{"id":3569,"date":"2014-04-14T16:50:01","date_gmt":"2014-04-14T16:50:01","guid":{"rendered":"https:\/\/live-infoblox-blog.pantheonsite.io\/?p=3569"},"modified":"2022-10-19T16:23:38","modified_gmt":"2022-10-19T23:23:38","slug":"dns-based-authentication-of-named-entities-dane","status":"publish","type":"post","link":"https:\/\/www.infoblox.com\/blog\/ipv6-coe\/dns-based-authentication-of-named-entities-dane\/","title":{"rendered":"DNS-based Authentication of Named Entities (DANE)"},"content":{"rendered":"<p>Most people like you who are reading an\u00a0<a href=\"http:\/\/www.infoblox.com\/solutions\/best-practices\/dns-security-center?utm_source=blox-community&amp;utm_campaign=community-q2&amp;utm_medium=blox-community\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">Infoblox<\/a>\u00a0blog are familiar with the benefits of using\u00a0<a href=\"http:\/\/en.wikipedia.org\/wiki\/Dnssec\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">DNSSEC<\/a>\u00a0to provide authentication and integrity for your DNS information.\u00a0 DNSSEC is a lot like dental floss: we all know that it is good for our health, but few enterprise organizations actually put forth the effort to implement the best practice.\u00a0 If organizations do not use DNSSEC then they are susceptible to a variety of DNS-based attacks.\u00a0 Attackers could falsify DNS responses or attempt a DNS cache poisoning attack.\u00a0 The good news is that now that the large Top Level Domains (TLDs) have been signed, more and more organizations are deploying DNSSEC.<\/p>\n<p>Most Infoblox blog readers are also familiar with how\u00a0<a href=\"http:\/\/en.wikipedia.org\/wiki\/Certificate_authority\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">Certificate Authorities<\/a>\u00a0(CAs) issue digital certificates that can be used to secure web communications using Transport-Layer Security (TLS) (formerly Secure Sockets Layer (SSL)). \u00a0If an organization does not use X.509 certificates issued by Certificate Authorities with TLS to protect their applications, then any of their TCP-based communications are subject to eavesdropping or hijacking.\u00a0 There could also be\u00a0<a href=\"http:\/\/www.networkworld.com\/news\/2014\/021314-dozens-of-rogue-self-signed-ssl-278753.html\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">errant self-signed SSL certificates<\/a>\u00a0lurking about along with mobile apps and other software that do not check for the validity of the certificate.\u00a0 The good news is that, due to the most recent revelations about government eavesdropping on communications, more organizations have a desire to use HTTPS instead of less-secure unencrypted HTTP web services.<\/p>\n<p>These two methods of DNSSEC and TLS provide two forms of validating the authenticity of a domain name or a web site. However, they use two different methods of validating the service.\u00a0 DNSSEC provides a method to digitally sign the DNS records and authenticate the entries via a chain of trust that starts with the root zone.\u00a0 CAs provide an independent third party verification that the named subject of the certificate is valid thus creating a Public Key Infrastructure (PKI) system.\u00a0 When a CA issues an X.509 certificate to a web service, the key is used to aid in the negotiation of a TLS session key to encrypt the web page contents.<\/p>\n<h2 id=\"toc-hId-649788255\">Problems with These Two Systems<\/h2>\n<p>The problem that has existed for many years is that these two methods of providing authenticity for a domain-name or a Fully-Qualified Domain-Name (FQDN) for a web site have not been tied together.\u00a0 The DNSSEC and the CA\/TLS chain of trust have been independent and are not linked together.<\/p>\n<p>The TLS certificate does not confirm that the organization running the web server officially owns that domain-name.\u00a0 Also, the DNS information for the FQDN does not have information about which CA is preferred by this organization.\u00a0 The security of the certificate is only as strong as the weakest of the 60-to-100 trusted CAs pre-loaded into the web browser.\u00a0 This has led to security issues related to either the DNS database information or CA issuer being\u00a0compromised.\u00a0 Examples of this include the March 11<sup>th<\/sup>\u00a0<a href=\"http:\/\/en.wikipedia.org\/wiki\/Comodo_Group\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">Comodo<\/a>\u00a0security\u00a0<a href=\"https:\/\/www.comodo.com\/Comodo-Fraud-Incident-2011-03-23.html\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">incident<\/a>\u00a0and the\u00a0<a href=\"http:\/\/en.wikipedia.org\/wiki\/Diginotar\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">DigiNotar<\/a>\u00a0SSL Certificate security breach in the summer of 2011. These incidents lead to the generation of false certificates.<\/p>\n<p>Therefore, relying solely on the security of DNSSEC or the security of a certificate is not the ideal practice.\u00a0 History has taught us that the most secure systems are those that use a combination of \u201cdiversity of defense\u201d and \u201cdefense in depth.\u201d<\/p>\n<h2 id=\"toc-hId-678417406\">DNS-based Authentication of Named Entities (DANE)<\/h2>\n<p>The idea behind\u00a0<a href=\"http:\/\/en.wikipedia.org\/wiki\/DNS-based_Authentication_of_Named_Entities\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">DANE<\/a>\u00a0is that it provides a way to cross-verify the domain-name information and the CA-issued certificate being used.\u00a0 DNSSEC provides authenticity of the named-entity (the domain-name and the FQDN of the web server) and has a digest of the CA\u2019s certificate that it prefers clients use to validate its CA-issued certificate.\u00a0 The client can then check that the CA vouches for the authenticity of the named-entity and that the FQDN within the certificate matches the web site the client wants to visit.\u00a0 This cross-linking of the authenticated information in DNS and the certificate provides an additional dimension of validation and thus security.<\/p>\n<p>This can be likened to the two-factor authentication systems that we are familiar with.\u00a0 Multi-factor authentication systems could use a token (something you have) and a pin (something you know) or a finger print, palm scan, or retinal scan (something you are).\u00a0 In the case of DANE, the two-factors are a DNSSEC authenticated authoritative DNS entry about the valid certificate and an actual certificate that can be validated by a trusted CA.<\/p>\n<p>The Internet Engineering Task Force (IETF) created a\u00a0<a href=\"https:\/\/datatracker.ietf.org\/wg\/dane\/charter\/\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">DANE working group<\/a>\u00a0back in 2011.\u00a0 Since then, the group has created two critical RFCs that define the DANE method.<\/p>\n<ul>\n<li><a href=\"http:\/\/tools.ietf.org\/html\/rfc6394\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">RFC 6394<\/a>\u00a0\u2013 Use Cases and Requirements for DNS-Based Authentication of Named Entities (DANE)<\/li>\n<li><a href=\"http:\/\/tools.ietf.org\/html\/rfc6698\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">RFC 6698<\/a>\u00a0The DNS-Based Authentication of Named Entities (DANE) Transport Layer Security (TLS) Protocol: TLSA<\/li>\n<\/ul>\n<p>The first RFC 6394 covers the motivation for DANE similar to what we have just described.\u00a0 The second RFC 6698 describes a new DNS resource record (TLSA) that is used to convey the information about the certificate or certificate authority used for that DNS name.<\/p>\n<p>The way DANE works starts with the first DNS query from the client\u2019s resolver.\u00a0 The validation of the DNS information utilizes DNSSEC to authenticate that the queried DNS server is authoritative for answering the query.\u00a0 The client\u2019s resolver checks the chain of trust and the integrity of the response.\u00a0 The client\u2019s browser then proceeds to establish a connection to the web server running at the IP address returned by DNS.\u00a0 That web server will complete the 3-way handshake and then start to establish the HTTPS connection.\u00a0 But \u00a0first the client will validate the certificate being provided by the web service with the CA and also check that the DANE TLSA entry matches the certificate.\u00a0 If the DNS and certificate information are all in order, authenticated by their chain of trust, and haven\u2019t been modified, then the HTTPS connection proceeds.<\/p>\n<p>There are many useful resources on DANE that you can read to gain a deeper understanding.\u00a0 The\u00a0<a href=\"http:\/\/www.internetsociety.org\/deploy360\/resources\/dane\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">Internet Society<\/a>\u00a0(ISOC) has been advocating the use of DNSSEC and is also providing information on the use of DANE.\u00a0 Dan York has been busy speaking publically about the benefits of DNSSEC and DANE and has shared much of\u00a0<a href=\"http:\/\/www.internetsociety.org\/deploy360\/blog\/2014\/02\/8-sessions-about-dnssec-dane-dns-at-ietf-89-next-week\/\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">his information<\/a>.