lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
From: ggilliss at netpublishing.com (Gregory A. Gilliss)
Subject: ICANN is officially pissed off

"ICANN, ICANN, you're our man! If you can't do it, no one can!"

Okay, I'm done cheering. Meanwhile Verisign is *still* collecting data
for mistyped/unused URLs. Who wants to start the pool? Does Verisign
back off, and if so, when? Or do they get sued and, if they lose, do
they have to turn over all of the data that they collected while they
were offending/breaching/whatever?

Go ICANN!

Oh, and in case anyone is thinking of registering goicann.org, it is
(a) not taken and (b) not a .com or .net and doesn't redirect you to
sitefinder. 

G

On or about 2003.10.03 09:44:49 +0000, J. Race (caferace@...l.com) said:

> http://www.icann.org/correspondence/twomey-to-lewis-03oct03.htm
> 
> "Given the magnitude of the issues that have been raised, and their 
> potential impact on the security and stability of the Internet, the DNS 
> and the .com and .net top level domains, VeriSign must suspend the 
> changes to the .com and .net top-level domains introduced on 15 
> September 2003 by 6:00 PM PDT on 4 October 2003. Failure to comply with 
> this demand by that time will leave ICANN with no choice but to seek 
> promptly to enforce VeriSign's contractual obligations."

-- 
Gregory A. Gilliss, CISSP                             Telephone: 1 650 872 2420
Computer Engineering                                   E-mail: greg@...liss.com
Computer Security                                                ICQ: 123710561
Software Development                          WWW: http://www.gilliss.com/greg/
PGP Key fingerprint 2F 0B 70 AE 5F 8E 71 7A 2D 86 52 BA B7 83 D9 B4 14 0E 8C A3


Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