Upgrade to Pro
— share decks privately, control downloads, hide ads and more …
Speaker Deck
Features
Speaker Deck
PRO
Sign in
Sign up for free
Search
Search
DNSSEC v2
Search
Sponsored
·
SiteGround - Reliable hosting with speed, security, and support you can count on.
→
Andreas Pfohl
July 27, 2015
Technology
0
55
DNSSEC v2
My second talk about DNSSEC at the Netz39 hackerspace.
Andreas Pfohl
July 27, 2015
Tweet
Share
More Decks by Andreas Pfohl
See All by Andreas Pfohl
The Event Language
apfohl
0
570
Kore
apfohl
0
230
DNSSEC
apfohl
0
170
Domain Name System
apfohl
1
230
FreeBSD
apfohl
0
260
Other Decks in Technology
See All in Technology
~Everything as Codeを諦めない~ 後からCDK
mu7889yoon
3
280
Frontier Agents (Kiro autonomous agent / AWS Security Agent / AWS DevOps Agent) の紹介
msysh
3
150
Sansan Engineering Unit 紹介資料
sansan33
PRO
1
3.8k
15 years with Rails and DDD (AI Edition)
andrzejkrzywda
0
180
Meshy Proプラン課金した
henjin0
0
250
配列に見る bash と zsh の違い
kazzpapa3
1
110
生成AIを活用した音声文字起こしシステムの2つの構築パターンについて
miu_crescent
PRO
1
130
SREじゃなかった僕らがenablingを通じて「SRE実践者」になるまでのリアル / SRE Kaigi 2026
aeonpeople
6
2.2k
プロポーザルに込める段取り八分
shoheimitani
1
180
Cosmos World Foundation Model Platform for Physical AI
takmin
0
430
AWS Network Firewall Proxyを触ってみた
nagisa53
0
150
ブロックテーマ、WordPress でウェブサイトをつくるということ / 2026.02.07 Gifu WordPress Meetup
torounit
0
140
Featured
See All Featured
The SEO Collaboration Effect
kristinabergwall1
0
350
Information Architects: The Missing Link in Design Systems
soysaucechin
0
770
Taking LLMs out of the black box: A practical guide to human-in-the-loop distillation
inesmontani
PRO
3
2k
The Illustrated Guide to Node.js - THAT Conference 2024
reverentgeek
0
250
Designing Powerful Visuals for Engaging Learning
tmiket
0
220
The Success of Rails: Ensuring Growth for the Next 100 Years
eileencodes
47
7.9k
The Impact of AI in SEO - AI Overviews June 2024 Edition
aleyda
5
730
Agile that works and the tools we love
rasmusluckow
331
21k
Getting science done with accelerated Python computing platforms
jacobtomlinson
2
110
Mozcon NYC 2025: Stop Losing SEO Traffic
samtorres
0
140
Visualizing Your Data: Incorporating Mongo into Loggly Infrastructure
mongodb
49
9.9k
DBのスキルで生き残る技術 - AI時代におけるテーブル設計の勘所
soudai
PRO
62
49k
Transcript
DNSSEC von Andreas Pfohl
Überblick • Wiederholung DNS • Was ist DNSSEC? • Was
kann ich mit DNSSEC machen? • Was sind die Probleme von DNSSEC? • Was muss ich tun, um DNSSEC zu nutzen?
• Domain Name System • Namensauflösung • Zone Records DNS
Namensauflösung - DNS www.netz39.de. 78.46.22.20
Records - DNS netz39.de. A 78.46.22.20 netz39.de. MX 10 mail
netz39.de. NS ns1.domain… mail A 78.46.22.20 www CNAME @
DNSSEC • DNS Security Extensions • Authentizität • Integrität
Man in the Middle - DNSSEC Client Nameserver Provider netz39.de.?
netz39.de.? 78.46.22.20 17.142.160.59
Key Man in the Middle - DNSSEC Client Nameserver Provider
netz39.de.? netz39.de.? 78.46.22.20 + Signatur 17.142.160.59 + Signatur Key failed
Schlüssel - DNSSEC • Public Key Cryptography • Zone-Signing-Key •
Key-Signing-Key • Chain of Trust
Chain of Trust - DNSSEC . ZSK DS com. KSK
ZSK DS example.com. KSK ZSK Trust Anchor KSK KSK A
Anwendungen • Sicherer Verbindungsaufbau • Mail Exchange • SSH Fingerprints
• GnuPG Schlüssel • DANE
Mail - Anwendungen • MX Record • Mailserver gehört zur
Domain
SSH - Anwendungen • SSHFP Record • Korrekte SSH-Keys •
Überprüfung bei Verbindungsaufbau
GnuPG - Anwendungen • OPENPGPKEY Record • Public-Keys im DNS
• Domain-Verifizierung
DANE - Anwendungen • DNS-based Auth. of Named Entities •
TLSA Record • Fingerprints von Zertifikaten • Zertifikat gehört zu Server/Port
Probleme • Denial of Service Angriffe • DNS Amplification Attacks
• Zone Walking • Verifizierung
Probleme • Root-Key von USA verwaltet • Hohe Fehlerrate bei
Implementierung • Schwer zu verstehen • Alte Kryptographie
Voraussetzungen • Registrar unterstützt DNSSEC • Registrar trägt DS-Records ein
• Eigene Domain • Eigene Nameserver
OwnDNS.io • Eigene Experimentier-Domain •
[email protected]
• Besseres Verständnis des
DNS • Verbreitung von DNSSEC • Tutorials
Workshop • September 2015 • Eigener Nameserver • Eigene Domain
• DNSSEC
Danke E-Mail:
[email protected]
Twitter: @andreaspfohl