\u00a0 Richard Barnes also wrote a nice paper titled \u201c<a href=\"http:\/\/www.internetsociety.org\/articles\/dane-taking-tls-authentication-next-level-using-dnssec\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">DANE: Taking TLS Authentication to the Next Level Using DNSSEC<\/a>\u201d, which was published in the IETF journal in October 2011.<\/p>\n<p>Verisign has also been communicating about the benefits of using DNSSEC and DANE.\u00a0 Their document \u201c<a class=\" bf_ungated_init\" href=\"http:\/\/www.verisigninc.com\/assets\/VRSN_DNSSEC_DANE_WebPDF_201203.pdf\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">Reducing the X.509 Attack Surface with DNSSEC\u2019s DANE<\/a>\u201d is a great resource.\u00a0 This same information was also published in an academic journal on Securing and Trusting Internet Names (<a class=\" bf_ungated_init\" href=\"http:\/\/conferences.npl.co.uk\/satin\/papers\/satin2012-Osterweil.pdf\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">SATIN<\/a>) 2012.<\/p>\n<p>The Internet Protocol Journal, sadly not in publication anymore, had two great complementary articles on DANE and TLS security in, Volume 15, No. 1.<\/p>\n<ul>\n<li><a href=\"http:\/\/www.cisco.com\/web\/about\/ac123\/ac147\/archived_issues\/ipj_15-1\/151_dane.html\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">Domain Name Authentication with DNSSEC and DANE<\/a>, by Richard L. Barnes, BBN Technologies<\/li>\n<li><a href=\"http:\/\/www.cisco.com\/web\/about\/ac123\/ac147\/archived_issues\/ipj_15-1\/151_hacking.html\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">Hacking Away at Internet Security<\/a>, by Geoff Huston, APNIC<\/li>\n<\/ul>\n<h2 id=\"toc-hId-707046557\">Creating Your TLSA Record<\/h2>\n<p>In order to configure DANE an organization simply needs to put the information about their preferred CA into their DNS information.\u00a0 The client\u2019s browser will check this to validate that the proper certificate is being used based on the URL that the user entered into the browser.\u00a0 The browser will check the issuer of the certificate with the CA that DNS says should be used for that FQDN.\u00a0 This is done by creating a new TLS Trust Anchors (TLSA) resource record in the DNS zone file for the particular FQDN.\u00a0 This TLSA record must be signed with DNSSEC.\u00a0 For example, a TLSA record for the FQDN\u00a0<a href=\"http:\/\/www.example.com\/\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">www.example.com<\/a>\u00a0would be a record with the name 443.tcp.<a href=\"http:\/\/www.example.com.\/\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">www.example.com.<\/a><\/p>\n<p>To get DANE to work you need to have DNSSEC configured on your authoritative DNS server.\u00a0 Once that step is complete, you can create the TLSA resource record (RR).\u00a0 The TLSA record will contain three numbers, one for the \u201ccertificate usage\u201d (0 to 3) to indicate the type of certificate, the \u201cselector field\u201d (0 or 1), and the \u201cmatching type\u201d (0 to 2) for the type of hash used. \u00a0A CA certificate public key with a full certificate using type 1 SHA-256 hash entry in a BIND\u00a0<a href=\"https:\/\/lists.isc.org\/pipermail\/bind-users\/2012-May\/087720.html\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">9.8.3+<\/a>\u00a0zone file would look something like the following:<\/p>\n<pre>_443._tcp.<a href=\"http:\/\/www.example.com.\/\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">www.example.com.<\/a> IN TLSA ( 0 0 1 91751cee0a1ab8414400238a761411daa29643ab4b8243e9a91649e25be53ada )<\/pre>\n<p>Section 2 of\u00a0<a href=\"http:\/\/tools.ietf.org\/html\/rfc6698\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">RFC 6698<\/a>\u00a0gives you information on how to create these TLS entries.<\/p>\n<p>The good news is that TLSA resource records are not tied to either IPv4 or IPv6 addresses.\u00a0 Therefore, the same DANE information can be used regardless of the IP version being used for the transport between client and server.<\/p>\n<h2 id=\"toc-hId-735675708\">Certification Authority Authorization (CAA)<\/h2>\n<p>The IETF has also worked on a parallel effort to use a DNS entry to point to the CA that will be used to issue certificates for the domain name.