Library for comprehending DNS messages using BIND parsing
Project description
Summary
Strangle is BIND for Python: a Python library for parsing DNS messages using libbind. Strangle allows you to see DNS messages in two ways:
Direct access to the libbind parsing functions (C-style)
A Python object with various meaningful attributes (OO-style)
Demo
Here is an example of how simple it is to parse DNS messages:
>>> import Strangle
>>> msgFile = file("test/data/www.microsoft.com-query")
>>> msg = Strangle.DNSMessage(msgFile)
>>> msg.id
47096
>>> print msg
ID : 47096
Headers:
Type : question
Opcode : 0
Authoritative : False
Truncated : False
Recursion Desired : True
Recursion Available: False
Response Code : 0
;; QUESTION SECTION:
www.microsoft.com.nsatc.net 0 IN A
>>> msg.flags.type
'question'
>>> msg.flags.recursionDesired
True
Project details
Release history Release notifications | RSS feed
Download files
Download the file for your platform. If you're not sure which to choose, learn more about installing packages.
Source Distribution
Strangle-0.3.1.tar.gz
(22.0 kB
view details)
File details
Details for the file Strangle-0.3.1.tar.gz.
File metadata
- Download URL: Strangle-0.3.1.tar.gz
- Upload date:
- Size: 22.0 kB
- Tags: Source
- Uploaded using Trusted Publishing? No
File hashes
| Algorithm | Hash digest | |
|---|---|---|
| SHA256 |
939c5bb1a215a0e57a29e6f719d5d6f5ac203d6d97b3f04f847d128290d26222
|
|
| MD5 |
32610eea50d906d78e3e3dc74902f63d
|
|
| BLAKE2b-256 |
aa9227cb0a291f3ef9b6da94f989f32fbd1fced6eca058a7042caf1d4ef742f8
|