SOPA: The Day (Some Of) The Web Went Dark

Visit the front pageVisit your profilePublish a blog post

On a day when Wikipedia went dark, Google blacked out its Doodle, and various smaller sites also went offline in protest of the controversial SOPA/PIPA anti-privacy bills on Capitol Hill, several key legislators behind the bills withdrew their support today.

But whispers of a possible retreat by some lawmakers yesterday didn’t slow the drumbeat of loud online anti-SOPA/PIPA protests today. Nor did it seem to affect the latest threat by the Anonymous hacktivist group, which says it will again attack Sony--a SOPA supporter--in what this time could be a more aggressive hack, next week.

The Stop Online Piracy Act (SOPA) is the House bill written by Rep. Lamar Smith, R-Tex., and the Protect Intellectual Property Act (PIPA) is the Senate bill, written by Sen. Patrick Leahy, D-Vt. The Senate is poised to vote on PIPA on January 24, but with several key members dropping their support for the bills today in the wake of the blackout protests, its future as well as that of the House’s SOPA bill are now uncertain.

Critics of the bills say it won’t be easy to kill them. “Part of this bill is to make America look serious about IP protection ... so we won’t look weak,” says Robert Graham, CEO of Errata Security, whose website went dark today in solidarity with the online protest.

Several online websites donned blacked out sections of their sites to demonstrate what a censored Internet could mean. Wikipedia and Reddit went completely dark, while Mozilla and others posted their concerns about the legislation on their homepages with black pages and information on the bills and how to contact Congress.

The bills are aimed at protecting copyrights and intellectual property online, and protecting consumers from counterfeit goods sold online by forcing Internet companies to block access to those sites. The legislation gives the U.S. more leverage to institute court orders against overseas websites engaging in these practices.

But critics say the legislation would censor the Internet and impose damaging regulations on U.S. businesses. As Google explained today on its website, the bills would allow the feds to block sites “using methods similar to those employed by China. Among other things, search engines could be forced to delete entire websites from their search results.”

Internet firms would be forced to monitor network usage, but in the end, says Google, it would not stop piracy. “These sites will just change their addresses and continue their criminal activities, while law-abiding companies will suffer high penalties for breaches they can’t possibly control,” according to Google.

Some security experts have been outspoken on the bills’ impact on the Domain Name Service (DNS)’s emerging security protocol, DNSSEC, which is gradually rolling out at the high-level domains. Several key players in security and Internet infrastructure in May of last year wrote a white paper explaining how forcing millions of recursive servers to filter out DNS requests to blacklist and block domain names of servers offering pirated music or other illegally obtained intellectual property would basically cripple DNSSEC, which basically provides verification that a site a user visits is indeed that site and not spoofed or redirected.

Dan Kaminsky, one of the author’s of the paper, said the DNS-filtering approach called for in the legislation wouldn’t work and could be bypassed: "It's like trying to make a telephone that won't carry swear words," Kaminsky said.

Not everyone agrees that the bills would affect DNSSEC. Errata’s Graham, for instance, says they would basically confuse DNS, not break DNSSEC. “You’d have a confused DNS, but not hinder rolling out DNSSEC," he says. “It would not hinder the signing of DNS domains.”

Cricket Liu, vice president of architecture at Infoblox, says the bills might not hurt DNSSEC deployments right now, but it could affect later phases. “I think that while it might not affect DNSSEC deployments in their current form, it would hamstring us when we moved on to an end-to-end deployment. As soon as we try to do validation on clients or in web browsers, filtering responses would wreck DNSSEC,” Liu says.


Author: Kelly Jackson Higgins
Dark Reading 


Published by:

Reza Rafati's picture

Reza Rafati

Hi, I'm the founder of Cyberwarzone and i'm here to collect and share a lot of information. So stay tuned!

The Netherlands

My website