SourceInternet security experts are arguing over whether a key protocol for protecting the internet's naming systems should be killed off.
DNSSEC was developed in 1994 but it wasn't taken seriously until 2008 when a bug in the domain name system's software made it possible for someone to imitate any server – from websites or email hosts – though "cache poisoning."
After a decade of DNSSEC use (and five since it was used to secure the internet's root), internet experts are now questioning whether we should bother with DNSSEC at all, especially given the difficulty and high cost of rolling it out.
In a blog post at the start of the year, Thomas Ptacek, founder of Matasano Security, laid into the protocol saying it was weak, unsafe, incomplete, unnecessary, expensive and "government controlled."
"There are better DNS security proposals circulating already," he argued. "They tend to start at the browser and work their way back to the roots. Support those proposals, and keep DNSSEC code off your servers."
Industry news items concerning VPNs, darknets, crypto, surveillance and secure computing.
1 post • Page 1 of 1