Hello everyone! I found the UNWIND tool very interesting.
I have particularly devoted some time to the issue of DNS traffic hijacking. Unfortunately this has been a common practice in some ISPs. They do this either by DST-NAT or by Well-Know Open Resolvers hijacking (like 8.8.8.8 1.1.1.1 9.9.9.9 4.4.2.2). I have been thinking for some time about scalable mechanisms for identifying and reporting ISPs that have this bad practice. I wondered that adapting UNWIND to do this kind of verification would not be difficult. What do you think? Em ter, 15 de out de 2019 às 11:25, Joao Luis Silva Damas <[email protected]> escreveu: > Good point. Noted > > For this instance, the RIPE 78 DNS WG agenda is at > https://ripe78.ripe.net/programme/meeting-plan/dns-wg/ > > Joao > > > On 15 Oct 2019, at 16:18, Paul Hoffman <[email protected]> wrote: > > > > Just a note that the minutes are very hard to follow because there is no > agenda to go with them. It feels weird to be forced to watch the video to > know what was talked about. For example, in the first section, I have no > idea what tool Ondřej Caletka is talking about (I assume Anand talked about > many of them). Even just a set of chairs slides at the top of the page > would help. > > > > --Paul Hoffman > > > > > -- Douglas Fernando Fischer Engº de Controle e Automação
