// Copyright (C) 2011 Internet Systems Consortium, Inc. ("ISC") // // Permission to use, copy, modify, and/or distribute this software for any // purpose with or without fee is hereby granted, provided that the above // copyright notice and this permission notice appear in all copies. // // THE SOFTWARE IS PROVIDED "AS IS" AND ISC DISCLAIMS ALL WARRANTIES WITH // REGARD TO THIS SOFTWARE INCLUDING ALL IMPLIED WARRANTIES OF MERCHANTABILITY // AND FITNESS. IN NO EVENT SHALL ISC BE LIABLE FOR ANY SPECIAL, DIRECT, // INDIRECT, OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES WHATSOEVER RESULTING FROM // LOSS OF USE, DATA OR PROFITS, WHETHER IN AN ACTION OF CONTRACT, NEGLIGENCE // OR OTHER TORTIOUS ACTION, ARISING OUT OF OR IN CONNECTION WITH THE USE OR // PERFORMANCE OF THIS SOFTWARE. #include #include #include "command_options.h" #include "scan.h" /// \brief Perform Bad Packet Scan /// /// Scans the server by sending a sequence of (potentially) bad packets and /// printing the packet settings and the response received. The principle /// raison d'etre for this is to check if a bad packet will cause a crash. /// /// This particular version of the code allows a set of ranges to be set for /// each field in the "flags" word (the third and fourth bytes) of a DNS /// message. (Most of the flags are single-bit values, so the range is just 0-1. /// The OPCODE and RCODE are both four bits wide, so the range is 0-15.) The /// program then sends packets containing each combination of values. /// /// TODO: Extend the program to other bad values. /// Examples of this would be to make the count fields invalid, to add data /// to sections that should be empty, and to deliberately mangle the names in /// these sections. using namespace isc::badpacket; /// \brief Main Program int main(int argc, char* argv[]) { CommandOptions command_line; command_line.parse(argc, argv); // Construct the scan object and perform the scan. Scan scanner; scanner.scan(command_line); return 0; }