<[EMAIL PROTECTED]> writes:

> The sender then proceeded to give detailed information almost as though
> he'd catted the zone file on our DNS server. It included what the MX
> records were for a given systems and which server were CNAMEd to which.

[...]

> ...so here's my question: How'd he do it? =:) 


UUbudr ~ $ dig mx internet-frontier.net

;; ANSWERS:
internet-frontier.net.  172800  MX      5 adm.internet-frontier.net.
internet-frontier.net.  172800  CNAME   adm.internet-frontier.net.

;; AUTHORITY RECORDS:
internet-frontier.net.  172800  SOA     internet-frontier.net. 
adm.internet-frontier.net. (
                        51498   ; serial
                        100000  ; refresh (1 day 3 hours 46 mins 40 secs)
                        3600    ; retry (1 hour)
                        1728000 ; expire (20 days)
                        172800 )        ; minimum (2 days)
 
;; ADDITIONAL RECORDS:
adm.internet-frontier.net.      172800  A       208.196.56.2



You could probably do the same with nslookup, but I like dig.  
man dig, man nslookup.

HTH

-- 

Bud Rogers <[EMAIL PROTECTED]>
have linux, will telnet
-
To unsubscribe from this list: send the line "unsubscribe linux-net" in
the body of a message to [EMAIL PROTECTED]

Reply via email to