Chained NS delegation: RFC compliant or not?
Andreas Meile
andreas at hofen.ch
Mon Oct 25 08:30:01 UTC 2004
Dear BIND users
Recently, I would visit a web site hosted by a German company. The problem:
I can't visit it because I get a lot of
Oct 10 22:28:47 pingu named[153]: Lame server on 'ns1.foobar.de' (in
'foobar.de'?): [192.36.144.211].53 'H.NIC.de'
Oct 10 22:28:48 pingu named[153]: Lame server on 'ns1.foobar.de' (in
'foobar.de'?): [210.81.13.179].53 'K.NIC.de'
Oct 10 22:28:48 pingu named[153]: Lame server on 'ns1.foobar.de' (in
'foobar.de'?): [81.91.161.5].53 'A.NIC.de'
Oct 10 22:28:48 pingu named[153]: Lame server on 'ns1.foobar.de' (in
'foobar.de'?): [193.0.0.237].53 'F.NIC.de'
in my local name server which runs as BIND named. The analysation shows the
following situation:
pingu:~ # host -t ns site-i-want-visit.de
site-i-want-visit.de name server ns2.foobar.de
site-i-want-visit.de name server ns1.foobar.de
pingu:~ # host -t ns foobar.de
foobar.de name server ns3.delegated-again.net
foobar.de name server ns.delegated-again.net
foobar.de name server ns2.delegated-again.net
pingu:~ # _
i.e. this webhoster ISP implemented a chained delegation. At my knowledge,
this violates RFC 1912, section 2.8. Could anyone agree or disagree that?
Andreas
More information about the bind-users
mailing list