How to test and validate DNSSEC using dig command line

    Date 20 Dec 2019
    1942
    Posted By Brittany Day
    LS Hmepg 337x500 13

    How do I test and validate DNSSEC using thedig commandline under Linux, macOS, *BSD, and Unix-like systems? Learn how to test and validateDNSSEC using dig command line:

    The DNSSEC is an acronym for Domain Name System Security Extensions. It is a suite of Internet Engineering Task Force (IETF) specifications for securing certain kinds of information provided by the Domain Name System (DNS). Dig is a DNS lookup tool to query dns servers for DNS records. For instance, dig can tell you the IP address of the mail server or website using a DNS resolver. One can use DNSSEC to mitigate security risk and helps prevent malicious motions like cache poisoning, pharming, and man-in-the-middle attacks. With DNSSEC, one can verify and authentication of DNS data and DNS integrity. This page explains how to test and validate DNSSEC issues that affect DNS resolution using thedig command.

    The link for this article located at nixCraft is no longer available.

    LinuxSecurity Poll

    If you are using full-disk encryption: are you concerned about the resulting performance hit?

    No answer selected. Please try again.
    Please select either existing option or enter your own, however not both.
    Please select minimum 0 answer(s) and maximum 2 answer(s).
    /main-polls/34-if-you-are-using-full-disk-encryption-are-you-concerned-about-the-resulting-performance-hit?task=poll.vote&format=json
    34
    radio
    [{"id":"120","title":"Yes","votes":"13","type":"x","order":"1","pct":65,"resources":[]},{"id":"121","title":"No ","votes":"7","type":"x","order":"2","pct":35,"resources":[]}] ["#ff5b00","#4ac0f2","#b80028","#eef66c","#60bb22","#b96a9a","#62c2cc"] ["rgba(255,91,0,0.7)","rgba(74,192,242,0.7)","rgba(184,0,40,0.7)","rgba(238,246,108,0.7)","rgba(96,187,34,0.7)","rgba(185,106,154,0.7)","rgba(98,194,204,0.7)"] 350
    bottom 200

    Please enable / Bitte aktiviere JavaScript!
    Veuillez activer / Por favor activa el Javascript![ ? ]

    We use cookies to provide and improve our services. By using our site, you consent to our Cookie Policy.