On the Effects of Registrar-level Intervention

Size: px
Start display at page:

Download "On the Effects of Registrar-level Intervention"

Transcription

1 On the Effects of Registrar-level Intervention He (Lonnie) Liu Kirill Levchenko Geoffrey M. Voelker Stefan Savage UC San Diego Mark Felegyhazi Christian Kreibich UC Berkeley ICSI 1

2 Spam 2

3 Spam Infrastructure Mail address harvesting Botnet mail senders Domain names Proxies and redirections Web hosting etc. 3

4 Spam Infrastructure Mail address harvesting Botnet mail senders Domain names Proxies and redirections Web hosting etc. 4

5 Spam 5

6 Domain Name System (DNS) (root) Registries.com.net.cn.ru.au Registrars enom GoDaddy Tucows Authoritative Name Servers ns1.buyrxpills.com ns2.buyrpills.com End User Recursive Name Servers ns.ucsd.edu buyrxpills.com=? 6

7 Domain Name System (DNS) (root) Registries.com.net.cn.ru.au Registrars enom GoDaddy Tucows Authoritative Name Servers ns1.buyrxpills.com ns2.buyrpills.com Recursive Name Servers Blacklists ns.ucsd.edu End User buyrxpills.com is bad! buyrxpills.com=? 7

8 Domain Name System (DNS) (root) Registries.com.net.cn.ru.au Registrars enom GoDaddy Tucows Authoritative Name Servers ns1.buyrxpills.com ns2.buyrpills.com Take downs Recursive Name Servers ns.ucsd.edu End User buyrxpills.com=? 8

9 Domain Name System (DNS) Increase Price Take downs (root) Registries.com.net.cn.ru.au Registrars enom GoDaddy Tucows Authoritative Name Servers ns1.buyrxpills.com ns2.buyrpills.com End User Recursive Name Servers ns.ucsd.edu buyrxpills.com=? 9

10 Two Registration Policy Changes

11 Two Registration Policy Changes Dec cn

12 Two Registration Policy Changes 2008 Dec Sep cn

13 Our Approach Collect spam domains from spam feeds Track DNS name server activities Zone files Track registration info WHOIS, DomainTools.com (historic WHOIS service) Tagged pharmacy domains Click Trajectory (Oakland 11) 13

14 December, 2009.cn 14

15 Cost of a.cn Domain = (15 cents) 15

16 Cost of a.cn Domain = (15 cents) 16

17 Cost of a.cn Domain business license (photocopy) (15 cents) 17

18 Cost of a.cn Domain registrant id (photocopy) business license (photocopy) (15 cents) 18

19 Cost of a.cn Domain registrant id (photocopy) Dec 14, 2009 business license (photocopy) (15 cents) 19

20 Cost of a.cn Domain Dec 14, 2009 = (15 cents) 20

21 Cost of a.cn Domain Dec 14, 2009 = (15 cents) = (10 dollars) 21

22 Cost of a.cn Domain Dec 14, 2009 = (15 cents) = +6800% (10 dollars) 22

23 New Created Domains New Spam Advertised New Blacklisted 23

24 New Created Domains New Spam Advertised New Blacklisted 24

25 New Created Domains New Spam Advertised New Blacklisted 25

26 CNNIC Policy Change Spam domains are sensitive to prices Spammers abandoned.cn domains And start using.ru domains instead Quickly adapted the changes 26

27 September 21,

28 September 21, 2010 Internet Pharmacy Verification & Enforcement 28

29 September 21, 2010 Internet Pharmacy Verification & Enforcement 29

30 September 21, 2010 Illegal Online Pharmacy to Identify Customers 30

31 September 21, 2010 Illegal Online Pharmacy to Identify Customers 31

32 September 21, 2010 Illegal Online clienthold Pharmacy to Identify Customers the domain will remain on hold and may not be transferred 32

33 Number of domains put to clienthold State clientheld enom.com Domains 33

34 Number of domains put to clienthold State clientheld enom.com Domains drug, pill pill, rx rx, viagra viagra 34

35 Global Impact 14,268.com pharmacy domains From our spam feeds, identified by webpage contents 35

36 Global Impact 1,223 enom (9%) 14,268.com pharmacy domains 36

37 Global Impact 1,223 enom (9%) 14,268.com pharmacy domains ClientHold (67%) Removed from zone file (5%) Still active(16%) Transferred (12%) 37

38 Global Impact 1,223 enom (9%) 14,268.com pharmacy domains ClientHold (67%) Removed from zone file (5%) Still active(16%) Transferred (12%) 38

39 LegitScript - enom Agreement Noticeable effects on enom domains domains put to clienthold Scammers transferred to other registrars The scale limits the global effects 9% affected 39

40 Discussion: Defend at Registrar Level Economic way: increase the price (CNNIC) Significant effect, but alternatives available Affects all.cn users, including legal ones Social way: take down domains (LegitScript) Similar to other takedowns, effects depends on scale and speed 40

41 Questions & Comments Thank you 41

On the Effects of Registrar-level Intervention

On the Effects of Registrar-level Intervention On the Effects of Registrar-level Intervention He (Lonnie) Liu Kirill Levchenko Mark Felegyhazi Christian Kreibich Gregor Maier Geoffrey M. Voelker Stefan Savage Dept. of Computer Science and Engineering

More information

No Plan Survives Contact

No Plan Survives Contact No Plan Survives Contact Experience with Cybercrime Measurement Chris Kanich Neha Chachra Damon McCoy Chris Grier David Wang Marti Motoyama Kirill Levchenko Stefan Savage Geoffrey M. Voelker UC San Diego

More information

Underground economy. Economics of Security and Privacy (BMEVIHIAV15) Mark Felegyhazi. assistant professor CrySyS Lab.

