Skip to content

Latest commit

 

History

History
 
 

drill

Folders and files

NameName
Last commit message
Last commit date

parent directory

..
 
 
 
 

drill

drill is a tool from ldns that is a replacement for dig. It supports DNSSEC out of the box.

Usage

Lookup a name:

$ docker run drill google.com
; ->>HEADER<<- opcode: QUERY, rcode: NOERROR, id: 60045
;; flags: qr rd ra ; QUERY: 1, ANSWER: 1, AUTHORITY: 0, ADDITIONAL: 0
;; QUESTION SECTION:
;; google.com.	IN	A

;; ANSWER SECTION:
google.com.	213	IN	A	216.58.208.78

;; AUTHORITY SECTION:

;; ADDITIONAL SECTION:

;; Query time: 30 msec
;; SERVER: 192.168.64.1
;; WHEN: Wed Jan  6 12:53:51 2016
;; MSG SIZE  rcvd: 44

See the full list of options:

$ docker run drill -h
/usr/bin/drill version 1.6.17 (ldns version 1.6.17)
Written by NLnet Labs.

Copyright (c) 2004-2008 NLnet Labs.
Licensed under the revised BSD license.
There is NO warranty; not even for MERCHANTABILITY or FITNESS
FOR A PARTICULAR PURPOSE.
  Usage: /usr/bin/drill name [@server] [type] [class]
	<name>  can be a domain name or an IP address (-x lookups)
	<type>  defaults to A
	<class> defaults to IN

	arguments may be placed in random order

  Options:
	-D		enable DNSSEC (DO bit)
	-T		trace from the root down to <name>
	-S		chase signature(s) from <name> to a know key [*]
	-I <address>	source address to query from
	-V <number>	verbosity (0-5)
	-Q		quiet mode (overrules -V)

	-f file		read packet from file and send it
	-i file		read packet from file and print it
	-w file		write answer packet to file
	-q file		write query packet to file
	-h		show this help
	-v		show version

  Query options:
	-4		stay on ip4
	-6		stay on ip6
	-a		fallback to EDNS0 and TCP if the answer is truncated
	-b <bufsize>	use <bufsize> as the buffer size (defaults to 512 b)
	-c <file>	use file for rescursive nameserver configuration
			(/etc/resolv.conf)
	-k <file>	specify a file that contains a trusted DNSSEC key [**]
			Used to verify any signatures in the current answer.
			When DNSSEC enabled tracing (-TD) or signature
			chasing (-S) and no key files are given, keys are read
			from: /etc/unbound/root.key
	-o <mnemonic>	set flags to:
			[QR|qr][AA|aa][TC|tc][RD|rd][CD|cd][RA|ra][AD|ad]
			lowercase: unset bit, uppercase: set bit
	-p <port>	use <port> as remote port number
	-s		show the DS RR for each key in a packet
	-u		send the query with udp (the default)
	-x		do a reverse lookup
	when doing a secure trace:
	-r <file>	use file as root servers hint file
	-t		send the query with tcp (connected)
	-d <domain>	use domain as the start point for the trace
	-y <name:key[:algo]>	specify named base64 tsig key, and optional an
			algorithm (defaults to hmac-md5.sig-alg.reg.int)
	-z		don't randomize the nameservers before use

  [*] = enables/implies DNSSEC
  [**] = can be given more than once

  [email protected] | http://www.nlnetlabs.nl/ldns/