SYS.MEM.ALLOC
0x0000
NET.UPLINK
ESTABLISHING
SEC.PROTOCOL
AWAITING
DATA.STREAM
0.0.0.0
0%
INITIALIZING SYSTEM
[
]
Portfolio Learn Month 02 Networking Basics

🛡️ Day 12: DNSSEC

Networking DNS DNSSEC

Domain Name System Security Extensions (DNSSEC) is a security system created to add digital signatures to DNS entries. It ensures that the "phone book of the internet" cannot be forged by hackers. 🛡️


What is DNSSEC?

How does it work?

To understand DNSSEC, think of Wax Seals used on ancient royal letters.

When you search for a website, a DNS request is made to find the IP address of that domain.

An attacker might try to alter this mapping to send you to a fake site:

To prevent this, DNSSEC uses Asymmetric Encryption. Every domain owner has a Private Key (kept secret) and a Public Key (shared with everyone). The DNS mapping is signed using that Private Key to create a digital signature called an RRSIG (Resource Record Signature).


DNS Replies: Before vs. After DNSSEC

Before DNSSEC (Unsecured) After DNSSEC (Secured)
example.com10.10.10.10 example.com10.10.10.10
RRSIG (Signature): AB23JKD432K

The Authentication Process

In a modern secure DNS reply, the information is "wax sealed."

  1. The Stamp: The Private Key is the secret "stamp" held by the domain owner.
  2. The Public Key: The DNSKEY (Public Key) is sent along with the DNS reply.
  3. The Algorithm: A code is included to tell the computer which mathematical "recipe" (like RSA) was used.
  4. The Verification: The computer takes the IP Address + the DNSKEY and performs the algorithm.
  5. The Match: The result is compared to the RRSIG.
    • If it matches: The reply is valid and the website opens.
    • If it doesn't match: The reply is discarded as a fake.

How does the computer know the DNSKEY is real?

A hacker could send a fake Public Key, too. To prevent this, the computer uses a system called the Chain of Trust.

The Three Phases of the Chain: