summaryrefslogtreecommitdiffstats
path: root/Demo/dns
diff options
context:
space:
mode:
Diffstat (limited to 'Demo/dns')
-rw-r--r--Demo/dns/README12
-rwxr-xr-xDemo/dns/dnsclass.py23
-rwxr-xr-xDemo/dns/dnslib.py588
-rwxr-xr-xDemo/dns/dnsopcode.py16
-rwxr-xr-xDemo/dns/dnstype.py41
5 files changed, 680 insertions, 0 deletions
diff --git a/Demo/dns/README b/Demo/dns/README
new file mode 100644
index 0000000..09ebe8f
--- /dev/null
+++ b/Demo/dns/README
@@ -0,0 +1,12 @@
+This directory contains a module (dnslib) that implements a DNS
+(Domain Name Server) client, plus additional modules that define some
+symbolic constants used by DNS (dnstype, dnsclass, dnsopcode).
+
+Type "python dnslib.py -/" for a usage message.
+
+You can also import dnslib and write your own, more sophisticated
+client code; use the test program as an example (there is currently no
+documentation :-).
+
+--Guido van Rossum, CWI, Amsterdam <Guido.van.Rossum@cwi.nl>
+URL: <http://www.cwi.nl/cwi/people/Guido.van.Rossum.html>
diff --git a/Demo/dns/dnsclass.py b/Demo/dns/dnsclass.py
new file mode 100755
index 0000000..f90b9e8
--- /dev/null
+++ b/Demo/dns/dnsclass.py
@@ -0,0 +1,23 @@
+# CLASS values (section 3.2.4)
+
+IN = 1 # the Internet
+CS = 2 # the CSNET class (Obsolete - used only for examples in
+ # some obsolete RFCs)
+CH = 3 # the CHAOS class
+HS = 4 # Hesiod [Dyer 87]
+
+# QCLASS values (section 3.2.5)
+
+ANY = 255 # any class
+
+
+# Construct reverse mapping dictionary
+
+_names = dir()
+classmap = {}
+for _name in _names:
+ if _name[0] != '_': classmap[eval(_name)] = _name
+
+def classstr(klass):
+ if classmap.has_key(klass): return classmap[klass]
+ else: return `klass`
diff --git a/Demo/dns/dnslib.py b/Demo/dns/dnslib.py
new file mode 100755
index 0000000..9f0a3f4
--- /dev/null
+++ b/Demo/dns/dnslib.py
@@ -0,0 +1,588 @@
+# Domain Name Server (DNS) interface
+#
+# See RFC 1035:
+# ------------------------------------------------------------------------
+# Network Working Group P. Mockapetris
+# Request for Comments: 1035 ISI
+# November 1987
+# Obsoletes: RFCs 882, 883, 973
+#
+# DOMAIN NAMES - IMPLEMENTATION AND SPECIFICATION
+# ------------------------------------------------------------------------
+
+
+import string
+
+import dnstype
+import dnsclass
+import dnsopcode
+
+
+# Low-level 16 and 32 bit integer packing and unpacking
+
+def pack16bit(n):
+ return chr((n>>8)&0xFF) + chr(n&0xFF)
+
+def pack32bit(n):
+ return chr((n>>24)&0xFF) + chr((n>>16)&0xFF) \
+ + chr((n>>8)&0xFF) + chr(n&0xFF)
+
+def unpack16bit(s):
+ return (ord(s[0])<<8) | ord(s[1])
+
+def unpack32bit(s):
+ return (ord(s[0])<<24) | (ord(s[1])<<16) \
+ | (ord(s[2])<<8) | ord(s[3])
+
+def addr2bin(addr):
+ if type(addr) == type(0):
+ return addr
+ bytes = string.splitfields(addr, '.')
