4. Conclusion
In this dossier, we present the architecture and operation of the Domain Name System. The description of the various entities involved in this protocol, as well as the various interactions between these entities, has enabled us to expose the various vulnerabilities of the DNS protocol. In view of these vulnerabilities, it appears that DNS security extensions are a necessity and should soon be widely deployed worldwide to guarantee the integrity and authenticity of DNS data.
DNSSEC is already an operational technology, but a number of problems remain to be solved. In particular, the automatic management of zone keys . Indeed, because of the large number of DNS zones, manual management of zone key consistency is impossible. Solutions are being studied to maintain consistency between zone keys and DS records when an administrator decides to renew...
Exclusive to subscribers. 97% yet to be discovered!
Already subscribed? Log in!
Conclusion
Article included in this offer
"Security of information systems"
(
86 articles
)
Updated and enriched with articles validated by our scientific committees
A set of exclusive tools to complement the resources
References
Exclusive to subscribers. 97% yet to be discovered!
Already subscribed? Log in!