Namecoin. Andreas Loibl
|
|
|
- Hortense Brown
- 10 years ago
- Views:
Transcription
1 Namecoin Andreas Loibl Betreuer: Johannes Naab Seminar Innovative Internettechnologien und Mobilkommunikation SS2014 Lehrstuhl Netzarchitekturen und Netzdienste Fakultät für Informatik, Technische Universität München ABSTRACT This paper gives a brief introduction into alternative naming systems and how they can prevent and circumvent censorship. It explains the concepts of the peer-to-peer (P2P) based cryptocurrency Bitcoin and how it can be extended to implement an alternative naming system (Namecoin) without a need for a trusted authority. Namecoin domains are stored in the distributed Namecoin blockchain, a public ledger of every Namecoin transaction ever executed. It does not integrate directly in the regular domain name system (DNS), in order to resolve such domains a browser addon/extension is required. Problems like this lack of integration and usability have prevented Namecoin from being widely used currently. Keywords Namecoin, Bitcoin, DNS, NMC, BTC 1. INTRODUCTION Within the current DNS structure the server operators have the power to censor information by seizing or redirecting domain names. For example, in the weeks before the local elections the Turkish government blocked Twitter and Youtube by redirecting their DNS records [1. Another example is China, where DNS cache poisoning is commonly used to censor domains for their citizens [2. One possible way to prevent and circumvent censorship like this is Namecoin, a distributed, secure and trustless domain name system that has no central authority. In section 2 the paper presents the properties of naming systems and cryptocurrencies. Section 3 gives an introduction to Namecoin and explains how to register domains within the Namecoin namespace, what those domains can be used for and compare this system to regular DNS and other alternative naming systems. The paper concludes with section 4 after outlining problems and usage statistics of the current Namecoin implementation and in section 5 the referenced materials are listed. 2. ZOOKO S TRIANGLE Zooko Wilcox-O Hearn [3 claims that any naming system can only fulfill two of the following three desirable properties: 1. Secure, i.e. globally unique: There is only one, unique and specific entity to which the name maps. Nobody can successfully pretend to be the owner of someone else s domain name. 2. Decentralized: There is no centralized authority for determining the meaning of a name. 3. Human-meaningful: Names are arbitrarily chosen strings short enough for humans to memorize. This leaves three possible choices to implement a naming system [4: Compromise decentralization: e.g. DNSSEC is secure and human-meaningful, but not decentralized. It is implemented with digitally signed records for DNS lookups using public-key cryptography. Compromise human-readability: e.g. Tor.onion and Bitcoin addresses are secure and decentralized, but not human-meaningful, because the name is just a hashed representation of a public key. Compromise security/ integrity: petname systems (e.g. locally defining names in /etc/hosts) are humanmeaningful and decentralized, but not secure, as locally defined names are not globally unique. 2.1 Squaring Zooko s triangle using Bitcoin In January of 2011 Aaron Swartz published an idea called Squaring The Triangle [5 in which he disproved Zooko s theory by designing a naming system that fulfills all three properties: A naming system based on Bitcoin which uses Bitcoin s distributed blockchain as a proof-of-work to establish consensus of domain name ownership Bitcoin blockchain The blockchain is the main invention of Bitcoin [6. It is a transaction database that contains every transaction ever executed. Every client connected to the Bitcoin P2P network maintains a full copy of the blockchain and thus can find out how many Bitcoins belong to an address at any point in history by traversing the chain of transactions. A transaction is a signed message that transfers certain amounts of Bitcoins from one or more previous transactions to one or more Bitcoin addresses. Each Bitcoin address is a 107 doi: /NET _14
2 representation of the public key of a private-public keypair. The private key of such a keypair is used to sign transaction messages that transfer Bitcoins from the corresponding Bitcoin address. The signed transaction is then broadcasted to every node of the Bitcoin network. Everyone can then verify the authenticity of the transaction using the public key from the sender s address. These transactions are collected into blocks. A new block includes several recent transactions that have not yet been merged into the blockchain (so-called unconfirmed transactions ). Once a block is created it is broadcasted and appended to the blockchain and thus becomes part of the Bitcoin history, which means that it will never be changed or removed again (so the transactions of this block are confirmed transactions now). Every block in the blockchain contains a reference to its previous block, thus creating a chain from the first block (genesis block) to the current one. The block-reference is a cryptographic hash of the previous block. This ensures the integrity of the chain, as any modification to a block would result in a different hash for the block and thus the reference in the next block would change, resulting in a different hash for every block after Proof of work The creation of a block and appending it to the blockchain is called mining. This is a purposely expensive process that requires solving a unique and difficult math problem so that the number of blocks mined each day remains steady. The math problem to solve is used as a proof-of-work, as it is easy to check whether a solution is valid, but it is difficult to find a solution, as this requires a lot of trial and error. In Bitcoin the proof-of-work scheme is SHA-256, which means that the SHA-256 hash of a block s header must be lower than or equal to a specific target value in order for the block to be valid. 2.2 From Bitcoin to Namecoin Namecoin is based on the code of Bitcoin, it uses the same proof-of-work algorithm and is limited to 21 million coins, but it has its own blockchain beginning with a different genesis block and thus it is a separate currency. In comparison to Bitcoin it has implemented additional RPC (remote procedure call) commands that allow its users to record and transfer arbitrary names (keys) and attach data (values) to those keys in the blockchain by sending special transactions. Those keys are secure and decentralized (as they are stored in the blockchain, so every node can check the validity of the operations on a key) and globally unique and humanmeaningful (as they can be arbitrarily chosen), so they are fulfilling all three properties of Zooko s triangle and thus are allowing Namecoin to act as a decentralized naming system. 