Hello,

While making some tests with fragmented udp DNS responses (with
EDNS0), we discovered a possible problem with ipf and pf in FreeBSD
6.2 and 7.0 (200705 snapshot).

Our test is a DNS query to an DNSSEC enabled server which replies with
a ~4KB udp response. We do this with the following dig command:

 dig @192.36.144.107 se dnskey +dnssec +bufsize=4500 +retry=0

ipf and pf in FreeBSD 6.2 or 7.0 block the fragments and the DNS
queries timeout. Disabling the firewall, complete replies are received
with no problem.

We've made the same tests with FreeBSD 4.11 with ipf and OpenBSD 4.1
with pf with no problems. You can see a summary of the tests below.

  OS + fw        dig result
fbsd4.11 + ipf      OK
obsd4.1 + pf        OK
fbsd6.2             OK
fbsd6.2 + ipf     timeout
fbsd6.2 + pf      timeout
fbsd7.0             OK
fbsd7.0 + ipf     timeout
fbsd7.0 + pf      timeout

Complete test results (including tcpdump output and firewall rule
sets) are attached.

Can somebody tell us if he hit a bug or if there is something we are
missing?

Thanks,
Hugo

###### FreeBSD 4.11 + ipfilter -> dig OK

fbsd4.11# uname -v
FreeBSD 4.11-RELEASE #0: Fri Jan 21 17:21:22 GMT 2005     [EMAIL 
PROTECTED]:/usr/obj/usr/src/sys/GENERIC 

fbsd4.11# ipf -V
ipf: IP Filter: v3.4.35 (336)
Kernel: IP Filter: v3.4.35              
Running: yes
Log Flags: 0 = none set
Default: pass all, Logging: available
Active list: 0

fbsd4.11# ipfstat -ion
@1 pass out log quick on bge0 proto udp from xxx.xxx.xxx.113/32 to any port = 
53 keep state keep frags
@2 pass out quick on bge0 proto tcp/udp from xxx.xxx.xxx.113/32 to any keep 
state
@3 pass out quick on bge0 proto icmp from xxx.xxx.xxx.113/32 to any keep state
@4 pass out quick on lo0 from any to any
@5 block out log from any to any
@1 pass in quick on bge0 proto tcp from xxx.xxx.xxx.81/32 to xxx.xxx.xxx.113/32 
port = 22 keep state
@2 pass in quick on lo0 from any to any
@3 block in log from any to any

fbsd4.11# tcpdump -i bge0 -np host 192.36.144.107
tcpdump: listening on bge0
09:46:16.546878 xxx.xxx.xxx.113.2897 > 192.36.144.107.53:  37118+ [1au] Type48? 
se. (31)
09:46:16.789319 192.36.144.107.53 > xxx.xxx.xxx.113.2897:  37118*- 8/10/24 
Type48[|domain] (frag 8851:[EMAIL PROTECTED])
09:46:16.789325 192.36.144.107 > xxx.xxx.xxx.113: udp (frag 8851:[EMAIL 
PROTECTED])
09:46:16.789331 192.36.144.107 > xxx.xxx.xxx.113: udp (frag 8851:[EMAIL 
PROTECTED])

fbsd4.11# grep 192.36.144.107 /var/log/messages
May 17 09:46:16 fbsd4.11 ipmon[54]: 09:46:16.546867 bge0 @0:1 p 
xxx.xxx.xxx.113,2897 -> 192.36.144.107,53 PR udp len 20 59 K-S K-F OUT
May 17 09:46:16 fbsd4.11 ipmon[54]: 09:46:16.789339 bge0 @0:1 p 
192.36.144.107,53 -> xxx.xxx.xxx.113,2897 PR udp len 20 1500 K-S K-F IN
May 17 09:46:16 fbsd4.11 ipmon[54]: 09:46:16.789347 bge0 @-1:-1 p 
192.36.144.107 -> xxx.xxx.xxx.113 PR udp len 20 (1500) (frag 8851:[EMAIL 
PROTECTED]) K-S K-F IN
May 17 09:46:16 fbsd4.11 ipmon[54]: 09:46:16.789353 bge0 @-1:-1 p 
192.36.144.107 -> xxx.xxx.xxx.113 PR udp len 20 (1154) (frag 8851:[EMAIL 
PROTECTED]) K-S K-F IN

fbsd4.11# /usr/local/bin/dig @192.36.144.107 se dnskey +dnssec +bufsize=4500 
+retry=0

