> On Apr 11, 2016, at 9:05 AM, Martin Rex <m...@sap.com> wrote:
> 
> The TTL of a DNS record is *NOT* protected by DNSSEC, and can be
> regenerated at will by an attacker, will be regenerated by intermediate
> DNS server and its purpose is purely cache-management, *NOT* security.
> 
> Only the "Signature Expiration" information in the RRSIG
> is protected by DNSSEC, and only that ensures expiry of information
> from DNS.

This is largely wrong, RRSIG RRs carry an "original TTL"
field and:

   https://tools.ietf.org/html/rfc4035#section-5.3.3

   If the resolver accepts the RRset as authentic, the validator MUST
   set the TTL of the RRSIG RR and each RR in the authenticated RRset to
   a value no greater than the minimum of:

   o  the RRset's TTL as received in the response;

   o  the RRSIG RR's TTL as received in the response;

   o  the value in the RRSIG RR's Original TTL field; and

   o  the difference of the RRSIG RR's Signature Expiration time and the
      current time.

So attackers cannot generate TTL values "at will", the TTL is bounded by
the signed "original TTL".  Of course if the attacker remains on path
indefinitely, then he can replay a stale signed RRset until the RRSIG
expires.

-- 
        Viktor.

_______________________________________________
TLS mailing list
TLS@ietf.org
https://www.ietf.org/mailman/listinfo/tls

Reply via email to