AFRL-RI-RS-TR-2014-271: Domain Name Server Security (Dnssec) Protocol Deployment
AFRL-RI-RS-TR-2014-271: Domain Name Server Security (Dnssec) Protocol Deployment
SHINKURO INC.
OCTOBER 2014
FINAL TECHNICAL REPORT
STINFO COPY
AIR FORCE MATERIEL COMMAND UNITED STATES AIR FORCE ROME, NY 13441
NOTICE AND SIGNATURE PAGE
Using Government drawings, specifications, or other data included in this document for any purpose
other than Government procurement does not in any way obligate the U.S. Government. The fact that
the Government formulated or supplied the drawings, specifications, or other data does not license the
holder or any other person or corporation; or convey any rights or permission to manufacture, use, or
sell any patented invention that may relate to them.
This report was cleared for public release by the 88th ABW, Wright-Patterson AFB Public Affairs Office and is
available to the general public, including foreign nationals. Copies may be obtained from the Defense Technical
Information Center (DTIC) (http://www.dtic.mil).
/S/ /S/
FRANK H. BORN WARREN H. DEBANY, JR
Work Unit Manager Technical Advisor, Information
Exploitation and Operations Division
Information Directorate
This report is published in the interest of scientific and technical information exchange, and its
publication does not constitute the Government’s approval or disapproval of its ideas or findings.
Form Approved
REPORT DOCUMENTATION PAGE OMB No. 0704-0188
The public reporting burden for this collection of information is estimated to average 1 hour per response, including the time for reviewing instructions, searching existing data sources, gathering and
maintaining the data needed, and completing and reviewing the collection of information. Send comments regarding this burden estimate or any other aspect of this collection of information, including
suggestions for reducing this burden, to Department of Defense, Washington Headquarters Services, Directorate for Information Operations and Reports (0704-0188), 1215 Jefferson Davis Highway,
Suite 1204, Arlington, VA 22202-4302. Respondents should be aware that notwithstanding any other provision of law, no person shall be subject to any penalty for failing to comply with a collection of
information if it does not display a currently valid OMB control number.
PLEASE DO NOT RETURN YOUR FORM TO THE ABOVE ADDRESS.
1. REPORT DATE (DD-MM-YYYY) 2. REPORT TYPE 3. DATES COVERED (From - To)
OCT 2014 FINAL TECHNICAL REPORT NOV 2009 – JUN 2014
4. TITLE AND SUBTITLE 5a. CONTRACT NUMBER
FA8750-10-C-0020
DOMAIN NAME SERVER SECURITY (DNSSEC) PROTOCOL
5b. GRANT NUMBER
DEPLOYMENT
N/A
5c. PROGRAM ELEMENT NUMBER
14. ABSTRACT
The DNSSEC Deployment Initiative was a 10-year effort to promote adoption of the DNS Security Extensions
(DNSSEC), a method of cryptography securing domain name system (DNS) lookups. This report describes the latter five
years of the initiative’s work, which involved coordinating the activities of many private and public sector organizations to
solve protocol, technical and deployment challenges related to DNSSEC. The initiative’s work contributed to several
major successes, including the signing of the DNS root zone and nearly all major top-level domains (TLDs). Remaining
challenges include promoting wide adoption of DNSSEC signing and validation in the private sector, although progress
was made in this area.
