On Tue, Aug 26, 2008 at 05:25:44PM -0400, Dean Anderson wrote:

> An actual poisoning of a non-verifing DNSSEC cache, yes. This is pretty

Wait a minute.  You're proposing to show that "a DNSSEC cache" that
doesn't actually do DNSSEC (whatever that would mean) can be poisoned?
I'm not sure I see the reasoning.  I don't think that a positive
result would be very big news at all -- in my view, a DNSSEC cache
that doesn't validate responses is, well, not a DNSSEC cache at all.

Is your concern that a DNSSEC-aware recursing resolver, with
validation turned off, can be poisoned even though it correctly
handles all the DNSSEC-requesting questions from a stub resolver, and
correctly handles the data from a DNSSEC-offering server, in the case
where Mallory can win the race and answer the non-validating
DNSSEC-aware resolver before the legitimate server?

A

-- 
Andrew Sullivan
[EMAIL PROTECTED]
+1 503 667 4564 x104
http://www.commandprompt.com/
_______________________________________________
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop

Reply via email to