On 8/20/24 13:46, pmev...@godaddy.com wrote:

> [SAH] This is something you're maintaining, Andy? How did you manage to find them all?

The genesis of it is explained at

https://blog.rcode3.com/blog/a-guide-to-rdap/

The referenced paper at https://pam2024.cs.northwestern.edu/pdfs/paper-89.pdf

does list various clients.



To answer Scott's question, yes. Some of the original information came from the academic papers listed in the "other documents" section but also from Gavin Brown's Stealth RDAP presentation. Also, searching GitHub and the various language repositories such as crates.io, PyPi, etc... Googling often got me "Residential Drug Abuse Program". :)

Some of the proprietary ones built into intrusion detection systems, SEIMs, and other network intelligence systems are harder to identify but references to them in forums do pop up in some places.

-andy

_______________________________________________
regext mailing list -- regext@ietf.org
To unsubscribe send an email to regext-le...@ietf.org

Reply via email to