Dot-Org TLD Signed For DNSSEC 58
graychase writes "A major milestone is reached as the first major top-level domain (.org) is now secured with DNSSEC. The expense to .org for implementing DNSSEC on its infrastructure and operations has not been a small one. While specific figures as to the cost of DNSSEC implementation haven't been released, Afilias, which is the technical operator of the .org registry, told InternetNews.com in 2009 that the DNSSEC implementation would be a multi-million-dollar effort. The cost isn't going to be passed on by .org to domain registrars. The move toward securing the .org registry with DNS security started in September 2008, following the Kaminsky DNS flaw disclosure."
Re: (Score:2)
Eat peppermint oil.
.org first over .com ?? (Score:2, Interesting)
Seems odd, too many .com's perhaps?
Re:.org first over .com ?? (Score:5, Informative)
More likely simply that different companies/organizations are responsible for .org vs .com vs .net vs .whatever, and each of those had different plans (or no plans) and acted on them at various speeds.
Re: (Score:3, Informative)
Re: (Score:2)
As an interesting side node, Afilias uses PostgreSQL to run .org and .info.
(I can't find a recent link that directly says that, but clearly they are still involved with PostgreSQL: http://www.afilias.info/news/events/2008/03/29/postgresql-conference-east-2008 [afilias.info] )
Re: (Score:2)
Re: (Score:2)
Re: (Score:2, Informative)
There will be a lot more TCP (and IPv6) queries (Score:4, Informative)
Because of the size of the new DNS Resource Records, notably the RRSIG and DNSKEY RRs, and partly because of the (perhaps temporarily) short TTL of one day, there will be a lot more TCP queries because of the size limit on UDP ones. The .ORG nameservers are also IPv6ified, and there is even less space in UDPv6 queries, so hosts that do not exclusively or preferentially make DNS queries in IPv4 will now make TCPv6 queries. These are likely to be slower than UDPv4 queries before the signing and v6ification, and the UDPv6 queries before the signing.
Scaling is helped by using anycast IP and IPv6 addresses, but the downside is that a routing flap that occurs any time after the first TCP/TCPv6 SYN from a client will cause a client to have to requery because of an RST fired back by the newly-closest anycast nameserver, or wait on a full TCP timeout (and then probably still see the RST) depending on the timing. (The worst case is probably having the final FIN segment being eaten by Shub-Internet or someone trying to do a devious (and probably pretty local in scope) denial-of-service consuming resources on possibly the client and two servers).
In short, this is not a win for performance, and it will be a good idea to use long TTLs in the zone itself (and on 2nd level nameservers) once it appears safe to do so.
Re: (Score:3, Informative)
Re: (Score:2)
I'm sure the gp knows that. Reread his post.
Re: (Score:1, Funny)
No shit sherlock. The AC was addressing the performance issue, not the intent. Crack open your MCSE manual again and do some more reading.
Re: (Score:3, Informative)
DNSSEC requires EDNS. EDNS allows for UDP packets larger than the original 512-byte limit of DNS over UDP. There could be problems with fragmented packets which are larger than the MTU. Some experiments show that responses with DNSSEC and IPv6 are larger than 512-bytes but smaller than typical MTU of 1500 bytes.
There are some old firewall equipment that mistakenly prohibits DNS packets longer 512 bytes over UDP but those have caused problems for a while.
Re: (Score:2, Interesting)
Re:Browsers (Score:4, Informative)
Browsers? They shouldn't care about DNSSEC either way, all of that should be handled by the local resolver. To be fair I'm presuming here that you mean web browsers as opposed to say DNS browsers.
Re: (Score:2)
DNS doesn't validate real-world identity (is ebaypayments.com run by eBay, or some guy that happened to register the domain for his phishing scam?), and it puts DNS (by definition) in the trust path, which may not be desirable if there's a risk that your upstream servers (a government, perhaps) might want to put their own records in your zone. (Yes, they can do that today, but any attempt to redirect e.g. SSL sites will fail unless they also control a SSL certificate authority. Putting your eggs in one ba
Re: (Score:2)
Actually his main source of information about the Internet is Ted Stevens, and he meant a herd of cows, browsing the pasture. ;)
Re: (Score:3, Interesting)
Browsers? They shouldn't care about DNSSEC either way, all of that should be handled by the local resolver. To be fair I'm presuming here that you mean web browsers as opposed to say DNS browsers.
What should the user see if a DNS failure occurs because of a failed signature? "Host not found?" Something like a TLS certificate mismatch dialog?
Re: (Score:1)
unless I'm missing something key here?
Re: (Score:3, Interesting)
unless I'm missing something key here?
The user interface. The browser should be able to warn you if you're not getting DNS records via DNSSEC.
Re: (Score:2, Insightful)
Re: (Score:1)
As an end-user, is there some way to tell? (Score:4, Interesting)
As an end-user, is there some way for me to tell if a domain has been authenticated along the whole chain by DNSSEC? Do any of the web-browsers, for example, include DNSSEC support, to show that a domain has been verified? Or, is DNSSEC only a server-to-server tech, but doesn't extend to end users? If it does extend to the end-user computer, can I use DNSSEC on an un-trusted network, to connect securely to my ISP's DNS Server (or google dns, or OpenDNS, etc), to make sure I'm getting back the correct DNS info (I suppose the 'real' answer for such a situation, at least currently, is a VPN, although some organizations [like where I work] have VPN's that only tunnel traffic to the secured network, and won't tunnel any other traffic, so such a VPN doesn't protect you when visiting any other sites/hosts on the internet).
I think it would be nice, if I don't have access to a real VPN connection, to at least be able to make sure that DNS is secured and trustworthy (although that, of course, doesn't guarantee that there aren't any man-in-the-middle attacks).
Re:As an end-user, is there some way to tell? (Score:5, Informative)
As an end-user, is there some way for me to tell if a domain has been authenticated along the whole chain by DNSSEC?
Yes, that's actually the entire point. Your computer ("stub resolver", the library all your programs use to do DNS queries) can either (1) not care, in which case you're really no safer than with regular DNS; (2) ask your ISPs resolver whether the records were signed, in which case you're slightly safer but not very much; or (3) demand that your ISPs resolver send it all the signatures along with the actual result, in which case you're about as safe as can be (someone would have to break/steal the keys used to sign the records, in order to cause trouble).
What you as the person using the computer see, is of course dependent on the particular programs you use and what they do with the extra information that's available. Probably most don't do anything with it yet. :(
Re: (Score:2)
Re: (Score:2, Informative)
Re: (Score:2)
(3) is still not fully correct. You would only be as safe, as you
1. know that the signer is who you think he is, and
2. actually trust the signer.
Since you don’t have the public keys for all the domains on the planet on your hard drive to check the actual correctness, point 1 already falls flat.
And even then, I haven’t met them, I did no learn to know them, so I don’t trust them any more than any other crook who could highjack it, anyway. ^^
Re: (Score:2, Informative)
Re: (Score:2)
The signer is who you think he is. The signed root zone lets you know that the root zone has not been tampered with. If you don't trust the IANA, you might as well stop using the internet entirely, since the IANA decides what the root servers serve up. The root zone contains the public keys for the "org." domain. Only Afilias, who maintains the "org." domain can request the key for .org in the root zone to be changed. Thus if the root zone signature is good, we know that the key in it for "org." belongs to
Re: (Score:2, Informative)
Re: (Score:2)
someone would have to break/steal the keys used to sign the records, in order to cause trouble
Or lean on the registrar. It's going to be a bit interesting to see how this will affect the DNS based government filters that are implemented on ISP level in a lot of countries.
Re: (Score:2)
Re: (Score:2, Interesting)
Re: (Score:1)
Re: (Score:3, Informative)
FYI, OpenDNS does not and will not support DNSSEC. DNSSEC breaks their model of typo-squatting, and filtering in general.
Re: (Score:2)
There is a Firefox add-on, DNSSEC Validator [mozilla.org], which appears to work for the pir.org [pir.org] zone, as well as my own roysdon.net [roysdon.net] zone. Both are DNSSEC signed, although my roysdon.net is found in the DLV.
You can point the tool to use Comcast's DNSSEC trial resolver which is DLV-enabled at 68.87.68.170. .SE.
You can trial Comcast's DNSSEC trial resolved which does not have DLV support at 68.87.64.154 and rely only on the Root signature and previously published ccTLDs like
pir.org is an example of a zone which you can ve
Old News, .ORG signed over a year ago (Score:1, Informative)
https://lists.dns-oarc.net/pipermail/dns-operations/2009-June/003940.html
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
Colleagues,
On behalf of PIR Technical Support I would like to announce that as of .ORG is DNSSEC signed.
today, 2009-06-02, at 16:00 UTC
The following KSK is now valid for .ORG
org. IN DNSKEY 257 3 7 (
AwEAAYpYfj3aaRzzkxWQqMdl7YExY81NdYSv+qayuZDo
Do I need to do anything? (Score:4, Informative)
I have a .org domain hosted on my server. Is there something I need to do?
Re:Do I need to do anything? (Score:5, Informative)
If you don't care whether the records for your domain(s) are secure, then no.
If you do want to take advantage of the new functionality, then you need to serve some extra records and give some extra data to your registrar (I think it's just the public half of your key). I imagine the exact steps to do this would vary based on who your registrar is and which DNS server you're running.
Re: (Score:2)
Re: (Score:2)
First, see if your current domain Registrar is one of 13 .ORG Registrars that are supporting DNSSEC right now:
http://www.pir.org/get/registrars?order=field_dnssec_value&sort=desc [pir.org].
If your .ORG domain Registrar is not listed as providing DNSSEC support, transfer your domain to GoDaddy or one of the other 12 .ORG Registrars with DNSSEC support.
Then generate your keys, sign your zone, and provide your Registrar your DS key. Anyone using a DNS server with DNSSEC enabled and ITAR keys will have the .ORG key
Slashdot (Score:2, Interesting)
When will slashdot.org be signed?
Re: (Score:2)
No, nor while it have ipv6 records. Why would they really care about tech? The real motive is profit. No profit in slowing down dns queries with DNSSEC or potential problems right now with broken ipv6 transit or clients.
Re: (Score:2)
Dude, they don't even have basic IPv6 deployed... Slashdot, for all it's "News for Nerds" BS is amazingly conservative when it comes to technology.
.org was signed over a year ago (Score:3, Informative)
Here's the announcement on the OARC DNS-Operations list
https://lists.dns-oarc.net/pipermail/dns-operations/2009-June/003940.html
What has happened this week is that .org domain holders who have signed their domain may now submit their DS record via their registrar for inclusion in the .org zone, assuming that their particular registrar supports that.
Up until now only a handful of signed .org domains have had their DS records included in the zone and this was done manually at the registry in order to facilitate testing before opening this up to registrars.
Explain WHY it costs several million dollars ... (Score:1)
Seriously ... how does it end up costing multiple millions of dollars to accomplish such a trivial change?
You mean they spent 50k on the developers to update their systems and the rest on 'testing' right?
Seriously, theres nothing to this upgrade other than changes to the management systems from there end.
W T F?