On 3/19/10 8:32 AM, George Barwood wrote:
There are advantages besides messages being lost.
It also prevents spoofing of fragments, and limits amplification attacks.
It doesn't limit amplification attacks by much if at all
It cuts the response from 4K to 1.5K, and I think fragmentation that contributes
to these attacks being damaging.
and spoofing of fragments is not likely to be happening in large responses,
because large .responses will almost invariably be due to DNSSEC.
Resolvers may set DO=1 but not validate everything ( or even anything ).
Taking .SE as an example, by sending an open resolver that doesn't/cannot
randomize ports the query [ NS SE ] ,
if the .SE servers don't conceal the IP ID, only 1 spoof packet is needed, and
poisoning is easy and certain, is it not?
Note: the .SE example does not truncate, it's very unusual for a response to be
truncated with a EDNS @ 1450.
I think it's best to have a conservative value as the default setting, and that
is 1450 bytes.
1450 is not a conservative value anymore.
See RFC2460 Section 5.
(dealing with IPv6/1280 -> IPv4/<1280)
,---
In response to an IPv6 packet that is sent to an IPv4 destination
(i.e., a packet that undergoes translation from IPv6 to IPv4), the
originating IPv6 node may receive an ICMP Packet Too Big message
reporting a Next-Hop MTU less than 1280. In that case, the IPv6 node
is not required to reduce the size of subsequent packets to less than
1280, but must include a Fragment header in those packets so that the
IPv6-to-IPv4 translating router can obtain a suitable Identification
value to use in resulting IPv4 fragments. Note that this means the
payload may have to be reduced to 1232 octets (1280 minus 40 for the
IPv6 header and 8 for the Fragment header), and smaller still if
additional extension headers are used.
'---
This should guide the recommended DNS message size fallback of say
1232 or less, depending upon other extension headers being used.
Bill Manning suggested 1220B, see:
http://www.ops.ietf.org/lists/namedroppers/namedroppers.2009/msg02996.html
-Doug
_______________________________________________
DNSOP mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/dnsop