On Mon, Jun 13, 2011 at 10:24 AM, Anders Sundman <[email protected]> wrote: > A couple of days back GoDaddy did something to mess up the neat 0x20 > hack. Now all answers are lowercase: > > $ dig GoDady.com @ns46.domaincontrol.com. > > ;; AUTHORITY SECTION: > godady.com. 3600 IN NS NS45.DOMAINCONTROL.com. > godady.com. 3600 IN NS NS46.DOMAINCONTROL.com. > > You would kind of hope that a CamelCase named company would get this > right :)
That's a problem. Are *.domaincontrol.com GoDaddy's DNS servers? Can you give an example of a less phishy looking domain? If I can get a good example then I may be able to get this fixed. Cheers AGL -- Adam Langley [email protected] http://www.imperialviolet.org _______________________________________________ tor-talk mailing list [email protected] https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk
