Catch up on stories from the past week (and beyond) at the Slashdot story archive

 



Forgot your password?
typodupeerror
×
Security IT

Secure DNS a Hard Sell 142

ebresie writes "Computer Business Review Online has an interesting article about the lack of acceptance for Secure DNS." From the article: "Speaking during a workshop on the technology, Keith Schwalm of Good Harbor Consulting, a former US Secret Service agent, said that even the financial sector, traditional security early-adopters, are not rushing DNSsec."
This discussion has been archived. No new comments can be posted.

Secure DNS a Hard Sell

Comments Filter:
  • Hard to understand (Score:5, Insightful)

    by Mr. Flibble ( 12943 ) on Wednesday December 07, 2005 @03:30PM (#14204398) Homepage
    Enough of my customers don't understand REGULAR DNS, nevermind secure DNS. The only way that this is likely to be adopted is to have the top level name servers eventually require the secure extensions. I doubt, however, that that will happen.

    As it is now, I have my users going to their registrars and "deleting the 'A' records because: "There is no A on my website."
  • Same as Sony (Score:5, Insightful)

    by Nom du Keyboard ( 633989 ) on Wednesday December 07, 2005 @03:40PM (#14204457)
    While the vulnerabilities in the DNS are well known, the absence of widespread attacks, regulations, and proven business models are holding back DNSsec adoption

    One could have said the same thing about music CD DRM (e.g. the Sony XCP RootKit) -- or the 9/11 terrorist attacks for that matter.

    There's not a problem with it -- until there's a big problem with it. Then everyone asks why wasn't something done to protect us against it?

  • by 26199 ( 577806 ) on Wednesday December 07, 2005 @03:43PM (#14204483) Homepage

    We already have authentication systems. Why should DNS, which every website uses, be doing something which only a tiny fraction of websites need?

    Besides -- technology can't stop phishing. A combination of education, authentication and client software that can with 100% reliability inform the user whether authentication has happened is the answer. Authentication is by far the easiest problem of the three. Education is more or less impossible, and reliably informing users is next to impossible. (In a web browser, anyway. If you let websites display images and run active content, how do you stop them fooling a user, even a well educated one? How do you guarantee it's impossible to do so?)

  • A Modest Proposal (Score:4, Insightful)

    by Nom du Keyboard ( 633989 ) on Wednesday December 07, 2005 @03:43PM (#14204485)
    What it might take to bring about adoption would be a .sec TLD that only operates with DNSsec, and any other major security improvements. Banks and others might prefer to be associated with a domain that is secure from the beginning, spurring its adoption. This way the market place would decide since it would have a real choice.
  • Money talks (Score:4, Insightful)

    by Billosaur ( 927319 ) * <wgrotherNO@SPAMoptonline.net> on Wednesday December 07, 2005 @03:46PM (#14204514) Journal
    From Computer Business Review: Some registrars talk of adding a "significant" add-on fee for DNSsec "expert services", while others talk of making domain registration a case of picking from two services -- a domain name and a "secure domain name", the latter costing more.

    So in the end, economics will drive SecDNS more than anything else. It seems like a good idea though for some institutions to go to a more secure DNS format. Let's face it: Fred's House of Flowers probably doesn't need as secure a domain as Citicorp or the CIA. The Internet ends up becoming a two-level affair, with the majority of sites being regular DNS sites and corporations and such using the more secure DNS setup.

  • Redundant (Score:4, Insightful)

    by CyberVenom ( 697959 ) on Wednesday December 07, 2005 @03:50PM (#14204540)
    The problem with SecDNS is that pretty much the same thing is already performed at the SSL level with domain certificates, so there is little argument for changing the DNS system.
    The article says:

    It's possible that a web surfer could think they are visiting their bank or an auction site and hand over their sensitive data, and it would be impossible to tell they were at a malicious site.

    I disagree: there is a good way to tell if that is your bank you are talking to; check that they have the proper SSL certificate for their domain. Or better yet, just look at the color of the address bar in Firefox. If your bank isn't using SSL already, there are reasons far beyond DNS that they should be!
    Also, even with SecDNS in place, physical man-in-the-middle or route poisoning attacks could intercept the communication at the IP level, making SecDNS marginally useful at best. In my opinion, the proper solution would be to encourage more widespread adoption of the existing SSL cert solution for services other than HTTPS. (e.g. SMTP, POP, FTP) Also, it would be good for the industry to have some additional certificate authorities with lower certification prices added to the major browsers' default trust list.
  • by Anonymous Coward on Wednesday December 07, 2005 @04:04PM (#14204643)
    I disagree. Qmail is a prime example of getting things very wrong.
  • You can't get it. (Score:4, Insightful)

    by mellon ( 7048 ) * on Wednesday December 07, 2005 @04:06PM (#14204666) Homepage
    The main problem with "secure DNS" is that you can't get it. This is because some of the problems remain unsolved - the problem of key rollover is currently generating a huge debate on the namedroppers mailing list, not the least because one of the proposals being advanced is patented.

