[147720] in North American Network Operators' Group

home help back first fref pref prev next nref lref last post

Re: what if...?

daemon@ATHENA.MIT.EDU (Christian de Larrinaga)
Tue Dec 20 12:15:49 2011

From: Christian de Larrinaga <cdel@firsthand.net>
In-Reply-To: <84355935-D650-40EB-AEE1-14755D6AB2DA@puck.nether.net>
Date: Tue, 20 Dec 2011 17:14:53 +0000
To: Jared Mauch <jared@puck.nether.net>
Cc: NANOG Operators Group <nanog@nanog.org>
Errors-To: nanog-bounces+nanog.discuss=bloom-picayune.mit.edu@nanog.org

You tell that to =
http://www.charset.org/punycode.php?encoded=3Dxn--m_omaaamk.com&decode=3DP=
unycode+to+normal+text


Normal text=20
FMQQSQQT.com

to Punycode=20
xn--m_omaaamk.com

?


On 20 Dec 2011, at 17:00, Jared Mauch wrote:

>=20
> On Dec 20, 2011, at 11:37 AM, Eduardo A. Su=E1rez wrote:
>=20
>> Hi,
>>=20
>> what if evil guys hack my mom ISP DNS servers and use RPZ to redirect =
traffic from mom_bank.com to evil.com?
>>=20
>> How can she detect this?
>=20
> Thankfully mom_bank.com is not valid, as underscores aren't valid in =
dns names :)
>=20
> Additionally, SSL certificates combined with DNSSEC/DANE can provide =
some protection.  Some of this technology may not be available today, =
but is worth tracking if you are interested in this topic.
>=20
> - Jared



home help back first fref pref prev next nref lref last post