Moin!
On 5 Aug 2015, at 17:05, Paul Hoffman wrote:
On 5 Aug 2015, at 1:58, Ralf Weber wrote:
On 5 Aug 2015, at 5:36, Mark Andrews wrote:
The analysis above is lacking.
"has cookie" is not the determining factor. "has good server
cookie"
is the determining factor.
For the attack that Ted describes later these attackers will have a
good server cookie as they are behind open resolvers that implements
cookies, so I think his analysis is correct.
If an attacker is causing a system that does cookies to be an attack
vector, then this proposal does no harm or good.
I have to disagree here. You are introducing additional complexity into
the server which now has to handle two possibly three rate limiter with
tables of counters to keep track of things with different algorithms
what to do. And in the end you still want to answer as many queries as
possible so you can't simply turn off non cookie traffic or rate it very
low.
It might be attractive to say "there can be no possible help to the
DDoS problem other than professional networking services that are seen
today", but so far the WG has not agreed with that.
I'm not agreeing with that either, but I am saying that for most of the
attacks that this draft wants to protect against the operational
community has found a way to deal with them.
This proposal gives those who cannot afford such services a chance to
respond to a DDoS in a way that might help.
Which would only work in a vast or universal deployment which we know in
the DNS won't happen fast. Heck we still have a sizeable chunk of severs
not supporting EDNS0 after how many years now.
So long
-Ralf
_______________________________________________
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop