How To Block Child Abuse In Danesborg
|
|
|
- Byron Taylor
- 5 years ago
- Views:
Transcription
1 CENSURFRIDNS Thomas Steen Rasmussen March 11th, 2012
2 Agenda - Politics What is censurfridns and why does it exist What is censored on the Danish ISP nameservers? How come censurfridns can avoid blocking? Lies, damn lies, and politics Won't somebody please think of the children! Child abuse is big business these days Protecting content owners (allofmp3, thepiratebay.org etc) Protecting consumers (blocking illegal pharma sites) Censorship for profit (unlicensed gambling sites)
3 What is censurfridns - and why does it exist? Free, open, uncensored resolvers Founded in 2009 due to a lack of proper resolvers in.dk (geo dns balancing) Proper means uncensored, dnssec enabled, ipv6 enabled, secure, fast, stable... The name means censorship free dns in Danish. Suggestions for an additional (english language) name appreciated (see next slide).
4
5 What is censored on the Danish ISP nameservers? 2005: Pages depicting child abuse 2006: Copyright (allofmp3.com) 2008: Copyright (thepiratebay.org) 2011: Unlicensed gambling sites 2011: Illegal pharmaceutical vendors 2012: Copyright (grooveshark.com).?
6 How come censurfridns can avoid blocking? The blocking agreement between the ISPs and the police concerning child abuse pages is voluntary (or is it? carulli.dk!). There is in other words no legal basis for this blocking. I am not an ISP. The court ruling against Telenor forcing them to block of thepiratebay.org only applies to ISPs. The reason has something to do with how routers and switches store and forward data packets. New laws or court orders may make censurfridns illegal in the future. What happens then? I don't know, but the DNS servers will stay operational for as long as they are needed, one way or another.
7 Lies, damn lies, and politics One of the things that really complicates the issues surrounding DNS censorship is the variety of different content that is being blocked. All the different blocking has one thing in common though: No attempt is ever made to compare the supposed benefits versus the problems. Instead, FUD, lies and politics pollute any attempt at serious debate.
8 Won't somebody please think of the children! The issue of blocking pages that depict child abuse is difficult to discuss, because child abuse is perhaps the most sensitive subject there is. Protecting children is definitely an admirable goal, but when someone says blocking it actually means looking away instead of acting. What we are doing is not helping children in any way. Instead, our blocking system can actively help the criminals it is intended to fight, by providing a wellfunded early warning system. When a site is added to the blocklist the criminal knows the police is onto him, and he can run and hide.
9 Won't somebody please think of the children! Nothing indicates that the current blocking has any positive effects. With plenty of documented negative effects and no apparent positive effect, you can't help but wonder why we still have the blocking. Partly because the politicians are downright afraid of looking soft on child abuse. But the main reason is Save the Children Denmark, the primary proponent of the blocking. They receive money yearly from satspuljemidlerne to operate a hotline which serves as a basis for the blocking list. When the media asks if the blocking is working as intended, they need to stop asking the very people getting paid to supply the blocking list. Seems like a no-brainer right?
10 Won't somebody please think of the children! Any criticism pointing out that the filter has the opposite effect of the intention appears to be ignored entirely by Save the Children Denmark. Instead the whole issue is surrounded by plenty of think of the children rhetoric which makes serious debate impossible The effect that this subject has on people has been noticed by the company NetClean. They sell products that are supposed to stop the spread of child abuse content in your network
11 Child abuse is big business these days I attended a seminar which NetClean and Save the Children Denmark arranged about a year ago, right here on CBS. The presentation was so full of FUD and lies that I had to leave halfway through or I would have imploded. Among the quotes I remember are 10% of the data on an average companys servers is child abuse content and the pedophiles put the illegal content on company servers because there is plenty of diskspace at work.
12 Child abuse is big business these days
13 Child abuse is big business these days Not once during the presentation did they talk about actually doing something about the problem, like contacting hosting providers. In fact, their entire business model is based on the continued availability of illegal materials. Ironic, huh? The knowledge that someone, somewhere is getting rich off of child abuse concerns me. But to abuse the fear people have of the subject of child abuse to turn a profit is something that really pisses me off. As we know, blocking websites (whether it is in ISP DNS servers or using one of NetCleans solutions) does nothing to solve the actual problem. It appears the saying is true: If you are not part of the solution, there is good money to be made in prolonging the problem.
14 Child abuse wrap-up I could rant about this subject for days, but we have limited time Read and which describes the takedown case I talked about Quote from the ak-zensur.de link: Internet blocking does not fight abuse, in practice it only serves to conceal the failures of politics and police. Websites can remain on blocking lists for years even though they have either been deleted or could be deleted easily and quickly.
15
16 Count to 10
17 Protecting content owners (allofmp3, thepiratebay.org etc) Only a year after the beginning of DNS censorship in DK, we saw the first Danish court order to DNS block a site due to copyright infringement. The site was allofmp3.com and more sites soon followed. There was actually an increase in traffic to thepiratebay.org from Danish IP addresses right after the block, because of all the media attention. If anyone still thinks DNS blocking has any effect, they are not paying attention. The latest site to be blocked due to copyright infringement is grooveshark.com a couple of months ago. More on this in a little while.
