ICANN reserves .internal for private use at the DNS level
ICANN has approved the .internal TLD for private use, ensuring it remains inaccessible on the public internet, aiming to reduce confusion and prevent TLD collisions for organizations.
Read original articleThe Internet Corporation for Assigned Names and Numbers (ICANN) has approved the reservation of the .internal top-level domain (TLD) for private use, similar to how certain IPv4 address blocks are reserved for internal networks. This decision aims to provide organizations with a dedicated domain for internal use that cannot be accessed on the public internet, thereby preventing conflicts and confusion that may arise from ad hoc TLD creation. The .internal domain will not be delegated in the global domain name system, ensuring it remains exclusive for private networks. Google has been using .internal for its cloud services to avoid external dependencies and potential TLD collisions, and many of its customers have adopted it for enterprise applications. While ICANN acknowledges that the introduction of .internal may not significantly improve the current situation, it assures that it will not worsen existing security or stability issues. This move offers network administrators a sanctioned alternative to creating their own TLDs or using subdomains of existing TLDs for internal DNS management.
- ICANN has reserved the .internal TLD for private network use.
- The .internal domain will not be accessible on the public internet.
- Google has utilized .internal for years to prevent TLD collisions.
- The decision aims to reduce confusion from ad hoc TLD creation.
- ICANN believes the new TLD will not introduce new security issues.
Related
BeyondCorp (2014)
Google's BeyondCorp approach rethinks enterprise security by moving away from traditional perimeter security to enhance protection in the changing tech environment. Visit the link for more details on this innovative strategy.
Cloudflare 1.1.1.1 incident on June 27, 2024
Cloudflare faced a DNS resolver issue on 1.1.1.1 due to BGP hijacking and route leak, impacting global users. Cloudflare used RPKI for prevention but challenges remain. Mitigation steps were taken during the incident.
Cloudflare 1.1.1.1 incident on June 27, 2024
Cloudflare faced a global incident on June 27, 2024, with its 1.1.1.1 DNS resolver due to BGP hijacking and a route leak. Despite affecting some users, Cloudflare responded by disabling peering locations and engaging with network operators to resolve the issue.
Phish-friendly domain registry ".top" put on notice
ICANN warned Jiangsu Bangning Science & Technology to improve phishing management for the ".top" domain by mid-August 2024, following its high usage in phishing attacks and inadequate responses.
Don't Let Your Domain Name Become a "Sitting Duck"
Over a million domain names are at risk of hijacking due to authentication vulnerabilities in web hosting services. Experts highlight the need for improved DNS management and cooperation among stakeholders to mitigate these risks.
> Resolved (2024.07.29.06), the Board reserves .INTERNAL from delegation in the DNS root zone permanently to provide for its use in private-use applications. The Board recommends that efforts be undertaken to raise awareness of its reservation for this purpose through the organization's technical outreach.
[1] https://www.icann.org/en/board-activities-and-meetings/mater...
Related
BeyondCorp (2014)
Google's BeyondCorp approach rethinks enterprise security by moving away from traditional perimeter security to enhance protection in the changing tech environment. Visit the link for more details on this innovative strategy.
Cloudflare 1.1.1.1 incident on June 27, 2024
Cloudflare faced a DNS resolver issue on 1.1.1.1 due to BGP hijacking and route leak, impacting global users. Cloudflare used RPKI for prevention but challenges remain. Mitigation steps were taken during the incident.
Cloudflare 1.1.1.1 incident on June 27, 2024
Cloudflare faced a global incident on June 27, 2024, with its 1.1.1.1 DNS resolver due to BGP hijacking and a route leak. Despite affecting some users, Cloudflare responded by disabling peering locations and engaging with network operators to resolve the issue.
Phish-friendly domain registry ".top" put on notice
ICANN warned Jiangsu Bangning Science & Technology to improve phishing management for the ".top" domain by mid-August 2024, following its high usage in phishing attacks and inadequate responses.
Don't Let Your Domain Name Become a "Sitting Duck"
Over a million domain names are at risk of hijacking due to authentication vulnerabilities in web hosting services. Experts highlight the need for improved DNS management and cooperation among stakeholders to mitigate these risks.