Merken

For lack of a better name(server): DNS Explained

Zitierlink des Filmsegments
Embed Code

Automatisierte Medienanalyse

Beta
Erkannte Entitäten
Sprachtranskript
chill
out next speaker is the new rates and just need and interactions is member of the presence of the foundation board and founder of pi ladies I'm just going be speaking just about using an increasing kinases with by the but few thank you very much and so yes name is Lynn roots and a little bit about me and
I can back into an engineer that's part of finding and
also for external threats you and I'm also leaders understanding of inference still and where members of the
pair of the and since I
have this stage this 1 rope highways a bit and if you'd like to start a local are announcement is interesting and you can literally have himself by ladies
and that will contain all what's needed to start your own right so that a talk and as a dirty person building many side projects and many frustrating experiences setting up deployment of this and sure many of you have experienced and the very 1st get pushed parochial never works and so I'm I'm assuming
you wouldn't be here if you didn't experience and you follow the directions on your host website and to probably
so of DNS records and some but something still hasn't work and open their own without a solid understanding of the analysis and oftentimes we just try something the words deployed and see if the propagated and hopefully it
works but and that's not really a soul to the so
I'm curiosity got the best of animals previously
done I'm pretty deep dives into technologies that Ireland had a history knowledge of like rose and so naturally decided to dig into dynasty continued on my hand nobody knows who is in its phone book and shares the backbone of the Internet and cloud cover DNS inductive and DNS actually build conducted but that's a pretty much all I knew so
in this talk and I'll be going over what exactly did this and why it's important and what you can do the analysis and a
handful of some things I learned along the way so in case you missed anything this is the 1 link that you need to know and has links to everything I talk about them and I'll show this at the end of the talk and know that coming and filled full 25 minutes and no questions there are maybe by the after talked to had to ask questions anyway diving and what exactly is the units while the innocent loves you to visit productive of sites like Reddit I received a critical e-mails like a bomb killed to player 1 of a kind to do as far as allow reprograming generator to not be accessible by an unemployed I don't know why
you wouldn't wanna heighten your secrets thing but but anyway I'm and getting up to speed on what exactly do you just as it stands for Domain Name System ENS widely referred to being a phonebook translating human readable
names into a computer friendly addresses and the
textbook definition is DNS is a distributed storage system for resource each DNS resolver authoritative server and storage these records in its cash for local zones around and record contains a label class type and from there so essentially and the resource record is data is the data structure specific to the right
so textbook definition kind of boring let's see a connection with that of course want to
use a bit of Python and my latest crush has been skipping those of you don't know sky is very rich Python wraparound tcpdump colored T-shirt our search and so here I'm using CD to sniff DNS trafficked as a browsing and the into us and I use scabies sniff function to pick up local my local traffic and filtered on and you do people recall quarter 53 the phone and specifically traffic and I only wanted and 10 packets surrounding datagrams so as a just sniff function run and I went to my browser and taking over 1 . com and what I found was pretty gives you can see them as as typing of 1 . com into the problems addressed body knows the query would take place for every autocomplete gas and that from that come so 1st things at www . google . com because the address part is also search engine and as I type are it up and about it because it's 1 minus this is science and you can see the genus Korean the 2nd 1 and the answer is in the following lines and then as I type R. O. from guesses grow blind test by the programme . com which by the way is my office and had a style of triphone talk about that and if you care for PPI data she comes in Saturday's and any can see the related queries that points to and then finally a type of ontology and find the when that come 1st and here we go from the completion and so I guess this is more of a whole thing that from
does this the possible search queries that uses the analysis to do such and go unnoticed 1 thing here don't know the kind of see and and here and that there is a clear trailing dot at the end of the
1st things and sure if you know that and this existing that's kind of how DNS does things but why is it really there so the difference between
atrial and died in their endowment is the same difference between absolute file paths and relative so like relative file names and natural familiar with that can be mangled mapped incorrectly so depending upon how
your local DNS set up if search example done that was in result from any navigated to examine the outcome the D search for it would take you out to not be fully qualified and and therefore look at example . com . example . net if you never dated to example . com . DNS would not apply to that search paths and defined in the result of so if there
