Hello everyone!

I found the UNWIND tool very interesting.

I have particularly devoted some time to the issue of DNS traffic hijacking.

Unfortunately this has been a common practice in some ISPs.
They do this either by DST-NAT or by Well-Know Open Resolvers hijacking
(like 8.8.8.8 1.1.1.1 9.9.9.9 4.4.2.2).

I have been thinking for some time about scalable mechanisms for
identifying and reporting ISPs that have this bad practice.

I wondered that adapting UNWIND to do this kind of verification would not
be difficult.

What do you think?

Em ter, 15 de out de 2019 às 11:25, Joao Luis Silva Damas <[email protected]>
escreveu:

> Good point. Noted
>
> For this instance, the RIPE 78 DNS WG agenda is at
> https://ripe78.ripe.net/programme/meeting-plan/dns-wg/
>
> Joao
>
> > On 15 Oct 2019, at 16:18, Paul Hoffman <[email protected]> wrote:
> >
> > Just a note that the minutes are very hard to follow because there is no
> agenda to go with them. It feels weird to be forced to watch the video to
> know what was talked about. For example, in the first section, I have no
> idea what tool Ondřej Caletka is talking about (I assume Anand talked about
> many of them). Even just a set of chairs slides at the top of the page
> would help.
> >
> > --Paul Hoffman
> >
>
>
>

-- 
Douglas Fernando Fischer
Engº de Controle e Automação

Reply via email to