Text #ICANN51. Text #ICANN51 15 October 2014 Alternate and Innovative DNS Evan Leibovitch ALAC, NARALO Secretary At-Large Policy Roundtable.

Slides:



Advertisements
Similar presentations
ICANN Plan for Enhancing Internet Security, Stability and Resiliency.
Advertisements

ICANN SSAC, Cairo Nov 2008 Page 1 Summary of Fast Flux Dave Piscitello ICANN SSAC.
Dr. Milton MuellerTPRC 2001 Information Document 9-E ITU-T Study Group 2 January 2002 QUESTIONS:1, 2, 3 & 4/2 SOURCE:TSB TITLE:COMPETING DNS ROOTS: CREATIVE.
Firewalls By Tahaei Fall What is a firewall? a choke point of control and monitoring interconnects networks with differing trust imposes restrictions.
Page 1 / 14 The Mesh Comparison PLANET’s Layer 3 MAP products v.s. 3 rd ’s Layer 2 Mesh.
Dark net . . Invisible Web . . Hidden Web . .
Computer Networks: Domain Name System. The domain name system (DNS) is an application-layer protocol for mapping domain names to IP addresses Vacation.
By: Bryan Carey Randy Cook Richard Jost TOR: ANONYMOUS BROWSING.
1 Chapter 13: Representing Identity What is identity Different contexts, environments Pseudonymity and anonymity.
THE DICOM 2014 Chengdu Workshop August 25, 2014 Chengdu, China Keeping It Safe Brad Genereaux, Agfa HealthCare Product Manager Industry Co-Chair, DICOM.
New gTLD Basics. 2  Overview about domain names, gTLD timeline and the New gTLD Program  Why is ICANN doing this; potential impact of this initiative.
FIREWALL TECHNOLOGIES Tahani al jehani. Firewall benefits  A firewall functions as a choke point – all traffic in and out must pass through this single.
#ICANN49 Security and Stability Advisory Committee Activities Update ICANN Singapore Meeting March 2014.
1 Updated as of 1 July 2014 About ICANN KISA-ICANN Language Localisation Project Module 1.1.
ICANN and the Internet Ecosystem. 2  A network of interactions among organisms, and between organisms and their environment.  The Internet is an ecosystem.
Name Collisions in the Domain Name System Burt Kaliski, Verisign USTelecom Webinar April 17, 2014.
1 Revised: April 29, What is a Web Domain?  A HOSTNAME that identifies one or more IP addresses (web servers)  IP address (Internet Protocol)
Basic DNS Course Lecturer: Ron Aitchison. Module 1 DNS Theory.
Sofya Rozenblat 11/26/2012 CS 105 TOR ANONYMITY NETWORK.
Presentation Title Subtitle Author Copyright © 2002 OPNET Technologies, Inc. TM Introduction to IP and Routing.
© Copyright 2012 STI INNSBRUCK Tor project: Anonymity online.
The Case Against Cybersquatting A Discussion of Domain Name Trademark Protection By Matt Poole.
Web Mastering Module Internet Fundamentals. What is the Internet? –Global network of networks –Communicating using same set of rules (protocols/languages)
Lecture 8 Page 1 Advanced Network Security Review of Networking Basics: Internet Architecture, Routing, and Naming Advanced Network Security Peter Reiher.
Network and the internet Part four Introduction to computer, 2nd semester, 2009/2010 Mr.Nael Aburas Faculty of Information.
By : Himanshu Mishra Nimish Agarwal CPSC 624.  A system designed to prevent unauthorized access to or from a private network.  It must have at least.
Windows Internet Explorer 9 Chapter 1 Introduction to Internet Explorer.
Chapter 13 – Network Security
CS 4001Mary Jean Harrold1 Class 24 ŸFreedom of speech in cyberspace ŸAssign ŸAssignment 8—due today ŸTerm paper—due 11/20.
NARALO SURVEY Summary Results Oct Glenn McKnight, Naralo.
Lecture#1 on Internet. Internet Addressing IP address: pattern of 32 or 128 bits often represented in dotted decimal notation IP address: pattern of 32.