+ if len(bytes) != 4: raise ValueError, 'bad IP address'
+ n = 0
+ for byte in bytes: n = n<<8 | string.atoi(byte)
+ return n
+
+def bin2addr(n):
+ return '%d.%d.%d.%d' % ((n>>24)&0xFF, (n>>16)&0xFF,
+ (n>>8)&0xFF, n&0xFF)
+
+
+# Packing class
+
+class Packer:
+ def __init__(self):
+ self.buf = ''
+ self.index = {}
+ def getbuf(self):
+ return self.buf
+ def addbyte(self, c):
+ if len(c) != 1: raise TypeError, 'one character expected'
+ self.buf = self.buf + c
+ def addbytes(self, bytes):
+ self.buf = self.buf + bytes
+ def add16bit(self, n):
+ self.buf = self.buf + pack16bit(n)
+ def add32bit(self, n):
+ self.buf = self.buf + pack32bit(n)
+ def addaddr(self, addr):
+ n = addr2bin(addr)
+ self.buf = self.buf + pack32bit(n)
+ def addstring(self, s):
+ self.addbyte(chr(len(s)))
+ self.addbytes(s)
+ def addname(self, name):
+ # Domain name packing (section 4.1.4)
+ # Add a domain name to the buffer, possibly using pointers.
+ # The case of the first occurrence of a name is preserved.
+ # Redundant dots are ignored.
+ list = []
+ for label in string.splitfields(name, '.'):
+ if label:
+ if len(label) > 63:
+ raise PackError, 'label too long'
+ list.append(label)
+ keys = []
+ for i in range(len(list)):
+ key = string.upper(string.joinfields(list[i:], '.'))
+ keys.append(key)
+ if self.index.has_key(key):
+ pointer = self.index[key]
+ break
+ else:
+ i = len(list)
+ pointer = None
+ # Do it into temporaries first so exceptions don't
+ # mess up self.index and self.buf
+ buf = ''
+ offset = len(self.buf)
+ index = []
+ for j in range(i):
+ label = list[j]
+ n = len(label)
+ if offset + len(buf) < 0x3FFF:
+ index.append(keys[j], offset + len(buf))
+ else:
+ print 'dnslib.Packer.addname:',
+ print 'warning: pointer too big'
+ buf = buf + (chr(n) + label)
+ if pointer:
+ buf = buf + pack16bit(pointer | 0xC000)
+ else:
+ buf = buf + '\0'
+ self.buf = self.buf + buf
+ for key, value in index:
+ self.index[key] = value
+ def dump(self):
+ keys = self.index.keys()
+ keys.sort()
+ print '-'*40
+ for key in keys:
+ print '%20s %3d' % (key, self.index[key])
+ print '-'*40
+ space = 1
+ for i in range(0, len(self.buf)+1, 2):
+ if self.buf[i:i+2] == '**':
+ if not space: print
+ space = 1
+ continue
+ space = 0
+ print '%4d' % i,
+ for c in self.buf[i:i+2]:
+ if ' ' < c < '\177':
+ print ' %c' % c,
+ else:
+ print '%2d' % ord(c),
+ print
+ print '-'*40
+
+
+# Unpacking class
+
+UnpackError = 'dnslib.UnpackError' # Exception
+
+class Unpacker:
+ def __init__(self, buf):
+ self.buf = buf
+ self.offset = 0
+ def getbyte(self):
+ c = self.buf[self.offset]
+ self.offset = self.offset + 1
+ return c
+ def getbytes(self, n):
+ s = self.buf[self.offset : self.offset + n]
+ if len(s) != n: raise UnpackError, 'not enough data left'
+ self.offset = self.offset + n
+ return s
+ def get16bit(self):
+ return unpack16bit(self.getbytes(2))
+ def get32bit(self):
+ return unpack32bit(self.getbytes(4))
+ def getaddr(self):
+ return bin2addr(self.get32bit())
+ def getstring(self):
+ return self.getbytes(ord(self.getbyte()))
+ def getname(self):
+ # Domain name unpacking (section 4.1.4)
+ c = self.getbyte()
+ i = ord(c)
+ if i & 0xC0 == 0xC0:
+ d = self.getbyte()
+ j = ord(d)
+ pointer = ((i<<8) | j) & ~0xC000
+ save_offset = self.offset
+ try:
