Google Draws House Antitrust Scrutiny of Internet Protocol

bnew

Veteran
Joined
Nov 1, 2015
Messages
53,064
Reputation
8,012
Daps
151,420
Google Draws House Antitrust Scrutiny of Internet Protocol

New standard could alter web’s competitive landscape, cable and wireless companies say
im-111913

Google’s plans have raised concerns among investigators of the House Judiciary Committee. Photo: Dave Paresh/Reuters
By
John D. McKinnon in Washington and
Robert McMillan in San Francisco
Updated Sept. 29, 2019 7:15 pm ET

Congressional antitrust investigators are scrutinizing plans by Google to use a new internet protocol because of concerns that it could give the company a competitive advantage by making it harder for others to access consumer data.

In a letter this month, investigators for the House Judiciary Committee asked Google for information about its “decision regarding whether to adopt or promote the adoption” of the protocol, which the Alphabet Inc. company said is aimed at improving internet security.

House investigators are also asking whether data collected or processed through the new protocol will be used by Google for any commercial purposes, according to the Sept. 13 letter.

The Justice Department is aware of concerns over the protocol change and has recently received complaints, according to a person familiar with the matter.

The new standard would encrypt internet traffic to improve security, which could help prevent hackers from snooping on websites, and from spoofing—faking an internet website to obtain a consumer’s credit-card information or other data.

But the new standard could alter the internet’s competitive landscape, cable and wireless companies said. They fear being shut out from much of user data if browser users move wholesale to this new standard, which many internet service providers don’t currently support. Service providers also worry that Google may compel its Chrome browser users to switch to Google services that support the protocol, something Google said it has no intention of doing.

“Right now, each internet service provider has insight into the traffic of their users, and that’s going to shift” as a result of the change, said Andy Ellis, chief security officer at Akamai Technologies Inc., which provides internet services to corporations but doesn’t support the new standard.

Google, which has vast troves of consumer data because of its domination of search, plans to begin testing the navigation protocol with about 1% of its Chrome browser users next month, a first step toward more widespread adoption of the new technology.

Google said that it is supporting the new technology to improve users’ security and privacy and that its browser changes will leave consumers in charge of who shares their internet surfing data.




09052019techregv2_960x540.jpg

How the Microsoft Antitrust Case Paved the Way for Big Tech
The Department of Justice is investigating the U.S.'s largest tech firms for allegedly monopolistic behavior. Roughly 20 years ago, a similar case threatened to destabilize Microsoft. WSJ explains.
The new standard modernizes a fundamental building block of the internet known as the domain name system, or DNS. This software takes a user’s electronic request for a website name such as wsj.com and, much like a telephone book, provides the series of internet protocol address numbers used by computers.

“Google has no plans to centralize or change people’s DNS providers to Google by default. Any claim that we are trying to become the centralized encrypted DNS provider is inaccurate,” the company said in an emailed statement.

In a blog post earlier this month, the Electronic Frontier Foundation, a digital-rights watchdog group, said it was “very excited” by the new standard’s potential to improve internet privacy.

Nevertheless, the EFF is worried that the new standard could chip away at the decentralized nature of the internet. The solution, the EFF said, is for more service providers to support the new DNS standard so consumers have more choice.

Google and another browser maker, Mozilla Corp., want to encrypt DNS. Doing so could help prevent hackers from spoofing or snooping on the websites that users visit, for example. Such a move could complicate government agencies’ efforts to spy on internet traffic. But it could prevent service providers who don’t support the new standard from observing user behavior in gathering data.

Like Google, Mozilla’s Firefox is planning a small-scale rollout of the protocol, expected to start in the coming weeks. Firefox is planning eventually to move most U.S. consumer users to the new standard, perhaps as early as year’s end.

Mozilla is taking a more aggressive approach than Google. It will move most consumers—but not corporate users who use providers such as Akamai—to the new standard automatically, even if the change involves switching their DNS service providers.

That would shift DNS services used by consumers away from such companies as Comcast Corp. and AT&T Inc.

Mozilla sees the antitrust concerns raised about Google as “fundamentally misleading,” according to Marshall Erwin, Mozilla’s senior director of trust and safety.

Service providers are raising these concerns to undermine the new standard and ensure that they have continued access to DNS data, he said.

While Google is taking a less-aggressive approach than Mozilla, the long-term impact of the change could be enormous. Google’s Chrome has about 64% of the world-wide browser market, according to StatCounter, the internet data tool.

Share Your Thoughts
Do you think Google would be limiting competition on internet navigation? Why or why not? Join the conversation below.

Because Google operates its own DNS service, known as Google Public DNS, some are concerned that the DNS upgrade could ultimately concentrate too much of the internet’s traffic in the hands of Google.

Internet service providers have recently stepped up their criticism over the issue, with some speculating that Google, too, might emulate Firefox’s more aggressive approach, which gives the browser maker control over which DNS service is used.

“Because the majority of world-wide internet traffic…runs through the Chrome browser or the Android operating system, Google could become the overwhelmingly predominant DNS lookup provider,” a coalition of internet service providers said in a Sept. 19 letter to lawmakers. “Google would acquire greater control over user data across networks and devices around the world. This could inhibit competitors and possibly foreclose competition in advertising and other industries.”

They urged lawmakers to call on Google not to impose the new standard as a default standard in Chrome and Android.

A House Energy and Commerce Committee spokesman said the panel has “heard from stakeholders on all sides of this issue” and is following it closely.

Giving Google an unfair advantage in user data isn’t the only concern being raised. Some also contend that the new system could harm security by bypassing parental controls and filters that have been developed under the current, unencrypted system. That has been an issue in the U.K.
 
Last edited:

bnew

Veteran
Joined
Nov 1, 2015
Messages
53,064
Reputation
8,012
Daps
151,420
oh no, the ISPs might not be able to sell our traffic data and show us ads anymore:sadbron:

DNS hijacking - Wikipedia

Manipulation by ISPs
A number of consumer ISPs such as AT&T[3], Cablevision's Optimum Online,[4] CenturyLink,[5] Cox Communications, RCN,[6] Rogers,[7] Charter Communications (Spectrum), Plusnet,[8] Verizon,[9] Sprint,[10] T-Mobile US,[11] Virgin Media,[12][13] Frontier Communications, Bell Sympatico,[14] T-Online,[15] Optus,[16] Mediacom,[17] ONO,[18] TalkTalk,[19] Bigpond (Telstra),[20][21][22][23] TTNET, Türksat, and Telkom Indonesia[24] use DNS hijacking for their own purposes, such as displaying advertisements[25] or collecting statistics. Dutch ISPs XS4ALL and Ziggo use DNS hijacking by court order: they were ordered to block access to The Pirate Bay and display a warning page instead.[26] These practices violate the RFC standard for DNS (NXDOMAIN) responses,[27] and can potentially open users to cross-site scripting attacks.[25]

The concern with DNS hijacking involves this hijacking of the NXDOMAIN response. Internet and intranet applications rely on the NXDOMAIN response to describe the condition where the DNS has no entry for the specified host. If one were to query the invalid domain name (for example www.example.invalid), one should get an NXDOMAIN response – informing the application that the name is invalid and taking the appropriate action (for example, displaying an error or not attempting to connect to the server). However, if the domain name is queried on one of these non-compliant ISPs, one would always receive a fake IP address belonging to the ISP. In a web browser, this behavior can be annoying or offensive as connections to this IP address display the ISP redirect page of the provider, sometimes with advertising, instead of a proper error message. However, other applications that rely on the NXDOMAIN error will instead attempt to initiate connections to this spoofed IP address, potentially exposing sensitive information.

Examples of functionality that breaks when an ISP hijacks DNS:

