mirror of https://github.com/sgoudham/Enso-Bot.git
You cannot select more than 25 topics
Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.
1176 lines
40 KiB
Python
1176 lines
40 KiB
Python
# Copyright (C) Dnspython Contributors, see LICENSE for text of ISC license
|
|
|
|
# Copyright (C) 2001-2017 Nominum, Inc.
|
|
#
|
|
# Permission to use, copy, modify, and distribute this software and its
|
|
# documentation for any purpose with or without fee is hereby granted,
|
|
# provided that the above copyright notice and this permission notice
|
|
# appear in all copies.
|
|
#
|
|
# THE SOFTWARE IS PROVIDED "AS IS" AND NOMINUM DISCLAIMS ALL WARRANTIES
|
|
# WITH REGARD TO THIS SOFTWARE INCLUDING ALL IMPLIED WARRANTIES OF
|
|
# MERCHANTABILITY AND FITNESS. IN NO EVENT SHALL NOMINUM BE LIABLE FOR
|
|
# ANY SPECIAL, DIRECT, INDIRECT, OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES
|
|
# WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR PROFITS, WHETHER IN AN
|
|
# ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT
|
|
# OF OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE.
|
|
|
|
"""DNS Messages"""
|
|
|
|
from __future__ import absolute_import
|
|
|
|
from io import StringIO
|
|
import struct
|
|
import time
|
|
|
|
import dns.edns
|
|
import dns.exception
|
|
import dns.flags
|
|
import dns.name
|
|
import dns.opcode
|
|
import dns.entropy
|
|
import dns.rcode
|
|
import dns.rdata
|
|
import dns.rdataclass
|
|
import dns.rdatatype
|
|
import dns.rrset
|
|
import dns.renderer
|
|
import dns.tsig
|
|
import dns.wiredata
|
|
|
|
from ._compat import long, xrange, string_types
|
|
|
|
|
|
class ShortHeader(dns.exception.FormError):
|
|
"""The DNS packet passed to from_wire() is too short."""
|
|
|
|
|
|
class TrailingJunk(dns.exception.FormError):
|
|
"""The DNS packet passed to from_wire() has extra junk at the end of it."""
|
|
|
|
|
|
class UnknownHeaderField(dns.exception.DNSException):
|
|
"""The header field name was not recognized when converting from text
|
|
into a message."""
|
|
|
|
|
|
class BadEDNS(dns.exception.FormError):
|
|
"""An OPT record occurred somewhere other than the start of
|
|
the additional data section."""
|
|
|
|
|
|
class BadTSIG(dns.exception.FormError):
|
|
"""A TSIG record occurred somewhere other than the end of
|
|
the additional data section."""
|
|
|
|
|
|
class UnknownTSIGKey(dns.exception.DNSException):
|
|
"""A TSIG with an unknown key was received."""
|
|
|
|
|
|
#: The question section number
|
|
QUESTION = 0
|
|
|
|
#: The answer section number
|
|
ANSWER = 1
|
|
|
|
#: The authority section number
|
|
AUTHORITY = 2
|
|
|
|
#: The additional section number
|
|
ADDITIONAL = 3
|
|
|
|
class Message(object):
|
|
"""A DNS message."""
|
|
|
|
def __init__(self, id=None):
|
|
if id is None:
|
|
self.id = dns.entropy.random_16()
|
|
else:
|
|
self.id = id
|
|
self.flags = 0
|
|
self.question = []
|
|
self.answer = []
|
|
self.authority = []
|
|
self.additional = []
|
|
self.edns = -1
|
|
self.ednsflags = 0
|
|
self.payload = 0
|
|
self.options = []
|
|
self.request_payload = 0
|
|
self.keyring = None
|
|
self.keyname = None
|
|
self.keyalgorithm = dns.tsig.default_algorithm
|
|
self.request_mac = b''
|
|
self.other_data = b''
|
|
self.tsig_error = 0
|
|
self.fudge = 300
|
|
self.original_id = self.id
|
|
self.mac = b''
|
|
self.xfr = False
|
|
self.origin = None
|
|
self.tsig_ctx = None
|
|
self.had_tsig = False
|
|
self.multi = False
|
|
self.first = True
|
|
self.index = {}
|
|
|
|
def __repr__(self):
|
|
return '<DNS message, ID ' + repr(self.id) + '>'
|
|
|
|
def __str__(self):
|
|
return self.to_text()
|
|
|
|
def to_text(self, origin=None, relativize=True, **kw):
|
|
"""Convert the message to text.
|
|
|
|
The *origin*, *relativize*, and any other keyword
|
|
arguments are passed to the RRset ``to_wire()`` method.
|
|
|
|
Returns a ``text``.
