Blog

  • Domain Name System 

    The Domain Name System (DNS) is a hierarchical and distributed name service that provides a naming system for computers, services, and other resources on the Internet or other Internet Protocol (IP) networks. It associates various information with domain names (identification strings) assigned to each of the associated entities. Most prominently, it translates readily memorized domain names to the numerical IP addresses needed for locating and identifying computer services and devices with the underlying network protocols.[1] The Domain Name System has been an essential component of the functionality of the Internet since 1985.

    The Domain Name System delegates the responsibility of assigning domain names and mapping those names to Internet resources by designating authoritative name servers for each domain. Network administrators may delegate authority over subdomains of their allocated name space to other name servers. This mechanism provides distributed and fault-tolerant service and was designed to avoid a single large central database. In addition, the DNS specifies the technical functionality of the database service that is at its core. It defines the DNS protocol, a detailed specification of the data structures and data communication exchanges used in the DNS, as part of the Internet protocol suite.

    The Internet maintains two principal namespaces, the domain name hierarchy and the IP address spaces.[2] The Domain Name System maintains the domain name hierarchy and provides translation services between it and the address spaces. Internet name servers and a communication protocol implement the Domain Name System. A DNS name server is a server that stores the DNS records for a domain; a DNS name server responds with answers to queries against its database.

    The most common types of records stored in the DNS database are for start of authority (SOA), IP addresses (A and AAAA), SMTP mail exchangers (MX), name servers (NS), pointers for reverse DNS lookups (PTR), and domain name aliases (CNAME). Although not intended to be a general-purpose database, DNS has been expanded over time to store records for other types of data for either automatic lookups, such as DNSSEC records, or for human queries such as responsible person (RP) records. As a general-purpose database, the DNS has also been used in combating unsolicited email (spam) by storing blocklist. The DNS database is conventionally stored in a structured text file, the zone file, but other database systems are common.

    The Domain Name System originally used the User Datagram Protocol (UDP) as transport over IP. Reliability, security, and privacy concerns spawned the use of the Transmission Control Protocol (TCP) as well as numerous other protocol developments.

    Function

    [edit]

    An often-used analogy to explain the DNS is that it serves as the phone book for the Internet by translating human-friendly computer hostnames into IP addresses. For example, the hostname www.example.com within the domain name example.com translates to the addresses 93.184.216.34 (IPv4) and 2606:2800:220:1:248:1893:25c8:1946 (IPv6). The DNS can be quickly and transparently updated, allowing a service’s location on the network to change without affecting the end users, who continue to use the same hostname. Users take advantage of this when they use meaningful Uniform Resource Locators (URLs) and e-mail addresses without having to know how the computer actually locates the services.

    An important and ubiquitous function of the DNS is its central role in distributed Internet services such as cloud services and content delivery networks.[3] When a user accesses a distributed Internet service using a URL, the domain name of the URL is translated to the IP address of a server that is proximal to the user. The key functionality of the DNS exploited here is that different users can simultaneously receive different translations for the same domain name, a key point of divergence from a traditional phone-book view of the DNS. This process of using the DNS to assign proximal servers to users is key to providing faster and more reliable responses on the Internet and is widely used by most major Internet services.[4]

    The DNS reflects the structure of administrative responsibility on the Internet.[5] Each subdomain is a zone of administrative autonomy delegated to a manager. For zones operated by a registry, administrative information is often complemented by the registry’s RDAP and WHOIS services. That data can be used to gain insight on, and track responsibility for, a given host on the Internet.[6]

    History

    [edit]

    Using a simpler, more memorable name in place of a host’s numerical address dates back to the ARPANET era. The Stanford Research Institute (now SRI International) maintained a text file named HOSTS.TXT that mapped host names to the numerical addresses of computers on the ARPANET.[7][8] Elizabeth Feinler developed and maintained the first ARPANET directory.[9][10] Maintenance of numerical addresses, called the Assigned Numbers List, was handled by Jon Postel at the University of Southern California‘s Information Sciences Institute (ISI), whose team worked closely with SRI.[11]

    Addresses were assigned manually. Computers, including their hostnames and addresses, were added to the primary file by contacting the SRI Network Information Center (NIC), directed by Feinler, via telephone during business hours.[12] Later, Feinler set up a WHOIS directory on a server in the NIC for retrieval of information about resources, contacts, and entities.[13] She and her team developed the concept of domains.[13] Feinler suggested that domains should be based on the location of the physical address of the computer.[14] Computers at educational institutions would have the domain edu, for example.[15] She and her team managed the Host Naming Registry from 1972 to 1989.[16]

    By the early 1980s, maintaining a single, centralized host table had become slow and unwieldy and the emerging network required an automated naming system to address technical and personnel issues. Postel directed the task of forging a compromise between five competing proposals of solutions to Paul Mockapetris. Mockapetris instead created the Domain Name System in 1983 while at the University of Southern California.[12][17]

    The Internet Engineering Task Force published the original specifications in RFC 882 and RFC 883 in November 1983.[18][19] These were updated in RFC 973 in January 1986.[20]

    In 1984, four UC Berkeley students, Douglas Terry, Mark Painter, David Riggle, and Songnian Zhou, wrote the first Unix name server implementation for the Berkeley Internet Name Domain, commonly referred to as BIND.[21] In 1985, Kevin Dunlap of DEC substantially revised the DNS implementation. Mike Karels, Phil Almquist, and Paul Vixie then took over BIND maintenance. Internet Systems Consortium was founded in 1994 by Rick AdamsPaul Vixie, and Carl Malamud, expressly to provide a home for BIND development and maintenance. BIND versions from 4.9.3 onward were developed and maintained by ISC, with support provided by ISC’s sponsors. As co-architects/programmers, Bob Halley and Paul Vixie released the first production-ready version of BIND version 8 in May 1997. Since 2000, over 43 different core developers have worked on BIND.[22]

    In November 1987, RFC 1034[23] and RFC 1035[5] superseded the 1983 DNS specifications. Several additional Request for Comments have proposed extensions to the core DNS protocols.[24]

    Structure 

    [edit]

    Domain name space

    [edit]

    The domain name space consists of a tree data structure. Each node or leaf in the tree has a label and zero or more resource records (RR), which hold information associated with the domain name. The domain name itself consists of the label, concatenated with the name of its parent node on the right, separated by a dot.[23]: §3.1 

    The tree sub-divides into zones beginning at the root zone. A DNS zone may consist of as many domains and subdomains as the zone manager chooses. DNS can also be partitioned according to class where the separate classes can be thought of as an array of parallel namespace trees.[23]: §4.2 

    The hierarchical Domain Name System for class Internet, organized into zones, each served by a name server

    Administrative responsibility for any zone may be divided by creating additional zones. Authority over the new zone is said to be delegated to a designated name server. The parent zone ceases to be authoritative for the new zone.[23]: §4.2 

    Domain name syntax, internationalization

    [edit]

    The definitive descriptions of the rules for forming domain names appear in RFC 1035, RFC 1123, RFC 2181, and RFC 5892. A domain name consists of one or more parts, technically called labels, that are conventionally concatenated, and delimited by dots, such as example.com.

    The right-most label conveys the top-level domain; for example, the domain name www.example.com belongs to the top-level domain com.

