Edw*_*all 16 domain-name-system dig
dig 回复在评论部分返回标志:
$ dig example.com +noall +comments
; <<>> DiG 9.8.3-P1 <<>> example.com +noall +comments
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 29045
;; flags: qr rd ra; QUERY: 1, ANSWER: 1, AUTHORITY: 0, ADDITIONAL: 0
Run Code Online (Sandbox Code Playgroud)
在这里的最后一行,有标志:
flags: qr rd ra;
Run Code Online (Sandbox Code Playgroud)
dig 有哪些可能的标志?
这是我迄今为止找到的列表:
gun*_*ert 16
我使用RFC 1035作为来源,从那里开始保持顺序,不管你是否已经在你的问题中提到了它。
RFC 4035 中引入了另外两个与 DNSSEC 相关的标志:
小智 12
来自:http : //www.perdisci.com/useful-links/dig-info
DIG response header:
Flags:
AA = Authoritative Answer
TC = Truncation
RD = Recursion Desired (set in a query and copied into the response if recursion is supported)
RA = Recursion Available (if set, denotes recursive query support is available)
AD = Authenticated Data (for DNSSEC only; indicates that the data was authenticated)
CD = Checking Disabled (DNSSEC only; disables checking at the receiving server)
Response code:
0 = NOERR, no error
1 = FORMERR, format error (unable to understand the query)
2 = SERVFAIL, name server problem
3= NXDOMAIN, domain name does not exist
4 = NOTIMPL, not implemented
5 = REFUSED (e.g., refused zone transfer requests)
Run Code Online (Sandbox Code Playgroud)