SV_RFC1034_4_3_3_not_applied_wildcard - Wildcards is not applied case
Verify that a NUT does not apply Wildcard RRs.
Wildcard RRs do not apply:
- When the query is in another zone. That is, delegation cancels
the wildcard defaults.
- When the query name or a name between the wildcard domain and
the query name is know to exist.
Authoritative Server
SV_RFC1034_4_3_3_not_applied_wildcard.seq [-tooloption ...]: KOI tool option
See also DNSConfig.pm
This test sequence is following.
DNS Client1 (TN) DNS Server1 (NUT)
| |
|------------------------------------->|
| 1. Send standard query |
| QNAME=*.example.com |
| QTYPE=MX |
| |
|<-------------------------------------|
| 2. Standard query response |
| QNAME Name=*.example.com |
| OTYPE=MX |
| ANSWER Name=*.example.com |
| ANSWER Type=MX |
| ANSWER Exchange=mail.example.com |
| AUTHORITY Name=example.com |
| AUTHORITY Type=NS |
| AUTHORITY NSDNAME |
| =NS1.example.com |
| ADDITIONAL Name=NS1.example.com |
| ADDITIONAL TYPE=A |
| ADDITIONAL ADDRESS=192.168.0.10 |
| |
|------------------------------------->|
| 3. Send standard query |
| QNAME=B.example.com |
| QTYPE=MX |
| |
|<-------------------------------------|
| 4. Standard query response |
| QNAME Name=B.example.com |
| OTYPE=MX |
| ANSWER Name=B.example.com |
| ANSWER Type=MX |
| ANSWER Exchange=mail.example.com |
| AUTHORITY Name=example.com |
| AUTHORITY Type=NS |
| AUTHORITY NSDNAME |
| =NS1.example.com |
| ADDITIONAL Name=NS1.example.com |
| ADDITIONAL TYPE=A |
| ADDITIONAL ADDRESS=192.168.0.10 |
| |
|------------------------------------->|
| 5. Send standard query |
| QNAME=A.example.com |
| QTYPE=MX |
| |
|<-------------------------------------|
| 6. Standard query response |
| NODATA |
| QNAME Name=A.example.com |
| OTYPE=MX |
| AUTHORITY Name=example.com |
| AUTHORITY Type=SOA |
| |
|------------------------------------->|
| 7. Send standard query |
| QNAME=example.com |
| QTYPE=MX |
| |
|<-------------------------------------|
| 8. Standard query response |
| NXDOMAIN |
| QNAME Name=example.com |
| OTYPE=MX |
| AUTHORITY Name=example.com |
| AUTHORITY Type=SOA |
| |
| |
v v
1. TN send standard query QNAME=*.example.com, QTYPE=MX to NUT.
2. NUT reply query response QNAME=*.example.com, QTYPE=MX, ANSWER Exchange=mail.example.com to TN (Judgment *2)
3. TN send standard query QNAME=B.example.com, QTYPE=MX to NUT.
4. NUT reply query response QNAME=B.example.com, QTYPE=MX, ANSWER Exchange=mail.example.com to TN (Judgment *4)
5. TN send standard query QNAME=A.example.com, QTYPE=MX to NUT.
6. NUT reply query response(NODATA) to TN (Judgment *6)
7. TN send standard query QNAME=example.com, QTYPE=MX to NUT.
8. NUT reply query response(NXDOMAIN) to TN (Judgment *8)
- Packet Description
- 1st packet.
|
Standard query from DNS Client1 (TN) to Server1 (NUT)
|
| IP Header |
Source Address |
CL1_NETZ |
| Destination Address |
NUT_NETZ |
| UDP Header |
Src Port |
2000 |
| Dst Port |
53 |
| DNS Header |
ID |
0x1000 |
| QR |
0 |
| OPCODE |
0 |
| AA |
0 |
| TC |
0 |
| RD |
1 |
| RA |
0 |
| Z |
0 |
| RCODE |
0 |
| QDCOUNT |
1 |
| ANCOUNT |
0 |
| NSCOUNT |
0 |
| ARCOUNT |
0 |
| DNS Question section |
QNAME |
*.example.com |
| QTYPE |
MX (0x000F) |
| QCLASS |
IN (0x0001) |
- 2nd packet.