is a dot the and it's unambiguous fully qualified domain name and not prone to search paths things and I did not want a die while navigating to will not come on and from actually assumes the dog because it's kind
of not user friendly to always have to put the dog right so continuing on doing all these DNS queries and got me a bit more curious
and what is the role that DNS free takes to find get an answer for where were 1 . com this and this is not exactly easy to figure out once and Indian history hits on my router my right hand and it's a bit of a black box and where the query is forwarded to you if it's not probably test I know that my computer's DNS it to to 192 168 . 1 0 1 which is not random and then S is set up to this IP address which I figured out later on blogging onto the advantageous my rather actually hacking incident which about the password from now on so that you of host theory underlying routers DNS and get a pointer to the contest that sentiment now the dealer who is on the IP and I see that Comcast service provider owns the that the addresses but beyond that I don't know if Comcast DNS has broken 1 . com cashed in is not where the group goes after but DNS is also hierarchical n and getting familiar with the date command can also help us understand how is how these queries are resolved the and has traced like that makes iterative queries to resolve the name being worked it will fall referrals from root servers showing the the answer from each library that was used to resolve look so trying this out on Titan that board I apologize for the small print and where the due date in apartment or with the plus trace and find you can see a the trend of the profit you see this certainly
die from the root servers and then goes down through word document 500 and then finally we have like address the therefore the words and visual learners and
I made some nice fast and so the data query
starts at my local DNS and 192 . 168 . 1 . 1 where it's not hashing is then passed on to the server the query from my local Dean as for apartment or its 1st pass through a the series the diet and who knows and that 1 of his host should have information so the name server responds with try these host which corresponds to the Dutch word means the Dow warnings the received a period and says something like well try 1 of these shows which corresponds to a Python of names and like another again services yes and I seem to have an a record for Python work in its 142 1069 and that sort of the the complete hierarchical path for part of it but what if you want to know more about subdomains like hg . 5 1 word or others if we do addiction and against each sheet of private on and we actually get fancy name record that and points to you or sell them on which is a different in record of and
again sorry for the I want to print and and share in under has more records set up not just like 1 scene that
we know of if characteristic of run diction man against 500 with the any finite which is the here and now unfortunately not much has come back and beyond the a structures I'm looking at highly that
comes a little bit more interesting with them and so records going to name . com and MX records point to will in a record pointing to the and you won't get using any with data is falls on final RDF set up my policy names and then I'll get a bit more into that later on so we can easily result
in the pathogenesis would take to look at or private use and how it's
not the most efficient way that can respond to queries and the root and troubled name servers like . and . org would be inundated with new requests and this is where DNS caching comes into play so when a DNS resolver or operated name server receives a query in a search is
its local cache for matching there's no label on its cash server may instead do 1 of 2 things and depending upon how it's configured in a Y. there and retrieved from extension return a referral responses containing a resource record of them and the name nameserver type whose label is closer to the query cover closes defined or at the dance resolve and and be able to initiate the same grade to authoritative DNS server responsible for the domain in which is the subject of the and so the authority injury can respond and answer referral or failed response just response than is accepted by the DNS resolver and configured it most likely store in cash so if my local DNS server did not have a cash record of type and onwards and they could send the diaspora to the root DNS server and get pointed to there's that handle the . org domain but since and I have visited many dialogs sites mightiness most likely has done working service cash silicon just skip that 1st requiring go on and that off sort a trickles down from there a simplified and so they
caching sounds all great hunky dory intelligent provocation propagation is
and how long has to wait for for a DNS changes to show the effect and DNS will hold the record for as long as it's TTL or it's time to live number which at which point it and we and after its and pleaded if someone makes a request and every 1st that a record in the DNS server will have to go through the whole process again during the ceremony cash and now setting and to find ability to young america local at the local NIST caches will last longer and therefore of your friend not be able to see your courses you have immediately after initial deployment having to 1 TTL and then the server may or may not have the ability to deal with the higher career now another thing 1 of the propagation TTL some this completely ignores and set the unexpired records and passion actually opens up the ability of poisoning and this
