On Wed, Jan 04, 2017 at 10:28:11AM -0800, Nicholas Weaver wrote:
> An attacker in that position can just put in garbage, and you get
> SERVFAIL instead of NXDOMAIN, regardless of whether the attacker has
> compromised the key or not.

A SERVFAIL is an erroneous condtion. An NXDOMAIN is not - it is business
as usual. SERVFAILs are sometimes cached very temporarily to reduce load
on upstream servers, but they are not answers. NXDOMAINs are cached as
*answers* from the remote auth server.

On-path disruption is impossible to defeat. An on-path attacker who
wants to poison answers without raising suspicions (logged validation
failures) will want validation to succeed.

                Mukund

Attachment: signature.asc
Description: PGP signature

_______________________________________________
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop

Reply via email to