secure DNS hosting?

secure DNS hosting?

Ori Berger linux-il at orib.net
Thu Jan 28 16:38:38 IST 2010


Amos Shapira wrote:
> What are you refering to by "server certificates, client certificates,
> RSA tokens etc"? Are you talking about DNS-SEC or just general web
> server security practices?
>   
General web server security practices; A server certificate tells the 
client that this server has been trusted by a known certificate 
authority to serve a specific domain. That's not perfect, as hackers 
have already demonstrated being able to get certificates for domains 
they do not own, and a specific certificate signing bug (since patched) 
allowed certificates for specially crafted domain names to pass as 
certificates for other domains.

It does, however, make life harder for the hacker and works well against 
simple "man-in-the-middle" attack.

A client certificate proves to your server that the client posses a 
certificate, without sending it online. This provides some defense 
against a man-in-the-middle attack or keyboard logging/password sniffing 
-- but of course, not helpful if the client machine was compromised and 
rooted.

RSA tokens (I'm sure there are other manufacturers) are small devices, 
usually credit card sized, that display a password that keeps changing 
every minute. Identity is verified by the client having access to the up 
to date password at log-in times and when performing sensitive actions.

> I'm at the "reading the brochure" stage and google'ing a bit about
> them but one of the points I think I got through is that they have
> their own servers and cooperation with major ISP's in many places
> around the world in order to reduce the exposure to external DNS
> vulnerabilities.
>   
That sounds like good practice. Make sure that this is true regarding 
where your clients are located; e.g. they might have wonderful 
infrastructure in the US but not in Australia, or vice versa.



More information about the Linux-il mailing list