is by far not my area of expertise but as I understand ideas and whizzing words like some if the server doesn't validate DNS responses
for example of the DNS security extensions someone could explain that by essentially spoofing and IP address and then here she bounds for a given her name forcing visitors of that certain has meant to be directed elsewhere to be altered to spoof DNS entry attacker would have to create a response faster than that of the legitimate authority service so you can effectively deal a DNS server with probable non-cash injuries and giving the attacker many opportunities to respond to that with the DNS responses so while random domains that cash very useful and the attacker will be able to get the forest responses from their illegitimate name server for the desired domain to come from right so until the are DNS is essentially a black box since you cannot
simply stand up a DNS server yourself and be connected to global be work and it's particularly hard to develop and get your hands on to take part so essentially the take is that DNS is the host names mapped IP addresses like reader dot com to taking on and it's essentially set up like a hierarchy so their local DNS server is a hand writing cash it knows where to go to find and lastly and caching propagation is probably where and why you want to reach it when applying is and
ancestry of some and there are fewer syntactic analysis as well as use this dinosaur
ever technology that I found called so starting out with interacting and saying and during the day commands with that and if I shown and you may have noticed that we can really see any
senior records to map anything like and divided into the output is a common because certainly commands
against the reader calories outcome but how many other subdomains are and being able to look up a full of DNS zone file is rarely allowed and beyond being an admin yourself so there's a serial tool called map that literally forces subdomain so I tried this on highways and
as you can see it returned for results and this tool
is limited to built-in word word those which you can also supplying themselves so don't expect that exactly expect the results to be comprehensive as I can't see I know that this has over 30 subdomains bundling up for him an enzyme that fast because it does desert searching based on the built-in or provide a word list 1 at a time of like no multithreading and next moment I was playing around the nest and want to figure out what exactly was cashed
similar the analysis after at least an OS X you can see what's cast by really killing the process which flashes the cash to this is all so if we take a look at my syslog we can see some familiar records an early sign of America's those DNS mappings modified or that I get about 3 more than 300 responses so just for fun and this is the captured packets of traffic generated by handiness mapping sparse as you can and see the even layer and the I where I would where went from my computer to my rotten and Andean map was trying to trying out the z CIR from its where most and the the the question mark there and call them here
and then the name and type in the class and the response to this was the domain is it doesn't actually exist now we're trying
conference and hearing the same number of triphone don't worry that covered you can
have you can trade and dinners Florida with plan and would just twisted naturally and here is a simple DNS server from the
twisted knots and we can run this can fire at the and dig against that was server for I word and so on we can see that this fact capture datagram escaping is that is that query and
digging through an interested in 7 and you can see the question
of the the name type class and here is the response to the ground with the DS resource record and associated with that including the original question and then integrity of data and resource reckoning right
so those are 3 some interesting ways in academia as the United should you how you
can use the DNS mapped to find so that means the group forces might not be inclusive and finding your local dance consciously action and then running on Python DAT server with was now
time interesting ways to use
and so did and James Stanford domain based authentication of named
entities officially protocol for certificates to be bound to DNS names using DNS and secured extensions and that's sort of similar to two-factor authentication that we as users are familiar with and essentially game as a way to cross verify the the domain name and to the authority issued