+ self.offset = pointer
+ domain = self.getname()
+ finally:
+ self.offset = save_offset
+ return domain
+ if i == 0:
+ return ''
+ domain = self.getbytes(i)
+ remains = self.getname()
+ if not remains:
+ return domain
+ else:
+ return domain + '.' + remains
+
+
+# Test program for packin/unpacking (section 4.1.4)
+
+def testpacker():
+ N = 25
+ R = range(N)
+ import timing
+ # See section 4.1.4 of RFC 1035
+ timing.start()
+ for i in R:
+ p = Packer()
+ p.addbytes('*' * 20)
+ p.addname('f.ISI.ARPA')
+ p.addbytes('*' * 8)
+ p.addname('Foo.F.isi.arpa')
+ p.addbytes('*' * 18)
+ p.addname('arpa')
+ p.addbytes('*' * 26)
+ p.addname('')
+ timing.finish()
+ print round(timing.milli() * 0.001 / N, 3), 'seconds per packing'
+ p.dump()
+ u = Unpacker(p.buf)
+ u.getbytes(20)
+ u.getname()
+ u.getbytes(8)
+ u.getname()
+ u.getbytes(18)
+ u.getname()
+ u.getbytes(26)
+ u.getname()
+ timing.start()
+ for i in R:
+ u = Unpacker(p.buf)
+ res = (u.getbytes(20),
+ u.getname(),
+ u.getbytes(8),
+ u.getname(),
+ u.getbytes(18),
+ u.getname(),
+ u.getbytes(26),
+ u.getname())
+ timing.finish()
+ print round(timing.milli() * 0.001 / N, 3), 'seconds per unpacking'
+ for item in res: print item
+
+
+# Pack/unpack RR toplevel format (section 3.2.1)
+
+class RRpacker(Packer):
+ def __init__(self):
+ Packer.__init__(self)
+ self.rdstart = None
+ def addRRheader(self, name, type, klass, ttl, *rest):
+ self.addname(name)
+ self.add16bit(type)
+ self.add16bit(klass)
+ self.add32bit(ttl)
+ if rest:
+ if res[1:]: raise TypeError, 'too many args'
+ rdlength = rest[0]
+ else:
+ rdlength = 0
+ self.add16bit(rdlength)
+ self.rdstart = len(self.buf)
+ def patchrdlength(self):
+ rdlength = unpack16bit(self.buf[self.rdstart-2:self.rdstart])
+ if rdlength == len(self.buf) - self.rdstart:
+ return
+ rdata = self.buf[self.rdstart:]
+ save_buf = self.buf
+ ok = 0
+ try:
+ self.buf = self.buf[:self.rdstart-2]
+ self.add16bit(len(rdata))
+ self.buf = self.buf + rdata
+ ok = 1
+ finally:
+ if not ok: self.buf = save_buf
+ def endRR(self):
+ if self.rdstart is not None:
+ self.patchrdlength()
+ self.rdstart = None
+ def getbuf(self):
+ if self.rdstart is not None: self.patchrdlenth()
+ return Packer.getbuf(self)
+ # Standard RRs (section 3.3)
+ def addCNAME(self, name, klass, ttl, cname):
+ self.addRRheader(name, dnstype.CNAME, klass, ttl)
+ self.addname(cname)
+ self.endRR()
+ def addHINFO(self, name, klass, ttl, cpu, os):
+ self.addRRheader(name, dnstype.HINFO, klass, ttl)
+ self.addstring(cpu)
+ self.addstring(os)
+ self.endRR()
+ def addMX(self, name, klass, ttl, preference, exchange):
+ self.addRRheader(name, dnstype.MX, klass, ttl)
+ self.add16bit(preference)
+ self.addname(exchange)
+ self.endRR()
+ def addNS(self, name, klass, ttl, nsdname):
+ self.addRRheader(name, dnstype.NS, klass, ttl)
+ self.addname(nsdname)
+ self.endRR()
+ def addPTR(self, name, klass, ttl, ptrdname):
+ self.addRRheader(name, dnstype.PTR, klass, ttl)
+ self.addname(ptrdname)
+ self.endRR()
+ def addSOA(self, name, klass, ttl,
+ mname, rname, serial, refresh, retry, expire, minimum):
+ self.addRRheader(name, dnstype.SOA, klass, ttl)
+ self.addname(mname)
+ self.addname(rname)
+ self.add32bit(serial)
+ self.add32bit(refresh)
+ self.add32bit(retry)
+ self.add32bit(expire)
+ self.add32bit(minimum)