18 Protecting content owners (allofmp3, thepiratebay.org etc) There is a powerful lobby (paid for by the content owners) putting pressure on the government, asking for more blocking and more legislation Yes, even in Denmark Why do we permit this? You do _not_ get to destroy the internet because it doesn't fit your outdated business model. Complain to your politician and join itpol.dk
19 Protecting content owners Rettighedsalliancen claims they picked a random Danish ISP for the grooveshark.com case (they picked '3'). But '3' is a mobile provider. All mobile providers have equipment to do DPI, it is an integral part of how mobile networks work. Furthermore, the nature of '3' means they likely share nameservers between Danish and Swedish customers. These two facts combined make it likely that any court order against '3' to block a site would result in DPI blocking, not DNS blocking. With this in mind, you have to be pretty naive to believe that '3' was a random choice. Nothing they do is random, be very careful not to underestimate them.
20 Count to 10
21 Censorship for profit (unlicensed gambling sites) In 2011 we got a new type of DNS blocking in our legislation: unlicensed gambling sites The Lottery Funds is the large (1.6 billion DKK last year) amount that Danske Spil makes after expenses and paying prizes to winners. The money is distributed anually to various Danish ministries according to the distribution specified in the Danish national budget (finansloven). Each Minister then distributes money to the charities he/she feels appropriate.
22 Censorship for profit (unlicensed gambling sites) The politicians have been worried for a while about the Internet introducing new gambling providers that do not pay tax to the Danish market, affecting the size of the Lottery Funds. They are worried because handing out money makes them look nice - and who doesn't want to look nice? (especially politicians) They have decided to use DNS blocking to solve this problem (is anyone seeing a pattern here?) This is the first Danish case of censorship for government profit: using DNS blocking for the single, stated purpose of protecting the size of the Lottery funds.
23 Count to 10
24 Protecting consumers from themselves (blocking illegal pharma sites) One of the newest types of blocking we have in Denmark is of illegal pharmaceutical vendors. 24hdiet.com was the first. People are apparently buying diet pills online from questionable vendors, instead of buying them in a Danish pharmacy (the claim is that they don't know it is illegal?) Like other types of blocking, it is highly doubtful whether the blocking will have the intended effect. People are pretty good at procuring illegal drugs. Always have been, always will be. This blocking illustrates well how the politicians see DNS censorship as just another tool in the toolbox these days. Gradual censorship is not a theory, these days it is fact.
25 Agenda - technical How does the Danish blocking work Technical description of the censurfridns.dk service and infrastructure Security and stability considerations when running nameservers (especially open recursive ones) Cache poisoning Redundancy The sad story of OS resolvers failover fail How I discovered I was participating in a DDOS The conflict between security and freedom online
26 How does the Danish blocking work Each ISP sends a public key to the police, who adds it to the server holding the current list The ISP uses scp to fetch the list file regularly, like once per hour The list is just a list of lines so it is reformatted to fit bind config syntax with standard unix tools like sed and cut. The list is then copied to the nameservers and loaded there. All domains in the list point at the same zone file
27 Example zone file $TTL IN SOA ns.example.com. hostmaster.example.com. ( ; serial 3600 ; refresh 3600 ; retry 3600 ; expire 3600 ; minimum ) IN NS ns.example.com. IN A * IN A In this example the webserver hosting the STOP page is at and all queries return this IP (wildcard record)
28 The server hosting the STOP pages The webserver logfile for the child abuse stop page is sent to the police every night. But first, the IP of the clients is concealed in the fortress of security known as md5 using a script similar to the one below: #!/bin/sh while read LINE ; do #LINE=`awk {'print $0'}` IP=`echo $LINE awk {'print $1'}` SIP=`echo "halløjsa HER ER NOGET SALT $IP jow tak OG LIDT MERE SALT I HASHEN" md5` NEWLINE=`echo $LINE sed -e "s/$ip/$sip/"` echo $NEWLINE >> $1 done
29 Technical description of censurfridns.dk Originally two nameservers, ns1.censurfridns.dk and ns2.censurfridns.dk The servers always had ipv6 support using 6to4, native IPv6 coming soon for ns1, no current plans on ns2 (provider related) The servers always had DNSSEC support, although it was using DLV before the root was signed Recently ns1 was upgraded to new hardware, and replicated so there are two physical servers handling queries for ns1 now. If one goes down, the other takes over. This is done with CARP and scripts on the servers to monitor DNS functionality.
30 Technical description of censurfridns.dk In front of ns1 there is a couple of redundant CARP firewalls (it's been like that since the start) All of these servers run FreeBSD (surprise) ns1 and ns2 are placed in different datacenters, different cities, with different providers providing the upstream link. The monitoring system runs from a third place, nothing special about it, it works pretty well. I get SMS notifications when anything is wrong.
