1# $Id: en.yaml 884 2010-06-18 08:19:42Z calle $ 2 3locale_name: English 4locale_id: en 5 6messages: 7 8 ENGINE:CRASH: 9 args: 0 10 format: DNSCheck engine crashed 11 12 ASN:LOOKUP: 13 args: 1 14 format: Looking up AS number for %s. 15 ASN:INVALID_ADDRESS: 16 args: 1 17 format: %s is an invalid IP address. 18 ASN:ANNOUNCE_BY: 19 args: 2 20 format: %s announced by AS %s. 21 ASN:NOT_ANNOUNCE: 22 args: 1 23 format: %s not announced. 24 ASN:LOOKUP_ERROR: 25 args: 1 26 format: Error looking up AS number for %s. 27 28 DNS:QUERY_EXPLICIT: 29 args: 4 30 format: Query %s for %s/%s/%s. 31 descr: ~ 32 DNS:QUERY_RESOLVER: 33 args: 3 34 format: DNS query for %s/%s/%s. 35 DNS:RESOLVER_QUERY_TIMEOUT: 36 args: 3 37 format: DNS resolver timed out in query for %s/%s/%s. 38 descr: ~ 39 DNS:QUERY_PARENT: 40 args: 4 41 format: Query parent of %s for %s/%s/%s. 42 DNS:FAKE_PACKET: 43 args: 3 44 format: Faking response packet in zone %s for %s/%s. 45 DNS:QUERY_PARENT_NOCACHE: 46 args: 4 47 format: Query parent (without cache) of %s for %s/%s/%s. 48 DNS:FIND_PARENT: 49 args: 2 50 format: Find parent of %s/%s. 51 DNS:NO_PARENT: 52 args: 2 53 format: Failed to find parent of %s/%s. 54 descr: DNSCheck failed to find the parent of zone. 55 DNS:PARENT_OF: 56 args: 3 57 format: Found %s as parent of %s/%s. 58 DNS:EXPLICIT_RESPONSE: 59 args: 1 60 format: Name server response: %s 61 DNS:PARENT_RESPONSE: 62 args: 1 63 format: DNS response from parent: %s 64 DNS:CHILD_RESPONSE: 65 args: 1 66 format: DNS response from child: %s 67 DNS:RESOLVER_RESPONSE: 68 args: 1 69 format: DNS response from resolver: %s 70 DNS:NO_PARENT_NS: 71 args: 3 72 format: Failed to find name servers for %s (parent of %s/%s). 73 descr: ~ 74 DNS:QUERY_TIMEOUT: 75 args: 4 76 format: Name server %s timed out in query for %s/%s/%s. 77 descr: ~ 78 DNS:QUERY_CHILD: 79 args: 4 80 format: Query any name server of %s for %s/%s/%s. 81 DNS:QUERY_CHILD_NOCACHE: 82 args: 4 83 format: Query any name server (without cache) of %s for %s/%s/%s. 84 DNS:NO_CHILD_NS: 85 args: 2 86 format: Failed to find name servers of %s/%s. 87 descr: ~ 88 DNS:ADDRESS_BLACKLIST_ADD: 89 args: 4 90 format: Adding name server %s to blacklist. 91 DNS:ADDRESS_BLACKLISTED: 92 args: 4 93 format: Name server %s blacklisted. 94 DNS:LOOKUP_ERROR: 95 args: 1 96 format: DNS lookup error (%s). 97 descr: ~ 98 DNS:NO_EDNS: 99 args: 1 100 format: EDNS not supported by %s. 101 descr: EDNS is an extension to the DNS protocol. The major change is that the 512 byte size limit of the query/answer packet has been removed, which allows more information to be provided. EDNS is essential for newer protocols and technologies that requires larger packet size like DNSSEC and IPv6. 102 DNS:NO_ANSWER: 103 args: 4 104 format: No answer received from %s when querying for %s/%s/%s. 105 descr: ~ 106 DNS:NOT_AUTH: 107 args: 4 108 format: Name server %s not authoritative for %s/%s/%s. 109 DNS:SOA_SERVFAIL: 110 args: 1 111 format: DNS SERVFAIL when querying %s for SOA 112 DNS:ANSWER_DUMP: 113 args: 1 114 format: DNS query returned: %s 115 DNS:SETUP_RESOLVER: 116 args: 0 117 format: DNS resolver set up. 118 DNS:SET_BUFSIZE: 119 args: 1 120 format: DNS resolver EDNS buffer size set to %s. 121 DNS:TRANSPORT_TCP: 122 args: 0 123 format: DNS resolver transport set to TCP. 124 DNS:TRANSPORT_UDP: 125 args: 0 126 format: DNS resolver transport set to UDP. 127 DNS:RECURSION_DESIRED: 128 args: 0 129 format: DNS resolver recursion desired. 130 DNS:RECURSION_DISABLED: 131 args: 0 132 format: DNS resolver recursion disabled. 133 DNS:DNSSEC_DESIRED: 134 args: 0 135 format: DNS resolver DNSSEC desired. 136 DNS:DNSSEC_DISABLED: 137 args: 0 138 format: DNS resolver DNSSEC disabled. 139 DNS:GET_NS_AT_PARENT: 140 args: 2 141 format: DNS query for NS of %s/%s at parent. 142 DNS:GET_NS_AT_CHILD: 143 args: 2 144 format: DNS query for NS of %s/%s at child. 145 DNS:INITIALIZING_NAMESERVERS: 146 args: 2 147 format: Initializing name servers for %s/%s. 148 DNS:NAMESERVERS_INITIALIZED: 149 args: 2 150 format: Name servers for %s/%s initialized. 151 DNS:NAMESERVER_FOUND: 152 args: 4 153 format: Found name server for %s/%s: %s (%s) 154 DNS:FIND_PARENT_BEGIN: 155 args: 2 156 format: Trying to find parent of %s/%s 157 DNS:NXDOMAIN: 158 args: 2 159 format: Domain %s/%s does not exist. 160 descr: ~ 161 DNS:FIND_PARENT_DOMAIN: 162 args: 1 163 format: Using %s as a start for parent trace. 164 DNS:FIND_PARENT_TRY: 165 args: 1 166 format: Checking %s as parent domain. 