A ".secure" top-level domain
On May 10, Ars Technica reported on a new proposal to create a .secure top-level domain (TLD) that would enforce deployment of encryption and security protocols on all sites and scrutinize all registrants to verify their identity. The idea is being floated by the company that wants to be the registrar and manager of the TLD, however, and regardless of how noble its intentions may be, it still needs to make a strong case for how a domain-bound solution improves on existing security practices.
The initial proposal and initial reactions
The proposal comes from Alex Stamos of research firm iSec Partners, and would appoint Artemis Internet as the gatekeeper of .secure. Artemis would require registered domains to encrypt all web and email traffic (except for HTTP redirects funneling connections towards the appropriate TLS-encrypted site), use DNSSEC, and deploy DomainKeys Identified Mail (DKIM) for spam prevention. In addition, Artemis would employ a rigorous screening process to verify registrants' identities (including reviewing articles of incorporation and human interviews), and routinely conduct security scans of registered sites. The venture has $9.6 million (US) in funding provided by Artemis' parent company NCC Group, a UK-based IT security firm.
The Artemis site says ".secure is not a category or
destination. It is an expression of the user's intent to use the
Internet safely
", but so far offers few additional
implementation details. After a number of Ars Technica readers
expressed their skepticism in the comment thread, though, Stamos responded to several questions on the site (although, ironically,
we have no way to verify that the poster is Stamos).
Several commenters expressed doubt that the lofty goal of enforcing strong encryption and strictly-verified identities was practical on a large scale, while others argued that the proposed rules for registrants offer nothing that secure sites cannot already do today — thus making the special domain unnecessary. To the latter charge, Stamos replied that the goal was to automatically make secure choices whenever the user entered a .secure URL, rather than rely on the user to verify the security of a connection upon visiting a site:
A reader who goes by VideoGameTech argued that even with a strict security policy enforced on the actual .secure sites, users would still be vulnerable to attacks like DNS hijacking and URL-obfuscation through email spam. Stamos responded that requiring DNSSEC would protect users against DNS hijacking, and that other measures would make spam attacks less likely, saying:
Policy
Stamos also added that Artemis was drafting a proposal called the Domain Policy Framework (DPF), which would allow a domain to specify a security policy to be stored in DNS TXT records that browsers and other client applications could securely retrieve over DNSSEC. He later posted an initial specification of DPF to his blog. The specification itself is hosted at Scribd.com; a PDF version can be downloaded from the Scribd page.
The proposed DPF specification enumerates 15 separate security entries, broken up into "network and identity," "email," and "WWW" sections. They cover basic requirements like whether a domain requires DNSSEC and/or TLS, plus details like expected email signature algorithms, plus general identity information. Artemis has also started a project it calls the Domain Policy Working Group to create DPF, although at the moment it does not list any other members. The group's site does state that its intention is to submit DPF to the Internet Engineering Task Force (IETF) RFC process, and to create supporting standards.
Yet another CA?
Some commenters at Ars Technica and on our own story felt that the proposal boiled down to little more than Artemis vowing to be a certificate authority (CA) that actually acted responsibly — which so many CAs seem to have trouble doing. It would also appear that the .secure domain would require that only the Artemis CA be allowed to sign site certificates for the TLD or else a subverted CA could start issuing bogus .secure certificates. That, of course, means that subverting Artemis itself could lead to the same problem On the other hand, it is at least true that running an entire TLD securely would be more visible to the end user than would running a flawless CA.
Consider, for comparison's sake, the Extended Validation (EV) SSL certificate concept. EV certificates were supposed to bolster security by inflicting a rigorous, fraud-proof identity verification process on all applicants. The trouble was that, as the Wall Street Journal reported, most users failed to notice the difference in their browser's UI. Barring any other improvements, if Artemis managed to cultivate a good reputation for running .secure, it would be easier for a casual user to spot the TLD than to dig into the the certificate chain-of-trust for another site.
Speaking of previous enhanced-security efforts, the .secure TLD was floated as an idea in 2011 as well, under greatly differing circumstances. Back then it was the US government proposing a heavily-fortified subset of the Internet to live in .secure. That proposal had different components, including ongoing monitoring with intrusion detection and prevention software. But Chris Palmer of the Electronic Frontier Foundation (EFF) responded by critiquing the core notion that better identity verification would provide a security for users:
Echoing that sentiment, Ars Technica reader Mark Havel asked
whether Artemis' .secure proposal would come with any guarantees that
security patches would be quickly and routinely applied to all servers
on .secure sites. Others pointed out that for end users, the only
difference between a .secure site and a site in another TLD would be
if Artemis offered liability protection against attacks. As reader
Fuzzmz said,
"Yes, I can visit a .secure domain with a bit more peace of
mind, but if something goes haywire then I'm left in the same place as
I was if it happened on a .com domain.
"
There is also the question of whether a hardened .secure domain would attract a larger share of attackers than would the same sites hosted at .com or other TLDs. Some commenters suggested that cracking a .secure site would be an attractive achievement for fame-seekers. On a separate note, if the .secure TLD did successfully become associated with higher security in end users' minds, it would consequently make a more appealing target.
In short, there is not much in the .secure proposal from Artemis that a server could not implement today (DPF, which is not limited to .secure, necessarily, depends on browser adoption). But even with a secure connection to a fully-patched server, it is up to the human being in front of the screen to pick out all manner of security attacks, from phishing spam to URL obfuscation, and that human being still relies heavily on the browser to expose and communicate threats in an understandable manner. Without question, the principles that the Artemis site hails as critical — verification, security, and enforcement — are vital to creating a secure web and email environment. But the company still needs to make a stronger case for how tying those principles to a particular TLD improves things over the status quo for the human/browser combination, not to mention why that responsibility should rest with a private, commercial enterprise.
Index entries for this article | |
---|---|
Security | Certificate Authorities (CAs) |
Security | Domain Name System (DNS) |
Posted May 17, 2012 2:49 UTC (Thu)
by clicea (guest, #75492)
[Link]
Posted May 17, 2012 7:58 UTC (Thu)
by jezuch (subscriber, #52988)
[Link]
At least that's my non-expert impression :)
Posted May 18, 2012 21:17 UTC (Fri)
by dafid_b (guest, #67424)
[Link] (1 responses)
This idea could allow some changes to the way the net really works, at least in the part of it that really cares about security (banks, credit card payments, etc).
Given that companies with servers in the .secure domain have opted in, it the becomes reasonable for the browsers to apply rigorous standards to certificates etc. The warnings can instead be errors that can not be clicked past, with automated reporting to the domain registrar of the problem :).
Posted May 27, 2012 19:46 UTC (Sun)
by steffen780 (guest, #68142)
[Link]
Posted May 20, 2012 4:59 UTC (Sun)
by djao (guest, #4263)
[Link] (2 responses)
Posted May 21, 2012 8:17 UTC (Mon)
by jezuch (subscriber, #52988)
[Link]
Or "Broadcast Flag". And yes, it almost happened.
Posted May 24, 2012 6:12 UTC (Thu)
by Zizzle (guest, #67739)
[Link]
Painting a target on ones servers.
A ".secure" top-level domain
Anything but .com is seen as not internet-y enough for most users.
Here we go again...
A ".secure" top-level domain
A ".secure" top-level domain
The "Evil Bit" RFC was supposed to be an April Fools joke. But I guess if you market it as a "Good Bit" then people are genuinely fooled ...
A ".secure" top-level domain
A ".secure" top-level domain
A ".secure" top-level domain