Date: Thu, 17 May 2007 18:50:25 -0300 From: Hugo Koji Kobayashi <koji@registro.br> To: freebsd-stable@freebsd.org, freebsd-net@freebsd.org Subject: udp fragmentation with pf/ipf Message-ID: <20070517215025.GC37175@registro.br>
next in thread | raw e-mail | index | archive | help
--cvVnyQ+4j833TQvp Content-Type: text/plain; charset=us-ascii Content-Disposition: inline Hello, While making some tests with fragmented udp DNS responses (with EDNS0), we discovered a possible problem with ipf and pf in FreeBSD 6.2 and 7.0 (200705 snapshot). Our test is a DNS query to an DNSSEC enabled server which replies with a ~4KB udp response. We do this with the following dig command: dig @192.36.144.107 se dnskey +dnssec +bufsize=4500 +retry=0 ipf and pf in FreeBSD 6.2 or 7.0 block the fragments and the DNS queries timeout. Disabling the firewall, complete replies are received with no problem. We've made the same tests with FreeBSD 4.11 with ipf and OpenBSD 4.1 with pf with no problems. You can see a summary of the tests below. OS + fw dig result fbsd4.11 + ipf OK obsd4.1 + pf OK fbsd6.2 OK fbsd6.2 + ipf timeout fbsd6.2 + pf timeout fbsd7.0 OK fbsd7.0 + ipf timeout fbsd7.0 + pf timeout Complete test results (including tcpdump output and firewall rule sets) are attached. Can somebody tell us if he hit a bug or if there is something we are missing? Thanks, Hugo --cvVnyQ+4j833TQvp Content-Type: text/plain; charset=us-ascii Content-Disposition: attachment; filename="fw-edns0-tests.txt" ###### FreeBSD 4.11 + ipfilter -> dig OK fbsd4.11# uname -v FreeBSD 4.11-RELEASE #0: Fri Jan 21 17:21:22 GMT 2005 root@perseus.cse.buffalo.edu:/usr/obj/usr/src/sys/GENERIC fbsd4.11# ipf -V ipf: IP Filter: v3.4.35 (336) Kernel: IP Filter: v3.4.35 Running: yes Log Flags: 0 = none set Default: pass all, Logging: available Active list: 0 fbsd4.11# ipfstat -ion @1 pass out log quick on bge0 proto udp from xxx.xxx.xxx.113/32 to any port = 53 keep state keep frags @2 pass out quick on bge0 proto tcp/udp from xxx.xxx.xxx.113/32 to any keep state @3 pass out quick on bge0 proto icmp from xxx.xxx.xxx.113/32 to any keep state @4 pass out quick on lo0 from any to any @5 block out log from any to any @1 pass in quick on bge0 proto tcp from xxx.xxx.xxx.81/32 to xxx.xxx.xxx.113/32 port = 22 keep state @2 pass in quick on lo0 from any to any @3 block in log from any to any fbsd4.11# tcpdump -i bge0 -np host 192.36.144.107 tcpdump: listening on bge0 09:46:16.546878 xxx.xxx.xxx.113.2897 > 192.36.144.107.53: 37118+ [1au] Type48? se. (31) 09:46:16.789319 192.36.144.107.53 > xxx.xxx.xxx.113.2897: 37118*- 8/10/24 Type48[|domain] (frag 