On 5 Aug 2015, at 1:58, Ralf Weber wrote:

On 5 Aug 2015, at 5:36, Mark Andrews wrote:
The analysis above is lacking.

"has cookie" is not the determining factor.  "has good server cookie"
is the determining factor.
For the attack that Ted describes later these attackers will have a
good server cookie as they are behind open resolvers that implements
cookies, so I think his analysis is correct.

If an attacker is causing a system that does cookies to be an attack vector, then this proposal does no harm or good. The assumption in the proposal is that some of the attack traffic will continue to look like it has for the past decade, coming from non-attack systems that have been updated or from attack systems that have not been updated.

An earlier response to the proposal is, in essence, "no one will implement this because it won't do any good and might do a bit of harm". Others on the list have shown that they are interested in implementing this.

It might be attractive to say "there can be no possible help to the DDoS problem other than professional networking services that are seen today", but so far the WG has not agreed with that. This proposal gives those who cannot afford such services a chance to respond to a DDoS in a way that might help.

--Paul Hoffman

_______________________________________________
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop

Reply via email to