Deployment watch:

Netherlands, European Union, dot-US, root zone: Help us stay up-to-date on your organization’s deployment news by submitting information about your DNSSEC deployment deadlines, test beds or other progress to info @ dnssec-deployment.org.

, , ,

No Comments

SIDN to sign dot-NL in August:

SIDN, the registry for The Netherlands’ dot-NL and ENUM, announced it will implement DNSSEC one month after the root zone is signed in July, setting its implementation for August 2010. SIDN CEO Roelof Meijer said, “Waiting until the root is signed means that we won’t need to implement any interim solutions – which inevitably increase the risk of errors – and it will be possible to sign the whole chain at once. We believe that this is the best and safest way to implement DNSSEC for the dot-NL zone.”

, ,

No Comments

DNSSEC implemented in dot-US:

Neustar announced it has implemented DNSSEC in the dot-US country-code top level domain. Rodney Joffe, senior vice president and senior technologist at Neustar, said, “DNSSEC means a more secure and reliable domain name system because its extensions provide origin authentication of DNS data, data integrity and authenticated denial of existence.”

, ,

No Comments

Root zone deployment schedule issued:

The root zone DNSSEC deployment team has launched a web site with updates on the effort. It includes documentation and technical status updates on DNSSEC deployment at the root, and will offer announcements as the project moves forward.  You can subscribe to future status updates via RSS. For more information, contact the root deployment team.

No Comments

Initiative shares advice on signing zones:

The DNSSEC Deployment Coordination Initiative has published advice for registrars and other DNS operators with “a reasonable set of DNSSEC configuration parameters.” Titled “DNSSEC Operations: Setting the Parameters,” the suggests  values to choose for the configuration parameters associated with DNSSEC that provide good security without causing an undue burden on operators’ name service infrastructures. The configuration parameters include key sizes and lifetimes, re-signing periods, and time-to-live for the records. Feedback on the memo is welcomed at [email protected].

No Comments

RIPE issues new app to gauge DNSSEC readiness:

RIPE NCC has released an application to help network administrators determine the maximum size of DNS responses that a resolver can receive so they can prepare their networks and resolvers for a signed root zone. For additional discussion of how to test whether your site is ready for DNSSEC and what to do to prepare, read Olafur Gudmundsson’s discussion.

,

No Comments

Report on DNSSEC administrative tools released:

Dot-SE (The Internet Infrastructure Foundation) has released a [now final] report it commissioned from independent IT security firm Certezza focused on the functionality of signing and key management tools. The report notes, “the product standard is good and the tested products work as expected.”

, ,

No Comments

Google launches Public DNS:

Google launched a free, global Domain Name System (DNS) resolution service, offering it as “an alternative to your current DNS provider.”  The new service supports EDNS0 extensions, accepting and forwarding DNSSEC-formatted messages, but does “not yet” validate responses.

No Comments

California CISOs hear about DNSSEC:

Initiative sponsor Douglas Maughan of the U.S. Department of Homeland Security, Science and Technology (S&T) Directorate, spoke on DNSSEC deployment at the California Chief Information Security Officer lecture series on December 15 in Sacramento, to an audience of the state’s information security officers, disaster recovery coordinators, and chief information officers.

No Comments

IETF to California

IETF to California: IETF will convene its 77th meeting in Anaheim, Calif., March 21-26.

No Comments