3. NAMECOIN The Namecoin blockchain was started on April 18, 2011 and since then on average every 10 minutes a new block is being added. Initially the miners are rewarded with 50 Namecoins for each block, with the reward being halved every 210,000 blocks (approx. every 4 years). In order to participate in the Namecoin currency a node needs to run a Namecoin client that has a full copy of the Namecoin blockchain and keep it in sync with the P2P network by fetching and validating new blocks from connected peers. The official reference implementation of such a Namecoin client is namecoind [10, which can be run in the background as daemon. It automatically connects to the Namecoin network and downloads the blockchain. It also holds the user s wallet, which contains the private keys of the keypairs of the user s Namecoin addresses. The namecoind daemon can be controlled by HTTP JSON-RPC commands or via the command-line, e.g.: $ namecoind -daemon namecoin server starting $ namecoind getbalance There are several predefined and proposed namespaces for specific use cases as listed in Table 1. For example, by registering a name in the id/ namespace users could use the Namecoin naming system to create online identities and with the help of NameID [14 turn this Namecoin identity into an OpenID, which can then be used to sign into millions of OpenID-enabled websites. Namecoin s biggest and most popular namespace is however the Domain namespace d/ which can be used to register and manage domain names for the virtual top level domain (TLD).bit. 3.1 Domain namespace The following sections will describe how the Namecoin system can be used to register a domain in the Namecoin Domain namespace, and how those domains can be accessed with browsers Registering a domain A.bit domain can be registered using the Namecoin RPC commands name_new and name_firstupdate, e.g. in order to register the domain example.bit the name d/example has to be pre-ordered first using name_new: $ namecoind name_new d/example [ "7004db3cfda8c09945e00b5a793...", "abf1c2b6a64c1575" This will reserve the domain name by sending a transaction with a hashed version of the domain name, salted with a random value (in this example the random salt is abf1c2... for transaction ID 7004db... ). $ namecoind gettransaction 7004db3cfda8c "amount" : , "fee" : , "confirmations" : 0, "txid" : "7004db3cfda8c09945e00b5a793...", "time" : , "details" : [ 108 doi: /NET _14
3 Namespace Application Status d/<domain> Domain names for.bit TLD active id/<identity> Public online identity system (e.g. addresses for BTC, NMC, ,...) active p/<personal> Personal namespace for PGP, SSL, identities, etc. draft m/<message> Messaging system for Namecoin users draft a/<alias> Alias system to map a name to another address draft tor/<domain> Domain names for.tor TLD for onion websites draft Table 1: Namecoin namespaces [9 "account" : "", "address" : "name_new: 13d047d ", "category" : "send", "amount" : , "fee" : The additional pre-order step is implemented in order to prevent others from stealing the domain by quickly registering the domain for themselves while the transaction for the domain registration is still unconfirmed, i.e. waiting to be included in one of the next blocks. This is why name_firstupdate will only be accepted after a mandatory wait period of 12 additional blocks on the blockchain after the corresponding name_new. Depending on the network activity waiting for 12 blocks generally takes some time between 2 hours and 2 days. Afterwards the domain registration can be finalized using the random value and the transaction ID from the output of the previous name_new command and initialized with data. Arbitrary data can be stored for Namecoin keys, but in order to be able to resolve a.bit domain the data has to be JSONencoded according to the schema defined in the Namecoin Domain Name Specification [8, e.g. to resolve a domain to an IP address: $ namecoind name_firstupdate d/example \ > abf1c2b6a64c db3cfda8c09945e00b5a \ > "ip":" " 8b21511aa033ff4f5e219f548df... $ namecoind gettransaction 8b21511aa033ff4f5e... "amount" : , "fee" : , "confirmations" : 0, "txid" : "8b21511aa033ff4f5e219f548df...", "time" : , "details" : [ "account" : "", "address" : "name_firstupdate: d/example", "category" : "send", "amount" : , "fee" : In case of a name collision of the name_firstupdate command the one with the older name_new transaction wins. After the name_firstupdate transaction has been added to the blockchain the domain name is registered and valid: $ namecoind name_list [ "name" : "d/example", "value" : "\"ip\":\" \"", "address" : "N1omps5uMutW9xx3gxRmwBaa...", "expires_in" : Names and values are attached to special coins with a value of 0.01 NMC (Namecoins), stored in the user s wallet (i.e. the user owns the domain). A domain will expire 36,000 blocks (approx. 250 days) after its registration or last update. Updates are performed by creating a transaction with the name s previous coin as input. The Namecoin core code prevents those coins from being used for normal payments [7. The domain can be updated using the name_update command to change its value or reset its expiration period: $ namecoind name_update d/example "ip":" " Resolving a domain The top level domain.bit which is used for the domain names stored in the Namecoin blockchain is a virtual TLD that is not sanctioned by the ICANN (Internet Corporation for Assigned Names and Numbers) and thus is not assigned in the DNS root zone, so regular DNS servers are unable to resolve queries for.bit domains and will return a NXDOMAIN error instead. There are various ways how users can reconfigure their systems and/or install additional software in order to be able to lookup.bit domains. A comparison of different Namecoin domain lookup software is shown in Table 2. NMControl. NMControl is a daemon written in python that (amongst other features) acts as a local DNS server. The aim of this software is to allow developers to easily build services on top of Namecoin. When using its DNS server to resolve.bit domains it doesn t require trusting any third-party, all data is verified against the local Namecoin blockchain data. Therefore it requires a namecoind to be running in the background that has a full copy of the 109 doi: /NET _14
4 local copy of access.bit DNS TLS verify supported Operating Systems blockchain websites (HTTP) lookup (HTTPS) and Software FreeSpeechMe!!! Firefox on Windows / Linux NMControl!!! Windows / Linux MeowBit!!! Windows outside DNS suffix!! any outside DNS resolver!! any outside proxy! any Table 2: Comparison of some Namecoin domain lookup solutions blockchain in sync with the Namecoin network. NMControl works on Linux and on Windows and is compatible with all Internet applications, not just a web browser. The user has to change the DNS settings of his operating system manually to use NMControl s local DNS server when it is running in order to be able to resolve.bit domains. MeowBit. MeowBit is a Windows application that is based on NMControl. It adds a GUI that manages the included NMControl daemon. The primary difference is that it is easier to use for the end user, as it automatically hooks and unhooks the local name server to the DNS settings of the operating system. Another advantage for the end user is that it is available as a single installation bundle ( setup.exe ), so the Windows user doesn t have to take care of installing Python, fetching the NMControl source code, configuring its DNS plugin, etc. It only requires to have the Namecoin wallet software running in the background, which can simply be downloaded as a pre-compiled Windows binary from the official Namecoin website. FreeSpeechMe. FreeSpeechMe is a browser extension that only works with the Mozilla Firefox browser for Linux and Windows operating systems. It can resolve.bit domains to IP addresses from the IP address mappings stored in the Namecoin blockchain. It retrieves the blockchain data via NMControl, therefore it requires NMControl and a Namecoin wallet software (or namecoind) to be installed and running in the background. Unlike plain NMControl the Free- SpeechMe browser extension doesn t use NMControl s DNS server to resolve.bit domains, so the user doesn t have to touch the DNS settings of his operating system to be able to browse.bit domains. Otherwise it implements the same security properties as NMControl, i.e. it does not require trusting any third-party. Additionally it verifies.bit TLS certificates against fingerprints stored in the Namecoin blockchain, which allows safe usage of self-signed certificates for browsing.bit websites via HTTPS without trusting any third party. This makes FreeSpeechMe one of the most secure ways to browse the.bit namespace [11. Lookup for outsiders. To be able to access.bit websites when using systems that currently are unable to run the Namecoin software locally (e.g. mobile devices) some fallback solutions are possible. However using these workarounds permanently or for anything sensitive is strongly discouraged as it introduces a middle man that could possibly censor, hijack or surveil the internet traffic and has to be trusted completely. One possible solution would be to point the domain search suffix to a publicly available Namecoin DNS suffix gateway. For example if the Namecoin DNS suffix gateway is available through the domain namecoin-suffix.dot-bit.org it could provide DNS resolution for.bit domains with its domain name as suffix: example.bit.namecoin-suffix.dot-bit. org would be resolved by the namecoin-suffix.dot-bit.org server to the IP address of example.bit that is stored in the Namecoin blockchain. The user would then simply add namecoin-suffix.dot-bit. org to the DNS search domains in his network settings. If he tries to visit his system will query the configured DNS server for example.bit, but the DNS server will return NXDOMAIN, as the.bit TLD doesn t exist in the root zone. Then his system will append the search domain and query the server again for example.bit.namecoinsuffix.dot-bit.org which in turn will query the DNS server of namecoin-suffix.dot-bit.org who is able to resolve the domain (as explained above). The downside of this approach is that it is insecure: the operator of the Namecoin DNS suffix gateway receives all NXDOMAIN queries, so he is able to log and inject false answers or hijack NXDOMAINs. Another possibility would be to use a (public) DNS server that resolves.bit domains as resolver. There are some volunteer-run DNS servers that can be used for testing purposes, e.g. dns.dot-bit.org With this solution the operator of the DNS server will receive all DNS queries, which means that the operator can monitor all queries and fake answers to redirect or hijack any domain, so it is even worse than the DNS suffix solution regarding security. Finally it is also possible to use a full proxy service that allows HTTP(S) access to.bit websites. This does not require any additional software or network setting changes on the client. Regarding security this is the worst solution, as the operator of the proxy server not only can monitor, fake and hijack domains, he also can receive and modify all traffic of the.bit website. There are some publicly accessible.bit web-proxies, e.g. [12, Comparison to regular DNS and other alternative name systems In contrast to the decentralized Namecoin naming system the regular DNS system is hierarchical and centralized, with the Internet Assigned Numbers Authority (IANA) as overall authority for the IP addresses, the domain names, and many other parameters, used in the internet [15. The ICANN acts as IANA and is responsible for management of the DNS root 110 doi: /NET _14
5 zone (. ), the top-level zone of all domain names. It assigns the operators of the top level domain and ensures the maintenance and the administrative details of the individual TLDs. Verisign serves as the root zone maintainer under a cooperative agreement entered with the United States government [15, 17. Namecoin doesn t have or need such a hierarchy of authorities, all domain records are publicly known to everyone as they are stored in the publicly shared and distributed Namecoin blockchain. Regular DNS and Namecoin also have fundamentally different business models, DNS registrars have to make a profit from registrations whereas the OpenSource Namecoin project is community based and not profit oriented. This is reflected in a substantial difference in pricing: Prices for a regular DNS domain name registration from an ICANN accredited registrar (e.g. for the Verisign.com TLD) are around $ per year. The costs for registering domains in Namecoin vary depending on the NMC/USD exchange rate and on the transaction fees for the Namecoin network: For every name operation (name_new, name_firstupdate, name_update) the Namecoin transaction fees have to be paid to the miners, otherwise the transaction is unlikely to be included into the blockchain. Currently the standard transaction fees for Namecoin are NMC/transaction. The command name_new to pre-order a domain has an additional fixed cost of 0.01 NMC. The command name_firstupdate initially (at the genesis block) had a network fee of 50 NMC, slowly decreasing over time. This was implemented in order to prevent domain squatting in the early days of Namecoin. Since December 2012 the network fee has fully decreased, so name_firstupdate is free today (except for the transaction fees). So the costs to register a new.bit domain for one year are NMC (name_new) NMC (name_firstupdate) NMC (name_update to prevent it from expiring after about 250 days) = 0.02 NMC. At the current exchange rate of $ 1.79 per NMC (see Table 3) this results in just a few cents per year (approx. $ 0.036). Of course this is just a rough estimate based on the rates at the time of writing - the exchange rates are always fluctuating and might rise or fall by several orders of magnitude when Namecoins are traded on the markets. Tor hidden services. Tor is an open-source anonymous communication service that implements a practical design for hidden services, which allows its users to offer services like a webserver without revealing their IP address. In order to connect to such a Tor hidden service an alternative naming system with the pseudo-top-level domain.onion is used: Addresses in the.onion pseudo-tld are not humanmeaningful, they are an alpha-semi-numeric, hashed representation of the public key used by the hidden service, e.g.: Such addresses are not actual DNS names, and the.onion TLD is not included in the DNS root zone, only with the Tor proxy software installed Internet programs like browsers can access sites with.onion addresses by sending the request through the network of Tor servers. 