Linux ip-148-66-134-25.ip.secureserver.net 3.10.0-1160.119.1.el7.tuxcare.els10.x86_64 #1 SMP Fri Oct 11 21:40:41 UTC 2024 x86_64
Apache
: 148.66.134.25 | : 18.119.107.159
66 Domain
8.0.30
amvm
www.github.com/MadExploits
Terminal
AUTO ROOT
Adminer
Backdoor Destroyer
Linux Exploit
Lock Shell
Lock File
Create User
CREATE RDP
PHP Mailer
BACKCONNECT
UNLOCK SHELL
HASH IDENTIFIER
CPANEL RESET
BLACK DEFEND!
README
+ Create Folder
+ Create File
/
usr /
lib64 /
python2.7 /
site-packages /
dns /
[ HOME SHELL ]
Name
Size
Permission
Action
rdtypes
[ DIR ]
drwxr-xr-x
__init__.py
1.3
KB
-rw-r--r--
__init__.pyc
765
B
-rw-r--r--
__init__.pyo
765
B
-rw-r--r--
dnssec.py
14.37
KB
-rw-r--r--
dnssec.pyc
13.46
KB
-rw-r--r--
dnssec.pyo
13.38
KB
-rw-r--r--
e164.py
3.01
KB
-rw-r--r--
e164.pyc
2.76
KB
-rw-r--r--
e164.pyo
2.76
KB
-rw-r--r--
edns.py
4.21
KB
-rw-r--r--
edns.pyc
5.2
KB
-rw-r--r--
edns.pyo
5.2
KB
-rw-r--r--
entropy.py
3.79
KB
-rw-r--r--
entropy.pyc
3.7
KB
-rw-r--r--
entropy.pyo
3.7
KB
-rw-r--r--
exception.py
1.29
KB
-rw-r--r--
exception.pyc
1.56
KB
-rw-r--r--
exception.pyo
1.56
KB
-rw-r--r--
flags.py
2.62
KB
-rw-r--r--
flags.pyc
2.58
KB
-rw-r--r--
flags.pyo
2.58
KB
-rw-r--r--
grange.py
1.83
KB
-rw-r--r--
grange.pyc
1.15
KB
-rw-r--r--
grange.pyo
1.08
KB
-rw-r--r--
hash.py
2.34
KB
-rw-r--r--
hash.pyc
2.11
KB
-rw-r--r--
hash.pyo
2.11
KB
-rw-r--r--
inet.py
3.16
KB
-rw-r--r--
inet.pyc
2.61
KB
-rw-r--r--
inet.pyo
2.61
KB
-rw-r--r--
ipv4.py
1.81
KB
-rw-r--r--
ipv4.pyc
1.37
KB
-rw-r--r--
ipv4.pyo
1.37
KB
-rw-r--r--
ipv6.py
4.97
KB
-rw-r--r--
ipv6.pyc
3.44
KB
-rw-r--r--
ipv6.pyo
3.44
KB
-rw-r--r--
message.py
41.63
KB
-rw-r--r--
message.pyc
36.39
KB
-rw-r--r--
message.pyo
36.39
KB
-rw-r--r--
name.py
21.82
KB
-rw-r--r--
name.pyc
23
KB
-rw-r--r--
name.pyo
23
KB
-rw-r--r--
namedict.py
2.06
KB
-rw-r--r--
namedict.pyc
1.92
KB
-rw-r--r--
namedict.pyo
1.92
KB
-rw-r--r--
node.py
5.89
KB
-rw-r--r--
node.pyc
6.15
KB
-rw-r--r--
node.pyo
6.15
KB
-rw-r--r--
opcode.py
2.55
KB
-rw-r--r--
opcode.pyc
2.49
KB
-rw-r--r--
opcode.pyo
2.49
KB
-rw-r--r--
query.py
17.89
KB
-rw-r--r--
query.pyc
15.31
KB
-rw-r--r--
query.pyo
15.31
KB
-rw-r--r--
rcode.py
3.03
KB
-rw-r--r--
rcode.pyc
2.92
KB
-rw-r--r--
rcode.pyo
2.92
KB
-rw-r--r--
rdata.py
15.34
KB
-rw-r--r--
rdata.pyc
16.59
KB
-rw-r--r--
rdata.pyo
16.59
KB
-rw-r--r--
rdataclass.py
3.22
KB
-rw-r--r--
rdataclass.pyc
2.96
KB
-rw-r--r--
rdataclass.pyo
2.96
KB
-rw-r--r--
rdataset.py
11.28
KB
-rw-r--r--
rdataset.pyc
11.08
KB
-rw-r--r--
rdataset.pyo
11.03
KB
-rw-r--r--
rdatatype.py
5.07
KB
-rw-r--r--
rdatatype.pyc
5.29
KB
-rw-r--r--
rdatatype.pyo
5.29
KB
-rw-r--r--
renderer.py
11.63
KB
-rw-r--r--
renderer.pyc
10.85
KB
-rw-r--r--
renderer.pyo
10.75
KB
-rw-r--r--
resolver.py
45.35
KB
-rw-r--r--
resolver.pyc
37.16
KB
-rw-r--r--
resolver.pyo
37.16
KB
-rw-r--r--
reversename.py
3.03
KB
-rw-r--r--
reversename.pyc
2.4
KB
-rw-r--r--
reversename.pyo
2.4
KB
-rw-r--r--
rrset.py
5.76
KB
-rw-r--r--
rrset.pyc
6.17
KB
-rw-r--r--
rrset.pyo
6.17
KB
-rw-r--r--
set.py
7.66
KB
-rw-r--r--
set.pyc
9.81
KB
-rw-r--r--
set.pyo
9.81
KB
-rw-r--r--
tokenizer.py
17.54
KB
-rw-r--r--
tokenizer.pyc
16.92
KB
-rw-r--r--
tokenizer.pyo
16.92
KB
-rw-r--r--
tsig.py
8.1
KB
-rw-r--r--
tsig.pyc
8.08
KB
-rw-r--r--
tsig.pyo
8.08
KB
-rw-r--r--
tsigkeyring.py
1.61
KB
-rw-r--r--
tsigkeyring.pyc
1.16
KB
-rw-r--r--
tsigkeyring.pyo
1.16
KB
-rw-r--r--
ttl.py
2.13
KB
-rw-r--r--
ttl.pyc
1.48
KB
-rw-r--r--
ttl.pyo
1.48
KB
-rw-r--r--
update.py
9.92
KB
-rw-r--r--
update.pyc
8.27
KB
-rw-r--r--
update.pyo
8.27
KB
-rw-r--r--
version.py
1.24
KB
-rw-r--r--
version.pyc
560
B
-rw-r--r--
version.pyo
560
B
-rw-r--r--
wiredata.py
2.53
KB
-rw-r--r--
wiredata.pyc
2.19
KB
-rw-r--r--
wiredata.pyo
2.19
KB
