Robert Edmonds wrote:
> ...
>
> I am also curious why a cryptographic hash function (SHA-1) is needed
> for this.  Is a fast non-cryptographic checksum not suitable (e.g.,
> CRC-32C, which can be computed in hardware on x86 CPUs)?
in currently theorized attacks, the udp checksum is fooled by altering
two parts of a fragment:

first, alter the part you want to use to inject poison into a cache.

second, alter something else to fix up the checksum based on the first
alteration.

if CRC-32C is immune to that attack, i havn't heard, but i'd believe.

> Also, there is a long deployment tail for new EDNS options.  If it's
> urgent to deploy a countermeasure against off-path fragment spoofing,
> why not something like Unbound's "referral path hardening", or
> advertising a smaller EDNS buffer size which is much less likely to
> result in fragmentation?  (E.g., I believe OpenDNS advertises a ~1.4
> Kbyte EDNS buffer size.)  Those countermeasures can be deployed
> unilaterally by the resolver, and on a shorter time scale than a new
> EDNS option.
>

those things should also be done in the short term.

but it's the internet. it'll outlive us all. we ought to have a long
term plan as well.

-- 
Paul Vixie

_______________________________________________
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop

Reply via email to