[176520] in North American Network Operators' Group

home help back first fref pref prev next nref lref last post

Re: How to track DNS resolution sources

daemon@ATHENA.MIT.EDU (Stephane Bortzmeyer)
Wed Dec 3 12:05:55 2014

X-Original-To: nanog@nanog.org
Date: Wed, 3 Dec 2014 18:02:01 +0100
From: Stephane Bortzmeyer <bortzmeyer@nic.fr>
To: TR Shaw <tshaw@oitc.com>
In-Reply-To: <F95F4458-CBBF-4642-9BD6-7D7DCA638A5F@oitc.com>
Cc: "nanog@nanog.org list" <nanog@nanog.org>
Errors-To: nanog-bounces@nanog.org

On Wed, Dec 03, 2014 at 11:32:08AM -0500,
 TR Shaw <tshaw@oitc.com> wrote 
 a message of 20 lines which said:

> On the command line:
> 
> host spoofed.host.name.com

Excuse me but it is useless. It tests only the local resolver (which
may be unpoisoned). It provides no details that could help to debug
the problem (such as the TTL).



home help back first fref pref prev next nref lref last post