3.2 Problems One of the problems of Namecoin is the so-called domain squatting : Because the cost of registering domains is so cheap those who own Namecoins can register thousands of.bit domains anonymously and hold on to forever, as there is no authority instance that could handle disputes and enforce a domain transfer to take it away from them. Many people are using this opportunity to buy up trademarked or copyrighted names [16. Currently mobile support is also an issue with Namecoin domain name system - there is no support for mobile devices like Android- or ios-smartphones, as those would somehow have to run a full Namecoin node in the background and keep a local copy of the whole, ever growing blockchain in sync with the Namecoin network, just to be able to lookup.bit domains. This requires a substantial amount of resources like memory, storage space and (mobile) network traffic that is not suitable for the hardware of current mobile devices. Additionally the locked-down APIs of the mobile operating systems make it difficult to make Namecoin domain lookups usable for all applications, e.g. an Android phone would have to be rooted to be able to change the system s DNS resolver address to a different,.bit-capable (local) DNS server. Another possible source of problems is the code quality of the Namecoin core, e.g. in October 2013 a severe bug was found in the name verification code that allowed everyone to take an already registered name and update it with a new value, even though this name did not belong to them. There was no enforced integrity of the key value pairs in Namecoin before version Q.3.72, which basically defeated the entire purpose of Namecoin. This was quickly fixed and a new Namecoin version was released the next day, resulting in a hardfork of the Namecoin blockchain after block 150,000 [18. This means that there was an out of bound agreement to change the Namecoin name verification rules, so that transactions overwriting the names of others won t be accepted any more after this block. Namecoin shares all structural theoretical weaknesses with Bitcoin, e.g. if an Attacker has a lot of computing power and controls more than 50% of the whole Namecoin network s mining power it allows him to exclude and modify the ordering of transactions. Thus he will be able to block transactions from being confirmed and prevent other miners from mining any valid blocks while he is in control. The attacker can also change the (recent) blockchain history: he can modify an existing block and start mining a blockchain fork that builds on top of the modified transaction. Since the attacker has more computing power than the rest of the network combined he can generate blocks faster than the rest of the network. Eventually his private fork will become longer than the real blockchain branch. When this happens his fork will become the new official blockchain per definition, as it is the longest branch now. The rest of the network will switch to his branch and continue mining there. This attack could be used for double-spending coins or (Namecoin specific) to steal a domain registration: 1. Modify the block that contains the name_firstupdate transaction of the domain to steal: 111 doi: /NET _14
6 (a) Remove the name_firstupdate transaction. (b) Add own name_new transaction that pre-registers the domain for the attacker. This modification creates a private fork of the blockchain. 2. Mine at least 12 new blocks on top of the private fork without including the previously removed name_firstupdate transaction again. 3. Add own name_firstupdate transaction with the matching random value of the pre-registration from step 1.(b) into the next block. 4. Continue mining blocks for the private fork until it becomes the longest branch in the network. 5. Now the domain is registered to the attacker. 6. The real, previously removed name_firstupdate transaction is now invalid, as the attacker s registration took its place. 3.3 Statistics Following are some facts and statistics about Namecoin: According to Table 3 Namecoin is currently the 6. biggest mineable cryptocoin. The exchange rate for NMC/USD fluctuated by a factor of 8 during a period of less than 6 months Up until Aug 3, 2014 more than 9.4 million Namecoins have been created [20. The Namecoin blockchain contains more than 190,000 blocks. The full blockchain and its index files require more than 1,900 MB to be stored. Currently there are 122,772 non-expired names registered in the d/ namespace (TLDs.com: 113,639,892 /.de: ) 108,114 (88%) of those are valid.bit domain names. 6,790 (5.5%) of those can be resolved to a website [ (0.3%) of those are unique (mapped to unique IP addresses) [ CONCLUSION This paper has outlined how the Bitcoin-based Namecoin system can be used as an alternative to the hierarchical and centralized DNS and how this could potentially prevent and circumvent censorship. However the practical use cases are currently limited by several problems, which makes this system unlikely to be adopted by a signifcant number of internet users at this time. Due to this nicheness even more problems arise, like the large amount of name squatting, as only 0.3% of all currently registered domain names can be resolved to unique websites. # Name Market Cap Price per coin 1 Bitcoin $ 7,305,063,919 $ Litecoin $ 286,957,784 $ Darkcoin $ 44,446,712 $ Peercoin $ 36,504,715 $ Dogecoin $ 31,191,323 $ Namecoin $ 16,161,798 $ BitShares-PTS $ 6,951,251 $ NeutrinoCoin $ 6,914,311 $ Quark $ 4,056,502 $ Vertcoin $ 3,767,091 $ Table 3: Top10 Crypto-Currency Market Capitalizations [19 (Jun 15, :15 AM UTC) 5. REFERENCES [1 Turkey s YouTube and Twitter bans show a government in serious trouble. Alev Scott, The Guardian, March com/commentisfree/2014/mar/28/ turkey-youtube-twitter-ban-government-trouble [2 DNS Cache Poisoning in the People s Republic of China. ViewDNS.info, September dns-cache-poisoning-in-the-peoples-republic-of-china/ [3 Names: Distributed, Secure, Human-Readable: Choose Two. Zooko Wilcox-O Hearn, [4 Zooko s triangle. Wikipedia, s_triangle [5 A. Swartz. Squaring the Triangle: Secure, Decentralized, Human-Readable Names, Jan [6 S. Nakamoto. Bitcoin: A Peer-to-Peer Electronic Cash System. [7 Namecoin FAQ. [8 Namecoin Domain Name Specification, version [9 Namecoin Namespaces. [10 namecoind, sourcecode of the Namecoin-client reference implementation. [11 FreeSpeechMe. Software plug-in for Firefox that allows people to effortlessly view.bit websites. [12 dotbit.me proxy. [13 bit.no.com. namecoin web proxy. [14 NameID. Crypto-OpenID. [15 J. Postel. Rfc 1591, Domain Name System Structure and Delegation, [16 J. Prasanna, S. Prakash, Nikhil, S. Selvan..bit squatting, Cyber Security & Privacy Foundation, Jan org/namecoin_bit.pdf [17 Root Zone, ICANN Wiki, [18 Namecoin was stillborn, I had to switch off life-support, Michael Grønager, Payward Inc., doi: /NET _14
7 [19 Crypto-Currency Market Capitalizations. [20 dotbit.me: The simple way to a.bit address. [21 BitcoinWisdom BTC-e NMC/USD doi: /NET _14
Namecoin as alternative to the Domain Name System
