On Mon, Dec 07, 2015 at 12:23:34PM +0100, Lennart Poettering wrote:
On Mon, 07.12.15 10:48, Tomas Hozza (thozza(a)redhat.com) wrote:
> On 04.12.2015 15:57, Lennart Poettering wrote:
> > On Tue, 01.12.15 11:15, Tomas Hozza (thozza(a)redhat.com) wrote:
> As you've said, this is basically an attack and hijacking of
someone's
> else domain name space. It is not correct and it is not expected that
> this will work with DNSSEC.
Humm, I find that way too cavalier... I am pretty sure this is a total
deal breaker for your feature. You cannot just break everybody's
network and not consider that a problem that *you* have to think about
rather than just ignoring it completely.
not everyones network - I allways use the IP to access routers.
It should be a feature of unbound to find the router and offer a stable
DNS pseudo-entry for that.
Richard
--
Name and OpenPGP keys available from pgp key servers