; <<>> DiG 9.4.1 <<>> @192.36.144.107 se dnskey +dnssec +bufsize=4500 +retry=0
; (1 server found)
;; global options:  printcmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 37118
;; flags: qr aa rd; QUERY: 1, ANSWER: 8, AUTHORITY: 10, ADDITIONAL: 24
;; WARNING: recursion requested but not available

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags: do; udp: 4096
;; QUESTION SECTION:
[...]
;; Query time: 245 msec
;; SERVER: 192.36.144.107#53(192.36.144.107)
;; WHEN: Thu May 17 09:46:16 2007
;; MSG SIZE  rcvd: 4086




###### FreeBSD 6.2 + no firewall -> dig OK

fbsd6.2# uname -v
FreeBSD 6.2-RELEASE #0: Fri Jan 12 11:05:30 UTC 2007     [EMAIL 
PROTECTED]:/usr/obj/usr/src/sys/SMP

fbsd6.2# dig @192.36.144.107 se dnskey +dnssec +bufsize=4500 +retry=0

; <<>> DiG 9.3.3 <<>> @192.36.144.107 se dnskey +dnssec +bufsize=4500 +retry=0
; (1 server found)
;; global options:  printcmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 7745
;; flags: qr aa rd; QUERY: 1, ANSWER: 8, AUTHORITY: 10, ADDITIONAL: 24

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags: do; udp: 4096
;; QUESTION SECTION:
;se.                            IN      DNSKEY
[...]
;; Query time: 243 msec
;; SERVER: 192.36.144.107#53(192.36.144.107)
;; WHEN: Thu May 17 11:31:39 2007
;; MSG SIZE  rcvd: 4086




###### FreeBSD 6.2 + pf -> dig timeout

fbsd6.2# uname -v
FreeBSD 6.2-RELEASE #0: Fri Jan 12 11:05:30 UTC 2007     [EMAIL 
PROTECTED]:/usr/obj/usr/src/sys/SMP 

fbsd6.2# pfctl -sr
No ALTQ support in kernel
ALTQ related functions disabled
scrub in all fragment reassemble
block drop in log all
pass in on bge0 inet proto tcp from xxx.xxx.xxx.81 to xxx.xxx.xxx.87 port = ssh 
keep state
pass out on bge0 proto tcp all keep state
pass out on bge0 proto udp all keep state
pass out on bge0 proto icmp all keep state

fbsd6.2# tcpdump -i bge0 -np host 192.36.144.107
tcpdump: verbose output suppressed, use -v or -vv for full protocol decode
listening on bge0, link-type EN10MB (Ethernet), capture size 96 bytes
11:06:34.589076 IP xxx.xxx.xxx.87.58606 > 192.36.144.107.53:  24422+ [1au] 
Type48? se. (31)
11:06:34.831367 IP 192.36.144.107.53 > xxx.xxx.xxx.87.58606:  24422*- 8/10/24 
Type48[|domain]
11:06:34.831372 IP 192.36.144.107 > xxx.xxx.xxx.87: udp
11:06:34.831524 IP 192.36.144.107 > xxx.xxx.xxx.87: udp

fbsd6.2# dig @192.36.144.107 se dnskey +dnssec +bufsize=4500 +retry=0

; <<>> DiG 9.3.3 <<>> @192.36.144.107 se dnskey +dnssec +bufsize=4500 +retry=0
; (1 server found)
;; global options:  printcmd
;; connection timed out; no servers could be reached




###### FreeBSD 6.2 + ipfilter -> dig timeout

fbsd6.2# uname -v
FreeBSD 6.2-RELEASE #0: Fri Jan 12 11:05:30 UTC 2007     [EMAIL 
PROTECTED]:/usr/obj/usr/src/sys/SMP

fbsd6.2# ipf -V
ipf: IP Filter: v4.1.13 (416)
Kernel: IP Filter: v4.1.13              
Running: yes
Log Flags: 0 = none set
Default: pass all, Logging: available
Active list: 0
Feature mask: 0x10f

