Hello everyone!

I found the UNWIND tool very interesting.

I have particularly devoted some time to the issue of DNS traffic hijacking.

Unfortunately this has been a common practice in some ISPs.
They do this either by DST-NAT or by Well-Know Open Resolvers hijacking (like 8.8.8.8 1.1.1.1 9.9.9.9 4.4.2.2).

I have been thinking for some time about scalable mechanisms for identifying and reporting ISPs that have this bad practice.

I wondered that adapting UNWIND to do this kind of verification would not be difficult.

What do you think?

Em ter, 15 de out de 2019 às 11:25, Joao Luis Silva Damas <joao@bondis.org> escreveu:
Good point. Noted

For this instance, the RIPE 78 DNS WG agenda is at https://ripe78.ripe.net/programme/meeting-plan/dns-wg/

Joao

> On 15 Oct 2019, at 16:18, Paul Hoffman <paul.hoffman@vpnc.org> wrote:
>
> Just a note that the minutes are very hard to follow because there is no agenda to go with them. It feels weird to be forced to watch the video to know what was talked about. For example, in the first section, I have no idea what tool Ondřej Caletka is talking about (I assume Anand talked about many of them). Even just a set of chairs slides at the top of the page would help.
>
> --Paul Hoffman
>




--
Douglas Fernando Fischer
Engº de Controle e Automação