|
|
"""
|
|
|
|
s = StringIO()
|
|
s.write(u'id %d\n' % self.id)
|
|
s.write(u'opcode %s\n' %
|
|
dns.opcode.to_text(dns.opcode.from_flags(self.flags)))
|
|
rc = dns.rcode.from_flags(self.flags, self.ednsflags)
|
|
s.write(u'rcode %s\n' % dns.rcode.to_text(rc))
|
|
s.write(u'flags %s\n' % dns.flags.to_text(self.flags))
|
|
if self.edns >= 0:
|
|
s.write(u'edns %s\n' % self.edns)
|
|
if self.ednsflags != 0:
|
|
s.write(u'eflags %s\n' %
|
|
dns.flags.edns_to_text(self.ednsflags))
|
|
s.write(u'payload %d\n' % self.payload)
|
|
for opt in self.options:
|
|
s.write(u'option %s\n' % opt.to_text())
|
|
is_update = dns.opcode.is_update(self.flags)
|
|
if is_update:
|
|
s.write(u';ZONE\n')
|
|
else:
|
|
s.write(u';QUESTION\n')
|
|
for rrset in self.question:
|
|
s.write(rrset.to_text(origin, relativize, **kw))
|
|
s.write(u'\n')
|
|
if is_update:
|
|
s.write(u';PREREQ\n')
|
|
else:
|
|
s.write(u';ANSWER\n')
|
|
for rrset in self.answer:
|
|
s.write(rrset.to_text(origin, relativize, **kw))
|
|
s.write(u'\n')
|
|
if is_update:
|
|
s.write(u';UPDATE\n')
|
|
else:
|
|
s.write(u';AUTHORITY\n')
|
|
for rrset in self.authority:
|
|
s.write(rrset.to_text(origin, relativize, **kw))
|
|
s.write(u'\n')
|
|
s.write(u';ADDITIONAL\n')
|
|
for rrset in self.additional:
|
|
s.write(rrset.to_text(origin, relativize, **kw))
|
|
s.write(u'\n')
|
|
#
|
|
# We strip off the final \n so the caller can print the result without
|
|
# doing weird things to get around eccentricities in Python print
|
|
# formatting
|
|
#
|
|
return s.getvalue()[:-1]
|
|
|
|
def __eq__(self, other):
|
|
"""Two messages are equal if they have the same content in the
|
|
header, question, answer, and authority sections.
|
|
|
|
Returns a ``bool``.
|
|
"""
|
|
|
|
if not isinstance(other, Message):
|
|
return False
|
|
if self.id != other.id:
|
|
return False
|
|
if self.flags != other.flags:
|
|
return False
|
|
for n in self.question:
|
|
if n not in other.question:
|
|
return False
|
|
for n in other.question:
|
|
if n not in self.question:
|
|
return False
|
|
for n in self.answer:
|
|
if n not in other.answer:
|
|
return False
|
|
for n in other.answer:
|
|
if n not in self.answer:
|
|
return False
|
|
for n in self.authority:
|
|
if n not in other.authority:
|
|
return False
|
|
for n in other.authority:
|
|
if n not in self.authority:
|
|
return False
|
|
return True
|
|
|
|
def __ne__(self, other):
|
|
return not self.__eq__(other)
|
|
|
|
def is_response(self, other):
|
|
"""Is this message a response to *other*?
|
|
|
|
Returns a ``bool``.
|
|
"""
|
|
|
|
if other.flags & dns.flags.QR == 0 or \
|
|
self.id != other.id or \
|
|
dns.opcode.from_flags(self.flags) != \
|
|
dns.opcode.from_flags(other.flags):
|
|
return False
|
|
if dns.rcode.from_flags(other.flags, other.ednsflags) != \
|
|
dns.rcode.NOERROR:
|
|
return True
|
|
if dns.opcode.is_update(self.flags):
|
|
return True
|
|
for n in self.question:
|
|
if n not in other.question:
|
|
return False
|
|
for n in other.question:
|
|
if n not in self.question:
|
|
return False
|
|
return True
|
|
|
|
def section_number(self, section):
|
|
"""Return the "section number" of the specified section for use
|
|
in indexing. The question section is 0, the answer section is 1,
|
|
the authority section is 2, and the additional section is 3.
|
|
|
|
*section* is one of the section attributes of this message.
|
|
|
|
Raises ``ValueError`` if the section isn't known.
|
|
|
|
Returns an ``int``.
|
|
"""
|
|
|
|
if section is self.question:
|
|
return QUESTION
|
|
elif section is self.answer:
|
|
return ANSWER
|
|
elif section is self.authority:
|
|
return AUTHORITY
|
|
elif section is self.additional:
|
|
return ADDITIONAL
|
|
else:
|
|
raise ValueError('unknown section')
|
|
|
|
def section_from_number(self, number):
|
|
"""Return the "section number" of the specified section for use
|
|
in indexing. The question section is 0, the answer section is 1,
|
|
the authority section is 2, and the additional section is 3.
|
|
|
|
*section* is one of the section attributes of this message.
|
|
|
|
Raises ``ValueError`` if the section isn't known.
|
|
|
|
Returns an ``int``.
|
|
"""
|
|
|
|
if number == QUESTION:
|
|
return self.question
|
|
elif number == ANSWER:
|
|
return self.answer
|
|
elif number == AUTHORITY:
|
|
return self.authority
|
|
elif number == ADDITIONAL:
|
|
return self.additional
|
|
else:
|
|
raise ValueError('unknown section')
|
|
|
|
def find_rrset(self, section, name, rdclass, rdtype,
|
|
covers=dns.rdatatype.NONE, deleting=None, create=False,
|
|
force_unique=False):
|
|
"""Find the RRset with the given attributes in the specified section.
|
|
|
|
*section*, an ``int`` section number, or one of the section
|
|
attributes of this message. This specifies the
|
|
the section of the message to search. For example::
|
|
|
|
my_message.find_rrset(my_message.answer, name, rdclass, rdtype)
|
|
my_message.find_rrset(dns.message.ANSWER, name, rdclass, rdtype)
|
|
|
|
*name*, a ``dns.name.Name``, the name of the RRset.
|
|
|
|
*rdclass*, an ``int``, the class of the RRset.
|
|
|
|
*rdtype*, an ``int``, the type of the RRset.
|
|
|
|
*covers*, an ``int`` or ``None``, the covers value of the RRset.
|
|
The default is ``None``.
|
|
|
|
*deleting*, an ``int`` or ``None``, the deleting value of the RRset.
|
|
The default is ``None``.
|
|
|
|
*create*, a ``bool``. If ``True``, create the RRset if it is not found.
