> On 29 May 2024, at 12:55 AM, John Levine <jo...@taugh.com> wrote:
> 
> It appears that Ond� ej Surý <ond...@sury.org> said:
>> I don’t know why are you trying to create rift where there’s really none.
> 
> I suspect that I am not the only person who is getting a wee bit tired
> of papers that say OMG MOST AWFUL DNS FLAW EVER! INTERNET WILL
> COLLAPSE! MUST CHANGE ALL RFCS! and the authors send out press
> releases, when in fact it should say "here's a DNS attack that was
> described a decade ago but isn't yet patched everywhere" or at most
> "here's yet another amplification attack you should defend against."
> 
> I realize it can be a challenge to get conference papers accepted but
> that's not our problem.


Yup - totally agree John. I tried to point out to the folk on the keytrap 
bandwagon that the
exploit was documented first some years ago, but was completely drowned out
by the hysterical fanfare of "we found a weakness in DNS behaviour! Aren't
we clever!"

I appreciate that testing widely used software for vulnerabilities is valuable 
work,
but turning the effort into some bizzarre circus sideshow does nobody any 
favours
at all.

Geoff

Attachment: smime.p7s
Description: S/MIME cryptographic signature

_______________________________________________
dns-operations mailing list
dns-operations@lists.dns-oarc.net
https://lists.dns-oarc.net/mailman/listinfo/dns-operations

Reply via email to