Underground economy. Economics of Security and Privacy (BMEVIHIAV15) Mark Felegyhazi. assistant professor CrySyS Lab. Underground economy Economics of Security and Privacy (BMEVIHIAV15) Mark Felegyhazi assistant professor CrySyS Lab. Underground economy BME Department of Telecommunications (Híradástechnikai Tanszék) mfelegyhazi(atat)crysys(dot)hu

More information

Intermediaries and regulation

Intermediaries and regulation Intermediaries and regulation Economics of Security and Privacy (BMEVIHIAV15) Mark Felegyhazi assistant professor CrySyS Lab. Intermediaries and regulation BME Department of Telecommunications (Híradástechnikai

More information

Update on Whois Studies

Update on Whois Studies Update on Whois Studies 1 1 Current Status Final GNSO-commissioned Whois studies now completed, awaiting public comment Whois Privacy & Proxy Abuse Study Performed by National Physical Laboratory, UK Public

More information

SURBL-Listed Domains And Their Registrars (In Just Seven or Eight Minutes)

SURBL-Listed Domains And Their Registrars (In Just Seven or Eight Minutes) SURBL-Listed Domains And Their Registrars (In Just Seven or Eight Minutes) Joe St Sauver, Ph.D. (joe@uoregon.edu or joe@internet2.edu) Forum on DNS Abuse Grand Ballroom, 14 Mar 2011 11:30-13:00 ICANN 40,

More information

Understanding the Domain Registration Behavior of Spammers

Understanding the Domain Registration Behavior of Spammers Understanding the Domain Registration Behavior of Spammers Shuang Hao Georgia Tech shao@cc.gatech.edu Nick Feamster Georgia Tech feamster@cc.gatech.edu Matthew Thomas Verisign, Inc. mthomas@verisign.com

More information

Detecting Malicious URLs. Justin Ma, Lawrence Saul, Stefan Savage, Geoff Voelker. Presented by Gaspar Modelo-Howard September 29, 2010.

Detecting Malicious URLs. Justin Ma, Lawrence Saul, Stefan Savage, Geoff Voelker. Presented by Gaspar Modelo-Howard September 29, 2010. Detecting Malicious URLs Justin Ma, Lawrence Saul, Stefan Savage, Geoff Voelker Presented by Gaspar Modelo-Howard September 29, 2010 Publications Justin Ma, Lawrence K. Saul, Stefan Savage, and Geoffrey

More information

.rio Registration Policies 2016 Dec 16

.rio Registration Policies 2016 Dec 16 .rio Registration Policies 2016 Dec 16 Empresa Municipal de Informática SA [IPLANRIO], the registry for.rio domains, requires all registrants to abide by the policies detailed below or any successor policy

More information

in the Early 1980s

in the Early 1980s 1 Email in the Early 1980s sender Network 1 Mail relay Network 2 Mail relay Network 3 Mail relay: forwards mail to next hop Sender path includes path through relays recipient 2 1 Email Spoofing Email messages

More information

DNS Abuse Handling. FIRST TC Noumea New Caledonia. Champika Wijayatunga Regional Security, Stability and Resiliency Engagement Manager Asia Pacific

DNS Abuse Handling. FIRST TC Noumea New Caledonia. Champika Wijayatunga Regional Security, Stability and Resiliency Engagement Manager Asia Pacific DNS Abuse Handling FIRST TC Noumea New Caledonia Champika Wijayatunga Regional Security, Stability and Resiliency Engagement Manager Asia Pacific 10 September 2018 1 The Domain Name System (DNS) The root

More information

Is the WHOIS service a source for addresses for spammers?

Is the WHOIS service a source for  addresses for spammers? Is the WHOIS service a source for email addresses for spammers? SSAC Meeting 25 June 2007 rmohan@afilias.info - Ram Mohan dave.piscitello@icann.org - Dave Piscitello Objectives Study the correlation between

More information

DNS Firewall with Response Policy Zone. Suman Kumar Saha bdcert Amber IT Limited

DNS Firewall with Response Policy Zone. Suman Kumar Saha bdcert Amber IT Limited DNS Firewall with Response Policy Zone Suman Kumar Saha bdcert suman@bdcert.org Amber IT Limited suman@amberit.com.bd DNS Response Policy Zone(RPZ) as Firewall RPZ allows a recursive server to control

More information

How The Pursuit of Truth Led Me To Selling Viagra

How The Pursuit of Truth Led Me To Selling Viagra How The Pursuit of Truth Led Me To Selling Viagra Vern Paxson EECS Department, University of California International Computer Science Institute Lawrence Berkeley National Laboratory Berkeley, California

More information

Tucows Guide to the GDPR. March 2018

Tucows Guide to the GDPR. March 2018 Tucows Guide to the GDPR March 2018 About This Webinar Who is this webinar for? Resellers of Tucows services Familiar with the domain world and ICANN policy Familiar with our blog posts What are we doing

