Conversation

DNSSEC apologists on HN, fair warning: I am probably never going to stop beating you over the head with this data point.
Quote Tweet
Unless I'm mis-reading the domain history, this domain was (and is) DNSSEC signed and that did not prevent the takeover. The attackers move is to hi-jack the HTTP endpoints instead of DNS servers, get the cert through HTTP upload verification, and then MiTM. twitter.com/spazef0rze/sta…
Show this thread
6
36
Replying to
It’s not the argument against DNSSEC, apart from further evidence that “it just doesn’t do anything useful”. The arguments against DNSSEC are much stronger than “it doesn’t work”.
1
1
Replying to
They weren't using DNSSEC to secure WebPKI issuance via CAA / accounturi. They weren't using it to secure connections from their wallet. DNSSEC provides a way to use DNS as a root of trust but if you don't actually use that for anything then it's not doing you any good.
2
1
Show replies
Replying to and
And if DNSSEC became sufficiently pervasive, the ACME "proofs" of domain control could be made considerably stronger. But its taken a while to build DNSSEC adoption momentum, and it is still more often seen in new domains than retrofitted in existing domains. All in good time...
2