November 2013 archive

Watch the US Olympic Curling Trials Live This Weekend (Nov 16-17) On NBC Sports Network

US Curling Olympic TrialsWant to watch some amazing curling on TV?  The US Olympic Curling Trials are happening today and this weekend in Fargo, North Dakota. They will be live on the NBC Sports Network channel.  The schedule of games seems to be this:

  • Friday, Nov. 15: 2:30 p.m., women’s playoff and men’s playoff (NBCSN, live TV)
  • Saturday, Nov. 16: 2:30 p.m. men’s playoff #2 (NBCSN, live TV)
  • Saturday, Nov. 16: 7 p.m., women’s playoff #2 (NBCSN, live TV)
  • Sunday, Nov. 17: 11 a.m., men’s playoff #3 (if required) (NBCSN live TV or rerun of Saturday show)
  • Sunday, Nov. 17: 2 p.m., women’s playoff #3 (if required) (NBCSN live TV or rerun of Saturday show)

More information can be found on the USA Curling website, as well as via their Twitter account, Facebook page and Google+ page.

P.S. And yes, the only coverage now is on NBC Sports Network.  There was a free live stream on the web but that was for all the games up until the playoffs.

Congratulations To Keene Ice! First Round Of Keene City Council Approval Tonight

Keene Ice at Keene City CouncilCongratulations to Keene Ice! In a completely packed Keene City Council Chambers tonight (including out into the hallway), the Keene City Council finance and operations committee voted unanimously to approve the two agreements between the City of Keene and Keene Ice. The agreements now go to the full Keene City Council next Thursday for approval… but tonight was the big step to get this approval from the finance committee!

Congrats!  We as a city are now that much closer to having a year-round ice rink right here in Keene.

And… in looking at the drawings… there seems to be this “open storage space” behind the bleachers that looks like it could be enough room to hold some curling sheets!  A regulation curling sheet is about 150 feet long and 15-ish feet wide.  I don’t know the scale of the drawings… but it looks like that storage space is maybe 40-ish feet wide by 200 feet long, so probably only enough room for 2 sheets.  I know we said in our FAQ that we’re really looking for 3-4 sheets to be able to bring in the large bonspiels and a large number of members… BUT… that could be interesting!   I think we need to follow up with Keene Ice and see what possibilities might exist there… 

.SEXY? .TATTOO? Now Live in DNS? Welcome to the World of NewgTLDs (Featured Blog)

As I wrote last week, ICANN is proceeding along with "delegating" the "new generic top-level domains (newgTLDs)" and while last week's .GURU may have provoked some chuckles, this week's block of 11 newly "delegated" newgTLDs brings us... More...

.SEXY? .TATTOO? Now Live In DNS? Welcome To The World Of The NewGTLDs (Featured Blog)

More...

Keene Ice At Keene City Council Tonight

If you get a chance to go to the Keene City Council meeting tonight, Thursday, November 14, 2013, the proposal for a year-round skating rink from Keene Ice will be under discussion.  While we’ve written in our frequently-asked questions why we are seeking a dedicated ice facility, we’re very much in favor of seeing Keene Ice’s proposal go through. The Monadnock region needs more access to winter sports facilities – and it would be outstanding to have a year-round skating rink here in Keene!  I (Dan York) am planning to be there and I hope others will join in the meeting as well.

Should The Root DNSSEC Key Be Rolled? ICANN’s SSAC Issues Some Guidance

ICANN SSAC 63Should the root key of DNSSEC be rolled over?  And if so, when and under what conditions?  We’ve mentioned this discussion before and even sent in our own comments to ICANN.  After reviewing all those comments and consulting with many people, the ICANN Security and Stability Advisory Committee (SSAC) has now issued their guidance in a document, “SAC063 – SSAC Advisory on DNSSEC Key Rollover in the Root Zone“.  The document is well worth a read and explains SSAC’s thinking on a variety of issues.  For a quick summary, SSAC issued five recommendations that I would paraphrase as:

1:  ICANN and partners should immediately undertake a worldwide communications effort to publicize the root zone KSK rollover motivation and process as widely as possible.

2: ICANN staff should coordinate a testing program to analyze the behavior of validating resolvers to identify problems that could be caused the the root KSK rollover.

3: ICANN staff and the community should identify clear and objective metrics for acceptable levels of “breakage” resulting from a key rollover.

4: ICANN staff should coordinate the development of rollback procedures to be executed in case things go wrong.

5: ICANN staff should coordinate the collection of information during this KSK rollover so that lessons can be learned for future rollovers.

This SSAC report is issued in time for next week’s ICANN 48 meeting in Buenos Aires where this topic will again be in the conversation within DNSSEC circles.  ICANN has contractual requirements to roll the key within five years of the signing of the root in July 2010 and so efforts are underway to make sure this can be done in a sensible manner.

Welcome To The Monadnock Curling Club!

Greetings!  Are you interested in the sport of curling?  Have you played it before?  Or seen it on TV and thought it looked interesting?

Would you like to be able to play the sport of curling within the Monadnock region?

If so, please join with us and help us bring a dedicated curling facility to the Monadnock region of southwestern New Hampshire and the surrounding regions in Vermont and Massachusetts.

TDYR #047 – Remembrance Day And The Ubiquitous Canadian Poppy

Today, November 11, is "Remembrance Day" in Canada and I reflect on how moving I find the ubiquitous poppy symbol... https://en.wikipedia.org/wiki/Remembrance_poppy https://en.wikipedia.org/wiki/In_Flanders_Fields

Deployment Guide: DNSSEC for Internet Service Providers (ISPs)

An Internet Service Provider needs to offer high value while containing costs. One way to increase your services’ value is to ensure your customers get to the intended websites, protecting them from going to phishing sites or sites that distribute malware.

