CENSURFRIDNS a.k.a. UNCENSOREDDNS. Thomas Steen Rasmussen
|
|
|
- Winfred Singleton
- 10 years ago
- Views:
Transcription
1 CENSURFRIDNS a.k.a. UNCENSOREDDNS Thomas Steen Rasmussen
2 Agenda Introduction DNS blocking in Denmark What is UncensoredDNS? Why was it started? Issues with DNS blocking A basic conflict: security vs. freedom Conclusion
3 Introduction Name: Thomas Steen Rasmussen - born 1979 Working for a Danish ISP I manage the censored DNS servers, among other things Involved in IT politics since 2007ish, around when I started working my current job Chairman of the Danish BSD usergroup BSD-DK see more at FreeBSD enthusiast/fanboy since 2004 I do consulting/development in my sparetime, [email protected] for more info. First time at RIPE :)
4 Agenda Introduction DNS blocking in Denmark What is UncensoredDNS? Why was it started? Issues with DNS blocking A basic conflict: security vs. freedom Conclusion
5 DNS blocking in Denmark 2005: Pages depicting child abuse 2006: Copyright (allofmp3.com) 2008: Copyright (thepiratebay.org) 2009: launched :) 2011: Unlicensed gambling sites 2011: Illegal pharmaceutical vendors 2012: Copyright (grooveshark.com).?
6 DNS blocking in Denmark This relates to the DK child-abuse blocking system which is automatically updated. Other blocking (like the Pirate Bay) is handled manually case by case. Each ISP sends a public SSH key to the police, who adds it to the server holding the current list The ISP uses scp to fetch the list file regularly, like once per hour The list is just a list of lines so it is reformatted to fit bind config syntax with standard unix tools like sed and cut. The list is then copied to the nameservers and loaded there. All domains in the list point at the same zone file (* A)
7 Agenda Introduction DNS blocking in Denmark What is UncensoredDNS? Why was it started? Issues with DNS blocking A basic conflict: security vs. freedom Conclusion
8 What is UncensoredDNS? Basically, the UncensoredDNS (or censurfridns in Danish) service is a couple of open recursive nameservers. They run bind on FreeBSD. Currently two servers (although both have reduncancy, so more than two really), running on provider assigned IP addresses. V4 and v6 PI address space acquired recently, along with an AS number. Plans for a real anycast service using this address space are well underway. Need hardware and connectivity sponsors in friendly organizations/companies for the anycast project talk to me!
9 Why was UncensoredDNS started? Friends kept asking which DNS servers to use if they wanted to visit the Pirate Bay :) Didn't feel like recommending OpenDNS with their nxdomain redirection. Google DNS didn't exist back then and I don't really feel like recommending them either. Neither OpenDNS nor Google DNS had DNSSEC support or IPv6 support at the time Choosing a DNS provider is a matter of trust - I felt like people might have an easier time trusting an individual like me over a corporation/organisation. The DNS blocking system we have in place in DK is a stupid nonsolution to a difficult and important problem. Using DNS servers with the blocking enabled is/was not an option. Clearly, a proper uncensored DNS service was needed.
10 Agenda Introduction DNS blocking in Denmark What is UncensoredDNS? Why was it started? Issues with DNS blocking A basic conflict: security vs. freedom Conclusion
11 Issues with DNS blocking First of all: The DNS blocking system we have in Denmark is based on some weird idea that the Internet equals HTTP and nothing else The STOP page gives a message explaining why stuff isn't working as expected - if you use a webbrowser But what if you were trying to send a mail to one of the blocked domains? Only the HTTP protocol is handled. You would get a bounce four days later.