167 DNS:FIND_PARENT_UPPER: 168 args: 1 169 format: Parent might be %s. 170 DNS:FIND_PARENT_RESULT: 171 args: 3 172 format: Resolved %s as parent of %s/%s. 173 DNS:FIND_MX_BEGIN: 174 args: 1 175 format: Lookup up mail exchanger for %s 176 DNS:FIND_MX_RESULT: 177 args: 2 178 format: Found mail exchanger for %s: %s 179 DNS:FIND_ADDRESSES: 180 args: 2 181 format: Found addresses of %s/%s 182 DNS:FIND_ADDRESSES_RESULT: 183 args: 3 184 format: Addresses for %s/%s: %s 185 DNS:UNQUERIBLE_ADDRESS: 186 args: 1 187 format: Unable to send queries to %s. 188 189 ADDRESS:BEGIN: 190 args: 1 191 format: Begin testing address %s. 192 ADDRESS:INVALID: 193 args: 1 194 format: Adress %s is invalid or incorrect 195 descr: ~ 196 ADDRESS:PRIVATE_IPV4: 197 args: 1 198 format: %s is a private IPv4 address. 199 descr: A private IP address should normally not be exposed in the public DNS, since it's not reachable from the Internet. 200 ADDRESS:RESERVED_IPV4: 201 args: 1 202 format: %s is a reserved IPv4 address. 203 descr: Reserved IPv4 addresses should not be used on the public Internet. 204 ADDRESS:RESERVED_IPV6: 205 args: 1 206 format: %s is a reserved IPv6 address. 207 descr: Reserved IPv6 addresses should not be used on the public Internet. 208 ADDRESS:PTR_NOT_FOUND: 209 args: 2 210 format: Could not find reverse address for %s (%s). 211 descr: PTR record(s) for the address could not be found in the .arpa-zone. (ip6.arpa. for IPv6 addresses and in-addr.arpa. for IPv4). 212 ADDRESS:PTR_HOSTNAME_NOT_FOUND: 213 args: 2 214 format: Reverse for %s points to an unknown host name (%s). 215 descr: The PTR record for the address points to an unknown host name. 216 ADDRESS:END: 217 args: 1 218 format: Done testing address %s. 219 220 CONNECTIVITY:BEGIN: 221 args: 1 222 format: Begin testing connectivity for %s. 223 CONNECTIVITY:ANNOUNCED_BY_ASN: 224 args: 2 225 format: Name server %s announced by: %s 226 descr: The IP address is announced by an autonomous system (AS). 227 CONNECTIVITY:MULTIPLE_ASN: 228 args: 1 229 format: Name server %s announced by multiple AS. 230 descr: The name server is announced my more than one autonomous system (AS). 231 CONNECTIVITY:NOT_ANNOUNCED: 232 args: 1 233 format: Name server %s not announced by any AS. 234 descr: The IP address is not announced by any autonomous system and is most probably not reachable on the Internet. 235 CONNECTIVITY:ASN_LIST: 236 args: 1 237 format: Zone announced by IPv4 ASN: %s 238 CONNECTIVITY:TOO_FEW_ASN: 239 args: 1 240 format: Zone announced by less than two IPv4 ASN (%s). 241 descr: The zone's name servers are all located within the same, (or none), autonomous system. 242 CONNECTIVITY:ASN_COUNT_OK: 243 args: 1 244 format: Zone announced by more than one ASN (%s). 245 descr: The zone's name serves are located within more than one autonomous system. 246 CONNECTIVITY:V6_ANNOUNCED_BY_ASN: 247 args: 2 248 format: Name server %s announced over IPv6 by: %s 249 descr: The IP address is announced by an autonomous system (AS). 250 CONNECTIVITY:V6_MULTIPLE_ASN: 251 args: 1 252 format: Name server %s announced by multiple IPv6 AS. 253 descr: The name server is announced my more than one IPv6 autonomous system (AS). 254 CONNECTIVITY:V6_NOT_ANNOUNCED: 255 args: 1 256 format: Name server %s not announced by any IPv6 AS. 257 descr: The IP address is not announced by any autonomous system and is most probably not reachable on the Internet. 258 CONNECTIVITY:V6_ASN_LIST: 259 args: 1 260 format: Zone announced by IPv6 ASN: %s 261 CONNECTIVITY:V6_TOO_FEW_ASN: 262 args: 1 263 format: Zone announced by less than two IPv6 ASN (%s). 264 descr: The zone's name servers are all located within the same, (or none), autonomous system. 265 CONNECTIVITY:V6_ASN_COUNT_OK: 266 args: 1 267 format: Zone announced by more than one IPv6 ASN (%s). 268 descr: The zone's name serves are located within more than one autonomous system. 269 CONNECTIVITY:END: 270 args: 1 271 format: Done testing connectivity for %s. 272 273 DELEGATION:BEGIN: 274 args: 1 275 format: Begin testing delegation for %s. 276 DELEGATION:NS_AT_PARENT: 277 args: 1 278 format: Name servers listed at parent: %s 279 descr: This is the list of name servers that are listed at the parent. It should include all name servers listed at the child. 280 DELEGATION:NOT_FOUND_AT_PARENT: 281 args: 0 282 format: Delegation not found at parent. 283 descr: No delegation could be found at the parent, making your zone unreachable from the Internet. 284 DELEGATION:NS_AT_CHILD: 285 args: 1 286 format: Name servers listed at child: %s 287 descr: This is the list of name servers that are listed at the child . It must include all name servers listed at the parent. 