Monitoring the DNS. Gustavo Lozano Event Name XX XXXX 2015
|
|
|
- Jeffrey Craig
- 10 years ago
- Views:
Transcription
1 Monitoring the DNS Gustavo Lozano Event Name XX XXXX 2015
2 Agenda Components of the DNS Monitoring gtlds Monitoring other components of the DNS 4 5 Monitoring system Conclusion 2
3 Components of the DNS
4 The DNS The DNS is made of several components that must work well, in order to have a system that performs optimally as a whole. The main components of the DNS are: The root zone Top Level Domains (TLDs) Second Level Domains (SLDs) Recursive DNS service Registries, registrars and DNS operators are also part of the equation, because they are the source for the majority of the information in the DNS. Most end-users don t know about the DNS, but if the DNS is underperforming, the Internet is not working for them. 4
5 The DNS 5
6 Monitoring of gtlds
7 Monitoring of gtlds The new gtld program redefined ICANN s responsibilities regarding monitoring the performance of the DNS, DNSSEC, WHOIS and EPP services (critical services). The new gtld program also redefined the Service Level Requirements for Registries regarding these critical functions. The specific details about the Service Level Agreement and ICANN s responsibilities regarding monitoring could be found in Specification 10 of the new gtld base registry agreement: 7
8 How does ICANN monitor gtlds? Data Processor Probe Node Probe Node Probe Node Ry 8
9 Anatomy of the DNS service (authoritative) An authoritative server provides authoritative information about a DNS zone. example.com: ns1.example.com :0DB8:1::1 ns2.example.com :0DB8:2::1 ns3.example.com
10 Service Level Agreement DNS SLA: Parameter SLR (monthly basis) DNS service availability 0 min downtime (100% availability) DNS name server availability 432 min of downtime (» 99%) TCP DNS resolution RTT 1500 ms, for at least 95% of the queries UDP DNS resolution RTT 500 ms, for at least 95% of the queries DNS update time 60 min, for at least 95% of the probes 10
11 DNS Monitoring The probe node network consists of approximately 45 probe nodes around the world. If 51% or more of the DNS testing probes see the service as unavailable during a given time, the DNS service will be considered unavailable. SPEC10: Probes for measuring DNS parameters shall be placed as near as possible to the DNS resolvers on the networks with the most users. 11
12 DNS service availability DNS service availability: SPEC10: For the service to be considered available at a particular moment, at least, two of the delegated name servers registered in the DNS must have successful results from DNS tests to each of their public-dns registered IP addresses to which the name server resolves. Parameter SLR (monthly basis) DNS service availability 0 min downtime (100% availability) DNS name server availability 432 min of downtime (» 99%) TCP DNS resolution RTT 1500 ms, for at least 95% of the queries UDP DNS resolution RTT 500 ms, for at least 95% of the queries DNS update time 60 min, for at least 95% of the probes example.com: ns1.example.com ns2.example.com :0DB8:1:: :0DB8:2::1 ns3.example.com % 12
13 DNS name server availability DNS NS availability: SPEC10: Refers to the ability of a public-dns registered IP address of a particular name server listed as authoritative for a domain name, to answer DNS queries from an Internet user. Parameter SLR (monthly basis) DNS service availability 0 min downtime (100% availability) DNS name server availability 432 min of downtime (» 99%) TCP DNS resolution RTT 1500 ms, for at least 95% of the queries UDP DNS resolution RTT 500 ms, for at least 95% of the queries DNS update time 60 min, for at least 95% of the probes example.com: ns1.example.com ns2.example.com :0DB8:1:: :0DB8:2::1 ns3.example.com % 13
14 UDP/TCP DNS resolution RTT TCP DNS resolution RTT SPEC10: Refers to the RTT (Round-Trip Time) of the sequence of packets from the start of the TCP connection to its end, including the reception of the DNS response for only one DNS query. If the RTT is 5 times greater than the time specified in the relevant SLR, the RTT will be considered undefined. Parameter SLR (monthly basis) DNS service availability 0 min downtime (100% availability) DNS name server availability 432 min of downtime (» 99%) TCP DNS resolution RTT 1500 ms, for at least 95% of the queries UDP DNS resolution RTT 500 ms, for at least 95% of the queries DNS update time 60 min, for at least 95% of the probes example.com: ns1.example.com ns2.example.com :0DB8:1:: :0DB8:2::1 ns3.example.com
