DNS TTL adherence
simonw at zynet.net
Wed Mar 15 15:25:38 UTC 2006
On Wednesday 15 Mar 2006 14:16, you wrote:
> Let me help you become aware, then...
> Some people don't believe it is a bug, and therefor don't see that
> anything needs "fixing".
Oh the one shown is a bug, and needs fixing.
> Feel free to, for example, send 2 consecutive queries for a record
> that has a short (<10,000 second TTL) to 126.96.36.199.
Safecom http response, busybox on telnet, some sort of embedded Linux device.
Safecom sell routers...
Of course can't tell if the broken DNS behaviour is the device, or possibly it
is proxying upstream DNS servers.
> This behavior is unfortunately not unique.
Alas what others peoples servers do, shouldn't be an issue for you. Your
problem is they can be coerced into a DoS attack, not that the data is stale.
More information about the NANOG