>I contacted AT&T, who is the owner of our Managed Internet Service IP 
>Address Block.

Good -- IPWHOIS shows that they are responsible for your IP range, and 
therefore they are responsible for either hosting your reverse DNS records, 
or delegating authority to your own nameservers.

>They responded that since we already had DNS setup by a local company 
>(Over The Net, who have been
>hosting our Website prior to us getting AT&T), that OTN should create the 
>PTR Record.

Well, that's a cute response, but it doesn't really help.  AT&T is passing 
the buck (which is actually a good thing in this case, as you'll likely 
have better control over the reverse DNS if it is on OTN's nameservers).

In this case, OTN would create the reverse DNS entry, and AT&T would 
delegate authority to them.

>OTN claimed they couldn't legally create a PTR Record which pointed back 
>to an AT&T Address Block that OTN
>didn't own.

You should ask to talk to their lawyers.  <G>  There are absolutely no laws 
like that that I've heard of.

The ONLY way that anyone will get to look up the reverse DNS entries at OTN 
is if AT&T specifically delegates authority to OTN!

>AT&T finally agreed to delegate Authority for our Address Block to OTN's 
>Name Servers, allowing OTN
>to create a PTR.  Now when I use
>http://www.dnsreport.com/tools/dnsreport.ch?domain=roycemedical.com I get 
>neither a PASS nor a FAIL
>on the Reverse DNS section.  It seems like the test just times out waiting 
>for a response.

I just checked, and it shows a PASS.  The reverse DNS lookup on the DNS 
Report is sometimes a bit quirky.  The one at www.DNSstuff.com is better, 
as all it does is the reverse DNS lookup.

>If I try using http://www.dnsstuff.com/tools/ptr.ch?ip=12.35.200.18 it 
>responds with:
>
> >How I am searching:
> >Searching for PTR record for 18.200.35.12.in-addr.arpa at 
> d.root-servers.net:  Got referral to
>CMTU.MT.NS.ELS-GMS.ATT.NET.

Good, that means that the root servers know that AT&T is responsible for 
that IP range.

> >Searching for PTR record for 18.200.35.12.in-addr.arpa at 
> CMTU.MT.NS.ELS-GMS.ATT.NET.:  Reports
>18.200.35.12.in-addr.arpa.
> >
> >Answer:
> >12.35.200.18 PTR record: 18.200.35.12.in-addr.arpa. [TTL = 83000 seconds]
> >
> >Details:
> >You have one or more obviously bogus PTR records (pointing to in-addr.arpa).
>
>What does it mean by 'bogus' PTR?

That's because it sees the reverse DNS entry as 18.200.35.12.in-addr.arpa, 
which isn't a valid host name.

However, as Len pointed out, that's really a CNAME using classless reverse 
delegation.  The reverse DNS lookup tool doesn't handle CNAMEs yet -- that 
will hopefully get taken care of tomorrow.

>I also found this 'dig' Website:
>http://us.mirror.menandmice.com/cgi-bin/DoDig?host=ns1.otn.com&domain=roycemedical.com&type=PTR
>
>But I don't know how to interpret the results?

The 0 answers along with the SOA record and the authoritative flag ("Auth: 
1") means that ns1.otn.com reports that there is no reverse DNS entry for 
"roycemedical.com".  That's because domain names don't have reverse DNS 
entrys, IPs do (using the in-addr.arpa zone).  If you go to 
http://us.mirror.menandmice.com/cgi-bin/DoDig?host=ns1.otn.com&domain=18.200.35.12.in-addr.arpa&type=PTR
 
you'll see "18.16/28.200.35.12.in-addr.arpa. 86400 PTR 
mail.roycemedical.com." which means that they have the reverse DNS set up 
to point to mail.roycemedical.com.  So it looks like all is well.

                                                    -Scott
---
Declude: Anti-virus, Anti-spam and Anti-hijacking solutions for 
IMail.  http://www.declude.com

---
[This E-mail was scanned for viruses by Declude Virus (http://www.declude.com)]


Please visit http://www.ipswitch.com/support/mailing-lists.html 
to be removed from this list.

An Archive of this list is available at:
http://www.mail-archive.com/imail_forum%40list.ipswitch.com/

Reply via email to