Feeds

All your Web typos are belong to us

Verisign wildcard changes spark fury

  • alert
  • submit to reddit

Choosing a cloud hosting partner with confidence

Updated Network administrators are fuming about changes made by domain registrar Verisign to the DNS system yesterday that they say violate longstanding Internet standards.

Verisign yesterday added wildcard DNS records to all .com and .net domains - redirecting surfers who get lost on the Net to a search page, called Site Finder, run by the company. Those who type in non-existent addresses will also be served up Site Finder, instead of an error message.

There's widespread concern the alterations will frustrate commonly used anti-spam techniques. Mail packages often check to see whether the domain an email is coming from is valid but with the changes all domains have suddenly become valid, frustrating the technique.

The radical, and largely unheralded, changes were made yesterday and followed up by a post by Verisign to the NANOG mailing list. This did little beyond stating that Verisign has added a "wildcard A record to the .com and .net zones" and pointing users to a white paper that Verisign has prepared.

So, Verisign has turned domain name typos into an advertising opportunity. Critics believe this is an abuse of Verisign's role, via acquired company Network Solutions, in administering the .com and .net registry DNS servers.

And then there are the practical issues: sysadmins are fuming at the knock-on effects of the changes.

The concerns raised by Reg reader Pete Farrow, who believes the move will lead to more spam, are typical.

"This means that the basic 'sender domain does not resolve' check in sendmail and many other mail server software is now obsolete because any .net and .com now resolves. This will open the internet up to more spam," said Farrow.

"Perhaps mail servers should check to see if the sender domain for a particular piece of email resolves to the IP above. If it does, forward the email to Verisign," he adds.

Ray Bellis, technical director of ISP Community Internet, echoes these concerns.

"This frustrates spam prevention techniques, where mail servers verify that the *sender's* domain is legitimate before accepting an email," Bellis said.

"This breaks all sorts of things horribly," he added.

Sys admins are still analysing the effects of the changes and there's dispute among experts like Beliis about the effect of the changes.

Already a backlash is building, with Net admins being urged to block Verisign's catch-all domain. This could all get very messy. ®

Security for virtualized datacentres

More from The Register

next story
Spies, avert eyes! Tim Berners-Lee demands a UK digital bill of rights
Lobbies tetchy MPs 'to end indiscriminate online surveillance'
How the FLAC do I tell MP3s from lossless audio?
Can you hear the difference? Can anyone?
Inequality increasing? BOLLOCKS! You heard me: 'Screw the 1%'
There's morality and then there's economics ...
Google hits back at 'Dear Rupert' over search dominance claims
Choc Factory sniffs: 'We're not pirate-lovers - also, you publish The Sun'
While you queued for an iPhone 6, Apple's Cook sold shares worth $35m
Right before the stock took a 3.8% dive amid bent and broken mobe drama
4chan outraged by Emma Watson nudie photo leak SCAM
In the immortal words of Shaggy, it wasn't me us ... amirite?
prev story

Whitepapers

Providing a secure and efficient Helpdesk
A single remote control platform for user support is be key to providing an efficient helpdesk. Retain full control over the way in which screen and keystroke data is transmitted.
Intelligent flash storage arrays
Tegile Intelligent Storage Arrays with IntelliFlash helps IT boost storage utilization and effciency while delivering unmatched storage savings and performance.
Beginner's guide to SSL certificates
De-mystify the technology involved and give you the information you need to make the best decision when considering your online security options.
Security for virtualized datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.
Secure remote control for conventional and virtual desktops
Balancing user privacy and privileged access, in accordance with compliance frameworks and legislation. Evaluating any potential remote control choice.