Number 1, March 2021
Total Page:16
File Type:pdf, Size:1020Kb
Load more
Recommended publications
-
Adopting Encrypted DNS in Enterprise Environments
National Security Agency | Cybersecurity Information Adopting Encrypted DNS in Enterprise Environments Executive summary Use of the Internet relies on translating domain names (like “nsa.gov”) to Internet Protocol addresses. This is the job of the Domain Name System (DNS). In the past, DNS lookups were generally unencrypted, since they have to be handled by the network to direct traffic to the right locations. DNS over Hypertext Transfer Protocol over Transport Layer Security (HTTPS), often referred to as DNS over HTTPS (DoH), encrypts DNS requests by using HTTPS to provide privacy, integrity, and “last mile” source authentication with a client’s DNS resolver. It is useful to prevent eavesdropping and manipulation of DNS traffic. While DoH can help protect the privacy of DNS requests and the integrity of responses, enterprises that use DoH will lose some of the control needed to govern DNS usage within their networks unless they allow only their chosen DoH resolver to be used. Enterprise DNS controls can prevent numerous threat techniques used by cyber threat actors for initial access, command and control, and exfiltration. Using DoH with external resolvers can be good for home or mobile users and networks that do not use DNS security controls. For enterprise networks, however, NSA recommends using only designated enterprise DNS resolvers in order to properly leverage essential enterprise cybersecurity defenses, facilitate access to local network resources, and protect internal network information. The enterprise DNS resolver may be either an enterprise-operated DNS server or an externally hosted service. Either way, the enterprise resolver should support encrypted DNS requests, such as DoH, for local privacy and integrity protections, but all other encrypted DNS resolvers should be disabled and blocked. -
A Letter to the FCC [PDF]
Before the FEDERAL COMMUNICATIONS COMMISSION Washington, DC 20554 In the Matter of ) ) Amendment of Part 0, 1, 2, 15 and 18 of the ) ET Docket No. 15170 Commission’s Rules regarding Authorization ) Of Radio frequency Equipment ) ) Request for the Allowance of Optional ) RM11673 Electronic Labeling for Wireless Devices ) Summary The rules laid out in ET Docket No. 15170 should not go into effect as written. They would cause more harm than good and risk a significant overreach of the Commission’s authority. Specifically, the rules would limit the ability to upgrade or replace firmware in commercial, offtheshelf home or smallbusiness routers. This would damage the compliance, security, reliability and functionality of home and business networks. It would also restrict innovation and research into new networking technologies. We present an alternate proposal that better meets the goals of the FCC, not only ensuring the desired operation of the RF portion of a WiFi router within the mandated parameters, but also assisting in the FCC’s broader goals of increasing consumer choice, fostering competition, protecting infrastructure, and increasing resiliency to communication disruptions. If the Commission does not intend to prohibit the upgrade or replacement of firmware in WiFi devices, the undersigned would welcome a clear statement of that intent. Introduction We recommend the FCC pursue an alternative path to ensuring Radio Frequency (RF) compliance from WiFi equipment. We understand there are significant concerns regarding existing users of the WiFi spectrum, and a desire to avoid uncontrolled change. However, we most strenuously advise against prohibiting changes to firmware of devices containing radio components, and furthermore advise against allowing nonupdatable devices into the field. -
The Future of Free Speech, Trolls, Anonymity and Fake News Online.” Pew Research Center, March 2017
