Cargando…

WHOIS running the Internet : protocol, policy, and privacy /

"This book provides a comprehensive overview of WHOIS. The text begins with an introduction to WHOIS and an in-depth coverage of its forty-year history. Afterwards it examines how to use WHOIS and how WHOIS fits in the overall structure of the Domain Name System (DNS). Other technical topics co...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autor principal: Bruen, Garth O.
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Hoboken, New Jersey : John Wiley and Sons, Inc., 2015.
Temas:
Acceso en línea:Texto completo
Texto completo
Tabla de Contenidos:
  • Introduction: What is WHOIS? 1
  • I.1 Conventions Used in this Text 4
  • I.2 Flow of this Text 5
  • I.3 WHOIS from versus WHOIS about 5
  • I.4 Origin of the Term WHOIS 6
  • I.5 Why WHOIS Is Important (or Should Be) to Everyone 7
  • I.6 What Kind of Use and Contact is Permitted for WHOIS 7
  • I.7 Where is the WHOIS Data? 8
  • I.8 Identifying Remote Communication Sources 8
  • I.9 Getting Documentation 11
  • 1 The History of WHOIS 13
  • 1.1 In the Beginning 13
  • 1.2 The Sands of Time 14
  • 1.2.1 Seals 15
  • 1.2.2 From Signal Fires on the Great Wall to Telegraphy 15
  • 1.2.3 The Eye of Horus 17
  • 1.3 1950s: On the Wires and in the Air 18
  • 1.3.1 Sputnik Changes Everything 18
  • 1.3.2 Telegraphs, Radio, Teletype, and Telephones 19
  • 1.3.3 WRU: The First WHOIS 20
  • 1.4 1960s: Sparking the Internet to Life 26
  • 1.4.1 SRI, SAIL, and ITS 26
  • 1.4.2 Doug Engelbart: The Father of Office Automation 27
  • 1.5 1970s: Ok, Now That We Have an Internet, How Do We Keep Track of Everyone? 27
  • 1.5.1 Elizabeth “Jake” Feinler 27
  • 1.5.2 The ARPANET Directory as Proto‐WHOIS 27
  • 1.5.3 The Site Status List 28
  • 1.5.4 Distribution of the HOSTS Table 30
  • 1.5.5 Finger 30
  • 1.5.6 Sockets 31
  • 1.5.7 Into the VOID with NLS IDENTFILE 32
  • 1.5.8 NAME/FINGER RFC 742 (1977) 33
  • 1.5.9 Other Early Models 35
  • 1.6 1980s: WHOIS Gets Its Own RFC 36
  • 1.6.1 The DNS 37
  • 1.6.2 WHOIS Updated for Domains (1985) 38
  • 1.6.3 Oops! The Internet Goes Public 39
  • 1.7 1990s: The Internet as We Know It Emerges 40
  • 1.7.1 Referral WHOIS or RWhois RFC 1714 (1994) 41
  • 1.7.2 WHOIS++ RFCs 1834 and 1835 (1995) 41
  • 1.7.3 ICANN Takes over WHOIS (1998) 42
  • 1.8 2000s: WHOIS Standards 42
  • 1.8.1 ICANN’s Registrar Accreditation Agreement and WHOIS (2001) 43
  • 1.8.2 WHOIS Protocol Specification 2004 RFC 3912 (2004) 43
  • 1.8.3 Creaking of Politics 44
  • References 45
  • 2 Using WHOIS 47
  • 2.1 Domain WHOIS Data 48
  • 2.1.1 Record Terminology 48
  • 2.2 Domain WHOIS Fields 52
  • 2.2.1 Status 54
  • 2.2.2 Registrar 54
  • 2.2.3 Nameservers 55
  • 2.2.4 Registrant, Administrative, Technical, and Billing 56
  • 2.2.5 Names and Organizations 56
  • 2.2.6 Emails 57
  • 2.2.7 Addresses 58
  • 2.2.8 Phone Numbers 58
  • 2.2.9 Record Dates 59
  • 2.2.10 DNSSEC 59
  • 2.2.11 Other Information 60
  • 2.3 Getting Records about Various Resources 60
  • 2.3.1 Starting at the Top: The Empty Domain 60
  • 2.3.2 Query WHOIS for a TLD as a Domain 61
  • 2.3.3 WHOIS for a Registrar or Registry 62
  • 2.3.4 Nameservers 63
  • 2.3.5 Registrar and Registry 64
  • 2.3.6 Special Cases 65
  • 2.3.7 Dealing with Weird Results 73
  • 2.4 IP WHOIS 74
  • 2.4.1 Five Regional NICs 75
  • 2.4.2 CIDR and ASN 80
  • 2.4.3 IPv4 and IPv6 81
  • 2.5 ccTLDs and IDNs 82
  • 2.5.1 ccTLDs 82
  • 2.5.2 IDNs 84
  • 2.5.3 Language versus Script 85
  • 2.5.4 ASCII 85
  • 2.5.5 Unicode 86
  • 2.5.6 Getting WHOIS Records for IDNs 87
  • 2.6 WHOIS Services 87
  • 2.6.1 Port 43 Command Line or Terminal 88
  • 2.6.2 Clients 89
  • 2.6.3 Representational State Transfer (RESTFul) WHOIS 97
  • 2.6.4 Web‐Based WHOIS 97
  • 2.6.5 Telnet to WHOIS Server 99
  • 2.6.6 More Services, Software, and Packages 100
  • 2.6.7 WHOIS Functions, Switches, and Tricks 102
  • 2.6.8 Obscure, Archaic, and Obsolete WHOIS Services 104
  • References 105
