Good morning, Ralf.

At 2016-07-20 13:07:01, "Ralf Weber" <d...@fl1ger.de> wrote:
>Moin!
>
>On 20 Jul 2016, at 5:03, 延志伟 wrote:
>
>> About the DDoS risk, it should not be worried so much because this 
>> scheme is controlled/triggered by the recursive server (with a flag as 
>> NN bit).
>> In other words, the recursive server can get the piggybacked multiple 
>> responses only when it wants and of cource it can disable this model 
>> anytime.
>That's not who DDos work. If attacker would only do what the specs say 
>we wouldn't have any DDos. But an attacker can just create an UDP packet 
>with that bits and a spoofed address and fire it off (or get a botnet to 
>fire it off).

I understand your points, but these risks always be there because DNS response 
is larger than the request, like DNSSEC. 
How to avoid DNS DDoS is anther problem.
>> Another scenario to illustrate this proposal is under the DANE case:
>> A client wants to visit www.example.com.
>> But this domain name supports DANE can the TLSA record is configured 
>> under the domain name: _443._tcp.www.example.com.
>> The client has to query the two names seperately.
>> Yes, it is just one more TTL, but why not to do the optimization with 
>> a steerable method.
>Again if example.com is popular almost all the time this record will be 
>in the cache already.

Anyway, the cache should get the data fist and then it can cache them.
:-)


>So long

>-Ralf


Zhiwei Yan
_______________________________________________
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop

Reply via email to