Merit Network
Can't find what you're looking for? Search the Mail Archives.
  About Merit   Services   Network   Resources & Support   Network Research   News   Events   Home

Discussion Communities: Merit Network Email List Archives

North American Network Operators Group

Date Prev | Date Next | Date Index | Thread Index | Author Index | Historical

Re: URGENT: ns.internic.net blown

  • From: Paul A Vixie
  • Date: Sun Mar 05 14:33:41 1995

> It's a little worse than that in this case; 194 isn't a provider
> block, it's one of the two superblocks in Europe, delegated to the
> RIPE NCC (the other one is 193).
> 
> The bogus info is actually in the zone files themselves, according
> to Lars-Johan Liman at KTH in Sweden (they run nic.nordu.net, one
> of the root servers).  This means that all root servers will be
> infected -- I just checked three, and yep, sure enough.
> 
> Those root operators reading this, please consider fixing the zone
> file; the correct data is
> 
> 194.IN-ADDR.ARPA.       518400  NS      sunic.sunet.se.
> 194.IN-ADDR.ARPA.       518400  NS      munnari.oz.au.
> 194.IN-ADDR.ARPA.       518400  NS      sparky.arl.mil.
> 194.IN-ADDR.ARPA.       518400  NS      ns.ripe.net.
> 194.IN-ADDR.ARPA.       518400  NS      ns.eu.net.
> 194.IN-ADDR.ARPA.       518400  NS      ns.uu.net.
> 194.IN-ADDR.ARPA.       518400  NS      layon.inria.fr.

i've fixed this on ns.isc.org, though i'm not sure what good it will do
unless all the roots do it.




Discussion Communities


About Merit | Services | Network | Resources & Support | Network Research
News | Events | Contact | Site Map | Merit Network Home


Merit Network, Inc.