Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Support for DNS CAA record in DNS template #1542

Closed
righettod opened this issue Jan 27, 2022 · 3 comments · Fixed by #1564
Closed

Support for DNS CAA record in DNS template #1542

righettod opened this issue Jan 27, 2022 · 3 comments · Fixed by #1564
Assignees
Labels
Priority: Low This issue can probably be picked up by anyone looking to contribute to the project, as an entry fix Status: Completed Nothing further to be done with this issue. Awaiting to be closed. Type: Enhancement Most issues will probably ask for additions or changes.
Milestone

Comments

@righettod
Copy link

righettod commented Jan 27, 2022

Please describe your feature request:

Hi,

It is planned to add support for the CAA DNS record in DNS template. Currently its supporting the following record types: A, NS, CNAME, SOA, PTR, MX, TXT, AAAA

dig caa google.com

; <<>> DiG 9.10.6 <<>> caa google.com
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 5193
;; flags: qr rd ra; QUERY: 1, ANSWER: 1, AUTHORITY: 0, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 512
;; QUESTION SECTION:
;google.com.			IN	CAA

;; ANSWER SECTION:
google.com.		21600	IN	CAA	0 issue "pki.goog"

;; Query time: 116 msec
;; SERVER: 8.8.8.8#53(8.8.8.8)
;; WHEN: Thu Jan 27 18:22:14 IST 2022
;; MSG SIZE  rcvd: 66

Describe the use case of this feature:

The goal is to create templates verifying the presence of CAA record for a domain in a context of monitoring or post deployment security validations. Using nuclei for this can help to have a cross-platform way to do it in addition to all other existing templates that can be leveraged for such monitoring/validations.

It is a defensive usage of nuclei 😃

Thank you very much in advance and thanks again x10000... for this amazing tool 🥇

@righettod righettod added the Type: Enhancement Most issues will probably ask for additions or changes. label Jan 27, 2022
@ehsandeep ehsandeep added the Priority: Low This issue can probably be picked up by anyone looking to contribute to the project, as an entry fix label Jan 27, 2022
@Mzack9999 Mzack9999 self-assigned this Feb 2, 2022
@Mzack9999 Mzack9999 added the Status: In Progress This issue is being worked on, and has someone assigned. label Feb 2, 2022
@Mzack9999 Mzack9999 linked a pull request Feb 2, 2022 that will close this issue
4 tasks
@Mzack9999 Mzack9999 added Status: Review Needed The issue has a PR attached to it which needs to be reviewed and removed Status: In Progress This issue is being worked on, and has someone assigned. labels Feb 2, 2022
@ehsandeep ehsandeep added Status: Completed Nothing further to be done with this issue. Awaiting to be closed. and removed Status: Review Needed The issue has a PR attached to it which needs to be reviewed labels Feb 3, 2022
@ehsandeep
Copy link
Member

@righettod Thanks to your feature request, this is now supported in the dev version.

@righettod
Copy link
Author

Guys you are all amazing !!!!

Thank you so much ❤️ ❤️ ❤️

@ehsandeep ehsandeep added this to the v2.6.0 milestone Feb 5, 2022
@righettod
Copy link
Author

Thank you very much 🥇

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
Priority: Low This issue can probably be picked up by anyone looking to contribute to the project, as an entry fix Status: Completed Nothing further to be done with this issue. Awaiting to be closed. Type: Enhancement Most issues will probably ask for additions or changes.
Projects
None yet
Development

Successfully merging a pull request may close this issue.

3 participants