SAC 049 SSAC Report on DNS Zone Risk Assessment and Management
|
|
|
- Norman Watson
- 9 years ago
- Views:
Transcription
1 SAC 049 SSAC Report on DNS Zone Risk Assessment and Management A Report from the ICANN Security and Stability Advisory Committee (SSAC) 03 June 2011 SAC049 1
2 Preface This is a Report of the Security and Stability Advisory Committee (SSAC). The SSAC advises the ICANN community and Board on matters relating to the security and integrity of the Internet's naming and address allocation systems. This includes operational matters (e.g., matters pertaining to the correct and reliable operation of the root name system), administrative matters (e.g., matters pertaining to address allocation and Internet number assignment), and registration matters (e.g., matters pertaining to registry and registrar services). The SSAC engages in ongoing threat assessment and risk analysis of the Internet naming and address allocation services to assess where the principal threats to stability and security lie, and advises the ICANN community accordingly. The SSAC has no official authority to regulate, enforce or adjudicate. Those functions belong to others, and the advice offered here should be evaluated on its merits. The contributors to this Report, reference to the committee members biographies and statements of interest, and committee members objections to the findings or recommendations in this Report, are at end of this Report. SAC049 2
3 TableofContents 1.Introduction OverviewandBackground DomainNameRegistration ConfiguringDNS HostingDNS DNSZoneFileCompositionandPublicationConsiderations AssessingRisk RecommendationsforManagingRisk Acknowledgments,StatementsofInterests,andObjections,and Withdrawals Acknowledgments StatementsofInterest ObjectionsandWithdrawals Addendum:DNSSEC SAC049 3
4 1.Introduction This Report discusses circumstances that result in the loss or disruption of domain name resolution that can temporarily eliminate a domain name from the Internet. Without understanding the mechanisms underlying Domain Name System (DNS) operations and understanding the information necessary to construct DNS information, domain name registrants are at risk for long-term service interruptions. The Report provides an overview and background of the domain name registration process and how registration relates to domain name resolution. It considers technical or business circumstances that might result in loss or disruption of domain name resolution. The SSAC represents such circumstances as risks and recommends measures domain name registrants should take to reduce the impact to their businesses or organizations should any such circumstance affect their domain name(s). 2.OverviewandBackground Internet users rely on a unique distributed name system to identify computers and services accessible via the Internet. Names registered in this distributed database are called domain names. The DNS is used to access this database. While the DNS has many uses, the most familiar and common use of the DNS is to obtain the Internet Protocol (IP) address associated with a user-friendly domain name (e.g., The process of providing this translation from domain names to Internet Protocol (IP) addresses starts with domain name registration (where an individual or organization registers a domain and thus the right to use it), moving to configuring the DNS (where the registered user, the registrant, identifies the names and addresses of name servers that will provide authoritative name resolution), and then hosting the DNS for a particular domain name (i.e., the parties that operate the registered user s authoritative name servers). 2.1DomainNameRegistration Internet users obtain domain names through a registration process. An Internet user (or organization) first chooses a Top Level Domain (TLD) registry in which he will register a domain name (e.g., com). The user then chooses an available label to register (e.g., example). (In practice, label availability may influence the choice of TLD registry.) Through the registration process, the registry delegates authority to the user over his domain name. This process is often performed through a party called a domain name registrar. The user now formally a domain name registrant becomes responsible for the delegated part of the domain space named example.com. The registrant can now compose selected names within the domain name, e.g., and mail.example.com. SAC049 4
5 The SSAC reminds those registrants who use ICANN accredited registrars that they are obliged to provide complete and accurate registration information for each domain name they register. Clause of the Registrar Accreditation Agreement specifically warns that inaccurate information may be a cause for the cancellation of the domain name registration, which would, as a consequence, cause the domain to stop resolving. 1 Other registries may have similar requirements. 2.2ConfiguringDNS The registrant must make certain information available so that other Internet users can use the DNS to obtain the IP addresses associated with domain names under his authority; for example, a public-facing web or server. The registrant does so by composing a zone file of configuration information. A DNS zone file nominally includes the domain names of all the computers and services the registrant wishes to make accessible via the Internet and the IP addresses (Internet Protocol Version 4 (IPv4) or Internet Protocol Version 6 (IPv6)) associated with these domain names; it also includes certain mandatory and other resource records. The registrant then arranges for the zone file to be hosted at what is formally called an authoritative name server. The term authoritative is significant. While other servers called recursive name servers may provide name resolution for generally any domain name accessible via the public Internet (by querying other authoritative name servers), only the information hosted by an authoritative name server is treated as the accurate and complete set of information associated with a given domain name. 2.3HostingDNS To host DNS, the domain name registrant chooses a party or parties who will support an authoritative name service on his behalf, i.e. to host or publish the DNS zone file for the registrant s domain name. Such parties configure and operate a DNS name server to meet functional and operational standards. The registrant can choose to self-host an authoritative name service or he can contract with a third party to host the authoritative name service on his behalf. The third party may be any external party that provides name service to customers. Many domain registrars and resellers, ISPs, and businesses that offer web, , or other managed services (e.g., network access, security) offer DNS hosting as a service. Once the registrant chooses a DNS hosting provider, he must provide his registry, usually through a domain name registrar, with the domain name and the associated IP address information of the DNS hosting provider s name server(s) that will host his zone file. The TLD registry will include this information in the TLD zone file. Note that in many third-party DNS hosting scenarios, this step may be performed (with the registrant s consent) by his chosen DNS hosting provider. 1 ICANN Registrar Accreditation Agreement, 21 May 2009 < SAC049 5