31 What are the technical problems with blocking in DNS First of all the blocking system we have in Denmark is based on some weird idea that the Internet equals HTTP and nothing else The STOP page gives a message explaining why stuff doesn't work as expected if you use a webbrowser But what if you were trying to send a mail to one of the blocked domains? Only the HTTP protocol is handled. You would get a bounce four days later.
32 What are the technical problems with blocking in DNS The Danish blocking system for child abuse pages introduces a single point of failure into the DNS This was demonstrated better than I could have asked for a couple of weeks ago: from
33 Security and stability considerations when running nameservers (especially open recursive ones)
34 Cache poisoning Since Kaminsky published his DNS cache poisoning bug there has been default source port randomization in bind. But stuff like firewalls/nat and default source port ranges in the operating system can complicate the issue. sysctl net.inet.ip.portrange.hifirst=1025 Never assume it is OK without testing it: $ +short porttest.dns-oarc.net TXT porttest.y.x.w.v.u.t.s.r.q.p.o.n.m.l.k.j.i.h.g.f.e.d.c.b.a.pt.dns-oarc.net. " is GREAT: 26 queries in 4.2 seconds from 26 ports with std dev 16518" $ +short porttest.dns-oarc.net TXT porttest.y.x.w.v.u.t.s.r.q.p.o.n.m.l.k.j.i.h.g.f.e.d.c.b.a.pt.dns-oarc.net. " is GREAT: 26 queries in 4.2 seconds from 26 ports with std dev 19388" $ +short porttest.dns-oarc.net TXT porttest.y.x.w.v.u.t.s.r.q.p.o.n.m.l.k.j.i.h.g.f.e.d.c.b.a.pt.dns-oarc.net. " is GREAT: 26 queries in 4.2 seconds from 26 ports with std dev 16518" $ +short porttest.dns-oarc.net TXT porttest.y.x.w.v.u.t.s.r.q.p.o.n.m.l.k.j.i.h.g.f.e.d.c.b.a.pt.dns-oarc.net. " is GREAT: 26 queries in 4.2 seconds from 26 ports with std dev 17295"
35 Redundancy When operating recursive nameservers it is important to consider what happens when one goes down (since the users REALLY notice when DNS doesn't work). I went through the redundancy of ns1 and the firewalls in front of it. There is a good reason I have more redundancy on ns1 than on ns2. Most people put ns1 first and ns2 second in their OS/router resolver configs (easy to see from the load on the two servers) The order the servers are configured in shouldn't matter, but it does
36 The sad story of OS resolvers failover fail At some point a while back there was downtime on ns1 (before it was redundant) due to a raid controller fail If it wasn't because I'd tried the same thing at work a few years earlier I would have been thoroughly surprised at the amount of s and calls I got, complaning about DNS not working. Even though ns2 was up and answering queries just fine. The fact is that our operating systems (even FreeBSD) are horribly bad at switching between the configured resolvers if one is down.
37 The sad story of OS resolvers failover fail I haven't looked into it further (but I will, watch the blog) but there is definitely something wrong. It may seem obvious, but: when the resolver doesn't get a reply from the nameserver it is asking, it should switch to the next one in the list. It should then keep using that nameserver until that fails, and then take the next one on the list, and so on. Instead, it seems like it tries the first nameserver in the list for (nearly) every query, which effectively means that you have to wait for your resolvers timeout delay again and again, as it keeps asking the server that is down. It is like this on all operating systems I know of
38
39 How I discovered I was participating in a DDOS Background: ns1a and ns1b are located on a subnet: /28 I was getting lots of weird error messages on the nameservers saying Connect to address: : Permission denied and Connect to address: : Permission denied Some of you probably guessed by now what was going on?
40 Spoofed traffic Someone was spoofing queries with source IP addresses in the same /24 as the nameserver was in This is probably because most nameservers today are limited to the ISP they run at (like, only TDC customers can use TDCs nameservers) The attacker has no way of knowing my subnet layout When my nameserver received queries from its own network address and broadcast address, and tried to send a response, the firewall said no thanks The target of the attack was a Chinese DNS hosting company, the domains being queried were all hosted on the same nameservers, which were likely very busy at the time.
41 The conflict between security and freedom online On some level, there is a basic conflict between security on the internet, and online freedom My nameservers can certainly be used to resolve domains with illegal content They may also be used in a DDOS again some day The same could be said for things like TOR and Bitcoin. They can be (ab)used for illegal purposes but at the same time they enhance our freedom online.
42 A relevant quote The trouble with fighting for human freedom is that one spends most of one's time defending scoundrels. For it is against scoundrels that oppressive laws are first aimed, and oppression must be stopped at the beginning if it is to be stopped at all. H. L. Mencken, ( ) US editor
43 The end This is the end of the presentation. I have more to say, but not quite enough time to do it. The political aspects of DNS blocking is a huge subject, and the technical aspects of DNS are always interesting If you have any questions then ask away or find me in the BSD-DK booth, or send me an at [email protected] Follow the twitter and read the blog at (self-signed certificate, the broken CA system is not getting any of my money, but that's for another talk) Buy a t-shirt or a coffee mug, to help spread the word! The webshop is at - I do not get any money from the sales.
