> > > I know of no such feature. What do you mean by "spoofed" anyway? How
> > > would you expect named to detect "spoofing", and is that its job?
> > 
> > It seems (not tested by me) that Nominum CNS does that: when many
> > responses arrive which do not match (src IP address, query ID, etc)
> > any pending answer, it switches to TCP, assuming someone tries to
> > poison it.
> >  
> > This is supposed to be a protection against the Kaminsky attack.
> 
> Interesting.  "Switches" by what means?  Returns TC responses to all UDP 
> queries?  Just for particular clients or particular domains?  Is this 
> documented at all (yes, I'm too lazy to Google :-) ).

According to the Nominum CNS manual,

"When a single query ID mismatch is detected in the expected DNS
response, CNS switches the recursive query to the more reliable TCP
protocol ..."

So it is definitely documented - though I'm sure there are details of
the implementation which are *not* documented in the regular user
manual.

Steinar Haug, Nethelp consulting, sth...@nethelp.no
_______________________________________________
bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users

Reply via email to