PPT-DNSSEC
Author : alexa-scheidler | Published Date : 2016-02-28
Lutz Donnerhacke db089309 1c1c 6311 ef09 d819 e029 65be bfb6 c9cb dig dnssec 165375146394e164arpa naptr A protocol from better times An ancient protocol
Presentation Embed Code
Download Presentation
Download Presentation The PPT/PDF document "DNSSEC" is the property of its rightful owner. Permission is granted to download and print the materials on this website for personal, non-commercial use only, and to display it on your personal computer provided you do not modify the materials and that you retain all copyright notices contained in the materials. By downloading content from our website, you accept the terms of this agreement.
DNSSEC: Transcript
Lutz Donnerhacke db089309 1c1c 6311 ef09 d819 e029 65be bfb6 c9cb dig dnssec 165375146394e164arpa naptr A protocol from better times An ancient protocol People were. Eric Osterweil. Dan Massey. Lixia Zhang. 1. Motivation: Why Use DNSSEC?. DNS cache poisoning has been a known attack against DNS since the 1990s [1]. Now there is a new variant: the . Kaminsky. attack. Geoff . Huston & George . Michaelson. . APNICLabs. September 2012. What are the questions?. What proportion of DNS resolvers are DNSSEC-capable?. What proportion of users are using DNSSEC-. validatingDNS. 1. Fundamental Problems of . Network Security. Internet was designed without security in mind. Initial design focused more on how to make it work, than on how to prevent abuses. Initial environment mostly consisted of research institutions---assumption on the benign behaviors of users. Michaelson. . APNICLabs. September 2012. What are the questions?. What proportion of DNS resolvers are DNSSEC-capable?. What proportion of users are using DNSSEC-. validatingDNS. resolvers?. Where are these users?. . 2013 . 12 June. . 2013. j. ohn.crain. @icann.org. DNS Basics. DNS converts names (www.uob.com.sg) to numbers (203.116.108.5). ..to identify services such as www and e-mail. ..that identify and link customers to business and visa versa. OAS-CICTE REMJA/OAS WEF Cyber Crime Workshop, Montevideo, Uruguay. 10 July 2012. r. ichard.lamb@icann.org. What is ICANN?. IANA function . coordinate unique identifiers (root and top-level domain names, IP address allocation, protocol number assignments, time zone database, other…). Jan . Žorž. , Internet Society. zorz@isoc.org. . Acknowledgement. I would like to thank Internet Society to let me spend some of my ISOC working time in go6lab and test all this new and exciting protocols and mechanisms that makes Internet a bit better and more secure place. Geoff Huston. October 2020. Three broad topics:. DNSSEC. DNS Privacy. Other Stuff. 1. DNSSEC – Why?. How can you believe what the DNS tells you?. You can’t!. DNS interception and rewriting is common these days. Chief Scientist . APNIC Labs. Why pick on the DNS?. The DNS is very . easy . to. tap . and. tamper. DNS queries are open and unencrypted. DNS payloads are not secured and tampering cannot be detected. James Richards, Researcher. Nominet. What are we studying?. Many DNSSEC deployment studies focus on lists of domains such as those occurring in popular lists or TLDs.. Users are rarely delivered website content from one single domain name – often multiple domains are utilized. Huston. APNIC. February 2014. The E. volution of Evil. It used to be that . they sent . evil packets to . their . chosen . victim. but this exposed the attacker, and limited the damage they could cause. Internet Protocol address uniquely identifies laptops or phones or other devices . The Domain Name System matches IP addresses with a name. IP routing and DNS are the underpinning of unified Internet. in today’s Internet. Geoff Huston. APNIC . June 2016. What is being measured?. Clients who will perform DNSSEC validation of a domain name. Using RSA/SHA-1 as the crypto algorithm. Who will not resolve a badly-signed domain name. ‹#›. rzhung. Purpose. The goal is to build a complete DNS in intranet, which may include D. NS Delegation, . Authoritative-Only DNS, DNSSEC, Resolver, etc.. Know what you should know about configuring and managing of these services..
Download Document
Here is the link to download the presentation.
"DNSSEC"The content belongs to its owner. You may download and print it for personal use, without modification, and keep all copyright notices. By downloading, you agree to these terms.
Related Documents