DNSSec Explained

  Рет қаралды 73,156

Daniel Benway

Daniel Benway

Күн бұрын

Пікірлер: 60
@keerthisreenivaskonjety1897
@keerthisreenivaskonjety1897 7 ай бұрын
I was looking up for your blog. RIP, you are making an impact event after you left this world! amazing explanation.
@luislo01
@luislo01 6 жыл бұрын
Terribly good explained. There are tons of videos pretending to explain DNSSec, yours do it for real!!! Very well done. Thanks a lot.
@pstz_800
@pstz_800 3 ай бұрын
Thank you, Daniel, nobody opened DNSSEC like you. Thanks a million ❤
@chennaikidi
@chennaikidi 5 жыл бұрын
Very well presented. Have seen a lot of content for DNSSec but havent found anything as clear and concise as this.
@rafafilho11
@rafafilho11 3 жыл бұрын
Great explanation, I lost some hours trying to understand the DNSSec and now, I got everything I need. Thanks for the good material.
@Protonumus
@Protonumus 4 жыл бұрын
Great job interpreting DNSSec for secure domains. Google's future prospects on the Internet include encryption - a secure connection (HTTPS) is required for all websites. Google has implemented unsafe warnings for domains. Google will block (HTTP) domains next year or so.
@Pedro-fd9tv
@Pedro-fd9tv Жыл бұрын
Best video on the subject, thank you for the explanation.
@Ali-ok8yn
@Ali-ok8yn 3 жыл бұрын
The best explanation of DNSSEC on youtube
@thebpandey
@thebpandey 7 жыл бұрын
This was great! Clear explanations.Thanks for taking the time to make this.
@tomasplachy884
@tomasplachy884 4 жыл бұрын
This is a great video, but it would be even better, if you highlighted the parts you are currently talking about (since it is a bit difficoult to orientate in all the items). Anyway thanks for the explanation, it helped a lot.
@dahomie1620
@dahomie1620 2 жыл бұрын
Awesome thanks for helping my understand dnssec better!
@threeone6012
@threeone6012 3 жыл бұрын
Fantastic explanation! Somebody needs to put you in charge of something. You know what you're talking about.
@vinylshetty1
@vinylshetty1 4 жыл бұрын
very good video. cleared the concept . cloudflare also has some good articles / blogs written on dnssec and complexities it brings in.this video and those blogs should be good starting point for everyone
@colunizator
@colunizator 6 жыл бұрын
Yooo man You are the real MVP Current MCSA books don't give a thing about this terminology and explanation Edit: I don't have any DNS practice, and i was struggling understanding DNSSEC from 70-741 exam Thanks a lot
@KartikGajaria
@KartikGajaria Жыл бұрын
Thanks for such a simple and clear explanation.
@123norway
@123norway Жыл бұрын
A very clear explanation! Thank you good sir!
@nahdude2457
@nahdude2457 5 жыл бұрын
A goog presentation does not make its presenter obsolete. This does! A more visually supportive presentation would have been miles better and easier to create.
@fantuznet
@fantuznet 6 жыл бұрын
bravo! clear, quick, intense. interetesting !
@IPv6people
@IPv6people 2 жыл бұрын
Thanks indeed for this explanation. DNSSEC still does not give the impression of a simple system. Could that be the reason for the limited implementation?
@faazk
@faazk 7 жыл бұрын
Does this mean dnssec is not depended on HTTPS digital signatures? so digital signatures we receive on HTTPS are different to digital certificate of DNSSEC?
@CyberJuke5
@CyberJuke5 8 ай бұрын
If there's a malicious server pretending to be the original one, isn't there a way to know the difference between them, for example, in the URL?
@alientezam18
@alientezam18 4 жыл бұрын
Very well explained. Thank you !!!
@dankierson
@dankierson 4 ай бұрын
You have to study this to get it all but the gist of it is clear - DNSSEC makes it harder to hijack a web request by having domain name servers retain records for a domain that allow an independent server to validate it before the user connects with it.
@PETAJOULE543
@PETAJOULE543 5 жыл бұрын
Motivation of DNSSEC and also its detailed explanation. Also, the difference between iterative and recursive dns queries.
@saraibrown9649
@saraibrown9649 3 жыл бұрын
Great video but I would recommend raising the volume a bit. I struggled to hear you even with my volume all the way up. I appreciate the effort regardless!
@sheikhbaseer3799
@sheikhbaseer3799 4 жыл бұрын
Awesome Explanation...Kudos.
@peterc.7841
@peterc.7841 Жыл бұрын
Thanks so much, very helpful. If it's still completely valid, you may want to upload it afresh, to have a newer date.
@cloudbuddytechsource8532
@cloudbuddytechsource8532 3 жыл бұрын
Daniel, can you please share the reference/blog links. your information really helped a lot. Great work 👍
@artistsingerwriterproducer8288
@artistsingerwriterproducer8288 3 ай бұрын
Is it good or bad for an exclusive life?
@fbifido2
@fbifido2 6 жыл бұрын
@9:02 why not just encrypt the request with the root pubksk, then send it to the root server, with your own public-key?
@allanjoarder27
@allanjoarder27 8 жыл бұрын
Thank you for the awesome explanation!
@jpdstan
@jpdstan 8 жыл бұрын
Very well made slides! Although I don't really think there's a point to making this a video/narrating over it if you just read completely off the slides.
