On Wed, Feb 14, 2024 at 04:55:20AM +0100, b...@fea.st wrote:

> “A single packet can exhaust the processing 
> capacity of a vulnerable DNS server, effectively
> disabling the machine, by exploiting a 
> 20-plus-year-old design flaw in the DNSSEC
> specification.
> 
> https://www.theregister.com/2024/02/13/dnssec_vulnerability_internet/

To be clear, this does not mean DNSSEC is cryptographically broken.

The RFCs specifying the DNSSEC validation algorithm do not take into
account potential resource usage validating many potential signatures
so the implementations following the RFCs suffered from the same.

By constraining the amount of work (limiting the potential signatures
considered) while validating these issues are worked around.

        -Otto

Reply via email to