[comp.protocols.tcp-ip.domains] Bogus wildcards from c.nyser.net

ehrlich@cs.psu.edu (Dan Ehrlich) (03/21/91)

I started seeing bogus wild cards for '*' from c.nyser.net around 0819
yesterday.  Has anyone else seen this?  Below is a piece of named.run
showing what is happening.  I have called NYSERNet operations and the folks
at NIC.DDN.MIL a few moments ago so this may all be cleared up by the time
you read this.

>>  forw: forw -> 192.33.4.12 8 (53) nsid=374 id=181 119ms retry 4 sec
>>  
>>  datagram from 192.33.4.12 port 53, fd 8, len 71
>>  ns_req()
>>  HEADER:
>>          opcode = QUERY, id = 374, rcode = NOERROR
>>          header flags:  qr ra
>>          qdcount = 1, ancount = 0, nscount = 1, arcount = 1
>>  
>>  QUESTIONS:
>>          TECHNION, type = MX, class = IN
>>  
>>  NAME SERVERS:
>>          *
>>          type = NS, class = IN, ttl = 604677, dlen = 16
>>          domain name = RA.MSSTATE.EDU
>>  
>>  ADDITIONAL RECORDS:
>>          RA.MSSTATE.EDU
>>          type = A, class = IN, ttl = 172800, dlen = 4
>>          internet address = 130.18.80.10
>>  
>>  qfindid(374)
>>  USER response nsid=374 id=181
>>  stime 669486961/476092  now 669486961/676092 rtt 200
>>  NS #0 addr 192.33.4.12 used, rtt 143
>>  NS #1 128.9.0.107 rtt now 118
>>  NS #2 192.5.25.82 rtt now 122
>>  NS #3 128.102.16.10 rtt now 137
>>  NS #4 26.1.0.13 rtt now 148
>>  NS #5 128.8.10.90 rtt now 150
>>  NS #6 192.67.67.53 rtt now 160
>>  NS #7 192.52.195.10 rtt now 162
>>  NS #8 26.3.0.103 rtt now 268
>>  resp: ancount 0, aucount 1, arcount 1
>>  doupdate(zone 0, savens f7fff674, flags 19)
>>  doupdate: dname * type 2 class 1 ttl 604677
>>  Bogus wildcard from 192.33.4.12:
>>  resp: leaving, doupdate failed
>>  
--
Dan Ehrlich - Sr. Systems Programmer - Penn State Computer Science
<ehrlich@cs.psu.edu>/Voice: +1 814 863 1142/FAX: +1 814 865 3176