Blogs

  • DNSSEC and “lazy delegation”

    Prior to deploying DNSSEC it has been possible to perform something I’m calling “lazy delegation.” This is when a parent and direct child are served from the same name servers, so NS records in the parent are unnecessary in practice. While consulting with various clients about how to best deploy their DNSSEC, this is a common discovery. Often times someone

    Read more
    0
  • Preparing for a world consisting of larger DNS responses.

    While many of you know ISC as the maintainer of the BIND DNS server software, we have always had our hand in the DNS operations field, including operating one of the 13 DNS root servers (F.ROOT-SERVERS.NET), as well as secondaring many ccTLD and non-commercial zones for over a decade. ISC has also been at the forefront of designing and implementing

    Read more
    0
  • How to connect to a multi-homed server over TCP

    With the world wide deployment of IPv6 in parallel with IPv4, it has become apparent that a traditional connection loop is no longer good enough. In fact, this is a large part of the reason why Google is white listing resolvers and Yahoo only wants to return to AAAA records to DNS queries made over IPv6.  The traditional connection loop

    Read more
    0
  • Technology Leadership for the Common Good

    “I am relieved.”  That lovely double entendre is what Captain Pike said to Captain Kirk at the end of last summer’s most excellent reboot of the Star Trek series. I am likewise relieved to have been relieved of my long time post as President of ISC by my good friend and long associate Barry Greene. I continue at ISC as

    Read more
    0
  • Implementing IPv6 is no longer optional

    The exhaustion of IPv4 space from IANA is coming as soon as February (yes, next month!) and the reserve held by the RIRs will be running dry shortly thereafter. The ability to provide (and use) IPv6 infrastructure is no longer optional; it is a requirement. ISC, unlike others who may talk the talk in regard to IPv6 experience, has been

    Read more
    0
  • BIND 9: Easier GSS-TKEY configuration

    ISC has been working with Tridge from the Samba team to make it easier to configure BIND 9 to use GSS-TKEY. GSS-TKEY is used to allow Windows clients to securely update DNS zones using dynamic DNS, primarily in an Active Directory environment. These changes may be coming as early as BIND 9.8.0, which is scheduled to be released in late

    Read more
    0
  • Join The Global Passive DNS (pDNS) Network Today & Gain Effective Tools To Fight Against Cyber Crime

    Why contribute passive DNS data to ISC? ISC – the Public Benefit Company that works to sustain the spirit of the Internet – is expanding the capacity of our Passive DNS System. Passive DNS provides the industry greater insight into how the cyber-criminals are using DNS to violate the Internet. Vetted organizations are invited to join the pDNS network by

    Read more
    0
  • Changes to BIND 9 development helped catch bugs

    Yesterday I blogged about how ISC has been changing our internal development practices for BIND 9. Today, with the release of several security patches, I wanted to talk a bit on how they have helped us already. Test-driven Development In many projects, and previously in BIND 9, tests were written after the code was working. This left writing automated tests

    Read more
    0
  • BIND 9 Development at ISC

    ISC has begun implementing several methodology changes relating to BIND 9 development. The goals of these changes is to increase our software quality and relevance to you, our customers. Some of these are more internal, but we hope the outcome of these changes are that the effects are positive and noticed by those outside of ISC. As with all changes,

    Read more
    0
  • Standardizing the Severity of Security Vulnerabilities

    Larissa Shapiro, ISC Product Manager ISC has recently become aware of a security advisory, CVE-2010-3762 filed against BIND 9 on October 5th 2010. ISC did not request this CVE, nor was it contacted by the submitter prior to its submission. We believe the reported severity assessment of this CVE to be higher than is realistic. Specifically, because a recursive operator

    Read more
    0
  • F-Root Routing: How does it work?

    ISC uses an unusual routing configuration for the F-Root name server. While the configuration is relatively easy to understand, it’s hard to deduce by looking at the routing tables. We’ll explain it here! The network 192.5.4.0/23 is used for F-Root. The reasons for using this block are historical and unimportant, but the fact that it is a /23 is very

    Read more
    0
  • Taking Back the DNS

    Most new domain names are malicious. I am stunned by the simplicity and truth of that observation. Every day lots of new names are added to the global DNS, and most of them belong to scammers, spammers, e-criminals, and speculators. The DNS industry has a lot of highly capable and competitive registrars and registries who have made it possible to

    Read more
    0

Last modified: February 22, 2016 at 1:27 pm