8851:1480@0+) 09:46:16.789325 192.36.144.107 > xxx.xxx.xxx.113: udp (frag 8851:1480@1480+) 09:46:16.789331 192.36.144.107 > xxx.xxx.xxx.113: udp (frag 8851:1134@2960) fbsd4.11# grep 192.36.144.107 /var/log/messages May 17 09:46:16 fbsd4.11 ipmon[54]: 09:46:16.546867 bge0 @0:1 p xxx.xxx.xxx.113,2897 -> 192.36.144.107,53 PR udp len 20 59 K-S K-F OUT May 17 09:46:16 fbsd4.11 ipmon[54]: 09:46:16.789339 bge0 @0:1 p 192.36.144.107,53 -> xxx.xxx.xxx.113,2897 PR udp len 20 1500 K-S K-F IN May 17 09:46:16 fbsd4.11 ipmon[54]: 09:46:16.789347 bge0 @-1:-1 p 192.36.144.107 -> xxx.xxx.xxx.113 PR udp len 20 (1500) (frag 8851:1480@1480+) K-S K-F IN May 17 09:46:16 fbsd4.11 ipmon[54]: 09:46:16.789353 bge0 @-1:-1 p 192.36.144.107 -> xxx.xxx.xxx.113 PR udp len 20 (1154) (frag 8851:1134@2960) K-S K-F IN fbsd4.11# /usr/local/bin/dig @192.36.144.107 se dnskey +dnssec +bufsize=4500 +retry=0 ; <<>> DiG 9.4.1 <<>> @192.36.144.107 se dnskey +dnssec +bufsize=4500 +retry=0 ; (1 server found) ;; global options: printcmd ;; Got answer: ;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 37118 ;; flags: qr aa rd; QUERY: 1, ANSWER: 8, AUTHORITY: 10, ADDITIONAL: 24 ;; WARNING: recursion requested but not available ;; OPT PSEUDOSECTION: ; EDNS: version: 0, flags: do; udp: 4096 ;; QUESTION SECTION: [...] ;; Query time: 245 msec ;; SERVER: 192.36.144.107#53(192.36.144.107) ;; WHEN: Thu May 17 09:46:16 2007 ;; MSG SIZE rcvd: 4086 ###### FreeBSD 6.2 + no firewall -> dig OK fbsd6.2# uname -v FreeBSD 6.2-RELEASE #0: Fri Jan 12 11:05:30 UTC 2007 root@dessler.cse.buffalo.edu:/usr/obj/usr/src/sys/SMP fbsd6.2# dig @192.36.144.107 se dnskey +dnssec +bufsize=4500 +retry=0 ; <<>> DiG 9.3.3 <<>> @192.36.144.107 se dnskey +dnssec +bufsize=4500 +retry=0 ; (1 server found) ;; global options: printcmd ;; Got answer: ;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 7745 ;; flags: qr aa rd; QUERY: 1, ANSWER: 8, AUTHORITY: 10, ADDITIONAL: 24 ;; OPT PSEUDOSECTION: ; EDNS: version: 0, flags: do; udp: 4096 ;; QUESTION SECTION: ;se. IN DNSKEY [...] ;; Query time: 243 msec ;; SERVER: 192.36.144.107#53(192.36.144.107) ;; WHEN: Thu May 17 11:31:39 2007 ;; MSG SIZE rcvd: 4086 ###### FreeBSD 6.2 + pf -> dig timeout fbsd6.2# uname -v FreeBSD 6.2-RELEASE #0: Fri Jan 12 11:05:30 UTC 2007 root@dessler.cse.buffalo.edu:/usr/obj/usr/src/sys/SMP fbsd6.2# pfctl -sr No ALTQ support in kernel ALTQ related functions disabled scrub in all fragment reassemble block drop in log all pass in on bge0 inet proto tcp from xxx.xxx.xxx.81 to xxx.xxx.xxx.87 port = ssh keep state pass out on bge0 proto tcp all keep state pass out on bge0 proto