SlideShare a Scribd company logo
Why Dane?
Geoff Huston
Chief Scientist, APNIC
Which Bank? My Bank!
I	hope!
Security on the Internet
How	do	you	know	that	you	are	going	to	where	
you	thought	you	were	going	to?
Security on the Internet
How	do	you	know	that	you	are	going	to	where	
you	thought	you	were	going	to?
Security on the Internet
Also,	how	can	you	keep	your	session	a	secret	
from	wire(less)	snoopers?
Security on the Internet
Also,	how	can	you	keep	your	session	a	secret	
from	wire(less)	snoopers?
Opening the Connection:
First Steps
Client:
DNS	Query:
www.commbank.com.au?
DNS	Response:
104.97.235.12
TCP	Session:
TCP	Connect	104.97.235.12,	port	443
Hang on…
$ dig -x 104.97.235.12 +short
a104-97-235-12.deploy.static.akamaitechnologies.com.
That’s	not an	IP	addresses	that	was	allocated	to	the	Commonwealth	Bank!
The	Commonwealth	Bank	of	Australia	has	140.168.0.0	- 140.168.255.255	
and	203.17.185.0	- 203.17.185.255
So why should my browser	trust	that 104.97.235.12	is really the “proper”	web	
site	for	the Commonwealth	Bank	of Australia,	and not some	dastardly evil
scam designed to	steal my passwords and my money?
How	can my browser	tell the difference between an intended truth and a	lie?
Its all about cryptography
The Basic Challenge
Pick	a	pair	of	keys	such	that:
– Messages	encoded	with	
one	key	can	only	be	
decoded	with	the	other	
key
– Knowledge	of	the	value	of	
one	key	does	not	infer	the	
value	of	the	other	key
The Power of Primes
(me)d ≡	m (mod n)
As	long	as	d and	n are	relatively	large,	and	n is	
the	product	of	two	large	prime	numbers,	then	
finding	the	value	of	d when	you	already	know	
the	values	of	e and	n is	computationally	
expensive
Why is this important?
Because much of the
foundation of Internet
Security rests upon this
prime number relationship
TLS Connections
https://rhsecurity.wordpress.com/tag/tls/
TLS Connections
https://rhsecurity.wordpress.com/tag/tls/
TLS Connections
https://rhsecurity.wordpress.com/tag/tls/
TLS Connections
https://rhsecurity.wordpress.com/tag/tls/
Domain Name Certification
• The	Commonwealth	Bank	of	Australia	has	generated	a	key	
pair
• And	they	passed	a	certificate	signing	request	to	a	company	
called	“Symantec”
• Who	is	willing	to	vouch	(in	a	certificate)	that	the	entity	who	
goes	by	the	domain	name	of		www.commbank.com.au also	
has	a	certain	public	key	value
• So	if	I	can	associate	this	public	key	with	a	connection	then	I	
have	a	high	degree	of	confidence	that	I’ve	connected	to	
www.commbank.com.au,	as	long	as	I	am	prepared	to	trust	
Symantec	and	the	certificates	that	they	issue
Domain Name Certification
• The	Commonwealth	Bank	of	Australia	has	generated	a	key	
pair
• And	they	passed	a	certificate	signing	request	to	a	company	
called	“Symantec”
• Who	is	willing	to	vouch	(in	a	certificate)	that	the	entity	who	
goes	by	the	domain	name	of		www.commbank.com.au also	
has	a	certain	public	key	value
• So	if	I	can	associate	this	public	key	with	a	connection	then	I	
have	a	high	degree	of	confidence	that	I’ve	connected	to	
www.commbank.com.au,	as	long	as	I	am	prepared	to	trust	
Symantec	and	the	certificates	that	they	issue
Local Trust
The cert I’m being
asked to trust was
issued by a certification
authority that my
browser already trusts –
so I trust that cert!
Local Trust or Local
Credulity*?
That’s	a	big	list	of	people	to	
Trust
Are	they	all	trustable?
*
Local Credulity
That’s	a	big	list	of	people	to	
Trust
Are	they	all	trustable?
Local Credulity
That’s	a	big	list	of	people	to	
Trust
Are	they	all	trustable?
But my bank used Symantec
as	their	Certificate	Authority
And	Symantec	NEVER	lie	in	the	certificates	they	
issue
Never?
Well, hardly ever
http://arstechnica.com/security/2017/01
/already-on-probation-symantec-issues-
more-illegit-https-certificates/
With unpleasant consequences
when it all goes wrong
With unpleasant consequences
when it all goes wrong
International Herald Tribune
Sep 13, 2011 Front Page
What’s going wrong here?
• The	TLS	handshake	cannot	specify	WHICH	CA	
should	be	used	to	validate	the	digital	
certificate
• Your	browser	will	allow	ANY	CA	to	be	used	to	
validate	a	certificate
What’s going wrong here?
• The	TLS	handshake	cannot	specify	WHICH	CA	
should	be	used	to	validate	the	digital	
certificate
• Your	browser	will	allow	ANY	CA	to	be	used	to	
validate	a	certificate
What’s going wrong here?
• The	TLS	handshake	cannot	specify	WHICH	CA	
should	be	used	to	validate	the	digital	
certificate
• Your	browser	will	allow	ANY	CA	to	be	used	to	
validate	a	certificate
Here’s a lock – it might be the
lock on your front door for all I
know.
The lock might LOOK secure,
but don’t worry – literally ANY
key can open it!
What’s going wrong here?
• There	is	no	incentive	for	quality	in	the	CA	
marketplace
• Why	pay	more	for	any	certificate	when	the	
entire	CA	structure	is	only	as	strong	as	the	
weakest	CA
• And	you	browser	trusts	a	LOT	of	CAs!
– About	60	– 100	CA’s
– About	1,500	Subordinate	RA’s
– Operated	by	650	different	organisations
See the EFF SSL observatory
http://www.eff.org/files/DefconSSLiverse.pdf
In a commercial environment
Where	CA’s	compete	with	each	other	for	market	
share
And	quality	offers	no	protection
Than	what	‘wins’	in	the	market?
?
In a commercial environment
Where	CA’s	compete	with	each	other	for	market	
share
And	quality	offers	no	protection
Than	what	‘wins’	in	the	market?
Where now?
Option	A:		Take	all	the	money	out	of	the	system!
Where now?
Option	A:		Take	all	the	money	out	of	the	system!
Where now?
Option	B:		White	Listing	and	Pinning	with	HSTS
https://code.google.com/p/chromium/codesearch#chromium/src/net/http/
transport_security_state_static.json
Where now?
Option	B:		White	Listing	and	Pinning	with	HSTS
https://code.google.com/p/chromium/codesearch#chromium/src/net/http/
transport_security_state_static.json
Where now?
Option	C:		Use	the	DNS!
www.cafepress.com/nxdomain
Seriously
Where	better	to	find	out	the	public	key	
associated	with	a	DNS-named	service	than	to	
look	it	up	in	the	DNS?
Seriously
Where	better	to	find	out	the	public	key	
associated	with	a	DNS-named	service	than	to	
look	it	up	in	the	DNS?
– Why	not	query	the	DNS	for	the	HSTS	record	
(pinning	record)?
Seriously
Where	better	to	find	out	the	public	key	
associated	with	a	DNS-named	service	than	to	
look	it	up	in	the	DNS?
– Why	not	query	the	DNS	for	the	HSTS	record?
– Why	not	query	the	DNS	for	the	issuer	CA?
Seriously
Where	better	to	find	out	the	public	key	
associated	with	a	DNS-named	service	than	to	
look	it	up	in	the	DNS?
– Why	not	query	the	DNS	for	the	HSTS	record?
– Why	not	query	the	DNS	for	the	issuer	CA?
– Why	not	query	the	DNS	for	the	hash	of	the	
domain	name	cert?
Seriously
Where	better	to	find	out	the	public	key	
associated	with	a	DNS-named	service	than	to	
look	it	up	in	the	DNS?
– Why	not	query	the	DNS	for	the	HSTS	record?
– Why	not	query	the	DNS	for	the	issuer	CA?
– Why	not	query	the	DNS	for	the	hash	of	the	
domain	name	cert?
– Why	not	query	the	DNS	for	the	hash	of	the	
domain	name	public	key?
Seriously
Where	better	to	find	out	the	public	key	
associated	with	a	DNS-named	service	than	to	
look	it	up	in	the	DNS?
