{"id":4750,"date":"2009-06-10T14:39:32","date_gmt":"2009-06-10T21:39:32","guid":{"rendered":"https:\/\/blogs.infoblox.com\/?p=4750"},"modified":"2020-05-06T10:31:48","modified_gmt":"2020-05-06T17:31:48","slug":"more-answers-to-your-webinar-questions","status":"publish","type":"post","link":"https:\/\/www.infoblox.com\/blog\/security\/more-answers-to-your-webinar-questions\/","title":{"rendered":"More Answers to Your Webinar Questions"},"content":{"rendered":"<p>I&#8217;ve got time to answer a few more questions before I race off to the airport:<\/p>\n<address>What would you consider the best &#8220;starter&#8221; guide to DNSSEC?<\/address>\n<p>Well, I&#8217;m biased, but I think\u00a0<a href=\"http:\/\/oreilly.com\/catalog\/9780596100575\/\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">DNS and BIND<\/a>\u00a0is very good. I also think that Scott&#8217;s guide,\u00a0<a href=\"http:\/\/csrc.nist.gov\/publications\/PubsSPs.html\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">NIST SP 800-81<\/a>, is indispensable (and free!). For links to other DNSSEC resources, see\u00a0<a href=\"http:\/\/www.dnssec.net\/\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">www.dnssec.net<\/a>.<\/p>\n<address>How does a wildcard DNS entry affect the Kaminsky vulnerability?<\/address>\n<p>Not at all, really. It doesn&#8217;t particularly matter what the data looks like on the real authoritative name servers: The hacker is poisoning the cache with bogus data by getting his response accepted before the authoritative name server has the chance to respond.<\/p>\n<address>Do you see a point in the near-to-mid-term future in which IPv6 will be forced on the user community?<\/address>\n<p>Sure, for a purely practical reason: Because we&#8217;ll run out of IPv4 address space. That&#8217;ll happen in the next few years, and then the cool, new services brought to market by clever individuals and startups will run over IPv6. And then you&#8217;ll want to use IPv6.<\/p>\n<address>To reduce the overhead of signing zone data files, can we have a temporary file that contains only the record that we want to modify, then sign it? After the new record is signed, we take the RRSIG and any related info and put it into the already-signed zone, then bump the serial number. Can it be done that way?<\/address>\n<p>Unfortunately, no, because if the change adds a new domain name to the zone, or a new record type to an existing domain name, the NSEC (or NSEC3) records in the zone will need to change, too.<\/p>\n<address>How old is the latest version of DNSSEC?<\/address>\n<p>RFCs 4033, 4034 and 4035 are dated March 2005.<\/p>\n<address>What effect does DNSSEC have on existing SSL\/encryption during transfer?<\/address>\n<p>None. DNSSEC is only used during name resolution, which happens before an SSL or TLS connection is set up. Once the connection&#8217;s set up, DNSSEC doesn&#8217;t come into play.<\/p>\n<p>Thanks again for attending! I&#8217;ll answer more questions as soon as I can, and we&#8217;ll get the presentation uploaded soon, too.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>I&#8217;ve got time to answer a few more questions before I race off to the airport: What would you consider the best &#8220;starter&#8221; guide to DNSSEC? Well, I&#8217;m biased, but I think\u00a0DNS and BIND\u00a0is very good. I also think that Scott&#8217;s guide,\u00a0NIST SP 800-81, is indispensable (and free!). For links to other DNSSEC resources, see\u00a0www.dnssec.net. [&hellip;]<\/p>\n","protected":false},"author":178,"featured_media":2771,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"inline_featured_image":false,"_genesis_hide_title":false,"_genesis_hide_breadcrumbs":false,"_genesis_hide_singular_image":false,"_genesis_hide_footer_widgets":false,"_genesis_custom_body_class":"","_genesis_custom_post_class":"","_genesis_layout":"","footnotes":""},"categories":[2],"tags":[108,30,229,16,15],"class_list":{"0":"post-4750","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-security","8":"tag-bind","9":"tag-dns","10":"tag-dnssec","11":"tag-infoblox","12":"tag-security","13":"entry"},"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.3 (Yoast SEO v27.3) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>More Answers to Your Webinar Questions<\/title>\n<meta name=\"description\" content=\"I&#039;ve got time to answer a few more questions before I race off to the airport:What would you consider the best &quot;starter&quot; guide to DNSSEC?\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.infoblox.com\/blog\/security\/more-answers-to-your-webinar-questions\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"More Answers to Your Webinar Questions\" \/>\n<meta property=\"og:description\" content=\"I&#039;ve got time to answer a few more questions before I race off to the airport:What would you consider the best &quot;starter&quot; guide to DNSSEC?\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.infoblox.com\/blog\/security\/more-answers-to-your-webinar-questions\/\" \/>\n<meta property=\"og:site_name\" content=\"Infoblox Blog\" \/>\n<meta property=\"article:published_time\" content=\"2009-06-10T21:39:32+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2020-05-06T17:31:48+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/Taming-the-Hybrid-Cloud.