KSK key update for DNSSEC protocol is postponed to the next year

Delaware, USA ā€“ October 2, 2017 ā€“ ICANN has postponed the date of the KSK key update to the beginning of 2018. The main reason for the delay is that some providers did not implement the KSK key in the infrastructure, which could lead to the impossibility of sending DNS queries to about 60 million users of this protocol after the update. DNSSEC protocol is designed to replace DNS protocol that was developed in the early 1980s. It leverages keys to create cryptographic signatures of data, and its primary purpose is to make it impossible to exploit the protocol for redirecting users to malicious servers by using false DNS queries. Currently, DNSSEC protocol is used by over 700 million people around the world that prefer it because of greater security.

However, DNS protocol remains vulnerable to hackersā€™ attacks, and it is required to pay close attention to this protocol to ensure security of every organization. DNS Security Check package is designed to find any anomalies of the DNS protocol, as well as misconfigurations. Also, this use case is able to automatically detect and notify of DNS-based threats such as DNS tunneling, sending packets to unincorporated servers and Fast Flux DNS botnet traffic.