> On May 3, 2017, at 9:39 PM, Colm MacCárthaigh <c...@allcosts.net> wrote:
> 
> As it happens, DNS queries are not idempotent.  Queries have side-effects,

This is sufficiently misleading to be false.

> for example Bind9 will rotate an RRset by one increment on each query.

Regardless of who the client is, the "attacker" can rotate the RRset
order by making his own query, no need to impersonate some other client.
And of course randomization of RRs in an RRset is normal.  Some clients
further randomize or re-order the results.

> Many providers charge by the DNS query.

They don't charge the client, which remains unauthenticated.  Hosted
DNS domains may be charged by query volume, but again the attacker
can make his own queries without replaying traffic from some other
client.

> Many providers throttle DNS queries (and TLS is intended as a mechanism
> to help prevent the ordinary spoof ability of DNS queries).

Again the client is unauthenticated, throttling is by IP address, there's
no need to repeat the same payload, indeed that's less effective since
throttling is biased towards queries for non-existent names, ...

Throttling is mostly for UDP, for lack of BCP-38 implementation.  DNS
over TLS *is* a good candidate for 0-RTT.  [ I would have chosen a more
simple protocol for DNS security than TLS, but given that DNS over TLS
seems to be moving forward, 0-RTT makes sense. ]

-- 
        Viktor.

_______________________________________________
TLS mailing list
TLS@ietf.org
https://www.ietf.org/mailman/listinfo/tls

Reply via email to