On 18 Aug 2008, at 00:43, Dean Anderson wrote:
First, Putting any kind of large record in the root creates the
opportunity to use root servers in a DOS attack by sending queries for
the large records to the root servers.
Well in that case we better not put anything into any DNS zone.
Because a botnet that's in a net that doesn't do proper egress
filtering could use spoofed source addresses to generate lots of DNS
responses from any decent authoritative server infrastructure for a
(D)DoS attack. The actual size of the DNS responses doesn't matter.
What's the difference between 50 million DNS responses of 1 Kb each
and 500 million of 100 bytes? In other words, if the botnet's not big
enough to do the necessary damage, just get a bigger one.
Second, as I start to look closer at DNSSEC, there appears to be a
problem in the DNSSEC protocol in that if caching servers don't care
about DNSSEC, then caches could store RRSIG records that are out of
sync
with the RR they sign.
This makes no sense. If caching servers don't care about DNSSEC, why
would they be storing RRSIGs? Please explain. And why would these
caching servers be signing anything? It's the master server that signs
the zone.
I suspect you're talking about the absurdly hypothetical scenario
where someone gets a non DNSSEC-aware resolving server to lookup some
RRSIG, then the zone is resigned, then they ask that server for the
QTYPE that the already cached RRSIG once signed. If that's the
situation you've dreamt up, so what? Have you read and actually
understood RFC3225? Nobody's going to get that cached RRSIG unless
they query the caching server with the DO bit set. Which the server
will ignore because it doesn't care about DNSSEC. So it won't send a
response containing the cached RRSIG. Now if that resolving server
does pay attention to the DO bit, it will set it on the query it makes
to the authoritative server. That makes the authoritative server
return an answer which will contain the new RRSIG and the resolving
server's cache is updated accordingly.
Even if you're talking about some other scenario, your concern is
still unjustified. Whatever contrivance you've invented will be no
different from the case where a resolving server queries a slave that
hasn't yet picked up the latest version of the zone from the master
server. Which can happen irrespective of whether DNSSEC is used or
not. The DNS is a loosely coherent distributed database after all.
_______________________________________________
DNSOP mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/dnsop