Ok, thanks. Steve
On May 10, 2016, at 11:54 AM, 神明達哉 <jin...@wide.ad.jp> wrote: > At Tue, 10 May 2016 15:04:56 +0200, > Stephane Bortzmeyer <bortzme...@nic.fr> wrote: > >>> This is true, but I suspect it would be pretty easy for this type >>> of attacker to circumvent the effect if and when the nxdomain-cut >>> behavior is more widely deployed. An attacker for the '.wf' zone >>> would simply send random junk query <random>.wf instead of >>> <random>.dafa888.wf. So I think the mitigation effect in this >>> sense is quite limited. >> >> Speaking of that, I have a philosophical question. Attackers in the >> real world (not in labs or in security conferences, where researchers >> try to impress their peers with clever hacks) are often >> unsophisticated. [...] Why do they >> continue to do so? > > I don't know:-) In any case, my comment on this was not to request a > particular change to the draft. But I believe one with a decent > knowledge on DNS won't have to be particularly "clever" to have the > same question, you might want to add more discussion to answer (or at > least respond to) that question if we keep this topic in the draft. > It's up to you. > > -- > jinmei > > _______________________________________________ > DNSOP mailing list > DNSOP@ietf.org > https://www.ietf.org/mailman/listinfo/dnsop _______________________________________________ DNSOP mailing list DNSOP@ietf.org https://www.ietf.org/mailman/listinfo/dnsop