DHS Wants Master Key for DNS 266
An anonymous reader writes "At an ICANN meeting in Lisbon, the US Department of Homeland Security made it clear that it has requested the master key for the DNS root zone. The key will play an important role in the new DNSSec security extension, because it will make spoofing IP-addresses impossible. By forcing the IANA to hand out a copy of the master key, the US government will be the only institution that is able to spoof IP addresses and be able to break into computers connected to the Internet without much effort. There's a further complication, of course, because even 'if the IANA retains the key ... the US government still reserves the right to oversee ICANN/IANA. If the keys are then handed over to ICANN/IANA, there would be even less of an incentive [for the U.S.] to give up this role as a monitor. As a result, the DHS's demands will probably only heat up the debate about US dominance of the control of Internet resources.'"
DNSSec (Score:5, Informative)
No. It secures DNS. So you cant spoof domain names. It secures that the DNS Server is authorative so the DNS query was answered right. If somebody spoofes an IP in your network, you won't be saved.
Re:DNSSec (Score:5, Insightful)
Re:DNSSec (Score:5, Funny)
Re:DNSSec (Score:5, Insightful)
Re:DNSSec (Score:5, Insightful)
Re: (Score:3, Informative)
Re:DNSSec (Score:5, Insightful)
In other words, it's perfectly possible to be neutral *and* an asshole. I'm not saying Switzerland is either (I haven't read up on this), but generally speaking, there is no contradiction between your claims and those of the GP.
Re:DNSSec (Score:5, Interesting)
Now, a DNS system that was largely immune to DoS attacks, that would be useful. That's the real problem we face with DNS. But dnssec doesn't help with that at all.
Re: (Score:2)
Re: (Score:3, Insightful)
I fixed your spelling but that's minor. I'm a US citizen, but what in the world ever gave you the idea that we the US people actually believe those jerks inside the beltway? I don't trust any of them. I just hope we can survive as a country till Noon Jan 20, 2009. Regardless of who wins the not too well concealed game of musical chairs, we at least will be rid of one 'born again Christian' and ca
Re: (Score:2, Insightful)
I just hope we can survive as a country till Noon Jan 20, 2009.Regardless of who wins the not too well concealed game of musical chairs, we at least will be rid of one 'born again Christian' and can begin to try to heal the pain and suffering of the legacy he leaves behind.
Ok, so let's for a moment imagine that in 2009 you will finally make the right decision, elect a trusted man for the job, and that he replaces the circus people that are running your country. Lets assume they are so trustworthy that the international community allows the US to oversee the Internet. Also lets say that ICANN gives out the keys. 4,8,12, years after your country ones again elects a bozo of equal or more potential to desabilize the world. What then? We'll just hope that he won't do too much da
Re:DNSSec (Score:5, Insightful)
The whole idea of ICANN as I see it, is to assure that the net works, FOR EVERYONE. And yes, IMO ICANN has made some mistakes, but they pale in comparison to the mistakes that would be made if our government had access to the master keys, and could use the internet as just another weapon, for whatever purpose they might have in mind this week/month/year. That scenario scares me shitless.
The internet has been IMO, the greatest tool ever in terms of understanding our fellow humans. The near instant communications, not between governments who may have an agenda, but between people (who may in fact also have an agenda) has allowed those of us who are willing to learn, to learn what makes the other guy tick. Sadly, we seem to be all too infested with those who not only have an agenda, but are only willing to learn how to use it to their advantage and to hell with everybody else. These are the same individuals/groups/governments that refuse to learn from history, and are therefore doomed to repeat every mistake made over written history, just to see if they can make it work this time around. This is the same bunch who, when it blows up in their faces, always has a ready scapegoat, usually called the other guy...
Besides, we already have the "plug you out" in the form of the RBL, which has been used to unplug an errant domain or country, several times. The point is that this has for the most part, been applied sparingly, and only after repeated warnings to the offending region or country.
--
Cheers, Gene
"There are four boxes to be used in defense of liberty:
soap, ballot, jury, and ammo. Please use in that order."
-Ed Howdershelt (Author)
The way of the world is to praise dead saints and prosecute live ones.
-- Nathaniel Howe
Re: (Score:2)
Hillary is a Methodist, I believe.
From my standpoint, not a significant improvement - especially given that she's as much a war hawk on Iran as Bush is, because she owes AIPAC and its rich Jewish supporters a ton of money for her campaign. General Clarke is right about that.
Besides, all the evidence is that Bush will
Re: (Score:2)
That's an undersrtatement. For me, this ploy just means I can add "router-rooting" to my existing list of: "retard-raping rump-humping rabid-rover-rogering right-wing runt-reamers", but perhaps even highly-hyphenated alliteritive invective can be excessive? That's one perspective, but the objective will reject it.
Re: (Score:3, Insightful)
Re: (Score:3, Insightful)
Er, no, that's what DNSSec prevents. Just as SSL stops man in the middle attacks for normal TCP traffic, DNSSec makes sure the domain query responses are authentic. The man in the middle doesn't have the key and cannot sign his forged response; he can only forward legitimate responses.
Incentive for alternative roots (Score:5, Insightful)
Granted, I won't be fully trusting the information from either set, so it's not as if my system security is dependant on it.
Re:Incentive for alternative roots (Score:5, Insightful)
By the way, how scary is it that DHS used to be the commonly used acronym associated with "Department of Human Services". And now this...
Good to know that DHS can put its hands in ANYTHING regardless of nature as long as they claim it has some association in some minor (or even non-existent but hypothetical) way.
Re: (Score:3, Insightful)
Re:Incentive for alternative roots (Score:5, Insightful)
Re:Incentive for alternative roots (Score:5, Insightful)
I hope they do that and piss off rest of the world so that they form an independent organization for such matters.
Re:Incentive for alternative roots (Score:4, Insightful)
You can be assured that, whatever information is collected on you by the government will not be adequately protected, and will be abused. Power grabs like this one must be resisted.
Re: (Score:2)
Re:Incentive for alternative roots (Score:5, Insightful)
Terrorism is the act of inciting TERROR. I'm not terrified of losing all of my money, or of someone owning my computers or even disrupting my Internet connection. Being cut to pieces by rusty shrapnel, or possibly tortured while tied down in a dark room. Now *that* incites terror. Having to fight for my survival after being severely injured. THAT incites terror. If my computers or networks cease to function, it is inconvenience, NOT friggin' terrorism. People need to stop lightly throwing that word around. Terrorists don't give a fuck about your fucking computer or money. They care about SCARING THE HELL OUT OF YOU THROUGH VIOLENCE. In that regard, they've done really well (been to an airport lately?).
Same goes for 'cyberterrorism'. An interesting paper on the topic presented by Jay Dyson at Toorcon 2002: http://www.treachery.net/articles_papers/tutorial
This could get complicated (Score:3, Interesting)
Now, imagine if ISPs or countries worldwide could choose which set of root servers to use. Imagine if ISPs and go
Re: (Score:2)
As reported by who's whois? It's not like whois is some totally unrelated system -- it's tied to the same information as any other part of DNS.
You can certianly query along different root paths and compare the results without naming an authority, but if you're going to use whois to resolve conflicts you'd have to pick a root path for your whois requests and trust it to be accurate.
Re: (Score:2)
(re: your signature: as a German I should love him, but who is Hasslehoff?)
Re: (Score:3, Insightful)
Re: (Score:2)
Of course they did. Ever since they got caught hacking Falun Gong web sites from machines at the Ministry of Defense (among many other activities) they've been spoofing their IPs.