16. SECURITY CLASSIFICATION OF: 17. LIMITATION OF 18. NUMBER 19a. NAME OF RESPONSIBLE PERSON
ABSTRACT OF PAGES
FRANK H. BORN
a. REPORT b. ABSTRACT c. THIS PAGE 19b. TELEPHONE NUMBER (Include area code)
U U U UU 31 N/A
Standard Form 298 (Rev. 8-98)
Prescribed by ANSI Std. Z39.18
Table of Contents
1. Summary .................................................................................................................................. 1
2. Introduction .............................................................................................................................. 1
3. Methods, Assumptions and Procedures ................................................................................... 4
3.1. DNSSEC Status at Start of Contract ................................................................................. 4
3.1.1. Protocol Specification ................................................................................................ 4
3.1.2. Implementations ......................................................................................................... 4
3.1.3. Signing Status ............................................................................................................ 4
3.1.4. Validation Status ........................................................................................................ 4
3.1.5. Operating System Status ............................................................................................ 4
3.1.6. Perceived Image ......................................................................................................... 4
3.1.7. Main Challenges ........................................................................................................ 5
4. Results and Discussion ............................................................................................................ 5
4.1. DNSSEC Status at End of Contract .................................................................................. 5
4.1.1. Protocol Specification ................................................................................................ 5
4.1.2. Implementations ......................................................................................................... 5
4.1.3. Stub Resolvers ........................................................................................................... 5
4.1.4. Signing Status ............................................................................................................ 6
4.1.5. Validation Status ........................................................................................................ 6
4.1.6. Operating System Status ............................................................................................ 6
4.1.7. Perceived Image ......................................................................................................... 6
4.1.8. Current Challenges..................................................................................................... 6
4.2. DNSSEC Deployment Initiative ....................................................................................... 7
4.2.1. Communications and Coordination ........................................................................... 7
4.2.2. SOHO/Last-Mile Issues ............................................................................................. 8
4.2.3. Timing Model ............................................................................................................ 9
4.2.4. Algorithm Signaling................................................................................................. 12
4.2.5. History of TLD DNSSEC Adoption ........................................................................ 13
4.2.6. Tracking and Mapping DNSSEC Adoption ............................................................ 14
4.2.7. Users Guide .............................................................................................................. 15
5. Conclusions ............................................................................................................................ 16
Appendix A: DNSSEC Presentations and Transcripts ................................................................. 17
List of Symbols, Abbreviations, and Acronyms ........................................................................... 30
The Initiative's work contributed to several major successes, including the signing of the DNS
root zone and nearly all major top-level domains (TLDs). Remaining challenges include
promoting wide adoption of DNSSEC signing and validation in the private sector, although
progress was made in this area as well.
2. INTRODUCTION
This is the final report for the Shinkuro, Inc. portion of the DNSSEC Deployment Initiative. The
Initiative covered the period 2004–2014, funded under two separate contracts. This report covers
the second contract, from 2009–2014.
The stated goal of the Initiative was to foster the deployment of DNSSEC throughout the entire
DNS and for every query to be checked. While those goals remain in the future, significant
progress was made during this period. The most visible progress was in the signing of the TLDs.
Table 1 shows the number of top-level domains in each of five categories that had a Delegation
Signer (DS) record in the root zone in mid-2009, the number signed via a DS record by mid-
2014, and the totals in each category. Country-code TLD (ccTLD) and generic TLD (gTLD)
indicate the type of domain, while "Classic" means the TLD is in Latin letters. "IDN" stands for
Internationalized Domain Name, i.e. the TLD is in some other script, such as Cyrillic, Chinese or
Arabic. "Regional" consists of just .SU and .EU, for the old Soviet Union and the European
Union. These operate under country-code rules but cover more than one country.
Section 2 compares the status of DNSSEC deployment at the time of the contract's start in July
2009 and its end in June 2014, while subsequent sections cover specific actions we, DHS and
other Initiative partners took to further deployment.
3.1.2. Implementations
At this time three implementations of DNSSEC had been released—BIND-9, Unbound/NSD and
Nominum. Other organizations had done their own implementations in-house. Tools were
limited but were starting to appear. Meanwhile, the U.S. government had mandated that
DNSSEC be used by all .gov domains, which began to attract some vendors; but more
importantly, were learning lessons on how to operate DNSSEC.
4.1.2. Implementations
By now all major implementations of authoritative DNS servers provide support for DNSSEC.
DNSSEC was a major reason for the development of three new implementations (NSD, KNOT
and Yadifa). There are a number of special DNS servers for various organizations that have not
yet added DNSSEC capabilities; most of these are used by content distribution networks (CDNs)
but a number have started creating special DNSSEC-supporting systems for their paying
customers.
On the resolver side, many of the available recursive resolvers support DNSSEC or have plans to
do so, including BIND, Unbound, Microsoft DNS and Nominum Vantio. Most recently,
DNSMASQ added DNSSEC resolver support. There are few if any actively maintained DNS
resolvers that do not support DNSSEC or at least have DNSSEC support in their development
roadmap. There are also a new class of open public resolvers designed to be used by anyone, and
some are used by large numbers of users; the largest, Google DNS, does full validation on all
requests.
