Close
  • Latest News
  • Artificial Intelligence
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
Read Down
Sign in
Close
Welcome!Log into your account
Forgot your password?
Read Down
Password recovery
Recover your password
Close
Search
Logo
Logo
  • Latest News
  • Artificial Intelligence
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
More
    Home Cybersecurity
    • Cybersecurity
    • IT Management
    • Networking

    Is It Time, Finally, for DNSSEC?

    By
    Larry Seltzer
    -
    August 16, 2007
    Share
    Facebook
    Twitter
    Linkedin

      A report not too long ago of a vulnerability in many Firefox extensions raised in the process the old issue of DNS security. The issue of security of DNS servers has been on a low simmer for years. A few people have been and remain agitated on the matter, but for most of us it doesnt meet the level of high priority.

      But those DNSSEC nuts do have some valid points. A compromised DNS server is a profoundly dangerous thing. It enables the worst form of attacks, from mass-pharming to malware distribution (imagine running a fake http://windowsupdate.microsoft.com). DNS servers, like any other computer, have vulnerabilities of various kinds. The most discussed way to compromise DNS is through “cache poisoning,” a variety of attacks in which an attacker tricks DNS into providing false information. In other words, you ask for the address of a particular domain, but you get a different address. The server at that address might have a phishing image of your banks site, for example.

      /zimages/3/28571.gifSMTP authentication schemes store mail server authentication data in the DNS. The standards adoption is moving slowly. Click here to read more.

      The Firefox issue had to do with the common hard-coding in the extension itself of a URL that the extension checks for updates. The attack requires that the DNS be compromised so as to point the extension to a malicious fake update server. My first thought when I heard about this issue was to wonder how common compromised DNS servers really are. Then I remembered research by Trend Micro that found a network of “more than 115 rogue DNS servers that are used by a certain variant of TROJ_DNSCHANG.”

      Unfortunately, the link to the actual study I heard about is dead now, but the story certainly sounded plausible. And whoever compromised the DNS servers was trying not to be greedy about it, letting most existing domains resolve correctly, while nonexisting domains were resolved to a malicious address.

      Im sure theres plenty of opportunity out there to compromise DNS for a talented hacker. Im certain that most administrators hesitate to change things on boxes so critical, even to apply critical updates. And its not just big companies and ISPs; there are lots of small DNS servers in small businesses, and even broadband routers perform DNS functions.

      The solution to this, apart from prodigious hardening of DNS servers themselves, is DNSSEC. DNSSEC is a set of protocols and applications for using public key cryptography to make DNS secure. Digital signatures are used to to authenticate clients and servers and sign communications between them. Ultimately, the process can go end-to-end, between the actual client and server, although often these things result in compromises; its easy to imagine DNSSEC partly implemented between the users ISP to the authoritative DNS for outside domains, leaving clients without encryption between them and the server.

      Ron Aitchison dismisses the arguments against DNSSEC and argues for it all the way from client to server. Application-level encryption and authentication are no substitute, he says, and his argument makes sense.

      Of course, not everyone believes in DNSSEC. Thomas Ptacek of Matasano Security makes a fun argument against it. Ptacek seems to be making the SSL argument that Aitchison refutes. Ptacek:

      You dont need to trust the DNS anymore. Real-world applications arent supposed trust names. … Want an example? Take my banking website. You cant spoof it, even if you do own up the DNS, because a third party has to cryptographically attest to my browser that the server has a valid key. Spoofing is prevented at the application layer, not the DNS.
      Of course, as Aitchison says, even that third party is accessed through domain names. If Im spoofing DNS, whats to stop me from spoofing verisign.com and putting up my own fake certificate authority?

      Theyre both right about some things. Ptacek is right that a compromised DNSSEC server is a profoundly dangerous thing, and of course it will happen. Aitchison is correct that DNS is important and its good for it to be secured. Ptacek actually seems not to care whether DNS is secure or not.

      But the ruling point is that DNSSEC is one of those massive changes, like IPv6, that wont happen until people have no choice but to implement it. Its really complicated and theres been no massive security disaster with the DNS that would give everyone a sense of urgency about it.

      So in that sense, maybe Ptacek is right after all. If DNSSEC wont be riding to the rescue, were better off putting as much security as we can where we can. Theres a lot you can do at the application level.

