SHA256
1
0
forked from pool/dnsdiag

Accepting request 706945 from home:sebix:branches:network

update and rename to just dnsdiag

- Update to version 1.6.4:
 * no upstream changelog available

OBS-URL: https://build.opensuse.org/request/show/706945
OBS-URL: https://build.opensuse.org/package/show/network/dnsdiag?expand=0&rev=1
This commit is contained in:
Tomáš Chvátal 2019-06-06 13:03:13 +00:00 committed by Git OBS Bridge
commit 330c98fb78
8 changed files with 253 additions and 0 deletions

23
.gitattributes vendored Normal file
View File

@ -0,0 +1,23 @@
## Default LFS
*.7z filter=lfs diff=lfs merge=lfs -text
*.bsp filter=lfs diff=lfs merge=lfs -text
*.bz2 filter=lfs diff=lfs merge=lfs -text
*.gem filter=lfs diff=lfs merge=lfs -text
*.gz filter=lfs diff=lfs merge=lfs -text
*.jar filter=lfs diff=lfs merge=lfs -text
*.lz filter=lfs diff=lfs merge=lfs -text
*.lzma filter=lfs diff=lfs merge=lfs -text
*.obscpio filter=lfs diff=lfs merge=lfs -text
*.oxt filter=lfs diff=lfs merge=lfs -text
*.pdf filter=lfs diff=lfs merge=lfs -text
*.png filter=lfs diff=lfs merge=lfs -text
*.rpm filter=lfs diff=lfs merge=lfs -text
*.tbz filter=lfs diff=lfs merge=lfs -text
*.tbz2 filter=lfs diff=lfs merge=lfs -text
*.tgz filter=lfs diff=lfs merge=lfs -text
*.ttf filter=lfs diff=lfs merge=lfs -text
*.txz filter=lfs diff=lfs merge=lfs -text
*.whl filter=lfs diff=lfs merge=lfs -text
*.xz filter=lfs diff=lfs merge=lfs -text
*.zip filter=lfs diff=lfs merge=lfs -text
*.zst filter=lfs diff=lfs merge=lfs -text

1
.gitignore vendored Normal file
View File

@ -0,0 +1 @@
.osc

3
dnsdiag-1.6.4.tar.gz Normal file
View File

@ -0,0 +1,3 @@
version https://git-lfs.github.com/spec/v1
oid sha256:f50495e98928afff201516fcad89e31c80d443523f02cedc61c35961ec7bf10a
size 12338

11
dnsdiag.changes Normal file
View File

@ -0,0 +1,11 @@
-------------------------------------------------------------------
Sun Jun 2 19:04:28 UTC 2019 - Sebastian Wagner <sebix+novell.com@sebix.at>
- rename to dnsdiag instead of python-dnsdiag
- Update to version 1.6.4:
* no upstream changelog available
-------------------------------------------------------------------
Fri Nov 3 07:59:09 UTC 2017 - mardnh@gmx.de
- Initial package, version 1.6.3

