On Saturday 01 January 2011 22:47:58 Duaine Hechler wrote:
named: dropped malicious resp from
Not sure if the situation you're describing matches these circumstances but a quick Google pulled up several similar 'explanations' to the following: "Basically it indicates that the initial DNS response (from .156.1) timed out, the RG (acting as the DNS proxy) re-sent the request to the other DNS cluster (.157.1) and in the meantime, the original response showed up ... but because the second request is now the active request .... it gets tagged and dropped as malicious inbound traffic. ... The programmer used a poor choice of words ..." hth & regards, Carl -- To unsubscribe, e-mail: opensuse+unsubscribe@opensuse.org For additional commands, e-mail: opensuse+help@opensuse.org