{"id":273,"date":"2016-05-26T11:58:06","date_gmt":"2016-05-26T08:58:06","guid":{"rendered":"http:\/\/www1.ngtech.co.il\/wpe\/?p=273"},"modified":"2016-05-26T12:08:41","modified_gmt":"2016-05-26T09:08:41","slug":"dns-as-an-api","status":"publish","type":"post","link":"https:\/\/www1.ngtech.co.il\/wpe\/2016\/05\/26\/dns-as-an-api\/","title":{"rendered":"DNS as an API"},"content":{"rendered":"<p style=\"text-align: center;\">I am happy to &#8220;Certify&#8221; Squid-Cache version 3.5.19 as<br \/>\n&#8220;Works For Me&#8221; on<br \/>\nCentOS(6+7), SLES(12SP1), Oracle Linux(6+7), RHEL(7), OpenSUSE(42.1 Leap), Debian(8.4), Ubuntu(14.04+16.04)<\/p>\n<p style=\"text-align: justify;\">HTTP is commonly used as an API for many purposes in any industry and in many cases if you analyze an API specs and output you can see that some thinking was invested in it.<\/p>\n<p style=\"text-align: justify;\">Around the Internet we can find many ideas about\u00a0API&#8217;s and while some are well published others are long forgotten and are considered &#8220;old&#8221;. It is true that when you look at some of the API&#8217;s they might look &#8220;cryptic&#8221; or &#8220;malformed&#8221; but these have a purpose. Most of these APIs was meant to be public and as users we have access to all of them. But also many API&#8217;s requires some level of authentication or authorization which was clearly meant to <em><strong>not<\/strong><\/em> be fully public.<\/p>\n<p style=\"text-align: justify;\">Some hackers around the world see the opportunity to &#8220;hack&#8221; something \u00a0when possible.\u00a0From my own API&#8217;s\u00a0which includes:\u00a0HTTP,\u00a0SMTP, DNS, WIFI HotSpot, Moblie and many others it is clear that some might think that it&#8217;s funny to send some malformed packets towards a Router or an AP. But I\u00a0feel that there is a need to clear couple things\u00a0out for\u00a0any hacker.<\/p>\n<p style=\"text-align: justify;\">Behind any System on the Internet there is\u00a0some person which deserves respect. The fact that\u00a0the API is there means that you are not allowed to hack it by it&#8217;s owner unless it was designed for it.<br \/>\nWhen comparing the real world to the\u00a0Internet API&#8217;s\u00a0not anyone can enter any door or any place. Not anyone can\u00a0enter a closed party or a\u00a0secured area. It would be a bit different since the minimum requirements to enter one place would not be the same for another.<br \/>\nFor example, in the hackers world it&#8217;s known that there are ways to prove your value and earn your &#8220;nick&#8221; or &#8220;name&#8221;. Some hacking cultures are restrictive in their approach and respect any API avoiding\u00a0the flame of war. While others think it&#8217;s better to hack some API as a Proof Of Concept or a Proof Of Knowledge.<\/p>\n<p style=\"text-align: justify;\">White? Black? Green? Red? is there any meaning to all of these?<br \/>\nMy answer is that all of these are hats, I do not have one and I do not want one. I am a simple person who has\u00a0couple very simple API&#8217;s under his hands. But I learned\u00a0that to\u00a0give a good example\u00a0is a profession. Specifically it&#8217;s not simple\u00a0to give an example for\u00a0a\u00a0hacking kid. If any hacking kid wants to hack something, like in the real world, there are playgrounds for this sole purpose and an example would be\u00a0<a href=\"http:\/\/canyouhack.it\/\" target=\"_blank\">canyouhack.it<\/a>. Also these days if you want to learn how things work in the micro level we have Lots of free and open Virtualization platforms. These exist in any part of the Industry from the\u00a0electricity level to the application.<br \/>\nAll these tools was meant for the sole purpose of allowing the learning curve to be\u00a0easy simple and safe, to use a real world\u00a0power tool in an environment which will tolerate things which might not be acceptable in the real world API&#8217;s.<\/p>\n<p style=\"text-align: justify;\">Not too far from the invention of HTTP the DNS system was invented and it&#8217;s an API like HTTP and many others. It\u00a0is commonly used over UDP and has a very limited size and format but it has power in the same level as a button on a car dashboard. Technically it can and is being used in many places as a trigger to some system. Indeed UDP is not reliable at the same level of TCP but when the network equipment is trusted then there would be no reason to not use UDP.<\/p>\n<p style=\"text-align: justify;\">A list of things that can be done using a DNS service messaging:<\/p>\n<ul>\n<li style=\"text-align: justify;\">On\\Off electrical switch<\/li>\n<li style=\"text-align: justify;\">Identity signaling(AKA Port Knocking)<\/li>\n<li style=\"text-align: justify;\">Banking transactions<\/li>\n<li style=\"text-align: justify;\">Queue status updates<\/li>\n<li style=\"text-align: justify;\">Alerts Signalling<\/li>\n<\/ul>\n<p style=\"text-align: justify;\">And many other uses which can give an example to what an API can\u00a0look like. I had the pleasure to read couple\u00a0books about APIs\u00a0published by <a href=\"http:\/\/nordicapis.com\/\" target=\"_blank\">Nordic APIs<\/a>\u00a0which gave me\u00a0a\u00a0fresh perspective on how others see an API and what might happen on the wild Internet that requires attention.