@Valdemore4
@Valdemore4 3 жыл бұрын
Great video
@asheesha68
@asheesha68 2 жыл бұрын
Very nice presentation.. but perhaps you forgot to explain what is DNSKey
@preetidutta5660
@preetidutta5660 6 жыл бұрын
Awesome slides Daniel
@hamidullahmuslih6301
@hamidullahmuslih6301 5 жыл бұрын
thank you sooooo much that was awesome
@pear7777
@pear7777 Жыл бұрын
"Who needs it?" "Everyone!"
@fbifido2
@fbifido2 6 жыл бұрын
why can't the Root zone, be the one to comunicate to the TLD, then the TLD comminicate with the DBL zone, all using dnssec, then the root reply with the correct answer?
@Stilgarsan
@Stilgarsan 6 жыл бұрын
This would put extra strain on the root servers. The DNS protocol is designed to avoid such things.
@v1rtu4l
@v1rtu4l 7 жыл бұрын
on 4:05 your picture says that Jamie Lee does decrypt a digest encrypted by Arnolds private key by using Arnold's public key. By definition you can not decrypt with a public Key. i think you meant that Jamie Lee does encrypt the hash of the sent document and then compare that to the send encrypted digest. am i right ?
@Sevlowwolf
@Sevlowwolf 6 жыл бұрын
I'm a little confused by this question. in asymmetrical cryptography you encrypt something using your own private key, then can send it to whomever you like and include your public key. In the example Jamie Lee can then run his own hash on the document, and run another hash on the decrypted digest using the public key and if they both match, this ensures integrity.
@pazi95
@pazi95 6 жыл бұрын
I think the correct terminology should have been that Arnold generates a digital signature using his private key, and then Jamie Lee verifies that signature using Arnold's public key. For encryption, the key pair would be used the opposite way, the public key is used to encrypt which can then be decrypted using the private key.
@GoldenGecko
@GoldenGecko 2 жыл бұрын
good stuff
@ianporter9740
@ianporter9740 3 жыл бұрын
"special shoutout to al gore" omegalul xDD
@valentecaio
@valentecaio 3 жыл бұрын
thanks a lot!
@emiltarandash5056
@emiltarandash5056 6 жыл бұрын
Very complicated explanation, not so clear. Lacks some real examples including real keys and records. Too theoretical
@TheHynky
@TheHynky 7 жыл бұрын
Great video even dummy as me got it.
@quadraticfunction8045
@quadraticfunction8045 5 жыл бұрын
Good attempt and appreciate your effort , BUT the font on slides is so hard to read and wrong colour scheme used for the diagrams.
@bevo260578
@bevo260578 3 жыл бұрын
cool
@miriyalajeevankumar5449
@miriyalajeevankumar5449 5 жыл бұрын
DNS sec starts at kzbin.info/www/bejne/lWmwkKmre8iXkLc
@Timm2003
@Timm2003 7 күн бұрын
RIP
@fbifido2
@fbifido2 6 жыл бұрын
very low volume+++++++++++
@mcnogard1552
@mcnogard1552 8 жыл бұрын
(deleted)
@mcnogard1552
@mcnogard1552 8 жыл бұрын
3:24 I disagree with this. If Arnold hash using Arnolds private key, then everyone can decrypt Arnolds message with Arnolds public key.
@mcnogard1552
@mcnogard1552 8 жыл бұрын
What should have happened is that Arnold use Jamie Lee's public key to hash his message, then Jamie Lee can open the message with his private key. But nobody else can see the message.
@danielbenway6599
@danielbenway6599 8 жыл бұрын
I’m afraid you’re incorrect. If you do a little bit more research, I think you’ll see why.It seems that you might be confusing the asymmetric key encryption (public key encryption) of a document with the digital signing of a document.Next, consider the following thought experiment: if Arnold wanted to digitally sign an unencrypted document and then give it to millions of different recipients, how would he sign that document?Lastly, I prefer to answer these questions on my blog.Thanks, and have a great day!
@mcnogard1552
@mcnogard1552 8 жыл бұрын
So DNSsec is not using RSA for signing?
DNS 101 Miniseries - #6 - How DNSSEC Works within a Zone
17:35
LearnCantrill
Рет қаралды 21 М.
What is DNSSEC (Domain Name System Security Extensions)?
11:17
IBM Technology
Рет қаралды 10 М.
小丑揭穿坏人的阴谋 #小丑 #天使 #shorts
00:35
好人小丑
Рет қаралды 42 МЛН
the balloon deflated while it was flying #tiktok
00:19
Анастасия Тарасова
Рет қаралды 36 МЛН
Who's spending her birthday with Harley Quinn on halloween?#Harley Quinn #joker
01:00
Harley Quinn with the Joker
Рет қаралды 19 МЛН
DNSSEC  What it is and what it isn't
40:38
NANOG
Рет қаралды 7 М.
DNS Cache Poisoning - Computerphile
11:04
Computerphile
Рет қаралды 306 М.
DNS Records Explained
14:14
PowerCert Animated Videos
Рет қаралды 332 М.
DNS Enumeration Tutorial - Dig, Nslookup & Host
20:52
HackerSploit
Рет қаралды 122 М.
Что такое DNSSEC? Из-за него сломался интернет.
6:59
Мир IT с Антоном Павленко
Рет қаралды 7 М.
Introduction To DNS and DNSSEC
21:34
Tim Rooney
Рет қаралды 62 М.
What is DNS? (and how it makes the Internet work)
24:22
NetworkChuck
Рет қаралды 236 М.
DNS 101 Miniseries - #5 - Why do we need DNSSEC
11:09
LearnCantrill
Рет қаралды 14 М.
DNS Security Overview
1:01:25
Wes Hardaker
Рет қаралды 4,1 М.
DNSSEC Overview
8:48
F5 DevCentral
Рет қаралды 106 М.
小丑揭穿坏人的阴谋 #小丑 #天使 #shorts
00:35
好人小丑
Рет қаралды 42 МЛН