frontpage.
newsnewestaskshowjobs

Made with ♥ by @iamnishanth

Open Source @Github

Intelligence on Tap: Redefining the Human Role

https://medium.com/distilled-ai/intelligence-on-tap-redefining-the-human-role-13170e513a04
1•squircle•52s ago•0 comments

What Is DNS at the Edge – Performance, Security

https://axonshield.com/dns-at-the-edge-performance-security-and-strategic-advantage
1•dc352•1m ago•0 comments

Washington Startup Named Finalist for 2025 World of Wipes Innovation Award

https://www.mycookwarecare.com/blogs/cookware-care-blog/2025-wow-innovation-award-finalist
1•cookwarecare•2m ago•0 comments

BF16 and Image Generation Models

https://engineering.drawthings.ai/p/bf16-and-image-generation-models-803cf0515bee
1•liuliu•3m ago•0 comments

'A bundle of microscopic tornadoes' may have given the universe its structure

https://www.livescience.com/physics-mathematics/particle-physics/a-bundle-of-microscopic-tornadoes-may-have-given-the-universe-its-structure
1•Bluestein•3m ago•0 comments

Ask HN: What are the most popular uses of LLMs (other than code/image gen)?

1•mi3law•3m ago•0 comments

The Less Humble Programmer (2023)

https://digitalhumanities.org/dhq/vol/17/2/000698/000698.html
2•Bogdanp•3m ago•0 comments

Replit Pricing Change Is Effort Based Pricing Fair?

1•zahirbmirza•4m ago•0 comments

The 16B-record data breach that no one's ever heard of

https://cybernews.com/security/billions-credentials-exposed-infostealers-data-leak/
3•882542F3884314B•4m ago•0 comments

Easy to use, protected and tracked artifact delivery

https://kagehq.com/
1•lexokoh•7m ago•0 comments

With AI, we all feel like "10x developers"

2•rvz•9m ago•2 comments

Another win for EU users? Ads in WhatsApp won't be coming this year

https://www.neowin.net/news/another-win-for-eu-users-ads-in-whatsapp-wont-be-coming-this-year/
2•bundie•13m ago•0 comments

Elon Musk: Digital Superintelligence, Multiplanetary Life, Being Useful [video]

https://www.youtube.com/watch?v=cFIlta1GkiE
1•sandslash•13m ago•0 comments

Denisovan mitochondrial DNA from dental of the >146k-year-old Harbin cranium

https://www.cell.com/cell/fulltext/S0092-8674(25)00627-0?_returnURL=https%3A%2F%2Flinkinghub.elsevier.com%2Fretrieve%2Fpii%2FS0092867425006270%3Fshowall%3Dtrue
3•wslh•15m ago•0 comments

Trying Out Wayland in 2025

https://www.tyil.nl/post/2025/02/25/trying-out-wayland-in-2025/
1•airhangerf15•16m ago•0 comments

Show HN: Clarabase – Managed REST APIs from a Single JSON Schema in Seconds

1•hyperaeolian•16m ago•0 comments

Indicators of Global Climate Change 2024: annual update of key indicators

https://www.igcc.earth/key-messages
1•layer8•17m ago•1 comments

Change your Google password now, 16B login records were recently exposed

https://www.androidpolice.com/unprecedented-data-leak-exposes-16-billion-login-credentials/
1•mikece•17m ago•0 comments

Cardiovascular risk associated with the use of cannabis and cannabinoid

https://heart.bmj.com/content/early/2025/06/10/heartjnl-2024-325429
1•goplayoutside•17m ago•0 comments

Show HN: I built an app to explain why chess moves are good or bad

https://app.chesscoach.dev/
1•anantdole•19m ago•0 comments

Temperatures pass 32C as first UK area enters heatwave

https://www.bbc.com/news/articles/cm2z4rmyl0yo
3•throw0101d•22m ago•0 comments

Estrogen: A Trip Report

https://smoothbrains.net/posts/2025-06-15-estrogen.html
11•sebg•23m ago•0 comments

Hydronuclear Testing

https://computer.rip/2025-06-19-hydronuclear-testing.html
1•aberoham•28m ago•0 comments

FounderFlow – Build Smarter, Faster With an AI Copilot That Guides Every Step

https://founderflow.crd.co
1•mmarvramm•29m ago•0 comments

Ask HN: What is the best way to generate a ton of money as a dev?