CENSURFRIDNS a.k.a. UNCENSOREDDNS. Thomas Steen Rasmussen [email protected]
CENSURFRIDNS a.k.a. UNCENSOREDDNS Thomas Steen Rasmussen [email protected] Agenda Introduction DNS blocking in Denmark What is UncensoredDNS? Why was it started? Issues with DNS blocking A basic conflict:
DNS zone transfers from FreeIPA to non-freeipa slave servers
FreeIPA Training Series DNS zone transfers from FreeIPA to non-freeipa slave servers FreeIPA 3.0 and bind-dyndb-ldap 2.3 Petr Špaček 01-03-2013 Text file based
Tunnel Client FAQ. Table of Contents. Version 0v5, November 2014 Revised: Kate Lance Author: Karl Auer
Tunnel Client FAQ Version 0v5, November 2014 Revised: Kate Lance Author: Karl Auer Table of Contents A. Tunnelling 1 How does tunnelling work? 2 What operating systems are supported? 3 Where can I get
DNS Cache Poisoning Vulnerability Explanation and Remedies Viareggio, Italy October 2008
DNS Cache Poisoning Vulnerability Explanation and Remedies Viareggio, Italy October 2008 Kim Davies Internet Assigned Numbers Authority Internet Corporation for Assigned Names & Numbers Agenda How do you
Defending your DNS in a post-kaminsky world. Paul Wouters <[email protected]>
Defending your DNS in a post-kaminsky world Paul Wouters Overview History of DNS and the Kaminsky attack Various DNS problems explained Where to address the DNS problem Nameservers,
DNS and LDAP persistent search
FreeIPA Training Series DNS and LDAP persistent search FreeIPA 3.0 and bind-dyndb-ldap 2.3 Petr Špaček 01-14-2013 FreeIPA DNS integration FreeIPA is able to store
Security of IPv6 and DNSSEC for penetration testers
Security of IPv6 and DNSSEC for penetration testers Vesselin Hadjitodorov Master education System and Network Engineering June 30, 2011 Agenda Introduction DNSSEC security IPv6 security Conclusion Questions
Enterprise Architecture Office Resource Document Design Note - Domain Name System (DNS)
Date: 8/27/2012 Enterprise Architecture Office Resource Document Design Note - Domain Name System (DNS) Table of Contents 1 Overview...2 1.1 Other Resources...2 1.1.1 State of Minnesota Standards and Guidelines...2
DOMAIN NAME SECURITY EXTENSIONS
DOMAIN NAME SECURITY EXTENSIONS The aim of this paper is to provide information with regards to the current status of Domain Name System (DNS) and its evolution into Domain Name System Security Extensions
Local DNS Attack Lab. 1 Lab Overview. 2 Lab Environment. SEED Labs Local DNS Attack Lab 1
SEED Labs Local DNS Attack Lab 1 Local DNS Attack Lab Copyright c 2006 Wenliang Du, Syracuse University. The development of this document was partially funded by the National Science Foundation s Course,
How-to: DNS Enumeration
25-04-2010 Author: Mohd Izhar Ali Email: [email protected] Website: http://johncrackernet.blogspot.com Table of Contents How-to: DNS Enumeration 1: Introduction... 3 2: DNS Enumeration... 4 3: How-to-DNS
The story of dnsdist - or - Do we need a DNS Delivery Controller? http://dnsdist.org/
The story of dnsdist - or - Do we need a DNS Delivery Controller? http://dnsdist.org/ PowerDNS Very briefly so you know where we come from Open source nameserver, around since 2000, open source since 2002,
DNS + DHCP. Michael Tsai 2015/04/27
DNS + DHCP Michael Tsai 2015/04/27 lubuntu.ova http://goo.gl/bax8b8 DNS + DHCP DNS: domain name < > IP address DHCP: gives you a IP + configuration when you joins a new network DHCP = Dynamic Host Configuration
Use Domain Name System and IP Version 6
Use Domain Name System and IP Version 6 What You Will Learn The introduction of IP Version 6 (IPv6) into an enterprise environment requires some changes both in the provisioned Domain Name System (DNS)
CSIS 3230 Computer Networking Principles, Spring 2012 Lab 7 Domain Name System (DNS)
CSIS 3230 Computer Networking Principles, Spring 2012 Lab 7 Domain Name System (DNS) By Michael Olan, Richard Stockton College (last update: March 2012) Purpose At this point, all hosts should be communicating
PowerDNS dnsdist. OX Summit 2015 All presentations will be on: https://www.powerdns.com/oxsummit
PowerDNS dnsdist OX Summit 2015 All presentations will be on: https://www.powerdns.com/oxsummit Dnsdist "dnsdist is a highly DNS-, DoS- and abuse-aware loadbalancer. Its goal in life is to route traffic
Securing an Internet Name Server
Securing an Internet Name Server Cricket Liu [email protected] Securing an Internet Name Server Name servers exposed to the Internet are subject to a wide variety of attacks: Attacks against the name
Deploying IP Anycast. Core DNS Services for University of Minnesota Introduction and General discussion
Deploying IP Anycast Core DNS Services for University of Minnesota Introduction and General discussion Agenda Deploying IPv4 anycast DNS What is ANYCAST Why is ANYCAST important? Monitoring and using ANYCAST
