Displaying 1 to 11 from 11 results

trust-dns - A Rust based DNS client, server, and resolver

  •    Rust

A Rust based DNS client and server, built to be safe and secure from the ground up. Using the ClientFuture is safe. ClientFuture is a brand new rewrite of the old Client. It has all the same features as the old Client, but is written with the wonderful futures-rs library. Please send feedback! It currently does not cache responses, if this is a feature you'd like earlier rather than later, post a request. The validation of DNSSec is complete including NSEC. As of now NSEC3 is broken, and I may never plan to support it. I have some alternative ideas for private data in the zone. The old Client has been deprecated, so please use the ClientFuture. If this is an inconvenience, I may add a convenience wrapper around ClientFuture that would match the old Client; if this is something you would like to see, please file an issue.

dns - DNS library in Go

  •    Go

Complete and usable DNS library. All widely used Resource Records are supported, including the DNSSEC types. It follows a lean and mean philosophy. If there is stuff you should know as a DNS programmer there isn't a convenience function for it. Server side and client side programming is supported, i.e. you can build servers and resolvers with it.

statzone - DNS zone file analyzer targeted at TLD zones

  •    Go

StatZone is a DNS zone file analyzer targeted at TLD zones. It is currently used to generate TLD Zone File Statistics on StatDNS.

check_dnssec_expiry - Icinga / Nagios plugin to validate DNSSEC validity of a DNS zone.

  •    Shell

Goal of this plugin is to monitor DNSSEC validation for a given zone using a DNSSEC validating resolver. In the above snippet, replace ZONE with the zone to be checked, e.g. "example.org" and NAMESERVER with your Nameserver (basically it doesn't matter since the check is executed on the Icinga host itself in this basic setup).




check_dane - Nagios/Icinga plugin for checking DANE/TLSA records

  •    Python

Nagios/Icinga plugin for checking DANE/TLSA records. It compares the DANE/TLSA record against the TLS certificate provided by a service.

knot-resolver - Knot Resolver - resolve DNS names like it's 2018

  •    C

Knot Resolver is a caching full resolver implementation written in C and LuaJIT, both a resolver library and a daemon. The core architecture is tiny and efficient, and provides a foundation and a state-machine like API for extensions. There are three modules built-in - iterator, validator, cache, and a few more are loaded by default. Most of the rich features are written in Lua(JIT) and C. Batteries are included, but optional. The LuaJIT modules, support DNS privacy and DNSSEC, and persistent cache with low memory footprint make it a great personal DNS resolver or a research tool to tap into DNS data. TL;DR it's the OpenResty of DNS.

local-dns-resolver - Script to install a local Unbound DNS resolver on your Linux machine with DNSSEC support

  •    Shell

This script will install a local Unbound DNS resolver with DNSSEC support on your GNU/Linux computer/server, that will directly communicate with the root servers. This ensures speed, neutrality and no dependance on any third-party server (like your ISP's). The resolver is "local" because Unbound will only listen on localhost and accept requests from localhost.


getdns-node - Node.js bindings of getdns, a modern asynchronous DNS API.

  •    C++

getdns bindings for Node.js. getdns is a modern asynchronous DNS API. It implements DNS entry points from a design developed and vetted by application developers, in an API specification.

pihole-unbound - Guide to setup Unbound recursive DNS resolver with Pi-Hole

  •    

Pi-hole includes a caching and forwarding DNS server, now known as FTLDNS. After applying the blocking lists, it forwards requests made by the clients to configured upstream DNS server(s). However, as has been mentioned by several users in the past, this leads to some privacy concerns as it ultimately raises the question: Whom can you trust? Recently, more and more small (and not so small) DNS upstream providers have appeared on the market, advertising free and private DNS service, but how can you know that they keep their promises? Right, you can't. Furthermore, from the point of an attacker, the DNS servers of larger providers are very worthwhile targets, as they only need to poison one DNS server, but millions of users might be affected. Instead of your bank's actual IP address, you could be sent to a phishing site hosted on some island. This scenario has already happened and it isn't unlikely to happen again...

solvere - A validating recursive DNS resolver library and standalone server with DNSSEC support

  •    Go

A simple Golang package and standalone server for recursive DNS resolution. Golang >= 1.7 is required to make use of the new standard library context package.





We have large collection of open source products. Follow the tags from Tag Cloud >>


Open source products are scattered around the web. Please provide information about the open source projects you own / you use. Add Projects.