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
example.com. IN DNSKEY
SECTION ANSWER
example.com. 3600 IN DNSKEY 256 3 3 ALXLUsWqUrY3JYER3T4TBJII s70j+sDS/UT2QRp61SE7S3E EXopNXoFE73JLRmvpi/UrOO/Vz4Se 6wXv/CYCKjGw06U4WRgR YXcpEhJROyNapmdIKSx hOzfLVE1gqA0PweZR8d tY3aNQSRn3sPpwJr6Mi /PqQKAMMrZ9ckJpf1+b QMOOvxgzz2U1GS18b3y ZKcgTMEaJzd/GZYzi/B N2DzQ0MsrSwYXfsNLFO Bbs8PJMW4LYIxeeOe6rUgkWOF 7CC9Dh/dduQ1QrsJhmZAEFfd6ByYV+ ;{id = 2854 (zsk), size = 1688b}
example.com. 3600 IN RRSIG DNSKEY 3 2 3600 20070926134802 20070829134802 2854 example.com. MCwCFG1yhRNtTEa3Eno2zhVVuy2EJX3wAhQeLyUp6+UXcpC5qGNu9tkrTEgPUg== ;{id = 2854}
SECTION AUTHORITY
example.com. IN NS ns.example.com.
example.com. 3600 IN RRSIG NS 3 2 3600 20070926134150 20070829134150 2854 example.com. MC0CFQCN+qHdJxoI/2tNKwsb08pra/G7aAIUAWA5sDdJTbrXA1/3OaesGBAO3sI= ;{id = 2854}
SECTION ADDITIONAL
ns.example.com. IN A 1.2.3.4
ns.example.com. 3600 IN RRSIG A 3 3 3600 20070926135752 20070829135752 2854 example.com. MC0CFQCMSWxVehgOQLoYclB9PIAbNP229AIUeH0vNNGJhjnZiqgIOKvs1EhzqAo= ;{id = 2854}
ENTRY_END
; response to query of interest
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
www.example.com. IN A
SECTION ANSWER
SECTION AUTHORITY
; SOA record is missing in reply.
; wildcard, Denies A, note this is the end of the NSEC chain.
*.example.com. IN NSEC example.com. RRSIG NSEC
*.example.com. 3600 IN RRSIG NSEC 3 2 3600 20070926135752 20070829135752 2854 example.com. MC0CFEwIBOyCychIo8y/JnBLLrhQdejHAhUAtKBLVPEvhF2haaX/RNUGLji1Xw0= ;{id = 2854}
; this NSEC denies original query name
ns.example.com. IN NSEC zork.example.com. A RRSIG NSEC
ns.example.com. 3600 IN RRSIG NSEC 3 3 3600 20070926135752 20070829135752 2854 example.com. MC0CFQCfm3mQakqw9pd8SluduiMXYYc+/wIULqIBxw1bK8QEwCrd8E6T50P4BEw= ;{id = 2854}
SECTION ADDITIONAL
ENTRY_END
RANGE_END
STEP 1 QUERY
ENTRY_BEGIN
REPLY RD DO
SECTION QUESTION
www.example.com. IN A
ENTRY_END
; recursion happens here.
STEP 10 CHECK_ANSWER
ENTRY_BEGIN
MATCH all
REPLY QR RD RA AD NOERROR
SECTION QUESTION
www.example.com. IN A
SECTION ANSWER
SECTION AUTHORITY
*.example.com. IN NSEC example.com. RRSIG NSEC
*.example.com. 3600 IN RRSIG NSEC 3 2 3600 20070926135752 20070829135752 2854 example.com. MC0CFEwIBOyCychIo8y/JnBLLrhQdejHAhUAtKBLVPEvhF2haaX/RNUGLji1Xw0= ;{id = 2854}
ns.example.com. IN NSEC zork.example.com. A RRSIG NSEC
ns.example.com. 3600 IN RRSIG NSEC 3 3 3600 20070926135752 20070829135752 2854 example.com. MC0CFQCfm3mQakqw9pd8SluduiMXYYc+/wIULqIBxw1bK8QEwCrd8E6T50P4BEw= ;{id = 2854}
SECTION ADDITIONAL
ENTRY_END
SCENARIO_END
dnssecjava-1.1.3/src/test/resources/unbound/val_nodatawc_badce.rpl 0000664 0000000 0000000 00000010730 13020541473 0025366 0 ustar 00root root 0000000 0000000 ; config options
; The island of trust is at example.com
server:
trust-anchor: "example.com. 3600 IN DS 2854 3 1 46e4ffc6e9a4793b488954bd3f0cc6af0dfb201b"
val-override-date: "20070916134226"
target-fetch-policy: "0 0 0 0 0"
stub-zone:
name: "."
stub-addr: 193.0.14.129 # K.ROOT-SERVERS.NET.
CONFIG_END
SCENARIO_BEGIN Test validator with wildcard nodata, bad closest encloser
; K.ROOT-SERVERS.NET.
RANGE_BEGIN 0 100
ADDRESS 193.0.14.129
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
. IN NS
SECTION ANSWER
. IN NS K.ROOT-SERVERS.NET.
SECTION ADDITIONAL
K.ROOT-SERVERS.NET. IN A 193.0.14.129
ENTRY_END
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
www.example.com. IN A
SECTION AUTHORITY
com. IN NS a.gtld-servers.net.
SECTION ADDITIONAL
a.gtld-servers.net. IN A 192.5.6.30
ENTRY_END
RANGE_END
; a.gtld-servers.net.
RANGE_BEGIN 0 100
ADDRESS 192.5.6.30
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
com. IN NS
SECTION ANSWER
com. IN NS a.gtld-servers.net.
SECTION ADDITIONAL
a.gtld-servers.net. IN A 192.5.6.30
ENTRY_END
ENTRY_BEGIN
MATCH opcode subdomain
ADJUST copy_id copy_query
REPLY QR NOERROR
SECTION QUESTION
example.com. IN A
SECTION AUTHORITY
example.com. IN NS ns.example.com.
SECTION ADDITIONAL
ns.example.com. IN A 1.2.3.4
ENTRY_END
RANGE_END
; ns.example.com.
RANGE_BEGIN 0 100
ADDRESS 1.2.3.4
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR AA REFUSED
SECTION QUESTION
ns.example.com. IN A
ENTRY_END
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR AA REFUSED
SECTION QUESTION
ns.example.com. IN AAAA
ENTRY_END
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
example.com. IN NS
SECTION ANSWER
example.com. IN NS ns.example.com.
example.com. 3600 IN RRSIG NS 3 2 3600 20070926134150 20070829134150 2854 example.com. MC0CFQCN+qHdJxoI/2tNKwsb08pra/G7aAIUAWA5sDdJTbrXA1/3OaesGBAO3sI= ;{id = 2854}
SECTION ADDITIONAL
ns.example.com. IN A 1.2.3.4
ns.example.com. 3600 IN RRSIG A 3 3 3600 20070926135752 20070829135752 2854 example.com. MC0CFQCMSWxVehgOQLoYclB9PIAbNP229AIUeH0vNNGJhjnZiqgIOKvs1EhzqAo= ;{id = 2854}
ENTRY_END
; response to DNSKEY priming query
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
example.com. IN DNSKEY
SECTION ANSWER
example.com. 3600 IN DNSKEY 256 3 3 ALXLUsWqUrY3JYER3T4TBJII s70j+sDS/UT2QRp61SE7S3E EXopNXoFE73JLRmvpi/UrOO/Vz4Se 6wXv/CYCKjGw06U4WRgR YXcpEhJROyNapmdIKSx hOzfLVE1gqA0PweZR8d tY3aNQSRn3sPpwJr6Mi /PqQKAMMrZ9ckJpf1+b QMOOvxgzz2U1GS18b3y ZKcgTMEaJzd/GZYzi/B N2DzQ0MsrSwYXfsNLFO Bbs8PJMW4LYIxeeOe6rUgkWOF 7CC9Dh/dduQ1QrsJhmZAEFfd6ByYV+ ;{id = 2854 (zsk), size = 1688b}
example.com. 3600 IN RRSIG DNSKEY 3 2 3600 20070926134802 20070829134802 2854 example.com. MCwCFG1yhRNtTEa3Eno2zhVVuy2EJX3wAhQeLyUp6+UXcpC5qGNu9tkrTEgPUg== ;{id = 2854}
SECTION AUTHORITY
example.com. IN NS ns.example.com.
example.com. 3600 IN RRSIG NS 3 2 3600 20070926134150 20070829134150 2854 example.com. MC0CFQCN+qHdJxoI/2tNKwsb08pra/G7aAIUAWA5sDdJTbrXA1/3OaesGBAO3sI= ;{id = 2854}
SECTION ADDITIONAL
ns.example.com. IN A 1.2.3.4
ns.example.com. 3600 IN RRSIG A 3 3 3600 20070926135752 20070829135752 2854 example.com. MC0CFQCMSWxVehgOQLoYclB9PIAbNP229AIUeH0vNNGJhjnZiqgIOKvs1EhzqAo= ;{id = 2854}
ENTRY_END
; response to query of interest
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
www.example.com. IN A
SECTION ANSWER
SECTION AUTHORITY
; SOA record is missing in reply.
; wildcard is *.com,
*.com. IN NSEC com. RRSIG NSEC
*.com. 3600 IN RRSIG NSEC 3 1 3600 20070926135752 20070829135752 2854 example.com. MC0CFQCdZKVAPYKe6WhoeuK4+J2hd3F2DgIUXv9Dif1uZsSjboLYVx7Wp0DEg78= ;{id = 2854}
; this NSEC denies original query name from a different zone
ns.example.com. IN NSEC zork.example.com. A RRSIG NSEC
ns.example.com. 3600 IN RRSIG NSEC 3 3 3600 20070926135752 20070829135752 2854 example.com. MC0CFQCfm3mQakqw9pd8SluduiMXYYc+/wIULqIBxw1bK8QEwCrd8E6T50P4BEw= ;{id = 2854}
SECTION ADDITIONAL
ENTRY_END
RANGE_END
STEP 1 QUERY
ENTRY_BEGIN
REPLY RD
SECTION QUESTION
www.example.com. IN A
ENTRY_END
; recursion happens here.
STEP 10 CHECK_ANSWER
ENTRY_BEGIN
MATCH all
REPLY QR RD RA SERVFAIL
SECTION QUESTION
www.example.com. IN A
SECTION ANSWER
SECTION AUTHORITY
SECTION ADDITIONAL
ENTRY_END
SCENARIO_END
dnssecjava-1.1.3/src/test/resources/unbound/val_nodatawc_nodeny.rpl 0000664 0000000 0000000 00000011000 13020541473 0025613 0 ustar 00root root 0000000 0000000 ; config options
; The island of trust is at example.com
server:
trust-anchor: "example.com. 3600 IN DS 2854 3 1 46e4ffc6e9a4793b488954bd3f0cc6af0dfb201b"
val-override-date: "20070916134226"
target-fetch-policy: "0 0 0 0 0"
stub-zone:
name: "."
stub-addr: 193.0.14.129 # K.ROOT-SERVERS.NET.
CONFIG_END
SCENARIO_BEGIN Test validator with wildcard nodata response without qdenial
; K.ROOT-SERVERS.NET.
RANGE_BEGIN 0 100
ADDRESS 193.0.14.129
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
. IN NS
SECTION ANSWER
. IN NS K.ROOT-SERVERS.NET.
SECTION ADDITIONAL
K.ROOT-SERVERS.NET. IN A 193.0.14.129
ENTRY_END
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
www.example.com. IN A
SECTION AUTHORITY
com. IN NS a.gtld-servers.net.
SECTION ADDITIONAL
a.gtld-servers.net. IN A 192.5.6.30
ENTRY_END
RANGE_END
; a.gtld-servers.net.
RANGE_BEGIN 0 100
ADDRESS 192.5.6.30
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
com. IN NS
SECTION ANSWER
com. IN NS a.gtld-servers.net.
SECTION ADDITIONAL
a.gtld-servers.net. IN A 192.5.6.30
ENTRY_END
ENTRY_BEGIN
MATCH opcode subdomain
ADJUST copy_id copy_query
REPLY QR NOERROR
SECTION QUESTION
example.com. IN A
SECTION AUTHORITY
example.com. IN NS ns.example.com.
SECTION ADDITIONAL
ns.example.com. IN A 1.2.3.4
ENTRY_END
RANGE_END
; ns.example.com.
RANGE_BEGIN 0 100
ADDRESS 1.2.3.4
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR AA REFUSED
SECTION QUESTION
ns.example.com. IN A
ENTRY_END
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR AA REFUSED
SECTION QUESTION
ns.example.com. IN AAAA
ENTRY_END
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
example.com. IN NS
SECTION ANSWER
example.com. IN NS ns.example.com.
example.com. 3600 IN RRSIG NS 3 2 3600 20070926134150 20070829134150 2854 example.com. MC0CFQCN+qHdJxoI/2tNKwsb08pra/G7aAIUAWA5sDdJTbrXA1/3OaesGBAO3sI= ;{id = 2854}
SECTION ADDITIONAL
ns.example.com. IN A 1.2.3.4
ns.example.com. 3600 IN RRSIG A 3 3 3600 20070926135752 20070829135752 2854 example.com. MC0CFQCMSWxVehgOQLoYclB9PIAbNP229AIUeH0vNNGJhjnZiqgIOKvs1EhzqAo= ;{id = 2854}
ENTRY_END
; response to DNSKEY priming query
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
example.com. IN DNSKEY
SECTION ANSWER
example.com. 3600 IN DNSKEY 256 3 3 ALXLUsWqUrY3JYER3T4TBJII s70j+sDS/UT2QRp61SE7S3E EXopNXoFE73JLRmvpi/UrOO/Vz4Se 6wXv/CYCKjGw06U4WRgR YXcpEhJROyNapmdIKSx hOzfLVE1gqA0PweZR8d tY3aNQSRn3sPpwJr6Mi /PqQKAMMrZ9ckJpf1+b QMOOvxgzz2U1GS18b3y ZKcgTMEaJzd/GZYzi/B N2DzQ0MsrSwYXfsNLFO Bbs8PJMW4LYIxeeOe6rUgkWOF 7CC9Dh/dduQ1QrsJhmZAEFfd6ByYV+ ;{id = 2854 (zsk), size = 1688b}
example.com. 3600 IN RRSIG DNSKEY 3 2 3600 20070926134802 20070829134802 2854 example.com. MCwCFG1yhRNtTEa3Eno2zhVVuy2EJX3wAhQeLyUp6+UXcpC5qGNu9tkrTEgPUg== ;{id = 2854}
SECTION AUTHORITY
example.com. IN NS ns.example.com.
example.com. 3600 IN RRSIG NS 3 2 3600 20070926134150 20070829134150 2854 example.com. MC0CFQCN+qHdJxoI/2tNKwsb08pra/G7aAIUAWA5sDdJTbrXA1/3OaesGBAO3sI= ;{id = 2854}
SECTION ADDITIONAL
ns.example.com. IN A 1.2.3.4
ns.example.com. 3600 IN RRSIG A 3 3 3600 20070926135752 20070829135752 2854 example.com. MC0CFQCMSWxVehgOQLoYclB9PIAbNP229AIUeH0vNNGJhjnZiqgIOKvs1EhzqAo= ;{id = 2854}
ENTRY_END
; response to query of interest
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
www.example.com. IN A
SECTION ANSWER
SECTION AUTHORITY
; SOA record is missing in reply.
; wildcard, Denies A, note this is the end of the NSEC chain.
*.example.com. IN NSEC ns.example.com. RRSIG NSEC
*.example.com. IN RRSIG NSEC 3 2 3600 20070926135752 20070829135752 2854 example.com. MCwCFG0+PaReanKYupgDsJMHBBl7qaAOAhRApLLtiHNSl326iqVz/icLUJ6+Kg== ;{id = 2854}
; this NSEC denies original query name
;ns.example.com. IN NSEC zork.example.com. A RRSIG NSEC
;ns.example.com. 3600 IN RRSIG NSEC 3 3 3600 20070926135752 20070829135752 2854 example.com. MC0CFQCfm3mQakqw9pd8SluduiMXYYc+/wIULqIBxw1bK8QEwCrd8E6T50P4BEw= ;{id = 2854}
SECTION ADDITIONAL
ENTRY_END
RANGE_END
STEP 1 QUERY
ENTRY_BEGIN
REPLY RD
SECTION QUESTION
www.example.com. IN A
ENTRY_END
; recursion happens here.
STEP 10 CHECK_ANSWER
ENTRY_BEGIN
MATCH all
REPLY QR RD RA SERVFAIL
SECTION QUESTION
www.example.com. IN A
SECTION ANSWER
SECTION AUTHORITY
SECTION ADDITIONAL
ENTRY_END
SCENARIO_END
dnssecjava-1.1.3/src/test/resources/unbound/val_nodatawc_one.rpl 0000664 0000000 0000000 00000010352 13020541473 0025111 0 ustar 00root root 0000000 0000000 ; config options
; The island of trust is at example.com
server:
trust-anchor: "example.com. 3600 IN DS 2854 3 1 46e4ffc6e9a4793b488954bd3f0cc6af0dfb201b"
val-override-date: "20070916134226"
target-fetch-policy: "0 0 0 0 0"
stub-zone:
name: "."
stub-addr: 193.0.14.129 # K.ROOT-SERVERS.NET.
CONFIG_END
SCENARIO_BEGIN Test validator with wildcard nodata response with one NSEC
; K.ROOT-SERVERS.NET.
RANGE_BEGIN 0 100
ADDRESS 193.0.14.129
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
. IN NS
SECTION ANSWER
. IN NS K.ROOT-SERVERS.NET.
SECTION ADDITIONAL
K.ROOT-SERVERS.NET. IN A 193.0.14.129
ENTRY_END
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
www.example.com. IN A
SECTION AUTHORITY
com. IN NS a.gtld-servers.net.
SECTION ADDITIONAL
a.gtld-servers.net. IN A 192.5.6.30
ENTRY_END
RANGE_END
; a.gtld-servers.net.
RANGE_BEGIN 0 100
ADDRESS 192.5.6.30
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
com. IN NS
SECTION ANSWER
com. IN NS a.gtld-servers.net.
SECTION ADDITIONAL
a.gtld-servers.net. IN A 192.5.6.30
ENTRY_END
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
www.example.com. IN A
SECTION AUTHORITY
example.com. IN NS ns.example.com.
SECTION ADDITIONAL
ns.example.com. IN A 1.2.3.4
ENTRY_END
RANGE_END
; ns.example.com.
RANGE_BEGIN 0 100
ADDRESS 1.2.3.4
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
example.com. IN NS
SECTION ANSWER
example.com. IN NS ns.example.com.
example.com. 3600 IN RRSIG NS 3 2 3600 20070926134150 20070829134150 2854 example.com. MC0CFQCN+qHdJxoI/2tNKwsb08pra/G7aAIUAWA5sDdJTbrXA1/3OaesGBAO3sI= ;{id = 2854}
SECTION ADDITIONAL
ns.example.com. IN A 1.2.3.4
ns.example.com. 3600 IN RRSIG A 3 3 3600 20070926135752 20070829135752 2854 example.com. MC0CFQCMSWxVehgOQLoYclB9PIAbNP229AIUeH0vNNGJhjnZiqgIOKvs1EhzqAo= ;{id = 2854}
ENTRY_END
; response to DNSKEY priming query
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
example.com. IN DNSKEY
SECTION ANSWER
example.com. 3600 IN DNSKEY 256 3 3 ALXLUsWqUrY3JYER3T4TBJII s70j+sDS/UT2QRp61SE7S3E EXopNXoFE73JLRmvpi/UrOO/Vz4Se 6wXv/CYCKjGw06U4WRgR YXcpEhJROyNapmdIKSx hOzfLVE1gqA0PweZR8d tY3aNQSRn3sPpwJr6Mi /PqQKAMMrZ9ckJpf1+b QMOOvxgzz2U1GS18b3y ZKcgTMEaJzd/GZYzi/B N2DzQ0MsrSwYXfsNLFO Bbs8PJMW4LYIxeeOe6rUgkWOF 7CC9Dh/dduQ1QrsJhmZAEFfd6ByYV+ ;{id = 2854 (zsk), size = 1688b}
example.com. 3600 IN RRSIG DNSKEY 3 2 3600 20070926134802 20070829134802 2854 example.com. MCwCFG1yhRNtTEa3Eno2zhVVuy2EJX3wAhQeLyUp6+UXcpC5qGNu9tkrTEgPUg== ;{id = 2854}
SECTION AUTHORITY
example.com. IN NS ns.example.com.
example.com. 3600 IN RRSIG NS 3 2 3600 20070926134150 20070829134150 2854 example.com. MC0CFQCN+qHdJxoI/2tNKwsb08pra/G7aAIUAWA5sDdJTbrXA1/3OaesGBAO3sI= ;{id = 2854}
SECTION ADDITIONAL
ns.example.com. IN A 1.2.3.4
ns.example.com. 3600 IN RRSIG A 3 3 3600 20070926135752 20070829135752 2854 example.com. MC0CFQCMSWxVehgOQLoYclB9PIAbNP229AIUeH0vNNGJhjnZiqgIOKvs1EhzqAo= ;{id = 2854}
ENTRY_END
; response to query of interest
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
www.example.com. IN A
SECTION ANSWER
SECTION AUTHORITY
; SOA record is missing in reply.
; wildcard, Denies A, note this is the end of the NSEC chain.
*.example.com. IN NSEC example.com. RRSIG NSEC
*.example.com. 3600 IN RRSIG NSEC 3 2 3600 20070926135752 20070829135752 2854 example.com. MC0CFEwIBOyCychIo8y/JnBLLrhQdejHAhUAtKBLVPEvhF2haaX/RNUGLji1Xw0= ;{id = 2854}
SECTION ADDITIONAL
ENTRY_END
RANGE_END
STEP 1 QUERY
ENTRY_BEGIN
REPLY RD DO
SECTION QUESTION
www.example.com. IN A
ENTRY_END
; recursion happens here.
STEP 10 CHECK_ANSWER
ENTRY_BEGIN
MATCH all
REPLY QR RD RA AD NOERROR
SECTION QUESTION
www.example.com. IN A
SECTION ANSWER
SECTION AUTHORITY
*.example.com. IN NSEC example.com. RRSIG NSEC
*.example.com. 3600 IN RRSIG NSEC 3 2 3600 20070926135752 20070829135752 2854 example.com. MC0CFEwIBOyCychIo8y/JnBLLrhQdejHAhUAtKBLVPEvhF2haaX/RNUGLji1Xw0= ;{id = 2854}
SECTION ADDITIONAL
ENTRY_END
SCENARIO_END
dnssecjava-1.1.3/src/test/resources/unbound/val_nodatawc_wcns.rpl 0000664 0000000 0000000 00000010277 13020541473 0025310 0 ustar 00root root 0000000 0000000 ; config options
; The island of trust is at example.com
server:
trust-anchor: "example.com. 3600 IN DS 2854 3 1 46e4ffc6e9a4793b488954bd3f0cc6af0dfb201b"
val-override-date: "20070916134226"
target-fetch-policy: "0 0 0 0 0"
stub-zone:
name: "."
stub-addr: 193.0.14.129 # K.ROOT-SERVERS.NET.
CONFIG_END
SCENARIO_BEGIN Test validator with wildcard nodata response from parent zone with SOA
; K.ROOT-SERVERS.NET.
RANGE_BEGIN 0 100
ADDRESS 193.0.14.129
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
. IN NS
SECTION ANSWER
. IN NS K.ROOT-SERVERS.NET.
SECTION ADDITIONAL
K.ROOT-SERVERS.NET. IN A 193.0.14.129
ENTRY_END
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
www.example.com. IN A
SECTION AUTHORITY
com. IN NS a.gtld-servers.net.
SECTION ADDITIONAL
a.gtld-servers.net. IN A 192.5.6.30
ENTRY_END
RANGE_END
; a.gtld-servers.net.
RANGE_BEGIN 0 100
ADDRESS 192.5.6.30
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
com. IN NS
SECTION ANSWER
com. IN NS a.gtld-servers.net.
SECTION ADDITIONAL
a.gtld-servers.net. IN A 192.5.6.30
ENTRY_END
ENTRY_BEGIN
MATCH opcode subdomain
ADJUST copy_id copy_query
REPLY QR NOERROR
SECTION QUESTION
example.com. IN A
SECTION AUTHORITY
example.com. IN NS ns.example.com.
SECTION ADDITIONAL
ns.example.com. IN A 1.2.3.4
ENTRY_END
RANGE_END
; ns.example.com.
RANGE_BEGIN 0 100
ADDRESS 1.2.3.4
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR AA REFUSED
SECTION QUESTION
ns.example.com. IN A
ENTRY_END
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR AA REFUSED
SECTION QUESTION
ns.example.com. IN AAAA
ENTRY_END
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
example.com. IN NS
SECTION ANSWER
example.com. IN NS ns.example.com.
example.com. 3600 IN RRSIG NS 3 2 3600 20070926134150 20070829134150 2854 example.com. MC0CFQCN+qHdJxoI/2tNKwsb08pra/G7aAIUAWA5sDdJTbrXA1/3OaesGBAO3sI= ;{id = 2854}
SECTION ADDITIONAL
ns.example.com. IN A 1.2.3.4
ns.example.com. 3600 IN RRSIG A 3 3 3600 20070926135752 20070829135752 2854 example.com. MC0CFQCMSWxVehgOQLoYclB9PIAbNP229AIUeH0vNNGJhjnZiqgIOKvs1EhzqAo= ;{id = 2854}
ENTRY_END
; response to DNSKEY priming query
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
example.com. IN DNSKEY
SECTION ANSWER
example.com. 3600 IN DNSKEY 256 3 3 ALXLUsWqUrY3JYER3T4TBJII s70j+sDS/UT2QRp61SE7S3E EXopNXoFE73JLRmvpi/UrOO/Vz4Se 6wXv/CYCKjGw06U4WRgR YXcpEhJROyNapmdIKSx hOzfLVE1gqA0PweZR8d tY3aNQSRn3sPpwJr6Mi /PqQKAMMrZ9ckJpf1+b QMOOvxgzz2U1GS18b3y ZKcgTMEaJzd/GZYzi/B N2DzQ0MsrSwYXfsNLFO Bbs8PJMW4LYIxeeOe6rUgkWOF 7CC9Dh/dduQ1QrsJhmZAEFfd6ByYV+ ;{id = 2854 (zsk), size = 1688b}
example.com. 3600 IN RRSIG DNSKEY 3 2 3600 20070926134802 20070829134802 2854 example.com. MCwCFG1yhRNtTEa3Eno2zhVVuy2EJX3wAhQeLyUp6+UXcpC5qGNu9tkrTEgPUg== ;{id = 2854}
SECTION AUTHORITY
example.com. IN NS ns.example.com.
example.com. 3600 IN RRSIG NS 3 2 3600 20070926134150 20070829134150 2854 example.com. MC0CFQCN+qHdJxoI/2tNKwsb08pra/G7aAIUAWA5sDdJTbrXA1/3OaesGBAO3sI= ;{id = 2854}
SECTION ADDITIONAL
ns.example.com. IN A 1.2.3.4
ns.example.com. 3600 IN RRSIG A 3 3 3600 20070926135752 20070829135752 2854 example.com. MC0CFQCMSWxVehgOQLoYclB9PIAbNP229AIUeH0vNNGJhjnZiqgIOKvs1EhzqAo= ;{id = 2854}
ENTRY_END
; response to query of interest
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
www.example.com. IN A
SECTION ANSWER
SECTION AUTHORITY
; wildcard, denies A, but has NS and SOA
*.example.com. 3600 IN NSEC ns.example.com. RRSIG NSEC NS SOA
*.example.com. 3600 IN RRSIG NSEC 3 2 3600 20070926135752 20070829135752 2854 example.com. AFmszt1f4/pJQypUHc3e7izNQnc/eDaK2gB73kt/0H0iYMpOlWjYr8E=
SECTION ADDITIONAL
ENTRY_END
RANGE_END
STEP 1 QUERY
ENTRY_BEGIN
REPLY RD
SECTION QUESTION
www.example.com. IN A
ENTRY_END
; recursion happens here.
STEP 10 CHECK_ANSWER
ENTRY_BEGIN
MATCH all
REPLY QR RD RA SERVFAIL
SECTION QUESTION
www.example.com. IN A
SECTION ANSWER
SECTION AUTHORITY
SECTION ADDITIONAL
ENTRY_END
SCENARIO_END
dnssecjava-1.1.3/src/test/resources/unbound/val_nodatawc_wrongdeleg.rpl 0000664 0000000 0000000 00000010261 13020541473 0026464 0 ustar 00root root 0000000 0000000 ; config options
; The island of trust is at example.com
server:
trust-anchor: "example.com. 3600 IN DS 2854 3 1 46e4ffc6e9a4793b488954bd3f0cc6af0dfb201b"
val-override-date: "20070916134226"
target-fetch-policy: "0 0 0 0 0"
stub-zone:
name: "."
stub-addr: 193.0.14.129 # K.ROOT-SERVERS.NET.
CONFIG_END
SCENARIO_BEGIN Test validator with wildcard nodata response from parent zone
; K.ROOT-SERVERS.NET.
RANGE_BEGIN 0 100
ADDRESS 193.0.14.129
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
. IN NS
SECTION ANSWER
. IN NS K.ROOT-SERVERS.NET.
SECTION ADDITIONAL
K.ROOT-SERVERS.NET. IN A 193.0.14.129
ENTRY_END
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
www.example.com. IN A
SECTION AUTHORITY
com. IN NS a.gtld-servers.net.
SECTION ADDITIONAL
a.gtld-servers.net. IN A 192.5.6.30
ENTRY_END
RANGE_END
; a.gtld-servers.net.
RANGE_BEGIN 0 100
ADDRESS 192.5.6.30
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
com. IN NS
SECTION ANSWER
com. IN NS a.gtld-servers.net.
SECTION ADDITIONAL
a.gtld-servers.net. IN A 192.5.6.30
ENTRY_END
ENTRY_BEGIN
MATCH opcode subdomain
ADJUST copy_id copy_query
REPLY QR NOERROR
SECTION QUESTION
example.com. IN A
SECTION AUTHORITY
example.com. IN NS ns.example.com.
SECTION ADDITIONAL
ns.example.com. IN A 1.2.3.4
ENTRY_END
RANGE_END
; ns.example.com.
RANGE_BEGIN 0 100
ADDRESS 1.2.3.4
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR AA REFUSED
SECTION QUESTION
ns.example.com. IN A
ENTRY_END
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR AA REFUSED
SECTION QUESTION
ns.example.com. IN AAAA
ENTRY_END
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
example.com. IN NS
SECTION ANSWER
example.com. IN NS ns.example.com.
example.com. 3600 IN RRSIG NS 3 2 3600 20070926134150 20070829134150 2854 example.com. MC0CFQCN+qHdJxoI/2tNKwsb08pra/G7aAIUAWA5sDdJTbrXA1/3OaesGBAO3sI= ;{id = 2854}
SECTION ADDITIONAL
ns.example.com. IN A 1.2.3.4
ns.example.com. 3600 IN RRSIG A 3 3 3600 20070926135752 20070829135752 2854 example.com. MC0CFQCMSWxVehgOQLoYclB9PIAbNP229AIUeH0vNNGJhjnZiqgIOKvs1EhzqAo= ;{id = 2854}
ENTRY_END
; response to DNSKEY priming query
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
example.com. IN DNSKEY
SECTION ANSWER
example.com. 3600 IN DNSKEY 256 3 3 ALXLUsWqUrY3JYER3T4TBJII s70j+sDS/UT2QRp61SE7S3E EXopNXoFE73JLRmvpi/UrOO/Vz4Se 6wXv/CYCKjGw06U4WRgR YXcpEhJROyNapmdIKSx hOzfLVE1gqA0PweZR8d tY3aNQSRn3sPpwJr6Mi /PqQKAMMrZ9ckJpf1+b QMOOvxgzz2U1GS18b3y ZKcgTMEaJzd/GZYzi/B N2DzQ0MsrSwYXfsNLFO Bbs8PJMW4LYIxeeOe6rUgkWOF 7CC9Dh/dduQ1QrsJhmZAEFfd6ByYV+ ;{id = 2854 (zsk), size = 1688b}
example.com. 3600 IN RRSIG DNSKEY 3 2 3600 20070926134802 20070829134802 2854 example.com. MCwCFG1yhRNtTEa3Eno2zhVVuy2EJX3wAhQeLyUp6+UXcpC5qGNu9tkrTEgPUg== ;{id = 2854}
SECTION AUTHORITY
example.com. IN NS ns.example.com.
example.com. 3600 IN RRSIG NS 3 2 3600 20070926134150 20070829134150 2854 example.com. MC0CFQCN+qHdJxoI/2tNKwsb08pra/G7aAIUAWA5sDdJTbrXA1/3OaesGBAO3sI= ;{id = 2854}
SECTION ADDITIONAL
ns.example.com. IN A 1.2.3.4
ns.example.com. 3600 IN RRSIG A 3 3 3600 20070926135752 20070829135752 2854 example.com. MC0CFQCMSWxVehgOQLoYclB9PIAbNP229AIUeH0vNNGJhjnZiqgIOKvs1EhzqAo= ;{id = 2854}
ENTRY_END
; response to query of interest
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
www.example.com. IN A
SECTION ANSWER
SECTION AUTHORITY
; wildcard, denies A, but has NS without SOA
*.example.com. IN NSEC ns.example.com. RRSIG NSEC NS
*.example.com. 3600 IN RRSIG NSEC 3 2 3600 20070926135752 20070829135752 2854 example.com. AD9PK7JGmYA7yzAMBiDXZNiYf9I8fbNI4MRZ2xebru+u5MBafoXacR8=
SECTION ADDITIONAL
ENTRY_END
RANGE_END
STEP 1 QUERY
ENTRY_BEGIN
REPLY RD
SECTION QUESTION
www.example.com. IN A
ENTRY_END
; recursion happens here.
STEP 10 CHECK_ANSWER
ENTRY_BEGIN
MATCH all
REPLY QR RD RA SERVFAIL
SECTION QUESTION
www.example.com. IN A
SECTION ANSWER
SECTION AUTHORITY
SECTION ADDITIONAL
ENTRY_END
SCENARIO_END
dnssecjava-1.1.3/src/test/resources/unbound/val_nokeyprime.rpl 0000664 0000000 0000000 00000007507 13020541473 0024642 0 ustar 00root root 0000000 0000000 ; config options
; The island of trust is at example.com
server:
trust-anchor: "example.com. 3600 IN DS 2854 3 1 46e4ffc6e9a4793b488954bd3f0cc6af0dfb201b"
val-override-date: "20070916134226"
target-fetch-policy: "0 0 0 0 0"
stub-zone:
name: "."
stub-addr: 193.0.14.129 # K.ROOT-SERVERS.NET.
CONFIG_END
SCENARIO_BEGIN Test validator with failed key prime, no keys.
; K.ROOT-SERVERS.NET.
RANGE_BEGIN 0 100
ADDRESS 193.0.14.129
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
. IN NS
SECTION ANSWER
. IN NS K.ROOT-SERVERS.NET.
SECTION ADDITIONAL
K.ROOT-SERVERS.NET. IN A 193.0.14.129
ENTRY_END
ENTRY_BEGIN
MATCH opcode subdomain
ADJUST copy_id copy_query
REPLY QR NOERROR
SECTION QUESTION
com. IN A
SECTION AUTHORITY
com. IN NS a.gtld-servers.net.
SECTION ADDITIONAL
a.gtld-servers.net. IN A 192.5.6.30
ENTRY_END
RANGE_END
; a.gtld-servers.net.
RANGE_BEGIN 0 100
ADDRESS 192.5.6.30
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
com. IN NS
SECTION ANSWER
com. IN NS a.gtld-servers.net.
SECTION ADDITIONAL
a.gtld-servers.net. IN A 192.5.6.30
ENTRY_END
ENTRY_BEGIN
MATCH opcode subdomain
ADJUST copy_id copy_query
REPLY QR NOERROR
SECTION QUESTION
example.com. IN A
SECTION AUTHORITY
example.com. IN NS ns.example.com.
SECTION ADDITIONAL
ns.example.com. IN A 1.2.3.4
ENTRY_END
RANGE_END
; ns.example.com.
RANGE_BEGIN 0 100
ADDRESS 1.2.3.4
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
example.com. IN NS
SECTION ANSWER
example.com. IN NS ns.example.com.
example.com. 3600 IN RRSIG NS 3 2 3600 20070926134150 20070829134150 2854 example.com. MC0CFQCN+qHdJxoI/2tNKwsb08pra/G7aAIUAWA5sDdJTbrXA1/3OaesGBAO3sI= ;{id = 2854}
SECTION ADDITIONAL
ns.example.com. IN A 1.2.3.4
ns.example.com. 3600 IN RRSIG A 3 3 3600 20070926135752 20070829135752 2854 example.com. MC0CFQCMSWxVehgOQLoYclB9PIAbNP229AIUeH0vNNGJhjnZiqgIOKvs1EhzqAo= ;{id = 2854}
ENTRY_END
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
ns.example.com. IN A
SECTION ANSWER
ns.example.com. IN A 1.2.3.4
ns.example.com. 3600 IN RRSIG A 3 3 3600 20070926135752 20070829135752 2854 example.com. MC0CFQCMSWxVehgOQLoYclB9PIAbNP229AIUeH0vNNGJhjnZiqgIOKvs1EhzqAo= ;{id = 2854}
SECTION AUTHORITY
example.com. IN NS ns.example.com.
example.com. 3600 IN RRSIG NS 3 2 3600 20070926134150 20070829134150 2854 example.com. MC0CFQCN+qHdJxoI/2tNKwsb08pra/G7aAIUAWA5sDdJTbrXA1/3OaesGBAO3sI= ;{id = 2854}
ENTRY_END
; barely valid nodata for AAAA
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
ns.example.com. IN AAAA
SECTION ANSWER
SECTION AUTHORITY
example.com. IN NS ns.example.com.
example.com. 3600 IN RRSIG NS 3 2 3600 20070926134150 20070829134150 2854 example.com. MC0CFQCN+qHdJxoI/2tNKwsb08pra/G7aAIUAWA5sDdJTbrXA1/3OaesGBAO3sI= ;{id = 2854}
ENTRY_END
; response to DNSKEY priming query
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR AA NOERROR
SECTION QUESTION
example.com. IN DNSKEY
SECTION ANSWER
SECTION AUTHORITY
example.com. IN SOA ns.example.com. hostmaster.example.com. 2007101500 28800 7200 604800 18000
SECTION ADDITIONAL
ENTRY_END
; response to query of interest
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR AA NOERROR
SECTION QUESTION
www.example.com. IN A
SECTION ANSWER
www.example.com. IN A 10.20.30.40
SECTION AUTHORITY
example.com. IN NS ns.example.com.
SECTION ADDITIONAL
ns.example.com. IN A 1.2.3.4
ENTRY_END
RANGE_END
STEP 1 QUERY
ENTRY_BEGIN
REPLY RD DO
SECTION QUESTION
www.example.com. IN A
ENTRY_END
STEP 10 CHECK_ANSWER
ENTRY_BEGIN
MATCH all
REPLY QR RD RA SERVFAIL
SECTION QUESTION
www.example.com. IN A
SECTION ANSWER
ENTRY_END
SCENARIO_END
dnssecjava-1.1.3/src/test/resources/unbound/val_nsec3_b1_nameerror.rpl 0000664 0000000 0000000 00000011725 13020541473 0026124 0 ustar 00root root 0000000 0000000 ; config options
server:
trust-anchor: "example. DNSKEY 257 3 7 AwEAAcUlFV1vhmqx6NSOUOq2R/dsR7Xm3upJ ( j7IommWSpJABVfW8Q0rOvXdM6kzt+TAu92L9 AbsUdblMFin8CVF3n4s= )"
val-override-date: "20120420235959"
target-fetch-policy: "0 0 0 0 0"
stub-zone:
name: "."
stub-addr: 193.0.14.129 # K.ROOT-SERVERS.NET.
CONFIG_END
SCENARIO_BEGIN Test validator NSEC3 B.1 name error.
; K.ROOT-SERVERS.NET.
RANGE_BEGIN 0 100
ADDRESS 193.0.14.129
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
. IN NS
SECTION ANSWER
. IN NS K.ROOT-SERVERS.NET.
SECTION ADDITIONAL
K.ROOT-SERVERS.NET. IN A 193.0.14.129
ENTRY_END
ENTRY_BEGIN
MATCH opcode qtype
ADJUST copy_id copy_query
REPLY QR NOERROR
SECTION QUESTION
. IN A
SECTION AUTHORITY
example. IN NS ns1.example.
; leave out to make unbound take ns1
;example. IN NS ns2.example.
SECTION ADDITIONAL
ns1.example. IN A 192.0.2.1
; leave out to make unbound take ns1
;ns2.example. IN A 192.0.2.2
ENTRY_END
RANGE_END
; ns1.example.
RANGE_BEGIN 0 100
ADDRESS 192.0.2.1
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id copy_query
REPLY QR REFUSED
SECTION QUESTION
example. IN NS
SECTION ANSWER
ENTRY_END
; response to DNSKEY priming query
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
example. IN DNSKEY
SECTION ANSWER
example. DNSKEY 256 3 7 AwEAAaetidLzsKWUt4swWR8yu0wPHPiUi8LU ( sAD0QPWU+wzt89epO6tHzkMBVDkC7qphQO2h TY4hHn9npWFRw5BYubE= )
example. DNSKEY 257 3 7 AwEAAcUlFV1vhmqx6NSOUOq2R/dsR7Xm3upJ ( j7IommWSpJABVfW8Q0rOvXdM6kzt+TAu92L9 AbsUdblMFin8CVF3n4s= )
example. RRSIG DNSKEY 7 1 3600 20150420235959 ( 20051021000000 12708 example. AuU4juU9RaxescSmStrQks3Gh9FblGBlVU31 uzMZ/U/FpsUb8aC6QZS+sTsJXnLnz7flGOsm MGQZf3bH+QsCtg== )
ENTRY_END
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR AA DO NXDOMAIN
SECTION QUESTION
a.c.x.w.example. IN A
SECTION AUTHORITY
example. SOA ns1.example. bugs.x.w.example. 1 3600 300 ( 3600000 3600 )
example. RRSIG SOA 7 1 3600 20150420235959 20051021000000 ( 40430 example. Hu25UIyNPmvPIVBrldN+9Mlp9Zql39qaUd8i q4ZLlYWfUUbbAS41pG+68z81q1xhkYAcEyHd VI2LmKusbZsT0Q== )
;; NSEC3 RR that covers the "next closer" name (c.x.w.example)
;; H(c.x.w.example) = 0va5bpr2ou0vk0lbqeeljri88laipsfh
0p9mhaveqvm6t7vbl5lop2u3t2rp3tom.example. NSEC3 1 1 12 aabbccdd ( 2t7b4g4vsa5smi47k61mv5bv1a22bojr MX DNSKEY NS SOA NSEC3PARAM RRSIG )
0p9mhaveqvm6t7vbl5lop2u3t2rp3tom.example. RRSIG NSEC3 7 2 3600 20150420235959 20051021000000 ( 40430 example. OSgWSm26B+cS+dDL8b5QrWr/dEWhtCsKlwKL IBHYH6blRxK9rC0bMJPwQ4mLIuw85H2EY762 BOCXJZMnpuwhpA== )
;; NSEC3 RR that matches the closest encloser (x.w.example)
;; H(x.w.example) = b4um86eghhds6nea196smvmlo4ors995
b4um86eghhds6nea196smvmlo4ors995.example. NSEC3 1 1 12 aabbccdd ( gjeqe526plbf1g8mklp59enfd789njgi MX RRSIG )
b4um86eghhds6nea196smvmlo4ors995.example. RRSIG NSEC3 7 2 3600 20150420235959 20051021000000 ( 40430 example. ZkPG3M32lmoHM6pa3D6gZFGB/rhL//Bs3Omh 5u4m/CUiwtblEVOaAKKZd7S959OeiX43aLX3 pOv0TSTyiTxIZg== )
;; NSEC3 RR that covers wildcard at the closest encloser (*.x.w.example)
;; H(*.x.w.example) = 92pqneegtaue7pjatc3l3qnk738c6v5m
35mthgpgcu1qg68fab165klnsnk3dpvl.example. NSEC3 1 1 12 aabbccdd ( b4um86eghhds6nea196smvmlo4ors995 NS DS RRSIG )
35mthgpgcu1qg68fab165klnsnk3dpvl.example. RRSIG NSEC3 7 2 3600 20150420235959 20051021000000 ( 40430 example. g6jPUUpduAJKRljUsN8gB4UagAX0NxY9shwQ Aynzo8EUWH+z6hEIBlUTPGj15eZll6VhQqgZ XtAIR3chwgW+SA== )
SECTION ADDITIONAL
ENTRY_END
RANGE_END
STEP 1 QUERY
ENTRY_BEGIN
REPLY RD DO
SECTION QUESTION
a.c.x.w.example. IN A
ENTRY_END
; recursion happens here.
STEP 10 CHECK_ANSWER
ENTRY_BEGIN
MATCH all
REPLY QR RD RA NXDOMAIN
SECTION QUESTION
a.c.x.w.example. IN A
SECTION ANSWER
SECTION AUTHORITY
example. SOA ns1.example. bugs.x.w.example. 1 3600 300 ( 3600000 3600 )
example. RRSIG SOA 7 1 3600 20150420235959 20051021000000 ( 40430 example. Hu25UIyNPmvPIVBrldN+9Mlp9Zql39qaUd8i q4ZLlYWfUUbbAS41pG+68z81q1xhkYAcEyHd VI2LmKusbZsT0Q== )
0p9mhaveqvm6t7vbl5lop2u3t2rp3tom.example. NSEC3 1 1 12 aabbccdd ( 2t7b4g4vsa5smi47k61mv5bv1a22bojr MX DNSKEY NS SOA NSEC3PARAM RRSIG )
0p9mhaveqvm6t7vbl5lop2u3t2rp3tom.example. RRSIG NSEC3 7 2 3600 20150420235959 20051021000000 ( 40430 example. OSgWSm26B+cS+dDL8b5QrWr/dEWhtCsKlwKL IBHYH6blRxK9rC0bMJPwQ4mLIuw85H2EY762 BOCXJZMnpuwhpA== )
b4um86eghhds6nea196smvmlo4ors995.example. NSEC3 1 1 12 aabbccdd ( gjeqe526plbf1g8mklp59enfd789njgi MX RRSIG )
b4um86eghhds6nea196smvmlo4ors995.example. RRSIG NSEC3 7 2 3600 20150420235959 20051021000000 ( 40430 example. ZkPG3M32lmoHM6pa3D6gZFGB/rhL//Bs3Omh 5u4m/CUiwtblEVOaAKKZd7S959OeiX43aLX3 pOv0TSTyiTxIZg== )
35mthgpgcu1qg68fab165klnsnk3dpvl.example. NSEC3 1 1 12 aabbccdd ( b4um86eghhds6nea196smvmlo4ors995 NS DS RRSIG )
35mthgpgcu1qg68fab165klnsnk3dpvl.example. RRSIG NSEC3 7 2 3600 20150420235959 20051021000000 ( 40430 example. g6jPUUpduAJKRljUsN8gB4UagAX0NxY9shwQ Aynzo8EUWH+z6hEIBlUTPGj15eZll6VhQqgZ XtAIR3chwgW+SA== )
SECTION ADDITIONAL
ENTRY_END
SCENARIO_END
dnssecjava-1.1.3/src/test/resources/unbound/val_nsec3_b1_nameerror_noce.rpl 0000664 0000000 0000000 00000010055 13020541473 0027123 0 ustar 00root root 0000000 0000000 ; config options
server:
trust-anchor: "example. DNSKEY 257 3 7 AwEAAcUlFV1vhmqx6NSOUOq2R/dsR7Xm3upJ ( j7IommWSpJABVfW8Q0rOvXdM6kzt+TAu92L9 AbsUdblMFin8CVF3n4s= )"
val-override-date: "20120420235959"
target-fetch-policy: "0 0 0 0 0"
stub-zone:
name: "."
stub-addr: 193.0.14.129 # K.ROOT-SERVERS.NET.
CONFIG_END
SCENARIO_BEGIN Test validator NSEC3 B.1 name error without ce NSEC3.
; K.ROOT-SERVERS.NET.
RANGE_BEGIN 0 100
ADDRESS 193.0.14.129
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
. IN NS
SECTION ANSWER
. IN NS K.ROOT-SERVERS.NET.
SECTION ADDITIONAL
K.ROOT-SERVERS.NET. IN A 193.0.14.129
ENTRY_END
ENTRY_BEGIN
MATCH opcode subdomain
ADJUST copy_id copy_query
REPLY QR NOERROR
SECTION QUESTION
example. IN A
SECTION AUTHORITY
example. IN NS ns1.example.
; leave out to make unbound take ns1
;example. IN NS ns2.example.
SECTION ADDITIONAL
ns1.example. IN A 192.0.2.1
; leave out to make unbound take ns1
;ns2.example. IN A 192.0.2.2
ENTRY_END
RANGE_END
; ns1.example.
RANGE_BEGIN 0 100
ADDRESS 192.0.2.1
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id copy_query
REPLY QR REFUSED
SECTION QUESTION
ns1.example. IN A
SECTION ANSWER
ENTRY_END
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id copy_query
REPLY QR REFUSED
SECTION QUESTION
ns1.example. IN AAAA
SECTION ANSWER
ENTRY_END
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id copy_query
REPLY QR REFUSED
SECTION QUESTION
example. IN NS
SECTION ANSWER
ENTRY_END
; response to DNSKEY priming query
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
example. IN DNSKEY
SECTION ANSWER
example. DNSKEY 256 3 7 AwEAAaetidLzsKWUt4swWR8yu0wPHPiUi8LU ( sAD0QPWU+wzt89epO6tHzkMBVDkC7qphQO2h TY4hHn9npWFRw5BYubE= )
example. DNSKEY 257 3 7 AwEAAcUlFV1vhmqx6NSOUOq2R/dsR7Xm3upJ ( j7IommWSpJABVfW8Q0rOvXdM6kzt+TAu92L9 AbsUdblMFin8CVF3n4s= )
example. RRSIG DNSKEY 7 1 3600 20150420235959 ( 20051021000000 12708 example. AuU4juU9RaxescSmStrQks3Gh9FblGBlVU31 uzMZ/U/FpsUb8aC6QZS+sTsJXnLnz7flGOsm MGQZf3bH+QsCtg== )
ENTRY_END
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR AA DO NXDOMAIN
SECTION QUESTION
a.c.x.w.example. IN A
SECTION AUTHORITY
example. SOA ns1.example. bugs.x.w.example. 1 3600 300 ( 3600000 3600 )
example. RRSIG SOA 7 1 3600 20150420235959 20051021000000 ( 40430 example. Hu25UIyNPmvPIVBrldN+9Mlp9Zql39qaUd8i q4ZLlYWfUUbbAS41pG+68z81q1xhkYAcEyHd VI2LmKusbZsT0Q== )
;; NSEC3 RR that covers the "next closer" name (c.x.w.example)
;; H(c.x.w.example) = 0va5bpr2ou0vk0lbqeeljri88laipsfh
0p9mhaveqvm6t7vbl5lop2u3t2rp3tom.example. NSEC3 1 1 12 aabbccdd ( 2t7b4g4vsa5smi47k61mv5bv1a22bojr MX DNSKEY NS SOA NSEC3PARAM RRSIG )
0p9mhaveqvm6t7vbl5lop2u3t2rp3tom.example. RRSIG NSEC3 7 2 3600 20150420235959 20051021000000 ( 40430 example. OSgWSm26B+cS+dDL8b5QrWr/dEWhtCsKlwKL IBHYH6blRxK9rC0bMJPwQ4mLIuw85H2EY762 BOCXJZMnpuwhpA== )
;; NSEC3 RR that matches the closest encloser (x.w.example)
;; H(x.w.example) = b4um86eghhds6nea196smvmlo4ors995
; b4um86eghhds6nea196smvmlo4ors995.example. NSEC3 1 1 12 aabbccdd ( gjeqe526plbf1g8mklp59enfd789njgi MX RRSIG )
; b4um86eghhds6nea196smvmlo4ors995.example. RRSIG NSEC3 7 2 3600 20150420235959 20051021000000 ( 40430 example. ZkPG3M32lmoHM6pa3D6gZFGB/rhL//Bs3Omh 5u4m/CUiwtblEVOaAKKZd7S959OeiX43aLX3 pOv0TSTyiTxIZg== )
;; NSEC3 RR that covers wildcard at the closest encloser (*.x.w.example)
;; H(*.x.w.example) = 92pqneegtaue7pjatc3l3qnk738c6v5m
35mthgpgcu1qg68fab165klnsnk3dpvl.example. NSEC3 1 1 12 aabbccdd ( b4um86eghhds6nea196smvmlo4ors995 NS DS RRSIG )
35mthgpgcu1qg68fab165klnsnk3dpvl.example. RRSIG NSEC3 7 2 3600 20150420235959 20051021000000 ( 40430 example. g6jPUUpduAJKRljUsN8gB4UagAX0NxY9shwQ Aynzo8EUWH+z6hEIBlUTPGj15eZll6VhQqgZ XtAIR3chwgW+SA== )
SECTION ADDITIONAL
ENTRY_END
RANGE_END
STEP 1 QUERY
ENTRY_BEGIN
REPLY RD
SECTION QUESTION
a.c.x.w.example. IN A
ENTRY_END
; recursion happens here.
STEP 10 CHECK_ANSWER
ENTRY_BEGIN
MATCH all
REPLY QR RD RA SERVFAIL
SECTION QUESTION
a.c.x.w.example. IN A
SECTION ANSWER
SECTION AUTHORITY
SECTION ADDITIONAL
ENTRY_END
SCENARIO_END
dnssecjava-1.1.3/src/test/resources/unbound/val_nsec3_b1_nameerror_nonc.rpl 0000664 0000000 0000000 00000010104 13020541473 0027127 0 ustar 00root root 0000000 0000000 ; config options
server:
trust-anchor: "example. DNSKEY 257 3 7 AwEAAcUlFV1vhmqx6NSOUOq2R/dsR7Xm 3upJ ( j7IommWSpJABVfW8Q0rOvXdM6kzt+TAu92L9 AbsUdblMFin8CVF3n4s= )"
val-override-date: "20120420235959"
target-fetch-policy: "0 0 0 0 0"
stub-zone:
name: "."
stub-addr: 193.0.14.129 # K.ROOT-SERVERS.NET.
CONFIG_END
SCENARIO_BEGIN Test validator NSEC3 B.1 name error without nc NSEC3.
; K.ROOT-SERVERS.NET.
RANGE_BEGIN 0 100
ADDRESS 193.0.14.129
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
. IN NS
SECTION ANSWER
. IN NS K.ROOT-SERVERS.NET.
SECTION ADDITIONAL
K.ROOT-SERVERS.NET. IN A 193.0.14.129
ENTRY_END
ENTRY_BEGIN
MATCH opcode subdomain
ADJUST copy_id copy_query
REPLY QR NOERROR
SECTION QUESTION
example. IN A
SECTION AUTHORITY
example. IN NS ns1.example.
; leave out to make unbound take ns1
;example. IN NS ns2.example.
SECTION ADDITIONAL
ns1.example. IN A 192.0.2.1
; leave out to make unbound take ns1
;ns2.example. IN A 192.0.2.2
ENTRY_END
RANGE_END
; ns1.example.
RANGE_BEGIN 0 100
ADDRESS 192.0.2.1
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id copy_query
REPLY QR REFUSED
SECTION QUESTION
ns1.example. IN A
SECTION ANSWER
ENTRY_END
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id copy_query
REPLY QR REFUSED
SECTION QUESTION
ns1.example. IN AAAA
SECTION ANSWER
ENTRY_END
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id copy_query
REPLY QR REFUSED
SECTION QUESTION
example. IN NS
SECTION ANSWER
ENTRY_END
; response to DNSKEY priming query
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
example. IN DNSKEY
SECTION ANSWER
example. DNSKEY 256 3 7 AwEAAaetidLzsKWUt4swWR8yu0wPHPiUi8LU ( sAD0QPWU+wzt89ep O6tHzkMBVDkC7qphQO2h TY4hHn9npWFRw5BYubE= )
example. DNSKEY 257 3 7 AwEAAcUlFV1vhmqx6NSOUOq2R/dsR7Xm3upJ ( j7IommWSpJABVfW8 Q0rOvXdM6kzt+TAu92L9 AbsUdblMFin8CVF3n4s= )
example. RRSIG DNSKEY 7 1 3600 20150420235959 ( 20051021000000 12708 example. AuU4juU9RaxescSmStrQks3Gh9FblGBlVU31 uzMZ/U/FpsUb8aC6QZS+sTsJXnLnz7flGOsm MGQZf 3bH+QsCtg== )
ENTRY_END
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR AA DO NXDOMAIN
SECTION QUESTION
a.c.x.w.example. IN A
SECTION AUTHORITY
example. SOA ns1.example. bugs.x.w.example. 1 3600 300 ( 3600000 3600 )
example. RRSIG SOA 7 1 3600 20150420235959 20051021000000 ( 40430 example. Hu25UIyNPmvPIVBrldN+9Mlp9Zql39qaUd8i q4ZLlYWfUUbbAS41pG+68z81q1xhkYAcEyHd V I2LmKusbZsT0Q== )
;; NSEC3 RR that covers the "next closer" name (c.x.w.example)
;; H(c.x.w.example) = 0va5bpr2ou0vk0lbqeeljri88laipsfh
;0p9mhaveqvm6t7vbl5lop2u3t2rp3tom.example. NSEC3 1 1 12 aabbccdd ( 2t7b4g4vsa5smi 47k61mv5bv1a22bojr MX DNSKEY NS SOA NSEC3PARAM RRSIG )
;0p9mhaveqvm6t7vbl5lop2u3t2rp3tom.example. RRSIG NSEC3 7 2 3600 20150420235959 20051021000000 ( 40430 example. OSgWSm26B+cS+dDL8b5QrWr/dEWhtCsKlwKL IBHYH6blRx K9rC0bMJPwQ4mLIuw85H2EY762 BOCXJZMnpuwhpA== )
;; NSEC3 RR that matches the closest encloser (x.w.example)
;; H(x.w.example) = b4um86eghhds6nea196smvmlo4ors995
b4um86eghhds6nea196smvmlo4ors995.example. NSEC3 1 1 12 aabbccdd ( gjeqe526plbf1g8mklp59enfd789njgi MX RRSIG )
b4um86eghhds6nea196smvmlo4ors995.example. RRSIG NSEC3 7 2 3600 20150420235959 20051021000000 ( 40430 example. ZkPG3M32lmoHM6pa3D6gZFGB/rhL//Bs3Omh 5u4m/CUi wtblEVOaAKKZd7S959OeiX43aLX3 pOv0TSTyiTxIZg== )
;; NSEC3 RR that covers wildcard at the closest encloser (*.x.w.example)
;; H(*.x.w.example) = 92pqneegtaue7pjatc3l3qnk738c6v5m
35mthgpgcu1qg68fab165klnsnk3dpvl.example. NSEC3 1 1 12 aabbccdd ( b4um86eghhds6nea196smvmlo4ors995 NS DS RRSIG )
35mthgpgcu1qg68fab165klnsnk3dpvl.example. RRSIG NSEC3 7 2 3600 20150420235959 20051021000000 ( 40430 example. g6jPUUpduAJKRljUsN8gB4UagAX0NxY9shwQ Aynzo8EUWH +z6hEIBlUTPGj15eZll6VhQqgZ XtAIR3chwgW+SA== )
SECTION ADDITIONAL
ENTRY_END
RANGE_END
STEP 1 QUERY
ENTRY_BEGIN
REPLY RD
SECTION QUESTION
a.c.x.w.example. IN A
ENTRY_END
; recursion happens here.
STEP 10 CHECK_ANSWER
ENTRY_BEGIN
MATCH all
REPLY QR RD RA SERVFAIL
SECTION QUESTION
a.c.x.w.example. IN A
SECTION ANSWER
SECTION AUTHORITY
SECTION ADDITIONAL
ENTRY_END
SCENARIO_END
dnssecjava-1.1.3/src/test/resources/unbound/val_nsec3_b1_nameerror_nowc.rpl 0000664 0000000 0000000 00000011736 13020541473 0027154 0 ustar 00root root 0000000 0000000 ; config options
server:
trust-anchor: "example. DNSKEY 257 3 7 AwEAAcUlFV1vhmqx6NSOUOq2R/dsR7Xm3upJ ( j7IommWSpJABVfW8Q0rOvXdM6kzt+TAu92L9 AbsUdblMFin8CVF3n4s= )"
val-override-date: "20120420235959"
target-fetch-policy: "0 0 0 0 0"
stub-zone:
name: "."
stub-addr: 193.0.14.129 # K.ROOT-SERVERS.NET.
CONFIG_END
SCENARIO_BEGIN Test validator NSEC3 B.1 name error without wc NSEC3.
; K.ROOT-SERVERS.NET.
RANGE_BEGIN 0 100
ADDRESS 193.0.14.129
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
. IN NS
SECTION ANSWER
. IN NS K.ROOT-SERVERS.NET.
SECTION ADDITIONAL
K.ROOT-SERVERS.NET. IN A 193.0.14.129
ENTRY_END
ENTRY_BEGIN
MATCH opcode subdomain
ADJUST copy_id copy_query
REPLY QR NOERROR
SECTION QUESTION
example. IN A
SECTION AUTHORITY
example. IN NS ns1.example.
; leave out to make unbound take ns1
;example. IN NS ns2.example.
SECTION ADDITIONAL
ns1.example. IN A 192.0.2.1
; leave out to make unbound take ns1
;ns2.example. IN A 192.0.2.2
ENTRY_END
RANGE_END
; ns1.example.
RANGE_BEGIN 0 100
ADDRESS 192.0.2.1
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id copy_query
REPLY QR REFUSED
SECTION QUESTION
ns1.example. IN A
SECTION ANSWER
ENTRY_END
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id copy_query
REPLY QR REFUSED
SECTION QUESTION
ns1.example. IN AAAA
SECTION ANSWER
ENTRY_END
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id copy_query
REPLY QR REFUSED
SECTION QUESTION
example. IN NS
SECTION ANSWER
ENTRY_END
; response to DNSKEY priming query
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
example. IN DNSKEY
SECTION ANSWER
example. DNSKEY 256 3 7 AwEAAaetidLzsKWUt4swWR8yu0wPHPiUi8LU ( sAD0QPWU+wzt89epO6tHzkMBVDkC7qphQO2h TY4hHn9npWFRw5BYubE= )
example. DNSKEY 257 3 7 AwEAAcUlFV1vhmqx6NSOUOq2R/dsR7Xm3upJ ( j7IommWSpJABVfW8Q0rOvXdM6kzt+TAu92L9 AbsUdblMFin8CVF3n4s= )
example. RRSIG DNSKEY 7 1 3600 20150420235959 ( 20051021000000 12708 example. AuU4juU9RaxescSmStrQks3Gh9FblGBlVU31 uzMZ/U/FpsUb8aC6QZS+sTsJXnLnz7flGOsm MGQZf3bH+QsCtg== )
ENTRY_END
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR AA DO NXDOMAIN
SECTION QUESTION
a.c.x.w.example. IN A
SECTION AUTHORITY
example. SOA ns1.example. bugs.x.w.example. 1 3600 300 ( 3600000 3600 )
example. RRSIG SOA 7 1 3600 20150420235959 20051021000000 ( 40430 example. Hu25UIyNPmvPIVBrldN+9Mlp9Zql39qaUd8i q4ZLlYWfUUbbAS41pG+68z81q1xhkYAcEyHd VI2LmKusbZsT0Q== )
;; NSEC3 RR that covers the "next closer" name (c.x.w.example)
;; H(c.x.w.example) = 0va5bpr2ou0vk0lbqeeljri88laipsfh
0p9mhaveqvm6t7vbl5lop2u3t2rp3tom.example. NSEC3 1 1 12 aabbccdd ( 2t7b4g4vsa5smi47k61mv5bv1a22bojr MX DNSKEY NS SOA NSEC3PARAM RRSIG )
0p9mhaveqvm6t7vbl5lop2u3t2rp3tom.example. RRSIG NSEC3 7 2 3600 20150420235959 20051021000000 ( 40430 example. OSgWSm26B+cS+dDL8b5QrWr/dEWhtCsKlwKL IBHYH6blRxK9rC0bMJPwQ4mLIuw85H2EY762 BOCXJZMnpuwhpA== )
;; NSEC3 RR that matches the closest encloser (x.w.example)
;; H(x.w.example) = b4um86eghhds6nea196smvmlo4ors995
b4um86eghhds6nea196smvmlo4ors995.example. NSEC3 1 1 12 aabbccdd ( gjeqe526plbf1g8mklp59enfd789njgi MX RRSIG )
b4um86eghhds6nea196smvmlo4ors995.example. RRSIG NSEC3 7 2 3600 20150420235959 20051021000000 ( 40430 example. ZkPG3M32lmoHM6pa3D6gZFGB/rhL//Bs3Omh 5u4m/CUiwtblEVOaAKKZd7S959OeiX43aLX3 pOv0TSTyiTxIZg== )
;; NSEC3 RR that covers wildcard at the closest encloser (*.x.w.example)
;; H(*.x.w.example) = 92pqneegtaue7pjatc3l3qnk738c6v5m
;35mthgpgcu1qg68fab165klnsnk3dpvl.example. NSEC3 1 1 12 aabbccdd ( b4um86eghhds6nea196smvmlo4ors995 NS DS RRSIG )
;35mthgpgcu1qg68fab165klnsnk3dpvl.example. RRSIG NSEC3 7 2 3600 20150420235959 20051021000000 ( 40430 example. g6jPUUpduAJKRljUsN8gB4UagAX0NxY9shwQ Aynzo8EUWH+z6hEIBlUTPGj15eZll6VhQqgZ XtAIR3chwgW+SA== )
SECTION ADDITIONAL
ENTRY_END
RANGE_END
STEP 1 QUERY
ENTRY_BEGIN
REPLY RD DO
SECTION QUESTION
a.c.x.w.example. IN A
ENTRY_END
; recursion happens here.
STEP 10 CHECK_ANSWER
ENTRY_BEGIN
MATCH all
REPLY QR RD RA SERVFAIL
SECTION QUESTION
a.c.x.w.example. IN A
SECTION ANSWER
SECTION AUTHORITY
; example. SOA ns1.example. bugs.x.w.example. 1 3600 300 ( 3600000 3600 )
; example. RRSIG SOA 7 1 3600 20150420235959 20051021000000 ( 40430 example. Hu25UIyNPmvPIVBrldN+9Mlp9Zql39qaUd8i q4ZLlYWfUUbbAS41pG+68z81q1xhkYAcEyHd VI2LmKusbZsT0Q== )
; 0p9mhaveqvm6t7vbl5lop2u3t2rp3tom.example. NSEC3 1 1 12 aabbccdd ( 2t7b4g4vsa5smi47k61mv5bv1a22bojr MX DNSKEY NS SOA NSEC3PARAM RRSIG )
; 0p9mhaveqvm6t7vbl5lop2u3t2rp3tom.example. RRSIG NSEC3 7 2 3600 20150420235959 20051021000000 ( 40430 example. OSgWSm26B+cS+dDL8b5QrWr/dEWhtCsKlwKL IBHYH6blRxK9rC0bMJPwQ4mLIuw85H2EY762 BOCXJZMnpuwhpA== )
; b4um86eghhds6nea196smvmlo4ors995.example. NSEC3 1 1 12 aabbccdd ( gjeqe526plbf1g8mklp59enfd789njgi MX RRSIG )
; b4um86eghhds6nea196smvmlo4ors995.example. RRSIG NSEC3 7 2 3600 20150420235959 20051021000000 ( 40430 example. ZkPG3M32lmoHM6pa3D6gZFGB/rhL//Bs3Omh 5u4m/CUiwtblEVOaAKKZd7S959OeiX43aLX3 pOv0TSTyiTxIZg== )
SECTION ADDITIONAL
ENTRY_END
SCENARIO_END
dnssecjava-1.1.3/src/test/resources/unbound/val_nsec3_b21_nodataent.rpl 0000664 0000000 0000000 00000006606 13020541473 0026173 0 ustar 00root root 0000000 0000000 ; config options
server:
trust-anchor: "example. DNSKEY 257 3 7 AwEAAcUlFV1vhmqx6NSOUOq2R/dsR7Xm3upJ ( j7IommWSpJABVfW8Q0rOvXdM6kzt+TAu92L9 AbsUdblMFin8CVF3n4s= )"
val-override-date: "20120420235959"
target-fetch-policy: "0 0 0 0 0"
stub-zone:
name: "."
stub-addr: 193.0.14.129 # K.ROOT-SERVERS.NET.
CONFIG_END
SCENARIO_BEGIN Test validator NSEC3 B.2.1 no data empty nonterminal.
; K.ROOT-SERVERS.NET.
RANGE_BEGIN 0 100
ADDRESS 193.0.14.129
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
. IN NS
SECTION ANSWER
. IN NS K.ROOT-SERVERS.NET.
SECTION ADDITIONAL
K.ROOT-SERVERS.NET. IN A 193.0.14.129
ENTRY_END
ENTRY_BEGIN
MATCH opcode
ADJUST copy_id copy_query
REPLY QR NOERROR
SECTION QUESTION
. IN A
SECTION AUTHORITY
example. IN NS ns1.example.
; leave out to make unbound take ns1
;example. IN NS ns2.example.
SECTION ADDITIONAL
ns1.example. IN A 192.0.2.1
; leave out to make unbound take ns1
;ns2.example. IN A 192.0.2.2
ENTRY_END
RANGE_END
; ns1.example.
RANGE_BEGIN 0 100
ADDRESS 192.0.2.1
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id copy_query
REPLY QR REFUSED
SECTION QUESTION
example. IN NS
SECTION ANSWER
ENTRY_END
; response to DNSKEY priming query
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
example. IN DNSKEY
SECTION ANSWER
example. DNSKEY 256 3 7 AwEAAaetidLzsKWUt4swWR8yu0wPHPiUi8LU ( sAD0QPWU+wzt89epO6tHzkMBVDkC7qphQO2h TY4hHn9npWFRw5BYubE= )
example. DNSKEY 257 3 7 AwEAAcUlFV1vhmqx6NSOUOq2R/dsR7Xm3upJ ( j7IommWSpJABVfW8Q0rOvXdM6kzt+TAu92L9 AbsUdblMFin8CVF3n4s= )
example. RRSIG DNSKEY 7 1 3600 20150420235959 ( 20051021000000 12708 example. AuU4juU9RaxescSmStrQks3Gh9FblGBlVU31 uzMZ/U/FpsUb8aC6QZS+sTsJXnLnz7flGOsm MGQZf3bH+QsCtg== )
ENTRY_END
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR AA DO NOERROR
SECTION QUESTION
y.w.example. IN A
SECTION AUTHORITY
example. SOA ns1.example. bugs.x.w.example. 1 3600 300 ( 3600000 3600 )
example. RRSIG SOA 7 1 3600 20150420235959 20051021000000 ( 40430 example. Hu25UIyNPmvPIVBrldN+9Mlp9Zql39qaUd8i q4ZLlYWfUUbbAS41pG+68z81q1xhkYAcEyHd VI2LmKusbZsT0Q== )
;; NSEC3 RR matches the QNAME and shows that the A type bit is not set.
ji6neoaepv8b5o6k4ev33abha8ht9fgc.example. NSEC3 1 1 12 aabbccdd ( k8udemvp1j2f7eg6jebps17vp3n8i58h )
ji6neoaepv8b5o6k4ev33abha8ht9fgc.example. RRSIG NSEC3 7 2 3600 20150420235959 20051021000000 ( 40430 example. gPkFp1s2QDQ6wQzcg1uSebZ61W33rUBDcTj7 2F3kQ490fEdp7k1BUIfbcZtPbX3YCpE+sIt0 MpzVSKfTwx4uYA== )
SECTION ADDITIONAL
ENTRY_END
RANGE_END
STEP 1 QUERY
ENTRY_BEGIN
REPLY RD DO
SECTION QUESTION
y.w.example. IN A
ENTRY_END
; recursion happens here.
STEP 10 CHECK_ANSWER
ENTRY_BEGIN
MATCH all
REPLY QR RD RA AD NOERROR
SECTION QUESTION
y.w.example. IN A
SECTION ANSWER
SECTION AUTHORITY
example. SOA ns1.example. bugs.x.w.example. 1 3600 300 ( 3600000 3600 )
example. RRSIG SOA 7 1 3600 20150420235959 20051021000000 ( 40430 example. Hu25UIyNPmvPIVBrldN+9Mlp9Zql39qaUd8i q4ZLlYWfUUbbAS41pG+68z81q1xhkYAcEyHd VI2LmKusbZsT0Q== )
ji6neoaepv8b5o6k4ev33abha8ht9fgc.example. NSEC3 1 1 12 aabbccdd ( k8udemvp1j2f7eg6jebps17vp3n8i58h )
ji6neoaepv8b5o6k4ev33abha8ht9fgc.example. RRSIG NSEC3 7 2 3600 20150420235959 20051021000000 ( 40430 example. gPkFp1s2QDQ6wQzcg1uSebZ61W33rUBDcTj7 2F3kQ490fEdp7k1BUIfbcZtPbX3YCpE+sIt0 MpzVSKfTwx4uYA== )
SECTION ADDITIONAL
ENTRY_END
SCENARIO_END
dnssecjava-1.1.3/src/test/resources/unbound/val_nsec3_b21_nodataent_wr.rpl 0000664 0000000 0000000 00000006755 13020541473 0026710 0 ustar 00root root 0000000 0000000 ; config options
server:
trust-anchor: "example. DNSKEY 257 3 7 AwEAAcUlFV1vhmqx6NSOUOq2R/dsR7Xm3upJ ( j7IommWSpJABVfW8Q0rOvXdM6kzt+TAu92L9 AbsUdblMFin8CVF3n4s= )"
val-override-date: "20120420235959"
target-fetch-policy: "0 0 0 0 0"
stub-zone:
name: "."
stub-addr: 193.0.14.129 # K.ROOT-SERVERS.NET.
CONFIG_END
SCENARIO_BEGIN Test validator NSEC3 B.2.1 no data empty nonterminal, wrong rr.
; K.ROOT-SERVERS.NET.
RANGE_BEGIN 0 100
ADDRESS 193.0.14.129
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
. IN NS
SECTION ANSWER
. IN NS K.ROOT-SERVERS.NET.
SECTION ADDITIONAL
K.ROOT-SERVERS.NET. IN A 193.0.14.129
ENTRY_END
ENTRY_BEGIN
MATCH opcode subdomain
ADJUST copy_id copy_query
REPLY QR NOERROR
SECTION QUESTION
example. IN A
SECTION AUTHORITY
example. IN NS ns1.example.
; leave out to make unbound take ns1
;example. IN NS ns2.example.
SECTION ADDITIONAL
ns1.example. IN A 192.0.2.1
; leave out to make unbound take ns1
;ns2.example. IN A 192.0.2.2
ENTRY_END
RANGE_END
; ns1.example.
RANGE_BEGIN 0 100
ADDRESS 192.0.2.1
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id copy_query
REPLY QR REFUSED
SECTION QUESTION
ns1.example. IN A
SECTION ANSWER
ENTRY_END
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id copy_query
REPLY QR REFUSED
SECTION QUESTION
ns1.example. IN AAAA
SECTION ANSWER
ENTRY_END
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id copy_query
REPLY QR REFUSED
SECTION QUESTION
example. IN NS
SECTION ANSWER
ENTRY_END
; response to DNSKEY priming query
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
example. IN DNSKEY
SECTION ANSWER
example. DNSKEY 256 3 7 AwEAAaetidLzsKWUt4swWR8yu0wPHPiUi8LU ( sAD0QPWU+wzt89epO6tHzkMBVDkC7qphQO2h TY4hHn9npWFRw5BYubE= )
example. DNSKEY 257 3 7 AwEAAcUlFV1vhmqx6NSOUOq2R/dsR7Xm3upJ ( j7IommWSpJABVfW8Q0rOvXdM6kzt+TAu92L9 AbsUdblMFin8CVF3n4s= )
example. RRSIG DNSKEY 7 1 3600 20150420235959 ( 20051021000000 12708 example. AuU4juU9RaxescSmStrQks3Gh9FblGBlVU31 uzMZ/U/FpsUb8aC6QZS+sTsJXnLnz7flGOsm MGQZf3bH+QsCtg== )
ENTRY_END
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR AA DO NOERROR
SECTION QUESTION
y.w.example. IN A
SECTION AUTHORITY
example. SOA ns1.example. bugs.x.w.example. 1 3600 300 ( 3600000 3600 )
example. RRSIG SOA 7 1 3600 20150420235959 20051021000000 ( 40430 example. Hu25UIyNPmvPIVBrldN+9Mlp9Zql39qaUd8i q4ZLlYWfUUbbAS41pG+68z81q1xhkYAcEyHd VI2LmKusbZsT0Q== )
;; NSEC3 RR matches the QNAME and shows that the A type bit is not set.
;ji6neoaepv8b5o6k4ev33abha8ht9fgc.example. NSEC3 1 1 12 aabbccdd ( k8udemvp1j2f7eg6jebps17vp3n8i58h )
;ji6neoaepv8b5o6k4ev33abha8ht9fgc.example. RRSIG NSEC3 7 2 3600 20150420235959 20051021000000 ( 40430 example. gPkFp1s2QDQ6wQzcg1uSebZ61W33rUBDcTj7 2F3kQ490fEdp7k1BUIfbcZtPbX3YCpE+sIt0 MpzVSKfTwx4uYA== )
; instead the wrong NSEC3 rr is included
35mthgpgcu1qg68fab165klnsnk3dpvl.example. NSEC3 1 1 12 aabbccdd ( b4um86eghhds6nea196smvmlo4ors995 NS DS RRSIG )
35mthgpgcu1qg68fab165klnsnk3dpvl.example. RRSIG NSEC3 7 2 3600 20150420235959 20051021000000 ( 40430 example. g6jPUUpduAJKRljUsN8gB4UagAX0NxY9shwQ Aynzo8EUWH+z6hEIBlUTPGj15eZll6VhQqgZ XtAIR3chwgW+SA== )
SECTION ADDITIONAL
ENTRY_END
RANGE_END
STEP 1 QUERY
ENTRY_BEGIN
REPLY RD
SECTION QUESTION
y.w.example. IN A
ENTRY_END
; recursion happens here.
STEP 10 CHECK_ANSWER
ENTRY_BEGIN
MATCH all
REPLY QR RD RA SERVFAIL
SECTION QUESTION
y.w.example. IN A
SECTION ANSWER
SECTION AUTHORITY
SECTION ADDITIONAL
ENTRY_END
SCENARIO_END
dnssecjava-1.1.3/src/test/resources/unbound/val_nsec3_b2_nodata.rpl 0000664 0000000 0000000 00000006612 13020541473 0025400 0 ustar 00root root 0000000 0000000 ; config options
server:
trust-anchor: "example. DNSKEY 257 3 7 AwEAAcUlFV1vhmqx6NSOUOq2R/dsR7Xm3upJ ( j7IommWSpJABVfW8Q0rOvXdM6kzt+TAu92L9 AbsUdblMFin8CVF3n4s= )"
val-override-date: "20120420235959"
target-fetch-policy: "0 0 0 0 0"
stub-zone:
name: "."
stub-addr: 193.0.14.129 # K.ROOT-SERVERS.NET.
CONFIG_END
SCENARIO_BEGIN Test validator NSEC3 B.2 no data.
; K.ROOT-SERVERS.NET.
RANGE_BEGIN 0 100
ADDRESS 193.0.14.129
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
. IN NS
SECTION ANSWER
. IN NS K.ROOT-SERVERS.NET.
SECTION ADDITIONAL
K.ROOT-SERVERS.NET. IN A 193.0.14.129
ENTRY_END
ENTRY_BEGIN
MATCH opcode
ADJUST copy_id copy_query
REPLY QR NOERROR
SECTION QUESTION
. IN A
SECTION AUTHORITY
example. IN NS ns1.example.
; leave out to make unbound take ns1
;example. IN NS ns2.example.
SECTION ADDITIONAL
ns1.example. IN A 192.0.2.1
; leave out to make unbound take ns1
;ns2.example. IN A 192.0.2.2
ENTRY_END
RANGE_END
; ns1.example.
RANGE_BEGIN 0 100
ADDRESS 192.0.2.1
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id copy_query
REPLY QR REFUSED
SECTION QUESTION
example. IN NS
SECTION ANSWER
ENTRY_END
; response to DNSKEY priming query
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
example. IN DNSKEY
SECTION ANSWER
example. DNSKEY 256 3 7 AwEAAaetidLzsKWUt4swWR8yu0wPHPiUi8LU ( sAD0QPWU+wzt89epO6tHzkMBVDkC7qphQO2h TY4hHn9npWFRw5BYubE= )
example. DNSKEY 257 3 7 AwEAAcUlFV1vhmqx6NSOUOq2R/dsR7Xm3upJ ( j7IommWSpJABVfW8Q0rOvXdM6kzt+TAu92L9 AbsUdblMFin8CVF3n4s= )
example. RRSIG DNSKEY 7 1 3600 20150420235959 ( 20051021000000 12708 example. AuU4juU9RaxescSmStrQks3Gh9FblGBlVU31 uzMZ/U/FpsUb8aC6QZS+sTsJXnLnz7flGOsm MGQZf3bH+QsCtg== )
ENTRY_END
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR AA DO NOERROR
SECTION QUESTION
ns1.example. IN MX
SECTION AUTHORITY
example. SOA ns1.example. bugs.x.w.example. 1 3600 300 ( 3600000 3600 )
example. RRSIG SOA 7 1 3600 20150420235959 20051021000000 ( 40430 example. Hu25UIyNPmvPIVBrldN+9Mlp9Zql39qaUd8i q4ZLlYWfUUbbAS41pG+68z81q1xhkYAcEyHd VI2LmKusbZsT0Q== )
;; NSEC3 RR matches the QNAME and shows that the MX type bit is not set.
2t7b4g4vsa5smi47k61mv5bv1a22bojr.example. NSEC3 1 1 12 aabbccdd ( 2vptu5timamqttgl4luu9kg21e0aor3s A RRSIG )
2t7b4g4vsa5smi47k61mv5bv1a22bojr.example. RRSIG NSEC3 7 2 3600 20150420235959 20051021000000 ( 40430 example. OmBvJ1Vgg1hCKMXHFiNeIYHK9XVW0iLDLwJN 4TFoNxZuP03gAXEI634YwOc4YBNITrj413iq NI6mRk/r1dOSUw== )
SECTION ADDITIONAL
ENTRY_END
RANGE_END
STEP 1 QUERY
ENTRY_BEGIN
REPLY RD DO
SECTION QUESTION
ns1.example. IN MX
ENTRY_END
; recursion happens here.
STEP 10 CHECK_ANSWER
ENTRY_BEGIN
MATCH all
REPLY QR RD RA AD NOERROR
SECTION QUESTION
ns1.example. IN MX
SECTION ANSWER
SECTION AUTHORITY
example. SOA ns1.example. bugs.x.w.example. 1 3600 300 ( 3600000 3600 )
example. RRSIG SOA 7 1 3600 20150420235959 20051021000000 ( 40430 example. Hu25UIyNPmvPIVBrldN+9Mlp9Zql39qaUd8i q4ZLlYWfUUbbAS41pG+68z81q1xhkYAcEyHd VI2LmKusbZsT0Q== )
2t7b4g4vsa5smi47k61mv5bv1a22bojr.example. NSEC3 1 1 12 aabbccdd ( 2vptu5timamqttgl4luu9kg21e0aor3s A RRSIG )
2t7b4g4vsa5smi47k61mv5bv1a22bojr.example. RRSIG NSEC3 7 2 3600 20150420235959 20051021000000 ( 40430 example. OmBvJ1Vgg1hCKMXHFiNeIYHK9XVW0iLDLwJN 4TFoNxZuP03gAXEI634YwOc4YBNITrj413iq NI6mRk/r1dOSUw== )
SECTION ADDITIONAL
ENTRY_END
SCENARIO_END
dnssecjava-1.1.3/src/test/resources/unbound/val_nsec3_b2_nodata_nons.rpl 0000664 0000000 0000000 00000006445 13020541473 0026441 0 ustar 00root root 0000000 0000000 ; config options
server:
trust-anchor: "example. DNSKEY 257 3 7 AwEAAcUlFV1vhmqx6NSOUOq2R/dsR7Xm3upJ ( j7IommWSpJABVfW8Q0rOvXdM6kzt+TAu92L9 AbsUdblMFin8CVF3n4s= )"
val-override-date: "20120420235959"
target-fetch-policy: "0 0 0 0 0"
stub-zone:
name: "."
stub-addr: 193.0.14.129 # K.ROOT-SERVERS.NET.
CONFIG_END
SCENARIO_BEGIN Test validator NSEC3 B.2 no data, without NSEC3.
; K.ROOT-SERVERS.NET.
RANGE_BEGIN 0 100
ADDRESS 193.0.14.129
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
. IN NS
SECTION ANSWER
. IN NS K.ROOT-SERVERS.NET.
SECTION ADDITIONAL
K.ROOT-SERVERS.NET. IN A 193.0.14.129
ENTRY_END
ENTRY_BEGIN
MATCH opcode subdomain
ADJUST copy_id copy_query
REPLY QR NOERROR
SECTION QUESTION
example. IN A
SECTION AUTHORITY
example. IN NS ns1.example.
; leave out to make unbound take ns1
;example. IN NS ns2.example.
SECTION ADDITIONAL
ns1.example. IN A 192.0.2.1
; leave out to make unbound take ns1
;ns2.example. IN A 192.0.2.2
ENTRY_END
RANGE_END
; ns1.example.
RANGE_BEGIN 0 100
ADDRESS 192.0.2.1
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id copy_query
REPLY QR REFUSED
SECTION QUESTION
ns1.example. IN A
SECTION ANSWER
ENTRY_END
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id copy_query
REPLY QR REFUSED
SECTION QUESTION
ns1.example. IN AAAA
SECTION ANSWER
ENTRY_END
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id copy_query
REPLY QR REFUSED
SECTION QUESTION
example. IN NS
SECTION ANSWER
ENTRY_END
; response to DNSKEY priming query
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
example. IN DNSKEY
SECTION ANSWER
example. DNSKEY 256 3 7 AwEAAaetidLzsKWUt4swWR8yu0wPHPiUi8LU ( sAD0QPWU+wzt89epO6tHzkMBVDkC7qphQO2h TY4hHn9npWFRw5BYubE= )
example. DNSKEY 257 3 7 AwEAAcUlFV1vhmqx6NSOUOq2R/dsR7Xm3upJ ( j7IommWSpJABVfW8Q0rOvXdM6kzt+TAu92L9 AbsUdblMFin8CVF3n4s= )
example. RRSIG DNSKEY 7 1 3600 20150420235959 ( 20051021000000 12708 example. AuU4juU9RaxescSmStrQks3Gh9FblGBlVU31 uzMZ/U/FpsUb8aC6QZS+sTsJXnLnz7flGOsm MGQZf3bH+QsCtg== )
ENTRY_END
; response to DS query
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR AA DO NOERROR
SECTION QUESTION
ns1.example. IN DS
ENTRY_END
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR AA DO NOERROR
SECTION QUESTION
ns1.example. IN MX
SECTION AUTHORITY
example. SOA ns1.example. bugs.x.w.example. 1 3600 300 ( 3600000 3600 )
example. RRSIG SOA 7 1 3600 20150420235959 20051021000000 ( 40430 example. Hu25UIyNPmvPIVBrldN+9Mlp9Zql39qaUd8i q4ZLlYWfUUbbAS41pG+68z81q1xhkYAcEyHd VI2LmKusbZsT0Q== )
;; NSEC3 RR matches the QNAME and shows that the MX type bit is not set.
;2t7b4g4vsa5smi47k61mv5bv1a22bojr.example. NSEC3 1 1 12 aabbccdd ( 2vptu5timamqttgl4luu9kg21e0aor3s A RRSIG )
;2t7b4g4vsa5smi47k61mv5bv1a22bojr.example. RRSIG NSEC3 7 2 3600 20150420235959 20051021000000 ( 40430 example. OmBvJ1Vgg1hCKMXHFiNeIYHK9XVW0iLDLwJN 4TFoNxZuP03gAXEI634YwOc4YBNITrj413iq NI6mRk/r1dOSUw== )
SECTION ADDITIONAL
ENTRY_END
RANGE_END
STEP 1 QUERY
ENTRY_BEGIN
REPLY RD DO
SECTION QUESTION
ns1.example. IN MX
ENTRY_END
; recursion happens here.
STEP 10 CHECK_ANSWER
ENTRY_BEGIN
MATCH all
REPLY QR RD RA SERVFAIL
SECTION QUESTION
ns1.example. IN MX
SECTION ANSWER
SECTION AUTHORITY
SECTION ADDITIONAL
ENTRY_END
SCENARIO_END
dnssecjava-1.1.3/src/test/resources/unbound/val_nsec3_b3_optout.rpl 0000664 0000000 0000000 00000013417 13020541473 0025466 0 ustar 00root root 0000000 0000000 ; config options
server:
trust-anchor: "example. DNSKEY 257 3 7 AwEAAcUlFV1vhmqx6NSOUOq2R/dsR7Xm3upJ ( j7IommWSpJABVfW8Q0rOvXdM6kzt+TAu92L9 AbsUdblMFin8CVF3n4s= )"
val-override-date: "20120420235959"
target-fetch-policy: "0 0 0 0 0"
stub-zone:
name: "."
stub-addr: 193.0.14.129 # K.ROOT-SERVERS.NET.
CONFIG_END
SCENARIO_BEGIN Test validator NSEC3 B.3 referral to optout unsigned zone.
; K.ROOT-SERVERS.NET.
RANGE_BEGIN 0 100
ADDRESS 193.0.14.129
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
. IN NS
SECTION ANSWER
. IN NS K.ROOT-SERVERS.NET.
SECTION ADDITIONAL
K.ROOT-SERVERS.NET. IN A 193.0.14.129
ENTRY_END
ENTRY_BEGIN
MATCH opcode
ADJUST copy_id copy_query
REPLY QR NOERROR
SECTION QUESTION
. IN A
SECTION AUTHORITY
example. IN NS ns1.example.
; leave out to make unbound take ns1
;example. IN NS ns2.example.
SECTION ADDITIONAL
ns1.example. IN A 192.0.2.1
; leave out to make unbound take ns1
;ns2.example. IN A 192.0.2.2
ENTRY_END
RANGE_END
; ns1.example.
RANGE_BEGIN 0 100
ADDRESS 192.0.2.1
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id copy_query
REPLY QR REFUSED
SECTION QUESTION
example. IN NS
SECTION ANSWER
ENTRY_END
; response to DNSKEY priming query
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
example. IN DNSKEY
SECTION ANSWER
example. DNSKEY 256 3 7 AwEAAaetidLzsKWUt4swWR8yu0wPHPiUi8LU ( sAD0QPWU+wzt89epO6tHzkMBVDkC7qphQO2h TY4hHn9npWFRw5BYubE= )
example. DNSKEY 257 3 7 AwEAAcUlFV1vhmqx6NSOUOq2R/dsR7Xm3upJ ( j7IommWSpJABVfW8Q0rOvXdM6kzt+TAu92L9 AbsUdblMFin8CVF3n4s= )
example. RRSIG DNSKEY 7 1 3600 20150420235959 ( 20051021000000 12708 example. AuU4juU9RaxescSmStrQks3Gh9FblGBlVU31 uzMZ/U/FpsUb8aC6QZS+sTsJXnLnz7flGOsm MGQZf3bH+QsCtg== )
ENTRY_END
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR AA DO NOERROR
SECTION QUESTION
mc.c.example. IN MX
SECTION AUTHORITY
c.example. NS ns1.c.example.
c.example. NS ns2.c.example.
;; NSEC3 RR that covers the "next closer" name (c.example)
;; H(c.example) = 4g6p9u5gvfshp30pqecj98b3maqbn1ck
35mthgpgcu1qg68fab165klnsnk3dpvl.example. NSEC3 1 1 12 aabbccdd ( b4um86eghhds6nea196smvmlo4ors995 NS DS RRSIG )
35mthgpgcu1qg68fab165klnsnk3dpvl.example. RRSIG NSEC3 7 2 3600 20150420235959 20051021000000 ( 40430 example. g6jPUUpduAJKRljUsN8gB4UagAX0NxY9shwQ Aynzo8EUWH+z6hEIBlUTPGj15eZll6VhQqgZ XtAIR3chwgW+SA== )
;; NSEC3 RR that matches the closest encloser (example)
;; H(example) = 0p9mhaveqvm6t7vbl5lop2u3t2rp3tom
0p9mhaveqvm6t7vbl5lop2u3t2rp3tom.example. NSEC3 1 1 12 aabbccdd ( 2t7b4g4vsa5smi47k61mv5bv1a22bojr MX DNSKEY NS SOA NSEC3PARAM RRSIG )
0p9mhaveqvm6t7vbl5lop2u3t2rp3tom.example. RRSIG NSEC3 7 2 3600 20150420235959 20051021000000 ( 40430 example. OSgWSm26B+cS+dDL8b5QrWr/dEWhtCsKlwKL IBHYH6blRxK9rC0bMJPwQ4mLIuw85H2EY762 BOCXJZMnpuwhpA== )
SECTION ADDITIONAL
ns1.c.example. A 192.0.2.7
ns2.c.example. A 192.0.2.8
ENTRY_END
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR AA DO NOERROR
SECTION QUESTION
c.example. IN DS
SECTION AUTHORITY
;; NSEC3 RR that covers the "next closer" name (c.example)
;; H(c.example) = 4g6p9u5gvfshp30pqecj98b3maqbn1ck
35mthgpgcu1qg68fab165klnsnk3dpvl.example. NSEC3 1 1 12 aabbccdd ( b4um86eghhds6nea196smvmlo4ors995 NS DS RRSIG )
35mthgpgcu1qg68fab165klnsnk3dpvl.example. RRSIG NSEC3 7 2 3600 20150420235959 20051021000000 ( 40430 example. g6jPUUpduAJKRljUsN8gB4UagAX0NxY9shwQ Aynzo8EUWH+z6hEIBlUTPGj15eZll6VhQqgZ XtAIR3chwgW+SA== )
;; NSEC3 RR that matches the closest encloser (example)
;; H(example) = 0p9mhaveqvm6t7vbl5lop2u3t2rp3tom
0p9mhaveqvm6t7vbl5lop2u3t2rp3tom.example. NSEC3 1 1 12 aabbccdd ( 2t7b4g4vsa5smi47k61mv5bv1a22bojr MX DNSKEY NS SOA NSEC3PARAM RRSIG )
0p9mhaveqvm6t7vbl5lop2u3t2rp3tom.example. RRSIG NSEC3 7 2 3600 20150420235959 20051021000000 ( 40430 example. OSgWSm26B+cS+dDL8b5QrWr/dEWhtCsKlwKL IBHYH6blRxK9rC0bMJPwQ4mLIuw85H2EY762 BOCXJZMnpuwhpA== )
ENTRY_END
RANGE_END
; ns1.c.example.
RANGE_BEGIN 0 100
ADDRESS 192.0.2.7
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR AA NOERROR
SECTION QUESTION
c.example. IN NS
SECTION ANSWER
c.example. NS ns1.c.example.
c.example. NS ns2.c.example.
SECTION ADDITIONAL
ns1.c.example. A 192.0.2.7
ns2.c.example. A 192.0.2.8
ENTRY_END
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR AA NOERROR
SECTION QUESTION
mc.c.example. IN MX
SECTION ANSWER
mc.c.example. IN MX 50 mx.c.example.
SECTION AUTHORITY
c.example. NS ns1.c.example.
c.example. NS ns2.c.example.
SECTION ADDITIONAL
ns1.c.example. A 192.0.2.7
ns2.c.example. A 192.0.2.8
ENTRY_END
RANGE_END
; ns2.c.example.
RANGE_BEGIN 0 100
ADDRESS 192.0.2.8
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR AA NOERROR
SECTION QUESTION
c.example. IN NS
SECTION ANSWER
c.example. NS ns1.c.example.
c.example. NS ns2.c.example.
SECTION ADDITIONAL
ns1.c.example. A 192.0.2.7
ns2.c.example. A 192.0.2.8
ENTRY_END
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR AA NOERROR
SECTION QUESTION
mc.c.example. IN MX
SECTION ANSWER
mc.c.example. IN MX 50 mx.c.example.
SECTION AUTHORITY
c.example. NS ns1.c.example.
c.example. NS ns2.c.example.
SECTION ADDITIONAL
ns1.c.example. A 192.0.2.7
ns2.c.example. A 192.0.2.8
ENTRY_END
RANGE_END
STEP 1 QUERY
ENTRY_BEGIN
REPLY RD DO
SECTION QUESTION
mc.c.example. IN MX
ENTRY_END
; recursion happens here.
STEP 10 CHECK_ANSWER
ENTRY_BEGIN
MATCH all
REPLY QR RD RA NOERROR
SECTION QUESTION
mc.c.example. IN MX
SECTION ANSWER
mc.c.example. IN MX 50 mx.c.example.
SECTION AUTHORITY
c.example. NS ns1.c.example.
c.example. NS ns2.c.example.
SECTION ADDITIONAL
ns1.c.example. A 192.0.2.7
ns2.c.example. A 192.0.2.8
ENTRY_END
SCENARIO_END
dnssecjava-1.1.3/src/test/resources/unbound/val_nsec3_b3_optout_negcache.rpl 0000664 0000000 0000000 00000013530 13020541473 0027277 0 ustar 00root root 0000000 0000000 ; config options
server:
trust-anchor: "example. DNSKEY 257 3 7 AwEAAcUlFV1vhmqx6NSOUOq2R/dsR7Xm3upJ ( j7IommWSpJABVfW8Q0rOvXdM6kzt+TAu92L9 AbsUdblMFin8CVF3n4s= )"
val-override-date: "20120420235959"
target-fetch-policy: "0 0 0 0 0"
stub-zone:
name: "."
stub-addr: 193.0.14.129 # K.ROOT-SERVERS.NET.
