Remove zlutser
This commit is contained in:
parent
99d40351b8
commit
586337bf57
|
@ -5,7 +5,6 @@ all:
|
|||
gomake -C dnssectest
|
||||
gomake -C axfr
|
||||
gomake -C notify
|
||||
gomake -C zlutser
|
||||
|
||||
clean:
|
||||
gomake -C mx clean
|
||||
|
@ -14,4 +13,3 @@ clean:
|
|||
gomake -C dnssectest clean
|
||||
gomake -C axfr clean
|
||||
gomake -C notify clean
|
||||
gomake -C zlutser clean
|
||||
|
|
|
@ -1,8 +0,0 @@
|
|||
# Copyright 2009 The Go Authors. All rights reserved.
|
||||
# Use of this source code is governed by a BSD-style
|
||||
# license that can be found in the LICENSE file.
|
||||
include $(GOROOT)/src/Make.inc
|
||||
TARG=zlutser
|
||||
GOFILES=zlutser.go
|
||||
DEPS=../../
|
||||
include $(GOROOT)/src/Make.cmd
|
|
@ -1,116 +0,0 @@
|
|||
package main
|
||||
|
||||
// Simple prog that "validates" a reply from a
|
||||
// server, but DOES NOT check the chain of trust!
|
||||
|
||||
// lutser is Dutch for prutser and looser combined
|
||||
// so zlutser does that with zones
|
||||
|
||||
import (
|
||||
"net"
|
||||
"dns"
|
||||
"dns/resolver"
|
||||
"os"
|
||||
"flag"
|
||||
"fmt"
|
||||
"strings"
|
||||
)
|
||||
|
||||
func main() {
|
||||
var tcp *bool = flag.Bool("tcp", true, "TCP mode")
|
||||
var port *string = flag.String("port", "53", "Set the query port")
|
||||
var zone *string = flag.String("zone", "", "Zone to ask the DNSKEYs for")
|
||||
|
||||
flag.Usage = func() {
|
||||
fmt.Fprintf(os.Stderr, "Usage: %s -z zone [@server] [qtype] [name ...]\n", os.Args[0])
|
||||
// extend this a little
|
||||
flag.PrintDefaults()
|
||||
}
|
||||
|
||||
nameserver := "@127.0.0.1" // Default nameserver
|
||||
qtype := uint16(dns.TypeA) // Default qtype
|
||||
var qname []string
|
||||
|
||||
flag.Parse()
|
||||
|
||||
if *zone == "" {
|
||||
fmt.Fprintf(os.Stderr, "%s: -zone is mandatory\n", os.Args[0])
|
||||
os.Exit(1)
|
||||
}
|
||||
|
||||
FLAGS:
|
||||
for i := 0; i < flag.NArg(); i++ {
|
||||
// If it starts with @ it is a nameserver
|
||||
if flag.Arg(i)[0] == '@' {
|
||||
nameserver = flag.Arg(i)
|
||||
continue FLAGS
|
||||
}
|
||||
// If it looks like type, it is a type
|
||||
for k, v := range dns.Rr_str {
|
||||
if v == strings.ToUpper(flag.Arg(i)) {
|
||||
qtype = k
|
||||
continue FLAGS
|
||||
}
|
||||
}
|
||||
// Anything else is a qname
|
||||
qname = append(qname, flag.Arg(i))
|
||||
}
|
||||
r := new(resolver.Resolver)
|
||||
r.Timeout = 2
|
||||
r.Port = *port
|
||||
r.Tcp = *tcp
|
||||
r.Attempts = 1
|
||||
|
||||
qr := r.NewQuerier()
|
||||
// @server may be a name, resolv that
|
||||
var err os.Error
|
||||
nameserver = string([]byte(nameserver)[1:]) // chop off @
|
||||
_, addr, err := net.LookupHost(nameserver)
|
||||
if err == nil {
|
||||
r.Servers = addr
|
||||
} else {
|
||||
r.Servers = []string{nameserver}
|
||||
}
|
||||
|
||||
m := new(dns.Msg)
