Thanks!

Once upon a time, Dixon, Cameron via dns-operations 
<[email protected]> said:
> From: "Dixon, Cameron" <[email protected]>
> To: "[email protected]" <[email protected]>
> Date: Fri, 21 Jan 2022 19:46:17 +0000
> Subject: Re: [dns-operations] Contact for va.gov?
> 
> Chris, I've flagged this for admins of va.gov and encouraged them to reach 
> out.
> 
> 
> Cameron Dixon (he/him)
> 
> [email protected]<mailto:[email protected]>
> 
> Cybersecurity & Infrastructure Security Agency | https://cisa.gov
> 
> ________________________________
> From: dns-operations <[email protected]> on behalf of 
> Viktor Dukhovni <[email protected]>
> Sent: Friday, January 21, 2022 2:27 PM
> To: [email protected] <[email protected]>
> Subject: Re: [dns-operations] Contact for va.gov?
> 
> CAUTION: This email originated from outside of DHS. DO NOT click links or 
> open attachments unless you recognize and/or trust the sender. Contact your 
> component SOC with questions or concerns.
> 
> 
> On Fri, Jan 21, 2022 at 12:08:38PM -0600, Chris Adams wrote:
> 
> > > The current-deferal.csv data file 
> > > (https://urldefense.us/v3/__https://github.com/cisagov/dotgov-data__;!!BClRuOV5cvtbuNI!UAOuVENVyzQz6XW9n4gglXKMwuWAT386AZC1QT_a2tCEndxX7cMZvlV1t7oOWisz4Lj2y-A$
> > >  ) lists:
> > >
> > >     Domain Name,Domain Type,Agency,Organization,City,State,Security 
> > > Contact Email
> > >     VA.GOV,Federal - Executive,Department of Veterans Affairs,"Office of 
> > > Information and Technology, IT Operations and Services 
> > > (ITOPS)",Washington,DC,[email protected]
> > >     VETS.GOV,Federal - Executive,Department of Veterans Affairs,"Office 
> > > of Information and Technology, IT Operations and Services 
> > > (ITOPS)",Washington,DC,[email protected]
> > >
> > > So <[email protected]> seems like the place to start.  The SOA
> > > "rname" <[email protected]> may be another.
> >
> > Hmm... we have tried both of those.  The SOA address just bounces, and
> > the vawebsecurity address has not responded to a couple of emails.
> 
> In that case I don't have any better suggestsions.  You could try
> general .GOV contacts at DHS.  There's a vulnerability reporting address
> for va.gov, but I think that abusing that for operational glitches is
> probably inappropriate.
> 
> --
>     Viktor.
> _______________________________________________
> dns-operations mailing list
> [email protected]
> https://urldefense.us/v3/__https://lists.dns-oarc.net/mailman/listinfo/dns-operations__;!!BClRuOV5cvtbuNI!UAOuVENVyzQz6XW9n4gglXKMwuWAT386AZC1QT_a2tCEndxX7cMZvlV1t7oOWiszlZfCdlM$

> _______________________________________________
> dns-operations mailing list
> [email protected]
> https://lists.dns-oarc.net/mailman/listinfo/dns-operations


-- 
Chris Adams <[email protected]>
_______________________________________________
dns-operations mailing list
[email protected]
https://lists.dns-oarc.net/mailman/listinfo/dns-operations

Reply via email to