Kaminsky flaw fixed for .com and .net by 2011

Verisign anticipates an industry-wide effort to finally rid the net of the Kaminsky flaw.

world wide web address

DNSSEC, the long-term solution to the Kaminsky vulnerability, should be completed for .com and .net domains by the first quarter of 2011.

So claims internet infrastructure company Verisign, which said it had made rolling out DNSSEC a "strategic priority," working with ICANN and business communities in a "collaborative industry-wide effort".

The Kaminsky vulnerability made headlines in 2008 for affecting the internet Domain Name System (DNS), which changes web addresses to IP addresses.

The flaw meant that users could be sent to malicious sites even if they typed in legitimate addresses, and forced a multi-vendor effort to fix the problem.

DNSSEC adds an extra layer of cryptography, which enables organisations to digitally sign their DNS data.

"This means that name servers that support DNSSEC can cryptographically authenticate and check the integrity of that data," said Cricket Liu, vice president of architecture at Infoblox.

"That makes things like the Kaminsky vulnerability, which is a cache poisoning attack, impossible to carry out."

Liu said that, up until recently, it had been difficult to put DNSSEC into place as it was "complex".

"Tools that you would use to digitally sign the DNS data have been fairly rudimentary," he said.

According to Infoblox's annual DNS survey, released on the same day as Verisign's announcement, the number of DNSSEC signed zones had increased by approximately 300 per cent.

Liu said: "In terms of the percentage it is pretty impressive, but in terms of the absolute zones that have been signed, it is pretty small."

"We'd really like to see the adoption continue to increase," he added.

Featured Resources

The complete guide to changing your phone system provider

Optimise your phone system for better business results

Download now

Simplify cluster security at scale

Centralised secrets management across hybrid, multi-cloud environments

Download now

The endpoint as a key element of your security infrastructure

Threats to endpoints in a world of remote working

Download now

2021 state of IT asset management report

The role of IT asset management for maximising technology investments

Download now

Recommended

Ryuk behind a third of all ransomware attacks in 2020
Security

Ryuk behind a third of all ransomware attacks in 2020

29 Oct 2020
REvil hacking group says it has made more than $100m in a year
Security

REvil hacking group says it has made more than $100m in a year

29 Oct 2020
36 billion personal records exposed by hacks in 2020 so far
Security

36 billion personal records exposed by hacks in 2020 so far

29 Oct 2020
Trump website defaced in second successive cyber breach
Security

Trump website defaced in second successive cyber breach

28 Oct 2020

Most Popular

Do smart devices make us less intelligent?
artificial intelligence (AI)

Do smart devices make us less intelligent?

19 Oct 2020
Politicians need to stop talking about technology
Policy & legislation

Politicians need to stop talking about technology

21 Oct 2020
Best MDM solutions 2020
mobile device management (MDM)

Best MDM solutions 2020

21 Oct 2020