Say a company successfully applied to IANA to make .bob
a Top-level domain and the company now operates the registry of every domain with .bob
as the TLD. If the comany is under an authoritarian government with a track record of manipulating the Internet infrastructure, can a domain target.bob
be hijacked so that it gets resolved to a server the government owns, instead of going through the name server the domain owner specified? Will DNSSEC help?
Can a TLD operator (not registrar) maliciously change the DNS resolution of a domain with that TLD?
74 Views Asked by Andy Wang At
1
There are 1 best solutions below
Related Questions in SECURITY
- Calculating Inter Annotator Agreement with brat annotated files
- How to convert txt.knowtator.xml file to .ann?
- Unable to annotate multiple lines in Brat
- How can I use NER Model from Simple Transformers with phrases instead of words, and startchar_endchar (mapping to text) instead of sentence_id?
- Dynamic annotation configuration settings in BRAT
- Create per user workspace in nlplab Brat annotation tool
- How can I do squence labeling and entities relationships labeling at the same time
- How to read multiple ann files (from brat annotation) within a folder into one pandas dataframe?
- Which Cygwin packages does one need to install to run BRAT?
- Create HTML visualization from Brat format
Related Questions in DNS
- Calculating Inter Annotator Agreement with brat annotated files
- How to convert txt.knowtator.xml file to .ann?
- Unable to annotate multiple lines in Brat
- How can I use NER Model from Simple Transformers with phrases instead of words, and startchar_endchar (mapping to text) instead of sentence_id?
- Dynamic annotation configuration settings in BRAT
- Create per user workspace in nlplab Brat annotation tool
- How can I do squence labeling and entities relationships labeling at the same time
- How to read multiple ann files (from brat annotation) within a folder into one pandas dataframe?
- Which Cygwin packages does one need to install to run BRAT?
- Create HTML visualization from Brat format
Related Questions in IANA
- Calculating Inter Annotator Agreement with brat annotated files
- How to convert txt.knowtator.xml file to .ann?
- Unable to annotate multiple lines in Brat
- How can I use NER Model from Simple Transformers with phrases instead of words, and startchar_endchar (mapping to text) instead of sentence_id?
- Dynamic annotation configuration settings in BRAT
- Create per user workspace in nlplab Brat annotation tool
- How can I do squence labeling and entities relationships labeling at the same time
- How to read multiple ann files (from brat annotation) within a folder into one pandas dataframe?
- Which Cygwin packages does one need to install to run BRAT?
- Create HTML visualization from Brat format
Related Questions in ICANN
- Calculating Inter Annotator Agreement with brat annotated files
- How to convert txt.knowtator.xml file to .ann?
- Unable to annotate multiple lines in Brat
- How can I use NER Model from Simple Transformers with phrases instead of words, and startchar_endchar (mapping to text) instead of sentence_id?
- Dynamic annotation configuration settings in BRAT
- Create per user workspace in nlplab Brat annotation tool
- How can I do squence labeling and entities relationships labeling at the same time
- How to read multiple ann files (from brat annotation) within a folder into one pandas dataframe?
- Which Cygwin packages does one need to install to run BRAT?
- Create HTML visualization from Brat format
Trending Questions
- UIImageView Frame Doesn't Reflect Constraints
- Is it possible to use adb commands to click on a view by finding its ID?
- How to create a new web character symbol recognizable by html/javascript?
- Why isn't my CSS3 animation smooth in Google Chrome (but very smooth on other browsers)?
- Heap Gives Page Fault
- Connect ffmpeg to Visual Studio 2008
- Both Object- and ValueAnimator jumps when Duration is set above API LvL 24
- How to avoid default initialization of objects in std::vector?
- second argument of the command line arguments in a format other than char** argv or char* argv[]
- How to improve efficiency of algorithm which generates next lexicographic permutation?
- Navigating to the another actvity app getting crash in android
- How to read the particular message format in android and store in sqlite database?
- Resetting inventory status after order is cancelled
- Efficiently compute powers of X in SSE/AVX
- Insert into an external database using ajax and php : POST 500 (Internal Server Error)
Popular # Hahtags
Popular Questions
- How do I undo the most recent local commits in Git?
- How can I remove a specific item from an array in JavaScript?
- How do I delete a Git branch locally and remotely?
- Find all files containing a specific text (string) on Linux?
- How do I revert a Git repository to a previous commit?
- How do I create an HTML button that acts like a link?
- How do I check out a remote Git branch?
- How do I force "git pull" to overwrite local files?
- How do I list all files of a directory?
- How to check whether a string contains a substring in JavaScript?
- How do I redirect to another webpage?
- How can I iterate over rows in a Pandas DataFrame?
- How do I convert a String to an int in Java?
- Does Python have a string 'contains' substring method?
- How do I check if a string contains a specific word?
Yes, technically any node in the DNS tree can pervert everything below. But, especially at the TLD level it will be akin to a move with a nuke, it will be seen quickly and draw lots of actions and consequences.
You may want to go back at the Verisign Sitefinder fiasco. Not exactly the case you describe but very similar. It generated two consequences:
root-delegation-only
in bind that means exactly that (for both root and TLDs) to ensure there is no "hijacks".And DNSSEC can help, but in a limited way. Because in your case even if the domain is properly delegated and DNSSEC secured before the hijack, it means the registry has and published the
DS
record, so once the hijack happens thoseDS
records can be hijacked as well, or just removed, and end resolvers will see the change but just with that can not detect really a problem nor work around it.Note that in your case of "authoritarian government" they don't even need to go to the registry and the authoritative nameservers. They can force things at the recursive state also, forcing ISPs. And it completely happens today, and even in non authoritarian government: various names are, by law or judge, forbidden to be resolved. Sometimes it happens at registry side (see Microsoft seizing domains recently - and regularly - at https://arstechnica.com/information-technology/2021/12/microsoft-seizes-domains-used-by-highly-sophisticated-hackers-in-china/), and sometimes at resolver (this the recent judgment against Quad9 a big public recursive nameserver service: https://www.quad9.net/news/blog/quad9-and-sony-music-german-injunction-status/)
Also, side technical note: in the DNS a dot does not mean necessarily a delegation, and both sides can be administratively and technically handled by a single party. For example
gouv.fr
andfr
are technically and administratively handled by the same entity, there is no delegation nor hijack.