CONFIG_END
SCENARIO_BEGIN Test validator NSEC3 B.3 referral optout with negative cache.
; K.ROOT-SERVERS.NET.
RANGE_BEGIN 0 100
ADDRESS 193.0.14.129
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
. IN NS
SECTION ANSWER
. IN NS K.ROOT-SERVERS.NET.
SECTION ADDITIONAL
K.ROOT-SERVERS.NET. IN A 193.0.14.129
ENTRY_END
ENTRY_BEGIN
MATCH opcode
ADJUST copy_id copy_query
REPLY QR NOERROR
SECTION QUESTION
. IN A
SECTION AUTHORITY
example. IN NS ns1.example.
; leave out to make unbound take ns1
;example. IN NS ns2.example.
SECTION ADDITIONAL
ns1.example. IN A 192.0.2.1
; leave out to make unbound take ns1
;ns2.example. IN A 192.0.2.2
ENTRY_END
RANGE_END
; ns1.example.
RANGE_BEGIN 0 100
ADDRESS 192.0.2.1
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id copy_query
REPLY QR REFUSED
SECTION QUESTION
example. IN NS
SECTION ANSWER
ENTRY_END
; response to DNSKEY priming query
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
example. IN DNSKEY
SECTION ANSWER
example. DNSKEY 256 3 7 AwEAAaetidLzsKWUt4swWR8yu0wPHPiUi8LU ( sAD0QPWU+wzt89epO6tHzkMBVDkC7qphQO2h TY4hHn9npWFRw5BYubE= )
example. DNSKEY 257 3 7 AwEAAcUlFV1vhmqx6NSOUOq2R/dsR7Xm3upJ ( j7IommWSpJABVfW8Q0rOvXdM6kzt+TAu92L9 AbsUdblMFin8CVF3n4s= )
example. RRSIG DNSKEY 7 1 3600 20150420235959 ( 20051021000000 12708 example. AuU4juU9RaxescSmStrQks3Gh9FblGBlVU31 uzMZ/U/FpsUb8aC6QZS+sTsJXnLnz7flGOsm MGQZf3bH+QsCtg== )
ENTRY_END
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR AA DO NOERROR
SECTION QUESTION
mc.c.example. IN MX
SECTION AUTHORITY
c.example. NS ns1.c.example.
c.example. NS ns2.c.example.
;; NSEC3 RR that covers the "next closer" name (c.example)
;; H(c.example) = 4g6p9u5gvfshp30pqecj98b3maqbn1ck
35mthgpgcu1qg68fab165klnsnk3dpvl.example. NSEC3 1 1 12 aabbccdd ( b4um86eghhds6nea196smvmlo4ors995 NS DS RRSIG )
35mthgpgcu1qg68fab165klnsnk3dpvl.example. RRSIG NSEC3 7 2 3600 20150420235959 20051021000000 ( 40430 example. g6jPUUpduAJKRljUsN8gB4UagAX0NxY9shwQ Aynzo8EUWH+z6hEIBlUTPGj15eZll6VhQqgZ XtAIR3chwgW+SA== )
;; NSEC3 RR that matches the closest encloser (example)
;; H(example) = 0p9mhaveqvm6t7vbl5lop2u3t2rp3tom
0p9mhaveqvm6t7vbl5lop2u3t2rp3tom.example. NSEC3 1 1 12 aabbccdd ( 2t7b4g4vsa5smi47k61mv5bv1a22bojr MX DNSKEY NS SOA NSEC3PARAM RRSIG )
0p9mhaveqvm6t7vbl5lop2u3t2rp3tom.example. RRSIG NSEC3 7 2 3600 20150420235959 20051021000000 ( 40430 example. OSgWSm26B+cS+dDL8b5QrWr/dEWhtCsKlwKL IBHYH6blRxK9rC0bMJPwQ4mLIuw85H2EY762 BOCXJZMnpuwhpA== )
SECTION ADDITIONAL
ns1.c.example. A 192.0.2.7
ns2.c.example. A 192.0.2.8
ENTRY_END
; DS must be gotten from neg cache
; ENTRY_BEGIN
; MATCH opcode qtype qname
; ADJUST copy_id
; REPLY QR AA DO NOERROR
; SECTION QUESTION
; c.example. IN DS
; SECTION AUTHORITY
; ;; NSEC3 RR that covers the "next closer" name (c.example)
; ;; H(c.example) = 4g6p9u5gvfshp30pqecj98b3maqbn1ck
; 35mthgpgcu1qg68fab165klnsnk3dpvl.example. NSEC3 1 1 12 aabbccdd ( b4um86eghhds6nea196smvmlo4ors995 NS DS RRSIG )
; 35mthgpgcu1qg68fab165klnsnk3dpvl.example. RRSIG NSEC3 7 2 3600 20150420235959 20051021000000 ( 40430 example. g6jPUUpduAJKRljUsN8gB4UagAX0NxY9shwQ Aynzo8EUWH+z6hEIBlUTPGj15eZll6VhQqgZ XtAIR3chwgW+SA== )
;
; ;; NSEC3 RR that matches the closest encloser (example)
; ;; H(example) = 0p9mhaveqvm6t7vbl5lop2u3t2rp3tom
; 0p9mhaveqvm6t7vbl5lop2u3t2rp3tom.example. NSEC3 1 1 12 aabbccdd ( 2t7b4g4vsa5smi47k61mv5bv1a22bojr MX DNSKEY NS SOA NSEC3PARAM RRSIG )
; 0p9mhaveqvm6t7vbl5lop2u3t2rp3tom.example. RRSIG NSEC3 7 2 3600 20150420235959 20051021000000 ( 40430 example. OSgWSm26B+cS+dDL8b5QrWr/dEWhtCsKlwKL IBHYH6blRxK9rC0bMJPwQ4mLIuw85H2EY762 BOCXJZMnpuwhpA== )
; ENTRY_END
RANGE_END
; ns1.c.example.
RANGE_BEGIN 0 100
ADDRESS 192.0.2.7
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR AA NOERROR
SECTION QUESTION
c.example. IN NS
SECTION ANSWER
c.example. NS ns1.c.example.
c.example. NS ns2.c.example.
SECTION ADDITIONAL
ns1.c.example. A 192.0.2.7
ns2.c.example. A 192.0.2.8
ENTRY_END
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR AA NOERROR
SECTION QUESTION
mc.c.example. IN MX
SECTION ANSWER
mc.c.example. IN MX 50 mx.c.example.
SECTION AUTHORITY
c.example. NS ns1.c.example.
c.example. NS ns2.c.example.
SECTION ADDITIONAL
ns1.c.example. A 192.0.2.7
ns2.c.example. A 192.0.2.8
ENTRY_END
RANGE_END
; ns2.c.example.
RANGE_BEGIN 0 100
ADDRESS 192.0.2.8
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR AA NOERROR
SECTION QUESTION
c.example. IN NS
SECTION ANSWER
c.example. NS ns1.c.example.
c.example. NS ns2.c.example.
SECTION ADDITIONAL
ns1.c.example. A 192.0.2.7
ns2.c.example. A 192.0.2.8
ENTRY_END
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR AA NOERROR
SECTION QUESTION
mc.c.example. IN MX
SECTION ANSWER
mc.c.example. IN MX 50 mx.c.example.
SECTION AUTHORITY
c.example. NS ns1.c.example.
c.example. NS ns2.c.example.
SECTION ADDITIONAL
ns1.c.example. A 192.0.2.7
ns2.c.example. A 192.0.2.8
ENTRY_END
RANGE_END
STEP 1 QUERY
ENTRY_BEGIN
REPLY RD DO
SECTION QUESTION
mc.c.example. IN MX
ENTRY_END
; recursion happens here.
STEP 10 CHECK_ANSWER
ENTRY_BEGIN
MATCH all
REPLY QR RD RA NOERROR
SECTION QUESTION
mc.c.example. IN MX
SECTION ANSWER
mc.c.example. IN MX 50 mx.c.example.
SECTION AUTHORITY
c.example. NS ns1.c.example.
c.example. NS ns2.c.example.
SECTION ADDITIONAL
ns1.c.example. A 192.0.2.7
ns2.c.example. A 192.0.2.8
ENTRY_END
SCENARIO_END
dnssecjava-1.1.3/src/test/resources/unbound/val_nsec3_b3_optout_noce.rpl 0000664 0000000 0000000 00000014537 13020541473 0026476 0 ustar 00root root 0000000 0000000 ; config options
server:
trust-anchor: "example. DNSKEY 257 3 7 AwEAAcUlFV1vhmqx6NSOUOq2R/dsR7Xm3upJ ( j7IommWSpJABVfW8Q0rOvXdM6kzt+TAu92L9 AbsUdblMFin8CVF3n4s= )"
val-override-date: "20120420235959"
target-fetch-policy: "0 0 0 0 0"
stub-zone:
name: "."
stub-addr: 193.0.14.129 # K.ROOT-SERVERS.NET.
CONFIG_END
SCENARIO_BEGIN Test validator NSEC3 B.3 optout unsigned, without ce.
; K.ROOT-SERVERS.NET.
RANGE_BEGIN 0 100
ADDRESS 193.0.14.129
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
. IN NS
SECTION ANSWER
. IN NS K.ROOT-SERVERS.NET.
SECTION ADDITIONAL
K.ROOT-SERVERS.NET. IN A 193.0.14.129
ENTRY_END
ENTRY_BEGIN
MATCH opcode subdomain
ADJUST copy_id copy_query
REPLY QR NOERROR
SECTION QUESTION
example. IN A
SECTION AUTHORITY
example. IN NS ns1.example.
; leave out to make unbound take ns1
;example. IN NS ns2.example.
SECTION ADDITIONAL
ns1.example. IN A 192.0.2.1
; leave out to make unbound take ns1
;ns2.example. IN A 192.0.2.2
ENTRY_END
RANGE_END
; ns1.example.
RANGE_BEGIN 0 100
ADDRESS 192.0.2.1
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id copy_query
REPLY QR REFUSED
SECTION QUESTION
ns1.example. IN A
SECTION ANSWER
ENTRY_END
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id copy_query
REPLY QR REFUSED
SECTION QUESTION
ns1.example. IN AAAA
SECTION ANSWER
ENTRY_END
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id copy_query
REPLY QR REFUSED
SECTION QUESTION
example. IN NS
SECTION ANSWER
ENTRY_END
; response to DNSKEY priming query
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
example. IN DNSKEY
SECTION ANSWER
example. DNSKEY 256 3 7 AwEAAaetidLzsKWUt4swWR8yu0wPHPiUi8LU ( sAD0QPWU+wzt89epO6tHzkMBVDkC7qphQO2h TY4hHn9npWFRw5BYubE= )
example. DNSKEY 257 3 7 AwEAAcUlFV1vhmqx6NSOUOq2R/dsR7Xm3upJ ( j7IommWSpJABVfW8Q0rOvXdM6kzt+TAu92L9 AbsUdblMFin8CVF3n4s= )
example. RRSIG DNSKEY 7 1 3600 20150420235959 ( 20051021000000 12708 example. AuU4juU9RaxescSmStrQks3Gh9FblGBlVU31 uzMZ/U/FpsUb8aC6QZS+sTsJXnLnz7flGOsm MGQZf3bH+QsCtg== )
ENTRY_END
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR AA DO NOERROR
SECTION QUESTION
c.example. IN DS
SECTION AUTHORITY
;; NSEC3 RR that covers the "next closer" name (c.example)
;; H(c.example) = 4g6p9u5gvfshp30pqecj98b3maqbn1ck
35mthgpgcu1qg68fab165klnsnk3dpvl.example. NSEC3 1 1 12 aabbccdd ( b4um86eghhds6nea196smvmlo4ors995 NS DS RRSIG )
35mthgpgcu1qg68fab165klnsnk3dpvl.example. RRSIG NSEC3 7 2 3600 20150420235959 20051021000000 ( 40430 example. g6jPUUpduAJKRljUsN8gB4UagAX0NxY9shwQ Aynzo8EUWH+z6hEIBlUTPGj15eZll6VhQqgZ XtAIR3chwgW+SA== )
;; NSEC3 RR that matches the closest encloser (example)
;; H(example) = 0p9mhaveqvm6t7vbl5lop2u3t2rp3tom
;0p9mhaveqvm6t7vbl5lop2u3t2rp3tom.example. NSEC3 1 1 12 aabbccdd ( 2t7b4g4vsa5smi47k61mv5bv1a22bojr MX DNSKEY NS SOA NSEC3PARAM RRSIG )
;0p9mhaveqvm6t7vbl5lop2u3t2rp3tom.example. RRSIG NSEC3 7 2 3600 20150420235959 20051021000000 ( 40430 example. OSgWSm26B+cS+dDL8b5QrWr/dEWhtCsKlwKL IBHYH6blRxK9rC0bMJPwQ4mLIuw85H2EY762 BOCXJZMnpuwhpA== )
ENTRY_END
ENTRY_BEGIN
MATCH opcode subdomain
ADJUST copy_id copy_query
REPLY QR AA DO NOERROR
SECTION QUESTION
c.example. IN MX
SECTION AUTHORITY
c.example. NS ns1.c.example.
c.example. NS ns2.c.example.
;; NSEC3 RR that covers the "next closer" name (c.example)
;; H(c.example) = 4g6p9u5gvfshp30pqecj98b3maqbn1ck
35mthgpgcu1qg68fab165klnsnk3dpvl.example. NSEC3 1 1 12 aabbccdd ( b4um86eghhds6nea196smvmlo4ors995 NS DS RRSIG )
35mthgpgcu1qg68fab165klnsnk3dpvl.example. RRSIG NSEC3 7 2 3600 20150420235959 20051021000000 ( 40430 example. g6jPUUpduAJKRljUsN8gB4UagAX0NxY9shwQ Aynzo8EUWH+z6hEIBlUTPGj15eZll6VhQqgZ XtAIR3chwgW+SA== )
;; NSEC3 RR that matches the closest encloser (example)
;; H(example) = 0p9mhaveqvm6t7vbl5lop2u3t2rp3tom
; 0p9mhaveqvm6t7vbl5lop2u3t2rp3tom.example. NSEC3 1 1 12 aabbccdd ( 2t7b4g4vsa5smi47k61mv5bv1a22bojr MX DNSKEY NS SOA NSEC3PARAM RRSIG )
; 0p9mhaveqvm6t7vbl5lop2u3t2rp3tom.example. RRSIG NSEC3 7 2 3600 20150420235959 20051021000000 ( 40430 example. OSgWSm26B+cS+dDL8b5QrWr/dEWhtCsKlwKL IBHYH6blRxK9rC0bMJPwQ4mLIuw85H2EY762 BOCXJZMnpuwhpA== )
SECTION ADDITIONAL
ns1.c.example. A 192.0.2.7
ns2.c.example. A 192.0.2.8
ENTRY_END
RANGE_END
; ns1.c.example.
RANGE_BEGIN 0 100
ADDRESS 192.0.2.7
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR AA REFUSED
SECTION QUESTION
ns1.c.example. IN AAAA
ENTRY_END
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR AA REFUSED
SECTION QUESTION
ns2.c.example. IN AAAA
ENTRY_END
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR AA NOERROR
SECTION QUESTION
c.example. IN NS
SECTION ANSWER
c.example. NS ns1.c.example.
c.example. NS ns2.c.example.
SECTION ADDITIONAL
ns1.c.example. A 192.0.2.7
ns2.c.example. A 192.0.2.8
ENTRY_END
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR AA NOERROR
SECTION QUESTION
mc.c.example. IN MX
SECTION ANSWER
mc.c.example. IN MX 50 mx.c.example.
SECTION AUTHORITY
c.example. NS ns1.c.example.
c.example. NS ns2.c.example.
SECTION ADDITIONAL
ns1.c.example. A 192.0.2.7
ns2.c.example. A 192.0.2.8
ENTRY_END
RANGE_END
; ns2.c.example.
RANGE_BEGIN 0 100
ADDRESS 192.0.2.8
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR AA REFUSED
SECTION QUESTION
ns1.c.example. IN AAAA
ENTRY_END
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR AA REFUSED
SECTION QUESTION
ns2.c.example. IN AAAA
ENTRY_END
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR AA NOERROR
SECTION QUESTION
c.example. IN NS
SECTION ANSWER
c.example. NS ns1.c.example.
c.example. NS ns2.c.example.
SECTION ADDITIONAL
ns1.c.example. A 192.0.2.7
ns2.c.example. A 192.0.2.8
ENTRY_END
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR AA NOERROR
SECTION QUESTION
mc.c.example. IN MX
SECTION ANSWER
mc.c.example. IN MX 50 mx.c.example.
SECTION AUTHORITY
c.example. NS ns1.c.example.
c.example. NS ns2.c.example.
SECTION ADDITIONAL
ns1.c.example. A 192.0.2.7
ns2.c.example. A 192.0.2.8
ENTRY_END
RANGE_END
STEP 1 QUERY
ENTRY_BEGIN
REPLY RD
SECTION QUESTION
mc.c.example. IN MX
ENTRY_END
; recursion happens here.
STEP 10 CHECK_ANSWER
ENTRY_BEGIN
MATCH all
REPLY QR RD RA SERVFAIL
SECTION QUESTION
mc.c.example. IN MX
ENTRY_END
SCENARIO_END
dnssecjava-1.1.3/src/test/resources/unbound/val_nsec3_b3_optout_nonc.rpl 0000664 0000000 0000000 00000014540 13020541473 0026501 0 ustar 00root root 0000000 0000000 ; config options
server:
trust-anchor: "example. DNSKEY 257 3 7 AwEAAcUlFV1vhmqx6NSOUOq2R/dsR7Xm3upJ ( j7IommWSpJABVfW8Q0rOvXdM6kzt+TAu92L9 AbsUdblMFin8CVF3n4s= )"
val-override-date: "20120420235959"
target-fetch-policy: "0 0 0 0 0"
stub-zone:
name: "."
stub-addr: 193.0.14.129 # K.ROOT-SERVERS.NET.
CONFIG_END
SCENARIO_BEGIN Test validator NSEC3 B.3 optout unsigned, without nc.
; K.ROOT-SERVERS.NET.
RANGE_BEGIN 0 100
ADDRESS 193.0.14.129
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
. IN NS
SECTION ANSWER
. IN NS K.ROOT-SERVERS.NET.
SECTION ADDITIONAL
K.ROOT-SERVERS.NET. IN A 193.0.14.129
ENTRY_END
ENTRY_BEGIN
MATCH opcode subdomain
ADJUST copy_id copy_query
REPLY QR NOERROR
SECTION QUESTION
example. IN A
SECTION AUTHORITY
example. IN NS ns1.example.
; leave out to make unbound take ns1
;example. IN NS ns2.example.
SECTION ADDITIONAL
ns1.example. IN A 192.0.2.1
; leave out to make unbound take ns1
;ns2.example. IN A 192.0.2.2
ENTRY_END
RANGE_END
; ns1.example.
RANGE_BEGIN 0 100
ADDRESS 192.0.2.1
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id copy_query
REPLY QR REFUSED
SECTION QUESTION
ns1.example. IN A
SECTION ANSWER
ENTRY_END
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id copy_query
REPLY QR REFUSED
SECTION QUESTION
ns1.example. IN AAAA
SECTION ANSWER
ENTRY_END
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id copy_query
REPLY QR REFUSED
SECTION QUESTION
example. IN NS
SECTION ANSWER
ENTRY_END
; response to DNSKEY priming query
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
example. IN DNSKEY
SECTION ANSWER
example. DNSKEY 256 3 7 AwEAAaetidLzsKWUt4swWR8yu0wPHPiUi8LU ( sAD0QPWU+wzt89epO6tHzkMBVDkC7qphQO2h TY4hHn9npWFRw5BYubE= )
example. DNSKEY 257 3 7 AwEAAcUlFV1vhmqx6NSOUOq2R/dsR7Xm3upJ ( j7IommWSpJABVfW8Q0rOvXdM6kzt+TAu92L9 AbsUdblMFin8CVF3n4s= )
example. RRSIG DNSKEY 7 1 3600 20150420235959 ( 20051021000000 12708 example. AuU4juU9RaxescSmStrQks3Gh9FblGBlVU31 uzMZ/U/FpsUb8aC6QZS+sTsJXnLnz7flGOsm MGQZf3bH+QsCtg== )
ENTRY_END
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR AA DO NOERROR
SECTION QUESTION
c.example. IN DS
SECTION AUTHORITY
;; NSEC3 RR that covers the "next closer" name (c.example)
;; H(c.example) = 4g6p9u5gvfshp30pqecj98b3maqbn1ck
;35mthgpgcu1qg68fab165klnsnk3dpvl.example. NSEC3 1 1 12 aabbccdd ( b4um86eghhds6nea196smvmlo4ors995 NS DS RRSIG )
;35mthgpgcu1qg68fab165klnsnk3dpvl.example. RRSIG NSEC3 7 2 3600 20150420235959 20051021000000 ( 40430 example. g6jPUUpduAJKRljUsN8gB4UagAX0NxY9shwQ Aynzo8EUWH+z6hEIBlUTPGj15eZll6VhQqgZ XtAIR3chwgW+SA== )
;; NSEC3 RR that matches the closest encloser (example)
;; H(example) = 0p9mhaveqvm6t7vbl5lop2u3t2rp3tom
0p9mhaveqvm6t7vbl5lop2u3t2rp3tom.example. NSEC3 1 1 12 aabbccdd ( 2t7b4g4vsa5smi47k61mv5bv1a22bojr MX DNSKEY NS SOA NSEC3PARAM RRSIG )
0p9mhaveqvm6t7vbl5lop2u3t2rp3tom.example. RRSIG NSEC3 7 2 3600 20150420235959 20051021000000 ( 40430 example. OSgWSm26B+cS+dDL8b5QrWr/dEWhtCsKlwKL IBHYH6blRxK9rC0bMJPwQ4mLIuw85H2EY762 BOCXJZMnpuwhpA== )
ENTRY_END
ENTRY_BEGIN
MATCH opcode subdomain
ADJUST copy_id copy_query
REPLY QR AA DO NOERROR
SECTION QUESTION
c.example. IN MX
SECTION AUTHORITY
c.example. NS ns1.c.example.
c.example. NS ns2.c.example.
;; NSEC3 RR that covers the "next closer" name (c.example)
;; H(c.example) = 4g6p9u5gvfshp30pqecj98b3maqbn1ck
; 35mthgpgcu1qg68fab165klnsnk3dpvl.example. NSEC3 1 1 12 aabbccdd ( b4um86eghhds6nea196smvmlo4ors995 NS DS RRSIG )
; 35mthgpgcu1qg68fab165klnsnk3dpvl.example. RRSIG NSEC3 7 2 3600 20150420235959 20051021000000 ( 40430 example. g6jPUUpduAJKRljUsN8gB4UagAX0NxY9shwQ Aynzo8EUWH+z6hEIBlUTPGj15eZll6VhQqgZ XtAIR3chwgW+SA== )
;; NSEC3 RR that matches the closest encloser (example)
;; H(example) = 0p9mhaveqvm6t7vbl5lop2u3t2rp3tom
0p9mhaveqvm6t7vbl5lop2u3t2rp3tom.example. NSEC3 1 1 12 aabbccdd ( 2t7b4g4vsa5smi47k61mv5bv1a22bojr MX DNSKEY NS SOA NSEC3PARAM RRSIG )
0p9mhaveqvm6t7vbl5lop2u3t2rp3tom.example. RRSIG NSEC3 7 2 3600 20150420235959 20051021000000 ( 40430 example. OSgWSm26B+cS+dDL8b5QrWr/dEWhtCsKlwKL IBHYH6blRxK9rC0bMJPwQ4mLIuw85H2EY762 BOCXJZMnpuwhpA== )
SECTION ADDITIONAL
ns1.c.example. A 192.0.2.7
ns2.c.example. A 192.0.2.8
ENTRY_END
RANGE_END
; ns1.c.example.
RANGE_BEGIN 0 100
ADDRESS 192.0.2.7
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR AA REFUSED
SECTION QUESTION
ns1.c.example. IN AAAA
ENTRY_END
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR AA REFUSED
SECTION QUESTION
ns2.c.example. IN AAAA
ENTRY_END
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR AA NOERROR
SECTION QUESTION
c.example. IN NS
SECTION ANSWER
c.example. NS ns1.c.example.
c.example. NS ns2.c.example.
SECTION ADDITIONAL
ns1.c.example. A 192.0.2.7
ns2.c.example. A 192.0.2.8
ENTRY_END
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR AA NOERROR
SECTION QUESTION
mc.c.example. IN MX
SECTION ANSWER
mc.c.example. IN MX 50 mx.c.example.
SECTION AUTHORITY
c.example. NS ns1.c.example.
c.example. NS ns2.c.example.
SECTION ADDITIONAL
ns1.c.example. A 192.0.2.7
ns2.c.example. A 192.0.2.8
ENTRY_END
RANGE_END
; ns2.c.example.
RANGE_BEGIN 0 100
ADDRESS 192.0.2.8
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR AA REFUSED
SECTION QUESTION
ns1.c.example. IN AAAA
ENTRY_END
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR AA REFUSED
SECTION QUESTION
ns2.c.example. IN AAAA
ENTRY_END
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR AA NOERROR
SECTION QUESTION
c.example. IN NS
SECTION ANSWER
c.example. NS ns1.c.example.
c.example. NS ns2.c.example.
SECTION ADDITIONAL
ns1.c.example. A 192.0.2.7
ns2.c.example. A 192.0.2.8
ENTRY_END
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR AA NOERROR
SECTION QUESTION
mc.c.example. IN MX
SECTION ANSWER
mc.c.example. IN MX 50 mx.c.example.
SECTION AUTHORITY
c.example. NS ns1.c.example.
c.example. NS ns2.c.example.
SECTION ADDITIONAL
ns1.c.example. A 192.0.2.7
ns2.c.example. A 192.0.2.8
ENTRY_END
RANGE_END
STEP 1 QUERY
ENTRY_BEGIN
REPLY RD
SECTION QUESTION
mc.c.example. IN MX
ENTRY_END
; recursion happens here.
STEP 10 CHECK_ANSWER
ENTRY_BEGIN
MATCH all
REPLY QR RD RA SERVFAIL
SECTION QUESTION
mc.c.example. IN MX
ENTRY_END
SCENARIO_END
dnssecjava-1.1.3/src/test/resources/unbound/val_nsec3_b4_wild.rpl 0000664 0000000 0000000 00000012123 13020541473 0025065 0 ustar 00root root 0000000 0000000 ; config options
server:
trust-anchor: "example. DNSKEY 257 3 7 AwEAAcUlFV1vhmqx6NSOUOq2R/dsR7Xm3upJ ( j7IommWSpJABVfW8Q0rOvXdM6kzt+TAu92L9 AbsUdblMFin8CVF3n4s= )"
val-override-date: "20120420235959"
target-fetch-policy: "0 0 0 0 0"
stub-zone:
name: "."
stub-addr: 193.0.14.129 # K.ROOT-SERVERS.NET.
CONFIG_END
SCENARIO_BEGIN Test validator NSEC3 B.4 wildcard expansion.
; K.ROOT-SERVERS.NET.
RANGE_BEGIN 0 100
ADDRESS 193.0.14.129
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
. IN NS
SECTION ANSWER
. IN NS K.ROOT-SERVERS.NET.
SECTION ADDITIONAL
K.ROOT-SERVERS.NET. IN A 193.0.14.129
ENTRY_END
ENTRY_BEGIN
MATCH opcode
ADJUST copy_id copy_query
REPLY QR NOERROR
SECTION QUESTION
. IN A
SECTION AUTHORITY
example. IN NS ns1.example.
; leave out to make unbound take ns1
;example. IN NS ns2.example.
SECTION ADDITIONAL
ns1.example. IN A 192.0.2.1
; leave out to make unbound take ns1
;ns2.example. IN A 192.0.2.2
ENTRY_END
RANGE_END
; ns1.example.
RANGE_BEGIN 0 100
ADDRESS 192.0.2.1
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id copy_query
REPLY QR REFUSED
SECTION QUESTION
example. IN NS
SECTION ANSWER
ENTRY_END
; response to DNSKEY priming query
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
example. IN DNSKEY
SECTION ANSWER
example. DNSKEY 256 3 7 AwEAAaetidLzsKWUt4swWR8yu0wPHPiUi8LU ( sAD0QPWU+wzt89epO6tHzkMBVDkC7qphQO2h TY4hHn9npWFRw5BYubE= )
example. DNSKEY 257 3 7 AwEAAcUlFV1vhmqx6NSOUOq2R/dsR7Xm3upJ ( j7IommWSpJABVfW8Q0rOvXdM6kzt+TAu92L9 AbsUdblMFin8CVF3n4s= )
example. RRSIG DNSKEY 7 1 3600 20150420235959 ( 20051021000000 12708 example. AuU4juU9RaxescSmStrQks3Gh9FblGBlVU31 uzMZ/U/FpsUb8aC6QZS+sTsJXnLnz7flGOsm MGQZf3bH+QsCtg== )
ENTRY_END
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR AA DO NOERROR
SECTION QUESTION
a.z.w.example. IN MX
SECTION ANSWER
a.z.w.example. MX 1 ai.example.
a.z.w.example. RRSIG MX 7 2 3600 20150420235959 20051021000000 ( 40430 example. CikebjQwGQPwijVcxgcZcSJKtfynugtlBiKb 9FcBTrmOoyQ4InoWVudhCWsh/URX3lc4WRUM ivEBP6+4KS3ldA== )
SECTION AUTHORITY
example. NS ns1.example.
example. NS ns2.example.
example. RRSIG NS 7 1 3600 20150420235959 20051021000000 ( 40430 example. PVOgtMK1HHeSTau+HwDWC8Ts+6C8qtqd4pQJ qOtdEVgg+MA+ai4fWDEhu3qHJyLcQ9tbD2vv CnMXjtz6SyObxA== )
;; NSEC3 RR that covers the "next closer" name (z.w.example)
;; H(z.w.example) = qlu7gtfaeh0ek0c05ksfhdpbcgglbe03
q04jkcevqvmu85r014c7dkba38o0ji5r.example. NSEC3 1 1 12 aabbccdd ( r53bq7cc2uvmubfu5ocmm6pers9tk9en A RRSIG )
q04jkcevqvmu85r014c7dkba38o0ji5r.example. RRSIG NSEC3 7 2 3600 20150420235959 20051021000000 ( 40430 example. hV5I89b+4FHJDATp09g4bbN0R1F845CaXpL3 ZxlMKimoPAyqletMlEWwLfFia7sdpSzn+ZlN NlkxWcLsIlMmUg== )
SECTION ADDITIONAL
ai.example. A 192.0.2.9
ai.example. RRSIG A 7 2 3600 20150420235959 20051021000000 ( 40430 example. hVe+wKYMlObTRPhX0NL67GxeZfdxqr/QeR6F tfdAj5+FgYxyzPEjIzvKWy00hWIl6wD3Vws+ rznEn8sQ64UdqA== )
ai.example. AAAA 2001:db8:0:0:0:0:f00:baa9
ai.example. RRSIG AAAA 7 2 3600 20150420235959 20051021000000 ( 40430 example. LcdxKaCB5bGZwPDg+3JJ4O02zoMBrjxqlf6W uaHQZZfTUpb9Nf2nxFGe2XRPfR5tpJT6GdRG cHueLuXkMjBArQ== )
ENTRY_END
; catch glue queries
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR AA DO NOERROR
SECTION QUESTION
ns2.example. IN A
SECTION ANSWER
; nothing to make sure the ns1 server is used for queries.
ENTRY_END
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR AA DO NOERROR
SECTION QUESTION
ns2.example. IN AAAA
SECTION ANSWER
; nothing to make sure the ns1 server is used for queries.
ENTRY_END
RANGE_END
STEP 1 QUERY
ENTRY_BEGIN
REPLY RD DO
SECTION QUESTION
a.z.w.example. IN MX
ENTRY_END
; recursion happens here.
STEP 10 CHECK_ANSWER
ENTRY_BEGIN
MATCH all
REPLY QR RD RA NOERROR
SECTION QUESTION
a.z.w.example. IN MX
SECTION ANSWER
a.z.w.example. MX 1 ai.example.
a.z.w.example. RRSIG MX 7 2 3600 20150420235959 20051021000000 ( 40430 example. CikebjQwGQPwijVcxgcZcSJKtfynugtlBiKb 9FcBTrmOoyQ4InoWVudhCWsh/URX3lc4WRUM ivEBP6+4KS3ldA== )
SECTION AUTHORITY
example. NS ns1.example.
example. NS ns2.example.
example. RRSIG NS 7 1 3600 20150420235959 20051021000000 ( 40430 example. PVOgtMK1HHeSTau+HwDWC8Ts+6C8qtqd4pQJ qOtdEVgg+MA+ai4fWDEhu3qHJyLcQ9tbD2vv CnMXjtz6SyObxA== )
q04jkcevqvmu85r014c7dkba38o0ji5r.example. NSEC3 1 1 12 aabbccdd ( r53bq7cc2uvmubfu5ocmm6pers9tk9en A RRSIG )
q04jkcevqvmu85r014c7dkba38o0ji5r.example. RRSIG NSEC3 7 2 3600 20150420235959 20051021000000 ( 40430 example. hV5I89b+4FHJDATp09g4bbN0R1F845CaXpL3 ZxlMKimoPAyqletMlEWwLfFia7sdpSzn+ZlN NlkxWcLsIlMmUg== )
SECTION ADDITIONAL
ai.example. A 192.0.2.9
ai.example. AAAA 2001:db8:0:0:0:0:f00:baa9
ai.example. RRSIG A 7 2 3600 20150420235959 20051021000000 ( 40430 example. hVe+wKYMlObTRPhX0NL67GxeZfdxqr/QeR6F tfdAj5+FgYxyzPEjIzvKWy00hWIl6wD3Vws+ rznEn8sQ64UdqA== )
ai.example. RRSIG AAAA 7 2 3600 20150420235959 20051021000000 ( 40430 example. LcdxKaCB5bGZwPDg+3JJ4O02zoMBrjxqlf6W uaHQZZfTUpb9Nf2nxFGe2XRPfR5tpJT6GdRG cHueLuXkMjBArQ== )
ENTRY_END
SCENARIO_END
dnssecjava-1.1.3/src/test/resources/unbound/val_nsec3_b4_wild_wr.rpl 0000664 0000000 0000000 00000011035 13020541473 0025576 0 ustar 00root root 0000000 0000000 ; config options
server:
trust-anchor: "example. DNSKEY 257 3 7 AwEAAcUlFV1vhmqx6NSOUOq2R/dsR7Xm3upJ ( j7IommWSpJABVfW8Q0rOvXdM6kzt+TAu92L9 AbsUdblMFin8CVF3n4s= )"
val-override-date: "20120420235959"
target-fetch-policy: "0 0 0 0 0"
stub-zone:
name: "."
stub-addr: 193.0.14.129 # K.ROOT-SERVERS.NET.
CONFIG_END
SCENARIO_BEGIN Test validator NSEC3 B.4 wildcard expansion, wrong NSEC3.
; K.ROOT-SERVERS.NET.
RANGE_BEGIN 0 100
ADDRESS 193.0.14.129
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
. IN NS
SECTION ANSWER
. IN NS K.ROOT-SERVERS.NET.
SECTION ADDITIONAL
K.ROOT-SERVERS.NET. IN A 193.0.14.129
ENTRY_END
ENTRY_BEGIN
MATCH opcode subdomain
ADJUST copy_id copy_query
REPLY QR NOERROR
SECTION QUESTION
example. IN A
SECTION AUTHORITY
example. IN NS ns1.example.
; leave out to make unbound take ns1
;example. IN NS ns2.example.
SECTION ADDITIONAL
ns1.example. IN A 192.0.2.1
; leave out to make unbound take ns1
;ns2.example. IN A 192.0.2.2
ENTRY_END
RANGE_END
; ns1.example.
RANGE_BEGIN 0 100
ADDRESS 192.0.2.1
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id copy_query
REPLY QR REFUSED
SECTION QUESTION
ns1.example. IN A
SECTION ANSWER
ENTRY_END
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id copy_query
REPLY QR REFUSED
SECTION QUESTION
ns1.example. IN AAAA
SECTION ANSWER
ENTRY_END
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id copy_query
REPLY QR REFUSED
SECTION QUESTION
example. IN NS
SECTION ANSWER
ENTRY_END
; response to DNSKEY priming query
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
example. IN DNSKEY
SECTION ANSWER
example. DNSKEY 256 3 7 AwEAAaetidLzsKWUt4swWR8yu0wPHPiUi8LU ( sAD0QPWU+wzt89epO6tHzkMBVDkC7qphQO2h TY4hHn9npWFRw5BYubE= )
example. DNSKEY 257 3 7 AwEAAcUlFV1vhmqx6NSOUOq2R/dsR7Xm3upJ ( j7IommWSpJABVfW8Q0rOvXdM6kzt+TAu92L9 AbsUdblMFin8CVF3n4s= )
example. RRSIG DNSKEY 7 1 3600 20150420235959 ( 20051021000000 12708 example. AuU4juU9RaxescSmStrQks3Gh9FblGBlVU31 uzMZ/U/FpsUb8aC6QZS+sTsJXnLnz7flGOsm MGQZf3bH+QsCtg== )
ENTRY_END
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR AA DO NOERROR
SECTION QUESTION
a.z.w.example. IN MX
SECTION ANSWER
a.z.w.example. MX 1 ai.example.
a.z.w.example. RRSIG MX 7 2 3600 20150420235959 20051021000000 ( 40430 example. CikebjQwGQPwijVcxgcZcSJKtfynugtlBiKb 9FcBTrmOoyQ4InoWVudhCWsh/URX3lc4WRUM ivEBP6+4KS3ldA== )
SECTION AUTHORITY
example. NS ns1.example.
example. NS ns2.example.
example. RRSIG NS 7 1 3600 20150420235959 20051021000000 ( 40430 example. PVOgtMK1HHeSTau+HwDWC8Ts+6C8qtqd4pQJ qOtdEVgg+MA+ai4fWDEhu3qHJyLcQ9tbD2vv CnMXjtz6SyObxA== )
;; NSEC3 RR that covers the "next closer" name (z.w.example)
;; H(z.w.example) = qlu7gtfaeh0ek0c05ksfhdpbcgglbe03
;q04jkcevqvmu85r014c7dkba38o0ji5r.example. NSEC3 1 1 12 aabbccdd ( r53bq7cc2uvmubfu5ocmm6pers9tk9en A RRSIG )
;q04jkcevqvmu85r014c7dkba38o0ji5r.example. RRSIG NSEC3 7 2 3600 20150420235959 20051021000000 ( 40430 example. hV5I89b+4FHJDATp09g4bbN0R1F845CaXpL3 ZxlMKimoPAyqletMlEWwLfFia7sdpSzn+ZlN NlkxWcLsIlMmUg== )
; The wrong NSEC3 here
k8udemvp1j2f7eg6jebps17vp3n8i58h.example. NSEC3 1 1 12 aabbccdd ( kohar7mbb8dc2ce8a9qvl8hon4k53uhi )
k8udemvp1j2f7eg6jebps17vp3n8i58h.example. RRSIG NSEC3 7 2 3600 20150420235959 20051021000000 ( 40430 example. FtXGbvF0+wf8iWkyo73enAuVx03klN+pILBK S6qCcftVtfH4yVzsEZquJ27NHR7ruxJWDNMt Otx7w9WfcIg62A== )
SECTION ADDITIONAL
ai.example. A 192.0.2.9
ai.example. RRSIG A 7 2 3600 20150420235959 20051021000000 ( 40430 example. hVe+wKYMlObTRPhX0NL67GxeZfdxqr/QeR6F tfdAj5+FgYxyzPEjIzvKWy00hWIl6wD3Vws+ rznEn8sQ64UdqA== )
ai.example. AAAA 2001:db8:0:0:0:0:f00:baa9
ai.example. RRSIG AAAA 7 2 3600 20150420235959 20051021000000 ( 40430 example. LcdxKaCB5bGZwPDg+3JJ4O02zoMBrjxqlf6W uaHQZZfTUpb9Nf2nxFGe2XRPfR5tpJT6GdRG cHueLuXkMjBArQ== )
ENTRY_END
; catch glue queries
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR AA DO NOERROR
SECTION QUESTION
ns2.example. IN A
SECTION ANSWER
; nothing to make sure the ns1 server is used for queries.
ENTRY_END
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR AA DO NOERROR
SECTION QUESTION
ns2.example. IN AAAA
SECTION ANSWER
; nothing to make sure the ns1 server is used for queries.
ENTRY_END
RANGE_END
STEP 1 QUERY
ENTRY_BEGIN
REPLY RD
SECTION QUESTION
a.z.w.example. IN MX
ENTRY_END
; recursion happens here.
STEP 10 CHECK_ANSWER
ENTRY_BEGIN
MATCH all
REPLY QR RD RA SERVFAIL
SECTION QUESTION
a.z.w.example. IN MX
SECTION ANSWER
SECTION AUTHORITY
SECTION ADDITIONAL
ENTRY_END
SCENARIO_END
dnssecjava-1.1.3/src/test/resources/unbound/val_nsec3_b5_wcnodata.rpl 0000664 0000000 0000000 00000012471 13020541473 0025735 0 ustar 00root root 0000000 0000000 ; config options
server:
trust-anchor: "example. DNSKEY 257 3 7 AwEAAcUlFV1vhmqx6NSOUOq2R/dsR7Xm3upJ ( j7IommWSpJABVfW8Q0rOvXdM6kzt+TAu92L9 AbsUdblMFin8CVF3n4s= )"
val-override-date: "20120420235959"
target-fetch-policy: "0 0 0 0 0"
stub-zone:
name: "."
stub-addr: 193.0.14.129 # K.ROOT-SERVERS.NET.
CONFIG_END
SCENARIO_BEGIN Test validator NSEC3 B.5 wildcard nodata.
; K.ROOT-SERVERS.NET.
RANGE_BEGIN 0 100
ADDRESS 193.0.14.129
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
. IN NS
SECTION ANSWER
. IN NS K.ROOT-SERVERS.NET.
SECTION ADDITIONAL
K.ROOT-SERVERS.NET. IN A 193.0.14.129
ENTRY_END
ENTRY_BEGIN
MATCH opcode
ADJUST copy_id copy_query
REPLY QR NOERROR
SECTION QUESTION
. IN A
SECTION AUTHORITY
example. IN NS ns1.example.
; leave out to make unbound take ns1
;example. IN NS ns2.example.
SECTION ADDITIONAL
ns1.example. IN A 192.0.2.1
; leave out to make unbound take ns1
;ns2.example. IN A 192.0.2.2
ENTRY_END
RANGE_END
; ns1.example.
RANGE_BEGIN 0 100
ADDRESS 192.0.2.1
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id copy_query
REPLY QR REFUSED
SECTION QUESTION
example. IN NS
SECTION ANSWER
ENTRY_END
; response to DNSKEY priming query
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
example. IN DNSKEY
SECTION ANSWER
example. DNSKEY 256 3 7 AwEAAaetidLzsKWUt4swWR8yu0wPHPiUi8LU ( sAD0QPWU+wzt89epO6tHzkMBVDkC7qphQO2h TY4hHn9npWFRw5BYubE= )
example. DNSKEY 257 3 7 AwEAAcUlFV1vhmqx6NSOUOq2R/dsR7Xm3upJ ( j7IommWSpJABVfW8Q0rOvXdM6kzt+TAu92L9 AbsUdblMFin8CVF3n4s= )
example. RRSIG DNSKEY 7 1 3600 20150420235959 ( 20051021000000 12708 example. AuU4juU9RaxescSmStrQks3Gh9FblGBlVU31 uzMZ/U/FpsUb8aC6QZS+sTsJXnLnz7flGOsm MGQZf3bH+QsCtg== )
ENTRY_END
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR AA DO NOERROR
SECTION QUESTION
a.z.w.example. IN AAAA
SECTION ANSWER
SECTION AUTHORITY
example. SOA ns1.example. bugs.x.w.example. 1 3600 300 ( 3600000 3600 )
example. RRSIG SOA 7 1 3600 20150420235959 20051021000000 ( 40430 example. Hu25UIyNPmvPIVBrldN+9Mlp9Zql39qaUd8i q4ZLlYWfUUbbAS41pG+68z81q1xhkYAcEyHd VI2LmKusbZsT0Q== )
;; NSEC3 RR that matches the closest encloser (w.example)
;; H(w.example) = k8udemvp1j2f7eg6jebps17vp3n8i58h
k8udemvp1j2f7eg6jebps17vp3n8i58h.example. NSEC3 1 1 12 aabbccdd ( kohar7mbb8dc2ce8a9qvl8hon4k53uhi )
k8udemvp1j2f7eg6jebps17vp3n8i58h.example. RRSIG NSEC3 7 2 3600 20150420235959 20051021000000 ( 40430 example. FtXGbvF0+wf8iWkyo73enAuVx03klN+pILBK S6qCcftVtfH4yVzsEZquJ27NHR7ruxJWDNMt Otx7w9WfcIg62A== )
;; NSEC3 RR that covers the "next closer" name (z.w.example)
;; H(z.w.example) = qlu7gtfaeh0ek0c05ksfhdpbcgglbe03
q04jkcevqvmu85r014c7dkba38o0ji5r.example. NSEC3 1 1 12 aabbccdd ( r53bq7cc2uvmubfu5ocmm6pers9tk9en A RRSIG )
q04jkcevqvmu85r014c7dkba38o0ji5r.example. RRSIG NSEC3 7 2 3600 20150420235959 20051021000000 ( 40430 example. hV5I89b+4FHJDATp09g4bbN0R1F845CaXpL3 ZxlMKimoPAyqletMlEWwLfFia7sdpSzn+ZlN NlkxWcLsIlMmUg== )
;; NSEC3 RR that matches a wildcard at the closest encloser.
;; H(*.w.example) = r53bq7cc2uvmubfu5ocmm6pers9tk9en
r53bq7cc2uvmubfu5ocmm6pers9tk9en.example. NSEC3 1 1 12 aabbccdd ( t644ebqk9bibcna874givr6joj62mlhv MX RRSIG )
r53bq7cc2uvmubfu5ocmm6pers9tk9en.example. RRSIG NSEC3 7 2 3600 20150420235959 20051021000000 ( 40430 example. aupviViruXs4bDg9rCbezzBMf9h1ZlDvbW/C ZFKulIGXXLj8B/fsDJarXVDA9bnUoRhEbKp+ HF1FWKW7RIJdtQ== )
SECTION ADDITIONAL
ENTRY_END
; catch glue queries
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR AA DO NOERROR
SECTION QUESTION
ns2.example. IN A
SECTION ANSWER
; nothing to make sure the ns1 server is used for queries.
ENTRY_END
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR AA DO NOERROR
SECTION QUESTION
ns2.example. IN AAAA
SECTION ANSWER
; nothing to make sure the ns1 server is used for queries.
ENTRY_END
RANGE_END
STEP 1 QUERY
ENTRY_BEGIN
REPLY RD DO
SECTION QUESTION
a.z.w.example. IN AAAA
ENTRY_END
; recursion happens here.
STEP 10 CHECK_ANSWER
ENTRY_BEGIN
MATCH all
REPLY QR RD RA NOERROR
SECTION QUESTION
a.z.w.example. IN AAAA
SECTION ANSWER
SECTION AUTHORITY
example. SOA ns1.example. bugs.x.w.example. 1 3600 300 ( 3600000 3600 )
example. RRSIG SOA 7 1 3600 20150420235959 20051021000000 ( 40430 example. Hu25UIyNPmvPIVBrldN+9Mlp9Zql39qaUd8i q4ZLlYWfUUbbAS41pG+68z81q1xhkYAcEyHd VI2LmKusbZsT0Q== )
k8udemvp1j2f7eg6jebps17vp3n8i58h.example. NSEC3 1 1 12 aabbccdd ( kohar7mbb8dc2ce8a9qvl8hon4k53uhi )
k8udemvp1j2f7eg6jebps17vp3n8i58h.example. RRSIG NSEC3 7 2 3600 20150420235959 20051021000000 ( 40430 example. FtXGbvF0+wf8iWkyo73enAuVx03klN+pILBK S6qCcftVtfH4yVzsEZquJ27NHR7ruxJWDNMt Otx7w9WfcIg62A== )
q04jkcevqvmu85r014c7dkba38o0ji5r.example. NSEC3 1 1 12 aabbccdd ( r53bq7cc2uvmubfu5ocmm6pers9tk9en A RRSIG )
q04jkcevqvmu85r014c7dkba38o0ji5r.example. RRSIG NSEC3 7 2 3600 20150420235959 20051021000000 ( 40430 example. hV5I89b+4FHJDATp09g4bbN0R1F845CaXpL3 ZxlMKimoPAyqletMlEWwLfFia7sdpSzn+ZlN NlkxWcLsIlMmUg== )
r53bq7cc2uvmubfu5ocmm6pers9tk9en.example. NSEC3 1 1 12 aabbccdd ( t644ebqk9bibcna874givr6joj62mlhv MX RRSIG )
r53bq7cc2uvmubfu5ocmm6pers9tk9en.example. RRSIG NSEC3 7 2 3600 20150420235959 20051021000000 ( 40430 example. aupviViruXs4bDg9rCbezzBMf9h1ZlDvbW/C ZFKulIGXXLj8B/fsDJarXVDA9bnUoRhEbKp+ HF1FWKW7RIJdtQ== )
SECTION ADDITIONAL
ENTRY_END
SCENARIO_END
dnssecjava-1.1.3/src/test/resources/unbound/val_nsec3_b5_wcnodata_noce.rpl 0000664 0000000 0000000 00000010704 13020541473 0026736 0 ustar 00root root 0000000 0000000 ; config options
server:
trust-anchor: "example. DNSKEY 257 3 7 AwEAAcUlFV1vhmqx6NSOUOq2R/dsR7Xm3upJ ( j7IommWSpJABVfW8Q0rOvXdM6kzt+TAu92L9 AbsUdblMFin8CVF3n4s= )"
val-override-date: "20120420235959"
target-fetch-policy: "0 0 0 0 0"
stub-zone:
name: "."
stub-addr: 193.0.14.129 # K.ROOT-SERVERS.NET.
CONFIG_END
SCENARIO_BEGIN Test validator NSEC3 B.5 wildcard nodata, without ce.
; K.ROOT-SERVERS.NET.
RANGE_BEGIN 0 100
ADDRESS 193.0.14.129
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
. IN NS
SECTION ANSWER
. IN NS K.ROOT-SERVERS.NET.
SECTION ADDITIONAL
K.ROOT-SERVERS.NET. IN A 193.0.14.129
ENTRY_END
ENTRY_BEGIN
MATCH opcode subdomain
ADJUST copy_id copy_query
REPLY QR NOERROR
SECTION QUESTION
example. IN A
SECTION AUTHORITY
example. IN NS ns1.example.
; leave out to make unbound take ns1
;example. IN NS ns2.example.
SECTION ADDITIONAL
ns1.example. IN A 192.0.2.1
; leave out to make unbound take ns1
;ns2.example. IN A 192.0.2.2
ENTRY_END
RANGE_END
; ns1.example.
RANGE_BEGIN 0 100
ADDRESS 192.0.2.1
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id copy_query
REPLY QR REFUSED
SECTION QUESTION
ns1.example. IN A
SECTION ANSWER
ENTRY_END
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id copy_query
REPLY QR REFUSED
SECTION QUESTION
ns1.example. IN AAAA
SECTION ANSWER
ENTRY_END
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id copy_query
REPLY QR REFUSED
SECTION QUESTION
example. IN NS
SECTION ANSWER
ENTRY_END
; response to DNSKEY priming query
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
example. IN DNSKEY
SECTION ANSWER
example. DNSKEY 256 3 7 AwEAAaetidLzsKWUt4swWR8yu0wPHPiUi8LU ( sAD0QPWU+wzt89epO6tHzkMBVDkC7qphQO2h TY4hHn9npWFRw5BYubE= )
example. DNSKEY 257 3 7 AwEAAcUlFV1vhmqx6NSOUOq2R/dsR7Xm3upJ ( j7IommWSpJABVfW8Q0rOvXdM6kzt+TAu92L9 AbsUdblMFin8CVF3n4s= )
example. RRSIG DNSKEY 7 1 3600 20150420235959 ( 20051021000000 12708 example. AuU4juU9RaxescSmStrQks3Gh9FblGBlVU31 uzMZ/U/FpsUb8aC6QZS+sTsJXnLnz7flGOsm MGQZf3bH+QsCtg== )
ENTRY_END
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR AA DO NOERROR
SECTION QUESTION
a.z.w.example. IN AAAA
SECTION ANSWER
SECTION AUTHORITY
example. SOA ns1.example. bugs.x.w.example. 1 3600 300 ( 3600000 3600 )
example. RRSIG SOA 7 1 3600 20150420235959 20051021000000 ( 40430 example. Hu25UIyNPmvPIVBrldN+9Mlp9Zql39qaUd8i q4ZLlYWfUUbbAS41pG+68z81q1xhkYAcEyHd VI2LmKusbZsT0Q== )
;; NSEC3 RR that matches the closest encloser (w.example)
;; H(w.example) = k8udemvp1j2f7eg6jebps17vp3n8i58h
;k8udemvp1j2f7eg6jebps17vp3n8i58h.example. NSEC3 1 1 12 aabbccdd ( kohar7mbb8dc2ce8a9qvl8hon4k53uhi )
;k8udemvp1j2f7eg6jebps17vp3n8i58h.example. RRSIG NSEC3 7 2 3600 20150420235959 20051021000000 ( 40430 example. FtXGbvF0+wf8iWkyo73enAuVx03klN+pILBK S6qCcftVtfH4yVzsEZquJ27NHR7ruxJWDNMt Otx7w9WfcIg62A== )
;; NSEC3 RR that covers the "next closer" name (z.w.example)
;; H(z.w.example) = qlu7gtfaeh0ek0c05ksfhdpbcgglbe03
q04jkcevqvmu85r014c7dkba38o0ji5r.example. NSEC3 1 1 12 aabbccdd ( r53bq7cc2uvmubfu5ocmm6pers9tk9en A RRSIG )
q04jkcevqvmu85r014c7dkba38o0ji5r.example. RRSIG NSEC3 7 2 3600 20150420235959 20051021000000 ( 40430 example. hV5I89b+4FHJDATp09g4bbN0R1F845CaXpL3 ZxlMKimoPAyqletMlEWwLfFia7sdpSzn+ZlN NlkxWcLsIlMmUg== )
;; NSEC3 RR that matches a wildcard at the closest encloser.
;; H(*.w.example) = r53bq7cc2uvmubfu5ocmm6pers9tk9en
r53bq7cc2uvmubfu5ocmm6pers9tk9en.example. NSEC3 1 1 12 aabbccdd ( t644ebqk9bibcna874givr6joj62mlhv MX RRSIG )
r53bq7cc2uvmubfu5ocmm6pers9tk9en.example. RRSIG NSEC3 7 2 3600 20150420235959 20051021000000 ( 40430 example. aupviViruXs4bDg9rCbezzBMf9h1ZlDvbW/C ZFKulIGXXLj8B/fsDJarXVDA9bnUoRhEbKp+ HF1FWKW7RIJdtQ== )
SECTION ADDITIONAL
ENTRY_END
; catch glue queries
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR AA DO NOERROR
SECTION QUESTION
ns2.example. IN A
SECTION ANSWER
; nothing to make sure the ns1 server is used for queries.
ENTRY_END
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR AA DO NOERROR
SECTION QUESTION
ns2.example. IN AAAA
SECTION ANSWER
; nothing to make sure the ns1 server is used for queries.
ENTRY_END
RANGE_END
STEP 1 QUERY
ENTRY_BEGIN
REPLY RD
SECTION QUESTION
a.z.w.example. IN AAAA
ENTRY_END
; recursion happens here.
STEP 10 CHECK_ANSWER
ENTRY_BEGIN
MATCH all
REPLY QR RD RA SERVFAIL
SECTION QUESTION
a.z.w.example. IN AAAA
SECTION ANSWER
SECTION AUTHORITY
SECTION ADDITIONAL
ENTRY_END
SCENARIO_END
dnssecjava-1.1.3/src/test/resources/unbound/val_nsec3_b5_wcnodata_nonc.rpl 0000664 0000000 0000000 00000010704 13020541473 0026747 0 ustar 00root root 0000000 0000000 ; config options
server:
trust-anchor: "example. DNSKEY 257 3 7 AwEAAcUlFV1vhmqx6NSOUOq2R/dsR7Xm3upJ ( j7IommWSpJABVfW8Q0rOvXdM6kzt+TAu92L9 AbsUdblMFin8CVF3n4s= )"
val-override-date: "20120420235959"
target-fetch-policy: "0 0 0 0 0"
stub-zone:
name: "."
stub-addr: 193.0.14.129 # K.ROOT-SERVERS.NET.
CONFIG_END
SCENARIO_BEGIN Test validator NSEC3 B.5 wildcard nodata, without nc.
; K.ROOT-SERVERS.NET.
RANGE_BEGIN 0 100
ADDRESS 193.0.14.129
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
. IN NS
SECTION ANSWER
. IN NS K.ROOT-SERVERS.NET.
SECTION ADDITIONAL
K.ROOT-SERVERS.NET. IN A 193.0.14.129
ENTRY_END
ENTRY_BEGIN
MATCH opcode subdomain
ADJUST copy_id copy_query
REPLY QR NOERROR
SECTION QUESTION
example. IN A
SECTION AUTHORITY
example. IN NS ns1.example.
; leave out to make unbound take ns1
;example. IN NS ns2.example.
SECTION ADDITIONAL
ns1.example. IN A 192.0.2.1
; leave out to make unbound take ns1
;ns2.example. IN A 192.0.2.2
ENTRY_END
RANGE_END
; ns1.example.
RANGE_BEGIN 0 100
ADDRESS 192.0.2.1
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id copy_query
REPLY QR REFUSED
SECTION QUESTION
ns1.example. IN A
SECTION ANSWER
ENTRY_END
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id copy_query
REPLY QR REFUSED
SECTION QUESTION
ns1.example. IN AAAA
SECTION ANSWER
ENTRY_END
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id copy_query
REPLY QR REFUSED
SECTION QUESTION
example. IN NS
SECTION ANSWER
ENTRY_END
; response to DNSKEY priming query
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
example. IN DNSKEY
SECTION ANSWER
example. DNSKEY 256 3 7 AwEAAaetidLzsKWUt4swWR8yu0wPHPiUi8LU ( sAD0QPWU+wzt89epO6tHzkMBVDkC7qphQO2h TY4hHn9npWFRw5BYubE= )
example. DNSKEY 257 3 7 AwEAAcUlFV1vhmqx6NSOUOq2R/dsR7Xm3upJ ( j7IommWSpJABVfW8Q0rOvXdM6kzt+TAu92L9 AbsUdblMFin8CVF3n4s= )
example. RRSIG DNSKEY 7 1 3600 20150420235959 ( 20051021000000 12708 example. AuU4juU9RaxescSmStrQks3Gh9FblGBlVU31 uzMZ/U/FpsUb8aC6QZS+sTsJXnLnz7flGOsm MGQZf3bH+QsCtg== )
ENTRY_END
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR AA DO NOERROR
SECTION QUESTION
a.z.w.example. IN AAAA
SECTION ANSWER
SECTION AUTHORITY
example. SOA ns1.example. bugs.x.w.example. 1 3600 300 ( 3600000 3600 )
example. RRSIG SOA 7 1 3600 20150420235959 20051021000000 ( 40430 example. Hu25UIyNPmvPIVBrldN+9Mlp9Zql39qaUd8i q4ZLlYWfUUbbAS41pG+68z81q1xhkYAcEyHd VI2LmKusbZsT0Q== )
;; NSEC3 RR that matches the closest encloser (w.example)
;; H(w.example) = k8udemvp1j2f7eg6jebps17vp3n8i58h
k8udemvp1j2f7eg6jebps17vp3n8i58h.example. NSEC3 1 1 12 aabbccdd ( kohar7mbb8dc2ce8a9qvl8hon4k53uhi )
k8udemvp1j2f7eg6jebps17vp3n8i58h.example. RRSIG NSEC3 7 2 3600 20150420235959 20051021000000 ( 40430 example. FtXGbvF0+wf8iWkyo73enAuVx03klN+pILBK S6qCcftVtfH4yVzsEZquJ27NHR7ruxJWDNMt Otx7w9WfcIg62A== )
;; NSEC3 RR that covers the "next closer" name (z.w.example)
;; H(z.w.example) = qlu7gtfaeh0ek0c05ksfhdpbcgglbe03
;q04jkcevqvmu85r014c7dkba38o0ji5r.example. NSEC3 1 1 12 aabbccdd ( r53bq7cc2uvmubfu5ocmm6pers9tk9en A RRSIG )
;q04jkcevqvmu85r014c7dkba38o0ji5r.example. RRSIG NSEC3 7 2 3600 20150420235959 20051021000000 ( 40430 example. hV5I89b+4FHJDATp09g4bbN0R1F845CaXpL3 ZxlMKimoPAyqletMlEWwLfFia7sdpSzn+ZlN NlkxWcLsIlMmUg== )
;; NSEC3 RR that matches a wildcard at the closest encloser.
;; H(*.w.example) = r53bq7cc2uvmubfu5ocmm6pers9tk9en
r53bq7cc2uvmubfu5ocmm6pers9tk9en.example. NSEC3 1 1 12 aabbccdd ( t644ebqk9bibcna874givr6joj62mlhv MX RRSIG )
r53bq7cc2uvmubfu5ocmm6pers9tk9en.example. RRSIG NSEC3 7 2 3600 20150420235959 20051021000000 ( 40430 example. aupviViruXs4bDg9rCbezzBMf9h1ZlDvbW/C ZFKulIGXXLj8B/fsDJarXVDA9bnUoRhEbKp+ HF1FWKW7RIJdtQ== )
SECTION ADDITIONAL
ENTRY_END
; catch glue queries
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR AA DO NOERROR
SECTION QUESTION
ns2.example. IN A
SECTION ANSWER
; nothing to make sure the ns1 server is used for queries.
ENTRY_END
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR AA DO NOERROR
SECTION QUESTION
ns2.example. IN AAAA
SECTION ANSWER
; nothing to make sure the ns1 server is used for queries.
ENTRY_END
RANGE_END
STEP 1 QUERY
ENTRY_BEGIN
REPLY RD
SECTION QUESTION
a.z.w.example. IN AAAA
ENTRY_END
; recursion happens here.
STEP 10 CHECK_ANSWER
ENTRY_BEGIN
MATCH all
REPLY QR RD RA SERVFAIL
SECTION QUESTION
a.z.w.example. IN AAAA
SECTION ANSWER
SECTION AUTHORITY
SECTION ADDITIONAL
ENTRY_END
SCENARIO_END
dnssecjava-1.1.3/src/test/resources/unbound/val_nsec3_b5_wcnodata_nowc.rpl 0000664 0000000 0000000 00000011066 13020541473 0026762 0 ustar 00root root 0000000 0000000 ; config options
server:
trust-anchor: "example. DNSKEY 257 3 7 AwEAAcUlFV1vhmqx6NSOUOq2R/dsR7Xm3upJ ( j7IommWSpJABVfW8Q0rOvXdM6kzt+TAu92L9 AbsUdblMFin8CVF3n4s= )"
val-override-date: "20120420235959"
target-fetch-policy: "0 0 0 0 0"
stub-zone:
name: "."
stub-addr: 193.0.14.129 # K.ROOT-SERVERS.NET.
CONFIG_END
SCENARIO_BEGIN Test validator NSEC3 B.5 wildcard nodata, without wc.
; K.ROOT-SERVERS.NET.
RANGE_BEGIN 0 100
ADDRESS 193.0.14.129
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
. IN NS
SECTION ANSWER
. IN NS K.ROOT-SERVERS.NET.
SECTION ADDITIONAL
K.ROOT-SERVERS.NET. IN A 193.0.14.129
ENTRY_END
ENTRY_BEGIN
MATCH opcode subdomain
ADJUST copy_id copy_query
REPLY QR NOERROR
SECTION QUESTION
example. IN A
SECTION AUTHORITY
example. IN NS ns1.example.
; leave out to make unbound take ns1
;example. IN NS ns2.example.
SECTION ADDITIONAL
ns1.example. IN A 192.0.2.1
; leave out to make unbound take ns1
;ns2.example. IN A 192.0.2.2
ENTRY_END
RANGE_END
; ns1.example.
RANGE_BEGIN 0 100
ADDRESS 192.0.2.1
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id copy_query
REPLY QR REFUSED
SECTION QUESTION
ns1.example. IN A
SECTION ANSWER
ENTRY_END
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id copy_query
REPLY QR REFUSED
SECTION QUESTION
ns1.example. IN AAAA
SECTION ANSWER
ENTRY_END
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id copy_query
REPLY QR REFUSED
SECTION QUESTION
example. IN NS
SECTION ANSWER
ENTRY_END
; response to DNSKEY priming query
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
example. IN DNSKEY
SECTION ANSWER
example. DNSKEY 256 3 7 AwEAAaetidLzsKWUt4swWR8yu0wPHPiUi8LU ( sAD0QPWU+wzt89epO6tHzkMBVDkC7qphQO2h TY4hHn9npWFRw5BYubE= )
example. DNSKEY 257 3 7 AwEAAcUlFV1vhmqx6NSOUOq2R/dsR7Xm3upJ ( j7IommWSpJABVfW8Q0rOvXdM6kzt+TAu92L9 AbsUdblMFin8CVF3n4s= )
example. RRSIG DNSKEY 7 1 3600 20150420235959 ( 20051021000000 12708 example. AuU4juU9RaxescSmStrQks3Gh9FblGBlVU31 uzMZ/U/FpsUb8aC6QZS+sTsJXnLnz7flGOsm MGQZf3bH+QsCtg== )
ENTRY_END
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR AA DO NOERROR
SECTION QUESTION
a.z.w.example. IN AAAA
SECTION ANSWER
SECTION AUTHORITY
example. SOA ns1.example. bugs.x.w.example. 1 3600 300 ( 3600000 3600 )
example. RRSIG SOA 7 1 3600 20150420235959 20051021000000 ( 40430 example. Hu25UIyNPmvPIVBrldN+9Mlp9Zql39qaUd8i q4ZLlYWfUUbbAS41pG+68z81q1xhkYAcEyHd VI2LmKusbZsT0Q== )
;; NSEC3 RR that matches the closest encloser (w.example)
;; H(w.example) = k8udemvp1j2f7eg6jebps17vp3n8i58h
k8udemvp1j2f7eg6jebps17vp3n8i58h.example. NSEC3 1 1 12 aabbccdd ( kohar7mbb8dc2ce8a9qvl8hon4k53uhi )
k8udemvp1j2f7eg6jebps17vp3n8i58h.example. RRSIG NSEC3 7 2 3600 20150420235959 20051021000000 ( 40430 example. FtXGbvF0+wf8iWkyo73enAuVx03klN+pILBK S6qCcftVtfH4yVzsEZquJ27NHR7ruxJWDNMt Otx7w9WfcIg62A== )
;; NSEC3 RR that covers the "next closer" name (z.w.example)
;; H(z.w.example) = qlu7gtfaeh0ek0c05ksfhdpbcgglbe03
q04jkcevqvmu85r014c7dkba38o0ji5r.example. NSEC3 1 1 12 aabbccdd ( r53bq7cc2uvmubfu5ocmm6pers9tk9en A RRSIG )
q04jkcevqvmu85r014c7dkba38o0ji5r.example. RRSIG NSEC3 7 2 3600 20150420235959 20051021000000 ( 40430 example. hV5I89b+4FHJDATp09g4bbN0R1F845CaXpL3 ZxlMKimoPAyqletMlEWwLfFia7sdpSzn+ZlN NlkxWcLsIlMmUg== )
;; NSEC3 RR that matches a wildcard at the closest encloser.
;; H(*.w.example) = r53bq7cc2uvmubfu5ocmm6pers9tk9en
;r53bq7cc2uvmubfu5ocmm6pers9tk9en.example. NSEC3 1 1 12 aabbccdd ( t644ebqk9bibcna874givr6joj62mlhv MX RRSIG )
;r53bq7cc2uvmubfu5ocmm6pers9tk9en.example. RRSIG NSEC3 7 2 3600 20150420235959 20051021000000 ( 40430 example. aupviViruXs4bDg9rCbezzBMf9h1ZlDvbW/C ZFKulIGXXLj8B/fsDJarXVDA9bnUoRhEbKp+ HF1FWKW7RIJdtQ== )
SECTION ADDITIONAL
ENTRY_END
; catch glue queries
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR AA DO NOERROR
SECTION QUESTION
ns2.example. IN A
SECTION ANSWER
; nothing to make sure the ns1 server is used for queries.
ENTRY_END
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR AA DO NOERROR
SECTION QUESTION
ns2.example. IN AAAA
SECTION ANSWER
; nothing to make sure the ns1 server is used for queries.
ENTRY_END
RANGE_END
STEP 1 QUERY
ENTRY_BEGIN
REPLY RD
SECTION QUESTION
a.z.w.example. IN AAAA
ENTRY_END
; recursion happens here.
STEP 10 CHECK_ANSWER
ENTRY_BEGIN
MATCH all
; insecure! not bogus! (due to optout)
REPLY QR RD RA NOERROR
SECTION QUESTION
a.z.w.example. IN AAAA
SECTION ANSWER
SECTION AUTHORITY
example. 3600 IN SOA ns1.example. bugs.x.w.example. 1 3600 300 3600000 3600
SECTION ADDITIONAL
ENTRY_END
SCENARIO_END
dnssecjava-1.1.3/src/test/resources/unbound/val_nsec3_cname_ds.rpl 0000664 0000000 0000000 00000017214 13020541473 0025320 0 ustar 00root root 0000000 0000000 ; config options
; The island of trust is at example.com
server:
trust-anchor: "example.com. 3600 IN DS 2854 3 1 46e4ffc6e9a4793b488954bd3f0cc6af0dfb201b"
val-override-date: "20070916134226"
target-fetch-policy: "0 0 0 0 0"
stub-zone:
name: "."
stub-addr: 193.0.14.129 # K.ROOT-SERVERS.NET.
CONFIG_END
SCENARIO_BEGIN Test validator with NSEC3 CNAME for qtype DS.
; K.ROOT-SERVERS.NET.
RANGE_BEGIN 0 100
ADDRESS 193.0.14.129
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
. IN NS
SECTION ANSWER
. IN NS K.ROOT-SERVERS.NET.
SECTION ADDITIONAL
K.ROOT-SERVERS.NET. IN A 193.0.14.129
ENTRY_END
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
www.sub.example.com. IN DS
SECTION AUTHORITY
com. IN NS a.gtld-servers.net.
SECTION ADDITIONAL
a.gtld-servers.net. IN A 192.5.6.30
ENTRY_END
RANGE_END
; a.gtld-servers.net.
RANGE_BEGIN 0 100
ADDRESS 192.5.6.30
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
com. IN NS
SECTION ANSWER
com. IN NS a.gtld-servers.net.
SECTION ADDITIONAL
a.gtld-servers.net. IN A 192.5.6.30
ENTRY_END
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
www.sub.example.com. IN DS
SECTION AUTHORITY
example.com. IN NS ns.example.com.
SECTION ADDITIONAL
ns.example.com. IN A 1.2.3.4
ENTRY_END
RANGE_END
; ns.example.com.
RANGE_BEGIN 0 100
ADDRESS 1.2.3.4
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
example.com. IN NS
SECTION ANSWER
example.com. IN NS ns.example.com.
example.com. 3600 IN RRSIG NS 3 2 3600 20070926134150 20070829134150 2854 example.com. MC0CFQCN+qHdJxoI/2tNKwsb08pra/G7aAIUAWA5sDdJTbrXA1/3OaesGBAO3sI= ;{id = 2854}
SECTION ADDITIONAL
ns.example.com. IN A 1.2.3.4
ns.example.com. 3600 IN RRSIG A 3 3 3600 20070926135752 20070829135752 2854 example.com. MC0CFQCMSWxVehgOQLoYclB9PIAbNP229AIUeH0vNNGJhjnZiqgIOKvs1EhzqAo= ;{id = 2854}
ENTRY_END
; response to DNSKEY priming query
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
example.com. IN DNSKEY
SECTION ANSWER
example.com. 3600 IN DNSKEY 256 3 3 ALXLUsWqUrY3JYER3T4TBJII s70j+sDS/UT2QRp61SE7S3E EXopNXoFE73JLRmvpi/UrOO/Vz4Se 6wXv/CYCKjGw06U4WRgR YXcpEhJROyNapmdIKSx hOzfLVE1gqA0PweZR8d tY3aNQSRn3sPpwJr6Mi /PqQKAMMrZ9ckJpf1+b QMOOvxgzz2U1GS18b3y ZKcgTMEaJzd/GZYzi/B N2DzQ0MsrSwYXfsNLFO Bbs8PJMW4LYIxeeOe6rUgkWOF 7CC9Dh/dduQ1QrsJhmZAEFfd6ByYV+ ;{id = 2854 (zsk), size = 1688b}
example.com. 3600 IN RRSIG DNSKEY 3 2 3600 20070926134802 20070829134802 2854 example.com. MCwCFG1yhRNtTEa3Eno2zhVVuy2EJX3wAhQeLyUp6+UXcpC5qGNu9tkrTEgPUg== ;{id = 2854}
SECTION AUTHORITY
example.com. IN NS ns.example.com.
example.com. 3600 IN RRSIG NS 3 2 3600 20070926134150 20070829134150 2854 example.com. MC0CFQCN+qHdJxoI/2tNKwsb08pra/G7aAIUAWA5sDdJTbrXA1/3OaesGBAO3sI= ;{id = 2854}
SECTION ADDITIONAL
ns.example.com. IN A 1.2.3.4
ns.example.com. 3600 IN RRSIG A 3 3 3600 20070926135752 20070829135752 2854 example.com. MC0CFQCMSWxVehgOQLoYclB9PIAbNP229AIUeH0vNNGJhjnZiqgIOKvs1EhzqAo= ;{id = 2854}
ENTRY_END
; response to query of interest
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
www.example.com. IN A
SECTION AUTHORITY
example.com. IN SOA ns.example.com. hostmaster.example.com. 2007090400 28800 7200 604800 18000
example.com. 3600 IN RRSIG SOA 3 2 3600 20070926135752 20070829135752 2854 example.com. MC0CFQCM6lsu9byZIQ1yYjJmyYfFWM2RWAIUcR5t84r2La824oWCkLjmHXRQlco= ;{id = 2854}
; NODATA response. H(www.example.com.) = s1unhcti19bkdr98fegs0v46mbu3t4m3
s1unhcti19bkdr98fegs0v46mbu3t4m3.example.com. IN NSEC3 1 1 123 aabb00123456bbccdd s1unhcti19bkdr98fegs0v46mbu3t4m4 MX RRSIG
s1unhcti19bkdr98fegs0v46mbu3t4m3.example.com. 3600 IN RRSIG NSEC3 3 3 3600 20070926135752 20070829135752 2854 example.com. MCwCFE/a24nsY2luhQmZjY/ObAIgNSMkAhQWd4MUOUVK55bD6AbMHWrDA0yvEA== ;{id = 2854}
ENTRY_END
; refer to server one down
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
www.sub.example.com. IN DS
SECTION AUTHORITY
sub.example.com. IN NS ns.sub.example.com.
sub.example.com. 3600 IN DS 2854 DSA 1 be4d46cd7489cce25a31af0dff2968ce0425dd31
sub.example.com. 3600 IN RRSIG DS 3 3 3600 20070926135752 20070829135752 2854 example.com. MC0CFQC1WMTfb25sTgeUEXCFR4+YiJqecwIUc2R/jrO4amyQxovSnld2reg8eyo= ;{id = 2854}
SECTION ADDITIONAL
ns.sub.example.com. IN A 1.2.3.10
ENTRY_END
RANGE_END
; ns.sub.example.com.
RANGE_BEGIN 0 100
ADDRESS 1.2.3.10
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
sub.example.com. IN NS
SECTION ANSWER
sub.example.com. IN NS ns.sub.example.com.
SECTION ADDITIONAL
ns.sub.example.com. IN A 1.2.3.10
ENTRY_END
; response to DNSKEY priming query
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
sub.example.com. IN DNSKEY
SECTION ANSWER
sub.example.com. 3600 IN DNSKEY 256 3 3 ALXLUsWqUrY3JYER3T4TBJII s70j+sDS/UT2QRp61SE7S3E EXopNXoFE73JLRmvpi/UrOO/Vz4Se 6wXv/CYCKjGw06U4WRgR YXcpEhJROyNapmdIKSx hOzfLVE1gqA0PweZR8d tY3aNQSRn3sPpwJr6Mi /PqQKAMMrZ9ckJpf1+b QMOOvxgzz2U1GS18b3y ZKcgTMEaJzd/GZYzi/B N2DzQ0MsrSwYXfsNLFO Bbs8PJMW4LYIxeeOe6rUgkWOF 7CC9Dh/dduQ1QrsJhmZAEFfd6ByYV+ ;{id = 2854 (zsk), size = 1688b}
sub.example.com. 3600 IN RRSIG DNSKEY 3 3 3600 20070926135752 20070829135752 2854 sub.example.com. MCwCFBznBTYM/SrdUnjQdBnLtRO79KAaAhQReG5nRuL7Xsdf6D0KKwPa1GpWyQ== ;{id = 2854}
ENTRY_END
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
www.sub.example.com. IN DS
SECTION ANSWER
; from *.sub.example.com. IN CNAME sub.example.com.
www.sub.example.com. IN CNAME sub.example.com.
www.sub.example.com. 3600 IN RRSIG CNAME 3 3 3600 20070926135752 20070829135752 2854 sub.example.com. MCwCFFyXwAzONbrkZD3oQ50zRYXOr1vvAhQAmzDTm7YYloe6F96eBS1L+KE9hg== ;{id = 2854}
SECTION AUTHORITY
; cover qname next closer name, for the wildcard.
; H(www.sub.example.com.) = ecllopkacmb753v6jlld4d371l1u8gme
ecllopkacmb753v6jlld4d371l1u7gme.sub.example.com. IN NSEC3 1 1 123 aabb00123456bbccdd ecllopkacmb753v6jlld4d371l1u9gme A RRSIG
ecllopkacmb753v6jlld4d371l1u7gme.sub.example.com. 3600 IN RRSIG NSEC3 3 4 3600 20070926135752 20070829135752 2854 sub.example.com. MCwCFD4bIeWulXj9lhAGsqCfsKg6jQheAhQ9kkYqd9AVdomcl2YzWOupJnV5wQ== ;{id = 2854}
ENTRY_END
RANGE_END
STEP 1 QUERY
ENTRY_BEGIN
REPLY RD DO
SECTION QUESTION
www.sub.example.com. IN DS
ENTRY_END
; recursion happens here.
STEP 10 CHECK_ANSWER
ENTRY_BEGIN
MATCH all
REPLY QR RD RA NOERROR
SECTION QUESTION
www.sub.example.com. IN DS
SECTION ANSWER
www.sub.example.com. IN CNAME sub.example.com.
www.sub.example.com. 3600 IN RRSIG CNAME 3 3 3600 20070926135752 20070829135752 2854 sub.example.com. MCwCFFyXwAzONbrkZD3oQ50zRYXOr1vvAhQAmzDTm7YYloe6F96eBS1L+KE9hg== ;{id = 2854}
sub.example.com. 3600 IN DS 2854 DSA 1 be4d46cd7489cce25a31af0dff2968ce0425dd31
sub.example.com. 3600 IN RRSIG DS 3 3 3600 20070926135752 20070829135752 2854 example.com. MC0CFQC1WMTfb25sTgeUEXCFR4+YiJqecwIUc2R/jrO4amyQxovSnld2reg8eyo= ;{id = 2854}
SECTION AUTHORITY
ecllopkacmb753v6jlld4d371l1u7gme.sub.example.com. IN NSEC3 1 1 123 aabb00123456bbccdd ecllopkacmb753v6jlld4d371l1u9gme A RRSIG
ecllopkacmb753v6jlld4d371l1u7gme.sub.example.com. 3600 IN RRSIG NSEC3 3 4 3600 20070926135752 20070829135752 2854 sub.example.com. MCwCFD4bIeWulXj9lhAGsqCfsKg6jQheAhQ9kkYqd9AVdomcl2YzWOupJnV5wQ== ;{id = 2854}
SECTION ADDITIONAL
ENTRY_END
SCENARIO_END
dnssecjava-1.1.3/src/test/resources/unbound/val_nsec3_cname_par.rpl 0000664 0000000 0000000 00000020007 13020541473 0025466 0 ustar 00root root 0000000 0000000 ; config options
; The island of trust is at example.com
server:
trust-anchor: "example.com. 3600 IN DS 2854 3 1 46e4ffc6e9a4793b488954bd3f0cc6af0dfb201b"
val-override-date: "20070916134226"
target-fetch-policy: "0 0 0 0 0"
stub-zone:
name: "."
stub-addr: 193.0.14.129 # K.ROOT-SERVERS.NET.
CONFIG_END
SCENARIO_BEGIN Test validator with NSEC3 wildcard CNAME to parent.
; to test the zone determination routines in nsec3.
; K.ROOT-SERVERS.NET.
RANGE_BEGIN 0 100
ADDRESS 193.0.14.129
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
. IN NS
SECTION ANSWER
. IN NS K.ROOT-SERVERS.NET.
SECTION ADDITIONAL
K.ROOT-SERVERS.NET. IN A 193.0.14.129
ENTRY_END
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
www.sub.example.com. IN A
SECTION AUTHORITY
com. IN NS a.gtld-servers.net.
SECTION ADDITIONAL
a.gtld-servers.net. IN A 192.5.6.30
ENTRY_END
RANGE_END
; a.gtld-servers.net.
RANGE_BEGIN 0 100
ADDRESS 192.5.6.30
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
com. IN NS
SECTION ANSWER
com. IN NS a.gtld-servers.net.
SECTION ADDITIONAL
a.gtld-servers.net. IN A 192.5.6.30
ENTRY_END
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
www.sub.example.com. IN A
SECTION AUTHORITY
example.com. IN NS ns.example.com.
SECTION ADDITIONAL
ns.example.com. IN A 1.2.3.4
ENTRY_END
RANGE_END
; ns.example.com.
RANGE_BEGIN 0 100
ADDRESS 1.2.3.4
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
example.com. IN NS
SECTION ANSWER
example.com. IN NS ns.example.com.
example.com. 3600 IN RRSIG NS 3 2 3600 20070926134150 20070829134150 2854 example.com. MC0CFQCN+qHdJxoI/2tNKwsb08pra/G7aAIUAWA5sDdJTbrXA1/3OaesGBAO3sI= ;{id = 2854}
SECTION ADDITIONAL
ns.example.com. IN A 1.2.3.4
ns.example.com. 3600 IN RRSIG A 3 3 3600 20070926135752 20070829135752 2854 example.com. MC0CFQCMSWxVehgOQLoYclB9PIAbNP229AIUeH0vNNGJhjnZiqgIOKvs1EhzqAo= ;{id = 2854}
ENTRY_END
; response to DNSKEY priming query
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
example.com. IN DNSKEY
SECTION ANSWER
example.com. 3600 IN DNSKEY 256 3 3 ALXLUsWqUrY3JYER3T4TBJII s70j+sDS/UT2QRp61SE7S3E EXopNXoFE73JLRmvpi/UrOO/Vz4Se 6wXv/CYCKjGw06U4WRgR YXcpEhJROyNapmdIKSx hOzfLVE1gqA0PweZR8d tY3aNQSRn3sPpwJr6Mi /PqQKAMMrZ9ckJpf1+b QMOOvxgzz2U1GS18b3y ZKcgTMEaJzd/GZYzi/B N2DzQ0MsrSwYXfsNLFO Bbs8PJMW4LYIxeeOe6rUgkWOF 7CC9Dh/dduQ1QrsJhmZAEFfd6ByYV+ ;{id = 2854 (zsk), size = 1688b}
example.com. 3600 IN RRSIG DNSKEY 3 2 3600 20070926134802 20070829134802 2854 example.com. MCwCFG1yhRNtTEa3Eno2zhVVuy2EJX3wAhQeLyUp6+UXcpC5qGNu9tkrTEgPUg== ;{id = 2854}
SECTION AUTHORITY
example.com. IN NS ns.example.com.
example.com. 3600 IN RRSIG NS 3 2 3600 20070926134150 20070829134150 2854 example.com. MC0CFQCN+qHdJxoI/2tNKwsb08pra/G7aAIUAWA5sDdJTbrXA1/3OaesGBAO3sI= ;{id = 2854}
SECTION ADDITIONAL
ns.example.com. IN A 1.2.3.4
ns.example.com. 3600 IN RRSIG A 3 3 3600 20070926135752 20070829135752 2854 example.com. MC0CFQCMSWxVehgOQLoYclB9PIAbNP229AIUeH0vNNGJhjnZiqgIOKvs1EhzqAo= ;{id = 2854}
ENTRY_END
; response to query of interest
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
www.example.com. IN A
SECTION AUTHORITY
example.com. IN SOA ns.example.com. hostmaster.example.com. 2007090400 28800 7200 604800 18000
example.com. 3600 IN RRSIG SOA 3 2 3600 20070926135752 20070829135752 2854 example.com. MC0CFQCM6lsu9byZIQ1yYjJmyYfFWM2RWAIUcR5t84r2La824oWCkLjmHXRQlco= ;{id = 2854}
; NODATA response. H(www.example.com.) = s1unhcti19bkdr98fegs0v46mbu3t4m3
s1unhcti19bkdr98fegs0v46mbu3t4m3.example.com. IN NSEC3 1 1 123 aabb00123456bbccdd s1unhcti19bkdr98fegs0v46mbu3t4m4 MX RRSIG
s1unhcti19bkdr98fegs0v46mbu3t4m3.example.com. 3600 IN RRSIG NSEC3 3 3 3600 20070926135752 20070829135752 2854 example.com. MCwCFE/a24nsY2luhQmZjY/ObAIgNSMkAhQWd4MUOUVK55bD6AbMHWrDA0yvEA== ;{id = 2854}
ENTRY_END
; refer to server one down
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
www.sub.example.com. IN A
SECTION AUTHORITY
sub.example.com. IN NS ns.sub.example.com.
sub.example.com. 3600 IN DS 2854 DSA 1 be4d46cd7489cce25a31af0dff2968ce0425dd31
sub.example.com. 3600 IN RRSIG DS 3 3 3600 20070926135752 20070829135752 2854 example.com. MC0CFQC1WMTfb25sTgeUEXCFR4+YiJqecwIUc2R/jrO4amyQxovSnld2reg8eyo= ;{id = 2854}
SECTION ADDITIONAL
ns.sub.example.com. IN A 1.2.3.10
ENTRY_END
RANGE_END
; ns.sub.example.com.
RANGE_BEGIN 0 100
ADDRESS 1.2.3.10
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
sub.example.com. IN NS
SECTION ANSWER
sub.example.com. IN NS ns.sub.example.com.
SECTION ADDITIONAL
ns.sub.example.com. IN A 1.2.3.10
ENTRY_END
; response to DNSKEY priming query
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
sub.example.com. IN DNSKEY
SECTION ANSWER
sub.example.com. 3600 IN DNSKEY 256 3 3 ALXLUsWqUrY3JYER3T4TBJII s70j+sDS/UT2QRp61SE7S3E EXopNXoFE73JLRmvpi/UrOO/Vz4Se 6wXv/CYCKjGw06U4WRgR YXcpEhJROyNapmdIKSx hOzfLVE1gqA0PweZR8d tY3aNQSRn3sPpwJr6Mi /PqQKAMMrZ9ckJpf1+b QMOOvxgzz2U1GS18b3y ZKcgTMEaJzd/GZYzi/B N2DzQ0MsrSwYXfsNLFO Bbs8PJMW4LYIxeeOe6rUgkWOF 7CC9Dh/dduQ1QrsJhmZAEFfd6ByYV+ ;{id = 2854 (zsk), size = 1688b}
sub.example.com. 3600 IN RRSIG DNSKEY 3 3 3600 20070926135752 20070829135752 2854 sub.example.com. MCwCFBznBTYM/SrdUnjQdBnLtRO79KAaAhQReG5nRuL7Xsdf6D0KKwPa1GpWyQ== ;{id = 2854}
ENTRY_END
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
www.sub.example.com. IN A
SECTION ANSWER
; from *.sub.example.com. IN CNAME www.example.com.
www.sub.example.com. IN CNAME www.example.com.
www.sub.example.com. 3600 IN RRSIG CNAME 3 3 3600 20070926135752 20070829135752 2854 sub.example.com. MCwCFFKPEuHCx2R69zF2Nd4c7Vu/4RUxAhRB9zHHPCihRU4HT5HhpPJxJykeFg== ;{id = 2854}
SECTION AUTHORITY
; cover qname next closer name, for the wildcard.
; H(www.sub.example.com.) = ecllopkacmb753v6jlld4d371l1u8gme
ecllopkacmb753v6jlld4d371l1u7gme.sub.example.com. IN NSEC3 1 1 123 aabb00123456bbccdd ecllopkacmb753v6jlld4d371l1u9gme A RRSIG
ecllopkacmb753v6jlld4d371l1u7gme.sub.example.com. 3600 IN RRSIG NSEC3 3 4 3600 20070926135752 20070829135752 2854 sub.example.com. MCwCFD4bIeWulXj9lhAGsqCfsKg6jQheAhQ9kkYqd9AVdomcl2YzWOupJnV5wQ== ;{id = 2854}
ENTRY_END
RANGE_END
STEP 1 QUERY
ENTRY_BEGIN
REPLY RD DO
SECTION QUESTION
www.sub.example.com. IN A
ENTRY_END
; recursion happens here.
STEP 10 CHECK_ANSWER
ENTRY_BEGIN
MATCH all
REPLY QR RD RA NOERROR
SECTION QUESTION
www.sub.example.com. IN A
SECTION ANSWER
www.sub.example.com. IN CNAME www.example.com.
www.sub.example.com. 3600 IN RRSIG CNAME 3 3 3600 20070926135752 20070829135752 2854 sub.example.com. MCwCFFKPEuHCx2R69zF2Nd4c7Vu/4RUxAhRB9zHHPCihRU4HT5HhpPJxJykeFg== ;{id = 2854}
SECTION AUTHORITY
ecllopkacmb753v6jlld4d371l1u7gme.sub.example.com. IN NSEC3 1 1 123 aabb00123456bbccdd ecllopkacmb753v6jlld4d371l1u9gme A RRSIG
ecllopkacmb753v6jlld4d371l1u7gme.sub.example.com. 3600 IN RRSIG NSEC3 3 4 3600 20070926135752 20070829135752 2854 sub.example.com. MCwCFD4bIeWulXj9lhAGsqCfsKg6jQheAhQ9kkYqd9AVdomcl2YzWOupJnV5wQ== ;{id = 2854}
example.com. IN SOA ns.example.com. hostmaster.example.com. 2007090400 28800 7200 604800 18000
example.com. 3600 IN RRSIG SOA 3 2 3600 20070926135752 20070829135752 2854 example.com. MC0CFQCM6lsu9byZIQ1yYjJmyYfFWM2RWAIUcR5t84r2La824oWCkLjmHXRQlco= ;{id = 2854}
s1unhcti19bkdr98fegs0v46mbu3t4m3.example.com. IN NSEC3 1 1 123 aabb00123456bbccdd s1unhcti19bkdr98fegs0v46mbu3t4m4 MX RRSIG
s1unhcti19bkdr98fegs0v46mbu3t4m3.example.com. 3600 IN RRSIG NSEC3 3 3 3600 20070926135752 20070829135752 2854 example.com. MCwCFE/a24nsY2luhQmZjY/ObAIgNSMkAhQWd4MUOUVK55bD6AbMHWrDA0yvEA== ;{id = 2854}
SECTION ADDITIONAL
ENTRY_END
SCENARIO_END
dnssecjava-1.1.3/src/test/resources/unbound/val_nsec3_cname_sub.rpl 0000664 0000000 0000000 00000023052 13020541473 0025500 0 ustar 00root root 0000000 0000000 ; config options
; The island of trust is at example.com
server:
trust-anchor: "example.com. 3600 IN DS 2854 3 1 46e4ffc6e9a4793b488954bd3f0cc6af0dfb201b"
val-override-date: "20070916134226"
target-fetch-policy: "0 0 0 0 0"
stub-zone:
name: "."
stub-addr: 193.0.14.129 # K.ROOT-SERVERS.NET.
CONFIG_END
SCENARIO_BEGIN Test validator with NSEC3 wildcard CNAME to subzone.
; to test the zone determination routines in nsec3.
; K.ROOT-SERVERS.NET.
RANGE_BEGIN 0 100
ADDRESS 193.0.14.129
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
. IN NS
SECTION ANSWER
. IN NS K.ROOT-SERVERS.NET.
SECTION ADDITIONAL
K.ROOT-SERVERS.NET. IN A 193.0.14.129
ENTRY_END
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
www.example.com. IN A
SECTION AUTHORITY
com. IN NS a.gtld-servers.net.
SECTION ADDITIONAL
a.gtld-servers.net. IN A 192.5.6.30
ENTRY_END
RANGE_END
; a.gtld-servers.net.
RANGE_BEGIN 0 100
ADDRESS 192.5.6.30
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
com. IN NS
SECTION ANSWER
com. IN NS a.gtld-servers.net.
SECTION ADDITIONAL
a.gtld-servers.net. IN A 192.5.6.30
ENTRY_END
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
www.example.com. IN A
SECTION AUTHORITY
example.com. IN NS ns.example.com.
SECTION ADDITIONAL
ns.example.com. IN A 1.2.3.4
ENTRY_END
RANGE_END
; ns.example.com.
RANGE_BEGIN 0 100
ADDRESS 1.2.3.4
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
example.com. IN NS
SECTION ANSWER
example.com. IN NS ns.example.com.
example.com. 3600 IN RRSIG NS 3 2 3600 20070926134150 20070829134150 2854 example.com. MC0CFQCN+qHdJxoI/2tNKwsb08pra/G7aAIUAWA5sDdJTbrXA1/3OaesGBAO3sI= ;{id = 2854}
SECTION ADDITIONAL
ns.example.com. IN A 1.2.3.4
ns.example.com. 3600 IN RRSIG A 3 3 3600 20070926135752 20070829135752 2854 example.com. MC0CFQCMSWxVehgOQLoYclB9PIAbNP229AIUeH0vNNGJhjnZiqgIOKvs1EhzqAo= ;{id = 2854}
ENTRY_END
; response to DNSKEY priming query
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
example.com. IN DNSKEY
SECTION ANSWER
example.com. 3600 IN DNSKEY 256 3 3 ALXLUsWqUrY3JYER3T4TBJII s70j+sDS/UT2QRp61SE7S3E EXopNXoFE73JLRmvpi/UrOO/Vz4Se 6wXv/CYCKjGw06U4WRgR YXcpEhJROyNapmdIKSx hOzfLVE1gqA0PweZR8d tY3aNQSRn3sPpwJr6Mi /PqQKAMMrZ9ckJpf1+b QMOOvxgzz2U1GS18b3y ZKcgTMEaJzd/GZYzi/B N2DzQ0MsrSwYXfsNLFO Bbs8PJMW4LYIxeeOe6rUgkWOF 7CC9Dh/dduQ1QrsJhmZAEFfd6ByYV+ ;{id = 2854 (zsk), size = 1688b}
example.com. 3600 IN RRSIG DNSKEY 3 2 3600 20070926134802 20070829134802 2854 example.com. MCwCFG1yhRNtTEa3Eno2zhVVuy2EJX3wAhQeLyUp6+UXcpC5qGNu9tkrTEgPUg== ;{id = 2854}
SECTION AUTHORITY
example.com. IN NS ns.example.com.
example.com. 3600 IN RRSIG NS 3 2 3600 20070926134150 20070829134150 2854 example.com. MC0CFQCN+qHdJxoI/2tNKwsb08pra/G7aAIUAWA5sDdJTbrXA1/3OaesGBAO3sI= ;{id = 2854}
SECTION ADDITIONAL
ns.example.com. IN A 1.2.3.4
ns.example.com. 3600 IN RRSIG A 3 3 3600 20070926135752 20070829135752 2854 example.com. MC0CFQCMSWxVehgOQLoYclB9PIAbNP229AIUeH0vNNGJhjnZiqgIOKvs1EhzqAo= ;{id = 2854}
ENTRY_END
; response to query of interest
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
www.example.com. IN A
SECTION ANSWER
;from *.example.com. IN CNAME www.sub.example.com.
www.example.com. IN CNAME www.sub.example.com.
www.example.com. 3600 IN RRSIG CNAME 3 2 3600 20070926135752 20070829135752 2854 example.com. MC0CFQCjVxqOi0bcgHgxVkwzJqIi6iNJswIUZxbmItvoyEczTclgVtHsr9Jmf+w= ;{id = 2854}
SECTION AUTHORITY
; cover qname next closer name.
; H(www.example.com.) = s1unhcti19bkdr98fegs0v46mbu3t4m3.
s1unhcti19bkdr98fegs0v46mbu3t4m2.example.com. NSEC3 1 1 123 aabb00123456bbccdd s1unhcti19bkdr98fegs0v46mbu3t4m4 A MX RRSIG
s1unhcti19bkdr98fegs0v46mbu3t4m2.example.com. 3600 IN RRSIG NSEC3 3 3 3600 20070926135752 20070829135752 2854 example.com. MC0CFFSH4klZKke48dYyddYDj17gjTS0AhUAltWicpFLWqW98/Af9Qlx70MH8o4= ;{id = 2854}
ENTRY_END
; refer to server one down
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
www.sub.example.com. IN A
SECTION AUTHORITY
sub.example.com. IN NS ns.sub.example.com.
sub.example.com. 3600 IN DS 2854 DSA 1 be4d46cd7489cce25a31af0dff2968ce0425dd31
sub.example.com. 3600 IN RRSIG DS 3 3 3600 20070926135752 20070829135752 2854 example.com. MC0CFQC1WMTfb25sTgeUEXCFR4+YiJqecwIUc2R/jrO4amyQxovSnld2reg8eyo= ;{id = 2854}
SECTION ADDITIONAL
ns.sub.example.com. IN A 1.2.3.10
ENTRY_END
RANGE_END
; ns.sub.example.com.
