SV_RFC1034_4_3_3_not_applied_wildcard - Wildcards is not applied case
Verify that a NUT does not apply Wildcard RRs.
Wildcard RRs do not apply:
- When the query is in another zone. That is, delegation cancels the wildcard defaults.
- When the query name or a name between the wildcard domain and the query name is know to exist.
Authoritative Server
SV_RFC1034_4_3_3_not_applied_wildcard.seq [-tooloption ...]: KOI tool option See also DNSConfig.pm
AP Server1 (TN) |3ffe:501:ffff:101::10 |192.168.1.10 | Net-y --+--------+---------------------------- 3ffe:501:ffff:101::/64 | 192.168.1/24 | | | sub.example.com zone Router (TN) DNS Server6 (TN) |3ffe:501:ffff:100::1 |NS6.sub.example.com |192.168.0.1 |3ffe:501:ffff:100::30 | |192.168.0.30 | | Net-z --+--------+-----------------+-------+-- 3ffe:501:ffff:100::/64 | | 192.168.0/24 | | DNS Server1 (NUT) DNS Client1 (TN) 3ffe:501:ffff:100::XXXX 3ffe:501:ffff:100::20 192.168.0.10 192.168.0.20
XXXX: EUI64
$TTL 86400 ; TTL of 1 day @ IN SOA NS1.example.com. root.example.com. ( 2005081600 ; serial 3600 ; refresh every 1 hr 900 ; retry every 15 min 604800 ; expire after a week 3600 ; Minimum TTL of a 1 hr ) ; IN NS NS1.example.com. NS1 IN A 192.168.0.10 A IN A 192.168.1.10 * IN MX 10 mail.example.com. JP IN MX 10 JP-mail.example.com. ; sub IN NS NS6.sub.example.com. NS6.sub IN A 192.168.0.30 ;
This test sequence is following.
DNS Client1 (TN) DNS Server1 (NUT) | | |------------------------------------->| | 1. Send standard query | | QNAME=*.example.com | | QTYPE=MX | | | |<-------------------------------------| | 2. Standard query response | | QNAME Name=*.example.com | | OTYPE=MX | | ANSWER Name=*.example.com | | ANSWER Type=MX | | ANSWER Exchange=mail.example.com | | AUTHORITY Name=example.com | | AUTHORITY Type=NS | | AUTHORITY NSDNAME | | =NS1.example.com | | ADDITIONAL Name=NS1.example.com | | ADDITIONAL TYPE=A | | ADDITIONAL ADDRESS=192.168.0.10 | | | |------------------------------------->| | 3. Send standard query | | QNAME=B.example.com | | QTYPE=MX | | | |<-------------------------------------| | 4. Standard query response | | QNAME Name=B.example.com | | OTYPE=MX | | ANSWER Name=B.example.com | | ANSWER Type=MX | | ANSWER Exchange=mail.example.com | | AUTHORITY Name=example.com | | AUTHORITY Type=NS | | AUTHORITY NSDNAME | | =NS1.example.com | | ADDITIONAL Name=NS1.example.com | | ADDITIONAL TYPE=A | | ADDITIONAL ADDRESS=192.168.0.10 | | | |------------------------------------->| | 5. Send standard query | | QNAME=A.example.com | | QTYPE=MX | | | |<-------------------------------------| | 6. Standard query response | | NODATA | | QNAME Name=A.example.com | | OTYPE=MX | | AUTHORITY Name=example.com | | AUTHORITY Type=SOA | | | |------------------------------------->| | 7. Send standard query | | QNAME=example.com | | QTYPE=MX | | | |<-------------------------------------| | 8. Standard query response | | NXDOMAIN | | QNAME Name=example.com | | OTYPE=MX | | AUTHORITY Name=example.com | | AUTHORITY Type=SOA | | | | | v v
