Internet’s root security reaches ‘key’ milestone

FRAMINGHAM, Mass. – The dream of bolting security onto the Internet’s Domain Name System was expected to come closer to reality Wednesday when Internet policymakers hosted a ceremony at a secure data centre near Washington, D.C. to generate and store the first cryptographic key that will be used to secure the Internet’s root zone.

This key ceremony is one of the final steps in the deployment of DNS Security Extensions (DNSSEC) on the Internet’s root zone. DNSSEC is an emerging Internet standard that prevents spoofing attacks by allowing Web sites to verify their domain names and corresponding IP addresses using digital signatures and public-key encryption.

“The key ceremony will generate the master root key, the key that signs all the other keys,” explained Ken Silva, CTO of VeriSign, which operates two of the Internet’s 13 root servers along with the back-end systems that power the .com and .net top-level domains. “This is being done a month before the actual roll-out of DNSSEC so that we have a valid key and that we can test with it.”

DNSSEC is being deployed across the Internet infrastructure, from the root servers at the top of the DNS hierarchy to the servers that run .com and .net and other top-level domains, and then down to the servers that cache content for individual Web sites.

Once it is widely deployed, DNSSEC will prevent cache poisoning attacks, where traffic is redirected from a legitimate Web site to a fake one without the Web site operator or user knowing. Cache poisoning attacks are the result of a serious flaw in the DNS that was disclosed by security researcher Dan Kaminsky in 2008.

The U.S. federal government is in the midst of deploying DNSSEC on the .gov domain. Next up are .edu, which will be cryptographically signed in July, followed by .net in November and .com in March 2011, VeriSign said. Once the root zone is signed, top-level domains that support DNSSEC can offer end-to-end security to their Web site operators.

The Canadian Internet Registration Authority (CIRA), which oversees the .ca domain, will deploy DNSSEC on its infrastructure in the first half of 2010, said CEO Byron Holland. “We are well into replacing the core engine for .ca, and as part of that renew and refresh that includes implementing DNSSEC.

Once added, Internet and telecommunications providers as well as registrars of domain names here will have to implement it as well, Holland said, for the improved security to work.

Adding DNSSEC involves adding servers and software to existing systems, he said, and will require some expertise to maintain. But if service providers don’t do it they run the risk of not getting business from any business that processes financial transactions. To reassure their customers, Holland said, providers will have to show they are DNSSEC-compliant.

Today’s key ceremony is being hosted by the Internet Corporation for Assigned Names and Numbers (ICANN) in a secure data centre in Culpeper, Va. A similar key ceremony will take place in Los Angeles in early July.

The key ceremony will demonstrate the set of procedures that the Internet engineering community has created to generate and store keys for the root zone in a secure way. Attendees will include ICANN staff and DNS experts from around the world. The key generation and storage process will be audited.

“People from all over the world will be part of the process of creating the key for the top level of the DNS,” explained Steve Crocker, an Internet security expert and CEO of Shinkuro Inc., a Bethesda, Md., software company that is working on DNSSEC. “They will witness and be able to report that the proper procedure was carried fairly and scrupulously.”

The two key ceremonies are among the last steps before production-scale deployment of DNSSEC on the root zone, which is scheduled for July 15.

Between now and July 15, the root server operators will conduct additional testing of DNSSEC. “We’re testing as many possible corner cases that we can imagine,” Silva said. “We’re trying to test every permutation of key sizes, key roll-over, key expiration and all those kinds of issues. We’re testing to see how the system responds and whether our monitors and detection can catch those sorts of things.”

Silva says the testing is going well, thanks to new monitoring capabilities that were added to the root servers.

“We’ve very pleased with the additional monitors that we put in the root infrastructure,” Silva says. “There are a lot more parts in the root zone now. We have keys in there. We have trust anchors in there. There’s a lot of new material in the root zone, and the traditional monitors were making sure that names were consistent and the syntax was right. Now we have additional information, so we’ve expanded the monitors to look for expired keys, invalid keys, keys that have not been properly signed and all of those kinds of things.”

DNSSEC has gained a groundswell of support since the Kaminsky bug was discovered in 2008.

A handful of countries — including Sweden, the Czech Republic, Puerto Rico, Bulgaria and Brazil — already support DNSSEC on their country-code domains as does the .org domain for non-profit organizations.

The U.S. federal government is in the midst of deploying DNSSEC on the .gov domain. Next up are .edu, which will be cryptographically signed in July, followed by .net in November and .com in March 2011, VeriSign said. Once the root zone is signed, top-level domains that support DNSSEC can offer end-to-end security to their Web site operators.

“We expect a flurry of activity as people in Sweden, Brazil and other countries deploy DNSSEC,” Silva says. He adds that as much as 50 per cent of DNS queries can support the DNSSEC standard due to default settings on popular DNS software.

So far, Internet security experts have seen no technical roadblocks to the deployment of DNSSEC from the root servers on down.

“It’s been pretty smooth,” Crocker says of the DNSSEC roll-out on the root servers. “I haven’t heard of any issues” that would delay deployment of DNSSEC on .com or .net

(From NetworkWorld U.S.)

With files by Howard Solomon, Network World Canda

Would you recommend this article?

Share

Thanks for taking the time to let us know what you think of this article!
We'd love to hear your opinion about this or any other story you read in our publication.


Jim Love, Chief Content Officer, IT World Canada

Featured Download

Featured Articles

Cybersecurity in 2024: Priorities and challenges for Canadian organizations 

By Derek Manky As predictions for 2024 point to the continued expansion...

Survey shows generative AI is a top priority for Canadian corporate leaders.

Leaders are devoting significant budget to generative AI for 2024 Canadian corporate...

Related Tech News

Tech Jobs

Our experienced team of journalists and bloggers bring you engaging in-depth interviews, videos and content targeted to IT professionals and line-of-business executives.

Tech Companies Hiring Right Now