Conversation

DNSSEC apologists on HN, fair warning: I am probably never going to stop beating you over the head with this data point.
Quote Tweet
Unless I'm mis-reading the domain history, this domain was (and is) DNSSEC signed and that did not prevent the takeover. The attackers move is to hi-jack the HTTP endpoints instead of DNS servers, get the cert through HTTP upload verification, and then MiTM. twitter.com/spazef0rze/sta…
Show this thread
6
36
Replying to and
I don't see how it's an argument against DNSSEC. WebPKI certificate issuance could be based on DNS as a root of trust, but instead doesn't have one. Google never removed pinning for their domains in Chrome as they promised after CT because (possible) detection isn't prevention.
2
3
Replying to
It’s not the argument against DNSSEC, apart from further evidence that “it just doesn’t do anything useful”. The arguments against DNSSEC are much stronger than “it doesn’t work”.
1
1
Replying to
They weren't using DNSSEC to secure WebPKI issuance via CAA / accounturi. They weren't using it to secure connections from their wallet. DNSSEC provides a way to use DNS as a root of trust but if you don't actually use that for anything then it's not doing you any good.
2
1