[176520] in North American Network Operators' Group
Re: How to track DNS resolution sources
daemon@ATHENA.MIT.EDU (Stephane Bortzmeyer)
Wed Dec 3 12:05:55 2014
X-Original-To: nanog@nanog.org
Date: Wed, 3 Dec 2014 18:02:01 +0100
From: Stephane Bortzmeyer <bortzmeyer@nic.fr>
To: TR Shaw <tshaw@oitc.com>
In-Reply-To: <F95F4458-CBBF-4642-9BD6-7D7DCA638A5F@oitc.com>
Cc: "nanog@nanog.org list" <nanog@nanog.org>
Errors-To: nanog-bounces@nanog.org
On Wed, Dec 03, 2014 at 11:32:08AM -0500,
TR Shaw <tshaw@oitc.com> wrote
a message of 20 lines which said:
> On the command line:
>
> host spoofed.host.name.com
Excuse me but it is useless. It tests only the local resolver (which
may be unpoisoned). It provides no details that could help to debug
the problem (such as the TTL).