[11196] in North American Network Operators' Group

home help back first fref pref prev next nref lref last post

Re: Quote from Kashpureff / Re: question about per. hack

daemon@ATHENA.MIT.EDU (Paul Ferguson)
Tue Jul 22 19:52:54 1997

Date: Tue, 22 Jul 1997 19:43:03 -0400
To: moleary@ironlight.com (Myk O'Leary)
From: Paul Ferguson <pferguso@cisco.com>
Cc: nanog@merit.edu
In-Reply-To: <199707222306.QAA06635@quagmire.>

At 04:06 PM 07/22/97 -0700, Myk O'Leary wrote:

>
>So when red boxes are used on phones lines that are old enough for them to
>work, then the phone company should chalk it up to the fact that it CAN
>happen??  Compromising systems whether easily allowed or not is still
>illegal!
>

Okay, wise guy.  ;-)

As far as I'm concerned, this falls into the catch-all category of
DNS security.

Please see:

 http://www.ietf.org/html.charters/dnssec-charter.html

In any event, take it elsewhere.

- paul


home help back first fref pref prev next nref lref last post