On Feb 07, 2014, at 07:09 , Tony Finch <[email protected]> wrote:
> Colm MacCárthaigh <[email protected]> wrote:

>> I don't see anyone disputing my example, and I'm not calling out RRLs
>> ability to dampen a reflection attack. I'm saying that RRL can be used to
>> counter-attack your users.  Let's say a busy website gets 1,000 QPS of
>> "real" user queries. If I want those queries to survive say with 2 retries,
>> then I need to let through 40% of traffic to have a 95p confidence of them
>> getting an answer. Yes, I'll have mitigated the reflection to 4Gbit/sec,
>> but meanwhile users will be seeing increased resolution times and timeouts.
> 
> You seem to be assuming that RRL is a blanket rate limit. It is not.
> 
> If my busy name server is getting 1000 qps of real traffic from all over
> the net, and 1000 qps of attack traffic "from" some victim, then RRL will
> attenuate responses to the victim without affecting other users.
> 
> In the absence of RRL, the victim will be denied service by overwhelming
> traffic. In the presence of RRL the victim might have slightly slower DNS
> resolution.

Not just the victim.

Let's all agree Colm is a bit confused on both how RRL works and the failure 
modes we are discussing. Then we can go back to arguing about other useless 
stuff instead of arguing about this useless stuff. :)

-- 
TTFN,
patrick

_______________________________________________
dns-operations mailing list
[email protected]
https://lists.dns-oarc.net/mailman/listinfo/dns-operations
dns-jobs mailing list
https://lists.dns-oarc.net/mailman/listinfo/dns-jobs

Reply via email to