doc.go 9.8 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272
  1. /*
  2. Package dns implements a full featured interface to the Domain Name System.
  3. Server- and client-side programming is supported.
  4. The package allows complete control over what is sent out to the DNS. The package
  5. API follows the less-is-more principle, by presenting a small, clean interface.
  6. The package dns supports (asynchronous) querying/replying, incoming/outgoing zone transfers,
  7. TSIG, EDNS0, dynamic updates, notifies and DNSSEC validation/signing.
  8. Note that domain names MUST be fully qualified, before sending them, unqualified
  9. names in a message will result in a packing failure.
  10. Resource records are native types. They are not stored in wire format.
  11. Basic usage pattern for creating a new resource record:
  12. r := new(dns.MX)
  13. r.Hdr = dns.RR_Header{Name: "miek.nl.", Rrtype: dns.TypeMX,
  14. Class: dns.ClassINET, Ttl: 3600}
  15. r.Preference = 10
  16. r.Mx = "mx.miek.nl."
  17. Or directly from a string:
  18. mx, err := dns.NewRR("miek.nl. 3600 IN MX 10 mx.miek.nl.")
  19. Or when the default origin (.) and TTL (3600) and class (IN) suit you:
  20. mx, err := dns.NewRR("miek.nl MX 10 mx.miek.nl")
  21. Or even:
  22. mx, err := dns.NewRR("$ORIGIN nl.\nmiek 1H IN MX 10 mx.miek")
  23. In the DNS messages are exchanged, these messages contain resource
  24. records (sets). Use pattern for creating a message:
  25. m := new(dns.Msg)
  26. m.SetQuestion("miek.nl.", dns.TypeMX)
  27. Or when not certain if the domain name is fully qualified:
  28. m.SetQuestion(dns.Fqdn("miek.nl"), dns.TypeMX)
  29. The message m is now a message with the question section set to ask
  30. the MX records for the miek.nl. zone.
  31. The following is slightly more verbose, but more flexible:
  32. m1 := new(dns.Msg)
  33. m1.Id = dns.Id()
  34. m1.RecursionDesired = true
  35. m1.Question = make([]dns.Question, 1)
  36. m1.Question[0] = dns.Question{"miek.nl.", dns.TypeMX, dns.ClassINET}
  37. After creating a message it can be sent.
  38. Basic use pattern for synchronous querying the DNS at a
  39. server configured on 127.0.0.1 and port 53:
  40. c := new(dns.Client)
  41. in, rtt, err := c.Exchange(m1, "127.0.0.1:53")
  42. Suppressing multiple outstanding queries (with the same question, type and
  43. class) is as easy as setting:
  44. c.SingleInflight = true
  45. More advanced options are available using a net.Dialer and the corresponding API.
  46. For example it is possible to set a timeout, or to specify a source IP address
  47. and port to use for the connection:
  48. c := new(dns.Client)
  49. laddr := net.UDPAddr{
  50. IP: net.ParseIP("[::1]"),
  51. Port: 12345,
  52. Zone: "",
  53. }
  54. c.Dialer := &net.Dialer{
  55. Timeout: 200 * time.Millisecond,
  56. LocalAddr: &laddr,
  57. }
  58. in, rtt, err := c.Exchange(m1, "8.8.8.8:53")
  59. If these "advanced" features are not needed, a simple UDP query can be sent,
  60. with:
  61. in, err := dns.Exchange(m1, "127.0.0.1:53")
  62. When this functions returns you will get dns message. A dns message consists
  63. out of four sections.
  64. The question section: in.Question, the answer section: in.Answer,
  65. the authority section: in.Ns and the additional section: in.Extra.
  66. Each of these sections (except the Question section) contain a []RR. Basic
  67. use pattern for accessing the rdata of a TXT RR as the first RR in
  68. the Answer section:
  69. if t, ok := in.Answer[0].(*dns.TXT); ok {
  70. // do something with t.Txt
  71. }
  72. Domain Name and TXT Character String Representations
  73. Both domain names and TXT character strings are converted to presentation
  74. form both when unpacked and when converted to strings.
