25C3: Dan Kaminsky Invokes DNSSEC

Dec 30, 2008

Dan Kaminsky, front man of the DNS attacks band the middle of 2008, has delivered a retrospective at the 25th annual Chaos Communication Congress (25C3) on the background and process of DNS vulnerability. But he also set his sights on the future. And outside-the-box thinker Dan J. Bernstein also had a thing or two to say.

Kaminsky's talk at the Berlin hackers' meeting, that by its 25th year has become something of a legend, crowded an audience into the seats and aisles of Berlin's large Congress Center that could rival that of a keynote at an applied economics conference during the boom years. Without going into muchdetail on the DNS vulnerability issue per se (such as we have covered here), Kaminsky nevertheless announced some work of his that was under way. With the help of Internet veteran Paul Vixie, he had assembled around 15 DNS experts from the leading software makers into a room at Microsoft to discuss the consequences. The important thing for the participants was the simplicity of the solution so as to gain a better acceptance among system admins. If the DNS semantics would change even enough for just a percentage of hostnames not to be resolved, admins wouldn't bother to institute a patch. They would typically wait a few weeks after a vulnerability were announced before patching maybe half their systems. At that rate, about 75% of the systems would be patched, said Kaminsky proudly.

In retrospect, Kaminsky considers 2008 "not a good year for authentication." There were too many security holes whereby systems insufficiently tested the validity of domain requests. DNS was a big part of the problem, directly and indirectly, because many other Internet services, such as email and the WWW, depend on DNS. Many more applications participate in DNS Federations, which decentralize the DNS data over multiple authorities. Kaminsky provided a few examples: IPSEC keys, antispam blacklists and VoIP phone numbers. DNS was not originally designed for these solutions.

Kaminsky, who covered his topics more as an entertainer at times, didn't have any specific patent initiatives in mind. DNSSEC mightn't be elegant, but after all, could be part of the solution, by his opinion. Daniel J. Bernstein, well known in developer circles for his flawless code, but also feared for his release politics, presented his own solution, known as DNSCurve. Kaminsky nevertheless still saw a problem with the concept, because every request would then require too extensive a cryptographic operation. He doubted that heavily frequented nameservers could handle the load. It's yet to be seen whether in the foreseeable future we will truly encounter the oft repeated "end of the Internet as we know it."

Related content

  • DIC: Domain Name Registries to Promote DNSSEC

    The DNSSEC Industry Coalition (DIC) was founded in the U.S. with the goal to drive further development and acceptance of the DNSSEC security protocol. The consortium includes a half dozen top Domain Name Registries and software developers that are currently laying out an action plan.

  • DNSSEC

    Some Internet exploits target name resolution servers. DNSSEC uses cryptography to protect the name resolution service.

  • Chaos Communications Congress

    In late December, cable docks, soldering stations, templates, 4,000 participants, and 100 talks were active ingredients in the 24th Chaos Computer Congress.

  • Relaxed Flash: Blitzableiter Checks for Malicious Flash Files

    On stimulus from the German Federal Agency for Information Security (BSI), Felix "FX" Lindner of the Phenoelit hacker group investigated the security of Flash object code. The result is a free protection program with the name Blitzableiter ("lightning rod").

  • Phishing and Pharming

    The pharmers and phishers are after your precious financial infor-mation. We’ll show you how to protect your interests.

comments powered by Disqus