79
dnsdiag.spec Normal file
View File

@ -0,0 +1,79 @@
#
# spec file for package dnsdiag
#
# Copyright (c) 2019 SUSE LINUX GmbH, Nuernberg, Germany.
# Copyright (c) 2017, Martin Hauke <mardnh@gmx.de>
#
# All modifications and additions to the file contributed by third parties
# remain the property of their copyright owners, unless otherwise agreed
# upon. The license for this file, and modifications and additions to the
# file, is the same license as for the pristine package itself (unless the
# license for the pristine package is not an Open Source License, in which
# case the license is the MIT License). An "Open Source License" is a
# license that conforms to the Open Source Definition (Version 1.9)
# published by the Open Source Initiative.
# Please submit bugfixes or comments via https://bugs.opensuse.org/
#
%bcond_without test
Name: dnsdiag
Version: 1.6.4
Release: 0
Summary: DNS request auditing toolset
License: BSD-3-Clause
Group: Development/Languages/Python
URL: https://dnsdiag.org/
Source: https://files.pythonhosted.org/packages/source/d/dnsdiag/dnsdiag-%{version}.tar.gz
Source1: dnseval.1
Source2: dnsping.1
Source3: dnstraceroute.1
BuildRequires: fdupes
BuildRequires: python3-setuptools
Requires: python3-cymruwhois >= 1.6
Requires: python3-dnspython >= 1.15.0
Provides: python3-dnsdiag = %{version}-%{release}
Obsoletes: python3-dnsdiag < %{version}-%{release}
BuildArch: noarch
%if %{with test}
BuildRequires: python3-cymruwhois >= 1.6
BuildRequires: python3-dnspython >= 1.15.0
%endif
%description
Set of tools to perform basic audits on your DNS requests and responses to make sure your DNS is working as you expect. Dnsping can be used to measure the response time of a given DNS server for arbitrary requests. Just like a traditional ping utility, it provides similar functionality for DNS requests.
Dnstraceroute can be used to trace the path a DNS request takes to destination. Its purpose is to detect whether a request is redirected or hijacked. This can be done by comparing different DNS queries being sent to the same DNS server using dnstraceroute and observe if there is any difference between the path.
dnseval evaluates multiple DNS resolvers and helps you choose the best DNS server for your network. It is highly recommended to use your own DNS resolver as opposed to a third-party DNS server, but in case you need to choose the best DNS forwarder for your network, dnseval lets you compare different DNS servers from performance (latency) and reliability (loss) point of view.
%prep
%setup -q -n dnsdiag-%{version}
%build
python3 setup.py build
%install
python3 setup.py install --prefix=%{_prefix} --root=%{buildroot}
%fdupes %{buildroot}%{python_sitelib}
mv %{buildroot}%{_bindir}/dnseval.py %{buildroot}%{_bindir}/dnseval
mv %{buildroot}%{_bindir}/dnstraceroute.py %{buildroot}%{_bindir}/dnstraceroute
mv %{buildroot}%{_bindir}/dnsping.py %{buildroot}%{_bindir}/dnsping
install -d -m0755 %{buildroot}%{_mandir}/man1/
install -m0644 %{SOURCE1} %{buildroot}%{_mandir}/man1/
install -m0644 %{SOURCE2} %{buildroot}%{_mandir}/man1/
install -m0644 %{SOURCE3} %{buildroot}%{_mandir}/man1/
%files
%doc README.md
%license LICENSE
%{_bindir}/dnseval
%{_bindir}/dnstraceroute
%{_bindir}/dnsping
%{_mandir}/man1/dnseval.1%{?ext_man}
%{_mandir}/man1/dnstraceroute.1%{?ext_man}
%{_mandir}/man1/dnsping.1%{?ext_man}
%{python_sitelib}/*
%changelog

41
dnseval.1 Normal file
View File

@ -0,0 +1,41 @@
.\" (C) Copyright 2016 Ana Custura <ana@netstat.org.uk>
.TH DNSEVAL "1" "December 3 2016" "User Commands"
.SH NAME
dnseval: \- bulk ping utility that sends an arbitrary DNS query to a list of DNS servers
.SH DESCRIPTION
dnseval is a bulk ping utility that sends an arbitrary DNS query to a given list of DNS servers. This script is meant for comparing response time of multiple DNS servers at once
.SH USAGE
usage: dnseval [\-h] [\-f server\-list] [\-c count] [\-t type] [\-w wait] hostname
.SH OPTIONS
.TP
\fB\-h\fR \fB\-\-help\fR
show this help
.TP
\fB\-f\fR \fB\-\-file\fR
dns server list to use (default: system resolvers)
.TP
\fB\-c\fR \fB\-\-count\fR
number of requests to send (default: 10)
.TP
\fB\-w\fR \fB\-\-wait\fR
maximum wait time for a reply (default: 5)
.TP
\fB\-t\fR \fB\-\-type\fR
DNS request record type (default: A)
.TP
\fB\-h\fR \fB\-\-help\fR
show this help
.TP
\fB\-f\fR \fB\-\-file\fR
dns server list to use (default: system resolvers)
.TP
\fB\-c\fR \fB\-\-count\fR
number of requests to send (default: 10)
.TP
\fB\-w\fR \fB\-\-wait\fR
maximum wait time for a reply (default: 5)
.TP
\fB\-t\fR \fB\-\-type\fR
DNS request record type (default: A)
.SH "SEE ALSO"
The full documentation for dnseval can be found at https://dnsdiag.org/