Namecoin as alternative to the Domain Name System Xander Lammertink Author, UvA System and Network Engineering [email protected] Marco Davids Supervisor, SIDN Labs Abstract: This paper researches
Distributed Public Key Infrastructure via the Blockchain. Sean Pearl [email protected] April 28, 2015
Distributed Public Key Infrastructure via the Blockchain Sean Pearl [email protected] April 28, 2015 Overview Motivation: Electronic Money Example TTP: PayPal Bitcoin (BTC) Background Structure Other
Orwell. From Bitcoin to secure Domain Name System
Orwell. From Bitcoin to secure Domain Name System Michał Jabczyński, Michał Szychowiak Poznań University of Technology Piotrowo 2, 60-965 Poznań, Poland {Michal.Jabczynski, Michal.Szychowiak}@put.poznan.pl
Overview of CSS SSL. SSL Cryptography Overview CHAPTER
CHAPTER 1 Secure Sockets Layer (SSL) is an application-level protocol that provides encryption technology for the Internet, ensuring secure transactions such as the transmission of credit card numbers
Blockstack: A Global Naming and Storage System Secured by Blockchains
Blockstack: A Global Naming and Storage System Secured by Blockchains Muneeb Ali and Jude Nelson, Princeton University and Blockstack Labs; Ryan Shea, Blockstack Labs; Michael J. Freedman, Princeton University
DNS Cache Poisoning Vulnerability Explanation and Remedies Viareggio, Italy October 2008
DNS Cache Poisoning Vulnerability Explanation and Remedies Viareggio, Italy October 2008 Kim Davies Internet Assigned Numbers Authority Internet Corporation for Assigned Names & Numbers Agenda How do you
Computer Networks: Domain Name System
Computer Networks: Domain Name System Domain Name System The domain name system (DNS) is an application-layer protocol for mapping domain names to IP addresses DNS www.example.com 208.77.188.166 http://www.example.com
FAQ (Frequently Asked Questions)
FAQ (Frequently Asked Questions) Specific Questions about Afilias Managed DNS What is the Afilias DNS network? How long has Afilias been working within the DNS market? What are the names of the Afilias
BitIodine: extracting intelligence from the Bitcoin network
BitIodine: extracting intelligence from the Bitcoin network Michele Spagnuolo http://miki.it [email protected] @mikispag Bitcoin BitIodine About Bitcoin Decentralized, global digital currency A global
Attack Frameworks and Tools
Network Architectures and Services, Georg Carle Faculty of Informatics Technische Universität München, Germany Attack Frameworks and Tools Pranav Jagdish Betreuer: Nadine Herold Seminar Innovative Internet
Sync Security and Privacy Brief
Introduction Security and privacy are two of the leading issues for users when transferring important files. Keeping data on-premises makes business and IT leaders feel more secure, but comes with technical
Using EMC Unisphere in a Web Browsing Environment: Browser and Security Settings to Improve the Experience
Using EMC Unisphere in a Web Browsing Environment: Browser and Security Settings to Improve the Experience Applied Technology Abstract The Web-based approach to system management taken by EMC Unisphere
Part 5 DNS Security. SAST01 An Introduction to Information Security 2015-09-21. Martin Hell Department of Electrical and Information Technology
SAST01 An Introduction to Information Security Part 5 DNS Security Martin Hell Department of Electrical and Information Technology How DNS works Amplification attacks Cache poisoning attacks DNSSEC 1 2
CoinAMI Coin-Application Mediator Interface
Bilkent University Department of Computer Engineering CoinAMI Coin-Application Mediator Interface Supervisor Can Alkan Members Ahmet Kerim Şenol Alper Gündoğdu Halil İbrahim Özercan Muhammed Yusuf Özkaya
Detecting Search Lists in Authoritative DNS
Detecting Search Lists in Authoritative DNS Andrew Simpson March 10 th, 2014 Summary Early research into name collisions has postulated that search list interaction drives some portion of the DNS requests
Architecture and Data Flow Overview. BlackBerry Enterprise Service 10 721-08877-123 Version: 10.2. Quick Reference
Architecture and Data Flow Overview BlackBerry Enterprise Service 10 721-08877-123 Version: Quick Reference Published: 2013-11-28 SWD-20131128130321045 Contents Key components of BlackBerry Enterprise
NET0183 Networks and Communications
NET0183 Networks and Communications Lecture 25 DNS Domain Name System 8/25/2009 1 NET0183 Networks and Communications by Dr Andy Brooks DNS is a distributed database implemented in a hierarchy of many
What is Web Security? Motivation
[email protected] http://www.brucker.ch/ Information Security ETH Zürich Zürich, Switzerland Information Security Fundamentals March 23, 2004 The End Users View The Server Providers View What is Web
BlackBerry Enterprise Service 10. Secure Work Space for ios and Android Version: 10.1.1. Security Note
BlackBerry Enterprise Service 10 Secure Work Space for ios and Android Version: 10.1.1 Security Note Published: 2013-06-21 SWD-20130621110651069 Contents 1 About this guide...4 2 What is BlackBerry Enterprise
Using the Bitcoin Blockchain for secure, independently verifiable, electronic votes. Pierre Noizat - July 2014
Using the Bitcoin Blockchain for secure, independently verifiable, electronic votes. Pierre Noizat - July 2014 The problem with proprietary voting systems Existing electronic voting systems all suffer
Salesforce1 Mobile Security Guide
Salesforce1 Mobile Security Guide Version 1, 1 @salesforcedocs Last updated: December 8, 2015 Copyright 2000 2015 salesforce.com, inc. All rights reserved. Salesforce is a registered trademark of salesforce.com,
Kentico CMS security facts
Kentico CMS security facts ELSE 1 www.kentico.com Preface The document provides the reader an overview of how security is handled by Kentico CMS. It does not give a full list of all possibilities in the
Computer Networks: DNS a2acks CS 1951e - Computer Systems Security: Principles and Prac>ce. Domain Name System
Computer Networks: DNS a2acks CS 1951e - Computer Systems Security: Principles and Prac>ce 18/02/15 Networks: DNS attacks 1 Domain Name System The domain name system (DNS) is an applica>on- layer protocol
Internet-Praktikum I Lab 3: DNS
Kommunikationsnetze Internet-Praktikum I Lab 3: DNS Mark Schmidt, Andreas Stockmayer Sommersemester 2015 kn.inf.uni-tuebingen.de Motivation for the DNS Problem IP addresses hard to remember for humans
Certificate Management. PAN-OS Administrator s Guide. Version 7.0
Certificate Management PAN-OS Administrator s Guide Version 7.0 Contact Information Corporate Headquarters: Palo Alto Networks 4401 Great America Parkway Santa Clara, CA 95054 www.paloaltonetworks.com/company/contact-us
Secure Web Service - Hybrid. Policy Server Setup. Release 9.2.5 Manual Version 1.01
Secure Web Service - Hybrid Policy Server Setup Release 9.2.5 Manual Version 1.01 M86 SECURITY WEB SERVICE HYBRID QUICK START USER GUIDE 2010 M86 Security All rights reserved. 828 W. Taft Ave., Orange,
OPENID AUTHENTICATION SECURITY
OPENID AUTHENTICATION SECURITY Erik Lagercrantz and Patrik Sternudd Uppsala, May 17 2009 1 ABSTRACT This documents gives an introduction to OpenID, which is a system for centralised online authentication.
