--- Begin Message ---

> On Nov 25, 2019, at 2:19 PM, Florian Weimer <[email protected]> wrote:
> 
> * Jim Reid:
> 
>>> On 25 Nov 2019, at 20:54, Florian Weimer <[email protected]> wrote:
>>> Is it because of the incoming data is interesting?
>> 
>> Define interesting.
> 
> The data could have monetary value.  Passwords that are otherwise
> difficult to come by might be leaking.

Hi Florian,

I can assure you that Verisign does not monetize the root server data.  If
any other operators do, I'm not aware of it.

We do utilize root server data for research purposes from time-to-time.
Recent examples include the KSK rollover and name collisions.  Less recent
examples include understanding TTL/caching behavior and preparing for the
root ZSK size increase.  When DDoS attacks happen, we often analyze the
data to see if we can understand how and why it happened, and to be better
prepared for the next one.

DW


Attachment: smime.p7s
Description: S/MIME cryptographic signature


--- End Message ---
_______________________________________________
dns-operations mailing list
[email protected]
https://lists.dns-oarc.net/mailman/listinfo/dns-operations

Reply via email to