> On Nov 10, 2014, at 12:13 AM, John Levine <jo...@taugh.com> wrote:
> 
>> And isn't there some danger that this "parallel" root becomes an
>> attractive target for those who want things to be different than
>> what's in the "official" root?  That is, in effect, isn't this a plain
>> old alternative root?
> 
> I would assume the plan is that the clients use DNSSEC to validate
> the responses.
> 
> This doesn't seem notably less secure than the current scheme, given
> how many networks "helpfully" reroute DNS traffic already.  But my
> question about why not just hijack the address of an existing root
> stands.

This happens in China (on CERNET I believe): there are a set of root mirrors 
that hijack most (but not all) of the root IPs.  As far as we can tell, the 
servers are legitimate, returning the proper responses, except that the mirror 
servers don't support DNSSEC.

--
Nicholas Weaver                  it is a tale, told by an idiot,
nwea...@icsi.berkeley.edu                full of sound and fury,
510-666-2903                                 .signifying nothing
PGP: http://www1.icsi.berkeley.edu/~nweaver/data/nweaver_pub.asc

Attachment: signature.asc
Description: Message signed with OpenPGP using GPGMail

_______________________________________________
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop

Reply via email to