to problem that Danish trying to solve is that the TLS certificate does not verify that the organization running the web server officially owns the domain names as well the DNS record does not contain information regarding which to the authority is preferred by this position so this this weakness is actually exploited twice in 2011 both with the with the Dutch political authority where attackers were able to generate false certificates and giving them the ability to perform man-in-the-middle attacks so again it would gain does is provide a way to cross verified maintain information with the host city authorities issued certificate and on the blog posts that I will show can explain all the more in detail of the house and Dean is set up at the DNS server I'm just real quick go for those curious and again as Python library does have support for doing with the ability to easily manage just TLS arrogant and and twisted names also has an has been working on and implementing it in a 2nd including in support and of I don't know if he is in here but Richard Walter core developer is and giving a talk about interest of the masses progress is made with the insects of highly encourage you to go but another dirty negative Austin instead of and
is that you can use DNS for service discovery there are a few ways and tools and web services scary but many boils down to the question what servers run which are under serviced and
says mention 1 can leverage the NASA helped answer this question with the use of SRV records and so the
records within the DNS is only a severe records of India and zones map canonical names typically in the form of like underscore service name does this work for a cold outside to host names so for instance and that's what each service has its own as the record with 1 record canonically named after the service itself and you will and then have spotlight disappointed as an acid you look at similar To this day command and finds the fork of like possible host here furthermore visually
inclined and some new ones and this is a simplified diagram of what happens so Spotify climb except where to connect with them and so the degree and serious look at then continues on so the the after connects to an access point for example a key 1 that's modified come and then the access point resolves the service that the client is looking for which might be like user services that you're using information this is all done with a survey records and Lasso
like discovered is the ability to store and hearing with Indian so the cheese stands for a distributed hash table these 2 gives you did a dictionary like interface oxidized form but the data or nodes are distributed among the network so looking at
Spotify again we store some of service configuration data with used to within
DNS TXT records once again
open up the Spotify clients want to play a particular song through 1 1 that has not been lovely cashing machine so the client performs a look upon the song and the tragedy is 1st class and in that class is essentially the key with then the DHT rank never together he is and looked up without a beach during and that it is stored within the domestic steel records the value associated with that key is essentially because location of that service where the song or it's relevant data is OK so in this case and set ons from online easy to see 1 well which is where on this particular fact through violence and is mapped to a particular host clean this flow and since is mapped to hosting which would be the machine that houses the data on the who watch this stunning hostname tells me that this machine has information on tracks can be connected to the airport for 3 1 is the key located in Londonderry sentences and pardon and a 1 this is sort of like a dummy whose name so confusing
I know but I'm using DNS reduced during last modified to leverage the distributed characteristics of DNS system x of a blatantly as you can but the interesting thing is that I'm going to real quick gain is a suggested and to secure DNS with your certificate authorities and you can
also see that service discovery with the help of to help figure out what servers 1 which service and family he's ask for an idea and Seattle you can
but emptiness is by no means easy to understand than a 25 talk and I guarantee you will screw unionists deployment configuration because will Justice hard and bitter black wants this it's not easy to divide and certainly not easy to make a good talk and but I hope that you learn some things and if you want more information this is the blog
posts and I'm out of time thank you so much
Bit
Rootkit
Code
Interaktives Fernsehen
Vorlesung/Konferenz
Booten
Direkte numerische Simulation
Bitrate
Whiteboard
Software
Whiteboard
Inferenz <Künstliche Intelligenz>
Front-End <Software>
Mereologie
Computeranimation
Web Site
Geometrische Frustration
Vorlesung/Konferenz
Projektive Ebene
Computeranimation
Richtung
Datensatz
Direkte numerische Simulation
Vorlesung/Konferenz
Wort <Informatik>
Computeranimation
Analysis
Metropolitan area network
Statistische Schlussweise
Gemeinsamer Speicher
Verweildauer
Direkte numerische Simulation
Vorlesung/Konferenz
Direkte numerische Simulation
Computeranimation
Internetworking
Mailing-Liste
Web Site
Einheit <Mathematik>
Vorlesung/Konferenz
Web Site
Ikosaeder
Direkte numerische Simulation
E-Mail
Binder <Informatik>
E-Mail
Computeranimation
Analysis
Domain <Netzwerk>
Numerische Strömungssimulation
Klasse <Mathematik>
Adressraum
Computeranimation
RFID
Datensatz
Domain-Name
Geschlossenes System
Direkte numerische Simulation
Datentyp
Vorlesung/Konferenz
Datenstruktur
Speicher <Informatik>
Umwandlungsenthalpie
Caching
Geschlossenes System
Elektronische Publikation
Datentyp
Stellenring
Speicher <Informatik>
Zeitzone
Rechter Winkel
Server
Resolvente
Zeitzone
Einfach zusammenhängender Raum
Lineares Funktional
Relationale Datenbank
Bit
Programmiergerät
Ontologie <Wissensverarbeitung>
Browser
Adressraum
Abfrage
Computeranimation
Office-Paket
Suchmaschine
Mereologie
Direkte numerische Simulation