288 DELEGATION:NOT_FOUND_AT_CHILD: 289 args: 0 290 format: No name servers found at child. 291 descr: No name servers could be found at the child. This usually means that the child is not configured to answer queries about the zone. 292 DELEGATION:EXTRA_NS_PARENT: 293 args: 1 294 format: Superfluous name server listed at parent: %s 295 descr: A name server listed at the parent, but not at the child, was found. This is most likely an administrative error. You should update the parent to match the name servers at the child as soon as possible. 296 DELEGATION:EXTRA_NS_CHILD: 297 args: 1 298 format: Additional name server listed at child: %s 299 descr: A name server listed at the child, but not at the parent, was found. This is most likely a configuration error, but there are sometimes reasons for setting up a zone this way. 300 DELEGATION:TOO_FEW_NS: 301 args: 1 302 format: Too few name servers (%s). 303 descr: Only one name server was found for the zone. You should always have at least two name servers for a zone to be able to handle transient connectivity problems. 304 DELEGATION:TOO_FEW_NS_IPV4: 305 args: 1 306 format: Too few IPv4 name servers (%s). 307 descr: Only one IPv4 name server was found for the zone. You should always have at least two IPv4 name servers for a zone to be able to handle transient connectivity problems. 308 DELEGATION:TOO_FEW_NS_IPV6: 309 args: 1 310 format: Too few IPv6 name servers (%s). 311 descr: Only one IPv6 name server was found for the zone. You should always have at least two IPv6 name servers for a zone to be able to handle transient connectivity problems. 312 DELEGATION:NO_NS_IPV4: 313 args: 0 314 format: No IPv4 name servers found. 315 DELEGATION:NO_NS_IPV6: 316 args: 0 317 format: No IPv6 name servers found. 318 DELEGATION:NO_COMMON_NS_NAMES: 319 args: 2 320 format: Total parent/child glue mismatch. 321 descr: The parent lists name servers that the child doesnt know about, see details in advanced. This configuration could actually work but breaks very easily if one of these zones change slightly. 322 DELEGATION:MATCHING_GLUE: 323 args: 2 324 format: Checking glue for %s (%s). 325 DELEGATION:GLUE_SKIPPED: 326 args: 2 327 format: Skipped glue for %s (%s). 328 DELEGATION:GLUE_FOUND_AT_PARENT: 329 args: 3 330 format: Parent glue for %s found: %s (%s) 331 descr: The IP address of the name server was found at the parent. 332 DELEGATION:GLUE_FOUND_AT_CHILD: 333 args: 3 334 format: Child glue for %s found: %s (%s) 335 descr: The IP address of the name server was found at the child. 336 DELEGATION:INCONSISTENT_GLUE: 337 args: 1 338 format: Inconsistent glue for name server %s. 339 descr: The address of a name server differed from the child and the parent. This is a configuration error and should be corrected as soon as possible. 340 DELEGATION:GLUE_MISSING_AT_CHILD: 341 args: 1 342 format: Missing glue at child: %s 343 descr: The IP address of the name servers was not found at the child. This is a configuration error and should be corrected as soon as possible. 344 DELEGATION:NS_HISTORY: 345 args: 2 346 format: Previously used name servers for %s: %s 347 DELEGATION:STILL_AUTH: 348 args: 3 349 format: Previously used name server %s (%s) is still authoritative for %s. 350 descr: A previously used name server is still answering authoritative for the zone. This is probably due to old zone data still being served by a no longer used server. To correct this problem, contact the administrator of the name server and have them remove the zone in their configuration. 351 DELEGATION:BROKEN_UNDELEGATED: 352 args: 1 353 format: Test for zone %s was marked as undelegated, but no working fake glue was provided. 354 DELEGATION:INZONE_NS_WITHOUT_GLUE: 355 args: 2 356 format: Nameserver %s is listed for zone %s without address information. 357 DELEGATION:END: 358 args: 1 359 format: Done testing delegation for %s. 360 361 DNSSEC:BEGIN: 362 args: 1 363 format: Begin testing DNSSEC for %s. 364 DNSSEC:CHECKING_DS_AT_PARENT: 365 args: 1 366 format: Checking DS records for %s at parent. 367 DNSSEC:DS_FOUND: 368 args: 1 369 format: Found DS record for %s at parent. 370 descr: A DS (delegation signer) RRset was found at the parent. This indicates a secure delegation, i.e. the child must be signed. 371 DNSSEC:NO_DS_FOUND: 372 args: 1 373 format: Did not find DS record for %s at parent. 374 descr: A DS (delegation signer) RRset could not be found at the parent. This indicates an insecure delegation, i.e. the child does not have to be signed. 