text
stringlengths 1
93.6k
|
|---|
def dns_ptr(self, i):
|
"""Get a list of domain names for an IP address."""
|
return self.dns('%s.%s.arpa'%(reverse_dots(i),self.v), 'PTR')
|
# We have to be careful which additional DNS RRs we cache. For
|
# instance, PTR records are controlled by the connecting IP, and they
|
# could poison our local cache with bogus A and MX records.
|
SAFE2CACHE = {
|
('MX','A'): None,
|
('MX','MX'): None,
|
('CNAME','A'): None,
|
('A','A'): None,
|
('AAAA','AAAA'): None,
|
('PTR','PTR'): None,
|
('TXT','TXT'): None,
|
('SPF','SPF'): None
|
}
|
# FIXME: move to anydns
|
#
|
# All types return a list of values. TXT/SPF values are
|
# in turn a list of strings (as bytes), as DNS supports long
|
# strings as shorter strings which must be concatenated.
|
#
|
def dns(self, name, qtype, cnames=None, ignore_void=False):
|
"""DNS query.
|
If the result is in cache, return that. Otherwise pull the
|
result from DNS, and cache ALL answers, so additional info
|
is available for further queries later.
|
CNAMEs are followed.
|
If there is no data, [] is returned.
|
pre: qtype in ['A', 'AAAA', 'MX', 'PTR', 'TXT', 'SPF']
|
post: isinstance(__return__, types.ListType)
|
Examples:
|
>>> c = query(s='strong-bad@email.example.com',
|
... h='parallel.kitterman.org',i='192.0.2.123')
|
>>> "".join( chr(x) for x in bytearray(c.dns('parallel.kitterman.org', 'TXT')[0][0]) )
|
'v=spf1 include:long.kitterman.org include:cname.kitterman.org -all'
|
"""
|
if not name:
|
raise Exception('Invalid query')
|
name = str(name)
|
if name.endswith('.'): name = name[:-1]
|
if not reduce(lambda x, y: x and 0 < len(y) < 64, name.split('.'), True):
|
return [] # invalid DNS name (too long or empty)
|
name = name.lower()
|
result = self.cache.get( (name, qtype), [])
|
if result: return result
|
cnamek = (name,'CNAME')
|
cname = self.cache.get( cnamek )
|
debug = self.verbose # and name.startswith('cname.')
|
if cname:
|
cname = cname[0]
|
else:
|
safe2cache = query.SAFE2CACHE
|
if self.querytime < 0:
|
raise TempError('DNS Error: exceeded max query lookup time')
|
if self.querytime < self.timeout and self.querytime > 0:
|
timeout = self.querytime
|
else:
|
timeout = self.timeout
|
timethen = time.time()
|
for k, v in DNSLookup(name, qtype, self.strict, timeout):
|
if debug: print('result=',k,v)
|
# Force case insensitivity in cache, DNS servers often
|
# return random case in domain part of answers.
|
k = (k[0].lower(), k[1])
|
if k == cnamek:
|
cname = v
|
result = self.cache.get( (cname, qtype), [])
|
if result: break
|
if k[1] == 'CNAME' or (qtype,k[1]) in safe2cache:
|
if debug: print('addcache=',k,v)
|
self.cache.setdefault(k, []).append(v)
|
#if ans and qtype == k[1]:
|
# self.cache.setdefault((name,qtype), []).append(v)
|
result = self.cache.get( (name, qtype), [])
|
if self.querytime > 0:
|
self.querytime = self.querytime - (time.time()-timethen)
|
if not result and cname:
|
if not cnames:
|
cnames = {}
|
elif len(cnames) >= MAX_CNAME:
|
#return result # if too many == NX_DOMAIN
|
raise PermError('Length of CNAME chain exceeds %d' % MAX_CNAME)
|
cnames[name] = cname
|
if cname.lower().rstrip('.') in cnames:
|
if self.strict > 1: raise AmbiguityWarning('CNAME loop', cname)
|
else:
|
result = self.dns(cname, qtype, cnames=cnames)
|
if result:
|
self.cache[(name,qtype)] = result
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.