DNS Inventor Tackles Flaw 101
nk497 writes "Dr Paul Mockapetris is looking to fix the flaws in the Domain Name System he helped invent. 'It was never meant to be the only security mechanism for naming data on the internet, but was intended for additional security measures to be added to it later.' The flaws, first uncovered by security researcher Dan Kaminsky over the summer, lets attackers redirect genuine URLs to malicious ones — a problem Mockapetris believes could be solved using digital signatures."
Re: (Score:2)
Not just new here, very, very new here.
Re: (Score:1)
If a typo amazes him, I think he's not only new to Slashdot, but new to the Internet. Actually, he's probably new to typing. Next he's going to tell us about some amazing new developments in a town called Gutenberg.
Re: (Score:3, Informative)
Re: (Score:2)
I think Gutenberg was a person.
Yeah, he was in those Police Academy movies, right?
Re: (Score:1)
I know I see it!! (Score:1)
Hmm... (Score:4, Insightful)
Ok, so this approach where you release something half-way done and fix it later is much older than I thought.
Re: (Score:2, Funny)
Re:Hmm... (Score:5, Insightful)
Ok, so this approach where you release something half-way done and fix it later is much older than I thought.
Well, yeah. Here's the first instance I know of:
Carl: Hey, I just figured out that by attaching a piece of slate and some handles to this thing I call the "wheel", I can haul around deer carcasses much more easily than my previous method of throwing them over my shoulder and crawling. I call this new contraption the "wheelbarrow".
Lenny: That's great! I think that I'll use it to haul home my fiance after I propose by clubbing her over the head. When I'm moving people around with it, I'll call it a "car". Of course, if anyone wanted to use the "car" for frequent trips or moving multiple people around, they'd have to make significant improvements.
Homer: Your car sucks. Why in the hell did you design it like this? This thing looks like it was made to haul around deer carcasses, not people! This is obviously an incomplete solution - Why did you show it to us without perfecting it first!?! You're an idiot.
Preemptive retort to silly overly-critical responses: I agree, it is a deeply flawed analogy. It's primary intent was humor while only lightly relating to the incomplete implementation of the DNS system.
Cheers.
Re: (Score:3, Funny)
Thank you for using a car analogy
Re: (Score:1)
You win. That is flat out the best car analogy EVER.
I tried to RTFA... (Score:5, Funny)
... but it seems that a DNS attack redirected it to a fluff piece without any useful content.
Re: (Score:1)
Re: (Score:1)
Re: (Score:1)
Actually...it redirected to a page, with a hidden iframe cross scripting to another website, that has malware waiting for you.
Re: (Score:2)
I didn't find the linked article very informative, but with the help of Google found this very nice explanation [unixwiz.net] of the problem.
Re:We'll add security later (Score:5, Informative)
Not really. Back when DNS was invented (1982) pretty much everything connected to the Internet was essentially a trusted machine. Arguably that was almost true until the Morris worm in 1988. Of course you could never truly trust them, but the idea was that if someone did something silly other people would phone them and then they would stop. Essentially it was an anarchy populated by non malicious people.
Law is only way (Score:2, Insightful)
Really, the only way to get ISPs to offer secure DNS protocols is to require it by law. Otherwise, its just their nature not to do, to be lazy and ignore it, as they do with IPv6. So mandate it by law I say.
Re: (Score:1)
Re:Law is only way (Score:5, Funny)
You always have the option to boycott that ISP, but if you live somewhere like I do, you only have one broadband option.
I see you're using the sense of "always" that means "occasionally" or even "very rarely."
Re:Law is only way (Score:4, Funny)
Re: (Score:2)
I don't need it to survive as such, but internet access is pretty much a job requirement when working in my field, so I need it to buy food. :D.
Re: (Score:2)
Boycott is still an option, just a very inconvenient one due to your life choices. If your ISP options were bad enough, you could change careers or move. Those are major adjustments to (I assume) minor grievances, so I suspect that you'll do neither. There are only a few things that can't be boycotted if the situation is dire enough.
Don't like your ISP options? Sign off the Internet when at home or move.
