DNS

Sponsored
by

DNS / Most Viewed

UK’s DNS Open to Prying Eyes

Network Penetration conducted a survey at the start of 2003 to check the status of the UK's DNS infrastructure. The second scan of the year has just been completed and the results are much more positive. There are however still some serious holes in major areas...Here is a look at what was tested, the results, some sample zone transfers and recommendations.  more

Can ICANN Meet The Needs Of “Less Developed” Countries?

On World Telecommunications Day last Saturday, the question of the digital divide?the difference between the so-called "developed" and "less developed" countries in terms of the availability and use of new information and communications technologies, particularly regarding access and use of the Internet?was one of the main topics of debate. However, less is understood about the growing knowledge and participation divide between "developed" and "undeveloped" countries on decisions regarding the global structure of the Internet that is currently under the mandate of the Internet Corporation for the Assigned Names and Numbers (ICANN)... more

When Domain Names Aren’t Enough

A recent trend in the Japanese web advertising market may presage changes that could come to the Western world. ...some advertising in Japan now includes a picture of a filled-in browser search box instead of a domain name. The idea is that an advertiser can buy top-of-page advertising at the main search engines for various terms and then suggest to people reading their print ads to use those terms to search. more

A Voting System for Internet by Domain Name Owners - Part I

This is the first part of a 2-part series article describing a method for voting among owners of domain names.

The primary intended use for this is to allow identifiable participants in the domain name system to vote on matters that affect the whole domain name system in an easy (and easily-verifiable) fashion. The method for voting is specifying a string in the whois data for a domain name. more

AWS Unveils Route 53 “Accelerated Recovery” to Bolster DNS Resilience

AWS is introducing Route 53 Accelerated Recovery to help organizations maintain DNS control during regional outages, offering a 60-minute recovery objective and sustained access to key API operations for critical updates and traffic management. more

New gTLDs: The Registry Lock

Last week, The New York Times website domain was hacked by "the Syrian Electronic Army". Other famous websites faced the same attack in 2012 by the Hacker group "UGNazi" and, in 2011 by Turkish hackers. Basically, it seems that no Registrar on the Internet is safe from attack, but the launching of new gTLDs can offer new ways to mitigate these attacks. more

Internet Users: Is It Time For A Declaration Of Independence?

Although, undoubtedly, it is disappointing, it is not surprising that after four years of experimenting with Internet governance, the first corporate entity to take on the ambitious task -- the Internet Corporation for Assigned Names and Numbers (ICANN) -- has not achieved the legitimacy of a global consensus-based manager of the Internet's domain name system. Simson Garfinkel explains, in his insightful piece in the March 2003 issue of Technology Review, that it has become conventional wisdom that "ICANN serves as a model for systematically shutting the public out" of its policy making activities. It should go without further explanation that the ICANN model is a particularly bad governance model, if consensus-building is supposed to be the corporation's linchpin of legitimacy. Among a few other concerns, ICANN, unmistakably, suffers from power-sharing phobia. more

Russian Minister of Telecom and Mass Communications Talks About Cyrillic Domain Names

Igor Schegolev, the Russian Minister of Telecom and Mass Communications spoke at the opening of the InfoCom 2008 exhibition in Moscow. Among other things, which made news (for example, that the Russian government will be implementing a free and open source based operating system on all computers in the Russian schools), he also made the following remarks - translated by me in English. more

Why DNS Blacklists Don’t Work for IPv6 Networks

All effective spam filters use DNS blacklists or blocklists, known as DNSBLs. They provide an efficient way to publish sets of IP addresses from which the publisher recommends that mail systems not accept mail. A well run DNSBL can be very effective; the Spamhaus lists typically catch upwards of 80% of incoming spam with a very low error rate. DNSBLs take advantage of the existing DNS infrastructure to do fast, efficient lookups. A DNS lookup typically goes through three computers... more

NSI: “Don’t Taunt Them, Kill Them”

Clearly whatever it is that Dutch politician Geert Wilders wants to talk about in his film is going to be the end of the internet. The news that Network Solutions decided to pre-empt his use of a domain name registered through them for the purpose of promoting his film need not be re-hashed here. However, before bemoaning yet another registrar freely deciding, as is its right, with whom it chooses to do business, it's important to look at the big picture. No, it is not "censorship" for Network Solutions to decide how it wants its services to be used... But, perhaps we might understand Network Solutions policy more clearly by looking at domain names registered through NSI... more

Email in the World’s Languages - Part I

Back when the Internet was young end servers came with shovels (for the coal), everyone on the net spoke English, and all the e-mail was in English. To represent text in a computer, each character needs to have a numeric code. The most common code set was (and is) ASCII, which is basically the codes used by the cheap, reliable Teletype printing terminals everyone used as their computer consoles. ASCII is a seven bit character code, code values 0 through 127, and it includes upper and lower case letters and a reasonable selection of punctuation adequate for written English. more

Domain Name Hijacking Affects Local Illinois Campaign in Will County

We've previously noted here the challenge of dealing with domain name disputes based on personal names, particularly in the political arena. Now that the campaigns are over and all are taking a deep breath, we can reflect back on one of the domain name disputes arising in the political campaign this year for the office of State's Attorney in Will County Illinois. more

U.S. CERT Issues Alert on DNS Amplification Attacks

Neil Schwartzman writes to report that U.S. Cert issued Alert TA13-088A on Friday March 29, 2013. "It is a solid how-to guide to test for, and remediate DNS configurations that can be used for Distributed Denial of Service attacks." more

7 Must Have Attributes of an IP Address Management System

Exponential growth of networks combined with the complexity introduced by IT initiatives e.g. VoIP, Cloud computing, server virtualization, desktop virtualization, IPv6 and service automation has required network teams to look for tools to automate IP address management (IPAM). Automated IPAM tools allow administrators to allocate subnets, allocate/track/reclaim IP addresses and provide visibility into the networks. Here are some examples of what a typical IPAM tool can do... more

Call for Participation - ICANN DNSSEC and Security Workshop for ICANN78 Annual General Meeting

In cooperation with the ICANN Security and Stability Advisory Committee (SSAC), we are planning a DNSSEC and Security Workshop for the ICANN78 Annual General Meeting being held as a hybrid meeting from 21-26 October 2023 in Hamburg, Germany in the Central European Summer Time Zone (UTC +2). This workshop date will be determined once ICANN creates a block schedule for us to follow; then we will be able to request a day and time. more