    The hierarchy of domains descends from right to left; each label to the left specifies a subdivision, or subdomain of the domain to the right. For example, the label example specifies a subdomain of the com domain, and www is a subdomain of example.com. This tree of subdivisions may have up to 127 levels.[25]

    A label may contain zero to 63 characters, because the length is only allowed to take 6 bits. The null label of length zero is reserved for the root zone. The full domain name may not exceed the length of 253 characters in its textual representation (or 254 with the trailing dot).[23] In the internal binary representation of the DNS this maximum length of 253 requires 255 octets of storage, as it also stores the length of the first of many labels and adds last null byte.[5] 255 length is only achieved with at least 6 labels (counting the last null label).[citation needed]

    Although no technical limitation exists to prevent domain name labels from using any character that is representable by an octet, hostnames use a preferred format and character set. The characters allowed in labels are a subset of the ASCII character set, consisting of characters a through zA through Z, digits 0 through 9, and hyphen. This rule is known as the LDH rule (letters, digits, hyphen). Domain names are interpreted in a case-independent manner.[26] Labels may not start or end with a hyphen.[27] An additional rule requires that top-level domain names should not be all-numeric.[27]

    The limited set of ASCII characters permitted in the DNS prevented the representation of names and words of many languages in their native alphabets or scripts. To make this possible, ICANN approved the Internationalizing Domain Names in Applications (IDNA) system, by which user applications, such as web browsers, map Unicode strings into the valid DNS character set using Punycode. In 2009, ICANN approved the installation of internationalized domain name country code top-level domains (ccTLDs). In addition, many registries of the existing top-level domain names (TLDs) have adopted the IDNA system, guided by RFC 5890, RFC 5891, RFC 5892, RFC 5893.

    Name servers

    [edit]

    The Domain Name System is maintained by a distributed database system, which uses the client–server model. The nodes of this database are the name servers. Each domain has at least one authoritative DNS server that publishes information about that domain and the name servers of any domains subordinate to it. The top of the hierarchy is served by the root name servers, the servers to query when looking up (resolving) a TLD.

    Authoritative name server

    [edit]

    An authoritative name server is a name server that only gives answers to DNS queries from data that have been configured by an original source, for example, the domain administrator or by dynamic DNS methods, in contrast to answers obtained via a query to another name server that only maintains a cache of data.

    An authoritative name server can either be a primary server or a secondary server. Historically the terms master/slave and primary/secondary were sometimes used interchangeably[28] but the current practice is to use the latter form. A primary server is a server that stores the original copies of all zone records. A secondary server uses a special automatic updating mechanism in the DNS protocol in communication with its primary to maintain an identical copy of the primary records.

    Every DNS zone must be assigned a set of authoritative name servers. This set of servers is stored in the parent domain zone with name server (NS) records.

    An authoritative server indicates its status of supplying definitive answers, deemed authoritative, by setting a protocol flag, called the “Authoritative Answer” (AAbit in its responses.[5] This flag is usually reproduced prominently in the output of DNS administration query tools, such as dig, to indicate that the responding name server is an authority for the domain name in question.[5]

    When a name server is designated as the authoritative server for a domain name for which it does not have authoritative data, it presents a type of error called a “lame delegation” or “lame response”.[29][30]

    Operation

    [edit]

    Address resolution mechanism

    [edit]

    Domain name resolvers determine the domain name servers responsible for the domain name in question by a sequence of queries starting with the right-most (top-level) domain label.

    A DNS resolver that implements the iterative approach mandated by RFC 1034; in this case, the resolver consults three name servers to resolve the fully qualified domain name “www.wikipedia.org”.

    For proper operation of its domain name resolver, a network host is configured with an initial cache (hints) of the known addresses of the root name servers. The hints are updated periodically by an administrator by retrieving a dataset from a reliable source.

    Assuming the resolver has no cached records to accelerate the process, the resolution process starts with a query to one of the root servers. In typical operation, the root servers do not answer directly, but respond with a referral to more authoritative servers, e.g., a query for “www.wikipedia.org” is referred to the org servers. The resolver now queries the servers referred to, and iteratively repeats this process until it receives an authoritative answer. The diagram illustrates this process for the host that is named by the fully qualified domain name “www.wikipedia.org”.

    This mechanism would place a large traffic burden on the root servers, if every resolution on the Internet required starting at the root. In practice caching is used in DNS servers to off-load the root servers, and as a result, root name servers actually are involved in only a relatively small fraction of all requests.

    Recursive and caching name server

    [edit]

    In theory, authoritative name servers are sufficient for the operation of the Internet. However, with only authoritative name servers operating, every DNS query must start with recursive queries at the root zone of the Domain Name System and each user system would have to implement resolver software capable of recursive operation.[31]

    To improve efficiency, reduce DNS traffic across the Internet, and increase performance in end-user applications, the Domain Name System supports DNS cache servers which store DNS query results for a period of time determined in the configuration (time-to-live) of the domain name record in question. Typically, such caching DNS servers also implement the recursive algorithm necessary to resolve a given name starting with the DNS root through to the authoritative name servers of the queried domain. With this function implemented in the name server, user applications gain efficiency in design and operation.

    The combination of DNS caching and recursive functions in a name server is not mandatory; the functions can be implemented independently in servers for special purposes.

    Internet service providers typically provide recursive and caching name servers for their customers. In addition, many home networking routers implement DNS caches and recursion to improve efficiency in the local network.

    DNS resolvers

    [edit]

    The client side of the DNS is called a DNS resolver. A resolver is responsible for initiating and sequencing the queries that ultimately lead to a full resolution (translation) of the resource sought, e.g., translation of a domain name into an IP address. DNS resolvers are classified by a variety of query methods, such as recursivenon-recursive, and iterative. A resolution process may use a combination of these methods.[23]

    In a non-recursive query, a DNS resolver queries a DNS server that provides a record either for which the server is authoritative, or it provides a partial result without querying other servers. In case of a caching DNS resolver, the non-recursive query of its local DNS cache delivers a result and reduces the load on upstream DNS servers by caching DNS resource records for a period of time after an initial response from upstream DNS servers.

    In a recursive query, a DNS resolver queries a single DNS server, which may in turn query other DNS servers on behalf of the requester. For example, a simple stub resolver running on a home router typically makes a recursive query to the DNS server run by the user’s ISP. A recursive query is one for which the DNS server answers the query completely by querying other name servers as needed. In typical operation, a client issues a recursive query to a caching recursive DNS server, which subsequently issues non-recursive queries to determine the answer and send a single answer back to the client. The resolver, or another DNS server acting recursively on behalf of the resolver, negotiates use of recursive service using bits in the query headers. DNS servers are not required to support recursive queries.

    The iterative query procedure is a process in which a DNS resolver queries a chain of one or more DNS servers. Each server refers the client to the next server in the chain, until the current server can fully resolve the request. For example, a possible resolution of www.example.com would query a global root server, then a “com” server, and finally an “example.com” server.

    Circular dependencies and glue records

    [edit]

    Name servers in delegations are identified by name, rather than by IP address. This means that a resolving name server must issue another DNS request to find out the IP address of the server to which it has been referred. If the name given in the delegation is a subdomain of the domain for which the delegation is being provided, there is a circular dependency.