More information

The Domain Abuse Activity Reporting System (DAAR)

The Domain Abuse Activity Reporting System (DAAR) The Domain Abuse Activity Reporting System (DAAR) Dave Piscitello APWG EU October 2017 The Domain Abuse Activity Reporting system What is the Domain Abuse Activity Reporting system? A system for reporting

More information

Detecting Abuse in TLDs

Detecting Abuse in TLDs Detecting Abuse in TLDs A NameSentry TM presentation by Greg Aaron and Michael Young ICANN Toronto: 15 October 2012 2012 Illumintel Inc. All rights reserved. 1 Defining Abuse Every service provider has

More information

Report on Spamvertising and Phishing using.hk Domain Names and McAfee Report. ccnso Meeting June 24, 2008

Report on Spamvertising and Phishing using.hk Domain Names and McAfee Report. ccnso Meeting June 24, 2008 Report on Spamvertising and Phishing using.hk Domain Names and McAfee Report ccnso Meeting June 24, 2008 Agenda Introduction of HKIRC/HKDNR and.hk Domain Figure of Phishing and Spamvertising Common Patterns

More information

Searchable WHOIS Terms of Use

Searchable WHOIS Terms of Use Searchable WHOIS Terms of Use 1. Grant 1.1. You may use the Searchable WHOIS subject to these terms and conditions, including the Searchable WHOIS Acceptable Use Policy set out in Schedule 3. 2. Limits

More information

UC San Diego UC San Diego Electronic Theses and Dissertations

UC San Diego UC San Diego Electronic Theses and Dissertations UC San Diego UC San Diego Electronic Theses and Dissertations Title Understanding URL Abuse for Profit Permalink https://escholarship.org/uc/item/7nw0f6bf Author Chachra, Neha Publication Date 2015-01-01

More information

Fixing URL-based Redirect Errors for AWS Route 53 and S3

Fixing URL-based Redirect Errors for AWS Route 53 and S3 Fixing URL-based Redirect Errors for AWS Route 53 and S3 Many of the typical DNS providers offer what we call URL-based redirects. This is something where a 301 HTTP response is applied to the DNS query

More information

Evaluation of Spam Advertised Domains

Evaluation of Spam Advertised Domains Technische Universität Berlin Fakultät IV, Elektrotechnik und Informatik FG Intelligente Netze Evaluation of Spam Advertised Domains Student Project WS2011/2012 Report Written By Hannes Fiedler, Eric Klieme

More information

DNS Risk Framework Update

DNS Risk Framework Update Text Text 14 October 2014 DNS Risk Framework Update John Crain & Jacks Khawaja Chief SSR Officer; Enterprise Risk Director Agenda Text History Moving Forward Text History Defined Resiliency Model Text

More information

Whois Study Table Updated 18 February 2009

Whois Study Table Updated 18 February 2009 Whois Study Table Updated 18 February 2009 This table is based on the chart included in the WHOIS Hypothesis Report of 26 August 2008, amended to show related or overlapping studies clustered into letter

More information

Update on GNSOrequested. Studies. Liz Gasster Senior Policy Counselor ICANN. 14 March 2012

Update on GNSOrequested. Studies. Liz Gasster Senior Policy Counselor ICANN. 14 March 2012 Update on GNSOrequested WHOIS Studies Liz Gasster Senior Policy Counselor ICANN 14 March 2012 1 gtld WHOIS Studies - Goals WHOIS policy debated for many years GNSO Council decided in October 2007 that

More information

Security by Any Other Name:

Security by Any Other Name: Security by Any Other Name: On the Effectiveness of Provider Based Email Security Ian Foster, Jon Larson, Max Masich, Alex C. Snoeren, Stefan Savage, and Kirill Levchenko University of California, San

More information

Co-operation with Law Enforcement Agencies in South Africa. 19 September 2008

Co-operation with Law Enforcement Agencies in South Africa. 19 September 2008 Co-operation with Law Enforcement Agencies in South Africa 19 September 2008 Agenda About ISPA IMPACT Is cyber-terrorism real? Content and DNS People trafficking Training Is this a bad thing for ISPs?

More information

Distributed-Application Security

Distributed-Application Security Distributed-Application Security Spam Spams Spam referred to unsolicited bulk email Spam emails contain advertisement, viruses, malware Spams emails are used to gather information about the victim Harvesting

More information

LEA Workshop. Champika Wijayatunga & George Kuo, APNIC Wellington, New Zealand 09, May, 2013

LEA Workshop. Champika Wijayatunga & George Kuo, APNIC Wellington, New Zealand 09, May, 2013 LEA Workshop Champika Wijayatunga & George Kuo, APNIC Wellington, New Zealand 09, May, 2013 Agenda Introduction to APNIC Know about APNIC Internet Policy Development How the Internet Policies are developed

More information

PURL Campaign External Domain Quick Reference Guide

PURL Campaign External Domain Quick Reference Guide PURL Campaign External Domain Quick Reference Guide Boingnet PURL campaigns have support for two types of domains. 1. Vanity domains that are obtained directly through Boingnet s interface. These domains

More information

Intellectual Property Constituency (IPC)

Intellectual Property Constituency (IPC) Contractual Compliance Intellectual Property Constituency (IPC) Tuesday, 14 October 2014 Agenda Registrar Related Update since ICANN 50 Registry Related Update since ICANN 50 Audit Programs Update Questions