      Security Center Editor Larry Seltzer has worked in and written about the computer industry since 1983.

      /zimages/3/28571.gifCheck out eWEEK.coms for the latest security news, reviews and analysis. And for insights on security coverage around the Web, take a look at eWEEK.com Security Center Editor Larry Seltzers blog Cheap Hack

      More from Larry Seltzer

      Larry Seltzer
      Larry Seltzer has been writing software for and English about computers ever since—,much to his own amazement—,he graduated from the University of Pennsylvania in 1983.He was one of the authors of NPL and NPL-R, fourth-generation languages for microcomputers by the now-defunct DeskTop Software Corporation. (Larry is sad to find absolutely no hits on any of these +products on Google.) His work at Desktop Software included programming the UCSD p-System, a virtual machine-based operating system with portable binaries that pre-dated Java by more than 10 years.For several years, he wrote corporate software for Mathematica Policy Research (they're still in business!) and Chase Econometrics (not so lucky) before being forcibly thrown into the consulting market. He bummed around the Philadelphia consulting and contract-programming scenes for a year or two before taking a job at NSTL (National Software Testing Labs) developing product tests and managing contract testing for the computer industry, governments and publication.In 1991 Larry moved to Massachusetts to become Technical Director of PC Week Labs (now eWeek Labs). He moved within Ziff Davis to New York in 1994 to run testing at Windows Sources. In 1995, he became Technical Director for Internet product testing at PC Magazine and stayed there till 1998.Since then, he has been writing for numerous other publications, including Fortune Small Business, Windows 2000 Magazine (now Windows and .NET Magazine), ZDNet and Sam Whitmore's Media Survey.
      Get the Free Newsletter!
      Subscribe to Daily Tech Insider for top news, trends & analysis
      This email address is invalid.
      Get the Free Newsletter!
      Subscribe to Daily Tech Insider for top news, trends & analysis
      This email address is invalid.

      MOST POPULAR ARTICLES

      Latest News

      Zeus Kerravala on Networking: Multicloud, 5G, and...

      James Maguire - December 16, 2022 0
      I spoke with Zeus Kerravala, industry analyst at ZK Research, about the rapid changes in enterprise networking, as tech advances and digital transformation prompt...
      Read more
      Applications

      Datadog President Amit Agarwal on Trends in...

      James Maguire - November 11, 2022 0
      I spoke with Amit Agarwal, President of Datadog, about infrastructure observability, from current trends to key challenges to the future of this rapidly growing...
      Read more
      IT Management

      Intuit’s Nhung Ho on AI for the...

      James Maguire - May 13, 2022 0
      I spoke with Nhung Ho, Vice President of AI at Intuit, about adoption of AI in the small and medium-sized business market, and how...
      Read more
      Cloud

      IGEL CEO Jed Ayres on Edge and...

      James Maguire - June 14, 2022 0
      I spoke with Jed Ayres, CEO of IGEL, about the endpoint sector, and an open source OS for the cloud; we also spoke about...
      Read more
      Applications

      Kyndryl’s Nicolas Sekkaki on Handling AI and...

      James Maguire - November 9, 2022 0
      I spoke with Nicolas Sekkaki, Group Practice Leader for Applications, Data and AI at Kyndryl, about how companies can boost both their AI and...
      Read more
      Logo

      eWeek has the latest technology news and analysis, buying guides, and product reviews for IT professionals and technology buyers. The site’s focus is on innovative solutions and covering in-depth technical content. eWeek stays on the cutting edge of technology news and IT trends through interviews and expert analysis. Gain insight from top innovators and thought leaders in the fields of IT, business, enterprise software, startups, and more.

      Facebook
      Linkedin
      RSS
      Twitter
      Youtube

      Advertisers

      Advertise with TechnologyAdvice on eWeek and our other IT-focused platforms.

      Advertise with Us

      Menu

      • About eWeek
      • Subscribe to our Newsletter
      • Latest News

      Our Brands

      • Privacy Policy
      • Terms
      • About
      • Contact
      • Advertise
      • Sitemap
      • California – Do Not Sell My Information

      Property of TechnologyAdvice.
      © 2022 TechnologyAdvice. All Rights Reserved

      Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.

      ×