udp all keep state pass out on bge0 proto icmp all keep state fbsd6.2# tcpdump -i bge0 -np host 192.36.144.107 tcpdump: verbose output suppressed, use -v or -vv for full protocol decode listening on bge0, link-type EN10MB (Ethernet), capture size 96 bytes 11:06:34.589076 IP xxx.xxx.xxx.87.58606 > 192.36.144.107.53: 24422+ [1au] Type48? se. (31) 11:06:34.831367 IP 192.36.144.107.53 > xxx.xxx.xxx.87.58606: 24422*- 8/10/24 Type48[|domain] 11:06:34.831372 IP 192.36.144.107 > xxx.xxx.xxx.87: udp 11:06:34.831524 IP 192.36.144.107 > xxx.xxx.xxx.87: udp fbsd6.2# dig @192.36.144.107 se dnskey +dnssec +bufsize=4500 +retry=0 ; <<>> DiG 9.3.3 <<>> @192.36.144.107 se dnskey +dnssec +bufsize=4500 +retry=0 ; (1 server found) ;; global options: printcmd ;; connection timed out; no servers could be reached ###### FreeBSD 6.2 + ipfilter -> dig timeout fbsd6.2# uname -v FreeBSD 6.2-RELEASE #0: Fri Jan 12 11:05:30 UTC 2007 root@dessler.cse.buffalo.edu:/usr/obj/usr/src/sys/SMP fbsd6.2# ipf -V ipf: IP Filter: v4.1.13 (416) Kernel: IP Filter: v4.1.13 Running: yes Log Flags: 0 = none set Default: pass all, Logging: available Active list: 0 Feature mask: 0x10f fbsd6.2# ipfstat -ion @1 pass out log quick on bge0 proto udp from xxx.xxx.xxx.87/32 to any port = domain keep state keep frags @2 pass out quick on bge0 proto tcp/udp from xxx.xxx.xxx.87/32 to any keep state @3 pass out quick on bge0 proto icmp from xxx.xxx.xxx.87/32 to any keep state @4 pass out quick on lo0 from any to any @5 block out log all @1 pass in quick on bge0 proto tcp from xxx.xxx.xxx.81/32 to xxx.xxx.xxx.87/32 port = ssh keep state @2 pass in quick on lo0 from any to any @3 block in log all fbsd6.2# tcpdump -i bge0 -np host 192.36.144.107 tcpdump: verbose output suppressed, use -v or -vv for full protocol decode listening on bge0, link-type EN10MB (Ethernet), capture size 96 bytes 11:11:39.724241 IP xxx.xxx.xxx.87.63499 > 192.36.144.107.53: 2906+ [1au] Type48? se. (31) 11:11:39.966378 IP 192.36.144.107.53 > xxx.xxx.xxx.87.63499: 2906*- 8/10/24 Type48[|domain] 11:11:39.966534 IP 192.36.144.107 > xxx.xxx.xxx.87: udp 11:11:39.966692 IP 192.36.144.107 > xxx.xxx.xxx.87: udp fbsd6.2# grep 192.36.144.107 /var/log/messages May 17 11:11:40 fbsd6.2 ipmon[1140]: 11:11:39.724232 bge0 @0:1 p xxx.xxx.xxx.87,63499 -> 192.36.144.107,53 PR udp len 20 59 K-S K-F OUT May 17 11:11:40 fbsd6.2 ipmon[1140]: 11:11:39.966389 bge0 @0:3 b 192.36.144.107,53 -> xxx.xxx.xxx.87,63499 PR udp len 20 1500 IN bad May 17 11:11:40 fbsd6.2 ipmon[1140]: 11:11:39.966544 bge0 @0:3 b 192.36.144.107 -> xxx.xxx.xxx.87 PR udp len 20 (1500) (frag 20089:1480@1480+) IN bad