In message <844475874024407090c1c2e9d5718...@mxph4chrw.fgremc.it>, "Darcy Kevin
 (FCA)" writes:
> From an InfoSec standpoint, of course one would prefer to use
> cryptographic methods of securing DNS data, but, in the absence of that,
> slaving could, arguably, be considered more secure than forwarding, in
> the sense that forwarding usually generates more network transactions,
> over time, for any given resolution of any given name, and thus more
> chances for a bad guy to successfully spoof a response and have that
> forged answer be cached.
>
> One could also eke out a small measure of extra security (again, if
> cryptographic methods are for some reason unavailable) by turning off
> IXFR and thus causing all zone transfers to occur with AXFR, which is
> TCP-based and thus presumably harder to spoof. But, that's a heavy price
> to pay for a small increment of extra security. Better to go for crypto,
> at that point, either within the DNS protocol itself (e.g. TSIG, DNSSEC),
> by implementing (as many have) an out-of-band method of replicating zone
> data (e.g. rsync-over-ssh, Infoblox-style "grid replication" over OpenVPN
> tunnels) or by securing *all* communicati on between nameserver instances
> (e.g. IPSEC tunnels).

named only accepts IXFR over TCP.  While the protocol supports sending
deltas with IXFR/UDP named does not use that part of the protocol.
 
-- 
Mark Andrews, ISC
1 Seymour St., Dundas Valley, NSW 2117, Australia
PHONE: +61 2 9871 4742                 INTERNET: ma...@isc.org
_______________________________________________
Please visit https://lists.isc.org/mailman/listinfo/bind-users to unsubscribe 
from this list

bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users

Reply via email to