SlideShare une entreprise Scribd logo
1  sur  50
Woodstock, The Internet and Campu
2011 – Bringing People to Together



         Steve Crocker
        January 20, 2011
Brazil


   Beautiful country
   Warm people
   Delicious food
   And…




                             2
A Prolific Builder of Networks




                                 3
About me…

   CEO, Shinkuro, Inc.
       Collaboration technology and Internet infrastructure security
   ICANN
       Security and Stability Advisory Committee (SSAC)
       ICANN Board of Directors (currently vice chair)
   Arpanet pioneer
       First connection (UCLA 1969); initial protocols
       Request for Comments (RFCs)
   R&D, R&D management, some start ups
       USC-ISI, Aerospace Corp, Trusted Information Systems,
        CyberCash, Longitude Systems
Early days

   Los Angeles and Chicago area. Math.
   Started programming in high school
   UCLA -> MIT -> UCLA
   Lots of programming, artificial
    intelligence
   Building a network looked fun and
    useful – but not really “serious”

                                      5
Network origins


   Early and mid 1960s – Several attempts
    to connect two and three computers
   Computers were big, expensive
   Existed mostly in universities and large
    businesses
       No personal computers



                                          6
The Arpanet


   Advanced Research Projects Agency
    (ARPA, DARPA) is part of the U.S. Dept
    of Defense
   Funds research to make big changes
       “Factor of 10, not 10%”
   Started Arpanet project in 1967


                                        7
ARPA Environment


   Research labs at major universities and
    some companies
   Graphics, computer architecture,
    programming languages, artificial
    intelligence
   Arpanet built to connect these labs


                                         8
Arpanet – December 1969
Arpanet – June 1970
Arpanet – March 1977
Standards on the Arpanet


   Single vendor (BBN) for routers (IMPs)
       Proprietary format, addressing, routing
   No formal plan or organization for apps
       Organic cooperation among initial sites
   Informal, cooperative process emerged




                                                  12
The Early “Standards” Process

   Open architecture
       Multiple protocol layers
            Not a fixed number; new layers anticipated
       Middle layers accessible
       New protocols encouraged
   Open participation
       Originally just from host sites
       Everyone equal - individuals, not organizations
       No cost for participation (NWG)
       No cost for documents (RFCs)

                                                          13
Network Working Group


   Loose, open organization
       From current or future Arpanet sites
   No formal charter
       S. Crocker chaired and was funded
   Grew from fewer than 10 to 50 and up
       Split into parallel working groups
            Telnet, File Transfer Protocol (FTP), others


                                                            14
Jon Postel
Steve Crocker
Vint Cerf

Aug 1994 –
25 year
anniversary of
the Arpanet




                 15
Documents (The RFCs)

   Completely open, informal documents
   “Standards” arrived at by consensus
       Mild management to declare completion
       Strong emphasis on running code
   Documents named
        “Request for Comments”
    to emphasize open, invitational nature
   Became more structured over time

                                                16
Jon Postel
1943-1998


             17
Arpanet begets the Internet

Lots of other networks
 Other countries - UK, CA, FR

 Other agencies - NASA, DoE

 Local nets - Ring nets, Ethernet

 Other media - packet radio, packet satellite



Need to interconnect and interoperate


                                                 18
Internet Standards


   Network Working Group evolved into
    multiple groups
   Internet Activities Board (IAB) formed
   IETF born under the IAB 1986




                                             19
Keeping track of things

   RFCs had numbers
      Postel took over from Crocker in 1971

   Other things needed numbers
      Protocol parameters, etc.

      Let Postel do it

   DNS invented
      Postel hands out country code TLDs

   Internet Assigned Numbers Authority (IANA)
                                            20
THE GROWTH PERIOD




                    21
Internet Users
        1000
         900
         800
         700
         600
millions 500
         400
         300
         200
         100
           0
                      5   6   7   8   9   0   1   2   3   4    5
                  1 99 199 199 199 199 200 200 200 200 200 200
data from www.nua.com
http://www.internetworldstats.com/stats.htm
Users 1970 – 1997




                                            mom!
                      business            WWW
               CSNet             NBC TV
geeks     geeks and students

1970             1981             1988      1997
Organizations -- Global


   IETF – Internet Engineering Task Force
   ICANN – Internet Corporation for
    Assigned Names and Numbers
   ISOC – Internet Society
   W3C – World Wide Web Consortium
   …


                                        24
Organizations – Regional


   LACTLD – Latin America and
    Caribbean Top Level Domains
   LACNIC – Latin America and Caribbean
    Network Information Center
   NIC.BR – Brazillian Top Level Domain
   Many others