fbsd6.2# ipfstat -ion
@1 pass out log quick on bge0 proto udp from xxx.xxx.xxx.87/32 to any port = 
domain keep state keep frags
@2 pass out quick on bge0 proto tcp/udp from xxx.xxx.xxx.87/32 to any keep state
@3 pass out quick on bge0 proto icmp from xxx.xxx.xxx.87/32 to any keep state
@4 pass out quick on lo0 from any to any
@5 block out log all
@1 pass in quick on bge0 proto tcp from xxx.xxx.xxx.81/32 to xxx.xxx.xxx.87/32 
port = ssh keep state
@2 pass in quick on lo0 from any to any
@3 block in log all

fbsd6.2# tcpdump -i bge0 -np host 192.36.144.107
tcpdump: verbose output suppressed, use -v or -vv for full protocol decode
listening on bge0, link-type EN10MB (Ethernet), capture size 96 bytes
11:11:39.724241 IP xxx.xxx.xxx.87.63499 > 192.36.144.107.53:  2906+ [1au] 
Type48? se. (31)
11:11:39.966378 IP 192.36.144.107.53 > xxx.xxx.xxx.87.63499:  2906*- 8/10/24 
Type48[|domain]
11:11:39.966534 IP 192.36.144.107 > xxx.xxx.xxx.87: udp
11:11:39.966692 IP 192.36.144.107 > xxx.xxx.xxx.87: udp

fbsd6.2# grep 192.36.144.107 /var/log/messages
May 17 11:11:40 fbsd6.2 ipmon[1140]: 11:11:39.724232 bge0 @0:1 p 
xxx.xxx.xxx.87,63499 -> 192.36.144.107,53 PR udp len 20 59 K-S K-F OUT
May 17 11:11:40 fbsd6.2 ipmon[1140]: 11:11:39.966389 bge0 @0:3 b 
192.36.144.107,53 -> xxx.xxx.xxx.87,63499 PR udp len 20 1500 IN bad
May 17 11:11:40 fbsd6.2 ipmon[1140]: 11:11:39.966544 bge0 @0:3 b 192.36.144.107 
-> xxx.xxx.xxx.87 PR udp len 20 (1500) (frag 20089:[EMAIL PROTECTED]) IN bad
May 17 11:11:40 fbsd6.2 ipmon[1140]: 11:11:39.966699 bge0 @0:3 b 192.36.144.107 
-> xxx.xxx.xxx.87 PR udp len 20 (1154) (frag 20089:[EMAIL PROTECTED]) IN bad

fbsd6.2# dig @192.36.144.107 se dnskey +dnssec +bufsize=4500 +retry=0

; <<>> DiG 9.3.3 <<>> @192.36.144.107 se dnskey +dnssec +bufsize=4500 +retry=0
; (1 server found)
;; global options:  printcmd
;; connection timed out; no servers could be reached




###### FreeBSD 7.0 + no firewall -> dig OK

fbsd7# uname -v
FreeBSD 7.0-CURRENT-200705 #0: Mon May  7 11:24:25 UTC 2007     [EMAIL 
PROTECTED]:/usr/obj/usr/src/sys/GENERIC

fbsd7# dig @192.36.144.107 se dnskey +dnssec +bufsize=4500 +retry=0

; <<>> DiG 9.3.4 <<>> @192.36.144.107 se dnskey +dnssec +bufsize=4500 +retry=0
; (1 server found)
;; global options:  printcmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 11647
;; flags: qr aa rd; QUERY: 1, ANSWER: 8, AUTHORITY: 10, ADDITIONAL: 24

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags: do; udp: 4096
;; QUESTION SECTION:
;se.                            IN      DNSKEY
[...]
;; Query time: 243 msec
;; SERVER: 192.36.144.107#53(192.36.144.107)
;; WHEN: Mon May  7 12:29:14 2007
;; MSG SIZE  rcvd: 4086




