You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
When a DNS server responds with an EDNS-enabled message (containing an OPT pseudo-RR in its additional section), LDNS and drill show an ADDITIONAL: count that is one less than the actual size of the additional section.
For example, with this query, made against a public DNSSEC-validating resolver, EDNS is used, so the second line of the output should display ADDITIONAL: 1 instead of 0, as seen here:
$ drill -w answer.hex -D @ns1.nic.fr afnic.fr
;; ->>HEADER<<- opcode: QUERY, rcode: NOERROR, id: 17683
;; flags: qr aa rd ; QUERY: 1, ANSWER: 2, AUTHORITY: 0, ADDITIONAL: 0
;; QUESTION SECTION:
;; afnic.fr. IN A
;; ANSWER SECTION:
afnic.fr. 600 IN A 51.178.83.21
afnic.fr. 600 IN RRSIG A 13 2 600 20240930021211 20240831080819 14683 afnic.fr. kfKSFDVwefYtcEbDx7c1LtacO5tIcQN5wNOtgc7Y384YmwJiopqqbeD+ocz7ipmYvzhaW6a6qla2Yd+k/YgTrw==
;; AUTHORITY SECTION:
;; ADDITIONAL SECTION:
;; Query time: 0 msec
;; EDNS: version 0; flags: do ; udp: 1432
;; SERVER: 192.134.4.1
;; WHEN: Tue Sep 3 08:35:13 2024
;; MSG SIZE rcvd: 157
The hex dump of the response shows indeed that the raw packet has an ARCOUNT of 1 in the header (bytes 10-11).
This behavior can be pretty misleading because one might expect that drill’s first two lines faithfully show what’s in the packet’s header. It’s also inconsistent with dig and kdig, which do show an additional section count of 1 in their respective outputs (try dig +dnssec +nocrypto @ns1.nic.fr afnic.fr and kdig +dnssec +nocrypto @ns1.nic.fr afnic.fr respectively).
The text was updated successfully, but these errors were encountered:
When a DNS server responds with an EDNS-enabled message (containing an OPT pseudo-RR in its additional section), LDNS and drill show an
ADDITIONAL:
count that is one less than the actual size of the additional section.For example, with this query, made against a public DNSSEC-validating resolver, EDNS is used, so the second line of the output should display
ADDITIONAL: 1
instead of 0, as seen here:The hex dump of the response shows indeed that the raw packet has an ARCOUNT of 1 in the header (bytes 10-11).
This behavior can be pretty misleading because one might expect that drill’s first two lines faithfully show what’s in the packet’s header. It’s also inconsistent with
dig
andkdig
, which do show an additional section count of 1 in their respective outputs (trydig +dnssec +nocrypto @ns1.nic.fr afnic.fr
andkdig +dnssec +nocrypto @ns1.nic.fr afnic.fr
respectively).The text was updated successfully, but these errors were encountered: