#dns-records #dnssec #dns #bind #dns-resolver #dig #named

bin+lib hickory-dns

Hickory DNS is a safe and secure DNS server with DNSSEC support. Eventually this could be a replacement for BIND9. The DNSSEC support allows for live signing of all records, in it does not currently support records signed offline. The server supports dynamic DNS with SIG0 authenticated requests. Hickory DNS is based on the Tokio and Futures libraries, which means it should be easily integrated into other software that also use those libraries.

12 releases

new 0.25.1 Mar 18, 2025
0.25.0-alpha.4 Nov 28, 2024
0.25.0-alpha.1 Jun 16, 2024
0.24.4 Feb 19, 2025
0.1.0 May 17, 2023

#5 in #named

Download history 199/week @ 2024-11-27 236/week @ 2024-12-04 168/week @ 2024-12-11 49/week @ 2024-12-18 33/week @ 2024-12-25 69/week @ 2025-01-01 132/week @ 2025-01-08 219/week @ 2025-01-15 352/week @ 2025-01-22 124/week @ 2025-01-29 465/week @ 2025-02-05 477/week @ 2025-02-12 395/week @ 2025-02-19 64/week @ 2025-02-26 47/week @ 2025-03-05 59/week @ 2025-03-12

664 downloads per month

MIT/Apache

2.5MB
42K SLoC

Overview

Hickory DNS provides a binary for hosting or forwarding DNS zones.

This a named implementation for DNS zone hosting, stub resolvers, and recursive resolvers. It is capable of performing signing all records in the zone for server DNSSEC RRSIG records associated with all records in a zone. There is also a hickory-dns binary that can be generated from the library with cargo install hickory-dns. Dynamic updates are supported via SIG0 (an mTLS authentication method is under development).

NOTICE This project was rebranded from Trust-DNS to Hickory DNS and has been moved to the https://github.com/hickory-dns/hickory-dns organization and repo, this crate/binary has been moved to hickory-dns, from 0.24 and onward, for prior versions see trust-dns.

Features

  • Dynamic Update with sqlite journaling backend (SIG0)
  • DNSSEC online signing (with NSEC and NSEC3)
  • Forwarding stub resolver
  • ANAME resolution, for zone mapping aliases to A and AAAA records
  • Additionals section generation for aliasing record types

Optional protocol support

The following DNS protocols are optionally supported:

  • Enable dns-over-rustls for DNS over TLS (DoT)
  • Enable dns-over-https-rustls for DNS over HTTP/2 (DoH)
  • Enable dns-over-quic for DNS over QUIC (DoQ)
  • Enable dns-over-h3 for DNS over HTTP/3 (DoH3)

DNSSEC status

The current root key is bundled into the system, and used by default. This gives validation of DNSKEY and DS records back to the root. NSEC and NSEC3 are implemented.

Zones will be automatically resigned on any record updates via dynamic DNS. To enable DNSSEC, enable the dnssec-ring feature.

Future goals

  • Distributed dynamic DNS updates, with consensus
  • mTLS based authorization for Dynamic Updates
  • Online NSEC creation for queries
  • Maybe NSEC5 support

Running

Warning: Hickory DNS is still under development, running in production is not recommended.

  • Verify the version
./target/release/hickory-dns --version
  • Get help
./target/release/hickory-dns --help
  • Launch hickory-dns server with test config

Note that if the -p parameter is not passed, the server will run on default DNS ports. There are separate port options for DoT and DoH servers, see hickory-dns --help

./target/release/hickory-dns -c ./tests/test-data/test_configs/example.toml -z ./tests/test-data/test_configs/ -p 24141
  • Query the just launched server with dig
dig @127.0.0.1 -p 24141 www.example.com

Minimum Rust Version

The current minimum rustc version for this project is 1.70

Versioning

Hickory DNS does it's best job to follow semver. Hickory DNS will be promoted to 1.0 upon stabilization of the publicly exposed APIs. This does not mean that Hickory DNS will necessarily break on upgrades between 0.x updates. Whenever possible, old APIs will be deprecated with notes on what replaced those deprecations. Hickory DNS will make a best effort to never break software which depends on it due to API changes, though this can not be guaranteed. Deprecated interfaces will be maintained for at minimum one major release after that in which they were deprecated (where possible), with the exception of the upgrade to 1.0 where all deprecated interfaces will be planned to be removed.

Dependencies

~20–62MB
~1M SLoC