On Wed, Jan 04, 2017 at 10:28:11AM -0800, Nicholas Weaver wrote: > An attacker in that position can just put in garbage, and you get > SERVFAIL instead of NXDOMAIN, regardless of whether the attacker has > compromised the key or not.
A SERVFAIL is an erroneous condtion. An NXDOMAIN is not - it is business
as usual. SERVFAILs are sometimes cached very temporarily to reduce load
on upstream servers, but they are not answers. NXDOMAINs are cached as
*answers* from the remote auth server.
On-path disruption is impossible to defeat. An on-path attacker who
wants to poison answers without raising suspicions (logged validation
failures) will want validation to succeed.
Mukund
signature.asc
Description: PGP signature
_______________________________________________ DNSOP mailing list [email protected] https://www.ietf.org/mailman/listinfo/dnsop
