Verisign, Inc.'S Response to Report from the Icann Security and Stability Committee Re “Redirection in The
Total Page:16
File Type:pdf, Size:1020Kb
Load more
Recommended publications
-
Proactive Cyberfraud Detection Through Infrastructure Analysis
PROACTIVE CYBERFRAUD DETECTION THROUGH INFRASTRUCTURE ANALYSIS Andrew J. Kalafut Submitted to the faculty of the Graduate School in partial fulfillment of the requirements for the degree Doctor of Philosophy in Computer Science Indiana University July 2010 Accepted by the Graduate Faculty, Indiana University, in partial fulfillment of the requirements of the degree of Doctor of Philosophy. Doctoral Minaxi Gupta, Ph.D. Committee (Principal Advisor) Steven Myers, Ph.D. Randall Bramley, Ph.D. July 19, 2010 Raquel Hill, Ph.D. ii Copyright c 2010 Andrew J. Kalafut ALL RIGHTS RESERVED iii To my family iv Acknowledgements I would first like to thank my advisor, Minaxi Gupta. Minaxi’s feedback on my research and writing have invariably resulted in improvements. Minaxi has always been supportive, encouraged me to do the best I possibly could, and has provided me many valuable opportunities to gain experience in areas of academic life beyond simply doing research. I would also like to thank the rest of my committee members, Raquel Hill, Steve Myers, and Randall Bramley, for their comments and advice on my research and writing, especially during my dissertation proposal. Much of the work in this dissertation could not have been done without the help of Rob Henderson and the rest of the systems staff. Rob has provided valuable data, and assisted in several other ways which have ensured my experiments have run as smoothly as possible. Several members of the departmental staff have been very helpful in many ways. Specifically, I would like to thank Debbie Canada, Sherry Kay, Ann Oxby, and Lucy Battersby. -
Opendns 1 Opendns
OpenDNS 1 OpenDNS OpenDNS Type DNS Resolution Service Founded 2005 Headquarters San Francisco, California Key people David Ulevitch (Founder & CEO) [1] Employees 20 [2] Website OpenDNS.com OpenDNS is a Domain Name System (DNS) resolution service. OpenDNS extends DNS adding features such as misspelling correction, phishing protection, and optional content filtering. It provides an ad-supported service[3][4] "showing relevant ads when we [show] search results" and a paid advertisement-free service. Services DNS OpenDNS offers DNS resolution as an alternative to using Internet service providers' DNS servers. There are OpenDNS servers in strategic locations, and they also employ a large cache of the domain names.. OpenDNS has adopted and supports DNSCurve.[5] OpenDNS provides the following recursive nameserver addresses[6] for public use, mapped to the nearest operational server location by anycast routing: • 208.67.222.222 (resolver1.opendns.com) • 208.67.220.220 (resolver2.opendns.com) • 208.67.222.220 [6] • 208.67.220.222 [6] IPv6 addresses (experimental)[7] • 2620:0:ccc::2 • 2620:0:ccd::2 Other features include a phishing filter, domain blocking and typo correction (for example, typing "example.og" instead of "example.org"). OpenDNS maintains a list of malicious sites and blocks access to them when a user tries to access them through their service. OpenDNS also run a service called PhishTank for users to submit and review suspected phishing sites. The name OpenDNS refers to the DNS concept of being open, where queries from any source are accepted. It is not related to open source software; the service is based on closed-source software.[8] OpenDNS earns a portion of its revenue by resolving a domain name to an OpenDNS server when the name is not otherwise defined in DNS. -
Project 1 Grading Is Done
Project 1 Grading is done 1 No team, no points. No compile, no points Recap 2 The IPv4 Shortage 3 Problem: consumer ISPs typically only give one IP address per-household ! Additional IPs cost extra ! More IPs may not be available NAT and DHCP NAT + DHCP Basic NAT Operation 4 Private Network Internet Source: 192.168.0.1 Source: 66.31.210.69 Dest: 74.125.228.67 Dest: 74.125.228.67 Private Address Public Address 192.168.0.1:2345 74.125.228.67:80 192.168.0.1 66.31.210.69 74.125.228.67 Source: 74.125.228.67 Source: 74.125.228.67 Dest: 192.168.0.1 Dest: 66.31.210.69 Port-forwarding 5 DHCP: Dynamic Host Configuration Protocol 6 Let’s say that a ISP has X customers, How many IPs does it need to