Internet security gurus and leading vendors are urging the US federal government to rapidly deploy security and authentication mechanisms at the top level of the DNS hierarchy, which is known as the root zone.
In recent weeks, the National Telecommunications and Information Administration (NTIA) has received 30-plus comments in favor of securing DNS root zone data.
The "rapid adoption of DNSSEC and signing of the root zone is an urgent requirement," wrote Michael Barrett, CISO with PayPal. "We applaud NTIA for initiating this inquiry, and urge it to move with all possible speed to implement DNSSEC [DNS Security Extensions]. Inaction or further delay would be detrimental to the interest of consumers and other Internet users and to the healthy growth of electronic commerce."
"Comcast is strongly in favor of the global adoption of DNSSEC, starting with the signing of the root," said a letter from Kathryn Zachem, vice president of regulatory and state legislative affairs, and Jason Livingood, executive director of Internet systems engineering with Comcast. "Until the root is signed, signatures for a top-level domain such as .net or .com, and signatures in domains like Comcast.net are of limited utility."
While the majority of the comments received by NTIA recommend deploying DNSSEC across the root zone, many of them prefer that this is done by the nonprofit Internet Corporation for Assigned Names and Numbers (ICANN) rather than a for-profit corporation such as VeriSign, which operates root servers A and J.
The Asia-Pacific Network Information Centre, a regional Internet registry, said it supports "ICANN's proposals to sign the root zone using the DNSSEC framework in a timely manner."
IAB Chair Olaf Kolkman similarly proposed that details about DNSSEC implementation on the root zone "should be decided upon within the context of the multi-stakeholder process, as currently embodied in ICANN. This would ensure involvement of all stakeholders through well established mechanisms."
The NTIA also received letters discouraging DNSSEC deployment from two lesser-known organizations -- PublicRoot Consortium and AV8 Internet -- as well as a few crackpot comments that are typical of any open Internet-based process.