TE
TechEcho
Home24h TopNewestBestAskShowJobs
GitHubTwitter
Home

TechEcho

A tech news platform built with Next.js, providing global tech news and discussions.

GitHubTwitter

Home

HomeNewestBestAskShowJobs

Resources

HackerNews APIOriginal HackerNewsNext.js

© 2025 TechEcho. All rights reserved.

Seven People Who Hold the Keys to Worldwide Internet Security

85 pointsby hornokpleaseabout 11 years ago

15 comments

tptacekabout 11 years ago
Skimming this article, I couldn&#x27;t tell if it was about DNSSEC or not. But if these are DNSSEC keys, you can safely ignore this story; DNSSEC is a sideshow. It&#x27;s hopefully never going to see widespread deployment, and regardless of whether it does, it isn&#x27;t going to make a difference for your security.<p>I&#x27;ve written a bunch about DNSSEC on HN (and elsewhere) and won&#x27;t preemptively repeat myself. You might consider just taking my word for this.
评论 #7320180 未加载
评论 #7321397 未加载
评论 #7319765 未加载
评论 #7319995 未加载
nlyabout 11 years ago
How did this article manage to not use the byte sequence &#x27;DNSSEC&#x27; or mention the fact that it&#x27;s only deployed on a tiny % of domains under TLDs that support it?<p>Reports like this just add to public misconception.
评论 #7319062 未加载
daviduabout 11 years ago
This is really one of the worst kinds of stories. It&#x27;s just not true, and not only is it not true, it purports to cover DNSSEC as a technology that people RELY or NEED, when in fact, DNSSEC adoption never gained traction, and actually decreases every single day.<p>Someone spun some crazy PR for this one.
评论 #7320582 未加载
EGregabout 11 years ago
Ok, centralization leads to silly things like this.<p>Namecoin is but one of many ways to decentralize DNS while even while having one centralized registry.
gwu78about 11 years ago
&quot;We peaked at 12.&quot;<p>Peaked. And that probably includes the sysadmin who was required to watch it.<p>Where are the articles on the new ridiculous TLD&#x27;s?<p>A while back the IP address for the FTP copy of the root.zone changed.<p>And sure enough, the file is now full of crap like .buzz, .house and .kitchen<p>I cannot even read through the whole zone anymore. It&#x27;s too long.<p>There are some gems in there though. And some fool paid $185,000+ for each one.<p>I have been running my own root for years and this is why.<p>Snip, snip. No more .buzz<p>Very easy to set up up your own custom root and to filter out the crap TLD&#x27;s. But, like with the ceremony in this article, some folks think that ICANN has some sort of &quot;authority&quot; on how people use domain names.<p>Whole .com zone (=public information) fits on a USB stick.<p>And the HOSTS file remains as a failsafe, if you have to use someone else&#x27;s resolver.<p>And most of the entries in the com.zone are garbage anyway: parked names with ads.<p>Imagine how many different domains the average user will visit in their lifetime. It is but a small fraction of all the names registered.<p>But let&#x27;s pretend ICANN is relevant.<p>God help us if ICANN should cease to exist.
评论 #7323287 未加载
smutticusabout 11 years ago
It&#x27;s ICANN, not Icann. This article is overly sensational.
评论 #7320814 未加载
Diederichabout 11 years ago
I&#x27;m not a security expert, just an interested amateur.<p>Can someone explain how this step doesn&#x27;t invalidate all of the hours of ceremony and procedure?<p>&quot;Later Okubo will transmit the key on a secure channel to Verisign and this signed key will be made live across the internet.&quot;
评论 #7319335 未加载
评论 #7320428 未加载
jedbergabout 11 years ago
Doesn&#x27;t revealing the identities of the key holders somewhat compromise the system? Ot at least make it more vulnerable?
higherpurposeabout 11 years ago
I wish this story didn&#x27;t read like a novel, and actually gave me the meat of the information more quickly. I feel like the way the author told the story diluted the importance of it.
评论 #7322344 未加载
acdabout 11 years ago
Internet security is pwned by organisations powerful enough to hack into CAs or simply buy one and run them as a covert operation impersonating any site they want by issuing certificates trusted by all web browsers. Internet security broken by design of centralization.<p>Thus if you have IP A you will get fake certificate generated by government owned CA, if you have IP B you will get to the real site. If you are IP A you will get pwned by MITM attack malware the site will look genuine to the browser.
评论 #7320977 未加载
basculeabout 11 years ago
In addition to everything else that&#x27;s wrong with DNSSEC, using Shamir to share a digital signature key is a silly idea. Multisignature trust systems &#x2F; threshold signatures provide the same functionality, but without having a single secret that has to live on one computer at a single time. While I know they did their due diligence to prevent the leak of the DNSSEC root key, it&#x27;s a problem they could&#x27;ve easily avoided by using an incredibly boring design rather than a more &quot;clever&quot; one like Shamir. As things stand, there is actually one key that could completely destroy DNSSEC and require the thing be bootstrapped again from scratch.
IceyECabout 11 years ago
&quot;Once activated by the smartcards, this will produce a lengthy cryptographic code. If dropped, or even knocked too hard, the machine will self-destruct.&quot;
gphabout 11 years ago
The first few paragraphs really overdramatize it. It makes it sound like the internet would completely cease to exist if something happened to the root DNS servers. It was so cheesy I just couldn&#x27;t read anymore after that.
DavidWanjiruabout 11 years ago
Oh, like scylla in &quot;Prison Break?
bitJerichoabout 11 years ago
Reminds me of <a href="http://www.youtube.com/watch?v=iDbyYGrswtg" rel="nofollow">http:&#x2F;&#x2F;www.youtube.com&#x2F;watch?v=iDbyYGrswtg</a>