I'm using dnspython to check DNS records against an internal system and have some questions about the zone transfer code.
1) Can someone provide an example of using dns.query.inbound_xfr as a replacement for dns.query.xfr? I have found examples of using the, now deprecated, xfr method and would like to make sure that I'm not relying on depreciated code.
2) When reading in the results of dns.query.xfr using zone = dns.zone.from_xfr(dns.query.xfr(server, domain))
I'm seeing host results for entries that are not host entries, but rather DNSSEC entries.
For instance
VSFGSJPH9OVUP1AKGF9RVUOI49F7JCB2.ext.bbn.com. 900 IN RRSIG NSEC3 8 4 900 20220729080624 20220725072243 62481
ext.bbn.com. L2ioTVbExtZyMkHXWnKO/ROAUfLEc2DU9xc/dks+5JeIJN4D9tCOUzrW zSRnKolTWXnTYKbk0B0wNIAU1cF2TRNkJfFURHetRizLSEUZcFVgO35j D2IY/PA4cPbgzu/YJZVpRD/QOUizAcOp4xfQenB7gqmAfcHYgdq5wPfA HgxBmMjYY1FbmVSK/zK0a94XBl3BGUsQZ0KGrix45rQ/uMMF0jMCSPw1 dPWxKwXmEaWroKSVZdbqPzkaJkSD6jYUD4m6RyWybJf84RDA3ugjoODT 1Nm30prBcW2XHLWtH2L2YaQQ9F1uCfYzD5LU152nL1YnIXg5l6c50D4/ KPL/kw==
VSFGSJPH9OVUP1AKGF9RVUOI49F7JCB2.ext.bbn.com. 900 IN NSEC3 1 0 500 BD1C977E00CAE5E2 0NFDKI1QUFKINMIVM3NSPQ6M6R1TU73H A RRSIG
Shows up as a host with the name VSFGSJPH9OVUP1AKGF9RVUOI49F7JCB2 in the zone object. I'd like to filter these out and only get the hostnames.
I figured out that if I use "if dns.node.NodeKind.REGULAR == node.classify()" that I only see the host records that I want. Adding this to the documentation would prove helpful to others that run into this.