[EMAIL PROTECTED] (Doug Barton) writes:

> ... I took this a step further and worked (together with others) on a
> patch to restrict the size of DNS answers to < 512 by returning a random
> selection of any RR set larger than that.

note that this sounds like a DNS protocol violation, and usually is.  every
time someone sent me a BIND patch adding this kind of deliberate instability
(see RFC 1794 for an example) i said "no".
-- 
Paul Vixie

Reply via email to