[Boards: 3 / a / aco / adv / an / asp / b / biz / c / cgl / ck / cm / co / d / diy / e / fa / fit / g / gd / gif / h / hc / his / hm / hr / i / ic / int / jp / k / lgbt / lit / m / mlp / mu / n / news / o / out / p / po / pol / qa / r / r9k / s / s4s / sci / soc / sp / t / tg / toy / trash / trv / tv / u / v / vg / vp / vr / w / wg / wsg / wsr / x / y ] [Home]
4chanarchives logo
DNS security
Images are sometimes not shown due to bandwidth/network limitations. Refreshing the page usually helps.

You are currently reading a thread in /g/ - Technology

Thread replies: 16
Thread images: 1
Who DNSSEC[1][2] here? Why do you use it? What do you use it for? Have you considered TLSA (DANE[3]), SSHFP[4], OPENPGPKEY[5] RRs yet? Discuss.

Perhaps you also use DNSCrypt[6] for encryption of your queries? Or maybe you like to encrypt everything and you're running DNSCurve[7]?

Newbies section:
>If you're thinking about registering your own domain, check if they offer DNSSEC. Some registrars automatically sign your zone, which means you most likely can already add your TLSA RRs and such. Other registrars offer to upload your DS RR, or your KSK/ZSK's public key instead. That's also nice if you wish to host your authoritative name server yourself.

There's also an interesting new IETF draft, SMTP STS[8]. Would be interesting to secure your MTA more.

Previous thread here >>53750700

[1] https://tools.ietf.org/html/rfc4033
[2] http://www.dnssec.net/
[3] https://tools.ietf.org/html/rfc6698
[4] https://tools.ietf.org/html/rfc4255
[5] https://tools.ietf.org/html/draft-ietf-dane-openpgpkey-08
[6] https://www.dnscrypt.org/
[7] https://dnscurve.org/
[8] https://tools.ietf.org/html/draft-margolis-smtp-sts-00
>>
Dnscrypt proxy here, at least I was until it started fucking about on xubuntu
Tried the autoinstall script but that is a plain fail
Shit needs some proper package maintainers
>>
>>53759154
>If Mallory has access to the parent's key, it easily could. You need some level of access to the parent's key to be able to register domains at all. A system can't work if you cannot use it.
But Mallory wouldn't, unless you don't trust the parent TLD.

>This is just X.509 in disguise. As soon as you give the power to register new certificates to a CA, anybody who infiltrates or controls the CA can use it to forge new certificates.
This is always the case in a hierarchical trust model, not X.509 specifically (just characteristically).

>There's no fundamental way around this limitation. The moment you trust a third party to verify your authenticity, you've given power over your authenticity to said third party.
I understand your concern, but this the trust model itself you have a problem with. Though, a fully distributed peer to peer system such as NameCoin has other issues, like an fast growing blockchain, or a majority in computational power.
>>
My domains have it but I have no idea what it is.
>>
>>53841949
There are already packages for Ubuntu, though: http://packages.ubuntu.com/search?suite=all&searchon=names&keywords=dnscrypt
>>
>>53841985
DNSSEC adds cryptographic security to thwart tampering, forgery, or impersonation attacks. Authoritative name servers do so by using asymmetrical cryptography to sign their complete RRsets for which they are authoritative.

In short, when you want to resolve example.net, your resolving name server checks the added signatures (RRSIGs) to see if the response of the authoritative name server has not been tampered with.
>>
>>53841985
Then start using it. :-)
>>
Already got TLSA RRs for my web server, and I just added HPKP. This is a little out of scope and not really related to DNS, but which certificates should I pin? I'm currently pinning my root CA cert, the intermediate CA cert, and my own cert.
>>
I used dnscrypt for maybe a month. Then I realized it slowed my lookup times to a crawl,and completely fucked over my ping while playing games.(Normally around 35 ping, was at 300+)

This is considering I used the closest server they had. oh well
>>
>>53843472
Then your problem is not DNSCrypt itself. A lookup is done once and gets cached for future lookups. A latency of 300 is not explained by using DNSCrypt, because all traffic is sent directly to the server which name you just resolved.
>>
>>53843390
I'm less experienced with HPKP, but I think that depends on you. You should only pin certificates in your chain that you fully trust, which you most likely do already because otherwise you wouldn't have a CA sign your certificate in the first place. X.509 is a hierarchical trust model anyway, so this makes sense.
>>
>>53842010
Which are broken and don't install properly and don't even uninstall properly
>>
>>53844666
That sucks, you sure? I wouldn't know since I don't use Ubuntu myself. I'd suggest to submit a bug report.
>>
I use hardened unbound + 2 instances of DNScrypt for redundancy

don't want any semi competent mitm to see that I visit 4chang
>>
>>53844727
I did but no one took any fucking notice. Just hope Jedi sct1 or whatever that faggot's name is will fix up a good version, I don't even mind compiling my own as long as it doesn't dick around
>>
>>53846886
If the package doesn't work as expected, the package maintainer from Ubuntu (or Debian) may have made a mistake. If it doesn't work after successful compiling the source code directly, then the developer might have messed up.

So have you compiled the source code and tested that one as well? If it works, update your bug report. If it doesn't, open a new bug report but this time on the developer's GitHub.
Thread replies: 16
Thread images: 1

banner
banner
[Boards: 3 / a / aco / adv / an / asp / b / biz / c / cgl / ck / cm / co / d / diy / e / fa / fit / g / gd / gif / h / hc / his / hm / hr / i / ic / int / jp / k / lgbt / lit / m / mlp / mu / n / news / o / out / p / po / pol / qa / r / r9k / s / s4s / sci / soc / sp / t / tg / toy / trash / trv / tv / u / v / vg / vp / vr / w / wg / wsg / wsr / x / y] [Home]

All trademarks and copyrights on this page are owned by their respective parties. Images uploaded are the responsibility of the Poster. Comments are owned by the Poster.
If a post contains personal/copyrighted/illegal content you can contact me at [email protected] with that post and thread number and it will be removed as soon as possible.
DMCA Content Takedown via dmca.com
All images are hosted on imgur.com, send takedown notices to them.
This is a 4chan archive - all of the content originated from them. If you need IP information for a Poster - you need to contact them. This website shows only archived content.