New .secure Internet Domain On Tap
129
CowboyRobot writes "A new top-level domain (TLD) in the works for the Internet will bake security in from the outset: The .secure domain will require fully encrypted HTTPS sessions and a comprehensive vetting process for websites and their operators. If the new domain takes off, it could shift the way Web domains are secured. ICANN is expected to sign off on .secure, and for the new TLD to be up and running June or July 2013."
Call me back in a month ... (Score:2, Troll)
Re:Call me back in a month ... (Score:4, Funny)
Re: (Score:3)
All this is going to do is encourage a false sense of security - after all, the chain of security is only as strong as the weakest link, and there are plenty of weak links, starting with the end users and their computers.
"But how was I to know that drivebydownload.secure serves up malware? Or that russianbusinessnetwork.secure would resell my credit card info?"
Re: (Score:3)
"But how was I to know that drivebydownload.secure serves up malware? Or that russianbusinessnetwork.secure would resell my credit card info?"
Even the summary says "vetting process for websites and their operators"...
Re: (Score:2)
It's a TLD that's going to be operated by a private for-profit business. They won't be able to do much in the way of an invasive "vetting process", and $$$ talks. Even the Hells Angels knows how to use "pret-noms" (people who lend their names and identities as covers for activities) and "social engineering" (crack, broken bones) to get around it.
Re: (Score:3)
In both systems the security is going to be about as crap as the weakest link (crappiest CA/subdomain or reseller).
Re:Call me back in a month ... (Score:4, Informative)
And it's this type of attitude that will kill it. They're not claiming it to be bulletproof or perfect, only that they're enforcing a number of currently available security protocols that are optional in the general internet, and difficult to figure out if they're actually in use. So if you're on a .secure domain name, it doesn't mean the site is unhackable, but it does mean that you resolved the domain via DNSSEC, and that your connection is over SSL, and that the SSL certificate was reasonably vetted. Unfortunately, this doesn't solve the fundamental problem that understanding network security requires some knowledge, and so some day some site on this TLD will get hacked, and every shitty news organization on the planet will talk about how .secure is worthless, and it will die.
Re: (Score:2, Troll)
Re: (Score:3, Interesting)
So by that logic, you shouldn't be allowed to advertise anything as "secure" because nothing is 100% secure, but if you call something secure then stupid people will assume it is impenetrable. I mean, the security system on my house doesn't turn it into an impenetrable bunker, but it does increase my security, and no one has a problem with it being referred to as a "security system", so how is this different?
The fundamental problem is that while everyone realizes that there's no such thing as perfect secur
Re:Call me back in a month ... (Score:5, Insightful)
And we can do all that now without paying ICANN extra fees or creating the illusion that it's "secure" because the address says so. Which is exactly what end users and the media are going to believe.
What we really need to do is rein ICANN in and stop this kind of nonsense.
Re: (Score:2)
Uh, no. All of these new gTLDs (generic top level domains) will be "sponsored" by ICANN and run by various registries (private corporations or public ones) under an ICANN agreement. The agreements are periodically "refreshed" through ICANN proposals (just like com/net/org/etc are today) where the statutes of the agreements may change.
So in the application for .secure, the applicant puts in whatever rules they want (e.g. for .slashdot, each registrant must list their UUID and have excellent karma) and if I
Re: (Score:2)
Enough already with the slew of new gTLDs. ICANN looks to me like the pathetic case of an enfeebled whore scratching for a buck; that, or corporate racketeers.
Re: (Score:3)
Except it doesn't mean that at all, because all those technologies are backwards-compatible. So any client that doesn't know about .secure should quite happily resolve .secure domains without using DNSSEC and connect to them over plain, unencrypted HTTP. In fact, I expect that in practice most clients won't validate DNSSEC because otherwise it'll break access to .secure sites on networks which don't support DNSSEC and their users will complain.
Re: (Score:2)
Re: (Score:2)
Who needs to hack it when there is already a secure.ru domain? It's already shady as hell - won't even let you in unless you let it set a javascript cookie.
By any Name (Score:2)
An insecure website by any name sucks just as bad...
*This Post Approved by the Council of Approving Things
tl;nt (Score:5, Insightful)
(too long, not typing)
Seriously. When every other TLD is two or three characters, they decide to go use a full word? Breaking conventions AND convenience! Whee!