                                     25
The Birth of ICANN
   IANA function become complicated
       Contention over domain names
       Allocation of addresses
   ICANN created by U.S. Government
       Internet Corporation for Names and Numbers
   Major Functions
       Manage DNS root including defining new TLDs
       Allocate IP address blocks
            to regional Internet registries (RIRs)
       Registers IETF Internet parameter values
       Foster competition and innovation
       Security too
                                                      26
Illustrative      North     South         Europe       Africa       Asia -
                       Amer      Amer                                    Pacific



8 Policy & Laws

7 Law Enforcement      FBI

6 Response             CERT                                              AUCERT

                      NANOG                               AFNOG
                                       Root Server Operators
5 Operations
                               Internet Engineering and Planning Group

4 Products/Networks

3 Implementation
                                              IETF
2 Protocols

1 Architecture                                 IAB



                                                                              27
Illustrative      North     South         Europe       Africa       Asia -
                       Amer      Amer                                    Pacific



8 Policy & Laws

7 Law Enforcement      FBI

6 Response             CERT                  ICANN                       AUCERT

                      NANOG                               AFNOG
                                       Root Server Operators
5 Operations
                               Internet Engineering and Planning Group

4 Products/Networks     Advisory role across multiple levels and
                         countries (DNS and addressing only)
3 Implementation
                                              IETF
2 Protocols

1 Architecture                                 IAB



                                                                              28
Security – A Difficult Story


   In the early days, each computer had its
    own security
   Network was open, but we knew each
    group, and each group knew its users
   Public key cryptography not yet known




                                         29
As the network grew…


   Breakins
       Morris Worm in 1988 -> CERT
   Firewalls, Virus checkers
   Some use of cryptography
       SSL, PGP, SSH




                                      30
Cache Poisoning and DNSSEC




                             31
1 Webpage = Multiple DNS Name
                Resolutions




russ.mundy@cobham.com                  32
DNS: Data Flow
Zone administrator
                         1
                                      4
  Zone file                  master       Caching forwarder
                     2
                                  3                       5

  Dynamic
  updates
                             slaves                     resolver




                                                               33
DNS Vulnerabilities
Corrupting data                      Impersonating                Cache
                                        master                 impersonation
 Zone administrator
                          1
                                               4
   Zone file                   master                Caching forwarder
                      2
                                     3                                     5

   Dynamic
   updates
                               slaves                                    resolver
                                             Cache pollution by
                                               Data spoofing
 Unauthorized updates
                                            Altered zone data

                 Server protection                     Data protection
                                                                                34
How bad can it get?
• In wireless environments, it’s easy to
  substitute DNS responses.
• Redirect to a false site
  – Steal passwords
• Redirect to a man-in-the-middle site
  – See and copy an entire session
  – Web, email, IM, etc.
– And, of course, Kaminsky’s attack

                                           35
Where Does DNSSEC Come In?

• DNSSEC secures the name to address
  mapping
  – Transport and Application security are just
    other layers.




                                                  36
DNSSEC hypersummary

• Data authenticity and integrity by
  signing the Resource Records Sets with
  private key
• Public DNSKEYs used to verify the
  RRSIGs
• Children sign their zones with their
  private key
  – Authenticity of that key established by
    signature by the parent
                                              37
History – Design Process

   Demonstration of Cache Poisoning in
    early 1990s
       Raised concern at high levels in the U.S.
        Government
       Caused initiation of DNSSEC design work
   Three major design iterations for more
    than a decade
       Basic design is straightforward
       Distributed key management didn’t scale
        well in early designs                   38
The “Final” Design


   “Final” design standardized in RFC
    4033-35 March 2005
   Additional privacy requirement emerged
       NSEC3 standardized March 2008, RFC
        5155
   Key Rollover Scheme using Timers
       RFC 5011, September 2007


                                             39
The Deployment Process

   Deployment is separate from design
    and standardization
   Software products, tools
   Documentation – tutorials, manuals, …
   Services
   Early adopters
       Zone signers
       Validators
                                        40
Top Level Domain Leaders

   Sweden
       .SE first top level domain deployment
       Formal launch DNSSEC service Feb 2007
   Brazil, .MUSEUM, ORG, Bulgaria,
    Puerto Rico, Brazil, Czech Republic,
    Portugal, Switzerland, Thailand,
    Namibia, NET, …
   Coming soon: United Kingdom, Mexico,
    COM, many others
                                            41
The Root


   The Root was signed July 15, 2010
   Extensive debate for three years
   Lengthy preparation
   Two “key ceremonies” with >30
    participants from the entire world
   This marks the end of the beginning
   Still a long way to go

                                          42
LOOKING AHEAD




                45
Predictions – Scorecard

Service             Predicted?
Email                  Yes
Instant Messaging      Yes
JAVA                   Yes
World Wide Web         Yes
Skype                  Yes
Google                 No
Facebook               No




                                 46
The Future – Technical


More bandwidth, better connectivity
Voice interaction
Gradual automatic translation




                                      47
The Future – Organizational


   Global businesses and organizations
   Emphasis on skills, not location
   The door is open to everyone
   And everyone is competing with you!