2•jerawaj740•31m ago•2 comments

CasualOS: Web-based tools for interactive experiences

https://docs.casualos.com/
1•j0e1•31m ago•0 comments

Eliza: The doll that teaches girls to code

https://www.elizadolls.com
10•yz-exodao•32m ago•2 comments

I would enjoy an HN chat. Is there one?

3•lysace•33m ago•3 comments

Openpilot 0.9.9

https://blog.comma.ai/099release/
1•LorenDB•33m ago•0 comments

Ask HN: How often do you come up with disruptive ideas?

1•squircle•37m ago•0 comments
Open in hackernews

Why do we need DNSSEC?

https://howdnssec.works/why-do-we-need-dnssec/
44•gpi•3h ago

Comments

davidu•2h ago
Narrator: We do not.
tptacek•2h ago
We don't. If we did, we'd have it by now. It's been over 25 years of making appeals like this.

It's a fun site! I'm not entirely sure why the protagonist is a green taco, but I can see why a DNS provider would make a cartoon protocol explainer. It's just that this particular protocol is not as important as the name makes it sound.

immibis•2h ago
We need a lot of things we don't have.

Note that without DNS security, whoever controls your DNS server, or is reliably in the path to your DNS server, can issue certificates for your domain. The only countermeasure against this is certificate transparency, which lets you yell loudly that someone's impersonating you but doesn't stop them from actually doing it.

tptacek•2h ago
In this case, there's an avalanche of money and resources backing up the problem domain DNSSEC attempts to make contributions in, and the fact that it's deployed in practically 0% of organizations with large security teams is telling.
iscoelho•2h ago
I would say it is more a testament to the unfortunate state of cybersecurity. These "theoretical" attacks happen. Everyone just thinks it won't be them.
tptacek•2h ago
My rebuttal is that the DNSSEC root keys could hit Pastebin tonight and in almost every organization in the world nobody would need to be paged. That's not hyperbole.
avidiax•2h ago
You are mostly right, but I would hope that certain core security companies and organizations would get paged. Root CAs and domain registrars and such should have DNSSEC validation.

Unfortunately, DNSSEC is a bit expensive in terms of support burden, additional bugs, reduced performance, etc. It will take someone like Apple turning DNSSEC validation on by default to shake out all the problems. Or it will take an exploitable vulnerability akin to SIM-swapping to maybe convince Let's Encrypt! and similar services reliant on proof-by-dns that they must require DNSSEC signing.

tptacek•2h ago
SIM-swapping is a much more important attack vector than on-path/off-path traffic interception, and are closer to how DNS hijacking happens in practice (by account takeover at registrars).
immibis•1h ago
If that happened, we'd revert to pre-DNSSEC security levels: an attack would still be hard to pull off (unless you own a root DNS server or are reliably in the path to one). It's like knowing the private key for news.ycombinator.com - it still doesn't do anything unless I can impersonate the Hacker News server. But that was still enough of a risk to justify TLS on the web. Mostly because ISPs were doing it to inject ads.
tptacek•28m ago
We are demonstrably in "pre-DNSSEC" security levels today. DNSSEC has almost no serious adoption.
iscoelho•2h ago
It is important. This is unfortunate rhetoric that is harming the safety of the internet.

"For instance, in April 2018, a Russian provider announced a number of IP prefixes (groups of IP addresses) that actually belong to Route53 Amazon DNS servers."

By BGP hijacking Route53, attackers were not only able to redirect a website to different IPs, globally, but also generate SSL certificates for that website. They used this to steal $152,000 in cryptocurrency. (I know I know, "crypto", but this can happen to any site: banking, medical, infrastructure)

Also, before you say, RPKI doesn't solve this either, although a step in the right direction. DNSSEC is a step in the right direction as well.

[1] https://www.cloudflare.com/learning/security/glossary/bgp-hi...

tptacek•2h ago
BGP attacks change the semantic meaning of IP addresses themselves. DNSSEC operates at a level above that. The one place this matters in a post-HTTPS-everywhere world is at the CAs, which are now all moving to multi-perspective validation.
iscoelho•2h ago
As you should be aware, multi-perspective validation does not solve anything if your BGP hijack is accepted to be global. You will receive 100% of the traffic.

