]> git.ipfire.org Git - thirdparty/pdns.git/blob - pdns/sdig.cc
Merge pull request #7903 from Habbie/dnsdist-doc-nits
[thirdparty/pdns.git] / pdns / sdig.cc
1 #ifdef HAVE_CONFIG_H
2 #include "config.h"
3 #endif
4 #include "dnsparser.hh"
5 #include "ednsoptions.hh"
6 #include "sstuff.hh"
7 #include "misc.hh"
8 #include "dnswriter.hh"
9 #include "dnsrecords.hh"
10 #include "statbag.hh"
11 #include <boost/array.hpp>
12 #include "ednssubnet.hh"
13
14 #ifdef HAVE_LIBCURL
15 #include "minicurl.hh"
16 #endif
17
18 StatBag S;
19
20 bool hidettl=false;
21
22 string ttl(uint32_t ttl)
23 {
24 if(hidettl)
25 return "[ttl]";
26 else
27 return std::to_string(ttl);
28 }
29
30 void usage() {
31 cerr<<"sdig"<<endl;
32 cerr<<"Syntax: sdig IP-ADDRESS-OR-DOH-URL PORT QUESTION QUESTION-TYPE [dnssec] [ednssubnet SUBNET/MASK] [hidesoadetails] [hidettl] [recurse] [showflags] [tcp] [xpf XPFDATA]"<<endl;
33 }
34
35 const string nameForClass(uint16_t qclass, uint16_t qtype)
36 {
37 if (qtype == QType::OPT) return "IN";
38
39 switch(qclass) {
40 case QClass::IN: return "IN";
41 case QClass::CHAOS: return "CHAOS";
42 case QClass::NONE: return "NONE";
43 case QClass::ANY: return "ANY";
44 default: return string("CLASS")+std::to_string(qclass);
45 }
46 }
47
48 int main(int argc, char** argv)
49 try
50 {
51 bool dnssec=false;
52 bool recurse=false;
53 bool tcp=false;
54 bool showflags=false;
55 bool hidesoadetails=false;
56 bool doh=false;
57 boost::optional<Netmask> ednsnm;
58 uint16_t xpfcode = 0, xpfversion = 0, xpfproto = 0;
59 char *xpfsrc = NULL, *xpfdst = NULL;
60
61 for(int i=1; i<argc; i++) {
62 if ((string) argv[i] == "--help") {
63 usage();
64 exit(EXIT_SUCCESS);
65 }
66
67 if ((string) argv[i] == "--version") {
68 cerr<<"sdig "<<VERSION<<endl;
69 exit(EXIT_SUCCESS);
70 }
71 }
72
73 if(argc < 5) {
74 usage();
75 exit(EXIT_FAILURE);
76 }
77
78 reportAllTypes();
79
80 if (argc > 5) {
81 for(int i=5; i<argc; i++) {
82 if (strcmp(argv[i], "dnssec") == 0)
83 dnssec=true;
84 if (strcmp(argv[i], "recurse") == 0)
85 recurse=true;
86 if (strcmp(argv[i], "showflags") == 0)
87 showflags=true;
88 if (strcmp(argv[i], "hidesoadetails") == 0)
89 hidesoadetails=true;
90 if (strcmp(argv[i], "hidettl") == 0)
91 hidettl=true;
92 if (strcmp(argv[i], "tcp") == 0)
93 tcp=true;
94 if (strcmp(argv[i], "ednssubnet") == 0) {
95 if(argc < i+2) {
96 cerr<<"ednssubnet needs an argument"<<endl;
97 exit(EXIT_FAILURE);
98 }
99 ednsnm=Netmask(argv[++i]);
100 }
101 if (strcmp(argv[i], "xpf") == 0) {
102 if(argc < i+6) {
103 cerr<<"xpf needs five arguments"<<endl;
104 exit(EXIT_FAILURE);
105 }
106 xpfcode = atoi(argv[++i]);
107 xpfversion = atoi(argv[++i]);
108 xpfproto = atoi(argv[++i]);
109 xpfsrc = argv[++i];
110 xpfdst = argv[++i];
111 }
112 }
113 }
114
115 vector<uint8_t> packet;
116
117 DNSPacketWriter pw(packet, DNSName(argv[3]), DNSRecordContent::TypeToNumber(argv[4]));