###### FreeBSD 7.0 + pf -> dig timeout

fbsd7# uname -v
FreeBSD 7.0-CURRENT-200705 #0: Mon May  7 11:24:25 UTC 2007     [EMAIL 
PROTECTED]:/usr/obj/usr/src/sys/GENERIC

fbsd7# pfctl -sr
No ALTQ support in kernel
ALTQ related functions disabled
scrub in all fragment reassemble
block drop in log all
pass in on bge0 inet proto tcp from xxx.xxx.xxx..81 to xxx.xxx.xxx..113 port = 
ssh keep state
pass out on bge0 proto tcp all keep state
pass out on bge0 proto udp all keep state
pass out on bge0 proto icmp all keep state

fbsd7# tcpdump -i bge0 -np host 192.36.144.107
tcpdump: verbose output suppressed, use -v or -vv for full protocol decode
listening on bge0, link-type EN10MB (Ethernet), capture size 96 bytes
12:39:25.631167 IP xxx.xxx.xxx..113.52250 > 192.36.144.107.53:  25549+ [1au] 
Type48? se. (31)
12:39:25.873610 IP 192.36.144.107.53 > xxx.xxx.xxx..113.52250:  25549*- 8/10/24 
Type48[|domain]
12:39:25.873624 IP 192.36.144.107 > xxx.xxx.xxx..113: udp
12:39:25.873632 IP 192.36.144.107 > xxx.xxx.xxx..113: udp

fbsd7# dig @192.36.144.107 se dnskey +dnssec +bufsize=4500 +retry=0

; <<>> DiG 9.3.4 <<>> @192.36.144.107 se dnskey +dnssec +bufsize=4500 +retry=0
; (1 server found)
;; global options:  printcmd
;; connection timed out; no servers could be reached




###### FreeBSD 7.0 + ipfilter -> dig timeout

fbsd7# uname -v
FreeBSD 7.0-CURRENT-200705 #0: Mon May  7 11:24:25 UTC 2007     [EMAIL 
PROTECTED]:/usr/obj/usr/src/sys/GENERIC 

fbsd7# ipf -V
ipf: IP Filter: v4.1.13 (404)
Kernel: IP Filter: v4.1.13              
Running: yes
Log Flags: 0 = none set
Default: pass all, Logging: available
Active list: 0
Feature mask: 0x10f

fbsd7# ipfstat -ion
@1 pass out log quick on bge0 proto udp from xxx.xxx.xxx..113/32 to any port = 
domain keep state keep frags
@2 pass out quick on bge0 proto tcp/udp from xxx.xxx.xxx..113/32 to any keep 
state
@3 pass out quick on bge0 proto icmp from xxx.xxx.xxx..113/32 to any keep state
@4 pass out quick on lo0 from any to any
@5 block out log from any to any
@1 pass in quick on bge0 proto tcp from xxx.xxx.xxx..81/32 to 
xxx.xxx.xxx..113/32 port = ssh keep state
@2 pass in quick on lo0 from any to any
@3 block in log from any to any

fbsd7# tcpdump -i bge0 -np host 192.36.144.107
tcpdump: verbose output suppressed, use -v or -vv for full protocol decode
listening on bge0, link-type EN10MB (Ethernet), capture size 96 bytes
12:26:47.020355 IP xxx.xxx.xxx..113.61181 > 192.36.144.107.53:  31400+ [1au] 
Type48? se. (31)
12:26:47.263165 IP 192.36.144.107.53 > xxx.xxx.xxx..113.61181:  31400*- 8/10/24 
Type48[|domain]
12:26:47.263189 IP 192.36.144.107 > xxx.xxx.xxx..113: udp
12:26:47.263210 IP 192.36.144.107 > xxx.xxx.xxx..113: udp

fbsd7# grep 192.36.144.107 /var/log/messages
May  7 12:26:47 fbsd7 ipmon[756]: 12:26:47.020339 bge0 @0:1 p 
xxx.xxx.xxx..113,61181 -> 192.36.144.107,53 PR udp len 20 59 K-S K-F OUT
May  7 12:26:47 fbsd7 ipmon[756]: 12:26:47.263177 bge0 @0:3 b 192.36.144.107,53 
-> xxx.xxx.xxx..113,61181 PR udp len 20 1500 IN bad
May  7 12:26:47 fbsd7 ipmon[756]: 12:26:47.263199 bge0 @0:3 b 192.36.144.107 -> 
xxx.xxx.xxx..113 PR udp len 20 (1500) (frag 30879:[EMAIL PROTECTED]) IN bad
May  7 12:26:47 fbsd7 ipmon[756]: 12:26:47.263218 bge0 @0:3 b 192.36.144.107 -> 
xxx.xxx.xxx..113 PR udp len 20 (1154) (frag 30879:[EMAIL PROTECTED]) IN bad

fbsd7# dig @192.36.144.107 se dnskey +dnssec +bufsize=4500 +retry=0

; <<>> DiG 9.3.4 <<>> @192.36.144.107 se dnskey +dnssec +bufsize=4500 +retry=0
; (1 server found)
;; global options:  printcmd
;; connection timed out; no servers could be reached




