Sponsor:

Your company here, and a link to your site. Click to find out more.

genreport - Man Page

generate a report about DNS server compliance.

Synopsis

genreport [-46abBcdDeEfjLnopPRstT] [-i test] [-I test] [-m maxoutstanding] [-r server]

Description

genreport tests DNS servers responses to a variety of different queries and remotes if the response is compliant with the relevant RFCs.

genreport takes a list of zone names with optional server names and/or IP address (one per line). If only the zone name is provided the list of name servers for the zone will be looked up followed by the addresses of all the servers for those name servers. If the zone and name server name is specified then only the addresses of that name server will be used for testing. If zone, server and address are given then only that address will be used for testing. The server is a placeholder field.

There are four grouping of tests EDNS (default), FULL (includes EDNS), COMMON and TYPE.

Options are order dependent.

Options

-4

only query IPv4 servers.

-6

only query IPv6 servers.

-a

only emit 'all ok' rather than a result for each sub test.

-A

only emit 'all (ok|refused|servfail|timeout)' rather than a result for each sub test taking into account EDNS version processing.

-b

only emit bad servers.

-B

only emit bad tests.

-c

add common queries to the set of tests to be made.

-d

enable debugging.

-D

list tests and matching dig command

-e

edns test.

-E

EDNS only. Only emit a report if there has been a valid EDNS response.

-f

add full mode tests (includes edns).

-g

look for glue (nameserver, address pairs) then qualify matching zone, ns pairs.

-G

only use glue to qualify zone, ns pairs.

-i test

add a individual test.

-I test

remove a individual test.

-h

emit json.

-L

list tests and their grouping.

-m maxoutstanding

set the maximum number of outstanding DNS queries in progress.

-n

report the NSID value if found.

-o

restore the output order rather than printing each server as the tests for that server complete.

-p

run tests in parallel.

-P port

specify a alternate port to query (default 53).

-r server

use specified recursive server to look up name servers for a zone and addresses.

-R

run recursive tests.

-s

serialize tests.

-t

type tests (serial) - test the server's handling of different query types. This disables any previous -c, -e (default), and -f switch. To get TYPE test with EDNS, FULL or COMM tests you need to specify them after the -t switch.

-T

print type list for type test (-t).

-u

only test a IP address once.

-U

delay between UDP requests to a server in milliseconds (default: 113, range: [0..1000]).

Examples

Test all servers for a zone

% echo isc.org | genreport -po

This runs all the tests in parallel against a server (-p) and the output order (-o) is preserved.

Test a specific server for a zone by name

% echo isc.org ams.sns-pb.isc.org | genreport

Test a specific server for a zone by address

% echo isc.org ams.sns-pb.isc.org 199.6.1.30 | genreport

The server name is ignored other than to be placed in the report.

Test all servers in the root zone

% dig axfr . | awk '$4 == "NS" { print $1, $5 }' > list
% genreport -so < list

This generates a seperate list as the AXFR will timeout when the pipeline stalls. The tests are run in serial (-s) against a server and the output is reordered to preserve the input order (-o).

Test all servers in the root zone against the in-zone address records

% dig axfr . |
> tr '[a-z]' '[A-Z]' |
> awk '$4 == "NS" {
> ns[$1 " " $5] = $5
> }
> $4 == "A" {
> if (a[$1]) {
> a[$1] = a[$1] " " $5
> } else {
> a[$1] = $5
> }
> }
> $4 == "AAAA" {
> if (aaaa[$1]) {
> aaaa[$1] = aaaa[$1] " " $5
> } else {
> aaaa[$1] = $5
> }
> }
> END {
> for (n in ns) {
> split(n, k, " ")
> if (a[k[2]]) {
> split(a[k[2]], l, " ")
> for (m in l) print(n, l[m])
> }
> if (aaaa[k[2]]) {
> split(aaaa[k[2]], l, " ")
> for (m in l) print(n, l[m])
> }
> }
> }' |
> sort > list
% genreport -so < list

Test all the root servers handling of different query types.

echo . | genreport -ta

As the type list is long we also collapse the output to "all ok" (-a) if all subtests to a particular server succeed.

