The Domain Name System: Difference between revisions
No edit summary |
|||
Line 23: | Line 23: | ||
==Challenges== | ==Challenges== | ||
Continuing the hegemony of the DNS as the Internet means coping with the issues and questions about control ([[Internet Governance|who gets to control it), [[ | Continuing the hegemony of the DNS as the Internet means coping with the issues and questions about control ([[Internet Governance|who gets to control it]]), [[Data Privacy]], [[trust]], [[Internet Fragmentation|fragmentation]], security as a rendezvous tool and a collection of markets, [[DNS Abuse]], [https://www.icann.org/en/public-comment/proceeding/recommendations-for-early-warning-for-root-zone-scaling-05-10-2020 scaling], [https://www.senki.org/network-operations-scaling/dns-latency-and-performance-test-tools/ speed], and the [https://papers.ssrn.com/sol3/papers.cfm?abstract_id=3746594 economics]. | ||
Ensuring the resiliency, stability, and security of the DNS is critical to perpetuating the usefulness of the Internet. The DNS has two key types of [[DNS Value and Vulnerability|vulnerabilities]]: complexity and bad actors. | Ensuring the resiliency, stability, and security of the DNS is critical to perpetuating the usefulness of the Internet. The DNS has two key types of [[DNS Value and Vulnerability|vulnerabilities]]: complexity and bad actors. | ||
===Complexity=== | ===Complexity=== | ||
Line 30: | Line 30: | ||
===Bad Actors=== | ===Bad Actors=== | ||
#Internet governance organizations, registries, registrars, and the business constituency are very concerned about [[DNS Abuse]], which refers to the exploitation of the DNS for malicious purposes. In particular, a debate rages over where technical abuse ends and where content abuse begins.<ref>[https://comlaude.com/domain-name-abuse-and-corporate-domain-management/ Domain Name Abuse, Com Laude]</ref> | #Internet governance organizations, registries, registrars, and the business constituency are very concerned about [[DNS Abuse]], which refers to the exploitation of the DNS for malicious purposes. In particular, a debate rages over where technical abuse ends and where content abuse begins.<ref>[https://comlaude.com/domain-name-abuse-and-corporate-domain-management/ Domain Name Abuse, Com Laude]</ref> | ||
==Associated Bodies== | ==Associated Bodies== | ||
[[ICANN]] exists to "facilitate the openness, interoperability, resilience, security and/or stability" of the '''Domain Name System (DNS)'''.<ref>[https://www.icann.org/resources/pages/governance/bylaws-en/#article1 ICANN.org Bylaws - Article 1]</ref> Although ICANN as a whole is dedicated to the mission of preserving an open, interoperable, resilient, secure, and stable DNS, specific committees, organizations, and entities are directly focused on the technical operation of the DNS: | [[ICANN]] exists to "facilitate the openness, interoperability, resilience, security and/or stability" of the '''Domain Name System (DNS)'''.<ref>[https://www.icann.org/resources/pages/governance/bylaws-en/#article1 ICANN.org Bylaws - Article 1]</ref> Although ICANN as a whole is dedicated to the mission of preserving an open, interoperable, resilient, secure, and stable DNS, specific committees, organizations, and entities are directly focused on the technical operation of the DNS: |
Revision as of 17:46, 6 April 2022
The Domain Name System (DNS) is a hierarchical naming system for computers, services, or any other resources connected to the Internet. See How the Domain Name System Works for a brief overview of the DNS. See Pre-ICANN History of the DNS for the development of the DNS in the 20th century. The DNS is a Namespace: a collection of wordstrings organized into a hierarchy of labels. It is a distributed name registration framework that assigns unique licenses to use to human-readable strings for money. It is also distributed database that assigns wordstrings to IP addresses. It is a protocol to resolve wordstrings into an attribute (a singular IP address. It is a signaling medium.[1]
DNS Components[edit | edit source]
- Distributed Database: an archive of information about the computers in a network
- Name Servers: contain address information about other computers on the network
- Domain Name Resolvers do the work of translating domain names into numeric IP addresses based on the canonical database in the root zone.
- The DNS Root Zone is the network of database servers that maintain the names and the numeric IP addresses of over 1500 gTLDs, ccTLDs, and IDNs.
- Domains: logical groups of computers in a large network
Top-Level Domains[edit | edit source]
- The DNS maintains a database of top-level domains (TLDs) that can be accessed via the Internet. Top-level domains fall into three broad categories:
- generic TLDs (gTLDs);
- country code TLDs (ccTLDs); and
- internationalized domain names (IDNs)
- Registry operators maintain the database of registrations for a particular TLD.
- Registrars allow registrants to register a domain name.
Foundational Operating Documents[edit | edit source]
- RFC 1591 remains a core conceptual framework describing IANA's role in the delegation and oversight of top-level domains.
- The Affirmation of Commitments formed the basis for much of ICANN's mission and operational mandate to maintain the security, stability, and resiliency of the DNS.
Challenges[edit | edit source]
Continuing the hegemony of the DNS as the Internet means coping with the issues and questions about control (who gets to control it), Data Privacy, trust, fragmentation, security as a rendezvous tool and a collection of markets, DNS Abuse, scaling, speed, and the economics. Ensuring the resiliency, stability, and security of the DNS is critical to perpetuating the usefulness of the Internet. The DNS has two key types of vulnerabilities: complexity and bad actors.
Complexity[edit | edit source]
- Cybersecurity experts are concerned about the DNS Camel, which refers to the inexorable growth of DNS protocols over the past three decades, making it increasingly difficult to implement and secure DNS advancements.[2]
- As the number and kind of TLDs continue to expand, Universal Acceptance becomes an increasingly important topic.
Bad Actors[edit | edit source]
- Internet governance organizations, registries, registrars, and the business constituency are very concerned about DNS Abuse, which refers to the exploitation of the DNS for malicious purposes. In particular, a debate rages over where technical abuse ends and where content abuse begins.[3]
Associated Bodies[edit | edit source]
ICANN exists to "facilitate the openness, interoperability, resilience, security and/or stability" of the Domain Name System (DNS).[4] Although ICANN as a whole is dedicated to the mission of preserving an open, interoperable, resilient, secure, and stable DNS, specific committees, organizations, and entities are directly focused on the technical operation of the DNS:
ICANN Bodies[edit | edit source]
- Internet Assigned Numbers Authority
- Root Server System Advisory Committee
- Many of the New gTLD Program panels perform evaluations of the impact of proposed new gTLD strings on the DNS.
Other Organizations[edit | edit source]
- Forum of Incident Response and Security Teams
- Internet Engineering Task Force (IETF) - a large, open international community of network designers, operators, vendors, and researchers concerned with the evolution of the Internet's architecture and the smooth operation of the Internet.
- Internet Engineering Steering Group (IESG) - the technical management group of the IETF
- Internet Governance Forum (IGF) - United Nations forum, providing a platform for stakeholders from industry, government, and civil society to discuss issues related to Internet governance.
- Internet Research Task Force (IRTF) - focused, long-term research groups on the evolution of Internet protocols, applications, architecture and technology.