[dns-operations] Hall of DNS Shame (?)
David Conrad
drc at virtualized.org
Wed Jan 25 11:56:07 UTC 2017
Yes, it would have, at least for the root.
In all the discussions I had with various folks about signing the root within ICANN, there was no mention of DLV that I can recall (and I was somewhat sensitive to the topic).
What caused the root to be signed was the Kaminsky vulnerability.
I obviously can't speak for .COM.
Regards,
-drc
> On Jan 24, 2017, at 8:38 PM, Paul Vixie <vixie at tisf.net <mailto:vixie at tisf.net>> wrote:
>
> On Tuesday, January 24, 2017 5:11:25 PM PST Jim Reid wrote:
> > I suggest adding ISC to this hall of shame for implementing and deploying DLV. :-)
>
> if you think the root or .com would ever have been signed without the threat of dlv, then can i interest you in this fine bridge, which while you can't take it home with you, can be yours for the low low price of a nickel.
>
> no :-) here.
>
> --
> P. Vixie
> <.vcf.vcf>_______________________________________________
> dns-operations mailing list
> dns-operations at lists.dns-oarc.net <mailto:dns-operations at lists.dns-oarc.net>
> https://lists.dns-oarc.net/mailman/listinfo/dns-operations <https://lists.dns-oarc.net/mailman/listinfo/dns-operations>
> dns-operations mailing list
> https://lists.dns-oarc.net/mailman/listinfo/dns-operations <https://lists.dns-oarc.net/mailman/listinfo/dns-operations>
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <https://lists.dns-oarc.net/pipermail/dns-operations/attachments/20170125/837e7847/attachment.html>
-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 496 bytes
Desc: Message signed with OpenPGP using GPGMail
URL: <https://lists.dns-oarc.net/pipermail/dns-operations/attachments/20170125/837e7847/attachment.sig>
More information about the dns-operations
mailing list