118
119 if(dnssec || ednsnm || getenv("SDIGBUFSIZE"))
120 {
121 char *sbuf=getenv("SDIGBUFSIZE");
122 int bufsize;
123 if(sbuf)
124 bufsize=atoi(sbuf);
125 else
126 bufsize=2800;
127 DNSPacketWriter::optvect_t opts;
128 if(ednsnm) {
129 EDNSSubnetOpts eo;
130 eo.source = *ednsnm;
131 opts.push_back(make_pair(EDNSOptionCode::ECS, makeEDNSSubnetOptsString(eo)));
132 }
133
134 pw.addOpt(bufsize, 0, dnssec ? EDNSOpts::DNSSECOK : 0, opts);
135 pw.commit();
136 }
137
138 if(xpfcode)
139 {
140 ComboAddress src(xpfsrc), dst(xpfdst);
141 pw.startRecord(DNSName("."), xpfcode, 0, 1, DNSResourceRecord::ADDITIONAL);
142 // xpf->toPacket(pw);
143 pw.xfr8BitInt(xpfversion);
144 pw.xfr8BitInt(xpfproto);
145 pw.xfrCAWithoutPort(xpfversion, src);
146 pw.xfrCAWithoutPort(xpfversion, dst);
147 pw.xfrCAPort(src);
148 pw.xfrCAPort(dst);
149 pw.commit();
150 }
151
152 if(recurse)
153 {
154 pw.getHeader()->rd=true;
155 }
156
157 string reply;
158 string question(packet.begin(), packet.end());
159 ComboAddress dest;
160 if(*argv[1]=='h') {
161 doh = true;
162 }
163 else {
164 dest = ComboAddress(argv[1] + (*argv[1]=='@'), atoi(argv[2]));
165 }
166
167 if(doh) {
168 #ifdef HAVE_LIBCURL
169 MiniCurl mc;
170 MiniCurl::MiniCurlHeaders mch;
171 mch.insert(std::make_pair("Content-Type", "application/dns-message"));
172 mch.insert(std::make_pair("Accept", "application/dns-message"));
173 reply = mc.postURL(argv[1], question, mch);
174 #else
175 throw PDNSException("please link sdig against libcurl for DoH support");
176 #endif
177 }
178 else if(tcp) {
179 Socket sock(dest.sin4.sin_family, SOCK_STREAM);
180 sock.connect(dest);
181 uint16_t len;
182 len = htons(packet.size());
183 if(sock.write((char *) &len, 2) != 2)
184 throw PDNSException("tcp write failed");
185
186 sock.writen(question);
187
188 if(sock.read((char *) &len, 2) != 2)
189 throw PDNSException("tcp read failed");
190
191 len=ntohs(len);
192 char *creply = new char[len];
193 int n=0;
194 int numread;
195 while(n<len) {
196 numread=sock.read(creply+n, len-n);
197 if(numread<0)
198 throw PDNSException("tcp read failed");
199 n+=numread;
200 }
201
202 reply=string(creply, len);
203 delete[] creply;
204 }
205 else //udp
206 {
207 Socket sock(dest.sin4.sin_family, SOCK_DGRAM);
208 sock.sendTo(question, dest);
209 int result=waitForData(sock.getHandle(), 10);
210 if(result < 0)
211 throw std::runtime_error("Error waiting for data: "+string(strerror(errno)));
212 if(!result)
213 throw std::runtime_error("Timeout waiting for data");
214 sock.recvFrom(reply, dest);
215 }
216 MOADNSParser mdp(false, reply);
217 cout<<"Reply to question for qname='"<<mdp.d_qname.toString()<<"', qtype="<<DNSRecordContent::NumberToType(mdp.d_qtype)<<endl;
218 cout<<"Rcode: "<<mdp.d_header.rcode<<" ("<<RCode::to_s(mdp.d_header.rcode)<<"), RD: "<<mdp.d_header.rd<<", QR: "<<mdp.d_header.qr;