-rw-r--r--
zone.py
37.94
KB
-rw-r--r--
zone.pyc
33.52
KB
-rw-r--r--
zone.pyo
33.52
KB
-rw-r--r--
Delete
Unzip
Zip
${this.title}
Close
Code Editor : tsig.py
# Copyright (C) 2001-2007, 2009-2011 Nominum, Inc. # # Permission to use, copy, modify, and distribute this software and its # documentation for any purpose with or without fee is hereby granted, # provided that the above copyright notice and this permission notice # appear in all copies. # # THE SOFTWARE IS PROVIDED "AS IS" AND NOMINUM DISCLAIMS ALL WARRANTIES # WITH REGARD TO THIS SOFTWARE INCLUDING ALL IMPLIED WARRANTIES OF # MERCHANTABILITY AND FITNESS. IN NO EVENT SHALL NOMINUM BE LIABLE FOR # ANY SPECIAL, DIRECT, INDIRECT, OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES # WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR PROFITS, WHETHER IN AN # ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT # OF OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE. """DNS TSIG support.""" import hmac import struct import sys import dns.exception import dns.hash import dns.rdataclass import dns.name class BadTime(dns.exception.DNSException): """Raised if the current time is not within the TSIG's validity time.""" pass class BadSignature(dns.exception.DNSException): """Raised if the TSIG signature fails to verify.""" pass class PeerError(dns.exception.DNSException): """Base class for all TSIG errors generated by the remote peer""" pass class PeerBadKey(PeerError): """Raised if the peer didn't know the key we used""" pass class PeerBadSignature(PeerError): """Raised if the peer didn't like the signature we sent""" pass class PeerBadTime(PeerError): """Raised if the peer didn't like the time we sent""" pass class PeerBadTruncation(PeerError): """Raised if the peer didn't like amount of truncation in the TSIG we sent""" pass # TSIG Algorithms HMAC_MD5 = dns.name.from_text("HMAC-MD5.SIG-ALG.REG.INT") HMAC_SHA1 = dns.name.from_text("hmac-sha1") HMAC_SHA224 = dns.name.from_text("hmac-sha224") HMAC_SHA256 = dns.name.from_text("hmac-sha256") HMAC_SHA384 = dns.name.from_text("hmac-sha384") HMAC_SHA512 = dns.name.from_text("hmac-sha512") default_algorithm = HMAC_MD5 BADSIG = 16 BADKEY = 17 BADTIME = 18 BADTRUNC = 22 def sign(wire, keyname, secret, time, fudge, original_id, error, other_data, request_mac, ctx=None, multi=False, first=True, algorithm=default_algorithm): """Return a (tsig_rdata, mac, ctx) tuple containing the HMAC TSIG rdata for the input parameters, the HMAC MAC calculated by applying the TSIG signature algorithm, and the TSIG digest context. @rtype: (string, string, hmac.HMAC object) @raises ValueError: I{other_data} is too long @raises NotImplementedError: I{algorithm} is not supported """ (algorithm_name, digestmod) = get_algorithm(algorithm) if first: ctx = hmac.new(secret, digestmod=digestmod) ml = len(request_mac) if ml > 0: ctx.update(struct.pack('!H', ml)) ctx.update(request_mac) id = struct.pack('!H', original_id) ctx.update(id) ctx.update(wire[2:]) if first: ctx.update(keyname.to_digestable()) ctx.update(struct.pack('!H', dns.rdataclass.ANY)) ctx.update(struct.pack('!I', 0)) long_time = time + 0L upper_time = (long_time >> 32) & 0xffffL lower_time = long_time & 0xffffffffL time_mac = struct.pack('!HIH', upper_time, lower_time, fudge) pre_mac = algorithm_name + time_mac ol = len(other_data) if ol > 65535: raise ValueError('TSIG Other Data is > 65535 bytes') post_mac = struct.pack('!HH', error, ol) + other_data if first: ctx.update(pre_mac) ctx.update(post_mac) else: ctx.update(time_mac) mac = ctx.digest() mpack = struct.pack('!H', len(mac)) tsig_rdata = pre_mac + mpack + mac + id + post_mac if multi: ctx = hmac.new(secret, digestmod=digestmod) ml = len(mac) ctx.update(struct.pack('!H', ml)) ctx.update(mac) else: ctx = None return (tsig_rdata, mac, ctx) def hmac_md5(wire, keyname, secret, time, fudge, original_id, error, other_data, request_mac, ctx=None, multi=False, first=True, algorithm=default_algorithm): return sign(wire, keyname, secret, time, fudge, original_id, error, other_data, request_mac, ctx, multi, first, algorithm) def validate(wire, keyname, secret, now, request_mac, tsig_start, tsig_rdata, tsig_rdlen, ctx=None, multi=False, first=True): """Validate the specified TSIG rdata against the other input parameters. @raises FormError: The TSIG is badly formed. @raises BadTime: There is too much time skew between the client and the server. @raises BadSignature: The TSIG signature did not validate @rtype: hmac.HMAC object""" (adcount,) = struct.unpack("!H", wire[10:12]) if adcount == 0: raise dns.exception.FormError adcount -= 1 new_wire = wire[0:10] + struct.pack("!H", adcount) + wire[12:tsig_start] current = tsig_rdata (aname, used) = dns.name.from_wire(wire, current) current = current + used (upper_time, lower_time, fudge, mac_size) = \ struct.unpack("!HIHH", wire[current:current + 10]) time = ((upper_time + 0L) << 32) + (lower_time + 0L) current += 10 mac = wire[current:current + mac_size] current += mac_size (original_id, error, other_size) = \ struct.unpack("!HHH", wire[current:current + 6]) current += 6 other_data = wire[current:current + other_size] current += other_size if current != tsig_rdata + tsig_rdlen: raise dns.exception.FormError if error != 0: if error == BADSIG: raise PeerBadSignature elif error == BADKEY: raise PeerBadKey elif error == BADTIME: raise PeerBadTime elif error == BADTRUNC: raise PeerBadTruncation else: raise PeerError('unknown TSIG error code %d' % error) time_low = time - fudge time_high = time + fudge if now < time_low or now > time_high: raise BadTime (junk, our_mac, ctx) = sign(new_wire, keyname, secret, time, fudge, original_id, error, other_data, request_mac, ctx, multi, first, aname) if (our_mac != mac): raise BadSignature return ctx _hashes = None def _maybe_add_hash(tsig_alg, hash_alg): try: _hashes[tsig_alg] = dns.hash.get(hash_alg) except KeyError: pass def _setup_hashes(): global _hashes _hashes = {} _maybe_add_hash(HMAC_SHA224, 'SHA224') _maybe_add_hash(HMAC_SHA256, 'SHA256') _maybe_add_hash(HMAC_SHA384, 'SHA384') _maybe_add_hash(HMAC_SHA512, 'SHA512') _maybe_add_hash(HMAC_SHA1, 'SHA1') _maybe_add_hash(HMAC_MD5, 'MD5') def get_algorithm(algorithm): """Returns the wire format string and the hash module to use for the specified TSIG algorithm @rtype: (string, hash constructor) @raises NotImplementedError: I{algorithm} is not supported """ global _hashes if _hashes is None: _setup_hashes() if isinstance(algorithm, (str, unicode)): algorithm = dns.name.from_text(algorithm) if sys.hexversion < 0x02050200 and \ (algorithm == HMAC_SHA384 or algorithm == HMAC_SHA512): raise NotImplementedError("TSIG algorithm " + str(algorithm) + " requires Python 2.5.2 or later") try: return (algorithm.to_digestable(), _hashes[algorithm]) except KeyError: raise NotImplementedError("TSIG algorithm " + str(algorithm) + " is not supported") def get_algorithm_and_mac(wire, tsig_rdata, tsig_rdlen): """Return the tsig algorithm for the specified tsig_rdata @raises FormError: The TSIG is badly formed. """ current = tsig_rdata (aname, used) = dns.name.from_wire(wire, current) current = current + used (upper_time, lower_time, fudge, mac_size) = \ struct.unpack("!HIHH", wire[current:current + 10]) current += 10 mac = wire[current:current + mac_size] current += mac_size if current > tsig_rdata + tsig_rdlen: raise dns.exception.FormError return (aname, mac)
Close