Search
Items tagged with: dnssec
I, humbly, consider myself pretty conversant in the basics of (modern and classical) cryptography and information security.
For most of my career, I've been mystified as to what problem #DNSSEC purports to solve.
Has there ever been a case of a DNS-based attack (spoofing, hijacking, transfer, DDoS, etc) that's been thwarted by DNSSEC? Or, in the reverse, has there been an attack that was successful that DNSSEC would have solved?
I don't know what it is, but the upsides of DNSSEC just hasn't clicked in my brain.
More details about the end of #IPv4 in state services: On 18th of December 2013 Czech #government decided that every service provided by Czech state has to be available on #IPv6 and be protected by #DNSSEC by 30th of June 2015. Yesterday a followed up action has been agreed on. On 6th of June 2032, IPv4 will be disabled on all services offered by Czech republic and they will be only available on IPv6 from that day on. Apart from that, every June starting from 2025, Czech government will get a report on how are the preparations.
Overall seems like a bold move, but I totally support it! IT sends a message, that #IPv4 is over and everybody should move to #IPv6 already. And even government - the definition of conservative and bureaucratic institution - gets it. Then why shouldn't you embrace it 😉
More information in Czech:
https://blog.nic.cz/2024/01/18/kratke-vlny-vladni-restart-podpory-ipv6/
https://blog.nic.cz/2024/01/18/odvazny-krok-ceske-vlady/
Odvážný krok české vlády | Blog zaměstnanců CZ.NIC
Vláda ČR včera přijala významné usnesení, které se týká infrastruktury Internetu, když projednala materiál s názvem „Restart zavádění technologie DNSSEC a protokolu IPv6 ve státní správě“.Ondřej Filip (Blog zaměstnanců CZ.NIC)
Issues reaching RIPE NCC services
RIPE NCC's Status Page - Issues reaching RIPE NCC services.status.ripe.net