VeriSign Announces Deployment of DNS Security Extensions at the Internet's Root
As of last evening, DNSSEC -- a critical security technology -- became enabled at the root zone, which lies at the core of the Internet's global addressing system. VeriSign worked closely with the Internet Corporation for Assigned Names and Numbers (ICANN) and the U.S. Department of Commerce to make the signed root zone available and to publish a single trust anchor that Internet infrastructure stakeholders need to streamline DNSSEC deployment.
"VeriSign is proud to work with ICANN and the Department of Commerce in strengthening the integrity of DNS data," said Ken Silva, senior vice president and chief technology officer at VeriSign. "In this collaborative, industry-wide effort to protect consumers and organizations from hackers who target DNS data, today's news marks a decisive step forward. We look forward to building on this vital effort in the months and years ahead."
DNSSEC applies digital signatures to DNS data to authenticate the data's origin and verify its integrity as it moves across the Internet. The security extensions are designed to protect the DNS from "man in the middle" and cache poisoning attacks, which can occur when hackers corrupt DNS data stored on recursive servers to redirect queries to malicious sites. With DNSSEC, poisoning a recursive server's cache is much more difficult because DNS administrators sign their data. The resulting digital signatures on that DNS data are validated through a "chain of trust" that starts with the public key published today for the root zone.
The announcement of the signed root zone's availability follows VeriSign's and ICANN's successful tests of DNSSEC with the operators of all root servers. Throughout the increasingly rigorous testing process, these organizations reported no detrimental impact on DNS performance, which led the Department of Commerce to authorize of the signing of the root zone.
VeriSign manages two of the world's 13 Internet root servers. Those two servers -- a.root-servers.net and j.root-servers.net -- are considered national IT assets by the U.S. government. VeriSign also manages numerous mirrored copies of the root servers via the Anycast routing technique.
About VeriSign
VeriSign, Inc. (
Statements in this announcement other than historical data and information constitute forward-looking statements within the meaning of Section 27A of the Securities Act of 1933 and Section 21E of the Securities Exchange Act of 1934. These statements involve risks and uncertainties that could cause VeriSign's actual results to differ materially from those stated or implied by such forward-looking statements. The potential risks and uncertainties include, among others, the uncertainty of future revenue and profitability and potential fluctuations in quarterly operating results due to such factors as the inability of VeriSign to successfully develop and market new products and services and customer acceptance of any new products or services, including VeriSign Internet Domain Name Services; the possibility that VeriSign's announced new services may not result in additional customers, profits or revenues; and increased competition and pricing pressures. More information about potential factors that could affect the company's business and financial results is included in VeriSign's filings with the Securities and Exchange Commission, including in the company's Annual Report on Form 10-K for the year ended December 31, 2009 and quarterly reports on Form 10-Q. VeriSign undertakes no obligation to update any of the forward-looking statements after the date of this press release.
©2010 VeriSign, Inc. All rights reserved. VeriSign, the VeriSign logo, the checkmark circle, and other trademarks, service marks, and designs are registered or unregistered trademarks of VeriSign, Inc., and its subsidiaries in the United States and in foreign countries. All other trademarks are property of their respective owners.