挖掘响应中的所有标志是什么?


12

dig 响应在评论部分返回标志:

$ dig example.com +noall +comments

; <<>> DiG 9.8.3-P1 <<>> example.com +noall +comments
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 29045
;; flags: qr rd ra; QUERY: 1, ANSWER: 1, AUTHORITY: 0, ADDITIONAL: 0

在此的最后一行,有标志:

flags: qr rd ra;

挖洞有哪些可能的标志?

这是到目前为止我发现的列表:

Answers:


12

我正在使用RFC 1035作为源,从那里开始保持序列不变,无论您是否已在问题中提到它。

  • QR指定此消息是查询(0)还是响应(1)
  • OPCODE一个四位字段,仅有效值:0,1,2
  • AA权威答案
  • TC TrunCation(由于长度大于传输通道上允许的长度而被截断)
  • 要求RD递归
  • 可用RA递归
  • Z保留供将来使用。必须为零

RFC 4035中引入了另外两个与DNSSEC相关的标志:

  • CD(检查已禁用):指示安全意识解析器应禁用签名验证(即,不检查DNSSEC记录)
  • AD(真实数据):表示解析器认为响应是真实的-即已通过DNSSEC验证

10

来自:http : //www.perdisci.com/useful-links/dig-info

DIG response header:

Flags:
AA = Authoritative Answer

TC = Truncation

RD = Recursion Desired (set in a query and copied into the response if recursion is supported)

RA = Recursion Available (if set, denotes recursive query support is available)

AD = Authenticated Data (for DNSSEC only; indicates that the data was authenticated)

CD = Checking Disabled (DNSSEC only; disables checking at the receiving server)

Response code:

0 = NOERR, no error

1 = FORMERR, format error (unable to understand the query)

2 = SERVFAIL, name server problem

3= NXDOMAIN, domain name does not exist

4 = NOTIMPL, not implemented

5 = REFUSED (e.g., refused zone transfer requests)

By using our site, you acknowledge that you have read and understand our Cookie Policy and Privacy Policy.
Licensed under cc by-sa 3.0 with attribution required.