Well having TCP used for all priming queries would make me feel better
    as TCP traffic is harder to forge.

So let's forget about dnssec an do everything over TCP?
    
    But seriously DNSSEC signed and validated data should protect the
    the resolver from going to the forged addresses.

So you wasn't serious? 

    Yes someone can forge the answer and DoS the resolver into believing that
    nothing works.
    The situation is "." and root-servers.net. zones are hosted on the
    root servers, thus the same servers will get all follow-up questions
    about signed address sets as the priming query.
    Resolvers like to ask the "close" servers for information thus it
    is almost certain that over time the resolver will send a question
    to all root servers.
    
    Based on this I think one TCP connection is better than 14-27
    UDP ones. (Resolver that only supports one transport should never
    ask for the address records it will not use).
    We can even take this one step further and ask both priming questions
    over the same TCP connection that is NS and DNSKEY.
    
    Ed in my mind this is straight forward engineering question,
    which approach is better as in cheaper/faster/safer.
    
But then I expect some decent answers and not some handwaving and flip-flopping
between being serious and not.

        jaap
_______________________________________________
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop

Reply via email to