Perimeter

6/23/2016
03:00 PM
Dark Reading
Dark Reading
Products and Releases
50%
50%

Internet Pioneer Discusses Creation, Expectations and Security of DNS on Its 33rd Birthday

"The Internet community has let legacy infrastructure designs constrain the future."

CARLSBAD, CA--(Marketwired - Jun 23, 2016) - 33 years ago today, Paul Mockapetris, inventor of the Internet Domain Name System, watched the DNS take its first steps. This critical development would open up what may be the world's most utilized and important technological development for a mass audience. Did he understand the importance or impact that DNS would have when it was created?

"I think I saw the potential importance more clearly than the traditional ARPAnet era folks, who were busy replacing the old NCP protocols with IP and TCP," noted Mockapetris, now Chief Scientist at ThreatSTOP. "So I was very happy to take on the design job and build something quite beyond the task given me."

By 1983, he had already spent 15 years designing distributed systems at what would become the Media Lab at MIT, Draper Labs, IBM, and the Distributed Computer System at UC Irvine. So he did expect his creation to be used across the Internet to manage distributed operating systems and applications. DNS was really meant to manage a heterogeneous distributed, federated cloud and its services.

Something Mockapetris did not expect was the whole marketing and branding of names. "I guess I should have taken some classes in business and marketing," he joked. His biggest surprise was that the research agencies in the late 80s and 90s didn't see naming systems and DNS in particular as merely the first steps in an Internet naming architecture. The original design had many places where next steps and additional mechanisms were indicated, and were never taken. Recent work in named data networking has revived this field a bit.

"If I'd been told in 1988 what the DNS would eventually be used for, I would have said it wasn't possible," said Dr. Paul Vixie, Internet pioneer and CEO of Farsight Security, Inc."Almost all Internet activities, whether for good or evil, begin with a DNS lookup. Defenders who can monitor, and control, and investigate their use of DNS can by extension monitor, and control, and investigate their relationship to the Internet itself."

The DNS was introduced during the transition from the ARPAnet to the IP/TCP-based Internet, and was the largest single architectural innovation of that transition. As a critical infrastructure, DNS has been subjected to many attacks and misuse, but in today's hardened form, it is seen as an essential tool for implementing security.

Security was intentionally left out of the initial design, along with several other functions. DNSSEC is a next step, but is very heavy weight and doesn't solve current problems like DDoS.

"The Internet community has let legacy infrastructure designs constrain the future," notes Mockapetris. "For example, the 512 byte datagram limit of 1983 should be more like 500 Megabytes if we adjust for the million-fold increase in transmission speed in today's Internet, though I'd settle for 512K bytes. We are giving up on datagrams because of DDoS -- while I understand the argument, I'm not ready to surrender yet. There's a lot of room for innovation here. It's as if we are requiring DNS to support paper tape and floppy disks."

Mockapetris now provides guidance to the ongoing product innovation process for ThreatSTOP, and leads research into DNS-based security. "Effective security requires real-time threat intelligence that is distributed to all of an enterprise's enforcement devices whether they are routers, firewalls, application delivery controllers, or servers. DNS is an ideal vehicle," said Mockapetris. "Fielding powerful, scalable security tools that leverage the ubiquity of DNS to protect organizations of all sizes is critical."

About ThreatSTOP
ThreatSTOP is a network security company offering a cloud-based threat protection service that protects every device and workload on a network from cyberattacks and data theft. It can protect any network, from virtual cloud networks to branch LANs to the largest carrier networks. The service leverages market-leading threat intelligence to deflect inbound and outbound threats, including botnet, phishing and ransomware attacks, and prevents data exfiltration. For more information visit www.threatstop.com.

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Making the Case for a Cybersecurity Moon Shot
Adam Shostack, Consultant, Entrepreneur, Technologist, Game Designer,  2/19/2019
New Free Tool Scans for Chrome Extension Safety
Dark Reading Staff 2/21/2019
Privacy Ops: The New Nexus for CISOs & DPOs
Amit Ashbel, Security Evangelist, Cognigo,  2/18/2019
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
5 Emerging Cyber Threats to Watch for in 2019
Online attackers are constantly developing new, innovative ways to break into the enterprise. This Dark Reading Tech Digest gives an in-depth look at five emerging attack trends and exploits your security team should look out for, along with helpful recommendations on how you can prevent your organization from falling victim.
Flash Poll
How Enterprises Are Attacking the Cybersecurity Problem
How Enterprises Are Attacking the Cybersecurity Problem
Data breach fears and the need to comply with regulations such as GDPR are two major drivers increased spending on security products and technologies. But other factors are contributing to the trend as well. Find out more about how enterprises are attacking the cybersecurity problem by reading our report today.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2019-8955
PUBLISHED: 2019-02-21
In Tor before 0.3.3.12, 0.3.4.x before 0.3.4.11, 0.3.5.x before 0.3.5.8, and 0.4.x before 0.4.0.2-alpha, remote denial of service against Tor clients and relays can occur via memory exhaustion in the KIST cell scheduler.
CVE-2019-1698
PUBLISHED: 2019-02-21
A vulnerability in the web-based user interface of Cisco Internet of Things Field Network Director (IoT-FND) Software could allow an authenticated, remote attacker to gain read access to information that is stored on an affected system. The vulnerability is due to improper handling of XML External E...
CVE-2019-1700
PUBLISHED: 2019-02-21
A vulnerability in field-programmable gate array (FPGA) ingress buffer management for the Cisco Firepower 9000 Series with the Cisco Firepower 2-port 100G double-width network module (PID: FPR9K-DNM-2X100G) could allow an unauthenticated, adjacent attacker to cause a denial of service (DoS) conditio...
CVE-2019-6340
PUBLISHED: 2019-02-21
Some field types do not properly sanitize data from non-form sources in Drupal 8.5.x before 8.5.11 and Drupal 8.6.x before 8.6.10. This can lead to arbitrary PHP code execution in some cases. A site is only affected by this if one of the following conditions is met: The site has the Drupal 8 core RE...
CVE-2019-8996
PUBLISHED: 2019-02-21
In Signiant Manager+Agents before 13.5, the implementation of the set command has a Buffer Overflow.