###### OpenBSD 4.1 + pf -> dig OK

obsd4.1# uname -svmr
OpenBSD 4.1 GENERIC#1435 i386

obsd4.1# pfctl -sr
scrub in all fragment reassemble
block drop in log all
pass in log on bge0 inet proto tcp from xxx.xxx.xxx..81 to xxx.xxx.xxx.87 port 
= ssh flags S/SA keep state
pass out on bge0 proto tcp all flags S/SA keep state
pass out on bge0 proto udp all keep state
pass out on bge0 proto icmp all keep state

obsd4.1# tcpdump -i bge0 -np host 192.36.144.107
tcpdump: listening on bge0, link-type EN10MB
17:29:31.204819 xxx.xxx.xxx.87.14024 > 192.36.144.107.53: 45447+ [1au] DNSKEY? 
se. (31)
17:29:31.446947 192.36.144.107.53 > xxx.xxx.xxx.87.14024: 45447*- 8/10/24 
DNSKEY[|domain] (frag 1171:[EMAIL PROTECTED])
17:29:31.447104 192.36.144.107 > xxx.xxx.xxx.87: (frag 1171:[EMAIL PROTECTED])
17:29:31.447107 192.36.144.107 > xxx.xxx.xxx.87: (frag 1171:[EMAIL PROTECTED])

obsd4.1# dig @192.36.144.107 se dnskey +dnssec +bufsize=4500 +retry=0

; <<>> DiG 9.3.4 <<>> @192.36.144.107 se dnskey +dnssec +bufsize=4500 +retry=0
; (1 server found)
;; global options:  printcmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 45447
;; flags: qr aa rd; QUERY: 1, ANSWER: 8, AUTHORITY: 10, ADDITIONAL: 24

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags: do; udp: 4096
;; QUESTION SECTION:
;se.                            IN      DNSKEY
[...]
;; Query time: 244 msec
;; SERVER: 192.36.144.107#53(192.36.144.107)
;; WHEN: Thu May 17 17:29:31 2007
;; MSG SIZE  rcvd: 4086


##### Expected result. (Answers above are truncated in favor of readability)

# dig @192.36.144.107 se dnskey +dnssec +bufsize=4500 +retry=0

; <<>> DiG 9.3.4 <<>> @192.36.144.107 se dnskey +dnssec +bufsize=4500 +retry=0
; (1 server found)
;; global options:  printcmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 50574
;; flags: qr aa rd; QUERY: 1, ANSWER: 8, AUTHORITY: 10, ADDITIONAL: 24

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags: do; udp: 4096
;; QUESTION SECTION:
;se.                            IN      DNSKEY

