Consul: DNSSEC support

Created on 23 Oct 2014  路  12Comments  路  Source: hashicorp/consul

It would be good to support DNSSEC for internal DNS, especially with custom domain support.

themoperator-usability typenhancement

Most helpful comment

This would be especially useful if machines can reliably publish their SSH server fingerprints, which clients can trust explicitly if signed by DNSSec.

All 12 comments

This would be especially useful if machines can reliably publish their SSH server fingerprints, which clients can trust explicitly if signed by DNSSec.

@armon Has there been any progress on this?

Hi @maticmeznar unfortunately we haven't been able to work this into an upcoming release yet. We will update this once we get some time to work on it.

What's a size/ difficulty estimate for this? Where should someone start working on a PR?

Seems like a possible working solution, however it has not been tested. https://github.com/hashicorp/consul/blob/master/vendor/github.com/miekg/dns/README.md

I think it might be usable in an unstable way. it seems pretty cool though.

+1 for official release and support of DNSSEC for Consul please

Still on the oven? Would be great to see these feature

+1 for official release and support of DNSSEC for Consul please

hmm 2014, clearly this has been underestimated how difficult it is to implement correctly. Can we have a status report so others can maybe help?

It seems like DNS over HTTPS (DoH) is maybe the way of the future instead. Would that be preferred to DNSSEC?

image

DNS over HTTPS or even DNS over plain TLS do not replace the need for DNSSEC. With DNSSEC the owner of a domain can digitially sign the DNS records for that domain. Then those digitally signed records can be transmitted via normal UDP/TCP DNS and the resolver can verify the authenticity of the data.

Encrypting the DNS protocol itself (via HTTPS or plain TLS) provides privacy between the resolver and the server. Basically it prevents and intermediate IP router from being able to discover which domains you are querying for. You still cannot blindly trust that the entity on the other end of that TLS connection hasn't altered the data in some way but must instead still rely on DNSSEC to provide the data authenticity.

+1 would like to see this

Was this page helpful?
0 / 5 - 0 ratings

Related issues

wargamez picture wargamez  路  4Comments

lmb picture lmb  路  4Comments

eshujiushiwo picture eshujiushiwo  路  3Comments

matteoturra picture matteoturra  路  4Comments

powerman picture powerman  路  3Comments