<p style="text-align: center;"><strong><img alt="" src="https://simg.open-open.com/show/55b4a7328c26a7b02b2c8edb4dcee7fb.png" /></strong></p> <p> </p> <p>DNSDiag可以助你排查DNS流量被ISP劫持和DNS响应了错误的行为亦或指向了错误的地址等问题,DNSDiag 包含 dnsping、dnstraceroute、dnseval 三个工具。</p> <p><strong>dnsping</strong></p> <p>又一个跟 ping 类似的工具,针对 HTTP 的可参考 httping。dnsping 发送 DNS 查询来 ping DNS 服务器:</p> <p>./dnsping -s 8.8.8.8 -c 5 linuxtoy.org</p> <p>dnsping DNS: 8.8.8.8:53, hostname: linuxtoy.org, rdatatype: A</p> <p>39 bytes from 8.8.8.8: seq=0 time=111.764 ms</p> <p>38 bytes from 8.8.8.8: seq=1 time=65.606 ms</p> <p>39 bytes from 8.8.8.8: seq=2 time=110.593 ms</p> <p>38 bytes from 8.8.8.8: seq=3 time=67.940 ms</p> <p>38 bytes from 8.8.8.8: seq=4 time=66.181 ms</p> <p>--- 8.8.8.8 dnsping statistics ---</p> <p>5 requests transmitted, 5 responses received, 0% lost</p> <p>min=65.606 ms, avg=84.417 ms, max=111.764 ms, stddev=24.449 ms</p> <p>其中,-s 指定 DNS 服务器,-c 为请求次数,linuxtoy.org 为要查询的域名。从结果我们可以看到,查询的最小、最大及平均响应时间。</p> <p> </p> <p><strong>dnstraceroute</strong></p> <p>这个工具与 traceroute 相似,用来查询 DNS 请求的路由:</p> <p>./dnstraceroute --expert -s 8.8.8.8 linuxtoy.org</p> <p>dnstraceroute DNS: 8.8.8.8:53, hostname: linuxtoy.org, rdatatype: A</p> <p>1 gateway (10.217.89.1) 1 ms</p> <p>2 10.210.4.37 (10.210.4.37) 1 ms</p> <p>3 10.210.2.67 (10.210.2.67) 1 ms</p> <p>4 254.118.142.219.broad.bj.bj.dynamic.163data.com.cn (219.142.118.254) 2 ms</p> <p>5 10.210.1.14 (10.210.1.14) 4 ms</p> <p>6 192.168.5.30 (192.168.5.30) 7 ms</p> <p>7 180.149.129.217 (180.149.129.217) 7 ms</p> <p>8 *</p> <p>9 180.149.128.9 (180.149.128.9) 8 ms</p> <p>10 202.97.53.146 (202.97.53.146) 8 ms</p> <p>11 202.97.58.94 (202.97.58.94) 9 ms</p> <p>12 202.97.91.114 (202.97.91.114) 49 ms</p> <p>13 202.97.62.214 (202.97.62.214) 47 ms</p> <p>14 209.85.241.58 (209.85.241.58) 43 ms</p> <p>15 209.85.142.185 (209.85.142.185) 45 ms</p> <p>16 216.239.41.7 (216.239.41.7) 152 ms</p> <p>17 209.85.243.23 (209.85.243.23) 62 ms</p> <p>18 *</p> <p>19 google-public-dns-a.google.com (8.8.8.8) 72 ms</p> <p> </p> <p>=== Expert Hints ===</p> <p> [*] public DNS server is next to an invisible hop (probably a firewall)</p> <p>--expert 选项可以给出一些有用的提示。</p> <p> </p> <p><strong>dnseval</strong></p> <p>批量 ping 工具,同样是针对 DNS:</p> <p>./dnseval linuxtoy.org</p> <p>server avg(ms) min(ms) max(ms) stddev(ms) lost(%)</p> <p>---------------------------------------------------------------------------</p> <p>10.210.12.10 51.627 1.169 503.838 158.891 %0</p> <p>202.106.182.153 285.889 2.336 604.162 312.265 %14</p> <h2>更新日志</h2> <ul> <li>Improved time calculations</li> <li>Display DNS response in verbose mode</li> <li>Display correct TTL for CNAME records</li> </ul> <h2>下载</h2> <ul> <li><a href="/misc/goto?guid=4959007110783256049" rel="nofollow"><strong>dnsdiag-1.6.0.darwin-x86_64.tar.gz</strong></a></li> <li><a href="/misc/goto?guid=4959007110880697202" rel="nofollow"><strong>dnsdiag-1.6.0.linux-x86_64-bin.tar.gz</strong></a></li> <li><a href="/misc/goto?guid=4959007110973214229" rel="nofollow"><strong>dnsdiag-1.6.0.win-amd64-exe.zip</strong></a></li> <li><a href="/misc/goto?guid=4959007111062713931" rel="nofollow"><strong>Source code</strong> (zip)</a></li> <li><a href="/misc/goto?guid=4959007111154941430" rel="nofollow"><strong>Source code</strong> (tar.gz)</a></li> </ul> <p>本站原创,转载时保留以下信息:<br /> 本文转自:深度开源(open-open.com)<br /> 原文地址:<a href="http://www.open-open.com/news/view/649d963c">http://www.open-open.com/news/view/649d963c</a></p>