BlackBerry Enterprise Service 10. Universal Device Service Version: 10.2. Administration Guide
BlackBerry Enterprise Service 10 Universal Service Version: 10.2 Administration Guide Published: 2015-02-24 SWD-20150223125016631 Contents 1 Introduction...9 About this guide...10 What is BlackBerry
Bitmessage: A Peer to Peer Message Authentication and Delivery System
Bitmessage: A Peer to Peer Message Authentication and Delivery System Jonathan Warren [email protected] www.bitmessage.org November 27, 2012 Abstract. We propose a system that allows users to securely
DNSSEC. Introduction. Domain Name System Security Extensions. AFNIC s Issue Papers. 1 - Organisation and operation of the DNS
AFNIC s Issue Papers DNSSEC Domain Name System Security Extensions 1 - Organisation and operation of the DNS 2 - Cache poisoning attacks 3 - What DNSSEC can do 4 - What DNSSEC cannot do 5 - Using keys
Certificate Management
Certificate Management Palo Alto Networks PAN-OS Administrator s Guide Version 6.0 Contact Information Corporate Headquarters: Palo Alto Networks 4401 Great America Parkway Santa Clara, CA 95054 www.paloaltonetworks.com/company/contact-us
Securing LAN Connected Devices in Industrial Sites with TLS and Multicast DNS
Securing LAN Connected Devices in Industrial Sites with TLS and Multicast DNS Tero Keski-Valkama May 28, 2015 Version 1.0 Abstract This whitepaper outlines a more flexible and more secure user interface
Public Key Infrastructure (PKI)
Public Key Infrastructure (PKI) In this video you will learn the quite a bit about Public Key Infrastructure and how it is used to authenticate clients and servers. The purpose of Public Key Infrastructure
DOMAIN NAME SECURITY EXTENSIONS
DOMAIN NAME SECURITY EXTENSIONS The aim of this paper is to provide information with regards to the current status of Domain Name System (DNS) and its evolution into Domain Name System Security Extensions
Bugzilla ID: Bugzilla Summary:
Bugzilla ID: Bugzilla Summary: CAs wishing to have their certificates included in Mozilla products must 1) Comply with the requirements of the Mozilla CA certificate policy (http://www.mozilla.org/projects/security/certs/policy/)
2. Elections We define an electronic vote as a chain of digital signatures. Each owner transfers the vote to the candidate or legislation by digitally
Abstract A purely peer to peer version of electronic vote would allow online votes to be sent directly from one party to another without going through a central voting register. Digital signatures provide
EE 7376: Introduction to Computer Networks. Homework #3: Network Security, Email, Web, DNS, and Network Management. Maximum Points: 60
EE 7376: Introduction to Computer Networks Homework #3: Network Security, Email, Web, DNS, and Network Management Maximum Points: 60 1. Network security attacks that have to do with eavesdropping on, or
Security Provider Integration LDAP Server
Security Provider Integration LDAP Server 2015 Bomgar Corporation. All rights reserved worldwide. BOMGAR and the BOMGAR logo are trademarks of Bomgar Corporation; other trademarks shown are the property
VIDEO Intypedia013en LESSON 13: DNS SECURITY. AUTHOR: Javier Osuna García-Malo de Molina. GMV Head of Security and Process Consulting Division
VIDEO Intypedia013en LESSON 13: DNS SECURITY AUTHOR: Javier Osuna García-Malo de Molina GMV Head of Security and Process Consulting Division Welcome to Intypedia. In this lesson we will study the DNS domain
TLS and SRTP for Skype Connect. Technical Datasheet
TLS and SRTP for Skype Connect Technical Datasheet Copyright Skype Limited 2011 Introducing TLS and SRTP Protocols help protect enterprise communications Skype Connect now provides Transport Layer Security
Secure Web Appliance. SSL Intercept
Secure Web Appliance SSL Intercept Table of Contents 1. Introduction... 1 1.1. About CYAN Secure Web Appliance... 1 1.2. About SSL Intercept... 1 1.3. About this Manual... 1 1.3.1. Document Conventions...
