VeriSign, NeuStar and others team on DNS security

Momentum continues to build for rapid deployment of Domain Name System encryption mechanisms.

Seven leading domain-name vendors -- representing more than 112 million domain names or 65% of all registered domain names -- have formed an industry coalition known as DNSSEC to work together to adopt DNS Security Extensions.

Members of the DNSSEC Industry Coalition include VeriSign, which operates the .com and .net registries; NeuStar, which operates the .biz and .us registries; .info operator Afilias; .edu operator Educause; and the Public Interest Registry, which operates the .org registry.

DNSSEC is intended to prevent hackers from hijacking Web traffic and redirecting it to bogus sites. The Internet standard prevents spoofing attacks by allowing Web sites to verify their domain names and corresponding IP addresses using digital signatures and public-key encryption.

The coalition is "a really good and public statement by all of the members that we believe that DNSSEC is vital to securing the stability and trust of the Internet, and we will do everything we can as members to get the technology in place and get our zones signed," says Rodney Joffe, senior vice president and senior technologist at NeuStar Inc.

DNSSEC is viewed as the best way to bolster the DNS against vulnerabilities such as the Kaminsky bug discovered this summer. It's because of threats such as these that the U.S. government is rolling out DNSSEC across its .gov and .mil domains.

The DNSSEC Industry Coalition announced its formation weeks after the U.S. federal government closed a formal comment period for the domain-name industry to provide suggestions on deploying DNSSEC across the DNS root zone, which operates at the highest level of the DNS hierarchy. DNS root servers make it possible for top-level domains, including .com, .net and .org, to match domain names with corresponding IP addresses and Web sites. Without the DNS root being cryptographically signed via DNSSEC, the Internet's top-level domains aren't safe from attack even if they deploy DNSSEC.

The domain-name industry is being driven to adopt DNSSEC because of worries about the Kaminsky bug, a serious security flaw in the DNS that researcher Dan Kaminsky discovered in July. The bug allows for cache-poisoning attacks, where a hacker redirects traffic from a legitimate Web site to a fake one without the user knowing.

"The Kaminsky bug changed the debate about DNSSEC," says Alexa Raad, CEO of the Public Interest Registry, which supports 7 million domain names registered under .org. "Until then, it was a question of 'Is DNSSEC necessary?' Then it became 'How do we do DNSSEC?'"

The Public Interest Registry announced plans to deploy DNSSEC in June, prior to the discovery of the Kaminsky bug. Since then, the nonprofit has been trying to educate its 600 channel partners around the world about the need for DNSSEC. It has signed up five registrars for a DNSSEC test that will take place in early 2009.

The Public Interest Registry co-founded the DNSSEC Industry Coalition because it wants to share its experiences with DNSSEC deployment and simplify the upgrade process for registrars.

"It's not just important that .org implement DNSSEC, but DNSSEC needs to be seen as an infrastructure upgrade to the entire DNS because of all the applications that ride on DNS today and all the applications that will ride on DNS in the future," Raad says. "This cannot be done by one organization alone."

NeuStar says it has enabled its registry to support DNSSEC. NeuStar provides the underlying DNS resolution services for 2 million .biz domain names and 1.4 million .us domain names. Now NeuStar is encouraging DNSSEC deployment among companies such GoDaddy, Enom and Network Solutions that sell domain names to businesses and individuals.

"We're doing everything we can to work with our customers to go through the process of supporting DNSSEC," Joffe says. "They may or may not understand the urgency. From our point of view, this is not something that is going to be delayed. It is the single most important thing that needs to be done to try and maintain public trust in the Internet."

The DNSSEC Industry Coalition hopes to drive adoption of DNSSEC across all registries and registrars around the globe. The group includes two country code top-level domains -- .se for Sweden and .uk for the U.K. -- along with Internet security companies such as Shinkuro, NL Net labs and Secure64 Software. The group's members say DNSSEC is the best known mechanism for thwarting a variety of attacks including cache poisoning, DNS redirection and pharming that are used to commit fraud and personal identity theft.

The DNSSEC Industry Coalition is creating implementation manuals and educational materials designed to make it easier and less costly for the domain-name industry to adopt DNSSEC.

"My hope for the DNSSEC Industry Coalition as its chair is to help encourage collaborative efforts to make for a safer and more secure DNS," says Lauren Price, senior marketing manager at the Public Interest Registry. "We're trying to find ways to streamline the implementation of DNSSEC across all of the DNS registries.... We're trying to take the burden off the registrars."

The main goal of the DNSSEC Industry Coalition is to speed up deployment of this security standard, but its leaders acknowledge that they can't fix DNS security until the U.S. government signs the DNS root.

"The domino that starts everything is the root being signed," Raad says. "Even with a very well-intentioned industry coalition, it is unrealistic for us to set a particular date for DNSSEC deployment without the root being signed.... That's why we're urging the signing of the root using the best technical solution that is the most expedient."

There were 174 million domain names registered

This story, "VeriSign, NeuStar and others team on DNS security" was originally published by Network World.

Copyright © 2008 IDG Communications, Inc.

7 inconvenient truths about the hybrid work trend
Shop Tech Products at Amazon