\u00a0 The RFC that defines this standard is\u00a0<a href=\"http:\/\/tools.ietf.org\/html\/rfc6844\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">RFC 6844<\/a>\u00a0&#8211; DNS Certification Authority Authorization (CAA) Resource Record.<\/p>\n<p>This proposal sounds very similar to DANE, in that it provides some linkage between CAs and DNS information for a domain.\u00a0 However, this CAA record defines information that the certificate issuer (CA) can use to validate that they are authorized to create certificates for this domain ahead of when the certificate is actually created.\u00a0 The CA will perform the query for the CAA entry in DNS before they issue a certificate for that domain.\u00a0 As for DANE, the TLSA resource record is created after the CA has issued the certificate for the FQDN.<\/p>\n<p>Use of CAA records does not require the use of DNSSEC, but the use of DNSSEC is always considered a best practice.<\/p>\n<p>As an example: a CAA DNS resource record could indicate that the certificates for certs.example.com are issued by the CA example.net.<\/p>\n<pre>certs.example.com       CAA 0 issue \"example.net\"<\/pre>\n<h2 id=\"toc-hId-764304859\">DANE Support in Browsers<\/h2>\n<p>For DANE to be effective, it needs to be implemented on the server-side in the DNSSEC deployment.\u00a0 It also needs to be implemented in the client-side software to verify the DNSSEC information, get the TLSA resource record, get the certificate, and then check that the certificate and the TLSA match.\u00a0 This means that DANE will need to be supported in the web browser.<\/p>\n<p>There is a \u201c<a href=\"http:\/\/people.redhat.com\/pwouters\/\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">DNSSEC\/TLSA Validator<\/a>&#8221; Firefox plugin called hash-slinger for Firefox on Linux, and a\u00a0<a href=\"https:\/\/labs.nic.cz\/page\/1207\/dane-patrol\/\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">DANE Patrol<\/a>\u00a0add-on for Firefox.<\/p>\n<p>There is conflicting information about whether DANE is supported in Google Chrome.\u00a0 This\u00a0<a href=\"https:\/\/wiki.mozilla.org\/Security\/DNSSEC-TLS-details\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">MozillaWiki page<\/a>\u00a0talks about DANE, thus giving indication that it is a \u201cwork in progress\u201d.<\/p>\n<p>There is also a SURFnet open source implementation of DANE called\u00a0<a href=\"https:\/\/github.com\/SURFnet\/danish\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">Danish<\/a>.<\/p>\n<p>The Internet Society (ISOC) Deploy360 program provides a list of web sites that use DANE.\u00a0 These \u201c<a href=\"http:\/\/www.internetsociety.org\/deploy360\/blog\/2012\/10\/21-sites-you-can-use-to-test-dane-support-dnssec-ssltls\/\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">21 Sites You Can Use To Test DANE Support (DNSSEC + SSL\/TLS)<\/a>\u201d can be used to test your browser.<\/p>\n<p>Verisign Labs also provides a\u00a0<a href=\"http:\/\/dane.verisignlabs.com\/\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">web page<\/a>\u00a0that you can browse to and validate that your web browser software supports DANE.<\/p>\n<p>There are some concerns and challenges for DANE.\u00a0 If web browsers fail to check the DNSSEC and TLSA record information against the certificate\/CA information then DANE is not being used.\u00a0 Also, the browser now has more steps to go through prior to delivering information and this could potentially slow down the connection.\u00a0 This is especially true if a content provider has a faulty DNSSEC implementation.<\/p>\n<h2 id=\"toc-hId-792934010\">DANE Secures Many Services<\/h2>\n<p>A system like DANE is not only useful for securing web browsing.\u00a0 It could be used anywhere that TLS certificates are used and we want to check the authenticity of the DNS information.\u00a0 DANE can be used with TCP applications and could also protect Datagram Transport Layer Security (DTLS) for securing UDP flows.\u00a0 The list of applications and services that would benefit from DANE also includes:<\/p>\n<ul>\n<li>E-mail using S\/MIME (e.g. Postfix)<\/li>\n<li>SSL-Based VPNs<\/li>\n<li>VoIP systems (e.g. SIPS, SIP-TLS)<\/li>\n<li>Jabber\/XMPP interactions for the Internet of Things (IoT)<\/li>\n<li>SDN controllers communicating southbound with network devices (e.g. Cisco\u2019s OnePK, OpenFlow, and others)<\/li>\n<\/ul>\n<p>The challenge here is that many of these applications will need to be modified, just like web browsers, to look for the DANE information and correlate it with the certification information.