[PCBSD-malaysia] [Owasp-Malaysia] [MySEC] Breaking DNSSEC
esqbrianritchie at gmail.com
Sat Apr 10 05:52:07 PDT 2010
Thanks for the comments. Haven't read the doc yet but yeah any system with
poor implementation = flawed by default. Curious what this document has to
On Sat, Apr 10, 2010 at 8:49 PM, Amir Haris Ahmad <amir at localhost.my> wrote:
> Yes, with improper/poor implementation your might face the problems. DNSSEC
> uses public key cryptography and you need to maintain it. Administrating DNS
> is a fun stuff when you are enabling DNSSEC in your production (you need to
> know more). Come on, you know should read these RFCs 4033, 4034, 4035 and
> 5011. If anyone got doubt about DNSSEC, we can discuss about it. Root server
> will enable DNSSEC in production by July this year and for .my in Q4 this
> year. UDPPoke, Poke, Poker, TCPPoke... great.
> Amir Haris
> On Sat, Apr 10, 2010 at 8:03 PM, BRIAN RITCHIE <esqbrianritchie at gmail.com>wrote:
>> Thanks for this. Will check it out.
>> On Sat, Apr 10, 2010 at 3:00 PM, Muhammad Najmi Ahmad Zabidi <
>> najmi.zabidi at gmail.com> wrote:
>>> DJB, the author of Qmail
>>> You received this message because you are subscribed to the Google Groups
>>> "MySecurity" group.
>>> To post to this group, send email to mysecurity at googlegroups.com.
>>> To unsubscribe from this group, send email to
>>> mysecurity+unsubscribe at googlegroups.com<mysecurity%2Bunsubscribe at googlegroups.com>
>>> For more options, visit this group at
>> Owasp-Malaysia mailing list
>> Owasp-Malaysia at lists.owasp.org
>> OWASP Malaysia Wiki
>> OWASP Malaysia Wiki Facebook
-------------- next part --------------
An HTML attachment was scrubbed...
More information about the PCBSD-malaysia