1# $Id: en.yaml 884 2010-06-18 08:19:42Z calle $
2
3locale_name: English
4locale_id: en
5
6messages:
7
8 ENGINE:CRASH:
9  args: 0
10  format: DNSCheck engine crashed
11
12 ASN:LOOKUP:
13  args: 1
14  format: Looking up AS number for %s.
15 ASN:INVALID_ADDRESS:
16  args: 1
17  format: %s is an invalid IP address.
18 ASN:ANNOUNCE_BY:
19  args: 2
20  format: %s announced by AS %s.
21 ASN:NOT_ANNOUNCE:
22  args: 1
23  format: %s not announced.
24 ASN:LOOKUP_ERROR:
25  args: 1
26  format: Error looking up AS number for %s.
27
28 DNS:QUERY_EXPLICIT:
29  args: 4
30  format: Query %s for %s/%s/%s.
31  descr: ~
32 DNS:QUERY_RESOLVER:
33  args: 3
34  format: DNS query for %s/%s/%s.
35 DNS:RESOLVER_QUERY_TIMEOUT:
36  args: 3
37  format: DNS resolver timed out in query for %s/%s/%s.
38  descr: ~
39 DNS:QUERY_PARENT:
40  args: 4
41  format: Query parent of %s for %s/%s/%s.
42 DNS:FAKE_PACKET:
43    args: 3
44    format: Faking response packet in zone %s for %s/%s.
45 DNS:QUERY_PARENT_NOCACHE:
46  args: 4
47  format: Query parent (without cache) of %s for %s/%s/%s.
48 DNS:FIND_PARENT:
49  args: 2
50  format: Find parent of %s/%s.
51 DNS:NO_PARENT:
52  args: 2
53  format: Failed to find parent of %s/%s.
54  descr: DNSCheck failed to find the parent of zone.
55 DNS:PARENT_OF:
56  args: 3
57  format: Found %s as parent of %s/%s.
58 DNS:EXPLICIT_RESPONSE:
59  args: 1
60  format: Name server response: %s
61 DNS:PARENT_RESPONSE:
62  args: 1
63  format: DNS response from parent: %s
64 DNS:CHILD_RESPONSE:
65  args: 1
66  format: DNS response from child: %s
67 DNS:RESOLVER_RESPONSE:
68  args: 1
69  format: DNS response from resolver: %s
70 DNS:NO_PARENT_NS:
71  args: 3
72  format: Failed to find name servers for %s (parent of %s/%s).
73  descr: ~
74 DNS:QUERY_TIMEOUT:
75  args: 4
76  format: Name server %s timed out in query for %s/%s/%s.
77  descr: ~
78 DNS:QUERY_CHILD:
79  args: 4
80  format: Query any name server of %s for %s/%s/%s.
81 DNS:QUERY_CHILD_NOCACHE:
82  args: 4
83  format: Query any name server (without cache) of %s for %s/%s/%s.
84 DNS:NO_CHILD_NS:
85  args: 2
86  format: Failed to find name servers of %s/%s.
87  descr: ~
88 DNS:ADDRESS_BLACKLIST_ADD:
89  args: 4
90  format: Adding name server %s to blacklist.
91 DNS:ADDRESS_BLACKLISTED:
92  args: 4
93  format: Name server %s blacklisted.
94 DNS:LOOKUP_ERROR:
95  args: 1
96  format: DNS lookup error (%s).
97  descr: ~
98 DNS:NO_EDNS:
99  args: 1
100  format: EDNS not supported by %s.
101  descr: EDNS is an extension to the DNS protocol. The major change is that the 512 byte size limit of the query/answer packet has been removed, which allows more information to be provided.  EDNS is essential for newer protocols and technologies that requires larger packet size like DNSSEC and IPv6.
102 DNS:NO_ANSWER:
103  args: 4
104  format: No answer received from %s when querying for %s/%s/%s.
105  descr: ~
106 DNS:NOT_AUTH:
107  args: 4
108  format: Name server %s not authoritative for %s/%s/%s.
109 DNS:SOA_SERVFAIL:
110  args: 1
111  format: DNS SERVFAIL when querying %s for SOA
112 DNS:ANSWER_DUMP:
113  args: 1
114  format: DNS query returned: %s
115 DNS:SETUP_RESOLVER:
116  args: 0
117  format: DNS resolver set up.
118 DNS:SET_BUFSIZE:
119  args: 1
120  format: DNS resolver EDNS buffer size set to %s.
121 DNS:TRANSPORT_TCP:
122  args: 0
123  format: DNS resolver transport set to TCP.
124 DNS:TRANSPORT_UDP:
125  args: 0
126  format: DNS resolver transport set to UDP.
127 DNS:RECURSION_DESIRED:
128  args: 0
129  format: DNS resolver recursion desired.
130 DNS:RECURSION_DISABLED:
131  args: 0
132  format: DNS resolver recursion disabled.
133 DNS:DNSSEC_DESIRED:
134  args: 0
135  format: DNS resolver DNSSEC desired.
136 DNS:DNSSEC_DISABLED:
137  args: 0
138  format: DNS resolver DNSSEC disabled.
139 DNS:GET_NS_AT_PARENT:
140  args: 2
141  format: DNS query for NS of %s/%s at parent.
142 DNS:GET_NS_AT_CHILD:
143  args: 2
144  format: DNS query for NS of %s/%s at child.