12 Issues with DNS blocking Furthermore, the Danish blocking system for child abuse pages introduces an automated single point of failure into the DNS This was demonstrated better than I could have asked for in March 2012, when the Danish police accidently blocked 8000 domains including google.com and facebook.com: from
13 Issues with DNS blocking DNS blocking is easy to circumvent by changing DNS server or using a proxy server. This may lead to DPI and other more intrusive blocking schemes in the future. DNS blocking conceals the problem without actually removing the content from the internet. DNS blocking is Incompatible with DNSSEC a dishonest recursive DNS server looks just like a hacker spoofing DNS to a DNSSEC validating client. When a domain name is blocked in the DNS, it means that all content on that domain is blocked, including non- HTTP content - even if only some of the content is illegal.
14 Issues with DNS blocking When the local ISP DNS service is no longer considered reliable and open, Internet users may use more or less dodgy proxy services or VPN tunnels to avoid the blocking. This in turn may lead to CDNs seeing decreased performance, because CDNs commonly use the recursive DNS servers location to distribute load geographically. More DNS blocking can also mean that more alternative domain namespaces will be established, further fragmenting the Internet.
15 Issues with DNS blocking DNS blocking can serve as an early warning system for the very criminals it is trying to fight. When blocking pages that depict child abuse (like we do in Denmark), it is trivial for the operator of such pages to detect when his domain has been added to the filter. He now knows the authorities are onto him, he can change the domain name and keep the site going.
16 Agenda Introduction DNS blocking in Denmark What is UncensoredDNS? Why was it started? Issues with DNS blocking A basic conflict: security vs. freedom Conclusion
17 A basic conflict: security vs. freedom On some level, there is a basic conflict between security on the internet, and online freedom My nameservers can certainly be used to resolve domains with illegal content They may also be used in a DDOS (again) some day The same could be said for things like TOR and Bitcoin. They can be (ab)used for illegal purposes but at the same time they enhance our freedom online. We need to be very aware of this conflict!
18 Agenda Introduction DNS blocking in Denmark What is UncensoredDNS? Why was it started? Issues with DNS blocking A basic conflict: security vs. freedom Conclusion
19 Conclusion The future is hard to predict :). We might see stronger / more intrusive types of blocking in the future, or we might get rid of blocking schemes entirely. Likely somewhere inbetween. Either way, my DNS servers will keep running as long as they are needed. The anycasted DNS service is ready soon-ish, this means much better redundancy. Anycast will also enable me to put servers in Asia, America etc. to lower latency.
20 The end This is the end of the presentation. If you have any questions then ask away. Find me here at RIPE65 or me at Join the IRC channel #censurfridns on Freenode Follow the twitter Read the blog at (selfsigned certificate - the broken CA system is not getting any of my money, but that's for another talk). Spread the word! Use the servers! Buy a t-shirt or a coffee mug, the webshop is at (I do not make any money from the sales).
21 Sources / recommended reading Internet Society Perspectives on Domain Name System (DNS) pdf/dns-filtering_ pdf Security and Other Technical Concerns Raised by the DNS Filtering Requirements in the PROTECT IP Technical-Whitepaper-Final.pdf
