ICANNWatch
 
  Inside ICANNWatch  
Submit Story
Home
Lost Password
Preferences
Site Messages
Top 10 Lists
Latest Comments
Search by topic

Our Mission
ICANN for Beginners
About Us
How To Use This Site
ICANNWatch FAQ
Slash Tech Info
Link to Us
Write to Us

  Useful ICANN sites  
  • ICANN itself
  • Bret Fausett's ICANN Blog
  • Internet Governance Project
  • UN Working Group on Internet Governance
  • Karl Auerbach web site
  • Müller-Maguhn home
  • UDRPinfo.com;
  • UDRPlaw.net;
  • CircleID;
  • LatinoamerICANN Project
  • ICB Tollfree News

  •   At Large Membership and Civil Society Participation in ICANN  
  • icannatlarge.com;
  • Noncommercial Users Constituency of ICANN
  • NAIS Project
  • ICANN At Large Study Committee Final Report
  • ICANN (non)Members page
  • ICANN Membership Election site

  • ICANN-Related Reading
    Browse ICANNWatch by Subject

    Ted Byfied
    - ICANN: Defending Our Precious Bodily Fluids
    - Ushering in Banality
    - ICANN! No U CANN't!
    - roving_reporter
    - DNS: A Short History and a Short Future

    David Farber
    - Overcoming ICANN (PFIR statement)

    A. Michael Froomkin
    - When We Say US™, We Mean It!
    - ICANN 2.0: Meet The New Boss
    - Habermas@ discourse.net: Toward a Critical Theory of Cyberspace
    - ICANN and Anti-Trust (with Mark Lemley)
    - Wrong Turn in Cyberspace: Using ICANN to Route Around the APA & the Constitution (html)
    - Form and Substance in Cyberspace
    - ICANN's "Uniform Dispute Resolution Policy"-- Causes and (Partial) Cures

    Milton Mueller
    - Ruling the Root
    - Success by Default: A New Profile of Domain Name Trademark Disputes under ICANN's UDRP
    - Dancing the Quango: ICANN as International Regulatory Regime
    - Goverments and Country Names: ICANN's Transformation into an Intergovernmental Regime
    - Competing DNS Roots: Creative Destruction or Just Plain Destruction?
    - Rough Justice: A Statistical Assessment of the UDRP
    - ICANN and Internet Governance

    David Post
    - Governing Cyberspace, or Where is James Madison When We Need Him?
    - The 'Unsettled Paradox': The Internet, the State, and the Consent of the Governed

    Jonathan Weinberg
    - Sitefinder and Internet Governance
    - ICANN, Internet Stability, and New Top Level Domains
    - Geeks and Greeks
    - ICANN and the Problem of Legitimacy

    Highlights of the ICANNWatch Archive
    (June 1999 - March 2001)


     
    IP Numbers Recursive DNS service tries to block phishing hole
    posted by Mueller on Tuesday July 11 2006, @05:44AM

    fnord writes "Wired News reports on OpenDNS, a San Francisco based company using its own DNS servers to provide value added services including faster response times and typo-phishing. Some typos can be automatically corrected; others, if they can't be (re)solved, serve up alternative suggestions, including advertising. This allows their service to be offered free.

    While somewhat reminiscent of VeriSign's suspended SiteFinder service, OpenDNS is quick to point out that they are using recursive nameservers, not authoritative nameservers.



    You can give them a try by changing your nameservers to:

    208.67.222.222

    208.67.220.220

    Their site has substantial information on how to do this for the non-technical. There is no download/install required but perhaps they could offer one in the future a la new.net or various iDNS offerings for the terminally unclued. None of this appears to be new technology or techniques, the real test will be to see if they have the pipes and cache (and cash) to pull it off. -g"

     
      ICANNWatch Login  
    Nickname:

    Password:

    [ Don't have an account yet? Please create one. It's not required, but as a registered user you can customize the site, post comments with your name, and accumulate reputation points ("karma") that will make your comments more visible. ]

     
      Related Links  
    · VeriSign/NSI
    · New.net
    · fnord
    · reports
    · OpenDNS
    · SiteFinder
    · More IP Numbers stories
    · Also by Mueller
     
    This discussion has been archived. No new comments can be posted.
    Recursive DNS service tries to block phishing hole | Log in/Create an Account | Top | 1 comments | Search Discussion
    Click this button to post a comment to this story
    The options below will change how the comments display
    Threshold:
    Check box to change your default comment view
    The Fine Print: The following comments are owned by whoever posted them. We are not responsible for them in any way.
    more coverage
    by fnord ({groy2k} {at} {yahoo.com}) on Tuesday July 11 2006, @05:43PM (#16851)
    User #2810 Info
    CircleID has more coverage here [circleid.com] (incl. the never to be missed missives of John Berryhill) and here [circleid.com] (Paul Mockapetris, does it get any better than that?). I still think it's much ado about nothing until they pull it off. I'd run out of fingers naming services that were close, including the internet childsafe blackhole crowd which have mostly crashed and burned. NTL, kudos to Ali for phrasing these links for maximum Google points. :) -g
    [ Reply to This | Parent ]


    Search ICANNWatch.org:


    Privacy Policy: We will not knowingly give out your personal data -- other than identifying your postings in the way you direct by setting your configuration options -- without a court order. All logos and trademarks in this site are property of their respective owner. The comments are property of their posters, all the rest © 2001, 2002, 2003, 2004, 2005, 2006, 2007, 2008 by ICANNWatch.Org. This web site was made with Slashcode, a web portal system written in perl. Slashcode is Free Software released under the GNU/GPL license.
    You can syndicate our headlines in .rdf, .rss, or .xml. Domain registration services donated by DomainRegistry.com