DNS Abuse: Difference between revisions

Jessica (talk | contribs)
No edit summary
Jessica (talk | contribs)
Line 58: Line 58:


===Mitigation===
===Mitigation===
''[[DNS Abuse Responses|How is DNS Abuse being handled?]]''
* [[DNS Abuse Responses|How is DNS Abuse being handled?]]  
* How to make abuse [[RBL|notifications]] more helpful by
# being more timely (immediately posted and immediately taken down) and
# distinguishing between [[Compromised Domain]]s and [[Malicious Domain]]s?
* Is there too much focus on Authoritative DNS and not enough on the entire DNS ecosystem?
* How to reduce gap/time lag between policy and incident response?<ref>[https://www.icann.org/en/system/files/files/presentation-day2db-first-dns-abuse-sig-hausding-26may21-en.pdf FIRST DNS Abuse SIG Presentation, IDS 2021]</ref>


===Intersecting Issues===
===Intersecting Issues===