On Thu, Mar 29, 2018 at 08:29:57AM -0700,
Bill Woodcock wrote
a message of 53 lines which said:
> there are ISPs who are internally capturing 8.8.8.8, and who try to
> do the same with 9.9.9.9. Which is why it’s so important to do
> cryptographic validation of the server and encryption of the
Hi,
I would like to bring attention to the following IETF draft:
https://tools.ietf.org/html/draft-ietf-tsvwg-le-phb-04
I believe this is well under way through the IETF process, and if someone
has strong opinions on it they should speak up. I am one of the
proponents, as I posted to this li
Dear Mikael,
On Fri, Mar 30, 2018 at 12:27:52PM +0200, Mikael Abrahamsson wrote:
> I would like to bring attention to the following IETF draft:
>
> https://tools.ietf.org/html/draft-ietf-tsvwg-le-phb-04
>
> I believe this is well under way through the IETF process, and if someone
> has strong op
On Thu, Mar 29, 2018 at 10:32 AM, Stephane Bortzmeyer
wrote:
>
> Public DNS resolvers still help against "ordinary" adversaries. (If
> your ennemy is the NSA, you have other problems, anyway.)
>
I think there's ample evidence that everyone's enemy is 'the nsa' (or other
nation-state-actors) isn'
On Fri, Mar 30, 2018 at 5:30 AM, Christopher Morrow
wrote:
>
> On Thu, Mar 29, 2018 at 10:32 AM, Stephane Bortzmeyer
> wrote:
>
> > Public DNS resolvers still help against "ordinary" adversaries. (If
> > your ennemy is the NSA, you have other problems, anyway.)
If you're individually targeted by
And FWIW, there are currently a few other other same-quad open resolvers:
# IP - desc | CIDR | recursion-yes
1.1.1.1 - APNIC-LABS - Research prefix for APNIC Labs (now Cloudflare
distributed public recursive DNS) | 1/8 | recursion-yes
8.8.8.8 - Google LLC (public recursive DNS) | 8.8.8/24 | recurs
On Fri, Mar 30, 2018 at 06:46:19AM -0800,
Royce Williams wrote
a message of 19 lines which said:
> Full survey - with owners of the largest bit-boundary-aligned blocks
> that contain them - here:
>
> https://gist.github.com/roycewilliams/6cb91ed94b88730321ca3076006229f1
Unlike what you say,
>
> On 30 Mar 2018, at 15:46, Royce Williams wrote:
>
> 77.77.77.77 - Dadeh Gostar Asr Novin P.J.S. Co. (Iran) | 77.77.64/19 |
> recursion-yes
Well, that one's a little odd:
% host news.bbc.co.uk 77.77.77.77
Using domain server:
Name: 77.77.77.77
Address: 77.77.77.77#53
Aliases:
news.bbc.co.u
Could anyone that operates in a ISP or large enterprise that deals with
many different customers/clients discuss some methods you handle network
service requests.
- Do you have/use an online form?
- How is it tracked, IE a service request #, circuit ID, etc?
- Can the customer look up th
On Fri, Mar 30, 2018 at 03:57:24PM +0100,
William Waites wrote
a message of 48 lines which said:
> > 77.77.77.77 - Dadeh Gostar Asr Novin P.J.S. Co. (Iran) | 77.77.64/19 |
> > recursion-yes
>
> Well, that one's a little odd:
I think that, for the government of this country, it is seen as a
f
On Fri, Mar 30, 2018 at 09:30:00AM -0400, Christopher Morrow said:
>I think there's ample evidence that everyone's enemy is 'the nsa' (or other
>nation-state-actors) isn't there?
Or yourself, after you flip the EU off.
https://www.theregister.co.uk/2018/03/29/eu_dumps_30_ukowned_domains_i
On Fri, Mar 30, 2018 at 11:22 AM, Ken Chase wrote:
> On Fri, Mar 30, 2018 at 09:30:00AM -0400, Christopher Morrow said:
> >I think there's ample evidence that everyone's enemy is 'the nsa' (or
> other
> >nation-state-actors) isn't there?
>
> Or yourself, after you flip the EU off.
>
> https:/
If folks from xtube.com/ultradns/dynect are on the list, it appears that
there’s a discrepancy in the xtube.com zone being served by the some auths. At
least one of the CNAMEs required for resolution is missing from the zone being
served by at least some ultra instances. No idea where the brea
Another one for the list... We're working on fielding our quad-255
(255.255.255.255) DNS. It's currently pingable but not yet providing
resolution. We're aiming for an April 1st release. One of the most
widley-distributed quads out there. We're thinking about calling it QUAdFF --
drink it
This is an automated weekly mailing describing the state of the Internet
Routing Table as seen from APNIC's router in Japan.
The posting is sent to APOPS, NANOG, AfNOG, SANOG, PacNOG, SAFNOG
TZNOG, MENOG, BJNOG, SDNOG, CMNOG, LACNOG, IRNOG and the RIPE Routing WG.
Daily listings are sent to bgp-s
uh, quad the f do you think you're doing?!
you think anything.255 is routable by COTS gear? :)
maybe everyone who operates x.y/16 should be setting up their open resolvers on
x.y.x.y (can i get an rfc up in the hizzy? apr 1 is rsn.)
/kc
On Fri, Mar 30, 2018 at 05:02:27PM +, Feldman, Mark
On Fri, 30 Mar 2018 14:27:47 -0400, Ken Chase said:
> uh, quad the f do you think you're doing?!
>
> you think anything.255 is routable by COTS gear? :)
Obviously posted 48 hours early. :)
pgpKuzBvYWA9n.pgp
Description: PGP signature
On Thu, 29 Mar 2018, Seth Mattinen wrote:
>I'm lazy and have been using 9.9.9.9 at home.
nameserver 1.1
/mark
I doubt most people could care less.
If they should or not is not a discussion I'm willing to have.
-
Mike Hammett
Intelligent Computing Solutions
Midwest Internet Exchange
The Brothers WISP
- Original Message -
From: "Christopher Morrow"
To: "Stephane Bortzmeyer"
Cc
> Public DNS resolvers still help against "ordinary"
> adversaries. (If your ennemy is the NSA, you have
> other problems, anyway.)
: I think there's ample evidence that everyone's enemy
: is 'the nsa' (or other nation-state-actors) isn't
: there?
--- na...@ics-il.net wrote: -
Greetings,
On Fri, 30 Mar 2018, Feldman, Mark wrote:
Another one for the list... We're working on fielding our quad-255
(255.255.255.255) DNS. It's currently pingable but not yet providing
resolution. We're aiming for an April 1st release. One of the most
widley-distributed quads out ther
21 matches
Mail list logo