Future Directions
Some applications are now using cryptographic authentication techniques and not relying on DNS
ssh
There is persistent development activity involving DNS that is moving us to a more secure protocol
bind8.1-T2A
Previous slide
Next slide
Back to first slide
View graphic version