Go to file
Jim Hague 277a4ae9c7 Add test for new libuv callback styles.
This fixes a build warning on Mac.
2019-11-13 18:07:31 +00:00
cmake Add test for new libuv callback styles. 2019-11-13 18:07:31 +00:00
doc Remove autoconf build and update to autoconf-less Stubby. 2019-11-01 12:27:10 +00:00
getdns.pmdoc fixed install prefix problems for osx 2014-04-02 09:19:56 -04:00
project-doc Last minute update 2018-05-11 13:20:08 +02:00
spec Remove autoconf build and update to autoconf-less Stubby. 2019-11-01 12:27:10 +00:00
src Remove autoconf build and update to autoconf-less Stubby. 2019-11-01 12:27:10 +00:00
stubby@6ce87658d2 Remove autoconf build and update to autoconf-less Stubby. 2019-11-01 12:27:10 +00:00
.dir-locals.el tell emacs users how to follow coding conventions 2015-07-19 12:22:11 +02:00
.gitignore Be more generous about what constitutes a build directory name. 2019-11-13 18:06:36 +00:00
.gitmodules update stubby submodule target 2019-11-04 14:07:26 +00:00
.indent.pro Ran indent with the indent.pro committed 2013-11-05 15:03:44 -05:00
.travis.yml The new minimum OpenSSL version means that Travis must switch to Xenial. 2019-01-15 12:11:13 +00:00
AUTHORS fixed license and copyright notices 2014-02-20 09:12:19 -05:00
CMakeLists.txt Add test for new libuv callback styles. 2019-11-13 18:07:31 +00:00
COPYING another file required by automake. using a symlink to LICENSE 2013-08-08 17:39:45 -08:00
ChangeLog Bumb versions for 1.5.2 release 2019-04-03 12:36:04 +02:00
CodingStyle added extension validation to the primary entry point to catch bogus 2013-11-04 18:37:54 -05:00
INSTALL Rewrite DNS proxy in transport/timeout test suites 2016-03-14 10:41:32 +01:00
LICENSE Fill in <organization> place holder. 2014-02-25 14:23:19 +01:00
NEWS separated libunbound test in configure.ac to give better diag msg 2013-11-03 16:40:24 -05:00
README automake version dep noted 2013-08-30 14:19:03 -04:00
README.md More work on the README - some sections still to do 2019-11-04 17:31:14 +00:00
getdns.pc.in pkg-config support 2015-12-02 13:15:16 -05:00
getdns_ext_event.pc.in Add a pkg-config file for the getdns_ext_event library. 2016-04-07 16:22:56 -03:00

README.md

getdns

Overview of getdns

getdns is an implementation of a modern asynchronous DNS API; the specification was originally edited by Paul Hoffman. It is intended to make all types of DNS information easily available to application developers and non-DNS experts.

Why you might want getdns

Traditional access to DNS data from applications has several limitations:

  • APIs require applications to have considerable sophistication about DNS data and data types

  • Some kinds of data about the response (notably, the resource record set time to live) is not exposed via any API, so applications need to process raw protocol responses to get such data

  • APIs are often blocking, meaning asynchronous access is not possible without some work

  • Sophisticated uses of the DNS (things like IDNA and DNSSEC validation) require considerable application work, possibly by application developers with little experience with the vagaries of DNS.

getdns also provides an experimental DNS Privacy enabled client called 'stubby' - see below for more details.

Motivation for providing the API

The developers are of the opinion that DNSSEC offers a unique global infrastructure for establishing and enhancing cryptographic trust relations. With the development of this API we intend to offer application developers a modern and flexible interface that enables end-to-end trust in the DNS architecture, and which will inspire application developers to implement innovative security solutions in their applications.

API Documentation

Note that this implementation offers additional functionality to supplement that in the official getdns API. Some additions are convenient utility functions but other functionality is experimental prior to be being recommended for inclusion in the official API. The Doxygen documentation provides the details of the full API for this implementation.

License

This implementation is licensed under the New BSD License (BSD-new).

