[dns-operations] FireEye reports long-running DNS hijacking campaign
Matthew Pounsett
matt at conundrum.com
Sat Jan 12 19:16:53 UTC 2019
On Sat, 12 Jan 2019 at 13:34, Bill Woodcock <woody at pch.net> wrote:
>
> The unavailability of those two things (client DNSSEC validation and DANE)
> on end systems was, ultimately, why these attacks succeeded, and Apple
> Product Security has been very responsive, now that they’ve seen it in
> action.
>
Do you know what that response is? Any chance we're expecting to see DANE
adoption in Apple products sometime soon?
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <https://lists.dns-oarc.net/pipermail/dns-operations/attachments/20190112/c87fd432/attachment.html>
More information about the dns-operations
mailing list