Want to read Slashdot from your mobile device? Point it at m.slashdot.org and keep reading!

 



Forgot your password?
typodupeerror
×

Comment Re:DNSSuCk? (Score 1) 134

1. Have you looked at BIND's implementation of DNSSEC? It's thousands of lines of code alone.
2. See #1.
3. RFC4033: DNSSEC (deliberately) doesn't provide confidentiality; RFC 4033: DNSSEC does not protect against denial of service attacks.
4. The bind people claim that BIND9 was written by "a whole new set of people" but at least thirteen of the developers have been identified to work on both.
5. I'm leaving this one alone.
6. CA certificates were planned for an earlier incarnation of DNSSEC
7. I don't think this requires clarification, but this pdf indicates that the IETF started DNSSEC in 1993.

Do you actually check? Or do you just call people trolls who you don't agree with?

Comment Re:Stupid, stupid, stupid! (Score 2, Insightful) 134

Actually, there are a lot more than two major holdups:

  1. DNSSEC is slow. It makes your nameservers vulnerable to denial-of-service attacks
  2. DNSSEC is incompatible with many firewalls; publishing DNSSEC will make you invisible to some sites
  3. DNSSEC is very complicated. It's very hard for nameservers that aren't based on BIND to implement it. I should point out that the nameservers that aren't based on BIND have actually been practically immune to the recent DNS attacks...
  4. DNSSEC requires administrators change their behavior significantly. This means retraining and reimplementation of many processes
  5. DNSSEC requires cooperation from all the parents, not just the roots.
  6. DNSSEC requires that clients reject unsigned data

The list goes on. There is another way, but because the BIND company controls a root server and has voting powers, and "because we've already invested so much in DNSSEC", it's unlikely the deadlock will be broken: DNSSEC will continue to suck so badly that nobody will want to use it, and other systems will be blacklisted because they're not DNSSEC.

Comment Re:So what powers does the IETF have on this? (Score 1) 134

Hesitant? Hesitant!?

Look, this isn't a bunch of ninnies holding back progress. DNSSEC is a replacement for DNS. It always has been, and for some god awful reason it's taken its architects over a decade to get nowhere. Deploying DNSSEC gains you nothing and costs you a lot: You have install costs, heavier hardware, changes to your internal infrastructure- those are the obvious ones-then you've also got the fact that the DNSSEC tokens will get your DNS packets stripped by some firewalls which means you disappear from the Internet- and this is my favorite, DNSSEC actually reduces security by making it easier to launch denial of service attacks on you.

Meanwhile, competing systems are rebuffed as "we've already invested all this time into DNSSEC".

Comment Re:So what powers does the IETF have on this? (Score 2, Interesting) 134

If so, inventing some other more secure upgrade to DNS really is a waste of time (unless it's somehow easier to adopt than DNSSEC).

Like for example, dnscurve, which requires very little effort to set up, is actually backwards compatible with DNS, protects against some denial of service attacks (instead of creating them), and oh yeah doesn't require the cooperation of the parent zone.

DNSSEC is a joke. A bad bad joke. Replacing DNS with something not-DNS isn't any better an idea than replacing the Internet with something not-Internet. It's 2008 and there are still sites without MX records. You simply cannot "replace" all of the Internets all at once. It just doesn't work. Someone needs to take away the ISC's talking privileges until they stop fucking things up.

Image

Ender in Exile 507

stoolpigeon writes "Orson Scott Card's work Ender's Game began as a novelette, which he says he wrote as a means of leading up to the full story he had developed, Speaker for the Dead. Ender's Game was published as a full novel in 1985, and won the Hugo and Nebula awards (as did Speaker for the Dead in '86 and '87). I think it is safe to say that Ender's Game is ensconced in its position as a science fiction classic. Now, 23 years later, Card has finished the first direct sequel to Ender's Game in his new novel Ender in Exile." Keep reading for the rest of JR's review.

Comment Re:Hm, that and DNSsec sucks ass (Score 1) 101

DNSSec protects against a kind of attack that doesn't exist and never happens, by making attacks that do happen (like denial-of-service) easier to mount.

DNSCurve, a younger, competing protocol protects against most of the attacks DNSSec is designed to, and even protects against some denial-of-service attacks.

However, the other part of your question, about is SSL sufficient, the answer is no . It demonstrates nicely why a security extension needs to be one we can roll out quickly so that we can start blocking invalid requests, instead of just complaining about them.

