%
% an example of a worry is cache poisoning of an antique v4 bind.
% ----
% and there are thousands of vulnerable v4 binds still out there.
%
% randy
%
One might argue that we have only applied the carrot.
We still have broken/vulnerable code, some pushing
15 years w/o an upgrade. Perhaps its time to apply
a stick and let folks know that things will stop working
or won't be the same unless they upgrade.
I note that we will have this problem regardless and more
esp. as we hit "unknown" RR types. Zones won't load.
Perhaps we should have dnsops worry about the deployment of
new types, be it RR or Class?
--
--bill
- Re: IPv6 dns Perry E. Metzger
- Re: IPv6 dns Randy Bush
- Re: IPv6 dns Perry E. Metzger
- Re: IPv6 dns Randy Bush
- Re: IPv6 dns Mark . Andrews
- Re: IPv6 dns Bill Manning
- Re: IPv6 dns Bruce A. Mah
- Re: IPv6 dns Perry E. Metzger
- Re: IPv6 dns Bill Manning
- Re: (ngtrans) Re: IPv6 dns Perry E. Metzger
- Re: IPv6 dns Bill Manning
- Re: IPv6 dns Randy Bush
- Re: (ngtrans) Re: IPv6 dns Perry E. Metzger
- Re: IPv6 dns Bill Manning
- Re: IPv6 dns Randy Bush
- Re: IPv6 dns Donald E. Eastlake 3rd
- Re: IPv6 dns Havard Eidnes
- Re: IPv6 dns Randy Bush
- Re: IPv6 dns Perry E. Metzger
- Re: IPv6 dns Randy Bush
- Re: IPv6 dns Perry E. Metzger
