Hi Paul

On Mon, Sep 28, 2015 at 10:19:20AM -0700, Paul Hoffman wrote:
> Paul's "no" (which I agree with) shows what might be a fatal flaw in

Even if Paul had said "yes", this security consideration still exists
(see below). The reason why I sent the EDNS option handling email was
because it sometimes is not apparent with newer options if it was left
out because there was no support, or because of some other condition.

> draft-muks-dnsop-dns-message-checksums: an attacker just needs to send
> fragments that look like they say "I don't understand the new EDNS0 option".
> Does that make sense?

I really appreciate the sharp review. This was also pointed out by Ray
Bellis during internal review. It is listed in the github repo under
security considerations. The latest version of this draft in text form
is here:

http://users.isc.org/~muks/draft-muks-dnsop-dns-message-checksums.txt

As with any new protocol, if the protocol is not supported on both ends,
nothing can be done for it. The SHOULDs turn to MUSTs at some point when
support is widespread. Currently it's the client's choice on what action
to take if the option is missing from a reply.

                Mukund

Attachment: pgpsmkO5Y5tXR.pgp
Description: PGP signature

_______________________________________________
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop

Reply via email to