Summary
In this chapter, we worked our way through various aspects of securing your naming infrastructure. There are numerous attack vectors to defend against and a blind spot to any one of them can have catastrophic consequences even if everything else is bulletproof.
We now know that there are some cases where we must use third-party vendors, and the issue then is how we can tighten things up on their platforms to protect ourselves.
From there, we looked at DNSSEC, which enables us to securely authenticate DNS responses to queries. We also took a brief glance at DNSCurve, DNSCrypt, and DNS over TLS, to at least show that they are not competitors to DNSSEC per se, but address a different attack surface than DNSSEC does.
In Chapter 14,
Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.
Read now
Unlock full access