It appears that Petr � pa� ek <pspa...@isc.org> said:
>TL;DR is:
>
>RFC 4035 section 5.3.3. Checking the Signature
>has a MUST loop doing crypto operations over product of #DNSKEY * #RRSIG 
>set (for matching key tags), and this can be damn expensive.
>
>Of course we should have listened to RFC 1034 page 35 "limit amount of 
>work" advice ...

There are innumerable ways that a DNS server can return answers that
ask the client to do an unreasonable amount of work. This one is
unusual in that the work all happens at once while processing the
response, but so what, make sure you limit the number of times through
each processing loop.

At contacts.abuse.net I have a little DNS server that lets you look up
contact info, e.g. example.com.contacts.abuse.net will give you the
info for example.com in TXT records. A few client systems hammer on it
with odd queries like one that seemed to be looking up every name in
the .AT TLD.

So they get a special response, a referral with 10 NS records, each
with a name they can look up to get 25 pseudo-random A or AAAA records.
I figured this would provoke complaints, so I could tell them to cut
it out.  But it hasn't, so that's evidently something they've
limited so it doesn't matter.

R's,
John

_______________________________________________
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop

Reply via email to