VIDEO Intypedia013en LESSON 13: DNS SECURITY. AUTHOR: Javier Osuna García-Malo de Molina. GMV Head of Security and Process Consulting Division
VIDEO Intypedia013en LESSON 13: DNS SECURITY AUTHOR: Javier Osuna García-Malo de Molina GMV Head of Security and Process Consulting Division Welcome to Intypedia. In this lesson we will study the DNS domain
Building Nameserver Clusters with Free Software
Building Nameserver Clusters with Free Software Joe Abley, ISC NANOG 34 Seattle, WA, USA Starting Point Discrete, single-host authoritative nameservers several (two or more) several (two or more) geographically
Debugging With Netalyzr
Debugging With Netalyzr Christian Kreibich (ICSI), Nicholas Weaver (ICSI), Boris Nechaev (HIIT/TKK), and Vern Paxson (ICSI & UC Berkeley) 1 What Is Netalyzr?! Netalyzr is a comprehensive network measurement
5 DNS Security Risks That Keep You Up At Night (And How To Get Back To Sleep)
5 DNS Security Risks That Keep You Up At Night (And How To Get Back To Sleep) survey says: There are things that go bump in the night, and things that go bump against your DNS security. You probably know
The story of dnsdist - or - Do we need a DNS Delivery Controller? http://dnsdist.org/
The story of dnsdist - or - Do we need a DNS Delivery Controller? http://dnsdist.org/ PowerDNS Very briefly so you know where we come from Open source nameserver, around since 2000, open source since 2002,
The Use of DNS Resource Records
International Journal of Advances in Electrical and Electronics Engineering 230 Available online at www.ijaeee.com & www.sestindia.org/volume-ijaeee/ ISSN: 2319-1112 Simar Preet Singh Systems Engineer,
ISP liability in Denmark
ISP liability in Denmark Clement Salung Petersen Assistant Professor, PhD Centre for Information and Innovation Law www.ciir.dk Dias 1 A Danish perspective on ISP liability ISP liability Mere conduit,
Zimbra :: The Leader in Open Source Collaboration. Administrator's PowerTip #3: June 21, 2007 Zimbra Forums - Zimbra wiki - Zimbra Blog
Administrator's PowerTip #3: June 21, 2007 Zimbra Forums - Zimbra wiki - Zimbra Blog Introduction Configuring BIND and Zimbra on the same machine is a hot topic over in the forums. Zimbra checks to make
THE MASTER LIST OF DNS TERMINOLOGY. v 2.0
THE MASTER LIST OF DNS TERMINOLOGY v 2.0 DNS can be hard to understand and if you re unfamiliar with the terminology, learning more about DNS can seem as daunting as learning a new language. To help people
DNS Session 4: Delegation and reverse DNS. Joe Abley AfNOG 2006 workshop
DNS Session 4: Delegation and reverse DNS Joe Abley AfNOG 2006 workshop How do you delegate a subdomain? In principle straightforward: just insert NS records for the subdomain, pointing at someone else's
co Characterizing and Tracing Packet Floods Using Cisco R
co Characterizing and Tracing Packet Floods Using Cisco R Table of Contents Characterizing and Tracing Packet Floods Using Cisco Routers...1 Introduction...1 Before You Begin...1 Conventions...1 Prerequisites...1
Using Webmin and Bind9 to Setup DNS Sever on Linux
Global Open Versity Systems Integration Hands-on Labs Training Manual Using Webmin and Bind9 to Setup DNS Sever on Linux By Kefa Rabah, [email protected] March 2008 Installing and Configuring
The secret life of a DNS query. Igor Sviridov <[email protected]> 20120522
The secret life of a DNS query Igor Sviridov 20120522 Preface Nowadays, when we type URL (or is it a search string? ;-) into a browser (or mobile device) many things happen. While most of
Internet Security [1] VU 184.216. Engin Kirda [email protected]
Internet Security [1] VU 184.216 Engin Kirda [email protected] Christopher Kruegel [email protected] Administration Challenge 2 deadline is tomorrow 177 correct solutions Challenge 4 will
THE MASTER LIST OF DNS TERMINOLOGY. First Edition
THE MASTER LIST OF DNS TERMINOLOGY First Edition DNS can be hard to understand and if you re unfamiliar with the terminology, learning more about DNS can seem as daunting as learning a new language. To
DNS Resolving using nslookup
DNS Resolving using nslookup Oliver Hohlfeld & Andre Schröder January 8, 2007 Abstract This report belongs to a talk given at the networking course (Institue Eurecom, France) in January 2007. It is based
1 hours, 30 minutes, 38 seconds Heavy scan. All scanned network resources. Copyright 2001, FTP access obtained
home Network Vulnerabilities Detail Report Grouped by Vulnerability Report Generated by: Symantec NetRecon 3.5 Licensed to: X Serial Number: 0182037567 Machine Scanned from: ZEUS (192.168.1.100) Scan Date:
Plesk 11 Manual. Fasthosts Customer Support
Fasthosts Customer Support Plesk 11 Manual This guide covers everything you need to know in order to get started with the Parallels Plesk 11 control panel. Contents Introduction... 3 Before you begin...
