DNSSEC

Updated 44 days ago
  • ID: 51949232/25
DNS was designed in the 1980s when the Internet was much smaller, and security was not a primary consideration in its design. As a result, when a recursive resolver sends a query to an authoritative name server, the resolver has no way to verify the authenticity of the response. The resolver can only check that a response appears to come from the same IP address where the resolver sent the original query. But relying on the source IP address of a response is not a strong authentication mechanism, since the source IP address of a DNS response packet can be easily forged, or spoofed. As DNS was originally designed, a resolver cannot easily detect a forged response to one of its queries. An attacker can easily masquerade as the authoritative server that a resolver originally queried by spoofing a response that appears to come from that authoritative server. In other words an attacker can redirect a user to a potentially malicious site without the user realizing it... DNSSEC technology..
  • 0
  • 0
Interest Score
3
HIT Score
0.00
Domain
dnssec.uz

Actual
dnssec.uz

IP
91.212.89.138

Status
OK

Category
Company

People Also Viewed


  1. DRAHTSEILWERK - drahtseilwerk.de
  2. DCC TRAINING - dcc-training.com
  3. GITHUB - github.com
  4. I-ACS - i-acs.us
  5. SEPTICRESPONSE.COM - septicresponse.com
0 comments Add a comment