<\/p>\n<p>We hope that in the near future DANE is embraced by more organizations. Once DANE is incorporated into more software systems the Internet will become a safer, more secure place.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Most people like you who are reading an\u00a0Infoblox\u00a0blog are familiar with the benefits of using\u00a0DNSSEC\u00a0to provide authentication and integrity for your DNS information.\u00a0 DNSSEC is a lot like dental floss: we all know that it is good for our health, but few enterprise organizations actually put forth the effort to implement the best practice.\u00a0 If [&hellip;]<\/p>\n","protected":false},"author":321,"featured_media":3187,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"inline_featured_image":false,"_genesis_hide_title":false,"_genesis_hide_breadcrumbs":false,"_genesis_hide_singular_image":false,"_genesis_hide_footer_widgets":false,"_genesis_custom_body_class":"","_genesis_custom_post_class":"","_genesis_layout":"","footnotes":""},"categories":[17],"tags":[155,16,15],"class_list":{"0":"post-3569","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-ipv6-coe","8":"tag-dane","9":"tag-infoblox","10":"tag-security","11":"entry"},"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.3 (Yoast SEO v27.3) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>DNS-based Authentication of Named Entities (DANE)<\/title>\n<meta name=\"description\" content=\"DNS-based Authentication of Named Entities (DANE) allow for domain names to be bound to System Security Extensions. You can learn more about DANE features here.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.infoblox.com\/blog\/ipv6-coe\/dns-based-authentication-of-named-entities-dane\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"DNS-based Authentication of Named Entities (DANE)\" \/>\n<meta property=\"og:description\" content=\"DNS-based Authentication of Named Entities (DANE) allow for domain names to be bound to System Security Extensions. You can learn more about DANE features here.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.infoblox.com\/blog\/ipv6-coe\/dns-based-authentication-of-named-entities-dane\/\" \/>\n<meta property=\"og:site_name\" content=\"Infoblox Blog\" \/>\n<meta property=\"article:published_time\" content=\"2014-04-14T16:50:01+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2022-10-19T23:23:38+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/IPv6-ARIN.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"660\" \/>\n\t<meta property=\"og:image:height\" content=\"454\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Scott Hogg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Scott Hogg\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"10 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/ipv6-coe\\\/dns-based-authentication-of-named-entities-dane\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/ipv6-coe\\\/dns-based-authentication-of-named-entities-dane\\\/\"},\"author\":{\"name\":\"Scott Hogg\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/person\\\/ee71ac61fe2ea349f6e991e628d22f4c\"},\"headline\":\"DNS-based Authentication of Named Entities (DANE)\",\"datePublished\":\"2014-04-14T16:50:01+00:00\",\"dateModified\":\"2022-10-19T23:23:38+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/ipv6-coe\\\/dns-based-authentication-of-named-entities-dane\\\/\"},\"wordCount\":2020,\"publisher\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/ipv6-coe\\\/dns-based-authentication-of-named-entities-dane\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/IPv6-ARIN.jpg\",\"keywords\":[\"DANE\",\"Infoblox\",\"Security\"],\"articleSection\":[\"IPv6 CoE\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/ipv6-coe\\\/dns-based-authentication-of-named-entities-dane\\\/\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/ipv6-coe\\\/dns-based-authentication-of-named-entities-dane\\\/\",\"name\":\"DNS-based Authentication of Named Entities (DANE)\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/ipv6-coe\\\/dns-based-authentication-of-named-entities-dane\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/ipv6-coe\\\/dns-based-authentication-of-named-entities-dane\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/IPv6-ARIN.jpg\",\"datePublished\":\"2014-04-14T16:50:01+00:00\",\"dateModified\":\"2022-10-19T23:23:38+00:00\",\"description\":\"DNS-based Authentication of Named Entities (DANE) allow for domain names to be bound to System Security Extensions. You can learn more about DANE features here.