DNSSEC
Action | Key |
---|---|
Play / Pause | K or space |
Mute / Unmute | M |
Toggle fullscreen mode | F |
Select next subtitles | C |
Select next audio track | A |
Toggle automatic slides maximization | V |
Seek 5s backward | left arrow |
Seek 5s forward | right arrow |
Seek 10s backward | shift + left arrow or J |
Seek 10s forward | shift + right arrow or L |
Seek 60s backward | control + left arrow |
Seek 60s forward | control + right arrow |
Seek 1 frame backward | alt + left arrow |
Seek 1 frame forward | alt + right arrow |
Decrease volume | shift + down arrow |
Increase volume | shift + up arrow |
Decrease playback rate | < |
Increase playback rate | > |
Seek to end | end |
Seek to beginning | beginning |
Share this media
Download links
HLS video stream
You can use an external player to play this stream (like VLC).
HLS video streamWhen subscribed to notifications, an email will be sent to you for all added annotations.
Your user account has no email address.
Information on this media
This talk will explain the basics of DNSSec and how you can use them to secure your infrastructure. DNSsec is quite an old technology but it is not adopted everywhere yet. Nowadays however it is quite easy to set that in place.
It will also describe DANE and how you can use it to secure your TLS/SSH communication by storing the SSH keys of your servers inside your DNS zones, even in a frequently changing environment.
Tools used in this talk will be Bind, the Foreman and Puppet.
Julien Pivotto
Julien Pivotto is a young Open-Source consultant at Inuits where he is helping organisations with the deployment of long-term solutions based on Open-Source infrastructure.
He is a strong believer in the devops movement and has technical focus towards infrastructure automation, continuous integration, monitoring and high availability
Other media in the channel "Sécurité"
82 viewsMOWR, A virustotal-like service for web malwaresAugust 7th, 2016
277 views, 4 this yearMIG: Investigate 1,000 endpoints in 10sAugust 8th, 2016
59 viewsComplex malware & forensics investigationAugust 7th, 2016
129 viewsUsing and abusing MISP to track campaignsAugust 7th, 2016
18 viewsBuilding A Poor man’s Fir3Ey3 Mail ScannerAugust 8th, 2016
16 viewsHands-on security for DIY projectsAugust 7th, 2016