One way to offer such protection at relatively little cost is through DNS Security Extensions, an Internet standard commonly known as “DNSSEC“. By deploying “DNSSEC-validating” DNS resolvers within your network, you will provide a higher level of security and trust to your customers and help prevent certain types of attacks and redirection. You also will enable customers to use innovative services that are now becoming available to add more trust and integrity protection to Web certificates (SSL/TLS).

DNSSEC ensures that the information your users retrieve from the DNS is the same information that the domain’s operator entered into the DNS. It verifies that this information was not modified so that your users are directed to their intended destinations.

DNSSEC has two components: the signing of DNS records for a domain and the validation of those cryptographic signatures by caching recursive nameservers. For an ISP, the deployment of DNSSEC-validating DNS resolvers is the most critical element of DNSSEC adoption and this document explains what is necessary to roll out DNSSEC validation support to your customers.

Initial deployment of DNSSEC validation is usually quite inexpensive, requiring a relatively small investment in new hardware and software and only a modest time investment; typical deployment may be completed with as little as a week of total effort by experienced system administrators, depending on how many recursive nameservers and end users are involved.

Hardware and Software

Caching recursive nameservers are the most important part of a DNSSEC validation deployment since they cache and validate answers to DNS queries submitted by end users. Modern, off-the-shelf server hardware is sufficiently powerful to operate a DNSSEC-validating caching recursive nameserver. In addition, it is perfectly feasible to operate such a nameserver on a virtual machine.

Your choice of nameserver and its vintage are important to your success with DNSSEC. DNS infrastructures based on the BIND DNS server should run at least version 9.7, whose features simplify DNSSEC management. All versions of Unbound natively support DNSSEC validation, although version 1.4 and later have features that simplify DNSSEC management.

Microsoft Windows Server 2012 now includes full DNSSEC support, allowing administrators to retrieve the necessary root trust anchors via command-line instructions. A whitepaper by Netherlands DNSSEC authority Surfnet explains this process; you can download the PDF of their guide to DNSSEC installation here.

Effects on Network

In your planning, you should be aware that DNSSEC traffic has several effects on network traffic:

  • DNSSEC adds digital signatures to DNS response packets, which often exceed 1,500 bytes. While large DNS responses are also possible without DNSSEC, you must consider the additional bandwidth demands that DNSSEC places on the network, and ensure that only legitimate hosts are allowed to query your recursive nameservers.
  • Traditionally, the DNS relies on the UDP protocol to transmit queries and responses, but if a DNS response exceeds the maximum allowed packet size, TCP may be used and even required for DNSSEC validation. Check with your firewall vendor and system administrators to ensure your network allows DNS over TCP.
  • Your network equipment must be able to handle large UDP packets (>512 bytes, ≤4,000 bytes).

Pre-Deployment Checklist

This checklist can help you to plan your deployment:

  • Software supports DNSSEC: BIND version 9.7+, Unbound version 1.4+, Microsoft Windows Server 2012, Knot DNS 1.4.0, PowerDNS 3.0+
  • Server systems are sufficiently modern
  • Network infrastructure can handle DNSSEC requirements
  • DNS over TCP is allowed
  • Large UDP DNS packets are allowed through firewall
  • UDP fragments are not blocked by firewall

Beginning Your Deployment

After your install your recursive caching nameservers (or have existing nameservers where you want to start validating), they must be configured with a “trust anchor” in order to validate DNSSEC signatures. You can obtain the trust anchor for the root of the DNS from sources such as https://www.iana.org/dnssec. You can check the trust anchor’s validity by obtaining it from multiple independent sources (i.e. multiple root servers) and comparing the files.

When you enable DNSSEC validation on your recursive caching nameserver you may see validation failures in the log files. While these errors could be signs of a cache-poisoning attack, they may also result from operational errors (particularly in these early days of DNSSEC deployment). This could be something as simple as a zone owner’s failure to re-sign their zone information.

Validation failures for a zone will mean that your users will not be able to connect to that domain. When errors of this type appear it is far better to inform users about the source of the problem and how they were protected from using potentially insecure information, rather than disabling validation in order to provide continued access to the “broken” domain. Standards concerning how to perform this notification continue to evolve, though some organizations have used a dedicated website or social-media channel to post notifications of current validation failures. Regardless of what system you create, it is important that your customers and customer-support team can easily find the information.

Certain ISPs may also install a temporary “negative trust anchor” for broken sites while notifying the zone’s operators of problems or errors that will probably severely degrade their users’ Internet experience. An Internet Draft document is available that explains this process.

While feedback from people currently operating validating caching recursive nameservers show that enabling DNSSEC validation does not necessarily increase user help-desk calls, it is still sensible to train help-desk staff concerning DNSSEC and potentially provide them with tools (i.e. a non-validating resolver) to help with debugging.

Conclusions

DNSSEC rollout is progressing steadily on the Internet, and deployment of validating caching recursive nameservers is an important part of this trend. By deploying DNSSEC within your network you will increase your customers’ Internet security. Doing so provides significant benefits at a minimal cost, and we urge you to begin this process today.

FIR #729 – 11/11/13 – For Immediate Release

Shel traveling, Inside PR joins the FIR Podcast Network, Listener Survey results update; Quick News: Google Helpouts announced, Facebook ditches 'Like', Google tests new 'follow users' tech; Ragan promo; News That Fits: Communication and the Twitter IPO; Dan York's Tech Report, the Media Monitoring Minute, listener comments, Michael Netzley's Asia Report, Cision study on UK journalists use of social media; shoutout to Effective Edge Communications; music by Manic Street Preachers; and more.