How to Add Domains and DNS Records
How to Add Domains and DNS Records Configure the Barracuda NextGen X-Series Firewall to be the authoritative DNS server for your domains or subdomains to take advantage of Split DNS or dead link detection.
DNS. Computer Networks. Seminar 12
DNS Computer Networks Seminar 12 DNS Introduction (Domain Name System) Naming system used in Internet Translate domain names to IP addresses and back Communication works on UDP (port 53), large requests/responses
- Domain Name System -
1 Name Resolution - Domain Name System - Name resolution systems provide the translation between alphanumeric names and numerical addresses, alleviating the need for users and administrators to memorize
Guide to DDoS Attacks December 2014 Authored by: Lee Myers, SOC Analyst
INTEGRATED INTELLIGENCE CENTER Technical White Paper William F. Pelgrin, CIS President and CEO Guide to DDoS Attacks December 2014 Authored by: Lee Myers, SOC Analyst This Center for Internet Security
The Environment Surrounding DNS. 3.1 The Latest DNS Trends. 3. Technology Trends
3. The Environment Surrounding DNS DNS is used in many applications, serving as an important Internet service. Here we discuss name collision issues that have arisen with recent TLD additions, and examine
DNS Pharming Attack Lab
CNT 5410 - Fall 2014 1 DNS Pharming Attack Lab (This is a modified version of the exercise listed below. Modifications are to provide tighter configuration so as to minimize the risk of traffic leaving
Building Your Firewall Rulebase Lance Spitzner Last Modified: January 26, 2000
Building Your Firewall Rulebase Lance Spitzner Last Modified: January 26, 2000 Building a solid rulebase is a critical, if not the most critical, step in implementing a successful and secure firewall.
Domain Name System (DNS) Fundamentals
Domain Name System (DNS) Fundamentals Mike Jager Network Startup Resource Center [email protected] These materials are licensed under the Creative Commons Attribution-NonCommercial 4.0 International
N-CAP Users Guide Everything You Need to Know About Using the Internet! How Firewalls Work
N-CAP Users Guide Everything You Need to Know About Using the Internet! How Firewalls Work How Firewalls Work By: Jeff Tyson If you have been using the internet for any length of time, and especially if
How To Manage Dns On An Elfiq Link Load Balancer (Link Balancer) On A Pcode (Networking) On Ipad Or Ipad (Netware) On Your Ipad On A Ipad At A Pc Or Ipa
White paper The IDNS module for incoming load balancing For Elfiq Operating System (EOS) version 3.x Document Revision 1.5 October 2007 Elfiq Solutions www.elfiq.com COPYRIGHT The content of this document
Firewalls for small business
By James Thomas DTEC 6823 Summer 2004 What is a firewall? Firewalls for small business A firewall is either hardware, software or a combination of both that is used to prevent, block or should I say try
Parallels. for your Linux or Windows Server. Small Business Panel. Getting Started Guide. Parallels Small Business Panel // Linux & Windows Server
Getting Started Guide Parallels Small Business Panel for your Linux or Windows Server Getting Started Guide Page 1 Getting Started Guide: Parallels Small Business Panel, Linux & Windows Server Version
ECE 4321 Computer Networks. Network Programming
ECE 4321 Computer Networks Network Programming Name Space System.Net Domain Name System (DNS) To resolve computer naming Host database is split up and distributed among multiple systems on the Internet
netkit lab load balancer dns 1.2 Massimo Rimondini Version Author(s)
netkit lab load balancer dns Version Author(s) 1.2 Massimo Rimondini E-mail Web Description [email protected] http://www.netkit.org/ A lab showing how to perform simple load balancing on a set of web
DNS and BIND. David White
DNS and BIND David White DNS: Backbone of the Internet Translates Domains into unique IP Addresses i.e. developcents.com = 66.228.59.103 Distributed Database of Host Information Works seamlessly behind
Network Monitoring with Xian Network Manager
Network Monitoring with Xian Network Manager Did you ever got caught by surprise because of a network problem and had downtime as a result? What about monitoring your network? Network downtime or network
Introduction... 1. Connecting Via FTP... 4. Where do I upload my website?... 4. What to call your home page?... 5. Troubleshooting FTP...
