[dns-operations] root? we don't need no stinkin' root!
Rubens Kuhl
rubensk at nic.br
Sat Nov 30 01:32:04 UTC 2019
>>
>> The data could have monetary value. Passwords that are otherwise
>> difficult to come by might be leaking.
>
> Hi Florian,
>
> I can assure you that Verisign does not monetize the root server data. If
> any other operators do, I'm not aware of it.
>
> We do utilize root server data for research purposes from time-to-time.
> Recent examples include the KSK rollover and name collisions. Less recent
> examples include understanding TTL/caching behavior and preparing for the
> root ZSK size increase. When DDoS attacks happen, we often analyze the
> data to see if we can understand how and why it happened, and to be better
> prepared for the next one.
Note that the two paragraphs above contradict each other. The current RZM is known to use root server data as anti-competitive measures against new TLD operators with the label of name collision studies, including making studies that other parties can't reproduce due to being limited to DITL data.
Rubens
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <https://lists.dns-oarc.net/pipermail/dns-operations/attachments/20191129/c3409fc7/attachment.html>
More information about the dns-operations
mailing list