On Aug 4, 2015, at 3:26 PM, Paul Wouters <p...@nohats.ca> wrote:
> The confusion is introduced by the term "negative consequences of DNS
> cookies when they are not widely implemented". If the client fails
> to understand the packet, and it is a legitimate client, it will ask
> again. If it is a botnet, it never sees the answer (and asks again anyway
> because it is doing a a DDOS). If the legitimate client would not get
> an answer because the server is about to topple over, it would also ask
> again. So I do not understand what these "negative consequences" are.
> 
> However, if a client does understand cookies and the server receives
> back a cookie, it can give that request a higher preference and answer
> it in favour of sending cookie requests to clients that did not send
> requests with cookies.

Yes, but the cost is that you’ve doubled the number of packets exchanged, and 
the DDoS attacker gets a 50% amplification out of it.   It’s certainly cheaper 
than using TCP.

_______________________________________________
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop

Reply via email to