[iwar] [fc:NIPC.URGES.DNS.AWARENESS]

From: Fred Cohen (fc@all.net)
Date: 2001-12-17 22:08:28


Return-Path: <sentto-279987-4084-1008655649-fc=all.net@returns.groups.yahoo.com>
Delivered-To: fc@all.net
Received: from 204.181.12.215 [204.181.12.215] by localhost with POP3 (fetchmail-5.7.4) for fc@localhost (single-drop); Mon, 17 Dec 2001 22:18:07 -0800 (PST)
Received: (qmail 21593 invoked by uid 510); 18 Dec 2001 06:16:07 -0000
Received: from n2.groups.yahoo.com (216.115.96.52) by all.net with SMTP; 18 Dec 2001 06:16:07 -0000
X-eGroups-Return: sentto-279987-4084-1008655649-fc=all.net@returns.groups.yahoo.com
Received: from [216.115.97.187] by n2.groups.yahoo.com with NNFMP; 18 Dec 2001 06:07:29 -0000
X-Sender: fc@red.all.net
X-Apparently-To: iwar@onelist.com
Received: (EGP: mail-8_0_1_3); 18 Dec 2001 06:07:28 -0000
Received: (qmail 91599 invoked from network); 18 Dec 2001 06:07:28 -0000
Received: from unknown (216.115.97.172) by m6.grp.snv.yahoo.com with QMQP; 18 Dec 2001 06:07:28 -0000
Received: from unknown (HELO red.all.net) (12.232.125.69) by mta2.grp.snv.yahoo.com with SMTP; 18 Dec 2001 06:07:28 -0000
Received: (from fc@localhost) by red.all.net (8.11.2/8.11.2) id fBI68Uv06183 for iwar@onelist.com; Mon, 17 Dec 2001 22:08:30 -0800
Message-Id: <200112180608.fBI68Uv06183@red.all.net>
To: iwar@onelist.com (Information Warfare Mailing List)
Organization: I'm not allowed to say
X-Mailer: don't even ask
X-Mailer: ELM [version 2.5 PL3]
From: Fred Cohen <fc@all.net>
X-Yahoo-Profile: fcallnet
Mailing-List: list iwar@yahoogroups.com; contact iwar-owner@yahoogroups.com
Delivered-To: mailing list iwar@yahoogroups.com
Precedence: bulk
List-Unsubscribe: <mailto:iwar-unsubscribe@yahoogroups.com>
Date: Mon, 17 Dec 2001 22:08:28 -0800 (PST)
Subject: [iwar] [fc:NIPC.URGES.DNS.AWARENESS]
Reply-To: iwar@yahoogroups.com
Content-Type: text/plain; charset=US-ASCII
Content-Transfer-Encoding: 7bit

*NIPC URGES DNS AWARENESS

Urging heightened awareness of DNS risks, the National Infrastructure
Protection Center (NIPC) last week warned corporations of the need to
ensure that their domain name servers are fully redundant and
geographically dispersed to avoid a single point of failure.
"Highlights," a monthly NIPC newsletter, said that a DNS-related single
point of failure presents "a risk of total loss of electronic
connectivity" for many companies. Security experts recommend that
multiple domain name servers be placed on different network segments and
be dispersed across geographic locations. NIPC suggests companies make
arrangements for mutual backup or contract with a third party to provide
additional name servers. 

<a href="http://www.nipc.gov/publications/highlights/2001/highlight-01-11.pdf">http://www.nipc.gov/publications/highlights/2001/highlight-01-11.pdf> 


Source: SECURITY WIRE DIGEST, VOL. 3, NO. 95, DECEMBER 17, 2001

------------------------ Yahoo! Groups Sponsor ---------------------~-->
Need new boots for winter? Looking for a perfect gift for your shoe loving friends?
Zappos.com is the perfect fit for all your shoe needs!
http://us.click.yahoo.com/ltdUpD/QrSDAA/ySSFAA/kgFolB/TM
---------------------------------------------------------------------~->

------------------
http://all.net/ 

Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ 



This archive was generated by hypermail 2.1.2 : 2001-12-31 21:00:00 PST