COMT 6251 Network Layers COMT Overview IP and general Internet Operations Address Mapping ATM LANs Other network protocols.
Prohibiting Redirection & Synthesized DNS Responses in Top Level Domains Mar 2010 Kuala Lumpur APTLD Meeting.
In Dec-2010 ICANN Board requested advice from ALAC, GAC, GNSO and ccNSO on definition, measures, and 3- year targets, for competition, consumer trust,
Tech Terminology for non-technical people Tim Bornholtz 2006 Annual Conference.
1 Web Development & Design Foundations with XHTML Chapter 1 Key Concepts.
Component 4: Introduction to Information and Computer Science Unit 7: Networks & Networking (Part 2 of 5)
New gTLD Basics. 2  Overview about domain names, gTLD timeline and the New gTLD Program  Why is ICANN doing this; potential impact of this initiative.
Protecting Students on the School Computer Network Enfield High School.
Communication, Networks, The internet and the Worldwide Web.
Multistakeholder Policy- & Decision-making
1 Chapter Overview Password Protection Security Models Firewalls Security Protocols.
Why the Data Protection Act was brought in  The 1998 Data Protection Act was passed by Parliament to control the way information is handled and to give.
DTCC Confidential DTCC Social Networking Policy Task Force January, 2008.
IANA Functions Stewardship Transition Patrik Fältström.
THE IANA FUNCTIONS The Coordination of the Assignment of Technical Internet Protocol Parameters The Administration of Certain Responsibilities Associated.
1 1 The GNSO Role in Internet Governance Presented by: Chuck Gomes Date: 13 May 2010.
Slides prepared by Cyndi Chie and Sarah Frye A Gift of Fire Third edition Sara Baase Chapter 3: Freedom of Speech.
Securing Future Growth: Getting Ready for IPv6 NOW! ccTLD Workshop, 8 th April 2011 Noumea, New Caledonia Miwa Fujii, Senior IPv6 Program Specialist, APNIC.
CHAPTER 2 Laws of Security. Introduction Laws of security enable user make the judgment about the security of a system. Some of the “laws” are not really.
Review of CCWG-Acct 3 rd Proposal and ALAC Issues Alan Greenberg 04 December 2015.
Traffic Correlation in Tor Source and Destination Prediction PETER BYERLEY RINDAL SULTAN ALANAZI HAFED ALGHAMDI.
Application of the Internet 1998/12/09 KEIO University, JAPAN Mikiyo
Update on Consumer Choice, Competition and Innovation (CCI) WG Rosemary Sinclair.
Digital Law -The Deep Web- Digital Law -The Deep Web- Liam Leppard Matthias Lee Russell Wong.
NETWORKING (2) Dr. Andy Wu BCIS 4630 Fundamentals of IT Security.
THE LARGEST NAME SERVICE ACTING AS A PHONE BOOK FOR THE INTERNET The Domain Name System click here to next page 1.
ANONYMIZING / WEB PRIVACY. TOOLS: STAYING ANONYMOUS ON THE INTERNET Proxy Server Tor.
Fast Flux Hosting and DNS ICANN SSAC What is Fast Flux Hosting? An evasion technique Goal of all fast flux variants –Avoid detection and take down of.
1 27Apr08 Some thoughts on Internet Governance and expansion of the Domain Name space Paul Twomey President and CEO 9 August 2008 Panel on Internet Governance.
Benjamin Knapic Nicholas Johnson.  “Tor is free software and an open network that helps you defend against a form of network surveillance that threatens.
Hiding in the Dark: The Internet You Cannot See Marc Visnick
Why Freelance Developers Are Switching To Econtracts
NCUC Africa Members First Regional Webinar Ines Hfaiedh
We celebrate 26/11 every year as the CITIZEN ACTION PLEDGE DAY
Tor Internals and Hidden Services
ICANN’s Policy Development Activities
Drugs & The Dark Net Tim Bingham
Exercise ?: TOR.
ICANN: MISSION, STRUCTURE AND CONSTITUENCIES
Presentation transcript:

Text #ICANN51

Text #ICANN51 15 October 2014 Alternate and Innovative DNS Evan Leibovitch ALAC, NARALO Secretary At-Large Policy Roundtable

Text #ICANN51 Agenda 1. Introduction/overview (Garth Bruen) 1.1. To DNS or not to DNS? 1.2. What is the policy? 1.3. News on Tor, BitCoin, etc. 2. Frogans (Tom Mackenzie - OP3FT) 2.1. Frogans technology Presentation 3. Second-level Domains (Ken Hansen - co.com) 3.1. What do they offer the consumer? 3.2. How are abuses and disputes addressed? 4. Discussion and questions

Text #ICANN51 The DNS is not the Whole Internet The Domain system occupies a small part the Net Domains with content hold an even smaller portion What else is “out there?”

Text #ICANN51 Not specifically the Web as we know it… Other structures/Alternate Roots Dot-less domains Tor “Domains” Peer-to-Peer DNS Sub-Structures New gTLD Innovation

Text #ICANN51 Important Questions Where does ICANN come in? How does the consumer navigate? Are alternate structures simply innovations to be embraced? Do all non-Top Level structures fall under ICANN in the context of the IANA transition? Will other countries/regions split from the single root? (They already have) Will domains even matter eventually?

Text #ICANN51 Extra Reference Material

Text #ICANN Other structures 1. More than 400 non-ICANN TLDs exist 2. Cesidian Root (100+ TLDs) 3. Space.Name (sued ICANN) 4. new.net (considered “malware”) 5. Several smaller ones (New-Nations, OpenNIC) 6. Some defunct (eDNS, Iperdome, AlterNIC, Open RSC)

Text #ICANN51 Why Alternate DNS? Different Reasons.SPACE - Competition. For consumers who feel restricted by ICANN.CESIDIO - Political Independence. Under the “authority” of a non-existent country.BIT - Economic. Used in the BitCoin payment architecture.JAQ - Protest. Created when the Network Working Group of the Internet Architecture Board issued a memo in 2000 expressing concern over Alternate Roots.PIRATE - Illicit. Created for “censorship free” downloading.

Text #ICANN Dot-less domains A Dotless domain would be just that, a domain without at TLD extension “SSAC stated that dotless domains would not be universally reachable and recommended strongly against their use” SAC053 “Dotless Domains Considered Harmful” IAB Dotless domains are how ARPANET nodes were configured before the DNS

Text #ICANN Tor "Domains" Tor is not actually a DNS Tor unique site identifiers are called “domains” but they cannot be reached in the DNS Also called hidden services these hostnames (like: duskgytldkxiuqc6.onion) can only be reached with the Tor browser Operates more like early “hostfile” net

Text #ICANN51 4. Tor Tor not primarily for naming Tor adds layers of routing to obscure traffic origin, path, and destination Tor also drops or blocks data typical in normal DNS In essence, Tor functions counter to common Internet logic by taking longer routes and not caching – thus providing a higher degree of anonymity

Text #ICANN49 Tor Routing Internet uses the best short path by design Tor adds nodes to routing obscuring the path

Text #ICANN51 Is Tor just for criminals? Hardly. While recent controversies about SilkRoad and other Dark Markets on Tor have captured media attention this does not reflect the Tor community and its user base. Crime is a problem in the DNS too, as we know. Tor is used by activists, journalists, stalking victims, law enforcement and anyone wishing to preserve their anonymity.

Text #ICANN49 Tor is software and a community The Tor Project (torproject.org) maintains the open-source software and the network Donation/Volun teer driven Not intended to replace DNS

Text #ICANN51 5. Problems Consumer Confusion Collisions Legal Issues Security Governance

Text #ICANN51 Strength or Weakness? of Alternate Systems No costs for domains (sometimes) No owner records (sometimes) No accountability? No resiliency? No security?

Text #ICANN51 Discussion: Can ICANN Mandate a Unique Root? Really One World One Internet? Can alternate systems be stopped? Are alternate systems innovation or imitation? Will domains even matter in 10 years? Your questions?