Mark Andrews wrote:
> DO says that you *understand* DNSSEC and that it is ok to
> send a DNSSEC response. It does not mean that you will be
> validating the response.
>
> named in all production versions of BIND 9 (9.1.0 onwards)
> has set DO on all EDNS queries. BIND 9.1.1 onwards named
> copies DO to the response.
Caching servers not validating the response?
Then, the following argument applies.
> If a caching server is not required to perform public key computation
> to verify RRs before caching, cache poisoning won't be detected by
> the caching server, average clients of which suffer from long lasting
> DOS of DNSSEC verification failure, turn off DNSSEC and will be a
> victim of another poisoning on their own cache.
Masataka Ohta
_______________________________________________
DNSOP mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/dnsop