DNS Abuse: Difference between revisions
No edit summary |
|||
Line 58: | Line 58: | ||
===Mitigation=== | ===Mitigation=== | ||
* [[DNS Abuse Responses|How is DNS Abuse being handled?]] | |||
* How to make abuse [[RBL|notifications]] more helpful by | |||
# being more timely (immediately posted and immediately taken down) and | |||
# distinguishing between [[Compromised Domain]]s and [[Malicious Domain]]s? | |||
* Is there too much focus on Authoritative DNS and not enough on the entire DNS ecosystem? | |||
* How to reduce gap/time lag between policy and incident response?<ref>[https://www.icann.org/en/system/files/files/presentation-day2db-first-dns-abuse-sig-hausding-26may21-en.pdf FIRST DNS Abuse SIG Presentation, IDS 2021]</ref> | |||
===Intersecting Issues=== | ===Intersecting Issues=== |