On 8/20/24 13:46, pmev...@godaddy.com wrote:
> [SAH] This is something you're maintaining, Andy? How did you manage
to find them all?
The genesis of it is explained at
https://blog.rcode3.com/blog/a-guide-to-rdap/
The referenced paper at
https://pam2024.cs.northwestern.edu/pdfs/paper-89.pdf
does list various clients.
To answer Scott's question, yes. Some of the original information came
from the academic papers listed in the "other documents" section but
also from Gavin Brown's Stealth RDAP presentation. Also, searching
GitHub and the various language repositories such as crates.io, PyPi,
etc... Googling often got me "Residential Drug Abuse Program". :)
Some of the proprietary ones built into intrusion detection systems,
SEIMs, and other network intelligence systems are harder to identify but
references to them in forums do pop up in some places.
-andy
_______________________________________________
regext mailing list -- regext@ietf.org
To unsubscribe send an email to regext-le...@ietf.org