Home > Research > Publications & Outputs > DNSSEC Misconfigurations in Popular Domains

Links

Text available via DOI:

View graph of relations

DNSSEC Misconfigurations in Popular Domains

Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

Published
Close
Publication date28/10/2016
Host publicationCryptology and Network Security. CANS 2016.
EditorsSara Foresti, Giuseppe Persiano
Place of PublicationCham
PublisherSpringer
Pages651-660
Number of pages10
ISBN (electronic)9783319489650
ISBN (print)9783319489643
<mark>Original language</mark>English

Publication series

NameLecture Notes in Computer Science
PublisherSpringer
Volume10052
ISSN (Print)0302-9743
ISSN (electronic)1611-3349

Abstract

DNSSEC was designed to protect the Domain Name System (DNS) against DNS cache poisoning and domain hijacking. When widely adopted, DNSSEC is expected to facilitate a multitude of future applications and systems, as well as security mechanisms, that would use the DNS for distribution of security tokens, such as, certificates, IP prefix authentication for routing security, anti-spam mechanisms. Multiple efforts are invested in adopting DNSSEC and in evaluating challenges towards its deployment.

In this work we perform a study of errors and misconfigurations in signed domains. To that end, we develop a DNSSEC framework and a webpage for reporting the most up to date statistics and provide reports with vulnerabilities and misconfigurations. Our tool also supports retrieval of historical data and enables to perform long-term studies and observations of changes in the security landscape of DNS. We make our tool and the collected data available via an online webservice.