Think music costs too much? Stick to free music services or limit yourself to your current collectio
Re: (Score:2)
but a boycott is a group tactic, not a personal tactic. boycotting is basically a form of economic coercion, but economics being a social science requires that you take group behaviors into account. so if it's too impractical to boycott a particular business, then it's basically impossible to boycott them since not enough people will engage in the boycott to really make it work.
broadband internet access is essentially a service with inelastic demand. to make things worse, communications networks (telecoms/c
Re: (Score:1)
Re: (Score:1)
Re: (Score:1)
Re: (Score:1)
Tell that to a corporation or small business. For their "survival" they need the internet. Now if you're talking about human survival.... we're all in America right? /sarcasm
Many of the corporations and small businesses in my area are surviving just fine without paying a monthly fee in order to decrease employee productivity.
It's really hard to start a new business without advertising & web pages, though. You'd have to actually offer a higher quality product or service directly to customers which, of course, is not something these kids today are capable of comprehending./sarcasm
Re: (Score:2)
Just like central heating, electricity, piped water supplies, and your car.
Re: (Score:2)
Re: (Score:1)
Re:Law is only way (Score:5, Insightful)
So if your internet at home went down, would you wither up and die?? Or just a little inside?
No, but considering the fact that I live over 1,500 miles from the office where I work, it is not merely a luxury that I telecommute. If I can't have broadband Internet, I'll need to quit my job and find another, convince my wife to quit her job and sell our house during the housing market slump so we can move (either somewhere I *can* have broadband Internet, or somewhere within driving distance of my company's office), or leave my wife behind so I can move. I can't simply boycott the only broadband ISP in my area on a whim, as you suggest -- it is a much, much bigger issue for me.
You're creating the false dichotomy that everything which is not necessary to survive is a luxury. I agree that I do not strictly need broadband Internet to survive, but disagree that the Internet is a luxury, for me at least. Perhaps you would have no problem boycotting utility companies if you felt they were doing something irresponsible, since after all electricity, water, natural gas, etc are not necessary for survival (and in fact many people in the world do not have these things), but most people in the US would argue that they are more than luxuries. Maybe you are lucky enough to have well or cistern water, and live in a climate where winter heating isn't necessary for survival, or perhaps you have a wood-burning stove/fireplace that could heat your house if you don't have electricity or natural gas -- but that doesn't mean that they are luxuries for everyone, irrespective of the circumstances of that person's life.
Those are more extreme examples, but the fact is that my life is currently based around having broadband at home, and although I could do without it (just as I could do without electricity, natural gas, and city water), I would need to make very large changes to my life to do so.
Re: (Score:1)
Re: (Score:2)
I didn't read everything you bothered to type, but you could always find another job.
Yes, I said that myself at the beginning of the second sentence of my comment. (Perhaps you should actually read what I typed before assuming you know what point I'm trying to make.) Do you really think it should be worthwhile for me to quit my job just because there are no broadband ISPs that offer secure DNS where I live?
Re: (Score:1)
Re: (Score:2)
So if your internet at home went down, would you wither up and die?? Or just a little inside?
No, but considering the fact that I live over 1,500 miles from the office where I work, it is not merely a luxury that I telecommute. If I can't have broadband Internet, I'll need to quit my job and...
It's interesting to note throughout the advance of civilisation the passage of things from the category of luxuries to the category of necessities. This is not an attutudinal shift, but a real one. To entertain further, the idea of "getting back to basics" such as hunting your own food (a good idea in certain rural areas, not so good in Chicago) turns out to be more of a luxury than a necessity, in an inversion of the trend. It's often seen that people confuse the two categories (these people are often i
Re: (Score:2)
That's why we also need competition in internet access services. And I don't mean just a 2nd provider. We need enough providers to be sure at least one will be innovative in a technology way (not just innovative in a marketing way). We need enough providers to be sure at least one will do things right. I believe that means we need at least 6 such providers. Unfortunately, that is not a practical number of infrastructure overbuilds. So we need some kind of shared, neutral, "last mile" facility that all
Re: (Score:1)
Re: (Score:2, Informative)
Re:Law is only way (Score:5, Insightful)
True enough, but the Almighty Invisible Hand of the Free Market isn't taking care of this, either.
Re: (Score:1)
Yea, at the moment it's too busy bitch-slapping greedy bankers.
Re: (Score:3, Informative)
It's trying to, but something is protecting the bankers.