|
|
The created RRset is appended to *section*.
|
|
|
|
*force_unique*, a ``bool``. If ``True`` and *create* is also ``True``,
|
|
create a new RRset regardless of whether a matching RRset exists
|
|
already. The default is ``False``. This is useful when creating
|
|
DDNS Update messages, as order matters for them.
|
|
|
|
Raises ``KeyError`` if the RRset was not found and create was
|
|
``False``.
|
|
|
|
Returns a ``dns.rrset.RRset object``.
|
|
"""
|
|
|
|
if isinstance(section, int):
|
|
section_number = section
|
|
section = self.section_from_number(section_number)
|
|
else:
|
|
section_number = self.section_number(section)
|
|
key = (section_number, name, rdclass, rdtype, covers, deleting)
|
|
if not force_unique:
|
|
if self.index is not None:
|
|
rrset = self.index.get(key)
|
|
if rrset is not None:
|
|
return rrset
|
|
else:
|
|
for rrset in section:
|
|
if rrset.match(name, rdclass, rdtype, covers, deleting):
|
|
return rrset
|
|
if not create:
|
|
raise KeyError
|
|
rrset = dns.rrset.RRset(name, rdclass, rdtype, covers, deleting)
|
|
section.append(rrset)
|
|
if self.index is not None:
|
|
self.index[key] = rrset
|
|
return rrset
|
|
|
|
def get_rrset(self, section, name, rdclass, rdtype,
|
|
covers=dns.rdatatype.NONE, deleting=None, create=False,
|
|
force_unique=False):
|
|
"""Get the RRset with the given attributes in the specified section.
|
|
|
|
If the RRset is not found, None is returned.
|
|
|
|
*section*, an ``int`` section number, or one of the section
|
|
attributes of this message. This specifies the
|
|
the section of the message to search. For example::
|
|
|
|
my_message.get_rrset(my_message.answer, name, rdclass, rdtype)
|
|
my_message.get_rrset(dns.message.ANSWER, name, rdclass, rdtype)
|
|
|
|
*name*, a ``dns.name.Name``, the name of the RRset.
|
|
|
|
*rdclass*, an ``int``, the class of the RRset.
|
|
|
|
*rdtype*, an ``int``, the type of the RRset.
|
|
|
|
*covers*, an ``int`` or ``None``, the covers value of the RRset.
|
|
The default is ``None``.
|
|
|
|
*deleting*, an ``int`` or ``None``, the deleting value of the RRset.
|
|
The default is ``None``.
|
|
|
|
*create*, a ``bool``. If ``True``, create the RRset if it is not found.
|
|
The created RRset is appended to *section*.
|
|
|
|
*force_unique*, a ``bool``. If ``True`` and *create* is also ``True``,
|
|
create a new RRset regardless of whether a matching RRset exists
|
|
already. The default is ``False``. This is useful when creating
|
|
DDNS Update messages, as order matters for them.
|
|
|
|
Returns a ``dns.rrset.RRset object`` or ``None``.
|
|
"""
|
|
|
|
try:
|
|
rrset = self.find_rrset(section, name, rdclass, rdtype, covers,
|
|
deleting, create, force_unique)
|
|
except KeyError:
|
|
rrset = None
|
|
return rrset
|
|
|
|
def to_wire(self, origin=None, max_size=0, **kw):
|
|
"""Return a string containing the message in DNS compressed wire
|
|
format.
|
|
|
|
Additional keyword arguments are passed to the RRset ``to_wire()``
|
|
method.
|
|
|
|
*origin*, a ``dns.name.Name`` or ``None``, the origin to be appended
|
|
to any relative names.
|
|
|
|
*max_size*, an ``int``, the maximum size of the wire format
|
|
output; default is 0, which means "the message's request
|
|
payload, if nonzero, or 65535".
|
|
|
|
Raises ``dns.exception.TooBig`` if *max_size* was exceeded.
|
|
|
|
Returns a ``binary``.
|
|
"""
|
|
|
|
if max_size == 0:
|
|
if self.request_payload != 0:
|
|
max_size = self.request_payload
|
|
else:
|
|
max_size = 65535
|
|
if max_size < 512:
|
|
max_size = 512
|
|
elif max_size > 65535:
|
|
max_size = 65535
|
|
r = dns.renderer.Renderer(self.id, self.flags, max_size, origin)
|
|
for rrset in self.question:
|
|
r.add_question(rrset.name, rrset.rdtype, rrset.rdclass)
|
|
for rrset in self.answer:
|
|
r.add_rrset(dns.renderer.ANSWER, rrset, **kw)
|
|
for rrset in self.authority:
|
|
r.add_rrset(dns.renderer.AUTHORITY, rrset, **kw)
|
|
if self.edns >= 0:
|
|
r.add_edns(self.edns, self.ednsflags, self.payload, self.options)
|
|
for rrset in self.additional:
|
|
r.add_rrset(dns.renderer.ADDITIONAL, rrset, **kw)
|
|
r.write_header()
|
|
if self.keyname is not None:
|
|
r.add_tsig(self.keyname, self.keyring[self.keyname],
|
|
self.fudge, self.original_id, self.tsig_error,
|
|
self.other_data, self.request_mac,
|
|
self.keyalgorithm)
|
|
self.mac = r.mac
|
|
return r.get_wire()
|
|
|
|
def use_tsig(self, keyring, keyname=None, fudge=300,
|
|
original_id=None, tsig_error=0, other_data=b'',
|
|
algorithm=dns.tsig.default_algorithm):
|
|
"""When sending, a TSIG signature using the specified keyring
|
|
and keyname should be added.
|
|
|
|
See the documentation of the Message class for a complete
|
|
description of the keyring dictionary.
