From 8202c7df492d2a3f853620c554f052dc9238f6ed Mon Sep 17 00:00:00 2001 From: Rob Austein Date: Sat, 19 Sep 2009 03:25:15 +0000 Subject: routeviews DNS hack doesn't really support IPv6 after all. svn path=/scripts/guess-roas-from-routeviews.py; revision=2775 --- scripts/guess-roas-from-routeviews.py | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) (limited to 'scripts/guess-roas-from-routeviews.py') diff --git a/scripts/guess-roas-from-routeviews.py b/scripts/guess-roas-from-routeviews.py index fcfe291c..403c99bf 100644 --- a/scripts/guess-roas-from-routeviews.py +++ b/scripts/guess-roas-from-routeviews.py @@ -5,8 +5,8 @@ Pull RFC 3779 resources from a cert, attempt to mine routeviews (via DNS, using the dnspython toolkit) for what the ROAs might look like for the addresses found in the cert. -This doesn't handle IPv6 yet, because I didn't know about the -dns.reversename module when I wrote this. I'll fix that. +This doesn't handle IPv6, because neither, apparently, does the +routeviews DNS interface. Oh well. NB: this is wild-assed guessing at best. Even if the routeviews data were signed, which it is not, you have no particular reason to believe -- cgit v1.2.3