                                          48
What to do?


   Work on projects that make a difference
       The money will take care of itself
   Work with others
       The credit will take care of itself
   Take the initiative
   Build, don’t destroy


                                              49
50

Contenu connexe

En vedette

Computação acelerada – a era das ap us roberto brandão, ciência
Computação acelerada – a era das ap us   roberto brandão,  ciênciaComputação acelerada – a era das ap us   roberto brandão,  ciência
Computação acelerada – a era das ap us roberto brandão, ciênciaCampus Party Brasil
 
Desenvolvendo com Segurança em PHP
Desenvolvendo com Segurança em PHPDesenvolvendo com Segurança em PHP
Desenvolvendo com Segurança em PHPCampus Party Brasil
 
Asp Net 4 0 Para Iniciantes Cp 2010
Asp Net 4 0 Para Iniciantes   Cp 2010Asp Net 4 0 Para Iniciantes   Cp 2010
Asp Net 4 0 Para Iniciantes Cp 2010Campus Party Brasil
 
Azure Services Platform Overview
Azure Services Platform OverviewAzure Services Platform Overview
Azure Services Platform OverviewCampus Party Brasil
 
De uma garagem para a democratização do comércio on-line
De uma garagem para a democratização do comércio on-lineDe uma garagem para a democratização do comércio on-line
De uma garagem para a democratização do comércio on-lineCampus Party Brasil
 
Utilização de APIs do Windows Live
Utilização de APIs do Windows LiveUtilização de APIs do Windows Live
Utilização de APIs do Windows LiveCampus Party Brasil
 
Adptando sites paradispositivos moveis
Adptando sites paradispositivos moveisAdptando sites paradispositivos moveis
Adptando sites paradispositivos moveisCampus Party Brasil
 
Perspectives On Microsoft And Open Source F Y 10 Customer Presentation
Perspectives On  Microsoft And  Open  Source    F Y 10  Customer  PresentationPerspectives On  Microsoft And  Open  Source    F Y 10  Customer  Presentation
Perspectives On Microsoft And Open Source F Y 10 Customer PresentationCampus Party Brasil
 
Orientação a Objetos na prática em php
Orientação a Objetos na prática em phpOrientação a Objetos na prática em php
Orientação a Objetos na prática em phpCampus Party Brasil
 
Apache OFBiz: Real-World Open Source Java Platform ERP
Apache OFBiz: Real-World Open Source Java Platform ERPApache OFBiz: Real-World Open Source Java Platform ERP
Apache OFBiz: Real-World Open Source Java Platform ERPCampus Party Brasil
 

En vedette (20)

Momento telefonica
Momento telefonicaMomento telefonica
Momento telefonica
 
25 years of cool space projects
25 years of cool space projects25 years of cool space projects
25 years of cool space projects
 
Computação acelerada – a era das ap us roberto brandão, ciência
Computação acelerada – a era das ap us   roberto brandão,  ciênciaComputação acelerada – a era das ap us   roberto brandão,  ciência
Computação acelerada – a era das ap us roberto brandão, ciência
 
Mvc
MvcMvc
Mvc
 
Desenvolvendo com Segurança em PHP
Desenvolvendo com Segurança em PHPDesenvolvendo com Segurança em PHP
Desenvolvendo com Segurança em PHP
 
Asp Net 4 0 Para Iniciantes Cp 2010
Asp Net 4 0 Para Iniciantes   Cp 2010Asp Net 4 0 Para Iniciantes   Cp 2010
Asp Net 4 0 Para Iniciantes Cp 2010
 
A Tecnologia Java Livre
A Tecnologia Java LivreA Tecnologia Java Livre
A Tecnologia Java Livre
 
Azure Services Platform Overview
Azure Services Platform OverviewAzure Services Platform Overview
Azure Services Platform Overview
 
De uma garagem para a democratização do comércio on-line
De uma garagem para a democratização do comércio on-lineDe uma garagem para a democratização do comércio on-line
De uma garagem para a democratização do comércio on-line
 
Utilização de APIs do Windows Live
Utilização de APIs do Windows LiveUtilização de APIs do Windows Live
Utilização de APIs do Windows Live
 
