g.root-servers.net - U.S. DoD Network Information Center
So does anyone know what happened to the US DOD NIC during this event? They provide one of the root servers, but they disappeared off the net for much of this event. http://www.cymru.com/DNS/dns.html
From: "Sean Donelan"
So does anyone know what happened to the US DOD NIC during this event? They provide one of the root servers, but they disappeared off the net for much of this event.
My personal opinion, though it doesn't account for much, is that they were testing out the new ways one can serve DNS from a MS-SQL database. Then again, they could just be smart and be paranoid. If I had a private network where security was required to be high, I'd have pulled the plug until the storm was over. Why take chances? Jack Bates BrightNet Oklahoma
On Sat, 25 Jan 2003, Jack Bates wrote:
From: "Sean Donelan"
So does anyone know what happened to the US DOD NIC during this event? They provide one of the root servers, but they disappeared off the net for much of this event.
My personal opinion, though it doesn't account for much, is that they were testing out the new ways one can serve DNS from a MS-SQL database. Then again, they could just be smart and be paranoid. If I had a private network where security was required to be high, I'd have pulled the plug until the storm was over. Why take chances?
eh? You are host to one of the Internet's root DNS servers and you pull the plug when things go a bit hairy on you. Even for a hosting company I'd not be happy if I was a customer and they shutdown the whole of their Internet access because of some problem like this! Steve
My personal opinion, though it doesn't account for much, is that they were testing out the new ways one can serve DNS from a MS-SQL database. Then again, they could just be smart and be paranoid. If I had a private network where security was required to be high, I'd have pulled the plug until
storm was over. Why take chances?
eh?
You are host to one of the Internet's root DNS servers and you pull the
when things go a bit hairy on you.
Even for a hosting company I'd not be happy if I was a customer and they shutdown the whole of their Internet access because of some problem like
From: "Stephen J. Wilcox" the plug this!
Depends on the nature of that network. If it was just root DNS servers, I would agree with you. However, unless they are feeding those servers with MS-SQL databases, one might guess that there was something more to it. Honestly, I doubt the DoD will let anyone know why. :) This is another BoA situation. Lack of information. Jack Bates BrightNet Oklahoma
JB> Date: Sat, 25 Jan 2003 21:38:57 -0600 JB> From: Jack Bates JB> My personal opinion, though it doesn't account for much, is JB> that they were testing out the new ways one can serve DNS JB> from a MS-SQL database. Then again, they could just be smart JB> and be paranoid. If I had a private network where security JB> was required to be high, I'd have pulled the plug until the JB> storm was over. Why take chances? Not exactly in tune with RFC2870. Eddy -- Brotsman & Dreger, Inc. - EverQuick Internet Division Bandwidth, consulting, e-commerce, hosting, and network building Phone: +1 (785) 865-5885 Lawrence and [inter]national Phone: +1 (316) 794-8922 Wichita ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Date: Mon, 21 May 2001 11:23:58 +0000 (GMT) From: A Trap <blacklist@brics.com> To: blacklist@brics.com Subject: Please ignore this portion of my mail signature. These last few lines are a trap for address-harvesting spambots. Do NOT send mail to <blacklist@brics.com>, or you are likely to be blocked.
participants (4)
-
E.B. Dreger
-
Jack Bates
-
Sean Donelan
-
Stephen J. Wilcox