22 Questions??
How To Block Child Abuse In Danesborg
CENSURFRIDNS Thomas Steen Rasmussen [email protected] March 11th, 2012 Agenda - Politics What is censurfridns and why does it exist What is censored on the Danish ISP nameservers? How come censurfridns
The secret life of a DNS query. Igor Sviridov <[email protected]> 20120522
The secret life of a DNS query Igor Sviridov 20120522 Preface Nowadays, when we type URL (or is it a search string? ;-) into a browser (or mobile device) many things happen. While most of
ISP Systems Design. ISP Workshops. Last updated 24 April 2013
ISP Systems Design ISP Workshops Last updated 24 April 2013 1 Agenda p DNS Server placement p Mail Server placement p News Server placement p Services network design p Services Network Security 2 ISP Services
ANATOMY OF A DDoS ATTACK AGAINST THE DNS INFRASTRUCTURE
ANATOMY OF A DDoS ATTACK AGAINST THE DNS INFRASTRUCTURE ANATOMY OF A DDOS ATTACK AGAINST THE DNS INFRASTRUCTURE The Domain Name System (DNS) is part of the functional infrastructure of the Internet and
How To Stop A Malicious Dns Attack On A Domain Name Server (Dns) From Being Spoofed (Dnt) On A Network (Networking) On An Ip Address (Ip Address) On Your Ip Address On A Pc Or Ip Address
DNS Amplification Are YOU Part of the Problem? (RIPE66 Dublin, Ireland - May 13, 2013) Merike Kaeo Security Evangelist, Internet Identity [email protected] INTRO Statistics on DNS Amplification
Debugging With Netalyzr
Debugging With Netalyzr Christian Kreibich (ICSI), Nicholas Weaver (ICSI), Boris Nechaev (HIIT/TKK), and Vern Paxson (ICSI & UC Berkeley) 1 What Is Netalyzr?! Netalyzr is a comprehensive network measurement
Building Nameserver Clusters with Free Software
Building Nameserver Clusters with Free Software Joe Abley, ISC NANOG 34 Seattle, WA, USA Starting Point Discrete, single-host authoritative nameservers several (two or more) several (two or more) geographically
Resilient Botnet Command and Control with Tor
Resilient Botnet Command and Control with Tor Dennis Brown July 2010 10/14/10 1 Who am I? Dennis Brown Security Researcher for Tenable Network Solutions Toorcon 10, 11 Defcon 18 PaulDotCom Podcast Rhode
DNS and BIND. David White
DNS and BIND David White DNS: Backbone of the Internet Translates Domains into unique IP Addresses i.e. developcents.com = 66.228.59.103 Distributed Database of Host Information Works seamlessly behind
Akamai CDN, IPv6 and DNS security. Christian Kaufmann Akamai Technologies DENOG 5 14 th November 2013
Akamai CDN, IPv6 and DNS security Christian Kaufmann Akamai Technologies DENOG 5 14 th November 2013 Agenda Akamai Introduction Who s Akamai? Intelligent Platform & Traffic Snapshot Basic Technology Akamai
Distributed Systems. 09. Naming. Paul Krzyzanowski. Rutgers University. Fall 2015
Distributed Systems 09. Naming Paul Krzyzanowski Rutgers University Fall 2015 October 7, 2015 2014-2015 Paul Krzyzanowski 1 Naming things Naming: map names to objects Helps with using, sharing, and communicating
BEST PRACTICES FOR IMPROVING EXTERNAL DNS RESILIENCY AND PERFORMANCE
BEST PRACTICES FOR IMPROVING EXTERNAL DNS RESILIENCY AND PERFORMANCE BEST PRACTICES FOR IMPROVING EXTERNAL DNS RESILIENCY AND PERFORMANCE Your external DNS is a mission critical business resource. Without
Where is Hong Kong in the secure Internet infrastructure development. Warren Kwok, CISSP Internet Society Hong Kong 12 August 2011
The Internet is for Everyone. Become an ISOC Member. Cyber Security Symposium 2011 Where is Hong Kong in the secure Internet infrastructure development Warren Kwok, CISSP Internet Society Hong Kong 12
Securing DNS Infrastructure Using DNSSEC
Securing DNS Infrastructure Using DNSSEC Ram Mohan Executive Vice President, Afilias [email protected] February 28, 2009 Agenda Getting Started Finding out what DNS does for you What Can Go Wrong A Survival
Deploying IP Anycast. Core DNS Services for University of Minnesota Introduction and General discussion
Deploying IP Anycast Core DNS Services for University of Minnesota Introduction and General discussion Agenda Deploying IPv4 anycast DNS What is ANYCAST Why is ANYCAST important? Monitoring and using ANYCAST