Arduino cp
Arduino cpArduino cp
Arduino cp
 
Music hack day
Music hack day Music hack day
Music hack day
 
Adptando sites paradispositivos moveis
Adptando sites paradispositivos moveisAdptando sites paradispositivos moveis
Adptando sites paradispositivos moveis
 
DESIGN Palestra: Motion Design
DESIGN Palestra: Motion DesignDESIGN Palestra: Motion Design
DESIGN Palestra: Motion Design
 
Coding dojo
Coding dojoCoding dojo
Coding dojo
 
2011 01-18 mongo-db
2011 01-18 mongo-db2011 01-18 mongo-db
2011 01-18 mongo-db
 
Perspectives On Microsoft And Open Source F Y 10 Customer Presentation
Perspectives On  Microsoft And  Open  Source    F Y 10  Customer  PresentationPerspectives On  Microsoft And  Open  Source    F Y 10  Customer  Presentation
Perspectives On Microsoft And Open Source F Y 10 Customer Presentation
 
Jono mozilla-talk
Jono mozilla-talkJono mozilla-talk
Jono mozilla-talk
 
Orientação a Objetos na prática em php
Orientação a Objetos na prática em phpOrientação a Objetos na prática em php
Orientação a Objetos na prática em php
 
Apache OFBiz: Real-World Open Source Java Platform ERP
Apache OFBiz: Real-World Open Source Java Platform ERPApache OFBiz: Real-World Open Source Java Platform ERP
Apache OFBiz: Real-World Open Source Java Platform ERP
 

Similaire à Momento telefônica steve crocker

Sébastien Bachollet
Sébastien BacholletSébastien Bachollet
Sébastien Bacholletglobalforum11
 
Nad710 Introduction To Networks Using Linux
Nad710   Introduction To Networks Using LinuxNad710   Introduction To Networks Using Linux
Nad710 Introduction To Networks Using Linuxtmavroidis
 
33rd TWNIC IP OPM: RIRs in the future (and past) of Internet governance
33rd TWNIC IP OPM: RIRs in the future (and past) of Internet governance33rd TWNIC IP OPM: RIRs in the future (and past) of Internet governance
33rd TWNIC IP OPM: RIRs in the future (and past) of Internet governanceAPNIC
 
Introduction To Networks Using Linux
Introduction To Networks Using LinuxIntroduction To Networks Using Linux
Introduction To Networks Using Linuxtmavroidis
 
IP addressing and IPv6, presented by Paul Wilson at IETF 119
IP addressing and IPv6, presented by Paul Wilson at IETF 119IP addressing and IPv6, presented by Paul Wilson at IETF 119
IP addressing and IPv6, presented by Paul Wilson at IETF 119APNIC
 
How the Internet works...and why
How the Internet works...and whyHow the Internet works...and why
How the Internet works...and whyAPNIC
 
intro-to-internet.ppt
intro-to-internet.pptintro-to-internet.ppt
intro-to-internet.pptsmartparking4
 
Name of Company for Term ProjectStudent Name(s)Course MGMT.docx
Name of Company for Term ProjectStudent Name(s)Course  MGMT.docxName of Company for Term ProjectStudent Name(s)Course  MGMT.docx
Name of Company for Term ProjectStudent Name(s)Course MGMT.docxrosemarybdodson23141
 
CS101- Introduction to Computing- Lecture 28
CS101- Introduction to Computing- Lecture 28CS101- Introduction to Computing- Lecture 28
CS101- Introduction to Computing- Lecture 28Bilal Ahmed
 
Asia Pacific Internet Leadership Program
Asia Pacific Internet Leadership ProgramAsia Pacific Internet Leadership Program
Asia Pacific Internet Leadership ProgramAPNIC
 
Turing Award Winners 2004
Turing Award Winners 2004Turing Award Winners 2004
Turing Award Winners 2004Nauman Shahid
 
Challenges and Opportunities in Deploying IPv6, DNSSEC, and Other Key Technol...
Challenges and Opportunities in Deploying IPv6, DNSSEC, and Other Key Technol...Challenges and Opportunities in Deploying IPv6, DNSSEC, and Other Key Technol...
Challenges and Opportunities in Deploying IPv6, DNSSEC, and Other Key Technol...Deploy360 Programme (Internet Society)
 
Challenges and Opportunities in Deploying IPv6, DNSSEC, and Other Key Technol...
Challenges and Opportunities in Deploying IPv6, DNSSEC, and Other Key Technol...Challenges and Opportunities in Deploying IPv6, DNSSEC, and Other Key Technol...
Challenges and Opportunities in Deploying IPv6, DNSSEC, and Other Key Technol...Deploy360 Programme (Internet Society)
 
