The Domain Name System: Difference between revisions
No edit summary |
|||
Line 23: | Line 23: | ||
==Challenges== | ==Challenges== | ||
Continuing the hegemony of the DNS as the Internet means coping with the issues and questions about control ([[Internet Governance|who gets to control it), [[ | Continuing the hegemony of the DNS as the Internet means coping with the issues and questions about control ([[Internet Governance|who gets to control it]]), [[Data Privacy]], [[trust]], [[Internet Fragmentation|fragmentation]], security as a rendezvous tool and a collection of markets, [[DNS Abuse]], [https://www.icann.org/en/public-comment/proceeding/recommendations-for-early-warning-for-root-zone-scaling-05-10-2020 scaling], [https://www.senki.org/network-operations-scaling/dns-latency-and-performance-test-tools/ speed], and the [https://papers.ssrn.com/sol3/papers.cfm?abstract_id=3746594 economics]. | ||
Ensuring the resiliency, stability, and security of the DNS is critical to perpetuating the usefulness of the Internet. The DNS has two key types of [[DNS Value and Vulnerability|vulnerabilities]]: complexity and bad actors. | Ensuring the resiliency, stability, and security of the DNS is critical to perpetuating the usefulness of the Internet. The DNS has two key types of [[DNS Value and Vulnerability|vulnerabilities]]: complexity and bad actors. | ||
===Complexity=== | ===Complexity=== | ||
Line 30: | Line 30: | ||
===Bad Actors=== | ===Bad Actors=== | ||
#Internet governance organizations, registries, registrars, and the business constituency are very concerned about [[DNS Abuse]], which refers to the exploitation of the DNS for malicious purposes. In particular, a debate rages over where technical abuse ends and where content abuse begins.<ref>[https://comlaude.com/domain-name-abuse-and-corporate-domain-management/ Domain Name Abuse, Com Laude]</ref> | #Internet governance organizations, registries, registrars, and the business constituency are very concerned about [[DNS Abuse]], which refers to the exploitation of the DNS for malicious purposes. In particular, a debate rages over where technical abuse ends and where content abuse begins.<ref>[https://comlaude.com/domain-name-abuse-and-corporate-domain-management/ Domain Name Abuse, Com Laude]</ref> | ||
==Associated Bodies== | ==Associated Bodies== | ||
[[ICANN]] exists to "facilitate the openness, interoperability, resilience, security and/or stability" of the '''Domain Name System (DNS)'''.<ref>[https://www.icann.org/resources/pages/governance/bylaws-en/#article1 ICANN.org Bylaws - Article 1]</ref> Although ICANN as a whole is dedicated to the mission of preserving an open, interoperable, resilient, secure, and stable DNS, specific committees, organizations, and entities are directly focused on the technical operation of the DNS: | [[ICANN]] exists to "facilitate the openness, interoperability, resilience, security and/or stability" of the '''Domain Name System (DNS)'''.<ref>[https://www.icann.org/resources/pages/governance/bylaws-en/#article1 ICANN.org Bylaws - Article 1]</ref> Although ICANN as a whole is dedicated to the mission of preserving an open, interoperable, resilient, secure, and stable DNS, specific committees, organizations, and entities are directly focused on the technical operation of the DNS: |