– Why	not	query	the	DNS	for	the	HSTS	record?
– Why	not	query	the	DNS	for	the	issuer	CA?
– Why	not	query	the	DNS	for	the	hash	of	the	
domain	name	cert?
– Why	not	query	the	DNS	for	the	hash	of	the	
domain	name	public	key?
Seriously
Where	better	to	find	out	the	public	key	
associated	with	a	DNS-named	service	than	to	
look	it	up	in	the	DNS?
– Why	not	query	the	DNS	for	the	HSTS	record?
– Why	not	query	the	DNS	for	the	issuer	CA?
– Why	not	query	the	DNS	for	the	hash	of	the	
domain	name	cert?
– Why	not	query	the	DNS	for	the	hash	of	the	
domain	name	public	key?
DANE
• Using	the	DNS	to	associated	domain	name	
public	key	certificates	with	domain	name
DANE
• Using	the	DNS	to	associated	domain	name	
public	key	certificates	with	domain	name
DANE
EECert TLSA record generation
; Convert the public key certificate to DER format
; Generate the SHA256 hash
; Add DNS gunk!
$ /usr/bin/openssl x509 -in /usr/local/etc/letsencrypt/live/www.dotnxdomain.net/cert.pem -outform DER |
/usr/bin/openssl sha256 |
cut -d ' ' -f 2 |
awk '{print ”_443._tcp.www.dotnxdomain.net IN TLSA 3 0 1 " $1}'
_443._tcp.www.dotnxdomain.net. 899 IN TLSA 3 0 1 D42101BCCE941D22E8E467C5D75E77EC4A7B8B7C9366C6A878CB4E15 7E602F17
$ dig +dnssec TLSA _443._tcp.www.dotnxdomain.net.
_443._tcp.www.dotnxdomain.net. 899 IN TLSA 3 0 1 D42101BCCE941D22E8E467C5D75E77EC4A7B8B7C9366C6A878CB4E15 7E602F17
_443._tcp.www.dotnxdomain.net. 899 IN RRSIG TLSA 13 5 900 20200724235900 20170122043100 56797 www.dotnxdomain.net.
dUYD1sMIpBc6RsUhturFzz5G8qX6oaDGRzaD/q6n+YJi2kqzDfWZls6F 3X1mXdpeQQYz52yOUOcdWvFRO9TQZQ==
SPKI TLSA record generation
; Generate the public key
; Convert it to DER format
; Generate the SHA256 hash
; Add DNS gunk!
$ /usr/bin/openssl x509 -in /usr/local/etc/letsencrypt/live/www.dotnxdomain.net/cert.pem -pubkey -noout |
openssl rsa -pubin -outform der |
/usr/bin/openssl sha256 |
cut -d ' ' -f 2 |
awk '{ print "_443._tcp.www.ndotnxdomain.net IN TLSA 3 1 1 " $1}’
_443._tcp.www.ndotnxdomain.net IN TLSA 3 1 1 df3a810d998cfddf8fa935ed33065ee27a67747366e2da40ddefef2b3a2032eb
TLS with DANE
• Client	receives	server	cert	in	Server	Hello
– Client	lookups	the	DNS	for	the	TLSA	Resource	
Record	of	the	domain	name
– Client	validates	the	presented	certificate	against	
the	TLSA	RR
• Client	performs	Client	Key	exchange
TLS Connections
https://rhsecurity.wordpress.com/tag/tls/
DNS Name
TLSA query
Just one problem…
• The	DNS	is	full	of	liars	and	lies!
• And	this	can	compromise	the	integrity	of	
public	key	information	embedded	in	the	DNS
• Unless	we	fix	the	DNS	we	are	no	better	off	
than	before with	these	TLSA	records!
Just one response…
• We	need	to	allow	users	to	validate	DNS	
responses	for	themselves
• And	for	this	we	need	a	Secure	DNS	framework
• Which	we	have	– and	its	called	DNSSEC!
DNSSEC Interlocking Signatures
.	(root)
.com
.example.com
www.example.com
.	Key-Signing	Key	– signs	over
.	Zone-Signing	Key	– signs	over
DS	for	.com	(Key-Signing	Key)
.com	Key-Signing	Key	– signs	over
.com	Zone-Signing	Key	– signs	over
DS	for	example	.com	(Key-Signing	Key)
example.com Key-Signing	Key	– signs	over
example.com Zone-Signing	Key	– signs	over
www.example.com
DNSSEC Interlocking Signatures
.	(root)
.com
.example.com
www.example.com IN	A	192.0.1
.	Key-Signing	Key	– signs	over
.	Zone-Signing	Key	– signs	over
DS	for	.com	(Key-Signing	Key)
.com	Key-Signing	Key	– signs	over
.com	Zone-Signing	Key	– signs	over
DS	for	example	.com	(Key-Signing	Key)
example.com Key-Signing	Key	– signs	over
example.com Zone-Signing	Key	– signs	over
www.example.com
DNSSEC Interlocking Signatures
.	(root)
.com
.example.com
www.example.com IN	A	192.0.1
.	Key-Signing	Key	– signs	over
.	Zone-Signing	Key	– signs	over
DS	for	.com	(Key-Signing	Key)
.com	Key-Signing	Key	– signs	over
.com	Zone-Signing	Key	– signs	over
DS	for	example	.com	(Key-Signing	Key)
example.com Key-Signing	Key	– signs	over
example.com Zone-Signing	Key	– signs	over
www.example.com
Is the signature for this record valid?
Is the ZSK for example.com valid?
Is the KSK for example.com valid?
Is this DS equal to the hash of the KSK?
Is the signature for this record valid?
Is the ZSK for .com valid?
Is the KSK for .com valid?
Is this DS equal to the hash of the KSK?
Is the signature for this record valid?
Is the ZSK for . valid?
Is the KSK for . valid?
DNSSEC Interlocking Signatures
.	(root)
.com
.example.com
www.example.com IN	A	192.0.1
.	Key-Signing	Key	– signs	over
.	Zone-Signing	Key	– signs	over
DS	for	.com	(Key-Signing	Key)
.com	Key-Signing	Key	– signs	over
.com	Zone-Signing	Key	– signs	over
DS	for	example	.com	(Key-Signing	Key)
example.com Key-Signing	Key	– signs	over
example.com Zone-Signing	Key	– signs	over
www.example.com
Is the signature for this record valid?
Is the ZSK for example.com valid?
Is the KSK for example.com valid?
Is this DS equal to the hash of the KSK?
Is the signature for this record valid?
Is the ZSK for .com valid?
Is the KSK for .com valid?
Is this DS equal to the hash of the KSK?
Is the signature for this record valid?
Is the ZSK for . valid?
Is the KSK for . valid?
As long as you have a valid
local trust anchor for the
root zone then you can
validate a signed DNS
response by constructing
this backward path to the
local root trust anchor
DANE + DNSSEC
• Query	the	DNS	for	the	TLSA	record	of	the	
domain	name	and	ask	for	the	DNSSEC	
signature	to	be	included	in	the	response
• Validate	the	signature	to	ensure	that	you	have	
an	unbroken	signature	chain	to	the	root	trust	
point
• At	this	point	you	can	accept	the	TLSA	record	
as	the	authentic	record,	and	set	up	a	TLS	
session	based	on	this	data
DANE Does DNS
via a Browser Extension
So we need DNSSEC as well
as DANE…
How	much	DNSSEC	Validation	is	out	there?
Do we do DNSSEC
Validation?
stats.labs.apnic.net/dnssec/XA
Do we do DNSSEC
Validation?
stats.labs.apnic.net/dnssec/XA
0% 95%
Do we do DNSSEC
Validation?
stats.labs.apnic.net/dnssec/XA
0% 95%
Where now?
Browser	vendors	appear	to	be	
dragging	the	chain	on	DANE	
support
DANE	exists	today	as	plug-ins	
rather	than	a	core	functionality	
Cynically,	one	could	observe	
that	fast	but	insecure	is	the	
browser	vendors’	current	
preference!
Or…
Look - No DNS!
• Server	packages	server	cert,	TLSA	record	and	
the	DNSSEC	credential	chain	in	a	single	bundle
• Client	receives	bundle	in	Server	Hello
– Client	performs	validation	of	TLSA	Resource	
Record	using	the	supplied	DNSEC	signatures	plus	
the	local	DNS	Root	Trust	Anchor	without	
performing	any	DNS	queries
– Client	validates	the	presented	certificate	against	
the	TLSA	RR
• Client	performs	Client	Key	exchange
Faster DANE with Stapling
Mozilla	Bug	Report	672600
Where now?
We	could	do	a	far better	job	at	Internet	Security:
Publishing	DNSSEC-signed	zones
Publishing	DANE	TLSA	records
Using	DNSSEC-validating	resolution
Using	TLSA	records	to	guide	TLS	Key	Exchange	
What	this	can	offer	is	robust,	affordable,	accessible	
security	without	the	current	overheads	of	high	
priced	vanity	CA	offerings
Let’s Do it!
What	Let’s	Encrypt	and	DNSSEC	offers	is	robust,	affordable,	accessible	
security	without	the	current	overheads	of	high	priced	vanity	CA	offerings
That’s it!