15 UDP/TCP DNS resolution RTT UDP DNS resolution RTT SPEC10: Refers to the RTT (Round-Trip Time) of the sequence of two packets, the UDP DNS query and the corresponding UDP DNS response. If the RTT is 5 times greater than the time specified in the relevant SLR, the RTT will be considered undefined. Parameter SLR (monthly basis) DNS service availability 0 min downtime (100% availability) DNS name server availability 432 min of downtime (» 99%) TCP DNS resolution RTT 1500 ms, for at least 95% of the queries UDP DNS resolution RTT 500 ms, for at least 95% of the queries DNS update time 60 min, for at least 95% of the probes example.com: ns1.example.com ns2.example.com :0DB8:1:: :0DB8:2::1 ns3.example.com
16 DNS test DNS test: SPEC10: Means one nonrecursive DNS query sent to a particular IP address (via UDP or TCP). A query with a DNS resolution RTT 5 times higher than the corresponding SLR, will be considered unanswered. example.com: ns1.example.com ns2.example.com :0DB8:1:: :0DB8:2::1 ns3.example.com
17 DNSSEC DNSSEC: SPEC10: For a query to be considered answered, the signatures must be positively verified against a corresponding DS record published in the parent zone. example.com: ns1.example.com ns2.example.com :0DB8:1:: :0DB8:2::1 ns3.example.com
18 DNS update time DNS update time: SPEC10: Refers to the time measured from the reception of an EPP confirmation to a transform command on a domain name, until the name servers of the parent domain name answer DNS queries with data consistent with the change made. Parameter SLR (monthly basis) DNS service availability 0 min downtime (100% availability) DNS name server availability 432 min of downtime (» 99%) TCP DNS resolution RTT 1500 ms, for at least 95% of the queries UDP DNS resolution RTT 500 ms, for at least 95% of the queries DNS update time 60 min, for at least 95% of the probes example.com: ns1.example.com ns2.example.com :0DB8:1:: :0DB8:2::1 ns3.example.com
19 EBERO EBERO: If the DNS service of a TLD fails for more than 4 hours on a rolling week basis, ICANN may appoint an Emergency Back-end Registry Operator (EBERO) to maintain the correct operation of the TLD. 19
20 Monitoring other components of the DNS
21 Monitoring other components of the DNS 21
22 Monitoring other components of the DNS ISPs and DNS Operators should monitor the authoritative servers for their SLDs. SLD.TLD: ns1.example.com :0DB8:1::1 ISPs and DNS Operators may use the same methodology used by ICANN to monitor new gtlds. ns2.example.com :0DB8:2::1 ns3.example.com % 22
23 Monitoring recursive DNS servers The recursive DNS service plays an important role in the perception of a healthy Internet service for end-users. ISPs and DNS Operators may monitor the recursive DNS service using the same methodology that ICANN uses for gtlds with some differences: 1. The probe nodes should be placed close to the endusers of the recursive name servers. 23
24 Monitoring recursive DNS servers 2. A domain name hosted on authoritative servers outside of the internal network may be used to monitor the recursive DNS servers. Preferably, the domain name used to monitor should be registered by the ISP or DNS Operator. 3. The cache of the recursive DNS server should be considered when monitoring a recursive DNS server. For example, the domain name used to monitor could be configured with a low TTL in order to force the recursive DNS server to execute the resolution process for the domain name. 24
25 Monitoring recursive DNS servers 4. If DNSSEC is supported by the recursive DNS server, the domain name used to monitor should be signed with DNSSEC. 5. Negative testing in the case of DNSSEC should be performed. A domain name with failing DNSSEC signatures should be used for negative testing. 25
26 Monitoring system