|
|
|
|
*keyring*, a ``dict``, the TSIG keyring to use. If a
|
|
*keyring* is specified but a *keyname* is not, then the key
|
|
used will be the first key in the *keyring*. Note that the
|
|
order of keys in a dictionary is not defined, so applications
|
|
should supply a keyname when a keyring is used, unless they
|
|
know the keyring contains only one key.
|
|
|
|
*keyname*, a ``dns.name.Name`` or ``None``, the name of the TSIG key
|
|
to use; defaults to ``None``. The key must be defined in the keyring.
|
|
|
|
*fudge*, an ``int``, the TSIG time fudge.
|
|
|
|
*original_id*, an ``int``, the TSIG original id. If ``None``,
|
|
the message's id is used.
|
|
|
|
*tsig_error*, an ``int``, the TSIG error code.
|
|
|
|
*other_data*, a ``binary``, the TSIG other data.
|
|
|
|
*algorithm*, a ``dns.name.Name``, the TSIG algorithm to use.
|
|
"""
|
|
|
|
self.keyring = keyring
|
|
if keyname is None:
|
|
self.keyname = list(self.keyring.keys())[0]
|
|
else:
|
|
if isinstance(keyname, string_types):
|
|
keyname = dns.name.from_text(keyname)
|
|
self.keyname = keyname
|
|
self.keyalgorithm = algorithm
|
|
self.fudge = fudge
|
|
if original_id is None:
|
|
self.original_id = self.id
|
|
else:
|
|
self.original_id = original_id
|
|
self.tsig_error = tsig_error
|
|
self.other_data = other_data
|
|
|
|
def use_edns(self, edns=0, ednsflags=0, payload=1280, request_payload=None,
|
|
options=None):
|
|
"""Configure EDNS behavior.
|
|
|
|
*edns*, an ``int``, is the EDNS level to use. Specifying
|
|
``None``, ``False``, or ``-1`` means "do not use EDNS", and in this case
|
|
the other parameters are ignored. Specifying ``True`` is
|
|
equivalent to specifying 0, i.e. "use EDNS0".
|
|
|
|
*ednsflags*, an ``int``, the EDNS flag values.
|
|
|
|
*payload*, an ``int``, is the EDNS sender's payload field, which is the
|
|
maximum size of UDP datagram the sender can handle. I.e. how big
|
|
a response to this message can be.
|
|
|
|
*request_payload*, an ``int``, is the EDNS payload size to use when
|
|
sending this message. If not specified, defaults to the value of
|
|
*payload*.
|
|
|
|
*options*, a list of ``dns.edns.Option`` objects or ``None``, the EDNS
|
|
options.
|
|
"""
|
|
|
|
if edns is None or edns is False:
|
|
edns = -1
|
|
if edns is True:
|
|
edns = 0
|
|
if request_payload is None:
|
|
request_payload = payload
|
|
if edns < 0:
|
|
ednsflags = 0
|
|
payload = 0
|
|
request_payload = 0
|
|
options = []
|
|
else:
|
|
# make sure the EDNS version in ednsflags agrees with edns
|
|
ednsflags &= long(0xFF00FFFF)
|
|
ednsflags |= (edns << 16)
|
|
if options is None:
|
|
options = []
|
|
self.edns = edns
|
|
self.ednsflags = ednsflags
|
|
self.payload = payload
|
|
self.options = options
|
|
self.request_payload = request_payload
|
|
|
|
def want_dnssec(self, wanted=True):
|
|
"""Enable or disable 'DNSSEC desired' flag in requests.
|
|
|
|
*wanted*, a ``bool``. If ``True``, then DNSSEC data is
|
|
desired in the response, EDNS is enabled if required, and then
|
|
the DO bit is set. If ``False``, the DO bit is cleared if
|
|
EDNS is enabled.
|
|
"""
|
|
|
|
if wanted:
|
|
if self.edns < 0:
|
|
self.use_edns()
|
|
self.ednsflags |= dns.flags.DO
|
|
elif self.edns >= 0:
|
|
self.ednsflags &= ~dns.flags.DO
|
|
|
|
def rcode(self):
|
|
"""Return the rcode.
|
|
|
|
Returns an ``int``.
|
|
"""
|
|
return dns.rcode.from_flags(self.flags, self.ednsflags)
|
|
|
|
def set_rcode(self, rcode):
|
|
"""Set the rcode.
|
|
|
|
*rcode*, an ``int``, is the rcode to set.
|
|
"""
|
|
(value, evalue) = dns.rcode.to_flags(rcode)
|
|
self.flags &= 0xFFF0
|
|
self.flags |= value
|
|
self.ednsflags &= long(0x00FFFFFF)
|
|
self.ednsflags |= evalue
|
|
if self.ednsflags != 0 and self.edns < 0:
|
|
self.edns = 0
|
|
|
|
def opcode(self):
|
|
"""Return the opcode.
|
|
|
|
Returns an ``int``.
|
|
"""
|
|
return dns.opcode.from_flags(self.flags)
|
|
|
|
def set_opcode(self, opcode):
|
|
"""Set the opcode.
|
|
|
|
*opcode*, an ``int``, is the opcode to set.
|
|
"""
|
|
self.flags &= 0x87FF
|
|
self.flags |= dns.opcode.to_flags(opcode)
|
|
|
|
|
|
class _WireReader(object):
|
|
|
|
"""Wire format reader.
|
|
|
|
wire: a binary, is the wire-format message.
|
|
message: The message object being built
|
|
current: When building a message object from wire format, this
|
|
variable contains the offset from the beginning of wire of the next octet
|
|
to be read.
|
|
updating: Is the message a dynamic update?
