80% of .gov Web Sites Miss DNSSEC Deadline
79
netbuzz writes "Eighty percent of US federal agencies — including the Department of Homeland Security — have missed a deadline to deploy DNS Security Extensions, a new authentication mechanism designed to prevent hackers from hijacking Web traffic. The deadline that whooshed by was Dec. 31, 2009. Experts disagree as to whether this level of deployment represents a failure or reasonable progress toward meeting a mandate set by the Office of Management and Budget in the summer of 2008. OMB officials declined to say why the agency hasn't enforced the DNSSEC deadline for executive branch departments."
Re:How do you check? (Score:3, Informative)
http://lmgtfy.com/?q=dig+dnssec [lmgtfy.com]
No mention of the .dov registrar mistakes (Score:3, Informative)
I am the DNS admin of a federal agency. We signed two of our domains, and twice had .gov delete the keys that allowed the domains to be trusted. We then got the run-around and were lied to by the .gov admin. My management and I are now afraid to make any further progress implementing DNSSEC because .gov has made so many mistakes. It is better to be unsigned than to be signed and have the trust keys be incorrect.
Additionally, the tools to implement DNSSEC are non-trivial. A federal agency or Fortune 500 can afford to buy a Secure64 Signer. Looking forward to when I want to sign my personal domains (in .org and .com), the tools have to become much simpler and much more automated.
I manage DNS for a .gov (Score:4, Informative)