27 Monitoring system The monitoring system used by ICANN is operated in-house. The monitoring system is actively developed by Zabbix SIA, and it is based on the Zabbix monitoring platform. All code is open source, and published under the same license as the Zabbix monitoring platform. 27
28 Alerting The monitoring system sends alerts to the registry operators. The monitoring system escalates the alerts via voice (phone call) to the registry operators. In addition to the threshold of 51% probe nodes detecting a problem, the monitoring system creates an incident after 3 consecutive failing test cycles (test cycle is calculated every minute). 28
29 Conclusion
30 Conclusion The health of the DNS system requires that several components operated by different actors are performing optimally. ICANN monitors and proactively works with the gtld operators when DNS issues are detected. ISPs and DNS Operators may use the same methodology to monitor the other components of the DNS (i.e. recursive servers and authoritative severs for SLDs). 30
31 Thank You and Questions Thank You and Questions Reach us at: Website: icann.org twitter.com/icann gplus.to/icann facebook.com/icannorg weibo.com/icannorg linkedin.com/company/icann flickr.com/photos/icann youtube.com/user/icannnews slideshare.net/icannpresentations 31
Strengthening our Ecosystem through Stakeholder Collaboration. Jia-Rong Low, Sr Director, Asia 20 August 2015
Strengthening our Ecosystem through Stakeholder Collaboration Jia-Rong Low, Sr Director, Asia 20 August 2015 Agenda 1 2 3 About ICANN and the Domain Name System (DNS) DNS attacks and their impact DNS Security
Computer Networks: Domain Name System
Computer Networks: Domain Name System Domain Name System The domain name system (DNS) is an application-layer protocol for mapping domain names to IP addresses DNS www.example.com 208.77.188.166 http://www.example.com
DNS and BIND. David White
DNS and BIND David White DNS: Backbone of the Internet Translates Domains into unique IP Addresses i.e. developcents.com = 66.228.59.103 Distributed Database of Host Information Works seamlessly behind
THE MASTER LIST OF DNS TERMINOLOGY. v 2.0
THE MASTER LIST OF DNS TERMINOLOGY v 2.0 DNS can be hard to understand and if you re unfamiliar with the terminology, learning more about DNS can seem as daunting as learning a new language. To help people
DNS Cache Poisoning Vulnerability Explanation and Remedies Viareggio, Italy October 2008
DNS Cache Poisoning Vulnerability Explanation and Remedies Viareggio, Italy October 2008 Kim Davies Internet Assigned Numbers Authority Internet Corporation for Assigned Names & Numbers Agenda How do you
Chapter 25 Domain Name System. 25.1 Copyright The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Chapter 25 Domain Name System 25.1 Copyright The McGraw-Hill Companies, Inc. Permission required for reproduction or display. 25.2 Figure 25.1 Example of using the DNS service 25-1 NAME SPACE To be unambiguous,
THE MASTER LIST OF DNS TERMINOLOGY. First Edition
THE MASTER LIST OF DNS TERMINOLOGY First Edition DNS can be hard to understand and if you re unfamiliar with the terminology, learning more about DNS can seem as daunting as learning a new language. To
Pre Delegation Testing (PDT) Frequently Asked Questions (FAQ)
Pre Delegation Testing (PDT) Frequently Asked Questions (FAQ) [Ver 1.7 2013-06- 04] List of contents General questions Who do I contact with questions about Pre- Delegation Testing?... 3 What is the process
Domain Name System 2015-04-28 17:49:44 UTC. 2015 Citrix Systems, Inc. All rights reserved. Terms of Use Trademarks Privacy Statement
Domain Name System 2015-04-28 17:49:44 UTC 2015 Citrix Systems, Inc. All rights reserved. Terms of Use Trademarks Privacy Statement Contents Domain Name System... 4 Domain Name System... 5 How DNS Works
Guidance for Preparing Domain Name Orders, Seizures & Takedowns
Guidance for Preparing Domain Name Orders, Seizures & Takedowns Abstract This thought paper offers guidance for anyone who prepares an order that seeks to seize or take down domain names. Its purpose is
Lecture 2 CS 3311. An example of a middleware service: DNS Domain Name System
Lecture 2 CS 3311 An example of a middleware service: DNS Domain Name System The problem Networked computers have names and IP addresses. Applications use names; IP uses for routing purposes IP addresses.