ENABLING RPC OVER HTTPS CONNECTIONS TO M-FILES SERVER
M-FILES CORPORATION ENABLING RPC OVER HTTPS CONNECTIONS TO M-FILES SERVER VERSION 2.3 DECEMBER 18, 2015 Page 1 of 15 CONTENTS 1. Version history... 3 2. Overview... 3 2.1. System Requirements... 3 3. Network
Lecture 31 SSL. SSL: Secure Socket Layer. History SSL SSL. Security April 13, 2005
Lecture 31 Security April 13, 2005 Secure Sockets Layer (Netscape 1994) A Platform independent, application independent protocol to secure TCP based applications Currently the most popular internet crypto-protocol
DNSSEC - Why Network Operators Should Care And How To Accelerate Deployment
DNSSEC - Why Network Operators Should Care And How To Accelerate Deployment Dan York, CISSP Senior Content Strategist, Internet Society Eurasia Network Operators' Group (ENOG) 4 Moscow, Russia October
INFORMATION SECURITY REVIEW
INFORMATION SECURITY REVIEW 14.10.2008 CERT-FI Information Security Review 3/2008 In the summer, information about a vulnerability in the internet domain name service (DNS) was released. If left unpatched,
Security Guide. BlackBerry Enterprise Service 12. for ios, Android, and Windows Phone. Version 12.0
Security Guide BlackBerry Enterprise Service 12 for ios, Android, and Windows Phone Version 12.0 Published: 2015-02-06 SWD-20150206130210406 Contents About this guide... 6 What is BES12?... 7 Key features
Integrated SSL Scanning
Software Version 9.0 Copyright Copyright 1996-2008. Finjan Software Inc. and its affiliates and subsidiaries ( Finjan ). All rights reserved. All text and figures included in this publication are the exclusive
The secret life of a DNS query. Igor Sviridov <[email protected]> 20120522
The secret life of a DNS query Igor Sviridov 20120522 Preface Nowadays, when we type URL (or is it a search string? ;-) into a browser (or mobile device) many things happen. While most of
Digital Certificates (Public Key Infrastructure) Reshma Afshar Indiana State University
Digital Certificates (Public Key Infrastructure) Reshma Afshar Indiana State University October 2015 1 List of Figures Contents 1 Introduction 1 2 History 2 3 Public Key Infrastructure (PKI) 3 3.1 Certificate
Installing, Uninstalling, and Upgrading Service Monitor
CHAPTER 2 Installing, Uninstalling, and Upgrading Service Monitor This section contains the following topics: Preparing to Install Service Monitor, page 2-1 Installing Cisco Unified Service Monitor, page
Apache Server Implementation Guide
Apache Server Implementation Guide 340 March Road Suite 600 Kanata, Ontario, Canada K2K 2E4 Tel: +1-613-599-2441 Fax: +1-613-599-2442 International Voice: +1-613-599-2441 North America Toll Free: 1-800-307-7042
Criteria for web application security check. Version 2015.1
Criteria for web application security check Version 2015.1 i Content Introduction... iii ISC- P- 001 ISC- P- 001.1 ISC- P- 001.2 ISC- P- 001.3 ISC- P- 001.4 ISC- P- 001.5 ISC- P- 001.6 ISC- P- 001.7 ISC-
WHITE PAPER. Best Practices DNSSEC Zone Management on the Infoblox Grid
WHITE PAPER Best Practices DNSSEC Zone Management on the Infoblox Grid What Is DNSSEC, and What Problem Does It Solve? DNSSEC is a suite of Request for Comments (RFC) compliant specifications developed
Currency trading platform
Escuela Técnica Superior de Ingeniería Informática Universitat Politècnica de València Currency trading platform Final Degree Project Ingeniería Informática Author: Alberto del Barrio Albelda Director:
ISA Server Plugins Setup Guide
ISA Server Plugins Setup Guide Secure Web (Webwasher) Version 1.3 Copyright 2008 Secure Computing Corporation. All rights reserved. No part of this publication may be reproduced, transmitted, transcribed,
Understanding Secure Shell Host Keys
Understanding Secure Shell Host Keys White Paper 4848 tramway ridge dr. ne suite 101 albuquerque, nm 87111 505-332 -5700 www.vandyke.com Understanding Host Keys Think about the last time you faxed personal
VMware vcenter Support Assistant 5.1.1
VMware vcenter.ga September 25, 2013 GA Last updated: September 24, 2013 Check for additions and updates to these release notes. RELEASE NOTES What s in the Release Notes The release notes cover the following
Installing and Configuring vcloud Connector
Installing and Configuring vcloud Connector vcloud Connector 2.7.0 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new
Guidance for Preparing Domain Name Orders, Seizures & Takedowns
Guidance for Preparing Domain Name Orders, Seizures & Takedowns Abstract This thought paper offers guidance for anyone who prepares an order that seeks to seize or take down domain names. Its purpose is
Secure Sockets Layer (SSL ) / Transport Layer Security (TLS) Network Security Products S31213
Secure Sockets Layer (SSL ) / Transport Layer Security (TLS) Network Security Products S31213 UNCLASSIFIED Example http ://www. greatstuf f. com Wants credit card number ^ Look at lock on browser Use https
How To Make A Trustless Certificate Authority Secure
Network Security: Public Key Infrastructure Guevara Noubir Northeastern University [email protected] Network Security Slides adapted from Radia Perlman s slides Key Distribution - Secret Keys What if
Overview Most of the documentation out there on the transition from SHA-1 certificates to SHA-2 certificates will tell you three things:
SHA-1 Versus SHA-2 Overview Most of the documentation out there on the transition from SHA-1 certificates to SHA-2 certificates will tell you three things: - Breaking SHA-1 is not yet practical but will
The Environment Surrounding DNS. 3.1 The Latest DNS Trends. 3. Technology Trends
3. The Environment Surrounding DNS DNS is used in many applications, serving as an important Internet service. Here we discuss name collision issues that have arisen with recent TLD additions, and examine
Public-Root Name Server Operational Requirements
Public-Root Name Server Operational Requirements Published January the 17 th, 2005 Status of this Document This document provides information to the Public-Root and Internet technical community. This document
Working With Virtual Hosts on Pramati Server
Working With Virtual Hosts on Pramati Server 13 Overview Virtual hosting allows a single machine to be addressed by different names. There are two ways for configuring Virtual Hosts. They are: Domain Name
Web Tracking for You. Gregory Fleischer
Web Tracking for You Gregory Fleischer 1 INTRODUCTION 2 Me Gregory Fleischer Senior Security Consultant at FishNet Security 3 Disclaimer Why do you hate? 4 Reasons For Tracking TradiFonal reasons for tracking