Datentyp
Zählen
COM
Vorlesung/Konferenz
Direkte numerische Simulation
Gerade
Vererbungshierarchie
Direkte numerische Simulation
Zählen
Vorlesung/Konferenz
Direkte numerische Simulation
Computeranimation
Analysis
Resultante
Subtraktion
Betrag <Mathematik>
Natürliche Zahl
Direkte numerische Simulation
Relativitätstheorie
COM
Direkte numerische Simulation
Elektronische Publikation
Computeranimation
Sichtbarkeitsverfahren
Bit
Domain-Name
Direkte numerische Simulation
Abfrage
Vorlesung/Konferenz
Direkte numerische Simulation
Computeranimation
Domain <Netzwerk>
Bit
Numerische Strömungssimulation
Blackbox
Hochdruck
Adressraum
Gruppenkeim
Inzidenzalgebra
Whiteboard
Physikalische Theorie
Service provider
Netzadresse
Computeranimation
Metropolitan area network
Gewicht <Mathematik>
Direkte numerische Simulation
Programmbibliothek
Visualisierung
COM
Router
Passwort
Booten
Zeiger <Informatik>
Softwaretest
Pell-Gleichung
Torus
Rootkit
Division
Abfrage
Zeiger <Informatik>
Domain-Name
Twitter <Softwareplattform>
Server
Wort <Informatik>
Hierarchie <Mathematik>
Punkt
Vervollständigung <Mathematik>
Reihe
Stellenring
Abfrage
Frequenz
Quick-Sort
Computeranimation
Metropolitan area network
Datensatz
Mereologie
Direkte numerische Simulation
Server
Dean-Zahl
Wort <Informatik>
Booten
Information
Message-Passing
Demoszene <Programmierung>
Pell-Gleichung
Metropolitan area network
Datensatz
Vorlesung/Konferenz
Datenstruktur
Charakteristisches Polynom
Computeranimation
Metropolitan area network
Bit
Datensatz
Punkt
COM
Computeranimation
Caching
Autorisierung
Server
Web Site
Rootkit
sinc-Funktion
Stellenring
Abfrage
Quick-Sort
Computeranimation
Endogene Variable
Gradient
Überlagerung <Mathematik>
Datensatz
Domain-Name
Caching
Endogene Variable
Datentyp
Direkte numerische Simulation
Server
Resolvente
Vorlesung/Konferenz
Speicher <Informatik>
Maßerweiterung
Soundverarbeitung
Datensatz
Punkt
Prozess <Physik>
Caching
Mathematisierung
Direkte numerische Simulation
Ausbreitungsfunktion
Server
Stellenring
Zahlenbereich
Vorlesung/Konferenz
National Institute of Standards and Technology
Computeranimation
Autorisierung
Wald <Graphentheorie>
Computersicherheit
Blackbox
Validität
Netzadresse
Computeranimation
Domain-Name
Flächeninhalt
Endogene Variable
Direkte numerische Simulation
Server
Vorlesung/Konferenz
Wort <Informatik>
Maßerweiterung
Quader
Syntaktische Analyse
Mereologie
Ausbreitungsfunktion
Direkte numerische Simulation
Stellenring
Server
COM
Hierarchische Struktur
Direkte numerische Simulation
Menge
Netzadresse
Computeranimation
Metropolitan area network
Datensatz
Vorlesung/Konferenz
Computeranimation
Funktion <Mathematik>
Resultante
Mapping <Computergraphik>
Energiedichte
Singularität <Mathematik>
Direkte numerische Simulation
Systemverwaltung
Vorlesung/Konferenz
Elektronische Publikation
Zeitzone
Computeranimation
Caching
Resultante
Lineare Abbildung
Numerische Strömungssimulation
Prozess <Physik>
Momentenproblem
Logarithmus
Mailing-Liste
Schwach besetzte Matrix
Information
Extrempunkt
Computeranimation
Mapping <Computergraphik>
Metropolitan area network
Datensatz
Vorzeichen <Mathematik>
Datennetz
Direkte numerische Simulation
Endogene Variable
Wort <Informatik>
Thread
Direkte numerische Simulation
Metropolitan area network
Domain-Name
Direkte numerische Simulation
Klasse <Mathematik>
Endogene Variable
Datentyp
Zählen
Server
Automatische Handlungsplanung
Zahlenbereich
Vorlesung/Konferenz
Computeranimation
Motion Capturing
Knoten <Mathematik>
Faktor <Algebra>
Client
Server
Vorlesung/Konferenz
Wort <Informatik>
Computeranimation
Metropolitan area network
Datensatz
Datentyp
Rechter Winkel
Datentyp
Endogene Variable
Klasse <Mathematik>
Vorlesung/Konferenz
Zählen
Computeranimation
Integral
Caching
Domain-Name
Forcing
Gruppenoperation
Server
Gruppenkeim
Authentifikation
Vorlesung/Konferenz
Direkte numerische Simulation
Computeranimation
Autorisierung
Digitales Zertifikat
Web log
Ortsoperator
Protokoll <Datenverarbeitungssystem>
Selbst organisierendes System
Ruhmasse
Quick-Sort
Computeranimation
Benutzerbeteiligung
Domain-Name
Datensatz
Arithmetische Folge
Spieltheorie
Softwareschwachstelle
Direkte numerische Simulation
Programmbibliothek
Server
Authentifikation
Vorlesung/Konferenz
Speicherabzug
Information
Softwareentwickler
Maßerweiterung
Server
Datensatz
Uniforme Struktur
Siedepunkt
Web Services
Direkte numerische Simulation
Server
Vorlesung/Konferenz
Computeranimation
Punkt
Atomarität <Informatik>
Speicher <Informatik>
Sondierung
Zeitzone
Computeranimation
Eins
W3C-Standard
Datensatz
Client
Diagramm
Minimalgrad
Direkte numerische Simulation
Client
Ablöseblase
Server
Punkt
Information
Instantiierung
Bildschirmmaske
Knotenmenge
Datennetz
Hash-Algorithmus
Server
Vorlesung/Konferenz
Speicher <Informatik>
Konfigurationsraum
Computeranimation
Tabelle <Informatik>
Schnittstelle
Hash-Algorithmus
Klasse <Mathematik>
Computeranimation
Virtuelle Maschine
Datensatz
Weg <Topologie>
Client
Funktion <Mathematik>
Rangstatistik
Direkte numerische Simulation
Server
Information
URL
Schlüsselverwaltung
Autorisierung
Server
Unterring
Digitales Zertifikat
Familie <Mathematik>
Computeranimation
Wiederherstellung <Informatik>
Metropolitan area network
Geschlossenes System
Direkte numerische Simulation
Server
Vorlesung/Konferenz
Direkte numerische Simulation
Charakteristisches Polynom
Hilfesystem
Arithmetisches Mittel
Metropolitan area network
Web log
Vorlesung/Konferenz
Information
Konfigurationsraum
Computeranimation
Vorlesung/Konferenz

