<table cellspacing="0" cellpadding="0" border="0" ><tr><td valign="top" style="font: inherit;">Does this mean I have to give back all my survivalist and camo stuff? Does Ebay handle used tanks? Perhaps I should ask California's next gov. Meg Whitman - ex CEO.<BR><BR>--- On <B>Tue, 5/4/10, McTim <I><dogwallah@gmail.com></I></B> wrote:<BR>
<BLOCKQUOTE style="PADDING-LEFT: 5px; MARGIN-LEFT: 5px; BORDER-LEFT: rgb(16,16,255) 2px solid"><BR>From: McTim <dogwallah@gmail.com><BR>Subject: Re: [governance] FW: [Futurework] Possible risk from Internet changes<BR>To: governance@lists.cpsr.org, "michael gurstein" <gurstein@gmail.com><BR>Date: Tuesday, May 4, 2010, 5:32 AM<BR><BR>
<DIV class=plainMail>All,<BR><BR>12 of the 13 rootservers are now serving the DURZ, so if things are<BR>working now they will almost certainly still be working on 5/5.<BR>The sky is not falling!<BR><BR>On Mon, May 3, 2010 at 8:15 PM, michael gurstein <<A href="http://us.mc839.mail.yahoo.com/mc/compose?to=gurstein@gmail.com" ymailto="mailto:gurstein@gmail.com">gurstein@gmail.com</A>> wrote:<BR>> I have no idea about this... But I think this raises some interesting<BR>> questions from an "Internet governance" perspective such as what types of<BR>> alerts should be distributed<BR><BR>This is the text of the 5th alert that has gone out about this, I've<BR>gotten it in ~half a dozen lists I am subbed to:<BR><BR>"Root Zone DNSSEC Deployment<BR>Technical Status Update 2010-05-03<BR><BR>This is the fifth of a series of technical status updates intended<BR>to inform a technical audience on progress in signing the root zone<BR>of the
DNS.<BR><BR><BR>** The final transition to the DURZ will take place on<BR>** J-Root, on 2010-05-05 between 1700--1900 UTC.<BR>**<BR>** After that maintenance all root servers will be serving the<BR>** DURZ, and will generate larger responses to DNS<BR>** queries that request DNSSEC information.<BR>**<BR>** If you experience technical problems or need to contact<BR>** technical project staff, please send e-mail to <A href="http://us.mc839.mail.yahoo.com/mc/compose?to=rootsign@icann.org" ymailto="mailto:rootsign@icann.org">rootsign@icann.org</A><BR>** or call the ICANN DNS NOC at +1 310 301 5817, e-mail preferred<BR>** if possible.<BR>**<BR>** See below for more details.<BR><BR><BR>RESOURCES<BR><BR>Details of the project, including documentation published to date,<BR>can be found at <<A href="http://www.root-dnssec.org/" target=_blank>http://www.root-dnssec.org/</A>>.<BR><BR>We'd like to
hear from you. If you have feedback for us, please<BR>send it to <A href="http://us.mc839.mail.yahoo.com/mc/compose?to=rootsign@icann.org" ymailto="mailto:rootsign@icann.org">rootsign@icann.org</A>.<BR><BR><BR>DEPLOYMENT STATUS<BR><BR>The incremental deployment of DNSSEC in the Root Zone is being<BR>carried out first by serving a Deliberately Unvalidatable Root Zone<BR>(DURZ), and subsequently by a conventionally signed root zone.<BR>Discussion of the approach can be found in the document "DNSSEC<BR>Deployment for the Root Zone", as well as in the technical presentations<BR>delivered at RIPE, NANOG, IETF and ICANN meetings.<BR><BR>Twelve of the thirteen root servers have already made the transition<BR>to the DURZ. No harmful effects have been identified.<BR><BR>The final root server to make the transition, J-Root, will start<BR>serving the DURZ in a maintenance window scheduled for 1700--1900<BR>UTC on 2010-05-05.<BR><BR>Initial observations
relating to this transition will be presented<BR>and discussed at the DNS Working Group meeting at the RIPE meeting<BR>in Prague on 2010-05-06.<BR><BR><BR>PLANNED DEPLOYMENT SCHEDULE<BR><BR>Already completed:<BR><BR>2010-01-27: L starts to serve DURZ<BR><BR>2010-02-10: A starts to serve DURZ<BR><BR>2010-03-03: M, I start to serve DURZ<BR><BR>2010-03-24: D, K, E start to serve DURZ<BR><BR>2010-04-14: B, H, C, G, F start to serve DURZ<BR><BR>To come:<BR><BR>2010-05-05: J starts to serve DURZ<BR><BR>2010-07-01: Distribution of validatable, production, signed root<BR> zone; publication of root zone trust anchor<BR><BR>(Please note that this schedule is tentative and subject to change<BR>based on testing results or other unforeseen factors.)<BR><BR>A more detailed DURZ transition timetable with maintenance windows<BR>can be found in the document "DNSSEC Deployment for the Root Zone",<BR>the most recent draft of which can be found on the
project web page<BR>at <<A href="http://www.root-dnssec.org/" target=_blank>http://www.root-dnssec.org/</A>>."<BR><BR><BR><BR><BR>>, who should identify what alerts are<BR>> distributed and to whom i.e. where does the authority, responsibility and<BR>> accountability lie in these areas and is this sufficient and appropriate?<BR><BR><BR>The ICANN DNSSEC signing team is the "who". ICANN and VeriSign have<BR>the authority, responsibility and accountability.<BR><BR>I think it is sufficient and appropriate. Who would you suggest do it?<BR><BR><BR>-- <BR>Cheers,<BR><BR>McTim<BR>"A name indicates what we seek. An address indicates where it is. A<BR>route indicates how we get there." Jon Postel<BR>____________________________________________________________<BR>You received this message as a subscriber on the list:<BR> <A href="http://us.mc839.mail.yahoo.com/mc/compose?to=governance@lists.cpsr.org"
ymailto="mailto:governance@lists.cpsr.org">governance@lists.cpsr.org</A><BR>To be removed from the list, send any message to:<BR> <A href="http://us.mc839.mail.yahoo.com/mc/compose?to=governance-unsubscribe@lists.cpsr.org" ymailto="mailto:governance-unsubscribe@lists.cpsr.org">governance-unsubscribe@lists.cpsr.org</A><BR><BR>For all list information and functions, see:<BR> <A href="http://lists.cpsr.org/lists/info/governance" target=_blank>http://lists.cpsr.org/lists/info/governance</A><BR><BR>Translate this email: <A href="http://translate.google.com/translate_t" target=_blank>http://translate.google.com/translate_t</A><BR></DIV></BLOCKQUOTE></td></tr></table>