DNSSEC protocol to plant security at Net's roots

July 16, 2010
The secure domain name server (DNS) protocol DNSSEC guarantees the authenticity of the mechanism that converts human-friendly internet addresses to the Internet Protocol numeric address system. DNSSEC — short for Domain Name System Security Extensions — uses digital signatures to assure name servers that the DNS data they receive has not been intercepted or tampered with.

The organisation responsible for managing the assignment of IP addresses and domain names, Icann, on Thursday published the root zone trust anchor. This allows the operators of internet root servers to begin to issue certificates to verify who they are to other root operators. The publication marks the completion of the signing of the root zone, meaning that all root operators are now involved in the exchange of valid certificates.

"Today marks one of the most significant moments in the history of the internet. Yet, for most people, it will go by entirely unnoticed," said Roy Arends, head of research at UK internet registry Nominet, in a statement. "This technology change is an enabler for new technologies to be built and deployed to further enhance the security of the Domain Name System and ultimately ensure the internet remains a safer and trusted place for all."

The aim of the DNS security extensions is to hinder cybercriminals who use DNS cache poisoning to redirect internet users from legitimate websites to fraudulent equivalents. DNS cache poisoning involves replacing the numeric addresses of legitimate websites in domain name servers with the addresses of malicious sites.

DNSSEC was rolled out over all 13 internet root servers in May as a test bed, but the publication of the root zone trust anchor allows the system to start operating harmoniously. Ripe NCC, which is one of the five regional internet registries, said that the extensions can now start to be fully deployed across the internet.

"The power of DNSSEC is that the whole namespace can now be signed hierarchically. It's another piece in the puzzle, as verification can now be fully automated," Ripe chief scientist Daniel Karrenberg told ZDNet UK. "DNSSEC has become mainstream and easily deployable. This ramping up is really significant."

Karrenberg said that from Thursday, each top-level domain (TLD) nameserver will no longer have to be configured to recognise trusted key material, reducing the administrative burden on top-level domains. More top-level domains will be DNSSEC signed, said Karenberg, who expected that owners of banking domains will also start to use DNSSEC more.

In addition, the operation of DNSSEC in the root zone should encourage ISPs and the IT departments of large organisations to adopt it, according to Karrenberg.

"I would think that organisations and websites concerned about trust would be early adopters," said Karrenberg.

Ripe has been involved in the development of DNSSEC, a process that has been going on for decades. Karrenberg said that Ripe NCC and European ISPs had to push Icann to adopt DNSSEC.

"Ripe NCC and European ISPs have driven this [development process] for more than a decade, and we have been pressing Icann to sign the root," said Karrenberg. "Icann wants to enhance DNS, but they are necessarily a conservative bunch. DNS is such a key component of the internet they don't want to break it — Icann is naturally reticent."

Security company Symantec said that internet security will get better through DNSSEC use, but that improvements to security will not be rapid.

"DNSSEC is a step forwards, but we're really at the very early stages," said Orla Cox, security operations manager for Symantec Security Response. "This is one step down a long road."

Cox believes that criminals will try to circumvent the DNSSEC signing procedure and that spoofing certificates may still be possible.
 

What to do with passwords once you create them

July 16, 2010

Cryptography expert Bruce Schneier used to write his passwords down on a slip of paper and keep it in his wallet.

Today, he uses a free Windows password-storage tool called Password Safe that he designed five years ago and released into the open-source community. The desktop application lets users remember only one master password to access their password list.

But Schneier still recommends the paper method for people who don't have their computers with them at all times like he does. "Either write the passwords down and put them in your wallet, or use something like Password Safe," he said in an interview on Wednesday.

PGP creator Phil Zimmermann stores his passwords in an encrypted text file, which he described as a "cumbersome, manually operated password management system."

And crypto cracker Karsten Nohl's method is much simpler yet harder--he stores all his passwords in his brain.

"I use a nontrivial function to diversify passwords for every use," Nohl said. "Disclosing anything about the function would lessen its strength. Security-through-obscurity, but only because I cannot compute any strong ciphers in my head."

An informal survey of a dozen or so security experts reveals that some of them still rely on the paper and pen method. One respondent even admitted to succumbing to the post-it-note under the keyboard clich?! (If you do choose to write the passwords down you should avoid including the Web site or other identifying information, obviously.)