|
Standard query response from DNS Server1 (NUT) to Client1 (TN)
|
| IP Header |
Source Address |
NUT_NETZ |
| Destination Address |
CL_NETZ |
| UDP Header |
Src Port |
53 |
| Dst Port |
2000 |
| DNS Header |
ID |
0x1000 |
| QR |
1 |
| OPCODE |
0 |
| AA |
1 |
| TC |
0 |
| RD |
1 |
| RA |
ANY |
| Z |
0 |
| RCODE |
0 |
| QDCOUNT |
1 |
| ANCOUNT |
1 |
| NSCOUNT |
1 |
| ARCOUNT |
1 |
| DNS Question section |
QNAME |
*.example.com
|
| QTYPE |
MX (0x000F) |
| QCLASS |
IN (0x0001) |
| DNS Answer section |
NAME |
*.example.com (Pointer 0xC00C)
|
| TYPE |
MX (0x000F) |
| CLASS |
IN (0x0001) |
| TTL |
1 day (86400) |
| RDLENGTH |
9 |
| PREFERENCE |
10 |
| EXCHANGE |
mail.example.com (mail + Pointer 0xC00E)
|
| DNS Authority section |
NAME |
example.com (Pointer 0xC00E) |
| TYPE |
NS (0x0002) |
| CLASS |
IN (0x0001) |
| TTL |
1 day (86400) |
| RDLENGTH |
6 |
| NSDNAME |
NS1.example.com (NS1 + Pointer 0xC00E) |
| DNS Additional section |
NAME |
NS1.example.com (Pointer 0xC040) |
TYPE
|
A (0x0001) |
| CLASS |
IN (0x0001) |
| TTL |
1 day (86400) |
| RDLENGTH |
4 |
| ADDRESS |
192.168.0.10 |
- 3rd packet.
|
Standard query from DNS Client1 (TN) to Server1 (NUT)
|
| IP Header |
Source Address |
CL1_NETZ |
| Destination Address |
NUT_NETZ |
| UDP Header |
Src Port |
2000 |
| Dst Port |
53 |
| DNS Header |
ID |
0x1001 |
| QR |
0 |
| OPCODE |
0 |
| AA |
0 |
| TC |
0 |
| RD |
1 |
| RA |
0 |
| Z |
0 |
| RCODE |
0 |
| QDCOUNT |
1 |
| ANCOUNT |
0 |
| NSCOUNT |
0 |
| ARCOUNT |
0 |
| DNS Question section |
QNAME |
B.example.com |
| QTYPE |
MX (0x000F) |
| QCLASS |
IN (0x0001) |
- 4th packet.
|
Standard query response from DNS Server1 (NUT) to Client1 (TN)
|
| IP Header |
Source Address |
NUT_NETZ |
| Destination Address |
CL_NETZ |
| UDP Header |
Src Port |
53 |
| Dst Port |
2000 |
| DNS Header |
ID |
0x1001 |
| QR |
1 |
| OPCODE |
0 |
| AA |
1 |
| TC |
0 |
| RD |
1 |
| RA |
ANY |
| Z |
0 |
| RCODE |
0 |
| QDCOUNT |
1 |
| ANCOUNT |
1 |
| NSCOUNT |
1 |
| ARCOUNT |
1 |
| DNS Question section |
QNAME |
B.example.com
|
| QTYPE |
MX (0x000F) |
| QCLASS |
IN (0x0001) |
| DNS Answer section |
NAME |
B.example.com (Pointer 0xC00C)
|
| TYPE |
MX (0x000F) |
| CLASS |
IN (0x0001) |
| TTL |
1 day (86400) |
| RDLENGTH |
9 |
| PREFERENCE |
10 |
| EXCHANGE |
mail.example.com (mail + Pointer 0xC00E)
|
| DNS Authority section |
NAME |
example.com (Pointer 0xC00E) |
| TYPE |
NS (0x0002) |
| CLASS |
IN (0x0001) |
| TTL |
1 day (86400) |
| RDLENGTH |
6 |
| NSDNAME |
NS1.example.com (NS1 + Pointer 0xC00E) |
| DNS Additional section |
NAME |
NS1.example.com (Pointer 0xC040) |
TYPE
|
A (0x0001) |
| CLASS |
IN (0x0001) |
| TTL |
1 day (86400) |
| RDLENGTH |
4 |
| ADDRESS |
192.168.0.10 |
- 5th packet.
|
Standard query from DNS Client1 (TN) to Server1 (NUT)
|
| IP Header |
Source Address |
CL1_NETZ |
| Destination Address |
NUT_NETZ |
| UDP Header |
Src Port |
2000 |
| Dst Port |
53 |
| DNS Header |
ID |
0x1002 |
| QR |
0 |
| OPCODE |
0 |
| AA |
0 |
| TC |
0 |
| RD |
1 |
| RA |
0 |
| Z |
0 |
| RCODE |
0 |
| QDCOUNT |
1 |
| ANCOUNT |
0 |
| NSCOUNT |
0 |
| ARCOUNT |
0 |
| DNS Question section |
QNAME |
A.example.com |
| QTYPE |
MX (0x000F) |
| QCLASS |
IN (0x0001) |
- 6th packet.
