DNS |
Sponsored by |
|
Want to learn about the state of DNSSEC usage in North America? Or what is new in DNS monitoring? Or where DNSSEC fits into the plans of operating systems? Or how DANE is being used to bring a higher level of security to email? All those questions and much more will be discussed at the DNSSEC Workshop at ICANN 51 happening on Wednesday, October 15, 2014, from 8:30 am to 2:45 pm Pacific Daylight Time (PDT, which is UTC-7). more
ICANN has released a set of guidelines to explain its Coordinated Vulnerability Disclosure Reporting. The guidelines serve two purposes, says ICANN: "They define the role ICANN will perform in circumstances where vulnerabilities are reported and ICANN determines that the security, stability or resiliency of the DNS is exploited or threatened. The guidelines also explain how a party, described as a reporter, should disclose information on a vulnerability discovered in a system or network operated by ICANN." more
According to Shanghai Daily, there has been an "organized Internet attack on Tuesday night which caused serious congestion in several provinces [in China] and left millions of users unable to gain access to the Internet." This is the first time the regulator has published news about an investigation into an online attack in China within 24 hours, says Shanghai Daily. ..."It was an attack on DNS (Domain Name System) and the carriers and related firms should do more back-up to avoid similar incidents," the ministry said in a statement. more
This month, we are seeing a very busy global ecosystem with the ICANN 51, UN General Assembly meeting to discuss ICT for Development in New York and now the 19th ITU Plenipotentiary in Busan. Pinktober, Oktoberfest has also become saturated with ICTober so it makes me more reflective. First I would like to make a massive shout out to all those battling cancer, survivors and families who wage war against cancer. May you all walk on and walk strong! more
The Updated Supplementary Procedures for Independent Review Process ("IRP Supplementary Procedures") are now up for review and Public Comment. Frankly, there is a lot of work to be done. If you have ever been in a String Objection, Community Objection, or negotiated a Consensus Policy, your rights are being limited by the current way the IRP Supplementary Procedures proposal is structured. With timely edits, we can ensure that all directly-impacted and materially-affected parties have actual notice of the IRP proceeding... more
First the Los Angeles Times, now the New York Times have both printed editorials critical of the PROTECT-IP bill. Both the LAT and NYT support copyright - and announce as much in their opening sentences. That doesn't mean we should sacrifice Internet security and stability for legitimate DNS users, nor the transparency of the rule of law. more
Ars Technica's Dan Goodin reports that an "investigation shows the spam run worked by abusing a weakness at GoDaddy that allowed the scammers to hijack at least 78 domains belonging to Expedia, Mozilla, Yelp, and other legitimate people or organizations." more
IT security specialists have known for years that the plain DNS is not to be trusted. Any hope for improvement rests on the DNSSEC protocol deployment. In this post, I will review the current status in one critical aspect, namely the DNS root signature key management. The other two foremost are the application usage of DNSSEC protocol functionality and the operational front, or the extent of deployment in the DNS infrastructure. The operational front includes the support by the DNS root nameservers, but my focus on signature key management leaves this issue aside. more
Macron has declared the Internet to be under threat. Without stepping back to question and explore the underlying causes of those threats, he uses them as a justification to propose a different approach to, albeit limited, current Internet Governance processes. Here we explore his proposals and some of the issues they generate. He acknowledges that Civil Society and the private sector have been core drivers in the creation of the Internet. He argues that its benefits and existence are endangered by predatory practices. more
Ah, BYOD. How I love thee. BYOD, or "Bring Your Own Device", gives me choices. I can use a device at work I actually like and am most effective with. (How did I ever get by without my iPad?) But BYOD comes with challenges. Personal devices can be infected with malware. Once they're connected to an enterprise's network, they can be controlled by a bot master to hijack enterprise resources and wreak havoc as part of a botnet. more
As we approach the World Cup in South Africa this June it's heartening to see the amount of attention being paid to the continent. As with ICANN's recent Nairobi meeting, the eyes of the world are focusing on Africa in a new way -- as a sophisticated marketplace, and as a destination for investment, technology, and yes, sports... Still, as we prepare for the Cup and as we celebrate ICANN's recent approval of more Internationalized Domain Names (IDNs), our job as an Internet community remains unfinished. Too many scripts and thus too many key voices remain "off the pitch". more
Trending news and global events impact domain registration behaviors. We observed a slew of coronavirus-themed domain name registrations, for example, as early as January. George Floyd's death, which sparked several Black Lives Matter movements, is no different. Three days after George Floyd died, our data feed started detecting George Floyd-themed domain names... We retrieved all domain names that contain the strings "eorge," and "lackliv" from 28 May to 7 June and found 402. more
ICANN's repeated betrayals of the public interest have created the conditions for Ethos Capital's proposed purchase of .Org. The growing outrage directed at ICANN is raising questions about ICANN's legitimacy and the wisdom of having entrusted ICANN with oversight over the domain name system ("DNS"). ICANN has shown itself to be out of touch with and unresponsive to the public interest. ICANN now has an opportunity to remember its mission... more
A few weeks ago, on Oct. 1, 2016, Verisign successfully doubled the size of the cryptographic key that generates DNSSEC signatures for the internet's root zone. With this change, root zone DNS responses can be fully validated using 2048-bit RSA keys. This project involved work by numerous people within Verisign, as well as collaborations with ICANN, Internet Assigned Numbers Authority (IANA) and National Telecommunications and Information Administration (NTIA). more
Last week, the Federal Communications Commission (FCC) announced new privacy rules that govern how Internet service providers can share information about consumers with third parties. One focus of this rulemaking has been on the use and sharing of so-called "Consumer Proprietary Network Information (CPNI)" - information about subscribers - for advertising. The Center for Information Technology Policy and the Center for Democracy and Technology jointly hosted a panel exploring this topic last May... more