<?xml version="1.0" encoding="UTF-8"?><rss xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" version="2.0" xmlns:cc="http://cyber.law.harvard.edu/rss/creativeCommonsRssModule.html">
    <channel>
        <title><![CDATA[Stories by Namefi.io  on Medium]]></title>
        <description><![CDATA[Stories by Namefi.io  on Medium]]></description>
        <link>https://medium.com/@namefi?source=rss-68db58159d25------2</link>
        <image>
            <url>https://cdn-images-1.medium.com/fit/c/150/150/1*qcuFJiS2pO3pDYKGK_bxlg.png</url>
            <title>Stories by Namefi.io  on Medium</title>
            <link>https://medium.com/@namefi?source=rss-68db58159d25------2</link>
        </image>
        <generator>Medium</generator>
        <lastBuildDate>Fri, 15 May 2026 22:07:28 GMT</lastBuildDate>
        <atom:link href="https://medium.com/@namefi/feed" rel="self" type="application/rss+xml"/>
        <webMaster><![CDATA[yourfriends@medium.com]]></webMaster>
        <atom:link href="http://medium.superfeedr.com" rel="hub"/>
        <item>
            <title><![CDATA[Founder’s Manifesto]]></title>
            <link>https://namefi.medium.com/founders-manifesto-a6446d3a3951?source=rss-68db58159d25------2</link>
            <guid isPermaLink="false">https://medium.com/p/a6446d3a3951</guid>
            <dc:creator><![CDATA[Namefi.io ]]></dc:creator>
            <pubDate>Wed, 06 Mar 2024 21:20:04 GMT</pubDate>
            <atom:updated>2024-03-06T21:21:26.933Z</atom:updated>
            <content:encoded><![CDATA[<h4>The Manifesto of Digital Trust, a vision statement of D3Serve Labs, hence Namefi</h4><p><a href="https://medium.com/u/a30fbfea9c12">Zainan Victor Zhou</a>, Founder and CEO of Namefi</p><p>PS: <em>Namefi is the brainchild of D3Serve, hence to understand the vision (aka. founding story of Namefi), one should not forget the vision of D3Serve.</em></p><p>At <strong>D3Serve</strong>, we are dedicated to building <em>digital trust</em> by leveraging blockchain and other advanced technologies.</p><p>We are convinced that the future holds vast improvements in productivity and a superior version of the world, made possible by the digitization of trust.</p><p>To illustrate the benefits of digitizing trust, consider the paradigm of <em>digital information</em>. Before the advent of digital formats, we relied on handwritten or printed words and analog photography. This non-digital format was challenging to replicate, transmit, distribute, and scale, both in terms of time and monetary cost. Today, with the majority of information digitized, the replication and transmission of this data, combined with increasing bandwidth, have led to an explosion in productivity, economic growth, and societal benefits.</p><p>However, the concept of “trust” remains largely undigitized. Trust encompasses the confidence we have when someone claims “who they are”, “what they’re authorized to do”, and “what they commit to do”. Currently, validating someone’s identity often implicitly depends on circumstantial evidence: where they appear, who accompanies them, their attire, and so on. These indicators are subtle, inconsistent, and analog in nature. They are prone to errors when replicated, sluggish in transmission, and can be inefficient and costly to propagate.</p><p>But with advancements in cryptography, consensus mechanisms, and smart contracts, we now see the potential to digitize trust in ways that were previously unimaginable.</p><p>As trust becomes digitized, the software built upon this foundation can automate vast segments of its functionality. The resulting surge in productivity will likely rival, if not surpass, the gains we experienced from the digitization of information.</p><h3>Digital vs Analog kinds of “Information”</h3><figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/1*JO2YwXgU2bijhIG_DwOTaA.png" /></figure><h3>Loss-less-ness</h3><p>One of the most transformative aspects of digitizing trust is its ability to propagate and execute with loss-less precision.</p><p>Just as digitized information can be transmitted without degradation, ensuring accuracy and consistency regardless of the number of times it’s replicated or shared, digital trust operates with a similar meticulousness. Every instance, every transaction, every validation retains its original integrity. This mirrors the exactness we’ve come to expect from our digital information systems.