Application and service delivery with the Elfiq idns module
Technical White Paper Application and service delivery with the Elfiq idns module For Elfiq Operating System (EOS) version 3.x Document Revision 1.63 June 2012 Table of Contents 1. The IDNS module... 3
How To Manage Dns On An Elfiq Link Load Balancer (Link Balancer) On A Pcode (Networking) On Ipad Or Ipad (Netware) On Your Ipad On A Ipad At A Pc Or Ipa
White paper The IDNS module for incoming load balancing For Elfiq Operating System (EOS) version 3.x Document Revision 1.5 October 2007 Elfiq Solutions www.elfiq.com COPYRIGHT The content of this document
EMERGENCY BACK- END REGISTRY OPERATOR AGREEMENT ARTICLE 1. DESIGNATION AS EBERO; REPRESENTATIONS AND WARRANTIES
EXECUTION COPY EMERGENCY BACK- END REGISTRY OPERATOR AGREEMENT This EMERGENCY BACK- END REGISTRY OPERATOR AGREEMENT (this Agreement ) is entered into as of 16 August 2013 (the Effective Date ) between
Part 5 DNS Security. SAST01 An Introduction to Information Security 2015-09-21. Martin Hell Department of Electrical and Information Technology
SAST01 An Introduction to Information Security Part 5 DNS Security Martin Hell Department of Electrical and Information Technology How DNS works Amplification attacks Cache poisoning attacks DNSSEC 1 2
FAQ (Frequently Asked Questions)
FAQ (Frequently Asked Questions) Specific Questions about Afilias Managed DNS What is the Afilias DNS network? How long has Afilias been working within the DNS market? What are the names of the Afilias
Specifications for Registrars' Interaction with Flexireg Domain Registration System
Foundation for Assistance for Internet Technologies and Infrastructure Development Specifications for Registrars' Interaction with Flexireg Domain Registration System Version 1.1. Moscow, 2015 Table of
DNSSEC - Why Network Operators Should Care And How To Accelerate Deployment
DNSSEC - Why Network Operators Should Care And How To Accelerate Deployment Dan York, CISSP Senior Content Strategist, Internet Society Eurasia Network Operators' Group (ENOG) 4 Moscow, Russia October
NANOG DNS BoF. DNS DNSSEC IPv6 Tuesday, February 1, 2011 NATIONAL ENGINEERING & TECHNICAL OPERATIONS
NANOG DNS BoF DNS DNSSEC IPv6 Tuesday, February 1, 2011 NATIONAL ENGINEERING & TECHNICAL OPERATIONS The Role Of An ISP In DNSSEC Valida;on ISPs act in two different DNSSEC roles, both signing and valida;ng
Use Domain Name System and IP Version 6
Use Domain Name System and IP Version 6 What You Will Learn The introduction of IP Version 6 (IPv6) into an enterprise environment requires some changes both in the provisioned Domain Name System (DNS)
The Environment Surrounding DNS. 3.1 The Latest DNS Trends. 3. Technology Trends
3. The Environment Surrounding DNS DNS is used in many applications, serving as an important Internet service. Here we discuss name collision issues that have arisen with recent TLD additions, and examine
DNS Basics. DNS Basics
DNS Basics 1 A quick introduction to the Domain Name System (DNS). Shows the basic purpose of DNS, hierarchy of domain names, and an example of how the DNS protocol is used. There are many details of DNS
DOMAIN NAME DAY. + Helsinki; 14 th February; 2014. + Nigel Hickson, ICANN
DOMAIN NAME DAY + Helsinki; 14 th February; 2014 + Nigel Hickson, ICANN 1 AGENDA + gtlds and all that + The European and global debate on Internet Governance 2 Internet Corporation for Assigned Names
SAC 049 SSAC Report on DNS Zone Risk Assessment and Management
SAC 049 SSAC Report on DNS Zone Risk Assessment and Management A Report from the ICANN Security and Stability Advisory Committee (SSAC) 03 June 2011 SAC049 1 Preface This is a Report of the Security and
Configuring DNS. Finding Feature Information
The Domain Name System (DNS) is a distributed database in which you can map hostnames to IP addresses through the DNS protocol from a DNS server. Each unique IP address can have an associated hostname.
