Skip to content
  • Categories
  • Recent
  • Tags
  • Popular
  • World
  • Users
  • Groups
Skins
  • Light
  • Brite
  • Cerulean
  • Cosmo
  • Flatly
  • Journal
  • Litera
  • Lumen
  • Lux
  • Materia
  • Minty
  • Morph
  • Pulse
  • Sandstone
  • Simplex
  • Sketchy
  • Spacelab
  • United
  • Yeti
  • Zephyr
  • Dark
  • Cyborg
  • Darkly
  • Quartz
  • Slate
  • Solar
  • Superhero
  • Vapor

  • Default (Cyborg)
  • No Skin
Collapse
Brand Logo

CIRCLE WITH A DOT

  1. Home
  2. Uncategorized
  3. I felt a great disturbance in the Force, as if millions of domains suddenly cried out in terror and were suddenly silenced.

I felt a great disturbance in the Force, as if millions of domains suddenly cried out in terror and were suddenly silenced.

Scheduled Pinned Locked Moved Uncategorized
dnsdnssecdenic
8 Posts 3 Posters 24 Views
  • Oldest to Newest
  • Newest to Oldest
  • Most Votes
Reply
  • Reply as topic
Log in to reply
This topic has been deleted. Only users with topic management privileges can see it.
  • masek@infosec.exchangeM This user is from outside of this forum
    masek@infosec.exchangeM This user is from outside of this forum
    masek@infosec.exchange
    wrote last edited by
    #1

    I felt a great disturbance in the Force, as if millions of domains suddenly cried out in terror and were suddenly silenced.

    The .de TLD is the third largest in the world with ~18 million domains. All DNSSEC-aware resolvers didn’t serve any of those.

    We just cancelled the Major Incident and sent everyone to bed. The remaining impact is outside our sphere of influence.

    #dns #dnssec #denic

    Link Preview Image
    S karlauerbach@sfba.socialK masek@infosec.exchangeM 3 Replies Last reply
    0
    • masek@infosec.exchangeM masek@infosec.exchange

      I felt a great disturbance in the Force, as if millions of domains suddenly cried out in terror and were suddenly silenced.

      The .de TLD is the third largest in the world with ~18 million domains. All DNSSEC-aware resolvers didn’t serve any of those.

      We just cancelled the Major Incident and sent everyone to bed. The remaining impact is outside our sphere of influence.

      #dns #dnssec #denic

      Link Preview Image
      S This user is from outside of this forum
      S This user is from outside of this forum
      spacelifeform@infosec.exchange
      wrote last edited by
      #2

      @masek

      If only DNS was decentraiised

      1 Reply Last reply
      0
      • masek@infosec.exchangeM masek@infosec.exchange

        I felt a great disturbance in the Force, as if millions of domains suddenly cried out in terror and were suddenly silenced.

        The .de TLD is the third largest in the world with ~18 million domains. All DNSSEC-aware resolvers didn’t serve any of those.

        We just cancelled the Major Incident and sent everyone to bed. The remaining impact is outside our sphere of influence.

        #dns #dnssec #denic

        Link Preview Image
        karlauerbach@sfba.socialK This user is from outside of this forum
        karlauerbach@sfba.socialK This user is from outside of this forum
        karlauerbach@sfba.social
        wrote last edited by
        #3

        @masek Details?

        Were these DNSSEC aware resolvers returning no-such domain responses?

        Was there an error in the signing?

        What tools are proving useful in understanding and diagnosing the issue?

        masek@infosec.exchangeM 2 Replies Last reply
        0
        • masek@infosec.exchangeM masek@infosec.exchange

          I felt a great disturbance in the Force, as if millions of domains suddenly cried out in terror and were suddenly silenced.

          The .de TLD is the third largest in the world with ~18 million domains. All DNSSEC-aware resolvers didn’t serve any of those.

          We just cancelled the Major Incident and sent everyone to bed. The remaining impact is outside our sphere of influence.

          #dns #dnssec #denic

          Link Preview Image
          masek@infosec.exchangeM This user is from outside of this forum
          masek@infosec.exchangeM This user is from outside of this forum
          masek@infosec.exchange
          wrote last edited by
          #4

          I am still speechless about the incident. That is something that should have been impossible to happen at that level.

          Personally, I really felt a disturbance in the force.

          1 Reply Last reply
          0
          • karlauerbach@sfba.socialK karlauerbach@sfba.social

            @masek Details?

            Were these DNSSEC aware resolvers returning no-such domain responses?

            Was there an error in the signing?

