nanog mailing list archives
Re: Multiple DNS implementations vulnerable to cache poisoning
From: David Conrad <drc () virtualized org>
Date: Thu, 10 Jul 2008 10:27:39 -0700
On Jul 10, 2008, at 2:59 AM, Joao Damas wrote:
PS: I would also want a copy of, or a secure method to access, the public part of the keys you use to sign those ccTLDs so I can place them in ISC's DLV registry
IANA's 'interim trust anchor repository' will be publicly accessible (of course).
Regards, -drc
Current thread:
- Re: Multiple DNS implementations vulnerable to cache poisoning, (continued)
- Re: Multiple DNS implementations vulnerable to cache poisoning Christopher Morrow (Jul 09)
- Re: Multiple DNS implementations vulnerable to cache poisoning David Conrad (Jul 10)
- RE: Multiple DNS implementations vulnerable to cache poisoning Martin Hannigan (Jul 10)
- Message not available
- Re: Multiple DNS implementations vulnerable to cache poisoning Christopher Morrow (Jul 10)
- Re: Multiple DNS implementations vulnerable to cache poisoning David Conrad (Jul 10)
- Re: Multiple DNS implementations vulnerable to cache poisoning Jay R. Ashworth (Jul 10)
- Re: Multiple DNS implementations vulnerable to cache poisoning Michael Sinatra (Jul 10)
- RE: Multiple DNS implementations vulnerable to cache poisoning Andrews Carl 455 (Jul 10)
- Re: Multiple DNS implementations vulnerable to cache poisoning Russ Mundy (Jul 10)
- Re: Multiple DNS implementations vulnerable to cache poisoning Joao Damas (Jul 10)
- Message not available
- Re: Multiple DNS implementations vulnerable to cache poisoning David Conrad (Jul 10)
- Re: Multiple DNS implementations vulnerable to cache poisoning Jay R. Ashworth (Jul 09)
- Re: Multiple DNS implementations vulnerable to cache poisoning Patrick W. Gilmore (Jul 09)
- RE: Multiple DNS implementations vulnerable to cache poisoning Eric Davis (Jul 09)
- Re: Multiple DNS implementations vulnerable to cache poisoning Phil Regnauld (Jul 10)