More Related Content

What's hot

The curse of the open recursor
The curse of the open recursorThe curse of the open recursor
The curse of the open recursor
Tom Paseka
 
Routing Security in 2017 – We can do better!
Routing Security in 2017 – We can do better!Routing Security in 2017 – We can do better!
Routing Security in 2017 – We can do better!
APNIC
 
Future of broadband in india
Future of  broadband in indiaFuture of  broadband in india
Future of broadband in india
Rohit Kumar
 
wifi-y3dips-stmik_mdp_slides
wifi-y3dips-stmik_mdp_slideswifi-y3dips-stmik_mdp_slides
wifi-y3dips-stmik_mdp_slides
guest1c1a9a
 
IPv6 - A Real World Deployment for Mobiles
IPv6 - A Real World Deployment for MobilesIPv6 - A Real World Deployment for Mobiles
IPv6 - A Real World Deployment for Mobiles
APNIC
 
DDOS Mitigation Experience from IP ServerOne by CL Lee
DDOS Mitigation Experience from IP ServerOne by CL LeeDDOS Mitigation Experience from IP ServerOne by CL Lee
DDOS Mitigation Experience from IP ServerOne by CL Lee
MyNOG
 
TCP/IP Geeks Stockholm :: Introduction to IPv6
TCP/IP Geeks Stockholm :: Introduction to IPv6TCP/IP Geeks Stockholm :: Introduction to IPv6
TCP/IP Geeks Stockholm :: Introduction to IPv6
Olle E Johansson
 
Beyond eduroam: Combining eduroam, (5G) SIM authentication and OpenRoaming
Beyond eduroam: Combining eduroam, (5G) SIM authentication and OpenRoamingBeyond eduroam: Combining eduroam, (5G) SIM authentication and OpenRoaming
Beyond eduroam: Combining eduroam, (5G) SIM authentication and OpenRoaming
Karri Huhtanen
 
04 (IDNOG01) Handling massive numbers subscribers and attacks by Takeki kumamura
04 (IDNOG01) Handling massive numbers subscribers and attacks by Takeki kumamura04 (IDNOG01) Handling massive numbers subscribers and attacks by Takeki kumamura
04 (IDNOG01) Handling massive numbers subscribers and attacks by Takeki kumamura
Indonesia Network Operators Group
 
Preventing Traffic with Spoofed Source IP address
Preventing Traffic with Spoofed Source IP addressPreventing Traffic with Spoofed Source IP address
Preventing Traffic with Spoofed Source IP address
Bangladesh Network Operators Group
 
Is IPv6 Security Still an Afterthought?
Is IPv6 Security Still an Afterthought?Is IPv6 Security Still an Afterthought?
Is IPv6 Security Still an Afterthought?
APNIC
 
Combating DDoS and why peering is important in Asia
Combating DDoS and why peering is important in AsiaCombating DDoS and why peering is important in Asia
Combating DDoS and why peering is important in Asia
MyNOG
 
Encryption authentication access_control_jon green
Encryption authentication access_control_jon greenEncryption authentication access_control_jon green
Encryption authentication access_control_jon green
Aruba, a Hewlett Packard Enterprise company
 
