On Mon, Jun 13, 2011 at 10:24 AM, Anders Sundman <[email protected]> wrote:
> A couple of days back GoDaddy did something to mess up the neat 0x20
> hack. Now all answers are lowercase:
>
> $ dig GoDady.com @ns46.domaincontrol.com.
>
> ;; AUTHORITY SECTION:
> godady.com.             3600    IN      NS      NS45.DOMAINCONTROL.com.
> godady.com.             3600    IN      NS      NS46.DOMAINCONTROL.com.
>
> You would kind of hope that a CamelCase named company would get this
> right :)

That's a problem. Are *.domaincontrol.com GoDaddy's DNS servers? Can
you give an example of a less phishy looking domain?

If I can get a good example then I may be able to get this fixed.


Cheers

AGL

-- 
Adam Langley [email protected] http://www.imperialviolet.org
_______________________________________________
tor-talk mailing list
[email protected]
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk

Reply via email to