This guide is designed to show you the different ways of uploading your site using ftp, including the basic principles of understanding and troubleshooting ftp issues. P a g e 0 Introduction... 1 When
DNS based Load Balancing with Fault Tolerance
DNS based Load Balancing with Fault Tolerance by Kåre Presttun, Oslo, Norway [email protected] Introduction There are several load-balancing systems on the market. They range from local switch based load
An Intrusion Detection System for Kaminsky DNS Cache poisoning
An Intrusion Detection System for Kaminsky DNS Cache poisoning Dhrubajyoti Pathak, Kaushik Baruah Departement of CSE, IIT Guwahati [email protected], [email protected] Abstract : Domain
Application and service delivery with the Elfiq idns module
Technical White Paper Application and service delivery with the Elfiq idns module For Elfiq Operating System (EOS) version 3.x Document Revision 1.63 June 2012 Table of Contents 1. The IDNS module... 3
Part 5 DNS Security. SAST01 An Introduction to Information Security 2015-09-21. Martin Hell Department of Electrical and Information Technology
SAST01 An Introduction to Information Security Part 5 DNS Security Martin Hell Department of Electrical and Information Technology How DNS works Amplification attacks Cache poisoning attacks DNSSEC 1 2
Good CAD / Bad CAD. by Tony Richards
Good CAD / Bad CAD by Tony Richards Looking for a new computer-aided dispatch and/or records management system? Trying to figure out exactly what you should be looking for? What distinguishes good from
Penetration Testing Walkthrough
Penetration Testing Walkthrough Table of Contents Penetration Testing Walkthrough... 3 Practical Walkthrough of Phases 2-5... 4 Chose Tool BackTrack (Armitage)... 5 Choose Target... 6 Phase 2 - Basic Scan...
Remote DNS Cache Poisoning Attack Lab
SEED Labs Remote DNS Cache Poisoning Attack Lab 1 Remote DNS Cache Poisoning Attack Lab Copyright c 2014 Wenliang Du, Syracuse University. The development of this document is/was funded by the following
Module 2. Configuring and Troubleshooting DNS. Contents:
Configuring and Troubleshooting DNS 2-1 Module 2 Configuring and Troubleshooting DNS Contents: Lesson 1: Installing the DNS Server Role 2-3 Lesson 2: Configuring the DNS Server Role 2-9 Lesson 3: Configuring
ARP and DNS. ARP entries are cached by network devices to save time, these cached entries make up a table
ARP and DNS Both protocols do conversions of a sort, but the distinct difference is ARP is needed for packet transfers and DNS is not needed but makes things much easier. ARP Address Resolution Protocol
Yahoo Attack. Is DDoS a Real Problem?
Is DDoS a Real Problem? Yes, attacks happen every day One study reported ~4,000 per week 1 On a wide variety of targets Tend to be highly successful There are few good existing mechanisms to stop them
NAT & IP Masquerade. Internet NETWORK ADDRESS TRANSLATION INTRODUCTION. NAT & IP Masquerade Page 1 of 5. Internal PC 192.168.0.25
NAT & IP Masquerade Page 1 of 5 INTRODUCTION Pre-requisites TCP/IP IP Address Space NAT & IP Masquerade Protocol version 4 uses a 32 bit IP address. In theory, a 32 bit address space should provide addresses
How to make a VPN connection to our servers from Windows 8
How to make a VPN connection to our servers from Windows 8 Windows 8 is able to make a newer type of VPN connection called a Secure Socket Tunnelling Protocol (SSTP) connection. This works just like a
DNS Best Practices. Mike Jager Network Startup Resource Center [email protected]
DNS Best Practices Mike Jager Network Startup Resource Center [email protected] This document is a result of work by the Network Startup Resource Center (NSRC at http://www.nsrc.org). This document may be
IPV6 FOR INTERNET SERVICE PROVIDERS STATE/LESSONS/STILL TO COME
IPV6 FOR INTERNET SERVICE PROVIDERS STATE/LESSONS/STILL TO COME Aaron Hughes, CEO 6connect [email protected] RIPE70 PERCEPTION OF IPV6 IMPLEMENTATIONS Network People We dual stacked the network years
You can attach email accounts to this domain name (eg. [email protected] or [email protected]) which also increases your corporate branding.
EMAIL SET UP 1 Your website is placed on the Internet using a domain name (eg. www.acme.com.au). This is your virtual address and it allows people to find your website amongst the millions of websites
5Get rid of hackers and viruses for
Reprint from TechWorld /2007 TEChWoRLd ISSuE 2007 ThEBIG: 5 FIREWaLLS TEChWoRLd ISSuE 2007 ThEBIG: 5 FIREWaLLS TEChWoRLd ISSuE 2007 ThEBIG: 5 FIREWaLLS # # # Load balancing is basically a simple task where
Fasthosts Internet Parallels Plesk 10 Manual
Fasthosts Internet Parallels Plesk 10 Manual Introduction... 2 Before you begin... 2 Logging in to the Plesk control panel... 2 Securing access to the Plesk 10 control panel... 3 Configuring your new server...