+ self.endRR()
+ def addTXT(self, name, klass, ttl, list):
+ self.addRRheader(name, dnstype.TXT, klass, ttl)
+ for txtdata in list:
+ self.addstring(txtdata)
+ self.endRR()
+ # Internet specific RRs (section 3.4) -- class = IN
+ def addA(self, name, ttl, address):
+ self.addRRheader(name, dnstype.A, dnsclass.IN, ttl)
+ self.addaddr(address)
+ self.endRR()
+ def addWKS(self, name, ttl, address, protocol, bitmap):
+ self.addRRheader(name, dnstype.WKS, dnsclass.IN, ttl)
+ self.addaddr(address)
+ self.addbyte(chr(protocol))
+ self.addbytes(bitmap)
+ self.endRR()
+
+
+class RRunpacker(Unpacker):
+ def __init__(self, buf):
+ Unpacker.__init__(self, buf)
+ self.rdend = None
+ def getRRheader(self):
+ name = self.getname()
+ type = self.get16bit()
+ klass = self.get16bit()
+ ttl = self.get32bit()
+ rdlength = self.get16bit()
+ self.rdend = self.offset + rdlength
+ return (name, type, klass, ttl, rdlength)
+ def endRR(self):
+ if self.offset != self.rdend:
+ raise UnpackError, 'end of RR not reached'
+ def getCNAMEdata(self):
+ return self.getname()
+ def getHINFOdata(self):
+ return self.getstring(), self.getstring()
+ def getMXdata(self):
+ return self.get16bit(), self.getname()
+ def getNSdata(self):
+ return self.getname()
+ def getPTRdata(self):
+ return self.getname()
+ def getSOAdata(self):
+ return self.getname(), \
+ self.getname(), \
+ self.get32bit(), \
+ self.get32bit(), \
+ self.get32bit(), \
+ self.get32bit(), \
+ self.get32bit()
+ def getTXTdata(self):
+ list = []
+ while self.offset != self.rdend:
+ list.append(self.getstring())
+ return list
+ def getAdata(self):
+ return self.getaddr()
+ def getWKSdata(self):
+ address = self.getaddr()
+ protocol = ord(self.getbyte())
+ bitmap = self.getbytes(self.rdend - self.offset)
+ return address, protocol, bitmap
+
+
+# Pack/unpack Message Header (section 4.1)
+
+class Hpacker(Packer):
+ def addHeader(self, id, qr, opcode, aa, tc, rd, ra, z, rcode,
+ qdcount, ancount, nscount, arcount):
+ self.add16bit(id)
+ self.add16bit((qr&1)<<15 | (opcode*0xF)<<11 | (aa&1)<<10
+ | (tc&1)<<9 | (rd&1)<<8 | (ra&1)<<7
+ | (z&7)<<4 | (rcode&0xF))
+ self.add16bit(qdcount)
+ self.add16bit(ancount)
+ self.add16bit(nscount)
+ self.add16bit(arcount)
+
+class Hunpacker(Unpacker):
+ def getHeader(self):
+ id = self.get16bit()
+ flags = self.get16bit()
+ qr, opcode, aa, tc, rd, ra, z, rcode = (
+ (flags>>15)&1,
+ (flags>>11)&0xF,
+ (flags>>10)&1,
+ (flags>>9)&1,
+ (flags>>8)&1,
+ (flags>>7)&1,
+ (flags>>4)&7,
+ (flags>>0)&0xF)
+ qdcount = self.get16bit()
+ ancount = self.get16bit()
+ nscount = self.get16bit()
+ arcount = self.get16bit()
+ return (id, qr, opcode, aa, tc, rd, ra, z, rcode,
+ qdcount, ancount, nscount, arcount)
+
+
+# Pack/unpack Question (section 4.1.2)
+
+class Qpacker(Packer):
+ def addQuestion(self, qname, qtype, qclass):
+ self.addname(qname)
+ self.add16bit(qtype)
+ self.add16bit(qclass)
+
+class Qunpacker(Unpacker):
+ def getQuestion(self):
+ return self.getname(), self.get16bit(), self.get16bit()
+
+
+# Pack/unpack Message(section 4)
+# NB the order of the base classes is important for __init__()!
+
+class Mpacker(RRpacker, Qpacker, Hpacker):
+ pass
+
+class Munpacker(RRunpacker, Qunpacker, Hunpacker):
+ pass
+
+
+# Routines to print an unpacker to stdout, for debugging.