145 DNS:INITIALIZING_NAMESERVERS:
146  args: 2
147  format: Initializing name servers for %s/%s.
148 DNS:NAMESERVERS_INITIALIZED:
149  args: 2
150  format: Name servers for %s/%s initialized.
151 DNS:NAMESERVER_FOUND:
152  args: 4
153  format: Found name server for %s/%s: %s (%s)
154 DNS:FIND_PARENT_BEGIN:
155  args: 2
156  format: Trying to find parent of %s/%s
157 DNS:NXDOMAIN:
158  args: 2
159  format: Domain %s/%s does not exist.
160  descr: ~
161 DNS:FIND_PARENT_DOMAIN:
162  args: 1
163  format: Using %s as a start for parent trace.
164 DNS:FIND_PARENT_TRY:
165  args: 1
166  format: Checking %s as parent domain.
167 DNS:FIND_PARENT_UPPER:
168  args: 1
169  format: Parent might be %s.
170 DNS:FIND_PARENT_RESULT:
171  args: 3
172  format: Resolved %s as parent of %s/%s.
173 DNS:FIND_MX_BEGIN:
174  args: 1
175  format: Lookup up mail exchanger for %s
176 DNS:FIND_MX_RESULT:
177  args: 2
178  format: Found mail exchanger for %s: %s
179 DNS:FIND_ADDRESSES:
180  args: 2
181  format: Found addresses of %s/%s
182 DNS:FIND_ADDRESSES_RESULT:
183  args: 3
184  format: Addresses for %s/%s: %s
185 DNS:UNQUERIBLE_ADDRESS:
186  args: 1
187  format: Unable to send queries to %s.
188
189 ADDRESS:BEGIN:
190  args: 1
191  format: Begin testing address %s.
192 ADDRESS:INVALID:
193  args: 1
194  format: Adress %s is invalid or incorrect
195  descr: ~
196 ADDRESS:PRIVATE_IPV4:
197  args: 1
198  format: %s is a private IPv4 address.
199  descr: A private IP address should normally not be exposed in the public DNS, since it's not reachable from the Internet.
200 ADDRESS:RESERVED_IPV4:
201  args: 1
202  format: %s is a reserved IPv4 address.
203  descr: Reserved IPv4 addresses should not be used on the public Internet.
204 ADDRESS:RESERVED_IPV6:
205  args: 1
206  format: %s is a reserved IPv6 address.
207  descr: Reserved IPv6 addresses should not be used on the public Internet.
208 ADDRESS:PTR_NOT_FOUND:
209  args: 2
210  format: Could not find reverse address for %s (%s).
211  descr: PTR record(s) for the address could not be found in the .arpa-zone. (ip6.arpa. for IPv6 addresses and in-addr.arpa. for IPv4).
212 ADDRESS:PTR_HOSTNAME_NOT_FOUND:
213  args: 2
214  format: Reverse for %s points to an unknown host name (%s).
215  descr: The PTR record for the address points to an unknown host name.
216 ADDRESS:END:
217  args: 1
218  format: Done testing address %s.
219
220 CONNECTIVITY:BEGIN:
221  args: 1
222  format: Begin testing connectivity for %s.
223 CONNECTIVITY:ANNOUNCED_BY_ASN:
224  args: 2
225  format: Name server %s announced by: %s
226  descr: The IP address is announced by an autonomous system (AS).
227 CONNECTIVITY:MULTIPLE_ASN:
228  args: 1
229  format: Name server %s announced by multiple AS.
230  descr: The name server is announced my more than one autonomous system (AS).
231 CONNECTIVITY:NOT_ANNOUNCED:
232  args: 1
233  format: Name server %s not announced by any AS.
234  descr: The IP address is not announced by any autonomous system and is most probably not reachable on the Internet.
235 CONNECTIVITY:ASN_LIST:
236  args: 1
237  format: Zone announced by IPv4 ASN: %s
238 CONNECTIVITY:TOO_FEW_ASN:
239  args: 1
240  format: Zone announced by less than two IPv4 ASN (%s).
241  descr: The zone's name servers are all located within the same, (or none), autonomous system.
242 CONNECTIVITY:ASN_COUNT_OK:
243  args: 1
244  format: Zone announced by more than one ASN (%s).
245  descr: The zone's name serves are located within more than one autonomous system.
246 CONNECTIVITY:V6_ANNOUNCED_BY_ASN:
247   args: 2
248   format: Name server %s announced over IPv6 by: %s
249   descr: The IP address is announced by an autonomous system (AS).
250 CONNECTIVITY:V6_MULTIPLE_ASN:
251   args: 1
252   format: Name server %s announced by multiple IPv6 AS.
253   descr: The name server is announced my more than one IPv6 autonomous system (AS).
254 CONNECTIVITY:V6_NOT_ANNOUNCED:
255   args: 1
256   format: Name server %s not announced by any IPv6 AS.
257   descr: The IP address is not announced by any autonomous system and is most probably not reachable on the Internet.
258 CONNECTIVITY:V6_ASN_LIST:
259   args: 1
260   format: Zone announced by IPv6 ASN: %s
261 CONNECTIVITY:V6_TOO_FEW_ASN:
262   args: 1
263   format: Zone announced by less than two IPv6 ASN (%s).
264   descr: The zone's name servers are all located within the same, (or none), autonomous system.