;; ANSWER SECTION:
se.                     3600    IN      DNSKEY  256 3 5 
AQPbQk0WNRr2jofL3FJKSR8VJ2i8hsXUC2vp4L9pq86ca63+SwD7mll0 
8jYfYY2fsn5jhPxyRY1Xva7Kwhp35o1NXyHBBcBmBkV3r2BGS9c62YzS 
jyv/RI4yHgs+03NVsqlNaMz9Cw34ov04K65s45ZSJ0fFg05VVVCgCUli 3h6hJQ==
se.                     3600    IN      DNSKEY  256 3 5 
AwEAAbhCVInOCVKWoaeWFmCHfO0SW4MAEWiM2MrbR6q1fclgAa04Lkqu 
c2Lp1xQ1ssO7rDYDLf8Uhe6EU6Xs56mRS5ZhHGiWwozrY4duxyAaYQUo 
d6LuH0u5Q0VRUs5Yv5hh9YvVxR1iclbQleg6NDVVeMQU4lFWOnHbP6Md 2SNWptVV
se.                     3600    IN      DNSKEY  256 3 5 
AwEAAc3n4vV7f6TbRjSpfADcIBn+MDqzuFUo+s3b85wC8Tp+d1EDlLPF 
/5GIR4Y3P+8u1OpPKuCCzurvfics/HiGQU3Jkv3wlFP5cZLBSpCiwazY 
253uJwXpItS+liP6AK+kOOwsEWTYxG6vvBodm/ASTbqs2FqokFTPLW74 lTOp51a5
se.                     3600    IN      DNSKEY  257 3 5 
AwEAAaxPMcR2x0HbQV4WeZB6oEDX+r0QM65KbhTjrW1ZaARmPhEZZe3Y 
9ifgEuq7vZ/zGZUdEGNWy+JZzus0lUptwgjGwhUS1558Hb4JKUbbOTcM 
8pwXlj0EiX3oDFVmjHO444gLkBOUKUf/mC7HvfwYH/Be22GnClrinKJp 
1Og4ywzO9WglMk7jbfW33gUKvirTHr25GL7STQUzBb5Usxt8lgnyTUHs 
1t3JwCY5hKZ6CqFxmAVZP20igTixin/1LcrgX/KMEGd/buvF4qJCydui 
eHukuY3H4XMAcR+xia2nIUPvm/oyWR8BW/hWdzOvnSCThlHf3xiYleDb t/o1OTQ09A0=
se.                     3600    IN      DNSKEY  257 3 5 
AwEAAb6xRZHEf+PyF5dxEvz0BHEHbziu6iZaiNW/yjSaZcmrmZiRMF8F 
PppD+XuKSau0rgu4eBwYdpkEoMVR4FhI8frkuPHIue2LP1ETo+2hCrdr 
60K1538yLvzbOhMxXt6knjPN+OlalMmCknadaofKga5FLKOPQs2C3nw6 
AH4WUNGrchmDMVBwRwfZdQXYZTXesqULmGMK7mwjQGOxerRDQWrFv8Nh 
NnVV31PihaYBdQ1TJjvfGS/FYZJwv/BddiELiLeUnNWu3AOsRAshgOcD 
BOAPUvKJNEq6RHELFmvXOOe2d8H2yzv02EMQik6GwUm16DrSdmX+SWfe lQs+9ELFN6k=
se.                     3600    IN      RRSIG   DNSKEY 5 1 3600 20070522215824 
20070517140614 23025 se. 
KyJc0iw4+ZV8msUBcYd9F2NtqEI7bzeLyea3Ko2kbhH3vq15uP3YXF29 
9zZakYC44h1I9eOnv099sQPVJ8GzRwFO/5/sq9VBwz3XCtERy3QnITRE 
Zwtzpd1/FN++oY3eCy2X20/uyOJLpYPtm8XVuJCFlr0J63OjlzV1WV7U ufs=
se.                     3600    IN      RRSIG   DNSKEY 5 1 3600 20070614000000 
20070503074224 6166 se. 
nQpV0GvBMXC347NLpCqTvzCRIQeDJkVB2q//gHQu52syHUYraVfGLYNZ 
AUO5T7Aj2bBEkeg5BQvc940arfNaQjMAigXU2hnOYVqOEMZ7lvU/tjEQ 
xRt44NehAbRwv0hf3oUsRd/3VQPVe6gc96DFK5x+/R0c8h9M9ZpRTLjj 
rZtqRHJXuX5sEe/M+zxO+9h+tRMGTPuMHHnyb5cIHpGBly6Z6kUvdlIY 
NOlqpjUclFApxC1oqcU8Tdq/CWOI8k+QcsavowPn/EvczLiXnLL0l0Qw 
Q9ZZ0A867G2vVBXlb6O3oq4EYwxt+nJgIsxAkHRteQ8+F/hXcPAjgYDI R+kCeg==
se.                     3600    IN      RRSIG   DNSKEY 5 1 3600 20070614000000 
20070503074224 17686 se. 
KbRtzleVEliDjkQkVyRlwxPKKnOG+6K/wzafH3le8Hja9i97WEdVwU2g 
AlovnvcropRN5Cojf0MoYVNOKfJPFoQqJ+eLL/oZrCauQcdp9E/XPfvV 
0XvZsO7Hft5vFQ2SrCAo2QBvKXGAvf6DY8wV6I0ioeT4Oayce1/eVtXu 
8mej1rEz+dAzj2kyVsSuhfrnL+P5q19/1PtlUC1N3xowdrRk1vL1MLOp 
qhiFSMSyGGM4hhi1YPd3KK7hoL9wrQYghdaFp6ritgXxJ4TLPQP8zZY7 
A6C65BziyqZ3Jcwga69dLDqbLLmhcMgDCc9jCEhLSSDi1NUc6BJRIg99 4CLJqg==