Reverse DNS considerations for IPv6
Reverse DNS considerations for IPv6 Kostas Zorbadelos OTE David Freedman - ClaraNet Reverse DNS in IPv4 Every Internet-reachable host should have a name Make sure your PTR and A records match. For every
HAProxy. Free, Fast High Availability and Load Balancing. Adam Thornton 10 September 2014
HAProxy Free, Fast High Availability and Load Balancing Adam Thornton 10 September 2014 What? HAProxy is a proxy for Layer 4 (TCP) or Layer 7 (HTTP) traffic GPLv2 http://www.haproxy.org Disclaimer: I don't
Lesson 13: DNS Security. Javier Osuna [email protected] GMV Head of Security and Process Consulting Division
Lesson 13: DNS Security Javier Osuna [email protected] GMV Head of Security and Process Consulting Division Introduction to DNS The DNS enables people to use and surf the Internet, allowing the translation
The Erado Hosted Messaging Installation Process Erado Hosted Mail Services with Domain Transfer
The Erado Hosted Messaging Installation Process Erado Hosted Mail Services with Domain Transfer Welcome to Erado Message Control Solutions. We appreciate the opportunity to serve you. To expedite the installation
Firewall implementation and testing
Firewall implementation and testing Patrik Ragnarsson, Niclas Gustafsson E-mail: [email protected], [email protected] Supervisor: David Byers, [email protected] Project Report for Information
IPV6 SERVICES DEPLOYMENT
IPV6 SERVICES DEPLOYMENT LINX IPv6 Technical Workshop - March 2009 Jaco Engelbrecht Group Platforms Manager, clara.net DNS root zone goes AAAA! On 4 th February 2008 IANA added AAAA records for the A,
How do I install Active Directory on my Windows Server 2003 server?
How do I install Active Directory on my Windows Server 2003 server? Here is a quick list of what you must have: An NTFS partition with enough free space An Administrator's username and password The correct
Installation Guide For ChoiceMail Enterprise Edition
Installation Guide For ChoiceMail Enterprise Edition How to Install ChoiceMail Enterprise On A Server In Front Of Your Company Mail Server August, 2004 Version 2.6x Copyright DigiPortal Software, 2002-2004
DNS Record Injection Vulnerabilities in Home Routers
DNS Record Injection Vulnerabilities in Home Routers Kyle Schomp, Tom Callahan, Michael Rabinovich, Mark Allman Case Western Reserve University International Computer Science Institute 1 Attacks targeting
Domain Name System 2015-04-28 17:49:44 UTC. 2015 Citrix Systems, Inc. All rights reserved. Terms of Use Trademarks Privacy Statement
Domain Name System 2015-04-28 17:49:44 UTC 2015 Citrix Systems, Inc. All rights reserved. Terms of Use Trademarks Privacy Statement Contents Domain Name System... 4 Domain Name System... 5 How DNS Works
Unbound a caching, validating DNSSEC resolver. Do you trust your name server? Configuration. Unbound as a DNS cache (SEC-less)
Unbound a caching, validating DNSSEC resolver UKUUG Spring 2011 Conference Leeds, UK March 2011 Jan-Piet Mens $ dig 1.1.0.3.3.0.8.1.7.1.9.4.e164.arpa naptr Do you trust your name server? DNS clients typically
DNS security: poisoning, attacks and mitigation
DNS security: poisoning, attacks and mitigation The Domain Name Service underpins our use of the Internet, but it has been proven to be flawed and open to attack. Richard Agar and Kenneth Paterson explain
Copyright 2012 http://itfreetraining.com
In order to find resources on the network, computers need a system to look up the location of resources. This video looks at the DNS records that contain information about resources and services on the
How To Increase Your Odds Of Winning Scratch-Off Lottery Tickets!
How To Increase Your Odds Of Winning Scratch-Off Lottery Tickets! Disclaimer: All of the information inside this report reflects my own personal opinion and my own personal experiences. I am in NO way
CMPT 471 Networking II
CMPT 471 Networking II Firewalls Janice Regan, 2006-2013 1 Security When is a computer secure When the data and software on the computer are available on demand only to those people who should have access
Club Accounts. 2011 Question 6.
Club Accounts. 2011 Question 6. Anyone familiar with Farm Accounts or Service Firms (notes for both topics are back on the webpage you found this on), will have no trouble with Club Accounts. Essentially
Getting Started with AWS. Hosting a Static Website
Getting Started with AWS Hosting a Static Website Getting Started with AWS: Hosting a Static Website Copyright 2016 Amazon Web Services, Inc. and/or its affiliates. All rights reserved. Amazon's trademarks
Child Abuse, Child Neglect. What Parents Should Know If They Are Investigated
Child Abuse, Child Neglect What Parents Should Know If They Are Investigated Written by South Carolina Appleseed Legal Justice Center with editing and assistance from the Children s Law Center and the
ISP Systems Design. ISP Workshops. Last updated 24 April 2013
ISP Systems Design ISP Workshops Last updated 24 April 2013 1 Agenda p DNS Server placement p Mail Server placement p News Server placement p Services network design p Services Network Security 2 ISP Services