    In this case, the name server providing the delegation must also provide one or more IP addresses for the authoritative name server mentioned in the delegation. This information is called glue. The delegating name server provides this glue in the form of records in the additional section of the DNS response, and provides the delegation in the authority section of the response. A glue record is a combination of the name server and IP address.

    For example, if the authoritative name server for example.org is ns1.example.org, a computer trying to resolve www.example.org first resolves ns1.example.org. As ns1 is contained in example.org, this requires resolving example.org first, which presents a circular dependency. To break the dependency, the name server for the top level domain org includes glue along with the delegation for example.org. The glue records are address records that provide IP addresses for ns1.example.org. The resolver uses one or more of these IP addresses to query one of the domain’s authoritative servers, which allows it to complete the DNS query.

    Record caching

    [edit]

    A common approach to reduce the burden on DNS servers is to cache the results of name resolution locally or on intermediary resolver hosts. Each DNS query result comes with a time to live (TTL), which indicates how long the information remains valid before it needs to be discarded or refreshed. This TTL is determined by the administrator of the authoritative DNS server and can range from a few seconds to several days or even weeks.[32]

    As a result of this distributed caching architecture, changes to DNS records do not propagate throughout the network immediately, but require all caches to expire and to be refreshed after the TTL. RFC 1912 conveys basic rules for determining appropriate TTL values.

    Some resolvers may override TTL values, as the protocol supports caching for up to sixty-eight years or no caching at all. Negative caching, i.e. the caching of the fact of non-existence of a record, is determined by name servers authoritative for a zone which must include the Start of Authority (SOA) record when reporting no data of the requested type exists. The value of the minimum field of the SOA record and the TTL of the SOA itself is used to establish the TTL for the negative answer.

    Reverse lookup

    [edit]

    reverse DNS lookup is a query of the DNS for domain names when the IP address is known. Multiple domain names may be associated with an IP address. The DNS stores IP addresses in the form of domain names as specially formatted names in pointer (PTR) records within the infrastructure top-level domain arpa. For IPv4, the domain is in-addr.arpa. For IPv6, the reverse lookup domain is ip6.arpa. The IP address is represented as a name in reverse-ordered octet representation for IPv4, and reverse-ordered nibble representation for IPv6.

    When performing a reverse lookup, the DNS client converts the address into these formats before querying the name for a PTR record following the delegation chain as for any DNS query. For example, assuming the IPv4 address 208.80.152.2 is assigned to Wikimedia, it is represented as a DNS name in reverse order: 2.152.80.208.in-addr.arpa. When the DNS resolver gets a pointer (PTR) request, it begins by querying the root servers, which point to the servers of American Registry for Internet Numbers (ARIN) for the 208.in-addr.arpa zone. ARIN’s servers delegate 152.80.208.in-addr.arpa to Wikimedia to which the resolver sends another query for 2.152.80.208.in-addr.arpa, which results in an authoritative response.

    Client lookup

    [edit]

    DNS resolution sequence

    Users generally do not communicate directly with a DNS resolver. Instead DNS resolution takes place transparently in applications such as web browserse-mail clients, and other Internet applications. When an application makes a request that requires a domain name lookup, such programs send a resolution request to the DNS resolver in the local operating system, which in turn handles the communications required.

    The DNS resolver will almost invariably have a cache (see above) containing recent lookups. If the cache can provide the answer to the request, the resolver will return the value in the cache to the program that made the request. If the cache does not contain the answer, the resolver will send the request to one or more designated DNS servers. In the case of most home users, the Internet service provider to which the machine connects will usually supply this DNS server: such a user will either have configured that server’s address manually or allowed DHCP to set it; however, where systems administrators have configured systems to use their own DNS servers, their DNS resolvers point to separately maintained name servers of the organization. In any event, the name server thus queried will follow the process outlined above, until it either successfully finds a result or does not. It then returns its results to the DNS resolver; assuming it has found a result, the resolver duly caches that result for future use, and hands the result back to the software which initiated the request.

    Broken resolvers

    [edit]

    Some large ISPs have configured their DNS servers to violate rules, such as by disobeying TTLs, or by indicating that a domain name does not exist just because one of its name servers does not respond.[33]

    Some applications such as web browsers maintain an internal DNS cache to avoid repeated lookups via the network. This practice can add extra difficulty when debugging DNS issues as it obscures the history of such data. These caches typically use very short caching times on the order of one minute.[34]

    Internet Explorer represents a notable exception: versions up to IE 3.x cache DNS records for 24 hours by default. Internet Explorer 4.x and later versions (up to IE 8) decrease the default timeout value to half an hour, which may be changed by modifying the default configuration.[35]

    When Google Chrome detects issues with the DNS server it displays a specific error message.

    Other applications

    [edit]

    The Domain Name System includes several other functions and features.

    Hostnames and IP addresses are not required to match in a one-to-one relationship. Multiple hostnames may correspond to a single IP address, which is useful in virtual hosting, in which many web sites are served from a single host. Alternatively, a single hostname may resolve to many IP addresses to facilitate fault tolerance and load distribution to multiple server instances across an enterprise or the global Internet.

    DNS serves other purposes in addition to translating names to IP addresses. For instance, mail transfer agents use DNS to find the best mail server to deliver e-mail: An MX record provides a mapping between a domain and a mail exchanger; this can provide an additional layer of fault tolerance and load distribution.

    The DNS is used for efficient storage and distribution of IP addresses of block-listed email hosts. A common method is to place the IP address of the subject host into the sub-domain of a higher level domain name, and to resolve that name to a record that indicates a positive or a negative indication.

    For example:

    • The address 203.0.113.5 is block-listed. It points to 5.113.0.203.blocklist.example, which resolves to 127.0.0.1.
    • The address 203.0.113.6 is not block-listed and points to 6.113.0.203.blocklist.example. This hostname is either not configured, or resolves to 127.0.0.2.

    E-mail servers can query blocklist.example to find out if a specific host connecting to them is in the block list. Many such block lists, either subscription-based or free of cost, are available for use by email administrators and anti-spam software.

    To provide resilience in the event of computer or network failure, multiple DNS servers are usually provided for coverage of each domain. At the top level of global DNS, thirteen groups of root name servers exist, with additional “copies” of them distributed worldwide via anycast addressing.

    Dynamic DNS (DDNS) updates a DNS server with a client IP address on-the-fly, for example, when moving between ISPs or mobile hot spots, or when the IP address changes administratively.

    DNS message format

    [edit]

    The DNS protocol uses two types of DNS messages, queries and responses; both have the same format. Each message consists of a header and four sections: question, answer, authority, and an additional space. A header field (flags) controls the content of these four sections.[23]

    The header section consists of the following fields: IdentificationFlagsNumber of questionsNumber of answersNumber of authority resource records (RRs), and Number of additional RRs. Each field is 16 bits long, and appears in the order given. The identification field is used to match responses with queries. After the flags word, the header ends with four 16-bit integers which contain the number of records in each of the sections that follow, in the same order.

