Recensiones de DNSSEC
DNSSEC per Antoine POPINEAU
Recension de Trashify
Classificate 4 de 5
per Trashify, prije 5 godina40 recensiones
- Classificate 2 de 5per Ærion, prije 2 mjesecaThis used to work fine, but now reports 100% of websites as "not secure by DNSSEC" when using Cloudflare as the resolver. Setting it to Google solves the problem.
Ultimately though this extension needs support for custom DoH resolvers. - Classificate 2 de 5per Korwin, prije godinuWhile cloudflare.com/ssl/encrypted-sni/#results tells me that "DNSSEC. Attackers cannot trick you into visiting a fake website by manipulating DNS responses for domains that are outside their control," this extension claims that "cloudflare.com not secure by DNSSEC. Domain www.cloudflare.com is not secure through DNSSEC. Your connection is prone to man-in-the-middle attacks."
- Classificate 4 de 5per Wolfizen, prije godinuResults inaccurate when choosing Cloudflare as the resolver, but can be worked around by choosing Google as the resolver. No option for custom resolver or even native recursive resolution.
- Classificate 3 de 5per Usator de Firefox 18361289, prije godinuCan hopefully be made even better with https://bugzilla.mozilla.org/show_bug.cgi?id=1852752
- Classificate 1 de 5per PSYCHOPATHiO, prije godinuthis is only a choice of 1.1.1.1 or 8.8.8.8 that i can manually enter in settings, poitless i guess
- Classificate 2 de 5per Popi, prije 2 godineUnfortunately we never got to choose the resolver, and now it just stopped providing accurate results altogether.
- Classificate 5 de 5per Usator de Firefox 7035052, prije 3 godineWow! A DNSSEC extension that works! And no extra steps to install either.
- Classificate 2 de 5per CognitiveFeline, prije 4 godineused to display info and change but now it just always stays at NOPE doubt it's nope and 99% sure it's not me causing it.
- Classificate 1 de 5per ploedman, prije 4 godineRecently the Addon shows my Domain as "not secure by DNSSEC". But 3 Website to test the DNSSEC status says the Domain is secured by DNSSEC.
- Classificate 2 de 5per MarSanMar, prije 4 godineActualmente, esta extensión no funciona. La usé mucho tiempo y estaba contento con su funcionamiento, pero ahora mismo he tenido que buscar una alternativa.
- Classificate 5 de 5per Jernej, prije 4 godine
- Classificate 1 de 5per Usator de Firefox 13662450, prije 5 godinaNo longer works. Was good in the past, but these days say 100% of websites are not secured by DNSSEC, which is outright wrong.
- Classificate 5 de 5per Asclepius, prije 5 godinaThank you for this add-on. I just hope (since it isn't a "recommended" extension) that it is trustworthy. Aside from that concern, it serves its purpose. It would be nice if Firefox had built-in DNSSEC validation.
- Classificate 5 de 5per Boris Volkov, prije 5 godina
- Classificate 4 de 5per Usator de Firefox 15136226, prije 6 godinaThis add on works well, however there are some issues as pointed out by other reviewers. I would like to note that ECDSAP256SHA256 works for me. It would also be nice if the add on verified https sites with DANE pinned certificates.
- Classificate 4 de 5per Usator de Firefox 14672905, prije 6 godinaIt's great! And yes, would be even better once we have custom DNS, over TLS or not.
But this is a feature I have been waiting for so long, so I'm not going to hide my current feeling about this extension, it's awesome!! - Classificate 3 de 5per Usator de Firefox 13680056, prije 6 godinaIt will be nice to choose a custom DNSSec, I don't trust on google, and some ISP redirect the 1.1.1.1 to his own DNS.
- Classificate 5 de 5per Usator de Firefox 15299958, prije 6 godina
- Classificate 1 de 5per Renaud, prije 6 godinaUsing Cloudflare and Google for validation is not a good idea.
But also, validation fails for some kind of signatures, exemple: those using ECDSAP256SHA256. - Classificate 5 de 5per Usator de Firefox 14754691, prije 6 godina
- Classificate 2 de 5per Usator de Firefox 14514156, prije 7 godinaI would give at least 4 stars, if it would use my local resolver instead of using google/cloudflare for DNS lookups.
Reason behind the downgrade:
1. it introduces a single point of failure:
if either of those sites can't answer, _ALL_ users of this extension (who have configured that site) can't use it, if it would use the local resolver and that failed it would be just the users of the local machine who experience that problem.
2. it is a privacy hazard:
a hacker needs to crack only a single (ok: two) machine(s) to get a complete log of who on this world tried to communicate with which web server....
if it would use the local configured resolver that _might_ still be a problem, depending on the configuration of said resolver, but mostly (I hope) those will contact multiple authoritative servers to walk from the root to the leaf containing the desired information and only the _last_ server will know which site I wanted to contact, but there it's irrelevant, since _that_ site knows it anyway.... (btw.: _THIS_ is the reason why I disabled this extension)
3. it can't verify local domains
according to 'dig' my own domains are DNSSEC enabled and working correctly, still your extension reports them as unsigned because there is no global glue record, as such while it is reachable from the world (via dyndns), the world doesn't see the DNSSEC information stored on my local dns-server. - Classificate 2 de 5per IPv777, prije 7 godinaPlease let the user choose (a text input) his own DNS resolver(s)