6 2.4DNSZoneFileCompositionandPublicationConsiderations How a domain name registrant composes and publishes a DNS zone file is influenced by his choice of DNS hosting provider: 1. In self-hosted scenarios, the registrant s technical or administrative staff gathers the resource information, composes the DNS zone file, and publishes this on the registrant s name server(s). 2. In certain third-party hosting scenarios, the DNS hosting provider allows or expects the registrant to compose a DNS zone file in its entirety. The registrant delivers this to the hosting provider using whatever media, web portal, or transfer method the DNS hosting provider requires. 3. In other third-party hosting scenarios, the registrant submits some but not all zone data to the DNS hosting provider via a web submission form, , or other electronic or out-of-band manner. The DNS hosting provider uses this information to compose a zone file (or to configure its name service platforms with the equivalent of the zone data submitted by the registrant). In scenarios (2) and (3), the registrant may not be party to the actual preparation of the published zone data. Specifically, the registrant may not be made aware of, or keep all of, the potentially critical information that is used to create DNS resource records. For example, the registrant may not know the IP addresses of web, , or other hosted services he has outsourced, whether to the same or separate business entities. The SSAC thinks registrants may not know or appreciate the risk associated with such circumstances. Specifically, A registrant who does not have complete knowledge of the information used to create the zone file for a domain is at risk of having name resolution interrupted without the ability to restore name service. Why is this important? Domain name resolution is an essential and critical service. You or your organization s Internet presence relies on the ability of users to determine the IP addresses that you have associated with the names of your web, , or other publicfacing Internet services. If this resolution is not available, very few Internet users will connect to your web, or other services. Any circumstance where name resolution is interrupted is a threat to you or your organization s online presence. The remainder of this report explains the technical and business circumstances that place name service disruption at risk. We explain how to assess the risk and recommend measures that registrants can take to mitigate them. SAC049 6
7 3.AssessingRisk Registrants should be aware that certain attacks, incidents, or circumstances could harm a registrant s online presence. Examples of attacks, circumstances or incidents that may leave the registrant without a complete and accurate copy of the configuration information or the ability to update erroneous information used to create a zone file include: 1. A business or technical failure of a third-party DNS hosting provider. Examples of business failures include bankruptcy, or abrupt cessation of business by the operator, or as a result of a legal proceeding. Examples of technical failures include loss of Internet access, or damage to the provider s equipment or facilities that are significant enough to disrupt or permanently prevent the provider from restoring name service or resuming normal business operations. 2. A temporary (technical) failure of the registrant s self-hosted DNS hosting service. The technical failures here are similar to those mentioned in (1). 3. An attack resulting in compromise of the domain name registrant s domain registration account, usually at the domain name registrar, where the attacker alters the DNS configuration information associated with a domain, either replacing the intended IP address of the authoritative name server(s) with IP addresses under the attacker s control, or creating additional IP address entries. 4. A lock-out situation, i.e. a transfer of the domain or a change in the delegation of a domain, during which changes to DNS configuration information may be prohibited. 5. An attack against the registrant s administrative account for DNS hosting (including the self-hosted scenario) where the attacker alters DNS zone data for misuse of the registrant s DNS; for example, to deface or phish the registrant s domain. 6. A configuration error or insider attack, where an authorized administrator of a domain name registration account or administrative account for DNS hosting alters the correct DNS configuration or zone data. The types of harm resulting from such attacks, incidents, or circumstances include: Abrupt loss of, or loss of access to, the configuration information that is used to compose the registrant s authoritative zone file (or equivalent, for those DNS hosting providers that manage zone data in platform specific manners). Loss or disruption of name resolution service for a registered domain. Inconsistent name resolution. This can be a consequence when the registrant has provisioned for resilient name service (two or more DNS hosting providers that support authoritative name service for a domain name) but the DNS hosting providers are operating with conflicting zone data and are not providing the same answers to queries. SAC049 7
8 Delay in the publication of changes to zone data may cause continued use of stale or inaccurate zone data (i.e., the binding of a web server name to a wrong IP address) or suppression of changes that were necessary to rectify erroneous zone data. The duration of such harms varies, but registrants should be aware that loss of, disruption of, or inconsistent availability of name resolution service could persist for an indeterminate and possibly long period of time in circumstances where the registrant is unable to recover complete and accurate zone information. 4.RecommendationsforManagingRisk The SSAC recommends that registrants consider implementing the following safeguards and proactive measures to manage the risk associated with loss, disruption, or inconsistent availability of name service. Recommendation1:ThoroughlydocumentallaspectsofyourDNSarchitecture andoperations. Documentation should include but not be limited to: 1. Complete and accurate contact information, including emergency or abuse contacts, for all parties that provide DNS service. 2. Complete and accurate contact information, including emergency or abuse contacts, for all hosting parties on whom you depend upon for configuration information. Examples include web, , voice, or other hosting providers on whose systems your services are hosted and from whom you will obtain naming and IP address information for DNS resource records (e.g., MX, CNAME, NAPTR, or other resource record types). 3. Names and IP addresses of all name servers on which your zones are hosted. 4. Topology information, i.e. information that illustrates location and connectivity of your DNS hosting providers. 5. Copies of the published zone file. 6. Copies of all the information that is needed to compose your zone file. 7. Notes and instructions on the steps used to compose the zone file and the rationale for the contents. 8. Historical copies of all information listed above. 9. Operational statistics and trends related to load serviced by the DNS architecture. (These are useful when troubleshooting.) SAC049 8
9 Recommendation2:Designforresiliency. Design your name service so that it is as close to always available as possible. This means that your DNS service should be resilient to failure of any individual application, host or communications service. Typical availability standards for DNS are much higher than other Internet services; few DNS hosting providers who commit to an availability standard advertise anything less than percent availability. When considering a resilient design, it is important to identify human technical, topological, and hosting provider single points of failure in your name service infrastructure. Once you identify weak links in your existing design, eliminate these by introducing diversity where your name service is less resilient than desirable. Recommendation3:ActivelymanageDNSinformation. Change control is a critical component of DNS information management. Implement an approval process that documents the origin and reason for the change, the intended effect of the change, any dependencies (i.e., configuration changes to other resources affected by the change), and the party that authorized the change. Track changes by maintaining an audit trail or log as part of this process. Implement an archival process to ensure that your DNS information is regularly backed up, as well as a process to restore DNS (zone) information should the need occur. Schedule regular tests of zone restoration. Such tests can be as simple as copying the most recent DNS information from archive media to a name server and restarting the name server. Recommendation4:Protectdomainregistrationandhostingaccountsagainst unauthorizedaccessormisuse. Consider implementing measures to protect your domain registration account that SSAC identifies in SAC044: A Registrant's Guide to Protecting Domain Name Registration Accounts. 2 While SAC044 applies specifically to domain registration accounts, many measures are generally prescriptive: you can apply similar measures to protect accounts with DNS or other (web, ) hosting providers. Recommendation5:Monitorthehealthandwellbeingofyournameservice. Implement the practices for monitoring name resolution recommended in SAC044 or engage a trusted third party to monitor on your behalf. 2 SAC044: A Registrant s Guide to Protecting Domain Name Registration Accounts, ICANN Security and Stability Advisory Committee, 05 November 2010 < SAC049 9
10 Recommendation6:Trackoperationalstatisticsandtrends. Collecting and reviewing information related to load serviced by the DNS architecture is useful when troubleshooting operational problems and making decisions about infrastructure investments. Recommendation7:DevelopacontinuityplanforrecoveringfromDNS outages. Have a plan to respond to all possible outage types. Identify who is responsible, what actions responsible parties must take, and make certain responsible parties have access to all the documentation they need to perform their role in the recovery process. Document all incidents and perform a post-incident (mortem) analysis to assess the effectiveness of the plan. Recommendation8:Beforemakingchangesinprovisioning,plancarefully. Consider the order in which you must make changes so that you avoid unnecessary delays should any status locks be applied to the domain registration or third party provider accounts as a consequence of your change activities. As general guidance, follow these steps: 1. If you intend to change registrars (in those cases where a registrar is how you interact with the registry), do this before other changes. 2. If you intend to transfer the domain to a new registrant, do this before any change to the DNS configuration information associated with the domain. 3. If you intend to change DNS hosting providers, do this before making changes to zone file information. 4. If you intend to change the delegation of the zone, provide the gaining DNS hosting provider with the complete and accurate zone file before changing the delegation. Recommendation9:MakeinformedchoiceswhenselectingDNSproviders. When considering an operator to provide authoritative name service for your domains, ask questions that will help you make an informed choice and that will also help you formulate a strategy for managing risk. Sample questions to ask operators include: 1. How do you construct zone data (what information do you require from my organization)? 2. At how many sites will you host my zones? 3. Where (geographically) will the zones be hosted? SAC049 10