</p><p>In essence, the digitization of trust eliminates the ambiguity and variability that can plague analog systems, paving the way for a future where trust is as reliable and consistent as any piece of digital data.</p><h3>Cost Reduction</h3><p>Furthermore, the economic implications of digitizing trust cannot be understated.</p><p>Just as digital information reduced the costs associated with printing, storage, and distribution, digital trust promises significant savings in its replication and dissemination. Traditional trust systems often involve layers of intermediaries, each adding their own costs and potential points of failure. In contrast, a digitized trust system minimizes these layers, streamlining the chain of propagation. By reducing the friction and overheads in trust verification and validation processes, businesses and individuals can expect not just faster, but also far more cost-effective trust-related transactions.</p><p>This could lead to substantial economic benefits, as funds previously allocated to these processes can be redirected to more productive ventures.</p><h3>Automatability</h3><p>Another monumental advantage of digital trust is its inherent automatability.</p><p>In a world where trust is digitized, processes that once required manual verification, nuanced judgment, or human intervention can be streamlined and automated with software. This doesn’t just lead to faster operations; it ensures a level of consistency and accuracy unattainable by human standards. Just as digitized information paved the way for algorithms to sift through vast amounts of data, analyze patterns, and make decisions in split seconds, digital trust will empower systems to autonomously establish, verify, and act upon trust-related parameters. This automation can reduce errors, increase efficiency, and unlock potentials in sectors where the speed and precision of trust decisions are paramount.</p><h3>New use-case enabled by Digital Trust</h3><p>The real-world applications unlocked by digitized trust offer a glimpse into a transformative future. Take, for instance, the concept of “group trust.”</p><p>Traditional systems struggle with efficiently establishing trust for groups due to the complexities and nuances of interpersonal relationships and hierarchies. With digital trust, innovative applications such as distributing assets to a designated group based on collective criteria or implementing access controls predicated on group dynamics become not only feasible but efficient. Imagine a scenario where an inheritance is seamlessly and transparently divided among a family group based on predefined trust metrics, or a secure facility that grants access based on the collective trustworthiness of a team rather than individual credentials.</p><p>These are just a couple of examples, but they underline the vast potential of applications that were previously inconceivable or highly impractical before the advent of digitized trust.</p><img src="https://medium.com/_/stat?event=post.clientViewed&referrerSource=full_rss&postId=a6446d3a3951" width="1" height="1" alt="">]]></content:encoded>
        </item>
        <item>
            <title><![CDATA[DNSSEC: A Good Security Protocol to Domain Name Service System]]></title>
            <link>https://namefi.medium.com/dnssec-a-good-security-protocol-to-domain-name-service-system-028c1dc6a700?source=rss-68db58159d25------2</link>
            <guid isPermaLink="false">https://medium.com/p/028c1dc6a700</guid>
            <dc:creator><![CDATA[Namefi.io ]]></dc:creator>
            <pubDate>Mon, 05 Feb 2024 13:20:53 GMT</pubDate>
            <atom:updated>2024-02-05T13:20:53.146Z</atom:updated>