DNSSec provides no benefit until some magic date in the future where we stop using DNS and start using DNSSec. Meanwhile, DNSCurve provides some benefit as soon as the root servers offer it.

Comment Re:Law is only way (Score 1) 101

As an ISP, I'd happily implement a secure DNS protocol if there were one - right now the closest thing is DNSCurve, but it seems that the asshats that created the problem- are prone to continue promoting a "solution" that requires more powerful hardware, puts servers and clients at a greater risk for denial-of-service attacks, and frankly doesn't work.

DNSCurve seems very attractive, but would require cooperation from the root servers- some of which have a vested interest in promoting the unworkable and broken-by-design DNSSec protocols.

Meanwhile, DNSSec, in addition to requiring cooperation from the root servers, also requires that every firewall; every dns client and server, and every dns-inspecting or dns-aware device get rewritten- or potentially rewritten because DNSSec is incompatible with DNS.

The people dragging their heels here are the BIND group. They want to promote a buggy and broken solution just like they always do simply because it's their solution.

Networking

Submission + - Dan Bernstein's take on DNS security (jelovic.com)

djelovic writes: "Dan Bernstein has published his take on a good way to implement DNS security through cryptography.

A similar approach has been taken with PNRP. DJB's genius here is that he provides a fairly simple migration plan that doesn't require huge changes to the series of tubes."

Security

Submission + - DNSCurve: A realistic solution to DNS (dnscurve.org)

mrsbrisby writes: "The DNSCurve project uses high-speed high-security elliptic-curve cryptography to drastically improve every dimension of DNS security. Unlike DNSSEC, it was designed to actually be deployed on top of the existing mess that the Bind company created, in addition to actually supporting confidentiality and reducing denial-of-service potentials instead of decreasing confidentiality and slowing down your servers and clients.

Additionally, the PDF slides describe an implementation that is easy to deploy and administer.

The announcement on the DJBDNS mailing list doesn't make it clear if it was designed in response to the recent exploits affecting other nameservers."

Microsoft

158 Pages of Microsoft's Dirty Laundry 296

KrispyRasher writes "Even internally, Microsoft couldn't agree on what the base requirements to run Vista were, but that didn't stop it from inaccurately promoting the OS as running on some hardware. 158 pages of Microsoft internal emails reveal scandalous truths about the squabbles that took place in the lead up to Vista's launch."
Microsoft

Microsoft Launches IT Superhero Comic 285

willdavid writes "Paul McDougall reports in InformationWeek on Microsoft's new online comic. The Heroes Happen Here comic strips are being created by Jordan Gorfinkel, a former DC Comics editor who helped revitalize the Batman series. 'Tech workers who in the middle of the night fix a downed server or take on a computer virus don't really have extraordinary powers. It just seems that way. But a new comic book has debuted in which IT pros literally are superheroes. The daily Web comic, called Heroes Happen Here, features tech savvy crime fighters like Lord Firewall, who "stands between chaos and order" and says things like "begone vermin!"'" And because it's never easy, in order to read the archives of the comic you're going to need to install Microsoft's Silverlight.

Thinkpad X300 Specs Leaked 372

Kyokushi writes "Gizmodo reports that some specifications of a new ultralight Lenovo X300 have been leaked. 'It appears that Lenovo have themselves a new ultralight X300 series Thinkpad — and outside of the price and release date, we have all of the specs that you need to know. At a glance, some of the major features include: a 13.3-inch LED backlit 1440X900 screen, an ultralight 2.5 pound form factor, and Intel Merom Santa Rosa Dual Core CPU (2.0 Ghz / 880 Mhz ), a 64 GB SSD, up to 4GB of DDR2 PC2-5300 memory, and 4 hours of battery life.' If this is true, then Lenovo looks to have some heavy competition for the Macbook Air." Update: 01/20 22:55 GMT by S : Corrected Gizmondo->Gizmodo.
Transportation

$500,000 Prize for Faster Airport Security Checks 517

coondoggie writes "A security company is willing to fork over $500,000 in prize money to the person or company that comes up with an innovative technology to speed airport security lines. The company making the offer, Clear, says the winning technology must meet a number of criteria including TSA approval and it must reduce inconvenience by, for example, allowing for no divesting of shoes or outer garments."

Slashdot Top Deals

"There is such a fine line between genius and stupidity." - David St. Hubbins, "Spinal Tap"

Working...