Two great new ‘Networking 101’ videos now available. This series is great for anyone needing a quick refresh or touch up on the basics and these two both focus on DNS.
DNS is key to making the Internet accessible to us humans. It’s how we can connect to techwisetv.com without needing to know anything complex from anywhere in the world. How does it know how to do this? DNS can be a complicated topic but understanding the basics does not have to be.
Taking it a step further, DNSSEC is a suite of IETF specifications designed to guarantee the authenticity of data obtained from the domain name system (DNS). Although not designed for confidentiality of the data, this protocol is a great answer for many of the ills that threaten the simplicity of the Internet. Chief Geek Jimmy Ray Purser arms you with how it works and why deployment is not growing as fast as it should be.
Last week the UN’s Broadband Commission held its fifth meeting to discuss how to extend the broadband Internet to the almost six billion people on the planet who have yet to connect at broadband speeds. A critical component to extending the Internet is the work done by the multi-stakeholder technical community, especially the Internet Engineering Task Force (IETF).
From March 25th through the 30th, the IETF held its 83rd meeting and Cisco was honored to be the host sponsor. Over fourteen hundred attendees, from 56 countries, participated in the meeting which gathered a large open multi-stakeholder community of network designers, engineers, operators, vendors, and researchers concerned with the evolution and smooth operation of the Internet. Technologies previously defined by the IETF, such as IPv6 and DNSSEC, are now at the forefront of efforts to ensure the Internet's continued growth as a trusted platform of communications and innovation for billions of people around the world. As a result, the Internet has now grown to be essential to the 21st century global economy and a key driver of social development due in large part to the work of the IETF.
Lately we have seen various attacks against the various SSL/TLS usages that we have in the world. The attacks have not been technical per se, but instead use weaknesses in the procedures that are used to get a certificate. Lets first look at how trust is built up using SSL.