Nsauditor Network Security Auditor - Advanced All-In-One Network Tools Suite!
  Recommended Product
Network Security Audit Software
Network Security Audit Software and Computer Security Tools
Download Learn More
Nsauditor Screencast
 
  Network Security Software
Network Bandwidth Monitor Network Bandwidth Monitor
NBMonitor tracks Internet bandwidth usage (upload and downloads) and shows process names initiated network connections...
Network Hardware Inventory Software Network Hardware Inventory Software
Nsasoft Hardware Software Inventory is a powerful network inventory software for home, office and enterprise networks...
BlueAuditor Monitors Mobile Devices in Wireless Network BlueAuditor Monitors Mobile Devices in Wireless Network
BlueAuditor is a wireless personal area network auditor and easy-to-use program for detecting and monitoring mobile devices in a wireless network...
Network Access Monitoring Network Access Monitoring
ShareAlarmPro allows easily perform network shares and folder monitoring, block unwanted users attempting to access secured shares...
Network Shares Monitoring Network Share Watcher
Monitors network folders permissions and identify shares which are violating company data access policy...
NetworkSleuth Network File Search Utili NetworkSleuth Network File Search Utiliy
NetworkSleuth is a network file searching utility, that allows you to quickly locate files across a network....
Product Key Finder Product Key Finder
Product Key Explorer enables you to quickly recover over 3000 popular software product keys from network computers...
Backup Key Recovery Crashed Drive Keys Recovery Backup Key Recovery Crashed Drive Keys Recovery
Backup Key Recovery retrieves product keys for Windows, MS Office, SQL Server, Adobe products and more than 2500 popular software products...
 
 

Network Security News

Chinese operators hope to standardize a segmented Internet

June 18 , 2012 | ITNews.com

A technology draft written by employees at China Mobile and China Telecom and submitted to the Internet Engineering Task Force describes how the Internet could be split into several parts using the Domain Name System and in the process give countries more control over their own segment of the network.

The DNS is one of the key building blocks of the Internet. Its most important task is translating IP (Internet Protocol) addresses to host names, which is done by a distributed system based on one unique root that is used all over the world.

The technology is developed by the IETF, on whose website the Chinese "DNS Extension for Autonomous Internet" draft is available for viewing.

Today, China blocks Internet access to some foreign websites. The goal outlined by the new document is to make it easier and cheaper for countries to create independent root DNS servers and realize Internet autonomy. Today, that is both costly and technically difficult, according to the draft.

"When you read the document it very much comes across as a way to severely segment the Internet," said Patrik Wallström, CEO at OpenDNSSEC AB, a not-for-profit company with the mission to facilitate the deployment of DNSSEC, which is used to secure DNS.

If the draft is adopted it would give, for example, China full control of content on the Internet for users in the country as well as how it can be accessed and by whom, Wallström said.

The reason for adopting the draft into a standard architecture would not be just for control, according to the authors. The current central architecture of DNS can't keep up with the fast development of Internet, they say.

That argument doesn't ring true, according to Jakob Schlyter, a DNS expert at Swedish consultancy Kirei.

"When you say something like that you have to back it up with some facts, which I don't think they have ... the DNS root has an extreme overcapacity," said Schlyter.

However, the chances of the draft being adopted is very remote, according to both Wallström and Schlyter.

Anyone can individually submit an Internet draft to the IETF. But since the intended goal with the Chinese document is standardization, it first has to be picked up by one of the IETF's working groups, and that isn't going to happen, Wallström said.

"It is a controversial subject, and the IETF works on standards that, in principle, are for the global Internet," said Wallström.

The idea of moving away from a central DNS root also goes against the IAB's (Internet Architecture Board's) technical comment from 2000, detailing the need for a unique DNS root to ensure the future of the Internet, according to Wallström. The comment came after several alternative roots came into existence during the nineties, he said.

"The Chinese draft would be a return to that," said Wallström.

Schlyter is equally convinced that nothing will become of the draft.

"There is an extremely small risk of it going anywhere. I say risk because I am proponent of a common namespace, and all that comes with that," said Schlyter.

Because of the minuscule chance of the draft ever becoming a standard, the underlying reason for publishing it may be something altogether different, according to Wallström.

"This is just me speculating, but with the arrival new generic top-level domains (gTLDs) a document like this one can be published to put more pressure on ICANN with the aim of maybe even splitting the organization into different parts where China has more power," Wallström said.

Today, ICANN (Internet Corporation for Assigned Names and Numbers), which is also a big proponent of a unique root, coordinates the DNS as well as a whole host of other Internet-related components. These were originally performed under a U.S. government contract.

View more news...

 
  Most Popular Articles
 
 
  Email Subscriptions
Enter Your Email to be Notified of Software Updates:

 
 
  Popular Searches
network security magazine network security auditor network security news network security software corporate network security network security systems home network security product key finder password recovery software Network Bandwidth Monitor Network Access Monitoring data access policy monitoring remote shutdown Network File Search key recovery Network Monitoring Computer Security Ethical Hacking Network Security Network Inventory Software Information Security
 
 
  Partner Sites
Network Security Auditor
Nsauditor is a complete networking utilities package that includes more than 45 network tools and utilities for network auditing, scanning,network connections monitoring and more. For more information, please visit:
www.nsauditor.com


Password Recovery Software
SpotAuditor is All-in-one password recovery program that offers administrators and users a comprehensive solution for recovering passwords and other critical business information saved in users' computers. For more information, please visit:
www.password-recovery-software.com

Product Key Explorer
Product Key Explorer quickly recovers and displays product key, including Windows 7 keys, Windows Vista key, Windows XP product key, Microsoft Office 7 product key, MS office 2010 key, Adobe Photoshop, Adobe CS5, CS4, CS3, SQL Server, Electronic Arts games and more than 3000 popular software products:
www.product-key-explorer.com/