drool can replay DNS traffic from packet capture (PCAP) files and send it to a specified server, with options such as to manipulate the timing between packets, as well as loop packets infinitely or for a set number of iterations. This tool's goal is to be able to produce a high amount of UDP packets per second and TCP sessions per second on common hardware.
The purpose can be to simulate Distributed Denial of Service (DDoS) attacks on the DNS and measure normal DNS querying. For example, the tool could enable you to take a snapshot of a DDoS and be able to replay it later to test if new code or hardening techniques are useful, safe & effective. Another example is to be able to replay a packet stream for a bug that is sequence- and/or timing-related in order to validate the efficacy of subsequent bug fixes.
Following repositories are included:
dnf copr enable @dnsoarc/drool
The following unofficial repositories are provided as-is by owner of this project. Contact the owner directly for bugs or issues (IE: not bugzilla).
|Epel for CentOS 7||aarch64 (0)*, x86_64 (0)*||Epel for CentOS 7 (153 downloads)|
|Epel for CentOS 8||x86_64 (0)*||Epel for CentOS 8 (54 downloads)|
|Fedora 32||aarch64 (0)*, armhfp (0)*, x86_64 (0)*||Fedora 32 (0 downloads)|
|Fedora 33||x86_64 (0)*||Fedora 33 (27 downloads)|
|Fedora 34||x86_64 (0)*||Fedora 34 (15 downloads)|
|Fedora 35||x86_64 (0)*||Fedora 35 (0 downloads)|
|Fedora rawhide||x86_64 (0)*||Fedora rawhide (108 downloads)|
* Total number of packages downloaded in the last seven days.