Obtaining and getting started with getdns

The project home page at getdnsapi.net provides documentation, binary downloads, and news regarding the getdns API implementation. This README file captures the goals and direction of the project and the current state of the implementation.

If you are just getting started with the library take a look at the section below that describes building and handling external dependencies for the library.

Examples

Once it is built you should take a look at spec/example to see how the library is used.

Download

Download the sources from our github repo or from getdnsapi.net and verify the download using the checksums (SHA1 or MD5) or using gpg to verify the signature. Our keys are available from the pgp keyservers

  • willem@nlnetlabs.nl, key id E5F8F8212F77A498

Releases

Release numbering follows the Semantic Versioning approach. The code is currently under active development.

The following requirements were met as conditions for the present release:

QUESTION: The code does not currently compile cleanly on any platform......

  • code compiles cleanly on at least the primary target platforms: OSX, RHEL/CentOS Linux, FreeBSD
  • examples must compile and run cleanly
  • there must be clear documentation of supported and unsupported elements of the API

Building and External Dependencies

If you are installing from packages, you have to install the library and also the library-devel (or -dev) for your package management system to get the the necessary compile time files.

External dependencies are linked outside the getdns API build tree (we rely on configure to find them). We would like to keep the dependency tree short, see (#minimizing-dependancies) for more details.

Required for all builds:

Required for all builds including recursive functionality:

Required for all builds including IDN functionality:

  • libidn from the FSF version 1 or 2 (from version 2.0.0 and higher). (Note that the libidn version means the conversions between A-labels and U-labels may permit conversion of formally invalid labels under IDNA2008.)

Required to build the documentation:

  • Doxygen is used to generate documentation; while this is not technically necessary for the build it makes things a lot more pleasant.

For example, to build on a recent version of Ubuntu, you would need the following packages for a full build:

# apt install build-essential libunbound-dev libidn2-dev libssl-dev cmake

If you are building from git, you need to do the following before building:

# git submodule update --init

From release 1.6.0 getdns uses cmake (previous versions used autoconf/libtool) and so to build from this release use

# cmake .
# make

If you are unfamiliar with cmake, see our cmake Quick Start for how to use cmake options to customise the build.

As well as building the getdns library three other tools may be installed:

  • getdns_query: a command line test script wrapper for getdns. This can be used to quickly check the functionality of the library, see (#using-getdnsquery)
  • stubby: a DNS Privacy enabled client
  • getdns_server_mon: test DNS server function and capabilities

Note: If you only want to build stubby, then use the BUILD_STUBBY option when running cmake.

Minimizing dependencies

  • getdns can be configured for stub resolution mode only with the ENABLE_STUB_ONLY option to cmake. This removes the dependency on libunbound.
  • Currently getdns only offers two helper functions to deal with IDN: getdns_convert_ulabel_to_alabel and getdns_convert_alabel_to_ulabel. If you do not need these functions, getdns can be configured to compile without them with the USE_LIBIDN and USE_LIBIDN2 options to cmake.
  • When ENABLE_STUB_ONLY is ON, and USE_LIBIDN and USE_LIBIDN2 options are OFF, getdns has only one dependency left, which is OpenSSL.

Extensions and Event loop dependencies

The implementation works with a variety of event loops, each built as a separate shared library. See this Doxygen page and [this man page](https://getdnsapi.net/documentation/manpages/#ASYNCHRONOUS USE) for more details.

Using getdns_query

Example test queries using getdns_query (pointed at Google Public DNS) and requesting the call_reporting extension which provides information on the transport and query time:

getdns_query -s example.com A @8.8.8.8 +return_call_reporting (UDP) getdns_query -s example.com A @8.8.8.8 -T +return_call_reporting (TCP) getdns_query -s example.com A @8.8.8.8 -L +return_call_reporting (TLS without authentication) getdns_query -s getdnsapi.net A +dnssec_return_status +return_call_reporting (DNSSEC)

Stubby

  • Stubby is an implementation of a DNS Privacy enabled stub resolver that encrypts DNS queries using TLS. It is currently suitable for advanced/technical users - all feedback is welcome!
  • Details on how to use Stubby can be found in the Stubby Reference Guide.
  • Also see dnsprivacy.org for more information on DNS Privacy.