RANGE_BEGIN 0 100
ADDRESS 1.2.3.10
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
sub.example.com. IN NS
SECTION ANSWER
sub.example.com. IN NS ns.sub.example.com.
SECTION ADDITIONAL
ns.sub.example.com. IN A 1.2.3.10
ENTRY_END
; response to DNSKEY priming query
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
sub.example.com. IN DNSKEY
SECTION ANSWER
sub.example.com. 3600 IN DNSKEY 256 3 3 ALXLUsWqUrY3JYER3T4TBJII s70j+sDS/UT2QRp61SE7S3E EXopNXoFE73JLRmvpi/UrOO/Vz4Se 6wXv/CYCKjGw06U4WRgR YXcpEhJROyNapmdIKSx hOzfLVE1gqA0PweZR8d tY3aNQSRn3sPpwJr6Mi /PqQKAMMrZ9ckJpf1+b QMOOvxgzz2U1GS18b3y ZKcgTMEaJzd/GZYzi/B N2DzQ0MsrSwYXfsNLFO Bbs8PJMW4LYIxeeOe6rUgkWOF 7CC9Dh/dduQ1QrsJhmZAEFfd6ByYV+ ;{id = 2854 (zsk), size = 1688b}
sub.example.com. 3600 IN RRSIG DNSKEY 3 3 3600 20070926135752 20070829135752 2854 sub.example.com. MCwCFBznBTYM/SrdUnjQdBnLtRO79KAaAhQReG5nRuL7Xsdf6D0KKwPa1GpWyQ== ;{id = 2854}
ENTRY_END
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NXDOMAIN
SECTION QUESTION
www.sub.example.com. IN A
SECTION AUTHORITY
sub.example.com. IN SOA ns.sub.example.com. hostmaster.example.com. 2007090400 28800 7200 604800 18000
sub.example.com. 3600 IN RRSIG SOA 3 3 3600 20070926135752 20070829135752 2854 sub.example.com. MCwCFBLls0z0ncWxTXzDt4uLAuJsr932AhQvVeUJevgwAL6mfmLL6fAf2IZ7mg== ;{id = 2854}
; closest encloser, H(sub.example.com). = 8r1f0ieoutlnjc03meng9e3bn2n0o9pd
8r1f0ieoutlnjc03meng9e3bn2n0o9pd.sub.example.com. IN NSEC3 1 1 123 aabb00123456bbccdd 8r1f0ieoutlnjc03meng9e3bn3n0o9pd SOA NS MX RRSIG
8r1f0ieoutlnjc03meng9e3bn2n0o9pd.sub.example.com. 3600 IN RRSIG NSEC3 3 4 3600 20070926135752 20070829135752 2854 sub.example.com. MCwCFBX1qVlth+YE+y57p5C7X00bLthDAhRIF2xoHF0exs29obE7JjVthwXfHA== ;{id = 2854}
; wildcard denial, H(*.sub.example.com.) = hq432j8q183b54mejh50200pqo8rvlog
hq432j8q183b54mejh50200pqo7rvlog.sub.example.com. IN NSEC3 1 1 123 aabb00123456bbccdd hq432j8q183b54mejh50200pqo9rvlog A RRSIG
hq432j8q183b54mejh50200pqo7rvlog.sub.example.com. 3600 IN RRSIG NSEC3 3 4 3600 20070926135752 20070829135752 2854 sub.example.com. MCwCFAOXoeUk1d0cxT9p1gUvBrybAQCSAhQ5eLWaK932TxxY4U6NAxgst4O4uA== ;{id = 2854}
; next closer denial H(www.sub.example.com.) = ecllopkacmb753v6jlld4d371l1u8gme
ecllopkacmb753v6jlld4d371l1u7gme.sub.example.com. IN NSEC3 1 1 123 aabb00123456bbccdd ecllopkacmb753v6jlld4d371l1u9gme A RRSIG
ecllopkacmb753v6jlld4d371l1u7gme.sub.example.com. 3600 IN RRSIG NSEC3 3 4 3600 20070926135752 20070829135752 2854 sub.example.com. MCwCFAuD3qb/+CWyqjBRt/RDjZvsSyCGAhQivfP3zr1+2Uknw9RhXUcUO0g6Lg== ;{id = 2854}
ENTRY_END
RANGE_END
STEP 1 QUERY
ENTRY_BEGIN
REPLY RD DO
SECTION QUESTION
www.example.com. IN A
ENTRY_END
; recursion happens here.
STEP 10 CHECK_ANSWER
ENTRY_BEGIN
MATCH all
REPLY QR RD RA NXDOMAIN
SECTION QUESTION
www.example.com. IN A
SECTION ANSWER
www.example.com. IN CNAME www.sub.example.com.
www.example.com. 3600 IN RRSIG CNAME 3 2 3600 20070926135752 20070829135752 2854 example.com. MC0CFQCjVxqOi0bcgHgxVkwzJqIi6iNJswIUZxbmItvoyEczTclgVtHsr9Jmf+w= ;{id = 2854}
SECTION AUTHORITY
SECTION AUTHORITY
s1unhcti19bkdr98fegs0v46mbu3t4m2.example.com. NSEC3 1 1 123 aabb00123456bbccdd s1unhcti19bkdr98fegs0v46mbu3t4m4 A MX RRSIG
s1unhcti19bkdr98fegs0v46mbu3t4m2.example.com. 3600 IN RRSIG NSEC3 3 3 3600 20070926135752 20070829135752 2854 example.com. MC0CFFSH4klZKke48dYyddYDj17gjTS0AhUAltWicpFLWqW98/Af9Qlx70MH8o4= ;{id = 2854}
sub.example.com. IN SOA ns.sub.example.com. hostmaster.example.com. 2007090400 28800 7200 604800 18000
sub.example.com. 3600 IN RRSIG SOA 3 3 3600 20070926135752 20070829135752 2854 sub.example.com. MCwCFBLls0z0ncWxTXzDt4uLAuJsr932AhQvVeUJevgwAL6mfmLL6fAf2IZ7mg== ;{id = 2854}
8r1f0ieoutlnjc03meng9e3bn2n0o9pd.sub.example.com. IN NSEC3 1 1 123 aabb00123456bbccdd 8r1f0ieoutlnjc03meng9e3bn3n0o9pd SOA NS MX RRSIG
8r1f0ieoutlnjc03meng9e3bn2n0o9pd.sub.example.com. 3600 IN RRSIG NSEC3 3 4 3600 20070926135752 20070829135752 2854 sub.example.com. MCwCFBX1qVlth+YE+y57p5C7X00bLthDAhRIF2xoHF0exs29obE7JjVthwXfHA== ;{id = 2854}
hq432j8q183b54mejh50200pqo7rvlog.sub.example.com. IN NSEC3 1 1 123 aabb00123456bbccdd hq432j8q183b54mejh50200pqo9rvlog A RRSIG
hq432j8q183b54mejh50200pqo7rvlog.sub.example.com. 3600 IN RRSIG NSEC3 3 4 3600 20070926135752 20070829135752 2854 sub.example.com. MCwCFAOXoeUk1d0cxT9p1gUvBrybAQCSAhQ5eLWaK932TxxY4U6NAxgst4O4uA== ;{id = 2854}
ecllopkacmb753v6jlld4d371l1u7gme.sub.example.com. IN NSEC3 1 1 123 aabb00123456bbccdd ecllopkacmb753v6jlld4d371l1u9gme A RRSIG
ecllopkacmb753v6jlld4d371l1u7gme.sub.example.com. 3600 IN RRSIG NSEC3 3 4 3600 20070926135752 20070829135752 2854 sub.example.com. MCwCFAuD3qb/+CWyqjBRt/RDjZvsSyCGAhQivfP3zr1+2Uknw9RhXUcUO0g6Lg== ;{id = 2854}
SECTION ADDITIONAL
ENTRY_END
SCENARIO_END
dnssecjava-1.1.3/src/test/resources/unbound/val_nsec3_cnametocnamewctoposwc.rpl 0000664 0000000 0000000 00000027216 13020541473 0030155 0 ustar 00root root 0000000 0000000 ; config options
; The island of trust is at example.com
server:
trust-anchor: "example.com. IN DNSKEY 257 3 8 AwEAAdL6YJdvoKQJEt/SgB6MrbQ2RDwnrcQQb6bDE8FpGgLen6hvF31ntVsZ3RZzhCmwL6lvumOLFIRKaP9ZBEVutT9iMoF2dNRbT0TCUrv6uQNHcuCZ0BJhuDNBU42f3yOnfFv7PKxd0NP+yFHJkvDQAVLMB5GeUQuYnvgQGeZsf/3b"
val-override-date: "20121030123249"
target-fetch-policy: "0 0 0 0 0"
stub-zone:
name: "."
stub-addr: 193.0.14.129 # K.ROOT-SERVERS.NET.
CONFIG_END
SCENARIO_BEGIN Test validator with a regular cname to wildcard cname to wildcard response
; K.ROOT-SERVERS.NET.
RANGE_BEGIN 0 100
ADDRESS 193.0.14.129
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
. IN NS
SECTION ANSWER
. IN NS K.ROOT-SERVERS.NET.
SECTION ADDITIONAL
K.ROOT-SERVERS.NET. IN A 193.0.14.129
ENTRY_END
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
start.example.com. IN A
SECTION AUTHORITY
com. IN NS a.gtld-servers.net.
SECTION ADDITIONAL
a.gtld-servers.net. IN A 192.5.6.30
ENTRY_END
RANGE_END
; a.gtld-servers.net.
RANGE_BEGIN 0 100
ADDRESS 192.5.6.30
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
com. IN NS
SECTION ANSWER
com. IN NS a.gtld-servers.net.
SECTION ADDITIONAL
a.gtld-servers.net. IN A 192.5.6.30
ENTRY_END
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
start.example.com. IN A
SECTION AUTHORITY
example.com. IN NS ns.example.com.
SECTION ADDITIONAL
ns.example.com. 120 IN A 1.2.3.4
ENTRY_END
RANGE_END
; ns.example.com.
RANGE_BEGIN 0 100
ADDRESS 1.2.3.4
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
example.com. IN NS
SECTION ANSWER
example.com. 3600 IN NS ns.example.com.
example.com. 3600 IN RRSIG NS 8 2 3600 20121126123249 20121029123249 64050 example.com. cpLjgKPacNxVIGo59tYMZ98GVYpH28WHRWj3AeIHK0StYFcAlflGLdkae1LEgMwfUmzrayrA5GMe3AH8LyuTgA2Dn1oNFxGfuShQvK2MFQ+LxvQfiuoqlAlL5Aa94IWcSoU/wLrr66I1K8oSB2yK1Tyyv73c2N40D1mBbzIE70U=
SECTION ADDITIONAL
ns.example.com. 3600 IN A 1.2.3.4
ns.example.com. 3600 IN RRSIG A 8 2 3600 20121126123249 20121029123249 64050 example.com. zxGyimwFsd39j8T7jJ+tSAQPwZ7tjk6HHmzosTMCRePM4k4newbLb5HbrpucSiW/plaEZvjRTDTJ6bPkw0msPXjPCI/22Zh236XO5vhGtMOlxDgAEazuhifVF6UsM7GZwONPBCvw705HgWQyCR1YlTK2w9ffH3GopU9f4oP7Pmk=
ENTRY_END
; response to DNSKEY priming query
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
example.com. IN DNSKEY
SECTION ANSWER
example.com. 3600 IN DNSKEY 256 3 8 AwEAAdWzfjQD2bfQuoQGNYuS0ByosBxiTkoKcy9kMoWOQ/jx9rvTRhHImWxTxFtIyZOoRgn6E6mE71e5Y1q1nuyH544Em+4rNRMMW4bzecQmMmPk+B97MqW9aW6e4BwiCTt52IGfL++5GORYcaITw9UOlQLYH1oHHUNUC6ebHENofLTj ;{id = 64050 (zsk), size = 1024b}
example.com. 3600 IN DNSKEY 257 3 8 AwEAAdL6YJdvoKQJEt/SgB6MrbQ2RDwnrcQQb6bDE8FpGgLen6hvF31ntVsZ3RZzhCmwL6lvumOLFIRKaP9ZBEVutT9iMoF2dNRbT0TCUrv6uQNHcuCZ0BJhuDNBU42f3yOnfFv7PKxd0NP+yFHJkvDQAVLMB5GeUQuYnvgQGeZsf/3b ;{id = 46426 (ksk), size = 1024b}
example.com. 3600 IN RRSIG DNSKEY 8 2 3600 20121126123249 20121029123249 46426 example.com. pisNb/A40XDEiMpcYtxc+yO6osISyfpqz+0UZ61pd70+TLXMF197zr9SqOVJHyRI6G2lSnFggxYrZDpxLbxOW0RY/KfjD3xlI14M/2DieJ1NdlQuYFGgTwxcoINUJ/wRd4YUxkF4JS0D4NBdQ0yQYR0KqDr84oyhnULEHX6WB7s=
SECTION AUTHORITY
SECTION ADDITIONAL
ENTRY_END
; response to query of interest
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
start.example.com. IN A
SECTION ANSWER
start.example.com. 3600 IN CNAME x.y.z.wc.example.com.
start.example.com. 3600 IN RRSIG CNAME 8 3 3600 20121126123316 20121029123316 64050 example.com. LHpx5n++Z0Jgjjalac+e7wdYSbfurqSDpLRAOI1PybTJkwrMvgDKfp0ycT4HwsLVy7spumZ/Ahg/5II9pai7jCiqv1Iyh6fx19ZVeClTFMOLotCK8xMHACYJIY39BhTwD2D3r9BxbK+RopUlXypwV02yzdY2xEnPCBJVDUn5d0g=
x.y.z.wc.example.com. 3600 IN CNAME x.y.z.end.example.com.
x.y.z.wc.example.com. 3600 IN RRSIG CNAME 8 3 3600 20121126123316 20121029123316 64050 example.com. BCnT6CIuqvF1U9LfiHIovgvXIVFJsCXqQWmnjHtbFvzUlTlfGj+56YBSOEpyCep4CBJ0CBgZ8gl5kWip8N+sTlveU/UWMv4FAkqLXRYjp4CZegslmJIuXU5uS+Q0GlLbWdSB9ZCZcbbO0qrOtUfrJ2ozcSTCS+D+oIZ+CkwvDlQ=
x.y.z.end.example.com. 3600 IN A 1.2.3.5
x.y.z.end.example.com. 3600 IN RRSIG A 8 3 3600 20121126123249 20121029123249 64050 example.com. MyXXd3MvXtEYVNqWDepM3+Ra/j/b63QehzSHXZe5gL954WxW8KGHPYmeWyhDtruThpZS6s6jeARY2xt0lmEDnMgNyPJGA6UWwTIgvGD0u9Qw5kocCq3ZH4cSG4xu4rmZoi+h8OGrHxUb4jIKzipzAQDxhnAcp/wKF7e+p+OE+Fo=
SECTION AUTHORITY
; H(z.wc.example.com.) = isn85psesctb6afn2q105mv966tqqepi.
isjq5aarcp8p5sukc56g961cccjus5u2.example.com. 86400 IN NSEC3 1 0 1 abcd isoaarjsq14bkqaamivn1t1milkv95lc A RRSIG
isjq5aarcp8p5sukc56g961cccjus5u2.example.com. 86400 IN RRSIG NSEC3 8 3 86400 20121126123259 20121029123259 64050 example.com. Cxwzq1DUQvhkTVHEJHlb92c511Y+uJy/C0yL9br6W/5lB/usuSiK2DjW58ibPh2kLH1P3SpGqd1Y7LigptdXoPBDFakcNcimPWCN93R3J80+vrHHPkPyIsBaywwYI3SNGgfnHfPF+wmH+tZ1vfEHbigOxqPFK+T0ntKq7dkSndg=
; H(z.end.example.com.) = a62608t4becqb6233m87ar7a3648rj3b.
a61sejfu6am5a36p628t4s089s309o44.example.com. 86400 IN NSEC3 1 0 1 abcd a64lt5ij9a1up15h5cdsn1u2071901hu A RRSIG
a61sejfu6am5a36p628t4s089s309o44.example.com. 86400 IN RRSIG NSEC3 8 3 86400 20121126123315 20121029123315 64050 example.com. gfBu4oqo9cVxJbqrw2Ly7mK638kGPOF8l8eh7ovalniwkU3F+PNYJyfSE9yGX8tMGbXrkEW9mAzAh39igr2+Bbzi9WPTRp4RDVM0qw+eyMmQRPWKt7FeanDtP+OcdVp0Hf2aPzsgmgTdS6s0AboUq1rX53H2M6F8xAiwPrBJXDQ=
example.com. 3600 IN NS ns.example.com.
example.com. 3600 IN RRSIG NS 8 2 3600 20121126123249 20121029123249 64050 example.com. cpLjgKPacNxVIGo59tYMZ98GVYpH28WHRWj3AeIHK0StYFcAlflGLdkae1LEgMwfUmzrayrA5GMe3AH8LyuTgA2Dn1oNFxGfuShQvK2MFQ+LxvQfiuoqlAlL5Aa94IWcSoU/wLrr66I1K8oSB2yK1Tyyv73c2N40D1mBbzIE70U=
SECTION ADDITIONAL
ENTRY_END
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
x.y.z.wc.example.com. IN A
SECTION ANSWER
x.y.z.wc.example.com. 3600 IN CNAME x.y.z.end.example.com.
x.y.z.wc.example.com. 3600 IN RRSIG CNAME 8 3 3600 20121126123316 20121029123316 64050 example.com. BCnT6CIuqvF1U9LfiHIovgvXIVFJsCXqQWmnjHtbFvzUlTlfGj+56YBSOEpyCep4CBJ0CBgZ8gl5kWip8N+sTlveU/UWMv4FAkqLXRYjp4CZegslmJIuXU5uS+Q0GlLbWdSB9ZCZcbbO0qrOtUfrJ2ozcSTCS+D+oIZ+CkwvDlQ=
x.y.z.end.example.com. 3600 IN A 1.2.3.5
x.y.z.end.example.com. 3600 IN RRSIG A 8 3 3600 20121126123249 20121029123249 64050 example.com. MyXXd3MvXtEYVNqWDepM3+Ra/j/b63QehzSHXZe5gL954WxW8KGHPYmeWyhDtruThpZS6s6jeARY2xt0lmEDnMgNyPJGA6UWwTIgvGD0u9Qw5kocCq3ZH4cSG4xu4rmZoi+h8OGrHxUb4jIKzipzAQDxhnAcp/wKF7e+p+OE+Fo=
SECTION AUTHORITY
isjq5aarcp8p5sukc56g961cccjus5u2.example.com. 86400 IN NSEC3 1 0 1 abcd isoaarjsq14bkqaamivn1t1milkv95lc A RRSIG
isjq5aarcp8p5sukc56g961cccjus5u2.example.com. 86400 IN RRSIG NSEC3 8 3 86400 20121126123259 20121029123259 64050 example.com. Cxwzq1DUQvhkTVHEJHlb92c511Y+uJy/C0yL9br6W/5lB/usuSiK2DjW58ibPh2kLH1P3SpGqd1Y7LigptdXoPBDFakcNcimPWCN93R3J80+vrHHPkPyIsBaywwYI3SNGgfnHfPF+wmH+tZ1vfEHbigOxqPFK+T0ntKq7dkSndg=
a61sejfu6am5a36p628t4s089s309o44.example.com. 86400 IN NSEC3 1 0 1 abcd a64lt5ij9a1up15h5cdsn1u2071901hu A RRSIG
a61sejfu6am5a36p628t4s089s309o44.example.com. 86400 IN RRSIG NSEC3 8 3 86400 20121126123315 20121029123315 64050 example.com. gfBu4oqo9cVxJbqrw2Ly7mK638kGPOF8l8eh7ovalniwkU3F+PNYJyfSE9yGX8tMGbXrkEW9mAzAh39igr2+Bbzi9WPTRp4RDVM0qw+eyMmQRPWKt7FeanDtP+OcdVp0Hf2aPzsgmgTdS6s0AboUq1rX53H2M6F8xAiwPrBJXDQ=
example.com. 3600 IN NS ns.example.com.
example.com. 3600 IN RRSIG NS 8 2 3600 20121126123249 20121029123249 64050 example.com. cpLjgKPacNxVIGo59tYMZ98GVYpH28WHRWj3AeIHK0StYFcAlflGLdkae1LEgMwfUmzrayrA5GMe3AH8LyuTgA2Dn1oNFxGfuShQvK2MFQ+LxvQfiuoqlAlL5Aa94IWcSoU/wLrr66I1K8oSB2yK1Tyyv73c2N40D1mBbzIE70U=
SECTION ADDITIONAL
ENTRY_END
ENTRY_BEGING
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
x.y.z.end.example.com. IN A
SECTION ANSWER
x.y.z.end.example.com. 3600 IN A 1.2.3.5
x.y.z.end.example.com. 3600 IN RRSIG A 8 3 3600 20121126123249 20121029123249 64050 example.com. MyXXd3MvXtEYVNqWDepM3+Ra/j/b63QehzSHXZe5gL954WxW8KGHPYmeWyhDtruThpZS6s6jeARY2xt0lmEDnMgNyPJGA6UWwTIgvGD0u9Qw5kocCq3ZH4cSG4xu4rmZoi+h8OGrHxUb4jIKzipzAQDxhnAcp/wKF7e+p+OE+Fo=
SECTION AUTHORITY
a61sejfu6am5a36p628t4s089s309o44.example.com. 86400 IN NSEC3 1 0 1 abcd a64lt5ij9a1up15h5cdsn1u2071901hu A RRSIG
a61sejfu6am5a36p628t4s089s309o44.example.com. 86400 IN RRSIG NSEC3 8 3 86400 20121126123315 20121029123315 64050 example.com. gfBu4oqo9cVxJbqrw2Ly7mK638kGPOF8l8eh7ovalniwkU3F+PNYJyfSE9yGX8tMGbXrkEW9mAzAh39igr2+Bbzi9WPTRp4RDVM0qw+eyMmQRPWKt7FeanDtP+OcdVp0Hf2aPzsgmgTdS6s0AboUq1rX53H2M6F8xAiwPrBJXDQ=
example.com. 3600 IN NS ns.example.com.
example.com. 3600 IN RRSIG NS 8 2 3600 20121126123249 20121029123249 64050 example.com. cpLjgKPacNxVIGo59tYMZ98GVYpH28WHRWj3AeIHK0StYFcAlflGLdkae1LEgMwfUmzrayrA5GMe3AH8LyuTgA2Dn1oNFxGfuShQvK2MFQ+LxvQfiuoqlAlL5Aa94IWcSoU/wLrr66I1K8oSB2yK1Tyyv73c2N40D1mBbzIE70U=
SECTION ADDITIONAL
ns.example.com. 3600 IN A 1.2.3.4
ns.example.com. 3600 IN RRSIG A 8 2 3600 20121126123249 20121029123249 64050 example.com. zxGyimwFsd39j8T7jJ+tSAQPwZ7tjk6HHmzosTMCRePM4k4newbLb5HbrpucSiW/plaEZvjRTDTJ6bPkw0msPXjPCI/22Zh236XO5vhGtMOlxDgAEazuhifVF6UsM7GZwONPBCvw705HgWQyCR1YlTK2w9ffH3GopU9f4oP7Pmk=
ENTRY_END
RANGE_END
STEP 1 QUERY
ENTRY_BEGIN
REPLY RD DO
SECTION QUESTION
start.example.com. IN A
ENTRY_END
; recursion happens here.
STEP 10 CHECK_ANSWER
ENTRY_BEGIN
MATCH all
REPLY QR RD RA AD NOERROR
SECTION QUESTION
start.example.com. IN A
SECTION ANSWER
start.example.com. 3600 IN CNAME x.y.z.wc.example.com.
start.example.com. 3600 IN RRSIG CNAME 8 3 3600 20121126123316 20121029123316 64050 example.com. LHpx5n++Z0Jgjjalac+e7wdYSbfurqSDpLRAOI1PybTJkwrMvgDKfp0ycT4HwsLVy7spumZ/Ahg/5II9pai7jCiqv1Iyh6fx19ZVeClTFMOLotCK8xMHACYJIY39BhTwD2D3r9BxbK+RopUlXypwV02yzdY2xEnPCBJVDUn5d0g=
x.y.z.wc.example.com. 3600 IN CNAME x.y.z.end.example.com.
x.y.z.wc.example.com. 3600 IN RRSIG CNAME 8 3 3600 20121126123316 20121029123316 64050 example.com. BCnT6CIuqvF1U9LfiHIovgvXIVFJsCXqQWmnjHtbFvzUlTlfGj+56YBSOEpyCep4CBJ0CBgZ8gl5kWip8N+sTlveU/UWMv4FAkqLXRYjp4CZegslmJIuXU5uS+Q0GlLbWdSB9ZCZcbbO0qrOtUfrJ2ozcSTCS+D+oIZ+CkwvDlQ=
x.y.z.end.example.com. 3600 IN A 1.2.3.5
x.y.z.end.example.com. 3600 IN RRSIG A 8 3 3600 20121126123249 20121029123249 64050 example.com. MyXXd3MvXtEYVNqWDepM3+Ra/j/b63QehzSHXZe5gL954WxW8KGHPYmeWyhDtruThpZS6s6jeARY2xt0lmEDnMgNyPJGA6UWwTIgvGD0u9Qw5kocCq3ZH4cSG4xu4rmZoi+h8OGrHxUb4jIKzipzAQDxhnAcp/wKF7e+p+OE+Fo=
SECTION AUTHORITY
isjq5aarcp8p5sukc56g961cccjus5u2.example.com. 86400 IN NSEC3 1 0 1 abcd isoaarjsq14bkqaamivn1t1milkv95lc A RRSIG
isjq5aarcp8p5sukc56g961cccjus5u2.example.com. 86400 IN RRSIG NSEC3 8 3 86400 20121126123259 20121029123259 64050 example.com. Cxwzq1DUQvhkTVHEJHlb92c511Y+uJy/C0yL9br6W/5lB/usuSiK2DjW58ibPh2kLH1P3SpGqd1Y7LigptdXoPBDFakcNcimPWCN93R3J80+vrHHPkPyIsBaywwYI3SNGgfnHfPF+wmH+tZ1vfEHbigOxqPFK+T0ntKq7dkSndg=
a61sejfu6am5a36p628t4s089s309o44.example.com. 86400 IN NSEC3 1 0 1 abcd a64lt5ij9a1up15h5cdsn1u2071901hu A RRSIG
a61sejfu6am5a36p628t4s089s309o44.example.com. 86400 IN RRSIG NSEC3 8 3 86400 20121126123315 20121029123315 64050 example.com. gfBu4oqo9cVxJbqrw2Ly7mK638kGPOF8l8eh7ovalniwkU3F+PNYJyfSE9yGX8tMGbXrkEW9mAzAh39igr2+Bbzi9WPTRp4RDVM0qw+eyMmQRPWKt7FeanDtP+OcdVp0Hf2aPzsgmgTdS6s0AboUq1rX53H2M6F8xAiwPrBJXDQ=
example.com. 3600 IN NS ns.example.com.
example.com. 3600 IN RRSIG NS 8 2 3600 20121126123249 20121029123249 64050 example.com. cpLjgKPacNxVIGo59tYMZ98GVYpH28WHRWj3AeIHK0StYFcAlflGLdkae1LEgMwfUmzrayrA5GMe3AH8LyuTgA2Dn1oNFxGfuShQvK2MFQ+LxvQfiuoqlAlL5Aa94IWcSoU/wLrr66I1K8oSB2yK1Tyyv73c2N40D1mBbzIE70U=
SECTION ADDITIONAL
ns.example.com. 3600 IN A 1.2.3.4
ns.example.com. 3600 IN RRSIG A 8 2 3600 20121126123249 20121029123249 64050 example.com. zxGyimwFsd39j8T7jJ+tSAQPwZ7tjk6HHmzosTMCRePM4k4newbLb5HbrpucSiW/plaEZvjRTDTJ6bPkw0msPXjPCI/22Zh236XO5vhGtMOlxDgAEazuhifVF6UsM7GZwONPBCvw705HgWQyCR1YlTK2w9ffH3GopU9f4oP7Pmk=
ENTRY_END
SCENARIO_END
dnssecjava-1.1.3/src/test/resources/unbound/val_nsec3_entnodata_optout.rpl 0000664 0000000 0000000 00000015634 13020541473 0027142 0 ustar 00root root 0000000 0000000 ; config options
; The island of trust is at example.com
server:
trust-anchor: "example.com. 3600 IN DS 2854 3 1 46e4ffc6e9a4793b488954bd3f0cc6af0dfb201b"
val-override-date: "20070916134226"
target-fetch-policy: "0 0 0 0 0"
stub-zone:
name: "."
stub-addr: 193.0.14.129 # K.ROOT-SERVERS.NET.
CONFIG_END
SCENARIO_BEGIN Test validator with NSEC3 response for NODATA ENT with optout.
; K.ROOT-SERVERS.NET.
RANGE_BEGIN 0 100
ADDRESS 193.0.14.129
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
. IN NS
SECTION ANSWER
. IN NS K.ROOT-SERVERS.NET.
SECTION ADDITIONAL
K.ROOT-SERVERS.NET. IN A 193.0.14.129
ENTRY_END
ENTRY_BEGIN
MATCH opcode subdomain
ADJUST copy_id copy_query
REPLY QR NOERROR
SECTION QUESTION
com. IN A
SECTION AUTHORITY
com. IN NS a.gtld-servers.net.
SECTION ADDITIONAL
a.gtld-servers.net. IN A 192.5.6.30
ENTRY_END
RANGE_END
; a.gtld-servers.net.
RANGE_BEGIN 0 100
ADDRESS 192.5.6.30
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
com. IN NS
SECTION ANSWER
com. IN NS a.gtld-servers.net.
SECTION ADDITIONAL
a.gtld-servers.net. IN A 192.5.6.30
ENTRY_END
ENTRY_BEGIN
MATCH opcode subdomain
ADJUST copy_id copy_query
REPLY QR NOERROR
SECTION QUESTION
example.com. IN A
SECTION AUTHORITY
example.com. IN NS ns.example.com.
SECTION ADDITIONAL
ns.example.com. IN A 1.2.3.4
ENTRY_END
RANGE_END
; ns.example.com.
RANGE_BEGIN 0 100
ADDRESS 1.2.3.4
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR AA REFUSED
SECTION QUESTION
ns.example.com. IN A
ENTRY_END
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR AA REFUSED
SECTION QUESTION
ns.example.com. IN AAAA
ENTRY_END
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
example.com. IN NS
SECTION ANSWER
example.com. IN NS ns.example.com.
example.com. 3600 IN RRSIG NS 3 2 3600 20070926134150 20070829134150 2854 example.com. MC0CFQCN+qHdJxoI/2tNKwsb08pra/G7aAIUAWA5sDdJTbrXA1/3OaesGBAO3sI= ;{id = 2854}
SECTION ADDITIONAL
ns.example.com. IN A 1.2.3.4
ns.example.com. 3600 IN RRSIG A 3 3 3600 20070926135752 20070829135752 2854 example.com. MC0CFQCMSWxVehgOQLoYclB9PIAbNP229AIUeH0vNNGJhjnZiqgIOKvs1EhzqAo= ;{id = 2854}
ENTRY_END
; response to DNSKEY priming query
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
example.com. IN DNSKEY
SECTION ANSWER
example.com. 3600 IN DNSKEY 256 3 3 ALXLUsWqUrY3JYER3T4TBJII s70j+sDS/UT2QRp61SE7S3E EXopNXoFE73JLRmvpi/UrOO/Vz4Se 6wXv/CYCKjGw06U4WRgR YXcpEhJROyNapmdIKSx hOzfLVE1gqA0PweZR8d tY3aNQSRn3sPpwJr6Mi /PqQKAMMrZ9ckJpf1+b QMOOvxgzz2U1GS18b3y ZKcgTMEaJzd/GZYzi/B N2DzQ0MsrSwYXfsNLFO Bbs8PJMW4LYIxeeOe6rUgkWOF 7CC9Dh/dduQ1QrsJhmZAEFfd6ByYV+ ;{id = 2854 (zsk), size = 1688b}
example.com. 3600 IN RRSIG DNSKEY 3 2 3600 20070926134802 20070829134802 2854 example.com. MCwCFG1yhRNtTEa3Eno2zhVVuy2EJX3wAhQeLyUp6+UXcpC5qGNu9tkrTEgPUg== ;{id = 2854}
SECTION AUTHORITY
example.com. IN NS ns.example.com.
example.com. 3600 IN RRSIG NS 3 2 3600 20070926134150 20070829134150 2854 example.com. MC0CFQCN+qHdJxoI/2tNKwsb08pra/G7aAIUAWA5sDdJTbrXA1/3OaesGBAO3sI= ;{id = 2854}
SECTION ADDITIONAL
ns.example.com. IN A 1.2.3.4
ns.example.com. 3600 IN RRSIG A 3 3 3600 20070926135752 20070829135752 2854 example.com. MC0CFQCMSWxVehgOQLoYclB9PIAbNP229AIUeH0vNNGJhjnZiqgIOKvs1EhzqAo= ;{id = 2854}
ENTRY_END
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
www.example.com. IN A
SECTION AUTHORITY
example.com. IN SOA ns.example.com. hostmaster.example.com. 2007090400 28800 7200 604800 18000
example.com. 3600 IN RRSIG SOA 3 2 3600 20070926135752 20070829135752 2854 example.com. MC0CFQCM6lsu9byZIQ1yYjJmyYfFWM2RWAIUcR5t84r2La824oWCkLjmHXRQlco= ;{id = 2854}
; NODATA response. H(www.example.com.) = s1unhcti19bkdr98fegs0v46mbu3t4m3
s1unhcti19bkdr98fegs0v46mbu3t4m3.example.com. IN NSEC3 1 1 123 aabb00123456bbccdd s1unhcti19bkdr98fegs0v46mbu3t4m4 MX RRSIG
s1unhcti19bkdr98fegs0v46mbu3t4m3.example.com. 3600 IN RRSIG NSEC3 3 3 3600 20070926135752 20070829135752 2854 example.com. MCwCFE/a24nsY2luhQmZjY/ObAIgNSMkAhQWd4MUOUVK55bD6AbMHWrDA0yvEA== ;{id = 2854}
ENTRY_END
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
ent.example.com. IN DS
SECTION AUTHORITY
; example.com. -> b6fuorg741ufili49mg9j4328ig53sqg.
; OPTOUT
b6fuorg741ufili49mg9j4328ig53sqg.example.com. IN NSEC3 1 1 123 aabb00123456bbccdd b6fuorg741ufili49mg9j4328ig54sqg NS SOA DNSKEY RRSIG
b6fuorg741ufili49mg9j4328ig53sqg.example.com. 3600 IN RRSIG NSEC3 3 3 3600 20070926135752 20070829135752 2854 example.com. AHNLlpOM8cBFBBdzUO9nQC/O6mw3rDUrqcdiSwMKAIckd3k5WZvoP78=
; ent.example.com. -> 2kekcu37chvrqjb272ptidu9jhk8oqag.
; OPTOUT SPAN around it
2kekcu37chvrqjb272ptidu9jhk7oqag.example.com. IN NSEC3 1 1 123 aabb00123456bbccdd 2kekcu37chvrqjb272ptidu9jhk9oqag
2kekcu37chvrqjb272ptidu9jhk7oqag.example.com. 3600 IN RRSIG NSEC3 3 3 3600 20070926135752 20070829135752 2854 example.com. AFgtC3UEm/Tu4HIjfDHIDmZkvgwHF0kWKcD3wP2hs+/wOfaILtXBr4c=
ENTRY_END
; refer to server one down
ENTRY_BEGIN
MATCH opcode subdomain
ADJUST copy_id copy_query
REPLY QR NOERROR
SECTION QUESTION
ent.example.com. IN A
SECTION AUTHORITY
; example.com. -> b6fuorg741ufili49mg9j4328ig53sqg.
; OPTOUT
b6fuorg741ufili49mg9j4328ig53sqg.example.com. IN NSEC3 1 1 123 aabb00123456bbccdd b6fuorg741ufili49mg9j4328ig54sqg NS SOA DNSKEY RRSIG
b6fuorg741ufili49mg9j4328ig53sqg.example.com. 3600 IN RRSIG NSEC3 3 3 3600 20070926135752 20070829135752 2854 example.com. AHNLlpOM8cBFBBdzUO9nQC/O6mw3rDUrqcdiSwMKAIckd3k5WZvoP78=
; ent.example.com. -> 2kekcu37chvrqjb272ptidu9jhk8oqag.
; OPTOUT SPAN around it
2kekcu37chvrqjb272ptidu9jhk7oqag.example.com. IN NSEC3 1 1 123 aabb00123456bbccdd 2kekcu37chvrqjb272ptidu9jhk9oqag
2kekcu37chvrqjb272ptidu9jhk7oqag.example.com. 3600 IN RRSIG NSEC3 3 3 3600 20070926135752 20070829135752 2854 example.com. AFgtC3UEm/Tu4HIjfDHIDmZkvgwHF0kWKcD3wP2hs+/wOfaILtXBr4c=
ENTRY_END
RANGE_END
STEP 1 QUERY
ENTRY_BEGIN
REPLY RD DO
SECTION QUESTION
ent.example.com. IN A
ENTRY_END
; recursion happens here.
STEP 10 CHECK_ANSWER
ENTRY_BEGIN
MATCH all
REPLY QR RD RA DO NOERROR
SECTION QUESTION
ent.example.com. IN A
SECTION ANSWER
SECTION AUTHORITY
b6fuorg741ufili49mg9j4328ig53sqg.example.com. IN NSEC3 1 1 123 aabb00123456bbccdd b6fuorg741ufili49mg9j4328ig54sqg NS SOA DNSKEY RRSIG
b6fuorg741ufili49mg9j4328ig53sqg.example.com. 3600 IN RRSIG NSEC3 3 3 3600 20070926135752 20070829135752 2854 example.com. AHNLlpOM8cBFBBdzUO9nQC/O6mw3rDUrqcdiSwMKAIckd3k5WZvoP78=
2kekcu37chvrqjb272ptidu9jhk7oqag.example.com. IN NSEC3 1 1 123 aabb00123456bbccdd 2kekcu37chvrqjb272ptidu9jhk9oqag
2kekcu37chvrqjb272ptidu9jhk7oqag.example.com. 3600 IN RRSIG NSEC3 3 3 3600 20070926135752 20070829135752 2854 example.com. AFgtC3UEm/Tu4HIjfDHIDmZkvgwHF0kWKcD3wP2hs+/wOfaILtXBr4c=
SECTION ADDITIONAL
ENTRY_END
SCENARIO_END
dnssecjava-1.1.3/src/test/resources/unbound/val_nsec3_entnodata_optout_badopt.rpl 0000664 0000000 0000000 00000014513 13020541473 0030466 0 ustar 00root root 0000000 0000000 ; config options
; The island of trust is at example.com
server:
trust-anchor: "example.com. 3600 IN DS 2854 3 1 46e4ffc6e9a4793b488954bd3f0cc6af0dfb201b"
val-override-date: "20070916134226"
target-fetch-policy: "0 0 0 0 0"
stub-zone:
name: "."
stub-addr: 193.0.14.129 # K.ROOT-SERVERS.NET.
CONFIG_END
SCENARIO_BEGIN Test validator with NSEC3 response for NODATA ENT with optout.
; K.ROOT-SERVERS.NET.
RANGE_BEGIN 0 100
ADDRESS 193.0.14.129
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
. IN NS
SECTION ANSWER
. IN NS K.ROOT-SERVERS.NET.
SECTION ADDITIONAL
K.ROOT-SERVERS.NET. IN A 193.0.14.129
ENTRY_END
ENTRY_BEGIN
MATCH opcode subdomain
ADJUST copy_id copy_query
REPLY QR NOERROR
SECTION QUESTION
com. IN A
SECTION AUTHORITY
com. IN NS a.gtld-servers.net.
SECTION ADDITIONAL
a.gtld-servers.net. IN A 192.5.6.30
ENTRY_END
RANGE_END
; a.gtld-servers.net.
RANGE_BEGIN 0 100
ADDRESS 192.5.6.30
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
com. IN NS
SECTION ANSWER
com. IN NS a.gtld-servers.net.
SECTION ADDITIONAL
a.gtld-servers.net. IN A 192.5.6.30
ENTRY_END
ENTRY_BEGIN
MATCH opcode subdomain
ADJUST copy_id copy_query
REPLY QR NOERROR
SECTION QUESTION
example.com. IN A
SECTION AUTHORITY
example.com. IN NS ns.example.com.
SECTION ADDITIONAL
ns.example.com. IN A 1.2.3.4
ENTRY_END
RANGE_END
; ns.example.com.
RANGE_BEGIN 0 100
ADDRESS 1.2.3.4
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR AA REFUSED
SECTION QUESTION
ns.example.com. IN A
ENTRY_END
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR AA REFUSED
SECTION QUESTION
ns.example.com. IN AAAA
ENTRY_END
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
example.com. IN NS
SECTION ANSWER
example.com. IN NS ns.example.com.
example.com. 3600 IN RRSIG NS 3 2 3600 20070926134150 20070829134150 2854 example.com. MC0CFQCN+qHdJxoI/2tNKwsb08pra/G7aAIUAWA5sDdJTbrXA1/3OaesGBAO3sI= ;{id = 2854}
SECTION ADDITIONAL
ns.example.com. IN A 1.2.3.4
ns.example.com. 3600 IN RRSIG A 3 3 3600 20070926135752 20070829135752 2854 example.com. MC0CFQCMSWxVehgOQLoYclB9PIAbNP229AIUeH0vNNGJhjnZiqgIOKvs1EhzqAo= ;{id = 2854}
ENTRY_END
; response to DNSKEY priming query
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
example.com. IN DNSKEY
SECTION ANSWER
example.com. 3600 IN DNSKEY 256 3 3 ALXLUsWqUrY3JYER3T4TBJII s70j+sDS/UT2QRp61SE7S3E EXopNXoFE73JLRmvpi/UrOO/Vz4Se 6wXv/CYCKjGw06U4WRgR YXcpEhJROyNapmdIKSx hOzfLVE1gqA0PweZR8d tY3aNQSRn3sPpwJr6Mi /PqQKAMMrZ9ckJpf1+b QMOOvxgzz2U1GS18b3y ZKcgTMEaJzd/GZYzi/B N2DzQ0MsrSwYXfsNLFO Bbs8PJMW4LYIxeeOe6rUgkWOF 7CC9Dh/dduQ1QrsJhmZAEFfd6ByYV+ ;{id = 2854 (zsk), size = 1688b}
example.com. 3600 IN RRSIG DNSKEY 3 2 3600 20070926134802 20070829134802 2854 example.com. MCwCFG1yhRNtTEa3Eno2zhVVuy2EJX3wAhQeLyUp6+UXcpC5qGNu9tkrTEgPUg== ;{id = 2854}
SECTION AUTHORITY
example.com. IN NS ns.example.com.
example.com. 3600 IN RRSIG NS 3 2 3600 20070926134150 20070829134150 2854 example.com. MC0CFQCN+qHdJxoI/2tNKwsb08pra/G7aAIUAWA5sDdJTbrXA1/3OaesGBAO3sI= ;{id = 2854}
SECTION ADDITIONAL
ns.example.com. IN A 1.2.3.4
ns.example.com. 3600 IN RRSIG A 3 3 3600 20070926135752 20070829135752 2854 example.com. MC0CFQCMSWxVehgOQLoYclB9PIAbNP229AIUeH0vNNGJhjnZiqgIOKvs1EhzqAo= ;{id = 2854}
ENTRY_END
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
www.example.com. IN A
SECTION AUTHORITY
example.com. IN SOA ns.example.com. hostmaster.example.com. 2007090400 28800 7200 604800 18000
example.com. 3600 IN RRSIG SOA 3 2 3600 20070926135752 20070829135752 2854 example.com. MC0CFQCM6lsu9byZIQ1yYjJmyYfFWM2RWAIUcR5t84r2La824oWCkLjmHXRQlco= ;{id = 2854}
; NODATA response. H(www.example.com.) = s1unhcti19bkdr98fegs0v46mbu3t4m3
s1unhcti19bkdr98fegs0v46mbu3t4m3.example.com. IN NSEC3 1 1 123 aabb00123456bbccdd s1unhcti19bkdr98fegs0v46mbu3t4m4 MX RRSIG
s1unhcti19bkdr98fegs0v46mbu3t4m3.example.com. 3600 IN RRSIG NSEC3 3 3 3600 20070926135752 20070829135752 2854 example.com. MCwCFE/a24nsY2luhQmZjY/ObAIgNSMkAhQWd4MUOUVK55bD6AbMHWrDA0yvEA== ;{id = 2854}
ENTRY_END
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
ent.example.com. IN DS
SECTION AUTHORITY
; example.com. -> b6fuorg741ufili49mg9j4328ig53sqg.
; OPTOUT
b6fuorg741ufili49mg9j4328ig53sqg.example.com. IN NSEC3 1 1 123 aabb00123456bbccdd b6fuorg741ufili49mg9j4328ig54sqg NS SOA DNSKEY RRSIG
b6fuorg741ufili49mg9j4328ig53sqg.example.com. 3600 IN RRSIG NSEC3 3 3 3600 20070926135752 20070829135752 2854 example.com. AHNLlpOM8cBFBBdzUO9nQC/O6mw3rDUrqcdiSwMKAIckd3k5WZvoP78=
; ent.example.com. -> 2kekcu37chvrqjb272ptidu9jhk8oqag.
; the span does not have OPTOUT
2kekcu37chvrqjb272ptidu9jhk7oqag.example.com. IN NSEC3 1 0 123 aabb00123456bbccdd 2kekcu37chvrqjb272ptidu9jhk9oqag
2kekcu37chvrqjb272ptidu9jhk7oqag.example.com. 3600 IN RRSIG NSEC3 3 3 3600 20070926135752 20070829135752 2854 example.com. AAaGjBrmbElksOWsOAU0vdNwbRKsbsQgOwhFkONaynSk9M+2QpJQ6+k=
ENTRY_END
; refer to server one down
ENTRY_BEGIN
MATCH opcode subdomain
ADJUST copy_id copy_query
REPLY QR NOERROR
SECTION QUESTION
ent.example.com. IN A
SECTION AUTHORITY
; example.com. -> b6fuorg741ufili49mg9j4328ig53sqg.
; OPTOUT
b6fuorg741ufili49mg9j4328ig53sqg.example.com. IN NSEC3 1 1 123 aabb00123456bbccdd b6fuorg741ufili49mg9j4328ig54sqg NS SOA DNSKEY RRSIG
b6fuorg741ufili49mg9j4328ig53sqg.example.com. 3600 IN RRSIG NSEC3 3 3 3600 20070926135752 20070829135752 2854 example.com. AHNLlpOM8cBFBBdzUO9nQC/O6mw3rDUrqcdiSwMKAIckd3k5WZvoP78=
; ent.example.com. -> 2kekcu37chvrqjb272ptidu9jhk8oqag.
; the span does not have OPTOUT
2kekcu37chvrqjb272ptidu9jhk7oqag.example.com. IN NSEC3 1 0 123 aabb00123456bbccdd 2kekcu37chvrqjb272ptidu9jhk9oqag
2kekcu37chvrqjb272ptidu9jhk7oqag.example.com. 3600 IN RRSIG NSEC3 3 3 3600 20070926135752 20070829135752 2854 example.com. AAaGjBrmbElksOWsOAU0vdNwbRKsbsQgOwhFkONaynSk9M+2QpJQ6+k=
ENTRY_END
RANGE_END
STEP 1 QUERY
ENTRY_BEGIN
REPLY RD DO
SECTION QUESTION
ent.example.com. IN A
ENTRY_END
; recursion happens here.
STEP 10 CHECK_ANSWER
ENTRY_BEGIN
MATCH all
REPLY QR RD RA DO SERVFAIL
SECTION QUESTION
ent.example.com. IN A
SECTION ANSWER
SECTION AUTHORITY
SECTION ADDITIONAL
ENTRY_END
SCENARIO_END
dnssecjava-1.1.3/src/test/resources/unbound/val_nsec3_entnodata_optout_match.rpl 0000664 0000000 0000000 00000015674 13020541473 0030322 0 ustar 00root root 0000000 0000000 ; config options
; The island of trust is at example.com
server:
trust-anchor: "example.com. 3600 IN DS 2854 3 1 46e4ffc6e9a4793b488954bd3f0cc6af0dfb201b"
val-override-date: "20070916134226"
target-fetch-policy: "0 0 0 0 0"
stub-zone:
name: "."
stub-addr: 193.0.14.129 # K.ROOT-SERVERS.NET.
CONFIG_END
SCENARIO_BEGIN Test validator NODATA ENT with nsec3 optout matches the ent.
; K.ROOT-SERVERS.NET.
RANGE_BEGIN 0 100
ADDRESS 193.0.14.129
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
. IN NS
SECTION ANSWER
. IN NS K.ROOT-SERVERS.NET.
SECTION ADDITIONAL
K.ROOT-SERVERS.NET. IN A 193.0.14.129
ENTRY_END
ENTRY_BEGIN
MATCH opcode subdomain
ADJUST copy_id copy_query
REPLY QR NOERROR
SECTION QUESTION
com. IN A
SECTION AUTHORITY
com. IN NS a.gtld-servers.net.
SECTION ADDITIONAL
a.gtld-servers.net. IN A 192.5.6.30
ENTRY_END
RANGE_END
; a.gtld-servers.net.
RANGE_BEGIN 0 100
ADDRESS 192.5.6.30
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
com. IN NS
SECTION ANSWER
com. IN NS a.gtld-servers.net.
SECTION ADDITIONAL
a.gtld-servers.net. IN A 192.5.6.30
ENTRY_END
ENTRY_BEGIN
MATCH opcode subdomain
ADJUST copy_id copy_query
REPLY QR NOERROR
SECTION QUESTION
example.com. IN A
SECTION AUTHORITY
example.com. IN NS ns.example.com.
SECTION ADDITIONAL
ns.example.com. IN A 1.2.3.4
ENTRY_END
RANGE_END
; ns.example.com.
RANGE_BEGIN 0 100
ADDRESS 1.2.3.4
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR AA REFUSED
SECTION QUESTION
ns.example.com. IN A
ENTRY_END
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR AA REFUSED
SECTION QUESTION
ns.example.com. IN AAAA
ENTRY_END
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
example.com. IN NS
SECTION ANSWER
example.com. IN NS ns.example.com.
example.com. 3600 IN RRSIG NS 3 2 3600 20070926134150 20070829134150 2854 example.com. MC0CFQCN+qHdJxoI/2tNKwsb08pra/G7aAIUAWA5sDdJTbrXA1/3OaesGBAO3sI= ;{id = 2854}
SECTION ADDITIONAL
ns.example.com. IN A 1.2.3.4
ns.example.com. 3600 IN RRSIG A 3 3 3600 20070926135752 20070829135752 2854 example.com. MC0CFQCMSWxVehgOQLoYclB9PIAbNP229AIUeH0vNNGJhjnZiqgIOKvs1EhzqAo= ;{id = 2854}
ENTRY_END
; response to DNSKEY priming query
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
example.com. IN DNSKEY
SECTION ANSWER
example.com. 3600 IN DNSKEY 256 3 3 ALXLUsWqUrY3JYER3T4TBJII s70j+sDS/UT2QRp61SE7S3E EXopNXoFE73JLRmvpi/UrOO/Vz4Se 6wXv/CYCKjGw06U4WRgR YXcpEhJROyNapmdIKSx hOzfLVE1gqA0PweZR8d tY3aNQSRn3sPpwJr6Mi /PqQKAMMrZ9ckJpf1+b QMOOvxgzz2U1GS18b3y ZKcgTMEaJzd/GZYzi/B N2DzQ0MsrSwYXfsNLFO Bbs8PJMW4LYIxeeOe6rUgkWOF 7CC9Dh/dduQ1QrsJhmZAEFfd6ByYV+ ;{id = 2854 (zsk), size = 1688b}
example.com. 3600 IN RRSIG DNSKEY 3 2 3600 20070926134802 20070829134802 2854 example.com. MCwCFG1yhRNtTEa3Eno2zhVVuy2EJX3wAhQeLyUp6+UXcpC5qGNu9tkrTEgPUg== ;{id = 2854}
SECTION AUTHORITY
example.com. IN NS ns.example.com.
example.com. 3600 IN RRSIG NS 3 2 3600 20070926134150 20070829134150 2854 example.com. MC0CFQCN+qHdJxoI/2tNKwsb08pra/G7aAIUAWA5sDdJTbrXA1/3OaesGBAO3sI= ;{id = 2854}
SECTION ADDITIONAL
ns.example.com. IN A 1.2.3.4
ns.example.com. 3600 IN RRSIG A 3 3 3600 20070926135752 20070829135752 2854 example.com. MC0CFQCMSWxVehgOQLoYclB9PIAbNP229AIUeH0vNNGJhjnZiqgIOKvs1EhzqAo= ;{id = 2854}
ENTRY_END
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
www.example.com. IN A
SECTION AUTHORITY
example.com. IN SOA ns.example.com. hostmaster.example.com. 2007090400 28800 7200 604800 18000
example.com. 3600 IN RRSIG SOA 3 2 3600 20070926135752 20070829135752 2854 example.com. MC0CFQCM6lsu9byZIQ1yYjJmyYfFWM2RWAIUcR5t84r2La824oWCkLjmHXRQlco= ;{id = 2854}
; NODATA response. H(www.example.com.) = s1unhcti19bkdr98fegs0v46mbu3t4m3
s1unhcti19bkdr98fegs0v46mbu3t4m3.example.com. IN NSEC3 1 1 123 aabb00123456bbccdd s1unhcti19bkdr98fegs0v46mbu3t4m4 MX RRSIG
s1unhcti19bkdr98fegs0v46mbu3t4m3.example.com. 3600 IN RRSIG NSEC3 3 3 3600 20070926135752 20070829135752 2854 example.com. MCwCFE/a24nsY2luhQmZjY/ObAIgNSMkAhQWd4MUOUVK55bD6AbMHWrDA0yvEA== ;{id = 2854}
ENTRY_END
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
ent.example.com. IN DS
SECTION AUTHORITY
; example.com. -> b6fuorg741ufili49mg9j4328ig53sqg.
; OPTOUT
b6fuorg741ufili49mg9j4328ig53sqg.example.com. IN NSEC3 1 1 123 aabb00123456bbccdd b6fuorg741ufili49mg9j4328ig54sqg NS SOA DNSKEY RRSIG
b6fuorg741ufili49mg9j4328ig53sqg.example.com. 3600 IN RRSIG NSEC3 3 3 3600 20070926135752 20070829135752 2854 example.com. AHNLlpOM8cBFBBdzUO9nQC/O6mw3rDUrqcdiSwMKAIckd3k5WZvoP78=
; ent.example.com. -> 2kekcu37chvrqjb272ptidu9jhk8oqag.
; OPTOUT
2kekcu37chvrqjb272ptidu9jhk8oqag.example.com. IN NSEC3 1 1 123 aabb00123456bbccdd 2kekcu37chvrqjb272ptidu9jhk9oqag
2kekcu37chvrqjb272ptidu9jhk8oqag.example.com. 3600 IN RRSIG NSEC3 3 3 3600 20070926135752 20070829135752 2854 example.com. AJl6kanB5RTIcTJysEzDUNqQAr0ftIqzGzQw2+v8RLEbn3Yhi1bEfOQ=
ENTRY_END
; refer to server one down
ENTRY_BEGIN
MATCH opcode subdomain
ADJUST copy_id copy_query
REPLY QR NOERROR
SECTION QUESTION
ent.example.com. IN A
SECTION AUTHORITY
; example.com. -> b6fuorg741ufili49mg9j4328ig53sqg.
; OPTOUT
b6fuorg741ufili49mg9j4328ig53sqg.example.com. IN NSEC3 1 1 123 aabb00123456bbccdd b6fuorg741ufili49mg9j4328ig54sqg NS SOA DNSKEY RRSIG
b6fuorg741ufili49mg9j4328ig53sqg.example.com. 3600 IN RRSIG NSEC3 3 3 3600 20070926135752 20070829135752 2854 example.com. AHNLlpOM8cBFBBdzUO9nQC/O6mw3rDUrqcdiSwMKAIckd3k5WZvoP78=
; ent.example.com. -> 2kekcu37chvrqjb272ptidu9jhk8oqag.
; OPTOUT
2kekcu37chvrqjb272ptidu9jhk8oqag.example.com. IN NSEC3 1 1 123 aabb00123456bbccdd 2kekcu37chvrqjb272ptidu9jhk9oqag
2kekcu37chvrqjb272ptidu9jhk8oqag.example.com. 3600 IN RRSIG NSEC3 3 3 3600 20070926135752 20070829135752 2854 example.com. AJl6kanB5RTIcTJysEzDUNqQAr0ftIqzGzQw2+v8RLEbn3Yhi1bEfOQ=
ENTRY_END
RANGE_END
STEP 1 QUERY
ENTRY_BEGIN
REPLY RD DO
SECTION QUESTION
ent.example.com. IN A
ENTRY_END
; recursion happens here.
STEP 10 CHECK_ANSWER
ENTRY_BEGIN
MATCH all
REPLY QR RD RA AD DO NOERROR
SECTION QUESTION
ent.example.com. IN A
SECTION ANSWER
SECTION AUTHORITY
b6fuorg741ufili49mg9j4328ig53sqg.example.com. 3600 IN NSEC3 1 1 123 aabb00123456bbccdd b6fuorg741ufili49mg9j4328ig54sqg NS SOA RRSIG DNSKEY
b6fuorg741ufili49mg9j4328ig53sqg.example.com. 3600 IN RRSIG NSEC3 3 3 3600 20070926135752 20070829135752 2854 example.com. AHNLlpOM8cBFBBdzUO9nQC/O6mw3rDUrqcdiSwMKAIckd3k5WZvoP78=
2kekcu37chvrqjb272ptidu9jhk8oqag.example.com. 3600 IN NSEC3 1 1 123 aabb00123456bbccdd 2kekcu37chvrqjb272ptidu9jhk9oqag
2kekcu37chvrqjb272ptidu9jhk8oqag.example.com. 3600 IN RRSIG NSEC3 3 3 3600 20070926135752 20070829135752 2854 example.com. AJl6kanB5RTIcTJysEzDUNqQAr0ftIqzGzQw2+v8RLEbn3Yhi1bEfOQ=
SECTION ADDITIONAL
ENTRY_END
SCENARIO_END
dnssecjava-1.1.3/src/test/resources/unbound/val_nsec3_iter_high.rpl 0000664 0000000 0000000 00000014556 13020541473 0025517 0 ustar 00root root 0000000 0000000 ; config options
; The island of trust is at example.com
server:
trust-anchor: "example.com. 3600 IN DS 2854 3 1 46e4ffc6e9a4793b488954bd3f0cc6af0dfb201b"
val-override-date: "20070916134226"
val-nsec3-keysize-iterations: "1024 100 2048 200 4096 500"
target-fetch-policy: "0 0 0 0 0"
stub-zone:
name: "."
stub-addr: 193.0.14.129 # K.ROOT-SERVERS.NET.
CONFIG_END
SCENARIO_BEGIN Test validator with nxdomain NSEC3 with too high iterations
; K.ROOT-SERVERS.NET.
RANGE_BEGIN 0 100
ADDRESS 193.0.14.129
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
. IN NS
SECTION ANSWER
. IN NS K.ROOT-SERVERS.NET.
SECTION ADDITIONAL
K.ROOT-SERVERS.NET. IN A 193.0.14.129
ENTRY_END
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
www.example.com. IN A
SECTION AUTHORITY
com. IN NS a.gtld-servers.net.
SECTION ADDITIONAL
a.gtld-servers.net. IN A 192.5.6.30
ENTRY_END
RANGE_END
; a.gtld-servers.net.
RANGE_BEGIN 0 100
ADDRESS 192.5.6.30
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
com. IN NS
SECTION ANSWER
com. IN NS a.gtld-servers.net.
SECTION ADDITIONAL
a.gtld-servers.net. IN A 192.5.6.30
ENTRY_END
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
www.example.com. IN A
SECTION AUTHORITY
example.com. IN NS ns.example.com.
SECTION ADDITIONAL
ns.example.com. IN A 1.2.3.4
ENTRY_END
RANGE_END
; ns.example.com.
RANGE_BEGIN 0 100
ADDRESS 1.2.3.4
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
example.com. IN NS
SECTION ANSWER
example.com. IN NS ns.example.com.
example.com. 3600 IN RRSIG NS 3 2 3600 20070926134150 20070829134150 2854 example.com. MC0CFQCN+qHdJxoI/2tNKwsb08pra/G7aAIUAWA5sDdJTbrXA1/3OaesGBAO3sI= ;{id = 2854}
SECTION ADDITIONAL
ns.example.com. IN A 1.2.3.4
ns.example.com. 3600 IN RRSIG A 3 3 3600 20070926135752 20070829135752 2854 example.com. MC0CFQCMSWxVehgOQLoYclB9PIAbNP229AIUeH0vNNGJhjnZiqgIOKvs1EhzqAo= ;{id = 2854}
ENTRY_END
; response to DNSKEY priming query
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
example.com. IN DNSKEY
SECTION ANSWER
example.com. 3600 IN DNSKEY 256 3 3 ALXLUsWqUrY3JYER3T4TBJII s70j+sDS/UT2QRp61SE7S3E EXopNXoFE73JLRmvpi/UrOO/Vz4Se 6wXv/CYCKjGw06U4WRgR YXcpEhJROyNapmdIKSx hOzfLVE1gqA0PweZR8d tY3aNQSRn3sPpwJr6Mi /PqQKAMMrZ9ckJpf1+b QMOOvxgzz2U1GS18b3y ZKcgTMEaJzd/GZYzi/B N2DzQ0MsrSwYXfsNLFO Bbs8PJMW4LYIxeeOe6rUgkWOF 7CC9Dh/dduQ1QrsJhmZAEFfd6ByYV+ ;{id = 2854 (zsk), size = 1688b}
example.com. 3600 IN RRSIG DNSKEY 3 2 3600 20070926134802 20070829134802 2854 example.com. MCwCFG1yhRNtTEa3Eno2zhVVuy2EJX3wAhQeLyUp6+UXcpC5qGNu9tkrTEgPUg== ;{id = 2854}
SECTION AUTHORITY
example.com. IN NS ns.example.com.
example.com. 3600 IN RRSIG NS 3 2 3600 20070926134150 20070829134150 2854 example.com. MC0CFQCN+qHdJxoI/2tNKwsb08pra/G7aAIUAWA5sDdJTbrXA1/3OaesGBAO3sI= ;{id = 2854}
SECTION ADDITIONAL
ns.example.com. IN A 1.2.3.4
ns.example.com. 3600 IN RRSIG A 3 3 3600 20070926135752 20070829135752 2854 example.com. MC0CFQCMSWxVehgOQLoYclB9PIAbNP229AIUeH0vNNGJhjnZiqgIOKvs1EhzqAo= ;{id = 2854}
ENTRY_END
; response to query of interest
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NXDOMAIN
SECTION QUESTION
www.example.com. IN A
SECTION ANSWER
SECTION AUTHORITY
example.com. IN SOA ns.example.com. hostmaster.example.com. 2007090400 28800 7200 604800 18000
example.com. 3600 IN RRSIG SOA 3 2 3600 20070926134150 20070829134150 2854 example.com. MC0CFCNGZ+/OfElYQMCZ77O9Lw9rhk7PAhUAmDcvTAst6Bq83qPq3r6c/Dm1nFc= ;{id = 2854}
; closest encloser, H(example.com).
6md8numosa4q9ugkffdo1bmm82t5j39s.example.com. NSEC3 1 1 8 - 6md8numosa4q9ugkffdo1bmm82t5j49s SOA NS MX DNSKEY RRSIG
6md8numosa4q9ugkffdo1bmm82t5j39s.example.com. 3600 IN RRSIG NSEC3 3 3 3600 20070926135752 20070829135752 2854 example.com. MC0CFQCz/LkFOFcaQzVnyySW9ZoVUnxh7gIUdxyS9vqVDzo8pGhFU+3YogN2ZRk= ;{id = 2854}
; wildcard denial, H(*.example.com.) = 4f3cnt8cu22tngec382jj4gde4rb47ub
4f3cnt8cu22tngec382jj4gde4rb46ub.example.com. NSEC3 1 1 0 - 4f3cnt8cu22tngec382jj4gde4rb48ub A MX RRSIG
4f3cnt8cu22tngec382jj4gde4rb46ub.example.com. 3600 IN RRSIG NSEC3 3 3 3600 20070926135752 20070829135752 2854 example.com. MCwCFHS+i/OB/V/gYmS1eQTXieXIXGjsAhQQ0Ql7TW/hsUklrb0DfoyhVPG95Q== ;{id = 2854}
; next closer name, H(www.example.com.) = s1unhcti19bkdr98fegs0v46mbu3t4m3.
s1unhcti19bkdr98fegs0v46mbu3t4m2.example.com. NSEC3 1 1 123 aabb00123456bbccdd s1unhcti19bkdr98fegs0v46mbu3t4m4 A MX RRSIG
s1unhcti19bkdr98fegs0v46mbu3t4m2.example.com. 3600 IN RRSIG NSEC3 3 3 3600 20070926135752 20070829135752 2854 example.com. MC0CFFSH4klZKke48dYyddYDj17gjTS0AhUAltWicpFLWqW98/Af9Qlx70MH8o4= ;{id = 2854}
ENTRY_END
RANGE_END
STEP 1 QUERY
ENTRY_BEGIN
REPLY RD DO
SECTION QUESTION
www.example.com. IN A
ENTRY_END
; recursion happens here.
STEP 10 CHECK_ANSWER
ENTRY_BEGIN
MATCH all
REPLY QR RD RA NXDOMAIN
SECTION QUESTION
www.example.com. IN A
SECTION ANSWER
SECTION AUTHORITY
example.com. IN SOA ns.example.com. hostmaster.example.com. 2007090400 28800 7200 604800 18000
example.com. 3600 IN RRSIG SOA 3 2 3600 20070926134150 20070829134150 2854 example.com. MC0CFCNGZ+/OfElYQMCZ77O9Lw9rhk7PAhUAmDcvTAst6Bq83qPq3r6c/Dm1nFc= ;{id = 2854}
6md8numosa4q9ugkffdo1bmm82t5j39s.example.com. NSEC3 1 1 8 - 6md8numosa4q9ugkffdo1bmm82t5j49s SOA NS MX DNSKEY RRSIG
6md8numosa4q9ugkffdo1bmm82t5j39s.example.com. 3600 IN RRSIG NSEC3 3 3 3600 20070926135752 20070829135752 2854 example.com. MC0CFQCz/LkFOFcaQzVnyySW9ZoVUnxh7gIUdxyS9vqVDzo8pGhFU+3YogN2ZRk= ;{id = 2854}
4f3cnt8cu22tngec382jj4gde4rb46ub.example.com. NSEC3 1 1 0 - 4f3cnt8cu22tngec382jj4gde4rb48ub A MX RRSIG
4f3cnt8cu22tngec382jj4gde4rb46ub.example.com. 3600 IN RRSIG NSEC3 3 3 3600 20070926135752 20070829135752 2854 example.com. MCwCFHS+i/OB/V/gYmS1eQTXieXIXGjsAhQQ0Ql7TW/hsUklrb0DfoyhVPG95Q== ;{id = 2854}
s1unhcti19bkdr98fegs0v46mbu3t4m2.example.com. NSEC3 1 1 123 aabb00123456bbccdd s1unhcti19bkdr98fegs0v46mbu3t4m4 A MX RRSIG
s1unhcti19bkdr98fegs0v46mbu3t4m2.example.com. 3600 IN RRSIG NSEC3 3 3 3600 20070926135752 20070829135752 2854 example.com. MC0CFFSH4klZKke48dYyddYDj17gjTS0AhUAltWicpFLWqW98/Af9Qlx70MH8o4= ;{id = 2854}
SECTION ADDITIONAL
ENTRY_END
SCENARIO_END
dnssecjava-1.1.3/src/test/resources/unbound/val_nsec3_nodatawccname.rpl 0000664 0000000 0000000 00000012444 13020541473 0026353 0 ustar 00root root 0000000 0000000 ; config options
; The island of trust is at example.com
server:
trust-anchor: "example.com. 3600 IN DS 2854 3 1 46e4ffc6e9a4793b488954bd3f0cc6af0dfb201b"
val-override-date: "20070916134226"
target-fetch-policy: "0 0 0 0 0"
stub-zone:
name: "."
stub-addr: 193.0.14.129 # K.ROOT-SERVERS.NET.
CONFIG_END
SCENARIO_BEGIN Test validator with nodata NSEC3 abused wildcarded CNAME.
; K.ROOT-SERVERS.NET.
RANGE_BEGIN 0 100
ADDRESS 193.0.14.129
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
. IN NS
SECTION ANSWER
. IN NS K.ROOT-SERVERS.NET.
SECTION ADDITIONAL
K.ROOT-SERVERS.NET. IN A 193.0.14.129
ENTRY_END
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
www.example.com. IN A
SECTION AUTHORITY
com. IN NS a.gtld-servers.net.
SECTION ADDITIONAL
a.gtld-servers.net. IN A 192.5.6.30
ENTRY_END
RANGE_END
; a.gtld-servers.net.
RANGE_BEGIN 0 100
ADDRESS 192.5.6.30
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
com. IN NS
SECTION ANSWER
com. IN NS a.gtld-servers.net.
SECTION ADDITIONAL
a.gtld-servers.net. IN A 192.5.6.30
ENTRY_END
ENTRY_BEGIN
MATCH opcode subdomain
ADJUST copy_id copy_query
REPLY QR NOERROR
SECTION QUESTION
example.com. IN A
SECTION AUTHORITY
example.com. IN NS ns.example.com.
SECTION ADDITIONAL
ns.example.com. IN A 1.2.3.4
ENTRY_END
RANGE_END
; ns.example.com.
RANGE_BEGIN 0 100
ADDRESS 1.2.3.4
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR AA REFUSED
SECTION QUESTION
ns.example.com. IN A
ENTRY_END
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR AA REFUSED
SECTION QUESTION
ns.example.com. IN AAAA
ENTRY_END
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
example.com. IN NS
SECTION ANSWER
example.com. IN NS ns.example.com.
example.com. 3600 IN RRSIG NS 3 2 3600 20070926134150 20070829134150 2854 example.com. MC0CFQCN+qHdJxoI/2tNKwsb08pra/G7aAIUAWA5sDdJTbrXA1/3OaesGBAO3sI= ;{id = 2854}
SECTION ADDITIONAL
ns.example.com. IN A 1.2.3.4
ns.example.com. 3600 IN RRSIG A 3 3 3600 20070926135752 20070829135752 2854 example.com. MC0CFQCMSWxVehgOQLoYclB9PIAbNP229AIUeH0vNNGJhjnZiqgIOKvs1EhzqAo= ;{id = 2854}
ENTRY_END
; response to DNSKEY priming query
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
example.com. IN DNSKEY
SECTION ANSWER
example.com. 3600 IN DNSKEY 256 3 3 ALXLUsWqUrY3JYER3T4TBJII s70j+sDS/UT2QRp61SE7S3E EXopNXoFE73JLRmvpi/UrOO/Vz4Se 6wXv/CYCKjGw06U4WRgR YXcpEhJROyNapmdIKSx hOzfLVE1gqA0PweZR8d tY3aNQSRn3sPpwJr6Mi /PqQKAMMrZ9ckJpf1+b QMOOvxgzz2U1GS18b3y ZKcgTMEaJzd/GZYzi/B N2DzQ0MsrSwYXfsNLFO Bbs8PJMW4LYIxeeOe6rUgkWOF 7CC9Dh/dduQ1QrsJhmZAEFfd6ByYV+ ;{id = 2854 (zsk), size = 1688b}
example.com. 3600 IN RRSIG DNSKEY 3 2 3600 20070926134802 20070829134802 2854 example.com. MCwCFG1yhRNtTEa3Eno2zhVVuy2EJX3wAhQeLyUp6+UXcpC5qGNu9tkrTEgPUg== ;{id = 2854}
SECTION AUTHORITY
example.com. IN NS ns.example.com.
example.com. 3600 IN RRSIG NS 3 2 3600 20070926134150 20070829134150 2854 example.com. MC0CFQCN+qHdJxoI/2tNKwsb08pra/G7aAIUAWA5sDdJTbrXA1/3OaesGBAO3sI= ;{id = 2854}
SECTION ADDITIONAL
ns.example.com. IN A 1.2.3.4
ns.example.com. 3600 IN RRSIG A 3 3 3600 20070926135752 20070829135752 2854 example.com. MC0CFQCMSWxVehgOQLoYclB9PIAbNP229AIUeH0vNNGJhjnZiqgIOKvs1EhzqAo= ;{id = 2854}
ENTRY_END
; response to query of interest
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
www.example.com. IN A
SECTION ANSWER
SECTION AUTHORITY
example.com. IN SOA ns.example.com. hostmaster.example.com. 2007090400 28800 7200 604800 18000
example.com. 3600 IN RRSIG SOA 3 2 3600 20070926134150 20070829134150 2854 example.com. MC0CFCNGZ+/OfElYQMCZ77O9Lw9rhk7PAhUAmDcvTAst6Bq83qPq3r6c/Dm1nFc= ;{id = 2854}
; closest encloser
6md8numosa4q9ugkffdo1bmm82t5j39s.example.com. NSEC3 1 1 8 - 6md8numosa4q9ugkffdo1bmm82t5j49s SOA NS MX DNSKEY RRSIG
6md8numosa4q9ugkffdo1bmm82t5j39s.example.com. 3600 IN RRSIG NSEC3 3 3 3600 20070926135752 20070829135752 2854 example.com. MC0CFQCz/LkFOFcaQzVnyySW9ZoVUnxh7gIUdxyS9vqVDzo8pGhFU+3YogN2ZRk= ;{id = 2854}
; wildcard H(*.example.com.) = 4f3cnt8cu22tngec382jj4gde4rb47ub
4f3cnt8cu22tngec382jj4gde4rb47ub.example.com. NSEC3 1 1 0 - 4f3cnt8cu22tngec382jj4gde4rb48ub CNAME RRSIG
4f3cnt8cu22tngec382jj4gde4rb47ub.example.com. 3600 IN RRSIG NSEC3 3 3 3600 20070926135752 20070829135752 2854 example.com. MC0CFHo9PHBS+MkNWl2DVXH1h1Z8p0yFAhUAjBVKA5s0q5Bt8YOGdY1+9J6GmDU= ;{id = 2854}
; next closer name, H(www.example.com.) = s1unhcti19bkdr98fegs0v46mbu3t4m3.
s1unhcti19bkdr98fegs0v46mbu3t4m2.example.com. NSEC3 1 1 123 aabb00123456bbccdd s1unhcti19bkdr98fegs0v46mbu3t4m4 A MX RRSIG
s1unhcti19bkdr98fegs0v46mbu3t4m2.example.com. 3600 IN RRSIG NSEC3 3 3 3600 20070926135752 20070829135752 2854 example.com. MC0CFFSH4klZKke48dYyddYDj17gjTS0AhUAltWicpFLWqW98/Af9Qlx70MH8o4= ;{id = 2854}
ENTRY_END
RANGE_END
STEP 1 QUERY
ENTRY_BEGIN
REPLY RD
SECTION QUESTION
www.example.com. IN A
ENTRY_END
; recursion happens here.
STEP 10 CHECK_ANSWER
ENTRY_BEGIN
MATCH all
REPLY QR RD RA SERVFAIL
SECTION QUESTION
www.example.com. IN A
SECTION ANSWER
SECTION AUTHORITY
SECTION ADDITIONAL
ENTRY_END
SCENARIO_END
dnssecjava-1.1.3/src/test/resources/unbound/val_nsec3_nods.rpl 0000664 0000000 0000000 00000017167 13020541473 0024521 0 ustar 00root root 0000000 0000000 ; config options
; The island of trust is at example.com
server:
trust-anchor: "example.com. 3600 IN DS 2854 3 1 46e4ffc6e9a4793b488954bd3f0cc6af0dfb201b"
val-override-date: "20070916134226"
target-fetch-policy: "0 0 0 0 0"
stub-zone:
name: "."
stub-addr: 193.0.14.129 # K.ROOT-SERVERS.NET.
CONFIG_END
SCENARIO_BEGIN Test validator with NSEC3 with no DS referral.
; K.ROOT-SERVERS.NET.
RANGE_BEGIN 0 100
ADDRESS 193.0.14.129
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
. IN NS
SECTION ANSWER
. IN NS K.ROOT-SERVERS.NET.
SECTION ADDITIONAL
K.ROOT-SERVERS.NET. IN A 193.0.14.129
ENTRY_END
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
www.sub.example.com. IN A
SECTION AUTHORITY
com. IN NS a.gtld-servers.net.
SECTION ADDITIONAL
a.gtld-servers.net. IN A 192.5.6.30
ENTRY_END
RANGE_END
; a.gtld-servers.net.
RANGE_BEGIN 0 100
ADDRESS 192.5.6.30
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
com. IN NS
SECTION ANSWER
com. IN NS a.gtld-servers.net.
SECTION ADDITIONAL
a.gtld-servers.net. IN A 192.5.6.30
ENTRY_END
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
www.sub.example.com. IN A
SECTION AUTHORITY
example.com. IN NS ns.example.com.
SECTION ADDITIONAL
ns.example.com. IN A 1.2.3.4
ENTRY_END
RANGE_END
; ns.example.com.
RANGE_BEGIN 0 100
ADDRESS 1.2.3.4
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
example.com. IN NS
SECTION ANSWER
example.com. IN NS ns.example.com.
example.com. 3600 IN RRSIG NS 3 2 3600 20070926134150 20070829134150 2854 example.com. MC0CFQCN+qHdJxoI/2tNKwsb08pra/G7aAIUAWA5sDdJTbrXA1/3OaesGBAO3sI= ;{id = 2854}
SECTION ADDITIONAL
ns.example.com. IN A 1.2.3.4
ns.example.com. 3600 IN RRSIG A 3 3 3600 20070926135752 20070829135752 2854 example.com. MC0CFQCMSWxVehgOQLoYclB9PIAbNP229AIUeH0vNNGJhjnZiqgIOKvs1EhzqAo= ;{id = 2854}
ENTRY_END
; response to DNSKEY priming query
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
example.com. IN DNSKEY
SECTION ANSWER
example.com. 3600 IN DNSKEY 256 3 3 ALXLUsWqUrY3JYER3T4TBJII s70j+sDS/UT2QRp61SE7S3E EXopNXoFE73JLRmvpi/UrOO/Vz4Se 6wXv/CYCKjGw06U4WRgR YXcpEhJROyNapmdIKSx hOzfLVE1gqA0PweZR8d tY3aNQSRn3sPpwJr6Mi /PqQKAMMrZ9ckJpf1+b QMOOvxgzz2U1GS18b3y ZKcgTMEaJzd/GZYzi/B N2DzQ0MsrSwYXfsNLFO Bbs8PJMW4LYIxeeOe6rUgkWOF 7CC9Dh/dduQ1QrsJhmZAEFfd6ByYV+ ;{id = 2854 (zsk), size = 1688b}
example.com. 3600 IN RRSIG DNSKEY 3 2 3600 20070926134802 20070829134802 2854 example.com. MCwCFG1yhRNtTEa3Eno2zhVVuy2EJX3wAhQeLyUp6+UXcpC5qGNu9tkrTEgPUg== ;{id = 2854}
SECTION AUTHORITY
example.com. IN NS ns.example.com.
example.com. 3600 IN RRSIG NS 3 2 3600 20070926134150 20070829134150 2854 example.com. MC0CFQCN+qHdJxoI/2tNKwsb08pra/G7aAIUAWA5sDdJTbrXA1/3OaesGBAO3sI= ;{id = 2854}
SECTION ADDITIONAL
ns.example.com. IN A 1.2.3.4
ns.example.com. 3600 IN RRSIG A 3 3 3600 20070926135752 20070829135752 2854 example.com. MC0CFQCMSWxVehgOQLoYclB9PIAbNP229AIUeH0vNNGJhjnZiqgIOKvs1EhzqAo= ;{id = 2854}
ENTRY_END
; response to query of interest
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
www.example.com. IN A
SECTION AUTHORITY
example.com. IN SOA ns.example.com. hostmaster.example.com. 2007090400 28800 7200 604800 18000
example.com. 3600 IN RRSIG SOA 3 2 3600 20070926135752 20070829135752 2854 example.com. MC0CFQCM6lsu9byZIQ1yYjJmyYfFWM2RWAIUcR5t84r2La824oWCkLjmHXRQlco= ;{id = 2854}
; NODATA response. H(www.example.com.) = s1unhcti19bkdr98fegs0v46mbu3t4m3
s1unhcti19bkdr98fegs0v46mbu3t4m3.example.com. IN NSEC3 1 1 123 aabb00123456bbccdd s1unhcti19bkdr98fegs0v46mbu3t4m4 MX RRSIG
s1unhcti19bkdr98fegs0v46mbu3t4m3.example.com. 3600 IN RRSIG NSEC3 3 3 3600 20070926135752 20070829135752 2854 example.com. MCwCFE/a24nsY2luhQmZjY/ObAIgNSMkAhQWd4MUOUVK55bD6AbMHWrDA0yvEA== ;{id = 2854}
ENTRY_END
; refer to server one down
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
www.sub.example.com. IN A
SECTION AUTHORITY
sub.example.com. IN NS ns.sub.example.com.
; proof that there is no DS here.
;sub.example.com. 3600 IN DS 2854 DSA 1 be4d46cd7489cce25a31af0dff2968ce0425dd31
;sub.example.com. 3600 IN RRSIG DS 3 3 3600 20070926135752 20070829135752 2854 example.com. MC0CFQC1WMTfb25sTgeUEXCFR4+YiJqecwIUc2R/jrO4amyQxovSnld2reg8eyo= ;{id = 2854}
; sub.example.com. -> 8r1f0ieoutlnjc03meng9e3bn2n0o9pd.
8r1f0ieoutlnjc03meng9e3bn2n0o9pd.example.com. IN NSEC3 1 1 123 aabb00123456bbccdd 8r1f0ieoutlnjc03meng9e3bn3n0o9pd NS RRSIG
8r1f0ieoutlnjc03meng9e3bn2n0o9pd.example.com. 3600 IN RRSIG NSEC3 3 3 3600 20070926135752 20070829135752 2854 example.com. MC0CFEC78oZJjqlV6kVyQb4X0o6tsUpUAhUAk+bgth7eeN+aO8ts2+yLSyzSX9g= ;{id = 2854}
SECTION ADDITIONAL
ns.sub.example.com. IN A 1.2.3.10
ENTRY_END
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
sub.example.com. IN DS
SECTION AUTHORITY
; proof that there is no DS here.
;sub.example.com. 3600 IN DS 2854 DSA 1 be4d46cd7489cce25a31af0dff2968ce0425dd31
;sub.example.com. 3600 IN RRSIG DS 3 3 3600 20070926135752 20070829135752 2854 example.com. MC0CFQC1WMTfb25sTgeUEXCFR4+YiJqecwIUc2R/jrO4amyQxovSnld2reg8eyo= ;{id = 2854}
; sub.example.com. -> 8r1f0ieoutlnjc03meng9e3bn2n0o9pd.
8r1f0ieoutlnjc03meng9e3bn2n0o9pd.example.com. IN NSEC3 1 1 123 aabb00123456bbccdd 8r1f0ieoutlnjc03meng9e3bn3n0o9pd NS RRSIG
8r1f0ieoutlnjc03meng9e3bn2n0o9pd.example.com. 3600 IN RRSIG NSEC3 3 3 3600 20070926135752 20070829135752 2854 example.com. MC0CFEC78oZJjqlV6kVyQb4X0o6tsUpUAhUAk+bgth7eeN+aO8ts2+yLSyzSX9g= ;{id = 2854}
ENTRY_END
RANGE_END
; ns.sub.example.com.
RANGE_BEGIN 0 100
ADDRESS 1.2.3.10
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR REFUSED
SECTION QUESTION
sub.example.com. IN NS
SECTION ANSWER
ENTRY_END
; response to DNSKEY priming query
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
sub.example.com. IN DNSKEY
SECTION ANSWER
sub.example.com. 3600 IN DNSKEY 256 3 3 ALXLUsWqUrY3JYER3T4TBJII s70j+sDS/UT2QRp61SE7S3E EXopNXoFE73JLRmvpi/UrOO/Vz4Se 6wXv/CYCKjGw06U4WRgR YXcpEhJROyNapmdIKSx hOzfLVE1gqA0PweZR8d tY3aNQSRn3sPpwJr6Mi /PqQKAMMrZ9ckJpf1+b QMOOvxgzz2U1GS18b3y ZKcgTMEaJzd/GZYzi/B N2DzQ0MsrSwYXfsNLFO Bbs8PJMW4LYIxeeOe6rUgkWOF 7CC9Dh/dduQ1QrsJhmZAEFfd6ByYV+ ;{id = 2854 (zsk), size = 1688b}
sub.example.com. 3600 IN RRSIG DNSKEY 3 3 3600 20070926135752 20070829135752 2854 sub.example.com. MCwCFBznBTYM/SrdUnjQdBnLtRO79KAaAhQReG5nRuL7Xsdf6D0KKwPa1GpWyQ== ;{id = 2854}
ENTRY_END
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
www.sub.example.com. IN A
SECTION ANSWER
www.sub.example.com. IN A 1.2.3.123
www.sub.example.com. 3600 IN RRSIG A 3 4 3600 20070926135752 20070829135752 2854 sub.example.com. MC0CFEExteiCsLkRi/md6o5K8BhRJAKFAhUAgg2tkvwaDn8Xbm9q+5xnjvgIB8k= ;{id = 2854}
ENTRY_END
RANGE_END
STEP 1 QUERY
ENTRY_BEGIN
REPLY RD DO
SECTION QUESTION
www.sub.example.com. IN A
ENTRY_END
; recursion happens here.
STEP 10 CHECK_ANSWER
ENTRY_BEGIN
MATCH all
REPLY QR RD RA NOERROR
SECTION QUESTION
www.sub.example.com. IN A
SECTION ANSWER
www.sub.example.com. IN A 1.2.3.123
www.sub.example.com. 3600 IN RRSIG A 3 4 3600 20070926135752 20070829135752 2854 sub.example.com. MC0CFEExteiCsLkRi/md6o5K8BhRJAKFAhUAgg2tkvwaDn8Xbm9q+5xnjvgIB8k= ;{id = 2854}
SECTION AUTHORITY
SECTION ADDITIONAL
ENTRY_END
SCENARIO_END
dnssecjava-1.1.3/src/test/resources/unbound/val_nsec3_nods_badopt.rpl 0000664 0000000 0000000 00000021074 13020541473 0026042 0 ustar 00root root 0000000 0000000 ; config options
; The island of trust is at example.com
server:
trust-anchor: "example.com. 3600 IN DS 2854 3 1 46e4ffc6e9a4793b488954bd3f0cc6af0dfb201b"
val-override-date: "20070916134226"
target-fetch-policy: "0 0 0 0 0"
stub-zone:
name: "."
stub-addr: 193.0.14.129 # K.ROOT-SERVERS.NET.
CONFIG_END
SCENARIO_BEGIN Test validator with NSEC3 with no DS with wrong optout bit.
; K.ROOT-SERVERS.NET.
RANGE_BEGIN 0 100
ADDRESS 193.0.14.129
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
. IN NS
SECTION ANSWER
. IN NS K.ROOT-SERVERS.NET.
SECTION ADDITIONAL
K.ROOT-SERVERS.NET. IN A 193.0.14.129
ENTRY_END
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
www.sub.example.com. IN A
SECTION AUTHORITY
com. IN NS a.gtld-servers.net.
SECTION ADDITIONAL
a.gtld-servers.net. IN A 192.5.6.30
ENTRY_END
RANGE_END
; a.gtld-servers.net.
RANGE_BEGIN 0 100
ADDRESS 192.5.6.30
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
com. IN NS
SECTION ANSWER
com. IN NS a.gtld-servers.net.
SECTION ADDITIONAL
a.gtld-servers.net. IN A 192.5.6.30
ENTRY_END
ENTRY_BEGIN
MATCH opcode subdomain
ADJUST copy_id copy_query
REPLY QR NOERROR
SECTION QUESTION
example.com. IN A
SECTION AUTHORITY
example.com. IN NS ns.example.com.
SECTION ADDITIONAL
ns.example.com. IN A 1.2.3.4
ENTRY_END
RANGE_END
; ns.example.com.
RANGE_BEGIN 0 100
ADDRESS 1.2.3.4
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR AA REFUSED
SECTION QUESTION
ns.example.com. IN A
ENTRY_END
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR AA REFUSED
SECTION QUESTION
ns.example.com. IN AAAA
ENTRY_END
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
example.com. IN NS
SECTION ANSWER
example.com. IN NS ns.example.com.
example.com. 3600 IN RRSIG NS 3 2 3600 20070926134150 20070829134150 2854 example.com. MC0CFQCN+qHdJxoI/2tNKwsb08pra/G7aAIUAWA5sDdJTbrXA1/3OaesGBAO3sI= ;{id = 2854}
SECTION ADDITIONAL
ns.example.com. IN A 1.2.3.4
ns.example.com. 3600 IN RRSIG A 3 3 3600 20070926135752 20070829135752 2854 example.com. MC0CFQCMSWxVehgOQLoYclB9PIAbNP229AIUeH0vNNGJhjnZiqgIOKvs1EhzqAo= ;{id = 2854}
ENTRY_END
; response to DNSKEY priming query
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
example.com. IN DNSKEY
SECTION ANSWER
example.com. 3600 IN DNSKEY 256 3 3 ALXLUsWqUrY3JYER3T4TBJII s70j+sDS/UT2QRp61SE7S3E EXopNXoFE73JLRmvpi/UrOO/Vz4Se 6wXv/CYCKjGw06U4WRgR YXcpEhJROyNapmdIKSx hOzfLVE1gqA0PweZR8d tY3aNQSRn3sPpwJr6Mi /PqQKAMMrZ9ckJpf1+b QMOOvxgzz2U1GS18b3y ZKcgTMEaJzd/GZYzi/B N2DzQ0MsrSwYXfsNLFO Bbs8PJMW4LYIxeeOe6rUgkWOF 7CC9Dh/dduQ1QrsJhmZAEFfd6ByYV+ ;{id = 2854 (zsk), size = 1688b}
example.com. 3600 IN RRSIG DNSKEY 3 2 3600 20070926134802 20070829134802 2854 example.com. MCwCFG1yhRNtTEa3Eno2zhVVuy2EJX3wAhQeLyUp6+UXcpC5qGNu9tkrTEgPUg== ;{id = 2854}
SECTION AUTHORITY
example.com. IN NS ns.example.com.
example.com. 3600 IN RRSIG NS 3 2 3600 20070926134150 20070829134150 2854 example.com. MC0CFQCN+qHdJxoI/2tNKwsb08pra/G7aAIUAWA5sDdJTbrXA1/3OaesGBAO3sI= ;{id = 2854}
SECTION ADDITIONAL
ns.example.com. IN A 1.2.3.4
ns.example.com. 3600 IN RRSIG A 3 3 3600 20070926135752 20070829135752 2854 example.com. MC0CFQCMSWxVehgOQLoYclB9PIAbNP229AIUeH0vNNGJhjnZiqgIOKvs1EhzqAo= ;{id = 2854}
ENTRY_END
; response to query of interest
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
www.example.com. IN A
SECTION AUTHORITY
example.com. IN SOA ns.example.com. hostmaster.example.com. 2007090400 28800 7200 604800 18000
example.com. 3600 IN RRSIG SOA 3 2 3600 20070926135752 20070829135752 2854 example.com. MC0CFQCM6lsu9byZIQ1yYjJmyYfFWM2RWAIUcR5t84r2La824oWCkLjmHXRQlco= ;{id = 2854}
; NODATA response. H(www.example.com.) = s1unhcti19bkdr98fegs0v46mbu3t4m3
s1unhcti19bkdr98fegs0v46mbu3t4m3.example.com. IN NSEC3 1 1 123 aabb00123456bbccdd s1unhcti19bkdr98fegs0v46mbu3t4m4 MX RRSIG
s1unhcti19bkdr98fegs0v46mbu3t4m3.example.com. 3600 IN RRSIG NSEC3 3 3 3600 20070926135752 20070829135752 2854 example.com. MCwCFE/a24nsY2luhQmZjY/ObAIgNSMkAhQWd4MUOUVK55bD6AbMHWrDA0yvEA== ;{id = 2854}
ENTRY_END
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
sub.example.com. IN DS
SECTION AUTHORITY
; proof that there is no DS here.
;sub.example.com. 3600 IN DS 2854 DSA 1 be4d46cd7489cce25a31af0dff2968ce0425dd31
;sub.example.com. 3600 IN RRSIG DS 3 3 3600 20070926135752 20070829135752 2854 example.com. MC0CFQC1WMTfb25sTgeUEXCFR4+YiJqecwIUc2R/jrO4amyQxovSnld2reg8eyo= ;{id = 2854}
; example.com. -> b6fuorg741ufili49mg9j4328ig53sqg.
b6fuorg741ufili49mg9j4328ig53sqg.example.com. IN NSEC3 1 0 123 aabb00123456bbccdd b6fuorg741ufili49mg9j4328ig54sqg NS SOA DNSKEY RRSIG
b6fuorg741ufili49mg9j4328ig53sqg.example.com. 3600 IN RRSIG NSEC3 3 3 3600 20070926135752 20070829135752 2854 example.com. MC0CFEtLEiFNr2V6qJOHUxIRQ4ittparAhUAm+WN3aqAHEgiQQEeX9z4S0Ub/dM= ;{id = 2854}
; sub.example.com. -> 8r1f0ieoutlnjc03meng9e3bn2n0o9pd.
8r1f0ieoutlnjc03meng9e3bn1n0o9pd.example.com. IN NSEC3 1 0 123 aabb00123456bbccdd 8r1f0ieoutlnjc03meng9e3bn3n0o9pd NS RRSIG
8r1f0ieoutlnjc03meng9e3bn1n0o9pd.example.com. 3600 IN RRSIG NSEC3 3 3 3600 20070926135752 20070829135752 2854 example.com. MC0CFQCategdxsiQTpOMHED1ehjPT7PO2gIUDJ9f/zGCEUHy/UVp97aOh0RRoks= ;{id = 2854}
ENTRY_END
; refer to server one down
ENTRY_BEGIN
MATCH opcode subdomain
ADJUST copy_id copy_query
REPLY QR NOERROR
SECTION QUESTION
sub.example.com. IN A
SECTION AUTHORITY
sub.example.com. IN NS ns.sub.example.com.
; proof that there is no DS here.
;sub.example.com. 3600 IN DS 2854 DSA 1 be4d46cd7489cce25a31af0dff2968ce0425dd31
;sub.example.com. 3600 IN RRSIG DS 3 3 3600 20070926135752 20070829135752 2854 example.com. MC0CFQC1WMTfb25sTgeUEXCFR4+YiJqecwIUc2R/jrO4amyQxovSnld2reg8eyo= ;{id = 2854}
; example.com. -> b6fuorg741ufili49mg9j4328ig53sqg.
b6fuorg741ufili49mg9j4328ig53sqg.example.com. IN NSEC3 1 0 123 aabb00123456bbccdd b6fuorg741ufili49mg9j4328ig54sqg NS SOA DNSKEY RRSIG
b6fuorg741ufili49mg9j4328ig53sqg.example.com. 3600 IN RRSIG NSEC3 3 3 3600 20070926135752 20070829135752 2854 example.com. MC0CFEtLEiFNr2V6qJOHUxIRQ4ittparAhUAm+WN3aqAHEgiQQEeX9z4S0Ub/dM= ;{id = 2854}
; sub.example.com. -> 8r1f0ieoutlnjc03meng9e3bn2n0o9pd.
8r1f0ieoutlnjc03meng9e3bn1n0o9pd.example.com. IN NSEC3 1 0 123 aabb00123456bbccdd 8r1f0ieoutlnjc03meng9e3bn3n0o9pd NS RRSIG
8r1f0ieoutlnjc03meng9e3bn1n0o9pd.example.com. 3600 IN RRSIG NSEC3 3 3 3600 20070926135752 20070829135752 2854 example.com. MC0CFQCategdxsiQTpOMHED1ehjPT7PO2gIUDJ9f/zGCEUHy/UVp97aOh0RRoks= ;{id = 2854}
SECTION ADDITIONAL
ns.sub.example.com. IN A 1.2.3.10
ENTRY_END
RANGE_END
; ns.sub.example.com.
RANGE_BEGIN 0 100
ADDRESS 1.2.3.10
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR AA REFUSED
SECTION QUESTION
ns.sub.example.com. IN AAAA
ENTRY_END
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR REFUSED
SECTION QUESTION
sub.example.com. IN NS
SECTION ANSWER
ENTRY_END
; response to DNSKEY priming query
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
sub.example.com. IN DNSKEY
SECTION ANSWER
sub.example.com. 3600 IN DNSKEY 256 3 3 ALXLUsWqUrY3JYER3T4TBJII s70j+sDS/UT2QRp61SE7S3E EXopNXoFE73JLRmvpi/UrOO/Vz4Se 6wXv/CYCKjGw06U4WRgR YXcpEhJROyNapmdIKSx hOzfLVE1gqA0PweZR8d tY3aNQSRn3sPpwJr6Mi /PqQKAMMrZ9ckJpf1+b QMOOvxgzz2U1GS18b3y ZKcgTMEaJzd/GZYzi/B N2DzQ0MsrSwYXfsNLFO Bbs8PJMW4LYIxeeOe6rUgkWOF 7CC9Dh/dduQ1QrsJhmZAEFfd6ByYV+ ;{id = 2854 (zsk), size = 1688b}
sub.example.com. 3600 IN RRSIG DNSKEY 3 3 3600 20070926135752 20070829135752 2854 sub.example.com. MCwCFBznBTYM/SrdUnjQdBnLtRO79KAaAhQReG5nRuL7Xsdf6D0KKwPa1GpWyQ== ;{id = 2854}
ENTRY_END
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
www.sub.example.com. IN A
SECTION ANSWER
www.sub.example.com. IN A 1.2.3.123
www.sub.example.com. 3600 IN RRSIG A 3 4 3600 20070926135752 20070829135752 2854 sub.example.com. MC0CFEExteiCsLkRi/md6o5K8BhRJAKFAhUAgg2tkvwaDn8Xbm9q+5xnjvgIB8k= ;{id = 2854}
ENTRY_END
RANGE_END
STEP 1 QUERY
ENTRY_BEGIN
REPLY RD
SECTION QUESTION
www.sub.example.com. IN A
ENTRY_END
; recursion happens here.