Metadaten

Formale Metadaten

Titel For lack of a better name(server): DNS Explained
Serientitel EuroPython 2014
Teil 116
Anzahl der Teile 120
Autor Root, Lynn
Lizenz CC-Namensnennung 3.0 Unported:
Sie dürfen das Werk bzw. den Inhalt zu jedem legalen Zweck nutzen, verändern und in unveränderter oder veränderter Form vervielfältigen, verbreiten und öffentlich zugänglich machen, sofern Sie den Namen des Autors/Rechteinhabers in der von ihm festgelegten Weise nennen.
DOI 10.5446/19994
Herausgeber EuroPython
Erscheinungsjahr 2014
Sprache Englisch
Produktionsort Berlin

Inhaltliche Metadaten

Fachgebiet Informatik
Abstract Lynn Root - For lack of a better name(server): DNS Explained You've deployed! But your friends can't see it - what's wrong? I'm betting DNS. Maybe you've fixed a couple of entries, point some records to hostnames, waited patiently for new domains to resolve only to notice your nameservers are incorrect. But what actually goes on with DNS? Come to this talk to find out how DNS works, and how to interact and create a DNS with Python. ----- Following instructions of what entries to create where is easy enough when using a PaaS. But DNS is hard – deployment issues always seem to come down to DNS. A solid understanding of DNS will not only help with deploying your applications, but will also give a greater understanding of how the internet works, and more generally, distributed systems. In this talk, you will learn what DNS is, how it works and how to communicate with it, and how Python can make both interacting and spinning up your own DNS server simple (I swear!). Outline: * Intro (1-2m) * What DNS is (5 min) * URL -> IP addr, e.g. "phonebook" lookup (obligatory pun: Call me, Maybe?) * hierarchical system & resolution sequence (local DNS cache/resolver, ISP resolver, recursive DNS search) * popular types (primary, secondary/slave, forwarding, authoritative only, etc) * System components: what makes a DNS? * How to communicate with DNS (3 min) * Protocol: UDP * Operations: CRUD * Resource records (A, AAAA, CNAME, SOA, SRV, etc) * tools: dig/nsupdate/nslookup * Security overview (3min) (disclaimer: NOT a DNS security expert, not planning to get into the details here) * Server-Server, DynDNS: TSIG/GSS-TSIG * Server-Client: DNSSEC * Python + DNS (10 min) * plain UDP query in Python (no 3rd-party libraries/no magic) * Interacting with a DNS w/ Python (dnspython.py) * Sample DNS server with Twisted * "fake" demo (either local or pre-recorded screen cast) of querying/updating/etc of the Twisted DNS * Wrap up - resources page, github links, etc (1min) * Q&A - ~5 min
Schlagwörter EuroPython Conference
EP 2014
EuroPython 2014

Ähnliche Filme

Loading...