NUMBERS, FACTS AND TRENDS SHAPING THE WORLD FOR RELEASE MARCH 29, 2017 BY Lee Rainie, Janna Anderson, and Jonathan Albright FOR MEDIA OR OTHER INQUIRIES: Lee Rainie, Director, Internet, Science and Technology research Prof. Janna Anderson, Director, Elon University’s Imagining the Internet Center Asst. Prof. Jonathan Albright, Elon University Dana Page, Senior Communications Manager 202.419.4372 www.pewresearch.org RECOMMENDED CITATION: Rainie, Lee, Janna Anderson and Jonathan Albright. The Future of Free Speech, Trolls, Anonymity and Fake News Online.” Pew Research Center, March 2017. Available at: http://www.pewinternet.org/2017/03/29/the-future-of-free-speech- trolls-anonymity-and-fake-news-online/ 1 PEW RESEARCH CENTER About Pew Research Center Pew Research Center is a nonpartisan fact tank that informs the public about the issues, attitudes and trends shaping America and the world. It does not take policy positions. The Center conducts public opinion polling, demographic research, content analysis and other data-driven social science research. It studies U.S. politics and policy; journalism and media; internet, science, and technology; religion and public life; Hispanic trends; global attitudes and trends; and U.S. social and demographic trends. All of the Center’s reports are available at www.pewresearch.org. Pew Research Center is a subsidiary of The Pew Charitable Trusts, its primary funder. For this project, Pew Research Center worked with Elon University’s Imagining the Internet Center, which helped conceive the research as well as collect and analyze the data. © Pew Research Center 2017 www.pewresearch.org 2 PEW RESEARCH CENTER The Future of Free Speech, Trolls, Anonymity and Fake News Online The internet supports a global ecosystem of social interaction. -
What Will Historians' Verdict Be 50 Years from Now About the Impact Of
FOR RELEASE OCTOBER 29, 2019 What Will Historians’ Verdict be 50 Years from Now About the Impact of the Internet on People’s Lives Today? Experts expect that by 2069 today’s period of human-tech evolution could come to be seen as a risks-ridden time that eventually led to a grand redefinition of civilization or it could be seen as a ‘wasted opportunity’ that simply ‘updated and replicated legacy colonial hierarchies’ By Janna Anderson Executive director, Elon University’s Imagining the Internet Center FOR MEDIA OR OTHER INQUIRIES: Owen Covington, News Bureau Director, Elon University 336.278.7413 www.elon.edu RECOMMENDED CITATION Elon University’s Imagining the Internet Center, October 29, 2019, “2069 Historians’ Verdict of Internet Impact 2019” About the Imagining the Internet Center Elon University’s Imagining the Internet Center explores and provides insights into emerging network innovations, global development, dynamics, diffusion and governance. Its research holds a mirror to humanity’s use of communications technologies, informs policy development, exposes potential futures and provides a historic record. It works to illuminate issues in order to serve the greater good, making its work public, free and open. The Imagining the Internet Center sponsors work that brings people together to share their visions for the future of communications and the future of the world. What will historians’ verdict be 50 years from now about the impact of the internet on people’s lives today? Experts expect that by 2069 today’s period of human-tech -
Site Finder and Internet Governance
345 Site Finder and Internet Governance Jonathan Weinberg* 347 INTRODUCTION 348 PART 1. 354 PART 2. 361 PART 3. 366 PART 4. 375 CONCLUSION Copyright © 2004 by Jonathan Weinberg. * Professor of Law, Wayne State University. I am grateful to Michael Froomkin, Mark Lemley, David Maher, Milton Mueller, and Jessica Litman for their comments, and to Susan Crawford and Bret Fausett for answer- ing questions along the way. None of them, of course, is responsible for anything I say here. This essay reflects developments taking place through 30 November 2003. 347 Site Finder and Internet Governance Jonathan Weinberg INTRODUCTION ON SEPTEMBER 15, 2003, VeriSign, Inc.