More information

ICANN Update: What Next for Trademark Owners? 22 nd Annual Fordham Int l IP Law & Policy Conference 25 April 2014

ICANN Update: What Next for Trademark Owners? 22 nd Annual Fordham Int l IP Law & Policy Conference 25 April 2014 ICANN Update: What Next for Trademark Owners? 22 nd Annual Fordham Int l IP Law & Policy Conference 25 April 2014 Myths, Misconceptions & Misinformation about the Recent US Government Announcement It s

More information

Briefing on Handling of Phishing Websites in November 2017

Briefing on Handling of Phishing Websites in November 2017 Briefing on Handling of Phishing Websites in Secretariat of APAC December 2017 Contents 1 Overview... 3 2 Analysis of Handling Types... 3 2.1 Sources of reports about phishing websites... 3 2.2 Distribution

More information

DNS. A Massively Distributed Database. Justin Scott December 12, 2018

DNS. A Massively Distributed Database. Justin Scott December 12, 2018 DNS A Massively Distributed Database Justin Scott December 12, 2018 What is DNS? Translates Hostnames to IP Addresses What is DNS? Example: www.serverlogic.com 23.185.0.4 What is DNS? Example: www.serverlogic.com

More information

APNIC s role in stability and security. Adam Gosling Senior Policy Specialist, APNIC 4th APT Cybersecurity Forum, 3-5 December 2013

APNIC s role in stability and security. Adam Gosling Senior Policy Specialist, APNIC 4th APT Cybersecurity Forum, 3-5 December 2013 APNIC s role in stability and security Adam Gosling Senior Policy Specialist, APNIC 4th APT Cybersecurity Forum, 3-5 December 2013 Overview Introducing APNIC Working with LEAs The APNIC Whois Database

More information

Monitoring the Initial DNS Behavior of Malicious Domains

Monitoring the Initial DNS Behavior of Malicious Domains Monitoring the Initial DNS Behavior of Malicious Domains Shuang Hao Georgia Tech Atlanta, GA, USA shao@cc.gatech.edu Nick Feamster Georgia Tech Atlanta, GA, USA feamster@cc.gatech.edu Ramakant Pandrangi

More information

Implementing DNSSEC with DynDNS and GoDaddy

Implementing DNSSEC with DynDNS and GoDaddy Implementing DNSSEC with DynDNS and GoDaddy Lawrence E. Hughes Sixscape Communications 27 December 2017 DNSSEC is an IETF standard for adding security to the DNS system, by digitally signing every resource

More information

Privacy and Proxy Service Provider Accreditation. ICANN58 Working Meeting 11 March 2017

Privacy and Proxy Service Provider Accreditation. ICANN58 Working Meeting 11 March 2017 Privacy and Proxy Service Provider Accreditation ICANN58 Working Meeting 11 March 2017 Agenda 13:45-15:00 15:00-15:15 15:15-16:45 Timeline Check; Policy Document Update; Third- Party Requests Break PSWG

More information

The role of phone numbers in understanding cyber-crime

The role of phone numbers in understanding cyber-crime The role of phone numbers in understanding cyber-crime A. J. Isachenkova M. Balduzzi + A. Francillon D. Balzarotti Eurecom, Sophia Antipolis, France + Trend Micro Research, EMEA July 11, 2013 1/34 Introduction

More information

ICANN Contractual Compliance. IPC Mee(ng. Tuesday, 25 March 2014 #ICANN49

ICANN Contractual Compliance. IPC Mee(ng. Tuesday, 25 March 2014 #ICANN49 ICANN Contractual Compliance IPC Mee(ng Tuesday, 25 March 2014 1 Agenda! Compliance General Update! Q&A session! Contractual Compliance Update! Ø Global presence in Singapore and Turkey" Ø Completed 2013

More information

s and Anti-spam

s and Anti-spam E-mails and Anti-spam Standard authentication AUTH method As the spammers become increasing aggressive more and more legit emails get banned as spam. When you send e-mails from your webcrm system, we use

More information

Malware, , Database Security

Malware,  , Database Security Malware, E-mail, Database Security Malware A general term for all kinds of software with a malign purpose Viruses, Trojan horses, worms etc. Created on purpose Can Prevent correct use of resources (DoS)

More information

Case studies in global criminal attacks: McColo & CheckFreea

Case studies in global criminal attacks: McColo & CheckFreea Case studies in global criminal attacks: McColo & CheckFreea Rod Rasmussen, President & CTO Internet Identity, APWG Industry Liaison E Crime and Abuse of the DNS Forum: Session 2. Criminal Attacks & Abuse

More information

ECE 435 Network Engineering Lecture 7

ECE 435 Network Engineering Lecture 7 ECE 435 Network Engineering Lecture 7 Vince Weaver http://web.eece.maine.edu/~vweaver vincent.weaver@maine.edu 25 September 2018 HW#3 was Posted Announcements 1 HW#2 Review C code will be discussed next

More information

Summary. January 31, Jo Lim. Chief Operations and Policy Officer. Dear Jo,

Summary. January 31, Jo Lim. Chief Operations and Policy Officer. Dear Jo, January 31, 2014 Jo Lim Chief Operations and Policy Officer Dear Jo, Thanks for the opportunity to make a submission to the auda Whois Issues Paper 2013. The views expressed in this submission are held

