8,820 research outputs found

    Detecting and Refactoring Operational Smells within the Domain Name System

    Full text link
    The Domain Name System (DNS) is one of the most important components of the Internet infrastructure. DNS relies on a delegation-based architecture, where resolution of names to their IP addresses requires resolving the names of the servers responsible for those names. The recursive structures of the inter dependencies that exist between name servers associated with each zone are called dependency graphs. System administrators' operational decisions have far reaching effects on the DNSs qualities. They need to be soundly made to create a balance between the availability, security and resilience of the system. We utilize dependency graphs to identify, detect and catalogue operational bad smells. Our method deals with smells on a high-level of abstraction using a consistent taxonomy and reusable vocabulary, defined by a DNS Operational Model. The method will be used to build a diagnostic advisory tool that will detect configuration changes that might decrease the robustness or security posture of domain names before they become into production.Comment: In Proceedings GaM 2015, arXiv:1504.0244

    DNS zones revisited

    Get PDF
    Recent research [Pap04b] suggests DNS reliability and performance is not up to the levels it should be due to misconfigurations. This paper checks the configuration of nameserver zones against additional requirements, recommendations and best-practices. It shows that almost one in four domains fails to pass one or more of these checks. During the checks an interesting correlation is established: a higher number of nameservers for a single zone usually decreases reliability and performance instead of increasing both

    ICANN—Now and Then: ICANN’s Reform and Its Problems

    Get PDF
    This paper sheds some light upon the major problem arising from the current normative infrastructure of the DNS and provides a possible solution to the current physical problem of the DNS. The paper\u27s main focus is the single-entity control of the A Root. The paper uses as a starting point the Blueprint prepared by the Committee on ICANN Evolution and Reform and raises the question: Has this reform done anything to resolve the single-entity control of the A Root? The paper argues that the reform has done nothing to solve the problem because the international privatization of the DNS merely substitutes the administration of the DNS function without making changes to the normative infrastructure of the DNS. In light of the above, the paper argues that there is a need to declare independence from a one-entity controlled DNS. The suggested approach is to share authority over the root by acknowledging that countries that are accountable to their populations are the authorities for their own ccTLDs. Once technical and political independence has been achieved, the technical and, to some degree, political management of the DNS should be exercised through an international body. In order to initiate a discussion for a truly international body this paper offers nine principles that a new international ccTLD cooperation organization should observe when working on its own creation

    The Use of Firewalls in an Academic Environment

    No full text

    Enabling Practical IPsec authentication for the Internet

    Get PDF
    On the Move to Meaningful Internet Systems 2006: OTM 2006 Workshops (First International Workshop on Information Security (IS'06), OTM Federated Conferences and workshops). Montpellier, Oct,/Nov. 2006There is a strong consensus about the need for IPsec, although its use is not widespread for end-to-end communications. One of the main reasons for this is the difficulty for authenticating two end-hosts that do not share a secret or do not rely on a common Certification Authority. In this paper we propose a modification to IKE to use reverse DNS and DNSSEC (named DNSSEC-to-IKE) to provide end-to-end authentication to Internet hosts that do not share any secret, without requiring the deployment of a new infrastructure. We perform a comparative analysis in terms of requirements, provided security and performance with state-of-the-art IKE authentication methods and with a recent proposal for IPv6 based on CGA. We conclude that DNSSEC-to-IKE enables the use of IPsec in a broad range of scenarios in which it was not applicable, at the price of offering slightly less security and incurring in higher performance costs.Universidad de Montpellier IIPublicad
    • …
    corecore