On 17.09.18 02:27, Mark Andrews wrote:
Actually having the clients time and fudge in those fields for BADKEY
provides spoofing protection for the unsigned responses. This is especially
important with opportunistic TSIG,which is what TSIG with a WKK will be, as
there is no longer the presumption that server is configured for the key that
there was when TSIG was originally drafted.  It’s all about getting answers
through acceptance filters.
Hi Mark,

thanks for the explanation, this sounds reasonable, I will fix our software in the next release.

Regards,

Klaus

_______________________________________________
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop

Reply via email to