Re: (Score:2, Interesting)
Users don't type in URLs anymore!
Re: (Score:3)
yeah, just google "online banking" when you want to use your online-banking.
Re:tl;nt (Score:5, Funny)
Re: (Score:2)
Will be interesting to see people using URL shorteners (bitly etc) on .secure domains, and how that will compromise the whole principle of the idea.
Re: (Score:2)
I see no reason why it should. All that does is set up an HTTP redirect (which if you think about it for more than half a second is pretty much exactly like clicking a link)
Re: (Score:3)
You only see where you are being redirected to AFTER you click on the link.
The .secure domain is only different because people can just assume it is secure, even before clicking.
There is nothing stopping the current websites from being even more secure than the .secure ones. The principle of the idea is identify.
Re: (Score:2)
The .secure domain is only different because people can just assume it is secure, even before clicking.
You are forgetting about SSL? .secure will be mandatory vetted SSL, combined with it's own domain TLD? Eg, that certificate can't be used by a .com, which is not as vetted.
Re: (Score:2)
Re: (Score:2)
Which is why DNSSEC is supposed to be enforced for it, because that stops those kind of shenanigans if people bother to implement it.
Re: (Score:2)
Re: (Score:2)
When every other TLD is two or three characters, they decide to go use a full word?
Agreed. Why not just .s? Or maybe .sec?
Bad idea... (Score:2)
Re: (Score:2)
Agreed with what? A comletely false statement? There are TLDs that have been around for years to over a decade that are more than 3 characters.
Re: (Score:2)
All the TLDs that are over three characters long have gone almost totally unused for their intended purposes.
Re: (Score:2)
Architecturally '.co.uk' isn't a TLD, of course; but the intention is more or less identical to '.com'. Adoption does fall off pretty rapidly as you get into the dodgier waters away from
Re: (Score:2)
It's for a chicken co-op, but it sure sounds and reads more like a chicken coop (hen house) [wikipedia.org]
I'm surprised no conspiracy groups ever registered dis.info or noneofyour.biz
And in a case of the internet imitating life, steve.jobs is offline.
Re: (Score:3)
There are a few .museum domains in use: http://index.museum/fullindex.php [index.museum]
Even more .aero domains in use: http://www.nic.aero/cgi-bin/ad_search.cgi [nic.aero] (hit the search without changing the form)
The same for .jobs and .travel who's registry operator verifies the website contents before allowing the nameservers in DNS. (Which is why steve.jobs never resolved anywhere.)
Those > 3 character TLDs seem to adequately fit under their respective namespaces, unlike domain names under generic top level domains (gTLDs)
Re: (Score:2)
I think the goats have something to do with avoiding sec...
Clearly they should have used .sucr (Score:2)
I mean there it is, just another plan to extort money, which then gets added to the product, which we pay for and somebody else is chipping off a little bit for themselves.
Re: (Score:2)
What really frustrates is that we keep getting schemes like this that just look to be a pure money grab instead of things that might actually help solve a problem. Where's the accredit
sperm.bank (Score:2)
Where's the accredited applicants only ".bank" gTLD to help prevent phishing of financial institutions, for instance?
Not all "banks" are financial. Who would get blood.bank or sperm.bank?
Re: (Score:2)
Chicken.coop (Score:2)
Yes, I know there is already a ".coop" gTLD, but that's just for the birds.
Yeah, especially the Montana Poultry Growers Cooperative [chicken.coop].
Re: (Score:2)
Have you ever seen those domains used? No? That's my point. Nobody uses them because they are a pain in the ass.
Re: (Score:2)
Re: (Score:2)
So, with IPv6, will you be changing it to a 128-bit double.double (aka a "tim horton's").
Re: (Score:3)
Ignoring .info, .museum, .aero, .arpa, .asia, .coop, .jobs, .mobi, .name, .travel, etc, right? There is no rule that says domains are only 2 or 3 characters despite nerd protestations.
Re:tl;nt (Score:5, Insightful)
Pretty much everybody else ignores those, so why not?
Re: (Score:2)
Re: (Score:2)
.info is widely used, too. but museum? seriously?
Re: (Score:2)
They could put up tree.museum and charge $1.50.
Re: (Score:2)
Re: (Score:2)
Length is irrelevant to a TLD getting ignored. When was the last time you visited a .us domain other than the likes of "delicio.us?"