DNSSEC does greatly assist with this issue: It would have prevented the cited incident.

tptacek•2h ago
A BGP attacker doesn't need to alter the DNS to intercept traffic; they're already intercepting targeted traffic at IP selectivity.
iscoelho•2h ago
There are 2 ways to pull off this attack:

1. Hijack the HTTP/HTTPS server. For some IP ranges, this is completely infeasible. For example, hijacking a CloudFlare HTTP/HTTPS range would be almost impossible theoretically based on technical details that I won't go through listing.

2. Hijack the DNS server. Because there's a complete apathy towards DNS server security (as you are showing) this attack is very frequently overlooked. Which is exactly why in the cited incident attackers were capable of hijacking Amazon Route53 with ease. *DNSSEC solves this.*

If either 1 or 2 work, you have yourself a successful hijack of the site. Both need to be secure for you to prevent this.

tptacek•2h ago
In summation, you propose a forklift upgrade of the DNS requiring hundreds of millions of dollars of effort from operators around the world, introducing a system that routinely takes some of the most sophisticated platforms off the Internet entirely when its brittle configuration breaks, to address the problem of someone pulling off a global hijack of all the Route53 addresses.

At this point, you might as well just have the CABForum come up with a new blessed verification method based on RDAP. That might actually happen, unlike DNSSEC, which will not. DNSSEC has lost signed zones in North America over some recent intervals.

I do like that the threat model you propose is coherent only for sites behind Cloudflare, though.

iscoelho•2h ago
"I do like that the threat model you propose is coherent only for sites behind Cloudflare, though."

The threat model I proposed is coherent for Cloudflare because they have done a lot of engineering to make it almost impossible to globally BGP hijack their IPs. This makes the multi-perspective validation actually help. Yes, other ISPs are much more vulnerable than Cloudflare, is there a point?

You are not saying DNSSEC doesn't serve a real purpose. You are saying it is annoying to implement and not widely deployed as such. That alone makes me believe your argument is a bit dishonest and I will abstain from additional discussion.

tptacek•1h ago
No, I'm saying it doesn't serve a real purpose. I've spent 30 years doing security work professionally and one of the basic things I've come to understand is that security is at bottom an economic problem. The job of the defender is to asymmetrically raise costs for attackers. Look at how DNS zones and certificates are hijacked today. You are proposing to drastically raise defender costs in a way that doesn't significantly alter attacker costs, because they aren't in the main using the exotic attack you're fixated on.

If we really wanted to address this particular attack vector in a decisive way, we'd move away, at the CA level, from relying on the DNS protocol browsers use to look up hostnames altogether, and replace it with direct attestation from registrars, which could be made _arbitrarily_ secure without the weird gesticulations DNSSEC makes to simultaneously serve mass lookups from browsers and this CA use case.

But this isn't about real threat models. It's about a tiny minority of technologists having a parasocial relationship with an obsolete protocol.

iscoelho•1h ago
What are you talking about? This is about real threat models. DNS hijacks are real and documented. DNSSEC solves them.

It is sounding more like you have a parasocial relationship with DNSSEC (and it isn't a good one it appears).

tptacek•1h ago
Are you claiming that most DNS zone hijacks occur because an on-path attacker intercepts and spoofs replies to DNS queries? That's not the case.
iscoelho•1h ago
I never said "most". I said it happens and is documented.
tptacek•1h ago
I'm pretty satisfied with how this part of the thread represents this part of my argument.
deknos•3m ago
yeah, the same for the rest. your fanboys are happy and the rest is just tired, because everyone who does not share your point of view has a invalid opinion.
tigerente•31m ago
What would be the most common method of DNS zone hijacks, Kaminsky attacks?
tptacek•30m ago
No, to a first approximation those attacks ~never happen. Most zones are hijacked by ATOs at registrars.
teddyh•26m ago
> It is sounding more like you have a parasocial relationship with DNSSEC (and it isn't a good one it appears).

