Shane,

On 08/03/2016 01:58 PM, Shane Kerr wrote:
> Wes,
> 
> At 2016-08-01 15:00:52 -0700
> Wes Hardaker <wjh...@hardakers.net> wrote:
> 
>> The following draft, authored by Warren and I, might be of interest to
>> the dnsop crowd:
>>
>> https://tools.ietf.org/html/draft-hardaker-rfc5011-security-considerations-00
>>
>> [it currently does not have a home]
> 
> Reading this document it basically seems like the hold-down timer is
> actually a potential for mischief, rather than a good thing. There is
> no mitigation recommended, right? I can't think of a fix that doesn't
> involve protocol changes.
> 
> My own feeling is that the hold-down timer is tricky operationally, and
> adds no actual value. I'd support using your draft as the basis of a
> proposal to deprecate the hold-down timer completely.

The Add Hold-Down time adds value in the form of some mitigation against
automated configuration of a compromised trust anchor in the resolver.

While not waterproof, I don't think we should abandon the Add Hold-Down
timer, although the long time may be somewhat of a burden and
the outlined Denial of Service attack is to be taken serious.

I would rather see a mitigation against the replay attack by for example
adding a jitter to the Active Refresh, to make the query interval less
predictable.

Best regards,
  Matthijs


> 
> Cheers,
> 
> --
> Shane
> 
> 
> 
> _______________________________________________
> DNSOP mailing list
> DNSOP@ietf.org
> https://www.ietf.org/mailman/listinfo/dnsop
> 

_______________________________________________
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop

Reply via email to