Feeds

Verisign moves DNS root servers in defensive ploy

In wake of DDoS attack

  • alert
  • submit to reddit

SANS - Survey on application security programs

Key Internet Domain Name System (DNS) servers have been relocated to improve Internet security and stability in the wake of a recent, serious distributed denial of service attack.

Verisign, which manages two root DNS servers, moved one to a different locations, connected to different parts of its network earlier this week. It is the first time any of these servers, which are vital in managing the flow of traffic on the Net, have been moved since 1997.

The company said the move would help defend against further attacks by ensure normal operations if hackers or a hardware outage crippled one server.

Last month a co-ordinated attack hobbled nine of 13 root DNS servers across the globe. Seven stopped responding almost entirely and the performance of two was severely degraded during the hour-long attack on October 21.

AP reports that Verisign's servers were not among those crippled by the attack. The servers were on the same network as those attacked, so the company felt it prudent to move at least one of them.

After the October 21 attack ceased services from all 13 root DNS servers were quickly restored. Thanks to its short duration, and the way DNS lookups are organised, few users would have noticed any disruption. If the attacks had continued we would have been looking at a far more serious problem.

The FBI have been drafted in to investigate the attack. AP reports that FBI Director Robert Mueller last week told reporters that investigators had traced attack traffic back to compromised computers in South Korea and the US. ®

Related Stories

Feds investigating 'largest ever' Internet attack
Root server DoS attack slows net
DNS vulnerability 'critical'
BIND 9 upgrade behind BT DNS issues
DNS mega-hack hits thousands of sites
MS blames lowly techie for Web blackout

High performance access to file storage

More from The Register

next story
Obama allows NSA to exploit 0-days: report
If the spooks say they need it, they get it
Samsung Galaxy S5 fingerprint scanner hacked in just 4 DAYS
Sammy's newbie cooked slower than iPhone, also costs more to build
Putin tells Snowden: Russia conducts no US-style mass surveillance
Gov't is too broke for that, Russian prez says
Snowden-inspired crypto-email service Lavaboom launches
German service pays tribute to Lavabit
Mounties always get their man: Heartbleed 'hacker', 19, CUFFED
Canadian teen accused of raiding tax computers using OpenSSL bug
One year on: diplomatic fail as Chinese APT gangs get back to work
Mandiant says past 12 months shows Beijing won't call off its hackers
Call of Duty 'fragged using OpenSSL's Heartbleed exploit'
So it begins ... or maybe not, says one analyst
prev story

Whitepapers

Top three mobile application threats
Learn about three of the top mobile application security threats facing businesses today and recommendations on how to mitigate the risk.
Combat fraud and increase customer satisfaction
Based on their experience using HP ArcSight Enterprise Security Manager for IT security operations, Finansbank moved to HP ArcSight ESM for fraud management.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Five 3D headsets to be won!
We were so impressed by the Durovis Dive headset we’ve asked the company to give some away to Reg readers.
SANS - Survey on application security programs
In this whitepaper learn about the state of application security programs and practices of 488 surveyed respondents, and discover how mature and effective these programs are.