<<<
Chronological Index
>>> <<<
Thread Index
>>>
Re: [ga] an interesting article that shows people know very little about the Internet. especially the history
- To: Joe Baptista <baptista@xxxxxxxxxxxxxx>, ga@xxxxxxxxxxxxxx, mkrigsman@xxxxxxxxxx
- Subject: Re: [ga] an interesting article that shows people know very little about the Internet. especially the history
- From: "Jeffrey A. Williams" <jwkckid1@xxxxxxxxxxxxx>
- Date: Sat, 2 Jan 2010 14:06:40 -0600 (GMT-06:00)
<HEAD>
<STYLE>body{font-family:
Geneva,Arial,Helvetica,sans-serif;font-size:10pt;font-family:arial,sans-serif;background-color:
#ffffff;color: black;}p{margin:0px}</STYLE>
<META content="MSHTML 6.00.6000.16825" name=GENERATOR></HEAD>
<BODY id=compText>
<P>Dr. Joe and all,</P>
<P> </P>
<P> I agree for the most part with everything you stated regarding this
article, Dr. Joe. I also</P>
<P>agree that DNScurve is a far better solution than DNSSEC. However,
DNSSEC can be </P>
<P>adapted to do most but not all of what DNScurve can and does do, but it is
much more</P>
<P>difficult in the doing and/or providing for and as currently being
implimented, relies to</P>
<P>heavely upon "Trusted Anchors" for some DNS resolutions as well as relies
too much </P>
<P>upon a weak crypto standard recently decided upon by NIST. Ergo if
DNSSEC implimentations</P>
<P>are not nearly good enough and well maintained over time, I again
predict that DNSSEC implimentations</P>
<P>will be obsolete in 2 years and no longer adaquately protect against cache
poisoning or for that</P>
<P>matter much of anything else.</P>
<P> </P>
<P> This all again re-stated it is clear that DNSSEC vs DNScurve was more
of a political solution</P>
<P>rather than a sound technical one. Such decision making prerogatives
that do not meet the</P>
<P>need/demand almost always have a mid to long side bad result. As such,
public exposer</P>
<P>to further IT dangers lingers but is not well percieved or recognized and
therefore sets up</P>
<P>even further future political wrangling in order to address the likely mid
term eventuality </P>
<P>accordingly. </P>
<P> </P>
<P><BR><BR><BR> </P>
<BLOCKQUOTE style="PADDING-LEFT: 5px; MARGIN-LEFT: 0px; BORDER-LEFT: #0000ff
2px solid">-----Original Message----- <BR>From: Joe Baptista
<BAPTISTA@xxxxxxxxxxxxxx><BR>Sent: Dec 31, 2009 10:21 AM <BR>To:
"ga@xxxxxxxxxxxxxx >> GA" <GA@xxxxxxxxxxxxxx><BR>Subject: [ga] an
interesting article that shows people know very little about the Internet.
especially the history <BR><BR><BR>
<DIV class=gmail_quote>The article is titled "PC Worlds Top 10 Security
Nightmares of the Decade" can be found at the following URL: <BR><BR><A
href="http://bit.ly/7nxeD4" target=_blank>http://bit.ly/7nxeD4</A><BR><BR>It's
worth a read.There is nothing spectacular about this article. But it is an
excellent example of how little experts know on the subjects they are experts
on.<BR><BR>The author restates common truths. Robert Siciliano tells us the
"last decade has seen technological breakthroughs unlike any other". This is
true. But Siciliano also reminds us our technological success has result in a
tremendous rise in fraud. I completely agree with him. The reason he argues in
his article is that the "speed of the conveniences technology" provides has
"far outpaced the security" measure in place today. Again very bang
on.<BR><BR>But this claim could be subject to some interpretation that at one
time our security outpaced or was even better then the available technology.
The historical truth is that security has alway lagged behind technology. And
much of that is due to a lack of education amongst the masses. But the simple
truth of it is that much of the insecurity in the Internet is due to a lot of
twits who run the Internet and have an interest in maintaining and controlling
the status quo.<BR><BR>Mr. Siciliano provides an excellent example of this in
his article when he discusses the DNS vulnerability alleged to have been
discovered by IOActive researcher Dan Kaminisky. Kaminisky is credited with the
identification in 2008 of a DNS vulnerability to various forms of attack
including cache poisoning.<BR><BR>This is a false allegation that the press has
repeated without any investigation of the facts. Kaminisky never discovered
anything he simply repackaged an existing well known problem as his own. Also
the DNS protocol is not vulnerable in itself nor is it a security risk. The
security problem is not in the DNS protocol but in the transport protocol used
for DNS transactions. In this case it is the UDP protocol that is vulnerable to
attack.<BR><BR>This problem has existed for at least 15 years. I remember it
existed in the 1990's when I was commissioned to investigate vulnerabilities in
military DNS servers. So the Kaminisky claim he discovered anything significant
is simply untrue. The Kaminisky affair was more a co-ordinated effort to scare
business into adopting a protocol that reverse engineers the Internet in a
effort to centralize control of the DNS protocol in the root servers operated
by the U.S. government through ICANN its contractor.<BR><BR>That protocol
DNSSEC has been actively marketed as the solution to the Kaminisky cache
poisoning problem. DNSSEC addresses the problem by inserting encryption keys
into the DNS that establish a chain of trust from domain names to the root
servers operated by the U.S. government. This places a significant amount of
control in the hands of one government authority. It also will cost business a
fortune to adopt. And Internet DNS traffic is also expected to increase
exponentially as every DNS answer must contain encryption key information.
<BR><BR>Furthermore DNSSEC does not actually fix the problem. The issue as
mentioned above is a problem with the UDP protocol and verifying that the DNS
information your system requested actually coming from the machine you
requested it from. The centralization of DNS encryption keys in the root is a
very expensive process that is simply not needed.<BR><BR>To fix the UDP problem
one only has to ensure that the answers come from the server we are
communicating with. Since UDP unlike the TCP protocol has no handshaking
capabilities one simply fixes the problem by incorporating a handshaking
protocol within UDP and DNS that confirms the server we are getting answer from
is the server we originally communicated with.<BR><BR>A solution to this
problem is available and was developed a few years ago by Dr. Bernstein at the
University of Illinois at Chicago. It's called DNSCurve and fixes the problem
through a simple key exchange between DNS servers without having to hand over
control of the DNS to a central authority.<BR><BR>regards<BR><FONT
color=#888888>joe baptista<BR></FONT></DIV><BR>Respectful
regards,<BR><BR>Jeffrey A. Williams<BR>Spokesman for INEGroup LLA. - (Over 294k
members/stakeholders and growing, strong!)<BR>"Obedience of the law is the
greatest freedom" -<BR> Abraham Lincoln<BR><BR>"Credit should go
with the performance of duty and not with what is very<BR>often the accident of
glory" - Theodore Roosevelt<BR><BR>"If the probability be called P; the injury,
L; and the burden, B; liability<BR>depends upon whether B is less than L
multiplied by<BR>P: i.e., whether B is less than PL."<BR>United States v.
Carroll Towing (159 F.2d 169 [2d Cir.
1947]<BR>===============================================================<BR>Updated
1/26/04<BR>CSO/DIR. Internet Network Eng. SR. Eng. Network data security IDNS.
div. of<BR>Information Network Eng. INEG. INC.<BR>ABA member in good
standing member ID 01257402 E-Mail jwkckid1@xxxxxxxxxxxxx<BR>Phone:
214-244-4827<BR><BR></BLOCKQUOTE></BODY>
<<<
Chronological Index
>>> <<<
Thread Index
>>>
|