October 18, 2010, 8:27 PM — Comcast has begun migrating its customers to a new Internet security mechanism that will help protect them from being inadvertently routed to phony Web pages for pharming attacks, identity theft and other scams.
Comcast is the first major ISP in the United States to adopt the new mechanism, which is known as DNS Security Extensions (DNSSEC).
DNSSEC is an emerging Internet standard that prevents hackers from hijacking Web traffic and redirecting it to bogus sites by allowing Web sites to verify their domain names and corresponding IP addresses using digital signatures and public-key encryption.
Comcast says all of its business and residential customers will have DNSSEC coverage by March 2011.
"Starting on Monday, we will start migrating customers to the DNSSEC validating servers," says Jason Livingood, executive director of Internet Systems Engineering for Comcast. "We're doing it in a phased approach."
The March 2011 date is significant because that's when http://www.networkworld.com/news/2010/030210-verisign-dnssec.html ">VeriSign plans to support DNSSEC for the .com domain that it operates. The Internet's most popular domain, .com has more than 80 million registered names as of September 2010.
The Internet's root servers, which sit at the top of the Internet Domain Name System hierarchy, began supporting DNSSEC on July 15.
DNSSEC also is supported by 55 of the Internet's 294 top-level domains, including the .org domain used by non-profits and the .edu domain used by universities. VeriSign says it will support DNSSEC in the .net domain by year-end.
"We would like to complete our migration of subscribers before the .com [top-level domain] signs," Livingood says.
Comcast began a public trial of DNSSEC in February, announcing at the time that it planned to provide production-quality DNSSEC resolution services to all of its customers by the end of 2011.
Now, having experienced few technical glitches with DNSSEC, Comcast will support the emerging standard several months sooner.
"We've been actively trialing DNSSEC on the public Internet for a little more than two years now...Starting in 2010, we announced the start of our public DNSSEC trials," Livingood says. "All of the operational issues we ran into and any of the technical issues have been sorted out fully in the past couple years."