[dns-operations] resolvers considered harmful
Paul Vixie
paul at redbarn.org
Wed Oct 22 17:59:43 UTC 2014
> Frank Sweetser <mailto:fs at wpi.edu>
> Wednesday, October 22, 2014 10:20 AM
>
> We make pretty heavy use of RPZ to block outbound malware traffic,
> especially to prevent people from inadvertently browsing malicious web
> sites. I don't have the data myself, but I do know that our Infosec
> people saw a drop in infection rate when we put it in. I'd hate to
> lose that mechanism completely.
+1.
and as to rpz, if you can publish your use case and results, we'd love
to link to it from http://dnsrpz.info/. as near as i can tell, rpz is
useful and popular, but mostly occurs in submarine mode where nobody
knows it's happening. so, more published results would be grand.
--
Paul Vixie
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <https://lists.dns-oarc.net/pipermail/dns-operations/attachments/20141022/5e572361/attachment.html>
-------------- next part --------------
A non-text attachment was scrubbed...
Name: compose-unknown-contact.jpg
Type: image/jpeg
Size: 770 bytes
Desc: not available
URL: <https://lists.dns-oarc.net/pipermail/dns-operations/attachments/20141022/5e572361/attachment.jpg>
More information about the dns-operations
mailing list