  75. For TXT character strings, tabs, carriage returns and line feeds will be
  76. converted to \t, \r and \n respectively. Back slashes and quotations marks
  77. will be escaped. Bytes below 32 and above 127 will be converted to \DDD
  78. form.
  79. For domain names, in addition to the above rules brackets, periods,
  80. spaces, semicolons and the at symbol are escaped.
  81. DNSSEC
  82. DNSSEC (DNS Security Extension) adds a layer of security to the DNS. It
  83. uses public key cryptography to sign resource records. The
  84. public keys are stored in DNSKEY records and the signatures in RRSIG records.
  85. Requesting DNSSEC information for a zone is done by adding the DO (DNSSEC OK) bit
  86. to a request.
  87. m := new(dns.Msg)
  88. m.SetEdns0(4096, true)
  89. Signature generation, signature verification and key generation are all supported.
  90. DYNAMIC UPDATES
  91. Dynamic updates reuses the DNS message format, but renames three of
  92. the sections. Question is Zone, Answer is Prerequisite, Authority is
  93. Update, only the Additional is not renamed. See RFC 2136 for the gory details.
  94. You can set a rather complex set of rules for the existence of absence of
  95. certain resource records or names in a zone to specify if resource records
  96. should be added or removed. The table from RFC 2136 supplemented with the Go
  97. DNS function shows which functions exist to specify the prerequisites.
  98. 3.2.4 - Table Of Metavalues Used In Prerequisite Section
  99. CLASS TYPE RDATA Meaning Function
  100. --------------------------------------------------------------
  101. ANY ANY empty Name is in use dns.NameUsed
  102. ANY rrset empty RRset exists (value indep) dns.RRsetUsed
  103. NONE ANY empty Name is not in use dns.NameNotUsed
  104. NONE rrset empty RRset does not exist dns.RRsetNotUsed
  105. zone rrset rr RRset exists (value dep) dns.Used
  106. The prerequisite section can also be left empty.
  107. If you have decided on the prerequisites you can tell what RRs should
  108. be added or deleted. The next table shows the options you have and
  109. what functions to call.
  110. 3.4.2.6 - Table Of Metavalues Used In Update Section
  111. CLASS TYPE RDATA Meaning Function
  112. ---------------------------------------------------------------
  113. ANY ANY empty Delete all RRsets from name dns.RemoveName
  114. ANY rrset empty Delete an RRset dns.RemoveRRset
  115. NONE rrset rr Delete an RR from RRset dns.Remove
  116. zone rrset rr Add to an RRset dns.Insert
  117. TRANSACTION SIGNATURE
  118. An TSIG or transaction signature adds a HMAC TSIG record to each message sent.
  119. The supported algorithms include: HmacMD5, HmacSHA1, HmacSHA256 and HmacSHA512.
  120. Basic use pattern when querying with a TSIG name "axfr." (note that these key names
  121. must be fully qualified - as they are domain names) and the base64 secret
  122. "so6ZGir4GPAqINNh9U5c3A==":
  123. If an incoming message contains a TSIG record it MUST be the last record in
  124. the additional section (RFC2845 3.2). This means that you should make the
  125. call to SetTsig last, right before executing the query. If you make any
  126. changes to the RRset after calling SetTsig() the signature will be incorrect.
  127. c := new(dns.Client)
  128. c.TsigSecret = map[string]string{"axfr.": "so6ZGir4GPAqINNh9U5c3A=="}
  129. m := new(dns.Msg)
  130. m.SetQuestion("miek.nl.", dns.TypeMX)
  131. m.SetTsig("axfr.", dns.HmacMD5, 300, time.Now().Unix())
  132. ...
