Home | History | Annotate | Line # | Download | only in ns2
      1 ; Copyright (C) Internet Systems Consortium, Inc. ("ISC")
      2 ;
      3 ; SPDX-License-Identifier: MPL-2.0
      4 ;
      5 ; This Source Code Form is subject to the terms of the Mozilla Public
      6 ; License, v. 2.0.  If a copy of the MPL was not distributed with this
      7 ; file, you can obtain one at https://mozilla.org/MPL/2.0/.
      8 ;
      9 ; See the COPYRIGHT file distributed with this work for additional
     10 ; information regarding copyright ownership.
     11 
     12 $TTL 300	; 5 minutes
     13 @			IN SOA	mname1. . (
     14 				2000042407 ; serial
     15 				20         ; refresh (20 seconds)
     16 				20         ; retry (20 seconds)
     17 				1814400    ; expire (3 weeks)
     18 				3600       ; minimum (1 hour)
     19 				)
     20 			NS	ns2
     21 			NS	ns3
     22 ns2			A	10.53.0.2
     23 ns3			A	10.53.0.3
     24 
     25 a			A	10.0.0.1
     26 b			A	10.0.0.2
     27 d			A	10.0.0.4
     28 
     29 ; Used for testing ANY queries
     30 foo			TXT	"testing"
     31 foo			A	10.0.1.0
     32 
     33 bad-cname		CNAME   a
     34 bad-dname		DNAME   @
     35 
     36 ; Used for testing CNAME queries
     37 cname1			CNAME	cname1-target
     38 cname1-target		TXT	"testing cname"
     39 
     40 cname2			CNAME	cname2-target
     41 cname2-target		TXT	"testing cname"
     42 
     43 ; Used for testing DNAME queries
     44 dname1			DNAME	dname1-target
     45 foo.dname1-target	TXT	"testing dname"
     46 
     47 dname2			DNAME	dname2-target
     48 foo.dname2-target	TXT	"testing dname"
     49 
     50 ; A secure subdomain
     51 secure			NS	ns3.secure
     52 ns3.secure		A	10.53.0.3
     53 
     54 ; An insecure subdomain
     55 insecure		NS	ns.insecure
     56 ns.insecure		A	10.53.0.3
     57 
     58 ; A second insecure subdomain
     59 insecure2		NS	ns.insecure2
     60 ns.insecure2		A	10.53.0.3
     61 
     62 ; A secure subdomain we're going to inject bogus data into
     63 bogus			NS	ns.bogus
     64 ns.bogus		A	10.53.0.3
     65 
     66 ; A subdomain with a corrupt DS
     67 badds			NS	ns.badds
     68 ns.badds		A	10.53.0.3
     69 
     70 ; A dynamic secure subdomain
     71 dynamic			NS	dynamic
     72 dynamic			A	10.53.0.3
     73 
     74 ; A insecure subdomain
     75 mustbesecure		NS	ns.mustbesecure
     76 ns.mustbesecure		A	10.53.0.3
     77 
     78 ; A subdomain with expired signatures
     79 expired			NS	ns.expired
     80 ns.expired		A	10.53.0.3
     81 
     82 ; A rfc2535 signed zone w/ CNAME
     83 rfc2535			NS	ns.rfc2535
     84 ns.rfc2535		A	10.53.0.3
     85 
     86 z			A	10.0.0.26
     87 
     88 keyless			NS	ns.keyless
     89 ns.keyless		A	10.53.0.3
     90 
     91 nsec3			NS	ns.nsec3
     92 ns.nsec3		A	10.53.0.3
     93 
     94 optout			NS	ns.optout
     95 ns.optout		A	10.53.0.3
     96 
     97 nsec3-unknown		NS	ns.nsec3-unknown
     98 ns.nsec3-unknown	A	10.53.0.3
     99 
    100 optout-unknown		NS	ns.optout-unknown
    101 ns.optout-unknown	A	10.53.0.3
    102 
    103 dnskey-unknown		NS	ns.dnskey-unknown
    104 ns.dnskey-unknown	A	10.53.0.3
    105 
    106 dnskey-unsupported	NS	ns.dnskey-unsupported
    107 ns.dnskey-unsupported	A	10.53.0.3
    108 
    109 ds-unsupported	NS	ns.ds-unsupported
    110 ns.ds-unsupported	A	10.53.0.3
    111 
    112 digest-alg-unsupported    NS 	ns.digest-alg-unsupported
    113 ns.digest-alg-unsupported A	10.53.0.3
    114 
    115 dnskey-nsec3-unknown	NS	ns.dnskey-nsec3-unknown
    116 ns.dnskey-nsec3-unknown	A	10.53.0.3
    117 
    118 multiple		NS	ns.multiple
    119 ns.multiple		A	10.53.0.3
    120 
    121 *.wild			A	10.0.0.27
    122 
    123 rsasha256		NS	ns.rsasha256
    124 ns.rsasha256		A	10.53.0.3
    125 
    126 rsasha512		NS	ns.rsasha512
    127 ns.rsasha512		A	10.53.0.3
    128 
    129 kskonly			NS	ns.kskonly
    130 ns.kskonly		A	10.53.0.3
    131 
    132 update-nsec3		NS	ns.update-nsec3
    133 ns.update-nsec3		A	10.53.0.3
    134 
    135 auto-nsec		NS	ns.auto-nsec
    136 ns.auto-nsec		A	10.53.0.3
    137 
    138 auto-nsec3		NS	ns.auto-nsec3
    139 ns.auto-nsec3		A	10.53.0.3
    140 
    141 
    142 below-cname		CNAME	some.where.else.
    143 
    144 insecure.below-cname	NS	ns.insecure.below-cname
    145 ns.insecure.below-cname	A	10.53.0.3
    146 
    147 secure.below-cname	NS	ns.secure.below-cname
    148 ns.secure.below-cname	A	10.53.0.3
    149 
    150 ttlpatch		NS	ns.ttlpatch
    151 ns.ttlpatch		A	10.53.0.3
    152 
    153 split-dnssec		NS	ns.split-dnssec
    154 ns.split-dnssec		A	10.53.0.3
    155 
    156 split-smart		NS	ns.split-smart
    157 ns.split-smart		A	10.53.0.3
    158 
    159 upper			NS	ns.upper
    160 ns.upper		A	10.53.0.3
    161 
    162 LOWER			NS	NS.LOWER
    163 NS.LOWER		A	10.53.0.3
    164 
    165 expiring                 NS      ns.expiring
    166 ns.expiring              A       10.53.0.3
    167 
    168 future			NS	ns.future
    169 ns.future		A	10.53.0.3
    170 
    171 managed-future		NS	ns.managed-future
    172 ns.managed-future	A	10.53.0.3
    173 
    174 revkey			NS	ns.revkey
    175 ns.revkey		A	10.53.0.3
    176 
    177 rsasha1			NS	ns.rsasha1
    178 ns.rsasha1		A	10.53.0.3
    179 
    180 rsasha1-1024		NS	ns.rsasha1-1024
    181 ns.rsasha1-1024		A	10.53.0.3
    182 
    183 ; A secure subdomain with extra bad key
    184 extrabadkey		NS	ns3.extrabadkey
    185 ns3.extrabadkey		A	10.53.0.3
    186 
    187 dname-at-apex-nsec3	NS	ns3
    188