Joel,

At 2016-02-29 11:55:27 -0800
"Joel Jaeggli" <joe...@bogus.com> wrote:
> 
> This is just something I want to discuss, it's not an objection...
> 
> At this point we say:
> 
>    Implementations therefore
>    SHOULD avoid using this option if the DNS transport is not encrypted.
> 
> If you did allow this on unencrypted dns transport this seems like it
> serves as a utility function for  DNS amplification.
> 
> Wouldn't it be better to say MUST NOT?
> 
> e.g. this is exclusively for use with TLS / DTLS supporting  sessions?

If the concern is amplification, then this is independent of
encryption. Unencrypted TCP or even DNS cookies should address the
concern, the same as they do for any large response.

In the interests of simplicity I think your suggestion of making it a
MUST NOT makes sense though. Perhaps a sentence explaining the
motivation for such a strong recommendation is beneficial in that case.

Something like:

   The use of the EDNS(0) Padding provides only a benefit when DNS
   packets are not transported in clear text. Further, it is possible
   EDNS(0) Padding may make DNS amplification attacks easier.
   Implementations therefore MUST NOT use this option if the DNS
   transport is not encrypted.

Personally I would be happy if the definition of "DNS transport"
remains vague in the hopes of covering everything. ;)

Cheers,

--
Shane

_______________________________________________
dns-privacy mailing list
dns-privacy@ietf.org
https://www.ietf.org/mailman/listinfo/dns-privacy

Reply via email to