More information

ICANN Contractual Compliance. ALAC Mee(ng. Sunday, 23 March 2014 #ICANN49

ICANN Contractual Compliance. ALAC Mee(ng. Sunday, 23 March 2014 #ICANN49 ICANN Contractual Compliance ALAC Mee(ng Sunday, 23 March 2014 1 Agenda! Compliance General Update! Clarification of ALAC statement! Q&A session! Contractual Compliance Update! Ø Global presence in Singapore"

More information

ACCEPTABLE USE AND TAKEDOWN POLICY. Version 1.0

ACCEPTABLE USE AND TAKEDOWN POLICY. Version 1.0 ACCEPTABLE USE AND TAKEDOWN POLICY Version 1.0 ("Acceptable Use Policy") What is in the Acceptable Use Policy? As the owner of a domain name, you are required to act responsibly in your use of that domain

More information

UC San Diego UC San Diego Electronic Theses and Dissertations

UC San Diego UC San Diego Electronic Theses and Dissertations UC San Diego UC San Diego Electronic Theses and Dissertations Title An Exploration of the Identifying Characteristics of Spam Campaign Address Lists Permalink https://escholarship.org/uc/item/05z017qc

More information

Inter-registrar Domain Name Transfers Process Description & Overview - Proposal Draft -

Inter-registrar Domain Name Transfers Process Description & Overview - Proposal Draft - Inter-registrar Domain Name Transfers Process Description & Overview - Proposal Draft - V1r0d0 08-20-2001 prepared by Table of Contents Table of Contents 2 Summary 3 Principles 4 Gaining Registrar Processes

More information

Botnets: major players in the shadows. Author Sébastien GOUTAL Chief Science Officer

Botnets: major players in the shadows. Author Sébastien GOUTAL Chief Science Officer Botnets: major players in the shadows Author Sébastien GOUTAL Chief Science Officer Table of contents Introduction... 3 Birth of a botnet... 4 Life of a botnet... 5 Death of a botnet... 8 Introduction

More information

Identifier Technology Health Indicators (ITHI) Alain Durand, Christian Huitema 13 March 2018

Identifier Technology Health Indicators (ITHI) Alain Durand, Christian Huitema 13 March 2018 Identifier Technology Health Indicators (ITHI) Alain Durand, Christian Huitema 13 March 2018 ITHI Principles of Operation Technical focus Problem areas à Metrics à Measurement Current value and trend over

More information

Network Security Detection With Data Analytics (PREDATOR)

Network Security Detection With Data Analytics (PREDATOR) CIS-601 Graduate Seminar Network Security Detection With Data Analytics (PREDATOR) PRESENTED BY :RAJAN SHARMA CSU ID: 2659829 GUIDED BY : Dr. SUNNIE CHUNG Overview Introduction Feature Extraction and Machine

More information

Anti-Phishing Working Group

Anti-Phishing Working Group Anti-Phishing Working Group www.antiphishing.org DNS Policy Sub-Committee Overview Rod Rasmussen Rod.Rasmussen@InternetIdentity.com Anti-Phishing Working Group Launched in 2003 2600+ members 1600+ companies

More information

Luminous: Bringing Big(ger) Data to the Fight

Luminous: Bringing Big(ger) Data to the Fight Luminous: Bringing Big(ger) Data to the Fight Norm Ritchie Drew Bagley ICANN Helsinki June, 2016 Secure Domain Foundation Non-profit Founded in 2014 Proactive mitigation of malicious domains used for cybercrime

More information

Onboard with GoDaddy Questionnaire

Onboard with GoDaddy Questionnaire Onboard with GoDaddy Questionnaire Please answer the questions below for each of your TLDs, choosing from the response options noted to the right of the question and adding additional detail where reques

More information

BEST PRACTICES FOR IMPROVING EXTERNAL DNS RESILIENCY AND PERFORMANCE

BEST PRACTICES FOR IMPROVING EXTERNAL DNS RESILIENCY AND PERFORMANCE BEST PRACTICES FOR IMPROVING EXTERNAL DNS RESILIENCY AND PERFORMANCE 12-07-2016 BEST PRACTICES FOR IMPROVING EXTERNAL DNS RESILIENCY AND PERFORMANCE Your external DNS is a mission critical business resource.

More information

TRANSMITTED VIA ELECTRONIC MAIL, FACSIMILE, AND COURIER RE: NOTICE OF BREACH OF REGISTRAR ACCREDITATION AGREEMENT

TRANSMITTED VIA ELECTRONIC MAIL, FACSIMILE, AND COURIER RE: NOTICE OF BREACH OF REGISTRAR ACCREDITATION AGREEMENT 12 October 2016 TRANSMITTED VIA ELECTRONIC MAIL, FACSIMILE, AND COURIER Stefan Hansmann (IANA #953) 18 Mai Yao Road Office 541 Building 7, Xian Zong Lin Yuan Nanjing Jiangsu 210000 China Email: stefan@domainerschoice.com

More information

Optimal Gateway Selection for Pulse Connect Secure with Pulse Secure Virtual Traffic Manager

