Moin!

On 20 Jul 2015, at 4:39, Mark Andrews wrote:
> No. The server takes the fake_client_cookie + IP client (victim) +
> server secret + maybe parts of server cookie itself.  Computes a
> server cookie and compares that with what was received.  If and
> only if that matches (1 in 2^64) does the fake query get treated
> legitimate.
So does that mean that the server has to do the computation every
time it receives a query? Couldn't that be a vector for a DOS 
attack of an off path attacker, as the processing for this probably
is heavier than for normal rate limiting. 

> It can attempt a amplification attack.  As I stated earlier and in
> the document this is used in conjuction with other things like
> resource rate limiting.
Can you explain how this is better than normal RRL for an attack
on an authoritative server? If you give out an truncate answer
a legitimate client will retry over TCP, while other clients
just get the tiny fraction the attacker send making the attack
not worthwhile.

> A client with a good server cookie avoids being rate limited.
So that doesn't help or even makes these random attacks against
resolvers worse as the rate limit will be higher or?

> The client only checks its client cookie.  It stores the new server
> cookie if it got a good response.  Given the client knows from this
> document that the server cookie may be different in every response
> it will not be confused.
Hm my understanding of the draft was that a server cookie would be
valid for a day. Having a different cookie for every query doesn't
make sense for me. Can you please elaborate?

Maybe we should continue to look a but closer on how attackers can 
abuse this protocol before we continue.

So long
-Ralf

_______________________________________________
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop

Reply via email to