            <content:encoded><![CDATA[<p>By <a href="https://twitter.com/sunnyguoyuan">Sunny</a>, Product Operator @<a href="https://medium.com/u/68db58159d25">Namefi.io</a></p><p><strong>Define DNSSEC and DNS and outline the security problem DNSSEC solves</strong></p><p>DNSSEC, or Domain Name System Security Extensions, is a <strong>good</strong>* security protocol that aims to address vulnerabilities in the DNS system.</p><p>DNS, or Domain Name Service, is a critical component of the Internet infrastructure, serving as the standard naming convention between human-readable domain names and machine-routable IP addresses of Internet resources.</p><p>The inherent vulnerabilities and insecurities of DNS lie in its distributed, fault tolerant design, which is devised to avoid single point of failure.</p><p>There have been several attempts to counterattack the DNS attacks in the past including various randomisation approaches in query IDs (QIDs) or domain naming. DNSSEC is an approach originally invented in 1999 to ensure the authenticity of DNS responses through public key asymmetric cryptography.</p><p>This article will go through the design of DNS and the mechanism of DNSSEC while highlighting the real life incidences of DNS attack and the importance of cryptography in the maintenance and usage of the Web today.</p><p><strong>DNS security problems: The mechanisms of DNS and DNS cache poisoning</strong></p><p>In the Internet’s infrastructure, DNS structure is ubiquitous, crucial, and fundamental. Therefore, understanding basically how DNS works serves the basis for knowing how the Internet operates at the axiomatic level. DNS uses an inverted tree structure as its distributed system design with the top layer being the root domain, followed by top-level domains, second-level domains, sub-domains, and hosts. DNS data is stored using a simple data structure called a Resource Record (RR).</p><p>In simple language, DNS serves to communicate between machine-routable IP addresses and human-readable domain names. Initially, before the emergence of the World Wide Web (WWW) (thanks to Tim-Berners Lee), Internet resources/devices communicate with each other through machine-routable numbers. Then, with the creation of the Web and its popularization by personal computers (thanks to Steve Jobs and Steve Wosniak), people actually realize the importance of implementing human-readable code (yes, human language!) to surf the web rather than memorizing bazaar strings of IP addresses. So, DNS came along…</p><p>How does DNS achieve such communication through the aforementioned inverted tree structure (whatever that is)? Imagine you as a web surfer typing Google.com in your “Http://” browser (be it Chrome, Brave, or DuckDuckGo), your goal is to get to Google.com. Between the moment you typed in and the moment you entered Google’s web page, a series of events occurred. Your personal computer sends the domain name to the Name Service (NS), which then sends the domain name to the root domain. Under the root domain, it is sent to the top-level domains, second-level domains, and finally the authoritative domains. Each domain captures the part of the domain name and makes a referral to the next domain until the full correct IP address is returned to the name server. The request is recorded and remembered by the system through a query ID (QID) tagged to the domain name.</p><p>As can be seen, the mechanism of how DNS works is that of a distributed database. However, since there is a time lag for the matching of IP addresses and domain names because of the distributed design (and also no verification between servers!), a nefarious player/server can come along and hijack the DNS process. By bombarding the QIDs with bootstrapped QID guesses, the inverted tree system can be hijacked by a pseudo (nefarious) QID. The nefarious player can not only hijack the DNS process but also the memory of the system by storing itself into the cache of each domain name server. In summary, the number of server levels within the system determines the types of attacks: DoS (denial of service), cache poisoning, and false authoritative servers.</p><p>What can happen if DNS gets hijacked? In either case, you will get no answers at all, fake sites, disclosure of login credentials, false data given, or eavesdropping on sensitive communications. Major real life incidents include the Oct 2016 Brazilian bank attack, the Aug 2017 WikiLeaks, the April 2018 MyEtherWallet attack, and the 2018 DNSpionage. Yes, cryptocurrencies can be stolen due to low DNS security measures. Even in Web3, the internet of value, we are still operating on the Web. So, DNS security measure is crucial.