—the company that operates the data- bases that allow internet users to reach any internet resource ending in “.com” or “.net”—introduced a new service it called Site Finder. Less than three weeks later, after widespread protest from the technical community, at least three law- suits, and a stern demand from ICANN (the Internet Corporation for Assigned Names and Numbers, which has undertaken responsibility for managing the internet domain name space), VeriSign agreed to shut Site Finder down.1 In between those dates the internet community saw a passionate debate over the roles of ICANN, VeriSign, and the internet’s technical aristocracy in managing the domain name space. VeriSign has charged that its opponents’ reactions were the product of “obsolete thinking” that would disable it from “build[ing] a commercial busi- ness.”2 ICANN, for its part, is seeking to enact a procedure under which top-level domain name registry operators such as VeriSign must seek ICANN’s approval before offering new services or taking any “significant actions that...could affect the operational stability, reliability, security or global interoperability of...the Internet.”3 Some see fault on all sides: “It’s hard to say,” writes one commenta- tor, “in this case who is being more anti-competitive, ICANN or VeriSign.”4 In this essay, I will try to unpack the Site Finder story. -
To the Members of the Senate Judiciary Committee: We, The
To the members of the Senate Judiciary Committee: We, the undersigned, have played various parts in building a network called the Internet. We wrote and debugged the software; we defined the standards and protocols that talk over that network. Many of us invented parts of it. We're just a little proud of the social and economic benefits that our project, the Internet, has brought with it. We are writing to oppose the Committee's proposed new Internet censorship and copyright bill. If enacted, this legislation will risk fragmenting the Internet's global domain name system (DNS ), create an environment of tremendous fear and uncertainty for technological innovation, and seriously harm the credibility of the United States in its role as a steward of key Internet infrastructure. In exchange for this, the bill will introduce censorship that will simultaneously be circumvented by deliberate infringers while hampering innocent parties' ability to communicate. All censorship schemes impact speech beyond the category they were intended to restrict, but this bill will be particularly egregious in that regard because it causes entire domains to vanish from the Web, not just infringing pages or files. Worse, an incredible range of useful, law-abiding sites can be blacklisted under this bill. These problems will be enough to ensure that alternative name-lookup infrastructures will come into widespread use, outside the control of US service providers but easily used by American citizens. Errors and divergences will appear between these new services and the current global DNS, and contradictory addresses will confuse browsers and frustrate the people using them. -
“The Past and Future of the Internet”
“The Past and Future of the Internet” presented by Dr Glenn Ricart – Ph.D Synopsis: Glenn Ricart will share some of his first-hand stories about how the ARPAnet grew into an international commercial Internet during the 1980s. Then, looking forward, Dr. Ricart will turn to the developments which he believes will need to take place in technology, economics, and politics in order to allow the Internet to continue to grow. Glitches and weaknesses which are tolerable for an entertainment medium will not be acceptable as Internets become more integral to the economy, health and safety, and national defense. Curriculum Vitae: Dr. Glenn Ricart is an Internet pioneer and entrepreneur with a broad range of technology and business leadership experience in large corporations, startups, academia, the U.S. military, and government research. His positions have included President and CEO of National LambdaRail, Managing Director at PricewaterhouseCoopers, Co-founder and Chief Technology Officer of CenterBeam, and Executive Vice President and Chief Technology Officer for Novell. He is known for his pioneering work in bringing the ARPAnet protocols into academic and commercial use. In the mid-1980s, while academic CIO at the University of Maryland College Park, his teams created the first implementation of TCP/IP for the IBM PC; created the first campus-wide TCP/IP network, shipped and managed the software that powered the first non-military TCP/IP national network, the NSFnet; created the first open Internet interchange point (the FIX and later MAE-EAST); and proposed and created the first operating NSFnet regional network, SURAnet. From 1995-1999 he was Novell's EVP and Chief Technology Officer responsible for its technology. -
Securing Information Systems in an Uncertain World Enterprise Level Security 1 William R
