Hi Brian, I think what you're suggesting has already been proposed. See https://datatracker.ietf.org/doc/draft-fujiwara-dnsop-nsec-aggressiveuse/ and https://datatracker.ietf.org/doc/draft-wkumari-dnsop-cheese-shop/
DW > On May 16, 2016, at 2:23 PM, Brian Somers <bsom...@opendns.com> wrote: > > Hi folks, > > I work at OpenDNS. We saw a DoS attack in Miami on Friday night around > 10-11:00pm PST, consisting of UDP DNS requests for AAA.BBB.CCC.DDD where each > of AAA, BBB, CCC and DDD are three digit numbers not greater than 500. > > Each query was answered with an NXDOMAIN by the root servers, Although our > resolvers cached the NXDOMAIN for 1 hour (we cap negative responses at 1 hour > despite the larger SOA MINIMUM) it was ineffective in reducing the load on > the root servers as every varying query was another root server request. > > We eventually blackholed all TLDs from 000 to 500 to stifle the problem > (locally delegating them to 127.0.0.1 where we don’t listen). > > However, during the attack, we also saw a huge number of TCP sockets in > TIME_WAIT talking to root servers (probably all root servers). I’m curious if > > 1. Are root servers doing some sort of tar pitting where they send a TC and > then firewall port 53? > 2. Has anyone ever considered a better way than responding with NXDOMAIN? > > The second is a loaded question, but it occurs to me that a new type of > negative response to (say) 111.222.333.444/IN/A might be an NXDOMAIN with an > SOA record (as we do now) but also with an indicator that 444 and below are > NXDOMAINs. I’m not sure what that might look like, maybe "444/IN/NS .” in > the AUTHORITY section where “.” is the NS value meaning that 444 is actually > delegated to nobody. > > Thoughts/comments? > > — > Brian > _______________________________________________ > DNSOP mailing list > DNSOP@ietf.org > https://www.ietf.org/mailman/listinfo/dnsop _______________________________________________ DNSOP mailing list DNSOP@ietf.org https://www.ietf.org/mailman/listinfo/dnsop