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/ipv6-coe\\\/dns-based-authentication-of-named-entities-dane\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/ipv6-coe\\\/dns-based-authentication-of-named-entities-dane\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/ipv6-coe\\\/dns-based-authentication-of-named-entities-dane\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/IPv6-ARIN.jpg\",\"contentUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/IPv6-ARIN.jpg\",\"width\":660,\"height\":454,\"caption\":\"The IPv6 Tipping Point Effect\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/ipv6-coe\\\/dns-based-authentication-of-named-entities-dane\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"IPv6 CoE\",\"item\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/category\\\/ipv6-coe\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"DNS-based Authentication of Named Entities (DANE)\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\",\"name\":\"infoblox.com\\\/blog\\\/\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\",\"name\":\"Infoblox\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/infoblox-logo-2.svg\",\"contentUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/infoblox-logo-2.svg\",\"width\":137,\"height\":30,\"caption\":\"Infoblox\"},\"image\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/person\\\/ee71ac61fe2ea349f6e991e628d22f4c\",\"name\":\"Scott Hogg\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/blogs.infoblox.com\\\/wp-content\\\/uploads\\\/avatar_user_321_1574118215-96x96.jpg\",\"url\":\"https:\\\/\\\/blogs.infoblox.com\\\/wp-content\\\/uploads\\\/avatar_user_321_1574118215-96x96.jpg\",\"contentUrl\":\"https:\\\/\\\/blogs.infoblox.com\\\/wp-content\\\/uploads\\\/avatar_user_321_1574118215-96x96.jpg\",\"caption\":\"Scott Hogg\"},\"description\":\"Scott Hogg has 30 years of network and security experience and is president of Hogg Networking with. Scott Hogg specializes in teaching Internet Protocol version 6 (IPv6) and providing implementation guidance. Scott is CCIE #5133 (Emeritus) and CISSP #4610. Scott is Chair Emeritus of the Rocky Mountain IPv6 Task Force (RMv6TF), a member of the IPv6 Center of Excellence (COE), and co-author of the Cisco Press book on IPv6 Security.\",\"sameAs\":[\"https:\\\/\\\/hexabuild.io\"],\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/author\\\/scott-hogg\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"DNS-based Authentication of Named Entities (DANE)","description":"DNS-based Authentication of Named Entities (DANE) allow for domain names to be bound to System Security Extensions. You can learn more about DANE features here.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.infoblox.com\/blog\/ipv6-coe\/dns-based-authentication-of-named-entities-dane\/","og_locale":"en_US","og_type":"article","og_title":"DNS-based Authentication of Named Entities (DANE)","og_description":"DNS-based Authentication of Named Entities (DANE) allow for domain names to be bound to System Security Extensions. You can learn more about DANE features here.","og_url":"https:\/\/www.infoblox.com\/blog\/ipv6-coe\/dns-based-authentication-of-named-entities-dane\/","og_site_name":"Infoblox Blog","article_published_time":"2014-04-14T16:50:01+00:00","article_modified_time":"2022-10-19T23:23:38+00:00","og_image":[{"width":660,"height":454,"url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/IPv6-ARIN.jpg","type":"image\/jpeg"}],"author":"Scott Hogg","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Scott Hogg","Est. reading time":"10 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.infoblox.com\/blog\/ipv6-coe\/dns-based-authentication-of-named-entities-dane\/#article","isPartOf":{"@id":"https:\/\/www.infoblox.com\/blog\/ipv6-coe\/dns-based-authentication-of-named-entities-dane\/"},"author":{"name":"Scott Hogg","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/person\/ee71ac61fe2ea349f6e991e628d22f4c"},"headline":"DNS-based Authentication of Named Entities (DANE)","datePublished":"2014-04-14T16:50:01+00:00","dateModified":"2022-10-19T23:23:38+00:00","mainEntityOfPage":{"@id":"https:\/\/www.infoblox.com\/blog\/ipv6-coe\/dns-based-authentication-of-named-entities-dane\/"},"wordCount":2020,"publisher":{"@id":"https:\/\/www.infoblox.