[Infowarrior] - Security Tightened for .org Domain
Richard Forno
rforno at infowarrior.org
Wed Jun 3 19:39:56 UTC 2009
Security Tightened for .org Domain
Carolyn Duffy Marsan, Network World
Tuesday, June 02, 2009 6:42 AM PDT
http://www.pcworld.com/businesscenter/article/165916/security_tightened_for_org_domain.html
The Public Interest Registry will announce today that it has begun
cryptographically signing the .org top-level domain using DNS security
extensions known as DNSSEC.
DNSSEC is an emerging standard that prevents spoofing attacks by
letting Web sites verify their domain names and corresponding IP
addresses using digital signatures and public-key encryption.
DNSSEC is viewed as the best way to bolster the DNS against
vulnerabilities including the Kaminsky Bug, a DNS flaw discovered last
summer that allows a hacker to redirect traffic from a legitimate Web
site to a fake one without the user knowing.
"DNSSEC is a needed infrastructure upgrade," says Alexa Raad, CEO of
the Public Interest Registry (PIR). "It has passed the threshold of
being a theoretical opportunity to being a practical necessity. The
question then becomes: How do we make it work?"
With 7.5 million registered names, .org is the largest domain to
deploy DNSSEC.
Current DNSSEC users include country code domains run by Sweden,
Puerto Rico, Bulgaria, Brazil and the Czech Republic.
"Us signing the zone is a very important step, but it's also a
symbolic step," Raad says. "A large [generic top-level domain] has now
signed their zone. It will signal to all the other players in the
chain that it is time to work very seriously on the software and
applications to make DNSSEC viable in the near future."
PIR announced plans to deploy DNSSEC last June, and in December it
vowed to share its experiences with members of the DNSSEC Industry
Coalition. The coalition includes leading domain name registries such
as VeriSign, NeuStar and Afilias as well as DNS software providers
NLnet Labs, Secure64 and InfoBlox.
Raad says it's important for PIR to share its experiences with DNSSEC
because "this is not something that one actor can take on. It does
take a village, to borrow a phrase, to do it properly."
One recommendation that PIR is making to the industry is that DNSSEC
deployments use the newer NSEC3 algorithm rather than the older NSEC,
which is less secure and requires more processing.
PIR also is prompting the DNSSEC Industry Coalition to develop
operational procedures such as how to transfer domains from a register
that supports DNSSEC to one that doesn't.
"We take this as an immense responsibility," Raad says. "We want to
make sure that prudence and caution take way over haste" with our
DNSSEC deployment.
On June 2, PIR will announce that it is signing the .org domain with
NSEC3 and that it has begun testing DNSSEC with a handful of
registrars using first fake and than real .org names. PIR plans to
keep expanding its testing over the next few months until the registry
is ready to support DNSSEC for all .org domain name operators.
Raad says she expects full-blown DNSSEC deployment on the .org domain
in 2010.
"I don't expect it to be this calendar year," she says. "This is about
learning and sharing our learning with industry."
The good news for .org domain name holders is that PIR's DNSSEC
testing and deployment won't affect their day-to-day operations.
"It's important to note that .org domain holders don't have to do
anything," Raad says. "Their domain names will function as usual."
Raad says enterprise network managers should start asking their ISPs,
domain name registrars and DNS vendors what they are doing to support
DNSSEC.
First envisioned in 1995, DNSSEC efforts have ramped up dramatically
since last summer when the Kaminsky bug was discovered.
The U.S. federal government is deploying DNSSEC across its .gov domain
this year, with plans for all sub-domains to be signed by the end of
2009.
VeriSign has committed to deploying DNSSEC across .com and .net by 2011.
But the Internet engineering community is waiting for the U.S. federal
government to deploy DNSSEC across the root zone.
More DNSSEC news is anticipated next week because the DNSSEC Industry
Coalition is hosting a symposium in Washington D.C. June 11 and 12 to
discuss DNSSEC deployment issues including how best to sign the root
zone.
More information about the Infowarrior
mailing list