DNS 101 Miniseries - #5 - Why do we need DNSSEC

Поделиться
HTML-код
  • Опубликовано: 15 окт 2024
  • DNSSEC strengthens authentication in DNS using digital signatures based on public key cryptography. With DNSSEC, it's not DNS queries and responses themselves that are cryptographically signed, but rather DNS data itself is signed by the owner of the data.
    This video steps through what benefits DNSSEC provides and one of the common attacks which can be conducted against DNS.
    ▶Hashing: • Hashing - what it is, ...
    ▶Digital Signatures: • Digital Signatures - D...
    ▶ Check out my full range of content at learn.cantrill.io
    ▶ Join the best online technical study community techstudyslack...
    FOLLOW ME 😺
    ▶ Twitter: / adriancantrill
    ▶ RUclips: / learncantrill
    OTHER VIDEOS AND PLAYLISTS 🎞
    ▶ Network Fundamentals • Networking Fundamentals
    ▶ Technical Fundamentals • Technical Fundamentals
    ▶ AWS Fundamentals • AWS Fundamentals
    ▶ Course Intros • learn.cantrill.io - Co...
    ▶ Exam Question Practice • AWS Exam Question Walk...
    ▶ MINI PROJECT - Hybrid DNS • Mini Project - Hybrid ...
    ▶ MINI PROJECT - Advanced VPN • Mini-project - Advance...
    ▶ MINI PROJECT - Pet Cuddle O Tron • Mini-project - Pet-Cud...
    ▶ MINI PROJECT - Web Identity Federation • Mini-project - Simple ...
    ▶ MINI PROJECT - Architecture Evolution • Mini-project - Applica...
    ▶ MINI PROJECT - Cat Pipeline • Mini Project - CatPipe...
    ▶ Best Videos • Best Videos
    All rights reserved © 2022 Adrian Cantrill

Комментарии • 18

  • @rameeskr
    @rameeskr 2 года назад +19

    This channel is a gem and I hate youtube algorithm for delaying me finding this.

    • @LearnCantrill
      @LearnCantrill  2 года назад +2

      thanks :) help me spread the word.

  • @TheBettinaNYC
    @TheBettinaNYC 2 года назад +4

    I’ve been following these videos for 3 days and this is the easiest I’ve learned in 10 years as a tech engineer and I work for Microsoft

    • @LearnCantrill
      @LearnCantrill  2 года назад

      Thanks Bettina I really appreciate the feedback. Feel free to share these videos around - they’re my way of giving back so I want them in front of all the people ;)

  • @MorbidPasta
    @MorbidPasta Год назад +3

    I think youtube fixed their algorithm this summer, because now I'm starting to find jewel channels like this. Awesome stuff

    • @LearnCantrill
      @LearnCantrill  Год назад

      Please share it around on social media. It really helps.

  • @billclintonj
    @billclintonj 5 месяцев назад

    I have watched several videos about DNSSEC but nothing gave crystal clear explanations as this one. I like the graphics used as well.
    Thank you very much for your effort! 💚

  • @samadbouss8842
    @samadbouss8842 7 месяцев назад

    Clearly the best tutorial on the cloud. Very well structured and explained. Give this m’en the Oscar

  • @hayahamdan-d6r
    @hayahamdan-d6r 4 месяца назад

    Thank You for your videos .

  • @yurkko
    @yurkko Год назад

    Thanks for clear explanation! And graphics are very helpful

  • @thkhan
    @thkhan 2 года назад +1

    I love bullet points.I wish you will start to love this also.

  • @marius-mihailionte339
    @marius-mihailionte339 2 года назад +1

    thank you

  • @0.Payang
    @0.Payang 3 месяца назад

    #gov 1billion debt for etsi-iso, internal affair by google, inc permissive law.

  • @datvuong7420
    @datvuong7420 11 месяцев назад

    why does DNS resolver easily except the result from the person who is not pointed by the root sever? at 6:00

    • @void.walker.
      @void.walker. 8 месяцев назад

      (I know it's late, but in case if anyone's wondering) The short answer is that DNS messages are sent through UDP, which is a stateless protocol and the source IP-address is blindly trusted. So if a bad guy has an access to a query traffic, he can spam fake UDP responses pretending to be the authoritative server.
      It's called DNS cache poisoning, though it is difficult to implement but it's possible.