|
|
one_rr_per_rrset: Put each RR into its own RRset?
|
|
ignore_trailing: Ignore trailing junk at end of request?
|
|
zone_rdclass: The class of the zone in messages which are
|
|
DNS dynamic updates.
|
|
"""
|
|
|
|
def __init__(self, wire, message, question_only=False,
|
|
one_rr_per_rrset=False, ignore_trailing=False):
|
|
self.wire = dns.wiredata.maybe_wrap(wire)
|
|
self.message = message
|
|
self.current = 0
|
|
self.updating = False
|
|
self.zone_rdclass = dns.rdataclass.IN
|
|
self.question_only = question_only
|
|
self.one_rr_per_rrset = one_rr_per_rrset
|
|
self.ignore_trailing = ignore_trailing
|
|
|
|
def _get_question(self, qcount):
|
|
"""Read the next *qcount* records from the wire data and add them to
|
|
the question section.
|
|
"""
|
|
|
|
if self.updating and qcount > 1:
|
|
raise dns.exception.FormError
|
|
|
|
for i in xrange(0, qcount):
|
|
(qname, used) = dns.name.from_wire(self.wire, self.current)
|
|
if self.message.origin is not None:
|
|
qname = qname.relativize(self.message.origin)
|
|
self.current = self.current + used
|
|
(rdtype, rdclass) = \
|
|
struct.unpack('!HH',
|
|
self.wire[self.current:self.current + 4])
|
|
self.current = self.current + 4
|
|
self.message.find_rrset(self.message.question, qname,
|
|
rdclass, rdtype, create=True,
|
|
force_unique=True)
|
|
if self.updating:
|
|
self.zone_rdclass = rdclass
|
|
|
|
def _get_section(self, section, count):
|
|
"""Read the next I{count} records from the wire data and add them to
|
|
the specified section.
|
|
|
|
section: the section of the message to which to add records
|
|
count: the number of records to read
|
|
"""
|
|
|
|
if self.updating or self.one_rr_per_rrset:
|
|
force_unique = True
|
|
else:
|
|
force_unique = False
|
|
seen_opt = False
|
|
for i in xrange(0, count):
|
|
rr_start = self.current
|
|
(name, used) = dns.name.from_wire(self.wire, self.current)
|
|
absolute_name = name
|
|
if self.message.origin is not None:
|
|
name = name.relativize(self.message.origin)
|
|
self.current = self.current + used
|
|
(rdtype, rdclass, ttl, rdlen) = \
|
|
struct.unpack('!HHIH',
|
|
self.wire[self.current:self.current + 10])
|
|
self.current = self.current + 10
|
|
if rdtype == dns.rdatatype.OPT:
|
|
if section is not self.message.additional or seen_opt:
|
|
raise BadEDNS
|
|
self.message.payload = rdclass
|
|
self.message.ednsflags = ttl
|
|
self.message.edns = (ttl & 0xff0000) >> 16
|
|
self.message.options = []
|
|
current = self.current
|
|
optslen = rdlen
|
|
while optslen > 0:
|
|
(otype, olen) = \
|
|
struct.unpack('!HH',
|
|
self.wire[current:current + 4])
|
|
current = current + 4
|
|
opt = dns.edns.option_from_wire(
|
|
otype, self.wire, current, olen)
|
|
self.message.options.append(opt)
|
|
current = current + olen
|
|
optslen = optslen - 4 - olen
|
|
seen_opt = True
|
|
elif rdtype == dns.rdatatype.TSIG:
|
|
if not (section is self.message.additional and
|
|
i == (count - 1)):
|
|
raise BadTSIG
|
|
if self.message.keyring is None:
|
|
raise UnknownTSIGKey('got signed message without keyring')
|
|
secret = self.message.keyring.get(absolute_name)
|
|
if secret is None:
|
|
raise UnknownTSIGKey("key '%s' unknown" % name)
|
|
self.message.keyname = absolute_name
|
|
(self.message.keyalgorithm, self.message.mac) = \
|
|
dns.tsig.get_algorithm_and_mac(self.wire, self.current,
|
|
rdlen)
|
|
self.message.tsig_ctx = \
|
|
dns.tsig.validate(self.wire,
|
|
absolute_name,
|
|
secret,
|
|
int(time.time()),
|
|
self.message.request_mac,
|
|
rr_start,
|
|
self.current,
|
|
rdlen,
|
|
self.message.tsig_ctx,
|
|
self.message.multi,
|
|
self.message.first)
|
|
self.message.had_tsig = True
|
|
else:
|
|
if ttl < 0:
|
|
ttl = 0
|
|
if self.updating and \
|
|
(rdclass == dns.rdataclass.ANY or
|
|
rdclass == dns.rdataclass.NONE):
|
|
deleting = rdclass
|
|
rdclass = self.zone_rdclass
|
|
else:
|
|
deleting = None
|
|
if deleting == dns.rdataclass.ANY or \
|
|
(deleting == dns.rdataclass.NONE and
|
|
section is self.message.answer):
|
|
covers = dns.rdatatype.NONE
|
|
rd = None
|
|
else:
|
|
rd = dns.rdata.from_wire(rdclass, rdtype, self.wire,
|
|
self.current, rdlen,
|
|
self.message.origin)
|
|
covers = rd.covers()
|
|
if self.message.xfr and rdtype == dns.rdatatype.SOA:
|
|
force_unique = True
|
|
rrset = self.message.find_rrset(section, name,
|
|
rdclass, rdtype, covers,
|
|
deleting, True, force_unique)
|
|
if rd is not None:
|
|
rrset.add(rd, ttl)
|
|
self.current = self.current + rdlen
|
|
|
|
def read(self):
|
|
"""Read a wire format DNS message and build a dns.message.Message
|
|
object."""