STEP 10 CHECK_ANSWER
ENTRY_BEGIN
MATCH all
REPLY QR RD RA SERVFAIL
SECTION QUESTION
www.sub.example.com. IN A
SECTION ANSWER
SECTION AUTHORITY
SECTION ADDITIONAL
ENTRY_END
SCENARIO_END
dnssecjava-1.1.3/src/test/resources/unbound/val_nsec3_nods_badsig.rpl 0000664 0000000 0000000 00000020145 13020541473 0026020 0 ustar 00root root 0000000 0000000 ; config options
; The island of trust is at example.com
server:
trust-anchor: "example.com. 3600 IN DS 2854 3 1 46e4ffc6e9a4793b488954bd3f0cc6af0dfb201b"
val-override-date: "20070916134226"
target-fetch-policy: "0 0 0 0 0"
stub-zone:
name: "."
stub-addr: 193.0.14.129 # K.ROOT-SERVERS.NET.
CONFIG_END
SCENARIO_BEGIN Test validator with NSEC3 with no DS referral with bad signature.
; K.ROOT-SERVERS.NET.
RANGE_BEGIN 0 100
ADDRESS 193.0.14.129
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
. IN NS
SECTION ANSWER
. IN NS K.ROOT-SERVERS.NET.
SECTION ADDITIONAL
K.ROOT-SERVERS.NET. IN A 193.0.14.129
ENTRY_END
ENTRY_BEGIN
MATCH opcode subdomain
ADJUST copy_id copy_query
REPLY QR NOERROR
SECTION QUESTION
com. IN A
SECTION AUTHORITY
com. IN NS a.gtld-servers.net.
SECTION ADDITIONAL
a.gtld-servers.net. IN A 192.5.6.30
ENTRY_END
RANGE_END
; a.gtld-servers.net.
RANGE_BEGIN 0 100
ADDRESS 192.5.6.30
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
com. IN NS
SECTION ANSWER
com. IN NS a.gtld-servers.net.
SECTION ADDITIONAL
a.gtld-servers.net. IN A 192.5.6.30
ENTRY_END
ENTRY_BEGIN
MATCH opcode subdomain
ADJUST copy_id copy_query
REPLY QR NOERROR
SECTION QUESTION
example.com. IN A
SECTION AUTHORITY
example.com. IN NS ns.example.com.
SECTION ADDITIONAL
ns.example.com. IN A 1.2.3.4
ENTRY_END
RANGE_END
; ns.example.com.
RANGE_BEGIN 0 100
ADDRESS 1.2.3.4
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR AA REFUSED
SECTION QUESTION
ns.example.com. IN A
ENTRY_END
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR AA REFUSED
SECTION QUESTION
ns.example.com. IN AAAA
ENTRY_END
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
example.com. IN NS
SECTION ANSWER
example.com. IN NS ns.example.com.
example.com. 3600 IN RRSIG NS 3 2 3600 20070926134150 20070829134150 2854 example.com. MC0CFQCN+qHdJxoI/2tNKwsb08pra/G7aAIUAWA5sDdJTbrXA1/3OaesGBAO3sI= ;{id = 2854}
SECTION ADDITIONAL
ns.example.com. IN A 1.2.3.4
ns.example.com. 3600 IN RRSIG A 3 3 3600 20070926135752 20070829135752 2854 example.com. MC0CFQCMSWxVehgOQLoYclB9PIAbNP229AIUeH0vNNGJhjnZiqgIOKvs1EhzqAo= ;{id = 2854}
ENTRY_END
; response to DNSKEY priming query
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
example.com. IN DNSKEY
SECTION ANSWER
example.com. 3600 IN DNSKEY 256 3 3 ALXLUsWqUrY3JYER3T4TBJII s70j+sDS/UT2QRp61SE7S3E EXopNXoFE73JLRmvpi/UrOO/Vz4Se 6wXv/CYCKjGw06U4WRgR YXcpEhJROyNapmdIKSx hOzfLVE1gqA0PweZR8d tY3aNQSRn3sPpwJr6Mi /PqQKAMMrZ9ckJpf1+b QMOOvxgzz2U1GS18b3y ZKcgTMEaJzd/GZYzi/B N2DzQ0MsrSwYXfsNLFO Bbs8PJMW4LYIxeeOe6rUgkWOF 7CC9Dh/dduQ1QrsJhmZAEFfd6ByYV+ ;{id = 2854 (zsk), size = 1688b}
example.com. 3600 IN RRSIG DNSKEY 3 2 3600 20070926134802 20070829134802 2854 example.com. MCwCFG1yhRNtTEa3Eno2zhVVuy2EJX3wAhQeLyUp6+UXcpC5qGNu9tkrTEgPUg== ;{id = 2854}
SECTION AUTHORITY
example.com. IN NS ns.example.com.
example.com. 3600 IN RRSIG NS 3 2 3600 20070926134150 20070829134150 2854 example.com. MC0CFQCN+qHdJxoI/2tNKwsb08pra/G7aAIUAWA5sDdJTbrXA1/3OaesGBAO3sI= ;{id = 2854}
SECTION ADDITIONAL
ns.example.com. IN A 1.2.3.4
ns.example.com. 3600 IN RRSIG A 3 3 3600 20070926135752 20070829135752 2854 example.com. MC0CFQCMSWxVehgOQLoYclB9PIAbNP229AIUeH0vNNGJhjnZiqgIOKvs1EhzqAo= ;{id = 2854}
ENTRY_END
; response to query of interest
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
www.example.com. IN A
SECTION AUTHORITY
example.com. IN SOA ns.example.com. hostmaster.example.com. 2007090400 28800 7200 604800 18000
example.com. 3600 IN RRSIG SOA 3 2 3600 20070926135752 20070829135752 2854 example.com. MC0CFQCM6lsu9byZIQ1yYjJmyYfFWM2RWAIUcR5t84r2La824oWCkLjmHXRQlco= ;{id = 2854}
; NODATA response. H(www.example.com.) = s1unhcti19bkdr98fegs0v46mbu3t4m3
s1unhcti19bkdr98fegs0v46mbu3t4m3.example.com. IN NSEC3 1 1 123 aabb00123456bbccdd s1unhcti19bkdr98fegs0v46mbu3t4m4 MX RRSIG
s1unhcti19bkdr98fegs0v46mbu3t4m3.example.com. 3600 IN RRSIG NSEC3 3 3 3600 20070926135752 20070829135752 2854 example.com. MCwCFE/a24nsY2luhQmZjY/ObAIgNSMkAhQWd4MUOUVK55bD6AbMHWrDA0yvEA== ;{id = 2854}
ENTRY_END
; refer to server one down
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
www.sub.example.com. IN A
SECTION AUTHORITY
sub.example.com. IN NS ns.sub.example.com.
; proof that there is no DS here.
;sub.example.com. 3600 IN DS 2854 DSA 1 be4d46cd7489cce25a31af0dff2968ce0425dd31
;sub.example.com. 3600 IN RRSIG DS 3 3 3600 20070926135752 20070829135752 2854 example.com. MC0CFQC1WMTfb25sTgeUEXCFR4+YiJqecwIUc2R/jrO4amyQxovSnld2reg8eyo= ;{id = 2854}
; sub.example.com. -> 8r1f0ieoutlnjc03meng9e3bn2n0o9pd.
8r1f0ieoutlnjc03meng9e3bn2n0o9pd.example.com. IN NSEC3 1 1 123 aabb00123456bbccdd 8r1f0ieoutlnjc03meng9e3bn3n0o9pd NS RRSIG
; bad signature:
8r1f0ieoutlnjc03meng9e3bn2n0o9pd.example.com. 3600 IN RRSIG NSEC3 3 3 3600 20010926135752 20010829135752 2854 example.com. MC0CFEC78oZJjqlV6kVyQb4X0o6tsUpUAhUAk+bgth7eeN+aO8ts2+yLSyzSX9g= ;{id = 2854}
;8r1f0ieoutlnjc03meng9e3bn2n0o9pd.example.com. 3600 IN RRSIG NSEC3 3 3 3600 20070926135752 20070829135752 2854 example.com. MC0CFEC78oZJjqlV6kVyQb4X0o6tsUpUAhUAk+bgth7eeN+aO8ts2+yLSyzSX9g= ;{id = 2854}
SECTION ADDITIONAL
ns.sub.example.com. IN A 1.2.3.10
ENTRY_END
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
sub.example.com. IN DS
SECTION AUTHORITY
; proof that there is no DS here.
;sub.example.com. 3600 IN DS 2854 DSA 1 be4d46cd7489cce25a31af0dff2968ce0425dd31
;sub.example.com. 3600 IN RRSIG DS 3 3 3600 20070926135752 20070829135752 2854 example.com. MC0CFQC1WMTfb25sTgeUEXCFR4+YiJqecwIUc2R/jrO4amyQxovSnld2reg8eyo= ;{id = 2854}
; sub.example.com. -> 8r1f0ieoutlnjc03meng9e3bn2n0o9pd.
8r1f0ieoutlnjc03meng9e3bn2n0o9pd.example.com. IN NSEC3 1 1 123 aabb00123456bbccdd 8r1f0ieoutlnjc03meng9e3bn3n0o9pd NS RRSIG
; bad signature
8r1f0ieoutlnjc03meng9e3bn2n0o9pd.example.com. 3600 IN RRSIG NSEC3 3 3 3600 20010926135752 20010829135752 2854 example.com. MC0CFEC78oZJjqlV6kVyQb4X0o6tsUpUAhUAk+bgth7eeN+aO8ts2+yLSyzSX9g= ;{id = 2854}
;8r1f0ieoutlnjc03meng9e3bn2n0o9pd.example.com. 3600 IN RRSIG NSEC3 3 3 3600 20070926135752 20070829135752 2854 example.com. MC0CFEC78oZJjqlV6kVyQb4X0o6tsUpUAhUAk+bgth7eeN+aO8ts2+yLSyzSX9g= ;{id = 2854}
ENTRY_END
RANGE_END
; ns.sub.example.com.
RANGE_BEGIN 0 100
ADDRESS 1.2.3.10
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR REFUSED
SECTION QUESTION
sub.example.com. IN NS
SECTION ANSWER
ENTRY_END
; response to DNSKEY priming query
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
sub.example.com. IN DNSKEY
SECTION ANSWER
sub.example.com. 3600 IN DNSKEY 256 3 3 ALXLUsWqUrY3JYER3T4TBJII s70j+sDS/UT2QRp61SE7S3E EXopNXoFE73JLRmvpi/UrOO/Vz4Se 6wXv/CYCKjGw06U4WRgR YXcpEhJROyNapmdIKSx hOzfLVE1gqA0PweZR8d tY3aNQSRn3sPpwJr6Mi /PqQKAMMrZ9ckJpf1+b QMOOvxgzz2U1GS18b3y ZKcgTMEaJzd/GZYzi/B N2DzQ0MsrSwYXfsNLFO Bbs8PJMW4LYIxeeOe6rUgkWOF 7CC9Dh/dduQ1QrsJhmZAEFfd6ByYV+ ;{id = 2854 (zsk), size = 1688b}
sub.example.com. 3600 IN RRSIG DNSKEY 3 3 3600 20070926135752 20070829135752 2854 sub.example.com. MCwCFBznBTYM/SrdUnjQdBnLtRO79KAaAhQReG5nRuL7Xsdf6D0KKwPa1GpWyQ== ;{id = 2854}
ENTRY_END
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
www.sub.example.com. IN A
SECTION ANSWER
www.sub.example.com. IN A 1.2.3.123
www.sub.example.com. 3600 IN RRSIG A 3 4 3600 20070926135752 20070829135752 2854 sub.example.com. MC0CFEExteiCsLkRi/md6o5K8BhRJAKFAhUAgg2tkvwaDn8Xbm9q+5xnjvgIB8k= ;{id = 2854}
ENTRY_END
RANGE_END
STEP 1 QUERY
ENTRY_BEGIN
REPLY RD DO
SECTION QUESTION
www.sub.example.com. IN A
ENTRY_END
; recursion happens here.
STEP 10 CHECK_ANSWER
ENTRY_BEGIN
MATCH all
REPLY QR RD RA SERVFAIL
SECTION QUESTION
www.sub.example.com. IN A
SECTION ANSWER
SECTION AUTHORITY
SECTION ADDITIONAL
ENTRY_END
SCENARIO_END
dnssecjava-1.1.3/src/test/resources/unbound/val_nsec3_nods_negcache.rpl 0000664 0000000 0000000 00000017300 13020541473 0026323 0 ustar 00root root 0000000 0000000 ; config options
; The island of trust is at example.com
server:
trust-anchor: "example.com. 3600 IN DS 2854 3 1 46e4ffc6e9a4793b488954bd3f0cc6af0dfb201b"
val-override-date: "20070916134226"
target-fetch-policy: "0 0 0 0 0"
stub-zone:
name: "."
stub-addr: 193.0.14.129 # K.ROOT-SERVERS.NET.
CONFIG_END
SCENARIO_BEGIN Test validator with NSEC3 with no DS referral from neg cache.
; K.ROOT-SERVERS.NET.
RANGE_BEGIN 0 100
ADDRESS 193.0.14.129
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
. IN NS
SECTION ANSWER
. IN NS K.ROOT-SERVERS.NET.
SECTION ADDITIONAL
K.ROOT-SERVERS.NET. IN A 193.0.14.129
ENTRY_END
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
www.sub.example.com. IN A
SECTION AUTHORITY
com. IN NS a.gtld-servers.net.
SECTION ADDITIONAL
a.gtld-servers.net. IN A 192.5.6.30
ENTRY_END
RANGE_END
; a.gtld-servers.net.
RANGE_BEGIN 0 100
ADDRESS 192.5.6.30
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
com. IN NS
SECTION ANSWER
com. IN NS a.gtld-servers.net.
SECTION ADDITIONAL
a.gtld-servers.net. IN A 192.5.6.30
ENTRY_END
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
www.sub.example.com. IN A
SECTION AUTHORITY
example.com. IN NS ns.example.com.
SECTION ADDITIONAL
ns.example.com. IN A 1.2.3.4
ENTRY_END
RANGE_END
; ns.example.com.
RANGE_BEGIN 0 100
ADDRESS 1.2.3.4
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
example.com. IN NS
SECTION ANSWER
example.com. IN NS ns.example.com.
example.com. 3600 IN RRSIG NS 3 2 3600 20070926134150 20070829134150 2854 example.com. MC0CFQCN+qHdJxoI/2tNKwsb08pra/G7aAIUAWA5sDdJTbrXA1/3OaesGBAO3sI= ;{id = 2854}
SECTION ADDITIONAL
ns.example.com. IN A 1.2.3.4
ns.example.com. 3600 IN RRSIG A 3 3 3600 20070926135752 20070829135752 2854 example.com. MC0CFQCMSWxVehgOQLoYclB9PIAbNP229AIUeH0vNNGJhjnZiqgIOKvs1EhzqAo= ;{id = 2854}
ENTRY_END
; response to DNSKEY priming query
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
example.com. IN DNSKEY
SECTION ANSWER
example.com. 3600 IN DNSKEY 256 3 3 ALXLUsWqUrY3JYER3T4TBJII s70j+sDS/UT2QRp61SE7S3E EXopNXoFE73JLRmvpi/UrOO/Vz4Se 6wXv/CYCKjGw06U4WRgR YXcpEhJROyNapmdIKSx hOzfLVE1gqA0PweZR8d tY3aNQSRn3sPpwJr6Mi /PqQKAMMrZ9ckJpf1+b QMOOvxgzz2U1GS18b3y ZKcgTMEaJzd/GZYzi/B N2DzQ0MsrSwYXfsNLFO Bbs8PJMW4LYIxeeOe6rUgkWOF 7CC9Dh/dduQ1QrsJhmZAEFfd6ByYV+ ;{id = 2854 (zsk), size = 1688b}
example.com. 3600 IN RRSIG DNSKEY 3 2 3600 20070926134802 20070829134802 2854 example.com. MCwCFG1yhRNtTEa3Eno2zhVVuy2EJX3wAhQeLyUp6+UXcpC5qGNu9tkrTEgPUg== ;{id = 2854}
SECTION AUTHORITY
example.com. IN NS ns.example.com.
example.com. 3600 IN RRSIG NS 3 2 3600 20070926134150 20070829134150 2854 example.com. MC0CFQCN+qHdJxoI/2tNKwsb08pra/G7aAIUAWA5sDdJTbrXA1/3OaesGBAO3sI= ;{id = 2854}
SECTION ADDITIONAL
ns.example.com. IN A 1.2.3.4
ns.example.com. 3600 IN RRSIG A 3 3 3600 20070926135752 20070829135752 2854 example.com. MC0CFQCMSWxVehgOQLoYclB9PIAbNP229AIUeH0vNNGJhjnZiqgIOKvs1EhzqAo= ;{id = 2854}
ENTRY_END
; response to query of interest
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
www.example.com. IN A
SECTION AUTHORITY
example.com. IN SOA ns.example.com. hostmaster.example.com. 2007090400 28800 7200 604800 18000
example.com. 3600 IN RRSIG SOA 3 2 3600 20070926135752 20070829135752 2854 example.com. MC0CFQCM6lsu9byZIQ1yYjJmyYfFWM2RWAIUcR5t84r2La824oWCkLjmHXRQlco= ;{id = 2854}
; NODATA response. H(www.example.com.) = s1unhcti19bkdr98fegs0v46mbu3t4m3
s1unhcti19bkdr98fegs0v46mbu3t4m3.example.com. IN NSEC3 1 1 123 aabb00123456bbccdd s1unhcti19bkdr98fegs0v46mbu3t4m4 MX RRSIG
s1unhcti19bkdr98fegs0v46mbu3t4m3.example.com. 3600 IN RRSIG NSEC3 3 3 3600 20070926135752 20070829135752 2854 example.com. MCwCFE/a24nsY2luhQmZjY/ObAIgNSMkAhQWd4MUOUVK55bD6AbMHWrDA0yvEA== ;{id = 2854}
ENTRY_END
; refer to server one down
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
www.sub.example.com. IN A
SECTION AUTHORITY
sub.example.com. IN NS ns.sub.example.com.
; proof that there is no DS here.
;sub.example.com. 3600 IN DS 2854 DSA 1 be4d46cd7489cce25a31af0dff2968ce0425dd31
;sub.example.com. 3600 IN RRSIG DS 3 3 3600 20070926135752 20070829135752 2854 example.com. MC0CFQC1WMTfb25sTgeUEXCFR4+YiJqecwIUc2R/jrO4amyQxovSnld2reg8eyo= ;{id = 2854}
; sub.example.com. -> 8r1f0ieoutlnjc03meng9e3bn2n0o9pd.
8r1f0ieoutlnjc03meng9e3bn2n0o9pd.example.com. IN NSEC3 1 1 123 aabb00123456bbccdd 8r1f0ieoutlnjc03meng9e3bn3n0o9pd NS RRSIG
8r1f0ieoutlnjc03meng9e3bn2n0o9pd.example.com. 3600 IN RRSIG NSEC3 3 3 3600 20070926135752 20070829135752 2854 example.com. MC0CFEC78oZJjqlV6kVyQb4X0o6tsUpUAhUAk+bgth7eeN+aO8ts2+yLSyzSX9g= ;{id = 2854}
SECTION ADDITIONAL
ns.sub.example.com. IN A 1.2.3.10
ENTRY_END
; get DS proof from neg cache
; ENTRY_BEGIN
; MATCH opcode qtype qname
; ADJUST copy_id
; REPLY QR NOERROR
; SECTION QUESTION
; sub.example.com. IN DS
; SECTION AUTHORITY
; ; proof that there is no DS here.
; ;sub.example.com. 3600 IN DS 2854 DSA 1 be4d46cd7489cce25a31af0dff2968ce0425dd31
; ;sub.example.com. 3600 IN RRSIG DS 3 3 3600 20070926135752 20070829135752 2854 example.com. MC0CFQC1WMTfb25sTgeUEXCFR4+YiJqecwIUc2R/jrO4amyQxovSnld2reg8eyo= ;{id = 2854}
; ; sub.example.com. -> 8r1f0ieoutlnjc03meng9e3bn2n0o9pd.
; 8r1f0ieoutlnjc03meng9e3bn2n0o9pd.example.com. IN NSEC3 1 1 123 aabb00123456bbccdd 8r1f0ieoutlnjc03meng9e3bn3n0o9pd NS RRSIG
; 8r1f0ieoutlnjc03meng9e3bn2n0o9pd.example.com. 3600 IN RRSIG NSEC3 3 3 3600 20070926135752 20070829135752 2854 example.com. MC0CFEC78oZJjqlV6kVyQb4X0o6tsUpUAhUAk+bgth7eeN+aO8ts2+yLSyzSX9g= ;{id = 2854}
; ENTRY_END
RANGE_END
; ns.sub.example.com.
RANGE_BEGIN 0 100
ADDRESS 1.2.3.10
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR REFUSED
SECTION QUESTION
sub.example.com. IN NS
SECTION ANSWER
ENTRY_END
; response to DNSKEY priming query
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
sub.example.com. IN DNSKEY
SECTION ANSWER
sub.example.com. 3600 IN DNSKEY 256 3 3 ALXLUsWqUrY3JYER3T4TBJII s70j+sDS/UT2QRp61SE7S3E EXopNXoFE73JLRmvpi/UrOO/Vz4Se 6wXv/CYCKjGw06U4WRgR YXcpEhJROyNapmdIKSx hOzfLVE1gqA0PweZR8d tY3aNQSRn3sPpwJr6Mi /PqQKAMMrZ9ckJpf1+b QMOOvxgzz2U1GS18b3y ZKcgTMEaJzd/GZYzi/B N2DzQ0MsrSwYXfsNLFO Bbs8PJMW4LYIxeeOe6rUgkWOF 7CC9Dh/dduQ1QrsJhmZAEFfd6ByYV+ ;{id = 2854 (zsk), size = 1688b}
sub.example.com. 3600 IN RRSIG DNSKEY 3 3 3600 20070926135752 20070829135752 2854 sub.example.com. MCwCFBznBTYM/SrdUnjQdBnLtRO79KAaAhQReG5nRuL7Xsdf6D0KKwPa1GpWyQ== ;{id = 2854}
ENTRY_END
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
www.sub.example.com. IN A
SECTION ANSWER
www.sub.example.com. IN A 1.2.3.123
www.sub.example.com. 3600 IN RRSIG A 3 4 3600 20070926135752 20070829135752 2854 sub.example.com. MC0CFEExteiCsLkRi/md6o5K8BhRJAKFAhUAgg2tkvwaDn8Xbm9q+5xnjvgIB8k= ;{id = 2854}
ENTRY_END
RANGE_END
STEP 1 QUERY
ENTRY_BEGIN
REPLY RD DO
SECTION QUESTION
www.sub.example.com. IN A
ENTRY_END
; recursion happens here.
STEP 10 CHECK_ANSWER
ENTRY_BEGIN
MATCH all
REPLY QR RD RA NOERROR
SECTION QUESTION
www.sub.example.com. IN A
SECTION ANSWER
www.sub.example.com. IN A 1.2.3.123
www.sub.example.com. 3600 IN RRSIG A 3 4 3600 20070926135752 20070829135752 2854 sub.example.com. MC0CFEExteiCsLkRi/md6o5K8BhRJAKFAhUAgg2tkvwaDn8Xbm9q+5xnjvgIB8k= ;{id = 2854}
SECTION AUTHORITY
SECTION ADDITIONAL
ENTRY_END
SCENARIO_END
dnssecjava-1.1.3/src/test/resources/unbound/val_nsec3_nods_soa.rpl 0000664 0000000 0000000 00000017765 13020541473 0025367 0 ustar 00root root 0000000 0000000 ; config options
; The island of trust is at example.com
server:
trust-anchor: "example.com. 3600 IN DS 2854 3 1 46e4ffc6e9a4793b488954bd3f0cc6af0dfb201b"
val-override-date: "20070916134226"
target-fetch-policy: "0 0 0 0 0"
stub-zone:
name: "."
stub-addr: 193.0.14.129 # K.ROOT-SERVERS.NET.
CONFIG_END
SCENARIO_BEGIN Test validator with NSEC3 with no DS referral abuse of apex.
; abusing subzone apex NSEC3.
; K.ROOT-SERVERS.NET.
RANGE_BEGIN 0 100
ADDRESS 193.0.14.129
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
. IN NS
SECTION ANSWER
. IN NS K.ROOT-SERVERS.NET.
SECTION ADDITIONAL
K.ROOT-SERVERS.NET. IN A 193.0.14.129
ENTRY_END
ENTRY_BEGIN
MATCH opcode subdomain
ADJUST copy_id copy_query
REPLY QR NOERROR
SECTION QUESTION
com. IN A
SECTION AUTHORITY
com. IN NS a.gtld-servers.net.
SECTION ADDITIONAL
a.gtld-servers.net. IN A 192.5.6.30
ENTRY_END
RANGE_END
; a.gtld-servers.net.
RANGE_BEGIN 0 100
ADDRESS 192.5.6.30
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
com. IN NS
SECTION ANSWER
com. IN NS a.gtld-servers.net.
SECTION ADDITIONAL
a.gtld-servers.net. IN A 192.5.6.30
ENTRY_END
ENTRY_BEGIN
MATCH opcode subdomain
ADJUST copy_id copy_query
REPLY QR NOERROR
SECTION QUESTION
example.com. IN A
SECTION AUTHORITY
example.com. IN NS ns.example.com.
SECTION ADDITIONAL
ns.example.com. IN A 1.2.3.4
ENTRY_END
RANGE_END
; ns.example.com.
RANGE_BEGIN 0 100
ADDRESS 1.2.3.4
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR AA SERVFAIL
SECTION QUESTION
ns.example.com. IN A
SECTION ANSWER
ENTRY_END
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR AA SERVFAIL
SECTION QUESTION
ns.example.com. IN AAAA
SECTION ANSWER
ENTRY_END
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
example.com. IN NS
SECTION ANSWER
example.com. IN NS ns.example.com.
example.com. 3600 IN RRSIG NS 3 2 3600 20070926134150 20070829134150 2854 example.com. MC0CFQCN+qHdJxoI/2tNKwsb08pra/G7aAIUAWA5sDdJTbrXA1/3OaesGBAO3sI= ;{id = 2854}
SECTION ADDITIONAL
ns.example.com. IN A 1.2.3.4
ns.example.com. 3600 IN RRSIG A 3 3 3600 20070926135752 20070829135752 2854 example.com. MC0CFQCMSWxVehgOQLoYclB9PIAbNP229AIUeH0vNNGJhjnZiqgIOKvs1EhzqAo= ;{id = 2854}
ENTRY_END
; response to DNSKEY priming query
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
example.com. IN DNSKEY
SECTION ANSWER
example.com. 3600 IN DNSKEY 256 3 3 ALXLUsWqUrY3JYER3T4TBJII s70j+sDS/UT2QRp61SE7S3E EXopNXoFE73JLRmvpi/UrOO/Vz4Se 6wXv/CYCKjGw06U4WRgR YXcpEhJROyNapmdIKSx hOzfLVE1gqA0PweZR8d tY3aNQSRn3sPpwJr6Mi /PqQKAMMrZ9ckJpf1+b QMOOvxgzz2U1GS18b3y ZKcgTMEaJzd/GZYzi/B N2DzQ0MsrSwYXfsNLFO Bbs8PJMW4LYIxeeOe6rUgkWOF 7CC9Dh/dduQ1QrsJhmZAEFfd6ByYV+ ;{id = 2854 (zsk), size = 1688b}
example.com. 3600 IN RRSIG DNSKEY 3 2 3600 20070926134802 20070829134802 2854 example.com. MCwCFG1yhRNtTEa3Eno2zhVVuy2EJX3wAhQeLyUp6+UXcpC5qGNu9tkrTEgPUg== ;{id = 2854}
SECTION AUTHORITY
example.com. IN NS ns.example.com.
example.com. 3600 IN RRSIG NS 3 2 3600 20070926134150 20070829134150 2854 example.com. MC0CFQCN+qHdJxoI/2tNKwsb08pra/G7aAIUAWA5sDdJTbrXA1/3OaesGBAO3sI= ;{id = 2854}
SECTION ADDITIONAL
ns.example.com. IN A 1.2.3.4
ns.example.com. 3600 IN RRSIG A 3 3 3600 20070926135752 20070829135752 2854 example.com. MC0CFQCMSWxVehgOQLoYclB9PIAbNP229AIUeH0vNNGJhjnZiqgIOKvs1EhzqAo= ;{id = 2854}
ENTRY_END
; response to query of interest
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
www.example.com. IN A
SECTION AUTHORITY
example.com. IN SOA ns.example.com. hostmaster.example.com. 2007090400 28800 7200 604800 18000
example.com. 3600 IN RRSIG SOA 3 2 3600 20070926135752 20070829135752 2854 example.com. MC0CFQCM6lsu9byZIQ1yYjJmyYfFWM2RWAIUcR5t84r2La824oWCkLjmHXRQlco= ;{id = 2854}
; NODATA response. H(www.example.com.) = s1unhcti19bkdr98fegs0v46mbu3t4m3
s1unhcti19bkdr98fegs0v46mbu3t4m3.example.com. IN NSEC3 1 1 123 aabb00123456bbccdd s1unhcti19bkdr98fegs0v46mbu3t4m4 MX RRSIG
s1unhcti19bkdr98fegs0v46mbu3t4m3.example.com. 3600 IN RRSIG NSEC3 3 3 3600 20070926135752 20070829135752 2854 example.com. MCwCFE/a24nsY2luhQmZjY/ObAIgNSMkAhQWd4MUOUVK55bD6AbMHWrDA0yvEA== ;{id = 2854}
ENTRY_END
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
sub.example.com. IN DS
SECTION AUTHORITY
; proof that there is no DS here.
;sub.example.com. 3600 IN DS 2854 DSA 1 be4d46cd7489cce25a31af0dff2968ce0425dd31
;sub.example.com. 3600 IN RRSIG DS 3 3 3600 20070926135752 20070829135752 2854 example.com. MC0CFQC1WMTfb25sTgeUEXCFR4+YiJqecwIUc2R/jrO4amyQxovSnld2reg8eyo= ;{id = 2854}
; sub.example.com. -> 8r1f0ieoutlnjc03meng9e3bn2n0o9pd.
8r1f0ieoutlnjc03meng9e3bn2n0o9pd.example.com. IN NSEC3 1 1 123 aabb00123456bbccdd 8r1f0ieoutlnjc03meng9e3bn3n0o9pd NS SOA DNSKEY RRSIG
8r1f0ieoutlnjc03meng9e3bn2n0o9pd.example.com. 3600 IN RRSIG NSEC3 3 3 3600 20070926135752 20070829135752 2854 example.com. MC4CFQCeKcyw76yvOvfa2+qtxv8bKcEyJwIVAJBeIGST4Y8Tk8YkQI0suee3Bxb1 ;{id = 2854}
ENTRY_END
; refer to server one down
ENTRY_BEGIN
MATCH opcode subdomain
ADJUST copy_id copy_query
REPLY QR NOERROR
SECTION QUESTION
sub.example.com. IN A
SECTION AUTHORITY
sub.example.com. IN NS ns.sub.example.com.
; proof that there is no DS here.
;sub.example.com. 3600 IN DS 2854 DSA 1 be4d46cd7489cce25a31af0dff2968ce0425dd31
;sub.example.com. 3600 IN RRSIG DS 3 3 3600 20070926135752 20070829135752 2854 example.com. MC0CFQC1WMTfb25sTgeUEXCFR4+YiJqecwIUc2R/jrO4amyQxovSnld2reg8eyo= ;{id = 2854}
; sub.example.com. -> 8r1f0ieoutlnjc03meng9e3bn2n0o9pd.
8r1f0ieoutlnjc03meng9e3bn2n0o9pd.example.com. IN NSEC3 1 1 123 aabb00123456bbccdd 8r1f0ieoutlnjc03meng9e3bn3n0o9pd NS SOA DNSKEY RRSIG
8r1f0ieoutlnjc03meng9e3bn2n0o9pd.example.com. 3600 IN RRSIG NSEC3 3 3 3600 20070926135752 20070829135752 2854 example.com. MC4CFQCeKcyw76yvOvfa2+qtxv8bKcEyJwIVAJBeIGST4Y8Tk8YkQI0suee3Bxb1 ;{id = 2854}
SECTION ADDITIONAL
ns.sub.example.com. IN A 1.2.3.10
ENTRY_END
RANGE_END
; ns.sub.example.com.
RANGE_BEGIN 0 100
ADDRESS 1.2.3.10
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR AA REFUSED
SECTION QUESTION
ns.sub.example.com. IN A
ENTRY_END
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR AA REFUSED
SECTION QUESTION
ns.sub.example.com. IN AAAA
SECTION ANSWER
ENTRY_END
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR REFUSED
SECTION QUESTION
sub.example.com. IN NS
SECTION ANSWER
ENTRY_END
; response to DNSKEY priming query
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
sub.example.com. IN DNSKEY
SECTION ANSWER
sub.example.com. 3600 IN DNSKEY 256 3 3 ALXLUsWqUrY3JYER3T4TBJII s70j+sDS/UT2QRp61SE7S3E EXopNXoFE73JLRmvpi/UrOO/Vz4Se 6wXv/CYCKjGw06U4WRgR YXcpEhJROyNapmdIKSx hOzfLVE1gqA0PweZR8d tY3aNQSRn3sPpwJr6Mi /PqQKAMMrZ9ckJpf1+b QMOOvxgzz2U1GS18b3y ZKcgTMEaJzd/GZYzi/B N2DzQ0MsrSwYXfsNLFO Bbs8PJMW4LYIxeeOe6rUgkWOF 7CC9Dh/dduQ1QrsJhmZAEFfd6ByYV+ ;{id = 2854 (zsk), size = 1688b}
sub.example.com. 3600 IN RRSIG DNSKEY 3 3 3600 20070926135752 20070829135752 2854 sub.example.com. MCwCFBznBTYM/SrdUnjQdBnLtRO79KAaAhQReG5nRuL7Xsdf6D0KKwPa1GpWyQ== ;{id = 2854}
ENTRY_END
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
www.sub.example.com. IN A
SECTION ANSWER
www.sub.example.com. IN A 1.2.3.123
www.sub.example.com. 3600 IN RRSIG A 3 4 3600 20070926135752 20070829135752 2854 sub.example.com. MC0CFEExteiCsLkRi/md6o5K8BhRJAKFAhUAgg2tkvwaDn8Xbm9q+5xnjvgIB8k= ;{id = 2854}
ENTRY_END
RANGE_END
STEP 1 QUERY
ENTRY_BEGIN
REPLY RD
SECTION QUESTION
www.sub.example.com. IN A
ENTRY_END
; recursion happens here.
STEP 10 CHECK_ANSWER
ENTRY_BEGIN
MATCH all
REPLY QR RD RA SERVFAIL
SECTION QUESTION
www.sub.example.com. IN A
SECTION ANSWER
SECTION AUTHORITY
SECTION ADDITIONAL
ENTRY_END
SCENARIO_END
dnssecjava-1.1.3/src/test/resources/unbound/val_nsec3_optout_ad.rpl 0000664 0000000 0000000 00000050043 13020541473 0025542 0 ustar 00root root 0000000 0000000 ; config options
; The island of trust is at example.com
server:
trust-anchor: "example.com. DS 57024 7 1 46d134be319b2cc910b9938f1cb25dc41abb27bf"
val-override-date: "20070916134226"
target-fetch-policy: "0 0 0 0 0"
stub-zone:
name: "."
stub-addr: 193.0.14.129 # K.ROOT-SERVERS.NET.
CONFIG_END
SCENARIO_BEGIN Test validator with optout NSEC3 response that gets no AD.
; K.ROOT-SERVERS.NET.
RANGE_BEGIN 0 100
ADDRESS 193.0.14.129
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
. IN NS
SECTION ANSWER
. IN NS K.ROOT-SERVERS.NET.
SECTION ADDITIONAL
K.ROOT-SERVERS.NET. IN A 193.0.14.129
ENTRY_END
ENTRY_BEGIN
MATCH opcode subdomain
ADJUST copy_id copy_query
REPLY QR NOERROR
SECTION QUESTION
com. IN A
SECTION AUTHORITY
com. IN NS a.gtld-servers.net.
SECTION ADDITIONAL
a.gtld-servers.net. IN A 192.5.6.30
ENTRY_END
RANGE_END
; a.gtld-servers.net.
RANGE_BEGIN 0 100
ADDRESS 192.5.6.30
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
com. IN NS
SECTION ANSWER
com. IN NS a.gtld-servers.net.
SECTION ADDITIONAL
a.gtld-servers.net. IN A 192.5.6.30
ENTRY_END
ENTRY_BEGIN
MATCH opcode subdomain
ADJUST copy_id copy_query
REPLY QR NOERROR
SECTION QUESTION
example.com. IN A
SECTION AUTHORITY
example.com. IN NS ns.example.com.
SECTION ADDITIONAL
ns.example.com. IN A 1.2.3.4
ENTRY_END
RANGE_END
; ns.example.com.
RANGE_BEGIN 0 100
ADDRESS 1.2.3.4
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
example.com. IN NS
SECTION ANSWER
example.com. IN NS ns.example.com.
example.com. 3600 IN RRSIG NS 7 2 3600 20070926134150 20070829134150 57024 example.com. fIE3H2v3wAm3GPajsdgJn+A8R4Cp7dMXf1PSUQ8BfklzMBMJjpc0oM/S7u/HVLYQs1jx8CMdw2TZEpIPfo6Rl0TekDqNtVk6IBw1H+zxDFwf3v7UdOjm8s6FfoEJcZ5yEFV/Lps82NzHCR9uqprhv6ddQdAeVNA5QHis1c5Y1P0= ;{id = 57024}
SECTION ADDITIONAL
ns.example.com. IN A 1.2.3.4
ns.example.com. 3600 IN RRSIG A 7 3 3600 20070926134150 20070829134150 57024 example.com. b0iX5vuTqngB5F0ORFrFLx8sAeTHGJVcPpD34iNFY71ZoFnHrHfAMWC3RAWz+nQ1NmH1oDdA8NTYN/aQQNzwEz4VmVYA2PANBSiwSY3q3gp9PWZU6CfRNf2dU/210H0y35FroQpADszmwC+Hlbcvll+bQj3fSyT2W/69kRVssj4= ;{id = 57024}
ENTRY_END
; response to DNSKEY priming query
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
example.com. IN DNSKEY
SECTION ANSWER
example.com. 3600 IN DNSKEY 257 3 7 AwEAAbvre/wK/WVeoj0SiwVkTD+NefvHPru9YIqLWY0m+0E5NYOpJZdc+PGQQYRzFNOlugVZtFirmv5Lmz7GNiASXtG/IFi//SlE30DxEKQOjt2F6qSZTZ1nZ5XOIMGTwWyp4OoI0egk5JavC5mQbyXqcj82ywt6F5Z3CmnThVl6MtOv ;{id = 57024 (ksk), size = 1024b}
example.com. 3600 IN RRSIG DNSKEY 7 2 3600 20070926134150 20070829134150 57024 example.com. lqOo8W7UffLZIKBoIJg8OAPkmCWptnstiLIg1bAtzuEZDZFr2KNZGv+5k6hbRJKYnZRLReY4v8G9Eg0GCC/44gLm8BZlnh/4jLOjMH9MKusFV/jNqz/HABITYn1pBwvVak7lzqN+bmL0KMyWf1MzPWilx4fM9YWinsQFILVLPL0= ;{id = 57024}
SECTION AUTHORITY
example.com. IN NS ns.example.com.
example.com. 3600 IN RRSIG NS 7 2 3600 20070926134150 20070829134150 57024 example.com. fIE3H2v3wAm3GPajsdgJn+A8R4Cp7dMXf1PSUQ8BfklzMBMJjpc0oM/S7u/HVLYQs1jx8CMdw2TZEpIPfo6Rl0TekDqNtVk6IBw1H+zxDFwf3v7UdOjm8s6FfoEJcZ5yEFV/Lps82NzHCR9uqprhv6ddQdAeVNA5QHis1c5Y1P0= ;{id = 57024}
SECTION ADDITIONAL
ns.example.com. IN A 1.2.3.4
ns.example.com. 3600 IN RRSIG A 7 3 3600 20070926134150 20070829134150 57024 example.com. b0iX5vuTqngB5F0ORFrFLx8sAeTHGJVcPpD34iNFY71ZoFnHrHfAMWC3RAWz+nQ1NmH1oDdA8NTYN/aQQNzwEz4VmVYA2PANBSiwSY3q3gp9PWZU6CfRNf2dU/210H0y35FroQpADszmwC+Hlbcvll+bQj3fSyT2W/69kRVssj4= ;{id = 57024}
ENTRY_END
; response to query of interest
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
sub.example.com. IN DS
SECTION ANSWER
SECTION AUTHORITY
example.com. IN SOA ns.example.com. noc.example.com. 2009310622 1800 900 604800 86400
example.com. 3600 IN RRSIG SOA 7 2 3600 20070926134150 20070829134150 57024 example.com. HlyER7bYPiSJ9jdjjRBucQexYr932Oor1TvxSLPWw5fuWvr/fFitKVnLqC+lqBIeOby44KiDr0rIk+ZqYjWWKNjaLm5wMfhQzbsAgGTQxmO07jnYOGQG9SI6DSbR9GJdZ7imu5sx5oo5dze73MxgLMZIethGaFMkktYN53+AzG0= ;{id = 57024}
; optout
; example.com. -> onib9mgub9h0rml3cdf5bgrj59dkjhvk.
; sub.example.com. -> kg19n32806c832kijdnglq8p9m2r5mdj.
; *.example.com. -> 4f3cnt8cu22tngec382jj4gde4rb47ub.
onib9mgub9h0rml3cdf5bgrj59dkjhvk.example.com. NSEC3 1 1 0 - pnib9mgub9h0rml3cdf5bgrj59dkjhvk NS SOA RRSIG DNSKEY NSEC3PARAM
jg19n32806c832kijdnglq8p9m2r5mdj.example.com. NSEC3 1 1 0 - lg19n32806c832kijdnglq8p9m2r5mdj NS DS RRSIG
onib9mgub9h0rml3cdf5bgrj59dkjhvk.example.com. 3600 IN RRSIG NSEC3 7 3 3600 20070926134150 20070829134150 57024 example.com. jHrF+lnyRL1LE/Bwz6C+jZg3E/2qQkVSboGxya6iX71v0zA3eUsob9m9l3gHNlhwhyahbamHUKx+OMvtYuzRa+RMv4ObuLRIt8StdixeXaUU+rx7C2qCKOFsa5q4HzK4bLYPfyb5T9w67HbzHPLEllXPA7tghzyzCM9qBtbvwK4= ;{id = 57024}
jg19n32806c832kijdnglq8p9m2r5mdj.example.com. 3600 IN RRSIG NSEC3 7 3 3600 20070926134150 20070829134150 57024 example.com. f7ZSCahAuKOLXquM0jpdU6I9AX31CgGicRiB3aU4jvqQp/EygbCNn5kfpyXY0FvZvzggpl8naXSStOPN9dy3bb0NwGQkJcYD94NEw307T8uEunOvx1ug5TuakBAwqjY8xKM3xab3LnWYRtx4zdln/3ZDHvBUwfzkxUZrzeKjpiI= ;{id = 57024}
SECTION ADDITIONAL
ENTRY_END
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
sub.example.com. IN MX
SECTION ANSWER
SECTION AUTHORITY
example.com. IN SOA ns.example.com. noc.example.com. 2009310622 1800 900 604800 86400
example.com. 3600 IN RRSIG SOA 7 2 3600 20070926134150 20070829134150 57024 example.com. HlyER7bYPiSJ9jdjjRBucQexYr932Oor1TvxSLPWw5fuWvr/fFitKVnLqC+lqBIeOby44KiDr0rIk+ZqYjWWKNjaLm5wMfhQzbsAgGTQxmO07jnYOGQG9SI6DSbR9GJdZ7imu5sx5oo5dze73MxgLMZIethGaFMkktYN53+AzG0= ;{id = 57024}
; optout
; example.com. -> onib9mgub9h0rml3cdf5bgrj59dkjhvk.
; sub.example.com. -> kg19n32806c832kijdnglq8p9m2r5mdj.
; *.example.com. -> 4f3cnt8cu22tngec382jj4gde4rb47ub.
onib9mgub9h0rml3cdf5bgrj59dkjhvk.example.com. NSEC3 1 1 0 - pnib9mgub9h0rml3cdf5bgrj59dkjhvk NS SOA RRSIG DNSKEY NSEC3PARAM
jg19n32806c832kijdnglq8p9m2r5mdj.example.com. NSEC3 1 1 0 - lg19n32806c832kijdnglq8p9m2r5mdj NS DS RRSIG
onib9mgub9h0rml3cdf5bgrj59dkjhvk.example.com. 3600 IN RRSIG NSEC3 7 3 3600 20070926134150 20070829134150 57024 example.com. jHrF+lnyRL1LE/Bwz6C+jZg3E/2qQkVSboGxya6iX71v0zA3eUsob9m9l3gHNlhwhyahbamHUKx+OMvtYuzRa+RMv4ObuLRIt8StdixeXaUU+rx7C2qCKOFsa5q4HzK4bLYPfyb5T9w67HbzHPLEllXPA7tghzyzCM9qBtbvwK4= ;{id = 57024}
jg19n32806c832kijdnglq8p9m2r5mdj.example.com. 3600 IN RRSIG NSEC3 7 3 3600 20070926134150 20070829134150 57024 example.com. f7ZSCahAuKOLXquM0jpdU6I9AX31CgGicRiB3aU4jvqQp/EygbCNn5kfpyXY0FvZvzggpl8naXSStOPN9dy3bb0NwGQkJcYD94NEw307T8uEunOvx1ug5TuakBAwqjY8xKM3xab3LnWYRtx4zdln/3ZDHvBUwfzkxUZrzeKjpiI= ;{id = 57024}
SECTION ADDITIONAL
ENTRY_END
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR AA NXDOMAIN
SECTION QUESTION
rub.example.com. IN A
SECTION ANSWER
SECTION AUTHORITY
example.com. IN SOA ns.example.com. noc.example.com. 2009310622 1800 900 604800 86400
example.com. 3600 IN RRSIG SOA 7 2 3600 20070926134150 20070829134150 57024 example.com. HlyER7bYPiSJ9jdjjRBucQexYr932Oor1TvxSLPWw5fuWvr/fFitKVnLqC+lqBIeOby44KiDr0rIk+ZqYjWWKNjaLm5wMfhQzbsAgGTQxmO07jnYOGQG9SI6DSbR9GJdZ7imu5sx5oo5dze73MxgLMZIethGaFMkktYN53+AzG0= ;{id = 57024}
; optout
; example.com. -> onib9mgub9h0rml3cdf5bgrj59dkjhvk.
; rub.example.com. -> c2bqk3tb4foaenfbp1v0pdk6mor3r7vo.
; *.example.com. -> 4f3cnt8cu22tngec382jj4gde4rb47ub.
onib9mgub9h0rml3cdf5bgrj59dkjhvk.example.com. NSEC3 1 1 0 - pnib9mgub9h0rml3cdf5bgrj59dkjhvk NS SOA RRSIG DNSKEY NSEC3PARAM
22bqk3tb4foaenfbp1v0pdk6mor3r7vo.example.com. NSEC3 1 1 0 - f2bqk3tb4foaenfbp1v0pdk6mor3r7vo NS RRSIG
onib9mgub9h0rml3cdf5bgrj59dkjhvk.example.com. 3600 IN RRSIG NSEC3 7 3 3600 20070926134150 20070829134150 57024 example.com. jHrF+lnyRL1LE/Bwz6C+jZg3E/2qQkVSboGxya6iX71v0zA3eUsob9m9l3gHNlhwhyahbamHUKx+OMvtYuzRa+RMv4ObuLRIt8StdixeXaUU+rx7C2qCKOFsa5q4HzK4bLYPfyb5T9w67HbzHPLEllXPA7tghzyzCM9qBtbvwK4= ;{id = 57024}
22bqk3tb4foaenfbp1v0pdk6mor3r7vo.example.com. 3600 IN RRSIG NSEC3 7 3 3600 20070926134150 20070829134150 57024 example.com. jk6EYU9qTrmNeeKuQRG7iKyfNJnBt45MToPVpAQ+LoGDC3muy4bkWeKspj68cN9E5wNijfmm1eFK3khSSEnM50mfJbpiwlbKgL0VZz33Zn+Wu8b7sTtdDwDH7MUBLRwHeb7W+NtQIEXPLs4Z3BXHzAXy5ZpSjQ3PJZn6zBx4/dw= ;{id = 57024}
SECTION ADDITIONAL
ENTRY_END
; wildcard expansion
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR AA NOERROR
SECTION QUESTION
a.wild.example.com. IN A
SECTION ANSWER
; *.wild.example.com. IN A 77.88.99.0
a.wild.example.com. IN A 77.88.99.0
a.wild.example.com. 3600 IN RRSIG A 7 3 3600 20070926134150 20070829134150 57024 example.com. GWV6cQprrpAsaYla5z7N9tppdb+X0ZjOsiWBuBueSACHU8CzsYPMbwKUZlTNbQ4mSVRRDa0rM1niYoZF9oqyAfbn5HBLi62TRjrBLHfvatDgSiZCa4mauUfzUS+U7FfUXikNIigG0aN0xdpJ//urmecjNSKg2aW4M0DYsm7keMI= ;{id = 57024}
SECTION AUTHORITY
; a.wild.example.com -> ad1535hlgg914unuuaei9jfh4ofr44uo. covered by optout
ac1535hlgg914unuuaei9jfh4ofr44uo.example.com. IN NSEC3 1 1 0 - ae1535hlgg914unuuaei9jfh4ofr44uo NS RRSIG
ac1535hlgg914unuuaei9jfh4ofr44uo.example.com. 3600 IN RRSIG NSEC3 7 3 3600 20070926134150 20070829134150 57024 example.com. imoxsXE1c3FaXu6uSantJfMPGBgsauf1GhmNpS1lLuaNRjXOhf1PDXwt/GoD/dm2GXJAlWT8u6EK3RXkFwlDIsP7vYFuDfUNCQ/hvYq300sXl1nfW0O1bsoBJahQJuNM+xcbwbnQf0krCTxNthyi2cuiY7RYug6ZTZ3gz4DMkhU= ;{id = 57024}
; for wild.example.com the closest encloser
; wild.example.com -> 8aeigskl5tmraedgji7v1lqbmqs8qv7u.
8aeigskl5tmraedgji7v1lqbmqs8qv7u.example.com. IN NSEC3 1 1 0 - 9aeigskl5tmraedgji7v1lqbmqs8qv7u
8aeigskl5tmraedgji7v1lqbmqs8qv7u.example.com. 3600 IN RRSIG NSEC3 7 3 3600 20070926134150 20070829134150 57024 example.com. afV7c9knpxmD5c6UKrqw5J/06eokPwSb3HZi3TI63tzFcswuMjj4d7NKJmdpA+uo0aweVZgcOp+O+v9urgNYNYbxOy02qqOetLph8YWH7MQTftaGBwKD7gZMbnUArryPCtrlJz0i0GzoWvVTZnsjrrlDtP/ogLDnCKyi7Q0si+k= ;{id = 57024}
ENTRY_END
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR AA NOERROR
SECTION QUESTION
a.wild.example.com. IN MX
SECTION ANSWER
SECTION AUTHORITY
; wildcard no data
example.com. IN SOA ns.example.com. noc.example.com. 2009310622 1800 900 604800 86400
example.com. 3600 IN RRSIG SOA 7 2 3600 20070926134150 20070829134150 57024 example.com. HlyER7bYPiSJ9jdjjRBucQexYr932Oor1TvxSLPWw5fuWvr/fFitKVnLqC+lqBIeOby44KiDr0rIk+ZqYjWWKNjaLm5wMfhQzbsAgGTQxmO07jnYOGQG9SI6DSbR9GJdZ7imu5sx5oo5dze73MxgLMZIethGaFMkktYN53+AzG0= ;{id = 57024}
; wild.example.com -> 8aeigskl5tmraedgji7v1lqbmqs8qv7u.
; *.wild.example.com. -> nvec78au1hpuma9eebeji5n06eq33gbk.
; the NSEC3 for the wildcard *.wild.example.com. , with optout, A RRSIG
nvec78au1hpuma9eebeji5n06eq33gbk.example.com. IN NSEC3 1 1 0 - ovec78au1hpuma9eebeji5n06eq33gbk A RRSIG
nvec78au1hpuma9eebeji5n06eq33gbk.example.com. 3600 IN RRSIG NSEC3 7 3 3600 20070926134150 20070829134150 57024 example.com. jE+b5p+stQumm+tLZdaBT+KBpwYI7wRXijRHWcqiUp2SY1uV7HxBdW8aedVTqpFe8kYbMUgI3pCOAitmiI9R6SJg3q7022QOb9y+0/xSmIDqxATVPTJbkzVBInfWrulRtn7o3HmOyoIc9/w7NnNxFYpwtFL08jTBRr8XRTWDM7Q= ;{id = 57024}
; NSEC3 for the closest encloser, wild.example.com. (an empty nonterminal)
8aeigskl5tmraedgji7v1lqbmqs8qv7u.example.com. IN NSEC3 1 1 0 - 9aeigskl5tmraedgji7v1lqbmqs8qv7u
8aeigskl5tmraedgji7v1lqbmqs8qv7u.example.com. 3600 IN RRSIG NSEC3 7 3 3600 20070926134150 20070829134150 57024 example.com. afV7c9knpxmD5c6UKrqw5J/06eokPwSb3HZi3TI63tzFcswuMjj4d7NKJmdpA+uo0aweVZgcOp+O+v9urgNYNYbxOy02qqOetLph8YWH7MQTftaGBwKD7gZMbnUArryPCtrlJz0i0GzoWvVTZnsjrrlDtP/ogLDnCKyi7Q0si+k= ;{id = 57024}
; a.wild.example.com -> ad1535hlgg914unuuaei9jfh4ofr44uo. covered by optout
ac1535hlgg914unuuaei9jfh4ofr44uo.example.com. IN NSEC3 1 1 0 - ae1535hlgg914unuuaei9jfh4ofr44uo NS RRSIG
ac1535hlgg914unuuaei9jfh4ofr44uo.example.com. 3600 IN RRSIG NSEC3 7 3 3600 20070926134150 20070829134150 57024 example.com. imoxsXE1c3FaXu6uSantJfMPGBgsauf1GhmNpS1lLuaNRjXOhf1PDXwt/GoD/dm2GXJAlWT8u6EK3RXkFwlDIsP7vYFuDfUNCQ/hvYq300sXl1nfW0O1bsoBJahQJuNM+xcbwbnQf0krCTxNthyi2cuiY7RYug6ZTZ3gz4DMkhU= ;{id = 57024}
ENTRY_END
RANGE_END
STEP 1 QUERY
ENTRY_BEGIN
REPLY RD DO
SECTION QUESTION
sub.example.com. IN MX
ENTRY_END
; recursion happens here.
; no AD flag on this because an optout NSEC3 is used.
STEP 10 CHECK_ANSWER
ENTRY_BEGIN
MATCH all
REPLY QR RD RA NOERROR
SECTION QUESTION
sub.example.com. IN MX
SECTION ANSWER
SECTION AUTHORITY
example.com. IN SOA ns.example.com. noc.example.com. 2009310622 1800 900 604800 86400
example.com. 3600 IN RRSIG SOA 7 2 3600 20070926134150 20070829134150 57024 example.com. HlyER7bYPiSJ9jdjjRBucQexYr932Oor1TvxSLPWw5fuWvr/fFitKVnLqC+lqBIeOby44KiDr0rIk+ZqYjWWKNjaLm5wMfhQzbsAgGTQxmO07jnYOGQG9SI6DSbR9GJdZ7imu5sx5oo5dze73MxgLMZIethGaFMkktYN53+AzG0= ;{id = 57024}
onib9mgub9h0rml3cdf5bgrj59dkjhvk.example.com. NSEC3 1 1 0 - pnib9mgub9h0rml3cdf5bgrj59dkjhvk NS SOA RRSIG DNSKEY NSEC3PARAM
onib9mgub9h0rml3cdf5bgrj59dkjhvk.example.com. 3600 IN RRSIG NSEC3 7 3 3600 20070926134150 20070829134150 57024 example.com. jHrF+lnyRL1LE/Bwz6C+jZg3E/2qQkVSboGxya6iX71v0zA3eUsob9m9l3gHNlhwhyahbamHUKx+OMvtYuzRa+RMv4ObuLRIt8StdixeXaUU+rx7C2qCKOFsa5q4HzK4bLYPfyb5T9w67HbzHPLEllXPA7tghzyzCM9qBtbvwK4= ;{id = 57024}
jg19n32806c832kijdnglq8p9m2r5mdj.example.com. NSEC3 1 1 0 - lg19n32806c832kijdnglq8p9m2r5mdj NS DS RRSIG
jg19n32806c832kijdnglq8p9m2r5mdj.example.com. 3600 IN RRSIG NSEC3 7 3 3600 20070926134150 20070829134150 57024 example.com. f7ZSCahAuKOLXquM0jpdU6I9AX31CgGicRiB3aU4jvqQp/EygbCNn5kfpyXY0FvZvzggpl8naXSStOPN9dy3bb0NwGQkJcYD94NEw307T8uEunOvx1ug5TuakBAwqjY8xKM3xab3LnWYRtx4zdln/3ZDHvBUwfzkxUZrzeKjpiI= ;{id = 57024}
SECTION ADDITIONAL
ENTRY_END
STEP 20 QUERY
ENTRY_BEGIN
REPLY RD DO
SECTION QUESTION
sub.example.com. IN DS
ENTRY_END
; recursion happens here.
; no AD flag here because of RFC5155 9.2 section.
; even though we are sure there is no DS, this is what the RFC says.
STEP 30 CHECK_ANSWER
ENTRY_BEGIN
MATCH all
REPLY QR RD RA NOERROR
SECTION QUESTION
sub.example.com. IN DS
SECTION ANSWER
SECTION AUTHORITY
example.com. IN SOA ns.example.com. noc.example.com. 2009310622 1800 900 604800 86400
example.com. 3600 IN RRSIG SOA 7 2 3600 20070926134150 20070829134150 57024 example.com. HlyER7bYPiSJ9jdjjRBucQexYr932Oor1TvxSLPWw5fuWvr/fFitKVnLqC+lqBIeOby44KiDr0rIk+ZqYjWWKNjaLm5wMfhQzbsAgGTQxmO07jnYOGQG9SI6DSbR9GJdZ7imu5sx5oo5dze73MxgLMZIethGaFMkktYN53+AzG0= ;{id = 57024}
onib9mgub9h0rml3cdf5bgrj59dkjhvk.example.com. NSEC3 1 1 0 - pnib9mgub9h0rml3cdf5bgrj59dkjhvk NS SOA RRSIG DNSKEY NSEC3PARAM
onib9mgub9h0rml3cdf5bgrj59dkjhvk.example.com. 3600 IN RRSIG NSEC3 7 3 3600 20070926134150 20070829134150 57024 example.com. jHrF+lnyRL1LE/Bwz6C+jZg3E/2qQkVSboGxya6iX71v0zA3eUsob9m9l3gHNlhwhyahbamHUKx+OMvtYuzRa+RMv4ObuLRIt8StdixeXaUU+rx7C2qCKOFsa5q4HzK4bLYPfyb5T9w67HbzHPLEllXPA7tghzyzCM9qBtbvwK4= ;{id = 57024}
jg19n32806c832kijdnglq8p9m2r5mdj.example.com. NSEC3 1 1 0 - lg19n32806c832kijdnglq8p9m2r5mdj NS DS RRSIG
jg19n32806c832kijdnglq8p9m2r5mdj.example.com. 3600 IN RRSIG NSEC3 7 3 3600 20070926134150 20070829134150 57024 example.com. f7ZSCahAuKOLXquM0jpdU6I9AX31CgGicRiB3aU4jvqQp/EygbCNn5kfpyXY0FvZvzggpl8naXSStOPN9dy3bb0NwGQkJcYD94NEw307T8uEunOvx1ug5TuakBAwqjY8xKM3xab3LnWYRtx4zdln/3ZDHvBUwfzkxUZrzeKjpiI= ;{id = 57024}
SECTION ADDITIONAL
ENTRY_END
STEP 40 QUERY
ENTRY_BEGIN
REPLY RD DO
SECTION QUESTION
rub.example.com. IN A
ENTRY_END
; recursion happens here.
; no AD flag here because of RFC5155 9.2 section.
; also for NXDOMAIN
STEP 50 CHECK_ANSWER
ENTRY_BEGIN
MATCH all
REPLY QR RD RA NXDOMAIN
SECTION QUESTION
rub.example.com. IN A
SECTION ANSWER
SECTION AUTHORITY
example.com. IN SOA ns.example.com. noc.example.com. 2009310622 1800 900 604800 86400
example.com. 3600 IN RRSIG SOA 7 2 3600 20070926134150 20070829134150 57024 example.com. HlyER7bYPiSJ9jdjjRBucQexYr932Oor1TvxSLPWw5fuWvr/fFitKVnLqC+lqBIeOby44KiDr0rIk+ZqYjWWKNjaLm5wMfhQzbsAgGTQxmO07jnYOGQG9SI6DSbR9GJdZ7imu5sx5oo5dze73MxgLMZIethGaFMkktYN53+AzG0= ;{id = 57024}
onib9mgub9h0rml3cdf5bgrj59dkjhvk.example.com. NSEC3 1 1 0 - pnib9mgub9h0rml3cdf5bgrj59dkjhvk NS SOA RRSIG DNSKEY NSEC3PARAM
onib9mgub9h0rml3cdf5bgrj59dkjhvk.example.com. 3600 IN RRSIG NSEC3 7 3 3600 20070926134150 20070829134150 57024 example.com. jHrF+lnyRL1LE/Bwz6C+jZg3E/2qQkVSboGxya6iX71v0zA3eUsob9m9l3gHNlhwhyahbamHUKx+OMvtYuzRa+RMv4ObuLRIt8StdixeXaUU+rx7C2qCKOFsa5q4HzK4bLYPfyb5T9w67HbzHPLEllXPA7tghzyzCM9qBtbvwK4= ;{id = 57024}
22bqk3tb4foaenfbp1v0pdk6mor3r7vo.example.com. NSEC3 1 1 0 - f2bqk3tb4foaenfbp1v0pdk6mor3r7vo NS RRSIG
22bqk3tb4foaenfbp1v0pdk6mor3r7vo.example.com. 3600 IN RRSIG NSEC3 7 3 3600 20070926134150 20070829134150 57024 example.com. jk6EYU9qTrmNeeKuQRG7iKyfNJnBt45MToPVpAQ+LoGDC3muy4bkWeKspj68cN9E5wNijfmm1eFK3khSSEnM50mfJbpiwlbKgL0VZz33Zn+Wu8b7sTtdDwDH7MUBLRwHeb7W+NtQIEXPLs4Z3BXHzAXy5ZpSjQ3PJZn6zBx4/dw= ;{id = 57024}
SECTION ADDITIONAL
ENTRY_END
STEP 60 QUERY
ENTRY_BEGIN
REPLY RD DO
SECTION QUESTION
a.wild.example.com. IN A
ENTRY_END
; query is a wildcard expansion, covered by optout.
; hence it is without AD flag (even though we are sure this wildcard exists,
; we are not sure that there is no delegation covered by the optout span
; with the name a.wild.example.com).
STEP 70 CHECK_ANSWER
ENTRY_BEGIN
MATCH all
REPLY QR RD RA NOERROR
SECTION QUESTION
a.wild.example.com. IN A
SECTION ANSWER
a.wild.example.com. IN A 77.88.99.0
a.wild.example.com. 3600 IN RRSIG A 7 3 3600 20070926134150 20070829134150 57024 example.com. GWV6cQprrpAsaYla5z7N9tppdb+X0ZjOsiWBuBueSACHU8CzsYPMbwKUZlTNbQ4mSVRRDa0rM1niYoZF9oqyAfbn5HBLi62TRjrBLHfvatDgSiZCa4mauUfzUS+U7FfUXikNIigG0aN0xdpJ//urmecjNSKg2aW4M0DYsm7keMI= ;{id = 57024}
SECTION AUTHORITY
ac1535hlgg914unuuaei9jfh4ofr44uo.example.com. IN NSEC3 1 1 0 - ae1535hlgg914unuuaei9jfh4ofr44uo NS RRSIG
ac1535hlgg914unuuaei9jfh4ofr44uo.example.com. 3600 IN RRSIG NSEC3 7 3 3600 20070926134150 20070829134150 57024 example.com. imoxsXE1c3FaXu6uSantJfMPGBgsauf1GhmNpS1lLuaNRjXOhf1PDXwt/GoD/dm2GXJAlWT8u6EK3RXkFwlDIsP7vYFuDfUNCQ/hvYq300sXl1nfW0O1bsoBJahQJuNM+xcbwbnQf0krCTxNthyi2cuiY7RYug6ZTZ3gz4DMkhU= ;{id = 57024}
8aeigskl5tmraedgji7v1lqbmqs8qv7u.example.com. IN NSEC3 1 1 0 - 9aeigskl5tmraedgji7v1lqbmqs8qv7u
8aeigskl5tmraedgji7v1lqbmqs8qv7u.example.com. 3600 IN RRSIG NSEC3 7 3 3600 20070926134150 20070829134150 57024 example.com. afV7c9knpxmD5c6UKrqw5J/06eokPwSb3HZi3TI63tzFcswuMjj4d7NKJmdpA+uo0aweVZgcOp+O+v9urgNYNYbxOy02qqOetLph8YWH7MQTftaGBwKD7gZMbnUArryPCtrlJz0i0GzoWvVTZnsjrrlDtP/ogLDnCKyi7Q0si+k= ;{id = 57024}
ENTRY_END
STEP 80 QUERY
ENTRY_BEGIN
REPLY RD DO
SECTION QUESTION
a.wild.example.com. IN MX
ENTRY_END
; nodata wildcard expansion, we are sure that the wildcard does not have
; the data that is requested, but there an optout flag set on the wildcard
; expansion denial, thus we are not sure of a.wild.example.com delegation
; under the optout.
STEP 90 CHECK_ANSWER
ENTRY_BEGIN
MATCH all
REPLY QR RD RA NOERROR
SECTION QUESTION
a.wild.example.com. IN MX
SECTION ANSWER
SECTION AUTHORITY
example.com. IN SOA ns.example.com. noc.example.com. 2009310622 1800 900 604800 86400
example.com. 3600 IN RRSIG SOA 7 2 3600 20070926134150 20070829134150 57024 example.com. HlyER7bYPiSJ9jdjjRBucQexYr932Oor1TvxSLPWw5fuWvr/fFitKVnLqC+lqBIeOby44KiDr0rIk+ZqYjWWKNjaLm5wMfhQzbsAgGTQxmO07jnYOGQG9SI6DSbR9GJdZ7imu5sx5oo5dze73MxgLMZIethGaFMkktYN53+AzG0= ;{id = 57024}
nvec78au1hpuma9eebeji5n06eq33gbk.example.com. IN NSEC3 1 1 0 - ovec78au1hpuma9eebeji5n06eq33gbk A RRSIG
nvec78au1hpuma9eebeji5n06eq33gbk.example.com. 3600 IN RRSIG NSEC3 7 3 3600 20070926134150 20070829134150 57024 example.com. jE+b5p+stQumm+tLZdaBT+KBpwYI7wRXijRHWcqiUp2SY1uV7HxBdW8aedVTqpFe8kYbMUgI3pCOAitmiI9R6SJg3q7022QOb9y+0/xSmIDqxATVPTJbkzVBInfWrulRtn7o3HmOyoIc9/w7NnNxFYpwtFL08jTBRr8XRTWDM7Q= ;{id = 57024}
8aeigskl5tmraedgji7v1lqbmqs8qv7u.example.com. IN NSEC3 1 1 0 - 9aeigskl5tmraedgji7v1lqbmqs8qv7u
8aeigskl5tmraedgji7v1lqbmqs8qv7u.example.com. 3600 IN RRSIG NSEC3 7 3 3600 20070926134150 20070829134150 57024 example.com. afV7c9knpxmD5c6UKrqw5J/06eokPwSb3HZi3TI63tzFcswuMjj4d7NKJmdpA+uo0aweVZgcOp+O+v9urgNYNYbxOy02qqOetLph8YWH7MQTftaGBwKD7gZMbnUArryPCtrlJz0i0GzoWvVTZnsjrrlDtP/ogLDnCKyi7Q0si+k= ;{id = 57024}
ac1535hlgg914unuuaei9jfh4ofr44uo.example.com. IN NSEC3 1 1 0 - ae1535hlgg914unuuaei9jfh4ofr44uo NS RRSIG
ac1535hlgg914unuuaei9jfh4ofr44uo.example.com. 3600 IN RRSIG NSEC3 7 3 3600 20070926134150 20070829134150 57024 example.com. imoxsXE1c3FaXu6uSantJfMPGBgsauf1GhmNpS1lLuaNRjXOhf1PDXwt/GoD/dm2GXJAlWT8u6EK3RXkFwlDIsP7vYFuDfUNCQ/hvYq300sXl1nfW0O1bsoBJahQJuNM+xcbwbnQf0krCTxNthyi2cuiY7RYug6ZTZ3gz4DMkhU= ;{id = 57024}
ENTRY_END
SCENARIO_END
dnssecjava-1.1.3/src/test/resources/unbound/val_nsec3_optout_cache.rpl 0000664 0000000 0000000 00000022462 13020541473 0026225 0 ustar 00root root 0000000 0000000 ; config options
; The island of trust is at example.com
server:
trust-anchor: "example.com. 3600 IN DS 2854 3 1 46e4ffc6e9a4793b488954bd3f0cc6af0dfb201b"
val-override-date: "20070916134226"
target-fetch-policy: "0 0 0 0 0"
stub-zone:
name: "."
stub-addr: 193.0.14.129 # K.ROOT-SERVERS.NET.
CONFIG_END
SCENARIO_BEGIN Test validator with NSEC3 span change and cache effects.
; K.ROOT-SERVERS.NET.
RANGE_BEGIN 0 100
ADDRESS 193.0.14.129
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
. IN NS
SECTION ANSWER
. IN NS K.ROOT-SERVERS.NET.
SECTION ADDITIONAL
K.ROOT-SERVERS.NET. IN A 193.0.14.129
ENTRY_END
ENTRY_BEGIN
MATCH opcode subdomain
ADJUST copy_id copy_query
REPLY QR NOERROR
SECTION QUESTION
com. IN A
SECTION AUTHORITY
com. IN NS a.gtld-servers.net.
SECTION ADDITIONAL
a.gtld-servers.net. IN A 192.5.6.30
ENTRY_END
RANGE_END
; a.gtld-servers.net.
RANGE_BEGIN 0 100
ADDRESS 192.5.6.30
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
com. IN NS
SECTION ANSWER
com. IN NS a.gtld-servers.net.
SECTION ADDITIONAL
a.gtld-servers.net. IN A 192.5.6.30
ENTRY_END
ENTRY_BEGIN
MATCH opcode subdomain
ADJUST copy_id copy_query
REPLY QR NOERROR
SECTION QUESTION
example.com. IN A
SECTION AUTHORITY
example.com. IN NS ns.example.com.
SECTION ADDITIONAL
ns.example.com. IN A 1.2.3.4
ENTRY_END
RANGE_END
; ns.example.com.
RANGE_BEGIN 0 100
ADDRESS 1.2.3.4
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
example.com. IN NS
SECTION ANSWER
example.com. IN NS ns.example.com.
example.com. 3600 IN RRSIG NS 3 2 3600 20070926134150 20070829134150 2854 example.com. MC0CFQCN+qHdJxoI/2tNKwsb08pra/G7aAIUAWA5sDdJTbrXA1/3OaesGBAO3sI= ;{id = 2854}
SECTION ADDITIONAL
ns.example.com. IN A 1.2.3.4
ns.example.com. 3600 IN RRSIG A 3 3 3600 20070926135752 20070829135752 2854 example.com. MC0CFQCMSWxVehgOQLoYclB9PIAbNP229AIUeH0vNNGJhjnZiqgIOKvs1EhzqAo= ;{id = 2854}
ENTRY_END
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR AA NOERROR
SECTION QUESTION
ns.example.com. IN AAAA
SECTION ANSWER
; blacklisted address to stop it from using it, the negative answer uses its
; nsec3-hash which is alittle inconvenient
; ns.example.com. -> 7l9dbddmge35f7vr9mec78dqr6l3236k.
ns.example.com. IN AAAA ::1
ns.example.com. 3600 IN RRSIG AAAA 3 3 3600 20070926135752 20070829135752 2854 example.com. AExGBc6JU/xwwoSIeK/DtX8kr7AgOecx5Z2FnRiz/YSpnWGnFDt26ec=
ENTRY_END
; response to DNSKEY priming query
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
example.com. IN DNSKEY
SECTION ANSWER
example.com. 3600 IN DNSKEY 256 3 3 ALXLUsWqUrY3JYER3T4TBJII s70j+sDS/UT2QRp61SE7S3E EXopNXoFE73JLRmvpi/UrOO/Vz4Se 6wXv/CYCKjGw06U4WRgR YXcpEhJROyNapmdIKSx hOzfLVE1gqA0PweZR8d tY3aNQSRn3sPpwJr6Mi /PqQKAMMrZ9ckJpf1+b QMOOvxgzz2U1GS18b3y ZKcgTMEaJzd/GZYzi/B N2DzQ0MsrSwYXfsNLFO Bbs8PJMW4LYIxeeOe6rUgkWOF 7CC9Dh/dduQ1QrsJhmZAEFfd6ByYV+ ;{id = 2854 (zsk), size = 1688b}
example.com. 3600 IN RRSIG DNSKEY 3 2 3600 20070926134802 20070829134802 2854 example.com. MCwCFG1yhRNtTEa3Eno2zhVVuy2EJX3wAhQeLyUp6+UXcpC5qGNu9tkrTEgPUg== ;{id = 2854}
SECTION AUTHORITY
example.com. IN NS ns.example.com.
example.com. 3600 IN RRSIG NS 3 2 3600 20070926134150 20070829134150 2854 example.com. MC0CFQCN+qHdJxoI/2tNKwsb08pra/G7aAIUAWA5sDdJTbrXA1/3OaesGBAO3sI= ;{id = 2854}
SECTION ADDITIONAL
ns.example.com. IN A 1.2.3.4
ns.example.com. 3600 IN RRSIG A 3 3 3600 20070926135752 20070829135752 2854 example.com. MC0CFQCMSWxVehgOQLoYclB9PIAbNP229AIUeH0vNNGJhjnZiqgIOKvs1EhzqAo= ;{id = 2854}
ENTRY_END
; DS query
ENTRY_BEGIN
MATCH opcode qname qtype
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
sub.example.com. IN DS
SECTION AUTHORITY
example.com. IN SOA a. b. 1 2 3 4 5
example.com. 3600 IN RRSIG SOA 3 2 3600 20070926135752 20070829135752 2854 example.com. AAkQt1yoMF7s4gCYlojFzi0ubw6Uo4uWPSJTz6Dp/2iWUVDbxDKpy+E=
; sub.example.com. -> 8r1f0ieoutlnjc03meng9e3bn2n0o9pd.
; example.com. -> b6fuorg741ufili49mg9j4328ig53sqg.
; proof that there is no DS here.
; ce:
b6fuorg741ufili49mg9j4328ig53sqg.example.com. IN NSEC3 1 1 123 aabb00123456bbccdd b6fuorg741ufili49mg9j4328ig53sqh NS SOA DNSKEY NSEC3PARAM RRSIG
b6fuorg741ufili49mg9j4328ig53sqg.example.com. 3600 IN RRSIG NSEC3 3 3 3600 20070926135752 20070829135752 2854 example.com. AKHQ0gnNP5WDab1yqbd+Bt12CSSff88sqeDR40dvhiWOcYA8mmyjYNA=
; span around sub.example.com., same span as foo.example.com, but it has
; just changed and it is now larger to accomodate sub.example.com.
6obgmo062d9935unjnnj2su5otaj9334.example.com. IN NSEC3 1 1 123 aabb00123456bbccdd 9r1f0ieoutlnjc03meng9e3bn2n0o9pd NS DS RRSIG
6obgmo062d9935unjnnj2su5otaj9334.example.com. 3600 IN RRSIG NSEC3 3 3 3600 20070926135752 20070829135752 2854 example.com. ABzruSKUUcJRNlYDqZ4UmQH/WnzeXt9Gozp3chS4cR0sqsEeGjL54eQ=
; span around sub.example.com. from previous delegation in nsec3-chain
;7r1f0ieoutlnjc03meng9e3bn2n0o9pd.example.com. IN NSEC3 1 1 123 aabb00123456bbccdd 9r1f0ieoutlnjc03meng9e3bn2n0o9pd NS DS RRSIG
;7r1f0ieoutlnjc03meng9e3bn2n0o9pd.example.com. 3600 IN RRSIG NSEC3 3 3 3600 20070926135752 20070829135752 2854 example.com. AF2FOKiIfOV9KrDTuP4RwnDI6lZnmhRHE+HAh8UHEq87uakYUEHfGUY=
ENTRY_END
; refer to server one down
ENTRY_BEGIN
MATCH opcode subdomain
ADJUST copy_id copy_query
REPLY QR NOERROR
SECTION QUESTION
sub.example.com. IN A
SECTION AUTHORITY
sub.example.com. IN NS ns.sub.example.com.
; sub.example.com. -> 8r1f0ieoutlnjc03meng9e3bn2n0o9pd.
; example.com. -> b6fuorg741ufili49mg9j4328ig53sqg.
; proof that there is no DS here.
; ce:
b6fuorg741ufili49mg9j4328ig53sqg.example.com. IN NSEC3 1 1 123 aabb00123456bbccdd b6fuorg741ufili49mg9j4328ig53sqh NS SOA DNSKEY NSEC3PARAM RRSIG
b6fuorg741ufili49mg9j4328ig53sqg.example.com. 3600 IN RRSIG NSEC3 3 3 3600 20070926135752 20070829135752 2854 example.com. AKHQ0gnNP5WDab1yqbd+Bt12CSSff88sqeDR40dvhiWOcYA8mmyjYNA=
; span around sub.example.com., same span as foo.example.com, but it has
; just changed and it is now larger to accomodate sub.example.com.
6obgmo062d9935unjnnj2su5otaj9334.example.com. IN NSEC3 1 1 123 aabb00123456bbccdd 9r1f0ieoutlnjc03meng9e3bn2n0o9pd NS DS RRSIG
6obgmo062d9935unjnnj2su5otaj9334.example.com. 3600 IN RRSIG NSEC3 3 3 3600 20070926135752 20070829135752 2854 example.com. ABzruSKUUcJRNlYDqZ4UmQH/WnzeXt9Gozp3chS4cR0sqsEeGjL54eQ=
; span around sub.example.com. from previous delegation in nsec3-chain
;7r1f0ieoutlnjc03meng9e3bn2n0o9pd.example.com. IN NSEC3 1 1 123 aabb00123456bbccdd 9r1f0ieoutlnjc03meng9e3bn2n0o9pd NS DS RRSIG
;7r1f0ieoutlnjc03meng9e3bn2n0o9pd.example.com. 3600 IN RRSIG NSEC3 3 3 3600 20070926135752 20070829135752 2854 example.com. AF2FOKiIfOV9KrDTuP4RwnDI6lZnmhRHE+HAh8UHEq87uakYUEHfGUY=
SECTION ADDITIONAL
ns.sub.example.com. IN A 1.2.3.10
ENTRY_END
; refer to server one down
ENTRY_BEGIN
MATCH opcode subdomain
ADJUST copy_id copy_query
REPLY QR NOERROR
SECTION QUESTION
foo.example.com. IN A
SECTION AUTHORITY
foo.example.com. IN NS ns.sub.example.com.
; sub.example.com. -> 8r1f0ieoutlnjc03meng9e3bn2n0o9pd.
; foo.example.com. -> 7obgmo062d9935unjnnj2su5otaj9334.
; example.com. -> b6fuorg741ufili49mg9j4328ig53sqg.
; proof that there is no DS here.
; ce:
b6fuorg741ufili49mg9j4328ig53sqg.example.com. IN NSEC3 1 1 123 aabb00123456bbccdd b6fuorg741ufili49mg9j4328ig53sqh NS SOA DNSKEY NSEC3PARAM RRSIG
b6fuorg741ufili49mg9j4328ig53sqg.example.com. 3600 IN RRSIG NSEC3 3 3 3600 20070926135752 20070829135752 2854 example.com. AKHQ0gnNP5WDab1yqbd+Bt12CSSff88sqeDR40dvhiWOcYA8mmyjYNA=
; span around sub.example.com. from previous delegation in nsec3-chain
; note it does not cover sub.example.com.
6obgmo062d9935unjnnj2su5otaj9334.example.com. IN NSEC3 1 1 123 aabb00123456bbccdd 7r1f0ieoutlnjc03meng9e3bn2n0o9pd NS DS RRSIG
6obgmo062d9935unjnnj2su5otaj9334.example.com. 3600 IN RRSIG NSEC3 3 3 3600 20070926135752 20070829135752 2854 example.com. ABQZ49PmeXGxUmMebbKcYI/Y3mhMdlHmshohKTbGhEsNF11OjPYmr9c=
SECTION ADDITIONAL
ns.sub.example.com. IN A 1.2.3.10
ENTRY_END
RANGE_END
; ns.sub.example.com.
RANGE_BEGIN 0 100
ADDRESS 1.2.3.10
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR REFUSED
SECTION QUESTION
sub.example.com. IN NS
SECTION ANSWER
ENTRY_END
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
www.sub.example.com. IN A
SECTION ANSWER
www.sub.example.com. IN A 1.2.3.123
ENTRY_END
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
www.foo.example.com. IN A
SECTION ANSWER
www.foo.example.com. IN A 1.2.3.124
ENTRY_END
RANGE_END
STEP 1 QUERY
ENTRY_BEGIN
REPLY RD DO
SECTION QUESTION
www.foo.example.com. IN A
ENTRY_END
; recursion happens here.
STEP 10 CHECK_ANSWER
ENTRY_BEGIN
MATCH all
REPLY QR RD RA NOERROR
SECTION QUESTION
www.foo.example.com. IN A
SECTION ANSWER
www.foo.example.com. IN A 1.2.3.124
SECTION AUTHORITY
SECTION ADDITIONAL
ENTRY_END
STEP 20 QUERY
ENTRY_BEGIN
REPLY RD DO
SECTION QUESTION
www.sub.example.com. IN A
ENTRY_END
; recursion happens here.
STEP 30 CHECK_ANSWER
ENTRY_BEGIN
MATCH all
REPLY QR RD RA NOERROR
SECTION QUESTION
www.sub.example.com. IN A
SECTION ANSWER
www.sub.example.com. IN A 1.2.3.123
SECTION AUTHORITY
SECTION ADDITIONAL
ENTRY_END
SCENARIO_END
dnssecjava-1.1.3/src/test/resources/unbound/val_nsec3_wcany.rpl 0000664 0000000 0000000 00000013572 13020541473 0024673 0 ustar 00root root 0000000 0000000 ; config options
; The island of trust is at example.com
server:
trust-anchor: "example.com. 3600 IN DS 2854 3 1 46e4ffc6e9a4793b488954bd3f0cc6af0dfb201b"
val-override-date: "20070916134226"
target-fetch-policy: "0 0 0 0 0"
stub-zone:
name: "."
stub-addr: 193.0.14.129 # K.ROOT-SERVERS.NET.
CONFIG_END
SCENARIO_BEGIN Test validator with NSEC3 wilcard qtype ANY response.
; K.ROOT-SERVERS.NET.
RANGE_BEGIN 0 100
ADDRESS 193.0.14.129
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
. IN NS
SECTION ANSWER
. IN NS K.ROOT-SERVERS.NET.
SECTION ADDITIONAL
K.ROOT-SERVERS.NET. IN A 193.0.14.129
ENTRY_END
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
www.example.com. IN ANY
SECTION AUTHORITY
com. IN NS a.gtld-servers.net.
SECTION ADDITIONAL
a.gtld-servers.net. IN A 192.5.6.30
ENTRY_END
RANGE_END
; a.gtld-servers.net.
RANGE_BEGIN 0 100
ADDRESS 192.5.6.30
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
com. IN NS
SECTION ANSWER
com. IN NS a.gtld-servers.net.
SECTION ADDITIONAL
a.gtld-servers.net. IN A 192.5.6.30
ENTRY_END
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
www.example.com. IN ANY
SECTION AUTHORITY
example.com. IN NS ns.example.com.
SECTION ADDITIONAL
ns.example.com. IN A 1.2.3.4
ENTRY_END
RANGE_END
; ns.example.com.
RANGE_BEGIN 0 100
ADDRESS 1.2.3.4
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
example.com. IN NS
SECTION ANSWER
example.com. IN NS ns.example.com.
example.com. 3600 IN RRSIG NS 3 2 3600 20070926134150 20070829134150 2854 example.com. MC0CFQCN+qHdJxoI/2tNKwsb08pra/G7aAIUAWA5sDdJTbrXA1/3OaesGBAO3sI= ;{id = 2854}
SECTION ADDITIONAL
ns.example.com. IN A 1.2.3.4
ns.example.com. 3600 IN RRSIG A 3 3 3600 20070926135752 20070829135752 2854 example.com. MC0CFQCMSWxVehgOQLoYclB9PIAbNP229AIUeH0vNNGJhjnZiqgIOKvs1EhzqAo= ;{id = 2854}
ENTRY_END
; response to DNSKEY priming query
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
example.com. IN DNSKEY
SECTION ANSWER
example.com. 3600 IN DNSKEY 256 3 3 ALXLUsWqUrY3JYER3T4TBJII s70j+sDS/UT2QRp61SE7S3E EXopNXoFE73JLRmvpi/UrOO/Vz4Se 6wXv/CYCKjGw06U4WRgR YXcpEhJROyNapmdIKSx hOzfLVE1gqA0PweZR8d tY3aNQSRn3sPpwJr6Mi /PqQKAMMrZ9ckJpf1+b QMOOvxgzz2U1GS18b3y ZKcgTMEaJzd/GZYzi/B N2DzQ0MsrSwYXfsNLFO Bbs8PJMW4LYIxeeOe6rUgkWOF 7CC9Dh/dduQ1QrsJhmZAEFfd6ByYV+ ;{id = 2854 (zsk), size = 1688b}
example.com. 3600 IN RRSIG DNSKEY 3 2 3600 20070926134802 20070829134802 2854 example.com. MCwCFG1yhRNtTEa3Eno2zhVVuy2EJX3wAhQeLyUp6+UXcpC5qGNu9tkrTEgPUg== ;{id = 2854}
SECTION AUTHORITY
example.com. IN NS ns.example.com.
example.com. 3600 IN RRSIG NS 3 2 3600 20070926134150 20070829134150 2854 example.com. MC0CFQCN+qHdJxoI/2tNKwsb08pra/G7aAIUAWA5sDdJTbrXA1/3OaesGBAO3sI= ;{id = 2854}
SECTION ADDITIONAL
ns.example.com. IN A 1.2.3.4
ns.example.com. 3600 IN RRSIG A 3 3 3600 20070926135752 20070829135752 2854 example.com. MC0CFQCMSWxVehgOQLoYclB9PIAbNP229AIUeH0vNNGJhjnZiqgIOKvs1EhzqAo= ;{id = 2854}
ENTRY_END
; response to query of interest
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
www.example.com. IN ANY
SECTION ANSWER
; *.example.com. IN A 1.2.3.123
; *.example.com. IN AAAA ::5
; *.example.com. IN MX 10 mail.example.com.
www.example.com. 3600 IN MX 10 mail.example.com.
www.example.com. 3600 IN RRSIG MX 3 2 3600 20070926135752 20070829135752 2854 example.com. MCwCFBncNdBkFSOTvqF7RtZ4bZuojWF8AhQlEv7Iw8BpQ7YkZQidRDJdx+BrGw== ;{id = 2854}
www.example.com. 3600 IN AAAA ::5
www.example.com. 3600 IN RRSIG AAAA 3 2 3600 20070926135752 20070829135752 2854 example.com. MC0CFCWSH0WGURY1mQwpL08SN1XF9p39AhUAgwbFk0frQC62UxhNfn4pu7iq8q4= ;{id = 2854}
www.example.com. 3600 IN A 1.2.3.123
www.example.com. 3600 IN RRSIG A 3 2 3600 20070926135752 20070829135752 2854 example.com. MCwCFCypz6dZfecwPbJ3BKrXEA7jw5kkAhRz1vprGL0idsKos8szoybKXe17Jw== ;{id = 2854}
SECTION AUTHORITY
; next closer name, H(www.example.com.) = s1unhcti19bkdr98fegs0v46mbu3t4m3.
s1unhcti19bkdr98fegs0v46mbu3t4m2.example.com. NSEC3 1 1 123 aabb00123456bbccdd s1unhcti19bkdr98fegs0v46mbu3t4m4 A MX RRSIG
s1unhcti19bkdr98fegs0v46mbu3t4m2.example.com. 3600 IN RRSIG NSEC3 3 3 3600 20070926135752 20070829135752 2854 example.com. MC0CFFSH4klZKke48dYyddYDj17gjTS0AhUAltWicpFLWqW98/Af9Qlx70MH8o4= ;{id = 2854}
ENTRY_END
RANGE_END
STEP 1 QUERY
ENTRY_BEGIN
REPLY RD DO
SECTION QUESTION
www.example.com. IN ANY
ENTRY_END
; recursion happens here.
STEP 10 CHECK_ANSWER
ENTRY_BEGIN
MATCH all
REPLY QR RD RA NOERROR
SECTION QUESTION
www.example.com. IN ANY
SECTION ANSWER
www.example.com. 3600 IN MX 10 mail.example.com.
www.example.com. 3600 IN RRSIG MX 3 2 3600 20070926135752 20070829135752 2854 example.com. MCwCFBncNdBkFSOTvqF7RtZ4bZuojWF8AhQlEv7Iw8BpQ7YkZQidRDJdx+BrGw== ;{id = 2854}
www.example.com. 3600 IN AAAA ::5
www.example.com. 3600 IN RRSIG AAAA 3 2 3600 20070926135752 20070829135752 2854 example.com. MC0CFCWSH0WGURY1mQwpL08SN1XF9p39AhUAgwbFk0frQC62UxhNfn4pu7iq8q4= ;{id = 2854}
www.example.com. 3600 IN A 1.2.3.123
www.example.com. 3600 IN RRSIG A 3 2 3600 20070926135752 20070829135752 2854 example.com. MCwCFCypz6dZfecwPbJ3BKrXEA7jw5kkAhRz1vprGL0idsKos8szoybKXe17Jw== ;{id = 2854}
SECTION AUTHORITY
s1unhcti19bkdr98fegs0v46mbu3t4m2.example.com. NSEC3 1 1 123 aabb00123456bbccdd s1unhcti19bkdr98fegs0v46mbu3t4m4 A MX RRSIG
s1unhcti19bkdr98fegs0v46mbu3t4m2.example.com. 3600 IN RRSIG NSEC3 3 3 3600 20070926135752 20070829135752 2854 example.com. MC0CFFSH4klZKke48dYyddYDj17gjTS0AhUAltWicpFLWqW98/Af9Qlx70MH8o4= ;{id = 2854}
SECTION ADDITIONAL
ENTRY_END
SCENARIO_END
dnssecjava-1.1.3/src/test/resources/unbound/val_nsec3_wcany_nodeny.rpl 0000664 0000000 0000000 00000012177 13020541473 0026247 0 ustar 00root root 0000000 0000000 ; config options
; The island of trust is at example.com
server:
trust-anchor: "example.com. 3600 IN DS 2854 3 1 46e4ffc6e9a4793b488954bd3f0cc6af0dfb201b"
val-override-date: "20070916134226"
target-fetch-policy: "0 0 0 0 0"
stub-zone:
name: "."
stub-addr: 193.0.14.129 # K.ROOT-SERVERS.NET.
CONFIG_END
SCENARIO_BEGIN Test validator with NSEC3 wilcard qtype ANY without denial.
; K.ROOT-SERVERS.NET.
RANGE_BEGIN 0 100
ADDRESS 193.0.14.129
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
. IN NS
SECTION ANSWER
. IN NS K.ROOT-SERVERS.NET.
SECTION ADDITIONAL
K.ROOT-SERVERS.NET. IN A 193.0.14.129
ENTRY_END
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
www.example.com. IN ANY
SECTION AUTHORITY
com. IN NS a.gtld-servers.net.
SECTION ADDITIONAL
a.gtld-servers.net. IN A 192.5.6.30
ENTRY_END
RANGE_END
; a.gtld-servers.net.
RANGE_BEGIN 0 100
ADDRESS 192.5.6.30
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
com. IN NS
SECTION ANSWER
com. IN NS a.gtld-servers.net.
SECTION ADDITIONAL
a.gtld-servers.net. IN A 192.5.6.30
ENTRY_END
ENTRY_BEGIN
MATCH opcode subdomain
ADJUST copy_id copy_query
REPLY QR NOERROR
SECTION QUESTION
example.com. IN ANY
SECTION AUTHORITY
example.com. IN NS ns.example.com.
SECTION ADDITIONAL
ns.example.com. IN A 1.2.3.4
ENTRY_END
RANGE_END
; ns.example.com.
RANGE_BEGIN 0 100
ADDRESS 1.2.3.4
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR AA REFUSED
SECTION QUESTION
ns.example.com. IN A
ENTRY_END
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR AA REFUSED
SECTION QUESTION
ns.example.com. IN AAAA
ENTRY_END
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
example.com. IN NS
SECTION ANSWER
example.com. IN NS ns.example.com.
example.com. 3600 IN RRSIG NS 3 2 3600 20070926134150 20070829134150 2854 example.com. MC0CFQCN+qHdJxoI/2tNKwsb08pra/G7aAIUAWA5sDdJTbrXA1/3OaesGBAO3sI= ;{id = 2854}
SECTION ADDITIONAL
ns.example.com. IN A 1.2.3.4
ns.example.com. 3600 IN RRSIG A 3 3 3600 20070926135752 20070829135752 2854 example.com. MC0CFQCMSWxVehgOQLoYclB9PIAbNP229AIUeH0vNNGJhjnZiqgIOKvs1EhzqAo= ;{id = 2854}
ENTRY_END
; response to DNSKEY priming query
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
example.com. IN DNSKEY
SECTION ANSWER
example.com. 3600 IN DNSKEY 256 3 3 ALXLUsWqUrY3JYER3T4TBJII s70j+sDS/UT2QRp61SE7S3E EXopNXoFE73JLRmvpi/UrOO/Vz4Se 6wXv/CYCKjGw06U4WRgR YXcpEhJROyNapmdIKSx hOzfLVE1gqA0PweZR8d tY3aNQSRn3sPpwJr6Mi /PqQKAMMrZ9ckJpf1+b QMOOvxgzz2U1GS18b3y ZKcgTMEaJzd/GZYzi/B N2DzQ0MsrSwYXfsNLFO Bbs8PJMW4LYIxeeOe6rUgkWOF 7CC9Dh/dduQ1QrsJhmZAEFfd6ByYV+ ;{id = 2854 (zsk), size = 1688b}
example.com. 3600 IN RRSIG DNSKEY 3 2 3600 20070926134802 20070829134802 2854 example.com. MCwCFG1yhRNtTEa3Eno2zhVVuy2EJX3wAhQeLyUp6+UXcpC5qGNu9tkrTEgPUg== ;{id = 2854}
SECTION AUTHORITY
example.com. IN NS ns.example.com.
example.com. 3600 IN RRSIG NS 3 2 3600 20070926134150 20070829134150 2854 example.com. MC0CFQCN+qHdJxoI/2tNKwsb08pra/G7aAIUAWA5sDdJTbrXA1/3OaesGBAO3sI= ;{id = 2854}
SECTION ADDITIONAL
ns.example.com. IN A 1.2.3.4
ns.example.com. 3600 IN RRSIG A 3 3 3600 20070926135752 20070829135752 2854 example.com. MC0CFQCMSWxVehgOQLoYclB9PIAbNP229AIUeH0vNNGJhjnZiqgIOKvs1EhzqAo= ;{id = 2854}
ENTRY_END
; response to query of interest
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
www.example.com. IN ANY
SECTION ANSWER
; *.example.com. IN A 1.2.3.123
; *.example.com. IN AAAA ::5
; *.example.com. IN MX 10 mail.example.com.
www.example.com. 3600 IN MX 10 mail.example.com.
www.example.com. 3600 IN RRSIG MX 3 2 3600 20070926135752 20070829135752 2854 example.com. MCwCFBncNdBkFSOTvqF7RtZ4bZuojWF8AhQlEv7Iw8BpQ7YkZQidRDJdx+BrGw== ;{id = 2854}
www.example.com. 3600 IN AAAA ::5
www.example.com. 3600 IN RRSIG AAAA 3 2 3600 20070926135752 20070829135752 2854 example.com. MC0CFCWSH0WGURY1mQwpL08SN1XF9p39AhUAgwbFk0frQC62UxhNfn4pu7iq8q4= ;{id = 2854}
www.example.com. 3600 IN A 1.2.3.123
www.example.com. 3600 IN RRSIG A 3 2 3600 20070926135752 20070829135752 2854 example.com. MCwCFCypz6dZfecwPbJ3BKrXEA7jw5kkAhRz1vprGL0idsKos8szoybKXe17Jw== ;{id = 2854}
SECTION AUTHORITY
; no qname denial!
