A measurement study of DNSSEC misconfigurations

NLM van Adrichem, N Blenn, A Reyes Lua, X. Wang, M Wasif, Ficky Fatturrahman, F.A. Kuipers

Research output: Contribution to journalArticleScientificpeer-review

Abstract

DNSSEC offers protection against spoofing of DNS data by providing origin authentication, ensuring data integrity and authentication of non-existence by using public-key cryptography. Although the relevance of securing a technology as crucial to the Internet as DNS is obvious, the DNSSEC implementation increases the complexity of the deployed DNS infrastructure, which may result in misconfiguration. In this article, we measure and analyze the misconfigurations for domains in six zones (.bg, .br, .co, .com, .nl and .se). Furthermore, we categorize these misconfigurations and provide an explanation for their possible causes. Finally, we evaluate the effects of misconfigurations on the reachability of a zone’s network. Our results show that, although progress has been made in the implementation of DNSSEC, over 4 % of evaluated domains show misconfigurations. The domains with the most frequently appearing misconfiguration are often hosted at a very limited set of hosting providers. Of these misconfigured domains, almost 75 % were unreachable from a DNSSEC-aware resolver. This illustrates that although the authorities of a domain may think their DNS is secured, it is in fact not. Worse still, misconfigured domains are at risk of being unreachable from the clients who care about and implement DNSSEC verification, while the publisher may remain unaware of the error and its consequences.
Original languageEnglish
Pages (from-to)1-6
Number of pages6
JournalSecurity Informatics
Volume4
Issue number8
DOIs
Publication statusPublished - 19 Oct 2015

Keywords

  • DNS
  • DNSSEC
  • Domain Name System
  • Authentication
  • Integrity
  • Misconfiguration
  • Validation
  • Signatures
  • Error
  • Unreachability

Fingerprint

Dive into the research topics of 'A measurement study of DNSSEC misconfigurations'. Together they form a unique fingerprint.

Cite this