+# These affect the unpacker's current position!
+
+def dumpM(u):
+ print 'HEADER:',
+ (id, qr, opcode, aa, tc, rd, ra, z, rcode,
+ qdcount, ancount, nscount, arcount) = u.getHeader()
+ print 'id=%d,' % id,
+ print 'qr=%d, opcode=%d, aa=%d, tc=%d, rd=%d, ra=%d, z=%d, rcode=%d,' \
+ % (qr, opcode, aa, tc, rd, ra, z, rcode)
+ if tc: print '*** response truncated! ***'
+ if rcode: print '*** nonzero error code! (%d) ***' % rcode
+ print ' qdcount=%d, ancount=%d, nscount=%d, arcount=%d' \
+ % (qdcount, ancount, nscount, arcount)
+ for i in range(qdcount):
+ print 'QUESTION %d:' % i,
+ dumpQ(u)
+ for i in range(ancount):
+ print 'ANSWER %d:' % i,
+ dumpRR(u)
+ for i in range(nscount):
+ print 'AUTHORITY RECORD %d:' % i,
+ dumpRR(u)
+ for i in range(arcount):
+ print 'ADDITIONAL RECORD %d:' % i,
+ dumpRR(u)
+
+def dumpQ(u):
+ qname, qtype, qclass = u.getQuestion()
+ print 'qname=%s, qtype=%d(%s), qclass=%d(%s)' \
+ % (qname,
+ qtype, dnstype.typestr(qtype),
+ qclass, dnsclass.classstr(qclass))
+
+def dumpRR(u):
+ name, type, klass, ttl, rdlength = u.getRRheader()
+ typename = dnstype.typestr(type)
+ print 'name=%s, type=%d(%s), class=%d(%s), ttl=%d' \
+ % (name,
+ type, typename,
+ klass, dnsclass.classstr(klass),
+ ttl)
+ mname = 'get%sdata' % typename
+ if hasattr(u, mname):
+ print ' formatted rdata:', getattr(u, mname)()
+ else:
+ print ' binary rdata:', u.getbytes(rdlength)
+
+
+# Test program
+
+def test():
+ import sys
+ import getopt
+ import socket
+ protocol = 'udp'
+ server = 'meermin.cwi.nl' # XXX adapt this to your local
+ port = 53
+ opcode = dnsopcode.QUERY
+ rd = 0
+ qtype = dnstype.MX
+ qname = 'cwi.nl'
+ try:
+ opts, args = getopt.getopt(sys.argv[1:], 'Trs:tu')
+ if len(args) > 2: raise getopt.error, 'too many arguments'
+ except getopt.error, msg:
+ print msg
+ print 'Usage: python dnslib.py',
+ print '[-T] [-r] [-s server] [-t] [-u]',
+ print '[qtype [qname]]'
+ print '-T: run testpacker() and exit'
+ print '-r: recursion desired (default not)'
+ print '-s server: use server (default %s)' % server
+ print '-t: use TCP protocol'
+ print '-u: use UDP protocol (default)'
+ print 'qtype: query type (default %s)' % \
+ dnstype.typestr(qtype)
+ print 'qname: query name (default %s)' % qname
+ print 'Recognized qtype values:'
+ qtypes = dnstype.typemap.keys()
+ qtypes.sort()
+ n = 0
+ for qtype in qtypes:
+ n = n+1
+ if n >= 8: n = 1; print
+ print '%s = %d' % (dnstype.typemap[qtype], qtype),
+ print
+ sys.exit(2)
+ for o, a in opts:
+ if o == '-T': testpacker(); return
+ if o == '-t': protocol = 'tcp'
+ if o == '-u': protocol = 'udp'
+ if o == '-s': server = a
+ if o == '-r': rd = 1
+ if args[0:]:
+ try:
+ qtype = eval(string.upper(args[0]), dnstype.__dict__)
+ except (NameError, SyntaxError):
+ print 'bad query type:', `args[0]`
+ sys.exit(2)
+ if args[1:]:
+ qname = args[1]
+ if qtype == dnstype.AXFR:
+ print 'Query type AXFR, protocol forced to TCP'
+ protocol = 'tcp'
+ print 'QTYPE %d(%s)' % (qtype, dnstype.typestr(qtype))
+ m = Mpacker()
+ m.addHeader(0,
+ 0, opcode, 0, 0, rd, 0, 0, 0,