He does. Just examine his comment history regarding DNSSEC. It’s full of rhetoric and bluster, appeals to authority and dismissal of arguments not from what he considers an authority, and when he runs out of arguments entirely, he stops responding. And he’s somewhat of a celebrity, so his arguments are all upvoted, while his critics are all downvoted, regardless of merit.

xorcist•2h ago
It does certainly make it easier. Sure, we can survive without it, but cryptographic signing of dns records is useful for a number of things.
tptacek•2h ago
Counterpoint: no it isn't, which is why virtually nobody uses it. Even the attack this thread centers on --- BGP hijacking of targeted DNSSEC servers to spoof CA signatures --- is a rounding error sidenote compared to the way DNS zones actually get hijacked in practice (ATO attacks against DNS providers).

If people were serious about this, they'd start by demanding that every DNS provider accept U2F and/or Passkeys, rather than the halfhearted TOTP many of them do right now. But it's not serious; it's just motivated reasoning in defense of DNSSEC, which some people have a weird stake in keeping alive.

iscoelho•1h ago
You are again ignoring the fact that DNSSEC would have prevented a $152,000 hack. Yes, we are aware organizations are not always serious about security. For those that are though, DNSSEC is a helpful tool.
tptacek•1h ago
No, it isn't. It attempts and mostly fails to address one ultra-exotic attack, at absolutely enormous expense, principally because the Internet standards community is so path-dependent they can't take a bad cryptosystem designed in the mid-1990s back to the drawing board. You can't just name call your way to getting this protocol adopted; people have been trying to do that for years, and the net result is that North American adoption fell.

The companies you're deriding as unserious about security in general spend drastically more on security than the companies that have adopted it. No part of your argument holds up.

iscoelho•1h ago
"at absolutely enormous expense"

Citation? A BGP hijack can be done for less than $100.

"You can't just name call your way to getting this protocol adopted"

I do not care if you adopt this protocol. I care that you accurately inform others of the documented risks of not adopting DNSSEC. There are organizations that can tolerate the risk. There are also organizations that are unaware because they are not accurately informed (due to individuals like yourself), and it is not covered by their security audits. That is unfortunate.

tptacek•1h ago
The cost I'm talking about is the defender's.
iscoelho•1h ago
Oh stop with the hyperbole. Fortune 500's almost all outsource DNS to UltraDNS/Route53/Dyn/Cloudflare. They will spend longer having meetings about implementing it, rebutting individuals like yourself, than spending 5 minutes actually implementing it.

I don't understand why this is such a polarizing topic for individuals like you. It's as if DNSSEC burned down your house. It doesn't make sense to me.

tptacek•1h ago
I'm not sure what this has to do with anything I've said on this thread, but we don't have to keep pressing these arguments; I'm pretty satisfied with the case I've made so far.
growse•1h ago
Slack's house literally did burn down for 24 hours because of DNSSEC back into 2021.

When you frame the risk as "marginal benefit against one specific threat" Vs "removes us from the internet for 24 hours", the big players pass and move on. This is the sort of event the phrase "sev 1" gets applied to.

Some fun companies have a reg requirement to provide service on a minimum SLA, otherwise their license to operate is withdrawn. Those guys run the other way screaming when they hear things like "DNSSEC" (ask me how I know).

What percentage of the fortune 500 is served over DNSSEC?

iscoelho•1h ago
and Slack.com still uses DNSSEC. They appear to not have come to the same conclusion.
tptacek•29m ago
They added DNSSEC because of FedGov accounts that require it.
phillipseamore•1h ago
And at least Let's encrypt actually verifies DNSSEC before issuing certificates. IIRC it will become mandatory for all CA's soon. DNSSEC for a domain plus restrictive CAA rules should ensure that no reputable CA would issue a rogue cert.
tptacek•1h ago
It absolutely will not. Most domains aren't hijacked by spoofing the DNS to begin with.
iscoelho•1h ago
"Most domains". Yes, it is possible that nobody bothers to DNS hijack your domains. Sadly I've worked for organizations where it did happen, and now they have DNSSEC.
tptacek•1h ago
I invite anybody who thinks this is a mic drop to pull down the Tranco research list of most popular/important domains on the Internet --- it's just a text file of zones, one per line --- and write the trivial bash `for` loop to `dig +short ds` each of those zones and count how many have DNSSEC.

