OpenDNS

From Wikipedia, the free encyclopedia
OpenDNS
Company typeDNS Resolution Service
Founded1 November 2005
(18 years ago)
 (2005-11-01)[citation needed]
FounderDavid Ulevitch (Founder & CEO) et al.
HeadquartersSan Francisco, California
Number of employees
501–1,000[1]
ParentCisco (2015 (2015)–present)
ASN
  • 36692
Websitewww.opendns.com

OpenDNS is an American company providing Domain Name System (DNS) resolution services—with features such as phishing protection, optional content filtering, and DNS lookup in its DNS servers—and a cloud computing security product suite, Umbrella, designed to protect enterprise customers from malware, botnets, phishing, and targeted online attacks. The OpenDNS Global Network processes an estimated 100 billion DNS queries daily from 85 million users through 25 data centers worldwide.

On August 27, 2015, Cisco acquired OpenDNS for US$635 million in an all-cash transaction, plus retention-based incentives for OpenDNS. OpenDNS's business services were renamed Cisco Umbrella; home products retained the OpenDNS name. Cisco said that it intended to continue development of OpenDNS with its other cloud-based security products, and that it would continue its existing services.

Until June 2014, OpenDNS provided an ad-supported service and a paid advertisement-free service. The services are based on software proprietary to the company.

Products and services[edit]

The name "OpenDNS" refers to the DNS concept that queries are accepted from any source. It is not related to open source software; the service is based on closed-source software.

DNS[edit]

OpenDNS offers DNS resolution as an alternative to using Internet service providers' DNS servers or locally installed DNS servers. OpenDNS has adopted and supports the DNSCurve secure protocol.[2]

OpenDNS provides the following recursive nameserver addresses[3] for public use, mapped to the nearest operational server location by anycast routing.

OpenDNS also provides the following recursive nameserver addresses as part of their FamilyShield[4] parental controls that block pornography, proxy servers, and phishing sites.

OpenDNS Sandbox is an RFC-compliant DNS service that does not provide any level of filtering.

OpenDNS OpenDNS Family Shield OpenDNS Sandbox
Filters domains Yes Yes No
Passes ECS Yes
Validates DNSSEC
Via DoH https://dns.opendns.com/dns-query https://doh.familyshield.opendns.com/dns-query https://doh.sandbox.opendns.com/dns-query
Via DoT dns.opendns.com familyshield.opendns.com sandbox.opendns.com
Via IPv4 208.67.222.222
208.67.220.220
208.67.222.123
208.67.220.123
208.67.222.2
208.67.220.2
Via IPv6[5] 2620:119:35::35
2620:119:53::53
2620:119:35::123
2620:119:53::123
2620:0:ccc::2
2620:0:ccd::2

In July 2013 OpenDNS said that it handled over 50 billion DNS requests daily.[6]

In many cases OpenDNS provides only negligible performance gain,[7] but may process queries more quickly than an ISP with slow DNS servers.[8] DNS query results are sometimes cached by routers (e.g., local ISPs' queries may be cached by ISPs' home routers), the local operating system or applications, so differences in speed may be noticeable only with requests that are not stored in a local cache.

For free personal home use[edit]

On May 13, 2007, OpenDNS launched a domain-blocking service to block web sites or non-web servers by categories, allowing control over the type of sites that may be accessed. The categories can be overridden through individually managed blacklists and whitelists. In 2008, OpenDNS changed from a closed list of blocked domains to a community-driven list allowing subscribers to suggest sites for blocking; if enough subscribers (the number has not been disclosed) concur with the categorization of a site, it is added to the appropriate category for blocking. As of 2014 there were over 60 categories. The basic OpenDNS service does not require users to register, but using the customizable block feature requires registration.[9]

Other free, built-in features include a phishing filter. OpenDNS also run a service called PhishTank for users to submit and review suspected phishing sites.

OpenDNS supports the DNSCrypt protocol, which authenticates DNS traffic between the user's computer and the name servers.[10] This requires installing free software onto supported devices.[11]

In December 2007 OpenDNS began offering the free DNS-O-Matic[12] service to provide a method of sending dynamic DNS (DDNS) updates to several DDNS providers using DynDNS's update API.[13] In October 2009 OpenDNS launched charged-for premium services called Home VIP that offer increased reporting and block features, and other services.

For paid business use[edit]

In 2009 OpenDNS launched OpenDNS Enterprise,[14] a first foray into enterprise-grade network security. OpenDNS Enterprise included the ability to share management of the product across a team, along with an audit log, expanded malware protection, daily network statistic reports, and a custom block page URL.

OpenDNS expanded on the Enterprise product in July 2012 with OpenDNS Insights.[15] This new service featured integration with Microsoft Active Directory, which allowed admins granular control over creating policies on a per-user, per-device, and per-group basis.

Umbrella[edit]

In November 2012 OpenDNS launched its network security product suite called Umbrella,[16] designed to enforce security policies for mobile employees who work beyond the corporate network using roaming devices such as Windows and Mac laptops, iPhones, and iPads, and provides granular network security for all devices behind the network perimeter. In February 2013 the company launched the OpenDNS Security Graph[17] to support Umbrella. Security graph is a data-driven threat intelligence engine that automatically updates malware, botnet, and phishing domain and IP blacklists enforced by Umbrella. The data is sourced from the DNS requests OpenDNS receives, plus the BGP routing tables that are managed by OpenDNS's network operations center.

Added features[edit]

OpenDNS introduced the Investigate feature to Umbrella in November 2013. It allows security teams to compare local to global traffic to help determine the intent of an attack, and help incident response teams prioritize events. In January 2014 the Intelligent Proxy[18] feature was added to the Umbrella suite. The OpenDNS Intelligent Proxy only proxies connections if the requested domain is scored as suspicious or tagged as partially malicious by OpenDNS Security Graph.

One month later OpenDNS announced a technology integration partnership with FireEye.[19] The collaboration allows indicators of compromise to be forwarded from FireEye’s real-time notification system to Umbrella, extending FireEye’s protection to mobile employees and branch offices.

Umbrella for MSPs[edit]

There is a distinct Umbrella package for MSPs.[20] It features the same protection as the regular business packages, but offers additional MSP features: a centralized multi-tenant dashboard, on-demand monthly licensing, and ConnectWise and Autotask PSA integrations.

History[edit]

In July 2006 OpenDNS was launched by computer scientist and entrepreneur David Ulevitch, providing recursive DNS resolution. It received venture capital funding from Minor Ventures, led by CNET founder Halsey Minor. In October 2006 OpenDNS launched PhishTank, an online collaborative anti-phishing database. Before 2007 OpenDNS was using the DNS Update API from DynDNS to handle updates from users with dynamic IPs.[21] In June 2007 OpenDNS started advanced web filtering to optionally block "adult content" for their free accounts. Nand Mulchandani, former head of VMware's security group, left VMware to join OpenDNS as new CEO in November 2008, replacing founder David Ulevitch, who remained as the company's chief technology officer.[22] David Ulevitch resumed his post as CEO of OpenDNS in late 2009.[23]

Sequoia Capital and Greylock purchased the majority of shares held by Halsey Minor in July 2009 in a secondary transaction. Then, in conjunction with DAG Ventures, all remaining shares held by Minor were purchased in a similar fashion in early 2010.[24] In June 2010 OpenDNS launched "FamilyShield", a service designed to filter out sites with pornographic content. The service uses the DNS addresses 208.67.222.123 and 208.67.220.123.[25] The World Economic Forum announced the company as a Technology Pioneer for 2011.[26] In March 2012 Dan Hubbard, former CTO at Websense, joined OpenDNS as CTO.[27] The OpenDNS Security Labs were founded in December 2012, serving as a hub for research at the company. OpenDNS launched Security Graph, a security intelligence and threat detection engine in February 2013, followed by a Series B funding round.[citation needed] In May 2014 OpenDNS announced a Series C funding round totaling US$35 million, with new investors Glynn Capital Management, Northgate Capital, Mohr Davidow Ventures, Lumia Capital, Evolution Equity Partners, Cisco, Chris Sacca, Naval Ravikant, Elad Gill, as well as previous backers Greylock Partners, Sequoia Capital, and Sutter Hill Ventures.[citation needed]