11 4. What is the bandwidth and server sizing for each site? 5. What measures do you take to secure name servers against attack? 6. What measures do you deploy to detect and mitigate Distributed Denial of Service (DDOS) attacks? 7. How do you monitor zones you host? 8. What information or reports do you provide based on your monitoring? 9. What forms of notifications or alerts do you provide customers for security events? Maintenance events? 10. What service levels do you commit to maintain? 11. Can your zone hosting monitoring mechanisms be integrated into my operational monitoring? This list is not exhaustive but representative of the types of questions to ask during interviews or in a request for proposal. 5.Acknowledgments,StatementsofInterests,andObjections, andwithdrawals These sections provide the reader information on three aspects of our process. The Acknowledgments section lists the members who contributed to this particular document. The Statements of Interest section points to the biographies of the Committee members and any conflicts of interest, real, apparent or potential, that may bear on the material in this document. The Objections and Withdrawals section provides a place for individual members to disagree with the content of this document or the process for preparing it. 5.1 Acknowledgments The committee wishes to thank the following SSAC members for their time, contributions, and review in producing this Report. Patrik Fältström Jim Galvin Merike Kaeo Xiaodong Lee Danny McPherson Richard Wilhelm Suzanne Woolf 5.2 StatementsofInterest SSAC member biographical information and Statements of Interest are available at: SAC049 11
12 5.3 ObjectionsandWithdrawals There were no objections or withdrawals. Addendum:DNSSEC DNS Security Extensions (DNSSEC) uses encryption methods to provide operationallevel protection against the unauthorized alteration of DNS information. 3 DNSSEC provides (1) origin authentication of DNS information and thus provides protection against impersonation attacks; (2) data integrity check and thus protection against cachepoisoning and related (e.g., Kaminsky 4 ) attacks; and (3) authenticated denial of existence for a particular name: an assurance that the domain name does not exist in the zone file. While DNSSEC increases the operational security of the DNS, it also adds complexity to day-to-day DNS operations. In particular, DNSSEC involves the use of public key cryptography, which itself requires the generation of public-private key pairs and distribution (publication) of public keys associated with signed zone data. Registrants must consider management of these keys, whether by an individual, organization, or a third-party agent such as a registrar or DNS hosting provider when they assess and seek to mitigate risk associated with domain zone data. The SSAC notes that as of the date of this report, registrar support for, and hosting of, DNSSEC-signed zone data is evolving rapidly (when compared to the hosting of traditional DNS). All members of the community are still acquiring operational experience after the signing of the root zone of the DNS, and best practices are slowly emerging. Consequently, the SSAC makes no specific recommendations at this time regarding DNSSEC except to encourage registrants that choose to adopt DNSSEC to discuss DNSSEC support with DNS hosting providers and to choose agents that can assist you with key management, DNSSEC signing of resource record sets, and public key distribution. The SSAC expects to examine DNSSEC-specific zone risk considerations again in a future report. 3 See DNSSEC Protocol Requests for Comment (RFCs) at < 4 See: < SAC049 12
SSAC Report on the IANA Functions Contract
SSAC Report on the IANA Functions Contract A Report from the ICANN Security and Stability Advisory Committee (SSAC) 10 October 2014 Preface This is a Report to the Internet Corporation for Assigned Names
FAQ (Frequently Asked Questions)
FAQ (Frequently Asked Questions) Specific Questions about Afilias Managed DNS What is the Afilias DNS network? How long has Afilias been working within the DNS market? What are the names of the Afilias
Computer Networks: Domain Name System
Computer Networks: Domain Name System Domain Name System The domain name system (DNS) is an application-layer protocol for mapping domain names to IP addresses DNS www.example.com 208.77.188.166 http://www.example.com
Guidance for Preparing Domain Name Orders, Seizures & Takedowns
Guidance for Preparing Domain Name Orders, Seizures & Takedowns Abstract This thought paper offers guidance for anyone who prepares an order that seeks to seize or take down domain names. Its purpose is
BEST PRACTICES FOR IMPROVING EXTERNAL DNS RESILIENCY AND PERFORMANCE
BEST PRACTICES FOR IMPROVING EXTERNAL DNS RESILIENCY AND PERFORMANCE BEST PRACTICES FOR IMPROVING EXTERNAL DNS RESILIENCY AND PERFORMANCE Your external DNS is a mission critical business resource. Without
Measures to Protect (University) Domain Registrations and DNS Against Attacks. Dave Piscitello, ICANN [email protected]
Measures to Protect (University) Domain Registrations and DNS Against Attacks Dave Piscitello, ICANN [email protected] Why are we talking about Domain names and DNS? Domain names and URLs define
ACCEPTABLE USE AND TAKEDOWN POLICY
ACCEPTABLE USE AND TAKEDOWN POLICY This Acceptable Use and Takedown Policy ( Acceptable Use Policy ) of Wedding TLD2, LLC (the Registry ), is to be read together with the Registration Agreement and words
Policy Overview and Definitions
Overview The following policies, which govern the top level domain (TLD or Registry) indicated on Schedule A, are based on policies and best practices drawn from ICANN, WIPO, and other relevant sources,
Deploying DNSSEC: From End-Customer To Content
Deploying DNSSEC: From End-Customer To Content March 28, 2013 www.internetsociety.org Our Panel Moderator: Dan York, Senior Content Strategist, Internet Society Panelists: Sanjeev Gupta, Principal Technical
THE MASTER LIST OF DNS TERMINOLOGY. v 2.0
THE MASTER LIST OF DNS TERMINOLOGY v 2.0 DNS can be hard to understand and if you re unfamiliar with the terminology, learning more about DNS can seem as daunting as learning a new language. To help people
Oracle Maps Cloud Service Enterprise Hosting and Delivery Policies Effective Date: October 1, 2015 Version 1.0
Oracle Maps Cloud Service Enterprise Hosting and Delivery Policies Effective Date: October 1, 2015 Version 1.0 Unless otherwise stated, these Oracle Maps Cloud Service Enterprise Hosting and Delivery Policies
CentralNic Privacy Policy Last Updated: July 31, 2012 Page 1 of 12. CentralNic. Version 1.0. July 31, 2012. https://www.centralnic.
