Changes

2,091 bytes removed ,  11 years ago
m
no edit summary
Line 46: Line 46:  
In a letter addressed to ICANN Chairman [[Steve Crocker|Steven Crocker]] and [[Cherine Chalaby]], Chair of the ICANN [[New gTLD Program Committee]], NetNames General Manager and [[GNSO]] Chairman [[Stephane Van Gelder]] complained about the [[Digital Archery|digital archery]] [[Batching|batching]] system, describing it as a "contentious system", and that it generates applicant confusion. He also said that the system was "created without formal community input and it was "hastily put together" by the internet governing body. He encouraged ICANN to delay the implementation of the digital batching until the ICANN meeting in Prague from June 24-29, 2012, in order to develop a better solution and allow community-wide consultation to develop a fair and equal opportunity for all gTLD applicants in the initial evaluation process.<ref>
 
In a letter addressed to ICANN Chairman [[Steve Crocker|Steven Crocker]] and [[Cherine Chalaby]], Chair of the ICANN [[New gTLD Program Committee]], NetNames General Manager and [[GNSO]] Chairman [[Stephane Van Gelder]] complained about the [[Digital Archery|digital archery]] [[Batching|batching]] system, describing it as a "contentious system", and that it generates applicant confusion. He also said that the system was "created without formal community input and it was "hastily put together" by the internet governing body. He encouraged ICANN to delay the implementation of the digital batching until the ICANN meeting in Prague from June 24-29, 2012, in order to develop a better solution and allow community-wide consultation to develop a fair and equal opportunity for all gTLD applicants in the initial evaluation process.<ref>
 
[http://domainincite.com/9235-now-netnames-complains-about-digital-archery Now NetNames complains about digital archery]</ref> <ref>[http://domainincite.com/docs/NetNames-to-Board-on-batching.pdf NetNames Letter to ICANN Regarding Digital Archery]</ref> The Digital Archery program was abandoned during ICANN Prague.
 
[http://domainincite.com/9235-now-netnames-complains-about-digital-archery Now NetNames complains about digital archery]</ref> <ref>[http://domainincite.com/docs/NetNames-to-Board-on-batching.pdf NetNames Letter to ICANN Regarding Digital Archery]</ref> The Digital Archery program was abandoned during ICANN Prague.
  −
==Attack on NetNames DNS Servers==
  −
On September 4, 2011, the [[DNS]] Servers of NetNames were attacked by Turkish hackers, who redirected the traffic of websites. These attacks affected the websites of UPS, Acer, The Register, The Daily Telegraph, and others. It seems that the attacks carried out on that day amounted to less than a dozen sites,<ref>[http://www.zone-h.org/archive/notifier=Turkguvenligi.info/page=1 Archive, Zone-h.org]</ref> and NetNames issued a statement noting that "A very small number of customer domains were redirected..".<ref>[http://www.pcpro.co.uk/news/security/369700/sql-injection-blamed-for-widespread-dns-hack SQL Injection Blamed For Widespread DNS hack, PCpro.co.uk]</ref> The culprits redirected the sites to a black page with the message, "Hacking is not a crime…We TurkGuvengligi declare this day as World Hackers Day – Have fun."<REF>[http://nakedsecurity.sophos.com/2011/09/04/dns-hack-hits-popular-websites-telegraph-register-ups-etc/ DNS hack hits popular websites: Daily Telegraph, The Register, UPS, etc]</ref> The group, [[TurkGuvenligi]], is responsible for over 150 such attacks on various registrars over a number of years.<ref>[http://www.zone-h.org/archive/notifier=Turkguvenligi.info/page=1 Tukguvenligi.info, zone-h.org]</ref>
  −
  −
According to NetNames, the hackers used SQL injection and were able to get access to certain information allowing them to submit a  re-delegation order to the NetNames System to change the address of the master DNS servers. This enabled the affected name servers to serve incorrect DNS data and redirected the web traffics to the hacker's Turkguvenligi page. NetNames resolved the issues after a few hours and the company disabled one account that had been compromised by the attack.<ref>[http://www.netnames.co.uk/resources/news/2011/netnames-dns-security-update NetNames DNS Security Update]</ref><ref>[http://www.eweek.com/c/a/Security/Attack-on-NetNames-DNS-Servers-Shifts-Web-Traffic-Away-From-Major-Web-Sites-199106/ Attack on NetNames DNS Servers Shifts Web Traffic Away From Major Websites]</ref>
      
==References==
 
==References==