On August 27, 2015[according to whom?], Cisco acquired OpenDNS for US$635 million in an all-cash transaction, plus retention-based incentives for OpenDNS.[28][29] OpenDNS's business services were renamed Cisco Umbrella; home products retained the OpenDNS name. Cisco said that it intended to continue development of OpenDNS with its other cloud-based security products, and that it would continue its existing services.[30]

Discontinued advertising[edit]

OpenDNS previously earned a portion of its revenue by resolving a domain name to an OpenDNS server when the name is not otherwise defined in DNS. This had the effect that if a user typed a non-existent name in a URL in a web browser, the user saw an OpenDNS search page. Advertisers paid OpenDNS to have advertisements for their sites on this page. This behavior is similar to VeriSign's previous Site Finder or the redirects many ISP's place on their own DNS servers.[31] OpenDNS said that the advertising revenue paid for the free customized DNS service.[32] It was discontinued on June 6, 2014; OpenDNS said this was because of their move towards a security focus in their business.[33][34]

Reception[edit]

In 2007, David Ulevitch explained that, in response to Dell installing "Browser Address Error Redirector" software on their PCs, OpenDNS started resolving requests to Google.com. Some of the traffic is handled by OpenDNS typo-correcting service that corrects mistyped addresses and redirects keyword addresses to OpenDNS's search page, while the rest is transparently passed through to the intended recipient.[35]

Also, a user's search request from the address bar of a browser that is configured to use the Google search engine (with a certain parameter configured) may be covertly redirected to a server owned by OpenDNS (which is within the OpenDNS Terms of Service).[36] Users can disable this behavior by logging into their OpenDNS account and unchecking "OpenDNS proxy" option;[37] Mozilla users can instead install an extension,[38] or change or remove the navclient sourceid from their keyword search URLs.

This redirection breaks some non-Web applications that rely on getting an NXDOMAIN response for non-existent domains, such as e-mail spam filtering, or VPN access where the private network's nameservers are consulted only when the public ones fail to resolve. Breaking local name resolution can be avoided by configuring the DNS addresses only in the forwarders of the local DNS server or router (the WAN/Internet configuration of a router or other gateway). For other purposes, or when the DNS addresses cannot be configured in a forwarder, domains for which an NXDOMAIN response is expected should be added to the Exceptions for VPN Users section of the OpenDNS Dashboard.

Most of the issues above were resolved when OpenDNS discontinued their advertising service, and started responding with NXDOMAIN and SERVFAIL instead of redirecting non-existing domains.[39]

See also[edit]

References[edit]

