Resolving .bit domains to dynamic IPs

Post Reply
virtual_master
Posts: 541
Joined: Mon May 20, 2013 12:03 pm
Contact:

Resolving .bit domains to dynamic IPs

Post by virtual_master »

Resolving .bit domains to dynamic IPs
What do you think about the idea ? Would it be useful ?
Something like noip for ICANN domains:
https://www.noip.com/

How could work ?
You start the dynamic update client on top of namecoind on your PC with some coins in the wallet. (it must be started with domain update permission)
When your PC changes to a new IP from the ISP, the client will immediately observe it and will update your domain entry to the new IP.
So you can have your website with a working .bit domain hosted on your own PC even if you don't have a static IP.
http://namecoinia.org/
Calendars for free to print: 2014 Calendar in JPG | 2014 Calendar in PDF Protect the Environment with Namecoin: 2014 Calendar in JPG | 2014 Calendar in PDF
BTC: 15KXVQv7UGtUoTe5VNWXT1bMz46MXuePba | NMC: NABFA31b3x7CvhKMxcipUqA3TnKsNfCC7S

phelix
Posts: 1634
Joined: Thu Aug 18, 2011 6:59 am

Re: Resolving .bit domains to dynamic IPs

Post by phelix »

I think domob did this already. But it leads to a lot of name_updates.
nx.bit - some namecoin stats
nf.bit - shortcut to this forum

virtual_master
Posts: 541
Joined: Mon May 20, 2013 12:03 pm
Contact:

Re: Resolving .bit domains to dynamic IPs

Post by virtual_master »

phelix wrote:But it leads to a lot of name_updates.
This is true.
----------
Let us see another combination.
Let us say .bit resolving in frames is solved. (by Jeremy)
http://forum.namecoin.info/viewtopic.php?f=5&t=1305
So .bit domains can be redirected to any subdomain or subsubdirectory.
The watching part of the client(or script) could be modified that the update will be triggered by another event not the IP change.
(for ex after a time or if the actual resolving is not available)
The new entry could be fetched from a stored list in the client or script.
This could be a very strong feature may be even stronger then redirecting to .onion sites to avoid censorship.
When the .bit site with a strong alternate political opinion is switched off, the script which is checking the availability in given intervals, will switch the .bit domain to the next hosting address(IP or frame address or even combined).
http://namecoinia.org/
Calendars for free to print: 2014 Calendar in JPG | 2014 Calendar in PDF Protect the Environment with Namecoin: 2014 Calendar in JPG | 2014 Calendar in PDF
BTC: 15KXVQv7UGtUoTe5VNWXT1bMz46MXuePba | NMC: NABFA31b3x7CvhKMxcipUqA3TnKsNfCC7S

domob
Posts: 1127
Joined: Mon Jun 24, 2013 11:27 am
Contact:

Re: Resolving .bit domains to dynamic IPs

Post by domob »

phelix wrote:I think domob did this already. But it leads to a lot of name_updates.
No, I did not. But I think biolizard89 did.
BTC: 1domobKsPZ5cWk2kXssD8p8ES1qffGUCm | NMC: NCdomobcmcmVdxC5yxMitojQ4tvAtv99pY
BM-GtQnWM3vcdorfqpKXsmfHQ4rVYPG5pKS
Use your Namecoin identity as OpenID: https://nameid.org/

pitbull
Posts: 24
Joined: Wed Oct 23, 2013 4:52 pm
os: linux

Re: Resolving .bit domains to dynamic IPs

Post by pitbull »


virtual_master
Posts: 541
Joined: Mon May 20, 2013 12:03 pm
Contact:

Re: Resolving .bit domains to dynamic IPs

Post by virtual_master »

Thanks for the link.
Did anybody tried it.
Perl is very compact so it seems to me the script very big with 150kB even if ICANN domains are also supported.
Hmmm.
Maybe it would be better to write something Namecoin specific than to configure the script.
http://namecoinia.org/
Calendars for free to print: 2014 Calendar in JPG | 2014 Calendar in PDF Protect the Environment with Namecoin: 2014 Calendar in JPG | 2014 Calendar in PDF
BTC: 15KXVQv7UGtUoTe5VNWXT1bMz46MXuePba | NMC: NABFA31b3x7CvhKMxcipUqA3TnKsNfCC7S

biolizard89
Posts: 2001
Joined: Tue Jun 05, 2012 6:25 am
os: linux

Re: Resolving .bit domains to dynamic IPs

Post by biolizard89 »

I made my own: https://github.com/JeremyRand/DyName

I don't know if the project pitbull provided is good.
Jeremy Rand, Lead Namecoin Application Engineer
NameID: id/jeremy
DyName: Dynamic DNS update client for .bit domains.