    OffsetOctet0123
    OctetBit012345678910111213141516171819202122232425262728293031
    00Transaction IDQROPCODEAATCRDRAZADCDRCODE
    432Number of QuestionsNumber of Answers
    864Number of Authority RRsNumber of additional RRs

    Transaction ID: 16 bitsTransaction IDFlags: 16 bitsThe flag field consists of sub-fields as follows:QR: 1 bitIndicates if the message is a query (0) or a reply (1).OPCODE: 4 bitsThe type can be QUERY (standard query, 0), IQUERY (inverse query, 1), or STATUS (server status request, 2).AA: 1 bitAuthoritative Answer, in a response, indicates if the DNS server is authoritative for the queried hostname.TC: 1 bitTrunCation, indicates that this message was truncated due to excessive length.RD: 1 bitRecursion Desired, indicates if the client means a recursive query.RA: 1 bitRecursion Available, in a response, indicates if the replying DNS server supports recursion.Z: 1 bit; (Z) == 0Zero, reserved for future use.AD: 1 bitAuthentic Data, in a response, indicates if the replying DNS server verified the data.CD: 1 bitChecking Disabled, in a query, indicates that non-verified data is acceptable in a response.RCODE: 4 bitsResponse code, can be NOERROR (0), FORMERR (1, Format error), SERVFAIL (2), NXDOMAIN (3, Nonexistent domain), etc.[36]Number of Questions: 16 bitsNumber of Questions.Number of Answers: 16 bitsNumber of Answers.Number of Authority RRs: 16 bitsNumber of Authority Resource Records.Number of Additional RRs: 16 bitsNumber of Additional Resource Records.

    Question section

    [edit]

    The question section has a simpler format than the resource record format used in the other sections. Each question record (there is usually just one in the section) contains the following fields:

    FieldDescriptionLength (octets)
    NAMEName of the requested resourceVariable
    TYPEType of RR (A, AAAA, MX, TXT, etc.)2
    CLASSClass code2

    The domain name is broken into discrete labels which are concatenated; each label is prefixed by the length of that label.[37]

    Resource records

    [edit]

    The Domain Name System specifies a database of information elements for network resources. The types of information elements are categorized and organized with a list of DNS record types, the resource records (RRs). Each record has a type (name and number), an expiration time (time to live), a class, and type-specific data. Resource records of the same type are described as a resource record set (RRset), having no special ordering. DNS resolvers return the entire set upon query, but servers may implement round-robin ordering to achieve load balancing. In contrast, the Domain Name System Security Extensions (DNSSEC) work on the complete set of resource record in canonical order.

    When sent over an Internet Protocol network, all records (answer, authority, and additional sections) use the common format specified in RFC 1035:[38]: §3 

    FieldDescriptionLength (octets)
    NAMEName of the node to which this record pertainsVariable
    TYPEType of RR in numeric form (e.g., 15 for MX RRs)2
    CLASSClass code2
    TTLCount of seconds that the RR stays valid (The maximum is 231−1, which is about 68 years)4
    RDLENGTHLength of RDATA field (specified in octets)2
    RDATAAdditional RR-specific dataVariable, as per RDLENGTH

    NAME is the fully qualified domain name of the node in the tree.[clarification needed] On the wire, the name may be shortened using label compression where ends of domain names mentioned earlier in the packet can be substituted for the end of the current domain name.

    TYPE is the record type. It indicates the format of the data and it gives a hint of its intended use. For example, the A record is used to translate from a domain name to an IPv4 address, the NS record lists which name servers can answer lookups on a DNS zone, and the MX record specifies the mail server used to handle mail for a domain specified in an e-mail address.

    RDATA is data of type-specific relevance, such as the IP address for address records, or the priority and hostname for MX records. Well known record types may use label compression in the RDATA field, but “unknown” record types must not (RFC 3597).

    The CLASS of a record is set to IN (for Internet) for common DNS records involving Internet hostnames, servers, or IP addresses. In addition, the classes Chaos (CH) and Hesiod (HS) exist.[38]: 11  Each class is an independent name space with potentially different delegations of DNS zones.

    In addition to resource records defined in a zone file, the domain name system also defines several request types that are used only in communication with other DNS nodes (on the wire), such as when performing zone transfers (AXFR/IXFR) or for EDNS (OPT).

    Wildcard records

    [edit]

    The domain name system supports wildcard DNS records which specify names that start with the asterisk label*, e.g., *.example.[23][39] DNS records belonging to wildcard domain names specify rules for generating resource records within a single DNS zone by substituting whole labels with matching components of the query name, including any specified descendants. For example, in the following configuration, the DNS zone x.example specifies that all subdomains, including subdomains of subdomains, of x.example use the mail exchanger (MX) a.x.example. The AAAA record for a.x.example is needed to specify the mail exchanger IP address. As this has the result of excluding this domain name and its subdomains from the wildcard matches, an additional MX record for the subdomain a.x.example, as well as a wildcarded MX record for all of its subdomains, must also be defined in the DNS zone.

    x.example.       MX   10 a.x.example.
    *.x.example.     MX   10 a.x.example.
    a.x.example.     MX   10 a.x.example.
    *.a.x.example.   MX   10 a.x.example.
    a.x.example.     AAAA 2001:db8::1
    

    The role of wildcard records was refined in RFC 4592, because the original definition in RFC 1034 was incomplete and resulted in misinterpretations by implementers.[39]

    Protocol extensions

    [edit]

    The original DNS protocol had limited provisions for extension with new features. In 1999, Paul Vixie published in RFC 2671 (superseded by RFC 6891) an extension mechanism, called Extension Mechanisms for DNS (EDNS) that introduced optional protocol elements without increasing overhead when not in use. This was accomplished through the OPT pseudo-resource record that only exists in wire transmissions of the protocol, but not in any zone files. Initial extensions were also suggested (EDNS0), such as increasing the DNS message size in UDP datagrams.

    Dynamic zone updates

    [edit]

    Dynamic DNS updates use the UPDATE DNS opcode to add or remove resource records dynamically from a zone database maintained on an authoritative DNS server.[40] This facility is useful to register network clients into the DNS when they boot or become otherwise available on the network. As a booting client may be assigned a different IP address each time from a DHCP server, it is not possible to provide static DNS assignments for such clients.

    Transport protocols

    [edit]

    From the time of its origin in 1983 the DNS has used the User Datagram Protocol (UDP) for transport over IP. Its limitations have motivated numerous protocol developments for reliability, security, privacy, and other criteria, in the following decades.

    Conventional: DNS over UDP and TCP ports 53 (Do53)

    [edit]

    1. UDP reserves port number 53 for servers listening to queries.[5] Such a query consists of a clear-text request sent in a single UDP packet from the client, responded to with a clear-text reply sent in a single UDP packet from the server. When the length of the answer exceeds 512 bytes and both client and server support Extension Mechanisms for DNS (EDNS), larger UDP packets may be used.[41] Use of DNS over UDP is limited by, among other things, its lack of transport-layer encryption, authentication, reliable delivery, and message length. In 1989, RFC 1123 specified optional Transmission Control Protocol (TCP) transport for DNS queries, replies and, particularly, zone transfers. Via fragmentation of long replies, TCP allows longer responses, reliable delivery, and re-use of long-lived connections between clients and servers. For larger responses, the server refers the client to TCP transport.

    DNS over TLS (DoT)

    [edit]

    DNS over TLS emerged as an IETF standard for encrypted DNS in 2016, utilizing Transport Layer Security (TLS) to protect the entire connection, rather than just the DNS payload. DoT servers listen on TCP port 853. RFC 7858 specifies that opportunistic encryption and authenticated encryption may be supported, but did not make either server or client authentication mandatory.

