DNSSEC Masterclass #2. History of DNSSEC Development and Deployment

Logo
Presented by

Alan Clegg, ISC Technical Support

About this talk

This short segment provides useful background on how DNSSEC has evolved, providing context for later discussion of the current standards. This series of 10 lectures will take you through a full-day class on DNSSEC theory, history, implementation and troubleshooting, using current versions of BIND 9. 1 - Why do we need DNSSEC? 2 - DNSSEC Development & Deployment (history) 3 - Basic Cryptography and DNS background for DNSSEC 4 - Resolution and Validation 5 - Record Types, Keys, Signatures and NSEC 6 - Record Types, Keys, Signatures and NSEC, pt2 7 - Signing with BIND 8 - Key Rollover, Algorithm Rollover 9 - Key maintenance, including the new KASP tool in BIND, Negative trust anchors 10 - Troubleshooting DNSSEC issues --- Learn more at http://www.isc.org

Related topics:

More from this channel

Upcoming talks (0)
On-demand talks (25)
Subscribers (128)
Internet Systems Consortium is a non-profit corporation dedicated to developing software and offering services in support of the Internet infrastructure. ISC develops and distributes three open source Internet networking software packages: BIND 9, ISC DHCP, and Kea DHCP. BIND 9, ISC’s Domain Name System (DNS) software program, is widely used on the Internet by enterprises and service providers, offering a robust and stable platform on top of which organizations can build distributed computing systems. ISC DHCP and Kea implement the Dynamic Host Configuration Protocol for connection to an IP network. Kea DHCP is ISC newer DHCP software, and is designed for modular extension, dynamic reconfiguration, and high performance. In addition to our open source software, ISC also operates critical Internet infrastructure in the form of the F-Root server, one of the 13 Internet root name servers that power the global Internet. ISC is supported through the sale of annual support subscriptions for our open source software. These support services also include advance notification of security vulnerabilities, and in some cases, non-public software extensions. For more information please visit https://isc.org.