    On top of that, even if you ignore the signing of the root key, by and large you can't get ad-hoc zone signing - if you want to secure a zone, everybody who's going to see it as secure needs a copy of the zone key, because your top level domain (e.g., .com) isn't in a signed zone.

    On top of that, many TLD providers seem to want signed zones to be a value-added option rather than basic functionality. So as with RSA, lo those many years ago, adoption will be slow because people want to monetize it, rather than seeing it as basic functionality that has to be there.

    So it's no surprise that the end user isn't interested in it yet - they can't get it even if they are interested.
  • Comment removed (Score:4, Insightful)

    by account_deleted ( 4530225 ) on Wednesday December 07, 2005 @04:26PM (#14204812)
    Comment removed based on user account deletion
  • by schon ( 31600 ) on Wednesday December 07, 2005 @04:39PM (#14204906)
    What it might take to bring about adoption would be a .sec TLD that only operates with DNSsec

    The thing is that this isn't really feasable, because you have to replace all the client software to make it work - and at that point you might as well mandate IPV6 with IPSEC.

    Think about it: DNS is only as secure as its weakest link, and that link is the desktop. If your suggestion is implemented without making every desktop aware of the .sec TLD's requirement to use DNSsec, all an attacker has to do is convince your desktop to talk to his DNS server (which is pretty easy, if you think about it) and it's game over.
  • Re:bigger fear (Score:5, Insightful)

    by Agelmar ( 205181 ) * on Wednesday December 07, 2005 @05:08PM (#14205138)
    This is a valid point, especially when you look at the number of small fish in the pond. You have small registrars, you have small CAs (do you really trust Unizeto? I don't even know what it is, and yet by default Mozilla gives it the same trust as it gives Verisign.) Even so, I posit that it really doesn't matter how much trust I can place in the CAs and the registrars, because the (unfortunate) end result is that most users, when presented with a certificate error, simply click OK. We train users to do this. Many corporate and educational entities set up their own CAs, and then when users see a message in their browser about an untrusted CA, the tech staff just tells them to 'click ok'. As such, the user is now conditioned to click 'OK'. What have we done? Totally diminished the usefulness of the trust aspect of SSL.
  • by turbidostato ( 878842 ) on Wednesday December 07, 2005 @06:19PM (#14205757)
    "Most people can't tell if they are connected using SSL or not"

    Those are beyond salvation and I don't think that secure DNS was developed with them in mind.

    I mean, someone which will accept following an hyperlink coming on a html e-mail from somebody unknown to him that says "your.bank.of.confidence" while obviously opening a browser pointing to "your.hacker.of.the.day" won't benefit any more from using secure DNS.
  • by bogado ( 25959 ) <bogado.bogado@net> on Wednesday December 07, 2005 @06:44PM (#14205933) Homepage Journal
    If you have a malware that poisoned your DNS cache, it might as well install a new trusted key in your browser. The malware site can then have another key that is signed with the key that the malware have already installed and you will have a secured connection.

    But starting with a corrupted computer to begin with is a bad example anyway. The malware could simply substitute the ie.exe program for a new one that show what he want.
  • by askegg ( 599634 ) on Wednesday December 07, 2005 @07:24PM (#14206152)
    SSL does not solve DNS issues. Nothing prevents determined hackers from installing an SSL certificate on their phishing website to look like the real thing - most users don't know the difference anyway.
  • Why?? (Score:2, Insightful)

    by jskline ( 301574 ) on Wednesday December 07, 2005 @07:28PM (#14206181) Homepage
    Why on earth would you expect them to embrace it?? There is NO cost incentive to go to this. Apparently something catastrophic has not yet happened to emtpy the coffers and there-by motivate them...

  • by memodude ( 693879 ) <fastmemo AT comcast DOT net> on Wednesday December 07, 2005 @08:39PM (#14206553)
    SSL does nothing to prove you're connecting to the right site if the attacker gets a cert from a CA. Most of the CAs now have "instant" SSL certs which have zero identity checking and a lower price. Very few users pay attention to the SSL icon, but even fewer open up the certificate properties and verify that the organization name on the cert is from who they think it is.

He has not acquired a fortune; the fortune has acquired him. -- Bion

Working...