May 17 11:11:40 fbsd6.2 ipmon[1140]: 11:11:39.966699 bge0 @0:3 b 192.36.144.107 -> xxx.xxx.xxx.87 PR udp len 20 (1154) (frag 20089:1134@2960) IN bad fbsd6.2# dig @192.36.144.107 se dnskey +dnssec +bufsize=4500 +retry=0 ; <<>> DiG 9.3.3 <<>> @192.36.144.107 se dnskey +dnssec +bufsize=4500 +retry=0 ; (1 server found) ;; global options: printcmd ;; connection timed out; no servers could be reached ###### FreeBSD 7.0 + no firewall -> dig OK fbsd7# uname -v FreeBSD 7.0-CURRENT-200705 #0: Mon May 7 11:24:25 UTC 2007 root@almeida.cse.buffalo.edu:/usr/obj/usr/src/sys/GENERIC fbsd7# dig @192.36.144.107 se dnskey +dnssec +bufsize=4500 +retry=0 ; <<>> DiG 9.3.4 <<>> @192.36.144.107 se dnskey +dnssec +bufsize=4500 +retry=0 ; (1 server found) ;; global options: printcmd ;; Got answer: ;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 11647 ;; flags: qr aa rd; QUERY: 1, ANSWER: 8, AUTHORITY: 10, ADDITIONAL: 24 ;; OPT PSEUDOSECTION: ; EDNS: version: 0, flags: do; udp: 4096 ;; QUESTION SECTION: ;se. IN DNSKEY [...] ;; Query time: 243 msec ;; SERVER: 192.36.144.107#53(192.36.144.107) ;; WHEN: Mon May 7 12:29:14 2007 ;; MSG SIZE rcvd: 4086 ###### FreeBSD 7.0 + pf -> dig timeout fbsd7# uname -v FreeBSD 7.0-CURRENT-200705 #0: Mon May 7 11:24:25 UTC 2007 root@almeida.cse.buffalo.edu:/usr/obj/usr/src/sys/GENERIC fbsd7# pfctl -sr No ALTQ support in kernel ALTQ related functions disabled scrub in all fragment reassemble block drop in log all pass in on bge0 inet proto tcp from xxx.xxx.xxx..81 to xxx.xxx.xxx..113 port = ssh keep state pass out on bge0 proto tcp all keep state pass out on bge0 proto udp all keep state pass out on bge0 proto icmp all keep state fbsd7# tcpdump -i bge0 -np host 192.36.144.107 tcpdump: verbose output suppressed, use -v or -vv for full protocol decode listening on bge0, link-type EN10MB (Ethernet), capture size 96 bytes 12:39:25.631167 IP xxx.xxx.xxx..113.52250 > 192.36.144.107.53: 25549+ [1au] Type48? se. (31) 12:39:25.873610 IP 192.36.144.107.53 > xxx.xxx.xxx..113.52250: 25549*- 8/10/24 Type48[|domain] 12:39:25.873624 IP 192.36.144.107 > xxx.xxx.xxx..113: udp 12:39:25.873632 IP 192.36.144.107 > xxx.xxx.xxx..113: udp fbsd7# dig @192.36.144.107 se dnskey +dnssec +bufsize=4500 +retry=0 ; <<>> DiG 9.3.4 <<>> @192.36.144.107 se dnskey +dnssec +bufsize=4500 +retry=0 ; (1 server found) ;; global options: printcmd ;; connection timed out; no servers could be reached ###### FreeBSD 7.0 + ipfilter -> dig timeout fbsd7# uname -v FreeBSD 7.0-CURRENT-200705 #0: Mon May 7 11:24:25 UTC 2007 root@almeida.cse.buffalo.edu:/usr/obj/usr/src/sys/GENERIC fbsd7# ipf -V ipf: IP