JPNIC Public Forum. Paul Vixie. Chairman, Internet Software Consortium. January 21, 2003
JPNIC Public Forum Paul Vixie Chairman, Internet Software Consortium January 21, 2003 1 Paul Vixie has been contributing to Internet protocols and UNIX systems as a protocol designer and software architect
THE MASTER LIST OF DNS TERMINOLOGY. v 2.0
THE MASTER LIST OF DNS TERMINOLOGY v 2.0 DNS can be hard to understand and if you re unfamiliar with the terminology, learning more about DNS can seem as daunting as learning a new language. To help people
Topics in Network Security
Topics in Network Security Jem Berkes MASc. ECE, University of Waterloo B.Sc. ECE, University of Manitoba www.berkes.ca February, 2009 Ver. 2 In this presentation Wi-Fi security (802.11) Protecting insecure
Defending your DNS in a post-kaminsky world. Paul Wouters <[email protected]>
Defending your DNS in a post-kaminsky world Paul Wouters Overview History of DNS and the Kaminsky attack Various DNS problems explained Where to address the DNS problem Nameservers,
The Future of DNS. Johan Ihrén Netnod. October 15, 2015. http://www.netnod.se/
The Future of DNS Johan Ihrén Netnod October 15, 2015 Netnod Customer Mtg, Oct 2015, October 15, 2015, DNS and Complexity, [email protected] 1 / 16 The Future of DNS I have no idea about the future of DNS.
Presented by Greg Lindsay Technical Writer Windows Server Information Experience. Presented at: Seattle Windows Networking User Group April 7, 2010
Presented by Greg Lindsay Technical Writer Windows Server Information Experience Presented at: Seattle Windows Networking User Group April 7, 2010 Windows 7 DNS client DNS devolution Security-awareness:
THE MASTER LIST OF DNS TERMINOLOGY. First Edition
THE MASTER LIST OF DNS TERMINOLOGY First Edition DNS can be hard to understand and if you re unfamiliar with the terminology, learning more about DNS can seem as daunting as learning a new language. To
State of the Cloud DNS Report
transparency for the cloud State of the Cloud DNS Report Basic Edition April 2015 2015 Table of Contents Overview Introduction 3 Anycast vs. Unicast DNS 3 Provider Overview & Current News 4 Provider Marketshare
Scale your DNS Infrastructure Ensure App and Service Availability. Nigel Ashworth Solution Architect EMEA [email protected] +44 77 88 436 325
Scale your DNS Infrastructure Ensure App and Service Availability Nigel Ashworth Solution Architect EMEA [email protected] +44 77 88 436 325 Agenda DNS and F5 Use Cases - The top four Firewall for DNS
DNSSEC and DNS Proxying
DNSSEC and DNS Proxying DNS is hard at scale when you are a huge target 2 CloudFlare DNS is big 3 CloudFlare DNS is fast 4 CloudFlare DNS is always under attack 5 CloudFlare A secure reverse proxy for
State of the Cloud DNS Report
transparency for the cloud State of the Cloud DNS Report Basic Edition August 2015 2015 Table of Contents Overview Introduction 3 Anycast vs. Unicast DNS 3 Provider Overview & Current News 4 Provider Marketshare
The story of dnsdist - or - Do we need a DNS Delivery Controller? http://dnsdist.org/
The story of dnsdist - or - Do we need a DNS Delivery Controller? http://dnsdist.org/ PowerDNS Very briefly so you know where we come from Open source nameserver, around since 2000, open source since 2002,
DNS Risks, DNSSEC. Olaf M. Kolkman and Allison Mankin. [email protected] and [email protected]. http://www.nlnetlabs.nl/ 8 Feb 2006 Stichting NLnet Labs
DNS Risks, DNSSEC Olaf M. Kolkman and Allison Mankin [email protected] and [email protected] 8 Feb 2006 Stichting NLnet Labs DNSSEC evangineers of the day Allison: Independent consultant Member of the Internet2
Using the DNS as a Hammer The Good, the Bad and the Ugly
Using the DNS as a Hammer The Good, the Bad and the Ugly SATIN March 22, 2012 March 22, 2012, SATIN Conference March 22, 2012, SATIN Conference Presenter: Rod Rasmussen Rod.RasmussenInternetIdenBty.com
Kids and the Internet - Parental Control made easy. Christian Donner
Kids and the Internet - Parental Control made easy Christian Donner Setting the bar What is your level of experience with computers and the internet? What are you expecting to take away from this class?