    DNS over HTTPS (DoH)

    [edit]

    DNS over HTTPS was developed as a competing standard for DNS query transport in 2018, tunneling DNS query data over HTTPS, which transports HTTP over TLS. DoH was promoted as a more web-friendly alternative to DNS since, like DNSCrypt, it uses TCP port 443, and thus looks similar to web traffic, though they are easily differentiable in practice without proper padding.[42]

    DNS over QUIC (DoQ)

    [edit]

    RFC 9250, published in 2022 by the Internet Engineering Task Force, describes DNS over QUIC. It has “privacy properties similar to DNS over TLS (DoT) […], and latency characteristics similar to classic DNS over UDP”. This method is not the same as DNS over HTTP/3.[43]

    Oblivious DoH (ODoH) and predecessor Oblivious DNS (ODNS)

    [edit]

    Oblivious DNS (ODNS) was invented and implemented by researchers at Princeton University and the University of Chicago as an extension to unencrypted DNS,[44] before DoH was standardized and widely deployed. Apple and Cloudflare subsequently deployed the technology in the context of DoH, as Oblivious DoH (ODoH).[45] ODoH combines ingress/egress separation (invented in ODNS) with DoH’s HTTPS tunneling and TLS transport-layer encryption in a single protocol.[46]

    DNS over Tor

    [edit]

    DNS may be run over virtual private networks (VPNs) and tunneling protocols. The privacy gains of Oblivious DNS can be garnered through the use of the preexisting Tor network of ingress and egress nodes, paired with the transport-layer encryption provided by TLS.[47]

    DNSCrypt

    [edit]

    The DNSCrypt protocol, which was developed in 2011 outside the IETF standards framework, introduced DNS encryption on the downstream side of recursive resolvers, wherein clients encrypt query payloads using servers’ public keys, which are published in the DNS (rather than relying upon third-party certificate authorities) and which may in turn be protected by DNSSEC signatures.[48] DNSCrypt uses either TCP port 443, the same port as HTTPS encrypted web traffic, or UDP port 443. This introduced not only privacy regarding the content of the query, but also a significant measure of firewall-traversal capability. In 2019, DNSCrypt was further extended to support an “anonymized” mode, similar to the proposed “Oblivious DNS”, in which an ingress node receives a query which has been encrypted with the public key of a different server, and relays it to that server, which acts as an egress node, performing the recursive resolution.[49] Privacy of user/query pairs is created, since the ingress node does not know the content of the query, while the egress nodes does not know the identity of the client. DNSCrypt was first implemented in production by OpenDNS in December 2011. There are several free and open source software implementations that additionally integrate ODoH.[50] It is available for a variety of operating systems, including Unix, Apple iOS, Linux, Android, and Windows.

    Security issues

    [edit]

    Originally, security concerns were not major design considerations for DNS software or any software for deployment on the early Internet, as the network was not open for participation by the general public. However, the expansion of the Internet into the commercial sector in the 1990s changed the requirements for security measures to protect data integrity and user authentication.

    Several vulnerability issues were discovered and exploited by malicious users. One such issue is DNS cache poisoning, in which data is distributed to caching resolvers under the pretense of being an authoritative origin server, thereby polluting the data store with potentially false information and long expiration times (time-to-live). Subsequently, legitimate application requests may be redirected to network hosts operated with malicious intent.

    DNS responses traditionally do not have a cryptographic signature, leading to many attack possibilities; the Domain Name System Security Extensions (DNSSEC) modify DNS to add support for cryptographically signed responses.[51] DNSCurve has been proposed as an alternative to DNSSEC. Other extensions, such as TSIG, add support for cryptographic authentication between trusted peers and are commonly used to authorize zone transfer or dynamic update operations.

    Techniques such as forward-confirmed reverse DNS can also be used to help validate DNS results.

    DNS can also “leak” from otherwise secure or private connections, if attention is not paid to their configuration, and at times DNS has been used to bypass firewalls by malicious persons, and exfiltrate data, since it is often seen as innocuous.

    DNS spoofing

    [edit]

    Some domain names may be used to achieve spoofing effects. For example, paypal.com and paypa1.com are different names, yet users may be unable to distinguish them in a graphical user interface depending on the user’s chosen typeface. In many fonts the letter l and the numeral 1 look very similar or even identical. This problem, known as the IDN homograph attack, is acute in systems that support internationalized domain names, as many character codes in ISO 10646 may appear identical on typical computer screens. This vulnerability is occasionally exploited in phishing.[52]

    DNSMessenger

    [edit]

    DNSMessenger[53][54][55][56] is a type of cyber attack technique that uses the DNS to communicate and control malware remotely without relying on conventional protocols that might raise red flags. The DNSMessenger attack is covert because DNS is primarily used for domain name resolution and is often not closely monitored by network security tools, making it an effective channel for attackers to exploit.

    This technique involves the use of DNS TXT records to send commands to infected systems. Once malware has been surreptitiously installed on a victim’s machine, it reaches out to a controlled domain to retrieve commands encoded in DNS text records. This form of malware communication is stealthy, as DNS requests are usually allowed through firewalls, and because DNS traffic is often seen as benign, these communications can bypass many network security defenses.

    DNSMessenger attacks can enable a wide array of malicious activities, from data exfiltration to the delivery of additional payloads, all while remaining under the radar of traditional network security measures. Understanding and defending against such methods are crucial for maintaining robust cybersecurity.

    Privacy and tracking issues

    [edit]

    Originally designed as a public, hierarchical, distributed and heavily cached database, DNS protocol has no confidentiality controls. User queries and nameserver responses are being sent unencrypted which enables network packet sniffingDNS hijackingDNS cache poisoning and man-in-the-middle attacks. This deficiency is commonly used by cybercriminals and network operators for marketing purposes, user authentication on captive portals and censorship.[57]

    User privacy is further exposed by proposals for increasing the level of client IP information in DNS queries (RFC 7871) for the benefit of content delivery networks.

    The main approaches that are in use to counter privacy issues with DNS:

    • VPNs, which move DNS resolution to the VPN operator and hide user traffic from local ISP,
    • Tor, which replaces traditional DNS resolution with anonymous .onion domains, hiding both name resolution and user traffic behind onion routing counter-surveillance,
    • Proxies and public DNS servers, which move the actual DNS resolution to a third-party provider, who usually promises little or no request logging and optional added features, such as DNS-level advertisement or pornography blocking.
      • Public DNS servers can be queried using traditional DNS protocol, in which case they provide no protection from local surveillance, or DNS over HTTPSDNS over TLS and DNSCrypt, which do provide such protection

    Solutions preventing DNS inspection by local network operator are criticized for thwarting corporate network security policies and Internet censorship. They are also criticized from a privacy point of view, as giving away the DNS resolution to the hands of a small number of companies known for monetizing user traffic and for centralizing DNS name resolution, which is generally perceived as harmful for the Internet.[57]

    Google is the dominant provider of the platform in Android, the browser in Chrome, and the DNS resolver in the 8.8.8.8 service. Would this scenario be a case of a single corporate entity being in a position of overarching control of the entire namespace of the Internet? Netflix already fielded an app that used its own DNS resolution mechanism independent of the platform upon which the app was running. What if the Facebook app included DoH? What if Apple‘s iOS used a DoH-resolution mechanism to bypass local DNS resolution and steer all DNS queries from Apple’s platforms to a set of Apple-operated name resolvers?

