<?xml version="1.0" encoding="utf-8" standalone="yes"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/">
  <channel>
    <title>SAD DNS on Answer</title>
    <link>https://answer.freetools.me/tags/sad-dns/</link>
    <description>Recent content in SAD DNS on Answer</description>
    <generator>Hugo -- 0.152.2</generator>
    <language>zh-cn</language>
    <lastBuildDate>Sat, 07 Mar 2026 04:42:36 +0800</lastBuildDate>
    <atom:link href="https://answer.freetools.me/tags/sad-dns/index.xml" rel="self" type="application/rss+xml" />
    <item>
      <title>DNS缓存投毒为何能在二十年间反复复活：从Kaminsky到SAD DNS的技术博弈</title>
      <link>https://answer.freetools.me/dns%E7%BC%93%E5%AD%98%E6%8A%95%E6%AF%92%E4%B8%BA%E4%BD%95%E8%83%BD%E5%9C%A8%E4%BA%8C%E5%8D%81%E5%B9%B4%E9%97%B4%E5%8F%8D%E5%A4%8D%E5%A4%8D%E6%B4%BB%E4%BB%8Ekaminsky%E5%88%B0sad-dns%E7%9A%84%E6%8A%80%E6%9C%AF%E5%8D%9A%E5%BC%88/</link>
      <pubDate>Sat, 07 Mar 2026 04:42:36 +0800</pubDate>
      <guid>https://answer.freetools.me/dns%E7%BC%93%E5%AD%98%E6%8A%95%E6%AF%92%E4%B8%BA%E4%BD%95%E8%83%BD%E5%9C%A8%E4%BA%8C%E5%8D%81%E5%B9%B4%E9%97%B4%E5%8F%8D%E5%A4%8D%E5%A4%8D%E6%B4%BB%E4%BB%8Ekaminsky%E5%88%B0sad-dns%E7%9A%84%E6%8A%80%E6%9C%AF%E5%8D%9A%E5%BC%88/</guid>
      <description>深入解析DNS缓存投毒攻击的技术本质，从2008年Kaminsky漏洞到2020年SAD DNS攻击、2023年MaginotDNS，再到2025年CVE-2025-40778，揭示这场持续二十年的攻防博弈背后的协议缺陷、防御措施与突破手段。</description>
    </item>
    <item>
      <title>DNS 缺乏身份验证的后果：为什么三十年前设计的协议至今仍在制造安全危机</title>
      <link>https://answer.freetools.me/dns-%E7%BC%BA%E4%B9%8F%E8%BA%AB%E4%BB%BD%E9%AA%8C%E8%AF%81%E7%9A%84%E5%90%8E%E6%9E%9C%E4%B8%BA%E4%BB%80%E4%B9%88%E4%B8%89%E5%8D%81%E5%B9%B4%E5%89%8D%E8%AE%BE%E8%AE%A1%E7%9A%84%E5%8D%8F%E8%AE%AE%E8%87%B3%E4%BB%8A%E4%BB%8D%E5%9C%A8%E5%88%B6%E9%80%A0%E5%AE%89%E5%85%A8%E5%8D%B1%E6%9C%BA/</link>
      <pubDate>Thu, 05 Mar 2026 15:31:43 +0800</pubDate>
      <guid>https://answer.freetools.me/dns-%E7%BC%BA%E4%B9%8F%E8%BA%AB%E4%BB%BD%E9%AA%8C%E8%AF%81%E7%9A%84%E5%90%8E%E6%9E%9C%E4%B8%BA%E4%BB%80%E4%B9%88%E4%B8%89%E5%8D%81%E5%B9%B4%E5%89%8D%E8%AE%BE%E8%AE%A1%E7%9A%84%E5%8D%8F%E8%AE%AE%E8%87%B3%E4%BB%8A%E4%BB%8D%E5%9C%A8%E5%88%B6%E9%80%A0%E5%AE%89%E5%85%A8%E5%8D%B1%E6%9C%BA/</guid>
      <description>从1983年DNS诞生到2020年SAD DNS攻击，互联网域名系统从未被设计为验证响应的真实性。本文深入剖析DNS缓存投毒、Sea Turtle国家级DNS劫持、DNS放大攻击等威胁的技术原理，详细解析DNSSEC如何通过链式信任和数字签名解决身份验证问题，以及为什么这一安全机制在部署三十年后仍只有不到6%的域名采用。</description>
    </item>
  </channel>
</rss>
