You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
if we can port the reliable python (nsec, not nsec3!) algorithm to go (or maybe JS), we can create a function that could nsec walk (in background or refresh on demand?) a zone and potentially hand back the front end apps a list of entire existing name space under the keys in their keystore as well as the existing DNS RR types existing at each name, together with together with any/all subdomains that contain RRs beneath it. Perhaps best useful in JSON form. Front end apps (such as playground) can then perform an ANY query for particular FQDN and get all existing RR types at that point.
Could also be a very cool go CMD line option!
The text was updated successfully, but these errors were encountered:
Existing implementations:
if we can port the reliable python (nsec, not nsec3!) algorithm to go (or maybe JS), we can create a function that could nsec walk (in background or refresh on demand?) a zone and potentially hand back the front end apps a list of entire existing name space under the keys in their keystore as well as the existing DNS RR types existing at each name, together with together with any/all subdomains that contain RRs beneath it. Perhaps best useful in JSON form. Front end apps (such as playground) can then perform an ANY query for particular FQDN and get all existing RR types at that point.
Could also be a very cool go CMD line option!
The text was updated successfully, but these errors were encountered: