Greetings,

I just submitted a very simple PR/patch - http://www.freebsd.org/cgi/query-pr.cgi?pr=127591 - which fixes spurious but annoying warnings against DNAME RRs (annoying because they spam syslog at auth.notice level).

The patch should not cause any regression, because it just suppresses the warning without altering any other control flow, but I am not entirely sure if there is a valid case where DNAMEs should trigger a strong security warning just as they currently do.

Could someone please review and/or take care of this PR?

Cheers,
Eugene

P.S. A bit of background information, for those who are not familiar with the subject:

DNAME RRs, as defined in RFC 2672, provides a useful mechanism for mapping/aliasing an entire DNS tree. For (a real) example, given a primary domain "the-7.net" and a number of secondary domains such as the-7.com, the-7.org, the-seven.net and so on, instead of having to add CNAMEs for "www", "mail" and other subdomains to every single secondary domain, one can simply add "IN DNAME the-7.net." to the zone apex of those secondary domains, and the DNS server will take care of all possible - current /and/ future - subdomains automatically, by returning a synthesized CNAME:

$ dig www.the-7.com IN A +noall +answer

; <<>> DiG 9.4.2-P1 <<>> www.the-7.com IN A +noall +answer
;; global options:  printcmd
the-7.com.              300     IN      DNAME   the-7.net.
www.the-7.com.          0       IN      CNAME   www.the-7.net.
www.the-7.net.          300     IN      CNAME   purple.the-7.net.
purple.the-7.net.       300     IN      A       64.71.156.34
$

_______________________________________________
freebsd-net@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-net
To unsubscribe, send any mail to "[EMAIL PROTECTED]"

Reply via email to