265 CONNECTIVITY:V6_ASN_COUNT_OK:
266   args: 1
267   format: Zone announced by more than one IPv6 ASN (%s).
268   descr: The zone's name serves are located within more than one autonomous system.
269 CONNECTIVITY:END:
270  args: 1
271  format: Done testing connectivity for %s.
272
273 DELEGATION:BEGIN:
274  args: 1
275  format: Begin testing delegation for %s.
276 DELEGATION:NS_AT_PARENT:
277  args: 1
278  format: Name servers listed at parent: %s
279  descr: This is the list of name servers that are listed at the parent. It should include all name servers listed at the child.
280 DELEGATION:NOT_FOUND_AT_PARENT:
281  args: 0
282  format: Delegation not found at parent.
283  descr: No delegation could be found at the parent, making your zone unreachable from the Internet.
284 DELEGATION:NS_AT_CHILD:
285  args: 1
286  format: Name servers listed at child: %s
287  descr: This is the list of name servers that are listed at the child . It must include all name servers listed at the parent.
288 DELEGATION:NOT_FOUND_AT_CHILD:
289  args: 0
290  format: No name servers found at child.
291  descr: No name servers could be found at the child. This usually means that the child is not configured to answer queries about the zone.
292 DELEGATION:EXTRA_NS_PARENT:
293  args: 1
294  format: Superfluous name server listed at parent: %s
295  descr: A name server listed at the parent, but not at the child, was found. This is most likely an administrative error. You should update the parent to match the name servers at the child as soon as possible.
296 DELEGATION:EXTRA_NS_CHILD:
297  args: 1
298  format: Additional name server listed at child: %s
299  descr: A name server listed at the child, but not at the parent, was found. This is most likely a configuration error, but there are sometimes reasons for setting up a zone this way.
300 DELEGATION:TOO_FEW_NS:
301  args: 1
302  format: Too few name servers (%s).
303  descr: Only one name server was found for the zone. You should always have at least two name servers for a zone to be able to handle transient connectivity problems.
304 DELEGATION:TOO_FEW_NS_IPV4:
305  args: 1
306  format: Too few IPv4 name servers (%s).
307  descr: Only one IPv4 name server was found for the zone. You should always have at least two IPv4 name servers for a zone to be able to handle transient connectivity problems.
308 DELEGATION:TOO_FEW_NS_IPV6:
309  args: 1
310  format: Too few IPv6 name servers (%s).
311  descr: Only one IPv6 name server was found for the zone. You should always have at least two IPv6 name servers for a zone to be able to handle transient connectivity problems.
312 DELEGATION:NO_NS_IPV4:
313  args: 0
314  format: No IPv4 name servers found.
315 DELEGATION:NO_NS_IPV6:
316  args: 0
317  format: No IPv6 name servers found.
318 DELEGATION:NO_COMMON_NS_NAMES:
319  args: 2
320  format: Total parent/child glue mismatch.
321  descr: The parent lists name servers that the child doesnt know about, see details in advanced. This configuration could actually work but breaks very easily if one of these zones change slightly.
322 DELEGATION:MATCHING_GLUE:
323  args: 2
324  format: Checking glue for %s (%s).
325 DELEGATION:GLUE_SKIPPED:
326  args: 2
327  format: Skipped glue for %s (%s).
328 DELEGATION:GLUE_FOUND_AT_PARENT:
329  args: 3
330  format: Parent glue for %s found: %s (%s)
331  descr: The IP address of the name server was found at the parent.
332 DELEGATION:GLUE_FOUND_AT_CHILD:
333  args: 3
334  format: Child glue for %s found: %s (%s)
335  descr: The IP address of the name server was found at the child.
336 DELEGATION:INCONSISTENT_GLUE:
337  args: 1
338  format: Inconsistent glue for name server %s.
339  descr: The address of a name server differed from the child and the parent.  This is a configuration error and should be corrected as soon as possible.
340 DELEGATION:GLUE_MISSING_AT_CHILD:
341  args: 1
342  format: Missing glue at child: %s
343  descr: The IP address of the name servers was not found at the child. This is a configuration error and should be corrected as soon as possible.
344 DELEGATION:NS_HISTORY:
345  args: 2
346  format: Previously used name servers for %s: %s
347 DELEGATION:STILL_AUTH:
348  args: 3
349  format: Previously used name server %s (%s) is still authoritative for %s.
350  descr: A previously used name server is still answering authoritative for the zone.  This is probably due to old zone data still being served by a no longer used server.  To correct this problem, contact the administrator of the name server and have them remove the zone in their configuration.
351 DELEGATION:BROKEN_UNDELEGATED:
352     args: 1
353     format: Test for zone %s was marked as undelegated, but no working fake glue was provided.
354 DELEGATION:INZONE_NS_WITHOUT_GLUE:
355     args: 2
356     format: Nameserver %s is listed for zone %s without address information.
357 DELEGATION:END:
358  args: 1
359  format: Done testing delegation for %s.
360
361 DNSSEC:BEGIN:
362  args: 1
363  format: Begin testing DNSSEC for %s.
364 DNSSEC:CHECKING_DS_AT_PARENT:
365  args: 1
366  format: Checking DS records for %s at parent.
367 DNSSEC:DS_FOUND:
368  args: 1
369  format: Found DS record for %s at parent.