Security intermediate practical cryptography_certs_and 802.1_x_rich langston...
Security intermediate  practical cryptography_certs_and 802.1_x_rich langston...Security intermediate  practical cryptography_certs_and 802.1_x_rich langston...
Security intermediate practical cryptography_certs_and 802.1_x_rich langston...
Aruba, a Hewlett Packard Enterprise company
 
Yes, IPv6 is Real! How To Make Your Apps Work (And Be As Fast As Possible)
Yes, IPv6 is Real! How To Make Your Apps Work (And Be As Fast As Possible) Yes, IPv6 is Real! How To Make Your Apps Work (And Be As Fast As Possible)
Yes, IPv6 is Real! How To Make Your Apps Work (And Be As Fast As Possible)
Dan York
 
Source Address Validation Everywhere, by Paul Vixie [APNIC 38 - Technical Key...
Source Address Validation Everywhere, by Paul Vixie [APNIC 38 - Technical Key...Source Address Validation Everywhere, by Paul Vixie [APNIC 38 - Technical Key...
Source Address Validation Everywhere, by Paul Vixie [APNIC 38 - Technical Key...
APNIC
 
The Stakes Have Changed – The Changing Security Landscape by Tony Teo
The Stakes Have Changed – The Changing Security Landscape by Tony TeoThe Stakes Have Changed – The Changing Security Landscape by Tony Teo
The Stakes Have Changed – The Changing Security Landscape by Tony Teo
MyNOG
 
Top 10 tips_aruba_tac_madison lee
Top 10 tips_aruba_tac_madison leeTop 10 tips_aruba_tac_madison lee
Top 10 tips_aruba_tac_madison lee
Aruba, a Hewlett Packard Enterprise company
 
NetFlow Deep Dive: NetFlow Tips and Tricks to get the Most Out of Your Networ...
NetFlow Deep Dive: NetFlow Tips and Tricks to get the Most Out of Your Networ...NetFlow Deep Dive: NetFlow Tips and Tricks to get the Most Out of Your Networ...
NetFlow Deep Dive: NetFlow Tips and Tricks to get the Most Out of Your Networ...
SolarWinds
 
F5 ASM v12 DDoS best practices
F5 ASM v12 DDoS best practices F5 ASM v12 DDoS best practices
F5 ASM v12 DDoS best practices
Lior Rotkovitch
 

What's hot (20)

The curse of the open recursor
The curse of the open recursorThe curse of the open recursor
The curse of the open recursor
 
Routing Security in 2017 – We can do better!
Routing Security in 2017 – We can do better!Routing Security in 2017 – We can do better!
Routing Security in 2017 – We can do better!
 
Future of broadband in india
Future of  broadband in indiaFuture of  broadband in india
Future of broadband in india
 
wifi-y3dips-stmik_mdp_slides
wifi-y3dips-stmik_mdp_slideswifi-y3dips-stmik_mdp_slides
wifi-y3dips-stmik_mdp_slides
 
IPv6 - A Real World Deployment for Mobiles
IPv6 - A Real World Deployment for MobilesIPv6 - A Real World Deployment for Mobiles
IPv6 - A Real World Deployment for Mobiles
 
DDOS Mitigation Experience from IP ServerOne by CL Lee
DDOS Mitigation Experience from IP ServerOne by CL LeeDDOS Mitigation Experience from IP ServerOne by CL Lee
DDOS Mitigation Experience from IP ServerOne by CL Lee
 
TCP/IP Geeks Stockholm :: Introduction to IPv6
TCP/IP Geeks Stockholm :: Introduction to IPv6TCP/IP Geeks Stockholm :: Introduction to IPv6
TCP/IP Geeks Stockholm :: Introduction to IPv6
 
Beyond eduroam: Combining eduroam, (5G) SIM authentication and OpenRoaming
Beyond eduroam: Combining eduroam, (5G) SIM authentication and OpenRoamingBeyond eduroam: Combining eduroam, (5G) SIM authentication and OpenRoaming
Beyond eduroam: Combining eduroam, (5G) SIM authentication and OpenRoaming
 
04 (IDNOG01) Handling massive numbers subscribers and attacks by Takeki kumamura
04 (IDNOG01) Handling massive numbers subscribers and attacks by Takeki kumamura04 (IDNOG01) Handling massive numbers subscribers and attacks by Takeki kumamura
04 (IDNOG01) Handling massive numbers subscribers and attacks by Takeki kumamura
 
Preventing Traffic with Spoofed Source IP address
Preventing Traffic with Spoofed Source IP addressPreventing Traffic with Spoofed Source IP address
Preventing Traffic with Spoofed Source IP address
 
Is IPv6 Security Still an Afterthought?
Is IPv6 Security Still an Afterthought?Is IPv6 Security Still an Afterthought?
Is IPv6 Security Still an Afterthought?
 
Combating DDoS and why peering is important in Asia
Combating DDoS and why peering is important in AsiaCombating DDoS and why peering is important in Asia
Combating DDoS and why peering is important in Asia
 
Encryption authentication access_control_jon green
Encryption authentication access_control_jon greenEncryption authentication access_control_jon green
Encryption authentication access_control_jon green
 
Security intermediate practical cryptography_certs_and 802.1_x_rich langston...
Security intermediate  practical cryptography_certs_and 802.1_x_rich langston...Security intermediate  practical cryptography_certs_and 802.1_x_rich langston...
Security intermediate practical cryptography_certs_and 802.1_x_rich langston...
 
Yes, IPv6 is Real! How To Make Your Apps Work (And Be As Fast As Possible)
Yes, IPv6 is Real! How To Make Your Apps Work (And Be As Fast As Possible) Yes, IPv6 is Real! How To Make Your Apps Work (And Be As Fast As Possible)
Yes, IPv6 is Real! How To Make Your Apps Work (And Be As Fast As Possible)
 
Source Address Validation Everywhere, by Paul Vixie [APNIC 38 - Technical Key...
Source Address Validation Everywhere, by Paul Vixie [APNIC 38 - Technical Key...Source Address Validation Everywhere, by Paul Vixie [APNIC 38 - Technical Key...
Source Address Validation Everywhere, by Paul Vixie [APNIC 38 - Technical Key...
 
The Stakes Have Changed – The Changing Security Landscape by Tony Teo
The Stakes Have Changed – The Changing Security Landscape by Tony TeoThe Stakes Have Changed – The Changing Security Landscape by Tony Teo
The Stakes Have Changed – The Changing Security Landscape by Tony Teo
 
Top 10 tips_aruba_tac_madison lee
Top 10 tips_aruba_tac_madison leeTop 10 tips_aruba_tac_madison lee
Top 10 tips_aruba_tac_madison lee
 
NetFlow Deep Dive: NetFlow Tips and Tricks to get the Most Out of Your Networ...
NetFlow Deep Dive: NetFlow Tips and Tricks to get the Most Out of Your Networ...NetFlow Deep Dive: NetFlow Tips and Tricks to get the Most Out of Your Networ...
NetFlow Deep Dive: NetFlow Tips and Tricks to get the Most Out of Your Networ...
 