|
||||
// m.MsgHdr.Authoritative = *aa
|
||||
// m.MsgHdr.AuthenticatedData = *ad
|
||||
m.MsgHdr.CheckingDisabled = true
|
||||
m.MsgHdr.RecursionDesired = true
|
||||
m.Question = make([]dns.Question, 1)
|
||||
// set the do bit
|
||||
opt := new(dns.RR_OPT)
|
||||
opt.Hdr = dns.RR_Header{Name: "", Rrtype: dns.TypeOPT}
|
||||
opt.SetVersion(0)
|
||||
opt.SetDo()
|
||||
opt.SetUDPSize(4096)
|
||||
m.Extra = make([]dns.RR, 1)
|
||||
m.Extra[0] = opt
|
||||
|
||||
for _, v := range qname {
|
||||
// Ask the Keys
|
||||
m.Question[0] = dns.Question{*zone, dns.TypeDNSKEY, dns.ClassINET}
|
||||
qr <- resolver.DnsMsg{m, nil}
|
||||
in := <-qr
|
||||
if in.Dns != nil {
|
||||
fmt.Printf("%v\n", in.Dns)
|
||||
}
|
||||
|
||||
m.Question[0] = dns.Question{v, qtype, dns.ClassINET}
|
||||
qr <- resolver.DnsMsg{m, nil}
|
||||
in = <-qr
|
||||
if in.Dns != nil {
|
||||
fmt.Printf("%v\n", in.Dns)
|
||||
}
|
||||
|
||||
// Ask the question
|
||||
// Get the sig(s)
|
||||
|
||||
// Use the key(s)
|
||||
|
||||
// Validate
|
||||
|
||||
}
|
||||
qr <- resolver.DnsMsg{nil, nil}
|
||||
<-qr
|
||||
}
|
|
@ -113,9 +113,9 @@ func query(res *Resolver, msg chan DnsMsg) {
|
|||
continue
|
||||
}
|
||||
if res.Tcp {
|
||||
in, err = exchange_tcp(c, sending, res, true)
|
||||
in, err = exchangeTcp(c, sending, res, true)
|
||||
} else {
|
||||
in, err = exchange_udp(c, sending, res, true)
|
||||
in, err = exchangeUdp(c, sending, res, true)
|
||||
}
|
||||
|
||||
// Check id in.id != out.id, should be checked in the client!
|
||||
|
@ -180,9 +180,9 @@ func axfr(res *Resolver, msg chan DnsMsg) {
|
|||
// Start the AXFR
|
||||
for {
|
||||
if first {
|
||||
in, cerr = exchange_tcp(c, sending, res, true)
|
||||
in, cerr = exchangeTcp(c, sending, res, true)
|
||||
} else {
|
||||
in, cerr = exchange_tcp(c, sending, res, false)
|
||||
in, cerr = exchangeTcp(c, sending, res, false)
|
||||
}
|
||||
|
||||
if cerr != nil {
|
||||
|
@ -229,7 +229,7 @@ func axfr(res *Resolver, msg chan DnsMsg) {
|
|||
|
||||
// Send a request on the connection and hope for a reply.
|
||||
// Up to res.Attempts attempts.
|
||||
func exchange_udp(c net.Conn, m []byte, r *Resolver, send bool) (*dns.Msg, os.Error) {
|
||||
func exchangeUdp(c net.Conn, m []byte, r *Resolver, send bool) (*dns.Msg, os.Error) {
|
||||
var timeout int64
|
||||
var attempts int
|
||||
if r.Mangle != nil {
|
||||
|
@ -277,7 +277,7 @@ func exchange_udp(c net.Conn, m []byte, r *Resolver, send bool) (*dns.Msg, os.Er
|
|||
}
|
||||
|
||||
// Up to res.Attempts attempts.
|
||||
func exchange_tcp(c net.Conn, m []byte, r *Resolver, send bool) (*dns.Msg, os.Error) {
|
||||
func exchangeTcp(c net.Conn, m []byte, r *Resolver, send bool) (*dns.Msg, os.Error) {
|
||||
var timeout int64
|
||||
var attempts, n int
|
||||
if r.Mangle != nil {
|
||||
|
|
Loading…
Reference in New Issue