Dig Introduction: Dig is a tool that queries DNS including NS records, A records, MX records and other related information in Unix-like command line mode. Since there is still a lack of Dig man page documentation, this article will serve as a guide to using dig. Dig's source code is part of the ISC BIND package, but most documentation on compiling and installing Bind does not include it. However, on Linux systems, it is usually part of a package, such as bind-tools in Gentoo, bind-utils in Redhat/Fedora, or dnsutils in Debian. If you are looking for information on how to configure Bind, you can refer to my article: Bind for the mall LAN (http://www.madboa.com/geek/soho-bind/). Understand the default output: The simplest and most common query is to query a single host, but by default, Dig's output is very detailed. You may not need all of the output, but it's certainly worth knowing Here is an annotated query: $ dig www.isc.org Above is the command line I used to call dig. ; <<>> DiG 9.2.3 <<>> www.isc.org ;; global options: printcmd Part of the dig output tells us some information about its version (version 9.2.3) and global settings. If +nocmd is the first parameter in the command line, then this part of the output can be queried by adding +nocmd. ;; Got answer: ;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 43071 ;; flags: qr rd ra; QUERY: 1, ANSWER: 1, AUTHORITY: 3, ADDITIONAL: 3 Here, Dig tells us some technical information returned from DNS. This information can be controlled by the option +[no]comments, but be careful, disabling comments may also turn off some other options. ;; QUESTION SECTION: ;www.isc.org. IN A In this query section, Dig displays the output of our query. The default query is to query A records. You can display or disable these with the +[no]question option. ;; ANSWER SECTION: www.isc.org. 600 IN A 204.152.184.88 Finally, we get the results of our query. The address of www.isc.org is 204.152.184.8. I don't know why you prefer to filter out this output, but you can keep these options with +[no]answer. ;; AUTHORITY SECTION: isc.org. 2351 IN NS ns-int.isc.org. isc.org. 2351 IN NS ns1.gnac.com. isc.org. 2351 IN NS ns-ext.isc.org. This authoritative statement tells us which DNS server provides us with the authoritative answer. In this example, isc.org has 3 Name Servers. You can use the +[no]authority option to keep this output. ;; ADDITIONAL SECTION: ns1.gnac.com. 171551 IN A 209.182.216.75 ns-int.isc.org. 2351 IN A 204.152.184.65 ns-int.isc.org. 2351 IN AAAA 2001:4f8:0:2::15 These additional options typically include the IP addresses of the authoritative DNS servers listed, and this output can be preserved using the +[no]additional option. ;; Query time: 2046 msec ;; SERVER: 127.0.0.1#53(127.0.0.1) ;; WHEN: Fri Aug 27 08:22:26 2004 ;; MSG SIZE rcvd: 173 The last section of the default output contains query statistics, which can be retained with +[no]stats. What can we query? Dig allows you to efficiently query DNS. The most commonly used queries are A records, TXT (text comments), MX records, NS records, or any comprehensive query. Find the A record of yahoo.com: (This must be the domain, not the host, such as my company is xinpindao.com) Find a list of yahoo.com MX records: Find the authoritative DNS for yahoo.com: Query all the above records: In the current situation where IPv4 and IPV6 are mixed, you can also use the AAAA option to query the host's IPv6 AAAA record: dig www.isc.org AAAA +short If the domain you want to query allows forwarding, you can also query related information, such as the lifetime of the DNS record on the Internet, but now only a few DNS allow unlimited forwarding. How do we check? Want a concise answer? When we need a quick answer, the +short option is your best friend: dig www.isc.org +short 204.152.184.88 Got a not-so-succinct answer? There is a difference between having a concise answer and having only one answer. The way to get a detailed answer without the additional information is to use the +noall option, which keeps only the output you want. $ dig fsf.org mx +short 20 mx20.gnu.org. 30 mx30.gnu.org. 10 mx10.gnu.org. $ dig +nocmd fsf.org mx +noall +answer fsf.org. 3583 IN MX 30 mx30.gnu.org. fsf.org. 3583 IN MX 10 mx10.gnu.org. fsf.org. 3583 IN MX 20 mx20.gnu.org. Want a detailed answer? Through its man page, you can get a lengthy multi-line human-friendly commentary