    — DNS Privacy and the IETF

    Domain name registration

    [edit]

    The right to use a domain name is delegated by domain name registrars which are accredited by the Internet Corporation for Assigned Names and Numbers (ICANN) or other organizations such as OpenNIC, that are charged with overseeing the name and number systems of the Internet. In addition to ICANN, each top-level domain (TLD) is maintained and serviced technically by an administrative organization, operating a registry. A registry is responsible for operating the database of names within its authoritative zone, although the term is most often used for TLDs. A registrant is a person or organization who asked for domain registration.[24] The registry receives registration information from each domain name registrar, which is authorized (accredited) to assign names in the corresponding zone and publishes the information using the WHOIS protocol. As of 2015, usage of RDAP is being considered.[58]

    ICANN publishes the complete list of TLDs, TLD registries, and domain name registrars. Registrant information associated with domain names is maintained in an online database accessible with the WHOIS service. For most of the more than 290 country code top-level domains (ccTLDs), the domain registries maintain the WHOIS (Registrant, name servers, expiration dates, etc.) information. For instance, DENIC, Germany NIC, holds the DE domain data. From about 2001, most Generic top-level domain (gTLD) registries have adopted this so-called thick registry approach, i.e. keeping the WHOIS data in central registries instead of registrar databases.

    For top-level domains on COM and NET, a thin registry model is used. The domain registry (e.g., GoDaddyBigRock and PDRVeriSign, etc., etc.) holds basic WHOIS data (i.e., registrar and name servers, etc.). Organizations, or registrants using ORG on the other hand, are on the Public Interest Registry exclusively.

    Some domain name registries, often called network information centers (NIC), also function as registrars to end-users, in addition to providing access to the WHOIS datasets. The top-level domain registries, such as for the domains COM, NET, and ORG use a registry-registrar model consisting of many domain name registrars.[59] In this method of management, the registry only manages the domain name database and the relationship with the registrars. The registrants (users of a domain name) are customers of the registrar, in some cases through additional subcontracting of resellers.

  • public domain 

    The public domain (PD) consists of all the creative work to which no exclusive intellectual property rights apply. Those rights may have expired,[1] been forfeited,[2] expressly waived, or may be inapplicable.[3] Because no one holds the exclusive rights, anyone can legally use or reference those works without permission.[3][4]

    As examples, the works of William ShakespeareLudwig van BeethovenMiguel de CervantesZoroasterLao ZiConfuciusAristotleL. Frank BaumLeonardo da Vinci and Georges Méliès are in the public domain either by virtue of their having been created before copyright existed, or by their copyright term having expired.[1] Some works are not covered by a country’s copyright laws, and are therefore in the public domain; for example, in the United States, items excluded from copyright include the formulae of Newtonian physics and cooking recipes.[5] Other works are actively dedicated by their authors to the public domain (see waiver); examples include reference implementations of cryptographic algorithms.[6] The term public domain is not normally applied to situations where the creator of a work retains residual rights, in which case use of the work is referred to as “under license” or “with permission”.

    As rights vary by country and jurisdiction, a work may be subject to rights in one country and be in the public domain in another. Some rights depend on registrations on a country-by-country basis, and the absence of registration in a particular country, if required, gives rise to public-domain status for a work in that country. The term public domain may also be interchangeably used with other imprecise or undefined terms such as the public sphere or commons, including concepts such as the “commons of the mind”, the “intellectual commons”, and the “information commons”.[7]

    History

    Although the term domain did not come into use until the mid-18th century, the concept can be traced back to the ancient Roman law, “as a preset system included in the property right system”.[8][page needed] The Romans had a large proprietary rights system where they defined “many things that cannot be privately owned”[8][page needed] as res nulliusres communesres publicae and res universitatis.[9] The term res nullius was defined as things not yet appropriated.[10] The term res communes was defined as “things that could be commonly enjoyed by mankind, such as air, sunlight and ocean.”[8][page needed] The term res publicae referred to things that were shared by all citizens, and the term res universitatis meant things that were owned by the municipalities of Rome.[8][page needed] When looking at it from a historical perspective, one could say the construction of the idea of “public domain” sprouted from the concepts of res communesres publicae, and res universitatis in early Roman law.[8][page needed]

    When the first early copyright law was originally established in Britain with the Statute of Anne in 1710, public domain did not appear. However, similar concepts were developed by British and French jurists in the 18th century. Instead of “public domain”, they used terms such as publici juris or propriété publique to describe works that were not covered by copyright law.[11]

    The phrase “fall in the public domain” can be traced to mid-19th-century France to describe the end of copyright term. The French poet Alfred de Vigny equated the expiration of copyright with a work falling “into the sink hole of public domain”[12] and if the public domain receives any attention from intellectual property lawyers it is still treated as little more than that which is left when intellectual property rights, such as copyrightpatents, and trademarks, expire or are abandoned.[7] In this historical context Paul Torremans describes copyright as a, “little coral reef of private right jutting up from the ocean of the public domain.”[13] Copyright law differs by country, and the American legal scholar Pamela Samuelson has described the public domain as being “different sizes at different times in different countries”.[14]

    Definition

    Newton’s own copy of his Principia, with hand-written corrections for the second edition

    Definitions of the boundaries of the public domain in relation to copyright, or intellectual property more generally, regard the public domain as a negative space; that is, it consists of works that are no longer in copyright term or were never protected by copyright law.[15] According to James Boyle this definition underlines common usage of the term public domain and equates the public domain to public property and works in copyright to private property. However, the usage of the term public domain can be more granular, including for example uses of works in copyright permitted by copyright exceptions. Such a definition regards work in copyright as private property subject to fair use rights and limitation on ownership.[1] A conceptual definition comes from Lange, who focused on what the public domain should be: “it should be a place of sanctuary for individual creative expression, a sanctuary conferring affirmative protection against the forces of private appropriation that threatened such expression”.[15] Patterson and Lindberg described the public domain not as a “territory”, but rather as a concept: “[T]here are certain materials – the air we breathe, sunlight, rain, space, life, creations, thoughts, feelings, ideas, words, numbers – not subject to private ownership. The materials that compose our cultural heritage must be free for all living to use no less than matter necessary for biological survival.”[16] The term public domain may also be interchangeably used with other imprecise or undefined terms such as the public sphere or commons, including concepts such as the “commons of the mind”, the “intellectual commons”, and the “information commons”.[7]

    Public domain by medium

    Books

    A public-domain book is a book with no copyright, a book that was created without a license, or a book where its copyrights expired[17] or have been forfeited.[clarification needed][18]

    In most countries the term of protection of copyright expires on the first day of January, 70 years after the death of the latest living author. The longest copyright term is in Mexico, which has life plus 100 years for all deaths since July 1928.[19]

    A notable exception is the United States, where every book and tale published before 1930 is in the public domain; US copyrights last for 95 years for books originally published between 1930 and 1978 if the copyright was properly registered and maintained.[20]

    For example: the works of Jane AustenLewis CarrollMachado de AssisOlavo Bilac and Edgar Allan Poe are in the public domain worldwide as they all died over 100 years ago.[21]

    Project Gutenberg, the Internet Archive and Wikisource make tens of thousands of public domain books available online as ebooks.[22][23][24]

    Music

    People have been creating music for millennia. The first musical notation system, the Music of Mesopotamia system, was created 4,000 years ago. Guido of Arezzo introduced Latin musical notation in the 10th century.[25] This laid the foundation for the preservation of global music in the public domain, a distinction formalized alongside copyright systems in the 17th century. Musicians copyrighted their publications of musical notation as literary writings, but performing copyrighted pieces and creating derivative works were not restricted by early copyright laws. Copying was widespread, in compliance with the law, but expansions of those laws intended to benefit literary works and responding to commercial music recording technology’s reproducibility have led to stricter rules. Relatively recently, a normative view that copying in music is not desirable and lazy has become popular among professional musicians.[original research?]