25 History Of The Internet
25 History Of The Internet25 History Of The Internet
25 History Of The InternetImmanuelA
 
Luiz eduardo. introduction to mobile snitch
Luiz eduardo. introduction to mobile snitchLuiz eduardo. introduction to mobile snitch
Luiz eduardo. introduction to mobile snitchYury Chemerkin
 

Similaire à Momento telefônica steve crocker (20)

Sébastien Bachollet
Sébastien BacholletSébastien Bachollet
Sébastien Bachollet
 
Nad710 Introduction To Networks Using Linux
Nad710   Introduction To Networks Using LinuxNad710   Introduction To Networks Using Linux
Nad710 Introduction To Networks Using Linux
 
33rd TWNIC IP OPM: RIRs in the future (and past) of Internet governance
33rd TWNIC IP OPM: RIRs in the future (and past) of Internet governance33rd TWNIC IP OPM: RIRs in the future (and past) of Internet governance
33rd TWNIC IP OPM: RIRs in the future (and past) of Internet governance
 
Introduction To Networks Using Linux
Introduction To Networks Using LinuxIntroduction To Networks Using Linux
Introduction To Networks Using Linux
 
IP addressing and IPv6, presented by Paul Wilson at IETF 119
IP addressing and IPv6, presented by Paul Wilson at IETF 119IP addressing and IPv6, presented by Paul Wilson at IETF 119
IP addressing and IPv6, presented by Paul Wilson at IETF 119
 
How the Internet works...and why
How the Internet works...and whyHow the Internet works...and why
How the Internet works...and why
 
intro-to-internet.ppt
intro-to-internet.pptintro-to-internet.ppt
intro-to-internet.ppt
 
intro-to-internet.ppt
intro-to-internet.pptintro-to-internet.ppt
intro-to-internet.ppt
 
Name of Company for Term ProjectStudent Name(s)Course MGMT.docx
Name of Company for Term ProjectStudent Name(s)Course  MGMT.docxName of Company for Term ProjectStudent Name(s)Course  MGMT.docx
Name of Company for Term ProjectStudent Name(s)Course MGMT.docx
 
CS101- Introduction to Computing- Lecture 28
CS101- Introduction to Computing- Lecture 28CS101- Introduction to Computing- Lecture 28
CS101- Introduction to Computing- Lecture 28
 
Asia Pacific Internet Leadership Program
Asia Pacific Internet Leadership ProgramAsia Pacific Internet Leadership Program
Asia Pacific Internet Leadership Program
 
Turing Award Winners 2004
Turing Award Winners 2004Turing Award Winners 2004
Turing Award Winners 2004
 
02 history
02 history02 history
02 history
 
Challenges and Opportunities in Deploying IPv6, DNSSEC, and Other Key Technol...
Challenges and Opportunities in Deploying IPv6, DNSSEC, and Other Key Technol...Challenges and Opportunities in Deploying IPv6, DNSSEC, and Other Key Technol...
Challenges and Opportunities in Deploying IPv6, DNSSEC, and Other Key Technol...
 
Challenges and Opportunities in Deploying IPv6, DNSSEC, and Other Key Technol...
Challenges and Opportunities in Deploying IPv6, DNSSEC, and Other Key Technol...Challenges and Opportunities in Deploying IPv6, DNSSEC, and Other Key Technol...
Challenges and Opportunities in Deploying IPv6, DNSSEC, and Other Key Technol...
 
ICANN
ICANNICANN
ICANN
 
25 History Of The Internet
25 History Of The Internet25 History Of The Internet
25 History Of The Internet
 
New history
New historyNew history
New history
 
Luiz eduardo. introduction to mobile snitch
Luiz eduardo. introduction to mobile snitchLuiz eduardo. introduction to mobile snitch
Luiz eduardo. introduction to mobile snitch
 
New history
New historyNew history
New history
 

Plus de Campus Party Brasil

Desenvolvimento de aplicações para o Google App Engine
Desenvolvimento de aplicações para o Google App EngineDesenvolvimento de aplicações para o Google App Engine
Desenvolvimento de aplicações para o Google App EngineCampus Party Brasil
 
Técnicas forenses para a recuperação de arquivos
Técnicas forenses para a recuperação de arquivosTécnicas forenses para a recuperação de arquivos
Técnicas forenses para a recuperação de arquivosCampus Party Brasil
 
Como ganhar dinheiro no mundo mobile?
Como ganhar dinheiro no mundo mobile?Como ganhar dinheiro no mundo mobile?
Como ganhar dinheiro no mundo mobile?Campus Party Brasil
 
Tempestades solares: mitos e verdades
Tempestades solares: mitos e verdadesTempestades solares: mitos e verdades
Tempestades solares: mitos e verdadesCampus Party Brasil
 