have? X? Goal: allow host to dynamically obtain its IP address from network server when it joins network can renew its lease on address in use allows reuse of addresses (only hold address while connected/“on”) support for mobile users who want to join network (more shortly) DHCP Client-Server 7 DHCP 223.1.1.0/24 server 223.1.1.1 223.1.2.1 223.1.1.2 arriving DHCP 223.1.1.4 223.1.2.9 client needs address in this 223.1.2.2 network 223.1.1.3 223.1.3.27 223.1.2.0/24 223.1.3.1 223.1.3.2 DHCP Client-Server 8 DHCP server: 223.1.2.5 DHCP discover arriving client src : 0.0.0.0, 68 Broadcast:dest.: 255.255.255.255,67 is there a DHCP serveryiaddr: out 0.0.0.0 there? transaction ID: 654 DHCP offer src: 223.1.2.5, 67 Broadcast:dest: 255.255.255.255, I’m a DHCP 68 server!yiaddrr: Here’s 223.1.2.4 an IP transaction ID: 654 addresslifetime: you3600 cansecs use DHCP request src: 0.0.0.0, 68 dest:: 255.255.255.255, 67 Broadcast:yiaddrr: 223.1.2.4 OK. -
Secure Domain Name System (DNS) Deployment Guide
NIST Special Publication 800-81-2 Secure Domain Name System (DNS) Deployment Guide Ramaswamy Chandramouli Scott Rose C O M P U T E R S E C U R I T Y NIST Special Publication 800-81-2 Secure Domain Name System (DNS) Deployment Guide Ramaswamy Chandramouli Computer Security Division Information Technology Laboratory Scott Rose Advanced Network Technology Division Information Technology Laboratory September 2013 U.S. Department of Commerce Penny Pritzker, Secretary National Institute of Standards and Technology Patrick D. Gallagher, Under Secretary of Commerce for Standards and Technology and Director Authority This publication has been developed by NIST to further its statutory responsibilities under the Federal Information Security Management Act (FISMA), Public Law (P.L.) 107-347. NIST is responsible for developing information security standards and guidelines, including minimum requirements for Federal information systems, but such standards and guidelines shall not apply to national security systems without the express approval of appropriate Federal officials exercising policy authority over such systems. This guideline is consistent with the requirements of the Office of Management and Budget (OMB) Circular A-130, Section 8b(3), Securing Agency Information Systems, as analyzed in Circular A-130, Appendix IV: Analysis of Key Sections. Supplemental information is provided in Circular A-130, Appendix III, Security of Federal Automated Information Resources. Nothing in this publication should be taken to contradict the standards and guidelines made mandatory and binding on Federal agencies by the Secretary of Commerce under statutory authority. Nor should these guidelines be interpreted as altering or superseding the existing authorities of the Secretary of Commerce, Director of the OMB, or any other Federal official. -
Signposts in Cyberspace: the Domain Name System and Internet Navigation
Prepublication Copy—Subject to Further Editorial Correction Signposts in Cyberspace: The Domain Name System and Internet Navigation Committee on Internet Navigation and the Domain Name System: Technical Alternatives and Policy Implications Computer Science and Telecommunications Board Division on Engineering and Physical Sciences NATIONAL ACADEMIES PRESS Washington, D.C. www.nap.edu Prepublication Copy—Subject to Further Editorial Correction THE NATIONAL ACADEMIES PRESS 500 Fifth Street, N.W. Washington, D.C. 20001 NOTICE: The project that is the subject of this report was approved by the Governing Board of the National Research Council, whose members are drawn from the councils of the National Academy of Sciences, the National Academy of Engineering, and the Institute of Medicine. The members of the committee responsible for the report were chosen for their special competences and with regard for appropriate balance. Support for this project was provided by the U.S. Department of Commerce and the National Science Foundation under Grant No. ANI-9909852 and by the National Research Council. Any opinions, findings, conclusions, or recommendations expressed in this publication are those of the authors and do not necessarily reflect the views of the National Science Foundation or the Commerce Department. International Standard Book Number Cover designed by Jennifer M. Bishop. Copies of this report are available from the National Academies Press, 500 Fifth Street, N.W., Lockbox 285, Washington, D.C. 20055, (800) 624-6242 or (202) 334-3313 in the Washington metropolitan area. Internet, http://www.nap.edu Copyright 2005 by the National Academy of Sciences. All rights reserved. Printed in the United States of America Prepublication Copy—Subject to Further Editorial Correction The National Academy of Sciences is a private, nonprofit, self-perpetuating society of distinguished scholars engaged in scientific and engineering research, dedicated to the furtherance of science and technology and to their use for the general welfare. -
