StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Domain Name System Security Extensions - Essay Example

Cite this document
Summary
An author of the present paper intends to introduce the concept of Domain Name System Security Extensions. The DNSSEC is a suite of Internet Engineering Task Force specifications for securing definite kinds of information offered by the DNS…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER91.9% of users find it useful
Domain Name System Security Extensions
Read Text Preview

Extract of sample "Domain Name System Security Extensions"

 Implementation of DNSSEC The initial design of the Domain Name System (DNS) did not comprise of security; but it was devised to be a scalable dispersed system. The Domain Name System Security Extensions (DNSSEC) endeavors to include security, whereas upholding backwards compatibility. RFC 3833 tries to document a number of the recognized flaws in the DNS and how DNSSEC reacts to those threats. The DNSSEC are a suite of Internet Engineering Task Force specifications for securing definite kinds of information offered by the DNS as utilized on Internet Protocol (IP) networks. It is a collection of extensions to DNS that offer the DNS clients origin verification of DNS data, data reliability and authenticated defiance of existence. When you spend some time on the Internet either sending e-mail or browsing the Web, you make use of domain name servers without even recognizing it. DNS are an extremely important part of the internet but totally to the user. The DNS structure forms one of the principal and most vigorous distributed databases on the globe. With no DNS, the Internet would fail instantly, thus it must be properly maintained and the proper security system put in place to secure it from people with bad intentions. Similar to the majority of the early Internet protocols, DNS was not meant to bear it does nowadays. It was not made with an Internet-as-ecommerce stage in mind as it is today. It was too not made to deal with cache poisoning, phishers, pharmers, denial-of-service attacks, spammers or any kind of scammer. DNS reached its twenty-fifth in 2008, and started showing its age with major flaws in the system. Mimoso (2008, p1) says DNS was made as a "modest" substitute of host tables that were applied in keeping track of network machines. The ending outcome was the DNS we have come to recognize and love: a protocol that interprets domain names into IP addresses. This is what was required back in January 1, 1983 when machines on the ARPANET were needed to change to the TCP/IP protocol. What's required today is DNSSEC, which help defend against various attack against DNS servers, be it enterprise servers or the root DNS servers that control the Internet and have double fruitfully been attacked. DNSSEC offers source authentication of DNS data, data reliability and genuine denial of existence, as per the project's website. Various problems have subdued widespread deployment, including issues with scalability and well-suitability with diverse DNS servers. It is generally believed that making the DNS safe is critically vital for securing the entire Internet; however implementation of DNSSEC particularly has been held back by the difficulty of working out a backward-compatible set that can scale to the range of the Internet, avoiding "zone enumeration" where necessary, positioning DNSSEC implementations over a wide range of DNS servers and clients, disparity among major players over who ought to own the Top Level Domains such as .com, .net and .org root keys and finally conquering the perceived complication of DNSSEC and DNSSEC operation. A number of these problems are in the course of being determined, and deployments in a range of domains have started to take place. Mockapetris and other several DNS pioneers like BIND8 scientific architect Paul Vixie and DNS guide author Cricket Liu consider the IETF is near to ratifying the problems. Almost a half-dozen instances DNSSEC has been on the doorway, only to be pulled back to the drawing board since real earth problems devastated what's been victorious in a lab setting. According to Vixie, president of the Internet Software Consortium things were looking up in 2008, since there were good contribution in the most recent go-round from the top-level domain holders in the internet. They were able to put in the parts they alleged were missing with no invalidating any preceding work. This presented some hope again, and the developers of DNSSEC were cautiously confident that they were going to see huge islands of security within the DNS in next year ( Mimoso 2008, p2). DNS was originally built on the basis of trust between the system and user. For the past 25 years, it has functioned great in pleasant research networks. However, through no mistake of their own, Mockapetris and other initial contributors didn't forecast a day when data might be sabotaged and money created through stolen data packets (Mimoso 2008, p2). Nowadays, even watchful users can fall casualty to a cache poisoning attack that redirects lawful traffic to a phishing internet site. DNSSEC might put in to DNS data some digital signatures, enabling a business or person to validate that data has not been distorted because it was signed and that it originates from the expected sender. Kaminsky Dan, a security researcher and Penetration Testing for IOActive director in April 2008 identified a mounting practice among ISPs latently represented security susceptibility. Numerous ISPs have tested with intercepting come back messages of fictional domain names and substituting them with advertising substance. This might allow hackers to establish phishing schemes through attacking the server in charge of the advertisements and connecting to fictional sub domains of the besieged websites. Kaminsky confirmed this process through introduction of Rickrolls on Facebook and Pay Pal (Singel, 2008, p.2). While the susceptibility used at first depended on element that EarthLink was utilizing BareFruit to offer its advertising, Kaminsky was capable of generalizing the susceptibility to attack Verizon through attacking its advert provider, Paxfire (Krebs, 2008, p.2). Kaminsky mentioned the problem lies around lack of adequate port randomization connected to the deal ID of a query however added he would be more at liberation to discuss the hitch publicly in around a month, following the vastness of DNS patching has apparently been done. In July 2008, the United States Computer emergency Readiness Team declared that Kaminsky had exposed a fundamental flaw in the DNS protocol system. The flaw might permit attackers to easily carry out cache poisoning attacks on almost all nameserver (CERT, 2008, p3). With the majority Internet-based application relying on DNS to situate their peers, a broad array of attacks became possible, counting web site impersonation, interception of email, and certification bypass through the "Forgot My Password" element on numerous popular websites. Kaminsky worked underground with DNS dealers since earlier in the year 2008 to build up a patch to make utilizing the vulnerability more complex, which was launched on July 8, 2008. This vulnerability by itself had not been completely patched, since it was a design fault in the DNS system. Liu in Mimoso (2008, p.2) said that it was the high time to even out DNSSEC and crucial time to implement the system. One of the actual big tests of the system is that people have a tough time with managing just plain, vanilla sector data. Just as one starts to factor in main generation, re-signing sectors every time one modifies them, and generating and rolling over keys, it begins to get complex. It's going to necessitate for powerful instruments in order to assist people. Also in some instances, organizations have home-made administrative instruments that cannot simply be adapted no contain DNSSEC. DNS was not initially designed with the issue of security in mind, and therefore has numerous security issues. One category of vulnerabilities is DNS cache poisoning, that deceives a DNS server into thinking it has obtained authentic data when, actually, it has not. DNS replies are conventionally not signed cryptographically, resulting to numerous attack potentials. The DNSSEC amends DNS to put in support for responses that are cryptographically signed. There are a variety of extensions that too assist in securing zone transfer information (Aitchison, 2005, p 243). Although with encryption, a DNS server might become altered by a virus or even being matter a discontented employee that might source IP addresses of that server to be readdressed to a wrong address with an extended TTL. This might have far-reaching shock to potentially many Internet users if full of activity DNS servers cache the wrong IP data. This could require physical purging of every of the affected DNS caches as obligated by the extended TTL. DNSSEC ought to allow the liberty to add new forms of data to DNS; more so data that cannot be tainted like encryption keys. However first, the infrastructure ought to be secure. There is need to secure what DNS has for all the time done, and secure DNS from within. That's the key purpose for DNSSEC and it implementation should ensure that this is maintained. DNSSEC operates by digitally signing responses to DNS lookups by means of public-key cryptography. To perform this, a number of new DNS record forms were created, such as the DS, RRSIG, DNSKEY, and NSEC DNS records. When DNSSEC is applied, every answer to a DNS system will contain an RRSIG DNS proof, additionally to the record forms that were requested (Aitchison, 2005, p.298). The RRSIG record is a signature in digital form in the responses DNS resource record collection. This digital signature may be verified through locating the right public key established in the DNSKEY record. From the outcomes, a security-aware DNS client can subsequently determine whether the answer it obtained was right (secure), if the reliable name server for the field being questioned doesn't hold up DNSSEC (insecure), or whether there is any kind of error. The accurate DNSKEY record is established through an Authentication Chain, beginning with a recognized good open key for a Trust Anchor. This open key may subsequently be applied to authenticate a designated signer (DS) record. A DS record in a main domain (DNS zone) may afterward be used to confirm a DNSKEY record in a secondary domain that can then have other DS records to certify more subdomains (Mockapetris, 2004, p.3). To be capable of proving that a DNS reply is correct, you require knowing at least one key that is right from sources excluding the DNS. These opening points are referred as trust anchors and are usually come with the operating system or through some other reliable source. When DNSSEC was initially designed, it was considered that the just trust anchor that might be required for the DNS root. By the year 2009[update], nonetheless, the source has not still been signed, that has led to the operation of substitute trust anchors by the DNS root. DNSSEC has been advancing during the past year following researcher Dan Kaminsky's pointing out of a major DNS cache poisoning flaw. For instance the .org domain was digitally signed, federal agencies ought to adopt DNSSEC come December 2008 for their .gov domains, and fresh FISMA policies needed agencies to sign their within the internet zones with DNSSEC come the middle of 2009 (Seattle, 2008, p.5). Additionally, VeriSign intent to digitally sign the .net with DNSSEC come the end of 2010, in