Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Infrastructure Security //

DNS

4/10/2017
08:26 PM
Curtis Franklin
Curtis Franklin
Curt Franklin
50%
50%

Infoblox Serves SDN DNS to Carriers With Trinzic Flex

Infoblox's latest appliance, Trinzic Flex, brings its traditional DNS, DHCP and more to SDN and NFV at carrier scale.

As infrastructure-as-a-service (IaaS) has risen in popularity, so has infrastructure's desirability as a target for hackers. Infoblox Trinzic Flex, released on April 6, is a scalable, carrier-class appliance that brings NFV virtualized DDI (DNS, DHCP and IP Address Management) services to carrier and ISP networks.

Trinzic Flex is intended as a transition product for carriers as they navigate a path between traditional on-premises appliances and a full SDN future. As such, Trinzic Flex is an appliance that provides network control, security and automation functions around DDI services. Scalability is a key piece of the service package within Trinzic Flex but service providers and carriers can be only so interested if they can't economically bill for the services offered. Trinzic Flex offers financial flexibility on both ends of the feature chain, allowing service providers to automate provisioning and accounting for their customers, while providing a licensing model that grows the appliance's capacity and cost as the carrier's demand increases.

According to a written statement on the release, bringing all these services together at scale has implications for network security as well. "An often-overlooked security vulnerability revolves around DNS-based exploits that bypass traditional security approaches." Those DNS exploits include the well-documented metasploit vulnerability as well as other DNS poisoning, brute-forcing and DDoS attacks.

In a telephone interview with Infoblox Senior Product Marketing Manager Matt Gowarty, security was one of several topics up for discussion. "We're trying to make sure security becomes a key component from a DNS perspective -- not as an afterthought or a bolt-on," Gowarty said, explaining that most traditional security methods don't focus on DNS.

"By having Infoblox be the authoritative source of information, the single point of truth, we're serving up DNS and see everything from a DNS perspective," he said. By providing a focus on DNS with a heavy security emphasis, DNS becomes another layer in a complete, multi-step security infrastructure.

One of the threats service providers and carriers are most concerned about is DDoS, especially when fueled by millions upon millions of IoT devices. "If you want to take down a lot of people, a carrier's network becomes a big target for a DDoS attack," Gowarty said, explaining, "What we've done with security for the enterprise becomes even more critical for the carriers just because of the scale and size of their network, the breadth and scope."

Trinzic Flex is available now. According to Infoblox, there are currently more than 200 service provider customers for Infoblox DNS, DHCP and IP address appliances. Gowarty said that Trinzic Flex aims to, "...let them leverage the majority of the Infoblox DNS security components that we're known for on a very highly virtualized platform that allows carriers to scale and upgrade very easily to [SDN and NFV] deployments."

— Curtis Franklin, Security Editor, Light Reading

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
COVID-19: Latest Security News & Commentary
Dark Reading Staff 11/19/2020
New Proposed DNS Security Features Released
Kelly Jackson Higgins, Executive Editor at Dark Reading,  11/19/2020
How to Identify Cobalt Strike on Your Network
Zohar Buber, Security Analyst,  11/18/2020
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win an Amazon Gift Card! Click Here
Latest Comment: He hits the gong anytime he sees someone click on an email link.
Current Issue
2021 Top Enterprise IT Trends
We've identified the key trends that are poised to impact the IT landscape in 2021. Find out why they're important and how they will affect you today!
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-29071
PUBLISHED: 2020-11-25
An XSS issue was found in the Shares feature of LiquidFiles before 3.3.19. The issue arises from the insecure rendering of HTML files uploaded to the platform as attachments, when the -htmlview URL is directly accessed. The impact ranges from executing commands as root on the server to retrieving se...
CVE-2020-29072
PUBLISHED: 2020-11-25
A Cross-Site Script Inclusion vulnerability was found on LiquidFiles before 3.3.19. This client-side attack requires user interaction (opening a link) and successful exploitation could lead to encrypted e-mail content leakage via messages/sent?format=js and popup?format=js.
CVE-2020-26241
PUBLISHED: 2020-11-25
Go Ethereum, or "Geth", is the official Golang implementation of the Ethereum protocol. This is a Consensus vulnerability in Geth before version 1.9.17 which can be used to cause a chain-split where vulnerable nodes reject the canonical chain. Geth's pre-compiled dataCopy (at 0x00...04) co...
CVE-2020-26242
PUBLISHED: 2020-11-25
Go Ethereum, or "Geth", is the official Golang implementation of the Ethereum protocol. In Geth before version 1.9.18, there is a Denial-of-service (crash) during block processing. This is fixed in 1.9.18.
CVE-2020-26240
PUBLISHED: 2020-11-25
Go Ethereum, or "Geth", is the official Golang implementation of the Ethereum protocol. An ethash mining DAG generation flaw in Geth before version 1.9.24 could cause miners to erroneously calculate PoW in an upcoming epoch (estimated early January, 2021). This happened on the ETC chain on...