From owner-freebsd-hackers Tue Sep 16 18:46:42 1997 Return-Path: Received: (from root@localhost) by hub.freebsd.org (8.8.7/8.8.7) id SAA04255 for hackers-outgoing; Tue, 16 Sep 1997 18:46:42 -0700 (PDT) Received: from freebie.lemis.com (gregl1.lnk.telstra.net [139.130.136.133]) by hub.freebsd.org (8.8.7/8.8.7) with ESMTP id SAA04249 for ; Tue, 16 Sep 1997 18:46:36 -0700 (PDT) Received: (from grog@localhost) by freebie.lemis.com (8.8.7/8.8.5) id LAA01506; Wed, 17 Sep 1997 11:16:33 +0930 (CST) Message-ID: <19970917111632.60309@lemis.com> Date: Wed, 17 Sep 1997 11:16:32 +0930 From: Greg Lehey To: FreeBSD Hackers Subject: What does this message mean? Mime-Version: 1.0 Content-Type: text/plain; charset=us-ascii X-Mailer: Mutt 0.81e Organisation: LEMIS, PO Box 460, Echunga SA 5153, Australia Phone: +61-8-8388-8250 Fax: +61-8-8388-8250 Mobile: +61-41-739-7062 WWW-Home-Page: http://www.lemis.com/~grog Fight-Spam-Now: http://www.cauce.org Sender: owner-freebsd-hackers@freebsd.org X-Loop: FreeBSD.org Precedence: bulk I'm just checking through my DNS logs (4.9.4-REL in current), and I see a couple of: Sep 13 10:17:04 freebie named[55]: ns_resp: query(lemis.com) contains our address (FREEBIE.lemis.com:192.109.197.137) learnt (A=198.41.0.4:NS=198.41.0.4) I checked out the A record; it's a.root-servers.net. If I interpret the comments in the source correctly, this is a kind of lame delegation: /* * if we are being asked to fwd a query whose * nameserver list includes our own name/address(es), * then we have detected a lame delegation and rather * than melt down the network and hose down the other * servers (who will hose us in return), we'll return * -1 here which will cause SERVFAIL to be sent to * the client's resolver which will hopefully then * shut up. * * (originally done in nsContainsUs by vix@dec mar92; * moved into nslookup by apb@und jan1993) * * try to limp along instead of denying service * gdonl mar96 */ if (aIsUs(nsa)) { static char *complaint = "contains our address"; nslookupComplain(sysloginfo, syslogdname, complaint, dname, dp, nsdp); continue; } Can anybody explain this to me in more detail? Does this mean that the root name servers are now sending out invalid queries, or are they just forwarding them from other servers? Greg