; next closer name, H(www.example.com.) = s1unhcti19bkdr98fegs0v46mbu3t4m3.
;s1unhcti19bkdr98fegs0v46mbu3t4m2.example.com. NSEC3 1 1 123 aabb00123456bbccdd s1unhcti19bkdr98fegs0v46mbu3t4m4 A MX RRSIG
;s1unhcti19bkdr98fegs0v46mbu3t4m2.example.com. 3600 IN RRSIG NSEC3 3 3 3600 20070926135752 20070829135752 2854 example.com. MC0CFFSH4klZKke48dYyddYDj17gjTS0AhUAltWicpFLWqW98/Af9Qlx70MH8o4= ;{id = 2854}
ENTRY_END
RANGE_END
STEP 1 QUERY
ENTRY_BEGIN
REPLY RD
SECTION QUESTION
www.example.com. IN ANY
ENTRY_END
; recursion happens here.
STEP 10 CHECK_ANSWER
ENTRY_BEGIN
MATCH all
REPLY QR RD RA SERVFAIL
SECTION QUESTION
www.example.com. IN ANY
SECTION ANSWER
SECTION AUTHORITY
SECTION ADDITIONAL
ENTRY_END
SCENARIO_END
dnssecjava-1.1.3/src/test/resources/unbound/val_nx.rpl 0000664 0000000 0000000 00000012352 13020541473 0023077 0 ustar 00root root 0000000 0000000 ; config options
; The island of trust is at example.com
server:
trust-anchor: "example.com. 3600 IN DS 2854 3 1 46e4ffc6e9a4793b488954bd3f0cc6af0dfb201b"
val-override-date: "20070916134226"
target-fetch-policy: "0 0 0 0 0"
stub-zone:
name: "."
stub-addr: 193.0.14.129 # K.ROOT-SERVERS.NET.
CONFIG_END
SCENARIO_BEGIN Test validator with nxdomain response
; K.ROOT-SERVERS.NET.
RANGE_BEGIN 0 100
ADDRESS 193.0.14.129
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
. IN NS
SECTION ANSWER
. IN NS K.ROOT-SERVERS.NET.
SECTION ADDITIONAL
K.ROOT-SERVERS.NET. IN A 193.0.14.129
ENTRY_END
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
www.example.com. IN A
SECTION AUTHORITY
com. IN NS a.gtld-servers.net.
SECTION ADDITIONAL
a.gtld-servers.net. IN A 192.5.6.30
ENTRY_END
RANGE_END
; a.gtld-servers.net.
RANGE_BEGIN 0 100
ADDRESS 192.5.6.30
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
com. IN NS
SECTION ANSWER
com. IN NS a.gtld-servers.net.
SECTION ADDITIONAL
a.gtld-servers.net. IN A 192.5.6.30
ENTRY_END
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
www.example.com. IN A
SECTION AUTHORITY
example.com. IN NS ns.example.com.
SECTION ADDITIONAL
ns.example.com. IN A 1.2.3.4
ENTRY_END
RANGE_END
; ns.example.com.
RANGE_BEGIN 0 100
ADDRESS 1.2.3.4
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
example.com. IN NS
SECTION ANSWER
example.com. IN NS ns.example.com.
example.com. 3600 IN RRSIG NS 3 2 3600 20070926134150 20070829134150 2854 example.com. MC0CFQCN+qHdJxoI/2tNKwsb08pra/G7aAIUAWA5sDdJTbrXA1/3OaesGBAO3sI= ;{id = 2854}
SECTION ADDITIONAL
ns.example.com. IN A 1.2.3.4
ns.example.com. 3600 IN RRSIG A 3 3 3600 20070926135752 20070829135752 2854 example.com. MC0CFQCMSWxVehgOQLoYclB9PIAbNP229AIUeH0vNNGJhjnZiqgIOKvs1EhzqAo= ;{id = 2854}
ENTRY_END
; response to DNSKEY priming query
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
example.com. IN DNSKEY
SECTION ANSWER
example.com. 3600 IN DNSKEY 256 3 3 ALXLUsWqUrY3JYER3T4TBJII s70j+sDS/UT2QRp61SE7S3E EXopNXoFE73JLRmvpi/UrOO/Vz4Se 6wXv/CYCKjGw06U4WRgR YXcpEhJROyNapmdIKSx hOzfLVE1gqA0PweZR8d tY3aNQSRn3sPpwJr6Mi /PqQKAMMrZ9ckJpf1+b QMOOvxgzz2U1GS18b3y ZKcgTMEaJzd/GZYzi/B N2DzQ0MsrSwYXfsNLFO Bbs8PJMW4LYIxeeOe6rUgkWOF 7CC9Dh/dduQ1QrsJhmZAEFfd6ByYV+ ;{id = 2854 (zsk), size = 1688b}
example.com. 3600 IN RRSIG DNSKEY 3 2 3600 20070926134802 20070829134802 2854 example.com. MCwCFG1yhRNtTEa3Eno2zhVVuy2EJX3wAhQeLyUp6+UXcpC5qGNu9tkrTEgPUg== ;{id = 2854}
SECTION AUTHORITY
example.com. IN NS ns.example.com.
example.com. 3600 IN RRSIG NS 3 2 3600 20070926134150 20070829134150 2854 example.com. MC0CFQCN+qHdJxoI/2tNKwsb08pra/G7aAIUAWA5sDdJTbrXA1/3OaesGBAO3sI= ;{id = 2854}
SECTION ADDITIONAL
ns.example.com. IN A 1.2.3.4
ns.example.com. 3600 IN RRSIG A 3 3 3600 20070926135752 20070829135752 2854 example.com. MC0CFQCMSWxVehgOQLoYclB9PIAbNP229AIUeH0vNNGJhjnZiqgIOKvs1EhzqAo= ;{id = 2854}
ENTRY_END
; response to query of interest
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NXDOMAIN
SECTION QUESTION
www.example.com. IN A
SECTION ANSWER
SECTION AUTHORITY
example.com. IN SOA ns.example.com. hostmaster.example.com. 2007090400 28800 7200 604800 18000
example.com. 3600 IN RRSIG SOA 3 2 3600 20070926134150 20070829134150 2854 example.com. MC0CFCNGZ+/OfElYQMCZ77O9Lw9rhk7PAhUAmDcvTAst6Bq83qPq3r6c/Dm1nFc= ;{id = 2854}
; wildcard denial
example.com. IN NSEC abc.example.com. SOA NS DNSKEY NSEC RRSIG
example.com. 3600 IN RRSIG NSEC 3 2 3600 20070926134150 20070829134150 2854 example.com. MCwCFHV2IBWyTmDJvZ+sT+WsGrJX0op/AhQkAijjnjPAtx/tNub2FAGqcexJSg== ;{id = 2854}
; qname denial
wab.example.com. IN NSEC wzz.example.com. A NSEC RRSIG
wab.example.com. 3600 IN RRSIG NSEC 3 3 3600 20070926134150 20070829134150 2854 example.com. MC0CFG5DZSEIZC088rjcB1e6sQx8nQz4AhUAtQ09tP1YYLJkhL/Wg1KV2pW4Ivk= ;{id = 2854}
SECTION ADDITIONAL
ENTRY_END
RANGE_END
STEP 1 QUERY
ENTRY_BEGIN
REPLY RD DO
SECTION QUESTION
www.example.com. IN A
ENTRY_END
; recursion happens here.
STEP 10 CHECK_ANSWER
ENTRY_BEGIN
MATCH all
REPLY QR RD RA AD NXDOMAIN
SECTION QUESTION
www.example.com. IN A
SECTION ANSWER
SECTION AUTHORITY
example.com. IN SOA ns.example.com. hostmaster.example.com. 2007090400 28800 7200 604800 18000
example.com. 3600 IN RRSIG SOA 3 2 3600 20070926134150 20070829134150 2854 example.com. MC0CFCNGZ+/OfElYQMCZ77O9Lw9rhk7PAhUAmDcvTAst6Bq83qPq3r6c/Dm1nFc= ;{id = 2854}
example.com. IN NSEC abc.example.com. SOA NS DNSKEY NSEC RRSIG
example.com. 3600 IN RRSIG NSEC 3 2 3600 20070926134150 20070829134150 2854 example.com. MCwCFHV2IBWyTmDJvZ+sT+WsGrJX0op/AhQkAijjnjPAtx/tNub2FAGqcexJSg== ;{id = 2854}
wab.example.com. IN NSEC wzz.example.com. A NSEC RRSIG
wab.example.com. 3600 IN RRSIG NSEC 3 3 3600 20070926134150 20070829134150 2854 example.com. MC0CFG5DZSEIZC088rjcB1e6sQx8nQz4AhUAtQ09tP1YYLJkhL/Wg1KV2pW4Ivk= ;{id = 2854}
SECTION ADDITIONAL
ENTRY_END
SCENARIO_END
dnssecjava-1.1.3/src/test/resources/unbound/val_nx_nodeny.rpl 0000664 0000000 0000000 00000011343 13020541473 0024452 0 ustar 00root root 0000000 0000000 ; config options
; The island of trust is at example.com
server:
trust-anchor: "example.com. 3600 IN DS 2854 3 1 46e4ffc6e9a4793b488954bd3f0cc6af0dfb201b"
val-override-date: "20070916134226"
target-fetch-policy: "0 0 0 0 0"
stub-zone:
name: "."
stub-addr: 193.0.14.129 # K.ROOT-SERVERS.NET.
CONFIG_END
SCENARIO_BEGIN Test validator with nxdomain response missing qname denial
; K.ROOT-SERVERS.NET.
RANGE_BEGIN 0 100
ADDRESS 193.0.14.129
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
. IN NS
SECTION ANSWER
. IN NS K.ROOT-SERVERS.NET.
SECTION ADDITIONAL
K.ROOT-SERVERS.NET. IN A 193.0.14.129
ENTRY_END
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
www.example.com. IN A
SECTION AUTHORITY
com. IN NS a.gtld-servers.net.
SECTION ADDITIONAL
a.gtld-servers.net. IN A 192.5.6.30
ENTRY_END
RANGE_END
; a.gtld-servers.net.
RANGE_BEGIN 0 100
ADDRESS 192.5.6.30
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
com. IN NS
SECTION ANSWER
com. IN NS a.gtld-servers.net.
SECTION ADDITIONAL
a.gtld-servers.net. IN A 192.5.6.30
ENTRY_END
ENTRY_BEGIN
MATCH opcode subdomain
ADJUST copy_id copy_query
REPLY QR NOERROR
SECTION QUESTION
example.com. IN A
SECTION AUTHORITY
example.com. IN NS ns.example.com.
SECTION ADDITIONAL
ns.example.com. IN A 1.2.3.4
ENTRY_END
RANGE_END
; ns.example.com.
RANGE_BEGIN 0 100
ADDRESS 1.2.3.4
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR AA REFUSED
SECTION QUESTION
ns.example.com. IN A
ENTRY_END
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR AA REFUSED
SECTION QUESTION
ns.example.com. IN AAAA
ENTRY_END
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
example.com. IN NS
SECTION ANSWER
example.com. IN NS ns.example.com.
example.com. 3600 IN RRSIG NS 3 2 3600 20070926134150 20070829134150 2854 example.com. MC0CFQCN+qHdJxoI/2tNKwsb08pra/G7aAIUAWA5sDdJTbrXA1/3OaesGBAO3sI= ;{id = 2854}
SECTION ADDITIONAL
ns.example.com. IN A 1.2.3.4
ns.example.com. 3600 IN RRSIG A 3 3 3600 20070926135752 20070829135752 2854 example.com. MC0CFQCMSWxVehgOQLoYclB9PIAbNP229AIUeH0vNNGJhjnZiqgIOKvs1EhzqAo= ;{id = 2854}
ENTRY_END
; response to DNSKEY priming query
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
example.com. IN DNSKEY
SECTION ANSWER
example.com. 3600 IN DNSKEY 256 3 3 ALXLUsWqUrY3JYER3T4TBJII s70j+sDS/UT2QRp61SE7S3E EXopNXoFE73JLRmvpi/UrOO/Vz4Se 6wXv/CYCKjGw06U4WRgR YXcpEhJROyNapmdIKSx hOzfLVE1gqA0PweZR8d tY3aNQSRn3sPpwJr6Mi /PqQKAMMrZ9ckJpf1+b QMOOvxgzz2U1GS18b3y ZKcgTMEaJzd/GZYzi/B N2DzQ0MsrSwYXfsNLFO Bbs8PJMW4LYIxeeOe6rUgkWOF 7CC9Dh/dduQ1QrsJhmZAEFfd6ByYV+ ;{id = 2854 (zsk), size = 1688b}
example.com. 3600 IN RRSIG DNSKEY 3 2 3600 20070926134802 20070829134802 2854 example.com. MCwCFG1yhRNtTEa3Eno2zhVVuy2EJX3wAhQeLyUp6+UXcpC5qGNu9tkrTEgPUg== ;{id = 2854}
SECTION AUTHORITY
example.com. IN NS ns.example.com.
example.com. 3600 IN RRSIG NS 3 2 3600 20070926134150 20070829134150 2854 example.com. MC0CFQCN+qHdJxoI/2tNKwsb08pra/G7aAIUAWA5sDdJTbrXA1/3OaesGBAO3sI= ;{id = 2854}
SECTION ADDITIONAL
ns.example.com. IN A 1.2.3.4
ns.example.com. 3600 IN RRSIG A 3 3 3600 20070926135752 20070829135752 2854 example.com. MC0CFQCMSWxVehgOQLoYclB9PIAbNP229AIUeH0vNNGJhjnZiqgIOKvs1EhzqAo= ;{id = 2854}
ENTRY_END
; response to query of interest
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NXDOMAIN
SECTION QUESTION
www.example.com. IN A
SECTION ANSWER
SECTION AUTHORITY
example.com. IN SOA ns.example.com. hostmaster.example.com. 2007090400 28800 7200 604800 18000
example.com. 3600 IN RRSIG SOA 3 2 3600 20070926134150 20070829134150 2854 example.com. MC0CFCNGZ+/OfElYQMCZ77O9Lw9rhk7PAhUAmDcvTAst6Bq83qPq3r6c/Dm1nFc= ;{id = 2854}
; wildcard denial
example.com. IN NSEC abc.example.com. SOA NS DNSKEY NSEC RRSIG
example.com. 3600 IN RRSIG NSEC 3 2 3600 20070926134150 20070829134150 2854 example.com. MCwCFHV2IBWyTmDJvZ+sT+WsGrJX0op/AhQkAijjnjPAtx/tNub2FAGqcexJSg== ;{id = 2854}
; qname denial
;wab.example.com. IN NSEC wzz.example.com. A NSEC RRSIG
;wab.example.com. 3600 IN RRSIG NSEC 3 3 3600 20070926134150 20070829134150 2854 example.com. MC0CFG5DZSEIZC088rjcB1e6sQx8nQz4AhUAtQ09tP1YYLJkhL/Wg1KV2pW4Ivk= ;{id = 2854}
SECTION ADDITIONAL
ENTRY_END
RANGE_END
STEP 1 QUERY
ENTRY_BEGIN
REPLY RD
SECTION QUESTION
www.example.com. IN A
ENTRY_END
; recursion happens here.
STEP 10 CHECK_ANSWER
ENTRY_BEGIN
MATCH all
REPLY QR RD RA SERVFAIL
SECTION QUESTION
www.example.com. IN A
SECTION ANSWER
SECTION AUTHORITY
SECTION ADDITIONAL
ENTRY_END
SCENARIO_END
dnssecjava-1.1.3/src/test/resources/unbound/val_nx_nowc.rpl 0000664 0000000 0000000 00000011346 13020541473 0024127 0 ustar 00root root 0000000 0000000 ; config options
; The island of trust is at example.com
server:
trust-anchor: "example.com. 3600 IN DS 2854 3 1 46e4ffc6e9a4793b488954bd3f0cc6af0dfb201b"
val-override-date: "20070916134226"
target-fetch-policy: "0 0 0 0 0"
stub-zone:
name: "."
stub-addr: 193.0.14.129 # K.ROOT-SERVERS.NET.
CONFIG_END
SCENARIO_BEGIN Test validator with nxdomain response missing wildcard denial
; K.ROOT-SERVERS.NET.
RANGE_BEGIN 0 100
ADDRESS 193.0.14.129
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
. IN NS
SECTION ANSWER
. IN NS K.ROOT-SERVERS.NET.
SECTION ADDITIONAL
K.ROOT-SERVERS.NET. IN A 193.0.14.129
ENTRY_END
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
www.example.com. IN A
SECTION AUTHORITY
com. IN NS a.gtld-servers.net.
SECTION ADDITIONAL
a.gtld-servers.net. IN A 192.5.6.30
ENTRY_END
RANGE_END
; a.gtld-servers.net.
RANGE_BEGIN 0 100
ADDRESS 192.5.6.30
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
com. IN NS
SECTION ANSWER
com. IN NS a.gtld-servers.net.
SECTION ADDITIONAL
a.gtld-servers.net. IN A 192.5.6.30
ENTRY_END
ENTRY_BEGIN
MATCH opcode subdomain
ADJUST copy_id copy_query
REPLY QR NOERROR
SECTION QUESTION
example.com. IN A
SECTION AUTHORITY
example.com. IN NS ns.example.com.
SECTION ADDITIONAL
ns.example.com. IN A 1.2.3.4
ENTRY_END
RANGE_END
; ns.example.com.
RANGE_BEGIN 0 100
ADDRESS 1.2.3.4
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR AA REFUSED
SECTION QUESTION
ns.example.com. IN A
ENTRY_END
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR AA REFUSED
SECTION QUESTION
ns.example.com. IN AAAA
ENTRY_END
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
example.com. IN NS
SECTION ANSWER
example.com. IN NS ns.example.com.
example.com. 3600 IN RRSIG NS 3 2 3600 20070926134150 20070829134150 2854 example.com. MC0CFQCN+qHdJxoI/2tNKwsb08pra/G7aAIUAWA5sDdJTbrXA1/3OaesGBAO3sI= ;{id = 2854}
SECTION ADDITIONAL
ns.example.com. IN A 1.2.3.4
ns.example.com. 3600 IN RRSIG A 3 3 3600 20070926135752 20070829135752 2854 example.com. MC0CFQCMSWxVehgOQLoYclB9PIAbNP229AIUeH0vNNGJhjnZiqgIOKvs1EhzqAo= ;{id = 2854}
ENTRY_END
; response to DNSKEY priming query
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
example.com. IN DNSKEY
SECTION ANSWER
example.com. 3600 IN DNSKEY 256 3 3 ALXLUsWqUrY3JYER3T4TBJII s70j+sDS/UT2QRp61SE7S3E EXopNXoFE73JLRmvpi/UrOO/Vz4Se 6wXv/CYCKjGw06U4WRgR YXcpEhJROyNapmdIKSx hOzfLVE1gqA0PweZR8d tY3aNQSRn3sPpwJr6Mi /PqQKAMMrZ9ckJpf1+b QMOOvxgzz2U1GS18b3y ZKcgTMEaJzd/GZYzi/B N2DzQ0MsrSwYXfsNLFO Bbs8PJMW4LYIxeeOe6rUgkWOF 7CC9Dh/dduQ1QrsJhmZAEFfd6ByYV+ ;{id = 2854 (zsk), size = 1688b}
example.com. 3600 IN RRSIG DNSKEY 3 2 3600 20070926134802 20070829134802 2854 example.com. MCwCFG1yhRNtTEa3Eno2zhVVuy2EJX3wAhQeLyUp6+UXcpC5qGNu9tkrTEgPUg== ;{id = 2854}
SECTION AUTHORITY
example.com. IN NS ns.example.com.
example.com. 3600 IN RRSIG NS 3 2 3600 20070926134150 20070829134150 2854 example.com. MC0CFQCN+qHdJxoI/2tNKwsb08pra/G7aAIUAWA5sDdJTbrXA1/3OaesGBAO3sI= ;{id = 2854}
SECTION ADDITIONAL
ns.example.com. IN A 1.2.3.4
ns.example.com. 3600 IN RRSIG A 3 3 3600 20070926135752 20070829135752 2854 example.com. MC0CFQCMSWxVehgOQLoYclB9PIAbNP229AIUeH0vNNGJhjnZiqgIOKvs1EhzqAo= ;{id = 2854}
ENTRY_END
; response to query of interest
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NXDOMAIN
SECTION QUESTION
www.example.com. IN A
SECTION ANSWER
SECTION AUTHORITY
example.com. IN SOA ns.example.com. hostmaster.example.com. 2007090400 28800 7200 604800 18000
example.com. 3600 IN RRSIG SOA 3 2 3600 20070926134150 20070829134150 2854 example.com. MC0CFCNGZ+/OfElYQMCZ77O9Lw9rhk7PAhUAmDcvTAst6Bq83qPq3r6c/Dm1nFc= ;{id = 2854}
; wildcard denial
;example.com. IN NSEC abc.example.com. SOA NS DNSKEY NSEC RRSIG
;example.com. 3600 IN RRSIG NSEC 3 2 3600 20070926134150 20070829134150 2854 example.com. MCwCFHV2IBWyTmDJvZ+sT+WsGrJX0op/AhQkAijjnjPAtx/tNub2FAGqcexJSg== ;{id = 2854}
; qname denial
wab.example.com. IN NSEC wzz.example.com. A NSEC RRSIG
wab.example.com. 3600 IN RRSIG NSEC 3 3 3600 20070926134150 20070829134150 2854 example.com. MC0CFG5DZSEIZC088rjcB1e6sQx8nQz4AhUAtQ09tP1YYLJkhL/Wg1KV2pW4Ivk= ;{id = 2854}
SECTION ADDITIONAL
ENTRY_END
RANGE_END
STEP 1 QUERY
ENTRY_BEGIN
REPLY RD
SECTION QUESTION
www.example.com. IN A
ENTRY_END
; recursion happens here.
STEP 10 CHECK_ANSWER
ENTRY_BEGIN
MATCH all
REPLY QR RD RA SERVFAIL
SECTION QUESTION
www.example.com. IN A
SECTION ANSWER
SECTION AUTHORITY
SECTION ADDITIONAL
ENTRY_END
SCENARIO_END
dnssecjava-1.1.3/src/test/resources/unbound/val_nx_nsec3_collision.rpl 0000664 0000000 0000000 00000020533 13020541473 0026245 0 ustar 00root root 0000000 0000000 ; config options
; The island of trust is at example.com
server:
trust-anchor: "example.com. 3600 IN DS 2854 3 1 46e4ffc6e9a4793b488954bd3f0cc6af0dfb201b"
val-override-date: "20070916134226"
target-fetch-policy: "0 0 0 0 0"
stub-zone:
name: "."
stub-addr: 193.0.14.129 # K.ROOT-SERVERS.NET.
CONFIG_END
SCENARIO_BEGIN Test validator with nxdomain NSEC3 with a collision.
; K.ROOT-SERVERS.NET.
RANGE_BEGIN 0 100
ADDRESS 193.0.14.129
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
. IN NS
SECTION ANSWER
. IN NS K.ROOT-SERVERS.NET.
SECTION ADDITIONAL
K.ROOT-SERVERS.NET. IN A 193.0.14.129
ENTRY_END
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
www.example.com. IN A
SECTION AUTHORITY
com. IN NS a.gtld-servers.net.
SECTION ADDITIONAL
a.gtld-servers.net. IN A 192.5.6.30
ENTRY_END
RANGE_END
; a.gtld-servers.net.
RANGE_BEGIN 0 100
ADDRESS 192.5.6.30
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
com. IN NS
SECTION ANSWER
com. IN NS a.gtld-servers.net.
SECTION ADDITIONAL
a.gtld-servers.net. IN A 192.5.6.30
ENTRY_END
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
www.example.com. IN A
SECTION AUTHORITY
example.com. IN NS ns.example.com.
SECTION ADDITIONAL
ns.example.com. IN A 1.2.3.4
ENTRY_END
RANGE_END
; ns.example.com.
RANGE_BEGIN 0 100
ADDRESS 1.2.3.4
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
example.com. IN NS
SECTION ANSWER
example.com. IN NS ns.example.com.
example.com. 3600 IN RRSIG NS 3 2 3600 20070926134150 20070829134150 2854 example.com. MC0CFQCN+qHdJxoI/2tNKwsb08pra/G7aAIUAWA5sDdJTbrXA1/3OaesGBAO3sI= ;{id = 2854}
SECTION ADDITIONAL
ns.example.com. IN A 1.2.3.4
ns.example.com. 3600 IN RRSIG A 3 3 3600 20070926135752 20070829135752 2854 example.com. MC0CFQCMSWxVehgOQLoYclB9PIAbNP229AIUeH0vNNGJhjnZiqgIOKvs1EhzqAo= ;{id = 2854}
ENTRY_END
; response to DNSKEY priming query
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
example.com. IN DNSKEY
SECTION ANSWER
example.com. 3600 IN DNSKEY 256 3 3 ALXLUsWqUrY3JYER3T4TBJII s70j+sDS/UT2QRp61SE7S3E EXopNXoFE73JLRmvpi/UrOO/Vz4Se 6wXv/CYCKjGw06U4WRgR YXcpEhJROyNapmdIKSx hOzfLVE1gqA0PweZR8d tY3aNQSRn3sPpwJr6Mi /PqQKAMMrZ9ckJpf1+b QMOOvxgzz2U1GS18b3y ZKcgTMEaJzd/GZYzi/B N2DzQ0MsrSwYXfsNLFO Bbs8PJMW4LYIxeeOe6rUgkWOF 7CC9Dh/dduQ1QrsJhmZAEFfd6ByYV+ ;{id = 2854 (zsk), size = 1688b}
example.com. 3600 IN RRSIG DNSKEY 3 2 3600 20070926134802 20070829134802 2854 example.com. MCwCFG1yhRNtTEa3Eno2zhVVuy2EJX3wAhQeLyUp6+UXcpC5qGNu9tkrTEgPUg== ;{id = 2854}
SECTION AUTHORITY
example.com. IN NS ns.example.com.
example.com. 3600 IN RRSIG NS 3 2 3600 20070926134150 20070829134150 2854 example.com. MC0CFQCN+qHdJxoI/2tNKwsb08pra/G7aAIUAWA5sDdJTbrXA1/3OaesGBAO3sI= ;{id = 2854}
SECTION ADDITIONAL
ns.example.com. IN A 1.2.3.4
ns.example.com. 3600 IN RRSIG A 3 3 3600 20070926135752 20070829135752 2854 example.com. MC0CFQCMSWxVehgOQLoYclB9PIAbNP229AIUeH0vNNGJhjnZiqgIOKvs1EhzqAo= ;{id = 2854}
ENTRY_END
; response to query of interest
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NXDOMAIN
SECTION QUESTION
www.example.com. IN A
SECTION ANSWER
SECTION AUTHORITY
example.com. IN SOA ns.example.com. hostmaster.example.com. 2007090400 28800 7200 604800 18000
example.com. 3600 IN RRSIG SOA 3 2 3600 20070926134150 20070829134150 2854 example.com. MC0CFCNGZ+/OfElYQMCZ77O9Lw9rhk7PAhUAmDcvTAst6Bq83qPq3r6c/Dm1nFc= ;{id = 2854}
; some collisions added here. Say different chains are being signed
; and some colliding NSEC3 RRs are generated.
; closest encloser, H(example.com) = 6md8numosa4q9ugkffdo1bmm82t5j39s
; for 1 1 8 -
6md8numosa4q9ugkffdo1bmm82t5j39s.example.com. NSEC3 1 1 123 aabb00123456bbccdd 6md8numosa4q9ugkffdo1bmm82t5j49s A RRSIG
6md8numosa4q9ugkffdo1bmm82t5j39s.example.com. NSEC3 1 1 8 - 6md8numosa4q9ugkffdo1bmm82t5j49s SOA NS MX DNSKEY RRSIG
6md8numosa4q9ugkffdo1bmm82t5j39s.example.com. 3600 IN RRSIG NSEC3 3 3 3600 20070926135752 20070829135752 2854 example.com. MCwCFHndWrEEbuzezs/4lxeiMgEuUsUbAhR72gJgd/Zmhf80yoxCauw9k5OkCw== ;{id = 2854}
; wildcard denial, H(*.example.com.) = 4f3cnt8cu22tngec382jj4gde4rb47ub
; for 1 1 0 -
4f3cnt8cu22tngec382jj4gde4rb46ub.example.com. NSEC3 1 1 18 - 4f3cnt8cu22tngec382jj4gde4rb87ub A RRSIG
4f3cnt8cu22tngec382jj4gde4rb46ub.example.com. NSEC3 1 1 0 - 4f3cnt8cu22tngec382jj4gde4rb48ub A MX RRSIG
4f3cnt8cu22tngec382jj4gde4rb46ub.example.com. NSEC3 1 1 19 - 4f3cnt8cu22tngec382jj4gde4rb87ub A RRSIG
4f3cnt8cu22tngec382jj4gde4rb46ub.example.com. 3600 IN RRSIG NSEC3 3 3 3600 20070926135752 20070829135752 2854 example.com. MCwCFDRwji51WCXJg7W/3+Jx586af5qgAhQPxHegtzu1I/QbvCNrOOON05N1rw== ;{id = 2854}
; next closer name, H(www.example.com.) = s1unhcti19bkdr98fegs0v46mbu3t4m3.
; for 1 1 123 aaabb...
s1unhcti19bkdr98fegs0v46mbu3t4m2.example.com. NSEC3 1 1 18 - s1unhcti19bkdr98fegs0v46mbu3t4m4 A RRSIG
s1unhcti19bkdr98fegs0v46mbu3t4m2.example.com. NSEC3 1 1 19 - s1unhcti19bkdr98fegs0v46mbu3t4m4 A RRSIG
s1unhcti19bkdr98fegs0v46mbu3t4m2.example.com. NSEC3 1 1 20 00 s1unhcti19bkdr98fegs0v46mbu3t4m4 A RRSIG
s1unhcti19bkdr98fegs0v46mbu3t4m2.example.com. NSEC3 1 1 123 aabb00123456bbccdd s1unhcti19bkdr98fegs0v46mbu3t4m4 A MX RRSIG
s1unhcti19bkdr98fegs0v46mbu3t4m2.example.com. NSEC3 1 1 20 01 s1unhcti19bkdr98fegs0v46mbu3t4m4 A RRSIG
s1unhcti19bkdr98fegs0v46mbu3t4m2.example.com. NSEC3 1 1 20 02 s1unhcti19bkdr98fegs0v46mbu3t4m4 A RRSIG
s1unhcti19bkdr98fegs0v46mbu3t4m2.example.com. NSEC3 1 1 20 03 s1unhcti19bkdr98fegs0v46mbu3t4m4 A RRSIG
s1unhcti19bkdr98fegs0v46mbu3t4m2.example.com. 3600 IN RRSIG NSEC3 3 3 3600 20070926135752 20070829135752 2854 example.com. MCwCFDLy4GbR8ZaKHATVJGnGxzpsuq60AhQ1/pRbXi1ZbcYohzHgWzNC50fC5A== ;{id = 2854}
ENTRY_END
RANGE_END
STEP 1 QUERY
ENTRY_BEGIN
REPLY RD DO
SECTION QUESTION
www.example.com. IN A
ENTRY_END
; recursion happens here.
STEP 10 CHECK_ANSWER
ENTRY_BEGIN
MATCH all
REPLY QR RD RA NXDOMAIN
SECTION QUESTION
www.example.com. IN A
SECTION ANSWER
SECTION AUTHORITY
example.com. IN SOA ns.example.com. hostmaster.example.com. 2007090400 28800 7200 604800 18000
example.com. 3600 IN RRSIG SOA 3 2 3600 20070926134150 20070829134150 2854 example.com. MC0CFCNGZ+/OfElYQMCZ77O9Lw9rhk7PAhUAmDcvTAst6Bq83qPq3r6c/Dm1nFc= ;{id = 2854}
6md8numosa4q9ugkffdo1bmm82t5j39s.example.com. NSEC3 1 1 123 aabb00123456bbccdd 6md8numosa4q9ugkffdo1bmm82t5j49s A RRSIG
6md8numosa4q9ugkffdo1bmm82t5j39s.example.com. NSEC3 1 1 8 - 6md8numosa4q9ugkffdo1bmm82t5j49s SOA NS MX DNSKEY RRSIG
6md8numosa4q9ugkffdo1bmm82t5j39s.example.com. 3600 IN RRSIG NSEC3 3 3 3600 20070926135752 20070829135752 2854 example.com. MCwCFHndWrEEbuzezs/4lxeiMgEuUsUbAhR72gJgd/Zmhf80yoxCauw9k5OkCw== ;{id = 2854}
4f3cnt8cu22tngec382jj4gde4rb46ub.example.com. NSEC3 1 1 18 - 4f3cnt8cu22tngec382jj4gde4rb87ub A RRSIG
4f3cnt8cu22tngec382jj4gde4rb46ub.example.com. NSEC3 1 1 0 - 4f3cnt8cu22tngec382jj4gde4rb48ub A MX RRSIG
4f3cnt8cu22tngec382jj4gde4rb46ub.example.com. NSEC3 1 1 19 - 4f3cnt8cu22tngec382jj4gde4rb87ub A RRSIG
4f3cnt8cu22tngec382jj4gde4rb46ub.example.com. 3600 IN RRSIG NSEC3 3 3 3600 20070926135752 20070829135752 2854 example.com. MCwCFDRwji51WCXJg7W/3+Jx586af5qgAhQPxHegtzu1I/QbvCNrOOON05N1rw== ;{id = 2854}
s1unhcti19bkdr98fegs0v46mbu3t4m2.example.com. NSEC3 1 1 18 - s1unhcti19bkdr98fegs0v46mbu3t4m4 A RRSIG
s1unhcti19bkdr98fegs0v46mbu3t4m2.example.com. NSEC3 1 1 19 - s1unhcti19bkdr98fegs0v46mbu3t4m4 A RRSIG
s1unhcti19bkdr98fegs0v46mbu3t4m2.example.com. NSEC3 1 1 20 00 s1unhcti19bkdr98fegs0v46mbu3t4m4 A RRSIG
s1unhcti19bkdr98fegs0v46mbu3t4m2.example.com. NSEC3 1 1 123 aabb00123456bbccdd s1unhcti19bkdr98fegs0v46mbu3t4m4 A MX RRSIG
s1unhcti19bkdr98fegs0v46mbu3t4m2.example.com. NSEC3 1 1 20 01 s1unhcti19bkdr98fegs0v46mbu3t4m4 A RRSIG
s1unhcti19bkdr98fegs0v46mbu3t4m2.example.com. NSEC3 1 1 20 02 s1unhcti19bkdr98fegs0v46mbu3t4m4 A RRSIG
s1unhcti19bkdr98fegs0v46mbu3t4m2.example.com. NSEC3 1 1 20 03 s1unhcti19bkdr98fegs0v46mbu3t4m4 A RRSIG
s1unhcti19bkdr98fegs0v46mbu3t4m2.example.com. 3600 IN RRSIG NSEC3 3 3 3600 20070926135752 20070829135752 2854 example.com. MCwCFDLy4GbR8ZaKHATVJGnGxzpsuq60AhQ1/pRbXi1ZbcYohzHgWzNC50fC5A== ;{id = 2854}
SECTION ADDITIONAL
ENTRY_END
SCENARIO_END
dnssecjava-1.1.3/src/test/resources/unbound/val_nx_nsec3_collision2.rpl 0000664 0000000 0000000 00000020461 13020541473 0026327 0 ustar 00root root 0000000 0000000 ; config options
; The island of trust is at example.com
server:
trust-anchor: "example.com. 3600 IN DS 2854 3 1 46e4ffc6e9a4793b488954bd3f0cc6af0dfb201b"
val-override-date: "20070916134226"
target-fetch-policy: "0 0 0 0 0"
stub-zone:
name: "."
stub-addr: 193.0.14.129 # K.ROOT-SERVERS.NET.
CONFIG_END
SCENARIO_BEGIN Test validator with nxdomain NSEC3 with a salt mismatch.
; K.ROOT-SERVERS.NET.
RANGE_BEGIN 0 100
ADDRESS 193.0.14.129
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
. IN NS
SECTION ANSWER
. IN NS K.ROOT-SERVERS.NET.
SECTION ADDITIONAL
K.ROOT-SERVERS.NET. IN A 193.0.14.129
ENTRY_END
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
www.example.com. IN A
SECTION AUTHORITY
com. IN NS a.gtld-servers.net.
SECTION ADDITIONAL
a.gtld-servers.net. IN A 192.5.6.30
ENTRY_END
RANGE_END
; a.gtld-servers.net.
RANGE_BEGIN 0 100
ADDRESS 192.5.6.30
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
com. IN NS
SECTION ANSWER
com. IN NS a.gtld-servers.net.
SECTION ADDITIONAL
a.gtld-servers.net. IN A 192.5.6.30
ENTRY_END
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
www.example.com. IN A
SECTION AUTHORITY
example.com. IN NS ns.example.com.
SECTION ADDITIONAL
ns.example.com. IN A 1.2.3.4
ENTRY_END
RANGE_END
; ns.example.com.
RANGE_BEGIN 0 100
ADDRESS 1.2.3.4
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
example.com. IN NS
SECTION ANSWER
example.com. IN NS ns.example.com.
example.com. 3600 IN RRSIG NS 3 2 3600 20070926134150 20070829134150 2854 example.com. MC0CFQCN+qHdJxoI/2tNKwsb08pra/G7aAIUAWA5sDdJTbrXA1/3OaesGBAO3sI= ;{id = 2854}
SECTION ADDITIONAL
ns.example.com. IN A 1.2.3.4
ns.example.com. 3600 IN RRSIG A 3 3 3600 20070926135752 20070829135752 2854 example.com. MC0CFQCMSWxVehgOQLoYclB9PIAbNP229AIUeH0vNNGJhjnZiqgIOKvs1EhzqAo= ;{id = 2854}
ENTRY_END
; response to DNSKEY priming query
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
example.com. IN DNSKEY
SECTION ANSWER
example.com. 3600 IN DNSKEY 256 3 3 ALXLUsWqUrY3JYER3T4TBJII s70j+sDS/UT2QRp61SE7S3E EXopNXoFE73JLRmvpi/UrOO/Vz4Se 6wXv/CYCKjGw06U4WRgR YXcpEhJROyNapmdIKSx hOzfLVE1gqA0PweZR8d tY3aNQSRn3sPpwJr6Mi /PqQKAMMrZ9ckJpf1+b QMOOvxgzz2U1GS18b3y ZKcgTMEaJzd/GZYzi/B N2DzQ0MsrSwYXfsNLFO Bbs8PJMW4LYIxeeOe6rUgkWOF 7CC9Dh/dduQ1QrsJhmZAEFfd6ByYV+ ;{id = 2854 (zsk), size = 1688b}
example.com. 3600 IN RRSIG DNSKEY 3 2 3600 20070926134802 20070829134802 2854 example.com. MCwCFG1yhRNtTEa3Eno2zhVVuy2EJX3wAhQeLyUp6+UXcpC5qGNu9tkrTEgPUg== ;{id = 2854}
SECTION AUTHORITY
example.com. IN NS ns.example.com.
example.com. 3600 IN RRSIG NS 3 2 3600 20070926134150 20070829134150 2854 example.com. MC0CFQCN+qHdJxoI/2tNKwsb08pra/G7aAIUAWA5sDdJTbrXA1/3OaesGBAO3sI= ;{id = 2854}
SECTION ADDITIONAL
ns.example.com. IN A 1.2.3.4
ns.example.com. 3600 IN RRSIG A 3 3 3600 20070926135752 20070829135752 2854 example.com. MC0CFQCMSWxVehgOQLoYclB9PIAbNP229AIUeH0vNNGJhjnZiqgIOKvs1EhzqAo= ;{id = 2854}
ENTRY_END
; response to query of interest
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NXDOMAIN
SECTION QUESTION
www.example.com. IN A
SECTION ANSWER
SECTION AUTHORITY
example.com. IN SOA ns.example.com. hostmaster.example.com. 2007090400 28800 7200 604800 18000
example.com. 3600 IN RRSIG SOA 3 2 3600 20070926134150 20070829134150 2854 example.com. MC0CFCNGZ+/OfElYQMCZ77O9Lw9rhk7PAhUAmDcvTAst6Bq83qPq3r6c/Dm1nFc= ;{id = 2854}
; some collisions added here. Say different chains are being signed
; and some colliding NSEC3 RRs are generated.
; closest encloser, H(example.com) = 6md8numosa4q9ugkffdo1bmm82t5j39s
; for 1 1 8 -
6md8numosa4q9ugkffdo1bmm82t5j39s.example.com. NSEC3 1 1 123 aabb00123456bbccdd 6md8numosa4q9ugkffdo1bmm82t5j49s A RRSIG
6md8numosa4q9ugkffdo1bmm82t5j39s.example.com. NSEC3 1 1 123 - 6md8numosa4q9ugkffdo1bmm82t5j49s SOA NS MX DNSKEY RRSIG
6md8numosa4q9ugkffdo1bmm82t5j39s.example.com. 3600 IN RRSIG NSEC3 3 3 3600 20070926115752 20070829115752 2854 example.com. AD1r+7exm2FOOkSqFvmoLt/VrovAYWd5Ouz9m5MxGlLFbTU2ja2Hupk=
; wildcard denial, H(*.example.com.) = 4f3cnt8cu22tngec382jj4gde4rb47ub
; for 1 1 0 -
4f3cnt8cu22tngec382jj4gde4rb46ub.example.com. NSEC3 1 1 18 - 4f3cnt8cu22tngec382jj4gde4rb87ub A RRSIG
4f3cnt8cu22tngec382jj4gde4rb46ub.example.com. NSEC3 1 1 0 - 4f3cnt8cu22tngec382jj4gde4rb48ub A MX RRSIG
4f3cnt8cu22tngec382jj4gde4rb46ub.example.com. NSEC3 1 1 19 - 4f3cnt8cu22tngec382jj4gde4rb87ub A RRSIG
4f3cnt8cu22tngec382jj4gde4rb46ub.example.com. 3600 IN RRSIG NSEC3 3 3 3600 20070926135752 20070829135752 2854 example.com. MCwCFDRwji51WCXJg7W/3+Jx586af5qgAhQPxHegtzu1I/QbvCNrOOON05N1rw== ;{id = 2854}
; next closer name, H(www.example.com.) = s1unhcti19bkdr98fegs0v46mbu3t4m3.
; for 1 1 123 aaabb...
s1unhcti19bkdr98fegs0v46mbu3t4m2.example.com. NSEC3 1 1 18 - s1unhcti19bkdr98fegs0v46mbu3t4m4 A RRSIG
s1unhcti19bkdr98fegs0v46mbu3t4m2.example.com. NSEC3 1 1 19 - s1unhcti19bkdr98fegs0v46mbu3t4m4 A RRSIG
s1unhcti19bkdr98fegs0v46mbu3t4m2.example.com. NSEC3 1 1 20 00 s1unhcti19bkdr98fegs0v46mbu3t4m4 A RRSIG
s1unhcti19bkdr98fegs0v46mbu3t4m2.example.com. NSEC3 1 1 123 aabb00123456bbccdd s1unhcti19bkdr98fegs0v46mbu3t4m4 A MX RRSIG
s1unhcti19bkdr98fegs0v46mbu3t4m2.example.com. NSEC3 1 1 20 01 s1unhcti19bkdr98fegs0v46mbu3t4m4 A RRSIG
s1unhcti19bkdr98fegs0v46mbu3t4m2.example.com. NSEC3 1 1 20 02 s1unhcti19bkdr98fegs0v46mbu3t4m4 A RRSIG
s1unhcti19bkdr98fegs0v46mbu3t4m2.example.com. NSEC3 1 1 20 03 s1unhcti19bkdr98fegs0v46mbu3t4m4 A RRSIG
s1unhcti19bkdr98fegs0v46mbu3t4m2.example.com. 3600 IN RRSIG NSEC3 3 3 3600 20070926135752 20070829135752 2854 example.com. MCwCFDLy4GbR8ZaKHATVJGnGxzpsuq60AhQ1/pRbXi1ZbcYohzHgWzNC50fC5A== ;{id = 2854}
ENTRY_END
RANGE_END
STEP 1 QUERY
ENTRY_BEGIN
REPLY RD DO
SECTION QUESTION
www.example.com. IN A
ENTRY_END
; recursion happens here.
STEP 10 CHECK_ANSWER
ENTRY_BEGIN
MATCH all
REPLY QR RD RA NXDOMAIN
SECTION QUESTION
www.example.com. IN A
SECTION ANSWER
SECTION AUTHORITY
example.com. IN SOA ns.example.com. hostmaster.example.com. 2007090400 28800 7200 604800 18000
example.com. 3600 IN RRSIG SOA 3 2 3600 20070926134150 20070829134150 2854 example.com. MC0CFCNGZ+/OfElYQMCZ77O9Lw9rhk7PAhUAmDcvTAst6Bq83qPq3r6c/Dm1nFc= ;{id = 2854}
6md8numosa4q9ugkffdo1bmm82t5j39s.example.com. NSEC3 1 1 123 aabb00123456bbccdd 6md8numosa4q9ugkffdo1bmm82t5j49s A RRSIG
6md8numosa4q9ugkffdo1bmm82t5j39s.example.com. NSEC3 1 1 123 - 6md8numosa4q9ugkffdo1bmm82t5j49s SOA NS MX DNSKEY RRSIG
6md8numosa4q9ugkffdo1bmm82t5j39s.example.com. 3600 IN RRSIG NSEC3 3 3 3600 20070926115752 20070829115752 2854 example.com. AD1r+7exm2FOOkSqFvmoLt/VrovAYWd5Ouz9m5MxGlLFbTU2ja2Hupk=
4f3cnt8cu22tngec382jj4gde4rb46ub.example.com. NSEC3 1 1 18 - 4f3cnt8cu22tngec382jj4gde4rb87ub A RRSIG
4f3cnt8cu22tngec382jj4gde4rb46ub.example.com. NSEC3 1 1 0 - 4f3cnt8cu22tngec382jj4gde4rb48ub A MX RRSIG
4f3cnt8cu22tngec382jj4gde4rb46ub.example.com. NSEC3 1 1 19 - 4f3cnt8cu22tngec382jj4gde4rb87ub A RRSIG
4f3cnt8cu22tngec382jj4gde4rb46ub.example.com. 3600 IN RRSIG NSEC3 3 3 3600 20070926135752 20070829135752 2854 example.com. MCwCFDRwji51WCXJg7W/3+Jx586af5qgAhQPxHegtzu1I/QbvCNrOOON05N1rw== ;{id = 2854}
s1unhcti19bkdr98fegs0v46mbu3t4m2.example.com. NSEC3 1 1 18 - s1unhcti19bkdr98fegs0v46mbu3t4m4 A RRSIG
s1unhcti19bkdr98fegs0v46mbu3t4m2.example.com. NSEC3 1 1 19 - s1unhcti19bkdr98fegs0v46mbu3t4m4 A RRSIG
s1unhcti19bkdr98fegs0v46mbu3t4m2.example.com. NSEC3 1 1 20 00 s1unhcti19bkdr98fegs0v46mbu3t4m4 A RRSIG
s1unhcti19bkdr98fegs0v46mbu3t4m2.example.com. NSEC3 1 1 123 aabb00123456bbccdd s1unhcti19bkdr98fegs0v46mbu3t4m4 A MX RRSIG
s1unhcti19bkdr98fegs0v46mbu3t4m2.example.com. NSEC3 1 1 20 01 s1unhcti19bkdr98fegs0v46mbu3t4m4 A RRSIG
s1unhcti19bkdr98fegs0v46mbu3t4m2.example.com. NSEC3 1 1 20 02 s1unhcti19bkdr98fegs0v46mbu3t4m4 A RRSIG
s1unhcti19bkdr98fegs0v46mbu3t4m2.example.com. NSEC3 1 1 20 03 s1unhcti19bkdr98fegs0v46mbu3t4m4 A RRSIG
s1unhcti19bkdr98fegs0v46mbu3t4m2.example.com. 3600 IN RRSIG NSEC3 3 3 3600 20070926135752 20070829135752 2854 example.com. MCwCFDLy4GbR8ZaKHATVJGnGxzpsuq60AhQ1/pRbXi1ZbcYohzHgWzNC50fC5A== ;{id = 2854}
SECTION ADDITIONAL
ENTRY_END
SCENARIO_END
dnssecjava-1.1.3/src/test/resources/unbound/val_nx_nsec3_collision3.rpl 0000664 0000000 0000000 00000020517 13020541473 0026332 0 ustar 00root root 0000000 0000000 ; config options
; The island of trust is at example.com
server:
trust-anchor: "example.com. 3600 IN DS 2854 3 1 46e4ffc6e9a4793b488954bd3f0cc6af0dfb201b"
val-override-date: "20070916134226"
target-fetch-policy: "0 0 0 0 0"
stub-zone:
name: "."
stub-addr: 193.0.14.129 # K.ROOT-SERVERS.NET.
CONFIG_END
SCENARIO_BEGIN Test validator with nxdomain NSEC3 with a collision.
; K.ROOT-SERVERS.NET.
RANGE_BEGIN 0 100
ADDRESS 193.0.14.129
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
. IN NS
SECTION ANSWER
. IN NS K.ROOT-SERVERS.NET.
SECTION ADDITIONAL
K.ROOT-SERVERS.NET. IN A 193.0.14.129
ENTRY_END
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
www.example.com. IN A
SECTION AUTHORITY
com. IN NS a.gtld-servers.net.
SECTION ADDITIONAL
a.gtld-servers.net. IN A 192.5.6.30
ENTRY_END
RANGE_END
; a.gtld-servers.net.
RANGE_BEGIN 0 100
ADDRESS 192.5.6.30
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
com. IN NS
SECTION ANSWER
com. IN NS a.gtld-servers.net.
SECTION ADDITIONAL
a.gtld-servers.net. IN A 192.5.6.30
ENTRY_END
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
www.example.com. IN A
SECTION AUTHORITY
example.com. IN NS ns.example.com.
SECTION ADDITIONAL
ns.example.com. IN A 1.2.3.4
ENTRY_END
RANGE_END
; ns.example.com.
RANGE_BEGIN 0 100
ADDRESS 1.2.3.4
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
example.com. IN NS
SECTION ANSWER
example.com. IN NS ns.example.com.
example.com. 3600 IN RRSIG NS 3 2 3600 20070926134150 20070829134150 2854 example.com. MC0CFQCN+qHdJxoI/2tNKwsb08pra/G7aAIUAWA5sDdJTbrXA1/3OaesGBAO3sI= ;{id = 2854}
SECTION ADDITIONAL
ns.example.com. IN A 1.2.3.4
ns.example.com. 3600 IN RRSIG A 3 3 3600 20070926135752 20070829135752 2854 example.com. MC0CFQCMSWxVehgOQLoYclB9PIAbNP229AIUeH0vNNGJhjnZiqgIOKvs1EhzqAo= ;{id = 2854}
ENTRY_END
; response to DNSKEY priming query
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
example.com. IN DNSKEY
SECTION ANSWER
example.com. 3600 IN DNSKEY 256 3 3 ALXLUsWqUrY3JYER3T4TBJII s70j+sDS/UT2QRp61SE7S3E EXopNXoFE73JLRmvpi/UrOO/Vz4Se 6wXv/CYCKjGw06U4WRgR YXcpEhJROyNapmdIKSx hOzfLVE1gqA0PweZR8d tY3aNQSRn3sPpwJr6Mi /PqQKAMMrZ9ckJpf1+b QMOOvxgzz2U1GS18b3y ZKcgTMEaJzd/GZYzi/B N2DzQ0MsrSwYXfsNLFO Bbs8PJMW4LYIxeeOe6rUgkWOF 7CC9Dh/dduQ1QrsJhmZAEFfd6ByYV+ ;{id = 2854 (zsk), size = 1688b}
example.com. 3600 IN RRSIG DNSKEY 3 2 3600 20070926134802 20070829134802 2854 example.com. MCwCFG1yhRNtTEa3Eno2zhVVuy2EJX3wAhQeLyUp6+UXcpC5qGNu9tkrTEgPUg== ;{id = 2854}
SECTION AUTHORITY
example.com. IN NS ns.example.com.
example.com. 3600 IN RRSIG NS 3 2 3600 20070926134150 20070829134150 2854 example.com. MC0CFQCN+qHdJxoI/2tNKwsb08pra/G7aAIUAWA5sDdJTbrXA1/3OaesGBAO3sI= ;{id = 2854}
SECTION ADDITIONAL
ns.example.com. IN A 1.2.3.4
ns.example.com. 3600 IN RRSIG A 3 3 3600 20070926135752 20070829135752 2854 example.com. MC0CFQCMSWxVehgOQLoYclB9PIAbNP229AIUeH0vNNGJhjnZiqgIOKvs1EhzqAo= ;{id = 2854}
ENTRY_END
; response to query of interest
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NXDOMAIN
SECTION QUESTION
www.example.com. IN A
SECTION ANSWER
SECTION AUTHORITY
example.com. IN SOA ns.example.com. hostmaster.example.com. 2007090400 28800 7200 604800 18000
example.com. 3600 IN RRSIG SOA 3 2 3600 20070926134150 20070829134150 2854 example.com. MC0CFCNGZ+/OfElYQMCZ77O9Lw9rhk7PAhUAmDcvTAst6Bq83qPq3r6c/Dm1nFc= ;{id = 2854}
; some collisions added here. Say different chains are being signed
; and some colliding NSEC3 RRs are generated.
; closest encloser, H(example.com) = 6md8numosa4q9ugkffdo1bmm82t5j39s
; for 1 1 8 -
6md8numosa4q9ugkffdo1bmm82t5j39s.example.com. NSEC3 1 1 123 aabb00123456bbccdd 6md8numosa4q9ugkffdo1bmm82t5j49s A RRSIG
6md8numosa4q9ugkffdo1bmm82t5j39s.example.com. NSEC3 1 1 123 aabb00123456bbccde 6md8numosa4q9ugkffdo1bmm82t5j49s SOA NS MX DNSKEY RRSIG
6md8numosa4q9ugkffdo1bmm82t5j39s.example.com. 3600 IN RRSIG NSEC3 3 3 3600 20070926115752 20070829115752 2854 example.com. ACVnRA7g5H4x/BMgcw6xpoS9amkqcAVSQA0G+QC4G3eIyjBbIogvHic=
; wildcard denial, H(*.example.com.) = 4f3cnt8cu22tngec382jj4gde4rb47ub
; for 1 1 0 -
4f3cnt8cu22tngec382jj4gde4rb46ub.example.com. NSEC3 1 1 18 - 4f3cnt8cu22tngec382jj4gde4rb87ub A RRSIG
4f3cnt8cu22tngec382jj4gde4rb46ub.example.com. NSEC3 1 1 0 - 4f3cnt8cu22tngec382jj4gde4rb48ub A MX RRSIG
4f3cnt8cu22tngec382jj4gde4rb46ub.example.com. NSEC3 1 1 19 - 4f3cnt8cu22tngec382jj4gde4rb87ub A RRSIG
4f3cnt8cu22tngec382jj4gde4rb46ub.example.com. 3600 IN RRSIG NSEC3 3 3 3600 20070926135752 20070829135752 2854 example.com. MCwCFDRwji51WCXJg7W/3+Jx586af5qgAhQPxHegtzu1I/QbvCNrOOON05N1rw== ;{id = 2854}
; next closer name, H(www.example.com.) = s1unhcti19bkdr98fegs0v46mbu3t4m3.
; for 1 1 123 aaabb...
s1unhcti19bkdr98fegs0v46mbu3t4m2.example.com. NSEC3 1 1 18 - s1unhcti19bkdr98fegs0v46mbu3t4m4 A RRSIG
s1unhcti19bkdr98fegs0v46mbu3t4m2.example.com. NSEC3 1 1 19 - s1unhcti19bkdr98fegs0v46mbu3t4m4 A RRSIG
s1unhcti19bkdr98fegs0v46mbu3t4m2.example.com. NSEC3 1 1 20 00 s1unhcti19bkdr98fegs0v46mbu3t4m4 A RRSIG
s1unhcti19bkdr98fegs0v46mbu3t4m2.example.com. NSEC3 1 1 123 aabb00123456bbccdd s1unhcti19bkdr98fegs0v46mbu3t4m4 A MX RRSIG
s1unhcti19bkdr98fegs0v46mbu3t4m2.example.com. NSEC3 1 1 20 01 s1unhcti19bkdr98fegs0v46mbu3t4m4 A RRSIG
s1unhcti19bkdr98fegs0v46mbu3t4m2.example.com. NSEC3 1 1 20 02 s1unhcti19bkdr98fegs0v46mbu3t4m4 A RRSIG
s1unhcti19bkdr98fegs0v46mbu3t4m2.example.com. NSEC3 1 1 20 03 s1unhcti19bkdr98fegs0v46mbu3t4m4 A RRSIG
s1unhcti19bkdr98fegs0v46mbu3t4m2.example.com. 3600 IN RRSIG NSEC3 3 3 3600 20070926135752 20070829135752 2854 example.com. MCwCFDLy4GbR8ZaKHATVJGnGxzpsuq60AhQ1/pRbXi1ZbcYohzHgWzNC50fC5A== ;{id = 2854}
ENTRY_END
RANGE_END
STEP 1 QUERY
ENTRY_BEGIN
REPLY RD DO
SECTION QUESTION
www.example.com. IN A
ENTRY_END
; recursion happens here.
STEP 10 CHECK_ANSWER
ENTRY_BEGIN
MATCH all
REPLY QR RD RA NXDOMAIN
SECTION QUESTION
www.example.com. IN A
SECTION ANSWER
SECTION AUTHORITY
example.com. IN SOA ns.example.com. hostmaster.example.com. 2007090400 28800 7200 604800 18000
example.com. 3600 IN RRSIG SOA 3 2 3600 20070926134150 20070829134150 2854 example.com. MC0CFCNGZ+/OfElYQMCZ77O9Lw9rhk7PAhUAmDcvTAst6Bq83qPq3r6c/Dm1nFc= ;{id = 2854}
6md8numosa4q9ugkffdo1bmm82t5j39s.example.com. NSEC3 1 1 123 aabb00123456bbccdd 6md8numosa4q9ugkffdo1bmm82t5j49s A RRSIG
6md8numosa4q9ugkffdo1bmm82t5j39s.example.com. NSEC3 1 1 123 aabb00123456bbccde 6md8numosa4q9ugkffdo1bmm82t5j49s SOA NS MX DNSKEY RRSIG
6md8numosa4q9ugkffdo1bmm82t5j39s.example.com. 3600 IN RRSIG NSEC3 3 3 3600 20070926115752 20070829115752 2854 example.com. ACVnRA7g5H4x/BMgcw6xpoS9amkqcAVSQA0G+QC4G3eIyjBbIogvHic=
4f3cnt8cu22tngec382jj4gde4rb46ub.example.com. NSEC3 1 1 18 - 4f3cnt8cu22tngec382jj4gde4rb87ub A RRSIG
4f3cnt8cu22tngec382jj4gde4rb46ub.example.com. NSEC3 1 1 0 - 4f3cnt8cu22tngec382jj4gde4rb48ub A MX RRSIG
4f3cnt8cu22tngec382jj4gde4rb46ub.example.com. NSEC3 1 1 19 - 4f3cnt8cu22tngec382jj4gde4rb87ub A RRSIG
4f3cnt8cu22tngec382jj4gde4rb46ub.example.com. 3600 IN RRSIG NSEC3 3 3 3600 20070926135752 20070829135752 2854 example.com. MCwCFDRwji51WCXJg7W/3+Jx586af5qgAhQPxHegtzu1I/QbvCNrOOON05N1rw== ;{id = 2854}
s1unhcti19bkdr98fegs0v46mbu3t4m2.example.com. NSEC3 1 1 18 - s1unhcti19bkdr98fegs0v46mbu3t4m4 A RRSIG
s1unhcti19bkdr98fegs0v46mbu3t4m2.example.com. NSEC3 1 1 19 - s1unhcti19bkdr98fegs0v46mbu3t4m4 A RRSIG
s1unhcti19bkdr98fegs0v46mbu3t4m2.example.com. NSEC3 1 1 20 00 s1unhcti19bkdr98fegs0v46mbu3t4m4 A RRSIG
s1unhcti19bkdr98fegs0v46mbu3t4m2.example.com. NSEC3 1 1 123 aabb00123456bbccdd s1unhcti19bkdr98fegs0v46mbu3t4m4 A MX RRSIG
s1unhcti19bkdr98fegs0v46mbu3t4m2.example.com. NSEC3 1 1 20 01 s1unhcti19bkdr98fegs0v46mbu3t4m4 A RRSIG
s1unhcti19bkdr98fegs0v46mbu3t4m2.example.com. NSEC3 1 1 20 02 s1unhcti19bkdr98fegs0v46mbu3t4m4 A RRSIG
s1unhcti19bkdr98fegs0v46mbu3t4m2.example.com. NSEC3 1 1 20 03 s1unhcti19bkdr98fegs0v46mbu3t4m4 A RRSIG
s1unhcti19bkdr98fegs0v46mbu3t4m2.example.com. 3600 IN RRSIG NSEC3 3 3 3600 20070926135752 20070829135752 2854 example.com. MCwCFDLy4GbR8ZaKHATVJGnGxzpsuq60AhQ1/pRbXi1ZbcYohzHgWzNC50fC5A== ;{id = 2854}
SECTION ADDITIONAL
ENTRY_END
SCENARIO_END
dnssecjava-1.1.3/src/test/resources/unbound/val_nx_nsec3_collision4.rpl 0000664 0000000 0000000 00000020523 13020541473 0026330 0 ustar 00root root 0000000 0000000 ; config options
; The island of trust is at example.com
server:
trust-anchor: "example.com. 3600 IN DS 2854 3 1 46e4ffc6e9a4793b488954bd3f0cc6af0dfb201b"
val-override-date: "20070916134226"
target-fetch-policy: "0 0 0 0 0"
stub-zone:
name: "."
stub-addr: 193.0.14.129 # K.ROOT-SERVERS.NET.
CONFIG_END
SCENARIO_BEGIN Test validator with nxdomain NSEC3 with a collision.
; K.ROOT-SERVERS.NET.
RANGE_BEGIN 0 100
ADDRESS 193.0.14.129
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
. IN NS
SECTION ANSWER
. IN NS K.ROOT-SERVERS.NET.
SECTION ADDITIONAL
K.ROOT-SERVERS.NET. IN A 193.0.14.129
ENTRY_END
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
www.example.com. IN A
SECTION AUTHORITY
com. IN NS a.gtld-servers.net.
SECTION ADDITIONAL
a.gtld-servers.net. IN A 192.5.6.30
ENTRY_END
RANGE_END
; a.gtld-servers.net.
RANGE_BEGIN 0 100
ADDRESS 192.5.6.30
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
com. IN NS
SECTION ANSWER
com. IN NS a.gtld-servers.net.
SECTION ADDITIONAL
a.gtld-servers.net. IN A 192.5.6.30
ENTRY_END
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
www.example.com. IN A
SECTION AUTHORITY
example.com. IN NS ns.example.com.
SECTION ADDITIONAL
ns.example.com. IN A 1.2.3.4
ENTRY_END
RANGE_END
; ns.example.com.
RANGE_BEGIN 0 100
ADDRESS 1.2.3.4
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
example.com. IN NS
SECTION ANSWER
example.com. IN NS ns.example.com.
example.com. 3600 IN RRSIG NS 3 2 3600 20070926134150 20070829134150 2854 example.com. MC0CFQCN+qHdJxoI/2tNKwsb08pra/G7aAIUAWA5sDdJTbrXA1/3OaesGBAO3sI= ;{id = 2854}
SECTION ADDITIONAL
ns.example.com. IN A 1.2.3.4
ns.example.com. 3600 IN RRSIG A 3 3 3600 20070926135752 20070829135752 2854 example.com. MC0CFQCMSWxVehgOQLoYclB9PIAbNP229AIUeH0vNNGJhjnZiqgIOKvs1EhzqAo= ;{id = 2854}
ENTRY_END
; response to DNSKEY priming query
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
example.com. IN DNSKEY
SECTION ANSWER
example.com. 3600 IN DNSKEY 256 3 3 ALXLUsWqUrY3JYER3T4TBJII s70j+sDS/UT2QRp61SE7S3E EXopNXoFE73JLRmvpi/UrOO/Vz4Se 6wXv/CYCKjGw06U4WRgR YXcpEhJROyNapmdIKSx hOzfLVE1gqA0PweZR8d tY3aNQSRn3sPpwJr6Mi /PqQKAMMrZ9ckJpf1+b QMOOvxgzz2U1GS18b3y ZKcgTMEaJzd/GZYzi/B N2DzQ0MsrSwYXfsNLFO Bbs8PJMW4LYIxeeOe6rUgkWOF 7CC9Dh/dduQ1QrsJhmZAEFfd6ByYV+ ;{id = 2854 (zsk), size = 1688b}
example.com. 3600 IN RRSIG DNSKEY 3 2 3600 20070926134802 20070829134802 2854 example.com. MCwCFG1yhRNtTEa3Eno2zhVVuy2EJX3wAhQeLyUp6+UXcpC5qGNu9tkrTEgPUg== ;{id = 2854}
SECTION AUTHORITY
example.com. IN NS ns.example.com.
example.com. 3600 IN RRSIG NS 3 2 3600 20070926134150 20070829134150 2854 example.com. MC0CFQCN+qHdJxoI/2tNKwsb08pra/G7aAIUAWA5sDdJTbrXA1/3OaesGBAO3sI= ;{id = 2854}
SECTION ADDITIONAL
ns.example.com. IN A 1.2.3.4
ns.example.com. 3600 IN RRSIG A 3 3 3600 20070926135752 20070829135752 2854 example.com. MC0CFQCMSWxVehgOQLoYclB9PIAbNP229AIUeH0vNNGJhjnZiqgIOKvs1EhzqAo= ;{id = 2854}
ENTRY_END
; response to query of interest
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NXDOMAIN
SECTION QUESTION
www.example.com. IN A
SECTION ANSWER
SECTION AUTHORITY
example.com. IN SOA ns.example.com. hostmaster.example.com. 2007090400 28800 7200 604800 18000
example.com. 3600 IN RRSIG SOA 3 2 3600 20070926134150 20070829134150 2854 example.com. MC0CFCNGZ+/OfElYQMCZ77O9Lw9rhk7PAhUAmDcvTAst6Bq83qPq3r6c/Dm1nFc= ;{id = 2854}
; some collisions added here. Say different chains are being signed
; and some colliding NSEC3 RRs are generated.
; closest encloser, H(example.com) = 6md8numosa4q9ugkffdo1bmm82t5j39s
; for 1 1 8 -
6md8numosa4q9ugkffdo1bmm82t5j39s.example.com. NSEC3 1 1 123 aabb00123456bbccdd 6md8numosa4q9ugkffdo1bmm82t5j49s A RRSIG
6md8numosa4q9ugkffdo1bmm82t5j39s.example.com. NSEC3 255 1 123 aabb00123456bbccde 6md8numosa4q9ugkffdo1bmm82t5j49s SOA NS MX DNSKEY RRSIG
6md8numosa4q9ugkffdo1bmm82t5j39s.example.com. 3600 IN RRSIG NSEC3 3 3 3600 20070926115752 20070829115752 2854 example.com. AD8aB+T5nfcJUatP7WxLgUMzwByVMnTWY2T5ZDPKZri011kQC3lt7qQ=
; wildcard denial, H(*.example.com.) = 4f3cnt8cu22tngec382jj4gde4rb47ub
; for 1 1 0 -
4f3cnt8cu22tngec382jj4gde4rb46ub.example.com. NSEC3 1 1 18 - 4f3cnt8cu22tngec382jj4gde4rb87ub A RRSIG
4f3cnt8cu22tngec382jj4gde4rb46ub.example.com. NSEC3 1 1 0 - 4f3cnt8cu22tngec382jj4gde4rb48ub A MX RRSIG
4f3cnt8cu22tngec382jj4gde4rb46ub.example.com. NSEC3 1 1 19 - 4f3cnt8cu22tngec382jj4gde4rb87ub A RRSIG
4f3cnt8cu22tngec382jj4gde4rb46ub.example.com. 3600 IN RRSIG NSEC3 3 3 3600 20070926135752 20070829135752 2854 example.com. MCwCFDRwji51WCXJg7W/3+Jx586af5qgAhQPxHegtzu1I/QbvCNrOOON05N1rw== ;{id = 2854}
; next closer name, H(www.example.com.) = s1unhcti19bkdr98fegs0v46mbu3t4m3.
; for 1 1 123 aaabb...
s1unhcti19bkdr98fegs0v46mbu3t4m2.example.com. NSEC3 1 1 18 - s1unhcti19bkdr98fegs0v46mbu3t4m4 A RRSIG
s1unhcti19bkdr98fegs0v46mbu3t4m2.example.com. NSEC3 1 1 19 - s1unhcti19bkdr98fegs0v46mbu3t4m4 A RRSIG
s1unhcti19bkdr98fegs0v46mbu3t4m2.example.com. NSEC3 1 1 20 00 s1unhcti19bkdr98fegs0v46mbu3t4m4 A RRSIG
s1unhcti19bkdr98fegs0v46mbu3t4m2.example.com. NSEC3 1 1 123 aabb00123456bbccdd s1unhcti19bkdr98fegs0v46mbu3t4m4 A MX RRSIG
s1unhcti19bkdr98fegs0v46mbu3t4m2.example.com. NSEC3 1 1 20 01 s1unhcti19bkdr98fegs0v46mbu3t4m4 A RRSIG
s1unhcti19bkdr98fegs0v46mbu3t4m2.example.com. NSEC3 1 1 20 02 s1unhcti19bkdr98fegs0v46mbu3t4m4 A RRSIG
s1unhcti19bkdr98fegs0v46mbu3t4m2.example.com. NSEC3 1 1 20 03 s1unhcti19bkdr98fegs0v46mbu3t4m4 A RRSIG
s1unhcti19bkdr98fegs0v46mbu3t4m2.example.com. 3600 IN RRSIG NSEC3 3 3 3600 20070926135752 20070829135752 2854 example.com. MCwCFDLy4GbR8ZaKHATVJGnGxzpsuq60AhQ1/pRbXi1ZbcYohzHgWzNC50fC5A== ;{id = 2854}
ENTRY_END
RANGE_END
STEP 1 QUERY
ENTRY_BEGIN
REPLY RD DO
SECTION QUESTION
www.example.com. IN A
ENTRY_END
; recursion happens here.
STEP 10 CHECK_ANSWER
ENTRY_BEGIN
MATCH all
REPLY QR RD RA NXDOMAIN
SECTION QUESTION
www.example.com. IN A
SECTION ANSWER
SECTION AUTHORITY
example.com. IN SOA ns.example.com. hostmaster.example.com. 2007090400 28800 7200 604800 18000
example.com. 3600 IN RRSIG SOA 3 2 3600 20070926134150 20070829134150 2854 example.com. MC0CFCNGZ+/OfElYQMCZ77O9Lw9rhk7PAhUAmDcvTAst6Bq83qPq3r6c/Dm1nFc= ;{id = 2854}
6md8numosa4q9ugkffdo1bmm82t5j39s.example.com. NSEC3 1 1 123 aabb00123456bbccdd 6md8numosa4q9ugkffdo1bmm82t5j49s A RRSIG
6md8numosa4q9ugkffdo1bmm82t5j39s.example.com. NSEC3 255 1 123 aabb00123456bbccde 6md8numosa4q9ugkffdo1bmm82t5j49s SOA NS MX DNSKEY RRSIG
6md8numosa4q9ugkffdo1bmm82t5j39s.example.com. 3600 IN RRSIG NSEC3 3 3 3600 20070926115752 20070829115752 2854 example.com. AD8aB+T5nfcJUatP7WxLgUMzwByVMnTWY2T5ZDPKZri011kQC3lt7qQ=
4f3cnt8cu22tngec382jj4gde4rb46ub.example.com. NSEC3 1 1 18 - 4f3cnt8cu22tngec382jj4gde4rb87ub A RRSIG
4f3cnt8cu22tngec382jj4gde4rb46ub.example.com. NSEC3 1 1 0 - 4f3cnt8cu22tngec382jj4gde4rb48ub A MX RRSIG
4f3cnt8cu22tngec382jj4gde4rb46ub.example.com. NSEC3 1 1 19 - 4f3cnt8cu22tngec382jj4gde4rb87ub A RRSIG
4f3cnt8cu22tngec382jj4gde4rb46ub.example.com. 3600 IN RRSIG NSEC3 3 3 3600 20070926135752 20070829135752 2854 example.com. MCwCFDRwji51WCXJg7W/3+Jx586af5qgAhQPxHegtzu1I/QbvCNrOOON05N1rw== ;{id = 2854}
s1unhcti19bkdr98fegs0v46mbu3t4m2.example.com. NSEC3 1 1 18 - s1unhcti19bkdr98fegs0v46mbu3t4m4 A RRSIG
s1unhcti19bkdr98fegs0v46mbu3t4m2.example.com. NSEC3 1 1 19 - s1unhcti19bkdr98fegs0v46mbu3t4m4 A RRSIG
s1unhcti19bkdr98fegs0v46mbu3t4m2.example.com. NSEC3 1 1 20 00 s1unhcti19bkdr98fegs0v46mbu3t4m4 A RRSIG
s1unhcti19bkdr98fegs0v46mbu3t4m2.example.com. NSEC3 1 1 123 aabb00123456bbccdd s1unhcti19bkdr98fegs0v46mbu3t4m4 A MX RRSIG
s1unhcti19bkdr98fegs0v46mbu3t4m2.example.com. NSEC3 1 1 20 01 s1unhcti19bkdr98fegs0v46mbu3t4m4 A RRSIG
s1unhcti19bkdr98fegs0v46mbu3t4m2.example.com. NSEC3 1 1 20 02 s1unhcti19bkdr98fegs0v46mbu3t4m4 A RRSIG
s1unhcti19bkdr98fegs0v46mbu3t4m2.example.com. NSEC3 1 1 20 03 s1unhcti19bkdr98fegs0v46mbu3t4m4 A RRSIG
s1unhcti19bkdr98fegs0v46mbu3t4m2.example.com. 3600 IN RRSIG NSEC3 3 3 3600 20070926135752 20070829135752 2854 example.com. MCwCFDLy4GbR8ZaKHATVJGnGxzpsuq60AhQ1/pRbXi1ZbcYohzHgWzNC50fC5A== ;{id = 2854}
SECTION ADDITIONAL
ENTRY_END
SCENARIO_END
dnssecjava-1.1.3/src/test/resources/unbound/val_nx_nsec3_hashalg.rpl 0000664 0000000 0000000 00000014412 13020541473 0025660 0 ustar 00root root 0000000 0000000 ; config options
; The island of trust is at example.com
server:
trust-anchor: "example.com. 3600 IN DS 2854 3 1 46e4ffc6e9a4793b488954bd3f0cc6af0dfb201b"
val-override-date: "20070916134226"
target-fetch-policy: "0 0 0 0 0"
stub-zone:
name: "."
stub-addr: 193.0.14.129 # K.ROOT-SERVERS.NET.
CONFIG_END
SCENARIO_BEGIN Test validator with unknown NSEC3 hash algorithm.
; K.ROOT-SERVERS.NET.
RANGE_BEGIN 0 100
ADDRESS 193.0.14.129
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
. IN NS
SECTION ANSWER
. IN NS K.ROOT-SERVERS.NET.
SECTION ADDITIONAL
K.ROOT-SERVERS.NET. IN A 193.0.14.129
ENTRY_END
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
www.example.com. IN A
SECTION AUTHORITY
com. IN NS a.gtld-servers.net.
SECTION ADDITIONAL
a.gtld-servers.net. IN A 192.5.6.30
ENTRY_END
RANGE_END
; a.gtld-servers.net.
RANGE_BEGIN 0 100
ADDRESS 192.5.6.30
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
com. IN NS
SECTION ANSWER
com. IN NS a.gtld-servers.net.
SECTION ADDITIONAL
a.gtld-servers.net. IN A 192.5.6.30
ENTRY_END
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
www.example.com. IN A
SECTION AUTHORITY
example.com. IN NS ns.example.com.
SECTION ADDITIONAL
ns.example.com. IN A 1.2.3.4
ENTRY_END
RANGE_END
; ns.example.com.
RANGE_BEGIN 0 100
ADDRESS 1.2.3.4
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
example.com. IN NS
SECTION ANSWER
example.com. IN NS ns.example.com.
example.com. 3600 IN RRSIG NS 3 2 3600 20070926134150 20070829134150 2854 example.com. MC0CFQCN+qHdJxoI/2tNKwsb08pra/G7aAIUAWA5sDdJTbrXA1/3OaesGBAO3sI= ;{id = 2854}
SECTION ADDITIONAL
ns.example.com. IN A 1.2.3.4
ns.example.com. 3600 IN RRSIG A 3 3 3600 20070926135752 20070829135752 2854 example.com. MC0CFQCMSWxVehgOQLoYclB9PIAbNP229AIUeH0vNNGJhjnZiqgIOKvs1EhzqAo= ;{id = 2854}
ENTRY_END
; response to DNSKEY priming query
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
example.com. IN DNSKEY
SECTION ANSWER
example.com. 3600 IN DNSKEY 256 3 3 ALXLUsWqUrY3JYER3T4TBJII s70j+sDS/UT2QRp61SE7S3E EXopNXoFE73JLRmvpi/UrOO/Vz4Se 6wXv/CYCKjGw06U4WRgR YXcpEhJROyNapmdIKSx hOzfLVE1gqA0PweZR8d tY3aNQSRn3sPpwJr6Mi /PqQKAMMrZ9ckJpf1+b QMOOvxgzz2U1GS18b3y ZKcgTMEaJzd/GZYzi/B N2DzQ0MsrSwYXfsNLFO Bbs8PJMW4LYIxeeOe6rUgkWOF 7CC9Dh/dduQ1QrsJhmZAEFfd6ByYV+ ;{id = 2854 (zsk), size = 1688b}
example.com. 3600 IN RRSIG DNSKEY 3 2 3600 20070926134802 20070829134802 2854 example.com. MCwCFG1yhRNtTEa3Eno2zhVVuy2EJX3wAhQeLyUp6+UXcpC5qGNu9tkrTEgPUg== ;{id = 2854}
SECTION AUTHORITY
example.com. IN NS ns.example.com.
example.com. 3600 IN RRSIG NS 3 2 3600 20070926134150 20070829134150 2854 example.com. MC0CFQCN+qHdJxoI/2tNKwsb08pra/G7aAIUAWA5sDdJTbrXA1/3OaesGBAO3sI= ;{id = 2854}
SECTION ADDITIONAL
ns.example.com. IN A 1.2.3.4
ns.example.com. 3600 IN RRSIG A 3 3 3600 20070926135752 20070829135752 2854 example.com. MC0CFQCMSWxVehgOQLoYclB9PIAbNP229AIUeH0vNNGJhjnZiqgIOKvs1EhzqAo= ;{id = 2854}
ENTRY_END
; response to query of interest
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NXDOMAIN
SECTION QUESTION
www.example.com. IN A
SECTION ANSWER
SECTION AUTHORITY
example.com. IN SOA ns.example.com. hostmaster.example.com. 2007090400 28800 7200 604800 18000
example.com. 3600 IN RRSIG SOA 3 2 3600 20070926134150 20070829134150 2854 example.com. MC0CFCNGZ+/OfElYQMCZ77O9Lw9rhk7PAhUAmDcvTAst6Bq83qPq3r6c/Dm1nFc= ;{id = 2854}
; closest encloser, H(example.com).
6md8numosa4q9ugkffdo1bmm82t5j39s.example.com. 3600 IN NSEC3 255 1 8 - 6md8numosa4q9ugkffdo1bmm82t5j49s SOA NS MX DNSKEY RRSIG
6md8numosa4q9ugkffdo1bmm82t5j39s.example.com. 3600 IN RRSIG NSEC3 3 3 3600 20070926115752 20070829115752 2854 example.com. AAjRJ6G5VolBi6wQ8fO1gzgDZTEAPVLPc0YhnDLLNfl1hYxJVyLqd6A=
; wildcard denial, H(*.example.com.) = 4f3cnt8cu22tngec382jj4gde4rb47ub
4f3cnt8cu22tngec382jj4gde4rb46ub.example.com. NSEC3 1 1 0 - 4f3cnt8cu22tngec382jj4gde4rb48ub A MX RRSIG
4f3cnt8cu22tngec382jj4gde4rb46ub.example.com. 3600 IN RRSIG NSEC3 3 3 3600 20070926135752 20070829135752 2854 example.com. MCwCFHS+i/OB/V/gYmS1eQTXieXIXGjsAhQQ0Ql7TW/hsUklrb0DfoyhVPG95Q== ;{id = 2854}
; next closer name, H(www.example.com.) = s1unhcti19bkdr98fegs0v46mbu3t4m3.
s1unhcti19bkdr98fegs0v46mbu3t4m2.example.com. NSEC3 1 1 123 aabb00123456bbccdd s1unhcti19bkdr98fegs0v46mbu3t4m4 A MX RRSIG
s1unhcti19bkdr98fegs0v46mbu3t4m2.example.com. 3600 IN RRSIG NSEC3 3 3 3600 20070926135752 20070829135752 2854 example.com. MC0CFFSH4klZKke48dYyddYDj17gjTS0AhUAltWicpFLWqW98/Af9Qlx70MH8o4= ;{id = 2854}
ENTRY_END
RANGE_END
STEP 1 QUERY
ENTRY_BEGIN
REPLY RD DO
SECTION QUESTION
www.example.com. IN A
ENTRY_END
; recursion happens here.
STEP 10 CHECK_ANSWER
ENTRY_BEGIN
MATCH all
REPLY QR RD RA NXDOMAIN
SECTION QUESTION
www.example.com. IN A
SECTION ANSWER
SECTION AUTHORITY
example.com. IN SOA ns.example.com. hostmaster.example.com. 2007090400 28800 7200 604800 18000
example.com. 3600 IN RRSIG SOA 3 2 3600 20070926134150 20070829134150 2854 example.com. MC0CFCNGZ+/OfElYQMCZ77O9Lw9rhk7PAhUAmDcvTAst6Bq83qPq3r6c/Dm1nFc= ;{id = 2854}
6md8numosa4q9ugkffdo1bmm82t5j39s.example.com. 3600 IN NSEC3 255 1 8 - 6md8numosa4q9ugkffdo1bmm82t5j49s SOA NS MX DNSKEY RRSIG
6md8numosa4q9ugkffdo1bmm82t5j39s.example.com. 3600 IN RRSIG NSEC3 3 3 3600 20070926115752 20070829115752 2854 example.com. AAjRJ6G5VolBi6wQ8fO1gzgDZTEAPVLPc0YhnDLLNfl1hYxJVyLqd6A=
4f3cnt8cu22tngec382jj4gde4rb46ub.example.com. NSEC3 1 1 0 - 4f3cnt8cu22tngec382jj4gde4rb48ub A MX RRSIG
4f3cnt8cu22tngec382jj4gde4rb46ub.example.com. 3600 IN RRSIG NSEC3 3 3 3600 20070926135752 20070829135752 2854 example.com. MCwCFHS+i/OB/V/gYmS1eQTXieXIXGjsAhQQ0Ql7TW/hsUklrb0DfoyhVPG95Q== ;{id = 2854}
s1unhcti19bkdr98fegs0v46mbu3t4m2.example.com. NSEC3 1 1 123 aabb00123456bbccdd s1unhcti19bkdr98fegs0v46mbu3t4m4 A MX RRSIG
s1unhcti19bkdr98fegs0v46mbu3t4m2.example.com. 3600 IN RRSIG NSEC3 3 3 3600 20070926135752 20070829135752 2854 example.com. MC0CFFSH4klZKke48dYyddYDj17gjTS0AhUAltWicpFLWqW98/Af9Qlx70MH8o4= ;{id = 2854}
SECTION ADDITIONAL
ENTRY_END
SCENARIO_END
dnssecjava-1.1.3/src/test/resources/unbound/val_nx_nsec3_nsecmix.rpl 0000664 0000000 0000000 00000015561 13020541473 0025725 0 ustar 00root root 0000000 0000000 ; config options
; The island of trust is at example.com
server:
trust-anchor: "example.com. 3600 IN DS 2854 3 1 46e4ffc6e9a4793b488954bd3f0cc6af0dfb201b"
val-override-date: "20070916134226"
target-fetch-policy: "0 0 0 0 0"
stub-zone:
name: "."
stub-addr: 193.0.14.129 # K.ROOT-SERVERS.NET.
CONFIG_END
SCENARIO_BEGIN Test validator with NSEC3 responses that has an NSEC mixed in.
; K.ROOT-SERVERS.NET.
RANGE_BEGIN 0 100
ADDRESS 193.0.14.129
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
. IN NS
SECTION ANSWER
. IN NS K.ROOT-SERVERS.NET.
SECTION ADDITIONAL
K.ROOT-SERVERS.NET. IN A 193.0.14.129
ENTRY_END
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
www.example.com. IN A
SECTION AUTHORITY
com. IN NS a.gtld-servers.net.
SECTION ADDITIONAL
a.gtld-servers.net. IN A 192.5.6.30
ENTRY_END
RANGE_END
; a.gtld-servers.net.
RANGE_BEGIN 0 100
ADDRESS 192.5.6.30
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
com. IN NS
SECTION ANSWER
com. IN NS a.gtld-servers.net.
SECTION ADDITIONAL
a.gtld-servers.net. IN A 192.5.6.30
ENTRY_END
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
www.example.com. IN A
SECTION AUTHORITY
example.com. IN NS ns.example.com.
SECTION ADDITIONAL
ns.example.com. IN A 1.2.3.4
ENTRY_END
RANGE_END
; ns.example.com.
RANGE_BEGIN 0 100
ADDRESS 1.2.3.4
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
example.com. IN NS
SECTION ANSWER
example.com. IN NS ns.example.com.
example.com. 3600 IN RRSIG NS 3 2 3600 20070926134150 20070829134150 2854 example.com. MC0CFQCN+qHdJxoI/2tNKwsb08pra/G7aAIUAWA5sDdJTbrXA1/3OaesGBAO3sI= ;{id = 2854}
SECTION ADDITIONAL
ns.example.com. IN A 1.2.3.4
ns.example.com. 3600 IN RRSIG A 3 3 3600 20070926135752 20070829135752 2854 example.com. MC0CFQCMSWxVehgOQLoYclB9PIAbNP229AIUeH0vNNGJhjnZiqgIOKvs1EhzqAo= ;{id = 2854}
ENTRY_END
; response to DNSKEY priming query
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
example.com. IN DNSKEY
SECTION ANSWER
example.com. 3600 IN DNSKEY 256 3 3 ALXLUsWqUrY3JYER3T4TBJII s70j+sDS/UT2QRp61SE7S3E EXopNXoFE73JLRmvpi/UrOO/Vz4Se 6wXv/CYCKjGw06U4WRgR YXcpEhJROyNapmdIKSx hOzfLVE1gqA0PweZR8d tY3aNQSRn3sPpwJr6Mi /PqQKAMMrZ9ckJpf1+b QMOOvxgzz2U1GS18b3y ZKcgTMEaJzd/GZYzi/B N2DzQ0MsrSwYXfsNLFO Bbs8PJMW4LYIxeeOe6rUgkWOF 7CC9Dh/dduQ1QrsJhmZAEFfd6ByYV+ ;{id = 2854 (zsk), size = 1688b}
example.com. 3600 IN RRSIG DNSKEY 3 2 3600 20070926134802 20070829134802 2854 example.com. MCwCFG1yhRNtTEa3Eno2zhVVuy2EJX3wAhQeLyUp6+UXcpC5qGNu9tkrTEgPUg== ;{id = 2854}
SECTION AUTHORITY
example.com. IN NS ns.example.com.
example.com. 3600 IN RRSIG NS 3 2 3600 20070926134150 20070829134150 2854 example.com. MC0CFQCN+qHdJxoI/2tNKwsb08pra/G7aAIUAWA5sDdJTbrXA1/3OaesGBAO3sI= ;{id = 2854}
SECTION ADDITIONAL
ns.example.com. IN A 1.2.3.4
ns.example.com. 3600 IN RRSIG A 3 3 3600 20070926135752 20070829135752 2854 example.com. MC0CFQCMSWxVehgOQLoYclB9PIAbNP229AIUeH0vNNGJhjnZiqgIOKvs1EhzqAo= ;{id = 2854}
ENTRY_END
; response to query of interest
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NXDOMAIN
SECTION QUESTION
www.example.com. IN A
SECTION ANSWER
SECTION AUTHORITY
example.com. IN SOA ns.example.com. hostmaster.example.com. 2007090400 28800 7200 604800 18000
example.com. 3600 IN RRSIG SOA 3 2 3600 20070926134150 20070829134150 2854 example.com. MC0CFCNGZ+/OfElYQMCZ77O9Lw9rhk7PAhUAmDcvTAst6Bq83qPq3r6c/Dm1nFc= ;{id = 2854}
wab.example.com. IN NSEC wzz.example.com. A NSEC RRSIG
wab.example.com. 3600 IN RRSIG NSEC 3 3 3600 20070926134150 20070829134150 2854 example.com. MC0CFG5DZSEIZC088rjcB1e6sQx8nQz4AhUAtQ09tP1YYLJkhL/Wg1KV2pW4Ivk= ;{id = 2854}
; NSEC3
; closest encloser, H(example.com).
6md8numosa4q9ugkffdo1bmm82t5j39s.example.com. NSEC3 1 1 8 - 6md8numosa4q9ugkffdo1bmm82t5j49s SOA NS MX DNSKEY RRSIG
6md8numosa4q9ugkffdo1bmm82t5j39s.example.com. 3600 IN RRSIG NSEC3 3 3 3600 20070926135752 20070829135752 2854 example.com. MC0CFQCz/LkFOFcaQzVnyySW9ZoVUnxh7gIUdxyS9vqVDzo8pGhFU+3YogN2ZRk= ;{id = 2854}
; wildcard denial, H(*.example.com.) = 4f3cnt8cu22tngec382jj4gde4rb47ub
4f3cnt8cu22tngec382jj4gde4rb46ub.example.com. NSEC3 1 1 0 - 4f3cnt8cu22tngec382jj4gde4rb48ub A MX RRSIG
4f3cnt8cu22tngec382jj4gde4rb46ub.example.com. 3600 IN RRSIG NSEC3 3 3 3600 20070926135752 20070829135752 2854 example.com. MCwCFHS+i/OB/V/gYmS1eQTXieXIXGjsAhQQ0Ql7TW/hsUklrb0DfoyhVPG95Q== ;{id = 2854}
; next closer name, H(www.example.com.) = s1unhcti19bkdr98fegs0v46mbu3t4m3.
s1unhcti19bkdr98fegs0v46mbu3t4m2.example.com. NSEC3 1 1 123 aabb00123456bbccdd s1unhcti19bkdr98fegs0v46mbu3t4m4 A MX RRSIG
s1unhcti19bkdr98fegs0v46mbu3t4m2.example.com. 3600 IN RRSIG NSEC3 3 3 3600 20070926135752 20070829135752 2854 example.com. MC0CFFSH4klZKke48dYyddYDj17gjTS0AhUAltWicpFLWqW98/Af9Qlx70MH8o4= ;{id = 2854}
ENTRY_END
RANGE_END
STEP 1 QUERY
ENTRY_BEGIN
REPLY RD DO
SECTION QUESTION
www.example.com. IN A
ENTRY_END
; recursion happens here.
STEP 10 CHECK_ANSWER
ENTRY_BEGIN
MATCH all
REPLY QR RD RA NXDOMAIN
SECTION QUESTION
www.example.com. IN A
SECTION ANSWER
SECTION AUTHORITY
example.com. IN SOA ns.example.com. hostmaster.example.com. 2007090400 28800 7200 604800 18000
example.com. 3600 IN RRSIG SOA 3 2 3600 20070926134150 20070829134150 2854 example.com. MC0CFCNGZ+/OfElYQMCZ77O9Lw9rhk7PAhUAmDcvTAst6Bq83qPq3r6c/Dm1nFc= ;{id = 2854}
wab.example.com. IN NSEC wzz.example.com. A NSEC RRSIG
wab.example.com. 3600 IN RRSIG NSEC 3 3 3600 20070926134150 20070829134150 2854 example.com. MC0CFG5DZSEIZC088rjcB1e6sQx8nQz4AhUAtQ09tP1YYLJkhL/Wg1KV2pW4Ivk= ;{id = 2854}
6md8numosa4q9ugkffdo1bmm82t5j39s.example.com. NSEC3 1 1 8 - 6md8numosa4q9ugkffdo1bmm82t5j49s SOA NS MX DNSKEY RRSIG
6md8numosa4q9ugkffdo1bmm82t5j39s.example.com. 3600 IN RRSIG NSEC3 3 3 3600 20070926135752 20070829135752 2854 example.com. MC0CFQCz/LkFOFcaQzVnyySW9ZoVUnxh7gIUdxyS9vqVDzo8pGhFU+3YogN2ZRk= ;{id = 2854}
4f3cnt8cu22tngec382jj4gde4rb46ub.example.com. NSEC3 1 1 0 - 4f3cnt8cu22tngec382jj4gde4rb48ub A MX RRSIG
4f3cnt8cu22tngec382jj4gde4rb46ub.example.com. 3600 IN RRSIG NSEC3 3 3 3600 20070926135752 20070829135752 2854 example.com. MCwCFHS+i/OB/V/gYmS1eQTXieXIXGjsAhQQ0Ql7TW/hsUklrb0DfoyhVPG95Q== ;{id = 2854}
s1unhcti19bkdr98fegs0v46mbu3t4m2.example.com. NSEC3 1 1 123 aabb00123456bbccdd s1unhcti19bkdr98fegs0v46mbu3t4m4 A MX RRSIG
s1unhcti19bkdr98fegs0v46mbu3t4m2.example.com. 3600 IN RRSIG NSEC3 3 3 3600 20070926135752 20070829135752 2854 example.com. MC0CFFSH4klZKke48dYyddYDj17gjTS0AhUAltWicpFLWqW98/Af9Qlx70MH8o4= ;{id = 2854}
SECTION ADDITIONAL
ENTRY_END
SCENARIO_END
dnssecjava-1.1.3/src/test/resources/unbound/val_nx_nsec3_params.rpl 0000664 0000000 0000000 00000014455 13020541473 0025543 0 ustar 00root root 0000000 0000000 ; config options
; The island of trust is at example.com
server:
trust-anchor: "example.com. 3600 IN DS 2854 3 1 46e4ffc6e9a4793b488954bd3f0cc6af0dfb201b"
val-override-date: "20070916134226"
target-fetch-policy: "0 0 0 0 0"
stub-zone:
name: "."
stub-addr: 193.0.14.129 # K.ROOT-SERVERS.NET.
CONFIG_END
SCENARIO_BEGIN Test validator with nxdomain NSEC3 several parameters.
; K.ROOT-SERVERS.NET.
RANGE_BEGIN 0 100
ADDRESS 193.0.14.129
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
. IN NS
SECTION ANSWER
. IN NS K.ROOT-SERVERS.NET.
SECTION ADDITIONAL
K.ROOT-SERVERS.NET. IN A 193.0.14.129
ENTRY_END
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
www.example.com. IN A
SECTION AUTHORITY
com. IN NS a.gtld-servers.net.
SECTION ADDITIONAL
a.gtld-servers.net. IN A 192.5.6.30
ENTRY_END
RANGE_END
; a.gtld-servers.net.
RANGE_BEGIN 0 100
ADDRESS 192.5.6.30
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
com. IN NS
SECTION ANSWER
com. IN NS a.gtld-servers.net.
SECTION ADDITIONAL
a.gtld-servers.net. IN A 192.5.6.30
ENTRY_END
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
www.example.com. IN A
SECTION AUTHORITY
example.com. IN NS ns.example.com.
SECTION ADDITIONAL
ns.example.com. IN A 1.2.3.4
ENTRY_END
RANGE_END
; ns.example.com.
RANGE_BEGIN 0 100
ADDRESS 1.2.3.4
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
example.com. IN NS
SECTION ANSWER
example.com. IN NS ns.example.com.
example.com. 3600 IN RRSIG NS 3 2 3600 20070926134150 20070829134150 2854 example.com. MC0CFQCN+qHdJxoI/2tNKwsb08pra/G7aAIUAWA5sDdJTbrXA1/3OaesGBAO3sI= ;{id = 2854}
SECTION ADDITIONAL
ns.example.com. IN A 1.2.3.4
ns.example.com. 3600 IN RRSIG A 3 3 3600 20070926135752 20070829135752 2854 example.com. MC0CFQCMSWxVehgOQLoYclB9PIAbNP229AIUeH0vNNGJhjnZiqgIOKvs1EhzqAo= ;{id = 2854}
ENTRY_END
; response to DNSKEY priming query
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
example.com. IN DNSKEY
SECTION ANSWER
example.com. 3600 IN DNSKEY 256 3 3 ALXLUsWqUrY3JYER3T4TBJII s70j+sDS/UT2QRp61SE7S3E EXopNXoFE73JLRmvpi/UrOO/Vz4Se 6wXv/CYCKjGw06U4WRgR YXcpEhJROyNapmdIKSx hOzfLVE1gqA0PweZR8d tY3aNQSRn3sPpwJr6Mi /PqQKAMMrZ9ckJpf1+b QMOOvxgzz2U1GS18b3y ZKcgTMEaJzd/GZYzi/B N2DzQ0MsrSwYXfsNLFO Bbs8PJMW4LYIxeeOe6rUgkWOF 7CC9Dh/dduQ1QrsJhmZAEFfd6ByYV+ ;{id = 2854 (zsk), size = 1688b}
example.com. 3600 IN RRSIG DNSKEY 3 2 3600 20070926134802 20070829134802 2854 example.com. MCwCFG1yhRNtTEa3Eno2zhVVuy2EJX3wAhQeLyUp6+UXcpC5qGNu9tkrTEgPUg== ;{id = 2854}
SECTION AUTHORITY
example.com. IN NS ns.example.com.
example.com. 3600 IN RRSIG NS 3 2 3600 20070926134150 20070829134150 2854 example.com. MC0CFQCN+qHdJxoI/2tNKwsb08pra/G7aAIUAWA5sDdJTbrXA1/3OaesGBAO3sI= ;{id = 2854}
SECTION ADDITIONAL
ns.example.com. IN A 1.2.3.4
ns.example.com. 3600 IN RRSIG A 3 3 3600 20070926135752 20070829135752 2854 example.com. MC0CFQCMSWxVehgOQLoYclB9PIAbNP229AIUeH0vNNGJhjnZiqgIOKvs1EhzqAo= ;{id = 2854}
ENTRY_END
; response to query of interest
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NXDOMAIN
SECTION QUESTION
www.example.com. IN A
SECTION ANSWER
SECTION AUTHORITY
example.com. IN SOA ns.example.com. hostmaster.example.com. 2007090400 28800 7200 604800 18000
example.com. 3600 IN RRSIG SOA 3 2 3600 20070926134150 20070829134150 2854 example.com. MC0CFCNGZ+/OfElYQMCZ77O9Lw9rhk7PAhUAmDcvTAst6Bq83qPq3r6c/Dm1nFc= ;{id = 2854}
; closest encloser, H(example.com).