For starters you could try `dig +short ds google.com`. It'll give you a flavor of what to expect.

zahllos•2h ago
The argument counter dnssec is that if you are trying to find some random A record for a server, to know if it is the right one, TLS does that fine provided you reasonably trust domain control validation works i.e. CAs see authentic DNS.

An argument for DNSSEC is any service configured by SRV records. It might be totally legitimate for the srv record of some thing or other to point to an A record in a totally different zone. From a TLS perspective you can't tell, because the delegation happened by SRV records and you only know if that is authentic if you either have a signed record, or a direct encrypted connection to the authoritative server (the TLS connection to evil.service.example would be valid).

So it depends what you expect out of DNS.

iscoelho•2h ago
TLS doesn't provide any security in this case because TLS certificates are generated based on DNS. See Lets Encrypt.
muppetman•2h ago
DNSSec has caused so many outages at this point it's a joke.

You have to be so insanely careful and plan everything to the nth degree otherwise you break everything: https://internetnz.nz/news-and-articles/dnssec-chain-validat...

The idea is important. What it aims to protect is important. The current implementation is horrible, far too complex and fraught with so many landminds that no one wants to touch it.

If Geoff Huston is suggesting it might be time to stick a fork in DNSSec because it's done, then IMHO it's well cooked. https://blog.apnic.net/2024/05/28/calling-time-on-dnssec/

iscoelho•2h ago
Yeah I'm by no means saying the implementation is good. RPKI is a joke as well in my opinion. But it's all we have right now.

I am saying it is dishonest to discount the real security threat of not having DNSSEC.

burnt-resistor•1h ago
Related:

- ECC vs. non-ECC memory and bitsquatting when people said "oh, it doesn't matter and it's too expensive for no benefit."

- http:// was, for years, normalized pre-PRISM.

- Unsecured DNS over 53/tcp+udp (vs. DoH today) is a huge spoofing and metadata collection threat surface.

rsync•1h ago
"Unsecured DNS over 53/tcp+udp (vs. DoH today) is a huge spoofing and metadata collection threat surface"

Genuinely curious:

What actor, in 2025, would exist in your threat model for DoH ... but wouldn't simultaneously be sniffing SNI ?

I can't think of any.

I cannot think of any good reason to be serious about DoH and DNS leakage in the presence of unencrypted SNI.

What am I missing ?

iscoelho•1h ago
Not saying they are malicious actors, but easy answer would be any Public WiFi anywhere. They all intercept DNS, less than 1% intercept SNI.

It is also public knowledge that certain ISPs (including Xfinity) sniff and log all DNS queries, even to other DNS servers. TLS SNI is less common, although it may be more widespread now, I haven't kept up with the times.

growse•14m ago
Isn't the vast majority of TLS connections using SNI today?
ikiris•29m ago
tls1.3 exists
nine_k•55m ago
There are two things mixed up. "We need secure DNS" != "we need DNSSEC".

There is a huge demand for securing DNS-related things, but DNSSEC seems to be a poor answer. DoH is a somehow better answer, with any shortcomings it may have, and it's widely deployed.

I suspect that a contraption that would wrap the existing DNS protocol into TLS in a way that would be trivial to put in front of an existing DNS server and an existing DNS client (like TLS was trivial to put in front of an HTTP server), might be a runaway success. A solution that wins is a solution which is damn easy to deploy, and not easy to screw up. DNSSEC is not it, alas.

iscoelho•53m ago
DoH does not solve anything that DNSSEC solves. They have almost no overlap.
ClumsyPilot•49m ago
But TLS relies on having a domain If domain intern depends on tls you have chicken and egg problem
nine_k•23m ago
TLS internally does not depend on a domain in the DNS sense, it basically certifies a chain of signatures bound to a name. That chain can be verified, starting from the root servers.

The problem is more in the fact that TLS assumes creation of a long-living connection with an ephemeral key pair, while DNS is usually a one-shot interaction.

Encrypting DNS would require caching of such key pairs for some time, and refreshing them regularly but not too often. Same for querying and verifying certificates.

throw0101d•1h ago
> We don't. If we did, we'd have it by now. It's been over 25 years of making appeals like this.