370  descr: A DS (delegation signer) RRset was found at the parent.  This indicates a secure delegation, i.e. the child must be signed.
371 DNSSEC:NO_DS_FOUND:
372  args: 1
373  format: Did not find DS record for %s at parent.
374  descr: A DS (delegation signer) RRset could not be found at the parent.  This indicates an insecure delegation, i.e. the child does not have to be signed.
375 DNSSEC:CHECKING_DNSKEY_AT_CHILD:
376  args: 1
377  format: Checking DNSKEY records for %s at child.
378 DNSSEC:DNSKEY_FOUND:
379  args: 1
380  format: Found DNSKEY record for %s at child.
381  descr: A DNSKEY RRset was found at the child, indicating that the child probably uses DNSSEC.
382 DNSSEC:DNSKEY_NOT_FOUND:
383  args: 1
384  format: Did not find DNSKEY record for %s at child.
385  descr: A DNSKEY RRset could not be found at the child, indicating that the child probably not uses DNSSEC.
386 DNSSEC:DETERMINE_SECURITY_STATUS:
387  args: 1
388  format: Determining security status for %s.
389 DNSSEC:INCONSISTENT_SECURITY:
390  args: 1
391  format: Inconsistent security for %s - DS found at parent, but no DNSKEY found at child.
392  descr: The parent has a secure delegation to the child (indicated by DS RRset at the parent), but the child has no DNSKEY.  This is probably due to a previously signed zone that became unsigned without requesting the parent to remove the secure delegation.
393 DNSSEC:CONSISTENT_SECURITY:
394  args: 1
395  format: Consistent security for %s.
396 DNSSEC:SKIPPED_NO_KEYS:
397  args: 1
398  format: No DNSKEY(s) found at child, other tests skipped.
399 DNSSEC:MISSING_DS:
400  args: 1
401  format: Broken chain of trust for %s - DNSKEY found at child, but no DS was found at parent.
402  descr: The child seems to use DNSSEC, but the parent has no secure delegation.  Because of this, the chain of trust between the parent and the child is broken and validating resolvers will not be able to validate answers from the child.
403 DNSSEC:CHECKING_CHILD:
404  args: 1
405  format: Checking DNSSEC at child (%s).
406 DNSSEC:DNSKEY_ALGORITHM_NOT_RECOMMENDED:
407  args: 3
408  format: DNSKEY %s (tag %s) is using a not recommended algorithm: %s
409  descr: A DNSKEY using a not recommended algorithm was found - you should consider stop using not recommended algorithms unless you have a very good reason for using them.
410 DNSSEC:DNSKEY_SKIP_PROTOCOL:
411  args: 3
412  format: DNSKEY %s (tag %s) is not a DNSSEC key (protocol=%s).
413  descr: DNSKEYs must have a protocol value of DNSSEC (3).
414 DNSSEC:DNSKEY_SKIP_TYPE:
415  args: 2
416  format: DNSKEY %s (tag %s) is not a zone key.
417  descr: DNSKEYs must be a zone key.
418 DNSSEC:DNSKEY_SEP:
419  args: 2
420  format: DNSKEY %s (tag %s) is marked as a secure entry point (SEP).
421  descr: A secure entry point (SEP) is used as part of the chain of trust from the parent to the child.
422 DNSSEC:DNSKEY_MANDATORY_FOUND:
423  args: 1
424  format: At least one mandatory algorithm found for DNSKEY %s.
425 DNSSEC:DNSKEY_MANDATORY_NOT_FOUND:
426  args: 1
427  format: No mandatory algorithm found for DNSKEY %s.
428  descr: At least one DNSKEY should be of type RSA/SHA1.
429 DNSSEC:ADDITIONAL_PROCESSING_BROKEN:
430  args: 2
431  format: DNSSEC additional processing broken for %s (server: %s).
432  descr: No DNSSEC signatures were included in replies from the name server.  This is probably due to a misconfiguration at the name server.
433 DNSSEC:NO_SIGNATURES:
434  args: 1
435  format: No signatures found for %s.
436  descr: No DNSSEC signatures was found when querying the zone. Perhaps the zone isn't signed?
437 DNSSEC:CHILD_CHECK_ABORTED:
438  args: 1
439  format: DNSSEC child checks aborted for %s.
440 DNSSEC:DNSKEY_SIGNATURE_OK:
441  args: 2
442  format: Found RRSIG(DNSKEY %s) created by published key (tag %s).
443 DNSSEC:DNSKEY_SIGNER_UNPUBLISHED:
444  args: 2
445  format: Found RRSIG(DNSKEY %s) created by unpublished key (tag %s).
446  descr: DNSSEC signatures created by unpublished keys can't be validated by validating resolvers.  All keys used to sign data must be published.
447 DNSSEC:DNSKEY_VALID_SIGNATURES:
448  args: 1
449  format: Enough valid signatures found for %s.
450 DNSSEC:DNSKEY_NO_VALID_SIGNATURES:
451  args: 1
452  format: Not enough valid signatures found for %s.
453  descr: No valid signatures for the DNSKEY RRset for the zone was found - make sure the zone is signed with a valid and published key.
454 DNSSEC:SOA_SIGNATURE_OK:
455  args: 2
456  format: RRSIG(SOA %s) created by DNSKEY (tag %s) OK.