</p><p><strong>DNSSEC mechanism and cryptography</strong></p><p>DNSSEC has a cryptographic design but has undergone a lengthy development process. The Internet Engineering Task Force (IETF) spent over a decade and several protocol revisions to develop DNSSEC, and its deployment is still in the early stages. DNSSEC is designed to add cryptographic protection to the Internet’s name resolution service, aiming to protect the integrity and authenticity of DNS data. It provides response integrity by defining mechanisms to cryptographically sign zones, allowing end users to verify the correctness of replies. Additionally, DNSSEC responses are large and often fragmented, which can harm DNS functionality and cause inefficiency and vulnerabilities. However, a cipher-suite negotiation mechanism has been proposed to reduce response sizes, solve interoperability problems with DNSSEC-signed responses, and prevent reflection and cache poisoning attacks.</p><p>In short, DNSSEC counterattacks the DNS system failure by adding a centralized chain of trust mechanism and allows each name service domain to provide successive verifications through signatures. The chain of trust in DNSSEC is a critical component of its security infrastructure. It is based on the cryptographic validation of the public key, which is established through a hierarchical chain of trust. This chain of trust begins from a secure entry point, such as the root name server, and extends down to the queried zone, with successive verifications of the signature of the public key of a child by its parent. The DNS tree builds this chain of trust from the root to the authoritative server, with each node acting as a certificate authority for its child nodes to avoid blind spots that can be attacked by nefarious players. To trust a zone key, DNSSEC utilizes the DNS-tree model to establish this chain of trust, ensuring the integrity and authenticity of DNS data.</p><p><strong>N.B.</strong> <em>The chain of trust of DNSSEC is not to be confused with the cryptographic measures used for consensus mechanisms for blockchain (decentralized ledger system). The chain of trust in DNSSEC and the cryptographic mechanism of a decentralized ledger system, such as blockchain, exhibit fundamental differences in their design and application.</em></p><p><em>In DNSSEC, the chain of trust is established through a hierarchical model, starting from a trusted name server and extending down to the current source of response through successive verifications of the signature of the public key of a child by its parent. This ensures the integrity and authenticity of DNS data and is crucial for the overall security and reliability of the DNS infrastructure .</em></p><p><em>On the other hand, a decentralized ledger system, like blockchain, operates on the principle of a distributed and immutable ledger, where transactions are coded into blocks and linked to each other in the form of a chain. This enables disparate parties to transact securely without the need to trust each other or a trusted third party, forming the basis of its efficiency in developing decentralized trustless systems .</em></p><p><strong>The importance of DNSSEC in DNS and its role in bridging DNS to ENS— the beauty of combining Web2 and Web3 to orchestrate both information and value</strong></p><p>Web3 stands for the web of value built on the premise of trust technology/blockchain. Web2 stands for the web of information built on the foundation of the Internet. Historically, the Internet appeared first during the cold war and then the web came along. The whole Web is built on top of the axioms of the Internet and the Web. Thus, a Web3 without Web2 would be like building a castle on the air. Here is an interesting example to illustrate:</p><p>Ethereum Domain Service (ENS) is the largest Web3 domain name service registrar built on Ethereum. It allows users to register human-readable domain names on Ethereum virtual machines instead of naming themselves hexadecimal addresses. The registered domain names then belonged to the registrants and can be traded without manual brokerage on decentralized marketplaces like OpenSea. However, in order to deploy a Web2 domain name on chain, things can get complicated.