Hello,

the problem is that from that server, using dig, nslookup, host...etc,
the record is resolved without problems (with TCP):

r...@relay09:~
# dig spf.orange.es
;; Warning: Message parser reports malformed message packet.
;; Truncated, retrying in TCP mode.

; <<>> DiG 9.5.0-P2 <<>> spf.orange.es
;; global options:  printcmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 12128
;; flags: qr rd ra; QUERY: 1, ANSWER: 42, AUTHORITY: 0, ADDITIONAL: 0

;; QUESTION SECTION:
;spf.orange.es.                 IN      A

;; ANSWER SECTION:
spf.orange.es.          1152    IN      A       62.36.20.211
spf.orange.es.          1152    IN      A       62.36.20.212
spf.orange.es.          1152    IN      A       62.36.20.213
spf.orange.es.          1152    IN      A       62.36.20.214
spf.orange.es.          1152    IN      A       62.36.20.215
spf.orange.es.          1152    IN      A       62.36.20.218
spf.orange.es.          1152    IN      A       62.36.20.219
spf.orange.es.          1152    IN      A       62.36.20.220
spf.orange.es.          1152    IN      A       62.36.20.230
spf.orange.es.          1152    IN      A       62.37.225.28
spf.orange.es.          1152    IN      A       62.37.225.29
spf.orange.es.          1152    IN      A       62.37.225.30
spf.orange.es.          1152    IN      A       62.37.236.9
spf.orange.es.          1152    IN      A       62.37.236.12
spf.orange.es.          1152    IN      A       62.37.236.13
spf.orange.es.          1152    IN      A       62.37.236.14
spf.orange.es.          1152    IN      A       62.37.236.60
spf.orange.es.          1152    IN      A       62.37.236.61
spf.orange.es.          1152    IN      A       62.37.236.63
spf.orange.es.          1152    IN      A       62.37.236.64
spf.orange.es.          1152    IN      A       62.37.236.67
spf.orange.es.          1152    IN      A       62.37.236.69
spf.orange.es.          1152    IN      A       62.37.236.82
spf.orange.es.          1152    IN      A       62.37.236.119
spf.orange.es.          1152    IN      A       62.37.236.185
spf.orange.es.          1152    IN      A       62.37.236.186
spf.orange.es.          1152    IN      A       62.37.236.187
spf.orange.es.          1152    IN      A       83.231.36.67
spf.orange.es.          1152    IN      A       62.36.20.139
spf.orange.es.          1152    IN      A       62.36.20.140
spf.orange.es.          1152    IN      A       62.36.20.169
spf.orange.es.          1152    IN      A       62.36.20.170
spf.orange.es.          1152    IN      A       62.36.20.201
spf.orange.es.          1152    IN      A       62.36.20.202
spf.orange.es.          1152    IN      A       62.36.20.203
spf.orange.es.          1152    IN      A       62.36.20.204
spf.orange.es.          1152    IN      A       62.36.20.205
spf.orange.es.          1152    IN      A       62.36.20.206
spf.orange.es.          1152    IN      A       62.36.20.207
spf.orange.es.          1152    IN      A       62.36.20.208
spf.orange.es.          1152    IN      A       62.36.20.209
spf.orange.es.          1152    IN      A       62.36.20.210

;; Query time: 1 msec
;; SERVER: 127.0.0.1#53(127.0.0.1)
;; WHEN: Thu May 14 15:38:56 2009
;; MSG SIZE  rcvd: 703

I'll try to debug what is Net::DNS doing...
Thanks.

Matt Kettler escribió:
> Michael Scheidell wrote:
>> my mistake.  seems orange.es is using a HUGE a record list.
>>
>> you might want to check your dns servers.  make sure they can pass dns
>> records in tcp.
>>
>> (if result is 'huge' (> 255 bytes)) dns will NOT use udp port 53, but
>> tcp port 53.
>> do a 'host -t a spf.oriange.es' on the server running spamassassin. 
>> see if you don't get something like this:
>>
>>
>>
>> host -t a spf.orange.es
>> ;; Truncated, retrying in TCP mode.
>> spf.orange.es has address 83.231.36.67
>> spf.orange.es has address 62.36.20.139
>> spf.orange.es has address 62.36.20.140
>> spf.orange.es has address 62.36.20.169
>> spf.orange.es has address 62.36.20.170
>> spf.orange.es has address 62.36.20.201
>> spf.orange.es has address 62.36.20.202
>> spf.orange.es has address 62.36.20.203
>> spf.orange.es has address 62.36.20.204
>> spf.orange.es has address 62.36.20.205
>> spf.orange.es has address 62.36.20.206
>> spf.orange.es has address 62.36.20.207
>> spf.orange.es has address 62.36.20.208
>> spf.orange.es has address 62.36.20.209
>> spf.orange.es has address 62.36.20.210
>> spf.orange.es has address 62.36.20.211
>> spf.orange.es has address 62.36.20.212
>>
> Wow that's ugly. Legitimate, but really ugly.
> 
> Someone needs to better organize their IP space so their smarthosts are
> consecutive. This way they can use CIDR masks and do something like
> 62.36.20.139/28.
> 
> Alvaro, as Michael suggests, you might want to check to see if
> something's filtering your DNS querry packet size. Note that Cisco PIX
> and ASA devices tend to do this by default as part of their inspection
> features.
> 
> Also, make sure your resolving DNS server is allowed to make connections
> to tcp/53 on outside DNS servers... If UDP fails because a value is too
> long, it should switch to TCP. But if there's some egress filtering,
> that mechanism won't work.
> 
> 
> 


-- 
Alvaro Marín Illera
Hostalia Internet
www.hostalia.com

Reply via email to