1. TN send standard query QNAME=*.example.com, QTYPE=MX to NUT. 2. NUT reply query response QNAME=*.example.com, QTYPE=MX, ANSWER Exchange=mail.example.com to TN (Judgment *2) 3. TN send standard query QNAME=B.example.com, QTYPE=MX to NUT. 4. NUT reply query response QNAME=B.example.com, QTYPE=MX, ANSWER Exchange=mail.example.com to TN (Judgment *4) 5. TN send standard query QNAME=A.example.com, QTYPE=MX to NUT. 6. NUT reply query response(NODATA) to TN (Judgment *6) 7. TN send standard query QNAME=example.com, QTYPE=MX to NUT. 8. NUT reply query response(NXDOMAIN) to TN (Judgment *8)
|
||
IP Header | Source Address | CL1_NETZ |
Destination Address | NUT_NETZ | |
UDP Header | Src Port | 2000 |
Dst Port | 53 | |
DNS Header | ID | 0x1000 |
QR | 0 | |
OPCODE | 0 | |
AA | 0 | |
TC | 0 | |
RD | 1 | |
RA | 0 | |
Z | 0 | |
RCODE | 0 | |
QDCOUNT | 1 | |
ANCOUNT | 0 | |
NSCOUNT | 0 | |
ARCOUNT | 0 | |
DNS Question section | QNAME | *.example.com |
QTYPE | MX (0x000F) | |
QCLASS | IN (0x0001) |
|
||
IP Header | Source Address | NUT_NETZ |
Destination Address | CL_NETZ | |
UDP Header | Src Port | 53 |
Dst Port | 2000 | |
DNS Header | ID | 0x1000 |
QR | 1 | |
OPCODE | 0 | |
AA | 1 | |
TC | 0 | |
RD | 1 | |
RA | ANY | |
Z | 0 | |
RCODE | 0 | |
QDCOUNT | 1 | |
ANCOUNT | 1 | |
NSCOUNT | 1 | |
ARCOUNT | 1 | |
DNS Question section | QNAME | *.example.com |
QTYPE | MX (0x000F) | |
QCLASS | IN (0x0001) | |
DNS Answer section | NAME | *.example.com (Pointer 0xC00C) |
TYPE | MX (0x000F) | |
CLASS | IN (0x0001) | |
TTL | 1 day (86400) | |
RDLENGTH | 9 | |
PREFERENCE | 10 | |
EXCHANGE | mail.example.com (mail + Pointer 0xC00E) | |
DNS Authority section | NAME | example.com (Pointer 0xC00E) |
TYPE | NS (0x0002) | |
CLASS | IN (0x0001) | |
TTL | 1 day (86400) | |
RDLENGTH | 6 | |
NSDNAME | NS1.example.com (NS1 + Pointer 0xC00E) | |
DNS Additional section | NAME | NS1.example.com (Pointer 0xC040) |
TYPE |
A (0x0001) | |
CLASS | IN (0x0001) | |
TTL | 1 day (86400) | |
RDLENGTH | 4 | |
ADDRESS | 192.168.0.10 |
|
||
IP Header | Source Address | CL1_NETZ |
Destination Address | NUT_NETZ | |
UDP Header | Src Port | 2000 |
Dst Port | 53 | |
DNS Header | ID | 0x1001 |
QR | 0 | |
OPCODE | 0 | |
AA | 0 | |
TC | 0 | |
RD | 1 | |
RA | 0 | |
Z | 0 | |
RCODE | 0 | |
QDCOUNT | 1 | |
ANCOUNT | 0 | |
NSCOUNT | 0 | |
ARCOUNT | 0 | |
DNS Question section | QNAME | B.example.com |
QTYPE | MX (0x000F) | |
QCLASS | IN (0x0001) |
|
||
IP Header | Source Address | NUT_NETZ |
Destination Address | CL_NETZ | |
UDP Header | Src Port | 53 |
Dst Port | 2000 | |
DNS Header | ID | 0x1001 |
QR | 1 | |
OPCODE | 0 | |
AA | 1 | |
TC | 0 | |
RD | 1 | |
RA | ANY | |
Z | 0 | |
RCODE | 0 | |
QDCOUNT | 1 | |
ANCOUNT | 1 | |
NSCOUNT | 1 | |
ARCOUNT | 1 | |
DNS Question section | QNAME | B.example.com |
QTYPE | MX (0x000F) | |
QCLASS | IN (0x0001) | |
DNS Answer section | NAME | B.example.com (Pointer 0xC00C) |
TYPE | MX (0x000F) | |
CLASS | IN (0x0001) | |
TTL | 1 day (86400) | |
RDLENGTH | 9 | |
PREFERENCE | 10 | |
EXCHANGE | mail.example.com (mail + Pointer 0xC00E) | |
DNS Authority section | NAME | example.com (Pointer 0xC00E) |
TYPE | NS (0x0002) | |
CLASS | IN (0x0001) | |