219 cout<<", TC: "<<mdp.d_header.tc<<", AA: "<<mdp.d_header.aa<<", opcode: "<<mdp.d_header.opcode<<endl;
220
221 for(MOADNSParser::answers_t::const_iterator i=mdp.d_answers.begin(); i!=mdp.d_answers.end(); ++i) {
222 cout<<i->first.d_place-1<<"\t"<<i->first.d_name.toString()<<"\t"<<nameForClass(i->first.d_class, i->first.d_type)<<"\t"<<DNSRecordContent::NumberToType(i->first.d_type);
223 if(i->first.d_class == QClass::IN)
224 {
225 if(i->first.d_type == QType::RRSIG)
226 {
227 string zoneRep = i->first.d_content->getZoneRepresentation();
228 vector<string> parts;
229 stringtok(parts, zoneRep);
230 cout<<"\t"<<ttl(i->first.d_ttl)<<"\t"<< parts[0]<<" "<<parts[1]<<" "<<parts[2]<<" "<<parts[3]<<" [expiry] [inception] [keytag] "<<parts[7]<<" ...\n";
231 continue;
232 }
233 if(!showflags && i->first.d_type == QType::NSEC3)
234 {
235 string zoneRep = i->first.d_content->getZoneRepresentation();
236 vector<string> parts;
237 stringtok(parts, zoneRep);
238 cout<<"\t"<<ttl(i->first.d_ttl)<<"\t"<< parts[0]<<" [flags] "<<parts[2]<<" "<<parts[3]<<" "<<parts[4];
239 for(vector<string>::iterator iter = parts.begin()+5; iter != parts.end(); ++iter)
240 cout<<" "<<*iter;
241 cout<<"\n";
242 continue;
243 }
244 if(i->first.d_type == QType::DNSKEY)
245 {
246 string zoneRep = i->first.d_content->getZoneRepresentation();
247 vector<string> parts;
248 stringtok(parts, zoneRep);
249 cout<<"\t"<<ttl(i->first.d_ttl)<<"\t"<< parts[0]<<" "<<parts[1]<<" "<<parts[2]<<" ...\n";
250 continue;
251 }
252 if (i->first.d_type == QType::SOA && hidesoadetails)
253 {
254 string zoneRep = i->first.d_content->getZoneRepresentation();
255 vector<string> parts;
256 stringtok(parts, zoneRep);
257 cout<<"\t"<<ttl(i->first.d_ttl)<<"\t"<<parts[0]<<" "<<parts[1]<<" [serial] "<<parts[3]<<" "<<parts[4]<<" "<<parts[5]<<" "<<parts[6]<<"\n";
258 continue;
259 }
260 }
261 cout<<"\t"<<ttl(i->first.d_ttl)<<"\t"<< i->first.d_content->getZoneRepresentation()<<"\n";
262 }
263
264 EDNSOpts edo;
265 if(getEDNSOpts(mdp, &edo)) {
266 // cerr<<"Have "<<edo.d_options.size()<<" options!"<<endl;
267 for(vector<pair<uint16_t, string> >::const_iterator iter = edo.d_options.begin();
268 iter != edo.d_options.end();
269 ++iter) {
270 if(iter->first == EDNSOptionCode::ECS) {// 'EDNS subnet'
271 EDNSSubnetOpts reso;
272 if(getEDNSSubnetOptsFromString(iter->second, &reso)) {
273 cerr<<"EDNS Subnet response: "<<reso.source.toString()<<", scope: "<<reso.scope.toString()<<", family = "<<reso.scope.getNetwork().sin4.sin_family<<endl;
274 }
275 }
276 else if(iter->first == EDNSOptionCode::PADDING) {
277 cerr<<"EDNS Padding size: "<<(iter->second.size())<<endl;
278 }
279 else {
280 cerr<<"Have unknown option "<<(int)iter->first<<endl;
281 }
282 }
283
284 }
285 }
286 catch(std::exception &e)
287 {
288 cerr<<"Fatal: "<<e.what()<<endl;
289 }
290 catch(PDNSException &e)
291 {
292 cerr<<"Fatal: "<<e.reason<<endl;
293 }