In message <3c8b970b-4588-4f31-ab35-436b7cbb5...@fl1ger.de>, "Ralf Weber" write
s:
> Moin!
> 
> On 20 Jul 2015, at 4:39, Mark Andrews wrote:
> > No. The server takes the fake_client_cookie + IP client (victim) +
> > server secret + maybe parts of server cookie itself.  Computes a
> > server cookie and compares that with what was received.  If and
> > only if that matches (1 in 2^64) does the fake query get treated
> > legitimate.
>
> So does that mean that the server has to do the computation every
> time it receives a query? Couldn't that be a vector for a DOS
> attack of an off path attacker, as the processing for this probably
> is heavier than for normal rate limiting.

Yes.  Potentially it depends on the algorithm used to create the
hash and what paths are executed on success / failure.  It also
depend on the interface speed / cpu speed etc.

> > It can attempt a amplification attack.  As I stated earlier and in
> > the document this is used in conjuction with other things like
> > resource rate limiting.
>
> Can you explain how this is better than normal RRL for an attack
> on an authoritative server? If you give out an truncate answer
> a legitimate client will retry over TCP, while other clients
> just get the tiny fraction the attacker send making the attack
> not worthwhile.

Please go re-read what I have already sent out.

> > A client with a good server cookie avoids being rate limited.
>
> So that doesn't help or even makes these random attacks against
> resolvers worse as the rate limit will be higher or?

Unparseable.
 
> > The client only checks its client cookie.  It stores the new server
> > cookie if it got a good response.  Given the client knows from this
> > document that the server cookie may be different in every response
> > it will not be confused.
>
> Hm my understanding of the draft was that a server cookie would be
> valid for a day. Having a different cookie for every query doesn't
> make sense for me. Can you please elaborate?

Validity time of a server cookie is independent of when a new cookie
is generated.  Named hands out a new server cookie on every response.
Each of those cookies is valid for a given time.

> Maybe we should continue to look a but closer on how attackers can abuse
> this protocol before we continue.
> 
> So long
> -Ralf
-- 
Mark Andrews, ISC
1 Seymour St., Dundas Valley, NSW 2117, Australia
PHONE: +61 2 9871 4742                 INTERNET: ma...@isc.org

_______________________________________________
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop

Reply via email to