On Wed, May 11, 2005 at 05:38:09AM -0700, J.C. Roberts wrote:
> On Wed, 11 May 2005 02:23:43 -0400, Bruno Delbono
> <[EMAIL PROTECTED]> wrote:
> 
> >Smith wrote:
> >> alerts.  If sendmail has a security alert and OpenBSD is vulnerable, 
> >> OpenBSD will let me know pretty quickly.  I don't need to keep track of 
> >> sendmail alerts, just OpenBSD's.
> >
> >PS - Maybe someone can teach you mail 101. It's never a good idea to 
> >have a CNAME to be the MX.
> >
> >confuciun.com.          497     IN      MX      10 mail.confuciun.com.
> >mail.confuciun.com.     600     IN      CNAME   confuciun.com.
> 
> 
> Though the answer is supposedly in "mail 101" or maybe DNS 101, I've
> been unable find a decent reason for your statement? I hope you don't
> mind the dumb question of "why?"
> 

This is DNS 101. CNAME are mostly always abused.
There are a few rules:
1. It is forbidden to use a CNAME for a node that has other records.
2. A CNAME should only point to an A record and nothing else.
3. Don't use CNAME domains in NS and MX definitions.

1. Is forbidden by the RFC
2. Should not be done because it may result in loops
3. This additional indirection slows down lookups and may get you in
troubles with some resolvers. Additionaly it is not possible to glue a
CNAME.

-- 
:wq Claudio

Reply via email to