Archive

Category Archives for "Networking"

Rough Guide to IETF 99: DNS Privacy and Security, including DNSSEC

There's a good bit of DNS secrurity and privacy activity happening at IETF 99 next week in Prague, although not all of that is in working groups. Here is a view of what is going on.

IETF 99 Hackathon

Once again there will be a good-sized "DNS team" at the IETF 99 Hackathon over the weekend (15-16 July). The IETF 99 Hackathon wiki outlines the work (scroll down to see it). From a security point of view, major projects include:

Dan York

AI heading back to the trough

I like Gartner’s concept of the technology hype cycle. It assumes that expectations of new technologies quickly ramp to an inflated peak, drop into a trough of disillusionment, then gradually ascend a slope of enlightenment until they plateau. Of course, not all technologies complete the cycle or transition through the stages at the same pace.Artificial intelligence (AI) has arguably been in the trough for 60 years. I am thinking of Kubrick’s HAL and Roddenberry’s “computer” that naturally interact with humans. That’s a long trough, and despite popular opinion, the end is nowhere in sight.+ Also on Network World: Using artificial intelligence to teach computers to see + There’s so much excitement and specialized research taking place that AI has fragmented into several camps such as heuristic programming for game-playing AI, natural language processing for conversational AI, and machine learning for statistical problems. The hype is building again, and just about every major tech company and countless startups are racing toward another inflated peak and subsequent trough.To read this article in full or to leave a comment, please click here

Who Controls The Internet?

The title of the paper Who controls the Internet? Analyzing global threats using property traversal graphs is enough to ensnare any Internet researcher. The control plane for a number of attacks, as the paper points out, is the DNS due to the role it plays in mapping names to resources. MX records in the DNS control the flow of mail, CNAME records are used to implement content delivery networks (CDN) services, and TXT records are used to confirm access to and control over a namespace when implementing third party services. This post will cover an interesting case where control is exercised first via the DNS and then using BGP.

Below the DNS, in the depths of internet plumbing, is the lizard brain of internet routing, which is governed by the border gateway protocol (BGP). A common term to describe BGP routing is “hot potato” routing. BGP conversations occur between autonomous systems, ASes, which are identified by their autonomous system number ASN. The ASN represents a system of networks and the policy associated with their routing. ASes are issued regionally by Regional Internet Registries (RIRs), which receive blocks of AS numbers to hand out from the Internet Assigned Numbers Authority Continue reading