|
|
|
|
l = len(self.wire)
|
|
if l < 12:
|
|
raise ShortHeader
|
|
(self.message.id, self.message.flags, qcount, ancount,
|
|
aucount, adcount) = struct.unpack('!HHHHHH', self.wire[:12])
|
|
self.current = 12
|
|
if dns.opcode.is_update(self.message.flags):
|
|
self.updating = True
|
|
self._get_question(qcount)
|
|
if self.question_only:
|
|
return
|
|
self._get_section(self.message.answer, ancount)
|
|
self._get_section(self.message.authority, aucount)
|
|
self._get_section(self.message.additional, adcount)
|
|
if not self.ignore_trailing and self.current != l:
|
|
raise TrailingJunk
|
|
if self.message.multi and self.message.tsig_ctx and \
|
|
not self.message.had_tsig:
|
|
self.message.tsig_ctx.update(self.wire)
|
|
|
|
|
|
def from_wire(wire, keyring=None, request_mac=b'', xfr=False, origin=None,
|
|
tsig_ctx=None, multi=False, first=True,
|
|
question_only=False, one_rr_per_rrset=False,
|
|
ignore_trailing=False):
|
|
"""Convert a DNS wire format message into a message
|
|
object.
|
|
|
|
*keyring*, a ``dict``, the keyring to use if the message is signed.
|
|
|
|
*request_mac*, a ``binary``. If the message is a response to a
|
|
TSIG-signed request, *request_mac* should be set to the MAC of
|
|
that request.
|
|
|
|
*xfr*, a ``bool``, should be set to ``True`` if this message is part of
|
|
a zone transfer.
|
|
|
|
*origin*, a ``dns.name.Name`` or ``None``. If the message is part
|
|
of a zone transfer, *origin* should be the origin name of the
|
|
zone.
|
|
|
|
*tsig_ctx*, a ``hmac.HMAC`` objext, the ongoing TSIG context, used
|
|
when validating zone transfers.
|
|
|
|
*multi*, a ``bool``, should be set to ``True`` if this message
|
|
part of a multiple message sequence.
|
|
|
|
*first*, a ``bool``, should be set to ``True`` if this message is
|
|
stand-alone, or the first message in a multi-message sequence.
|
|
|
|
*question_only*, a ``bool``. If ``True``, read only up to
|
|
the end of the question section.
|
|
|
|
*one_rr_per_rrset*, a ``bool``. If ``True``, put each RR into its
|
|
own RRset.
|
|
|
|
*ignore_trailing*, a ``bool``. If ``True``, ignore trailing
|
|
junk at end of the message.
|
|
|
|
Raises ``dns.message.ShortHeader`` if the message is less than 12 octets
|
|
long.
|
|
|
|
Raises ``dns.messaage.TrailingJunk`` if there were octets in the message
|
|
past the end of the proper DNS message, and *ignore_trailing* is ``False``.
|
|
|
|
Raises ``dns.message.BadEDNS`` if an OPT record was in the
|
|
wrong section, or occurred more than once.
|
|
|
|
Raises ``dns.message.BadTSIG`` if a TSIG record was not the last
|
|
record of the additional data section.
|
|
|
|
Returns a ``dns.message.Message``.
|
|
"""
|
|
|
|
m = Message(id=0)
|
|
m.keyring = keyring
|
|
m.request_mac = request_mac
|
|
m.xfr = xfr
|
|
m.origin = origin
|
|
m.tsig_ctx = tsig_ctx
|
|
m.multi = multi
|
|
m.first = first
|
|
|
|
reader = _WireReader(wire, m, question_only, one_rr_per_rrset,
|
|
ignore_trailing)
|
|
reader.read()
|
|
|
|
return m
|
|
|
|
|
|
class _TextReader(object):
|
|
|
|
"""Text format reader.
|
|
|
|
tok: the tokenizer.
|
|
message: The message object being built.
|
|
updating: Is the message a dynamic update?
|
|
zone_rdclass: The class of the zone in messages which are
|
|
DNS dynamic updates.
|
|
last_name: The most recently read name when building a message object.
|
|
"""
|
|
|
|
def __init__(self, text, message):
|
|
self.message = message
|
|
self.tok = dns.tokenizer.Tokenizer(text)
|
|
self.last_name = None
|
|
self.zone_rdclass = dns.rdataclass.IN
|
|
self.updating = False
|
|
|
|
def _header_line(self, section):
|
|
"""Process one line from the text format header section."""
|
|
|
|
token = self.tok.get()
|
|
what = token.value
|
|
if what == 'id':
|
|
self.message.id = self.tok.get_int()
|
|
elif what == 'flags':
|
|
while True:
|
|
token = self.tok.get()
|
|
if not token.is_identifier():
|
|
self.tok.unget(token)
|
|
break
|
|
self.message.flags = self.message.flags | \
|
|
dns.flags.from_text(token.value)
|
|
if dns.opcode.is_update(self.message.flags):
|
|
self.updating = True
|
|
elif what == 'edns':
|
|
self.message.edns = self.tok.get_int()
|
|
self.message.ednsflags = self.message.ednsflags | \
|
|
(self.message.edns << 16)
|
|
elif what == 'eflags':
|
|
if self.message.edns < 0:
|
|
self.message.edns = 0
|
|
while True:
|
|
token = self.tok.get()
|
|
if not token.is_identifier():
|
|
self.tok.unget(token)
|
|
break
|
|
self.message.ednsflags = self.message.ednsflags | \
|
|
dns.flags.edns_from_text(token.value)
|
|
elif what == 'payload':
|
|
self.message.payload = self.tok.get_int()
|
|
if self.message.edns < 0:
|
|
self.message.edns = 0
|
|
elif what == 'opcode':
|
|
text = self.tok.get_string()
|
|
self.message.flags = self.message.flags | \
|
|
dns.opcode.to_flags(dns.opcode.from_text(text))
|
|
elif what == 'rcode':
|
|
text = self.tok.get_string()
|
|
self.message.set_rcode(dns.rcode.from_text(text))
|
|
else:
|
|
raise UnknownHeaderField
|
|
self.tok.get_eol()
|
|
|
|
def _question_line(self, section):
|
|
"""Process one line from the text format question section."""
