Paul Wouters wrote:
> On Tue, 17 Mar 2015, Yunhong Gu wrote:
>
>> The reason that this response can be used for an amplification attack
>> is its size, not the ANY type. A responses with 200 A records can be
>> used for the same purpose. The (even deeper) root cause is the use of
>> UDP in DNS protocol. I just do not think banning ANY touches any of
>> these fundamental issues.
>
> Right, so require tcp or eastlake cookies,

that would protect third parties, but not the server itself.

> or allow padding the ANY
> request so the request/response ratio is close to 1 before allowing
> the answer.

that would not prevent the unfortunate information leak that allows
third parties to scan our caches.

> Make the dig command default to tcp. That should cover
> the vast majority of valid ANY queries.

my proposal is, limit ANY to a selected set of source-ip addresses, as
is commonly done with AXFR/IXFR.

-- 
Paul Vixie
_______________________________________________
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop

Reply via email to