Feeds

Reboot key Brit 'ready to save internet'

Seven keys to BIND them all

Protecting against web application threats using SSL

The Brit charged with holding one of seven digital keys necessary to re-establish a system of trust in the highly unlikely event of a collapse of the DNSSec (DNS Security Extensions) system has spoken of the practicalities of his responsibility.

Paul Kane, chief exec of CommunityDNS and chair of the DNS Infrastructure Resilience Task Force, was selected by internet governance body ICANN from among 60 candidates to serve as a "trusted community representative" from Western Europe.

Kane is one of seven recovery key share holders from around the world. In the event of a collapse of the DNSSec system five of these holders need to travel to a secure data centre location in the US to restart the process of re-signing the root zone and from there rebuilding a trusted "Yellow Pages" for IP address to website lookups.

This disaster recovery process would only happen in the event of a "fundamental catastrophic failure" which is "very unlikely", Kane told the BBC's Radio 4. The key fragment itself comes in the shape of a smartcard with a built-in chip. Kane reassured the BBC that he's never lost a credit card.

The Domain Name System marked a significant milestone earlier this month when the root zone was digitally signed for the first time as part of the roll-out of DNSSec. The next-generation internet lookup technology uses digital certificates to guard against the possibility of surfers being deceived by forged web sites or spoofed emails. Kane's role is part of a disaster recovery plan ICANN has established in the unlikely event of an attack so serious that the system of trust established by DNSSec has to re-established from scratch.

The plan includes multiple levels of security so that no single party can "control" (either switch on/off) any part of the DNSSec service. Kane and his fellow six key component holders have been described as a "Fellowship of the Ring for the internet age". Pressed on this analogy, Kane said he most identified with Gandalf, the wizard.

Instead of Mordor, the key-holders would need to travel to a secure US data centre.

A representative of CommunityDNS explained that the internet would not "stop working or collapse" even if the DNSSec system failed, contrary to mainstream reports.

"DNSSEC sits on top of 'the internet' as an additional security layer for end users to validate DNS data - ie confirm they have a connection to a legitimate operator and not a spoof," he said.

"If DNSSEC were to fail, the underlying Internet communication medium will function as normal (like today) yet the user would not be able to validate the DNS data correctly (like the internet is today!). Thus, the first step would be to undertake a key roll-over, this is already built into the system and will occur as a matter of good management at regular intervals anyway," he concluded.

Disappointingly, this means our initial picture of seven world-saving internet key holders, private aeroplanes on standby, and bodyguards is somewhat wide of the mark.

Of course, it might just be a cover story. ®

Reducing the cost and complexity of web vulnerability management

More from The Register

next story
Early result from Scots indyref vote? NAW, Jimmy - it's a SCAM
Anyone claiming to know before tomorrow is telling porkies
TOR users become FBI's No.1 hacking target after legal power grab
Be afeared, me hearties, these scoundrels be spying our signals
Jihadi terrorists DIDN'T encrypt their comms 'cos of Snowden leaks
Intel bods' analysis concludes 'no significant change' after whistle was blown
Home Depot: 56 million bank cards pwned by malware in our tills
That's about 50 per cent bigger than the Target tills mega-hack
Hackers pop Brazil newspaper to root home routers
Step One: try default passwords. Step Two: Repeat Step One until success
NORKS ban Wi-Fi and satellite internet at embassies
Crackdown on tardy diplomatic sysadmins providing accidental unfiltered internet access
UK.gov lobs another fistful of change at SME infosec nightmares
Senior Lib Dem in 'trying to be relevant' shocker. It's only taxpayers' money, after all
Critical Adobe Reader and Acrobat patches FINALLY make it out
Eight vulns healed, including XSS and DoS paths
Spies would need SUPER POWERS to tap undersea cables
Why mess with armoured 10kV cables when land-based, and legal, snoop tools are easier?
prev story

Whitepapers

Secure remote control for conventional and virtual desktops
Balancing user privacy and privileged access, in accordance with compliance frameworks and legislation. Evaluating any potential remote control choice.
WIN a very cool portable ZX Spectrum
Win a one-off portable Spectrum built by legendary hardware hacker Ben Heck
Intelligent flash storage arrays
Tegile Intelligent Storage Arrays with IntelliFlash helps IT boost storage utilization and effciency while delivering unmatched storage savings and performance.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?
Beginner's guide to SSL certificates
De-mystify the technology involved and give you the information you need to make the best decision when considering your online security options.