F5 ASM v12 DDoS best practices
F5 ASM v12 DDoS best practices F5 ASM v12 DDoS best practices
F5 ASM v12 DDoS best practices
 

Similar to Encryption with DANE, NZNOG 2017

Safety & Security Risks in the Hyper-Connected World - IoT - Tamaghna Basu
Safety & Security Risks in the Hyper-Connected World - IoT - Tamaghna BasuSafety & Security Risks in the Hyper-Connected World - IoT - Tamaghna Basu
Safety & Security Risks in the Hyper-Connected World - IoT - Tamaghna Basu
Lounge47
 
WordCamp Raleigh 2017 - Move from HTTP to HTTPS or become irrelevant - Peter ...
WordCamp Raleigh 2017 - Move from HTTP to HTTPS or become irrelevant - Peter ...WordCamp Raleigh 2017 - Move from HTTP to HTTPS or become irrelevant - Peter ...
WordCamp Raleigh 2017 - Move from HTTP to HTTPS or become irrelevant - Peter ...
Peter LaFond
 
VoIP Security 101 what you need to know
VoIP Security 101   what you need to knowVoIP Security 101   what you need to know
VoIP Security 101 what you need to know
Eric Klein
 
Sec Tor Towards A More Secure Online Banking
Sec Tor Towards A More Secure Online BankingSec Tor Towards A More Secure Online Banking
Sec Tor Towards A More Secure Online Banking
Nick Owen
 
Why DANE?
Why DANE?Why DANE?
Why DANE?
APNIC
 
Token Authentication for Java Applications
Token Authentication for Java ApplicationsToken Authentication for Java Applications
Token Authentication for Java Applications
Stormpath
 
B Hkorba
B HkorbaB Hkorba
B Hkorba
ecommerce
 
Beyond Ethical Hacking By Nipun Jaswal , CSA HCF Infosec Pvt. Ltd
Beyond Ethical Hacking By Nipun Jaswal , CSA HCF Infosec Pvt. LtdBeyond Ethical Hacking By Nipun Jaswal , CSA HCF Infosec Pvt. Ltd
Beyond Ethical Hacking By Nipun Jaswal , CSA HCF Infosec Pvt. Ltd
Nipun Jaswal
 
Improving password-based authentication
Improving password-based authenticationImproving password-based authentication
Improving password-based authentication
Frank Denis
 
HTTPS Explained Through Fairy Tales
HTTPS Explained Through Fairy TalesHTTPS Explained Through Fairy Tales
HTTPS Explained Through Fairy Tales
OVHcloud
 
jquerySF: https://<your>
jquerySF: https://<your>jquerySF: https://<your>
jquerySF: https://<your>
Emily Stark
 
Tech t18
Tech t18Tech t18
Webinar: Goodbye RSA. Hello Modern Authentication.
Webinar: Goodbye RSA. Hello Modern Authentication.Webinar: Goodbye RSA. Hello Modern Authentication.
Webinar: Goodbye RSA. Hello Modern Authentication.
SecureAuth
 
Secure Communication with an Insecure Internet Infrastructure
Secure Communication with an Insecure Internet InfrastructureSecure Communication with an Insecure Internet Infrastructure
Secure Communication with an Insecure Internet Infrastructure
webhostingguy
 
Protect your website
Protect your websiteProtect your website
Protect your website
Muthu Natarajan
 
Certificate Pinning in Mobile Applications
Certificate Pinning in Mobile ApplicationsCertificate Pinning in Mobile Applications
Certificate Pinning in Mobile Applications
Luca Bongiorni
 
Mobile Securty - An Oxymoron?
Mobile Securty - An Oxymoron?Mobile Securty - An Oxymoron?
Mobile Securty - An Oxymoron?
morisson
 
Believe It Or Not SSL Attacks
Believe It Or Not SSL AttacksBelieve It Or Not SSL Attacks
Believe It Or Not SSL Attacks
Akash Mahajan
 
A modern approach to safeguarding your ICS and SCADA systems
A modern approach to safeguarding your ICS and SCADA systemsA modern approach to safeguarding your ICS and SCADA systems
A modern approach to safeguarding your ICS and SCADA systems
Alane Moran
 
Portal apps (slt)
Portal apps (slt)Portal apps (slt)
Portal apps (slt)
kevin_donovan
 

Similar to Encryption with DANE, NZNOG 2017 (20)

Safety & Security Risks in the Hyper-Connected World - IoT - Tamaghna Basu
Safety & Security Risks in the Hyper-Connected World - IoT - Tamaghna BasuSafety & Security Risks in the Hyper-Connected World - IoT - Tamaghna Basu
Safety & Security Risks in the Hyper-Connected World - IoT - Tamaghna Basu
 
WordCamp Raleigh 2017 - Move from HTTP to HTTPS or become irrelevant - Peter ...
WordCamp Raleigh 2017 - Move from HTTP to HTTPS or become irrelevant - Peter ...WordCamp Raleigh 2017 - Move from HTTP to HTTPS or become irrelevant - Peter ...
WordCamp Raleigh 2017 - Move from HTTP to HTTPS or become irrelevant - Peter ...
 
VoIP Security 101 what you need to know
VoIP Security 101   what you need to knowVoIP Security 101   what you need to know
VoIP Security 101 what you need to know
 
Sec Tor Towards A More Secure Online Banking
Sec Tor Towards A More Secure Online BankingSec Tor Towards A More Secure Online Banking
Sec Tor Towards A More Secure Online Banking
 
Why DANE?
Why DANE?Why DANE?
Why DANE?
 
Token Authentication for Java Applications
Token Authentication for Java ApplicationsToken Authentication for Java Applications
Token Authentication for Java Applications
 
B Hkorba
B HkorbaB Hkorba
B Hkorba
 
Beyond Ethical Hacking By Nipun Jaswal , CSA HCF Infosec Pvt. Ltd
Beyond Ethical Hacking By Nipun Jaswal , CSA HCF Infosec Pvt. LtdBeyond Ethical Hacking By Nipun Jaswal , CSA HCF Infosec Pvt. Ltd
Beyond Ethical Hacking By Nipun Jaswal , CSA HCF Infosec Pvt. Ltd
 
Improving password-based authentication
Improving password-based authenticationImproving password-based authentication
Improving password-based authentication
 
HTTPS Explained Through Fairy Tales
HTTPS Explained Through Fairy TalesHTTPS Explained Through Fairy Tales
HTTPS Explained Through Fairy Tales
 
jquerySF: https://<your>
jquerySF: https://<your>jquerySF: https://<your>
jquerySF: https://<your>
 
Tech t18
Tech t18Tech t18
Tech t18
 
Webinar: Goodbye RSA. Hello Modern Authentication.
Webinar: Goodbye RSA. Hello Modern Authentication.Webinar: Goodbye RSA. Hello Modern Authentication.
Webinar: Goodbye RSA. Hello Modern Authentication.
 
