> On Mar 24, 2015, at 11:11 AM, Warren Kumari <war...@kumari.net> wrote:
>>>> There is a paper "Stretching NSEC3 to the Limit: Efficient Zone
>>>> Enumeration Attacks on NSEC3 Variants" by Sharon Goldberg et al, which
>>>> covers some of the trivial solutions and explains why it won't work:
>>>> 
>>>> http://www.cs.bu.edu/~goldbe/papers/nsec3attacks.pdf
>>>> 
> 
> Yes, this was presented at (IIRC) DNS-OARC in Los Angeles. While the
> paper is correct, my view of the response was "shrug", and "this is
> not a problem worth spending resources to solve". While some zone
> operators want to minimize zone enumeration, it's not really viewed as
> a huge issue. This is like buying a triple hardened bank vault door to
> protect a slice of cake.

And if you REALLY want this, TODAY, get a HSM (optional), program it to ONLY 
sign NSEC3 records, and just dynamically sign (and cache) NSEC3 records for 
your NXDOMAINs.

You use the HSM to protect the key if you are paranoid, and you get "no 
enumeration" records.  By caching the responses, you prevent a DOS from 
preventing you from serving up common NXDOMAIN records, and the DOS only 
affects the NXDOMAIN side anyway: you can probably get the same results in most 
cases by serving up an NXDOMAIN without an NSEC3 RRSET, as the resolver will go 
"this doesn't validate" and give a servfail anyway.

--
Nicholas Weaver                  it is a tale, told by an idiot,
nwea...@icsi.berkeley.edu                full of sound and fury,
510-666-2903                                 .signifying nothing
PGP: http://www1.icsi.berkeley.edu/~nweaver/data/nweaver_pub.asc

Attachment: signature.asc
Description: Message signed with OpenPGP using GPGMail

_______________________________________________
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop

Reply via email to