And that's before getting to all the state-specific subdomains (al.us, ak.us, ar.us, etc.) that aren't even used by the state governments in question.
Re: (Score:2)
How about the last time you saw a .co, and didn't think to yourself it was odd visiting something in Colombia?
Re: (Score:2)
Personally I find typing 4 characters tedious. Instead I just type the domain name and hit Ctrl+Enter.
Combined with shortened URLs purchased by companies, "www.faceboo.com"+Enter, becomes "fb"+Ctrl+Enter
Re: (Score:2)
... and how would it be detected or prevented? You don't seem to understand much of the actual technologies involved, here.
CAPTCHA (Score:1)
...for every link within subdomains
Yeah yeah whatever (Score:2, Insightful)
Recall the ".pro" TLD? Supposed to be for "vetted professionals"? The first .pro I ever encountered turns out to be a crooked outfit. (If you must know, videolan.pro, which impersonates but does not actually have any connection to the real thing.) I have so far never encountered a dot-pro that was actually legit. A lesser used .biz of sorts, but with delusions of grandeur.
So I'll reserve judgement on this one. Not that it isn't a reasonable idea, I've been toying with the notion for a while. It's the execu
Re: (Score:2)
Recall the ".pro" TLD? Supposed to be for "vetted professionals"? I have so far never encountered a dot-pro that was actually legit.
What's ".pro"?
Re: (Score:3)
Erm, did you even read what you just quoted? The first sentence defines it.
Re: (Score:2)
Re: (Score:2)
You must not be seeing the AC's whole post. It starts with this, which tells you exactly what it is:
Recall the ".pro" TLD? Supposed to be for "vetted professionals"?
Re: (Score:2)
Re: (Score:2)
I suppose the point was that you weren't supposed to be able to register .pro domains without actually having some means to vette your profession?
I'm not the person to ask.
Re: (Score:2)
We obviously need to pair every .pro domain with a matching .con domain... you know, for balance.
Re: (Score:2)
.con should be a CNAME to .com at the root (.) level :P
i was laughing at the headline (Score:3, Insightful)
This is so not going to end well.
something almost, but not quite, entirely unlike tubes.
Re: (Score:2)
I've been waiting for the .cdn TLD for some time, to house all content distribution networks, and anyone who wants to pretend they're a CDN.
The search for more money (Score:2)
Re: (Score:2)
So they'll implement a new protocol: httpSS - twice as secure ... and you'll use it and like it, OR ELSE!
Of course it's a money grab. So quick - register in.secure and cash in!
Re: (Score:2)
So they'll implement a new protocol: httpSS - twice as secure
You laugh, but...
https://wwws.whitehouse.gov/petitions#!/ [whitehouse.gov]
https://wwws.safra.com/SafraOfficeBank/ [safra.com]
http://wwws.aa.warnerbros.com/journeytothecenteroftheearth2/ [warnerbros.com]
https://wwws.loc.gov/readerreg/remote/ [loc.gov]
Secure browsing has already gone enterprisey with the new WWWS for secure sites
Notice the 3rd link. https:/// [https] is not even configured on this server. Yet we are meant to think it is secure because of the 'wwws'.
Re: (Score:2)
(don't hit me, I'm joking)
.bank (Score:5, Insightful)
Re: (Score:2)
with PCI regulations enforcing
BWAHAHAHAHAHA!
If only you knew what an insider knew.
Re: (Score:2)
Re: (Score:2)
(they make it cost like $20,000 per year too, to further deter fraud).
You clearly don't know much about fraud do you? $20000? That's a single victim's savings right there. The problem is people do fraud not to boost their petty cash but to get rich from crime. If people thought they could only make that little money from fraud then they'd have real jobs instead.
Re: (Score:2)
To be honest, I'd settle for ".bank.uk" (and your local equivalents). Nominet maintains (or allows) a number of second level domains which have policed registration requirements, so one for recognised banking organisations shouldn't be too hard to manage. Exactly what the criteria would be is debatable, but there are plenty of candidates- only FSA-regulated organisations, only organisations with a banking license, etc.
Re: (Score:2)
The thing is, people read left to right, and web addresses read inside to out. Try to convince most endusers that http://www.wellsfargo.com.soundslegit1234.ru/onlinebank/enterpasswordhere.html [soundslegit1234.ru] isn't safe.