Secure Communication with an Insecure Internet Infrastructure
Secure Communication with an Insecure Internet InfrastructureSecure Communication with an Insecure Internet Infrastructure
Secure Communication with an Insecure Internet Infrastructure
 
Protect your website
Protect your websiteProtect your website
Protect your website
 
Certificate Pinning in Mobile Applications
Certificate Pinning in Mobile ApplicationsCertificate Pinning in Mobile Applications
Certificate Pinning in Mobile Applications
 
Mobile Securty - An Oxymoron?
Mobile Securty - An Oxymoron?Mobile Securty - An Oxymoron?
Mobile Securty - An Oxymoron?
 
Believe It Or Not SSL Attacks
Believe It Or Not SSL AttacksBelieve It Or Not SSL Attacks
Believe It Or Not SSL Attacks
 
A modern approach to safeguarding your ICS and SCADA systems
A modern approach to safeguarding your ICS and SCADA systemsA modern approach to safeguarding your ICS and SCADA systems
A modern approach to safeguarding your ICS and SCADA systems
 
Portal apps (slt)
Portal apps (slt)Portal apps (slt)
Portal apps (slt)
 

More from APNIC

IPv6: Unlocking the Potential, presented by Paul Wilson at CommunicAsia 2024
IPv6: Unlocking the Potential, presented by Paul Wilson at CommunicAsia 2024IPv6: Unlocking the Potential, presented by Paul Wilson at CommunicAsia 2024
IPv6: Unlocking the Potential, presented by Paul Wilson at CommunicAsia 2024
APNIC
 
Honeypots Unveiled: Proactive Defense Tactics for Cyber Security, Phoenix Sum...
Honeypots Unveiled: Proactive Defense Tactics for Cyber Security, Phoenix Sum...Honeypots Unveiled: Proactive Defense Tactics for Cyber Security, Phoenix Sum...
Honeypots Unveiled: Proactive Defense Tactics for Cyber Security, Phoenix Sum...
APNIC
 
Securing BGP: Operational Strategies and Best Practices for Network Defenders...
Securing BGP: Operational Strategies and Best Practices for Network Defenders...Securing BGP: Operational Strategies and Best Practices for Network Defenders...
Securing BGP: Operational Strategies and Best Practices for Network Defenders...
APNIC
 
APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024
APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024
APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024
APNIC
 
Registry Data Accuracy Improvements, presented by Chimi Dorji at SANOG 41 / I...
Registry Data Accuracy Improvements, presented by Chimi Dorji at SANOG 41 / I...Registry Data Accuracy Improvements, presented by Chimi Dorji at SANOG 41 / I...
Registry Data Accuracy Improvements, presented by Chimi Dorji at SANOG 41 / I...
APNIC
 
APNIC Updates presented by Paul Wilson at CaribNOG 27
APNIC Updates presented by Paul Wilson at  CaribNOG 27APNIC Updates presented by Paul Wilson at  CaribNOG 27
APNIC Updates presented by Paul Wilson at CaribNOG 27
APNIC
 
APNIC Policy Roundup presented by Sunny Chendi at TWNOG 5.0
APNIC Policy Roundup presented by Sunny Chendi at TWNOG 5.0APNIC Policy Roundup presented by Sunny Chendi at TWNOG 5.0
APNIC Policy Roundup presented by Sunny Chendi at TWNOG 5.0
APNIC
 
APNIC Policy Roundup, presented by Sunny Chendi at the 5th ICANN APAC-TWNIC E...
APNIC Policy Roundup, presented by Sunny Chendi at the 5th ICANN APAC-TWNIC E...APNIC Policy Roundup, presented by Sunny Chendi at the 5th ICANN APAC-TWNIC E...
APNIC Policy Roundup, presented by Sunny Chendi at the 5th ICANN APAC-TWNIC E...
APNIC
 
APNIC Updates presented by Paul Wilson at ARIN 53
APNIC Updates presented by Paul Wilson at ARIN 53APNIC Updates presented by Paul Wilson at ARIN 53
APNIC Updates presented by Paul Wilson at ARIN 53
APNIC
 
DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024
DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024
DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024
APNIC
 
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...
APNIC
 
On Starlink, presented by Geoff Huston at NZNOG 2024
On Starlink, presented by Geoff Huston at NZNOG 2024On Starlink, presented by Geoff Huston at NZNOG 2024
On Starlink, presented by Geoff Huston at NZNOG 2024
APNIC
 
Networking in the Penumbra presented by Geoff Huston at NZNOG
Networking in the Penumbra presented by Geoff Huston at NZNOGNetworking in the Penumbra presented by Geoff Huston at NZNOG
Networking in the Penumbra presented by Geoff Huston at NZNOG
APNIC
 
IP addressing and IPv6, presented by Paul Wilson at IETF 119
IP addressing and IPv6, presented by Paul Wilson at IETF 119IP addressing and IPv6, presented by Paul Wilson at IETF 119
IP addressing and IPv6, presented by Paul Wilson at IETF 119
APNIC
 
draft-harrison-sidrops-manifest-number-01, presented at IETF 119
draft-harrison-sidrops-manifest-number-01, presented at IETF 119draft-harrison-sidrops-manifest-number-01, presented at IETF 119
draft-harrison-sidrops-manifest-number-01, presented at IETF 119
APNIC
 
Making an RFC in Today's IETF, presented by Geoff Huston at IETF 119
Making an RFC in Today's IETF, presented by Geoff Huston at IETF 119Making an RFC in Today's IETF, presented by Geoff Huston at IETF 119
Making an RFC in Today's IETF, presented by Geoff Huston at IETF 119
APNIC
 
IPv6 Operational Issues (with DNS), presented by Geoff Huston at IETF 119
IPv6 Operational Issues (with DNS), presented by Geoff Huston at IETF 119IPv6 Operational Issues (with DNS), presented by Geoff Huston at IETF 119
IPv6 Operational Issues (with DNS), presented by Geoff Huston at IETF 119
APNIC
 
Is DNS ready for IPv6, presented by Geoff Huston at IETF 119
Is DNS ready for IPv6, presented by Geoff Huston at IETF 119Is DNS ready for IPv6, presented by Geoff Huston at IETF 119
Is DNS ready for IPv6, presented by Geoff Huston at IETF 119
APNIC
 
Benefits of doing Internet peering and running an Internet Exchange (IX) pres...
Benefits of doing Internet peering and running an Internet Exchange (IX) pres...Benefits of doing Internet peering and running an Internet Exchange (IX) pres...
Benefits of doing Internet peering and running an Internet Exchange (IX) pres...
APNIC
 
APNIC Update and RIR Policies for ccTLDs, presented at APTLD 85
APNIC Update and RIR Policies for ccTLDs, presented at APTLD 85APNIC Update and RIR Policies for ccTLDs, presented at APTLD 85
APNIC Update and RIR Policies for ccTLDs, presented at APTLD 85
APNIC
 

More from APNIC (20)

IPv6: Unlocking the Potential, presented by Paul Wilson at CommunicAsia 2024
IPv6: Unlocking the Potential, presented by Paul Wilson at CommunicAsia 2024IPv6: Unlocking the Potential, presented by Paul Wilson at CommunicAsia 2024
IPv6: Unlocking the Potential, presented by Paul Wilson at CommunicAsia 2024
 
Honeypots Unveiled: Proactive Defense Tactics for Cyber Security, Phoenix Sum...
Honeypots Unveiled: Proactive Defense Tactics for Cyber Security, Phoenix Sum...Honeypots Unveiled: Proactive Defense Tactics for Cyber Security, Phoenix Sum...
Honeypots Unveiled: Proactive Defense Tactics for Cyber Security, Phoenix Sum...
 