DOMAIN NAME SECURITY EXTENSIONS
DOMAIN NAME SECURITY EXTENSIONS The aim of this paper is to provide information with regards to the current status of Domain Name System (DNS) and its evolution into Domain Name System Security Extensions
DNS, CDNs Weds March 17 2010 Lecture 13. What is the relationship between a domain name (e.g., youtube.com) and an IP address?
DNS, CDNs Weds March 17 2010 Lecture 13 DNS What is the relationship between a domain name (e.g., youtube.com) and an IP address? DNS is the system that determines this mapping. Basic idea: You contact
Products, Features & Services
Products, Features & Services PowerDNS PowerDNS, founded in the late 1990s, is a premier supplier of DNS software, services and support. Deployed throughout the world with some of the most demanding users
How the Great Firewall discovers hidden circumvention servers. Roya Ensafi David Fifield Philipp Winter Nick Weaver Nick Feamster Vern Paxson
How the Great Firewall discovers hidden circumvention servers Roya Ensafi David Fifield Philipp Winter Nick Weaver Nick Feamster Vern Paxson Much already known about GFW Numerous research papers and blog
Part 5 DNS Security. SAST01 An Introduction to Information Security 2015-09-21. Martin Hell Department of Electrical and Information Technology
SAST01 An Introduction to Information Security Part 5 DNS Security Martin Hell Department of Electrical and Information Technology How DNS works Amplification attacks Cache poisoning attacks DNSSEC 1 2
IPv6 and DNS. Secure64
IPv6 and DNS Secure64 About me Stephan Lagerholm Director and Founder of TXv6TF. Secure64 Software Corp. Sponsor of the event. AGENDA DNS and IPv6 basics IETF progress: DNS64 (RFC 6147) 464XLAT (RFC 6877)
Cablelynx Acceptable Use Policy
Cablelynx provides a variety of Internet Services (the Services) to both residential and business customers (the Customer). Below, you will find the terms and conditions that you agree to by subscribing
Building Your Firewall Rulebase Lance Spitzner Last Modified: January 26, 2000
Building Your Firewall Rulebase Lance Spitzner Last Modified: January 26, 2000 Building a solid rulebase is a critical, if not the most critical, step in implementing a successful and secure firewall.
The Canadian Internet Registration Authority (CIRA) manages a 100% up time service - the.ca domain name registry for over 2.
