[dns-operations] FireEye reports long-running DNS hijacking campaign

Matthew Pounsett matt at conundrum.com
Sat Jan 12 19:16:53 UTC 2019


On Sat, 12 Jan 2019 at 13:34, Bill Woodcock <woody at pch.net> wrote:

>
> The unavailability of those two things (client DNSSEC validation and DANE)
> on end systems was, ultimately, why these attacks succeeded, and Apple
> Product Security has been very responsive, now that they’ve seen it in
> action.
>

Do you know what that response is?  Any chance we're expecting to see DANE
adoption in Apple products sometime soon?
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <https://lists.dns-oarc.net/pipermail/dns-operations/attachments/20190112/c87fd432/attachment.html>


More information about the dns-operations mailing list