Domain Name System - Wikipedia, the Free Encyclopedia
Domain Name System - Wikipedia, the free encyclopedia Create account Log in Article Talk Read Edit View history Domain Name System From Wikipedia, the free encyclopedia Main page The ( ) is a hierarchical Domain Name System DNS Internet protocol suite Contents distributed naming system for computers, services, or Application layer Featured content any resource connected to the Internet or a private DHCP · DHCPv6 · DNS · FTP · HTTP · Current events network. It associates various information with domain IMAP · IRC · LDAP · MGCP · NNTP · BGP · Random article names assigned to each of the participating entities. NTP · POP · RPC · RTP · RTSP · RIP · SIP · Donate to Wikipedia Most prominently, it translates easily memorised domain SMTP · SNMP · SOCKS · SSH · Telnet · TLS/SSL · XMPP · (more) · Interaction names to the numerical IP addresses needed for the Transport layer Help purpose of locating computer services and devices TCP · UDP · DCCP · SCTP · RSVP · (more) · About Wikipedia worldwide. By providing a worldwide, distributed Internet layer Community portal keyword-based redirection service, the Domain Name IP(IPv4 · IPv6 · ·ICMP · ICMPv6 · ECN · System is an essential component of the functionality of Recent changes IGMP · IPsec · (more) · the Internet. Contact Wikipedia Link layer An often-used analogy to explain the Domain Name ARP/InARP · NDP · OSPF · Toolbox System is that it serves as the phone book for the Tunnels(L2TP · ·PPP · Print/export Internet by translating human-friendly computer Media access control(Ethernet · DSL · ISDN · FDDI · ·(more) · hostnames into IP addresses. For example, the domain Languages V T E name www.example.com translates to the addresses · · · Afrikaans 192.0.43.10 (IPv4) and 2001:500:88:200::10 (IPv6). -
CSE 265: System & Network Administration
CSECSE 265:265: SystemSystem && NetworkNetwork AdministrationAdministration ● DNS – The Domain Name System – History of DNS – What does DNS do? – The DNS namespace – BIND software – How DNS works – DNS database – Testing and debugging (tools) Spring 2012 CSE 265: System and Network Administration ©2004-2012 Brian D. Davison DNSDNS HistoryHistory ● In original ARPANET, a single text file listed all machines – Updates used significant portion of available bandwidth – File was still constantly out of date ● DNS solves scalability problem – Hierarchical host naming – Distributed responsibility } Major ideas! – Caching of content Spring 2012 CSE 265: System and Network Administration ©2004-2012 Brian D. Davison WhatWhat doesdoes DNSDNS do?do? – Provides hostname – IP lookup services ● www.lehigh.edu = 128.180.2.57 – DNS defines ● A hierarchical namespace for hosts and IP addresses ● A distributed database of hostname and address info ● A “resolver” – library routines that query this database ● Improved routing for email ● A mechanism for finding services on a network ● A protocol for exchanging naming information – DNS is essential for any org using the Internet Spring 2012 CSE 265: System and Network Administration ©2004-2012 Brian D. Davison Spring 2012 CSE 265: System and Network Administration ©2004-2012 Brian D. Davison WhatWhat usesuses DNS?DNS? ● Any application that operates over the Internet ● Such as – email ● Spam filters – WWW – FTP – IRC, IM – Windows update – telnet, ssh Spring 2012 CSE 265: System and Network Administration ©2004-2012 Brian D. Davison TheThe DNSDNS namespacenamespace – A tree of “domains” – Root is “.” (dot), followed by top-level (root-level) domains – Two branches of tree ● One maps hostnames to IP addresses Some illustrations from O'Reilly's DNS & Bind ● Other maps IP address back to hostnames – Two types of top-level domain names used today ● gTLDs: generic top-level domains ● ccTLDs: country code top-level domains Spring 2012 CSE 265: System and Network Administration ©2004-2012 Brian D. -
