Home / Industry

The Root DNSSEC Deployment and Dyn, Inc.

Back in January 1997, a group of people developed RFC 2065, Domain Name System Security Extensions, a document detailing the introduction of private/public key cryptography into the public DNS system. By adding cryptography to the DNS, users would be able to verify that DNS responses they receive are genuinely valid and accurate. The design of DNSSEC was updated in March 2005 by RFC 2535 but was never deployed.

In March 2005, RFCs 4033, 4034, 4035 were published, detailing a new version of the protocol named DNSSEC.bis. This version of the protocol is easier to understand and deploy, but was never widely paid attention to until the summer of 2008. Those of us in the industry knew that DNSSEC was important, but the operational management, increased query size, and technical problems with many implementations of DNS prevented it from being deployed.

The "DNS Summer of Fear" occurred in 2008, when security researcher Dan Kaminsky exposed a vulnerability in the DNS protocol where DNS cache poisoning could be achieved in just a few seconds allowing an attacker to spoof the DNS identify of a website. A short term fix, known as DNS Source Port Randomization, was deployed to help fend off attacks, while movement on a long term solution began work. The long term fix requires the use of DNSSEC to securely sign and validate the global DNS system, and with all things DNS, starts with the security of the DNS Root Zone, a.k.a ".".

The DNS Root Zone is produced and maintained through a collaborate effort between ICANN, VeriSign, and the U.S. Department of Commerce. These three organizations have been extensively working to develop a secure and transparent way to manage the signing of the Root Zone since early 2009, and on July 15, 2010, the fruits of their labor will become reality when the signed root is deployed.

On June 16, 2010, the first of two Root Key Signing Key (KSK) generation ceremonies was performed at a secure ICANN facility in Culpepper, VA. On July 12, 2010, a second KSK ceremony will occur at a second secure ICANN facility in El Segunda, CA. The purpose of these ceremonies is to generate the specialized cryptographic materials needed to sign the root zone, distribute copies to two secure facilities, distribute the cryptographic fingerprint data to Trusted Community Representatives (TCRs) for verification, and to distribute crypto material to Recovery Key Share Holders in case of failure of these two ICANN facilities.

At Dyn Inc., we await the deployment of the signed Root Zone with much excitement. A signed root zone means that key stakeholders are paying attention to the criticality of the DNS and the role it serves in the Internet. To do our part, we've taken the following steps to DNSSEC-enable our systems and infrastructure:

  • We've prepared a DNSSEC implementation plan, posted at http://dyn.com/dynlabs-dnssec.
  • We've enabled DNSSEC communication with the .org domain registry through DynDNS.com. DynDNS.com .org domain holders can submit DNSSEC trust anchors to the .org registry via our website.
  • We've developed and maintain a complete key generation, key rollover, and zone signing system available to our Dynect Platform customers.

In the coming months, we'll continue to enable DNSSEC communication with other registries, and develop additional ways to manage DNSSEC crypto material to provide our users with an easy and simple path to DNSSEC signing their DNS zones. In the meantime, we all look forward to the signed root deployment on July 15th.

Written by Tom Daly, Chief Technology Officer at Dynamic Network Services, Inc.

About Dyn

Dyn

Dyn solutions are at the core of Internet Performance. Through traffic management, message management and performance assurance, Dyn is connecting people through the Internet and ensuring information gets where it needs to go, faster and more reliably than ever before. Incorporated in 2001, Dyn's global presence services more than four million enterprise, small business and personal customers. Visit dyn.com to learn more about how Dyn delivers. (Learn More)

Related topics: DNS, DNS Security, ICANN, Security

WEEKLY WRAP — Get CircleID's Weekly Summary Report by Email:

Related Blogs

Related News

Topics

Industry Updates – Sponsored Posts

Why We Decided to Stop Offering Free Accounts

dotStrategy Selects Neustar's Registry Threat Mitigation Services for .BUZZ Registry

Tony Kirsch Announced As Head of Global Consulting of ARI Registry Services

24 Million Home Routers Expose ISPs to Massive DNS-Based DDoS Attacks

Afilias Chairman Appointed to Domain Name Association Board

Dyn Acquires Managed DNS Provider Nettica

DotConnectAfrica Statement Regarding NTIA's Intent to Transition Key Internet Domain Name Function

What Does a DDoS Attack Look Like? (Watch First 3 Minutes of an Actual Attack)

Joining Forces to Advance Protection Against Growing Diversity of DDoS Attacks

Afilias Joins Internet Technical Leaders in Welcoming IANA Globalization Progress

Why Managed DNS Means Secure DNS

DotConnectAfrica Trust Takes Its Case With ICANN to Independent Review Process (IRP) Panel

2013: A Year in Review, End of Year Message from DotConnectAfrica

TLDH Announces Sales Channel and gTLD Portfolio Update

Go-Live Schedule for Dot Chinese Online & Dot Chinese Website TLDs Announced

DotConnectAfrica Trust Attends ICANN 48 International Meeting in Buenos Aires, Argentina

TLDH Group Signs 6 New Top-Level Domain Contracts With ICANN

SPECIAL: Updates from the ICANN Meetings in Buenos Aires

Rodney Joffe on Why DNS Has Become a Favorite Attack Vector

Pre-Delegation Testing for Dot Chinese Online (.在线) & Dot Chinese Website (.中文网) Begins

Sponsored Topics