FALLS CHURCH, Va. — FOSE 2009, the most comprehensive event for government information technology (IT) professionals, today announced that it will have over 115 new products and solutions on display at this year’s event. Scheduled for March 10-12, 2009 at the Walter E. Washington Convention Center in Washington, DC, FOSE is the largest trade show for government technology professionals.
Search DNSSEC Blog
DNSSEC NEWSFLASH
Thursday, February 26, 2009
FOSE 2009
FALLS CHURCH, Va. — FOSE 2009, the most comprehensive event for government information technology (IT) professionals, today announced that it will have over 115 new products and solutions on display at this year’s event. Scheduled for March 10-12, 2009 at the Walter E. Washington Convention Center in Washington, DC, FOSE is the largest trade show for government technology professionals.
Tuesday, February 24, 2009
Forgetting The User, Again.
Just like users can be fooled into trusting fraudulent SSL-enabled Web sites, they could be fooled into trusting fraudulent hosts. User interaction is just as important as the technical deployment specifications, yet little work is being done on that front.
If DNSSEC will actually be useful for users, a few things need to occur:
1. Browser vendor should agree on a consistent method to display the status of DNSSEC to the user in an unambiguous and clear manner. Even something as a text representation of "Authenticated Host" or something like that.
2. Web sites that are known to contain sensitive information or activity like financial institutions, online retailers, health care providers, and other entities that should have a higher standard of trust, should be required -- through regulation or best practice -- to use DNSSEC. If bank A uses DNSSEC and you get a DNS response that is not signed, the user should know that is a potential problem. But a user shouldn't have to keep track of which banks use DNSSEC and which don't.
Users can make the right decisions if they are given the right information. That is just as difficult as figuring out how to generate the response in the first place.
Full article: Mike Fratto, "DNSSEC: Forgetting The User, Again.", Retrived on Feb 24, 2009 from informationweek.com/blog/main/archives/2009/02/dnssec_forgetti.html
Wednesday, February 18, 2009
Debian 5's Five Best Features
Tuesday, February 17, 2009
Interim Trust Anchor Repository "Beta"
IANA provides an Interim Trust Anchor Repository to share the key material required to perform DNSSEC verification of signed top-level domains, in lieu of a signed DNS root zone. This is a temporary service until the DNS root zone is signed, at which time the keying material will be placed in the root zone itself, and this service will be discontinued.
What is the ITAR for?
The Interim Trust Anchor Repository, or ITAR, acts as a mechanism to disseminate "trust anchors" that have been provided by the operators of top-level domains who use DNSSEC to secure their zones. IANA is responsible for managing the DNS root zone, and uses these existing trust relationships to verify the supplied trust anchors come from the correct party. The system is considered interim as it is designed to be deprecated once the DNS root zone itself is signed with DNSSEC.
What is a Beta?
This is a preliminary testing version of the service for the community to try. We will take feedback and improve the product before it is considered fully production ready. In particular, we appreciate feedback on problems that occur, as well as features that could be added to make the service more useful. You can send any comments on this beta to itar@iana.org.
Who may submit trust anchors?
This repository is limited to trust anchors for top-level domains. Top-level domain operators who have DNSSEC-signed their zones may use this service. The IANA contacts for a domain must cross-verify their intent to publish anchors before they will be accepted by IANA into the ITAR, so third parties are not able to submit trust anchors without their consent.
How is this connected to IANA's DNSSEC test bed?
This is a different project. The IANA DNSSEC test bed offers a signed DNS root zone (see http://ns.iana.org/dnssec/status.html). Trust anchors supplied to the ITAR, however, will be used for the DNSSEC test bed.
How can I download the trust anchors?
The trust anchor formats are distributed either via HTTP (above), Rsync (rsync://rsync.iana.org/itar/, and FTP (ftp://ftp.iana.org/itar/). We also provide a digest of the file, and a PGP signature, to help verify the contents. During initial testing were are using a PGP key with ID 81D464F4.
Why does the repository contain DS records, rather than DNSKEY records?
The trust anchor repository is designed to replicate the same trust information that would be stored in the DNS root zone, if the DNS root zone were signed. Therefore, we store the DS records from top-level domains. Recognising that some DNS validating resolver implementations do not accept DS records as configurable trust anchors, we have provided a tool that can convert DS records to DNSKEY records if you require that.
How can I get announcements relating to ITAR?
We have set up an ITAR announcement mailing list. You can subscribe at http://mm1.icann.org/mailman/listinfo/itar-announce. We will post significant announcements here, as well as any advisories such as key revocations.
Please contact us at itar@iana.org with any questions or comments. (Source: https://itar.iana.org)
Monday, February 16, 2009
How to deploy DNSSEC on the Windows Server 2008 R2 and Windows 7 operating systems
Brief Description
This guide provides an overview of Domain Name System (DNS) Security Extensions (DNSSEC) and information about how to deploy DNSSEC on the Windows Server 2008 R2 and Windows 7 operating systems.
Overview
DNSSEC is a suite of extensions that add security to the DNS protocol. The core DNSSEC extensions are specified by the Internet Engineering Task Force (IETF) in RFCs 4033, 4034, and 4035, with additional RFCs providing supporting information.
System Requirements
Supported Operating Systems: Windows 7; Windows Server 2008
Source: http://www.microsoft.com/downloads/details.aspx?FamilyID=7a005a14-f740-4689-8c43-9952b5c3d36f&DisplayLang=en
Tuesday, February 10, 2009
DNSSEC News: U.S. misses DNS security deadline
The federal government missed its first deadline for rolling out DNS security mechanisms on its .gov top-level domain. Federal officials now say they will cryptographically sign .gov by the end of February, one month behind their original schedule.
Federal agencies were required to deploy DNS Security Extensions (DNSSEC) on the .gov top-level domain by January 2009 and on all sub-domains by December 2009 under an Office of Management and Budget (OMB) mandate issued last year.
DNSSEC prevents hackers from hijacking Web traffic and redirecting it to bogus sites. The Internet standard prevents spoofing attacks by allowing Web sites to verify their domain names and corresponding IP addresses using digital signatures and public-key encryption.
DNSSEC is the only foolproof way to prevent cache poisoning attacks, where a hacker redirects traffic from a legitimate Web site to a fake one without the user knowing. These attacks are a result of a significant DNS flaw known as the Kaminsky Bug, which was discovered this summer.
The U.S. General Services Administration (GSA) said Monday that it will deploy DNSSEC on .gov by the end of February. Read more...
Saturday, February 7, 2009
Tuesday, February 3, 2009
NIST Purchases Secure64 Software to Secure DNS Infrastructure
Secure64 Software Corporation announced today that the National Institute of Standards and Technology (NIST) has purchased the company's DNSSEC software - Secure64 pDNS Signer - the first DNSSEC signing software that's easy to implement, so organizations can deploy DNSSEC quickly, safely and correctly. more info