Writes Dave Rust:
I never thought of this until now, but now that I have thought of it, it seems completely likely.
I’ve been running servers since 1996 when I set up one the first private servers in the country where I currently live. Back in those heady days of HoTMaiL before Google started goo-gooing and Bill Gates finally included the means to get on the Internet from his crippled Win95, and I had to learn how to set up a DNS.
Setting up DNS for your own domain is not too difficult to do, if you understand a few basic rules. One of those rules is that you can control your domain or subdomain, but you don’t control the upstream domain.
Let’s imagine for a moment that the secretary of state was assigned a domain like “HILLARY . SEC . STATE. GOV”
What can Hitlery do with that domain? With GOV, absolutely nothing. It’s controlled by the ROOT SERVERS. What about STATE . GOV? Pretty unlikely, as the GOV Network Information Center (NIC) controls the names and addresses. Now we get to SEC . STATE . GOV — can she modify that one? ONLY WITH THE COMPLICIT COOPERATION of those who maintain that part of the hierarchy. So, she got someone to manipulate an address, perhaps causing all of MAIL . SEC . STATE. GOV to be routed to the address she had in her closet. So, what did the SOA (start of authority) records say? Who at the NIC office for STATE . GOV conspired with Killery to re-route state secrets?
Wow. If I ever did that, I would have people screaming at me.
I’ve pointed you in the right direction, now take it to the next level.
I hope the NSA dweebs reading this will act on it as well.