52
dnsping.1 Normal file
View File

@ -0,0 +1,52 @@
.\" (C) Copyright 2016 Ana Custura <ana@netstat.org.uk>
.TH DNSPING "1" "December 3 2016" "User Commands"
.SH NAME
dnsping \- DNS ping utility
.SH DESCRIPTION
dnsping pings a DNS resolver by sending an arbitrary DNS query for given number of times.
It calculates minimum, maximum and average response time as well as jitter (stddev).
.SH USAGE
usage: dnsping [\-h] [\-q] [\-v] [\-s server] [\-p port] [\-P port] [\-S address] [\-c count] [\-t type] [\-w wait] hostname
.SH OPTIONS
.TP
\fB\-h\fR \fB\-\-help\fR
Show this help
.TP
\fB\-q\fR \fB\-\-quiet\fR
Quiet
.TP
\fB\-v\fR \fB\-\-verbose\fR
Print actual dns response
.TP
\fB\-s\fR \fB\-\-server\fR
DNS server to use (default: first entry from \fI\,/etc/resolv.conf\/\fP)
.TP
\fB\-p\fR \fB\-\-port\fR
DNS server port number (default: 53)
.TP
\fB\-T\fR \fB\-\-tcp\fR
Use TCP instead of UDP
.TP
\fB\-4\fR \fB\-\-ipv4\fR
Use IPv4 as default network protocol
.TP
\fB\-6\fR \fB\-\-ipv6\fR
Use IPv6 as default network protocol
.TP
\fB\-P\fR \fB\-\-srcport\fR
Query source port number (default: 0)
.TP
\fB\-S\fR \fB\-\-srcip\fR
Query source IP address (default: default interface address)
.TP
\fB\-c\fR \fB\-\-count\fR
Number of requests to send (default: 10)
.TP
\fB\-w\fR \fB\-\-wait\fR
Maximum wait time for a reply (default: 5)
.TP
\fB\-t\fR \fB\-\-type\fR
DNS request record type (default: A)
.PP
.SH "SEE ALSO"
For more documentation on dnsping see https://dnsdiag.org/.

43
dnstraceroute.1 Normal file
View File

@ -0,0 +1,43 @@
.\" (C) Copyright 2016 Ana Custura <ana@netstat.org.uk>
.TH DNSTRACEROUTE "1" "December 2016" "User Commands"
.SH NAME
dnstraceroute \- DNS traceroute utility
.SH DESCRIPTION
dnstraceroute is a traceroute utility to figure out the path that a DNS request is passing through to get to its destination.
Comparing it to a network traceroute can help identify if DNS traffic is routed via any unwanted path.
.PP
.SH USAGE
usage: dnstraceroute [\-h] [\-q] [\-a] [\-s server] [\-p port] [\-c count] [\-t type] [\-w wait] hostname
.SH OPTIONS
.TP
\fB\-h\fR \fB\-\-help\fR
Show this help
.TP
\fB\-q\fR \fB\-\-quiet\fR
Quiet
.TP
\fB\-e\fR \fB\-\-expert\fR
Print expert hints if available
.TP
\fB\-a\fR \fB\-\-asn\fR
Turn on AS# lookups for each hop encountered
.TP
\fB\-s\fR \fB\-\-server\fR
DNS server to use (default: first system resolver)
.TP
\fB\-p\fR \fB\-\-port\fR
DNS server port number (default: 53)
.TP
\fB\-c\fR \fB\-\-count\fR
Maximum number of hops (default: 30)
.TP
\fB\-w\fR \fB\-\-wait\fR
Maximum wait time for a reply (default: 5)
.TP
\fB\-t\fR \fB\-\-type\fR
DNS request record type (default: A)
.TP
\fB\-C\fR \fB\-\-color\fR
Print colorful output
.SH SEE ALSO
Full Documentation available at https://dnsdiag.org/