func addresses(conf *dns.ClientConfig, c *dns.Client, name string) []string { dns.HandleQueryFunc(os.Args[1], qhandler) dns.ListenAndQuery(nil, nil) m4 := new(dns.Msg) m4.SetQuestion(os.Args[1], dns.TypeA) m6 := new(dns.Msg) m6.SetQuestion(os.Args[1], dns.TypeAAAA) c.Do(m4, conf.Servers[0]) // Also 1 and 2 (and merge the results?? c.Do(m6, conf.Servers[0]) var ips []string i := 2 // two outstanding queries forever: for { select { case r := <-dns.DefaultReplyChan: if r[1] != nil && r[1].Rcode == dns.RcodeSuccess { for _, aa := range r[1].Answer { switch aa.(type) { case *dns.RR_A: ips = append(ips, aa.(*dns.RR_A).A.String()+":53") case *dns.RR_AAAA: ips = append(ips, "["+aa.(*dns.RR_AAAA).AAAA.String()+"]:53") } } } else { fmt.Printf("Nothing recevied for %s\n", name) } i-- if i == 0 { break forever } } } return ips }
func main() { dnssec := flag.Bool("dnssec", false, "request DNSSEC records") query := flag.Bool("question", false, "show question") short := flag.Bool("short", false, "abbreviate long DNSSEC records") check := flag.Bool("check", false, "check internal DNSSEC consistency") anchor := flag.String("anchor", "", "use the DNSKEY in this file for checking consistency") port := flag.Int("port", 53, "port number to use") aa := flag.Bool("aa", false, "set AA flag in query") ad := flag.Bool("ad", false, "set AD flag in query") cd := flag.Bool("cd", false, "set CD flag in query") rd := flag.Bool("rd", true, "unset RD flag in query") tcp := flag.Bool("tcp", false, "TCP mode") nsid := flag.Bool("nsid", false, "ask for NSID") flag.Usage = func() { fmt.Fprintf(os.Stderr, "Usage: %s [@server] [qtype] [qclass] [name ...]\n", os.Args[0]) flag.PrintDefaults() } conf, _ := dns.ClientConfigFromFile("/etc/resolv.conf") nameserver := "@" + conf.Servers[0] qtype := uint16(0) qclass := uint16(dns.ClassINET) // Default qclass var qname []string flag.Parse() if *anchor != "" { f, err := os.Open(*anchor) if err != nil { fmt.Fprintf(os.Stderr, "Failure to open %s: %s\n", *anchor, err.Error()) } r, err := dns.ReadRR(f, *anchor) if err != nil { fmt.Fprintf(os.Stderr, "Failure to read an RR from %s: %s\n", *anchor, err.Error()) } if k, ok := r.(*dns.RR_DNSKEY); !ok { fmt.Fprintf(os.Stderr, "No DNSKEY read from %s\n", *anchor) } else { dnskey = k } } Flags: for i := 0; i < flag.NArg(); i++ { // If it starts with @ it is a nameserver if flag.Arg(i)[0] == '@' { nameserver = flag.Arg(i) continue Flags } // First class, then type, to make ANY queries possible // And if it looks like type, it is a type if k, ok := dns.Str_rr[strings.ToUpper(flag.Arg(i))]; ok { qtype = k continue Flags } // If it looks like a class, it is a class if k, ok := dns.Str_class[strings.ToUpper(flag.Arg(i))]; ok { qclass = k continue Flags } // If it starts with TYPExxx it is unknown rr if strings.HasPrefix(flag.Arg(i), "TYPE") { i, e := strconv.Atoi(string([]byte(flag.Arg(i))[4:])) if e == nil { qtype = uint16(i) continue Flags } } // Anything else is a qname qname = append(qname, flag.Arg(i)) } if len(qname) == 0 { qname = make([]string, 1) qname[0] = "." qtype = dns.TypeNS } if qtype == 0 { qtype = dns.TypeA } nameserver = string([]byte(nameserver)[1:]) // chop off @ nameserver += ":" + strconv.Itoa(*port) // ipv6 todo // We use the async query handling, just to show how // it is to be used. dns.HandleQueryFunc(".", q) dns.ListenAndQuery(nil, nil) c := dns.NewClient() if *tcp { c.Net = "tcp" } m := new(dns.Msg) m.MsgHdr.Authoritative = *aa m.MsgHdr.AuthenticatedData = *ad m.MsgHdr.CheckingDisabled = *cd m.MsgHdr.RecursionDesired = *rd m.Question = make([]dns.Question, 1) if *dnssec || *nsid { o := new(dns.RR_OPT) o.Hdr.Name = "." o.Hdr.Rrtype = dns.TypeOPT if *dnssec { o.SetDo() o.SetUDPSize(dns.DefaultMsgSize) } if *nsid { o.SetNsid("") } m.Extra = append(m.Extra, o) } for _, v := range qname { m.Question[0] = dns.Question{v, qtype, qclass} m.Id = dns.Id() if *query { fmt.Printf("%s\n", m.String()) } c.Do(m, nameserver) } i := 0 forever: for { select { case r := <-dns.DefaultReplyChan: if r.Reply != nil { if r.Reply.Rcode == dns.RcodeSuccess { if r.Request.Id != r.Reply.Id { fmt.Printf("Id mismatch\n") } } if *check { sigCheck(r.Reply, nameserver, *tcp) nsecCheck(r.Reply) } if *short { r.Reply = shortMsg(r.Reply) } fmt.Printf("%v", r.Reply) } i++ if i == len(qname) { break forever } } } }
func main() { var dnssec *bool = flag.Bool("dnssec", false, "request DNSSEC records") var query *bool = flag.Bool("question", false, "show question") var short *bool = flag.Bool("short", false, "abbriate long DNSKEY and RRSIG RRs") var aa *bool = flag.Bool("aa", false, "set AA flag in query") var ad *bool = flag.Bool("ad", false, "set AD flag in query") var cd *bool = flag.Bool("cd", false, "set CD flag in query") var rd *bool = flag.Bool("rd", true, "unset RD flag in query") var tcp *bool = flag.Bool("tcp", false, "TCP mode") var nsid *bool = flag.Bool("nsid", false, "ask for NSID") flag.Usage = func() { fmt.Fprintf(os.Stderr, "Usage: %s [@server(:port)] [qtype] [qclass] [name ...]\n", os.Args[0]) flag.PrintDefaults() } // Need to think about it... Config conf, _ := dns.ClientConfigFromFile("/etc/resolv.conf") nameserver := "@" + conf.Servers[0] qtype := uint16(0) qclass := uint16(dns.ClassINET) // Default qclass var qname []string flag.Parse() Flags: for i := 0; i < flag.NArg(); i++ { // If it starts with @ it is a nameserver if flag.Arg(i)[0] == '@' { nameserver = flag.Arg(i) continue Flags } // First class, then type, to make ANY queries possible // And if it looks like type, it is a type for k, v := range dns.Rr_str { if v == strings.ToUpper(flag.Arg(i)) { qtype = k continue Flags } } // If it looks like a class, it is a class for k, v := range dns.Class_str { if v == strings.ToUpper(flag.Arg(i)) { qclass = k continue Flags } } // If it starts with TYPExxx it is unknown rr if strings.HasPrefix(flag.Arg(i), "TYPE") { i, e := strconv.Atoi(string([]byte(flag.Arg(i))[4:])) if e == nil { qtype = uint16(i) continue Flags } } // Anything else is a qname qname = append(qname, flag.Arg(i)) } if len(qname) == 0 { qname = make([]string, 1) qname[0] = "." qtype = dns.TypeNS } if qtype == 0 { qtype = dns.TypeA } nameserver = string([]byte(nameserver)[1:]) // chop off @ if !strings.HasSuffix(nameserver, ":53") { nameserver += ":53" } // ipv6 todo // We use the async query handling, just to show how // it is to be used. dns.HandleQueryFunc(".", q) dns.ListenAndQuery(nil, nil) c := dns.NewClient() if *tcp { c.Net = "tcp" } m := new(dns.Msg) m.MsgHdr.Authoritative = *aa m.MsgHdr.AuthenticatedData = *ad m.MsgHdr.CheckingDisabled = *cd m.MsgHdr.RecursionDesired = *rd m.Question = make([]dns.Question, 1) if *dnssec || *nsid { opt := dns.NewRR(dns.TypeOPT).(*dns.RR_OPT) opt.Hdr.Rrtype = 0 opt.SetDo() opt.SetVersion(0) opt.SetUDPSize(dns.DefaultMsgSize) if *nsid { opt.SetNsid("") } m.Extra = make([]dns.RR, 1) m.Extra[0] = opt } for _, v := range qname { m.Question[0] = dns.Question{v, qtype, qclass} m.Id = dns.Id() if *query { fmt.Printf("%s\n", m.String()) } c.Do(m, nameserver) } i := 0 forever: for { select { case r := <-dns.DefaultReplyChan: if r[1] != nil { if r[0].Id != r[1].Id { fmt.Printf("Id mismatch\n") } if *short { r[1] = shortMsg(r[1]) } fmt.Printf("%v", r[1]) } i++ if i == len(qname) { break forever } } } }