On 04/01/2022 21:12, Grant Taylor via bind-users wrote:

Yep.  This is where I have settled.  But I don't feel I can defend
it when asked.  Hence my seeking to better understand.

There are categories of bugs that specifically affect recursion, and in
BIND these are _much_ more common than those that affect authoritative
service.   Adding auth service barely touches the attack surface.

And with BIND's separation between authoritative and recursively cached
trees there is (AFAIK) no risk of cache pollution affecting the
authoritative data.

Furthermore, having the auth data for your own zones present there actually ensures that your own zones' data:

1.  will always be served in preference to cached data

2.  will be fresher (i.e. not subject to TTLs) assuming that
    NOTIFYs and/or a short SOA refresh is in place

3.  will be present if access to the authoritatives is lost
    for some period of time (/me waves at Facebook!)

I really can't see any downside.

Ray

_______________________________________________
Please visit https://lists.isc.org/mailman/listinfo/bind-users to unsubscribe 
from this list

ISC funds the development of this software with paid support subscriptions. 
Contact us at https://www.isc.org/contact/ for more information.


bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users

Reply via email to