Donations: BTC 1EcUWRa9H6ZuWPkF3BDj6k4k1vCgv41ab8 ; NMC NFqbaS7ReiQ9MBmsowwcDSmp4iDznjmEh5

virtual_master
Posts: 541
Joined: Mon May 20, 2013 12:03 pm
Contact:

Re: Resolving .bit domains to dynamic IPs

Post by virtual_master »

Millions of dynamic DNS users suffer after Microsoft seizes No-IP domains
http://arstechnica.com/security/2014/06 ... p-domains/
http://namecoinia.org/
Calendars for free to print: 2014 Calendar in JPG | 2014 Calendar in PDF Protect the Environment with Namecoin: 2014 Calendar in JPG | 2014 Calendar in PDF
BTC: 15KXVQv7UGtUoTe5VNWXT1bMz46MXuePba | NMC: NABFA31b3x7CvhKMxcipUqA3TnKsNfCC7S

virtual_master
Posts: 541
Joined: Mon May 20, 2013 12:03 pm
Contact:

Re: Resolving .bit domains to dynamic IPs

Post by virtual_master »

This decision of the court seems to be very unusual and I am asking if it could have further juristic consequences for the domain control and internet freedom.
That governmental agencies seize a domain was at least known even if not accepted by all in every situation.
Private entities could take over others domains until now only in some cases if it was in violation of their registered trademark, what definitely is not the case here.
I don't want to put in question the efforts to stop malvare spreading but I cannot understand the logic of the decision.
If Microsoft Windows was misused for botnets controlled with NO-IP domains then it can be seen also that NO-IP was misused with Microsoft Windows which could have been justified NO-IP to seize Microsoft with the same logic.
NO-IPs official statement:
https://www.noip.com/blog/2014/06/30/ip ... -takedown/
No-IP’s Formal Statement on Microsoft Takedown

June 30, 2014·
by Natalie Goguen·
469 Comments·
374315 Views

We want to update all our loyal customers about the service outages that many of you are experiencing today. It is not a technical issue. This morning, Microsoft served a federal court order and seized 22 of our most commonly used domains because they claimed that some of the subdomains have been abused by creators of malware. We were very surprised by this. We have a long history of proactively working with other companies when cases of alleged malicious activity have been reported to us. Unfortunately, Microsoft never contacted us or asked us to block any subdomains, even though we have an open line of communication with Microsoft corporate executives.

We have been in contact with Microsoft today. They claim that their intent is to only filter out the known bad hostnames in each seized domain, while continuing to allow the good hostnames to resolve. However, this is not happening. Apparently, the Microsoft infrastructure is not able to handle the billions of queries from our customers. Millions of innocent users are experiencing outages to their services because of Microsoft’s attempt to remediate hostnames associated with a few bad actors.

Had Microsoft contacted us, we could and would have taken immediate action. Microsoft now claims that it just wants to get us to clean up our act, but its draconian actions have affected millions of innocent Internet users.

Vitalwerks and No­-IP have a very strict abuse policy. Our abuse team is constantly working to keep the No-­IP system domains free of spam and malicious activity. We use sophisticated filters and we scan our network daily for signs of malicious activity. Even with such precautions, our free dynamic DNS service does occasionally fall prey to cyber scammers, spammers, and malware distributors. But this heavy-handed action by Microsoft benefits no one. We will do our best to resolve this problem quickly.

About No­-IP
For over 14 years, No­-IP has been offering the best and most affordable Dynamic and Managed DNS solutions. Our robust Anycast Network with points of presence in 18 different world­class facilities across the globe guarantees our 100% Uptime, because let’s face it, there are no upsides to downtime. No­IP is the preferred choice for users on the Internet for dynamic DNS compared to smaller, less reliable alternatives. Our DNS Experts will ensure that your website is fast, reliable and always available.

Contact
Natalie Goguen
Marketing Manager
5905 South Virginia Street, Suite 200
Reno, NV 89502
press@no-ip.com
Ofiicial statement of Microsoft:
http://blogs.technet.com/b/microsoft_bl ... ption.aspx
The Official Microsoft Blog
Microsoft takes on global cybercrime epidemic in tenth malware disruption
30 Jun 2014 1:23 PM

The following post is from Richard Domingues Boscovich, Assistant General Counsel, Microsoft Digital Crimes Unit.

