Routers getting compromised is another argument for doing DNSSEC validation on the client.
-
-
@jedisct1 Some refs starting on slide 9 here: http://csrc.nist.gov/groups/ST/ca-workshop-2013/presentations/Rescorla_ca-workshop2013.pdf … -
@jedisct1 Until baseline failure rate is low enough for hard-fail, can't distinguish compromised routers just dropping DNSSEC traffic.
End of conversation
New conversation -
Loading seems to be taking a while.
Twitter may be over capacity or experiencing a momentary hiccup. Try again or visit Twitter Status for more information.