6md8numosa4q9ugkffdo1bmm82t5j39s.example.com. NSEC3 1 1 8 - 6md8numosa4q9ugkffdo1bmm82t5j49s SOA NS MX DNSKEY RRSIG
6md8numosa4q9ugkffdo1bmm82t5j39s.example.com. 3600 IN RRSIG NSEC3 3 3 3600 20070926135752 20070829135752 2854 example.com. MC0CFQCz/LkFOFcaQzVnyySW9ZoVUnxh7gIUdxyS9vqVDzo8pGhFU+3YogN2ZRk= ;{id = 2854}
; wildcard denial, H(*.example.com.) = 4f3cnt8cu22tngec382jj4gde4rb47ub
4f3cnt8cu22tngec382jj4gde4rb46ub.example.com. NSEC3 1 1 0 - 4f3cnt8cu22tngec382jj4gde4rb48ub A MX RRSIG
4f3cnt8cu22tngec382jj4gde4rb46ub.example.com. 3600 IN RRSIG NSEC3 3 3 3600 20070926135752 20070829135752 2854 example.com. MCwCFHS+i/OB/V/gYmS1eQTXieXIXGjsAhQQ0Ql7TW/hsUklrb0DfoyhVPG95Q== ;{id = 2854}
; next closer name, H(www.example.com.) = s1unhcti19bkdr98fegs0v46mbu3t4m3.
s1unhcti19bkdr98fegs0v46mbu3t4m2.example.com. NSEC3 1 1 123 aabb00123456bbccdd s1unhcti19bkdr98fegs0v46mbu3t4m4 A MX RRSIG
s1unhcti19bkdr98fegs0v46mbu3t4m2.example.com. 3600 IN RRSIG NSEC3 3 3 3600 20070926135752 20070829135752 2854 example.com. MC0CFFSH4klZKke48dYyddYDj17gjTS0AhUAltWicpFLWqW98/Af9Qlx70MH8o4= ;{id = 2854}
ENTRY_END
RANGE_END
STEP 1 QUERY
ENTRY_BEGIN
REPLY RD DO
SECTION QUESTION
www.example.com. IN A
ENTRY_END
; recursion happens here.
STEP 10 CHECK_ANSWER
ENTRY_BEGIN
MATCH all
REPLY QR RD RA NXDOMAIN
SECTION QUESTION
www.example.com. IN A
SECTION ANSWER
SECTION AUTHORITY
example.com. IN SOA ns.example.com. hostmaster.example.com. 2007090400 28800 7200 604800 18000
example.com. 3600 IN RRSIG SOA 3 2 3600 20070926134150 20070829134150 2854 example.com. MC0CFCNGZ+/OfElYQMCZ77O9Lw9rhk7PAhUAmDcvTAst6Bq83qPq3r6c/Dm1nFc= ;{id = 2854}
6md8numosa4q9ugkffdo1bmm82t5j39s.example.com. NSEC3 1 1 8 - 6md8numosa4q9ugkffdo1bmm82t5j49s SOA NS MX DNSKEY RRSIG
6md8numosa4q9ugkffdo1bmm82t5j39s.example.com. 3600 IN RRSIG NSEC3 3 3 3600 20070926135752 20070829135752 2854 example.com. MC0CFQCz/LkFOFcaQzVnyySW9ZoVUnxh7gIUdxyS9vqVDzo8pGhFU+3YogN2ZRk= ;{id = 2854}
4f3cnt8cu22tngec382jj4gde4rb46ub.example.com. NSEC3 1 1 0 - 4f3cnt8cu22tngec382jj4gde4rb48ub A MX RRSIG
4f3cnt8cu22tngec382jj4gde4rb46ub.example.com. 3600 IN RRSIG NSEC3 3 3 3600 20070926135752 20070829135752 2854 example.com. MCwCFHS+i/OB/V/gYmS1eQTXieXIXGjsAhQQ0Ql7TW/hsUklrb0DfoyhVPG95Q== ;{id = 2854}
s1unhcti19bkdr98fegs0v46mbu3t4m2.example.com. NSEC3 1 1 123 aabb00123456bbccdd s1unhcti19bkdr98fegs0v46mbu3t4m4 A MX RRSIG
s1unhcti19bkdr98fegs0v46mbu3t4m2.example.com. 3600 IN RRSIG NSEC3 3 3 3600 20070926135752 20070829135752 2854 example.com. MC0CFFSH4klZKke48dYyddYDj17gjTS0AhUAltWicpFLWqW98/Af9Qlx70MH8o4= ;{id = 2854}
SECTION ADDITIONAL
ENTRY_END
SCENARIO_END
dnssecjava-1.1.3/src/test/resources/unbound/val_nx_overreach.rpl 0000664 0000000 0000000 00000011374 13020541473 0025140 0 ustar 00root root 0000000 0000000 ; config options
; The island of trust is at example.com
server:
trust-anchor: "example.com. 3600 IN DS 2854 3 1 46e4ffc6e9a4793b488954bd3f0cc6af0dfb201b"
val-override-date: "20070916134226"
target-fetch-policy: "0 0 0 0 0"
stub-zone:
name: "."
stub-addr: 193.0.14.129 # K.ROOT-SERVERS.NET.
CONFIG_END
SCENARIO_BEGIN Test validator with overreaching NSEC record
; K.ROOT-SERVERS.NET.
RANGE_BEGIN 0 100
ADDRESS 193.0.14.129
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
. IN NS
SECTION ANSWER
. IN NS K.ROOT-SERVERS.NET.
SECTION ADDITIONAL
K.ROOT-SERVERS.NET. IN A 193.0.14.129
ENTRY_END
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
www.example.com. IN A
SECTION AUTHORITY
com. IN NS a.gtld-servers.net.
SECTION ADDITIONAL
a.gtld-servers.net. IN A 192.5.6.30
ENTRY_END
RANGE_END
; a.gtld-servers.net.
RANGE_BEGIN 0 100
ADDRESS 192.5.6.30
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
com. IN NS
SECTION ANSWER
com. IN NS a.gtld-servers.net.
SECTION ADDITIONAL
a.gtld-servers.net. IN A 192.5.6.30
ENTRY_END
ENTRY_BEGIN
MATCH opcode subdomain
ADJUST copy_id copy_query
REPLY QR NOERROR
SECTION QUESTION
example.com. IN A
SECTION AUTHORITY
example.com. IN NS ns.example.com.
SECTION ADDITIONAL
ns.example.com. IN A 1.2.3.4
ENTRY_END
RANGE_END
; ns.example.com.
RANGE_BEGIN 0 100
ADDRESS 1.2.3.4
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR AA REFUSED
SECTION QUESTION
ns.example.com. IN A
ENTRY_END
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR AA REFUSED
SECTION QUESTION
ns.example.com. IN AAAA
ENTRY_END
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
example.com. IN NS
SECTION ANSWER
example.com. IN NS ns.example.com.
example.com. 3600 IN RRSIG NS 3 2 3600 20070926134150 20070829134150 2854 example.com. MC0CFQCN+qHdJxoI/2tNKwsb08pra/G7aAIUAWA5sDdJTbrXA1/3OaesGBAO3sI= ;{id = 2854}
SECTION ADDITIONAL
ns.example.com. IN A 1.2.3.4
ns.example.com. 3600 IN RRSIG A 3 3 3600 20070926135752 20070829135752 2854 example.com. MC0CFQCMSWxVehgOQLoYclB9PIAbNP229AIUeH0vNNGJhjnZiqgIOKvs1EhzqAo= ;{id = 2854}
ENTRY_END
; response to DNSKEY priming query
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
example.com. IN DNSKEY
SECTION ANSWER
example.com. 3600 IN DNSKEY 256 3 3 ALXLUsWqUrY3JYER3T4TBJII s70j+sDS/UT2QRp61SE7S3E EXopNXoFE73JLRmvpi/UrOO/Vz4Se 6wXv/CYCKjGw06U4WRgR YXcpEhJROyNapmdIKSx hOzfLVE1gqA0PweZR8d tY3aNQSRn3sPpwJr6Mi /PqQKAMMrZ9ckJpf1+b QMOOvxgzz2U1GS18b3y ZKcgTMEaJzd/GZYzi/B N2DzQ0MsrSwYXfsNLFO Bbs8PJMW4LYIxeeOe6rUgkWOF 7CC9Dh/dduQ1QrsJhmZAEFfd6ByYV+ ;{id = 2854 (zsk), size = 1688b}
example.com. 3600 IN RRSIG DNSKEY 3 2 3600 20070926134802 20070829134802 2854 example.com. MCwCFG1yhRNtTEa3Eno2zhVVuy2EJX3wAhQeLyUp6+UXcpC5qGNu9tkrTEgPUg== ;{id = 2854}
SECTION AUTHORITY
example.com. IN NS ns.example.com.
example.com. 3600 IN RRSIG NS 3 2 3600 20070926134150 20070829134150 2854 example.com. MC0CFQCN+qHdJxoI/2tNKwsb08pra/G7aAIUAWA5sDdJTbrXA1/3OaesGBAO3sI= ;{id = 2854}
SECTION ADDITIONAL
ns.example.com. IN A 1.2.3.4
ns.example.com. 3600 IN RRSIG A 3 3 3600 20070926135752 20070829135752 2854 example.com. MC0CFQCMSWxVehgOQLoYclB9PIAbNP229AIUeH0vNNGJhjnZiqgIOKvs1EhzqAo= ;{id = 2854}
ENTRY_END
; response to query of interest
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NXDOMAIN
SECTION QUESTION
www.example.com. IN A
SECTION ANSWER
SECTION AUTHORITY
example.com. IN SOA ns.example.com. hostmaster.example.com. 2007090400 28800 7200 604800 18000
example.com. 3600 IN RRSIG SOA 3 2 3600 20070926134150 20070829134150 2854 example.com. MC0CFCNGZ+/OfElYQMCZ77O9Lw9rhk7PAhUAmDcvTAst6Bq83qPq3r6c/Dm1nFc= ;{id = 2854}
; wildcard denial
example.com. IN NSEC abc.example.com. SOA NS DNSKEY NSEC RRSIG
example.com. 3600 IN RRSIG NSEC 3 2 3600 20070926134150 20070829134150 2854 example.com. MCwCFHV2IBWyTmDJvZ+sT+WsGrJX0op/AhQkAijjnjPAtx/tNub2FAGqcexJSg== ;{id = 2854}
; qname denial
; The overreaching NSEC record; it tries to deny other .com zones!
wab.example.com. IN NSEC wzz.foo.com. A NSEC RRSIG
wab.example.com. 3600 IN RRSIG NSEC 3 3 3600 20070926134150 20070829134150 2854 example.com. AEimIB2N5u7AQOb5IBMnckASZ4MlhBxziJy+zVUjLov/s7q85j8eWQc= ;{id = 2854}
SECTION ADDITIONAL
ENTRY_END
RANGE_END
STEP 1 QUERY
ENTRY_BEGIN
REPLY RD DO
SECTION QUESTION
www.example.com. IN A
ENTRY_END
; recursion happens here.
STEP 10 CHECK_ANSWER
ENTRY_BEGIN
MATCH all
REPLY QR RD RA SERVFAIL
SECTION QUESTION
www.example.com. IN A
SECTION ANSWER
SECTION AUTHORITY
SECTION ADDITIONAL
ENTRY_END
SCENARIO_END
dnssecjava-1.1.3/src/test/resources/unbound/val_pos_truncns.rpl 0000664 0000000 0000000 00000011104 13020541473 0025021 0 ustar 00root root 0000000 0000000 ; config options
; The island of trust is at example.com
server:
trust-anchor: "example.com. 3600 IN DS 2854 3 1 46e4ffc6e9a4793b488954bd3f0cc6af0dfb201b"
val-override-date: "20070916134226"
target-fetch-policy: "0 0 0 0 0"
stub-zone:
name: "."
stub-addr: 193.0.14.129 # K.ROOT-SERVERS.NET.
CONFIG_END
SCENARIO_BEGIN Test validator with badly truncated positive response
; K.ROOT-SERVERS.NET.
RANGE_BEGIN 0 100
ADDRESS 193.0.14.129
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
. IN NS
SECTION ANSWER
. IN NS K.ROOT-SERVERS.NET.
SECTION ADDITIONAL
K.ROOT-SERVERS.NET. IN A 193.0.14.129
ENTRY_END
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
www.example.com. IN A
SECTION AUTHORITY
com. IN NS a.gtld-servers.net.
SECTION ADDITIONAL
a.gtld-servers.net. IN A 192.5.6.30
ENTRY_END
RANGE_END
; a.gtld-servers.net.
RANGE_BEGIN 0 100
ADDRESS 192.5.6.30
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
com. IN NS
SECTION ANSWER
com. IN NS a.gtld-servers.net.
SECTION ADDITIONAL
a.gtld-servers.net. IN A 192.5.6.30
ENTRY_END
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
www.example.com. IN A
SECTION AUTHORITY
example.com. IN NS ns.example.com.
SECTION ADDITIONAL
ns.example.com. IN A 1.2.3.4
ENTRY_END
RANGE_END
; ns.example.com.
RANGE_BEGIN 0 100
ADDRESS 1.2.3.4
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
example.com. IN NS
SECTION ANSWER
example.com. IN NS ns.example.com.
example.com. 3600 IN RRSIG NS 3 2 3600 20070926134150 20070829134150 2854 example.com. MC0CFQCN+qHdJxoI/2tNKwsb08pra/G7aAIUAWA5sDdJTbrXA1/3OaesGBAO3sI= ;{id = 2854}
SECTION ADDITIONAL
ns.example.com. IN A 1.2.3.4
ns.example.com. 3600 IN RRSIG A 3 3 3600 20070926135752 20070829135752 2854 example.com. MC0CFQCMSWxVehgOQLoYclB9PIAbNP229AIUeH0vNNGJhjnZiqgIOKvs1EhzqAo= ;{id = 2854}
ENTRY_END
; response to DNSKEY priming query
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
example.com. IN DNSKEY
SECTION ANSWER
example.com. 3600 IN DNSKEY 256 3 3 ALXLUsWqUrY3JYER3T4TBJII s70j+sDS/UT2QRp61SE7S3E EXopNXoFE73JLRmvpi/UrOO/Vz4Se 6wXv/CYCKjGw06U4WRgR YXcpEhJROyNapmdIKSx hOzfLVE1gqA0PweZR8d tY3aNQSRn3sPpwJr6Mi /PqQKAMMrZ9ckJpf1+b QMOOvxgzz2U1GS18b3y ZKcgTMEaJzd/GZYzi/B N2DzQ0MsrSwYXfsNLFO Bbs8PJMW4LYIxeeOe6rUgkWOF 7CC9Dh/dduQ1QrsJhmZAEFfd6ByYV+ ;{id = 2854 (zsk), size = 1688b}
example.com. 3600 IN RRSIG DNSKEY 3 2 3600 20070926134802 20070829134802 2854 example.com. MCwCFG1yhRNtTEa3Eno2zhVVuy2EJX3wAhQeLyUp6+UXcpC5qGNu9tkrTEgPUg== ;{id = 2854}
SECTION AUTHORITY
example.com. IN NS ns.example.com.
example.com. 3600 IN RRSIG NS 3 2 3600 20070926134150 20070829134150 2854 example.com. MC0CFQCN+qHdJxoI/2tNKwsb08pra/G7aAIUAWA5sDdJTbrXA1/3OaesGBAO3sI= ;{id = 2854}
SECTION ADDITIONAL
ns.example.com. IN A 1.2.3.4
ns.example.com. 3600 IN RRSIG A 3 3 3600 20070926135752 20070829135752 2854 example.com. MC0CFQCMSWxVehgOQLoYclB9PIAbNP229AIUeH0vNNGJhjnZiqgIOKvs1EhzqAo= ;{id = 2854}
ENTRY_END
; response to query of interest
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
www.example.com. IN A
SECTION ANSWER
www.example.com. IN A 10.20.30.40
www.example.com. 3600 IN RRSIG A 3 3 3600 20070926134150 20070829134150 2854 example.com. MC0CFC99iE9K5y2WNgI0gFvBWaTi9wm6AhUAoUqOpDtG5Zct+Qr9F3mSdnbc6V4= ;{id = 2854}
SECTION AUTHORITY
example.com. IN NS ns.example.com.
; Truncated, no signature for NS record.
;;;example.com. 3600 IN RRSIG NS 3 2 3600 20070926134150 20070829134150 2854 example.com. MC0CFQCN+qHdJxoI/2tNKwsb08pra/G7aAIUAWA5sDdJTbrXA1/3OaesGBAO3sI= ;{id = 2854}
;;;SECTION ADDITIONAL
;;;ns.example.com. IN A 1.2.3.4
;;;ns.example.com. 3600 IN RRSIG A 3 3 3600 20070926134150 20070829134150 2854 example.com. MC0CFQCQMyTjn7WWwpwAR1LlVeLpRgZGuQIUCcJDEkwAuzytTDRlYK7nIMwH1CM= ;{id = 2854}
ENTRY_END
RANGE_END
STEP 1 QUERY
ENTRY_BEGIN
REPLY RD DO
SECTION QUESTION
www.example.com. IN A
ENTRY_END
; recursion happens here.
STEP 10 CHECK_ANSWER
ENTRY_BEGIN
MATCH all
REPLY QR RD RA AD NOERROR
SECTION QUESTION
www.example.com. IN A
SECTION ANSWER
www.example.com. IN A 10.20.30.40
www.example.com. 3600 IN RRSIG A 3 3 3600 20070926134150 20070829134150 2854 example.com. MC0CFC99iE9K5y2WNgI0gFvBWaTi9wm6AhUAoUqOpDtG5Zct+Qr9F3mSdnbc6V4= ;{id = 2854}
SECTION AUTHORITY
SECTION ADDITIONAL
ENTRY_END
SCENARIO_END
dnssecjava-1.1.3/src/test/resources/unbound/val_positive.rpl 0000664 0000000 0000000 00000011643 13020541473 0024316 0 ustar 00root root 0000000 0000000 ; config options
; The island of trust is at example.com
server:
trust-anchor: "example.com. 3600 IN DS 2854 3 1 46e4ffc6e9a4793b488954bd3f0cc6af0dfb201b"
val-override-date: "20070916134226"
target-fetch-policy: "0 0 0 0 0"
stub-zone:
name: "."
stub-addr: 193.0.14.129 # K.ROOT-SERVERS.NET.
CONFIG_END
SCENARIO_BEGIN Test validator with positive response
; K.ROOT-SERVERS.NET.
RANGE_BEGIN 0 100
ADDRESS 193.0.14.129
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
. IN NS
SECTION ANSWER
. IN NS K.ROOT-SERVERS.NET.
SECTION ADDITIONAL
K.ROOT-SERVERS.NET. IN A 193.0.14.129
ENTRY_END
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
www.example.com. IN A
SECTION AUTHORITY
com. IN NS a.gtld-servers.net.
SECTION ADDITIONAL
a.gtld-servers.net. IN A 192.5.6.30
ENTRY_END
RANGE_END
; a.gtld-servers.net.
RANGE_BEGIN 0 100
ADDRESS 192.5.6.30
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
com. IN NS
SECTION ANSWER
com. IN NS a.gtld-servers.net.
SECTION ADDITIONAL
a.gtld-servers.net. IN A 192.5.6.30
ENTRY_END
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
www.example.com. IN A
SECTION AUTHORITY
example.com. IN NS ns.example.com.
SECTION ADDITIONAL
ns.example.com. IN A 1.2.3.4
ENTRY_END
RANGE_END
; ns.example.com.
RANGE_BEGIN 0 100
ADDRESS 1.2.3.4
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
example.com. IN NS
SECTION ANSWER
example.com. IN NS ns.example.com.
example.com. 3600 IN RRSIG NS 3 2 3600 20070926134150 20070829134150 2854 example.com. MC0CFQCN+qHdJxoI/2tNKwsb08pra/G7aAIUAWA5sDdJTbrXA1/3OaesGBAO3sI= ;{id = 2854}
SECTION ADDITIONAL
ns.example.com. IN A 1.2.3.4
ns.example.com. 3600 IN RRSIG A 3 3 3600 20070926135752 20070829135752 2854 example.com. MC0CFQCMSWxVehgOQLoYclB9PIAbNP229AIUeH0vNNGJhjnZiqgIOKvs1EhzqAo= ;{id = 2854}
ENTRY_END
; response to DNSKEY priming query
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
example.com. IN DNSKEY
SECTION ANSWER
example.com. 3600 IN DNSKEY 256 3 3 ALXLUsWqUrY3JYER3T4TBJII s70j+sDS/UT2QRp61SE7S3E EXopNXoFE73JLRmvpi/UrOO/Vz4Se 6wXv/CYCKjGw06U4WRgR YXcpEhJROyNapmdIKSx hOzfLVE1gqA0PweZR8d tY3aNQSRn3sPpwJr6Mi /PqQKAMMrZ9ckJpf1+b QMOOvxgzz2U1GS18b3y ZKcgTMEaJzd/GZYzi/B N2DzQ0MsrSwYXfsNLFO Bbs8PJMW4LYIxeeOe6rUgkWOF 7CC9Dh/dduQ1QrsJhmZAEFfd6ByYV+ ;{id = 2854 (zsk), size = 1688b}
example.com. 3600 IN RRSIG DNSKEY 3 2 3600 20070926134802 20070829134802 2854 example.com. MCwCFG1yhRNtTEa3Eno2zhVVuy2EJX3wAhQeLyUp6+UXcpC5qGNu9tkrTEgPUg== ;{id = 2854}
SECTION AUTHORITY
example.com. IN NS ns.example.com.
example.com. 3600 IN RRSIG NS 3 2 3600 20070926134150 20070829134150 2854 example.com. MC0CFQCN+qHdJxoI/2tNKwsb08pra/G7aAIUAWA5sDdJTbrXA1/3OaesGBAO3sI= ;{id = 2854}
SECTION ADDITIONAL
ns.example.com. IN A 1.2.3.4
ns.example.com. 3600 IN RRSIG A 3 3 3600 20070926135752 20070829135752 2854 example.com. MC0CFQCMSWxVehgOQLoYclB9PIAbNP229AIUeH0vNNGJhjnZiqgIOKvs1EhzqAo= ;{id = 2854}
ENTRY_END
; response to query of interest
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
www.example.com. IN A
SECTION ANSWER
www.example.com. IN A 10.20.30.40
www.example.com. 3600 IN RRSIG A 3 3 3600 20070926134150 20070829134150 2854 example.com. MC0CFC99iE9K5y2WNgI0gFvBWaTi9wm6AhUAoUqOpDtG5Zct+Qr9F3mSdnbc6V4= ;{id = 2854}
SECTION AUTHORITY
example.com. IN NS ns.example.com.
example.com. 3600 IN RRSIG NS 3 2 3600 20070926134150 20070829134150 2854 example.com. MC0CFQCN+qHdJxoI/2tNKwsb08pra/G7aAIUAWA5sDdJTbrXA1/3OaesGBAO3sI= ;{id = 2854}
SECTION ADDITIONAL
ns.example.com. IN A 1.2.3.4
ns.example.com. 3600 IN RRSIG A 3 3 3600 20070926134150 20070829134150 2854 example.com. MC0CFQCQMyTjn7WWwpwAR1LlVeLpRgZGuQIUCcJDEkwAuzytTDRlYK7nIMwH1CM= ;{id = 2854}
ENTRY_END
RANGE_END
STEP 1 QUERY
ENTRY_BEGIN
REPLY RD DO
SECTION QUESTION
www.example.com. IN A
ENTRY_END
; recursion happens here.
STEP 10 CHECK_ANSWER
ENTRY_BEGIN
MATCH all
REPLY QR RD RA AD NOERROR
SECTION QUESTION
www.example.com. IN A
SECTION ANSWER
www.example.com. IN A 10.20.30.40
www.example.com. 3600 IN RRSIG A 3 3 3600 20070926134150 20070829134150 2854 example.com. MC0CFC99iE9K5y2WNgI0gFvBWaTi9wm6AhUAoUqOpDtG5Zct+Qr9F3mSdnbc6V4= ;{id = 2854}
SECTION AUTHORITY
example.com. IN NS ns.example.com.
example.com. 3600 IN RRSIG NS 3 2 3600 20070926134150 20070829134150 2854 example.com. MC0CFQCN+qHdJxoI/2tNKwsb08pra/G7aAIUAWA5sDdJTbrXA1/3OaesGBAO3sI= ;{id = 2854}
SECTION ADDITIONAL
ns.example.com. IN A 1.2.3.4
ns.example.com. 3600 IN RRSIG A 3 3 3600 20070926134150 20070829134150 2854 example.com. MC0CFQCQMyTjn7WWwpwAR1LlVeLpRgZGuQIUCcJDEkwAuzytTDRlYK7nIMwH1CM= ;{id = 2854}
ENTRY_END
SCENARIO_END
dnssecjava-1.1.3/src/test/resources/unbound/val_positive_nosigs.rpl 0000664 0000000 0000000 00000011654 13020541473 0025702 0 ustar 00root root 0000000 0000000 ; config options
; The island of trust is at example.com
server:
trust-anchor: "example.com. 3600 IN DS 2854 3 1 46e4ffc6e9a4793b488954bd3f0cc6af0dfb201b"
val-override-date: "20070916134226"
target-fetch-policy: "0 0 0 0 0"
stub-zone:
name: "."
stub-addr: 193.0.14.129 # K.ROOT-SERVERS.NET.
CONFIG_END
SCENARIO_BEGIN Test validator with positive response, signatures removed.
; K.ROOT-SERVERS.NET.
RANGE_BEGIN 0 100
ADDRESS 193.0.14.129
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
. IN NS
SECTION ANSWER
. IN NS K.ROOT-SERVERS.NET.
SECTION ADDITIONAL
K.ROOT-SERVERS.NET. IN A 193.0.14.129
ENTRY_END
ENTRY_BEGIN
MATCH opcode subdomain
ADJUST copy_id copy_query
REPLY QR NOERROR
SECTION QUESTION
com. IN A
SECTION AUTHORITY
com. IN NS a.gtld-servers.net.
SECTION ADDITIONAL
a.gtld-servers.net. IN A 192.5.6.30
ENTRY_END
RANGE_END
; a.gtld-servers.net.
RANGE_BEGIN 0 100
ADDRESS 192.5.6.30
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
com. IN NS
SECTION ANSWER
com. IN NS a.gtld-servers.net.
SECTION ADDITIONAL
a.gtld-servers.net. IN A 192.5.6.30
ENTRY_END
ENTRY_BEGIN
MATCH opcode subdomain
ADJUST copy_id copy_query
REPLY QR NOERROR
SECTION QUESTION
example.com. IN A
SECTION AUTHORITY
example.com. IN NS ns.example.com.
SECTION ADDITIONAL
ns.example.com. IN A 1.2.3.4
ENTRY_END
RANGE_END
; ns.example.com.
RANGE_BEGIN 0 100
ADDRESS 1.2.3.4
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
example.com. IN NS
SECTION ANSWER
example.com. IN NS ns.example.com.
example.com. 3600 IN RRSIG NS 3 2 3600 20070926134150 20070829134150 2854 example.com. MC0CFQCN+qHdJxoI/2tNKwsb08pra/G7aAIUAWA5sDdJTbrXA1/3OaesGBAO3sI= ;{id = 2854}
SECTION ADDITIONAL
ns.example.com. IN A 1.2.3.4
ns.example.com. 3600 IN RRSIG A 3 3 3600 20070926135752 20070829135752 2854 example.com. MC0CFQCMSWxVehgOQLoYclB9PIAbNP229AIUeH0vNNGJhjnZiqgIOKvs1EhzqAo= ;{id = 2854}
ENTRY_END
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
ns.example.com. IN A
SECTION ANSWER
ns.example.com. IN A 1.2.3.4
ns.example.com. 3600 IN RRSIG A 3 3 3600 20070926135752 20070829135752 2854 example.com. MC0CFQCMSWxVehgOQLoYclB9PIAbNP229AIUeH0vNNGJhjnZiqgIOKvs1EhzqAo= ;{id = 2854}
SECTION AUTHORITY
example.com. IN NS ns.example.com.
example.com. 3600 IN RRSIG NS 3 2 3600 20070926134150 20070829134150 2854 example.com. MC0CFQCN+qHdJxoI/2tNKwsb08pra/G7aAIUAWA5sDdJTbrXA1/3OaesGBAO3sI= ;{id = 2854}
ENTRY_END
; barely valid nodata for AAAA
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
ns.example.com. IN AAAA
SECTION ANSWER
SECTION AUTHORITY
example.com. IN NS ns.example.com.
example.com. 3600 IN RRSIG NS 3 2 3600 20070926134150 20070829134150 2854 example.com. MC0CFQCN+qHdJxoI/2tNKwsb08pra/G7aAIUAWA5sDdJTbrXA1/3OaesGBAO3sI= ;{id = 2854}
ENTRY_END
; response to DNSKEY priming query
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
example.com. IN DNSKEY
SECTION ANSWER
example.com. 3600 IN DNSKEY 256 3 3 ALXLUsWqUrY3JYER3T4TBJII s70j+sDS/UT2QRp61SE7S3E EXopNXoFE73JLRmvpi/UrOO/Vz4Se 6wXv/CYCKjGw06U4WRgR YXcpEhJROyNapmdIKSx hOzfLVE1gqA0PweZR8d tY3aNQSRn3sPpwJr6Mi /PqQKAMMrZ9ckJpf1+b QMOOvxgzz2U1GS18b3y ZKcgTMEaJzd/GZYzi/B N2DzQ0MsrSwYXfsNLFO Bbs8PJMW4LYIxeeOe6rUgkWOF 7CC9Dh/dduQ1QrsJhmZAEFfd6ByYV+ ;{id = 2854 (zsk), size = 1688b}
example.com. 3600 IN RRSIG DNSKEY 3 2 3600 20070926134802 20070829134802 2854 example.com. MCwCFG1yhRNtTEa3Eno2zhVVuy2EJX3wAhQeLyUp6+UXcpC5qGNu9tkrTEgPUg== ;{id = 2854}
SECTION AUTHORITY
example.com. IN NS ns.example.com.
example.com. 3600 IN RRSIG NS 3 2 3600 20070926134150 20070829134150 2854 example.com. MC0CFQCN+qHdJxoI/2tNKwsb08pra/G7aAIUAWA5sDdJTbrXA1/3OaesGBAO3sI= ;{id = 2854}
SECTION ADDITIONAL
ns.example.com. IN A 1.2.3.4
ns.example.com. 3600 IN RRSIG A 3 3 3600 20070926135752 20070829135752 2854 example.com. MC0CFQCMSWxVehgOQLoYclB9PIAbNP229AIUeH0vNNGJhjnZiqgIOKvs1EhzqAo= ;{id = 2854}
ENTRY_END
; response to DS query for subzone
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
www.example.com. IN DS
SECTION ANSWER
ENTRY_END
; response to query of interest
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR AD NOERROR
SECTION QUESTION
www.example.com. IN A
SECTION ANSWER
www.example.com. IN A 10.20.30.40
SECTION AUTHORITY
example.com. IN NS ns.example.com.
SECTION ADDITIONAL
ns.example.com. IN A 1.2.3.4
ENTRY_END
RANGE_END
STEP 1 QUERY
ENTRY_BEGIN
REPLY RD
SECTION QUESTION
www.example.com. IN A
ENTRY_END
; recursion happens here.
STEP 10 CHECK_ANSWER
ENTRY_BEGIN
MATCH all
REPLY QR RD RA SERVFAIL
SECTION QUESTION
www.example.com. IN A
SECTION ANSWER
SECTION AUTHORITY
SECTION ADDITIONAL
ENTRY_END
SCENARIO_END
dnssecjava-1.1.3/src/test/resources/unbound/val_positive_wc.rpl 0000664 0000000 0000000 00000012673 13020541473 0025013 0 ustar 00root root 0000000 0000000 ; config options
; The island of trust is at example.com
server:
trust-anchor: "example.com. 3600 IN DS 2854 3 1 46e4ffc6e9a4793b488954bd3f0cc6af0dfb201b"
val-override-date: "20070916134226"
target-fetch-policy: "0 0 0 0 0"
stub-zone:
name: "."
stub-addr: 193.0.14.129 # K.ROOT-SERVERS.NET.
CONFIG_END
SCENARIO_BEGIN Test validator with positive wildcard response
; K.ROOT-SERVERS.NET.
RANGE_BEGIN 0 100
ADDRESS 193.0.14.129
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
. IN NS
SECTION ANSWER
. IN NS K.ROOT-SERVERS.NET.
SECTION ADDITIONAL
K.ROOT-SERVERS.NET. IN A 193.0.14.129
ENTRY_END
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
www.example.com. IN A
SECTION AUTHORITY
com. IN NS a.gtld-servers.net.
SECTION ADDITIONAL
a.gtld-servers.net. IN A 192.5.6.30
ENTRY_END
RANGE_END
; a.gtld-servers.net.
RANGE_BEGIN 0 100
ADDRESS 192.5.6.30
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
com. IN NS
SECTION ANSWER
com. IN NS a.gtld-servers.net.
SECTION ADDITIONAL
a.gtld-servers.net. IN A 192.5.6.30
ENTRY_END
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
www.example.com. IN A
SECTION AUTHORITY
example.com. IN NS ns.example.com.
SECTION ADDITIONAL
ns.example.com. IN A 1.2.3.4
ENTRY_END
RANGE_END
; ns.example.com.
RANGE_BEGIN 0 100
ADDRESS 1.2.3.4
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
example.com. IN NS
SECTION ANSWER
example.com. IN NS ns.example.com.
example.com. 3600 IN RRSIG NS 3 2 3600 20070926134150 20070829134150 2854 example.com. MC0CFQCN+qHdJxoI/2tNKwsb08pra/G7aAIUAWA5sDdJTbrXA1/3OaesGBAO3sI= ;{id = 2854}
SECTION ADDITIONAL
ns.example.com. IN A 1.2.3.4
ns.example.com. 3600 IN RRSIG A 3 3 3600 20070926135752 20070829135752 2854 example.com. MC0CFQCMSWxVehgOQLoYclB9PIAbNP229AIUeH0vNNGJhjnZiqgIOKvs1EhzqAo= ;{id = 2854}
ENTRY_END
; response to DNSKEY priming query
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
example.com. IN DNSKEY
SECTION ANSWER
example.com. 3600 IN DNSKEY 256 3 3 ALXLUsWqUrY3JYER3T4TBJII s70j+sDS/UT2QRp61SE7S3E EXopNXoFE73JLRmvpi/UrOO/Vz4Se 6wXv/CYCKjGw06U4WRgR YXcpEhJROyNapmdIKSx hOzfLVE1gqA0PweZR8d tY3aNQSRn3sPpwJr6Mi /PqQKAMMrZ9ckJpf1+b QMOOvxgzz2U1GS18b3y ZKcgTMEaJzd/GZYzi/B N2DzQ0MsrSwYXfsNLFO Bbs8PJMW4LYIxeeOe6rUgkWOF 7CC9Dh/dduQ1QrsJhmZAEFfd6ByYV+ ;{id = 2854 (zsk), size = 1688b}
example.com. 3600 IN RRSIG DNSKEY 3 2 3600 20070926134802 20070829134802 2854 example.com. MCwCFG1yhRNtTEa3Eno2zhVVuy2EJX3wAhQeLyUp6+UXcpC5qGNu9tkrTEgPUg== ;{id = 2854}
SECTION AUTHORITY
example.com. IN NS ns.example.com.
example.com. 3600 IN RRSIG NS 3 2 3600 20070926134150 20070829134150 2854 example.com. MC0CFQCN+qHdJxoI/2tNKwsb08pra/G7aAIUAWA5sDdJTbrXA1/3OaesGBAO3sI= ;{id = 2854}
SECTION ADDITIONAL
ns.example.com. IN A 1.2.3.4
ns.example.com. 3600 IN RRSIG A 3 3 3600 20070926135752 20070829135752 2854 example.com. MC0CFQCMSWxVehgOQLoYclB9PIAbNP229AIUeH0vNNGJhjnZiqgIOKvs1EhzqAo= ;{id = 2854}
ENTRY_END
; response to query of interest
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
www.example.com. IN A
SECTION ANSWER
; from
; *.example.com. IN A 10.20.30.40
www.example.com. IN A 10.20.30.40
www.example.com. 3600 IN RRSIG A 3 2 3600 20070926135752 20070829135752 2854 example.com. MCwCFFi0g6v/20JyUxoQq7XM0iQnaMMOAhRjhUCLZjMqR1tj2MGGOgfhb1BSyw== ;{id = 2854}
SECTION AUTHORITY
example.com. IN NS ns.example.com.
example.com. 3600 IN RRSIG NS 3 2 3600 20070926134150 20070829134150 2854 example.com. MC0CFQCN+qHdJxoI/2tNKwsb08pra/G7aAIUAWA5sDdJTbrXA1/3OaesGBAO3sI= ;{id = 2854}
; denies www.example.com.
ns.example.com. IN NSEC zork.example.com. A RRSIG NSEC
ns.example.com. 3600 IN RRSIG NSEC 3 3 3600 20070926135752 20070829135752 2854 example.com. MC0CFGbrr95DAxBIRKFmr4BUm5OxXWMUAhUAsduS0iF2Pa7FagrbAPrJxZ2KPNs= ;{id = 2854}
SECTION ADDITIONAL
ns.example.com. IN A 1.2.3.4
ns.example.com. 3600 IN RRSIG A 3 3 3600 20070926134150 20070829134150 2854 example.com. MC0CFQCQMyTjn7WWwpwAR1LlVeLpRgZGuQIUCcJDEkwAuzytTDRlYK7nIMwH1CM= ;{id = 2854}
ENTRY_END
RANGE_END
STEP 1 QUERY
ENTRY_BEGIN
REPLY RD DO
SECTION QUESTION
www.example.com. IN A
ENTRY_END
; recursion happens here.
STEP 10 CHECK_ANSWER
ENTRY_BEGIN
MATCH all
REPLY QR RD RA AD NOERROR
SECTION QUESTION
www.example.com. IN A
SECTION ANSWER
www.example.com. IN A 10.20.30.40
www.example.com. 3600 IN RRSIG A 3 2 3600 20070926135752 20070829135752 2854 example.com. MCwCFFi0g6v/20JyUxoQq7XM0iQnaMMOAhRjhUCLZjMqR1tj2MGGOgfhb1BSyw== ;{id = 2854}
SECTION AUTHORITY
example.com. IN NS ns.example.com.
example.com. 3600 IN RRSIG NS 3 2 3600 20070926134150 20070829134150 2854 example.com. MC0CFQCN+qHdJxoI/2tNKwsb08pra/G7aAIUAWA5sDdJTbrXA1/3OaesGBAO3sI= ;{id = 2854}
ns.example.com. IN NSEC zork.example.com. A RRSIG NSEC
ns.example.com. 3600 IN RRSIG NSEC 3 3 3600 20070926135752 20070829135752 2854 example.com. MC0CFGbrr95DAxBIRKFmr4BUm5OxXWMUAhUAsduS0iF2Pa7FagrbAPrJxZ2KPNs= ;{id = 2854}
SECTION ADDITIONAL
ns.example.com. IN A 1.2.3.4
ns.example.com. 3600 IN RRSIG A 3 3 3600 20070926134150 20070829134150 2854 example.com. MC0CFQCQMyTjn7WWwpwAR1LlVeLpRgZGuQIUCcJDEkwAuzytTDRlYK7nIMwH1CM= ;{id = 2854}
ENTRY_END
SCENARIO_END
dnssecjava-1.1.3/src/test/resources/unbound/val_positive_wc_nodeny.rpl 0000664 0000000 0000000 00000011533 13020541473 0026361 0 ustar 00root root 0000000 0000000 ; config options
; The island of trust is at example.com
server:
trust-anchor: "example.com. 3600 IN DS 2854 3 1 46e4ffc6e9a4793b488954bd3f0cc6af0dfb201b"
val-override-date: "20070916134226"
target-fetch-policy: "0 0 0 0 0"
stub-zone:
name: "."
stub-addr: 193.0.14.129 # K.ROOT-SERVERS.NET.
CONFIG_END
SCENARIO_BEGIN Test validator with positive wildcard without qname denial
; K.ROOT-SERVERS.NET.
RANGE_BEGIN 0 100
ADDRESS 193.0.14.129
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
. IN NS
SECTION ANSWER
. IN NS K.ROOT-SERVERS.NET.
SECTION ADDITIONAL
K.ROOT-SERVERS.NET. IN A 193.0.14.129
ENTRY_END
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
www.example.com. IN A
SECTION AUTHORITY
com. IN NS a.gtld-servers.net.
SECTION ADDITIONAL
a.gtld-servers.net. IN A 192.5.6.30
ENTRY_END
RANGE_END
; a.gtld-servers.net.
RANGE_BEGIN 0 100
ADDRESS 192.5.6.30
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
com. IN NS
SECTION ANSWER
com. IN NS a.gtld-servers.net.
SECTION ADDITIONAL
a.gtld-servers.net. IN A 192.5.6.30
ENTRY_END
ENTRY_BEGIN
MATCH opcode subdomain
ADJUST copy_id copy_query
REPLY QR NOERROR
SECTION QUESTION
example.com. IN A
SECTION AUTHORITY
example.com. IN NS ns.example.com.
SECTION ADDITIONAL
ns.example.com. IN A 1.2.3.4
ENTRY_END
RANGE_END
; ns.example.com.
RANGE_BEGIN 0 100
ADDRESS 1.2.3.4
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR AA REFUSED
SECTION QUESTION
ns.example.com. IN A
ENTRY_END
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR AA REFUSED
SECTION QUESTION
ns.example.com. IN AAAA
ENTRY_END
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
example.com. IN NS
SECTION ANSWER
example.com. IN NS ns.example.com.
example.com. 3600 IN RRSIG NS 3 2 3600 20070926134150 20070829134150 2854 example.com. MC0CFQCN+qHdJxoI/2tNKwsb08pra/G7aAIUAWA5sDdJTbrXA1/3OaesGBAO3sI= ;{id = 2854}
SECTION ADDITIONAL
ns.example.com. IN A 1.2.3.4
ns.example.com. 3600 IN RRSIG A 3 3 3600 20070926135752 20070829135752 2854 example.com. MC0CFQCMSWxVehgOQLoYclB9PIAbNP229AIUeH0vNNGJhjnZiqgIOKvs1EhzqAo= ;{id = 2854}
ENTRY_END
; response to DNSKEY priming query
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
example.com. IN DNSKEY
SECTION ANSWER
example.com. 3600 IN DNSKEY 256 3 3 ALXLUsWqUrY3JYER3T4TBJII s70j+sDS/UT2QRp61SE7S3E EXopNXoFE73JLRmvpi/UrOO/Vz4Se 6wXv/CYCKjGw06U4WRgR YXcpEhJROyNapmdIKSx hOzfLVE1gqA0PweZR8d tY3aNQSRn3sPpwJr6Mi /PqQKAMMrZ9ckJpf1+b QMOOvxgzz2U1GS18b3y ZKcgTMEaJzd/GZYzi/B N2DzQ0MsrSwYXfsNLFO Bbs8PJMW4LYIxeeOe6rUgkWOF 7CC9Dh/dduQ1QrsJhmZAEFfd6ByYV+ ;{id = 2854 (zsk), size = 1688b}
example.com. 3600 IN RRSIG DNSKEY 3 2 3600 20070926134802 20070829134802 2854 example.com. MCwCFG1yhRNtTEa3Eno2zhVVuy2EJX3wAhQeLyUp6+UXcpC5qGNu9tkrTEgPUg== ;{id = 2854}
SECTION AUTHORITY
example.com. IN NS ns.example.com.
example.com. 3600 IN RRSIG NS 3 2 3600 20070926134150 20070829134150 2854 example.com. MC0CFQCN+qHdJxoI/2tNKwsb08pra/G7aAIUAWA5sDdJTbrXA1/3OaesGBAO3sI= ;{id = 2854}
SECTION ADDITIONAL
ns.example.com. IN A 1.2.3.4
ns.example.com. 3600 IN RRSIG A 3 3 3600 20070926135752 20070829135752 2854 example.com. MC0CFQCMSWxVehgOQLoYclB9PIAbNP229AIUeH0vNNGJhjnZiqgIOKvs1EhzqAo= ;{id = 2854}
ENTRY_END
; response to query of interest
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
www.example.com. IN A
SECTION ANSWER
; from
; *.example.com. IN A 10.20.30.40
www.example.com. IN A 10.20.30.40
www.example.com. 3600 IN RRSIG A 3 2 3600 20070926135752 20070829135752 2854 example.com. MCwCFFi0g6v/20JyUxoQq7XM0iQnaMMOAhRjhUCLZjMqR1tj2MGGOgfhb1BSyw== ;{id = 2854}
SECTION AUTHORITY
example.com. IN NS ns.example.com.
example.com. 3600 IN RRSIG NS 3 2 3600 20070926134150 20070829134150 2854 example.com. MC0CFQCN+qHdJxoI/2tNKwsb08pra/G7aAIUAWA5sDdJTbrXA1/3OaesGBAO3sI= ;{id = 2854}
; denies www.example.com.
; ns.example.com. IN NSEC zork.example.com. A RRSIG NSEC
; ns.example.com. 3600 IN RRSIG NSEC 3 3 3600 20070926135752 20070829135752 2854 example.com. MC0CFGbrr95DAxBIRKFmr4BUm5OxXWMUAhUAsduS0iF2Pa7FagrbAPrJxZ2KPNs= ;{id = 2854}
SECTION ADDITIONAL
ns.example.com. IN A 1.2.3.4
ns.example.com. 3600 IN RRSIG A 3 3 3600 20070926134150 20070829134150 2854 example.com. MC0CFQCQMyTjn7WWwpwAR1LlVeLpRgZGuQIUCcJDEkwAuzytTDRlYK7nIMwH1CM= ;{id = 2854}
ENTRY_END
RANGE_END
STEP 1 QUERY
ENTRY_BEGIN
REPLY RD
SECTION QUESTION
www.example.com. IN A
ENTRY_END
; recursion happens here.
STEP 10 CHECK_ANSWER
ENTRY_BEGIN
MATCH all
REPLY QR RD RA SERVFAIL
SECTION QUESTION
www.example.com. IN A
SECTION ANSWER
SECTION AUTHORITY
SECTION ADDITIONAL
ENTRY_END
SCENARIO_END
dnssecjava-1.1.3/src/test/resources/unbound/val_qds_badanc.rpl 0000664 0000000 0000000 00000017764 13020541473 0024545 0 ustar 00root root 0000000 0000000 ; config options
; The island of trust is at example.com
server:
trust-anchor: "sub.example.com. 3600 IN DS 30899 RSASHA1 1 f7ed618f24d5e5202927e1d27bc2e84a141cb4b3"
val-override-date: "20070916134226"
target-fetch-policy: "0 0 0 0 0"
stub-zone:
name: "."
stub-addr: 193.0.14.129 # K.ROOT-SERVERS.NET.
CONFIG_END
SCENARIO_BEGIN Test validator with DS query and a bad anchor
; The anchor is the wrong side of the zone cut; no parent anchor.
; K.ROOT-SERVERS.NET.
RANGE_BEGIN 0 100
ADDRESS 193.0.14.129
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
. IN NS
SECTION ANSWER
. IN NS K.ROOT-SERVERS.NET.
SECTION ADDITIONAL
K.ROOT-SERVERS.NET. IN A 193.0.14.129
ENTRY_END
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
sub.example.com. IN DS
SECTION AUTHORITY
com. IN NS a.gtld-servers.net.
SECTION ADDITIONAL
a.gtld-servers.net. IN A 192.5.6.30
ENTRY_END
RANGE_END
; a.gtld-servers.net.
RANGE_BEGIN 0 100
ADDRESS 192.5.6.30
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
com. IN NS
SECTION ANSWER
com. IN NS a.gtld-servers.net.
SECTION ADDITIONAL
a.gtld-servers.net. IN A 192.5.6.30
ENTRY_END
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
sub.example.com. IN DS
SECTION AUTHORITY
example.com. IN NS ns.example.com.
SECTION ADDITIONAL
ns.example.com. IN A 1.2.3.4
ENTRY_END
RANGE_END
; ns.example.com.
RANGE_BEGIN 0 100
ADDRESS 1.2.3.4
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
example.com. IN NS
SECTION ANSWER
example.com. IN NS ns.example.com.
example.com. 3600 IN RRSIG NS 3 2 3600 20070926134150 20070829134150 2854 example.com. MC0CFQCN+qHdJxoI/2tNKwsb08pra/G7aAIUAWA5sDdJTbrXA1/3OaesGBAO3sI= ;{id = 2854}
SECTION ADDITIONAL
ns.example.com. IN A 1.2.3.4
ns.example.com. 3600 IN RRSIG A 3 3 3600 20070926135752 20070829135752 2854 example.com. MC0CFQCMSWxVehgOQLoYclB9PIAbNP229AIUeH0vNNGJhjnZiqgIOKvs1EhzqAo= ;{id = 2854}
ENTRY_END
; response to DNSKEY priming query
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
example.com. IN DNSKEY
SECTION ANSWER
example.com. 3600 IN DNSKEY 256 3 3 ALXLUsWqUrY3JYER3T4TBJII s70j+sDS/UT2QRp61SE7S3E EXopNXoFE73JLRmvpi/UrOO/Vz4Se 6wXv/CYCKjGw06U4WRgR YXcpEhJROyNapmdIKSx hOzfLVE1gqA0PweZR8d tY3aNQSRn3sPpwJr6Mi /PqQKAMMrZ9ckJpf1+b QMOOvxgzz2U1GS18b3y ZKcgTMEaJzd/GZYzi/B N2DzQ0MsrSwYXfsNLFO Bbs8PJMW4LYIxeeOe6rUgkWOF 7CC9Dh/dduQ1QrsJhmZAEFfd6ByYV+ ;{id = 2854 (zsk), size = 1688b}
example.com. 3600 IN RRSIG DNSKEY DSA 2 3600 20070926134150 20070829134150 2854 example.com. MCwCFBQRtlR4BEv9ohi+PGFjp+AHsJuHAhRCvz0shggvnvI88DFnBDCczHUcVA== ;{id = 2854}
SECTION AUTHORITY
example.com. IN NS ns.example.com.
example.com. 3600 IN RRSIG NS 3 2 3600 20070926134150 20070829134150 2854 example.com. MC0CFQCN+qHdJxoI/2tNKwsb08pra/G7aAIUAWA5sDdJTbrXA1/3OaesGBAO3sI= ;{id = 2854}
SECTION ADDITIONAL
ns.example.com. IN A 1.2.3.4
ns.example.com. 3600 IN RRSIG A 3 3 3600 20070926135752 20070829135752 2854 example.com. MC0CFQCMSWxVehgOQLoYclB9PIAbNP229AIUeH0vNNGJhjnZiqgIOKvs1EhzqAo= ;{id = 2854}
ENTRY_END
; response for delegation to sub.example.com.
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
www.sub.example.com. IN A
SECTION ANSWER
SECTION AUTHORITY
sub.example.com. IN NS ns.sub.example.com.
sub.example.com. 3600 IN DS 30899 RSASHA1 1 f7ed618f24d5e5202927e1d27bc2e84a141cb4b3
sub.example.com. 3600 IN RRSIG DS 3 3 3600 20070926134150 20070829134150 2854 example.com. MCwCFCW3ix0GD4BSvNLWIbROCJt5DAW9AhRt/kg9kBKJ20UBUdumrBUHqnskdA== ;{id = 2854}
SECTION ADDITIONAL
ns.sub.example.com. IN A 1.2.3.6
ENTRY_END
; response for delegation to sub.example.com.
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
sub.example.com. IN DNSKEY
SECTION ANSWER
SECTION AUTHORITY
sub.example.com. IN NS ns.sub.example.com.
sub.example.com. 3600 IN DS 30899 RSASHA1 1 f7ed618f24d5e5202927e1d27bc2e84a141cb4b3
sub.example.com. 3600 IN RRSIG DS 3 3 3600 20070926134150 20070829134150 2854 example.com. MCwCFCW3ix0GD4BSvNLWIbROCJt5DAW9AhRt/kg9kBKJ20UBUdumrBUHqnskdA== ;{id = 2854}
SECTION ADDITIONAL
ns.sub.example.com. IN A 1.2.3.6
ENTRY_END
; response to DS query
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
sub.example.com. IN DS
SECTION ANSWER
sub.example.com. 3600 IN DS 30899 RSASHA1 1 f7ed618f24d5e5202927e1d27bc2e84a141cb4b3
sub.example.com. 3600 IN RRSIG DS 3 3 3600 20070926134150 20070829134150 2854 example.com. MCwCFCW3ix0GD4BSvNLWIbROCJt5DAW9AhRt/kg9kBKJ20UBUdumrBUHqnskdA== ;{id = 2854}
SECTION AUTHORITY
example.com. IN NS ns.example.com.
example.com. 3600 IN RRSIG NS 3 2 3600 20070926134150 20070829134150 2854 example.com. MC0CFQCN+qHdJxoI/2tNKwsb08pra/G7aAIUAWA5sDdJTbrXA1/3OaesGBAO3sI= ;{id = 2854}
SECTION ADDITIONAL
ns.example.com. IN A 1.2.3.4
ns.example.com. 3600 IN RRSIG A 3 3 3600 20070926135752 20070829135752 2854 example.com. MC0CFQCMSWxVehgOQLoYclB9PIAbNP229AIUeH0vNNGJhjnZiqgIOKvs1EhzqAo= ;{id = 2854}
ENTRY_END
RANGE_END
; ns.sub.example.com.
RANGE_BEGIN 0 100
ADDRESS 1.2.3.6
; response to DNSKEY priming query
; sub.example.com. 3600 IN DS 30899 RSASHA1 1 f7ed618f24d5e5202927e1d27bc2e84a141cb4b3
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
sub.example.com. IN DNSKEY
SECTION ANSWER
sub.example.com. 3600 IN DNSKEY 256 3 5 AQPQ41chR9DEHt/aIzIFAqanbDlRflJoRs5yz1jFsoRIT7dWf0r+PeDuewdxkszNH6wnU4QL8pfKFRh5PIYVBLK3 ;{id = 30899 (zsk), size = 512b}
sub.example.com. 3600 IN RRSIG DNSKEY 5 3 3600 20070926134150 20070829134150 30899 sub.example.com. uNGp99iznjD7oOX02XnQbDnbg75UwBHRvZSKYUorTKvPUnCWMHKdRsQ+mf+Fx3GZ+Fz9BVjoCmQqpnfgXLEYqw== ;{id = 30899}
SECTION AUTHORITY
sub.example.com. IN NS ns.sub.example.com.
sub.example.com. 3600 IN RRSIG NS 5 3 3600 20070926134150 20070829134150 30899 sub.example.com. wcpHeBILHfo8C9uxMhcW03gcURZeUffiKdSTb50ZjzTHgMNhRyMfpcvSpXEd9548A9UTmWKeLZChfr5Z/glONw== ;{id = 30899}
SECTION ADDITIONAL
ns.sub.example.com. IN A 1.2.3.6
ns.sub.example.com. 3600 IN RRSIG A 5 4 3600 20070926134150 20070829134150 30899 sub.example.com. UF7shD/gt1FOp2UHgLTNbPzVykklSXFMEtJ1xD+Hholwf/PIzd7zoaIttIYibNa4fUXCqMg22H9P7MRhfmFe6g== ;{id = 30899}
ENTRY_END
; response to query of interest
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
www.sub.example.com. IN A
SECTION ANSWER
www.sub.example.com. IN A 11.11.11.11
www.sub.example.com. 3600 IN RRSIG A 5 4 3600 20070926134150 20070829134150 30899 sub.example.com. 0DqqRfRtm7VSEQ4mmBbzrKRqQAay3JAE8DPDGmjtokrrjN9F1G/HxozDV7bjdIh2EChlQea8FPwf/GepJMUVxg== ;{id = 30899}
SECTION AUTHORITY
SECTION ADDITIONAL
ENTRY_END
RANGE_END
STEP 1 QUERY
ENTRY_BEGIN
REPLY RD DO
SECTION QUESTION
sub.example.com. IN DS
ENTRY_END
; recursion happens here.
STEP 10 CHECK_ANSWER
ENTRY_BEGIN
MATCH all
REPLY QR RD RA NOERROR
SECTION QUESTION
sub.example.com. IN DS
SECTION ANSWER
sub.example.com. 3600 IN DS 30899 RSASHA1 1 f7ed618f24d5e5202927e1d27bc2e84a141cb4b3
sub.example.com. 3600 IN RRSIG DS 3 3 3600 20070926134150 20070829134150 2854 example.com. MCwCFCW3ix0GD4BSvNLWIbROCJt5DAW9AhRt/kg9kBKJ20UBUdumrBUHqnskdA== ;{id = 2854}
SECTION AUTHORITY
example.com. IN NS ns.example.com.
example.com. 3600 IN RRSIG NS 3 2 3600 20070926134150 20070829134150 2854 example.com. MC0CFQCN+qHdJxoI/2tNKwsb08pra/G7aAIUAWA5sDdJTbrXA1/3OaesGBAO3sI= ;{id = 2854}
SECTION ADDITIONAL
ns.example.com. IN A 1.2.3.4
ns.example.com. 3600 IN RRSIG A 3 3 3600 20070926135752 20070829135752 2854 example.com. MC0CFQCMSWxVehgOQLoYclB9PIAbNP229AIUeH0vNNGJhjnZiqgIOKvs1EhzqAo= ;{id = 2854}
ENTRY_END
SCENARIO_END
dnssecjava-1.1.3/src/test/resources/unbound/val_qds_oneanc.rpl 0000664 0000000 0000000 00000017644 13020541473 0024575 0 ustar 00root root 0000000 0000000 ; config options
; The island of trust is at example.com
server:
trust-anchor: "example.com. 3600 IN DS 2854 3 1 46e4ffc6e9a4793b488954bd3f0cc6af0dfb201b"
val-override-date: "20070916134226"
target-fetch-policy: "0 0 0 0 0"
stub-zone:
name: "."
stub-addr: 193.0.14.129 # K.ROOT-SERVERS.NET.
CONFIG_END
SCENARIO_BEGIN Test validator with DS query and one anchor
; K.ROOT-SERVERS.NET.
RANGE_BEGIN 0 100
ADDRESS 193.0.14.129
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
. IN NS
SECTION ANSWER
. IN NS K.ROOT-SERVERS.NET.
SECTION ADDITIONAL
K.ROOT-SERVERS.NET. IN A 193.0.14.129
ENTRY_END
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
sub.example.com. IN DS
SECTION AUTHORITY
com. IN NS a.gtld-servers.net.
SECTION ADDITIONAL
a.gtld-servers.net. IN A 192.5.6.30
ENTRY_END
RANGE_END
; a.gtld-servers.net.
RANGE_BEGIN 0 100
ADDRESS 192.5.6.30
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
com. IN NS
SECTION ANSWER
com. IN NS a.gtld-servers.net.
SECTION ADDITIONAL
a.gtld-servers.net. IN A 192.5.6.30
ENTRY_END
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
sub.example.com. IN DS
SECTION AUTHORITY
example.com. IN NS ns.example.com.
SECTION ADDITIONAL
ns.example.com. IN A 1.2.3.4
ENTRY_END
RANGE_END
; ns.example.com.
RANGE_BEGIN 0 100
ADDRESS 1.2.3.4
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
example.com. IN NS
SECTION ANSWER
example.com. IN NS ns.example.com.
example.com. 3600 IN RRSIG NS 3 2 3600 20070926134150 20070829134150 2854 example.com. MC0CFQCN+qHdJxoI/2tNKwsb08pra/G7aAIUAWA5sDdJTbrXA1/3OaesGBAO3sI= ;{id = 2854}
SECTION ADDITIONAL
ns.example.com. IN A 1.2.3.4
ns.example.com. 3600 IN RRSIG A 3 3 3600 20070926135752 20070829135752 2854 example.com. MC0CFQCMSWxVehgOQLoYclB9PIAbNP229AIUeH0vNNGJhjnZiqgIOKvs1EhzqAo= ;{id = 2854}
ENTRY_END
; response to DNSKEY priming query
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
example.com. IN DNSKEY
SECTION ANSWER
example.com. 3600 IN DNSKEY 256 3 3 ALXLUsWqUrY3JYER3T4TBJII s70j+sDS/UT2QRp61SE7S3E EXopNXoFE73JLRmvpi/UrOO/Vz4Se 6wXv/CYCKjGw06U4WRgR YXcpEhJROyNapmdIKSx hOzfLVE1gqA0PweZR8d tY3aNQSRn3sPpwJr6Mi /PqQKAMMrZ9ckJpf1+b QMOOvxgzz2U1GS18b3y ZKcgTMEaJzd/GZYzi/B N2DzQ0MsrSwYXfsNLFO Bbs8PJMW4LYIxeeOe6rUgkWOF 7CC9Dh/dduQ1QrsJhmZAEFfd6ByYV+ ;{id = 2854 (zsk), size = 1688b}
example.com. 3600 IN RRSIG DNSKEY DSA 2 3600 20070926134150 20070829134150 2854 example.com. MCwCFBQRtlR4BEv9ohi+PGFjp+AHsJuHAhRCvz0shggvnvI88DFnBDCczHUcVA== ;{id = 2854}
SECTION AUTHORITY
example.com. IN NS ns.example.com.
example.com. 3600 IN RRSIG NS 3 2 3600 20070926134150 20070829134150 2854 example.com. MC0CFQCN+qHdJxoI/2tNKwsb08pra/G7aAIUAWA5sDdJTbrXA1/3OaesGBAO3sI= ;{id = 2854}
SECTION ADDITIONAL
ns.example.com. IN A 1.2.3.4
ns.example.com. 3600 IN RRSIG A 3 3 3600 20070926135752 20070829135752 2854 example.com. MC0CFQCMSWxVehgOQLoYclB9PIAbNP229AIUeH0vNNGJhjnZiqgIOKvs1EhzqAo= ;{id = 2854}
ENTRY_END
; response for delegation to sub.example.com.
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
www.sub.example.com. IN A
SECTION ANSWER
SECTION AUTHORITY
sub.example.com. IN NS ns.sub.example.com.
sub.example.com. 3600 IN DS 30899 RSASHA1 1 f7ed618f24d5e5202927e1d27bc2e84a141cb4b3
sub.example.com. 3600 IN RRSIG DS 3 3 3600 20070926134150 20070829134150 2854 example.com. MCwCFCW3ix0GD4BSvNLWIbROCJt5DAW9AhRt/kg9kBKJ20UBUdumrBUHqnskdA== ;{id = 2854}
SECTION ADDITIONAL
ns.sub.example.com. IN A 1.2.3.6
ENTRY_END
; response for delegation to sub.example.com.
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
sub.example.com. IN DNSKEY
SECTION ANSWER
SECTION AUTHORITY
sub.example.com. IN NS ns.sub.example.com.
sub.example.com. 3600 IN DS 30899 RSASHA1 1 f7ed618f24d5e5202927e1d27bc2e84a141cb4b3
sub.example.com. 3600 IN RRSIG DS 3 3 3600 20070926134150 20070829134150 2854 example.com. MCwCFCW3ix0GD4BSvNLWIbROCJt5DAW9AhRt/kg9kBKJ20UBUdumrBUHqnskdA== ;{id = 2854}
SECTION ADDITIONAL
ns.sub.example.com. IN A 1.2.3.6
ENTRY_END
; response to DS query
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
sub.example.com. IN DS
SECTION ANSWER
sub.example.com. 3600 IN DS 30899 RSASHA1 1 f7ed618f24d5e5202927e1d27bc2e84a141cb4b3
sub.example.com. 3600 IN RRSIG DS 3 3 3600 20070926134150 20070829134150 2854 example.com. MCwCFCW3ix0GD4BSvNLWIbROCJt5DAW9AhRt/kg9kBKJ20UBUdumrBUHqnskdA== ;{id = 2854}
SECTION AUTHORITY
example.com. IN NS ns.example.com.
example.com. 3600 IN RRSIG NS 3 2 3600 20070926134150 20070829134150 2854 example.com. MC0CFQCN+qHdJxoI/2tNKwsb08pra/G7aAIUAWA5sDdJTbrXA1/3OaesGBAO3sI= ;{id = 2854}
SECTION ADDITIONAL
ns.example.com. IN A 1.2.3.4
ns.example.com. 3600 IN RRSIG A 3 3 3600 20070926135752 20070829135752 2854 example.com. MC0CFQCMSWxVehgOQLoYclB9PIAbNP229AIUeH0vNNGJhjnZiqgIOKvs1EhzqAo= ;{id = 2854}
ENTRY_END
RANGE_END
; ns.sub.example.com.
RANGE_BEGIN 0 100
ADDRESS 1.2.3.6
; response to DNSKEY priming query
; sub.example.com. 3600 IN DS 30899 RSASHA1 1 f7ed618f24d5e5202927e1d27bc2e84a141cb4b3
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
sub.example.com. IN DNSKEY
SECTION ANSWER
sub.example.com. 3600 IN DNSKEY 256 3 5 AQPQ41chR9DEHt/aIzIFAqanbDlRflJoRs5yz1jFsoRIT7dWf0r+PeDuewdxkszNH6wnU4QL8pfKFRh5PIYVBLK3 ;{id = 30899 (zsk), size = 512b}
sub.example.com. 3600 IN RRSIG DNSKEY 5 3 3600 20070926134150 20070829134150 30899 sub.example.com. uNGp99iznjD7oOX02XnQbDnbg75UwBHRvZSKYUorTKvPUnCWMHKdRsQ+mf+Fx3GZ+Fz9BVjoCmQqpnfgXLEYqw== ;{id = 30899}
SECTION AUTHORITY
sub.example.com. IN NS ns.sub.example.com.
sub.example.com. 3600 IN RRSIG NS 5 3 3600 20070926134150 20070829134150 30899 sub.example.com. wcpHeBILHfo8C9uxMhcW03gcURZeUffiKdSTb50ZjzTHgMNhRyMfpcvSpXEd9548A9UTmWKeLZChfr5Z/glONw== ;{id = 30899}
SECTION ADDITIONAL
ns.sub.example.com. IN A 1.2.3.6
ns.sub.example.com. 3600 IN RRSIG A 5 4 3600 20070926134150 20070829134150 30899 sub.example.com. UF7shD/gt1FOp2UHgLTNbPzVykklSXFMEtJ1xD+Hholwf/PIzd7zoaIttIYibNa4fUXCqMg22H9P7MRhfmFe6g== ;{id = 30899}
ENTRY_END
; response to query of interest
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
www.sub.example.com. IN A
SECTION ANSWER
www.sub.example.com. IN A 11.11.11.11
www.sub.example.com. 3600 IN RRSIG A 5 4 3600 20070926134150 20070829134150 30899 sub.example.com. 0DqqRfRtm7VSEQ4mmBbzrKRqQAay3JAE8DPDGmjtokrrjN9F1G/HxozDV7bjdIh2EChlQea8FPwf/GepJMUVxg== ;{id = 30899}
SECTION AUTHORITY
SECTION ADDITIONAL
ENTRY_END
RANGE_END
STEP 1 QUERY
ENTRY_BEGIN
REPLY RD DO
SECTION QUESTION
sub.example.com. IN DS
ENTRY_END
; recursion happens here.
STEP 10 CHECK_ANSWER
ENTRY_BEGIN
MATCH all
REPLY QR RD RA AD NOERROR
SECTION QUESTION
sub.example.com. IN DS
SECTION ANSWER
sub.example.com. 3600 IN DS 30899 RSASHA1 1 f7ed618f24d5e5202927e1d27bc2e84a141cb4b3
sub.example.com. 3600 IN RRSIG DS 3 3 3600 20070926134150 20070829134150 2854 example.com. MCwCFCW3ix0GD4BSvNLWIbROCJt5DAW9AhRt/kg9kBKJ20UBUdumrBUHqnskdA== ;{id = 2854}
SECTION AUTHORITY
example.com. IN NS ns.example.com.
example.com. 3600 IN RRSIG NS 3 2 3600 20070926134150 20070829134150 2854 example.com. MC0CFQCN+qHdJxoI/2tNKwsb08pra/G7aAIUAWA5sDdJTbrXA1/3OaesGBAO3sI= ;{id = 2854}
SECTION ADDITIONAL
ns.example.com. IN A 1.2.3.4
ns.example.com. 3600 IN RRSIG A 3 3 3600 20070926135752 20070829135752 2854 example.com. MC0CFQCMSWxVehgOQLoYclB9PIAbNP229AIUeH0vNNGJhjnZiqgIOKvs1EhzqAo= ;{id = 2854}
ENTRY_END
SCENARIO_END
dnssecjava-1.1.3/src/test/resources/unbound/val_qds_twoanc.rpl 0000664 0000000 0000000 00000020037 13020541473 0024613 0 ustar 00root root 0000000 0000000 ; config options
; The island of trust is at example.com
server:
trust-anchor: "example.com. 3600 IN DS 2854 3 1 46e4ffc6e9a4793b488954bd3f0cc6af0dfb201b"
trust-anchor: "sub.example.com. 3600 IN DS 30899 RSASHA1 1 f7ed618f24d5e5202927e1d27bc2e84a141cb4b3"
val-override-date: "20070916134226"
target-fetch-policy: "0 0 0 0 0"
stub-zone:
name: "."
stub-addr: 193.0.14.129 # K.ROOT-SERVERS.NET.
CONFIG_END
SCENARIO_BEGIN Test validator with DS query and two anchors
; K.ROOT-SERVERS.NET.
RANGE_BEGIN 0 100
ADDRESS 193.0.14.129
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
. IN NS
SECTION ANSWER
. IN NS K.ROOT-SERVERS.NET.
SECTION ADDITIONAL
K.ROOT-SERVERS.NET. IN A 193.0.14.129
ENTRY_END
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
sub.example.com. IN DS
SECTION AUTHORITY
com. IN NS a.gtld-servers.net.
SECTION ADDITIONAL
a.gtld-servers.net. IN A 192.5.6.30
ENTRY_END
RANGE_END
; a.gtld-servers.net.
RANGE_BEGIN 0 100
ADDRESS 192.5.6.30
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
com. IN NS
SECTION ANSWER
com. IN NS a.gtld-servers.net.
SECTION ADDITIONAL
a.gtld-servers.net. IN A 192.5.6.30
ENTRY_END
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
sub.example.com. IN DS
SECTION AUTHORITY
example.com. IN NS ns.example.com.
SECTION ADDITIONAL
ns.example.com. IN A 1.2.3.4
ENTRY_END
RANGE_END
; ns.example.com.
RANGE_BEGIN 0 100
ADDRESS 1.2.3.4
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
example.com. IN NS
SECTION ANSWER
example.com. IN NS ns.example.com.
example.com. 3600 IN RRSIG NS 3 2 3600 20070926134150 20070829134150 2854 example.com. MC0CFQCN+qHdJxoI/2tNKwsb08pra/G7aAIUAWA5sDdJTbrXA1/3OaesGBAO3sI= ;{id = 2854}
SECTION ADDITIONAL
ns.example.com. IN A 1.2.3.4
ns.example.com. 3600 IN RRSIG A 3 3 3600 20070926135752 20070829135752 2854 example.com. MC0CFQCMSWxVehgOQLoYclB9PIAbNP229AIUeH0vNNGJhjnZiqgIOKvs1EhzqAo= ;{id = 2854}
ENTRY_END
; response to DNSKEY priming query
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
example.com. IN DNSKEY
SECTION ANSWER
example.com. 3600 IN DNSKEY 256 3 3 ALXLUsWqUrY3JYER3T4TBJII s70j+sDS/UT2QRp61SE7S3E EXopNXoFE73JLRmvpi/UrOO/Vz4Se 6wXv/CYCKjGw06U4WRgR YXcpEhJROyNapmdIKSx hOzfLVE1gqA0PweZR8d tY3aNQSRn3sPpwJr6Mi /PqQKAMMrZ9ckJpf1+b QMOOvxgzz2U1GS18b3y ZKcgTMEaJzd/GZYzi/B N2DzQ0MsrSwYXfsNLFO Bbs8PJMW4LYIxeeOe6rUgkWOF 7CC9Dh/dduQ1QrsJhmZAEFfd6ByYV+ ;{id = 2854 (zsk), size = 1688b}
example.com. 3600 IN RRSIG DNSKEY DSA 2 3600 20070926134150 20070829134150 2854 example.com. MCwCFBQRtlR4BEv9ohi+PGFjp+AHsJuHAhRCvz0shggvnvI88DFnBDCczHUcVA== ;{id = 2854}
SECTION AUTHORITY
example.com. IN NS ns.example.com.
example.com. 3600 IN RRSIG NS 3 2 3600 20070926134150 20070829134150 2854 example.com. MC0CFQCN+qHdJxoI/2tNKwsb08pra/G7aAIUAWA5sDdJTbrXA1/3OaesGBAO3sI= ;{id = 2854}
SECTION ADDITIONAL
ns.example.com. IN A 1.2.3.4
ns.example.com. 3600 IN RRSIG A 3 3 3600 20070926135752 20070829135752 2854 example.com. MC0CFQCMSWxVehgOQLoYclB9PIAbNP229AIUeH0vNNGJhjnZiqgIOKvs1EhzqAo= ;{id = 2854}
ENTRY_END
; response for delegation to sub.example.com.
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
www.sub.example.com. IN A
SECTION ANSWER
SECTION AUTHORITY
sub.example.com. IN NS ns.sub.example.com.
sub.example.com. 3600 IN DS 30899 RSASHA1 1 f7ed618f24d5e5202927e1d27bc2e84a141cb4b3
sub.example.com. 3600 IN RRSIG DS 3 3 3600 20070926134150 20070829134150 2854 example.com. MCwCFCW3ix0GD4BSvNLWIbROCJt5DAW9AhRt/kg9kBKJ20UBUdumrBUHqnskdA== ;{id = 2854}
SECTION ADDITIONAL
ns.sub.example.com. IN A 1.2.3.6
ENTRY_END
; response for delegation to sub.example.com.
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
sub.example.com. IN DNSKEY
SECTION ANSWER
SECTION AUTHORITY
sub.example.com. IN NS ns.sub.example.com.
sub.example.com. 3600 IN DS 30899 RSASHA1 1 f7ed618f24d5e5202927e1d27bc2e84a141cb4b3
sub.example.com. 3600 IN RRSIG DS 3 3 3600 20070926134150 20070829134150 2854 example.com. MCwCFCW3ix0GD4BSvNLWIbROCJt5DAW9AhRt/kg9kBKJ20UBUdumrBUHqnskdA== ;{id = 2854}
SECTION ADDITIONAL
ns.sub.example.com. IN A 1.2.3.6
ENTRY_END
; response to DS query
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
sub.example.com. IN DS
SECTION ANSWER
sub.example.com. 3600 IN DS 30899 RSASHA1 1 f7ed618f24d5e5202927e1d27bc2e84a141cb4b3
sub.example.com. 3600 IN RRSIG DS 3 3 3600 20070926134150 20070829134150 2854 example.com. MCwCFCW3ix0GD4BSvNLWIbROCJt5DAW9AhRt/kg9kBKJ20UBUdumrBUHqnskdA== ;{id = 2854}
SECTION AUTHORITY
example.com. IN NS ns.example.com.
example.com. 3600 IN RRSIG NS 3 2 3600 20070926134150 20070829134150 2854 example.com. MC0CFQCN+qHdJxoI/2tNKwsb08pra/G7aAIUAWA5sDdJTbrXA1/3OaesGBAO3sI= ;{id = 2854}
SECTION ADDITIONAL
ns.example.com. IN A 1.2.3.4
ns.example.com. 3600 IN RRSIG A 3 3 3600 20070926135752 20070829135752 2854 example.com. MC0CFQCMSWxVehgOQLoYclB9PIAbNP229AIUeH0vNNGJhjnZiqgIOKvs1EhzqAo= ;{id = 2854}
ENTRY_END
RANGE_END
; ns.sub.example.com.
RANGE_BEGIN 0 100
ADDRESS 1.2.3.6
; response to DNSKEY priming query
; sub.example.com. 3600 IN DS 30899 RSASHA1 1 f7ed618f24d5e5202927e1d27bc2e84a141cb4b3
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
sub.example.com. IN DNSKEY
SECTION ANSWER
sub.example.com. 3600 IN DNSKEY 256 3 5 AQPQ41chR9DEHt/aIzIFAqanbDlRflJoRs5yz1jFsoRIT7dWf0r+PeDuewdxkszNH6wnU4QL8pfKFRh5PIYVBLK3 ;{id = 30899 (zsk), size = 512b}
sub.example.com. 3600 IN RRSIG DNSKEY 5 3 3600 20070926134150 20070829134150 30899 sub.example.com. uNGp99iznjD7oOX02XnQbDnbg75UwBHRvZSKYUorTKvPUnCWMHKdRsQ+mf+Fx3GZ+Fz9BVjoCmQqpnfgXLEYqw== ;{id = 30899}
SECTION AUTHORITY
sub.example.com. IN NS ns.sub.example.com.
sub.example.com. 3600 IN RRSIG NS 5 3 3600 20070926134150 20070829134150 30899 sub.example.com. wcpHeBILHfo8C9uxMhcW03gcURZeUffiKdSTb50ZjzTHgMNhRyMfpcvSpXEd9548A9UTmWKeLZChfr5Z/glONw== ;{id = 30899}
SECTION ADDITIONAL
ns.sub.example.com. IN A 1.2.3.6
ns.sub.example.com. 3600 IN RRSIG A 5 4 3600 20070926134150 20070829134150 30899 sub.example.com. UF7shD/gt1FOp2UHgLTNbPzVykklSXFMEtJ1xD+Hholwf/PIzd7zoaIttIYibNa4fUXCqMg22H9P7MRhfmFe6g== ;{id = 30899}
ENTRY_END
; response to query of interest
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
www.sub.example.com. IN A
SECTION ANSWER
www.sub.example.com. IN A 11.11.11.11
www.sub.example.com. 3600 IN RRSIG A 5 4 3600 20070926134150 20070829134150 30899 sub.example.com. 0DqqRfRtm7VSEQ4mmBbzrKRqQAay3JAE8DPDGmjtokrrjN9F1G/HxozDV7bjdIh2EChlQea8FPwf/GepJMUVxg== ;{id = 30899}
SECTION AUTHORITY
SECTION ADDITIONAL
ENTRY_END
RANGE_END
STEP 1 QUERY
ENTRY_BEGIN
REPLY RD DO
SECTION QUESTION
sub.example.com. IN DS
ENTRY_END
; recursion happens here.
STEP 10 CHECK_ANSWER
ENTRY_BEGIN
MATCH all
REPLY QR RD RA AD NOERROR
SECTION QUESTION
sub.example.com. IN DS
SECTION ANSWER
sub.example.com. 3600 IN DS 30899 RSASHA1 1 f7ed618f24d5e5202927e1d27bc2e84a141cb4b3
sub.example.com. 3600 IN RRSIG DS 3 3 3600 20070926134150 20070829134150 2854 example.com. MCwCFCW3ix0GD4BSvNLWIbROCJt5DAW9AhRt/kg9kBKJ20UBUdumrBUHqnskdA== ;{id = 2854}
SECTION AUTHORITY
example.com. IN NS ns.example.com.
example.com. 3600 IN RRSIG NS 3 2 3600 20070926134150 20070829134150 2854 example.com. MC0CFQCN+qHdJxoI/2tNKwsb08pra/G7aAIUAWA5sDdJTbrXA1/3OaesGBAO3sI= ;{id = 2854}
SECTION ADDITIONAL
ns.example.com. IN A 1.2.3.4
ns.example.com. 3600 IN RRSIG A 3 3 3600 20070926135752 20070829135752 2854 example.com. MC0CFQCMSWxVehgOQLoYclB9PIAbNP229AIUeH0vNNGJhjnZiqgIOKvs1EhzqAo= ;{id = 2854}
ENTRY_END
SCENARIO_END
dnssecjava-1.1.3/src/test/resources/unbound/val_refer_unsignadd.rpl 0000664 0000000 0000000 00000031112 13020541473 0025604 0 ustar 00root root 0000000 0000000 ; config options
; The island of trust is at example.com
server:
trust-anchor: "example.com. 3600 IN DS 2854 3 1 46e4ffc6e9a4793b488954bd3f0cc6af0dfb201b"
trust-anchor: "example.net. 3600 IN DNSKEY 256 3 5 AQPQ41chR9DEHt/aIzIFAqanbDlRflJoRs5yz1jFsoRIT7dWf0r+PeDuewdxkszNH6wnU4QL8pfKFRh5PIYVBLK3 ;{id = 30899 (zsk), size = 512b}"
val-override-date: "20070916134226"
access-control: 127.0.0.1 allow_snoop
target-fetch-policy: "0 0 0 0 0"
stub-zone:
name: "."
stub-addr: 193.0.14.129 # K.ROOT-SERVERS.NET.
CONFIG_END
SCENARIO_BEGIN Test validator with a referral with unsigned additional
; but the additional record is from a signed zone,
; and a proper proof for no DS or DSNKEY types is forthcoming.
; K.ROOT-SERVERS.NET.
RANGE_BEGIN 0 100
ADDRESS 193.0.14.129
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
. IN NS
SECTION ANSWER
. IN NS K.ROOT-SERVERS.NET.
SECTION ADDITIONAL
K.ROOT-SERVERS.NET. IN A 193.0.14.129
ENTRY_END
ENTRY_BEGIN
MATCH opcode qname
ADJUST copy_id copy_query
REPLY QR NOERROR
SECTION QUESTION
www.example.com. IN A
SECTION AUTHORITY
; Skip .com, to provide unsigned referral A record for ns.example.net
; and go straight to example.com.
example.com. IN NS ns.example.com.
example.com. IN NS ns.example.net.
SECTION ADDITIONAL
ns.example.com. IN A 1.2.3.4
ns.example.net. IN A 1.2.3.5
ENTRY_END
ENTRY_BEGIN
MATCH opcode qname
ADJUST copy_id copy_query
REPLY QR NOERROR
SECTION QUESTION
example.net. IN A
SECTION AUTHORITY
net. IN NS a.gtld-servers.net.
SECTION ADDITIONAL
a.gtld-servers.net. IN A 192.5.6.30
ENTRY_END
RANGE_END
; a.gtld-servers.net.
RANGE_BEGIN 0 100
ADDRESS 192.5.6.30
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
com. IN NS
SECTION ANSWER
com. IN NS a.gtld-servers.net.
SECTION ADDITIONAL
a.gtld-servers.net. IN A 192.5.6.30
ENTRY_END
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
net. IN NS
SECTION ANSWER
net. IN NS a.gtld-servers.net.
SECTION ADDITIONAL
a.gtld-servers.net. IN A 192.5.6.30
ENTRY_END
ENTRY_BEGIN
MATCH opcode qname
ADJUST copy_id copy_query
REPLY QR NOERROR
SECTION QUESTION
www.example.com. IN A
SECTION AUTHORITY
example.com. IN NS ns.example.com.
example.com. IN NS ns.example.net.
SECTION ADDITIONAL
ns.example.com. IN A 1.2.3.4
ns.example.net. IN A 1.2.3.5
ENTRY_END
ENTRY_BEGIN
MATCH opcode qname
ADJUST copy_id copy_query
REPLY QR NOERROR
SECTION QUESTION
example.net. IN A
SECTION AUTHORITY
example.net. IN NS ns.example.net.
SECTION ADDITIONAL
ns.example.net. IN A 1.2.3.5
ENTRY_END
RANGE_END
; ns.example.com.
RANGE_BEGIN 0 100
ADDRESS 1.2.3.4
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
example.com. IN NS
SECTION ANSWER
example.com. IN NS ns.example.com.
example.com. IN NS ns.example.net.
example.com. 3600 IN RRSIG NS 3 2 3600 20070926135752 20070829135752 2854 example.com. MCwCFEsWNXjGDFwH/0NGClonWUQlBaiFAhR/dt0asVj8M0VKs7PdTEKN/Y9i5w== ;{id = 2854}
SECTION ADDITIONAL
ns.example.com. IN A 1.2.3.4
ns.example.com. 3600 IN RRSIG A 3 3 3600 20070926135752 20070829135752 2854 example.com. MC0CFQCMSWxVehgOQLoYclB9PIAbNP229AIUeH0vNNGJhjnZiqgIOKvs1EhzqAo= ;{id = 2854}
ENTRY_END
; response to example.com. DNSKEY priming query
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
example.com. IN DNSKEY
SECTION ANSWER
example.com. 3600 IN DNSKEY 256 3 3 ALXLUsWqUrY3JYER3T4TBJII s70j+sDS/UT2QRp61SE7S3E EXopNXoFE73JLRmvpi/UrOO/Vz4Se 6wXv/CYCKjGw06U4WRgR YXcpEhJROyNapmdIKSx hOzfLVE1gqA0PweZR8d tY3aNQSRn3sPpwJr6Mi /PqQKAMMrZ9ckJpf1+b QMOOvxgzz2U1GS18b3y ZKcgTMEaJzd/GZYzi/B N2DzQ0MsrSwYXfsNLFO Bbs8PJMW4LYIxeeOe6rUgkWOF 7CC9Dh/dduQ1QrsJhmZAEFfd6ByYV+ ;{id = 2854 (zsk), size = 1688b}
example.com. 3600 IN RRSIG DNSKEY DSA 2 3600 20070926134150 20070829134150 2854 example.com. MCwCFBQRtlR4BEv9ohi+PGFjp+AHsJuHAhRCvz0shggvnvI88DFnBDCczHUcVA== ;{id = 2854}
SECTION AUTHORITY
example.com. IN NS ns.example.com.
example.com. IN NS ns.example.net.
example.com. 3600 IN RRSIG NS 3 2 3600 20070926135752 20070829135752 2854 example.com. MCwCFEsWNXjGDFwH/0NGClonWUQlBaiFAhR/dt0asVj8M0VKs7PdTEKN/Y9i5w== ;{id = 2854}
SECTION ADDITIONAL
ns.example.com. IN A 1.2.3.4
ns.example.com. 3600 IN RRSIG A 3 3 3600 20070926135752 20070829135752 2854 example.com. MC0CFQCMSWxVehgOQLoYclB9PIAbNP229AIUeH0vNNGJhjnZiqgIOKvs1EhzqAo= ;{id = 2854}
ENTRY_END
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
www.example.com. IN A
SECTION ANSWER
www.example.com. IN A 11.12.13.14
www.example.com. 3600 IN RRSIG A 3 3 3600 20070926135752 20070829135752 2854 example.com. MC0CFC6+BbFcL95vH6SOhMLGotcBospIAhUAhjfof+1VY5GsCp5b9UOD7UydBzI= ;{id = 2854}
SECTION AUTHORITY
SECTION ADDITIONAL
ENTRY_END
RANGE_END
; ns.example.net.
RANGE_BEGIN 0 100
ADDRESS 1.2.3.5
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
example.com. IN NS
SECTION ANSWER
example.com. IN NS ns.example.com.
example.com. IN NS ns.example.net.
example.com. 3600 IN RRSIG NS 3 2 3600 20070926135752 20070829135752 2854 example.com. MCwCFEsWNXjGDFwH/0NGClonWUQlBaiFAhR/dt0asVj8M0VKs7PdTEKN/Y9i5w== ;{id = 2854}
SECTION ADDITIONAL
ns.example.com. IN A 1.2.3.4
ns.example.com. 3600 IN RRSIG A 3 3 3600 20070926135752 20070829135752 2854 example.com. MC0CFQCMSWxVehgOQLoYclB9PIAbNP229AIUeH0vNNGJhjnZiqgIOKvs1EhzqAo= ;{id = 2854}
ENTRY_END
; example.com zone in ns.example.net.
; response to example.com. DNSKEY priming query
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
example.com. IN DNSKEY
SECTION ANSWER
example.com. 3600 IN DNSKEY 256 3 3 ALXLUsWqUrY3JYER3T4TBJII s70j+sDS/UT2QRp61SE7S3E EXopNXoFE73JLRmvpi/UrOO/Vz4Se 6wXv/CYCKjGw06U4WRgR YXcpEhJROyNapmdIKSx hOzfLVE1gqA0PweZR8d tY3aNQSRn3sPpwJr6Mi /PqQKAMMrZ9ckJpf1+b QMOOvxgzz2U1GS18b3y ZKcgTMEaJzd/GZYzi/B N2DzQ0MsrSwYXfsNLFO Bbs8PJMW4LYIxeeOe6rUgkWOF 7CC9Dh/dduQ1QrsJhmZAEFfd6ByYV+ ;{id = 2854 (zsk), size = 1688b}
example.com. 3600 IN RRSIG DNSKEY DSA 2 3600 20070926134150 20070829134150 2854 example.com. MCwCFBQRtlR4BEv9ohi+PGFjp+AHsJuHAhRCvz0shggvnvI88DFnBDCczHUcVA== ;{id = 2854}
SECTION AUTHORITY
example.com. IN NS ns.example.com.
example.com. IN NS ns.example.net.
example.com. 3600 IN RRSIG NS 3 2 3600 20070926135752 20070829135752 2854 example.com. MCwCFEsWNXjGDFwH/0NGClonWUQlBaiFAhR/dt0asVj8M0VKs7PdTEKN/Y9i5w== ;{id = 2854}
SECTION ADDITIONAL
ns.example.com. IN A 1.2.3.4
ns.example.com. 3600 IN RRSIG A 3 3 3600 20070926135752 20070829135752 2854 example.com. MC0CFQCMSWxVehgOQLoYclB9PIAbNP229AIUeH0vNNGJhjnZiqgIOKvs1EhzqAo= ;{id = 2854}
ENTRY_END
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
www.example.com. IN A
SECTION ANSWER
www.example.com. IN A 11.12.13.14
www.example.com. 3600 IN RRSIG A 3 3 3600 20070926135752 20070829135752 2854 example.com. MC0CFC6+BbFcL95vH6SOhMLGotcBospIAhUAhjfof+1VY5GsCp5b9UOD7UydBzI= ;{id = 2854}
SECTION AUTHORITY
SECTION ADDITIONAL
ENTRY_END
; example.net zone in ns.example.net.
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
example.net. IN NS
SECTION ANSWER
example.net. IN NS ns.example.net.
example.net. 3600 IN RRSIG NS RSASHA1 2 3600 20070926134150 20070829134150 30899 example.net. E8JX0l4B+cSR5bkHQwOJy1pBmlLMTYCJ8EwfNMU/eCv0YhKwo26rHhn52FGisgv+Nwp7/NbhHqQ+kJgoZC94XA== ;{id = 30899}
SECTION ADDITIONAL
ns.example.net. IN A 1.2.3.5
ns.example.net. 3600 IN RRSIG A RSASHA1 3 3600 20070926134150 20070829134150 30899 example.net. x+tQMC9FhzT7Fcy1pM5NrOC7E8nLd7THPI3C6ie4EwL8PrxllqlR3q/DKB0d/m0qCOPcgN6HFOYURV1s4uAcsw== ;{id = 30899}
ENTRY_END
; response to DNSKEY priming query
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
example.net. IN DNSKEY
SECTION ANSWER
example.net. 3600 IN DNSKEY 256 3 5 AQPQ41chR9DEHt/aIzIFAqanbDlRflJoRs5yz1jFsoRIT7dWf0r+PeDuewdxkszNH6wnU4QL8pfKFRh5PIYVBLK3 ;{id = 30899 (zsk), size = 512b}
example.net. 3600 IN RRSIG DNSKEY RSASHA1 2 3600 20070926134150 20070829134150 30899 example.net. hiFzlQ8VoYgCuvIsfVuxC3mfJDqsTh0yc6abs5xMx5uEcIjb0dndFQx7INOM+imlzveEN73Hqp4OLFpFhsWLlw== ;{id = 30899}
SECTION AUTHORITY
example.net. IN NS ns.example.net.
example.net. 3600 IN RRSIG NS RSASHA1 2 3600 20070926134150 20070829134150 30899 example.net. E8JX0l4B+cSR5bkHQwOJy1pBmlLMTYCJ8EwfNMU/eCv0YhKwo26rHhn52FGisgv+Nwp7/NbhHqQ+kJgoZC94XA== ;{id = 30899}
SECTION ADDITIONAL
ns.example.net. IN A 1.2.3.5
ns.example.net. 3600 IN RRSIG A RSASHA1 3 3600 20070926134150 20070829134150 30899 example.net. x+tQMC9FhzT7Fcy1pM5NrOC7E8nLd7THPI3C6ie4EwL8PrxllqlR3q/DKB0d/m0qCOPcgN6HFOYURV1s4uAcsw== ;{id = 30899}
ENTRY_END
; deny DS and DNSKEY types
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
ns.example.net. IN DS
SECTION AUTHORITY
example.net. IN SOA ns-pri.ripe.net. ops.ripe.net. 2007092101 3600 7200 1209600 7200
example.net. 3600 IN RRSIG SOA 5 2 3600 20070926134150 20070829134150 30899 example.net. E1T+LAsAk7rtA6mnKRlgca5Lk+NJYUNNkfco1CrUp5IZZ1+QL7u7CINQBcndJkvoBwKhdVI8rz2LLW19wIywTw== ;{id = 30899}
ns.example.net. IN NSEC ns-new.example.net. A AAAA RRSIG NSEC
ns.example.net. 3600 IN RRSIG NSEC 5 3 3600 20070926134150 20070829134150 30899 example.net. HLkPBWA8Hstub8e/zdp/A8xyI6+fnnMsA9oiZ20VBuSTaBknX0SXmVulNhVGfdmz9fYmYFUr1zjqvPFG+ErO8A== ;{id = 30899}
ENTRY_END
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
ns.example.net. IN DNSKEY
SECTION AUTHORITY
example.net. IN SOA ns-pri.ripe.net. ops.ripe.net. 2007092101 3600 7200 1209600 7200
example.net. 3600 IN RRSIG SOA 5 2 3600 20070926134150 20070829134150 30899 example.net. E1T+LAsAk7rtA6mnKRlgca5Lk+NJYUNNkfco1CrUp5IZZ1+QL7u7CINQBcndJkvoBwKhdVI8rz2LLW19wIywTw== ;{id = 30899}
ns.example.net. IN NSEC ns-new.example.net. A RRSIG NSEC
ns.example.net. 3600 IN RRSIG NSEC 5 3 3600 20070926134150 20070829134150 30899 example.net. fAbDxuMP6lMqi71Wa9nsByG7buoJpfxyQhjps6HXOPzOC24UCCjdvZfZltlRy7Yrfrs28MjHwYEmHFmCeFpfPw== ;{id = 30899}
ENTRY_END
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
ns.example.net. IN A
SECTION ANSWER
ns.example.net. IN A 1.2.3.5
ns.example.net. 3600 IN RRSIG A RSASHA1 3 3600 20070926134150 20070829134150 30899 example.net. x+tQMC9FhzT7Fcy1pM5NrOC7E8nLd7THPI3C6ie4EwL8PrxllqlR3q/DKB0d/m0qCOPcgN6HFOYURV1s4uAcsw== ;{id = 30899}
ENTRY_END
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
ns.example.net. IN AAAA
SECTION AUTHORITY
example.net. IN SOA ns-pri.ripe.net. ops.ripe.net. 2007092101 3600 7200 1209600 7200
example.net. 3600 IN RRSIG SOA 5 2 3600 20070926134150 20070829134150 30899 example.net. E1T+LAsAk7rtA6mnKRlgca5Lk+NJYUNNkfco1CrUp5IZZ1+QL7u7CINQBcndJkvoBwKhdVI8rz2LLW19wIywTw== ;{id = 30899}
ns.example.net. IN NSEC ns-new.example.net. A RRSIG NSEC
ns.example.net. 3600 IN RRSIG NSEC 5 3 3600 20070926134150 20070829134150 30899 example.net. fAbDxuMP6lMqi71Wa9nsByG7buoJpfxyQhjps6HXOPzOC24UCCjdvZfZltlRy7Yrfrs28MjHwYEmHFmCeFpfPw== ;{id = 30899}
ENTRY_END
RANGE_END
; prime cache with example.com. NS rrset.
STEP 1 QUERY
ENTRY_BEGIN
REPLY RD DO
SECTION QUESTION
www.example.com. IN A
ENTRY_END
; recursion happens here.
