[170871] in North American Network Operators' Group
Re: DNSSEC?
daemon@ATHENA.MIT.EDU (Bill Woodcock)
Fri Apr 11 14:50:52 2014
From: Bill Woodcock <woody@pch.net>
In-Reply-To: <201404111835.s3BIZcqQ003034@world.std.com>
Date: Fri, 11 Apr 2014 11:50:28 -0700
To: Barry Shein <bzs@world.std.com>
Cc: nanog@nanog.org
Errors-To: nanog-bounces+nanog.discuss=bloom-picayune.mit.edu@nanog.org
--Apple-Mail=_A9D34B3B-EF48-4BB6-A548-BCFD10B566E3
Content-Transfer-Encoding: quoted-printable
Content-Type: text/plain;
charset=us-ascii
On Apr 11, 2014, at 11:35 AM, Barry Shein <bzs@world.std.com> wrote:
>=20
> So, DNSSEC is also compromised by this heartbleed bug, right?
Nope, apples and oranges.
http://www.afilias.info/webfm_send/32
The only point of intersection I can think of is an indirect one, and =
unfortunately not much used yet: DANE certificates for TLS/SSL =
connections.
-Bill
--Apple-Mail=_A9D34B3B-EF48-4BB6-A548-BCFD10B566E3
Content-Transfer-Encoding: 7bit
Content-Disposition: attachment;
filename=signature.asc
Content-Type: application/pgp-signature;
name=signature.asc
Content-Description: Message signed with OpenPGP using GPGMail
-----BEGIN PGP SIGNATURE-----
Comment: GPGTools - http://gpgtools.org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=MCNh
-----END PGP SIGNATURE-----
--Apple-Mail=_A9D34B3B-EF48-4BB6-A548-BCFD10B566E3--