  • Roaming laptops that are members of a Windows Server domain will falsely be led to believe that they are back on a corporate network because resources such as domain controllers, email servers and other infrastructure will appear to be available. Applications will therefore attempt to initiate connections to these corporate servers, but fail, resulting in degraded performance, unnecessary traffic on the Internet connection and timeouts.
  • Many small office and home networks do not have their own DNS server, relying instead on broadcast name resolution. Many versions of Microsoft Windows default to prioritizing DNS name resolution above NetBIOS name resolution broadcasts; therefore, when an ISP DNS server returns a (technically valid) IP address for the name of the desired computer on the LAN, the connecting computer uses this incorrect IP address and inevitably fails to connect to the desired computer on the LAN. Workarounds include using the correct IP address instead of the computer name, or changing the DhcpNodeType registry value to change name resolution service ordering.[28]
  • Browsers such as Firefox no longer have their 'Browse By Name' functionality (where keywords typed in the address bar take users to the closest matching site).[29]
  • The local DNS client built into modern operating systems will cache results of DNS searches for performance reasons. If a client switches between a home network and a VPN, false entries may remain cached, thereby creating a service outage on the VPN connection.
  • DNSBL anti-spam solutions rely on DNS; false DNS results therefore interfere with their operation.
  • Confidential user data might be leaked by applications that are tricked by the ISP into believing that the servers they wish to connect to are available.
  • User choice over which search engine to consult in the event of a URL being mistyped in a browser is removed as the ISP determines what search results are displayed to the user; functionality of applications like the Google Toolbar does not work correctly.
  • Computers configured to use a split tunnel with a VPN connection will stop working because intranet names that should not be resolved outside the tunnel over the public Internet will start resolving to fictitious addresses, instead of resolving correctly over the VPN tunnel on a private DNS server when an NXDOMAIN response is received from the Internet. For example, a mail client attempting to resolve the DNS A record for an internal mail server may receive a false DNS response that directed it to a paid-results web server, with messages queued for delivery for days while retransmission was attempted in vain.[30]
  • It breaks Web Proxy Autodiscovery Protocol (WPAD) by leading web browsers to believe incorrectly that the ISP has a proxy server configured.
  • It breaks monitoring software. For example, if one periodically contacts a server to determine its health, a monitor will never see a failure unless the monitor tries to verify the server's cryptographic key.
 

bnew

Veteran
Joined
Nov 1, 2015
Messages
53,064
Reputation
8,012
Daps
151,420
Congress Skeptical Over Google's Plan To Launch New Internet Protocol

Congress doesn’t appear particularly happy about Google’s new Internet protocol to implement DNS over TLS in Google Chrome, the Wall Street Journal has learned.

In a letter sent to Google on September 13, antitrust investigators from the House Judiciary Committee have asked information on the adoption of protocol and whether the data channeled through the process would be used by the tech giant for commercial gains.

Investigators’ main concern over the new internet protocol is that it could give Google a competitive advantage since it would become extremely difficult, particularly for Internet providers, to access the consumers’ data.

What is DNS over TLS Internet Protocol?
For those who don’t know, a DNS (Domain Name Server) translates website address from a URL to an IP address, to which then your computer connects to.

While the process is hidden from users, it is easy to read the DNS queries since they are not heavily protected. Hence, even when you use incognito mode, ISP’s are always able to identify the website you’re visiting.

DNS over TLS will encrypt the DNS queries to the same level of protection as HTTPS. With this encryption tech, ISPs won’t be able to sneak peek at the websites that you visit.

The new internet protocol will prove useful against hackers trying to identify the websites we visit. Also, it will save users against hackers faking websites to gain private credentials.

However, the move from Google might turn out disastrous for Internet service providers.

Internet Service Providers’ concerns
The ISP’s believe that the new protocol will shun them from accessing the consumers’ data.

“This could inhibit competitors and possibly foreclose competition in advertising and other industries,” a coalition of internet service providers said in a Sept. 19 letter to authorities.

Another concern of ISPs is that Google’s DNS upgrade would lead to too much of a consumer data control in the hands of the search giant specially because Google Chrome is the most preferred browser among users. Meanwhile, Google has said that it won’t force users to switch to encrypted DNS.

“Because the majority of worldwide internet traffic…runs through the Chrome browser or the Android operating system, Google could become the overwhelmingly predominant DNS lookup provider,” the letter from ISPs reads.

Google isn’t the only one
Interestingly, Google is not the only one advocating for the DNS over TLS upgrade. Mozilla also has similar plans. In fact, the browser is going with a small-scale rollout in the coming weeks.

Marshall Erwin, a senior staff analyst at Firefox, told WSJ that the antitrust claims are “fundamentally misleading.” And ISP just wants a tight hold of user’s data in order to throw targeted ads.
 

xXMASHERXx

Superstar
Joined
May 15, 2012
Messages
8,576
Reputation
1,226
Daps
32,805
“This could inhibit competitors and possibly foreclose competition in advertising and other industries,” a coalition of internet service providers said in a Sept. 19 letter to authorities.

Yet ISPs do exactly this when it comes to internet service and Congress has done nothing to change it.
 
Top