Published: 2009-12-04
Search giant Google announced on Thursday the public availability of a massive domain-name resolving infrastructure that aims to speed domain-name queries and weed out attempts to abuse or poison domains.
"We believe that a faster DNS infrastructure could significantly improve the browsing experience for all web users," the company said in a statement on its site. "To enhance DNS speed but to also improve security and validity of results, Google Public DNS is trying a few different approaches that we are sharing with the broader web community."
A large part of Google's pitch to users is the company's focus on security: It's resolver network, for example, will randomize source ports and prepend a pseudo-random tag to recursive requests. For the most part, the online giant has done a good job, said HD Moore, chief security officer for Rapid7.
Moore sampled the server 10,000 times to see whether the company implemented reasonable source port randomization. While their is no discernible pattern in Google's source-port assignments, the giant does limit ports to 32,768 and 65,535.
"I only got 10,000 samples — I didn't want to annoy them too much — but it seems like it was sufficiently random," Moore said.
Google's Public DNS service pits the company against other public DNS resolver services, such as OpenDNS, and gives the search giant one more view into how people are using the Internet. However, the privacy aspects of the server did not phase Moore.
"Google already has a pretty good view of where people are going," Moore said. "To some extent, they are getting more information than they might not otherwise, but not a lot more."
If you have tips or insights on this topic, please contact SecurityFocus.
Posted by: Robert Lemos