CentralNic Privacy Policy Last Updated: July 31, 2012 Page 1 of 12 CentralNic Privacy Policy Version 1.0 July 31, 2012 https://www.centralnic.com/ CentralNic Privacy Policy Last Updated: February 6, 2012
Fast Flux Hosting and DNS ICANN SSAC
Fast Flux Hosting and DNS ICANN SSAC What is Fast Flux Hosting? An evasion technique Goal Avoid detection and take down of web sites used for illegal purposes Technique Host illegal content at many sites
Next Steps In Accelerating DNSSEC Deployment
Next Steps In Accelerating DNSSEC Deployment Dan York, CISSP Senior Content Strategist, Internet Society DNSSEC Deployment Workshop, ICANN 45 Toronto, Canada October 17, 2012 Internet Society Deploy360
THE MASTER LIST OF DNS TERMINOLOGY. First Edition
THE MASTER LIST OF DNS TERMINOLOGY First Edition DNS can be hard to understand and if you re unfamiliar with the terminology, learning more about DNS can seem as daunting as learning a new language. To
Pre Delegation Testing (PDT) Frequently Asked Questions (FAQ)
Pre Delegation Testing (PDT) Frequently Asked Questions (FAQ) [Ver 1.7 2013-06- 04] List of contents General questions Who do I contact with questions about Pre- Delegation Testing?... 3 What is the process
DNSSEC. Introduction. Domain Name System Security Extensions. AFNIC s Issue Papers. 1 - Organisation and operation of the DNS
AFNIC s Issue Papers DNSSEC Domain Name System Security Extensions 1 - Organisation and operation of the DNS 2 - Cache poisoning attacks 3 - What DNSSEC can do 4 - What DNSSEC cannot do 5 - Using keys
General Terms & Conditions for the Registration of.vg Domain Names April 14, 2014
General Terms & Conditions for the Registration of.vg Domain Names April 14, 2014 KSregistry GmbH (operating under the trade name Nic.VG) administers and operates the registry for internet Domain Names
Submission of the.au Domain Administration Ltd (auda) to the Australian Government's Cyber Security Review
Submission of the.au Domain Administration Ltd (auda) to the Australian Government's Cyber Security Review About auda.au Domain Administration Ltd (auda) is the industry self regulatory, not for profit
Best Practices in Domain Name Registry Solutions Understanding the Technical Requirements of ICANN's Applicant Guidebook
Best Practices in Domain Name Registry Solutions Understanding the Technical Requirements of ICANN's Applicant Guidebook Adrian Kinderis - CEO AusRegistry International Agenda What options should
DNSSEC - Why Network Operators Should Care And How To Accelerate Deployment
DNSSEC - Why Network Operators Should Care And How To Accelerate Deployment Dan York, CISSP Senior Content Strategist, Internet Society Eurasia Network Operators' Group (ENOG) 4 Moscow, Russia October
American International Group, Inc. DNS Practice Statement for the AIG Zone. Version 0.2
American International Group, Inc. DNS Practice Statement for the AIG Zone Version 0.2 1 Table of contents 1 INTRODUCTION... 6 1.1 Overview...6 1.2 Document Name and Identification...6 1.3 Community and
DNS Cache Poisoning Vulnerability Explanation and Remedies Viareggio, Italy October 2008
DNS Cache Poisoning Vulnerability Explanation and Remedies Viareggio, Italy October 2008 Kim Davies Internet Assigned Numbers Authority Internet Corporation for Assigned Names & Numbers Agenda How do you
ASX CLEAR (FUTURES) OPERATING RULES Guidance Note 10
BUSINESS CONTINUITY AND DISASTER RECOVERY The purpose of this Guidance Note The main points it covers To assist participants to understand the disaster recovery and business continuity arrangements they
Registration Agreement
Registration Agreement In order to complete the registration process you must read and agree to be bound by all terms and conditions herein. TERMS AND CONDITIONS 1.Definitions "You" and "your" refers to
-«Trustee Authority»: Entity that defines and regulates the conditions of assignment and use of Domain Names, applying to each particular Extension.