Filter: v4.1.13 (404) Kernel: IP Filter: v4.1.13 Running: yes Log Flags: 0 = none set Default: pass all, Logging: available Active list: 0 Feature mask: 0x10f fbsd7# ipfstat -ion @1 pass out log quick on bge0 proto udp from xxx.xxx.xxx..113/32 to any port = domain keep state keep frags @2 pass out quick on bge0 proto tcp/udp from xxx.xxx.xxx..113/32 to any keep state @3 pass out quick on bge0 proto icmp from xxx.xxx.xxx..113/32 to any keep state @4 pass out quick on lo0 from any to any @5 block out log from any to any @1 pass in quick on bge0 proto tcp from xxx.xxx.xxx..81/32 to xxx.xxx.xxx..113/32 port = ssh keep state @2 pass in quick on lo0 from any to any @3 block in log from any to any fbsd7# tcpdump -i bge0 -np host 192.36.144.107 tcpdump: verbose output suppressed, use -v or -vv for full protocol decode listening on bge0, link-type EN10MB (Ethernet), capture size 96 bytes 12:26:47.020355 IP xxx.xxx.xxx..113.61181 > 192.36.144.107.53: 31400+ [1au] Type48? se. (31) 12:26:47.263165 IP 192.36.144.107.53 > xxx.xxx.xxx..113.61181: 31400*- 8/10/24 Type48[|domain] 12:26:47.263189 IP 192.36.144.107 > xxx.xxx.xxx..113: udp 12:26:47.263210 IP 192.36.144.107 > xxx.xxx.xxx..113: udp fbsd7# grep 192.36.144.107 /var/log/messages May 7 12:26:47 fbsd7 ipmon[756]: 12:26:47.020339 bge0 @0:1 p xxx.xxx.xxx..113,61181 -> 192.36.144.107,53 PR udp len 20 59 K-S K-F OUT May 7 12:26:47 fbsd7 ipmon[756]: 12:26:47.263177 bge0 @0:3 b 192.36.144.107,53 -> xxx.xxx.xxx..113,61181 PR udp len 20 1500 IN bad May 7 12:26:47 fbsd7 ipmon[756]: 12:26:47.263199 bge0 @0:3 b 192.36.144.107 -> xxx.xxx.xxx..113 PR udp len 20 (1500) (frag 30879:1480@1480+) IN bad May 7 12:26:47 fbsd7 ipmon[756]: 12:26:47.263218 bge0 @0:3 b 192.36.144.107 -> xxx.xxx.xxx..113 PR udp len 20 (1154) (frag 30879:1134@2960) IN bad fbsd7# dig @192.36.144.107 se dnskey +dnssec +bufsize=4500 +retry=0 ; <<>> DiG 9.3.4 <<>> @192.36.144.107 se dnskey +dnssec +bufsize=4500 +retry=0 ; (1 server found) ;; global options: printcmd ;; connection timed out; no servers could be reached ###### OpenBSD 4.1 + pf -> dig OK obsd4.1# uname -svmr OpenBSD 4.1 GENERIC#1435 i386 obsd4.1# pfctl -sr scrub in all fragment reassemble block drop in log all pass in log on bge0 inet proto tcp from xxx.xxx.xxx..81 to xxx.xxx.xxx.87 port = ssh flags S/SA keep state pass out on bge0 proto tcp all flags S/SA keep state pass out on bge0 proto udp all keep state pass out on bge0 proto icmp all keep state obsd4.1# tcpdump -i bge0 -np host 192.36.144.107 tcpdump: listening on bge0, link-type EN10MB 17:29:31.204819 xxx.xxx.xxx.87.14024 > 192.36.144.107.53: 45447+ [1au] DNSKEY? se. (31) 17:29:31.446947 192.36.144.107.53 > xxx.xxx.xxx.87.14024: 45447*- 8/10/24 DNSKEY[|domain] (frag 1171:1480@0+) 17:29:31.447104 192.36.144.107 > xxx.xxx.xxx.87: (frag 1171:1480@1480+) 17:29:31.447107 192.36.144.107 > xxx.xxx.xxx.87: (frag 1171:1134@2960) obsd4.1# dig @192.36.144.107 se dnskey +dnssec +bufsize=4500 +retry=0 ; <<>> DiG 9.3.4 <<>> @192.36.144.107 se dnskey +dnssec +bufsize=4500 +retry=0 ; (1 server found) ;; global options: printcmd ;; Got answer: ;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 45447 ;; flags: qr aa rd; QUERY: 1, ANSWER: 8, AUTHORITY: 10, ADDITIONAL: 24 ;; OPT PSEUDOSECTION: ; EDNS: version: 0, flags: do; udp: 4096 ;; QUESTION SECTION: ;se. IN DNSKEY [...] ;; Query time: 244 msec ;; SERVER: 192.36.144.107#53(192.36.144.107) ;; WHEN: Thu May 17 17:29:31 2007 ;; MSG SIZE rcvd: 4086 ##### Expected result. (Answers above are truncated in favor of readability) # dig @192.36.144.107 se dnskey +dnssec +bufsize=4500 +retry=0 ; <<>> DiG 9.3.4 <<>> @192.36.144.107 se dnskey +dnssec +bufsize=4500 +retry=0 ; (1 server found) ;; global options: printcmd ;; Got answer: ;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 50574 ;; flags: qr aa rd; QUERY: 1, ANSWER: 8, AUTHORITY: 10, ADDITIONAL: 24 ;; OPT PSEUDOSECTION: ; EDNS: version: 0, flags: do; udp: 4096 ;; QUESTION SECTION: ;se. IN DNSKEY ;; ANSWER SECTION: se. 3600 IN DNSKEY 256 3 5 AQPbQk0WNRr2jofL3FJKSR8VJ2i8hsXUC2vp4L9pq86ca63+SwD7mll0 8jYfYY2fsn5jhPxyRY1Xva7Kwhp35o1NXyHBBcBmBkV3r2BGS9c62YzS jyv/RI4yHgs+03NVsqlNaMz9Cw34ov04K65s45ZSJ0fFg05VVVCgCUli 3h6hJQ== se. 3600 IN DNSKEY 256 3 5 AwEAAbhCVInOCVKWoaeWFmCHfO0SW4MAEWiM2MrbR6q1fclgAa04Lkqu c2Lp1xQ1ssO7rDYDLf8Uhe6EU6Xs56mRS5ZhHGiWwozrY4duxyAaYQUo d6LuH0u5Q0VRUs5Yv5hh9YvVxR1iclbQleg6NDVVeMQU4lFWOnHbP6Md 2SNWptVV se. 3600 IN DNSKEY 256 3 5 AwEAAc3n4vV7f6TbRjSpfADcIBn+MDqzuFUo+s3b85wC8Tp+d1EDlLPF /5GIR4Y3P+8u1OpPKuCCzurvfics/HiGQU3Jkv3wlFP5cZLBSpCiwazY 253uJwXpItS+liP6AK+kOOwsEWTYxG6vvBodm/ASTbqs2FqokFTPLW74 lTOp51a5 se. 3600 IN DNSKEY 257 3 5 AwEAAaxPMcR2x0HbQV4WeZB6oEDX+r0QM65KbhTjrW1ZaARmPhEZZe3Y 9ifgEuq7vZ/zGZUdEGNWy+JZzus0lUptwgjGwhUS1558Hb4JKUbbOTcM 8pwXlj0EiX3oDFVmjHO444gLkBOUKUf/mC7HvfwYH/Be22GnClrinKJp 1Og4ywzO9WglMk7jbfW33gUKvirTHr25GL7STQUzBb5Usxt8lgnyTUHs 1t3JwCY5hKZ6CqFxmAVZP20igTixin/1LcrgX/KMEGd/buvF4qJCydui eHukuY3H4XMAcR+xia2nIUPvm/oyWR8BW/hWdzOvnSCThlHf3xiYleDb t/o1OTQ09A0= se. 3600 IN DNSKEY 257 3 5 AwEAAb6xRZHEf+PyF5dxEvz0BHEHbziu6iZaiNW/yjSaZcmrmZiRMF8F PppD+XuKSau0rgu4eBwYdpkEoMVR4FhI8frkuPHIue2LP1ETo+2hCrdr 60K1538yLvzbOhMxXt6knjPN+OlalMmCknadaofKga5FLKOPQs2C3nw6 AH4WUNGrchmDMVBwRwfZdQXYZTXesqULmGMK7mwjQGOxerRDQWrFv8Nh