master2.db.in revision 24ef32426d91c5140d75031b6443397c6d24006c
a8783019814daa36dd57afe3f527462822834c3bEvan Hunt; Copyright (C) 2011 Internet Systems Consortium, Inc. ("ISC")
a8783019814daa36dd57afe3f527462822834c3bEvan Hunt;
0c27b3fe77ac1d5094ba3521e8142d9e7973133fMark Andrews; Permission to use, copy, modify, and/or distribute this software for any
a8783019814daa36dd57afe3f527462822834c3bEvan Hunt; purpose with or without fee is hereby granted, provided that the above
0c27b3fe77ac1d5094ba3521e8142d9e7973133fMark Andrews; copyright notice and this permission notice appear in all copies.
0c27b3fe77ac1d5094ba3521e8142d9e7973133fMark Andrews;
0c27b3fe77ac1d5094ba3521e8142d9e7973133fMark Andrews; THE SOFTWARE IS PROVIDED "AS IS" AND ISC DISCLAIMS ALL WARRANTIES WITH
a8783019814daa36dd57afe3f527462822834c3bEvan Hunt; REGARD TO THIS SOFTWARE INCLUDING ALL IMPLIED WARRANTIES OF MERCHANTABILITY
a8783019814daa36dd57afe3f527462822834c3bEvan Hunt; AND FITNESS. IN NO EVENT SHALL ISC BE LIABLE FOR ANY SPECIAL, DIRECT,
a8783019814daa36dd57afe3f527462822834c3bEvan Hunt; INDIRECT, OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES WHATSOEVER RESULTING FROM
a8783019814daa36dd57afe3f527462822834c3bEvan Hunt; LOSS OF USE, DATA OR PROFITS, WHETHER IN AN ACTION OF CONTRACT, NEGLIGENCE
a8783019814daa36dd57afe3f527462822834c3bEvan Hunt; OR OTHER TORTIOUS ACTION, ARISING OUT OF OR IN CONNECTION WITH THE USE OR
a8783019814daa36dd57afe3f527462822834c3bEvan Hunt; PERFORMANCE OF THIS SOFTWARE.
a8783019814daa36dd57afe3f527462822834c3bEvan Hunt
a8783019814daa36dd57afe3f527462822834c3bEvan Hunt; $Id: master2.db.in,v 1.2 2011/10/26 20:56:45 marka Exp $
a8783019814daa36dd57afe3f527462822834c3bEvan Hunt
a8783019814daa36dd57afe3f527462822834c3bEvan Hunt$TTL 300 ; 5 minutes
a8783019814daa36dd57afe3f527462822834c3bEvan Hunt@ IN SOA ns2 . (
a8783019814daa36dd57afe3f527462822834c3bEvan Hunt 2000042408 ; serial
a8783019814daa36dd57afe3f527462822834c3bEvan Hunt 20 ; refresh (20 seconds)
a8783019814daa36dd57afe3f527462822834c3bEvan Hunt 20 ; retry (20 seconds)
1814400 ; expire (3 weeks)
3600 ; minimum (1 hour)
)
NS ns3
ns2 A 10.53.0.2
ns3 A 10.53.0.3
a A 10.0.0.1
b A 10.0.0.2
d A 10.0.0.4
e A 10.0.0.5
; Used for testing ANY queries
foo TXT "testing"
foo A 10.0.1.0
bad-cname CNAME a
bad-dname DNAME @
; Used for testing CNAME queries
cname1 CNAME cname1-target
cname1-target TXT "testing cname"
cname2 CNAME cname2-target
cname2-target TXT "testing cname"
; Used for testing DNAME queries
dname1 DNAME dname1-target
foo.dname1-target TXT "testing dname"
dname2 DNAME dname2-target
foo.dname2-target TXT "testing dname"
; A secure subdomain
secure NS ns.secure
ns.secure A 10.53.0.3
; An insecure subdomain
insecure NS ns.insecure
ns.insecure A 10.53.0.3
; A secure subdomain we're going to inject bogus data into
bogus NS ns.bogus
ns.bogus A 10.53.0.3
; A dynamic secure subdomain
dynamic NS dynamic
dynamic A 10.53.0.3
; A insecure subdomain
mustbesecure NS ns.mustbesecure
ns.mustbesecure A 10.53.0.3
; A rfc2535 signed zone w/ CNAME
rfc2535 NS ns.rfc2535
ns.rfc2535 A 10.53.0.3
z A 10.0.0.26
keyless NS ns.keyless
ns.keyless A 10.53.0.3
nsec3 NS ns.nsec3
ns.nsec3 A 10.53.0.3
optout NS ns.optout
ns.optout A 10.53.0.3
nsec3-unknown NS ns.nsec3-unknown
ns.nsec3-unknown A 10.53.0.3
optout-unknown NS ns.optout-unknown
ns.optout-unknown A 10.53.0.3
multiple NS ns.multiple
ns.multiple A 10.53.0.3
*.wild A 10.0.0.27
rsasha256 NS ns.rsasha256
ns.rsasha256 A 10.53.0.3
rsasha512 NS ns.rsasha512
ns.rsasha512 A 10.53.0.3
kskonly NS ns.kskonly
ns.kskonly A 10.53.0.3
update-nsec3 NS ns.update-nsec3
ns.update-nsec3 A 10.53.0.3
auto-nsec NS ns.auto-nsec
ns.auto-nsec A 10.53.0.3
auto-nsec3 NS ns.auto-nsec3
ns.auto-nsec3 A 10.53.0.3
below-cname CNAME some.where.else.
insecure.below-cname NS ns.insecure.below-cname
ns.insecure.below-cname A 10.53.0.3
secure.below-cname NS ns.secure.below-cname
ns.secure.below-cname A 10.53.0.3
ttlpatch NS ns.ttlpatch
ns.ttlpatch A 10.53.0.3
split-dnssec NS ns.split-dnssec
ns.split-dnssec A 10.53.0.3
split-smart NS ns.split-smart
ns.split-smart A 10.53.0.3