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/ipv6-coe\/dns-based-authentication-of-named-entities-dane\/#primaryimage"},"thumbnailUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/IPv6-ARIN.jpg","keywords":["DANE","Infoblox","Security"],"articleSection":["IPv6 CoE"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.infoblox.com\/blog\/ipv6-coe\/dns-based-authentication-of-named-entities-dane\/","url":"https:\/\/www.infoblox.com\/blog\/ipv6-coe\/dns-based-authentication-of-named-entities-dane\/","name":"DNS-based Authentication of Named Entities (DANE)","isPartOf":{"@id":"https:\/\/www.infoblox.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.infoblox.com\/blog\/ipv6-coe\/dns-based-authentication-of-named-entities-dane\/#primaryimage"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/ipv6-coe\/dns-based-authentication-of-named-entities-dane\/#primaryimage"},"thumbnailUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/IPv6-ARIN.jpg","datePublished":"2014-04-14T16:50:01+00:00","dateModified":"2022-10-19T23:23:38+00:00","description":"DNS-based Authentication of Named Entities (DANE) allow for domain names to be bound to System Security Extensions. You can learn more about DANE features here.","breadcrumb":{"@id":"https:\/\/www.infoblox.com\/blog\/ipv6-coe\/dns-based-authentication-of-named-entities-dane\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.infoblox.com\/blog\/ipv6-coe\/dns-based-authentication-of-named-entities-dane\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.infoblox.com\/blog\/ipv6-coe\/dns-based-authentication-of-named-entities-dane\/#primaryimage","url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/IPv6-ARIN.jpg","contentUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/IPv6-ARIN.jpg","width":660,"height":454,"caption":"The IPv6 Tipping Point Effect"},{"@type":"BreadcrumbList","@id":"https:\/\/www.infoblox.com\/blog\/ipv6-coe\/dns-based-authentication-of-named-entities-dane\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.infoblox.com\/blog\/"},{"@type":"ListItem","position":2,"name":"IPv6 CoE","item":"https:\/\/www.infoblox.com\/blog\/category\/ipv6-coe\/"},{"@type":"ListItem","position":3,"name":"DNS-based Authentication of Named Entities (DANE)"}]},{"@type":"WebSite","@id":"https:\/\/www.infoblox.com\/blog\/#website","url":"https:\/\/www.infoblox.com\/blog\/","name":"infoblox.com\/blog\/","description":"","publisher":{"@id":"https:\/\/www.infoblox.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.infoblox.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.infoblox.com\/blog\/#organization","name":"Infoblox","url":"https:\/\/www.infoblox.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/infoblox-logo-2.svg","contentUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/infoblox-logo-2.svg","width":137,"height":30,"caption":"Infoblox"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/person\/ee71ac61fe2ea349f6e991e628d22f4c","name":"Scott Hogg","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/blogs.infoblox.com\/wp-content\/uploads\/avatar_user_321_1574118215-96x96.jpg","url":"https:\/\/blogs.infoblox.com\/wp-content\/uploads\/avatar_user_321_1574118215-96x96.jpg","contentUrl":"https:\/\/blogs.infoblox.com\/wp-content\/uploads\/avatar_user_321_1574118215-96x96.jpg","caption":"Scott Hogg"},"description":"Scott Hogg has 30 years of network and security experience and is president of Hogg Networking with. Scott Hogg specializes in teaching Internet Protocol version 6 (IPv6) and providing implementation guidance. Scott is CCIE #5133 (Emeritus) and CISSP #4610. Scott is Chair Emeritus of the Rocky Mountain IPv6 Task Force (RMv6TF), a member of the IPv6 Center of Excellence (COE), and co-author of the Cisco Press book on IPv6 Security.","sameAs":["https:\/\/hexabuild.io"],"url":"https:\/\/www.infoblox.com\/blog\/author\/scott-hogg\/"}]}},"_links":{"self":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/3569","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/users\/321"}],"replies":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/comments?post=3569"}],"version-history":[{"count":2,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/3569\/revisions"}],"predecessor-version":[{"id":8120,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/3569\/revisions\/8120"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/media\/3187"}],"wp:attachment":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/media?parent=3569"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/categories?post=3569"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/tags?post=3569"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}