|
Where is the domain industry with the adoption of DNSSEC? After a burst of well publicized activity from 2009-2011—.org, .com, .net, and .gov adopting DNSSEC, roots signed, other Top-Level Domains (TLDs) signed—the pace of adoption appears to have slowed in recent years.
As many CircleID readers know, DNSSEC requires multiple steps in the chain of trust to be in place to improve online security. Those are:
Of course, for DNSSEC to be useful, both the server side and validation on the client side must support signed domains. Client-side validation is moving in a positive direction. In late 2013, APNIC Labs produced research that demonstrated that roughly 8 percent of global DNS queries involved some kind of DNSSEC validation. Last month APNIC unveiled a global validation graph that showed DNSSEC validations increasing to 12 percent.
In the United States Comcast (the country’s largest ISP) has adopted client-side validation. Some countries like Sweden and Estonia see a majority of queries using DNSSEC validation. DNSSEC technology standards have been stable and mature since 2007, with only updates, clarifications, and new functionality added since then. “Waiting until the standards are final” is no longer a valid reason to delay deployment.
Authoritative DNS is very mature, and it’s easy to get access to DNSSEC information once it is deployed. DNSSEC has been included in every major name server implementation for a few years now. Second level domains can now be signed, but adoption at that level has been frustratingly slow, due to the lack of service provider support (see point 2 above).
The final step in the deployment of DNSSEC is the use of validated information by services and applications to provide enhanced and innovative security services to users, with browsers obviously being first in line. Businesses need to see better online security as a market advantage—especially financial services firms.
More signed domains are needed to demonstrate full viability, and that’s currently a huge gap in the DNSSEC chain of trust. New TLDs will help to some degree, but more needs to be done. There are two obstacles standing in the way of more secure domains, one related to policy and one technical.
On the policy side, the new ICANN policy for gTLDs mandates signed TLD zones, but not signed second level delegation. In addition, the 2013 Registrar Accreditation Agreement (RAA) requires registrars to offer “DNSSEC services,” but only for those registries that require it.
On the technical side, it is not possible for a gTLD domain name registration with active DNSSEC to be transferred from one registrar to another without breaking the security chain of trust.
Part Two of this series will address impediments to greater DNSSEC adoption.
Sponsored byCSC
Sponsored byDNIB.com
Sponsored byIPv4.Global
Sponsored byVerisign
Sponsored byVerisign
Sponsored byRadix
Sponsored byWhoisXML API
for i in {google,facebook,youtube,yahoo,baidu,twitter,amazon,qq,linkedin}.com wikipedia.org ; do echo $i; dig $i ds +short; done
When *none* of the top 10 (according to Alexa) have bothered to sign their domains, my clients ask “why should I bother?”.
Is there *any* major US bank that signs their primary domain?
Yes, Comcast and Google and many others have validating resolvers, but if no one of consequence signs their domains, it won’t matter in the long run.
I don't know about "any" major US Bank, but I checked the top 20 from http://www.ffiec.gov/nicpubweb/nicweb/top50form.aspx and didn't find any.