The U.S. government's mandate to have all .gov domains DNSSEC-signed was instrumental in
getting DNSSEC added to tools and DNS software. Although there were a number of operational
events that caused outages during this process, this was to be expected as this was new code and
not all corner cases were debugged before release. Over the last few years the number of these
events has decreased even though the number of domains signed keeps increasing. In addition,
the failures were not exclusively caused by software, but also by hardware failures as well as a
number of operational failures or misunderstandings of the properties of the DNS and DNSSEC.
A number of attempts have been made to create methods for measuring the current state of
validation in the wild, with the best being to use advertisements in YouTube to look up names.
Based on this measurement, over 12 percent of all users in the world are using DNSSEC-
validating resolvers.
In addition, it will take work to convince CDNs and other operators with highly time-critical
business operations to deploy DNSSEC, as well as to persuade financial institutions to adopt it.
Two to three major workshops were organized and conducted in conjunction with the regularly
scheduled Internet Corporation for Assigned Names and Numbers (ICANN) meetings each year.
Attendance varied between 50–100 people at each meeting. The DNSSEC workshops given
during the period of the contract include:
A guide to the location of the presentations and supporting materials may be found in Appendix
A: DNSSEC Presentations and Transcripts.
In addition, we created a DNSSEC Roadmap in 2013 that described progress toward the
Deployment Initiative's ultimate goal—for all zones to be signed and all queries to be checked.
The Roadmap detailed how the Initiative and DHS could be most effective in pushing DNSSEC
adoption by enterprises toward a future tipping point, and how to increase validation by Internet
To address these issues we have undertaken a number of efforts. In the prior contract we
commissioned a testing effort and joined forces with Nominet to evaluate the state of home
routers because these were considered possibly the weakest link in the DNSSEC chain. This
work showed that a number of home routers prevented resolvers from doing DNSSEC validation
when using the home routers' DNS resolvers, but in most cases resolvers bypassing the home
router could perform DNSSEC validation. The results of this test have become standard for a
number of ISPs when they evaluate new devices to give to customers.
Another source of network interference with validation is firewalls that have bad rules as to what
DNS packets should look like; we have worked on getting these fixed.
These tests work well when dealing with two types of resolvers:
• Non-anycast resolvers
• Anycast resolvers where all the resolvers are equivalent
The tests report inaccurate answers when the anycast resolvers differ in behavior, which is
frequently the case on "hotel" networks (i.e. networks that anyone can access, possibly after
paying for access). These networks are in many cases set up to only allow limited use, rendering
them quite hostile to any DNSSEC validation attempts. The DNSSEC-Trigger project that we
have contributed to attempts to overcome this by using DNS over Transmission Control Protocol
(TCP) or even DNS over Secure Sockets Layer (SSL). One of the important outcomes of our
work is the realization that that a "mobile" host needs to perform a set of DNS tests before
DNSSEC validation can take place or before users can expect dependable DNSSEC validation
by upstream resolvers.
Deliverable:
• Roadblock avoidance (http://tools.ietf.org/wg/dnsop/draft-ietf-dnsop-dnssec-roadblock-
avoidance/)
Deliverables:
• DNSSEC Timing Model Paper, February 2011
• Timing DNSSEC Changes, January 2011
• Internet Draft Memo Automating DNSSEC Delegation Trust Maintenance, June 2013
(http://tools.ietf.org/wg/dnsop/draft-ietf-dnsop-delegation-trust-maintainance/)
• Protocol for TLD and Reg Adoption, March 2011
• Transfer proposal, February 2014 (http://tools.ietf.org/html/draft-koch-dnsop-dnssec-
operator-change/)
Another important issue is how DNSSEC is maintained when a domain is transferred from one
DNS operator to another, and we participated in a number of task forces on DNSSEC transfers
hosted by various European TLD operators. This issue is mainly relevant in the TLD case; thus,
the solutions for this problem tend to be TLD-environment specific. The problem in a nutshell is
that if a domain transfers to an operator that uses different keys to sign the zone, validators will
treat the zone as bogus (i.e., validation fails) for a time. The goal of the work in this area was to
create a description of a system that would allow the transfer to succeed without any validation
errors. Out of this process came a proposal that uses the TLD operators' database as the conduit
for keying information that the old DNS operator must insert into the zone before the transfer can
start. The same logic applies when an enterprise changes DNS operators for one of its domains.
