http://motherboard.vice.com/read/the-encryption-key-that-sec
ures-the-web-is-being-changed-for-the-first-time?utm_source=
Sailthru&utm_medium=email&utm_campaign=Military%20EBB%209-
20-16&utm_term=Editorial%20-%20Military%20-%20Early%20Bird%20Brief


The Cryptographic Key That Secures the Web Is Being Changed for the First
TimeWritten by Joseph Cox <http://motherboard.vice.com/author/JosephCox>

September 19, 2016 // 07:10 AM EST

Copy This URL

Soon, one of the most important cryptographic key pairs on the internet
will be changed for the first time.

The Internet Corporation for Assigned Names and Numbers (ICANN), the
US-based non-profit responsible for various internet infrastructure tasks,
will change the key pair that creates the first link in a long chain of
cryptographic trust that lies underneath the Domain Name System, or DNS,
the "phone book" of the internet
<https://dyn.com/blog/dns-why-its-important-how-it-works/>.

This key ensures that when web users try to visit a website, they get sent
to the correct address. Without it, many internet users could be directed
to imposter sites crafted by hackers, such as phishing websites designed to
steal information.

“ICANN wants to be very transparent in the operation of this key because
it's important that the community trusts it,” Matt Larson, vice president
of research at ICANN <https://www.icann.org/profiles/matt-larson>, told
Motherboard in a phone call.

DNS translates easy-to-remember domain names—such as Google.com—into their
numerical IP addresses, so computers can visit them. But DNS was never
built with security in mind. “The domain name system was designed when the
internet was a friendlier place, and there wasn't much thought of security
put into it,” Larson said.

As a result, a particular problem has been something called DNS cache
poisoning or DNS spoofing, where a server doing the phone book-like lookups
is forced to return an incorrect IP address, resulting in traffic being
diverted somewhere else, such as a malicious site controlled by a hacker.

To deal with this problem, many domains use DNS Security Extensions
(DNSSEC). With DNSSEC, crypto keys authenticate that DNS data is coming
from the correct place. If something dodgy has happened along the way and
the signatures don't line up, your browser will just return an error
instead of being sent to the wrong website. DNSSEC doesn't encrypt data on
the site—that's a job for protocols such as SSL or TLS—but lets you know
whether the site you're trying to visit is legitimate.

In 2010, ICANN, along with other organisations, introduced DNSSEC
<https://www.icann.org/news/blog/changing-the-keys-to-the-domain-name-system-dns-root-zone>
to protect the internet’s top DNS layer, the DNS root zone.

A hierarchy of keys governs the process of DNSSEC authentication, with
different bodies responsible for each stage of the system. The top-level
root zone, managed by ICANN, is followed by the operators of different top
level domains such as .com, and then those managing individual domains,
such as MyWebsite.com.
"If you had this key ... You would be in the position to redirect a
tremendous amount of traffic"

Each organisation in this structure has its own keys for making signatures,
and must sign the key of the entity below it. So for MyWebsite.com, .com
will sign MyWebsite.com's key, and the root will sign .com's key. When
visiting a website, this information is checked almost instantaneously,
before your computer loads up the correct site. Not everyone uses DNSSEC,
but adoption has increased over the years: Comcast turned it on
<http://corporate.comcast.com/comcast-voices/comcast-completes-dnssec-deployment>
for its customers in 2012, and in 2013, Google’s own DNS service started to
fully support DNSSEC
<https://developers.google.com/speed/public-dns/docs/security#dnssec>.

The key pair at the top of this chain, or the Root Zone Signing Key, is
what ICANN is changing for the first time.

“If you had this key, and were able to, for example, generate your own
version of the root zone, you would be in the position to redirect a
tremendous amount of traffic,” Larson said.

“We want to roll the key because it's good cryptographic hygiene,” he
added.

In the same way that it might be a good idea to change your password in
case it was swept up in a data breach, changing keys every so often is a
standard security practice.

“There is a logical possibility that somebody has cracked it and we don’t
know,” Andrew Sullivan, chair of the Internet Architecture Board
<https://www.iab.org/>, a group that oversees organisations involved in the
evolution of the internet, told Motherboard in a phone call. He stressed,
however, that there is no reason to believe the key has been compromised.

Indeed, ICANN incorporates some extraordinary security measures
<https://www.theguardian.com/technology/2014/feb/28/seven-people-keys-worldwide-internet-security-web>,
and considers its potential threats as everything up to nation states. For
its quarterly ceremonies, so-called “crypto officers” from all over the
world congregate in one of the key management facilities, after passing
layers of physical and digital security.

Another reason for the key switch is that it is going to increase in size,
from 1024 bits up to 2048. As time goes on, and computing power increases,
the chance of someone cracking the key, although still low, increases.