A busca por planetas além do sistema solar
A busca por planetas além do sistema solarA busca por planetas além do sistema solar
A busca por planetas além do sistema solarCampus Party Brasil
 
Construção de uma luneta a baixo custo
Construção de uma luneta a baixo custoConstrução de uma luneta a baixo custo
Construção de uma luneta a baixo custoCampus Party Brasil
 
Hardware livre Arduino: eletrônica e robótica com hardware e software livres
Hardware livre Arduino: eletrônica e robótica com hardware e software livresHardware livre Arduino: eletrônica e robótica com hardware e software livres
Hardware livre Arduino: eletrônica e robótica com hardware e software livresCampus Party Brasil
 
Robótica e educação inclusiva
Robótica e educação inclusivaRobótica e educação inclusiva
Robótica e educação inclusivaCampus Party Brasil
 
Fazendo do jeito certo: criando jogos sofisticados com DirectX
Fazendo do jeito certo: criando jogos sofisticados com DirectXFazendo do jeito certo: criando jogos sofisticados com DirectX
Fazendo do jeito certo: criando jogos sofisticados com DirectXCampus Party Brasil
 
Robótica e educação inclusiva
	Robótica e educação inclusiva	Robótica e educação inclusiva
Robótica e educação inclusivaCampus Party Brasil
 
Gestão e monitoramento de redes e dispositivos com Software Livre
Gestão e monitoramento de redes e dispositivos com Software LivreGestão e monitoramento de redes e dispositivos com Software Livre
Gestão e monitoramento de redes e dispositivos com Software LivreCampus Party Brasil
 
Confecção de Circuito Impresso
Confecção de Circuito ImpressoConfecção de Circuito Impresso
Confecção de Circuito ImpressoCampus Party Brasil
 
Virtualização, cloud computig e suas tendencias
Virtualização, cloud computig e suas tendenciasVirtualização, cloud computig e suas tendencias
Virtualização, cloud computig e suas tendenciasCampus Party Brasil
 

Plus de Campus Party Brasil (20)

Wordpress
WordpressWordpress
Wordpress
 
Buracos negros
Buracos negrosBuracos negros
Buracos negros
 
Programação para Atari 2600
Programação para Atari 2600Programação para Atari 2600
Programação para Atari 2600
 
Desenvolvimento de aplicações para o Google App Engine
Desenvolvimento de aplicações para o Google App EngineDesenvolvimento de aplicações para o Google App Engine
Desenvolvimento de aplicações para o Google App Engine
 
Técnicas forenses para a recuperação de arquivos
Técnicas forenses para a recuperação de arquivosTécnicas forenses para a recuperação de arquivos
Técnicas forenses para a recuperação de arquivos
 
Como ganhar dinheiro no mundo mobile?
Como ganhar dinheiro no mundo mobile?Como ganhar dinheiro no mundo mobile?
Como ganhar dinheiro no mundo mobile?
 
Tempestades solares: mitos e verdades
Tempestades solares: mitos e verdadesTempestades solares: mitos e verdades
Tempestades solares: mitos e verdades
 
A busca por planetas além do sistema solar
A busca por planetas além do sistema solarA busca por planetas além do sistema solar
A busca por planetas além do sistema solar
 
Passeio virtual pelo LHC
Passeio virtual pelo LHCPasseio virtual pelo LHC
Passeio virtual pelo LHC
 
Construção de uma luneta a baixo custo
Construção de uma luneta a baixo custoConstrução de uma luneta a baixo custo
Construção de uma luneta a baixo custo
 
Hardware livre Arduino: eletrônica e robótica com hardware e software livres
Hardware livre Arduino: eletrônica e robótica com hardware e software livresHardware livre Arduino: eletrônica e robótica com hardware e software livres
Hardware livre Arduino: eletrônica e robótica com hardware e software livres
 
Robótica e educação inclusiva
Robótica e educação inclusivaRobótica e educação inclusiva
Robótica e educação inclusiva
 
Fazendo do jeito certo: criando jogos sofisticados com DirectX
Fazendo do jeito certo: criando jogos sofisticados com DirectXFazendo do jeito certo: criando jogos sofisticados com DirectX
Fazendo do jeito certo: criando jogos sofisticados com DirectX
 
Blue Via
Blue ViaBlue Via
Blue Via
 
Linux para iniciantes
Linux para iniciantesLinux para iniciantes
Linux para iniciantes
 
Robótica e educação inclusiva
	Robótica e educação inclusiva	Robótica e educação inclusiva
Robótica e educação inclusiva
 
Gestão e monitoramento de redes e dispositivos com Software Livre
Gestão e monitoramento de redes e dispositivos com Software LivreGestão e monitoramento de redes e dispositivos com Software Livre
Gestão e monitoramento de redes e dispositivos com Software Livre
 