Optimal Gateway Selection for Pulse Connect Secure with Pulse Secure Virtual Traffic Manager Optimal Gateway Selection for Pulse Connect Secure with Pulse Secure Virtual Traffic Manager Deployment Guide Published 14 December, 2017 Document Version 1.0 Optimal Gateway Selection for Pulse Connect

More information

Ethical Hacking and. Version 6. Spamming

Ethical Hacking and. Version 6. Spamming Ethical Hacking and Countermeasures Version 6 Module XL Spamming News Source: http://www.nzherald.co.nz/ Module Objective This module will familiarize you with: Spamming Techniques used by Spammers How

More information

HOW WHOIS DATA ENSURES A SAFE AND SECURE INTERNET

HOW WHOIS DATA ENSURES A SAFE AND SECURE INTERNET HOW WHOIS DATA ENSURES A SAFE AND SECURE INTERNET A DETAILED LOOK AT HOW PUBLIC DOMAIN OWNERSHIP DATA DRIVES THREE ESSENTIAL CYBERSECURITY WORKFLOWS INTRODUCTION Each year, millions of individuals, businesses,

More information

DNS. Introduction To. everything you never wanted to know about IP directory services

DNS. Introduction To. everything you never wanted to know about IP directory services Introduction To DNS everything you never wanted to know about IP directory services Linux Users Victoria, April 3 rd 2007 what is the domain name system anyway? it's like a phone book...kinda DNS is (1)

More information

A blind spot in your daily malware distribution feed.

A blind spot in your daily malware distribution feed. A blind spot in your daily malware distribution feed. By Andriy Brukhovetskyy aka @d00m3dr4v3n 1 WhoAmI? Andriy Brukhovetskyy Senior Security Researcher at FireEye isight Intelligence Member of CW, II,

More information

THIS AGREEMENT HAS A PROVISION FOR ARBITRATION OF DISPUTES BETWEEN THE PARTIES.

THIS AGREEMENT HAS A PROVISION FOR ARBITRATION OF DISPUTES BETWEEN THE PARTIES. THIS AGREEMENT HAS A PROVISION FOR ARBITRATION OF DISPUTES BETWEEN THE PARTIES. This Registration Agreement ("Agreement") sets forth the terms and conditions of your use of domain name registration and

More information

Contractual Compliance Update ICANN 52 February 2015

Contractual Compliance Update ICANN 52 February 2015 Contractual Compliance Update ICANN 52 February 2015 Agenda Update Since ICANN 51 Lessons Learned Summary Questions and Answers 3 General Update since ICANN 51 Year-three Audit Program launched in October

More information

RDAP: A Primer on the Registration Data Access Protocol

RDAP: A Primer on the Registration Data Access Protocol RDAP: A Primer on the Registration Data Access Protocol Andy Newton, Chief Engineer, ARIN Registration Operations Workshop IETF 93 Prague, CZ 19 July 2015 Background WHOIS (Port 43) Old, very old Lot s

More information

Registrar Stakeholder Mee2ng Tuesday, 25 March 2014

Registrar Stakeholder Mee2ng Tuesday, 25 March 2014 ICANN Contractual Compliance Registrar Stakeholder Mee2ng Tuesday, 25 March 2014 1 Agenda! + General Update + 2013 RAA Discussion and Clarification + Question Answer Session 2 Contractual Compliance Update!

More information

Domain Name Service. DNS Overview. October 2009 Computer Networking 1

Domain Name Service. DNS Overview. October 2009 Computer Networking 1 Domain Name Service DNS Overview October 2009 Computer Networking 1 Why DNS? Addresses are used to locate objects (contain routing information) Names are easier to remember and use than numbers DNS provides

More information

DOMAIN NAMES. Manage Domains

DOMAIN NAMES. Manage Domains DOMAIN NAMES Manage Domains The Manage Domains page displays a list of your registered domain names. All domain purchases are automatically renewed at the end of their registration period, unless you instruct

More information

Summary of Public Suggestions on Further Studies of WHOIS including the GAC recommendations of 16 April Updated 10 May 2008

Summary of Public Suggestions on Further Studies of WHOIS including the GAC recommendations of 16 April Updated 10 May 2008 Summary of Public Suggestions on Further Studies of WHOIS including the GAC recommendations of 16 April Updated 10 May 2008 Study submissions have been divided into eight recommended areas, as follows:

More information

Knock It Off: Profiling the Online Storefronts of Counterfeit Merchandise

Knock It Off: Profiling the Online Storefronts of Counterfeit Merchandise Knock It Off: Profiling the Online Storefronts of Counterfeit Merchandise Matthew F. Der, Lawrence K. Saul, Stefan Savage, Geoffrey M. Voelker Department of Computer Science and Engineering University

More information

EARLY DETECTION OF SPAM-RELATED ACTIVITY

EARLY DETECTION OF SPAM-RELATED ACTIVITY EARLY DETECTION OF SPAM-RELATED ACTIVITY A Thesis Presented to The Academic Faculty by Shuang Hao In Partial Fulfillment of the Requirements for the Degree Doctor of Philosophy in the School of Computer

More information

Gross Profit by Prescription Report

Gross Profit by Prescription Report ................................................................................................... Gross Profit by Prescription Report Pharmacy Technology Solutions May, 2013 Reports: Gross Profit by

More information

Countermeasures against Mobile spam

Countermeasures against Mobile spam 8 July, 2004 Countermeasures against Mobile spam ~ Legislation and Self-regulation ~ Toshihiko SHIBUYA, Deputy Director Telecommunications Consumer Policy Division, Telecommunications Bureau, Ministry

More information

Advanced Filtering. Tobias Eggendorfer

Advanced Filtering. Tobias Eggendorfer Advanced Filtering Advanced Filtering Fails Too Overview Not so advanced Filtering Advanced Filtering Prevention Identification 2 Classic Filtering 3 Classic Filtering Black- & Whitelists 3 Classic Filtering

More information

Common problems in production Wireless Networks. Jigsaw: Solving the Puzzle of Enterprise Analysis. Sounds Familiar?