Network Layers. CSC358 - Introduction to Computer Networks
Network Layers Goal Understand how application processes set up a connection and exchange messages. Understand how addresses are determined Data Exchange Between Application Processes TCP Connection-Setup
OVERVIEW OF THE DNS AND GLOSSARY OF TERMS
PROTECT YOUR BUSINESS D-Zone Anycast DNS Service OVERVIEW OF THE DNS AND GLOSSARY OF TERMS 1 PROTECT YOUR BUSINESS OVERVIEW OF THE DNS AND GLOSSARY OF TERMS The DNS is a technology that most IT managers
The Impact of DNSSEC. Matthäus Wander. on the Internet Landscape. <[email protected]> Duisburg, June 19, 2015
The Impact of DNSSEC on the Internet Landscape Matthäus Wander Duisburg, June 19, 2015 Outline Domain Name System Security problems Attacks in practice DNS Security Extensions
USING TRANSACTION SIGNATURES (TSIG) FOR SECURE DNS SERVER COMMUNICATION
USING TRANSACTION SIGNATURES (TSIG) FOR SECURE DNS SERVER COMMUNICATION Transaction Signatures (TSIG) provide a secure method for communicating in the Domain Name System (DNS) from a primary to a secondary
Overview of DNSSEC deployment worldwide
The EURid Insights series aims to analyse specific aspects of the domainname environment. The reports are based on surveys, studies and research conducted by EURid in cooperation with industry experts
Securing DNS Infrastructure Using DNSSEC
Securing DNS Infrastructure Using DNSSEC Ram Mohan Executive Vice President, Afilias [email protected] February 28, 2009 Agenda Getting Started Finding out what DNS does for you What Can Go Wrong A Survival
Glossary of Technical Terms Related to IPv6
AAAA Record An AAAA record stores a 128-bit Internet Protocol version 6 (IPv6) address, which does not fit the standard A record format. For example, 2007:0db6:85a3:0000:0000:6a2e:0371:7234 is a valid
DNS Security Survey for National Computer Security Incident Response Teams December 2010
DNS Security Survey for National Computer Security Incident Response Teams December 2010 Summary As referenced during the ICANN meeting in Brussels, Belgium in June 2010, ICANN developed a survey on DNS
Distributed Systems. 09. Naming. Paul Krzyzanowski. Rutgers University. Fall 2015
Distributed Systems 09. Naming Paul Krzyzanowski Rutgers University Fall 2015 October 7, 2015 2014-2015 Paul Krzyzanowski 1 Naming things Naming: map names to objects Helps with using, sharing, and communicating
THE DOMAIN NAME SYSTEM DNS
Announcements THE DOMAIN NAME SYSTEM DNS Internet Protocols CSC / ECE 573 Fall, 2005 N. C. State University copyright 2005 Douglas S. Reeves 2 Today s Lecture I. Names vs. Addresses II. III. IV. The Namespace
How to set up the Integrated DNS Server for Inbound Load Balancing
How to set up the Integrated DNS Server for Introduction Getting Started Peplink Balance has a built-in DNS server for inbound link load balancing. You can delegate a domain s NS/SOA records, e.g. www.mycompany.com,
NET0183 Networks and Communications
NET0183 Networks and Communications Lecture 25 DNS Domain Name System 8/25/2009 1 NET0183 Networks and Communications by Dr Andy Brooks DNS is a distributed database implemented in a hierarchy of many
Introduction to the Domain Name System
CHAPTER 14 The Domain Name System (DNS) handles the growing number of Internet users. DNS translates names, such as www.cisco.com, into IP addresses, such as 192.168.40.0 (or the more extended IPv6 addresses),
DNS Conformance Test Specification For Client