457 DNSSEC:SOA_SIGNATURE_UNPUBLISHED:
458  args: 2
459  format: Found RRSIG(SOA %s) created by published key (tag %s).
460  descr: DNSSEC signatures created by unpublished keys can't be validated by validating resolvers.  All keys used to sign data must be published.
461 DNSSEC:SOA_VALID_SIGNATURES:
462  args: 1
463  format: Enough valid signatures over SOA RRset found for %s.
464 DNSSEC:SOA_NO_VALID_SIGNATURES:
465  args: 1
466  format: Not enough valid signatures over SOA RRset found for %s.
467  descr: No valid signatures for the SOA RRset for the zone was found - make sure the zone is signed with a valid and published key.
468 DNSSEC:CHILD_CHECKED:
469  args: 1
470  format: DNSSEC child checks for %s complete.
471 DNSSEC:CHECKING_PARENT:
472  args: 1
473  format: Checking DNSSEC at parent of %s.
474 DNSSEC:PARENT_DS:
475  args: 2
476  format: Found DS(%s) at parent: %s
477 DNSSEC:DS_KEYREF_OK:
478  args: 2
479  format: Parent DS(%s) refers to valid key at child: %s
480 DNSSEC:DS_KEYREF_INVALID:
481  args: 2
482  format: Parent DS(%s) refers to invalid key at child: %s
483  descr: The DS RRset must refer to a valid DNSKEY at the child, or the chain of trust between the parent and the child is broken and validating resolver will not be able to validate answers from the child.
484 DNSSEC:DS_TO_SEP:
485  args: 2
486  format: Parent DS(%s) refers to secure entry point (SEP) at child: %s
487 DNSSEC:DS_TO_NONSEP:
488  args: 2
489  format: Parent DS(%s) does not refer to secure entry point (SEP) at child: %s
490  descr: The DS RRset refers to a DNSKEY at the child, but the key is not marked as a secure entry point.
491 DNSSEC:DS_MANDATORY_FOUND:
492  args: 1
493  format: At least one mandatory DS algorithm found for %s.
494 DNSSEC:DS_MANDATORY_NOT_FOUND:
495  args: 1
496  format: No mandatory DS algorithm found for %s.
497  descr: Since none of the hash algorithms published in the DS RRset are mandatory, some validating resolvers will not be able to follow the chain of trust from the parent to the child.
498 DNSSEC:PARENT_CHECKED:
499  args: 1
500  format: DNSSEC parent checks for %s complete.
501 DNSSEC:RRSIG_NOT_YET_VALID:
502  args: 1
503  format: DNSSEC signature not yet valid: %s
504  descr: Not yet valid signatures will be ignored by validating resolvers.
505 DNSSEC:RRSIG_EXPIRED:
506  args: 1
507  format: DNSSEC signature expired: %s
508  descr: Expired signatures will be ignored by validating resolvers.
509 DNSSEC:RRSIG_VALID:
510  args: 1
511  format: DNSSEC signature valid: %s
512 DNSSEC:RRSIG_EXPIRES_AT:
513     args: 1
514     format: DNSSEC signature expires at: %s
515 DNSSEC:RRSIG_VERIFIES:
516     args: 1
517     format: DNSSEC signature %s matches records.
518 DNSSEC:RRSIG_FAILS_VERIFY:
519    args: 2
520    format: DNSSEC signature %s does not match the records it signs: %s
521 DNSSEC:EXTRA_PROCESSING:
522     args: 1
523     format: Nameserver %s does DNSSEC extra processing.
524 DNSSEC:NO_EXTRA_PROCESSING:
525    args: 1
526    format: Nameserver %s does not do DNSSEC extra processing.
527 DNSSEC:CONSISTENT_EXTRA_PROCESSING:
528     args: 1
529     format: Servers for %s have consistent extra processing status.
530 DNSSEC:INCONSISTENT_EXTRA_PROCESSING:
531     args: 1
532     format: Not all servers for %s has DNSSEC extra processing turned on.
533 DNSSEC:END:
534  args: 1
535  format: Done testing DNSSEC for %s.
536
537 HOST:BEGIN:
538  args: 1
539  format: Begin testing host %s.
540 HOST:ILLEGAL_NAME:
541  args: 2
542  format: Host name %s is illegal (syntax error at %s)
543  descr: The hostname is not syntactially correct according to RFC 952.  A common error is to begin the hostname with a non-letter (a-z) or use invalid characters (only a-z, 0-9 and - are allowed).
544 HOST:NOT_FOUND:
545  args: 1
546  format: No address found for %s.
547  descr: No IPv4 or IPv6 address was found for the host name.
548 HOST:CNAME_FOUND:
549  args: 1
550  format: Host name %s refers to a CNAME.
551  descr: The host name is an alias (CNAME), which is not allowed.  Host names must be published with an A or AAAA record.
552 HOST:END:
553  args: 1
554  format: Done testing host %s.
555
556 MAIL:BEGIN:
557  args: 1
558  format: Begin testing email address %s.
559 MAIL:ADDRESS_SYNTAX:
560  args: 1
561  format: %s is not a valid email address.
562 MAIL:MAIL_EXCHANGER:
563  args: 2
564  format: Mail exchangers for %s found %s.
565 MAIL:DOMAIN_NOT_FOUND:
566  args: 1
567  format: No mail exchanger found for domain %s.