Proceedings of IMCIC - ICSIT 2016 Securing Information Systems in an Uncertain World Enterprise Level Security 1 William R. Simpson Institute for Defense Analyses, 4850 Mark Center Dr. Alexandria, Virginia 22311 1 The publication of this paper does not indicate endorsement by the Department of Defense or IDA, nor should the contents be construed as reflecting the official position of these organizations. maintenance. Of course that wasn’t going be tolerated! ABSTRACT They doubled down (Special woods, Special Increasing threat intrusions to enterprise computing systems formulated sealants, Special paints). They still leaked. have led to a formulation of guarded enterprise systems. The A set of boat builders examined the history and came to 2 approach was to put in place steel gates and prevent hostile an epiphany – boats leak . Like all epiphanies, it entities from entering the enterprise domain. The current allows us to re-examine how we handle things. The complexity level has made the fortress approach to security design was modified so that the inside of boats could implemented throughout the defense, banking, and other high accommodate leakage. Drains and channels were added trust industries unworkable. The alternative security approach to funnel water to an area, the bilge, where the water presented in this paper is the result of a concentrated fourteen could be dealt with, manually at first, and then with year program of pilots and research. Its distributed approach automated pumps. A well-sealed boat was still required has no need for passwords or accounts and derives from a set of tenets that form the basic security model requirements. -
The ISP Column Diving Into The
The ISP Column A column on various things Internet October 2018 Geoff Huston Diving into the DNS DNS OARC organizes two meetings a year. They are two-day meetings with a concentrated dose of DNS esoterica. Here’s what I took away from the recent 29th meeting of OARC, held in Amsterdam in mid-October 2018. Cloudflare's 1.1.1.1 service Cloudflare have been running an open public DNS resolver service on 1.1.1.1 for more than six months now. The service, based on the Knot resolver engine, is certainly fast (http://bit.ly/2PBfoSh), and Cloudflare's attention to scale and speed is probably appreciated by users of this service. However, in a broader Internet environment that is now very aware of personal privacy it’s not enough to be fast and accurate. You have to be clear that as an operator of a public DNS resolution service you may be privy to clients’ activities and interests, and you need to clearly demonstrate that you are paying attention to privacy. Not only does this include appropriate undertakings regarding the way you handle and dispose of the logs of the resolvers' query streams, but also in being mindful of the way that users can pass queries to the service. The 1.1.1.1 service supports DNS over TLS 1.3 and 1.2 using the GnuTLS system. This supports long-lived connection with client systems and also supports session resumption. There are a number of DNS tools that can use the DNS over a TLS connection including kdig (http://bit.ly/2A9f9rX, http://bit.ly/2OoLu7a), GetDNS (https://getdnsapi.net/), Unbound (http://bit.ly/2CIKEf0), Android P and the Tenta browser (https://tenta.com/). -
Core Magazine February 2002
FEBRUARY 2002 CORE 3.1 A PUBLICATION OF THE COMPUTER HISTORY MUSEUM WWW.COMPUTERHISTORY.ORG PAGE 1 February 2002 OUR ACTIONS TODAY COREA publication of the Computer History3.1 Museum IN THIS MISSION ISSUE TO PRESERVE AND PRESENT FOR POSTERITY THE ARTIFACTS AND STORIES OF THE INFORMATION AGE INSIDE FRONT COVER VISION OUR ACTIONS TODAY The achievements of tomorrow must be was an outstanding success, and I simply doesn’t exist anywhere else in TO EXPLORE THE COMPUTING REVOLUTION AND ITS John C Toole rooted in the actions we take today. hope you caught the impact of these the world. With your sustained help, our IMPACT ON THE HUMAN EXPERIENCE Many exciting and important events announcements that have heightened actions have been able to speak much 2 THE SRI VAN AND COMPUTER have happened since our last CORE awareness of our enterprise in the louder than words, and it is my goal to INTERNETWORKING publication, and they have been community. I’m very grateful to Harry see that we are able to follow through Don Nielson