  1. ^ "Cisco Umbrella | LinkedIn". Retrieved 2024-03-13.
  2. ^ "OpenDNS adopts DNSCurve, official OpenDNS blog entry". Blog.opendns.com. 23 February 2010. Retrieved 2011-08-21.
  3. ^ "OpenDNS > Support > Knowledge Base > Additional (3rd and 4th) OpenDNS Addresses". OpenDNS. Archived from the original on 2013-05-27. Retrieved 2011-09-21.
  4. ^ "Setup Guide". OpenDNS.
  5. ^ "OpenDNS DNSSEC General Availability". OpenDNS.
  6. ^ "Seven Years of Innovation, and Beyond". OpenDNS. 2013-07-30. Archived from the original on 2016-03-16. Retrieved 2016-02-08.
  7. ^ "OpenDNS Review & Rating PCMag.com". pcmag.com. 2007-07-26. Retrieved 2012-02-20.
  8. ^ "OpenDNS: What's Your Take?". Neowin.net. 2007-03-13. Archived from the original on 2008-10-25. Retrieved 2010-04-20.
  9. ^ "How to Protect your Kids Online using OpenDNS". PCTechNotes. 2009-03-17. Retrieved 2011-08-22.
  10. ^ "DNSCrypt A protocol for securing communications between a client and a DNS resolver". www.dnscrypt.org. 2014-08-19. Retrieved 2014-08-19.
  11. ^ "net/dnscrypt-proxy: dnscrypt-proxy-1.4.3 – secure communications between a DNS client and resolver". OpenBSD ports. 2015-01-06. Retrieved 2015-02-09.
  12. ^ "DNS-O-Matic | Distribute dynamic IP changes to multiple services (dnsomatic.com)". dnsomatic.com.
  13. ^ "OpenDNS Announces DNS-O-Matic: Free Service to Simplify Residential ISP and Small Businesses' Dynamic DNS Service". Prweb.com. Retrieved 2010-04-20.
  14. ^ "OpenDNS Deluxe and OpenDNS Enterprise have arrived". OpenDNS. Retrieved 2009-10-21.
  15. ^ "Internet Security Provider OpenDNS Announces Full Availability of Enterprise Insights". HostSearch. Retrieved 2012-07-05.
  16. ^ "Threat intelligence to see attacks before they launch". cisco.com. 2016-06-15.
  17. ^ "Predictive Security Analytics ToolAvailable Free to Researchers". threatpost.com. 2013-02-05.
  18. ^ "Proxy as a Platform". engineering.opendns.com. 2014-05-01.
  19. ^ "OpenDNS Teams with FireEye to Boost Threat Protection". securityweek.com. 2014-02-05.
  20. ^ "OpenDNS Launches Platform to Ease Security Management for MSPs". CRN.com. 2013-06-05.
  21. ^ "Dynamic IP: General Info". OpenDNS. Retrieved 2010-04-20.
  22. ^ "VMware security chief leaves to run OpenDNS". Computerworld.com.au. 2008-11-21. Retrieved 2010-04-20.
  23. ^ Frommer, Dan. "OpenDNS Founder David Ulevitch Takes Back Reins As CEO". Business Insider. Retrieved 8 September 2014.
  24. ^ Arrington, Michael. "Sequoia, Greylock Take Stake In OpenDNS", TechCrunch, July 7, 2009, accessed February 4, 2011.
  25. ^ "Introducing FamilyShield Parental Controls". OpenDNS. 2010-06-23. Retrieved 2010-09-19.
  26. ^ "Thirty-One Visionary Companies Selected as Technology Pioneers 2011".
  27. ^ "OpenDNS hires Websense CTO to guide enterprise DNS security services". TechTarget. 2012-03-02.
  28. ^ "Cisco Announces Intent to Acquire OpenDNS". Cisco. Retrieved 1 July 2015.
  29. ^ David Ulevitch, OpenDNS Founder/CEO (27 August 2015). "Cisco and OpenDNS: A New Day in Cloud Security". OpenDNS. Retrieved 16 March 2016.
  30. ^ "Cisco OpenDNS". OpenDNS. August 2015. Retrieved 16 March 2016.
  31. ^ "OpenDNS knowledge base: OpenDNS is not like Site Finder". Opendns.com. Archived from the original on March 29, 2010. Retrieved 2010-04-20.
  32. ^ "OpenDNS knowledge base: How does OpenDNS make money?". Opendns.com. April 21, 2010. Archived from the original on 2011-06-06.
  33. ^ Keizer, Gregg (30 May 2014). "OpenDNS to yank ads from its free consumer services". Computerworld. Retrieved 8 September 2014.
  34. ^ "OpenDNS is a free, ad-based service". Pcmag.com. 2007-07-26. Retrieved 2011-08-21.
  35. ^ David Ulevitch. OpenDNS Blog » Google turns the page... in a bad way. May 22, 2007. Retrieved 2008-07-04.
  36. ^ Agarwal, Amit (21 March 2008). "Prevent OpenDNS From Redirecting Google Searches - Fix for Firefox & IE Address Bar". Digital Inspiration. Retrieved 31 July 2017.
  37. ^ "Is OpenDNS running a proxy?". Opendns.com. 2009-03-17. Retrieved 2011-10-09.
  38. ^ I'm Feeling Lucky Problem Fix for OpenDNS users, July 3, 2008.
  39. ^ "A NEW REASON TO LOVE OPENDNS: NO MORE ADS". Opendns.com. 2014-06-06. Retrieved 2016-06-01.

External links[edit]