http://issues.apache.org/SpamAssassin/show_bug.cgi?id=4685
------- Additional Comments From [EMAIL PROTECTED] 2005-12-16 19:55 -------
so, since there'd been no negative (or positive) comments, I blundered around
the zone and attempted to apply this; however, it appears something like this
has already been applied:
2005121301 ; serial
bugzilla A 192.87.106.226
; nothing should send from here, but allow spf testing
bugzilla TXT "v=spf1 ip4:64.142.3.173 -ip4:65.214.43.155
~ip4:65.214.43.156 ?ip4:65.214.43.157 -all"
So that should work. However, something's going wrong there. I'm seeing a
CNAME for bugzilla.spamassassin.org where there isn't one in that zone file at
all.
: jm 519...; dig spamassassin.org soa
; <<>> DiG 9.3.1 <<>> spamassassin.org soa
;; global options: printcmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 43778
;; flags: qr rd ra; QUERY: 1, ANSWER: 1, AUTHORITY: 6, ADDITIONAL: 2
;; QUESTION SECTION:
;spamassassin.org. IN SOA
;; ANSWER SECTION:
spamassassin.org. 3536 IN SOA ns.spamassassin.org.
pmc.spamassassin.apache.org. 2005121301 86400 3600 604800 3600
;; AUTHORITY SECTION:
spamassassin.org. 3536 IN NS ns1.kluge.net.
spamassassin.org. 3536 IN NS alum.wpi.edu.
spamassassin.org. 3536 IN NS a.auth-ns.sonic.net.
spamassassin.org. 3536 IN NS b.auth-ns.sonic.net.
spamassassin.org. 3536 IN NS c.auth-ns.sonic.net.
spamassassin.org. 3536 IN NS ns.hyperreal.org.
;; ADDITIONAL SECTION:
ns1.kluge.net. 94564 IN A 65.214.43.13
alum.wpi.edu. 8164 IN A 130.215.36.126
;; Query time: 126 msec
;; SERVER: 127.0.0.1#53(127.0.0.1)
;; WHEN: Fri Dec 16 10:50:40 2005
;; MSG SIZE rcvd: 271
: jm 521...; dig bugzilla.spamassassin.org txt
; <<>> DiG 9.3.1 <<>> bugzilla.spamassassin.org txt
;; global options: printcmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 54053
;; flags: qr rd ra; QUERY: 1, ANSWER: 1, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;bugzilla.spamassassin.org. IN TXT
;; ANSWER SECTION:
bugzilla.spamassassin.org. 3525 IN CNAME issues.apache.org.
;; AUTHORITY SECTION:
apache.org. 3525 IN SOA ns.hyperreal.org.
root.hyperreal.org. 2005120801 3600 900 604800 3600
;; Query time: 1 msec
;; SERVER: 127.0.0.1#53(127.0.0.1)
;; WHEN: Fri Dec 16 10:51:00 2005
;; MSG SIZE rcvd: 125
: jm 523...; dig spamassassin.org soa @ns.hyperreal.org.
; <<>> DiG 9.3.1 <<>> spamassassin.org soa @ns.hyperreal.org.
; (1 server found)
;; global options: printcmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 29644
;; flags: qr aa rd; QUERY: 1, ANSWER: 1, AUTHORITY: 6, ADDITIONAL: 6
;; QUESTION SECTION:
;spamassassin.org. IN SOA
;; ANSWER SECTION:
spamassassin.org. 3600 IN SOA ns.spamassassin.org.
pmc.spamassassin.apache.org. 2005121301 86400 3600 604800 3600
;; AUTHORITY SECTION:
spamassassin.org. 3600 IN NS a.auth-ns.sonic.net.
spamassassin.org. 3600 IN NS b.auth-ns.sonic.net.
spamassassin.org. 3600 IN NS c.auth-ns.sonic.net.
spamassassin.org. 3600 IN NS ns.hyperreal.org.
spamassassin.org. 3600 IN NS ns1.kluge.net.
spamassassin.org. 3600 IN NS alum.wpi.edu.
;; ADDITIONAL SECTION:
a.auth-ns.sonic.net. 81067 IN A 209.204.159.20
b.auth-ns.sonic.net. 81067 IN A 64.142.88.72
c.auth-ns.sonic.net. 81067 IN A 69.9.186.104
ns.hyperreal.org. 86400 IN A 209.237.226.90
ns1.kluge.net. 141158 IN A 65.214.43.13
alum.wpi.edu. 75551 IN A 130.215.36.126
;; Query time: 21 msec
;; SERVER: 209.237.226.90#53(209.237.226.90)
;; WHEN: Fri Dec 16 10:53:18 2005
;; MSG SIZE rcvd: 335
Theo, do you know what's going on here? Is this expected? Seems
iffy to me.
------- You are receiving this mail because: -------
You are the assignee for the bug, or are watching the assignee.