    US copyright laws distinguish between musical compositions and sound recordings, the former of which refers to melody, notation or lyrics created by a composer or lyricist, including sheet music, and the latter referring to a recording performed by an artist, including a CD, LP, or digital sound file.[26] Musical compositions fall under the same general rules as other works, and anything published before 1925 is considered public domain. Sound recordings, on the other hand, are subject to different rules and are not eligible for public domain status until 2021–2067, depending on the date and location of publishing, unless explicitly released beforehand.[20]

    The Musopen project records music in the public domain for the purposes of making the music available to the general public in a high-quality audio format. Online musical archives preserve collections of classical music recorded by Musopen and offer them for download/distribution as a public service.

    Films

    Main article: Public domain filmDuration: 1 hour, 35 minutes and 53 seconds.1:35:53Subtitles available.CCThe 1968 horror film Night of the Living Dead is public domain in the United States because its theatrical distributor failed to place a copyright indication on the prints, as would have been required to obtain a copyright at that time.

    A public-domain film is a film that was never under copyright, was released to public domain by its author, or whose copyright has expired. All films released in the United States before 1 January 1930 have been entered in the public domain in that country.

    Value

    Pamela Samuelson has identified eight “values” that can arise from information and works in the public domain.[27]

    Possible values include:

    1. Building blocks for the creation of new knowledge, examples include data, facts, ideas, theories, and scientific principle.
    2. Access to cultural heritage through information resources such as ancient Greek texts and Mozart’s symphonies.
    3. Promoting education, through the spread of information, ideas, and scientific principles.
    4. Enabling follow-on innovation, through for example expired patents and copyright.
    5. Enabling low cost access to information without the need to locate the owner or negotiate rights clearance and pay royalties, through for example expired copyrighted works or patents, and non-original data compilation.[28]
    6. Promoting public health and safety, through information and scientific principles.
    7. Promoting the democratic process and values, through news, laws, regulation, and judicial opinion.
    8. Enabling competitive imitation, through for example expired patents and copyright, or publicly disclosed technologies that do not qualify for patent protection.[27]: 22 

    Relationship with derivative works

    Main article: Derivative work

    Derivative works include translationsmusical arrangements, and dramatizations of a work, as well as other forms of transformation or adaptation.[29] Copyrighted works may not be used for derivative works without permission from the copyright owner,[30] while public domain works can be freely used for derivative works without permission.[31][32] Artworks that are public domain may also be reproduced photographically or artistically or used as the basis of new, interpretive works.[33] Works derived from public domain works can be copyrighted.[34]

    Once works enter into the public domain, derivative works such as adaptations in book and film may increase noticeably, as happened with Frances Hodgson Burnett‘s novel The Secret Garden, which became public domain in the US in 1977 and most of the rest of the world in 1995.[35] By 1999, the plays of Shakespeare, all public domain, had been used in more than 420 feature-length films.[36][37] In addition to straightforward adaptation, they have been used as the launching point for transformative retellings such as Tom Stoppard‘s Rosencrantz and Guildenstern Are Dead and Troma Entertainment‘s Tromeo and Juliet.[38][39][40] Marcel Duchamp’s L.H.O.O.Q. is a derivative of Leonardo da Vinci’s Mona Lisa, one of thousands of derivative works based on the public domain painting.[31] The 2018 film A Star is Born is a remake of the 1937 film of the same name, which is in the public domain due to an unrenewed copyright.[41]

    Rights in public domain reproduction

    Courts in different jurisdictions have come to different conclusions as to whether the reproduction of a public domain work gains its own rights protection, or whether it too is in the public domain. In a German 2016 case, the Reiss-Engelhorn-Museen, an art museum, sued Wikimedia Commons over photographs uploaded to the database depicting pieces of art in the museum. The museum claimed that the photos were taken by their staff, and that photography within the museum by visitors was prohibited. Therefore, photos taken by the museum, even of material that itself had fallen into the public domain, were protected by copyright law and would need to be removed from the Wikimedia image repository. The court ruled that the photographs taken by the museum would be protected under the German Copyright Act, stating that since the photographer needed to make practical decisions about the photograph that it was protected material.[42] In contrast, in the 1999 US case Bridgeman Art Library v. Corel Corp., the court ruled that exact photographic copies of public domain images could not be protected by copyright in the United States because the copies lack originality.[43]

    Main article: Perpetual copyright

    In some countries, certain works may never fully lapse into the public domain. In the United Kingdom, for example, there is a perpetual crown copyright for the Authorized King James Version of the Bible.[44]

    While the copyright has expired for the Peter Pan works by J. M. Barrie (the play Peter Pan, or the Boy Who Wouldn’t Grow Up and the novel Peter and Wendy) in the United Kingdom, it was granted a special exception under the Copyright, Designs and Patents Act 1988 (Schedule 6)[45] that requires royalties to be paid for commercial performances, publications and broadcasts of the story of Peter Pan within the UK, as long as Great Ormond Street Hospital (to whom Barrie gave the copyright) continues to exist.

    In a paying public domain regime, works that have entered the public domain after their copyright has expired, or traditional knowledge and traditional cultural expressions that have never been subject to copyright, are still subject to royalties payable to the state or to an authors’ association. The user does not have to seek permission to copy, present or perform the work, but does have to pay the fee. Typically the royalties are directed to support of living artists.[46]

    Public domain mark

    Main article: Public Domain Mark

    Creative Commons’ Public Domain Mark

    In 2010, The Creative Commons proposed the Public Domain Mark (PDM) as symbol to indicate that a work is free of known copyright restrictions and therefore in the public domain.[47][48] The public domain mark is a combination of the copyright symbol, which acts as copyright notice, with the international ‘no’ symbol. The Europeana databases use it, and for instance on the Wikimedia Commons in February 2016 2.9 million works (~10% of all works) are listed with the mark.[49]

    Application to copyrightable works

    The underlying idea that is expressed or manifested in the creation of a work generally cannot be the subject of copyright law (see idea–expression divide). Mathematical formulae will therefore generally form part of the public domain, to the extent that their expression in the form of software is not covered by copyright.[50]

    Works created before the existence of copyright and patent laws also form part of the public domain. For example, the Bible and the inventions of Archimedes are in the public domain. However, translations or new formulations of these works may be copyrighted in themselves.[51]

    Determination of whether a copyright has expired depends on an examination of the copyright in its source country.

    In most countries that are signatories to the Berne Convention, copyright term is based on the life of the author, and extends to 50 or 70 years beyond the death of the author. (See List of copyright terms of countries.)

