Skip to content

Commit 0889fc1

Browse files
Merge pull request #1824 from wttw/rfc2136
Fix wording in rfc2136 documentation on rate limits
2 parents 50dc6e1 + 11589bd commit 0889fc1

File tree

1 file changed

+3
-3
lines changed

1 file changed

+3
-3
lines changed

content/docs/configuration/acme/dns01/rfc2136.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -161,11 +161,11 @@ Note how the `tsig-secret` and `tsig-secret-key` match the configuration in the
161161

162162
## Rate Limits
163163

164-
The `rfc2136` provider waits until *all* nameservers to in your domain's SOA RR
164+
The `rfc2136` provider waits until *all* nameservers authoritative for your domain
165165
respond with the same result before it contacts Let's Encrypt to complete the
166166
challenge process. This is because the challenge server contacts a
167167
non-authoritative DNS server that does a recursive query (a query for records it
168-
does not maintain locally). If the servers in the SOA do not contain the correct
168+
does not maintain locally). If not all the authoritative servers contain the correct
169169
values, it's likely that the non-authoritative server will have bad information
170170
as well, causing the request to go against rate limits and eventually locking
171171
the process out.
@@ -204,4 +204,4 @@ requested, the provider will begin processing the request.
204204
- Compared to the other providers that often use REST APIs to modify DNS RRs,
205205
this provider can take a little longer. You can `watch kubectl certificate
206206
yourcert` to get a display of what's going on. It's not uncommon for the process
207-
to take five minutes in total.
207+
to take five minutes in total.

0 commit comments

Comments
 (0)