DNS Conformance Test Specification For Client Revision 1.0 Yokogawa Electric Corporation References This test specification focus on following DNS related RFCs. RFC 1034 DOMAIN NAMES - CONCEPTS AND FACILITIES
Domain Name System (DNS) RFC 1034 RFC 1035 http://www.ietf.org
Domain Name System (DNS) RFC 1034 RFC 1035 http://www.ietf.org TCP/IP Protocol Suite Application Layer DHCP DNS SNMP HTTP SMTP POP Transport Layer UDP TCP ICMP IGMP Network Layer IP Link Layer ARP ARP
Deploying DNSSEC: From End-Customer To Content
Deploying DNSSEC: From End-Customer To Content March 28, 2013 www.internetsociety.org Our Panel Moderator: Dan York, Senior Content Strategist, Internet Society Panelists: Sanjeev Gupta, Principal Technical
DNS Root NameServers
DNS Root NameServers An Overview Dr. Farid Farahmand Updated: 9/24/12 Who- is- Who! Over half million networks are connected to the Internet 5 billion users by 2015! Network numbers are managed by ICANN
DNS & IPv6. Agenda 4/14/2009. MENOG4, 8-9 April 2009. Raed Al-Fayez SaudiNIC CITC [email protected], www.nic.net.sa. DNS & IPv6.
DNS & IPv6 MENOG4, 8-9 April 2009 Raed Al-Fayez SaudiNIC CITC [email protected], www.nic.net.sa Agenda DNS & IPv6 Introduction What s next? SaudiNIC & IPv6 About SaudiNIC How a cctld Registry supports
Specifications for Registrars' Interaction with the Domain Registration System During Landrush and General Registration Periods
Фонд содействия развитию технологий и инфраструктуры Интернета Введено в действие: 24 сентября 2014 г. Foundation for Assistance for Internet Technologies and Infrastructure Development Specifications
IPV6 SERVICES DEPLOYMENT
IPV6 SERVICES DEPLOYMENT LINX IPv6 Technical Workshop - March 2009 Jaco Engelbrecht Group Platforms Manager, clara.net DNS root zone goes AAAA! On 4 th February 2008 IANA added AAAA records for the A,
DNSSEC. Introduction. Domain Name System Security Extensions. AFNIC s Issue Papers. 1 - Organisation and operation of the DNS
AFNIC s Issue Papers DNSSEC Domain Name System Security Extensions 1 - Organisation and operation of the DNS 2 - Cache poisoning attacks 3 - What DNSSEC can do 4 - What DNSSEC cannot do 5 - Using keys
Application. Transport. Network. Data Link. Physical. Network Layers. Goal
Layers Goal Understand how application processes set up a connection and exchange messages. Understand how addresses are determined 1 2 Data Exchange Between Processes TCP Connection-Setup Between Processes
Domain Name System. DNS is an example of a large scale client-server application. Copyright 2014 Jim Martin
Domain Name System: DNS Objective: map names to IP addresses (i.e., high level names to low level names) Original namespace was flat, didn t scale.. Hierarchical naming permits decentralization by delegating
DNS traffic analysis -- Issues of IPv6 and CDN --
DNS traffic analysis -- Issues of IPv6 and CDN -- Kazunori Fujiwara ^, Akira Sato, Kenichi Yoshida University of Tsukuba ^Japan Registry Services Co., Ltd (JPRS) July 29, 2012 IEPG meeting at Vancouver
3. The Domain Name Service
3. The Domain Name Service n Overview and high level design n Typical operation and the role of caching n Contents of DNS Resource Records n Basic message formats n Configuring/updating Resource Records
Basic DNS Course. Module 1. DNS Theory. Ron Aitchison ZYTRAX, Inc. Page 1 of 24
Basic DNS Course Module 1 Ron Aitchison ZYTRAX, Inc. Page 1 of 24 The following are the slides used in this Module of the course. Some but not all slides have additional notes that you may find useful.