WHO IS.CA ( CIRA )? The organization responsible for a critical part of the Internet infrastructure; expanding its services to help organizations secure their DNS in Canada The Canadian Internet Registration
Network Infrastructure Under Siege
Network Infrastructure Under Siege Char Sample Security Engineer, CERT Information Security Decisions TechTarget Disclaimer Standard Disclaimer - This talk represents the opinions and research of the presenter
Registry Update. John Dickinson. Nominet UK
Registry Update John Dickinson Nominet UK Registry Update What Nominet does Recent technical changes and future plans What Nominet does UK Domain Name Registry Delegated to provide name resolution for.uk
TDC s perspective on DDoS threats
TDC s perspective on DDoS threats DDoS Dagen Stockholm March 2013 Lars Højberg, Technical Security Manager, TDC TDC in Sweden TDC in the Nordics 9 300 employees (2012) Turnover: 26,1 billion DKK (2012)
Response Policy Zones
Response Policy Zones Taking Back the DNS, V2.0 Paul Vixie Chairman and Chief Scientist Internet Systems Consortium Abstract DNS works as well for the bad guys (criminals, spammers, spies) as for respectable
DNS Caching Krytyczna infrastruktura operatora i ostatni element układanki
DNS Caching Krytyczna infrastruktura operatora i ostatni element układanki Adam Obszyński, CISSP, CCIE #8557 Regional Sales Engineer Eastern Europe [email protected] 1 Dawno temu AD 2000 2 Two kind
Web Publishing (Ch. 11.4)
Web Publishing (Ch. 11.4) Web publishing is the process of uploading web pages to a web server. Web server For a web page to be placed onto the Internet, it needs to be stored on a computer with the following
Building a small Data Centre
Building a small Data Centre Cause we re not all Facebook, Google, Amazon, Microsoft Karl Brumund, Dyn RIPE71 1 Dyn what we do DNS, email, Internet Intelligence from where 28 sites, 100s of probes, clouds
Domain Name System (DNS) RFC 1034 RFC 1035 http://www.ietf.org
Domain Name System (DNS) RFC 1034 RFC 1035 http://www.ietf.org TCP/IP Protocol Suite Application Layer DHCP DNS SNMP HTTP SMTP POP Transport Layer UDP TCP ICMP IGMP Network Layer IP Link Layer ARP ARP
shortcut Tap into learning NOW! Visit www.informit.com/shortcuts for a complete list of Short Cuts. Your Short Cut to Knowledge
shortcut Your Short Cut to Knowledge The following is an excerpt from a Short Cut published by one of the Pearson Education imprints. Short Cuts are short, concise, PDF documents designed specifically
MikroTik User Meeting Larnaca, Cyprus, 12 th of June 2015. Hotspot using social accounts. Ionas Iona
MikroTik User Meeting Larnaca, Cyprus, 12 th of June 2015 Hotspot using social accounts Ionas Iona About me Company : JoinMyWifi Position : Co-founder, Chief Technical Officer (CTO) Product : Wifi Marketing
Best Practices in Domain Name Registry Solutions Understanding the Technical Requirements of ICANN's Applicant Guidebook
Best Practices in Domain Name Registry Solutions Understanding the Technical Requirements of ICANN's Applicant Guidebook Adrian Kinderis - CEO AusRegistry International Agenda What options should
5 DNS Security Risks That Keep You Up At Night (And How To Get Back To Sleep)
5 DNS Security Risks That Keep You Up At Night (And How To Get Back To Sleep) survey says: There are things that go bump in the night, and things that go bump against your DNS security. You probably know
Internal Server Names and IP Address Requirements for SSL:
Internal Server Names and IP Address Requirements for SSL: Guidance on the Deprecation of Internal Server Names and Reserved IP Addresses provided by the CA/Browser Forum June 2012, Version 1.0 Introduction
PowerLink Bandwidth Aggregation Redundant WAN Link and VPN Fail-Over Solutions
Bandwidth Aggregation Redundant WAN Link and VPN Fail-Over Solutions Find your network example: 1. Basic network with and 2 WAN lines - click here 2. Add a web server to the LAN - click here 3. Add a web,
Internet Privacy Options
2 Privacy Internet Privacy Sirindhorn International Institute of Technology Thammasat University Prepared by Steven Gordon on 19 June 2014 Common/Reports/internet-privacy-options.tex, r892 1 Privacy Acronyms
ISP liability in Denmark
ISP liability in Denmark Clement Salung Petersen Assistant Professor, PhD Centre for Information and Innovation Law www.ciir.dk Dias 1 A Danish perspective on ISP liability ISP liability Mere conduit,
Corporate VPN Using Mikrotik Cloud Feature. By SOUMIL GUPTA BHAYA Mikortik Certified Trainer
Corporate VPN Using Mikrotik Cloud Feature By SOUMIL GUPTA BHAYA Mikortik Certified Trainer What is a VPN? A virtual private network (VPN) is a method for the extension of a private network across a public
Harness Your Internet Activity!
