[ldns-users] drill -T with CNAMEs

Willem Toorop willem at nlnetlabs.nl
Tue Jan 28 13:38:32 UTC 2014


Hi Greg,

Interesting idea.  I'll give it a shot shortly...

-- Willem

op 28-01-14 00:51, Greg Ward schreef:
> Hi all --
> 
> I'm looking for a DNS tracing tool that starts at a root nameserver,
> and follows CNAMEs all the way to a set of A (or AAAA) records. "drill
> -T", like "dig +trace", stops when it gets to a CNAME, e.g.
> 
>   $ drill -T www.microsoft.com
>   com.    172800  IN      NS      d.gtld-servers.net.
>   [...]
>   com.    172800  IN      NS      b.gtld-servers.net.
>   microsoft.com.  172800  IN      NS      ns3.msft.net.
>   microsoft.com.  172800  IN      NS      ns1.msft.net.
>   microsoft.com.  172800  IN      NS      ns5.msft.net.
>   microsoft.com.  172800  IN      NS      ns2.msft.net.
>   microsoft.com.  172800  IN      NS      ns4.msft.net.
>   www.microsoft.com.      3600    IN      CNAME   toggle.www.ms.akadns.net.
> 
> To get the answer I want -- a list of IP addressess -- I'd have to run
> "drill -T" repeatedly until I stop getting CNAMEs. No thanks! I want
> it done 1) automatically and 2) in a single process, so it doesn't
> have to hit the root and TLD nameservers repeatedly.
> 
> I don't see any options to drill that would help me. Is anyone aware
> of a drill-like tool that might help? Or a patch to drill to save me
> the time of hacking it up myself?
> 
> Thanks!
> 
> Greg
> _______________________________________________
> ldns-users mailing list
> ldns-users at open.nlnetlabs.nl
> http://open.nlnetlabs.nl/mailman/listinfo/ldns-users
> 




More information about the ldns-users mailing list