It appears that Mark Andrews  <ma...@isc.org> said:
>It’s not the complexity of the validator we are worried about.  The number of 
>crypto verifications per second is really low on all
>hardware.  Being able to stop validating on the first failure rather than 
>having to continue because the attacker has constructed a
>colliding key tag rrset is beneficial to getting good put trough in the 
>presence of a DoS attack.

Why do you have to try to validate everything rather than do some
sensible number and stop? When I look at RFC 4035 sec 5.3.3 I don't
see any MUSTs.

I could set up a 100 link CNAME chain that would resolve if you
followed the whole thing, but every cache will stop long before that.
Why is this different?

R's,
John

PS: I wouldn't be opposed to something like RFC 9276 that offered some
advice for things to limit in practical DNS resolution, but that's not
a protocol change, more like a BCP.

_______________________________________________
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop

Reply via email to