|
|
|
|
token = self.tok.get(want_leading=True)
|
|
if not token.is_whitespace():
|
|
self.last_name = dns.name.from_text(token.value, None)
|
|
name = self.last_name
|
|
token = self.tok.get()
|
|
if not token.is_identifier():
|
|
raise dns.exception.SyntaxError
|
|
# Class
|
|
try:
|
|
rdclass = dns.rdataclass.from_text(token.value)
|
|
token = self.tok.get()
|
|
if not token.is_identifier():
|
|
raise dns.exception.SyntaxError
|
|
except dns.exception.SyntaxError:
|
|
raise dns.exception.SyntaxError
|
|
except Exception:
|
|
rdclass = dns.rdataclass.IN
|
|
# Type
|
|
rdtype = dns.rdatatype.from_text(token.value)
|
|
self.message.find_rrset(self.message.question, name,
|
|
rdclass, rdtype, create=True,
|
|
force_unique=True)
|
|
if self.updating:
|
|
self.zone_rdclass = rdclass
|
|
self.tok.get_eol()
|
|
|
|
def _rr_line(self, section):
|
|
"""Process one line from the text format answer, authority, or
|
|
additional data sections.
|
|
"""
|
|
|
|
deleting = None
|
|
# Name
|
|
token = self.tok.get(want_leading=True)
|
|
if not token.is_whitespace():
|
|
self.last_name = dns.name.from_text(token.value, None)
|
|
name = self.last_name
|
|
token = self.tok.get()
|
|
if not token.is_identifier():
|
|
raise dns.exception.SyntaxError
|
|
# TTL
|
|
try:
|
|
ttl = int(token.value, 0)
|
|
token = self.tok.get()
|
|
if not token.is_identifier():
|
|
raise dns.exception.SyntaxError
|
|
except dns.exception.SyntaxError:
|
|
raise dns.exception.SyntaxError
|
|
except Exception:
|
|
ttl = 0
|
|
# Class
|
|
try:
|
|
rdclass = dns.rdataclass.from_text(token.value)
|
|
token = self.tok.get()
|
|
if not token.is_identifier():
|
|
raise dns.exception.SyntaxError
|
|
if rdclass == dns.rdataclass.ANY or rdclass == dns.rdataclass.NONE:
|
|
deleting = rdclass
|
|
rdclass = self.zone_rdclass
|
|
except dns.exception.SyntaxError:
|
|
raise dns.exception.SyntaxError
|
|
except Exception:
|
|
rdclass = dns.rdataclass.IN
|
|
# Type
|
|
rdtype = dns.rdatatype.from_text(token.value)
|
|
token = self.tok.get()
|
|
if not token.is_eol_or_eof():
|
|
self.tok.unget(token)
|
|
rd = dns.rdata.from_text(rdclass, rdtype, self.tok, None)
|
|
covers = rd.covers()
|
|
else:
|
|
rd = None
|
|
covers = dns.rdatatype.NONE
|
|
rrset = self.message.find_rrset(section, name,
|
|
rdclass, rdtype, covers,
|
|
deleting, True, self.updating)
|
|
if rd is not None:
|
|
rrset.add(rd, ttl)
|
|
|
|
def read(self):
|
|
"""Read a text format DNS message and build a dns.message.Message
|
|
object."""
|
|
|
|
line_method = self._header_line
|
|
section = None
|
|
while 1:
|
|
token = self.tok.get(True, True)
|
|
if token.is_eol_or_eof():
|
|
break
|
|
if token.is_comment():
|
|
u = token.value.upper()
|
|
if u == 'HEADER':
|
|
line_method = self._header_line
|
|
elif u == 'QUESTION' or u == 'ZONE':
|
|
line_method = self._question_line
|
|
section = self.message.question
|
|
elif u == 'ANSWER' or u == 'PREREQ':
|
|
line_method = self._rr_line
|
|
section = self.message.answer
|
|
elif u == 'AUTHORITY' or u == 'UPDATE':
|
|
line_method = self._rr_line
|
|
section = self.message.authority
|
|
elif u == 'ADDITIONAL':
|
|
line_method = self._rr_line
|
|
section = self.message.additional
|
|
self.tok.get_eol()
|
|
continue
|
|
self.tok.unget(token)
|
|
line_method(section)
|
|
|
|
|
|
def from_text(text):
|
|
"""Convert the text format message into a message object.
|
|
|
|
*text*, a ``text``, the text format message.
|
|
|
|
Raises ``dns.message.UnknownHeaderField`` if a header is unknown.
|
|
|
|
Raises ``dns.exception.SyntaxError`` if the text is badly formed.
|
|
|
|
Returns a ``dns.message.Message object``
|
|
"""
|
|
|
|
# 'text' can also be a file, but we don't publish that fact
|
|
# since it's an implementation detail. The official file
|
|
# interface is from_file().
|
|
|
|
m = Message()
|
|
|
|
reader = _TextReader(text, m)
|
|
reader.read()
|
|
|
|
return m
|
|
|
|
|
|
def from_file(f):
|
|
"""Read the next text format message from the specified file.
