Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Add DNSSEC Support #32

Open
wants to merge 2 commits into
base: master
Choose a base branch
from
Open

Conversation

techguy613
Copy link

  • Add DNSSEC_ALGO_NAME_TO_NAME, DNSKEY_NAME_TO_NUM and DIGEST_TO_NUM to consts for DNSSEC support (and reverse_maps)
  • Add function hasType() to packet.js
  • Add ad and cd packet header fields
  • Export LABEL_POINTER, isPointer, nameUnpack(), and namePack()
  • Undate nameUnpack() to return raw name data
  • Update namePack() to handle isCanonical correctly (allows for name reuse)
  • Add parseTypeBitmap(), writeTypeBitmap() and mapToWire() to support NSEC/NSEC3 type bitmap use
  • Add WRITE_DS, WRITE_RRSIG, WRITE_DNSKEY, WRITE_NSEC3 and WRITE_SEC3PARAM state determination variables
  • Add PARSE_DS, PARSE_RRSIG, PARSE_DNSKEY, PARSE_NSEC, PARSE_NSEC3 and PARSE_SEC3PARAM state determination variables
  • Add writeRrsig(), writeDs(), writeDnskey(), writeNsec(), writeNserv3() and writeNsec3Param functions
  • Add parseDs(), parseRrsig(), parseDnskey(), parseNsec(), parseNsec3() and parseNsec3param() functions
  • Handle packet.do flag setting edns.ttl flag for DNSSEC
  • Update write() to handle DS, RRSIG, DNSKEY, NSEC3 and NSEC3PARAM message types
  • Update parse() to handle DS, RRSIG, DNSKEY, NSEC, NSEC3, and NSEC3PARAM message types
  • Change parseQuestion() and parseRR() to handle nameUnpack() raw return
  • Update various parse*() functions to handle raw return value in addition to existing name return
  • Added utility buildDnssecRequestPacket() to packet.js
  • Updated unittests to handle removing raw data
  • Update all fixtures/*.js names to end in a '.' correctly
  • Update _xmpp-server._tcp.gmail.srv.bin with new response, which uses compressed names correctly

Matt David added 2 commits July 28, 2016 18:34
- Add DNSSEC_ALGO_NAME_TO_NAME, DNSKEY_NAME_TO_NUM and DIGEST_TO_NUM to consts for DNSSEC support (and reverse_maps)
- Add function hasType() to packet.js
- Add ad and cd packet header fields
- Export LABEL_POINTER, isPointer, nameUnpack(), and namePack()
- Undate nameUnpack() to return raw name data
- Update namePack() to handle isCanonical correctly (allows for name reuse)
- Add parseTypeBitmap(), writeTypeBitmap() and mapToWire() to support NSEC/NSEC3 type bitmap use
- Add WRITE_DS, WRITE_RRSIG, WRITE_DNSKEY, WRITE_NSEC3 and WRITE_SEC3PARAM state determination variables
- Add PARSE_DS, PARSE_RRSIG, PARSE_DNSKEY, PARSE_NSEC, PARSE_NSEC3 and PARSE_SEC3PARAM state determination variables
- Add writeRrsig(), writeDs(), writeDnskey(), writeNsec(), writeNserv3() and writeNsec3Param functions
- Add parseDs(), parseRrsig(), parseDnskey(), parseNsec(), parseNsec3() and parseNsec3param() functions
- Handle packet.do flag setting edns.ttl flag for DNSSEC
- Update write() to handle DS, RRSIG, DNSKEY, NSEC3 and NSEC3PARAM message types
- Update parse() to handle DS, RRSIG, DNSKEY, NSEC, NSEC3, and NSEC3PARAM message types
- Change parseQuestion() and parseRR() to handle nameUnpack() raw return
- Update various parse*() functions to handle raw return value in addition to existing name return
- Added utility buildDnssecRequestPacket() to packet.js
- Updated unittests to handle removing raw data
- Update all fixtures/*.js names to end in a '.' correctly
- Update _xmpp-server._tcp.gmail.srv.bin with new response, which uses compressed names correctly
@FLYBYME
Copy link

FLYBYME commented Apr 15, 2017

This looks very nice. Do you have an example of this code been used?

@techguy613
Copy link
Author

techguy613 commented Dec 15, 2017

Hey @FLYBYME, I have since left my previous company where I was trying to use this update and I did have some code using this, but I don't believe I have access to it anymore. Apologies for my severe lag on this, but I've been working less on OSS stuff recently and only just today logged into GitHub.

Do we know if it's possible to get this merged at some point? @tjfontaine, if you're not going to actively manage these DNS repos, perhaps you might want to add some other project participants?

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

2 participants