4. Conclusion
In this dossier, we present the architecture and operation of the Domain Name System. The description of the various entities involved in this protocol, as well as the various interactions between these entities, has enabled us to expose the various vulnerabilities of the DNS protocol. In view of these vulnerabilities, it appears that DNS security extensions are a necessity and should soon be widely deployed worldwide to guarantee the integrity and authenticity of DNS data.
DNSSEC is already an operational technology, but a number of problems remain to be solved. In particular, the automatic management of zone keys . Indeed, because of the large number of DNS zones, manual management of zone key consistency is impossible. Solutions are being studied to maintain consistency between zone keys and DS records when an administrator decides to renew...
Exclusive to subscribers. 97% yet to be discovered!
You do not have access to this resource.
Click here to request your free trial access!
Already subscribed? Log in!
The Ultimate Scientific and Technical Reference
This article is included in
Networks and Telecommunications
This offer includes:
Knowledge Base
Updated and enriched with articles validated by our scientific committees
Services
A set of exclusive tools to complement the resources
Practical Path
Operational and didactic, to guarantee the acquisition of transversal skills
Doc & Quiz
Interactive articles with quizzes, for constructive reading
Conclusion
References
Exclusive to subscribers. 97% yet to be discovered!
You do not have access to this resource.
Click here to request your free trial access!
Already subscribed? Log in!
The Ultimate Scientific and Technical Reference