of the DSN's SOA record with the +multiline option. Generally speaking, the information obtained with the +multiline option can display a lot, just like the BIND configuration file. $ dig +nocmd ogi.edu any +multiline +noall +answer ogi.edu. 14267 IN A 129.95.59.31 ogi.edu. 14267 IN MX 5 cse.ogi.edu. ogi.edu. 14267 IN MX 15 hermes.admin.ogi.edu. ogi.edu. 14267 IN SOA zeal.admin.ogi.edu. hostmaster.admin.ogi.edu. ( 200408230 ; serial 14400; refresh (4 hours) 900 ; retry (15 minutes) 3600000; expire (5 weeks 6 days 16 hours) 14400; minimum (4 hours) ) ogi.edu. 14267 IN NS zeal.admin.ogi.edu. ogi.edu. 14267 IN NS cse.ogi.edu. ogi.edu. 14267 IN NS fork.admin.ogi.edu. Finding PTR records? You can use the -x option to find the host name of an IP address. $ dig -x 204.152.184.167 +short mx-1.isc.org. In this loop, the script flexibly maps the names in the given subnet. #!/bin/bash NET=18.7.22 for n in $(seq 1 254); do ADDR=${NET}.${n} echo -e "${ADDR}\t$(dig -x ${ADDR} +short)" done Query a different naming server? The query command is as follows: dig @ns1.google.com www.google.com Use the records in /etc/resolv.conf to query The host will automatically query the DNS record from the /etc/resolv.conf file $ host www www.madboa.com has address 65.102.49.170 However, by default, dig produces some unexpected output. If you want to search for the local host name instead of the full domain name, use the +search option dig www +search Handle most of the queries? If you want to query a large number of host names, you can store them in a text file (one record per line) and use dig with the -f parameter to query them one by one. # Query a large number of host names dig -f /path/to/host-list.txt # Same, more explicit output dig -f /path/to/host-list.txt +noall +answer But what I want to tell you is that dig 9.2.3 and later versions do not support reverse queries using the -f option. Verify DNS Mapping Incorrect DNS configuration can cause you a lot of trouble. You can verify your DNS configuration in the following two ways: 1. Each host name should be resolved to an IP address, and that IP address should also point back to that host name. 2. If an address on your subnet is pointed back to a hostname, then that hostname must also point to this IP. There are some exceptions to these two rules, such as CNAME should first resolve to another host name and can only point to one IP. Sometimes multiple host names point to the same IP address, but that IP can only have one PTR record. Together, these should help you check that your DNS mappings are working as you think they are. You can also write a test script that writes in your known hostnames, as shown below, which is very simple; when it is executed, it will break when it catches a CNAME, and it will report an error if multiple hostnames point to the same IP address. We assume that the file containing your hostnames is called named-hosts. #!/bin/bash # # test DNS forward- and reverse-mapping # # edit this variable to reflect local class C subnet(s) NETS="192.168.1 192.168.2" # Test name to address to name validity echo echo -e "\tname -> address -> name" echo '----------------------------------' while read H; do ADDR=$(dig $H +short) if test -n "$ADDR"; then HOST=$(dig -x $ADDR +short) if test "$H" = "$HOST"; then echo -e "ok\t$H -> $ADDR -> $HOST" elif test -n "$HOST"; then echo -e "fail\t$H -> $ADDR -> $HOST" else echo -e "fail\t$H -> $ADDR -> [unassigned]" fi else echo -e "fail\t$H -> [unassigned]" fi done < named-hosts # Test address to name to address validity echo echo -e "\taddress -> name -> address" echo '-------------------------------------' for NET in $NETS; do for n in $(seq 1 254); do A=${NET}.${n} HOST=$(dig -x $A +short) if test -n "$HOST"; then ADDR=$(dig $HOST +short) if test "$A" = "$ADDR"; then echo -e "ok\t$A -> $HOST -> $ADDR" elif test -n "$ADDR"; then echo -e "fail\t$A -> $HOST -> $ADDR" else echo -e "fail\t$A -> $HOST -> [unassigned]" fi fi done done Interesting dig Create your own named.root file Any DNS server connected to the internet will definitely have a copy of InterNIC's named.root file, which lists all of the internet's root DNS. If you're not afraid of the trouble, you can always download it from InterNIC's ftp server, or you can use the dig command to create your own snazzy named.root. # compare with ftp://ftp.internic.net/domain/named.root dig +nocmd . NS +noall +answer +additional Your TTL value may be very small here, but it is the latest named.root file you find! Tracking dig's query path You may be a traceroute enthusiast and often like to check how to connect point B from point A. You can do something similar using the dig +trace option. dig gentoo.de +trace You can see the root DNS in the header of the dig output, then find the DNS responsible for resolving all *.de, and finally find the domain IP of gentoo.de. Get SOA Record As a DNS administrator, I sometimes make changes and want to know if my DNS resolution is still pushing out old data. The +nssearch option can provide clear statistics for your public servers. # the unvarnished truth dig cse.ogi.edu +nssearch # the same, displaying only serial number and hostname dig cse.ogi.edu +nssearch | cut -d' ' -f4,11 Interpreting TTL Values I love google for many reasons, one of which is that it provides precise links in my web logs, making it easy for me to pinpoint what types of queries led people to the pages on this site. Surprisingly, I’ve seen a lot of requests for TTL values. I never thought TTL would become the most popular thing, but you learn new things every day, so here’s a little introduction to TTL by popular request. If you query an Internet address from your local DNS, the server figures out where to get the authoritative answer and gets the address. Once the server knows the answer, it saves the answer in a local cache to prevent you from querying the same address again at a later time. This way it will quickly get the answer you want from the cache, much faster than if you query it again from the Internet. When domain administrators configure DNS records, they can decide how long the record should be kept in the cache. This is the TTL value (usually expressed in seconds). Typically, remote servers only cache records for as long as the TTL value. After the time expires, the server refreshes its local cache and requeries for an authoritative answer. When you use dig to query a DNS server for a record, the server tells dig how long the record can be kept in the cache. For example, as written above, the TTL value of the MX record of the gmail.com domain is 300s. The administrator of the gmail.com domain requires that the remote server cache its MX record cannot exceed 5 minutes, so when you query that record (gmail.com's MX record) for the first time, dig will tell you a TTL of 300. $ dig +nocmd gmail.com MX +noall +answer gmail.com. 300 IN MX 20 gsmtp57.google.com. gmail.com. 300 IN MX 10 gsmtp171.google.com. If you check again after a while, you will find that the TTL value has been reduced to 280 (with a 20s interval). $ dig +nocmd gmail.com MX +noall +answer gmail.com. 280 IN MX 10 gsmtp171.google.com. gmail.com. 280 IN MX 20 gsmtp57.google.com. If your timings are calculated well enough, you will get the last lifetime of the record. $ dig +nocmd gmail.com MX +noall +answer gmail.com. 1 IN MX 10 gsmtp171.google.com. gmail.com. 1 IN MX 20 gsmtp57.google.com. After that, the DNS server you query will "forget" the answer to this question, and the next time you query this record, the whole cycle will start again (300s in this example). In Unix and Linux, it is recommended that you use the dig command instead of nslookup. The dig command is much more powerful than nslookup. It is not like nslookup which requires many settings to be done, which is quite troublesome. Here are some of the more commonly used dig commands: # The most basic usage of dig: dig @server qianlong.com # Use dig to view zone data transmission dig @server qianlong.com AXFR # Use dig to view the incremental transmission of zone data dig @server qianlong.com IXFR=N # Use dig to view reverse resolution dig -x 124.42.102.203 @server # Find the authoritative DNS server for a domain dig qianlong.com +nssearch # Trace the resolution process of a domain name from the root server dig qianlong.com +trace # Check which F root dns server you are using dig +norec @F.ROOT-SERVERS.NET HOSTNAME.BIND CHAOS TXT # Check the version number of bind dig @bind_dns_server CHAOS TXT version.bind ******************************** use DNS query utility. grammar dig [@server] [-b address] [-c class] [-f filename] [-k filename] [ -n ][-p port#] [-t type] [-x addr] [-y name:key] [name] [type] [class] [queryopt...] dig [-h] dig [global-queryopt...] [query...] describe The dig (Domain Information Searcher) command is a flexible tool for interrogating DNS name servers. It performs a DNS search and displays the responses returned from the requested name servers. Most DNS administrators use dig for troubleshooting DNS problems because of its flexibility, ease of use, and clear output. Although dig is typically used with command-line arguments, it can also read search requests from a file in batch mode. Unlike earlier versions, the BIND9 implementation of dig allows multiple queries to be issued from the command line. Unless told to ask for specific name servers, dig will try all servers listed in /etc/resolv.conf. When no command-line arguments or options are specified, dig performs an NS query for "." (root). Logo -b address Set the source IP address of the address to be queried. This must be a valid address on the host's network interface. parameter global-queryopt... Global query options (see Multiple Queries). Query query options (see Query options). Query Options dig provides query option numbers that affect the way searches are performed and the display of results. Some set or reset flags in the query request header, some determine which reply messages are displayed, and others determine timeout and retry strategies. Each query option is identified by a keyword prefixed with a (+). Some keywords set or reset an option. Usually the prefix is the string no which negates the meaning of the keyword. Other keywords assign values to options, such as the timeout interval. Their format is +keyword=value. The query options are: Multiple queries BIND9 of dig supports specifying multiple queries on the command line (with the added functionality of supporting the -f batch file option). Each query can use its own flags, options, and query options. In this case, in the command-line syntax described above, each query argument represents an individual query. Each entry consists of any standard options and flags, the name of the query to be queried, an optional query type and class, and any query options applicable to the query. You can also use a global set of query options that apply to all queries. Global query options must precede the first tuple of name, class, type, options, flags, and query options on the command line. Any of the global query options (except the +[no]cmd option) can be overridden by the query-specific options below. For example: dig +qr www.isc.org any -x 127.0.0.1 isc.org ns +noqr shows how dig can perform three queries from the command line: an any query for www.isc.org, a reverse query for 127.0.0.1, and a query for the NS records of isc.org. The global query option of +qr is applied so that dig displays the initial query for each query. The last query has a local query option of +noqr, which tells dig not to display the initial query when searching for isc.org's NS records. Example A typical dig call looks like: dig @server name type where: server The name or IP address of the name server to be queried. This can be dot-separated IPv4 addresses or colon-separated IPv6 addresses. When the server argument is provided by the host, dig resolves that name before querying the name servers. If no server arguments are given, dig consults /etc/resolv.conf and queries the name servers listed there. Displays the reply from the name server. name type The above is the full content of this article. I hope it will be helpful for everyone’s study. I also hope that everyone will support 123WORDPRESS.COM. |
<<: Implementation of drawing audio waveform with wavesurfer.js
>>: MySQL 5.7.18 installation tutorial under Windows
Table of contents 1. Overview of Docker consul 2....
1. Installation Instructions Compared with local ...
1. Introduction Sometimes, after the web platform...
To beautify the table, you can set different bord...
The configuration method of MySQL 5.5.56 free ins...
Table of contents 1. Introduce according to the o...
Preface: As a giant in the IT industry, Microsoft...
vsftpd Overview vsftpd is the abbreviation of &qu...
Today I got familiar with the mouse zooming effect...
1. What is it? MySQL is the most popular relation...
One of the most important features of a style she...
When inserting data, I found that I had never con...
This article shares the specific code for the WeC...
Table of contents javascript tamper-proof object ...
1. Methods for implementing components:組件名稱首字母必須大...