375 DNSSEC:CHECKING_DNSKEY_AT_CHILD: 376 args: 1 377 format: Checking DNSKEY records for %s at child. 378 DNSSEC:DNSKEY_FOUND: 379 args: 1 380 format: Found DNSKEY record for %s at child. 381 descr: A DNSKEY RRset was found at the child, indicating that the child probably uses DNSSEC. 382 DNSSEC:DNSKEY_NOT_FOUND: 383 args: 1 384 format: Did not find DNSKEY record for %s at child. 385 descr: A DNSKEY RRset could not be found at the child, indicating that the child probably not uses DNSSEC. 386 DNSSEC:DETERMINE_SECURITY_STATUS: 387 args: 1 388 format: Determining security status for %s. 389 DNSSEC:INCONSISTENT_SECURITY: 390 args: 1 391 format: Inconsistent security for %s - DS found at parent, but no DNSKEY found at child. 392 descr: The parent has a secure delegation to the child (indicated by DS RRset at the parent), but the child has no DNSKEY. This is probably due to a previously signed zone that became unsigned without requesting the parent to remove the secure delegation. 393 DNSSEC:CONSISTENT_SECURITY: 394 args: 1 395 format: Consistent security for %s. 396 DNSSEC:SKIPPED_NO_KEYS: 397 args: 1 398 format: No DNSKEY(s) found at child, other tests skipped. 399 DNSSEC:MISSING_DS: 400 args: 1 401 format: Broken chain of trust for %s - DNSKEY found at child, but no DS was found at parent. 402 descr: The child seems to use DNSSEC, but the parent has no secure delegation. Because of this, the chain of trust between the parent and the child is broken and validating resolvers will not be able to validate answers from the child. 403 DNSSEC:CHECKING_CHILD: 404 args: 1 405 format: Checking DNSSEC at child (%s). 406 DNSSEC:DNSKEY_ALGORITHM_NOT_RECOMMENDED: 407 args: 3 408 format: DNSKEY %s (tag %s) is using a not recommended algorithm: %s 409 descr: A DNSKEY using a not recommended algorithm was found - you should consider stop using not recommended algorithms unless you have a very good reason for using them. 410 DNSSEC:DNSKEY_SKIP_PROTOCOL: 411 args: 3 412 format: DNSKEY %s (tag %s) is not a DNSSEC key (protocol=%s). 413 descr: DNSKEYs must have a protocol value of DNSSEC (3). 414 DNSSEC:DNSKEY_SKIP_TYPE: 415 args: 2 416 format: DNSKEY %s (tag %s) is not a zone key. 417 descr: DNSKEYs must be a zone key. 418 DNSSEC:DNSKEY_SEP: 419 args: 2 420 format: DNSKEY %s (tag %s) is marked as a secure entry point (SEP). 421 descr: A secure entry point (SEP) is used as part of the chain of trust from the parent to the child. 422 DNSSEC:DNSKEY_MANDATORY_FOUND: 423 args: 1 424 format: At least one mandatory algorithm found for DNSKEY %s. 425 DNSSEC:DNSKEY_MANDATORY_NOT_FOUND: 426 args: 1 427 format: No mandatory algorithm found for DNSKEY %s. 428 descr: At least one DNSKEY should be of type RSA/SHA1. 429 DNSSEC:ADDITIONAL_PROCESSING_BROKEN: 430 args: 2 431 format: DNSSEC additional processing broken for %s (server: %s). 432 descr: No DNSSEC signatures were included in replies from the name server. This is probably due to a misconfiguration at the name server. 433 DNSSEC:NO_SIGNATURES: 434 args: 1 435 format: No signatures found for %s. 436 descr: No DNSSEC signatures was found when querying the zone. Perhaps the zone isn't signed? 437 DNSSEC:CHILD_CHECK_ABORTED: 438 args: 1 439 format: DNSSEC child checks aborted for %s. 440 DNSSEC:DNSKEY_SIGNATURE_OK: 441 args: 2 442 format: Found RRSIG(DNSKEY %s) created by published key (tag %s). 443 DNSSEC:DNSKEY_SIGNER_UNPUBLISHED: 444 args: 2 445 format: Found RRSIG(DNSKEY %s) created by unpublished key (tag %s). 446 descr: DNSSEC signatures created by unpublished keys can't be validated by validating resolvers. All keys used to sign data must be published. 447 DNSSEC:DNSKEY_VALID_SIGNATURES: 448 args: 1 449 format: Enough valid signatures found for %s. 450 DNSSEC:DNSKEY_NO_VALID_SIGNATURES: 451 args: 1 452 format: Not enough valid signatures found for %s. 453 descr: No valid signatures for the DNSKEY RRset for the zone was found - make sure the zone is signed with a valid and published key. 454 DNSSEC:SOA_SIGNATURE_OK: 455 args: 2 456 format: RRSIG(SOA %s) created by DNSKEY (tag %s) OK. 457 DNSSEC:SOA_SIGNATURE_UNPUBLISHED: 458 args: 2 459 format: Found RRSIG(SOA %s) created by published key (tag %s). 460 descr: DNSSEC signatures created by unpublished keys can't be validated by validating resolvers. All keys used to sign data must be published. 