addition to .com in early 2011. Whereas .edu's domain implementation of DNSSEC will let institutions to sign digitally their domain names, security specialists and officials state just when or whether the vendors themselves might go DNSSEC is uncertain. When the digitally signed zone is element of a chain of trust and presumptuous the end application is responsive to this benefit of DNSSEC; then DNS data incoming to the application or end-unit in reply to a query can be expected to have sourced from the grilled domain; the authoritative domain cause is authenticated and may be trusted to be a comprehensive and faithful duplicate of the data mailed from the dependable source. DNSSEC in addition offers proof of non-existence (PNE) that too has some appealing benefits. With the characteristics of DNSSEC the first benefit to the user of DNSSEC might be to accord self-signed (through the domain proprietor) X.509 certificates coming from signed sectors that are element to a chain of trust the similar status as superficially signed certificates when utilized for server and email verification or some other domain based application and perhaps, because domain ownership is contained with DNSSEC, still with a status impending that of externally verified certificates. Therefore a server permit for communication with www.example.com can only be obtained by security-aware clients by an inquiry for a CERT RR for www.example.com. A variety of challenges are making numerous operators postpone the adoption of DNSSEC to avoid hackers from interfering with DNS data and redirecting Web traffic, in accordance to a study by European Union's cyber security agency. Operators concur that the use of DNSSEC offers a much required improvement on internet security. However 56 percent of them are still thinking whether to put into practice it or not, and 22 percent don’t intend to put into practice it in the next three years, according to the study (Ricknäs, 2009, p.7). Whatever thing less than a secure and certifiable process would eliminate the integrity of the DNSSEC reliable chain. Nevertheless if cautiously and properly prepared subsequently not only is DNSSEC chain reliability ensured but possibly other benefits may be leveraged to the advantage to the entire players in the internet. Although with minor modifications to some well established systems such as X.509 and TLS will work well to secure the internet users. That is very clear is that, while the DNSSEC system grows inevitably, we cannot persist viewing chain joining as a substance happens practice rather it ought to be viewed as essential to the domain checking process. When appropriately maintained, DNSSEC zones offer extra security through preventing attacks by the ‘middle men’. Any client with DNSSEC or alert resolver might not be at risk from DNS deceiving customers that are may not be DNSSEC alert will not observe any unpleasant effect. Though they won't receive the protection, they'll keep on to accessing your domain name just like they for all time have. The additional domain names which are using DNSSEC, the extra websites and email addresses might be guarded on the internet. Bibliography Aitchison, R. (2005). Pro DNS and BIND. Apress CERT, (2008) Vulnerability Note VU#800113: Multiple DNS implementations vulnerable to cache poisoning". United States Computer Emergency Readiness Team Report, available on http://www.kb.cert.org/vuls/id/800113. [Accessed November 25, 2009]. Higgins K. J. (Sep 08, 2009) DNSSEC Secures Another Domain: The .edu domain will adopt DNSSEC next March amid more concern over Domain Name System security. Available on http://www.darkreading.com/securityservices/security/government/showArticle. jhtml?articleID=219700072 [Accessed November 25, 2009]. Krebs, B. (2008-04-30). "More Trouble With Ads on ISPs' Error Pages". Washington Post. Available from, http://blog.washingtonpost.com/securityfix/2008/04/more_ trouble_with_ads_on_isps.html?nav=rss_blog. [Accessed November 25, 2009]. Meersman, R. & Zahir T. (2008) On the Move to Meaningful Internet Systems: Otm 2008: Otm Confederated International Conferences, Springer. Messmer, E. (07/08/2008). Major DNS flaw could disrupt the Internet: Network World, available on http://www.networkworld.com/news/2008/070808-dns-flaw-disrupts- internet.html [Accessed November 25, 2009]. Mimoso M. (Jul 2008) Time to Implement DNSSEC. Information Security Magazine.Issue: Jul 2008. Mockapetris, P. (2004-01-02). "Letting DNS Loose". CircleID. Available on http://www.circleid.com/posts/letting_dns_loose/.[Accessed November 25, 2009]. Ricknäs M. (29/05/2009) Study: Operators should use DNSSEC to improve security. Available on http://www.techworld.com.au/article/304943/study_operators_should_usednssec_improve_security [Accessed November 25, 2009]. Seattle, T. (2008). Nuke plants, non-existent sub domain attacks, muffin diving, and Guitar Hero | Zero Day | ZDNet.com Singel R. (2008-04-19). "ISPs' Error Page Ads Let Hackers Hijack Entire Web, Researcher Discloses". Available from, http://blog.wired.com/27bstroke6/2008/04/isps-error-page.html. [Accessed November 25, 2009]. Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Domain Name System Security Extensions Essay Example | Topics and Well Written Essays - 2000 words”, n.d.)
Retrieved from https://studentshare.org/information-technology/1504196-domain-name-system-security-extensions
(Domain Name System Security Extensions Essay Example | Topics and Well Written Essays - 2000 Words)
https://studentshare.org/information-technology/1504196-domain-name-system-security-extensions.
“Domain Name System Security Extensions Essay Example | Topics and Well Written Essays - 2000 Words”, n.d. https://studentshare.org/information-technology/1504196-domain-name-system-security-extensions.
  • Cited: 0 times

