func handleQueryCHAOS(w dns.ResponseWriter, req *dns.Msg) { m := new(dns.Msg) qname := strings.ToLower(req.Question[0].Name) qtype := req.Question[0].Qtype qclass := req.Question[0].Qclass m.Extra = make([]dns.RR, 1) m.Extra[0] = spamCH if qclass != dns.ClassCHAOS { m.SetRcode(req, dns.RcodeServerFailure) send(w, m) return } if (qname == "version.bind." || qname == "id.server.") && qtype == dns.TypeTXT { m.SetReply(req) m.Answer = make([]dns.RR, 1) m.Answer[0] = &dns.RR_TXT{Hdr: dns.RR_Header{Name: qname, Rrtype: qtype, Class: qclass}, Txt: "NS 0.0.1"} send(w, m) return } if (qname == "authors.bind." || qname == "authors.server.") && qtype == dns.TypeTXT { m.SetReply(req) m.Answer = make([]dns.RR, 1) m.Answer[0] = &dns.RR_TXT{Hdr: dns.RR_Header{Name: qname, Rrtype: qtype, Class: qclass}, Txt: "Miek Gieben"} send(w, m) return } m.SetRcode(req, dns.RcodeServerFailure) send(w, m) return }
func handleQuery(w dns.ResponseWriter, req *dns.Msg) { var dnssec bool m := new(dns.Msg) if req.Question[0].Qclass != dns.ClassINET { m.SetRcode(req, dns.RcodeServerFailure) send(w, m) return } m.SetReply(req) m.Ns = ns m.Extra = make([]dns.RR, 1) m.Extra[0] = spamIN // Check DNSSEC OK for _, v := range req.Extra { if o, ok := v.(*dns.RR_OPT); ok { if dnssec = o.Do(); dnssec { m.Extra = append(m.Extra, o) m.Ns = nsDNSSEC break } } } //m.Answer = make([]dns.RR, 0) s, _ := zone.LookupQuestion(req.Question[0]) if s == nil { // Authority section should only contain the SOA record for NXDOMAIN m.Ns = m.Ns[:1] m.Ns[0] = soa m.MsgHdr.Rcode = dns.RcodeNameError send(w, m) // Lookup the previous name in the Nxt list for this zone // and insert the nsec/nsec3 from that. Also give the nsec // that proofs there is no wildcard return } // TODO CNAME //cname: switch req.Question[0].Qtype { case dns.TypeRRSIG: m.Answer = s.RRsigs case dns.TypeNSEC, dns.TypeNSEC3: m.Answer = []dns.RR{s.Nxt} default: m.Answer = s.RRs } if dnssec && req.Question[0].Qtype != dns.TypeRRSIG && len(s.RRsigs) > 0 { for _, r := range s.RRsigs { m.Answer = append(m.Answer, r) } } if *debug { println(m.Question[0].String()) } send(w, m) }
func handleReflect(w dns.ResponseWriter, r *dns.Msg) { var ( v4 bool rr dns.RR str string a net.IP ) m := new(dns.Msg) m.SetReply(r) if ip, ok := w.RemoteAddr().(*net.UDPAddr); ok { str = "Port: " + strconv.Itoa(ip.Port) + " (udp)" a = ip.IP v4 = a.To4() != nil } if ip, ok := w.RemoteAddr().(*net.TCPAddr); ok { str = "Port: " + strconv.Itoa(ip.Port) + " (tcp)" a = ip.IP v4 = a.To4() != nil } if v4 { rr = new(dns.RR_A) rr.(*dns.RR_A).Hdr = dns.RR_Header{Name: dom, Rrtype: dns.TypeA, Class: dns.ClassINET, Ttl: 0} rr.(*dns.RR_A).A = a.To4() } else { rr = new(dns.RR_AAAA) rr.(*dns.RR_AAAA).Hdr = dns.RR_Header{Name: dom, Rrtype: dns.TypeAAAA, Class: dns.ClassINET, Ttl: 0} rr.(*dns.RR_AAAA).AAAA = a } t := new(dns.RR_TXT) t.Hdr = dns.RR_Header{Name: dom, Rrtype: dns.TypeTXT, Class: dns.ClassINET, Ttl: 0} t.Txt = str switch r.Question[0].Qtype { case dns.TypeTXT: m.Answer = append(m.Answer, t) m.Extra = append(m.Extra, rr) default: fallthrough case dns.TypeAAAA, dns.TypeA: m.Answer = append(m.Answer, rr) m.Extra = append(m.Extra, t) } /* nsec3 := new(dns.RR_NSEC3) nsec3.Hdr = dns.RR_Header{Name: dom, Rrtype: dns.TypeNSEC3, Class: dns.ClassINET, Ttl: 0} nsec3.Hash = dns.SHA1 nsec3.Flags = 0 nsec3.Iterations = 1 nsec3.Salt = "AABB" nsec3.SaltLength = uint8(len(nsec3.Salt)/2) nsec3.NextDomain = "miek.nl." nsec3.TypeBitMap = []uint16{dns.TypeA, dns.TypeNS, dns.TypeSOA, dns.TypeTXT, dns.TypeRRSIG, 4000, 4001, 5949} nsec3.HashNames("miek.nl.") m.Extra = append(m.Extra, nsec3) */ b, ok := m.Pack() if *printf { fmt.Printf("%v\n", m.String()) } if !ok { log.Print("Packing failed") m.SetRcode(r, dns.RcodeServerFailure) m.Extra = nil m.Answer = nil b, _ = m.Pack() } w.Write(b) }