TE
TechEcho
Home24h TopNewestBestAskShowJobs
GitHubTwitter
Home

TechEcho

A tech news platform built with Next.js, providing global tech news and discussions.

GitHubTwitter

Home

HomeNewestBestAskShowJobs

Resources

HackerNews APIOriginal HackerNewsNext.js

© 2025 TechEcho. All rights reserved.

A lock with many keys: Spoofing DNSSEC-signed domains in 8.8.8.8

133 pointsby sintaxabout 3 years ago

4 comments

teddyhabout 3 years ago
TLDR: Google Public DNS would, until 23 February, not check that the ZSK (signing key used to sign DNSSEC DNS responses) was in turn signed by the KSK. Google would accept any signed response, by any ZSK. Even worse, they would cache this response, and present it to end users as being non-DNSSEC signed.<p>Upon further testing, only Google was found to have had this problem.
评论 #30655055 未加载
dutchmartinabout 3 years ago
Very cool to see a SIDN labs post here. SIDN operates the .nl extension and puts the money earned into these kinds of research projects that benefit everyone.
评论 #30652016 未加载
jzer0coolabout 3 years ago
What free or (non-free) DNS services is everyone using?
评论 #30655311 未加载
评论 #30653747 未加载
评论 #30653746 未加载
评论 #30654466 未加载
评论 #30655692 未加载
评论 #30654725 未加载
评论 #30658959 未加载
评论 #30662850 未加载
rvzabout 3 years ago
&gt; For reporting this bug, we received $5,000 from Google&#x27;s bug bounty programme.<p>Excuse me?<p>That&#x27;s quite an urgent and serious bug and I&#x27;m afraid that is too low, especially from a $1TN dollar company with billions of users.
评论 #30652848 未加载
评论 #30654645 未加载
评论 #30658242 未加载
评论 #30652861 未加载
评论 #30653203 未加载