TE
科技回声
首页24小时热榜最新最佳问答展示工作
GitHubTwitter
首页

科技回声

基于 Next.js 构建的科技新闻平台,提供全球科技新闻和讨论内容。

GitHubTwitter

首页

首页最新最佳问答展示工作

资源链接

HackerNews API原版 HackerNewsNext.js

© 2025 科技回声. 版权所有。

A lock with many keys: Spoofing DNSSEC-signed domains in 8.8.8.8

133 点作者 sintax大约 3 年前

4 条评论

teddyh大约 3 年前
TLDR: Google Public DNS would, until 23 February, not check that the ZSK (signing key used to sign DNSSEC DNS responses) was in turn signed by the KSK. Google would accept any signed response, by any ZSK. Even worse, they would cache this response, and present it to end users as being non-DNSSEC signed.<p>Upon further testing, only Google was found to have had this problem.
评论 #30655055 未加载
dutchmartin大约 3 年前
Very cool to see a SIDN labs post here. SIDN operates the .nl extension and puts the money earned into these kinds of research projects that benefit everyone.
评论 #30652016 未加载
jzer0cool大约 3 年前
What free or (non-free) DNS services is everyone using?
评论 #30655311 未加载
评论 #30653747 未加载
评论 #30653746 未加载
评论 #30654466 未加载
评论 #30655692 未加载
评论 #30654725 未加载
评论 #30658959 未加载
评论 #30662850 未加载
rvz大约 3 年前
&gt; For reporting this bug, we received $5,000 from Google&#x27;s bug bounty programme.<p>Excuse me?<p>That&#x27;s quite an urgent and serious bug and I&#x27;m afraid that is too low, especially from a $1TN dollar company with billions of users.
评论 #30652848 未加载
评论 #30654645 未加载
评论 #30658242 未加载
评论 #30652861 未加载
评论 #30653203 未加载