2FA, was A Deep Dive on the Recent Widespread DNS Hijacking

Ross Tajvar ross at tajvar.io
Wed Feb 27 04:25:10 UTC 2019


Okay that was *clearly* a troll.

On Tue, Feb 26, 2019 at 10:58 PM Keith Medcalf <kmedcalf at dessus.com> wrote:

>
> I did write my own TOTP client.  However, why do you assume that I am
> talking about a TOTP client and not the referred webpage which requires the
> unfettered execution of third-party (likely malicious) javascript in order
> to view?  Not to mention requiring the use of (also quite possibly
> malicious) downloaded fonts?
>
> ---
> The fact that there's a Highway to Hell but only a Stairway to Heaven says
> a lot about anticipated traffic volume.
>
>
> >-----Original Message-----
> >From: NANOG [mailto:nanog-bounces+kmedcalf=dessus.com at nanog.org] On
> >Behalf Of Seth Mattinen
> >Sent: Tuesday, 26 February, 2019 09:36
> >To: nanog at nanog.org
> >Subject: Re: 2FA, was A Deep Dive on the Recent Widespread DNS
> >Hijacking
> >
> >On 2/25/19 9:59 PM, Keith Medcalf wrote:
> >> Are you offering an indemnity in case that code is malicious?  What
> >are the terms and the amount of the indemnity?
> >
> >
> >Anyone who is that paranoid should read the RFC and write their own
> >TOTP
> >client that lets them indemnify themselves from their own code.
>
>
>
>
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://mailman.nanog.org/pipermail/nanog/attachments/20190226/91f1991b/attachment.html>


More information about the NANOG mailing list