DNS 101 Miniseries - #5 - Why do we need DNSSEC

Поділитися
Вставка
  • Опубліковано 18 жов 2024

КОМЕНТАРІ • 18

  • @rameeskr
    @rameeskr 2 роки тому +19

    This channel is a gem and I hate youtube algorithm for delaying me finding this.

  • @TheBettinaNYC
    @TheBettinaNYC 2 роки тому +4

    I’ve been following these videos for 3 days and this is the easiest I’ve learned in 10 years as a tech engineer and I work for Microsoft

    • @LearnCantrill
      @LearnCantrill  2 роки тому

      Thanks Bettina I really appreciate the feedback. Feel free to share these videos around - they’re my way of giving back so I want them in front of all the people ;)

  • @billclintonj
    @billclintonj 5 місяців тому

    I have watched several videos about DNSSEC but nothing gave crystal clear explanations as this one. I like the graphics used as well.
    Thank you very much for your effort! 💚

  • @MorbidPasta
    @MorbidPasta Рік тому +3

    I think youtube fixed their algorithm this summer, because now I'm starting to find jewel channels like this. Awesome stuff

    • @LearnCantrill
      @LearnCantrill  Рік тому

      Please share it around on social media. It really helps.

  • @samadbouss8842
    @samadbouss8842 7 місяців тому

    Clearly the best tutorial on the cloud. Very well structured and explained. Give this m’en the Oscar

  • @hayahamdan-d6r
    @hayahamdan-d6r 4 місяці тому

    Thank You for your videos .

  • @yurkko
    @yurkko Рік тому

    Thanks for clear explanation! And graphics are very helpful

  • @marius-mihailionte339
    @marius-mihailionte339 2 роки тому +1

    thank you

  • @thkhan
    @thkhan 2 роки тому +1

    I love bullet points.I wish you will start to love this also.

  • @0.Payang
    @0.Payang 3 місяці тому

    #gov 1billion debt for etsi-iso, internal affair by google, inc permissive law.

  • @datvuong7420
    @datvuong7420 11 місяців тому

    why does DNS resolver easily except the result from the person who is not pointed by the root sever? at 6:00

    • @void.walker.
      @void.walker. 8 місяців тому

      (I know it's late, but in case if anyone's wondering) The short answer is that DNS messages are sent through UDP, which is a stateless protocol and the source IP-address is blindly trusted. So if a bad guy has an access to a query traffic, he can spam fake UDP responses pretending to be the authoritative server.
      It's called DNS cache poisoning, though it is difficult to implement but it's possible.