;; AUTHORITY SECTION:
se.                     172800  IN      NS      i.ns.se.
se.                     172800  IN      NS      a.ns.se.
se.                     172800  IN      NS      b.ns.se.
se.                     172800  IN      NS      c.ns.se.
se.                     172800  IN      NS      d.ns.se.
se.                     172800  IN      NS      e.ns.se.
se.                     172800  IN      NS      f.ns.se.
se.                     172800  IN      NS      g.ns.se.
se.                     172800  IN      NS      h.ns.se.
se.                     172800  IN      RRSIG   NS 5 1 172800 20070523092930 
20070517200614 23025 se. 
jiOTilNoYSbMOwDUhcKQMZtar1eCGrPtkLYoTsENKLW7IVYu8JMt4VyG 
5lCNmk7T3ltTSPsohC/v3XU1geCMiyTcDc62FmTM6Th7QVcGWHMtJk/Z 
Aj/3DkcnqsciRGmlC5SLUHK7wIqSOk0R4O8Blb40gQUkjwBJQWTuQ20P ZWM=

;; ADDITIONAL SECTION:
a.ns.se.                172800  IN      A       192.36.144.107
a.ns.se.                172800  IN      AAAA    2001:698:9:301::53
b.ns.se.                172800  IN      A       192.36.133.107
c.ns.se.                172800  IN      A       192.36.135.107
d.ns.se.                172800  IN      A       81.228.8.16
e.ns.se.                172800  IN      A       81.228.10.57
f.ns.se.                172800  IN      A       192.71.53.53
f.ns.se.                172800  IN      AAAA    2a01:280:1:53::53
g.ns.se.                172800  IN      A       130.239.5.114
g.ns.se.                172800  IN      AAAA    2001:6b0:e:3::1
h.ns.se.                172800  IN      A       199.7.49.30
i.ns.se.                172800  IN      A       194.146.106.22
a.ns.se.                172800  IN      RRSIG   A 5 3 172800 20070523041526 
20070517200614 23025 se. 
CWkUdq3WG2fWZ2eX9FtPTeG15ky8J+l416flxzI/Iq+KxOfpiyHWJReT 
xaKO9TUkI9oaIqWLApwuH36njKMXXwzMKG3ffsrvaHr+u7+02dGTOMMs 
yLrC8nUoX6SF28hKtMY7ZKyyNXzTA8s0KQXCfvL5vDlhg+xSy+SIo9aN PwQ=
a.ns.se.                172800  IN      RRSIG   AAAA 5 3 172800 20070524122023 
20070517200614 23025 se. 
NAHToPOR0c7Nc+bAbCl78ZmkM3137HvS/SRQFVcNhcby1pF0nZiu651B 
nVBG5HmTytvR3qWeJ+bjyRCbnC0418/KDaPDKHiAxeKkwBTBDEV9kgZG 
EGkqusMqGlAP9YmWJUQwTOQfWJ3LsjbgGURIYPSgNwMl13O3X0nZFKs4 mKY=
b.ns.se.                172800  IN      RRSIG   A 5 3 172800 20070523055447 
20070517200614 23025 se. 
Y039PEs+5f0zYOT8w5gPm+e9BaEfdxTCRXyvGGujgGrVRck8/RN1E+hF 
Xz7TbfywM3NiSYUuOcx5CefKC5Iztt2TqW2fJ8vs3Doy8vHO8DdSbSNx 
tNC6A7Fnoc4qNOGj8xcT9yVRCa150LhsVV/Cl2NSH13U5Uuihdg/Uhrt lMc=
c.ns.se.                172800  IN      RRSIG   A 5 3 172800 20070524135553 