“It's important to get a larger key for the root, and I don't want to see
anything delay that,” Dan Kaminsky, a renowned security researcher who
carried out much of the early work
<http://www.circleid.com/posts/87143_dns_not_a_guessing_game/> into DNS
security, told Motherboard in an email.

ICANN wants to make the change during a period of calm, rather than having
to act quickly if the key was compromised.

“We want to do this process when things are normal; when there's not any
kind of emergency,” Larson said. This way, if an actor does manage to get
the key somehow later, at least ICANN will have a better idea of how the
process works.

*Read More: *Ted Cruz Is Trying to Sabotage the Internet's Governance
Transition
<http://motherboard.vice.com/read/internet-takeover-ted-cruz-icann>

This October <https://www.iana.org/dnssec/ceremonies>, in one hyper-secure
<https://www.theguardian.com/technology/2014/feb/28/seven-people-keys-worldwide-internet-security-web>
key management facility on the US east coast, ICANN will generate a new
cryptographic key pair. One half of that pair is private, and will be kept
by ICANN; the other is public. Internet service providers, hardware
manufacturers, and Linux developers need the public key part for their
software to connect to sites properly.

In the first quarter of 2017, two employees will then take a copy of the
encrypted key files on a smartcard over to another facility on the west
coast, using regular commercial transport. Eventually, the public part of
the key pair will be distributed to other organisations.

In all, the whole switchover will take around two years from start to
finish. Larson said that the new key will appear in the DNS for first time
on July 11, 2017. In October 2017, the new key will be used
<https://www.icann.org/en/system/files/files/ksk-rollover-at-a-glance-22jul16-en.pdf>
for making signatures.

Getting the word out in time is one of the main concerns. Although many
larger organisations will have already been monitoring the looming key
change for some time, Sullivan said there’s a chance that a piece of
hardware left on a shelf between now and the key change, such as a router
or firewall appliance, may miss the switchover and require a manual update.

Talking to media is one way of spreading the message, but being very public
about the key change also serves another purpose that is very much
fundamental to the internet’s infrastructure generally: trust.

“Because the internet is a network of networks and it's all voluntary,
people have to *believe *they are getting some value out of this, otherwise
they just won't use it,” Sullivan said.

DNSSEC and other forms of authentication may seem like totally
technological solutions. But at bottom, they are also systems resting on
the fragility of human belief.

Ultimately, no one can know with absolute certainty whether the ICANN key
has been compromised or not.

“Trust is an ephemeral thing,” said Larson from ICANN.

*Correction: **The Root Zone Signing Key was originally described as an
"encryption key." It is a cryptographic key pair, but not an encryption
key. The headline of this story has been amended; we regret the error.*




------------------------------
[image: Avast logo] <https://www.avast.com/antivirus>

This email has been checked for viruses by Avast antivirus software.
www.avast.com <https://www.avast.com/antivirus>



__._,_.___
------------------------------
Posted by: "Beowulf" <beow...@westerndefense.net>
------------------------------


Visit Your Group
<https://groups.yahoo.com/neo/groups/grendelreport/info;_ylc=X3oDMTJmZW9zcjRqBF9TAzk3MzU5NzE0BGdycElkAzIwMTk0ODA2BGdycHNwSWQDMTcwNTMyMzY2NwRzZWMDdnRsBHNsawN2Z2hwBHN0aW1lAzE0NzQ0MTA1NzQ->


[image: Yahoo! Groups]
<https://groups.yahoo.com/neo;_ylc=X3oDMTJlcXU4cWk0BF9TAzk3NDc2NTkwBGdycElkAzIwMTk0ODA2BGdycHNwSWQDMTcwNTMyMzY2NwRzZWMDZnRyBHNsawNnZnAEc3RpbWUDMTQ3NDQxMDU3NQ-->
• Privacy <https://info.yahoo.com/privacy/us/yahoo/groups/details.html> •
Unsubscribe <grendelreport-unsubscr...@yahoogroups.com?subject=Unsubscribe>
• Terms of Use <https://info.yahoo.com/legal/us/yahoo/utos/terms/>

__,_._,___

-- 
-- 
Thanks for being part of "PoliticalForum" at Google Groups.
For options & help see http://groups.google.com/group/PoliticalForum

* Visit our other community at http://www.PoliticalForum.com/  
* It's active and moderated. Register and vote in our polls. 
* Read the latest breaking news, and more.

--- 
You received this message because you are subscribed to the Google Groups 
"PoliticalForum" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to politicalforum+unsubscr...@googlegroups.com.
For more options, visit https://groups.google.com/d/optout.

Reply via email to