You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
This has only limited benefits.
When the input event contains a URL/FQDN and you want to compare that to firewall entries, you always need all IP address this IP resolves to, not just anyone.
When you want to block hosts based on their IP addresses, you also need to block all of them.
Only if you want to get any contact data for the host, one IP address suffices.
socket.getaddrinfo also returns IPv6 addresses, but requests a destination port and is therefore unsuitable for our purpose.
So what's left is using dnspython
The text was updated successfully, but these errors were encountered:
The
gethostbyname
expert resolves a domain name (*.fqdn
) to the IP address (*.ip
), butbecause
socket.gethostbyname
works this wayThis has only limited benefits.
When the input event contains a URL/FQDN and you want to compare that to firewall entries, you always need all IP address this IP resolves to, not just anyone.
When you want to block hosts based on their IP addresses, you also need to block all of them.
Only if you want to get any contact data for the host, one IP address suffices.
Alternative Python calls are
socket.gethostbyname_ex
, which returns a list of addresses per host, but only IPv4socket.getaddrinfo
also returns IPv6 addresses, but requests a destination port and is therefore unsuitable for our purpose.So what's left is using dnspython
The text was updated successfully, but these errors were encountered: