PRO+ Premium Content/Information Security magazine

Thank you for joining!
Access your Pro+ Content below.
July/August 2009

DNSSEC deployments gain momentum since Kaminsky DNS bug

There's a certain Energizer Bunny quality to the Domain Name System. It just goes and goes and goes, usually without much maintenance. Problem is, while it's hassle-free, DNS usually isn't very secure. Last July, researcher Dan Kaminsky exposed DNS' worst-kept secret. His now famous cache-poisoning bug turned DNS--best known for translating human readable domain names into IP addresses that servers understand--into center stage of the computer security world. The little protocol that could was quickly the biggest problem on the Web. Suddenly, it was relatively easy for attackers to redirect requests to malicious websites where phishing attacks or SQL injections awaited. And aside from an ambitious patching effort, coordinated by Kaminsky, and pulled off by a gaggle of vendors including Cisco, Microsoft, the Internet Systems Consortium (ISC), and others, there was little in the way of a permanent fix. His bug not only kicked off a firestorm of publicity and new disclosure debates, but it cast a glaring light on DNS' shortcomings....

Access this PRO+ Content for Free!

By submitting your personal information, you agree that TechTarget and its partners may contact you regarding relevant content, products and special offers.

You also agree that your personal information may be transferred and processed in the United States, and that you have read and agree to the Terms of Use and the Privacy Policy.

Features in this issue

  • Unified threat management products gaining midmarket, enterprise foothold

    Unified threat management (UTM) appliances offer consolidated security services in a single, manageable firewall/VPN appliance. But purchase and use only the security options you need. Otherwise you will pay too much for the appliance and for tools that won't make your business more secure

Columns in this issue