nanog mailing list archives

RE: Level(3) DNS Spoofing All Domains


From: "Marshall, Quincy" <Quincy.Marshall () reged com>
Date: Tue, 19 Nov 2019 18:18:02 +0000

On Tuesday, November 19, 2019 12:49 PM, Mike Bolitho <mikebolitho () gmail com> said…
“This is was my thought as well. People always get up in arms about how it's "Public DNS!" but it's really not. It's 
just well known and used because it's easy to remember”

I am not against their “securing” their hosts. It costs them money to provide the service. I disagree with what they 
did - Disable the service or only allow local or on-net resolution. How many of (my) clients have miss-typed something 
and sent their data, unknowingly, to a 3rd party host? (Who’s fault would that be?)

That said I AM a L(3) customer. These IPs were provided when the circuit was provisioned for NS resolution. Admittedly, 
they has indicated, this morning, that we are using the “wrong” Anycast NS and provided a different set; which 
functioned the same as  the “Public” ones.
Lawrence Q. Marshall
---------------------------------------------------------------------------------------
 This email has been scanned for email related threats and delivered safely by Mimecast.
 For more information please visit http://www.mimecast.com
---------------------------------------------------------------------------------------

Current thread: