ehrlich@cs.psu.edu (Dan Ehrlich) (03/21/91)
I started seeing bogus wild cards for '*' from c.nyser.net around 0819 yesterday. Has anyone else seen this? Below is a piece of named.run showing what is happening. I have called NYSERNet operations and the folks at NIC.DDN.MIL a few moments ago so this may all be cleared up by the time you read this. >> forw: forw -> 192.33.4.12 8 (53) nsid=374 id=181 119ms retry 4 sec >> >> datagram from 192.33.4.12 port 53, fd 8, len 71 >> ns_req() >> HEADER: >> opcode = QUERY, id = 374, rcode = NOERROR >> header flags: qr ra >> qdcount = 1, ancount = 0, nscount = 1, arcount = 1 >> >> QUESTIONS: >> TECHNION, type = MX, class = IN >> >> NAME SERVERS: >> * >> type = NS, class = IN, ttl = 604677, dlen = 16 >> domain name = RA.MSSTATE.EDU >> >> ADDITIONAL RECORDS: >> RA.MSSTATE.EDU >> type = A, class = IN, ttl = 172800, dlen = 4 >> internet address = 130.18.80.10 >> >> qfindid(374) >> USER response nsid=374 id=181 >> stime 669486961/476092 now 669486961/676092 rtt 200 >> NS #0 addr 192.33.4.12 used, rtt 143 >> NS #1 128.9.0.107 rtt now 118 >> NS #2 192.5.25.82 rtt now 122 >> NS #3 128.102.16.10 rtt now 137 >> NS #4 26.1.0.13 rtt now 148 >> NS #5 128.8.10.90 rtt now 150 >> NS #6 192.67.67.53 rtt now 160 >> NS #7 192.52.195.10 rtt now 162 >> NS #8 26.3.0.103 rtt now 268 >> resp: ancount 0, aucount 1, arcount 1 >> doupdate(zone 0, savens f7fff674, flags 19) >> doupdate: dname * type 2 class 1 ttl 604677 >> Bogus wildcard from 192.33.4.12: >> resp: leaving, doupdate failed >> -- Dan Ehrlich - Sr. Systems Programmer - Penn State Computer Science <ehrlich@cs.psu.edu>/Voice: +1 814 863 1142/FAX: +1 814 865 3176