New on the Blog

DNS-based Authentication of Named Entities (DANE)

Most people like you who are reading an Infoblox blog are familiar with the benefits of using DNSSEC to provide authentication and integrity for your DNS information.  DNSSEC is a lot like dental floss: we all know that it is good for our health, but few enterprise organizations actually put forth the effort to implement the best practice.  If organizations do not use DNSSEC then they are susceptible to a variety of DNS-based attacks.  Attackers

Infoblox Statement ABout OpenSSL "Heartbleed" Defect

A customer notification was sent out Friday April 11, 2014.

Summary:

  1. Infoblox DDI and NetMRI products are NOT effected by the OpenSSL "Heartbleed" defect.
  2. Infoblox Customer Support Portal has been patched, eliminating the defect - customers are strongly encouraged to change their support passwords.

 

Dear Infoblox Customer,

IPv6 is still evolving - New DHCPv6 RFC is published

While IPv6 has been in existence for close to 20 years now it would be a mistake to say the protocol is not continuing to evolve to meet the needs of operators (service providers, enterprises and others). This is borne out in some newer RFCs that have been published recently. Earlier this year RFC 7078 (http://tools.ietf.org/html/rfc7078) which describes how to distribute IPv6 address selection policy preferences via DHCPv6 was published.

Coming Soon: An IPv6-Only Facebook

As I mentioned in my last blog I had the opportunity to present at the World IPv6 Congress 2014 in Paris, France (life’s rough!).  The event was well-attended by representatives from many IPv6 gurus and early adopters. 

One of the inventors of TCP/IP was in attendance as well: Bob Khan gave an interesting presentation on digital object architecture, an evolutionary framework for secure information storage and retrieval (ITU X.1255). 

DNS Logs Sound the Alarm, and DNS Firewall Rides to the Rescue

A few days ago, one of our large DDI customers called our account team and said that their network was under active attack. Their Information Security Department was in what they called “response security mode.”

They discovered this by observing unusual DNS request logging in their homegrown Splunk systems, which were actively tracking malware queries originating from their networks and directed toward domains in Eastern Europe. 

Recent blog activity

On February 11, a zero-day exploit was discovered targeting systems running fully patched versions of Internet Explorer 9 or 10.  Malware using this attack was being hosted from the compromised site of the U.S. Veterans of Foreign Wars (VFW) Website, targeting visitors to the site. The...

DNS Attacks in Romania

Posted by Infoblox Securi...

Posted: March 31, 2014 - 12:08:31 PM

Overview

Global Internet Stewardship

Posted by Kenny Burroughs

Posted: March 25, 2014 - 09:25:19 AM

In an attempt to, among other goals, complete the privatization of the Internet the United States Government announced Friday the 14th of March 2014 that it does not plan to renew the NTIA contract with ICANN to continue administration of the Internet Identity system. This plan to transfer key...

The Fragmented Internet

Posted by Scott Hogg

Posted: March 17, 2014 - 05:48:17 PM

Addressing and Routing - BFFs

Internet Protocol addressing and routing are two concepts that go hand-in-hand. Addressing policies and strategies are first drafted and then implemented onto the physical or virtual network...

Knowing is half the battle

Posted by Renuka Nadkarni

Posted: March 17, 2014 - 03:53:46 PM

The phrase from GI Joe of  ‘Knowing is half the battle’ is true in so many ways as we read about Target. This picture depicts well the situation in which things get a lot worse before they get better when a targeted attack like this happens.