[dns-operations] 2600::a1 (ns1-auth.sprintlink.net)

Witold Kręcicki wpk at isc.org
Thu Feb 16 19:21:48 UTC 2017


W dniu 16.02.2017 o 20:05, Jim Popovitch pisze:
> On Thu, Feb 16, 2017 at 1:56 PM, David C Lawrence <tale at akamai.com> wrote:
>> Jim Popovitch writes:
>>> ~$ dig MX ups.com @ns1-auth.sprintlink.net
>>> ...
>>> ;; WARNING: recursion requested but not available
>>> ....
>>>
>>> I'm not always in the loop on things like this, how common is that?
>>
>> Extremely.  By default dig asks for recursive resolution, and it has
>> no sense whether the target @server is a resolver or authoritative
>> server.  Most authoritative servers are properly not configured to
>> allow recursion, so when the answer comes back without the recursion
>> available flag set dig just makes a note of that.
>>
>> You can use dig +norec to turn off the recursion desired flag in the
>> query, and that will make the warning go away.
> 
> 
> The issue is less about the norec, and more about the sprintlink NS
> servers (listed as the auth NS servers for ups.com) not returning RRs.
$ dig MX ups.com @ns1-auth.sprintlink.net |grep -A2 ";; ANSWER"
;; ANSWER SECTION:
ups.com.		300	IN	MX	10 email-vip.ups.com.
ups.com.		300	IN	MX	10 email2-vip.ups.com.

It is returning RRs

-- 
wpk



More information about the dns-operations mailing list