It is part of the spec (RFC1035 section 2.3.1. "Preferred name syntax")
Show quoted text> The labels must follow the rules for ARPANET host names. They must
> start with a letter, end with a letter or digit, and have as interior
> characters only letters, digits, and hyphen. There are also some
> restrictions on the length. Labels must be 63 characters or less.
I will change the croak-message to refer to this part of the spec.
If a label is longer than 63 characters you are not dealing with a
domain name..
Cheers...
--Olaf
On Mar 21, 2006, at 8:11 AM, Guest via RT wrote:
Show quoted text>
> Tue Mar 21 09:11:13 2006: Request 18268 was acted upon.
> Transaction: Ticket created by guest
> Queue: Net-DNS
> Subject: Net::DNS::Packet::dn_comp() croak on name > 63 chars
> Owner: Nobody
> Requestors: jamie@mccarthy.vg
> Status: new
> Ticket <URL:
http://rt.cpan.org/Ticket/Display.html?id=18268 >
>
>
> Net::DNS::Packet::dn_comp() chokes on a name of over 63 octets.
> Line 714 of Packet.pm:
>
> croak "length of $first is larger than 63 octets" if $length>63;
>
> Unless it's a violation of the relevant spec, the algorithm needs
> to do *something* with this
> data. If it is a violation of spec, a code comment with a reference
> to that would be
> appreciated (and even so, croaking is probably less than optimal).
>
> I bring this up because my server uses SpamAssassin, so my log
> files are full of e.g.
>
> Mar 21 05:28:59 localhost spamd[4571]: spf: lookup failed: length of
> hyper_luckylady8754158754_lookserver772_serebusystem03_heavensgift55 i
> s larger than
> 63 octets at /usr/lib/perl5/Net/DNS/Question.pm line 179
>
> If SpamAssassin needs to check its data more carefully before
> calling Net::DNS::Packet, let
> me know and I'll let them know.
>
> If this is a duplicate bug report, I apologize.
------------------------------------------------------
Ik dacht net... heel even maar.