Two new validating DNS services launched

In recent weeks, two new DNS services for the general public have been launched, and both support DNSSEC validation.

The first is Quad9, an industry consortium established by IBM, PCH and a long list of ICT security companies. Given the consortium's membership, it's no surprise that the service places particular emphasis on blocking referrals to domain names associated with abuse. Quad9 says that all query/response information will be retained — classified not by IP address but on the basis of geolocation — and shared with participants.

The second new DNS service is 1.1.1.1, an initiative by CDN provider Cloudflare and APNIC, the IP address administrator for the APAC region. The service is aimed explicitly at end users, with privacy protection as its central feature.

Manuals are available here [1, 2] for configuring a resolver running Unbound and configuring the 1.1.1.1 service on, respectively, Raspberry Pi and the OpenWrt platform. Those mini-systems are therefore now part of the same family as the Valibox, a device that lets end users immediately enable end-to-end DNSSEC validation on their wireless home/office networks.

Google's Public DNS and OpenDNS

With the new DNS services up and running, there are now two DNSSEC-validating alternatives to Google's Public DNS, which (temporarily) logs users' IP addresses, for example.

The fourth major public DNS service is OpenDNS, a commercial service now under the Cisco umbrella, which doesn't support DNSSEC validation.

Comments

  • Monday 12 November 2018

    Internet security

    How to spot a fake URL

    Thumb-https

    Tips to spot a fake URL

    Read more
  • Monday 18 December 2017

    Knowledge

    Preserving our digital heritage

    Thumb-dds-avatars

    Unique sources of human knowledge and expression

    Read more
  • Monday 12 November 2018

    Internet security

    Watch out! Fake Tikkie domain name used in scam

    Tikkie-thumb

    Case: Tikkie domain name scam

    Read more

Sorry

Your browser is too old to optimally experience this website. Upgrade your browser to improve your experience.