20070517200614 23025 se. 
g+aWnXys/U5Kg/Cbngp3zVkUKItbByZc9yW8/kn0k7I7u4VM1U3xss/S 
yrkD9fJgFZ1tiWjLNbbMNQf2h3DwFMMouWK7ZoQtmS57GvzSYymHd2IC 
CUMNb9VQDwnt7Hs/2F4veTwSUft56K5stZYnymjtjjQmJn+K5K3v+bjq A0I=
d.ns.se.                172800  IN      RRSIG   A 5 3 172800 20070524024155 
20070517200614 23025 se. 
g2sitUYy/V9FYC18Ql7cYrx1Tdk5omte6dKASwCSx3ZTlkEtoLVFFX2f 
PU+59Fa9SN1yUVLNH5IHjQKCSoSMmDmaIfer5LMy6sjqEMQiC7zMyJuk 
+23E517p1bNKpt91YRFINmGE3n4Zl0RX4YWLs++SxkEGeSj3vKboj1UA oqM=
e.ns.se.                172800  IN      RRSIG   A 5 3 172800 20070523194606 
20070517200614 23025 se. 
wB/kpKq0R0QI5XDztERu51XMp2Eo3DVgph6QJs+vbrvWBU5idIUOTxly 
KL5BiNYxngd8CyyFUEKmC/lQy04OewoD1Dk/fecE6CXL3NhXNAo92rj8 
DvJyZTB0NLVvVtNb/ZDvIBHlnp+xuwba/r3wGlinHDGf6SeYPoo8JO2w nXY=
f.ns.se.                172800  IN      RRSIG   A 5 3 172800 20070524065721 
20070517200614 23025 se. 
Uku3n96Jr8mjAEQHDs7aoIeplXQCq8uiLABm6eErjchIgaDBgSuBa9HX 
JLpA+meeCy2W72WYD4Ywv603mPRj/JjhpB0/MF4m84C2MfQnloDaCWRT 
x4VknE8kuRVK6I5mxepcqsC1TulcyxtvWv5tWyY8HD+L4HomM6d5Cugq H5E=
f.ns.se.                172800  IN      RRSIG   AAAA 5 3 172800 20070523024116 
20070517200614 23025 se. 
IcFNk7a7/pw8kha9LQGqDJG0wBXeGk4AuHMNwWUqJtkfKDFm/M6xACgW 
8bubKgHs7K0HEqhLrrWTYRueUVh/w+Fy9BvOXQwX4h+SMxWTeTtmPxug 
ZESOOqf0C0Zs+Oa8UJvlHGwhsg3rt0qAUDGZQiQGwY3lpYCxCFY/5sM3 XSo=
g.ns.se.                172800  IN      RRSIG   A 5 3 172800 20070524113105 
20070517200614 23025 se. 
xras7HnqqbohuAM85kzwV8WzGCqXhF2ZWI4y1omWz7SQ1sXKiAMiM1zU 
mv6xk4F4NVuOakDaPc/b03TEQAhnVDZzRrzmo0ZdfYzP3kxI1NTkYUmC 
O2Qyv+7FqnRCrLzK94TeTArbKHXBYE+36K5b8htckG/LeBjRZTHIso7X LBk=
g.ns.se.                172800  IN      RRSIG   AAAA 5 3 172800 20070523151643 
20070517200614 23025 se. 
miTXV/aUVUsvuFPIvsmuRoJ0HYiCnMpjkRJl+cpGZ+Te0bnhmikJVAx2 
nuMqcjuJvZPiShTWr68wrFN0TnCfUltsdNWIawSKuisszzHj3fHFUFfw 
ZBbmSr/0zWU8NF8M5IU2PJ8tL2Kohk6W3/ZORjQaAaMoiuOb+VFulgPP Nn8=
h.ns.se.                172800  IN      RRSIG   A 5 3 172800 20070523091232 
20070517200614 23025 se. 
ifwY6aYVRtO+zqHO3aYEWP3tiFT3hig9wkPmbCu+k2nYOE9pxjka+zSh 
vMU/4qpzlT2Z/aDNmBq/wSzXYEzvUjXi06KtHsS1NVEwSamE6l0NU0Bq 
TblxJQ0u/zPLOmES8Sj25a4qPGRG5T+SEzLJg65BRFjVrlXBgUuebv3L CjQ=

;; Query time: 245 msec
;; SERVER: 192.36.144.107#53(192.36.144.107)
;; WHEN: Thu May 17 18:37:24 2007
;; MSG SIZE  rcvd: 4086
_______________________________________________
freebsd-net@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-net
To unsubscribe, send any mail to "[EMAIL PROTECTED]"

Reply via email to