|
|
|
|
*f*, a ``file`` or ``text``. If *f* is text, it is treated as the
|
|
pathname of a file to open.
|
|
|
|
Raises ``dns.message.UnknownHeaderField`` if a header is unknown.
|
|
|
|
Raises ``dns.exception.SyntaxError`` if the text is badly formed.
|
|
|
|
Returns a ``dns.message.Message object``
|
|
"""
|
|
|
|
str_type = string_types
|
|
opts = 'rU'
|
|
|
|
if isinstance(f, str_type):
|
|
f = open(f, opts)
|
|
want_close = True
|
|
else:
|
|
want_close = False
|
|
|
|
try:
|
|
m = from_text(f)
|
|
finally:
|
|
if want_close:
|
|
f.close()
|
|
return m
|
|
|
|
|
|
def make_query(qname, rdtype, rdclass=dns.rdataclass.IN, use_edns=None,
|
|
want_dnssec=False, ednsflags=None, payload=None,
|
|
request_payload=None, options=None):
|
|
"""Make a query message.
|
|
|
|
The query name, type, and class may all be specified either
|
|
as objects of the appropriate type, or as strings.
|
|
|
|
The query will have a randomly chosen query id, and its DNS flags
|
|
will be set to dns.flags.RD.
|
|
|
|
qname, a ``dns.name.Name`` or ``text``, the query name.
|
|
|
|
*rdtype*, an ``int`` or ``text``, the desired rdata type.
|
|
|
|
*rdclass*, an ``int`` or ``text``, the desired rdata class; the default
|
|
is class IN.
|
|
|
|
*use_edns*, an ``int``, ``bool`` or ``None``. The EDNS level to use; the
|
|
default is None (no EDNS).
|
|
See the description of dns.message.Message.use_edns() for the possible
|
|
values for use_edns and their meanings.
|
|
|
|
*want_dnssec*, a ``bool``. If ``True``, DNSSEC data is desired.
|
|
|
|
*ednsflags*, an ``int``, the EDNS flag values.
|
|
|
|
*payload*, an ``int``, is the EDNS sender's payload field, which is the
|
|
maximum size of UDP datagram the sender can handle. I.e. how big
|
|
a response to this message can be.
|
|
|
|
*request_payload*, an ``int``, is the EDNS payload size to use when
|
|
sending this message. If not specified, defaults to the value of
|
|
*payload*.
|
|
|
|
*options*, a list of ``dns.edns.Option`` objects or ``None``, the EDNS
|
|
options.
|
|
|
|
Returns a ``dns.message.Message``
|
|
"""
|
|
|
|
if isinstance(qname, string_types):
|
|
qname = dns.name.from_text(qname)
|
|
if isinstance(rdtype, string_types):
|
|
rdtype = dns.rdatatype.from_text(rdtype)
|
|
if isinstance(rdclass, string_types):
|
|
rdclass = dns.rdataclass.from_text(rdclass)
|
|
m = Message()
|
|
m.flags |= dns.flags.RD
|
|
m.find_rrset(m.question, qname, rdclass, rdtype, create=True,
|
|
force_unique=True)
|
|
# only pass keywords on to use_edns if they have been set to a
|
|
# non-None value. Setting a field will turn EDNS on if it hasn't
|
|
# been configured.
|
|
kwargs = {}
|
|
if ednsflags is not None:
|
|
kwargs['ednsflags'] = ednsflags
|
|
if use_edns is None:
|
|
use_edns = 0
|
|
if payload is not None:
|
|
kwargs['payload'] = payload
|
|
if use_edns is None:
|
|
use_edns = 0
|
|
if request_payload is not None:
|
|
kwargs['request_payload'] = request_payload
|
|
if use_edns is None:
|
|
use_edns = 0
|
|
if options is not None:
|
|
kwargs['options'] = options
|
|
if use_edns is None:
|
|
use_edns = 0
|
|
kwargs['edns'] = use_edns
|
|
m.use_edns(**kwargs)
|
|
m.want_dnssec(want_dnssec)
|
|
return m
|
|
|
|
|
|
def make_response(query, recursion_available=False, our_payload=8192,
|
|
fudge=300):
|
|
"""Make a message which is a response for the specified query.
|
|
The message returned is really a response skeleton; it has all
|
|
of the infrastructure required of a response, but none of the
|
|
content.
|
|
|
|
The response's question section is a shallow copy of the query's
|
|
question section, so the query's question RRsets should not be
|
|
changed.
|
|
|
|
*query*, a ``dns.message.Message``, the query to respond to.
|
|
|
|
*recursion_available*, a ``bool``, should RA be set in the response?
|
|
|
|
*our_payload*, an ``int``, the payload size to advertise in EDNS
|
|
responses.
|
|
|
|
*fudge*, an ``int``, the TSIG time fudge.
|
|
|
|
Returns a ``dns.message.Message`` object.
|
|
"""
|
|
|
|
if query.flags & dns.flags.QR:
|
|
raise dns.exception.FormError('specified query message is not a query')
|
|
response = dns.message.Message(query.id)
|
|
response.flags = dns.flags.QR | (query.flags & dns.flags.RD)
|
|
if recursion_available:
|
|
response.flags |= dns.flags.RA
|
|
response.set_opcode(query.opcode())
|
|
response.question = list(query.question)
|
|
if query.edns >= 0:
|
|
response.use_edns(0, 0, our_payload, query.payload)
|
|
if query.had_tsig:
|
|
response.use_tsig(query.keyring, query.keyname, fudge, None, 0, b'',
|
|
query.keyalgorithm)
|
|
response.request_mac = query.mac
|
|
return response
|