http://issues.apache.org/SpamAssassin/show_bug.cgi?id=5790





------- Additional Comments From [EMAIL PROTECTED]  2008-01-16 16:55 -------
On a failing test a large proportion of NXDomain responses from a name server
never make it back to the querying host. Is there any misguided firewall
or router sitting between both hosts which might misinterpret a barrage of
NXDomain responses as some kind of a DoS attack and drop packets? Or an
equivalent DoS protection functionality on the host itself?

Capturing tcpdump of the same event (failing test) on the DNS server's side
of the network, and comparing both tcpdumps could show if the NXDomain 
responses were sent from DNS but never arrived at a querying host, or
the DNS server never replied to these queries.



------- You are receiving this mail because: -------
You are the assignee for the bug, or are watching the assignee.

Reply via email to