NnVV31PihaYBdQ1TJjvfGS/FYZJwv/BddiELiLeUnNWu3AOsRAshgOcD BOAPUvKJNEq6RHELFmvXOOe2d8H2yzv02EMQik6GwUm16DrSdmX+SWfe lQs+9ELFN6k= se. 3600 IN RRSIG DNSKEY 5 1 3600 20070522215824 20070517140614 23025 se. KyJc0iw4+ZV8msUBcYd9F2NtqEI7bzeLyea3Ko2kbhH3vq15uP3YXF29 9zZakYC44h1I9eOnv099sQPVJ8GzRwFO/5/sq9VBwz3XCtERy3QnITRE Zwtzpd1/FN++oY3eCy2X20/uyOJLpYPtm8XVuJCFlr0J63OjlzV1WV7U ufs= se. 3600 IN RRSIG DNSKEY 5 1 3600 20070614000000 20070503074224 6166 se. nQpV0GvBMXC347NLpCqTvzCRIQeDJkVB2q//gHQu52syHUYraVfGLYNZ AUO5T7Aj2bBEkeg5BQvc940arfNaQjMAigXU2hnOYVqOEMZ7lvU/tjEQ xRt44NehAbRwv0hf3oUsRd/3VQPVe6gc96DFK5x+/R0c8h9M9ZpRTLjj rZtqRHJXuX5sEe/M+zxO+9h+tRMGTPuMHHnyb5cIHpGBly6Z6kUvdlIY NOlqpjUclFApxC1oqcU8Tdq/CWOI8k+QcsavowPn/EvczLiXnLL0l0Qw Q9ZZ0A867G2vVBXlb6O3oq4EYwxt+nJgIsxAkHRteQ8+F/hXcPAjgYDI R+kCeg== se. 3600 IN RRSIG DNSKEY 5 1 3600 20070614000000 20070503074224 17686 se. KbRtzleVEliDjkQkVyRlwxPKKnOG+6K/wzafH3le8Hja9i97WEdVwU2g AlovnvcropRN5Cojf0MoYVNOKfJPFoQqJ+eLL/oZrCauQcdp9E/XPfvV 0XvZsO7Hft5vFQ2SrCAo2QBvKXGAvf6DY8wV6I0ioeT4Oayce1/eVtXu 8mej1rEz+dAzj2kyVsSuhfrnL+P5q19/1PtlUC1N3xowdrRk1vL1MLOp qhiFSMSyGGM4hhi1YPd3KK7hoL9wrQYghdaFp6ritgXxJ4TLPQP8zZY7 A6C65BziyqZ3Jcwga69dLDqbLLmhcMgDCc9jCEhLSSDi1NUc6BJRIg99 4CLJqg== ;; AUTHORITY SECTION: se. 172800 IN NS i.ns.se. se. 172800 IN NS a.ns.se. se. 172800 IN NS b.ns.se. se. 172800 IN NS c.ns.se. se. 172800 IN NS d.ns.se. se. 172800 IN NS e.ns.se. se. 172800 IN NS f.ns.se. se. 172800 IN NS g.ns.se. se. 172800 IN NS h.ns.se. se. 172800 IN RRSIG NS 5 1 172800 20070523092930 20070517200614 23025 se. jiOTilNoYSbMOwDUhcKQMZtar1eCGrPtkLYoTsENKLW7IVYu8JMt4VyG 5lCNmk7T3ltTSPsohC/v3XU1geCMiyTcDc62FmTM6Th7QVcGWHMtJk/Z Aj/3DkcnqsciRGmlC5SLUHK7wIqSOk0R4O8Blb40gQUkjwBJQWTuQ20P ZWM= ;; ADDITIONAL SECTION: a.ns.se. 172800 IN A 192.36.144.107 a.ns.se. 172800 IN AAAA 2001:698:9:301::53 b.ns.se. 172800 IN A 192.36.133.107 c.ns.se. 172800 IN A 192.36.135.107 d.ns.se. 172800 IN A 81.228.8.16 e.ns.se. 172800 IN A 81.228.10.57 f.ns.se. 172800 IN A 192.71.53.53 f.ns.se. 172800 IN AAAA 2a01:280:1:53::53 g.ns.se. 172800 IN A 130.239.5.114 g.ns.se. 172800 IN AAAA 2001:6b0:e:3::1 h.ns.se. 172800 IN A 199.7.49.30 i.ns.se. 172800 IN A 194.146.106.22 a.ns.se. 172800 IN RRSIG A 5 3 172800 20070523041526 20070517200614 23025 se. CWkUdq3WG2fWZ2eX9FtPTeG15ky8J+l416flxzI/Iq+KxOfpiyHWJReT xaKO9TUkI9oaIqWLApwuH36njKMXXwzMKG3ffsrvaHr+u7+02dGTOMMs yLrC8nUoX6SF28hKtMY7ZKyyNXzTA8s0KQXCfvL5vDlhg+xSy+SIo9aN PwQ= a.ns.se. 172800 IN RRSIG AAAA 5 3 172800 20070524122023 20070517200614 23025 se. NAHToPOR0c7Nc+bAbCl78ZmkM3137HvS/SRQFVcNhcby1pF0nZiu651B