Mark Andrews wrote:

>       DO says that you *understand* DNSSEC and that it is ok to
>       send a DNSSEC response.  It does not mean that you will be
>       validating the response.
>
>       named in all production versions of BIND 9 (9.1.0 onwards)
>       has set DO on all EDNS queries.  BIND 9.1.1 onwards named
>       copies DO to the response.

Caching servers not validating the response?

Then, the following argument applies.

> If a caching server is not required to perform public key computation
> to verify RRs before caching, cache poisoning won't be detected by
> the caching server, average clients of which suffer from long lasting
> DOS of DNSSEC verification failure, turn off DNSSEC and will be a
> victim of another poisoning on their own cache.

                                                        Masataka Ohta


_______________________________________________
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop

Reply via email to