Once a domain is signed and the parent domain has a trust anchor for the domain as a DS record,
whenever the child decides to change the trust anchor it needs to communicate with the parent
the current set of trust anchors to advertise. This is a manual process, and we conducted studies
on the timelines needed for these operations. One of our goals was to create DNS-protocol
elements that could be automated at all levels of the DNS tree. Some work had gone into
automating this in a special TLD case where the DNS operator is a registrar. Due to the fact the
registrar has an API to the TLD, the operations can be performed over the API. In the general
case, though, it is difficult for the DNS operator (the party managing the keys for the domain) to
communicate with the parent, and this frequently occurs via a manual process. We have
documented protocol extensions to the DNS that allow a child to publish in-zone its desire for
the published trust anchor; the parent can then detect the records at the child and apply changes
(if needed) to the trust anchor. A number of DNSSEC-provisioning tools have committed to
implementing this standard once it is published (as of this writing, it is in the final stages of the
IETF process; it has been approved and will be published as an official Request for Comment
(RFC)).
The following is a more detailed discussion of the transfer process that resulted from the above
work.
When DNSSEC is brought into the picture, the situation is more complicated and hence more
delicate. Control of the private key that is used for signing is kept with the operator of the zone.
Changing operators entails changing the private key. Hence, a change of operator includes a key
rollover as well as a change in the set of name servers.
The question of how to transfer a signed zone from one operator to another was of specific
concern during the approval process of the first major gTLD to support DNSSEC, .org, in order
to prevent lock-in by a registrar. We investigated how to transfer a signed zone from one
operator to another without losing service and without causing a break in the validation chains.
We call this the "ripple-free" transfer of signed zones.
We developed scenarios for carrying out such transfers and tested them with two DNSSEC-
capable registrars who also provided name service for their registrants, two other operators who
provided name service but not registration service for customers, and one registry. In the course
of developing these scenarios, we also provided scenarios for the basic operations of signing,
unsigning and rolling over the keys in a signed zone, and for the transfer of unsigned zones.
Altogether we developed eight tests, grouped into three classes, and several of these tests had
multiple variants. Table 2 below summarizes the tests. All of these tests were successful and
were used as the basis for showing that multiple DNSSEC-capable registrars and DNS operators
existed and that the transfer of an operational, signed zone from one to the other could succeed
without any disruption of service or validation.
Registrars
Operators
Variants
Test Test rent Regist-
Grp Class Test Ext/I Descript- Verification Regist- rar
nt ion rar Role
Role
1 Basic Signing 1 1 Eith- Sign an Verify it is Aa, 2
Op er unsigned signed and Ac
zone validates
properly
2 Basic Un- 1 1 Eith- Unsign a Verify it is Aa, 2
Op signing er zone unsigned and Ac
operational
3 Basic Roll- 1 1 Eith- Test Show Aa, 2
Op over er rollover Rollover Ac
process w/o completes and
changing validation is
Regr or Opr continuous
4 Un- Un- 1 2 Ext Regn Xfr, Show all Ac- 1
signed signed Unsigned resolvers are >Ad
Xfr Opr Xfr Zone able to fetch
and validate
w/o delay,
outage or
disruption
5 Un- Un- 2 1 Int Regr & Opr Show all Aa- 1 1
signed signed Xfr, resolvers are >Bb
Xfr Opr & Unsigned able to fetch
Regn Zone and validate
Xfr w/o delay,
outage or
disruption
6 Sign- Signed 2 1 Ext Regr Xfr, Show all Ac- 1 1
ed Xfr Regn Signed resolvers are >Bc
Xfr Zone - No able to fetch
change of and validate
Opr w/o delay,
outage or
disruption
7 Signed Signed 1 2 Ext Opr Xfr, Show all Ac- 3
Xfr Opr Xfr plus Signed resolvers are >Ad
eith- Zone - No able to fetch Aa-
er Int change of and validate >Ac
or Regr w/o delay, Ac-
Ext outage or >Aa
disruption
8 Sign- Signed 2 1 Int Concurrent Show all Aa- 1 1
ed Xfr Zone Change of resolvers are >Bb
Xfr both Regr able to fetch
btwn and Opr for and validate
two a Signed w/o delay,
Regr/Op Zone outage or
rs disruption
The DNSSEC protocol supports the use of multiple algorithms. Each signature also carries a tag
indicating which algorithms were used to create the signature. Thus, when a zone operator
chooses to switch to a new algorithm, it can sign each record in its zone twice, once with the old
algorithms and once with the new. Eventually, it can stop signing with the old algorithms and use
only the new ones.