|
Standard query response from DNS Server1 (NUT) to Client1 (TN)
|
| IP Header |
Source Address |
NUT_NETZ |
| Destination Address |
CL1_NETZ |
| UDP Header |
Src Port |
53 |
| Dst Port |
2000 |
| DNS Header |
ID |
0x1002 |
| QR |
1 |
| OPCODE |
0 |
| AA |
1 |
| TC |
0 |
| RD |
1 |
| RA |
ANY |
| Z |
0 |
| RCODE |
0 |
| QDCOUNT |
1 |
| ANCOUNT |
0 |
| NSCOUNT |
1 |
| ARCOUNT |
0 |
| DNS Question section |
QNAME |
A.example.com |
| QTYPE |
MX (0x000F) |
| QCLASS |
IN (0x0001) |
| DNS Authority section |
NAME |
example.com (Pointer 0xC00E) |
| TYPE |
SOA (0x0006) |
| CLASS |
IN (0x0001) |
| TTL |
1 hour (3600) |
| RDLENGTH |
33 |
| NSDNAME |
NS1.example.com (NS1 + Pointer 0xC00E) |
| RNAME |
root.example.com (root + Pointer 0xC00E) |
| SERIAL |
2005081600 |
| REFRESH |
1 hour |
| RETRY |
15 minutes |
| EXPIRE |
1 week |
| MINIMUM |
1 hour (3600) |
- 7th packet.
|
Standard query from DNS Client1 (TN) to Server1 (NUT)
|
| IP Header |
Source Address |
CL1_NETZ |
| Destination Address |
NUT_NETZ |
| UDP Header |
Src Port |
2000 |
| Dst Port |
53 |
| DNS Header |
ID |
0x1003 |
| QR |
0 |
| OPCODE |
0 |
| AA |
0 |
| TC |
0 |
| RD |
1 |
| RA |
0 |
| Z |
0 |
| RCODE |
0 |
| QDCOUNT |
1 |
| ANCOUNT |
0 |
| NSCOUNT |
0 |
| ARCOUNT |
0 |
| DNS Question section |
QNAME |
example.com |
| QTYPE |
MX (0x000F) |
| QCLASS |
IN (0x0001) |
- 8th packet.
|
Standard query response from DNS Server1 (NUT) to Client1 (TN)
|
| IP Header |
Source Address |
NUT_NETZ |
| Destination Address |
CL1_NETZ |
| UDP Header |
Src Port |
53 |
| Dst Port |
2000 |
| DNS Header |
ID |
0x1003 |
| QR |
1 |
| OPCODE |
0 |
| AA |
1 |
| TC |
0 |
| RD |
1 |
| RA |
ANY |
| Z |
0 |
| RCODE |
3 |
| QDCOUNT |
1 |
| ANCOUNT |
0 |
| NSCOUNT |
1 |
| ARCOUNT |
0 |
| DNS Question section |
QNAME |
example.com |
| QTYPE |
MX (0x000F) |
| QCLASS |
IN (0x0001) |
| DNS Authority section |
NAME |
example.com (Pointer 0xC00C) |
| TYPE |
SOA (0x0006) |
| CLASS |
IN (0x0001) |
| TTL |
1 hour (3600) |
| RDLENGTH |
33 |
| NSDNAME |
NS1.example.com (NS1 + Pointer 0xC00C) |
| RNAME |
root.example.com (root + Pointer 0xC00C) |
| SERIAL |
2005081600 |
| REFRESH |
1 hour |
| RETRY |
15 minutes |
| EXPIRE |
1 week |
| MINIMUM |
1 hour (3600) |
- Exp.
| NUT_NETZ |
DNS Server1's (NUT) Net-z address |
| CL1_NETZ |
DNS Client1's (TN) Net-z address |
2. Received standard query response QNAME=*.example.com, QTYPE=MX, ANSWER Exchange=mail.example.com.
4. Received standard query response QNAME=A.example.com, QTYPE=MX, ANSWER Exchange=mail.example.com.
6. Received standard query response(NODATA).
8. Received standard query response(NXDOMAIN).
None
RFC1034 DOMAIN NAMES - CONCEPTS AND FACILITIES
4.3.3. Wildcards