2025-06-13 –, E105 (capacity 70)
As cybersecurity threats evolve, securing DNS traffic is a crucial step in achieving a Zero Trust Architecture (ZTA). To mitigate data leaks and unauthorized access, Fedora is integrating Encrypted DNS (eDNS) support, ensuring DNS queries are encrypted using modern protocols such as DNS over TLS (DoT).
This presentation will cover the journey of enabling eDNS in Fedora, from the initial motivations to the technical challenges that shaped its implementation. Securing DNS at the operating system level required coordinated updates across several components, including FreeIPA, SSSD, Bind, Unbound, NetworkManager, and the newly introduced dnsconfd. Additionally, we made significant changes to core infrastructure in Anaconda, dracut, and OpenSSL to ensure encrypted DNS is available not only during runtime but also during system installation and early boot.
Attendees will gain technical insights into the rationale behind key architectural decisions, such as why Unbound was chosen over systemd-resolved, and how Fedora enables system-wide encrypted DNS without requiring modifications at the application level. We will also delve into the complexities of certificate management for secure DNS communication, which is essential in environments with strict security requirements.
Looking ahead, we will outline Fedora’s roadmap for eDNS, including further enhancements, and upstream collaboration. Join us to learn how Fedora is making Zero Trust a reality for Linux users
Intermediate - attendees should be familiar with the subject
I am Principal Software Engineer at Red Hat, core developer of SSSD and authselect. In the past years, I focused on improving collaboration between developers and QA, improving SSSD tests and test framework in order to speed up the process of creating test automation and improve readability and maintainability.
I’m a software developer and Product Owner working on operating systems and identity management as part of the FreeIPA team at Red Hat.