461 DNSSEC:SOA_VALID_SIGNATURES: 462 args: 1 463 format: Enough valid signatures over SOA RRset found for %s. 464 DNSSEC:SOA_NO_VALID_SIGNATURES: 465 args: 1 466 format: Not enough valid signatures over SOA RRset found for %s. 467 descr: No valid signatures for the SOA RRset for the zone was found - make sure the zone is signed with a valid and published key. 468 DNSSEC:CHILD_CHECKED: 469 args: 1 470 format: DNSSEC child checks for %s complete. 471 DNSSEC:CHECKING_PARENT: 472 args: 1 473 format: Checking DNSSEC at parent of %s. 474 DNSSEC:PARENT_DS: 475 args: 2 476 format: Found DS(%s) at parent: %s 477 DNSSEC:DS_KEYREF_OK: 478 args: 2 479 format: Parent DS(%s) refers to valid key at child: %s 480 DNSSEC:DS_KEYREF_INVALID: 481 args: 2 482 format: Parent DS(%s) refers to invalid key at child: %s 483 descr: The DS RRset must refer to a valid DNSKEY at the child, or the chain of trust between the parent and the child is broken and validating resolver will not be able to validate answers from the child. 484 DNSSEC:DS_TO_SEP: 485 args: 2 486 format: Parent DS(%s) refers to secure entry point (SEP) at child: %s 487 DNSSEC:DS_TO_NONSEP: 488 args: 2 489 format: Parent DS(%s) does not refer to secure entry point (SEP) at child: %s 490 descr: The DS RRset refers to a DNSKEY at the child, but the key is not marked as a secure entry point. 491 DNSSEC:DS_MANDATORY_FOUND: 492 args: 1 493 format: At least one mandatory DS algorithm found for %s. 494 DNSSEC:DS_MANDATORY_NOT_FOUND: 495 args: 1 496 format: No mandatory DS algorithm found for %s. 497 descr: Since none of the hash algorithms published in the DS RRset are mandatory, some validating resolvers will not be able to follow the chain of trust from the parent to the child. 498 DNSSEC:PARENT_CHECKED: 499 args: 1 500 format: DNSSEC parent checks for %s complete. 501 DNSSEC:RRSIG_NOT_YET_VALID: 502 args: 1 503 format: DNSSEC signature not yet valid: %s 504 descr: Not yet valid signatures will be ignored by validating resolvers. 505 DNSSEC:RRSIG_EXPIRED: 506 args: 1 507 format: DNSSEC signature expired: %s 508 descr: Expired signatures will be ignored by validating resolvers. 509 DNSSEC:RRSIG_VALID: 510 args: 1 511 format: DNSSEC signature valid: %s 512 DNSSEC:RRSIG_EXPIRES_AT: 513 args: 1 514 format: DNSSEC signature expires at: %s 515 DNSSEC:RRSIG_VERIFIES: 516 args: 1 517 format: DNSSEC signature %s matches records. 518 DNSSEC:RRSIG_FAILS_VERIFY: 519 args: 2 520 format: DNSSEC signature %s does not match the records it signs: %s 521 DNSSEC:EXTRA_PROCESSING: 522 args: 1 523 format: Nameserver %s does DNSSEC extra processing. 524 DNSSEC:NO_EXTRA_PROCESSING: 525 args: 1 526 format: Nameserver %s does not do DNSSEC extra processing. 527 DNSSEC:CONSISTENT_EXTRA_PROCESSING: 528 args: 1 529 format: Servers for %s have consistent extra processing status. 530 DNSSEC:INCONSISTENT_EXTRA_PROCESSING: 531 args: 1 532 format: Not all servers for %s has DNSSEC extra processing turned on. 533 DNSSEC:END: 534 args: 1 535 format: Done testing DNSSEC for %s. 536 537 HOST:BEGIN: 538 args: 1 539 format: Begin testing host %s. 540 HOST:ILLEGAL_NAME: 541 args: 2 542 format: Host name %s is illegal (syntax error at %s) 543 descr: The hostname is not syntactially correct according to RFC 952. A common error is to begin the hostname with a non-letter (a-z) or use invalid characters (only a-z, 0-9 and - are allowed). 544 HOST:NOT_FOUND: 545 args: 1 546 format: No address found for %s. 547 descr: No IPv4 or IPv6 address was found for the host name. 548 HOST:CNAME_FOUND: 549 args: 1 550 format: Host name %s refers to a CNAME. 551 descr: The host name is an alias (CNAME), which is not allowed. Host names must be published with an A or AAAA record. 552 HOST:END: 553 args: 1 554 format: Done testing host %s. 555 556 MAIL:BEGIN: 557 args: 1 558 format: Begin testing email address %s. 559 MAIL:ADDRESS_SYNTAX: 560 args: 1 561 format: %s is not a valid email address. 562 MAIL:MAIL_EXCHANGER: 563 args: 2 564 format: Mail exchangers for %s found %s. 565 MAIL:DOMAIN_NOT_FOUND: 566 args: 1 567 format: No mail exchanger found for domain %s. 568 descr: No mail exchanger was found for the domain. This makes it impossible to deliver email to any recipient within the domain. 569 MAIL:HOST_ERROR: 570 args: 1 571 format: Invalid host name for mail exchanger %s. 572 descr: The hostname for the mail exchanger is invalid. A common error is to point the mail exchanger to an alias (CNAME) or directly to an IP address. 573 MAIL:IPV6_ONLY: 574 args: 1 575 format: Mail exchanger %s is reachable by IPv6 only. 576 descr: This mail exchanger is only reachable via IPv6, making it impossible for most hosts on the Internet to deliver emails to it. If more than one MX exists and at least one is reachable by IPv4 this can be ignored. 