[Discuss] free SSL certs from the EFF
Richard Pieri
richard.pieri at gmail.com
Tue Dec 2 14:14:59 EST 2014
Derek,
According to the DNSSEC specs, if there is no RRSIG record in the lookup
answer then a properly behaved resolver will treat it as unsigned.
Backwards compatibility with so-called insecure DNS is an explicit
requirement of DNSSEC. So, what happens when a malicious actor inserts
filters at an intermediary resolver or router that strip RRSIG records
from DNS answers?
DNSSEC was never intended to protect you against that. It was designed
to protect high-level caches -- root zones, ISP's, big data players,
private networks, and the like -- from cache poisoning. That's it. Any
benefits that might trickle down to you are incidental.
Never mind that DNSSEC has no means of rolling over the root KSKs. If a
root is compromised then the whole domain hierarchy is compromised and
there currently is no way to fix that other than disabling DNSSEC for
the hierarchy or accepting loss of service for everything under that root.
Aside: It's DNSSEC. It is not DNSsec, nor DNS-SEC, nor dns-sec, nor
DNS-sec, nor is it any variant that is not DNSSEC.
--
Rich P.
More information about the Discuss
mailing list