Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Risk

5/26/2009
12:11 PM
50%
50%

Secure64's DNS, DNSSEC Products Receive IPv6 Gold Certification

Security solutions now compliant with IPv4-to-IPv6 transition already under way

Denver " May 19, 2009 " Secure64 Software Corporation today announced the company has received IPv6 Ready gold certification from the IPv6 Forum for its family of DNS and DNSSEC products. IPv6 is the next-generation Internet Layer protocol for packet-switched internetworks and the Internet. Many international markets have already adopted IPv6. Within the U.S., the Office of Management and Budget issued a mandate requiring federal agencies to be IPv6-enabled on their network backbones by June 2008, and further recommending that agencies only procure new IT products that are IPv6 compliant. However, the government has been challenged by the lack of IPv6-enabled security devices and software applications available in the commercial marketplace.

"Secure64 has strived from the beginning to be the 'gold standard' in DNS software," said Steve Goodbarn, CEO and Director of Secure64. "Achieving this latest certification provides our federal and international customers with even greater confidence that our DNS products are state of the art, while providing the highest level of security and performance available."

History of Internet Protocol version 6 (IPv6) IPv6 is the next-generation Internet Layer protocol for packet-switched internetworks and the Internet. Internet Engineering Task Force (IETF) designated IPv6 as the successor to version 4 by the publication of a Standards Track specification, RFC 2460, in December 1998.

The difference between IPv6 and IPv4 is the address space. IPv6 uses a 128-bit address, whereas IPv4 uses only 32 bits. This expansion provides flexibility in allocating addresses and routing traffic and eliminates the primary need for network address translation. IPv6's 128-bit addresses can support a virtually unlimited number of devices and also can provide additional security and network management features to support mobile computing. IPv6 also implements new features that simplify aspects of address assignment (stateless address autoconfiguration) and network renumbering (prefix and router announcements) when changing Internet connectivity providers thus making Internet management and routing more efficient.

IPv6 was developed in order to address the shrinking number of remaining IPv4 addresses, which were predicted to run out in 2012. This would have prevented more devices from being IP-enabled and capable of connecting to the Internet. IPV6 offers an unlimited number of addresses and therefore supports continued growth of Web-based computing and mobile devices.

About the IPv6 Forum The IPv6 Forum is a worldwide consortium that provides technical guidance for the deployment of IPv6. One of its key functions is providing certification of IPv6-ready products that conform to IPv6 specifications, support the protocol, and ensure interoperability with other IPv6 products and technologies. The certification and IPv6 Ready Logo program is managed by a global team of technical members of the IPv6 Forum, including equipment vendors, service providers, academic institutions, IPv6 organizations, members from the TAHI Project (Japan), the University of New Hampshire InterOperability (UNH-IOL)(USA), IRISA/INRIA (France), European Telecommunications standardization Institute ETSI (Europe), Telecommunication Technology Association TTA (Korea), Beijing Internet Institute BII (China), ChungHwa Telecom Labs CHT-TL (Taiwan) and Japan Approvals Institute for Telecommunications Equipment JATE (Japan).

Secure64 DNS Products Secure64's suite of DNS products includes Secure64 DNS Signer, a software product that fully automates Domain Name System Security Extensions (DNSSEC) key generation, key rollover, zone signing and re-signing processes. It reduces deployment and administration costs while eliminating errors that can cause domains to become unavailable. The software also scales to extremely large, dynamic environments by safely keeping DNSSEC signing keys online while providing incremental zone signing and extremely high signing performance.

The company's other DNS product, Secure64 DNS Authority, is an authoritative name server software product that's available at all times " even during network attacks or restarts. It delivers the availability and security required in today's networks, without the cost and complexity of conventional solutions.

About Secure64 Software Corporation Headquartered in Greenwood Village, Colorado, Secure64' is a software company offering high-performance DNS server software that makes the DNS trustworthy and secure. Secure64 currently offers two DNS server applications based on SourceT' " the company's patented Genuinely Secure micro OS. Secure64 DNS Signer is the first DNSSEC signing software to make DNSSEC deployment simple and secure. Secure64 DNS Authority is secure DNS server software that is available at all times -" even during network attacks or restarts. By using Secure64 software, organizations can break the costly and reactive patch management and OS hardening cycle because only Secure64 software is immune to compromise from rootkits and malware and resistant to network attacks that are the source of today's most serious security threats. For more information, visit www.secure64.com.

Comment  | 
Print  | 
More Insights
Comments
Threaded  |  Newest First  |  Oldest First
Mobile Banking Malware Up 50% in First Half of 2019
Kelly Sheridan, Staff Editor, Dark Reading,  1/17/2020
Active Directory Needs an Update: Here's Why
Raz Rafaeli, CEO and Co-Founder at Secret Double Octopus,  1/16/2020
New Attack Campaigns Suggest Emotet Threat Is Far From Over
Jai Vijayan, Contributing Writer,  1/16/2020
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Current Issue
The Year in Security: 2019
This Tech Digest provides a wrap up and overview of the year's top cybersecurity news stories. It was a year of new twists on old threats, with fears of another WannaCry-type worm and of a possible botnet army of Wi-Fi routers. But 2019 also underscored the risk of firmware and trusted security tools harboring dangerous holes that cybercriminals and nation-state hackers could readily abuse. Read more.
Flash Poll
How Enterprises are Attacking the Cybersecurity Problem
How Enterprises are Attacking the Cybersecurity Problem
Organizations have invested in a sweeping array of security technologies to address challenges associated with the growing number of cybersecurity attacks. However, the complexity involved in managing these technologies is emerging as a major problem. Read this report to find out what your peers biggest security challenges are and the technologies they are using to address them.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-5216
PUBLISHED: 2020-01-23
In Secure Headers (RubyGem secure_headers), a directive injection vulnerability is present in versions before 3.9.0, 5.2.0, and 6.3.0. If user-supplied input was passed into append/override_content_security_policy_directives, a newline could be injected leading to limited header injection. Upon seei...
CVE-2020-5217
PUBLISHED: 2020-01-23
In Secure Headers (RubyGem secure_headers), a directive injection vulnerability is present in versions before 3.8.0, 5.1.0, and 6.2.0. If user-supplied input was passed into append/override_content_security_policy_directives, a semicolon could be injected leading to directive injection. This could b...
CVE-2020-5223
PUBLISHED: 2020-01-23
In PrivateBin versions 1.2.0 before 1.2.2, and 1.3.0 before 1.3.2, a persistent XSS attack is possible. Under certain conditions, a user provided attachment file name can inject HTML leading to a persistent Cross-site scripting (XSS) vulnerability. The vulnerability has been fixed in PrivateBin v1.3...
CVE-2019-20399
PUBLISHED: 2020-01-23
A timing vulnerability in the Scalar::check_overflow function in Parity libsecp256k1-rs before 0.3.1 potentially allows an attacker to leak information via a side-channel attack.
CVE-2020-7915
PUBLISHED: 2020-01-22
An issue was discovered on Eaton 5P 850 devices. The Ubicacion SAI field allows XSS attacks by an administrator.