carefully chosen to strategically shape McDonald (director of NASA Ames), Len on our dreams! EXECUTIVE STAFF where we will be in five years. Shustek (chairman of our Board of 7 John C Toole David Miller Trustees), Donna Dubinsky (Museum This issue of CORE is loaded with THE SRI VAN AND EARLY PACKET SPEECH EXECUTIVE DIRECTOR & CEO VICE PRESIDENT OF DEVELOPMENT 2 Don Nielson First, let me officially introduce our Trustee and CEO of Handspring), and technical content and information about Karen Mathews Mike Williams new name and logo to everyone who Bill Campbell (chairman of Intuit) who our organization—from a wonderful EXECUTIVE VICE PRESIDENT HEAD CURATOR 8 has not seen them before. -
Ikev2 Configuration for Encrypted DNS
IKEv2 Configuration for Encrypted DNS draft-btw-add-ipsecme-ike Mohamed Boucadair (Orange) Tirumaleswar Reddy (McAfee, Inc.) Dan Wing (Citrix Systems, Inc.) Valery Smyslov (ELVIS-PLUS) July 2020, IETF#108 Agenda • Context • A Sample Use Case • IKE Configuration Attribute for Encrypted DNS • Next Steps 2 Problem Description • Several schemes to encrypt DNS have been specified – DNS over TLS (RFC 7858) – DNS over DTLS (RFC 8094) – DNS over HTTPS (RFC 8484) • …And others are being specified: – DNS over QUIC (draft-ietf-dprive-dnsoquic) • How to securely provision clients to use Encrypted DNS? This use can be within or outside the IPsec tunnel 3 A Sample Use Case: DNS Offload • VPN service providers can offer publicly accessible Encrypted DNS – the split-tunnel VPN configuration allows the client to access the DoH/DoT servers hosted by the VPN provider without traversing the tunnel 4 A Sample Use Case: Protecting Internal DNS Traffic • DoH/DoT ensures DNS traffic is not susceptible to internal attacks – see draft-arkko-farrell-arch-model-t-03#section-3.2.1 • encrypted DNS can benefit to Roaming Enterprise users to enhance privacy – With DoH/DoT the visibility of DNS traffic is limited to only the parties authorized to act on the traffic (“Zero Trust Architecture”) 5 Using IKE to Configure Encrypted DNS on Clients • New configuration attribute INTERNAL_ENC_DNS is defined to convey encrypted DNS information to clients: – Encrypted DNS type (e.g., DoH/DoT) – Scope of encrypted DNS use – One or more encrypted DNS server IPv6 addresses • For IPv4 -
About | Network Startup Resource Center
UO Home | Dept Index HOME ABOUT ACTIVITIES NEWS SUPPORTERS CALENDAR Enter your keywords Search About Index Core Support Main Focus Areas Overview Early History: 1990's International TCP/IP Training Workshops Computing, Networking Equipment & Book Donations Hosting Network Engineering Interns Financial and Operational Support Core Support The NSRC is funded by grant number 1451045 from the International Research Network Connections (IRNC) program of the National Science Foundation and Google, with additional contributions from dozens of public and private organizations. The NSRC works closely with several University of Oregon organizations, including the Route Views project, the Network and Telecommunication Services group, UO Libraries, and the Wired Humanities Project (WHP). Main Focus Areas Helping develop and deploy Internet infrastructure in R&E networks Assisting US scientists with international research partnerships World Map of Assistance from 1992-2014 Providing technical information and tools to network operators Providing direct network engineering and design assistance Helping organize regional training workshops and centers Coordinating donations and shipments of networking books and equipment Helping develop Internet eXchange points Helping build wireless network infrastructure Hosting network engineering interns Advising on how to establish help desk/user support services Maintaining a historical archive of Internet connectivity Overview The Network Startup Resource Center works directly with the indigenous network engineers and operators who develop and maintain the Internet infrastructure in their respective countries and regions by providing technical information, engineering assistance, training, donations of networking books, equipment and other resources. The end goal in this work is to make it easier for local scientists, engineers and educators to collaborate via the Internet with their international colleagues by helping to connect communities of interest.