Please tell the guy whose website says "Internet security & antispam” to fix 
HTTPS/TLS on his site:

* Host enemieslist.com:443 was resolved.
* IPv6: (none)
* IPv4: 45.33.12.228
*   Trying 45.33.12.228:443...
* Connected to enemieslist.com (45.33.12.228) port 443
* ALPN: curl offers h2,http/1.1
* (304) (OUT), TLS handshake, Client hello (1):
*  CAfile: /etc/ssl/cert.pem
*  CApath: none
* LibreSSL/3.3.6: error:1404B42E:SSL routines:ST_CONNECT:tlsv1 alert protocol 
version
* Closing connection
curl: (35) LibreSSL/3.3.6: error:1404B42E:SSL routines:ST_CONNECT:tlsv1 alert 
protocol version

On a lighter note, my favorite custom DNS PTRs are found on the route to 
bad.horse: https://pastebin.com/raw/4GSUHRy6

 9 bad.horse (162.252.205.130) 171.987 ms 171.961 ms 172.387 ms
10 bad.horse (162.252.205.131) 177.009 ms 176.570 ms 177.807 ms
11 bad.horse (162.252.205.132) 182.312 ms 181.682 ms 181.581 ms
12 bad.horse (162.252.205.133) 186.254 ms 186.723 ms 186.896 ms
13 he.rides.across.the.nation (162.252.205.134) 191.581 ms 191.995 ms 192.539 ms
14 the.thoroughbred.of.sin (162.252.205.135) 196.768 ms 196.683 ms 197.056 ms
15 he.got.the.application (162.252.205.136) 201.184 ms 201.550 ms 201.829 ms
16 that.you.just.sent.in (162.252.205.137) 226.084 ms 206.611 ms 209.440 ms
17 it.needs.evaluation (162.252.205.138) 214.950 ms 211.952 ms 212.041 ms
18 so.let.the.games.begin (162.252.205.139) 216.997 ms 216.730 ms 217.574 ms
19 a.heinous.crime (162.252.205.140) 222.739 ms 313.316 ms 221.550 ms
20 a.show.of.force (162.252.205.141) 227.455 ms 226.936 ms 227.003 ms
21 a.murder.would.be.nice.of.course (162.252.205.142) 232.136 mse 232.144 ms 
231.795 ms
ie22 bad.horse (162.252.205.143) 237.418 ms 320.457 ms^U
237.265 ms
23 bad.horse (162.252.205.144) 282.589 ms 241.483 ms 299.596 ms
24 bad.horse (162.252.205.145) 313.476 ms 246.855 ms 292.823 ms
25 he-s.bad (162.252.205.146) 313.384 ms 277.220 ms 345.561 ms
26 the.evil.league.of.evil (162.252.205.147) 327.858 ms 256.816 ms 279.833 ms
27 is.watching.so.beware (162.252.205.148) 313.327 ms 261.990 ms 287.819 ms
28 the.grade.that.you.receive (162.252.205.149) 267.278 ms 267.262 ms 267.032 ms
29 will.be.your.last.we.swear (162.252.205.150) 352.531 ms 304.294 ms 271.968 ms
30 so.make.the.bad.horse.gleeful (162.252.205.151) 282.465 ms 278.175 ms 
276.852 ms
31 or.he-ll.make.you.his.mare (162.252.205.152) 297.755 ms 281.298 ms 282.081 ms
32 o_o (162.252.205.153) 288.199 ms 286.632 ms 286.601 ms
33 you-re.saddled.up (162.252.205.154) 389.436 ms 327.868 ms 296.183 ms
34 there-s.no.recourse (162.252.205.155) 333.364 ms 328.371 ms 300.595 ms
35 it-s.hi-ho.silver (162.252.205.156) 326.765 ms 327.759 ms 313.318 ms
36 signed.bad.horse (162.252.205.157) 311.141 ms 330.010 ms 419.000 ms

-T

> On Feb 12, 2025, at 07:00, nanog-requ...@nanog.org wrote:
> 
> Message: 6
> Date: 11 Feb 2025 20:30:47 -0500
> From: "John Levine" <jo...@iecc.com>
> To: nanog@nanog.org
> Subject: Re: Question about DNS naming conventions
> Message-ID: <20250212013047.b06a6bc2c...@ary.qy>
> Content-Type: text/plain; charset=utf-8
> 
> Right.  The names are usually created with BIND's $GENERATE extension or the
> equivalent in other DNS software.
> 
> There is a great deal of variation in the details of the names beyond the fact
> that they embed all or part of the IP address.  I know a guy who has collected
> a lot of regular expressions to match them.  See http://enemieslist.com
> 
> R's,
> John

Reply via email to