NETIM - GENERAL TERMS AND CONDITIONS OF DOMAIN NAMES CG-ND version 2.1-15 th November 2015 NETIM, limited liability company under french law, with head office located 165 avenue de bretagne 59000 LILLE
Monitoring the DNS. Gustavo Lozano Event Name XX XXXX 2015
Monitoring the DNS Gustavo Lozano Event Name XX XXXX 2015 Agenda 1 2 3 Components of the DNS Monitoring gtlds Monitoring other components of the DNS 4 5 Monitoring system Conclusion 2 Components of the
Securing DNS Infrastructure Using DNSSEC
Securing DNS Infrastructure Using DNSSEC Ram Mohan Executive Vice President, Afilias [email protected] February 28, 2009 Agenda Getting Started Finding out what DNS does for you What Can Go Wrong A Survival
Service Description for the Registration and Administration of Domain Names by Swisscom
Service Description for the Registration and Administration of Domain Names by Swisscom 1 Area of application This Service Description govern the conditions for the registration, administration, and use
ASX SETTLEMENT OPERATING RULES Guidance Note 10
BUSINESS CONTINUITY AND DISASTER RECOVERY The purpose of this Guidance Note The main points it covers To assist participants to understand the disaster recovery and business continuity arrangements they
Acceptable Use Policy
Introduction This Acceptable Use Policy (AUP) sets forth the terms and conditions for the use by a Registrant of any domain name registered in the top-level domain (TLD). This Acceptable Use Policy (AUP)
ensure prompt restart of critical applications and business activities in a timely manner following an emergency or disaster
Security Standards Symantec shall maintain administrative, technical, and physical safeguards for the Symantec Network designed to (i) protect the security and integrity of the Symantec Network, and (ii)
F5 and Infoblox DNS Integrated Architecture Offering a Complete Scalable, Secure DNS Solution
F5 and Infoblox DNS Integrated Architecture Offering a Complete Scalable, Secure DNS Solution As market leaders in the application delivery market and DNS, DHCP, and IP Address Management (DDI) market
Attachment A. Identification of Risks/Cybersecurity Governance
Attachment A Identification of Risks/Cybersecurity Governance 1. For each of the following practices employed by the Firm for management of information security assets, please provide the month and year
.BIO DOMAIN NAME POLICY v2.0 - Last Update: May 30, 2014. Starting Dot Ltd..BIO DOMAIN NAME POLICY - V1.0 - AS OF 30 MAY 2014 1
.BIO DOMAIN NAME POLICY v2.0 - Last Update: May 30, 2014 Starting Dot Ltd..BIO DOMAIN NAME POLICY - V1.0 - AS OF 30 MAY 2014 1 Background 1..bio (also designated as the ".BIO domain") is a generic Top-Level
The Importance of a Resilient DNS and DHCP Infrastructure
White Paper The Importance of a Resilient DNS and DHCP Infrastructure DNS and DHCP availability and integrity increase in importance with the business dependence on IT systems The Importance of DNS and
Part 5 DNS Security. SAST01 An Introduction to Information Security 2015-09-21. Martin Hell Department of Electrical and Information Technology
SAST01 An Introduction to Information Security Part 5 DNS Security Martin Hell Department of Electrical and Information Technology How DNS works Amplification attacks Cache poisoning attacks DNSSEC 1 2
Decoding DNS data. Using DNS traffic analysis to identify cyber security threats, server misconfigurations and software bugs
Decoding DNS data Using DNS traffic analysis to identify cyber security threats, server misconfigurations and software bugs The Domain Name System (DNS) is a core component of the Internet infrastructure,
AUSTRACLEAR REGULATIONS Guidance Note 10
BUSINESS CONTINUITY AND DISASTER RECOVERY The purpose of this Guidance Note The main points it covers To assist participants to understand the disaster recovery and business continuity arrangements they
Public-Root Name Server Operational Requirements
Public-Root Name Server Operational Requirements Published January the 17 th, 2005 Status of this Document This document provides information to the Public-Root and Internet technical community. This document
Verisign/ICANN Proposal in Response to NTIA Request
Verisign/ICANN Proposal in Response to NTIA Request Root Zone Administrator Proposal Related to the IANA Functions Stewardship Transition Introduction On March 14, 2014, NTIA announced its intent to transition
Quality Certificate for Kaspersky DDoS Prevention Software
Quality Certificate for Kaspersky DDoS Prevention Software Quality Certificate for Kaspersky DDoS Prevention Software Table of Contents Definitions 3 1. Conditions of software operability 4 2. General
Technical Standards for Information Security Measures for the Central Government Computer Systems
Technical Standards for Information Security Measures for the Central Government Computer Systems April 21, 2011 Established by the Information Security Policy Council Table of Contents Chapter 2.1 General...