Common problems in production Wireless Networks. Jigsaw: Solving the Puzzle of Enterprise Analysis. Sounds Familiar? Jigsaw: Solving the Puzzle of Enterprise 802.11 Analysis Written by Yu-Chung Cheng, John Bellardo, Peter Benko, Alex C. Snoeren, Geoffrey M. Voelker and Stefan Savage Analysis by Carlos Troncoso CS388

More information

The importance of Whois data bases for spam enforcement

The importance of Whois data bases for spam enforcement The importance of Whois data bases for spam enforcement Chris Fonteijn Chairman OPTA Joint meeting GAC/GNSO Marrakech, Monday 26 June 2006 1 Introduction My name is Chris Fonteijn and I am chairman of

More information

DMP 128 Plus C V DMP 128 Plus C V AT. ShoreTel Configuration Guide REVISION: DATE: DECEMBER 6 TH 2018

DMP 128 Plus C V DMP 128 Plus C V AT. ShoreTel Configuration Guide REVISION: DATE: DECEMBER 6 TH 2018 DMP 128 Plus C V DMP 128 Plus C V AT ShoreTel Configuration Guide REVISION: 1.1.1 DATE: DECEMBER 6 TH 2018 Revision Log Date Version Notes Sep. 21 st 2018 1.0 First Release: Applies to Firmware 1.01.0010

More information

Contractual Compliance. Text. IPC Meeting. Tuesday, 24 June 2014 #ICANN50

Contractual Compliance. Text. IPC Meeting. Tuesday, 24 June 2014 #ICANN50 Contractual Compliance IPC Meeting Tuesday, 24 June 2014 Contractual Compliance Update Since ICANN 49 Ongoing efforts and alignment on 2013 RAA and the new Registry Agreement Launched a quality process

More information

Tripwire Inferring Internet Site Compromise

Tripwire Inferring Internet Site Compromise Tripwire Inferring Internet Site Compromise Joe DeBlasio Stefan Savage Geoffrey M. Voelker Alex C. Snoeren UC San Diego On account compromise Compromise of email/social network/etc is devastating Personal/professional

More information

Taster s Choice: A Comparative Analysis of Spam Feeds

Taster s Choice: A Comparative Analysis of Spam Feeds Taster s Choice: A Comparative Analysis of Spam Feeds Andreas Pitsillidis apitsill@cs.ucsd.edu Kirill Levchenko klevchen@cs.ucsd.edu Chris Kanich ckanich@cs.uic.edu Stefan Savage savage@cs.ucsd.edu Geoffrey

More information

WHOIS ACCURACY PROGRAM SPECIFICATION

WHOIS ACCURACY PROGRAM SPECIFICATION WHOIS ACCURACY PROGRAM SPECIFICATION Registrar shall implement and comply with the requirements set forth in this Specification, as well as any commercially practical updates to this Specification that

More information

SIP Compliance APPENDIX

SIP Compliance APPENDIX APPENDIX E This appendix describes Cisco SIP proxy server (Cisco SPS) compliance with the Internet Engineering Task Force (IETF) definition of Session Initiation Protocol (SIP) as described in the following

More information

PURL Campaign Vanity Domain Quick Reference Guide

PURL Campaign Vanity Domain Quick Reference Guide PURL Campaign Vanity Domain Quick Reference Guide Boingnet PURL campaigns have support for two types of domains. 1. Vanity domains that are obtained directly through Boingnet s interface. These domains

More information

CyRiE Cyber Risk Economics. Erin Kenneally, M.F.S., J.D. Program Manager Cyber Security Division

CyRiE Cyber Risk Economics. Erin Kenneally, M.F.S., J.D. Program Manager Cyber Security Division CyRiE Cyber Risk Economics Erin Kenneally, M.F.S., J.D. Program Manager Cyber Security Division CSD Mission & Strategy Develop and deliver new technologies, tools and techniques to defend and secure current

More information

.HEALTH REGISTRATION POLICY

.HEALTH REGISTRATION POLICY Effective Date: March 30, 2017.HEALTH REGISTRATION POLICY DotHealth, LLC, the Registry Operator for the.health top level domain (the TLD ), hereby adopts this Registration Policy as of the Effective Date

More information

Security & Stability Advisory Committee. Update of Activities

Security & Stability Advisory Committee. Update of Activities Security & Stability Advisory Committee Update of Activities 1 Topics 1. Overview of Activities -- Patrik Fältström, SSAC Chair 2. SAC054: SSAC Report on Domain Name Registration Data Model Jim Galvin,

More information

OnlineNIC PRIVACY Policy

OnlineNIC PRIVACY Policy OnlineNIC PRIVACY Policy ONLINENIC INC (ONLINENIC) TAKES YOUR PRIVACY SERIOUSLY. Our Privacy Policy is intended to describe to you how and what data we collect, and how and why we use your personal data.