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"660\" \/>\n\t<meta property=\"og:image:height\" content=\"454\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Cricket Liu\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Cricket Liu\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/more-answers-to-your-webinar-questions\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/more-answers-to-your-webinar-questions\\\/\"},\"author\":{\"name\":\"Cricket Liu\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/person\\\/bb6b62b1b99a7cbcd7c528d5763778d5\"},\"headline\":\"More Answers to Your Webinar Questions\",\"datePublished\":\"2009-06-10T21:39:32+00:00\",\"dateModified\":\"2020-05-06T17:31:48+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/more-answers-to-your-webinar-questions\\\/\"},\"wordCount\":367,\"publisher\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/more-answers-to-your-webinar-questions\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/Taming-the-Hybrid-Cloud.jpg\",\"keywords\":[\"BIND\",\"DNS\",\"DNSSEC\",\"Infoblox\",\"Security\"],\"articleSection\":[\"Security\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/more-answers-to-your-webinar-questions\\\/\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/more-answers-to-your-webinar-questions\\\/\",\"name\":\"More Answers to Your Webinar Questions\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/more-answers-to-your-webinar-questions\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/more-answers-to-your-webinar-questions\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/Taming-the-Hybrid-Cloud.jpg\",\"datePublished\":\"2009-06-10T21:39:32+00:00\",\"dateModified\":\"2020-05-06T17:31:48+00:00\",\"description\":\"I've got time to answer a few more questions before I race off to the airport:What would you consider the best \\\"starter\\\" guide to DNSSEC?\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/more-answers-to-your-webinar-questions\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/more-answers-to-your-webinar-questions\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/more-answers-to-your-webinar-questions\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/Taming-the-Hybrid-Cloud.jpg\",\"contentUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/Taming-the-Hybrid-Cloud.jpg\",\"width\":660,\"height\":454,\"caption\":\"Taming the Hybrid Cloud\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/more-answers-to-your-webinar-questions\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Security\",\"item\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/category\\\/security\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"More Answers to Your Webinar Questions\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\",\"name\":\"infoblox.com\\\/blog\\\/\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\",\"name\":\"Infoblox\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/infoblox-logo-2.svg\",\"contentUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/infoblox-logo-2.svg\",\"width\":137,\"height\":30,\"caption\":\"Infoblox\"},\"image\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/person\\\/bb6b62b1b99a7cbcd7c528d5763778d5\",\"name\":\"Cricket Liu\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/blogs.infoblox.com\\\/wp-content\\\/uploads\\\/cricket-new-96x96.jpg\",\"url\":\"https:\\\/\\\/blogs.infoblox.com\\\/wp-content\\\/uploads\\\/cricket-new-96x96.jpg\",\"contentUrl\":\"https:\\\/\\\/blogs.infoblox.com\\\/wp-content\\\/uploads\\\/cricket-new-96x96.jpg\",\"caption\":\"Cricket Liu\"},\"description\":\"Cricket is one of the world\u2019s leading experts on the Domain Name System (DNS) and serves as the liaison between Infoblox and the DNS community. Before joining Infoblox, he founded an internet consulting and training company, Acme Byte &amp; Wire, after running the hp.com domain at Hewlett-Packard. Cricket is a prolific speaker and author, having written a number of books including \u201cDNS and BIND,\u201d one of the most widely used references in the field, now in its fifth edition.\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/author\\\/cricket-liu\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"More Answers to Your Webinar Questions","description":"I've got time to answer a few more questions before I race off to the airport:What would you consider the best \"starter\" guide to DNSSEC?","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.infoblox.com\/blog\/security\/more-answers-to-your-webinar-questions\/","og_locale":"en_US","og_type":"article","og_title":"More Answers to Your Webinar Questions","og_description":"I've got time to answer a few more questions before I race off to the airport:What would you consider the best \"starter\" guide to DNSSEC?","og_url":"https:\/\/www.infoblox.com\/blog\/security\/more-answers-to-your-webinar-questions\/","og_site_name":"Infoblox Blog","article_published_time":"2009-06-10T21:39:32+00:00","article_modified_time":"2020-05-06T17:31:48+00:00","og_image":[{"width":660,"height":454,"url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/Taming-the-Hybrid-Cloud.jpg","type":"image\/jpeg"}],"author":"Cricket Liu","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Cricket Liu","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.infoblox.com\/blog\/security\/more-answers-to-your-webinar-questions\/#article","isPartOf":{"@id":"https:\/\/www.infoblox.com\/blog\/security\/more-answers-to-your-webinar-questions\/"},"author":{"name":"Cricket Liu","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/person\/bb6b62b1b99a7cbcd7c528d5763778d5"},"headline":"More Answers to Your Webinar Questions","datePublished":"2009-06-10T21:39:32+00:00","dateModified":"2020-05-06T17:31:48+00:00","mainEntityOfPage":{"@id":"https:\/\/www.infoblox.com\/blog\/security\/more-answers-to-your-webinar-questions\/"},"wordCount":367,"publisher":{"@id":"https:\/\/www.infoblox.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/security\/more-answers-to-your-webinar-questions\/#primaryimage"},"thumbnailUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/Taming-the-Hybrid-Cloud.jpg","keywords":["BIND","DNS","DNSSEC","Infoblox","Security"],"articleSection":["Security"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.infoblox.com\/blog\/security\/more-answers-to-your-webinar-questions\/","url":"https:\/\/www.infoblox.com\/blog\/security\/more-answers-to-your-webinar-questions\/","name":"More Answers to Your Webinar Questions","isPartOf":{"@id":"https:\/\/www.infoblox.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.infoblox.com\/blog\/security\/more-answers-to-your-webinar-questions\/#primaryimage"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/security\/more-answers-to-your-webinar-questions\/#primaryimage"},"thumbnailUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/Taming-the-Hybrid-Cloud.jpg","datePublished":"2009-06-10T21:39:32+00:00","dateModified":"2020-05-06T17:31:48+00:00","description":"I've got time to answer a few more questions before I race off to the airport:What would you consider the best \"starter\" guide to DNSSEC?","breadcrumb":{"@id":"https:\/\/www.infoblox.com\/blog\/security\/more-answers-to-your-webinar-questions\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.infoblox.com\/blog\/security\/more-answers-to-your-webinar-questions\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.infoblox.com\/blog\/security\/more-answers-to-your-webinar-questions\/#primaryimage","url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/Taming-the-Hybrid-Cloud.jpg","contentUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/Taming-the-Hybrid-Cloud.jpg","width":660,"height":454,"caption":"Taming the Hybrid Cloud"},{"@type":"BreadcrumbList","@id":"https:\/\/www.infoblox.com\/blog\/security\/more-answers-to-your-webinar-questions\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.infoblox.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Security","item":"https:\/\/www.infoblox.com\/blog\/category\/security\/"},{"@type":"ListItem","position":3,"name":"More Answers to Your Webinar Questions"}]},{"@type":"WebSite","@id":"https:\/\/www.infoblox.com\/blog\/#website","url":"https:\/\/www.infoblox.com\/blog\/","name":"infoblox.com\/blog\/","description":"","publisher":{"@id":"https:\/\/www.infoblox.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.infoblox.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.infoblox.com\/blog\/#organization","name":"Infoblox","url":"https:\/\/www.infoblox.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/infoblox-logo-2.svg","contentUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/infoblox-logo-2.svg","width":137,"height":30,"caption":"Infoblox"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/person\/bb6b62b1b99a7cbcd7c528d5763778d5","name":"Cricket Liu","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/blogs.infoblox.com\/wp-content\/uploads\/cricket-new-96x96.jpg","url":"https:\/\/blogs.infoblox.com\/wp-content\/uploads\/cricket-new-96x96.jpg","contentUrl":"https:\/\/blogs.infoblox.com\/wp-content\/uploads\/cricket-new-96x96.jpg","caption":"Cricket Liu"},"description":"Cricket is one of the world\u2019s leading experts on the Domain Name System (DNS) and serves as the liaison between Infoblox and the DNS community. Before joining Infoblox, he founded an internet consulting and training company, Acme Byte &amp; Wire, after running the hp.com domain at Hewlett-Packard. Cricket is a prolific speaker and author, having written a number of books including \u201cDNS and BIND,\u201d one of the most widely used references in the field, now in its fifth edition.","url":"https:\/\/www.infoblox.com\/blog\/author\/cricket-liu\/"}]}},"_links":{"self":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/4750","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/users\/178"}],"replies":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/comments?post=4750"}],"version-history":[{"count":1,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/4750\/revisions"}],"predecessor-version":[{"id":4751,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/4750\/revisions\/4751"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/media\/2771"}],"wp:attachment":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/media?parent=4750"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/categories?post=4750"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/tags?post=4750"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}