Editing 1698: Theft Quadrants

Jump to: navigation, search

Warning: You are not logged in. Your IP address will be publicly visible if you make any edits. If you log in or create an account, your edits will be attributed to your username, along with other benefits.

The edit can be undone. Please check the comparison below to verify that this is what you want to do, and then save the changes below to finish undoing the edit.
Latest revision Your text
Line 22: Line 22:
 
In the title text Randall implies that stealing the tinyurl.com domain could happen when it next expires. A [https://reports.internic.net/cgi/whois?whois_nic=tinyurl.com&type=domain whois search] as of February 2021 finds that the tinyurl.com domain is next due for renewal in January 2029. However, [https://www.icann.org/resources/pages/expired-2013-05-03-en rule changes made by ICANN] (the organization in charge of domain name registrations) now make it effectively impossible to steal a domain name because the owner allowed its registration to lapse. Current rules for .com registrations now allow for the original owner to renew their domain name after it expires during a 0-45 day auto-renew grace period. The exact length of this grace period depends on what company the domain is registered with. All registrars are then required to give a 30 day redemption grace period during which the domain may be renewed with penalty. As a result, tinyurl.com would have a 30-75 day period after expiration during which the domain is not available for registration by a third party. ICANN rules state that DNS resolution must be stopped during the redemption grace period, which means that there will be a 30 day period during which tinyurl.com will no longer work but the company will have the ability to quickly restore ownership of their domain. It is very unlikely that any company that is still in business would not notice that their domain name has expired before the end of the 30 day redemption grace period.
 
In the title text Randall implies that stealing the tinyurl.com domain could happen when it next expires. A [https://reports.internic.net/cgi/whois?whois_nic=tinyurl.com&type=domain whois search] as of February 2021 finds that the tinyurl.com domain is next due for renewal in January 2029. However, [https://www.icann.org/resources/pages/expired-2013-05-03-en rule changes made by ICANN] (the organization in charge of domain name registrations) now make it effectively impossible to steal a domain name because the owner allowed its registration to lapse. Current rules for .com registrations now allow for the original owner to renew their domain name after it expires during a 0-45 day auto-renew grace period. The exact length of this grace period depends on what company the domain is registered with. All registrars are then required to give a 30 day redemption grace period during which the domain may be renewed with penalty. As a result, tinyurl.com would have a 30-75 day period after expiration during which the domain is not available for registration by a third party. ICANN rules state that DNS resolution must be stopped during the redemption grace period, which means that there will be a 30 day period during which tinyurl.com will no longer work but the company will have the ability to quickly restore ownership of their domain. It is very unlikely that any company that is still in business would not notice that their domain name has expired before the end of the 30 day redemption grace period.
  
βˆ’
Another way to steal a domain name would be through {{w|Domain hijacking|domain name hijacking}}. There have been some high profile cases of domain name hijacking, with one of the more notable domains being [http://www.computerworld.com/article/2595655/networking/companies-point-fingers-over-nike-web-site-hijacking.html nike.com in 2000]. However, whether or not this is a risk for any particular domain name is difficult to estimate. Additional security mechanisms such as domain name locking and private registrations have been introduced to mitigate the threat of domain name hijacking. Further, domain name hijacking relies on situation-specific attacks such as hacking email accounts, spoofing emails, and social engineering attacks against either the company who owns the domain name or the company who registers the domain name. For security-conscious companies, such attacks can be impossible, or at least an attacker's success may require security failures in more than one area. A summary of domain hijacking examples including an analysis of how they succeeded and what steps could have prevented them can be found [http://archive.icann.org/en/announcements/hijacking-report-12jul05.pdf here]. In short though, there is no way to say for sure how vulnerable any particular domain name might be to hijacking.
+
Another way to steal a domain name would be through {{w|Domain hijacking|domain name hijacking}}. There have been some high profile cases of domain name hijacking, with one of the more notable domains being [http://www.computerworld.com/article/2595655/networking/companies-point-fingers-over-nike-web-site-hijacking.html nike.com in 2000]. However, whether or not this is a risk for any particular domain name is difficult to estimate. Additional security mechanisms such as domain name locking and private registrations have been introduced to mitigate the threat of domain name hijacking. Further, domain name hijacking relies on situation-specific attacks such as hacking email accounts, spoofing emails, and social engineering attacks against either the company who owns the domain name or the company who registers the domain name. For security-conscious companies such attacks can be impossible, or at least an attacker's success may require security failures in more than one area. A summary of domain hijacking examples including an analysis of how they succeeded and what steps could have prevented them can be found [http://archive.icann.org/en/announcements/hijacking-report-12jul05.pdf here]. In short though, there is no way to say for sure how vulnerable any particular domain name might be to hijacking.
  
 
==Transcript==
 
==Transcript==

Please note that all contributions to explain xkcd may be edited, altered, or removed by other contributors. If you do not want your writing to be edited mercilessly, then do not submit it here.
You are also promising us that you wrote this yourself, or copied it from a public domain or similar free resource (see explain xkcd:Copyrights for details). Do not submit copyrighted work without permission!

To protect the wiki against automated edit spam, we kindly ask you to solve the following CAPTCHA:

Cancel | Editing help (opens in new window)