Can you clarify what fixes are being implemented to the DNS system (via DNSSEC) to make it more secure? Do enterprises
need to take any action in turn or will these DNS security improvements be transparent?
Attackers sometimes attempt to manipulate DNS records through cache-poisoning attacks that insert malicious false DNS records into a server. Attackers hope these records will be distributed to client machines, which will then unknowingly guide users to malicious webpages.
Until recently, there was little that could be done on the client side to defend against this type of attack. But the release of the DNS Security Extensions (DNSSEC) changes that, allowing for the application of digital signature technology to DNS records, and providing the end user with assurance that the record is authentic.
The idea to secure DNS has been around for over a decade, but it took time to work out the details, and adoption has been quite slow. Over the past year, the idea picked up some steam, especially after the publicity surrounding the DNS vulnerabilities that Dan Kaminsky announced at 2010 Black Hat Briefings conference. Major network and hosting providers such as Comcast and GoDaddy have joined the federal government in deploying DNSSEC.
If you want to get started with a DNSSEC implementation in your enterprise, there are two things you’ll need to consider: modifying your endpoints to recognize DNSSEC records and modifying your own DNS entries to support DNSSEC lookups.
On the client side, Microsoft Windows 7 includes built-in DNSSEC functionality that may be managed through Active Directory Group Policy Objects. The drill tool included in the ldns package for Linux systems provides DNSSEC lookup and troubleshooting functionality as well. There are also a number of end -user tools that support the addition of DNSSEC validation to popular applications such as Firefox, Thunderbird and SSH.
You also may wish to add DNSSEC validation support to your own DNS entries. If you’re using a DNS hosting provider, check with them to determine whether they support DNSSEC records. Otherwise, if you’re hosting your own DNS records, there are several DNSSEC tutorial resources you can consult. Read the Microsoft DNSSEC Deployment Guide for Windows Server 2008 R2 or the DNSSEC section of the BIND 9 Administrator’s Guide.
Dig deeper on Information Security Incident Response
Related Q&A from Mike Chapple, Enterprise Compliance
Should companies obtain U.S. security clearance to join the Enhanced Cybersecurity Services program? Mike Chapple offers his perspective.continue reading
Does a Web application security assessment termed 'compliance ready' seem too good to be true? Learn its role in an enterprise compliance program.continue reading
Learn how hiring the right PCI DSS-compliant service providers, especially payment services providers, can reduce your compliance burden.continue reading
Have a question for an expert?
Please add a title for your question
Get answers from a TechTarget expert on whatever's puzzling you.