In message <ea312f37-2e4c-45e0-af0a-b0a0663b7...@dnss.ec>, Roy Arends writes:
> Having read the draft
>
> How does one distinguish a Empty Non-Terminal NODATA response from an
> NXDOMAIN response, solely by looking at the NSEC or NSEC3 records.

NSEC:  Find the NSEC record that proves that there are no records
at the given name (note all of the owner, the next domain name and
the bit map need to be examined to do this).  It either the owner
name or the next domain name of that record are a subdomain of the
given name then it is a ENT otherwise it is a NXDOMAIN.

> There is an attack vector where an RCODE0 can be replaced by RCODE3 while
> keeping the rest of the response completely intact, causing an aggressive
> use enabled cache to deny existing records.
>
> These kind of subtleties arent described in the draft, as far as I can
> tell.
>
> Roy
> _______________________________________________
> DNSOP mailing list
> DNSOP@ietf.org
> https://www.ietf.org/mailman/listinfo/dnsop

-- 
Mark Andrews, ISC
1 Seymour St., Dundas Valley, NSW 2117, Australia
PHONE: +61 2 9871 4742                 INTERNET: ma...@isc.org

_______________________________________________
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop

Reply via email to