  133. // When sending the TSIG RR is calculated and filled in before sending
  134. When requesting an zone transfer (almost all TSIG usage is when requesting zone transfers), with
  135. TSIG, this is the basic use pattern. In this example we request an AXFR for
  136. miek.nl. with TSIG key named "axfr." and secret "so6ZGir4GPAqINNh9U5c3A=="
  137. and using the server 176.58.119.54:
  138. t := new(dns.Transfer)
  139. m := new(dns.Msg)
  140. t.TsigSecret = map[string]string{"axfr.": "so6ZGir4GPAqINNh9U5c3A=="}
  141. m.SetAxfr("miek.nl.")
  142. m.SetTsig("axfr.", dns.HmacMD5, 300, time.Now().Unix())
  143. c, err := t.In(m, "176.58.119.54:53")
  144. for r := range c { ... }
  145. You can now read the records from the transfer as they come in. Each envelope is checked with TSIG.
  146. If something is not correct an error is returned.
  147. Basic use pattern validating and replying to a message that has TSIG set.
  148. server := &dns.Server{Addr: ":53", Net: "udp"}
  149. server.TsigSecret = map[string]string{"axfr.": "so6ZGir4GPAqINNh9U5c3A=="}
  150. go server.ListenAndServe()
  151. dns.HandleFunc(".", handleRequest)
  152. func handleRequest(w dns.ResponseWriter, r *dns.Msg) {
  153. m := new(dns.Msg)
  154. m.SetReply(r)
  155. if r.IsTsig() != nil {
  156. if w.TsigStatus() == nil {
  157. // *Msg r has an TSIG record and it was validated
  158. m.SetTsig("axfr.", dns.HmacMD5, 300, time.Now().Unix())
  159. } else {
  160. // *Msg r has an TSIG records and it was not valided
  161. }
  162. }
  163. w.WriteMsg(m)
  164. }
  165. PRIVATE RRS
  166. RFC 6895 sets aside a range of type codes for private use. This range
  167. is 65,280 - 65,534 (0xFF00 - 0xFFFE). When experimenting with new Resource Records these
  168. can be used, before requesting an official type code from IANA.
  169. see http://miek.nl/2014/September/21/idn-and-private-rr-in-go-dns/ for more
  170. information.
  171. EDNS0
  172. EDNS0 is an extension mechanism for the DNS defined in RFC 2671 and updated
  173. by RFC 6891. It defines an new RR type, the OPT RR, which is then completely
  174. abused.
  175. Basic use pattern for creating an (empty) OPT RR:
  176. o := new(dns.OPT)
  177. o.Hdr.Name = "." // MUST be the root zone, per definition.
  178. o.Hdr.Rrtype = dns.TypeOPT
  179. The rdata of an OPT RR consists out of a slice of EDNS0 (RFC 6891)
  180. interfaces. Currently only a few have been standardized: EDNS0_NSID
  181. (RFC 5001) and EDNS0_SUBNET (draft-vandergaast-edns-client-subnet-02). Note
  182. that these options may be combined in an OPT RR.
  183. Basic use pattern for a server to check if (and which) options are set:
  184. // o is a dns.OPT
  185. for _, s := range o.Option {
  186. switch e := s.(type) {
  187. case *dns.EDNS0_NSID:
  188. // do stuff with e.Nsid
  189. case *dns.EDNS0_SUBNET:
  190. // access e.Family, e.Address, etc.
  191. }
  192. }
  193. SIG(0)
  194. From RFC 2931:
  195. SIG(0) provides protection for DNS transactions and requests ....
  196. ... protection for glue records, DNS requests, protection for message headers
  197. on requests and responses, and protection of the overall integrity of a response.
  198. It works like TSIG, except that SIG(0) uses public key cryptography, instead of the shared
  199. secret approach in TSIG.
  200. Supported algorithms: DSA, ECDSAP256SHA256, ECDSAP384SHA384, RSASHA1, RSASHA256 and
  201. RSASHA512.
  202. Signing subsequent messages in multi-message sessions is not implemented.
  203. */
  204. package dns