568  descr: No mail exchanger was found for the domain.  This makes it impossible to deliver email to any recipient within the domain.
569 MAIL:HOST_ERROR:
570  args: 1
571  format: Invalid host name for mail exchanger %s.
572  descr: The hostname for the mail exchanger is invalid.  A common error is to point the mail exchanger to an alias (CNAME) or directly to an IP address.
573 MAIL:IPV6_ONLY:
574  args: 1
575  format: Mail exchanger %s is reachable by IPv6 only.
576  descr: This mail exchanger is only reachable via IPv6, making it impossible for most hosts on the Internet to deliver emails to it. If more than one MX exists and at least one is reachable by IPv4 this can be ignored.
577 MAIL:DELIVERY_IPV4_OK:
578     args: 1
579     format: Delivery over IPv4 to %s ok.
580 MAIL:DELIVERY_IPV6_OK:
581     args: 1
582     format: Delivery over IPv6 to %s ok.
583 MAIL:DELIVERY_IPV4_NOT_OK:
584     args: 1
585     format: Delivery over IPv4 to %s could not be done.
586 MAIL:DELIVERY_IPV6_NOT_OK:
587     args: 1
588     format: Delivery over IPv6 to %s could not be done.
589 MAIL:ALL_MX_IN_ZONE:
590     args: 2
591     format: All mail servers for %s are in zone %s.
592 MAIL:END:
593  args: 1
594  format: Done testing email address %s.
595
596 NAMESERVER:BEGIN:
597  args: 1
598  format: Begin testing name server %s.
599 NAMESERVER:HOST_ERROR:
600  args: 1
601  format: Host name or address error for %s.
602  descr: The specified host name is not a valid host name or the host name points to an invalid IP address, e.g. a private or reserved IP address.
603 NAMESERVER:CHECKING_RECURSION:
604  args: 2
605  format: Checking recursion for %s at address %s.
606 NAMESERVER:RECURSIVE:
607  args: 2
608  format: Name server %s (%s) is recursive.
609  descr: The name server answers recursive queries for 3rd parties (such as DNSCheck). By making a recursive query to a name server that provides recursion, an attacker can cause a name server to look up and cache information contained in zones under their control. Thus the victim name server is made to query the attackers malicious name servers, resulting in the victim caching and serving bogus data.
610 NAMESERVER:NOT_RECURSIVE:
611  args: 2
612  format: Name server %s (%s) is not recursive.
613 NAMESERVER:CHECKING_AUTH:
614  args: 2
615  format: Checking authority for %s (%s).
616 NAMESERVER:NOT_AUTH:
617  args: 3
618  format: Name server %s (%s) not authoritative for %s.
619  descr: The name server does not answer authoritatively to queries for the tested domain.  This is probably due to misconfiguration, usually the name server is not set up to serve the tested domain.
620 NAMESERVER:AUTH:
621  args: 3
622  format: Name server %s (%s) authoritative for %s.
623 NAMESERVER:TESTING_UDP:
624  args: 2
625  format: Testing UDP queries to name server %s at addrress %s.
626 NAMESERVER:UDP_OK:
627  args: 3
628  format: Name server %s (%s) answers queries over UDP.
629 NAMESERVER:NO_UDP:
630  args: 3
631  format: Name server %s (%s) does not answer queries over UDP.
632  descr: The name server failed to answer queries sent over UDP.  This is probably due to the name server not correctly set up or due to misconfigured filtering in a firewall.
633 NAMESERVER:TESTING_TCP:
634  args: 2
635  format: Testing TCP queries to name server %s at address %s.
636 NAMESERVER:TCP_OK:
637  args: 3
638  format: Name server %s (%s) answers queries over TCP.
639 NAMESERVER:NO_TCP:
640  args: 3
641  format: Name server %s (%s) does not answer queries over TCP.
642  descr: The name server failed to answer queries sent over TCP.  This is probably due to the name server not correctly set up or due to misconfgured filtering in a firewall. It is a rather common misconception that DNS does not need TCP unless they provide zone transfers - perhaps the name server administrator is not aware that TCP usually is a requirement.
643 NAMESERVER:TESTING_AXFR:
644  args: 2
645  format: Testing zone transfer for name server %s (%s).
646 NAMESERVER:AXFR_SKIP:
647  args: 3
648  format: Name server %s (%s) not checked for zone transfer of %s.
649  descr: The name server was not tested for zone transfer, since it did not answer queries over TCP.
650 NAMESERVER:AXFR_OPEN:
651  args: 3
652  format: Name server %s (%s) open for zone transfer of %s.
653  descr: This name server accepts zone transfer requests from any party.
654 NAMESERVER:AXFR_CLOSED:
655  args: 3
656  format: Name server %s (%s) closed for zone transfer of %s.
657 NAMESERVER:CHECKING_LEGACY_ID:
658  args: 2
659  format: Checking for legacy name server ID of %s (%s).
660 NAMESERVER:LEGACY_ID_SKIP:
661  args: 2
662  format: Name server %s (%s) not checked for legacy name server ID.
663 NAMESERVER:LEGACY_ID:
664  args: 4
665  format: Legacy name server ID for %s (%s): %s = %s
666 NAMESERVER:CHECKING_NSID:
667  args: 2
668  format: Checking for name server ID of %s (%s).