The zone operator can begin signing with both sets of algorithms whenever it wishes. Requesting
systems that understand the new algorithms can check the signature using the new algorithms.
Others will continue to rely on the signature created using the old algorithms.
When can the zone operator safely stop signing with the old algorithms? If it stops too soon,
some of the requesters will not be able to validate the signature and may treat the zone as bogus
and hence inaccessible. One possibility is to simply declare a "flag day," after which the old
algorithms are not expected to be used. This may or may not work in practice. However, setting a
flag day simply moves decisions about timing from individual zone operators to the overall
community. In either case, it would help a lot to know whether the requesters are capable of
using the new algorithms.
To facilitate the collection of that information, Scott Rose from the National Institute of
Standards and Technology (NIST) and Steve Crocker from Shinkuro, Inc. designed an extension
to the query side of the DNS protocol to include the set of algorithms understood on the
requesting side. It is intended that this information, collected across a wide range of authoritative
name servers and recursive resolvers, will provide reasonably accurate guidance on when new
algorithms are implemented widely enough to permit full dependence on them, and hence permit
a zone operator to stop signing with old algorithms.
At first glance it also appeared that including this information in a request might permit the
responder to reduce an answer's size by choosing to include only one of the signatures in the
event a record has been signed twice (or more). Unfortunately, because caching resolvers cannot
know which algorithms will be understood by future requesters, caching resolvers must store the
full set of signatures in a response from an authoritative name server, and, of course,
authoritative name servers must deliver the full set of signed answers. Thus, the inclusion of
information about which algorithms are understood by the requester cannot be used to trim the
answers.
The extension of the DNS protocol to provide information about the algorithms known to the
requester is now part of the official DNS protocol standard. It is defined in RFC 6975
(http://tools.ietf.org/html/rfc6975).
We defined five benchmark dates that any TLD will encounter in the deployment process. These
are:
Experimental: The date when the TLD operator began or will begin initial technical
experimentation with DNSSEC. This experimentation may or may not be visible on the
Internet and may or may not be announced until well after it has begun.
Announcement: The date when the TLD operator announced or plans to announce that it
commits to signing its zone and accepting signed delegations sometime in the future. The
announcement need not include when the signing will take place. The fact that a public
commitment is being made is significant in its own right.
Partial: The date when the public zone is first signed. This is called "partial" because it
does not usually include the acceptance of DS records from child zones.
DS-in-Root: After a zone is signed, a DS record is usually sent to the Internet Assigned
Numbers Authority (IANA) to be included in the root zone. There may be a delay
between the initial signing and the transmission of the DS record. Also, at the time this
work was started, some TLDs were signed but the root zone was not yet signed and
IANA was not accepting DS records.
The database is organized to accept reports about each of these states for each TLD. Further,
each entry includes a code for the degree of reliability based on the source of the information. In
order of decreasing certainty, these are:
4. Observed through direct query over the Internet. This applies only to Partial and DS-in-
Root and only for current status, not past or future
3. Reported by someone directly responsible for the TLD
2. Reported by someone knowledgeable about the TLD operation, e.g. a registry operator
1. All other reports
New reports are added to the database but old reports are not deleted unless they were wrong at
the time they were added, e.g. an error in data entry. Queries to this database take into account
This scheme provides a basis for recording what was expected and not only what actually
happened. The maps at the beginning of this report are examples of reports created using data
from this database.
After creating and operating the TLD-tracking process during the course of this contract, we
have transferred responsibility for and control of this operation to the Internet Society with the
agreement that they will continue to track and publish TLDs' DNSSEC information. A copy of
our Memorandum of Understanding with the Internet Society, which lays out the details of this
agreement, can be found in Appendix B: Memorandum of Understanding with the Internet
Society below.
Our full, detailed description of the TLD data collection, collation and mapping processes is
available at http://www.shinkuro.com/FA8750-10-C-0020/Publications/mapping-notes-v6-
100113.pdf. The full set of information we delivered to the Internet Society is available at
http://www.shinkuro.com/FA8750-10-C-0020/Publications/dnssecmap-138.src.tgz.
