Archive for category Uncategorized

Deployment webinar offered June 9

“Lessons from the Trenches: Deploying DNSSEC” is an Afilias webinar targeting country code top-level domain registries with an hour of “key questions to ask yourself when deciding upon DNSSEC deployment parameters and timeline”  and “infrastructure changes required for your registry and DNS systems to support DNSSEC.”

Scheduled for 11:00 am EDT on June 9, the webinar speakers include Initiative partner and Shinkuro CEO Steve Crocker, along with John Kane, vice president, corporate services and Ram Mohan, vice president and chief technology officer, Afilias; Rickard Bellgrim of the .SE registry; and Lauren Price of .ORG and the Public Interest Registry.   Registration is required.

No Comments

ICANN announces change to root deployment schedule

ICANN will delay by two weeks–to July 15–the scheduled July 1 deployment of DNSSEC at the root zone.  On that date, ICANN will distribute a “validatable, production, signed root zone” and publish a trust anchor. The announcement noted:

The schedule change is intended to allow ICANN and VeriSign an additional two weeks for further analysis of the DURZ rollout, to finalise testing and best ensure the secure, stable and resilient implementation of the root DNSSEC production processes and systems

No Comments

This summer: Steps Toward DNSSEC

Afilias Executive Vice President and CTO Ram Mohan offers this Circle ID post on “More Stepping Stones Before This Summer’s Seminal DNSSEC Events.”  From the post:

We will now get to see, before a validatable root zone is published, how the DNS infrastructure will behave as more queries for DNSSEC information result in larger responses. Answers to the important question about how the DNS scales with the addition of DNSSEC will hopefully start to filter in, as well as the opportunity to watch for abnormalities in the system. The final step in the root’s DNSSEC deployment will occur in July when a validatable root zone is published.

Mohan calls on ISPs, TLD registries and application providers to encourage their technical teams to participate in DNSSEC testing as the summer progresses.  Afilias works with .org and the Public Interest Registry on its DNSSEC deployment.

, ,

No Comments

All root servers are DNSSEC-ready

As reported today in The H Online, “all 13 root servers are now serving a signed version of the root zone.”  And, despite numerous rumors circulating on the web, the article notes:

There have been no reports of any problems in the immediate aftermath of VeriSign’s J root server starting to serve DNSSEC signatures. Experts at the 60th RIPE meeting in Prague were almost unanimous in predicting a glitch-free switchover, following the successful switchovers of the other 12 root servers in recent months. The only apocalyptic note was sounded by a countdown to the demise of the unsigned root zone.

The article discusses next steps, including disclosure of a public key and a June key signing ceremony that will bring together volunteer crypto officers and recovery key share holders from around the world.

No Comments

EDUCAUSE to feature live webinar on DNSSEC in .edu

EDUCAUSE notes that registration is almost full for its April 29 webinaron DNSSEC in the .edu Domain, featuring Becky Granger, EDUCAUSE director of information technology and member services, and host Steve Worona.  You’ll find additional background resources and links on DNSSEC on the webinar registration page.

No Comments

DNSSEC panel at Internet2

Two speakers from the DNSSEC Deployment Coordination Initiative–Shinkuro CEO Steve Crocker and U.S. National Institute of Standards and Technology computer scientist Scott Rose–will speak at Internet2’s Spring 2010 meeting next week in Arlington, VA, as part of a panel on DNSSEC.   Joining them will be Shumon Huque of the University of Pennsylvania; Anthony Iliopoulos of Louisiana State University; and Rodney Peterson of EDUCAUSE.  The meeting will take place April 26-28 at the Crystal Gateway Marriott in Arlington; go here for registration and more details.

No Comments

ICANN invites “trusted community representatives” to aid with root key management

To “improve confidence and acceptance in the DNSSEC security mechanism,” ICANN has issued this invitation to “recognized members of the DNS technical community to be part of the key generation, key backup and key signing process for the root.”  Twenty-one “trusted community representatives” will be selected,  based on statements of interest; see the solicitation for more details.  People affiliated with ICANN, VeriSign or the U.S. Department of Commerce may not become a Trusted Community Representative.  More information can be found here.

No Comments

Deployment watch: .PM

Via this post on Twitter, AFNIC CEO Mathieu Weill reported yesterday that the registry has DNSSEC-signed .PM, its first top-level domain in production. AFNIC manages .PM, which is the country code top-level domain for St. Pierre and Miquelon.

, ,

No Comments

Mohan: DNSSEC “no longer pie in the sky”

Afilias Executive Vice President and Chief Technology Officer Ram Mohan urged registrars, registries, ISPs, enterprises and developers to get a DNSSEC strategy in a blog post today, noting that “DNSSEC is not pie-in-the-sky talk any more. It’s a reality as current and pressing as the need to migrate to IPv6…if you haven’t started planning for DNSSEC yet, you should start to wonder whether you’re behind the curve.”  For application developers, he looks ahead, noting, “DNSSEC creates an entirely new piece of Internet infrastructure upon which software developers can apply their ingenuity. Over the next few years we should expect to see applications leveraging domain name security in ways we cannot imagine now.”  The post includes a video and an overview of recent progress toward DNSSEC deployment.

No Comments

New key rollover paper in Internet Protocol Journal

The Internet Protocol Journal has just published an article about Rolling Over DNSSEC Keys, authored by George Michaelson and Geoff Huston of APNIC; Patrick Wallström of .SE; and Roy Arends of Nominet.  The editor notes that the article examines “what happens in two widely used DNS resolver implementations when DNS clients lag behind in synchronizing their local copy of trust keys with the master keys used by the zone administrators to sign their DNS data.”  Here’s what the authors conclude: 

….in this situation of slippage of synchronized key state between client and server, the effect is both local failure and the generation of excess load on external servers—and if this situation is allowed to become a common state, it has the potential to broaden the failure state to a more general DNS service failure through load saturation of critical DNS servers.

This aspect of a qualitative change of the DNS is unavoidable, and it places a strong imperative on DNS operations and the community of the 5 million current and uncountable future DNS resolvers to understand that “set and forget” is not the intended mode of operation of DNSSEC-equipped clients.

No Comments