Test all the glue servers in a zone.

% dig axfr zone > file
% ( awk '$4 == "A" || $4 == "AAAA" { print $1, $5 }' file;
> awk '$4 == "NS" { print $1, $5 }' file ) | genreport -gG

Test a recursive server

For this you should give it the name of a zone with DNSSEC records if possible.

echo isc.org localhost | genreport -R

or

echo isc.org . <address of server> | genreport -R

Tests

dns EDNS

Send a plain DNS query with type code SOA.

aa FULL

Send a plain DNS query with type code SOA and AA set to 1.

ad FULL

Send a plain DNS query with type code SOA and AD set to 1.

cd FULL

Send a plain DNS query with type code SOA and CD set to 1.

ra FULL

Send a plain DNS query with type code SOA and RA set to 1.

rd FULL

Send a plain DNS query with type code SOA and RD set to 1.

tc FULL

Send a plain DNS query with type code SOA and TC set to 1.

zflag FULL

Send a plain DNS query with type code SOA and the remaining reserved DNS header flag set to 1.

opcode FULL

Send a request with a unknown opcode (15).

opcodeflg FULL

Send a request with a unknown opcode (15) and the following flag bits set to 1 (tc, rd, ra, cd, ad, aa, and z).

type666 FULL

Send a plain DNS query with type code 666. This is used to test unknown type code handling.

tcp FULL

Send a plain DNS query with type code SOA over TCP.

edns EDNS

Send a EDNS version 0 query with type code SOA.

edns1 EDNS

Send a EDNS query with a unknown version (1) and type code SOA.

edns@512 EDNS

Send a EDNS version 0 query with type code DNSKEY, DO set to 1 and the EDNS buffer size set to 512. This query is attempting to elicit a truncated EDNS response.

ednsopt EDNS

Send a EDNS version 0 query with type code SOA and a undefined EDNS option code (100).

edns1opt EDNS

Send a EDNS query with a unknown version (1), type code SOA and a undefined EDNS option code (100).

do EDNS

Send a EDNS version 0 query with type code SOA and DO set to 1.

docd FULL

Send a FULL version 0 query with type code SOA, DO set to 1 and CD set to 1.

edns1do FULL

Send a EDNS query with a unknown version (1), type code SOA and DO set to 1.

ednsflags EDNS

Send a EDNS version 0 query with type code SOA and a undefined EDNS flag bit set to 1.

optlist EDNS

Send a EDNS version 0 query with type code SOA and EDNS options NSID, ECS, EXPIRE, and COOKIE.

ednsnsid FULL

Send a EDNS version 0 query with type code SOA and EDNS option NSID.

ednscookie FULL

Send a EDNS version 0 query with type code SOA and EDNS option COOKIE.

ednsexpire FULL

Send a EDNS version 0 query with type code SOA and EDNS option EXPIRE.

ednssubnet FULL

Send a EDNS version 0 query with type code SOA and EDNS option ECS.

edns1nsid FULL

Send a EDNS query with a unknown version (1), type code SOA and EDNS option NSID.

edns1cookie FULL

Send a EDNS query with a unknown version (1), type code SOA and EDNS option COOKIE.

edns1expire FULL

Send a EDNS query with a unknown version (1), type code SOA and EDNS option EXPIRE.

edns1subnet FULL

Send a EDNS query with a unknown version (1), type code SOA and EDNS option ECS.

ednstcp EDNS

Send a EDNS version 0 query with type code SOA over TCP.

bind11 COMM

Send a query that is typical of what named from BIND 9.11 sends.

dig11 COMM

Send a query that is typical of what dig from BIND 9.11 sends.

dnswkk

Send a plain DNS request with TSIG signature. The key is name is ".", the algorithm is "hmac-sha256", the secret is 0-32 zero bytes.

icmp

Send a icmp / icmp6 echo request.

A TYPE

Send a plain DNS query with type code A.

NS TYPE

Send a plain DNS query with type code NS.

MD TYPE

Send a plain DNS query with type code MD.

MF TYPE

Send a plain DNS query with type code MF.

CNAME TYPE

Send a plain DNS query with type code CNAME.