We have conducted a number of measurement studies during this project to evaluate what the
state of the DNS was during our project. These studies include measurements of whether TLDs
are signed and the DNSSEC practices of TLD operators. This work is partially related to our
DNSSEC map project as it allows us to monitor whether domains are in compliance with their
plans, or when a TLD suddenly becomes signed. We did a number of studies on how to measure
how widely used DNSSEC is, which included looking at traces of query traffic from a signed
TLD operator. As part of our involvement with the FCC's CSRIC, we created a tool to classify
how compliant a resolver is with DNS and DNSSEC specifications by sending the resolver a
small number of queries.
Detecting DNSSEC validators among passive query traffic was difficult and unreliable. Open
recursive resolvers are not considered a best practice on the Internet, but there are many of them
and we conducted a scan of the whole Internet Protocol version 4 (IPv4) address space to count
the number of "DNS responders," which included both resolvers and authoritative servers. In this
experiment we used signed zones, which allowed us to detect a number of ISPs or other
companies that perform DNSSEC validating. Finally, we attempted to classify the resolver using
We have developed techniques to perform statistical analysis of negative answers from signed
domains to get estimates of the size of the domain as well as how the domain names are used.
This work was motivated by the use of NSEC3 in many .gov domains for privacy reasons, which
makes getting statistics from many of these domains difficult. Thus, we worked out statistical
and brute force measurements techniques: All DNSSEC-signed domains can be walked, and for
those that use NSEC, it is a simple task to just ask for the name right after the previous one to
create a full chain, which would also tell us what kind of records reside at each name. At this
point, we can classify the domain.
NSEC3-signed zones are little bit harder, but with simple random name generation, these can
also be walked. We have developed tools that walk NSEC3-signed domain with only a minimal
number of lookups. We have been working on creating a model that allows us to take a partial
NSEC/NSEC3 chain and provide statistical estimates for the whole domain.
It turns out that due to NSEC3's properties it is much easer to create such models. We have used
these techniques to see whether domains are signed down to lower levels or just at the top level.
We can also be used to track whether a TLD is operational by counting the differences in DS
records found over time. In the process of doing these checks, we discovered that it is not that
difficult to reverse-map many domain names from NSEC3 records; all that's needed is a good
graphics card and a good dictionary, as brute-force attacks are only effective on names
containing less than 10 letters.
In addition to the above measurement studies, we believe there is value in having a coherent,
comprehensive picture of the overall state of DNSSEC adoption by the world's TLDs. Such a
picture would be the largest-scale reflection of various parties' progress in adopting DNSSEC in
the past, present and future.
Deliverables:
• DNSSEC w/o Humans, June 2012 (http://www.shinkuro.com/FA8750-10-C-
0020/Publications/DNSSEC w-o Humans-final.pptx)
• DNSSEC is now included in most of the DNS software, i.e. it is available to be used.
• The root is signed, thereby establishing a root key available for global use, and also
signaling to the entire Internet community that DNSSEC is an integral part of the DNS
infrastructure.
• All of the major top-level domains and a large number of the smaller ccTLDs are signed.
ICANN has also required that all new TLDs created within its New gTLD Program must
be signed from the beginning of their operation.
• Some major ISPs are checking (validating) DNSSEC signatures as part of the regular
operation.
• Operational experience has been gained with keeping zones signed and transitioning a
signed zone from one operator to another.
• Applications are being developed that rest on the DNSSEC infrastructure.
While these results are indeed important, full deployment and use of DNSSEC remains in the
future. Only very few enterprises have signed their zones. The majority of ISPs have not chosen
to validate DNS lookups. End systems are not yet asking for nor checking signed responses.
There is more work to be done.
Domain Name System Security DNSSEC Workshop Rome, Italy, July 2010
Materials available at:
http://www.gcsec.org/event/domain-name-system-security-dnssec-workshop
Securing and Trusting Internet Names (SATIN), Teddington, UK, April 2011
Materials available at:
http://conferences.npl.co.uk/satin/agenda2011.html
Update on .gov
The uptake of DNSSEC in the .gov zone
VeriSign on the services they offer to and through .gov
FISMA, with emphasis on mobile requirements
Applications and Dane
Report on NLnet Labs DNSSEC Trigger
Chrome and Mozilla DNSSEC plug-ins Developed by .cz
Reengineering Trust: Towards The Domain Key Infrastructure
National Strategy for Trusted Identity in Cyberspace