Experimental support for GnuTLS

A project to allow user selection of either OpenSSL or GnuTLS is currently a work in progress. At present a user may select to use GnuTLS for the majority of the supported functionality, however, OpenSSL is still required for some cryptographic functions.

Regression Tests

A suite of regression tests are included with the library, if you make changes or just want to sanity check things on your system take a look at src/test. You will need to install libcheck. The check library is also available from many of the package repositories for the more popular operating systems.

DNSSEC dependencies

For the library to be DNSSEC capable, it needs to know the root trust anchor. The library will try to load the root trust anchor from /etc/unbound/getdns-root.key by default. This file is expected to have one or more DS or DNSKEY resource records in presentation (i.e. zone file) format. Note that this is different than the format of BIND.keys.

##$ Zero configuration DNSSEC

When the root trust anchor is not installed in the default location and a DNSSEC query is done, getdns will try to use the trust anchors published here: http://data.iana.org/root-anchors/root-anchors.xml . It will validate these anchors with the ICANN Certificate Authority certificate following the procedure described in [RFC7958]. The root-anchors.xml and root-anchors.p7s S/MIME signature will be cached in the $HOME/.getdns directory on Unixes, and the %appdata%\getdns directory on Windows.

When using trust-anchors from the root-anchors.xml file, getdns will track the keys in the root DNSKEY rrset and store a copy in $HOME/.getdns/root.key on Unixes, and %appdata%\getdns\root.key on Windows. Only when the KSK DNSKEY's change, a new version of root-anchors.xml is tried to be retrieved from data.iana.org.

A installed trust-anchor from the default location (/etc/unbound/getdns-root.key) that fails to validate the root DNSKEY RRset, will also trigger the "Zero configuration DNSSEC" procedure described above.

Support

Mailing lists

We have a getdns users list for this implementation.

The getdns-api mailing list is a good place to engage in discussions regarding the design of the API.

Tickets and Bug Reports

Tickets and bug reports should be reported via the GitHub issues list.

Features of this release

Goals

The goals of this implementation of the getdns API are:

Non-goals (things we will not be doing at least initially) include:

  • implementation of the traditional DNS related routines (gethostbyname, etc.)

Language Bindings

In parallel, the team is actively developing bindings for various languages. For more information, visit this webpage.

Unsupported getDNS Features

The following API calls are documented in getDNS but not supported by the implementation at this time:

  • Detecting changes to resolv.conf and hosts
  • MDNS, NIS and NetBIOS namespaces (only DNS and LOCALFILES are supported)

Minor omissions

The following minor implementation omissions are noted:

Recursive mode does not support:

  • TLS as a transport
  • Non-zero connection idle timeouts or query pipelining
  • Anything other than query_type and resolution_type in the return_call_reporting extension

Stub mode does not support:

  • Non zero idle timeouts for synchronous calls

Known Issues

  • None

Supported Platforms

The platforms listed here are intended to help ensure that we catch platform specific breakage prior to release.

  • Ubuntu 18.04 LTS and newer LTS releases
  • Microsoft Windows 10
  • FreeBSD 11.3 and newer
  • RHEL/CentOS 8
  • OSX 10.14 and 10.15

Platform Specific Build Reports

Build Status

FreeBSD

If you're using FreeBSD, you may install getdns via the ports tree by running: cd /usr/ports/dns/getdns && make install clean

If you are using FreeBSD 10 getdns can be intalled via 'pkg install getdns'.

CentOS and RHEL 8

We rely on the most excellent package manager fpm to build the linux packages, which means that the packaging platform requires ruby 2.1.0. There are other ways to build the packages; this is simply the one we chose to use.

