[dns-operations] good one was Re: DNSSEC impact ...

Edward Lewis Ed.Lewis at neustar.biz
Wed May 28 15:11:58 UTC 2008


At 6:47 -0700 5/28/08, Wes Hardaker wrote:
>  On Wed, 28 May 2008 09:03:53 +1000, Mark Andrews <Mark_Andrews at isc.org> said:
>
>MA> So far I've been able to pin point 100% of DNSSEC operational
>MA> failures with "DiG" and "date".
>
>But can your grandmother?

I was going to remark with the more droll "Mark you use three tools, 
dig, date and a brain that understands DNSSEC."

But Wes' answer is better.  A "good one" to (West) Wes.

Let's not forget the value of being a really knowledgeable person 
when it comes to figuring out what is needed to operate something. 
(Or having access to robust hardware/software.)

This is not unique to DNSSEC.
-- 
-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-
Edward Lewis                                                +1-571-434-5468
NeuStar

Never confuse activity with progress.  Activity pays more.



More information about the dns-operations mailing list