            What tools are proving useful in understanding and diagnosing the issue?

            masek@infosec.exchangeM This user is from outside of this forum
            masek@infosec.exchangeM This user is from outside of this forum
            masek@infosec.exchange
            wrote last edited by
            #5

            @karlauerbach I will send an update later today. There is no word about the root cause yet. I am deeply disturbed.

            1 Reply Last reply
            0
            • karlauerbach@sfba.socialK karlauerbach@sfba.social

              @masek Details?

              Were these DNSSEC aware resolvers returning no-such domain responses?

              Was there an error in the signing?

              What tools are proving useful in understanding and diagnosing the issue?

              masek@infosec.exchangeM This user is from outside of this forum
              masek@infosec.exchangeM This user is from outside of this forum
              masek@infosec.exchange
              wrote last edited by
              #6

              @karlauerbach Technically it was quite simple: they suddenly used a new ZSK (zone signing key) nobody else (especially the root NS) knew nothing about and killed the trust chain.

              Every DNSSEC aware resolver refused to resolve any .de domain.

              Workaround was that a hell lot of ISPs disabled DNSSEC on their resolvers.

              They needed 150min to fix that problem (revert to the old ZSK), they didn't say a word about the cause yet.

              An utter and complete shitshow.

              karlauerbach@sfba.socialK 1 Reply Last reply
              0
              • masek@infosec.exchangeM masek@infosec.exchange

                @karlauerbach Technically it was quite simple: they suddenly used a new ZSK (zone signing key) nobody else (especially the root NS) knew nothing about and killed the trust chain.

                Every DNSSEC aware resolver refused to resolve any .de domain.

                Workaround was that a hell lot of ISPs disabled DNSSEC on their resolvers.

                They needed 150min to fix that problem (revert to the old ZSK), they didn't say a word about the cause yet.

                An utter and complete shitshow.

                karlauerbach@sfba.socialK This user is from outside of this forum
                karlauerbach@sfba.socialK This user is from outside of this forum
                karlauerbach@sfba.social
                wrote last edited by
                #7

                @masek That sounds crazy. DNSSEC is a sequence of keys in a hierarchy that starts at the root (or a trust anchor) and works down through the zones. One can't validate a record without that full sequence of keys.

                As long as 20+ years ago when DNSSEC was a baby and I was arguing for competing roots one of the questions was whether DNSSEC tied the name hierarchy to exactly one root zone file - the answer is "yes, sort of" - and whether competing roots could use that with a different set of root NS records in that file - the answer is "yes".

                I was always concerned about the key management - often the most complicated part of any crypto system - and I had faith in people like Patrick F. to figure it out (they did.)

                I thought that ICANN and the ORSC had gone over and carefully rehearsed key updates and roll over procedures.

                I was just, this week, discussing with ICANN folk about my 20 year old idea of establishing a worldwide DNS early warning system.

                masek@infosec.exchangeM 1 Reply Last reply
                0
                • karlauerbach@sfba.socialK karlauerbach@sfba.social

                  @masek That sounds crazy. DNSSEC is a sequence of keys in a hierarchy that starts at the root (or a trust anchor) and works down through the zones. One can't validate a record without that full sequence of keys.

                  As long as 20+ years ago when DNSSEC was a baby and I was arguing for competing roots one of the questions was whether DNSSEC tied the name hierarchy to exactly one root zone file - the answer is "yes, sort of" - and whether competing roots could use that with a different set of root NS records in that file - the answer is "yes".

                  I was always concerned about the key management - often the most complicated part of any crypto system - and I had faith in people like Patrick F. to figure it out (they did.)

                  I thought that ICANN and the ORSC had gone over and carefully rehearsed key updates and roll over procedures.

                  I was just, this week, discussing with ICANN folk about my 20 year old idea of establishing a worldwide DNS early warning system.

                  masek@infosec.exchangeM This user is from outside of this forum
                  masek@infosec.exchangeM This user is from outside of this forum
                  masek@infosec.exchange
                  wrote last edited by
                  #8

                  @karlauerbach There are some very German points to this. The operational instance belongs de facto to domain traders.

                  I will push for more information.

                  1 Reply Last reply
                  1
                  0
                  • R relay@relay.infosec.exchange shared this topic
                  Reply
                  • Reply as topic
                  Log in to reply
                  • Oldest to Newest
                  • Newest to Oldest
                  • Most Votes


                  • Login

                  • Login or register to search.
                  • First post
                    Last post
                  0
                  • Categories
                  • Recent
                  • Tags
                  • Popular
                  • World
                  • Users
                  • Groups