On 2021-07-27 2:09 a.m., Kerin Millar wrote:
Let us begin with `tcpdump -n -s0 -X udp port 53`. Here is the payload
of an offending query, including the encapsulating IPv4 header.
0x0000: 4528 003a bb51 0000 f211 3319 4bad 43f9 E(.:.Q....3.K.C.
0x0010: c422 8657 0035 0035 0026 0000 0001 0100 .".W.5.5.&......
0x0020: 0001 0000 0000 0000 0870 697a 7a61 7365 .........pizzase
0x0030: 6f03 636f 6d00 002e 0001 o.com....
Thanks a lot for your very informative reply. Sorry for the delay in
responding. With your help I got it to work. Thanks very much!