5月 192014
 

Everyone in the DNS community agrees that DNS’s security model is woefully outdated. Conceived at a time when there were fewer computers on the Internet than are housed by even today’s smallest data centers, DNS unfortunately has no strong protection against malicious parties hoping to exploit web users. What little protection it does offer is mostly derived from novel uses of non-security features (e.g., UDP source port and transaction ID randomization).

For more than 15 years, the IETF has been working on DNSSEC, a set of extensions to apply digital signatures to DNS. Millions of dollars in government grants and several reboots from scratch later, DNSSEC is just starting to see real world testing. And that testing is minimal — only about 400 of the more than 85,000,000 .com domains support DNSSEC, fewer than 20% of US government agencies met their mandated December 31, 2009 deadline for DNSSEC deployment, and only two of the thirteen root zone name servers is testing with even dummy DNSSEC data.

Aside from its lack of adoption, DNSSEC isn’t even a very satisfactory solution. It adds tremendous complexity to an already fragile protocol, significantly increases DNS traffic in size, encourages questionable security practices, and hamstrings many modern uses of DNS.

Details

Continue reading »

8月 172011
 

8月17日 消息:作为一家主流的第三方域名系统(DNS)供应商,OpenDNS刚刚正式宣布为IPv6协议提供DNS支持。该公司声称:“OpenDNS是全球范围内第一家可以提供此种服务的递归DNS服务供应商。”

尽管我并不清楚他们到底是不是属于真正的第一,但我知道对于网络管理员们来说,这属于一个重大的进步。就个人而言,我利用OpenDNS来进行DNS查验。与使用过的由ISP提供的DNS相比,它的查验速度更快;并且,与很多家ISP的DNS服务器相比,它的可靠性也更高。

2620:0:ccc::2
2620:0:ccd::2 Continue reading »