Alternative Keys, not Alternative Roots (Score:3, Insightful)
Th
Re: (Score:2, Interesting)
Our country has many exciting oppertunities and yet they are being stripped from us because of our government is pushing other countries away from our trust by trying to institue messure that they have *no* constitutional right or global right in doing. Making laws with out the correct due process, without checks and balance. This is not a correct process of allowing such a decission to be addressed. The people in America are the governing voice via the constition, bill of rights and declaration of inde
Re: (Score:3, Insightful)
Well if that's the case then I guess theres no point in doing anything about it.
Re:Incentive for alternative roots (Score:4, Interesting)
God, it sounds like the exact same ideas that the USSR had running puppet governments in the other Soviet States.
Maybe this will be more to your liking ... (Score:5, Insightful)
There
In any event, I didn't perceive his remarks as being particularly U.S.-centric, although it's popular hereabouts to redirect any commentary about Internet infrastructure into criticisms of U.S. policies. Odd that, of all the various services and protocols that traverse the Internet, we get heat for one that has always been run rather well. We are the ones that have, like it or not, run the roots with more even-handedness than most countries around the world would have. Hell, we even let a bunch of hardline Communist states on board, although none of them seem particularly grateful.
Maybe that bothers you, that you don't really have any valid criticisms of our policies towards "Internet governance". Maybe you'd like to invent some reason to "wrest control of the Internet away from the United States" (whatever that means
China's attitude towards the Internet is one that is, unfortunately, becoming more popular with governments of various stripes. They day will come the people of this planet will wish someone were still managing the global DNS infrastructure with something resembling the United States' largely hands-off approach. Don't count on that though.
God, it sounds like the exact same ideas that the USSR had running puppet governments in the other Soviet States.
I don't know what to do with this one. Comparing 13 or so server banks around the world with a nation that annexed multiple countries by main strength and created a true Empire
Re: (Score:2)
No
Re: (Score:2)
This is actually from an SNL skit from years ago. It always made me crack up, and I have yet to figure out why exactly. I've since been meaning to change it to reflect something significant or deep, but have yet to come up with anything beyond random political BS of one sort or another.
wtf! (Score:5, Insightful)
Didnt know that spoofing an IP what all it took to break into a computer.....
Re: (Score:2)
What, doesn't anybody use rlogin/rsh anymore with
Creative Visualizations... (Score:2)
A farmer giving the fox the keys to the henhouse.
Re: (Score:2)
Don't forget Foxxy Love [wikipedia.org], Comedy Central's favorite animated mystery-solving bisexual!
How are you gentlemen. (Score:4, Funny)
Sure, you can have the master key... (Score:5, Funny)
Re:Sure, you can have the master key... (Score:5, Funny)
-- DHS.
Re: (Score:2)
Re: (Score:2)
Re: (Score:2, Funny)
Various Internet companies today suspect that their domain names have been compromised. Blaming the new "secure" DNS system, companies are still unable to tell what the extent of this damage is.
Also in todays news:
Iran in massive cleanup operation after Israeli nuclear strike.
Microsoft again found guilty of anti-trust violations.
SCO share price
Multiple keys (Score:3, Insightful)
I'm surprised the US Government is doing this; I'd have expected them to obtain the key through back channels rather than out-and-out demanding it.
Which is worse? (Score:2, Interesting)
Honestly...
Re: (Score:3, Informative)
The result is that instead of computers being configure to trust a single root zone key from IANA, it is likely that every ccTLD will have its own key, and that the standard configuration of DNS as shipped with an OS or distribution will contain the public keys or hashes for every one of them. This is argu
Re: (Score:2)
The master key is trusted by all and signs every TLD and ccTLD, right? Does this key expire after a set number of years? If so, how is replacement handled, especially for systems that may be offline for long periods of times? Just wondering.
Another "Internet" (Score:2, Interesting)
Re: (Score:2)
Many people have done the first, but no one has succeeded at the latter. But if a government were to do it, they might well succeed.
However, other countries may not even need to do that. If they use a ccTLD (e.g., .cn for China, .lk for Sri Lanka, etc), they can control the DNS key for that ccTLD, a
Re: (Score:2)
Re: (Score:3, Insightful)
How feasible is it for we in the rest of the world to create "another Internet" and leave the current one with the US government? I can see major powers like China and Russia in support of this measure. But is it even possible?
Quite feasible actually. China already runs it's own DNS root servers. The trick becomes to make this as seamless as possible to the end users. But there are ulterior motives for this, to control the people.
For example say China wanted ibm.com to resolve to their own servers, th
Re: (Score:2)
How? I can redirect you to my own site, but how do I spoof your SSL certificate? I can generate a similar one and try to fool you into accepting it, but I can't see how you can sniff traffic on an SSL encrypted channel just by gaining control of the DNS server.
Re: (Score:2)
Funny you should say that, since one of the objectives of the US government when designing the Internet (ARPANET at the time) was to create a decentralized network that would remain in operation even in the event individual nodes were lost...
Re: (Score:2)
Oh that... Its called IPv6.
Subby failed reading comprehension (Score:5, Informative)
Re: (Score:2)
How DNSSEC prevents spoofed IP addresses (Score:2)
DNS primarily lets you look up the IP address corresponding to a domain name, and DNSSEC prevents this from being spoofed. Spoofing the routing protocols so that IP packets go to the bad guy's machine is obviously not DNS's problem.
Should U.S. DHS be trusted? (Score:5, Interesting)
The crucial signing key is for Windows Update (Score:5, Insightful)
The truly powerful signing key is for Windows Update. If you have that key, you can take over every Microsoft computer in the world . Change the operating system. Install anything, including a new key. Reboot the machine.
Who has that key? Do we know?
Whoever has both the DNS root key and the Windows Update signing key rules the Internet. Or at least all the Microsoft client systems. They can redirect Windows Update requests to themselves, then download their own update and have it accepted.
Unfortunately, this isn't a joke.
Re: (Score:2)
Re: (Score:2, Funny)
Re:The crucial signing key is for Windows Update (Score:4, Insightful)
You can already take over every microsoft computer in the world. All it takes is a zero day exploit. How exactly is a spam botnet fundementally different from a botnet controlled by the US Government?
The security of encryption keys is only a concern when the security of the rest of the system is not in quesiton.
Re: (Score:2, Insightful)
Because you were the first incompetent boob to come along. There is a HUGE, obvious difference between a zero day exploit spreading from computer to computer and millions of PC's getting an exploit at the same time because they were set to automatically download updates from Windows Update. Or did you stop to consider the fact that basic security will keep you from being infected by a zero day exploit? A firew
No, it's not a joke. (Score:5, Interesting)
If you can force a Windows Update cycle, you can change the hard-coded values. Microsoft Update can patch any part of the OS and can force a reboot. (A reboot can be forced on any machine with updates turned on, even if auto reboot is supposedly turned off.)
If you can make changes to DNS, you can change the IP address for "the important *.microsoft.com sites", redirecting the updates to an attack site.
So possession of both of those keys gives full control of all Windows Update enabled clients.
Re: (Score:2)
I guess the difference is that securing DNS is more fundemental problem than the integrity of individual applications or update systems.
We asked, you spoke, we listened. END OF STORY (Score:3, Funny)
We are denied the key.
We deny having the key.
out of control (Score:5, Insightful)
Re: (Score:2)
Routing and private keys? (Score:4, Interesting)
In any case my boxes don't give access to just the IP address, they give access based on private keys, DNS, and the IP address. Another case of government technical cluelessness thinking that the master key unlocks ALL DA COMPUTORS IN DA VERLD?
Re: (Score:2)
Re: (Score:2)
Re: (Score:2)
If all IP firewalls fall to your skillz, maybe you should be the uberhacker contracting with DHS. They don't need anything else except you.
Re: (Score:2)
What skills do you imagine it takes to forge an IP address?
That's all we need (Score:2)
correction (Score:2)
the US government will be the only OTHER institution that is able to spoof IP addresses.
whoever is the creator (icann?) of the master keys is also able to spoof DNSsec.
You know... (Score:5, Interesting)
Now, though, I'm starting to see where I went wrong. I was assuming that the government of the United States could never be as fucked up as the one in, say, China. I was being horribly short-sighted. I should have known that this kind of shit was only a matter of time.
So how much worse could letting the U.N. have control of ICANN be than something like this? I say fuck it. Let them have it, and give it some independent oversight. For the life of me, I cannot believe that I am actually looking to foreign nations to ensure the neutrality and openness of the Internet, but there you have it.
Re:You know... (Score:5, Interesting)
Re: (Score:3, Interesting)
Irrelevant. No one country should have control of a global resource. Even ignoring the potential for abuse, global resources should be managed globally, it's as simple as that.
I cannot believe that I am actually looking to foreign nations to ensure the neutrality and openness of the Internet
Yeah, because us dirty foreigners don't even know how to spell "freedom", let alone have any respect for it.
Re: (Score:2)
Some country with torture and show trials ... hang on, the USA is trying very hard to become one of those unsavory members of the U.N.
Hah. The US government has answered. (Score:4, Funny)
root keys and Ultimate Power (Score:2, Interesting)
It's either that or coming up with a way of keeping such information outside of the hands of a foreign power (the USA is a foreign power from my country. Not an enemy by any hands at this time... but it has been).
There should be no debate if DHS gets its way (Score:2, Insightful)
Re: (Score:2)
See, there is a use for the UN to control it.
It may screw it up but it won't harm us badly, purposfully, either.
Re: (Score:2)
How is this significantly different? (Score:5, Insightful)
Right now, Verisign (or any of the widely-trusted X.509/SSL certificate authorities) can generate fake certificates for arbitrary sites, and your ISP can poison the DNS (from your perspective).
Incompetent government employees (or corrupt or foreign governments) are not the only adversaries we need to deal with. DNSSEC, like the current HTTPS trust system, reduces the number of potential attackers, but it doesn't eliminate them all. We know this, and we deal with it by only vesting a limited amount of trust in these systems.
The discussion should not be about whether or not the US DHS specifically should be given access to the keys; The discussion should be about the importance of minimizing the number of points where the system can be attacked: Only those entities who strictly need the keys in order to administer the DNSSEC system should be given access. The DHS doesn't need DNSSEC keys in order to make DNSSEC work, so the DHS should not get the keys. It's as simple as that.
So what? (Score:3, Insightful)
Anybody --- not just the DHS --- can spoof the DNS today. And yet, by all available evidence, DNS spoofing is vanishingly rare. Mutual authentication over the untrusted Internet is a solved problem: TLS provides an end-to-end guarantee that your connection to your banking web application terminates with someone who can vouch for your bank's crypto keys. And you don't simply trust SSL certificates to the government: you also trust a myriad of commercial entitities as well.
This is a red herring on multiple levels. There are lots of places that intelligence agencies can step in to violate your privacy on the Internet; you "trust" an access-layer providers, a number of backbone providers, the owners of the DNS roots, the certificate authorities, Google, and probably 10 more entities. But more importantly, DNSSEC is irrelevant. Nobody depends on it now (it doesn't "exist"now: tell me how my Mac does a secure lookup for Google.com on Speakeasy). It's likely that nobody ever will depend on it. And that's OK, because we have better mechanisms in place. We should spend more effort on adding negotiated opt-in SSL for things besides web and mail, and less on huge infrastructure projects to "secure" one tiny link in the connectivity chain.
why? (Score:2)
second, why does the US government get rights? the organization in question should just relocate to another country where the US government has no jurisdiction.
finally, i thought
Bunk (Score:2)
Too many secrets? (Score:3)
Suuuure, just give US the key (Score:2)
Right, let's give the DHS the key so that only they can spoof their addresses. How is this good?
Why isn't is given to a group to control and enforce that has some balance, other than just 'trusting' that government should have this power?
"The Internet is free, oh except we hold the keys . . . " doesn't sound quite right to me.
Who cares about DNS? (Score:3, Insightful)
Each group seems to be a company which holds (in the case of Verisign) 15 individual certificates.
Each of these certificates can be used to set up a 'trusted' HTTPS connection.
If you don't know what that means, google for "verisign microsoft fake certificate"
I'm as paranoid as the next guy, but I think that haing companies with stellar security track-records like verisign issuing browser certificates is much more of a problem that DHS messing with DNS.
If you're worried about DNS/CAs/??? don't use them. Set up an SSH tunnel or a VPN, exchange keys securely (i.e. off-line, in person, verifying signatures) and live happily ever after.
Honestly, given the general state of computer security this is like complaining that someone might mess with your street-directory while driving a Pinto with "USA forever" stickers through Baghdad in rush-hour.....
Scary! (Score:5, Insightful)
This is one of many cases that show that the US government is really messed up.
They want the keys to something the whole world depends on, and the ability to disrupt it, but deny that to anyone else.
The same goes for the militarization of space: they want to be able to do it, and deny anyone else from doing the same.
The same goes for weapons of mass destruction: they want to keep it, and allow current allies to keep it, yet selectively deny certain current enemies (real or perceived) from having the same.
This double standard, coupled with unilateral actions against the advice and objections of the most of the world, is what makes the current US government so scary.
Indeed this feels like the saying: Gods may do what cattle can't [wikipedia.org].
Americans can do better than that. You guys used to admired, and yes, envied, but in a good way. The rest of the world looked up to you.
Now this admiration has turned to resentment, and resignation. The rest of the world cannot vote in US presidential elections, yet we are affected by that decision without having a say at all. Sort of like when you rebelled against a king that taxed you without representation.
It is beyond most of the world why you reelected the same administration again, despite of all its short comings, and their continued heavy handed meddling.
The Democrat taking over congress is a good sign.
Please continue to fix this. You indeed can, and you deserve better. The rest of the world deserves better too.
DNS Trust Anchors (how to trust who you trust) (Score:3, Informative)
But, DNSSEC does provide every zone owner with the ability to hold a very special key so that no one else may be able to spoof stuff in their zone. Everyone would want to trust
But here's the secret: if you don't trust the root zone owners, then instead you can choose to set trust anchors tied to the
Here's an interesting proposal for the root zone: pick two countries that hate each other and are likely to never have the same agenda. Let's call them X and Y. Give each of these countries a root key, and make the root zone use and publish results from both of them. Then, you could configure trust anchors pointing to both the X and Y keys. You could configure your system to make sure to check the DNSSEC results to validate the information up to both of these keys. That way you could ensure that since you trusted X and Y to never conspire against you together, and you would know that neither X or Y alone could have spoofed DNS data then you suddenly find yourself safe. Because of the distrust. I love the irony.
(now: you don't want to have a zillion keys for the roots... The packet sizes get larger as you add more keys, and it turns out you probably don't want more than 3 at most).
Re:Politics, politics (Score:4, Insightful)
The problem with all this saber-rattling about "control of the Internet" is that there's just too much economic power involved to arbitrarily change anything. Yes, one can complain about U.S. management of DNS (although the system does work rather well), one can complain about what the U.S. might do with DNS (although we haven't done anything yet) but sometimes, change for the sake of change is dangerous. The impact on world economies if DNS were to suffer any significant or long-lasting disruption would be severe. If any major changes or transfer of control of the Domain Name System ever get made, they'd best be made in the light of technological reality and not the immediate political need to stand up to the U.S. Remember what happened with Verisign and SiteFinder? That was just a taste of what might happen to the network if people start squabbling over the roots and waving their dicks around.
Be careful what you wish for.
Re: (Score:2)
Not the most convincing argument these days.
Re: (Score:2)
Re: (Score:2)