Best Practices in Domain Name Registry Solutions Understanding the Technical Requirements of ICANN's Applicant Guidebook
Best Practices in Domain Name Registry Solutions Understanding the Technical Requirements of ICANN's Applicant Guidebook Adrian Kinderis - CEO AusRegistry International Agenda What options should
The Domain Name System from a security point of view
The Domain Name System from a security point of view Simon Boman Patrik Hellström Email: {simbo105, pathe321}@student.liu.se Supervisor: David Byers, {[email protected]} Project Report for Information Security
IANA Functions to cctlds Sofia, Bulgaria September 2008
IANA Functions to cctlds Sofia, Bulgaria September 2008 Kim Davies Internet Assigned Numbers Authority Internet Corporation for Assigned Names & Numbers What is IANA? Internet Assigned Numbers Authority
Secure Domain Name System (DNS) Deployment Guide
NIST Special Publication 800-81-2 Secure Domain Name System (DNS) Deployment Guide Ramaswamy Chandramouli Scott Rose C O M P U T E R S E C U R I T Y NIST Special Publication 800-81-2 Secure Domain Name
Global Service Loadbalancing & DNSSEC. Ralf Brünig Field Systems Engineer [email protected] DNSSEC
Global Service Loadbalancing & DNSSEC Ralf Brünig Field Systems Engineer [email protected] DNSSEC F5 s Integrated Solution Users The F5 Solution Applications Mobile Phone PDA Laptop Desktop Application
Decoding DNS data. Using DNS traffic analysis to identify cyber security threats, server misconfigurations and software bugs
Decoding DNS data Using DNS traffic analysis to identify cyber security threats, server misconfigurations and software bugs The Domain Name System (DNS) is a core component of the Internet infrastructure,
Measures to Protect (University) Domain Registrations and DNS Against Attacks. Dave Piscitello, ICANN [email protected]
Measures to Protect (University) Domain Registrations and DNS Against Attacks Dave Piscitello, ICANN [email protected] Why are we talking about Domain names and DNS? Domain names and URLs define
New gtld Basics New Internet Extensions
New gtld Basics New Internet Extensions Agenda Overview about domain names, gtld timeline and the New gtld Program Why is ICANN doing this; potential impact of this initiative to businesses, governments,
CS 43: Computer Networks Naming and DNS. Kevin Webb Swarthmore College September 17, 2015
CS 43: Computer Networks Naming and DNS Kevin Webb Swarthmore College September 17, 2015 Agenda Identifiers and addressing Domain Name System History Query sequences Record types Load balancing Recall:
Secure Domain Name System (DNS) Deployment Guide
Special Publication 800-81 Sponsored by the Department of Homeland Security Secure Domain Name System (DNS) Deployment Guide Recommendations of the National Institute of Standards and Technology Ramaswamy
DOMAIN NAME SECURITY EXTENSIONS
DOMAIN NAME SECURITY EXTENSIONS The aim of this paper is to provide information with regards to the current status of Domain Name System (DNS) and its evolution into Domain Name System Security Extensions
- Domain Name System -
1 Name Resolution - Domain Name System - Name resolution systems provide the translation between alphanumeric names and numerical addresses, alleviating the need for users and administrators to memorize
SDNP.mw cctld DOMAIN REGISTRATION POLICY Ver 1.2 of 23 July 2015
SDNP.mw cctld DOMAIN REGISTRATION POLICY Ver 1.2 of 23 July 2015 Table of Contents 1. DEFNITIONS 2. PURPOSE AND SCOPE 3. ELIGIBILITY 4. CHOOSING A DOMAIN NAME TO REGISTER 5. SELECTING A REGISTRAR 6. REGISTERING
Internet-Praktikum I Lab 3: DNS
Kommunikationsnetze Internet-Praktikum I Lab 3: DNS Mark Schmidt, Andreas Stockmayer Sommersemester 2015 kn.inf.uni-tuebingen.de Motivation for the DNS Problem IP addresses hard to remember for humans
