Chapter2_dnsa.pptx

Download Report

Transcript Chapter2_dnsa.pptx

The Arab Spring
 Internet shutdowns in Egypt originally
attributed to govt. shutdown/redirection
via DNS
 Later reported to be a more brute-force
approach

Powered down the routers at major ISPs
2: Application Layer
1
Operation “In Our Sights II”
 US Dept of Justice targets “sale and
distribution of counterfeit goods and
illegally copyrighted works.”
 Criminal Division, the Department of
Homeland Security, and nine U.S.
Attorneys’ Offices
 “Seized” 82 domain names of websites

By requiring U.S. DNS servers to hide/redirect
those domains
 Most recent high-profile case (NinjaVideo)
pled guilty in mid-Sept, 2011
2: Application Layer
2
Operation “Protect Our Children”
 US Immigrations and Customs Enforcement
(ICE) aimed at child pornography sites
(2010-2011)
 DSN records redirected seized sites to an
ICE banner
Proclaimed that the site had been seized for
trafficking in child pornography
 Sites seized with minimal judicial involvement

 Spectacularly failed by seizing overly-
broad domains
E.g., Popular domain mooo.com seized, thus
flagging over 84,000 sites as pornographers
 Embarrassing congressional hearings2: Application Layer

3
PROTECT IP Act
 Legislation currently (9/2011) before
Congress

“IP” = Intellectual Property
 Would codify the legal basis for “In Our
Sights”

Make it easy for law enforcement to request
DNS “seizures” of sites violating copyrights
 Controversy: allows a “right of private
action” whereby publishers can allege
violation of their copyright and get a site
seized with no judicial hearing.
2: Application Layer
4
Should We “Uproot” DNS?
 Arguably, the hierarchical structure of
DNS concentrates too much power in the
hands of a few govts and corporations
 Periodic attempts have been made at
creating alternate DNS roots

Except for a few supposed small “black nets”,
unsuccessful
 Not to be confused with so-called Open
DNS

A commercial service providing faster DNS via
massive caches
2: Application Layer
5
DNS via P2P
 Idea has been floated in academic papers
since 1996
 Gaining momentum in 2011

Project headed by co-founder of Pirate Bay
 Serious issues:
 Trust – if not by hierarchy, then by encryption
• 2011 hacking of certificate issuer DigiNotar raises
questions

P2P networks over time concentrate traffic in
the fastest, most reliable nodes
• Google or similar server farms could dominate
2: Application Layer
6