577 MAIL:DELIVERY_IPV4_OK: 578 args: 1 579 format: Delivery over IPv4 to %s ok. 580 MAIL:DELIVERY_IPV6_OK: 581 args: 1 582 format: Delivery over IPv6 to %s ok. 583 MAIL:DELIVERY_IPV4_NOT_OK: 584 args: 1 585 format: Delivery over IPv4 to %s could not be done. 586 MAIL:DELIVERY_IPV6_NOT_OK: 587 args: 1 588 format: Delivery over IPv6 to %s could not be done. 589 MAIL:ALL_MX_IN_ZONE: 590 args: 2 591 format: All mail servers for %s are in zone %s. 592 MAIL:END: 593 args: 1 594 format: Done testing email address %s. 595 596 NAMESERVER:BEGIN: 597 args: 1 598 format: Begin testing name server %s. 599 NAMESERVER:HOST_ERROR: 600 args: 1 601 format: Host name or address error for %s. 602 descr: The specified host name is not a valid host name or the host name points to an invalid IP address, e.g. a private or reserved IP address. 603 NAMESERVER:CHECKING_RECURSION: 604 args: 2 605 format: Checking recursion for %s at address %s. 606 NAMESERVER:RECURSIVE: 607 args: 2 608 format: Name server %s (%s) is recursive. 609 descr: The name server answers recursive queries for 3rd parties (such as DNSCheck). By making a recursive query to a name server that provides recursion, an attacker can cause a name server to look up and cache information contained in zones under their control. Thus the victim name server is made to query the attackers malicious name servers, resulting in the victim caching and serving bogus data. 610 NAMESERVER:NOT_RECURSIVE: 611 args: 2 612 format: Name server %s (%s) is not recursive. 613 NAMESERVER:CHECKING_AUTH: 614 args: 2 615 format: Checking authority for %s (%s). 616 NAMESERVER:NOT_AUTH: 617 args: 3 618 format: Name server %s (%s) not authoritative for %s. 619 descr: The name server does not answer authoritatively to queries for the tested domain. This is probably due to misconfiguration, usually the name server is not set up to serve the tested domain. 620 NAMESERVER:AUTH: 621 args: 3 622 format: Name server %s (%s) authoritative for %s. 623 NAMESERVER:TESTING_UDP: 624 args: 2 625 format: Testing UDP queries to name server %s at addrress %s. 626 NAMESERVER:UDP_OK: 627 args: 3 628 format: Name server %s (%s) answers queries over UDP. 629 NAMESERVER:NO_UDP: 630 args: 3 631 format: Name server %s (%s) does not answer queries over UDP. 632 descr: The name server failed to answer queries sent over UDP. This is probably due to the name server not correctly set up or due to misconfigured filtering in a firewall. 633 NAMESERVER:TESTING_TCP: 634 args: 2 635 format: Testing TCP queries to name server %s at address %s. 636 NAMESERVER:TCP_OK: 637 args: 3 638 format: Name server %s (%s) answers queries over TCP. 639 NAMESERVER:NO_TCP: 640 args: 3 641 format: Name server %s (%s) does not answer queries over TCP. 642 descr: The name server failed to answer queries sent over TCP. This is probably due to the name server not correctly set up or due to misconfgured filtering in a firewall. It is a rather common misconception that DNS does not need TCP unless they provide zone transfers - perhaps the name server administrator is not aware that TCP usually is a requirement. 643 NAMESERVER:TESTING_AXFR: 644 args: 2 645 format: Testing zone transfer for name server %s (%s). 646 NAMESERVER:AXFR_SKIP: 647 args: 3 648 format: Name server %s (%s) not checked for zone transfer of %s. 649 descr: The name server was not tested for zone transfer, since it did not answer queries over TCP. 650 NAMESERVER:AXFR_OPEN: 651 args: 3 652 format: Name server %s (%s) open for zone transfer of %s. 653 descr: This name server accepts zone transfer requests from any party. 654 NAMESERVER:AXFR_CLOSED: 655 args: 3 656 format: Name server %s (%s) closed for zone transfer of %s. 657 NAMESERVER:CHECKING_LEGACY_ID: 658 args: 2 659 format: Checking for legacy name server ID of %s (%s). 660 NAMESERVER:LEGACY_ID_SKIP: 661 args: 2 662 format: Name server %s (%s) not checked for legacy name server ID. 663 NAMESERVER:LEGACY_ID: 664 args: 4 665 format: Legacy name server ID for %s (%s): %s = %s 666 NAMESERVER:CHECKING_NSID: 667 args: 2 668 format: Checking for name server ID of %s (%s). 