>I meant this to be in response to Ben's concern about potential malicious use,
> in which case 99% idling and other normal-use scenarios don't seem to be appl
>icable.

The point of dry-run is to get a statistical sample of failures. If all of
those mostly idle resolver can validate the domain, then it is a good signal
that things are probably fine.

For busy resolvers, the operator can either run a few instances with
dry-run enabled with a lower query rate. Or have a system where dry-run gets
disabled during an attack.

>Rather, the work bounds are there especially to limit malicious use. Why would
> a resolver want to expend twice the resources, in comparison to what they had
> decided would be the maximum they would want to spend, just because the (mali
>cious) DS record has a dry-run entry?

Given that the resolver is doing DNSSEC validation, we can assume that the
operator cares about the deployment of DNSSEC in one way or another.
So helping out with dry-run is a benefit if it doesn't cost too much.

Large scale DNSSEC failures are costly. It is likely that when a popular
domain fails to resolve, people are first going to look at their local
ISP. Who then has to insert a negative trust anchor. If dry-run can avoid
most of that, it is a clear win.

Somehow, you seems to be under the impression that 'twice the resources' is
a significant amount. I think that compared to the endless DoS possibilities
that DNS offers, this is not that significant.

_______________________________________________
DNSOP mailing list -- dnsop@ietf.org
To unsubscribe send an email to dnsop-le...@ietf.org

Reply via email to