Securing BGP: Operational Strategies and Best Practices for Network Defenders...
Securing BGP: Operational Strategies and Best Practices for Network Defenders...Securing BGP: Operational Strategies and Best Practices for Network Defenders...
Securing BGP: Operational Strategies and Best Practices for Network Defenders...
 
APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024
APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024
APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024
 
Registry Data Accuracy Improvements, presented by Chimi Dorji at SANOG 41 / I...
Registry Data Accuracy Improvements, presented by Chimi Dorji at SANOG 41 / I...Registry Data Accuracy Improvements, presented by Chimi Dorji at SANOG 41 / I...
Registry Data Accuracy Improvements, presented by Chimi Dorji at SANOG 41 / I...
 
APNIC Updates presented by Paul Wilson at CaribNOG 27
APNIC Updates presented by Paul Wilson at  CaribNOG 27APNIC Updates presented by Paul Wilson at  CaribNOG 27
APNIC Updates presented by Paul Wilson at CaribNOG 27
 
APNIC Policy Roundup presented by Sunny Chendi at TWNOG 5.0
APNIC Policy Roundup presented by Sunny Chendi at TWNOG 5.0APNIC Policy Roundup presented by Sunny Chendi at TWNOG 5.0
APNIC Policy Roundup presented by Sunny Chendi at TWNOG 5.0
 
APNIC Policy Roundup, presented by Sunny Chendi at the 5th ICANN APAC-TWNIC E...
APNIC Policy Roundup, presented by Sunny Chendi at the 5th ICANN APAC-TWNIC E...APNIC Policy Roundup, presented by Sunny Chendi at the 5th ICANN APAC-TWNIC E...
APNIC Policy Roundup, presented by Sunny Chendi at the 5th ICANN APAC-TWNIC E...
 
APNIC Updates presented by Paul Wilson at ARIN 53
APNIC Updates presented by Paul Wilson at ARIN 53APNIC Updates presented by Paul Wilson at ARIN 53
APNIC Updates presented by Paul Wilson at ARIN 53
 
DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024
DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024
DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024
 
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...
 
On Starlink, presented by Geoff Huston at NZNOG 2024
On Starlink, presented by Geoff Huston at NZNOG 2024On Starlink, presented by Geoff Huston at NZNOG 2024
On Starlink, presented by Geoff Huston at NZNOG 2024
 
Networking in the Penumbra presented by Geoff Huston at NZNOG
Networking in the Penumbra presented by Geoff Huston at NZNOGNetworking in the Penumbra presented by Geoff Huston at NZNOG
Networking in the Penumbra presented by Geoff Huston at NZNOG
 
IP addressing and IPv6, presented by Paul Wilson at IETF 119
IP addressing and IPv6, presented by Paul Wilson at IETF 119IP addressing and IPv6, presented by Paul Wilson at IETF 119
IP addressing and IPv6, presented by Paul Wilson at IETF 119
 
draft-harrison-sidrops-manifest-number-01, presented at IETF 119
draft-harrison-sidrops-manifest-number-01, presented at IETF 119draft-harrison-sidrops-manifest-number-01, presented at IETF 119
draft-harrison-sidrops-manifest-number-01, presented at IETF 119
 
Making an RFC in Today's IETF, presented by Geoff Huston at IETF 119
Making an RFC in Today's IETF, presented by Geoff Huston at IETF 119Making an RFC in Today's IETF, presented by Geoff Huston at IETF 119
Making an RFC in Today's IETF, presented by Geoff Huston at IETF 119
 
IPv6 Operational Issues (with DNS), presented by Geoff Huston at IETF 119
IPv6 Operational Issues (with DNS), presented by Geoff Huston at IETF 119IPv6 Operational Issues (with DNS), presented by Geoff Huston at IETF 119
IPv6 Operational Issues (with DNS), presented by Geoff Huston at IETF 119
 
Is DNS ready for IPv6, presented by Geoff Huston at IETF 119
Is DNS ready for IPv6, presented by Geoff Huston at IETF 119Is DNS ready for IPv6, presented by Geoff Huston at IETF 119
Is DNS ready for IPv6, presented by Geoff Huston at IETF 119
 
Benefits of doing Internet peering and running an Internet Exchange (IX) pres...
Benefits of doing Internet peering and running an Internet Exchange (IX) pres...Benefits of doing Internet peering and running an Internet Exchange (IX) pres...
Benefits of doing Internet peering and running an Internet Exchange (IX) pres...
 
APNIC Update and RIR Policies for ccTLDs, presented at APTLD 85
APNIC Update and RIR Policies for ccTLDs, presented at APTLD 85APNIC Update and RIR Policies for ccTLDs, presented at APTLD 85
APNIC Update and RIR Policies for ccTLDs, presented at APTLD 85
 

Recently uploaded

KubeCon & CloudNative Con 2024 Artificial Intelligent
KubeCon & CloudNative Con 2024 Artificial IntelligentKubeCon & CloudNative Con 2024 Artificial Intelligent
KubeCon & CloudNative Con 2024 Artificial Intelligent
Emre Gündoğdu
 
EASY TUTORIAL OF HOW TO USE CiCi AI BY: FEBLESS HERNANE
EASY TUTORIAL OF HOW TO USE CiCi AI BY: FEBLESS HERNANE EASY TUTORIAL OF HOW TO USE CiCi AI BY: FEBLESS HERNANE
EASY TUTORIAL OF HOW TO USE CiCi AI BY: FEBLESS HERNANE
Febless Hernane
 
Decentralized Justice in Gaming and Esports
Decentralized Justice in Gaming and EsportsDecentralized Justice in Gaming and Esports
Decentralized Justice in Gaming and Esports
Federico Ast
 
DocSplit Subsequent Implementation Activation.pptx
DocSplit Subsequent Implementation Activation.pptxDocSplit Subsequent Implementation Activation.pptx
DocSplit Subsequent Implementation Activation.pptx
AmitTuteja9
 
Network Security and Cyber Laws (Complete Notes) for B.Tech/BCA/BSc. IT
Network Security and Cyber Laws (Complete Notes) for B.Tech/BCA/BSc. ITNetwork Security and Cyber Laws (Complete Notes) for B.Tech/BCA/BSc. IT
Network Security and Cyber Laws (Complete Notes) for B.Tech/BCA/BSc. IT
Sarthak Sobti
 
cyber crime.pptx..........................
cyber crime.pptx..........................cyber crime.pptx..........................
cyber crime.pptx..........................
GNAMBIKARAO
 