669 NAMESERVER:NSID_SKIP: 670 args: 2 671 format: Name server %s (%s) not checked for name server ID. 672 NAMESERVER:NSID: 673 args: 3 674 format: Name server ID for %s (%s): %s 675 NAMESERVER:SKIPPED_IPV4: 676 args: 1 677 format: IPv4 disabled - will not test name server at %s 678 NAMESERVER:SKIPPED_IPV6: 679 args: 1 680 format: IPv6 disabled - will not test name server at %s 681 NAMESERVER:END: 682 args: 1 683 format: Done testing name server %s. 684 685 CONSISTENCY:BEGIN: 686 args: 1 687 format: Begin testing zone consistency for %s. 688 CONSISTENCY:SOA_SERIAL_AT_ADDRESS: 689 args: 2 690 format: SOA at address %s has serial %s. 691 CONSISTENCY:SOA_SERIAL_DIFFERENT: 692 args: 1 693 format: %s different serials found. 694 descr: The SOA serial is not the same on all name servers. This is usually due to misconfiguration, but can sometimes be the result of slow zone propagation to secondary name servers. 695 CONSISTENCY:SOA_SERIAL_CONSISTENT: 696 args: 0 697 format: All SOA records have consistent serial numbers. 698 CONSISTENCY:SOA_DIGEST_AT_ADDRESS: 699 args: 2 700 format: SOA at address %s has digest %s. 701 CONSISTENCY:SOA_DIGEST_DIFFERENT: 702 args: 1 703 format: %s different SOA records found. 704 descr: The SOA record are not the same among all name servers. This is usually due to misconfiguration. 705 CONSISTENCY:SOA_DIGEST_CONSISTENT: 706 args: 0 707 format: All SOA records are consistent among all name servers. 708 CONSISTENCY:END: 709 args: 1 710 format: Done testing zone consistency for %s. 711 712 SMTP:BEGIN: 713 args: 3 714 format: Begin testing mail server %s (%s) with %s. 715 SMTP:CONNECT_FAILED: 716 args: 2 717 format: Failed to connect to %s (%s). 718 descr: DNSCheck failed to connect to the mail server. The server could be down or unreachable due to misconfigured routing and/or filtering. 719 SMTP:BANNER: 720 args: 2 721 format: SMTP banner: %s 722 SMTP:HELLO_FAILED: 723 args: 1 724 format: SMTP HELO failed while talking to %s. 725 descr: The mail server did not accept our polite greeting. This is probably due to misconfiguration. 726 SMTP:MAIL_FROM: 727 args: 1 728 format: Using %s as SMTP from (MAIL_FROM). 729 SMTP:RAW: 730 args: 1 731 format: SMTP Response: %s 732 SMTP:MAIL_FROM_REJECTED: 733 args: 1 734 format: Host did not accept %s as SMTP destination. 735 descr: The mail server did not accept our sender address. DNSCheck uses a standard null sender address which must be accepted by mail servers. 736 SMTP:RCPT_TO: 737 args: 1 738 format: Using %s as SMTP recipient (RCPT_TO). 739 SMTP:RECIPIENT_REJECTED: 740 args: 1 741 format: Host did not accept %s as SMTP recipient. 742 descr: The mail server did no accept mail to the recipient address. This is probably due to an unknown address. 743 SMTP:RSET: 744 args: 0 745 format: Sending SMTP reset (RSET). 746 SMTP:TIMEOUT: 747 args: 0 748 format: The mail server timed out in SMTP dialog. 749 SMTP:QUIT: 750 args: 0 751 format: Sending SMTP quit (QUIT). 752 SMTP:OK: 753 args: 3 754 format: SMTP testing of %s (%s) with %s succeeded without errors. 755 SMTP:END: 756 args: 3 757 format: Done testing mail server %s (%s) with %s. 758 759 SOA:BEGIN: 760 args: 1 761 format: Begin testing SOA parameters for %s. 762 SOA:NOT_FOUND: 763 args: 1 764 format: No SOA record found for %s. 765 descr: No SOA record was found when querying the name server. This is most probably due to a misconfiguration at the name server - a zone must have a SOA record. 766 SOA:FOUND: 767 args: 1 768 format: Found SOA record for %s. 769 SOA:MULTIPLE_SOA: 770 args: 1 771 format: Multiple SOA records found for %s. 772 descr: Multiple SOA records found when querying the name servers. This is a serious error and definitely due to a misconfiguration. 773 SOA:MNAME_ERROR: 774 args: 2 775 format: Error while checking SOA MNAME for %s (%s). 776 descr: The SOA MNAME was not a valid host name. 777 SOA:MNAME_VALID: 778 args: 2 779 format: SOA MNAME for %s valid (%s). 780 SOA:NS_NOT_FOUND: 781 args: 1 782 format: No NS record(s) found for %s. 783 descr: No name server records was fould for the zone. This is a serious error and definitely due to a misconfiguration. 784 SOA:MNAME_STEALTH: 785 args: 2 786 format: SOA MNAME for %s (%s) not listed as NS. 787 descr: The name server listed as the SOA MNAME is not listed as a name server. 788 SOA:MNAME_PUBLIC: 789 args: 2 790 format: SOA MNAME for %s (%s) listed as NS. 791 descr: The name server listed as the SOA MNAME is listed as a name server. 792 SOA:MNAME_NOT_AUTH: 793 args: 2 794 format: SOA MNAME for %s (%s) is not authoritative. 795 descr: The name server listed as the original or primary source of data for this zone does not answer authoriative. This is probably due to a misconfiguration - perhaps the SOA MNAME is not set up as name server for the zone. 796 SOA:MNAME_IS_AUTH: 797 args: 2 798 format: SOA MNAME for %s (%s) is authoritative. 