On 18 Aug 2008, at 05:11, Dean Anderson wrote:
Ok, I agree that totally DNSSEC-oblivious servers won't be a problem
for
DOS, but of course remain susceptible to poisoning even if the stub
resolver and the authority server both implement DNSSEC.
Kindly explain how is this any different from when poisoning occurs
when stub resolver and authority server don't implement DNSSEC.
The fact is DNSSEC is the *only* game in town for preventing cache
poisoning. So to go back to David's original question: will deploying
DNSSEC break anything that's already in use that doesn't support DNSSEC?
Now if that resolving server does pay attention to the DO bit, it
will
set it on the query it makes to the authoritative server. That makes
the authoritative server return an answer which will contain the new
RRSIG and the resolving server's cache is updated accordingly.
Ok. So what about caching servers that do understand the DO bit but
don't actually verify the responses? They just cache the response for
the stub resolver to verify? These servers can still be poisoned with
invalid record combinations that they pass on to stub resolvers,
resulting in the DOS. Such servers may still be subject to the race
condition I described.
How is this different from a resolving server not getting the correct
answer because it queried an authoritative server that hasn't seen the
latest version of the zone on the master? In fact in the somewhat
contrived scenario you pose, the stub resolver gets a validation
failure. So they at least know something has gone wrong. Which has to
be a great leap forward from getting bad (poisoned) data and not
having the slightest clue that has happened.
Ahhh. I see it now. Someone will deploy DNSSEC in their stub resolver.
But then they'll make that query a resolving server that doesn't speak
DNSSEC whenever their stub resolver wants to do a DNSSEC-aware lookup.
Right. Makes perfect sense. [Add scarcasm to taste.]
_______________________________________________
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop