rz.verisign-grs.com root zone ftp access
bverd at verisign.com
Thu May 29 02:17:46 UTC 2014
Verisign performed routine account maintenance on the Verisign TLD Zone File Access Program (TLDZ) platform. This service gives participants FTP access to the TLD Zone Files for the .com, .net and .name top-level domains (TLDs). Each file contains the active domain names in that particular TLD and is updated daily.
Any user without a current contract in place was removed. All reasonable efforts were taken to notify users prior to their access being revoked. If a customer has lost their access to rz.verisign-grs.com<http://rz.verisign-grs.com> (TLDZ), they should call into Verisign Customer Service @+1-703-925-6999 and they will be instructed on how to submit the contract request. Once the request is processed a new user ID for the customer will be added to the platform.
Additional information regarding TLDZ can be view at http://www.verisigninc.com/en_US/channel-resources/domain-registry-products/zone-file-information/index.xhtml
G. Bradford Verd
Vice President Operations
bverd at verisign.com<mailto:bverd at verisign.com>
12061 Bluemont Way
Reston, VA 20190
[cid:image003.gif at 01CE05D2.5D1F5A90]
On May 20, 2014, at 5:21 PM, Brandon Applegate <brandon at burn.net<mailto:brandon at burn.net>> wrote:
Is anyone using this and having failed login for a few days now ? I’ve been mirroring the root zone(s) for years and I just started getting failures in my logs. I emailed an address I found on the Verisign website but so far dead air. If anyone knows of a more pointed email POC that would actually have clue about this that would be awesome.
Brandon Applegate - CCIE 10273
PGP Key fingerprint:
830B 4802 1DD4 F4F9 63FE B966 C0A7 189E 9EC0 3A74
"SH1-0151. This is the serial number, of our orbital gun."
-------------- next part --------------
A non-text attachment was scrubbed...
Size: 3105 bytes
More information about the NANOG