draft-ietf-dnsop-nsec-aggressiveuse works for stopping random sub-domain
attacks for signed zones.

The problem exists for unsigned zones and different approaches have been
proposed:

- Bloom filtering queries (e.g. https://github.com/hdais/unbound-bloomfilter)
- Bloom filter bitfield in RRs (e.g. 
https://tools.ietf.org/html/draft-bellovin-dnsext-bloomfilt-00)

What are the consequences of the authoritiative server returning
synthesized unsigned NSEC3 RRs upon being signalled by the resolver
using an EDNS option? This could be spoofed by a man-in-the-middle, but
so can every unsigned answer.

                Mukund

Attachment: signature.asc
Description: PGP signature

_______________________________________________
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop

Reply via email to