ICANN Sets Plan To Reinforce Internet DNS Security (networkworld.com) 106
coondoggie shares a report: In a few months, the internet will be a more secure place. That's because the Internet Corporation for Assigned Names and Numbers (ICANN) has voted to go ahead with the first-ever changing of the cryptographic key that helps protect the internet's address book -- the Domain Name System (DNS). The ICANN Board at its meeting in Belgium this week, decided to proceed with its plans to change or "roll" the key for the DNS root on Oct. 11, 2018. It will mark the first time the key has been changed since it was first put in place in 2010. During its meeting ICANN spelled out the driving forces behind the need for improved DNS security that the rollover will bring. For example, the continued evolution of Internet technologies and facilities, and deployment of IoT devices and increased capacity of networks all over the world, coupled with the unfortunate lack of sufficient security in those devices and networks, attackers have increasing power to cripple Internet infrastructure, ICANN stated.
"Specifically, the growth in attack capacity risks outstripping the ability of the root server operator community to expand defensive capacity. While it remains necessary to continue to expand defensive capacity in the near-term, the long-term outlook for the traditional approach appears bleak," ICANN stated. The KSK rollover means generating a new cryptographic public and private key pair and distributing the new public component to parties who operate validating resolvers, according to ICANN. Such resolvers run software that converts typical addresses like networkworld.com into IP network addresses. Resolvers include: internet service providers, enterprise network administrators and other DNS resolver operators, DNS resolver software developers; system integrators, and hardware and software distributors who install or ship the root's "trust anchor," ICANN said.
"Specifically, the growth in attack capacity risks outstripping the ability of the root server operator community to expand defensive capacity. While it remains necessary to continue to expand defensive capacity in the near-term, the long-term outlook for the traditional approach appears bleak," ICANN stated. The KSK rollover means generating a new cryptographic public and private key pair and distributing the new public component to parties who operate validating resolvers, according to ICANN. Such resolvers run software that converts typical addresses like networkworld.com into IP network addresses. Resolvers include: internet service providers, enterprise network administrators and other DNS resolver operators, DNS resolver software developers; system integrators, and hardware and software distributors who install or ship the root's "trust anchor," ICANN said.
As a side effect, centralizing a decentralized net (Score:1)
And CAs are going to run this madhouse. Brilliant!
Re: (Score:3)
Re: (Score:1)
It's a key rollover event
https://www.icann.org/resources/pages/ksk-rollover [icann.org]
Re: (Score:1)
ICANN used "roll" in their press release. https://www.icann.org/resources/press-material/release-2018-09-18-en
Feel free to check the source material before you try and correct the author.
Read the RFC (was Re:"rotate" the key) (Score:1)
The professional response is: Right or wrong, RFC 5011, section 6.3 [ietf.org] uses the term 'roll'
Stopping to your level, the response is: read the RFCs before you write your next comment.
Roll over (Score:1)
Play dead
Good dog
ICANN can go to hell (Score:2)
Re: (Score:2)
Re: (Score:3)
Re: (Score:2)
And we cannot filter our way out of this, either.
Block the gTLD. Seriously how often have you legimitely needed to access to a TLD. Nike own .nike, but frankly I don't even know how to access the damn thing.
Re: (Score:2)
And we cannot filter our way out of this, either.
Block the gTLD.
You're just playing whac-a-mole then. The spammers can buy as many gTLDs as they want and essentially there are no restrictions on what they can be. Block one and another will come up. And how do you propose blocking it anyways? The emails will come from regular domains but they are spamming for domains in new gTLDs, using obfuscated domain names so you can't pick up on it easily. You can't detect a new gTLD in an email if it isn't in there and you probably don't want to block every email with a bit.l
Re: (Score:2)
No I didn't mean block a specific one. I meant block the gTLDs that are being generated or rather the reverse Whitelist the country TLDs. I legitimately believe if you do that nothing will break anywhere.
At least not yet. No doubt Google will screw this idea up so we need to get in before they start making things dependent on their TLD.
Re: (Score:2)
No I didn't mean block a specific one. I meant block the gTLDs that are being generated or rather the reverse Whitelist the country TLDs. I legitimately believe if you do that nothing will break anywhere.
It won't break anything but I doubt it will accomplish what you're after. They will send the spam from a domain that isn't in the spamvertised gTLD (to reduce the chance of detection). Inside the spam will be a link that is obfuscated to look like a traditional .com link. Filtering by new gTLDs - or whitelisting to ignore all of them so you don't need to build a blacklist - won't get rid of those.
Re: (Score:2)
But if you can't eliminate them by whitelisting country TLDs then surely the resulting problem wasn't caused by TLDs in the first place ... Or am I not understanding your example?
Re: (Score:2)
Now, of course we know that many times if you contact a registrar (or registra
Re: (Score:2)
Re: (Score:2)
No probs. I didn't reply in general because I didn't have anything more to say on the topic.
You're absolutely right, this closes off a lot of legal avenues to get at spammers and whitelisting domains only solves the problems directly for the receiver of said spam.
Re: (Score:2)
GDPR limits what information a whois database can record about domain owners anyway. DNS records are not the right tool for this.
Re: (Score:2)
Re: (Score:2)
How to check you're ready for the KSK rollover: (Score:3, Informative)
https://www.icann.org/dns-resolvers-checking-current-trust-anchors [icann.org]
The whole idea of the Certificate Authority sucks (Score:2)
Re: (Score:2)
Re: (Score:2)
Re: (Score:2)
Domain Squatters (Score:2)