On Fri, 15 Aug 2008, David Conrad wrote:
> 
> Let me try to (hopefully) more clearly articulate my question: given  
> the fact that caching servers only care about DNSSEC if they're  
> explicitly configured to do so, does anyone anticipate any stability/ 
> security concerns to those folks who _haven't_ configured DNSSEC if  
> the root is signed?

There are two more problems with this. 

First, Putting any kind of large record in the root creates the
opportunity to use root servers in a DOS attack by sending queries for
the large records to the root servers. Because of Root Anycasting, there
are over 100+ root servers spread around the world that will respond to
queries. A botnet distributed worldwide should be able to send queries
to most or all of these servers.  Most or many of these servers have
very high bandwidth connections. Same would be true for TLD servers, and
large, high traffic domains like microsoft.com, etc. It is very hard, if
not impossible, to mitigate attacks coming from root, TLD or other
significant sites.

Second, as I start to look closer at DNSSEC, there appears to be a
problem in the DNSSEC protocol in that if caching servers don't care
about DNSSEC, then caches could store RRSIG records that are out of sync
with the RR they sign.  When the security-aware resolver obtains both
records from the caching server, the resolver that finally checks one
record against the other will find that the signature doesn't match.
This scenario could happen by accident during zone updates between
master and slaves after the RR was changed, if the cache gets one RR
from the master and receives the RRSIG from another server (one might
try to avoid this by adding RRSIG records as additional, but there is
still a race on the internal representation if multiple responses are
received from different servers).  Or it could happen on purpose using a
cache poisoning attack.  Once the incorrect records are cached, a DOS
occurs. (its only an attack if its on purpose)

If the caching server checks the signature of all records, its
susceptible to a DOS attack by lots of DNSSEC queries that take a lot of
computation to check.  Seems to be no-win.

The first problem is reason enough not to deploy DNSSEC. The second
problem is serious, too, but I think only affects DNSSEC users who have
shot themselves, other DNSSEC users, and those using DNSSEC-aware
caching servers in the foot, so to speak. Back to the drawing board?

                --Dean

-- 
Av8 Internet   Prepared to pay a premium for better service?
www.av8.net         faster, more reliable, better service
617 344 9000   


_______________________________________________
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop

Reply via email to