Linked by Thom Holwerda on Fri 21st Jun 2013 19:08 UTC
Legal "Britain's spy agency GCHQ has secretly gained access to the network of cables which carry the world's phone calls and internet traffic and has started to process vast streams of sensitive personal information which it is sharing with its American partner, the National Security Agency. The sheer scale of the agency's ambition is reflected in the titles of its two principal components: Mastering the Internet and Global Telecoms Exploitation, aimed at scooping up as much online and telephone traffic as possible. This is all being carried out without any form of public acknowledgement or debate." Woah.
Permalink for comment 565406
To read all comments associated with this story, please click here.
RE[5]: Enough already
by Alfman on Mon 24th Jun 2013 00:28 UTC in reply to "RE[4]: Enough already"
Alfman
Member since:
2011-01-28

Lennie,


"The only advantage DNS has is there are more parties involved with DNS. It is easier to choose a different branch (.com can't sign stuff from .org)."

I'm really not too familiar with DNSSEC, but my understanding is that the root zone, which operates one layer above .com or .org, is still vulnerable to the kind of adversaries that we're talking about:

https://www.icann.org/en/about/learning/factsheets/dnssec-qaa-09oct0...

In particular see section #7.

"i) ICANN, an International not-for-profit Corporation under contract from United States Department of Commerce, performs the 'IANA' function. IANA stand for Internet Assigned Numbers Authority. ICANN receives and vets information from the top level domain (TLD) operators (e.g. 'com')"

"ii) National Telecommunications and Information Administration (NTIA) - which is an office within the United States Department of Commerce - authorizes changes to the root"

"iii) VeriSign a United States based for profit company is contracted by the US Government to edit the root zone with the changed information supplied and authenticated by ICANN and authorized by the Department of Commerce and distributes the root zone file containing information on where to find info on TLDs (e.g. 'com')"


It seems extremely probable that DNSSEC is already compromised by the government. Who were also responsible for provisioning it.

Reply Parent Score: 2