Unlimited Short Call Girls Navi Mumbai ✅ 9967824496 FULL CASH PAYMENT
Unlimited Short Call Girls Navi Mumbai ✅ 9967824496 FULL CASH PAYMENTUnlimited Short Call Girls Navi Mumbai ✅ 9967824496 FULL CASH PAYMENT
Unlimited Short Call Girls Navi Mumbai ✅ 9967824496 FULL CASH PAYMENT
rajesh344555
 
10 Conversion Rate Optimization (CRO) Techniques to Boost Your Website’s Perf...
10 Conversion Rate Optimization (CRO) Techniques to Boost Your Website’s Perf...10 Conversion Rate Optimization (CRO) Techniques to Boost Your Website’s Perf...
10 Conversion Rate Optimization (CRO) Techniques to Boost Your Website’s Perf...
Web Inspire
 
Bangalore Call Girls 9079923931 With -Cuties' Hot Call Girls
Bangalore Call Girls 9079923931 With -Cuties' Hot Call GirlsBangalore Call Girls 9079923931 With -Cuties' Hot Call Girls
Bangalore Call Girls 9079923931 With -Cuties' Hot Call Girls
narwatsonia7
 
一比一原版新西兰林肯大学毕业证(Lincoln毕业证书)学历如何办理
一比一原版新西兰林肯大学毕业证(Lincoln毕业证书)学历如何办理一比一原版新西兰林肯大学毕业证(Lincoln毕业证书)学历如何办理
一比一原版新西兰林肯大学毕业证(Lincoln毕业证书)学历如何办理
thezot
 
一比一原版(uc毕业证书)加拿大卡尔加里大学毕业证如何办理
一比一原版(uc毕业证书)加拿大卡尔加里大学毕业证如何办理一比一原版(uc毕业证书)加拿大卡尔加里大学毕业证如何办理
一比一原版(uc毕业证书)加拿大卡尔加里大学毕业证如何办理
dtagbe
 
Bengaluru Dreamin' 24 - Personal Branding
Bengaluru Dreamin' 24 - Personal BrandingBengaluru Dreamin' 24 - Personal Branding
Bengaluru Dreamin' 24 - Personal Branding
Tarandeep Singh
 
Unlimited Short Call Girls Mumbai ✅ 9833363713 FULL CASH PAYMENT
Unlimited Short Call Girls Mumbai ✅ 9833363713 FULL CASH PAYMENTUnlimited Short Call Girls Mumbai ✅ 9833363713 FULL CASH PAYMENT
Unlimited Short Call Girls Mumbai ✅ 9833363713 FULL CASH PAYMENT
rajesh344555
 

Recently uploaded (13)

KubeCon & CloudNative Con 2024 Artificial Intelligent
KubeCon & CloudNative Con 2024 Artificial IntelligentKubeCon & CloudNative Con 2024 Artificial Intelligent
KubeCon & CloudNative Con 2024 Artificial Intelligent
 
EASY TUTORIAL OF HOW TO USE CiCi AI BY: FEBLESS HERNANE
EASY TUTORIAL OF HOW TO USE CiCi AI BY: FEBLESS HERNANE EASY TUTORIAL OF HOW TO USE CiCi AI BY: FEBLESS HERNANE
EASY TUTORIAL OF HOW TO USE CiCi AI BY: FEBLESS HERNANE
 
Decentralized Justice in Gaming and Esports
Decentralized Justice in Gaming and EsportsDecentralized Justice in Gaming and Esports
Decentralized Justice in Gaming and Esports
 
DocSplit Subsequent Implementation Activation.pptx
DocSplit Subsequent Implementation Activation.pptxDocSplit Subsequent Implementation Activation.pptx
DocSplit Subsequent Implementation Activation.pptx
 
Network Security and Cyber Laws (Complete Notes) for B.Tech/BCA/BSc. IT
Network Security and Cyber Laws (Complete Notes) for B.Tech/BCA/BSc. ITNetwork Security and Cyber Laws (Complete Notes) for B.Tech/BCA/BSc. IT
Network Security and Cyber Laws (Complete Notes) for B.Tech/BCA/BSc. IT
 
cyber crime.pptx..........................
cyber crime.pptx..........................cyber crime.pptx..........................
cyber crime.pptx..........................
 
Unlimited Short Call Girls Navi Mumbai ✅ 9967824496 FULL CASH PAYMENT
Unlimited Short Call Girls Navi Mumbai ✅ 9967824496 FULL CASH PAYMENTUnlimited Short Call Girls Navi Mumbai ✅ 9967824496 FULL CASH PAYMENT
Unlimited Short Call Girls Navi Mumbai ✅ 9967824496 FULL CASH PAYMENT
 
10 Conversion Rate Optimization (CRO) Techniques to Boost Your Website’s Perf...
10 Conversion Rate Optimization (CRO) Techniques to Boost Your Website’s Perf...10 Conversion Rate Optimization (CRO) Techniques to Boost Your Website’s Perf...
10 Conversion Rate Optimization (CRO) Techniques to Boost Your Website’s Perf...
 
Bangalore Call Girls 9079923931 With -Cuties' Hot Call Girls
Bangalore Call Girls 9079923931 With -Cuties' Hot Call GirlsBangalore Call Girls 9079923931 With -Cuties' Hot Call Girls
Bangalore Call Girls 9079923931 With -Cuties' Hot Call Girls
 
一比一原版新西兰林肯大学毕业证(Lincoln毕业证书)学历如何办理
一比一原版新西兰林肯大学毕业证(Lincoln毕业证书)学历如何办理一比一原版新西兰林肯大学毕业证(Lincoln毕业证书)学历如何办理
一比一原版新西兰林肯大学毕业证(Lincoln毕业证书)学历如何办理
 
一比一原版(uc毕业证书)加拿大卡尔加里大学毕业证如何办理
一比一原版(uc毕业证书)加拿大卡尔加里大学毕业证如何办理一比一原版(uc毕业证书)加拿大卡尔加里大学毕业证如何办理
一比一原版(uc毕业证书)加拿大卡尔加里大学毕业证如何办理
 
Bengaluru Dreamin' 24 - Personal Branding
Bengaluru Dreamin' 24 - Personal BrandingBengaluru Dreamin' 24 - Personal Branding
Bengaluru Dreamin' 24 - Personal Branding
 
Unlimited Short Call Girls Mumbai ✅ 9833363713 FULL CASH PAYMENT
Unlimited Short Call Girls Mumbai ✅ 9833363713 FULL CASH PAYMENTUnlimited Short Call Girls Mumbai ✅ 9833363713 FULL CASH PAYMENT
Unlimited Short Call Girls Mumbai ✅ 9833363713 FULL CASH PAYMENT
 

Encryption with DANE, NZNOG 2017