10 Aug
2007
10 Aug
'07
12:55 a.m.
dougb@dougbarton.us (Doug Barton) writes:
... I took this a step further and worked (together with others) on a patch to restrict the size of DNS answers to < 512 by returning a random selection of any RR set larger than that.
note that this sounds like a DNS protocol violation, and usually is. every time someone sent me a BIND patch adding this kind of deliberate instability (see RFC 1794 for an example) i said "no". -- Paul Vixie