Re: (Score:2)
Free markets work well as long as there is a free market. Since no ISPs are fixing this, or IPv6, and most customers wouldn't understand the problem, there is no demand and hence no market, let alone a free one.
This does not mean that legislation is the right answer; the government may mandate a poor solution. Unfortunately it will only be when this becomes a high-profile security risk that demand will rise.
Re: (Score:1, Interesting)
Re: (Score:3, Informative)
The free market can not exist in environments where the government gives special monopolies to a few companies. The only real competition in this market is for these companies to protect their monopolies.
John D. Rockefeller said, "Competition is a sin."
A great muckraking book on this topic is Confessions of a Monopolist, written in 1903.
This kind of thing has been going on ever since the Supreme Court brazenly declared that a corporation has the same rights as a natural person.
Re: (Score:2)
Not enough value in DNSSEC (Score:3, Interesting)
There's not enough value in implementing DNSSEC. That is, of course, why you're proposing a law. Laws are needed to get people to do things that are irrational.
Hm, that and DNSsec sucks ass (Score:4, Informative)
Look at the history of DNSsec; the specs have been done and redone several times over, there is no consensus, and it looks like it would be a bitch to admin.
Re:Hm, that and DNSsec sucks ass (Score:5, Interesting)
Can someone explain what is the point of DNSsec? An https website already has its own certificate which authenticates you are talking with the right person, and https is designed to be secure without trusting DNS. If DNSsec had been widely implemented twenty years ago then secure protocols might have evolved in a different direction, but given where we are now, what problem does DNSsec solve?
Similarly if you use ssh then the server authenticates to you with its own keypair. You don't need to trust that DNS gives the right answer.
Is DNSsec just to stop denial of service attacks on the DNS infrastructure and trivial hijacking of insecure protocols like telnet and http?
Re:Hm, that and DNSsec sucks ass (Score:5, Interesting)
Can someone explain what is the point of DNSsec? An https website already has its own certificate
DNS is a naming service, but it was never designed to be a trustworthy naming service. If it was, then DNS spoofing would have been impossible. Another reason why, currently, SSL certificates are needed is IP address spoofing. But if your certificate is embedded in a DNS entry then there is no reason for anyone to need a third-party-signed certificate at all. All you really need is a single source of trust. Right now we have 2: the root nameservers and the root SSL certificate authorities.
So if we fix DNS then we can skip SSL root CAs entirely and just go with DNS. But SSL certs are a lucrative business, which is why Verisign et. al. don't want DNS to be fixed. It would be the end of their best cash cow. But fixing it is necessary for the internet to become a truly trustworthy place of business.
The article, BTW, strikes me as odd. Isn't it Paul Vixie who has been campaigning for DNSSEC for ages now? He isn't even mentioned.
Re: (Score:2)
Re: (Score:1)
The problem with DNSSEC is that the RFC was created without operational experience.
The standard may be implementable, but it's a gargantuan mess that sites can't be convinced to implement. It is too complicated to easily and reliably implement in new DNS server software.
We need a SIMPLE, INCREMENTAL update to the DNS service to add security. That ALL flavors of DNS server can easily implement
A proof of concept should be implemented and tested as widely as possible BEFORE an RFC is even written.
Wh
Re: (Score:2)
It's a weird article. I'm not exactly certain what information was actually conveyed or what Paul Mockapetris was actually saying and I know Paul. (scratches head).
Poeple need to adopt DNSSEC. Yeah ok, whatever. A few poeple think this is giving too much power to verisign (again) and Dan Bernstein has other ideas and isn't fond of DNSSEC.
http://cr.yp.to/djbdns/forgery.html [cr.yp.to]
"All you really need is a single source of trust. Right now we have 2: the root nameservers and the root SSL certificate authorities."
Wel
I repaired a small technical error or two. (Score:1)
An https website already has its own certificate which authenticates you are talking to some random entity who paid a tithe to Verisign, and https is designed to be a cash cow for certificate authorities regardless of their competence, reliability or trustworthiness.
Fixed that for ya.
Re: (Score:2)
DNSSec protects against a kind of attack that doesn't exist and never happens, by making attacks that do happen (like denial-of-service) easier to mount.
