74ce22a546275f2b2cf876c58a7d900a35d111c3
6 while getopts "a:c:e:i:l:n:k:V:o:p:q:P:t:v:x:C:L:R:h" OPT
; do
7 if [ "$OPT" == 'h' ]; then
9 This is DNSSEC wrapper for OpenSSH client which will simply prevent you
10 from connecting to hosts with fraudent DNS records.
12 You can use alias ssh='$0' (and you can add it to your ~/.bashrc)
14 Command line options are just the same as for SSH, but you have to
15 specify all the options before hostname and optional command. eg.:
16 $0 -p2222 user@example.com (good)
17 $0 user@example.com -p2222 (baad)
19 To test if $0 works as it's supposed to be working, you can try following:
20 $0 user@badsign-a.test.dnssec-tools.org
22 (both commands should fail with DNSSEC error)
29 shift $
(($OPTIND -1));
31 echo "$drill -TD $host"
32 out
="$("$drill" -TD "$host")"; ret
=$?
;
33 echo "$out" |
grep -i NO.DNSKEY
;
37 if check_ssh_cmdline $@
; then
38 echo -e 'DNSSEC verification OK :-)\n'
42 echo 'DNSSEC verification FAILED!'
This page took 0.331428 seconds and 3 git commands to generate.