On Sat, 24 Jul 2010, Warren Kumari wrote:


On Jul 23, 2010, at 2:37 PM, Danny Mayer wrote:

On 7/22/2010 11:08 PM, Merton Campbell Crockett wrote:
Thanks for the confirmation that the problem was related to DNSSEC.

I didn't see your message until I got home from work; however, I did
find the root of the problem late this afternoon.  At each of our
Internet egress and ingress points, we have Cisco ASA devices sitting in
front of a pair of redundant firewalls.  Each ASA is configured with the
default DNS inspect policy that doesn't accept fragmented UDP packets.

Why would any inspection policy not allow fragmented UDP packets?
There's nothing wrong with that.


Because it's "hard".... The issue is that then you need to buffer fragments 
until you get a full packet -- which leaves you open to attacks that send a bunch of 
fragments but leave one of them out.

Vendors like to avoid reassembling fragments by default, because it makes their 
performance numbers better....

That's true, but it doesn't quite explain why the "DNS Inspection Policy," turned on by default on the PIX/FWSM/ASA, continued to have a default maximum DNS message size of 512 bytes more than a decade after EDNS0 became a standards-track RFC.

In this case, Cisco's defaults are brain-dead. Whether that had an impact here or the issue was due to mere fragmentation isn't clear, but those default values have had an impact on DNSSEC deployment.

michael

_______________________________________________
bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users

Reply via email to