Confecção de Circuito Impresso
Confecção de Circuito ImpressoConfecção de Circuito Impresso
Confecção de Circuito Impresso
 
Vida de Programador
Vida de Programador Vida de Programador
Vida de Programador
 
Virtualização, cloud computig e suas tendencias
Virtualização, cloud computig e suas tendenciasVirtualização, cloud computig e suas tendencias
Virtualização, cloud computig e suas tendencias
 

Momento telefônica steve crocker

  • 1. Woodstock, The Internet and Campu 2011 – Bringing People to Together Steve Crocker January 20, 2011
  • 2. Brazil  Beautiful country  Warm people  Delicious food  And… 2
  • 3. A Prolific Builder of Networks 3
  • 4. About me…  CEO, Shinkuro, Inc.  Collaboration technology and Internet infrastructure security  ICANN  Security and Stability Advisory Committee (SSAC)  ICANN Board of Directors (currently vice chair)  Arpanet pioneer  First connection (UCLA 1969); initial protocols  Request for Comments (RFCs)  R&D, R&D management, some start ups  USC-ISI, Aerospace Corp, Trusted Information Systems, CyberCash, Longitude Systems
  • 5. Early days  Los Angeles and Chicago area. Math.  Started programming in high school  UCLA -> MIT -> UCLA  Lots of programming, artificial intelligence  Building a network looked fun and useful – but not really “serious” 5
  • 6. Network origins  Early and mid 1960s – Several attempts to connect two and three computers  Computers were big, expensive  Existed mostly in universities and large businesses  No personal computers 6
  • 7. The Arpanet  Advanced Research Projects Agency (ARPA, DARPA) is part of the U.S. Dept of Defense  Funds research to make big changes  “Factor of 10, not 10%”  Started Arpanet project in 1967 7
  • 8. ARPA Environment  Research labs at major universities and some companies  Graphics, computer architecture, programming languages, artificial intelligence  Arpanet built to connect these labs 8
  • 12. Standards on the Arpanet  Single vendor (BBN) for routers (IMPs)  Proprietary format, addressing, routing  No formal plan or organization for apps  Organic cooperation among initial sites  Informal, cooperative process emerged 12
  • 13. The Early “Standards” Process  Open architecture  Multiple protocol layers  Not a fixed number; new layers anticipated  Middle layers accessible  New protocols encouraged  Open participation  Originally just from host sites  Everyone equal - individuals, not organizations  No cost for participation (NWG)  No cost for documents (RFCs) 13
  • 14. Network Working Group  Loose, open organization  From current or future Arpanet sites  No formal charter  S. Crocker chaired and was funded  Grew from fewer than 10 to 50 and up  Split into parallel working groups  Telnet, File Transfer Protocol (FTP), others 14
  • 15. Jon Postel Steve Crocker Vint Cerf Aug 1994 – 25 year anniversary of the Arpanet 15
  • 16. Documents (The RFCs)  Completely open, informal documents  “Standards” arrived at by consensus  Mild management to declare completion  Strong emphasis on running code  Documents named “Request for Comments” to emphasize open, invitational nature  Became more structured over time 16
  • 18. Arpanet begets the Internet Lots of other networks  Other countries - UK, CA, FR  Other agencies - NASA, DoE  Local nets - Ring nets, Ethernet  Other media - packet radio, packet satellite Need to interconnect and interoperate 18
  • 19. Internet Standards  Network Working Group evolved into multiple groups  Internet Activities Board (IAB) formed  IETF born under the IAB 1986 19
  • 20. Keeping track of things  RFCs had numbers  Postel took over from Crocker in 1971  Other things needed numbers  Protocol parameters, etc.  Let Postel do it  DNS invented  Postel hands out country code TLDs  Internet Assigned Numbers Authority (IANA) 20
  • 22. Internet Users 1000 900 800 700 600 millions 500 400 300 200 100 0 5 6 7 8 9 0 1 2 3 4 5 1 99 199 199 199 199 200 200 200 200 200 200 data from www.nua.com http://www.internetworldstats.com/stats.htm
  • 23. Users 1970 – 1997 mom! business WWW CSNet NBC TV geeks geeks and students 1970 1981 1988 1997
  • 24. Organizations -- Global  IETF – Internet Engineering Task Force  ICANN – Internet Corporation for Assigned Names and Numbers  ISOC – Internet Society  W3C – World Wide Web Consortium  … 24
  • 25. Organizations – Regional  LACTLD – Latin America and Caribbean Top Level Domains  LACNIC – Latin America and Caribbean Network Information Center  NIC.BR – Brazillian Top Level Domain  Many others 25