TODO: REDO WITHOUT SPECIFIC VERSION

# cat /etc/redhat-release
CentOS release 6.5 (Final)
# uname -a
Linux host-10-1-1-6 2.6.32-358.el6.x86_64 #1 SMP Fri Feb 22 00:31:26 UTC 2013 x86_64 x86_64 x86_64 GNU/Linux
# cd getdns-0.2.0rc1
# ./configure --prefix=/home/deploy/build
# make; make install
# cd /home/deploy/build
# mv lib lib64
# . /usr/local/rvm/config/alias
# fpm -x "*.la" -a native -s dir -t rpm -n getdns -v 0.2.0rc1 -d "unbound" -d "libevent" -d "libidn" --prefix /usr --vendor "Verisign Inc., NLnet Labs" --license "BSD New" --url "https://getdnsapi.net" --description "Modern asynchronous API to the DNS" .

OSX

A self-compiled version of OpenSSL or the version installed via Homebrew is required.
Note: If using a self-compiled version, manual configuration of certificates into /usr/local/etc/openssl/certs is required for TLS authentication to work.

Homebrew

If you're using Homebrew, you may run brew install getdns. By default, this will only build the core library without any 3rd party event loop support.

To install the event loop integration libraries that enable support for libevent, libuv, and libev, run: brew install getdns --with-libevent --with-libuv --with-libev. All switches are optional.

Note that in order to compile the examples, the --with-libevent switch is required.

Additionally, the OpenSSL library installed by Homebrew is linked against. Note that the Homebrew OpenSSL installation clones the Keychain certificates to the default OpenSSL location so TLS certificate authentication should work out of the box.

Microsoft Windows 10

TODO: Update with latest build instructions...

The build has been tested using the following: 32 bit only Mingw: Mingw(3.21.0) and Msys 1.0 on Windows 8.1 32 bit build on a 64 bit Mingw [Download latest from: http://mingw-w64.org/doku.php/download/mingw-builds and http://msys2.github.io/]. IMPORTANT: Install tested ONLY on the "x86_64" for 64-bit installer of msys2.

Dependencies

The following dependencies are

  • openssl-1.0.2j
  • libidn

Contributors

  • Claus Assman
  • Theogene Bucuti
  • Andrew Cathrow, Verisign Labs
  • Neil Cook
  • Saúl Ibarra Corretgé
  • Craig Despeaux, Verisign, Inc.
  • John Dickinson, Sinodun
  • Sara Dickinson, Sinodun
  • Robert Edmonds
  • Angelique Finan, Verisign, Inc.
  • Simson Garfinkel
  • Daniel Kahn Gillmor
  • Neel Goyal, Verisign, Inc.
  • Bryan Graham, Verisign, Inc.
  • Robert Groenenberg
  • Jim Hague, Sinodun
  • Paul Hoffman
  • Scott Hollenbeck, Verising, Inc.
  • Christian Huitema
  • Shumon Huque, Verisign Labs
  • Jelte Janssen
  • Guillem Jover
  • Shane Kerr
  • Anthony Kirby
  • Olaf Kolkman, NLnet Labs
  • Sanjay Mahurpawar, Verisign, Inc.
  • Allison Mankin, Verisign, Inc. - Verisign Labs.
  • Sai Mogali, Verisign, Inc.
  • Linus Nordberg
  • Benno Overeinder, NLnet Labs
  • Joel Purra
  • Tom Pusateri
  • Prithvi Ranganath, Verisign, Inc.
  • Hoda Rohani, NLnet Labs
  • Rushi Shah, Verisign, Inc.
  • Vinay Soni, Verisign, Inc.
  • Melinda Shore, No Mountain Software LLC
  • Bob Steagall, Verisign, Inc.
  • Andrew Sullivan
  • Ondřej Surý
  • Willem Toorop, NLnet Labs
  • Gowri Visweswaran, Verisign Labs
  • Wouter Wijngaards, NLnet Labs
  • Glen Wiley, Verisign, Inc.
  • Paul Wouters

Acknowledgements

The development team explicitly acknowledges Paul Hoffman for his initiative and efforts to develop a consensus based DNS API. We would like to thank the participants of the mailing list for their contributions.