SOA TYPE

Send a plain DNS query with type code SOA.

MB TYPE

Send a plain DNS query with type code MB.

MG TYPE

Send a plain DNS query with type code MG.

MR TYPE

Send a plain DNS query with type code MR.

NULL TYPE

Send a plain DNS query with type code NULL.

WKS TYPE

Send a plain DNS query with type code WKS.

PTR TYPE

Send a plain DNS query with type code PTR.

HINFO TYPE

Send a plain DNS query with type code HINFO.

MINFO TYPE

Send a plain DNS query with type code MINFO.

MX TYPE

Send a plain DNS query with type code MX.

TXT TYPE

Send a plain DNS query with type code TXT.

RP TYPE

Send a plain DNS query with type code RP.

AFSDB TYPE

Send a plain DNS query with type code AFSDB.

X25 TYPE

Send a plain DNS query with type code X25.

ISDN TYPE

Send a plain DNS query with type code ISDN.

RT TYPE

Send a plain DNS query with type code RT.

NSAP TYPE

Send a plain DNS query with type code NSAP.

NSAP-PTR TYPE

Send a plain DNS query with type code NSAP-PTR.

SIG TYPE

Send a plain DNS query with type code SIG.

KEY TYPE

Send a plain DNS query with type code KEY.

PX TYPE

Send a plain DNS query with type code PX.

GPOS TYPE

Send a plain DNS query with type code GPOS.

AAAA TYPE

Send a plain DNS query with type code AAAA.

LOC TYPE

Send a plain DNS query with type code LOC.

NXT TYPE

Send a plain DNS query with type code NXT.

SRV TYPE

Send a plain DNS query with type code SRV.

NAPTR TYPE

Send a plain DNS query with type code NAPTR.

KX TYPE

Send a plain DNS query with type code KX.

CERT TYPE

Send a plain DNS query with type code CERT.

A6 TYPE

Send a plain DNS query with type code A6.

DNAME TYPE

Send a plain DNS query with type code DNAME.

APL TYPE

Send a plain DNS query with type code APL.

DS TYPE

Send a plain DNS query with type code DS.

SSHFP TYPE

Send a plain DNS query with type code SSHFP.

IPSECKEY TYPE

Send a plain DNS query with type code IPSECKEY.

RRSIG TYPE

Send a plain DNS query with type code RRSIG.

NSEC TYPE

Send a plain DNS query with type code NSEC.

DNSKEY TYPE

Send a plain DNS query with type code DNSKEY.

DHCID TYPE

Send a plain DNS query with type code DHCID.

NSEC3 TYPE

Send a plain DNS query with type code NSEC3.

NSEC3PARAM TYPE

Send a plain DNS query with type code NSEC3PARAM.

TLSA TYPE

Send a plain DNS query with type code TLSA.

SMIMEA TYPE

Send a plain DNS query with type code SMIME.

HIP TYPE

Send a plain DNS query with type code HIP.

CDS TYPE

Send a plain DNS query with type code CDS.

CDNSKEY TYPE

Send a plain DNS query with type code CDNSKEY.

OPENPGPKEY TYPE

Send a plain DNS query with type code OPENPGPKEY.

SPF TYPE

Send a plain DNS query with type code SPF.

NID TYPE

Send a plain DNS query with type code NID.

L32 TYPE

Send a plain DNS query with type code L32.

L64 TYPE

Send a plain DNS query with type code L64.

LP TYPE

Send a plain DNS query with type code LP.

EUI48 TYPE

Send a plain DNS query with type code EUI48.

EUI64 TYPE

Send a plain DNS query with type code EUI64.

URI TYPE

Send a plain DNS query with type code URI.

CAA TYPE

Send a plain DNS query with type code CAA.

AVC TYPE

Send a plain DNS query with type code AVC.

DOA TYPE

Send a plain DNS query with type code DOA.

DLV TYPE

Send a plain DNS query with type code DLV.

TYPE1000 TYPE

Send a plain DNS query with type code 1000. This is used to test unknown type code handling.

See Also

dig(1), named(8).

Info

January 2024 Internet Systems Consortium genreport(1)