Site Finder and Internet Governance Jonathan Weinberg*
Site Finder and Internet Governance Jonathan Weinberg* I. INTRODUCTION On September 15, 2003, VeriSign, Inc. — the company that operates the databases that allow Internet users to reach any Internet resource ending in “.com” or “.net” — introduced a new service it called Site Finder. Less than three weeks later, after widespread protest from the technical community, at least three lawsuits, and a stern demand from ICANN (the Internet Corporation of Assigned Names and Numbers, which has undertaken responsibility for managing the Internet domain name space), VeriSign agreed to shut Site Finder down.1 In between those dates, the Internet community saw a passionate debate over the roles of ICANN, VeriSign, and the Internet’s technical aristocracy in managing the domain name space. VeriSign has charged that its opponents’ reactions were the product of “obsolete thinking” that would disable it from “build[ing] a commercial business.”2 ICANN, for its part, is seeking to enact a procedure under which top-level domain name registry operators such as VeriSign must seek ICANN’s approval before offering new services or taking any “significant actions that . could affect the operational stability, reliability, security or global interoperability of . the Internet.”3 Some see fault on all sides: “It's hard to say,” writes one commentator, “in this case who is being more anti-competitive, ICANN or VeriSign.”4 In this essay, I will try to unpack the Site Finder story. In Part I, I will explain what VeriSign did, and how others reacted. In Part II, I’ll address the Site Finder service from a technical standpoint, and in Part III from a regulatory one. -
SSAC Wildcard Report
Table of Contents Table of Contents ........................................................................................................... i Preface and Acknowledgements .................................................................................. ii Executive Summary..................................................................................................... iv 1.0 Introduction............................................................................................................. 1 2.0 Summary of Events and Issues Raised by the Internet Technical Community 3 2.1 Events of September – October 2003 ................................................................... 3 2.2 VeriSign’s Presentation and Input ........................................................................ 5 2.3 Design Principles and Good Practice in the Internet Technical Community ....... 8 2.4 ICANN, IP Addresses, Domain Names, Wildcards and Error Messages........... 10 2.5 Summary of Technical Issues ............................................................................. 13 2.5.1 Protocol Independence and the Effects on Mail Systems ............................ 14 2.5.2 Site Finder.................................................................................................... 16 2.5.3 Workarounds and Inconsistencies: Implications for End Users.................. 18 2.6 Discussion and Conclusion................................................................................. 20 3.0 Findings and Recommendations......................................................................... -
Hobbes' Internet Timeline - the Definitive Arpanet & Internet History
Hobbes' Internet Timeline - the definitive ARPAnet & Internet history [ 1950s ] [ 1960s ] [ 1970s ] [ 1980s ] [ 1990s ] [ 2000s ] [ Growth ] [ FAQ ] [ Sources ] Hobbes' Internet Timeline v7.0 by Robert H'obbes' Zakon Zakon Group LLC Hobbes' Internet Timeline Copyright (c)1993-2004 by Robert H Zakon. Permission is granted for use of this document in whole or in part for non-commercial purposes as long as this Copyright notice and a link to this document, at the archive listed at the end, is included. A copy of the material the Timeline appears in is requested. For commercial uses, please contact the author first. Links to this document are welcome after e-mailing the author with the document URL where the link will appear. As the Timeline is frequently updated, copies to other locations on the Internet are not permitted. If you enjoy the Timeline or make use of it in some way, please consider a contribution. 1950s 1957 USSR launches Sputnik, first artificial earth satellite. In response, US forms the Advanced Research Projects Agency (ARPA), the following year, within the Department of Defense (DoD) to establish US lead in science and technology applicable to the military (:amk:) 1960s 1961 Leonard Kleinrock, MIT: "Information Flow in Large Communication Nets" (May 31) ❍ First paper on packet-switching (PS) theory 1962 J.C.R. Licklider & W. Clark, MIT: "On-Line Man Computer Communication" (August) ❍ Galactic Network concept encompassing distributed social interactions 1964 Paul Baran, RAND: "On Distributed Communications Networks" ❍ Packet-switching -
