Kaminsky flaw fixed for .com and .net by 2011
Verisign anticipates an industry-wide effort to finally rid the net of the Kaminsky flaw.
So claims internet infrastructure company Verisign, which said it had made rolling out DNSSEC a "strategic priority," working with ICANN and business communities in a "collaborative industry-wide effort".
The Kaminsky vulnerability made headlines in 2008 for affecting the internet Domain Name System (DNS), which changes web addresses to IP addresses.
The flaw meant that users could be sent to malicious sites even if they typed in legitimate addresses, and forced a multi-vendor effort to fix the problem.
DNSSEC adds an extra layer of cryptography, which enables organisations to digitally sign their DNS data.
"This means that name servers that support DNSSEC can cryptographically authenticate and check the integrity of that data," said Cricket Liu, vice president of architecture at Infoblox.
"That makes things like the Kaminsky vulnerability, which is a cache poisoning attack, impossible to carry out."
Liu said that, up until recently, it had been difficult to put DNSSEC into place as it was "complex".
"Tools that you would use to digitally sign the DNS data have been fairly rudimentary," he said.
According to Infoblox's annual DNS survey, released on the same day as Verisign's announcement, the number of DNSSEC signed zones had increased by approximately 300 per cent.
Liu said: "In terms of the percentage it is pretty impressive, but in terms of the absolute zones that have been signed, it is pretty small."
"We'd really like to see the adoption continue to increase," he added.
How to choose an AI vendor
Five key things to look for in an AI vendorDownload now
The UK 2020 Databerg report
Cloud adoption trends in the UK and recommendations for cloud migrationDownload now
2021 state of email security report: Ransomware on the rise
Securing the enterprise in the COVID worldDownload now
The impact of AWS in the UK
How AWS is powering Britain's fastest-growing companiesDownload now