Settings

Theme

Russian TLD .RU fails DNSSEC validation

dnsviz.net

71 points by ainar-g 2 years ago · 23 comments

Reader

assusdan 2 years ago

That was scary. Fixed at about 16:55 UTC, total about 1hr of downtime.

  • patrakov 2 years ago

    The badly signed records are still there in various provider's DNS caches as of now. 8.8.8.8 and 9.9.9.9 in the Philippines are still affected - cannot resolve .ru domains.

    • assusdan 2 years ago

      Yeah, I think major Russian providers just flushed caches by hand, as rollout was by-region, which is not smooth nor simultaneous

      EDIT: rollout in some very large telecom here is still in progress, by region.

dgrin91 2 years ago

I'm not familiar with DNSSEC. What sis the impact of this? Do web pages fail to load or is it just some security warning? Also was this just someone failing to update a cert in time or is this some sort of hack?

  • assusdan 2 years ago

    Basically, all ru. TLD became failing for all dns resolvers that use DNSSEC (which is the most of them)

    As user, I am unable to visit any pages on .ru domains, as their IP would not resolve.

    Reason is highly likely mistake (human side) in signing procedure, not something time- or hack- related.

    Someone is most likely CC for TLD RU, aka АНО КЦНДСИ, official registry of .ru TLD.

  • tptacek 2 years ago

    If you're using DNSSEC-validating resolver servers (many of the popular ones are), then presumably all the signed names in .RU fell off the Internet completely, as if they never existed, for the duration of the outage.

  • TomK32 2 years ago

    Either someone failing to update the cert or the person who did it until has been sent to the meatgrinder. I really do wonder what effect war will have on the Russian IT industry. From what I read most IT professionals are protected from mobilisation, but on the other hand they might have a more open view of the world then Putin's regime.

woodruffw 2 years ago

As a side question: am I correct in reading this to imply that the two "leaf" keys here are both RSA 1024 keys? RSA 1024 has been considered within nation-state capabilities for well over a decade, and NIST has explicitly discouraged them for DNSSEC for close to a decade[1].

I can understand not using larger RSA key sizes for framing reasons, but what is stopping the DNSSEC ecosystem from using ECC?

[1]: https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.S...

Chalbroth 2 years ago

DNSSEC failure is just the result of many of the nameservers serving .ru and other tlds not responding. This is especially observable if you are IPv4 only.

arcza 2 years ago

Poor blog's getting the hug of death :)

  • bewaretheirs 2 years ago

    it's not a blog - it's a DNSSEC validator tool that gives you a pretty diagram of which keys are signing what.

    There are others around which I won't link to right now lest they get clobbered too.

krunck 2 years ago

I saw this start at 10:14:29 CST.

  • tryauuum 2 years ago

    DNSSEC is such a nightmare. All this "how do we make this old protocol secure and private without changing it much"

    • naniwaduni 2 years ago

      DNSSEC does absolutely nothing for privacy. It seeks to achieve strictly authentication and incidentally integrity.

      • tryauuum 2 years ago

        when I said privacy I was had NSEC3 in mind. To be honest I have no idea how does it work / why is it a thing but it looks like it obfuscates (deleted?) subdomains to make it harder to enumerate them. This is why you see stuff like

            15bg9l6359f5ch23e34ddua6n1rihl9h.example.org
        
        in zone file
        • tptacek 2 years ago

          Right. That doesn't really work: you can crack them like a 1990s password file, which is why there's whitelies (online-signer chaff records) to defeat that attack. Either way: it's not really what people think about when they think "privacy". It's generally the position of the architects of DNSSEC that domain names simply aren't private at all. Meanwhile: actual DNS privacy, of what domains you're visiting with your browser, is provided by DoH, not DNSSEC.

    • Fnoord 2 years ago

      IIRC the protocol is also a nightmare for potential reflection DDoS attacks.

      Also, the security chain is top-down, from owner of the TLD to the domain to the resolver to the client. With DNS over TLS and DNSCurve, you have it the other way around.

Keyboard Shortcuts

j
Next item
k
Previous item
o / Enter
Open selected item
?
Show this help
Esc
Close modal / clear selection