DNSSEC with Route 53: Protecting the core of the Internet

Andreas Wittig – 22 Mar 2021

The Internet relies on DNS. This makes it all the more important to do everything possible to protect the global DNS infrastructure from attacks. Andreas explains how DNSSEC protects from DNS spoofing. During the demo you will learn how to enable DNSSEC for your domains by using Route 53.

DNSSEC with Route 53: Protecting the core of the Internet

What you will learn by watching the video and following the demo?

  • Protect from DNS spoofing!
  • What is DNSSEC?
  • How to enable DNSSEC with Route 53?
  • Pros and Cons of DNSSEC

Enjoy the video!

Why is DNSSEC important? Because, DNSSEC protects from the following attach, called DNS spoofing.

Andreas and Michael Wittig

Please support our work!

We have published 334 articles, 42 podcast episodes, and 15 videos. It's all free and means a lot of work in our spare time.

$6,000.00 will help us to write in-depth service reviews and comparisons in 2022! With your help, we can continue to produce independent & high-quality content focused on AWS.

$1,454.00 raised

Thanks to Alan Leech, Alex DeBrie, ANTHONY RAITI, e9e4e5f0faef, Jeff Finley, jhoadley, Johannes Grumböck, Jonas Mellquist, Ken Snyder, Ross Mohan, Thorsten Hoeger, Todd Valentine, and all anonymous supporters for your help! We also want to thank all supporters who purchased a cloudonaut t-shirt.

Support us
  1. Attacker injects DNS records into DNS server/resolver.
  2. User resolves domain name, DNS server responds with “wrong” IP address.
  3. User sends requests to “wrong” server.
  4. Attacker steals password, reads sensitive information, …

DNS Spoofing

The CloudFormation templates used in the video are available at https://github.com/widdix/aws-cf-templates

I’ve used the following commands to deploy DNSSEC to us-east-1. Make sure to modify the stack names and parameters before using the commands.

aws cloudformation deploy --stack-name cloudonautio-key --template-file security/kms-key.yaml --parameter-overrides Service=dnssec-route53 KeySpec=ECC_NIST_P256 KeyUsage=SIGN_VERIFY
aws cloudformation deploy --stack-name cloudonautio-hz --template-file vpc/zone-legacy.yaml --parameter-overrides HostedZoneName=cloudonaut.io HostedZoneId=Z18W2IF733UZVC
aws cloudformation deploy --stack-name cloudonautio-dnssec --template-file vpc/zone-dnssec.yaml --parameter-overrides ParentZoneStack=cloudonautio-hz ParentKmsKeyStack=cloudonautio-key ParentAlertStack=operations-alert

When it comes to DNS, I’m using the book DNS and BIND to learn about the technical details.

A few links discussing DNSSEC:

Andreas Wittig

Andreas Wittig

I launched cloudonaut.io in 2015 with my brother Michael. Since then, we have published hundreds of articles, podcast episodes, and videos. It’s all free and means a lot of work in our spare time. We enjoy sharing our AWS knowledge with you.
Have you learned something new by reading, listening, or watching our content? If so, we kindly ask you to support us in producing high-quality & independent AWS content. We look forward to sharing our AWS knowledge with you.

Support us

Feedback? Questions? You can reach me via Email, Twitter, or LinkedIn.