This archive is retained to ensure existing URLs remain functional. It will not contain any emails sent to this mailing list after July 1, 2024. For all messages, including those sent before and after this date, please visit the new location of the archive at https://mailman.ripe.net/archives/list/dns-wg@ripe.net/
[dns-wg] "DNS Vulnerabilities" paper hits the mainstream
- Previous message (by thread): [dns-wg] "DNS Vulnerabilities" paper hits the mainstream
- Next message (by thread): [dns-wg] Re: [dns-operations] "DNS Vulnerabilities" paper hits the mainstream
Messages sorted by: [ date ] [ thread ] [ subject ] [ author ]
Sander Steffann
s.steffann at computel.nl
Sun Apr 30 21:17:01 CEST 2006
Hi, On Apr 30, 2006, at 19:25, Jim Reid wrote: > On Apr 30, 2006, at 19:25, Sander Steffann wrote: > [...] > >> People might get scared :) It is good that attention is given to the >> risks of badly secured DNS servers, but scaring the public like this... > > Indeed. Though personally speaking, I don't accept Sirer's methodolody > let alone his concluions about "vulnerabilities" or badly secured name > servers. Which doesn't for a moment mean the DNS has no vulnerablities or > badly secured servers. These do of course exist. Just not in the way Emil > Gun Sirer has suggested. I completely agree. I already mentioned it to some people at RIPE-52, but I forgot to mention it here. It's also on slashdot: [Perils of DNS at RIPE-52] http://it.slashdot.org/article.pl?sid=06/04/26/1247240 - Sander
- Previous message (by thread): [dns-wg] "DNS Vulnerabilities" paper hits the mainstream
- Next message (by thread): [dns-wg] Re: [dns-operations] "DNS Vulnerabilities" paper hits the mainstream
Messages sorted by: [ date ] [ thread ] [ subject ] [ author ]
[ dns-wg Archives ]