Harness Your Internet Activity Random Subdomain Attacks Plaguing the Internet Agenda Brief Intro Covered at last OARC Attack overview Latest data Progress on open dns proxies in home gateways Impact of
PowerDNS dnsdist. OX Summit 2015 All presentations will be on: https://www.powerdns.com/oxsummit
PowerDNS dnsdist OX Summit 2015 All presentations will be on: https://www.powerdns.com/oxsummit Dnsdist "dnsdist is a highly DNS-, DoS- and abuse-aware loadbalancer. Its goal in life is to route traffic
page 1 DNS Rate Limiting W. Matthijs Mekking [email protected] http://www.nlnetlabs.nl/ 28 Feb 2013 Stichting NLnet Labs
page 1 DNS Rate Limiting W. Matthijs Mekking [email protected] page 2 One slide DNS Root www.nlnetlabs.nl A Referral: nl NS www.nlnetlabs.nl A 213.154.224.1 www.nlnetlabs.nl A www.nlnetlabs.nl A 213.154.224.1
CMPT 471 Networking II
CMPT 471 Networking II Firewalls Janice Regan, 2006-2013 1 Security When is a computer secure When the data and software on the computer are available on demand only to those people who should have access
NANOG DNS BoF. DNS DNSSEC IPv6 Tuesday, February 1, 2011 NATIONAL ENGINEERING & TECHNICAL OPERATIONS
NANOG DNS BoF DNS DNSSEC IPv6 Tuesday, February 1, 2011 NATIONAL ENGINEERING & TECHNICAL OPERATIONS The Role Of An ISP In DNSSEC Valida;on ISPs act in two different DNSSEC roles, both signing and valida;ng
Firewall Server 7.2. Release Notes. What's New in Firewall Server 7.2
Firewall Server 7.2 Release Notes BorderWare Technologies is pleased to announce the release of version 7.2 of the Firewall Server. This release includes the following new features and improvements. What's
The Anatomy of Web Censorship in Pakistan
The Anatomy of Web Censorship in Pakistan Zubair Nabi [email protected] Information Technology University, Pakistan* Presented by: Mobin Javed UC Berkeley * Now at IBM Research, Dublin This website
Basic DNS Course. Module 1. DNS Theory. Ron Aitchison ZYTRAX, Inc. Page 1 of 24
Basic DNS Course Module 1 Ron Aitchison ZYTRAX, Inc. Page 1 of 24 The following are the slides used in this Module of the course. Some but not all slides have additional notes that you may find useful.
Computer Security CS 426 Lecture 36. CS426 Fall 2010/Lecture 36 1
Computer Security CS 426 Lecture 36 Perimeter Defense and Firewalls CS426 Fall 2010/Lecture 36 1 Announcements There will be a quiz on Wed There will be a guest lecture on Friday, by Prof. Chris Clifton
Enterprise Buyer Guide
Enterprise Buyer Guide Umbrella s Secure Cloud Gateway vs. Web Proxies or Firewall Filters Evaluating usability, performance and efficacy to ensure that IT teams and end users will be happy. Lightweight
DNS Measurements, Monitoring & Quality Control
DNS Measurements, Monitoring & Quality Control Universität Bielefeld [email protected] CENTR General Assembly Budapest, 2003-06-02 CENTR GA 2003-06-02 DNS Monitoring 1 of 18 The Monitor Some
DNS Server Operation & Configuration
Introduction The internet has a tree like network of DNS servers, which are responsible for converting a URL (e.g. www.google.com) to an IP address. The root DNS server shares it's database with all of
1. Comments on reviews a. Need to avoid just summarizing web page asks you for:
1. Comments on reviews a. Need to avoid just summarizing web page asks you for: i. A one or two sentence summary of the paper ii. A description of the problem they were trying to solve iii. A summary of
Firewalls for small business
By James Thomas DTEC 6823 Summer 2004 What is a firewall? Firewalls for small business A firewall is either hardware, software or a combination of both that is used to prevent, block or should I say try
