NAME

        SV_RFC1996_3_7_slave_NOTIFY_no_SOA - ANCOUNT=0 and the answer section differs from the slave's local data


VERIFICATION POINTS

        Verify that a NUT sends an IXFR message to get a new information about zone.


TARGET

        Server (an IXFR client)


SYNOPSIS

	SV_RFC1996_3_7_slave_NOTIFY_no_SOA.seq [-tooloption ...]: KOI tool option
	See also DNSConfig.pm


INITIALIZATION


PRE-TEST SEQUENCE

        After all zone information are transferred between primary DNS server7 (TN) 
        and slave DNS server1 (NUT), following pre-test sequence is performed.
    DNS Client1 (TN)             DNS Server1 (NUT)              DNS Server7 (TN)
        |                              |                              |
        |----------------------------->|                              |
        | 1. Send standard query       |                              |
        |  RD = 0                      |                              |
        |  QNAME = CL2.sec.example.com |                              |
        |  QTYPE = A                   |                              |
        |                              |                              |
        |<-----------------------------|                              |
        | 2. Standard query response   |                              |
        |  AA = 0                      |                              |
        |  RD = 0                      |                              |
        |  RA = 1                      |                              |
        |  QNAME = CL2.sec.example.com |                              |
        |  QTYPE = A                   |                              |
        |  ANSWER Name                 |                              |
        |        = CL2.sec.example.com |                              |
        |  ANSWER Type                 |                              |
        |        = A (0x0001)          |                              |
        |  ANSWER Address              |                              |
        |        = 192.168.0.21        |                              |
        |                              |                              |
        v                              v                              v


TEST PROCEDURE

        This test sequence is following.
        NOTE: SOA's parameter and $TTL are same as above sec.example.com zone information.
              TN includes NS7 and NS1.sub.example.com into Authority section as type = NS.
              Also TN includes NS7 and NS1.sub.example.com address into Additional section.
              Thus NUT may reply to answer client with Authority and Additional section including
              those values.
    DNS Client1 (TN)             DNS Server1 (NUT)              DNS Server7 (TN)
        |                              |                              |
        |                              |                              |
        |                              |<-----------------------------|
        |                              | 1. A NOTIFY request          |
        |                              |  OPCODE = NOTIFY (4)         |
        |                              |  QNAME = sec.example.com     |
        |                              |  QTYPE = SOA (0x0006)        |
        |                              |                              |
        |                              |----------------------------->|
        |                              | 2. A NOTIFY response         |
        |                              |  OPCODE = NOTIFY (4)         |
        |                              |  QNAME = sec.example.com     |
        |                              |  QTYPE = SOA (0x0006)        |
        |                              |                              |
        |                              |----------------------------->|
        |                              | 3. Standard query            |
        |                              |  QNAME = sec.example.com     |
        |                              |  QTYPE = SOA (0x0006)        |
        |                              |  ANSWER Name                 |
        |                              |       = sec.example.com      |
        |                              |  ANSWER Type                 |
        |                              |       = SOA (0x0006)         |
        |                              |  ANSWER SERIAL               |
        |                              |       = 1                    |
        |                              |                              |
        |                              |<-----------------------------|
        |                              | 4. Standard query response   |
        |                              |  QNAME = sec.example.com     |
        |                              |  QTYPE = SOA (0x0006)        |
        |                              |  ANSWER Name                 |
        |                              |       = sec.example.com      |
        |                              |  ANSWER Type                 |
        |                              |       = SOA (0x0006)         |
        |                              |  ANSWER SERIAL               |
        |                              |       = 2                    |
        |                              |                              |
        |                              |----------------------------->|
        |                              | 5. Standard query            |
        |                              |  QNAME = sec.example.com     |
        |                              |  QTYPE = IXFR (0x00FB) or    |
        |                              |          AXFR (0x00FC)       |
        |                              |  AUTHORITY Name              |
        |                              |       = sec.example.com      |
        |                              |  AUTHORITY Type              |
        |                              |       = SOA (0x0006)         |
        |                              |  AUTHORITY SERIAL            |
        |                              |       = 1                    |
        |                              |                              |
        v                              v                              v
        This test sequence is following.
        1. DNS Server7 (TN) sends NOTIFY request to DNS Server1 (NUT).
        2. DNS Server1 (NUT) sends NOTIFY request to DNS Server7 (TN). (Judgment *2)
        3. DNS Server1 (NUT) sends standard query response with SOA serial = 1 to DNS Server7 (TN). (Judgment *3)
        4. DNS Server7 (TN) sends standard query response with "sec.example.com SOA serial=2".
        5. DNS Server1 (NUT) transmits standard query with QNAME = sec.example.com, Type = IXFR or AXFR, 
           including Authority Name = sec.example.com, Type = SOA serial = 1 to DNS Server7 (TN). (Judgment *5)


JUDGMENT

        2. DNS Server1 (NUT) sends NOTIFY request to DNS Server7 (TN).
        3. DNS Server1 (NUT) sends standard query response with SOA serial = 1 to DNS Server7 (TN).
        5. DNS Server1 (NUT) transmits standard query with QNAME = sec.example.com, Type = IXFR or AXFR, 
           including Authority Name = sec.example.com, Type = SOA serial = 1 to DNS Server7 (TN).


TERMINATION

        None


REFERENCE

        RFC 1996 DNS NOTIFY
        3. NOTIFY Message