  • 3 Research and Investigations 107
  • 3.1 Completely Disassembling a WHOIS Record 108
  • 3.1.1 A Normal, Safe Domain: cnn.com 108
  • 3.1.2 Deconstructing the WHOIS for a Spammed Domain 116
  • 3.1.3 Illicit Domain WHOIS 120
  • 3.1.4 Virus Domain WHOIS 121
  • 3.1.5 Tracking Cybersquatters and Serial Trademark Violators 123
  • 3.1.6 Network Security Administrator Issues 124
  • 3.1.7 Protecting Your Domain with Accurate WHOIS 125
  • 3.2 More Tools 126
  • 3.2.1 Ping 126
  • 3.2.2 Traceroute 126
  • 3.2.3 Secondary Sources, Historical Data, and Additional Tools 126
  • References 129
  • 4 WHOIS in the Domain Name System (DNS) 131
  • 4.1 The Big Mistake 131
  • 4.2 Basics of the DNS 133
  • 4.2.1 TCP/IP, Layers, and Resolvers 133
  • 4.2.2 How a Domain Becomes a Website 134
  • 4.2.3 WHOIS Pervades the DNS 134
  • 4.2.4 ICANN, IANA, Registries, and Registrars 135
  • 4.2.5 .ARPA: Special Architectural TLD 138
  • 4.2.6 Setting the Example with Reserved Domains 139
  • 4.2.7 DNS RFCs 882, 883, 1033, and 1034 140
  • 4.3 DNS RR 141
  • 4.3.1 Berkeley Internet Name Domain 141
  • 4.3.2 Shared WHOIS Project 141
  • 4.3.3 Using the DiG 142
  • 4.3.4 Graphic DNS Software and Websites 145
  • 4.3.5 Finding Hidden Registrars and Tracking Roots 146
  • 4.3.6 Traceroute 150
  • 4.4 Outside the DNS: An Internet without WHOIS 153
  • 4.4.1 The Onion Routing 153
  • 4.4.2 .ONION and Other TLDs 155
  • Reference 157
  • 5 WHOIS Code 159
  • 5.1 Automating WHOIS with Batching and Scripting 159
  • 5.1.1 DiG Example 159
  • 5.1.2 DOS Batch File Example 160
  • 5.1.3 VBScript Example 160
  • 5.2 WHOIS Client Code 161
  • 5.2.1 What a WHOIS Client Should Do 161
  • 5.2.2 Early Versions 163
  • 5.2.3 C/C++ 164
  • 5.2.4 Perl 168
  • 5.2.5 Java 169
  • 5.2.6 Recursive Python WHOIS by Peter Simmons 169
  • 5.2.7 Lisp WHOIS by Evrim Ulu 169
  • 5.3 Web WHOIS Forms 170
  • 5.3.1 Creating a WHOIS Web Interface with PHP 170
  • 5.4 Parsing WHOIS Records 171
  • 5.4.1 Ruby WHOIS by Simone Carletti 171
  • 5.4.2 Regular Expressions 173
  • 6 WHOIS Servers 175
  • 6.1 Historical Servers 176
  • 6.2 Server Standards and ICANN Requirements 177
  • 6.3 Finding the Right Server 178
  • 6.4 Installing and Configuring WHOIS Servers 180
  • 6.4.1 JWhoisServer by Klaus Zerwes 180
  • 6.4.2 WHOIS Daemon 186
  • 6.5 WHOIS Database 186
  • 7 WHOIS Policy Issues 189
  • 7.1 The WHOIS Policy Debate 189
  • 7.1.1 Basic Policy 191
  • 7.1.2 ICANN Registrar Accreditation Agreement WHOIS Standards 191
  • 7.1.3 Lack of Language Support in WHOIS 193
  • 7.1.4 Abuses 193
  • 7.1.5 Privacy 195
  • 7.1.6 Source of Concerns 197
  • 7.1.7 Creating Balance 197
  • 7.1.8 European Privacy Laws and WHOIS 200
  • 7.1.9 Drawing the Line 201
  • 7.1.10 Uniform Domain‐Name Dispute‐Resolution Policy 203
  • 7.1.11 WHOIS Inaccuracy, Falsification, Obfuscation, and Access Denial 209
  • 7.2 Studies, Reports, and Activities on WHOIS 209
  • 7.2.1 SSAC (2002) 210
  • 7.2.2 Benjamin Edelman Congressional Testimony on WHOIS (2003) 210
  • 7.2.3 US Government Accountability Office Report on Prevalence of False Contact Information in WHOIS (2005) 211
  • 7.2.4 WHOIS Study Hypotheses Group Report to the GNSO Council (2008) 211
  • 7.2.5 National Opinion Research Center at the University of Chicago (2009) 212
  • 7.2.6 WHOIS Policy Review Team Final Report (2012) 212
  • 7.3 WHOIS Enforcement and Nonenforcement at ICANN 213
  • 7.3.1 Tracking ICANN’s Response to WHOIS Inaccuracy 215
  • 7.3.2 ICANN Compliance Designed for Failure 218
  • 7.3.3 ICANN’s Contract with Registrars Not Enforceable on WHOIS Accuracy 219
  • References 223
  • 8 The Future of WHOIS 225
  • 8.1 New gTLDs 226
  • 8.2 WHOIS‐Based Extensible Internet Registration Data Service (WEIRDS) 227
  • 8.3 Aggregated Registry Data Services (ARDS) 230
  • 8.4 Truly Solving the Problem 231
  • 8.5 Conclusion: The Domain Money Wall—or Why ICANN Will Never Fix WHOIS 232
  • Appendix A: WHOIS Code 237
  • Appendix B: WHOIS Servers 293
  • Index 331.