USING TRANSACTION SIGNATURES (TSIG) FOR SECURE DNS SERVER COMMUNICATION
USING TRANSACTION SIGNATURES (TSIG) FOR SECURE DNS SERVER COMMUNICATION Transaction Signatures (TSIG) provide a secure method for communicating in the Domain Name System (DNS) from a primary to a secondary
.IBM TLD Registration Policy
I. Introduction These registration conditions govern the rights and obligations of the Registry Operator, International Business Machines Corporation ( Registry Operator or IBM ), and the accredited registrars,
Specifications for Registrars' Interaction with the Domain Registration System During Landrush and General Registration Periods
Фонд содействия развитию технологий и инфраструктуры Интернета Введено в действие: 24 сентября 2014 г. Foundation for Assistance for Internet Technologies and Infrastructure Development Specifications
Barracuda Link Balancer Administrator s Guide
Barracuda Link Balancer Administrator s Guide Version 1.0 Barracuda Networks Inc. 3175 S. Winchester Blvd. Campbell, CA 95008 http://www.barracuda.com Copyright Notice Copyright 2008, Barracuda Networks
Domain Name System 2015-04-28 17:49:44 UTC. 2015 Citrix Systems, Inc. All rights reserved. Terms of Use Trademarks Privacy Statement
Domain Name System 2015-04-28 17:49:44 UTC 2015 Citrix Systems, Inc. All rights reserved. Terms of Use Trademarks Privacy Statement Contents Domain Name System... 4 Domain Name System... 5 How DNS Works
Lesson 13: DNS Security. Javier Osuna [email protected] GMV Head of Security and Process Consulting Division
Lesson 13: DNS Security Javier Osuna [email protected] GMV Head of Security and Process Consulting Division Introduction to DNS The DNS enables people to use and surf the Internet, allowing the translation
Websites Made Easy a division of Securecom Limited (WSME) -.nz Domain Names Terms and Conditions
Websites Made Easy a division of Securecom Limited (WSME) -.nz Domain Names Terms and Conditions Terms and Conditions Governing the Provision of Services by WSME All domain name registrations, renewals
DATA PROTECTION LAWS OF THE WORLD. India
DATA PROTECTION LAWS OF THE WORLD India Date of Download: 6 February 2016 INDIA Last modified 27 January 2016 LAW IN INDIA There is no specific legislation on privacy and data protection in India. However,
DNS and BIND. David White
DNS and BIND David White DNS: Backbone of the Internet Translates Domains into unique IP Addresses i.e. developcents.com = 66.228.59.103 Distributed Database of Host Information Works seamlessly behind
ELMBROOK TECHNOLOGIES LIMITED Domain Names Standard Terms & Conditions (for.nz Domain Names)
ELMBROOK TECHNOLOGIES LIMITED Domain Names Standard Terms & Conditions (for.nz Domain Names) All domain name registrations, renewals and other domain name maintenance services provided by Elmbrook Technologies
SSAC Advisory on DDoS Attacks Leveraging DNS Infrastructure
SSAC Advisory on DDoS Attacks Leveraging DNS Infrastructure An Advisory from the ICANN Security and Stability Advisory Committee (SSAC) 18 February 2014 1 Preface This is an Advisory to the ICANN Board
5 DNS Security Risks That Keep You Up At Night (And How To Get Back To Sleep)
5 DNS Security Risks That Keep You Up At Night (And How To Get Back To Sleep) survey says: There are things that go bump in the night, and things that go bump against your DNS security. You probably know
Course Outline. Course 20336B: Core Solutions of Microsoft Lync Server 2013. Duration: 5 Days
Course 20336B: Core Solutions of Microsoft Lync Server 2013 Duration: 5 Days What you will learn This instructor-led course teaches IT professionals how to plan, design, deploy, configure, and administer
.tirol Anti-Abuse Policy
Translation from German.tirol Anti-Abuse Policy This policy is based on Austrian legislation. In case of doubt the German version of this policy is in force. Page 1 Contents 1. Management Summary... 3
ICANN STRATEGIC PLAN JULY 2012 JUNE 2015
ICANN STRATEGIC PLAN JULY 2012 JUNE 2015 One World. One Internet. One World. One Internet. ICANN is the global organization that coordinates the Internet s unique identifier systems for worldwide public
A Survey of cctld DNS Vulnerabilities. ITU cctld Workshop March 3, 2003 [email protected]
A Survey of cctld DNS Vulnerabilities ITU cctld Workshop March 3, 2003 [email protected] RATIONALE Health-check on DNS infrastructure > Now becoming a critical national resource Attacks on DNS servers
ARTE TLD REGISTRATION POLICY
ARTE TLD REGISTRATION POLICY 1. ELIGIBILITY Only Association Relative à la Télévision Européenne G.E.I.E. (ARTE), its Affiliates or the Trademark Licensees could be eligible to register a Domain Name under
Strengthening our Ecosystem through Stakeholder Collaboration. Jia-Rong Low, Sr Director, Asia 20 August 2015