More information

Attachment 3..Brand TLD Designation Application

Attachment 3..Brand TLD Designation Application Attachment 3.Brand TLD Designation Application Internet Corporation for Assigned Names and Numbers ( ICANN ) 12025 Waterfront Drive, Suite 300 Los Angeles, California 90094 Attention: New gtld Program

More information

Overview of SIP. Information About SIP. SIP Capabilities. This chapter provides an overview of the Session Initiation Protocol (SIP).

Overview of SIP. Information About SIP. SIP Capabilities. This chapter provides an overview of the Session Initiation Protocol (SIP). This chapter provides an overview of the Session Initiation Protocol (SIP). Information About SIP, page 1 How SIP Works, page 4 How SIP Works with a Proxy Server, page 5 How SIP Works with a Redirect Server,

More information

Sponsor s Monthly Report for.coop TLD

Sponsor s Monthly Report for.coop TLD Sponsor s Monthly Report for.coop TLD Reporting period: May 2011 In this report the terms dotcoop, Registry and Sponsor refer to DotCooperation LLC, the Sponsor of the dotcoop TLD. Table of Contents 1

More information

MCTS Guide to Microsoft Windows Server 2008 Network Infrastructure Configuration. Chapter 5 Introduction to DNS in Windows Server 2008

MCTS Guide to Microsoft Windows Server 2008 Network Infrastructure Configuration. Chapter 5 Introduction to DNS in Windows Server 2008 MCTS Guide to Microsoft Windows Server 2008 Network Infrastructure Configuration Chapter 5 Introduction to DNS in Windows Server 2008 Objectives Discuss the basics of the Domain Name System (DNS) and its

More information

Christmas Island Domain Administration Limited ( cxda)

Christmas Island Domain Administration Limited ( cxda) Christmas Island Domain Administration Limited ( cxda) HIGH RISK REGISTRATIONS IDENTIFICATION PROACTIVE ABUSE MITIGATION Tools provided by: Initial Try 2012 Mandatory manual domain activation with the

More information

Introduction. Prepared by: ICANN Org Published on: 12 January 2018

Introduction. Prepared by: ICANN Org Published on: 12 January 2018 Proposed Interim Models for Compliance with ICANN Agreements and Policies in Relation to the European Union s General Data Protection Regulation For Discussion Prepared by: ICANN Org Published on: 12 January

More information

REGISTRY POLICY STATEMENT ACCEPTABLE USE POLICY AND TERMS OF SERVICE

REGISTRY POLICY STATEMENT ACCEPTABLE USE POLICY AND TERMS OF SERVICE REGISTRY POLICY STATEMENT ACCEPTABLE USE POLICY AND TERMS OF SERVICE Rev: November 24, 2014 DEFINITIONS "Registered Name" means a domain name within the domain of the Uniregistry TLDs with which Uniregistry

More information

Attachment 3..Brand TLD Designation Application

Attachment 3..Brand TLD Designation Application Attachment 3.Brand TLD Designation Application Internet Corporation for Assigned Names and Numbers ( ICANN ) 12025 Waterfront Drive, Suite 300 Los Angeles, California 90094 Attention: New gtld Program

More information

RIPE Labs. Operators Tools, Ideas and Analysis. Mirjam Kühne, RIPE NCC. RIPE Network Coordination Centre. IETF 78 - Juy 2010.

RIPE Labs. Operators Tools, Ideas and Analysis. Mirjam Kühne, RIPE NCC. RIPE Network Coordination Centre. IETF 78 - Juy 2010. RIPE Labs Operators Tools, Ideas and Analysis, RIPE NCC 1 What is RIPE Labs? It is a web site, but more importantly: A platform and a tool for the community You can Test and evaluate new tools and prototypes

More information

UC San Diego UC San Diego Electronic Theses and Dissertations

UC San Diego UC San Diego Electronic Theses and Dissertations UC San Diego UC San Diego Electronic Theses and Dissertations Title A Comprehensive Approach to Undermining Search Result Poisoning Permalink https://escholarship.org/uc/item/9cn1867h Author Wang, David

More information

The state of in Mar4jn Grooten, Virus Bulle4n TROOPERS15, 19 March 2015

The state of  in Mar4jn Grooten, Virus Bulle4n TROOPERS15, 19 March 2015 The state of email in 2015 Mar4jn Grooten, Virus Bulle4n TROOPERS15, 19 March 2015 Me, myself and I Anna sends an email to Bob Hi, it s here bob@hismail.com. anna@hermail.com email for bob@hismail.com.

More information

Filtering 7 April 2014

Filtering 7 April 2014 Email Filtering 2014 Fortinet Inc. All rights reserved. The information contained herein is subject to change without notice. No part of this publication including text, examples, diagrams 1 or illustrations

More information

Intended status: Informational Expires: January 5, 2015 July 4, 2014

Intended status: Informational Expires: January 5, 2015 July 4, 2014 DNSOP Internet-Draft Intended status: Informational Expires: January 5, 2015 G. Deng N. Kong S. Shen CNNIC July 4, 2014 Approach on optimizing DNS authority server placement draft-deng-dns-authority-server-placement-00

More information