</p><p>On ENS, if one types in London.wtf (a web3 domain name), one needs to manually enable DNSSEC to allow offchain authentication by submitting a text proof of the public key for the domain you want to deploy. Such that ENS can allow bridging of domain names between off chain world and onchain world.</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/0*Fr8BHgK7yvwuUcvf" /><figcaption>On ENS search engine, to enable ENS/DNS resolution, one needs to enable DNSSEC for the to-be-resolved DNS on its orginal domain registrar.</figcaption></figure><p>Resolving DNS in ENS would require user to enable DNSSEC on the Web2 domain registrar and upload a txt record.</p><p><strong>What DNSSEC does not solve (no encryption), Where does the DNS security’s future lie…</strong></p><p>DNSSEC, while a sufficiently good advancement in securing the Domain Name System (DNS), has several limitations.</p><p>*DNSSEC is only a good protocol as opposed to a <strong>critical</strong> protocol to DNS. According to <a href="https://icannwiki.org/Paul_Hoffman">Paul Hoffman</a>, a Principal Technologist at ICANN with extensive authorship in the areas of DNSSEC, “<em>After 13 years, only about a third of zones sign with DNSSEC, and a third of DNS users rely on a resolver that verifies DNSSEC. Thus, it is not a “critical” security protocol at all: it was a very good attempt that has only mildly succeeded</em>.”</p><p>This limited adoption hinders the widespread effectiveness of DNSSEC in enhancing the security and integrity of the DNS. Additionally, DNSSEC has been abused in some of the largest Denial of Service (DoS) attacks, indicating vulnerabilities and potential misuse.</p><p>Furthermore, the validation of resolvers and the limited number of users being protected by DNSSEC have raised concerns about its overall effectiveness in mitigating DNS-related security threats.</p><p>To address some of the limitations of DNSSEC, the role of DANE (DNS-based Authentication of Named Entities) has been proposed. DANE leverages DNSSEC to associate digital certificates with domain names, providing a more secure and authenticated approach to establish encryption for internet services.</p><p>By using DANE, organizations can directly specify the keys and certificates that are authorized to represent their domains, thereby enhancing security and mitigating some of the limitations of traditional certification authorities.</p><p>In conclusion, the limitations of DNSSEC, including its limited deployment, susceptibility to abuse in DoS attacks, and concerns about the effectiveness of validation and user protection, highlight the need for complementary technologies like DANE to address these shortcomings and further enhance the security of the DNS.</p><p><strong>Reference:</strong></p><ol><li><a href="https://www.youtube.com/watch?v=MrtsKTC3KDM">https://www.youtube.com/watch?v=MrtsKTC3KDM</a> (F5 DevCentral)</li><li><a href="https://www.youtube.com/watch?v=WrHrtXvO1qM">https://www.youtube.com/watch?v=WrHrtXvO1qM</a> (NANOG)</li><li><a href="https://www.youtube.com/watch?v=uOfonONtIuk&amp;list=PLPGftYF5tAibl2kKU2hmhJ7WxBpDpa3k1">https://www.youtube.com/watch?v=uOfonONtIuk&amp;list=PLPGftYF5tAibl2kKU2hmhJ7WxBpDpa3k1</a> (Numberphile)</li><li><a href="https://www.youtube.com/watch?v=7MT1F0O3_Yw&amp;list=PLPGftYF5tAibl2kKU2hmhJ7WxBpDpa3k1&amp;index=2">https://www.youtube.com/watch? v=7MT1F0O3_Yw&amp;list=PLPGftYF5tAibl2kKU2hmhJ7WxBpDpa3k1&amp;index=2</a> (Numberphile)</li></ol><p>The research of the article is supported by <a href="https://scite.ai/">scite.ai</a>:</p><p>Anagnostopoulos, M. Το πρωτόκολλο dns ως πολυλειτουργικός φορέας επίθεσης.. <a href="https://doi.org/10.12681/eadd/41026">https://doi.org/10.12681/eadd/41026</a> Ateniese, G. and Mangard, S. (2001). A new approach to dns security (dnssec).. <a href="https://doi.org/10.1145/501983.501996">https://doi.org/10.1145/501983.501996</a> Chandramouli, R. and Rose, S. (2010). Secure domain name system (dns) deployment guide.. <a href="https://doi.org/10.6028/nist.sp.800-81r1">https://doi.org/10.6028/nist.sp.800-81r1</a> Guette, G., Cousin, B., &amp; Fort, D. (2005). Algorithm for dnssec trusted key rollover., 679–688. <a href="https://doi.org/10.1007/978-3-540-30582-8_71">https://doi.org/10.1007/978-3-540-30582-8_71</a> Guette, G., Cousin, B., &amp; Fort, D. (2005). Gds