669 NAMESERVER:NSID_SKIP:
670  args: 2
671  format: Name server %s (%s) not checked for name server ID.
672 NAMESERVER:NSID:
673  args: 3
674  format: Name server ID for %s (%s): %s
675 NAMESERVER:SKIPPED_IPV4:
676  args: 1
677  format: IPv4 disabled - will not test name server at %s
678 NAMESERVER:SKIPPED_IPV6:
679  args: 1
680  format: IPv6 disabled - will not test name server at %s
681 NAMESERVER:END:
682  args: 1
683  format: Done testing name server %s.
684
685 CONSISTENCY:BEGIN:
686  args: 1
687  format: Begin testing zone consistency for %s.
688 CONSISTENCY:SOA_SERIAL_AT_ADDRESS:
689  args: 2
690  format: SOA at address %s has serial %s.
691 CONSISTENCY:SOA_SERIAL_DIFFERENT:
692  args: 1
693  format: %s different serials found.
694  descr: The SOA serial is not the same on all name servers. This is usually due to misconfiguration, but can sometimes be the result of slow zone propagation to secondary name servers.
695 CONSISTENCY:SOA_SERIAL_CONSISTENT:
696  args: 0
697  format: All SOA records have consistent serial numbers.
698 CONSISTENCY:SOA_DIGEST_AT_ADDRESS:
699  args: 2
700  format: SOA at address %s has digest %s.
701 CONSISTENCY:SOA_DIGEST_DIFFERENT:
702  args: 1
703  format: %s different SOA records found.
704  descr: The SOA record are not the same among all name servers. This is usually due to misconfiguration.
705 CONSISTENCY:SOA_DIGEST_CONSISTENT:
706  args: 0
707  format: All SOA records are consistent among all name servers.
708 CONSISTENCY:END:
709  args: 1
710  format: Done testing zone consistency for %s.
711
712 SMTP:BEGIN:
713  args: 3
714  format: Begin testing mail server %s (%s) with %s.
715 SMTP:CONNECT_FAILED:
716  args: 2
717  format: Failed to connect to %s (%s).
718  descr: DNSCheck failed to connect to the mail server.  The server could be down or unreachable due to misconfigured routing and/or filtering.
719 SMTP:BANNER:
720  args: 2
721  format: SMTP banner: %s
722 SMTP:HELLO_FAILED:
723  args: 1
724  format: SMTP HELO failed while talking to %s.
725  descr: The mail server did not accept our polite greeting.  This is probably due to misconfiguration.
726 SMTP:MAIL_FROM:
727  args: 1
728  format: Using %s as SMTP from (MAIL_FROM).
729 SMTP:RAW:
730  args: 1
731  format: SMTP Response: %s
732 SMTP:MAIL_FROM_REJECTED:
733  args: 1
734  format: Host did not accept %s as SMTP destination.
735  descr: The mail server did not accept our sender address.  DNSCheck uses a standard null sender address which must be accepted by mail servers.
736 SMTP:RCPT_TO:
737  args: 1
738  format: Using %s as SMTP recipient (RCPT_TO).
739 SMTP:RECIPIENT_REJECTED:
740  args: 1
741  format: Host did not accept %s as SMTP recipient.
742  descr: The mail server did no accept mail to the recipient address.  This is probably due to an unknown address.
743 SMTP:RSET:
744  args: 0
745  format: Sending SMTP reset (RSET).
746 SMTP:TIMEOUT:
747  args: 0
748  format: The mail server timed out in SMTP dialog.
749 SMTP:QUIT:
750  args: 0
751  format: Sending SMTP quit (QUIT).
752 SMTP:OK:
753  args: 3
754  format: SMTP testing of %s (%s) with %s succeeded without errors.
755 SMTP:END:
756  args: 3
757  format: Done testing mail server %s (%s) with %s.
758
759 SOA:BEGIN:
760  args: 1
761  format: Begin testing SOA parameters for %s.
762 SOA:NOT_FOUND:
763  args: 1
764  format: No SOA record found for %s.
765  descr: No SOA record was found when querying the name server.  This is most probably due to a misconfiguration at the name server - a zone must have a SOA record.
766 SOA:FOUND:
767  args: 1
768  format: Found SOA record for %s.
769 SOA:MULTIPLE_SOA:
770  args: 1
771  format: Multiple SOA records found for %s.
772  descr: Multiple SOA records found when querying the name servers. This is a serious error and definitely due to a misconfiguration.
773 SOA:MNAME_ERROR:
774  args: 2
775  format: Error while checking SOA MNAME for %s (%s).
776  descr: The SOA MNAME was not a valid host name.
777 SOA:MNAME_VALID:
778  args: 2
779  format: SOA MNAME for %s valid (%s).
780 SOA:NS_NOT_FOUND:
781  args: 1
782  format: No NS record(s) found for %s.
783  descr: No name server records was fould for the zone. This is a serious error and definitely due to a misconfiguration.
784 SOA:MNAME_STEALTH:
785  args: 2
786  format: SOA MNAME for %s (%s) not listed as NS.
787  descr: The name server listed as the SOA MNAME is not listed as a name server.
788 SOA:MNAME_PUBLIC:
789  args: 2
790  format: SOA MNAME for %s (%s) listed as NS.
791  descr: The name server listed as the SOA MNAME is listed as a name server.
792 SOA:MNAME_NOT_AUTH:
793  args: 2
794  format: SOA MNAME for %s (%s) is not authoritative.
