nanog mailing list archives
Re: Level(3) DNS Spoofing All Domains
From: Billy Crook <BCrook () unrealservers net>
Date: Tue, 19 Nov 2019 12:08:44 -0600
On Tue, Nov 19, 2019 at 11:47 AM Mike Bolitho <mikebolitho () gmail com> wrote:
This is was my thought as well. People always get up in arms about how it's "Public DNS!" but it's really not. It's just well known and used because it's easy to remember.
I ask the users of 4.2.2.x where it is stated by the owners of 4.2.2.x that the public may use it, and what expectations they state the public should have of its availability, integrity, and security. Not having a contract with Level3, I would assume no such expectations, and discourage anyone from using 4.2.2.x, Even L3 customers unless they were specifically given it to use by L3. The other 'public DNS providers' outwardly encourage their use by the public. 4.2.2.x does not.
Current thread:
- Re: Level(3) DNS Spoofing All Domains, (continued)
- Re: Level(3) DNS Spoofing All Domains Matthew Pounsett (Nov 19)
- Re: Level(3) DNS Spoofing All Domains Mel Beckman (Nov 19)
- Re: Level(3) DNS Spoofing All Domains Christopher Morrow (Nov 19)
- Re: Level(3) DNS Spoofing All Domains Matthew Pounsett (Nov 19)
- Re: Level(3) DNS Spoofing All Domains Brandon Martin (Nov 19)
- RE: Level(3) DNS Spoofing All Domains Ryan, Spencer (Nov 19)
- RE: Level(3) DNS Spoofing All Domains Marshall, Quincy (Nov 19)
- Re: Level(3) DNS Spoofing All Domains Mike Bolitho (Nov 19)
- RE: Level(3) DNS Spoofing All Domains Marshall, Quincy (Nov 19)
- Re: Level(3) DNS Spoofing All Domains Mike Bolitho (Nov 19)
- RE: Level(3) DNS Spoofing All Domains Marshall, Quincy (Nov 19)
- Re: Level(3) DNS Spoofing All Domains Billy Crook (Nov 19)