1351 PTRs for 1 IP
barmar at genuity.net
Tue Feb 5 21:18:41 UTC 2002
In article <a3pg8a$pi1 at pub3.rc.vix.com>,
Pawel Rogocz <pawel at rogocz.com> wrote:
>Just to clarify:
>I do *not* administer the server in question. It was something I
>saw, when my server was making a request.
>I think the DNS server should be happy with whatever answer it gets over
>UDP, as I do not think any application is capable of making use of all
>3 x 65535 records, plus you have always a chance of overflowing some buffers
>somewhere, when you get more data then you were expecting.
>511 bytes is enough for me to get what I want, I do not need all 3 x 65535
>records that could be stuffed in the response.
How is the DNS server supposed to know what the application is "capable of
making use of"?
>Blocking TCP queries would be a security measure to prevent rogue
>servers from sending too much data, more then I really care to get.
I can just barely understand blocking *incoming* TCP, but I can't
understand why you would block outgoing ones.
Barry Margolin, barmar at genuity.net
Genuity, Woburn, MA
*** DON'T SEND TECHNICAL QUESTIONS DIRECTLY TO ME, post them to newsgroups.
Please DON'T copy followups to me -- I'll assume it wasn't posted to the group.
More information about the bind-users