See also IPv6. ;)

Edit: currently at "0 points". People, it was a joke. Chill.

tptacek•1h ago
We very definitely do have IPv6. I'm using IPv6 right now. Last numbers I saw, over 50% of North American hits to Google were IPv6. DNSSEC adoption in North America is below 4%, and that's by counting zones, most of which don't matter --- the number gets much lower if you filter it down to the top 1000 zones.
throw0101d•1h ago
> We very definitely do have IPv6. I'm using IPv6 right now.

I'm not. Neither is my home wireline PON ISP, even though they have it on their mobile network (but my previous ISP did).

Also, every time there's an IPv6 article on HN there are entire sub-threads of people saying it's never going to come along. ¯\_(ツ)_/¯

* https://news.ycombinator.com/item?id=44306792

JdeBP•54m ago
Well for some value of "we" and some value of "have". (-:
api•1h ago
If you want the net to support end to end connectivity we need IPv6. Otherwise you'll end up with layers and layers of NAT and it will become borderline impossible.

A lot of protocols get unstable behind layers of NAT too, even if they're not trying to do end to end / P2P. It adds all kinds of unpredictable timeouts and other nonsense.

aspbee555•2h ago
because I can have my certificate authority in my DNS records and my app can verify the CA cert is from a trusted/verified source
tptacek•1h ago
This would theoretically be possible if browsers did DANE and didn't, because of middlebox fuckery, have to have a fallback path to the X.509 WebPKI because DNSSEC requests get dropped like 5% of the time. But because that is the case, no browser does DANE validation today, and when they did, many years ago, those DANE CA certs were effectively yet another CA; they actually expanded your attack surface rather than constricting it.

Even if that wasn't the case --- and it emphatically is --- you'd still be contending with a "personal CA" that in most cases would have its root of trust in a PKI operated by world governments, most of which have a demonstrated aptitude for manipulating the DNS.

burnt-resistor•1h ago
Optional, alternative standards don't have visibility and don't get used.

Without a way to measure, nothing happens. There was once a few, UX-hostile DNSSEC & DANE browser extensions but these never worked well and were discontinued.

Purveyors of functional DNSSEC: https://freebsd.org

anonymousiam•1h ago
Dan Kaminsky showed us why we need DNSSEC. Without it, it's quite easy to MITM and/or spoof network traffic. Some governments like to do this, so they'll continue to make it difficult for DNSSEC to be fully adopted.

The original registrar, Network Solutions, doesn't even fully support DNSSEC. You can only get it if you pay them an extra $5/mo and let them serve your DNS records for you. So for $5/mo you get DNSSEC, but you defer control of your records to them, which isn't really secure.

https://community.cloudflare.com/t/dnssec-on-network-solutio...

tptacek•1h ago
It's trivial to spoof DNS even with DNSSEC set up, because DNSSEC is a server-to-server protocol. Your browser doesn't speak DNSSEC; it speaks plaintext DNS, and trusts a single bit in the response header that says whether the upstream caching resolver actually checked signatures.
tialaramex•1h ago
Parts of the inevitable Thomas Ptacek DNSSEC rant remind me of the years of denialism from C++ people before the period when they were "concerned" about safety and the past few years of at least paying lip service to the idea that C++ shouldn't be awful...
Avamander•35m ago
We don't. It's just an another PKI with operators you can never get rid of if they misbehave. That alone makes it not possible to start relying on it.
1vuio0pswjnm7•16m ago
"DNS resolvers are the ones in charge of tracking down this information for you."

If one uses them.

One can alternatively use iterative queries where no "DNS resolver", i.e., recursive resolver, is used.

Many years ago I wrote a system for interative resolution for own use, as an experiment. I learnt that it can be faster than recursive resolution.

People have since written software for iterative resolution and reached similar conclusions, e.g., https://lizizhikevich.github.io/assets/papers/ZDNS.pdf

Unfortunately authoritative servers generally do not encrypt their responses. IMO this would be more useful than "DNSSEC".

"And that data is often provided by authoritative servers."

What are examples of data not provided by authoritative servers.