Mukund Sivaraman wrote:
> On Thu, Jun 25, 2020 at 09:32:39AM -0700, [email protected] wrote:
> > 
> > A new version of I-D, draft-muks-dnsop-dns-thundering-herd-00.txt
> > has been successfully submitted by Mukund Sivaraman and posted to the
> > IETF repository.
> > 
> > Name:               draft-muks-dnsop-dns-thundering-herd
> > Revision:   00
> > Title:              The DNS thundering herd problem
> > Document date:      2020-06-25
> > Group:              Individual Submission
> > Pages:              6
> > URL:            
> > https://www.ietf.org/internet-drafts/draft-muks-dnsop-dns-thundering-herd-00.txt
> > Status:         
> > https://datatracker.ietf.org/doc/draft-muks-dnsop-dns-thundering-herd/
> > Htmlized:       
> > https://tools.ietf.org/html/draft-muks-dnsop-dns-thundering-herd-00
> > Htmlized:       
> > https://datatracker.ietf.org/doc/html/draft-muks-dnsop-dns-thundering-herd
> > 
> > 
> > Abstract:
> >    This document describes an observed regular pattern of spikes in
> >    queries that affects caching resolvers, and recommends software
> >    mitigations for it.
> 
> For whoever is interested, this is a description of a pattern of queries
> noticed at busy public resolvers that has led to issues in at least 4
> different sites in the last 2 months.

This seems like a description of a resolver implementation vulnerable to
the infamous VU#457875. Perhaps an update to the standards track RFC
5452 ("Measures for Making DNS More Resilient against Forged Answers")
would be more appropriate than a new document? That document mentions
the security problem caused by having multiple outstanding queries for
the same question but doesn't clearly state a requirement to
de-duplicate, perhaps because that mitigation was already very common in
resolver implementations at the time the document was published.

-- 
Robert Edmonds

_______________________________________________
DNSOP mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/dnsop

Reply via email to