799 SOA:MNAME_IS_CNAME: 800 args: 2 801 format: SOA MNAME %s points to a CNAME (%s). 802 SOA:RNAME_UNDELIVERABLE: 803 args: 3 804 format: Failed to deliver email for SOA RNAME of %s (%s) using %s. 805 descr: DNSCheck failed to deliver email to the email address listed as the one responsible for the zone. 806 SOA:RNAME_DELIVERABLE: 807 args: 3 808 format: Successful attempt to deliver email for SOA RNAME of %s (%s) using %s. 809 SOA:RNAME_SYNTAX: 810 args: 2 811 format: Invalid SOA RNAME syntax for %s: %s 812 descr: The email address specified in SOA RNAME is specified incorrectly. A common error is to use @ in the address field - an address like hostmaster@example.com must be specified as hostmaster.example.com. 813 SOA:TTL_SMALL: 814 args: 3 815 format: SOA TTL for %s too small (%s) - recommended >= %s. 816 descr: The smaller the SOA TTL value, the more often resolver need to requery for SOA record. 817 SOA:TTL_OK: 818 args: 3 819 format: SOA TTL for %s OK (%s) - recommended >= %s. 820 SOA:REFRESH_SMALL: 821 args: 3 822 format: SOA refresh for %s too small (%s) - recommended >= %s. 823 descr: SOA refresh decides how often a secondary name server should check the primary name server for zone updates. 824 SOA:REFRESH_OK: 825 args: 3 826 format: SOA refresh for %s OK (%s) - recommended >= %s. 827 SOA:RETRY_VS_REFRESH: 828 args: 3 829 format: SOA refresh for %s lower than retry (%s vs %s). 830 descr: The retry value is the amount of time your secondary name servers will wait to contact the primary name server again if the last attempt failed. If the refresh value is lower than the retry value, it's useless. 831 SOA:RETRY_SMALL: 832 args: 3 833 format: SOA retry for %s too small (%s) - recommended >= %s. 834 descr: The retry value is the amount of time your secondary name servers will wait to contact the primary name server again if the last attempt failed. If the retry value is too small, the secondary name server will retry too frequently. 835 SOA:RETRY_OK: 836 args: 3 837 format: SOA retry for %s OK (%s) - recommended >= %s. 838 SOA:EXPIRE_SMALL: 839 args: 3 840 format: SOA expire for %s too small (%s) - recommended >= %s. 841 descr: The SOA expire value defines how long a secondary name server will wait before considering DNS data for a zone to be too old to serve in case it failed to reach the primary name server. 842 SOA:EXPIRE_OK: 843 args: 3 844 format: SOA expire for %s OK (%s) - recommended >= %s. 845 SOA:EXPIRE_VS_REFRESH: 846 args: 1 847 format: SOA expire for %s lower than refresh. 848 descr: The SOA expire value should be at least 7 times the SOA refresh value, to give secondary name servers a fair chance of refreshing their copy of the zone before the data is considered too old to serve. 849 SOA:MINIMUM_SMALL: 850 args: 3 851 format: SOA minimum for %s too small (%s) - recommended >= %s. 852 descr: The SOA minimum is used to tell caching resolvers how long they may cache negative answers. If the value is too small, negative caching will not work and resolvers will re-query frequently. 853 SOA:MINIMUM_LARGE: 854 args: 3 855 format: SOA minimum for %s too large (%s) - recommended <= %s. 856 descr: The SOA minimum is used to tell caching resolvers how long they may cache negative answers. If the value is too large, negative caching will be to aggressive. 857 SOA:MINIMUM_OK: 858 args: 4 859 format: SOA minimum for %s OK (%s) - recommended between %s and %s. 860 SOA:SKIPPED_IPV4: 861 args: 1 862 format: IPv4 disabled - will not query SOA MNAME at %s 863 SOA:SKIPPED_IPV6: 864 args: 1 865 format: IPv6 disabled - will not query SOA MNAME at %s 866 SOA:SERIAL_IS_ZERO: 867 args: 1 868 format: The serial number in the SOA record for zone %s should not be zero. 869 SOA:END: 870 args: 1 871 format: Done testing SOA parameters for %s. 872 873 ZONE:BEGIN: 874 args: 2 875 format: Begin testing zone %s with version %s. 876 ZONE:VERSIONS: 877 args: 1 878 format: Module versions: %s. 879 ZONE:FATAL_DELEGATION: 880 args: 1 881 format: Fatal error in delegation for zone %s. 882 descr: No name servers found at child or at parent. No further testing can be performed. 883 ZONE:FATAL_NO_CHILD_NS: 884 args: 1 885 format: Fatal error - no child name servers for zone %s. 886 descr: No child name servers found. No further testing can be performed. 887 ZONE:END: 888 args: 1 889 format: Test completed for zone %s. 890 NSTIME:AVERAGE: 891 args: 6 892 format: Server %s: %s calls, %sms avg, %sms min, %sms max, %sms stddev. 893 894