+ 1, 0, 0, 0)
+ m.addQuestion(qname, qtype, dnsclass.IN)
+ request = m.getbuf()
+ if protocol == 'udp':
+ s = socket.socket(socket.AF_INET, socket.SOCK_DGRAM)
+ s.connect((server, port))
+ s.send(request)
+ reply = s.recv(1024)
+ else:
+ s = socket.socket(socket.AF_INET, socket.SOCK_STREAM)
+ s.connect((server, port))
+ s.send(pack16bit(len(request)) + request)
+ s.shutdown(1)
+ f = s.makefile('r')
+ header = f.read(2)
+ if len(header) < 2:
+ print '*** EOF ***'
+ return
+ count = unpack16bit(header)
+ reply = f.read(count)
+ if len(reply) != count:
+ print '*** Incomplete reply ***'
+ return
+ u = Munpacker(reply)
+ dumpM(u)
+ if protocol == 'tcp' and qtype == dnstype.AXFR:
+ while 1:
+ header = f.read(2)
+ if len(header) < 2:
+ print '========== EOF =========='
+ break
+ count = unpack16bit(header)
+ if not count:
+ print '========== ZERO COUNT =========='
+ break
+ print '========== NEXT =========='
+ reply = f.read(count)
+ if len(reply) != count:
+ print '*** Incomplete reply ***'
+ break
+ u = Munpacker(reply)
+ dumpM(u)
+
+
+# Run test program when called as a script
+
+if __name__ == '__main__':
+ test()
diff --git a/Demo/dns/dnsopcode.py b/Demo/dns/dnsopcode.py
new file mode 100755
index 0000000..f2e7cd5
--- /dev/null
+++ b/Demo/dns/dnsopcode.py
@@ -0,0 +1,16 @@
+# Opcode values in message header (section 4.1.1)
+
+QUERY = 0
+IQUERY = 1
+STATUS = 2
+
+# Construct reverse mapping dictionary
+
+_names = dir()
+opcodemap = {}
+for _name in _names:
+ if _name[0] != '_': opcodemap[eval(_name)] = _name
+
+def opcodestr(opcode):
+ if opcodemap.has_key(opcode): return opcodemap[opcode]
+ else: return `opcode`
diff --git a/Demo/dns/dnstype.py b/Demo/dns/dnstype.py
new file mode 100755
index 0000000..80c2b76
--- /dev/null
+++ b/Demo/dns/dnstype.py
@@ -0,0 +1,41 @@
+# TYPE values (section 3.2.2)
+
+A = 1 # a host address
+NS = 2 # an authoritative name server
+MD = 3 # a mail destination (Obsolete - use MX)
+MF = 4 # a mail forwarder (Obsolete - use MX)
+CNAME = 5 # the canonical name for an alias
+SOA = 6 # marks the start of a zone of authority
+MB = 7 # a mailbox domain name (EXPERIMENTAL)
+MG = 8 # a mail group member (EXPERIMENTAL)
+MR = 9 # a mail rename domain name (EXPERIMENTAL)
+NULL = 10 # a null RR (EXPERIMENTAL)
+WKS = 11 # a well known service description
+PTR = 12 # a domain name pointer
+HINFO = 13 # host information
+MINFO = 14 # mailbox or mail list information
+MX = 15 # mail exchange
+TXT = 16 # text strings
+
+# Additional TYPE values from host.c source
+
+UNAME = 110
+MP = 240
+
+# QTYPE values (section 3.2.3)
+
+AXFR = 252 # A request for a transfer of an entire zone
+MAILB = 253 # A request for mailbox-related records (MB, MG or MR)
+MAILA = 254 # A request for mail agent RRs (Obsolete - see MX)
+ANY = 255 # A request for all records
+
+# Construct reverse mapping dictionary
+
+_names = dir()
+typemap = {}
+for _name in _names:
+ if _name[0] != '_': typemap[eval(_name)] = _name
+
+def typestr(type):
+ if typemap.has_key(type): return typemap[type]
+ else: return `type`