> On 14 Feb 2024, at 03:31, Paul Wouters <p...@nohats.ca> wrote: > > On Wed, 14 Feb 2024, Roy Arends wrote: > >>> 1. There is a recommendation to use DNS COOKIEs [RFC7873] over UDP (PS), >>> but no >>> statement about how to mitigate the effects when these are not used. What >>> ought >>> someone to do when this is not done? >> >> It is recommended that the client (the resolver) sets the DNS COOKIE. The >> benefit of using cookies is for the client. It is to make sure that the >> response is genuine. > > Does it? Not for an on-path attacker that sees the COOKIE in the clear. > So what attack does this really counter?
Ah, no, apologies, it doesn’t. (I’ll blame this on my DNSSEC muscle memory). I should know better. I’ll try again: There is text in the document that specifies what the monitoring agent should do if cookies are not used: Section 6.3: The monitoring agent SHOULD respond to queries received over UDP that have no DNS COOKIE set with a response that has the truncation bit (TC bit) set to challenge the resolver to re-query over TCP. > And if using TLS, then one wouldn't need a COOKIE anymore to prove > genuineness. > >> However, there is little value in the response. The actual value for >> error-reporting is to the authoritative server that may have an issue. >> >> When cookies are not set, or are not used, there is language that states the >> following: >> >> The monitoring agent SHOULD respond to queries received over UDP that have >> no DNS COOKIE set with a response that has the truncation bit (TC bit) set >> to challenge the resolver to re-query over TCP. > > This sounds more like an attempt for a mechanism for the monitoring agent > to determine that the incoming report is not send from a spoofed address, > but it wouldn't work like that. Setting the TC would work, provided the > client comes back. Or if the monitoring agent would demand a COOKIE > before answering (even if the answer is not the actual data the resolver > wants anyway). If the monitoring agent requests a COOKIE, it would force > the resolver to resend with the COOKIE, proving it is not just a spoofed > packet. But that would always result in double the load to the > monitoring agent. A cookie may be set due to an earlier transaction, no? Roy _______________________________________________ DNSOP mailing list DNSOP@ietf.org https://www.ietf.org/mailman/listinfo/dnsop