Why do we need DNSSEC?

Perceived need for DNSSEC

  • One side argues “if we truly needed it, it would be widely deployed after 25+ years”; current near-zero adoption in major orgs is seen as evidence it’s low-value or misdesigned.
  • Others say this is just a reflection of poor cybersecurity priorities; DNS hijacks and BGP-based attacks are real, and dismissing DNSSEC downplays genuine risks.

Threat models and real-world attacks

  • Pro-DNSSEC comments focus on:
    • On‑path attacks (ISP, Wi‑Fi, BGP hijacks) that can spoof DNS and obtain rogue TLS certs.
    • Documented BGP hijacks of DNS providers used to steal cryptocurrency or inject malicious JS.
    • DNS-based ACME/CAA flows where unsigned DNS lets attackers get certificates.
  • Skeptics respond that in practice most compromises are via registrar or DNS-provider account takeover (ATO), which DNSSEC doesn’t mitigate; BGP/DNS spoofing is treated as a rare, “fine‑tuned” threat.

Alternatives and “better fixes”

  • Suggested alternatives:
    • Secure CA↔registrar channels (RDAP/DoH) for validation, bypassing end‑user DNS entirely.
    • Multi‑perspective validation by CAs, RPKI + ASPA for routing security.
    • Stronger auth (U2F/passkeys) at DNS providers to stop ATO.
    • Transport security for DNS (DoH/DoT/DNSCrypt, encrypted zone transfers) instead of data signing.
  • Some argue “secure DNS” is needed, but DNSSEC is a poor mechanism compared with easier‑to‑deploy encrypted DNS.

Operational complexity and economics

  • DNSSEC is described as brittle, outage‑prone, and tooling‑poor: key mixups, chain issues, TTL/caching pitfalls, and spectacular outages at TLD/major sites.
  • Critics frame security as an economic problem: DNSSEC raises defender cost massively while barely increasing attacker cost for common attacks.
  • Supporters counter that cost is modest on modern platforms (e.g., Route53, Unbound, pi‑hole) and worth it for organizations with higher risk.

Trust, governance, and PKI concerns

  • DNSSEC is criticized as “another PKI” with roots controlled by governments and large operators, with no CT‑style transparency or realistic way to distrust misbehaving TLDs.
  • Some see it as effectively a key‑escrow system for states, offering “zero protection” against them.
  • WebPKI + Certificate Transparency is presented as strictly better in governance and revocation.

Client-side validation and UX

  • Core architectural complaint: DNSSEC validation usually happens in recursive resolvers, not clients; browsers trust a single “AD” bit.
  • Some want validation pushed to clients/OS APIs with better UX, but note that would be yet another massive migration.

Adoption, IPv6 comparison, and future

  • IPv6 is used as a contrast: slow start but now large share of traffic; DNSSEC has stagnated at very low deployment, even regressing in some regions.
  • Multiple commenters suggest “back to the drawing board”: keep the problem (DNS integrity) but design a new, simpler, incrementally deployable protocol rather than try to force DNSSEC to 40%+ deployment.