"If you had this key ... You would be in the position to redirect a tremendous amount of traffic"--- almost as much as Google.
On Wednesday, September 21, 2016 at 6:17:51 AM UTC-5, Travis wrote: > > > > > > > > > > http://motherboard.vice.com/read/the-encryption-key-that-secures-the-web-is-being-changed-for-the-first-time?utm_source=Sailthru&utm_medium=email&utm_campaign=Military%20EBB%209-20-16&utm_term=Editorial%20-%20Military%20-%20Early%20Bird%20Brief > > > The Cryptographic Key That Secures the Web Is Being Changed for the First > TimeWritten by Joseph Cox <http://motherboard.vice.com/author/JosephCox> > > September 19, 2016 // 07:10 AM EST > > Copy This URL > > Soon, one of the most important cryptographic key pairs on the internet > will be changed for the first time. > > The Internet Corporation for Assigned Names and Numbers (ICANN), the > US-based non-profit responsible for various internet infrastructure tasks, > will change the key pair that creates the first link in a long chain of > cryptographic trust that lies underneath the Domain Name System, or DNS, > the "phone book" of the internet > <https://dyn.com/blog/dns-why-its-important-how-it-works/>. > > This key ensures that when web users try to visit a website, they get sent > to the correct address. Without it, many internet users could be directed > to imposter sites crafted by hackers, such as phishing websites designed to > steal information. > > “ICANN wants to be very transparent in the operation of this key because > it's important that the community trusts it,” Matt Larson, vice president > of research at ICANN <https://www.icann.org/profiles/matt-larson>, told > Motherboard in a phone call. > > DNS translates easy-to-remember domain names—such as Google.com—into their > numerical IP addresses, so computers can visit them. But DNS was never > built with security in mind. “The domain name system was designed when the > internet was a friendlier place, and there wasn't much thought of security > put into it,” Larson said. > > As a result, a particular problem has been something called DNS cache > poisoning or DNS spoofing, where a server doing the phone book-like lookups > is forced to return an incorrect IP address, resulting in traffic being > diverted somewhere else, such as a malicious site controlled by a hacker. > > To deal with this problem, many domains use DNS Security Extensions > (DNSSEC). With DNSSEC, crypto keys authenticate that DNS data is coming > from the correct place. If something dodgy has happened along the way and > the signatures don't line up, your browser will just return an error > instead of being sent to the wrong website. DNSSEC doesn't encrypt data on > the site—that's a job for protocols such as SSL or TLS—but lets you know > whether the site you're trying to visit is legitimate. > > In 2010, ICANN, along with other organisations, introduced DNSSEC > <https://www.icann.org/news/blog/changing-the-keys-to-the-domain-name-system-dns-root-zone> > > to protect the internet’s top DNS layer, the DNS root zone. > > A hierarchy of keys governs the process of DNSSEC authentication, with > different bodies responsible for each stage of the system. The top-level > root zone, managed by ICANN, is followed by the operators of different top > level domains such as .com, and then those managing individual domains, > such as MyWebsite.com. > "If you had this key ... You would be in the position to redirect a > tremendous amount of traffic" > > Each organisation in this structure has its own keys for making > signatures, and must sign the key of the entity below it. So for > MyWebsite.com, .com will sign MyWebsite.com's key, and the root will sign > .com's key. When visiting a website, this information is checked almost > instantaneously, before your computer loads up the correct site. Not > everyone uses DNSSEC, but adoption has increased over the years: Comcast > turned > it on > <http://corporate.comcast.com/comcast-voices/comcast-completes-dnssec-deployment> > > for its customers in 2012, and in 2013, Google’s own DNS service started > to fully support DNSSEC > <https://developers.google.com/speed/public-dns/docs/security#dnssec>. > > The key pair at the top of this chain, or the Root Zone Signing Key, is > what ICANN is changing for the first time. > > “If you had this key, and were able to, for example, generate your own > version of the root zone, you would be in the position to redirect a > tremendous amount of traffic,” Larson said. > > “We want to roll the key because it's good cryptographic hygiene,” he > added. > > In the same way that it might be a good idea to change your password in > case it was swept up in a data breach, changing keys every so often is a > standard security practice. > > “There is a logical possibility that somebody has cracked it and we don’t > know,” Andrew Sullivan, chair of the Internet Architecture Board > <https://www.iab.org/>, a group that oversees organisations involved in > the evolution of the internet, told Motherboard in a phone call. He > stressed, however, that there is no reason to believe the key has been > compromised. > > Indeed, ICANN incorporates some extraordinary security measures > <https://www.theguardian.com/technology/2014/feb/28/seven-people-keys-worldwide-internet-security-web>, > > and considers its potential threats as everything up to nation states. For > its quarterly ceremonies, so-called “crypto officers” from all over the > world congregate in one of the key management facilities, after passing > layers of physical and digital security. > > Another reason for the key switch is that it is going to increase in size, > from 1024 bits up to 2048. As time goes on, and computing power increases, > the chance of someone cracking the key, although still low, increases. > > “It's important to get a larger key for the root, and I don't want to see > anything delay that,” Dan Kaminsky, a renowned security researcher who > carried out much of the early work > <http://www.circleid.com/posts/87143_dns_not_a_guessing_game/> into DNS > security, told Motherboard in an email. > > ICANN wants to make the change during a period of calm, rather than having > to act quickly if the key was compromised. > > “We want to do this process when things are normal; when there's not any > kind of emergency,” Larson said. This way, if an actor does manage to get > the key somehow later, at least ICANN will have a better idea of how the > process works. > > *Read More: *Ted Cruz Is Trying to Sabotage the Internet's Governance > Transition > <http://motherboard.vice.com/read/internet-takeover-ted-cruz-icann> > > This October <https://www.iana.org/dnssec/ceremonies>, in one hyper-secure > <https://www.theguardian.com/technology/2014/feb/28/seven-people-keys-worldwide-internet-security-web> > > key management facility on the US east coast, ICANN will generate a new > cryptographic key pair. One half of that pair is private, and will be kept > by ICANN; the other is public. Internet service providers, hardware > manufacturers, and Linux developers need the public key part for their > software to connect to sites properly. > > In the first quarter of 2017, two employees will then take a copy of the > encrypted key files on a smartcard over to another facility on the west > coast, using regular commercial transport. Eventually, the public part of > the key pair will be distributed to other organisations. > > In all, the whole switchover will take around two years from start to > finish. Larson said that the new key will appear in the DNS for first time > on July 11, 2017. In October 2017, the new key will be used > <https://www.icann.org/en/system/files/files/ksk-rollover-at-a-glance-22jul16-en.pdf> > > for making signatures. > > Getting the word out in time is one of the main concerns. Although many > larger organisations will have already been monitoring the looming key > change for some time, Sullivan said there’s a chance that a piece of > hardware left on a shelf between now and the key change, such as a router > or firewall appliance, may miss the switchover and require a manual update. > > Talking to media is one way of spreading the message, but being very > public about the key change also serves another purpose that is very much > fundamental to the internet’s infrastructure generally: trust. > > “Because the internet is a network of networks and it's all voluntary, > people have to *believe *they are getting some value out of this, > otherwise they just won't use it,” Sullivan said. > > DNSSEC and other forms of authentication may seem like totally > technological solutions. But at bottom, they are also systems resting on > the fragility of human belief. > > Ultimately, no one can know with absolute certainty whether the ICANN key > has been compromised or not. > > “Trust is an ephemeral thing,” said Larson from ICANN. > > *Correction: **The Root Zone Signing Key was originally described as an > "encryption key." It is a cryptographic key pair, but not an encryption > key. The headline of this story has been amended; we regret the error.* > > > > > ------------------------------ > [image: Avast logo] <https://www.avast.com/antivirus> > > This email has been checked for viruses by Avast antivirus software. > www.avast.com <https://www.avast.com/antivirus> > > > > __._,_.___ > ------------------------------ > Posted by: "Beowulf" <beo...@westerndefense.net <javascript:>> > ------------------------------ > > > Visit Your Group > <https://groups.yahoo.com/neo/groups/grendelreport/info;_ylc=X3oDMTJmZW9zcjRqBF9TAzk3MzU5NzE0BGdycElkAzIwMTk0ODA2BGdycHNwSWQDMTcwNTMyMzY2NwRzZWMDdnRsBHNsawN2Z2hwBHN0aW1lAzE0NzQ0MTA1NzQ-> > > > > [image: Yahoo! Groups] > <https://groups.yahoo.com/neo;_ylc=X3oDMTJlcXU4cWk0BF9TAzk3NDc2NTkwBGdycElkAzIwMTk0ODA2BGdycHNwSWQDMTcwNTMyMzY2NwRzZWMDZnRyBHNsawNnZnAEc3RpbWUDMTQ3NDQxMDU3NQ--> > > • Privacy <https://info.yahoo.com/privacy/us/yahoo/groups/details.html> • > Unsubscribe <javascript:> • Terms of Use > <https://info.yahoo.com/legal/us/yahoo/utos/terms/> > > __,_._,___ > > > -- -- Thanks for being part of "PoliticalForum" at Google Groups. For options & help see http://groups.google.com/group/PoliticalForum * Visit our other community at http://www.PoliticalForum.com/ * It's active and moderated. Register and vote in our polls. * Read the latest breaking news, and more. --- You received this message because you are subscribed to the Google Groups "PoliticalForum" group. To unsubscribe from this group and stop receiving emails from it, send an email to politicalforum+unsubscr...@googlegroups.com. For more options, visit https://groups.google.com/d/optout.