This is according to spec. RFC 1035 says that omitted class and TTL
values are default to the last explicitly stated values. If you want the
records after the MX to have a TTL of 1d, you should add explicitly say
so; either by adding the line:
$TTL 1d
after the MX record, or by giving the TXT record an explicit TTL of 1d.
This is according to spec. RFC 1035 says that omitted class and TTL
values are default to the last explicitly stated values. If you want the
records after the MX to have a TTL of 1d, you should add explicitly say
RFC2308, introducing $TTL and updating RFC1035, says:
The Master File format [RFC 1035 Section 5] is extended to include
the following directive:
$TTL <TTL> [comment]
All resource records appearing after the directive, and which do not
explicitly include a TTL value, have their TTL set to the TTL given
in the $TTL directive. [...]
It appears to me that "after the directive" and "which do not explicitly
include a TTL value" overrides the RFC 1035 inheritance rule. We might
need a spec clarification here, though.
This is according to spec. RFC 1035 says that omitted class and TTL
values are default to the last explicitly stated values. If you want the
records after the MX to have a TTL of 1d, you should add explicitly say
so; either by adding the line:
$TTL 1d
after the MX record, or by giving the TXT record an explicit TTL of 1d.
My copy of NSD 3.2.6 does not behave this way. Here's a zone snippet:
nsd01.t-isa.de. A 193.27.50.9
nsd02.t-isa.de. A 193.27.54.9
...
--- snap
and thats what "ldns-read-zone t-isa.de" prints out:
t-isa.de. 86400 IN SOA nsd01.t-isa.de. hostmaster-soa.datev.de. 2010110902 14400 4444 3456000 2400
t-isa.de. 86400 IN NS nsd01.t-isa.de.
t-isa.de. 86400 IN NS nsd02.t-isa.de.
t-isa.de. 300 IN MX 0 mailin11.t-isa.de.
t-isa.de. 300 IN TXT "v=spf1 ip4=193.27.48.0/21 -all"
t-isa.de. 300 IN SPF "v=spf1 ip4=193.27.48.0/21 -all"
nsd01.t-isa.de. 300 IN A 193.27.50.9
nsd02.t-isa.de. 300 IN A 193.27.54.9
...
up to this point only ldns is involved.
next players are ldns-signzone and zonec.
public verifyable is this:
$ dig @nsd01.t-isa.de t-isa.de any +noall +answer| grep -v DNSKEY | grep -v RRSIG
;; Truncated, retrying in TCP mode.
t-isa.de. 86400 IN SOA nsd01.t-isa.de. hostmaster-soa.datev.de. 2010110902 14400 4444 3456000 2400
t-isa.de. 86400 IN NS nsd01.t-isa.de.
t-isa.de. 86400 IN NS nsd02.t-isa.de.
t-isa.de. 300 IN MX 0 mailin11.t-isa.de.
t-isa.de. 300 IN TXT "v=spf1 ip4=193.27.48.0/21 -all"
t-isa.de. 3600 IN TYPE51 \# 5 0100000100
t-isa.de. 300 IN TYPE99 \# 31 1E763D73706631206970343D3139332E32372E34382E302F3231202D 616C6C