; nameserver test file $ORIGIN example.com. $TTL 3600 ENTRY_BEGIN MATCH opcode qtype qname REPLY QR AA NOERROR ADJUST copy_id SECTION QUESTION www IN A SECTION ANSWER www IN A 10.20.30.40 ENTRY_END ENTRY_BEGIN MATCH opcode qtype qname REPLY QR AA NOERROR ADJUST copy_id SECTION QUESTION 1ttl IN A SECTION ANSWER 1ttl 1 IN A 1.1.1.1 ENTRY_END ENTRY_BEGIN MATCH opcode qtype qname REPLY QR AA NOERROR ADJUST copy_id SECTION QUESTION 0ttl IN A SECTION ANSWER 0ttl 0 IN A 0.0.0.1 ENTRY_END $ORIGIN bogusdnssec. ENTRY_BEGIN MATCH opcode qtype qname REPLY QR AA NOERROR ADJUST copy_id SECTION QUESTION @ IN DNSKEY SECTION ANSWER ;; random keys with bogus rrsig (originally from nlnetlabs.nl) ;; These will result in 6 validation attempts (1 + 5 retries) when trying to prime the configured trust anchor @ IN DNSKEY 256 3 8 AwEAAdR7XR95OaAN9Rz7TbtPalQ9guQk7zfxTHYNKhsiwTZA9z+F16nD 0VeBlk7dNik3ETpT2GLAwr9sntG898JwurCDe353wHPvjZtMCdiTVp3c RCrjuCEvoFpmZNN82H0gaH/4v8mkv/QBDAkDSncYjz/FqHKAeYy3cMcj Y6RyVweh @ IN DNSKEY 257 3 8 AwEAAbwL6LuXTLXtb23CsXhpkxxyGbEFUROh/L8BWA1EEF8LdQ4Rmsj4 D5D8uAnRFDkNhM6XiII9xcsavwBGNwHxzUaij4MZQu1vrzcfGIJLcC1Q paZmSH9WqIYFQci+T4s4UfDrrS96wO/H0nJvFmavWVX/7p1Q6dv0Arwz XMXaHGrRVdEgK2MDS3dFRngx5JC5fwD7YnwH08EAoFRjdAoXe+etOAeG aOT9IGjVM5LKkN2k6fIRvZ2l9eu5/o+h5L+kpDRcapW2QiL21hCcmwpW 50Llfx9Ovk+M7TBjp4iT7Tc8gLzRZr24LmXEyABb54WW3aoF5k8DZPot 9ogUjxVN/dM= @ IN RRSIG DNSKEY 8 1 3600 20250806005014 20250709005014 50602 bogusdnssec. WIv6Qe9RAALyMK04dnDfOHtudHzIyk2DcwBLupbPdmSu+0NcAjcQBo2x rWNrdvNHVCAi5OvRwIz/ac81TptsnsSd6zcOtbeSijWpQj21vnSHhlWv zvJW+/WAm3h/XbOPFSE08FNaig9CeRE2GmKemKAdUeDbWoNrku8klCG+ GHJCCyqdmgS6249oUvIgV/m6OwRSCEeUxHlDqbM+OF+Up3dj0iQ61n9l 2nrQR9WNFn9YGTNHiA9bhdFfiCmrAb6X01IrlmSe+ENiQPeRnOWv24ls V5Re9zAOz+X26vjev/wMTEhlrAvl6FIRg7hIgnd3UxQ/UCQ5gxSriaWi YoiH6g== ENTRY_END ENTRY_BEGIN MATCH opcode qtype qname REPLY QR AA NOERROR ADJUST copy_id SECTION QUESTION www IN A SECTION ANSWER www 0 IN A 10.20.30.40 ; bogus signature to not trigger LAME DNSSEC and continue with validation www 0 IN RRSIG A 8 2 240 20250429005000 20250401005000 42393 bogusdnssec. ob6ddTJkdeOUn92cxx1NPGneV7rhOp2zKBv8FXQjJ/Wso8LJJnzRHW9p 3sTatlzi+UdRi7BOrcxwjUG38lgO+TS5vRFGAiTRmOezm6xJVNTg8lIb RJGCD5bRtRRstwt31Qt6Gda+6sAyvDebpUB/opkQpevv6xohdrhr0g8+ Q4w= SECTION ADDITIONAL ; dns error reporting agent HEX_EDNSDATA_BEGIN 00 12 ; opt-code (Report-Channel) 00 0A ; opt-len 02 61 6E 05 61 67 65 6E 74 00 ; an.agent. HEX_EDNSDATA_END ENTRY_END $ORIGIN an.agent. ;just give an answer back to anything ENTRY_BEGIN MATCH opcode subdomain REPLY QR AA NXDOMAIN ADJUST copy_id copy_query SECTION QUESTION an.agent. IN ANY ENTRY_END $ORIGIN unresponsive. ;; no entry for 'unresponsive.', we rely on timeouts.