[106497] in North American Network Operators' Group
Re: [funsec] Subject line misleading. AT&T Pwned. Sweet Irony:
daemon@ATHENA.MIT.EDU (Suresh Ramasubramanian)
Thu Jul 31 00:28:56 2008
Date: Thu, 31 Jul 2008 09:58:44 +0530
From: "Suresh Ramasubramanian" <ops.lists@gmail.com>
To: Skywing <Skywing@valhallalegends.com>
In-Reply-To: <982D8D05B6407A49AD506E6C3AC8E7D66150B24CD1@caralain.haven.nynaeve.net>
Cc: "nanog@nanog.org" <nanog@nanog.org>
Errors-To: nanog-bounces@nanog.org
I can point it to a colo'd resolver I have elsewhere - but opendns is
rather more redundant. Yes I know what else it does re advertising
and such, but I dont do any sensitive work related stuff through those
resolvers anyway.
On Thu, Jul 31, 2008 at 9:55 AM, Skywing <Skywing@valhallalegends.com> wrote:
> If you don't mind OpenDNS proxying all your Google searches, sure. < http://blog.metasploit.com/2008/07/on-dns-attacks-in-wild-and-journalistic.html >
>
> Personally, I would never use OpenDNS. Tactics like that are not particularly acceptable in my book, well-meaning or not. Not, however, trying to start a political debate - but OpenDNS does do a bit more than just act as a plain DNS resolver for you, and you should make that aware to anyone who uses it.
>