In message <236f5488-42d4-4a89-acab-b55fd2b57...@fl1ger.de>, "Ralf Weber" 
writes:
> Moin!
>
> On 20 Jul 2016, at 5:03,  wrote:
>
> > About the DDoS risk, it should not be worried so much because this
> > scheme is controlled/triggered by the recursive server (with a flag as
> > NN bit).
> > In other words, the recursive server can get the piggybacked multiple
> > responses only when it wants and of cource it can disable this model
> > anytime.
> That's not who DDos work. If attacker would only do what the specs say
> we wouldn't have any DDos. But an attacker can just create an UDP packet
> with that bits and a spoofed address and fire it off (or get a botnet to
> fire it off).

Which is why DNS COOKIES with a valid server cookie / TCP / DNS-O-TLS
was suggests as being a necessary precondition.

> > Another scenario to illustrate this proposal is under the DANE case:
> > A client wants to visit www.example.com.
> > But this domain name supports DANE can the TLSA record is configured
> > under the domain name: _443._tcp.www.example.com.
> > The client has to query the two names seperately.
> > Yes, it is just one more TTL, but why not to do the optimization with
> > a steerable method.
> Again if example.com is popular almost all the time this record will be
> in the cache already.

But the cache can be the other side of the world.  The browser vendors
aren't willing to go to SRV because they may need to make a second query
to the recursive server to get the addresses of the SRV targets.

>
> So long
> -Ralf
>
> _______________________________________________
> DNSOP mailing list
> DNSOP@ietf.org
> https://www.ietf.org/mailman/listinfo/dnsop

-- 
Mark Andrews, ISC
1 Seymour St., Dundas Valley, NSW 2117, Australia
PHONE: +61 2 9871 4742                 INTERNET: ma...@isc.org

_______________________________________________
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop

Reply via email to