LIU Udel 0060D 13322.Pdf
UNDERSTANDING AND DETECTING NEWLY EMERGING ATTACK VECTORS IN CYBERCRIMES by Daiping Liu A dissertation defense submitted to the Faculty of the University of Delaware in partial fulfillment of the requirements for the degree of Doctor of Philosophy in Electrical & Computer Engineering 2018 c 2018 Daiping Liu All Rights Reserved UNDERSTANDING AND DETECTING NEWLY EMERGING ATTACK VECTORS IN CYBERCRIMES by Daiping Liu Approved: Kenneth E. Barner, Ph.D. Chair of the Department of Electrical Engineering Approved: Babatunde A. Ogunnaike, Ph.D. Dean of the College of Engineering Approved: Ann L. Ardis, Ph.D. Senior Vice Provost for Graduate and Professional Education I certify that I have read this dissertation defense and that in my opinion it meets the academic and professional standard required by the University as a dissertation defense for the degree of Doctor of Philosophy. Signed: Haining Wang, Ph.D. Professor in charge of dissertation defense I certify that I have read this dissertation defense and that in my opinion it meets the academic and professional standard required by the University as a dissertation defense for the degree of Doctor of Philosophy. Signed: Chase Cotton, Ph.D. Member of dissertation defense committee I certify that I have read this dissertation defense and that in my opinion it meets the academic and professional standard required by the University as a dissertation defense for the degree of Doctor of Philosophy. Signed: Xiaoming Li, Ph.D. Member of dissertation defense committee I certify that I have read this dissertation defense and that in my opinion it meets the academic and professional standard required by the University as a dissertation defense for the degree of Doctor of Philosophy. -
ICANN Hires Former Cybersecurity Chief As New CEO (Update) 26 June 2009, by ANICK JESDANUN , AP Technology Writer
ICANN hires former cybersecurity chief as new CEO (Update) 26 June 2009, By ANICK JESDANUN , AP Technology Writer The Internet agency with key oversight of the move likely to spawn hundreds or thousands of new monikers behind every Web site, e-mail address Internet addresses in the coming years. A launch, and Twitter post named former U.S. cybersecurity though, has been delayed as objections were chief Rod Beckstrom Friday as its next chief raised over such issues as whether trademark executive. owners could wind up having to buy thousands of new domain names simply to protect their The board of the Internet Corporation for Assigned intellectual-property rights. Names and Numbers approved his hiring in a voice vote Friday as ICANN capped weeklong meetings ICANN also is close to allowing entire Internet in Sydney, Australia. Beckstrom becomes CEO addresses to be in languages other than English for next Wednesday. the first time, potentially opening the Web up to more people around the world. Beckstrom, who had resigned after less than a year as cybersecurity director amid persistent turf The ICANN board on Friday approved a working battles, brings credentials in industry, government group to study uniform requirements for contact and diplomacy - but little direct experience with information and other data when registering a domain names and broader Internet addressing domain name. Currently, the requirements can vary issues, ICANN's chief mission. from suffix to suffix, making it difficult at times to track a domain name owner. In an interview with The Associated Press, Beckstrom said that won't be a problem because The board also indicated that when new domain he saw his job as bringing various constituencies names are introduced in any language, the with various expertise together, rather than operators of such names won't be able to create creating policies himself.