PowerDNS Introduction
PowerDNS Introduction OX Summit 2015 All presentations will be on: https://www.powerdns.com/oxsummit PowerDNS History Founded in 1999 to provide database driven DNS + geographical load balancing between
Web Security. Mahalingam Ramkumar
Web Security Mahalingam Ramkumar Issues Phishing Spreading misinformation Cookies! Authentication Domain name DNS Security Transport layer security Dynamic HTML Java applets, ActiveX, JavaScript Exploiting
The story of dnsdist - or - Do we need a DNS Delivery Controller? http://dnsdist.org/
The story of dnsdist - or - Do we need a DNS Delivery Controller? http://dnsdist.org/ PowerDNS Very briefly so you know where we come from Open source nameserver, around since 2000, open source since 2002,
How To Understand The Power Of A Content Delivery Network (Cdn)
Overview 5-44 5-44 Computer Networking 5-64 Lecture 8: Delivering Content Content Delivery Networks Peter Steenkiste Fall 04 www.cs.cmu.edu/~prs/5-44-f4 Web Consistent hashing Peer-to-peer CDN Motivation
Zscaler Internet Security Frequently Asked Questions
Zscaler Internet Security Frequently Asked Questions 1 Technical FAQ PRODUCT LICENSING & PRICING How is Zscaler Internet Security Zscaler Internet Security is licensed on number of Cradlepoint devices
Use Domain Name System and IP Version 6
Use Domain Name System and IP Version 6 What You Will Learn The introduction of IP Version 6 (IPv6) into an enterprise environment requires some changes both in the provisioned Domain Name System (DNS)
MOC 20413C: Designing and Implementing a Server Infrastructure
MOC 20413C: Designing and Implementing a Server Infrastructure Course Overview This course provides students with the knowledge and skills to provide an enterprise solution that supports manual and automated
IPv6 and DNS. Secure64
IPv6 and DNS Secure64 About me Stephan Lagerholm Director and Founder of TXv6TF. Secure64 Software Corp. Sponsor of the event. Agenda: DNS and IPv6 basics DNS64 (RFC 6147) 464XLAT (RFC 6877) Heuristic
Designing and Implementing a Server Infrastructure
Course 20413C: Designing and Implementing a Server Infrastructure Course Details Course Outline Module 1: Planning Server Upgrade and Migration This module explains how to plan a server upgrade and migration
Security Design. [email protected] http://wwwiuk.informatik.uni-rostock.de/
Security Design [email protected] http://wwwiuk.informatik.uni-rostock.de/ Content Security Design Analysing Design Requirements Resource Separation a Security Zones VLANs Tuning Load Balancing
How To Understand A Network Attack
Network Security Attack and Defense Techniques Anna Sperotto (with material from Ramin Sadre) Design and Analysis of Communication Networks (DACS) University of Twente The Netherlands Attacks! Many different
Introduction to Computer Security Benoit Donnet Academic Year 2015-2016
Introduction to Computer Security Benoit Donnet Academic Year 2015-2016 1 Agenda Networking Chapter 1: Firewalls Chapter 2: Proxy Chapter 3: Intrusion Detection System Chapter 4: Network Attacks Chapter
Using Docker in Cloud Networks
Using Docker in Cloud Networks Chris Swan, CTO @cpswan the original cloud networking company 1 Agenda Docker Overview Dockerfile and DevOps Docker in Cloud Networks Some Trip Hazards My Docker Wish List
ARP and DNS. ARP entries are cached by network devices to save time, these cached entries make up a table
ARP and DNS Both protocols do conversions of a sort, but the distinct difference is ARP is needed for packet transfers and DNS is not needed but makes things much easier. ARP Address Resolution Protocol
