* Paul Vixie: > at: > > http://www.diplomacy.edu/policybriefs > > we see: > > http://www.diplomacy.edu/sites/default/files/DiploFoundation%20Policy%20Brief%20No%204%20WEB.pdf
Wouldn't be a first to step to cover root server *operators* (and root DNS server sites) to audits, lift them out of obscurity, and introduce some form of accountability? It's not a bad idea to make sure that the data that goes into the root system isn't compromised, but right now, anyone can already review that, and there is even some public documentation for the update process. Contrast this with the situation on the operator side, where important information such as site selection criteria is only available under NDA (if at all). _______________________________________________ dns-operations mailing list [email protected] https://lists.dns-oarc.net/mailman/listinfo/dns-operations dns-jobs mailing list https://lists.dns-oarc.net/mailman/listinfo/dns-jobs