nVBG5HmTytvR3qWeJ+bjyRCbnC0418/KDaPDKHiAxeKkwBTBDEV9kgZG EGkqusMqGlAP9YmWJUQwTOQfWJ3LsjbgGURIYPSgNwMl13O3X0nZFKs4 mKY= b.ns.se. 172800 IN RRSIG A 5 3 172800 20070523055447 20070517200614 23025 se. Y039PEs+5f0zYOT8w5gPm+e9BaEfdxTCRXyvGGujgGrVRck8/RN1E+hF Xz7TbfywM3NiSYUuOcx5CefKC5Iztt2TqW2fJ8vs3Doy8vHO8DdSbSNx tNC6A7Fnoc4qNOGj8xcT9yVRCa150LhsVV/Cl2NSH13U5Uuihdg/Uhrt lMc= c.ns.se. 172800 IN RRSIG A 5 3 172800 20070524135553 20070517200614 23025 se. g+aWnXys/U5Kg/Cbngp3zVkUKItbByZc9yW8/kn0k7I7u4VM1U3xss/S yrkD9fJgFZ1tiWjLNbbMNQf2h3DwFMMouWK7ZoQtmS57GvzSYymHd2IC CUMNb9VQDwnt7Hs/2F4veTwSUft56K5stZYnymjtjjQmJn+K5K3v+bjq A0I= d.ns.se. 172800 IN RRSIG A 5 3 172800 20070524024155 20070517200614 23025 se. g2sitUYy/V9FYC18Ql7cYrx1Tdk5omte6dKASwCSx3ZTlkEtoLVFFX2f PU+59Fa9SN1yUVLNH5IHjQKCSoSMmDmaIfer5LMy6sjqEMQiC7zMyJuk +23E517p1bNKpt91YRFINmGE3n4Zl0RX4YWLs++SxkEGeSj3vKboj1UA oqM= e.ns.se. 172800 IN RRSIG A 5 3 172800 20070523194606 20070517200614 23025 se. wB/kpKq0R0QI5XDztERu51XMp2Eo3DVgph6QJs+vbrvWBU5idIUOTxly KL5BiNYxngd8CyyFUEKmC/lQy04OewoD1Dk/fecE6CXL3NhXNAo92rj8 DvJyZTB0NLVvVtNb/ZDvIBHlnp+xuwba/r3wGlinHDGf6SeYPoo8JO2w nXY= f.ns.se. 172800 IN RRSIG A 5 3 172800 20070524065721 20070517200614 23025 se. Uku3n96Jr8mjAEQHDs7aoIeplXQCq8uiLABm6eErjchIgaDBgSuBa9HX JLpA+meeCy2W72WYD4Ywv603mPRj/JjhpB0/MF4m84C2MfQnloDaCWRT x4VknE8kuRVK6I5mxepcqsC1TulcyxtvWv5tWyY8HD+L4HomM6d5Cugq H5E= f.ns.se. 172800 IN RRSIG AAAA 5 3 172800 20070523024116 20070517200614 23025 se. IcFNk7a7/pw8kha9LQGqDJG0wBXeGk4AuHMNwWUqJtkfKDFm/M6xACgW 8bubKgHs7K0HEqhLrrWTYRueUVh/w+Fy9BvOXQwX4h+SMxWTeTtmPxug ZESOOqf0C0Zs+Oa8UJvlHGwhsg3rt0qAUDGZQiQGwY3lpYCxCFY/5sM3 XSo= g.ns.se. 172800 IN RRSIG A 5 3 172800 20070524113105 20070517200614 23025 se. xras7HnqqbohuAM85kzwV8WzGCqXhF2ZWI4y1omWz7SQ1sXKiAMiM1zU mv6xk4F4NVuOakDaPc/b03TEQAhnVDZzRrzmo0ZdfYzP3kxI1NTkYUmC O2Qyv+7FqnRCrLzK94TeTArbKHXBYE+36K5b8htckG/LeBjRZTHIso7X LBk= g.ns.se. 172800 IN RRSIG AAAA 5 3 172800 20070523151643 20070517200614 23025 se. miTXV/aUVUsvuFPIvsmuRoJ0HYiCnMpjkRJl+cpGZ+Te0bnhmikJVAx2 nuMqcjuJvZPiShTWr68wrFN0TnCfUltsdNWIawSKuisszzHj3fHFUFfw ZBbmSr/0zWU8NF8M5IU2PJ8tL2Kohk6W3/ZORjQaAaMoiuOb+VFulgPP Nn8= h.ns.se. 172800 IN RRSIG A 5 3 172800 20070523091232 20070517200614 23025 se. ifwY6aYVRtO+zqHO3aYEWP3tiFT3hig9wkPmbCu+k2nYOE9pxjka+zSh vMU/4qpzlT2Z/aDNmBq/wSzXYEzvUjXi06KtHsS1NVEwSamE6l0NU0Bq TblxJQ0u/zPLOmES8Sj25a4qPGRG5T+SEzLJg65BRFjVrlXBgUuebv3L CjQ= ;; Query time: 245 msec ;; SERVER: 192.36.144.107#53(192.36.144.107) ;; WHEN: Thu May 17 18:37:24 2007 ;; MSG SIZE rcvd: 4086 --cvVnyQ+4j833TQvp--
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?20070517215025.GC37175>