A core element of the Internet that helps millions of computer systems locate each other is finally getting a much-needed upgrade. The domain name system (DNS) works a lot like the Internet’s phone book, translating the URLs that users type into a browser into the numerical addresses used to identify the servers that host the requested site.
Recently, this 30-year-old system has begun showing its age.
Last year, a team of high-profile security researchers raced to repair a critical flaw in DNS that made it possible to hijack legitimate communications, potentially directing unsuspecting Web surfers to malicious Web pages. The patch that the team came up with reduced the immediate danger but wasn’t meant to be a permanent solution.
For a long-term fix, many experts are now looking to DNSSEC, a protocol that verifies DNS messages with digital signatures. The Public Interest Registry, which handles the .org domain, is implementing DNSSEC across all Web addresses ending with this suffix, and it plans to complete the first phase of the process early this year. The U.S. government has committed to turning on DNSSEC for .gov as well, and the newly formed DNSSEC Industry Coalition is pushing to get the protocol adopted even more widely.
This is something of a turnaround. In the 14 years since DNSSEC was first conceived, the protocol struggled to gain widespread adoption because it was seen to unnecessarily increase the complexity of implementing DNS. The key to the DNS flaw discovered last year is that the protocol was designed during a more trusting time and does not bother to authenticate information. Dan Kaminsky, director of penetration testing at IOActive, a security company based in Seattle, realized that, if an attacker could worm his way into a DNS communication, he could redirect Web traffic in almost any way. Features have been added to DNS to reduce the threat that messages will be hijacked, but DNSSEC adds real authentication to the system for the first time.
Alexa Raad, CEO of the Public Interest Registry, notes that someone had to be the first to implement the new protocol. Before now, she says, the organizations responsible for domain names weren’t moving to integrate DNSSEC because they’d either be sending out credentials to servers that weren’t listening for them, or they’d be listening for credentials that wouldn’t be there. Raad says that the Public Interest Registry started integrating DNSSEC well before Kaminsky’s flaw was announced, hoping to encourage adoption of the protocol by setting an example. The revelations of Kaminsky’s flaw simply helped intensify the debate, she says. “For the past two years, a lot of the debate around DNSSEC centered around, ‘Do we need it? Are there other technologies? How viable is it?’ I think the debate has completely moved away from that. We all understand that DNS is in fact broken. The only solution for that is, in fact, DNSSEC. The debate is now, ‘How do we deploy?’”