Playing offense against cybercriminals is what drives me and everyone here at the Microsoft Digital Crimes Unit. Today, Microsoft has upped the ante against global cybercrime, taking legal action to clean up malware and help ensure customers stay safer online. In a civil case filed on June 19, Microsoft named two foreign nationals, Mohamed Benabdellah and Naser Al Mutairi, and a U.S. company, Vitalwerks Internet Solutions, LLC (doing business as No-IP.com), for their roles in creating, controlling, and assisting in infecting millions of computers with malicious software—harming Microsoft, its customers and the public at large.

We’re taking No-IP to task as the owner of infrastructure frequently exploited by cybercriminals to infect innocent victims with the Bladabindi (NJrat) and Jenxcus (NJw0rm) family of malware. In the past, we’ve predominately seen botnets originating in Eastern Europe; however, the authors, owners and distributors of this malware are Kuwaiti and Algerian nationals. The social media-savvy cybercriminals have promoted their wares across the Internet, offering step-by-step instructions to completely control millions of unsuspecting victims’ computers to conduct illicit crimes—demonstrating that cybercrime is indeed a global epidemic.

Free Dynamic DNS is an easy target for cybercriminals

Dynamic Domain Name Service (DNS) is essentially a method of automatically updating a listing in the Internet’s address book, and is a vital part of the Internet. However, if not properly managed, a free Dynamic DNS service like No-IP can hold top-rank among abused domains. Of the 10 global malware disruptions in which we’ve been involved, this action has the potential to be the largest in terms of infection cleanup. Our research revealed that out of all Dynamic DNS providers, No-IP domains are used 93 percent of the time for Bladabindi-Jenxcus infections, which are the most prevalent among the 245 different types of malware currently exploiting No-IP domains. Microsoft has seen more than 7.4 million Bladabindi-Jenxcus detections over the past 12 months, which doesn’t account for detections by other anti-virus providers. Despite numerous reports by the security community on No-IP domain abuse, the company has not taken sufficient steps to correct, remedy, prevent or control the abuse or help keep its domains safe from malicious activity.

For a look at how cybercriminals leverage services like No-IP, and advice for customers to help ensure a safer online experience, please see the graphic below.

Microsoft legal and technical actions

On June 19, Microsoft filed for an ex parte temporary restraining order (TRO) from the U.S. District Court for Nevada against No-IP. On June 26, the court granted our request and made Microsoft the DNS authority for the company’s 23 free No-IP domains, allowing us to identify and route all known bad traffic to the Microsoft sinkhole and classify the identified threats. The new threat information will be added to Microsoft’s Cyber Threat Intelligence Program (CTIP) and provided to Internet Service Providers (ISPs) and global Computer Emergency Response Teams (CERTs) to help repair the damage caused by Bladabindi-Jenxcus and other types of malware. The Microsoft Digital Crimes Unit worked closely with Microsoft’s Malware Protection Center to identify, reverse engineer and develop a remedy for the threat to clean infected computers. We also worked with A10 Networks, leveraging Microsoft Azure, to configure a sophisticated system to manage the high volume of computer connections generated by botnets such as Bladabindi-Jenxcus.

As malware authors continue to pollute the Internet, domain owners must act responsibly by monitoring for and defending against cybercrime on their infrastructure. If free Dynamic DNS providers like No-IP exercise care and follow industry best practices, it will be more difficult for cybercriminals to operate anonymously and harder to victimize people online. Meanwhile, we will continue to take proactive measures to help protect our customers and hold malicious actors accountable for their actions.

This is the third malware disruption by Microsoft since the November unveiling of the Microsoft Cybercrime Center—a center of excellence for advancing the global fight against cybercrime. This case and operation are ongoing, and we will continue to provide updates as they become available. To stay up to date on the latest developments on the fight against cybercrime, follow the Microsoft Digital Crimes Unit on Facebook and Twitter. Microsoft provides free tools and information to help customers clean and regain control of their computers at http://www.microsoft.com/security.
http://namecoinia.org/
Calendars for free to print: 2014 Calendar in JPG | 2014 Calendar in PDF Protect the Environment with Namecoin: 2014 Calendar in JPG | 2014 Calendar in PDF
BTC: 15KXVQv7UGtUoTe5VNWXT1bMz46MXuePba | NMC: NABFA31b3x7CvhKMxcipUqA3TnKsNfCC7S

Post Reply