795  descr: The name server listed as the original or primary source of data for this zone does not answer authoriative.  This is probably due to a misconfiguration - perhaps the SOA MNAME is not set up as name server for the zone.
796 SOA:MNAME_IS_AUTH:
797  args: 2
798  format: SOA MNAME for %s (%s) is authoritative.
799 SOA:MNAME_IS_CNAME:
800     args: 2
801     format: SOA MNAME %s points to a CNAME (%s).
802 SOA:RNAME_UNDELIVERABLE:
803  args: 3
804  format: Failed to deliver email for SOA RNAME of %s (%s) using %s.
805  descr: DNSCheck failed to deliver email to the email address listed as the one responsible for the zone.
806 SOA:RNAME_DELIVERABLE:
807  args: 3
808  format: Successful attempt to deliver email for SOA RNAME of %s (%s) using %s.
809 SOA:RNAME_SYNTAX:
810  args: 2
811  format: Invalid SOA RNAME syntax for %s: %s
812  descr: The email address specified in SOA RNAME is specified incorrectly.  A common error is to use @ in the address field - an address like hostmaster@example.com must be specified as hostmaster.example.com.
813 SOA:TTL_SMALL:
814  args: 3
815  format: SOA TTL for %s too small (%s) - recommended >= %s.
816  descr: The smaller the SOA TTL value, the more often resolver need to requery for SOA record.
817 SOA:TTL_OK:
818  args: 3
819  format: SOA TTL for %s OK (%s) - recommended >= %s.
820 SOA:REFRESH_SMALL:
821  args: 3
822  format: SOA refresh for %s too small (%s) - recommended >= %s.
823  descr: SOA refresh decides how often a secondary name server should check the primary name server for zone updates.
824 SOA:REFRESH_OK:
825  args: 3
826  format: SOA refresh for %s OK (%s) - recommended >= %s.
827 SOA:RETRY_VS_REFRESH:
828  args: 3
829  format: SOA refresh for %s lower than retry (%s vs %s).
830  descr: The retry value is the amount of time your secondary name servers will wait to contact the primary name server again if the last attempt failed.  If the refresh value is lower than the retry value, it's useless.
831 SOA:RETRY_SMALL:
832  args: 3
833  format: SOA retry for %s too small (%s) - recommended >= %s.
834  descr: The retry value is the amount of time your secondary name servers will wait to contact the primary name server again if the last attempt failed. If the retry value is too small, the secondary name server will retry too frequently.
835 SOA:RETRY_OK:
836  args: 3
837  format: SOA retry for %s OK (%s) - recommended >= %s.
838 SOA:EXPIRE_SMALL:
839  args: 3
840  format: SOA expire for %s too small (%s) - recommended >= %s.
841  descr: The SOA expire value defines how long a secondary name server will wait before considering DNS data for a zone to be too old to serve in case it failed to reach the primary name server.
842 SOA:EXPIRE_OK:
843  args: 3
844  format: SOA expire for %s OK (%s) - recommended >= %s.
845 SOA:EXPIRE_VS_REFRESH:
846  args: 1
847  format: SOA expire for %s lower than refresh.
848  descr: The SOA expire value should be at least 7 times the SOA refresh value, to give secondary name servers a fair chance of refreshing their copy of the zone before the data is considered too old to serve.
849 SOA:MINIMUM_SMALL:
850  args: 3
851  format: SOA minimum for %s too small (%s) - recommended >= %s.
852  descr: The SOA minimum is used to tell caching resolvers how long they may cache negative answers. If the value is too small, negative caching will not work and resolvers will re-query frequently.
853 SOA:MINIMUM_LARGE:
854  args: 3
855  format: SOA minimum for %s too large (%s) - recommended <= %s.
856  descr: The SOA minimum is used to tell caching resolvers how long they may cache negative answers. If the value is too large, negative caching will be to aggressive.
857 SOA:MINIMUM_OK:
858  args: 4
859  format: SOA minimum for %s OK (%s) - recommended between %s and %s.
860 SOA:SKIPPED_IPV4:
861  args: 1
862  format: IPv4 disabled - will not query SOA MNAME at %s
863 SOA:SKIPPED_IPV6:
864  args: 1
865  format: IPv6 disabled - will not query SOA MNAME at %s
866 SOA:SERIAL_IS_ZERO:
867     args: 1
868     format: The serial number in the SOA record for zone %s should not be zero.
869 SOA:END:
870  args: 1
871  format: Done testing SOA parameters for %s.
872
873 ZONE:BEGIN:
874  args: 2
875  format: Begin testing zone %s with version %s.
876 ZONE:VERSIONS:
877     args: 1
878     format: Module versions: %s.
879 ZONE:FATAL_DELEGATION:
880  args: 1
881  format: Fatal error in delegation for zone %s.
882  descr: No name servers found at child or at parent. No further testing can be performed.
883 ZONE:FATAL_NO_CHILD_NS:
884  args: 1
885  format: Fatal error - no child name servers for zone %s.
886  descr: No child name servers found. No further testing can be performed.
887 ZONE:END:
888  args: 1
889  format: Test completed for zone %s.
890 NSTIME:AVERAGE:
891    args: 6
892    format: Server %s: %s calls, %sms avg, %sms min, %sms max, %sms stddev.
893
894