On Sat, Oct 10, 2020 at 11:34:11AM -0400, John Levine wrote:
> In article <20201010032517.gm89...@kduck.mit.edu> you write:
> >There's two general classes of attack to consider: when an external
> >attacker takes an existing ZONEMD and tries to modify the associated zone,
> >or when the zone provider is the malicious entity that wants to provide
> >different content to different people but give them the same digest value ...
>  
> I think there's a third threat, a transcription error due to
> transmission error or other kinds of bitrot. I send zone files between
> my DNS servers over ssh, so the chances of an external attack are low,
> but particularly as zone files continue to grow, the protection of the
> TCP checksum is less effective. On my rather small DNS setup I have a
> 71MB zone and I don't think that's unusual. In many, probably most,
> cases a bit flip or two would produce DNS data that is still valid but
> wrong, e.g., change the address in AAAA or the characters in a name
> anywhere.

At risk of being overly glib, "Murphy is often a very effective attacker".
That is, the analysis for this decomposes into a subset of the first case I
listed.

-Ben

> That's why there are situations where a zone digest can be useful
> even without a DNSSEC validation chain.
> 
> R's,
> John

_______________________________________________
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop

Reply via email to