  • 26. The Birth of ICANN  IANA function become complicated  Contention over domain names  Allocation of addresses  ICANN created by U.S. Government  Internet Corporation for Names and Numbers  Major Functions  Manage DNS root including defining new TLDs  Allocate IP address blocks  to regional Internet registries (RIRs)  Registers IETF Internet parameter values  Foster competition and innovation  Security too 26
  • 27. Illustrative North South Europe Africa Asia - Amer Amer Pacific 8 Policy & Laws 7 Law Enforcement FBI 6 Response CERT AUCERT NANOG AFNOG Root Server Operators 5 Operations Internet Engineering and Planning Group 4 Products/Networks 3 Implementation IETF 2 Protocols 1 Architecture IAB 27
  • 28. Illustrative North South Europe Africa Asia - Amer Amer Pacific 8 Policy & Laws 7 Law Enforcement FBI 6 Response CERT ICANN AUCERT NANOG AFNOG Root Server Operators 5 Operations Internet Engineering and Planning Group 4 Products/Networks Advisory role across multiple levels and countries (DNS and addressing only) 3 Implementation IETF 2 Protocols 1 Architecture IAB 28
  • 29. Security – A Difficult Story  In the early days, each computer had its own security  Network was open, but we knew each group, and each group knew its users  Public key cryptography not yet known 29
  • 30. As the network grew…  Breakins  Morris Worm in 1988 -> CERT  Firewalls, Virus checkers  Some use of cryptography  SSL, PGP, SSH 30
  • 31. Cache Poisoning and DNSSEC 31
  • 32. 1 Webpage = Multiple DNS Name Resolutions russ.mundy@cobham.com 32
  • 33. DNS: Data Flow Zone administrator 1 4 Zone file master Caching forwarder 2 3 5 Dynamic updates slaves resolver 33
  • 34. DNS Vulnerabilities Corrupting data Impersonating Cache master impersonation Zone administrator 1 4 Zone file master Caching forwarder 2 3 5 Dynamic updates slaves resolver Cache pollution by Data spoofing Unauthorized updates Altered zone data Server protection Data protection 34
  • 35. How bad can it get? • In wireless environments, it’s easy to substitute DNS responses. • Redirect to a false site – Steal passwords • Redirect to a man-in-the-middle site – See and copy an entire session – Web, email, IM, etc. – And, of course, Kaminsky’s attack 35
  • 36. Where Does DNSSEC Come In? • DNSSEC secures the name to address mapping – Transport and Application security are just other layers. 36
  • 37. DNSSEC hypersummary • Data authenticity and integrity by signing the Resource Records Sets with private key • Public DNSKEYs used to verify the RRSIGs • Children sign their zones with their private key – Authenticity of that key established by signature by the parent 37
  • 38. History – Design Process  Demonstration of Cache Poisoning in early 1990s  Raised concern at high levels in the U.S. Government  Caused initiation of DNSSEC design work  Three major design iterations for more than a decade  Basic design is straightforward  Distributed key management didn’t scale well in early designs 38
  • 39. The “Final” Design  “Final” design standardized in RFC 4033-35 March 2005  Additional privacy requirement emerged  NSEC3 standardized March 2008, RFC 5155  Key Rollover Scheme using Timers  RFC 5011, September 2007 39
  • 40. The Deployment Process  Deployment is separate from design and standardization  Software products, tools  Documentation – tutorials, manuals, …  Services  Early adopters  Zone signers  Validators 40
  • 41. Top Level Domain Leaders  Sweden  .SE first top level domain deployment  Formal launch DNSSEC service Feb 2007  Brazil, .MUSEUM, ORG, Bulgaria, Puerto Rico, Brazil, Czech Republic, Portugal, Switzerland, Thailand, Namibia, NET, …  Coming soon: United Kingdom, Mexico, COM, many others 41
  • 42. The Root  The Root was signed July 15, 2010  Extensive debate for three years  Lengthy preparation  Two “key ceremonies” with >30 participants from the entire world  This marks the end of the beginning  Still a long way to go 42
  • 43.
  • 44.
  • 46. Predictions – Scorecard Service Predicted? Email Yes Instant Messaging Yes JAVA Yes World Wide Web Yes Skype Yes Google No Facebook No 46
  • 47. The Future – Technical More bandwidth, better connectivity Voice interaction Gradual automatic translation 47
  • 48. The Future – Organizational  Global businesses and organizations  Emphasis on skills, not location  The door is open to everyone  And everyone is competing with you! 48
  • 49. What to do?  Work on projects that make a difference  The money will take care of itself  Work with others  The credit will take care of itself  Take the initiative  Build, don’t destroy 49
  • 50. 50