<[EMAIL PROTECTED]> writes:
> The sender then proceeded to give detailed information almost as though
> he'd catted the zone file on our DNS server. It included what the MX
> records were for a given systems and which server were CNAMEd to which.
[...]
> ...so here's my question: How'd he do it? =:)
UUbudr ~ $ dig mx internet-frontier.net
;; ANSWERS:
internet-frontier.net. 172800 MX 5 adm.internet-frontier.net.
internet-frontier.net. 172800 CNAME adm.internet-frontier.net.
;; AUTHORITY RECORDS:
internet-frontier.net. 172800 SOA internet-frontier.net.
adm.internet-frontier.net. (
51498 ; serial
100000 ; refresh (1 day 3 hours 46 mins 40 secs)
3600 ; retry (1 hour)
1728000 ; expire (20 days)
172800 ) ; minimum (2 days)
;; ADDITIONAL RECORDS:
adm.internet-frontier.net. 172800 A 208.196.56.2
You could probably do the same with nslookup, but I like dig.
man dig, man nslookup.
HTH
--
Bud Rogers <[EMAIL PROTECTED]>
have linux, will telnet
-
To unsubscribe from this list: send the line "unsubscribe linux-net" in
the body of a message to [EMAIL PROTECTED]