Module 5: Planning a DNS Strategy
Module 5: Planning a DNS Strategy Contents Overview 1 Lesson: Planning DNS Servers 2 Multimedia: How DNS Clients Resolve Names 3 Multimedia: Resolving Names with a DNS Server 8 Lesson: Planning a Namespace
DNSSEC for Everybody: A Beginner s Guide
DNSSEC for Everybody: A Beginner s Guide San Francisco, California 14 March 2011 4:00 to 5:00 p.m. Colonial Room The Schedule 2 This is Ugwina. She lives in a cave on the edge of the Grand Canyon... This
Detecting Search Lists in Authoritative DNS
Detecting Search Lists in Authoritative DNS Andrew Simpson March 10 th, 2014 Summary Early research into name collisions has postulated that search list interaction drives some portion of the DNS requests
How to Install the Active Directory Domain Services (AD DS) Role in Windows Server 2008 R2 and Promote a Server to a Domain Controller
How to Install the Active Directory Domain Services (AD DS) Role in Windows Server 2008 R2 and Promote a Server to a Domain Controller I am not responsible for your actions or their outcomes, in any way,
DNS. The Root Name Servers. DNS Hierarchy. Computer System Security and Management SMD139. Root name server. .se name server. .
Computer System Security and Management SMD139 Lecture 5: Domain Name System Peter A. Jonsson DNS Translation of Hostnames to IP addresses Hierarchical distributed database DNS Hierarchy The Root Name
Recommendations for dealing with fragmentation in DNS(SEC)
Recommendations for dealing with fragmentation in DNS(SEC) Abstract DNS response messages can sometimes be large enough to exceed the Maximum Transmission Unit (MTU) size for the underlying physical network.
Enterprise Architecture Office Resource Document Design Note - Domain Name System (DNS)
Date: 8/27/2012 Enterprise Architecture Office Resource Document Design Note - Domain Name System (DNS) Table of Contents 1 Overview...2 1.1 Other Resources...2 1.1.1 State of Minnesota Standards and Guidelines...2
Text. Registry Onboarding and TLD Startup
Registry Onboarding and TLD Startup Background From Registry Onboarding to TLD Launch Registry Agreement Executed Delegation General Registration What is Onboarding? From Registry Onboarding to TLD Launch
Citrix NetScaler Global Server Load Balancing Primer:
Citrix NetScaler Global Server Load Balancing Primer: Theory and Implementation www.citrix.com Background...3 DNS Overview...3 How DNS level GSLB works...4 Basic NetScaler GSLB Configuration...8 Accepting
Domain Name System (DNS)
Chapter 18 CSC465 Computer Networks Spring 2004 Dr. J. Harrison These slides are based on the text TCP/IP Protocol Suite (2 nd Edition) Domain Name System (DNS) CONTENTS NAME SPACE DOMAIN NAME SPACE DISTRIBUTION
Teldat Router. DNS Client
Teldat Router DNS Client Doc. DM723-I Rev. 10.00 March, 2003 INDEX Chapter 1 Domain Name System...1 1. Introduction...2 2. Resolution of domains...3 2.1. Domain names resolver functionality...4 2.2. Functionality
EECS 489 Winter 2010 Midterm Exam
EECS 489 Winter 2010 Midterm Exam Name: This is an open-book, open-resources exam. Explain or show your work for each question. Your grade will be severely deducted if you don t show your work, even if
The Internet Ecosystem and ICANN!! Steve Sheng @ Stanford University, Center for Information and Society! 29 April 2013!
The Internet Ecosystem and ICANN!! Steve Sheng @ Stanford University, Center for Information and Society! 29 April 2013! Ecosystem! + A network of interactions among organisms, and between organisms and
Introduction to Network Operating Systems
As mentioned earlier, different layers of the protocol stack use different kinds of addresses. We can now see that the Transport Layer (TCP) uses port addresses to route data to the correct process, the
