> On 20 Jul 2016, at 06:19, Mark Andrews <ma...@isc.org> wrote:
> 
>> That's not who DDos work. If attacker would only do what the specs say
>> we wouldn't have any DDos. But an attacker can just create an UDP packet
>> with that bits and a spoofed address and fire it off (or get a botnet to
>> fire it off).
> 
> Which is why DNS COOKIES with a valid server cookie / TCP / DNS-O-TLS
> was suggests as being a necessary precondition.

The draft does not say that Mark.

Under Security Considerations, it says: "One could mitigate this by only 
serving responses to EXTRA requests over TCP or when using Cookies [RFC5395], 
although there is no easy way to signal this to a client other than through the 
use of the truncate bit."

It's a bit of a stretch to call that a suggestion and a far bigger one to claim 
cookies and/or TCP as a necessary precondition. There's no language like 
"clients and servers SHOULD (MUST?) use DNS cookies/TCP/DNSoverTLS for EXTRA 
queries and responses". Well, not yet anyway. Maybe in the next release.

And if DNS over TLS is the answer, the overheads of that handshake would more 
than cancel out the benefit of optimising away an extra query/response RTT.

FWIW, I think it's a Bad Idea and the start of a very slippery slope to make 
queries or responses to QTYPEs dependent on the underlying transport protocol 
(modulo AXFR of course). Are layering violations acceptable nowadays?

_______________________________________________
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop

Reply via email to