- DNSSEC [New]
- Confidentiality - OWO
- Protection against theft
- Anti-cybersquatting / Anti-typosquatting
Protect your domain against cache Poisoning.
A DNS server is used to obtain the IP address corresponding to a domain name (URL for a website), it can be seen as a directory. The IP address is necessary for your browser to contact the Web server responsible for the site that you want to visit, because the IP address uniquely identifies each machine connected to the Internet, just like a phone number. It is a small but crucial link for Internet security.
In recent years, hackers have developed methods of infecting DNS server allowing them to divert traffic to their servers (phishing, etc ...) by falsifying the answers given by the directory of the DNS.
.fr, .com, .net, .org, .biz, .eu, .be, .re,
.yt, .tf, .wf, .pm, .cz, .pl, .de, nl,
.se, .ch, .li, .sx, .at, .us
.co.uk, .org.uk, .me.uk, .me, .in*
More extensions to come soon!
To know how to configure DNSSEC on your dedicated server, follow: manual.
What is a DNS?
The user between the address www.ovh.ie in his Internet browser. A query is sent to the DNS server which returns the corresponding IP address: 220.127.116.11.
The Internet browser knows now the IP address of the server that contains the page www.ovh.ie. It sends a query to this IP address which returns the page content.
Danger: Cache Poisoning
A hacker has discovered a flaw in the DNS server. They manage to get into the server and change the address corresponding to www.ovh.ie of its server's IP: 203.0.113.78.
When the user enters the address www.ovh.ie, the browser goes to the DNS server to retrieve the corresponding IP address. The infected DNS returns the address made by the hacker: 203.0.113.78.
The browser uses this IP address to obtain the site's content. The rogue server sends back a page like www.ovh.ie, for example to obtain their personal data (phishing).
What is DNSSEC?
DNSSEC secures the authenticity of the DNS response. When the browser sends a request, it returns with an authentication key, certifying that the returned IP is correct.
The user is then provided access to the correct place when they receive an IP validated by DNSSEC
If a hacker tries to modify the table contained in the DNS server protected by DNSSEC, the latter refuses the requests and the information being sent is not signed.
Check out the interview from Stéphane Lesimple, manager of domain names at OVH.