Even if people do read the URL, they often don't understand it. A .secure TLD just gets buried in the legit-looking stuff on the outside.
Fair enough, though newer browsers do help somewhat by highlighting the TDL in the address bar in a different color.
secure:// (Score:1)
Re: (Score:2)
Re: (Score:2)
If that is the whole problem, why not rename the https protocol to "secure"?
I personally don't think it's a bad idea to make secure:// an alias of https://./ [.] The only problem would be that just using https [google.com] does not tell anything [google.com] about the connections [ssllabs.com] actual security [google.nl].
Re: (Score:2)
The only problem would be that just using https does not tell anything about the connectionsactual security.
Of course not. That's the job of the browser. It's not the protocol's fault the browsers don't do it. The CA break-ins are all political problems really - those who were trusted betrayed that trust in one way or another.
Re: (Score:2)
Re: (Score:2)
I like how you have to explain something you clearly don't understand to your grandma.
EV certificates? (Score:2)
Isn't this exactly what Extended Verification Certificates were supposed to be for?
Why should I trust some arbitrary party to vet the security of a website by the virtue it's accessible with a particular TLD? I get that TLS shouldn't require any third parties merely to establish a secure pipe, but if you *are* looking for a third party to vet other stuff, like your bank's privacy policy and whatnot, this is exactly what PKI *does* do well, at the protocol level.
Re: (Score:3)
Type-in traffic (Score:2)
Isn't this exactly what Extended Verification Certificates were supposed to be for?
I imagine that it's a TLD for which type-in traffic is intended to go on HTTPS instead of HTTP, and for which browsers can expect DNSSEC and EV certs and fail if not present.
Too Long (Score:2)
Re: (Score:2)
Re: (Score:2)
Shortening to ".sec" is not a good idea - on a QWERTY keyboard the C and X keys are next to each other and grandma cannot be trusted to avoid typos...
I thought the new domain for that stuff was .xxx?
Re: (Score:2)
Oh my god, but what if people accidentally mistype that as .ccc? THEY'RE RIGHT THERE NEXT TO EACH OTHER ON THE KEYBOARD!
Bribes, Corruption, Maneuvering (Score:1)
What could possibly go wrong? (Score:3)
And then there's
Alright, never mind that. Of course it will be secure, because a well-known security company is on the job and...oh...errrrmm... Verisign, Pillar of Internet Security, Hacked [idexperts.com]...
Doesn't matter. I'm certain it will work perfectly. I mean, really, what blackhat would target a
Monumentally stupid idea (Score:2)
Hack one. Purpose defeated.
ICANN is a menace that needs to be put out of its misery.
someone did not understand DNS (Score:2)
of course you can check, if an ip only runs https, when registering the domain. But you cannot check, if the ip accepts http at some point later on ... and even with regular checks, a firewall could allow http for clients and disallow it for the checker-ip.
Also implying https on = secure. then the browser display of 'valid certificate' would just be enough.
Re: (Score:2)
yeah, and what do browsers do, which are older than the .secure domain? or browsers, which just support normal networking without special rules for .secure? And how should the average User tell, if a browser supports secure or not?
.Secure? From whom? (Score:2)
These days, it's not just random Slavs looking to jack your CC info you need to keep watch for...
In related news... (Score:2)
Heard this before (Score:2)
and a comprehensive vetting process for websites and their operators.
What, like the one required to get a signed SSL cert? Oh wait, I mean the one to get an "Extended Validation" SSL cert.
What's the point? (Score:2)
When you use a https site you don't need the TLD to tell that it is secure: the protocol name is what's to be counted on.
Why not just make HTTPS a "default" option (Score:3)
You know, and f*ing fix the certificate system. Make it so certificates are generated off some sort of DNS record information or something and add that info to the info registrars have. Or something. Buying certificates is almost like blackmail, and even if you do buy one it's not like your cert auth isn't vulnerable to attack or users won't just hit the "add exception" button when they get spoofed.
Oh and as was mentioned above, making a .secure domain is like putting a target on yourself. Good luck with that one.
Still doesn't guard against lazy programming (Score:2)
Re: (Score:2)
The 'domaintype' notion is the kicker. It isn't quite as broad as an arbitrary string; but it is very broad indeed, and would be the stuff of endless wrangling(and, since many sites do multiple things, would suffer from similar must-protect-trademark-on-all-possible-domains shenanigans). At some point, you have to give up and accept