resource record: generalization ofthe delegation signer model., 844–851. <a href="https://doi.org/10.1007/978-3-540-31957-3_95">https://doi.org/10.1007/978-3-540-31957-3_95</a> Herzberg, A. and Shulman, H. (2012). Security of patched dns., 271–288. <a href="https://doi.org/10.1007/978-3-642-33167-1_16">https://doi.org/10.1007/978-3-642-33167-1_16</a> Herzberg, A. and Shulman, H. (2013). Dnssec: security and availability challenges.. <a href="https://doi.org/10.1109/cns.2013.6682730">https://doi.org/10.1109/cns.2013.6682730</a> Herzberg, A. and Shulman, H. (2013). Socket overloading for fun and cache-poisoning.. <a href="https://doi.org/10.1145/2523649.2523662">https://doi.org/10.1145/2523649.2523662</a> Herzberg, A., Shulman, H., &amp; Crispo, B. (2014). Less is more.. <a href="https://doi.org/10.1145/2664243.2664283">https://doi.org/10.1145/2664243.2664283</a> Jalalzai, M., Shahid, W., &amp; Iqbal, W. (2015). Dns security challenges and best practices to deploy secure dns with digital signatures.. <a href="https://doi.org/10.1109/ibcast.2015.7058517">https://doi.org/10.1109/ibcast.2015.7058517</a> Kang, A., Spaulding, J., &amp; Mohaisen, A. (2016). Domain name system security and privacy: old problems and new challenges.. <a href="https://doi.org/10.48550/arxiv.1606.07080">https://doi.org/10.48550/arxiv.1606.07080</a> Kang, A., Spaulding, J., &amp; Mohaisen, A. (2016). Domain name system security and privacy: old problems and new challenges.. <a href="https://doi.org/10.48550/arxiv.1606.07080">https://doi.org/10.48550/arxiv.1606.07080</a> Ma, T., Xu, C., Yang, S., Huang, Y., Kuang, X., Tang, H., … &amp; Grieco, L. (2022). An intelligent proactive defense against the client‐side dns cache poisoning attack via self‐checking deep reinforcement learning. International Journal of Intelligent Systems, 37(10), 8170–8197. <a href="https://doi.org/10.1002/int.22934">https://doi.org/10.1002/int.22934</a> Osterweil, E., Pappas, V., Massey, D., &amp; Zhang, L. (2007). Zone state revocation for dnssec.. <a href="https://doi.org/10.1145/1352664.1352677">https://doi.org/10.1145/1352664.1352677</a> Osterweil, E., Ryan, M., Massey, D., &amp; Zhang, L. (2008). Quantifying the operational status of the dnssec deployment.. <a href="https://doi.org/10.1145/1452520.1452548">https://doi.org/10.1145/1452520.1452548</a> Osterweil, E., Tehrani, P., Schmidt, T., &amp; Wählisch, M. (2021). From the beginning: key transitions in the first 15 years of dnssec.. <a href="https://doi.org/10.48550/arxiv.2109.08783">https://doi.org/10.48550/arxiv.2109.08783</a> Sun, Y., Liu, R., &amp; Liu, Y. (2010). Research and implementation of dnssec monitoring system.. <a href="https://doi.org/10.1109/icmlc.2010.5580489">https://doi.org/10.1109/icmlc.2010.5580489</a> Trostle, J., Besien, B., &amp; Pujari, A. (2010). Protecting against dns cache poisoning attacks.. <a href="https://doi.org/10.1109/npsec.2010.5634454">https://doi.org/10.1109/npsec.2010.5634454</a> Wang, Z. (2014). Seamless transition of domain name system (dns) authoritative servers. Scientific Research and Essays, 9(12), 566–570. <a href="https://doi.org/10.5897/sre2013.5741">https://doi.org/10.5897/sre2013.5741</a> Wessels, D., Heidemann, J., Zhu, L., Mankin, A., &amp; Hoffman, P. (2016). Specification for dns over transport layer security (tls).. <a href="https://doi.org/10.17487/rfc7858">https://doi.org/10.17487/rfc7858</a> Yang, H., Osterweil, E., Massey, D., Lu, S., &amp; Zhang, L. (2011). Deploying cryptography in internet-scale systems: a case study on dnssec. Ieee Transactions on Dependable and Secure Computing, 8(5), 656–669. <a href="https://doi.org/10.1109/tdsc.2010.10">https://doi.org/10.1109/tdsc.2010.10</a> Yuan, L., Chen, C., Mohapatra, P., Chuah, C., &amp; Kant, K. (2013). A proxy view of quality of domain name service, poisoning attacks and survival strategies. Acm Transactions on Internet Technology, 12(3), 1–26. <a href="https://doi.org/10.1145/2461321.2461324">https://doi.org/10.1145/2461321.2461324</a></p><img src="https://medium.com/_/stat?event=post.clientViewed&referrerSource=full_rss&postId=028c1dc6a700" width="1" height="1" alt="">]]></content:encoded>
        </item>
    </channel>
</rss>