[dns-operations] good one was Re: DNSSEC impact ...
Edward Lewis
Ed.Lewis at neustar.biz
Wed May 28 15:11:58 UTC 2008
At 6:47 -0700 5/28/08, Wes Hardaker wrote:
> On Wed, 28 May 2008 09:03:53 +1000, Mark Andrews <Mark_Andrews at isc.org> said:
>
>MA> So far I've been able to pin point 100% of DNSSEC operational
>MA> failures with "DiG" and "date".
>
>But can your grandmother?
I was going to remark with the more droll "Mark you use three tools,
dig, date and a brain that understands DNSSEC."
But Wes' answer is better. A "good one" to (West) Wes.
Let's not forget the value of being a really knowledgeable person
when it comes to figuring out what is needed to operate something.
(Or having access to robust hardware/software.)
This is not unique to DNSSEC.
--
-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-
Edward Lewis +1-571-434-5468
NeuStar
Never confuse activity with progress. Activity pays more.
More information about the dns-operations
mailing list