What you missed: A major Internet security hole was finally plugged

The No. 7 top sleeper tech story of 2010

By Bill Snyder, InfoWorld |  Security, DNSSEC

The typical end-of-year security story generally involves a looming cyber threat or yet another major misstep by Microsoft. Well, there's good news on the security front this year -- and, like our other picks, it's gone largely unnoticed. A major hole in security has been plugged with the full deployment of Domain Name System Security Extensions (DNSSec) at the Internet's authoritative root zone. (InfoWorld awarded one of the main drivers of fixing the flaw in its CTO 25 awards earlier this year, but little has been said since.)

The extensions will make it much more difficult for black hats to engage in cache poisoning, an attack that strikes at the fundamental nature of the Internet. "If you can't trust your DNS server, you can't trust anything," says Paul Smith, a senior analyst for Symantec's Hosted Services division.

[ Master your security with InfoWorld's interactive Security iGuide. | At Black Hat 2010, critical technologies such as DNS and SSL proved to be vulnerable -- and they're more than 20 years old. ]

DNSSec tries to prevent spoofing attacks by allowing websites to verify their domain names and corresponding IP addresses using digital signatures and public-key encryption.

The DNS was not originally designed with strong security mechanisms, and technological advances have made it easier to exploit vulnerabilities in the DNS protocol that put the integrity of DNS data at risk.

Cache poisoning occurs when a hacker manages to inject bogus data into a recursive name server's cache, causing it to give out that bad information to unsuspecting local clients. ("Authoritative" name servers know where to find particular IP addresses when asked; "recursive" name servers have to search for the answer.) The attack could be used to send Internet users to malicious sites or hijack email.

The vulnerability was discovered in 2008 by Dan Kaminsky, a well-known security researcher who also developed a fix for the flaw. He suggested a patch that involved randomizing ID sequences.


Originally published on InfoWorld |  Click here to read the original story.
Join us:
Facebook

Twitter

Pinterest

Tumblr

LinkedIn

Google+

Spotlight on ...
Online Training

    Upgrade your skills and earn higher pay

    Readers to share their best tips for maximizing training dollars and getting the most out self-directed learning. Here’s what they said.

     

    Learn more

Answers - Powered by ITworld

ITworld Answers helps you solve problems and share expertise. Ask a question or take a crack at answering the new questions below.

Ask a Question
randomness