STEP 10 CHECK_ANSWER
ENTRY_BEGIN
MATCH all
REPLY QR RD RA AD NOERROR
SECTION QUESTION
www.example.com. IN A
SECTION ANSWER
www.example.com. IN A 11.12.13.14
www.example.com. 3600 IN RRSIG A 3 3 3600 20070926135752 20070829135752 2854 example.com. MC0CFC6+BbFcL95vH6SOhMLGotcBospIAhUAhjfof+1VY5GsCp5b9UOD7UydBzI= ;{id = 2854}
SECTION AUTHORITY
SECTION ADDITIONAL
ENTRY_END
; test nonrec referral validation
STEP 11 QUERY
ENTRY_BEGIN
REPLY DO
SECTION QUESTION
bla.example.com. IN A
ENTRY_END
STEP 12 CHECK_ANSWER
ENTRY_BEGIN
MATCH all
REPLY QR RA AD NOERROR
SECTION QUESTION
bla.example.com. IN A
SECTION ANSWER
SECTION AUTHORITY
example.com. IN NS ns.example.com.
example.com. IN NS ns.example.net.
example.com. 3600 IN RRSIG NS 3 2 3600 20070926135752 20070829135752 2854 example.com. MCwCFEsWNXjGDFwH/0NGClonWUQlBaiFAhR/dt0asVj8M0VKs7PdTEKN/Y9i5w== ;{id = 2854}
SECTION ADDITIONAL
ns.example.com. IN A 1.2.3.4
ns.example.com. 3600 IN RRSIG A 3 3 3600 20070926135752 20070829135752 2854 example.com. MC0CFQCMSWxVehgOQLoYclB9PIAbNP229AIUeH0vNNGJhjnZiqgIOKvs1EhzqAo= ;{id = 2854}
ENTRY_END
SCENARIO_END
dnssecjava-1.1.3/src/test/resources/unbound/val_referd.rpl 0000664 0000000 0000000 00000012214 13020541473 0023716 0 ustar 00root root 0000000 0000000 ; config options
; The island of trust is at example.com
server:
trust-anchor: "example.com. 3600 IN DS 2854 3 1 46e4ffc6e9a4793b488954bd3f0cc6af0dfb201b"
val-override-date: "20070916134226"
harden-referral-path: no
access-control: 127.0.0.1 allow_snoop
target-fetch-policy: "0 0 0 0 0"
stub-zone:
name: "."
stub-addr: 193.0.14.129 # K.ROOT-SERVERS.NET.
CONFIG_END
SCENARIO_BEGIN Test validator with cache referral
; K.ROOT-SERVERS.NET.
RANGE_BEGIN 0 100
ADDRESS 193.0.14.129
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
. IN NS
SECTION ANSWER
. IN NS K.ROOT-SERVERS.NET.
SECTION ADDITIONAL
K.ROOT-SERVERS.NET. IN A 193.0.14.129
ENTRY_END
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
www.example.com. IN A
SECTION AUTHORITY
com. IN NS a.gtld-servers.net.
SECTION ADDITIONAL
a.gtld-servers.net. IN A 192.5.6.30
ENTRY_END
RANGE_END
; a.gtld-servers.net.
RANGE_BEGIN 0 100
ADDRESS 192.5.6.30
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
com. IN NS
SECTION ANSWER
com. IN NS a.gtld-servers.net.
SECTION ADDITIONAL
a.gtld-servers.net. IN A 192.5.6.30
ENTRY_END
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
www.example.com. IN A
SECTION AUTHORITY
example.com. IN NS ns.example.com.
SECTION ADDITIONAL
ns.example.com. IN A 1.2.3.4
ENTRY_END
RANGE_END
; ns.example.com.
RANGE_BEGIN 0 100
ADDRESS 1.2.3.4
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
example.com. IN NS
SECTION ANSWER
example.com. IN NS ns.example.com.
example.com. 3600 IN RRSIG NS 3 2 3600 20070926134150 20070829134150 2854 example.com. MC0CFQCN+qHdJxoI/2tNKwsb08pra/G7aAIUAWA5sDdJTbrXA1/3OaesGBAO3sI= ;{id = 2854}
SECTION ADDITIONAL
ns.example.com. IN A 1.2.3.4
ns.example.com. 3600 IN RRSIG A 3 3 3600 20070926134150 20070829134150 2854 example.com. MC0CFQCQMyTjn7WWwpwAR1LlVeLpRgZGuQIUCcJDEkwAuzytTDRlYK7nIMwH1CM= ;{id = 2854}
ENTRY_END
; response to DNSKEY priming query
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
example.com. IN DNSKEY
SECTION ANSWER
example.com. 3600 IN DNSKEY 256 3 3 ALXLUsWqUrY3JYER3T4TBJII s70j+sDS/UT2QRp61SE7S3E EXopNXoFE73JLRmvpi/UrOO/Vz4Se 6wXv/CYCKjGw06U4WRgR YXcpEhJROyNapmdIKSx hOzfLVE1gqA0PweZR8d tY3aNQSRn3sPpwJr6Mi /PqQKAMMrZ9ckJpf1+b QMOOvxgzz2U1GS18b3y ZKcgTMEaJzd/GZYzi/B N2DzQ0MsrSwYXfsNLFO Bbs8PJMW4LYIxeeOe6rUgkWOF 7CC9Dh/dduQ1QrsJhmZAEFfd6ByYV+ ;{id = 2854 (zsk), size = 1688b}
example.com. 3600 IN RRSIG DNSKEY 3 2 3600 20070926134802 20070829134802 2854 example.com. MCwCFG1yhRNtTEa3Eno2zhVVuy2EJX3wAhQeLyUp6+UXcpC5qGNu9tkrTEgPUg== ;{id = 2854}
SECTION AUTHORITY
example.com. IN NS ns.example.com.
example.com. 3600 IN RRSIG NS 3 2 3600 20070926134150 20070829134150 2854 example.com. MC0CFQCN+qHdJxoI/2tNKwsb08pra/G7aAIUAWA5sDdJTbrXA1/3OaesGBAO3sI= ;{id = 2854}
SECTION ADDITIONAL
ns.example.com. IN A 1.2.3.4
ns.example.com. 3600 IN RRSIG A 3 3 3600 20070926134150 20070829134150 2854 example.com. MC0CFQCQMyTjn7WWwpwAR1LlVeLpRgZGuQIUCcJDEkwAuzytTDRlYK7nIMwH1CM= ;{id = 2854}
ENTRY_END
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
www.example.com. IN A
SECTION ANSWER
www.example.com. IN A 10.20.30.40
www.example.com. 3600 IN RRSIG A 3 3 3600 20070926134150 20070829134150 2854 example.com. AD8qRJvXxOtmSuy8Ogyo0roA294qOtNT2E1m05kSU0jbxN4qLYn0OmU= ;{id = 2854}
SECTION AUTHORITY
example.com. IN NS ns.example.com.
example.com. 3600 IN RRSIG NS 3 2 3600 20070926134150 20070829134150 2854 example.com. MC0CFQCN+qHdJxoI/2tNKwsb08pra/G7aAIUAWA5sDdJTbrXA1/3OaesGBAO3sI= ;{id = 2854}
SECTION ADDITIONAL
ns.example.com. IN A 1.2.3.4
ns.example.com. 3600 IN RRSIG A 3 3 3600 20070926134150 20070829134150 2854 example.com. MC0CFQCQMyTjn7WWwpwAR1LlVeLpRgZGuQIUCcJDEkwAuzytTDRlYK7nIMwH1CM= ;{id = 2854}
ENTRY_END
RANGE_END
; first ask for +CD and get the data in the cache.
STEP 1 QUERY
ENTRY_BEGIN
REPLY RD CD
SECTION QUESTION
www.example.com. IN A
ENTRY_END
STEP 3 CHECK_ANSWER
ENTRY_BEGIN
MATCH all
REPLY QR RD RA CD NOERROR
SECTION QUESTION
www.example.com. IN A
SECTION ANSWER
www.example.com. IN A 10.20.30.40
SECTION AUTHORITY
example.com. IN NS ns.example.com.
SECTION ADDITIONAL
ns.example.com. IN A 1.2.3.4
ENTRY_END
; now the data is in the cache, validate a referral from cache
; note, no recursion desired
STEP 5 QUERY
ENTRY_BEGIN
REPLY DO
SECTION QUESTION
bla.example.com. IN A
ENTRY_END
STEP 6 CHECK_ANSWER
ENTRY_BEGIN
MATCH all
REPLY QR RA AD NOERROR
SECTION QUESTION
bla.example.com. IN A
SECTION ANSWER
SECTION AUTHORITY
example.com. IN NS ns.example.com.
example.com. 3600 IN RRSIG NS 3 2 3600 20070926134150 20070829134150 2854 example.com. MC0CFQCN+qHdJxoI/2tNKwsb08pra/G7aAIUAWA5sDdJTbrXA1/3OaesGBAO3sI= ;{id = 2854}
SECTION ADDITIONAL
ns.example.com. IN A 1.2.3.4
ns.example.com. 3600 IN RRSIG A 3 3 3600 20070926134150 20070829134150 2854 example.com. MC0CFQCQMyTjn7WWwpwAR1LlVeLpRgZGuQIUCcJDEkwAuzytTDRlYK7nIMwH1CM= ;{id = 2854}
ENTRY_END
SCENARIO_END
dnssecjava-1.1.3/src/test/resources/unbound/val_referglue.rpl 0000664 0000000 0000000 00000023754 13020541473 0024442 0 ustar 00root root 0000000 0000000 ; config options
; The island of trust is at example.com
server:
trust-anchor: "example.com. 3600 IN DS 2854 3 1 46e4ffc6e9a4793b488954bd3f0cc6af0dfb201b"
val-override-date: "20070916134226"
directory: ""
access-control: 127.0.0.1 allow_snoop
target-fetch-policy: "0 0 0 0 0"
stub-zone:
name: "."
stub-addr: 193.0.14.129 # K.ROOT-SERVERS.NET.
CONFIG_END
SCENARIO_BEGIN Test validator with cache referral with unsigned glue
; K.ROOT-SERVERS.NET.
RANGE_BEGIN 0 100
ADDRESS 193.0.14.129
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
. IN NS
SECTION ANSWER
. IN NS K.ROOT-SERVERS.NET.
SECTION ADDITIONAL
K.ROOT-SERVERS.NET. IN A 193.0.14.129
ENTRY_END
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
www.example.com. IN A
SECTION AUTHORITY
com. IN NS a.gtld-servers.net.
SECTION ADDITIONAL
a.gtld-servers.net. IN A 192.5.6.30
ENTRY_END
RANGE_END
; a.gtld-servers.net.
RANGE_BEGIN 0 100
ADDRESS 192.5.6.30
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
com. IN NS
SECTION ANSWER
com. IN NS a.gtld-servers.net.
SECTION ADDITIONAL
a.gtld-servers.net. IN A 192.5.6.30
ENTRY_END
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
www.example.com. IN A
SECTION AUTHORITY
example.com. IN NS ns.example.com.
SECTION ADDITIONAL
ns.example.com. IN A 1.2.3.4
ENTRY_END
RANGE_END
; ns.example.com.
RANGE_BEGIN 0 100
ADDRESS 1.2.3.4
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
example.com. IN NS
SECTION ANSWER
example.com. IN NS ns.example.com.
example.com. IN NS ns2.sub.example.com.
example.com. 3600 IN RRSIG NS DSA 2 3600 20070926134150 20070829134150 2854 example.com. MC0CFQCiyp/3hxwKS5QZPnjk36t16s4QTwIUI0m+MBVOAPacANrXXFKieyZd39o= ;{id = 2854}
SECTION ADDITIONAL
ns.example.com. IN A 1.2.3.4
ns.example.com. 3600 IN RRSIG A 3 3 3600 20070926134150 20070829134150 2854 example.com. MC0CFQCQMyTjn7WWwpwAR1LlVeLpRgZGuQIUCcJDEkwAuzytTDRlYK7nIMwH1CM= ;{id = 2854}
ns2.sub.example.com. IN A 100.200.30.40
ENTRY_END
; referral, for all types
ENTRY_BEGIN
MATCH opcode qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
ns2.sub.example.com. IN A
SECTION AUTHORITY
sub.example.com. IN NS ns2.sub.example.com.
sub.example.com. IN NSEC tlib.example.com. NS RRSIG NSEC
sub.example.com. 3600 IN RRSIG NSEC 3 3 3600 20070926134150 20070829134150 2854 example.com. ABdrfr+eKT1syk2qFlV01wLOqQdvNMpEtPmGAM6CrtyQAje/ddXSi9A= ;{id = 2854}
ns2.sub.example.com. IN A 100.200.30.40
ENTRY_END
; response to DNSKEY priming query
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
example.com. IN DNSKEY
SECTION ANSWER
example.com. 3600 IN DNSKEY 256 3 3 ALXLUsWqUrY3JYER3T4TBJII s70j+sDS/UT2QRp61SE7S3E EXopNXoFE73JLRmvpi/UrOO/Vz4Se 6wXv/CYCKjGw06U4WRgR YXcpEhJROyNapmdIKSx hOzfLVE1gqA0PweZR8d tY3aNQSRn3sPpwJr6Mi /PqQKAMMrZ9ckJpf1+b QMOOvxgzz2U1GS18b3y ZKcgTMEaJzd/GZYzi/B N2DzQ0MsrSwYXfsNLFO Bbs8PJMW4LYIxeeOe6rUgkWOF 7CC9Dh/dduQ1QrsJhmZAEFfd6ByYV+ ;{id = 2854 (zsk), size = 1688b}
example.com. 3600 IN RRSIG DNSKEY 3 2 3600 20070926134802 20070829134802 2854 example.com. MCwCFG1yhRNtTEa3Eno2zhVVuy2EJX3wAhQeLyUp6+UXcpC5qGNu9tkrTEgPUg== ;{id = 2854}
SECTION AUTHORITY
example.com. IN NS ns.example.com.
example.com. IN NS ns2.sub.example.com.
example.com. 3600 IN RRSIG NS DSA 2 3600 20070926134150 20070829134150 2854 example.com. MC0CFQCiyp/3hxwKS5QZPnjk36t16s4QTwIUI0m+MBVOAPacANrXXFKieyZd39o= ;{id = 2854}
SECTION ADDITIONAL
ns.example.com. IN A 1.2.3.4
ns.example.com. 3600 IN RRSIG A 3 3 3600 20070926134150 20070829134150 2854 example.com. MC0CFQCQMyTjn7WWwpwAR1LlVeLpRgZGuQIUCcJDEkwAuzytTDRlYK7nIMwH1CM= ;{id = 2854}
ns2.sub.example.com. IN A 100.200.30.40
ENTRY_END
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
www.example.com. IN A
SECTION ANSWER
www.example.com. IN A 10.20.30.40
www.example.com. 3600 IN RRSIG A 3 3 3600 20070926134150 20070829134150 2854 example.com. MC0CFC99iE9K5y2WNgI0gFvBWaTi9wm6AhUAoUqOpDtG5Zct+Qr9F3mSdnbc6V4= ;{id = 2854}
SECTION AUTHORITY
example.com. IN NS ns.example.com.
example.com. IN NS ns2.sub.example.com.
example.com. 3600 IN RRSIG NS DSA 2 3600 20070926134150 20070829134150 2854 example.com. MC0CFQCiyp/3hxwKS5QZPnjk36t16s4QTwIUI0m+MBVOAPacANrXXFKieyZd39o= ;{id = 2854}
SECTION ADDITIONAL
ns.example.com. IN A 1.2.3.4
ns.example.com. 3600 IN RRSIG A 3 3 3600 20070926134150 20070829134150 2854 example.com. MC0CFQCQMyTjn7WWwpwAR1LlVeLpRgZGuQIUCcJDEkwAuzytTDRlYK7nIMwH1CM= ;{id = 2854}
; This is from an unsigned subzone
ns2.sub.example.com. IN A 100.200.30.40
ENTRY_END
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
sub.example.com. IN DS
SECTION ANSWER
SECTION AUTHORITY
sub.example.com. IN NSEC www.example.com. NS RRSIG NSEC
sub.example.com. 3600 IN RRSIG NSEC 3 3 3600 20070926134150 20070829134150 2854 example.com. MCwCFEG4WWIYBDknWlr2d8S42UZHRuByAhRgnDELUAccGZTCVzG+xl/locivpA== ;{id = 2854}
ENTRY_END
RANGE_END
; ns2.sub.example.com.
RANGE_BEGIN 0 100
ADDRESS 100.200.30.40
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
example.com. IN NS
SECTION ANSWER
example.com. IN NS ns.example.com.
example.com. IN NS ns2.sub.example.com.
example.com. 3600 IN RRSIG NS DSA 2 3600 20070926134150 20070829134150 2854 example.com. MC0CFQCiyp/3hxwKS5QZPnjk36t16s4QTwIUI0m+MBVOAPacANrXXFKieyZd39o= ;{id = 2854}
SECTION ADDITIONAL
ns.example.com. IN A 1.2.3.4
ns.example.com. 3600 IN RRSIG A 3 3 3600 20070926134150 20070829134150 2854 example.com. MC0CFQCQMyTjn7WWwpwAR1LlVeLpRgZGuQIUCcJDEkwAuzytTDRlYK7nIMwH1CM= ;{id = 2854}
ENTRY_END
; response to DNSKEY priming query
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
example.com. IN DNSKEY
SECTION ANSWER
example.com. 3600 IN DNSKEY 256 3 3 ALXLUsWqUrY3JYER3T4TBJII s70j+sDS/UT2QRp61SE7S3E EXopNXoFE73JLRmvpi/UrOO/Vz4Se 6wXv/CYCKjGw06U4WRgR YXcpEhJROyNapmdIKSx hOzfLVE1gqA0PweZR8d tY3aNQSRn3sPpwJr6Mi /PqQKAMMrZ9ckJpf1+b QMOOvxgzz2U1GS18b3y ZKcgTMEaJzd/GZYzi/B N2DzQ0MsrSwYXfsNLFO Bbs8PJMW4LYIxeeOe6rUgkWOF 7CC9Dh/dduQ1QrsJhmZAEFfd6ByYV+ ;{id = 2854 (zsk), size = 1688b}
example.com. 3600 IN RRSIG DNSKEY 3 2 3600 20070926134802 20070829134802 2854 example.com. MCwCFG1yhRNtTEa3Eno2zhVVuy2EJX3wAhQeLyUp6+UXcpC5qGNu9tkrTEgPUg== ;{id = 2854}
SECTION AUTHORITY
example.com. IN NS ns.example.com.
example.com. IN NS ns2.sub.example.com.
example.com. 3600 IN RRSIG NS DSA 2 3600 20070926134150 20070829134150 2854 example.com. MC0CFQCiyp/3hxwKS5QZPnjk36t16s4QTwIUI0m+MBVOAPacANrXXFKieyZd39o= ;{id = 2854}
SECTION ADDITIONAL
ns.example.com. IN A 1.2.3.4
ns.example.com. 3600 IN RRSIG A 3 3 3600 20070926134150 20070829134150 2854 example.com. MC0CFQCQMyTjn7WWwpwAR1LlVeLpRgZGuQIUCcJDEkwAuzytTDRlYK7nIMwH1CM= ;{id = 2854}
ENTRY_END
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
www.example.com. IN A
SECTION ANSWER
www.example.com. IN A 10.20.30.40
www.example.com. 3600 IN RRSIG A 3 3 3600 20070926134150 20070829134150 2854 example.com. MC0CFC99iE9K5y2WNgI0gFvBWaTi9wm6AhUAoUqOpDtG5Zct+Qr9F3mSdnbc6V4= ;{id = 2854}
SECTION AUTHORITY
example.com. IN NS ns.example.com.
example.com. IN NS ns2.sub.example.com.
example.com. 3600 IN RRSIG NS DSA 2 3600 20070926134150 20070829134150 2854 example.com. MC0CFQCiyp/3hxwKS5QZPnjk36t16s4QTwIUI0m+MBVOAPacANrXXFKieyZd39o= ;{id = 2854}
SECTION ADDITIONAL
ns.example.com. IN A 1.2.3.4
ns.example.com. 3600 IN RRSIG A 3 3 3600 20070926134150 20070829134150 2854 example.com. MC0CFQCQMyTjn7WWwpwAR1LlVeLpRgZGuQIUCcJDEkwAuzytTDRlYK7nIMwH1CM= ;{id = 2854}
; This is from an unsigned subzone
ns2.sub.example.com. IN A 100.200.30.40
ENTRY_END
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
sub.example.com. IN DS
SECTION ANSWER
SECTION AUTHORITY
sub.example.com. IN NSEC www.example.com. NS RRSIG NSEC
sub.example.com. 3600 IN RRSIG NSEC 3 3 3600 20070926134150 20070829134150 2854 example.com. MCwCFEG4WWIYBDknWlr2d8S42UZHRuByAhRgnDELUAccGZTCVzG+xl/locivpA== ;{id = 2854}
ENTRY_END
ENTRY_BEGIN
MATCH opcode qname qtype
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
ns2.sub.example.com. IN A
SECTION ANSWER
ns2.sub.example.com. IN A 100.200.30.40
ENTRY_END
ENTRY_BEGIN
MATCH opcode qname qtype
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
ns2.sub.example.com. IN AAAA
SECTION ANSWER
ENTRY_END
RANGE_END
; first ask for +CD and get the data in the cache.
STEP 1 QUERY
ENTRY_BEGIN
REPLY RD CD
SECTION QUESTION
www.example.com. IN A
ENTRY_END
STEP 3 CHECK_ANSWER
ENTRY_BEGIN
MATCH all
REPLY QR RD RA CD NOERROR
SECTION QUESTION
www.example.com. IN A
SECTION ANSWER
www.example.com. IN A 10.20.30.40
SECTION AUTHORITY
example.com. IN NS ns.example.com.
example.com. IN NS ns2.sub.example.com.
SECTION ADDITIONAL
ns.example.com. IN A 1.2.3.4
; already validated and thus stripped from the answer.
;ns2.sub.example.com. IN A 100.200.30.40
ENTRY_END
; now the data is in the cache, validate a referral from cache
; note, no recursion desired
STEP 5 QUERY
ENTRY_BEGIN
REPLY DO
SECTION QUESTION
bla.example.com. IN A
ENTRY_END
STEP 6 CHECK_ANSWER
ENTRY_BEGIN
MATCH all
REPLY QR RA AD NOERROR
SECTION QUESTION
bla.example.com. IN A
SECTION ANSWER
SECTION AUTHORITY
example.com. 3600 IN NS ns.example.com.
example.com. 3600 IN NS ns2.sub.example.com.
example.com. 3600 IN RRSIG NS DSA 2 3600 20070926134150 20070829134150 2854 example.com. MC0CFQCiyp/3hxwKS5QZPnjk36t16s4QTwIUI0m+MBVOAPacANrXXFKieyZd39o= ;{id = 2854}
SECTION ADDITIONAL
ns.example.com. IN A 1.2.3.4
ns.example.com. 3600 IN RRSIG A 3 3 3600 20070926134150 20070829134150 2854 example.com. MC0CFQCQMyTjn7WWwpwAR1LlVeLpRgZGuQIUCcJDEkwAuzytTDRlYK7nIMwH1CM= ;{id = 2854}
ENTRY_END
SCENARIO_END
dnssecjava-1.1.3/src/test/resources/unbound/val_rrsig.rpl 0000664 0000000 0000000 00000013313 13020541473 0023576 0 ustar 00root root 0000000 0000000 ; config options
; The island of trust is at example.com
server:
trust-anchor: "example.com. 3600 IN DS 2854 3 1 46e4ffc6e9a4793b488954bd3f0cc6af0dfb201b"
val-override-date: "20070916134226"
target-fetch-policy: "0 0 0 0 0"
stub-zone:
name: "."
stub-addr: 193.0.14.129 # K.ROOT-SERVERS.NET.
CONFIG_END
SCENARIO_BEGIN Test validator with qtype RRSIG response
; K.ROOT-SERVERS.NET.
RANGE_BEGIN 0 100
ADDRESS 193.0.14.129
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
. IN NS
SECTION ANSWER
. IN NS K.ROOT-SERVERS.NET.
SECTION ADDITIONAL
K.ROOT-SERVERS.NET. IN A 193.0.14.129
ENTRY_END
ENTRY_BEGIN
MATCH opcode subdomain
ADJUST copy_id copy_query
REPLY QR NOERROR
SECTION QUESTION
example.com. IN A
SECTION AUTHORITY
com. IN NS a.gtld-servers.net.
SECTION ADDITIONAL
a.gtld-servers.net. IN A 192.5.6.30
ENTRY_END
RANGE_END
; a.gtld-servers.net.
RANGE_BEGIN 0 100
ADDRESS 192.5.6.30
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
com. IN NS
SECTION ANSWER
com. IN NS a.gtld-servers.net.
SECTION ADDITIONAL
a.gtld-servers.net. IN A 192.5.6.30
ENTRY_END
ENTRY_BEGIN
MATCH opcode subdomain
ADJUST copy_id copy_query
REPLY QR NOERROR
SECTION QUESTION
example.com. IN A
SECTION AUTHORITY
example.com. IN NS ns.example.com.
SECTION ADDITIONAL
ns.example.com. IN A 1.2.3.4
ENTRY_END
RANGE_END
; ns.example.com.
RANGE_BEGIN 0 100
ADDRESS 1.2.3.4
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
example.com. IN NS
SECTION ANSWER
example.com. IN NS ns.example.com.
example.com. 3600 IN RRSIG NS 3 2 3600 20070926134150 20070829134150 2854 example.com. MC0CFQCN+qHdJxoI/2tNKwsb08pra/G7aAIUAWA5sDdJTbrXA1/3OaesGBAO3sI= ;{id = 2854}
SECTION ADDITIONAL
ns.example.com. IN A 1.2.3.4
ns.example.com. 3600 IN RRSIG A 3 3 3600 20070926135752 20070829135752 2854 example.com. MC0CFQCMSWxVehgOQLoYclB9PIAbNP229AIUeH0vNNGJhjnZiqgIOKvs1EhzqAo= ;{id = 2854}
ENTRY_END
; response to DNSKEY priming query
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
example.com. IN DNSKEY
SECTION ANSWER
example.com. 3600 IN DNSKEY 256 3 3 ALXLUsWqUrY3JYER3T4TBJII s70j+sDS/UT2QRp61SE7S3E EXopNXoFE73JLRmvpi/UrOO/Vz4Se 6wXv/CYCKjGw06U4WRgR YXcpEhJROyNapmdIKSx hOzfLVE1gqA0PweZR8d tY3aNQSRn3sPpwJr6Mi /PqQKAMMrZ9ckJpf1+b QMOOvxgzz2U1GS18b3y ZKcgTMEaJzd/GZYzi/B N2DzQ0MsrSwYXfsNLFO Bbs8PJMW4LYIxeeOe6rUgkWOF 7CC9Dh/dduQ1QrsJhmZAEFfd6ByYV+ ;{id = 2854 (zsk), size = 1688b}
example.com. 3600 IN RRSIG DNSKEY 3 2 3600 20070926134802 20070829134802 2854 example.com. MCwCFG1yhRNtTEa3Eno2zhVVuy2EJX3wAhQeLyUp6+UXcpC5qGNu9tkrTEgPUg== ;{id = 2854}
SECTION AUTHORITY
example.com. IN NS ns.example.com.
example.com. 3600 IN RRSIG NS 3 2 3600 20070926134150 20070829134150 2854 example.com. MC0CFQCN+qHdJxoI/2tNKwsb08pra/G7aAIUAWA5sDdJTbrXA1/3OaesGBAO3sI= ;{id = 2854}
SECTION ADDITIONAL
ns.example.com. IN A 1.2.3.4
ns.example.com. 3600 IN RRSIG A 3 3 3600 20070926135752 20070829135752 2854 example.com. MC0CFQCMSWxVehgOQLoYclB9PIAbNP229AIUeH0vNNGJhjnZiqgIOKvs1EhzqAo= ;{id = 2854}
ENTRY_END
; response to query for A
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
www.example.com. IN A
SECTION ANSWER
www.example.com. IN A 10.20.30.40
ns.example.com. 3600 IN RRSIG A 3 3 3600 20070926134150 20070829134150 2854 example.com. MC0CFQCQMyTjn7WWwpwAR1LlVeLpRgZGuQIUCcJDEkwAuzytTDRlYK7nIMwH1CM= ;{id = 2854}
SECTION AUTHORITY
example.com. IN NS ns.example.com.
example.com. 3600 IN RRSIG NS 3 2 3600 20070926134150 20070829134150 2854 example.com. MC0CFQCN+qHdJxoI/2tNKwsb08pra/G7aAIUAWA5sDdJTbrXA1/3OaesGBAO3sI= ;{id = 2854}
SECTION ADDITIONAL
ns.example.com. IN A 1.2.3.4
www.example.com. 3600 IN RRSIG A 3 3 3600 20070926134150 20070829134150 2854 example.com. MC0CFC99iE9K5y2WNgI0gFvBWaTi9wm6AhUAoUqOpDtG5Zct+Qr9F3mSdnbc6V4= ;{id = 2854}
ENTRY_END
; RRSIG query
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
www.example.com. IN RRSIG
SECTION ANSWER
;www.example.com. IN A 10.20.30.40
www.example.com. 3600 IN RRSIG A 3 3 3600 20070926134150 20070829134150 2854 example.com. MC0CFC99iE9K5y2WNgI0gFvBWaTi9wm6AhUAoUqOpDtG5Zct+Qr9F3mSdnbc6V4= ;{id = 2854}
SECTION AUTHORITY
example.com. IN NS ns.example.com.
example.com. 3600 IN RRSIG NS 3 2 3600 20070926134150 20070829134150 2854 example.com. MC0CFQCN+qHdJxoI/2tNKwsb08pra/G7aAIUAWA5sDdJTbrXA1/3OaesGBAO3sI= ;{id = 2854}
SECTION ADDITIONAL
ns.example.com. IN A 1.2.3.4
ns.example.com. 3600 IN RRSIG A 3 3 3600 20070926134150 20070829134150 2854 example.com. MC0CFQCQMyTjn7WWwpwAR1LlVeLpRgZGuQIUCcJDEkwAuzytTDRlYK7nIMwH1CM= ;{id = 2854}
ENTRY_END
RANGE_END
STEP 1 QUERY
ENTRY_BEGIN
REPLY RD DO
SECTION QUESTION
www.example.com. IN RRSIG
ENTRY_END
; recursion happens here.
STEP 10 CHECK_ANSWER
ENTRY_BEGIN
MATCH all
REPLY QR RD RA NOERROR
SECTION QUESTION
www.example.com. IN RRSIG
SECTION ANSWER
www.example.com. 3600 IN RRSIG A 3 3 3600 20070926134150 20070829134150 2854 example.com. MC0CFC99iE9K5y2WNgI0gFvBWaTi9wm6AhUAoUqOpDtG5Zct+Qr9F3mSdnbc6V4= ;{id = 2854}
SECTION AUTHORITY
example.com. IN NS ns.example.com.
example.com. 3600 IN RRSIG NS 3 2 3600 20070926134150 20070829134150 2854 example.com. MC0CFQCN+qHdJxoI/2tNKwsb08pra/G7aAIUAWA5sDdJTbrXA1/3OaesGBAO3sI= ;{id = 2854}
SECTION ADDITIONAL
ns.example.com. IN A 1.2.3.4
ns.example.com. 3600 IN RRSIG A 3 3 3600 20070926134150 20070829134150 2854 example.com. MC0CFQCQMyTjn7WWwpwAR1LlVeLpRgZGuQIUCcJDEkwAuzytTDRlYK7nIMwH1CM= ;{id = 2854}
ENTRY_END
SCENARIO_END
dnssecjava-1.1.3/src/test/resources/unbound/val_secds.rpl 0000664 0000000 0000000 00000016356 13020541473 0023563 0 ustar 00root root 0000000 0000000 ; config options
; The island of trust is at example.com
server:
trust-anchor: "example.com. 3600 IN DS 2854 3 1 46e4ffc6e9a4793b488954bd3f0cc6af0dfb201b"
val-override-date: "20070916134226"
target-fetch-policy: "0 0 0 0 0"
stub-zone:
name: "."
stub-addr: 193.0.14.129 # K.ROOT-SERVERS.NET.
CONFIG_END
SCENARIO_BEGIN Test validator with secure delegation
; K.ROOT-SERVERS.NET.
RANGE_BEGIN 0 100
ADDRESS 193.0.14.129
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
. IN NS
SECTION ANSWER
. IN NS K.ROOT-SERVERS.NET.
SECTION ADDITIONAL
K.ROOT-SERVERS.NET. IN A 193.0.14.129
ENTRY_END
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
www.sub.example.com. IN A
SECTION AUTHORITY
com. IN NS a.gtld-servers.net.
SECTION ADDITIONAL
a.gtld-servers.net. IN A 192.5.6.30
ENTRY_END
RANGE_END
; a.gtld-servers.net.
RANGE_BEGIN 0 100
ADDRESS 192.5.6.30
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
com. IN NS
SECTION ANSWER
com. IN NS a.gtld-servers.net.
SECTION ADDITIONAL
a.gtld-servers.net. IN A 192.5.6.30
ENTRY_END
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
www.sub.example.com. IN A
SECTION AUTHORITY
example.com. IN NS ns.example.com.
SECTION ADDITIONAL
ns.example.com. IN A 1.2.3.4
ENTRY_END
RANGE_END
; ns.example.com.
RANGE_BEGIN 0 100
ADDRESS 1.2.3.4
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
example.com. IN NS
SECTION ANSWER
example.com. IN NS ns.example.com.
example.com. 3600 IN RRSIG NS 3 2 3600 20070926134150 20070829134150 2854 example.com. MC0CFQCN+qHdJxoI/2tNKwsb08pra/G7aAIUAWA5sDdJTbrXA1/3OaesGBAO3sI= ;{id = 2854}
SECTION ADDITIONAL
ns.example.com. IN A 1.2.3.4
ns.example.com. 3600 IN RRSIG A 3 3 3600 20070926135752 20070829135752 2854 example.com. MC0CFQCMSWxVehgOQLoYclB9PIAbNP229AIUeH0vNNGJhjnZiqgIOKvs1EhzqAo= ;{id = 2854}
ENTRY_END
; response to DNSKEY priming query
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
example.com. IN DNSKEY
SECTION ANSWER
example.com. 3600 IN DNSKEY 256 3 3 ALXLUsWqUrY3JYER3T4TBJII s70j+sDS/UT2QRp61SE7S3E EXopNXoFE73JLRmvpi/UrOO/Vz4Se 6wXv/CYCKjGw06U4WRgR YXcpEhJROyNapmdIKSx hOzfLVE1gqA0PweZR8d tY3aNQSRn3sPpwJr6Mi /PqQKAMMrZ9ckJpf1+b QMOOvxgzz2U1GS18b3y ZKcgTMEaJzd/GZYzi/B N2DzQ0MsrSwYXfsNLFO Bbs8PJMW4LYIxeeOe6rUgkWOF 7CC9Dh/dduQ1QrsJhmZAEFfd6ByYV+ ;{id = 2854 (zsk), size = 1688b}
example.com. 3600 IN RRSIG DNSKEY DSA 2 3600 20070926134150 20070829134150 2854 example.com. MCwCFBQRtlR4BEv9ohi+PGFjp+AHsJuHAhRCvz0shggvnvI88DFnBDCczHUcVA== ;{id = 2854}
SECTION AUTHORITY
example.com. IN NS ns.example.com.
example.com. 3600 IN RRSIG NS 3 2 3600 20070926134150 20070829134150 2854 example.com. MC0CFQCN+qHdJxoI/2tNKwsb08pra/G7aAIUAWA5sDdJTbrXA1/3OaesGBAO3sI= ;{id = 2854}
SECTION ADDITIONAL
ns.example.com. IN A 1.2.3.4
ns.example.com. 3600 IN RRSIG A 3 3 3600 20070926135752 20070829135752 2854 example.com. MC0CFQCMSWxVehgOQLoYclB9PIAbNP229AIUeH0vNNGJhjnZiqgIOKvs1EhzqAo= ;{id = 2854}
ENTRY_END
; response for delegation to sub.example.com.
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
www.sub.example.com. IN A
SECTION ANSWER
SECTION AUTHORITY
sub.example.com. IN NS ns.sub.example.com.
sub.example.com. 3600 IN DS 30899 RSASHA1 1 f7ed618f24d5e5202927e1d27bc2e84a141cb4b3
sub.example.com. 3600 IN RRSIG DS 3 3 3600 20070926134150 20070829134150 2854 example.com. MCwCFCW3ix0GD4BSvNLWIbROCJt5DAW9AhRt/kg9kBKJ20UBUdumrBUHqnskdA== ;{id = 2854}
SECTION ADDITIONAL
ns.sub.example.com. IN A 1.2.3.6
ENTRY_END
; response for delegation to sub.example.com.
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
sub.example.com. IN DNSKEY
SECTION ANSWER
SECTION AUTHORITY
sub.example.com. IN NS ns.sub.example.com.
sub.example.com. 3600 IN DS 30899 RSASHA1 1 f7ed618f24d5e5202927e1d27bc2e84a141cb4b3
sub.example.com. 3600 IN RRSIG DS 3 3 3600 20070926134150 20070829134150 2854 example.com. MCwCFCW3ix0GD4BSvNLWIbROCJt5DAW9AhRt/kg9kBKJ20UBUdumrBUHqnskdA== ;{id = 2854}
SECTION ADDITIONAL
ns.sub.example.com. IN A 1.2.3.6
ENTRY_END
RANGE_END
; ns.sub.example.com.
RANGE_BEGIN 0 100
ADDRESS 1.2.3.6
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
sub.example.com. IN NS
SECTION ANSWER
sub.example.com. IN NS ns.sub.example.com.
sub.example.com. 3600 IN RRSIG NS 5 3 3600 20070926134150 20070829134150 30899 sub.example.com. wcpHeBILHfo8C9uxMhcW03gcURZeUffiKdSTb50ZjzTHgMNhRyMfpcvSpXEd9548A9UTmWKeLZChfr5Z/glONw== ;{id = 30899}
SECTION ADDITIONAL
ns.sub.example.com. IN A 1.2.3.6
ns.sub.example.com. 3600 IN RRSIG A 5 4 3600 20070926134150 20070829134150 30899 sub.example.com. UF7shD/gt1FOp2UHgLTNbPzVykklSXFMEtJ1xD+Hholwf/PIzd7zoaIttIYibNa4fUXCqMg22H9P7MRhfmFe6g== ;{id = 30899}
ENTRY_END
; response to DNSKEY priming query
; sub.example.com. 3600 IN DS 30899 RSASHA1 1 f7ed618f24d5e5202927e1d27bc2e84a141cb4b3
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
sub.example.com. IN DNSKEY
SECTION ANSWER
sub.example.com. 3600 IN DNSKEY 256 3 5 AQPQ41chR9DEHt/aIzIFAqanbDlRflJoRs5yz1jFsoRIT7dWf0r+PeDuewdxkszNH6wnU4QL8pfKFRh5PIYVBLK3 ;{id = 30899 (zsk), size = 512b}
sub.example.com. 3600 IN RRSIG DNSKEY 5 3 3600 20070926134150 20070829134150 30899 sub.example.com. uNGp99iznjD7oOX02XnQbDnbg75UwBHRvZSKYUorTKvPUnCWMHKdRsQ+mf+Fx3GZ+Fz9BVjoCmQqpnfgXLEYqw== ;{id = 30899}
SECTION AUTHORITY
sub.example.com. IN NS ns.sub.example.com.
sub.example.com. 3600 IN RRSIG NS 5 3 3600 20070926134150 20070829134150 30899 sub.example.com. wcpHeBILHfo8C9uxMhcW03gcURZeUffiKdSTb50ZjzTHgMNhRyMfpcvSpXEd9548A9UTmWKeLZChfr5Z/glONw== ;{id = 30899}
SECTION ADDITIONAL
ns.sub.example.com. IN A 1.2.3.6
ns.sub.example.com. 3600 IN RRSIG A 5 4 3600 20070926134150 20070829134150 30899 sub.example.com. UF7shD/gt1FOp2UHgLTNbPzVykklSXFMEtJ1xD+Hholwf/PIzd7zoaIttIYibNa4fUXCqMg22H9P7MRhfmFe6g== ;{id = 30899}
ENTRY_END
; response to query of interest
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
www.sub.example.com. IN A
SECTION ANSWER
www.sub.example.com. IN A 11.11.11.11
www.sub.example.com. 3600 IN RRSIG A 5 4 3600 20070926134150 20070829134150 30899 sub.example.com. 0DqqRfRtm7VSEQ4mmBbzrKRqQAay3JAE8DPDGmjtokrrjN9F1G/HxozDV7bjdIh2EChlQea8FPwf/GepJMUVxg== ;{id = 30899}
SECTION AUTHORITY
SECTION ADDITIONAL
ENTRY_END
RANGE_END
STEP 1 QUERY
ENTRY_BEGIN
REPLY RD DO
SECTION QUESTION
www.sub.example.com. IN A
ENTRY_END
; recursion happens here.
STEP 10 CHECK_ANSWER
ENTRY_BEGIN
MATCH all
REPLY QR RD RA AD NOERROR
SECTION QUESTION
www.sub.example.com. IN A
SECTION ANSWER
www.sub.example.com. 3600 IN A 11.11.11.11
www.sub.example.com. 3600 IN RRSIG A 5 4 3600 20070926134150 20070829134150 30899 sub.example.com. 0DqqRfRtm7VSEQ4mmBbzrKRqQAay3JAE8DPDGmjtokrrjN9F1G/HxozDV7bjdIh2EChlQea8FPwf/GepJMUVxg== ;{id = 30899}
SECTION AUTHORITY
SECTION ADDITIONAL
ENTRY_END
SCENARIO_END
dnssecjava-1.1.3/src/test/resources/unbound/val_secds_nosig.rpl 0000664 0000000 0000000 00000017525 13020541473 0024761 0 ustar 00root root 0000000 0000000 ; config options
; The island of trust is at example.com
server:
trust-anchor: "example.com. 3600 IN DS 2854 3 1 46e4ffc6e9a4793b488954bd3f0cc6af0dfb201b"
val-override-date: "20070916134226"
target-fetch-policy: "0 0 0 0 0"
stub-zone:
name: "."
stub-addr: 193.0.14.129 # K.ROOT-SERVERS.NET.
CONFIG_END
SCENARIO_BEGIN Test validator with no signatures after secure delegation
; K.ROOT-SERVERS.NET.
RANGE_BEGIN 0 100
ADDRESS 193.0.14.129
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
. IN NS
SECTION ANSWER
. IN NS K.ROOT-SERVERS.NET.
SECTION ADDITIONAL
K.ROOT-SERVERS.NET. IN A 193.0.14.129
ENTRY_END
ENTRY_BEGIN
MATCH opcode subdomain
ADJUST copy_id copy_query
REPLY QR NOERROR
SECTION QUESTION
com. IN A
SECTION AUTHORITY
com. IN NS a.gtld-servers.net.
SECTION ADDITIONAL
a.gtld-servers.net. IN A 192.5.6.30
ENTRY_END
RANGE_END
; a.gtld-servers.net.
RANGE_BEGIN 0 100
ADDRESS 192.5.6.30
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
com. IN NS
SECTION ANSWER
com. IN NS a.gtld-servers.net.
SECTION ADDITIONAL
a.gtld-servers.net. IN A 192.5.6.30
ENTRY_END
ENTRY_BEGIN
MATCH opcode subdomain
ADJUST copy_id copy_query
REPLY QR NOERROR
SECTION QUESTION
example.com. IN A
SECTION AUTHORITY
example.com. IN NS ns.example.com.
SECTION ADDITIONAL
ns.example.com. IN A 1.2.3.4
ENTRY_END
RANGE_END
; ns.example.com.
RANGE_BEGIN 0 100
ADDRESS 1.2.3.4
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
example.com. IN NS
SECTION ANSWER
example.com. IN NS ns.example.com.
example.com. 3600 IN RRSIG NS 3 2 3600 20070926134150 20070829134150 2854 example.com. MC0CFQCN+qHdJxoI/2tNKwsb08pra/G7aAIUAWA5sDdJTbrXA1/3OaesGBAO3sI= ;{id = 2854}
SECTION ADDITIONAL
ns.example.com. IN A 1.2.3.4
ns.example.com. 3600 IN RRSIG A 3 3 3600 20070926135752 20070829135752 2854 example.com. MC0CFQCMSWxVehgOQLoYclB9PIAbNP229AIUeH0vNNGJhjnZiqgIOKvs1EhzqAo= ;{id = 2854}
ENTRY_END
; barely valid nodata for AAAA
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
ns.example.com. IN AAAA
SECTION ANSWER
SECTION AUTHORITY
example.com. IN NS ns.example.com.
example.com. 3600 IN RRSIG NS 3 2 3600 20070926134150 20070829134150 2854 example.com. MC0CFQCN+qHdJxoI/2tNKwsb08pra/G7aAIUAWA5sDdJTbrXA1/3OaesGBAO3sI= ;{id = 2854}
ENTRY_END
; response to DNSKEY priming query
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
example.com. IN DNSKEY
SECTION ANSWER
example.com. 3600 IN DNSKEY 256 3 3 ALXLUsWqUrY3JYER3T4TBJII s70j+sDS/UT2QRp61SE7S3E EXopNXoFE73JLRmvpi/UrOO/Vz4Se 6wXv/CYCKjGw06U4WRgR YXcpEhJROyNapmdIKSx hOzfLVE1gqA0PweZR8d tY3aNQSRn3sPpwJr6Mi /PqQKAMMrZ9ckJpf1+b QMOOvxgzz2U1GS18b3y ZKcgTMEaJzd/GZYzi/B N2DzQ0MsrSwYXfsNLFO Bbs8PJMW4LYIxeeOe6rUgkWOF 7CC9Dh/dduQ1QrsJhmZAEFfd6ByYV+ ;{id = 2854 (zsk), size = 1688b}
example.com. 3600 IN RRSIG DNSKEY DSA 2 3600 20070926134150 20070829134150 2854 example.com. MCwCFBQRtlR4BEv9ohi+PGFjp+AHsJuHAhRCvz0shggvnvI88DFnBDCczHUcVA== ;{id = 2854}
SECTION AUTHORITY
example.com. IN NS ns.example.com.
example.com. 3600 IN RRSIG NS 3 2 3600 20070926134150 20070829134150 2854 example.com. MC0CFQCN+qHdJxoI/2tNKwsb08pra/G7aAIUAWA5sDdJTbrXA1/3OaesGBAO3sI= ;{id = 2854}
SECTION ADDITIONAL
ns.example.com. IN A 1.2.3.4
ns.example.com. 3600 IN RRSIG A 3 3 3600 20070926135752 20070829135752 2854 example.com. MC0CFQCMSWxVehgOQLoYclB9PIAbNP229AIUeH0vNNGJhjnZiqgIOKvs1EhzqAo= ;{id = 2854}
ENTRY_END
; response for delegation to sub.example.com.
ENTRY_BEGIN
MATCH opcode subdomain
ADJUST copy_id copy_query
REPLY QR NOERROR
SECTION QUESTION
sub.example.com. IN A
SECTION ANSWER
SECTION AUTHORITY
sub.example.com. IN NS ns.sub.example.com.
sub.example.com. 3600 IN DS 30899 RSASHA1 1 f7ed618f24d5e5202927e1d27bc2e84a141cb4b3
sub.example.com. 3600 IN RRSIG DS 3 3 3600 20070926134150 20070829134150 2854 example.com. MCwCFCW3ix0GD4BSvNLWIbROCJt5DAW9AhRt/kg9kBKJ20UBUdumrBUHqnskdA== ;{id = 2854}
SECTION ADDITIONAL
ns.sub.example.com. IN A 1.2.3.6
ENTRY_END
RANGE_END
; ns.sub.example.com.
RANGE_BEGIN 0 100
ADDRESS 1.2.3.6
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
sub.example.com. IN NS
SECTION ANSWER
sub.example.com. IN NS ns.sub.example.com.
;sub.example.com. 3600 IN RRSIG NS 5 3 3600 20070926134150 20070829134150 30899 sub.example.com. wcpHeBILHfo8C9uxMhcW03gcURZeUffiKdSTb50ZjzTHgMNhRyMfpcvSpXEd9548A9UTmWKeLZChfr5Z/glONw== ;{id = 30899}
SECTION ADDITIONAL
ns.sub.example.com. IN A 1.2.3.6
;ns.sub.example.com. 3600 IN RRSIG A 5 4 3600 20070926134150 20070829134150 30899 sub.example.com. UF7shD/gt1FOp2UHgLTNbPzVykklSXFMEtJ1xD+Hholwf/PIzd7zoaIttIYibNa4fUXCqMg22H9P7MRhfmFe6g== ;{id = 30899}
ENTRY_END
; barely valid nodata for AAAA
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
ns.sub.example.com. IN AAAA
SECTION AUTHORITY
sub.example.com. IN NS ns.sub.example.com.
;sub.example.com. 3600 IN RRSIG NS 5 3 3600 20070926134150 20070829134150 30899 sub.example.com. wcpHeBILHfo8C9uxMhcW03gcURZeUffiKdSTb50ZjzTHgMNhRyMfpcvSpXEd9548A9UTmWKeLZChfr5Z/glONw== ;{id = 30899}
SECTION ADDITIONAL
ns.sub.example.com. IN A 1.2.3.6
;ns.sub.example.com. 3600 IN RRSIG A 5 4 3600 20070926134150 20070829134150 30899 sub.example.com. UF7shD/gt1FOp2UHgLTNbPzVykklSXFMEtJ1xD+Hholwf/PIzd7zoaIttIYibNa4fUXCqMg22H9P7MRhfmFe6g== ;{id = 30899}
ENTRY_END
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
ns.sub.example.com. IN A
SECTION ANSWER
ns.sub.example.com. IN A 1.2.3.6
;ns.sub.example.com. 3600 IN RRSIG A 5 4 3600 20070926134150 20070829134150 30899 sub.example.com. UF7shD/gt1FOp2UHgLTNbPzVykklSXFMEtJ1xD+Hholwf/PIzd7zoaIttIYibNa4fUXCqMg22H9P7MRhfmFe6g== ;{id = 30899}
ENTRY_END
; response to DNSKEY priming query
; sub.example.com. 3600 IN DS 30899 RSASHA1 1 f7ed618f24d5e5202927e1d27bc2e84a141cb4b3
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
sub.example.com. IN DNSKEY
SECTION ANSWER
sub.example.com. 3600 IN DNSKEY 256 3 5 AQPQ41chR9DEHt/aIzIFAqanbDlRflJoRs5yz1jFsoRIT7dWf0r+PeDuewdxkszNH6wnU4QL8pfKFRh5PIYVBLK3 ;{id = 30899 (zsk), size = 512b}
;sub.example.com. 3600 IN RRSIG DNSKEY 5 3 3600 20070926134150 20070829134150 30899 sub.example.com. uNGp99iznjD7oOX02XnQbDnbg75UwBHRvZSKYUorTKvPUnCWMHKdRsQ+mf+Fx3GZ+Fz9BVjoCmQqpnfgXLEYqw== ;{id = 30899}
SECTION AUTHORITY
sub.example.com. IN NS ns.sub.example.com.
;sub.example.com. 3600 IN RRSIG NS 5 3 3600 20070926134150 20070829134150 30899 sub.example.com. wcpHeBILHfo8C9uxMhcW03gcURZeUffiKdSTb50ZjzTHgMNhRyMfpcvSpXEd9548A9UTmWKeLZChfr5Z/glONw== ;{id = 30899}
SECTION ADDITIONAL
ns.sub.example.com. IN A 1.2.3.6
;ns.sub.example.com. 3600 IN RRSIG A 5 4 3600 20070926134150 20070829134150 30899 sub.example.com. UF7shD/gt1FOp2UHgLTNbPzVykklSXFMEtJ1xD+Hholwf/PIzd7zoaIttIYibNa4fUXCqMg22H9P7MRhfmFe6g== ;{id = 30899}
ENTRY_END
; response to query of interest
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
www.sub.example.com. IN A
SECTION ANSWER
www.sub.example.com. IN A 11.11.11.11
;www.sub.example.com. 3600 IN RRSIG A 5 4 3600 20070926134150 20070829134150 30899 sub.example.com. 0DqqRfRtm7VSEQ4mmBbzrKRqQAay3JAE8DPDGmjtokrrjN9F1G/HxozDV7bjdIh2EChlQea8FPwf/GepJMUVxg== ;{id = 30899}
SECTION AUTHORITY
SECTION ADDITIONAL
ENTRY_END
RANGE_END
STEP 1 QUERY
ENTRY_BEGIN
REPLY RD DO
SECTION QUESTION
www.sub.example.com. IN A
ENTRY_END
; recursion happens here.
STEP 10 CHECK_ANSWER
ENTRY_BEGIN
MATCH all
REPLY QR RD RA SERVFAIL
SECTION QUESTION
www.sub.example.com. IN A
ENTRY_END
SCENARIO_END
dnssecjava-1.1.3/src/test/resources/unbound/val_stub_noroot.rpl 0000664 0000000 0000000 00000005123 13020541473 0025025 0 ustar 00root root 0000000 0000000 ; config options
server:
target-fetch-policy: "0 0 0 0 0"
trust-anchor: "lp0.eu. IN DNSKEY 257 3 5 AQPQ41chR9DEHt/aIzIFAqanbDlRflJoRs5yz1jFsoRIT7dWf0r+PeDuewdxkszNH6wnU4QL8pfKFRh5PIYVBLK3"
val-override-date: "20100913111500"
; the dlv anchor is completely ignored, but here to test that.
dlv-anchor: "dlv.isc.org. IN DNSKEY 257 3 5 AQPQ41chR9DEHt/aIzIFAqanbDlRflJoRs5yz1jFsoRIT7dWf0r+PeDuewdxkszNH6wnU4QL8pfKFRh5PIYVBLK3"
stub-zone:
name: "."
stub-addr: 81.187.81.187
stub-zone:
name: "lp0.eu"
stub-addr: 81.2.80.65
stub-prime: no
CONFIG_END
SCENARIO_BEGIN Test validation of stub zone without root prime.
; this server does not respond. (for the root)
RANGE_BEGIN 0 100
ADDRESS 81.187.81.187
ENTRY_BEGIN
MATCH
ADJUST copy_id copy_query
REPLY QR SERVFAIL
SECTION QUESTION
. IN NS
ENTRY_END
RANGE_END
; lp0.eu server
RANGE_BEGIN 0 100
ADDRESS 81.2.80.65
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
lp0.eu. IN DNSKEY
SECTION ANSWER
lp0.eu. 3600 IN DNSKEY 257 3 5 AQPQ41chR9DEHt/aIzIFAqanbDlRflJoRs5yz1jFsoRIT7dWf0r+PeDuewdxkszNH6wnU4QL8pfKFRh5PIYVBLK3 ;{id = 30900 (ksk), size = 512b}
lp0.eu. 3600 IN RRSIG DNSKEY 5 2 3600 20101013111500 20100909111500 30900 lp0.eu. zWYOT1zmB2k7hMl7mke7k1UNp4lDveUxi2EnF0tW++j2/qJopiAAcFHBo2GOo88jHcLWycurf0Qo+YGXfFbpEg== ;{id = 30900}
ENTRY_END
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
proxima.lp0.eu. IN A
SECTION ANSWER
proxima.lp0.eu. IN A 81.2.80.65
proxima.lp0.eu. 3600 IN RRSIG A 5 3 3600 20101013111500 20100909111500 30900 lp0.eu. xwS3PLSlxh500pDYh/t6fnLzxQAra6n3nhzk4fVqLzwmneBIfcx4F/vO44wRzXSprz1UbMkVUcruTbQYlLFBEg== ;{id = 30900}
SECTION AUTHORITY
lp0.eu. IN NS proxima.lp0.eu.
lp0.eu. 3600 IN RRSIG NS 5 2 3600 20101013111500 20100909111500 30900 lp0.eu. KM7Zfwc1b0Ay8Ezer0ZAERPbmgGzKIrTfZMxzXzSkVx5DWirTtdgPTNVG/y9fkN4tUARNhElN2eb0ufb04Hdgw== ;{id = 30900}
ENTRY_END
RANGE_END
STEP 1 QUERY
ENTRY_BEGIN
REPLY RD DO
SECTION QUESTION
proxima.lp0.eu. IN A
ENTRY_END
; recursion happens here.
STEP 10 CHECK_ANSWER
ENTRY_BEGIN
MATCH all
REPLY QR RD RA AD NOERROR
SECTION QUESTION
proxima.lp0.eu. IN A
SECTION ANSWER
proxima.lp0.eu. IN A 81.2.80.65
proxima.lp0.eu. 3600 IN RRSIG A 5 3 3600 20101013111500 20100909111500 30900 lp0.eu. xwS3PLSlxh500pDYh/t6fnLzxQAra6n3nhzk4fVqLzwmneBIfcx4F/vO44wRzXSprz1UbMkVUcruTbQYlLFBEg== ;{id = 30900}
SECTION AUTHORITY
lp0.eu. IN NS proxima.lp0.eu.
lp0.eu. 3600 IN RRSIG NS 5 2 3600 20101013111500 20100909111500 30900 lp0.eu. KM7Zfwc1b0Ay8Ezer0ZAERPbmgGzKIrTfZMxzXzSkVx5DWirTtdgPTNVG/y9fkN4tUARNhElN2eb0ufb04Hdgw== ;{id = 30900}
ENTRY_END
SCENARIO_END
dnssecjava-1.1.3/src/test/resources/unbound/val_stubds.rpl 0000664 0000000 0000000 00000036216 13020541473 0023763 0 ustar 00root root 0000000 0000000 ; config options
; The island of trust is at example.com
server:
trust-anchor: "example.com. 3600 IN DS 2854 3 1 46e4ffc6e9a4793b488954bd3f0cc6af0dfb201b"
val-override-date: "20070916134226"
target-fetch-policy: "0 0 0 0 0"
stub-zone:
name: "."
stub-addr: 193.0.14.129 # K.ROOT-SERVERS.NET.
stub-zone:
name: "sub.example.com"
stub-addr: 1.2.3.6
CONFIG_END
SCENARIO_BEGIN Test stub with DS query
; The stub zone is linked validly with a DS to the public internet zone.
; unbound just has to be able to ask the DS from the right server (not
; from the stub).
; K.ROOT-SERVERS.NET.
RANGE_BEGIN 0 100
ADDRESS 193.0.14.129
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
. IN NS
SECTION ANSWER
. IN NS K.ROOT-SERVERS.NET.
SECTION ADDITIONAL
K.ROOT-SERVERS.NET. IN A 193.0.14.129
ENTRY_END
ENTRY_BEGIN
MATCH opcode subdomain
ADJUST copy_id copy_query
REPLY QR NOERROR
SECTION QUESTION
com. IN NS
SECTION AUTHORITY
com. IN NS a.gtld-servers.net.
SECTION ADDITIONAL
a.gtld-servers.net. IN A 192.5.6.30
ENTRY_END
RANGE_END
; a.gtld-servers.net.
RANGE_BEGIN 0 100
ADDRESS 192.5.6.30
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
com. IN NS
SECTION ANSWER
com. IN NS a.gtld-servers.net.
SECTION ADDITIONAL
a.gtld-servers.net. IN A 192.5.6.30
ENTRY_END
ENTRY_BEGIN
MATCH opcode subdomain
ADJUST copy_id copy_query
REPLY QR NOERROR
SECTION QUESTION
example.com. IN A
SECTION AUTHORITY
example.com. IN NS ns.example.com.
SECTION ADDITIONAL
ns.example.com. IN A 1.2.3.4
ENTRY_END
RANGE_END
; ns.example.com.
RANGE_BEGIN 0 100
ADDRESS 1.2.3.4
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
example.com. IN NS
SECTION ANSWER
example.com. IN NS ns.example.com.
example.com. 3600 IN RRSIG NS 3 2 3600 20070926134150 20070829134150 2854 example.com. MC0CFQCN+qHdJxoI/2tNKwsb08pra/G7aAIUAWA5sDdJTbrXA1/3OaesGBAO3sI= ;{id = 2854}
SECTION ADDITIONAL
ns.example.com. IN A 1.2.3.4
ns.example.com. 3600 IN RRSIG A 3 3 3600 20070926135752 20070829135752 2854 example.com. MC0CFQCMSWxVehgOQLoYclB9PIAbNP229AIUeH0vNNGJhjnZiqgIOKvs1EhzqAo= ;{id = 2854}
ENTRY_END
; response to DNSKEY priming query
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
example.com. IN DNSKEY
SECTION ANSWER
example.com. 3600 IN DNSKEY 256 3 3 ALXLUsWqUrY3JYER3T4TBJII s70j+sDS/UT2QRp61SE7S3E EXopNXoFE73JLRmvpi/UrOO/Vz4Se 6wXv/CYCKjGw06U4WRgR YXcpEhJROyNapmdIKSx hOzfLVE1gqA0PweZR8d tY3aNQSRn3sPpwJr6Mi /PqQKAMMrZ9ckJpf1+b QMOOvxgzz2U1GS18b3y ZKcgTMEaJzd/GZYzi/B N2DzQ0MsrSwYXfsNLFO Bbs8PJMW4LYIxeeOe6rUgkWOF 7CC9Dh/dduQ1QrsJhmZAEFfd6ByYV+ ;{id = 2854 (zsk), size = 1688b}
example.com. 3600 IN RRSIG DNSKEY DSA 2 3600 20070926134150 20070829134150 2854 example.com. MCwCFBQRtlR4BEv9ohi+PGFjp+AHsJuHAhRCvz0shggvnvI88DFnBDCczHUcVA== ;{id = 2854}
SECTION AUTHORITY
example.com. IN NS ns.example.com.
example.com. 3600 IN RRSIG NS 3 2 3600 20070926134150 20070829134150 2854 example.com. MC0CFQCN+qHdJxoI/2tNKwsb08pra/G7aAIUAWA5sDdJTbrXA1/3OaesGBAO3sI= ;{id = 2854}
SECTION ADDITIONAL
ns.example.com. IN A 1.2.3.4
ns.example.com. 3600 IN RRSIG A 3 3 3600 20070926135752 20070829135752 2854 example.com. MC0CFQCMSWxVehgOQLoYclB9PIAbNP229AIUeH0vNNGJhjnZiqgIOKvs1EhzqAo= ;{id = 2854}
ENTRY_END
; response for DS of sub.example.com.
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
sub.example.com. IN DS
SECTION ANSWER
sub.example.com. 3600 IN DS 30899 RSASHA1 1 f7ed618f24d5e5202927e1d27bc2e84a141cb4b3
sub.example.com. 3600 IN RRSIG DS 3 3 3600 20070926134150 20070829134150 2854 example.com. MCwCFCW3ix0GD4BSvNLWIbROCJt5DAW9AhRt/kg9kBKJ20UBUdumrBUHqnskdA== ;{id = 2854}
SECTION AUTHORITY
SECTION ADDITIONAL
ENTRY_END
; response for delegation to sub.example.com.
ENTRY_BEGIN
MATCH opcode subdomain
ADJUST copy_id copy_query
REPLY QR NOERROR
SECTION QUESTION
sub.example.com. IN A
SECTION ANSWER
SECTION AUTHORITY
sub.example.com. IN NS ns.sub.example.com.
sub.example.com. 3600 IN DS 30899 RSASHA1 1 f7ed618f24d5e5202927e1d27bc2e84a141cb4b3
sub.example.com. 3600 IN RRSIG DS 3 3 3600 20070926134150 20070829134150 2854 example.com. MCwCFCW3ix0GD4BSvNLWIbROCJt5DAW9AhRt/kg9kBKJ20UBUdumrBUHqnskdA== ;{id = 2854}
SECTION ADDITIONAL
ns.sub.example.com. IN A 1.2.3.6
ENTRY_END
RANGE_END
; ns.sub.example.com.
RANGE_BEGIN 0 100
ADDRESS 1.2.3.6
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
sub.example.com. IN NS
SECTION ANSWER
sub.example.com. IN NS ns.sub.example.com.
sub.example.com. 3600 IN RRSIG NS 5 3 3600 20070926134150 20070829134150 30899 sub.example.com. wcpHeBILHfo8C9uxMhcW03gcURZeUffiKdSTb50ZjzTHgMNhRyMfpcvSpXEd9548A9UTmWKeLZChfr5Z/glONw== ;{id = 30899}
SECTION ADDITIONAL
ns.sub.example.com. IN A 1.2.3.6
ns.sub.example.com. 3600 IN RRSIG A 5 4 3600 20070926134150 20070829134150 30899 sub.example.com. UF7shD/gt1FOp2UHgLTNbPzVykklSXFMEtJ1xD+Hholwf/PIzd7zoaIttIYibNa4fUXCqMg22H9P7MRhfmFe6g== ;{id = 30899}
ENTRY_END
; response to DNSKEY priming query
; sub.example.com. 3600 IN DS 30899 RSASHA1 1 f7ed618f24d5e5202927e1d27bc2e84a141cb4b3
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
sub.example.com. IN DNSKEY
SECTION ANSWER
sub.example.com. 3600 IN DNSKEY 256 3 5 AQPQ41chR9DEHt/aIzIFAqanbDlRflJoRs5yz1jFsoRIT7dWf0r+PeDuewdxkszNH6wnU4QL8pfKFRh5PIYVBLK3 ;{id = 30899 (zsk), size = 512b}
sub.example.com. 3600 IN RRSIG DNSKEY 5 3 3600 20070926134150 20070829134150 30899 sub.example.com. uNGp99iznjD7oOX02XnQbDnbg75UwBHRvZSKYUorTKvPUnCWMHKdRsQ+mf+Fx3GZ+Fz9BVjoCmQqpnfgXLEYqw== ;{id = 30899}
SECTION AUTHORITY
sub.example.com. IN NS ns.sub.example.com.
sub.example.com. 3600 IN RRSIG NS 5 3 3600 20070926134150 20070829134150 30899 sub.example.com. wcpHeBILHfo8C9uxMhcW03gcURZeUffiKdSTb50ZjzTHgMNhRyMfpcvSpXEd9548A9UTmWKeLZChfr5Z/glONw== ;{id = 30899}
SECTION ADDITIONAL
ns.sub.example.com. IN A 1.2.3.6
ns.sub.example.com. 3600 IN RRSIG A 5 4 3600 20070926134150 20070829134150 30899 sub.example.com. UF7shD/gt1FOp2UHgLTNbPzVykklSXFMEtJ1xD+Hholwf/PIzd7zoaIttIYibNa4fUXCqMg22H9P7MRhfmFe6g== ;{id = 30899}
ENTRY_END
; response for qtype DS. This is not available here.
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR SERVFAIL
SECTION QUESTION
sub.example.com. IN DS
SECTION ANSWER
SECTION AUTHORITY
SECTION ADDITIONAL
ENTRY_END
; response to query of interest
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
www.sub.example.com. IN A
SECTION ANSWER
www.sub.example.com. IN A 11.11.11.11
www.sub.example.com. 3600 IN RRSIG A 5 4 3600 20070926134150 20070829134150 30899 sub.example.com. 0DqqRfRtm7VSEQ4mmBbzrKRqQAay3JAE8DPDGmjtokrrjN9F1G/HxozDV7bjdIh2EChlQea8FPwf/GepJMUVxg== ;{id = 30899}
SECTION AUTHORITY
SECTION ADDITIONAL
ENTRY_END
RANGE_END
STEP 1 QUERY
ENTRY_BEGIN
REPLY RD DO
SECTION QUESTION
www.sub.example.com. IN A
ENTRY_END
; recursion happens here.
STEP 10 CHECK_ANSWER
ENTRY_BEGIN
MATCH all
REPLY QR RD RA AD NOERROR
SECTION QUESTION
www.sub.example.com. IN A
SECTION ANSWER
www.sub.example.com. 3600 IN A 11.11.11.11
www.sub.example.com. 3600 IN RRSIG A 5 4 3600 20070926134150 20070829134150 30899 sub.example.com. 0DqqRfRtm7VSEQ4mmBbzrKRqQAay3JAE8DPDGmjtokrrjN9F1G/HxozDV7bjdIh2EChlQea8FPwf/GepJMUVxg== ;{id = 30899}
SECTION AUTHORITY
SECTION ADDITIONAL
ENTRY_END
SCENARIO_END
; config options
; The island of trust is at example.com
server:
trust-anchor: "example.com. 3600 IN DS 2854 3 1 46e4ffc6e9a4793b488954bd3f0cc6af0dfb201b"
val-override-date: "20070916134226"
target-fetch-policy: "0 0 0 0 0"
stub-zone:
name: "."
stub-addr: 193.0.14.129 # K.ROOT-SERVERS.NET.
stub-zone:
name: "sub.example.com"
stub-addr: 1.2.3.6
CONFIG_END
SCENARIO_BEGIN Test stub with DS query
; The stub zone is linked validly with a DS to the public internet zone.
; unbound just has to be able to ask the DS from the right server (not
; from the stub).
; K.ROOT-SERVERS.NET.
RANGE_BEGIN 0 100
ADDRESS 193.0.14.129
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
. IN NS
SECTION ANSWER
. IN NS K.ROOT-SERVERS.NET.
SECTION ADDITIONAL
K.ROOT-SERVERS.NET. IN A 193.0.14.129
ENTRY_END
ENTRY_BEGIN
MATCH opcode subdomain
ADJUST copy_id copy_query
REPLY QR NOERROR
SECTION QUESTION
com. IN NS
SECTION AUTHORITY
com. IN NS a.gtld-servers.net.
SECTION ADDITIONAL
a.gtld-servers.net. IN A 192.5.6.30
ENTRY_END
RANGE_END
; a.gtld-servers.net.
RANGE_BEGIN 0 100
ADDRESS 192.5.6.30
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
com. IN NS
SECTION ANSWER
com. IN NS a.gtld-servers.net.
SECTION ADDITIONAL
a.gtld-servers.net. IN A 192.5.6.30
ENTRY_END
ENTRY_BEGIN
MATCH opcode subdomain
ADJUST copy_id copy_query
REPLY QR NOERROR
SECTION QUESTION
example.com. IN A
SECTION AUTHORITY
example.com. IN NS ns.example.com.
SECTION ADDITIONAL
ns.example.com. IN A 1.2.3.4
ENTRY_END
RANGE_END
; ns.example.com.
RANGE_BEGIN 0 100
ADDRESS 1.2.3.4
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
example.com. IN NS
SECTION ANSWER
example.com. IN NS ns.example.com.
example.com. 3600 IN RRSIG NS 3 2 3600 20070926134150 20070829134150 2854 example.com. MC0CFQCN+qHdJxoI/2tNKwsb08pra/G7aAIUAWA5sDdJTbrXA1/3OaesGBAO3sI= ;{id = 2854}
SECTION ADDITIONAL
ns.example.com. IN A 1.2.3.4
ns.example.com. 3600 IN RRSIG A 3 3 3600 20070926135752 20070829135752 2854 example.com. MC0CFQCMSWxVehgOQLoYclB9PIAbNP229AIUeH0vNNGJhjnZiqgIOKvs1EhzqAo= ;{id = 2854}
ENTRY_END
; response to DNSKEY priming query
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
example.com. IN DNSKEY
SECTION ANSWER
example.com. 3600 IN DNSKEY 256 3 3 ALXLUsWqUrY3JYER3T4TBJII s70j+sDS/UT2QRp61SE7S3E EXopNXoFE73JLRmvpi/UrOO/Vz4Se 6wXv/CYCKjGw06U4WRgR YXcpEhJROyNapmdIKSx hOzfLVE1gqA0PweZR8d tY3aNQSRn3sPpwJr6Mi /PqQKAMMrZ9ckJpf1+b QMOOvxgzz2U1GS18b3y ZKcgTMEaJzd/GZYzi/B N2DzQ0MsrSwYXfsNLFO Bbs8PJMW4LYIxeeOe6rUgkWOF 7CC9Dh/dduQ1QrsJhmZAEFfd6ByYV+ ;{id = 2854 (zsk), size = 1688b}
example.com. 3600 IN RRSIG DNSKEY DSA 2 3600 20070926134150 20070829134150 2854 example.com. MCwCFBQRtlR4BEv9ohi+PGFjp+AHsJuHAhRCvz0shggvnvI88DFnBDCczHUcVA== ;{id = 2854}
SECTION AUTHORITY
example.com. IN NS ns.example.com.
example.com. 3600 IN RRSIG NS 3 2 3600 20070926134150 20070829134150 2854 example.com. MC0CFQCN+qHdJxoI/2tNKwsb08pra/G7aAIUAWA5sDdJTbrXA1/3OaesGBAO3sI= ;{id = 2854}
SECTION ADDITIONAL
ns.example.com. IN A 1.2.3.4
ns.example.com. 3600 IN RRSIG A 3 3 3600 20070926135752 20070829135752 2854 example.com. MC0CFQCMSWxVehgOQLoYclB9PIAbNP229AIUeH0vNNGJhjnZiqgIOKvs1EhzqAo= ;{id = 2854}
ENTRY_END
; response for DS of sub.example.com.
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
sub.example.com. IN DS
SECTION ANSWER
sub.example.com. 3600 IN DS 30899 RSASHA1 1 f7ed618f24d5e5202927e1d27bc2e84a141cb4b3
sub.example.com. 3600 IN RRSIG DS 3 3 3600 20070926134150 20070829134150 2854 example.com. MCwCFCW3ix0GD4BSvNLWIbROCJt5DAW9AhRt/kg9kBKJ20UBUdumrBUHqnskdA== ;{id = 2854}
SECTION AUTHORITY
SECTION ADDITIONAL
ENTRY_END
; response for delegation to sub.example.com.
ENTRY_BEGIN
MATCH opcode subdomain
ADJUST copy_id copy_query
REPLY QR NOERROR
SECTION QUESTION
sub.example.com. IN A
SECTION ANSWER
SECTION AUTHORITY
sub.example.com. IN NS ns.sub.example.com.
sub.example.com. 3600 IN DS 30899 RSASHA1 1 f7ed618f24d5e5202927e1d27bc2e84a141cb4b3
sub.example.com. 3600 IN RRSIG DS 3 3 3600 20070926134150 20070829134150 2854 example.com. MCwCFCW3ix0GD4BSvNLWIbROCJt5DAW9AhRt/kg9kBKJ20UBUdumrBUHqnskdA== ;{id = 2854}
SECTION ADDITIONAL
ns.sub.example.com. IN A 1.2.3.6
ENTRY_END
RANGE_END
; ns.sub.example.com.
RANGE_BEGIN 0 100
ADDRESS 1.2.3.6
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
sub.example.com. IN NS
SECTION ANSWER
sub.example.com. IN NS ns.sub.example.com.
sub.example.com. 3600 IN RRSIG NS 5 3 3600 20070926134150 20070829134150 30899 sub.example.com. wcpHeBILHfo8C9uxMhcW03gcURZeUffiKdSTb50ZjzTHgMNhRyMfpcvSpXEd9548A9UTmWKeLZChfr5Z/glONw== ;{id = 30899}
SECTION ADDITIONAL
ns.sub.example.com. IN A 1.2.3.6
ns.sub.example.com. 3600 IN RRSIG A 5 4 3600 20070926134150 20070829134150 30899 sub.example.com. UF7shD/gt1FOp2UHgLTNbPzVykklSXFMEtJ1xD+Hholwf/PIzd7zoaIttIYibNa4fUXCqMg22H9P7MRhfmFe6g== ;{id = 30899}
ENTRY_END
; response to DNSKEY priming query
; sub.example.com. 3600 IN DS 30899 RSASHA1 1 f7ed618f24d5e5202927e1d27bc2e84a141cb4b3
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
sub.example.com. IN DNSKEY
SECTION ANSWER
sub.example.com. 3600 IN DNSKEY 256 3 5 AQPQ41chR9DEHt/aIzIFAqanbDlRflJoRs5yz1jFsoRIT7dWf0r+PeDuewdxkszNH6wnU4QL8pfKFRh5PIYVBLK3 ;{id = 30899 (zsk), size = 512b}
sub.example.com. 3600 IN RRSIG DNSKEY 5 3 3600 20070926134150 20070829134150 30899 sub.example.com. uNGp99iznjD7oOX02XnQbDnbg75UwBHRvZSKYUorTKvPUnCWMHKdRsQ+mf+Fx3GZ+Fz9BVjoCmQqpnfgXLEYqw== ;{id = 30899}
SECTION AUTHORITY
sub.example.com. IN NS ns.sub.example.com.
sub.example.com. 3600 IN RRSIG NS 5 3 3600 20070926134150 20070829134150 30899 sub.example.com. wcpHeBILHfo8C9uxMhcW03gcURZeUffiKdSTb50ZjzTHgMNhRyMfpcvSpXEd9548A9UTmWKeLZChfr5Z/glONw== ;{id = 30899}
SECTION ADDITIONAL
ns.sub.example.com. IN A 1.2.3.6
ns.sub.example.com. 3600 IN RRSIG A 5 4 3600 20070926134150 20070829134150 30899 sub.example.com. UF7shD/gt1FOp2UHgLTNbPzVykklSXFMEtJ1xD+Hholwf/PIzd7zoaIttIYibNa4fUXCqMg22H9P7MRhfmFe6g== ;{id = 30899}
ENTRY_END
; response for qtype DS. This is not available here.
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR SERVFAIL
SECTION QUESTION
sub.example.com. IN DS
SECTION ANSWER
SECTION AUTHORITY
SECTION ADDITIONAL
ENTRY_END
; response to query of interest
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
www.sub.example.com. IN A
SECTION ANSWER
www.sub.example.com. IN A 11.11.11.11
www.sub.example.com. 3600 IN RRSIG A 5 4 3600 20070926134150 20070829134150 30899 sub.example.com. 0DqqRfRtm7VSEQ4mmBbzrKRqQAay3JAE8DPDGmjtokrrjN9F1G/HxozDV7bjdIh2EChlQea8FPwf/GepJMUVxg== ;{id = 30899}
SECTION AUTHORITY
SECTION ADDITIONAL
ENTRY_END
RANGE_END
STEP 1 QUERY
ENTRY_BEGIN
REPLY RD DO
SECTION QUESTION
www.sub.example.com. IN A
ENTRY_END
; recursion happens here.
STEP 10 CHECK_ANSWER
ENTRY_BEGIN
MATCH all
REPLY QR RD RA AD NOERROR
SECTION QUESTION
www.sub.example.com. IN A
SECTION ANSWER
www.sub.example.com. 3600 IN A 11.11.11.11
www.sub.example.com. 3600 IN RRSIG A 5 4 3600 20070926134150 20070829134150 30899 sub.example.com. 0DqqRfRtm7VSEQ4mmBbzrKRqQAay3JAE8DPDGmjtokrrjN9F1G/HxozDV7bjdIh2EChlQea8FPwf/GepJMUVxg== ;{id = 30899}
SECTION AUTHORITY
SECTION ADDITIONAL
ENTRY_END
SCENARIO_END
dnssecjava-1.1.3/src/test/resources/unbound/val_ta_algo_dnskey.rpl 0000664 0000000 0000000 00000020701 13020541473 0025432 0 ustar 00root root 0000000 0000000 ; config options
; The island of trust is at example.com
server:
trust-anchor: "example.com. 3600 IN DNSKEY 256 3 3 ALXLUsWqUrY3JYER3T4TBJIIs70j+sDS/UT2QRp61SE7S3EEXopNXoFE73JLRmvpi/UrOO/Vz4Se6wXv/CYCKjGw06U4WRgRYXcpEhJROyNapmdIKSxhOzfLVE1gqA0PweZR8dtY3aNQSRn3sPpwJr6Mi/PqQKAMMrZ9ckJpf1+bQMOOvxgzz2U1GS18b3yZKcgTMEaJzd/GZYzi/BN2DzQ0MsrSwYXfsNLFOBbs8PJMW4LYIxeeOe6rUgkWOF7CC9Dh/dduQ1QrsJhmZAEFfd6ByYV+ ;{id = 2854 (zsk), size = 1688b}"
trust-anchor: "example.com. 3600 IN DS 30899 5 1 d4bf9d2e10f6d76840d42ef5913022abcd0bf512"
val-override-date: "20070916134226"
target-fetch-policy: "0 0 0 0 0"
stub-zone:
name: "."
stub-addr: 193.0.14.129 # K.ROOT-SERVERS.NET.
CONFIG_END
SCENARIO_BEGIN Test validator with multiple algorithm trust anchor
; K.ROOT-SERVERS.NET.
RANGE_BEGIN 0 100
ADDRESS 193.0.14.129
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
. IN NS
SECTION ANSWER
. IN NS K.ROOT-SERVERS.NET.
SECTION ADDITIONAL
K.ROOT-SERVERS.NET. IN A 193.0.14.129
ENTRY_END
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
www.example.com. IN A
SECTION AUTHORITY
com. IN NS a.gtld-servers.net.
SECTION ADDITIONAL
a.gtld-servers.net. IN A 192.5.6.30
ENTRY_END
RANGE_END
; a.gtld-servers.net.
RANGE_BEGIN 0 100
ADDRESS 192.5.6.30
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
com. IN NS
SECTION ANSWER
com. IN NS a.gtld-servers.net.
SECTION ADDITIONAL
a.gtld-servers.net. IN A 192.5.6.30
ENTRY_END
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
www.example.com. IN A
SECTION AUTHORITY
example.com. IN NS ns.example.com.
SECTION ADDITIONAL
ns.example.com. IN A 1.2.3.4
ENTRY_END
RANGE_END
; ns.example.com.
RANGE_BEGIN 0 100
ADDRESS 1.2.3.4
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
example.com. IN NS
SECTION ANSWER
example.com. IN NS ns.example.com.
example.com. 3600 IN RRSIG NS 3 2 3600 20070926134150 20070829134150 2854 example.com. MC0CFQCN+qHdJxoI/2tNKwsb08pra/G7aAIUAWA5sDdJTbrXA1/3OaesGBAO3sI= ;{id = 2854}
example.com. 3600 IN RRSIG NS 5 2 3600 20070926134150 20070829134150 30899 example.com. YTqtYba73HIOQuPr5oDyIX9pfmz1ybEBjwlD/jUgcPmFINUOZ9FeqG6ywgRKwn4AizkKTK00p1sxZYMKxl91wg== ;{id = 30899}
SECTION ADDITIONAL
ns.example.com. IN A 1.2.3.4
ns.example.com. 3600 IN RRSIG A 3 3 3600 20070926135752 20070829135752 2854 example.com. MC0CFQCMSWxVehgOQLoYclB9PIAbNP229AIUeH0vNNGJhjnZiqgIOKvs1EhzqAo= ;{id = 2854}
ns.example.com. 3600 IN RRSIG A 5 3 3600 20070926134150 20070829134150 30899 example.com. Dn1ziMKrc3NdJkSv8g61Y9WNk3+BAuwCwnYzAZiHmkejkSCPViLJN7+f4Conp9l8LkTl50ZnLgoYrrUYNhMj6w== ;{id = 30899}
ENTRY_END
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR AA NOERROR
SECTION QUESTION
ns.example.com. IN AAAA
SECTION ANSWER
SECTION AUTHORITY
example.com. IN NS ns.example.com.
example.com. 3600 IN RRSIG NS 3 2 3600 20070926134150 20070829134150 2854 example.com. MC0CFQCN+qHdJxoI/2tNKwsb08pra/G7aAIUAWA5sDdJTbrXA1/3OaesGBAO3sI= ;{id = 2854}
example.com. 3600 IN RRSIG NS 5 2 3600 20070926134150 20070829134150 30899 example.com. YTqtYba73HIOQuPr5oDyIX9pfmz1ybEBjwlD/jUgcPmFINUOZ9FeqG6ywgRKwn4AizkKTK00p1sxZYMKxl91wg== ;{id = 30899}
SECTION ADDITIONAL
ns.example.com. IN A 1.2.3.4
ns.example.com. 3600 IN RRSIG A 3 3 3600 20070926135752 20070829135752 2854 example.com. MC0CFQCMSWxVehgOQLoYclB9PIAbNP229AIUeH0vNNGJhjnZiqgIOKvs1EhzqAo= ;{id = 2854}
ns.example.com. 3600 IN RRSIG A 5 3 3600 20070926134150 20070829134150 30899 example.com. Dn1ziMKrc3NdJkSv8g61Y9WNk3+BAuwCwnYzAZiHmkejkSCPViLJN7+f4Conp9l8LkTl50ZnLgoYrrUYNhMj6w== ;{id = 30899}
ENTRY_END
; response to DNSKEY priming query
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
example.com. IN DNSKEY
SECTION ANSWER
example.com. 3600 IN DNSKEY 256 3 5 AQPQ41chR9DEHt/aIzIFAqanbDlRflJoRs5yz1jFsoRIT7dWf0r+PeDuewdxkszNH6wnU4QL8pfKFRh5PIYVBLK3 ;{id = 30899 (zsk), size = 512b}
example.com. 3600 IN DNSKEY 256 3 3 ALXLUsWqUrY3JYER3T4TBJIIs70j+sDS/UT2QRp61SE7S3EEXopNXoFE73JLRmvpi/UrOO/Vz4Se6wXv/CYCKjGw06U4WRgRYXcpEhJROyNapmdIKSxhOzfLVE1gqA0PweZR8dtY3aNQSRn3sPpwJr6Mi/PqQKAMMrZ9ckJpf1+bQMOOvxgzz2U1GS18b3yZKcgTMEaJzd/GZYzi/BN2DzQ0MsrSwYXfsNLFOBbs8PJMW4LYIxeeOe6rUgkWOF7CC9Dh/dduQ1QrsJhmZAEFfd6ByYV+ ;{id = 2854 (zsk), size = 512b}
example.com. 3600 IN RRSIG DNSKEY 3 2 3600 20070926134150 20070829134150 2854 example.com. AKIIYDOGHogglFqJK94ZtOnF7EfGikgAyloMNRSMCrQgFaFkmcOyjrc= ;{id = 2854}
example.com. 3600 IN RRSIG DNSKEY 5 2 3600 20070926134150 20070829134150 30899 example.com. J55fsz1GGMnngc4r50xvXDUdaVMlfcLKLVsfMhwNLF+ERac5XV/lLRAc/aSER+qQdsSo0CrjYjy1wat7YQpDAA== ;{id = 30899}
SECTION AUTHORITY
example.com. IN NS ns.example.com.
example.com. 3600 IN RRSIG NS 3 2 3600 20070926134150 20070829134150 2854 example.com. MC0CFQCN+qHdJxoI/2tNKwsb08pra/G7aAIUAWA5sDdJTbrXA1/3OaesGBAO3sI= ;{id = 2854}
example.com. 3600 IN RRSIG NS 5 2 3600 20070926134150 20070829134150 30899 example.com. YTqtYba73HIOQuPr5oDyIX9pfmz1ybEBjwlD/jUgcPmFINUOZ9FeqG6ywgRKwn4AizkKTK00p1sxZYMKxl91wg== ;{id = 30899}
SECTION ADDITIONAL
ns.example.com. IN A 1.2.3.4
ns.example.com. 3600 IN RRSIG A 3 3 3600 20070926135752 20070829135752 2854 example.com. MC0CFQCMSWxVehgOQLoYclB9PIAbNP229AIUeH0vNNGJhjnZiqgIOKvs1EhzqAo= ;{id = 2854}
ns.example.com. 3600 IN RRSIG A 5 3 3600 20070926134150 20070829134150 30899 example.com. Dn1ziMKrc3NdJkSv8g61Y9WNk3+BAuwCwnYzAZiHmkejkSCPViLJN7+f4Conp9l8LkTl50ZnLgoYrrUYNhMj6w== ;{id = 30899}
ENTRY_END
; response to query of interest
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
www.example.com. IN A
SECTION ANSWER
www.example.com. IN A 10.20.30.40
www.example.com. 3600 IN RRSIG A 3 3 3600 20070926134150 20070829134150 2854 example.com. MC0CFC99iE9K5y2WNgI0gFvBWaTi9wm6AhUAoUqOpDtG5Zct+Qr9F3mSdnbc6V4= ;{id = 2854}
www.example.com. 3600 IN RRSIG A 5 3 3600 20070926134150 20070829134150 30899 example.com. JNWECShNE+nCLQwOXJJ3xpUkh2G+FCh5nk8uYAHIVQRse/BIvCMSlvRrtVyw9RnXvk5RR2bEgN0pRdLWW7ug5Q== ;{id = 30899}
SECTION AUTHORITY
example.com. IN NS ns.example.com.
example.com. 3600 IN RRSIG NS 3 2 3600 20070926134150 20070829134150 2854 example.com. MC0CFQCN+qHdJxoI/2tNKwsb08pra/G7aAIUAWA5sDdJTbrXA1/3OaesGBAO3sI= ;{id = 2854}
example.com. 3600 IN RRSIG NS 5 2 3600 20070926134150 20070829134150 30899 example.com. YTqtYba73HIOQuPr5oDyIX9pfmz1ybEBjwlD/jUgcPmFINUOZ9FeqG6ywgRKwn4AizkKTK00p1sxZYMKxl91wg== ;{id = 30899}
SECTION ADDITIONAL
ns.example.com. IN A 1.2.3.4
ns.example.com. 3600 IN RRSIG A 3 3 3600 20070926134150 20070829134150 2854 example.com. MC0CFQCQMyTjn7WWwpwAR1LlVeLpRgZGuQIUCcJDEkwAuzytTDRlYK7nIMwH1CM= ;{id = 2854}
ns.example.com. 3600 IN RRSIG A 5 3 3600 20070926134150 20070829134150 30899 example.com. Dn1ziMKrc3NdJkSv8g61Y9WNk3+BAuwCwnYzAZiHmkejkSCPViLJN7+f4Conp9l8LkTl50ZnLgoYrrUYNhMj6w== ;{id = 30899}
ENTRY_END
RANGE_END
STEP 1 QUERY
ENTRY_BEGIN
REPLY RD DO
SECTION QUESTION
www.example.com. IN A
ENTRY_END
; recursion happens here.
STEP 10 CHECK_ANSWER
ENTRY_BEGIN
MATCH all
REPLY QR RD RA AD NOERROR
SECTION QUESTION
www.example.com. IN A
SECTION ANSWER
www.example.com. IN A 10.20.30.40
www.example.com. 3600 IN RRSIG A 5 3 3600 20070926134150 20070829134150 30899 example.com. JNWECShNE+nCLQwOXJJ3xpUkh2G+FCh5nk8uYAHIVQRse/BIvCMSlvRrtVyw9RnXvk5RR2bEgN0pRdLWW7ug5Q== ;{id = 30899}
www.example.com. 3600 IN RRSIG A 3 3 3600 20070926134150 20070829134150 2854 example.com. MC0CFC99iE9K5y2WNgI0gFvBWaTi9wm6AhUAoUqOpDtG5Zct+Qr9F3mSdnbc6V4= ;{id = 2854}
SECTION AUTHORITY
example.com. IN NS ns.example.com.
example.com. 3600 IN RRSIG NS 3 2 3600 20070926134150 20070829134150 2854 example.com. MC0CFQCN+qHdJxoI/2tNKwsb08pra/G7aAIUAWA5sDdJTbrXA1/3OaesGBAO3sI= ;{id = 2854}
example.com. 3600 IN RRSIG NS 5 2 3600 20070926134150 20070829134150 30899 example.com. YTqtYba73HIOQuPr5oDyIX9pfmz1ybEBjwlD/jUgcPmFINUOZ9FeqG6ywgRKwn4AizkKTK00p1sxZYMKxl91wg== ;{id = 30899}
SECTION ADDITIONAL
ns.example.com. IN A 1.2.3.4
ns.example.com. 3600 IN RRSIG A 3 3 3600 20070926134150 20070829134150 2854 example.com. MC0CFQCQMyTjn7WWwpwAR1LlVeLpRgZGuQIUCcJDEkwAuzytTDRlYK7nIMwH1CM= ;{id = 2854}
ns.example.com. 3600 IN RRSIG A 5 3 3600 20070926134150 20070829134150 30899 example.com. Dn1ziMKrc3NdJkSv8g61Y9WNk3+BAuwCwnYzAZiHmkejkSCPViLJN7+f4Conp9l8LkTl50ZnLgoYrrUYNhMj6w== ;{id = 30899}
ENTRY_END
SCENARIO_END
dnssecjava-1.1.3/src/test/resources/unbound/val_ta_algo_missing.rpl 0000664 0000000 0000000 00000016452 13020541473 0025616 0 ustar 00root root 0000000 0000000 ; config options
; The island of trust is at example.com
server:
trust-anchor: "example.com. 3600 IN DNSKEY 256 3 3 ALXLUsWqUrY3JYER3T4TBJIIs70j+sDS/UT2QRp61SE7S3EEXopNXoFE73JLRmvpi/UrOO/Vz4Se6wXv/CYCKjGw06U4WRgRYXcpEhJROyNapmdIKSxhOzfLVE1gqA0PweZR8dtY3aNQSRn3sPpwJr6Mi/PqQKAMMrZ9ckJpf1+bQMOOvxgzz2U1GS18b3yZKcgTMEaJzd/GZYzi/BN2DzQ0MsrSwYXfsNLFOBbs8PJMW4LYIxeeOe6rUgkWOF7CC9Dh/dduQ1QrsJhmZAEFfd6ByYV+ ;{id = 2854 (zsk), size = 1688b}"
trust-anchor: "example.com. 3600 IN DS 30899 5 1 d4bf9d2e10f6d76840d42ef5913022abcd0bf512"
trust-anchor: "example.com. 3600 IN DS 30899 7 1 d4bf9d2e10f6d76840d42ef5913022abcd0bf512"
val-override-date: "20070916134226"
target-fetch-policy: "0 0 0 0 0"
stub-zone:
name: "."
stub-addr: 193.0.14.129 # K.ROOT-SERVERS.NET.
CONFIG_END
SCENARIO_BEGIN Test validator with multiple algorithm missing one
; K.ROOT-SERVERS.NET.
RANGE_BEGIN 0 100
ADDRESS 193.0.14.129
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
. IN NS
SECTION ANSWER
. IN NS K.ROOT-SERVERS.NET.
SECTION ADDITIONAL
K.ROOT-SERVERS.NET. IN A 193.0.14.129
ENTRY_END
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
www.example.com. IN A
SECTION AUTHORITY
com. IN NS a.gtld-servers.net.
SECTION ADDITIONAL
a.gtld-servers.net. IN A 192.5.6.30
ENTRY_END
RANGE_END
; a.gtld-servers.net.
RANGE_BEGIN 0 100
ADDRESS 192.5.6.30
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
com. IN NS
SECTION ANSWER
com. IN NS a.gtld-servers.net.
SECTION ADDITIONAL
a.gtld-servers.net. IN A 192.5.6.30
ENTRY_END
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
www.example.com. IN A
SECTION AUTHORITY
example.com. IN NS ns.example.com.
SECTION ADDITIONAL
ns.example.com. IN A 1.2.3.4
ENTRY_END
RANGE_END
; ns.example.com.