DNSCurve, a younger, competing protocol protects against most of the attacks DNSSec is designed to, and even protects against some denial-of-service attacks.
However, the other part of your question, about is SSL sufficient, the answer is no [mozilla.org]. It demonstrates nicely why a security extension needs to be one we can roll out quickly so that we can start blocki
Re: (Score:2)
Re: (Score:2, Insightful)
http://dnscurve.org/index.html [dnscurve.org]
DJB's take on it, although it's gone quiet...
Re: (Score:1)
No it doesn't. It reflects what the RFC Editor has been caused to publish.
Just because it's published as RFC doesn't mean it's a consensus that the spec is a good one, or that implementing it will be a good idea.
The wide implementation should come before drafting any complex RFCs, otherwise the RFC may turn out to be worthless.
Re: (Score:1)
Wrong... RFC's go through lengthy comment periods as drafts and though there are none that get 100% support, their purpose is to serve as specifications so people know how to implement protocols (for example).
DNSSEC had been widely implemented, tested, argued over for about 10 years before the final RFCs... Check it out... >10 years
Know your history dude.
Re: (Score:1)
RFC issuance no longer means there is a consensus. DNSSEC may even be proof of this.
Comment periods may be lengthy, but the audience is small, and a limited proportion of the interested parties.
My primary objection to DNSSEC, and a reason I probably wouldn't entertain the concept of implementing it is it actually compromises security.
For example: I have some records in my zone that are obscure and private. I do not allow third party zone transfers (except from certain trusted hosts on a local subnet)
I'm too busy admin'ing DNS over avian career (Score:2)
You appear to be slightly confused as to what RFCs are.
Re: (Score:1)
As seemingly does the rest of society [wikipedia.org].
My point is that just because there's a law, doesn't mean it's followed or enforced. My solution is to just release enough security threats (redirects in this case) that people are simply forced to switch. In basic terms, money is the only reason why people change. Take the American government, for my obligatory Obama plug.
Re: (Score:3, Funny)
"Take the American government"
Fixed it for you
Take the American government please.
Re: (Score:2)
As an ISP, I'd happily implement a secure DNS protocol if there were one - right now the closest thing is DNSCurve [dnscurve.org], but it seems that the asshats that created the problem- are prone to continue promoting a "solution" that requires more powerful hardware, puts servers and clients at a greater risk for denial-of-service attacks, and frankly doesn't work.
DNSCurve seems very attractive, but would require cooperation from the root servers- some of which have a vested interest in promoting the unworkable and bro
Re: (Score:2)
I don't disagree. I'd like to start implementing DNSCurve immediately.
Re: (Score:1)
Re: (Score:1)
Mockapetris (Score:5, Interesting)
ledit too (Score:1)
Old News? (Score:1)
DNSsec (Score:2, Interesting)
Re: (Score:3, Informative)
It's not a question of DJB being too lazy to implement BIND zonefiles. It's more a question that BIND zonefiles must die because they're astoundingly difficult to parse, and even if they weren't, they're prone to user edit failures. Ever forgotten a dot at the end of a name? I haven't -- not since switching to djbdns.
DNS 2.0 (Score:2)
What he said. I mean really. If anybody still thinks BIND zonefiles are a good idea they should bloody well be forced to write a program that parses them and good luck.
(Oh, btw, hi russ)
I realize there's an obligate duty for an car analogy here, but, so sorry. *
You'll have to settle for instruction sets. BIND files are now commonly bigger than most old programs, so what you have to write to get what you want to happen is important. BIND is like an old clunky assembler with bizarre and arcane properties. IBM
Malicious links are a serious problem nowadays (Score:2, Funny)
Re: (Score:1, Funny)
Hey how did you get a list of my bookmarks?
No need to fix this problem (Score:4, Insightful)
Then we'll find ourselves longing for the current DNS problem.
Re: (Score:1)
I propose a new spec: it's called the no new GTLDs rule. Henceforth, from Nov 10, 2008, there shall be no new GTLD or special GTLDs.
That is, the list of the current GTLDs in place should be hardwired to all DNS resolver software, as a list of TLDs.
Upon presentation of a TLD not in the hardwired list, all DNS resolvers shall indicate failure with a return code of NXDOMAIN.
Do you think the DNS related RFCs could be revised to codify this special rule?