6EPPDZMAPUJ6BUZLSERYGGHMORLURA6AFDEVVJVNWQXIBI4WFS3AC
YZHTZIZJGZH543JVPRXDMAGZMTSVCOMI2RXRDAOIVYRV65ENWWWAC
BXUV5DE25AR5FPXPHEOBOF4ZIXY2LSILNC7KIT4TD3EYTC3IWTUQC
CHTEJVPDN5R2SQTOCK3SNAME5V5XCB6TRGRBCY55DJ3UQJ73QG6AC
Q2YTDYKLSHITWAY5RNXWDWHZTOQG4JQSVF4BQAPFAIS3LSPOEKNAC
SOBMS3ZSY5GBBYDR2UQT7CVGYIS755OUOLBLRZQ5XJ537I2KAXGAC
AG75B5MP2SIBV5J6QVJTBBOKKDCURKDEXJCXD2TJIMM4PLSMRQ7QC
IA2XQX25QP6Z2DHUCMVBSW536BL2JDG4UHCBSKHZRKUEXIIMLUSQC
for rtype in args.rtypes.into_iter() {
let q = naughty_question(rtype);
assert!(resolv.query(q).await.is_err());
for rtype in args.rtypes {
print!("{rtype}: ");
let q = naughty_question(&rtype);
let res = resolv.query(q).await;
match res {
Err(e) if e.kind() == tokio::io::ErrorKind::TimedOut => {
println!("server ignored us!")
}
Err(e) => Err(e)?,
Ok(answer) => {
println!("{:?}", answer.as_octets())
}
};
There seems to be a defect-attractor in DNS-packet construction. When people writes `.`-ending in a DNS name in config (eg in order to avoid search-suffix behaviour), some software will construct an invalid DNS question:
There is a defect-attractor in DNS-packet construction. When people writes `.`-ending in a DNS name in config (eg in order to avoid search-suffix behaviour), some software will construct an invalid DNS question:
For more background, https://jvns.ca/blog/2022/09/12/why-do-domain-names-end-with-a-dot-/
There is a different case from 2001, where a (windows-based?) client sent TYPE & CLASS as little-endian, not big-endian, giving TYPE256 CLASS256 https://groups.google.com/g/comp.protocols.dns.bind/c/pIVLil7p8wA/m/Y0bxMyn5bI0J
bind9 and cloudflare DNS servers, quad-9, ???, ??? politely return `Not Implemented`, while `resolved`, google dns, adguard