Moin!

On 5 Aug 2015, at 17:05, Paul Hoffman wrote:

On 5 Aug 2015, at 1:58, Ralf Weber wrote:

On 5 Aug 2015, at 5:36, Mark Andrews wrote:
The analysis above is lacking.

"has cookie" is not the determining factor. "has good server cookie"
is the determining factor.
For the attack that Ted describes later these attackers will have a
good server cookie as they are behind open resolvers that implements
cookies, so I think his analysis is correct.

If an attacker is causing a system that does cookies to be an attack vector, then this proposal does no harm or good.
I have to disagree here. You are introducing additional complexity into the server which now has to handle two possibly three rate limiter with tables of counters to keep track of things with different algorithms what to do. And in the end you still want to answer as many queries as possible so you can't simply turn off non cookie traffic or rate it very low.

It might be attractive to say "there can be no possible help to the DDoS problem other than professional networking services that are seen today", but so far the WG has not agreed with that.
I'm not agreeing with that either, but I am saying that for most of the attacks that this draft wants to protect against the operational community has found a way to deal with them.

This proposal gives those who cannot afford such services a chance to respond to a DDoS in a way that might help.
Which would only work in a vast or universal deployment which we know in the DNS won't happen fast. Heck we still have a sizeable chunk of severs not supporting EDNS0 after how many years now.

So long
-Ralf

_______________________________________________
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop

Reply via email to