The US government is seeking endorsement for its proposal to make the Internet's addressing system less susceptible to tampering by hackers.
Under the idea, records in the DNS root zone would be cryptographically signed using DNSSEC (Domain Name and Addressing System Security Extensions), a set of protocols that allows DNS records to carry a digital signature.
The US Department of Commerce is asking for comments on how DNSSEC could best be deployed.
The root zone is the master list of where computers can go to look up an address in a particular domain such as ".com." The DNS translates website names, such as www.idg.com into a numerical IP address, which is used by computers to find a website.
But several security problems within the DNS make it possible for hackers to supply a different IP address for a website. It means a user thinks she is viewing "www.idg.com" but actually is on a phishing site.
The most serious of these DNS vulnerabilities was revealed in July by security researcher Dan Kaminsky. Nearly all DNS software is vulnerable to the attack. Major vendors have deployed temporary patches but are working on a more permanent fix.
Security experts for years have advocated the adoption of DNSSEC, but implementation has been patchy. The US government has said it will use DNSSEC for its ".gov" domain. Other ccTLDs (country-code Top-Level Domains) operators in Sweden (.se), Brazil (.br), Puerto Rico (.pr) and Bulgaria (.bg), are also using DNSSEC. The operator of the ".org" TLD has also committed to the system, according to the US Department of Commerce.
But to get the full benefits of DNSSEC requires domain name registrars, domain name registries, ISPs (Internet Service Providers) and others to upgrade their software. Users' systems would also have to be configured to verify digital signatures.
"DNSSEC signed root zone would represent one of most significant changes to the DNS infrastructure since it was created," according to a notice issued by the US. Department of Commerce in the Federal Register, a daily digest of U.S. government notices.
Implementing DNSSEC would also introduce new steps in how changes to the root zone are published. As it stands now, TLD operators send changes to the Internet Assigned Numbers Authority, which is part of the Internet Corporation for Assigned Names and Numbers. ICANN then sends the changes to the US National Telecommunications and Information Administration, which is part of the US. Department of Commerce. After approval, VeriSign - a commercial company -
The heavy involvement of the US. government, as well as the interests of VeriSign, in how the Internet's addressing system is administered has drawn criticism that the process is too US-centric.
And there appears to be a battle brewing over which entity will manage the cryptographic keys required to sign the root zone file.
ICANN has submitted a proposal advocating it should hold the keys. ICANN said it is a non-profit, transparent organisation that is "not subject to market-based profit and loss considerations."
VeriSign countered in its proposal that it should be able to hold one kind of key necessary for the signing process, and the other kind should be split amongst other entities.
Find your next job with techworld jobs