07:34 PM
Connect Directly

Comcast Internet Service Now Fully DNSSEC-Based

ISP finishes its rollout of the DNS security protocol

Comcast today became one of the first major ISPs in North America to fully run the Domain Name System Security Extensions (DNSSEC) protocol as part of its services.

Jason Livingood, vice president of Internet systems in Comcast's network and operations, today blogged that DNSSEC is now part of its Comcast Constant Guard from Xfinity service. That means that nearly 18 million residential customers of the Xfinity Internet service are using DNS servers that use DNSSEC validation. Comcast's more than 5,000 domain names are also now digitally signed by DNSSEC.

DNSSEC has been gradually rolling out across the Internet over the past year or so. Several major top-level domains, including .com, .org, .net, and .gov, are now DNSSEC-enabled. DNSSEC is a protocol for preventing attackers from redirecting users to malicious websites by redirecting them -- it basically ensures DNS entries remain unchanged in transit and are digitally signed to ensure their authenticity.

[After a sluggish start, DNSSEC is finally catching on after more than a decade in the making. See DNSSEC Finally Comes To .com, But Secure DNS Still Has A Long Way To Go .].

"Now that nearly 20 million households in the U.S. are able to use DNSSEC, we feel it is an important time to urge major domain owners, especially commerce and banking-related sites, to begin signing their domain names. While in the past those domains may have wanted to do so but felt it would have limited effect, they now can work on signing their domains knowing that the largest ISP in the U.S. can validate those signatures on behalf of our customers," Livingood said in his post.

Security expert Dan Kaminsky, who discovered a major DNS caching vulnerability in 2008 that helped expedite DNSSEC's adoption, says he's thrilled that Comcast has stepped up and implemented the protocol. "DNSSEC is the proper fix to my 2008 attack, and I am extremely proud of Comcast for taking this step to protect their users," Kaminsky says. "I am particularly happy that they correctly judged the importance of genuine responses higher than their minor income stream from injecting advertisements.

"The integrity of the DNS is of critical importance to present and future security technologies, and Comcast has done their users a service by investing in DNSSEC," he says.

Now when a Comcast subscriber visits a website, Comcast's DNS servers confirm the domain name and check that its signature is valid and legitimate. Comcast also cryptographically signs its own domain names, like xfinity.com.

Comcast traditionally has been ahead of the curve in security for ISPs. More than two years ago, it was one of the first to employ a bot-notification service that notifies customers whose machines it spots as bot-infected. It then directs the infected user to the antivirus center, where he follows directions to remove the bot malware.

Have a comment on this story? Please click "Add Your Comment" below. If you'd like to contact Dark Reading's editors directly, send us a message.

Kelly Jackson Higgins is Senior Editor at DarkReading.com. She is an award-winning veteran technology and business journalist with more than two decades of experience in reporting and editing for various publications, including Network Computing, Secure Enterprise Magazine, ... View Full Bio

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Flash Poll
Current Issue
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
Published: 2014-07-11
Dahua DVR 2.608.0000.0 and 2.608.GV00.0 allows remote attackers to bypass authentication and obtain sensitive information including user credentials, change user passwords, clear log files, and perform other actions via a request to TCP port 37777.

Published: 2014-07-11
Cumin (aka MRG Management Console), as used in Red Hat Enterprise MRG 2.5, does not include the HTTPOnly flag in a Set-Cookie header for the session cookie, which makes it easier for remote attackers to obtain potentially sensitive information via script access to this cookie.

Published: 2014-07-11
The REST API in the ovirt-engine in oVirt, as used in Red Hat Enterprise Virtualization (rhevm) 3.4, allows remote authenticated users to read arbitrary files and have other unspecified impact via unknown vectors, related to an XML External Entity (XXE) issue.

Published: 2014-07-11
Docker 1.0.0 uses world-readable and world-writable permissions on the management socket, which allows local users to gain privileges via unspecified vectors.

Published: 2014-07-11
Apache Syncope 1.1.x before 1.1.8 uses weak random values to generate passwords, which makes it easier for remote attackers to guess the password via a brute force attack.

Best of the Web
Dark Reading Radio
Archived Dark Reading Radio
Marilyn Cohodas and her guests look at the evolving nature of the relationship between CIO and CSO.