TTL | 1 day (86400) | |
RDLENGTH | 6 | |
NSDNAME | NS1.example.com (NS1 + Pointer 0xC00E) | |
DNS Additional section | NAME | NS1.example.com (Pointer 0xC040) |
TYPE |
A (0x0001) | |
CLASS | IN (0x0001) | |
TTL | 1 day (86400) | |
RDLENGTH | 4 | |
ADDRESS | 192.168.0.10 |
|
||
IP Header | Source Address | CL1_NETZ |
Destination Address | NUT_NETZ | |
UDP Header | Src Port | 2000 |
Dst Port | 53 | |
DNS Header | ID | 0x1002 |
QR | 0 | |
OPCODE | 0 | |
AA | 0 | |
TC | 0 | |
RD | 1 | |
RA | 0 | |
Z | 0 | |
RCODE | 0 | |
QDCOUNT | 1 | |
ANCOUNT | 0 | |
NSCOUNT | 0 | |
ARCOUNT | 0 | |
DNS Question section | QNAME | A.example.com |
QTYPE | MX (0x000F) | |
QCLASS | IN (0x0001) |
|
||
IP Header | Source Address | NUT_NETZ |
Destination Address | CL1_NETZ | |
UDP Header | Src Port | 53 |
Dst Port | 2000 | |
DNS Header | ID | 0x1002 |
QR | 1 | |
OPCODE | 0 | |
AA | 1 | |
TC | 0 | |
RD | 1 | |
RA | ANY | |
Z | 0 | |
RCODE | 0 | |
QDCOUNT | 1 | |
ANCOUNT | 0 | |
NSCOUNT | 1 | |
ARCOUNT | 0 | |
DNS Question section | QNAME | A.example.com |
QTYPE | MX (0x000F) | |
QCLASS | IN (0x0001) | |
DNS Authority section | NAME | example.com (Pointer 0xC00E) |
TYPE | SOA (0x0006) | |
CLASS | IN (0x0001) | |
TTL | 1 hour (3600) | |
RDLENGTH | 33 | |
NSDNAME | NS1.example.com (NS1 + Pointer 0xC00E) | |
RNAME | root.example.com (root + Pointer 0xC00E) | |
SERIAL | 2005081600 | |
REFRESH | 1 hour | |
RETRY | 15 minutes | |
EXPIRE | 1 week | |
MINIMUM | 1 hour (3600) |
|
||
IP Header | Source Address | CL1_NETZ |
Destination Address | NUT_NETZ | |
UDP Header | Src Port | 2000 |
Dst Port | 53 | |
DNS Header | ID | 0x1003 |
QR | 0 | |
OPCODE | 0 | |
AA | 0 | |
TC | 0 | |
RD | 1 | |
RA | 0 | |
Z | 0 | |
RCODE | 0 | |
QDCOUNT | 1 | |
ANCOUNT | 0 | |
NSCOUNT | 0 | |
ARCOUNT | 0 | |
DNS Question section | QNAME | example.com |
QTYPE | MX (0x000F) | |
QCLASS | IN (0x0001) |
|
||
IP Header | Source Address | NUT_NETZ |
Destination Address | CL1_NETZ | |
UDP Header | Src Port | 53 |
Dst Port | 2000 | |
DNS Header | ID | 0x1003 |
QR | 1 | |
OPCODE | 0 | |
AA | 1 | |
TC | 0 | |
RD | 1 | |
RA | ANY | |
Z | 0 | |
RCODE | 3 | |
QDCOUNT | 1 | |
ANCOUNT | 0 | |
NSCOUNT | 1 | |
ARCOUNT | 0 | |
DNS Question section | QNAME | example.com |
QTYPE | MX (0x000F) | |
QCLASS | IN (0x0001) | |
DNS Authority section | NAME | example.com (Pointer 0xC00C) |
TYPE | SOA (0x0006) | |
CLASS | IN (0x0001) | |
TTL | 1 hour (3600) | |
RDLENGTH | 33 | |
NSDNAME | NS1.example.com (NS1 + Pointer 0xC00C) | |
RNAME | root.example.com (root + Pointer 0xC00C) | |
SERIAL | 2005081600 | |
REFRESH | 1 hour | |
RETRY | 15 minutes | |
EXPIRE | 1 week | |
MINIMUM | 1 hour (3600) |
NUT_NETZ | DNS Server1's (NUT) Net-z address |
CL1_NETZ | DNS Client1's (TN) Net-z address |
2. Received standard query response QNAME=*.example.com, QTYPE=MX, ANSWER Exchange=mail.example.com. 4. Received standard query response QNAME=A.example.com, QTYPE=MX, ANSWER Exchange=mail.example.com. 6. Received standard query response(NODATA). 8. Received standard query response(NXDOMAIN).
None
RFC1034 DOMAIN NAMES - CONCEPTS AND FACILITIES 4.3.3. Wildcards