<\/p>\n<p style=\"text-align: justify;\">One key point which I learned from them is mentioned in\u00a0the video <strong><em><a href=\"https:\/\/www.youtube.com\/watch?v=xjIiYTR-YyE\" target=\"_blank\">&#8220;Good APIs aren\u00b4t built in a day&#8221;<\/a><\/em><\/strong><\/p>\n<p><iframe loading=\"lazy\" title=\"Good APIs aren\u00b4t built in a day\" width=\"474\" height=\"267\" src=\"https:\/\/www.youtube.com\/embed\/xjIiYTR-YyE?feature=oembed\" frameborder=\"0\" allow=\"accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share\" referrerpolicy=\"strict-origin-when-cross-origin\" allowfullscreen><\/iframe><\/p>\n<p>And links\u00a0to books from <a href=\"http:\/\/nordicapis.com\/\" target=\"_blank\">Nordic APIs<\/a>\u00a0\u00a0which I had the pleasure to read:<\/p>\n<blockquote class=\"wp-embedded-content\" data-secret=\"OV5nqEMvSN\"><p><a href=\"https:\/\/nordicapis.com\/ebook-released-securing-the-api-stronghold\/\">eBook Released: Securing the API Stronghold<\/a><\/p><\/blockquote>\n<p><iframe loading=\"lazy\" class=\"wp-embedded-content\" sandbox=\"allow-scripts\" security=\"restricted\" style=\"position: absolute; clip: rect(1px, 1px, 1px, 1px);\" title=\"&#8220;eBook Released: Securing the API Stronghold&#8221; &#8212; Nordic APIs\" src=\"https:\/\/nordicapis.com\/ebook-released-securing-the-api-stronghold\/embed\/#?secret=ACfktRbhQ2#?secret=OV5nqEMvSN\" data-secret=\"OV5nqEMvSN\" width=\"474\" height=\"267\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\"><\/iframe><\/p>\n<blockquote class=\"wp-embedded-content\" data-secret=\"BpAHdotAeg\"><p><a href=\"https:\/\/nordicapis.com\/api-security-the-4-defenses-of-the-api-stronghold\/\">API Security: The 4 Defenses of The API Stronghold<\/a><\/p><\/blockquote>\n<p><iframe loading=\"lazy\" class=\"wp-embedded-content\" sandbox=\"allow-scripts\" security=\"restricted\" style=\"position: absolute; clip: rect(1px, 1px, 1px, 1px);\" title=\"&#8220;API Security: The 4 Defenses of The API Stronghold&#8221; &#8212; Nordic APIs\" src=\"https:\/\/nordicapis.com\/api-security-the-4-defenses-of-the-api-stronghold\/embed\/#?secret=eMmN4EKrnv#?secret=BpAHdotAeg\" data-secret=\"BpAHdotAeg\" width=\"474\" height=\"267\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\"><\/iframe><\/p>\n<ul>\n<li style=\"text-align: justify;\">&#8220;Works For Me&#8221; means that it was tested on a testing environment under\u00a0real world usage in a forward proxy mode with daily usage\u00a0traffic such as Browsing News, Video, Learning and\u00a0Games sites. Special applications that was tested are\u00a0SKYPE, IRC and couple other applications inside a fully trusted network.<\/li>\n<li style=\"text-align: justify;\">An Advice: Any system which sits against\u00a0a non-trusted and a hostile public or private network should be &#8220;Harden&#8221; both in the\u00a0squid configuration level and other\u00a0lower levels.<\/li>\n<li style=\"text-align: justify;\">This specific version(3.5.19) was tested also on\u00a0Intercept proxy mode and ssl-bump but only on forward-proxy and not Intercept mode.<\/li>\n<\/ul>\n","protected":false},"excerpt":{"rendered":"<p>I am happy to &#8220;Certify&#8221; Squid-Cache version 3.5.19 as &#8220;Works For Me&#8221; on CentOS(6+7), SLES(12SP1), Oracle Linux(6+7), RHEL(7), OpenSUSE(42.1 Leap), Debian(8.4), Ubuntu(14.04+16.04) HTTP is commonly used as an API for many purposes in any industry and in many cases if you analyze an API specs and output you can see that some thinking was invested &hellip; <a href=\"https:\/\/www1.ngtech.co.il\/wpe\/2016\/05\/26\/dns-as-an-api\/\" class=\"more-link\">Continue reading <span class=\"screen-reader-text\">DNS as an API<\/span> <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[],"class_list":["post-273","post","type-post","status-publish","format-standard","hentry","category-uncategorized"],"_links":{"self":[{"href":"https:\/\/www1.ngtech.co.il\/wpe\/wp-json\/wp\/v2\/posts\/273","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www1.ngtech.co.il\/wpe\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www1.ngtech.co.il\/wpe\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www1.ngtech.co.il\/wpe\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www1.ngtech.co.il\/wpe\/wp-json\/wp\/v2\/comments?post=273"}],"version-history":[{"count":3,"href":"https:\/\/www1.ngtech.co.il\/wpe\/wp-json\/wp\/v2\/posts\/273\/revisions"}],"predecessor-version":[{"id":276,"href":"https:\/\/www1.ngtech.co.il\/wpe\/wp-json\/wp\/v2\/posts\/273\/revisions\/276"}],"wp:attachment":[{"href":"https:\/\/www1.ngtech.co.il\/wpe\/wp-json\/wp\/v2\/media?parent=273"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www1.ngtech.co.il\/wpe\/wp-json\/wp\/v2\/categories?post=273"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www1.ngtech.co.il\/wpe\/wp-json\/wp\/v2\/tags?post=273"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}