RANGE_BEGIN 0 100
ADDRESS 1.2.3.4
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
example.com. IN NS
SECTION ANSWER
example.com. IN NS ns.example.com.
example.com. 3600 IN RRSIG NS 3 2 3600 20070926134150 20070829134150 2854 example.com. MC0CFQCN+qHdJxoI/2tNKwsb08pra/G7aAIUAWA5sDdJTbrXA1/3OaesGBAO3sI= ;{id = 2854}
example.com. 3600 IN RRSIG NS 5 2 3600 20070926134150 20070829134150 30899 example.com. YTqtYba73HIOQuPr5oDyIX9pfmz1ybEBjwlD/jUgcPmFINUOZ9FeqG6ywgRKwn4AizkKTK00p1sxZYMKxl91wg== ;{id = 30899}
SECTION ADDITIONAL
ns.example.com. IN A 1.2.3.4
ns.example.com. 3600 IN RRSIG A 3 3 3600 20070926135752 20070829135752 2854 example.com. MC0CFQCMSWxVehgOQLoYclB9PIAbNP229AIUeH0vNNGJhjnZiqgIOKvs1EhzqAo= ;{id = 2854}
ns.example.com. 3600 IN RRSIG A 5 3 3600 20070926134150 20070829134150 30899 example.com. Dn1ziMKrc3NdJkSv8g61Y9WNk3+BAuwCwnYzAZiHmkejkSCPViLJN7+f4Conp9l8LkTl50ZnLgoYrrUYNhMj6w== ;{id = 30899}
ENTRY_END
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR AA NOERROR
SECTION QUESTION
ns.example.com. IN AAAA
SECTION ANSWER
SECTION AUTHORITY
example.com. IN NS ns.example.com.
example.com. 3600 IN RRSIG NS 3 2 3600 20070926134150 20070829134150 2854 example.com. MC0CFQCN+qHdJxoI/2tNKwsb08pra/G7aAIUAWA5sDdJTbrXA1/3OaesGBAO3sI= ;{id = 2854}
example.com. 3600 IN RRSIG NS 5 2 3600 20070926134150 20070829134150 30899 example.com. YTqtYba73HIOQuPr5oDyIX9pfmz1ybEBjwlD/jUgcPmFINUOZ9FeqG6ywgRKwn4AizkKTK00p1sxZYMKxl91wg== ;{id = 30899}
SECTION ADDITIONAL
ns.example.com. IN A 1.2.3.4
ns.example.com. 3600 IN RRSIG A 3 3 3600 20070926135752 20070829135752 2854 example.com. MC0CFQCMSWxVehgOQLoYclB9PIAbNP229AIUeH0vNNGJhjnZiqgIOKvs1EhzqAo= ;{id = 2854}
ns.example.com. 3600 IN RRSIG A 5 3 3600 20070926134150 20070829134150 30899 example.com. Dn1ziMKrc3NdJkSv8g61Y9WNk3+BAuwCwnYzAZiHmkejkSCPViLJN7+f4Conp9l8LkTl50ZnLgoYrrUYNhMj6w== ;{id = 30899}
ENTRY_END
; response to DNSKEY priming query
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
example.com. IN DNSKEY
SECTION ANSWER
example.com. 3600 IN DNSKEY 256 3 5 AQPQ41chR9DEHt/aIzIFAqanbDlRflJoRs5yz1jFsoRIT7dWf0r+PeDuewdxkszNH6wnU4QL8pfKFRh5PIYVBLK3 ;{id = 30899 (zsk), size = 512b}
example.com. 3600 IN DNSKEY 256 3 3 ALXLUsWqUrY3JYER3T4TBJIIs70j+sDS/UT2QRp61SE7S3EEXopNXoFE73JLRmvpi/UrOO/Vz4Se6wXv/CYCKjGw06U4WRgRYXcpEhJROyNapmdIKSxhOzfLVE1gqA0PweZR8dtY3aNQSRn3sPpwJr6Mi/PqQKAMMrZ9ckJpf1+bQMOOvxgzz2U1GS18b3yZKcgTMEaJzd/GZYzi/BN2DzQ0MsrSwYXfsNLFOBbs8PJMW4LYIxeeOe6rUgkWOF7CC9Dh/dduQ1QrsJhmZAEFfd6ByYV+ ;{id = 2854 (zsk), size = 512b}
example.com. 3600 IN RRSIG DNSKEY 3 2 3600 20070926134150 20070829134150 2854 example.com. AKIIYDOGHogglFqJK94ZtOnF7EfGikgAyloMNRSMCrQgFaFkmcOyjrc= ;{id = 2854}
example.com. 3600 IN RRSIG DNSKEY 5 2 3600 20070926134150 20070829134150 30899 example.com. J55fsz1GGMnngc4r50xvXDUdaVMlfcLKLVsfMhwNLF+ERac5XV/lLRAc/aSER+qQdsSo0CrjYjy1wat7YQpDAA== ;{id = 30899}
SECTION AUTHORITY
example.com. IN NS ns.example.com.
example.com. 3600 IN RRSIG NS 3 2 3600 20070926134150 20070829134150 2854 example.com. MC0CFQCN+qHdJxoI/2tNKwsb08pra/G7aAIUAWA5sDdJTbrXA1/3OaesGBAO3sI= ;{id = 2854}
example.com. 3600 IN RRSIG NS 5 2 3600 20070926134150 20070829134150 30899 example.com. YTqtYba73HIOQuPr5oDyIX9pfmz1ybEBjwlD/jUgcPmFINUOZ9FeqG6ywgRKwn4AizkKTK00p1sxZYMKxl91wg== ;{id = 30899}
SECTION ADDITIONAL
ns.example.com. IN A 1.2.3.4
ns.example.com. 3600 IN RRSIG A 3 3 3600 20070926135752 20070829135752 2854 example.com. MC0CFQCMSWxVehgOQLoYclB9PIAbNP229AIUeH0vNNGJhjnZiqgIOKvs1EhzqAo= ;{id = 2854}
ns.example.com. 3600 IN RRSIG A 5 3 3600 20070926134150 20070829134150 30899 example.com. Dn1ziMKrc3NdJkSv8g61Y9WNk3+BAuwCwnYzAZiHmkejkSCPViLJN7+f4Conp9l8LkTl50ZnLgoYrrUYNhMj6w== ;{id = 30899}
ENTRY_END
; response to query of interest
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
www.example.com. IN A
SECTION ANSWER
www.example.com. IN A 10.20.30.40
ns.example.com. 3600 IN RRSIG A 3 3 3600 20070926134150 20070829134150 2854 example.com. MC0CFQCQMyTjn7WWwpwAR1LlVeLpRgZGuQIUCcJDEkwAuzytTDRlYK7nIMwH1CM= ;{id = 2854}
www.example.com. 3600 IN RRSIG A 5 3 3600 20070926134150 20070829134150 30899 example.com. JNWECShNE+nCLQwOXJJ3xpUkh2G+FCh5nk8uYAHIVQRse/BIvCMSlvRrtVyw9RnXvk5RR2bEgN0pRdLWW7ug5Q== ;{id = 30899}
SECTION AUTHORITY
example.com. IN NS ns.example.com.
example.com. 3600 IN RRSIG NS 3 2 3600 20070926134150 20070829134150 2854 example.com. MC0CFQCN+qHdJxoI/2tNKwsb08pra/G7aAIUAWA5sDdJTbrXA1/3OaesGBAO3sI= ;{id = 2854}
example.com. 3600 IN RRSIG NS 5 2 3600 20070926134150 20070829134150 30899 example.com. YTqtYba73HIOQuPr5oDyIX9pfmz1ybEBjwlD/jUgcPmFINUOZ9FeqG6ywgRKwn4AizkKTK00p1sxZYMKxl91wg== ;{id = 30899}
SECTION ADDITIONAL
ns.example.com. IN A 1.2.3.4
www.example.com. 3600 IN RRSIG A 3 3 3600 20070926134150 20070829134150 2854 example.com. MC0CFC99iE9K5y2WNgI0gFvBWaTi9wm6AhUAoUqOpDtG5Zct+Qr9F3mSdnbc6V4= ;{id = 2854}
ns.example.com. 3600 IN RRSIG A 5 3 3600 20070926134150 20070829134150 30899 example.com. Dn1ziMKrc3NdJkSv8g61Y9WNk3+BAuwCwnYzAZiHmkejkSCPViLJN7+f4Conp9l8LkTl50ZnLgoYrrUYNhMj6w== ;{id = 30899}
ENTRY_END
RANGE_END
STEP 1 QUERY
ENTRY_BEGIN
REPLY RD DO
SECTION QUESTION
www.example.com. IN A
ENTRY_END
; recursion happens here.
STEP 10 CHECK_ANSWER
ENTRY_BEGIN
MATCH all
REPLY QR RD RA SERVFAIL
SECTION QUESTION
www.example.com. IN A
SECTION ANSWER
ENTRY_END
SCENARIO_END
dnssecjava-1.1.3/src/test/resources/unbound/val_twocname.rpl 0000664 0000000 0000000 00000023350 13020541473 0024267 0 ustar 00root root 0000000 0000000 ; config options
server:
trust-anchor: "ORG. DS 21366 7 1 E6C1716CFB6BDC84E84CE1AB5510DAC69173B5B2"
val-override-date: "20091116100204"
forward-zone:
name: "."
forward-addr: 192.0.2.1
CONFIG_END
SCENARIO_BEGIN Test validator with unsigned CNAME to signed CNAME to data
RANGE_BEGIN 0 100
ADDRESS 192.0.2.1
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
k.root-servers.org. IN A
SECTION ANSWER
k.root-servers.org. 3600 IN CNAME www.ripe.net.
ENTRY_END
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
www.ripe.net. IN A
SECTION ANSWER
www.ripe.net. 900 IN CNAME aquila-www.ripe.net.
www.ripe.net. 900 IN RRSIG CNAME 5 3 900 20091216060007 20091116060007 19386 ripe.net. NjCpVZC/LLnoV1pa91GSL9SP65n7eFKoe/OcuKzUPHumXIDrXnE23F1rNfbjYpVrQDEsG6iInI7Edh2MCS4NI4tLwrytEDgCX7ZnqIMIOV2/gJa5ZkLlmVT71Agnfi788q7ozEq14zlhY+brD5kyBiEcfOhH/qkX+zJuGdt1AcQwMxYn/GQ0Z32k5ulBnzrIFWObBksO ;{id = 19386}
SECTION AUTHORITY
ripe.net. 172800 IN NS ns3.nic.fr.
ripe.net. 172800 IN NS sunic.sunet.se.
ripe.net. 172800 IN NS ns-pri.ripe.net.
ripe.net. 172800 IN NS sns-pb.isc.org.
ripe.net. 172800 IN RRSIG NS 5 2 172800 20091216060007 20091116060007 19386 ripe.net. Km2zmkvPOjRddE+SlFBokj2QVroW/R8D2C6u6uCtFI5HVLZTV+oxrIw1ZYYWwe/Jf2CpVBzh3P6iHtWvojM8DHhfkO84wsO33ssqzIzq7e8nDOinqeeGB7yyl642xHCt0jObRewX1hU6Deubs42pFZmO6YKL8Tx6Jb5oe2yyoVebv4bX2qLoEPFw9plE0VavfD397Y4g ;{id = 19386}
SECTION ADDITIONAL
ns-pri.ripe.net. 172800 IN A 193.0.0.195
ns-pri.ripe.net. 172800 IN AAAA 2001:610:240:0:53::3
ns-pri.ripe.net. 172800 IN RRSIG A 5 3 172800 20091216060007 20091116060007 19386 ripe.net. BRxWwUNDivDxXnrPlj3/VPUBrf/bk8tKljRG0pQ/7XucTUMR9ae1huNVTC+FTrfZjggqU9/PZlyJ9TwI1lp7J1lEua1mByCHObzHlO7Cq/m7sjZ9cFvpIm6ke2c+xxjs3X8mHsiyftSsCCSvB43DLhgcJtib6QZlCpFxa4Y3sg1fx+1GENrbKlcuJGGqkdrAw0irvKEv ;{id = 19386}
ns-pri.ripe.net. 172800 IN RRSIG AAAA 5 3 172800 20091216060007 20091116060007 19386 ripe.net. Ngd/GLGHakPj1A4rna19OPFpMPVSgCj7CgBtsuwjGwurMFEje4F4miNleazkdQKqe2kRMpB+Kg2OBnnRZpjR2PR9ZjRv6rss6/DL5qMRkDH6Xghwl5ZZzIONTgRSZlHKaHQZ7BHR2azZTo9wupK7VuE7f7EWmjBc5SDNiNOfwuEujUg2DvO1JOv16P2JLeQ3Vst4ovxW ;{id = 19386}
ENTRY_END
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
aquila-www.ripe.net. IN A
SECTION ANSWER
aquila-www.ripe.net. 600 IN A 193.0.19.25
aquila-www.ripe.net. 600 IN RRSIG A 5 3 600 20091216060007 20091116060007 19386 ripe.net. RuPSSATpwiS5hY4WTt7x9Hzq1tQ+ttWgq0hpgJPSorqJHlLbvgucXd8LhrcIFmBm/K/3sj9UYP1viCjbqfvjGToUdv+g4z9KrNq3FoAal6WSyTBgxAgvnHjNi9gRTZBm4O+rUQCKUD8XwlG6r3SKo6iOeSM84CHeQkGjsp5GNxpGnIagWkr5BzjKhaaUc+i82vk1SrNa ;{id = 19386}
SECTION AUTHORITY
ripe.net. 172800 IN NS ns3.nic.fr.
ripe.net. 172800 IN NS sunic.sunet.se.
ripe.net. 172800 IN NS ns-pri.ripe.net.
ripe.net. 172800 IN NS sns-pb.isc.org.
ripe.net. 172800 IN RRSIG NS 5 2 172800 20091216060007 20091116060007 19386 ripe.net. Km2zmkvPOjRddE+SlFBokj2QVroW/R8D2C6u6uCtFI5HVLZTV+oxrIw1ZYYWwe/Jf2CpVBzh3P6iHtWvojM8DHhfkO84wsO33ssqzIzq7e8nDOinqeeGB7yyl642xHCt0jObRewX1hU6Deubs42pFZmO6YKL8Tx6Jb5oe2yyoVebv4bX2qLoEPFw9plE0VavfD397Y4g ;{id = 19386}
SECTION ADDITIONAL
ns-pri.ripe.net. 172800 IN A 193.0.0.195
ns-pri.ripe.net. 172800 IN AAAA 2001:610:240:0:53::3
ns-pri.ripe.net. 172800 IN RRSIG A 5 3 172800 20091216060007 20091116060007 19386 ripe.net. BRxWwUNDivDxXnrPlj3/VPUBrf/bk8tKljRG0pQ/7XucTUMR9ae1huNVTC+FTrfZjggqU9/PZlyJ9TwI1lp7J1lEua1mByCHObzHlO7Cq/m7sjZ9cFvpIm6ke2c+xxjs3X8mHsiyftSsCCSvB43DLhgcJtib6QZlCpFxa4Y3sg1fx+1GENrbKlcuJGGqkdrAw0irvKEv ;{id = 19386}
ns-pri.ripe.net. 172800 IN RRSIG AAAA 5 3 172800 20091216060007 20091116060007 19386 ripe.net. Ngd/GLGHakPj1A4rna19OPFpMPVSgCj7CgBtsuwjGwurMFEje4F4miNleazkdQKqe2kRMpB+Kg2OBnnRZpjR2PR9ZjRv6rss6/DL5qMRkDH6Xghwl5ZZzIONTgRSZlHKaHQZ7BHR2azZTo9wupK7VuE7f7EWmjBc5SDNiNOfwuEujUg2DvO1JOv16P2JLeQ3Vst4ovxW ;{id = 19386}
ENTRY_END
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
ORG. IN DNSKEY
SECTION ANSWER
ORG. 900 IN DNSKEY 256 3 7 AwEAAdV7bl0omw53nFPoUZSowSTSTDpQO4K8th19coBjlS0iMIWb0NF5YzGkoeditMS8ZLkgc9wS9txeH6XGHzwqJNc5eQcQEOasmC7vqaopoeN/GP/ZkUMbtNTcN1qzS9WzJ4gToxeNCHkAc7LZGh5XY/v1n599hk/ifotV/ZDGhN+H ;{id = 5273 (zsk), size = 1024b}
ORG. 900 IN DNSKEY 257 3 7 AwEAAYpYfj3aaRzzkxWQqMdl7YExY81NdYSv+qayuZDodnZ9IMh0bwMcYaVUdzNAbVeJ8gd6jq1sR3VvP/SR36mmGssbV4Udl5ORDtqiZP2TDNDHxEnKKTX+jWfytZeT7d3AbSzBKC0v7uZrM6M2eoJnl6id66rEUmQC2p9DrrDg9F6tXC9CD/zC7/y+BNNpiOdnM5DXk7HhZm7ra9E7ltL13h2mx7kEgU8e6npJlCoXjraIBgUDthYs48W/sdTDLu7N59rjCG+bpil+c8oZ9f7NR3qmSTpTP1m86RqUQnVErifrH8KjDqL+3wzUdF5ACkYwt1XhPVPU+wSIlzbaAQN49PU= ;{id = 21366 (ksk), size = 2048b}
ORG. 900 IN DNSKEY 257 3 7 AwEAAZTjbIO5kIpxWUtyXc8avsKyHIIZ+LjC2Dv8naO+Tz6X2fqzDC1bdq7HlZwtkaqTkMVVJ+8gE9FIreGJ4c8G1GdbjQgbP1OyYIG7OHTc4hv5T2NlyWr6k6QFz98Q4zwFIGTFVvwBhmrMDYsOTtXakK6QwHovA1+83BsUACxlidpwB0hQacbD6x+I2RCDzYuTzj64Jv0/9XsX6AYV3ebcgn4hL1jIR2eJYyXlrAoWxdzxcW//5yeL5RVWuhRxejmnSVnCuxkfS4AQ485KH2tpdbWcCopLJZs6tw8q3jWcpTGzdh/v3xdYfNpQNcPImFlxAun3BtORPA2r8ti6MNoJEHU= ;{id = 9795 (ksk), size = 2048b}
ORG. 900 IN DNSKEY 256 3 7 AwEAAaT7yoAEj5kX1rW40gMxUgPYGIc6hIPXihtK44jq6UQlZxTeFdsNX6aNaFpSq9pbI19y4JfQvCPPjw2248fwNzgwxfkdyRk7vzKagad2hs8wQ/C7vYuTUoTjrOBRwnsEHix+jYgKZH+lX1ZRKo/YXyMz05KWH+3j5y0VSrKBcdBZ ;{id = 53990 (zsk), size = 1024b}
ORG. 900 IN RRSIG DNSKEY 7 1 900 20091123154522 20091109144522 5273 org. zHcY20bnIBzsl1CXmZdtt8PWPy079Ic3dQ/pLH2z1yCoC+kWGzLIlU/EcWa0rrQzqc9oK+v63xzXFoib3LewcijiGmKYtFcyi3HGfVdJrDFIxmN52x4pZerVZq9NA/FLQ8ZrobkVgYiEAmjMU1OesPPZPwwlPRdSG421q3o3N4Q= ;{id = 5273}
ORG. 900 IN RRSIG DNSKEY 7 1 900 20091123154522 20091109144522 21366 org. Xlh0UQl+Ldig/jBS7Ty9rfeUztG5P7Brjr/Du+XlC7KjUkk/gNfpxgPmIKuA3ZLwgwTvEF6i7CD7b5gEKKC2P8Y5kQjKcjcDZl0+5W1IfpFF1Ka546erCy5cznXT23W5bzODNiraMs7KwvwMlD3LeOCiBeldPKeZ0yxWI/3YXmwAbkky4MApX9khSnilSaewcVSzQM/iOVuCR/+5esNvcKqjgWbT3M4vorzjc7YxVxF2BTgxybDOn4OkWvdeSlDiIVVS+VtxK0U7yIc59mpE7WxoRLtw/Qkd8bjh+KF5izQO2Q/7VxhkJ6pBxxumHwQahlgOQYxWMLqUc/EZnXSQpQ== ;{id = 21366}
ENTRY_END
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
root-servers.org. IN DS
SECTION ANSWER
SECTION AUTHORITY
h9p7u7tr2u91d0v0ljs9l1gidnp90u3h.org. 86399 IN NSEC3 1 1 1 d399eaab h9rsfb7fpf2l8hg35cmpc765tdk23rp6 NS SOA RRSIG DNSKEY NSEC3PARAM ; flags: optout
h9p7u7tr2u91d0v0ljs9l1gidnp90u3h.org. 86399 IN RRSIG NSEC3 7 2 86400 20091130090148 20091116080148 5273 org. FL7e/4Lhihh9LKAPDKNmlvEHbjkPY/6GLhtVMWtbSfBS8rAaHuInCD/tbQxCmFmT6e3HXHXkUcjC7BSDFPnlhtB8P2iNjvkdZJ72jVTXDY1P6LuK/OJhRT8DjFlHlvjdNgS5/0HCuGYU5A1GPkWGx1waUmblryPApb8HNSAmdYA= ;{id = 5273}
i8i48ibuph5kgh999ld485qnt660qdag.org. 86399 IN NSEC3 1 1 1 d399eaab i94atlaqkvkoms2q45m5msds8r3414ft A RRSIG ; flags: optout
i8i48ibuph5kgh999ld485qnt660qdag.org. 86399 IN RRSIG NSEC3 7 2 86400 20091125010858 20091111000858 5273 org. WrWFYs2FuzPRYh+hgc8B3ZKL6jiMee2F1FsPNVEx9Ojv76BMELWomI0Zcd90NZbs7kvs5FP1G79s9o3oQHeWVfa6as8Wi6RLn97nX3FVqYI39r7GZnoKj8QGrCsRCatqK4Lsh426X0vzR5CwIA14/XL1w6UQ1KuTHlIu51RidA4= ;{id = 5273}
ENTRY_END
RANGE_END
STEP 1 QUERY
ENTRY_BEGIN
REPLY RD DO
SECTION QUESTION
k.root-servers.org. IN A
ENTRY_END
; recursion happens here.
STEP 10 CHECK_ANSWER
ENTRY_BEGIN
MATCH all
REPLY QR RD RA NOERROR
SECTION QUESTION
k.root-servers.org. IN A
SECTION ANSWER
k.root-servers.org. IN CNAME www.ripe.net.
www.ripe.net. 900 IN CNAME aquila-www.ripe.net.
www.ripe.net. 900 IN RRSIG CNAME 5 3 900 20091216060007 20091116060007 19386 ripe.net. NjCpVZC/LLnoV1pa91GSL9SP65n7eFKoe/OcuKzUPHumXIDrXnE23F1rNfbjYpVrQDEsG6iInI7Edh2MCS4NI4tLwrytEDgCX7ZnqIMIOV2/gJa5ZkLlmVT71Agnfi788q7ozEq14zlhY+brD5kyBiEcfOhH/qkX+zJuGdt1AcQwMxYn/GQ0Z32k5ulBnzrIFWObBksO ;{id = 19386}
aquila-www.ripe.net. 600 IN A 193.0.19.25
aquila-www.ripe.net. 600 IN RRSIG A 5 3 600 20091216060007 20091116060007 19386 ripe.net. RuPSSATpwiS5hY4WTt7x9Hzq1tQ+ttWgq0hpgJPSorqJHlLbvgucXd8LhrcIFmBm/K/3sj9UYP1viCjbqfvjGToUdv+g4z9KrNq3FoAal6WSyTBgxAgvnHjNi9gRTZBm4O+rUQCKUD8XwlG6r3SKo6iOeSM84CHeQkGjsp5GNxpGnIagWkr5BzjKhaaUc+i82vk1SrNa ;{id = 19386}
SECTION AUTHORITY
ripe.net. 172800 IN NS ns3.nic.fr.
ripe.net. 172800 IN NS sunic.sunet.se.
ripe.net. 172800 IN NS ns-pri.ripe.net.
ripe.net. 172800 IN NS sns-pb.isc.org.
ripe.net. 172800 IN RRSIG NS 5 2 172800 20091216060007 20091116060007 19386 ripe.net. Km2zmkvPOjRddE+SlFBokj2QVroW/R8D2C6u6uCtFI5HVLZTV+oxrIw1ZYYWwe/Jf2CpVBzh3P6iHtWvojM8DHhfkO84wsO33ssqzIzq7e8nDOinqeeGB7yyl642xHCt0jObRewX1hU6Deubs42pFZmO6YKL8Tx6Jb5oe2yyoVebv4bX2qLoEPFw9plE0VavfD397Y4g ;{id = 19386}
SECTION ADDITIONAL
ns-pri.ripe.net. 172800 IN A 193.0.0.195
ns-pri.ripe.net. 172800 IN AAAA 2001:610:240:0:53::3
ns-pri.ripe.net. 172800 IN RRSIG A 5 3 172800 20091216060007 20091116060007 19386 ripe.net. BRxWwUNDivDxXnrPlj3/VPUBrf/bk8tKljRG0pQ/7XucTUMR9ae1huNVTC+FTrfZjggqU9/PZlyJ9TwI1lp7J1lEua1mByCHObzHlO7Cq/m7sjZ9cFvpIm6ke2c+xxjs3X8mHsiyftSsCCSvB43DLhgcJtib6QZlCpFxa4Y3sg1fx+1GENrbKlcuJGGqkdrAw0irvKEv ;{id = 19386}
ns-pri.ripe.net. 172800 IN RRSIG AAAA 5 3 172800 20091216060007 20091116060007 19386 ripe.net. Ngd/GLGHakPj1A4rna19OPFpMPVSgCj7CgBtsuwjGwurMFEje4F4miNleazkdQKqe2kRMpB+Kg2OBnnRZpjR2PR9ZjRv6rss6/DL5qMRkDH6Xghwl5ZZzIONTgRSZlHKaHQZ7BHR2azZTo9wupK7VuE7f7EWmjBc5SDNiNOfwuEujUg2DvO1JOv16P2JLeQ3Vst4ovxW ;{id = 19386}
ENTRY_END
SCENARIO_END
dnssecjava-1.1.3/src/test/resources/unbound/val_unalgo_anchor.rpl 0000664 0000000 0000000 00000011664 13020541473 0025276 0 ustar 00root root 0000000 0000000 ; config options
; The island of trust is at example.com
server:
trust-anchor: "example.com. 3600 IN DS 2854 208 1 46e4ffc6e9a4793b488954bd3f0cc6af0dfb201b"
val-override-date: "20070916134226"
target-fetch-policy: "0 0 0 0 0"
stub-zone:
name: "."
stub-addr: 193.0.14.129 # K.ROOT-SERVERS.NET.
CONFIG_END
SCENARIO_BEGIN Test validator with unsupported algorithm trust anchor
; K.ROOT-SERVERS.NET.
RANGE_BEGIN 0 100
ADDRESS 193.0.14.129
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
. IN NS
SECTION ANSWER
. IN NS K.ROOT-SERVERS.NET.
SECTION ADDITIONAL
K.ROOT-SERVERS.NET. IN A 193.0.14.129
ENTRY_END
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
www.example.com. IN A
SECTION AUTHORITY
com. IN NS a.gtld-servers.net.
SECTION ADDITIONAL
a.gtld-servers.net. IN A 192.5.6.30
ENTRY_END
RANGE_END
; a.gtld-servers.net.
RANGE_BEGIN 0 100
ADDRESS 192.5.6.30
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
com. IN NS
SECTION ANSWER
com. IN NS a.gtld-servers.net.
SECTION ADDITIONAL
a.gtld-servers.net. IN A 192.5.6.30
ENTRY_END
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
www.example.com. IN A
SECTION AUTHORITY
example.com. IN NS ns.example.com.
SECTION ADDITIONAL
ns.example.com. IN A 1.2.3.4
ENTRY_END
RANGE_END
; ns.example.com.
RANGE_BEGIN 0 100
ADDRESS 1.2.3.4
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
example.com. IN NS
SECTION ANSWER
example.com. IN NS ns.example.com.
example.com. 3600 IN RRSIG NS 3 2 3600 20070926134150 20070829134150 2854 example.com. MC0CFQCN+qHdJxoI/2tNKwsb08pra/G7aAIUAWA5sDdJTbrXA1/3OaesGBAO3sI= ;{id = 2854}
SECTION ADDITIONAL
ns.example.com. IN A 1.2.3.4
ns.example.com. 3600 IN RRSIG A 3 3 3600 20070926135752 20070829135752 2854 example.com. MC0CFQCMSWxVehgOQLoYclB9PIAbNP229AIUeH0vNNGJhjnZiqgIOKvs1EhzqAo= ;{id = 2854}
ENTRY_END
; response to DNSKEY priming query
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
example.com. IN DNSKEY
SECTION ANSWER
example.com. 3600 IN DNSKEY 256 3 3 ALXLUsWqUrY3JYER3T4TBJII s70j+sDS/UT2QRp61SE7S3E EXopNXoFE73JLRmvpi/UrOO/Vz4Se 6wXv/CYCKjGw06U4WRgR YXcpEhJROyNapmdIKSx hOzfLVE1gqA0PweZR8d tY3aNQSRn3sPpwJr6Mi /PqQKAMMrZ9ckJpf1+b QMOOvxgzz2U1GS18b3y ZKcgTMEaJzd/GZYzi/B N2DzQ0MsrSwYXfsNLFO Bbs8PJMW4LYIxeeOe6rUgkWOF 7CC9Dh/dduQ1QrsJhmZAEFfd6ByYV+ ;{id = 2854 (zsk), size = 1688b}
example.com. 3600 IN RRSIG DNSKEY 3 2 3600 20070926134802 20070829134802 2854 example.com. MCwCFG1yhRNtTEa3Eno2zhVVuy2EJX3wAhQeLyUp6+UXcpC5qGNu9tkrTEgPUg== ;{id = 2854}
SECTION AUTHORITY
example.com. IN NS ns.example.com.
example.com. 3600 IN RRSIG NS 3 2 3600 20070926134150 20070829134150 2854 example.com. MC0CFQCN+qHdJxoI/2tNKwsb08pra/G7aAIUAWA5sDdJTbrXA1/3OaesGBAO3sI= ;{id = 2854}
SECTION ADDITIONAL
ns.example.com. IN A 1.2.3.4
ns.example.com. 3600 IN RRSIG A 3 3 3600 20070926135752 20070829135752 2854 example.com. MC0CFQCMSWxVehgOQLoYclB9PIAbNP229AIUeH0vNNGJhjnZiqgIOKvs1EhzqAo= ;{id = 2854}
ENTRY_END
; response to query of interest
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
www.example.com. IN A
SECTION ANSWER
www.example.com. IN A 10.20.30.40
ns.example.com. 3600 IN RRSIG A 3 3 3600 20070926134150 20070829134150 2854 example.com. MC0CFQCQMyTjn7WWwpwAR1LlVeLpRgZGuQIUCcJDEkwAuzytTDRlYK7nIMwH1CM= ;{id = 2854}
SECTION AUTHORITY
example.com. IN NS ns.example.com.
example.com. 3600 IN RRSIG NS 3 2 3600 20070926134150 20070829134150 2854 example.com. MC0CFQCN+qHdJxoI/2tNKwsb08pra/G7aAIUAWA5sDdJTbrXA1/3OaesGBAO3sI= ;{id = 2854}
SECTION ADDITIONAL
ns.example.com. IN A 1.2.3.4
www.example.com. 3600 IN RRSIG A 3 3 3600 20070926134150 20070829134150 2854 example.com. MC0CFC99iE9K5y2WNgI0gFvBWaTi9wm6AhUAoUqOpDtG5Zct+Qr9F3mSdnbc6V4= ;{id = 2854}
ENTRY_END
RANGE_END
STEP 1 QUERY
ENTRY_BEGIN
REPLY RD DO
SECTION QUESTION
www.example.com. IN A
ENTRY_END
; recursion happens here.
STEP 10 CHECK_ANSWER
ENTRY_BEGIN
MATCH all
REPLY QR RD RA NOERROR
SECTION QUESTION
www.example.com. IN A
SECTION ANSWER
www.example.com. IN A 10.20.30.40
www.example.com. 3600 IN RRSIG A 3 3 3600 20070926134150 20070829134150 2854 example.com. MC0CFC99iE9K5y2WNgI0gFvBWaTi9wm6AhUAoUqOpDtG5Zct+Qr9F3mSdnbc6V4= ;{id = 2854}
SECTION AUTHORITY
example.com. IN NS ns.example.com.
example.com. 3600 IN RRSIG NS 3 2 3600 20070926134150 20070829134150 2854 example.com. MC0CFQCN+qHdJxoI/2tNKwsb08pra/G7aAIUAWA5sDdJTbrXA1/3OaesGBAO3sI= ;{id = 2854}
SECTION ADDITIONAL
ns.example.com. IN A 1.2.3.4
ns.example.com. 3600 IN RRSIG A 3 3 3600 20070926134150 20070829134150 2854 example.com. MC0CFQCQMyTjn7WWwpwAR1LlVeLpRgZGuQIUCcJDEkwAuzytTDRlYK7nIMwH1CM= ;{id = 2854}
ENTRY_END
SCENARIO_END
dnssecjava-1.1.3/src/test/resources/unbound/val_unalgo_dlv.rpl 0000664 0000000 0000000 00000024465 13020541473 0024614 0 ustar 00root root 0000000 0000000 ; config options
; The island of trust is at example.com (the DLV repository)
server:
dlv-anchor: "example.com. 3600 IN DS 2854 3 1 46e4ffc6e9a4793b488954bd3f0cc6af0dfb201b"
val-override-date: "20070916134226"
target-fetch-policy: "0 0 0 0 0"
stub-zone:
name: "."
stub-addr: 193.0.14.129 # K.ROOT-SERVERS.NET.
CONFIG_END
SCENARIO_BEGIN Test validator with unknown algorithm DLV anchor
; positive response for DLV.
; but only has unknown algos
; have to treat zone as insecure
; K.ROOT-SERVERS.NET.
RANGE_BEGIN 0 100
ADDRESS 193.0.14.129
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
. IN NS
SECTION ANSWER
. IN NS K.ROOT-SERVERS.NET.
SECTION ADDITIONAL
K.ROOT-SERVERS.NET. IN A 193.0.14.129
ENTRY_END
ENTRY_BEGIN
MATCH opcode subdomain
ADJUST copy_id copy_query
REPLY QR NOERROR
SECTION QUESTION
com. IN A
SECTION AUTHORITY
com. IN NS a.gtld-servers.net.
SECTION ADDITIONAL
a.gtld-servers.net. IN A 192.5.6.30
ENTRY_END
ENTRY_BEGIN
MATCH opcode subdomain
ADJUST copy_id copy_query
REPLY QR NOERROR
SECTION QUESTION
net. IN A
SECTION AUTHORITY
net. IN NS a.gtld-servers.net.
SECTION ADDITIONAL
a.gtld-servers.net. IN A 192.5.6.30
ENTRY_END
RANGE_END
; a.gtld-servers.net.
RANGE_BEGIN 0 100
ADDRESS 192.5.6.30
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
com. IN NS
SECTION ANSWER
com. IN NS a.gtld-servers.net.
SECTION ADDITIONAL
a.gtld-servers.net. IN A 192.5.6.30
ENTRY_END
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
net. IN NS
SECTION ANSWER
net. IN NS a.gtld-servers.net.
SECTION ADDITIONAL
a.gtld-servers.net. IN A 192.5.6.30
ENTRY_END
ENTRY_BEGIN
MATCH opcode subdomain
ADJUST copy_id copy_query
REPLY QR NOERROR
SECTION QUESTION
example.com. IN A
SECTION AUTHORITY
example.com. IN NS ns.example.com.
SECTION ADDITIONAL
ns.example.com. IN A 1.2.3.4
ENTRY_END
ENTRY_BEGIN
MATCH opcode subdomain
ADJUST copy_id copy_query
REPLY QR NOERROR
SECTION QUESTION
example.net. IN A
SECTION AUTHORITY
example.net. IN NS ns.example.net.
SECTION ADDITIONAL
ns.example.net. IN A 1.2.3.5
ENTRY_END
RANGE_END
; ns.example.com.
RANGE_BEGIN 0 100
ADDRESS 1.2.3.4
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
example.com. IN NS
SECTION ANSWER
example.com. IN NS ns.example.com.
example.com. 3600 IN RRSIG NS 3 2 3600 20070926134150 20070829134150 2854 example.com. MC0CFQCN+qHdJxoI/2tNKwsb08pra/G7aAIUAWA5sDdJTbrXA1/3OaesGBAO3sI= ;{id = 2854}
SECTION ADDITIONAL
ns.example.com. IN A 1.2.3.4
ns.example.com. 3600 IN RRSIG A 3 3 3600 20070926135752 20070829135752 2854 example.com. MC0CFQCMSWxVehgOQLoYclB9PIAbNP229AIUeH0vNNGJhjnZiqgIOKvs1EhzqAo= ;{id = 2854}
ENTRY_END
; response to DNSKEY priming query
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
example.com. IN DNSKEY
SECTION ANSWER
example.com. 3600 IN DNSKEY 256 3 3 ALXLUsWqUrY3JYER3T4TBJII s70j+sDS/UT2QRp61SE7S3E EXopNXoFE73JLRmvpi/UrOO/Vz4Se 6wXv/CYCKjGw06U4WRgR YXcpEhJROyNapmdIKSx hOzfLVE1gqA0PweZR8d tY3aNQSRn3sPpwJr6Mi /PqQKAMMrZ9ckJpf1+b QMOOvxgzz2U1GS18b3y ZKcgTMEaJzd/GZYzi/B N2DzQ0MsrSwYXfsNLFO Bbs8PJMW4LYIxeeOe6rUgkWOF 7CC9Dh/dduQ1QrsJhmZAEFfd6ByYV+ ;{id = 2854 (zsk), size = 1688b}
example.com. 3600 IN RRSIG DNSKEY 3 2 3600 20070926134802 20070829134802 2854 example.com. MCwCFG1yhRNtTEa3Eno2zhVVuy2EJX3wAhQeLyUp6+UXcpC5qGNu9tkrTEgPUg== ;{id = 2854}
SECTION AUTHORITY
example.com. IN NS ns.example.com.
example.com. 3600 IN RRSIG NS 3 2 3600 20070926134150 20070829134150 2854 example.com. MC0CFQCN+qHdJxoI/2tNKwsb08pra/G7aAIUAWA5sDdJTbrXA1/3OaesGBAO3sI= ;{id = 2854}
SECTION ADDITIONAL
ns.example.com. IN A 1.2.3.4
ns.example.com. 3600 IN RRSIG A 3 3 3600 20070926135752 20070829135752 2854 example.com. MC0CFQCMSWxVehgOQLoYclB9PIAbNP229AIUeH0vNNGJhjnZiqgIOKvs1EhzqAo= ;{id = 2854}
ENTRY_END
; DLV query
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
example.net.example.com. IN DLV
SECTION ANSWER
; algo 208 is unknown
example.net.example.com. 3600 IN DLV 30899 208 1 14188c885f20623ad1d3bec42798f3f951793e4c ; xehac-mofum-malyd-bomaf-pegit-fuzes-ganin-misiz-nigel-nozog-soxix
example.net.example.com. 3600 IN RRSIG DLV 3 4 3600 20070926134150 20070829134150 2854 example.com. AFBU1dN/KstcLfQQzy7ZKvPq+2hQg7D6QynqgwI3f8envPQGj782/NA= ;{id = 2854}
;example.net.example.com. 3600 IN DLV 30899 5 1 14188c885f20623ad1d3bec42798f3f951793e4c ; xehac-mofum-malyd-bomaf-pegit-fuzes-ganin-misiz-nigel-nozog-soxix
;example.net.example.com. 3600 IN RRSIG DLV 3 4 3600 20070926134150 20070829134150 2854 example.com. ACK48Q/oKwh/SM9yRiKjZYuc+AtEZ2yCPNJ15kKCN8nsVcv7xigmNTY= ;{id = 2854}
SECTION AUTHORITY
example.com. IN NS ns.example.com.
example.com. 3600 IN RRSIG NS 3 2 3600 20070926134150 20070829134150 2854 example.com. MC0CFQCN+qHdJxoI/2tNKwsb08pra/G7aAIUAWA5sDdJTbrXA1/3OaesGBAO3sI= ;{id = 2854}
SECTION ADDITIONAL
ns.example.com. IN A 1.2.3.4
ns.example.com. 3600 IN RRSIG A 3 3 3600 20070926135752 20070829135752 2854 example.com. MC0CFQCMSWxVehgOQLoYclB9PIAbNP229AIUeH0vNNGJhjnZiqgIOKvs1EhzqAo= ;{id = 2854}
ENTRY_END
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
net.example.com. IN DLV
SECTION ANSWER
SECTION AUTHORITY
example.com. IN SOA open.nlnetlabs.nl. hostmaster.nlnetlabs.nl. 2008081300 28800 7200 604800 3600
example.com. 3600 IN RRSIG SOA 3 2 3600 20070926134150 20070829134150 2854 example.com. AKPJnPBqfJKxE4P2iVYkSRJno9HmiXJZtjdqE8oBeq9Lk9FytcMdcig= ;{id = 2854}
example.com. IN NSEC example.net.example.com. SOA NS RRSIG NSEC
example.com. 3600 IN RRSIG NSEC 3 2 3600 20070926134150 20070829134150 2854 example.com. AIoUkJ04/7/kJFDLocoqksqt9UL2RHHwlRfXAMxGdBHcNO+GSpG47Uk= ;{id = 2854}
ENTRY_END
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NXDOMAIN
SECTION QUESTION
com.example.com. IN DLV
SECTION ANSWER
SECTION AUTHORITY
example.com. IN SOA open.nlnetlabs.nl. hostmaster.nlnetlabs.nl. 2008081300 28800 7200 604800 3600
example.com. 3600 IN RRSIG SOA 3 2 3600 20070926134150 20070829134150 2854 example.com. AKPJnPBqfJKxE4P2iVYkSRJno9HmiXJZtjdqE8oBeq9Lk9FytcMdcig= ;{id = 2854}
example.com. IN NSEC example.net.example.com. SOA NS RRSIG NSEC
example.com. 3600 IN RRSIG NSEC 3 2 3600 20070926134150 20070829134150 2854 example.com. AIoUkJ04/7/kJFDLocoqksqt9UL2RHHwlRfXAMxGdBHcNO+GSpG47Uk= ;{id = 2854}
ENTRY_END
RANGE_END
; ns.example.net.
RANGE_BEGIN 0 100
ADDRESS 1.2.3.5
; DS RR is
; example.net. 3600 IN DS 30899 5 1 14188c885f20623ad1d3bec42798f3f951793e4c ; xehac-mofum-malyd-bomaf-pegit-fuzes-ganin-misiz-nigel-nozog-soxix
; DNSKEY prime query
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
example.net. IN DNSKEY
SECTION ANSWER
example.net. 3600 IN DNSKEY 256 3 5 AQPQ41chR9DEHt/aIzIFAqanbDlRflJoRs5yz1jFsoRIT7dWf0r+PeDuewdxkszNH6wnU4QL8pfKFRh5PIYVBLK3 ;{id = 30899 (zsk), size = 512b}
example.net. 3600 IN RRSIG DNSKEY RSASHA1 2 3600 20070926134150 20070829134150 30899 example.net. hiFzlQ8VoYgCuvIsfVuxC3mfJDqsTh0yc6abs5xMx5uEcIjb0dndFQx7INOM+imlzveEN73Hqp4OLFpFhsWLlw== ;{id = 30899}
SECTION AUTHORITY
example.net. IN NS ns.example.net.
example.net. 3600 IN RRSIG NS RSASHA1 2 3600 20070926134150 20070829134150 30899 example.net. E8JX0l4B+cSR5bkHQwOJy1pBmlLMTYCJ8EwfNMU/eCv0YhKwo26rHhn52FGisgv+Nwp7/NbhHqQ+kJgoZC94XA== ;{id = 30899}
SECTION ADDITIONAL
ns.example.net. IN A 1.2.3.5
ns.example.net. 3600 IN RRSIG A RSASHA1 3 3600 20070926134150 20070829134150 30899 example.net. x+tQMC9FhzT7Fcy1pM5NrOC7E8nLd7THPI3C6ie4EwL8PrxllqlR3q/DKB0d/m0qCOPcgN6HFOYURV1s4uAcsw== ;{id = 30899}
ENTRY_END
; NS query
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
example.net. IN NS
SECTION ANSWER
example.net. IN NS ns.example.net.
example.net. 3600 IN RRSIG NS RSASHA1 2 3600 20070926134150 20070829134150 30899 example.net. E8JX0l4B+cSR5bkHQwOJy1pBmlLMTYCJ8EwfNMU/eCv0YhKwo26rHhn52FGisgv+Nwp7/NbhHqQ+kJgoZC94XA== ;{id = 30899}
SECTION ADDITIONAL
ns.example.net. IN A 1.2.3.5
ns.example.net. 3600 IN RRSIG A RSASHA1 3 3600 20070926134150 20070829134150 30899 example.net. x+tQMC9FhzT7Fcy1pM5NrOC7E8nLd7THPI3C6ie4EwL8PrxllqlR3q/DKB0d/m0qCOPcgN6HFOYURV1s4uAcsw== ;{id = 30899}
ENTRY_END
; www.example.net query
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
www.example.net. IN A
SECTION ANSWER
www.example.net. 3600 IN A 10.20.30.40
www.example.net. 3600 IN RRSIG A 5 3 3600 20070926135752 20070829135752 30899 example.net. ACvv4RQVC7TbI57ewqFImRaVoymktJ5Cxn/FaCodIENt82LVM92nivbP2WtwWCsQHWp7FkrMxTlQTJwyAeXFyg== ;{id = 30899}
SECTION AUTHORITY
example.net. IN NS ns.example.net.
example.net. 3600 IN RRSIG NS RSASHA1 2 3600 20070926134150 20070829134150 30899 example.net. E8JX0l4B+cSR5bkHQwOJy1pBmlLMTYCJ8EwfNMU/eCv0YhKwo26rHhn52FGisgv+Nwp7/NbhHqQ+kJgoZC94XA== ;{id = 30899}
SECTION ADDITIONAL
ns.example.net. IN A 1.2.3.5
ns.example.net. 3600 IN RRSIG A RSASHA1 3 3600 20070926134150 20070829134150 30899 example.net. x+tQMC9FhzT7Fcy1pM5NrOC7E8nLd7THPI3C6ie4EwL8PrxllqlR3q/DKB0d/m0qCOPcgN6HFOYURV1s4uAcsw== ;{id = 30899}
ENTRY_END
RANGE_END
STEP 1 QUERY
ENTRY_BEGIN
REPLY RD DO
SECTION QUESTION
www.example.net. IN A
ENTRY_END
; recursion happens here.
STEP 10 CHECK_ANSWER
ENTRY_BEGIN
MATCH all
REPLY QR RD RA NOERROR
SECTION QUESTION
www.example.net. IN A
SECTION ANSWER
www.example.net. 3600 IN A 10.20.30.40
www.example.net. 3600 IN RRSIG A 5 3 3600 20070926135752 20070829135752 30899 example.net. ACvv4RQVC7TbI57ewqFImRaVoymktJ5Cxn/FaCodIENt82LVM92nivbP2WtwWCsQHWp7FkrMxTlQTJwyAeXFyg== ;{id = 30899}
SECTION AUTHORITY
example.net. IN NS ns.example.net.
example.net. 3600 IN RRSIG NS RSASHA1 2 3600 20070926134150 20070829134150 30899 example.net. E8JX0l4B+cSR5bkHQwOJy1pBmlLMTYCJ8EwfNMU/eCv0YhKwo26rHhn52FGisgv+Nwp7/NbhHqQ+kJgoZC94XA== ;{id = 30899}
SECTION ADDITIONAL
ns.example.net. IN A 1.2.3.5
ns.example.net. 3600 IN RRSIG A RSASHA1 3 3600 20070926134150 20070829134150 30899 example.net. x+tQMC9FhzT7Fcy1pM5NrOC7E8nLd7THPI3C6ie4EwL8PrxllqlR3q/DKB0d/m0qCOPcgN6HFOYURV1s4uAcsw== ;{id = 30899}
ENTRY_END
SCENARIO_END
dnssecjava-1.1.3/src/test/resources/unbound/val_unalgo_ds.rpl 0000664 0000000 0000000 00000016041 13020541473 0024424 0 ustar 00root root 0000000 0000000 ; config options
; The island of trust is at example.com
server:
trust-anchor: "example.com. 3600 IN DS 2854 3 1 46e4ffc6e9a4793b488954bd3f0cc6af0dfb201b"
val-override-date: "20070916134226"
target-fetch-policy: "0 0 0 0 0"
stub-zone:
name: "."
stub-addr: 193.0.14.129 # K.ROOT-SERVERS.NET.
CONFIG_END
SCENARIO_BEGIN Test validator with unknown algorithm delegation
; DS has unknown algo only.
; so subzone has to be treated as unsigned.
; K.ROOT-SERVERS.NET.
RANGE_BEGIN 0 100
ADDRESS 193.0.14.129
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
. IN NS
SECTION ANSWER
. IN NS K.ROOT-SERVERS.NET.
SECTION ADDITIONAL
K.ROOT-SERVERS.NET. IN A 193.0.14.129
ENTRY_END
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
www.sub.example.com. IN A
SECTION AUTHORITY
com. IN NS a.gtld-servers.net.
SECTION ADDITIONAL
a.gtld-servers.net. IN A 192.5.6.30
ENTRY_END
RANGE_END
; a.gtld-servers.net.
RANGE_BEGIN 0 100
ADDRESS 192.5.6.30
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
com. IN NS
SECTION ANSWER
com. IN NS a.gtld-servers.net.
SECTION ADDITIONAL
a.gtld-servers.net. IN A 192.5.6.30
ENTRY_END
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
www.sub.example.com. IN A
SECTION AUTHORITY
example.com. IN NS ns.example.com.
SECTION ADDITIONAL
ns.example.com. IN A 1.2.3.4
ENTRY_END
RANGE_END
; ns.example.com.
RANGE_BEGIN 0 100
ADDRESS 1.2.3.4
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
example.com. IN NS
SECTION ANSWER
example.com. IN NS ns.example.com.
example.com. 3600 IN RRSIG NS 3 2 3600 20070926134150 20070829134150 2854 example.com. MC0CFQCN+qHdJxoI/2tNKwsb08pra/G7aAIUAWA5sDdJTbrXA1/3OaesGBAO3sI= ;{id = 2854}
SECTION ADDITIONAL
ns.example.com. IN A 1.2.3.4
ns.example.com. 3600 IN RRSIG A 3 3 3600 20070926135752 20070829135752 2854 example.com. MC0CFQCMSWxVehgOQLoYclB9PIAbNP229AIUeH0vNNGJhjnZiqgIOKvs1EhzqAo= ;{id = 2854}
ENTRY_END
; response to DNSKEY priming query
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
example.com. IN DNSKEY
SECTION ANSWER
example.com. 3600 IN DNSKEY 256 3 3 ALXLUsWqUrY3JYER3T4TBJII s70j+sDS/UT2QRp61SE7S3E EXopNXoFE73JLRmvpi/UrOO/Vz4Se 6wXv/CYCKjGw06U4WRgR YXcpEhJROyNapmdIKSx hOzfLVE1gqA0PweZR8d tY3aNQSRn3sPpwJr6Mi /PqQKAMMrZ9ckJpf1+b QMOOvxgzz2U1GS18b3y ZKcgTMEaJzd/GZYzi/B N2DzQ0MsrSwYXfsNLFO Bbs8PJMW4LYIxeeOe6rUgkWOF 7CC9Dh/dduQ1QrsJhmZAEFfd6ByYV+ ;{id = 2854 (zsk), size = 1688b}
example.com. 3600 IN RRSIG DNSKEY DSA 2 3600 20070926134150 20070829134150 2854 example.com. MCwCFBQRtlR4BEv9ohi+PGFjp+AHsJuHAhRCvz0shggvnvI88DFnBDCczHUcVA== ;{id = 2854}
SECTION AUTHORITY
example.com. IN NS ns.example.com.
example.com. 3600 IN RRSIG NS 3 2 3600 20070926134150 20070829134150 2854 example.com. MC0CFQCN+qHdJxoI/2tNKwsb08pra/G7aAIUAWA5sDdJTbrXA1/3OaesGBAO3sI= ;{id = 2854}
SECTION ADDITIONAL
ns.example.com. IN A 1.2.3.4
ns.example.com. 3600 IN RRSIG A 3 3 3600 20070926135752 20070829135752 2854 example.com. MC0CFQCMSWxVehgOQLoYclB9PIAbNP229AIUeH0vNNGJhjnZiqgIOKvs1EhzqAo= ;{id = 2854}
ENTRY_END
; response for delegation to sub.example.com.
ENTRY_BEGIN
MATCH opcode qtype subdomain
ADJUST copy_id copy_query
REPLY QR NOERROR
SECTION QUESTION
sub.example.com. IN DS
SECTION ANSWER
; algorithm 208 is unknown.
sub.example.com. 3600 IN DS 30899 208 1 f7ed618f24d5e5202927e1d27bc2e84a141cb4b3
sub.example.com. 3600 IN RRSIG DS 3 3 3600 20070926134150 20070829134150 2854 example.com. AEMPMNVJAygL0TyRUU+MVgP4FA7jSIpVj6628IdLe7eY3OwWp3hUTnU= ;{id = 2854}
;sub.example.com. 3600 IN DS 30899 RSASHA1 1 f7ed618f24d5e5202927e1d27bc2e84a141cb4b3
;sub.example.com. 3600 IN RRSIG DS 3 3 3600 20070926134150 20070829134150 2854 example.com. MCwCFCW3ix0GD4BSvNLWIbROCJt5DAW9AhRt/kg9kBKJ20UBUdumrBUHqnskdA== ;{id = 2854}
SECTION AUTHORITY
sub.example.com. IN NS ns.sub.example.com.
SECTION ADDITIONAL
ns.sub.example.com. IN A 1.2.3.6
ENTRY_END
RANGE_END
; ns.sub.example.com.
RANGE_BEGIN 0 100
ADDRESS 1.2.3.6
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
sub.example.com. IN NS
SECTION ANSWER
sub.example.com. IN NS ns.sub.example.com.
sub.example.com. 3600 IN RRSIG NS 5 3 3600 20070926134150 20070829134150 30899 sub.example.com. wcpHeBILHfo8C9uxMhcW03gcURZeUffiKdSTb50ZjzTHgMNhRyMfpcvSpXEd9548A9UTmWKeLZChfr5Z/glONw== ;{id = 30899}
SECTION ADDITIONAL
ns.sub.example.com. IN A 1.2.3.6
ns.sub.example.com. 3600 IN RRSIG A 5 4 3600 20070926134150 20070829134150 30899 sub.example.com. UF7shD/gt1FOp2UHgLTNbPzVykklSXFMEtJ1xD+Hholwf/PIzd7zoaIttIYibNa4fUXCqMg22H9P7MRhfmFe6g== ;{id = 30899}
ENTRY_END
; response to DNSKEY priming query
; sub.example.com. 3600 IN DS 30899 RSASHA1 1 f7ed618f24d5e5202927e1d27bc2e84a141cb4b3
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
sub.example.com. IN DNSKEY
SECTION ANSWER
sub.example.com. 3600 IN DNSKEY 256 3 5 AQPQ41chR9DEHt/aIzIFAqanbDlRflJoRs5yz1jFsoRIT7dWf0r+PeDuewdxkszNH6wnU4QL8pfKFRh5PIYVBLK3 ;{id = 30899 (zsk), size = 512b}
sub.example.com. 3600 IN RRSIG DNSKEY 5 3 3600 20070926134150 20070829134150 30899 sub.example.com. uNGp99iznjD7oOX02XnQbDnbg75UwBHRvZSKYUorTKvPUnCWMHKdRsQ+mf+Fx3GZ+Fz9BVjoCmQqpnfgXLEYqw== ;{id = 30899}
SECTION AUTHORITY
sub.example.com. IN NS ns.sub.example.com.
sub.example.com. 3600 IN RRSIG NS 5 3 3600 20070926134150 20070829134150 30899 sub.example.com. wcpHeBILHfo8C9uxMhcW03gcURZeUffiKdSTb50ZjzTHgMNhRyMfpcvSpXEd9548A9UTmWKeLZChfr5Z/glONw== ;{id = 30899}
SECTION ADDITIONAL
ns.sub.example.com. IN A 1.2.3.6
ns.sub.example.com. 3600 IN RRSIG A 5 4 3600 20070926134150 20070829134150 30899 sub.example.com. UF7shD/gt1FOp2UHgLTNbPzVykklSXFMEtJ1xD+Hholwf/PIzd7zoaIttIYibNa4fUXCqMg22H9P7MRhfmFe6g== ;{id = 30899}
ENTRY_END
; response to query of interest
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
www.sub.example.com. IN A
SECTION ANSWER
www.sub.example.com. IN A 11.11.11.11
www.sub.example.com. 3600 IN RRSIG A 5 4 3600 20070926134150 20070829134150 30899 sub.example.com. 0DqqRfRtm7VSEQ4mmBbzrKRqQAay3JAE8DPDGmjtokrrjN9F1G/HxozDV7bjdIh2EChlQea8FPwf/GepJMUVxg== ;{id = 30899}
SECTION AUTHORITY
SECTION ADDITIONAL
ENTRY_END
RANGE_END
STEP 1 QUERY
ENTRY_BEGIN
REPLY RD DO
SECTION QUESTION
www.sub.example.com. IN A
ENTRY_END
; recursion happens here.
STEP 10 CHECK_ANSWER
ENTRY_BEGIN
MATCH all
REPLY QR RD RA NOERROR
SECTION QUESTION
www.sub.example.com. IN A
SECTION ANSWER
www.sub.example.com. 3600 IN A 11.11.11.11
www.sub.example.com. 3600 IN RRSIG A 5 4 3600 20070926134150 20070829134150 30899 sub.example.com. 0DqqRfRtm7VSEQ4mmBbzrKRqQAay3JAE8DPDGmjtokrrjN9F1G/HxozDV7bjdIh2EChlQea8FPwf/GepJMUVxg== ;{id = 30899}
SECTION AUTHORITY
SECTION ADDITIONAL
ENTRY_END
SCENARIO_END
dnssecjava-1.1.3/src/test/resources/unbound/val_unsec_cname.rpl 0000664 0000000 0000000 00000025112 13020541473 0024730 0 ustar 00root root 0000000 0000000 ; config options
; The island of trust is at example.com
server:
trust-anchor: "example.com. 3600 IN DS 2854 3 1 46e4ffc6e9a4793b488954bd3f0cc6af0dfb201b"
val-override-date: "20070916134226"
target-fetch-policy: "0 0 0 0 0"
stub-zone:
name: "."
stub-addr: 193.0.14.129 # K.ROOT-SERVERS.NET.
CONFIG_END
SCENARIO_BEGIN Test validator with DS, unsec, cname sequence.
; K.ROOT-SERVERS.NET.
RANGE_BEGIN 0 100
ADDRESS 193.0.14.129
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
. IN NS
SECTION ANSWER
. IN NS K.ROOT-SERVERS.NET.
SECTION ADDITIONAL
K.ROOT-SERVERS.NET. IN A 193.0.14.129
ENTRY_END
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
a.b.sub.example.com. IN A
SECTION AUTHORITY
com. IN NS a.gtld-servers.net.
SECTION ADDITIONAL
a.gtld-servers.net. IN A 192.5.6.30
ENTRY_END
RANGE_END
; a.gtld-servers.net.
RANGE_BEGIN 0 100
ADDRESS 192.5.6.30
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
com. IN NS
SECTION ANSWER
com. IN NS a.gtld-servers.net.
SECTION ADDITIONAL
a.gtld-servers.net. IN A 192.5.6.30
ENTRY_END
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
a.b.sub.example.com. IN A
SECTION AUTHORITY
example.com. IN NS ns.example.com.
SECTION ADDITIONAL
ns.example.com. IN A 1.2.3.4
ENTRY_END
RANGE_END
; ns.example.com.
RANGE_BEGIN 0 100
ADDRESS 1.2.3.4
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
example.com. IN NS
SECTION ANSWER
example.com. IN NS ns.example.com.
example.com. 3600 IN RRSIG NS 3 2 3600 20070926134150 20070829134150 2854 example.com. MC0CFQCN+qHdJxoI/2tNKwsb08pra/G7aAIUAWA5sDdJTbrXA1/3OaesGBAO3sI= ;{id = 2854}
SECTION ADDITIONAL
ns.example.com. IN A 1.2.3.4
ns.example.com. 3600 IN RRSIG A 3 3 3600 20070926135752 20070829135752 2854 example.com. MC0CFQCMSWxVehgOQLoYclB9PIAbNP229AIUeH0vNNGJhjnZiqgIOKvs1EhzqAo= ;{id = 2854}
ENTRY_END
; response to DNSKEY priming query
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
example.com. IN DNSKEY
SECTION ANSWER
example.com. 3600 IN DNSKEY 256 3 3 ALXLUsWqUrY3JYER3T4TBJII s70j+sDS/UT2QRp61SE7S3E EXopNXoFE73JLRmvpi/UrOO/Vz4Se 6wXv/CYCKjGw06U4WRgR YXcpEhJROyNapmdIKSx hOzfLVE1gqA0PweZR8d tY3aNQSRn3sPpwJr6Mi /PqQKAMMrZ9ckJpf1+b QMOOvxgzz2U1GS18b3y ZKcgTMEaJzd/GZYzi/B N2DzQ0MsrSwYXfsNLFO Bbs8PJMW4LYIxeeOe6rUgkWOF 7CC9Dh/dduQ1QrsJhmZAEFfd6ByYV+ ;{id = 2854 (zsk), size = 1688b}
example.com. 3600 IN RRSIG DNSKEY DSA 2 3600 20070926134150 20070829134150 2854 example.com. MCwCFBQRtlR4BEv9ohi+PGFjp+AHsJuHAhRCvz0shggvnvI88DFnBDCczHUcVA== ;{id = 2854}
SECTION AUTHORITY
example.com. IN NS ns.example.com.
example.com. 3600 IN RRSIG NS 3 2 3600 20070926134150 20070829134150 2854 example.com. MC0CFQCN+qHdJxoI/2tNKwsb08pra/G7aAIUAWA5sDdJTbrXA1/3OaesGBAO3sI= ;{id = 2854}
SECTION ADDITIONAL
ns.example.com. IN A 1.2.3.4
ns.example.com. 3600 IN RRSIG A 3 3 3600 20070926135752 20070829135752 2854 example.com. MC0CFQCMSWxVehgOQLoYclB9PIAbNP229AIUeH0vNNGJhjnZiqgIOKvs1EhzqAo= ;{id = 2854}
ENTRY_END
; response for delegation to c.example.com.
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
c.c.example.com. IN A
SECTION ANSWER
SECTION AUTHORITY
c.example.com. IN NS ns.c.example.com.
c.example.com. IN NSEC d.example.com. NS RRSIG NSEC
c.example.com. 3600 IN RRSIG NSEC 3 3 3600 20070926135752 20070829135752 2854 example.com. MC0CFDQ1xBqQ8Yxy7d7MbfAOg9g+dInHAhUAgP2w61bvME+hLWFiNg42Ny02/vo= ;{id = 2854}
SECTION ADDITIONAL
ns.c.example.com. IN A 1.2.3.8
ENTRY_END
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR AA NOERROR
SECTION QUESTION
c.example.com. IN DS
SECTION ANSWER
SECTION AUTHORITY
c.example.com. IN NSEC d.example.com. NS RRSIG NSEC
c.example.com. 3600 IN RRSIG NSEC 3 3 3600 20070926135752 20070829135752 2854 example.com. MC0CFDQ1xBqQ8Yxy7d7MbfAOg9g+dInHAhUAgP2w61bvME+hLWFiNg42Ny02/vo= ;{id = 2854}
SECTION ADDITIONAL
ENTRY_END
; response for delegation to sub.example.com.
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
a.b.sub.example.com. IN A
SECTION ANSWER
SECTION AUTHORITY
sub.example.com. IN NS ns.sub.example.com.
sub.example.com. 3600 IN DS 30899 RSASHA1 1 f7ed618f24d5e5202927e1d27bc2e84a141cb4b3
sub.example.com. 3600 IN RRSIG DS 3 3 3600 20070926134150 20070829134150 2854 example.com. MCwCFCW3ix0GD4BSvNLWIbROCJt5DAW9AhRt/kg9kBKJ20UBUdumrBUHqnskdA== ;{id = 2854}
SECTION ADDITIONAL
ns.sub.example.com. IN A 1.2.3.6
ENTRY_END
; response for delegation to sub.example.com.
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
sub.example.com. IN DNSKEY
SECTION ANSWER
SECTION AUTHORITY
sub.example.com. IN NS ns.sub.example.com.
sub.example.com. 3600 IN DS 30899 RSASHA1 1 f7ed618f24d5e5202927e1d27bc2e84a141cb4b3
sub.example.com. 3600 IN RRSIG DS 3 3 3600 20070926134150 20070829134150 2854 example.com. MCwCFCW3ix0GD4BSvNLWIbROCJt5DAW9AhRt/kg9kBKJ20UBUdumrBUHqnskdA== ;{id = 2854}
SECTION ADDITIONAL
ns.sub.example.com. IN A 1.2.3.6
ENTRY_END
RANGE_END
; ns.sub.example.com.
RANGE_BEGIN 0 100
ADDRESS 1.2.3.6
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
sub.example.com. IN NS
SECTION ANSWER
sub.example.com. IN NS ns.sub.example.com.
sub.example.com. 3600 IN RRSIG NS 5 3 3600 20070926134150 20070829134150 30899 sub.example.com. wcpHeBILHfo8C9uxMhcW03gcURZeUffiKdSTb50ZjzTHgMNhRyMfpcvSpXEd9548A9UTmWKeLZChfr5Z/glONw== ;{id = 30899}
SECTION ADDITIONAL
ns.sub.example.com. IN A 1.2.3.6
ns.sub.example.com. 3600 IN RRSIG A 5 4 3600 20070926134150 20070829134150 30899 sub.example.com. UF7shD/gt1FOp2UHgLTNbPzVykklSXFMEtJ1xD+Hholwf/PIzd7zoaIttIYibNa4fUXCqMg22H9P7MRhfmFe6g== ;{id = 30899}
ENTRY_END
; response to DNSKEY priming query
; sub.example.com. 3600 IN DS 30899 RSASHA1 1 f7ed618f24d5e5202927e1d27bc2e84a141cb4b3
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
sub.example.com. IN DNSKEY
SECTION ANSWER
sub.example.com. 3600 IN DNSKEY 256 3 5 AQPQ41chR9DEHt/aIzIFAqanbDlRflJoRs5yz1jFsoRIT7dWf0r+PeDuewdxkszNH6wnU4QL8pfKFRh5PIYVBLK3 ;{id = 30899 (zsk), size = 512b}
sub.example.com. 3600 IN RRSIG DNSKEY 5 3 3600 20070926134150 20070829134150 30899 sub.example.com. uNGp99iznjD7oOX02XnQbDnbg75UwBHRvZSKYUorTKvPUnCWMHKdRsQ+mf+Fx3GZ+Fz9BVjoCmQqpnfgXLEYqw== ;{id = 30899}
SECTION AUTHORITY
sub.example.com. IN NS ns.sub.example.com.
sub.example.com. 3600 IN RRSIG NS 5 3 3600 20070926134150 20070829134150 30899 sub.example.com. wcpHeBILHfo8C9uxMhcW03gcURZeUffiKdSTb50ZjzTHgMNhRyMfpcvSpXEd9548A9UTmWKeLZChfr5Z/glONw== ;{id = 30899}
SECTION ADDITIONAL
ns.sub.example.com. IN A 1.2.3.6
ns.sub.example.com. 3600 IN RRSIG A 5 4 3600 20070926134150 20070829134150 30899 sub.example.com. UF7shD/gt1FOp2UHgLTNbPzVykklSXFMEtJ1xD+Hholwf/PIzd7zoaIttIYibNa4fUXCqMg22H9P7MRhfmFe6g== ;{id = 30899}
ENTRY_END
; response to query of interest
; another delegation, validated unsecure.
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
a.b.sub.example.com. IN A
SECTION ANSWER
SECTION AUTHORITY
b.sub.example.com. IN NS ns.b.sub.example.com.
b.sub.example.com. IN NSEC c.sub.example.com. NS NSEC RRSIG
b.sub.example.com. 3600 IN RRSIG NSEC 5 4 3600 20070926134150 20070829134150 30899 sub.example.com. KPdURTUrbQvc6OXtDZaH3+14uO2qPUPIFO86aTNZ/Ujy3d2RMSB7fkSSulDO6QDSBEUhr9WgbQr0/YoljCBirA== ;{id = 30899}
SECTION ADDITIONAL
ns.b.sub.example.com. IN A 1.2.3.7
ENTRY_END
; b DS query.
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR AA NOERROR
SECTION QUESTION
b.sub.example.com. IN DS
SECTION AUTHORITY
b.sub.example.com. IN NSEC c.sub.example.com. NS NSEC RRSIG
b.sub.example.com. 3600 IN RRSIG NSEC 5 4 3600 20070926134150 20070829134150 30899 sub.example.com. KPdURTUrbQvc6OXtDZaH3+14uO2qPUPIFO86aTNZ/Ujy3d2RMSB7fkSSulDO6QDSBEUhr9WgbQr0/YoljCBirA== ;{id = 30899}
ENTRY_END
RANGE_END
; server ns.b.sub.example.com.
RANGE_BEGIN 0 100
ADDRESS 1.2.3.7
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR AA NOERROR
SECTION QUESTION
b.sub.example.com. IN NS
SECTION ANSWER
b.sub.example.com. IN NS ns.b.sub.example.com.
SECTION ADDITIONAL
ns.b.sub.example.com. IN A 1.2.3.7
ENTRY_END
ENTRY_BEGIN
; query of interest, give a cname to another unsecure zone.
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR AA NOERROR
SECTION QUESTION
a.b.sub.example.com. IN A
SECTION ANSWER
a.b.sub.example.com. IN CNAME c.c.example.com.
ENTRY_END
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR AA NOERROR
SECTION QUESTION
a.b.sub.example.com. IN DS
SECTION AUTHORITY
b.sub.example.com. IN SOA B-EXAMPLE. b-example. 1 2 3 7 7
ENTRY_END
RANGE_END
; server ns.c.example.com.
RANGE_BEGIN 0 100
ADDRESS 1.2.3.8
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR AA NOERROR
SECTION QUESTION
c.sub.example.com. IN NS
SECTION ANSWER
c.sub.example.com. IN NS ns.c.sub.example.com.
SECTION ADDITIONAL
ns.c.sub.example.com. IN A 1.2.3.8
ENTRY_END
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
c.example.com. IN NS
SECTION ANSWER
c.example.com. IN NS ns.c.example.com.
SECTION ADDITIONAL
ns.c.example.com. IN A 1.2.3.8
ENTRY_END
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR AA NOERROR
SECTION QUESTION
c.c.example.com. IN A
SECTION ANSWER
c.c.example.com. IN A 11.11.11.11
ENTRY_END
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR AA NOERROR
SECTION QUESTION
c.c.example.com. IN DS
SECTION AUTHORITY
c.example.com. IN SOA C-EXAMPLE. c-example. 1 2 3 4 5
ENTRY_END
RANGE_END
STEP 1 QUERY
ENTRY_BEGIN
REPLY RD DO
SECTION QUESTION
a.b.sub.example.com. IN A
ENTRY_END
; recursion happens here.
STEP 10 CHECK_ANSWER
ENTRY_BEGIN
MATCH all
REPLY QR RD RA NOERROR
SECTION QUESTION
a.b.sub.example.com. IN A
SECTION ANSWER
a.b.sub.example.com. IN CNAME c.c.example.com.
c.c.example.com. 3600 IN A 11.11.11.11
SECTION AUTHORITY
SECTION ADDITIONAL
ENTRY_END
; test that a DS query does not get CNAME redirected, but instead
; asked to the right server that has to respond to it.
STEP 20 QUERY
ENTRY_BEGIN
REPLY RD DO
SECTION QUESTION
a.b.sub.example.com. IN DS
ENTRY_END
STEP 30 CHECK_ANSWER
ENTRY_BEGIN
MATCH all
REPLY QR RD RA NOERROR
SECTION QUESTION
a.b.sub.example.com. IN DS
SECTION AUTHORITY
b.sub.example.com. IN SOA B-EXAMPLE. b-example. 1 2 3 7 7
ENTRY_END
SCENARIO_END
dnssecjava-1.1.3/src/test/resources/unbound/val_unsecds.rpl 0000664 0000000 0000000 00000012467 13020541473 0024125 0 ustar 00root root 0000000 0000000 ; config options
; The island of trust is at example.com
server:
trust-anchor: "example.com. 3600 IN DS 2854 3 1 46e4ffc6e9a4793b488954bd3f0cc6af0dfb201b"
val-override-date: "20070916134226"
target-fetch-policy: "0 0 0 0 0"
stub-zone:
name: "."
stub-addr: 193.0.14.129 # K.ROOT-SERVERS.NET.
CONFIG_END
SCENARIO_BEGIN Test validator with insecure delegation
; K.ROOT-SERVERS.NET.
RANGE_BEGIN 0 100
ADDRESS 193.0.14.129
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
. IN NS
SECTION ANSWER
. IN NS K.ROOT-SERVERS.NET.
SECTION ADDITIONAL
K.ROOT-SERVERS.NET. IN A 193.0.14.129
ENTRY_END
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
www.sub.example.com. IN A
SECTION AUTHORITY
com. IN NS a.gtld-servers.net.
SECTION ADDITIONAL
a.gtld-servers.net. IN A 192.5.6.30
ENTRY_END
RANGE_END
; a.gtld-servers.net.
RANGE_BEGIN 0 100
ADDRESS 192.5.6.30
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
com. IN NS
SECTION ANSWER
com. IN NS a.gtld-servers.net.
SECTION ADDITIONAL
a.gtld-servers.net. IN A 192.5.6.30
ENTRY_END
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
www.sub.example.com. IN A
SECTION AUTHORITY
example.com. IN NS ns.example.com.
SECTION ADDITIONAL
ns.example.com. IN A 1.2.3.4
ENTRY_END
RANGE_END
; ns.example.com.
RANGE_BEGIN 0 100
ADDRESS 1.2.3.4
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
example.com. IN NS
SECTION ANSWER
example.com. IN NS ns.example.com.
example.com. 3600 IN RRSIG NS 3 2 3600 20070926134150 20070829134150 2854 example.com. MC0CFQCN+qHdJxoI/2tNKwsb08pra/G7aAIUAWA5sDdJTbrXA1/3OaesGBAO3sI= ;{id = 2854}
SECTION ADDITIONAL
ns.example.com. IN A 1.2.3.4
ns.example.com. 3600 IN RRSIG A 3 3 3600 20070926135752 20070829135752 2854 example.com. MC0CFQCMSWxVehgOQLoYclB9PIAbNP229AIUeH0vNNGJhjnZiqgIOKvs1EhzqAo= ;{id = 2854}
ENTRY_END
; response to DNSKEY priming query
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
example.com. IN DNSKEY
SECTION ANSWER
example.com. 3600 IN DNSKEY 256 3 3 ALXLUsWqUrY3JYER3T4TBJII s70j+sDS/UT2QRp61SE7S3E EXopNXoFE73JLRmvpi/UrOO/Vz4Se 6wXv/CYCKjGw06U4WRgR YXcpEhJROyNapmdIKSx hOzfLVE1gqA0PweZR8d tY3aNQSRn3sPpwJr6Mi /PqQKAMMrZ9ckJpf1+b QMOOvxgzz2U1GS18b3y ZKcgTMEaJzd/GZYzi/B N2DzQ0MsrSwYXfsNLFO Bbs8PJMW4LYIxeeOe6rUgkWOF 7CC9Dh/dduQ1QrsJhmZAEFfd6ByYV+ ;{id = 2854 (zsk), size = 1688b}
example.com. 3600 IN RRSIG DNSKEY DSA 2 3600 20070926134150 20070829134150 2854 example.com. MCwCFBQRtlR4BEv9ohi+PGFjp+AHsJuHAhRCvz0shggvnvI88DFnBDCczHUcVA== ;{id = 2854}
SECTION AUTHORITY
example.com. IN NS ns.example.com.
example.com. 3600 IN RRSIG NS 3 2 3600 20070926134150 20070829134150 2854 example.com. MC0CFQCN+qHdJxoI/2tNKwsb08pra/G7aAIUAWA5sDdJTbrXA1/3OaesGBAO3sI= ;{id = 2854}
SECTION ADDITIONAL
ns.example.com. IN A 1.2.3.4
ns.example.com. 3600 IN RRSIG A 3 3 3600 20070926135752 20070829135752 2854 example.com. MC0CFQCMSWxVehgOQLoYclB9PIAbNP229AIUeH0vNNGJhjnZiqgIOKvs1EhzqAo= ;{id = 2854}
ENTRY_END
; response for delegation to sub.example.com.
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
www.sub.example.com. IN A
SECTION ANSWER
SECTION AUTHORITY
sub.example.com. IN NS ns.sub.example.com.
sub.example.com. IN NSEC www.example.com. NS RRSIG NSEC
sub.example.com. 3600 IN RRSIG NSEC 3 3 3600 20070926134150 20070829134150 2854 example.com. MCwCFDCaiDM6G+glwNW276HWdH+McmjgAhRSwF5OfimNQCqkWgnYotLOwUghKQ== ;{id = 2854}
SECTION ADDITIONAL
ns.sub.example.com. IN A 1.2.3.6
ENTRY_END
; query for missing DS record.
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
sub.example.com. IN DS
SECTION ANSWER
SECTION AUTHORITY
example.com. IN SOA ns.example.com. h.example.com. 2007090504 1800 1800 2419200 7200
example.com. 3600 IN RRSIG SOA 3 2 3600 20070926134150 20070829134150 2854 example.com. MCwCFC5uwIHSehZtetK2CMNXttSFUB0XAhROFDAgy/FaxR8zFXJzyPdpQG93Sw== ;{id = 2854}
sub.example.com. IN NSEC www.example.com. NS RRSIG NSEC
sub.example.com. 3600 IN RRSIG NSEC 3 3 3600 20070926134150 20070829134150 2854 example.com. MCwCFDCaiDM6G+glwNW276HWdH+McmjgAhRSwF5OfimNQCqkWgnYotLOwUghKQ== ;{id = 2854}
SECTION ADDITIONAL
ns.sub.example.com. IN A 1.2.3.6
ENTRY_END
RANGE_END
; ns.sub.example.com.
RANGE_BEGIN 0 100
ADDRESS 1.2.3.6
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
sub.example.com. IN NS
SECTION ANSWER
sub.example.com. IN NS ns.sub.example.com.
SECTION ADDITIONAL
ns.sub.example.com. IN A 1.2.3.6
ENTRY_END
; response to query of interest
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
www.sub.example.com. IN A
SECTION ANSWER
www.sub.example.com. IN A 11.11.11.11
SECTION AUTHORITY
SECTION ADDITIONAL
ENTRY_END
RANGE_END
STEP 1 QUERY
ENTRY_BEGIN
REPLY RD DO
SECTION QUESTION
www.sub.example.com. IN A
ENTRY_END
; recursion happens here.
STEP 10 CHECK_ANSWER
ENTRY_BEGIN
MATCH all
REPLY QR RD RA NOERROR
SECTION QUESTION
www.sub.example.com. IN A
SECTION ANSWER
www.sub.example.com. 3600 IN A 11.11.11.11
SECTION AUTHORITY
SECTION ADDITIONAL
ENTRY_END
SCENARIO_END
dnssecjava-1.1.3/src/test/resources/unbound/val_unsecds_negcache.rpl 0000664 0000000 0000000 00000012606 13020541473 0025735 0 ustar 00root root 0000000 0000000 ; config options
; The island of trust is at example.com
server:
trust-anchor: "example.com. 3600 IN DS 2854 3 1 46e4ffc6e9a4793b488954bd3f0cc6af0dfb201b"
val-override-date: "20070916134226"
target-fetch-policy: "0 0 0 0 0"
stub-zone:
name: "."
stub-addr: 193.0.14.129 # K.ROOT-SERVERS.NET.
CONFIG_END
SCENARIO_BEGIN Test validator with insecure delegation and DS negative cache
; K.ROOT-SERVERS.NET.
RANGE_BEGIN 0 100
ADDRESS 193.0.14.129
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
. IN NS
SECTION ANSWER
. IN NS K.ROOT-SERVERS.NET.
SECTION ADDITIONAL
K.ROOT-SERVERS.NET. IN A 193.0.14.129
ENTRY_END
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
www.sub.example.com. IN A
SECTION AUTHORITY
com. IN NS a.gtld-servers.net.
SECTION ADDITIONAL
a.gtld-servers.net. IN A 192.5.6.30
ENTRY_END
RANGE_END
; a.gtld-servers.net.
RANGE_BEGIN 0 100
ADDRESS 192.5.6.30
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
com. IN NS
SECTION ANSWER
com. IN NS a.gtld-servers.net.
SECTION ADDITIONAL
a.gtld-servers.net. IN A 192.5.6.30
ENTRY_END
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
www.sub.example.com. IN A
SECTION AUTHORITY
example.com. IN NS ns.example.com.
SECTION ADDITIONAL
ns.example.com. IN A 1.2.3.4
ENTRY_END
RANGE_END
; ns.example.com.
RANGE_BEGIN 0 100
ADDRESS 1.2.3.4
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
example.com. IN NS
SECTION ANSWER
example.com. IN NS ns.example.com.
example.com. 3600 IN RRSIG NS 3 2 3600 20070926134150 20070829134150 2854 example.com. MC0CFQCN+qHdJxoI/2tNKwsb08pra/G7aAIUAWA5sDdJTbrXA1/3OaesGBAO3sI= ;{id = 2854}
SECTION ADDITIONAL
ns.example.com. IN A 1.2.3.4
ns.example.com. 3600 IN RRSIG A 3 3 3600 20070926135752 20070829135752 2854 example.com. MC0CFQCMSWxVehgOQLoYclB9PIAbNP229AIUeH0vNNGJhjnZiqgIOKvs1EhzqAo= ;{id = 2854}
ENTRY_END
; response to DNSKEY priming query
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
example.com. IN DNSKEY
SECTION ANSWER
example.com. 3600 IN DNSKEY 256 3 3 ALXLUsWqUrY3JYER3T4TBJII s70j+sDS/UT2QRp61SE7S3E EXopNXoFE73JLRmvpi/UrOO/Vz4Se 6wXv/CYCKjGw06U4WRgR YXcpEhJROyNapmdIKSx hOzfLVE1gqA0PweZR8d tY3aNQSRn3sPpwJr6Mi /PqQKAMMrZ9ckJpf1+b QMOOvxgzz2U1GS18b3y ZKcgTMEaJzd/GZYzi/B N2DzQ0MsrSwYXfsNLFO Bbs8PJMW4LYIxeeOe6rUgkWOF 7CC9Dh/dduQ1QrsJhmZAEFfd6ByYV+ ;{id = 2854 (zsk), size = 1688b}
example.com. 3600 IN RRSIG DNSKEY DSA 2 3600 20070926134150 20070829134150 2854 example.com. MCwCFBQRtlR4BEv9ohi+PGFjp+AHsJuHAhRCvz0shggvnvI88DFnBDCczHUcVA== ;{id = 2854}
SECTION AUTHORITY
example.com. IN NS ns.example.com.
example.com. 3600 IN RRSIG NS 3 2 3600 20070926134150 20070829134150 2854 example.com. MC0CFQCN+qHdJxoI/2tNKwsb08pra/G7aAIUAWA5sDdJTbrXA1/3OaesGBAO3sI= ;{id = 2854}
SECTION ADDITIONAL
ns.example.com. IN A 1.2.3.4
ns.example.com. 3600 IN RRSIG A 3 3 3600 20070926135752 20070829135752 2854 example.com. MC0CFQCMSWxVehgOQLoYclB9PIAbNP229AIUeH0vNNGJhjnZiqgIOKvs1EhzqAo= ;{id = 2854}
ENTRY_END
; response for delegation to sub.example.com.
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
www.sub.example.com. IN A
SECTION ANSWER
SECTION AUTHORITY
sub.example.com. IN NS ns.sub.example.com.
sub.example.com. IN NSEC www.example.com. NS RRSIG NSEC
sub.example.com. 3600 IN RRSIG NSEC 3 3 3600 20070926134150 20070829134150 2854 example.com. MCwCFDCaiDM6G+glwNW276HWdH+McmjgAhRSwF5OfimNQCqkWgnYotLOwUghKQ== ;{id = 2854}
SECTION ADDITIONAL
ns.sub.example.com. IN A 1.2.3.6
ENTRY_END
; query for missing DS record.
; get it from the negative cache instead!
;ENTRY_BEGIN
;MATCH opcode qtype qname
;ADJUST copy_id
;REPLY QR NOERROR
;SECTION QUESTION
;sub.example.com. IN DS
;SECTION ANSWER
;SECTION AUTHORITY
;example.com. IN SOA ns.example.com. h.example.com. 2007090504 1800 1800 2419200 7200
;example.com. 3600 IN RRSIG SOA 3 2 3600 20070926134150 20070829134150 2854 example.com. MCwCFC5uwIHSehZtetK2CMNXttSFUB0XAhROFDAgy/FaxR8zFXJzyPdpQG93Sw== ;{id = 2854}
;sub.example.com. IN NSEC www.example.com. NS RRSIG NSEC
;sub.example.com. 3600 IN RRSIG NSEC 3 3 3600 20070926134150 20070829134150 2854 example.com. MCwCFDCaiDM6G+glwNW276HWdH+McmjgAhRSwF5OfimNQCqkWgnYotLOwUghKQ== ;{id = 2854}
;SECTION ADDITIONAL
;ns.sub.example.com. IN A 1.2.3.6
;ENTRY_END
RANGE_END
; ns.sub.example.com.
RANGE_BEGIN 0 100
ADDRESS 1.2.3.6
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
sub.example.com. IN NS
SECTION ANSWER
sub.example.com. IN NS ns.sub.example.com.
SECTION ADDITIONAL
ns.sub.example.com. IN A 1.2.3.6
ENTRY_END
; response to query of interest
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
www.sub.example.com. IN A
SECTION ANSWER
www.sub.example.com. IN A 11.11.11.11
SECTION AUTHORITY
SECTION ADDITIONAL
ENTRY_END
RANGE_END
STEP 1 QUERY
ENTRY_BEGIN
REPLY RD DO
SECTION QUESTION
www.sub.example.com. IN A
ENTRY_END
; recursion happens here.
STEP 10 CHECK_ANSWER
ENTRY_BEGIN
MATCH all
REPLY QR RD RA NOERROR
SECTION QUESTION
www.sub.example.com. IN A
SECTION ANSWER
www.sub.example.com. 3600 IN A 11.11.11.11
SECTION AUTHORITY
SECTION ADDITIONAL
ENTRY_END
SCENARIO_END
dnssecjava-1.1.3/src/test/resources/unbound/val_unsecds_qtypeds.rpl 0000664 0000000 0000000 00000014126 13020541473 0025670 0 ustar 00root root 0000000 0000000 ; config options
; The island of trust is at example.com
server:
trust-anchor: "example.com. 3600 IN DS 2854 3 1 46e4ffc6e9a4793b488954bd3f0cc6af0dfb201b"
val-override-date: "20070916134226"
target-fetch-policy: "0 0 0 0 0"
stub-zone:
name: "."
stub-addr: 193.0.14.129 # K.ROOT-SERVERS.NET.
CONFIG_END
SCENARIO_BEGIN Test validator with insecure delegation and qtype DS.
; K.ROOT-SERVERS.NET.
RANGE_BEGIN 0 100
ADDRESS 193.0.14.129
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
. IN NS
SECTION ANSWER
. IN NS K.ROOT-SERVERS.NET.
SECTION ADDITIONAL
K.ROOT-SERVERS.NET. IN A 193.0.14.129
ENTRY_END
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
sub.example.com. IN DS
SECTION AUTHORITY
com. IN NS a.gtld-servers.net.
SECTION ADDITIONAL
a.gtld-servers.net. IN A 192.5.6.30
ENTRY_END
RANGE_END
; a.gtld-servers.net.
RANGE_BEGIN 0 100
ADDRESS 192.5.6.30
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
com. IN NS
SECTION ANSWER
com. IN NS a.gtld-servers.net.
SECTION ADDITIONAL
a.gtld-servers.net. IN A 192.5.6.30
ENTRY_END
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
sub.example.com. IN DS
SECTION AUTHORITY
example.com. IN NS ns.example.com.
SECTION ADDITIONAL
ns.example.com. IN A 1.2.3.4
ENTRY_END
RANGE_END
; ns.example.com.
RANGE_BEGIN 0 100
ADDRESS 1.2.3.4
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
example.com. IN NS
SECTION ANSWER
example.com. IN NS ns.example.com.
example.com. 3600 IN RRSIG NS 3 2 3600 20070926134150 20070829134150 2854 example.com. MC0CFQCN+qHdJxoI/2tNKwsb08pra/G7aAIUAWA5sDdJTbrXA1/3OaesGBAO3sI= ;{id = 2854}
SECTION ADDITIONAL
ns.example.com. IN A 1.2.3.4
ns.example.com. 3600 IN RRSIG A 3 3 3600 20070926135752 20070829135752 2854 example.com. MC0CFQCMSWxVehgOQLoYclB9PIAbNP229AIUeH0vNNGJhjnZiqgIOKvs1EhzqAo= ;{id = 2854}
ENTRY_END
; response to DNSKEY priming query
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
example.com. IN DNSKEY
SECTION ANSWER
example.com. 3600 IN DNSKEY 256 3 3 ALXLUsWqUrY3JYER3T4TBJII s70j+sDS/UT2QRp61SE7S3E EXopNXoFE73JLRmvpi/UrOO/Vz4Se 6wXv/CYCKjGw06U4WRgR YXcpEhJROyNapmdIKSx hOzfLVE1gqA0PweZR8d tY3aNQSRn3sPpwJr6Mi /PqQKAMMrZ9ckJpf1+b QMOOvxgzz2U1GS18b3y ZKcgTMEaJzd/GZYzi/B N2DzQ0MsrSwYXfsNLFO Bbs8PJMW4LYIxeeOe6rUgkWOF 7CC9Dh/dduQ1QrsJhmZAEFfd6ByYV+ ;{id = 2854 (zsk), size = 1688b}
example.com. 3600 IN RRSIG DNSKEY DSA 2 3600 20070926134150 20070829134150 2854 example.com. MCwCFBQRtlR4BEv9ohi+PGFjp+AHsJuHAhRCvz0shggvnvI88DFnBDCczHUcVA== ;{id = 2854}
SECTION AUTHORITY
example.com. IN NS ns.example.com.
example.com. 3600 IN RRSIG NS 3 2 3600 20070926134150 20070829134150 2854 example.com. MC0CFQCN+qHdJxoI/2tNKwsb08pra/G7aAIUAWA5sDdJTbrXA1/3OaesGBAO3sI= ;{id = 2854}
SECTION ADDITIONAL
ns.example.com. IN A 1.2.3.4
ns.example.com. 3600 IN RRSIG A 3 3 3600 20070926135752 20070829135752 2854 example.com. MC0CFQCMSWxVehgOQLoYclB9PIAbNP229AIUeH0vNNGJhjnZiqgIOKvs1EhzqAo= ;{id = 2854}
ENTRY_END
; query for missing DS record.
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
sub.example.com. IN DS
SECTION ANSWER
SECTION AUTHORITY
example.com. IN SOA ns.example.com. h.example.com. 2007090504 1800 1800 2419200 7200
example.com. 3600 IN RRSIG SOA 3 2 3600 20070926134150 20070829134150 2854 example.com. MCwCFC5uwIHSehZtetK2CMNXttSFUB0XAhROFDAgy/FaxR8zFXJzyPdpQG93Sw== ;{id = 2854}
sub.example.com. IN NSEC www.example.com. NS RRSIG NSEC
sub.example.com. 3600 IN RRSIG NSEC 3 3 3600 20070926134150 20070829134150 2854 example.com. MCwCFDCaiDM6G+glwNW276HWdH+McmjgAhRSwF5OfimNQCqkWgnYotLOwUghKQ== ;{id = 2854}
SECTION ADDITIONAL
ns.sub.example.com. IN A 1.2.3.6
ENTRY_END
; response for delegation to sub.example.com.
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id copy_query
REPLY QR NOERROR
SECTION QUESTION
sub.example.com. IN A
SECTION ANSWER
SECTION AUTHORITY
sub.example.com. IN NS ns.sub.example.com.
sub.example.com. IN NSEC www.example.com. NS RRSIG NSEC
sub.example.com. 3600 IN RRSIG NSEC 3 3 3600 20070926134150 20070829134150 2854 example.com. MCwCFDCaiDM6G+glwNW276HWdH+McmjgAhRSwF5OfimNQCqkWgnYotLOwUghKQ== ;{id = 2854}
SECTION ADDITIONAL
ns.sub.example.com. IN A 1.2.3.6
ENTRY_END
RANGE_END
; ns.sub.example.com.
RANGE_BEGIN 0 100
ADDRESS 1.2.3.6
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id copy_query
REPLY QR NOERROR
SECTION QUESTION
sub.example.com. IN NS
SECTION ANSWER
sub.example.com. IN NS ns.sub.example.com.
SECTION ADDITIONAL
ns.sub.example.com. IN A 1.2.3.6
ENTRY_END
; response to query of interest
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
www.sub.example.com. IN A
SECTION ANSWER
www.sub.example.com. IN A 11.11.11.11
SECTION AUTHORITY
SECTION ADDITIONAL
ENTRY_END
; query for missing DS record. on wrong side of zone cut.
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR AA NOERROR
SECTION QUESTION
sub.example.com. IN DS
SECTION ANSWER
SECTION AUTHORITY
sub.example.com. IN SOA ns.sub.example.com. h.sub.example.com. 2007090504 1800 1800 2419200 7200
ENTRY_END
RANGE_END
STEP 1 QUERY
ENTRY_BEGIN
REPLY RD DO
SECTION QUESTION
sub.example.com. IN DS
ENTRY_END
; recursion happens here.
STEP 10 CHECK_ANSWER
ENTRY_BEGIN
MATCH all
REPLY QR RD RA AD NOERROR
SECTION QUESTION
sub.example.com. IN DS
SECTION ANSWER
SECTION AUTHORITY
example.com. IN SOA ns.example.com. h.example.com. 2007090504 1800 1800 2419200 7200
example.com. 3600 IN RRSIG SOA 3 2 3600 20070926134150 20070829134150 2854 example.com. MCwCFC5uwIHSehZtetK2CMNXttSFUB0XAhROFDAgy/FaxR8zFXJzyPdpQG93Sw== ;{id = 2854}
sub.example.com. IN NSEC www.example.com. NS RRSIG NSEC
sub.example.com. 3600 IN RRSIG NSEC 3 3 3600 20070926134150 20070829134150 2854 example.com. MCwCFDCaiDM6G+glwNW276HWdH+McmjgAhRSwF5OfimNQCqkWgnYotLOwUghKQ== ;{id = 2854}
SECTION ADDITIONAL
ENTRY_END
SCENARIO_END
dnssecjava-1.1.3/src/test/resources/unbound/val_wild_pos.rpl 0000664 0000000 0000000 00000011767 13020541473 0024303 0 ustar 00root root 0000000 0000000 ; config options
; The island of trust is at example.com
server:
trust-anchor: "example.com. 3600 IN DS 2854 3 1 46e4ffc6e9a4793b488954bd3f0cc6af0dfb201b"
val-override-date: "20070916134226"
target-fetch-policy: "0 0 0 0 0"
stub-zone:
name: "."
stub-addr: 193.0.14.129 # K.ROOT-SERVERS.NET.
CONFIG_END
SCENARIO_BEGIN Test validator with direct wildcard positive response
; K.ROOT-SERVERS.NET.
RANGE_BEGIN 0 100
ADDRESS 193.0.14.129
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
. IN NS
SECTION ANSWER
. IN NS K.ROOT-SERVERS.NET.
SECTION ADDITIONAL
K.ROOT-SERVERS.NET. IN A 193.0.14.129
ENTRY_END
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
*.example.com. IN A
SECTION AUTHORITY
com. IN NS a.gtld-servers.net.
SECTION ADDITIONAL
a.gtld-servers.net. IN A 192.5.6.30
ENTRY_END
RANGE_END
; a.gtld-servers.net.
RANGE_BEGIN 0 100
ADDRESS 192.5.6.30
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
com. IN NS
SECTION ANSWER
com. IN NS a.gtld-servers.net.
SECTION ADDITIONAL
a.gtld-servers.net. IN A 192.5.6.30
ENTRY_END
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
*.example.com. IN A
SECTION AUTHORITY
example.com. IN NS ns.example.com.
SECTION ADDITIONAL
ns.example.com. IN A 1.2.3.4
ENTRY_END
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
ns.example.com. IN AAAA
SECTION ANSWER
ENTRY_END
RANGE_END
; ns.example.com.
RANGE_BEGIN 0 100
ADDRESS 1.2.3.4
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
example.com. IN NS
SECTION ANSWER
example.com. IN NS ns.example.com.
example.com. 3600 IN RRSIG NS 3 2 3600 20070926134150 20070829134150 2854 example.com. MC0CFQCN+qHdJxoI/2tNKwsb08pra/G7aAIUAWA5sDdJTbrXA1/3OaesGBAO3sI= ;{id = 2854}
SECTION ADDITIONAL
ns.example.com. IN A 1.2.3.4
ns.example.com. 3600 IN RRSIG A 3 3 3600 20070926135752 20070829135752 2854 example.com. MC0CFQCMSWxVehgOQLoYclB9PIAbNP229AIUeH0vNNGJhjnZiqgIOKvs1EhzqAo= ;{id = 2854}
ENTRY_END
; response to DNSKEY priming query
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
example.com. IN DNSKEY
SECTION ANSWER
example.com. 3600 IN DNSKEY 256 3 3 ALXLUsWqUrY3JYER3T4TBJII s70j+sDS/UT2QRp61SE7S3E EXopNXoFE73JLRmvpi/UrOO/Vz4Se 6wXv/CYCKjGw06U4WRgR YXcpEhJROyNapmdIKSx hOzfLVE1gqA0PweZR8d tY3aNQSRn3sPpwJr6Mi /PqQKAMMrZ9ckJpf1+b QMOOvxgzz2U1GS18b3y ZKcgTMEaJzd/GZYzi/B N2DzQ0MsrSwYXfsNLFO Bbs8PJMW4LYIxeeOe6rUgkWOF 7CC9Dh/dduQ1QrsJhmZAEFfd6ByYV+ ;{id = 2854 (zsk), size = 1688b}
example.com. 3600 IN RRSIG DNSKEY 3 2 3600 20070926134802 20070829134802 2854 example.com. MCwCFG1yhRNtTEa3Eno2zhVVuy2EJX3wAhQeLyUp6+UXcpC5qGNu9tkrTEgPUg== ;{id = 2854}
SECTION AUTHORITY
example.com. IN NS ns.example.com.
example.com. 3600 IN RRSIG NS 3 2 3600 20070926134150 20070829134150 2854 example.com. MC0CFQCN+qHdJxoI/2tNKwsb08pra/G7aAIUAWA5sDdJTbrXA1/3OaesGBAO3sI= ;{id = 2854}
SECTION ADDITIONAL
ns.example.com. IN A 1.2.3.4
ns.example.com. 3600 IN RRSIG A 3 3 3600 20070926135752 20070829135752 2854 example.com. MC0CFQCMSWxVehgOQLoYclB9PIAbNP229AIUeH0vNNGJhjnZiqgIOKvs1EhzqAo= ;{id = 2854}
ENTRY_END
; response to query of interest
ENTRY_BEGIN
MATCH opcode qtype qname
ADJUST copy_id
REPLY QR NOERROR
SECTION QUESTION
*.example.com. IN A
SECTION ANSWER
*.example.com. IN A 10.20.30.40
*.example.com. 3600 IN RRSIG A 3 2 3600 20070926134150 20070829134150 2854 example.com. AG3iIIzflgRHsIlOKiSHADHIn/NmfNgESAslc1wIjxys5r9w4CxNIGs= ;{id = 2854}
SECTION AUTHORITY
example.com. IN NS ns.example.com.
example.com. 3600 IN RRSIG NS 3 2 3600 20070926134150 20070829134150 2854 example.com. MC0CFQCN+qHdJxoI/2tNKwsb08pra/G7aAIUAWA5sDdJTbrXA1/3OaesGBAO3sI= ;{id = 2854}
SECTION ADDITIONAL
ns.example.com. IN A 1.2.3.4
ns.example.com. 3600 IN RRSIG A 3 3 3600 20070926134150 20070829134150 2854 example.com. MC0CFQCQMyTjn7WWwpwAR1LlVeLpRgZGuQIUCcJDEkwAuzytTDRlYK7nIMwH1CM= ;{id = 2854}
ENTRY_END
RANGE_END
STEP 1 QUERY
ENTRY_BEGIN
REPLY RD DO
SECTION QUESTION
*.example.com. IN A
ENTRY_END
; recursion happens here.
STEP 10 CHECK_ANSWER
ENTRY_BEGIN
MATCH all
REPLY QR RD RA AD NOERROR
SECTION QUESTION
*.example.com. IN A
SECTION ANSWER
*.example.com. IN A 10.20.30.40
*.example.com. 3600 IN RRSIG A 3 2 3600 20070926134150 20070829134150 2854 example.com. AG3iIIzflgRHsIlOKiSHADHIn/NmfNgESAslc1wIjxys5r9w4CxNIGs= ;{id = 2854}
SECTION AUTHORITY
example.com. IN NS ns.example.com.
example.com. 3600 IN RRSIG NS 3 2 3600 20070926134150 20070829134150 2854 example.com. MC0CFQCN+qHdJxoI/2tNKwsb08pra/G7aAIUAWA5sDdJTbrXA1/3OaesGBAO3sI= ;{id = 2854}
SECTION ADDITIONAL
ns.example.com. IN A 1.2.3.4
ns.example.com. 3600 IN RRSIG A 3 3 3600 20070926134150 20070829134150 2854 example.com. MC0CFQCQMyTjn7WWwpwAR1LlVeLpRgZGuQIUCcJDEkwAuzytTDRlYK7nIMwH1CM= ;{id = 2854}
ENTRY_END
SCENARIO_END