    In the United States, determining whether a work has entered the public domain or is still under copyright depends upon what the law or regulation was at creation, and whether new regulations have grandfathered in certain older works. Because copyright terms shifted over the course of the 20th century from a fixed-term based on first publication, with a possible renewal term, to a term extending to 50, then 70, years after the death of the author. The claim that “pre-1930 works are in the public domain” is correct only for published works; unpublished works are under federal copyright for at least the life of the author plus 70 years.[citation needed]

    Legal traditions differ on whether a work in the public domain can have its copyright restored. In the European Union, the Copyright Duration Directive was applied retroactively, restoring and extending the terms of copyright on material previously in the public domain. Term extensions by the US and Australia generally have not removed works from the public domain, but rather delayed the addition of works to it. However, the United States moved away from that tradition with the Uruguay Round Agreements Act, which removed from the public domain many foreign-sourced works that had previously not been in copyright in the US for failure to comply with US-based formalities requirements. Consequently, in the US, foreign-sourced works and US-sourced works are now treated differently, with foreign-sourced works remaining under copyright regardless of compliance with formalities, while domestically sourced works may be in the public domain if they failed to comply with then-existing formalities requirements—a situation described as odd by some scholars, and unfair by some US-based rightsholders.[52]

    Government works

    Works of various governments around the world may be excluded from copyright law and may therefore be considered to be in the public domain in their respective countries.[53] They may also be in the public domain in other countries as well. The legal scholar Melville Nimmer has written that “it is axiomatic that material in the public domain is not protected by copyright, even when incorporated into a copyrighted work”.[54]

    Dedicating works to the public domain

    Before 1 March 1989, in the US, works could be easily given into the public domain by just releasing it without an explicit copyright notice. With the Berne Convention Implementation Act of 1988 (and the earlier Copyright Act of 1976, which went into effect in 1978), all works were by default copyright protected and needed to be actively given into public domain by a waiver statement/anti-copyright can call notice.[55][56] Not all legal systems have processes for reliably donating works to the public domain, e.g. civil law of continental Europe.[citation needed] This may even “effectively prohibit any attempt by copyright owners to surrender rights automatically conferred by law, particularly moral rights“.[57]

    Public-domain-like licenses

    Main article: Public-domain-equivalent license

    An alternative is for copyright holders to issue a license which irrevocably grants as many rights as possible to the general public. Real public domain makes licenses unnecessary, as no owner/author is required to grant permission (“Permission culture“). There are multiple licenses which aim to release works into the public domain. In 2000 the WTFPL was released as a public domain like software license.[58] Creative Commons (created in 2002 by Lawrence LessigHal Abelson, and Eric Eldred) has introduced several public-domain-like licenses, called Creative Commons licenses. These give authors of works (that would qualify for copyright) the ability to decide which protections they would like to place on their material. As copyright is the default license for new material, Creative Commons licenses offer authors a variety of options to designate their work under whichever license they wish, as long as this does not violate standing copyright law.[59] For example, a CC BY license allows for re-users to distribute, remix, adapt, and build upon material, while also agreeing to provide attribution to the author in any of these cases.[60] In 2009 the Creative Commons released the CC0, which was created for compatibility with law domains which have no concept of dedicating into public domain. This is achieved by a public domain waiver statement and a fallback all-permissive license, in case the waiver is not possible.[61][62] Unlike in the US, where author’s moral rights are generally not specifically regulated, in some countries where moral rights are protected separately in law it is not possible to waive those rights, but only the rights related to the exploitation of the work. A solution to this issue (as found in the Creative Commons Zero dedication) is to interpret the license by setting “three different layers of action. First, the right holder waives any copyright and related rights that can be waived in accordance with the applicable law. Secondly, if there are rights that the right holder cannot waive under applicable law, they are licensed in a way that mirrors as closely as possible the legal effect of a waiver. And finally, if there are any rights that the right holders cannot waive or license, they affirm that they will not exercise them and they will not assert any claim with respect to the use of the work, once again within the limits of applicable law. (…) In countries where moral rights exist but where they can be waived or not asserted, they are waived if asserted (e.g. the UK). In countries where they cannot be waived they will remain into full effect in accordance to the applicable law (think of France, Spain or Italy where moral rights cannot be waived).”[63] The same occurs in Switzerland.

    The Unlicense, published around 2010, has a focus on an anti-copyright message. The Unlicense offers a public domain waiver text with a fallback public domain-like license inspired by permissive licenses but without attribution.[64][65] Another option is the Zero Clause BSD license, released in 2006 and aimed at software.[66]

    In October 2014, the Open Knowledge Foundation recommends the Creative Commons CC0 license to dedicate content to the public domain,[67][68] and the Open Data Commons Public Domain Dedication and License (PDDL) for data.[69]

    Patents

    Main article: Term of patent

    In most countries, the term of rights for patents is 20 years, after which the invention becomes part of the public domain. In the United States, the contents of patents are considered valid and enforceable for 20 years from the date of filing within the United States or 20 years from the earliest date of filing if under 35 USC 120, 121, or 365(c).[70] However, the text and any illustration within a patent, provided the illustrations are essentially line drawings and do not in any substantive way reflect the “personality” of the person drawing them, are not subject to copyright protection.[71] This is separate from the patent rights just mentioned.

    Trademarks

    A trademark registration may remain in force indefinitely, or expire without specific regard to its age. For a trademark registration to remain valid, the owner must continue to use it. In some circumstances, such as disuse, failure to assert trademark rights, or common usage by the public without regard for its intended use, it could become generic, and therefore part of the public domain.

    Because trademarks are registered with governments, some countries or trademark registries may recognize a mark, while others may have determined that it is generic and not allowable as a trademark in that registry. For example, the drug acetylsalicylic acid (2-acetoxybenzoic acid) is better known as aspirin in the United States—a generic term. In Canada, however, Aspirin, with an uppercase A, is still a trademark of the German company Bayer, while aspirin, with a lowercase “a”, is not. Bayer lost the trademark in the United States, the UK and France after World War I, as part of the Treaty of Versailles. So many copycat products entered the marketplace during the war that it was deemed generic just three years later.[citation needed]

    Informal uses of trademarks are not covered by trademark protection. For example, Hormel, producer of the canned meat product Spam, does not object to informal use of the word “spam” in reference to unsolicited commercial email.[72] However, it has fought attempts by other companies to register names including the word ‘spam’ as a trademark in relation to computer products, despite that Hormel’s trademark is only registered in reference to food products (a trademark claim is made within a particular field). Such defences have failed in the United Kingdom.[73]

    Public Domain Day

    Main article: Public Domain Day

    An English logo of the 2023/2024 Public Domain Day

    Public Domain Day is an observance of when copyrighted works expire and works enter into the public domain.[74] This legal transition of copyright works into the public domain usually happens every year on 1 January based on the individual copyright laws of each country.[74]

    Visual created for Public Domain Day. Features Leonardo da Vinci‘s Mona Lisa, as it is famously part of the public domain

    The observance of a “Public Domain Day” was initially informal; the earliest known mention was in 2004 by Wallace McLean (a Canadian public domain activist),[75] with support for the idea echoed by Lawrence Lessig.[76] As of 1 January 2010,[77] there is as Public Domain Day website lists the authors whose works are entering the public domain. There are activities in countries around the world by various organizations all under the banner Public Domain Day, this can help people around the world celebrate works written a while ago.