Strengthening our Ecosystem through Stakeholder Collaboration Jia-Rong Low, Sr Director, Asia 20 August 2015 Agenda 1 2 3 About ICANN and the Domain Name System (DNS) DNS attacks and their impact DNS Security
Our Customer Relationship Agreement HOSTING & DOMAINS SERVICE DESCRIPTION
Our Customer Relationship Agreement HOSTING & DOMAINS SERVICE DESCRIPTION iinet Limited ACN 068 628 937 Phone: 13 22 58 Westnet Pty Ltd ACN 086 416 908 Phone: 1300 786 068 Adam Internet Pty Ltd ACN 055
Specifications for Registrars' Interaction with Flexireg Domain Registration System
Foundation for Assistance for Internet Technologies and Infrastructure Development Specifications for Registrars' Interaction with Flexireg Domain Registration System Version 1.1. Moscow, 2015 Table of
NETWORK AND CERTIFICATE SYSTEM SECURITY REQUIREMENTS
NETWORK AND CERTIFICATE SYSTEM SECURITY REQUIREMENTS Scope and Applicability: These Network and Certificate System Security Requirements (Requirements) apply to all publicly trusted Certification Authorities
Introduction to the DANE Protocol
Introduction to the DANE Protocol ICANN 47 July 17, 2013 Internet Society Deploy360 Programme Providing real-world deployment info for IPv6, DNSSEC, routing and other Internet technologies: Case Studies
STRATEGIC POLICY. Information Security Policy Documentation. Network Management Policy. 1. Introduction
Policy: Title: Status: 1. Introduction ISP-S12 Network Management Policy Revised Information Security Policy Documentation STRATEGIC POLICY 1.1. This information security policy document covers management,
Basic DNS Course. Module 1. DNS Theory. Ron Aitchison ZYTRAX, Inc. Page 1 of 24
Basic DNS Course Module 1 Ron Aitchison ZYTRAX, Inc. Page 1 of 24 The following are the slides used in this Module of the course. Some but not all slides have additional notes that you may find useful.
Head of Information & Communications Technology Responsible work team: ICT Security. Key point summary... 2
Policy Procedure Information security policy Policy number: 442 Old instruction number: MAN:F005:a1 Issue date: 24 August 2006 Reviewed as current: 11 July 2014 Owner: Head of Information & Communications
Module 2. Configuring and Troubleshooting DNS. Contents:
Configuring and Troubleshooting DNS 2-1 Module 2 Configuring and Troubleshooting DNS Contents: Lesson 1: Installing the DNS Server Role 2-3 Lesson 2: Configuring the DNS Server Role 2-9 Lesson 3: Configuring
March 2012 www.tufin.com
SecureTrack Supporting Compliance with PCI DSS 2.0 March 2012 www.tufin.com Table of Contents Introduction... 3 The Importance of Network Security Operations... 3 Supporting PCI DSS with Automated Solutions...
DNSSEC Practice Statement (DPS)
DNSSEC Practice Statement (DPS) 1. Introduction This document, "DNSSEC Practice Statement ( the DPS ) for the zones under management of Zodiac Registry Limited, states ideas of policies and practices with
Core Solutions of Microsoft Lync Server 2013
Course 20336A: Core Solutions of Microsoft Lync Server 2013 Length: Audience(s): 5 Days Level: 300 IT Professionals Technology: Microsoft Lync Server 2013 Type: Delivery Method: Course Instructor-led (classroom)
CLOUD SERVICE SCHEDULE
CLOUD SERVICE SCHEDULE 1 DEFINITIONS Defined terms in the Standard Terms and Conditions have the same meaning in this Service Schedule unless expressed to the contrary. In this Service Schedule, unless
VERISIGN DDoS PROTECTION SERVICES CUSTOMER HANDBOOK
HANDBOOK VERISIGN DDoS PROTECTION SERVICES CUSTOMER HANDBOOK CONSIDERATIONS FOR SERVICE ADOPTION Version 1.0 July 2014 VerisignInc.com CONTENTS 1. WHAT IS A DDOS PROTECTION SERVICE? 3 2. HOW CAN VERISIGN
.Brand TLD Designation Application
.Brand TLD Designation Application Internet Corporation for Assigned Names and Numbers ( ICANN ) 12025 Waterfront Drive, Suite 300 Los Angeles, California 90094 Attention: New gtld Program Staff RE: Application
Service Schedule for Business Email Lite powered by Microsoft Office 365
Service Schedule for Business Email Lite powered by Microsoft Office 365 1. SERVICE DESCRIPTION Service Overview 1.1 The Service is a hosted messaging service that delivers the capabilities of Microsoft
Secure Domain Name System (DNS) Deployment Guide
NIST Special Publication 800-81-2 Secure Domain Name System (DNS) Deployment Guide Ramaswamy Chandramouli Scott Rose C O M P U T E R S E C U R I T Y NIST Special Publication 800-81-2 Secure Domain Name
The secret life of a DNS query. Igor Sviridov <[email protected]> 20120522
The secret life of a DNS query Igor Sviridov 20120522 Preface Nowadays, when we type URL (or is it a search string? ;-) into a browser (or mobile device) many things happen. While most of