Simple. Control Panel. for your Linux Server. Getting Started Guide. Simple Control Panel // Linux Server
Getting Started Guide Simple Control Panel for your Linux Server Getting Started Guide Page 1 Getting Started Guide: Simple Control Panel, Linux Server Version 2.1 (02.01.10) Copyright 2010. All rights
Novell Sentinel Log Manager 1.2 Release Notes. 1 What s New. 1.1 Enhancements to Licenses. Novell. February 2011
Novell Sentinel Log Manager 1.2 Release Notes February 2011 Novell Novell Sentinel Log Manager collects data from a wide variety of devices and applications, including intrusion detection systems, firewalls,
Filecoin: A Cryptocurrency Operated File Storage Network
Filecoin: A Cryptocurrency Operated File Storage Network 1e96a1b27a6cb85df68d728cf3695b0c46dbd44d filecoin.io July 15, 2014 Abstract Filecoin is a distributed electronic currency similar to Bitcoin. Unlike
White Paper BMC Remedy Action Request System Security
White Paper BMC Remedy Action Request System Security June 2008 www.bmc.com Contacting BMC Software You can access the BMC Software website at http://www.bmc.com. From this website, you can obtain information
SSL Certificates and Bomgar
SSL Certificates and Bomgar 2015 Bomgar Corporation. All rights reserved worldwide. BOMGAR and the BOMGAR logo are trademarks of Bomgar Corporation; other trademarks shown are the property of their respective
Security Digital Certificate Manager
System i Security Digital Certificate Manager Version 5 Release 4 System i Security Digital Certificate Manager Version 5 Release 4 Note Before using this information and the product it supports, be sure
Security Digital Certificate Manager
IBM i Security Digital Certificate Manager 7.1 IBM i Security Digital Certificate Manager 7.1 Note Before using this information and the product it supports, be sure to read the information in Notices,
Distributed Systems. 09. Naming. Paul Krzyzanowski. Rutgers University. Fall 2015
Distributed Systems 09. Naming Paul Krzyzanowski Rutgers University Fall 2015 October 7, 2015 2014-2015 Paul Krzyzanowski 1 Naming things Naming: map names to objects Helps with using, sharing, and communicating
Release Notes for Version 1.5.207
Release Notes for Version 1.5.207 Created: March 9, 2015 Table of Contents What s New... 3 Fixes... 3 System Requirements... 3 Stonesoft Appliances... 3 Build Version... 4 Product Binary Checksums... 4
Princeton University Computer Science COS 432: Information Security (Fall 2013)
Princeton University Computer Science COS 432: Information Security (Fall 2013) This test has 13 questions worth a total of 50 points. That s a lot of questions. Work through the ones you re comfortable
A Study of What Really Breaks SSL HITB Amsterdam 2011
A Study of What Really Breaks SSL HITB Amsterdam 2011 v1.0 Ivan Ristic Michael Small 20 May 2011 Agenda 1. State of SSL 2. Quick intro to SSL Labs 3. SSL Configuration Surveys 4. Survey of Actual SSL Usage
Configuring Digital Certificates
CHAPTER 36 This chapter describes how to configure digital certificates and includes the following sections: Information About Digital Certificates, page 36-1 Licensing Requirements for Digital Certificates,
Decoding DNS data. Using DNS traffic analysis to identify cyber security threats, server misconfigurations and software bugs
Decoding DNS data Using DNS traffic analysis to identify cyber security threats, server misconfigurations and software bugs The Domain Name System (DNS) is a core component of the Internet infrastructure,
Author: Kai Engert, kaie at redhat dot com or kaie at kuix dot de For updates to this document, please check http://kuix.
Spam Salt aka Message Salt An invention against email abuse (Spam), introducing an email sender authentication mechanism. Author: Kai Engert, kaie at redhat dot com or kaie at kuix dot de For updates to
McAfee SMC Installation Guide 5.7. Security Management Center
McAfee SMC Installation Guide 5.7 Security Management Center Legal Information The use of the products described in these materials is subject to the then current end-user license agreement, which can
Configuring SSL Termination
CHAPTER 4 This chapter describes the steps required to configure a CSS as a virtual SSL server for SSL termination. It contains the following major sections: Overview of SSL Termination Creating an SSL
OVERVIEW OF THE DNS AND GLOSSARY OF TERMS
PROTECT YOUR BUSINESS D-Zone Anycast DNS Service OVERVIEW OF THE DNS AND GLOSSARY OF TERMS 1 PROTECT YOUR BUSINESS OVERVIEW OF THE DNS AND GLOSSARY OF TERMS The DNS is a technology that most IT managers
N-CAP Users Guide Everything You Need to Know About Using the Internet! How Firewalls Work
N-CAP Users Guide Everything You Need to Know About Using the Internet! How Firewalls Work How Firewalls Work By: Jeff Tyson If you have been using the internet for any length of time, and especially if
NATIONAL CREDIT UNION ADMINISTRATION 1775 Duke Street, Alexandria, VA 22314
NATIONAL CREDIT UNION ADMINISTRATION 1775 Duke Street, Alexandria, VA 22314 DATE: December 2002 LETTER NO.: 02-CU-16 TO: All Federally-Insured Credit Unions SUBJ: Protection of Credit Union Internet Addresses
SyncThru TM Web Admin Service Administrator Manual
SyncThru TM Web Admin Service Administrator Manual 2007 Samsung Electronics Co., Ltd. All rights reserved. This administrator's guide is provided for information purposes only. All information included
CA Nimsoft Monitor. Probe Guide for URL Endpoint Response Monitoring. url_response v4.1 series
CA Nimsoft Monitor Probe Guide for URL Endpoint Response Monitoring url_response v4.1 series Legal Notices This online help system (the "System") is for your informational purposes only and is subject
Lesson 10: Attacks to the SSL Protocol
Lesson 10: Attacks to the SSL Protocol Luciano Bello - [email protected] Chalmers University Dr. Alfonso Muñoz - [email protected] T>SIC Group. Universidad Politécnica de Madrid Security of the SSL
Is Your SSL Website and Mobile App Really Secure?
Is Your SSL Website and Mobile App Really Secure? Agenda What is SSL / TLS SSL Vulnerabilities PC/Server Mobile Advice to the Public Hong Kong Computer Emergency Response Team Coordination Centre 香 港 電
Hosting more than one FortiOS instance on. VLANs. 1. Network topology
Hosting more than one FortiOS instance on a single FortiGate unit using VDOMs and VLANs 1. Network topology Use Virtual domains (VDOMs) to divide the FortiGate unit into two or more virtual instances of