CHECK THESE SAMPLES OF Domain Name System Security Extensions

Domain Name System Security Extension Technology

It is at this point that the Domain Name System Security Extensions (DNSSEC) becomes useful.... The paper "domain name system security Extension Technology" indicates that deployment of DNSSEC increases the security of the Internet, as well as those of users of ISP services, which will ultimately enhance services to end-user and ensure a more secure and reliable network into the future.... (2012) argue that most Internet processes and services depend on data relayed by the domain name system (DNS) through excellent functioning and accurate mapping of domain names that can be understood easily using the IP addresses....
11 Pages (2750 words) Term Paper

Web technologies.From PHP to Python

So with PHP, we have the freedom of choosing an operating system and a web server.... The distinguishing factor of PHP from client-side languages like JavaScript is that the code is executed on the server.... If you were to have a script similar to the above on your server, the client would receive the results of running that script, with no way of determining what the underlying code may be....
21 Pages (5250 words) Essay

New Top-Level Domains

om/news/banks-new-domain-names-branding-marketing-security-2674524-1.... The present essay "New Top-Level Domains" dwells on the basic ideas associated with the general press on what the new domain system is going to be about and its potential benefits and challenges to the banking industry and clears misconceptions that may be associated with the new domain system.... Whereas one article brings out the basic ideas associated with the general press on what the new domain system is going to be about and its potential benefits and challenges to the banking industry, the other tries to clear misconceptions that may be associated with the new domain system....
2 Pages (500 words) Essay

FCCs Role in Broadband Regulations

According to the U.... .... Department of Commerce (2010), the internet had a revolutionary effect to the social and economic environment by providing… Internet became an integral part of the lives of the citizens in America for both their social and economic lives.... The internet and information technology gave way to growth in economy and Reports showed that the differences in socio-economic, geographic and demographic characteristics of the surveyed households affected the significant difference in demands and use of broadband internet....
8 Pages (2000 words) Assignment

Server Roles for Installing Windows Server 2008 R2

omain name system ServerThis role, (DNS) gives a standard way for relating designations with numeric Internet addresses.... Such extensions are important in securing merged applications like OCS 2007 and SharePoint.... Some of the roles available for the installation include the following:Active Directory Certificate Services refer to roles that offer customizable services for providing and managing credentials in software security systems, which utilize major public technologies....
2 Pages (500 words) Essay

Server Security Management

The paper "Server security Management" suggests that Network administrators need to have a way of putting in place controls to help them manage the users of computer systems as well as network resources.... Not only does the operating system have robust security and management capabilities, but it is also easy to deploy and use as compared to UNIX.... assword policy is simply the set of written rules that are part of a security policy that dictates specific password requirements of both device and user passwords....
8 Pages (2000 words) Case Study

Windows Network Proposal

The paper "Windows Network Proposal" highlights the importance of such steps as Selecting domain name, Placement of Domain Controllers and use of RODC, group policy, ensuring security, Implementing disk quotas, and DFS to allow the company to manage its network resources with much more ease.... hellip; Domain extensions tend to help to obtain the required domain name in case the first choice of domain is not available in a particular extension for example if the preferred domain name is shivllc and shivllc....
7 Pages (1750 words) Case Study

The Benefits of Mail Server

ail Server system OverviewMail Server has three main components that you can put together in almost anyconfiguration to design your system.... Domains A domain is a logical grouping of directory information, suchas users, with centralized administrative access through aconfiguration node.... You can also usedomains to support multiple Internet domain names, such asacme.... If you only have one node, youcan choose to have only one domain, or you can set upmultiple domains on the node....
8 Pages (2000 words) Essay
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us