Password management isn't sexy but it's a problem that touches everyone who touches a computer. Not only are people forced to create new passwords at a dizzying level as they join social networks, do e-commerce and deal with frequently expiring passwords at work, but there are new and novel password theft methods all the time. Just this week Mozilla disabled a Firefox add-on that was intercepting login data and sending it on to a remote server.

There are a variety of solutions for people who want to upgrade from the paper-based practice. To cover them all would be an exhaustive and impossible task, but I'll mention a few notables.

For those whose computer is always at hand, password managers stored on the desktop can be a good option. In addition to Password Safe, sources recommended another open-source software called KeePass. For the Macintosh, there's 1Password ($39.95), which my colleague Jason Parker said was "the best in its class for the Mac."

I was curious about the USB-based password managers and gave MyKey ($29.99) a try. I found it worked great but it does have some limitations--it only works on Windows-based PCs with the MyKey software installed. This meant I couldn't use it on my home Mac or on friends' computers I used during a recent vacation, something I wouldn't be able to do with a desktop-based system either.

The Yubikey ($25) is another USB password device, but it differs in that it works on any computer or major operating system platform and requires no client software.

"It's the same thing as putting the passwords in your wallet; it's putting them on something physical that you are securing," Schneier said when asked his opinion of using USB devices for storing passwords. "People can lose their keys or their wallet. Just put the passwords on the one you are less likely to lose."

If you want to use a password manager that is not tethered to a particular computer, there are also hosted services where the passwords are stored in the cloud. This offers convenience the other methods don't, but it means you are at the mercy of the security measures deployed on whatever computer you are using, so be cautious about using Internet kiosks and other public Web-surfing computers. You also have to trust that the company hosting the server holding your passwords won't get hacked or otherwise compromised.

If you are interested in a free online password manager service, CNET Blogger Dennis Reilly wrote about RoboForm Online late last year.

Many people find the saved passwords feature on browsers handy, but they may not realize that attackers who get physical or remote access to the computer can easily see those stored passwords. This CNET TV video shows you how to hide them in Firefox by creating a master password for the browser.

A free extension for Firefox, Chrome and Internet Explorer called LastPass encrypts passwords and stores them on your hard drive and is beloved by colleagues at CNET News, as well as Download.com and CNET sister site ZDNet. It runs on the major operating systems, syncs data between multiple browsers, and automatically logs you into a site with one mouse click. And if you are using a computer other than the one you normally use you can retrieve your login information from the LastPass Web site.

Regardless of how you manage your passwords, experts say you should be careful to choose ones that have an appropriate level of security for the intended use or Web site. For instance, you can get by with an easy password for a Web site where all you do is log on to read news. But you should choose a much stronger password--meaning it is more difficult to guess or to figure out using a dictionary attack tool--for banking and other sites dealing with sensitive information like credit cards. And use different passwords for the different sites so that if one password is compromised your other sites or accounts aren't at risk.

Schneier has an excellent essay on how to choose more secure passwords, CNET blogger Larry Magid provides tips for creating strong but easy-to-remember passwords here, and I provide additional suggestions in this story.

"Passwords still work, as long as you use them properly," Schneier said.

 

World Cup pushes Internet to new record

June 14, 2010

There’s a fever running through the Internet today - World Cup Fever.

Today’s Web traffic has been classified as “Heavy” for the better part of the day, according to measurements by Akamai. At its peak, traffic for News sites globally started a steady climb about 6 am ET and peaked six hours later, at Noon ET, reaching nearly 12.1 million visitors per minute.

And even though the traffic dipped going into the afternoon, it stayed well above normal - registering some 6.5 million vpn, or 130 percent of normal - at 5 p.m. ET. The bulk of the demand in the last 24 hours has come from North America and Europe - but all regions are reporting “Heavy” usage.



The traffic suggests that the Internet was most active during the Mexico-South Africa game and stayed heavy through the France-Uruguay game. It’s also very likely that today being a workday had more people turning to their office computers to follow the action, instead of their TVs.

The day’s traffic far exceeded the previous record of 8.5 million vpm, which was set when Barack Obama won the U.S. presidential election.
 



Best Communitation Website
Which communication website is best?

Myspace
Facebook
Twitter
Furry-paws
Youtube


Make a free website with Yola